To satisfy the need of good quality and high yield primary production,the farmland information management system based on wireless Sensor Network has been proposed.We give priority to analyzing the basic function of t...To satisfy the need of good quality and high yield primary production,the farmland information management system based on wireless Sensor Network has been proposed.We give priority to analyzing the basic function of the system,building the systematic structure of applied system and network system,and implementing the energy control and safety design of system.The system can reduce manpower operation and the error of manual measuration in the course of practical production,reduce the cost of agricultural production,and realize automatization of agricultural production to the largest extent to provide an effective way to realize good quality and high yield primary production,which has an important realistic meaning.展开更多
According to the quality control needs of filling construction of the face rockfill dam, by means of the global satellite positioning technology, the wireless data communication technology, the computer technology and...According to the quality control needs of filling construction of the face rockfill dam, by means of the global satellite positioning technology, the wireless data communication technology, the computer technology and the data processing and analysis technology, and integrating with the roller compaction machine, the GPS real time supervisory system is developed in this paper. It can be used to real timely supervise the construction quality of the roller compaction for filling engineering. The composition and applied characteristics of GPS system, and the key technique problem and solution of the design are discussed. The height accuracy of GPS system is analyzed and the preliminary application is introduced.展开更多
Abstract--This paper conducts a survey on iterative learn- ing control (ILC) with incomplete information and associated control system design, which is a frontier of the ILC field. The incomplete information, includ...Abstract--This paper conducts a survey on iterative learn- ing control (ILC) with incomplete information and associated control system design, which is a frontier of the ILC field. The incomplete information, including passive and active types, can cause data loss or fragment due to various factors. Passive incomplete information refers to incomplete data and information caused by practical system limitations during data collection, storage, transmission, and processing, such as data dropouts, delays, disordering, and limited transmission bandwidth. Active incomplete information refers to incomplete data and information caused by man-made reduction of data quantity and quality on the premise that the given objective is satisfied, such as sampling and quantization. This survey emphasizes two aspects: the first one is how to guarantee good learning performance and tracking performance with passive incomplete data, and the second is how to balance the control performance index and data demand by active means. The promising research directions along this topic are also addressed, where data robustness is highly emphasized. This survey is expected to improve understanding of the restrictive relationship and trade-off between incomplete data and tracking performance, quantitatively, and promote further developments of ILC theory. Index Terms--Data dropout, data robustness, incomplete in- formation, iterative learning controi(ILC), quantized control, sampled control, varying lengths.展开更多
This paper presents a hierarchy model of Air Traffic Management (ATM) according to the security requirements in ATM system, analyzes it by grey assessment and Analytic Hierarchy Process (AHP), and evaluates it in deta...This paper presents a hierarchy model of Air Traffic Management (ATM) according to the security requirements in ATM system, analyzes it by grey assessment and Analytic Hierarchy Process (AHP), and evaluates it in details. It also provides theoretical support for building an effective evaluation system. The basic idea is to use AHP and Grey Assessment to obtain the weights of the indicators, and count grey evaluation coefficients with whitening function. The compositive clustering coefficients are obtained by combining the weights and the grey evaluation coefficients. Evaluation result can be gotten from the compositive clustering coefficients.展开更多
This paper describes a broad perspective of the application of graph theory to establishment of GPS control networks whereby the GPS network is considered as a connected and directed graph with three components.In thi...This paper describes a broad perspective of the application of graph theory to establishment of GPS control networks whereby the GPS network is considered as a connected and directed graph with three components.In this algorithm the gross error detection is undertaken through loops of different spanning trees using the "Loop Law" in which the individual components Δ X, Δ Y and Δ Z sum up to zero.If the sum of the respective vector components ∑X,∑Y and ∑Z in a loop is not zero and if the error is beyond the tolerable limit (ε>w),it indicates the existence of gross errors in one of the baselines in the loop and therefore the baseline must be removed or re_observed.After successful screening of errors by graph theory,network adjustment can be carried out.In this paper,the GPS data from the control network established as reference system for the HP Dam at Baishan county in Liaoning province is presented to illustrate the algorithm.展开更多
High-Voltage Live Cleaning Robot works in a hot-line environment (220 kV/330 kV), and so the safety of its application and equipment is most important. In terms of safety, the designs of robot mechanism and control sy...High-Voltage Live Cleaning Robot works in a hot-line environment (220 kV/330 kV), and so the safety of its application and equipment is most important. In terms of safety, the designs of robot mechanism and control system have been discussed, and the test data are given regarding the control system of a model machine. The model machine of a high-voltage live cleaning robot can satisfy the needs of basic cleaning in common conditions. From manual operation to automation, the cleaning efficiency is improved. The robot can decrease the amount of work, and guarantee security. Among high-voltage live cleaning equipment in China, the cleaning robot is advanced in automation and intelligence.展开更多
