首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 218 毫秒
1.
We consider optimal control of a bilinear parabolic equation. The determination of such control requires to minimize a given energy performance measure. The performance measure of the system is taken as a combination of its modified total energy and the penalty term describing the approach used in the control process. Using an appropriate transformation modal expansion, the optimal control of a distributed parameter system (DPS) is simplified into the optimal control of a bilinear time-varying lumped parameter system (LPS). A computational efficient formulation to evaluate the optimal trajectory and control of the system is determined. It is based on the parametrization of the state and control variables by using finite wavelets. Numerical examples are provided to demonstrate the applicability and the efficiency of the proposed method and the results are quite satisfactory.  相似文献   

2.
SERCOS is a data exchange protocol between CNC -controller and digital drives. The author developed an Active SERCOS Card based on PC ISA bus. With this card, we can control digital drives with SERCOS interfaces without any detailed knowledge of SERCOS. This paper introduces the hardware and software architectures of the card.  相似文献   

3.
The IEEE 802.15.4 specification is a recent low data rate wireless personal area network standard.While basic security services are provided for,there is a lack of more advanced techniques which are indispensable in modern personal area network applications.In addition,performance implications of those services are not known.In this paper,we describe a secure data exchange protocol based on the ZigBee specification and built on top of IEEE 802.15.4 link layer.This protocol includes a key exchange mechanism.We assume that all nodes are applying power management technique based on the constant event sensing reliability required by the coordinator.Power management generates random sleep times by every node which in average fairly distributes the sensing load among the nodes.Key exchange is initiated by a cluster coordinator after some given number of sensing packets have been received by the coordinator.We develop and integrate simulation model of the key exchange and power management technique into the cluster's reliable sensing function.We evaluate the impact of security function and its periodicity on cluster performance.  相似文献   

4.
WinCC V6归档数据处理   总被引:7,自引:0,他引:7  
  相似文献   

5.
Supervisory control is a very popular paradigm for computer-controlled systems. Knowledge and tracking the control effect of every control operation is crucial to the control tasks. In the paper, we present a message-array-based mechanism to track control effects in supervisory control software. A novel data type, message array, is designed to efficiently support this tracking mechanism. The operation algorithms, adding algorithm (AA), removing algorithm (RA), and scheduler algorithm (SA) are proposed to operate the tracking messages in message array, which forms the special first input X output (FIXO) strategy of message array. Automatically tracking, recording, and rolling back are the characteristics of our tracking mechanism. We implement this messagearray-based mechanism on the famous human machine interface (HMI) software platform-proficy iFix, and construct experiments to evaluate the performance of the mechanism in various cases. The results show our mechanism can be well satisfied with supervisory control software.  相似文献   

6.
Accuracy of machine learners is affected by quality of the data the learners are induced on. In this paper, quality of the training dataset is improved by removing instances detected as noisy by the Partitioning Filter. The fit dataset is first split into subsets, and different base learners are induced on each of these splits. The predictions are combined in such a way that an instance is identified as noisy if it is misclassified by a certain number of base learners. Two versions of the Partitioning Filter are used: Multiple-Partitioning Filter and Iterative-Partitioning Filter. The number of instances removed by the filters is tuned by the voting scheme of the filter and the number of iterations. The primary aim of this study is to compare the predictive performances of the final models built on the filtered and the un-filtered training datasets. A case study of software measurement data of a high assurance software project is performed. It is shown that predictive performances of models built on the filtered fit datasets and evaluated on a noisy test dataset are generally better than those built on the noisy (un-filtered) fit dataset. However, predictive performance based on certain aggressive filters is affected by presence of noise in the evaluation dataset.  相似文献   

7.
8.
In this paper,the problem of increasing information transfer authenticity is formulated.And to reach a decision,the control methods and algorithms based on the use of statistical and structural information redundancy are presented.It is assumed that the controllable information is submitted as the text element images and it contains redundancy,caused by statistical relations and non-uniformity probability distribution of the transmitted data.The use of statistical redundancy allows to develop the adaptive rules of the authenticity control which take into account non-stationarity properties of image data while transferring the information.The structural redundancy peculiar to the container of image in a data transfer package is used for developing new rules to control the information authenticity on the basis of pattern recognition mechanisms.The techniques offered in this work are used to estimate the authenticity in structure of data transfer packages.The results of comparative analysis for developed methods and algorithms show that their parameters of efficiency are increased by criterion of probability of undetected mistakes,labour input and cost of realization.  相似文献   

