首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
On the basis of capacity flow model,a new model is developed for a load-sharing k-out-of-n:G system consisting of different components,to describe the increase of the same component's failure rates under different loads.All components have exponential life distributions and are nonrepairable in the system.Reliability of load sharing 2-out-of-3:G system is calculated and some special cases for the system are discussed.The calculation and discussions show that the model is right and practical.  相似文献   

2.
This article considers delay dependent decentralized H∞ filtering for a class of uncertain interconnected systems, where the uncertainties are assumed to be time varying and satisfy the norm-bounded conditions. First, combining the Lyapunov-Krasovskii functional approach and the delay integral inequality of matrices, a sufficient condition of the existence of the robust decentralized H∞ filter is derived, which makes the error systems asymptotically stable and satisfies the H∞ norm of the transfer function from noise input to error output less than the specified up-bound on the basis of the form of uncertainties. Then, the above sufficient condition is transformed to a system of easily solvable LMIs via a series of equivalent transformation. Finally, the numerical simulation shows the efficiency of the main results.  相似文献   

3.
A new coordination scheme for multi-robot systems is proposed. A state space model of the multi- robot system is defined and constructed in which the system's initial and goal states are included along with the task definition and the system's internal and external constraints. Task accomplishment is considered a transition of the system state in its state space (SS) under the system's constraints. Therefore, if there exists a connectable path within reachable area of the SS from the initial state to the goal state, the task is realizable. The optimal strategy for the task realization under constraints is investigated and reached by searching for the optimal state transition trajectory of the robot system in the SS. Moreover, if there is no connectable path, which means the task cannot be performed Successfully, the task could be transformed to be realizable by making the initial state and the goal state connectable and finding a path connecting them in the system's SS. This might be done via adjusting the system's configuration and/or task constraints. Experiments of multi-robot formation control with obstacles in the environment are conducted and simulation results show the validity of the proposed method.  相似文献   

4.
In a measurement system, new representation methods are necessary to maintain the uncertainty and to supply more powerful ability for reasoning and transformation between numerical system and symbolic system. A grey measurement system is discussed from the point of view of intelligent sensors and incomplete information processing compared with a numerical and symbolized measurement system. The methods of grey representation and information processing are proposed for data collection and reasoning. As a case study, multi-ultrasonic sensor systems are demonstrated to verify the effectiveness of the proposed methods.  相似文献   

5.
基于PH分布的n中取k系统可靠性模型研究   总被引:1,自引:0,他引:1  
本文以n中取k系统为研究对象,采用Phase-type(PH)分布代替指数分布等典型分布,假设部件在工作状态、储备状态和维修状态停留时间均为连续时间PH分布;建立了一种描述能力更强的系统可靠性解析模型,利用矩阵解析方法获得了系统稳态概率,推导出系统稳态可用度、工作时间、平均故障间隔时间和维修台故障件到达率的解析表达式;并通过算例验证了模型的正确性和适用性,演示了给定n值后,k值变化对系统可靠性规律的影响.  相似文献   

6.
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. A distributed intrusion detection approach based on timed automata is given. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing (DSR). The monitor nodes can verify the behaviour of every nodes by timed automata, and validly detect real-time attacks without signatures of intrusion or trained data. Compared with the architecture where each node is its own IDS agent, the approach is much more efficient while maintaining the same level of effectiveness. Finally, the intrusion detection method is evaluated through simulation experiments.  相似文献   

7.
Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. Hardware implementations of the advanced encryption standard (AES) for authentication and encryption are presented. An energy consumption variable is derived to evaluate low-power design strategies for battery-powered devices. It proves that compact AES architectures fail to optimize the AES hardware energy, whereas reducing invalid switching activities and implementing power-optimized sub-modules are the reasonable methods. Implementations of different substitution box (S-Boxes) structures are presented with 0.25μm 1.8 V CMOS (complementary metal oxide semiconductor) standard cell library. The comparisons and trade-offs among area, security, and power are explored. The experimental results show that Galois field composite S-Boxes have smaller size and highest security but consume considerably more power, whereas decoder-switch-encoder S-Boxes have the best power characteristics with disadvantages in terms of size and security. The combination of these two type S-Boxes instead of homogeneous S-Boxes in AES circuit will lead to optimal schemes. The technique of latch-dividing data path is analyzed, and the quantitative simulation results demonstrate that this approach diminishes the glitches effectively at a very low hardware cost.  相似文献   

