期刊文献+
共找到33篇文章
< 1 2 >
每页显示 20 50 100
Data Driven Vibration Control:A Review
1
作者 Weiyi Yang Shuai Li Xin Luo 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第9期1898-1917,共20页
With the ongoing advancements in sensor networks and data acquisition technologies across various systems like manufacturing,aviation,and healthcare,the data driven vibration control(DDVC)has attracted broad interests... With the ongoing advancements in sensor networks and data acquisition technologies across various systems like manufacturing,aviation,and healthcare,the data driven vibration control(DDVC)has attracted broad interests from both the industrial and academic communities.Input shaping(IS),as a simple and effective feedforward method,is greatly demanded in DDVC methods.It convolves the desired input command with impulse sequence without requiring parametric dynamics and the closed-loop system structure,thereby suppressing the residual vibration separately.Based on a thorough investigation into the state-of-the-art DDVC methods,this survey has made the following efforts:1)Introducing the IS theory and typical input shapers;2)Categorizing recent progress of DDVC methods;3)Summarizing commonly adopted metrics for DDVC;and 4)Discussing the engineering applications and future trends of DDVC.By doing so,this study provides a systematic and comprehensive overview of existing DDVC methods from designing to optimizing perspectives,aiming at promoting future research regarding this emerging and vital issue. 展开更多
关键词 data driven vibration control(DDVC) data science designing method feedforward control industrial robot input shaping optimizing method residual vibration
下载PDF
A call for enhanced data-driven insights into wind energy flow physics
2
作者 Coleman Moss Romit Maulik Giacomo Valerio Iungo 《Theoretical & Applied Mechanics Letters》 CAS CSCD 2024年第1期6-10,共5页
With the increased availability of experimental measurements aiming at probing wind resources and wind turbine operations,machine learning(ML)models are poised to advance our understanding of the physics underpinning ... With the increased availability of experimental measurements aiming at probing wind resources and wind turbine operations,machine learning(ML)models are poised to advance our understanding of the physics underpinning the interaction between the atmospheric boundary layer and wind turbine arrays,the generated wakes and their interactions,and wind energy harvesting.However,the majority of the existing ML models for predicting wind turbine wakes merely recreate Computational fluid dynamics(CFD)simulated data with analogous accuracy but reduced computational costs,thus providing surrogate models rather than enhanced data-enabled physics insights.Although ML-based surrogate models are useful to overcome current limitations associated with the high computational costs of CFD models,using ML to unveil processes from experimental data or enhance modeling capabilities is deemed a potential research direction to pursue.In this letter,we discuss recent achievements in the realm of ML modeling of wind turbine wakes and operations,along with new promising research strategies. 展开更多
关键词 Machine learning WAKE Wind turbine Wind farm Supervisory control and data acquisition
下载PDF
Blockchain-based data transmission control for Tactical Data Link 被引量:5
3
作者 Wei Feng Yafeng Li +2 位作者 Xuetao Yang Zheng Yan Liang Chen 《Digital Communications and Networks》 SCIE CSCD 2021年第3期285-294,共10页
Tactical Data Link(TDL)is a communication system that utilizes a particular message format and a protocol to transmit data via wireless channels in an instant,automatic,and secure way.So far,TDL has shown its excellen... Tactical Data Link(TDL)is a communication system that utilizes a particular message format and a protocol to transmit data via wireless channels in an instant,automatic,and secure way.So far,TDL has shown its excellence in military applications.Current TDL adopts a distributed architecture to enhance anti-destruction capacity.However,It still faces a problem of data inconsistency and thus cannot well support cooperation across multiple militarily domains.To tackle this problem,we propose to leverage blockchain to build an automatic and adaptive data transmission control scheme for TDL.It achieves automatic data transmission and realizes information consistency among different TDL entities.Besides,applying smart contracts based on blockchain further enables adjusting data transmission policies automatically.Security analysis and experimental results based on simulations illustrate the effectiveness and efficiency of our proposed scheme. 展开更多