Three aspects of RS 485 application, which affect the reliability of communication of data system are analyzed and discussed. In network configuration, it presents the optimal configuration for the bus of RS 485, the ...Three aspects of RS 485 application, which affect the reliability of communication of data system are analyzed and discussed. In network configuration, it presents the optimal configuration for the bus of RS 485, the better rule for derivative line and the choice for termination. In hardware design, it presents three parts of driver’s peripheral circuit. In control software design, it presents a method of using 75176’s DE line to control the driver.展开更多
At present,there are few security models which control the communication between virtual machines (VMs).Moreover,these models are not applicable to multi-level security (MLS).In order to implement mandatory access con...At present,there are few security models which control the communication between virtual machines (VMs).Moreover,these models are not applicable to multi-level security (MLS).In order to implement mandatory access control (MAC) and MLS in virtual machine system,this paper designs Virt-BLP model,which is based on BLP model.For the distinction between virtual machine system and non-virtualized system,we build elements and security axioms of Virt-BLP model by modifying those of BLP.Moreover,comparing with BLP,the number of state transition rules of Virt-BLP is reduced accordingly and some rules can only be enforced by trusted subject.As a result,Virt-BLP model supports MAC and partial discretionary access control (DAC),well satisfying the requirement of MLS in virtual machine system.As space is limited,the implementation of our MAC framework will be shown in a continuation.展开更多
This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This middle layer is composed of cloudlets which are deployed ...This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This middle layer is composed of cloudlets which are deployed by cloud services providers,such as wireless network access points(APs),to improve the performance of mobile cloud servicesand be different from traditional mobile operator mode.Then based on this new architecture.we improve our previous(Attribute-basedencryption) ABE access control scheme on cloud for mobile cloud,which is proposed to offload the main amount of computations to the cloudlet as the function of cloud.Simulationresults demonstratethe new access control scheme takes into consideration response time constraints and network statusof access task execution,while satisfying certain network security for mobile cloud.展开更多
A design and verification of linear state observers which estimate state information such as angular velocity and load torque for retraction control of the motorized seat belt (MSB) system were described. The motorize...A design and verification of linear state observers which estimate state information such as angular velocity and load torque for retraction control of the motorized seat belt (MSB) system were described. The motorized seat belt system provides functions to protect passengers and improve passenger's convenience. Each MSB function has its own required belt tension which is determined by the function's purpose. To realize the MSB functions, state information, such as seat belt winding velocity and seat belt tension are required. Using a linear state observer, the state information for MSB operations can be estimated without sensors. To design the linear state observer, the motorized seat belt system is analyzed and represented as a state space model which contains load torque as an augmented state. Based on the state space model, a linear state observer was designed and verified by experiments. Also, the retraction control of the MSB algorithm using linear state observer was designed and verified on the test bench. With the designed retraction control algorithm using the linear state observer, it is possible to realize various types of MSB functions.展开更多
In order to realize the fault diagnosis of the control circuit of all-electronic computer interlocking system(ACIS)for railway signals,taking a five-wire switch electronic control module as an research object,we propo...In order to realize the fault diagnosis of the control circuit of all-electronic computer interlocking system(ACIS)for railway signals,taking a five-wire switch electronic control module as an research object,we propose a method of selecting the sample set of the basic classifier by roulette method and realizing fault diagnosis by using SVM-AdaBoost.The experimental results show that the proportion of basic classifier samples affects classification accuracy,which reaches the highest when the proportion is 85%.When selecting the sample set of basic classifier by roulette method,the fault diagnosis accuracy is generally higher than that of the maximum weight priority method.When the optimal proportion 85%is taken,the accuracy is highest up to 96.3%.More importantly,this way can better adapt to the critical data and improve the anti-interference ability of the algorithm,and therefore it provides a basis for fault diagnosis of ACIS.展开更多
This paper deals with the synchronization of chaotic systems with structure or parameters difference. Nonlinear differential geometry theory was applied to transform the chaotic discrepancy system into canonical form....This paper deals with the synchronization of chaotic systems with structure or parameters difference. Nonlinear differential geometry theory was applied to transform the chaotic discrepancy system into canonical form. A feedback control for synchronizing two chaotic systems is proposed based on sliding mode control design. To make this controller physically realizable, an extended state observer is used to estimate the error between the transmitter and receiver. Two illustrative examples were carried out: (1) The Chua oscillator was used to show that synchronization was achieved and the message signal was recovered in spite of parametric variations; (2) Two second-order driven oscillators were presented to show that the synchronization can be achieved and that the message can be recovered in spite of the strictly different model.展开更多
Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy a...Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated.展开更多
