Application of Improved Differential Evolution Algorithm in solving Container-packing problems


Prediction of differential-mode EMI in the AC Side of the Three-phase PWM rectifier



Download 1.34 Mb.
Page21/31
Date18.10.2016
Size1.34 Mb.
#2671
1   ...   17   18   19   20   21   22   23   24   ...   31

Prediction of differential-mode EMI in the AC Side of the Three-phase PWM rectifier

Kexin Wei, Haimei Zhang, Bin Liang,

Mingxing Du,Guozhen Gao

Department of Electrical Engineering,

Tianjin University of Technology,

Tianjin, 300384, China

zhmkx@163.com
Abstract—Saber simulation software is one of the most powerful power electronic simulation software in the world. A typical three-phase PWM rectifier is in order to investigate the EMI. In this paper, the lumped equivalent circuit model of DM EMI is analyzed and a simple equivalent circuit is proposed. Through the simulation we can get time-domain analysis, and obtain frequency-domain analysis after FFT. The simulation waveforms of DM EMI are compared with the previous results of the equivalent circuit of actual experiments, at last this also verified the validity of the research which involved in this paper at the same time.

Key words—power electronics; PWM rectifier; differential-mode EMI; saber



The Research on the Regularization of Flow Nets

Guorong Cao, Qingping Tan, Jingang Xie, Hao Wu

College of Computer Science, National University of Defense Technology, Changsha, China

{guorong.cao, eric.tan.6508, jingang.xie, hao.wu}@gmail.com


Abstract
Regular flow nets, extended from Petri nets and YAWL, have been proposed as bases for modeling web service behavior because of their abilities for dealing with cyclic behavior and data dependences among services. However, the corresponding approach on how to regularize flow nets into regular flow nets has not been given yet. So, in this paper we propose a methodology for the regularization of flow nets. Firstly, we introduce concepts related to flow nets and regular flow nets. Secondly, we define one pattern for each type flow net, and based on these patterns we can get the corresponding regular flow nets of almost all of flow nets through regularization. Finally, some special patterns that might not be regularized together with a particular example are discussed.

A Novel Algorithm of Coherent Integration for Moving Target Detection

WANG Yao


Department of Computer Science and Communication Engineering

Southwest Jiaotong University

Sichuan, China

e-mail: wangyao7841@tom.com

WANG Shan

Department of Electronic information engineering

Sichuan University

Sichuan, China

wangshan_0808@yahoo.cn
Abstract—The problem of detecting moving targets which migrate between rang cells is considered. The traditional MTD method can not effectively integrate the energy of targets, because it integrates multi-pulse in the same range cell in a CPI. This paper introduces a novel algorithm of coherent integration for moving target detection (MTCI), which is calculated along the track of the moving target. A mathematical formula of MTCI algorithm is derived based on the signal model of a moving target in Chirp Radar. The integrating results of MTCI and MTD methods in the Gaussian white noise background are also compared. A Monte Carlo simulation has been performed to evaluate the detecting performance of MTCI algorithm, and the detection curves are also given.

Keywords- coherently integration; LFM signal; multi-target detection; high-speed moving target detection


Adaptive Digital Predistortion based on MC-FQRD-RLS Algorithm using Indirect Learning Architecture
You Li, Xiaolin Zhang

School of Electronic and Information Engineering

Beihang University

Beijing, China

Doctorly911@sohu.com

zxl@buaa.edu.cn


Abstract—Multichannel fast QR decomposition recursive least-squares (MC-FQRD-RLS) algorithms are well known for their good numerical properties and low computational complexity. There are tow distinct ways to obtain the expended input vector, sequential-type method, and block-type one. The latter one, despite exhibiting a higher computational burden as compared to the former one, has some attractive features, e.g., suitability for parallel implementation. Predistortion techniques for linearizing power amplifier (PA) nonlinearity with indirect learning architecture (IDLA) are widely used. The benefit of the IDLA leaves unnecessary the assumption of a model for PA, corresponding parameters estimation and inverse construction. In this paper we present a new technique for predistortion using block-type MC-FQRD-RLS algorithm with IDLA, in which the predistorter is constructed by simplified volterra model. Simulations results verify that the proposed techniques have good convergence property.

