首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 234 毫秒
1.
A min-max model predictive control strategy is proposed for a class of constrained nonlinear system whose trajectories can be embedded within those of a bank of linear parameter varying (LPV) models. The embedding LPV models can yield much better approximation of the nonlinear system dynamics than a single LTV model. For each LPV model, a parameter-dependent Lyapunov function is introduced to obtain poly-quadratically stable control law and to guarantee the feasibility and stability of the original nonlinear system. This approach can greatly reduce computational burden in traditional nonlinear predictive control strategy. Finally a simulation example illustrating the strategy is presented. Supported by the National Natural Science Foundation of China (Grant Nos. 60774015, 60825302, 60674018), the National High-Tech Research & Development Program of China (Grant No. 2007AA041403), the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20060248001), and partly by Shanghai Natural Science Foundation (Grant No. 07JC14016)  相似文献   

2.
This paper is concerned with the global asymptotic stability of a class of recurrent neural networks with interval time-varying delay. By constructing a suitable Lyapunov functional, a new criterion is established to ensure the global asymptotic stability of the concerned neural networks, which can be expressed in the form of linear matrix inequality and independent of the size of derivative of time varying delay. Two numerical examples show the effectiveness of the obtained results. Supported by the National Natural Science Foundation of China (Grant Nos. 60534010, 60728307, 60774048, 60774093), the Program for Cheung Kong Scholars and Innovative Research Groups of China (Grant No. 60521003) and the National High-Tech Research & Development Program of China (Grant No. 2006AA04Z183), China Postdoctoral Sciencer Foundation (Grant No. 20080431150), and the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 200801451096)  相似文献   

3.
This paper investigates the problem of receding horizon state estimation for networked control systems (NCSs) with random network-induced delays less than one sample period, which are formulated as multirate control systems. Based on a batch of recent past slow rate measurements in a finite horizon window, the initial state estimation in this window is solved by minimizing a receding-horizon objective function, and then the fast rate state estimations are calculated by the prediction of dynamic equation to compensate for the network-induced time delays. Furthermore, convergence results and unbiasedness properties are analyzed. An upper bound of estimation error is presented under the assumption of bounded disturbances acting on the system and measurement equations. A simulation example shows the effectiveness of the proposed method. Supported by the National Natural Science Foundation of China (Grant Nos. 60774015, 60674018, 60825302), the National High-Tech Research & Development Program of China (Grant No. 2006AA04Z173), the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20060248001), and partly by Shanghai Natural Science Foundation (Grant No. 07JC14016)  相似文献   

4.
We address the problem of 3D human pose estimation in a single real scene image. Normally, 3D pose estimation from real image needs background subtraction to extract the appropriate features. We do not make such assumption. In this paper, a two-step approach is proposed, first, instead of applying background subtraction to get the segmentation of human, we combine the segmentation with human detection using an ISM-based detector. Then, silhouette feature can be extracted and 3D pose estimation is solved as a regression problem. RVMs and ridge regression method are applied to solve this problem. The results show the robustness and accuracy of our method. Supported by the National Basic Research Program of China (Grant No. 2006CB303103), and Key Program of the National Natural Science Foundation of China (Grant No. 60833009)  相似文献   

5.
A new modeling approach for nonlinear systems with rate-dependent hysteresis is proposed. The approach is used for the modeling of the giant magnetostrictive actuator, which has the rate-dependent nonlinear property. The models built are simpler than the existed approaches. Compared with the experiment result, the model built can well describe the hysteresis nonlinear of the actuator for input signals with complex frequency. An adaptive direct inverse control approach is proposed based on the fuzzy tree model and inverse learning and special learning that are used in neural network broadly. In this approach, the inverse model of the plant is identified to be the initial controller firstly. Then, the inverse model is connected with the plant in series and the linear parameters of the controller are adjusted using the least mean square algorithm by on-line manner. The direct inverse control approach based on the fuzzy tree model is applied on the tracing control of the actuator by simulation. The simulation results show the correctness of the approach. Supported by the National Natural Science Foundation of China (Grant No. 60534020), the National Basic Research Program of China (Grant No. G2002cb312205-04), the Research Fund for the Doctoral Program of Higher Education (Grant No. 20070006060), and the Key Subject Foundation of Beijing (Grant Nos. XK100060526, XK100060422)  相似文献   

6.
In this paper, a recursion is derived to compute the linear span of the p-ary cascaded GMW sequences. It is the first time to determine the linear span of the p-ary cascaded GMW sequence without any restriction on the parameters completely. Whereas, the known result on the p-ary cascaded GMW sequence with the specific parameters in the literature could be viewed as a special case of the new result. Supported by the National Natural Science Foundation of China (Grant No. 60302015), the Foundation for the Author of National Excellent Doctoral Dissertation of China (Grant No. 200341), and Sichuan Youth Science Foundation (Grant No. 04ZQ026-048)  相似文献   

