The 4th Annual IEEE International Conference on Cyber Technology in Automation, Control and Intelligent最新文献

筛选
英文 中文
Optimization algorithm of manipulator robot performances 机械手机器人性能优化算法
Abderrahmane Belaidi, Hadjira Belaidi
{"title":"Optimization algorithm of manipulator robot performances","authors":"Abderrahmane Belaidi, Hadjira Belaidi","doi":"10.1109/CYBER.2014.6917459","DOIUrl":"https://doi.org/10.1109/CYBER.2014.6917459","url":null,"abstract":"One aim of controlling a manipulator robot is to maximize its performances such as accuracy, speed, time etc.... However, limiting the power of actuators causes a limitation of their generalized accelerations and velocities; this is due to the high inertial forces, which create dangerous voltages at the machines elements.","PeriodicalId":183401,"journal":{"name":"The 4th Annual IEEE International Conference on Cyber Technology in Automation, Control and Intelligent","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128527290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Driving behavior correction in human-vehicle interaction based on Dynamic Window Approach 基于动态窗口方法的人车交互驾驶行为校正
Yue Kang, Danilo Alves de Lima, A. Correa Victorino
{"title":"Driving behavior correction in human-vehicle interaction based on Dynamic Window Approach","authors":"Yue Kang, Danilo Alves de Lima, A. Correa Victorino","doi":"10.1109/CYBER.2014.6917512","DOIUrl":"https://doi.org/10.1109/CYBER.2014.6917512","url":null,"abstract":"This paper presents the approach of an applicable safety driving methodology for human drivers with focus on human-vehicle interaction. The approach is based on Dynamic Window Approach (DWA) in co-operation with perception of the obstacles. The human driving behaviors are modelled for the design of controller, refined by referential paths using evasive trajectory model, where linear and angular velocities are limited and corrected by DWA which performed as an obstacle avoidance strategy. Results of trajectory following and obstacle avoidance are compared with the Visual Servoing (VS) controller as a corresponding approach of autonomous control pattern.","PeriodicalId":183401,"journal":{"name":"The 4th Annual IEEE International Conference on Cyber Technology in Automation, Control and Intelligent","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117090226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Coverage hole elimination based on sensor intelligent redeployment in WSN 基于传感器智能重新部署的无线传感器网络覆盖孔消除
Xinggang Fan, Zhaojuan Zhang, Xingxing Lin, Heng Wang
{"title":"Coverage hole elimination based on sensor intelligent redeployment in WSN","authors":"Xinggang Fan, Zhaojuan Zhang, Xingxing Lin, Heng Wang","doi":"10.1109/CYBER.2014.6917485","DOIUrl":"https://doi.org/10.1109/CYBER.2014.6917485","url":null,"abstract":"Coverage hole will bring about event detection lost or detection error and seriously damage the quality of monitoring in WSN. This paper propose an intelligent strategy called the improved hybrid particle swarm algorithm (IHPSA) to repair coverage hole. In hybrid sensor network, this scheme considers the displacement of mobile sensors, energy consumption and energy balancing together, effectively schedules the redundant mobile sensors to repair coverage holes by moving to appropriate locations, then improves the event detection rate. Simulation result shows that this moving algorithm brings better coverage function and higher capacity of event detection.","PeriodicalId":183401,"journal":{"name":"The 4th Annual IEEE International Conference on Cyber Technology in Automation, Control and Intelligent","volume":"648 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117101115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
The improved Fuzzy-Smith compensator based on modeling error for network control system 基于建模误差的改进模糊-史密斯补偿器用于网络控制系统
Hongjun Chen, Yuepeng Qu, Xin Zhou, Bo Liu
{"title":"The improved Fuzzy-Smith compensator based on modeling error for network control system","authors":"Hongjun Chen, Yuepeng Qu, Xin Zhou, Bo Liu","doi":"10.1109/CYBER.2014.6917444","DOIUrl":"https://doi.org/10.1109/CYBER.2014.6917444","url":null,"abstract":"This paper proposes a Fuzzy-Smith compensator based on the modeling error for the time delay compensation of network control system (NCS). When the controlled plant is a nonlinear time-varying system, the identification model error of Smith predictor will change as well, which will lead to a poor control performance. For this problem, the fuzzy control method based on identification model gain self-tuning is introduced to improve the robustness of the compensator. Simulation and experimental results show good performance on the time delay compensation and modeling error correction for the NCS.","PeriodicalId":183401,"journal":{"name":"The 4th Annual IEEE International Conference on Cyber Technology in Automation, Control and Intelligent","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125915293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Experiment based analysis of ZigBee transmissions under severe Wi-Fi interference 基于实验的严重Wi-Fi干扰下ZigBee传输分析
