期刊文献+
共找到18篇文章
< 1 >
每页显示 20 50 100
Trajectory tracking of powered parafoil based on characteristic model based all-coefficient adaptive control 被引量:2
1
作者 檀盼龙 孙青林 +3 位作者 蒋玉新 朱二琳 陈增强 贺应平 《Journal of Central South University》 SCIE EI CAS CSCD 2017年第5期1073-1081,共9页
One of the primary difficulties in using powered parafoil(PPF) systems is the lack of effective trajectory tracking controllers since the trajectory tracking control is the essential operation for PPF to accomplish au... One of the primary difficulties in using powered parafoil(PPF) systems is the lack of effective trajectory tracking controllers since the trajectory tracking control is the essential operation for PPF to accomplish autonomous tasks. The characteristic model(CM) based all-coefficient adaptive control(ACAC) designed for PPF systems in horizontal and vertical trajectory control is proposed. The method is easy to use and convenient to adjust and test. Just a few parameters are adapted during the control process. In application, vertical and horizontal CMs are designed and ACAC controllers are constructed to control vertical altitude and horizontal trajectory of PPF based on the proposed CMs, respectively. Result analysis of different simulations shows that the applied ACAC control method is effective for trajectory tracking of the PPF systems and the approach guarantees the transient performance of the PPF systems with better disturbance rejection ability. 展开更多
关键词 powered PARAFOIL (PPF) CHARACTERISTIC model (CM) all-coefficient adaptive control (ACAC) TRAJECTORY tracking
下载PDF
Design and optimization in multiphase homing trajectory of parafoil system 被引量:2
2
作者 高海涛 陶金 +1 位作者 孙青林 陈增强 《Journal of Central South University》 SCIE EI CAS CSCD 2016年第6期1416-1426,共11页
In order to realize safe and accurate homing of parafoil system,a multiphase homing trajectory planning scheme is proposed according to the maneuverability and basic flight characteristics of the vehicle.In this scena... In order to realize safe and accurate homing of parafoil system,a multiphase homing trajectory planning scheme is proposed according to the maneuverability and basic flight characteristics of the vehicle.In this scenario,on the basis of geometric relationship of each phase trajectory,the problem of trajectory planning is transformed to parameter optimizing,and then auxiliary population-based quantum differential evolution algorithm(AP-QDEA)is applied as a tool to optimize the objective function,and the design parameters of the whole homing trajectory are obtained.The proposed AP-QDEA combines the strengths of differential evolution algorithm(DEA)and quantum evolution algorithm(QEA),and the notion of auxiliary population is introduced into the proposed algorithm to improve the searching precision and speed.The simulation results show that the proposed AP-QDEA is proven its superior in both effectiveness and efficiency by solving a set of benchmark problems,and the multiphase homing scheme can fulfill the requirement of fixed-points and upwind landing in the process of homing which is simple in control and facile in practice as well. 展开更多
关键词 优化设计 系统 翼伞 微分进化算法 量子进化算法 分段 优化目标函数 差分进化算法
下载PDF
A Research and Analysis Method of Open Source Threat Intelligence Data
3
作者 Ruyue Liu Ziping Zhao +3 位作者 Chengjun Sun Xiaoyu Yang Xiaoli Gong Jin Zhang 《国际计算机前沿大会会议论文集》 2017年第1期88-90,共3页
As the form of cyber threats becomes more complex,which leads to a widespread concern about how to promote network security active defense system by using the exploding cyber threat intelligence.Basing on the content ... As the form of cyber threats becomes more complex,which leads to a widespread concern about how to promote network security active defense system by using the exploding cyber threat intelligence.Basing on the content analysis method,introduces the precision,recall rate and timely rate on the basis of the change of time dimension,and analyzes the threat intelligence provider from three aspects.The validity of this method is verified by the test of massive source of threat data,which improves the efficiency of CIF analysis and makes it easy to analyze and extract the threat intelligence information quickly. 展开更多
关键词 THREAT INTELLIGENCE CYBER SECURITY CIF
下载PDF
NSGA Ⅱ based multi-objective homing trajectory planning of parafoil system 被引量:1
4
作者 陶金 孙青林 +1 位作者 陈增强 贺应平 《Journal of Central South University》 SCIE EI CAS CSCD 2016年第12期3248-3255,共8页
