Real-Time Implementation of Adaptive Optimal Controller Based on a Pseudo-Space Model into PLC

Size: px
Start display at page:

Download "Real-Time Implementation of Adaptive Optimal Controller Based on a Pseudo-Space Model into PLC"

Transcription

1 Proceedings of the th WSEAS International Conference on SYSEMS, Agios Nikolaos, Crete Island, Greece, Jl 3-5, 7 3 Real-ime Implementation of Adaptive Optimal Controller Based on a Psedo-Space Model into PLC PER PIVOKA, VLASIMIL LORENC Department of Atomatic Control and Instrmentation Faclt of Electrical Engineering and Commnication, Brno Universit of echnolog Kolejni 4, 6 Brno CZECH REPUBLIC Abstract: - his paper describes the design and implementation of adaptive linear optimal controller (LQ) based on a psedo-space model into PLC. For identification of the controlled sstem an algorithm based on artificial neral netork is sed. he method of comfortable implementation of algorithms from the MALAB/Simlink environment into PLC is shon. In the first step of implementation the algorithm is designed in the simlation environment. he second step contains verification of the designed algorithm dring real process control, and finall is the algorithm moved from MALAB/Simlink into PLC. he basic condition for realization of the described implementation method is the existence of real-time commnication beteen MALAB/Simlink and PLC. his article shos ho real-time commnication can be created sing PLC B&R. he behavior of the described adaptive LQ algorithm is compared ith that of adaptive PSD controller dring control of the real sstem. Ke-Words: - Adaptive controller, Optimal controller, MALAB, Simlink, PLC, Levenberg-Marardt, Neral Netorks, Self-ning Introdction he prpose of adaptive controllers is to adapt control la parameters of control la to changes of the controlled sstem. Man tpes of adaptive controllers are knon. In this article the adaptive self-tning LQ controller is described. he scheme of this controller is separated into the to main parts: identification and controller. In this ork, identification based on neral netork approach is sed and the control algorithm is the linear adratic optimal controller. Figre shos the architectre of the self-tning LQ controller here denotes desired vale, denotes action vale and denotes otpt of the controlled sstem. On-line Identification he most important part of self-tning sstems is the on-line identification algorithm. Widel sed method for identification of sstems is recrsive least sares method (RLS). Instead of RLS, the identification method based on neral netork can be sed. A ver fast algorithm for training neral netorks is the Levenberg-Marardt (LM) algorithm. he main idea of on-line identification is that according to the measred inpt to the identified sstem (t) and the corresponding sstem otpt (t) e are able to find the vector of sstem parameters. ( Plant ( Specification of control la LQ controller Process parameters On-line NN identification Plant NN ( - + Fig.. Architectre of self-tning LQ controller. Fig.. he principle of identification of sstem sing neral netork.

2 Proceedings of the th WSEAS International Conference on SYSEMS, Agios Nikolaos, Crete Island, Greece, Jl 3-5, 7 4 For compting of the identified sstem otpt e can se the linear ARX model b z + b z + b z F M. () 3 3 ( z ) 3 + az + az + a3z he ARX model can be ritten in vector form as follos ( ϕ ( θ ( here [ ( k )... ( k m) ( k )... ( k n ] () ϕ ( k ) ) (3) is the vector of measred inpts and otpts and [ b (... b ( a (... a ( k ] θ k ) (4) ( ) m is the vector of estimated sstem parameters and k denotes discrete time. As it has been mentioned above, the Levenberg Marardt method can be sed for training of the neral netork. he ne vector of parameters is in each step given b next eation. ( JJ + λi ) J ε ( θ ( k + ) θ ( (5) here J is Jacobian matrix in the form ε ε... j J, (6) ε p ε p... j and is the vector of errors beteen the otpt of the sstem and the otpt of the model for all training patterns. he parameter p denotes the nmber of training patterns and j denotes the nmber of estimated parameters. he reason h identification based on neral netork approach as sed instead of RLS is that sing a neral netork e can set a shorter sampling period [7]. hen the controller is able to reject errors faster. 3 Linear LQ Controller he action vale of LQ controller is solved according to the identified model () and according to the minimization of adratic performance (7) in each step. Qadratic performance is defined b n k + k k+ ( ( ( ) + ( ( ( ) J x ( Qxk ( ) + (7) here ( denotes the desired vale, ( denotes sstem otpt and ( is action vale. Parameter ( is a signal eal to the desired vale, hich is sed for elimination of offset. Parameters ( ) denote eights for otpt (action) vale, k denotes the first step hile the minimization is sed and x (Qx( denotes the minimm in the last step k +. When e ork ith the psedo state matrix S [S,S x,s,s ] defined b [ b ] S [ ] S (8) [ ] S S x b bm a a (9) n and hen e introdce the psedo state vector z ( [x(, (,(] and x [(, x(k-),(,(] S(z(k-) e can rerite the adratic performance to the more sitable form [, ] k + k k + J z ( Qz(. () Using a nonstandard state vector e can bild niversal adratic performance. For example, for standard penalization according to eation (7) matrix Q is defined as follos Q. () he method for minimization in each step is knon [, ] and is described b next eations.

