The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose an underactuated mechanical system named inverted pendulum on a cart beam system. The proposed system has three degrees-of-freedom and one control input. The mathematical model is derived using Lagrangian method and the stabilization is achieved with constraints using a linear controller designed based on linear matrix inequality approach. Simulation results are presented to validate the...
In a multi-agent system (MAS), the agents are often considered to be autonomous entities, such as robots or software programs, each under the influence of a local rule, representing its interaction with other agents. Over the past few years, most research in the study of discrete-time MAS's concentrates on linear local rules. However, local interactions between agents are more likely to be governed...
Traditional queueing research has concentrated mainly on design, performance and running of the service facility with customers arriving following a stochastic process. In this paper we develop a behavioral model of a queueing system including repeat (returning) customers using a combination of cellular automata models (CA) and genetic algorithms (GA). An agent based evolutionary approach using simulation...
An important practical application of secure sensor networks is to monitor an area that may be divided into a square grid, where the sensor devices may be placed at the points of intersection with reasonable precision. In this paper, a simulation method to analyze and design such a network is discussed. The use of simulation technique is essential to determine the robustness (in terms of connectivity...
We propose and study a message diffusion network model of IM system with local-world preferential connections and acquaintance introduction mechanisms, which exist in IM system. We put forward the algorithms to generate the message diffusion network model and through simulation results we talk about the topological properties of this network. The topological properties such as degree distribution,...
This paper focuses on the resource scheduling of LTE-Advanced system with carrier aggregation. With different fading characters, the aggregated carriers have different coverage between each other. Consequently, the carrier aggregation causes that the number of carriers which users can be scheduled on is various. The allocation fairness can not be achieved with the original proportional fair (PF) scheduling...
Reduction of overhead is essential in increasing the scalability and power efficiency of peer-to-peer (P2P) file sharing systems for mobile ad hoc networks (MANET). Previously researchers mainly focused on reducing overhead of query process, and paid little attention to file transfer process. This paper presents a cluster-based P2P file sharing protocol for MANET, focusing on file transfer process...
Design of experiments is often used to better understand or improve the output measures of a simulation model. Traditional cuboidal and spherical designs have been effective when the factor input regions are known. However, often in practice, simulation models have additional stochastic constraints causing the input factor space to be restricted and irregularly shaped. This paper looks into several...
By integrating the recursive and iterative thoughts commonly used in modeling fractals, an intelligent plant simulation technique is presented in the paper. With the technique, not only can the overall shapes and details of plants be controlled interactively by designing parametric fractals and parameterized growth process of fractals, but also the complexity in space and time of fractal-plants be...
This paper examined the social network construction mode based on connected network component under dynamic alliance environment. We assume that firms in one industry participant in alliances dynamically and simulation results show how the alliance network factors influence the social network information sharing performance. Four propositions in a long-term and no extreme value context are built:...
This paper founds the model of equipment support process based on multi-Agent system and designs the simulation realization of the model, through the analysis of equipment support process, the expatiation of the functions and structure of support process model, and the discussion of communication of MAS based on the blackboard system.
In order to reduce the calculation time of FFT, this paper analyzes the theory of FFT, and presents a new method to compute Cooley-Turkey FFT which is based on pipelined stream. After Matlab, ISE simulation and FPGA experiment, the results show that: this method uses only 42 us to compute 4096 points FFT which is less than 2/3 time comparing to previous methods. It offers a better DFT method for high...
The tracking control and chaotic synchronization problem for a class of continuous time uncertain chaotic system is studied. A fuzzy sliding mode variable structure control approach is proposed. A controller based on the fuzzy sliding mode variable structure approach is designed and the stability of the control system is proved by Lyapunov stability theory. Using this controller, two chaotic systems...
In order to research the damage on weapon equipment by explosive shock wave, simulation experiments were carried out to study explosive impact damage on cantilever box girder. By using principal component analysis (PCA), it presented a data mining method on cantilever box girder damage. It showed that: the calculating result by using this method was agreeable with the result by using traditional method...
The new perfect complete generalized complementary orthogonal code group, which has perfect aperiodic auto-correlation function and cross-correlation function, is constructed. Two new methods, which are based on Schweitzer's concept and theory of overlap and reuse, are adopted to improve the code efficiency. There is no adjacent cell interference for the ideal auto-correlation function and cross-correlation...
The fuzzy rule sets, which have been widely used in avionic fault diagnosis system, have considerable redundancy that leads to time-consuming faults location process. In this paper, to reduce the redundant rules, a multiple objective genetic algorithm, MOGAII, is used to optimize a fuzzy rule set. The optimization problem with two objectives, the maximization diagnostic capability of the system and...
Sensor localization is a necessary and key functionality for the deployment of wireless sensor network (WSN) applications. This paper investigates on the range-free localization approaches for low hardware requirement. A modified DV-Hop localization algorithm is designed to reduce the localization error. The modified DV-Hop uses a novel average hop size estimate scheme, in which the local property...
The integrative approach of systems biology promises a better understanding of complex phenotypes such as cardiovascular disease, diabetes or chronic obstructive pulmonary disease (COPD). It aims to interconnect current knowledge with experimental data, in-silico analysis and simulation. To this end the existing knowledge must be semantically integrated in a single environment and dynamically organised...
Localization is an important research issue in Wireless Sensor Networks (WSNs). Recently, hop-count-based localization has been proposed as a cost-effective alternative to range-based localization algorithms. Traditionally, hop-counts between any pair of nodes can only take on integer values regardless of relative positions of nodes in the hop. We show that by partitioning a node's one-hop neighbor...
A direct power control (DPC) scheme for three-phase PWM rectifier based on sliding-mode variable structure control theory is presented. Compared with the traditional PI controller, the proposed scheme is much more robust with better transient performance, lower total harmonic distortion (THD) and simpler tuning of parameters. Modeling and simulation done in MATLAB/SIMULINK environment shows that the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.