In previous researches on a model-based diagnostic system, the components are assumed mutually independent. Howerver , the assumption is not always the case because the information about whether a component is faulty ...In previous researches on a model-based diagnostic system, the components are assumed mutually independent. Howerver , the assumption is not always the case because the information about whether a component is faulty or not usually influences our knowledge about other components. Some experts may draw such a conclusion that 'if component m 1 is faulty, then component m 2 may be faulty too'. How can we use this experts' knowledge to aid the diagnosis? Based on Kohlas's probabilistic assumption-based reasoning method, we use Bayes networks to solve this problem. We calculate the posterior fault probability of the components in the observation state. The result is reasonable and reflects the effectiveness of the experts' knowledge.展开更多
In this paper,a novel control structure called feedback scheduling of model-based networked control systems is proposed to cope with a flexible network load and resource constraints.The state update time is adjusted a...In this paper,a novel control structure called feedback scheduling of model-based networked control systems is proposed to cope with a flexible network load and resource constraints.The state update time is adjusted according to the real-time network congestion situation.State observer is used under the situation where the state of the controlled plant could not be acquired.The stability criterion of the proposed structure is proved with time-varying state update time.On the basis of the stability of the novel system structure,the compromise between the control performance and the network utilization is realized by using feedback scheduler. Examples are provided to show the advantage of the proposed control structure.展开更多
The dynamic working process of 52SFZ-140-207B type of hydraulic bumper isanalyzed. The modeling method using architecture-based neural networks is introduced. Using thismodeling method, the dynamic model of the hydrau...The dynamic working process of 52SFZ-140-207B type of hydraulic bumper isanalyzed. The modeling method using architecture-based neural networks is introduced. Using thismodeling method, the dynamic model of the hydraulic bumper is established; Based on this model thestructural parameters of the hydraulic bumper are optimized with Genetic algorithm. The result showsthat the performance of the dynamic model is close to that of the hydraulic bumper, and the dynamicperformance of the hydraulic bumper is improved through parameter optimization.展开更多
In this paper, the control of a two-time-scale plant, where the sensor is connected to a linear controller/ actuator via a network is addressed. The slow and fast systems of singularly perturbed systems are used to pr...In this paper, the control of a two-time-scale plant, where the sensor is connected to a linear controller/ actuator via a network is addressed. The slow and fast systems of singularly perturbed systems are used to produce an estimate of the plant state behavior between transmission times, by which one can reduce the usage of the network. The approximate solutions of the whole systems are derived and it is shown that the whole systems via the network control are generally asymptotically stable as long as their slow and fast systems are both stable. These results are also extended to the case of network delay.展开更多
On the basis of Artificial Neural Network theory, a back propagation neural network with one middle layer is building in this paper, and its algorithms is also given, Using this BP network model, study the case of Mal...On the basis of Artificial Neural Network theory, a back propagation neural network with one middle layer is building in this paper, and its algorithms is also given, Using this BP network model, study the case of Malian-River basin. The results by calculating show that the solution based on BP algorithms are consis- tent with those based multiple - variables linear regression model. They also indicate that BP model in this paper is reasonable and BP algorithms are feasible.展开更多
This paper discusses the model-based predictive controller design of networked nonlinear systems with communica- tion delay and data loss. Based on the analysis of the closed-loop networked predictive control systems,...This paper discusses the model-based predictive controller design of networked nonlinear systems with communica- tion delay and data loss. Based on the analysis of the closed-loop networked predictive control systems, the model-based networked predictive control strategy can compensate for communication delay and data loss in an active way. The designed model-based predictive controller can also guarantee the stability of the closed-loop networked system. The simulation re- suits demonstrate the feasibility and efficacy of the proposed model-based predictive controller design scheme.展开更多
This paper develops a feedforward neural network based input output model for a general unknown nonlinear dynamic system identification when only the inputs and outputs are accessible observations. In the developed m...This paper develops a feedforward neural network based input output model for a general unknown nonlinear dynamic system identification when only the inputs and outputs are accessible observations. In the developed model, the size of the input space is directly related to the system order. By monitoring the identification error characteristic curve, we are able to determine the system order and subsequently an appropriate network structure for systems identification. Simulation results are promising and show that generic nonlinear systems can be identified, different cases of the same system can also be discriminated by our model.展开更多