关键词 Blockchain Tactical data link CONSENSUS data transmission control
下载PDF
A distributed authentication and authorization scheme for in-network big data sharing 被引量:3
4
作者 Ruidong Li Hitoshi Asaeda +1 位作者 Jie Li Xiaoming Fu 《Digital Communications and Networks》 SCIE 2017年第4期226-235,共10页
Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, w... Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, where big data is cached ubiquitously in the network and retrieved using data names. However, existing authentication and authorization schemes rely mostly on centralized servers to provide certification and mediation services for data retrieval. This causes considerable traffic overhead for the secure distributed sharing of data. To solve this problem, we employ identity-based cryptography (IBC) to propose a Distributed Authentication and Authorization Scheme (DAAS), where an identity-based signature (IBS) is used to achieve distributed verifications of the identities of publishers and users. Moreover, Ciphertext-Policy Attribnte-based encryption (CP-ABE) is used to enable the distributed and fine-grained authorization. DAAS consists of three phases: initialization, secure data publication, and secure data retrieval, which seamlessly integrate authentication and authorization with the in- terest/data communication paradigm in ICN. In particular, we propose trustworthy registration and Network Operator and Authority Manifest (NOAM) dissemination to provide initial secure registration and enable efficient authentication for global data retrieval. Meanwhile, Attribute Manifest (AM) distribution coupled with automatic attribute update is proposed to reduce the cost of attribute retrieval. We examine the performance of the proposed DAAS, which shows that it can achieve a lower bandwidth cost than existing schemes. 展开更多
关键词 Big data Security Authentication ACCESS control In-network data sharing Information-centric network
下载PDF
Separate Dimming Controlling and Data Transmission for an Indoor Visible Light Communication System 被引量:2
5
作者 LIU Xiang YANG Aiying +1 位作者 LI Yankun FENG Lihui 《China Communications》 SCIE CSCD 2015年第3期71-76,共6页
Simultaneous dimming controlling and data transmission are usually required in a white LED based indoor visible light communication system.However,the diming controlling of LED normally interferes the data transmissio... Simultaneous dimming controlling and data transmission are usually required in a white LED based indoor visible light communication system.However,the diming controlling of LED normally interferes the data transmission due to the modulation nonlinearity of LED.In order to solve this problem,a scheme by separating the LEDs for the functions of dimming control and data transmission respectively is proposed in this paper.In the scheme,the LEDs used for dimming control function are driven by a dc amplified circuit,and the LEDs for data transmission are driven by a digital modulation circuit respectively.In this way,the modulation distortion to the data signal caused by the modulation nonlinearity can be avoided even if the dimming is at high level dc driven current.The proof-of-concept experiment of a 2.5Mbit/s visible light communication system demonstrates that the dimming controlling and data transmission can be realized simultaneously in a simple way,and the data transmission is not affected by the dimming controlling function.Compared to previous methods,the scheme in this paper is simpler and cost effective,and makes sense when high rate data is transmitted in a visible light communication system. 展开更多
关键词 visible light communication light emitting diode diming controlling data transmission
下载PDF
TrustControl:Trusted Private Data Usage Control Based on Security Enhanced TrustZone
6
作者 Hong Lei Jun Li +5 位作者 Suozai Li Ming Huang Jieren Cheng Yirui Bai Xinman Luo Chao Liu 《Computers, Materials & Continua》 SCIE EI 2022年第12期5687-5702,共16页
