共查询到20条相似文献,搜索用时 15 毫秒
1.
A new modeling approach for nonlinear systems with rate-dependent hysteresis is proposed. The approach is used for the modeling
of the giant magnetostrictive actuator, which has the rate-dependent nonlinear property. The models built are simpler than
the existed approaches. Compared with the experiment result, the model built can well describe the hysteresis nonlinear of
the actuator for input signals with complex frequency. An adaptive direct inverse control approach is proposed based on the
fuzzy tree model and inverse learning and special learning that are used in neural network broadly. In this approach, the
inverse model of the plant is identified to be the initial controller firstly. Then, the inverse model is connected with the
plant in series and the linear parameters of the controller are adjusted using the least mean square algorithm by on-line
manner. The direct inverse control approach based on the fuzzy tree model is applied on the tracing control of the actuator
by simulation. The simulation results show the correctness of the approach.
Supported by the National Natural Science Foundation of China (Grant No. 60534020), the National Basic Research Program of
China (Grant No. G2002cb312205-04), the Research Fund for the Doctoral Program of Higher Education (Grant No. 20070006060),
and the Key Subject Foundation of Beijing (Grant Nos. XK100060526, XK100060422) 相似文献
2.
An optimal iterative learning control (ILC) strategy of improving endpoint products in semi-batch processes is presented by
combining a neural network model. Control affine feed-forward neural network (CAFNN) is proposed to build a model of semi-batch
process. The main advantage of CAFNN is to obtain analytically its gradient of endpoint products with respect to input. Therefore,
an optimal ILC law with direct error feedback is obtained explicitly, and the convergence of tracking error can be analyzed
theoretically. It has been proved that the tracking errors may converge to small values. The proposed modeling and control
strategy is illustrated on a simulated isothermal semi-batch reactor, and the results show that the endpoint products can
be improved gradually from batch to batch.
Supported by the National Natural Science Foundation of China (Grant Nos. 60404012, 60874049), the National High-Tech Research
& Development Program of China (Grant No. 2007AA041402), the New Star of Science and Technology of Beijing City (Grant No.
2006A62), and the IBM China Research Lab 2008 UR-Program 相似文献
3.
In this paper, a multivariable direct adaptive controller using multiple models without minimum phase assumption is presented
to improve the transient response when the parameters of the system jump abruptly. The controller is composed of multiple
fixed controller models, a free-running adaptive controller model and a re-initialized adaptive controller model. The fixed
controller models are derived from the corresponding fixed system models directly. The adaptive controller models adopt the
direct adaptive algorithm to reduce the design calculation. At every instant, the optimal controller is chosen out according
to the switching index. The interaction of the system is viewed as the measured disturbance which is eliminated by the choice
of the weighing polynomial matrix. The global convergence is obtained. Finally, several simulation examples in a wind tunnel
experiment are given to show both effectiveness and practicality of the proposed method. The significance of the proposed
method is that it is applicable to a non-minimum phase system, adopting direct adaptive algorithm to overcome the singularity
problem during the matrix calculation and realizing decoupling control for a multivariable system.
Supported by the National Natural Science Foundation of China (Grant Nos. 60504010, 60864004), the National High-Tech Research
and Development Program of China (Grant No. 2008AA04Z129), the Key Project of Chinese Ministry of Education (Grant No. 208071),
and the Natural Science Foundation of Jiangxi Province (Grant No. 0611006) 相似文献
4.
This paper investigates the problem of receding horizon state estimation for networked control systems (NCSs) with random
network-induced delays less than one sample period, which are formulated as multirate control systems. Based on a batch of
recent past slow rate measurements in a finite horizon window, the initial state estimation in this window is solved by minimizing
a receding-horizon objective function, and then the fast rate state estimations are calculated by the prediction of dynamic
equation to compensate for the network-induced time delays. Furthermore, convergence results and unbiasedness properties are
analyzed. An upper bound of estimation error is presented under the assumption of bounded disturbances acting on the system
and measurement equations. A simulation example shows the effectiveness of the proposed method.
Supported by the National Natural Science Foundation of China (Grant Nos. 60774015, 60674018, 60825302), the National High-Tech
Research & Development Program of China (Grant No. 2006AA04Z173), the Specialized Research Fund for the Doctoral Program of
Higher Education of China (Grant No. 20060248001), and partly by Shanghai Natural Science Foundation (Grant No. 07JC14016) 相似文献
5.