Homing trajectory planning is a core task of autonomous homing of parafoil system.This work analyzes and establishes a simplified kinematic mathematical model,and regards the homing trajectory planning problem as a ki... Homing trajectory planning is a core task of autonomous homing of parafoil system.This work analyzes and establishes a simplified kinematic mathematical model,and regards the homing trajectory planning problem as a kind of multi-objective optimization problem.Being different from traditional ways of transforming the multi-objective optimization into a single objective optimization by weighting factors,this work applies an improved non-dominated sorting genetic algorithm Ⅱ(NSGA Ⅱ) to solve it directly by means of optimizing multi-objective functions simultaneously.In the improved NSGA Ⅱ,the chaos initialization and a crowding distance based population trimming method were introduced to overcome the prematurity of population,the penalty function was used in handling constraints,and the optimal solution was selected according to the method of fuzzy set theory.Simulation results of three different schemes designed according to various practical engineering requirements show that the improved NSGA Ⅱ can effectively obtain the Pareto optimal solution set under different weighting with outstanding convergence and stability,and provide a new train of thoughts to design homing trajectory of parafoil system. 展开更多
关键词 非支配排序遗传算法 多目标优化问题 轨迹规划 系统 翼伞 多目标函数 单目标优化 模糊集理论
下载PDF
Method for Latency Measurement of Visual Feedback-Based Master–Slave Minimally Invasive Surgical Robot 被引量:1
5
作者 Jinhua Li Jingchao Shen +2 位作者 He Su Shuxin Wang Jianmin Li 《Transactions of Tianjin University》 EI CAS 2018年第4期375-386,共12页
To measure the latency between human motion stimulation and stereo image display response in a visual feedback-based minimally invasive surgical(MIS) robotic system,a method was proposed by comparing the orientations ... To measure the latency between human motion stimulation and stereo image display response in a visual feedback-based minimally invasive surgical(MIS) robotic system,a method was proposed by comparing the orientations of input and output events through image-processing technology. This method used a black bar to keep pace with the measured joint rotating at a number of speeds. During tests,an external camera was placed in front of the apparatus with a proper visual field,so that it can simultaneously view orientations of both bars fixed on the corresponding joints. After quantitatively analyzing the accuracy of the proposed measurement method,the method was applied to a visual feedback-based master–slave robotic system with two-degrees-of-freedom. Experimental results show that the latency of the overall system was approximately 250 ms,and the opposite clearance of the measured joint was in the range of 1.7°–1.9°. 展开更多
关键词 MINIMALLY INVASIVE surgical(MIS)robot LATENCY measurement Real time Visual feedback
下载PDF
Formation Control for Nonlinear Multi-agent Systems with Linear Extended State Observer 被引量:6
6
作者 Wen Qin Zhongxin Liu Zengqiang Chen 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2014年第2期171-179,共9页
This paper investigates the formation control problem for nonlinear multi-agent systems with a virtual leader. A distributed formation control strategy based on linear extended state observer(LESO) is proposed under t... This paper investigates the formation control problem for nonlinear multi-agent systems with a virtual leader. A distributed formation control strategy based on linear extended state observer(LESO) is proposed under the hypothesis that velocity of the agent s neighbors could not be measured. Some sufficient conditions are established to ensure that the nonlinear multi-agent systems form a predefined formation with switching topology when the nonlinear function is known. Moreover, the tracking errors are bounded with external disturbance. Lastly,a numerical example with different scenarios is presented to demonstrate the validity of the obtained results. 展开更多
下载PDF
"Smart Cafe": A Mobile Local Computing System Based On Indoor Virtual Cloud 被引量:2
7
作者 PU Lingjun XU Jingdong YU Bowen ZHANG Jianzhong 《China Communications》 SCIE CSCD 2014年第4期38-49,共12页
With network developing and virtualization rising,more and more indoor environment(POIs) such as cafe,library,office,even bus and subway can provide plenty of bandwidth and computing resources.Meanwhile many people da... With network developing and virtualization rising,more and more indoor environment(POIs) such as cafe,library,office,even bus and subway can provide plenty of bandwidth and computing resources.Meanwhile many people daily spending much time in them are still suffering from the mobile device with limited resources.This situation implies a novel local cloud computing paradigm in which mobile device can leverage nearby resources to facilitate task execution.In this paper,we implement a mobile local computing system based on indoor virtual cloud.This system mainly contains three key components:1) As to application,we create a parser to generate the "method call and cost tree" and analyze it to identify resourceintensive methods.2) As to mobile device,we design a self-learning execution controller to make offloading decision at runtime.3) As to cloud,we construct a social scheduling based application-isolation virtual cloud model.The evaluation results demonstrate that our system is effective and efficient by evaluating CPUintensive calculation application.Memoryintensive image translation application and 1/O-intensive image downloading application. 展开更多
关键词 计算机系统 移动设备 室内环境 虚拟化 咖啡馆 应用程序 基础 智能
下载PDF
