Earticle

현재 위치 Home

International Journal of Control and Automation

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJCA) [Science & Engineering Research Support Center, Republic of Korea(IJCA)]
  • pISSN
    2005-4297
  • 간기
    월간
  • 수록기간
    2008 ~ 2016
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
vol.3 no.1 (4건)
No
1

Neural Network Observer for Nonlinear Systems Application to Induction Motors

A. N. Lakhal, A. S. Tlili,, N. Benhadj Braiek

보안공학연구지원센터(IJCA) International Journal of Control and Automation vol.3 no.1 2010.03 pp.1-16

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, we investigate the problem of Neural Network (NN) observer for nonlinear systems. Therefore, it can be applied to systems with higher degree of nonlinearity with any a priory knowledge about system dynamics. The proposed neuro-observer is a three-layer feedforward neural network, which is trained extensively with the error backpropagation learning algorithm including a correction term to guarantee good tracking as well as bounded NN weights. Furthermore, the Lyapunov’s direct method is used in order to ensuring the stability of the proposed non-conventional observer and of the NN weight errors. The effectiveness of the proposed state observer scheme is demonstrated through numerical simulation to reconstruct the unavailable state variables of an induction motor (IM) and especially the rotor flux despite the effect of the arisen parameters such as the load torque which is also reconstructed using the NN observer.

2

Urban Computing and Information Management System Using Mobile Phones in Wireless Sensor Network

Kheyali Mitra, Debnath Bhattacharyya, Tai-hoon Kim

보안공학연구지원센터(IJCA) International Journal of Control and Automation vol.3 no.1 2010.03 pp.17-26

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

At present, information Management using mobile phone in Wireless Sensor Network is the commonest factor. Mobile phone will be the main access point in Wireless Sensor Network. The system will be as simple as possible providing all the facilities those are available in web based rather PC based applications regarding this. A wireless mesh network furnishes the WSN and the mobile phones are going to be the nodes or access points of this network Not only the queries of mobile users, some predefined activities like error messages or warning messages after sensing the system environment can also be available in this system. A simple user friendly GUI is implemented for user. There is a server to authenticate the logged in user, listen to the requests submitted by user and replies them accordingly. The user has two choices using which he/she can get the required information namely (i) get the reports regarding all/individual tags and or routes, emergency messages, sensors and also the location information; (ii) send actuation command to the server using which immediate decision about the system can be taken from server side. The user can see the report in their phone’s display screen. Thus to communicate with WSN anywhere, anytime can assist any remote user most efficiently.

3

Palm Vein Authentication System: A Review

Ishani Sarkar, Farkhod Alisherov, Debnath Bhattacharyya, Tai-hoon Kim

보안공학연구지원센터(IJCA) International Journal of Control and Automation vol.3 no.1 2010.03 pp.27-34

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper presents a review on the palm vein authentication device that uses blood vessel patterns as a personal identifying factor. The vein information is hard to duplicate since veins are internal to the human body. The palm vein authentication technology offers a high level of accuracy. Palm vein authentication uses the vascular patterns of an individual’s palm as personal identification data. Compared with a finger or the back of a hand, a palm has a broader and more complicated vascular pattern and thus contains a wealth of differentiating features for personal identification. The importance of biometrics in the current field of Security has been depicted in this work. We have also outlined opinions about the utility of biometric authentication systems, comparison between different techniques and their advantages and disadvantages in this paper. Several banks in Japan have used the palm vein authentication technology for customer identification since July 2004. In addition, Fujitsu has integrated the technology into the access control of electronic door lock systems. Fujitsu plans to further expand applications for this technology by downsizing the sensor and improving the verification speed.

4

Quadratic Stablizability for Polytopic Uncertain Continuous-Time Switched Linear Systems Composed of Two Subsystems

Naohisa Otsukay, Takuya Soga

보안공학연구지원센터(IJCA) International Journal of Control and Automation vol.3 no.1 2010.03 pp.35-42

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper we study quadratic stabilizability via state feedback for continuous-time switched linear systems whose subsystem’s matrices are represented as a polytopic linear combination of vertex matrices. Necessary and sufficient conditions for polytopic uncertain continuous-time switched linear systems composed of two subsystems to be quadratically stabilizable via state feedback are proved.

 
페이지 저장