We propose an energy-based stochastic model of wireless sensor networks (WSNs) where each sensor node is randomly and alternatively in an active and a sleep mode. We first investigate the sensor model and derive the f...We propose an energy-based stochastic model of wireless sensor networks (WSNs) where each sensor node is randomly and alternatively in an active and a sleep mode. We first investigate the sensor model and derive the formula of the steady-state probability when there are a number of data packets in different sensor modes. We then determine important sensor’s performance measures in terms of energy consumptions, average data delay and throughput. The novelty of this paper is in its development of a stochastic model in WSN with active/sleep feature and the explicit results obtained for above mentioned energy consumption and performance characteristics. These results are expected to be useful as the fundamental results in the theoretical analysis and design of various hybrid WSNs with power mode consideration.展开更多
Application research of neural networks to geotechnical engineering has become a hotspot nowadays.General model may not reach the predicting precision in practical application due to different characteristics in diffe...Application research of neural networks to geotechnical engineering has become a hotspot nowadays.General model may not reach the predicting precision in practical application due to different characteristics in different fields.In allusion to this,an elasto-plastic constitutive model based on clustering radial basis function neural network(BC-RBFNN) was proposed for moderate sandy clay according to its properties.Firstly,knowledge base was established on triaxial compression testing data;then the model was trained,learned and emulated using knowledge base;finally,predicting results of the BC-RBFNN model were compared and analyzed with those of other intelligent model.The results show that the BC-RBFNN model can alter the training and learning velocity and improve the predicting precision,which provides possibility for engineering practice on demanding high precision.展开更多
This paper is devoted to analyze and model user reading and replying activities in a bulletin board system (BBS) social network. By analyzing the data set from a famous Chinese BBS social network, we show how some u...This paper is devoted to analyze and model user reading and replying activities in a bulletin board system (BBS) social network. By analyzing the data set from a famous Chinese BBS social network, we show how some user activities distribute, and reveal several important features that might characterize user dynamics. We propose a method to model user activities in the BBS social network. The model could reproduce power-law and non-power-law distributions of user activities at the same time. Our results show that user reading and replying activities could be simulated through simple agent-based models. Specifically, manners of how the BBS server interacts with Internet users in the Web 2.0 application, how users organize their reading lists, and how user behavioral trait distributes are the important factors in the formation of activity patterns.展开更多
In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext unde...In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext under another set of attributes on the same message, but not vice versa, furthermore, its security was proved in the standard model based on decisional bilinear Diffie-Hellman assumption. This scheme can be used to realize fine-grained selectively sharing of encrypted data, but the general proxy rencryption scheme severely can not do it, so the proposed schemecan be thought as an improvement of general traditional proxy re-encryption scheme.展开更多
In view of the security weakness in resisting the active attacks by malicious nodes in mobile ad hoc networks,the trust metric is introduced to defend those attacks by loading a trust model on the previously proposed ...In view of the security weakness in resisting the active attacks by malicious nodes in mobile ad hoc networks,the trust metric is introduced to defend those attacks by loading a trust model on the previously proposed Distance-Based LAR.The improved Secure Trust-based Location-Aided Routing algorithm utilizes direct trust and recommendation trust to prevent malicious nodes with low trust values from joining the forwarding.Simulation results reveal that ST-LAR can resist attacks by malicious nodes effectively;furthermore,it also achieves better performance than DBLAR in terms of average end-to-end delay,packet delivery success ratio and throughput.展开更多
Memristive technology has been widely explored, due to its distinctive properties, such as nonvolatility, high density,versatility, and CMOS compatibility. For memristive devices, a general compact model is highly fav...Memristive technology has been widely explored, due to its distinctive properties, such as nonvolatility, high density,versatility, and CMOS compatibility. For memristive devices, a general compact model is highly favorable for the realization of its circuits and applications. In this paper, we propose a novel memristive model of TiOx-based devices, which considers the negative differential resistance(NDR) behavior. This model is physics-oriented and passes Linn's criteria. It not only exhibits sufficient accuracy(IV characteristics within 1.5% RMS), lower latency(below half the VTEAM model),and preferable generality compared to previous models, but also yields more precise predictions of long-term potentiation/depression(LTP/LTD). Finally, novel methods based on memristive models are proposed for gray sketching and edge detection applications. These methods avoid complex nonlinear functions required by their original counterparts. When the proposed model is utilized in these methods, they achieve increased contrast ratio and accuracy(for gray sketching and edge detection, respectively) compared to the Simmons model. Our results suggest a memristor-based network is a promising candidate to tackle the existing inefficiencies in traditional image processing methods.展开更多