Keywords- predistortion; MC-FQRD-RLS Algorithm; block-type; IDLA; volterra model



Vehicle stability sliding mode control based on RBF neural network

Zhang Jinzhu

The Power and energy college

Harbin University of Engineering

Harbin, China

zjz6301@126.com

Zhang Hongtian

The Power and energy college

Harbin University of Engineering

Harbin, China

Abstract—According to the nonlinear and parameter time-varying characteristics of vehicle stability control, a sliding control algorithm is proposed based on radial base function (RBF) neural network. The algorithm not only can reduce the chattering caused by the conventional sliding mode, but also improve the robust of the adaptive neural network control. The simulation results show the algorithm ensures that the car could run at the direction desired by the drivers.

Keywords- radial base function;neural network; vehicle stability; nonlinearity



Online Prediction-Based Dynamic Cluster Configuration for Energy Conservation

Bin Liu,Jian Yang

Department of Automation

University of Science and Technology of China,USTC

Hefei, China

e-mail: mobileice@mail.ustc.edu.cn, jianyang@ustc.edu.cn

Yu Zhao

Shanghai Institute of Microsystem and Information Technology (SIMIT), Chinese Academy of Sciences (CAS)



Shanghai, China

e-mail: yu.zhao@mail.sim.ac.cn

Abstract—Dynamic cluster configuration is dynamically adjusting the servers scale based on the network load in order to achieve optimal service performance under the minimum system power consumption. In previous methods, they adopted adjustment methods based on the specific physical experimental model without the description of mathematical models. This paper presents a prediction-based dynamic clusters configuration strategy, it uses least mean square (LMS) algorithm to predict service requests in the future according to the historical information of service requests, and then on the basis of the load requests and the cluster processing power to decide the servers scale and dynamically adjust the opening and shutdown of the computers in the clusters. Simulation verifies the feasibility and superiority of the scheduling strategy.

Keywords-server clusters; dynamic clusters configuration; prediction algorithm; LMS; energy conservation




Probability Estimation based Adaptive Media Playout Algorithm

Mingna Fan, Jian Yang

Department of Automation

University of Science and Technology of China, USTC

Hefei, China

e-mail: fmnwen93@mail.ustc.edu.cn,

jianyang@ustc.edu.cn

Yu Zhao


Shanghai Institute of Microsystem and Information Technology (SIMIT)

Chinese Academy of Sciences (CAS)

Shanghai, China

e-mail: yu.zhao@mail.sim.ac.cn


Abstract—An adaptive media playout algorithm based on probability estimation is proposed to reduce the video playout jitter and playout halt caused by buffer underflow. It adjusts the duration of each frame according to the channel state and the estimated probability of underflow and overflow. Also it controls the playout rate range and the variation of the playout rate of the consecutive video frames to achieve the purpose of eliminating buffer outage and smoothing the video playout speed at the same time. Simulation results demonstrate that as compared to other AMP schemes, the proposed algorithm provides better visual quality with reasonable complexity in reducing the probability of buffer underflow and reducing the playout latencies and smoothing the visual perception.

Keywords-Probability Estimation;Sliding Window;Adaptive Media Playout



Multi-UAV Formation Maneuvering Control Based on Q-Learning Fuzzy Controller

Pang Rui


School of Automation, Northwestern Polytechnical University, Xi’an, China

University of Sydney, Sydney,NSW, Australia

pangrui517@gmail.com

Abstract: On the basis of the relative motion relations of the formation flight, UAV longitudinal and lateral fuzzy controllers are designed to solve the multi-UAV formation control problem. The relative positions between adjacent UAVs are controlled to meet the desired commands and performance requirements. Q-Learning method, which is one kind of reinforcement learning, is used to tune the corresponding parameters in output membership functions of fuzzy controller. This auto-tuning avoids the complexity of manual tuning with expert experience and eliminates the steady state errors. Also, different conditions including coordinative turning, tense-loose shape changing, shape sequence changing and collision avoiding are simulated with the formation control methodology, which is comprised of centralized decision and decentralized control. The results prove the correctness of control method and formation control strategy under the circumstances of different formation maneuvering demands.

