Professional Documents
Culture Documents
International Conference
on Intelligent Computation Technology
and Automation
ICICTA 2008
Volume 1
Proceedings
International Conference
on Intelligent Computation Technology
and Automation
ICICTA 2008
Volume 1
Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries may photocopy
beyond the limits of US copyright law, for private use of patrons, those articles in this volume that carry a code at
the bottom of the first page, provided that the per-copy fee indicated in the code is paid through the Copyright
Clearance Center, 222 Rosewood Drive, Danvers, MA 01923.
Other copying, reprint, or republication requests should be addressed to: IEEE Copyrights Manager, IEEE Service
Center, 445 Hoes Lane, P.O. Box 133, Piscataway, NJ 08855-1331.
The papers in this book comprise the proceedings of the meeting mentioned on the cover and title page. They reflect
the authors’ opinions and, in the interests of timely dissemination, are published as presented and without change.
Their inclusion in this publication does not necessarily constitute endorsement by the editors, the IEEE Computer
Society, or the Institute of Electrical and Electronics Engineers, Inc.
ICICTA 2008
Table of Contents
Volume - 1
Preface - Volume 1.........................................................................................................................................xxiii
Organizing Committee - Volume 1 .......................................................................................................xxiv
v
Combinatorial Kernel Matrix Model Selection Using Feature Distances .........................................................40
Lei Jia and Shizhong Liao
Constrained Competitive Learning Algorithm for DNA Microarray Gene
Expression Data Analysis .........................................................................................................................................44
Shuanhu Wu, Hong Yan, Qingshang Zeng, Yanjie Zhang, and Yibin Song
Evolutionary Mechanism of Port Clusters Based on the Theory of Dissipative
Structure ......................................................................................................................................................................52
Yuan Zhao, Shaoqiang Yu, and Zan Yang
Genetic Algorithm Based Robot Path Planning ....................................................................................................56
WeiQiang Liao
HDN-GEP: A Novel Gene Expression Programming with High Density Node .............................................60
Yu Chen, Changjie Tang, Chuan Li, Yue Wang, Ning Yang, and Mingfang Zhu
Hybrid Particle Swarm Optimization Based on Parallel Collaboration ............................................................65
Yong Zhao, Xueying An, and Wencai Luo
iDistance Based Interactive Visual Surveillance Retrieval Algorithm ..............................................................71
Lin Qu, Yaowu Chen, and Xiaofan Yang
Improved Ant Colony Optimization for the Traveling Salesman Problem ......................................................76
Lijie Li, Shangyou Ju, and Ying Zhang
Integrated Location-Routing Problem Modeling and GA Algorithm Solving .................................................81
Yong Peng
Multilateral Multi-issue Automated Negotiation Model Based on GA ............................................................85
Li Liu, Yan Ma, Cuimei Wen, and Lian Li
Multi-objective Optimization with Modified Pareto Differential Evolution ....................................................90
Xiao-qing Chen, Zhong-xi Hou, and Jian-Xia Liu
One Improved Discrete Particle Swarm Optimization Based on Quantum
Evolution Concept .....................................................................................................................................................96
Xuyuan Li, Hualong Xu, and Zhaogang Cheng
Optimal Allocation of Test Poles for Grounding Grids Diagnosis Based
on Genetic Algorithm ..............................................................................................................................................101
Jian Liu, Zengli Li, Jianxin Wang, Wei Lu, and Zhizhong Li
Optimal Reactive Power Planning Based on Simulated Annealing Particle
Swarm Algorithm Considering Static Voltage Stability ....................................................................................106
Yingni Mao and Maojun Li
Optimum Configuration of Asphalt Pavement Construction Machines Based
on Immune Genetic Algorithm ..............................................................................................................................111
Ronghua Du
Optimum Design of Network Structures Based on Hybrid Intelligence
of Genetic - Ant Colonies Algorithm ...................................................................................................................116
Fengli Huang, Jinghong Xu, Jinmei Gu, and Yongjian Lou
Particle Filter Based on PSO ..................................................................................................................................121
Gongyuan Zhang, Yongmei Cheng, Feng Yang, and Quan Pan
vi
Path Planning for Deep Sea Mining Robot Based on ACO-PSO Hybrid
Algorithm ..................................................................................................................................................................125
Chunxue Shi, Yingyong Bu, and Ziguang Li
Region Water Supply System Optimization Based on Binary and Continuous
Ant Colony Algorithms ..........................................................................................................................................130
Qin Zhang and Xiong-hai Wang
Research on Re-use Reverse Logistics Network of Disused Household
Appliances Based on Genetic Algorithm .............................................................................................................135
Fengjiao Wan and Qingnian Zhang
Research on Self-Adaptive Float Evolution Algorithm Based on DE .............................................................140
Mingyi Cui
The Application of Saving Hybrid Genetic Algorithm on Optimization
of Distribution Routes .............................................................................................................................................145
Qichao He, Wei Yu, and Wusheng Liu
The Clustering Algorithm Based on Particle Swarm Optimization Algorithm .............................................148
Zhenkui Pei, Xia Hua, and Jinfeng Han
The Model Based on Grey Theory and PSO for Electricity Consumption
Forecasting ................................................................................................................................................................152
Wei Sun and Yujing Yan
vii
Fuel Injection Control and Simulation of EFI Engine Based on ANFIS ........................................................191
Haijun Chen
Grouting Stratum Classification with Support Vector Machines .....................................................................195
Fengling Li, Zhixiang Hou, Quntai Shen, and Lisheng Xu
Improved SPIHT Algorithm Based on Associative Memory Neural Network
and Human Visual System .....................................................................................................................................200
Xing-hui Zhang, Jing-lei Guo, Kuan-sheng Zou, and Zhi-dong Deng
NdFeB Magnet Composite Design Based on BP Network ...............................................................................204
Huiyu Wang, Yuanhua Ren, and Jianfeng Pan
Neural Network Simulation-Based Research on Highway Safety Evaluation ...............................................209
Jia Cheng, Hongxia Guo, Qingyao Li, and Wen Du
Nonlinear System Identification Using Dynamic Neural Networks Based
on Genetic Algorithm ..............................................................................................................................................213
Xinli Li, Yan Bai, and Congzhi Huang
Parameter Estimation of Reliability Model of Hydraulic System for Vibratory
Roller Based on Adaptive Linear Neural Network .............................................................................................218
Heqing Li and Qing Tan
Passivity Analysis of Impulsive Neural Networks with Time Delays
and Markovian Jump Parameters ..........................................................................................................................222
Xiaomei Zhang, Yufan Zheng, Yanbo Gao, and Xun Li
Prediction of Railway Passenger Traffic Volume Based on Weighted LS-SVM ..........................................227
Hu Han, Jian-Wu Dang, and En-En Ren
Recognition of Reliability Model of Vibratory Roller Based on Artificial
Neural Network ........................................................................................................................................................231
Heqing Li and Qing Tan
Research on Leakage State Classification of Pipelines Based on Wavelet
Packet Analysis and Support Vector Machines ..................................................................................................235
Na Liu, Lixin Zhang, and Yanyan Zhao
Research on the Fouling Prediction of Heat Exchanger Based on Support
Vector Machine ........................................................................................................................................................240
Lingfang Sun, Yingying Zhang, Xinpeng Zheng, Shanrang Yang, and Yukun Qin
Searching Optimal Welding Parameters with GA and BP ................................................................................245
Jian-Xiong Ye, Fa-Yun Zhang, and Jian-Feng Xie
Short-Term Traffic Flow Forecasting Based on Wavelet Network Model
Combined with PSO ................................................................................................................................................249
Yafei Huang
Study on Adjustment of Learning Rate and Its Application of ART2 ............................................................254
Haixia Chen
Study on Peak Discharge Periodicity of Zi River Based on Wavelet Analysis .............................................259
Fei-Yan Guo and Dong-Zheng Liu
viii
Surface Reconstruction Method Based on GRNN .............................................................................................262
Fuzhong Wu
The Improvement and Application of Lowry Model Based on Genetic
Algorithm ..................................................................................................................................................................266
Xianghai Meng, Guanming Qin, and Bin Xu
Total Least Square Support Vector Machine for Regression ............................................................................271
Guanghui Fu and Guanghua Hu
ix
Exploiting Sequential-Valve-Gate Molding To Control Weld Lines ..............................................................345
Feng Ruan, Yi Liu, Zujun Zhang, Juan Liao, and Bo Chen
Freeway Feedback Ramp Metering Based on Neuron Adaptive Control
Algorithm ..................................................................................................................................................................349
Chi Qi, Zhongsheng Hou, and Xingyi Li
Global Chaos Synchronization of the Lorenz–Stenflo Systems via Linear State
Error Feedback Control ..........................................................................................................................................354
Yun Chen, Xiaofeng Wu, and Zhifang Gui
Globally Exponentially Stabilizing Control for a Class of Continuous-Time
Bilinear Systems ......................................................................................................................................................359
Xian Zhang and Xin-Rong Yang
Guaranteed Cost H Infinity Robust Control for Uncertain Multiple
Time-Varying Delays Systems with Nonlinear Perturbation ............................................................................364
Xinjun Ma, Bugong Xu, and Yongjun Cao
H Infinity Controller Design of the Synchronous Generator ............................................................................370
Jianying Gong, Rong Xie, Weiguo Liu, and Shuanqin Xie
H Infinity State Feedback Control for the Stabilization of the Three Euler
Angles of Helicopter Based on LMI .....................................................................................................................375
Rong Xie, Xinmin Wang, and Yan Li
H Infinity Control of Switching Delayed Stochastic Hopfield Neural Network
Systems with Markovian Jumping Parameters ...................................................................................................380
Xiaole Xu, Lixin Gao, and Haiwa Guan
H Infinity Control for Nonlinear System via Piecewise Fuzzy Lyapunov
Approach ...................................................................................................................................................................385
Yun Zhu and Zhicheng Ji
Intelligent Greenhouse Control-System Based on Agent ..................................................................................390
Dahua Xu and Hua Li
Model Reference Adaptive Tension Control of Web Packaging Material .....................................................395
Baosheng Wang, Jianmin Zuo, Mulan Wang, and Hongyan Hao
Research of Optimizing Ignition Control System in Gaseous Fuel Engine
Based on RBF Neural Network .............................................................................................................................399
Hongwei Cui
Output Feedback Adaptive Control of Uncertainty Robot Using Observer
Backstepping ............................................................................................................................................................404
Jianxian Cai, Xiaogang Ruan, and Xinyuan Li
Parameter Space Approach for Active Fault Tolerant Control Design ...........................................................409
Bo Yuan and Jun Yang
Pole-Placement for Generalized Systems Simultaneous Stabilization ............................................................413
Jing Ma and Zhiwei Gao
x
Pyrocondensation Material Radiation Control System Based on Virtual
Instrument .................................................................................................................................................................418
Wei He and Yunfei Li
Quadratic Robust Stabilization of a Class of Switched Linear Systems
with Uncertainties ....................................................................................................................................................423
Xingmin Ji
Random Vibration Optimal Control of Vehicle Based on Semi-active
Suspension System ..................................................................................................................................................427
Jia Xu, Hong-Li Wang, Zhi-Wen Zhu, and Gen Ge
Research Quality Pig Growth Temperature Control System ............................................................................432
Congguo Ma and Dean Zhao
Research on Temperature Control Algorithm in Pipe Production Process .....................................................437
Wanzhi Chen
Robust Control for Uncertain Linear Differential Algebraic Systems with Time
Delays ........................................................................................................................................................................441
Xingmin Ji
Robust Controller Design for Boiler System .......................................................................................................445
Zhiqi Hu, Hanbai Fan, and Yujun He
Robust H Infinity Controller Design for Wheeled Mobile Robot
with Time-Delay ......................................................................................................................................................450
Wenping Jiang
Robust H Infinity Control for Discrete-Time Switched Linear Systems Subject
to Exponential Uncertainty .....................................................................................................................................455
Changlin Li, Fei Long, and Changzhen Cui
Robust Output Feedback Stabilization for Uncertain Switched Systems .......................................................460
Wei Shao, Jiabin Wang, and Yanmei Ding
Robust Reliable H Infinity Control for Discrete-Time Markov Jump Systems .............................................463
Zhongyi Tang, Weiping Duan, Wei Ni, and Jiaorong Chen
Self-Adapted Construction Control Analysis of Long Span Pre-stressed
Concrete Cable-Stayed Bridge ..............................................................................................................................468
Chang-song Chen
Self-Adapting Fuzzy-PID Control of Variable Universe in the Non-linear
System .......................................................................................................................................................................473
Mingqian Gao and Shanghong He
Service-Oriented Organization Management and Coordination Control
of MAS ......................................................................................................................................................................479
Jiquan Shen and Zhiqiang Wu
Sliding Mode Control of Single-Phase AC-DC Boost Converter Using
Time-Varying Sliding Surface ...............................................................................................................................484
Yiwen He, Weisheng Xu, and Hongrun Wang
xi
Sliding Mode L2-L Infinity Control for Uncertain Stochastic Nonlinear Jump
Systems ......................................................................................................................................................................488
Wei Ni, Zhongyi Tang, and Weiping Duan
Study of Control Logic for Automobile Anti-lock Braking System ................................................................493
Xin Zhang, Yuanyuan Lou, and Xiufang Yang
Study on the Control of 6-DOF Manipulators System with Force Feedback .................................................498
Zhuxin Zhang and Tiehua Chen
Synchronization of Two Chaotic Fly-Ball Systems via Sinusoidal Feedback
Control .......................................................................................................................................................................503
Meili Lin, Mihua Ma, and Jianping Cai
The Design of the BRT Signal Priority Control at the Intersection .................................................................507
Yong Luo, Yun Yao, and Hongli Gao
The Inclinometer Research for Attitude Control ................................................................................................512
Qianyun Li, Guowei Gao, Xiuqin Wu, and Zhenfeng Li
The Output Feedback Variable Structure Control for Discrete-Time Systems
with Uncertainties and Time Delay ......................................................................................................................516
Minxiu Yan, Yuanwei Jing, and Youguo He
The Research of Three Phase Voltage PWM Rectifier Based
on Variable-Structure Control ...............................................................................................................................521
Hua Li, Liu He, and Bo Wang
xii
An Improved Green Ratio Model Based on Attemperment Priority
in Oversaturated Traffic ..........................................................................................................................................563
Zeming Tao, Xiancai Jiang, and Yulong Pei
An Improved Mass-Spring Model to Simulate Draping Cloth .........................................................................568
Haiyan Yu and Zhaofeng Geng
Application of Data Fusion Theory in Coal Gas Fire Prediction System .......................................................572
Xian-Min Ma
Application of Grey-Markov Model in Order Forecasting of Distribution
Center ........................................................................................................................................................................576
Tiexin Liu and Weijian Jiang
Bi-level Programming Model and Solution Algorithm for Decision-Making
on Passenger Route Allocation of Coach Stations ..............................................................................................580
Jie Yang, Jing Guo, and Xiucheng Guo
Creation of the Finite Element Model of Complicated Structure Cylindrical
Involute Internal Spur Gear ....................................................................................................................................585
Qiang Li, Haishan Weng, and Lijun Liu
Design of Intelligent Business Process System and Process Remodeling ......................................................589
Yan Li and Shao-Ling Deng
Holonic Reconfiguration Model Based on Time Petri-Net and Its Solution
Method .......................................................................................................................................................................594
Shangxiong Sheng
Location Model and Algorithm of Public Parking Facilities ............................................................................598
Zhengwu Wang, Zhenxia Tan, and Hui Xu
Manufacturing Quantity Model for an Unreliable Production Systems ..........................................................603
Dai-jun Wei and Qiong Mou
Mathematical Modeling for the Health Care System .........................................................................................608
Jian Yang, Zhong Zhang, and Hong Feng
Modeling and Simulation of 1025t/h CFBB Combustion Chamber ................................................................613
Chang-liang Liu, Yuan-liang Ma, and Lin Chen
Modeling and Simulation of Aircraft Movement Based on Matlab/S-Function ............................................618
Chunpeng Kang, Zhong Su, and Qing Li
Modeling and Simulation of the Automated Pharmacy System .......................................................................621
Xuefeng Zhao, Chao Yun, Xiangquan Liu, and Wei Wang
Modeling Capacity of Road Network Based on Level of Service of Network ..............................................626
Binglin Li, Feng Li, and Renying Wang
Modeling of a Type of Networked Cascade Control System ...........................................................................631
Congzhi Huang, Yan Bai, and Xinli Li
Modeling of Driver Controlling at Car-Following Based on Preview Follower
Theory ........................................................................................................................................................................636
Dan Yu and Yi-hu Wu
xiii
Modeling of Urban Traffic Environmental Carrying Capacity ........................................................................642
Xiao-yan Li and Zhong-ke Shi
Nonlinear Mixed Modeling Approach – An Application to Tree Growth Data ............................................646
Lichun Jiang and Yaoxiang Li
Observer Design and Analysis for Switched Systems with Mismatching
Switching Signal ......................................................................................................................................................650
Weiming Xiang, Mingxia Che, Chenyong Xiao, and Zhengrong Xiang
Observer Design for Discrete-Time Positive Systems with Delays .................................................................655
Qinzhen Huang
Optimization of Regional Coverage Reconnaissance Satellite Constellation
by Improved NSGA-II Algorithm .........................................................................................................................660
Si-wei Cheng, Hui Zhang, Lin-cheng Shen, and Jing Chen
Qualitative Simulation for the Global Performance of Conceptual Design ....................................................665
Hailin Feng and Guanghui Li
Research of Interconnection Based on OPC for Simulation System and DCS
in Power Plants .........................................................................................................................................................670
YuXiong Luo, Huimin Zhao, Zhongli Shen, and Yucai Zhou
Research of Mathematical Model of the Ball Mill with Double Inlets
and Outlets ................................................................................................................................................................674
Gang Yuan, Wei-jia Pan, Su-zhen Li, and Qin Han
Research on Auto Compensation of High Temperature Verification Furnace
Based on Model Reference Adaptive Control .....................................................................................................680
Ping Li, Wang Hui, and Hui Wen
Research on Consistent Measurement of Uncertainty Based on Entropy .......................................................684
Zunhua Tian, Long Zhao, and Yan Jia
Research on Nonlinear Dynamic Characteristics of Semi-active Suspension
System with SMA Spring .......................................................................................................................................688
Zhi-Wen Zhu, Zhong-Biao Gou, Jia Xu, and Hong-Li Wang
Set Pair Analysis for Mass Transit Grey Model Selection ................................................................................693
Chen Wang and Jun Chen
SIMMOD Based Simulation Optimization of Flight Delay Cost
for Multi-airport System .........................................................................................................................................698
Wei Gao, Xiaohao Xu, Lin Diao, and Hongjun Ding
Simulating and Modeling of Intake Pipe Fuel Film Dynamic Characteristic
under Gasoline Engine Transient Condition ........................................................................................................703
Yi-hu Wu, Huanchun Gong, Lin-li Ou, Li Zhou, and Cui Wang
Simulation and Analysis of High-Speed Train Running Quality Affected
by Route Alignment Condition ..............................................................................................................................708
Xu-you Long, Qing-chao Wei, Jin Shi, and Ying-jie Wang
xiv
Study of Flame Propagation Model in the Combustion Process of
an Oxygen-Enriched Combustion Engine ............................................................................................................713
Shengqin Li, Qiang Guan, and Wenhui Zhang
Study on a New System for Inventory Control ...................................................................................................718
Xiaoyu Zhu and Xiaojiu Li
Study on Modeling of Mckibben Pneumatic Artificial Muscle ........................................................................721
Kejiang Zang, Yuhua Wang, Xiaoqing Fu, and Xiaoping Hu
Study on Real Options Model of Operating Capital Value of Generator
for Spinning Reserve and Risk Assessment Based on Monte Carlo Methods ...............................................726
Xin Ma
Study on Simulation for Humanoid Robot ..........................................................................................................732
Xing-qiao Deng, Jin-ge Wang, and Wei-bin Zhu
VISSIM-Based Simulation of the Left-Turn Waiting Zone at Signalized
Intersection ...............................................................................................................................................................736
Hui Chen, Ning Zhang, and Zhendong Qian
Variable Structure Control for Stabilizing Double Inverted Pendulum ..........................................................741
Jun-feng Wu, Chun-tao Liu, and Yong Deng
xv
Mining Positive and Negative Association Rules in Multi-database Based
on Minimum Interestingness ..................................................................................................................................791
Shi-ju Shang, Xiang-jun Dong, Jie Li, and Yuan-yuan Zhao
Research and Application of Data Mining for Runoff Forecasting .................................................................795
Cailin Li and Xiaohui Yuan
Research on Model and Method for Product Data Distributed Storage
in Internet/Intranet Environment ...........................................................................................................................799
C. Song, Mi. Kang, and Z. Wei
Rough Set Based Study of the Competency for Chinese Seafarers .................................................................806
Donghua Xu and Zhaolin Wu
Support Vector Clustering of Facial Expression Features .................................................................................811
Shu-ren Zhou, Xi-ming Liang, and Can Zhu
xvi
Control of Four-Wheel-Steering Vehicle Using GA Fuzzy Neural Network ................................................869
Shijing Wu, Enyong Zhu, Ming Qin, Hui Ren, and Zhipeng Lei
Design and Implementation of a Regional Economic Evaluation System Based
on Fuzzy Neural Control ........................................................................................................................................874
Shi Zheng, Wen Zheng, and Xia Jin
Design of Main Steam Temperature Cascade Control System Based on Fuzzy
Self-Tuning PID Controller ....................................................................................................................................878
Jing Zeng, Youcheng Xie, and Lei Chen
Development and Evaluation of a Fuzzy Logic Control Approach
for Pedestrian Crossing ...........................................................................................................................................882
Wanjing Ma, Wanda Ma, and Xiaoguang Yang
The Fuzzy Appraising of Mining Geological Environment ..............................................................................887
Z. H. Wang and H. J. Zhang
Fuzzy Control Systems Based on the Varying Universe and Switching Fuzzy
Rule Bases .................................................................................................................................................................890
Jin-Song Wang, Ren-zhong Zhang, and Ru-Jun Dai
Improving Adaptive Fuzzy Control for MIMO Nonlinear Time-Delay Systems .........................................894
Zhenbin Du, Tao Li, and Zifang Qu
Long Term Forecast of Annual Maximum Peak Discharge at Yangtze Three
Gorges Based on Fuzzy Method ............................................................................................................................899
G. H. Hu, S. Q. Sun, and X. Yin
Maneuvering Target Tracking Based on ANFIS and UKF ...............................................................................904
Anfu Zhu, Zhanrong Jing, Weijun Chen, Yan Yang, and Anxue Zhang
Research on VRPB under Time-Division Fuzzy Velocity ................................................................................909
Sifa Zheng, Jiandong Cao, and Xiaomin Lian
Research on Fuzzy Genetics-Based Rule Classifier in Intrusion Detection
System .......................................................................................................................................................................914
Yu-Ping Zhou, Jian-An Fang, and Dong-Mei Yu
Research on Multi-system Coupling System Dynamics Model Simulation
Combining with Fuzzy Theory ..............................................................................................................................920
Huaqi Wang, Zengchuan Dong, and Zhao Wu
Robust Fault-Tolerant Control Studies of State and Control Time-Delay
System Based on T-S Fuzzy Model ......................................................................................................................925
Xinmei Wang, Hailong Pei, and Wu Wei
Study on Fuzzy Dynamic Programming for Optimization of Reactive Power
Compensation of Power System Including Distributed Generation ................................................................931
Peng Peng, Shi-ping Su, Xi Luo, and Li-quan Fan
Study on Optimal Control and Simulation for Urban Traffic Based on Fuzzy
Logic ..........................................................................................................................................................................936
Junce Li and Huazhong Zhang
xvii
Study on Project Experts' Evaluation Based on Analytic Hierarchy Process
and Fuzzy Comprehensive Evaluation .................................................................................................................941
Tianbiao Yu, Jing Zhou, Kai Zhao, Wei Wang, and Wanshan Wang
Traffic Coordination and Control Model of Regional Boundary Based
on Fuzzy Control .....................................................................................................................................................946
Yuan Wang, Zhaosheng Yang, and Qing Guan
xviii
Application of Self-Adapting Weighted Algorithm to Nuclear Pulse
Measurement ..........................................................................................................................................................1008
Lanjun Li, Shouyi Yu, Yaogeng Tang, and Song Gao
Complex Product Collaborative Design and Simulation Based on Product
Master Model Technology ...................................................................................................................................1012
Jun Ji, Ding-hua Zhang, Shan Li, Bao-hai Wu, and Bing Chen
Congestion Management of Pool Model in China Power Market .................................................................1017
Wei Du, Yanjun Wang, and Lirui Guo
Design of an Automatic Control System for Coal Preparation Process ........................................................1021
Jing Zhang, Maojun Li, and Qing He
Detection of Welding Torch Inclination Based on Rotating Arc Sensor ......................................................1025
Jian-xiong Ye, Hui Wei, and Ming-fei Wei
Development of Control System of Electro Hydraulics Servo Leaf Spring Mill ........................................1029
Jun-ying Liu and Su-ling Li
Development of the New Comprehensive Performance Evaluation Equipment
for Enhanced Convective Heat Transfer Techniques .......................................................................................1034
Lingfang Sun, Gong Wang, Yuheng Zhang, Shanrang Yang, Zhiming Xu, and Lijun Chen
Distribution Network Reconfiguration Based on Load Forecasting ..............................................................1039
Limin Huo, Jinliang Yin, Yao Yu, and Liguo Zhang
E-Automation and the Development of Substation Automation Architecture .............................................1044
He Li and Chen Zhong
Error Correction for the Tracking Mirror ...........................................................................................................1048
Yonggang Yan, Jianfei Ouyang, Wanli Liu, Xiaoling Deng, and Xiaobo Wang
Field Measurement Studies on Shunt Coefficient of Lightning Shield Line ................................................1052
Dechao Li, Jinglu Li, and Yuhuan Zhang
Fusion Method for Uncertain Multi-sensor Information .................................................................................1056
Shuping Wan
Improved Automatic Keyphrase Extraction by Using Semantic Information .............................................1061
XiaoLing Wang, DeJun Mu, and Jun Fang
Influence Analysis of the Damper Parameters to the Vehicle Vertical Dynamic
Performance ............................................................................................................................................................1066
Rongrong Song
Integration Control Strategy Research on Dual-PWM Inverter .....................................................................1070
Zheng Zheng and Yonggang Yao
Intelligent Monitoring System of Quality Pig Breeding Environment ..........................................................1075
Congguo Ma
Intelligent Control and Application of All-Function Active Power Filter ....................................................1078
Guiying Liu, Shiping Su, and Peng Peng
Intelligent Identification on Hydraulic Parameters of Ship Lock Based
Generalized Genetic Algorithms .........................................................................................................................1082
Zhenghua Gu and Zhiyong Dong
xix
New Track Correlation Algorithm of Distributed Multi-sensor System .......................................................1087
Weihua Zhang, Hongbo Li, and Li Zhou
Novel Traveling Wave Location Algorithm for Transmission Network Based
on Information Fusion Technology .....................................................................................................................1091
Feng Deng, Xiangjun Zeng, Chao Yuan, Xiao’an Qin, and Zhihua Wu
On-Line Measurement Method of Water in Coal Based on Microwave Heating ........................................1096
Linhui Liu, Yucai Zhou, Huimin Zhao, and Zhongli Shen
Positive Real Control of Singularly Perturbed System ....................................................................................1101
Han-mei Wu, Chen-xiao Cai, and Yun Zou
Power Quality Auto-monitoring for Distributed Generation Based on Virtual
Instrument ...............................................................................................................................................................1106
Xi Luo, Shiping Su, Guiying Liu, Peng Peng, and Liquan Fan
Reliability Analysis of 100MN Multi Way Die Forging Water Press's
Computer Control System ....................................................................................................................................1111
Yucai Zhou and Jieming Li
Reliability Analysis of a Seepage Monitoring System Based on Distributed
Optical Fiber Sensing ............................................................................................................................................1116
Pingyu Zhu, Yuanbao Leng, B. S. Dhillon, and Guangfu Bin
Research of Dynamic Model of Flexible Two-Wheel Upright Self-Balance
Humanoid Robot ....................................................................................................................................................1121
Jian-wei Zhao and Xiao-gang Ruan
Robotic 3D Structured Light Scanning System Based on External Axle .....................................................1126
Huang Jin, Ma Zi, Hu Ying, and Wang Yang
Selection of Protection Scheme against Lightning Impulse Waves Based
on Chaos Theory for 500kV GIS Substation .....................................................................................................1130
Yi Li and Lixing Zhou
Semantics Driven Decision Making and Its Dynamic Semantics Presentation ...........................................1135
Bo Zhang, Yang Xiang, Bei Zhang, and Guobing Zou
Smoothing Parametric Method to Design Addendum Surface .......................................................................1140
Chi Dy, Ruijun Liu, Ping Hu, and Yuquan Song
Study on Influence Factors of Thermal Hysteresis in Paraffin Actuator ......................................................1145
Bing-ya Chen, Ying Liu, Xiao-hai Zhang, and Chang-cun Sun
Study on Intelligent Control of Three Phase Grid-Connected Inverter of Wind
Power Generation ..................................................................................................................................................1149
Zhiqing Qin, Shiping Su, Jianing Lei, and Hang Dong
Study on Non-linear Twist Vibration of Main Transmission System
for Vertical Rolling Mill .......................................................................................................................................1153
Lingqi Meng and Jianxun Wang
Study on the Application of Dynamic Balanced Scorecard in the Service
Industry ....................................................................................................................................................................1158
Tiezhu Zhang and Le Gao
xx
Temperature Control of Continued Hyperthermic Celiac Perfusion Based
on Generalized Predictive Self-Tuning Control ................................................................................................1163
Xing-hui Zhang, Hui-min Jiang, Zhao-lin Gu, and Zeng-qiang Chen
The Automatic Monitoring System of Rubber Conveyer Paste Mixing .......................................................1167
Xinchun Li
The Feature Extraction Based on Nonlinear Partial Orthogonal Analysis
with B-Spline Function for Signal of Vibrational Sensors ..............................................................................1171
Gui-Guo Liu, Bin Yue, Dao Huang, and Hai-Yan Huang
The Investigation of Data Transfer in Gasoline Engine Electronic-Controlled
Injector Test System ..............................................................................................................................................1176
Derong Tan, Li Zhang, and Zhongkai Song
The System of Fire Check and Alarm about Low Voltage Distribution Box ..............................................1180
Zeng-huan Liu, Hui-xian Fan, and Jia Guo
Voltage Transfer Characteristic Analysis of Dual-Bridge Matrix Converter ...............................................1184
Zhiyong Li, Hao Cai, Xiaoying Li, Haixia Chen, and Ping Li
xxi
Optimization of the Top Guard for Excavator Based on Neural Genetic
Algorithm ................................................................................................................................................................1240
Suli Feng, Zhigang Tian, Xuhua Zhai, Guangyu Zhang, and Yan Li
Optimization of Traffic Flow in a Road Network ............................................................................................1244
Li-xin Liu
Optimum Design and Calculation of Ackerman Steering Trapezium ...........................................................1248
Kai Yao, Youjun Wang, Zhongming Hou, and Xiaowen Zhao
Research of Transmission Optimization Design Based on Collaborative
Optimization ...........................................................................................................................................................1253
Yong-hai Wu, Qin-man Fan, Chang-long Lu, and Cheng Xu
The Optimization of Plastic Injection Molding Process Based on Support
Vector Machine and Genetic Algorithm ............................................................................................................1258
Mei Yi and Shan Zhi
The Optimization Research on the Artery Control System of Jianshe
Boulevard in Wuhan ..............................................................................................................................................1262
Yingwei Cheng, Xiaoming He, and Ming Yang
The Researches of Quadratic System Decoupling by Optimization Method ...............................................1267
Jihong Shen and Shujuan Wang
Wind Farms Reactive Power Optimization Using Genetic/Tabu Hybrid
Algorithm ................................................................................................................................................................1272
Ling Li, XiangJun Zeng, and Ping Zhang
An Optimization Method of Dynamic Lane Assignment at Signalized
Intersection .............................................................................................................................................................1277
Zhangjian Zhong, Haode Liu, Wanjing Ma, and Kejun Long
xxii
Preface
The International Conference on Intelligent Computation Technology and Automation (ICICTA 2008) aims to
provide a high-level international forum for scientists, engineers, and educators to present the state of the art of
intelligent computation and automation research and applications in diverse fields. The conference will feature
plenary speeches given by renowned scholars and regular sessions with broad coverage. In order to share the best
practices and innovative ideas among the fields of traffic information and logistic engineering, ICICTA organizes the
international symposium on traffic information and logistic engineering. It is also expected that a synergy can be
established between the academia and the industry, which will pave the way for further collaboration.
ICICTA 2008 was sponsored by Changsha University of Science and Technology, Central South University, and
Hunan University of Science and Technology, and was held in Changhsa, China, 20-22 October 2008. It will
become an annual forum dedicated to the emerging and challenging topics in intelligence computation and
automation fields.
ICICTA 2008 received 1292 submissions from 14 countries and regions. All papers went through a rigorous
peer review procedure and each paper received at least two review reports. Based on the review reports, the Program
Committee finally selected 495 high-quality papers for presentation at the ICICTA 2008 conference, of which 483
papers have been included in the proceedings published by IEEE Computer Society. The other 12 papers will be
included in an international journal.
On behalf of the organizing committee, we thank Changsha University of Science and Technology, Central
South University, and Hunan University of Science and Technology for their sponsorship and logistics support. We
gratefully acknowledge technical support from IEEE Computer Society. We also thank the members of the
organizing committee and the Program Committee. We wish to express our heartfelt appreciation to the keynote
speakers, reviewers, and students for their help. Last but not least, we thank all the authors and participants for their
great contributions that have made this conference possible and all the hard work worthwhile.
We look forward to seeing all of you next year at the ICICTA 2009 conference.
xxiii
Organizing Committee
Publication Chairs
Zhixiang Hou, Changsha University of Science and Technology, China
Weiming Zhou, University of Metz, France
Finance Chairs
Zhixiang Hou, Changsha University of Science and Technology, China
Yihu Wu, Changsha University of Science and Technology, China
Publicity Chair
P. Zhang, Victoria University, Australian
xxiv
Program Committee
Bin Xie, Carnegie Mellon University, USA
Helen Shang, Laurentian University, Canada
Hua Deng, Central South University, China
Jianxun Liu, Hunan University of Science and Technology, China
Yucel Saygin, Sabanci University, Turkey
Zhixiong Huang, Central South University, China
Xiaojiao Tong, Changsha University of Science and Technology, China
Jonas Larsson, Linköping University, Sweden
Ming Fu, Changsha University of Science and Technology, China
Jiafu Jiang, Changsha University of Science and Technology, China
Ben K. M. Sim, Hong Kong Baptist University, Hong Kong
Xiaoxiong Weng, South China University of Technology, China
Sanjay Chawla, University of Sydney, Australia
Xichun Liu, Hunan Normal University, China
Jianhua Rong, Changsha University of Science and Technology, China
Sharma Chakravarthy, University of Texas at Arlington, USA
J. H. Rong, Changsha University of Science and Technology, China
W. D. Xie, Hong Kong City University, Hong Kong
F. M. Zhou, Zhejiang University, China
P. Zhang, Victoria University, Australian
Shanghong He, Changsha University of Science and Technology, China
Zhongxiang Huang, Changsha University of Science and Technology, China
Yuefen Li, Queensland University of Technology, Australia
Richeng Luo, Hunan Agriculture University, China
Yong Yang, Guangzhou University, China
Hua Guang, Hong Kong City University, Hong Kong
Hongmei He, University of Bristol, UK
Changyue Sun, Hunan University of Science and Technology, China
Weiming Zhou, University of Metz, France
Nanjun Li, Nanhua University, China
Yanli Deng, Wuhan University of Technology, China
Minghai Xu, Nanjin University of Post and Communications, China
Ukop V., Bradley University, USA
Zhi Wang., Hunan University, China
Yishan Chen, Chang An University, China
Xianchen Zhou, Hunan University of Commerce, China
xxv
Session 1
Intelligent Computing
and Application
ICICTA 2008
2008 International Conference on Intelligent Computation Technology and Automation
4
(7) can be written as simple form: that s = y is feasible states s is satisfied with (2), ck is
tij ( xij ) − (π j , rs − π i , rs ) ≥ 0 (8) the cost of investment on link k ∈ A2 .
wij , rs [tij ( xij ) − (π j , rs − π i , rs )] = 0 (9) Theorem 1.The corresponding strategy profile of the
wij , rs ≥ 0 (10) optimal solution of problem (1)-(6) is a Pareto-optimal
Nash equilibrium point of the non-cooperative game G
∀(i, j ) ∈ A, (r , s ) ∈ K describe above.
from the inequality (8) ,(10)and equation (9), we can Proof: Let s* denote the corresponding strategy profile
draw the following conclusions:
of the optimal solution y * . ∀y is feasible, we have
if wij , rs > 0 ,then tij ( xij ) = (π j , rs − π i , rs ) ;
F ( y ) ≥ F ( y* ) , s = y
if wij , rs = 0 ,then tij ( xij ) ≥ (π j , rs − π i , rs ) .
and U = {u ( s ), k ∈ I } = 1 = 1 ,then ∀s is
Where, π j , rs can be considered as the ideal travel k F (s) F ( y)
cost from the origin node r to the node j when the feasible,
road network is a equilibrium state, i.e. π j , rs is the price uk ( s ) ≤ uk ( s* ), ∀k ∈ I
and ∀s is infeasible, we also have
of node j . π j , rs − π i , rs can be thought as the ideal travel m
5
link is added, the change in equilibrium flows might The conclusion of Theorem 2 is held.
result in a higher cost, implying that users were better At last, we can draw the conclusion that EGA for
off without that link. We define y l > y m as follows: if DNDP converges to the global optimal solution with
probability 1 by literature [9].
the component i of y l takes 1 the component i of y m
takes 1 too, i.e., network expansion strategy 4. Steps of the solution procedure
y l includes y m . Now if we neglect Braess paradox in
this network, it means that if y l > y m ,then Step1: Initialize G , s (0) ∈ R m , t := 0 , T is the largest
number of iterations;
∑
( i , j )∈ A
xij* .tij ( xij* , yij l ) < ∑
( i , j )∈ A
xij* .tij ( xij* , yij m ) . Step2: If s ( t ) is feasible, we obtain the optimal
Theorem 2. The strategy profile of all agents will reach solution x* = ( , xij* , ) of the lower-level problem by
Nash equilibrium point in two-round.
Proof: Firstly, we verify that the strategy profile Frank-Wolfe algorithm, U = ∑
( i , j )∈ A
xij* .tij ( xij* , s (t ) ) ; if s ( t )
obtained after the first-round is feasible without fail.
m
(1) Suppose that the strategy profile s obtained after is infeasible , U = B − ∑ ck sk(t ) ;
the first-round is infeasible, and then there is at k =1
least one agent whose strategy takes value 1, Step3: For each s , if rand (0,1) < pd then
(t )
k
because the 0 strategy profile is feasible. Suppose
sk is the last one taking value 1 in the BRC sk( t )′ = 1 − sk( t ) , else sk( t )′ = sk( t ) ;
sequence and its utility is uk , then the agent k can Step4: for each sk( t )′ do
increase its utility by taking value 0, and its utility
s ( t )′′ = ( Bk ( s−(tk)′ ), sk( t )′ ) = {sk( t )′* ∈ Sk : uk ( sk( t )′* , s−( tk)′ ) ≥
is uk ′ now, but
uk ( sk(t )′ , s−(tk)′ ), ∀sk(t )′ ∈ S k , s−( tk)′ = Π si( t )′ , i ≠ k}
uk ′ − uk = ck > 0 , Step5:If t >T ,stop; else t := t + 1 ,if
So value 1 is not the BRC of agent k , hence there
U ( s ) > U ( s ′′ )
(t ) (t )
,then s ( t +1)
=s (t )
, otherwise
exits a contradiction. The first conclusion is held.
Secondly, we verify that the strategy profile will s ( t +1) = s ( t )′′ , return to Step2
reach Nash equilibrium point after the second-round.
(2) The utility of the infeasible solution is always less 5. Numerical example
than that of feasible solution and the start strategy
profile in the second-round is feasible, so all the In this section, to illustrate the applications of the
strategy profile experiencing in the second-round model and algorithm proposed in this paper, we present
are feasible. Suppose that the strategy profile a numerical example for optimal network design
obtained after the second-round is not an problem.
equilibrium state, and then there is at least one 1 3 5
35 13
9
12
14
7
36
10
8
11.8 11
23
24
22
28
27
26
37
25
13
38
F ( s ′) > F ( s) ⇒ uk ′ < uk
Fig. 2. The test network. Solid lines indicate
hence in contradiction with uk ′ > uk . existing links, and dashed lines potential new links.
Ⅱ.if sk = 0 , sk ′ = 1 , the new strategy profile is Note that the data here are assumed for
feasible, which is contradiction with that value simplification of computation. In practice, the data
0 is the BRC of agent k after the second-round. should be identified observations of the actual
6
network design projects. The discrete network is shown Table 1: The parameters of new links
in Fig. 2 with four OD pairs (1,12), (4,9), (9,4) and Index 17 35 36 37 38
(12,1) and the OD demands are 5,8,6,10. There are a (i , j ) (6,7) (1,6) (4,7) (7,9) (9,11)
total of four involve construction of new links and one
aij (minute) 9 19 19 30 25
to be improved, these links are numbered in Fig 2 by
dashed lines. The travel cost function on link (6,7) after cij (yuan) 4000 7000 6000 9000 10000
adding lanes is: t67 = 9 + 0.01x67 4 ,and the parameters of
the new links are given in Table 1.
Table 2: Movement process of the, CPU time and results (1 stands for the new link should be built and 0
should not).
Budget (thousand yuan) 10 15 20 25 30 35 40
HEA y* (00010) (01010) (11010) (01011) (11011) (11011) (11111)
y* (00010) (01010) (11010) (01011) (11011) (11011) (11111)
GA CPU(second) 144.9370 203.2660 162.4530 155.9690 124.1410 58.4690 31.0160
y* (00010) (01010) (11010) (01011) (11011) (11011) (11111)
EGA CPU(second) 133.7660 122.0310 84.9690 63.7030 18.5780 15.1870 12.1560
Acknowledge
6. Conclusion National natural science fund subsidization project
(60574071)
In order to test the convergence of the algorithm,
we use different algorithms, hidden enumerative 7. References
algorithm (HEA), genetic algorithm (GA) and
evolutionary game algorithm(EGA), to solve the [1]A bdulaal M, Le Blanc L J. Continuous equilibrium
problem , the results are same, which can partly network design models[J ]. Transportation Research(B),
illustrate the convergence of the EGA. The results 1979, 13(1):19- 32.
obtained by HEA are exact, therefore, we can believe [2]Ben-ayed O , et al. A General bi-level programming
that the solution may be close to the global solution of formulation of the network design problem[J].
Transportation Research(B), 1988, 22(3): 311- 318.
the problem.
[3]Chen M Y, Alfa A S. A Network design algorithm using a
Table 2 gives the results and the process of the stochastic incremental traffic assignment approach [J ].
movement with different budgets by three algorithms. Transportation Science, 1991, 25 (3) :215- 224.
From Table 2, Firstly, we find the computing time [4]Gao Z Y and Sun H J. Solution algorithm for the bi-
of GA is longer than that of EGA. This is because in level discrete network design problem[J].
EGA we only need to compute the value of objective Transportation Research(B), 2005, 39(6): 479-495.
function and compare the utility of each strategy profile, [5]Magnanti T L and Wong R T. Network Design and
while in GA select operator, cross operator and Transportation Planning: Models and Algorithms[J ].
mutation operator is time-consuming. Secondly, the Transportation Science, 1984, 18(1): 1- 55.
CPU time decreases when B increases. Because the [6]S.-H. Chen and C.-C. Ni. Co-evolutionary instability in
number of feasible solutions increase with B games: an analysis based on genetic algorithms[C]. In the
increasing, the probability of achieving the optimal Proceedings of 1997 IEEE International Conference on
Evolutionary Computation:703-708.
solution is higher. For example, when B=40, we get
[7]Steenbrink, A. Transport network optimization in the
a y by random, y is a feasible solution, and the time Dutch integral transportation study. Transportation
of achieving the optimal solution is shorter. When Research B,1974,8,:11–27.
B=10, the probability of producing non-feasible [8]YANG H,BELL M G H. Models and algorithms for
solution in the evolutionary process is higher, so the road network design: a review and some new
time of achieving the optimal solution is longer. development[J]. Transport Review,
1998,18(3):257-278.
7
2008 International Conference on Intelligent Computation Technology and Automation
Qingliang Wang 1, Zhouxing Fu1, Xiaojian Wang2, Yuanbin Hou1, Ning Li3, Qing Liu1
1
School of Electrical and Control Engineering, Xi’an University of Science and Technology,
Xi’an 710054, China
2
Chang’an University, Xi’an 710064, China
3
Huangling Gangue Thermal Power Co. Ltd, Shaanxi Huangling 727307, China
wangxjql@163.com
9
individual. A binary character valued 1 denotes that it Where f i is the fitness value of a certain individual.
can meet the requirement of a certain constraint, while Once pi > (0.6 ~ 0.7) , the individual is duplicated.
valued 0 denotes that it cannot meet the requirement of
a certain constraint. Adopting the constraint coding Cross and mutation operation is performed when
technique, the length of individual in sub-population fitness function value tends to be steady in the iterative
I is 5 bits (such as 11011) and the length of individual max-step number. When pi is lower 0.005 , mutation
in sub-population T is 4 bits (such as 1110). is taken place. And the cross probability is usually set
to the scale of (0.25 ~ 0.1) .
(i-1).b (i-1).m i.m sen Δi
10
When any constraint can not be met, 0.2s will be added
as a penalty. The time interval is set as 0.3s. 4.5
4
1 2 3 6 7 14 13
3.5
4 5 8 9 10 11 12
3
Table 2 and Table 3 show the setting results using research is to determine the value of the weight
the proposed new method and traditional method coefficients ( α , β and δ ) in the model.
respectively. From the results of Table 1 and Table 2, it
can be found that the integrated operation time of
7. Acknowledgment
remove fault parts is reduced 39 percent compared with
that using the traditional method.