Model-Based Design is an efficient and cost-effective way to develop controls, signal processing, image processing, communications, mechatronics, and other embedded systems. Rather than re-lying on physical prototypes...Model-Based Design is an efficient and cost-effective way to develop controls, signal processing, image processing, communications, mechatronics, and other embedded systems. Rather than re-lying on physical prototypes and textual specifications, Model-Based Design uses a system model as an executable specification throughout development. It supports system- and component-level design and simulation, automatic code generation, and continuous test and verification. This paper is focused firstly on the so-called model-based design and aims at presenting an up-to-date state of the art in this important field. Secondly, it develops a model based design for wind energy systems. Mathematical formulations and numerical implementations for different components of wind energy systems are highlighted with Simscape language. Finally, results are derived from simulations.展开更多
Globally, traditional power systems are rapidly transforming towards the adoption of smart grid platforms. Substations which are at the center of the electric power transformation from the power plant are changing to ...Globally, traditional power systems are rapidly transforming towards the adoption of smart grid platforms. Substations which are at the center of the electric power transformation from the power plant are changing to IEC 61850 based digital substations. Therefore, within substation, there is a growing demand for the IEC 61850 based Intelligent Electronic Devices (IEDs). The operation of multiple manufacturers of IEDs in a single digital substation network increases the need for IEC 61850 communications specification conformance diagnosis to ensure interoperability for efficient data exchange between IEDs. The IEC 61850-10 presents test items for diagnosing communication specification conformance. There are many test tools available in the market today to test the compliance of the IEC 61850 communications specifications to the IED. In this paper, we propose a model-based diagnostic method for IED communication conformance testing. The proposed model-based software therefore uses the “drag and drop” technique to select the various IEC 61850 communication services (objects) required to design the test case in a user friendly Graphical User Interface (GUI). This makes the service conformance testing more flexible for test engineers and system integrators especially in situations that require test case modifications. Also, the proposed software tool makes it easy to understand the various IEC 61850 services using the friendly GUI.展开更多
The application of support vector machines to forecasting problems is becoming popular, lately. Several comparisons between neural networks trained with error backpropagation and support vector machines have shown adv...The application of support vector machines to forecasting problems is becoming popular, lately. Several comparisons between neural networks trained with error backpropagation and support vector machines have shown advantage for the latter in different domains of application. However, some difficulties still deteriorate the performance of the support vector machines. The main one is related to the setting of the hyperparameters involved in their training. Techniques based on meta-heuristics have been employed to determine appropriate values for those hyperparameters. However, because of the high noneonvexity of this estimation problem, which makes the search for a good solution very hard, an approach based on Bayesian inference, called relevance vector machine, has been proposed more recently. The present paper aims at investigating the suitability of this new approach to the short-term load forecasting problem.展开更多
Recent developments in computer vision applications have enabled detection of significant visual objects in video streams.Studies quoted in literature have detected objects from video streams using Spatiotemporal Parti...Recent developments in computer vision applications have enabled detection of significant visual objects in video streams.Studies quoted in literature have detected objects from video streams using Spatiotemporal Particle Swarm Optimization(SPSOM)and Incremental Deep Convolution Neural Networks(IDCNN)for detecting multiple objects.However,the study considered opticalflows resulting in assessing motion contrasts.Existing methods have issue with accuracy and error rates in motion contrast detection.Hence,the overall object detection performance is reduced significantly.Thus,consideration of object motions in videos efficiently is a critical issue to be solved.To overcome the above mentioned problems,this research work proposes a method involving ensemble approaches to and detect objects efficiently from video streams.This work uses a system modeled on swarm optimization and ensemble learning called Spatiotemporal Glowworm Swarm Optimization Model(SGSOM)for detecting multiple significant objects.A steady quality in motion contrasts is maintained in this work by using Chebyshev distance matrix.The proposed system achieves global optimization in its multiple object detection by exploiting spatial/temporal cues and local constraints.Its experimental results show that the proposed system scores 4.8%in Mean Absolute Error(MAE)while achieving 86%in accuracy,81.5%in precision,85%in recall and 81.6%in F-measure and thus proving its utility in detecting multiple objects.展开更多
文摘In previous researches on a model-based diagnostic system, the components are assumed mutually independent. Howerver , the assumption is not always the case because the information about whether a component is faulty or not usually influences our knowledge about other components. Some experts may draw such a conclusion that 'if component m 1 is faulty, then component m 2 may be faulty too'. How can we use this experts' knowledge to aid the diagnosis? Based on Kohlas's probabilistic assumption-based reasoning method, we use Bayes networks to solve this problem. We calculate the posterior fault probability of the components in the observation state. The result is reasonable and reflects the effectiveness of the experts' knowledge.