Binary Offset Carrier(BOC) has been chosen as one of modulation methods in the future Global Navigation Satellite Systems(GNSS). Even though BOC signals can bring several advantages such as better track performance an...Binary Offset Carrier(BOC) has been chosen as one of modulation methods in the future Global Navigation Satellite Systems(GNSS). Even though BOC signals can bring several advantages such as better track performance and higher positioning accuracy, there is a drawback that the autocorrelation functions have multiple side-peaks if BOC modulation is adopted. This characteristic will lead to false acquisition and the tracking loop will be locked in false phase point. The proposed Correlation Combination Ambiguity Removing Technology(CCART) cancelled all the side-peaks of the sine-phased BOC(kn,n) signals completely by making use of two kinds of correlation functions. Two kinds of sub-correlation functions were combined separately and then final correlation function without side-peaks was acquired. The simulation results are given and compared with other techniques. It is shown that acquisition will not be degraded with the increase of k.展开更多
Plenty of dams in China are in danger while there are few effective methods for underwater dam inspections of hidden problems such as conduits,cracks and inanitions.The dam safety inspection remotely operated vehicle(...Plenty of dams in China are in danger while there are few effective methods for underwater dam inspections of hidden problems such as conduits,cracks and inanitions.The dam safety inspection remotely operated vehicle(DSIROV) is designed to solve these problems which can be equipped with many advanced sensors such as acoustical,optical and electrical sensors for underwater dam inspection.A least-square parameter estimation method is utilized to estimate the hydrodynamic coefficients of DSIROV,and a four degree-of-freedom(DOF) simulation system is constructed.The architecture of DSIROV's motion control system is introduced,which includes hardware and software structures.The hardware based on PC104 BUS,uses AMD ELAN520 as the controller's embedded CPU and all control modules work in VxWorks real-time operating system.Information flow of the motion system of DSIROV,automatic control of dam scanning and dead-reckoning algorithm for navigation are also discussed.The reliability of DSIROV's control system can be verified and the control system can fulfill the motion control mission because embankment checking can be demonstrated by the lake trials.展开更多
Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed “virtual organizations”. The heterogeneous, dynamic and multi-domain nature of these environments makes challengin...Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed “virtual organizations”. The heterogeneous, dynamic and multi-domain nature of these environments makes challenging security issues that demand new technical approaches. Despite the recent advances in access control approaches applicable to Grid computing, there remain issues that impede the development of effective access control models for Grid applications. Among them there are the lack of context-based models for access control, and reliance on identity or capability-based access control schemes. An access control scheme that resolve these issues is presented, and a dynamically authorized role-based access control (D-RBAC) model extending the RBAC with context constraints is proposed. The D-RABC mechanisms dynamically grant permissions to users based on a set of contextual information collected from the system and user’s environments, while retaining the advantages of RBAC model. The implementation architecture of D-RBAC for the Grid application is also described.展开更多
Systematic analysis of influence of blasting vibration on bridges,tunnels,slopes and the mechanical relationships between each other were drawn based on the example of safety argument between blasting mining area and ...Systematic analysis of influence of blasting vibration on bridges,tunnels,slopes and the mechanical relationships between each other were drawn based on the example of safety argument between blasting mining area and protected objects.The safety argument methods and technological means of controlling dangerous and harmful factors were proposed by the application of principle of risk analysis.And standard control system was established based on controlling the blasting parameters of division of blasting area.展开更多
Manufacturing plants are increasingly complex and integrated, requiring control systems able to identify the interactions between the various operating units. Production planning and control design of a process are to...Manufacturing plants are increasingly complex and integrated, requiring control systems able to identify the interactions between the various operating units. Production planning and control design of a process are tools that, if combined, bring many economic benefits to the processes since they aim to identify and maintain optimal decision operations to a system. This work uses such integration between production planning and plantwide control to propose a control system for the Williams-Otto plant from the definition of the operating optimal point for coordinated decentralized optimization, in which the original optimization problem decomposition into smaller coordinated problems ensure that the found local optimum also meets the requirements of the global system. The results for decentralized optimization are satisfactory and very similar to the global optimum problem and to the control system response proposed based on the optimal obtained. It is effective taking smooth actions, working with (economic) optimal set points (economically) of operation. The unification of production planning techniques and plantwide control techniques is an effective tool for the control system design for entire plants.展开更多
基金Supported by National 863 Plan Project (2008AA10Z220 )Key Technological Task Project of Henan Agricultural Domain(082102140004)~~
文摘To satisfy the need of good quality and high yield primary production,the farmland information management system based on wireless Sensor Network has been proposed.We give priority to analyzing the basic function of the system,building the systematic structure of applied system and network system,and implementing the energy control and safety design of system.The system can reduce manpower operation and the error of manual measuration in the course of practical production,reduce the cost of agricultural production,and realize automatization of agricultural production to the largest extent to provide an effective way to realize good quality and high yield primary production,which has an important realistic meaning.