Neurological functional evaluation based on accurate motions in big animals with traumatic brain injury 被引量:1
8
作者 Ji-Peng Jiang Xue-Gang Niu +9 位作者 Chen Dai Ke Ma Hui-You Xu Shi-Xiang Cheng Zhi-Wen Zhang Feng Duan Xu Zhu Yu-Ting Wang Xu-Yi Chen Sai Zhang 《Neural Regeneration Research》 SCIE CAS CSCD 2019年第6期991-996,共6页
An accurate and effective neurological evaluation is indispensable in the treatment and rehabilitation of traumatic brain injury. However,most of the existing evaluation methods in basic research and clinical practice... An accurate and effective neurological evaluation is indispensable in the treatment and rehabilitation of traumatic brain injury. However,most of the existing evaluation methods in basic research and clinical practice are not objective or intuitive for assessing the neurological function of big animals, and are also difficult to use to qualify the extent of damage and recovery. In the present study, we established a big animal model of traumatic brain injury by impacting the cortical motor region of beagles. At 2 weeks after successful modeling, we detected neurological deficiencies in the animal model using a series of techniques, including three-dimensional motion capture, electromyogram and ground reaction force. These novel technologies may play an increasingly important role in the field of traumatic brain injury diagnosis and rehabilitation in the future. The experimental protocol was approved by the Animal Care and Use Committee of Logistics University of People's Armed Police Force(approval No. 2017-0006.2). 展开更多
关键词 nerve REGENERATION evaluation method NEUROLOGICAL deficiency TRAUMATIC brain injury motion capture ELECTROMYOGRAM ground reaction force neural REGENERATION
下载PDF
Visual Simulation of Multiple Fluids in Computer Graphics: A State-of-the-Art Report 被引量:2
9
作者 Bo Ren Xu-Yun Yang +3 位作者 Ming C. Lin Nils Thuerey Matthias Teschner Chenfeng Li 《Journal of Computer Science & Technology》 SCIE EI CSCD 2018年第3期431-451,共21页
Realistic animation of various interactions between multiple fluids, possibly undergoing phase change, is a challenging task in computer graphics. The visual scope of multi-phase multi-fluid phenomena covers complex t... Realistic animation of various interactions between multiple fluids, possibly undergoing phase change, is a challenging task in computer graphics. The visual scope of multi-phase multi-fluid phenomena covers complex tangled surface structures and rich color variations, which can greatly enhance visual effect in graphics applications. Describing such phenomena requires more complex models to handle challenges involving the calculation of interactions, dynamics and spatial distribution of multiple phases, which are often involved and hard to obtain real-time performance. Recently, a diverse set of algorithms have been introduced to implement the complex multi-fluid phenomena based on the governing physical laws and novel discretization methods to accelerate the overall computation while ensuring numerical stability. By sorting through the target phenomena of recent research in the broad subject of multiple fluids, this state-of-the-art report summarizes recent advances on multi-fluid simulation in computer graphics. 展开更多
关键词 physical simulation multiple fluids computer graphics
原文传递
Algebraic state space approach to model and control combined automata
10
作者 Yongyi YAN Zengqiang CHEN Jumei YUE 《Frontiers of Computer Science》 SCIE EI CSCD 2017年第5期874-886,共13页
A new modeling tool, algebraic state space approach to logical dynamic systems, which is developed recently based on the theory of semi-tensor product of matrices (STP), is applied to the automata field. Using the S... A new modeling tool, algebraic state space approach to logical dynamic systems, which is developed recently based on the theory of semi-tensor product of matrices (STP), is applied to the automata field. Using the STE this paper investigates the modeling and controlling problems of combined automata constructed in the ways of parallel, serial and feedback. By representing the states, input and output symbols in vector forms, the transition and output functions are expressed as algebraic equations of the states and inputs. Based on such algebraic descriptions, the control problems of combined automata, including output control and state control, are considered, and two necessary and sufficient conditions are presented for the controllability, by which two algorithms are established to find out all the control strings that make a combined automaton go to a target state or produce a desired output. The results are quite different from existing methods and provide a new angle and means to understand and analyze the dynamics of combined automata. 展开更多
关键词 AUTOMATA COMPOSITION CONTROLLABILITY algebraic state space approach semi-tensor product
原文传递
Modeling and reachability analysis of synchronizing transitions bounded Petri net systems based upon semi-tensor product of matrices
11
作者 Gao Na Han Xiaoguang +1 位作者 Chen Zengqiang Zhang Qing 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2017年第1期77-86,共10页
