2016 (466)
2015 (468)
2014 (466)
2013 (216)
2012 (66)
2011 (34)
2010 (19)
2009 (19)
2008 (8)
Design and Simulation of Fractional Order Control Systems Based on Bode’s Ideal Transfer Function
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.1-8
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Design of Tire Surface Check System with the Laser Sensor
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.9-14
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Vehicle tire should support the vehicle weight, deliver its own driving force and the braking force to the road surface, alleviate the impact applied from the vehicle, and switch hemistich progression such as the very important role in the automobile parts. The tire is one of the important parts of the car; a small error can affect the driver and passenger’s safety. There are a number of problems with the tires, but generally we can divide them into two kinds: normal wear and abnormal wear. The normal tire wear occurs by driving, it can be replaced when mileage reaches recommended distance. The abnormal tire wear, unlike the usual wear, wears down tires unevenly or wears out only part of the tires. Until now, the method to check abnormal tire wear is that a mechanic checks tires with naked eyes and hands to confirm uneven tire wear. However, drivers are embarrassed when facing varied and vague rules of uneven wear, even for each tire. In this paper, the researchers have designed a system to check each tire wear by using one or two laser sensors in order to make up for this weakness and overcome the limits of subjective judgment and obtain objective, accurate judgment.
Research on Current General Aviation Operational Control System
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.15-20
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
As the rapid development of general aviation and the growing number of the aviation enterprise and aircraft, a great pressure comes to industry supervision of civil aviation and operational control of general aviation. Because of the shortage of solution of the general aviation, there’s a big difficulty on operational protection. This paper elaborates the current situation of general aviation enterprise of our country, analyzes the shortage of it, combines with the characteristic of general aviation operational control and units being researched, and has a systematic research, then ensures the need of general aviation enterprise‘s operational control.
LMI-based H2 Control for T-S Fuzzy System with Hard Constraints
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.21-30
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
For T-S fuzzy systems with hard constraints and disturbances modeled by impulses, a constrained H2 control scheme in the framework of LMI (Linear Matrix Inequality) optimization is proposed in this paper. First, the H2 norm is chosen as measurement of disturbance attenuation level, and sufficient conditions for guaranteeing an H2 performance are given. Then, under the bound assumption of the disturbance energy, another fixed ellipsoid containing all perturbed trajectories is confirmed. Finally, hard constraints are enforced and translated into LMI conditions. The multi-objective design is lead to solving an optimization problem with LMI constraints. Simulation results for application in TORA system are discussed.
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.31-36
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This study is to analyze the subthreshold transmission characteristics for the change of gate voltage of asymmetric double gate MOSFET. Asymmetric double gate MOSFET has the advantage of reducing short channel effects by controlling current flow by top/bottom gate voltage. Hermeneutical potential distributions were obtained by using Poisson’s equation to analyze transmission characteristics by top/bottom gate voltage. Gaussian function was used as charge distribution. In order to analyze off-current and subthreshold swing, hermeneutic potential distributions were used. In conclusion, it was found that off-current depended on electron concentration affecting current flow, and subthreshold swing depended on the conduction path. Therefore, transmission characteristics of subthreshold were greatly affected by top/bottom gate voltage, which should be considered designing asymmetric double gate MOSFET.
The Development of Chemico-mechanical Practices in Polymer Material Machining by Cutting
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.37-44
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The analysis of phenomena taking place when polymers interact with aggressive mediums has been made. Corresponding experimental research has been done and methods to direct changes of proceed material have been developed. The changes happen when the surface layer is processed preliminary to lower resistance to destruction of work piece surface layer when it interacts with cutting instrument later. The polymeric composites materials (PCM), having specific characteristic self lubrication, have got the name-the materials antifrictional selflubrication (MAS). In compositions MAS except matrixes-of the thermoreactive resins are included special fillers. The structure material in defines the characteristic received products. For the reason increasing working characteristic PCM necessary study of the influence of the thermodynamic conditions centrifugal litho on shaping the structure PCM. For study of the influence technological parameters is required corresponding to equipments.