文摘According to the quality control needs of filling construction of the face rockfill dam, by means of the global satellite positioning technology, the wireless data communication technology, the computer technology and the data processing and analysis technology, and integrating with the roller compaction machine, the GPS real time supervisory system is developed in this paper. It can be used to real timely supervise the construction quality of the roller compaction for filling engineering. The composition and applied characteristics of GPS system, and the key technique problem and solution of the design are discussed. The height accuracy of GPS system is analyzed and the preliminary application is introduced.
基金supported by the National Natural Science Foundation of China(61673045)Beijing Natural Science Foundation(4152040)
文摘Abstract--This paper conducts a survey on iterative learn- ing control (ILC) with incomplete information and associated control system design, which is a frontier of the ILC field. The incomplete information, including passive and active types, can cause data loss or fragment due to various factors. Passive incomplete information refers to incomplete data and information caused by practical system limitations during data collection, storage, transmission, and processing, such as data dropouts, delays, disordering, and limited transmission bandwidth. Active incomplete information refers to incomplete data and information caused by man-made reduction of data quantity and quality on the premise that the given objective is satisfied, such as sampling and quantization. This survey emphasizes two aspects: the first one is how to guarantee good learning performance and tracking performance with passive incomplete data, and the second is how to balance the control performance index and data demand by active means. The promising research directions along this topic are also addressed, where data robustness is highly emphasized. This survey is expected to improve understanding of the restrictive relationship and trade-off between incomplete data and tracking performance, quantitatively, and promote further developments of ILC theory. Index Terms--Data dropout, data robustness, incomplete in- formation, iterative learning controi(ILC), quantized control, sampled control, varying lengths.
基金Supported by the GKG200702020, jointly supported program by the National Natural Science Foundation of China and CAAC (No.60776808)
文摘This paper presents a hierarchy model of Air Traffic Management (ATM) according to the security requirements in ATM system, analyzes it by grey assessment and Analytic Hierarchy Process (AHP), and evaluates it in details. It also provides theoretical support for building an effective evaluation system. The basic idea is to use AHP and Grey Assessment to obtain the weights of the indicators, and count grey evaluation coefficients with whitening function. The compositive clustering coefficients are obtained by combining the weights and the grey evaluation coefficients. Evaluation result can be gotten from the compositive clustering coefficients.
文摘This paper describes a broad perspective of the application of graph theory to establishment of GPS control networks whereby the GPS network is considered as a connected and directed graph with three components.In this algorithm the gross error detection is undertaken through loops of different spanning trees using the "Loop Law" in which the individual components Δ X, Δ Y and Δ Z sum up to zero.If the sum of the respective vector components ∑X,∑Y and ∑Z in a loop is not zero and if the error is beyond the tolerable limit (ε>w),it indicates the existence of gross errors in one of the baselines in the loop and therefore the baseline must be removed or re_observed.After successful screening of errors by graph theory,network adjustment can be carried out.In this paper,the GPS data from the control network established as reference system for the HP Dam at Baishan county in Liaoning province is presented to illustrate the algorithm.
基金Sponsored by the National High Technology Research and Development Program of China(Grant No.2002AA420110 -2).
