首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
《Automatica》1985,21(2):117-128
A survey of the field of optimal sensors and/or controllers location for dynamical distributed parameter systems modelled by partial differential equations is presented. The recent contributions in this field are grouped according to the main goal for which the location problem is developed, namely: system identification, state estimation, and optimal control. In order to pose the sensors and controllers location problem, the semigroup approach for modelling distributed linear systems is briefly reviewed together with its equivalent (infinite dimensional) and approximate (finite dimensional) Fourier expansion representations. After presenting a concise general review of the several methods considered in the current literature, a classification of methods is also proposed. The main classifying factor concerns the use of N-modal approximation schemes, and the different stages of the optimization procedure in which they are required.  相似文献   

2.
Since PROLOG has been chosen as the Fifth Generation Computer's Kernal Language,it ispresently one of the hottest topics among computer scientists all over the world.Recently,theimplementation technique and the application of PROLOG have been developed rapidly.In thispaper,a new implementation scheme for PROLOG is proposed.The scheme is based on thesubstitution of instantiated veriable values.It has many advantages,such as a higher runningspeed,less main memory requirement,and easier to be implemented.The scheme has beenimplemented by the authors on IBM4341.  相似文献   

3.
4.
《Automatica》1987,23(4):425-435
A survey of robustness of nonlinear state feedback is given. For series perturbations there are fairly complete results, showing that under mild restrictions an optimal controller can tolerate an infinite increase in gain. For gain reductions there are some results for systems linear in the control. In particular there is a 50% reduction tolerance if the control penalty is quadratic. Usually the optimal controller cannot be computed exactly. There are some results showing the effects of truncation on the robustness. Essentially robustness is maintained but in a reduced (computable) part of the state space.  相似文献   

5.
We present an overview of the most important methods that decompose an arbitrary binary object into a union of rectangles. We describe a run-length encoding and its generalization, decompositions based on quadtrees, on mathematical morphology, on the distance transform, and a theoretically optimal decomposition based on a maximal matching in bipartite graphs. We compare their performance in image compression, in moment computation and in linear filtering. We show that the choice is always a compromise between the complexity and time/memory consumption. We give advice how to select an appropriate method in particular cases.  相似文献   

6.
In this paper,a new parallel logic programming language——HPARLOG developed by usis described,and a new scheme for the AND-parallelism implementation in logic programminglanguage is proposed.This scheme not only resolves the instantiation conflict on sharing-variables,thoroughly explores the parallelism of the programs with incrementally constructeddata structure,but also decreases the dynamic complexity of the programs.In addition,apscudo-copy based memory management scheme to enhance the locality of goal processes andlower the overhead of program execution is proposed.  相似文献   

7.
A practical fuzzy controllers scheme of overhead crane   总被引:2,自引:0,他引:2  
1IntroductionThe overhead crane systemis widely usedinindustryformoving heavy cargos .Thus anti_sway and position controlhave become the requirements as a core technology forautomated crane systemthat are capable of flexible spatialautomatic conveyance .The purpose of crane control is to reduce the swing ofthe load while movingthe trolleyto the desired position asfast as possible .However ,the overhead crane has seriousproblems :the crane acceleration,required for motion,always induces undesir…  相似文献   

8.
《Automatica》1986,22(1):1-19
Alternating current machines, in particular induction motors, are of simple mechanical construction but have a nonlinear, highly interacting multivariable control structure. This has made it difficult in the past to design controlled ac-drives with high dynamic performance, similar to converter-fed dcdrives. A satisfactory solution of this problem has not been available until Blaschke formulated the principle of field orientation, where the machine is controlled in a moving frame of reference. This paper presents a survey of controlling acmachines for use in high dynamic performance drives including different types of machines and converters with their specific control characteristics. It is shown that by combining a suitable machine model with the principle of rotor- or field-orientation a unifying basis for the design of ac-drives is created. The complicated signal structure of the control systems can very effectively be handled by microelectronics, i.e. by using software instead of elaborate hardware. This is shown in the paper with the help of examples.  相似文献   