OR-based Block Combination for Asynchronous Asymmetric Neighbor Discovery Protocol
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.45-52
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The neighbor discovery protocol (NDP) is one of the critical research subjects in wireless sensor networks (WSNs) for efficient energy management of sensor nodes. A block design concept can be applied to find a neighbor discovery schedule that guarantees at least one common active slot between any pair of sensor nodes. However, the block design-based solutions in literature are not flexible enough because block design cannot support asymmetric asynchronous operations. In this paper, we introduce a new approach for asymmetric asynchronous neighbor discovery protocol that combines two optimal block designs using the OR operation. OR-based block combination solves the problem of original block design, which cannot support asymmetric scenarios. We evaluate the performance of OR-based block combinations using a simulation study. According to our simulation results, OR-based block combination performs up to 71% better than other asymmetric algorithms, such as U-Connect and Disco with 10% and 1% duty cycles.
Improved Artificial Bee Colony Algorithm and Application in Path Planning of Crowd Animation
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.53-66
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Crowd animation is a new and continuous challenge in computer animation. In tradition, crowd animation can be realized by key frame technology, and animators should set every character’s expression, action, motion, and behavior. Therefore animators’ workload by hand will increase tremendously with characters growing, which lead to difficult to realize crowd animation for low efficiency and poor global controllability, especially in path planning by appointing a target position for each individuals. In order to overcome these, an improved artificial bee colony (IM-ABC) algorithm is proposed to apply on the path planning of crowd animation. The IM-ABC is fit to simulate the crowd motion in animation based on the following two merits over the others in crowd animation. One is the rule of role transformation, which can make the rapid convergence of the result and avoid getting trapped in the local optima. The other is the realization of multi-object optimization in the process of iteration, which reaches the uniformly distributed result of swarm motion and especially fits to realize the path plan. In this paper, we simply reviews classical ABC algorithm proposed by Karaboga at the beginning. Then, in order to speed the convergence and make individuals generate paths more realistic and natural, some measures are taken to modify the classical ABC (called IM-ABC) algorithm, which include initializing colony based on chaos sequence, self-adaptively selecting the follower bees, and adaptively controlling parameters, etc. After the experiments of benchmark functions, the results confirm that the IM-ABC have better performance than the classical ABC algorithm and others. Finally, the IM-ABC algorithm is used for path planning to generate the route from the initial to the destination without collision. Through simulation experiments based on four motion models it is showed that this method can succeed generating the optimum paths with efficiency, intelligence, and natural features.
Obstacle Avoidance with Formation Kept for Multi-agent
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.67-74
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, we present a new approach to obstacle avoidance for a group of agents moving in a formation. The goal of the group is to move through a partially unknown environment with obstacles and keep the formation until they have reached the destination. The approach proposed treats the multi-agent in the formation as a whole, and sets a free region for all the agents, in which the agents can keep the formation and avoid the obstacles. Consequently, the problem of obstacle avoidance of each agent is transformed to the problem for the leader to look for the free region around the obstacles. We illustrate the method with an example. The simulation results show the feasibility of the proposed obstacle avoidance method.
Adaptive In-Car External Applications using Nomadic Smartphones and Cloudlets
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.75-80
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Computerized in-vehicle systems are used to generate data about vehicle operations such as vehicle on-board diagnostics and vehicle information obtained from devices mounted on road infrastructures. Detectors located along the roadside are pivotal to Intelligent Transport Systems services, including real time management of driven information. In this paper, we propose a model that affords in-car external applications based on nomadic smartphone, virtual machine-based cloudlets, and car manufacturer’s private cloud computing that on one side delivers remote diagnostic and vehicle performance information software as a service and can also be viewed as a doorway to deliver cloud based applications on other side. Virtual machine-based Cloudlet is used to improve response time extended by diverse communication latencies. We designed a remote vehicle assignation cloud computing platform service responsible for real time analysis of vehicle information and providing internet applications to the car user by using a vehicle-to-smart phone applications interface approach, which helps the smartphones to act as a remote user which passes driver inputs and delivers output from external applications.
