首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
2.
A direct adaptive fuzzy control algorithm is developed for a class of uncertain SISO nonlinear systems. In this algorithm, it doesn’t require to assume that the system states are measurable. Therefore, it is needed to design an observer to estimate the system states. Compared with the numerous alternative approaches with respect to the observer design, the main advantage of the developed algorithm is that on-line computation burden is alleviated. It is proven that the developed algorithm can guarantee that all the signals in the closed-loop system are uniformly ultimately bounded and the tracking error converges to a small neighborhood around zero. The simulation examples validate the feasibility of the developed algorithm. Recommended by Editorial Board member Zhong Li under the direction of Editor Young-Hoon Joo. This work is supported by National Natural Science Foundation of China under grant 60674056, 60874056, and the Foundation of Educational Department of Liaoning Province (2008312). Yan-Jun Liu received the B.S. degree in Applied Mathematics from Shenyang University of Technology in 2001. He received the M.S. degree in Control Theory and Control Engineering from Shenyang University of Technology in 2004 and the Ph.D. degree in Control Theory and Control Engineering from Dalian University of Technology, China, in 2007. His research interests include fuzzy control theory, nonlinear control and adaptive control. Shao-Cheng Tong received the B.S. degree in Department of Mathematics from Jinzhou Normal College, China, in 1982. He received the M.S. degree in Department of Mathematics from Dalian Marine University in 1988 and the Ph.D. degree in Control Theory and Control Engineering from Northeastern University, China, in 1997. His research interests include fuzzy control theory, nonlinear control, adaptive control, and system identification etc. Wei Wang received the B.S. degree in Department of Automation from Northeastern University, China, in 1982. He received the M. S. degree in Department of Automation from Northeastern University in 1984 and the Ph.D. degree in Department of Automation from Northeastern University, China, in 1988. His research interests include adaptive predictive control, intelligent control, and production scheduling method etc. Yong-Ming Li received the B.S. degree in Applied Mathematics from Liaoning University of Technology in 2004. He received the M.S. degree in Applied Mathematics from Liaoning University of Technology in 2007. His research interests include fuzzy control theory, nonlinear control and adaptive control.  相似文献   

3.
The foundation of any network management systems is a database that contains information about the network resources relevant to the management tasks.A network information model is an abstraction of network resources,including both managed resources and managing resources,In the SNMP-based management framework,management information is defined almost exclusively from a “Device“ viewpoint,namely managing a network is equivalent to managing a collection of individual nodes.Aiming at making use of recent advances in distributed computing and in object-oriented analysis and design,the Internet management architecture can also be based on the Open Distributed Processing Reference Model(RM-ODP).The purpose of this article is to provide an Internet Network Resource Information Model.First,a layered management information architecture will be discussed.Then the Internet Network resource information model is presented.The information model is specified using object-Z.  相似文献   

4.
This paper is concerned with the stability analysis for static recurrent neural networks (RNNs) with time-varying delay. By Lyapunov functional method and linear matrix inequality technique, some new delay-dependent conditions are established to ensure the asymptotic stability of the neural network. Expressed in linear matrix inequalities (LMIs), the proposed delay-dependent stability conditions can be checked using the recently developed algorithms. A numerical example is given to show that the obtained conditions can provide less conservative results than some existing ones.  相似文献   

