This paper presents a new approach for coupling control problems for norm bounded continuous-time uncertain systems Firstly, a design of the state feedback decoupling controller is presented The nominal model could be...
详细信息
ISBN:
(纸本)9781424447541
This paper presents a new approach for coupling control problems for norm bounded continuous-time uncertain systems Firstly, a design of the state feedback decoupling controller is presented The nominal model could be decoupled completely and the coupling of the actual system would be reduced Secondly, based on the linear matrix inequality (LMI), combining the guaranteed cost control law with the decoupling control, the state feedback tracking guaranteed cost control law is proposed Finally, taking BTT vehicle as the research objective, the design procedure of the decoupling guaranteed cost controllers is shown and the final results of the simulation are proved with effectiveness for the proposed design approach
For given graphs G(1), G(2), G(3), the three-color Ramsey number R(G(1), G(2), G(3)) is defined to be the least positive integer n such that every 3-coloring of the edges of complete graph K-n contains a monochromatic...
详细信息
For given graphs G(1), G(2), G(3), the three-color Ramsey number R(G(1), G(2), G(3)) is defined to be the least positive integer n such that every 3-coloring of the edges of complete graph K-n contains a monochromatic copy of G(i) colored with i. for some 1 <= i <= 3. In this paper, we prove that R(P-4, P-5, C-3) = 11, R(P-4, P-5, C-4) = 7, R(P-4, P-5, C-5) = 11, R(P-4, P-5, C-7) = 11, R(P-4, P-5, C-k) = k + 2 for k >= 23;R(P-4, P-6, C-4) = 8, R(P-4, P-6, C-3) = R(P-4, P-6, C-5) = R(P-4, P-6, C-7) = 13, R(P-4, P-6, C-k) = k + 3 for k >= 18. (C) 2008 Elsevier Ltd. All rights reserved.
This paper proposes a rapid trajectory optimization approach using a novel PSO algorithm, the Migrant Particle Swarm Optimization (Migrant PSO) Imitating the behavior of a flock of migrant birds, the Migrant PSO algor...
详细信息
ISBN:
(纸本)9781424447541
This paper proposes a rapid trajectory optimization approach using a novel PSO algorithm, the Migrant Particle Swarm Optimization (Migrant PSO) Imitating the behavior of a flock of migrant birds, the Migrant PSO algorithm employs stochastic search method and adaptive linear search method respectively for PSO search spaces including both continuous space and discrete space In the example of the minimum control energy reentry trajectory optimization for X-33 vehicle model with free terminal time, some key problems such as parameterized method are argued in detail The simulation results indicate that the Migrant PSO algorithm proves to be able to generate a complete and optimal 3DOF reentry trajectory rapidly
Many systems in our life contain redundant systems. If one system collapses, its redundant system Will substitute it to work for a period of time. In Our paper, we have specifically studied the effects of redundant sy...
详细信息
Many systems in our life contain redundant systems. If one system collapses, its redundant system Will substitute it to work for a period of time. In Our paper, we have specifically studied the effects of redundant systems on controlling the disaster spreading in networks. Based on the network Structure, several redundant strategies have been formulated. On the one hand, the effects of the redundant systems designed uniformly have been Studied in different types of networks, the result shows that the random network has been improved the best to fight the disaster. On the other hand, the effectiveness of those redundant strategies have been discussed in the scale free network, results show that the strategy based oil total degree is the most effective one to control the spreading. All results found in this paper offer promising perspectives to design redundant systems for preventing cascading failures. Crown Copyright (C) 2008 Published by Elsevier B.V. All rights reserved.
In this paper, we proposed a susceptible-infected model with variant infection rates because different individuals have different resistance to diseases in different periods of real epidemic events. We consider two ca...
详细信息
The infrastructures are interconnected and interdependent on multiple levels, the failure of one infrastructure can result in the disruption of other infrastructures, which can cause severe economic disruption and los...
详细信息
The infrastructures are interconnected and interdependent on multiple levels, the failure of one infrastructure can result in the disruption of other infrastructures, which can cause severe economic disruption and loss of life or failure of services. A methodological approach to analyze vulnerability of interdependent infrastructures has been introduced in this paper, two types of vulnerability are studied: structural vulnerability and functional vulnerability. Infrastructure topologies are only used for analysis on structural vulnerability while operating regimes of different infrastructures are further considered to analyze functional vulnerability. For these two types of vulnerability, interdependent effects are mainly studied and the effects of interdependence strength between infrastructures have also been analyzed. The analysis on structural vulnerability will be helpful to design or improve the infrastructures in the long run while the discussion on functional vulnerability will be useful to protect them in the short term. The methodology introduced in this paper will be advantageous to comprehensively analyze the vulnerability of interdependent infrastructures and protect them more efficiently. Crown Copyright (C) 2009 Published by Elsevier B.V. All rights reserved.
Electric power, potable water, telecommunications, natural gas, and transportation are examples of critical infrastructures, the intrinsic feature of which are suitable for network analysis. This paper proposes a meth...
详细信息
A fast algorithm was proposed to decrease the computational cost of the contour extraction approach based on quantum mechanics. The contour extraction approach based on quantum mechanics is a novel method proposed rec...
详细信息
Programmable Logic controller (PLC) plays a more and more important role in the field of industry. To deal with the heterogeneity of manufacture-dependent programming languages, IEC 61131-3 international standard has ...
详细信息
ISBN:
(纸本)9780769535838
Programmable Logic controller (PLC) plays a more and more important role in the field of industry. To deal with the heterogeneity of manufacture-dependent programming languages, IEC 61131-3 international standard has promoted the PLC openness to developing. In this paper, we present a proposal to implement the IEC 61131-3 standard in a PLC virtual machine (VM), which is a new kind of high-level language VM and takes Instruction List (IL) as the intermediate code. We discuss the syntax and semantics of IL, and show the design architecture for the emulation engine using both interpretation and translation methods. The PLC VM enables developers to rapidly porting an IEC-61131-3 application onto different platforms. We have implemented the PLC VM on a C51 based embedded PLC platform.
In this paper, a novel approach for networked control system (NCS) task scheduling is proposed. The proposed neural-genetic method utilizes the information about the quality of service (QoS) over the communication net...
详细信息
ISBN:
(纸本)9781605583266
In this paper, a novel approach for networked control system (NCS) task scheduling is proposed. The proposed neural-genetic method utilizes the information about the quality of service (QoS) over the communication network and enables online reconfigurable scheduling on distributed environment. In this way the NCS's bandwidth can be shared properly among different parallel control tasks. For NCS, two significant factors of QoS that affect validity of scheduling results are the packet loss and delay, which occurred in the communication among tasks. By adopting a Elman neural network based prediction model, the one-step ahead packet loss and time delay are obtained. The knowledge about the predict QoS factors, combined with the task execution features and the resources available in the system, are used as an entry to improve the decisions of the proposed scheduling algorithm. Such algorithm uses genetic algorithm techniques to find out the appropriate task scheduling scheme to adapt changes of application and communication circumstance. The proposed neural-genetic approach is evaluated through simulation by using a model parameterized with the features obtained from a real scenario of Ethernet based control system. The simulation results clearly show the effectiveness of the proposed approach in solving the task scheduling problems in NCS.
暂无评论