P. Dong, Zhizhong Zhang, F. Tong
{"title":"Experiment based analysis of ZigBee transmissions under severe Wi-Fi interference","authors":"P. Dong, Zhizhong Zhang, F. Tong","doi":"10.1109/CYBER.2014.6917482","DOIUrl":"https://doi.org/10.1109/CYBER.2014.6917482","url":null,"abstract":"To evade Wi-Fi interference for ZigBee networks, it is required to reliably deliver critical channel-changing instructions under heavy interference. This paper firstly investigates ZigBee transmission performance under real-world Wi-Fi and under controlled high-rate data streams, respectively. Based on the experimental results, a theoretical model and a rough guideline for reliable message delivering are presented and analyzed. Further behavior-level simulations confirm the analysis results and provide a strategy for reliably delivering messages under heavy interference, i.e. a nearly-100% success rate with a reasonable delay time.","PeriodicalId":183401,"journal":{"name":"The 4th Annual IEEE International Conference on Cyber Technology in Automation, Control and Intelligent","volume":"474 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126109582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A cooperative software-hardware approach for wireless body area network implementation 一种用于无线体域网络实现的软硬件协同方法
Meng Chen, Zhi Li, Guanglie Zhang
{"title":"A cooperative software-hardware approach for wireless body area network implementation","authors":"Meng Chen, Zhi Li, Guanglie Zhang","doi":"10.1109/CYBER.2014.6917463","DOIUrl":"https://doi.org/10.1109/CYBER.2014.6917463","url":null,"abstract":"This paper proposes a cooperative softwarehardware framework to implement the complexity of application development for wireless body area networks (WBAN). The framework consists of a software WBAN simulator, WBAN hardware platform and code generator for sensor nodes. The proposed framework is convenient for design and verification of WBAN communication protocols and applications efficiently. In this paper, we discuss the cooperative software-hardware platform architecture, which packages the detailed hardware design. So the hardware of the sensor nodes is transparent to users. The paper also presents an application example with an adaptive MAC protocol to illustrate how to implement the proposed cooperative framework.","PeriodicalId":183401,"journal":{"name":"The 4th Annual IEEE International Conference on Cyber Technology in Automation, Control and Intelligent","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123453521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Abstraction on sensor network and representation with a virtual layer 对传感器网络进行抽象,并用虚拟层表示
Yan Liu, Mei Chen
{"title":"Abstraction on sensor network and representation with a virtual layer","authors":"Yan Liu, Mei Chen","doi":"10.1109/CYBER.2014.6917546","DOIUrl":"https://doi.org/10.1109/CYBER.2014.6917546","url":null,"abstract":"Research on sensor network has been focused at overcoming these deficiencies through more energy efficient routing, localization algorithms and system design. This paper tried to discuss some application related challenges, such as data integration, data storage, metadata generation, data fast query. We use analytical data management concept to create a virtual layer, which maps the real sensor network into abstract nodes through base nodes. This virtual layer helps applications use/reuse data from the sensor network, and provides functions including data acquisition, calculation, linkage, and broken management. This abstraction and virtual representation is shown with a web service (data integrity) for a building monitoring system.","PeriodicalId":183401,"journal":{"name":"The 4th Annual IEEE International Conference on Cyber Technology in Automation, Control and Intelligent","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121757031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Challenges of robotics and automation in offshore oil&gas industry 机器人和自动化在海上油气工业中的挑战
Samuel Stavinoha, Heping Chen, Michael Walker, Biao Zhang, T. Fuhlbrigge
