首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 55 毫秒
1.
具有通信约束的网络化控制系统容错控制研究   总被引:3,自引:0,他引:3  
Implementing a control system over a communication network induces inevitable time delays that may degrade performance and even cause instability. One of the most effective ways to reduce the negative effect of delays on the performance of networked control system (NCS) is to reduce network traffic. In this paper, adjustable deadbands are explored as a solution to reduce network traffic in NCS. A method of fault-tolerant control of networked control system is presented, which takes into account system response as well as network traffic. The integrity design for a kind of NCS with sensor failures and actuator failures is analyzed based on robust fault-tolerant control theory and information scheduling. After detailed theoretical analysis, the paper also provides the simulation results, which further validate the proposed scheme.  相似文献   

2.
Urban traffic congestion propagation and bottleneck identification   总被引:2,自引:0,他引:2  
Bottlenecks in urban traffic network are sticking points in restricting network collectivity traffic efficiency. To identify network bottlenecks effectively is a foundational work for improving network traffic condition and preventing traffic congestion. In this paper, a congestion propagation model of urban network traffic is proposed based on the cell transmission model (CTM). The proposed model includes a link model, which describes flow propagation on links, and a node model, which represents link-to-link flow propagation. A new method of estimating average journey velocity (AJV) of both link and network is developed to identify network congestion bottlenecks. A numerical example is studied in Sioux Falls urban traffic network. The proposed model is employed in simulating network traffic propagation and congestion bottleneck identification under different traffic demands. The simulation results show that continual increase of traffic demand is an immediate factor in network congestion bottleneck emergence and increase as well as reducing network collectivity capability. Whether a particular link will become a bottleneck is mainly determined by its position in network, its traffic flow (attributed to different OD pairs) component, and network traffic demand.  相似文献   

3.
动态交通分配与信号控制的组合模型及算法研究   总被引:7,自引:0,他引:7  
This paper presents a generalized bi-level programming model of combined dynamic traffic assignment and traffic signal control, and especially analyzes a procedure for determining the equilibrium queuing delays on saturated links for dynamic network signal control satisfying the FIFO (first-in-first-out) rule. The chaotic optimal algorithm proposed in this paper can not only present the optimal signal settings, but also calculate, at each interval, the link inflow rates and outflow rates for the dynamic user optimal problem, and provide real-time information for the travelers. Finally, a numerical example is given to illustrate the application of the proposed model and solution algorithm, and comparison shows that this model has better system performance.  相似文献   

4.
Research on Combined Dynamic Traffic Assignment and Signal Control   总被引:2,自引:0,他引:2  
This paper presents a generalized bi-level programming model of combined dynamic traffic assignment and traffic signal control,and especially analyzes a procedure for determining the equilibrium queuing delays on saturated links for dynamic network signal control satisfying the FIFO (first-in-first-out)rule.The chaotic optimal algorithm proposed in this paper can not only present the optimal signal settings,but also calculate,at each interval,the link inflow rates and outflow rates for the dynamic user optimal problem,and provide real-time information for the travelers.Finally,a numerical example is given to illustrate the application of the proposed model and solution algorithm, and comparison shows that this model has better system performance.  相似文献   

5.
This paper discusses the dynamic behavior and its predictions for a simulated traffic flow based on the nonlinear response of a vehicle to the leading car’s movement in a single lane. Traffic chaos is a promising field ,and chaos theory has been applied to identify and predict its chaotic movement . A simulated traffic flow is generated using a car-following model (GM model) , and the distance between two cars is investigated for its dynamic properties. A positive Lyapunov exponent confirms the existence of chaotic behavior in the GM model. A new algorithm using a RBF NN (radial basis function neural network) is proposed to predict this traffic chaos. The experiment shows that the chaotic degree and predictable degree are determined by the first Lyapunov exponent . The algorithm proposed in this paper can be generalized to recognize and predict the chaos of short- time traffic flow series.  相似文献   