5.
This article investigates the problem of robust stability for neural networks with time-varying delays and parameter uncertainties of linear fractional form. By introducing a new Lyapunov-Krasovskii functional and a tighter inequality, delay-dependent stability criteria are established in term of linear matrix inequalities (LMIs). It is shown that the obtained criteria can provide less conservative results than some existing ones. Numerical examples are given to demonstrate the applicability of the proposed approach. Recommended by Editorial Board member Naira Hovakimyan under the direction of Editor Young-Hoon Joo. This work was supported by the National Science foundation of China under Grant no. 60774013 and Key Laboratory of Education Ministry for Image Processing and Intelligent Control under grant no. 200805. Tao Li received the Ph.D. degree in The Research Institute of Automation Southeast University, China. Now He is an Assistant Professor in Department of Information and Communication, Nanjing University of Information Science and Technology. His current research interests include time-delay systems, neural networks, robust control, fault detection and diagnosis. Lei Guo received the Ph.D. degree in the Research Institute of Automation Southeast University, China. From 1999 to 2004, he has worked at Hong Kong University, IRCCyN (France), Glasgow University, Loughborough University and UMIST, UK. Now He is a Professor in School of Instrument Science and Opto-Electronics Engineering, Beihang University. His current research interests include robust control, fault detection and diagnosis. Lingyao Wu received the Ph.D. degree in The Research Institute of Automation Southeast University, China. Now He is an Assistant Professor in the Research Institute of Automation Southeast University. His current research interests include time-delay systems, neural networks, robust control, fault detection and diagnosis. Changyin Sun received the Ph.D. degree in the Research Institute of Automation Southeast University, China. Now He is a Professor in the Research Institute of Automation Southeast University. His current research interests include timedelay systems, neural networks.  相似文献   

6.
This paper is about distributed oblivious function evaluation (DOFE). In this setting one party (Alice) has a function f(x), and the other party (Bob) with an input α wants to learn f(α) in an oblivious way with the help of a set of servers. What Alice should do is to share her secret function f(x) among the servers.Bob obtains what he should get by interacting with the servers. This paper proposes the model and security requirements for DOFE and analyzes three distributed oblivious polynomial evaluation protocols presented in the paper.  相似文献   

7.
In this paper we deal with the problem of plants with large parameter variations under different operating modes. A novel intelligent control algorithm based on multiple models is proposed to improve the dynamical response performance. At the same time adaptive model bank is applied to establish models without prior system information. Multiple models and corresponding controllers are automatically established on-line by a conventionally adaptive model and a re-initialized one. A best controller is chosen by the performance function at every instant. The closed-loop system’s stability and asymptotical convergence of tracking error can be guaranteed. Simulation results have confirmed the validity of the proposed method.  相似文献   

8.
This paper investigates the problem of global robust stabilization for a wide class of nonlinear systems, called polynomial lower-triangular form (pLTF), which expands LTF to a more general case. The aim is explicitly constructing the smooth controller for the class of systems with static uncertainties, by adding and modifying a power integrator in a recursive manner. The pLTF relaxes the restrictions on the structure of the normal LTF and enlarges the family of systems that are stabilizable. Examples are also provided to show the practical usage of this class of systems and the effectiveness of the design method. Recommended by Editorial Board member Hyungbo Shim under the direction of Editor Jae Weon Choi. Bing Wang received the B.S. degree from the Huazhong University of Science and Technology, and the Ph.D. degree from the University of Science and Technology of China, in 1998 and 2006, respectively. He is currently working in College of Electrical Engineering, Hohai University. His research interests include robust control, nonlinear control and power systems. Haibo Ji received the B.S. and Ph.D. degrees in Mechanical Engineering from ZheJiang University and Beijing University in 1984 and 1990 respectively. He is currently a Professor in the Dept. of Automation, USTC. His research interests include nonlinear control and adaptive control. Jin Zhu received the B.S. and Ph.D. degrees in Control Science and Engineering from University of Science & Technology of Chinain 2001 and 2006 respectively. He is currently a Post-doc in Han-Yang University, Korea. His research interests include Markovian jump systems and nonlinear control.  相似文献   

9.
Method of Direct Texture Synthesis on Arbitrary Surfaces   总被引:2,自引:0,他引:2       下载免费PDF全文
A direct texture synthesis method on arbitrary surfaces is proposed in this paper. The idea is to recursively map triangles on surface to texture space until the surface is completely mapped. First, the surface is simplified and a tangential vector field is created over the simplified mesh. Then, mapping process searches for the most optimal texture coordinates in texture sample for each triangle, and the textures of neighboring triangles are blended on the mesh. All synthesized texture triangles are compressed to an atlas. Finally, the simplified mesh is subdivided to approach the initial surface. The algorithm has several advantages over former methods: it synthesizes texture on surface without local parameterization; it does not need partitioning surface to patches; and it does not need a particular texture sample. The results demonstrate that the new algorithm is applicable to a wide variety of texture samples and any triangulated surfaces.  相似文献   

