This paper deals with the fault-tolerant control problem under nonlinear boiler systems with noise and disturbance. MCMBPC (Multivariable Constrained Model-Based Predictive controller) proposed by Wilkinson et al . is...
详细信息
This paper deals with the fault-tolerant control problem under nonlinear boiler systems with noise and disturbance. MCMBPC (Multivariable Constrained Model-Based Predictive controller) proposed by Wilkinson et al . is used and modified in this paper in order to be applied to nonlinear boiler systems. Fault-tolerant control scheme combining MCMBPC with a fault detection method based on the unknown input observer is proposed. The fault-tolerant controller proposed is shown, via simulation, to have acceptable tracking performance even under some faults of input valves in the boiler system.
In this paper, sensor fusion techniques, fused vision/optical sensors and tactile/vision sensors are introduced which are used for learning/identifying features of-tasks related to a robot's part-bringing procedur...
详细信息
In this paper, sensor fusion techniques, fused vision/optical sensors and tactile/vision sensors are introduced which are used for learning/identifying features of-tasks related to a robot's part-bringing procedure from a part position to a position over a hole for the purpose of a micro-part insertion in partially unstructured environments. An entropy function, which is a useful measure of the variability and the information in terms of uncertainty, including learning, is introduced to measure the overall performance of a task execution related to a part assembly. By employing a learning approach, the uncertainty associated with the part-bringing task is reduced. The above tools are necessary for a robot manipulator to perform complex assembly, material handling, manufacturing or machining tasks, for example remote maintenance and hazardous material handling, in an unstructured environment.
Bulk-type domain reversal gratings of LiTaO3 crystal were fabricated at room temperature by the direct electric field method, The nonlinear optical. property of the crystal was evaluated by quasi-phase matching. The p...
详细信息
Bulk-type domain reversal gratings of LiTaO3 crystal were fabricated at room temperature by the direct electric field method, The nonlinear optical. property of the crystal was evaluated by quasi-phase matching. The period of the bulk-type domain reversal gratings on an LiTaO3 substrate was 7.5 mu m and the domain reversal extended to the entire substrate thickness of 500 mu m. The experimental normalization efficiency was 0.46%/W . cm in carder quasi-phase matching and was close to the theoretical value (0.48%/W . cm). This result indicates that high-efficiency nonlinear interaction could be achieved by using the bulk-type domain reversal grating, The bulk-type domain reversal grating of nonlinear optical crystal such as LiTaO3 is expected to be useful for compact nonlinear optical devices and integrated laser sources.
The theory of singular perturbations and time scales has played an important role in aircraft performance analysis and in the development of feedback guidance laws for aerospace vehicles. This paper presents a survey ...
详细信息
作者:
TSUNOO, YOKAMOTO, EUEMATSU, TMemberNEC Software Hokuriku
Ltd. Ishikawa Japan 920-21 School of Information Science
Japan Advanced Institute of Science and Technology Ishikawa Japan 923-12 MembersTomohiko Uyematsu graduated in Electrical Engineering from Tokyo Institute of Technology in 1982 and received a Master's degree from the same university in 1984
after whichhe became an assistant in the Electrical and Electronics Engineering Department there. In1990 he became a Lecturer and in 1991 an Assistant Professor. In 1992 he became Assistant Professor at the School of Information Science Japan Advanced Institute of Science and Technology. He holds a doctorate in engineering. Among his research interests are signal theory optical communications theory coding theory and data compression algorithms. In 1988 he received a Shinohara Commemorative Science Encouragement Prize and in 1992 a Best Paper Award. He is the author of the bookIntroduction to Record Data Compression Algorithms. He is a member of the Measurement Control Society and the Society for Information Theory and Its Applications.
Cryptology provides the technological basis for guaranteed network security. In the field of business, to guarantee the security of information, everyone needs easy-to-use cryptology. Starting with the announcement by...
详细信息
Cryptology provides the technological basis for guaranteed network security. In the field of business, to guarantee the security of information, everyone needs easy-to-use cryptology. Starting with the announcement by the U.S. National Bureau of Standards of the DES cryptosystem and the proposal by NTT of the FEAL cryptosystem, secret-key cryptographic algorithms have been published, involution-type block cryptosystems which use secret key to encipher 64 bits of plain text as 64 bits of cipher text [2, 3, 9, 10, 12]. NTT has proposed the one-way function MAP, which is also an involution-type transform. In this paper, we study a new cryptanalytic method for involution-type cryptosystems and show by example that it can be applied practically in a ciphertext-only attack on the one-way function MAP. For an involution-type cryptosystem, by increasing the amount of construction in the data-randomization phase and by increasing the size of the secret key, we can guarantee the computational security by preventing the estimation of the secret key. However, if we study the properties of the function used in the design of the data-randomization phase, by specifying input/output values of the function which are independent of the secret key, it may be possible to use the inverse function [11] to calculate the secret key. This method is called the intermediate cipher method. The intermediate cipher method differs from previous methods in the small quantity of data required for breaking.
作者:
Maruyama, SatoshiIwanami, YasunoriIkeda, TetsuoFaculty of Engineering
Nagoya Institute of Technology Nagoya Japan 486 Satoshi Maruyama graduated 1983 Dept. Electrical Eng.
Fac. Eng. Nagoya Inst. Technology. Completed Master's program 1985 Grad. School and affiliated with Fujitsu Co. Engaged in researches in distance measurement by spread spectrum technique. Tetsuo Ikeda graduated 1961 Dept. Comm. Eng.