The authors gratefully acknowledge the financial
support of Cultivation Science & Technology
6. Conclusions Foundation of Xi’an University of Science and
technology (NO. 200625).
The optimal model for the TDOP system is
established. A new CGA method is proposed in order
8. References
to obtain the model solutions. With the good
parallelization and immune to the local optimal, the
[1] ALBERTO J.U., RAMON N., and LUIS G.P.J., “Optimal
CGA can simplify the solving process and meet the coordination of directional overcurrent relays in
requirement of the discontinuous step-type curve of interconnected power systems”, IEEE Trans on Power
TDOP. According to the control variables in the model, Delivery, 1988, 3(3), PP. 903-911.
this method divides the initial population into the two [2] LUIS G.P.J., and ALBERTO J.U., “Optimal coordination
sub-populations and the evolving process is performed of directional overcurrent relays considering definite time
based on the co-ordination of genetic operator and backup relaying”, IEEE Trans on Power Delivery, 1999, 14
cooperative operator. With the CGA, the setting model (4), PP. 1276-1284.
proposed overcomes the flaw of the traditional method [3] LIU Xuejun, Principle of Relay Protection, China Electric
Power Press, Beijing, 2006.
and obtains the optimal parameter configuration
[4] WANG Xiaoping, and CAO Liming, Theory, Application
scheme. Security and reliability can be effectively and Software of GA, Xi’an Jiaotong University Press, xi’an,
guaranteed due to the integrated operation time 2002.
decreasing in power supply system. The further
11
2008 International Conference on Intelligent Computation Technology and Automation
13
The convergence process of best fitness
-1.01
Fitness
shown as follows: -1.025
⎛ x4 ⎞
f ( x, y ) = ⎜ 4 − 2.1x 2 + ⎟ x 2 + xy + ( 4 y 2 − 4 ) y 2
⎝ 3⎠ -1.03
s.t. − 3 ≤ x ≤ 3, −2 ≤ y ≤ 2 (3) 0 10 20 30 40 50 60
global minimum points in this function. The two global Figure 2 Convergence process of the fitness of the best
minimum points are (-0.0898, 0.7126) and (0.0898, - individual of each generation
0.7126), the minimum value is -1.031628. The aim is
to estimate the ability of the algorithm of local
research.
CGA and SGA are respectively adopted to
optimize this function. The selection operator of SGA
is Roulette selection, crossover operator is two points
crossover, and the mutation operator is adaptive
operator. The initial population size is 100, crossover
fraction is 0.8., and the termination condition is that the
difference of fitness between two generations is less
than 10-3. The CGA takes the same population as SGA,
and the crossover fraction is 0.7, the compulsive Figure 3 Convergence process of mean fitness of each
fraction is 0.1, that’s to say, 10 percent of the children generation
are generated by the compulsive operator.
The followed figure shows the convergence
process of SGA and CGA during one optimization.
Figure 3 is the convergence process of the fitness of
the best individual, and figure 4 is the convergence
process of the mean fitness of one generation.
Figure 2 shows that the CGA can find the best
individual more quickly than the SGA. After the tenth
generations, CGA began to research nearby the
optimum solution. Figure 3 shows that the mean fitness
of the CGA is also better than SGA, it also improves
very quickly.
GA is a kind of random search method, usually, Figure 4 Fitness of the best individual in each repeat
one computation can hardly prove the performance of
an algorithm. The optimization was repeated 100 times
then to check the GA performance. And the followed
figures show the results of the 100 repeats. Figure 4
shows the fitness of the best individuals found by
different algorithm in different repeat. Figure 5 shows
the mean fitness of the last generation of different
repeat.
14
sometimes converges to a local optimum solution. fitness of the best individuals found by different
Also, figure 5 shows that the mean fitness of the last algorithm in different repeat.
generation of CGA is usually better than those of SGA. 3
Convergence Process of Best Fitness
CGA
That’s to say, CGA can improve the fitness of the 2.5
SGA
Best Fitness
100 repeat. It shows that the mean convergence 1.5
52 12 0 46 0 27 25
51 45 0 45 0 51 20
Mean Fitness
50 31 0 44 0 12 15
49 2 1 43 0 3 10
CGA
of CGA when there are many local optimum points. 12
SGA
as follows:
f ( x) = 20 + x12 + x22 −10( cos2π x1 + cos2π x2 )
8
M ean Fitness
2
There are many local optimum points in this
0
function, and the only global optimum function is got 0 10 20 30 40 50
Repeat time
60 70 80 90 100
at point [0, 0], correspond function value is 0. Figure 8 Mean fitness of the last generation in each
CGA and SGA were used to optimize this repeat
function respectively, and the parameters of CGA/SGA Figure 8 shows that the mean fitness of CGA is
were the same as experimental example 1. The better than the SGA. Most of the time, the mean fitness
following figure shows the convergence process of of the last generation of SGA is higher than the CGA.
SGA and CGA. Figure 6 illustrates the convergence However, figure 9 shows that sometimes the CGA will
process of mean fitness of the individual of each converge to a local optimum point. Although SGA will
generation. Figure 6 shows that the CGA converges also converge to a local optimum point, it does not
more slowly than the SGA at the beginning, but it happen frequently. Fortunately, the global optimum
converges faster after 20th generation. And it points found by CGA is better than those found by
terminates at almost the same generation as SGA. SGA. And the mean fitness of the best individuals
Figure 7 shows that the mean fitness of CGA found by CGA is better than SGA.
converges after the 25th generation, that is to say, the
CGA is possibly trapped in a local optimum solution.
However, the group of CGA is still better than the
group of SGA.
The optimization also was repeated 100 times
then. And the followed figures show the results of the
100 repeats. Figure 8 shows the mean fitness of the last
generation of different repeat. Figure 9 shows the
15
7
x 10-3 The fitness of the best individuals of 100 repeat If the fraction of mutation is large enough, the
CGA best fitness
SGA best fitness
CGA will probably not be trapped in local optimum
6
solutions. Further research on this facet will be carried
5
out.
4
fitness
3 6 References
2
[1] Wu JiaYing, Zheng JinHu, “Research and Developmental
1
Trend for Genetic Algorithms”, Journal of Hengyang
0 Normal University (Natural Science), March 2003. Vol. 24,
0 10 20 30 40 50 60 70 80 90 100
Repeat Time pp. 30-33
Figure 9 Fitness of the best individual in each repeat. [2] J. Holland. Adaptation in Natural and Artificial System.
Table 2 shows the convergence generation of the MIT Press, Massachusetts, 1992.
100 repeat. The table shows that the mean generations [3] T. Zhang, H.W. Wang and Z.C. Wang, “Mutative Scale
chaotic optimization algorithm and its application”, Control
of CGA and SGA are similar, but CGA still converge a
and Decision, March 1999 Vol. 14, pp. 285-288,
little faster than SGA. [4] Takatoshi Yamagishi, Takehiko Tomikawa, “A Study of
Table 2 Termination generation frequency of CGA and Line-Fitting Method by Using Genetic Algorithm”, Journal
SGA of Robotics and Mechanics, July 1995 Vol.1 pp. 86-90
Gen* SGA CGA Gen* SGA CGA [5] Storn R. “Differential Evolution Design of an IIR-filter”,
60 2 0 54 1 2 Proc IEEE Conf Evolutionary Computation. Nagoya, Japan:
59 1 0 53 0 32 IEEE, 1996. pp. 268-273.
[6] Semya Elaouda, Taicir Loukila and Jacques Teghemb,
58 21 0 52 0 53
“The Pareto Fitness Genetic Algorithm: Test Function
57 37 0 51 0 10 Study”, European Journal of Operational Research, Nov
56 36 0 50 0 3 2007, No. 177, Vol. 3, pp. 1703-1719
55 2 0 mean 56.9 52.2 [7] B. Manderick, M. de Weger and P. Spiessens. “The
*: The termination generation of one repeat Genetic Algorithm and the Structure of the Fitness
Landscape”, 4th International Conf. on Genetic Algorithms,
Aug 1991, pp. 143-150.
5. Conclusion [8] Raymond R. Hill, “A Monte Carlo Study of Genetic
Algorithm Initial Population Generation Methods”,
Compulsive operator was introduced and its Proceedings of the 1999 Winter Simulation Conference, P.
biological proof was discussed. Based on this, A. Farrington, 1999: pp. 543-547
Compulsive Genetic Algorithm was proposed by [9] Miki Mitsunori, Hiroyasu Tomoyuki and Nakamura
introducing a compulsive operator in Simple Genetic Yasunori, “A Study on Parallel Distributed Genetic
Algorithms”, Transactions of the Japan Society of
Algorithm. Discussion shows that compulsive operator
Mechanical Engineers, May 2000, No.66 Vol.645, pp.: 972-
can accelerate the convergence of GA, and local 977
research ability may be improved by the compulsive [10] Tao Tong, The Evolution of the Universe, BeiJing:
operator. The experimental results show that: Economic Daily Press, 2002.
1. CGA converges faster than the SGA. No [11] Floudas C A, Pardalos P M. A Collection of Test
matter it converges to a local optimum solution or a Problems for Constrained Global Optimization Algorithm.
global optimum solution, CGA always converges LNCS, Springer Verlag, 1987, Vol. 455, pp. 92-99
faster. [12] Hock W, Schittkowski K. Test Examples for Nonlinear
2. CGA converges much faster in a problem Programming Codes. Lecture Notes in Economics and
Mathematical Systems, Spring Verlag, 1981, Vol. 187, pp.
with a few optimum solutions, and when there is lots
53-60
of optimum solutions, CGA may some times be
trapped into local optimum solutions.
16
2008 International Conference on Intelligent Computation Technology and Automation
∑V
economic entities in power market. They are certainly
unwilling to supply ancillary services without downi
X i ≥ VAGCdwonneed (4)
i =1
compensation. Therefore, it is necessary to change the
objective of power grid AGC ancillary services Qi max ≥ Qi ≥ Qi min (5)
correspondingly. The current objective of the AGC unit
selection problem, which is a nonlinear mixed integer Where: Ci is average electricity price of AGC unit i
programming problem, is to select the AGC unit so as to corresponding to 48 basis points on that day
meet the demand of frequency modulation at the lowest (Yuan/MWh); Qi is regulation capacity of AGC unit
AGC ancillary service cost possible while satisfying all i(MW); Xi represents integer 0 or 1; when AGC unit i is
unit and system constraints[1-2]. assigned to regulate system frequency and (or) power of
At present, there are two relevant prices to be paid to contact line,Xi=0; otherwise Xi=1;Vi is regulation speed
generators. One is the price paid for service capacity and of AGC unit i (MW/Min); Qimax and Qimin are,
the other is the price paid for energy that is dispatched respectively, the output of the minimum and maximum
under defined condition [3-4]. A framework of AGC unit regulation capacity of AGC unit i (MW); QAGCneed is the
selection on the generation-sided power market was total regulation capacity (MW) of AGC system; VAGCupneed
introduced, and established integer linear programming and VAGCdownneed are , respectively ,demands of the
P( X ) = ∑ [max{0, − g ( X )}] i
α
(7)
equation (10).
i =1
18
Psize are calculated using equation (11), (12) and (13),
Where: Psize is particle number, ∑ Pibest ( k ) is the all respectively.
i =1 Step7) If the terminate criterion are satisfied, printing
particles’ fitness of current iteration. The parameter shows optimal solution. Otherwise update iteration counter and
its concentration-dispersion properties of the current go to Step2.
particle swarm.
The ω decreased with increasing evolution degree, 4. Example
and raised with increasing polymerization degree.
Therefore, dynamic ω can be expressed as shown in (13). This paper takes example for a test system consisted of
ω = f ( e, a ) = ω0 − 0.5 ∗ e + 0.1 ∗ a (13) 15 AGC units of generation. In this case study, the
regulation capacity demand expected was SAGCmax =
Where, ω0 is the initial value of inertia weight, which 133MW, regulation speed demand expected was VAGCmax
generally equal 0.9. The performance of PSO algorithm = 33MW/min; and other parameters as shown in Table 1.
can be improved by dynamically changing ω , in These data are also available in [3] and [6]. The
accordance with e and a value running in the process improving hybrid PSO algorithm is simulated by C++
[10] program language (Visual C++ 6.0). It was successfully
.
applied to resolve the problem of example data in Table1.
3.3. Binary particle swarm optimization In this case study, the population size D was 20 and the
Standard PSO is used in real continuous space; terminate criterion tmax was 500 generations for the
however, there are a lot of practical problems in the modified hybrid PSO approach (using ϕ1 = ϕ 2 =2.05).
combinational optimization. For binary discrete search
The ω0 is 0.9 during a run in modified hybrid PSO.
space, Kennedy and Eberhart [11] have adapted the PSO
to search in binary spaces. It can be formulated as follows: The results obtained of 50 independent runs shows
that the modified PSO succeeded in finding the best
S (Vid ) = 1/(1 + exp(-Vid )) (14)
solution for the tested system.
⎧⎪ xid k = 1 if ( rand () < S (Vid ) ) Table 1. AGC unit regulation indices and their bids
⎨ k (15)
⎪⎩ x id = 0 otherwise Regulation
Regulation Regulation
Price
Unit Capacity Capacity
Where: equation (14) is a sigmoid transformation of Speed (Yuan/
name Lower- Upper bound
(MW/min) Mw·h)
the velocity component, which can compress velocities in bound (Mw) (Mw)
a range [0, 1], and force the component values of the 1 5 17 34 126.7
2 5 17 34 126.7
positions of particles to be 0 or 1. The equation for 3 5 17 34 126.7
updating positions (9) is then replaced by (15). 4 6 17 34 126.7
5 5 17 34 126.7
3.4. The procedure of hybrid PSO 6 5 17 34 126.7
7 4 17 34 196.87
Since the control variables of AGC unit selection not 8 4 27.5 55 196.945
only have continuous variables Qi, but also discrete 9 4 27.5 55 278.05
variables Xi (0-1). The problem can be solved by using 10 2 27.5 55 293.995
hybrid PSO which combined standard PSO and Binary 11 4 27.5 55 264.82
12 3 28 56 210
PSO algorithm. The procedure of hybrid PSO technique 13 2 28 56 127.09
can be expressed as follows: 14 3 18 36 127.04
Step1) Generate randomly n particles, initialize their 15 3 18 36 127.04
positions and velocities within their specified range.
Table 2, 3 compares the results obtained in this paper
Step2) Evaluate fitness of each particle (pbesti) using
with other studies reported. The results of genetic
the objective function and store the particle with the best
algorithm and integer programming are 16870.2 and
fitness (gbest) value.
30526.8 Yuan in the literature [3] respectively, while the
Step3) Update the velocities using equation (8).
minimum cost obtained is 16859.30 Yuan using hybrid
Step4) Update positions of particles using equation (9)
PSO in each run. It is indicated that the result reported
and (15), respectively.
here using hybrid PSO is comparatively lower than recent
Step5) Check the limits of velocities (8) and positions
studies presented in the literature. Therefore, it showed
(9). If the limits are violated, then they are replaced by the
that the improved hybrid PSO algorithm can save
respective limits.
substantial AGC ancillary service costs compared with
Step6) Particle evolution degree e , particle
other methods such as integer programming, PSO and
polymerization degree a and dynamic inertia weight ω
genetic algorithm.
19
Table 2. AGC service selection results
Acknowledgement
The paper is supported by Natural Science Fund
Projects in Fujian province under Grant No. 2007J0017
and Education Department Science Fund Projects in
Fujian province under Grant No. JB06045.
20
2008 International Conference on Intelligent Computation Technology and Automation
decision and the “economic dispatch” decision. The 1) Power balance constraint
N
∑P u
“unit commitment” decision involves the
determination of the generating units to be running i
t t
i = PDt (2)
during each hour of the planning horizon, considering i =1
∑u P
and the constraints on the start-up and shut-down of
units. The “economic dispatch” decision involves the
t
i i ,max ≥PDt + R t (3)
i =1
allocation of the system demand and spinning reserve
capacity among the operating units during each 3) Generation limit constraint
specific hour of operation. uit Pi ,min ≤ Pi t ≤ uit Pi ,max (4)
Over the past few years, in order to solve this 4) Minimum up-time and down-time constraint
problem, many salient methods have been developed
such as genetic algorithm [2], evolutionary
and uit =0when off, while uit =1when on; PDt load
demand at the t th hour; pit is the generation output of
the i th unit at the t th hour; Rt is the spinning reserve
(b) global optimum solution searching process
at the t th hour; Pi ,min is the minimum generation limit Fig. 1 particles searching process
In a physical n-dimensional search space, the position
of the i th unit; Pi ,max is the maximum generation
and velocity of individual i are represented as the
limit of the i th unit; Ti on is the minimum up-time of vectors X i = ( xi1 , xi 2 ...xin ) , Vi = (vi1 , vi 2 ...vin ) in
off
the i th unit; Ti is the minimum down-time of the the PSO algorithm. Set pi , d and pg , d be the best
i th unit; tij is the duration during which the i th unit position of individual i and its global best position so
far, respectively. Using the information, the updated
is continuously on; - tij is the duration during which the
velocity and position of individual i is modified under
i th unit is continuously off. Cit is the start-up cost of the following equation in the PSO algorithm.
vd +1 = wvd + c1r ( pi ,d − xd ) + c2 r ( pd − xd ) (8)
the i th unit; Sh is the hot start-up cost of the i th unit;
vd +1 = vmax if vd +1 > vmax (9)
Sc is the cold start-up cost of the i th unit; H ioff is
the duration during which the i th unit cold start-up. vd +1 = −vmax if vd +1 < −vmax (10)
xd +1 = xd + vd +1 (11)
3. The Search Process of the Improved
Where vd is the velocity at iteration d ; ω is the
Particle Swarm Optimization
weight parameter; c1 , c 2 is the weight factors; r is a
The figure 1 shows the process of searching the randomly generated value between 0 and 1; pi , d is the
global optimum solution. Figure 1(a) shows that the
local optimum solutions were searched by multi- pd is the
best position of individual i until iteration d ;
swarms, and figure 1(b) shows that the global optimum
solution was searched through all local optimum best position of the local optimum solution pb , d or
solution.
22
'
global optimum solution pg , d ; x d is the position at be stopped from the t th hour to the t th hour when the
system cannot satisfy the power balance constraint and
iteration d ; vmax is the Maximum of velocity.
spinning reserve constraint if the generator j stopped
4. Improved Particle Swarm Algorithm for at the t th hour, then set K J 2 (t '' , i ) = 0 ,
Unit Commitment Problem t '' ∈ [t , t ' ] during the t ' th ( t ' ∈ [t + 1, t + Ti off ] ) hour,
(3) Select one or several generators from the all
4.1 New strategy for producing individuals
generators in the array of K J (t , i ) ≠0 (i=1, 2,…,N),
Define 3 arrays with T×N change the state of them, if the scheme satisfied the
N
(1) Array K D (t , i ) = X ti , duration during which the
i th unit is continuously on or duration during which
spinning reserve constrain and ∑U
i =1
P
it i min ≤ Dt , then
the i th unit is continuously off at the t th hour. we obtained a feasible solution K R (t , i ) (i=1,2,…,N)
(2) Array K J is made up of the sign ‘1’, ‘0’ or ‘-1’. at the t th hour, if not returned to the step (3).
The sign ‘1’ represent the i th unit could be started at (4) If t=T, then turn to the step (5), else
the t th hour; the sign ‘-1’ represent the i th unit could determine K D (t + 1, i ) from the array of K R (t , i ) ,
be stopped at the t th hour; the sign‘0’ represent the returned to the step (2).
i th unit cannot be started or stopped at the t th hour. ⎧ K D (t , i ) + 1, ( K R (t , i ) = 1, K D (t , i ) > 0)
(3) Feasible solutions are set to the array of K R , that ⎪1, ( K (t , i ) = 1, K (t , i ) < 0)
⎪ R D
K D (t + 1, i ) = ⎨
K R (t , i ) = uit , which represents the state of the
⎪ −1, ( K R (t , i ) = 0, K D (t , i ) > 0)
is (13)
i th unit at the t th hour. The number of 1 represents ⎪ K (t , i ) − 1, ( K (t , i ) = 0, K (t , i ) < 0)
⎩ D R D
generator is on and number of 0 represents off. Fig.2
shows the process producing feasible solution. (5) Obtain a feasible solution of K R which satisfy
K D (t , i ) → K J (t , i ) → K R (t , i) minimum up-time and down-time constraint and
spinning reserve constraint.
t = t +1
Fig. 2 process producing feasible solution
The process of finding feasible solution which
4.2. Constraints satisfaction and fitness function
considered the minimum up-time and down-time
constraint and spinning reserve constraint as follow: Minimum up-time and down-time constraint and
spinning reserve constraint and generation limit
(1)The array of K D (1, i ) ( i =1, 2, … N) was constrain were considered during the process of
determined by the operation state of each generator generating the feasible particle. The power balance
X i1 , and sets the number of 1 to the array of K J 2 ; constraint and Start-up cost constraint were used the
penalty functions to solve. Fitness function was made
(2) The array of K J 1 (t , i ) was determined by the up with the objective function and constrains solved by
array of K D (t , i ) ( i =1, 2,…,N) the penalty functions.
2
⎧1 K D (t , i ) ≤ −Ti off A(uit , Pi t ) = F (uit , Pi t ) + ∑ ck Rk (uit , Pi t ) (14)
⎪⎪ k =1
K J 1 (t , i ) = ⎨−1 K D (t , i ) ≥ Ti on (12) Where F (uit , Pi t ) is the objective function;
⎪ t t
⎪⎩0 − Ti off < K D (t , i ) < Ti on Rk (u , Pi ) (k=1,2) is penalty function for the power
i
balance constraint and Start-up cost constraint
Ωcoff is used to represent the set which could be
respectively; ck (k=1、2)is penalty factor [9].
stopped at the t th hour, where
Ωcoff = {i / K J 1 (t , i ) = −1} , whether the generator 4.3. Steps of the PSO Algorithm for UC
j ( j ∈ Ω coff ) could be stopped or not is determined
Step 1 set the parameters of the PSO, and set current
by the array K J 1 and K J 2 . The generator j cannot iteration i =1.
23
Step 2 initialize individual through the new strategy particle swarm to parallel arithmetic, escaped the local
presented above. optimum solution. The equality and inequality
t
Step 3 compute the fitness value A(ui , Pi ) of each
t constraints treatment methods have always provided
the solutions satisfying the constraints without
individual. disturbing the optimum process of the PSO. The
t t
Step 4 compare the fitness value A(ui , Pi ) with its simulation results show that the presented method is more
t t efficient than genetic algorithm, which could obtain the
personal best fitness value pi ,best , and if A(u , Pi ) >i global optimum solution more probably.
pi ,best , then pi ,best = A(u , Pi t ) , and pi ,d is set by the
t
i
7. References
current position.
t t
Step 5 compare the fitness value A(ui , Pi ) with the [1] A. J. Wood and B. Wollenberg, Power Generation
Operation and Control [M], 2nd ed. New York: Wiley, 1996.
local optimum solution pb ,best (when the iteration [2] SWARUP K S, YAMASHIRO S. “Unit commitment
receive the max iteration turn to the global optimal solution methodology using genetic algorithm” [J], IEEE
t t
Trans on Power Systems, 2002, 17(1):87-91.
solution pb ,best ), and if A(ui , Pi ) > pb ,best (or [3] H. T. Yang, P. C. Yang, and C. L. Huang, “Evolutionary
programming based economic dispatch for units with non-
pg ,best ), then set pb ,best (or pg ,best )= A(uit , Pi t ) , and smooth fuel cost functions”[J], IEEE Trans. on Power
Systems, Vol. 11, No. 1, pp. 112-118, Feb. 1996.
pb is set by the current position. [4] Simi P Valsan, K S Swarup. “Hopfield neural network
Step 6 update the velocity and position respectively approach to the solution of economic dispatch and unit
with the equation of (8), (9), (10), (11). commitment”[C], Intelligent Sensing and Information
Step 7 set i = i + 1 , and return to Step 3 until Processing, 2004. Proceedings of International Conference
on. On Piscataway, N J: IEEE 2004 Page(s):311 – 316
satisfying stopping criteria. [5] J. B. Park, K. S. Lee, J. R. Shin, and K. Y. Lee, “A
Step 8 output the results including the minimum cost particle swarm optimization for economic dispatch with non-
and the generators state during the whole periods. smooth cost functions”[J], IEEE Trans. on Power Systems,
Vol. 20, No. 1, pp. 34-42, Feb. 2005.
5. Numerical examples [6] T. A. A. Victoire and A. E. Jeyakumar, “Hybrid PSO-
SQP for economic dispatch with valve-point effect”[J],
Electric Power Systems Research, Vol. 71, No. 1, pp. 51-59,
The improved particle swarm optimization
2004.
algorithm program was implemented in the simulation [7] J. Kennedy and R. C. Eberhart, “Particle swarm
which was carried out on a ten-generator system; the optimization”[C], Proceedings of IEEE International
data of the ten –generator system was given in the Conference on Neural Networks (ICNN’95), Vol. IV, pp.
document [8]. Table addenda presents the best result of 1942-1948, Perth, Australia, 1995.
ten-generator system (at the end of this paper), tab.1 [8] T. O. Ting, , M. V. C. Rao, and C. K. Loo. “A novel
compare the result with the result of document [8]. approach for unit commitment problem via an effective
hybrid particle swarm optimization”[J], IEEE Trans on
Tab.1 Simulation analysis and Comparison Power Systems, 2006 VOL. 21, NO. 1: 411-418.
operatio starting Whole [9]Li Mao-jun. “A partheno-genetic algorithm and its
application in unit optimal commitment of power system”[J],
n cost﹩ cost﹩ cost﹩ Proceedings of the CSU-EPSA. 2001, 13(4):16-19
Result of this paper 554144.8 3970 558114.8
Result of paper [6] 563942.3 4090 568032.3
6. Conclusion
This paper presented a new strategy to produce
particle, which all of them are feasible solution,
enhanced the convergence speed, and applied multi-
24
Tab. Addenda Optimized solution of the 10-unit system with the proposed method
25
2008 International Conference on Intelligent Computation Technology and Automation
hi ( y ) ≤ ci , i = 1, 2," , n . (3) numbers can also be used. The evolution usually starts
Equation 2 gives the objective of Network Design from a population of randomly generated individuals
Problem, which is the minimization of total travel cost. and happens in generations. In each generation, the
Equation 3 expresses the constraint conditions inflicted fitness of each individual in the population is evaluated.
Based upon their fitness, multiple individuals are
upon decision variable y. In Equation 2, ta (va , ya ) is
stochastically selected from the current population and
the travel cost function of link a , va is the traffic modified (recombined and possibly randomly mutated)
volume of link a and can be obtained by solution of to form a new population. The new population is then
the following programming: used in the next iteration of the algorithm. The
algorithm terminates when either a maximum number
min ∑ ∫ t a ( x , y a ) d x
va
(4) of generations has been produced, or a satisfactory
v 0
a∈ A
fitness level has been reached.
s.t. ∑
r∈Rw
f rw = qw , w ∈ W , (5)
Through study on the characteristics of the model,
the paper has developed a genetic algorithm
va = ∑∑
w∈W r∈Rw
f rwδ arw , a ∈ A , (6) particularly for Network Design Problem. In order to
improve efficiency, floating point numbers are used to
f rw ≥ 0, r ∈ Rw , w ∈ W , (7) represent chromosomes and genetic operators such as
where V is the vector of link flow; W is the set of O-D crossover and mutation can be performed directly upon
pairs; Rw is the set of routes between O-D pair w ∈ W ; a pair of parent solutions. A penalty function is then
devised to ensure feasibility of solutions. Based upon
f rw is the path flow on route r ∈ Rw . the objective function and the penalty function, a
In the above mathematic model, it is assumed that fitness function is designed and the genetic algorithm
travel cost function ta (va , ya ) is an increasing, is then put forward.
continuous and differentiable function with respect to For any given capacity enhancement y, the
link volume va and the cost function of capacity equilibrium link flows va , a ∈ A can be obtained by a
enhancement g a ( ya ) is continuous, differentiable and traffic assignment procedure. Therefore, va , a ∈ A can
convex. be regarded as implicit functions of y and the bi-level
programming can be regarded as a single level
optimization with respect to variable y. In this case,
3. Genetic algorithm for the model there remain the budget constraints expressed by
Equation 1 and the other constraints expressed by
Generally speaking, the model of Network Design
Equation 3. The genetic operators of crossover and
Problem is not a convex programming. Therefore,
mutation are designed especially to ensue that the
conventional optimization methods are not effective
27
budget constraints be satisfied. The constrains defined initial population Pop(0), whose members are taken
by Equation 3 are complicated and have to be randomly from S. Set t = 0.
transferred into a penalty function and then be added to Step 2. Selection. Calculate fitness of each
the objective function. chromosome of Pop(t) by application of Equations 2, 9
Let y1 ∈ S and y2 ∈ S be two parent solutions and 10. Arrange Pop(t) in such a way so that
(also called chromosomes) and the crossover operator chromosomes with smaller fitness are placed before
is defined as follows: take a number λ randomly from those with smaller one. If t > T, go to Step 4. For each
the finite open interval (0, 1) and the crossover of the member of Pop(t), perform the following procedure:
two chromosomes is as follows: replicate a chromosome with the order i for N – i + 1
times and put the replicas in the breeding pool. Finally,
y = λ ⋅ y1 + (1 − λ) ⋅ y 2 . (8)
there will be N ⋅ ( N + 1) / 2 chromosomes in the
Because capacity enhancement g a ( ya ) a ∈ A is
breeding pool.
convex, the set S is convex. Therefore, we can draw the Step 3. Reproduction. Take N-1 pairs of
conclusion that the chromosome defined by Equation 8 chromosomes from the breeding pool randomly and
also belongs to S. This means that the crossover perform the crossover operation between each pair.
operator defined above can ensue that the budget Finally, N-1 new chromosomes are produced, forming
constraints be satisfied. a population NewPop(t). Take k chromosomes from
For any chromosome y ∈ S , the mutation operator NewPop(t), perform the mutation operation upon them
is defined as follows: take a link a randomly from A; and put the mutated ones into NewPop(t).
assuming capacity enhancements of the other links are Step 4. formation of new generation. Keep the first
fixed, calculate the upper limit ua of capacity chromosome of Pop(t) intact and replace the rest with
enhancement ya under the budget constraints; take a the N-1 chromosomes of NewPop(t). Set t = t + 1.
Step 5. Termination. Stop calculation and put out
number y a randomly from interval [0, ua]; with other
Pop(t).
link capacity enhancements of y intact, substitute y a
for ya and the new chromosome y is a mutation of y. It 4. Case study
is easy to see that the mutation of y still belongs to S Figure 1 shows a road network. It has two OD pairs,
and the budget constraints can be guaranteed by the which are from Point 1 to Point 4 and from Point 2 to
mutation operator.
Point 4 respectively. Let q1,4 = 400 and q2,4 = 200 are
According to Equation 3, the penalty function can
be defined below: traffic demands of the two OD pairs.
n
α ( y ) = ∑ max {0, hi ( y ) − ci } . (9) Link 3
i =1 1 4
Combining the objective function with the penalty
function, we define the fitness function as follows: Link 1
Link 4
Fitness ( y ) = F ( y ) + λ ( t ) ⋅ α ( y ) , (10) 3
where t is the number of generations; λ ( t ) is the
penalty factor. Assuming that best(i) is the best Link 2
2
solution of Generation i and β1 and β 2 are two
Figure 1. A road network example
different constants, which are bigger than 1, λ ( t ) can
There are four links in the network and Link 1 and
be defined as follows: if for any i∈ [t-m+1, t], best(i) is Link 2 are the links that need to be improved. Assume
feasible, λ (t+1) = (1/ β1 ) ⋅ λ (t ) ; if for any i∈ [t-m+1, t], that capacity enhancements for Link 1 and Link 2 are
best(i) is unfeasible, λ (t+1) = β 2 ⋅ λ (t ) ; in the other y1 and y2 and the traffic volumes of the four links are v1,
situations, λ (t+1) = λ (t ) . v2, v3 and v4 respectively. Travel cost functions of the
links are as follows:
Based upon the crossover operator, the mutation
v1
operator and the penalty function defined above, t1 ( v1 ) = 0.15 + , (11)
genetic algorithm for Network Design Problem is 200 + y1
developed below. v2
Step 1. Initialization. Give the maximum generation t2 ( v2 ) = 0.2 + , (12)
400 + y2
T, the number of chromosomes in each generation N,
the number of mutation in each generation k and an
28
v3 objective value for Network Design Problem without
t3 ( v3 ) = 1 + , (13) the constraint of Equation 16 and when parameter c is
400
bigger that 1.14, Equation 16 will become ineffective.
v
t4 ( v4 ) = 0.1 + 4 . (14) Besides, it can be seen that when parameter c is bigger
400 than 1.1, total travel costs decrease very slowly with
The budget constraint of capacity enhancements is the increase of c. Therefore, decision makers should
defined below. chose parameter c from the interval [0.981, 1.1]
y1 + 20 ⋅ y2 ≤ 1200 . (15)
The other constraints are as follows: 5. Conclusion
⎧ t1,4 ( y1 , y2 ) t2,4 ( y1 , y2 ) ⎫
max ⎨ , ⎬≤c, (16) Theory of Network Design Problem offers an
⎩ t1,4 t 2,4 ⎭ important approach to plan and design of road network
t1,4 ( y1 , y2 ) and the development of efficient algorithms plays great
≤ c1,4 , (17)
t 1,4 roles in promotion of its application in traffic
where t1,4 and t2,4 are travel costs of the two OD pairs engineering practice. The paper has given a general
programming model for Network Design Problem.
after the improvement project; t 1,4 and t 2,4 are travel Through study on the characteristics of the model,
costs of the two OD pairs before the improvement genetic operators such as crossover and mutation are
project. designed, penalty function and fitness function are
Set T=500, N=20, k=4 and c1,4=0.981. Choose a defined and based upon those, a genetic algorithm is
series of values for c from the interval [0.98, 1.14] and developed. Finally, a case study is used to explain
calculate the best solutions of the model through application of the algorithm and some meaningful
application of the genetic algorithm. The calculations conclusions are drawn concerning improvement of the
have been very efficient and the results are listed in test road network. Although the genetic algorithm put
Table 1. forward by the paper can be of great help for decision
Table 1. Best solutions of the model makers, public opinions should be carefully studied
before final decisions concerning improvement of road
c y1 y2 Total travel cost network are made.
0.981 46.026 57.545 978.47
1.00 96.207 55.184 973.26
Acknowledgment
1.02 160.89 51.868 968.09 This paper has been substantially supported by the
1.04 242.15 47.891 963.24 National Natural Science Foundation Council of China
through two projects (50778040, 50522207).
1.06 346.04 42.691 958.87
1.08 467.99 36.557 955.43 Reference
1.10 644.96 27.739 952.44
[1] H. YANG, M G H BELL, “Models and algorithms for
1.12 852.75 17.34 950.8 road network design: a review and some new developments”,
1.14 1042.2 7.8861 950.4 Transport Review, 1998,18(3), pp. 257-278.
[2] Liu Canqi, “Discrete network design problem with budget
constraint”, Journal of China Highway, 1998,18(3), pp. 257-
Table 1 shows the change of best solutions and total 278.
travel cost versus the value of parameter c. From the [3] Qiang Meng, Hai Yang, “Benefit distribution and equity
table, we can observe that with the increase of in road network design”, Transportation Research Part B
parameter c, Link 1 gets more and more capacity 36(2002). pp. 19-35.
enhancement while Link 2 gets less and less [4] Huang Haijun, Theory and Practice of Analysis of Urban
enhancement and during the process, total travel costs Traffic Network Equilibrium, Publishing House of People’s
become less and less. This means that improvement of Transportation, Beijing, 1994.
Link 1 is more efficient than that of Link 2 and when [5] Xing Wenxun, Xie jinxing, Modern Optimization
Algorithm, Publishing House of Tinghua University,
the constraint of Equation 16 is less stringent, more
Beijing,.1998.
and more budget is transferred from Link 2 to Link 1
to help decrease total travel costs. In fact, with the
increase of parameter c, total travel costs will decrease
monotonically to a fixed value that is the optimal
29
2008 International Conference on Intelligent Computation Technology and Automation
The information entropy and the diversity measure 2.2 The diversity increment
have different connotations: the former is a measure of
The diversity increment with two diversity sources
an information symbol’s indeterminacy and is also a
description of the state’s uncertainty and chaos, and the X : (n1 , n2 ," ns ) and Y : (m1 , m2 ," , ms ) is defined by:
latter is a measure of the whole indeterminacy. Δ ( X , Y ) = D ( X + Y ) − D( X ) − D(Y ) =
Although either of them describes the state space from s
31
cluster analysis of high dimensional raw data based on Step1. Each category randomly produces N=100
immune network model aiNet. The redundant data can initial antibodies Abj=(w1,w2,…,ws),j=1,2, …,N,
be eliminated by the artificial immune network's namely, the scale of the antibody population is N×S,
evolution. De Castro has researched the data's structure and suppose that the training generation number is:
expression and the spatial distribution thoroughly and P=100, where P is the training end label.
further revealed the relationship in the data bunch. The Step2. The training sets are looked at as the
algorithm simulates the responsive process of the antigens. According to category, once an antigen of
immune network stimulated by antigens such as this category is provided for immunity training and
antibody-antigen recognition, immune clonal recognition.
reproduction, affinity maturation and network Step3. Using the reciprocal of the diversity
suppression. The two above-mentioned network increment seeing formula (2.1), computing the antigen
models are all based on a series of biological immune - antibody affinity (dij), and then arranging the order by
response triggered after the antigens invade antibody the affinity, the most affinitive m antibody will be
network such as clonal reproduction and affinity selected as network cells, and they are going to be
maturation. The sophisticated biological process is cloned, and the numbers of clone have a direct ratio
simulated to solve the actual engineering problems by with the affinity. Here we can get the antibody network
AIS algorithms. Therefore the affinity maturation is the cells group C.
key in the algorithm, which guides immune network 1
evolution. Some scholars usually use Euclid-distance dij = (2.1)
and Hamming-distance as an affinity function[8,9]. In Δ( Agi , Ab j )
this paper we adopt the reciprocal of the diversity Δ ( Agi , Ab j ) = D ( Agi + Ab j ) − D( Agi ) − D( Ab j ) =
increment as the affinity function of the antigen- s
antibody and the similarity function of the antibody- = D(V + W ) − ∑ D(vi + wi ) , (2.2)
antibody to train a classifier .Then the category of the i =1
s s
testing set is predicted by the classifier.
where, V = ∑ vi ,W = ∑ wi ,
i =1 i =1
2.2 The immune classifying algorithm D (V + W ) = (V + W ) log b (V + W ) − V log b V − W log b W
procedure
D(vi + wi ) = (vi + wi ) log(vi + wi ) − vi log vi − wi log wi
The classification is a supervised learning process. Step4. Making hypermutation operation on the
Through the learning process, the unknown data can be antibodies network cells group C, its way is as
forecasted. Constructing a classifier, we need to have a follows:
training sample dataset as an input. The training set is C* = C – α.*(C-CAg), (2.3)
composed of database record or element. Each record here, C is the network cells group which are obtained
is an eigenvector which is composed of related fields in the third step, and CAg is the antigens after being
(called attribute or eigenvalue). In addition, the cloned. The α calls the study rate matrix or the
training sample set also has a category mark. A sample hypermutation rate matrix. This hypermutation
can be written as (v1 , v2 , … , vs ; cj), where, vi operation may cause the evolution to the direction of
(i=1,2,…, s) represents attribute value, and cj antibody recognizing antigen. The scales of CAg and α
(j=1,2,…, m) denotes the category. If the training set matrix are the same as C.
have r training samples, the scale of the training set is r Step5. Calculating the affinity between the provided
×s .In this article, the classified algorithm treats the antigen this time and the mutated network cells group
C*. According to affinity sorting, selecting the optimal
training data set as antigen(Ag), and treats the data of
network cells by a certain percentage η( generally
reflection antigen attribute characteristic as
25%) ,which are regarded as the memory cells MAgi of
antibody(Ab ).Then the stimulation and reaction
this provided antigen Agi . Then according to the
between the antigens and the immunity network
category value of the antigen Agi, putting MAgi into the
antibodies should be simulated to realize the evolution
memory cell pond Mi corresponding to the same
of the immunity network to fulfill the process of
category.
training data (antigens), and finally to preserve the
Step6. Judging if all the stimulation of antigens
memory cell pools Mj (j=1,2, … , m) which
ends, if not, returns to step 2.
corresponds to m categories to carry on the forecast
Step7. According to the idiotype network theory,
classification to the unknown category data, e.g. the
making network suppression operation on the m
testing set. The algorithm steps are as follows:
memory cell pond Mi by calculating the similarity Sij
of the antibodies in each memory cell pond. Here we
32
still use the reciprocal of the diversity increment, Exon 16739 18057 34796
seeing the formula (2.4). The memory cells should be Intergenic 7617 8167 15784
eliminated while their similarities more than the DNA
threshold σs=98%. Then we get the compressed S. Intron 58 63 121
memory cell pond Mi. cerevisiae
Exon 1484 1469 2953
1 Intergenic 2899 2873 5772
Sij = (2.4)
Δ( Abi , Ab j ) DNA
A.thaliana Intron 20329 20456 40785
Δ ( Abi , Ab j ) = D ( Abi + Ab j ) − D ( Abi ) − D ( Ab j ) (2.5)
Exon 22728 22267 44995
Step8. Checking whether the number of training
generation is reached. If not, do the followings: Intergenic 9747 10337 20084
combine the memory cells of each category in memory DNA
cell pond with the random produced N antibodies to
form new antibodies, then returns to step 2. Each DNA sequence is a character string which is
Step9. Providing unsorted datasets, and calculating composed of adenine(A) and cytosine (C) and guanine
the affinity with each antibody in m memory cell pond. (G) and the thymine (T). The DNA sequence’s
Then estimating the category attribute of each antigen structure mainly includes three aspects: the sequence
by the nearest-neighbors principle, and outputting the length, each base’s content in sequence, and the order
final results. of the base. The bases of each sequence are given
number (1, 2,…,N)base by base from the beginning in
this paper. According to three phases of the codons we
4. Application of Immune Classifier Based can extract three subsequences which numbers are
on the Diversity Increment in the Model respectively 3n+1, 3n+2 and 3n+3 (n=0, 1, 2, …,N/3-
Species Genomes 1).Calculating respectively the probability of four
bases in three subsequence we can attain 12 parameters
We have made great progress in gene sequence which are regarded as the state parameters of the
information study of E.coli, S. cerevisiae, A.thaliana diversity sources. Thus, we can attain 12 dimension
,D.melanogaster and C. elegans at present, which have diversity measure Ag=(v1,v2,…,vs;cj), here, s is
become main model species materials in the after- equal to 12, which indicates that there are 12
genome times, and have obtained great achievements eigenvalues in each intron, exon or intergenic DNA; cj
in the research of genomes function , transcriptome and (j=1,2,3)respectively correspond to three categories
proteome. All of these help the study of advanced : intron, exon and intergenic DNA. At first, we
species and humanity genomes and provide the basic
calculate 12 parameters value of each sequence by
information to deeply recognize them and life
procedure which is picked out in Table 1. Then we
evolution process.
respectively and randomly split them in two sets: the
The genomes data of three model species of C.
training set and the testing set. Each training set is used
elegans, S. cerevisia, and A.thaliana are from
to train the immune classifier in the Section 3. Finally
GenBank database .The gene sequences of C. elegans ,
each sequence class in the testing set is predicted by
S. cerevisiae and A.thaliana are divided into three
the immune classifier.
kinds: intron, exon and intergenic DNA, namely, the
Sensitivity, specificity and accuracy are commonly
category number m is three in the classifier. There are
used measures of gene-finding performance, and we
35823 intron, 34796 exon and 15784 intergenic DNA
adopt them here [10]. The definition is as follows:
applied in six chromosome of C. elegans , and 121
If there are M 1 intron sequences , M 2 exon
intron, 2953 exon and 5772 intergenic DNA in sixteen
chromosome of S. cerevisiae, and 40785 intron, 44995 sequences and M 3 intergenic DNA, in fact, the
exon and 20084 intergenic DNA in four chromosome predicted result of sequences is by procedure that N I
of A.thaliana. Then three class data of each model
sequences are identified as intron which N I is equal to
species are divided into the training set and the testing
set which sample scales see Table1. N I 1 + N I 2 , here , N I 1 ∈ M 1 , N I 2 ∈ M 2 or
Table1 Three class sample dataset’s distribution of the three M 3 and N E sequences are identified as exon which
model species’ DNA sequences N E is equal to N E1 + N E 2 , here , N E1 ∈ M 2 ,
Three model species Training Testing Total N E 2 ∈ M 1 or M 3 . The sensitivity Sn of intron
set set prediction result sees formula (3.1).The specificity Sp
C. elegans Intron 17354 18469 35823 of intron prediction result sees formula (3.2).
33
N I1 than the testing set. The reason lies in the fact that the
Sn = (3.1) classifier itself studies guided by the training set and
M1
the constructed classifier by the immune classifying
N I1 algorithm in the Section Three can reflect the feature of
Sp = (3.2)
NI the training set with more accuracy but not the testing
The sensitivity Sn of exon prediction result sees set. Compared with the method of the standard
formula (3.3).The specificity Sp of exon prediction diversity source and the minimum of the diversity
result sees formula (3.4) increment in references [11,12] , only one standard
N diversity source in the training set of each category in
S n = E1 (3.3) three model species is constructed , the antibody
M2 population can be got and realize self-adjustment by
N E1 the classifying algorithm in this paper. After the
Sp = (3.4)
NE antigens (e.g. the training set ) unceasingly stimulate ,
the left antibody population of immune response ,
Sn denotes the prediction ability of the procedure
which is memory cells Mi in the paper can’t only
and Sp the credit level of prediction result. The mean
embody the accord of the training samples but also the
value of sensitivity and specificity is defined as
variety and the specificity of the samples. Finally, a
accuracy of prediction result. Sensitivity, specificity
well-pleasing result was got on the prediction of the
and accuracy of the intergenic DNA are the same as
testing set by the classifier. There are also
the above definition. By employing the immune
shortcomings that the computing work of the
classifier in this paper, the prediction results of the
classifying algorithm is large and the procedure
three model species see Table 2.
executing time is long.