文摘In this paper,a novel control structure called feedback scheduling of model-based networked control systems is proposed to cope with a flexible network load and resource constraints.The state update time is adjusted according to the real-time network congestion situation.State observer is used under the situation where the state of the controlled plant could not be acquired.The stability criterion of the proposed structure is proved with time-varying state update time.On the basis of the stability of the novel system structure,the compromise between the control performance and the network utilization is realized by using feedback scheduler. Examples are provided to show the advantage of the proposed control structure.
文摘The dynamic working process of 52SFZ-140-207B type of hydraulic bumper isanalyzed. The modeling method using architecture-based neural networks is introduced. Using thismodeling method, the dynamic model of the hydraulic bumper is established; Based on this model thestructural parameters of the hydraulic bumper are optimized with Genetic algorithm. The result showsthat the performance of the dynamic model is close to that of the hydraulic bumper, and the dynamicperformance of the hydraulic bumper is improved through parameter optimization.
基金the National Natural Science Foundation of China (No. 10671069, 60674046)
文摘In this paper, the control of a two-time-scale plant, where the sensor is connected to a linear controller/ actuator via a network is addressed. The slow and fast systems of singularly perturbed systems are used to produce an estimate of the plant state behavior between transmission times, by which one can reduce the usage of the network. The approximate solutions of the whole systems are derived and it is shown that the whole systems via the network control are generally asymptotically stable as long as their slow and fast systems are both stable. These results are also extended to the case of network delay.
基金Supported by Brilliant Youth Fund in Hebei Province
文摘On the basis of Artificial Neural Network theory, a back propagation neural network with one middle layer is building in this paper, and its algorithms is also given, Using this BP network model, study the case of Malian-River basin. The results by calculating show that the solution based on BP algorithms are consis- tent with those based multiple - variables linear regression model. They also indicate that BP model in this paper is reasonable and BP algorithms are feasible.
基金Project supported by the Key Program for the National Natural Science Foundation of China(Grant No.61333003)the General Program for the National Natural Science Foundation of China(Grant No.61273104)
文摘This paper discusses the model-based predictive controller design of networked nonlinear systems with communica- tion delay and data loss. Based on the analysis of the closed-loop networked predictive control systems, the model-based networked predictive control strategy can compensate for communication delay and data loss in an active way. The designed model-based predictive controller can also guarantee the stability of the closed-loop networked system. The simulation re- suits demonstrate the feasibility and efficacy of the proposed model-based predictive controller design scheme.
文摘This paper develops a feedforward neural network based input output model for a general unknown nonlinear dynamic system identification when only the inputs and outputs are accessible observations. In the developed model, the size of the input space is directly related to the system order. By monitoring the identification error characteristic curve, we are able to determine the system order and subsequently an appropriate network structure for systems identification. Simulation results are promising and show that generic nonlinear systems can be identified, different cases of the same system can also be discriminated by our model.
