Authentication email has already been sent, please check your email box: and activate it as soon as possible.
You can login to My Profile and manage your email alerts.
If you haven’t received the email, please:
|
|
There are 15 papers published in subject: since this site started. |
Select Subject |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
1. Composite PDE Boundary Control of Flexible Manipulator Using Singular Perturbation Approach | |||
Liu Zhijie,Liujin Kun | |||
Information Science and System Science 24 May 2016 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In this paper, a new composite boundary controller for flexible manipulator is presented based on the partial differential equation (PDE) model. A key contribution of this paper is the introduction of singular perturbation approach to the PDE dynamic model of flexible manipulator, which results in two simpler subsystems-slow subsystem and fast subsystem. Considering the characteristics of flexible manipulators, a composite controller for the full model is proposed, which includes a position controller for the slow subsystem and a direct feedback controller for the fast subsystem to suppress the vibration. Simulation results demonstrate the effectiveness of the proposed controller. | |||
TO cite this article:Liu Zhijie,Liujin Kun. Composite PDE Boundary Control of Flexible Manipulator Using Singular Perturbation Approach[OL].[24 May 2016] http://en.paper.edu.cn/en_releasepaper/content/4694618 |
2. Handover Performance Improvement in Small Cell Networks using Neighboring Cell List Optimization | |||
CHEN Shu-Jing, ZHOU Hui-Yang | |||
Information Science and System Science 11 March 2016 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In dense small cell networks, the coverage of a typical cell is small and handover is expected to happen frequently when user moves. Thus a two stage neighboring cell list (NCL) selection (TSNS) algorithm is proposed to improve handover performance. In the first stage, TSNS updates cell specific preferences of neighboring cells based on the load, signal quality and resource utilization of the target cells. In the second stage, user specific preference is calculated considering the received signal quality, surviving time and moving direction of user. Cell specific and cell user specific preferences are merged to construct the resultant NCL. Compared with existing methods which adopt the same NCL for all users in a cell, the novelty of TSNS is that different users can have different NCLs. Simulation results prove that TSNS can yield short NCL list while ensuring good handover performance. | |||
TO cite this article:CHEN Shu-Jing, ZHOU Hui-Yang. Handover Performance Improvement in Small Cell Networks using Neighboring Cell List Optimization[OL].[11 March 2016] http://en.paper.edu.cn/en_releasepaper/content/4680145 |
3. Study on Extracting Backbones of Complex Networks Based on Information Diffusion | |||
ZHANG Xiaohang,LIU Shuang | |||
Information Science and System Science 11 December 2015 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Complex network is a useful tool to study and analyze the real world networks. However, the growing number of links and nodes brings a challenge for us to analyze the complex network. How to improve the efficiency of extracting backbone has gradually been in a hot research. In this paper, we firstly review some methods of extracting backbone of complex network, and then we put forward an extracting backbone model which is based on information diffusion. Information diffusion has become a focus recently, and the mass information from internet provides data support to study the information diffusion among network. The first step of our model is to identify the critical nodes which will be the initial ones in the information diffusion model, so the information will spread from those nodes to the remainders. During the simulation, those links which play a leading role during the diffusion will be regarded as the important ones to construct the backbone of complex network. | |||
TO cite this article:ZHANG Xiaohang,LIU Shuang. Study on Extracting Backbones of Complex Networks Based on Information Diffusion[OL].[11 December 2015] http://en.paper.edu.cn/en_releasepaper/content/4670425 |
4. A vehicular ad hoc networks routing algorithm based on clustering | |||
Tao Yang,TaoLing,Liu Jing | |||
Information Science and System Science 09 June 2015 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:The vehicular ad hoc networks(VANETs) presents the uneven node density, fast moving speed,dynamic topology change etc.In order to improve the reliability of VANETs in information broadcasting, and reduce the redundancy of multi-hop broadcast, a protocol based on the clustering position-competition of vehicular ad hoc networks is proposed. Furthermore the concept of connectivity-stability is introduced.In the paper, The road is divided into segment model and intersection model.The cluster head and the optimal nodes in the cluster are chose as a radio relay nodes, which reduces the broadcast redundancy and improves the broadcast efficiency.At the same time, for the isolated nodes in the network ,carry-forwarding method is taken ,which improves the broadcast reliability in sparse areas and in "hole" areas.Finally, we use the NS2 simulation tool to.The simulation results show that the proposed routing protocol has a better comprehensive performance in delivery success rate, average broadcast time delay and the broadcast overhead. | |||
TO cite this article:Tao Yang,TaoLing,Liu Jing. A vehicular ad hoc networks routing algorithm based on clustering[OL].[ 9 June 2015] http://en.paper.edu.cn/en_releasepaper/content/4646209 |
5. Density Clustering Pruning Method Based on Reconstructed Support Vectors for Sparse LS-SVM | |||
Si Gangquan,Shi Jianquan,Guo Zhang | |||
Information Science and System Science 06 May 2015 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In least squares support vector machine (LSSVM), nonlinear function estimation is done by solving a linear set of equations instead of solving a quadratic programming problem, and a nonsparse solution is obtained. Several sparse algorithms have been developed to obtain reduced support vectors to improve the generalization performance of LSSVM. However, all of them iteratively look for support vectors in training datasets, which may are not the most superior choice for building the function model. In this paper, we propose a method of reconstructed support vectors based on the training datasets. The support vectors reconstructed are near the hyper plane of target function and uniformly distributed, which have more contribution to target function. In addition, the method we proposed converges at a faster rate than those iterative algorithms, because one-step selecting strategy is adapted without repeated training. To show the efficacy and feasibility of our proposed algorithm, some comparing experiments are conducted, which are all favorable for our viewpoints. That is, the method we proposed needs less number of support vectors to reach the almost same generalization performance, most important, which has the better robustness and accuracy prediction for the real operating mode. | |||