Fac. Eng. Tohoku University. Completed doctoral program 1966 Grad. School. Assistant 1966 and Assoc. Prof. 1968 Fac. Eng. Tohoku University. Assoc. Prof. 1973 and Prof. 1977 Nagoya Inst. Technology. Engaged in researches in network theory computer networks communication system and electromagnetic environment. Doctor of Eng. Member I.E.E.E. Japan TV Soc. Jap. Inf. Proc. Soc. Jap. Soc. Inf. Comm. and I.E.E.E.
The spread spectrum (SS) communication is a communication system which has excellent characteristics against noise and is suited to the code-division multiplex. This paper describes a method which reduces the tracking...
详细信息
The spread spectrum (SS) communication is a communication system which has excellent characteristics against noise and is suited to the code-division multiplex. This paper describes a method which reduces the tracking phase error in DLL due to multipath waves in SS communication system. The method is based on the model with a single multipath wave.
作者:
SMITH, CRFOSTER, REUSNCapt. Charles R. Smith
Jr. USN:graduated from the U.S. Naval Academy in 1949. He completed his flight training in 1951 and first served in Composite Squadron 33 on board Atlantic and Pacific Fleet aircraft carriers until 1954. He then attended the U.S. Navy Postgraduate School in Aeronautical Engineering and was awarded his Masters degree in SM Aero-Weapons Systems by Massachusetts Institute of Technology in 1957 at which time he was ordered to Heavy Attack Squadron ONE embarked in Atlantic ‘Fleet aircraft carriers. He graduated from the Naval War College Command and Staff Course in 1961 and subsequently sensed on the Staff U.S. Naval Safety Center arid was Operations Officer. Executive Officer and Commanding Officer of Heavy Attack Squadron SIX and Reconnaissance Attack Squadron THREE. From 1968 until 1970 he was Executive Officer of the USS John F. Kennedy (CVA-67) when the ship was commissioned and first deployed followed by duty in the Office of the Chief of Naval Operations (OPNA V) where he served under the Director of Fleet Operations until 1971. Capt. Smith commanded the Fast Combat Support Ship USS Detroit (AOE-4) during her first deployment was Commanding Officer. USS Independence (CV-62): and later returned to OPNAV where he was the Deputy Director of the Aircraft Carrier Programs
an assignment which he held until August 1976 when he assumed his present duties as Chief Navy Section MAAG. Greece. Capt. Richard E. Foster
USN (Ret.):has been affiliated with Wheeler Industries. Inc. us Program Manager since 1968 when he retired from the U.S. Navy. He graduated from the U.S. Naval Academy with the Class of 1941 and later attended the U.S. Navy Postgraduate School in Engineering Design. He served at sea as Electrical Officer in the USS Pennsylvania and as Engineer Officer in the USS Indiana and the aircraft carrier USS Wright. His three tours of duty in the Bureau of Ships included the Interior Communication and Fire Control Branch the Machinery Design Division and as Administrative Assistant
The rapid advance of multimedia devices, including sensors, cameras and mobile phones, has given rise to the prevalence of Internet of Multimedia Things (IoMT), generating huge volumes of application-oriented multimed...
详细信息
The rapid advance of multimedia devices, including sensors, cameras and mobile phones, has given rise to the prevalence of Internet of Multimedia Things (IoMT), generating huge volumes of application-oriented multimedia data. At the same time, network security issues in the multimedia big data environment also increases. Network intrusion detection (NID) system demonstrates its power in preventing cyber-attacks against multimedia platforms. However, the existing NID methods which are based on machine learning or deep learning classifiers may fail when there is a lack of abnormal traffic samples for training in the real-world scenario. We propose a novel approach for intrusion detection based on deep AutoEncoder and Differential comparison named AED, which only requires the normal traffic samples in the training phase. We conduct extensive experiments on two real-world datasets to evaluate the effectiveness of the proposed AED. The experimental results show that AED can outperform the baseline methods of three categories in terms of accuracy, precision, recall and F1-score.
This book demonstrates that the reliable and secure communication performance of maritime communications can be significantly improved by using intelligent reflecting surface (IRS) aided communication, privacy-aware I...
详细信息
ISBN:
(数字)9783031321382
ISBN:
(纸本)9783031321375;9783031321405
This book demonstrates that the reliable and secure communication performance of maritime communications can be significantly improved by using intelligent reflecting surface (IRS) aided communication, privacy-aware Internet of Things (IoT) communications, intelligent resource management and location privacy protection. In the IRS aided maritime communication system, the reflecting elements of IRS can be intelligently controlled to change the phase of signal, and finally enhance the received signal strength of maritime ships (or sensors) or jam maritime eavesdroppers illustrated in this book.;The power and spectrum resource in maritime communications can be jointly optimized to guarantee the quality of service (i.e., security and reliability requirements), and reinforcement leaning is adopted to smartly choose the resource allocation strategy. Moreover, learning based privacy-aware offloading and location privacy protection are proposed to intelligently guarantee the privacy-preserving requirements of maritime ships or (sensors). Therefore, these communication schemes based on reinforcement learning algorithms can help maritime communication systems to improve the information security, especially in dynamic and complex maritime environments.;This timely book also provides broad coverage of the maritime wireless communication issues, such as reliability, security, resource management, and privacy protection. Reinforcement learning based methods are applied to solve these issues. This book includes four rigorously refereed chapters from prominent international researchers working in this subject area. The material serves as a useful reference for researchers, graduate students. Practitioners seeking solutions to maritime wireless communication and security related issues will benefit from this book as well.
暂无评论