Real-Time Implementation of Adaptive Optimal Controller Based on a Pseudo-Space Model into PLC
|
|
- Willis Spencer
- 6 years ago
- Views:
Transcription
1 Proceedings of the th WSEAS International Conference on SYSEMS, Agios Nikolaos, Crete Island, Greece, Jl 3-5, 7 3 Real-ime Implementation of Adaptive Optimal Controller Based on a Psedo-Space Model into PLC PER PIVOKA, VLASIMIL LORENC Department of Atomatic Control and Instrmentation Faclt of Electrical Engineering and Commnication, Brno Universit of echnolog Kolejni 4, 6 Brno CZECH REPUBLIC Abstract: - his paper describes the design and implementation of adaptive linear optimal controller (LQ) based on a psedo-space model into PLC. For identification of the controlled sstem an algorithm based on artificial neral netork is sed. he method of comfortable implementation of algorithms from the MALAB/Simlink environment into PLC is shon. In the first step of implementation the algorithm is designed in the simlation environment. he second step contains verification of the designed algorithm dring real process control, and finall is the algorithm moved from MALAB/Simlink into PLC. he basic condition for realization of the described implementation method is the existence of real-time commnication beteen MALAB/Simlink and PLC. his article shos ho real-time commnication can be created sing PLC B&R. he behavior of the described adaptive LQ algorithm is compared ith that of adaptive PSD controller dring control of the real sstem. Ke-Words: - Adaptive controller, Optimal controller, MALAB, Simlink, PLC, Levenberg-Marardt, Neral Netorks, Self-ning Introdction he prpose of adaptive controllers is to adapt control la parameters of control la to changes of the controlled sstem. Man tpes of adaptive controllers are knon. In this article the adaptive self-tning LQ controller is described. he scheme of this controller is separated into the to main parts: identification and controller. In this ork, identification based on neral netork approach is sed and the control algorithm is the linear adratic optimal controller. Figre shos the architectre of the self-tning LQ controller here denotes desired vale, denotes action vale and denotes otpt of the controlled sstem. On-line Identification he most important part of self-tning sstems is the on-line identification algorithm. Widel sed method for identification of sstems is recrsive least sares method (RLS). Instead of RLS, the identification method based on neral netork can be sed. A ver fast algorithm for training neral netorks is the Levenberg-Marardt (LM) algorithm. he main idea of on-line identification is that according to the measred inpt to the identified sstem (t) and the corresponding sstem otpt (t) e are able to find the vector of sstem parameters. ( Plant ( Specification of control la LQ controller Process parameters On-line NN identification Plant NN ( - + Fig.. Architectre of self-tning LQ controller. Fig.. he principle of identification of sstem sing neral netork.
2 Proceedings of the th WSEAS International Conference on SYSEMS, Agios Nikolaos, Crete Island, Greece, Jl 3-5, 7 4 For compting of the identified sstem otpt e can se the linear ARX model b z + b z + b z F M. () 3 3 ( z ) 3 + az + az + a3z he ARX model can be ritten in vector form as follos ( ϕ ( θ ( here [ ( k )... ( k m) ( k )... ( k n ] () ϕ ( k ) ) (3) is the vector of measred inpts and otpts and [ b (... b ( a (... a ( k ] θ k ) (4) ( ) m is the vector of estimated sstem parameters and k denotes discrete time. As it has been mentioned above, the Levenberg Marardt method can be sed for training of the neral netork. he ne vector of parameters is in each step given b next eation. ( JJ + λi ) J ε ( θ ( k + ) θ ( (5) here J is Jacobian matrix in the form ε ε... j J, (6) ε p ε p... j and is the vector of errors beteen the otpt of the sstem and the otpt of the model for all training patterns. he parameter p denotes the nmber of training patterns and j denotes the nmber of estimated parameters. he reason h identification based on neral netork approach as sed instead of RLS is that sing a neral netork e can set a shorter sampling period [7]. hen the controller is able to reject errors faster. 3 Linear LQ Controller he action vale of LQ controller is solved according to the identified model () and according to the minimization of adratic performance (7) in each step. Qadratic performance is defined b n k + k k+ ( ( ( ) + ( ( ( ) J x ( Qxk ( ) + (7) here ( denotes the desired vale, ( denotes sstem otpt and ( is action vale. Parameter ( is a signal eal to the desired vale, hich is sed for elimination of offset. Parameters ( ) denote eights for otpt (action) vale, k denotes the first step hile the minimization is sed and x (Qx( denotes the minimm in the last step k +. When e ork ith the psedo state matrix S [S,S x,s,s ] defined b [ b ] S [ ] S (8) [ ] S S x b bm a a (9) n and hen e introdce the psedo state vector z ( [x(, (,(] and x [(, x(k-),(,(] S(z(k-) e can rerite the adratic performance to the more sitable form [, ] k + k k + J z ( Qz(. () Using a nonstandard state vector e can bild niversal adratic performance. For example, for standard penalization according to eation (7) matrix Q is defined as follos Q. () he method for minimization in each step is knon [, ] and is described b next eations.