{"title":"Challenges of robotics and automation in offshore oil&gas industry","authors":"Samuel Stavinoha, Heping Chen, Michael Walker, Biao Zhang, T. Fuhlbrigge","doi":"10.4236/ICA.2014.53016","DOIUrl":"https://doi.org/10.4236/ICA.2014.53016","url":null,"abstract":"The oil and gas industry will keep booming in the coming few decades. Because it becomes more and more challenging to obtain oil and gas from conventional and non-conventional resources, there will be considerable demands on the labor, financial capabilities and technology development. Since the future supplies of oil and gas will expand, more advanced technology will become increasingly necessary to obtain conventional and non-conventional oil and gas. The offshore oil industry is a complicated myriad of equipment, structures, and work force. Before any real vision of the potential roles of robotics and automation in offshore oil processes can emerge, the processes related to oil and gas must be enumerated appropriately. Therefore, this study performs the necessary survey and investigation about the work conditions of robotics and automation equipment in oil and gas industry, especially offshore oil rigs. The oil &gas industry processes are first investigated. The personals and tasks are then explored. The challenges and requirements are identified for robotics and automation applications in the oil and gas industry. Our objectives are to explore the opportunities and challenges of robotics and automation in the oil and gas area.","PeriodicalId":183401,"journal":{"name":"The 4th Annual IEEE International Conference on Cyber Technology in Automation, Control and Intelligent","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122100756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Experimental validation for real time control of DC motor using novel finite-horizon optimal technique 基于有限水平优化技术的直流电机实时控制实验验证
Ahmed Khamis, D. Naidu
{"title":"Experimental validation for real time control of DC motor using novel finite-horizon optimal technique","authors":"Ahmed Khamis, D. Naidu","doi":"10.1109/CYBER.2014.6917437","DOIUrl":"https://doi.org/10.1109/CYBER.2014.6917437","url":null,"abstract":"DC motors are widely used in industrial applications. Controlling of DC motor is a great challenge for control engineers. Precise equations describing DC motors are nonlinear. Accurate nonlinear control of the motion of the DC motors is required. In this paper, a novel online technique for finite-horizon nonlinear tracking problems is presented. The idea of the proposed technique is the change of variables, that converts the nonlinear differential Riccati equation to a linear Lyapunov differential equation. The proposed technique is effective for a wide range of operating points. Simulation results and experimental implementation of a DC motor are given to illustrate the effectiveness of the proposed technique.","PeriodicalId":183401,"journal":{"name":"The 4th Annual IEEE International Conference on Cyber Technology in Automation, Control and Intelligent","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134431774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security assessment methodology for industrial control system products 工业控制系统产品安全评价方法
A. Hristova, Roman Schlegel, S. Obermeier
{"title":"Security assessment methodology for industrial control system products","authors":"A. Hristova, Roman Schlegel, S. Obermeier","doi":"10.1109/CYBER.2014.6917472","DOIUrl":"https://doi.org/10.1109/CYBER.2014.6917472","url":null,"abstract":"Industrial control systems (ICS) are at the heart of critical infrastructures and security is therefore important for such systems. In order to determine the security level of existing and planned systems, ICS products should be efficiently and comprehensively assessed. In this paper we present a methodology for assessing the security of a product or a system that can be used by security experts and non-experts alike. The methodology contains specific and concrete security recommendations (what), a rationale for each recommendation (why) as well as concrete implementation guidance (how). The methodology aims to help product teams to quickly and efficiently assess the security level of their products, prioritize resources on future development efforts, and generate security requirements for future products. We validate the approach by applying a concrete instantiation of the methodology to a fictitious ICS product.","PeriodicalId":183401,"journal":{"name":"The 4th Annual IEEE International Conference on Cyber Technology in Automation, Control and Intelligent","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130180785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信