8.
RF power amplifiers (PAs) are usually considered as memoryless devices in most existing predistortion techniques. However, in broadband communication systems, such as WCDMA, the PA memory effects are significant, and memoryless predistortion cannot linearize the PAs effectively. After analyzing the PA memory effects, a novel predistortion method based on the simplified Volterra series is proposed to linearize broadband RF PAs with memory effects. The indirect learning architecture is adopted to design the predistortion scheme and the reeursive least squares algorithm with forgetting factor is applied to identify the parameters of the predistorter. Simulation results show that the proposed predistortion method can compensate the nonlinear distortion and memory effects of broadband RF PAs effectively.  相似文献   

9.
The space time spreading, superimposed training sequences, and space-time coding are used to present a multiple input and multiple output (MIMO) systems model, and a closed-form of average error probability upper bound expression for MIMO correlated frequency-selective channel in the presence of interference (co-channel interference and jamming signals) is derived. Moreover, the correlation at both ends of the wireless link that can be incorporated equivalently into correlation at the transmit end is also derived, which is significant to analyze space-time link algorithm of MIMO systems.  相似文献   

10.
To study the design problem of robust reliable guaranteed cost controller for nonlinear singular stochastic systems, the Takagi-Sugeno (T-S) fuzzy model is used to represent a nonlinear singular stochastic system with norm-bounded parameter uncertainties and time delay. Based on the linear matrix inequality (LMI) techniques and stability theory of stochastic differential equations, a stochastic Lyapunov function method is adopted to design a state feedback fuzzy controller. The resulting closed-loop fuzzy system is robustly reliable stochastically stable, and the corresponding quadratic cost function is guaranteed to be no more than a certain upper bound for all admissible uncertainties, as well as different actuator fault cases. A sufficient condition of existence and design method of robust reliable guaranteed cost controller is presented. Finally, a numerical simulation is given to illustrate the effectiveness of the proposed method.  相似文献   

11.
The singularly perturbed bifurcation subsystem is described, and the test conditions of subsystem persistence are deduced. By use of fast and slow reduced subsystem model, the result does not require performing nonlinear transformation. Moreover, it is shown and proved that the persistence of the periodic orbits for Hopf bifurcation in the reduced model through center manifold. Van der Pol oscillator circuit is given to illustrate the persistence of bifurcation subsystems with the full dynamic system.  相似文献   

12.
It is well known that the periodic performance of spread spectrum sequence heavily affects the correlative and secure characteristics of communication systems. The chaotic binary sequence is paid more and more attention since it is one kind of applicable spread spectrum sequences. However, there are unavoidable short cyclic problems for chaotic binary sequences in finite precision. The chaotic binary sequence generating methods are studied first. Then the short cyclic behavior of the chaotic sequences is analyzed in detail, which are generated by quantification approaches with finite word-length. At the same time, a chaotic similar function is defined for presenting the cyclic characteristics of the sequences. Based on these efforts, an improved method with scrambling control for generating chaotic binary sequences is proposed. To quantitatively describe the improvement of periodic performance of the sequences, an orthogonal estimator is also defined. Some simulating results are provided. From the theoretical deduction and the experimental results, it is concluded that the proposed method can effectively increase the period and raise the complexity of the chaotic sequences to some extent.  相似文献   

13.
A more general form of projective synchronization, so called linear generalized synchronization (LGS) is proposed, which includes the generalized projective synchronization (GPS) and the hybrid projective synchronization (HPS) as its special cases, Based on the adaptive technique and Lyapunov stability theory, a general method for achieving the LGS between two chaotic or hyperehaotic systems with uncertain parameters in any scaling matrix is presented. Some numerical simulations are provided to show the effectiveness and feasibility of the proposed synchronization method.  相似文献   