3 Proceedings of the th WSEAS International Conference on SYSEMS, Agios Nikolaos, Crete Island, Greece, Jl 3-5, 7 5 ( ) ( ) k + z k + S QSz ( k + ) z ( k + ) Hz( k + ) J () he minimm of () is given for derivation b (k +) eal to zero * J ( k z m + ) ( k + ) ( H H H H ) z ( k + ) ϕϕ ϕ here ( k + ) (k + -) and ϕ z m is z ( k + ) m H Hϕ H Hϕ Hϕϕ For next minimization step e can rite * J ( k + ) ( k + ) Qz( k + ) (3) ithot (4) * zm ( k + ) H zm( k + ) + (5) + z Where matrix H* H xx H x H - H x is defined at previos step. he algorithm given above is nsitable for practical calclations. he reason is that matrix H ceased to be positivel definite (semi-definite). his means that the algorithm can be nstable. he soltion is LD-FIL decomposition []. When e ork ith matrix G instead of H here HGDG and G is a loer trianglar matrix and D is a diagonal matrix, e can rerite adratic performance to the form G [ (, ( k ), (, ( ] ϕ (6) Minimization of eation (5) at step k is G ( + G ϕ ϕ( k ) (7) Where G and G are sb-matrices of G. Finall, the action vale is in each step compted as follos ( G G ϕ( k ) ϕ. o smmarize in the table belo, e can see the recrsive algorithm for compting of the LQ controller. Step Eation and Notes. H* H xx H x H - H x recrsivel solves lost fnction. GDG LD-FIL decomposition 3. ( G Gx x( k ) solves action vale able. Iteration algorithm of LQ controller. 4 Implementation of designed control algorithm into PLC 4. Introdction he described control algorithm as created in the MALAB/Simlink environment and then as implemented to the programmable logic controller (PLC) B&R. Design and implementation ere done in three steps. In the first step the algorithm as designed and tested onl sing MALAB/Simlink. In the second step MALAB/Simlink as interconnected ith the PLC. his step allos verification properties of the designed control algorithm dring control of the real sstem. It is important to notice that in this case e have the same possibilities for verification of the control algorithm behavior, and e can ver easil change its parameters and monitor the alit of real process reglation. In the third step the algorithm is moved from MALAB/Simlink to the PLC. For fast and comfortable accomplishment of this step it is necessar to se a langage hich can be sed in MALAB/Simlink and in the PLC environment as ell. In or case the langage ANSI C as sed. his implementation method is faster than in the case hen the control algorithm is developed directl in the environment of PLC. he reason is that MALAB/Simlink allos more comfortable methods and tools for design, debgging and testing of algorithms. Another major advantage is that the PLC is not necessar for the first step of implementation. 4. Connection beteen MALAB/Simlink and PLC B&R For realization of the described implementation scheme it is imperative to establish connection beteen MALAB/Simlink and PLC. his commnication as carried ot sing Process Visalization Interface (PVI). he PVI is a file of tools and libraries for the operating sstem MS Windos and is provided as a component of the
4 Proceedings of the th WSEAS International Conference on SYSEMS, Agios Nikolaos, Crete Island, Greece, Jl 3-5, 7 6 B&R AUOMAION NE softare. he PVI procres a commnication interface beteen PLC B&R and applications on PC ith MS Windos [6]. As a phsical netork laer Ethernet or RS-3 link can be sed. he most important part of PVI is the PVI Manager. his tilit provides netork connection beteen PC and PLC. Using PVI libraries and some standard development environment (e.g. MS Visal Stdio or Borland Delphi) it is possible to create ser application hich can, b force of PVI Manager, commnicate ith PLC. In or case, the commnication client as created as the s-fnction for MALAB/Simlink. he s-fnction represents a real controlled sstem. hat means that the s-fnction realizes transfer of the action vale compted in MALAB to the PLC, and from the PLC vales representing the otpt of the real controlled sstem are transferred. In the PLC, a task is rnning hich onl resends these vales into and from the real process sing D/A and A/D converters. Next figre shos the scheme of the described commnication. response ith the self-tning PSD controller based on the modified Ziegler Nichols method [, 4]. In both cases identification ith the neral netork approach and the same setp and initial conditions ere sed. he sampling period as set to s s. U [V] reference vale action vale sstem otpt time [s] Fig. 4. Real process control sing LQ controller (., ). 8 6 reference vale action vale sstem otpt Real controlled sstem U [V] 4 D/A Converter A/D Converter PLC PVI Manager Ethernet or RS-3 PC time [s] Fig. 5. Real process control sing self-tning PSD controller MALAB/Simlink on Control algorithm s-fnction PVI Client Fig. 3. he scheme of commnication beteen MALAB/Simlink and PLC B&R. 5 Real Process Control Reslts he described LQ controller as implemented into the PLC B&R. Used as the controlled sstem as the laborator model ith the transfer fnction F ( s). In the figre 3 e can (s + )( s + ) see the real process response ith the described LQ control algorithm. Figre 4 shos real the process In comparison of to previos figres e can see that sing LQ controller as reach better reslts notabl in case of changes of action vale. As it as shon above e can modif the criterion of LQ controller b changing of to parameters and. he parameter inflences the changes of action vale and is standard penalization of control error. In fact the criterion is dependent on relation of these to parameters. If e set, then e have onl one parameter for changing of criterion. he responses of LQ controller are optimal in regard of the criterion bt it doesn t mean that the are optimal from the ser s viepoint. he ser specifications can be ver easil inclded to the control la sing parameter.
