首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
模糊控制的典型结构   总被引:10,自引:1,他引:10  
本文研究了评述了模糊控制的典型结构方案,包括模糊控制器的一般结构,PID模糊控制器,自组织模糊控制器,自校正模糊控制器,自学习模糊控制器和专家模型控制器等。文中着重讨论了控制结构机理。许多结构方案都获得应用验证。  相似文献   

2.
This paper describes a new control method of teleoperation systems with communication time delay. This method models the teleoperation system in the state space, considering all the possible interactions that could appear in the operator‐master‐slave‐environment set, and it uses the Taylor expansion to model the time delay. The control system allows that the slave manipulator follows the master in spite of the time delay in the communication channel. The tracking is achieved by state convergence between the master and the slave. The method is also able to establish the desired dynamics of this convergence and the dynamics of the slave manipulator. Furthermore, a simple design procedure is provided to obtain the control system gains. These control gains are calculated solving a set of seven equations. The control method is robust to the uncertainty of the design parameters, so it is not necessary to obtain good estimations of these parameters. Simulations and experiments with a one DOF teleoperation system are presented to verify the control method. © 2004 Wiley Periodicals, Inc.  相似文献   

3.
Shared control is an architecture model that extends the SIMD model to support control parallelism. Under shared control, each processing element (PE) supports a local instruction stream and control for each PE is received by synchronizing with a shared control unit corresponding to the PE's current instruction. Because the control is shared and not supplied on demand, the control units must be tightly synchronized to allow the PEs to select among them. This synchronization is accomplished by defining a fundamental cycle length for the control units—allowing PEs to safely switch to a new control unit at the fundamental cycle edge. In a naive implementation, thefundamentalcycle length is governed by the longest instruction length; other control units are padded with idle cycles to that length. Since the longest instruction cost is suffered by each instruction, the performance of the system in the presence of long instructions deteriorates. This paper presents and evaluates alternative models for synchronization that minimize the effect of long instructions on the performance. The implementation of these solutions is discussed and the improvement in performance is characterized.  相似文献   

4.
We explore alternative architectures to reduce cost of IP-over-optical core networks. We conducted a detailed cost study of three architectures. We start with a Baseline architecture that captures present mode of operations with future traffic projections and utilizes technologies such as Ethernet line-cards and OTN sub-wavelength switching. The next architecture, Streamlined, replaces the hub-and-spoke topology of Baseline with a flat topology and is also more judicious in its restoration design. Our detailed study shows significant cost savings for the Streamlined architecture compared to the Baseline. We reduce the cost further in our third proposed architecture: Ethernet enabled IP core consisting of OTN switches (with and without packet switching) and without any backbone routers or MPLS switches. Our results also demonstrate that we can achieve significant reduction in switching costs but reducing cost of transport remains a significant challenge. This paper is an extended version of our previous work published in (11th international conference on the design of reliable communication networks (DRCN), pp 227–234, 2015).  相似文献   

5.
本文简要介绍了Internet的网络安全体系结构的现状和发展趋势,其中重点分析和比较了IPSec和SSL/TLS。文中详细阐述了IPSec和SSL/TLS的体系结构、它们所采用的安全技术、所能提供的安全服务以及它们的实现方式;并且对这两种协议的特点、应用范围、优缺点进行了介绍和比较。  相似文献   

6.
This paper presents a developing concept of mind defined in terms of external and internal niches. This perspective on mind is described primarily in terms of the niche space of control states and the design space of processes that may support such phenomena. A developing agent architecture, that can support motivation and other control states associated with mind, is presented. Different aspects of agent research are discussed in terms of three categories of agents. Each agent category is characterized primarily in terms of their task-related competencies and internal behaviors and discussed in terms of our taxonomy of control states. The concept of complete agents is then introduced. Goals are described in terms of their generation across a number of computational layers. Experimental analysis is provided on how these differing forms of behaviors can be cleanly integrated. This leads into a discussion on the nature of motivational states and the mechanisms used for making decisions and managing the sometimes-competitive nature of processes internal to a complex agent. The difficulty of evaluating complete agents is discussed from a number of perspectives. The paper concludes by considering future directions related to the computational modeling of emotions and the concept of synthetic mind.  相似文献   

7.
GMPLS是一种将电层包交换技术与光层大颗粒度交换技术有机融合在一起的新技术,其统一的控制管理层面简化了网络的结构;在研究了多种T比特路由器结构的基础上,该文提出了一种将电处理技术优势和光技术优势有机结合的光电混合、多种交换颗粒度的大容量交换路由结构。  相似文献   

8.
This paper considers the question of whether a mesh-connected machine is always better than a multi-pipelined machine for iterative 2-d mesh computations. Optimal throughput is determined as a function of a unified measure of resources (cost). The resulting performance curves for the two architectures show that there is a cost below which the pipelined architecture is an order of magnitude faster than the mesh, and above which this relationship is reversed. This methodology of comparing architectures using throughput-versus-cost modeling may prove useful in other contexts.  相似文献   

9.
两种基于IP的VPN体系及比较   总被引:3,自引:0,他引:3  
李博 《计算机工程与应用》2002,38(9):154-156,185
描述了两种基于IP的虚拟专用网体系IPSecVPN与MPLSVPN,该文分别阐述了它们的实现机制与安全机制,并比较了两者的优缺点,最后指出MPLSVPN的发展潜力。  相似文献   

