期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Multivariable temperature measurement and control system of large-scaled vertical quench furnace based on temperature field 被引量:7
1
作者 XuanZHOU ShouyiYU +1 位作者 JiangYU LiequanLIANG 《控制理论与应用(英文版)》 EI 2004年第4期401-405,共5页
A temperature control system of 31m vertical forced air-circulation quench furnace is proposed, which is a kind of equipment critical for thermal treatment of aluminum alloy components that are widely used in aerospac... A temperature control system of 31m vertical forced air-circulation quench furnace is proposed, which is a kind of equipment critical for thermal treatment of aluminum alloy components that are widely used in aerospace industry. For the effective operation of the furnace, it is essential to analyze the radial temperature distribution of the furnace. A set of thermodynamic balance equations modeling is established firsdy. By utilizing the numerical analysis result to modify the temperature measurements, the control accuracy and precision of the temperature are truly guaranteed. Furthermore, the multivariable decoupling self-learning PID control algorithm based on the characteristics of strong coupling between the multi-zones in the large-scaled furnace is implemented to ensure the true homogeneity of the axial temperature distribution. Finally, the redundant structure composed of industrial control computers and touch panels leads to great improvement of system reliability. 展开更多
关键词 Axial temperature distribution homogeneity Radial temperature distribution Decoupling self-learning PID control redundant structure
下载PDF
基于双判据故障检测法的水下机器人航向容错系统设计(英文)
2
作者 魏延辉 刘静 +1 位作者 郝晟功 胡加兴 《Journal of Marine Science and Application》 CSCD 2019年第4期530-541,共12页
This paper proposes a heading fault tolerance scheme for operation-level underwater robots subject to external interference.The scheme is based on a double-criterion fault detection method using a redundant structure ... This paper proposes a heading fault tolerance scheme for operation-level underwater robots subject to external interference.The scheme is based on a double-criterion fault detection method using a redundant structure of a dual electronic compass.First,two subexpansion Kalman filters are set up to fuse data with an inertial attitude measurement system.Then,fault detection can effectively identify the fault sensor and fault source.Finally,a fault-tolerant algorithm is used to isolate and alarm the faulty sensor.The program can effectively detect the constant magnetic field interference,change the magnetic field interference and small transient magnetic field interference,and conduct fault tolerance control in time to ensure the heading accuracy of the system.Test verification shows that the system is practical and effective. 展开更多
关键词 Underwaterrobot Headingfault tolerance redundant structure Double-criteria failuredetection FederatedKalman filter Electronic compass
下载PDF
Research on Cyberspace Mimic Defense Based on Dynamic Heterogeneous Redundancy Mechanism 被引量:1
3
作者 Junjie Xu 《Journal of Computer and Communications》 2021年第7期1-7,共7页
With the rapid growth of network technology, the methods and types of cyber-attacks are increasing rapidly. Traditional static passive defense technologies focus on external security and known threats to the target sy... With the rapid growth of network technology, the methods and types of cyber-attacks are increasing rapidly. Traditional static passive defense technologies focus on external security and known threats to the target system and cannot resist advanced persistent threats. To solve the situation that cyberspace security is easy to attack and difficult to defend, Chinese experts on cyberspace security proposed an innovative theory called mimic defense, it is an active defense technology that employs “Dynamic, Heterogeneous, Redundant” architecture to defense attacks. This article first briefly describes the classic network defense technology and Moving Target Defense (MTD). Next, it mainly explains in detail the principles of the mimic defense based on the DHR architecture and analyzes the attack surface of DHR architecture. This article also includes applications of mimic defense technology, such as mimic routers, and mimic web defense systems. Finally, it briefly summarizes the existing research on mimic defense, expounds the problems that need to be solved in mimic defense, and looks forward to the future development of mimic defense. 展开更多
关键词 Cyberspace Mimic Defense Dynamic Heterogeneous Redundancy structure Defense Technology Network Security
下载PDF
Aircraft vulnerability modeling and computation methods based on product structure and CATIA 被引量:13
4
作者 Li Jun Yang Wei +3 位作者 Zhang Yugang Pei Yang Ren Yunsong Wang Wei 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2013年第2期334-342,共9页