5 Proceedings of the th WSEAS International Conference on SYSEMS, Agios Nikolaos, Crete Island, Greece, Jl 3-5, Conclsion It as described design of adaptive LQ controller. his algorithm solves one iteration in each step. hat means the time for compting is short and this algorithm is sitable for implementation in indstrial controller. As it as shon above the properties of control la can be changed sing one parameter. his algorithm as implemented to the indstrial controller appling of third-step implementation scheme, hich allos control of real processes directl from MALAB/Simlink environment. B sing this method can be saved time for development of the control algorithm, becase MALAB/Simlink is able to give more comfortable possibilities for design and debgging of algorithm in comparison ith the environment of PLC. he commnication beteen MALAB/Simlink and PLC B&R sing PVI as described. Acknoledgement: he paper has been prepared as a part of the soltion of Czech Science Fondation GAR project No. /6/3 Soft Compting in Control and b the Czech Ministr of Edcation in the frame of MSM MSM6359 Intelligent Sstems in Atomation. References: [] Švancara, K., Adaptive Optimal Controller ith Identification Based on Neral Netorks, PhD thesis, FEEC BU, Brno 4. [] Bobál V., Böhm J., Practical Aspects of Self- ning Controllers, Algorithms and Implementation, VUIUM, 999, in Czech, ISBN [3] Švancara K., Pivonka P., Closed Loop On-line Identification Based on Neral Netorks in Adaptive Optimal Controller, In Proceedings of th Zitta Fzz Colloim, Zitta (German),. [4] Koínek, V., Comnication MALAB-Ethernet. Diploma thesis in Czech, FEEC BU, Brno 3. [5] Lorenc V., Self-ning Controllers in MALAB - B&R Environment, Diploma thesis in Czech, FEEC BU, Brno 6. [6] B&R Docmentation. Atomation Net/PVI Online Help, AS4Ee, 997-7, [7] Veleba, V., he advantages of identification based on neral netork approach, In Proceedings of the th conference Stdent EEIC, BRNO 5.
Switched state-feedback controllers with multi-estimators for MIMO systems
Proceedings of the th WEA Int Conf on COMPUTATIONAL INTELLIGENCE MAN-MACHINE YTEM AND CYBERNETIC Venice Ital November - 6 89 witched state-feedback controllers with mlti-estimators for MIMO sstems LIBOR
More informationMethod to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot
Method to bild an initial adaptive Nero-Fzzy controller for joints control of a legged robot J-C Habmremyi, P. ool and Y. Badoin Royal Military Academy-Free University of Brssels 08 Hobbema str, box:mrm,
More informationOn the complexity of Submap Isomorphism
On the compleit of Sbmap Isomorphism Christine Solnon 1,2, Gillame Damiand 1,2, Colin de la Higera 3, and Jean-Christophe Janodet 4 1 INSA de Lon, LIRIS, UMR 5205 CNRS, 69621 Villerbanne, France 2 Université
More informationUnit Testing with VectorCAST and AUTOSAR
Unit Testing with VectorCAST and AUTOSAR Vector TechDay Software Testing with VectorCAST V1.0 2018-11-15 Agenda Introdction Unit Testing Demo Working with AUTOSAR Generated Code Unit Testing AUTOSAR SWCs
More informationMaster for Co-Simulation Using FMI
Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany
More informationAn Extended Fault-Tolerant Link-State Routing Protocol in the Internet
An Extended Falt-Tolerant Link-State Roting Protocol in the Internet Jie W, Xiaola Lin, Jiannong Cao z, and Weijia Jia x Department of Compter Science and Engineering Florida Atlantic Uniersit Boca Raton,
More informationMobility Control and Its Applications in Mobile Ad Hoc Networks
Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai Department of Compter Science and Engineering Florida Atlantic Uniersity Boca Raton, FL 3331 Abstract Most existing localized
More informationNetwork layer. Two Key Network-Layer Functions. Datagram Forwarding table. IP datagram format. IP Addressing: introduction
Netork laer transport segment sending to receiing host on sending side encapslates segments into grams on rcing side, deliers segments to transport laer laer protocols in eer host, roter roter eamines
More informationVideo Seamless Splicing Method Based on SURF Algorithm and Harris Corner Points Detection
Vol13 (Softech 016), pp138-14 http://dxdoiorg/101457/astl016137 Video Seamless Splicing Method Based on SURF Algorithm and Harris Corner Points Detection Dong Jing 1, Chen Dong, Jiang Shuen 3 1 College
More informationBlurred Palmprint Recognition Based on Relative Invariant Structure Feature