From Table 2, we can see that the prediction
performance of the training set is universally higher
Table2 The prediction result of the three model species
Training set Testing set
Sensitivity Specificity Accuracy Sensitivity Specificity Accuracy
34
accuracy is up to 85% after using the classifier to [4] Kexue Xu, Biological Mathematics, Science Press,
predict the training set and the testing set. We can BEIJING ,2001.
apply the signal or simple model species to interpret [5] Zhiqing Lu, Qianzhong Li, “The prediction of the
the inner relation of the advanced living things, structural class of protein: App lication of the measure of
diversity”, ACTA BIOPHYSICA SINIC, 2001,17(4), pp.703-
especially the humanity genomes in the structure and 711.
the species evolution. The similarity and specificity of [6] J. Timmis, M. Neal, “A resource limited artificial
sequences are found among genomes of the model immune system for data analysis”, Knowledge-Based system,
species and the humanity. Meanwhile, the classifying 2001, 14, pp.121-130.
method is tried to predict the protein structure and [7] L. N. De Castro, F. Von. Zuben, “Artificial immune
function. system : Part -Basic theory and application”, Technical
Report TR-DCA 01/99 December, 1999.
[8] Lin Cong, Yuheng Sha, Licheng Jiao, “Application of
Acknowledge Immune Clone Selection Algorithm to Image Segmentation”,
Journal of Electronics & Information Technology , 2006 ,
This work is supported by National Nature Science 28(7), pp.1170-1173.
Foundation under Grant 60634020 and Grant [9] Ruochen Liu, Jian Jia, Mengling Zhao, Licheng Jiao, “An
60673084. immune memory dynamic clonal strategy algorithm”,
Control Theory & Applications, 2007, 24(5), pp.777-783.
[10] Burset M. , Guigo R., “Evaluation of gene structure
References prediction program”, Genomics, 1996(34), pp. 353- 367.
[11] Weihua Bao, Qianzhong Li, “The Diversity Increment
[1] Wei You, Yaxiu Liu, “ Classifying DNA sequences by Method of Exon Intron and Intergenic DNA Prediction of
artificial neural network model”, Science& Technology C.Elegans and S. Cerevisiae” , Acta Scientiarum Naturalium
Information, 2007, 25, pp.89-90. Universitatis NeiMongo, 2004, 35(1), pp.60-64.
[2] Huanping Zhang, Xiaofeng Song, Huinan Wang, “Feature [12] Cuixia Chen, etc. , “The Identification of Exon Intron
gene selection base on binary particle swarm optimization and Intergenic DNA in the Model Species Genomes”, Acta
and support vector machine”, Compute &Applied Chemistry, Scientiarum Naturalium Universitatis NeiMongol, 2005(7),
2007, 24(9) , pp.1159-1162 . pp.166-172.
[3] Yinshan Li, Chunyan Yang, Wei Zhang, “The Neural
Network Method of DNA Sequence Classification”,
Compute Simulation, 2003, 20(2), pp.65-68.
35
2008 International Conference on Intelligent Computation Technology and Automation
37
One of the key issues in designing a successful PSO and unbiased affect from either positions; hence,
algorithm is the representation step, i.e. finding a introduces a bit of exploration at some times and a bit of
suitable mapping between problem solution and PSO exploitation at another time randomly. The algorithm
particle. In the paper, we set up a search space of 1- uses the new velocity to update the particle current
dimension for one threshold seeking problem. Each position to a new position according to Eq. (2). Once all
dimension has continuous set of possible values. In particles adjust their positions, they will constitute the
regard to 256 gray level images, the candidate threshold new status of the PSO population. Then, the algorithm
is between 0 and 255.which can be encoded by an evaluates the fitness of these particles according to their
integer lies in [0 255].Namely, the candidate threshold new positions. Thirdly, the algorithm repeats this whole
are coded from 0 to 255. If we try all 256 thresholds to process of determining the global and the local best
get the optimal threshold, it is the Otsu method. Here positions, updating particle position and evaluating new
PSO is employed to solve it. particle position until a user-determined criterion is
The quality of solution is measured by the objective satisfied. In our case, we mapped this criterion to a
function as between-class square error. According to the maximum number of generations. Finally, we can get the
optimization objective function Eq. (3), mathematically, best particle and optimal threshold.
the fitness function f (t) of each particle can be As mentioned in the paper[7],In a general way, As for
formulated as. a 256 gray level image, the quasi threshold often vary 25
f (t ) Z 0 (t ) u Z1 (t ) u ( P 0 (t ) P1 (t )) 2 (5) gray levels around the optimal threshold.Therefore, to
avoid falling into local optimal threshold a fluctuant
Such that t is a gray level between 0 and 255 which
threshold A is imposed in our test. That is ,after main
can be obtained through the particle’s position. Z0 (t ) is
circle ends we get a quasi threshold .Then another local
amount of pixels whose gray value is lower than search is performed , that we change t in the rang of [t-A,
t ; Z1 (t ) is amount of pixels whose gray value is higher t+A] and compute between-class variance to get optimal
than t ; P 0(t ) is the means of pixels with gray value less threshold .The procedure of the proposed PSO algorithm
than t ; P 1 ( t ) is the means of pixels with gray value for solving the optimization problem of threshold
selection is described as follows:
more than t .
Step1.Initialize N particles with random positions
3.2Procedures of the algorithm x1,x2,…xN according to Eq. (1). Generate velocities Vi , i
= 1,2,...,N.
As stated before, in proposed PSO algorithm, a Step 2. Evaluate each particle according to Eq. (5).
candidate threshold is mapped into corresponding a Step 3. Update individual and global best positions: If
particle’s position. Firstly, the algorithm starts by f (pbesti) < f (xi) , then pbesti = xi , and search for the
generating randomly initial population of the PSO. maximum value fmax among f (pbesti) , If max f (gbest) <
Every particle is initialized with a locations and a fmax gbest = x max ,xmax is the particle associated with fmax .
velocities, the value of locations can be generated in Step 4. Update velocity: update the ith particle
range of [0 256]. Thus, these locations composed the velocity using the Eq.(2) restricted by maximum and
initial solutions for the optimal threshold. Secondly, the minimum threshold vmax and vmin .
particles’ fitness is measured by Eq. (5). The algorithm Step 5. Update Position: update the ith particle
keeps an updated version of two special variables position using Eq. (1)and (2)
through out the course of its execution: “global- Step 6. Repeat step 2 to 5 until a given maximum
best”(gbest) position and “local-best”(Pbesti) position. It number of iterations is achieved or the optimal solution
does that by conducting two ongoing comparisons: First, so far has not been improved for a given number of
it compares the fitness of each particle being in its iteration.
“current” position with fitness of other particles in the Step 7. In the light of given fluctuant threshold A,
population in order to determine the global-best position another local search is executed to get the optimal
each generation. Then, it compares different visited threshold on the rule of biggest between- class variance.
positions of a particle with its current position, in order
to determine a local-best position for every particle.
4 Experiment and discussion
These two positions affect the new velocity of every
particle in the population according to Eq. (1). As shown
We implement the algorithm to segment 10 images
in this equation, two random parameters control amount
including Lena and several aerial images. To evaluate
of effect the two positions (i.e. global and local best
the performance of our algorithm, we have performed
positions) impose over the new particle velocity. The
PSO on every image for 100 times and compared it with
purpose of these parameters is to introduce a randomize
38
Otsu algorithm. Parameters of the algorithm are set as: N How to apply PSO to generic image segmentation
is 5 ,the inertia weight w is set to from 0.4 to 0.1 in the problem?
way of linear decline, the Vmax is set to 50, the
maximum number of iteration is 16,A is set 20.Two
images and segmented results are showed in Figure 1.
As we can see from Table 1 that the worst quasi
threshold has only 9 gray levels difference to the best
threshold, in addition, the best quasi threshold has no
difference with corresponding optimal threshold.
Furthermore, the method can get the same optimal
threshold as that of Otsu. In contrast, all maximum times
of variance computation is below 120, while the Otsu
algorithm need 256 times of computation. It is obvious
that our method can reduce the computation time and
enhance the efficiency of old class square error
method.(in table 1. Times is the total times of variance
computation, quasi and best denote quasi threshold and
best threshold respectively.).Eventually, it is worth
noting that PSO has been tested on trial images for 1000
times, it can obtain the optimal threshold 998 times, Fig. 1 Test Images and Segmented Result
which shows that PSO is an efficient and robust
algorithm for threshold selection . Acknowledgements
This paper is financially supported by Excellent
Table 1 Experimental result Young Teachers Program from bureau of education in
Our method Otsu Hubei province (No.20081409ˈNo.20081402)
No.
times quasi best times best References
1 120 145 145 256 145
[1]Kenneth Casteleman. Digital image processing,
2 120 143 143 256 143
Prentice Hall, 1995
3 120 145 145 256 145 [2]Mehmet Sezgin, etc, Survey over image thresholding
4 120 111 120 256 120 techniques and quantitative performance evaluation
5 120 89 86 256 86 Journal of Electronic Imaging January 2004, 13(1)
6 120 97 97 256 97
146~178
[3]Kennedy J,Eberhart R.Particle Swarm Optimization.
7 120 81 83 256 83 Proc.IEEE International Conference on Neural
8 120 126 126 256 126 Networks, IV.Piscataway, NJ IEEE Service Center,
9 120 101 101 256 101 1995, pp.1942~1948.
10 120 99 95 256 95
[4]Eberhart R, Kennedy J.A New Optimizer Using
Particle Swarm Theory. Proc of the Sixth International
Symposium on Micro Machine and Human Science,
5 Conclusions 1995, pp.39~43.
[5]Eberhart R C,Shi YˊParticle Swarm Optimization
In summary, PSO algorithm has been developed to Development,Applications and Resources Proc.
segmentation problem. Simulation results indicate that Congress on Evolutionary Computation 2001,
newly proposed algorithm can succeed in finding Piscataway,NJ IEEE Press,2001,pp.81~86.
optimal threshold to segment images. Surely, it can be [6]Ayed Salman, Imtiaz Ahmad, Sabah Al-Madani,
applied to seek muti-threshold for image segmentation. Particle swarm optimization for task assignment
However, some drawbacks of our algorithm mainly lies problem, Microprocessors and Microsystems, 2002,
in that the number of threshold must be given as priori Vol.26 ,PP.363~371.
knowledge Hence, further work can be done along two [7]Zheng hong, Pan Li the automatic selection of image
main research directions. threshold on the basis of genetic algorithm. journal
How to use this algorithm without being given the of image and graphics (in Chinese) vol 4(A), No .4
number of the threshold? 1999 327~330
39
2008 International Conference on Intelligent Computation Technology and Automation
41
^ xi ` y ^ xi ` y 1 ^ xi ` y ^ xi ` y 1
^ xi ` y ^ xi ` y
i 1 i 1 i
i
i 1 d out i 1
d in
ID ID ID ID
ID
ID
d in
where {+} and {−} denote set {xi }yi =1 and {xi }yi =−1 It easily can be seen that d+ +
in , din and dout can be all calcu-
respectively. Then lated by pass through the kernel matrix K (α). Therefore,
the FCMC is efficiently calculated in O km2 time com-
d+ −
in + din
F CM C (X, K (α) , Y ) = plexity, which equals to that of KTA criterion. Then the op-
dout timal combinatorial coefficients can be obtained by solving
is called feature distance based combinatorial kernel matrix the following optimization model
evaluation criterion and denoted as FCMC.
d+ −
in + din
The geometric significance of all entities in FCMC are min ,
shown in Figure 3, where φ+ − dout
α and φα denote the center
of the two classes. dout denotes the distance between two s.t. αk ≥ 0. (3)
class, and d+ −
in , din denote the sum of the distance between
the features and their center (in direction perpendicular to FCMC is similar to the radius margin bound R2 /Δ in
hyperplane) within a class. When a combinatorial kernel statistic learning theory, as dout actually measure the mar-
projects samples of the same class into more concentra- gin Δ and d+ − 2
in , din reflect the R in some degree. Their
+ +
tive features and sample of different class into much further main difference is that din and din do not compute the fea-
ones, it will have a smaller FCMC value. Comparing with ture distances directly but compute their components in the
KTA, FCMC wipes off condition (b) while considering the direction perpendicular to hyperplane.
inner distance of a class and the inter distance between two
classes simultaneously. 4. Experiment
We then analysis the computation complexity of FCMC.
First, In this section, experiments on simulated data are de-
1 1 signed to assess the validity and feasibility of FCMC in
φ+ +
α φα = k ij , φ − −
α φ α = kij ,
m2+ m2− SVM.
{+} {+} {−} {−}
The first experiment compares the performance of KTA
1
φ+ − − +
α φα = φ α φα = kij , and FCMC in kernel parameter tuning. We use a simulated
m+ m− data set Xtrain for training, where m+ = m+ = 600, and
{+} {−}
choose Gaussian kernel matrix
where kij = αk (kk )ij , then we have
k
G
G m G xi − xj 2
dout = φ+ + − − + −
α φα + φα φα − 2φα φα , K = kij i,j=1 , k (xi , xj ) = exp −
2 2γ 2
1
1
+ + + −
m− kij − m+ kij + φα φα − φα φα and polynomial kernel matrix
{+} {−} {+}
d+ = , P m γ
in
(m+ − 1) dout K P = kij i,j=1
, k P (xi , xj ) = (xi xj − 1)
2
1
1
m+ kij − m− kij + φ− −
α φα − φ+ −
α φα
as subjects.
{−} {+} {−} As γ ranging in [−6, 6], we first train SVM with K G and
d−
in = . P
(m− − 1) dout K on Xtrain , then we calculate the KTA value and FCMC
42
Gaussian Kernel Polynominal Kernel
0.9 0.9
Err Err
FCMC FCMC
0.8 0.8 1
KTA KTA
0.9 FCMC
0.7 0.7
Err
0.8
0.6 0.6
0.7
0.5
0.4 0.4
0.4
0.3 0.3
0.3
0.1
0.1 0.1
0
−3
0 0 −2 3
−6 −5 −4 −3 −2 −1 0 1 2 3 4 5 6 −6 −5 −4 −3 −2 −1 0 1 2 3 4 5 6 −1 2
0 1
(a) (b) 1 −1
0
2 −2
3 −3
value of the two kernel matrix, after that we test their er- deserved and efficient optimization algorithm of model (3)
ror rate Err on a test set Xtest , where m+ = m− = 100. needs to be investigated in future works.
The values of KTA, FCMC and Err in K G and K P SVM
are shown in Figure 4. One can easily see that the low- References
est Err corresponding to the smallest FCMC, while it is not
aligned with the biggest KTA strictly (although conversely [1] S. Cheng, A. Smola, and R. Williamson. Learning the kernel
the smallest KTA corresponding to a lowest Err), which with hyperkernels. Journal of Machine Learning Research,
matches up the analysis in previous section. 6:1043–1071, 2005.
The second experiment verifies the effectiveness of [2] J. Crammer, A. Elisseeff, and J. Shawe-Taylor. Kernel de-
FCMC in combinatorial kernel matrix model selection. We sign using boosting. In Advances in Neural Information Pro-
choose the linear combination of Gaussian kernel matrix cessing Systems 14, pages 537–544, Cambridge, MA, 2002.
and cubic polynomial kernel matrix MIT Press.
[3] N. Cristianini, J. Kandola, A. Elisseeff, and J. Shawe-Taylor.
K (α) = α1 K G + α2 K P , On kernel-target alignment. Journal of Machine Learning
3 Research, 1:1–31, 2002.
with k G = exp −xi − xj 2 /2 , k P = (xi xj − 1) . By [4] J. Kandola, J. Shawe-Taylor, and N. Cristianini. Optimizing
fixing the kernel parameters, we calculate the FCMC and kernel alignment over combinations of kernel. Technical Re-
Err with α1 , α2 ∈ [−3, 3] on Xtrain and Xtest . The re- port NC-TR-2002-121, NeuroCOLT, 2002.
sult planes are shown in Figure 5. There are four extremum [5] J. Kwok and I. Tsang. Learning with idealized kernels. In
in each plane, where three of them are aligned strictly (in- Proceedings of the 20th International Conference on Ma-
cluding the minimum), except that one extremum of FCMC chine Learning, pages 400–407, 2003.
corresponding to a peak value of Err. [6] G. Lanckriet, N. Cristianini, P. Baltlett, L. El Ghaoui, and
M. Jordan. Learning the kernel matrix with semidefinite pro-
In brief, comparing with KTA, FCMC is more effective
gramming. Journal of Machine Learning Research, 5:27–
in reflecting the trend of Err and then more feasible in mea-
72, 2004.
suring the goodness of a combinatorial kernel matrix. [7] C. Nguyen and B. Tu. Kernel matrix evaluation. In
M. Manuela, M. & Veloso, editor, Proceedings of the 20th
5. Conclusion International Joint Conference on Artifficial Intelligence,
pages 987–992, 2007.
We have proposed a feature distance based model selec- [8] B. Shölkopf and A. Smola. Learning with Kernels. MIT
Press, Cambridge, MA, 2002.
tion criterion for combinatorial kernel matrix,which over-
[9] P. Sollish. Probability methods for support vector machines.
comes the redundancy of KTA criterion, and shows validity In S. Solla, T. Leen, and K. Müller, editors, Advances in
and feasibility both in theoretical analysis and comparative Neural Information Processing Systems 12, pages 349–355,
experiments. 2000.
As this criterion also provides a foundation for further [10] V. Vapnik. The Nature of Statistical Learning Theory.
researches of model combination in kernel methods, atten- Springer, New York, 1995.
tions to implement it large scale benchmark data base is
43
2008 International Conference on Intelligent Computation Technology and Automation
Shuanhu Wu1,2 , Hong Yan2,3 , Qingshang Zeng1 ,Yanjie Zhang1 and Yibin Song1
1
School of Computer Science and Technology, Yantai university,
Yantai 264005, Shandong, China
2
Department of Electronic Engineering, City University of Hong Kong,
Tat Chee Avenue, Kowloon, Hong Kong
3
School of Electronic and Information Engineering, University of Sydney,
NSW2006, Sydney, Australia
wushuanhu@gmail.com
45
Typically a gene expression dataset includes genes, correspondingly, their centroids can be regarded as the
for which the characteristics of their expression data approximate clustering center of relevant clusters that
are known to biologists. For example, in the yeast cell can be calculated as follows:
cycle expression data [13], 416 genes have been G G
C k = G ∑ x ik ,
1
interpreted biologically and their expression data k = 1,2,..., K (6)
| C k | i∈C k
correspond to five cell cycle phases: early G1, late G1, K
S, G2 and M, respectively. Some applications just where | C K | represents the numbers of genes in the
utilize those known information to verify the same group.
performance of their clustering algorithm, but this Different from conventional division or partitioning
clustering strategy is not useful for finding the correct based clustering techniques, our clustering algorithm
cluster structure hidden in the data. Based on the above starts
G from these K known modes. We use
observation, we propose in this paper a new clustering { Pk | k = 1,2,...K } to represent K initial prototypes.
framework using the information of partially known Since these K known modes can be considered as an
gene modes. When such information is incorporated approximation to Gcorresponding K real cluster
G
into the one-prototype-take-one-cluster (OPTOC) prototypes, we set Pk = C k . Our divisive algorithm
competitive learning procedure, we can obtain starts from these K prototypes that are kept unchanged
improved clustering results. all the time in the partitioning process. This has two
Since it is very difficult to estimate the correct advantages: (1) it can make the clustering process
number of natural clusters reliably in a complex high- insensitive to initialization, and (2) it is useful for
dimensional dataset, we adopt an over-clustering and
finding the number of correct clusters.
merging strategy. The over-clustering procedure can
When the number of clusters in the input data is
minimize the chance of missing natural clusters in the
more than K, Kwe can detect additional clusters G as
data. The merging procedure attempts to merge similar
clusters until all remaining clusters are finally distinct follows. Let Ci denote the center that Pi wins
from each other. Different from other clustering according to the minimum-distance rule ( i = 1,2,...GK K in
algorithms, such as our earlier work [12], the merging the beginning of clustering). The distortionG | Pi C Ki |
criteria used in our new algorithm also takes the representing the Euclidean distance from Pi to CGi
advantage of the partially known gene mode measures the discrepancy between the prototype Pi
information. found by the OPTOC learning process and the actual
clusterK structure in the data. For example, in Figure
4. The new clustering algorithm 1(b), Ci would be located in Gthe center of the three
K S3, while Pi settles at the center of
clusters S1, S2G and
Our clustering algorithm is implemented as a S3. A large | Pi C i | indicates the presence of the other
divisive clustering followed by an agglomerative natural clusters in the data and a new prototype would
clustering process. The divisive step adopts the be generated from the prototype with the largest
OPTOC competitive learning paradigm with distortion when this distortion exceeds a certain
constraints from known gene information to ensure the threshold. Since it is difficult to set a suitable threshold
resulting clusters are not sensitive to initialization. Also to terminate the cluster splitting process when all
we adopt an over-clustering strategy to avoid missing natural clusters in the data are found, we propose to
any natural clusters in the data. The agglomerative step over-cluster the dataset to avoid missing any natural
estimates the number of correct clusters. clusters.
The new prototype is initialized at Kthe position
4.1. Divisive Clustering Step specified by a distant property G vector Ri associated
G with the mother prototype Pi [11]. The idea is to
Let { xik | k = 1,2,..., K ; i ∈ C k } be the partially initialize the new prototype far from its mother
known expression data that have been biologically prototype to avoid unnecessary competition between
G G
characterized a priori, where x ∈ R p represents a them. Each time when a new pattern X is presented,
K
vector in the p-dimensional space (p indicates sampled Ri of the winning prototype is updated as follows:
time points or conditions in a microarray experiment), G G G G G G G
Ri* = Ri + ( X − Ri ) • Θ( Pi , X , Ri ) • ρ i / n RG (7)
subscript k represents the group label of the genes with i
46
G G 2
5. Results and discussions
⎛ | Pi X | ⎞
and ρ i = ⎜ G G G G ⎟
⎜| PR | + | P X |⎟
⎝ i i G Gi ⎠ In this section, we first test our algorithm on
G
Note that unlike A i , Ri always try to move away from simulated gene expression profiles, where correct
PGi . After
G a successful split, the property vectors solution was known a priori, to show the robustness of
( Ai , Ri ) of every prototype are reset and the OPTOC our algorithm and its ability in finding natural clusters
learning procedure is restarted. and the correct numbers of clusters. Then we validate
the algorithm on real gene expression data. The real
4.2. Cluster Agglomerating Step gene expression data we used is the yeast cell cycle
data set provide by Cho et al. [13], which has
Through over-clustering, it is possible that a natural established itself as a standard for the assessment of
cluster in the dataset is split into two or more clusters. newly developed clustering algorithm.
Therefore, some clusters would be similar and should
be merged together. In this section, we propose a 5.1. Clustering validation on simulated gene
criterion for merging the resulting clusters from the expression data
previous over-clustering step. The aim of our merging
scheme is to produce final clusters with distinct We have generated many different groups of
patterns. simulated expression data. We first randomly produce
There are a number of criteria for merging similar 20 seed patterns, and then transform each pattern into a
clusters in the literatures, but most of them are not cluster by generating many profiles by adding Gaussian
applicable for the gene expression data in which white noise. 20 clusters of different sizes are finally
clusters may be highly intersected with each other or generated that contain profiles from 30 to 300
even embedded one in another [9,10]. A merging unequally with total 1915 profiles in the dataset. Figure
scheme we developed earlier [12] is adopted here. Let 2 shows the plots of one of generated clusters. For each
G cluster, the data along each time point k have a
Ci be the centers of cluster i and σ i be its standard
standard deviation of σ k . We set all σ k to 0.15 in our
deviation. If the two clusters satisfy the condition
G G data, which is the typical variation along each time
|| C i − C j ||≤ (σ i + σ j ) / 2 ,they should be merged into
point observed in the published expression profiling
one. Unfortunately this criterion may result in clusters experiments [14].
with very large variance, in which some patterns are
dissimilar to each other. In fact, a reasonable 1 C1/300 1 C2/160 1 C3/150 1 C4/140
assumption is that in a microarray experiment, all the 0.5 0.5 0.5 0.5
0 0 0 0
data have the approximately equal measurement errors 5 10 15 5 10 15 5 10 15 5 10 15
1 C5/130 1 C6/120 1 C7/105 1 C8/95
and therefore, all the clusters in the data have
0.5 0.5 0.5 0.5
approximately equal variance so that patterns in the 0 0 0 0
C9/90
10 15
1
5
C10/85
10 15
1
5
C11/80
10 15
1
5
C12/75
10 15
|| C i − C j ||≤ σ (8) 0
5 10 15
0
5 10 15
0
5 10 15
0
5 10 15
be considered as samples extracted randomly from the 0.5 0.5 0.5 0.5
47
is 0.1531, 0.1532, 0.1489, 0.1459 and 0.1503,
1
Samples f rom cluster #1
respectively. These are nearly the same as the true
0.5
standard deviation of the clusters.
0
2 4 6 8 10 12 14
Samples f rom cluster #5
1 1 C2/130 1 1
1 0.5 0.5 0.5 0.5
0 C1/300 0 0 C3/91 0 C4/70
0.5
5 10 15 5 10 15 5 10 15 5 10 15
0 1 C5/45 1 C6/150 1 C7/120 1
2 4 6 8 10 12 14 0.5 0.5 0.5 0.5
Samples f rom cluster #9
0 0 0 0 C8/85
1
5 10 15 5 10 15 5 10 15 5 10 15
0.5 1 1 1 C11/79 1 C12/7
0.5 0.5 0.5 0.5
0
2 4 6 8 10 12 14 0 C9/105 0 C10/140 0 0
Samples f rom cluster #13 5 10 15 5 10 15 5 10 15 5 10 15
1 1 1 1 1
0.5 0.5 0.5 0.5
0.5
0 C13/54 0 C14/23 0 C15/50 0 C16/41
0 5 10 15 5 10 15 5 10 15 5 10 15
2 4 6 8 10 12 14 1 C17/61 1 1 1 C20/159
Samples f rom cluster #17
0.5 0.5 0.5 0.5
1
0 0 C18/35 0 C19/31 0
0.5 5 10 15 5 10 15 5 10 15 5 10 15
1 1 1 1 C24/11
0
2 4 6 8 10 12 14 0.5 0.5 0.5 0.5
0 C21/18 0 C22/26 0 C23/12 0
5 10 15 5 10 15 5 10 15 5 10 15
1 1 1 1 C28/20
Figure 3: Five datasets with different modes extracted 0.5 0.5 0.5 0.5
0 C25/18 0 C26/22 0 C27/12 0
from cluster #1, #5, #9, #13 and #17. 5 10 15 5 10 15 5 10 15 5 10 15
48
finding natural clusters and estimating the correct correspond to clusters #3, #9 and #14 in Figure 8,
number of clusters. respectively. Clusters #9 and #16 in Figure 2 are
grouped into cluster #1 in Figure 6 and clusters #15 and
1 1 C2/130 1 1
0
0.5
0
0.5
0
0.5
0 C8/85
data
5 10 15 5 10 15 5 10 15 5 10 15
1 1 1 C11/79 1 C12/30
0.5 0.5 0.5 0.5 The real gene expression data we tested are the yeast
0 C9/105
5 10 15
0 C10/140
5 10 15
0
5 10 15
0
5 10 15
cell cycle profiles [13]. This dataset contains 6601
1 1 1 1
genes with 17 time points in which 416 genes are
0.5 0.5 0.5 0.5
1 C17/121 1 1 1 early G1
1
0.5 0.5 0.5 0.5
0.5
0 0 C18/300 0 C19/75 0 C20/30
5 10 15 5 10 15 5 10 15 5 10 15 0
2 4 6 8 10 12 14 16
late G1
1
0.5
Figure 6: The best clustering results obtained by running the
0
2 4 6 8 10 12 14 16
k-mean algorithm 15 times with different initialization. The 1
S phase
0
2 4 6 8 10 12 14 16
#18~#1, #19~#12 and #20~#20. M phase
1
0.5
49
1 1 C2/239 1 1
1 1 1 1
0.5 0.5 0.5 0.5
0.5 0.5 0.5 0.5
0 C1/46 0 C2/87 0 C3/29 0 C4/24 0 C1/60 0 0 C3/42 0 C4/47
5 10 15 5 10 15 5 10 15 5 10 15 5 10 15 5 10 15 5 10 15 5 10 15
1 1 1 1
In the SA algorithm, 1306 genes passed a variation
0.5 0.5 0.5 0.5 filter similar to ours and 20 clusters were produced, in
0 C17/11
5 10 15
0 C18/22
5 10 15
0 C19/27
5 10 15
0 C20/22
5 10 15
which many patterns are consistent with ours. For
example, clusters #1, #2, #3, #4, #7, #8, #11, #12, #13,
Figure 9: Clustering results after merging. Finally, 20 #14, #15, #17, #18, #19, #20 obtained from the SA
clusters are obtained. algorithm in [14, Figure 5] correspond to clusters #1,
#16, #5, #3, #10, #12, #7, #4, #18, #15, #9, #6, #2, #19,
We use the centers of five known patterns as #13 by our algorithm in Figure 9, respectively.
constraints and keep them unchanged in the divisive However, it is worth pointing out the clusters showing
clustering step in our algorithm. The merging threshold different patterns between the SA algorithm and our
σ =0.777 is obtained from 44 patterns in late G1 phase method. Clusters #1 and #6 from the SA algorithm in
that have the maximum number of profiles. In the [14, Figure 5] are similar visually and they should be
divisive step, we set the maximum number of clusters grouped into one cluster. Cluster #9 in [14] has very
to 28. Figure 3 shows the resulting 28 clusters. The large variance, and is therefore unlikely to be a natural
process of merging results stopped finally at 20 clusters. cluster. The results from our method do not have these
Figure 9 shows the merged results. We observe that the kinds of problems. For the k-means algorithm, we set
resulting 20 clusters have no apparent visual similarity the number of clusters to 20 and ran the algorithm 20
except for the first five modes that belong to five times using different initializations. Figure 10 shows
different cycle phases and should not be merged. the best clustering results in terms of the lowest within-
50
cluster sum of square error. Obviously, clusters #2, #10 relationships from large scale gene expression data,”
and #16 are similar in appearance and are not distinct Information Pprocesing in Cells and Tissues, 1998, pp.
clusters. 203-212.
[4] J. Hartigan, Clustering algorithms. New York: Wiley,
1975.
6. Conclusions [5] P. Tamayo, D. Slonim, J. Mesirov, Q. Zhu, S.
Kitareewan, E. Dmitrovsky, E. S. Lander and T. R.
Clustering is a useful technique for microarray gene Golub, “Interpreting patterns of gene expression with
expression data analysis. Although many clustering self-organizing maps: methods and application to
algorithms exist, they may not find natural clusters and hematopoietic differentiation,” Proc. Natl Acad. Sci.
estimate the number of clusters correctly. In this paper, USA, 96(3), 1999, pp. 2907–2912.
we have introduced a new clustering scheme based on [6] U. Alon, N. Barkai, D. A. Notterman, K. Gish, S.
Ybarra, D. Mack and A. J. Levine, “Broad patterns of
the OPTOC learning technique and using a priori gene expression revealed by clustering analysis of tumor
biological knowledge. With the OPTOC competitive and normal colon tissues probed by oligonucleotide
learning technique, our clustering method can find arrays” Proc. Natl Acad. Sci. USA, 96, 1999, pp. 6745–
natural clusters effectively. Using known modes as 6750.
constraints and incorporating them into the clustering [7] T. Kohonen, Self-Organizing Maps. Berlin, New York:
process, we can enhance the ability of the algorithm for Springer, 2001.
finding the correct cluster structure and estimating the [8] S. Theodoridis and K. koutroumbas, Pattern recognition.
correct number of clusters. Experimental results and New York: Academic press, 1999.
comparison studies using both simulated and real gene [9] L.M.Jakt, L.Cao, K,S,E, Cheah, and D.K.Smith,
“ Assessing clusters and Motifs from gene expression
expression data show that our method works
data”, Genome Research, 11, 2001, pp.1112-1123.
effectively. [10] D. Jiang, J. Pei, and A. Zhang, “DHC: A Density-Based
Hierarchical Clustering Method for Time-Series Gene
Acknowledgments: This work is supported by a grant Expression Data,” Proc. BIBE2003: Third IEEE Int’l
from National Natural Science Foundation of China Symp. Bioinformatics and Bioeng., 2003.
(project 60772028) and a CityU SRG Grant (Project [11] Y.J.Zhang, and Z.Q.Liu, “Self-Splittng competitive
7001183) learning: A new on-line clustering paradigm,” IEEE
Trans. on neural networks, 13, 2002, pp. 369-380.
[12] S. Wu, A.W.C.Liew and H.Yan, “Cluster analysis of
References gene expression data based on self-splitting and merging
competitive learning”, IEEE Trans. on information
[1] M. B. Eisen, P. T. Spellman, P. O. Brown and D. technology in biomedicine, 8, 2004, pp.5-15.
Botstein, “Cluster analysis and display of genome-wide [13] R.J.Cho, M.J.Campbell, etc., “A genome-wide
expression patterns,” Proc. Natl Acad. Sci. USA, 95(8), transcriptional analysis of the mitotic cell cycle,” Mol.
1998. pp. 14863-14868. Cell, 2, 1998, pp. 65-73.
[2] S. Tavazoie, D. Hughes, M.J. Cambell, R.J. Cho, and [14] A. V. Lukashin, and F. Rainer, “Analysis of temporal
G.M. Church, “ Systematic determination of genetic gene expression profiles: clustering by simulated
network architecture,” Nature Genetics, 1999, pp. 281- annealing and determining the optimal number of
285. clusters,” Bioinformatics, 17, 2001, pp. 405-414.
[3] P.D’haeseleer, X.Wen, S.Fuhrman, and R. Somogyi,
“Mining the gene expression matrix: Inferring gene
51
2008 International Conference on Intelligent Computation Technology and Automation
53
change rate of Q tends to zero, the system enters a To sum up, in situation One, arbitrary point Q will
stationary state, and the stationary solution is: move to S1 with the time passing by, and S1(D1-λ1/μ1, 0)
Q* = D − λ μ . (4) is a stable solution. In this condition, development of
port 2 will be restrained and completely replaced by
In this condition, the system runs into a dissipative
port 1 in the end. The throughput of port 1 will be
structure with single subsystem.
stabilized on (D1-λ1/μ1).
Q2 Q2
4. Evolutionary Mechanism
L1 L1
With the lapse of time, the number of ports may II II I
increase (or decrease). In initial evolution stages, if a I
new port’s appearance turns into a macro fluctuation, S2
the system will evolve into a new dissipative structure. III L2
In order to analyze this changing process, we suppose L2 S1 III IV
there appears a new subsystem: port 2, which will O Q1 O Q1
compete with port 1. When n=2, the new equations are (a) (b)
⎧ d Q1 = μ ⋅ Q ⋅ ⎡ ( D −λ μ ) − Q − a ⋅ Q ⎤ Q2
⎪ dt 1 1 ⎣ 1 1 1 1 12 2⎦
⎨ (5) S3
⎪ d Q2 = μ2 ⋅ Q2 ⋅ ⎣⎡( D2 −λ2 μ2 ) − Q2 − a21 ⋅ Q1 ⎦⎤ L2
⎩ dt
The initial state is Q1°=D1-λ1/μ1, Q2°=0. II
In order to search out the stable solution, let
L1 I
d Q1 d Q2 III
= =0 (6)
dt dt O Q1
With equation (6), there comes (c)
⎧⎪Q1 + a12 Q2 = D1 − λ1 μ1 Figure 1 Possible locations of L1 and L2
⎨ (7)
⎪⎩Q2 + a21Q1 = D2 − λ2 μ 2 (2) Situation Two (see Figure 1-(b))
Consider equations in (7) as two function expressions, ⎧⎪( D2 − λ2 μ 2 ) a21 > D1 − λ1 μ1
they can form two beelines about variable Q1 and Q2. When ⎨ is available,
Let ki be the slope of Li, then k1= -1/a12; k2= -a21. As ⎪⎩( D1 − λ1 μ1 ) a12 > D2 − λ2 μ 2
0<aij<1, we can get k1< -1 and k2 >-1. The intercept of
⎧⎪ D2 − λ2 μ 2 > a21 ( D1 − λ1 μ1 )
the two lines on lateral and longitudinal axes are viz. ⎨ , (9)
L1: (D1-λ1/μ1, 0), (0, a12-1(D1-λ1/μ1)) ⎪⎩ D1 − λ1 μ1 >a12 ( D2 − λ2 μ2 )
-1
L2: (a21 (D2-λ2/μ2), 0), (0, D2-λ2/μ2). L1 and L2 have one intersection S2, and the first
Therefore, there are three possibilities of locations for quadrant were divided into four parts I, II, III, IV. We
L1 and L2. Draw the two lines in the same rectangular can analyze the moving trend in a similar way as in
coordinates (see Figure 1). situation one, the arrow in Figure 1-(b) shows the
(1) Situation One (see Figure 1-(a)) moving direction of Q, and S2 is a stable solution.
⎧⎪( D2 − λ2 μ 2 ) a21 < D1 − λ1 μ1 In this situation, the system presents a symbiosis
When ⎨ is available,
⎪⎩( D1 − λ1 μ1 ) a12 > D2 − λ2 μ 2
phenomenon. Port 2 could coexist with port 1 and gain
enough increment for further growth. The coordinates
⎧⎪ D2 − λ2 μ 2 < a21 ( D1 − λ1 μ1 ) of S2(Q1°,Q2°) is the final state of this evolution process,
viz. ⎨ , (8) and it can be found by solving equation(7),
⎪⎩ D1 − λ1 μ1 >a12 ( D2 − λ2 μ2 )
⎧ D ( D1 − λ1 μ1 ) − a12 ( D2 − λ2 μ2 )
L1 and L2 have no intersection, and the first quadrant ⎪Q1 =
were divided into three parts I, II, III. Suppose there is ⎪ 1 − a12 ⋅ a21
⎨
an arbitrary point Q(Q1,Q2) in the first quadrant, and its ⎪Q D = ( D2 − λ2 μ2 ) − a21 ( D1 − λ1 μ1 )
changing rate is denoted as (dQ1/dt, dQ2/dt). ⎪ 2 1 − a21 ⋅ a12
In area I, dQ1/dt > 0, dQ2/dt < 0, Q will move to S1; ⎩
In area II, based on the premise condition (see (8)), The integrated state of the system is Q°=Q1°+Q2°.
we can find out that dQ1/dt < 0 and dQ2/dt < 0, which (1 − a21 )( D1 − λ1 μ1 ) + (1 − a12 )( D2 − λ2 μ2 )
means Q will move to L1 (equivalent to area I); QD = (10)
1 − a21 ⋅ a12
In area III, dQ1/dt > 0 and dQ2/dt > 0, Q will move
Suppose a21= a12=β, equation (10) can be simplified as
to L2 (equivalent to area I).
follows:
54
( D1 − λ1 μ1 ) + ( D2 − λ2 μ2 ) one situation and at least one port dies out in the other
QD = > D1 − λ1 μ1 (11) two situations. And symbiotic evolution can promote
1+β
further exploitation of potential resources and improve
The stable solution in situation two is larger than the the effectiveness of the whole system. With regard to
initial state, which means that system evolution could evolution problems of the port cluster system referring
improve the effectiveness of each resource. to multiple subsystems, further discussions are strongly
(3) Situation Three (see Figure1-(c)) recommended.
⎧⎪( D2 − λ2 μ2 ) a21 >D1 − λ1 μ1
If ⎨ is satisfied, then
⎪⎩( D1 − λ1 μ1 ) a12 <D2 − λ2 μ2 6. References
the premise condition should be:
[1] ZHAO Yuan, LIU Peng, and YANG Zan, Evolution of
D1 − λ1 μ1 <a12 ( D2 − λ2 μ2 ) . (12) Regional Port System in Modern Logistics, ICAL 2007, pp.
And the stable solution will be S3(0, D2-λ2/μ2). In this 2851-2856.
condition, port 1 will be supplanted by port 2, and the [2]James J. Wang, Brian Slack, The evolution of a regional
container port system: the Pearl River Delta, Journal of
throughput of port 2 will be stabilized on D2-λ2/μ2.
Transport Geography, No.8, 2000, pp. 263-275.
Q Q [3]Guillaume Burghouwta, Jacco Hakfoort, The evolution of
the European aviation network, 1990-1998, Journal of Air
Transport Management No.7, 2001, pp. 311–318.
[4]Guillaume Burghouwt, Jacco Hakfoort, Jan Ritsema van
Q1 Q1 Eck, The spatial configuration of airline networks in Europe,
Q2 Journal of Air Transport Management, No.9, 2003, pp.
Q2 309–323.
[5]David Gillen, William G. Morrison, Regulation,
t t
(a) (b) Competition and Network Evolution in Aviation, Journal of
Q Air Transport Management, No.11, 2005, pp. 161–174.
[6]Matthias Ruth, Evolutionary Economics at the Crossroads
of Biology and Physics, Journal of Social and Evolution
Systems 19(2): 1996, pp. 125-144.
Q2 [7]Ludwig.Von. Bertalanffy, General System Theory:
Foundation, Development, Applications (revised edition,
Q1 1973), Translated by QIU Tong and YUAN Jia-xin, Social
Science Literature Press, Beijing, China, Jun. 1987, pp.
(c) t 45-50.
Figure 2 Schematic diagram of port cluster [8]MIAO Dong-sheng, Essentials of Systems Science
(Second Edition), China Renmin University Press, Jun. 2006,
evolution
pp.20-21.
[9]YANG Jia-ben, Introduction to System Engineering,
In all, when there are only two ports in the port
Wuhan University of Technology Press, China, Jan. 2002,
cluster in the initial stage, port 1 and port 2 coexist only pp.10-11.
in one situation (see equation (9)), and at least one port [10]G. Nicolis, I. Prigogine, Self organization in
will die out in other situations. Figure 2 gives a nonequilibrium systems (Chinese Edition), Science Press,
schematic evolution path of the port cluster in different China, 1986, 3, pp.42-43, pp.261-264.
conditions which are corresponding to Figure 1. [11]SONG Yi, HE Guo-xiang, The theory of dissipative
structures, China Zhanwang Press, Beijing, China, 1986,
5. Conclusions pp.55-57.
[12]LIANG Jun-guo, ZHANG Jian-hui, System Fluctuation,
synergetics and evolution, Social Sciences Journal of
A port cluster system is an open non linear system Colleges of Shanxi, No.3, 1995.
far away from equilibrium state, and has the typical [13]Hermann Haken, Erfolgsgeheimnisse der Natur
characteristics of a dissipative structure. Enlightened Synergetik: Die Lehre vom Zusammenwirken (Third edition,
by the evolutionary model of biological population, we 1983), translated by DAI Ming-zhong, Shanghai Science
established the evolutionary equations of a port cluster, Popular Press, China, 1988.
which explain the internal competition mechanism [14]ZHANG Yan, YANG Zhi-feng, LI Wei, Analyses of
among subsystems. Through the evolutionary urban ecosystem based on information entropy, ecological
modeling, Elsevier, Vol.197, Issues 1-2, Aug. 2006, pp. 1-12.
mechanism analysis, the effectiveness of the equations
was confirmed. Symbiosis of two ports only appears in
55
2008 International Conference on Intelligent Computation Technology and Automation
Liao WeiQiang
Department of Electrical Automation, Jimei University,Xiamen 361021, China
wq_liao@jmu.edu.cn
1. Introduction
The application of robot in industrial area is getting
wider, so that requirement of the interaction ability
between the machine and the environment is quiet
important. But there are still several problems to be Figure 1.Divided work space of the robot
solved: how to determine the target, where to go and
how to get there. “How to get there” is the problem so According to Figure 1, the grids can be identified in
called path-planning, which now is a major branch of two methods [2]:
the robot researching area. Path-planning is a complex ( 1 ) Rectangular coordinates. As shown in
whole including inquiring the information, planning a Figure1,define the upper left corner of the grid array as
proper path from the original position to the target and the coordinate’s origin, the horizontal x-axis directs to
avoiding the obstacles [1]. the right while the vertical y-axis directs downward.
Due to the development of genetic algorithm as well Each grid correspondingly equals to a unit of length.
as other intelligence algorithms, researchers Therefore, each grid can be identified by
increasingly focus on the intelligence algorithms based corresponding(x, y)exclusively.
path-planning. Genetic algorithm has been applied to (2)Serial number. As shown in Figure 1, from
many occasions since its first introduction as a global left to the right, from top to bottom, we can mark every
optimizing algorithm. The application of genetic grid with a serial number p (from zero), and then the
algorithm in Soccer Robot path-planning has great grid can be identified by the number exclusively.
significance for it can contribute to the solution of As we can see that this two methods of identification
the problem and play a stimulating role in the is mutually mapping.
development of genetic algorithm. p = x + 10 y (1-1)
or
57
generation. Each probability makes up a region and the The insertion operation is repeated until the individual
sum of all the probabilities is 1. Lastly, we generate a becomes a feasible path.
number between 0 and 1 randomly and determine the ( 5 ) Deletion operator: Deletion is to delete the
number of individuals being selected based on the redundant number between two same serial numbers
random numbers which appeared in the various and one of those same serial numbers. Deletion can
regions. simplify and shorten the path.
(2)Crossover operator: Traditional crossover and
two-point crossover. Two-point cross-over operator 3. Simulation Platform Implementation
needs to set two individuals at random, and find the
grids with the same serial number for the crossover A simulation platform is accomplished using the
operation. If more than one grid are found, one of them genetic algorithm and C++ programming.
are selected randomly for the crossover operation.