Key Words: Reinforcement learning, Q-learning, fuzzy control, UAVs, Formation Flight, Maneuvering

Read and Reply Behaviors in a BBS Social Network

Fei Ding

Key Laboratory of Communication and Information Systems

(Beijing Jiaotong University)

Beijing Municipal Commission of Education

Beijing 100044, China

Email: 02211279@bjtu.edu.cn

Yun Liu

Key Laboratory of Communication and Information Systems



(Beijing Jiaotong University)

Beijing Municipal Commission of Education

Beijing 100044, China

Email: liuyun@bjtu.edu.cn

Hui Cheng

Key Laboratory of Communication and Information Systems

(Beijing Jiaotong University)

Beijing Municipal Commission of Education

Beijing 100044, China

Email: 07111013@bjtu.edu.cn

Fei Xiong

Key Laboratory of Communication and Information Systems

(Beijing Jiaotong University)

Beijing Municipal Commission of Education

Beijing 100044, China

Email: 07120126@bjtu.edu.cn

Xia-meng Si

Key Laboratory of Communication and Information Systems

(Beijing Jiaotong University)

Beijing Municipal Commission of Education

Beijing 100044, China

Email: 05120329@bjtu.edu.cn

Bo Shen

Key Laboratory of Communication and Information Systems



(Beijing Jiaotong University)

Beijing Municipal Commission of Education

Beijing 100044, China

Email: bshen@bjtu.edu.cn


Abstract—Understanding user’ read and reply behaviors are important both for the study of online social network properties and the modeling of information dissemination and trend prediction. Our dataset is crawled from a famous Chinese BBS social network. By analyzing the read and reply datas of users, we observe that distributions of discussion size and user participation level follow the power-law distribution, agreeing with former empirical and analytical investigations. But the distribution of user interest does not exhibit a power-law property. Statistics from hot posts show that read and reply behaviors vary among different topic categories. For every 100 users interested in a post, one or two of them in average would join the discussion. In addition, investigation concerning time property of replies shows that decay functions with periodical fluctuations are suitable to describe the short-term evolution.

Keywords-online social networks, data analysis, user behavior,BBS.


Location Privacy in Sparse Environment

Heng Liu, Tiejun Wang, Ming Sun, Zhen Liu and Mingtian Zhou

School of Computer Science and Engineering

University of Electronic Science and Technology of China

Chengdu, Sichuan, China

Email:{noza.liu,wtj.uestc}@gmail.com,{sunm,quake,mtzhou} @uestc.edu.cn

Abstract—Privacy of personal location information is becoming an increasingly important issue. This paper develops new methods for location privacy in sparse environment based on dummy users. The true user has been mixed with a set of dummy users in that LBSs can’t distinguish the true user so as to protect user location privacy. We present two techniques, the first one is called “dummy user trigger algorithm”, which is able to achieve the balance of user’s Location privacy and system performance, and the second one is named “dummy user generation algorithm” based on the period density matrix which enhances the truthfulness of dummy user.

Keywords-pervasive computing; Location privacy; dummy user; Location-aware system



Correction and Data Processing for Tooth Surface Deviation of Hypoid Gear

Tianxing Li

School of Mechatronics

Northwestern Polytechnical University

Xi’an, China

ly_litianxing@163.com

Tianxing Li, Xiaozhong Deng and Bingyang Wei

School of Mechatronics Engineering

Henan University of Science & Technology

Luoyang, China

ly_litianxing@163.com

Abstract—The correction and the data processing for tooth surface deviation of hypoid gear are a key link to the realization of the digitized closed loop manufacture. Based on one-dimensional probe, the method of error compensation for hypoid gears is studied. By means of the principle of the proportional correction of spiral bevel gears, the theory and the method of the automatic compensation and feedback correction to machine tool settings are investigated according to the measuring data. Without the human intervention, the correction of machine tool settings can be automatically completed. And 1 to 3 trial cuts, the tooth surface deviations can meet the design requirement. Finally, the correction of machine tool settings and the contact pattern test of tooth surfaces have been carried out. All these verify that the approaches of the correction and the data processing are feasible and accurate.