10.
A controller design is proposed for a class of high order nonholonomic systems with nonlinear drifts. The purpose is to ensure a solution for the closed-loop system regulated to zero. Adding a power integrator backstepping technique and the switching control strategy are employed to design the controller. The state scaling is applied to the recursive manipulation. The simulation example demonstrates the effectiveness and robust features of the proposed method.  相似文献   

11.
A Novel Computer Architecture to Prevent Destruction by Viruses   总被引:1,自引:0,他引:1       下载免费PDF全文
In today‘s Internet computing world,illegal activities by crackers pose a serious threat to computer security.It is well known that computer viruses,Trojan horses and other intrusive programs may cause sever and often catastrophic consequences. This paper proposes a novel secure computer architecture based on security-code.Every instruction/data word is added with a security-code denoting its security level.External programs and data are automatically addoed with security-code by hadware when entering a computer system.Instruction with lower security-code cannot run or process instruction/data with higher security level.Security-code cannot be modified by normal instruction.With minor hardware overhead,then new architecture can effectively protect the main computer system from destruction or theft by intrusive programs such as computer viruses.For most PC systems it includes an increase of word-length by 1 bit on register,the memory and the hard disk.  相似文献   

12.
This paper introduces the design and implemetation of BCL-3,a high performance low-level communication software running on a cluster of SMPs(CLUMPS) called DAWNING-3000,BCL-3 provides flexible and sufficient functionality to fulfill the communication requirements of fundamental system software developed for DAWNING-3000 while guaranteeing security,scalability,and reliability,Important features of BCL-3 are presented in the paper,including special support for SMP and heterogeneous network environment,semiuser-level communication,reliable and ordered data transfer and scalable flow control,The performance evaluation of BCL-3 over Myrinet is also given.  相似文献   

13.
We present a monitoring system which detects repeated packets in network traffic, and has applications including detecting computer worms. It uses Bloom filters with counters. The system analyzes traffic in routers of a network. Our preliminary evaluation of the system involved traffic from our internal lab and a well known historical data set. After appropriate configuration, no false alarms are obtained under these data sets and we expect low false alarm rates are possible in many network environments. We also conduct simulations using real Internet Service Provider topologies with realistic link delays and simulated traffic. These simulations confirm that this approach can detect worms at early stages of propagation. We believe our approach, with minor adaptations, is of independent interest for use in a number of network applications which benefit from detecting repeated packets, beyond detecting worm propagation. These include detecting network anomalies such as dangerous traffic fluctuations, abusive use of certain services, and some distributed denial-of-service attacks. P. van Oorschot(Ph.D. Waterloo, 1988) is a Professor in the School of Computer Science at Carleton University, and Canada Research Chair in Network and Software Security. He is the founding director of Carleton's Digital Security Group. He has worked in research and development in cryptography and network security, including at Bell-Northern Research (Ottawa), and Entrust Technologies (Ottawa) as VP and Chief Scientist. He is coauthor of the standard reference Handbook of Applied Cryptography. His current research interests include authentication and identity management, network security, software protection, and security infrastructures. J.-M. Robertis a Principal Security Researcher at Alcatel in Ottawa, Ontario. His research interests are network and telecom infrastructure security, focusing mainly on denial-of-service attacks and worm propagation. Previously, Dr. Robert worked as Security Director for the North American Development Center of Gemplus International as well as Professor at the Université du Québec à Chicoutimi. Dr. Robert received a Ph.D. in Computer Science from McGill University. M. Vargas Martinis an Assistant Professor at the University of Ontario Institute of Technology (Oshawa, Canada), with faculty appointments in Business and Information Technology, as well as Engineering and Applied Science. He was previously a post-doctoral researcher at Carleton University supported in part by Alcatel Canada. He holds a Ph.D. in Computer Science (Carleton University, 2002), a Masters degree in Electrical Engineering (Cinvestav, Mexico, 1998), and a Bachelor of Computer Science (Universidad Autónoma de Aguascalientes, Mexico, 1996). His current research interests include network and host-based intrusion detection and reaction, mitigation of denial-of-service (DoS) and distributed DoS attacks, Web modeling and optimization, Internet connectivity, and interconnection protocols.  相似文献   

