Search results for "Control and Systems Engineering"

showing 10 items of 994 documents

On the Robust Synthesis of Logical Consensus Algorithms for Distributed Intrusion Detection

2013

We introduce a novel consensus mechanism by which the agents of a network can reach an agreement on the value of a shared logical vector function depending on binary input events. Based on results on the convergence of finite--state iteration systems, we provide a technique to design logical consensus systems that minimize the number of messages to be exchanged and the number of steps before consensus is reached, and that can tolerate a bounded number of failed or malicious agents. We provide sufficient joint conditions on the input visibility and the communication topology for the method's applicability. We describe the application of our method to two distributed network intrusion detecti…

Consensus algorithmTheoretical computer scienceComputer scienceDistributed computingVisibility (geometry)Binary numberValue (computer science)Topology (electrical circuits)Computer Science::Multiagent SystemsSettore ING-INF/04 - AutomaticaControl and Systems EngineeringConsensus distributed algorithms intrusion detection security.Bounded functionConvergence (routing)Electrical and Electronic EngineeringVector-valued function
researchProduct

Flotation with sedimentation: Steady states and numerical simulation of transient operation

2020

Abstract A spatially one-dimensional model of the hydrodynamics of a flotation column is based on one continuous phase, the fluid, and two disperse phases: the aggregates, that is, bubbles with attached hydrophobic valuable particles, and the solid particles that form the gangue. A common feed inlet for slurry mixture and gas is considered and the bubbles are assumed to be fully aggregated with hydrophobic particles as they enter the column. The conservation law of the three phases yields a model expressed as a system of partial differential equations where the nonlinear constitutive flux functions come from the drift-flux and solids-flux theories. In addition, the total flux functions are …

Conservation lawPartial differential equationMaterials scienceComputer simulationSedimentation (water treatment)Mechanical EngineeringNumerical analysis02 engineering and technologyGeneral ChemistryMechanics010501 environmental sciencesGeotechnical Engineering and Engineering Geology01 natural sciences020501 mining & metallurgyPhysics::Fluid DynamicsNonlinear system0205 materials engineeringControl and Systems EngineeringSlurryFroth flotation0105 earth and related environmental sciencesMinerals Engineering
researchProduct

Estimation of recombinant protein production in Pichia pastoris base don a constraint-based model

2012

[EN] A previously validated constraint based model and possibilistic MFA have been used to design a simple estimator of protein production rate in Pichia pastoris cultures. A structured model of the yeast P. pastoris metabolism is used to predict the balance of key energetic equivalents such as ATP from available measurements, mainly substrate consumption, gases exchange rates and biomass specific growth. It has been shown that ATP flux can be related to biomass growth and protein productivity specific rates by linear regression. Cross-validation has been applied for robust parameter fitting on the basis of chemostat, steady-state experimental conditions. In this way, protein estimation can…

Constraint-based modelbiologyUncertaintyfood and beveragesEstimatorBiomassProtein productivity predictionChemostatPossibilistic metabolic flux analysisBioinformaticsbiology.organism_classificationIndustrial and Manufacturing EngineeringYeastINGENIERIA DE SISTEMAS Y AUTOMATICAComputer Science ApplicationsPichia pastorisConstraint (information theory)Pichia pastorisControl and Systems EngineeringModeling and SimulationLinear regressionBiological systemFlux (metabolism)Mathematics
researchProduct

mplicit Identification of Contact Parameters in a Continuous Chain Model

2011

Accurate contact modeling is of great importance in the field of dynamic chain simulations. In this paper emphasis is on contact dynamics for a time-domain simulation model of large chains guided in a closed loop track. The chain model is based on theory for unconstrained rigid multibody dynamics where contact within the chain and with the track is defined through continuous point contacts using the contact indentation and rate as means. This paper presents an implicit method to determine contact parameters of the chain model through the use of none gradient optimization methods. The set of model parameters are estimated by minimizing the residual between simulated and measured results. The…

Contact modelMathematical optimizationEngineeringbusiness.industryExperimental measurementsMultibody systemResiduallcsh:QA75.5-76.95Computer Science ApplicationsHysteresisChain (algebraic topology)Control and Systems EngineeringControl theoryModeling and SimulationIndentationDamping factorPoint (geometry)Contact dynamicslcsh:Electronic computers. Computer sciencebusinessOptimization methodsSoftwareModeling, Identification and Control: A Norwegian Research Bulletin
researchProduct

Exception-Tolerant Hierarchical Knowledge Bases for Forward Model Learning

2021

This article provides an overview of the recently proposed forward model approximation framework for learning games of the general video game artificial intelligence (GVGAI) framework. In contrast to other general game-playing algorithms, the proposed agent model does not need a full description of the game but can learn the game's rules by observing game state transitions. Based on hierarchical knowledge bases, the forward model can be learned and revised during game-play, improving the accuracy of the agent's state predictions over time. This allows the application of simulation-based search algorithms and belief revision techniques to previously unknown settings. We show that the propose…

Context modelComputer sciencebusiness.industryComputingMilieux_PERSONALCOMPUTINGApproximation algorithmContext (language use)Belief revisionKnowledge-based systemsArtificial IntelligenceControl and Systems EngineeringSearch algorithmReinforcement learningArtificial intelligenceElectrical and Electronic EngineeringbusinessVideo gameSoftwareIEEE Transactions on Games
researchProduct