Moving object segmentation is one of the most challenging issues in computer vision. In this paper, we propose a new algorithm
for static camera foreground segmentation. It combines Gaussian mixture model (GMM) and active contours method, and produces
much better results than conventional background subtraction methods. It formulates foreground segmentation as an energy minimization
problem and minimizes the energy function using curve evolution method. Our algorithm integrates the GMM background model,
shadow elimination term and curve evolution edge stopping term into energy function. It achieves more accurate segmentation
than existing methods of the same type. Promising results on real images demonstrate the potential of the presented method.
Supported by National Basic Research Program of China (Grant No. 2006CB303105), the Chinese Ministry of Education Innovation
Team Fund Project (Grant No. IRT0707), the National Natural Science Foundation of China (Grant Nos. 60673109 and 60801053),
Beijing Excellent Doctoral Thesis Program (Grant No. YB20081000401), Beijing Municipal Natural Science Foundation (Grant No.
4082025), and Doctoral Foundation of China (Grant No. 20070004037) 相似文献
6.
New delay-dependent criterion for the stability of recurrent neural networks with time-varying delay
This paper is concerned with the global asymptotic stability of a class of recurrent neural networks with interval time-varying
delay. By constructing a suitable Lyapunov functional, a new criterion is established to ensure the global asymptotic stability
of the concerned neural networks, which can be expressed in the form of linear matrix inequality and independent of the size
of derivative of time varying delay. Two numerical examples show the effectiveness of the obtained results.
Supported by the National Natural Science Foundation of China (Grant Nos. 60534010, 60728307, 60774048, 60774093), the Program
for Cheung Kong Scholars and Innovative Research Groups of China (Grant No. 60521003) and the National High-Tech Research
& Development Program of China (Grant No. 2006AA04Z183), China Postdoctoral Sciencer Foundation (Grant No. 20080431150), and
the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 200801451096) 相似文献
7.
In this paper, the concept of globally exponentially attractive set is proposed and used to consider the ultimate bounds of the family of Lorenz systems with varying parameters. Explicit estimations of the ultimate bounds are derived. The results presented in this paper contain all the existing results as special cases. In particular, the critical cases, b→ 1^+ and a→0^+, for which the previous methods failed, have been solved using a unified formula. 相似文献
8.
9.
Ji Wang Senior Member CCF Xiao-Dong Ma Wei Dong Hou-Feng Xu and Wan-Wei Liu Member CCF 《计算机科学技术学报》2009,24(2):347-356
We present a demand-driven approach to memory leak detection algorithm based on flow- and context-sensitive pointer analysis.
The detection algorithm firstly assumes the presence of a memory leak at some program point and then runs a backward analysis
to see if this assumption can be disproved. Our algorithm computes the memory abstraction of programs based on points-to graph
resulting from flow- and context-sensitive pointer analysis. We have implemented the algorithm in the SUIF2 compiler infrastructure
and used the implementation to analyze a set of C benchmark programs. The experimental results show that the approach has
better precision with satisfied scalability as expected.
This work is supported by the National Natural Science Foundation of China under Grant Nos. 60725206, 60673118, and 90612009,
the National High-Tech Research and Development 863 Program of China under Grant No. 2006AA01Z429, the National Basic Research
973 Program of China under Grant No. 2005CB321802, the Program for New Century Excellent Talents in University under Grant
No. NCET-04-0996, and the Hunan Natural Science Foundation under Grant No. 07JJ1011. 相似文献
10.
Quality guaranteed aggregation based model predictive control and stability analysis 总被引:1,自引:0,他引:1
The input aggregation strategy can reduce the online computational burden of the model predictive controller. But generally
aggregation based MPC controller may lead to poor control quality. Therefore, a new concept, equivalent aggregation, is proposed
to guarantee the control quality of aggregation based MPC. From the general framework of input linear aggregation, the design
methods of equivalent aggregation are developed for unconstrained and terminal zero constrained MPC, which guarantee the actual
control inputs exactly to be equal to that of the original MPC. For constrained MPC, quasi-equivalent aggregation strategies
are also discussed, aiming to make the difference between the control inputs of aggregation based MPC and original MPC as
small as possible. The stability conditions are given for the quasi-equivalent aggregation based MPC as well.