9.
Most organizations that depend on software are pursuing more flexible architectures and more agile life-cycle processes to increase business flexibility. What does agility look like, and how do we measure it? A truly agile project or organization should experience changes that are more straightforward and more predictable. Consequently, improvements are best measured by gauging the change trends in software baselines. A well-accepted tenet of software engineering states, "The later you are in the life cycle, the more expensive things are to fix." This iron law, an artifact of a waterfall culture, should not apply if you have transformed to agile software delivery with a well-architected system. This bold assertion is the root of the metric patterns presented in this paper.  相似文献   

10.
白涛  吴智铭 《自动化学报》2007,33(9):963-967
A hybrid bandwidth scheduling scheme is proposed to improve the quality of service and the bandwidth utilization for the CAN-based networked control systems. It combines rate monotonic and improved round-robin scheme for both the real-time and non-real-time data. Moreover, considering the constraints of control performance and network schedulability, a heuristic branch and bound genetic algorithm (GA) algorithm is presented for the control data to minimize their bandwidth occupancy and the jitter caused by improper scheduling. The residual bandwidth is allocated to non-real-time data by the proposed scale round-robin scheme such that their network loads are balanced.  相似文献   

11.
在航天测控软件系统中,大量存在各种测量数据在软件间进行交换的情况.而数据交换软件的性能又在很大程度上影响着测控软件的质量.在实时测控应用软件运行过程中出现的一些难于查找和确定的问题中,有很多是由数据交换软件引起的.因此,在进行实时测控应用软件设计时,对数据交换软件的性能进行分析是非常必要的.本文首先建立了实时数据交换软件的Petri网模型,然后对模型进行了化简和动态分析,给出了缓冲溢出的异常控制设计,随后采用基于Petri网的方法对数据交换软件的性能进行了定量的分析与讨论.  相似文献   

12.
任爱华  杜悦冬 《软件学报》2001,12(7):1064-1073
多处理机环境下的实时系统具有并发事件驱动性质,其软件结构展现了多重同步点以及生产者与消费者之间的关系,这导致了复杂的控制结构.对于此类系统软件的开发缺少标准的方法和工具,造成了软件低效、程序结构不清晰、开发成本高、维护困难的现象的出现.根据Petri网易于描述并行/并发现象的特点,采用它来解决多处理机软件的描述问题,介绍了一种以Petri网图形方式在多处理机系统环境下进行程序设计的方法.该方法基于两种程序设计级别:任务级和作业级.前者负责描述基本操作,由单一控制线程完成;后者用于并行/并发程序建模,由整个多处理机系统来执行.在作业级程序设计中,用户采用面向对象Petri网来描述并行程序结构,以建立系统模型.该方法以一种接近于程序员的思维方式去设计并发软件,提供了一种可靠的并行结构的程序.阐述了支持此种程序设计方法的操作系统结构及其实现原理.  相似文献   

13.
基于反馈控制的过程控制实时数据库系统设计   总被引:1,自引:0,他引:1  
研究了当前先进过程控制系统的软件体系结构,针对复杂过程控制系统中的海量数据,设计了一种基于反馈控制的实时性能优良、硬件局限性小的全开放式实时数据库模型.在该控制系统的软件体系中,依据优化数据库缓冲区管理算法的原则,设计并应用了先进的内存页面置换算法,增强了实时数据库的实时性能,改善了海量数据对物理内存的瓶颈要求.基于该算法的FD RTDB数据库已在过程控制领域得到实际应用.  相似文献   

14.
Petri nets are a powerful formalism for the specification and verification of concurrent systems, such as sequential systems and manufacturing systems. To deal with real-time systems whose time issues become essential, different extensions of Petri nets with time have been proposed in the literature. In this paper, a new scheduling and control technique for real-time systems modeled by ordinary P-time Petri nets is proposed. Its goal is to provide a scheduling for a particular firing sequence, without any violation of timing constraints ensuring that no deadline is missed. It is based on the firing instant notion and it consists in determining an inequality system generated for a possible evolution (in terms of a feasible firing sequence for the untimed underlying Petri net) of the model. This system can be used to check reachability problems as well as evaluating the performances of the model considered and determining the associated control for a definite functioning mode and it introduces partial order on the execution of particular events.  相似文献   