The reachability problem of synchronizing transitions bounded Petri net systems (BPNSs) is investigated in this paper by constructing a mathematical model for dynamics of BPNS. Using the semi-tensor product (STP) ... The reachability problem of synchronizing transitions bounded Petri net systems (BPNSs) is investigated in this paper by constructing a mathematical model for dynamics of BPNS. Using the semi-tensor product (STP) of matrices, the dynamics of BPNSs, which can be viewed as a combination of several small bounded subnets via synchronizing transitions, are described by an algebraic equation. When the algebraic form for its dynamics is established, we can present a necessary and sufficient condition for the reachability between any marking (or state) and initial marking. Also, we give a corresponding algorithm to calculate all of the transition paths between initial marking and any target marking. Finally, an example is shown to illustrate proposed results. The key advantage of our approach, in which the set of reachable markings of BPNSs can be expressed by the set of reachable markings of subnets such that the big reachability set of BPNSs do not need generate, is partly avoid the state explosion problem of Petri nets (PNs). 展开更多
关键词 REACHABILITY Petri nets BPNSs semi-tensor product (STP) of matrices synchronizing transitions
原文传递
A Learning Evasive Email-Based P2P-Like Botnet
12
作者 Zhi Wang Meilin Qin +2 位作者 Mengqi Chen Chunfu Jia Yong Ma 《China Communications》 SCIE CSCD 2018年第2期15-24,共10页
Nowadays, machine learning is widely used in malware detection system as a core component. The machine learning algorithm is designed under the assumption that all datasets follow the same underlying data distribution... Nowadays, machine learning is widely used in malware detection system as a core component. The machine learning algorithm is designed under the assumption that all datasets follow the same underlying data distribution. But the real-world malware data distribution is not stable and changes with time. By exploiting the knowledge of the machine learning algorithm and malware data concept drift problem, we show a novel learning evasive botnet architecture and a stealthy and secure C&C mechanism. Based on the email communication channel, we construct a stealthy email-based P2 P-like botnet that exploit the excellent reputation of email servers and a huge amount of benign email communication in the same channel. The experiment results show horizontal correlation learning algorithm is difficult to separate malicious email traffic from normal email traffic based on the volume features and time-related features with enough confidence. We discuss the malware data concept drift and possible defense strategies. 展开更多
关键词 机器学习算法 P2P 电子邮件 恶意软件 数据分发 数据概念 核心部件 时间变化
下载PDF
Solving type-2 fuzzy relation equations via semi-tensor product of matrices 被引量:10
13
作者 Yongyi YAN Zengqiang CHEN Zhongxin LIU 《Control Theory and Technology》 EI CSCD 2014年第2期173-186,共14页
The problem of solving type-2 fuzzy relation equations is investigated. In order to apply semi-tensor product of matrices, a new matrix analysis method and tool, to solve type-2 fuzzy relation equations, a type-2 fuzz... The problem of solving type-2 fuzzy relation equations is investigated. In order to apply semi-tensor product of matrices, a new matrix analysis method and tool, to solve type-2 fuzzy relation equations, a type-2 fuzzy relation is decomposed into two parts as principal sub-matrices and secondary sub-matrices; an r-ary symmetrical-valued type-2 fuzzy relation model and its corresponding symmetrical-valued type-2 fuzzy relation equation model are established. Then, two algorithms are developed for solving type-2 fuzzy relation equations, one of which gives a theoretical description for general type-2 fuzzy relation equations; the other one can find all the solutions to the symmetrical-valued ones. The results can improve designing type-2 fuzzy controllers, because it provides knowledge to search the optimal solutions or to find the reason if there is no solution. Finally some numerical examples verify the correctness of the results/algorithms. 展开更多
关键词 Fuzzy control system Type-2 fuzzy logic system Type-2 fuzzy relation Type-2 fuzzy relation equation Semi- tensor product of matrices
原文传递
Semi-tensor product of matrices approach to reachability of finite automata with application to language recognition 被引量:9
14
作者 Yongyi YAN Zengqiang CHEN Zhongxin LIU 《Frontiers of Computer Science》 SCIE EI CSCD 2014年第6期948-957,共10页
This paper investigates the transition function and the reachability conditions of finite automata by using a semitensor product of matrices, which is a new powerful matrix analysis tool. The states and input symbols ... This paper investigates the transition function and the reachability conditions of finite automata by using a semitensor product of matrices, which is a new powerful matrix analysis tool. The states and input symbols are first expressed in vector forms, then the transition function is described in an algebraic form. Using this algebraic representation, a sufficient and necessary condition of the reachability of any two states is proposed, based on which an algorithm is developed for discovering all the paths from one state to another. Furthermore, a mechanism is established to recognize the language acceptable by a finite automaton. Finally, illustrative examples show that the results/algorithms presented in this paper are suitable for both deterministic finite automata (DFA) and nondeterministic finite automata (NFA). 展开更多