Survivability strengthening/vulnerability reduction designs have become one of the most important design disciplines of military aircraft now. Due to progressiveness and complexity of modern combat aircraft, the exist... Survivability strengthening/vulnerability reduction designs have become one of the most important design disciplines of military aircraft now. Due to progressiveness and complexity of modern combat aircraft, the existing vulnerability modeling and computation methods cannot meet the current engineering application requirements. Therefore, a vulnerability modeling and computation method based on product structure and CATIA is proposed in sufficient consideration of the design characteristics of modern combat aircraft. This method directly constructs the aircraft vulnerability model by CATIA or the digital model database, and manages all the product components of the vulnerability model via aircraft product structure. Using CAA second development, the detailed operations and computation methods of vulnerability analysis are integrated into CATIA software environment. Comprehensive assessment data and visual kill probability Iso-contours can also be presented, which meet the vulnerability analysis requirements of modern combat aircraft effectively. The intact vulnerability model of one hypothetical aircraft is constructed, and the effects of redundant technology to the aircraft vulnerability are assessed, which validate the engineering practicality of the method. 展开更多
关键词 Aircraft assembly Combat effectiveness CATIA Kill probability Product structure Vulnerability Redundancy
原文传递
Research on a six-phase permanent magnet synchronous motor system at dual-redundant and fault tolerant modes in aviation application 被引量:1
5
作者 Xiaolin KUANG Hong GUO +1 位作者 Jinquan XU Tong ZHOU 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2017年第4期1548-1560,共13页
With the development of more/all electrical aircraft technology, an electro-mechanical actuator(EMA) is more and more used in an aircraft actuation system. The motor system, as the crucial part of an EMA, usually ad... With the development of more/all electrical aircraft technology, an electro-mechanical actuator(EMA) is more and more used in an aircraft actuation system. The motor system, as the crucial part of an EMA, usually adopts the redundancy technology or fault tolerance technology to improve the reliability. To compare the performances of these two motor systems, a 10-pole/12-slot six-phase permanent magnet synchronous motor(PMSM) is designed with the concentrated single-layer winding, which is able to operate at dual-redundant and fault tolerant modes.Furthermore, the position servo performances of the six-phase PMSM at dual-redundant and fault tolerant modes are analyzed, including the normal and fault conditions. In addition, a variable structure proportional-integral-derivative(PID) control strategy is proposed to solve the performance degradation problem caused by phase current saturation. Simulation and experimental results show that the fault tolerant PMSM has a better position servo performance than the dual-redundant PMSM, and the variable structure PID control strategy is able to improve the performance due to phase current saturation. 展开更多
关键词 Electro-mechanical actua tors Fault tolerant Permanent magnet syn chronous motor Redundancy Variable structure PID control
原文传递
Methods for Controlling the Authenticity of Textual Information Transfer on the Basis of Statistical and Structural Redundancy 被引量:1
6
作者 Akmal R.Akhatov 《International Journal of Automation and computing》 EI 2012年第5期518-529,共12页
In this paper,the problem of increasing information transfer authenticity is formulated.And to reach a decision,the control methods and algorithms based on the use of statistical and structural information redundancy ... In this paper,the problem of increasing information transfer authenticity is formulated.And to reach a decision,the control methods and algorithms based on the use of statistical and structural information redundancy are presented.It is assumed that the controllable information is submitted as the text element images and it contains redundancy,caused by statistical relations and non-uniformity probability distribution of the transmitted data.The use of statistical redundancy allows to develop the adaptive rules of the authenticity control which take into account non-stationarity properties of image data while transferring the information.The structural redundancy peculiar to the container of image in a data transfer package is used for developing new rules to control the information authenticity on the basis of pattern recognition mechanisms.The techniques offered in this work are used to estimate the authenticity in structure of data transfer packages.The results of comparative analysis for developed methods and algorithms show that their parameters of efficiency are increased by criterion of probability of undetected mistakes,labour input and cost of realization. 展开更多
关键词 Authenticity data transfer text element structural and statistical redundancy probability of non-detected mistakes
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部