3 Proceedings of the th WSEAS International Conference on SYSEMS, Agios Nikolaos, Crete Island, Greece, Jl 3-5, 7 5 ( ) ( ) k + z k + S QSz ( k + ) z ( k + ) Hz( k + ) J () he minimm of () is given for derivation b (k +) eal to zero * J ( k z m + ) ( k + ) ( H H H H ) z ( k + ) ϕϕ ϕ here ( k + ) (k + -) and ϕ z m is z ( k + ) m H Hϕ H Hϕ Hϕϕ For next minimization step e can rite * J ( k + ) ( k + ) Qz( k + ) (3) ithot (4) * zm ( k + ) H zm( k + ) + (5) + z Where matrix H* H xx H x H - H x is defined at previos step. he algorithm given above is nsitable for practical calclations. he reason is that matrix H ceased to be positivel definite (semi-definite). his means that the algorithm can be nstable. he soltion is LD-FIL decomposition []. When e ork ith matrix G instead of H here HGDG and G is a loer trianglar matrix and D is a diagonal matrix, e can rerite adratic performance to the form G [ (, ( k ), (, ( ] ϕ (6) Minimization of eation (5) at step k is G ( + G ϕ ϕ( k ) (7) Where G and G are sb-matrices of G. Finall, the action vale is in each step compted as follos ( G G ϕ( k ) ϕ. o smmarize in the table belo, e can see the recrsive algorithm for compting of the LQ controller. Step Eation and Notes. H* H xx H x H - H x recrsivel solves lost fnction. GDG LD-FIL decomposition 3. ( G Gx x( k ) solves action vale able. Iteration algorithm of LQ controller. 4 Implementation of designed control algorithm into PLC 4. Introdction he described control algorithm as created in the MALAB/Simlink environment and then as implemented to the programmable logic controller (PLC) B&R. Design and implementation ere done in three steps. In the first step the algorithm as designed and tested onl sing MALAB/Simlink. In the second step MALAB/Simlink as interconnected ith the PLC. his step allos verification properties of the designed control algorithm dring control of the real sstem. It is important to notice that in this case e have the same possibilities for verification of the control algorithm behavior, and e can ver easil change its parameters and monitor the alit of real process reglation. In the third step the algorithm is moved from MALAB/Simlink to the PLC. For fast and comfortable accomplishment of this step it is necessar to se a langage hich can be sed in MALAB/Simlink and in the PLC environment as ell. In or case the langage ANSI C as sed. his implementation method is faster than in the case hen the control algorithm is developed directl in the environment of PLC. he reason is that MALAB/Simlink allos more comfortable methods and tools for design, debgging and testing of algorithms. Another major advantage is that the PLC is not necessar for the first step of implementation. 4. Connection beteen MALAB/Simlink and PLC B&R For realization of the described implementation scheme it is imperative to establish connection beteen MALAB/Simlink and PLC. his commnication as carried ot sing Process Visalization Interface (PVI). he PVI is a file of tools and libraries for the operating sstem MS Windos and is provided as a component of the

4 Proceedings of the th WSEAS International Conference on SYSEMS, Agios Nikolaos, Crete Island, Greece, Jl 3-5, 7 6 B&R AUOMAION NE softare. he PVI procres a commnication interface beteen PLC B&R and applications on PC ith MS Windos [6]. As a phsical netork laer Ethernet or RS-3 link can be sed. he most important part of PVI is the PVI Manager. his tilit provides netork connection beteen PC and PLC. Using PVI libraries and some standard development environment (e.g. MS Visal Stdio or Borland Delphi) it is possible to create ser application hich can, b force of PVI Manager, commnicate ith PLC. In or case, the commnication client as created as the s-fnction for MALAB/Simlink. he s-fnction represents a real controlled sstem. hat means that the s-fnction realizes transfer of the action vale compted in MALAB to the PLC, and from the PLC vales representing the otpt of the real controlled sstem are transferred. In the PLC, a task is rnning hich onl resends these vales into and from the real process sing D/A and A/D converters. Next figre shos the scheme of the described commnication. response ith the self-tning PSD controller based on the modified Ziegler Nichols method [, 4]. In both cases identification ith the neral netork approach and the same setp and initial conditions ere sed. he sampling period as set to s s. U [V] reference vale action vale sstem otpt time [s] Fig. 4. Real process control sing LQ controller (., ). 8 6 reference vale action vale sstem otpt Real controlled sstem U [V] 4 D/A Converter A/D Converter PLC PVI Manager Ethernet or RS-3 PC time [s] Fig. 5. Real process control sing self-tning PSD controller MALAB/Simlink on Control algorithm s-fnction PVI Client Fig. 3. he scheme of commnication beteen MALAB/Simlink and PLC B&R. 5 Real Process Control Reslts he described LQ controller as implemented into the PLC B&R. Used as the controlled sstem as the laborator model ith the transfer fnction F ( s). In the figre 3 e can (s + )( s + ) see the real process response ith the described LQ control algorithm. Figre 4 shos real the process In comparison of to previos figres e can see that sing LQ controller as reach better reslts notabl in case of changes of action vale. As it as shon above e can modif the criterion of LQ controller b changing of to parameters and. he parameter inflences the changes of action vale and is standard penalization of control error. In fact the criterion is dependent on relation of these to parameters. If e set, then e have onl one parameter for changing of criterion. he responses of LQ controller are optimal in regard of the criterion bt it doesn t mean that the are optimal from the ser s viepoint. he ser specifications can be ver easil inclded to the control la sing parameter.

