共查询到20条相似文献,搜索用时 31 毫秒
1.
Shoude Li 《International journal of systems science》2014,45(11):2390-2401
Using the well-known Arrow and Karlin (1958) dynamic production–inventory model and the model with tradable emission permits which was presented by Dobos (2005, 2007), we develop a model of the production–inventory system with deteriorating items and tradable emission permits. The objective of this paper is to apply the optimal control theory to solve the production–inventory problem with deteriorating items and tradable emission permits, and derive the optimal inventory level and the optimal production rate that minimise the total cost. The results are discussed with a numerical example and a sensitivity analysis of the optimal solution with respect to the parameters of the production–inventory system is carried out. 相似文献
2.
Nita H. Shah Hardik N. Soni Jyoti Gupta 《International journal of systems science》2014,45(8):1723-1727
In a recent paper, Begum et al. (2012, International Journal of Systems Science, 43, 903–910) established pricing and replenishment policy for an inventory system with price-sensitive demand rate, time-proportional deterioration rate which follows three parameters, Weibull distribution and no shortages. In their model formulation, it is observed that the retailer's stock level reaches zero before the deterioration occurs. Consequently, the model resulted in traditional inventory model with price sensitive demand rate and no shortages. Hence, the main purpose of this note is to modify and present complete model formulation for Begum et al. (2012). The proposed model is validated by a numerical example and the sensitivity analysis of parameters is carried out. 相似文献
3.
Brad Nicholson 《Ergonomics》2014,57(9):1353-1365
Situational awareness is recognised as an important factor in the performance of individuals and teams in dynamic decision-making (DDM) environments (Salmon et al. 2014). The present study was designed to investigate whether the scores on the WOMBAT? Situational Awareness and Stress Tolerance Test (Roscoe and North 1980) would predict the transfer of DDM performance from training under different levels of cognitive load to a novel situation. Participants practised a simulated firefighting task under either low or high conditions of cognitive load and then performed a (transfer) test in an alternative firefighting environment under an intermediate level of cognitive load. WOMBAT? test scores were a better predictor of DDM performance than scores on the Raven Matrices. Participants with high WOMBAT? scores performed better regardless of their training condition. Participants with recent gaming experience who practised under low cognitive load showed better practice phase performance but worse transfer performance than those who practised under high cognitive load.Practitioner Summary: The relationship between task experience, situational awareness ability, cognitive load and the transfer of dynamic decision-making (DDM) performance was investigated. Results showed that the WOMBAT? test predicted transfer of DDM performance regardless of task cognitive load. The effects of cognitive load on performance varied according to previous task-relevant experience. 相似文献
4.
V. Hagenmeyer 《International journal of control》2013,86(10):1645-1663
A general flatness-based framework for non-linear continuous-time predictive control is presented. It extends the results of Fliess and Marquez (2000) to the non-linear case. The mathematical setting, which is valid for multivariable systems, is provided by the theory of flatness-based exact feedforward linearisation introduced by the authors (Hagenmeyer and Delaleau 2003b). Thereby differential flatness does not only yield an easy calculation of the predicted trajectories considering the respective system constraints, but allows to use simple linear feedback parts in a two-degree-of-freedom control structure. Moreover, this formalism permits one to handle non-minimum phase systems, and furthermore to deal with parameter uncertainties and exogenous perturbations. Respective robustness analysis tools are available. Finally, an induction drive example is discussed in detail and experimental results for this fast electro-mechanical system are presented. 相似文献
5.
We study the problem of how much error is introduced in approximating the dynamics of a large vehicular platoon by using a partial differential equation, as was done in Barooah, Mehta, and Hespanha [Barooah, P., Mehta, P.G., and Hespanha, J.P. (2009), ‘Mistuning-based Decentralised Control of Vehicular Platoons for Improved Closed Loop Stability’, IEEE Transactions on Automatic Control, 54, 2100–2113], Hao, Barooah, and Mehta [Hao, H., Barooah, P., and Mehta, P.G. (2011), ‘Stability Margin Scaling Laws of Distributed Formation Control as a Function of Network Structure’, IEEE Transactions on Automatic Control, 56, 923–929]. In particular, we examine the difference between the stability margins of the coupled-ordinary differential equations (ODE) model and its partial differential equation (PDE) approximation, which we call the approximation error. The stability margin is defined as the absolute value of the real part of the least stable pole. The PDE model has proved useful in the design of distributed control schemes (Barooah et al. 2009; Hao et al. 2011); it provides insight into the effect of gains of local controllers on the closed-loop stability margin that is lacking in the coupled-ODE model. Here we show that the ratio of the approximation error to the stability margin is O(1/N), where N is the number of vehicles. Thus, the PDE model is an accurate approximation of the coupled-ODE model when N is large. Numerical computations are provided to corroborate the analysis. 相似文献
6.