14.
A new approach based on switched capacitor network to harmonic compensation for switching supplies is presented in the paper,The basic principle is discussed.SPICE simulation is applied to analyze the behaviour of the switched capacitor harmonic compensation part.  相似文献   

15.
Slack variables approach is an important technique for tackling the delay-dependent stability problem for systems with time-varying delay. In this paper, a new delay-dependent stability criterion is presented without introducing any slack variable. The technique is based on a simply integral inequality. The result is shown to be equivalent to some existing ones but includes the least number of variables. Thus, redundant selection and computation can be avoided so that the computational burden can be largely reduced. Numerical examples are given to illustrate the effectiveness of the proposed stability conditions. Recommended by Editorial Board member Young Soo Suh under the direction of Editor Jae Weon Choi. The authors would like to thank the Associate Editor and the Reviewers for their very helpful comments and suggestions. This work was supported in part by the Funds for Creative Research Groups of China under Grant 60821063, by the State Key Program of National Natural Science of China under Grant 60534010, by the Funds of National Science of China under Grant 60674021, 60774013, 60774047, National 973 Program of China under Grant No. 2009CB320604, and by the Funds of Ph.D. program of MOE, China under Grant 20060145019 and the 111 Project B08015. Xun-Lin Zhu received the B.S. degree in Applied Mathematics from Information Engineering Institute, Zhengzhou, China, in 1986, the M.S. degree in basic mathematics from Zhengzhou University, Zhengzhou, China, in 1989, and the Ph.D. degree in Control Theory and Engineer-ing from Northeastern University, Shenyang, China, in 2008. Currently, he is an Associate Professor at Zhengzhou University of Light Industry, Zhengzhou, China. His research interests include neural networks and networked control systems. Guang-Hong Yang received the B.S. and M.S. degrees in Northeast University of Technology, China, in 1983 and 1986, respectively, and the Ph.D. degree in Control Engineering from Northeastern University, China (formerly, Northeast University of Technology), in 1994. He was a Lecturer/Associate Professor with Northeastern University from 1986 to 1995. He joined the Nanyang Technological University in 1996 as a Postdoctoral Fellow. From 2001 to 2005, he was a Research Scientist/Senior Research Scientist with the National University of Singapore. He is currently a Professor at the College of Information Science and Engineering, Northeastern University. His current research interests include fault-tolerant control, fault detection and isolation, non-fragile control systems design, and robust control. Dr. Yang is an Associate Editor for the International Journal of Control, Automation, and Systems (IJCAS), and an Associate Editor of the Conference Editorial Board of the IEEE Control Systems Society. Tao Li was born in 1979. He is now pursuing a Ph.D. degree in Research Institute of Automation Southeast University, China. His current research interests include time-delay systems, neural networks, robust control, fault detection and diagnosis. Chong Lin received the B.Sci and M.Sci in Applied Mathematics from the Northeastern University, China, in 1989 and 1992, respectively, and the Ph.D in Electrical and Electronic Engineering from the Nanyang Technological University, Singapore, in 1999. He was a Research Associate with the University of Hong Kong in 1999. From 2000 to 2006, he was a Research Fellow with the National University of Singapore. He is currently a Profesor with the Institute of Complexity Science, Qingdao University, China. His current research interests are mainly in the area of systems analysis and control. Lei Guo was born in 1966. He received the Ph.D. degree in Control Engineering from Southeast University (SEU), PR China, in 1997. From 1999 to 2004, he has worked at Hong Kong University, IRCCyN (France), Glasgow University, Loughborough University and UMIST, UK. Now he is a Professor in School of Instrument Science and Opto-Electronics Engineering, Beihang University. He also holds a Visiting Professor position in the University of Manchester, UK and an invitation fellowship in Okayama University, Japan. His research interests include robust control, stochastic systems, fault detection, filter design, and nonlinear control with their applications.  相似文献   

