首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
2.
In the paper, excess methods for improving the reliability of multi-state series-parallel systems are presented: for the hot reserve of single components, the cold reserve of single components, and the mixed (hot and cold) reserve of single components. A process is also introduced to improve the reliability of these methods by replacing their components with more reliable ones. New theorems for multi-state limit reliability functions in homogeneous and non-homogeneous series-parallel large systems composed of components with improved reliability are presented, and applied to compare the effects of these systems in different reliability improving methods.  相似文献   

3.
Algorithms for automatically selecting a scalar or locally varying regularization parameter for total variation models with an \(L^{\tau }\)-data fidelity term, \(\tau \in \{1,2\}\), are presented. The automated selection of the regularization parameter is based on the discrepancy principle, whereby in each iteration a total variation model has to be minimized. In the case of a locally varying parameter, this amounts to solve a multiscale total variation minimization problem. For solving the constituted multiscale total variation model, convergent first- and second-order methods are introduced and analyzed. Numerical experiments for image denoising and image deblurring show the efficiency, the competitiveness, and the performance of the proposed fully automated scalar and locally varying parameter selection algorithms.  相似文献   

4.
Methods are proposed for computer investigation of properties of systems of ordinary differential equations. Based on these methods, algorithms are created for computation of the value of the integration step that provides the stability of a numerical method and obtaining its results with a preassigned accuracy. The components and modes of operation of an intelligent software tool supporting the proposed methods are presented.  相似文献   

5.
The performance and dependability evaluation of complex systems by means of dynamic stochastic models (e.g. Markov chains) may be impaired by the combinatorial explosion of their state space. Among the possible methods to cope with this problem, symmetry-based ones can be applied to systems including several similar components. Often however these systems are only partially symmetric: their behavior is in general symmetric except for some local situation when the similar components need to be differentiated.In this paper two methods to efficiently analyze partially symmetrical models are presented in a general setting and the requirements for their efficient implementation are discussed. Some case studies are presented to show the methods’ effectiveness and their applicative interest.  相似文献   

6.
Finite Element Tearing and Interconnecting (FETI) methods are a family of nonoverlapping domain decomposition methods which have been proven to be robust and parallel scalable for a variety of elliptic partial differential equations. Here, an introduction to the classical onelevel FETI methods is given, as well as to the more recent dual-primal FETI methods and some of their variants. With the advent of modern parallel computers with thousands of processors, certain inexact components are needed in these methods to maintain scalability. An introduction to a recent class of inexact dual-primal FETI methods is presented. Scalability results for an elasticity problem using 65 536 processor cores of the JUGENE supercomputer at Forschungszentrum Jülich show the potential of these methods. A hyperelastic problem from biomechanics is presented as an application of the methods to nonlinear finite element analysis.  相似文献   

7.
A method for the decomposition of single-channel unaveraged magnetoencephalographic (MEG) data into statistically independent components is presented. The study of MEG recordings is characterised by a host of difficulties, most of which stem from the inherently noisy recording process by which the data is obtained. MEG time series typically contain a mix of artifactual components from a variety of sources, and the isolation of interesting signals from this noise background poses a difficult problem. In this article, we present a novel approach combining the techniques of independent component analysis (ICA) and dynamical embedding, which can be used to extract and isolate components of interest from single-channel unaveraged MEG data. In our approach, the method of delays is proposed as a means of augmenting the single-channel data, thus, facilitating the application of ICA. Finally, because the single-channel approach yields no information regarding the physiological origins of extracted sources, we discuss a method by which extracted sources may be projected back into the multichannel measurement space, permitting an estimate of the respective spatial distributions to be obtained. The proposed methods are tested on three separate MEG channels and the results are presented and discussed.  相似文献   

8.
提高PLC程序运行速度的几种编程方法   总被引:2,自引:1,他引:2  
陈冠玲  吴小滔 《自动化仪表》2005,26(8):61-62,65
以三菱FX2系列PLC为例,介绍了用数据传送给位元件组的方法来控制输出、巧用脉冲输出指令及善用子程序等几种能够提高PLC程序运行速度的方法。实践证明,这几种编程方法是行之有效的。  相似文献   

9.
WEB上存在着大量数据,为了有效地利用这些数据,必须把它们从WEB页面中获取出来存放到数据库中.本文首先介绍了WEB环境下数据获取的相关概念与技术,基于此,提出了一种基于XML的WEB数据获取系统结构,讨论了它的主要组成.最后,给出了系统的实现方法.  相似文献   

10.
Singular 2-optimization problems are considered for the standard discrete-time control system. Two types of singularity (type I and type II) are distinguished. A detailed treatment of problems with singularity of type II, which leads to nonuniqueness of solution, is presented. New algorithms for design of optimal controllers are presented both in frequency domain and state space, which generalize standard procedures onto the case of singular 2-problems. A parameterization of the set of optimal controllers is given.Translated from Avtomatika i Telemekhanika, No. 3, 2005, pp. 20–33.Original Russian Text Copyright © 2005 by Polyakov.This paper was recommended for publication by B.T. Polyak, a member of the Editorial Board  相似文献   

11.
Eigenpaxels and a neural-network approach to image classification   总被引:1,自引:0,他引:1  
A expansion encoding approach to image classification is presented. Localized principal components or "eigenpaxels" are used as a set of basis functions to represent images. That is, principal-component analysis is applied locally rather than on the entire image. The "eigenpaxels" are statistically determined using a database of the images of interest. Classification based on visual similarity is achieved through the use of a single-layer error-correcting neural network. Expansion encoding and the technique of subsampling are key elements in the processing stages of the eigenpaxel algorithm. Tested using a database of frontal face images consisting of 40 individuals, the algorithm exhibits equivalent performance to other comparable but more cumbersome methods. In addition, the technique is shown to be robust to various types of image noise.  相似文献   