The past decade has seen the rapid development of data in many areas.Data has enormous commercial potential as a new strategic resource that may efficiently boost technical growth and service innovation.However,indivi... The past decade has seen the rapid development of data in many areas.Data has enormous commercial potential as a new strategic resource that may efficiently boost technical growth and service innovation.However,individuals are becoming increasingly concerned about data misuse and leaks.To address these issues,in this paper,we propose TrustControl,a trusted data usage control system to control,process,and protect data usage without revealing privacy.A trusted execution environment(TEE)is exploited to process confidential user data.First of all,we design a secure and reliable remote attestation mechanism for ARM TrustZone,which can verify the security of the TEE platform and function code,thus guaranteeing data processing security.Secondly,to address the security problem that the raw data may be misused,we design a remote dynamic code injection method to regulate that data can only be processed for the expected purpose.Our solution focuses on protecting the sensitive data of the data owner and the function code of the data user to prevent data misuse and leakage.Furthermore,we implement the prototype system of TrustControl on TrustZone-enabled hardware.Real-world experiment results demonstrate that the proposed Trust-Control is secure and the performance overhead of introducing our prototype system is very low. 展开更多
关键词 TRUSTZONE data usage control PRIVACY SECURITY
下载PDF
Data organization and management of mine typical object spectral libraries
7
作者 季民 Jin Fengxiang +2 位作者 Li Ting Sun Yong Guo Lifeng 《High Technology Letters》 EI CAS 2015年第1期96-101,共6页
With the development of mining industry,people have obtained profits from it,but they are facing environmental damages.In order to monitor these environmental changes,a spectral library is set up for the spectrum data... With the development of mining industry,people have obtained profits from it,but they are facing environmental damages.In order to monitor these environmental changes,a spectral library is set up for the spectrum data organization and management of mine typical objects.Most of the spectrum data come from the long-term field measuring in mining area and other spectral libraries.For the data quality control and error detection in the measuring data,an inner precision calculation method is presented and a series of interactive graphical controls are developed for the spectrum visualization and analysis.Through extracting and saving spectrum characters for the mine typical objects,realizs spectrum matching and classification for new measured spectrum samples are realized by using Euclidean distance,Aitchison distance,Pearson correlation coefficient and vector angular cosine methods.Based on the matching result,this work is able to gather dynamically physicochemical environment parameters from the library and gives an early warning for the mine environmental changes. 展开更多
关键词 spectral library mine typical object data organization data quality control spectrum matching spectrum analyzing
下载PDF
PROGRESS OF MARINE METEOROLOGICAL OBSERVATION EXPERIMENT AT MAOMING OF SOUTH CHINA 被引量:7
8
作者 黄健 陈柏纬 《Journal of Tropical Meteorology》 SCIE 2011年第4期418-429,共12页
The coastal area of southern China is frequently affected by marine meteorological disasters,and is also one of the key areas that influence the short-term climate change of China.Due to a lack of observational facili... The coastal area of southern China is frequently affected by marine meteorological disasters,and is also one of the key areas that influence the short-term climate change of China.Due to a lack of observational facilities and techniques,little has been done in this area in terms of operational weather monitoring and scientific research on atmospheric and marine environment.With the support of China Meteorological Administration (CMA) and Guangdong Meteorological Bureau (GMB),the Marine Meteorological Science Experiment Base (MMSEB) at Bohe,Maoming has been jointly established by Guangzhou Institute of Tropical and Marine Meteorology (GITMM) and Maoming Meteorological Bureau (MMB) of Guangdong Province after three years of hard work.It has become an integrated coastal observation base that is equipped with a complete set of sophisticated instruments.Equipment maintenance and data quality control procedures have been implemented to ensure the long-term,steady operation of the instruments and the availability of high quality data.Preliminary observations show that the data obtained by the MMSEB reveal many interesting features in the boundary layer structure and air-sea interaction in such disastrous weather as typhoons and sea fog.The MMSEB is expected to play an important role in the scientific research of disastrous weather related to marine meteorology. 展开更多
关键词 Marine Meteorological Science Experiment Base Maoming OBSERVATION data quality control
下载PDF
Development of practical postprocessor for 5-axis machine tool with non-orthogonal rotary axes 被引量:14