5 Proceedings of the th WSEAS International Conference on SYSEMS, Agios Nikolaos, Crete Island, Greece, Jl 3-5, Conclsion It as described design of adaptive LQ controller. his algorithm solves one iteration in each step. hat means the time for compting is short and this algorithm is sitable for implementation in indstrial controller. As it as shon above the properties of control la can be changed sing one parameter. his algorithm as implemented to the indstrial controller appling of third-step implementation scheme, hich allos control of real processes directl from MALAB/Simlink environment. B sing this method can be saved time for development of the control algorithm, becase MALAB/Simlink is able to give more comfortable possibilities for design and debgging of algorithm in comparison ith the environment of PLC. he commnication beteen MALAB/Simlink and PLC B&R sing PVI as described. Acknoledgement: he paper has been prepared as a part of the soltion of Czech Science Fondation GAR project No. /6/3 Soft Compting in Control and b the Czech Ministr of Edcation in the frame of MSM MSM6359 Intelligent Sstems in Atomation. References: [] Švancara, K., Adaptive Optimal Controller ith Identification Based on Neral Netorks, PhD thesis, FEEC BU, Brno 4. [] Bobál V., Böhm J., Practical Aspects of Self- ning Controllers, Algorithms and Implementation, VUIUM, 999, in Czech, ISBN [3] Švancara K., Pivonka P., Closed Loop On-line Identification Based on Neral Netorks in Adaptive Optimal Controller, In Proceedings of th Zitta Fzz Colloim, Zitta (German),. [4] Koínek, V., Comnication MALAB-Ethernet. Diploma thesis in Czech, FEEC BU, Brno 3. [5] Lorenc V., Self-ning Controllers in MALAB - B&R Environment, Diploma thesis in Czech, FEEC BU, Brno 6. [6] B&R Docmentation. Atomation Net/PVI Online Help, AS4Ee, 997-7, [7] Veleba, V., he advantages of identification based on neral netork approach, In Proceedings of the th conference Stdent EEIC, BRNO 5.

Switched state-feedback controllers with multi-estimators for MIMO systems

Switched state-feedback controllers with multi-estimators for MIMO systems Proceedings of the th WEA Int Conf on COMPUTATIONAL INTELLIGENCE MAN-MACHINE YTEM AND CYBERNETIC Venice Ital November - 6 89 witched state-feedback controllers with mlti-estimators for MIMO sstems LIBOR

More information

Method to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot

Method to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot Method to bild an initial adaptive Nero-Fzzy controller for joints control of a legged robot J-C Habmremyi, P. ool and Y. Badoin Royal Military Academy-Free University of Brssels 08 Hobbema str, box:mrm,

More information

On the complexity of Submap Isomorphism

On the complexity of Submap Isomorphism On the compleit of Sbmap Isomorphism Christine Solnon 1,2, Gillame Damiand 1,2, Colin de la Higera 3, and Jean-Christophe Janodet 4 1 INSA de Lon, LIRIS, UMR 5205 CNRS, 69621 Villerbanne, France 2 Université

More information

Unit Testing with VectorCAST and AUTOSAR

Unit Testing with VectorCAST and AUTOSAR Unit Testing with VectorCAST and AUTOSAR Vector TechDay Software Testing with VectorCAST V1.0 2018-11-15 Agenda Introdction Unit Testing Demo Working with AUTOSAR Generated Code Unit Testing AUTOSAR SWCs

More information

Master for Co-Simulation Using FMI

Master for Co-Simulation Using FMI Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany

More information

An Extended Fault-Tolerant Link-State Routing Protocol in the Internet

An Extended Fault-Tolerant Link-State Routing Protocol in the Internet An Extended Falt-Tolerant Link-State Roting Protocol in the Internet Jie W, Xiaola Lin, Jiannong Cao z, and Weijia Jia x Department of Compter Science and Engineering Florida Atlantic Uniersit Boca Raton,

More information

Mobility Control and Its Applications in Mobile Ad Hoc Networks

Mobility Control and Its Applications in Mobile Ad Hoc Networks Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai Department of Compter Science and Engineering Florida Atlantic Uniersity Boca Raton, FL 3331 Abstract Most existing localized

More information

Network layer. Two Key Network-Layer Functions. Datagram Forwarding table. IP datagram format. IP Addressing: introduction

Network layer. Two Key Network-Layer Functions. Datagram Forwarding table. IP datagram format. IP Addressing: introduction Netork laer transport segment sending to receiing host on sending side encapslates segments into grams on rcing side, deliers segments to transport laer laer protocols in eer host, roter roter eamines

More information

Video Seamless Splicing Method Based on SURF Algorithm and Harris Corner Points Detection

Video Seamless Splicing Method Based on SURF Algorithm and Harris Corner Points Detection Vol13 (Softech 016), pp138-14 http://dxdoiorg/101457/astl016137 Video Seamless Splicing Method Based on SURF Algorithm and Harris Corner Points Detection Dong Jing 1, Chen Dong, Jiang Shuen 3 1 College

More information

Blurred Palmprint Recognition Based on Relative Invariant Structure Feature

Blurred Palmprint Recognition Based on Relative Invariant Structure Feature 5 International Conference on Comptational Science and Comptational Intelligence Blrred Palmprint Recognition Based on Relative Invariant Strctre Featre Gang Wang, Weibo Wei*, Zhenkan Pan College of Information

More information

Bayesian Hypothesis Testing

Bayesian Hypothesis Testing Baesian Hpothesis Testing H. Gterman Artificial Neral Netorks רשתות עצביות מלאכותיות 36539 Baesian Hpothesis Testing and Baes Factors Baesian p-vales Baes Factors for model comparison 3 Eas to implement

More information

IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION

IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION ICAS 2 CONGRESS IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION Christophe Le Garrec, Marc Hmbert, Michel Lacabanne Aérospatiale Matra

More information

Multi-lingual Multi-media Information Retrieval System

Multi-lingual Multi-media Information Retrieval System Mlti-lingal Mlti-media Information Retrieval System Shoji Mizobchi, Sankon Lee, Fmihiko Kawano, Tsyoshi Kobayashi, Takahiro Komats Gradate School of Engineering, University of Tokshima 2-1 Minamijosanjima,

More information

Chapter 4: Network Layer. TDTS06 Computer networks. Chapter 4: Network Layer. Network layer. Two Key Network-Layer Functions