Keywords-one-dimensional probe; hypoid gears; measurement of tooth surface deviation; automatic correction; digitized closed loop manufacture

Study on chaotic sequence and RS sequence for underwater communication

Chen Sheng, Cheng En, Yuan Fei

Key Lab of Underwater Acoustic Communication and Marine Information Technology

Xiamen University

Xiamen, China

chengen@xmu.edu.cn


Abstract
Underwater acoustic communication channels are generally characterized as seriously time-space-frequency variant channels with strong multi-path interference, limited bandwidth, severe environment noise and Doppler effect. In underwater acoustic hop frequency communication system, every user’s information is modulated by a special code on the transmitter, the information will be demodulated by the same code at the receiver. The code mentioned here is pseudo-random sequence, the spectrum of the signal will be expanded. Performance of pseudo-random sequence is directly related to system performance, therefore, pseudo-random sequence is a key point of implementing a hop-frequency communication system. This paper is based on the analysis of acoustic communication channel, some common sequences are evaluated, and simulation is made to compare the performance of chaotic sequence and RS sequence.



Design and Implementation of Embedded Indoor Intelligent Temperature Control System

LI Xin-chun

College of Electronic and Information Engineering

Liaoning Technical University

Huludao, China

e-mail: lixinchun63@sina.com

ZHAO Shuang-hua

College of Electronic and Information Engineering

Liaoning Technical University

Huludao, China

e-mail: hailang989@163.com

GAO Ming-ming

College of Electronic and Information Engineering

Liaoning Technical University

Huludao, China

e-mail: gaomingming2080@163.com

Abstract—To characteristics and shortcomings of winter heating system in north China, the paper designed the indoor intelligent temperature control system.based on ARM-Linux platform of embedded systems and fuzzy control technology. Using DS18B20 and ZigBee wireless networking technology, completed the collection of multi-point temperature. Using fuzzy control technology to achieve precise control of room temperature. And the establishment of the QT user interface optimized the environment of human-computer interaction, brought great convenience to the user. With the implementation measurement heating, system will play an important role to reducing energy waste and the user's heat expenses and improving people's quality of life.

Keywords-adaptive fuzzy control; ARM-Linux; Zigbee; QT


An Improved Channel Coding Scheme Based on Turbo-BICM for IBOC-AM

Fang Weiwei, Yang Gang, Li Jianping

School of Information Engineering

Communication University of China

Beijing, China

e-mail: 541764418@163.com, Gangy@cuc.edu.cn, turbo_code@163.com


Abstract—Hybrid in-band on-channel (IBOC) broadcasting system is a scheme of digital audio radio, which could transmit analog AM and digital audio simultaneously. In IBOC systems, broadcasters transmit signals within the allocated channel bands, thus the bandwidth assigned for digital audio transmission is very limited. BICM can improve BER performance over Rayleigh fading channels without bandwidth expansion, thus it is widely used in mobile-radio channels. It has been found that by using BICM, an IBOC-AM broadcasting system can yield a better coding gain. Turbo-BICM, the combination of turbo encoder and BICM, is known as a remarkable scheme with high coding diversity and high flexibility. In this paper, an improved channel coding scheme based on turbo-BICM is proposed to achieve better reliability compared with the conventional IBOC system. Simulation results show that the proposed scheme can effectively improve the receiving performance of an AM IBOC system. When BER is below 10-5, the improved coding scheme can achieve more than 4dB code gains over Rayleigh fading channels.

Keywords- IBOC AM; in-band on-channel; turbo; BICM; Rayleigh fading channels


An Improved Implementation Scheme Based on BICM for IBOC-AM
Liu Shuyang,Yang Gang,Li Jianping

School of Information Engineering

Communication University of China

Beijing, China

e-mail : maymonica2000@sina.com, Gangy@cuc.edu.cn, turbo_code@163.com

Abstract—This paper proposes an improved channel coding scheme based on bit-interleaved coded modulation (BICM) for in-band on-channel amplitude modulation (IBOC-AM). It can yield better coding gains than traditional scheme over Rayleigh fading channels. Generally, BICM embedded LDPC code for IBOC (BICM-L) has better coding performances than BICM embedded convolutional codes for IBOC (BICM-C), which has been proved to be an advanced scheme. However, there is a zone named blind-zone existing in the region of SNRs, where the performance gains of BICM-L with high-order modulation are worse than BICM-C. To achieve an improved performance, for the blind-zone, BICM-L is replaced by BICM-C in this improved scheme. Simulation results confirm that, by using the proposed improved scheme, a better performance gains up to 0.3 dB can be achieved for the blind-zone between 4 dB SNR and 5.1 dB SNR, while an additional gains about 4 dB can be achieved in regions of high SNRs.