Supported by the National Natural Science Foundation of China (Grant No. 60674041), and the Specialized Research Fund for
the Doctoral Program of Higher Education (Grant No. 20070248004) 相似文献
11.
Mobile device is an important interactive platform. Due to the limitation of computation, memory, display area and energy,
how to realize the efficient and real-time interaction of 3D models based on mobile devices is an important research topic.
Considering features of mobile devices, this paper adopts remote rendering mode and point models, and then, proposes a transmission
and rendering approach that could interact in real time. First, improved simplification algorithm based on MLS and display
resolution of mobile devices is proposed. Then, a hierarchy selection of point models and a QoS transmission control strategy
are given based on interest area of operator, interest degree of object in the virtual environment and rendering error. They
can save the energy consumption. Finally, the rendering and interaction of point models are completed on mobile devices. The
experiments show that our method is efficient.
Supported by the National Natural Science Foundation of China (Grant No. 60873159), the Program for New Century Excellent
Talents in University (Grant No. NCET-07-0039), the National High-Tech Research & Development Progrom of China (Grant No.
2006AA01Z333) 相似文献
12.
The highlight line model is a powerful tool in assessing the quality of a surface. It increases the flexibility of an interactive
design environment. In this paper, a method to generate a highlight line model on an arbitrary triangular mesh is presented.
Based on the highlight line model, a technique to remove local shape irregularities of a triangular mesh is then presented.
The shape modification is done by solving a minimization problem and performing an iterative procedure. The new technique
improves not only the shape quality of the mesh surface, but also the shape of the highlight line model. It provides an intuitive
and yet suitable method for locally optimizing the shape of a triangular mesh.
Supported by National Science Foundation of China (Grant Nos. 60533070, 60625202), National Basic Research Program of China
(Grant No. 2004CB719400), National High-Tech Research & Development Program of China (Grant No. 2007AA040401), Fok Ying Tung
Education Foundation (Grant No. 111070), National Science Foundation of USA (Grant Nos. DMI-0422126, DMS-0310645), and Kentucky
Science & Technology Corporation (Grant No. COMM-Fund-712) 相似文献
13.
IPv6 protocol plays an important role in the next generation of Internet (NGI). It is expected that the elegant coexistence of IPv4 and IPv6 is the key point of IPv6 transition. To solve the transition problem, we propose a mesh unicast framework and a multicast framework in this paper. We describe two reference models for the mesh unicast framework, and put forward two potential solutions for the multicast framework. A Linux-based prototype is implemented for IPv4 over IPv6 scenario and a test bed is deployed with 8 nodes on CERNET2. The deployment demon- strates the advantages of the framework. 相似文献
14.
This paper studies the power allocation problem for the non-orthogonal decode-and-forward (NDF) cooperation protocol with
selection relaying. With the availability of the magnitudes of all channel gains at the source, the power allocation is explored
that maximizes the mutual information between the source and destination subject to a total power constraint. The minimum
power that avoids the outage of the relay is set as a condition, under which the power allocation problem becomes one of selecting
the optimal one from several allocation factor triplets. It is shown that the power allocation scheme can provide considerable
performance gain, and the non-orthogonal cooperation protocol is superior to the orthogonal protocol and direct transmission.
Supported by the Project of Natural Science Foundation of Jiangsu Province (Grant No. BK2006701), the National Natural Science
Foundation of China (Grant No. 60672079), and the National High-Tech Research & Development Program of China (Grant No. 2007AA01Z267) 相似文献
15.
An ultra-massive distributed virtual environment generally consists of ultra-massive terrain data and a large quantity of
objects and their attribute data, such as 2D/3D geometric models, audio/video, images, vectors, characteristics, etc. In this
paper, we propose a novel method for constructing distributed scene graphs with high extensibility. Thismethod can support
high concurrent interaction of clients and implement various tasks such as editing, querying, accessing and motion controlling.
Some application experiments are performed to demonstrate its efficiency and soundness.