5 International Conference on Comptational Science and Comptational Intelligence Blrred Palmprint Recognition Based on Relative Invariant Strctre Featre Gang Wang, Weibo Wei*, Zhenkan Pan College of Information
More informationBayesian Hypothesis Testing
Baesian Hpothesis Testing H. Gterman Artificial Neral Netorks רשתות עצביות מלאכותיות 36539 Baesian Hpothesis Testing and Baes Factors Baesian p-vales Baes Factors for model comparison 3 Eas to implement
More informationIDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION
ICAS 2 CONGRESS IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION Christophe Le Garrec, Marc Hmbert, Michel Lacabanne Aérospatiale Matra
More informationMulti-lingual Multi-media Information Retrieval System
Mlti-lingal Mlti-media Information Retrieval System Shoji Mizobchi, Sankon Lee, Fmihiko Kawano, Tsyoshi Kobayashi, Takahiro Komats Gradate School of Engineering, University of Tokshima 2-1 Minamijosanjima,
More informationChapter 4: Network Layer. TDTS06 Computer networks. Chapter 4: Network Layer. Network layer. Two Key Network-Layer Functions
Chapter : Netork Laer TDTS06 Compter s Lectre : Netork laer II Roting algorithms Jose M. Peña, jospe@ida.li.se ID/DIT, LiU 009-09- Chapter goals: nderstand principles behind laer serices: laer serice models
More informationMobility Control and Its Applications in Mobile Ad Hoc Networks
Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai, Florida Atlantic Uniersity Abstract Most eisting localized protocols in mobile ad hoc netorks, sch as data commnication
More informationChapter 4: Network Layer
Chapter 4: Introdction (forarding and roting) Reie of qeeing theor Roting algorithms Link state, Distance Vector Roter design and operation IP: Internet Protocol IP4 (datagram format, addressing, ICMP,
More informationAssignments. Computer Networks LECTURE 7 Network Layer: Routing and Addressing. Network Layer Function. Internet Architecture
ompter Netorks LETURE Netork Laer: Roting and ddressing ssignments Project : Web Pro Serer DUE OT Sandha Darkadas Department of ompter Science Uniersit of Rochester Internet rchitectre Bottom-p: phsical:
More informationAn Optimization of Granular Network by Evolutionary Methods
An Optimization of Granlar Networ by Evoltionary Methods YUN-HEE HAN, KEUN-CHANG KWAK* Dept. of Control, Instrmentation, and Robot Engineering Chosn University 375 Seos-dong, Dong-g, Gwangj, 50-759 Soth
More informationEthernet Basics Learning Switches. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers
Ethernet Basics Learning Sitches based on Chapter 4 of CompTIA Netork+ Eam Guide, 4 th ed., Mike Meers Sitch Forarding A sitch forards frames based on destination MAC address Ho does the sitch kno hich
More informationPART I: Adding Instructions to the Datapath. (2 nd Edition):
EE57 Instrctor: G. Pvvada ===================================================================== Homework #5b De: check on the blackboard =====================================================================
More informationÚstav teorie informace a automatizace. Academy of Sciences of the Czech Republic Institute of Information Theory and Automation RESEARCH REPORT
Akademie věd České repblik Ústav teorie informace a atomatizace Academ of Sciences of the Czech Repblic Institte of Information Theor and Atomation RESEARCH REPORT Miroslav Novák, Ldvík Tesař A Set of
More informationIndustrial Data Communications - Fundamentals
Industrial Data Communications - Fundamentals Tutorial 1 This tutorial on the fundamentals of communications is broken don into the folloing sections: Communication Modes Synchronous versus Asynchronous
More informationCAPL Scripting Quickstart
CAPL Scripting Qickstart CAPL (Commnication Access Programming Langage) For CANalyzer and CANoe V1.01 2015-12-03 Agenda Important information before getting started 3 Visal Seqencer (GUI based programming
More informationXiang Li. Temple University. September 6, 2016
Introdction to Matlab Xiang Li Temple University September 6, 2016 Otline Matlab Introdction Get yor own copy of Matlab Data Types Matrices Operators MAT-LAB Introdction Matlab is a programming langage
More informationThe extra single-cycle adders
lticycle Datapath As an added bons, we can eliminate some of the etra hardware from the single-cycle path. We will restrict orselves to sing each fnctional nit once per cycle, jst like before. Bt since
More informationThe final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.