In this paper, we investigate new implementable cooperative adaptive backstepping controllers for a group of underactuated autonomous vehicles that are communicating with their local neighbours to track a time-varying virtual leader of which the relative position may only be available to a portion of the team members. At the kinematic cooperative control level of the autonomous underwater vehicle, the virtual cooperative controller is basically designed on a proportional and derivative consensus algorithm presented in Ren (2010), which involves velocity information from local neighbours. In this paper, we propose a new design algorithm based on singular perturbation theory that precludes the use of the neighbours’ velocity information in the cooperative design. At the dynamic cooperative control level, calculation of the partial derivatives of some stabilising functions which in turn will contain velocity information from the local neighbours is required. To facilitate the implementation of the cooperative controllers, we propose a command filter approach technique to avoid analytic differentiation of the virtual cooperative control laws. We show how Lyapunov-based techniques and graph theory can be combined together to yield a robust cooperative controller where the uncertain dynamics of the cooperating vehicles and the constraints on the communication topology which contains a directed spanning tree are explicitly taken into account. Simulation results with a dynamic model of underactuated autonomous underwater vehicles moving on the horizontal plane are presented and discussed. 相似文献
7.
It is necessary to welcome the publication of the paper by Park and Bongiorno Jr (Park, K. and Bongiorno Jr, J.J. (2009), ‘Persistent Inputs and the Standard H2-multivariable Control Problem’, International Journal of Control, 82, 2002–2012) in which the special cases in H2-optimisation problems are considered. However, for correct orientation of readers we would like to note some publications which, in our opinion, are connected to a problem given by Park and Bongiorno Jr (2009), but are absent there. 相似文献
8.
《Information Security Journal: A Global Perspective》2013,22(5):256-268
ABSTRACT Image hiding methods embed a secret image into a host image. The resultant stego-image does not attract the interceptors that would not detect the differences between the host image and the stego-image. To exploit the great developments in the area of image compression and to improve the quality of stego-image, this paper proposes a new method to embed the secret image into the host image. Basically, the secret image is compressed and then embedded into host image. The embedding method is based on the Optimal Pixel Adjustment Process (OPAP) and genetic algorithm. In the paper we addressed the important issues to build such systems. The experimental results showed that the proposed method can improve the quality from 60% to 80% when compared with the simple Least Significant Bit (LSB) replacement methods. Adding to that, the mean square error of the stego-image is much lower compared with other methods (Chan & Cheng, 2004; Chang, Hsiao, & Chan, 2003; Thien & Lin, 2003; Tseng, Chan, Ho, & Chu, 208; Wang, Lin, & Lin, 2001). Also, the proposed technique improves capacity. In other words, we can embed a secret image with size 450?×?450 inside a hosting image with size 512?×?512. 相似文献
9.
This paper extends the results of Zhang et.al. (1997) for linear periodically time-varying control to general linear time-varying (LTV) control. It is shown that linear time-invariant (LTI) control provides strictly better control performance than linear strictly time-varying control if l2 disturbance rejection of LTI plants is considered. The analysis is carried out in the frequency domain. This approach provides not only new results on disturbance rejection of LTV control but also some new insight into the properties of general LTV systems. 相似文献
10.
11.
In this article, we complement the shortcoming of the inventory economic production quantity (EPQ) model developed by Huang and Huang (2008), ‘Optimal Inventory Replenishment Policy for the EPQ Model Under Trade Credit Derived Without Derivatives’, International Journal of Systems Science, 39, 539–546), and propose an arithmetic–geometric inequality method to obtain the global optimal solution without taking complex differential calculus or using tedious algebraic manipulations. Finally, we provide an economical interpretation of the theoretical result so that the reader can understand the insight of the result. 相似文献
12.
13.
This article takes stock of the current state of research on knowledge processes in virtual teams (VTs) and consolidates the extent research findings. Virtual teams, on the one hand, constitute important organisational entities that facilitate the integration of diverse and distributed knowledge resources. On the other hand, collaborating in a virtual environment creates particular challenges for the knowledge processes. The article seeks to consolidate the diverse evidence on knowledge processes in VTs with a specific focus on identifying the factors that influence the effectiveness of these knowledge processes. The article draws on the four basic knowledge processes outlined by Alavi and Leidner (2001) (i.e. creation, transferring, storage/retrieval and application) to frame the investigation and discuss the extent research. The consolidation of the existing research findings allows us to recognise the gaps in the understanding of knowledge processes in VTs and identify the important avenues for future research. 相似文献
14.
15.