Supported by the National Basic Research Program of China (Grant No. 2004CB719403), the National High-Tech Research & Development
Program of China (Grant Nos. 2006AA01Z334, 2007AA01Z318, 2009AA01Z324), the National Natural Science Foundation of China (Grant
Nos. 60573151, 60703062, 60833007), and the Marine 908-03-01-10 Project 相似文献
16.
This paper presents the definition of multi-dimensional scalability of the Internet architecture, and puts forward a mathematical method to evaluate Internet scalability based on a variety of constraints. Then, the method is employed to study the Internet scalability problem in performance, scale and service scalability. Based on the examples, theoretical analysis and experimental simulation are conducted to address the scalability issue. The results show that the proposed definition and evaluation method of multi-dimensional Internet scalability can effectively evaluate the scalability of the Internet in every aspect, thus providing rational suggestions and methods for evaluation of the next generation Internet architecture. 相似文献
17.
Neural Network Algorithm for Designing FIR Filters Utilizing Frequency-Response Masking Technique 下载免费PDF全文
Xiao-Hua Wang 《计算机科学技术学报》2009,24(3):463-471
This paper presents a new joint optimization method for the design of sharp linear-phase finite-impulse response (FIR) digital filters which are synthesized by using basic and multistage frequency-response-masking(FRM) techniques.The method is based on a batch back-propagation neural network algorithm with a variable learning rate mode.We propose the following two-step optimization technique in order to reduce the complexity.At the first step,an initial FRM filter is designed by alternately optimizing th... 相似文献
18.
Yu-YueDu Chang-JunJiang 《计算机科学技术学报》2004,19(2):0-0
Temporal colored Petri nets, an extension of temporal Petri nets, are introduced in this paper. It can distinguish the personality of individuals (tokens), describe clearly the causal and temporal relationships betwee nevents in concurrent systems, and represent elegantly certain fundamental properties of concurrent systems, such as eventuality and fairness. The use of this method is illustrated with an example of modeling and formal verification of an online stock trading system. The functional correctness of the modeled system is formally verified based on the temporal colored Petri net model and temporal assertions. Also, some main properties of the system are analyzed. It has been demonstrated sufficiently that temporal colored Petri nets can verify efficiently some time-related properties of concurrent systems, and provide both the power of dynamic representation graphically and the function of logical inference formally. Finally. future work is described. 相似文献
19.
A novel algorithm for explicit optimal multi-degree reduction of triangular surfaces 总被引:1,自引:0,他引:1
This paper introduces the algebraic property of bivariate orthonormal Jacobi polynomials into geometric approximation. Based on the latest results on the transformation formulae between bivariate Bernstein polynomials and Jacobi polynomials, we naturally deduce a novel algorithm for multi-degree reduction of triangular B~zier surfaces. This algorithm possesses four characteristics: ability of error forecast, explicit expression, less time consumption, and best precision. That is, firstly, whether there exists a multi-degree reduced surface within a prescribed tolerance is judged beforehand; secondly, all the operations of multi-degree reduction are just to multiply the column vector generated by sorting the series of the control points of the original surface in lexicographic order by a matrix; thirdly, this matrix can be computed at one time and stored in an array before processing degree reduction; fourthly, the multi-degree reduced surface achieves an optimal approximation in the norm L2. Some numerical experiments are presented to validate the effectiveness of this algorithm, and to show that the algorithm is applicable to information processing of products in CAD system. 相似文献
20.
Reflective middleware opens up the implementation details of middleware platform and applications at runtime for improving the adaptability of middleware-based systems. However,such openness brings new challenges to access control of the middleware-based systems. Some users can access the system via reflective entities,which sometimes cannot be protected by access control mechanisms of traditional middleware. To deliver high adaptability securely,reflective middleware should be equipped with proper access control mechanisms for potential access control holes induced by reflection. One reason of integrating these mechanisms in reflective middleware is that one goal of reflective middleware is to equip applications with reflection capabilities as transparent as possible. This paper studies how to design a reflective J2EE middleware - PKUAS with access control in mind. At first,a computation model of reflective system is built to identify all possible access control points induced by reflection. Then a set of access control mechanisms,including the wrapper of MBeans and a hierarchy of Java class loaders,are equipped for controlling the identified access control points. These mechanisms together with J2EE access control mechanism form the access control framework for PKUAS. The paper evaluates the security and the performance overheads of the framework in quality and quantity. 相似文献