Chapter 4: Network Layer. TDTS06 Computer networks. Chapter 4: Network Layer. Network layer. Two Key Network-Layer Functions Chapter : Netork Laer TDTS06 Compter s Lectre : Netork laer II Roting algorithms Jose M. Peña, jospe@ida.li.se ID/DIT, LiU 009-09- Chapter goals: nderstand principles behind laer serices: laer serice models

More information

Mobility Control and Its Applications in Mobile Ad Hoc Networks

Mobility Control and Its Applications in Mobile Ad Hoc Networks Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai, Florida Atlantic Uniersity Abstract Most eisting localized protocols in mobile ad hoc netorks, sch as data commnication

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introdction (forarding and roting) Reie of qeeing theor Roting algorithms Link state, Distance Vector Roter design and operation IP: Internet Protocol IP4 (datagram format, addressing, ICMP,

More information

Assignments. Computer Networks LECTURE 7 Network Layer: Routing and Addressing. Network Layer Function. Internet Architecture

Assignments. Computer Networks LECTURE 7 Network Layer: Routing and Addressing. Network Layer Function. Internet Architecture ompter Netorks LETURE Netork Laer: Roting and ddressing ssignments Project : Web Pro Serer DUE OT Sandha Darkadas Department of ompter Science Uniersit of Rochester Internet rchitectre Bottom-p: phsical:

More information

An Optimization of Granular Network by Evolutionary Methods

An Optimization of Granular Network by Evolutionary Methods An Optimization of Granlar Networ by Evoltionary Methods YUN-HEE HAN, KEUN-CHANG KWAK* Dept. of Control, Instrmentation, and Robot Engineering Chosn University 375 Seos-dong, Dong-g, Gwangj, 50-759 Soth

More information

Ethernet Basics Learning Switches. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

Ethernet Basics Learning Switches. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers Ethernet Basics Learning Sitches based on Chapter 4 of CompTIA Netork+ Eam Guide, 4 th ed., Mike Meers Sitch Forarding A sitch forards frames based on destination MAC address Ho does the sitch kno hich

More information

PART I: Adding Instructions to the Datapath. (2 nd Edition):

PART I: Adding Instructions to the Datapath. (2 nd Edition): EE57 Instrctor: G. Pvvada ===================================================================== Homework #5b De: check on the blackboard =====================================================================

More information

Ústav teorie informace a automatizace. Academy of Sciences of the Czech Republic Institute of Information Theory and Automation RESEARCH REPORT

Ústav teorie informace a automatizace. Academy of Sciences of the Czech Republic Institute of Information Theory and Automation RESEARCH REPORT Akademie věd České repblik Ústav teorie informace a atomatizace Academ of Sciences of the Czech Repblic Institte of Information Theor and Atomation RESEARCH REPORT Miroslav Novák, Ldvík Tesař A Set of

More information

Industrial Data Communications - Fundamentals

Industrial Data Communications - Fundamentals Industrial Data Communications - Fundamentals Tutorial 1 This tutorial on the fundamentals of communications is broken don into the folloing sections: Communication Modes Synchronous versus Asynchronous

More information

CAPL Scripting Quickstart

CAPL Scripting Quickstart CAPL Scripting Qickstart CAPL (Commnication Access Programming Langage) For CANalyzer and CANoe V1.01 2015-12-03 Agenda Important information before getting started 3 Visal Seqencer (GUI based programming

More information

Xiang Li. Temple University. September 6, 2016

Xiang Li. Temple University. September 6, 2016 Introdction to Matlab Xiang Li Temple University September 6, 2016 Otline Matlab Introdction Get yor own copy of Matlab Data Types Matrices Operators MAT-LAB Introdction Matlab is a programming langage

More information

The extra single-cycle adders

The extra single-cycle adders lticycle Datapath As an added bons, we can eliminate some of the etra hardware from the single-cycle path. We will restrict orselves to sing each fnctional nit once per cycle, jst like before. Bt since

More information

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read. The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5

More information

15.4 Constrained Maxima and Minima

15.4 Constrained Maxima and Minima 15.4 Constrained Maxima and Minima Question 1: Ho do ou find the relative extrema of a surface hen the values of the variables are constrained? Question : Ho do ou model an optimization problem ith several

More information

ABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS

ABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS Proceedings th FIG Symposim on Deformation Measrements Santorini Greece 00. ABSOUTE DEFORMATION PROFIE MEASUREMENT IN TUNNES USING REATIVE CONVERGENCE MEASUREMENTS Mahdi Moosai and Saeid Khazaei Mining

More information

On Plane Constrained Bounded-Degree Spanners

On Plane Constrained Bounded-Degree Spanners On Plane Constrained Bonded-Degree Spanners Prosenjit Bose 1, Rolf Fagerberg 2, André an Renssen 1, Sander Verdonschot 1 1 School of Compter Science, Carleton Uniersity, Ottaa, Canada. Email: jit@scs.carleton.ca,

More information

The effectiveness of PIES comparing to FEM and BEM for 3D elasticity problems

The effectiveness of PIES comparing to FEM and BEM for 3D elasticity problems The effectiveness of PIES comparing to FEM and BEM for 3D elasticit problems A. Boltc, E. Zienik, K. Sersen Faclt of Mathematics and Compter Science, Universit of Bialstok, Sosnowa 64, 15-887 Bialstok,

More information

Decoders. 3-Input Full Decoder

Decoders. 3-Input Full Decoder ecoders A fll decoder with n inpts has 2 n otpts. Let inpts be labeled In, In, In 2,..., In n, and let otpts be labeled Ot, Ot,..., Ot 2 n. A fll decoder fnctions as follows: Only one of otpts has vale