9
作者 JUNG Hyoun-Chul HWANG Jong-Dae +1 位作者 PARK Ki-Beom JUNG Yoon-Gyo 《Journal of Central South University》 SCIE EI CAS 2011年第1期159-164,共6页
In order to develop a practical postprocessor for 5-axis machine tool,the general equations of numerically controlled(NC) data for 5-axis configurations with non-orthogonal rotary axes were exactly expressed by the in... In order to develop a practical postprocessor for 5-axis machine tool,the general equations of numerically controlled(NC) data for 5-axis configurations with non-orthogonal rotary axes were exactly expressed by the inverse kinematics,and a windows-based postprocessor written with Visual Basic was developed according to the proposed algorithm.The developed postprocessor is a general system suitable for all kinds of 5-axis machines with orthogonal and non-orthogonal rotary axes.Through implementation of the developed postprocessor and verification by a cutting simulation and machining experiment,the effectiveness of the proposed algorithm is confirmed.Compatibility is improved by allowing exchange of data formats such as rotational total center position(RTCP) controlled NC data,vector post NC data,and program object file(POF) cutter location(CL) data,and convenience is increased by adding the function of work-piece origin offset.Consequently,a practical post-processor for 5-axis machining is developed. 展开更多
关键词 post-processor 5-axis machining non-orthogonal rotary axes numerically controlled (NC) data CL data
下载PDF
MAVP-FE:Multi-Authority Vector Policy Functional Encryption with Efficient Encryption and Decryption 被引量:1
10
作者 WANG Jing HUANG Chuanhe +3 位作者 YANG Kan WANG Jinhai WANG Xiaomao CHEN Xi 《China Communications》 SCIE CSCD 2015年第6期126-140,共15页
In cloud,data access control is a crucial way to ensure data security.Functional encryption(FE) is a novel cryptographic primitive supporting fine-grained access control of encrypted data in cloud.In FE,every cipherte... In cloud,data access control is a crucial way to ensure data security.Functional encryption(FE) is a novel cryptographic primitive supporting fine-grained access control of encrypted data in cloud.In FE,every ciphertext is specified with an access policy,a decryptor can access the data if and only if his secret key matches with the access policy.However,the FE cannot be directly applied to construct access control scheme due to the exposure of the access policy which may contain sensitive information.In this paper,we deal with the policy privacy issue and present a mechanism named multi-authority vector policy(MAVP) which provides hidden and expressive access policy for FE.Firstly,each access policy is encoded as a matrix and decryptors can only obtain the matched result from the matrix in MAVP.Then,we design a novel function encryption scheme based on the multi-authority spatial policy(MAVPFE),which can support privacy-preserving yet non-monotone access policy.Moreover,we greatly improve the efficiency of encryption and decryption in MAVP-FE by shifting the major computation of clients to the outsourced server.Finally,the security and performance analysis show that our MAVP-FE is secure and efficient in practice. 展开更多
关键词 cloud storage data access control functional encryption hidden access policy efficiency
下载PDF
Automated Detection of Contaminated Radar Image Pixels in Mountain Areas 被引量:1
11
作者 刘黎平 QinXU +1 位作者 PengfeiZHANG ShunLIU 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2008年第5期778-790,共13页
In mountain areas, radar observations are often contaminated (1) by echoes from high-speed moving vehicles and (2) by point-wise ground clutter under either normal propagation (NP) or anomalous propagation (AP... In mountain areas, radar observations are often contaminated (1) by echoes from high-speed moving vehicles and (2) by point-wise ground clutter under either normal propagation (NP) or anomalous propagation (AP) conditions. Level Ⅱ data are collected from KMTX (Salt Lake City, Utah) radar to analyze these two types of contamination in the mountain area around the Great Salt Lake. Human experts provide the "ground truth" for possible contamination of either type on each individual pixel. Common features are then extracted for contaminated pixels of each type. For example, pixels contaminated by echoes from high-speed moving vehicles are characterized by large radial velocity and spectrum width. Echoes from a moving train tend to have larger velocity and reflectivity but smaller spectrum width than those from moving vehicles on highways. These contaminated pixels are only seen in areas of large terrain gradient (in the radial direction along the radar beam). The same is true for the second type of contamination - pointwise ground clutters. Six quality control (QC) parameters are selected to quantify the extracted features. Histograms are computed for each QC parameter and grouped for contaminated pixels of each type and also for non-contaminated pixels. Based on the computed histograms, a fuzzy logical algorithm is developed for automated detection of contaminated pixels. The algorithm is tested with KMTX radar data under different (clear and rainy) weather conditions. 展开更多