The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5
More information15.4 Constrained Maxima and Minima
15.4 Constrained Maxima and Minima Question 1: Ho do ou find the relative extrema of a surface hen the values of the variables are constrained? Question : Ho do ou model an optimization problem ith several
More informationABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS
Proceedings th FIG Symposim on Deformation Measrements Santorini Greece 00. ABSOUTE DEFORMATION PROFIE MEASUREMENT IN TUNNES USING REATIVE CONVERGENCE MEASUREMENTS Mahdi Moosai and Saeid Khazaei Mining
More informationOn Plane Constrained Bounded-Degree Spanners
On Plane Constrained Bonded-Degree Spanners Prosenjit Bose 1, Rolf Fagerberg 2, André an Renssen 1, Sander Verdonschot 1 1 School of Compter Science, Carleton Uniersity, Ottaa, Canada. Email: jit@scs.carleton.ca,
More informationThe effectiveness of PIES comparing to FEM and BEM for 3D elasticity problems
The effectiveness of PIES comparing to FEM and BEM for 3D elasticit problems A. Boltc, E. Zienik, K. Sersen Faclt of Mathematics and Compter Science, Universit of Bialstok, Sosnowa 64, 15-887 Bialstok,
More informationDecoders. 3-Input Full Decoder
ecoders A fll decoder with n inpts has 2 n otpts. Let inpts be labeled In, In, In 2,..., In n, and let otpts be labeled Ot, Ot,..., Ot 2 n. A fll decoder fnctions as follows: Only one of otpts has vale
More informationPreserving Privacy of Continuous High-dimensional Data with Minimax Filters
Preserving Privacy of Continos High-dimensional Data ith Filters Jihn Hamm Department of Compter Science and Engineering, The Ohio State University, OH 43210, USA Abstract Preserving privacy of high-dimensional
More informationPipelined van Emde Boas Tree: Algorithms, Analysis, and Applications
This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,
More informationOn Plane Constrained Bounded-Degree Spanners
Algorithmica manscript No. (ill be inserted by the editor) 1 On Plane Constrained Bonded-Degree Spanners 2 3 Prosenjit Bose Rolf Fagerberg André an Renssen Sander Verdonschot 4 5 Receied: date / Accepted:
More informationA FRACTAL WATERMARKING SCHEME FOR IMAGE IN DWT DOMAIN
A FRACTAL WATERMARKING SCHEME FOR IMAGE IN DWT DOMAIN ABSTRACT A ne digital approach based on the fractal technolog in the Disperse Wavelet Transform domain is proposed in this paper. First e constructed
More informationContinuity Smooth Path Planning Using Cubic Polynomial Interpolation with Membership Function
J Electr Eng Technol Vol., No.?: 74-?, 5 http://dx.doi.org/.537/jeet.5..?.74 ISSN(Print) 975- ISSN(Online) 93-743 Continity Smooth Path Planning Using Cbic Polomial Interpolation with Membership Fnction
More information[1] Hopcroft, J., D. Joseph and S. Whitesides, Movement problems for twodimensional
Acknoledgement. The athors thank Bill Lenhart for interesting discssions on the recongration of rlers. References [1] Hopcroft, J., D. Joseph and S. Whitesides, Moement problems for todimensional linkages,
More informationBasics of Digital Logic Design
ignals, Logic Operations and Gates E 675.2: Introdction to ompter rchitectre asics of igital Logic esign Rather than referring to voltage levels of signals, we shall consider signals that are logically
More informationPARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT
PAAMETE OPTIMIZATION FO TAKAGI-SUGENO FUZZY MODELS LESSONS LEANT Manfred Männle Inst. for Compter Design and Falt Tolerance Univ. of Karlsrhe, 768 Karlsrhe, Germany maennle@compter.org Brokat Technologies
More informationMETAMODEL FOR SOFTWARE SOLUTIONS IN COMPUTED TOMOGRAPHY
VOL. 10, NO 22, DECEBER, 2015 ISSN 1819-6608 ETAODEL FOR SOFTWARE SOLUTIONS IN COPUTED TOOGRAPHY Vitaliy ezhyev Faclty of Compter Systems and Software Engineering, Universiti alaysia Pahang, Gambang, alaysia
More informationExploiting Actuator Limits with Feedforward Control based on Inverse Models
Exploiting Actator Limits with Feedforward Control based on Inverse Models Manel Gräber TLK-Thermo GmbH Hans-Sommer-Str. 5, 386 Branschweig, German Abstract Feedforward control based on inverse dnamic
More informationImage Denoising Algorithms
Image Denoising Algorithms Xiang Hao School of Compting, University of Utah, USA, hao@cs.tah.ed Abstract. This is a report of an assignment of the class Mathematics of Imaging. In this assignment, we first
More informationWorksheet And Programme Listing
GETTING STARTED WITH PYGAME ZERO ON THE RASPBERRY PI Worksheet And Programme Listing.technoisaledcation.co.k This resorce is copyright TechnoVisal Limited 2017 bt permission is gien to freely copy for
More informationIntroduction to Fieldbus and DeviceNetworks
Fieldbus and Device Netorks This tutorial on Fieldbus and Device Netorks is broken don into the folloing sections: Introduction to Fieldbus and DeviceNetorks A brief overvie of Profibus Introduction to
More informationLab 8 (All Sections) Prelab: ALU and ALU Control