文摘High-Voltage Live Cleaning Robot works in a hot-line environment (220 kV/330 kV), and so the safety of its application and equipment is most important. In terms of safety, the designs of robot mechanism and control system have been discussed, and the test data are given regarding the control system of a model machine. The model machine of a high-voltage live cleaning robot can satisfy the needs of basic cleaning in common conditions. From manual operation to automation, the cleaning efficiency is improved. The robot can decrease the amount of work, and guarantee security. Among high-voltage live cleaning equipment in China, the cleaning robot is advanced in automation and intelligence.
文摘Three aspects of RS 485 application, which affect the reliability of communication of data system are analyzed and discussed. In network configuration, it presents the optimal configuration for the bus of RS 485, the better rule for derivative line and the choice for termination. In hardware design, it presents three parts of driver’s peripheral circuit. In control software design, it presents a method of using 75176’s DE line to control the driver.
基金Acknowledgements This work was supported by National Key Basic Research and Development Plan (973 Plan) of China (No. 2007CB310900) and National Natural Science Foundation of China (No. 90612018, 90715030 and 60970008).
文摘At present,there are few security models which control the communication between virtual machines (VMs).Moreover,these models are not applicable to multi-level security (MLS).In order to implement mandatory access control (MAC) and MLS in virtual machine system,this paper designs Virt-BLP model,which is based on BLP model.For the distinction between virtual machine system and non-virtualized system,we build elements and security axioms of Virt-BLP model by modifying those of BLP.Moreover,comparing with BLP,the number of state transition rules of Virt-BLP is reduced accordingly and some rules can only be enforced by trusted subject.As a result,Virt-BLP model supports MAC and partial discretionary access control (DAC),well satisfying the requirement of MLS in virtual machine system.As space is limited,the implementation of our MAC framework will be shown in a continuation.
基金supported by National Natural Science Foundation of China(No.U 1405254, 61472092)China Postdoctoral Science Foundation(No.2015M581101)National Science and Technology SupportingFoundation of China(No.2014BAH41B00)
文摘This paper proposes a new access architecture onmobile cloud,which introduces a middle layer sitting between mobile devices and their cloud infrastructure.This middle layer is composed of cloudlets which are deployed by cloud services providers,such as wireless network access points(APs),to improve the performance of mobile cloud servicesand be different from traditional mobile operator mode.Then based on this new architecture.we improve our previous(Attribute-basedencryption) ABE access control scheme on cloud for mobile cloud,which is proposed to offload the main amount of computations to the cloudlet as the function of cloud.Simulationresults demonstratethe new access control scheme takes into consideration response time constraints and network statusof access task execution,while satisfying certain network security for mobile cloud.
基金Project supported by the Second Stage of Brain Korea 21 Projects and Changwon National University in 2011-2012
文摘A design and verification of linear state observers which estimate state information such as angular velocity and load torque for retraction control of the motorized seat belt (MSB) system were described. The motorized seat belt system provides functions to protect passengers and improve passenger's convenience. Each MSB function has its own required belt tension which is determined by the function's purpose. To realize the MSB functions, state information, such as seat belt winding velocity and seat belt tension are required. Using a linear state observer, the state information for MSB operations can be estimated without sensors. To design the linear state observer, the motorized seat belt system is analyzed and represented as a state space model which contains load torque as an augmented state. Based on the state space model, a linear state observer was designed and verified by experiments. Also, the retraction control of the MSB algorithm using linear state observer was designed and verified on the test bench. With the designed retraction control algorithm using the linear state observer, it is possible to realize various types of MSB functions.
基金Natural Science Foundation of Gansu Province(Nos.18JR3RA130,2018C-11,2018A-022)Science Fund of Lanzhou Jiaotong University(No.2017022)。
文摘In order to realize the fault diagnosis of the control circuit of all-electronic computer interlocking system(ACIS)for railway signals,taking a five-wire switch electronic control module as an research object,we propose a method of selecting the sample set of the basic classifier by roulette method and realizing fault diagnosis by using SVM-AdaBoost.The experimental results show that the proportion of basic classifier samples affects classification accuracy,which reaches the highest when the proportion is 85%.When selecting the sample set of basic classifier by roulette method,the fault diagnosis accuracy is generally higher than that of the maximum weight priority method.When the optimal proportion 85%is taken,the accuracy is highest up to 96.3%.More importantly,this way can better adapt to the critical data and improve the anti-interference ability of the algorithm,and therefore it provides a basis for fault diagnosis of ACIS.