关键词 finite automata reachability analysis transition function expression matrix approach semi-tensor product
原文传递
Verification analysis of self-verifying automata via semi-tensor product of matrices 被引量:1
15
作者 YAN Yong-yi CHEN Zeng-qiang LIU Zhong-xin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2014年第4期96-104,共9页
The semi-tensor product (STP) of matrices was used in the article, as a new matrix analysis tool, to investigate the problem of verification of self-verifying automata (SVA). SVA is a special variant of finite aut... The semi-tensor product (STP) of matrices was used in the article, as a new matrix analysis tool, to investigate the problem of verification of self-verifying automata (SVA). SVA is a special variant of finite automata which is essential to nondeterministic communication with a limited number of advice bits. The status, input and output symbols are expressed in vector forms, the dynamic behaviour of SVA is modelled as matrix product is STP. By such algebraic formulation, three an algebraic equation of the states and inputs, in which the necessary and sufficient conditions are presented for the verification problem, by which three algorithms are established to find out all the strings which are accepted, rejected, or unrecognized by a SVA. Testing examples show the correctness of the results. 展开更多
关键词 SVA recognition power matrix approach STP matrices
原文传递
Compatible-invariant subset analysis of deterministic finite automata via semi-tensor product of matrices approach
16
作者 Zhang Zhipeng Chen Zengqiang Liu Zhongxin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2018年第5期75-82,共8页
The compatible-invariant subset of deterministic finite automata( DFA) is investigated to solve the problem of subset stabilization under the frameworks of semi-tensor product( STP) of matrices. The concepts of co... The compatible-invariant subset of deterministic finite automata( DFA) is investigated to solve the problem of subset stabilization under the frameworks of semi-tensor product( STP) of matrices. The concepts of compatibleinvariant subset and largest compatible-invariant subset are introduced inductively for Moore-type DFA,and a necessary condition for the existence of largest compatible-invariant subset is given. Meanwhile,by using the STP of matrices,a compatible feasible event matrix is defined with respect to the largest compatible-invariant subset.Based on the concept of compatible feasible event matrix,an algorithm to calculate the largest compatible-invariant subset contained in a given subset is proposed. Finally,an illustrative example is given to validate the results. 展开更多
关键词 discrete event dynamical systems (DEDSs) finite automata compatible iuvariant semi-tensor product (STP) compatible feasible eventmatrix
原文传递
Event-Triggered Consensus for Multiple Nonholonomic Systems 被引量:1
17
作者 LI Miao LIU Zhongxin CHEN Zengqiang 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2018年第5期1227-1243,共17页
关键词 触发事件 多重 系统 控制策略 时间间隔 数字模拟 协议
原文传递
Lom: Discovering Logic Flaws Within MongoDB-based Web Applications
18
作者 Shuo Wen Yuan Xue +4 位作者 Jing Xu Li-Ying Yuan Wen-Li Song Hong-Ji Yang Guan-Nan Si 《International Journal of Automation and computing》 EI CSCD 2017年第1期106-118,共13页
Logic flaws within web applications will allow malicious operations to be triggered towards back-end database. Existing approaches to identifying logic flaws of database accesses are strongly tied to structured query ... Logic flaws within web applications will allow malicious operations to be triggered towards back-end database. Existing approaches to identifying logic flaws of database accesses are strongly tied to structured query language (SQL) statement construction and cannot be applied to the new generation of web applications that use not only structured query language (NoSQL) databases as the storage tier. In this paper, we present Lom, a black-box approach for discovering many categories of logic flaws within MongoDB- based web applications. Our approach introduces a MongoDB operation model to support new features of MongoDB and models the application logic as a mealy finite state machine. During the testing phase, test inputs which emulate state violation attacks are constructed for identifying logic flaws at each application state. We apply Lom to several MongoDB-based web applications and demonstrate its effectiveness. 展开更多
关键词 Logic flaw web application security not only structured query language (NoSQL) database BLACK-BOX MougoDB.
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部