文摘We propose an energy-based stochastic model of wireless sensor networks (WSNs) where each sensor node is randomly and alternatively in an active and a sleep mode. We first investigate the sensor model and derive the formula of the steady-state probability when there are a number of data packets in different sensor modes. We then determine important sensor’s performance measures in terms of energy consumptions, average data delay and throughput. The novelty of this paper is in its development of a stochastic model in WSN with active/sleep feature and the explicit results obtained for above mentioned energy consumption and performance characteristics. These results are expected to be useful as the fundamental results in the theoretical analysis and design of various hybrid WSNs with power mode consideration.
基金Project(07031B) supported by the Scientific Research Fund of Central South University of Forestry and TechnologyProject(06C843) supported by the Scientific Research Fund of Hunan Provincial Education Department
文摘Application research of neural networks to geotechnical engineering has become a hotspot nowadays.General model may not reach the predicting precision in practical application due to different characteristics in different fields.In allusion to this,an elasto-plastic constitutive model based on clustering radial basis function neural network(BC-RBFNN) was proposed for moderate sandy clay according to its properties.Firstly,knowledge base was established on triaxial compression testing data;then the model was trained,learned and emulated using knowledge base;finally,predicting results of the BC-RBFNN model were compared and analyzed with those of other intelligent model.The results show that the BC-RBFNN model can alter the training and learning velocity and improve the predicting precision,which provides possibility for engineering practice on demanding high precision.
基金supported in part by the National Natural Science Foundation of China under Grant No. 60972010the Beijing Natural Science Foundation under Grant No. 4102047+1 种基金the Major Program for Research on Philosophy & Humanity Social Sciences of the Ministry of Education of China under Grant No. 08WL1101the Service Business of Scientists and Engineers Project under Grant No. 2009GJA00048
文摘This paper is devoted to analyze and model user reading and replying activities in a bulletin board system (BBS) social network. By analyzing the data set from a famous Chinese BBS social network, we show how some user activities distribute, and reveal several important features that might characterize user dynamics. We propose a method to model user activities in the BBS social network. The model could reproduce power-law and non-power-law distributions of user activities at the same time. Our results show that user reading and replying activities could be simulated through simple agent-based models. Specifically, manners of how the BBS server interacts with Internet users in the Web 2.0 application, how users organize their reading lists, and how user behavioral trait distributes are the important factors in the formation of activity patterns.
基金the Natural Science Foundation of Shandong Province (Y2007G37)the Science and Technology Development Program of Shandong Province (2007GG10001012)
文摘In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext under another set of attributes on the same message, but not vice versa, furthermore, its security was proved in the standard model based on decisional bilinear Diffie-Hellman assumption. This scheme can be used to realize fine-grained selectively sharing of encrypted data, but the general proxy rencryption scheme severely can not do it, so the proposed schemecan be thought as an improvement of general traditional proxy re-encryption scheme.
基金supported by National Key Basic Research Program(973 Program) under Grant No.2011CB302903National Natural Science Foundation under Grant No.60873231+1 种基金Key Program of Natural Science for Universities of Jiangsu Province under Grant No.10KJA510035Scientific Research Foundation of NJUPT under Grant No.NY209016,China
文摘In view of the security weakness in resisting the active attacks by malicious nodes in mobile ad hoc networks,the trust metric is introduced to defend those attacks by loading a trust model on the previously proposed Distance-Based LAR.The improved Secure Trust-based Location-Aided Routing algorithm utilizes direct trust and recommendation trust to prevent malicious nodes with low trust values from joining the forwarding.Simulation results reveal that ST-LAR can resist attacks by malicious nodes effectively;furthermore,it also achieves better performance than DBLAR in terms of average end-to-end delay,packet delivery success ratio and throughput.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61332003 and 61303068)the Natural Science Foundation of Hunan Province,China(Grant No.2015JJ3024)
文摘Memristive technology has been widely explored, due to its distinctive properties, such as nonvolatility, high density,versatility, and CMOS compatibility. For memristive devices, a general compact model is highly favorable for the realization of its circuits and applications. In this paper, we propose a novel memristive model of TiOx-based devices, which considers the negative differential resistance(NDR) behavior. This model is physics-oriented and passes Linn's criteria. It not only exhibits sufficient accuracy(IV characteristics within 1.5% RMS), lower latency(below half the VTEAM model),and preferable generality compared to previous models, but also yields more precise predictions of long-term potentiation/depression(LTP/LTD). Finally, novel methods based on memristive models are proposed for gray sketching and edge detection applications. These methods avoid complex nonlinear functions required by their original counterparts. When the proposed model is utilized in these methods, they achieve increased contrast ratio and accuracy(for gray sketching and edge detection, respectively) compared to the Simmons model. Our results suggest a memristor-based network is a promising candidate to tackle the existing inefficiencies in traditional image processing methods.