Obviously, conventional crossover operation will
easily generate a discontinuous path while the Two-
point crossover will not generate any new break point
[5].
( 3 )Mutation operator: there are three operating
methods: randomly delete a serial number from an
individual (not including the serial numbers of
initiation and termination point); or randomly select a
point from the individual and insert a new serial
number; or use another randomly generated number to Figure 3. Interface of simulation tools
replace a serial number which were randomly selected
The scopes of parameters of this platform are: grid
from the individual. Obviously, three mutation
height and width must range from 1 to 20; crossover
operators mentioned above all could disconnect the
and mutation probability must range from 0-1;
path. In this paper we follow the third method [6].
population size must range from 1 to 200; evolution
( 4 )Insertion operator: insert some free grids into
algebra must range from 1 to 1000.
the intermittent path to make it a continuous path. Use
the following method to determine if the consecutive
numbers is continuous.
4. Simulation results
D = max{abs(xk+1 − xk ), abs(yk+1 − yk )} (1−4) The robot path planning simulation has been
xk 、 yk 、 xk +1 、 yk +1 is the coordinates of pk 、 conducted on the simulation platform mentioned
above. All the assumptions of this simulation are as
pk +1 respectively which can be given by (1-2). follows: the working space of the robot is known as a
If D =1, then pk and pk +1 is continuous grid array of 10 × 10, and the location of the starting
point and goal point are (0 , 0) and (9,9) respectively;
otherwise, they are discontinuous. When they are the black regions represent the obstacles; the rest are
discontinuous, alternative points for insertion can be free regions. The robot is supposed to plan the proper
given by: path from the starting point to the goal point and avoid
1 possible obstructions. Bold lines in the figures are the
x 'k = int[ ( xk + xk +1 )] paths mapped out.
2
(1) Feasibility study. Firstly, Simulations are
1
y 'k = int[ ( yk + yk +1 )] performed to prove the feasibility of this method. As
2 shown in figure 4, the results indicate that genetic
pk′ = xk′ + 10 yk′ (1 − 5) algorithm can successfully find proper paths in
different environments.
Where, int is to get integer of the object.
If the calculation result is a free grid, we can insert
directly. If the result is a barrier grid, then we choose a
nearest grid as a new alternative point. If no new
alternative point can be found, the insertion fails, and
this individual should be abandoned. Otherwise, new
alternative points are inserted between pk and pk +1 .
58
Figure 4. Planning paths of different environment
6. References
[1] R A Brooks. Solving the Find-path problem by Good
Representation of Free Space [J]. IEEE Trans on Sys Man
and Cybern.1983.13 (3):190-197.
59
2008 International Conference on Intelligent Computation Technology and Automation
Yu Chen1, Changjie Tang1, Chuan Li1, Yue Wang1, Ning Yang1, Mingfang Zhu1,2
1 2
College of Computer Science, Sichuan Department of Computer Science and
University, Chengdu, China Technology, Shaanxi University of Technology,
{chenyu05, tangchangjie} @cs.scu.edu.cn Hanzhong, China.
Abstract in chromosome, and this can only express the element ‘xn’
in f(x). Obviously, this would make the chromosome is
Gene expression programming (GEP) is a new huge and oversize singularly. What’ more, GEP would
member of evolutionary computation family, and is lose the ability for expression the polynomial function
successful in symbolic regression and function finding in when the power n is very large, such as, n=1.0×E10 or
the field of data mining. However, GEP is difficult to find 1.0×E200.
power functions with high ranks. To tackle this problem, GEP is powerfully in function finding, and has been
this study proposes a novel GEP algorithm named HDN- applied in many fields. However, traditional GEP has
GEP. The main contributions include: (1) a new structure some limitations:
named HDN (high density node) is proposed that makes 1) Traditional GEP expresses functions by combining
each bit in chromosome express more genetic some simple function, such as “+,-,*, /”. To express a
polynomial function, there have to need many
information, (2) a HDN-GEP algorithm is proposed to
functions ‘*’ in chromosome if the power is high or
solve the high or super-high power polynomial function
super-high. This leads to the shape and the size of
funding, (3) the efficiency of evolution and the ability of
chromosome very huge, especially, when the power
GEP in function finding is improved based HDN-GEP,
n is super-high.
and (4) extensive experiments demonstrate that HDN-
2) The larger the length of chromosome, the lower of
GEP algorithm can find high power functions with short
the efficient of evolution in GEP. According to the
chromosome, whereas it can not be solved efficient by
schema theorem in GA, the longer the length of the
traditional GEP.
schema, the lower of the success rate. During the
evolution, the probability of long schema being
1. Introduction destroy is higher than the short schema.
3) The complex structure of expression tree (ET) or
GEP proposed by Candida Ferreira in 2001 is a new chromosome of the best solution is difficult to
member of the evolutionary computation family [1], and is interpret, especially in function finding and symbol
successful in symbolic regression and function finding in regression.
the field of data mining. GEP adopts the advantages of Example 1. Given the task to finding a complex function
both Genetic Algorithms (GA) and Genetic Programming “f1(x)=x11+5x6+1” through GEP, after several generations
(GP), while overcoming their respective limitations. evolution, the best solution would be found, and the
GEP performs well in global optimization, and is function f1(x) is expressed by chromosome R. The element
powerfully in function finding [1]. In GEP, the polynomial “x11” in function f1(x) has to be expressed by chromosome
function f(x) = a0+a1x+a2x2+…+anxn would be expressed R0, which is a sub-chromosome of R. R0 is likely below,
with chromosome easily. However, if the power n in the and the ET of R0 is shown in Fig.1.
polynomial function f(x) is high or super-high, the R0: * * * * * * x * * * * x x x x x x x x x x x x
chromosome would be very complex and oversize. For
example, if n=200, in perfectly case, there have to not less
than two hundred ‘x’ and one hundred and ninety nine ‘*’
61
would be inefficiency in function finding. To express the In Fig.2, the exponent bit is the power of gene bit, and
complex polynomial functions, we construct a novel the coefficient bit is the coefficient of gene bit. Specially,
structure, HDN, which has the ability to express high or both the exponent bit and the coefficient bit are 1 when
super-high power polynomial functions with proper short the gene bit is in FS.
chromosome. Based on HDN, we propose a novel Example 3. To express a polynomial function
algorithm HDN-GEP algorithm. By HDN-GEP, the length “x17+x16+2x15 ” with a chromosome in HDN-GEP, Fig. 3
or size of chromosome or ET becomes shorter and simpler. shows one of the possible chromosome.
Moreover, the ability of function finding is extended, and
the task could be solved in high or super-high power
polynomial function finding. The main steps in HDN-GEP
are shown in Algorithm 1.
Fig.3. The structure of chromosome in HDN-GEP
Algorithm 1 HDN-GEP algorithm
Input: fitness cases, the parameters for GEP In Fig.3, each bit in chromosome has an exponent bit
Output: the best solution and a coefficient bit. This structure is featured with the
{ following characteristics: (a) it can express more complex
(1) Initialize the population; polynomial function with a short chromosome, for the
(2) Fitness_Calculate ( ); // Calculate the fitness exponent bit and the coefficient bit can be a large numeral,
of every individual on chromosome, detail in and (b)it carry more genetic information within one gene
section 4.3. bit, and this lead to a high efficiency of evolution.
(3) If get the goal then exit; Definition 2(Exponent Set, ES). Let G be a gene
(4) Keep the best individual to the next generation; represents a polynomial function. The set of the values of
(5) Prepare the next generation by the roulette- the exponent bits in G is called Exponent Set.
wheel sampling; Commonly, the ES is between zero and n, and n is the
(6) Recombine the chromosome by probability pc; largest power in polynomial function. In Example 3, the
(7) Mutate the chromosome by probability pm; largest power in polynomial function is seventeen, then,
(8) Inverse the chromosome by probability pi; the numeral between zero and seventeen form the ES, and
(9) Transpose the chromosome by probability pt; ES= {0, 1, 2,…, 17}.
(10) goto (2); Definition 3(Coefficient Set, CS). Let G be a gene
} represents a polynomial function. The set of the values of
the coefficient bits in G is called Coefficient Set.
In HDN-GEP, the best solution is obtained through Commonly, the CS is between zero and m, and m is the
several round evolutions, and the details are analyzed in largest coefficient in polynomial function. In Example 3,
the following sections. the largest coefficient in polynomial function is two, then,
the numeral between zero and two form the CS, and CS=
4.1 Encoding the Chromosomes {0, 1, 2}.
Definition 4(High Density Node, HDN). The node in ET
In traditional GEP, each bit in gene is mapped into one or the gene bit in chromosome is called HDN, which is
node, which only contains one bit. The function is comprised of the exponent bit, the gene bit, and the
expressed through combining these nodes. This structure coefficient bit.
characteristic limits the ability of GEP to express the
complex functions. To express a complex polynomial
function, there has to combine many nodes in traditional
GEP, and lead to the larger size ETs or chromosomes. To
tackle this problem, an exponent bit and a coefficient bit is
introduced into HDN-GEP. The structure of one node in
HDN-GEP is shown in Fig.2, and an example is shown in
Example 3.
62
could express more complex function easily. According to (1) FOR each Applied_chrom[i] DO {
the structure of node in HDN-GEP, the function f1(x) in (2) IF Applied_chrom[i] not in FS THEN
Example 1 could be expressed with chromosome R2 (3) FOR each j∈ {0, 1,…, n} DO
simply in Fig. 4(a), and Fig.4 (b) shows the ET. Data[i][j]=coefficient[i]*EXP(fitcase[j],exp
Fig.4 shows that the complex function f1(x) is onent[i]) ;} //here, n is the number of fitness
expressed in HDN-GEP simply, whereas, in traditional cases, and fitcase[j] is the j-th fitness cases.
GEP, the complex structure of ET in Fig.1 can only }
express the element ‘x11’ in function f1(x). Function CalOperand (Applied_chrom)
{
4. 2 Fitness Calculation (1)FOR (i=0; i<n; i++)
FOR (j=0; j<f (i), j++)
Literature [10] proposed a novel linear decoding OPj← Data [childj] [i];
algorithm LDecode algorithm. With LDecode algorithm, (2)Data [q] [i] ←q (OP1…OPf (i));
the fitness can be calculated on the chromosome }
immediately. In HDN-GEP, we calculate the fitness based
on LDecode. The mainly steps of fitness calculation is In above functions, n is the size of fitness cases, and
shown in Algorithm 2. childj is the j-th child of function q in Applied_chrom, f(i)
is the number of parameters of function q, and OPi is the
Algorithm 2 Fitness_Calculate i-th operand of function q.
Input: chromosome, fitness cases
Output: the fitness of chromosome 5. Empirical Study and Discussions
{
(1)Applied_chrom=Identify_Applied_Gene (chrom); An AMD Anthon 1.53GHz PC with 512M RAM is
(2)Fitness_Calc (Applied_chrom) used for testing. In our experiments, we implement HDN-
} GEP and traditional GEP in Java. All algorithms are run
Function Identify_Applied_Gene (chrom) on Windows XP with JDK1.4.
{
(1) NF=0, NT=0, i=0; 5.1 Fitness Calculation Efficiency
(2) L←LEN (chrom);
(3) WHILE (i .LE. L) DO { To evaluate the efficiency of HDN-GEP, we run HDN-
(4) IF each chrom[i] in FS THEN NF ++; GEP and traditional GEP on function f1: x17+x16+2x15. The
ELSE NT++; experiment is focused on the performance difference in
NF
∑ [ f (i) − 2] )) EXIT ;}
calculating the fitness of chromosome. Each experiment is
(5) IF (NT .EQ. ( N F + 1 + conducted one hundred times and the average value is
i =1 recorded for the evaluation.
(6) Return chrom [0,…, (NF +NT)];//return the front Theoretically, to express f1, in HDN-GEP, there are
(NF +NT) bits in chrom. only need 3 gene bits in gene head. However, in
} traditional GEP, the length of gene head has to be set by
Function Fitness_Calc (Applied_chrom) 63 at least. We generate a population (the size of
{ population is 100) and a group fitness cases (the size of
(1) ImportDataset ( ); fitness cases is 20) by f1 randomly, and run HDN-GEP and
(2) q ←LEN (Applied_chrom); traditional GEP on the same population and fitness cases
(3) ch← Applied_chrom [q]; respectively. The main parameters in HDN-GEP and
(4) IF ch in TS traditional GEP are illustrated in Tab.1, and the result is
THEN q--,goto (3); shown in Tab.2.
ELSE CalOperand (Applied_chrom);
(5) q--; Tab.1. Parameters for f1
(6) IF q >0 goto (3); f1
n
∑ Data[i][0] − T
Traditional GEP HDN-GEP
(7) Return i ; //here, Ti is the Gene head length 63 3
i =0
Number of genes 1 1
value of the i-th fitness case. ES null {0,1, 2,…,17}
} CS null {0,1,2}
Function ImportDataset ()
{
63
Tab.2 shows the difference in fitness calculation [2] Cai Zhihua, Li Qu, Jiang Siwei, et al. Symbolic regression
between traditional GEP and HDN-GEP. The result based on GEP and its application in predicting amount of gas
reveals that the efficiency of fitness calculation in HDN- emitted from coal face. In Proceedings of the 2004 International
GEP is well above the efficiency in traditional GEP. Symposium on Safety Science and Technology, pp. 637-641,
2004.
Tab.2. Time cost on f1 (ms) [3] Huang Xiaodong, Tang Changjie, Li Zhi, et al. Mining
Traditional GEP HDN-GEP Functions Relationship Based on Gene Expression Programming.
f1 71.66 1.314 Journal of Software, 2004, 15(suppl.):96-105.
7. References
64
2008 International Conference on Intelligent Computation Technology and Automation
66
⎧ 5 ⎫ ⎧ 5 ⎫ This function has infinite optimal solutions. When
f ( X ) = ⎨∑ i cos [ (i + 1) x1 + i ]⎬ ⋅ ⎨∑ i cos [ (i + 1) x2 + i ]⎬ its only one global optimum solution ( 0, 0 ) is obtained,
⎩ i =0 ⎭ ⎩ i =0 ⎭
the corresponding minimum of Schaffer Function is
+ 0.5 ⎡⎣ ( x1 + 1.42513) + ( x2 + 0.80032) ⎤⎦
2 2
−1 .
(3 )
where −10 ≤ x1 , x2 ≤ 10 . 2.3.2. Test results. In the following test, the PSO and
This function has 760 local optimal solutions. When IPSO’s parameters are defined as follows: the swarm
size m is set to be 200, the inertia weight ω linearly
its global optimum solution ( −1.42513, −0.80032 ) is
decreases from 1.0 to 0.25, the self confidence c1 = 2.0,
found, the value of Shubert Function is equal to
−186.7309 . the swarm confidence c2 = 1.5, the maximum time of
Function III iterations = 10000, the time step Δt = 0.005, the
1 10 stopping tolerance ε = 10-6, the time of consecutive
f ( X ) = ∑ ( x 4j − 16 x 2j + 5 x j ) (4) design iterations n is the same as the product of m
2 j =1
and the number of dimensions.
where −10 ≤ x j ≤ 10 , ( j = 1, 2,...,10 ) . For every test function, the initial values of the
This function has infinite local optima, too. Its design parameters are generated randomly and the
unique global optimum solution is x j = −2.903534 optimization process is repeated one hundred times;
then the statistic characteristic of the PSO and IPSO
( j = 1, 2,...,10 ) and the corresponding minimum is algorithms are compared, as shown in Table 1.
-391.6617 .
Function IV——Schaffer Function
f ( X ) = −0.5 +
sin 2 ( )
x12 + x22 − 0.5
(5)
2
⎡1 + 0.001( x 2 + x 2 )2 ⎤
⎣⎢ 1 2
⎦⎥
where −100 ≤ x1 , x2 ≤ 100 .
Table 1. Performance comparison between PSO and IPSO
The average minima of IPSO for 100 runs are more robust in global search compared with the basic
mostly smaller than that of PSO and much closer to the PSO. But, their average times of objective function
actual global optimum. For Function I and IV, the evaluation are on the same order of magnitude.
times of convergence to global optimum of two To sum up, for those aforementioned global
algorithms are all near or equal to 100; for Function II optimization (GO) test functions, the performance of
and III, the time of IPSO is much more than that of the improved PSO algorithm is not worse than that of
PSO and its corresponding probability to obtain the the basic PSO; and as shown in Table 1, PSO doesn’t
global minimum reaches about 70 percent. As to the do well in searching for the global optimum of
standard deviation between true minimum and average Function II and III, whereas IPSO results in faster
minimum, the difference in the best positions found by convergence and better robustness.
particles in IPSO is smaller than that of PSO except
Function IV. This indicates that the IPSO method is
67
3. Hybrid Particle Swarm Optimization b) Powel optimization algorithm: specify an initial
solution x ( ) , a set of n unit vectors of linear
0
68
methods. In particular, its standard deviations of result in faster convergence to the global minimum
Function I and III are much smaller than those of the solution.
PSM, Powell and IPSO. The average times of objective To sum up, the hybrid particle swarm optimization
function evaluation of HPSO are much less than those algorithm makes evident improvements in the ability of
of IPSO. That is to say, the introduction of the PSM global search, robustness and computation efficiency,
and Powell into the optimization process of IPSO can due to the integration of the PSM and Powell with the
IPSO method.
69
[3] Y. Shi and R. Eberhart, “Fuzzy Adaptive Particle Swarm
Optimization”, The IEEE Congress on Evolutionary [7] Luo Wencai, Study and Application of Theory of
Computation, San Francisco, USA, 2001, pp. 101-106. Multimethod Collaborative Optimization in the System
Design of Flying Vehicles, Graduate School of National
[4] G. Venter and J. Sobieszczanski- sobieski, “Particle University of Defense Technology, Changsha, Hunan, China,
Swarm Optimization”, AIAA 2002-1235, 2002. 2003.
[5] Y. Shi and R. Eberhart, “Parameter Selection in Particle [8] Zhao Yong, Study on the Theory and Application of
Swarm Optimization”, Proc of the 7th Annual conf on Multidisciplinary Design Optimization for the Satellite
Evolutionary Programming, Washington DC, 1998, pp. 591- System, Graduate School of National University of Defense
600. Technology, Changsha, Hunan, China, 2006.
f ( x ) = min { f1 , f 2 , f 3 }
x(
k −1)
x( k ) = x ? = x? GBest = x ?
f ⎡⎣ y ( ) ⎤⎦ < f ⎡⎣ y ( ) ⎤⎦ ?
n +1 1
PBest , GBest
x(
k + 1)
= y(
n +1 )
y ( ) = x(
k +1)
+ α ⎡⎣ x ( ) − x ( ) ⎤⎦
1 k +1 k
x(
k +1)
= x( ) , δ = βδ , y ( ) = x(
k 1 k)
f1 = f ⎡⎣ x( ) ⎤⎦ f 2 = f ⎡⎣ x( k ) ⎤⎦ f3 = f ( GBest )
k +1
f ( x ) = min { f1 , f 2 , f3 }
k = k +1
70
2008 International Conference on Intelligent Computation Technology and Automation
72
base
5. Repeat 3-4 until d(pi,x)≤s and there are k objects
in R
6. Continue moving x to the next object at the left in
the database
7. Call search_point(x,R,k)
8. Set I=[ i·c+s-ρ , i·c+ri ] where ρ = max f ( y )
y∈R
The relevance feedback algorithm proposed in sec- 3. If |f(x)|<ρ then remove z from R and add x into R
tion 2 sequentially scans all objects in the data space to In the above algorithm, d(x,y) represents the
find objects that will be returned for labeling. In prac- Euclidean distance between vectors x and y.
tical surveillance database, the number of objects is It should be mentioned that the feature vectors are
huge. It is difficult to apply the above algorithm di- in high dimensional space. The objects are sparsely
rectly. distributed in such a space and the radius is usually
Since SVM separates the dataset by a hyperplane, very large. Therefore, to reduce the search region, the
the idea of iDistance can be used to reduce the search 6th step of the function “search” only find the con-
regions. As shown in Figure 1, feature vectors are formed objects in the first 3 nearest partitions.
firstly map onto iDistance keys using (3). When Similarly, the top k retrieval results can be found by
searching for objects to be labeled, only the partitions searching the furthest few partitions to the hyperplane.
that possibly contain objects from the search range 3.3. Non-linear SVM based relevance feedback
need to be searched.
optimization
When performing linear SVM based relevance
feedback, the following optimization algorithm finds Since datasets may have non-linear decision bound-
the k approximate nearest objects to the hyperplane as ary, non-linear SVM will be required in the relevance
the labeling objects in the next round. feedback process. To extend the optimization from
search(k) linear to non-linear situation, we first examine the
1. Ascendingly sort the partitions by the distance SVM algorithm in section 2.1. According to (1), each
|f(pi)| from their pivot pi to the hyperplane H point is mapped to a new vector space by the non-
2. Set i to be the first partition in the sorted list linear transform function φ(x). However, we only have
3. Call search_cluster(i,R,k) the definition of the kernel K(·) but not φ(x). From (1),
4. Move i to the next partition in the sorted list it can be seen that K(·) is the inner product of φ(x). So
5. Set ρ = max f ( y ) the distance between φ(xi) and φ(xj) can be deduced:
y∈R
|φ(xi)-φ(xj)|=(φ(xi)⋅φ(xi)+φ(xj)⋅φ(xj)-2φ(xi)⋅φ(xj))1/2
6. Repeat 3-5 for all partitions satisfying f(pi)<ρ+ri =(K(xi,xi)+K(xj,xj)-2K(xi,xj))1/2 (4)
until there are k objects in R and at least 3 parti- From (4), a metric space can be constructed. The
tions has been searched optimization algorithm in section 3.2 can be applied to
7. Return R as the approximate nearest k objects to H the mapped metric space by substituting (4) for the
distance function d(x,y).
search_cluster(i,R,k) When choosing RBF as kernel function, the kernel
1. Calculate the distance s from pivot pi to the hyper- parameter γ is not known. The general solution is to
plane H: s=|f(pi)| perform a cross-validation on the training data to de-
2. Find the first object x whose key is not larger than termine it. However, this is not applicable to the above
i·c+ri optimization algorithm because the transformation is
3. Call search_point(x,R,k) performed beforehand without any training data. To
4. Move x to the next object at the left in the data-
73
1.00
0.95
0.90
Precision
0.85
0.80 Round 1
Round 2
0.75 Round 3
Round 4
0.70 Round 5
Figure 2 Background scene with smoothed 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
trajectories in the testing database Recall
solve this problem, an exponentially growing candi- Figure 3 Performance evaluation
date sequences of γ is pre-calculated. Each value γ in
the sequences will construct a transformation and pro-
duce a metric space database. When performing rele-
vance feedback, a cross-validation is firstly performed
to choose a proper γ from the candidate sequences. The
optimization retrieval algorithm is then performed on
the corresponding database of the chosen γ.
4. Experimental Results
74
0.99 Sequential Scan 5. Conclusion
Pivot Count =
0.98 30
50 This paper proposes an iDistance based interactive
70
0.97
90 retrieval algorithm to accomplish semantic retrieval in
visual surveillance system. The algorithm consists of a
Precision
0.96
SVM-based relevance feedback mechanism and an
0.95
iDistance based optimization algorithm. The experi-
0.94 mental results show that the query result can exactly
match the concept of user and the algorithm proposed
0.93
can reach a precision comparable to sequential scan by
0.92
15 20 25 30 35 40
searching a small portion of the objects in the surveil-
Labeling Count
lance database.
Figure 5 Precision vs. labeling count for
various pivot counts 6. Reference
0.40
[1] F. I. Bashir, A. A. Khokhar and D. Schonfeld, "Seg-
0.35
mented trajectory based indexing and retrieval of video
0.30 data," in Proc. International Conference on Image Process-
0.25
Pivot Count = 10 ing, 2003.
30 [2] J. Hsieh, S. Yu and Y. Chen, "Motion-based video
Coverage
0.20 50
70
retrieval by trajectory matching," IEEE Transactions on
0.15 90 Circuits and Systems for Video Technology, vol.16, pp. 396-
409, 2006.
0.10 [3] W. Hu, D. Xie, Z. Fu, W. Zeng and S. Maybank, "Se-
0.05 mantic-Based Surveillance Video Retrieval," IEEE Transac-
tions on Image Processing, vol.16, pp. 1168-1181, 2007.
0.00 [4] Y. Rui, T. S. Huang, S. Mehrotra and M. Ortega, "A
10 15 20 25 30 35 40
Labeling Count
Relevance Feedback Architecture for Content-based Multi-
media Information Retrieval Systems," in Proc. the 1997
Figure 6 Coverage vs. labeling count for Workshop on Content-Based Access of Image and Video
various pivot counts Libraries, 1997, pp. 82.
counts while the labeling count increases to 40. Com- [5] Y. Rui, T. S. Huang, M. Ortega and S. Mehrotra,
paring the bar heights in each group of labeling count, "Relevance feedback: a power tool for interactive content-
it can be seen that the precision of the retrieval based image retrieval," IEEE Transactions on Circuits and
schemes using pivots is slightly worse than using the Systems for Video Technology, vol.8, pp. 644-655, 1998.
sequential scan and the difference is less than 3%. Fur- [6] S. Tong and E. Chang, "Support vector machine active
thermore, the precision values under different pivot learning for image retrieval," in Proc. the ninth ACM inter-
counts are close to each other. This is a demonstration national conference on Multimedia, 2001, pp. 107-118.
[7] P. Ciaccia, M. Patella and P. Zezula, "M-tree: An effi-
that the retrieval algorithm proposed can reach a preci-
cient access method for similarity search in metric spaces,"
sion comparable to sequential scan and the number of in Proc. the 23rd International Conference on Very Large
the pivot count has little impacts on the retrieval preci- Data Bases, 1997, pp. 426-435.
sion. [8] H. Jagadish, B. Ooi, K. Tan, C. Yu and Z. R, "iDis-
Figure 6 shows the average coverage of the first tance: An adaptive B+-tree based indexing method for near-
three rounds of feedback for various labeling counts est neighbor search," ACM Trans. on Data Base Systems,
and pivot counts. It can be seen that the coverage de- vol.30, pp. 364-397, 2005.
creases dramatically with the increasing of the pivot [9] J. C. Burges, "A Tutorial on Support Vector Machines
count. When the pivot count is no less than 30, the for Pattern Recognition," Data Mining and Knowledge Dis-
covery, vol.2, 1998.
coverage will be less than 15%. When pivot count is
[10] A. Nafte and S. Khalid, "Motion Trajectory Learning
larger than 50, the coverage is only about 5%. So, the in the DFT-Coefficient Feature Space," in Proc. the 4th
proposed algorithm can perform the retrieval by IEEE International Conference on Computer Vision Systems,
searching only a small portion of the database. The 2006, pp. 47-47.
more pivots are used the less objects are searched. [11] B. S. Manjunath and W. Y. Ma, "Texture Features for
From Figure 6, it can also be seen that the coverage Browsing and Retrieval of Image Data," IEEE Transactions
changes only slightly for various labeling counts. It on Pattern Analysis and Machine Intelligence, vol.18, pp.
demonstrates that the labeling count has little impacts 837-842, 1996.
on the coverage.
75
2008 International Conference on Intelligent Computation Technology and Automation
77
and the pheromone trail exists. In order to achieve the trade- should equal the final value from the O(n2 ) 1-tree calcula-
off between heuristic information and the pheromone, this tion.
paper introduces a new approach to adjust the parameters α
and β according the equation 7. Data: NBhd[i][] records the x nearest neighbors to
city i. ei j are the edge lengths of the original
α = C − di j /(Lbsp + di j + Lrsp ) (7) problem.
1 initialize city weights π(1) = (0, 0, ..., 0);
β = B + di j /(Lbsp + di j + Lrsp ) (8) 2 initialize subgraph Held-Karp lower bound (based on
20 nearest neighbours), HK(subgraph)=0;
In equation 7 and 8, parameter C and B are constant, and set 3 for m = 1 to M (M is the sequence length) do
to be 1, 5 correspondingly that are suggested to be advanta- 4 evaluate subgraph edge-weights
geous. Lbsp is the length of subtour visited by ant. Lrsp is cmi j = ei j + πi + π j ;
m m
the length of subtour not visited by ant except city i and j.
5 use Kruskal’s algorithm find MST(say S) on above
di j /(Lbsp + di j + Lrsp ) express the proportion of the selected
subgraph if it exists. Quit procedure if no MST;
edge to the optimal length. The tour is divided to three parts,
6 compute c(m) 1 j = e1 j + π1 + π j for all j ∈ Nbhd[1];
m m
which are demonstrated in the figure 1. Thus, the influence
between the heuristic information and the pheromone trail 7 find the two least c1 j over all j ∈ Nbhd[1] say
can be adjusted according to the equation 7 and 8. c1a , c1b ;
8 add the edges (1,a), (1,b) to the MST S = S m to
obtain a graph (say T = T (m) );
9 add the costs of these edges to obtain L(c(m) i j , T );
(m)
10 record vertex degrees d of 1-tree T;
compute w(π) = L(ci j )(m) − 2 π(m) ;
P
11
12 if w(π) > HK(subgraph) then
13 HK(subgraph) = w(π);
14 compute t(m) ;
15 update π(m + 1);
16 end
17 end
Figure 1. path divided into three parts 18 evaluate complete graph edge-weights
ci j = ei j + π(M+1)
i + π(M+1)
j , where 1 ≤ i ≤ j ≤ n ;
3.2 Held-Karp lower bound procedure 19 use Kruskals algorithm find MST (say S) on complete
graph
20 compute c1 j = e1 j + π1
(M+1)
Lrsp is the length of city unvisited by ant and the length + π(M+1)
j , for all 2 ≤ j ≤ n ;
is unknown. In the proposed selection mechanism defined 21 find the two least c1 j over all 2 ≤ j ≤ n (say c1a , c1b ) ;
in equation 7 and 8, the Lrsp needn’t calculate explicitly. 22 add the edges (1, a), (1, b) to the MST S to obtain a
78
the following:(ρ, Q, σ) = (0.5, 100, 6). 10 trails were ison between HK-ACO and Max-min ant system[12] are
conducted for each algorithm, and each trial consisted of listed in table 2. In this table, ”BEST” and ”AVG” repre-
10000 iterations. The comparative experiments are carried sent the shortest tour length, the average tour length over 10
out between HK-ACO and rank-based ant system[11], trails respectively.
which have been shown in figure 2. It has been shown from
figure 2 that HK-ACO outperforms ASrank algorithm.
We also tested the HK-ACO algorithm on krob200.tsp Table 1. HK-ACO solution quality
including 200 cities from the TSPLIB, the result was
Instance HK- HK-ACO MMAS MMAS
approximately consistent with the above described result,
(Opt) ACO (AVG) (BEST) (AVG)
in which introduction of using Held-Karp lower bound
(BEST)
improve the convergence rate.
d198 15780 15780 15780 15780.9
(15780)
lin318 42029 42051.3 42029 42051.8
(42029)
att532 27686 27702.6 27693 27707.4
(27686)
rat783 8808 8820 8808 8841
(8806)
dsj1000 18688548 18704324.1 18708266 18736562.2
(18659688)
pr1002 259176 259266.6 259290 260025
(259045)
vm1084 239321 239430 239321 239490.17
(239297)
Figure 2. Comparison between HK-ACO and pcb1173 56897 56970.5 56909 56949.4
ASrank on eil51.tsp case (56892)
d1291 50801 50808.4 50801 50847.7
(50801)
rl1304 252948 253159 252948 253528.17
(252948)
rl1323 270226 270568 270281 270725.5
(270199)
fl1400 20161 20228.45 20254 20299.17
(20127)
fl1577 22337 22412.83 22349 22423.67
(22249)
vm1748 336873 337105.07 337506 337772.83
(336556)
u1817 57294 57346.5 57314 57458.67
(57201)
79
HK-ACO demonstrates a stable characteristic in solving the [8] Manuel F orster, Bettina Bickel, Bernd Hardung, Gabriella
problem. On the other cases, both in the solution preci- K okai. Self-Adaptive Ant Colony Optimisation Applied to
sion and stability, the solution generated by HK-ACO is Function Allocation in Vehicle Networks. The Genetic and
better than max-min ant system. Therefore, observed from Evolutionary Computation Conference (GECCO-2007), July
the point described above, HK-ACO outperforms Max- 2007.
[9] VALENZUELA C.L., JONES A.J.. Estimating the Held-Karp
Min Ant system algorithm greatly, which indicates the ap-
lower bound for the geometric TSP. European journal of op-
proach to adjust the influence of heuristic information and erational research, 102(1): OCT, 1997.
pheromone is a potential effective way to improve the per- [10] G. Reinelt. TSPLIB - A traveling salesman library. ORSA
formance the ant colony system. Journal on Computing, 1991.
[11] Bullnheimer B., R. F. Hartl, C. Strauss A New Rank
Based Version of the Ant System: A Computational Study.
5. Conclusions Central European Journal for Operations Research and
Economics,7(1):25-38, 1999.
This study investigates an improved ant colony optimiza- [12] Sttzle T., M. Dorigo. ACO Algorithms for the Traveling
tion to the traveling salesman problem. For this purpose, Salesman Problem. K. Miettinen, M. Makela, P. Neittaan-
Held-Karp lower bound is adopted to improve the solution maki, J. Periaux, editors, Evolutionary Algorithms in Engi-
quality. The results showed that the average deviation neering and Computer Science,Wiley Press, USA, 1999.
from optimal solution can be decreased using the proposed
algorithm. Additionally, a new probability selection mech-
anism is utilized to accelerate the algorithm convergence.
The feasibility and effectiveness of proposed algorithm are
verified through the Traveling Salesman Problem, which is
a classical NP-hard combinatorial optimization problem.
The experiments demonstrate that the proposed algorithm
is an effective algorithm for the traveling salesman problem.
References
80
2008 International Conference on Intelligent Computation Technology and Automation
PENG Yong
Traffic & Transportation School, Chongqing Jiaotong Univ., Chongqing 400074, China
pyepeng@hotmail.com
∑ ∑
j∈N i∈N ∪ K
q j xijk ≤ Qk , k ∈ M (4)
∑ (( ∑ ∑
k∈M j∈N i∈N ∪ K
q j xijk ) ∑
i∈N ∪ K
xilk ) ≤ Ql , l ∈ K (5)
∑
i∈N ∪ K
xijk = ∑
i∈N ∪ K
x jik , j ∈ N ∪ K , k ∈ M (6)
∑ ∑
k∈M i∈N ∪ K
xijk = 1, j ∈ N (7)
∑ ∑
j∈K i∈N ∪ K
x jik ≤ 1, k ∈ M (8)
∑∑x
k∈M i , j∈U
ijk ≤| U | −1, ∀U ⊆ N (9)
82
Rule 4: If there doesn’t have one vehicle from depot A }
to the first customer next it, vehicle A (the extra }
vehicle for depot A) will be selected to provide service
for these customers. 4. Numerical example
Rule 5: If there doesn’t have any customer from
vehicle B to the next vehicle or to the depot next it, or Provided that there are 5 potential depots and 20
to the end, vehicle B will not be selected. customers. All the information is shown as follow.
Table 1 Customer Data
3.2. Fitness function Index Location Demand Index Location Demand
The fitness function is given by the following 1 (69,13) 2 11 (74,15) 4
2 (30,19) 3 12 (63,99) 2
equation: 3 (22,73) 1 13 (12,10) 4
fitness z = ∑∑∑ cijk dij + ∑ C j Aj + ∑ Ck Bk + ψ 4 (57,23) 4 14 (103,105) 4
5 (55,17) 4 15 (71,59) 5
Where, ψ is a large number if constraints (4) or 6
7
(49,5)
(19,36)
5
3
16
17
(94,67)
(43,8)
4
2
constraints (5) are violated. Otherwise, ψ = 0. 8 (38,68) 4 18 (90,81) 5
9 (67,68) 4 19 (93,37) 3
10 (38,8) 3 20 (65,17) 4
3.3. GA algorithm
Table 2 Depot Data
Now, we can provide the GA algorithm based on Index Location Capacity
Inver-over operator[11] as follows. 1 (98,85) 50
2 (58,36) 50
Random initialization of the population P , and 3 (97,85) 50
calculating the fitness values of individuals 4 (11,14) 50
5 (75,16) 50
While (not satified termination-condition) do
{ Table 3 Model Parameter Settings
Parameter Value
For each individual S k ∈ P do Vehicle Capacity 15
Cost for Opening One Depot 2000
{ Cost for Selecting One Vehicle 20
S ' = Sk Transportation Cost (per unit) 0.1
Let population size be 80, maximum generation be
Select (randomly) a number i from S '
Repeat 1000, and p = 0.2 (the selection probability our GA
{ based on Inver-operator needs). With our GA, the
If ( rand ≤ p ) result suggests that we can open depots at (58,36) and
(97,85). The total cost of the optimal cost is $4185.4.
Select the number j from the remaining The routes are:
numbers in S ' depot 3 → customer16 → customer18 → customer14 → depot 3 ;
Else depot3 →customer17 →customer13 →customer2 →customer10 →customer3→customer12 →depot3
{ depot 3 → customer 7 → customer 4 → customer 5 → customer 20 → depot 3
Select (randomly) an individual from P depot 2 → customer 8 → customer15 → customer 9 → depot 2
Assign to j the ‘next’ number to the depot 2 → customer19 → customer11 → customer1 → customer 6 → depot 2
number i in the selected individual Figure 3 shows the change of best fitness of
populations with the generations.
}
If (the next number or the previous number of
number i in S ' is j )
Exit from repeat loop
Inverse the section from the next number of
number i to the number j in S '
i= j
}
Calculate the fitness value of S ' ( fit ( S ') )
If (fit ( S ') ≤ fit ( Sk ) )
Sk = S '
83
[7] Laporte,G. and Y.Nobert, “A branch and bound algorithm
for the capacitated vehicle routing problem”, Operations
Research Spektrum, 5, 1983, pp. 77-85.
5. Conclusion
For logistics providers, one of the most important
strategic decisions to be taken in the design of logistic
systems concerns the location of facilities. The other
important strategic decision is the structure and
management of the fleets. This paper combines the two
problems together. And a GA is developed to find the
integrated solution with the minimal location and
delivery cost. At last, our GA is used to solve a
numerical example.
10. References
[1] Cornuejols,G., R.Sridharan, and J.M.Thizy, “A
comparison of heuristics and relaxations for the capacitated
location problem”, European Journal of Operational
Research, 1991, 50, pp. 280-297.
84
2008 International Conference on Intelligent Computation Technology and Automation
Abstract in the first stage, and then all issues will be negotiated
at the same time in the second stage. This method is
A GA-based multilateral multi-issue automated less efficient. [8] presents a GA-based negotiation
negotiation model has been proposed. It dynamically framework and designs an effective experimental
estimates the opponent’s preference according to the method, but it can not dynamically estimate the
change of the opponent’s offer in the process of opponent’s preference. We propose a GA-based
negotiation and finally accelerates agents to reach an multilateral multi-issue automated negotiation model
agreement. Experimental results show that agents can that can solve these problems. The remaining part of
reach an agreement in a short time using this model, this paper will describe the negotiation model in
and the total utility of all agents approximates the section 2, then present experimental analysis in section
highest social utility. 3, and summarize our work in section 4.
86
Τ(t ) is the time factor whose value range is Step 1: Calculate the influence degree of an issue
1 on the opponent. If an issue value changes greatly in
two consecutive offers, this issue has less influence on
[0,1] . Τ(t ) = 1 − (t tadeadline ) β a , where t is the current the opponent’s utility, then the weight of this issue
round number of the negotiation, and t adeadline is the should be small, and vice versa. Therefore the change
extent of the issue value is inversely proportional to the
negotiation deadline for agent a . Ifβ a > 1 , agent a influence degree of it on the opponent and is inversely
is eager to compromise(Conceder). If β a = 1 , agent a proportional to the weight of this issue. The influence
degree is defined as:
compromise linearly(Linear), and if 0 < β a < 1 , offernew offerold
Φ iak − Φ iak
agent a does not compromise as time goes on deg ree(ik ) = 1 − max min
, where
(Boulware) . Φ iak − Φ iak
Utility function U has been defined in definition 3, G
1 ≤ k ≤ n, ik ∈ I .
here offer is the value vector of an offer. Step 2: Estimate the approximate weight.
v −v
im immin deg ree(ik ) G
Let Φ iam = a a
, where Φ iam ∈ [0,1] , vaim , woik = n
, where 1 ≤ k ≤ n, ik ∈ I . At
∑ deg ree(i )
max
immin
vaim − v a j
immin immax j =1
v a and v a are the current , the minimum and the
this point, the estimate of the opponent’s preference
maximum value of issue im respectively. offer max has been completed. Only with the opponent’s
approximate preference information, it is possible to
( offer min ) is the value vector of the offer which calculate more accurately the distance between the
offer and the opponent’s and effectively compromise to
makes agent a get maximum (minimum) utility.
achieve a ‘win-win’. Here, the opponent’s offer
offer opponent is the value vector of the opponent’s recorded by an agent is referred to the best offer in all
offer. the opponents’ proposals in each round. Consequently
The distance of two offers is defined as an agent can only generate an offer and sent it to all
opponents in each round.
n
∑w
offer 1 offer 2
dist (offer1, offer 2) = ik
o (Φ iak − Φ iak )2 2.3.3. Genetic operation. In this paper, the steps of the
k =1
genetic operation to generate the offer are designed as
, where wok (1 ≤ k ≤ n) is the opponent’s preference
i
follows:
weight estimated according to the change of the (1) Generate initial population, including one
opponent’s offer in the process of negotiation highest utility chromosome for agent a and n − 1
∑
n chromosomes whose second parts are randomly
and woik = 1 . Because some issues do a greater
k =1 selected from Ω1 × Ω 2 × " × Ω n .
impact on an agent’s utility while others do a smaller (2) Calculate the fitness of the chromosomes in the
impact on it, the agent will do less or more comprise population, and sort the chromosomes in terms of the
accordingly in order to guarantee the agent’s own fitness value.
utility and a successful negotiation. Therefore it is (3) Determine whether meet the termination
feasible to estimate the opponent's preference by condition. If meet, go to (6); else go to (4).
observing changes of each issue’s value in the (4) Generate the next generation population.
offernew
opponent’s two offers. Let Φ iak be the issue i k ’s (4.1) Select x % highest fitness chromosomes
utility in the offer which is proposed by the opponent from the present generation to directly reproduce the
offerold next generation.
in current round, Φ iak be the issue i k ’s utility in (4.2) Select chromosomes for reproduction
the offer which is proposed by the opponent in last (denoted as RC).
max min (4.3) Determine whether the number of
round, andΦ iak , Φ iak denote the maximal and the chromosomes in the next generation is n . If it is n , go
minimal utility respectively, wo is calculated as to (5); else go to (4.4).
follows: (4.4) Generate the next generation chromosomes
according to the crossover probability and method.
87
(4.5) Generate the next generation chromosomes seller agents in the experiments. Each buyer (seller)
according to the mutation probability and method. needs to buy (sell) a commodity which has five
(4.6) Generate the next generation chromosomes attributes (issues) to be negotiated, and the value of
according to the clone probability, and then go to (4.3). each attribute is from the set {1, 2 ,3 , 4 ,5} .The buyers
(5) Calculate the fitness of each chromosome in the (sellers) prefer smaller (bigger) attributes values. There
new generation and sort these chromosomes according are 5 5 = 3125 possible offers for each agent and the
to the fitness value, and then go to (3). accepted offers exist for the same issues and value
(6) Output the highest fitness chromosomes as the range. The agent parameters are shown in Table 1.
offer of this negotiation round and end genetic
operation.
Table 1. Agent parameters
When the difference between the two highest Preference type w of Buyer Agent w of Seller Agent
fitness values of two consecutive evolutions is smaller Contrary {0.1, 0.2, 0.3, 0.1, 0.3} {0.5, 0.1, 0.1, 0.2, 0.1}
than a very small number δ , the evolution is Contrary {0.1, 0.9, 0, 0, 0} {0.9, 0.1, 0, 0, 0}
Similar {0.3, 0.2, 0.1, 0.3, 0.1} {0.5, 0.1, 0.1, 0.2, 0.1}
terminated.
Similar {0.3, 0.2, 0.3, 0.1, 0.1} {0.3, 0.1, 0.3, 0.2, 0.1}
The choice of RC is using championship selection Same {0.5, 0.1, 0.1, 0.2, 0.1} {0.5, 0.1, 0.1, 0.2, 0.1}
by which a certain number (Tour) chromosomes are
randomly selected from the population, and then the In the fitness function, α is 0.8, β is 1 and
best chromosome will be selected as the father
chromosome. This process is repeated until the t deadline is 100 for both buyer agents and seller agents.
chromosomes choice completes. Using two points The number of the chromosomes in population is 80,
cross, crossover operation can randomly generate two the parameter Tour of the championship selection is 2,
cross positions in the second part of the chromosomes. the number of RC is 50, the probability of the direct
The issues values between the two cross positions of chromosome replication is 0.1, the probability of the
the father chromosomes are exchanged one by one and crossover is 0.8, the probability of the mutation is 0.05,
the remaining issue values are unchanged to generate and the probability of clone is 0.1.
two new descendants. Mutation operation randomly The first experiment uses the five groups of w in
generates a new value within its value range for each Table 1. It tests 10 times and calculates the average
issue value from the second part of father chromosome, social utility for each group. The result is shown in
by which new chromosomes are generated. Clone Figure 3 where GA denotes the negotiation model
operation randomly replicates some chromosomes as without dynamically estimating preference through
new descendants from RC. studying, GA* denotes the negotiation model with
studying proposed in our paper, and optimization
2.4. Offer evaluation strategy denotes the theoretic optimal value. The results of our
negotiation model approximate to the optimal solution
Offer evaluation is defined as in terms of different preference types.