A Design of Aircraft Grid Harmonic Detection Device using DSP and ARM
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.81-98
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In order to detect the aircraft grid harmonic better, we design a kind of dual CPU harmonic detection device based on Digital Signal Processor (DSP) and ARM. Harmonic detection algorithm using the combination algorithm of FFT and wavelet transform. The measured signal through binary wavelet transform is separated into high frequency part and low frequency part, high frequency part by wavelet analysis can get the transient component, and low frequency part by FFT can get each steady-state harmonic parameters. By this method we can not only get the every steady-state harmonic component, but also determine the transient and sudden change signals. Design of ARM software adopts the embedded Real-Time Operating System (RTOS) of μC/OS-Ⅱ. This device makes full use of the powerful control ability of ARM and the powerful operation ability of DSP, and can achieve a precise measurement of the harmonic in aircraft grid.
A New Surveillance Method of Machine Status using Big Data
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.99-108
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
As the development of science and technology, especially the network and IT techniques, lots of enterprises are facing the floods of data, which brings new challenges such as the storage, processing, and application under the new era. As in the industry area, the data will increase in tremendous level and their relations are more and more complex. That results in great issues when enterprises are contemplating to using the rich information or knowledge hidden from the huge data sets. In order to investigate the trends of the machine status from big data, this paper examines the coal milling machine’s abrasion, which is usually monitored. The surveillance is changing along with the time, which is able to reflect the abrasion trends so that the machine maintenance and breakdown could be easily carried out. Given the characteristics of big data in industrial field, this method proposes a multi-scale system with the entropy and energy to reflect the machine status in large scales. Two experiments are carried out to examine the methods. It is founded that, as the time increasing, the changes are becoming larger.
An Integrity Checking Mechanism Using Physical Independent Storage for Mobile Device
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.109-114
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The dissemination of smartphones is rapidly progressing and there are many similarities of smartphones and PCs in terms of security risks. Recently, in mobile network environment, there is a trend of increasing damages and now, there are lots of active research on a system that can comprehensively respond to this. As a way to prevent these risks, integrity checking method on operation system is being researched. As most integrity checking algorithms are classified by verification from the levels before booting the OS and at the time of passing on the control to the OS, in which, there are minor differences in the definitions of integrity checking or its methods. This paper researched the verification techniques for OS integrity that can be more fatal than apps in case of security issues, and suggests the integrity verification technique of OS using a boot loader and a physically independent storing device in the terminal.
Experiments and Numerical Simulation of Flow Field Inner the Chain Plate Fiber Dryer
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.115-126
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The numerical calculation model was founded on partial data of the actual test of flow field in chain plate fiber dryer, then the computational fluid dynamics (CFD) software Fluent was adopted to analyze the numerical result of dryer box unit. The result show: the numerical calculation method and data were reliable; the flow relation formula was obtained by air flow experiment in which air flew through fiber layer and chain plate, could be treated as additional momentum source term equation of air through the porous media; owing to the unreasonable setting of open porosity of air distribution plate in the dryer, there was obviously non-uniform air distribution above fiber layer, which would lead to non-uniform drying phenomenon; because of the centrifugal force of fan and diversion effect of volute, there was obvious velocity component in y direction, which could enhance the convective mass transfer effect. The research result could become the basis of design, on which the construction of chain plate fiber dryer was optimized, especially in the optimization of air distribution plate and volute of fan.