Disturbed Exploitation compact Differential Evolution for Limited Memory Optimization Problems

2011

This paper proposes a novel and unconventional Memetic Computing approach for solving continuous optimization problems characterized by memory limitations. The proposed algorithm, unlike employing an explorative evolutionary framework and a set of local search algorithms, employs multiple exploitative search within the main framework and performs a multiple step global search by means of a randomized perturbation of the virtual population corresponding to a periodical randomization of the search for the exploitative operators. The proposed Memetic Computing approach is based on a populationless (compact) evolutionary framework which, instead of processing a population of solutions, handles …

Continuous optimizationta113education.field_of_studyMathematical optimizationInformation Systems and ManagementOptimization problemdifferential evolutionCrossoverPopulationEvolutionary algorithmComputer Science ApplicationsTheoretical Computer ScienceArtificial IntelligenceControl and Systems Engineeringmemetic computingDifferential evolutionMemetic algorithmevolutionary algorithmseducationcompact algorithmsSoftwarePremature convergenceMathematicsInformation Sciences
researchProduct

A novel strategy for solving the stochastic point location problem using a hierarchical searching scheme

2014

Stochastic point location (SPL) deals with the problem of a learning mechanism (LM) determining the optimal point on the line when the only input it receives are stochastic signals about the direction in which it should move. One can differentiate the SPL from the traditional class of optimization problems by the fact that the former considers the case where the directional information, for example, as inferred from an Oracle (which possibly computes the derivatives), suffices to achieve the optimization-without actually explicitly computing any derivatives. The SPL can be described in terms of a LM (algorithm) attempting to locate a point on a line. The LM interacts with a random environme…

Continuous-time stochastic processMathematical optimizationOptimization problemControlled random walkTime reversibilityDiscretized learning02 engineering and technologyTime reversibilityLearning automataStochastic-point problem0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringStochastic neural networkMathematicsBinary treeLearning automata020206 networking & telecommunicationsRandom walkComputer Science ApplicationsHuman-Computer InteractionControl and Systems Engineering020201 artificial intelligence & image processingStochastic optimizationSoftwareInformation Systems
researchProduct

Discrete Learning Control with Application to Hydraulic Actuators

2015

In this paper the robustness of a class of learning control algorithms to state disturbances, output noise, and errors in initial conditions is studied. We present a simple learning algorithm and exhibit, via a concise proof, bounds on the asymptotic trajectory errors for the learned input and the corresponding state and output trajectories. Furthermore, these bounds are continuous functions of the bounds on the initial condition errors, state disturbance, and output noise, and the bounds are zero in the absence of these disturbances.

Control algorithmComputer scienceElectro-hydraulic actuatorlcsh:QA75.5-76.95Computer Science Applicationslaw.inventionControl and Systems EngineeringlawControl theoryRobustness (computer science)Modeling and SimulationInitial value problemDiscrete learning controllcsh:Electronic computers. Computer scienceActuatorSoftwareHydraulic actuatorsModeling, Identification and Control
researchProduct

Reliable Planar Object Pose Estimation in Light Fields From Best Subaperture Camera Pairs

2018

International audience; A light-field camera can obtain richer information about a scene than a usual camera. This property offers a lot of potential for robot vision. In this paper, we present a method for pose estimation of a planar object with a light-field camera. The light-field camera can be regarded as a set of sub-aperture cameras. Although any combination of them can theoretically be used for the pose estimation, the accuracy depends on the combination. We show that the estimated pose error can be reduced by selecting the best pair of sub-aperture cameras. We have evaluated the accuracy of our approach with real experiments using a light-field camera in front of planar targets held…

Control and OptimizationComputer scienceProperty (programming)Biomedical EngineeringComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONSet (abstract data type)PlanarArtificial Intelligence[INFO.INFO-RB]Computer Science [cs]/Robotics [cs.RO]Computer visionPoseComputer Science::DatabasesGround truthbusiness.industryMechanical EngineeringAstrophysics::Instrumentation and Methods for Astrophysics[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]16. Peace & justiceObject (computer science)Computer Science ApplicationsHuman-Computer InteractionControl and Systems EngineeringComputer Science::Computer Vision and Pattern RecognitionComputer Vision and Pattern RecognitionArtificial intelligencebusiness
researchProduct

Sensor Fusion Localization and Navigation for Visually Impaired People

2018

In this paper, we present an innovative cyber physical system for indoor and outdoor localization and navigation, based on the joint utilization of dead-reckoning and computer vision techniques on a smartphone-centric tracking system. The system is explicitly designed for visually impaired people, but it can be easily generalized to other users, and it is built under the assumption that special reference signals, such as colored tapes, painted lines, or tactile paving, are deployed in the environment for guiding visually impaired users along pre-defined paths. Differently from previous works on localization, which are focused only on the utilization of inertial sensors integrated into the s…

Control and OptimizationExploitSettore ING-INF/03 - TelecomunicazioniComputer sciencebusiness.industry05 social sciencesCyber-physical system020206 networking & telecommunicationsTracking system02 engineering and technologySensor fusionColoredControl and Systems EngineeringInertial measurement unit0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciencesComputer visionArtificial intelligencebusinessJoint (audio engineering)Image resolution050107 human factors2018 European Control Conference (ECC)
researchProduct