⎧accept if (U a (incomeoffer ) ≥ U a ( selfoffer ))
⎪
E a = ⎨quit if ((U a (incomeoffer ) < U a ( selfoffer )) ∧ (t ≥ t adeadline ))
⎪refuse otherwise
⎩
, where E a denotes evaluation result. If the utility of
the offer received by agent a is not smaller than the
utility of the offer proposed by agent a in the current
round, negotiation is successful; if agent a doesn’t
accept the received offer and the current round is
agent a ’s deadline, agent a will quit the negotiation
and the negotiation is failure; otherwise this offer is
refused and new offer will be generated through
studying. Figure 3. The compare of social utility
3. Experiments and analysis The second experiment uses the first four groups of
w in table 1 to test the seller’s preference. As is shown
In this paper, the experiments adopt the method in Figure 4, although the preferences dynamically
from R.Y.K. Lau. There are two buyer agents and two estimated and the actual values are different, the trends
of them are consistent.
88
relation, reputation and other attributes to the
negotiation model is another problem we will research.
References
[1] J.S. Rosenschein, G. Zlotkin, Rules of Encounter:
Designing Conventions for Automated Negotiation among
Computers, MIT Press, Cambridge MA, USA , 1994.
The third experiment where the first deadline is set [4] S.D. Ramchurn, C. Sierra, L. Godo, N.R. Jennings,
as 100 rounds and the second deadline is set as 1000 “Negotiating using Rewards”, Artificial Intelligence, Elsevier
rounds adopts the parameters given in Table 1. Testing Science Publishers Ltd., Essex, UK , 2007, 171(10-15), pp.
each group’s preferences 10 times, we can get the 805-837.
average time used by the negotiation. As is shown in
Figure 5, if the preferences are contrary, the [5] I. Rahwan, L. Sonenberg, N.R. Jennings, P. McBurney,
“STRATUM: A Methodology for Designing Heuristic Agent
negotiation reaches an agreement easily, and if the Negotiation Strategies”, Applied Artificial Intelligence,
preferences are similar, the negotiation spends more Taylor & Francis Group, London, UK, 2007, 21(6), pp. 489-
time. In general, no matter what deadlines are, our 527.
model can return the negotiation output in a relatively
short period of time. [6] X. Niu, Y. Wang, Q. Deng, “A Solution Based on GA for
Automatic Negotiation”, Computer Engineering and
Applications, Publishing House of Journal of Computer
Engineering and Applications, Beijing, China, 2005, 41(24),
pp. 197-200. (in Chinese)
89
2008 International Conference on Intelligent Computation Technology and Automation
College of Aerospace and Material Engineering, NUDT, Changsha, Hunan 410073, China
E-MAIL: gkbatchelor@gmail.com
Abstract: In this paper, a modified Pareto Differential In this paper, a modified version of PDE was suggested
Evolution algorithm approach is introduced to solve and its performance was evaluated, the ZDT benchmarks
multi-objective optimization problems. The modified were chosen as test functions.
approach including: improving the crowding mechanism by The paper was organized as follows: Section 2 shortly
introducing the Niche theory, introducing a time variant summarizes the differential evolution. The third section
scaling factor F, and using a simple but efficient mutation describes the modified measures this paper adopted and
operator which combines information of the both better and section 4 briefly discusses the characteristics of the test
worse solution in the population. The performance of the functions. Next, Section 5 presents results showing how MP
MDE is measured on the set of ZDT benchmark functions on DE performed on the functions. The final section briefly
multi-objective optimization. summarizes modified DE’s performance.
91
figure 1. to eliminate unfeasible solution (take minimize problem for
First, the population was sorted according to each example):
objective function value in ascending order of magnitude. if |A.f1 - B.f1| < ε
Then, for each objective function, the boundary solutions
(solutions with smallest and largest function values) are if A.f 2 < B.f 2 delete B
assigned an infinite distance value. All other intermediate else delete A
solutions are assigned a distance value equal to the absolute
normalized difference in the function values of two adjacent
else continue
solutions. This calculation is continued with other objective
ε was a small number that prescribed by programmer. In
functions. The overall crowding-distance value is calculated this case, only one solution would be preserved in distance ε
as the sum of individual distance values corresponding to that would guarantee the diversity of the population.
each objective. This calculation is continued with other When filtered, the population was ranked with the
objective functions. The overall crowding-distance value is fast-non-dominated-sorted algorithm to carry through the
calculated as the sum of individual distance values evolution. Numerical experiment showed that the algorithm
corresponding to each objective. eliminated the unfeasible solution effectively, it has higher
computational efficiency and can obtain a reasonable
distributing solution; it can also maintain the solutions’
diversity.
92
set to a fixed number 0.9 for all functions[10]. MOEA.
When it comes to F , while F > 1 can solve many Each of the test functions defined below is structured in
problems, F < 1 is usually both faster and more reliable. the same manner and consists itself of three functions f1 , g , h :
Like Np , F must be above a certain critical value to avoid Minimize T ( X ) = ( f1 ( x1 ) , f 2 ( X ) )
premature convergence to a sub-optimal solution, but if F
Subject to f 2 ( X ) = g ( x2 , , xm ) h ( f1 ( x1 ) , g ( x2 , , xm ) )
becomes too large, the number of function evaluations to find
the optimum grows very quickly. Typically, 0.4 < F < 0.95 , with where X = ( x1 , x2 , , xm )
F = 0.9 being a good compromise between speed and The function f1 is a function of the first decision
probability of convergence. To speed up the convergence of variable only, g is a function of the remaining m variables,
DE algorithm, time variant F is introduced, it varies linearly and the parameters of h are the function values of f1 and g .
with time as follows:
Generation
The test functions differ in these three functions as well as in
F = Fmax − × ( Fmax − Fmin ) the number of variables m and in the values the variables may
MaxGeneration
Where Generation is the current iteration number, take.
The test function T1 has a convex Pareto-optimal front:
MaxGeneration is the maximum number of iterations allowed
and Fmax , Fmin denote, respectively, the maximum and f1 ( x1 ) = x1
minimum value of the weight, with Fmin , Fmax ∈ ( 0,1) . Thus the g ( x2 ,..., xm ) = 1 + 9 * ∑ im=2 xi / ( m − 1)
Generation increases towards MaxGeneration , F decreases where m = 30, and xi ∈ [0,1], i = 1, 2,..., m The Pareto-optimal front is
gradually and ultimately when Generation = MaxGeneration , formed with g ( X ) = 1 .
F reaches Fmin . Therefore at the beginning, emphasis is laid on The test function T2 has a nonconvex counterpart to T1 :
the global model, but with time, contribution from the local f1 ( x1 ) = x1
mutation scheme increases. In the beginning, large F makes g ( x2 ,..., xm ) = 1 + 9 * ∑ im=2 xi / ( m − 1)
local search towards a single point of the search space is
h ( f1 , g ) = 1 − ( f1 / g )
2
93
the nonuniformity of the search space: first, the
Pareto-optimal solutions are nonuniformly distributed along
the global Pareto front (the front is biased for solutions for
which f1 ( X ) is near one); second, the density of the
solutions is lowest near the Pareto-optimal front and highest
away from the front:
f1 ( x1 ) = 1 − exp ( −4 x1 ) sin 6 ( 6π x1 )
g ( x2 ,..., xm ) = 1 + ( 9 * ∑ im=2 xi / ( m − 1) )
0.25
h ( f1 , g ) = 1 − ( f1 / g )
2
6 Summary
In this paper, a modified Pareto Differential Evolutionary
algorithm based on DE/rand/1 version is suggested. First, the
crowding mechanism is improved by introducing the Niche
theory. The modified DE approach is introducing a time
variant scaling factor F, and using a simple but efficient
Figure 3. Distance metric[9] mutation operator which combines information of the both
The second metric Δ measures the extent of spread better and worse solution in the population The validity of the
achieved among the obtained solutions. It can be measured by algorithm in this paper has been showed by the examination
|Z |−1
d f − dl + ∑ | di − d | of the five ZDT test functions and the comparing of the other
Δ= i =1 MOEA examination results and analyses.
d f + dl + (| Z | −1)d
the parameters d f and dl are the Euclidean distances between References
the extreme solutions and the boundary solutions of the
obtained nondominated set, as depicted in Figure 4. The [1] Horn, Nafpliotis, Goldberg. A niched Pareto genetic
smaller the value of Δ is, the better the diversity of Pareto algorithm for multiobjective optimization[C]
solution is. IEEE.Proceedings of the First IEEE Conference on
94
Evolutionary Computation. Piscataway: IEEE 2002
Service Center 1994 [7] Storn, Price. Differential Evolution - a fast and
[2] Schaffer. Multiple objective optimization with vector efficient heuristic for global optimization over
evaluated genetic algorithms[C] Proceedings of the continuous spaces [J]. Journal of Global
1st International Conference on Genetic Algorithms. Optimization 1997, 11.
Mahwah: Lawrence Erlbaum Associates, Inc. 1985 [8] Storn. System Design by Constraint Adaptation and
[3] Srinivas.N, Deb.K. Multiobjective optimization Differential Evolution [J]. IEEE Transactions on
using non-dominated sorting in genetic algorithms Evolutionary Computation, 1999, 3.
[J]. Evolutionary Computation, 1994, 2 (3). [9] K. Deb, A. Pratap, S. Agrawal, et al. A Fast and
[4] Zitzler.E, Laumanns.M, Thiele.L. SPEA2: Elitist Multi-Objective Genetic Algorithm: NSGA-II
Improving the strength Pareto evolutionary [R]. KanGAL Report No. 200001. 2000.
algorithm [R].Swiss Federal Institute of Technology. [10] Ronkkonen J, Kukkonen S, Kenneth V. Price. .
2001. Real-Parameter Optimization with Differential
[5] Abbass H A, Sarkar R, Newton. C. A pareto Evolution[C] CEC2005. 2005
differential evolution approach to vector [11] Zitzler.E, Deb.K, Thiele.L. Comparison of
optimization problems.[C] The IEEE Congress on multiobjective evolutionary algorithms: Empirical
Evolutionary Computation. Seoul, Korea, 2001 results [J]. Evolutionary Computation, 2000, 8 (2).
[6] Madavan. Multiobjective optimization using a Pareto
differential evolution approach[C] Proc. of IEEE
Congress on Evolutionary Computation. Honolulu
95
2008 International Conference on Intelligent Computation Technology and Automation
Evolution Concept
97
⎡cos(θ ) − sin(θ )⎤ In order to correspond to the quantum angle, the
operator is designed: U (θ ) = ⎢ ⎥
⎣ sin(θ ) cos(θ ) ⎦ range of the particle is set in [-π/2,0]. It can make the
(8) particle Pi correspond to cos(Pi) .
Table 1
4.3 Updating velocity
xi besti f(x)> Δθ S(αi,βi)
f(best) in order to avoid the local optima, a new velocity
αiβi>0 αiβi<0 αi=0 βi=0 update is proposed as the following :
0 0 false 0 0 0 0 0 Vid = w *Vid + c1 * r1 * ( Pid − X id ) +
0 0 true 0 0 0 0 0
c 2 * r2 * ( Pgd − X id ) + xor ( Pid* , Pgd
*
) ⋅ ( Pgd
*
− Pgd
*
) ⋅ 0.01π
0 1 false 0 0 0 0 0
+ and ( Pid* , Pgd
*
) ⋅ ( −0.01π )
0 1 true 0.01π -1 +1 ±1 0
1 0 false 0.01π -1 +1 ±1 0 (9)
1 0 true 0.01π +1 -1 0 ±1 where
1 1 false 0.01π +1 -1 0 ±1 xor (⋅,⋅) is logic exclusive-Or operator;
1 1 true 0.01π +1 -1 0 ±1 ( ) is logic not operator
The above represents the quantum rotation gate,the
rotation angle of θ can be obtained from table and (⋅,⋅) is logic and operator
1.where xi is the i-th bit of current solution . best i
Pid* is the d-th dimension value of i-th particle
is the i-th bit of the best solution ; f (x) is the fitness
function. Δθ is the rotation angle. s (α i β i ) is the through observing the particles
rotation orientation *
Pgd is the d-th dimension value of best particle
98
5. Results
f ( x) = ∑p x
i =1
i i (10)
subject to
m
∑w x
Figure 1 Comparison of IQPSO,QEA,QPSO,BDPSO
i i ≤C
i =1
on knapsack problem
∑w
1 local optima. Thirdly, under the thought of quantum
C= i (11)
2 i =1 evolution, the particle can be transferred from decimal
code to binary code, so the algorithm can be used to
2)Experiment results
solve the discrete problem. From the experiment, we
In the experiment, the knapsack problem is set to
can learn that the algorithm can realize global optima
50 items for finding the best value. The population
effectively.
size is set to 25. And the number of generation is 1000.
and the number of loop is 10.
References
In figure1, QEA represents quantum evolution
algorithm. QPSO represents the particle swarm
[1] James Kennedy , Russell Eberhart . Particle
optimization with the velocity update ( 1 ) ,IQPSO
Swarm Optimization, In: IEEE Int’1 Conference on
represents the improved particle swarm optimization
Neural Networks ,Perth , Australia, 1995: 1942-1948
based on quantum evolution proposed in the paper.
[2] Shi,Y.H.Eberhar, R C, A Modified Particle Swarm
From figure1, we can learn that the IQPSO has a good
Optimizern , IEEE International Conference on
performance.
Evolutionary Computation,,Anchorage ,1998:68-73
[3] EBERHART C, SHI Y. Comparing inertia weights
and constriction factors in particle swarm optimization.
99
Proceedings of the 2000 International Congress on
Evolutionary Computation(San Diego,Calfornia),IEEE
Service Center, Piscataway, NJ,2000
[4] Zhang Wei, Simulation of Dynamic Fault for
Liquid Propellant Missile Whole Power System,
Journal of system simulation,2003,Vol.15,No
9,p1205-1207
[5] Zhang Yulin, Wu Jianjun. Fault monitoring
technology of Liquid Propellant Engine.Edition No.1,
publishing company of national defense science and
technology university, 1998, p42~45
[6] Jiao Licheng, Du HaiFeng, Liu Fang, Immune
Optimization Computation, learning and recognition,
Edition No.1, publishing company of science, 2006,
p59~69
[7] Keiichiro Yasuda, Nobuhiro Iwasaki,Adaptive
Particle Swarm Optimization using Velocity
Information of Swarm,IEEE International Conference
on Systems Man and Cybermetics.,2004,p3475~3481.
[8]Xi-Huai Wang,Jun-jun Li, Hybrid particle swarm
optimization with simulated annealing, Third
International Conference on Machine Learning and
Cybernectis, Shanghai,2004,p2402~2405
100
2008 International Conference on Intelligent Computation Technology and Automation
Liu Jian*, Senior Member, IEEE, Li Zengli, Wang Jianxin, Lu Wei and Li Zhizhong
Xi’an University of Science and Technology, Xi’an, Shaanxi, 710054, China
*E-mail:edliu@bylink.com.cn
102
Step 5: Calculate the averaged relative error e(%) of Therefore, the resulted optimal allocation of test
each branch according to b1 and b̂1 . If the e(%) of a poles is the scheme that makes all of the branches clear
branch is less than the given threshold, it is a clear with the least test poles and is the least sensitive to test
branch. Otherwise, it is an unknown branch. In this errors.
step, augmented branches are not considered. 4.2. Genetic algorithm based sub-process
3.4. Iteration approach of testability evaluation In the proposed genetic algorithm based sub-process,
It is found that to evaluate the testability for just a binary codification is used. As for a grounding grid
once is not enough. Thus, an iteration approach of with N nodes, each chromosome, in another word,
testability evaluation is suggested, the steps of which each individual, consists of N binary codes. An
are as follows. individual is a set of binary codes, which is denoted by
Step 1: Clear the queue Q1 and Q2. C= {c1 c2,…,cN}. ci = 1 indicates that there is a test
Step 2: Testability evaluation by Rule 1 to 6 and put
pole at the i-th node. ci = 1 indicates that there is no
the clear branches into Q2.
Step 3: If Q1=Q2, the branches in Q1 are clear, and test pole at the i-th node.
testability evaluation is completed. Otherwise, let As for a certain sub-process, the number of test
Q1=Q2, return to Step 2. poles, i.e., M is given. Thus, the individual should be
Testability evaluation is committed on the restricted to the constraint as (1), other wise it is an un-
grounding grid in Fig.1, in the results of which, the feasible solution.
clear branches are shown by hollow rectangles and the Ci = 0 (1)
uncertain branches are shown by shadow rectangles. In order to avoid of the un-feasible solution, each
individual in the initial population is suggested to be
4. GA based optimal allocation of test poles generated by the following steps:
Step 1: Let k=1, reset the flags of all codes to “un-
4.1. Basic principle selected”.
Step 2: Select a code position randomly from the
The major steps of the proposed test poles optimal “un-selected” codes, set the state of the code “1” and
allocation approach for a grounding grid with B set the corresponding flag to “selected”.
branches are as follows: Step 3: If k=M, the desired individual is formed,
Step 1: Set the initial number of test poles according escape. Otherwise, k=k+1, return to Step 2.
to experience, which is denoted by M, Clear the flag F. The fitness function, i.e., the object of the
Step 2: Commit the genetic algorithm based sub- optimization, is to make the number of clear branches
process to search for the best allocation of the M test as much as possible, which can be formulated by
poles to make the number of clear branches as much as B
possible. The resulted allocation scheme is Copt ( M ) , Max f = ∑ bi (2)
i =1
the corresponding number of clear branches, i.e., the
fitness function is f ( M ) . Where,
Step 3: If f ( M ) = B , it means that all of the
branches are clear. Save some—generally, no more
bi = { 1
0
if the i-th branch is clear
if the i-th branch is uncertain (3)
than ten-allocation schemes without uncertain The testability evaluation should be carried out for
branches into the buffer. Commit Step 4 to check each individual so as to calculate the fitness function.
whether M is too large. The operators of reproduction, crossover and
If f ( M ) < B and F=0, let M=M+1, return to Step 2. mutation are used in the process.
In order to avoid of the un-feasible solution, the
If f ( M ) < B and F=1, the schemes in the buffer are crossover of two individuals is suggested to take the
the candidate optimal allocations. Commit Step 5. following steps:
Step 4: M=M-1, let F=1, return to Step 2. Step 1: Select the position of crossover randomly.
Step 5: Evaluate the anti-disturbance performance of Step 2: If the numbers of “1” before the position of
the schemes in the buffer and select the scheme with crossover of the two individuals are the same, commit
the most robust behavior against testing errors as the this crossover immediately and escape. Otherwise, go
optimal allocation. Above process is called the most to step 3.
robust scheme selection, which will be detailed in Step 3: Shift the position of crossover to its left
section C. adjacent code position and return to Step 2.
103
Above process is called the left crossover process. i.e., scheme A is approximately the same as scheme
The right crossover process is similar and not detailed. B.
In practice, both crossover processes may be In (7) to (9), α is the believe level, usually valued as
committed on a couple of individuals. 95%. nA and nB are the sample numbers of scheme A
The bi-codes mutation methodology is also
suggested to avoid of the unfeasible solution. Once a and B, respectively.
code is changed from “1” or “0” to “0” or “1”, another The best scheme is selected from the individuals in
code should be randomly selected to change from “0” the buffer obtained by GA according to the following
or “1” to “1” or “0”. steps:
Once the desired number of population is reached or Step 1: Set the initial value of sample number n(0).
all of the branches are clear, the genetic algorithm Queue the individuals randomly forming Q (0). k=1.
based sub-process may be escaped. Step 2: Compare the performance of each two
individuals in the buffer according to (7) to (9),
4.3. Most robust scheme selection respectively. Queue the individuals in the order of
performance forming Q (k).
The task of the process described in this section is to
select a scheme with the best anti-disturbance Step 3: If Q
(k )
− Q ( k −1) < ε , then go to Step 4;
performance from the individuals in the buffer. otherwise, k=k+1, n (k) =n (k-1) +n (0), return to Step 2.
Therefore, evaluation of the anti-disturbance (k )
performance is the key work. Step 4: Select the first individual in Q as the
A Monte-Carlo based approach is used to evaluate optimal scheme with the best anti-disturbance
the robust scheme, in which, both the branch performance.
resistances and the disturbance are set randomly for
each sample. 5. An example
As for the i-th branch, the averaged absolute relative
error under the disturbance of ±τ% in the test is The grounding grid with sixty branches shown in
1 K Rˆ i ( k ) − R ( k ) Fig.2 is used as an example. The number beside each
μi ( ±τ %) = ∑
K k =1 R (k )
i
(4) node is the sequence number of it.
i With the GA based approach described in section
Where, Rˆi ( k ) and Ri ( k ) are the evaluated IV, we may obtain the ten final individuals of test pole
allocation scheme, which are put into the buffer and
resistance and the exact resistance of the k-th sample listed in Table 1. In each scheme, twenty-one
of the i-th branch. K is the number of samples. touchable nodes are needed.
The averaged absolute relative error of the 1 2 3 4 5 6
grounding grid is
B
1
∑
8 9 10 11
μ ( ±τ % ) = μ i ( ±τ % ) (5) 7 12
B i =1 14 15 16 17
13 18
The evaluated variance of μi (±τ %) is
20 21 22 23
B 19 24
1
σˆ (±τ %) = ∑ [ μ (±τ %) − μ (±τ %)]
2 2
(6) 26 27 28 29
B − 1 k =1
i
25 30
The approach of homogeneity test for variance, i.e.,
the F test, is introduced to compare the performance. 31 32 33 34 35 36
As for two schemes of A and B, the comparison is
Fig.2 An example grounding grid
based on the following principles.
If σˆ A2 σˆB2 > Fα (nA −1, nB − 2) , then σ A2 > σ B2 (7) Table 1 Ten individuals of test pole allocation
Groups Test poles allocation
i.e., scheme B is better than scheme A.
If σˆB2 σˆ A2 > Fα (nB −1, nA − 2) , then σ B2 > σ A2 (8)
1 1,2,3,5,6,9,10,11,14,17,19,22,24,25,26,27,28,29,30,31,36
2 1,3,4,5,6,7,11,12,15,16,18,19,20,22,24,25,28,29,30,31,36
i.e., scheme A is better than scheme B.
3 1,3,4,6,7,11,12,13,15,16,18,19,20,22,24,25,28,29,30,31,36
If σˆA2 σˆB2 ≤ Fα (nA −1, nB −2) and 4 1,3,4,6,7,10,12,14,17,18,19,20,22,24,25,26,27,28,30,31,36
σˆB2 σˆA2 ≤ Fα (nB −1, nA −2) , then σ B2 ≈ σ A2 (9) 5 1,3,5,6,7,10,11,13,15,16,17,18,19,21,24,26,30,31,32,33,36
6 1,2,5,6,8,11,12,13,16,19,20,21,22,23,24,26,30,31,32,33,36
104
7 1,3,6,7,10,12,14,16,17,18,20,21,25,26,28,29,31,32,34,35,36 conductor[J].IEEE Trans. Power Delivery, 1986, 1(1):112-
119.
8 1,3,5,6,7,8,16,18,19,21,22,23,24,25,26,29,31,33,34,35,36 [2] Zhang Bo, Zhao Zhibin, Cui Xiang, et al. Diagnosis of
9 1,3,4,5,6,7,10,13,16,18,21,24,25,26,28,29,31,32,33,35,36 breaks in substation’s grounding grid by using the
10 1,2,3,4,5,6,13,14,16,18,21,24,25,26,28,29,31,32,33,35,36 Electromagnetic method[J]. IEEE trans. Magnetics, 2002,
38(2):473-476.
Results of robust evaluation of the ten feasible test [3] Hu Jun, Zhang Rong, He Jinliang, et al. “Novel method
pole allocation schemes under the disturbance of ±5% of corrosion diagnosis for grounding grid” [C] ,in proc. of
the 2000 International Conference on Power System
are showed in the test. When the sample number
Technology, pp.1365-1370.
reaches fifty, the queue of the individuals is [4] Zhang Xiaoling, Huang Qingyang, “Fault diagnosis of
convergent. According to the comparison results, the grounding grid of electric power plants and substations” [J],
fourth scheme of test pole allocation is the optimal Proceedings of the EPSA, vol.14,pp.48-51,Jan.2002, in
since it is the least sensitive to the disturbance in the Chinese.
test. The optimal scheme of test pole allocation is [5] Xiao Xinhua, Liu Hua, Chen Xianlu, et al. “Analysis of
shown in Fig.2, in which, the touchable nodes are theory and method about the corrosion as well as the broken
indicated by solid spots. point of the grounding grid” [J]. Journal of Chongqing
Experiments are made on the grounding grid with University, Vol. 24, pp.72-75, Mar. 2001, in Chinese.
[6] Zhang Xiaoling, Chen Xianlu, “The technique of the
the fourth scheme. The resistances of the labeled
optimization applied in the grounding grid’s failure
branches are shown in Table 2. The resistances of diagnosis”[J], High Voltage Engineering, Vol.26,pp.64-66,
other branches are all 0.1ohm. Apr. 2000, in Chinese.
Table 2 Resistance of abnormal branches [7] Liu Jian, Wang Jianxin, Wang Sen. “An improved
algorithm of corrosion diagnosis for grounding grid & its
Type of Branch / // /// Ο × evaluation” [J]. Proceedings of the CSEE, 2005, 25 (3):71-
Resistance (ohm.) 0.19 0.36 0.47 0.57 0.78 1.35 77, in Chinese.
6. Conclusions
The iteration approach based on rules and the
hierarchical model is feasible to evaluate the testability
of the branches of a grounding grid.
The proposed genetic algorithm based approach
using the testability evaluation is feasible. The
suggested initial population generation and the
modified crossover and mutation operation can avoid
of the unfeasible solutions and thus improve the
efficiency.
The feasible allocation of test poles is the scheme to
guarantee all of the branches clear with the minimum
number of test poles.
The optimal allocation of test poles is the most
robust scheme in the feasible schemes, which is the
least sensitive to the disturbance in the test
information.
7. References
[1] Dawalibi F P. Electromagnetic fields generated by
overhead and buried short conductors Part 2 — Ground
105
2008 International Conference on Intelligent Computation Technology and Automation
Jr ∈ R × R
m m
is a nonsingular matrix, and 3.1. Objective Function
m = 2( N − 1) . Objective function of the mathematical model of
Then improved square-root method is applied to multi-objective optimal planning for reactive power
triangular decomposition of ( J r J r − qE ) , as follows:
T
considers from some aspects listed below: (1) the
minimum active power loss; (2) the minimum
( J r T J r − qE ) = LDLT (3) investment in reactive compensation equipment; (3) the
where L is unit lower triangle matrix and D is a diagonal best voltage level; (4) the maximum static voltage
matrix. Voltage stability margin and the left (right) stability margin.
singular vector can be calculated by iterate with (4). Objective functions are as follows:
⎧ LY ( k ) = Z ( k ) , Z ( 0) = (1,1,.....,1)T min f1 = Ploss ( x, y ) (12)
⎪ T ( k +1) (k ) min f 2 = ∑ f 2 i ( yi ) (13)
⎪ DL W =Y
i∈Ω
⎪ ( k +1 )
/ max (W )
( k +1) ( k +1 )
⎨Z =W (4) ⎧( d i + ci yi ) if yi > 0
⎪ f 2 i ( yi ) = ⎨ (14)
⎪ max (W ) − max (W ) < ε
( k +1) (k)
⎩0 if yi < 0
⎪finish iterative process 2
⎩ Vi − Vi spec
np
min f 3 = ∑ (15)
δ min = ( q + 1/ max W ∗ ) ΔVi max
1/ 2
(5) i =1
107
control variable; Ploss ( x, y ) is active power loss under 4
F = max ∑ λi μ ( fi ) (19)
the different control variables; yi is the reactive i =1
108
ω ( k ) = 2 / (1 + eθ k / k max
) (20) calculation sum formula.
Step 9: To each particle, compare its fitness value
θ is positive coefficient for adjusting changing speed; with the best position appeared, if better, set it as the
k max is the upper limit of iteration times; ω 0 is the current best solution pbest , and compare its fitness
upper limit of ω ( k ) ; k is iteration times at present. value with Gbest , if better, reset the value of Gbest .
With the increase of iteration times, the value of ω Step 10: Refresh each particle’s speed and position
decreases gradually, so convergence speed is faster at by formula (21).
the original stage of the computation, and convergence ⎧vi ( k + 1) = ω vi ( k ) + c1rand () ( X pid − X id )
precision is better at the late stage. At last the ⎪⎪
performance of the global convergence ability and ⎨+ c2 rand () ( X gd − X id ) (21)
convergence precision improved. ⎪
⎪⎩ X i ( k + 1) = X i ( k ) + vi ( k + 1)
4.2. Calculating Steps Each particle’s speed and position should be restricted
to the vmax and X max , respectively.
The procedure to implement the optimal planning
for reactive power is described as follow: Step 11: Calculate the variable quantity ΔF of
Step 1: Input original data, including the system’s fitness function values caused by the two different
node, branch information, control parameters and all positions, if ΔF ≤ 0 or exp(−ΔF / t ) > rand (0,1) , accept
kinds of constraint conditions. new solution. Otherwise keep the current particle’s
Step 2: Perform power flow calculation for the position unchanged.
initial network. Analyze J r of convergence power flow Step 12: After receiving the new solution,
equation by using singular value decomposition, then cooling t ← αt , otherwise, set k=k+1. If iteration
calculate minimum singular value δ min according to (4) time k < kmax , return step 8; when k = k max , output the
optimization results, program terminated.
and (5), and obtain sensitivity ∂δ min∂yi by (11), and
sort their values by using the sensitivity ∂δ min ∂yi of 5. Test Results
voltage stability margin with respect to the control
parameter Qi in descending order. The optimal planning method presented in the paper
Step 3: Select m nodes with higher sensitivities has been applied to IEEE 14-node system, which
includes two generators, three regulating transformers.
∂δmin ∂yi as reactive power compensation sites. PV node voltage and balance bus voltage were set
Step 4: Get f i min and f i max according to power flow between 0.95~1.10 p.u.; PQ node voltage was set
calculation in step (2) and get membership objective between 0.95~1.05 p.u.; the range of transformation
functions. ratio of regulating transformer was 0.90~1.10 p.u.; the
Step 5: Select weight coefficient of each objective lower and upper limit of compensation capacity was 0
function, then convert the multi-objective problem to a and 0.6(p.u.) (ten groups compensator; the capacity of
each group is 0.06 p.u.). The given variable constraints
single one.
Step 6: Obtain the population size m and maximum are in Table 1.
iteration times according to the initial original data.
Step 7: If iteration times k=0, m feasible particles’ Table 1 Variable constraints
Types Bus Qmin Qmax Vmin Vmax
positions Xi = (xi1, xi 2 ,..., xiN ) , i = 1,2,..., m , are generated
3 0 40.0 0.95 1.1
randomly by random number generator , each particle’s PV 6 -6.0 24.0 0.95 1.1
initial speed vi = (vi1 , vi 2 ,...viN ) is generated at 8 -6.0 24.0 0.95 1.1
random in certain range, and set each initial particle PQ 2 -40.0 50.0 0.95 1.05
individual’s optimal solution pbest and global optimal
solution Gbest equal to a enough great value. The voltage stability margin δ min = 0.328 is obtained
by power flow calculation. If the basic capacity is
Step 8: Substitute X i into objective function to
100MVA, initial power loss is 0.13551p.u. The higher
calculate each particle’s fitness value, namely get sensitivity of voltage stability margin with respect to
F ( X i ) by using each X i according to power flow control variable (Qi) is shown in Table 2.
109
Table 2 Voltage stability margin sensitivity with According to table 2, nodes 5, 9, 10 and 14 are
respect to control variable (Qi) selected as the compensation nodes, and then solve the
Qi Q5 Q9 Q10 Q14 optimized planning model by SA-PSO algorithm.
∂δmin ∂Qi 3.35 3.87 2.53 2.15 Calculation results are shown in Table 3.
110
2008 International Conference on Intelligent Computation Technology and Automation
DU Ronghua
Changsha University of Science and Technology, Changsha, 410076, China
CSDRH@163.COM
112
n Definition 1: Affinity degree between antigen
T (∑ X i ) − Tmin
C( X ,T ) − Cmin i=1 and antibody k is :
minY = k1 + k2 (2)
Cmax − Cmin Tmax − Tmin 1 f ( x ) − f min ( x)
Ak = , tk = max k (4)
⎧ k1 > 0, K 2 > 0 1 + tk f ( x) − f ( x k ) + δ
⎪ K1 + k2 = 1
⎪⎪ Where, tk shows combined degree between
s.t ⎨ k1 sin(πt R) (3) antigen and antibody k , f min ( x), f max ( x)
are
⎪ m n
⎪C ( X , T ) = ∑ ai X iT (∑ X i ) minimum and maximum of objective function values,
⎪⎩ j =1 i =1 and δ is a little positive number, so dividend is not
zero.
where:
Definition 2: for a given number N of the
m —kinds of construction machinery;
population, concentration of antibody k is:
ai —one-shift costs of kind i ; N
X i —quantity of kind i ; ∑=
f (i )
T (X ) —construction period function on Ck = i 1
(5)
N
machinery allocation;
Cmax ,Cmin —Maximum and Minimum; ⎧1, A > σ
f (i ) = ⎨ i (6)
Tmax ,Tmin —Maximum and Minimum; ⎩0, Ai ≤ σ
t —optimized operator number; Where, Ck is concentration of antibody k , N is
R —change frequency of weight coefficient. Total number of antibodies, f (i ) is concentration
function of antibody, σ is concentration Threshold
3. Immune Genetic Algorithm Design Value, also is concentration Inhibition radius,
0 < σ ≤ 1.
3.1 Immune Genetic Operator Definition 3: based on affinity degree and
(1) Selection operator based on concentration concentration of antibody, antibody selection
In the evolutionary process, the diversity of probability pk is :
population will reduce premature phenomena; the ck
Ak 1 −β
similar individual must be excluded, as far as possible pk = α N
+ (1 − α ) e (7)
∑A
N
so that individuals spread to the entire solution space. j
j =1
Algorithm adjust the choice of probability by the
introduction of antibody concentration factor, clone where, α,β are Regulation factor,
high affinity antibodies, and restrain similar antibodies 0 < α , β < 1 , and Ak is affinity degree of antibody,
in the population, which both maintain the diversity of the greater affinity degree , the greater choice
the population, and ensure that the excellent antibody probability; the greater the concentration of antibodies,
to enter the larger the probability of to the next the smaller choice probability, and which retain high
generation [4,5]. affinity antibodies with antigen, and also reduce the
Affinity degree refers match degree between choice of the similar antibodies to ensure population
antibody and antigen. In the evolutionary process of diversity in the evolution of population.
Population, the initial antibody cells will clone while (2) Crossover Operator
encountering antigen, high affinity cells have a stronger The real coding can express a greater scope of the
ability to reproduce, rapidly improve Affinity degree of solution space, which be also used in this algorithm, if
the survive cells. the cross-computing uses linear reorganization, parents
113
can generate slightly larger than in the definition of an 3.3 Steps of IGA
arbitrary point line. To assume two cross-substituting
' Step 1: initialization:
father individual x1 and x 2 , the offspring xi is:
(1)Initialization of parameters, the real coding is
x = x1 + ri ( x2 − x1 )
'
i (8) used for antibodies, coding length is l , and the solution
space is S , the number of evolution k = 0 , set
where, ri ∈ [−0.5,1.5], i = 1,2 .If offspring exceeds
convergence conditions.
the solution space of objective function, The value of
(2)Initialization of the population, according to
the principle of offspring is: if xi' ( j ) > b j ,then
xi' ( j ) = 2b j − xi' ( j ) ; if xi' ( j ) < a j ,then experience of experts in the field, randomly generated
xi ( j ) = 2a j − xi ( j ) .
' ' initial antibody N in the space of objective function,
(3)Mutation Operator integrated to X (0) .
Mutation can increase the diversity of the Step 2: create a good antibody memory pool,
population [5]
. Mutation operator may introduce new calculate affinity degree of each antibody of X (k )
entity, and may resume missing excellent genes after with antigen, and extract the best n1 antibody from
the entire population create a good memory pool X M .
selection and crossover. As x is the father, x ' is the
m
a (i ) Step 3: judgment of Convergence, if meet the
offspring, x ' = x ± 0.5Lλ , λ = ∑ i , a (i ) is the
i =0 2
convergence conditions, then terminate the process of
random probability value between [0, 1]; L is range of evolution, the best antibody is taken out from good
the variables. To ensure that the optimal antibody is not memory pool X M ,which is the best global optimal
destroyed, it is necessary to inhibit the process of solution , if the conditions are not satisfied with
mutation so that the mutation rate and the affinity of convergence, entered Step 4.
the antibody are inversely proportional. As a result, Step 4: Evolution groups, antibodies of X (k )
with the increasing number of iterations, the antibody obtain choice probability in accordance with the choice
with the biggest affinity degree will be gradually from operator; antibodies which choice probability is r
the impact of variation. will be composed of population X s , and after crossover
and mutation of X s , and X ' (k ) will be received.
3.2 Antibody Memory Mechanisms Step 5: Calculate affinity degree, Calculate
antibody’s affinity degree of population X ' (k ) .
Antibody memory mechanisms [6] is an important
Step 6: Update groups, X ' (k ) compare with
feature, when the same antibody constantly learning
X (k ) in accordance with the size of affinity degree,
with antigen, due to memory mechanism, the immune
replace low affinity antibodies of the father population,
system's response speed to the antigen will greatly
generate the next generation antibody X (k + 1) , and
increase, and produce higher affinity antibodies to
update good memory pool.
eliminate the antigen. In order to ensure convergence
Step 7: If k < λ , λ as the greatest number of
algorithm, as well as to avoid the current optimal
evolution, to the steps 3 to judge convergence.
antibody individual to be destroyed by cloned selection,
crossover and mutation, after the completion of
4.Simulation result
generation operations, can retain a certain size of
antibodies. The optimal n antibody will be selected
To verify the effectiveness of the method, the
into memory pool, compared with antibodies of
design of simulation such as: Asphalt paving road area
memory pool, and then replaced with poor adaptability
is 500,000 square meters, distance between asphalt
antibodies, which expect to get the better antibodies [7].
mixing station and the construction site is 4 Km,
114
assuming that asphalt pavers have chosen, and asphalt genetic algorithm, the immune genetic algorithm is
mixture delivered by concrete mixing trucks , a number applied to optimize configuration of the asphalt
of manufacturers of a variety of models to choose from. pavement construction machines, which is an attempt
The objective evaluation function as benchmark of to solve such problems, and provide a method to solve
optimum configuration, with the total time of the optimum problem of project management. Preliminary
waiting loading of concrete mixing vehicles and the experimental results show that the algorithm proposed
total time for unloading characterized the utilization of in this paper has some value, but because such issues
machinery. Parameter settings: initial population size is are complex, and the simulation tests simplify a lot of
15, to develop an excellent memory for the number constraints, such as the paper does not take into
selection antibodies during creating good memory account the asphalt pavers and other machinery of
antibody pool n1 = 8 , the biggest evolution of the construction machines, but also failed to deal with the
number λ = 100 , concentration threshold σ = 0.5 , and failure in the course of construction, the algorithm need
regulatory factors α , β = 0.5 . further study and improve.
Acknowledgement
Reference
In order to verify the superiority of method, the
[1] YANG Qiwen, JIANG Jingping, ZHANG Guohong.
optimized scheme will be contrast with other methods,
Improving optimization speed for genetic algorithms
the results in Table 1, 1, 2 based on the sensitivity
[J].Journal of Software, 2001, 12(2):270-275.
analysis method, 3, 4-based on multi-objective
[2] Leandro Nunes de Castro, Jon Timmis. An Introduction to
optimization methods. In mechanical efficiency, period,
Artificial Immune Systems: A New Computational
value evaluation, scheme 5 are better than other options.
Intelligence Paradigm [M]. Springer-Verlag, 2002
Although the total cost of the scheme 1, 4 are less than
[3] Zhen L S.Optimum Configuration of Construction
5, but its construction period is relatively longer than 1,
Machines for Highway Roadbed [J].Electro-Mechanical
4. In fact, reduce the cost of the extension is expected
Engineering, 2000, (4):35-37
to cost. Evaluation results shows scheme 5 balanced
[4] Xue Wen-tao. A Genetic algorithm based on immune
Construction Period and cost, at the same time made
learning mechanism and its application [J]. Information and
full use of construction machinery. From the analysis,
Control, 2008, 37(1):9~17 (in Chinese)
optimized scheme has been greatly improved than the
[5] JIAO L C, WANG L. A novel genetic algorithm based on
other two methods.
immunity [J].IEEE Trans Systems, Man and Cybernetics,
2000, 30(5):552-561.
5.Conclusion
[6]Hartmann S. A self-adapting genetic algorithm for project
scheduling under resource constraints [J].Naval Research
By introducing diversity and immune memory
Logistics, 2002, 49:433-448.
characteristics of biological immune system into the
115
2008 International Conference on Intelligent Computation Technology and Automation
∑∑ c
algorithms is an effective way to solving it. There are total cost is equal to , cij shows cost of
many frequent genetic algorithms, such as VEGA ij x ij
i =1 j =1
(Vector Evaluated Genetic Algorithm ), dictionary
orders, weighted method, Pareto genetic algorithms, connecting (i, j),i = 1,2,", n −1, j = i +1,i + 2,", n .
117
τ ij (6) Step3: Else, accumulate the number of per breach
Pij = 2 restraint.
∑τ
i =1
ij Step4: Step 1 to 3 is repeated N times total.
Step5: Return ‘infeasibility’.
Suppose τ ij is information quantity of j-th design Step6: Calculate penalty function.
variable on i-th node, the new equation is:
f
τ ijnew = (1 − ρ )τ ijold + (7) 3.3. Stochastic simulation of terminal reliability
Q
Q is pheromone intensity, f is value of sufficiency When network structure x is given, we can use the
function, ρ is coefficient of information volatilization. method of random simulated (algorithm 2) to estimate
Ant colonies algorithm often has stagnant and the reliability of terminal K .
diffused problems, so, the remained pheromone of Algorithm 2 (estimate reliability of terminal K)
every way searching for the excellent solution is Step1: Set N ′ = 0 .
limited to [τ min, τ max ] . The optimum route is kept Step2: Randomly create a connection integration
after every cycle, the strategy is the best ant kept ′
ε by network structure x of P .
namely. the pheromone threshold is judged by the Step3: Check whether figure G ′ = (V , ε ′) is K
following formula:
connective or not. In fact, A = (a ij ) can show n
⎧ τ min, if τ ij (t) ≤ τ min
⎪
τ ij (t + n) = ⎨τ ij (t), if τ min < τ ij (t) ≤ τ max (8) nodes of figure G′ =(V,ε′) .If (i, j ) ∈ ε ′ , a ij = 1 ;else,
⎪τ , if τ ij (t) > τ max a ij = 0 . Suppose I is a n unit matrix, t is the smallest
⎩ max
In order to increases efficiency of ant colonies positive integral that satisfies the condition of
algorithm and avoid local excellent state of solution 2 t ≥ n − 1 .If aij′ is positive value for optional index
result, the following adaptive control strategies are
i, j ∈ K , ( I + A) 2 , then figure G ′ = (V , ε ′)
t
adopted to the value of pheromone volatilization mark
coefficient ρ : is K connective, at the same time set N ′ + + ;
⎧0.95ρ (t ), if 0.95ρ (t ) > ρ min Step4: Repeat step 2 and step 3, N times together.
ρ (t + 1) = ⎨ (9)
⎩ ρ min, otherwise Step5: R ( K , x) = N ′ / N .
3.2. Fuzzy simulation of possible chances 3.4 Compound intelligent algorithm of chances
constraint constrained simulating genetic- ant colonies
algorithm
Fuzzy set theory have made rapid progress, fuzzy
technology extends to almost all fields. The possibility Integrated stochastic simulation and fuzzy
theory is put forward by Zadeh, and many scholars simulation of intelligent genetic- ant colonies
play an important role in its development [9]. The algorithm is presented, the steps are as follows [12]:
perfect system of research fuzzy is given by Liu, and Algorithm 3 (compound intelligent algorithm of
axiomatic system of probability theory is formed. And genetic- ant colonies algorithm)
Liu detailed the fuzzy simulated theory in checking the Step1: Initialize parameter. Set t = 0 , Nc = 0 , set
fuzzy system constrains, and added steps of calculating
the number of violation constrains. When the given crossover probability Pc , mutation probability Pm ,
decision vector X is infeasible, it needs to calculate iterative algebra N c1max of genetic algorithms, iterative
penalty function [10,11].
algebra Nc2max of ant colonies algorithm and pheromone
The steps are as follows.
Algorithm 1 (check the possible fuzzy chances strength Q, ρ (0), ρ min ,τ min ,τ max τ c ,and so on.
constrained)
Step1: Produce clear vector equably from the level Step2: Cycle index N c1 ← N c1 + 1 .
cut set of the fuzzy vector α . Step3: Proceed operation of crossover and mutation.
Step2: If distinct vector substitute constraint is Step4: Check chance constraint and calculate the
viable, return ‘feasibility’. value of sufficiency.
118
Step5: Repeat step 2 to 4 until the given cycle index beginning
is finished.
initialize
Step6: Calculate information quantity τ g and τ s ,
judge τ s according to formula (8). Iterative index N c1 ← N c1 + 1
Step7: N c 2 ← N c 2 + 1 .
Crossover and mutation
Step8: The number of ants k ← k + 1 .
Check chance constraint and
Step 9: Calculate space net point of probability calculate sufficiency value
selection according to state transition probability N
If satisfy termination condition
formula (6), complete all selection of space net point.
Y
Step10: Repeat step 8 and step 9 until all ants finish Calculate information quantit τ g and τs
selection of all space net point.
Step11: Check fuzzy chances constraint according to Iterative index N c 2 ← N c 2 + 1
algorithm (1), when the constraint is inconsistent,
calculate penalty function, and calculate all target Ant k=1
value of ant’s route by making use of algorithm 2.
Step 12: Refresh information quantity of every route Ant k=k+1
making use of formula (7), (8)and (9).
Finish selection of n-stage space net point
Step 13: Repeat step 7 to 12 until the given cycle according to state transition probability formula (6)
index is finished.