7.
Globally exponentially attractive sets of the family of Lorenz systems   总被引:2,自引:0,他引:2  
In this paper, the concept of globally exponentially attractive set is proposed and used to consider the ultimate bounds of the family of Lorenz systems with varying parameters. Explicit estimations of the ultimate bounds are derived. The results presented in this paper contain all the existing results as special cases. In particular, the critical cases, b→ 1^+ and a→0^+, for which the previous methods failed, have been solved using a unified formula.  相似文献   

8.
This paper presents a new joint optimization method for the design of sharp linear-phase finite-impulse response (FIR) digital filters which are synthesized by using basic and multistage frequency-response-masking(FRM) techniques.The method is based on a batch back-propagation neural network algorithm with a variable learning rate mode.We propose the following two-step optimization technique in order to reduce the complexity.At the first step,an initial FRM filter is designed by alternately optimizing th...  相似文献   

9.
Video-based running water animation in Chinese painting style   总被引:3,自引:0,他引:3  
This paper presents a novel algorithm for synthesizing animations of running water,such as water-falls and rivers,in the style of Chinese paintings,for applications such as cartoon making. All video frames are first registered in a common coordinate system,simultaneously segmenting the water from background and computing optical flow of the water. Taking artists’ advice into account,we produce a painting structure to guide painting of brush strokes. Flow lines are placed in the water following an analysis of variance of optical flow,to cause strokes to be drawn where the water is flowing smoothly,rather than in turbulent areas: this allows a few moving strokes to depict the trends of the water flows. A variety of brush strokes is then drawn using a template determined from real Chinese paintings. The novel contributions of this paper are:a method for painting structure generation for flows in videos,and a method for stroke placement,with the necessary temporal coherence.  相似文献   

10.
A novel low-swing interface circuit for high-speed on-chip asynchronous interconnection is proposed in this paper. It takes a differential level-triggered latch to recover digital signal with ultra low-swing voltage less than 50 mV, and the driver part of the interface circuit is optimized for low power using the driver-array method, With a capacity to work up to 500 MHz, the proposed circuit, which is simulated and fabricated using SMIC 0.18-pm 1.8-V digital CMOS technology, consumes less power than previously reported designs.  相似文献   

11.
An optimal iterative learning control (ILC) strategy of improving endpoint products in semi-batch processes is presented by combining a neural network model. Control affine feed-forward neural network (CAFNN) is proposed to build a model of semi-batch process. The main advantage of CAFNN is to obtain analytically its gradient of endpoint products with respect to input. Therefore, an optimal ILC law with direct error feedback is obtained explicitly, and the convergence of tracking error can be analyzed theoretically. It has been proved that the tracking errors may converge to small values. The proposed modeling and control strategy is illustrated on a simulated isothermal semi-batch reactor, and the results show that the endpoint products can be improved gradually from batch to batch. Supported by the National Natural Science Foundation of China (Grant Nos. 60404012, 60874049), the National High-Tech Research & Development Program of China (Grant No. 2007AA041402), the New Star of Science and Technology of Beijing City (Grant No. 2006A62), and the IBM China Research Lab 2008 UR-Program  相似文献   

12.
This paper studies the power allocation problem for the non-orthogonal decode-and-forward (NDF) cooperation protocol with selection relaying. With the availability of the magnitudes of all channel gains at the source, the power allocation is explored that maximizes the mutual information between the source and destination subject to a total power constraint. The minimum power that avoids the outage of the relay is set as a condition, under which the power allocation problem becomes one of selecting the optimal one from several allocation factor triplets. It is shown that the power allocation scheme can provide considerable performance gain, and the non-orthogonal cooperation protocol is superior to the orthogonal protocol and direct transmission. Supported by the Project of Natural Science Foundation of Jiangsu Province (Grant No. BK2006701), the National Natural Science Foundation of China (Grant No. 60672079), and the National High-Tech Research & Development Program of China (Grant No. 2007AA01Z267)  相似文献   

13.
We present a demand-driven approach to memory leak detection algorithm based on flow- and context-sensitive pointer analysis. The detection algorithm firstly assumes the presence of a memory leak at some program point and then runs a backward analysis to see if this assumption can be disproved. Our algorithm computes the memory abstraction of programs based on points-to graph resulting from flow- and context-sensitive pointer analysis. We have implemented the algorithm in the SUIF2 compiler infrastructure and used the implementation to analyze a set of C benchmark programs. The experimental results show that the approach has better precision with satisfied scalability as expected. This work is supported by the National Natural Science Foundation of China under Grant Nos. 60725206, 60673118, and 90612009, the National High-Tech Research and Development 863 Program of China under Grant No. 2006AA01Z429, the National Basic Research 973 Program of China under Grant No. 2005CB321802, the Program for New Century Excellent Talents in University under Grant No. NCET-04-0996, and the Hunan Natural Science Foundation under Grant No. 07JJ1011.  相似文献   

