{"title":"A new variable gain robust tracking controller for a class of uncertain linear systems","authors":"H. Oya, Shunya Nagai","doi":"10.1109/ICSTCC.2017.8107006","DOIUrl":"https://doi.org/10.1109/ICSTCC.2017.8107006","url":null,"abstract":"This paper deals with a design problem of variable gain robust model following/tracking control for a class of uncertain linear systems. The new proposed variable gain robust control system is composed of fixed gain controllers and variable ones. In this paper, LMI-based sufficient conditions for the existence of the proposed variable gain robust controller are given. Finally, a simple numerical example is run to show the effectiveness of the proposed control strategy.","PeriodicalId":374572,"journal":{"name":"2017 21st International Conference on System Theory, Control and Computing (ICSTCC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124821048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real time implementation of IoT structure for pumping stations in a water distribution system","authors":"Alexandru Predescu, M. Mocanu, C. Lupu","doi":"10.1109/ICSTCC.2017.8107089","DOIUrl":"https://doi.org/10.1109/ICSTCC.2017.8107089","url":null,"abstract":"This article presents a real-time control system for an experimental model of a water distribution system. The hardware and software implementation follows the latest trends in IoT and proves that such an architecture can be used for real-time process control in distributed systems. The control of flow is implemented using a multiple-model control algorithm for the pumping station. A method which shows the sensitivity of the sensors is used to validate the leak detection and parameter control capabilities resulted from the structure of the water network.","PeriodicalId":374572,"journal":{"name":"2017 21st International Conference on System Theory, Control and Computing (ICSTCC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125298687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data-driven SISO predictive control using adaptive discrete-time fliess operator approximations","authors":"W. Gray, L. A. D. Espinosa, L. Kell","doi":"10.1109/ICSTCC.2017.8107063","DOIUrl":"https://doi.org/10.1109/ICSTCC.2017.8107063","url":null,"abstract":"Modern control theory has been applied successfully in a wide variety of engineering disciplines for decades. In sharp contrast to this situation, however, there are fields like ecology where control methodologies have not been so successful in practice. This largely due to the poor quality of models that are available and the limited amount of reliable data that can be gathered. An emerging set of control techniques known collectively as data-driven control appears to be a natural candidate for control problems in such fields. The main objective of this paper is to describe one such algorithm based on recent advances in the modeling of nonlinear input-output systems in terms of Chen-Fliess series or Fliess operators. The idea is to combine a class of discrete-time Fliess operator approximators with a standard least-squares algorithm found in adaptive control to produce a time-varying input-output model that can be used to do predictive control. As an illustration, the method is applied to a predator-prey model in order to control the population level of the prey species.","PeriodicalId":374572,"journal":{"name":"2017 21st International Conference on System Theory, Control and Computing (ICSTCC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128535490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Voda, A. Charef, Daoud Idiou, Mariana Mulinari Pinheiro Machado
{"title":"Creep modeling for piezoelectric actuators using fractional order system of commensurate order","authors":"A. Voda, A. Charef, Daoud Idiou, Mariana Mulinari Pinheiro Machado","doi":"10.1109/ICSTCC.2017.8107021","DOIUrl":"https://doi.org/10.1109/ICSTCC.2017.8107021","url":null,"abstract":"This paper focuses on the creep modelling for the piezoelectric actuators (PEAs) using fractional system of commensurate order. The proposed fractional system of commensurate order is derived from another fractional system of non commensurate order through an identification method based on the recursive least squares algorithm. The choice of the fractional system of commensurate order representation is due mainly to the ability to use this representation to implement the PEA using analogue circuits through rational function approximation of its irrational transfer function, to represent the PEA using a fractional order state space representation, to easily study the PEA's stability and to derive its closed form responses. The proposed PEA model has been validated in simulation and on an experimental set-up from Gipsa-lab.","PeriodicalId":374572,"journal":{"name":"2017 21st International Conference on System Theory, Control and Computing (ICSTCC)","volume":"139 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128838643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hajarisena Razafimahatratra, Thomas Mahatody, Josvah Paul Razafimandimby, Sabin Simionescu
{"title":"Automatic detection of coupling type in the UML sequence diagram","authors":"Hajarisena Razafimahatratra, Thomas Mahatody, Josvah Paul Razafimandimby, Sabin Simionescu","doi":"10.1109/ICSTCC.2017.8107107","DOIUrl":"https://doi.org/10.1109/ICSTCC.2017.8107107","url":null,"abstract":"The quality of source code is an important stake for the construction of software. The source code quality facilitates the maintenance and the evolution of the program. In the object-oriented paradigm, a modular system is easy to maintain thanks to its components with strong cohesion and weak or low coupling. Weak coupling is among the key factor to reduce the cost and the deadline of the system developing and maintaining. We propose to evaluate this factor since the design of system. In this paper, the proposed approach consists in the automatic detection of coupling type in the object-oriented design level. To do this, we have elaborated rules to detect the strongest coupling type. It belongs then to the designer to do redesign for a weak coupling code. As a result, the proposed strategy detects the types of coupling within each UML sequence diagram object at the design level. To validate our strategy, we conducted a case study. Then, the results obtained are adapted in a fuzzy architecture for validation. And finally, the output of the fuzzy architecture is a fuzzy membership function of total output coupling. The results show that our approach helps designers and software developers to obtain a better quality of software product.","PeriodicalId":374572,"journal":{"name":"2017 21st International Conference on System Theory, Control and Computing (ICSTCC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125635442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hunting for illicit psychoactive substances