9.
A procedure is given to synthesize linear digital controllers for uniformly observable linear time-varying discrete data systems where some of the state variables are not available for feedback. Dead-beat observer theory is used and the controller generates the exact optimal control law in at most q?1 sampling periods, where q is the observability index of the system.  相似文献   

10.
Recent advances in both anthropomorphic robots and bimanual industrial manipulators had led to an increased interest in the specific problems pertaining to dual arm manipulation. For the future, we foresee robots performing human-like tasks in both domestic and industrial settings. It is therefore natural to study specifics of dual arm manipulation in humans and methods for using the resulting knowledge in robot control. The related scientific problems range from low-level control to high level task planning and execution. This review aims to summarize the current state of the art from the heterogenous range of fields that study the different aspects of these problems specifically in dual arm manipulation.  相似文献   

11.
Intelligent visual surveillance — A survey   总被引:3,自引:0,他引:3  
Detection, tracking, and understanding of moving objects of interest in dynamic scenes have been active research areas in computer vision over the past decades. Intelligent visual surveillance (IVS) refers to an automated visual monitoring process that involves analysis and interpretation of object behaviors, as well as object detection and tracking, to understand the visual events of the scene. Main tasks of IVS include scene interpretation and wide area surveillance control. Scene interpretation aims at detecting and tracking moving objects in an image sequence and understanding their behaviors. In wide area surveillance control task, multiple cameras or agents are controlled in a cooperative manner to monitor tagged objects in motion. This paper reviews recent advances and future research directions of these tasks. This article consists of two parts: The first part surveys image enhancement, moving object detection and tracking, and motion behavior understanding. The second part reviews wide-area surveillance techniques based on the fusion of multiple visual sensors, camera calibration and cooperative camera systems.  相似文献   

12.
This paper is a survey of structural shape optimization with an emphasis on techniques dealing with shape optimization of the boundaries of two- and three-dimensional bodies. Attention is focused on the special problems of structural shape optimization which are due to a finite element model which must change during the optimization process. These problems include the requirement for sophisticated automated mesh generation techniques and careful choice of design variables. They also include special problems in obtaining sufficiently accurate sensitivity derivatives.  相似文献   

13.
This article provides a graphical parameter tuning method of PIλ controllers for fractional-order time-delay systems. First, the complete stabilizing region of PIλ controller in proportional-integral plane, for a fixed λ, is determined in terms of a graphical stability criterion applicable to fractional-delay systems. Then, the stabilizing region is maximized analytically with respect to parameter λ to expect the most various behaviors of the closed-loop systems. Finally, by defining appropriate functions relative to the requirements of gain and phase margins, the curves in the maximized stabilizing region satisfying the pre-specified gain and phase margins are drawn, which releases a flexible parameter tuning procedure. Numerical examples are given to illustrate the design steps.  相似文献   

14.
According to the secure problems existing in the login system, a new secure scheme on login system is proposed. This scheme encryptedly transmits the input information after filtration and digestion so that it can efficiently avoid the replay-attack and the man-in-the-middle attack.  相似文献   

15.
Neurotechnology has made great strides in the last 20 years. However, we still have a long way to go to commercialize many of these technologies as we lack a unified framework to study cyber-neural systems (CNS) that bring the hardware, software, and the neural system together. Dynamical systems play a key role in developing these technologies as they capture different aspects of the brain and provide insight into their function. Converging evidence suggests that fractional-order dynamical systems are advantageous in modeling neural systems because of their compact representation and accuracy in capturing the long-range memory exhibited in neural behavior. In this brief survey, we provide an overview of fractional CNS that entails fractional-order systems in the context of CNS. In particular, we introduce basic definitions required for the analysis and synthesis of fractional CNS, encompassing system identification, state estimation, and closed-loop control. Additionally, we provide an illustration of some applications in the context of CNS and draw some possible future research directions. Advancements in these three areas will be critical in developing the next generation of CNS, which will, ultimately, improve people’s quality of life.  相似文献   