Keywordss—In-band on-channel (IBOC), bit-interleaved coded modulation (BICM), low density parity check (LDPC) codes,convolutional codes.

Research on Fault Location System of Aircraft Cable Based on principle of least squares solution
Xiaolin Liu1,2, ZhiQuan Li1, Kun Yuan3

1 College of Electrical Engineering

Yanshan University

Qinhuangdao, HeBei, China

2 College of Aeronautical Automation

Civil Aviation University of China

TianJin, China

3 College of Astronautics

Northwestern Polytechnical University

XiAn, ShanXi, China

e-mail:missxiaolin1997@163.com

Abstract—In this paper, based on the electric theory of distribution parameter circuit, a mathematical model of aircraft cable fault location is created. The least squares solution is selected as the control algorithm because it has been applied successfully to parameter estimation. An aircraft cable fault location system is designed and the experimental results show that the system is rational and effective.

Keywords- Aircraft cable; Mathematical model; Least square estimation; Fault location system

A Novel Security Risk Assessment Model for Information System
Huiying Lv

School of Information Engineering

Capital Normal University

Beijing, 100037, China

lvhy999@163.com

Abstract—Security defense against threats is very important to information system. A novel security risk assessment model is presented. In this model, an information system consists of a series of network nodes, which have three elements: assets, rights and vulnerabilities. To analyze the relevance between vulnerabilities, an algorithm for intrusion path discovery is proposed centralized on assets. By investigating the intrusion paths found, the system risk is quantitatively evaluated on vulnerabilities, nodes, assets, or system, which indicates the risk situation of the system. A simulation experiment and results verify availability and effectiveness of the model.

Keyword: information security; model; risk assessment; vulnerability

Human-Machine Interface Evaluation Method Based on Grey Interval Relation Membership Degree

Chunyan Xia 1’2

1College of Mechanical & Electrical Engineering

Harbin Engineering University

Harbin 150001, China

2College of Materials Science & Engineering

Jiamusi University

Jiamusi 154007, China

xiachunyan2000@yahoo.com.cn
Abstract—Due to the incompleteness and complexity of the evaluation information in the human-machine interface evaluation, it is difficult to evaluate the human-machine interface with the traditional evaluation methods. In order to overcome these problems, grey interval relation membership degree is applied in the field of human-machine interface evaluation in this paper. The concept of membership degree is imported and integrated with grey relation analysis in the method. By comparing the relation membership degree between the design schemes and the reference schemes, including the ideal scheme and the negative ideal scheme, the optimal scheme can be found. Based on the proposed method, a novel evaluation model of human-machine interface is set up and applied in the evaluation on computer monitoring and controlling interface of nuclear power plant. Results of the evaluation example prove that the proposed method for human-machine interface evaluation is reasonable and feasible.

Keywords-grey relation analysis; membership degree; Human-machine interface; uncertin information; interval number


Design and Development of an Image Processing Based Automatic Library Storage System

1Umar Farooq, 2Hammad Khan, 3Muhammad Usman Asad, 4Amber Mateen, 5Asim Iqbal, 6Hassan Mahmood

Department of Electrical Engineering University of The Punjab Lahore-54590 Pakistan

1engr.umarfarooq@yahoo.com, 2khan.hammad@live.com, 3usmanasad01@hotmail.com, 4bosons.1@hotmail.com, 5its.asimiqbal@gmail.com, 6hassan_3md@yahoo.com


Abstract—This paper describes the design and development of an image processing based automatic storage system for library. The prototype system comprises of a cartesian robot, two infrared sensors, a four channel motor interface board, a web camera and a PC. After the book has been detected by the infrared sensors, camera captures the image of front cover of the book. The title of the book is extracted and passed to the search engine of library database. The database returns the class and location of the book which is then placed automatically in the corresponding shelf with the help of a cartesian robot, a mechanical structure driven by three direct current (DC) motors. MATLAB® programming environment has been used in developing the system.

Keywords- library storage;infrared sensors;digital camera; image processing;cartesian robot




Download 1.34 Mb.

Share with your friends:
1   ...   17   18   19   20   21   22   23   24   ...   31




The database is protected by copyright ©ininet.org 2024
send message

    Main page