TO cite this article:Si Gangquan,Shi Jianquan,Guo Zhang. Density Clustering Pruning Method Based on Reconstructed Support Vectors for Sparse LS-SVM[OL].[ 6 May 2015] http://en.paper.edu.cn/en_releasepaper/content/4641959 |
6. Routing Survey for mobile opportunistic networks | |||
Gao Zehua,Yang Ting,Chen Yu | |||
Information Science and System Science 22 November 2014 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:With more and more mobile devices are connected into the network, the mobile network presents the following features: intermittent connectivity is frequent and mobile nodes can communicate with each other even if a route connecting them did not previously exist. So the mobile opportunistic networks emerged. The communications in mobile opportunistic networks take place on the establishment of opportunistic contacts among mobile nodes, without availability of end-to-end message routing paths. To ensure source nodes connect with destination quickly and send message successfully in the mobile opportunistic networks, we studied six different routing protocols for transmitting message in the mobile opportunistic networks and took analysis about their advantages and disadvantages. | |||
TO cite this article:Gao Zehua,Yang Ting,Chen Yu. Routing Survey for mobile opportunistic networks[OL].[22 November 2014] http://en.paper.edu.cn/en_releasepaper/content/4617899 |
7. Experimental Research on Passive MMW Imaging for Security Application | |||
LU Xuan,XIAO Zelong,WU Li,HU Taiyang,XU Jianzhong | |||
Information Science and System Science 10 January 2013 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Focused on security application, experiments are carried out to research on passive millimmeter wave imaging. The personnel concealed object detection model is discussed, and a prototype of conically scanning single pixel imaging system is realized and introduced. The control experiment is carried out using the prototype, and the images with and without the concealed object are respectively obtained. A nonlinear brightness transform function is also designed to process the obtained images. The experiment result demonstrates the capability of the realized PMMW imaging system for security application, and the designed brightness transform function could effectively enhance the intelligibilityof the images. | |||
TO cite this article:LU Xuan,XIAO Zelong,WU Li, et al. Experimental Research on Passive MMW Imaging for Security Application[OL].[10 January 2013] http://en.paper.edu.cn/en_releasepaper/content/4513794 |
8. Robust observer for a class of linear system with matched uncertainty based on LMI | |||
CHEN Fengxiang,LIU Lin,SU Zhou,ZHANG Tong | |||
Information Science and System Science 16 July 2012 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In this paper, a novel framework of robust observer for linear system with parametric uncertain state matrix matched with output matrix is introduced. The scheme is derived by including an extra term to the feedback gain, and the term is obtained by the analysis of the Lyapunov stability theory and LMI (Linear Matrix Inequality). The proposed observer is less conservative and thus lead to a low gain matrix based on the novel framework. Finally, the effectiveness of the proposed method is validated by the numerical simulations on Matlab environment. | |||
TO cite this article:CHEN Fengxiang,LIU Lin,SU Zhou, et al. Robust observer for a class of linear system with matched uncertainty based on LMI[OL].[16 July 2012] http://en.paper.edu.cn/en_releasepaper/content/4484858 |
9. Finite Frequency H-/H∞ Control for MIMO Singularly Perturbed System | |||
Cai Chenxiao,Zou Yun | |||
Information Science and System Science 09 December 2010 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:This paper studies H-/H∞ control for MIMO singularly perturbed system(SPS) in finite frequency ranges. The sufficient conditions for the existence of an H-/H∞ sub-optimal controller are derived based on generalized KYP lemma. Moreover, the controller is also singularly perturbed. It is further shown that this controller is obtained through designing its fast and slow parts, and then the composite controller is established. The effectiveness of the proposed method is demonstrated through comparing with traditional H∞ design method. | |||
TO cite this article:Cai Chenxiao,Zou Yun. Finite Frequency H-/H∞ Control for MIMO Singularly Perturbed System[OL].[ 9 December 2010] http://en.paper.edu.cn/en_releasepaper/content/4396369 |
10. Non-fragile H∞ control for neutral stochastic hybrid systems with time-varying delays | |||
Chen Guici,Shen Yi,Zhu Song | |||
Information Science and System Science 25 September 2010 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:A robust non-fragile H∞ control problems for neutral stochastic hybrid systems with time-varying delay are studied in this paper. Firstly, a delay-dependent stochastic Markov jumping bounded real lemma is presented in terms of linear matrix inequalities (LMIs). Secondly, based on the bounded real lemma, for the additive controller uncertainties, delay-dependent sufficient conditions for the solvability of non-fragile H∞ control for neutral stochastic hybrid systems with time-varying delay are derived by taking a Lyapunov-Krasovskii functional and its derivative. The desired state feedback controller can be developed by solving some certain LMIs. At last, a numerical example is given to show the validity of the obtained results and the effectiveness of the proposed method. | |||
TO cite this article:Chen Guici,Shen Yi,Zhu Song. Non-fragile H∞ control for neutral stochastic hybrid systems with time-varying delays[OL].[25 September 2010] http://en.paper.edu.cn/en_releasepaper/content/4386599 |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
|
About Sciencepaper Online | Privacy Policy | Terms & Conditions | Contact Us
© 2003-2012 Sciencepaper Online. unless otherwise stated