More information

Preserving Privacy of Continuous High-dimensional Data with Minimax Filters

Preserving Privacy of Continuous High-dimensional Data with Minimax Filters Preserving Privacy of Continos High-dimensional Data ith Filters Jihn Hamm Department of Compter Science and Engineering, The Ohio State University, OH 43210, USA Abstract Preserving privacy of high-dimensional

More information

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,

More information

On Plane Constrained Bounded-Degree Spanners

On Plane Constrained Bounded-Degree Spanners Algorithmica manscript No. (ill be inserted by the editor) 1 On Plane Constrained Bonded-Degree Spanners 2 3 Prosenjit Bose Rolf Fagerberg André an Renssen Sander Verdonschot 4 5 Receied: date / Accepted:

More information

A FRACTAL WATERMARKING SCHEME FOR IMAGE IN DWT DOMAIN

A FRACTAL WATERMARKING SCHEME FOR IMAGE IN DWT DOMAIN A FRACTAL WATERMARKING SCHEME FOR IMAGE IN DWT DOMAIN ABSTRACT A ne digital approach based on the fractal technolog in the Disperse Wavelet Transform domain is proposed in this paper. First e constructed

More information

Continuity Smooth Path Planning Using Cubic Polynomial Interpolation with Membership Function

Continuity Smooth Path Planning Using Cubic Polynomial Interpolation with Membership Function J Electr Eng Technol Vol., No.?: 74-?, 5 http://dx.doi.org/.537/jeet.5..?.74 ISSN(Print) 975- ISSN(Online) 93-743 Continity Smooth Path Planning Using Cbic Polomial Interpolation with Membership Fnction

More information

[1] Hopcroft, J., D. Joseph and S. Whitesides, Movement problems for twodimensional

[1] Hopcroft, J., D. Joseph and S. Whitesides, Movement problems for twodimensional Acknoledgement. The athors thank Bill Lenhart for interesting discssions on the recongration of rlers. References [1] Hopcroft, J., D. Joseph and S. Whitesides, Moement problems for todimensional linkages,

More information

Basics of Digital Logic Design

Basics of Digital Logic Design ignals, Logic Operations and Gates E 675.2: Introdction to ompter rchitectre asics of igital Logic esign Rather than referring to voltage levels of signals, we shall consider signals that are logically

More information

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT PAAMETE OPTIMIZATION FO TAKAGI-SUGENO FUZZY MODELS LESSONS LEANT Manfred Männle Inst. for Compter Design and Falt Tolerance Univ. of Karlsrhe, 768 Karlsrhe, Germany maennle@compter.org Brokat Technologies

More information

METAMODEL FOR SOFTWARE SOLUTIONS IN COMPUTED TOMOGRAPHY

METAMODEL FOR SOFTWARE SOLUTIONS IN COMPUTED TOMOGRAPHY VOL. 10, NO 22, DECEBER, 2015 ISSN 1819-6608 ETAODEL FOR SOFTWARE SOLUTIONS IN COPUTED TOOGRAPHY Vitaliy ezhyev Faclty of Compter Systems and Software Engineering, Universiti alaysia Pahang, Gambang, alaysia

More information

Exploiting Actuator Limits with Feedforward Control based on Inverse Models

Exploiting Actuator Limits with Feedforward Control based on Inverse Models Exploiting Actator Limits with Feedforward Control based on Inverse Models Manel Gräber TLK-Thermo GmbH Hans-Sommer-Str. 5, 386 Branschweig, German Abstract Feedforward control based on inverse dnamic

More information

Image Denoising Algorithms

Image Denoising Algorithms Image Denoising Algorithms Xiang Hao School of Compting, University of Utah, USA, hao@cs.tah.ed Abstract. This is a report of an assignment of the class Mathematics of Imaging. In this assignment, we first

More information

Worksheet And Programme Listing

Worksheet And Programme Listing GETTING STARTED WITH PYGAME ZERO ON THE RASPBERRY PI Worksheet And Programme Listing.technoisaledcation.co.k This resorce is copyright TechnoVisal Limited 2017 bt permission is gien to freely copy for

More information

Introduction to Fieldbus and DeviceNetworks

Introduction to Fieldbus and DeviceNetworks Fieldbus and Device Netorks This tutorial on Fieldbus and Device Netorks is broken don into the folloing sections: Introduction to Fieldbus and DeviceNetorks A brief overvie of Profibus Introduction to

More information

Lab 8 (All Sections) Prelab: ALU and ALU Control

Lab 8 (All Sections) Prelab: ALU and ALU Control Lab 8 (All Sections) Prelab: and Control Name: Sign the following statement: On my honor, as an Aggie, I have neither given nor received nathorized aid on this academic work Objective In this lab yo will

More information

Networks An introduction to microcomputer networking concepts

Networks An introduction to microcomputer networking concepts Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES

More information

Tdb: A Source-level Debugger for Dynamically Translated Programs

Tdb: A Source-level Debugger for Dynamically Translated Programs Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,

More information

CS 251, Spring 2018, Assignment 3.0 3% of course mark

CS 251, Spring 2018, Assignment 3.0 3% of course mark CS 25, Spring 28, Assignment 3. 3% of corse mark De onday, Jne 25th, 5:3 P. (5 points) Consider the single-cycle compter shown on page 6 of this assignment. Sppose the circit elements take the following

More information

Towards Tight Bounds on Theta-Graphs

Towards Tight Bounds on Theta-Graphs Toards Tight Bonds on Theta-Graphs arxiv:10.633v1 [cs.cg] Apr 01 Prosenjit Bose Jean-Lo De Carfel Pat Morin André van Renssen Sander Verdonschot Abstract We present improved pper and loer bonds on the

