A power- and delay-efficient routing algorithm and emergency-efficient protocol for ubiquitous wireless sensor networks of silver town is presented. For this protocol, the fixed nodes (without any limited resources) a...
详细信息
A power- and delay-efficient routing algorithm and emergency-efficient protocol for ubiquitous wireless sensor networks of silver town is presented. For this protocol, the fixed nodes (without any limited resources) are established to one point which can communicate with one-hop to both the sink node and the mobile sensor nodes in the dark region (in which mobile sensor nodes can not communicate to the sink node). The fixed nodes are operated like the fixed cluster header. Our protocol is simulated by using the simulation program for wireless sensor networks. The simulated life time of our routing algorithm is longer than those of LEACH-C and multi-hop and the simulated time delay of our routing algorithm is 1.5 times as fast as one of LEACH-C.
According to the unknown control direction strict feedback nonlinear systems, this paper introduced a design process for time-varying nonlinear adaptive controller by introducing the Nussbaum increasing and the dead a...
详细信息
According to the unknown control direction strict feedback nonlinear systems, this paper introduced a design process for time-varying nonlinear adaptive controller by introducing the Nussbaum increasing and the dead area revision algorithm. Its stability is proved and analyzed, and its simulation is designed with the LMI MATLAB toolbox, the result shows that the controller has a good performance.
The electro-hydraulic compound pump is a new integrated product, in which the pump and motor are combined as one unit replacing the traditional connection with a shaft coupling. A piston pump embedded in the motor rot...
The electro-hydraulic compound pump is a new integrated product, in which the pump and motor are combined as one unit replacing the traditional connection with a shaft coupling. A piston pump embedded in the motor rotor is capable of actuating the pump without a rotating shaft coupling. There are a great deal of advantages in this design, such as reduced noise, decreased power loss, and easy installation. The piston pump body is placed in the motor rotor because of the compound pump design. The air gap between the rotor and motor stator is filled with hydraulic oil. The rotor is directly rotated in the hydraulic oil. The control of the pressure and flow is achieved by means of the mechanical adjustment at the pressure valve. This paper adopts the Maxwell EM software matched with the corresponding mathematical theory to examine and simulate the oil film effect in the air gap on the electrical performance of an electrohydraulic compound pump. The experimental results are given.
Recently, in the smart-card based authentication system, there is an increasing trend of using fingerprint for the card holder verification, instead of passwords. However, the security of the fingerprint data is parti...
详细信息
Recently, in the smart-card based authentication system, there is an increasing trend of using fingerprint for the card holder verification, instead of passwords. However, the security of the fingerprint data is particularly important as the possible compromise of the data will be permanent. In this paper, we propose an approach for secure fingerprint verification by distributing both the secret and the computation based on the fuzzy vault (a cryptographic construct which has been proposed for crypto-biometric systems). That is, a user fingerprint template which is applied to the fuzzy vault is divided into two parts, and each part is stored into a smart-card and a server, respectively. At distributing the fingerprint template, we consider both the security level and the verification accuracy. Then, the geometric hashing technique is applied to solve the fingerprint alignment problem, and this computation is also distributed over the combination of the smart-card and the server in the form of the challenge-response. Finally, the polynomial can be reconstructed from the accumulated real points from both the smart-card and the server. Based on the experimental results, we confirm that our proposed approach can perform the fuzzy vault-based fingerprint verification more securely on a combination of a smart-card and a server without significant degradation of the verification accuracy.
Generalized predictive controllers (GPCs) have been successfully applied in process control during the last decade. The performance of unstable, non-minimum-phase, or linear processes with dead-time are improved, howe...
详细信息
Generalized predictive controllers (GPCs) have been successfully applied in process control during the last decade. The performance of unstable, non-minimum-phase, or linear processes with dead-time are improved, however, GPCs are limited when used to control real industrial process, because of the real processes is often onlinear. According to the difficult problem of building an accurate model for a nonlinear system, a new generalized predictive control (GPC) algorithm based on online support vector machines (OSVM) is designed. At first, some key parameters of model are identified on-line by OSVM, and then using generalized predictive control strategy to realize predictive control for the system. Through simulating of some experiments, the result shows that the design could predictive accurately, has a good stability and small the steady-state error.