and precursors: A multivariate approach","authors":"M. Praisler, Ș. Ciochină, M. Coman","doi":"10.1109/ICSTCC.2017.8107042","DOIUrl":"https://doi.org/10.1109/ICSTCC.2017.8107042","url":null,"abstract":"A significant raise in the use of illicit psychoactive substances has been reported in the last decade. This trend is probably due, especially in the case of amphetamine-type stimulants (ATS), to the fact that they are the easily synthesized. Globalization offers new ways of procuring the precursors of these substances (e.g. online) and helps cover the increasing production needs of clandestine laboratories. Hence, law enforcement authorities need new analytical instruments enabling an efficient and fast detection of these controlled substances for border control (customs) and police operations. We are presenting a chemometrical application designed to perform the automated recognition of ephedrines based on their vibrational absorptions. The spectra are recorded, with a new portable quantum cascade laser spectrometer, between 1405 and 1150 cm−1 (QCL UT8). The effect of spectra preprocessing with a feature weight we on the classification accuracy is discussed in detail.","PeriodicalId":374572,"journal":{"name":"2017 21st International Conference on System Theory, Control and Computing (ICSTCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120963759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The stabilizing composite control in a weakly nonlinear singularly perturbed control system","authors":"M. Dmitriev, D. Makarov","doi":"10.1109/ICSTCC.2017.8107099","DOIUrl":"https://doi.org/10.1109/ICSTCC.2017.8107099","url":null,"abstract":"We investigated an approach to a stabilizing nonlinear regulator construction in weakly nonlinear singularly perturbed control system. The control design had two stages. First of all control system was decomposed into the two linear subsystems with reduced dimensions and appropriate composite linear control was constructed. Then nonlinear correction of composite linear control was made. The proposed approach was based on a formal asymptotic expansion of the solution of the corresponding algebraic state-dependent Riccati equation (SDRE).","PeriodicalId":374572,"journal":{"name":"2017 21st International Conference on System Theory, Control and Computing (ICSTCC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124021771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of the coarse attitude angular rate estimator for low earth orbit satellite","authors":"M. A. S. Mohammed, A. Bellar, H. Boussadia","doi":"10.1109/ICSTCC.2017.8107023","DOIUrl":"https://doi.org/10.1109/ICSTCC.2017.8107023","url":null,"abstract":"It is undeniable that the satellite attitude is random just after the orbit injection from the launcher. In a phase, it is difficult to extract the full attitude knowledge of the satellite, however, it can be possible to determine the coarse attitude angular rate of the satellite using the difference of two successive magnetometer measurements. It is required to put the satellite attitude from the unknown random attitude to a predictable attitude. This filter was designed for an axially symmetric configuration with almost equal moments of inertia around all axes and diagonal matrix of inertia in previous literature. This paper presents another design for a micro satellite with different moments of inertia around all axes and non-zero off diagonal. The paper describes also the various steps to design the coarse attitude angular rate estimator for low earth satellite. Simulation results will be presented to evaluate the performance of the estimator and finally the conclusion and the annex.","PeriodicalId":374572,"journal":{"name":"2017 21st International Conference on System Theory, Control and Computing (ICSTCC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126732861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Ungureșan, V. Muresan, M. Abrudean, H. Valean, I. Clitan, Cristian Bondici, A. Puscasiu, Alexandra Fanca, O. Stan
{"title":"Advanced control of a hydroelectric power plant","authors":"M. Ungureșan, V. Muresan, M. Abrudean, H. Valean, I. Clitan, Cristian Bondici, A. Puscasiu, Alexandra Fanca, O. Stan","doi":"10.1109/ICSTCC.2017.8107060","DOIUrl":"https://doi.org/10.1109/ICSTCC.2017.8107060","url":null,"abstract":"The paper presents an original method for controlling the real power delivered by a hydroelectric power plant to local electrical grid. The advanced control is based on: the implementation of the Internal Model Control strategy in order to obtain the system stabilization and robustness; the implementation of two feed-forward loops in order to reject more efficiently the effect of the disturbances; a control loop for the frequency correction. The main controller from the proposed control system has an original architecture and it is tuned using an original concept, too.","PeriodicalId":374572,"journal":{"name":"2017 21st International Conference on System Theory, Control and Computing (ICSTCC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127021490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient method in pre-processing phase of mining suspicious web crawlers","authors":"Miron Catalin, Aflori Cristian","doi":"10.1109/ICSTCC.2017.8107046","DOIUrl":"https://doi.org/10.1109/ICSTCC.2017.8107046","url":null,"abstract":"The reports from last years outline the fact that the web crawlers (robots, bots) activities generate more than a half of web traffic on Internet. Web robots can be good (used for example by search engines) or bad (for bypassing security solutions, scraping, spamming or hacking), but usually all take up the internet bandwidth and can cause damage to businesses that rely on web traffic or content. Sorting human online traffic from bot activity isn't an easy task. The constantly evolving range of attacks, and the continuous optimization of bots, pose a new set of challenges. Our proposal is the first step for a larger automated solution that implies using the various intrusion detection system (IDS) methods and tools combined with mining algorithms. The final objective of the solution is the automated and effective detection of real bad bot threats for taking the appropriate security measures. The method proposes an automated flow from capturing the network traffic to the extraction of the input data to the mining algorithms (as the pre-processing step) and also an initial pattern detection and visualization with the scope of identifying potential threats generated by suspicious web crawlers. The first results are encouraging and represent the initial phase of identifying the potential threats from bad web robots.","PeriodicalId":374572,"journal":{"name":"2017 21st International Conference on System Theory, Control and Computing (ICSTCC)","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132503096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}