6.
This paper discusses the dynamic behavior and its predictions for a simulated traffic flow based on the nonlinear response of a vehicle to the leading car's movement in a single lane. Traffic chaos is a promising field, and chaos theory has been applied to identify and predict its chaotic movement. A simulated traffic flow is generated using a car-following model( GM model), and the distance between two cars is investigated for its dynamic properties. A positive Lyapunov exponent confirms the existence of chaotic behavior in the GM model. A new algorithm using a RBF NN (radial basis function neural network) is proposed to predict this traffic chaos. The experiment shows that the chaotic degree and predictable degree are determined by the first Lyapunov exponent. The algorithm proposed in this paper can be generalized to recognize and predict the chaos of short-time traffic flow series  相似文献   

7.
Access control policy in wireless networks has a significant impact on QoS satisfaction and resource utilization efficiency. The design of access control policy in heterogeneous wireless networks (HWNs) becomes more challenging especially for the heterogeneous multiple access protocols of each radio network. In this paper, a Markov model is proposed to analyze the performance of three access control policies for HWNs. The first policy is the optimal radio access technology (O-RAT) selection, where the incoming traffic always tries to access one network with the maximum service rate before admission. The second policy intends to allocate the same data to all networks. And the traffic will leave the system if it is accomplished first by one of these networks, which is formulated as the aggregated multi-radio access (A-MRA) technology. The third policy is named the parallel multi-radio access (P-MRA) transmission, in which the incoming traffic is split into different networks. The traffic is served with the sum of the service rates provided by overall networks. Numerical and simulate results show the effectiveness of our analytical framework and the performance gain of the three access control policies. As illustrated with some representative results, the P-MRA policy shows superior performance gain to the other two policies independent on the specific parameters of the different multiple access protocols due to the multiplexing gain.  相似文献   

8.
Evolving networks: from topology to dynamics   总被引:2,自引:0,他引:2  
A multi-local-world model is introduced to describe the evolving networks that have a localization property such as the Intemet. Based on this model, we show that the traffic load defined by “betweenness centrality” on the multi-local-world scale-flee networks‘ model also follows a power law form. In this kind of network, a few vertices have heavier loads and so play more important roles than the others in the network.  相似文献   

9.
Despite the growing number of works centering around the traffic dynamics on complex networks,these researches still have some common shortcomings,e.g.,too simple traffic flow model and lack of considerations for the designing cost and scalability issues.This paper builds on a more realistic traffic flow model,and offers a holistic view on the network designing problem.In addition to the extensively studied transmission capacity,this paper takes designing cost and scalability as two other designing objectives,and presents a quantitative study of how different designing choices independently and collectively influence these objectives by the introduction of a cartesian coordinate system.It is shown that different kinds of network topologies display different shapes of achievable solution spaces and exhibit different abilities to achieve cost-effective and scalable designing.In particular,we find the philosophy underlying empirical network designing and engineering today fails to meet the cost-effective and scalable designing requirements,and propose a cost-effective and scalable designing scheme for BA-like networks,i.e.,the efficient routing combined with effective betweenness based link bandwidth allocation.In addition,when designing a thoroughly new network from the beginning,we find that ER network is a good candidate to achieve cost-effective and scalable designing in most settings.  相似文献   

10.
This paper presents an analysis of the impact of competing traffic on the control channel on the performance of applications like CCA (chain collision avoidance). These vehicular network's applications are addressed to traffic safety aiming chain collision avoidance. This work shows the impact of signaling messages of other applications (in the control channel) in the CCA application's performance. The results were carried out considering since an ideal scenario (without concurrent traffic) until a scenario with high utilization level of control channel. Besides, the impact of the transmission power in the CCA applications is also evaluated.  相似文献   

11.
European Community policy and the market   总被引:1,自引:0,他引:1  
Abstract This paper starts with some reflections on the policy considerations and priorities which are shaping European Commission (EC) research programmes. Then it attempts to position the current projects which seek to capitalise on information and communications technologies for learning in relation to these priorities and the apparent realities of the marketplace. It concludes that while there are grounds to be optimistic about the contribution EC programmes can make to the efficiency and standard of education and training, they are still too technology driven.  相似文献   

