共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
This paper describes a new control method of teleoperation systems with communication time delay. This method models the teleoperation system in the state space, considering all the possible interactions that could appear in the operator‐master‐slave‐environment set, and it uses the Taylor expansion to model the time delay. The control system allows that the slave manipulator follows the master in spite of the time delay in the communication channel. The tracking is achieved by state convergence between the master and the slave. The method is also able to establish the desired dynamics of this convergence and the dynamics of the slave manipulator. Furthermore, a simple design procedure is provided to obtain the control system gains. These control gains are calculated solving a set of seven equations. The control method is robust to the uncertainty of the design parameters, so it is not necessary to obtain good estimations of these parameters. Simulations and experiments with a one DOF teleoperation system are presented to verify the control method. © 2004 Wiley Periodicals, Inc. 相似文献
3.
《Journal of Parallel and Distributed Computing》1998,52(1):69-81
Shared control is an architecture model that extends the SIMD model to support control parallelism. Under shared control, each processing element (PE) supports a local instruction stream and control for each PE is received by synchronizing with a shared control unit corresponding to the PE's current instruction. Because the control is shared and not supplied on demand, the control units must be tightly synchronized to allow the PEs to select among them. This synchronization is accomplished by defining a fundamental cycle length for the control units—allowing PEs to safely switch to a new control unit at the fundamental cycle edge. In a naive implementation, thefundamentalcycle length is governed by the longest instruction length; other control units are padded with idle cycles to that length. Since the longest instruction cost is suffered by each instruction, the performance of the system in the presence of long instructions deteriorates. This paper presents and evaluates alternative models for synchronization that minimize the effect of long instructions on the performance. The implementation of these solutions is discussed and the improvement in performance is characterized. 相似文献
4.
Weiyi Zhang Balagangadhar G. Bathula Rakesh K. Sinha Robert Doverspike Peter Magill Aswatnarayan Raghuram Gagan Choudhury 《Journal of Network and Systems Management》2016,24(3):607-628
We explore alternative architectures to reduce cost of IP-over-optical core networks. We conducted a detailed cost study of three architectures. We start with a Baseline architecture that captures present mode of operations with future traffic projections and utilizes technologies such as Ethernet line-cards and OTN sub-wavelength switching. The next architecture, Streamlined, replaces the hub-and-spoke topology of Baseline with a flat topology and is also more judicious in its restoration design. Our detailed study shows significant cost savings for the Streamlined architecture compared to the Baseline. We reduce the cost further in our third proposed architecture: Ethernet enabled IP core consisting of OTN switches (with and without packet switching) and without any backbone routers or MPLS switches. Our results also demonstrate that we can achieve significant reduction in switching costs but reducing cost of transport remains a significant challenge. This paper is an extended version of our previous work published in (11th international conference on the design of reliable communication networks (DRCN), pp 227–234, 2015). 相似文献
5.
本文简要介绍了Internet的网络安全体系结构的现状和发展趋势,其中重点分析和比较了IPSec和SSL/TLS。文中详细阐述了IPSec和SSL/TLS的体系结构、它们所采用的安全技术、所能提供的安全服务以及它们的实现方式;并且对这两种协议的特点、应用范围、优缺点进行了介绍和比较。 相似文献
6.
Darryl N. Davis 《Computational Intelligence》2001,17(4):621-650
This paper presents a developing concept of mind defined in terms of external and internal niches. This perspective on mind is described primarily in terms of the niche space of control states and the design space of processes that may support such phenomena. A developing agent architecture, that can support motivation and other control states associated with mind, is presented. Different aspects of agent research are discussed in terms of three categories of agents. Each agent category is characterized primarily in terms of their task-related competencies and internal behaviors and discussed in terms of our taxonomy of control states. The concept of complete agents is then introduced. Goals are described in terms of their generation across a number of computational layers. Experimental analysis is provided on how these differing forms of behaviors can be cleanly integrated. This leads into a discussion on the nature of motivational states and the mechanisms used for making decisions and managing the sometimes-competitive nature of processes internal to a complex agent. The difficulty of evaluating complete agents is discussed from a number of perspectives. The paper concludes by considering future directions related to the computational modeling of emotions and the concept of synthetic mind. 相似文献
7.
GMPLS是一种将电层包交换技术与光层大颗粒度交换技术有机融合在一起的新技术,其统一的控制管理层面简化了网络的结构;在研究了多种T比特路由器结构的基础上,该文提出了一种将电处理技术优势和光技术优势有机结合的光电混合、多种交换颗粒度的大容量交换路由结构。 相似文献
8.
《Journal of Parallel and Distributed Computing》1994,23(3):376-381
This paper considers the question of whether a mesh-connected machine is always better than a multi-pipelined machine for iterative 2-d mesh computations. Optimal throughput is determined as a function of a unified measure of resources (cost). The resulting performance curves for the two architectures show that there is a cost below which the pipelined architecture is an order of magnitude faster than the mesh, and above which this relationship is reversed. This methodology of comparing architectures using throughput-versus-cost modeling may prove useful in other contexts. 相似文献
9.