N
Step 14: The best ant is optimum solution. k≥Ant total amount m?
Flowchart program of genetic-ant colonies algorithm is
Check chance constraint and
shown in Figure2: calculate sufficiency value
N
Author names and affiliations are to be centered If satisfy termination condition
beneath the title and printed in Times 12-point, non- Y
boldface type. Multiple authors may be shown in a Output optimum result
two- or three-column format, with their affiliations
end
italicized and centered below their respective names.
Include e-mail addresses if possible. Author Figure 2. Flow chart program of genetic-ant
information should be followed by two 12-point blank colonies algorithm
lines. A full connecting network with 8 nodes is
considered, suppose the reliability of every joint is 0.9, Considering the iteration subset K1 =(2,4,5) , K2 =(1,3,7) ,
fuzzy coefficient of the problem is triangle fuzzy K3 = (1,4,6,8) of nodes, decision makers wish to
number and it is listed as table1.
maximize reliability R(K1,x) , R(K2, x) , R(K3, x) under
Table 1. The cost matrix of full connected network the control of cost 400 and confidence level 0.9, the
N 1 2 3 4 5 6 7 8 model is as follows:
1 - ⎧max[ R ( K 1 , x ), R ( K 2 , x ), R ( K 3 , x )]
2 (25,30,35) - ⎪
⎪ s.t .
3 (40,43,46) (23,26,29) - ⎪ 7 8 (10)
⎨ Pos{
4 (43,45,37) (71,76,85) (35,38,42) -
⎪ ∑∑ c ij x ij ≤ 400} ≥ 0.9
5 (46,50,53) (42,45,48) (15,17,21) (33,35,38) - ⎪ i =1 j = i +1
119
R = 0.4R(K1, x) + 0.3R(K2, x) + 0.3R(K3, x) , the The result shows that the performance of the mixed
genetic-ant colonies algorithm is superior to the un-
sufficiency function f is defined as follows: mixing genetic-ant colonies algorithm. Hybrid particle
f = R × r ( x) (11) swarm and Ants colonies algorithm, hybrid particle
swarm of genetic algorithms and so on can be further
After checking out constrain of fuzzy system for N studied during the research of solving arithmetic.
N
ΔB(x) = ∑ Δbi (x)
Besides, neural networks can be used to approach
times, it is still infeasible. Set indeterminate function, that is to say, it can greatly
i =1
enhance scouting speed and scouting efficiency of
and ΔBmax = N × max(Δbimax ) , i = 1,2, ", N , where algorithm to study hybrid algorithm of ant colonies and
particle swarm in neural networks.
Δbi (x)is violation constrained value when the
checkout constrained condition is t for k-th References
chromosome and being i-th fuzzy simulation, Δbi
max
120
2008 International Conference on Intelligent Computation Technology and Automation
122
for i = 1: N , v i (0) ~ N (0, ∑ ) circumstance, not only the new algorithm does not
improve the generic particle filter virtually, but also it
z Initialized particles position xi (0) :
may introduce the additional noise in the estimation
for i = 1: N , xi (0) = xik process artificially.
z Initialized particles fitness values wi (0) : Thirdly, the values of w, ϕ1 , ϕ2 can be variable
adaptively in practical applications. A good choice is
for i = 1: N , wi (0) = wki
to set them as monotone decreasing functions of time t
z Initialized pbesti(t) and gbest(t): (such as annealing strategy in simulated annealing
for i = 1: N , pbesti (0) = xi (0) ; algorithm). This strategy could search in a large-scale
at the initial stages, and position the optimal state in a
gbest (0) = { pbest j (0) wj (0) = max wi (0), i = 1,2, N}
small-scale at the final stages.
z Iteration searching by PSO:
for t = 0 : T − 1 6. Numerical Example
for i = 1: N
Considering a numerical example described as
vi (t + 1) = w × vi (t ) + ϕ1 × r1 × [ pbesti (t ) − xi (t )]
follows (Kitagawa 1987, Gordon, Salmon and Smith
+ϕ 2 × r2 × [ gbest (t ) − xi (t )] 1993, Tanizaki and Mariano 1998).
xi (t + 1) = xi (t ) + v i (t + 1) ⎧ xk = 0.5 xk −1 + 25 xk −1 /[1 + ( xk −1 ) 2 ]
⎪
wi (t + 1) = p (y k xi (t + 1)) ⎨ + 8cos[1.2( k − 1)] + ε k −1
if wi (t + 1) > wi (t ) ⎪
⎩ yk = ( xk ) / 20 + υk
2
123
2
RMSE of the estimation using PSO-PF nonlinear numerical example is given to show a better
1.8
performance of PSO-PF.
1.6
1.4 Acknowledge
1.2
0
0 20 40 60 80 100 120 140 160 180 200
References
Figure 2. RMSE curve of the estimation with [1] Gordon N , Salmond D. Novel approach to non-
PSO-PF linear and non-Gaussian Bayesian state estimation[J].
Proc of Institute Electric Engineering , 1993, 140 (2) :
The mean accuracy over 200 steps and the time of 107-113.
100 runs of two algorithms are given in table 1. [2] Clapp TC. Statistical Methods for the Processing of
Communications Data. Ph. D. thesis, University of
Table 1. The mean accuracy and mean running Cambridge Department of Engineering, December
time of PF and PSO-PF 2000.
Mean accuracy Running time (s) [3] Higuchi T, "Monte Carlo filtering using the genetic
PF 0.5910 6.172 algorithm operators," Journal of Statistical
PSO-PF 0.3341 9.228 Computation and Simulation, 59, pp. 1-23, 1997.
[4] MO Yi-wei , XIAO De- yun. Evolutionary particle
From above two figures and the table, it can be filter and its application. Control Theory &
seen obviously that the PSO-PF has a smaller RMSE Applications. 2005. 22(2).
than PF. However, the running time of the former is [5] Arulampalam S, Maskell S, Gordon N and T Clapp.
longer than the latter. This is because that an additional A Tutorial on Particle Filters for On-line
circulation of PSO is involved in PF algorithm. For a Nonlinear/Non-Gaussian Bayesian Tracking. IEEE
PF frame with fixed number of particles, the Transactions on Signal Processing, 50(2):174-188,
computational amount of PSO-PF is larger than February 2002.
generic PF algorithm. Therefore, PSO-PF with [6] Liu J S, Chen R. Blind deconvolution via
adaptive number of particles could be used in practical sequential imputation [J].J of the American Statistical
applications in order to decrease the calculated amount. Association, 1995, 94(2): 590-599.
[7] Kennedy J, Eberhart R C. Particle Swarm
7. Conclusion Optimization [A]. Proc. IEEE International Conference
on Neural Networks, IV [C]. Piscataway, NJ: IEEE
In order to deal with the problem of sample Service Center, 1995. 1942-1948.
impoverishment, a new improved algorithm of PF [8] Eberhart R C, Shi Y. Particle Swarm Optimization:
which is called PSO-PF is proposed in this paper. The Developments, Applications and Resources [A]. Proc.
impoverishment of samples is overcome via operating Congress on Evolutionary Computation 2001 [C].
PSO on the particles set after resampling step. Piscataway, NJ: IEEE Press, 2001, 81-86.
Subsequently, a general principle about the choice of
parameters is given by analyzing. And finally, a
124
2008 International Conference on Intelligent Computation Technology and Automation
Path Planning for Deep Sea Mining Robot Based on ACO-PSO Hybrid
Algorithm
126
With setting τ ij ( 0 ) = τ 0 ( τ 0 is a constant),0 was set to Step4:Iteration process: Ant group proceeded to
search next pixel. when ant k found aim
the iteration counter(NC) for seeking food, and the
iteration maximum was Ncmax. point( g j = G ), a integrity path Lk was gained. The
Step2:Walk rules: Each ant seek next pixel by the u
length of the integrity path( dk = ∑de ) was calculated
k
following rules, then walked between two station
points:
and. When each ant in agroup reached G, each integrity
⎧⎪arg max[τ ij (t )η j (t )]
α β
if (q ≤ q0 ) path of each ant was compared, and the length of the
pj = ⎨ (4) shortest path( L1min ) was noted down. which was
⎪⎩ X else
named d1min .
Step5 : Overall updating : When a iteration
τ ijα (t )η βj (t )
p (t ) =
k
(5) finished, the pheromone on L1min needed to update in
∑ τ ijα (t )η βj (t )
ij
speeding up the convergence:
pr ∈Wpi
elicitation function rest with formula (6); E、 α、 β pheromone amount on Lij after NO. Nc iteration
k
respectively are right constant; p (t ) represent the
ij finished; LNc min is the best path during NO. Nc
probability for ant k passing from pi to p j at t time.
iteration; d Nc min is the length of LNcmin .
∀k at current pixel pi , moved to the next pixel by Step6 : Iteration complete: After a iteration
principle of nearest neighbor choice. finished, 1 was added to Nc till the max iteration
Step3:Local updating: After each ant had passed by number. The best path length of each iteration should
an edge, pheromone updated according to formula (7). be compared each others, then noted down and
exported the shortest path( Lmin ) length among them.
τ ij (t + 1) = (1 − ρ1 )τ ij (t ) + ρ1Δτ ijk (7)
5. Parameters training by PSO
⎧ Q1 if : Lij has been passed by ant k
⎪⎪ u In solving Path Planning Problem by ACO, the
Δ τ ijk = ⎨ ∑ d e parameter α and β is determined through experiments
⎪ else and have great impact to the performance of the
⎪⎩ 0 algorithm. α indicates the importance of the remained
In the formula above, Q1 is a constant; ρ1 is local pheromone on each pixel, and β indicates the
pheromone volatilization coefficient; d e is the length importance of heuristic information. The effect of α
of the edge ant k has passed by; u is the amount of and β given to the performance of the algorithm is
edges which ant k has passed by in same iteration. mutual supported and closely related. Choosing
When τ ij (t + 1) ≺ τ min , set τ ij (t + 1) = τ min ( τ min
parameters through experiments only depends on
experience or repeated debugging, in this paper
is a constant). choosing parameters is by the guidance of PSO.
Information sharing mechanism is used in PSO, which
127
has the excellence of its simpleness to achieve and
(a) The results of 10 Iterations later
profound intelligent background. In training the ACO
parameters α and β by PSO, the particles are
expressed as a two-dimensional real-coded strings. The
training steps is as following: It is supposed that n
particles compose of a community, in which the NO.i
particles is expressed as a two-dimensional vector
Xi=(xi1,xi2), i=1,2, … n, in the other words, the NO.i
particle in the search space is located at xi. Therefore the
position of each particle is a potential solution. The
adaptive value can be calculated by adding xi to ACO
through objective function and the solutions are
measured by the magnitude of objective value. The
flying velocity of the NO.i particle is also a two- (b) The optimum result
dimensional vector, recorded as Vi = (vi1 , vi2 ). The Fig.2 Results of first experiment
optimal location for the NO.i particle by that time is Pi
= (pi1 , pi2 ), and the optimal location for particles swarm
is Pg = (pg1 , pg2 ). Operating the particles by the
following formulas:
6. Simulation research
(b) The optimum result
Based on the above analysis, mathematical Fig.3 Results of second experiment
simulation software MATLAB was used to carry on
experiment simulation study: setting m=20,Ncmax= Fig.2 and Fig.3 respectively represent the results of
50, ρ1 =0.75, ρ 2 =0.55,c1=1.8, c2=0.9. two items of experiments. In Fig.3, G1 and G2 are two
planning aim point, at the same time, G1 is also the
planning start point for G2.
Simulation results indicate that the method used in
this study can reach satisfying precision under the price
of a certain period of time, so that it can apply in robot
mining work in deep sea.
7. Conclusion
In this paper, an ACO-PSO Hybrid Algorithm
Solving Path Planning Problem based on Swarm
128
Intelligence(SI) is proposed. ACO as its positive optimizers,” Proceedings of the International Joint
feedback, parallelism and easy combining whit other Conference on Neural Networks, 2003, pp.1301-1306.
algorithms, is widely applied on lots of filed; Using
PSO is because that ACO greadtly need experience or [10] Y.Prnh, X.Prnh, “Adaptive parameter calibration with
repeated experiments to choose corresponding particle swarm optimization for virtual instrument,”
Proceedings of the International Symposium on Test and
parameters. experience always occupies in a leading
Measurement, 2003, pp.4687-4690.
role. Thus the parameters in ACO can be optimized
through PSO and parameters can be chosen self-
adaptively, so that the optimal performance of ACO can
be effectively enhanced. By simulating experiments
show that the algorithm is correct can satisfy the
precision demand of robots’ mining work in deep sea.
8. Acknowledgment
Financial supports from National Natural Science
Foundation of China(Grant NO.50474052) are highly
appreciated.
9. References
[1] K.Sugibara, J.S.Grnrtic, “Algorithms for adapative motion
planning of an autonomous mobile robots”, Problems IEEE
Trans.SMC, M I T.U S, 1997, pp.138-143.
129
2008 International Conference on Intelligent Computation Technology and Automation
allowable discharge at demand node; H Rt is tank water Converting the constraint of water supply capability of
each pump station to objective:
level, the maximum allowable water level H R max is ⎧ QO − QO
normally the top of the tank, and H R min is above the tank ⎪ min n n ,t
if QOn ,t < QOmin n
⎪ QOmax n − QOmin n
⎪
bottom in order to provide some residual storage for Qs ,t = ⎨0 if QOmin n ≤ QOn ,t ≤ QOmax n
additional demand pressure, H R 0 is the initial level ⎪ Q −Q
⎪ On ,t Omax n
if QOn ,t > QOmax n
and H RT is the final level after time T . ⎪⎩ QOmax n − QOmin n
T
In this study, qij flowing from node i to node j is the The proportional to the demand nodal discharge Qy
decision variable. In matrix qt ( p × p ) , p represents has the same form as Qs , and in practice only the flow
constraints need to be considered, as a hydraulic
the number of nodes, qo ,t is the flow row matrix
restriction is clearly automatically satisfied
and qI ,t is the column matrix. In the junction node k , corresponding to the flows.
the discharge flowing in must be vent equally, namely The tank water level constraints in booster pump
p p station can be transformed as:
∑q ik ,t = ∑ qkj ,t . C ( p × p ) is the set of pipes capacities, H Rt = H R ( t −1) + (QR I ,t (q) − QRO ,t (q )) / S ⋅ ΔT
i =1 j =1
and 0 ≤ qij ,t ≤ min(cij , QOmax ) . QO = [QO1 ,", QOn ,", QON ]T is HRy = HRT (q) − HR0 / HR0
the set of flows the supply node providing into demand Where S is the tank area, QR I ,t and QRO ,t are the water
node. QI = [QI1 ,", QIm ,", QIM ]T is the set of flows volumes flowing into and out from the tank
into the demand node. A( p × p ) denotes the flows respectively. The H Rt within the limits can be rewritten
direction matrix, aij = 1 means flow discharging from as H R s the same form as Qs .
node i into j , but when aij = 0 there is no water The unconstrained optimization problem of RWSS
takes the form of minimizing the product of the real
between nodes. Rearranging A = [ A1 A2 ]T and cost and the penalty cost, that is
A = [ A3 A4 ] , A1 = [ A11( p×1) A12 " A1N ]( p× N ) is set MINZ=E⋅(1+Hc)⋅(1+Qc)⋅(1+Qs)⋅(1+Qy)⋅(1+HRs)⋅(1+HRy) (5)
where Z is the network cost , E is the system
of N supply nodes and A4 = [ A41( p×1) A42 " A4 M ]( p× M )
energy and the rest are the penalties incurred by qij ,t .
is the matrix of M demand nodes. Combining the pipe
flow, there are the following formulae: The multi-objective function (5) ensures that all
qon ,t A1n = QOn ,t (q ) (n = 1, 2," , N ) (3) networks with pressure or flow violation are more
expensive than the maximum feasible network.
A4Tm qIm,t = QIm,t (q) (m = ( p +1- M ),", p) (4)
Then formulae (1) and (2) can be optimized by using 3. Ant colony optimization algorithm
formulae (3) and (4). H c is taken to be proportional to
Like most meta-heuristic, the ACOA incrementally
demand nodal pressure. That is search through the solution space using knowledge
T N
Hc = ∑ΔT ∑( H (q) − Hyn,t / Hyn,t ) gained from previous solutions to further guide the
t =1 n=1 search. This is based on an analogy with trails of
H (q) = H l + H nm pheromone laid on the paths which real ants use for
131
communication. The pheromone trails are a kind of Where Δτ us denotes the increment of pheromones from
distributed information modified by ants to reflect their
experience accumulated during the problem solving. node u to u + 1 ; Z ib is the best value of model objective
So different pheromone modification, roads transfer in this iteration; D is positive constant; g is generation
methods and coding can improve optimization effect. and G is the total iterations. ρ is defined as persistence
of pheromone, to turn to good value sensitively, the
3.1 Binary ant colony optimization more the iteration, the dynamic ρ is smaller.
The maximum and minimum flows should be search space, proportionally to the objective function
considered in the value scope [0, min(cij , QOmax )] . value Z sv . The pheromone update rule is the same as
Therefore, the coding discrete precisions are expressed formula (7), but τ us is replaced by τ ijwv , which is the
as B = (min(cij , QOmax ) − 0) /(2r − 1) . flow qijwv attraction of ant v in colony w .The pheromone
In BACO, a number of na ants cooperate together to can be perceived by all the members of the population,
search in the binary solution domain. During every and diffuse into the environment. The ants are moving
iteration, each ant constructs its solution by walking towards the high pheromone with small distance
sequentially from node 1 to node v on the routing according to the following:
graph. At each node u , each ant has two choices u 0 or ⎧ (τ w ' v )α ⋅ (η ww ' ) β
⎪ ij ij (8)
τ ijw ' v > τ ijwv
u1 to walk to the next node u + 1 . ⎪⎪ w'v α
Pijww ' ( g ) = ⎨ ∑ (τ ij ) ⋅ (ηij )
ww ' β
Selecting u0 means xu = 0 ; and ⎪
⎪0 τ ijw ' v <τ ijwv
selecting u1 means xu = 1 . The pheromone τ u 0 and ⎪⎩
τ u1 cumulated on the paths determine the values of Here, τ ijwv is the amount of pheromone laid on the spot
selecting probabilities: and ηijww ' is the inverse of flow distance between
τ us ( g )
pus ( g ) = u = 1," , r s ∈{0,1} colony w and colony w ' , namely ηijww ' = 1/ (qijwv − qijw ' v ) .
τ u 0 ( g ) + τ u1 ( g )
The attraction ability of each spot is determined by its
Then the bigger pus is more likely to be selected. To distance and the amount of pheromone it contains.
avoid premature resulting from ants gathering in the It is worth to notice that at this point each ant does
same paths, disturbance ϕ is introduced to the selecting not go directly to the most attractive and nearest spot.
probabilities: Indeed, each artificial ant has a range parameter that is
τ us ( g )α ⋅ ϕs ( g )β normally distributed over the population. Each
pus ( g ) = (6) artificial ant draws a random distance, under the limit
τ u0 ( g ) ⋅ ϕ0 ( g )β + τ u1 ( g )α ⋅ ϕ1 ( g )β
α
of range parameter, and then jumps of this length in
More iterations corresponds to smaller weight the most attractive direction:
factor β , at the beginning ants shall explore more ⎧ q ( g − 1) + ( −1)
wv
⋅ r ⋅ Rand q≥q
⎡⎢ Rand ⎤⎥
(9)
⎪⎪
ij 1 0
space and find out more solutions, and finally the qijwv ( g ) = ⎨ qijwv ( g − 1) + sign(d ijww ' ) ⋅ r2 d ijww ' > r2 ⎪⎫
effect of disturbance is becoming smaller and smaller, ⎪ w'v ⎬ q < q0
⎩⎪ qij ( g − 1) otherwise ⎪⎭
so the algorithm can converge to the optimal solution.
Here r1 is the maximum value to find feasible good
According to above, an ant moves along one of the
two roads to the next node, and each pheromone on the neighbors, and r2 is the maximum distance to explore
roads is adjusted as follows: search space towards the excellent objective function.
⎧τ us ( g ) = ρ ⋅ τ us ( g − 1) + Δτ us ( g )
⎪ (7)
⎨ Δτ us ( g ) = D / Z ( g )
ib
⎪ ρ = e − ( g +1) / G
4. Case study
⎩
132
Fig 1. Framework diagram of RWSS Fig 2. RWSS optimization graph of BACO and
Experiments are performed in the case study CACO
composed of two sources, three demands, one tank and With BACO given in dashed line and CACO in
eleven pipes shown in Fig.1. The maximum hourly beeline, it is not difficult to see that after 150
node demand of the pipe network and the same generations improvement, BACO reaches a point
demand pattern factor of all junctions in 24 hours are where it is unable to find solutions of increasing
shown in Table1. With allowance for depositing water quality and with an increasing number of iterations the
for high building extra pressure, the cylindrical water spread of the solution costs converges to a much
tank area is1153.85m2, and target elevation is 28m, tighter interval. Contrasting this performance to CACO,
allowable pressure head at demand node 1 and 2 is it is observed that after a slightly slower rate CACO is
between 24 and 50 m, and the demand node 3 has the able to find optimal solutions. However, CACO
high pressure as H y 3 = 80m . doesn’t converge to the same extent as BACO, but
continues to generate solutions of a broad quality,
Table 1. the maximum hourly node demand of
indicating that the algorithm is still actively exploring
pipe network and demand factor
the search space even if it locates solutions of
Demand Water Demand Demand extremely high quality. The optimal solutions of
Time Time
node demand(L/s) factor (%) factor (%)
BACO and CACO are presented as bellow.
1 43.80 1 3.01 13 3.65
2 98.80 2 3.01 14 3.58
3 246.60 3 3.00 15 3.62
4 3.01 16 3.55
5 3.02 17 3.53
6 3.15 18 3.62
7 3.70 19 3.67
8 3.60 20 3.62
9 3.67 21 3.47
10 3.65 22 3.42
11 3.68 23 3.16
12 3.68 24 3.00
Fig 3. Source Energy optimization graph
between BACO and CACO
For the algorithms optimization, parameters are set
as follows: population size is 50 and the number of
generations is set at 350, other same ACOA parameters
are α = 5 , β = 3 ,τ 0 = 35 , τ max / τ min = 1.618 , D = 1000 ; given
eleven variables each qijwv represented by a ten-bit
binary sub-string for BACO, the total string length is
110 bits in every colony and every time;
r1 = 0.5 ⋅ r2 for CACO. To illustrate the different
behaviors of BACO and CACO, the network costs for
a sample run are given in Fig.2. Taking calculation
efficiency into consideration, the experiment analysis Fig 4. Booster pump energy optimization
took about 10s under the configuration of a Celeron graph in tank between BACO and CACO
3.46G CPU and 0.99G RAM.
133
distribution in pipes as decision variables. ACOA is
introduced for solving this model, and improved
methods are proposed as BACO and CACO in several
ways. First, disturbance factor is specially designed in
BACO, so ants can construct better solutions by the
probability of path selection. Second, in order to widen
search space, adaptive search steps is adopted in
CACO. Last, both of BACO and CACO use dynamic
evaporation factor for pheromone updating. The
Fig 5. Tank level optimization graph between RWSS case study results reveal that, CACO solve the
BACO and CACO problem more effectively than BACO by searching the
solution space more thoroughly
Acknowledge
This research is funded by Zhejiang province
Important Special Item Foundation of China under
Grant Number 2006C11227.
Reference:
Fig 6. Pressure optimization graph between
BACO and CACO in demand node 3 [1] P.R. Bhave, V.V. Sonak, “A critical study of the linear
The calculation is conducted over 24 h using programming gradient method for optimal design of water
supply networks”, Water Resources Research, 1992,1577-
discrete time intervals of l h. In the condition of
1584.
satisfying flow volume demands, the biggest pressure [2] K.V.K. Varma, S. Narasimhan, and S.M. Bhallamudi,
demand and tank level optimized are shown in fig 3- “Optimal design of water distribution systems using an NLP
fig 6. It is seen that source pump energy of BACO is method”, Journal of Environmental Engineering, ASCE
more than that of CACO in day time but less in night, 1997,381-388.
while booster pump energy in tank is opposite, and [3]MingYen Tu, Frank T.C.Tsai, and William W.G.Yeh.
tank level changes correspondingly. Between 7.am to “Optimization of water distribution and water quality by
8.pm demand nodes need more water and source pump hybrid genetic algorithm”, Journal of Water Resources
optimized by BACO supplies more, but the decreasing Planning and Management, 2005, 431-440.
[4] Dero J, Siarry P, “Continuous interacting ant colony
pressure provided by source in addition to increasing
algorithm based on dense heterarchy”, Future Generation
pipes losses results in more pressure differences in the Computer Systems, 2004, 841-856.
important demand node than that of CACO. In CACO [5] Aaron C. Zecchin, Angus R. Simpson, et al. “Application
by using high source energy to transport much water of two ant colony optimization algorithms to water
cooperating with booster pump during night, tank level distribution system optimization”, Mathematical and
is ascending to deposit water which operates in Computer Modelling, 2006, 451-468.
daytime. So the demand pressure can be satisfied [6] Min Kong, Peng Tian, and Yucheng Kao, “A new ant
greatly and the total energy is less than that of BACO. colony optimization algorithm for the multidimensional
knapsack problem”. Computers and Operations Research,
2008, 2672-83
5. Conclusions [7] Yu Ting-chao, Zhang Tu-qiao, and Li Xun, “Optimal
operation of water supply systems with tanks based on
In view of the costly regional water supply system, genetic algorithm”. Journal of Zhejiang University (Science) ,
the model of optimal pump energy costs between 2005, 886-893
source-demand is developed by using water
134
2008 International Conference on Intelligent Computation Technology and Automation
136
L j = ∑ xij ∀j (4) 5.2 Remove constraint and select fitness
i function
∑y
i
jk = Dk ∀k (5)
The fitness value is a measure of the goodness of a
solution with respect to the original objective
function and the “amount of infeasiblity”.The fitness
∑x ij ≤ Qj ∀j (6) function is formed by adding a penalty to the original
i objective function. After punish non-feasible solution,
xij ≥ 0 ∀i, j (7) we can transform constraint problem into
non-constraint problem. According to the model’s
y jk ≥ 0 ∀j, k (8) constraint, we define:
z j ∈ {0,1} ∀j (9)
ri = Ai − ∑ xij (i = 1,2,...I )
j
The objective function (1) minimizes total reverse
logistics costs comprised of transportation and s j = Q j − ∑ xij ( j = 1,2,...J )
operation cost. Constraint (2) assures all recycled i
appliances must be transported to the treatment t k = Dk − ∑ y jk (k = 1,2,...K )
center; constraint (3) insures that one of disused j
household appliances can be discarded in treatment
center and the other can be sold in the second hand p j = (1 − σ )∑ xij − ∑ y jk ( j = 1,2,...J )
market; constraint (4) insures the balance of input i k
and output products amount in treatment center;
constraint (5) assures all products which have been Then define:
handled in the treatment center must be transported
to second hand market; constraint (6) limits the ri (q=1,2,3,…I)
handling capacity of treatment center; constraint (7) d q = max{0, ri , s j , t k }(q=I+1,…I+J+K)
(8) and (9) give the value range of decision
variable xij , y jk , z j ; p j (q=I+J+K+1,I+J+K+2,…)
137
selects parents according to the probability Pc min , ( Pc < Pc min )
distribution based on the fitness values of the
chromosomes. The better chromosomes have a here: Pc max : highest crossover probability
greater chance of being selected. Pc min : smallest crossover probability
5.4 Crossover operator t: generation number
T: the largest generation number
The crossover operator generates new children by
combining the information contained in the 5.5 Mutation operator
chromosomes of the parents so that new
chromosomes will have the best parts of the parents’ After recombination, some “children” undergo
chromosomes. There are several types of crossovers, mutation. Mutation operates by inverting each bit in
including single-point crossover, multi-point the solution with some small probability, usually
crossover, and uniform crossover [8]. In this study, from 0% to 10%. In this study, according to above
we applied the single-point crossover. It begins the encoding method’s character, we don’t mutate
random point of two strings. This point is called decision variable z j (the variable number of z j is
tangential point. We combine the point’s left string large, and it can insure to generate more individuals).
of parent 1 with the point’s right string of parent 2
and generate the children 1 and children 2. For So we only mutate decision variable xij , y jk . We
example: apply uniform mutation in this study.
P1:001100:110011 P2:000011:110000
6. Numerical examples
C1:001100:110000 C2:000011:110011 Now, one region needs some second hand computer.
Children 1 and children 2 are different from parent In order to save resource, one company takes charge
1 and parent 2, but save some character of parent. of the disused computer’s recycling and re-using.
The probability of crossover point selected at random There are eight recycling site, five potential treatment
is called crossover probability. In this study, we adopt center and two second hand market. The concrete
adaptive crossover probability: data is shown in tables 2 , 3, 4, 5,6 and 7.
π t
Pc = Pc max × cos( × ), ( Pc > Pc min )
2 T
Table 5 the unit transport cost from recycle site to treatment center(Yuan/one )
Recycle site Treatment center
1 2 3 4 5
1 20 63 49 78 95
2 17 21 32 64 72
3 28 25 30 51 52
4 40 20 23 49 47
5 70 32 19 30 31
6 66 55 43 20 27
7 74 47 49 25 38
8 66 45 45 33 27
138
Table 6 the unit transport cost from treatment center to second hand market(Yuan/one)
Treatment center Second hand market
1 2
1 5 25
2 10 13
3 20 7
4 40 15
5 45 17
7. Conclusions and future research [4]Jayaraman. V., Patterson. R. A., Rolland. E, The design
directions of reverse distribution networks: Models and solution
procedures [J], European Journal of Operational Research,
2003,150(1), pp.128-149.
On the basis of summarizing domestic and overseas
research about reverse logistics management, this [5]Da Qingli. Huang Zuqing. Zhang Qin, Current and
paper proposes re-use reverse logistics system model Future Studies on Structure of the Reverse Logistics
of disused household appliances. Because of System:A Review [J], Chinese Journal of Management
complexity of network, we adopt genetic algorithm sicience ,2004,12(1), pp.131-138.
to solve the problem. Finally, we give the relative
example to analyze the model and algorithm. The [6] Ma Zujun. Dai Ying, Optimization Model for Reverse
example proves that we can obtain reasonable route Logistics Network Design for product recovery [J], Journal
and the location of treatment center quickly by of industrial Engineering and Engineering Management,
2005,19(4), pp.114-117.
applying genetic algorithm to optimize model.
Despite numerous merits described above, the [7] Zhou Gengui. Cao Zhenyu, A Genetic Algorithm
proposed model and solution procedure point to a Approach to Location-Allocation Problem in Reverse
number of directions for future work: Logistic Network [J], Chinese Journal of Management
(1) The paper only considers the recycle sites are Science, 2005,13(1), pp.42-47.
known, but in practice, it always is not known. In
future, we can also consider selecting the recycle site [8]Gen,M., Cheng,R., Genetic Algorithms and Engineering
in potential site. Optimizations, Wiley, New York.2000.
(2) The model can be expanded to include the
element of uncertainty involved in the reverse
logistics network design problem.
(3) The other heuristics methods such as
Lagrangian relaxation and Tabu search are worth
investigating in future studies, and compare them
with genetic algorithm.
139
2008 International Conference on Intelligent Computation Technology and Automation
Mingyi Cui
School of Information, Henan University of Finance & Economics, 450002,
Zhengzhou,China
(mycui369@yahoo.com.cn)
141
a variable is changed in the individual. After value of individual perturbed in the 0th generation
crossover operation, if one or more variable value in population is calculated with equation (1).
the new individual is outside the interval Step 3: evaluate individuals in the 0th generation
population.
( lower ( x j ), upper ( x j ) ), makes tuning is as
Step 4: k = 1 .
follows.
Step 5: For individual l ∈ [1, M ] , four different
x′j , k =
integers r1 , r2 , r3 , r4 ∈ [1, M ] ( r1 ≠ r2 ≠ r3 ≠ r4 )
⎧ x + lower( x j )
r4
142
follows. research on DE is later. In the ten-odd years, the
(1)F6 function (Schaffer1 function) research on DE enriches greatly the result of
evolutionary computation, opens up a new field of
min f ( x) = ( x1 + x2 )
2 2 0.25
evolution computation, offsets the flaw of simple
evolutionary computation. DE exhibits greater
×[sin 2 (50 × ( x12 + x22 )0.1 ) + 1.0] (6)
predominance over evolutionary computation with its
own search performance, robustness and fine-tuning
s.t. xi ∈ [−10,10]
ability. But, the research result of float code
(2) F7 function(Schaffer2 function) evolution computation based on DE is very fewer. In
the paper, we combine the property of DE with the
sin x12 + x22 − 0.5
min f ( x ) = 0.5 + (7) advantage of float code, presents SFEADE as a new
[1 + α × ( x12 + x22 )]2 method. Through programming and repeating
experiments, the result indicates which SFEADE is
s.t. α ∈ {0.001,0.01,0.1,1.0}
credible in performance and feasible in technique.
SFEADE has stronger practicability in engineering
xi ∈ [−10,10]
optimization. It can be considered that the theoretic
For the two functions, the population size is all research and applicable research on DE should
100. The evolution generations are 100. The same achieve more plentiful fruits, through more scholars
sample was used to testing their optimal fitness, the make great efforts.
average fitness and the standard variance (the
deviation norm of the optimal solution gene value) of Table 1. Comparing GA with SFEADE for F6 and F7
the two functions on GA and SFEADE. The function
experiment results are shown in table 1. The running F6
results of the two functions on GA and SFEADE are Optim Best Mean Stddev
shown in figure 1 and figure 2. The experiment al
results indicate: GA 0 0.018329 0.10887 9.7156e-
(1) With the same samples and the same genetic 04
operator, from the viewpoint of the optimal fitness, SFEADE 0 5.17037 0.001214 7.4643e-
the average fitness and the standard variance etc. e-04 04
SFEADE is superior to GA. This illustrates which F7( α =0.01)
SFEADE is reliable and feasible. GA 0 0.020627 0.026049 4.1789e-
(2) Because of the self adaptability, robustness, 06
fine tuning and search performance of SFEADE, SFEADE 0 2.35366 84936 3.468 e
SFEADE is of higher local search performance than e-04 e-04 -07
GA. This offsets the flaw of lower local search
performance and easy premature convergence of GA.
References
Thus it can consider that SFEADE is a more [1] R. Storn and K. Price. Differential evolution - a simple
excellent float code evolution algorithm. and efficient adaptive scheme for global optimization
over continuous spaces. Technical report, International
5.Conclusions Computer Science Institute, Berkley, 1995.
[2] Rainer Storn. System design by constraint adaptation
Evolutionary computation is all along a research and differential evolution.Evolutionary Computation,
hotspot of computational intelligence fields. But the IEEE Transactions on Volume 3, Issue 1, Apr
143
1999,pp.22-34 Representations Genetic Algorithm. In: Proc. Of 4th Int.
[3] Abbass, H.A.Sarker, R and Newton, C.PDE: a Conf. on Genetic Algorithms, Morgan Kaufmann,
Pareto-frontier differential evolution approach for 1991,pp.31-36
multi-objective optimization problems. Evolutionary [13] Lei De-Ming. The Genetic Algorithm on
Computation. Proceedings of the 2001 Congress on, Multi-Dimension Real Number Code. Control and
Volume 2, May 2001,pp. 971-978 Decision. 2000,15(2),pp.239-241(in Chinese)
[4] Abbass, H.A. The self-adaptive Pareto differential [14] Eiben, .A.E., Arts, E.H., and Van Hee, K.M. Global
evolution algorithm. Evolutionary Computation, CEC Convergence of Genetic Algorithm: an Infinite Markov
'02. Proceedings of the 2002 Congress on, Volume 1, Chain Analysis. In Parallel Solving from Nature(PPSN
May 2002,pp.831-836 1). Schwefel, H. -P., and Männer, R.(eds.), Heidelberg
[5] Hui-Yuan Fan and Jouni Lampinen. A Trigonometric Berlin: Springer-Verlag, 1991,pp.4-12
Mutation Operation to Differential Evolution. Journal of
Global Optimization. Volume 27, Number
1.2003,pp.105-129
[6] Jakob,Vesterstrøm and René,Thomsen. A comparative
study of differential evolution, particle swarm
optimization, and evolutionary algorithms on numerical (a) GA
benchmark problems. Evolutionary Computation, CEC
'2004. Proceedings of the 2004 Congress on, Volume 2,
June 2004,pp.1980-1987
[7] Rainer Storn. Designing nonstandard filters with
differential evolution. Signal Processing Magazine,
IEEE. Volume 22, Issue 1, Jan. 2005,pp. 103-106 (b) SFEADE
[8] Ronkkonen, J. Kukkonen and SPrice, Fig. 1 Evolution running in GA and SFEADE for
K.V.Real-Parameter Optimization with Differential F6 function
Evolution. Evolutionary Computation. The 2005 IEEE
Congress on, Volume 1, Sep. 2005,pp.506-513
[9] Zhenyu Yang, Ke Tang and Xin Yao. Differential
Evolution for High-Dimensional Function Optimization.
2007 IEEE Congress on Evolutionary Computation
(CEC 2007), IEEE, ISBN: (a) GA
1-4244-1340-0/07,pp.3523-3530
[10] Swagatam Das, Ajith Abraham and Senior Member.
Automatic Clustering Using an Improved Differential
Evolution Algorithm. IEEE Transactions on Systems,
Man, and Cybernetics—Part A: Systems and Humans,
VOL. 38, NO. 1,2008,pp.218-237
[11] Michalewicz Z, Krawczyk ,J, Kazemi, M., and (b) SFEADE
Janikow, C. Genetic Algorithms and Optimal Control Fig. 2 Evolution running in GA and SFEADE for
Problem. In: Proc. Of 29th IEEE Conf. on Decision and F7 function
Control, 1990,pp.:1664-1666
[12] Jomikow C Z, Michalewicz Z. An Experimental
Comparison of Binary and Floating Point
144
2008 International Conference on Intelligent Computation Technology and Automation
146
Step2l: Letting mo=mo+1. If mo ≤ m (total By saving hybrid genetic algorithm, the solving
vehicles), transferring to step 15; otherwise, merging process is as follows. See table 4 for the last results.
the subroutes of m vehicles together; forming the No.j ••• • • •• •• ••• • ••• •• •• • •• •• • •• ••• • • •• • •• • • ••• •••••••
complete distribution route and to continue; ••• • • • ••• •• •• • •••• • •
Step22: Letting jj+1. if j ≤ n (population scale), Route Distribution
Distribution Carrying Actual
transferring to step 12; otherwise, continue; distance capacity capacity
No. route
Step23: Coding n distribution routes as n (km) (tons) rate
chromosomes to form new population p (t + 1) . 1
0-11-12
148 3.9 97.5%
Letting t=t+1, transferring to step4; -13-10-0
The above steps can be realized by software like 2 0-6-8-9-4-0 80 3.9 97.5%
VB. 3 0-5-7-3-2-0 69 3.9 97.5%
4 0-1-0 2 1.5 37.5%
Assigned vehicles: 4
4. Realization of algorithm
Total traveling distance: 299km
Assuming a distribution center distribute goods to
13 clientsC1—C13by using vans with a capacity of 5. Conclusion
4 tons. The unit freight between spots is the same and
delivered quantities to each client are listed in table 1 By comparing the computed results through saving
below. Distances between distribution centerC0and algorithm and saving hybrid genetic algorithm,
clients are shown in table 2. assigned vehicles are both 4 and for the total traveling
• • • •• •• ••• • • •• •• ••• ••• • •• •• • • • ••• • •••••• • •• distance, the result of saving hybrid genetic algorithm
is 29km less than that of saving algorithm. Meanwhile
Client C1 C2 C3 C4 C5 C6 C7 C8 C9 C10C11C12C13 as to the actual capacity of vehicles, three vehicles of
Need 1.50.40.71.01.60.81.21.50.6 1.0 1.0 0.8 1.1 them reach 97.5%, which is better than the result of
saving algorithm.
• • • •• •• ••• •• •• • • • • •• • •• • • • •• ••• • •• ••• • ••••• • •• On the basis of above analysis, the saving hybrid
C0 genetic algorithm combines the genetic algorithm and
1 C1 saving algorithm to preferably have settled the issue of
7 6 C2 distribution route optimization. However, this
12 11 6 C3 algorithm needs a certain amount of iterative
24 23 29 35 C4 computation, which should be realized by computers,
so it is unsuitable for manual computation.
14 13 19 25 13 C5
17 16 22 23 20 10 C6
6.References
18 17 23 25 24 17 7 C7
23 22 28 33 9 9 15 22 C8 [1] Li Yongsheng, Zheng Wenling, “Management on Storage
40 39 45 41 15 28 24 31 9 C9 and Distribution”, China Machine Press, Beijing, 2005.
33 32 38 43 23 20 26 33 10 7 C10 [2] Xu Tianliang, “Transportation and Distribution”, China
35 34 38 44 57 35 25 19 44 57 50 C11 Logistics Publishing House, Beijing, 2002.
[3]Li Jun, Guo Yaohuang, “Optimization Theory and
45 44 52 55 43 36 26 30 32 29 22 40 C12 Methods on Logistics and Distribution Vehicle Scheduling”,
Based on the above figures, adopt saving algorithm China Logistics Publishing House, Beijing, 2001.
to optimize distribution route, the results of which are [4] Zhao Jiajun, Yu Baoqin, “Management on Modern
presented in table 3 below. Logistics and Distribution”. Beijing University Press, Beijing,
• • • •• •• ••• • ••• •• •• • •• •• • •• • •• • • •• • •• •• • •••• • • 2004.
Distribution Carrying Actual [5] Zhu Deyong, “the Optimal Model and Experiment”,
Route Tongji University Press, Shanghai, 2003.
Distribution route distance capacity capacity [6] Schoolbook-compiling group of “Operations Research”,
No.
(km) (tons) rate “Operations Research”, Tsinghua University Press. Beijing,
1 0-12-13-10-9-0 132 3.5 87.5% 1997.
2 0-11-8-4-0 112 3.5 87.5% [7] Gong Peizeng, Lu Weimin, Yang Zhiqiang, “Visual
3 0-7-6-5-0 49 3.6 90% Basic Design Guide”, Higher Education Press, Beijing, 2003.
4 0-3-2-1-0 25 2.6 65%
Assigned vehicles: 4
Total traveling distance:328km
147
2008 International Conference on Intelligent Computation Technology and Automation
Clustering analysis is an important part of the Data As an optimization algorithm, Initially, Particle
Mining research; it is an important method of the swarm optimization algorithm is used for optimization
unsupervised learning. It divides the data into certain of the Continuous space, in the continuous space
polymerization classes according to the attribute of the coordinate system; Mathematical description of
data ,enable the element of every class to have the PSO[3,4,5] is as follows:
same characteristic as far as possible, the characteristic We suppose population size is N, Each particle is
difference among the different polymerization class is treated as a point in a D dimensional space. The ith
as far as possible big[1]. particle is represented as xi =(xi1,xi2,…,xid …,xiD), xi
The traditional clustering algorithm seeks the is a latent solution of the optimized question. The rate
optimal solution of the researched question through the of the particle i is represented as vi =(vi1,
iterative Hill-climbing method, because it is a local vi2,…,vid …,viD),it is a position change quantity of
search algorithm, it has some shortages. We take the particle in an iteration. The particles are manipulated
K-means clustering algorithm[2] as the example; people according to the following equation:
have found two inherent drawbacks in the practical vid = ωvid + c1rand1 ()(
pid − xid ) + c2 rand 2 (
)( p gd − xid ) (a)
application, (1)the random selection of Starting value
may lead to different clustering results, even has no ⎧vid = vmax if vid > vmax (b)
solution ; (2) The algorithm is an algorithm based on ⎨
the objective function; it usually solves the extreme ⎩vid = −vmax if vid < −vmax
value problem by the gradient method. Because the xid = xid + vid (c)
gradient method searches along the energy decrement
In the equation (a), the historical best position of all
direction, the algorithm falls into the local extreme
the particles in the population is represented by pgd, the
value easily. These flaws have limited its application
historical best position of the current particle is
scope greatly.
represented by pid, the particle’s new velocity is
PSO is an effectively global optimization algorithm,
calculated according to its previous velocity and the
it guides optimization search by the Swarm
distances of its current position from its own historical
149
divide the set {x1 , x2, …, xN} according to the
distance regulation of K-means algorithm.
(3) For each particle Yi, Calculate the fitness
evaluation according to the expression f(Yi) Table 1 contrast result1
(4) Compare and reset the historical best position method clustering number average best fitness value
pbest and the best fitness evaluation of each particle, clustering algorithm based on PSO 3 0.26224
Compare and reset the global best position gbest and the k-means clustering algorithm 3 0.361840
best fitness evaluation of particle swarm.
(5) Change the velocity and position of particles
according to equations (a) and (c) and limit them the second group is Iris (150, 4, 3), This data set
according to equations (b) and (e). contains 150 sample records, it is from the flowers
sample of setosa,versicolor and virginica, there are 50
⎧ xid = xmax if xid > xmax records in every class, Each record has 4 attributes:
⎨ sepal length, sepal width, petal length and petal width,
⎩ xid = − xmax if xid < − xmax (e) the unit is the centimeter, considering visibility of
graph, we only carry on the experiment to two
In the expression (e), we select the maximum attributes of petal, Figure 2 is the scatter diagram of the
value of each dimension in all points as xmax Iris data set petal attribute.