12.
融合集成方法已经广泛应用在模式识别领域,然而一些基分类器实时性能稳定性较差,导致多分类器融合性能差,针对上述问题本文提出了一种新的基于多分类器的子融合集成分类器系统。该方法考虑在度量层融合层次之上通过对各类基多分类器进行动态选择,票数最多的类别作为融合系统中对特征向量识别的类别,构成一种新的自适应子融合集成分类器方法。实验表明,该方法比传统的分类器以及分类融合方法识别准确率明显更高,具有更好的鲁棒性。  相似文献   

13.
《计算机科学》2007,34(4):148-148
Recent years have seen rapid advances in various grid-related technologies, middleware, and applications. The GCC conference has become one of the largest scientific events worldwide in grid and cooperative computing. The 6th international conference on grid and cooperative computing (GCC2007) Sponsored by China Computer Federation (CCF),Institute of Computing Technology, Chinese Academy of Sciences (ICT) and Xinjiang University ,and in Cooperation with IEEE Computer Soceity ,is to be held from August 16 to 18, 2007 in Urumchi, Xinjiang, China.  相似文献   

14.
本文分析了法律数据库的结构和特点,介绍了采用面向对象设计方法和超文本数据库技术开发和实现法律信息库系统将作为重要网络资源之一为不同用户进行法律咨询服务。  相似文献   

15.
Although there are many arguments that logic is an appropriate tool for artificial intelligence, there has been a perceived problem with the monotonicity of classical logic. This paper elaborates on the idea that reasoning should be viewed as theory formation where logic tells us the consequences of our assumptions. The two activities of predicting what is expected to be true and explaining observations are considered in a simple theory formation framework. Properties of each activity are discussed, along with a number of proposals as to what should be predicted or accepted as reasonable explanations. An architecture is proposed to combine explanation and prediction into one coherent framework. Algorithms used to implement the system as well as examples from a running implementation are given.  相似文献   

16.
This paper provides the author's personal views and perspectives on software process improvement. Starting with his first work on technology assessment in IBM over 20 years ago, Watts Humphrey describes the process improvement work he has been directly involved in. This includes the development of the early process assessment methods, the original design of the CMM, and the introduction of the Personal Software Process (PSP)SM and Team Software Process (TSP){SM}. In addition to describing the original motivation for this work, the author also reviews many of the problems he and his associates encountered and why they solved them the way they did. He also comments on the outstanding issues and likely directions for future work. Finally, this work has built on the experiences and contributions of many people. Mr. Humphrey only describes work that he was personally involved in and he names many of the key contributors. However, so many people have been involved in this work that a full list of the important participants would be impractical.  相似文献   

17.
18.
19.
正SCIENCE CHINA Information Sciences(Sci China Inf Sci),cosponsored by the Chinese Academy of Sciences and the National Natural Science Foundation of China,and published by Science China Press,is committed to publishing highquality,original results of both basic and applied research in all areas of information sciences,including computer science and technology;systems science,control science and engineering(published in Issues with odd numbers);information and communication engineering;electronic science and technology(published in Issues with even numbers).Sci China Inf Sci is published monthly in both print and electronic forms.It is indexed by Academic OneFile,Astrophysics Data System(ADS),CSA,Cabells,Current Contents/Engineering,Computing and Technology,DBLP,Digital Mathematics Registry,Earthquake Engineering Abstracts,Engineering Index,Engineered Materials Abstracts,Gale,Google,INSPEC,Journal Citation Reports/Science Edition,Mathematical Reviews,OCLC,ProQuest,SCOPUS,Science Citation Index Expanded,Summon by Serial Solutions,VINITI,Zentralblatt MATH.  相似文献   

20.
正Erratum to:J Zhejiang Univ-Sci C(ComputElectron)2014 15(7):551-563doi:10.1631/jzus.C1300320The original version of this article unfortunately contained mistakes.Algorithm 6 should be as follows:Algorithm 6 FGKFCM-F clustering Input:(1)X={x_1,x_2,…,x_N},,x_iR~d,i=1,2,…,N,the dataset;(2)C,1C≤N,the number of clusters;(3)ε0,the stopping criterion;  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号