In manufacturing industries, the lifetime of an item is usually characterised by a random variable X and considered to be satisfactory if X exceeds a given lower lifetime limit L. The probability of a satisfactory item is then ηL := P(X ≥ L), called conforming rate. In industrial companies, however, the lifetime performance index, proposed by Montgomery and denoted by CL, is widely used as a process capability index instead of the conforming rate. Assuming a parametric model for the random variable X, we show that there is a connection between the conforming rate and the lifetime performance index. Consequently, the statistical inferences about ηL and CL are equivalent. Hence, we restrict ourselves to statistical inference for CL based on generalised order statistics, which contains several ordered data models such as usual order statistics, progressively Type-II censored data and records. Various point and interval estimators for the parameter CL are obtained and optimal critical regions for the hypothesis testing problems concerning CL are proposed. Finally, two real data-sets on the lifetimes of insulating fluid and ball bearings, due to Nelson (1982) and Caroni (2002), respectively, and a simulated sample are analysed. 相似文献
16.
Nughthoh Arfawi Kurdhi Joko Prasetyo Sri Sulistijowati Handajani 《International journal of systems science》2016,47(3):662-671
This paper presents and analyses the continuous review inventory model with order quantity, safety factor, back-order price discount, ordering cost and lead time as decision variables. Our work is based on the paper of Huang (2010). We extend the model to incorporate the situation when the amount received is uncertain. The lead time demand is assumed follows a normal distribution. A solution procedure is developed to find the optimal solution. A numerical example is given to illustrate the model. A sensitivity analysis is also included to describe the effects of changes in the model parameters on the expected annual cost. 相似文献
17.
Louis Kruh 《Cryptologia》2013,37(2):143-149
Abstract In this article, a simplified version of the International Data Encryption Algorithm (IDEA) is described. This simplified version, like simplified versions of DES [8-12] and AES [6 7] that have appeared in print, is intended to help students understand the algorithm by providing a version that permits examples to be worked by hand. IDEA is useful teaching tool to help students bridge the gap between DES and AES. 相似文献
18.
Leap et al. (2016) reduced the time complexity of the Bauer-Millward (2007) ciphertext-only attack on the Hill cipher from 𝒪(Ln) to 𝒪(Ln?1), where L is the length of the alphabet, and n is the block size. This article presents an attack that reduces the complexity to 𝒪(Ln?1?s), 0?≤?s?≤?n???1. The practical limitation on the size of s is the memory available on the computer being used for the attack. Specifically, the computer must be able to hold Ls integer arrays of length N, where N is the number of blocks of ciphertext. The key idea is not to iterate over potential rows of the decryption matrix, but to iterate over randomly chosen characters in the plaintext. This attack also admits a straightforward parallel implementation on multiple processors to further decrease the run time of the attack. 相似文献
19.
Chris Meigh-Andrews 《Digital Creativity》2013,24(2):112-114
The Brainstorm feature introduced in Adobe After Effects CS3 (2007) allows users to automate parts of the process of generating design variations for the purposes of comparison and selection. The paper begins with a brief discussion of current discursive formations around software and software-based practice among digital design practitioners and educators. Next, the paper draws upon critical concepts drawn from multimodal discourse analysis, media theory and sociology to analyse Brainstorm in terms of the interplay of software structure and design agency. The key concepts used are modality, articulation and interpretation (Kress and van Leeuwen 1996, 2001), the database as cultural form and the logic of selection (Manovich 2001), habitus and practical logic (Bourdieu 1977) and the radius of creativity (Toynbee 2000). Throughout, the paper addresses specific structural features of the software, thus developing an overview of the affordances and constraints of Brainstorm as a creative tool. 相似文献
20.
In this article the idea of inversion-based direct input reconstruction for robust detection, separation and estimation of multiple simultaneous faults in the presence of persistent disturbances which proved to be non-separable by conventional decoupling methods in linear dynamical systems is presented. In particular, it is shown how in a specific filtering structure a residual generator, relying on the inverse representation of the system, by means of estimation of the inverse dynamics can be designed providing robust fault decoupling. In the development of the method three solution approaches are contrasted with each other. In the first approach the traditional H ∞ filter providing the classical disturbance attenuated non-decoupling solution is presented. Then, in a novel solution, an H ∞ detection filter on the inverse system is designed providing detection residuals by exact fault decoupling; the estimation of the inverse dynamics is obtained by means of the optimal filter, thus ensuring H ∞ disturbance attenuation on the residual output. Finally, an observer-based residual generator for the estimation of the inverse dynamics is designed resulting in detection residuals with exact fault and disturbance separation, which characterises this novel idea in its extremes. The feasibility of the solution to problems not solvable earlier is demonstrated based on an aircraft monitoring application example that was originally considered in Douglas and Speyer (1995) and Chung and Speyer (1998). 相似文献