两种基于IP的VPN体系及比较 总被引:3,自引:0,他引:3
李博 《计算机工程与应用》2002,38(9):154-156,185
描述了两种基于IP的虚拟专用网体系IPSecVPN与MPLSVPN,该文分别阐述了它们的实现机制与安全机制,并比较了两者的优缺点,最后指出MPLSVPN的发展潜力。 相似文献
10.
在数据库受到攻击的情况下,保证关键业务的持续服务和动态恢复入侵造成的破坏是非常重要的问题。当前很多中小型网络数据库并无冗余机作为后备,但又必须采用客侵机制采保证其可用性和安全性,所以本文提出了一个基于角色访问的非冗余容侵数据库结构。谊结构能通过隔离执行关键数据采提供不问断的关键业务服务;对于入侵能够在线进行自动恢复;根据用户的角色、历史记录和容侵要求,自动进行状态迁移和系统参数调节等。 相似文献
11.
12.
Riccardo Scattolini 《Journal of Process Control》2009,19(5):723-731
The aim of this paper is to review and to propose a classification of a number of decentralized, distributed and hierarchical control architectures for large scale systems. Attention is focused on the design approaches based on Model Predictive Control. For the considered architectures, the underlying rationale, the fields of application, the merits and limitations are discussed, the main references to the literature are reported and some future developments are suggested. Finally, a number of open problems is listed. 相似文献
13.
14.
This article presents a comparative stability and performance analysis of control architectures for bimanual kinesthetic telepresence systems. Asymptotic stability of the kinesthetic closed loop is investigated considering analytical models for the dynamics of display, manipulator, operator, and environment. Stability bounds are computed for typical environmental properties by use of the parameter space approach. In addition, the quality of kinesthetic feedback is evaluated by introducing a novel quantitative performance measure. The application of both methodological approaches to typical two-channel control architectures demonstrates, that none of these can provide high kinesthetic feedback quality and robust stability for arbitrary environmental conditions. As a consequence, a structure adapting control architecture is proposed, which adapts the algorithms for local display and manipulator control, depending on identified environmental conditions. An extended stability analysis is presented for this architecture, and its appropriateness for bimanual kinesthetic interaction in remote environment is discussed. The usability and efficiency of the proposed approach are tested by experiments with a developed telepresence system applied to teleoperated demining. 相似文献
15.
《Computer》1980,13(11):17-35
New adaptation properties for supersystem architectures will allow higher throughputs from the same hardware, lengthening system life cycles. 相似文献
16.
Decoupling techniques can be applied to a vector processor, resulting in a large increase in performance of vectorizable programs. We simulate a selection of the Perfect Club and Specfp92 benchmark suites and compare their execution time on a conventional single port vector architecture with that of a decoupled vector architecture. Decoupling increases the performance by a factor greater than 1.4 for realistic memory latencies, and for an ideal memory system with zero latency, there is still a speedup of as much as 1.3. A significant portion of this paper is devoted to studying the tradeoffs involved in choosing a suitable size for the queues of the decoupled architecture. The hardware cost of the queues need not be large to achieve most of the performance advantages of decoupling. 相似文献
17.
随着集成电路制造工艺的发展,片上集成大容量Cache成为微处理器的发展趋势。然而,互连线延迟所占比例越来越大,成为大容量Cache的性能瓶颈,因此需要新的Cache体系结构来克服这些问题。非一致Cache体系结构通过在Cache内部支持多级延迟和数据块迁移来减少Cache的命中时间,提高性能,从而克服互连线延迟对大容量Cache的限制,已经成为微处理器片上存储结构的研究热点。本文回顾了非一致Cache体系结构模型的研究进展,特别是对片上多核处理器中的非一致Cache体系结构模型进行了详细介绍,比较了不同模型的贡献和不足。最后,对非一致Cache体系结构的发展进行了展望。 相似文献
18.
Syed Suhaib Deepak Mathaikutty Sandeep Shukla 《Electronic Notes in Theoretical Computer Science》2008,200(1):33
In Kahn process network (KPN), the processes (nodes) communicate by unbounded unidirectional FIFO channels (arcs), with the property of non-blocking writes and blocking reads on the channels. KPN provides a semantic model of computation, where a computation can be expressed as a set of asynchronously communicating processes. However, the unbounded FIFO based asynchrony is not realizable in practice and hence requires refinement in real hardware. In this work, we start with KPN as the model of computation for GALS, and discuss how different GALS architectures can be realized. We borrow some ideas from existing dataflow architectures for our GALS designs. 相似文献
19.
Architectures for Extreme-Scale Computing 总被引:1,自引:0,他引:1
Extreme-scale computers promise orders-of-magnitude improvement in performance over current high-end machines for the same machine power consumption and physical footprint. They also bring some important architectural challenges. 相似文献