Wearable Computer Network Design using Dual-Role WUSB Clustering
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.127-134
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
A recent major development in computer technology is the advent of the wearable computer system that is based on human-centric interface technology trends and ubiquitous computing environments. Wearable computer systems can be integrated with the wireless universal serial bus (WUSB) that refers to USB technology that is merged with WiMedia PHY/MAC technical specifications. A wireless body area network (WBAN) allows the integration of intelligent, miniaturized, low-power sensor nodes that monitor body functions and the surrounding environment. In this paper, we propose a method for multi-hop network extension of WUSB over WBAN protocol. Unlike a wired USB that physically separates the USB host and USB device, WUSB allows a device to separately function as both a WUSB host and WUSB device on a single transceiver; such devices are referred to as the dual role devices (DRD). By using this DRD function of WUSB protocol, we propose a WUSB clustering method to realize the multi-hop network extension of WUSB over WBAN protocol in wireless home networks. In the WUSB clustering method, a new DRD message format reserves 2-hop range private DRP (Distributed Reservation Protocol) resources. In the experiment results, efficiency of the WUSB clustering method is proven through throughput evaluation in viewpoints of medical and nonmedical multi-hop WBAN services.
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.135-146
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The noisy short utterance is polluted by noise and corpus is less, so the recognition rate significantly decreased. For improving recognition rate, we proposed the dual information quality discrimination algorithm to classify the speech frames: one is differences detection and discrimination algorithm (DDADA), another is the improved SNR discrimination algorithm (ISNRDA). Based on the above two algorithms, the speech frames are classified to three classes: high quality, medium quality and low quality. We proposed GMM-UBM three-stage classification model, and we combine the dual information quality discrimination algorithm with GMM-UBM three-stage classification model. Experiments show that, the dual discrimination quality algorithms can be more precise to classify speech frame, and combining it with GMM-UBM three-stage classification model can make full use of limited corpus of short utterance and can improve the speaker recognition rate of the noisy short utterance.
Networked Automatic Test System based on Message-oriented Middleware
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.147-160
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
According to the current status of automatic test system which focuses only on a single or the same type of weapons' performance testing, a networked automatic test system based on message-oriented middleware is proposed in this paper, and inner architecture and process of pus/sub in message-oriented middleware are described. Basing on the message-oriented middleware, the networked automatic test system can shield the diversity and complexity of the bottom test system and test equipment, and can implement cross-platform communication of various test data about weapons. In addition, based on Kerberos protocol, the authentication process ensures the reliability of message publish/subscribe. Experiments show that the networked automatic test system based on message-oriented middleware is an integrated test platform which can provide comprehensive performance test for coordinated engagement on a variety of weapons.
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.161-170
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Roles of energy storage systems (ESSs) in microgrid control are very important because a microgrid has uncontrollable energy sources such as the wind turbine and power trade with the utility grid. Especially, the ESSs have different characteristics – power density and energy density. The characteristics show a trade-off. For this reason, the coordinated control among ESSs considering their characteristics is required. In this paper, a coordinated control of SMES and BESS is tested with high reliability using the hardware-in-the-loop simulation (HILS) system in two grid-connected and islanded modes.
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.171-184
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Remote Monitoring System for Intelligent Irrigation in Hybrid Wireless Sensor networks
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.185-196
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Aiming at make effective use of variables control, wireless sensor and monitoring, embedded and wireless communications technology in industrial fields to make intelligent precision irrigation in crops the article designed a closed-loop remote monitoring system of distributed precision irrigation by using Citect configuration software, hybrid sensor networks including wireless sensor networks (WSN) and wireless underground sensor networks (WUSN), ARM9 microprocessor and General Packet Radio Service (GPRS) module. The system consists of monitor computer, irrigation monitor controller, wireless sensor networks, GPRS wireless communication module and valves, in which the wireless sensor networks adopt hybrid topology above and below ground, the controllers utilizes embedded technology to control irrigation water yield that applied to each specific unit according to soil water content. The Citect configuration is used to manage data and HMI by the remote monitoring center, which can conduct a more high-level monitoring through web publishing. The results showed that the data sampling interval is set for 30 min, 4 groups WSN nodes were chosen, which the system could get soil temperature, humidity and soil water content in 5cm and 35cm depth, intelligent irrigation can save water about 25% compare with normal irrigation. This system realizes online automatic monitoring of crop precise irrigation, a hybrid wireless sensor network model for both aboveground and underground is creatively established, which is also the foundation for further study.