Lab 8 (All Sections) Prelab: and Control Name: Sign the following statement: On my honor, as an Aggie, I have neither given nor received nathorized aid on this academic work Objective In this lab yo will
More informationNetworks An introduction to microcomputer networking concepts
Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES
More informationTdb: A Source-level Debugger for Dynamically Translated Programs
Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,
More informationCS 251, Spring 2018, Assignment 3.0 3% of course mark
CS 25, Spring 28, Assignment 3. 3% of corse mark De onday, Jne 25th, 5:3 P. (5 points) Consider the single-cycle compter shown on page 6 of this assignment. Sppose the circit elements take the following
More informationTowards Tight Bounds on Theta-Graphs
Toards Tight Bonds on Theta-Graphs arxiv:10.633v1 [cs.cg] Apr 01 Prosenjit Bose Jean-Lo De Carfel Pat Morin André van Renssen Sander Verdonschot Abstract We present improved pper and loer bonds on the
More informationThe single-cycle design from last time
lticycle path Last time we saw a single-cycle path and control nit for or simple IPS-based instrction set. A mlticycle processor fies some shortcomings in the single-cycle CPU. Faster instrctions are not
More informationOptimal Sampling in Compressed Sensing
Optimal Sampling in Compressed Sensing Joyita Dtta Introdction Compressed sensing allows s to recover objects reasonably well from highly ndersampled data, in spite of violating the Nyqist criterion. In
More informationLecture 10. Diffraction. incident
1 Introdction Lectre 1 Diffraction It is qite often the case that no line-of-sight path exists between a cell phone and a basestation. In other words there are no basestations that the cstomer can see
More informationPROGRAM LICENSE AGREEMENT LIMITED WARRANTY... 4 Trademarks Contents Preface... 11
. Contents PROGRAM LICENSE AGREEMENT... LIMITED WARRANTY... 4 Trademarks... 6. Contents... 8 Preface... 2. Overview... 3 2. Jst one other important thing... 3 2.2 Abot the ser manal... 4 2.3 Manal System
More informationTopic Continuity for Web Document Categorization and Ranking
Topic Continity for Web ocment Categorization and Ranking B. L. Narayan, C. A. Mrthy and Sankar. Pal Machine Intelligence Unit, Indian Statistical Institte, 03, B. T. Road, olkata - 70008, India. E-mail:
More informationScientific Computing on Bulk Synchronous Parallel Architectures
Scientific Compting on Blk Synchronos Parallel Architectres R. H. Bisseling Department of Mathematics, Utrecht University and W. F. McColl y Programming Research Grop, Oxford University April 27, 1994
More informationAdvanced Techniques for Predicting Mechanical Product Design via COMSOL Multiphysics
Advanced Techniqes for Predicting Mechanical Prodct Design via COMSOL Mltiphsics Shobing Zhang 1 1 CAEaid, Inc. *Corresponding athor: 184 Jeffs Ln, Astin, TX 78717, shobing.hang@caeaid.com Abstract: Mechanical
More informationComputing the weights of criteria with interval-valued fuzzy sets for MCDM problems Chen-Tung Chen 1, Kuan-Hung Lin 2, Hui-Ling Cheng 3
Compting the weights of criteria with interval-valed fzzy sets for MCDM problems Chen-ng Chen Kan-Hng in 2 Hi-ing Cheng 3 Department of Information Management National nited niversity aiwan 2 Specialist
More informationIOGP: An Incremental Online Graph Partitioning Algorithm for Distributed Graph Databases
: An Incremental Online Graph Partitioning Algorithm for Distribted Graph Databases Dong Dai Texas Tech University Lbbock, Texas dong.dai@tt.ed Wei Zhang Texas Tech University Lbbock, Texas X-Spirit.zhang@tt.ed
More informationEEC 483 Computer Organization
EEC 483 Compter Organization Chapter 4.4 A Simple Implementation Scheme Chans Y The Big Pictre The Five Classic Components of a Compter Processor Control emory Inpt path Otpt path & Control 2 path and
More informationResolving Linkage Anomalies in Extracted Software System Models
Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program
More informationTriangle Contact Representations
Triangle Contact Representations Stean Felsner elsner@math.t-berlin.de Technische Uniersität Berlin, Institt ür Mathematik Strasse des 7. Jni 36, 0623 Berlin, Germany Abstract. It is conjectred that eery
More informationAdvances in Environmental Biology
AESI Jornals Advances in Environmental Biology ISS-1995-0756 EISS-1998-1066 Jornal home page: http://www.aensiweb.com/aeb/ The Generic Mathematical Model of Freency Sampling Digital Filters with Shiftable
More informationarxiv: v1 [cs.cg] 1 Feb 2016
The Price of Order Prosenjit Bose Pat Morin André van Renssen, arxiv:160.00399v1 [cs.cg] 1 Feb 016 Abstract We present tight bonds on the spanning ratio of a large family of ordered θ-graphs. A θ-graph
More informationRequirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems
Reqirements Engineering Objectives An introdction to reqirements Gerald Kotonya and Ian Sommerville To introdce the notion of system reqirements and the reqirements process. To explain how reqirements
More informationWhat s New in AppSense Management Suite Version 7.0?