More information

The single-cycle design from last time

The single-cycle design from last time lticycle path Last time we saw a single-cycle path and control nit for or simple IPS-based instrction set. A mlticycle processor fies some shortcomings in the single-cycle CPU. Faster instrctions are not

More information

Optimal Sampling in Compressed Sensing

Optimal Sampling in Compressed Sensing Optimal Sampling in Compressed Sensing Joyita Dtta Introdction Compressed sensing allows s to recover objects reasonably well from highly ndersampled data, in spite of violating the Nyqist criterion. In

More information

Lecture 10. Diffraction. incident

Lecture 10. Diffraction. incident 1 Introdction Lectre 1 Diffraction It is qite often the case that no line-of-sight path exists between a cell phone and a basestation. In other words there are no basestations that the cstomer can see

More information

PROGRAM LICENSE AGREEMENT LIMITED WARRANTY... 4 Trademarks Contents Preface... 11

PROGRAM LICENSE AGREEMENT LIMITED WARRANTY... 4 Trademarks Contents Preface... 11 . Contents PROGRAM LICENSE AGREEMENT... LIMITED WARRANTY... 4 Trademarks... 6. Contents... 8 Preface... 2. Overview... 3 2. Jst one other important thing... 3 2.2 Abot the ser manal... 4 2.3 Manal System

More information

Topic Continuity for Web Document Categorization and Ranking

Topic Continuity for Web Document Categorization and Ranking Topic Continity for Web ocment Categorization and Ranking B. L. Narayan, C. A. Mrthy and Sankar. Pal Machine Intelligence Unit, Indian Statistical Institte, 03, B. T. Road, olkata - 70008, India. E-mail:

More information

Scientific Computing on Bulk Synchronous Parallel Architectures

Scientific Computing on Bulk Synchronous Parallel Architectures Scientific Compting on Blk Synchronos Parallel Architectres R. H. Bisseling Department of Mathematics, Utrecht University and W. F. McColl y Programming Research Grop, Oxford University April 27, 1994

More information

Advanced Techniques for Predicting Mechanical Product Design via COMSOL Multiphysics

Advanced Techniques for Predicting Mechanical Product Design via COMSOL Multiphysics Advanced Techniqes for Predicting Mechanical Prodct Design via COMSOL Mltiphsics Shobing Zhang 1 1 CAEaid, Inc. *Corresponding athor: 184 Jeffs Ln, Astin, TX 78717, shobing.hang@caeaid.com Abstract: Mechanical

More information

Computing the weights of criteria with interval-valued fuzzy sets for MCDM problems Chen-Tung Chen 1, Kuan-Hung Lin 2, Hui-Ling Cheng 3

Computing the weights of criteria with interval-valued fuzzy sets for MCDM problems Chen-Tung Chen 1, Kuan-Hung Lin 2, Hui-Ling Cheng 3 Compting the weights of criteria with interval-valed fzzy sets for MCDM problems Chen-ng Chen Kan-Hng in 2 Hi-ing Cheng 3 Department of Information Management National nited niversity aiwan 2 Specialist

More information

IOGP: An Incremental Online Graph Partitioning Algorithm for Distributed Graph Databases

IOGP: An Incremental Online Graph Partitioning Algorithm for Distributed Graph Databases : An Incremental Online Graph Partitioning Algorithm for Distribted Graph Databases Dong Dai Texas Tech University Lbbock, Texas dong.dai@tt.ed Wei Zhang Texas Tech University Lbbock, Texas X-Spirit.zhang@tt.ed

More information

EEC 483 Computer Organization

EEC 483 Computer Organization EEC 483 Compter Organization Chapter 4.4 A Simple Implementation Scheme Chans Y The Big Pictre The Five Classic Components of a Compter Processor Control emory Inpt path Otpt path & Control 2 path and

More information

Resolving Linkage Anomalies in Extracted Software System Models

Resolving Linkage Anomalies in Extracted Software System Models Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program

More information

Triangle Contact Representations

Triangle Contact Representations Triangle Contact Representations Stean Felsner elsner@math.t-berlin.de Technische Uniersität Berlin, Institt ür Mathematik Strasse des 7. Jni 36, 0623 Berlin, Germany Abstract. It is conjectred that eery

More information

Advances in Environmental Biology

Advances in Environmental Biology AESI Jornals Advances in Environmental Biology ISS-1995-0756 EISS-1998-1066 Jornal home page: http://www.aensiweb.com/aeb/ The Generic Mathematical Model of Freency Sampling Digital Filters with Shiftable

More information

arxiv: v1 [cs.cg] 1 Feb 2016

arxiv: v1 [cs.cg] 1 Feb 2016 The Price of Order Prosenjit Bose Pat Morin André van Renssen, arxiv:160.00399v1 [cs.cg] 1 Feb 016 Abstract We present tight bonds on the spanning ratio of a large family of ordered θ-graphs. A θ-graph

More information

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems Reqirements Engineering Objectives An introdction to reqirements Gerald Kotonya and Ian Sommerville To introdce the notion of system reqirements and the reqirements process. To explain how reqirements

More information

What s New in AppSense Management Suite Version 7.0?