Context-Aware Kinect Sensor based PC Control Interface for Handicapped Users
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.197-206
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
It is widely considered that it is very difficult to use a personal computer for people with disabilities. The mouse and keyboard based interfaces assumes that all people have hands and arms. System interface that will allow handicapped users without the hand and arm having a user experience similar to the general users is required. In this paper, by using the Kinect sensor, which is supplied with the MS X-box, with speech and motion recognition, author will offer a new computer interface for handicapped users with no hands and arms to be able to control personal computers at a level similar to the general user. It is shown that implemented application with the new interface system enables users to input user data, information and easily control the execution of the program.
Research Overview on Vehicular Ad Hoc Networks Simulation
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.207-216
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The research contents of the VANET simulating involve in computer, traffic engineering, statistics, psychology, etc., presenting a multidisciplinary tendency. Started from the researching significance and contents of the VANET simulation, this paper introduced the development history and research status of VANET simulation, classified the VANET simulators, introduced and compared typical VANET simulators.
High-Order Control System Pole-zero Optimal Configuration
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.217-232
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
During the design process of the DC motor composite positioning control system (CPCS), in order to solve the contradiction between the positioning accuracy and the stability, we introduce the equioscillation and equiprecision lines in the root locus plane, analyze and compare root locus maps, the frequency characteristics, and the dynamic responses for PID and CPCS on MATLAB. The results show: within the high-order control system root locus configuration boundary, there always exist three specific boundaried subspaces. Under the condition of simplifying the transferring function to fifth-order from using zero, poles cancellation method, the subspaces’ controllability and observability are not changed. The determination of status feedback matrix K and estimator gain L for the high-order control system can be transformed to solving the third-order dynamic equations for specific boundary conditions, and by constructing the dynamic regulator or compensator achieve zero-pole optimal configuration.
Navigating Mobile Robot in Finite Environment Using Potential Field Merging
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.233-244
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Navigation can be defined as moving a robot to a defined objective and avoiding undesirable situations (collision and unsafe conditions) simultaneously. In this work, a navigation technique based on Potential Field has been used to plan an optimal-safe path to pilot a mobile robot in known environment. The proposed techniques are based on extracting path by merging information from two potential maps: security potential, pulling back robot from obstacles, and slope potential attracting robot to target. Three planning techniques are proposed; weighting technique that gives equal importance to safety and nearest path yet changes importance to highlight attraction in conflict situations. Degraded technique, which is more favorable for cases where security is not often important, so superior weight is given to nearest path. The last technique is to integrate paths from the two previous techniques to have safe paths in some situations and have nearest path in other situations. Comparison between proposed techniques with addition to previous work (graph-based technique) has been done to discuss difference and possible optimizations. The proposed techniques have shown interesting results especially for complex environments with curved obstacles, which is not resolvable with graph based technique. Tests and implementation has been done using Matlab simulations and a real mobile robot with a bird's-eye view camera to discuss techniques and propose future work.
Automatic Protection System of Neutral Wire-broken Based on Supply-side Protection
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.245-250
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Neutral wire is one form of distribution lines for faults. Neutral wire will cause the neutral potential shift and increase the voltage, which may endanger electrical appliances and persons. The entire existing neutral wire automatic protection device are to protect the load side and there are not protective measures on the supply side. Has load protection side. The research of the protection system is that Bi-directional zero-phase method will be taken to obtain the voltage and current square wave after the emergence of neutral wire of the load side. Then each wave is sampled and the phase difference is calculated by microcomputer control system, which will be combined with the neutral current change detection to cut off the power of supply side and achieve the automatic protection. The system can well achieve automatic protection of neutral wire on the supply side.