What s New in AMS V7.0 What s New in AppSense Management Site Version 7.0? AppSense Management Site Version 7.0 is the latest version of the AppSense prodct range and comprises three prodct components,
More informationHoming, Calibration and Model-Based Predictive Control for Planar Parallel Robots
Homing, Calibration and Model-Based Predictive Control for Planar Parallel Robots Květoslav Belda*, Pavel Píša** * Department of Adaptive Sstems, Institte of Information heor and Atomation, Academ of Sciences
More informationChapter 6: Pipelining
CSE 322 COPUTER ARCHITECTURE II Chapter 6: Pipelining Chapter 6: Pipelining Febrary 10, 2000 1 Clothes Washing CSE 322 COPUTER ARCHITECTURE II The Assembly Line Accmlate dirty clothes in hamper Place in
More informationCutting Cycles of Rods in Space: Hardness and Approximation
Ctting Cycles of Rods in Space: Hardness and pproximation oris rono ark de erg Chris Gray Elena mford bstract We stdy the problem of ctting a set of rods (line segments in R 3 ) into fragments, sing a
More informationOptimal time-delay spiking deconvolution and its application in the physical model measurement
Optimal time-delay spiking deconvolution and its application in the physical model measurement Zhengsheng Yao, Gary F. Margrave and Eric V. Gallant ABSRAC Spike deconvolution based on iener filter theory
More informationReal-time mean-shift based tracker for thermal vision systems
9 th International Conference on Qantitative InfraRed Thermography Jly -5, 008, Krakow - Poland Real-time mean-shift based tracker for thermal vision systems G. Bieszczad* T. Sosnowski** * Military University
More informationLinux and Matlab Basics. Johannes Grassberger, ICTP
Linx and Basics Johannes Grassberger, ICTP Compters at ICTP Dal boot compters start p in either Linx or Windows. If the compter does not rn the OS yo want or need, reboot it When yo finish sing a lab PC,
More informationA personalized search using a semantic distance measure in a graph-based ranking model
Article A personalized search sing a semantic distance measre in a graph-based ranking model Jornal of Information Science XX (X) pp. 1-23 The Athor(s) 2011 Reprints and Permissions: sagepb.co.k/jornalspermissions.nav
More informationFixed-Parameter Algorithms for Cluster Vertex Deletion
Fixed-Parameter Algorithms for Clster Vertex Deletion Falk Hüffner Christian Komsieicz Hannes Moser Rolf Niedermeier Institt für Informatik, Friedrich-Schiller-Uniersität Jena, Ernst-Abbe-Platz 2, D-07743
More informationAn Introduction to GPU Computing. Aaron Coutino MFCF
An Introdction to GPU Compting Aaron Cotino acotino@waterloo.ca MFCF What is a GPU? A GPU (Graphical Processing Unit) is a special type of processor that was designed to render and maniplate textres. They
More informationProf. Kozyrakis. 1. (10 points) Consider the following fragment of Java code:
EE8 Winter 25 Homework #2 Soltions De Thrsday, Feb 2, 5 P. ( points) Consider the following fragment of Java code: for (i=; i
More informationarxiv: v2 [cs.cg] 5 Aug 2014
The θ 5 -graph is a spanner Prosenjit Bose Pat Morin André van Renssen Sander Verdonschot November 5, 2018 arxiv:12120570v2 [cscg] 5 Ag 2014 Abstract Given a set of points in the plane, e sho that the
More informationToday s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of
Today s Lectre Lectre 27: Introdction to Software Architectre Kenneth M. Anderson Fondations of Software Engineering CSCI 5828 - Spring Semester, 1999 Introdction and Backgrond of Software Architectre
More informationCS 251, Winter 2018, Assignment % of course mark
CS 25, Winter 28, Assignment 3.. 3% of corse mark De onday, Febrary 26th, 4:3 P Lates accepted ntil : A, Febrary 27th with a 5% penalty. IEEE 754 Floating Point ( points): (a) (4 points) Complete the following
More information4.5 Routing Algorithms
4.5 ROUTING ALGORITHMS 363 to hosts enjo the securit services provided b IPsec. On the sending side, the transport laer passes a segment to IPsec. IPsec then encrpts the segment, appends additional securit
More informationRectangle-of-influence triangulations
CCCG 2016, Vancoer, British Colmbia, Ag 3 5, 2016 Rectangle-of-inflence trianglations Therese Biedl Anna Lbi Saeed Mehrabi Sander Verdonschot 1 Backgrond The concept of rectangle-of-inflence (RI) draings
More informationSelect-and-Protest-based Beaconless Georouting with Guaranteed Delivery in Wireless Sensor Networks
Select-and-Protest-based Beaconless Georoting ith Garanteed Deliery in Wireless Sensor Netorks Hanna Kalosha, Amiya Nayak, Stefan Rührp, Ian Stojmenoić School of Information Technology and Engineering
More informationImage Enhancement in the Frequency Domain Periodicity and the need for Padding:
Prepared B: Dr. Hasan Demirel PhD Image Enhancement in the Freqenc Domain Periodicit and the need for Padding: Periodicit propert of the DFT: The discrete Forier Transform and the inverse Forier transforms