14.
An enhanced trajectory linearization control (TLC) structure based on radial basis function neural network (RBFNN) and its application on an aerospace vehicle (ASV) flight control system are presensted. The influence of unknown disturbances and uncertainties is reduced by RBFNN thanks to its approaching ability, and a robustifying itera is used to overcome the approximate error of RBFNN. The parameters adaptive adjusting laws are designed on the Lyapunov theory. The uniform ultimate boundedness of all signals of the composite closed-loop system is proved based on Lyapunov theory. Finally, the flight control system of an ASV is designed based on the proposed method. Simulation results demonstrate the effectiveness and robustness of the designed approach.  相似文献   

15.
Passive millimeter wave (PMMW) images inherently have the problem of poor resolution owing to limited aperture dimension. Thus, efficient post-processing is necessary to achieve resolution improvement. An adaptive projected Landweber (APL) super-resolution algorithm using a spectral correction procedure, which attempts to combine the strong points of all of the projected Landweber (PL) iteration and the adaptive relaxation parameter adjustment and the spectral correction method, is proposed. In the algorithm, the PL iterations are implemented as the main image restoration scheme and a spectral correction method is included in which the calculated spectrum within the passband is replaced by the known low frequency component. Then, the algorithm updates the relaxation parameter adaptively at each iteration. A qualitative evaluation of this algorithm is performed with simulated data as well as actual radiometer image captured by 91.5 GHz mechanically scanned radiometer. From experiments, it is found that the super-resolution algorithm obtains better results and enhances the resolution and has lower mean square error (MSE). These constraints and adaptive character and spectral correction procedures speed up the convergence of the Landweber algorithm and reduce the ringing effects that are caused by regularizing the image restoration problem.  相似文献   

16.
考虑延迟D-策略离散时间Geo/G/1排队系统, 使用全概率分解技术, 从任意初始状态出发, 研究了队长的瞬态和稳态性质, 推导出了在任意时刻n+ 瞬态队长分布的z-变换的递推表达式和稳态队长分布的递推表达式, 并获得稳态队长的随机分解结果, 同时得到了系统在三种任意时刻(n-, n, n+)处稳态队长分布的重要关系. 最后, 通过数值实例, 讨论了稳态队长分布对系统参数的敏感性, 并阐述了获得便于计算的稳态队长分布的表达式在系统容量优化设计中的重要应用价值.  相似文献   

17.
失效率随时间而变的n中取κ表决系统可靠性分析   总被引:3,自引:0,他引:3  
为了解决工业系统中某些实际问题,提出了一个失效率随时间而变的载荷均担的n中取κ表决系统模型.并利用马氏链原理获得一个微分方程组,解这个方程组,得到系统可靠度和可用度的计算公式.为可靠性工程人员提供了理论方法.  相似文献   

18.
本文将“修理工多重休假”机制和“修理设备可发生失效且可更换”策略同时引入到k/n(G)表决可修系统中, 利用马尔可夫过程理论求得了系统处于各状态的稳态概率的递推表达式. 在此基础上,给出了系统的稳态可用度、首次故障前平均时间、稳态故障频度、修理工繁忙的稳态概率、修理设备的稳态不可用度、故障部件的平均数目以及故障部件的平均等待修理时间等一系列性能指标. 最后以6/10(G)表决可修系统为例,分析了修理工的休假率和修理设备的失效率对几个主要性能指标的影响.  相似文献   

19.
We study a single-server queueing system with state-dependent arrivals and general service distribution, or simply M(n)/G/1/K, where the server follows an N policy and takes multiple vacations when the system is empty. We provide a recursive algorithm using the supplementary variable technique to numerically compute the stationary queue length distribution of the system. The only input requirements are the Laplace-Stieltjes transforms of the service time distribution and the vacation time distribution, and the state-dependent arrival rate. The computational complexity of the algorithm is O(K^3).  相似文献   

20.
考虑服务员具有多重休假和系统采用min(N,V)-策略控制的离散时间Geo/G/1排队系统,使用全概率分解技术和更新过程理论,研究了系统在任意时刻n+的瞬态队长分布和稳态队长分布,得到了瞬态队长分布的z-变换表达式和稳态队长分布的递推表达式.进一步,得到了系统在时刻点n,n~-和外部观察时刻点的稳态队长分布.特别地,本文直接获得了一些特殊离散时间排队系统相应的结果.最后,通过数值实例阐述了获得便于计算的稳态队长分布的表达式在系统容量设计中的重要价值.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号