Detecting user to root attacks is an important intrusion detection task. This paper uses a mix of spectrum kernels and probabilistic suffix trees as a possible solution for detecting such intrusions efficiently. Exper...
详细信息
This paper is concerned with the generation of a balancing trajectory for improving the walking performance. Balancing motion has been determined by solving the second-order differential equation. However, this method...
详细信息
This paper presents an application of wavelet networks in identification and control design tor a class of non-linear dynamical systems. The technique of feedback linearization, supervisory control and H∞ control are...
详细信息
This paper presents a neural network based approach to fault tolerant control of nonlinear flight control systems. The proposed scheme consists of three main components. First, a fault diagnosis scheme is designed to ...
详细信息
The varying period and complex commutation conditions make the classic mapping modeling method based on fixed switching period no longer fit for soft switching circuit analysis. This paper proposes a discrete time map...
详细信息
Fuzzy automata are proposed for fault diagnosis. The output of the monitored system is partitioned into linear segments which are assigned to pattern classes (templates) with the use of fuzzy membership functions. A s...
详细信息
In this paper we consider the H ∞ nonlinear state feedback control for constrained input systems. The constraints on the input to the system are encoded via a quasi-norm that will enable us to perform a quasi- L 2 ga...
详细信息
In this paper we consider the H ∞ nonlinear state feedback control for constrained input systems. The constraints on the input to the system are encoded via a quasi-norm that will enable us to perform a quasi- L 2 gain analysis of the corresponding closed-loop nonlinear system. The quasi-norm allows using nonquadratic supply rates along with dissipativity theory to formulate the robust optimal control problem using Hamilton-Jacobi-Isaacs (HJI) equations. An iterative computationally efficient solution technique based on the game theoretic interpretation of the HJI equation is presented. The relation between attenuation gain and the region of asymptotic stability of the H ∞ controller is discussed from the game theoretic perspective. The solution is approximated at each iteration with a neural network over a predefined domain of the region of asymptotic stability of an initially stabilizing controller. The result is a closed-loop control based on a neural net that has been tuned a priori off-line.
This paper describes a virtual reality and haptic interface between human and the Atomic Force Microscope (AFM), which allows the operator to sense and touch the surface and nanoparticles during the manipulation with ...
详细信息
This paper reviews what the first Author and his Group have been investigating for the past decade in the on-line steady-state hierarchical intelligent control and optimization of large-scale industrial processes (LSI...
详细信息
Traditionally, software pipelining is applied either to the innermost loop of a given loop nest or from the innermost loop to outer loops. In this paper, we propose a threestep approach, called Single-dimension Softwa...
详细信息
ISBN:
(纸本)0769521029
Traditionally, software pipelining is applied either to the innermost loop of a given loop nest or from the innermost loop to outer loops. In this paper, we propose a threestep approach, called Single-dimension Software Pipelining (SSP), to software pipeline a loop nest at an arbitrary loop level. The first step identifies the most profitable loop level for software pipelining in terms of initiation rate or data reuse potential. The second step simplifies the multi-dimensional data-dependence graph (DDG) into a 1-dimensional DDG and constructs a 1-dimensional schedule for the selected loop level. The third step derives a simple mapping function which specifies the schedule time for the operations of the multi-dimensional loop, based on the 1-dimensional schedule. We prove that the SSP method is correct and at least as efficient as other modulo scheduling methods. We establish the feasibility and correctness of our approach by implementing it on the IA-64 architecture. Experimental results on a small number of loops show significant performance improvements over existing modulo scheduling methods that software pipeline a loop nest from the innermost loop.
暂无评论