The dynamic performance of a fully pre-stressed six-component force sensor is simulated based on the software of ADAMS. The dynamics theoretical model of the sensor is built first, and the natural frequency and mode v...
详细信息
It is not easy to processing piston ring contour because of its complicating shape. From view of time-domain analysis, in order to trace the curve of piston ring, servo actuator must have high speed and acceleration t...
详细信息
ISBN:
(纸本)9781848002401
It is not easy to processing piston ring contour because of its complicating shape. From view of time-domain analysis, in order to trace the curve of piston ring, servo actuator must have high speed and acceleration to complete movement of back and forth. From view of frequency -domain analysis, the order of harmonic of the piston ring contour is very high, so the controlsystem bandwidth also should be wide enough. It's hard to satisfy these requirements for the traditional drive methods by using rotate serve and Lead screw. In this paper, a new method of direct drive by linear motor is provided, And achieve good results.
control concepts for mobile service robots are a key issue in robotic research. With the use of mobile robots in the domestic area, further challenges entails new designs facilitating efficient control concepts for fa...
详细信息
control concepts for mobile service robots are a key issue in robotic research. With the use of mobile robots in the domestic area, further challenges entail new designs facilitating efficient control concepts for fas...
详细信息
control concepts for mobile service robots are a key issue in robotic research. With the use of mobile robots in the domestic area, further challenges entail new designs facilitating efficient control concepts for fast motion with reduced computational capacity. This paper presents motion control designed for an autonomously acting two-wheel driven robot, which fits in a cuboid with 75times75times150mm. Due to the outstanding design of mechanical and electrical components, the robot is capable to perform high precision movements up to a speed of 2.5m/s, featuring a vision unit that allows a fast environment recognition interpreting current position based on an application dependent world model. Based on predictive control algorithms, trajectory tracking and point stabilization are facilitated. The use of realtime communication for all units allows fast interaction of all components exchanging information, which is indispensable for fast motion control
In chaotic cryptosysterns, using (very) high dimensional chaotic attractors for encrypting a given message maybe can improve the privacy of chaotic encoding. A kind of hyperchaotic systems are studied by using some ...
详细信息
In chaotic cryptosysterns, using (very) high dimensional chaotic attractors for encrypting a given message maybe can improve the privacy of chaotic encoding. A kind of hyperchaotic systems are studied by using some classical methods. The results show that for improving the security of the chaotic cryptosystems, besides the high dimension, the sub-Nyquist sampling interval (SI) is also necessary. Then, we verify this result using the methods of time series analysis.
In chaotic cryptosystems, using (very) high dimensional chaotic attractors for encrypting a given message maybe can improve the privacy of chaotic encoding. A kind of hyperchaotic systems are studied by using some cla...
详细信息
In chaotic cryptosystems, using (very) high dimensional chaotic attractors for encrypting a given message maybe can improve the privacy of chaotic encoding. A kind of hyperchaotic systems are studied by using some classical methods. The results show that for improving the security of the chaotic cryptosystems, besides the high dimension, the sub-Nyquist sampling interval (SI) is also necessary. Then, we verify this result using the methods of time series analysis.
The two main goals of this contribution are to demonstrate the integration of hydraulic actuator systems with PCH systems and to discuss a modification of the well known input-output linearization in connection with P...
详细信息
The two main goals of this contribution are to demonstrate the integration of hydraulic actuator systems with PCH systems and to discuss a modification of the well known input-output linearization in connection with P...
详细信息
The two main goals of this contribution are to demonstrate the integration of hydraulic actuator systems with PCH systems and to discuss a modification of the well known input-output linearization in connection with PCH systems. We will show that this approach is closely related to the existence of so called Casimir functions in the PCH context. Finally, industrial measurements demonstrating the implemented control law will be presented.
This contribution deals with the application of computer algebra based methods to the analysis of dynamic systems described by implicit ordinary differential equations. This type of system defines a submanifold of a c...
This contribution deals with the application of computer algebra based methods to the analysis of dynamic systems described by implicit ordinary differential equations. This type of system defines a submanifold of a certain jet space. We solve the problem whether this submanifold admits a parametrization by an explicit system, i.e. any solution of the original system is a solution of the explicit one and vice versa. Since this approach requires the formal integrability of the implicit system, a sketch of an algorithm for the computation of the formally integrable system is presented.
The security architecture and mechanism of 3rd generation mobile communication are discussed in this paper. Five UMTS security feature is given. Then the security architecture is introduced. We analyzed the basic netw...
详细信息
The security architecture and mechanism of 3rd generation mobile communication are discussed in this paper. Five UMTS security feature is given. Then the security architecture is introduced. We analyzed the basic network access security mechanism and give the flow description regarding to the signalling procedure. For the integrity protection and data confidentiality, the corresponding algorithm is also discussed.
暂无评论