10.
在数据库受到攻击的情况下,保证关键业务的持续服务和动态恢复入侵造成的破坏是非常重要的问题。当前很多中小型网络数据库并无冗余机作为后备,但又必须采用客侵机制采保证其可用性和安全性,所以本文提出了一个基于角色访问的非冗余容侵数据库结构。谊结构能通过隔离执行关键数据采提供不问断的关键业务服务;对于入侵能够在线进行自动恢复;根据用户的角色、历史记录和容侵要求,自动进行状态迁移和系统参数调节等。  相似文献   

11.
概述软件体系结构研究的重要性,描述软件可重用性的定义,主要对当前几种流行的分布式软件的体系结构CORBA、DCOM、移动Agent及SOA的可重用性的3个特征方面(耦合性、移植性、复用粒度)进行详细地分析和阐述,得出它们之间的比较关系。  相似文献   

12.
The aim of this paper is to review and to propose a classification of a number of decentralized, distributed and hierarchical control architectures for large scale systems. Attention is focused on the design approaches based on Model Predictive Control. For the considered architectures, the underlying rationale, the fields of application, the merits and limitations are discussed, the main references to the literature are reported and some future developments are suggested. Finally, a number of open problems is listed.  相似文献   

13.
软件架构的选择是件复杂的事情,需要考虑多方面的因素.针对一个典型的J2EE分布式应用--网上购物系统,实现了两种逻辑架构的应用程序:Web实现和Web EJB实现.通过在单机和集群环境中部署应用进行测试,在性能方面比较了它们的优劣.最后,对软件架构的选择做了进一步的讨论.  相似文献   

14.
This article presents a comparative stability and performance analysis of control architectures for bimanual kinesthetic telepresence systems. Asymptotic stability of the kinesthetic closed loop is investigated considering analytical models for the dynamics of display, manipulator, operator, and environment. Stability bounds are computed for typical environmental properties by use of the parameter space approach. In addition, the quality of kinesthetic feedback is evaluated by introducing a novel quantitative performance measure. The application of both methodological approaches to typical two-channel control architectures demonstrates, that none of these can provide high kinesthetic feedback quality and robust stability for arbitrary environmental conditions. As a consequence, a structure adapting control architecture is proposed, which adapts the algorithms for local display and manipulator control, depending on identified environmental conditions. An extended stability analysis is presented for this architecture, and its appropriateness for bimanual kinesthetic interaction in remote environment is discussed. The usability and efficiency of the proposed approach are tested by experiments with a developed telepresence system applied to teleoperated demining.  相似文献   

15.
《Computer》1980,13(11):17-35
New adaptation properties for supersystem architectures will allow higher throughputs from the same hardware, lengthening system life cycles.  相似文献   

16.
Decoupling techniques can be applied to a vector processor, resulting in a large increase in performance of vectorizable programs. We simulate a selection of the Perfect Club and Specfp92 benchmark suites and compare their execution time on a conventional single port vector architecture with that of a decoupled vector architecture. Decoupling increases the performance by a factor greater than 1.4 for realistic memory latencies, and for an ideal memory system with zero latency, there is still a speedup of as much as 1.3. A significant portion of this paper is devoted to studying the tradeoffs involved in choosing a suitable size for the queues of the decoupled architecture. The hardware cost of the queues need not be large to achieve most of the performance advantages of decoupling.  相似文献   

17.
随着集成电路制造工艺的发展,片上集成大容量Cache成为微处理器的发展趋势。然而,互连线延迟所占比例越来越大,成为大容量Cache的性能瓶颈,因此需要新的Cache体系结构来克服这些问题。非一致Cache体系结构通过在Cache内部支持多级延迟和数据块迁移来减少Cache的命中时间,提高性能,从而克服互连线延迟对大容量Cache的限制,已经成为微处理器片上存储结构的研究热点。本文回顾了非一致Cache体系结构模型的研究进展,特别是对片上多核处理器中的非一致Cache体系结构模型进行了详细介绍,比较了不同模型的贡献和不足。最后,对非一致Cache体系结构的发展进行了展望。  相似文献   

18.
In Kahn process network (KPN), the processes (nodes) communicate by unbounded unidirectional FIFO channels (arcs), with the property of non-blocking writes and blocking reads on the channels. KPN provides a semantic model of computation, where a computation can be expressed as a set of asynchronously communicating processes. However, the unbounded FIFO based asynchrony is not realizable in practice and hence requires refinement in real hardware. In this work, we start with KPN as the model of computation for GALS, and discuss how different GALS architectures can be realized. We borrow some ideas from existing dataflow architectures for our GALS designs.  相似文献   

19.
Architectures for Extreme-Scale Computing   总被引:1,自引:0,他引:1  
Torrellas  Josep 《Computer》2009,42(11):28-35
Extreme-scale computers promise orders-of-magnitude improvement in performance over current high-end machines for the same machine power consumption and physical footprint. They also bring some important architectural challenges.  相似文献   

20.
基于模糊逻辑的上肢康复机器人阻抗控制实验研究   总被引:1,自引:0,他引:1  
徐国政  宋爱国  李会军 《机器人》2010,32(6):792-798
针对机器人辅助患肢主动康复训练过程中辅助力/阻力不能随患肢病情实时调整的问题,提出了一种 新的模糊自适应阻抗力控制方法.该方法实时检测患肢与机器人之间的相互作用力,并进一步运用辨识算法实时估 计出患肢的病情状态;然后运用模糊阻抗控制器对两者之间的相互作用力进行实时调整,使得在患肢主动能力不 足时提供一定的辅助,而在其有能力完成动作时,实时调整阻力实现肌力训练.实验结果表明了该控制方法的有效 性.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号