What s New in AppSense Management Suite Version 7.0? What s New in AMS V7.0 What s New in AppSense Management Site Version 7.0? AppSense Management Site Version 7.0 is the latest version of the AppSense prodct range and comprises three prodct components,

More information

Homing, Calibration and Model-Based Predictive Control for Planar Parallel Robots

Homing, Calibration and Model-Based Predictive Control for Planar Parallel Robots Homing, Calibration and Model-Based Predictive Control for Planar Parallel Robots Květoslav Belda*, Pavel Píša** * Department of Adaptive Sstems, Institte of Information heor and Atomation, Academ of Sciences

More information

Chapter 6: Pipelining

Chapter 6: Pipelining CSE 322 COPUTER ARCHITECTURE II Chapter 6: Pipelining Chapter 6: Pipelining Febrary 10, 2000 1 Clothes Washing CSE 322 COPUTER ARCHITECTURE II The Assembly Line Accmlate dirty clothes in hamper Place in

More information

Cutting Cycles of Rods in Space: Hardness and Approximation

Cutting Cycles of Rods in Space: Hardness and Approximation Ctting Cycles of Rods in Space: Hardness and pproximation oris rono ark de erg Chris Gray Elena mford bstract We stdy the problem of ctting a set of rods (line segments in R 3 ) into fragments, sing a

More information

Optimal time-delay spiking deconvolution and its application in the physical model measurement

Optimal time-delay spiking deconvolution and its application in the physical model measurement Optimal time-delay spiking deconvolution and its application in the physical model measurement Zhengsheng Yao, Gary F. Margrave and Eric V. Gallant ABSRAC Spike deconvolution based on iener filter theory

More information

Real-time mean-shift based tracker for thermal vision systems

Real-time mean-shift based tracker for thermal vision systems 9 th International Conference on Qantitative InfraRed Thermography Jly -5, 008, Krakow - Poland Real-time mean-shift based tracker for thermal vision systems G. Bieszczad* T. Sosnowski** * Military University

More information

Linux and Matlab Basics. Johannes Grassberger, ICTP

Linux and Matlab Basics. Johannes Grassberger, ICTP Linx and Basics Johannes Grassberger, ICTP Compters at ICTP Dal boot compters start p in either Linx or Windows. If the compter does not rn the OS yo want or need, reboot it When yo finish sing a lab PC,

More information

A personalized search using a semantic distance measure in a graph-based ranking model

A personalized search using a semantic distance measure in a graph-based ranking model Article A personalized search sing a semantic distance measre in a graph-based ranking model Jornal of Information Science XX (X) pp. 1-23 The Athor(s) 2011 Reprints and Permissions: sagepb.co.k/jornalspermissions.nav

More information

Fixed-Parameter Algorithms for Cluster Vertex Deletion

Fixed-Parameter Algorithms for Cluster Vertex Deletion Fixed-Parameter Algorithms for Clster Vertex Deletion Falk Hüffner Christian Komsieicz Hannes Moser Rolf Niedermeier Institt für Informatik, Friedrich-Schiller-Uniersität Jena, Ernst-Abbe-Platz 2, D-07743

More information

An Introduction to GPU Computing. Aaron Coutino MFCF

An Introduction to GPU Computing. Aaron Coutino MFCF An Introdction to GPU Compting Aaron Cotino acotino@waterloo.ca MFCF What is a GPU? A GPU (Graphical Processing Unit) is a special type of processor that was designed to render and maniplate textres. They

More information

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code:

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code: EE8 Winter 25 Homework #2 Soltions De Thrsday, Feb 2, 5 P. ( points) Consider the following fragment of Java code: for (i=; i

More information

arxiv: v2 [cs.cg] 5 Aug 2014

arxiv: v2 [cs.cg] 5 Aug 2014 The θ 5 -graph is a spanner Prosenjit Bose Pat Morin André van Renssen Sander Verdonschot November 5, 2018 arxiv:12120570v2 [cscg] 5 Ag 2014 Abstract Given a set of points in the plane, e sho that the

More information

Today s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of

Today s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of Today s Lectre Lectre 27: Introdction to Software Architectre Kenneth M. Anderson Fondations of Software Engineering CSCI 5828 - Spring Semester, 1999 Introdction and Backgrond of Software Architectre

More information

CS 251, Winter 2018, Assignment % of course mark

CS 251, Winter 2018, Assignment % of course mark CS 25, Winter 28, Assignment 3.. 3% of corse mark De onday, Febrary 26th, 4:3 P Lates accepted ntil : A, Febrary 27th with a 5% penalty. IEEE 754 Floating Point ( points): (a) (4 points) Complete the following

More information

4.5 Routing Algorithms

4.5 Routing Algorithms 4.5 ROUTING ALGORITHMS 363 to hosts enjo the securit services provided b IPsec. On the sending side, the transport laer passes a segment to IPsec. IPsec then encrpts the segment, appends additional securit

More information

Rectangle-of-influence triangulations

Rectangle-of-influence triangulations CCCG 2016, Vancoer, British Colmbia, Ag 3 5, 2016 Rectangle-of-inflence trianglations Therese Biedl Anna Lbi Saeed Mehrabi Sander Verdonschot 1 Backgrond The concept of rectangle-of-inflence (RI) draings

More information

Select-and-Protest-based Beaconless Georouting with Guaranteed Delivery in Wireless Sensor Networks

Select-and-Protest-based Beaconless Georouting with Guaranteed Delivery in Wireless Sensor Networks Select-and-Protest-based Beaconless Georoting ith Garanteed Deliery in Wireless Sensor Netorks Hanna Kalosha, Amiya Nayak, Stefan Rührp, Ian Stojmenoić School of Information Technology and Engineering

More information

Image Enhancement in the Frequency Domain Periodicity and the need for Padding:

Image Enhancement in the Frequency Domain Periodicity and the need for Padding: Prepared B: Dr. Hasan Demirel PhD Image Enhancement in the Freqenc Domain Periodicit and the need for Padding: Periodicit propert of the DFT: The discrete Forier Transform and the inverse Forier transforms