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.251-270
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Many customers who require high reliable power, utilities provide dual feeds; i.e. service to a facility comes from two independent transmission lines. Maintaining power quality is an important issue in the transmission and sub transmission system. Unified Power Quality Conditioner is the optimal solution to ameliorate the quality of power. Many researchers analyzed the performance of UPQC with various control techniques. Recent advanced UPQC is the Multi Converter Unified Power Quality Conditioner (MC-UPQC). Conventionally the MC-UPQC is controlled using the PI controller for DC link voltage control. This paper proposes Fuzzy Logic Controller (FLC) to enhance the performance of the MC-UPQC to improve the power quality in a multi bus with sub transmission system. In this article MC-UPQC is designed with two series and one shunt voltage-source converters (VSC). It is nominated to follow out in adjacent transmission lines to improve the quality of electric potential. In the proposed system, all converters are connected back to back on the dc side and share a common DC-link capacitor. It results in the transfer of power from one line to adjacent line to compensate for voltage sag/swell. Performance of MC-UPQC using the conventional PI controller and proposed FLC are compared. Harmonics produced by voltage distortion is also reduced within IEEE standards. The whole system is simulated and analyzed using MATLAB7.7/ Simulink.
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.271-286
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
A novel control strategy based on Hammerstein model and neural network for the speed-regulating system of the induction motor and inverter is proposed in this paper. First, Hammerstein model was used to model the speed-regulation system of the induction motor and inverter. Auto-regressive and moving average (ARMA) model was used to identify the dynamic linear module of Hammerstein model of the speed-regulating system. Second, the ARMA model was used as a reference model for identification of the inverse model of static nonlinear neural network (NN) module of Hammerstein model in the framework of the model reference adaptive control method. For the load disturbance issue, two control strategies, online learning neural network direct inverse control and the traditional PI close-loop control strategy were studied. Simulations show that the inverse control based on Hammerstein model and NN is effective and the online learning neural network direct inverse control strategy for the speed-regulating system with load disturbance has higher performance.
UAV Remote Sensing Applications in Large-scale Mapping in the Hilly Region of Tibetan Plateau
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.279-286
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.287-296
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Aiming at the reliability and security problems existed in stand-alone control mechanism for electric vehicles, a electric vehicle controller control strategy based on dual computer hot stand-by technology was proposed, traditional stand-alone control mechanism was replaced by dual computer hot stand-by control mechanism, when host engine failed, the standby engine would replace the host engine and take over the control tasks, it can ensure the reliable and continuous working of the control unit. Markov model was used to analysis the reliability and security of the dual computer hot stand-by system, and its performance was compared with stand-alone control system on MTBF value, reliability and safety performance curves, the results show that reliability and security level of dual computer hot stand-by system is significantly higher than stand-alone control system, the research has a practical guiding significance for introducing dual computer hot stand-by technology into electric vehicles.
Pac-Man Game Using Hand Movement without Keyboard and Mouse
보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.8 No.3 2015.03 pp.297-304
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The game “Pac-Man” is a widely famous and well-loved game in video arcades all over the world. In this paper, we propose a function to substitute central points of hand coordinates for direction keys of the game. With this function, we can play the game with several simple hand movements and without a keyboard or a mouse. The movements of a monster in the game could be performed by those of a hand since it can get video images in MFC(Microsoft Foundation Class) dial log by extracting pointers of the hand. To extract skin color, a binary RGB (Red, Green, and Blue) is transformed into a binary YCbCr video image without brightness. Several operations of product, hybrid median filtering, and AND are performed, in order to get a better video image quality. The central point of a hand can be found by use of the mean of two central points after the central point of a minimum boundary rectangle and a hand is found.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.