Advances in Computing, Control and Industrial Engineering

Paper Title Page

Authors: Gui San Li
Abstract: On the basis of analyzing the relations between vector operation and properties of multiplication operation of quaternions, the geometric representation and mapping of quaternions and vectors defined in three-dimensional space are established. The mathmatic operation of space vector, in addition to any space unit vector, rotating around three coordinate axises is carried based on the utilization of quaternions.The main purpose of this paper is to solve the issues of mathmatic tools introduced in spatial mechanism analysises and integrations by making use of quatnions.
101
Authors: Ying Ge Wo
Abstract: This paper discusses the stabilization problem of a large-scale system via cutting off the connections or decreasing the degree of interconnections among its subsystems subject to a cost function. Under the assumption that the large system is unstable but its sub-systems are all stable, a sufficient condition about the degree of interconnection is presented via cutting off the connections or decreasing the degree of interconnections among its subsystems such that the new large system is stable. This condition can be expressed by linear matrix inequalities (LMIs). Based on this analysis, an optimal regulation for such controls is obtained ensures the minimization of the cost function. An illustrating example is also given to show the effectiveness of the proposed method.
107
Authors: Wei Tai Liang, Jian Gao, Jin Pei Yang
Abstract: To overcome the limitations of the traditional threat assessment algorithms, a new threat sorting approach based on the fuzzy belief is proposed in this paper. In the new approach, the threat degrees described by quantitative number, interval number or linguistic label are all converted into the triangular fuzzy beliefs. The proportional conflict redistribution rule is used to combine the threat degrees of the same kind of assessment factors, the decision discounting rule is used to combine the threat degrees of different kinds of assessment factors, and the centroid method is utilized to make threat sorting. The new approach can not only deal with uncertain threat degrees, but also fuse the quantitative and qualitative threat degrees. The performance of the approach is analyzed in theory in this paper and the experimental results have certified its validity too.
111
Authors: Rong Hu, De Jun Shao
Abstract: This paper considers the existence and uniqueness of solution to neutral stochastic functional differential equation with infinite delay with local Lipschitz condition but neither the linear growth condition. And we discuss the asymptotic properties of this solution including moment boundedness and the almost sure stability. The stability is more general and representative than the exponential stability. This investigation uses a specific Lyapunov function based on usual methods. To illustrate our idea more carefully, we introduce a function, which will be used as the decay function. A One-dimension nonlinear example is discussed to illustrate the theory.
119
Authors: Fang Liu, Xian Mei Liu
Abstract: The movement of beam pumping unit is a kind of involute moment. The exiting virtual reality engines provide translation, rotation and zooming, which belong to the category of the forward kinematics. It is difficult to simulate the beam pumping unit movement based on forward kinematics. The paper first analyzes the motion rule of beam pumping unit, and then introduces the forward kinematics method (FK) and the inverse kinematics method (IK).According IK, the paper establishes the motion model of beam pumping unit, in the motion model the donkey head is seen as the end effector.The paper finally realizes 3D virtual simulation of beam pumping unit motion based on IK. The method of using IK to simulate the motion of beam pumping unit is is proved to be correct by contrasting the simulation results between using FK and IK.
124
Authors: Han Lin He, Xiao Dong Wang, Wei Jun Li
Abstract: This paper mainly considers the control problem of saturated time-varying delay systems. Applying the saturation degree function and the convex hull theory to handle the saturated terms, we put forward the guaranteed cost controller of the system according to the Lyapunov-Krasovskii theorem. Then we make use of Schur complement to convert the QMI (quadratic matrix inequality) to a LMI (linear matrix inequality) and so it can be easily used as controller synthesis. Finally, we apply the guaranteed cost controller to a two dimentional time-varying delay cellular neural networks, and the simulation results show the effectiveness of the proposed controller.
129
Authors: Sen Xia
Abstract: Autocorrelation function and cross-correlation function can be used to illustrate the dependency relation of random processes. The degree of mini-transmutation is often too small to detect. A new approach via utilization of correlation coefficient between two different signals in time domain was proposed to measure the tiny distortion of three dimensional objects. The correlation analysis and deduction on transformation from 3-D surface distribution to 1-D time series signal were made rationally. Numeric simulation experiments of discrete digital signal generated from triangular function composite generator were done and six groups of correlation coefficient curves were given deliberately with different signal length. The correlation and similarity degree among different similar waveforms were analyzed in detail. It shows that the approach is valid to detect the degree of distortion between the original standard one and the practical one.
135
Authors: Ya Ting Dai, Lu Jing Yang, Ying Lv, Rui Li
Abstract: This paper analyzes the characteristics of Integrated Fire Control, one of the combat models of the Network-Centric war, and presents the hierarchical control structure of different combat units according to their corresponding functions. The Multi-Agent System structure is also presented, and different Agent models are established according to roles they play in the system. This paper adopts the acquaintance coalition theory and the Contract Net Protocol to realize the negotiation among different hierarchical Agents. The acquaintance coalition has the advantage of reducing the range of bids and costs of communications. The Contract Net Protocol is employed in the three-layer Multi-Agent System, and is an effective negotiation to allocate the missile intercept tasks in real-time and dynamic environment.
141
Authors: Rong Ding, Ran Dong Xiao
Abstract: The connectivity of wireless networks is important for data transmission. Gupta and Kumar have already proved that if n nodes with omnidirectional antennas are located randomly, uniformly in a disk of unit area, the critical transmission range to achieve asymptotic connectivity is O( )[1]. In this work, we studied the network connectivity where nodes equipped with switched beamform antennas are randomly and uniformly distributed in a disc of unit area in R2, the antenna can be modeled in omnidirectional and directional patterns. We first assume that nodes in the network cooperate in routing each others’ packets without considering the scheduling, there exists critical transmission range to achieve asymptotic connectivity of the overall network, which responding to critical transmission power. Directional antennas are considered to be a viable solution for improving the network’s connectivity, However, we find that, without considering schedule, the smallest critical transmission range was obtained when omnidirectional antenna patterns were used in both the transmitter and receiver instead of directional antenna patterns in our model.
147
Authors: Hai Chen Yu, Cheng Shao, De Sheng Zhou
Abstract: As the varied time-delay caused by the network in NCSs, the analysis and design of NCSs become more difficult. In this paper, the single neuron PID control algorithm is modified by adjusting adaptively the scale factor and learning rate of the neuron with fuzzy rulers subject to NCSs. It is observed from the simulation that the proposed method has a well dynamic and adaptive performance.
152

Showing 21 to 30 of 81 Paper Titles