关键词 radar data quality control membership function point-wise ground clutter moving vehicle echoes
下载PDF
Derivation of Regression Coefficients for Sea Surface Temperature Retrieval over East Asia
12
作者 Myoung-Hwan AHN Eun-Ha SOHN +2 位作者 Byong-Jun HWANG Chu-Yong CHUNG Xiangqian WU 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2006年第3期474-486,共13页
Among the regression-based algorithms for deriving SST from satellite measurements, regionally optimized algorithms normally perform better than the corresponding global algorithm. In this paper, three algorithms are ... Among the regression-based algorithms for deriving SST from satellite measurements, regionally optimized algorithms normally perform better than the corresponding global algorithm. In this paper, three algorithms are considered for SST retrieval over the East Asia region (15°-55°N, 105°-170°E), including the multi-channel algorithm (MCSST), the quadratic algorithm (QSST), and the Pathfinder algorithm (PFSST). All algorithms are derived and validated using collocated buoy and Geostationary Meteorological Satellite (GMS-5) observations from 1997 to 2001. An important part of the derivation and validation of the algorithms is the quality control procedure for the buoy SST data and an improved cloud screening method for the satellite brightness temperature measurements. The regionally optimized MCSST algorithm shows an overall improvement over the global algorithm, removing the bias of about -0.13℃ and reducing the root-mean-square difference (rmsd) from 1.36℃ to 1.26℃. The QSST is only slightly better than the MCSST. For both algorithms, a seasonal dependence of the remaining error statistics is still evident. The Pathfinder approach for deriving a season-specific set of coefficients, one for August to October and one for the rest of the year, provides the smallest rmsd overall that is also stable over time. 展开更多
关键词 Regional SST algorithm GMS-5 data quality control cloud detection
下载PDF
Networking dual-surveillance/dual-pair-tele-paths for critical urban areas
13
作者 Hsu Li-Yen 《Journal of Southeast University(English Edition)》 EI CAS 2008年第S1期114-119,共6页
Providing a reliable and efficient communication infrastructure for critical regions is generally a strategy used to enhance regional safety or to sustain regional development. For such purposes, the spider-web networ... Providing a reliable and efficient communication infrastructure for critical regions is generally a strategy used to enhance regional safety or to sustain regional development. For such purposes, the spider-web network is prototyped as a cellular telecommunication infrastructure for its advantages including being interference-free, possessing fault-tolerance, having security management, and countering radio's multipath effects. Besides, it is used to develop area-based-street-SCADA (supervisory control and data acquisition) networks composed of regular optimal degree-3 prototyped sub-networks with the concepts of dual-surveillance, operational order and Hamiltonian laceability, and it flexibly fits various circulation configurations. Moreover, it can offer integrative response capabilities even after two paths' SCADA networks have been ruined. 展开更多
关键词 supervisory control and data acquisition (SCADA) TELECOMMUNICATION transportation
下载PDF
Real Time Control System for Metro Railways Using PLC & SCADA
14
作者 Ishu Tomar Indu Sreedevi Neeta Pandey 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期1403-1421,共19页