12.
Birge  R.R. 《Computer》1992,25(11):56-67
The current and potential uses of bacteriorhodopsin in optical computing and memory devices are reviewed. The protein has significant potential for use in these applications due to unique intrinsic photophysical properties, and the range of chemical and genetic methods available for optimizing performance for specific application environments. The intrinsic properties of the native bacteriorhodopsin protein are described. The applications of bacteriorhodopsin in spatial light modulators, integral components in a majority of one-dimensional and two-dimensional optical processing environments, and holographic associative memories are presented  相似文献   

13.
用于微器件装配的微操作系统   总被引:1,自引:0,他引:1  
郑巍  徐毓娴  李庆祥 《机器人》1999,21(1):12-15
微器件装配技术是微机械的关键技术之一,本文从微 器件装配系统的特性和功能出发,提出了一套用于微装配的微操作系统设计方案,并对系统 各个组成部分进行分析,介绍了系统实现的方法.  相似文献   

14.
Tractor–trailer systems as multibody modular robotic systems have been widely used to increase load transportation capacity. Control of these systems started from motion aid facilities in human-driven vehicles to fully autonomous mobile robots in recent years. The mobility of these systems is restricted due to the presence of nonholonomic constraints of wheels and also to the system severe underactuated nature. Several control problems are under research for autonomous navigation of such systems. Trajectory tracking is one of the main problems in the context of autonomous nonholonomic systems. In this paper, dynamic modeling and control of a car with \(n\) trailers have been developed. First, a dynamic model of the system is obtained. Next, an output feedback kinematic controller and a feedback linearization kinetic controller have been used for tracking control of the system. Finally, experimental results are presented to show the merits of the proposed method.  相似文献   

15.
Informative experiments are identification experiments which contain sufficient information for an identification algorithm to discriminate between different models in an intended model set. In this paper, a particular set of identification algorithms, namely subspace based identification, is considered. Criteria for experiments to be informative with these methods in the deterministic setup and the combined deterministic-stochastic setup are presented. It is pointed out that if these criteria are not satisfied, interesting phenomena, in which perfect cancellations of the deterministic components and the stochastic components occur in a subspace projection, may occur. It is further shown that such cancellations can indeed be avoided under mild conditions.  相似文献   

16.
基于接口匹配的构件组装   总被引:8,自引:0,他引:8  
张驰 《计算机应用》2007,27(6):1420-1422
基于构件的软件开发(CBSD)以软件体系结构为蓝图,通过可复用构件的组装构建高质量大规模应用系统。如何找到合用的可复用构件以及怎样在体系结构指导下进行构件的组装是CBSD的关键环节。研究了构件匹配的基本原理和理论基础,在此基础上分析了基于软件构件组装的系统开发技术并给出了对候选构件进行组合的配置算法。  相似文献   

17.
Fast LH$$*$$     
Linear Hashing is an efficient and widely used version of extendible hashing. LH\(*\) is its distributed version that stores key-value pairs on up to hundreds of thousands of sites in a distributed system. LH\(*\) implements the dictionary data structure efficiently by not using a central component and allows the key-based operations of insertion, deletion, actualization, and retrieval as well as the scan operation. Because it does not use a central addressing component, clients or servers in LH\(*\) can commit an addressing error by sending a request to a wrong server. This server then forwards the message to the correct server either directly or in one but never more than one additional forward operation. We discuss here methods to avoid this double forward, which, while rare, still might breach quality of service guarantees. We compare our methods with \(\mathrm{LH}*_{\mathrm{RS}^{\mathrm{\tiny P2P}}}\) that pushes information about changes in the file structure to clients, whether they are active or not. A second problem especially relevant in high churn environments such as modern data centers is that sites can suddenly become inaccessible. The various high and scalable reliability versions of LH\(*\) then reconstruct the data lost on this site elsewhere. We present a solution to the resulting “wandering bucket” problem that allows clients to find the data at their new location.  相似文献   

18.
This paper presents a mobile network privacy architecture (MNPA) that enables the provision of very strong user privacy against external and internal threats within mobile networks. The MNPA extends the mobile networking model with two new components. The first, privacy routing capability, enables untraceable communications between hosts. The second, privacy token issuing authority, is a third party application that manages the flow of MNPA user authorisation tokens in the system. The operations of these two components are detailed.

We follow this by demonstrating how these components can be used to implement protocols for privacy enhanced network operations. New secure methods for location registration, remote host communication and billing are presented. We finish with a discussion of issues of collusion and trust within the architecture and look briefly at public key infrastructure requirements.  相似文献   


19.
Tensor systems involving tensor-vector products (or polynomial systems) are considered. We solve these tensor systems, especially focusing on symmetric \({\mathcal {M}}\)-tensor systems, by some tensor methods. A new tensor method is proposed based on the rank-1 approximation of the coefficient tensor. Numerical examples show that the tensor methods could be more efficient than the Newton method for some \({\mathcal {M}}\)-tensor systems.  相似文献   

20.
段揚澤 《自动化学报》1964,2(4):219-230
指命发生器及逻辑控制部件,常常是工业无触点程序控制系统(或静止开关控制系统)中的主要组成部分.通过工业试验的验证,本文介绍了利用无触点元件设计这两个部件的方法,并且提出了一些工业实用的新线路.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号