The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, to introduce consistency and diversity, the concept of inertia weight is introduced to a modified genetic particle swarm optimization which was derived from the genetic particle swarm optimization (GPSO) and the differential evolution (DE). The proposed differential genetic particle swarm optimization (DGPSO) is implemented to thirteen well-known constrained optimization functions....
This paper presents a second-order sliding mode (SOSM) control for oscillation attenuation in a five degrees of freedom (5DOF) overhead crane. Furthermore the paper illustrates how the prefilter can be advantageously combined with the SOSM controller to obtain a better performance in the oscillation attenuation problem. Additionally, we present a comparison with the well known proportional-derivative...
This paper proposes a composite security index for the on-line critical contingency selection and ranking in terms of both the line flow and bus voltage limit violations. In order to evaluate the vector valued security index, a scalar index is derived based on the concept of hyper-ellipse inscribed within a hyper-box. The proposed index, which provides an efficient method for filtering and ranking...
This article presents a new current-mode squarer based on MO-CCTA (multiple output current conveyor transconductance amplifier). The circuit description is very simple, its construction consists of merely 2 MO-CCTAs. Without external passive elements, the proposed circuit is then suitable for IC architecture. The PSPICE simulation and experimental results are depicted, and agree well with the theoretical...
Preview Control is a field well suited for application to systems that have reference signals known a priori. The use of advance knowledge of reference signal can improve the tracking quality of the concerned control system. The classical solution to the Preview Control problem is obtained using the Algebraic Riccati Equation. The solution obtained is good but it is not optimal and has a scope of...
A feature-based parametric modeling software, Autodesk Inventor, is used for the main working subassemblies of 4U-1A Potato Harvester modeling. The movement of swing sieve, a key part of potato harvester, is simulated using the ADAMS. The complex velocity, acceleration and displacement curves as well as collision pressure curves are analyzed to provide theoretical foundation for the work of 4U-1A...
More than an adaptive system, the cognitive radio system should be a kind of intelligent system. In the paper, a Q-learning algorithm of the intelligent control theory is adopted to solve the sensing task selection problem among cognitive radio users in the distributed cognitive radio networks. In the proposed scheme, each cognitive radio user selects its sensing task through times of interaction...
In the context of sensor and ad hoc networks, wireless networking systems with mobile sensors have been studied enthusiastically for the applications to habitat and environment monitoring, and information communications between vehicles and portable devices. Since mobile objects move randomly and communicate each other wirelessly only on close ranges, it is possible to happen frequent disconnection...
A hybrid differential evolution (HDE) approach derived from both the differential evolution (DE) and the particle swarm optimization (PSO) is proposed. In HDE, individuals in a new generation are created, not only by crossover and mutation operation as in DE, but also by PSO operations. The concepts of inertia weight and neighbor topology are adopted in HDE. The former is employed to provide consistency...
Blind source separation (BSS) has been of great interest in many areas such as wireless communications and biomedical imaging. Since many of the existing BSS methods are based on a successive cancellation procedure for extracting all the unknown sources, they suffer not only from the error propagation accumulated at each stage but also from a long processing latency. Chen et al. recently proposed...
An approach for transforming UML statecharts into Projection Temporal Logic(PTL) formal models for system's simulation and verification is presented in this paper. UML Statechart is a graphic tool used to describe systems' behaviors, but it lacks formal semantics. PTL is a kind of temporal logic interpreted over discrete state sequences (intervals). With PTL, the formal semantics of UML Statecharts...
The 0-1 knapsack problem (KP) is a classical NP-hard problem with binary decision variables. The traditional differential evolution (DE) is an effective stochastic parallel search evolutionary algorithm and customized to continuous function optimization. To solve KPs, based on DE, a discrete binary version of differential evolution (DBDE) was employed, where each component of a mutated vector component...
Ensuring system dependability is a key problem to increase the user service performance. Depending on transcendental self-tuning knowledge, a system dependability self-tuning method based on grade optimization is proposed in this paper. It attempts to implement the sustained growth of system dependability by online dependability evaluation, dependability dynamic prediction and self-tuning scheme selection...
This paper describes the composition of virtual cutting system and the process of virtual cutting. Based on triangular mesh model, some issues, such as the judgment of cutting conditions and the access to cutting path, are studied in details. With the progressive mesh subdivision algorithm and the body element subdivision method, the mesh splitting process and the formation of kerfs are discussed,...
In this paper, the puncturing pattern design criteria for rate-compatible punctured turbo (RCPT) codes are reviewed at first. Then the optimal puncturing pattern design problem for RCPT codes are highlighted for turbo codes with specific interleaver instead of the uniform interleaver assumption. By employing the constrained subcode algorithm to calculate the low weight spectrum sequence, the optimized...
To specify dataflow applications efficiently is one of the greatest challenges facing Network-on-Chip (NoC) simulation and exploration. BTS (Behavior-level Traffic Simulation) was proposed to specify behavior-level applications more efficiently than conventional message-passing programming model does. To alleviate the complexity in parallel programming, BTS has the computation tasks implemented as...
In this paper, a teletraffic analysis method based on channel holding time statistics for new and handoff calls for system level performance evaluation of mobile cellular networks with link unreliability is developed. Firstly, mathematical expressions for the probability distribution function of channel holding time for new and handoff calls are derived considering different phase-type distributions...
Cellular automata (CA) has been increasingly used to simulate complex urban system, but urban land price is usually not considered in the simulation. This research selected Shijiazhuang city as study area and established city scale expansion model under restriction of land price. Through geometric correction, band combination and unsupervised classification of Landsar TM data using ERDAS 8.7 software,...
This paper proposes a cropping robust geometric distortion correcting algorithm for watermarked image using scale invariant feature transform. Centroid of the original watermarked image is calculated, and the features extracted from the triangles composed of the centroid and the scale invariant feature transform feature points are used to estimate the position of the point in attacked image that correspond...
As part of the resource allocation mechanisms, each router must implement some queuing discipline that governs how packets are buffered while waiting to be transmitted. Various queuing disciplines can be used to control which packets get transmitted (bandwidth allocation) and which packets get dropped (buffer space). The queuing discipline also affects the latency experienced by a packet, by determining...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.