The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper concerns the problem of uncorrelated periodic disturbance appearing at the error microphone in single-channel feedforward active noise control (ANC) systems. This disturbance, being uncorrelated with the primary noise, cannot be controlled by standard filtered-x least mean square (FxLMS) algorithm, and increases the residual noise. Furthermore, it significantly degrades the steady-state...
To carry out a diagnosis, or detect an abrupt change or fault in dynamic behavior of a studied or supervised system (signal, system or model), on-line or off-line (according to the treated case), it is imperative to develop an installation strategy of a diagnosis tool. In this paper, various techniques of fault detection are presented. The role of hypothesis test as tool for fault presence detection...
The conjecture proposed by J.P. Serre in 1955 saying that a projective module over a polynomial ring is free has been solved independently in 1976 by D. Quillen and A.A. Suslin. As a generalization of it, N.K. Bose and Z. Lin proposed in 1998 a conjecture on the possibility to factorize a certain type of full rank polynomial matrices through zero prime polynomial matrices in order to factor out the...
We study primeness of multidimensional control systems defined in terms of algebraic properties of D = k[xi,…, Xn]-modules and show how to pass from one to another by inversion of a certain π ∊ D. We use these results to determine effectively extended Bézout identities of multidimensional control systems and the minimal number of Xi contained in π.
The problem of partial stabilization is considered for autonomous affine control system. The result on sufficient condition for partial stabilizability is proved, provided that open-loop system admits Lyapunov function with nonpositive lower bounds of derivatives. The result proposed is applied for solving the problem of single-axis stabilization of a rigid body. Two cases are considered. In the first...
As the first step in resolving stability of a manufacturing system in the sense of deadlock, calculation of circular waits might involve time and memory consuming calculations. In this paper we propose an efficient method for determination of circular waits in multiple-reentrant flowline class (MRF) of manufacturing systems. We introduce machine-job incidence (MJI) matrix that can be obtained from...
The focus of this paper is automatic generation of controllers for piecewise-affine hybrid systems (PAHS). Using the proposed method fault tolerant controllers can be designed as faults modelled with uncontrollable events causing switches between discrete modes. The design method involves abstracting PAHS to discrete games and deriving controllers based on winning strategies for the game. The paper...
This paper presents a novel approach to synthesis of time-optimal control laws for the class of Takagi-Sugeno (TS) fuzzy systems. The idea is based on transforming the given TS system into a corresponding Piecewise Affine (PWA). The feedback strategy is derived by using the principles of Model Predictive Control (MPC). In order to cope with the state-dependent changes in process dynamics induced by...
Future multi-agent systems will include embedded microprocessors with limited resources to gather information and actuate the individual agent controller updates. In this paper we examine the stability of such scheme in a cooperative control problem where the actuation updates are event-driven, depending on the ratio of a certain measurement error with respect to the norm of the state. In the centralized...
The Virtual Reference Feedback Tuning (VRFT) is a data based method for the design of feedback controllers; it has been presented by the same authors in previous work. In the original formulation the VRFT method gives a solution to the one degree of freedom model-reference control problem in which the objective is to shape the I/O transfer function of the designed control system. This paper delivers...
While practically applying polynomial methods for design of sampled-data systems attention must paid to the structure of the transfer matrices. The paper considers the specialities of the factorization procedure of rational transfer matrices in connection with the solution of H2 — and associated H∞ — optimization problems for sampled-data systems on the basis of the Wiener-Hopf method.
Typical digital implementations of feedback controllers periodically measure the state, compute the control law, and update the actuators. Although periodicity simplifies the analysis and implementation, it results in a conservative usage of resources. In this paper we drop the periodicity assumption in favor of self-trigger strategies that decide when to measure the state, execute the controller,...
Formations of multi-agent systems, such as satellites, aircrafts and mobile robots require that individual agents satisfy their kinematic equations while constantly maintaining inter-agent constraints. In previous work we introduced the concept of undirected formation graphs and directed formation graphs to model such formations and presented conditions to determine formation feasibility. However...
This paper analyzes two existing methods for securing Git repositories, Git-encrypt and Git-crypt, by comparing their performance relative to the default Git implementation. Securing a Git repository is necessary when the repository contains sensitive or restricted data. This allows the repository to be stored on any third-party cloud provider with assurance that even if the repository data is leaked,...
The plausibility and robustness of an inferential control system entirely depend on the prediction accuracy of the estimator used as the feedback element. This paper is based on a previously proposed Gaussian process inferential controller that employs Gaussian process soft sensor as an estimator. The paper enhances the robustness and the reliability of the control system, particularly, during sensor...
The advent of sensor networks, robots, autonomous vehicles and the smart grid have made the dependability of circuits and systems that control them critical to society and national defense. While significant advances in the design of linear and nonlinear control systems have been made to allow modes of operation not possible in the past, the problem of resilience to errors induced by hostile operating...
The control systems typically use the conventional PID (Proportional, Integral, Derivative) controller to control the direct current (DC) voltage [1]. The obtained control results are relatively well when PID controller is applied, but the design parameters are not absolutely precise and sensitive to the changes of system parameters. The PID controller is used to control the frequency of three-phase...
PR controller in stationary frame which is equivalent to PI controller in synchronous frame has been widely used in the application of PV inverters. While little attention has been devoted to VR(vector-resonant) controller in the application of PV inverters. VR controller in stationary frame is equivalent to VPI(vector PI) controller in synchronous frame, which takes decoupling into consideration...
Control systems rely on accurate sensor measurements to safely regulate physical processes. In False Data Injection (FDI) attacks, adversaries inject forged sensor measurements into a control system in hopes of misguiding control algorithms into taking dangerous actions. Traditional FDI attacks mostly require adversaries to know the full system topology, i.e., hundreds or thousands of lines and buses,...
In this paper, the theme of Exponential Synchronization (ES) for a new class of Complex Dynamical Networks (CDN) with hybrid Time-Varying Delay (TVD) and Non-Time-Varying Delay (NTVD) nodes is investigated by using coupling Periodically Intermittent Pinning Control (PIPC). Based on the Lyapunov Stability Theory (LST), Kronecker product rules and PIPC method, sufficient conditions for ES and PIPC criteria...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.