(6) Inspect termination condition (the algorithm
has achieved the hypothesis biggest iterative times) if 3
y
it is satisfied then terminate the algorithm, else return 2.5
(2) 2
(7) Output classification result 1.5
1
5. Algorithm test and comparative analysis 0.5
0
We carried on the Clustering test to the new 0 2 4 6 8
clustering algorithm and contrasted the test results with x
k-means clustering algorithm. The experimental data
divides into two groups, the first group is city
coordinates of Hopfield-10 TSP, and the second group Figure 2 the scatter diagram of the Iris data set petal attribute
is Iris (150, 4, 3), which is a benchmark example In the Figure 2, the setosa data separate from
known as classification, in the clustering algorithm other data, but the separation property is very bad
based on Particle Swarm Optimization algorithm, we about versicolor and virginica, therefore, we select 100
set acceleration coefficient c1 = c2=1.3, ω linearly data of versicolor and virginica and carry on the test.
reduces from 1.0 to 0.3, two algorithms were carried In the experiment we set population size is 130; the
on 10 times, we took the average optimal solution. test result is as follows:
Distribution map of the first group data as follows: Table 2 contrast result2
method clustering number average best fitness value error rate
1
Y
0.8
clustering algorithm based on PSO 2 0.273040 5%
0.6
k-means clustering algorithm 2 0.340202 8%
0.4
0.2
150
algorithm; the 28th and the 34th of versicolor are
divided into virginica, the 7th, the 20th, the 24th, the 27th,
the 28th and the 39th of virginica are divided into
versicolor. Total error rate is 8%. The former error rate
is lower than the latter. This has demonstrated the
advantage of the clustering algorithm based on PSO.
6. Conclusion
The k-means clustering algorithm is one of the
most widely used clustering method for its Simple idea,
But the random selection of Starting centers may lead
to different clustering results, even has no solution,
considering the global search ability of PSO, this paper
proposes the clustering algorithm based on PSO and
designs corresponding adaptability function. The
algorithm is evaluated on Iris plants database, Results
show that the algorithm is more effective and
promising. The experimental results indicate that the
clustering algorithm based on PSO is better than the k-
means clustering algorithm.
References
[1] A.K. Jain, M.N. Murty, and P.J. Flynn, “Data clustering:
A Review”, ACM Computing Survey, 1999, pp.1-60.
[2] J. B. MacQueen, “Some methods for classification and
analysis of multivariate observations”, In: proceedings of
the 5th Berkeley Symposium on mathematics Statistic
Problem, 1967, pp: 281-297.
[3] Y. Shi, R.C. Eberhart, “Fuzzy adaptive particle swarm
optimization”, In: Proc. of the IEEE CEC, IEEE Press, 2001,
pp.101-106.
[4] Y.H. Shi,R.C. Eberhart, “A modified particle swarm
optimizer”, In: Proc. of the IEEE CEC ,IEEE Press, 1998,
pp.69-73.
[5] Y. Z. Yao, Y. R. Xu, “Parameter analysis of particle
swarm optimization algorithm”, Journal of Harbin
Engineering University,2007, pp.1242-1246
[6] S. Gao, J.Y. Yang, “New Clustering Method Based on
Particle Swarm Algorithm”, Journal of Nanjing University of
Aeronautics &Astronautics, 2006, pp.62-65.
[7] L.H. Lu,B. Wang,” Improved Genetic Algorithm-based
clustering approach”, Computer Engineering and
Applications, 2007, pp.170-172.
[8] J. Kennedy, R.C. Eberhart, and Y. Shi, Swarm
Intelligence, Morgan Kaufman Publishers, San Francisco,
2001.
[9]M. Clerc, J. Kennedy, “The particle swarm: explosion,
stability, and convergence in a multi-dimensional complex
space”, IEEE Trans. Evolut. Comput. , 2002, pp. 58-73.
[10]S. Katare, A. Kalos, and D. West, “A hybrid swarm
optimizer for efficient parameter estimation”, In: Proc. of the
IEEE CEC, IEEE Press, 2004, pp: 309-315.
151
2008 International Conference on Intelligent Computation Technology and Automation
The Model Based on Grey Theory and PSO for Electricity Consumption
Forecasting
vector X i = ( xi1 , xi 2 ,..., xiD ) and the flying velocity On the basis of conventional GM (1, 1), we import
By a vector
α0 , we can get the following matrix
can be obtained by comparing X i to the target
from the equation.
function[2]. Therefore, the search procedure of the PSO
algorithm depends on interaction among the particles. ⎡ −(α02 x(1) (1) + (1−α02 )x(1) (2)) 1⎤
The velocity and position of a particle i can be ⎢ ⎥
⎢ −(α03x (2) + (1−α03 )x (3))
(1) (1)
updated as:
1⎥
⎢ . .⎥
Vi+1 = w•Vi +cr
1 1(Pi − Xi ) +c2r2(Pg − Xi ) (1) B0 = ⎢ ⎥
⎢ . .⎥
X i +1 = X i + Vi (2) ⎢ . .⎥
⎢ ⎥
⎢⎣−(α0n x (n −1) + (1−α0n )x (n)) 1⎥⎦
(1) (1)
in which, w is inertia weight, Vi is the velocity of
Put B0 into the equation,
particle i, X i is the position ,the c1 and c2 are
153
1
∧
⎛∧⎞ f (α i ) = (7)
a n
A = ( BT B)−1 BT Yn = ⎜ ∧ ⎟ 1 + ∑ (x (k ) − x (k ))
(0) (1) 2
(4)
⎜ ⎟ k =1
⎝u ⎠ From the analysis, we can see the value of error
In the end, we can get the improved grey
square summation is smaller, the value of f (α i ) is
forecasting model.
greater. The result shows that the adaptability of
2.3 The Model Based on Grey Theory and
PSO vector α i in grey model is better.
According to the above analysis, if only give a Step 3, Compare particle’s fitness evaluation with
vector α , we can get the forecasting value. particle’s previous best:
With the purpose of minimal error square
if f (αi ) > pbest , then pbest = f (αi ),
summation, the process for seeking the PSOGM model
and if f (αi ) > gbest , then gbest = f (αi )
based on PSO as follows:
Step 1, Initialize particles with random positions Step 4, Use equation (1) and (2) to optimize the
and velocities on n-dimensions in the problem space. position of particles. According to the early test, this
The vectors of position and velocity respectively
paper defines w = 1.0 , c1 = c2 = 2.0 , the Vmax is
are αi =(αi1,αi2,...,αim) and Vi = (vi1 , vi 2 ,..., vin )
10%~20% of each dimension changing bound.
Step 5, Stop rule: Loop to step (2) until a criterion
.The number of original load is i = 1, 2,..., m, n , and
is met.
Step 6, if necessary, the result can be used as
this paper limits 0 ≤ α ik ≤ 1, 0 ≤ vik ≤ 1.1 ;
known data; repeat the above processes to forecast the
Step 2, Calculate the fitness of each particle: input electricity consumption next year further.
∑(x
k =1
(0)
(k) − x(1) (k))2 ,this paper defines the fitness
function f (α i ) as follows,
154
Table 1.The statistics of Bayannur
unit:1×104kwh
sequence 2006 2006
sort 2002 2003 2004 2005
number (forecasting) (practical)
Resident
1 12307.09 13173.5 13685.28 15363.99 15583.92 15633.88
illumination
Non-Resident
2 2203.15 2482.51 3069.68 3607.95 4019.72 4022.81
illumination
3 Big industry 70536.99 99863.01 183993.47 219527.57 335097.41 333587.97
General non
4 7021.26 8526.18 11888.53 15071.47 13454.14 13432.43
industry
5 Commerce 1805.53 1837.5 2742.89 3893.61 4961.97 5044.48
155
Compared with others, the influence of industrial not only in terms of search efficiency and stability of
electricity consumption is greater, which becomes the convergence, but also in the search for optimal
main use of electricity. By calculating the practical solutions overall, has both good performances.
data, we get the results, which show that the All of above analysis show that the forecast
proportion of industrial electricity consumption heads precision of the model is high, and the model has a
the list all the time, in 2006, Big industrial electricity certain ability to generalize. This paper provides an
consumption accounts for 65.91% , the others effective tool for the practical load forecasting.
respectively: Resident illumination3.09%,
Non-Resident illumination 0.79%, General non 6.References
industry2.65%, Commerce 1%, Agriculture 2.81%,
Bulk sale electricity 23.62%. [1] Niu Dongxiao, Cao Shuhua, Zhao Lei." The Load
From the analysis, we can see the forecasting Forecasting and Its Application", China Electric Power
results and the practice are consistent in essence, book concern, Beijing,1998.
which shows the practicality and effectiveness of the [2]Chen Bo, Jiang Jin, Guo Yongtao, Deng
model. According to the forecasting results, power Wujun."Research on Load Forecast Model Based on Grey
Enterprise can combine local economic development Theory and Its Application in Power Supply
status to take the appropriate marketing. System",Sichuan Electric Power Technology, the Electrical
Engineering Academy,Sichuan,2006,pp.12-14.
5. Conclusion [3]Niu Dongxiao, Zhang Bo, Chen lirong, Zhang Tongtong.
"Application of intelligent optimization grey model in
(1) Import the vector α ,
this paper proposes the middle-term electricity demand forecasting",East China
application of improved grey prediction model GM (1, Electric Power,the Electric Power Experimentation
1, α ), which expands the application bound of Academe,Shanghai, 2006,pp.8-11.
conventional GM (1, 1), overcomes the deficiency of [4]Wu Hongxiao, Hou Zhijian, Tai Nengling."Application of
prediction accuracy reduces facilely. The results show grey neural network model GNNH (1,1) in city electricity
that the precision of the improved model is high, and demand forecasting",Electric Power, the Electric Power
the error is small. The model has a certain practical Journal Society of the Nation Power
value. Company ,Beijing,2005,pp.45-48.
(2) By using PSO, the model overcomes the [5] Xiong Gang, hen Zhangchao."Defect of grey forecasting
deficiency of conventional method that is difficult to model and Its Improvement",System Engineering,the System
determine the nonlinear function. It makes the method Engineering Academy, Hunan, 1992, pp.32-36.
156
Session 2
ICICTA 2008
2008 International Conference on Intelligent Computation Technology and Automation
1. Introduction
Many countries raise some higher requirements for
the integrity and cleanness of paper currency, because
it represents the country’s development level in the
economy and the culture [1]. To ensure the good
integrity and cleanness of banknotes in currency,
banknote sorting is the important service of the bank.
The main functions of banknote sorting include the
classification of the integrity and cleanness among the
new and used banknotes, the classification of the
banknote orientations, the identification of banknote
denomination and so on. The identification of the new Figure 1. Gray level histogram of the face sides of the
and used banknotes is based on the gray level of the old RMB note and the new RMB note
surface, which is one of the important functions of the In the histogram of the old banknote and the new
note sorter. Then the exceeding damaged and old banknote, the distinct difference exists in the high gray
banknotes are picked out. level part. The number of the high gray level part of the
In order to perform the rejecting job of the damaged new banknote is more than the old. But little difference
and old banknotes, this paper proposes an exists in the part of the low gray level less than a
identification and classification method based on the threshold. The low gray level data in the above
characteristics of the gray level histogram of banknote histogram cannot be used to judge the banknote dirty
image and neural network with sine basis functions. factor. Therefore selecting the proper threshold is
extremely necessary. According to the characteristics
2. Feature extraction of the pixel distribution in the gray level histogram,
although the image segmentation threshold can be got
The dirty factor of the used banknote can be shown by the bipolar method, the threshold is not suitable for
in the gray level histogram. The newer the banknote is, the banknote identification and classification. It is
the more the pixel probability distribution is in the part because the bipolar method omits a lot of information
y(Ω) ∂J ∂J ∂e(t ) ∂Y (Ω t )
wi
ωi 1 ∑ ΔW = −η = −η
1 Ci ∂W ∂e(t ) ∂Y (Ω t ) ∂Ω t
wN = ηe (t )C (Ω t )
…
(9)
ωN
1
1 CN W (t + 1) = W (t ) + ηe (t )C (Ω t ) (10)
Where η is the learning rate, and 0<η<1.
Figure 2. Structure of neural network Convergence of neural network: If the learning rate
In the neural network with sine basis functions is set in 0≤η≤2/N, the calculation of neural network
shown in Figure 2, sine basis functions are C1(ω1), with sine basis functions is convergent, N of which is
C2(ω2),…Cn(ωn) given by the number of hidden layer neurons. The convergence
of neural network is demonstrated in Reference [5] in
detail.
160
4. Training the neural network with sine 5. Experiment result and analysis
basis functions
In the process of the project application of neural
To achieve the automatic sorting of banknote, firstly network, the sufficient training samples are used to
images of banknote samples are converted to gray level ensure the accuracy of classification, which can cover
histograms correspondingly. The number of images is the actual conditions in most banknote sorting cases. In
m. The segmentation threshold T is got by the method the experiment there are the following test data shown
of the maximum between-cluster variance by analyzing in Figure 3. Three curves represent gray level
the gray level histogram of the newest banknote image. histograms of three test banknotes in differently dirty
The pixel distribution probability of the gray level in factor correspondingly.
the interval [T,T+1,…,255] is used as the training
sample.
According to the structure of neural network and the
weight value revision method, the following training
method is designed.
Step 1: Neural network weight value wi is initialized
by random number. The learning rate η and a fixed
sufficiently small positive number ε are set.
Step 2: In the banknote image of the first level, the
probability p161, p162,…, p255 of gray level value in the
interval [161,255] is used as the neural network input
vector Ω1 given by
Ω1=[ω1,ω2,…ωn ]T=[ p161, p162,…, p255]T.
Step 3: Firstly, the output of the sine basis neuron is
calculated, and the output is defined as C(Ω)=[ C1(ω1),
C2(ω2),…Cn(ωn)]T,and then the neural network output
Y(Ω1) is calculated.
Step 4: The actual output is compared with the Figure 3. The histogram of three test banknotes
expected output D(Ω1) , and then the error e(t) is given When the test data are identified by the trained
by neural network, the output of the neural network is got
e(t) = D(Ω1)- Y(Ω1). as Table 1. From Table 1, the output of neural network
Step 5: The weight value adjustment ηe (t) C(ωi) is converges to the expected level of banknote. The
calculated according to e (t). The weight value W(t+1) classifying result is satisfied
of output neuron is adjusted by Table 1.Classification results of three test banknotes
W(t+1)=W (t)+ηe (t) C(ωi)。 New Older Oldest
Step 6: In the banknote image of the second level, Output of neural
0.7020 0.3908 0.2082
the gray level distribution probability Ω2 is used as the network
input vector, where Ω2=[ω1,ω2,…ωn ]T=[ p161, p162,…, expected level 0.7 0.4 0.2
p255]. Then continue to calculate Step 3, 4, 5. The
training is not finished until data of m samples is 6. Summary
calculated and the weight value is adjusted completely.
Step 7: The total error J 总 is given by With the analysis of characteristics of pixel
m probability distribution in the gray level histogram of
1
J总 = ∑ ei (t ) .
2 i =1
banknote image, the pixel distribution probabilities are
divided into two types by the threshold segmentation
If J 总>ε , the training jumps to step 1,and continue to method of maximum between-cluster variance. Then
train the neural network. If J 总<ε , the training of neural the pixel probability data higher than threshold are
network comes to an end. used as characteristic vectors that presents banknote
Therefore, the gray level distribution probability of dirty factor. The characteristic vectors of images are
banknote samples is used as characteristics to train used as the training samples of neural network based
neural network. on sine basis functions. Neural network accomplishes
After the repeated training, the output of neural the identification and classification of banknote dirty
network is converged to the expected output. Finally factor through the study of neural network samples.
the training of neural network is accomplished. In the banknote sorting experiments, the
161
classification method based on neural network with
sine basis functions has many merits, such as the
suitable calculation amount, the high convergence
speed of neural network, the effective classification
and so on. The actual project problems in the note
sorter are solved successfully.
7. Acknowledge
This work is supported by the Natural Science
Foundation of education department of Hunan
province of China (07C073).
Reference
162
2008 International Conference on Intelligent Computation Technology and Automation
Abstract 1. Introduction
Due to the larger number factors on the quality of Air pollution of Vehicle exhaust emissions is the
the atmosphere, the different contributions of air comprehensive results of many pollutants, the
quality, and the complex mutual influence between interaction of various factors must be considered on
factors, it is difficult to establish a recognized, traffic atmosphere environmental impact assessment.
established evaluation model. At present, fuzzy math, Over the past 20 years, scholars have put forth a lot
grey theory which superior over other evaluation of national air traffic environment impact assessment
methods have been widely used in practice, but they models. Due to the factor on the quality of the
still have some drawbacks. For a better and more atmosphere there is a big difference on contribution
comprehensive evaluation of the factors on the and the interaction is difficult to identify. So far, it
impact of air traffic environment, the air traffic has still explored various pollutants in a separate
environment impact assessment index system was impact, no one recognized, established evaluation
established. the paper used analytic hierarchy model. At present, fuzzy math, grey theory has been
process (AHP) and ultra-multiple method to analyze widely used in practice .Though they overcome the
the various factors which impact the traffic shortage in other evaluation methods, there still own
atmospheric environment. It not only considered all some drawbacks, such as [1]: misjudgment; some of
factors in the combined effects of weight, but also the information will be lost because of various kinds
highlighted the main factors in the evaluation of of models; complicated calculation and so on.
pollution in the main role-sharing, using arithmetic The paper uses AHP and ultra-multiple method to
mean empowering, then based on Kohonen network analyze various factors that impact the traffic
theory, the paper proposed a new method which atmospheric environment, which are considered in
evaluating the traffic atmospheric environment. the combined effects of various factor in weight, and
Through introducing the example and analyzing the highlight the major pollutants in the traffic
results of neural networks, fuzzy evaluation, grey atmosphere environment impact assessment of the
evaluation, matter-element model,it shows the new major share, a means to empower the law, then based
method is easy to use and an reasonable and on Kohonen network theory, the new method
accurate evaluation of the impact of air traffic presented in this paper is easy to operate, accurate in
e n v i r o n m e n t m e t h o d . evaluating results and is influenced by traffic.
CO SO2 NOx PM10 TSP make all the indicators to a 0-1 unit interval. This
paper uses the fuzzy math "membership" concept in
Fig.1 Assessment index system the standardization process.
Are indicators: the values of the indicators are the
3. Multi-factor comprehensive evaluation bigger the better. It uses semi - trapezoidal
method distribution function to standardize indicators.
⎧0 vi ≤ C ( vi )
⎪
⎪ v − C ( vi )
3.1. Discriminated samples N ( vi ) = ⎨ i C ( vi ) < v i < T ( v i )
⎪ T ( vi ) − C ( vi )
⎪⎩1 v i > T (v i )
According to the "ambient air quality standards",
it sets samples ranges as follows: Inverse indicators: the smaller the values, the
CO(0.00,6.00) NOx(0.00,0.15) better are, and use reduced semi - trapezoidal
SO2(0.00,0.25) PM10(0.00,0.25) distribution function to standardize indicators.
TSP(0.00,0.50) ⎧1 vi ≤ C ( vi )
⎪
we can see that when the pollutants in the ambient ⎪ C ( vi ) − v i
N ( vi ) = ⎨ C ( vi ) < v i < T ( vi )
air concentration of value in the sector, the pollutants ⎪ C (v i ) − T (v i )
⎪⎩0 vi > T ( vi )
will have a serious impact on the environment, the
value exceeded the upper bound of the sample
Where vi , C (vi ) , T (vi ) , N (vi ) as an original
evaluation is decided by the major pollutants, no
longer considering the impact of other pollutants. Its value , the threshold , the target value and
specific criteria in Table 1: standardization value of the indicator i respectively.
When the value of the concentration of pollutants A ft er in di ca t or s st a n dar diz ed, sust a i na bl e
is in the value of the sector, we should accord to development hyperspace will change into unit
th e foll owin g meth od s to evaluate. h y p e r s p a c e .
164
3. 4. Weight set up c o n t a m i n a t e d e m p o w e r .
5
So far, there have a lot of researches to determine ω li = bi / ∑ bi bi = C i / S 0i
the weights. Among them, researchers in the i =1
mathematical methods to determine the main weight average multiples over standard
were called of the objective weight defining methods, ω li ——Factors section of the contribution rate
such as expert advice, principal component analysis, f a c t o r s
3.4.3 Evaluation of the factors in the entire system
AHP and gray coloration methods, and so on.
of weights
Mathematical methods can be test the accuracy and
Evaluation of the factors in the entire system of
r educe subj e ct i ve an d ar bi t rar y, th er efor e
w e i g h t s
mathematical method used to determine the weights
on more extensive. However, as any mathematical
ω i = (ω ki + ω li ) / 2 i = 1,2,3,4,5
m et h od s us ed wh i ch h a s i m pos ed c er t a i n 3.5 Comprehensive evaluation of multiple
requirements and limitations, and in the choice of factors Kohonen network model
mathematical methods and the original data
collection also with the subjective, the most Kohonen network is proposed by Kohonen
i m p or t a n t i s i t s fl e x i bi l i t y r a t h e r p oor . Professor of the Fenlands Heroin University in the
Because these parameters do not have sufficient 1987's. This network simulates brain characteristics
information to use the objective weight defining of the self-organizing system function; it is a
methods, the only law empowers subjective. For the c om p et i t i ve l ea r n i n g n et wor k, wh i ch ca n
commonly used analytic hierarchy process (AHP), s e l f- or g a n i z e s t u d y wi t h ou t s u p e r vi s i on .
algorithm and its conclusions were based on the In the course of study can be conducted without
judgment matrix of consistency. In practical supervision and self-organized study also known as
application, as established by the judgment matrix is self-organizing neural network, which in recent years
often not consistent matrix, and this will lead to the in the classification model has been widely used.
evaluation indexes weight coefficient ranking of Internet users only need to provide learning samples,
i n s a n i t y . rather than provide an ideal output, network based on
In the Comprehensive Assessment, in order to take the input samples for self-organization, and its
into account both environmental impact of various division should be relative to the model category.
factors on the different levels, and highlighted the 3.5.1. Network Structure
main factors in the evaluation of pollution in the Kohonen network structure is showed in Figure 2.
m a i n r ol e-sh a r i n g, usin g a ri t hm et i c m ea n The network includes two layers: competition
e m p o w e r i n g . l a yer (com pet iti ve l earning, th e ch oi ce of
3.4.1. Environmental impact of various factors on competition "won" the neurons) and identification
the degree of weight layer (classification), with the first group of input
Here use AHP to determine the weights of various vectors for the sample, vector output for the types of
fa c t or s. A ch i e ve we i gh t s e t s a s fol l ows : n e u r on s a r e c om p l e t e l y i n t e r c on n e c t e d .
165
[1]
right vector input signal to achieve the goal of measured data (Table 2) in the literature to judge,
self-organizing network. This self-organization and the results are as follows:
learning process includes two parts: First, select the Renmin Road——better
best match neurons, and the second, the right vectors Huaihai Road——Poor
a da pt i ve chan ges in the upda ting pr ocess. Binjiang Road——Medium
Fuqin Road——Good
Tab.2 Testing datum of atmosphere
environment (mg/m3)
name CO SO2 NOx PM10 TSP
Renmin
2.6 0.06 0.05 0.05 0.10
Road
Huaihai
4.7 0.16 0.09 0.08 0.31
Road
Binjian
3.7 0.14 0.09 0.09 0.21
g Road
Fuqin
3.0 0.13 0.07 0.08 0.18
Road
First use the daily average traffic of environmental From Table 3, we can see that the trend of the
monitoring data during one month of four roads in evaluation results is the same, inconsistency is fuzzy
one city as the sample. Based on the above method to evaluation, gray evaluation which assigned Huaihai
study computer programming (for purposes of com- Road to a "medium", Binjiang Road into "good."
pare-son, pre-set levels for the four categories of Huaihai Road, CO, TSP and SO2 are more than three
classification) by the cluster center, then use the indicators GB in the "medium" level indicators, its
included in the "medium" fair evaluation method that
166
is different from the results, but the Binjiang Road, Acknowledge: Hunan province natural science fund
CO, TSP, NOx and SO2 are more than three ( 05JJ30184 ); Hunan province
indicators GB in the "good" level indicators at its Communications Office accented term
included in the "good" level obviously is a (200423);
m i s j u d g m e n t .
References:
6. Conclusions
[1]LI Sheng. The Assessment Model of Atmospheric
This paper presents a comprehensive approach transport of the Environmental, 21st century urban
taking into account the entire traffic atmosphere transport systems in sustainable development, Beijing,
environment impact evaluation index system in the T h e t r a f f i c P r e s s , 1 9 9 9 .
various factors affecting the results of the evaluation, [2] Bielli M. Carotenuto P, Site V. Transportation and
the results show that the method is simple to use, environment interactions: the Italian framework,
accurate evaluation results reasonably, which Tr a ns po rt at io n Res ea rc h, 19 9 8, 3 (6 ) :3 -4 3 .
provides a new approach for the environmental [3] Danielis R, Chiabai A. Estimating the cost of pollution
i m p a c t a s s e s s m e n t . from road transportation in Italy, Transportation
In this paper,using the method requires relatively R es ea rch, 1 99 8, 3( 6) :3 - 1 5
rich samples. If sampling is limited, too narrow [4] LI Ai-Zhen. Assessment Introduction of the on
sampling samples, we can not fully reflect the actual atmospheric environment impact, Beijing, China
information, the cluster center position would lack of O c e a n P r e s s , 1 9 9 7 .
standards. To attain the desired cluster center, the [5] SHEN Yana. Recognition of mechanical fault based on
need for more sections (fully reflect the impact of Kohonen neural network. Journal of Traffic and
urban traffic environment characteristics of the Transportation Engineering, 2002, 2(2): 55-59. (In
atmosphere), more time traffic monitoring of the C h i n e s e )
environment, in order to obtain a large number of [6] WANG Yu-song. Fault diagnosis of diesel based on
measured data as a learning sample, which is neural network, Journal of Traffic and Transportation
conducive to improve the credibility of classification. Engineering, 2003, 3(4): 44-47. (In Chinese)
167
2008 International Conference on Intelligent Computation Technology and Automation
Abstract
2. Factor affect on logistic demand
Logistics demand forecasting is an important process The logistic demand is affected by many economic
between Logistics programming and Logistics resource factors. However it mainly has three macroscopical
allocation. The neural network algorithm is usually factors: economic scale, industrial structure and economic
applied to forecasting logistics demand. However it has space layout. Firstly, economic scale is the most important
the problems of slow convergence and local optimization factor because economy development is the crucial factor
in searching results when the training data is excessive. in logistic demand. The more economic output, the more
This paper presents an adaptive neural network algorithm need of logistic demand on raw material,
for logistics demand forecasting. The empirical study semi-manufactured goods and manufactured goods. The
shows that the adaptive neural network algorithm has boosting and prosperity of economy will promote logistic
faster convergence and higher precision than neural demand, and vice versa. In a word, logistic industry has
network algorithm. great relativity with national economic development.
Secondly, the difference of industry structure has great
1. Introduction effect on the function, level and amount of logistic
demand. Some third industries (except the current
Logistics demand forecasting plays an important role in industry) affect logistic demand relatively, which is
the process of logistics programming and logistics extensive. In other words, logistic demand is large but has
resource allocation, and it also provides necessary less value added. On the contrast, industrial logistic
evidence and support for the police-making of the demand is centralized but it has high added-value.
government on logistics industry development and Nevertheless, the third industry directly promotes modern
infrastructure development Scholars home and abroad logistic development. Thirdly, the unbalanced economic
have established many Models for microscopic logistics space layout and nonsymmetrical economy development
demand forecasting. For example, the Spatial and are also directly influences logistic demand. Especially in
Temporal multinomial probability model in freight china, the distribution of the natural and other energy
logistics demand forecasting, the nonlinear time sequence resources are very imbalanced. The area with lower
model in aviation service demand forecasting, the linear productivity such as the northeast, northwest, southwest
regression model in freight demand forecasting, the grey and all north area of china have multitudinal natural
forecasting model, the fuzzy forecasting model and the resources. However, the middle and Coastal area of
neural network forecasting model. Among all the china with large population and higher productivity have
algorithms, the neural network which can approximate poor natural resource. So it is being that some basic
any nonlinear mapping just by studying input and output industry, such as the raw materials, lower work is far
data has been widely applied in logistics demand away from the further working. Logistic has great span in
forecasting. However, the neural network algorithm also temporal and spatial, which brings severe stress on
has some drawbacks in application. When the training logistic demand among areas.
sample data is large, the neural network has slow The logistic demand is derived from economy
convergence and prone to convergence to local minimum. development, so it is also potentially affected by factors
Sometimes we just achieve local optimization result and which affect economy development. Economy has
corresponding inaccurate forecasting. nonlinear mapping relationship with logistic demand,
which is intrinsic and connotative. So it is difficult to
Y (k ) ( y1 (k ), y2 (k ),..., ym (k )) is the corresponding Because neural network can approximate any nonlinear
output, which forms n double sample data. The neural mapping, the predicted error in each step G i (i 1, 2,..., d )
network can approach the nonlinear mapping between can achieve arbitrarily small which leads G1 G 2 ... G d
Y (k ) and X (k 1) by training n double sample data. is arbitrarily small. So we can realize a d -step advance
When new sample data is used, the neural network will prediction by a single-step advance predictor.
get along new learning and give new output. The model We can adopt a global optimization to reduce online
configuration of adaptive neural network is shown in computation, and train neural network configuration and
figure 1. parameters by history data. Then we keep constant Z
and tune T online to modify network parameters.
Assumed that the model of neural network f is
shown in (1), and then the expectant prediction
input-output relation is
169
y ( k 1) ) T [ x ( k ), Z ]T * K ( k ) ˄3˅ area citizen consumption (hundred million yuan), y is
the transportation freight(ten thousand ton).
Where K (k ) is the model residual error of neural We design a three layer neural network with six input
network. layer point, one output layer point and 10 hidden layer
Define point, which is trained with data from 1978 to 2000 year
E (k ) T (k ) T * are list in table 1. The weight of neural network is
Then prediction error is learning by the adaptive algorithm in section IV. We
simulate training process in MATLAB, and the result is
G (k) yd (k 1) y(k 1) shown in figure 2 and table 2. From figure 2, we can find
˄4˅ adaptive neural network has more rapid convergence than
)T [x(k),Z]E (k) K(k)
general neural network.
We consider that tuned parameters fluctuate in global Importing 2001-2006 year data are listed in table 1 to
optimization point because initial value of T has been trained neural network, we can gain forecasting results
trained, so we can apply parameter adaptive tuning based and errors, as shown in figure 3. It is shown that adaptive
on gradient algorithm neural network forecasting errors less than neural
T (k 1) T (k ) D)[ x(k ), Z ]G (k ), D ! 0 ˄5˅ network’s.
The prediction difference equation of adaptive neural
network is 1000
v(k ) E (k ) E (k ) D
T 2
¦K
j k
2
( j) ¦G ( j)
j k
2
500
400
f
D 2
¦)
j k
T
[ x ( j ), Z ])[ x ( j ), Z ]G ( j ) ˄7˅
2
300
200
It is integrated along˄6˅we have
v ( k 1) v ( k )
100
0
E T ( k 1) E ( k 1) E T ( k ) E ( k ) 0 50 100 15 0 20 0 25 0 30 0 35 0 40 0 45 0 50 0
training length
D K (k ) G (k )
2 2 2
5. Empirical analysis
550
forecasting error
170
Tab.1 Logistics demand economic statistical indexes in one city˄1978–2006˅
<HDU x1 x2 x3 x4 x5 x6 y
Data from˖ķhttp://www.stats-gov.cn; ĸThe handbook of china regional development(1978-1989)
Table 2 Forecasting error
171
Network to Prediction Modeling of Water Quality, System s Yin Yanling is a instructor with department Electrical
Engineering,Vol.19, No.1˖89-93,2001 engineering and Automation in Henan Polytechnic
[3] Rodrigo A,Hani S.Forecasting freisht transportation demand University. Her research are mainly related to enterprise
with the space ˊ time multinomial probity model [J]. management, System Engineering, etc.
Transportation Research Part B 34,2000,403-418.
[4] Bahram A, Iu1 c, Kambiz RˊThe demand for US air Bu XuHui is working for his Ph.D. degree in Beijing
transport service˖a chaos and nonlinearity investigation[J] Jiaotong University, Beijing, China. His research are
Transportation Research Part E 37,2001,337-353 mainly related to industrial process control, iterative
[5] Chen sen, Zhou feng.gray grey forecasting in logistics
learning control, intelligent transportation engineering,
demand, Tongji and Juece,2006.3: 59-60
[6] Liu guang-zhong, Li xiao-feng, The Improvement of BP etc.
Algorithm and Self-Adjustment of Structural Parameters, Yu FaShan is currently a professor with department
OR Transactions, Vol.5,No.1: 81-88, 2001 Electrical engineering and Automation in Henan
[7] SUN Yi-biao, WANG Cheng-ming, The Optimal
Polytechnic University. His research interests are in field
Decision-making for Logistics Paths with Planning Digraph
and Its Appl ication, Operations Research and Management of industrial process control.
Science Vol.12,No.2: 100-113, 2003
[8] Fite J,Taylor G,Usher J,Roberts J. Forecasting freight demand
using economic indices [J]. International Journal of Physical
Distribution & Logistics Management,2001,31(4)˖299
172
2008 International Conference on Intelligent Computation Technology and Automation
∗
Project supported by Hunan Provincial Natural Science Foundation of China (06JJ5099)
An 8 DOF drilling manipulator is equivalent to a T 8' is a direction cosine and show the
multi-joint robot which is made up of a series of relationship between the end operator of the robot
joints. A coordinate system fixed in the manipulator position and the base coordinate; n is normal
is given to each joint, and D-H method is used to
describe the relationship among these coordinate vector; o is sliding vector; α is vector close; p is
systems. Position vector.(Reference [9])
With the D-H rule, the parameters are shown in Thus, the inverse kinematics problem of 8 DOF
table 1, and the parameters d 1 , a 8 also can be changed.
drill robot is how to calculate rotational angle or
distance of each joint with equation (1). 12
equations could be obtained from equation (1), but
Table 1. Parameter in each joint of the robot independent equations are no more than 6, and these
shaft Variable α a d equations all are transcendental equation of the
1 θ1 -90° a1 0 inverse trigonometric function. It is hard to calculate
2 θ2 0° a2 0 analytical solutions. So the method of Bayesian - BP
3 θ3 90° a3 0 neural network is used in the problem.
4 θ 4 + 90 o
90° 0 d4
5 θ5 0° 0 d5 3. The Bayesian - BP neural network for 8
6 θ6 − 90 o
0° 0 d6 DOF drill robot
7 0° 0° a7 0
8 0° 0° a8 0 3.1.BP neural network model for 8 DOF drill
Pose matrix are usually used in manipulator to robot
describe the position of drill’s end operator. The input and output problem of a group
Kinematical equations of the manipulator could be training samples could be transformed to a non-
calculated from coordinate transformation linear optimization problem through BP neural
8' network, and a nonlinear mapping from input type
matrix T1 , T2 ,..., T8 . And then the matrix T
space to output type space could be realized.
describing drill’s end operator could also be Through the signal’s positive communication and
calculated. the error’s directional transmission, with δ study
⎡ n8 x o8 x a8 x p8 x ⎤ rules and error descent method, amending the
⎢n o8 y a8 y p 8 y ⎥⎥ ; parameters of network weights, the output error
T 8' = ⎢ 8 y (1)
⎢ n8 z o8 z a8 z p8 z ⎥ could be reduced. The inverse kinematics problem
⎢ ⎥ of multi-joint redundant robot is also a nonlinear
⎣ 0 0 0 1 ⎦
mapping from a robot operation space to a robot
174
joint space. Therefore, the method of multilayer hidden layer, there are 50 nodes. In the output layer,
feed-forward network based on BP arithmetic could there are 8 nodes, and these nodes are corresponding
be used to solve multi-joint redundant robot inverse to 6 rotary joint and 2 mobile joint.
kinematics[3,5,6]. Arithmetic in the weights and threshold of the
The BP neural network model built for 8 DOF input nodes and the hidden nodes are:
drill robot inverse kinematics is shown in figure 3. Δwli = η (tl − ol ) f ′( sl ) xi (2)
This network is structured by three layers. In the
input layer, there are 12 nodes, and these nodes are Δθ i = ηf ′( si )∑ (t l − ol )Tli (3)
l
corresponding to the robot end’s position. In the
θ 1
o1
n 8x θ 2
I1 o2
θ 5
o5
θ 6
o6
a 8z D1
I 12 o7
D8
o8
Figure 3. BP neural network model for 8 DOF drill robot inverse kinematics
In the above equation, η is learning rate; f (x) end’s positions of the robot on the robot continuous
path, and the changes of each joint’s should be
is transfer function; t l is the output expectations of
smooth according to control requirements of robot.
output nodes; ol is network computing output; xi On the other hand, there are many results in
equation (4). It means that there are many groups of
is the value of entry node; wli is the network
joint’s value to meet with the state of the robot’s
weights between input nodes and hidden nodes; Tli end, and it is also important how to choose an
is the network weights of hidden nodes and output appropriate group of joints value.
In engineering applications, if the travel of one
s
nodes ; i is the input of neurons. joint is minimum after finishing all task, it would
Network optimization objective function needs the shortest time. Meanwhile, if the total
(Conventional error) is shown in equation (4): travel of all the joints achieve minimum after
1 K N finishing all work, the work efficiency of the multi-
J D (F ) = ∑∑ (d nk − y nk )
2 k =1 n =1
(4) joint robot would be highest.
So, the absolute sum of joint’s changes is
In the equation (4), J D (F ) is conventional considered as the optimization objective function of
robot.
network errors; N is the number of samples; K is n −1
the number of network output; d is output JG = ∑
i =1
(θ i − θ i + 1 ) 2 (5)
expectations; y is network actual output.
In equation (5), J G is optimization objective
3.2.The research of robot inverse kinematics
based on the continuous path function; θ is variable joint movement; n is
number of the robot end pose.
In the above sections, only can one group of Moreover, robots are affected by some other
joint’s values be discussed from one end’s position factors, such as mechanical interference and
of the robot in the operation space. In fact, there are mechanical gap in joints.
many groups of joints values to describe multiple
3.3.Bayesian - BP neural network for solving
175
inverse kinematics of 8 DOF robot In the equation (9), Zm(α) , Zm(β) , Zm(α, β) are
From the theory of mathematics, it is a typical normalized factor. Minimize the total error function
pathological problems to solve equation (4) with
only one end position of robot [2,7,8]. If we add a
J (F) is the same as the most likely parameters of
constraint with regular theory, the problem could be the network weights in this framework.
solved. In this paper, the other problems discussed With the above rules, the Bayesian - BP neural
in part 2.3 could be considered as prior knowledge network arithmetic is built in figure 4.
and restrict the equation (4) as a constraint. So a
normality- Γ function is introduced to combine the Training data input
prior knowledge and sample information. The
objective function should be:
BP network model
1K N 1
J (F ) = β • ∑∑(dnk − ynk )2 + α • 2 || PJG ||2
2 k =1 n=1 (6)
Optimal parameters
= βJD (F) + αJw (Γ) with Bayesian method
If the BIC
In the equation (6): J w (Γ) is the network No
is optimal
complexity of the punishment in regularization
method; P is smooth operator constraints; α , β
Yes
176
than the BP network’s training numbers. After the
success of the training network, we choose 5 groups
robot’s end positions (the data is shown in figure 5)
from the continuous path of robot at random as test
samples. Firstly, 5 groups parameter n x , n y , L p z is
the input data of BP network, and the network
outputs θ1 , θ 2 , θ 3 , θ 4 , θ 5 ,θ 6 , d 1 , a 8 is used to get
n′x , n′y ,L p ′z with equation (1). The error and the
Figure 5. The path of the robot end in xoy plane absolute changes of each joint J G can be computed
5. Simulation results from contrasting n x , n y ,L p z and n′x , n′y ,L p ′z ,
A simulation has been done with the above
and the conclusion is shown in table 2. Secondly,
method. 180 groups of data are chosen as the input
the other conclusion can be gotten to use the
of BP network and expected output data on the
method of Bayesian - BP neural network , and the
continuous path of robot, and the Conventional
data is shown in table 3.
system error is chosen 0.003 to train network. The
simulation shows the number of training of
Bayesian - BP neural network is reduce average 1/3
Table 2. the conclusion from the method with BP network
θ1 θ2 θ3 θ4 θ5 θ6 D1 a8 ε
P1 0.27544 0.36543 -0.12063 -0.64708 2.80653 -0.13789 0.62571 0.32421 0.00056
P2 -0.05379 0.66352 -0.07831 0.00254 3.05222 0.10541 1.06131 0.26754 0.00199
P3 0.33294 0.46514 0.19675 -0.30761 -1.55645 0.06512 0.78226 0.89624 0.00212
P4 0.15879 0.56272 -0.72365 -0.08277 -0.78431 0.14559 1.03322 0.02390 0.00096
P5 -0.13246 -0.18263 0.03671 -0.02446 -2.16609 0.09677 0.63780 0.33484 0.00152
JG 0.8901 0.7363 1.2378 1.1846 5.6265 0.3641 0.9656 3.4426 -----
Table 3. the conclusion from the method with Bayesian - BP neural network
θ1 θ2 θ3 θ4 θ5 θ6 D1 a8 ε
P1 -0.17688 0.58558 -0.64882 0.24708 3.27085 0.08217 1.00541 0.82496 0.00232
P2 0.05379 0.58558 -0.64963 0.04286 3.25222 0.09741 0.86453 0.38696 0.00299
P3 0.27493 0.86116 -1.0040 -0.29051 -1.77343 0.11265 1.03684 0.69624 0.00294
P4 0.07282 0.40049 -0.51931 -0.09440 -1.82123 0.12838 0.99223 0.04309 0.00289
P5 0.07282 -0.10688 -0.01245 -0.07288 -1.96906 0.12838 1.10238 0.03990 0.00252
JG 0.6539 0.5940 0.8399 0.7337 5.0921 0.0462 0.3578 1.5577 -----
Changes of each joint from two methods (BP continuous path, the accuracy of the method has
network and Bayesian - BP neural network) are been decreased with Bayesian - BP neural network,
shown in figure 6, in which A curve is used to but still up to 0.003 to meet with the control
describe changes of each joint in table 2, and B requirements of the rock drilling robot, especially,
curve is used to describe changes of each joint in changes of each joint is gentler in adjacent 5 goals
table 3. pose point.
From the above discussion, taking into account
the changes of each joint on the drilling robot
177
Figure 6. Robot joint changes in the comparison
178
2008 International Conference on Intelligent Computation Technology and Automation
Y. Z. Shi D. J. Xin
School of Water Conservancy, Changsha Computer Science College, Central South
University of Technology & Science, University of Forestry and Technology,
Changsha 410076,China Changsha 410004, China
shiyz8@126.com xindj@126.com
1. Introduction
When traditional artificial neural network back
propagation (BP-ANN) algorithm approximates
functions, the weight adjusts in the way of Figure 1. The structure of RBF-ANN
anti-gradient drop, which shows a limitation lying in
slow convergence rate and partial minimum. But the The basis function of the implicit nodes responds to
RBF-ANN is superior to BP-ANN in approximation the input signal partially. Namely when input signal is
ability, classified ability and study speed [1]. Moreover, close to central scope of the function, the implicit
the traditional method of first productive force of nodes will produce big output, which indicates that the
natural vegetation[2], the method of level analytic[3], RBF-ANN has the ability of partial approximation.
the method of state space[4],the method of ecology Radially-symmetrical gauss function usually is used
trail[5] and so on, all have respective merit and to be the basis function:
180
wetland utilization rate is medium, it has certain
development space. (3)low-load, means that the
development of social and economy is higher, resource
is very rich, environment is polluted mildly, wetland
area is very big, population density is small, the
wetland utilization rate is lower, it has bigger
development space.
x= x1 x2 x3…xn
0.53 0.67 0.33 0.50 0.10 0.40 0.25 0.20 0.50 0.50 0.33 0.17 0.25 0.20
= 0.80 0.80 0.50 0.71 0.20 0.60 0.50 0.40 0.70 0.70 0.67 0.50 0.50 0.40
1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00 1.00
y= 1 2 3…n = 1 2 3
181
Make eg=0, sc=1, then net= newrb (x, y, eg, sc).The can determine the assessment level, but also can
training result can be obtained by t=sim(net, x), compare different assessed objects with their
which can be output by the function of plot(y,y,’* ecosystem carrying capacities, with strong classified
k’,y,t,’ok’), shown in figure 3. function.
Step 3: process the data in table 2 standardly to (4) Take the East Dongting Lake wetland as the
obtain the input vector a. The data all come from local example. The result indicates that the regional
yearbook of Yueyang city or Hunan province yearbook ecosystem carrying capacity in 2002-2004 three years,
directly or indirectly. belonging to level 2, which accords to local actual
situation.
Acknowledgement
Financial supports from Innovation Team Plan
Step 4: carry on the assessment with sim function: (2007CX05) and Doctor Fund (1004154) are highly
b=sim(net, a). Output the result by the function plot (e, appreciated.
b,' * k'), shown in figure 4, where e= [1 2 3] is the
vector of year. Finally, the ecosystem carrying capacity
vector of the East Dongting Lake wetland is obtained:
Reference
b = [1.64 1.67 1.75]. [1] X. Wen, L. ZHou, and D. L. Wang, Applied Design of
MATLAB Neural Network, Science Press, Beijing, 2000.
Figure 4. The result of assessment [4] H. Y. Mao, D. L. Yu, “Regional Carrying Capacity in
Bohai Rim”, Acta Geographica Sinica, Science in China
Press, Beijing, 2001, pp. 364-365.
3.3. Analysis
[5] K. Z. Yang, Y. Yang, and J. Chen, “Ecological Footprint
According to the result above, the ecosystem Analysis: Concept, Method and Cases”, Advance in Earth
Sciences, Science Press, Beijing, 2000, pp. 630-636.
carrying capacities of the East Dongting Lake wetland
are all between level 1 and level 2 in the three years: [6] B. Deng, F. C. Hong, R. J. Long, “Review of
2002-2004. Therefore they all belong to level 2. quantitatively analyzing regional ecological carrying
Obviously, the ecosystem carrying capacity has the capacity”, Journal of Gansu Agricultural University,China
trend of growth year by year, which accords with local Agriculture Press, Beijing, 2003, pp. 281-289.
actual situation in the three years: matching economy
growth to environment and resource, boosting up [7] P. Duarte, R. Meneses, and A.J.S. Hawkins,
environment protection. “Mathematical Modelling to Assess the Carrying Capacity
for Multi-Species Culture within Coastal Waters”, Ecological
Modelling, ELSEVIER, Amsterdam, 2003, pp.109-143.