The Takagi-Sugeno (T-S) fuzzy multiple-variable integral control system with fuzzy state observer is designed for the coordinated control of multi-input-multi-output (MIMO) nonlinear boiler-turbine system whose operat...
The Takagi-Sugeno (T-S) fuzzy multiple-variable integral control system with fuzzy state observer is designed for the coordinated control of multi-input-multi-output (MIMO) nonlinear boiler-turbine system whose operating points vary within a wide range. Linear models are first derived from the original nonlinear model on several operating points. Next the fuzzy multi-variable integral controller and the fuzzy state observer are designed via using the parallel distributed compensation (PDC) scheme, and the T-S fuzzy control system is constructed with the drum pressure as the premise variable. The problem that part of state variables can not be measured is successfully solved by introducing fuzzy state observer. Last the stability analysis is given by means of linear matrix inequality (LMI) approach, and the control system is guaranteed to be stable within a large range. The simulation results demonstrate that the control system works well over a wide region of operation.
Design of a power- and delay-efficient routing algorithm and emergency-efficient protocol of ubiquitous wireless sensor network systems for silver town applications is presented. For this protocol, the fixed nodes (wi...
详细信息
ISBN:
(纸本)9781424440085
Design of a power- and delay-efficient routing algorithm and emergency-efficient protocol of ubiquitous wireless sensor network systems for silver town applications is presented. For this protocol, the fixed nodes (without any limited resources) are established to one point which can communicate with one-hop to both the sink node and the mobile sensor nodes in the dark region (in which mobile sensor nodes can not communicate to the sink node). The fixed nodes are operated like the fixed cluster header. The simulated life time of the proposed routing algorithm is longer than those of LEACH and HEED and the simulated time delay of the proposed routing algorithm is faster than those of LEACH and HEED.
In this paper, a new transform‐domain based video watermarking scheme is proposed. The method embeds and detects watermarks in the DCT domain based on Singular Value Decomposition (SVD). Extensive experimental result...
In this paper, a new transform‐domain based video watermarking scheme is proposed. The method embeds and detects watermarks in the DCT domain based on Singular Value Decomposition (SVD). Extensive experimental results demonstrate that the proposed watermarking scheme is effective and robust against not only attacks such as frame dropping, frame averaging, and H.263 coding, but also attacks such as cropping, rotation, adding salt & pepper noise, sharpening and adding Gaussian noise.
We have performed low-temperature transport measurements on a GaAs two-dimensional electron system at low magnetic fields. Multiple temperature-independent points and accompanying oscillations are observed in the long...
详细信息
We have performed low-temperature transport measurements on a GaAs two-dimensional electron system at low magnetic fields. Multiple temperature-independent points and accompanying oscillations are observed in the longitudinal resistivity between the low-field insulator and the quantum Hall (QH) liquid. Our results support the existence of an intermediate regime, where the amplitudes of magneto-oscillations can be well described by conventional Shubnikov–de Haas theory, between the low-field insulator and QH liquid.
This paper describes a two level parallel grammatical evolution (TLPGE) that can evolve complete programs using a variable length linear genome to govern the mapping of a Backus Naur Form grammar definition. To increa...
详细信息
This paper describes a two level parallel grammatical evolution (TLPGE) that can evolve complete programs using a variable length linear genome to govern the mapping of a Backus Naur Form grammar definition. To increase the efficiency of grammatical evolution (GE) the influence of backward processing was tested and a second level with differential evolution was added. The significance of backward coding (BC) and the comparison with standard coding of GEs is presented. The new method is based on parallel grammatical evolution (PGE) with a backward processing algorithm, which is further extended with a differential evolution algorithm. Thus a two-level optimization method was formed in attempt to take advantage of the benefits of both original methods and avoid their difficulties. Both methods used are discussed and the architecture of their combination is described. Also application is discussed and results on a real-word application are described.
暂无评论