15.
基于Petri网的分布式实时嵌入式系统调度的建模   总被引:5,自引:0,他引:5  
提出了一种基于资源的时间Petri网模型,以便建模分布式实时嵌入式系统中的静态调度,分析系统性能。该模型将处理器资源和通信资源,以及相应的优先级附着到变迁上,从而建模以下的分布式实时嵌入式系统:在单处理器上采用基于固定优先级的抢先式调度,处理器之间的通信采用基于固定优先级的不可抢先式调度。最后分析了该模型的语义、性质以及状态类图的构造方法。  相似文献   

16.
田中大  高宪文  李琨  李绍武 《信息与控制》2012,41(1):117-122,128
以交换式工业以太网网络控制系统为研究对象,针对采用IEEE 802.1p优先权调度的交换机内部排队延迟,提出了调度改进构想,对硬实时数据流和非硬实时数据进行区别处理.构建了一个典型的树形拓扑交换式以太网模型,计算了优先权调度改进后周期性实时数据帧在各个传输环节的最大延迟,同时推导了优先权调动改进方案应满足的基本条件.最后通过OPNET软件进行了仿真验证,结果表明IEEE 802.1p优先权调度协议改进可以提高工业以太网中硬实时数据传输的实时性.  相似文献   

17.
Model continuity in the design of dynamic distributed real-time systems   总被引:1,自引:0,他引:1  
Model continuity refers to the ability to transition as much as possible a model specification through the stages of a development process. In this paper, the authors show how a modeling and simulation environment, based on the discrete event system specification formalism, can support model continuity in the design of dynamic distributed real-time systems. In designing such systems, the authors restrict such continuity to the models that implement the system's real-time control and dynamic reconfiguration. The proposed methodology supports systematic modeling of dynamic systems and adopts simulation-based tests for distributed real-time software. Model continuity is emphasized during the entire process of software development $the control models of a dynamic distributed real-time system can be designed, analyzed, and tested by simulation methods, and then smoothly transitioned from simulation to distributed execution. A dynamic team formation distributed robotic system is presented as an example to show how model continuity methodology effectively manages the complexity of developing and testing the control software for this system.  相似文献   

18.
In many automated systems such as manufacturing systems and process plants, a fieldbus is a very important component for the exchange of various and sometimes crucial information. Some of the information has a tendency to rapidly lose its value as time elapses after its creation. Such information or data is called real-time data that includes sensor values and control commands. In order to deliver these data in time, the fieldbus network should be tailored to have short delay with respect to the individual time limit of various data. Fine-tuning the network for a given traffic requires knowledge on the relationship between protocol parameters such as timer values and performance measure such as network delay. This paper presents a mathematical performance model to calculate communication delays of the Profibus FMS network when the timer value and the traffic characteristics are given. The results of this model are compared to those from experiments to assess the model's validity.  相似文献   

19.
基于点对点即时信息交换安全通信协议模型研究   总被引:3,自引:0,他引:3  
基于点对点即时信息交换在互联网中的应用十分普及,在给人们提供快捷方便的通信服务的同时,也带来了许多安全威胁,针对点对点即时信息交换的攻击越来越频繁。文章基于信息加密理论和点对点即时通信技术的特点,提出了点对点即时信息交换安全通信协议模型,并对该模型所面临的主要安全性进行了分析。  相似文献   

20.
给出了以审慎Agent和反应Agent模型为基础的混合Agent模型,并对模型的有关概念进行了说明.在混合Agent模型框架下,提出了实时分布系统软件设计方法,主要内容包括采用UML并且充分考虑系统的动态和静态特征的本体设计过程,基于本体的交互协议Petri网形式化描述以及行为规范分类和设计.通过设置反映内存保证混合Agent对事件实时响应,而审慎Agent部分的存在使基于Agent的精神状态和输入事件的推理成为可能.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号