基金Project (No. 20040146) supported by Zhejiang Provincial Edu-cation Department Foundation, China
文摘This paper deals with the synchronization of chaotic systems with structure or parameters difference. Nonlinear differential geometry theory was applied to transform the chaotic discrepancy system into canonical form. A feedback control for synchronizing two chaotic systems is proposed based on sliding mode control design. To make this controller physically realizable, an extended state observer is used to estimate the error between the transmitter and receiver. Two illustrative examples were carried out: (1) The Chua oscillator was used to show that synchronization was achieved and the message signal was recovered in spite of parametric variations; (2) Two second-order driven oscillators were presented to show that the synchronization can be achieved and that the message can be recovered in spite of the strictly different model.
文摘Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated.
基金supported in part by National Natural Science Foundation of China under Grant No.61372110National High Technology Research and Development Program of China (863 Program) under Grant No. 2012AA120802
文摘Binary Offset Carrier(BOC) has been chosen as one of modulation methods in the future Global Navigation Satellite Systems(GNSS). Even though BOC signals can bring several advantages such as better track performance and higher positioning accuracy, there is a drawback that the autocorrelation functions have multiple side-peaks if BOC modulation is adopted. This characteristic will lead to false acquisition and the tracking loop will be locked in false phase point. The proposed Correlation Combination Ambiguity Removing Technology(CCART) cancelled all the side-peaks of the sine-phased BOC(kn,n) signals completely by making use of two kinds of correlation functions. Two kinds of sub-correlation functions were combined separately and then final correlation function without side-peaks was acquired. The simulation results are given and compared with other techniques. It is shown that acquisition will not be degraded with the increase of k.
基金Project(20100480964) supported by China Postdoctoral Science FoundationProjects(2002AA420090,2008AA092301) supported by the National High Technology Research and Development Program of China
文摘Plenty of dams in China are in danger while there are few effective methods for underwater dam inspections of hidden problems such as conduits,cracks and inanitions.The dam safety inspection remotely operated vehicle(DSIROV) is designed to solve these problems which can be equipped with many advanced sensors such as acoustical,optical and electrical sensors for underwater dam inspection.A least-square parameter estimation method is utilized to estimate the hydrodynamic coefficients of DSIROV,and a four degree-of-freedom(DOF) simulation system is constructed.The architecture of DSIROV's motion control system is introduced,which includes hardware and software structures.The hardware based on PC104 BUS,uses AMD ELAN520 as the controller's embedded CPU and all control modules work in VxWorks real-time operating system.Information flow of the motion system of DSIROV,automatic control of dam scanning and dead-reckoning algorithm for navigation are also discussed.The reliability of DSIROV's control system can be verified and the control system can fulfill the motion control mission because embankment checking can be demonstrated by the lake trials.
基金Supported by the National Natural Science Foundation of China (No.60403027) .
文摘Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed “virtual organizations”. The heterogeneous, dynamic and multi-domain nature of these environments makes challenging security issues that demand new technical approaches. Despite the recent advances in access control approaches applicable to Grid computing, there remain issues that impede the development of effective access control models for Grid applications. Among them there are the lack of context-based models for access control, and reliance on identity or capability-based access control schemes. An access control scheme that resolve these issues is presented, and a dynamically authorized role-based access control (D-RBAC) model extending the RBAC with context constraints is proposed. The D-RABC mechanisms dynamically grant permissions to users based on a set of contextual information collected from the system and user’s environments, while retaining the advantages of RBAC model. The implementation architecture of D-RBAC for the Grid application is also described.
文摘Systematic analysis of influence of blasting vibration on bridges,tunnels,slopes and the mechanical relationships between each other were drawn based on the example of safety argument between blasting mining area and protected objects.The safety argument methods and technological means of controlling dangerous and harmful factors were proposed by the application of principle of risk analysis.And standard control system was established based on controlling the blasting parameters of division of blasting area.
文摘Manufacturing plants are increasingly complex and integrated, requiring control systems able to identify the interactions between the various operating units. Production planning and control design of a process are tools that, if combined, bring many economic benefits to the processes since they aim to identify and maintain optimal decision operations to a system. This work uses such integration between production planning and plantwide control to propose a control system for the Williams-Otto plant from the definition of the operating optimal point for coordinated decentralized optimization, in which the original optimization problem decomposition into smaller coordinated problems ensure that the found local optimum also meets the requirements of the global system. The results for decentralized optimization are satisfactory and very similar to the global optimum problem and to the control system response proposed based on the optimal obtained. It is effective taking smooth actions, working with (economic) optimal set points (economically) of operation. The unification of production planning techniques and plantwide control techniques is an effective tool for the control system design for entire plants.