More informationLecture 1: Introduction
Lectre : Introdction.. Introdction The Finite Element Method (FEM) is a nmerical techniqe to find approimate soltions of partial differential eqations. It as originated from the need of soling comple elasticit
More informationAdaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model
International Jornal of Knowledge Engineering, Vol. 1, No. 2, September 215 Adaptie Inflence Maximization in Microblog nder the Competitie Independent Cascade Model Zheng Ding, Kai Ni, and Zhiqiang He
More informationFlooding. Routing: Outlook. Flooding Algorithms. Spanning Tree. Flooding
Roting: Otlook Flooding Flooding Link-State: complete, global knoledge Distance-Vector: iteratie, distribted calclation Goal: To distribte a packet in the hole netork (i.e. to realie a netork-ide broadcast)
More information4.13 Advanced Topic: An Introduction to Digital Design Using a Hardware Design Language 345.e1
.3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage 35.e.3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage to Describe and odel a Pipeline
More informationNETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS
ETWORK PRESERVATIO THROUGH A TOPOLOGY COTROL ALGORITHM FOR WIRELESS MESH ETWORKS F. O. Aron, T. O. Olwal, A. Krien, Y. Hamam Tshwane University of Technology, Pretoria, Soth Africa. Dept of the French
More informationEvaluating Influence Diagrams
Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will
More informationChapter 6 Enhancing Performance with. Pipelining. Pipelining. Pipelined vs. Single-Cycle Instruction Execution: the Plan. Pipelining: Keep in Mind
Pipelining hink of sing machines in landry services Chapter 6 nhancing Performance with Pipelining 6 P 7 8 9 A ime ask A B C ot pipelined Assme 3 min. each task wash, dry, fold, store and that separate
More informationPavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003
From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information
More informationKINEMATICS OF FLUID MOTION
KINEMATICS OF FLUID MOTION The Velocity Field The representation of properties of flid parameters as fnction of the spatial coordinates is termed a field representation of the flo. One of the most important
More informationREDUCED-REFERENCE ASSESSMENT OF PERCEIVED QUALITY BY EXPLOITING COLOR INFORMATION
REDUCED-REFERENCE ASSESSMENT OF PERCEIVED QUALITY BY EXPLOITING COLOR INFORMATION Jdith Redi, Paolo Gastaldo, Rodolfo Znino, and Ingrid Heyndericx (+) University of Genoa, DIBE, Via Opera Pia a - 645 Genova
More informationUncertainty Determination for Dimensional Measurements with Computed Tomography
Uncertainty Determination for Dimensional Measrements with Compted Tomography Kim Kiekens 1,, Tan Ye 1,, Frank Welkenhyzen, Jean-Pierre Krth, Wim Dewlf 1, 1 Grop T even University College, KU even Association
More informationBat Algorithm (BA) for Image Thresholding
Bat Algorithm (BA) for Image Thresholding Adis ALIHODZIC Milan TUBA Faculty of Mathematics Faculty of Computer Science University of Sarajevo University Megatrend Belgrade Zmaja od Bosne 33 Bulevar umetnosti
More informationApplication of Gaussian Curvature Method in Development of Hull Plate Surface
Marine Engineering Frontiers (MEF) Volme 2, 204 Application of Gassian Crvatre Method in Development of Hll Plate Srface Xili Zh, Yjn Li 2 Dept. of Infor., Dalian Univ., Dalian 6622, China 2 Dept. of Naval
More informationVessel Tracking for Retina Images Based on Fuzzy Ant Colony Algorithm
Vessel Tracking for Retina Images Based on Fzzy Ant Colony Algorithm Sina Hooshyar a, Rasol Khayati b and Reza Rezai c a,b,c Department of Biomedical Engineering, Engineering Faclty, Shahed University,
More informationREPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips
REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands
More informationComputer Architecture Chapter 5. Fall 2005 Department of Computer Science Kent State University
Compter Architectre Chapter 5 Fall 25 Department of Compter Science Kent State University The Processor: Datapath & Control Or implementation of the MIPS is simplified memory-reference instrctions: lw,
More informationOptimized Barrier Location for Barrier Coverage in Mobile Sensor Networks
25 IEEE ireless Communications and Netorking Conference (CNC): - Track 3: Mobile and ireless Netorks Optimized Barrier Location for Barrier Coverage in Mobile Sensor Netorks Xiaoyun Zhang, Mathe L. ymore,
More informationThe optimisation of shot peen forming processes
The optimisation of shot peen forming processes T. Wang a, M.J. Platts b, J. Wu c a School of Engineering and Design, Brunel University, Uxbridge UB8 3PH, U. b Department of Engineering, University of
More information