More information

Lecture 1: Introduction

Lecture 1: Introduction Lectre : Introdction.. Introdction The Finite Element Method (FEM) is a nmerical techniqe to find approimate soltions of partial differential eqations. It as originated from the need of soling comple elasticit

More information

Adaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model

Adaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model International Jornal of Knowledge Engineering, Vol. 1, No. 2, September 215 Adaptie Inflence Maximization in Microblog nder the Competitie Independent Cascade Model Zheng Ding, Kai Ni, and Zhiqiang He

More information

Flooding. Routing: Outlook. Flooding Algorithms. Spanning Tree. Flooding

Flooding. Routing: Outlook. Flooding Algorithms. Spanning Tree. Flooding Roting: Otlook Flooding Flooding Link-State: complete, global knoledge Distance-Vector: iteratie, distribted calclation Goal: To distribte a packet in the hole netork (i.e. to realie a netork-ide broadcast)

More information

4.13 Advanced Topic: An Introduction to Digital Design Using a Hardware Design Language 345.e1

4.13 Advanced Topic: An Introduction to Digital Design Using a Hardware Design Language 345.e1 .3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage 35.e.3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage to Describe and odel a Pipeline

More information

NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS

NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS ETWORK PRESERVATIO THROUGH A TOPOLOGY COTROL ALGORITHM FOR WIRELESS MESH ETWORKS F. O. Aron, T. O. Olwal, A. Krien, Y. Hamam Tshwane University of Technology, Pretoria, Soth Africa. Dept of the French

More information

Evaluating Influence Diagrams

Evaluating Influence Diagrams Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will

More information

Chapter 6 Enhancing Performance with. Pipelining. Pipelining. Pipelined vs. Single-Cycle Instruction Execution: the Plan. Pipelining: Keep in Mind

Chapter 6 Enhancing Performance with. Pipelining. Pipelining. Pipelined vs. Single-Cycle Instruction Execution: the Plan. Pipelining: Keep in Mind Pipelining hink of sing machines in landry services Chapter 6 nhancing Performance with Pipelining 6 P 7 8 9 A ime ask A B C ot pipelined Assme 3 min. each task wash, dry, fold, store and that separate

More information

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003 From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information

More information

KINEMATICS OF FLUID MOTION

KINEMATICS OF FLUID MOTION KINEMATICS OF FLUID MOTION The Velocity Field The representation of properties of flid parameters as fnction of the spatial coordinates is termed a field representation of the flo. One of the most important

More information

REDUCED-REFERENCE ASSESSMENT OF PERCEIVED QUALITY BY EXPLOITING COLOR INFORMATION

REDUCED-REFERENCE ASSESSMENT OF PERCEIVED QUALITY BY EXPLOITING COLOR INFORMATION REDUCED-REFERENCE ASSESSMENT OF PERCEIVED QUALITY BY EXPLOITING COLOR INFORMATION Jdith Redi, Paolo Gastaldo, Rodolfo Znino, and Ingrid Heyndericx (+) University of Genoa, DIBE, Via Opera Pia a - 645 Genova

More information

Uncertainty Determination for Dimensional Measurements with Computed Tomography

Uncertainty Determination for Dimensional Measurements with Computed Tomography Uncertainty Determination for Dimensional Measrements with Compted Tomography Kim Kiekens 1,, Tan Ye 1,, Frank Welkenhyzen, Jean-Pierre Krth, Wim Dewlf 1, 1 Grop T even University College, KU even Association

More information

Bat Algorithm (BA) for Image Thresholding

Bat Algorithm (BA) for Image Thresholding Bat Algorithm (BA) for Image Thresholding Adis ALIHODZIC Milan TUBA Faculty of Mathematics Faculty of Computer Science University of Sarajevo University Megatrend Belgrade Zmaja od Bosne 33 Bulevar umetnosti

More information

Application of Gaussian Curvature Method in Development of Hull Plate Surface

Application of Gaussian Curvature Method in Development of Hull Plate Surface Marine Engineering Frontiers (MEF) Volme 2, 204 Application of Gassian Crvatre Method in Development of Hll Plate Srface Xili Zh, Yjn Li 2 Dept. of Infor., Dalian Univ., Dalian 6622, China 2 Dept. of Naval

More information

Vessel Tracking for Retina Images Based on Fuzzy Ant Colony Algorithm

Vessel Tracking for Retina Images Based on Fuzzy Ant Colony Algorithm Vessel Tracking for Retina Images Based on Fzzy Ant Colony Algorithm Sina Hooshyar a, Rasol Khayati b and Reza Rezai c a,b,c Department of Biomedical Engineering, Engineering Faclty, Shahed University,

More information

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands

More information

Computer Architecture Chapter 5. Fall 2005 Department of Computer Science Kent State University

Computer Architecture Chapter 5. Fall 2005 Department of Computer Science Kent State University Compter Architectre Chapter 5 Fall 25 Department of Compter Science Kent State University The Processor: Datapath & Control Or implementation of the MIPS is simplified memory-reference instrctions: lw,

More information

Optimized Barrier Location for Barrier Coverage in Mobile Sensor Networks

Optimized Barrier Location for Barrier Coverage in Mobile Sensor Networks 25 IEEE ireless Communications and Netorking Conference (CNC): - Track 3: Mobile and ireless Netorks Optimized Barrier Location for Barrier Coverage in Mobile Sensor Netorks Xiaoyun Zhang, Mathe L. ymore,

More information

The optimisation of shot peen forming processes

The optimisation of shot peen forming processes The optimisation of shot peen forming processes T. Wang a, M.J. Platts b, J. Wu c a School of Engineering and Design, Brunel University, Uxbridge UB8 3PH, U. b Department of Engineering, University of

More information