14.
QoS supported MAC mechanism is a key issue for supporting QoS in wireless ad hoc networks. A new backoff algorithm, named RWBO+BEB, was proposed previ- ously to decrease the packet collision probability significantly. In this paper, it is explored how to make RWBO+BEB support service differentiation in wireless ad hoc networks, and a novel proportional service differentiation algorithm, named p-RWBO, is proposed to allocate the wireless bandwidth according to the band- width ratio of each station. In p-RWBO, station n's walking probability (Pw,n) is selected according to its allocated bandwidth ratio. An analytical model is proposed to analyze how to choose Pw, n according to the bandwidth ratios of station n. The simulation results indicate that p-RWBO can differentiate services in terms of both bandwidth and delay.  相似文献   

15.
16.
The highlight line model is a powerful tool in assessing the quality of a surface. It increases the flexibility of an interactive design environment. In this paper, a method to generate a highlight line model on an arbitrary triangular mesh is presented. Based on the highlight line model, a technique to remove local shape irregularities of a triangular mesh is then presented. The shape modification is done by solving a minimization problem and performing an iterative procedure. The new technique improves not only the shape quality of the mesh surface, but also the shape of the highlight line model. It provides an intuitive and yet suitable method for locally optimizing the shape of a triangular mesh. Supported by National Science Foundation of China (Grant Nos. 60533070, 60625202), National Basic Research Program of China (Grant No. 2004CB719400), National High-Tech Research & Development Program of China (Grant No. 2007AA040401), Fok Ying Tung Education Foundation (Grant No. 111070), National Science Foundation of USA (Grant Nos. DMI-0422126, DMS-0310645), and Kentucky Science & Technology Corporation (Grant No. COMM-Fund-712)  相似文献   

17.
An iterative identification and control design method based on υ-gap is given to ensure the stability of closed-loop system and control performance improvement. The whole iterative procedure includes three parts: the optimal excitation signals design, the uncertainty model set identification and the stable controller design. Firstly the worst case υ-gap is used as the criterion of the optimal excitation signals design, and the design is performed via the power spectrum optimization. And then, an uncertainty model set is attained by system identification on the basis of the measure signals. The controller is designed to ensure the stability of closed-loop system and the closed-loop performance improvement. Simulation result shows that the proposed method has good convergence and closed-loop control performance. Supported by the National Natural Science Foundation of China (Grant Nos. 60574055, 60874073), the Specialized Research Fund for Doctoral Program of Higher Education of China (Grant No. 20050056037), and the Tianjin Science and Technology Keystone Project (Grant No. 08ZCKFJC27900)  相似文献   

18.
Oversampling is widely used in practical applications of digital signal processing. As the fractional Fourier transform has been developed and applied in signal processing fields, it is necessary to consider the oversampling theorem in the fractional Fourier domain. In this paper, the oversampling theorem in the fractional Fourier domain is analyzed. The fractional Fourier spectral relation between the original oversampled sequence and its subsequences is derived first, and then the expression for exact reconstruction of the missing samples in terms of the subsequences is obtained. Moreover, by taking a chirp signal as an example, it is shown that, reconstruction of the missing samples in the oversampled signal is suitable in the fractional Fourier domain for the signal whose time-frequency distribution has the minimum support in the fractional Fourier domain. Supported partially by the National Natural Science Foundation of China for Distinguished Young Scholars (Grant No. 60625104), the National Natural Science Foundation of China (Grant Nos. 60890072, 60572094), and the National Basic Research Program of China (Grant No. 2009CB724003)  相似文献   

19.
Branch query processing is a core operation of XML query processing. In recent years, a number of stack based twig join algorithms have been proposed to process twig queries based on tag stream index. However, in tag stream index, each element is labeled separately without considering the similarity among elements. Besides, algorithms based on tag stream index perform inefficiently on large document. This paper proposes a novel index, named Clustered Chain Path Index, based on a novel labeling scheme. This index provides efficient support for processing branch queries. It also has the same cardinality as 1-index against tree structured XML document. Based on CCPI, efficient algorithms, KMP-Match-Path and Related-Path-Segment-Join, are proposed to process queries efficiently. Analysis and experimental results show that proposed query processing algorithms based on CCPI outperform other algorithms and have good scalability. This paper is partially supported by Natural Science Foundation of Heilongjiang Province, Grant No. zjg03-05 and National Natural Science Foundation of China, Grant No. 60473075 and Key Program of the National Natural Science Foundation of China, Grant No. 60533110.  相似文献   

20.
IETF softwire unicast and multicast framework for IPv6 transition   总被引:2,自引:0,他引:2  
IPv6 protocol plays an important role in the next generation of Internet (NGI). It is expected that the elegant coexistence of IPv4 and IPv6 is the key point of IPv6 transition. To solve the transition problem, we propose a mesh unicast framework and a multicast framework in this paper. We describe two reference models for the mesh unicast framework, and put forward two potential solutions for the multicast framework. A Linux-based prototype is implemented for IPv4 over IPv6 scenario and a test bed is deployed with 8 nodes on CERNET2. The deployment demon- strates the advantages of the framework.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号