文摘Model-Based Design is an efficient and cost-effective way to develop controls, signal processing, image processing, communications, mechatronics, and other embedded systems. Rather than re-lying on physical prototypes and textual specifications, Model-Based Design uses a system model as an executable specification throughout development. It supports system- and component-level design and simulation, automatic code generation, and continuous test and verification. This paper is focused firstly on the so-called model-based design and aims at presenting an up-to-date state of the art in this important field. Secondly, it develops a model based design for wind energy systems. Mathematical formulations and numerical implementations for different components of wind energy systems are highlighted with Simscape language. Finally, results are derived from simulations.
文摘Globally, traditional power systems are rapidly transforming towards the adoption of smart grid platforms. Substations which are at the center of the electric power transformation from the power plant are changing to IEC 61850 based digital substations. Therefore, within substation, there is a growing demand for the IEC 61850 based Intelligent Electronic Devices (IEDs). The operation of multiple manufacturers of IEDs in a single digital substation network increases the need for IEC 61850 communications specification conformance diagnosis to ensure interoperability for efficient data exchange between IEDs. The IEC 61850-10 presents test items for diagnosing communication specification conformance. There are many test tools available in the market today to test the compliance of the IEC 61850 communications specifications to the IED. In this paper, we propose a model-based diagnostic method for IED communication conformance testing. The proposed model-based software therefore uses the “drag and drop” technique to select the various IEC 61850 communication services (objects) required to design the test case in a user friendly Graphical User Interface (GUI). This makes the service conformance testing more flexible for test engineers and system integrators especially in situations that require test case modifications. Also, the proposed software tool makes it easy to understand the various IEC 61850 services using the friendly GUI.
文摘The application of support vector machines to forecasting problems is becoming popular, lately. Several comparisons between neural networks trained with error backpropagation and support vector machines have shown advantage for the latter in different domains of application. However, some difficulties still deteriorate the performance of the support vector machines. The main one is related to the setting of the hyperparameters involved in their training. Techniques based on meta-heuristics have been employed to determine appropriate values for those hyperparameters. However, because of the high noneonvexity of this estimation problem, which makes the search for a good solution very hard, an approach based on Bayesian inference, called relevance vector machine, has been proposed more recently. The present paper aims at investigating the suitability of this new approach to the short-term load forecasting problem.
文摘Recent developments in computer vision applications have enabled detection of significant visual objects in video streams.Studies quoted in literature have detected objects from video streams using Spatiotemporal Particle Swarm Optimization(SPSOM)and Incremental Deep Convolution Neural Networks(IDCNN)for detecting multiple objects.However,the study considered opticalflows resulting in assessing motion contrasts.Existing methods have issue with accuracy and error rates in motion contrast detection.Hence,the overall object detection performance is reduced significantly.Thus,consideration of object motions in videos efficiently is a critical issue to be solved.To overcome the above mentioned problems,this research work proposes a method involving ensemble approaches to and detect objects efficiently from video streams.This work uses a system modeled on swarm optimization and ensemble learning called Spatiotemporal Glowworm Swarm Optimization Model(SGSOM)for detecting multiple significant objects.A steady quality in motion contrasts is maintained in this work by using Chebyshev distance matrix.The proposed system achieves global optimization in its multiple object detection by exploiting spatial/temporal cues and local constraints.Its experimental results show that the proposed system scores 4.8%in Mean Absolute Error(MAE)while achieving 86%in accuracy,81.5%in precision,85%in recall and 81.6%in F-measure and thus proving its utility in detecting multiple objects.