This paper proposes to adopt SCADA and PLC technology for the improvement of the performance of real time signaling&train control systems in metro railways.The main concern of this paper is to minimize the failure... This paper proposes to adopt SCADA and PLC technology for the improvement of the performance of real time signaling&train control systems in metro railways.The main concern of this paper is to minimize the failure in automated metro railways system operator and integrate the information coming from Operational Control Centre(OCC),traction SCADA system,traction power control,and power supply system.This work presents a simulated prototype of an automated metro train system operator that uses PLC and SCADA for the real time monitoring and control of the metro railway systems.Here,SCADA is used for the visualization of an automated process operation and then the whole opera-tion is regulated with the help of PLC.The PLC used in this process is OMRON(NX1P2-9024DT1)and OMRON’s Sysmac studio programming software is used for developing the ladder logic of PLC.The metro railways system has deployed infrastructure based on SCADA from the power supply system,and each station’s traction power control is connected to the OCC remotely which commands all of the stations and has the highest command priority.An alarm is triggered in the event of an emergency or system congestion.This proposed system overcomes the drawbacks of the current centralized automatic train control(CATC)system.This system provides prominent benefits like augmenting services which may enhance a network’s full load capacity and networkflexibility,which help in easy modification in the existing program at any time. 展开更多
关键词 Train control system AUTOMATION PLC(programmable logic controller) SCADA(supervisory control and data acquisition)
下载PDF
Three Projects of Intelligent Distribution Automation System in East Asia
15
作者 B.N. Ha S.W. Lee C.H. Shin M.J. Jang G.W. Nam 《Journal of Energy and Power Engineering》 2011年第2期179-183,共5页
Intelligent distribution automation system (IDAS) was developed based on distribution automation system that was installed in all distribution offices of Korea. IDAS was designed the combined system with the functio... Intelligent distribution automation system (IDAS) was developed based on distribution automation system that was installed in all distribution offices of Korea. IDAS was designed the combined system with the function of supervisory control and data acquisition (SCADA) and distribution automation system (DAS) for network operation from substation to high voltage customer, and it has been installed in Vietnam, China and Indonesia. This paper explains the project scope, system configuration, and the function of each sy stem. 展开更多
关键词 SCADA (supervisory control and data acquisition) DAS (distribution automation system) RTU (remote tenninal unit) FTU (feeder remote unit) communication media protocol.
下载PDF
Wind turbine fault detection based on SCADA data analysis using ANN 被引量:17
16
作者 Zhen-You Zhang Ke-ShengWang 《Advances in Manufacturing》 SCIE CAS 2014年第1期70-78,共9页
Wind energy is one of the fast growing sources of power production currently, and there is a great demand to reduce the cost of operation and maintenance. Most wind farms have installed supervisory control and data ac... Wind energy is one of the fast growing sources of power production currently, and there is a great demand to reduce the cost of operation and maintenance. Most wind farms have installed supervisory control and data acquisition (SCADA) systems for system control and logging data. However, the collected data are not used effectively. This paper proposes a fault detection method for main bearing wind turbine based on existing SCADA data using an artificial neural network (ANN). The ANN model for the normal behavior is established, and the difference between theoretical and actual values of the parameters is then calculated. Thus the early stage of main bearing fault can be identified to let the operator have sufficient time to make more informed decisions for maintenance. 展开更多
关键词 Artificial neural network (ANN) Supervisor control and data acquisition (SCADA) Wind turbine Fault detection
原文传递
Clinical data quality problems and countermeasure for real world study 被引量:6
17
作者 Runshun Zhang Yinghui Wang +4 位作者 Baoyan Liu Guangli Song Xuezhong Zhou Shizhen Fan Xishui Pan 《Frontiers of Medicine》 SCIE CAS CSCD 2014年第3期352-357,共6页
Real world study (RWS) has become a hotspot for clinical research. Data quality plays a vital role in research achievement and other clinical research fields. In this paper, the common quality problems in the RWS of... Real world study (RWS) has become a hotspot for clinical research. Data quality plays a vital role in research achievement and other clinical research fields. In this paper, the common quality problems in the RWS of traditional Chinese medicine are discussed, and a countermeasure is proposed. 展开更多