16.
Information service plays a key role in grid system, handles resource discovery and management process. Employing existing information service architectures suffers from poor scalability, long search response time, and large traffic overhead. In this paper, we propose a service club mechanism, called S-Club, for efficient service discovery. In S-Club, an overlay based on existing Grid Information Service (GIS) mesh network of CROWN is built, so that GISs are organized as service clubs. Each club serves for a certain type of service while each GIS may join one or more clubs. S-Club is adopted in our CROWN Grid and the performance of S-Club is evaluated by comprehensive simulations. The results show that S-Club scheme significantly improves search performance and outperforms existing approaches. Chunming Hu is a research staff in the Institute of Advanced Computing Technology at the School of Computer Science and Engineering, Beihang University, Beijing, China. He received his B.E. and M.E. in Department of Computer Science and Engineering in Beihang University. He received the Ph.D. degree in School of Computer Science and Engineering of Beihang University, Beijing, China, 2005. His research interests include peer-to-peer and grid computing; distributed systems and software architectures. Yanmin Zhu is a Ph.D. candidate in the Department of Computer Science, Hong Kong University of Science and Technology. He received his B.S. degree in computer science from Xi’an Jiaotong University, Xi’an, China, in 2002. His research interests include grid computing, peer-to-peer networking, pervasive computing and sensor networks. He is a member of the IEEE and the IEEE Computer Society. Jinpeng Huai is a Professor and Vice President of Beihang University. He serves on the Steering Committee for Advanced Computing Technology Subject, the National High-Tech Program (863) as Chief Scientist. He is a member of the Consulting Committee of the Central Government’s Information Office, and Chairman of the Expert Committee in both the National e-Government Engineering Taskforce and the National e-Government Standard office. Dr. Huai and his colleagues are leading the key projects in e-Science of the National Science Foundation of China (NSFC) and Sino-UK. He has authored over 100 papers. His research interests include middleware, peer-to-peer (P2P), grid computing, trustworthiness and security. Yunhao Liu received his B.S. degree in Automation Department from Tsinghua University, China, in 1995, and an M.A. degree in Beijing Foreign Studies University, China, in 1997, and an M.S. and a Ph.D. degree in computer science and engineering at Michigan State University in 2003 and 2004, respectively. He is now an assistant professor in the Department of Computer Science and Engineering at Hong Kong University of Science and Technology. His research interests include peer-to-peer computing, pervasive computing, distributed systems, network security, grid computing, and high-speed networking. He is a senior member of the IEEE Computer Society. Lionel M. Ni is chair professor and head of the Computer Science and Engineering Department at Hong Kong University of Science and Technology. Lionel M. Ni received the Ph.D. degree in electrical and computer engineering from Purdue University, West Lafayette, Indiana, in 1980. He was a professor of computer science and engineering at Michigan State University from 1981 to 2003, where he received the Distinguished Faculty Award in 1994. His research interests include parallel architectures, distributed systems, high-speed networks, and pervasive computing. A fellow of the IEEE and the IEEE Computer Society, he has chaired many professional conferences and has received a number of awards for authoring outstanding papers.  相似文献   