16.
The purpose of this study is to better understand the digital divide by identifying the variety of ways in which people in Europe use the Internet. First, by using cluster analysis on survey data (N=12,666/age: 16–74 years) from Eurostat on Internet usage in Norway, Sweden, Austria, the UK, and Spain, we identified five user types: Non-Users (42%), Sporadic Users (18%), Instrumental Users (18%), Entertainment Users (10%), and Advanced Users (12%). These user types differ in their distributions over country, age, access, household members, and gender. An alarming finding is that 60% of the population was found to be either Non-Users or Sporadic Users, which reflects a large digital divide in Europe. Second, we conducted a logistic regression to identify the predictors for different user types. We found on a cross-national level that age and Internet access are the most salient predictors, whereas gender and household seems to be less relevant. However, the amount of variance explained differs between countries. We also suggested a future increase in the digital divide between the identified user types—a user type divide. The user typology and the identified predictors might help researchers, practitioners, and decision makers to better understand Internet users and the multi-complex variations among individuals and countries. This knowledge will also serve as a means to understand the digital divide by providing a more nuanced perspective on Europeans' unequal usage of the Internet and participation in an increasingly digital society.  相似文献   

17.
Software development cost estimation approaches — A survey   总被引:1,自引:0,他引:1  
This paper summarizes several classes of software cost estimation models and techniques: parametric models, expertise‐based techniques, learning‐oriented techniques, dynamics‐based models, regression‐based models, and composite‐Bayesian techniques for integrating expertise‐based and regression‐based models. Experience to date indicates that neural‐net and dynamics‐based techniques are less mature than the other classes of techniques, but that all classes of techniques are challenged by the rapid pace of change in software technology. The primary conclusion is that no single technique is best for all situations, and that a careful comparison of the results of several approaches is most likely to produce realistic estimates. This revised version was published online in June 2006 with corrections to the Cover Date.  相似文献   

18.
The remarkable ability to separate and identify self and non-self in a given problem space, makes negative selection a fascinating concept of artificial immune system. Therefore, negative selection has attracted research interest and is studied and explored for complex problem solving across different application areas. Anomaly detection in computer security is a thriving area of research and has witnessed various new explores involving different computational intelligence techniques. Negative selection with its core ability to detect self and non-self along with traits like adaptability, learning, robustness and faster response makes it a suitable and compelling concept for anomaly detection. Over the years, negative selection has evolved from its preliminary theories and it has embraced new improvements from computational intelligence in its several concepts. This paper intends to review various negative selection taxonomies, representations and matching techniques from inception to current scenario in anomaly detection. It attempts to critically evaluate and classify available literature to establish future areas of research for formulating potential solutions to mitigate the complex security challenges.  相似文献   

19.
In fuzzy logic in wider sense, i.e. in the field of fuzzy sets applications, t-norms got a prominent rôle in recent times. In many-valued logic, the ?UKASIEWICZ systems, the GÖDEL sytems, and also the product logic all are t-norm based systems. The present paper discusses the more general problem of the adequate axiomatizability for such t-norm based logical systems in general, surveying results of the last years. The main emphasis in the present paper is on propositional logic.  相似文献   

20.
《Automatica》1985,21(1):1-21
This paper attempts to give a unified overview of how direct methods solve the transient stability problem of large-scale power systems. Two distinct methodologies are considered and discussed. The first concerns application of the direct Lyapunov method to the conventional transient stability analysis. Both scalar and vector Lyapunov approaches are envisaged and their respective merits and potentialities are compared. Particular attention is also paid to the estimation of ‘practical’ stability domains, aiming to overcome the usual conservativeness of the Lyapunov criterion. The second methodology focuses on the derivation of stability indices, intended for on-line monitoring, contingency evaluation and security control. The present achievements and future trends are explored and tentatively assessed.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号