关键词 real world study traditional Chinese medicine clinical and research information sharing system data quality problem data quality control
原文传递
Synchronization of nonlinear multi-agent systems using a non-fragile sampled data control approach and its application to circuit systems 被引量:1
18
作者 Stephen AROCKIA SAMY Raja RAMACHANDRAN +1 位作者 Pratap ANBALAGAN Yang CAO 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2023年第4期553-566,共14页
The main aim of this work is to design a non-fragile sampled data control(NFSDC) scheme for the asymptotic synchronization criteria for interconnected coupled circuit systems(multi-agent systems, MASs). NFSDC is used ... The main aim of this work is to design a non-fragile sampled data control(NFSDC) scheme for the asymptotic synchronization criteria for interconnected coupled circuit systems(multi-agent systems, MASs). NFSDC is used to conduct synchronization analysis of the considered MASs in the presence of time-varying delays. By constructing suitable Lyapunov functions, sufficient conditions are derived in terms of linear matrix inequalities(LMIs) to ensure synchronization between the MAS leader and follower systems. Finally, two numerical examples are given to show the effectiveness of the proposed control scheme and less conservation of the proposed Lyapunov functions. 展开更多
关键词 Multi-agent systems(MASs) Non-fragile sampled data control(NFSDC) Time-varying delay Linear matrix inequality(LMI) Asymptotic synchronization
原文传递
Optimal Threshold Policies for Robust Data Center Control 被引量:1
19
作者 WENG Paul 邱泽麒 +2 位作者 COSTANZO John 阴小骐 SINOPOLI Bruno 《Journal of Shanghai Jiaotong university(Science)》 EI 2018年第1期52-60,共9页
With the simultaneous rise of energy costs and demand for cloud computing, efficient control of data centers becomes crucial. In the data center control problem, one needs to plan at every time step how many servers t... With the simultaneous rise of energy costs and demand for cloud computing, efficient control of data centers becomes crucial. In the data center control problem, one needs to plan at every time step how many servers to switch on or off in order to meet stochastic job arrivals while trying to minimize electricity consumption. This problem becomes particularly challenging when servers can be of various types and jobs from different classes can only be served by certain types of server, as it is often the case in real data centers. We model this problem as a robust Markov decision process(i.e., the transition function is not assumed to be known precisely). We give sufficient conditions(which seem to be reasonable and satisfied in practice) guaranteeing that an optimal threshold policy exists. This property can then be exploited in the design of an efficient solving method, which we provide.Finally, we present some experimental results demonstrating the practicability of our approach and compare with a previous related approach based on model predictive control. 展开更多
关键词 data center control Markov decision process threshold policy ROBUSTNESS
原文传递
Dynamic data packing towards the optimization of QoC and QoS in networked control systems 被引量:5
20
作者 KANG Yu ZHAO YunBo 《Science China(Technological Sciences)》 SCIE EI CAS CSCD 2016年第1期72-80,共9页
A class of networked control systems is investigated whose communication network is shared with other applications. The design objective for such a system setting is not only the optimization of the control performanc... A class of networked control systems is investigated whose communication network is shared with other applications. The design objective for such a system setting is not only the optimization of the control performance but also the efficient utilization of the communication resources. We observe that at a large time scale the data packet delay in the communication network is roughly varying piecewise constant, which is typically true for data networks like the Internet. Based on this observation, a dynamic data packing scheme is proposed within the recently developed packet-based control framework for networked control systems. As expected this proposed approach achieves a fine balance between the control performance and the communication utilization: the similar control performance can be obtained at dramatically reduced cost of the communication resources. Simulations illustrate the effectiveness of the proposed approach. 展开更多
关键词 networked control systems packet delay variation dynamic data packing quality of control quality of service
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部