17.
This paper concerns the problem of robust fault detection filter design for uncertain linear time-invariant (LTI) systems with both model uncertainty and disturbances. Firstly, the fault detection filter design is formulated to H model-matching problem. Secondly, based on a new bounded real lemma, a sufficient condition for the existence of the robust fault detection filter is constructed in term of linear matrix inequalities (LMIs). Owing on the introduction of the tuning parameter and slack variables in obtained LMI condition, the proposed design method can provide higher fault detection sensitivity performance than the existing one. Finally, an illustrative example is employed to demonstrate the effectiveness of the proposed approach. Recommended by Editorial Board member Bin Jiang under the direction of Editor Jae Weon Choi. This work was supported by Postdoctoral Fundation of Jiangsu Province under grant 0901026c and Key Laboratory of Education Ministry for Image Processing and Intelligent Control under grant 200805. Tao Li received the Ph.D. degree in the Research Institute of Automation Southeast University, China. Now He is a postdoctoral researcher with the same university. His current research interests include time-delay systems, neural networks, robust control, fault detection and diagnosis. Lingyao Wu received the Ph.D. degree in the Research Institute of Automation Southeast University, China. Now He is an Assistant Professor in the Research Institute of Automation Southeast University. His current research interests include time-delay systems, neural networks, robust control, fault detection and diagnosis. Xinjiang Wei was born in Dongying, China, in 1977. He received the B.S. degrees from Yantai Normal University, China in 1999, M.S. degrees from Bohai University in 2002, and the Ph.D. degree in Department of Information from Northeastern University in 2005. From 2006 to Present, he was with Ludong University as an Associate Professor. From 2006 to 2009, he was a Postdoctoral Fellow at Southeast University. His research interests include robust control, nonlinear control, and fuzzy control.  相似文献   

18.
This paper develops an effective randomized on-demand QoS routing algorithm on networks with inaccurate link-state information.Several new techniques are proposed in the algorithm.First,the maximum safety rate and the minimum delay for each node in the network are pre-computed,which simplicfy the network complexity and provide the routing process with useful information .The routing process is dynamically directed by the safety rate and the minimum delay of the next node.Randomness in used at the link level and depends dynamically on the routing configurationl.This provides great flexibility for the routing process,prevents the routing process from overusing certain fixed routing paths,and adequately balances the safety rate and delay of the routing path.A network testing environment has been established and five parameters are introduced to measure the performance of QoS routing algorithms.Experimental results demonstrate that in terms of the proposed parameters,the algorithm outperforms existing Qos algorithms appearing in the literature.  相似文献   

19.
An Attack-Finding Algorithm for Security Protocols   总被引:5,自引:1,他引:5       下载免费PDF全文
This paper proposes an automatic attack construction algorithm in order to find potential attacks on ecurity protocols.It is based on a dynamic strand space model,which enhances the original strand space model by introducing active nodes on strands so as to characterize the dynamic procedure of protocol execution.With exact causal dependency relations between messages considered in the model,this algorithm can avoid state space explo-sion caused by asynchronous composition.In order to get a finite state space,a new method called strand-added on demand is exploited,which extends a bundle in an incremental manner without requiring explicit configuration of protocol execution parameters.A finer granularity model of term structure is also introduced, in which subterms are divided into check subterms and data subterms .Moreover,data subterms can be further classified based on the compatible data subterm relation to obtain automatically the finite set of valid acceptable terms for an honest principal.In this algorithm,terms core is designed to represent the intruder‘s knowledge compactly,and forward search technology is used to simulate attack patterns easily.Using this algorithm,a new attack on the Dolve-Yao protocol can be found,which is even more harmful beeause the secret is revealed before the session terminates.  相似文献   

20.
Multiple-Morphs Adaptive Stream Architecture   总被引:2,自引:0,他引:2       下载免费PDF全文
In modern VLSI technology, hundreds of thousands of arithmetic units fit on a 1cm^2 chip. The challenge is supplying them with instructions and data. Stream architecture is able to solve the problem well. However, the applications suited for typical stream architecture are limited. This paper presents the definition of regular stream and irregular stream, and then describes MASA (Multiple-morphs Adaptive Stream Architecture) prototype system which supports different execution models according to applications' stream characteristics. This paper first discusses MASA architecture and stream model, and then explores the features and advantages of MASA through mapping stream applications to hardware. Finally MASA is evaluated by ten benchmarks. The result is encouraging.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号