4. Conclusions
[8] W. Dwight. A. Steven, “Population Growth,Carrying
(1) Carry on the assessment of ecosystem carrying Capacity, and Conflict”, Current Anthropology, Elsevier Ltd.,
capacity using the RBF-ANN model, which solves the Oxford, 2003, pp.59-86.
problem of incompatibility to each index.
(2) Under the environment of MATLAB, the [9] T. Ye, H. Z. Yang, “Calculation and Analysis of the
assessment results obtained by the RBF-ANN model Ecological Footprint in Shanghai, 2003”, Sichuan
Environment, Sichuan Environment Press, Chengdou, 2005,
are direct-viewing and visual. The image can be output
pp.15-18.
by the function plot (e, b,' * k') directly.
(3) The method has strong applicability, not only
182
2008 International Conference on Intelligent Computation Technology and Automation
184
module, and it is used to achieve knowledge then elevator i is not be dispatched;
acquisition, establishing repository and deducing p_rule 3: if elevator i has been dispatched for
utilizing knowledge based on repository. another calling
Dynamic fact database is used to store the original then elevator i is not be dispatched;
fact, the middle deduced conclusion and eventual result. There are many other rules:
The contents in dynamic fact database are continuous p_rule: if in upstairs busy mode
vary, At the beginning of deducing the contents in it are then downstairs calling is ignored;
original facts; during the deducing course the contents p_rule: if in downstairs busy mode
in it are the middle deduced conclusions of every step; then upstairs calling is ignored excepting the
and when the deducing end the contents in it is first floor.
eventual result.
Explaining organ is used to present and explain the 4. Dispatching Control
traffic identification solution for the dispatching
parameter calculation module. In every traffic mode, the corresponding
The function of the NNES can be described as dispatching scheme will be deduced by ANN
follows: knowledge and experience are store in ANN estimation. Fig. 3 describes the structure of elevator
unit in numerical form after duality standardization and dispatching control module based on ANN.
coding. ANN will self-learning and store knowledge
and then online deduces according the deducing
formula. The origin fact, middle solution and eventual
result will store in dynamic fact database. The eventual
result will be transform to fact during encoding unit
and output the traffic pattern identify module via
explaining organ.
3.3. Expression of Knowledge
Knowledge is the core of expert system. In this
paper we take production expression form which basic Figure.3 Structure of elevator dispatching control module.
formula form is: A→B or IF A THEN B. Where, ‘A’ is
the precondition of production formula, it is used to Automatic measure equipments installed at elevator
indicate if the formula is usable; ’B’ is a set of wing-room and machine room will constantly gather
operations or resolutions, it is used to indicate the the traffic information in operation course. The traffc
corresponding solutions or executive operations when status will be forecasted according real-time traffic
‘A’ is satisfied. information and traffic mode come from traffic pattern
The description and meaning of production formula identify module. The data stored in ANN database are used
is given by Backus Normal Form (BNF). to study and identify for ANN. The dynamic optimized
The usual deducing rules are showed as follows dispatching scheme for elevator group will be obtained
The rules independent to the calling information: after ANN illation.
Traffic_Rule:
p_rule 1: if the upstairs busy counter>2
then output upstairs busy mode.
p_rule 2: if the downstairs busy counter>2
and (downstairs calling floors-upstairs calling
floors>2)
then output downstairs busy mode.
p_rule 3: if the traffic busy counter i >2 (2≤i≤N)
then output period busy mode.
The exclusion rules of elevators clearly unsuitable
for participate in dispatching. Figure.4 Structure of BP ANN
Exclusion_Rule: In this system we choose a three layers BP neural
p_rule 1: if elevator i is fault or in maintaining network showed as Fig. 4. The effect function of latent
then elevator i is not be dispatched and total layer nodes and output layer nodes adopt S shape type.
number of elevators minuses 1; It is supposed that the input sum and output of the
p_rule 2: if elevator i is fully loaded
ith neural cell in the kth layer is uik and xik . The power
185
coefficient from the jth neural cell in the k-1th layer to Fig. 6 shows the centralization adaption degrees of
the ith
neural cell in the k th
layer is wij . Inspiring dispatching scheme for elevator group. The power
functions of elevator 2 and elevator 4 are 0.9 and 0.8.
function of each neural cell is f, and then the The adaption degrees of whole rules are calculated
relationship of each variable can bedescried as (1). according to two power functions. The power functions
xik = f (uik ) of elevator 1 and elevator 3 are 0. So elevator 1 and
elevator 3 are candidate elevators. The waiting time of
uik = ∑ wij x kj −1
(1)
elevator 3 is small than elevator 1, so elevator 3 was
i choose as responding elevator. Elevator 3 will go to the
In (1), f is non-symmetry sigmoid function which is 14th floor firstly and return to 12th floor then.
defined as (2).
1
f (uik ) = (2)
1 + exp(u kj )
BP study arithmetic is adopted to modify the power
coefficient of every layer in ANN according to (3).
wij (t + 1) = −ηd kj x kj −1 + αΔwij (t ) (3)
Where η is study speed, namely step
length; η = 0.2 ; α is modify constant of power
coefficient, α = 0.8 .
Figure.6 The centralization adaption degrees of dispatching
scheme for elevator group.
5. Simulation results
6. Conclusion
The simulation is in allusion to the data of an
office building by the MATLAB. The parameter of A dynamic optimized dispatching system for
the office building showed in Table 1. elevator group based on synthetically application the
Table 1. Parameters of an office building. ANN and expert theory of artificial intelligent
Number of Number of Elevator Velocity of technology is presented in this paper. The elevator
floors elevators capacity elevator dispatching scheme is optimized, the service quality of
16 4 1500kg 2.5m/s elevator is improved, and the transportation efficiency
Space Time of Time of passenger
between two open/close
Operating time
enter/out the
of elevator is increased by using this control system.
of single floor
floors gate elevator
3.3m 3.4s 4.3s 1.2s
References
Numbers of 4 elevators are 1, 2, 3 and 4. Now
elevator 1 and elevator 3 upstairs from the 5th floor and [1] H Ujihara, Tsuji S, “The evolutionary AI-2100 elevator
the 10th floor separately. Meanwhile, there are inner group control system and the new intelligent option series”,
Mitsubishi Electric Advance, 12 (45), 1988, pp. 5-8.
calling for the 8th floor, 12th floor and the 14th floor.
[2] Changbum Kim, “Design and implementation of fuzzy
Elevator 2 and elevator 4 are in waiting status at the 3rd elevator group control system”, IEEE Trans on System, Man
floor and the 7th floor. Which elevator will respond and Cybernetics, 28(3), 1998, pp. 277-286.
rapidly when there is downstairs calling in 12th floor? [3] Kenji Sasakietal, “Elevator group supervisory control
Fig. 5 shows the adaption degree of elevators system using neural networks”, Elevator world, 44(2), 1996,
respond for calling of above floors. It is 0.8 for 12 pp. 81-86.
floors. [4] Li huijuan, Hu weihua, Peng chang, “An Intelligent
Optimized Method for Elevator Group Based on Expert
System”, Application of electronic technology, (4), 1999. pp.
26-29.
[5] I. A. Basheer M. Hajmeer, “Artificial Neural Networks:
fundamentals, computing, design and application”, Journal
of Microbiological Methods, 43, 2000, pp. 3-31.
[6] M. E. Yahia, R. Mahmod, “Rough Neural Expert
System”, Expert Systems with Applications, 18, 2000, pp.
87-89.
Figure.5 The adaption degrees of elevators respond for
calling of above floors.
186
2008 International Conference on Intelligent Computation Technology and Automation
Liting Cao
Beijing Union University
caoliting0618@163.com
1. Introduction
Air is an important condition for everything on
earth to exist. Environment air quality influences the
zoology balance, health of human beings and society
development directly. People attend environment air
Figure 1. Hardware structure of environment air quality
quality more than before along with the improvement
evaluation system
of standard of living. Increasingly exasperating
environment air quality brings forward a prodigious
Processing unit is the hardware core of system. We
challenge for world, and protection of circumstance is
select Samsung’s S3C2410A microprocessor as the
a great invent.
CPU in view of the high ratio of quality and price.
Health and comfort are two basic demands of
We select AMD’s AM29V160 as FLASH in this
environment air quality. There are three primary
system.
factors affect environment air quality; they are
Hyundai’s HY57V641620 SDRAM is adopted in
temperature, humidity and pollution concentration.
this system in order to running an embedded operating
An environment air quality evaluation system is
system. The capacitance of HY57V641620 is
presented in this paper. In this system, temperature,
16 4Mbit, and the total width of data is 8MB. The
humidity and pollution concentration are the original
188
original colony is engendered by random function. enhance the predicating accuracy and converging
(2) Define adaptive degree function. Use the genetic speed of BP network [4].
arithmetic to assist neural network to elect original A multilayer forward BP networks were adopted in
weights, and choose a function f=c-e, in it c is a this paper, the structure is showed as Fig. 3.
constant; e is sum of absolute value of network errors.
When computing chromosome adaptive cost, firstly
use the corresponding decoding to convert the coding
unit into decision-making variable of question space,
and compute unit adaptive cost. Regard the adaptive
cost of chromosome as the foundation for choosing
fine chromosome.
(3) Choose genetic arithmetic parameters.
Parameters are the size N of colony, the probability Pc
of crossover, the probability aberrance Pm etc.
Schaffer advises that the best scope is N (20-30),
Pc(0.75-0.95), Pm(0.005-0.01).
(4) Genetic operation (copy, cross, aberrance)
engenders a new generation. In aberrance, numerical
value bit begs reverse by 9, sign begs reverse directly.
(5) If reach the limited iterative times, or reach the
specified error square, end the inherit operation, export
Figure 3. Structure of multilayer forward BP networks
the weights and thresholds, otherwise return to (2).
(6) Deoxidize the chromosome to weights and
The GA regards each weights of the network as a
thresholds according to standard formula, and put them
chromosome, and the aggregation of all the weights as
as the original value to train neural network.
an individual, and a large number of individuals will be
3.2. BP Network generated in the initialization phase, which is called
colony.
The BP network based on gradient descend is a new The adaptation function of GA is constructed as
method in recent years, its ability to impend nonlinear follow:
function has been proved in theory also have been
1
validated in actual application [1]. But the BP network
has some problems such as converge to local minimum
E= ∑∑ (t pk − o pk ) 2
2p p k
(1)
and the speed of network learning slowly. Genetic Here, p is the numbers of training samples, k is the
algorithm is also a new optimum algorithm developed
fast recently [2], it has some advantages such as the neuron numbers of the output layer, t pk is the BP
parallel search and the searching efficiency is higher, network output of the neuron No. k corresponding to
in addition, it belongs to the random optimize process the sample No. p, o pk is the real output of the neuron
essentially, so the local convergence question is not
No. k corresponding to the sample No. p. The
exist. But the genetic algorithm also exist some
adaptation function is:
shortage, it can but search out the approximate to
excellent solution that near to global optimal solution ⎧C max − E E < C max
f =⎨ (2)
in a short time.
⎩0 E ≥ C max
3.3. High speed and precise GA-BP network
Here, the C max can be the maximum value E of
When the BP network converges on local evolutionary process.
minimum, the network will present serious morbidity, The algorithm flow is showed as follow Fig.4.
how to avoid the local minimum is the key problem to
be solved in the application of ANN. GA is a perfect
tool to optimize the BP network, which enables it
avoid the local minimum and enhance the converging
speed of network [3]. The generic algorithm with
adaptive and floating-point code is combined with BP
algorithm to optimize the BP network; it can further
189
Star the high speed and precise GA-BP network has higher
stability, and can obtain higher detecting and
recognition accuracy.
Initialisation, generate N
groups network
i hi Table 2. Mean squared errors analysis of GA-BP and BP
high speed and
precise GA-BP network BP network
BP algorithm training network train testing
sample sample meansquared meansquared meansquared meansquared
errorsoftrain errorsoftesting errorsoftrain errorsoftesting
sample sample sample sample
Satisfy accuracy Y
requirement? 80 20 0.070 0.097 0.083 0.187
95 30 0.061 0.112 0.077 0.205
N 125 40 0.055 0.125 0.068 0.289
According to training result 200 50 0.049 0.143 0.061 0.335
generate
5. Conclusion
Improved GA algorithm
The environment air quality system based on
genetic neural network combines the advantages of
Select N groups, N
better network Satisfy accuracy both GA and BP network. The converging speed and
weighing requirement?
the evaluation accuracy of system are enhanced. With
Y
the ability of strong self-learning and function
approach and fast convergence rate of high speed and
End precise genetic algorithm neural network, the quality
Figure 4. Flow chat of high speed and precise genetic evaluation modeling method can truly evaluate the
algorithm neural network level of environment air quality. The experimental
results show that this method is feasible and effective
4. Experiment results and this modeling method has great application
foreground in the environment air evaluation.
There is no unanimous standard to evaluate
environment air quality till now. In this paper, the Acknowledgment
reference standards of environment air quality can be This work was supported in part by the Youth
classified into 3 categories: good, common and bad. Backbone Teacher Foundation Project of Beijing.
The evaluation criterion is shown as table 1.
190
2008 International Conference on Intelligent Computation Technology and Automation
Chen Haijun
(Changsha University of Science and Technology,Changsha 410076,China)
huakeinfo@126.com
EFI engine’s ECU through a fixed pre-set supply 1 The integration of Fuzzy reasoning and
procedures to control fuel injection time, however, the neural network
pre-set data can only be reached through a large
number of tests. How to attain to pre-set data In the control of EFI engine fuel injection quantity,
efficiently and how to dynamically adjust the fuel due to the ambiguity and complexity of system
injection time according to the traffic circumstance are parameters, the traditional binary logic of law to deal it
currently the hot issues in Engine Electronic Control with the apparently inadequate, but the introduction of
Simulation field. In this paper, aiming at the problem fuzzy math theory and methods, which made the output
of fuel-oil supply control of EFI engine, a hybrid results more relevant practical, and more accurate. In
method which combines the fuzzy theory and neural the electronic control field, Fuzzy information theory
network—Adaptive Network-based Fuzzy Inference and method has been widely used, and have achieved
System is presented, taking into consideration the better results. However, these methods are not
characteristics of the EFI engine’s structure. The self-learning ability, it is difficult to adapt to the
structure, composition and working procedure of the changes of external environment.
ANFIS system used for fuel-oil supply control of EFI Neural network has strong capability of adaptive
engine are studied and discussed. A simulation result and self-learning with the changes of the environment,
is also given in this paper. but from the perspective of system modeling, which is
based on a typical black box-type learning mode. [2]
Introduction Therefore, when after the completion of study, the
input / output relationship which obtained by the neural
EFI engine through the acquisition of the sensor data network can not easily be expressed in a manner
to derive the current inlet-gas feed rate and the current acceptable; and neural network (NN) in the diagnosis
engine speed, calculating the actual fuel supply methods of electronic control exist the absolute
quantity and the relative jet time compared with the either-or characteristic, which sometimes made the
pre-set fuel supply procedures. But the enactment of output results inconsistent with the actual situation.
fuel supply procedure and the optimum modification Though the fuzzy system is built on a receptive
can be reached through constant testing with the help expression of “IF… THEN…", but how to generate and
of experience and equipment at every turn. [1]This will adjust membership functions and fuzzy rules is a
limit the development of the ECU efficiency, and the trouble, time-consuming and dependent on experts. [3]
same type of vehicle engine can not accurately meet In recent years, the smart calculating technology
the need in the urban areas, mountain road, highway, represent with the neural network (including neural
village paths and other supply mode. The research of networks, fuzzy theory, evolutionary computation,
how to realize the EFI engine fuel injection control chaos theory and their integration) become the hot
aimed at achieving the precision and intelligence of spots of many research fields. We complement the
their control via ANFIS is not only has theoretical fuzzy logic synchronized with the neural network,
significance, but also has practical value. Aimed at using neural networks to achieve the system’s fuzzy
CF4G27-E engine and combining a large number of logic reasoning,(the traditional neural networks which
experimental data, this paper designed a more practical have no clear physical meaning of the weights have
and effective fuel injection quantity control system of been given a physical sense of the fuzzy logic inference
parameters) to build a method of engine fuel injection
192
If there is a function of H, which makes composite training (or regulation) fuzzy model, and Test Set used
function H D F be the linear function of certain to determine when to terminate the training, in order to
parameters in a parameters set, then these parameters prevent over fitting. We divided 3600 sample data of
can be identified by least-squares method. If the set S the MAP chart in ECU basic database into the training
can be resolved into two subsets of S1, S2, that is, set and test set with same length (1800), thus the
received unbiased model to the training set, and may be
S = S1 ⊗ S 2 …………(7) better generalization performance with the new data.
And if function H made composite function With above sample data training the adaptive
H D F be the linear combination of elements of Set network-based fuzzy Inference system, after training,
S2, there are the electronic control unit (ECU)of the EFI engine
calculating the inlet-gas quantity of each circle through
H (O) = H D F (i, S ) …………(8) collecting the engine throttle opening, inlet-gas
At this point, with the given value of parameters of temperature and other data, combined the engine speed
Set S1, trained with samples, matrix equation can be as the input of the ANFIS network, basic injection time
got. as output, and then based on water temperature, oxygen
Aθ = y …………(9)
content in exhaust compensation and other data, we can
get the compensatory injection time, coupled with
In this expression, θ ——Unknown vector of the ineffective spray time for the actual fuel injection time.
elements in Set S2 In the process engine running, based on the actual fuel
A——Coefficient matrix injection time,re-learning on the network to adapt to
The least-squares method can be used to estimate, the needs of different road conditions.
2
which made the minimum value of Aθ = y
θ ∗ = ( AT A) −1 AT y …………(10)
4 System simulation
Each time the learning process of the mixed learning Use 3600 sample data of MAP chart in ECU basic
algorithm includes both forward transfer and a reverse database of certain model of engine to establish
transfer. In forward transmission, inputting a group of adaptive network-based fuzzy Inference system:
vector data, which calculating the output of each
1、 Write 1,800 randomly selected sample data into
level’s node of the network by each node function,
trnData.mat as a training sample and the rest into the
until get A and y in expression (9), and then using the
chkData.mat as a testing samples;
expression (10) to identify the various parameters of
Set S2, after got the parameters, you can calculate the
2、 using genfis1 function to generate a FIS structure
output error of each group of entry data. In reverse for the initial FIS automatically;
fismat=genfis1(trnData,numMFs,mfType)
transmission, reversely transmitted the error from the
output node to the input node using the most-speed
descent algorithm, when all training data reversely
transmitted,you can get the parameters of Set S1, so
that the hybrid learning algorithm can be used to
identify the parameters of ANFIS system.
3 System analysis
For the single-input data fitting problem of middle
complexity, we often need 10 data points to get a good
model, similarly, for the double-input data fitting
2 Figure 2: MAP chart of sample data used for training
problem, we need 10 =100 data points to get roughly
the same performance. Here, we resolved the data Set 3、 According to training data and test data, using
as Training Set and Test Set before the training of hybrid learning algorithm, training the initial FIS
neuro-fuzzy inference engine, Training set for the
structure 60 times, get a good training ANFIS system; The results table below:
fismat1,trnErr,ss,fismat2,chkErr]=anfis(trnData,fismat, Table 1: The output of the neuro-fuzzy inference system
numEpochs,NaN,chkData) after learning
Using evaluation data to validation the ANFIS model. x1 x2 y* y
Such as: 950 55 30.452 30.505
out=evalfis([954,87],fismat1) 1950 45 50.998 51.800
193
2900 50 62.401 62.446
960 95 70.035 69.998
1900 105 79.304 80.101
3050 100 108.988 108.909
1000 150 80.110 79.803
2050 145 96.443 96.404
2950 155 127.599 127.606
In the table, x1, x2 for entry, y for the ideal output,
y* for the actual output. Clearly, the system simulation
results are satisfactory.
5 Conclusions
In this paper, using Adaptive Network-based Fuzzy
Inference System to control the EFI engine’s fuel
injection quantity, it realized the output control of basic
fuel injection time efficiently and real-time, when the
system environment changes, the use of neural network
learning function and fuzzy neural inference system
can be adaptive to the changing environment made the
whole control system more efficient, more
applicability. At the same time, the research of the
system to solve the control problems of complex
mechanical equipment has some reference value.
Acknowledgement
This work is supported by the Hunan Nature
Science Foundation No.07JJ5068, and the Hunan
Education Department Foundation No.07B003.
References
[1] TIAN Shuo,LIU Yuan,Advanced ECU Software
Development Method for Fuel Cell Systems, Tsinghua
Science and Technology,Vol.10,No.5,Oct.2005,pp.610~617.
[2] Zhang Zhixing,Sun Chunzai,Nero-Fuzzy and Soft
Calculation, Xi'an Jiaotong University Press,Xi’an, China,
2001.
[3] Wen Xin, Analysis and Application of MATLAB Fuzzy
Logic Toolbox, Science Press,Beijing,China,2001.
[4] Li Hongsheng,Zhuo Zhenyu,ANFIS the Application of
Neural-fuzzy Inference Engine in Fault Diagnosis,Control
Engineering of China,Vol.10.No.2,Mar.2003,PP .153~155.
[5] Yao Chongling,Zhang Abu,Xiao Lei,Yun Gang, Partial
Least-Squares and ANFIS for Measuring Aircraft Fuel
Volume, Journal of Nanjing University of Aeronautics &
Astronautics,Vol.38 Suppl.Jul.2006,PP .143~146.
[6] Lei Yingjie,Wang Baoshu, Study on the control course of
ANFIS based aircraft auto-landing, Journal of Systems
Engineering and Electronics, Vol.16,No. 3,2005,PP .583
~587.
194
2008 International Conference on Intelligent Computation Technology and Automation
Concerning the description of geologic stratum the input vector , yi ∈ {+1,− 1} is desired
property, scholars will choose different features for
different applied purpose. [2] Carrying on a value).SVM classification is looking for a separating
classification to the geologic stratum is work for hyperplane D ( x ) = ( w ⋅ xi ) + b ,which can separate
1 l 1 l
equation can be described as follows: Solving formula (8) step by step, we obtain the optimal
yi (( w ⋅ xi ) + b) ≥ 1 (1)
lagrange multiplier α* 0 ,so
2 l
w = ∑α y x
* *
The margin between D1 and D2 is .If we
i i i
w i =1
If we use soft margin and allow a small quantity of 3. Selection data attributes for grout
data points to be classified incorrectly, the optimal stratum
hyperplane can be described as
⎧ 1 2 l Grout penetration ability is relevant to rock crack
⎨ min w + C ∑ ξ i2 size ,figure ,direction etc. And it is also connected with
⎩ 2 i =1
grout pressure, grout density, viscosity.[8][9]It is no
st. yi (( w ⋅ xi ) + b) − 1 ≥ 0 (3)
meaning in grout project that we study rock micro –
cosmic aperture model and it is difficult .We only
where C is balance gene , 0 ≺ ξ ≺ 1. study the grouts average flux characters. If crack size is
i big and crack is rich, grouting pressure will be low
Introducing Lagrange multipliers α = (α ,α ,⋅ ⋅ ⋅α )
1 2 l
and the penetration rate is big when grout density is
common. If crack size is small and the density of
to solve this optimization problem and making some
grouts is big , Groutability will become poor. In order
substitutions, the objective function is
to evaluating the grout stratum from the angle of
maximize
pressure control, we model the stratum using grouting
1 2 l
L(w, b,α)= − w + ∑αi ( yi ((w⋅ xi ) +b) −1) (4) boreholes test data.
2 i =1 Connecting to the crack rock can be thought as
extremum condition : closed .Therefore ,the grouting system’s pressure
transferring model can recognized as a tight double-
walled vessel similar to resevior with three valves
∂L(w, b, α) shown as fig.2.
= 0 ⇒ w = ∑α y x
l
(5)
∂w i =1
i i i
∂L(w, b, α)
= 0 ⇒ ∑ yα = 0
l
(6)
∂b i =1
i i
196
Luo Pingping think grouting pressure (P) leads to
the crack expanding and distortion ,which increases
Q3 .
Stratum penetration rate can be written as
q = Q /(P × L) (15)
3
Where P is grouting pressure (MPa) , L is the
length of test hole(m);
Based on the foregoing analysis and
integration ,we can choose penetration rate -flux( q -Q3)
Figure.2 Simple model of grouting system curve to present the stratum groutability. We choose
penetration rate ( Lu )and average flux into crack
Where 1,2 and3 number denote flow valve,4 is in-flow
pipe , 5 is pressure meter,6 is piston,7 is out-flow pipe. stratum ( kg / m ) as the basic feature of data points
On the basis of cycle grouting definition and from xi ,and denot xi =(xi1, xi2)=( qi ,Qi ).
fig.2, we can get that valve 1 flux is equal to the flux of
adding up to valve 2 and the valve 3 [10 ].It can be 4.Simulation for grout stratum
described as identification
Q1 = Q2 + Q3 (11)
Where Q1 is fuid flow transferring to the grout
4.1 Grout experiment
hole(L/min); Q3 is fuid flow impregnating into the
crack stratum (L/min); Q2 is surplus fluid flow feedback In Hunan province Hen yang county dam grout
project, a series of grout test was carried out with
to the barrel( L/min); grout recorder instrument, which can sample grout data
It is well known that Q3 will change with the crack invented by Professor Xu in the center south
size and number of crack.. university. During the grout process , we increase the
According to the grouting pressure definition ,the cement density step by step ,the maximal grout
grouting pressure formula is written as pressure is five (MPa). The penetration rate and flow
P=PO+PH+PF (12) into crack were tested in different stratum, as shown
fig.3 and fig.4, where the X -axis and Y -axis are
Where P is the whole grouting pressure,PO is penetration rate ( Lu ) and average flux every unit
pressure sensor indicated value (see fig.1) ,PH is static length( kg / m ).In the same grouting stratum ,average
pressure in the grout hole and pipe,PF is friction loss flux and penetration rate datum are dispersed because
pressure the grout technics difference.
We take the fuid in the pipe from the grout hole top
to bottom as an object , the static pressure is
PH= ρ gL (13
)
It is known that the energy of motion will be loss
when the viscous liquid flow forward or forback
because of friction.It is a part of Bernoulli equation
which can be written as[11]
ρfLυ 2
PF = (14)
2D
Where ρ is the density of fuid, f is the friction Figure.3 vein crack rock water pressure test
factor, L is the length of pipe , υ is the velocity of curve
flow , D is the diameter of pipe.
From formula (12),(13),(14),we can conclude that
density of grouts ,viscosity, grout borehole length are
the factor influence to the grout pressure.
197
Figure.4 gritstone stratum water pressure test
curve
Figure.5 Training data classification results
It is easy to see that the data points distribution are
different. Their average matched curves are Table. 1 Grout stratum identification error
Y = 34.71X 0.59 in fig.3 and Y = 47.56X in fig.4.
0.54
198
97), 1997.
[6] S. Dumais, Using SVMs for text categorization[J], IEEE
Intelligent Systems,1998,pp. 21– 23.
[7] W.Z.Lu,W.J.Wang , Potential assessment of the support
vector Machine method in forecasting ambient air pollu-
tant trends, chemosphere ,2005,59(5),pp.693-701.
[8] M.Eriksson, H.Stille, J.Andersson. Numerical alculations
for Prediction of Grout Spread with Account for
filtration and varying Aperture[J]. Underground Space
Technology, 2000 ,15(4),pp. 353–364.
[9] LUO pingping, ZHU yueming. Numerical simulation of
grouting in rock mass, Chinese Journal of Geotechnical
Engineering,2005,8(27),pp.918-921.
[10] Peng Huayun ,Zhangkeneng ,Xu Lisheng . Key Tech-
nologies of the Automonitoring and Recording of
Grouting Parameters. the central south university Doctor
thesis,2004,4.pp.22-26.
[11] Gerhard Nygaard ,Geir Navdal Nonlinear model
predictive control scheme for stabilizing annulus
pressure during oil well drilling.Process control, 2006
,16,pp.719-732.
199
2008 International Conference on Intelligent Computation Technology and Automation
…
x (k-1)
−∞ 2β Γ(1/ α )
α
W3
x 2
a +∞ − W
= ∫
β Γ (1/ a ) 0
x e β dx
Figure 1. The structure of new associative memory
( −∞ < x<∞) (2) neural network.
The NAMNN introduces an associative memory
β α1 −1
Let x = β y
1/ α
, dx = y dy then attenuation factor λ , which is defined in equation (10).
α Where η is the least memory capacity, and θ is
β +∞
1
Γ(2 / α )
−1
Γ(1/ α ) ∫
y a e − y dy = β (3) memory attenuation index. Nonlinear expressions are
0 Γ(1/ α ) defined as follows.
So m1 = E{ X } = σ
Γ(2 / α ) (4) u (k ) = f (W 1ua (k ) + W 2 x( k − 1)) (8)
Γ(1/ α )Γ(3 / α ) ua (k ) = λα (k − 1) (9)
Similarly for a second-order moment,it gets m2 .
λ = η + (1 − η )e( −θ k ) (10)
m2 = E{ X } = σ , and E { X } = α Γ (2 / α ) .
2 2
2 2
α (k ) = g (W 3 x(k ))
2
(11)
Γ(1/ α )Γ(3 / α )
Here W1,W2,W3 are matrix of connected weights
Γ (2 / α )
2 2
E {X} m12
R (α ) = = = (5) between layers, f (),g () are inspired functions. The input
E{ X 2 } Γ (1/ α )Γ (3 / α ) m2 value x (k-1) is the (k-1) th wavelet coefficient, and the
R (α ) is proportion function of generalized gaussian output value α ( k ) is shape parameter of GGD. First
initialize the NAMNN: α=0.1, θ=0.001, f () is sigmoid
parameter. Estimate values of m1 and m2 are defined fuction, g () is linear fuction. Then it selects samples of
as follows: wavelet coefficients as follows:
∧ 1 n ∧ 1 n 2 x11 ~ 80= [0.0578 0.0995 0.1040 0.1100 0.116……
m1 = ∑ i 2 n∑
n i =1
x , m =
i =1
xi . (6) 3.7377 4.3653 5.3141 6.9958 11.4029] ;
…… ……
Estimate value of shape parameter α is
x81 ~ 80= [0.1978 0.3087 0.4315 0.6881 0.6967……
∧
∧ m12 , R( x) = Γ (2 / x) 2
11.1339 12.6935 13.3239 14.8880] ;
α = R −1 ( ) (7)
∧
Γ(1/ x)Γ(3/ x) Accordingly it sets the eight groups test data as
m2 follows:
t11 ~ 28= [0.0785 0.0980 0.1126 0.1550 0.2503 ……
3. NAMNN algorithm to estimate shape 7.0455 8.2301 9.0485 10.7957] ;
parameters …… ……
t81 ~ 21= [0.1978 0.250 0.3087 0.4315 0.5000……
Although R(x) has been received, but it is very 6.3830 7.6686 8.0027 5.9412] ;
difficult to get R-1(x).But the form of R-1(x) is Eight groups output value of extensive data are
comparatively simple through graphics. Majority of identified as follows:
people use numerical fitting methods to get R-1(x),
201
r11 ~ 28= [0.0402 0.0817 0.1161 0.1622 0.2498…… People found the visual masking effect [6] through
7.2665 8.7691 9.6288 10.9735] ; many researches. An image can be divided into smooth,
…… …… texture, and edge blocks. Extensive HVS research shows
r81 ~ 21= [0.1642 0.3071 0.4319 0.2157 0.6923…… that the sensitivity of information distortion to human
eyes decreases down from edge block, smooth block, and
6.0747 7.7291 8.1656 12.3793] ;
texture block respectively. Dissimilar sensitivity degree
The simulation results contrasting the real values
means different significance of these three blocks. So we
and the estimate values of output are shown in figure 2.
can distribute dissimilar perceptual weights to different
It contrasts the estimate errors of NAMNN with
blocks within the image information corresponding to
χ 2 estimate algorithm in table 1. Clearly NAMNN different wavelet coefficients. The specific methods to
algorithm is more accurate. embed HVS into image coding are described as follows:
1) Segment image sub-blocks. After wavelet
transform, the high frequency of the wavelet image sub-
bands are divided into different image sub-blocks as Bk
(k = 1, 2… S). Segment method is shown in figure 3,
a64-a1, b1-b16, c1-c4……are called image blocks. The
size of the image blocks is 2×2, 4×4, 8×8 respectively,
The coefficients are reduced by 1/4 from low-frequency
to high-frequency.
202
Table 3. Percentage of edge, smooth, and texture
blocks in three images
Image Texture Edge Smooth
block image image image
Texture 48.9 10.3 7.4
Edge 29.2 54.9 43.2
Smooth 21.9 34.8 49.4
Table 4. Perceptual weights at the coarsest scale
Image Texture Edge Smooth
Figure 6. Reconstructed mage with improved SPIHT.
block image image image
Texture 0.6 1.1 1.1
Edge 2.2 2.2 2.2 6. Conclusion
Smooth 1.6 1.6 1.8
In this paper, it adopts the shape parameter of GGD
to differentiate the smooth block, texture block, and
5. Experimental results edge block of an image. The shape parameter is
estimated by the NAMNN algorithm. Then the paper
Take 512 × 512 × 8 bit standard image Lena for embeds HVS into SPIHT algorithm according to
example, the experimental results with four bior4.4 distribute different perceptual weights to different
wavelet decomposition are shown in table 5. The image blocks. Experimental results indicate that the
original image lena is shown in figure 4. When the bit image quality is improved greatly compared to the
rate is 0.25 bpp, the reconstructed image with SPIHT standard SPIHT after decompression.
and improved SPIHT algorithm are shown in figure 5
and figure 6 respectively. All implementations have
been done using MATLAB 7.0. Clearly, The improved
Acknowledge: This work is supported by 863 High
technology Research and Development Project (2006
SPIHT algorithm can get greater PSNR and better
AA04Z208) and Tianjin Natural Science Foundation
subjective visual quality in a lower bit rate.
Projects (06YFJMJC01600, 08JCZDJC21900).
Table 5. The PSNR of the reconstructed image under
different bite rate.
Bit rate PSNR(dB) of PSNR(dB) of References:
(bpp) SPIHT Improved SPIHT
[1] A. Said and W. A. Pearlman, "A new fast and efficient
0.1 22.31 23.00
image codec based on set partitioning into hierarchical trees,"
0.125 24.12 25.12 IEEE Trans on Circuits and Systems for Video Technology,
0.25 30.22 30.49 1996, 6, pp.243-250.
0.3 31.60 32.08 [2] Wang M, Zhang X H. An Image code Method Based on
0.5 35.06 35.40 human visual Characteristic. Intelligent Information
0.625 36.56 36.58 Management Systems and Technology, 2007, 2 (23):25-27.
0.875 37.29 38.56 [3] Ramos M G., Hemami S S, and Tamburro M A. Psycho
1 39.18 39.27 visually-based Multiresolution Image Segmentation.
Proceedings IEEE International Conference in Image
Processing. Santa Barbara, A, 1997, 3, 66-96
[4] Wang Tai-ming, Li Zhi-ming. A Fast Parameter
Estimation of Generalized Gaussian Distribution. Chinese
journal of engineering geophysics, 2006, 3(3):172-176.
[5] Wu Xue-li, etc. Research of Identification of None-linear
System Based on a new-type Associative Memory Neural
Network. Geography and Geo-information Science, 2004, 20
(4):110-112.
[6] Wang Xiangyang, Yang Hongying. A Fast Image Coding
Algorithm Based on Human Visual System. Journal of
Software, 2003, 14 (11): 1964-1970.
Figure 4. Original image. Figure 5. Reconstructed
image with standard SPIHT.
203
2008 International Conference on Intelligent Computation Technology and Automation
1
Project supported by the Science and Technology Bureau of Zhejiang Province, China (No. 2006C11241).
205
Table 2. Two groups of training data Generally, the root-mean-squared (RMS) error is an
adequate and commonly used error measuring method to
Group Input Output have a quantitative measure of learning. However, in this
Number Neurons Neurons paper, we measure the error of each node respectively,
Group 1 (BH)max Hcj Br Nd BFe Dy Al denoted by E(BH ) max , E Hcj and E Br . When each of the
Group 2 (BH)max Hcj Br Nd BFe Dy Al NbFe three errors decent to minimum, the adjustment
processing stops. This idea is also explained in a new
3.3. Hidden layer architecture of single output multilayered feedforward
neural networks array, which can be used to replace a
Only one hidden layer is needed for an artificial neural multiple outputs multilayered feed forward neural
network to be a universal function approximator to a 11
networks [ ]. It has been analyzed that this method
continuous function, so often only one hidden layer is
used; however, more than one hidden layer maybe used outperforms the traditional multiple outputs in that paper.
since overall fewer neurons will be required. If the In our paper, the separate processing of error measure is
function to be approximated is discontinuous, the model also testified by the experiment results, we will discuss it
will require at most two hidden layers [7]. in detail in section 4.
Though there exist many other methods used to 3.6. Pretreatment of training data
calculate the number of the hidden layer nodes, such as
8 Sigmoid function is used as the activation function.
the empirical formula [ ]. The design of hidden layer
The output value of this function is limited in the range of
mostly depends on the experiment experience. In this
0.0 to 1.0. Therefore, we must formalize the input data to
paper, the experiment result shows that, there is no
the value in the range of 0.0 to 1.0. Take data sample of
remarkable difference between two hidden layers and one
group 2 as an example, its formalization of output layer is
hidden layer. They both have relatively stable and fast
shown in Table 3.
convergence. Some researchers have the point of view
that four-layered networks are more prone to fall into bad
Table 3. Pretreatment of training data
local minima and there seems to be no reason to use four
layer networks in preference to three layer nets in all but Steps Composites Value
9
the most esoteric applications [ ]. So in this paper, we use Initial Data Nd 6.678
the one-hidden-layer BP network, with 5 neurons. BFe 1.173
3.4. Adjusting the learning rate Fe 12.672
Dy 0
In 1988, four heuristics has been proposed by Jacobs DyFe 0.323
RA for achieving faster rates of convergence while Al 0.084
adhering to the locality constraint. These heuristics NbFe 0.07
suggest that every weight of a network should be given its Reduce Nd 6.678
own learning rate and that these rates should be allowed One Node BFe 1.173
to vary over time. He also gave two classical (DyFe to Dy and Fe) Fe 12.743
implementations of these heuristics, namely momentum Dy 0.252
and an algorithm called the delta-bar-delta rule, are Al 0.084
10
studied and simulation results are presented [ ]. NbFe 0.07
Many other algorithms for adjusting learning rate are Quality Nd 0.318
gradually proposed during last decades. Determining the Fraction BFe 0.0559
right method to be applied hinges on the BP network Fe 0.6068
structure as well as the actual training results. The Dy 0.0120
network converges fastest when the learning rate is Al 0.0040
around 0.8 and the self-adjustment algorithms don’t have NbFe 0.0033
obvious improvement on the experiment. Final Data Nd 0.318
(Reduce Fe BFe 0.559
3.5. Error measure
and then Dy 0.12
Three magnetic properties, (BH)max, Hcj, and Br, they Adjust) Al 0.40
have different range of values(refer to table 3) even after NbFe 0.33
data normalizing, which means the error of each property
has different contribution to the final global error. This We have 374 data samples in all, including two
promotes us to investigate the particularity of the error groups. Each group consists of 187 data samples, with
measure method. 150 training samples, and 37 testing samples.
206
limited, so is composite BFe in figure 2. However, it’s in
4. Experiment results the permitted error range and the relative error is low
considering that the training data is from product data,
4.1. Regression analysis where few mistakes of the data are inevitable. Besides,
the fact is that in a range of value of the composite
We use the statistics toolbox of Matlab (Version
content, the magnetic properties are almost the same. For
2007a) to do a regression analysis. Statistics Toolbox has
example, Nd: 0.3229% and BFe: 0.0550%, Nd: 0.3231%
a robust regression function that is useful when there may
and BFe: 0.0549%, and other composites have exactly the
be outliers. Robust methods are designed to be relatively
same value, they have the same magnetic properties in
insensitive to large changes in a small part of the data [12].
production.
As we mentioned in Section 3.1.2, the training data can
be classified into two groups. We will analyze the 4.2. Forecasting based on the NdFeB magnet
relevant results between the predicted value and the actual composite design
value of composite Nd, BFe, Dy and Al respectively.
Figure 2 shows the regression analysis of the group 1, The following figures are based on the NdFeB magnet
while figure 3 shows group 2. composite design which is predicted by the trained BP
Considering the regression analyzing as well as network. In the experiment, 37 testing data, which
comparing two groups, we don’t include element NbFe in consists of (BH)max, Hcj, and Br, are distributed
figure 2. NbFe of group 2 is also proved to be with similar uniformly in its value range. (BH)max ranges in 28-53
characteristic in experiment. MGOe, Br ranges in 10.8-14.1 KGs, and Hcj ranges in
11-35 KOe. The input layer nodes reflect in the y axis,
while the NdFeB magnet composite design reflects in the
x axis.
207
increase of the proportion they take in NdFeB magnet, Br
and (BH)max have the tendency of decreasing, while Hcj [8] E.J. Teoh, K.C. Tan, and C. Xiang. “Estimating the Number
has the tendency of increasing. of Hidden Neurons in a Feedforward Network Using the
Singular Value Decomposition”, IEEE TRANSACTIONS ON
NEURAL NETWORKS, 7(6):1623-1629, NOVEMBER, 2006.
5. Conclusion
[9] J.D. Villiers and E. Barnard. “Backpropagation Neural Nets
NdFeB magnet composite design is based on the three- with One and Two Hidden Layers”, IEEE TRANSACTIONS ON
layer BP network. The training data sourced from NEURAL NETWORKS, 4(1):136-141, JANUARY 1992.
production data is different from what much research
work used before, for it is not uniformly distributed or [ 10 ] R.A. Jacobs. “Increased rates of convergence through
followed some specific rules. Thus it is more general and learning rate adaptation”, Neural Networks, (1):295-307, 1988.
it can be applied to the actual NdFeB manufacturing. [11] Wang Xiukun, Zhang Xiaofeng. “A New Architecture of
We classified the training data into two groups Neural Networks Array Replacing of a Multiple Outputs BP
according to the BP network design principle. Experiment Model Network”, Computer Science, 28(10): 61~63, 2001.
results indicated that the method can largely improve the
convergence speed and simplify the network structure. [12] Holland, P. W., R. E. Welsch. “Robust Regression Using
The influences of composite content on the magnetic Iteratively Reweighted Least-Squares”, Communications in
properties are showed by the experiment results. The Statistics: Theory and Methods, A6(9):813-827, 1977.
element Al which is in the minority of the composite,
about 0.002% to 0.0065%, also has the similar influences
on the magnetic properties as Nd. We conclude that BP
network can be trained to model the relationship between
NdFeB magnet composition and the magnetic properties
which provide a significant guide in the NdFeB magnet
composite design.
References
[ 1 ] P. Campbell. Permanent Magnet Materials and Their
Application. Cambridge University Press, Cambridge, 1994.
208
2008 International Conference on Intelligent Computation Technology and Automation
210
in linear neuron level and the threshold value vectors
Decide indexes Decide targets Decide samples in the network.
Y
4.4. Decide number of hidden units
Input data
The number of hidden units concerns the question’s
requirement and the number of input and output units
directly. If too big, the time for learning will be long.
Output results So there should be a optimal number. 20 is decided to
be the number in this article at last.
As the model is build, a set of data in sample is
Differences trained. The difference between the expected output
and actually output is shown in table 3. We can see that
the differences of test data are very small, about 0.004
on average. The precision is acceptable in such
Evaluation
condition. So this BP network model can be used to
predict running velocity.
Table 3. Output difference
Conclusion Expected Actually
Difference
Output Output
Figure 2. Evaluation flow chart 0.5000 0.4913 0.0087
0.5455 0.5453 0.0002
4. Model Simulation in MATLAB 0.5682 0.5679 0.0003
0.4773 0.4781 0.0008
MATLAB contains a neural network toolbox which
covers basic useful modes of neural network and 0.5909 0.6049 0.0140
integrate a few of learning algorithms. So this article
uses MATLAB to predict the velocity. 5. Case study
4.1. Build a BP network The data source is a third class highway, which goes
the north and south trend and cross 2 villages. The
Using newff function can build a BP network in length is 12.964KM, and the design speed is 30KM/H.
MATLAB. When the network is build, initialization is 141 samples are gathered in total.
carried on automatically to each level weight and the Let first 100 samples be the training samples, and
threshold value of the network. The initialization is to latter 41 be simulation samples. Then samples are
assign random number between [-1,1] to power matrix calculated in MATLAB to predict the running velocity
211
of the latter ones. Do simulation ten times and an [4] He Yubin, and Li Xinzhong, ”Neural Network Control
average value of prediction results is made out. The Technology and Application” , [M].Science Press, China,
results are shows in table 4. Because of limited space, 2000(11), pp. 29-34.
bad results are listed barely.
Table 4. Evaluation result (D means difference) [5] Xu lina, “Neural Network Control”, [M], PHEI, China,
2003(2), pp. 18-23.
10<D
Number V85-vd ΔV85 D>20 Result
<20 [6] AUSTROADS, “Road Safety Audit (Second Edition
K10+44 2002)”[J], Standards Australia, 2002
13 35 Y Y Bad
8.54
K11+50 [7] Su Jinming, “MATLAB7.0 Practical Guideline”[M],
15 21 Y Y Bad PHEI, China, 2004
1.42
K11+81
21 34 Y,Y Bad
9.11
Compared to design material, results analyzing is
shown in table 5.
Table 5. Results analyzing
Number Problems
Back of long line in small vertical
K10+448.54 slopes meets small radius curves, and
the eye release is bad.
Back of lone line meets small radius
K11+501.42
curves.
Back of lone line meets small radius
K11+819.11 curves. Horizontal curves and vertical
ones don’t match.
6. Conclusion
The difference generated by the method in this
article is small, about 0.004 on average. It is acceptable
in such sample condition. So BP neural network model
can be used to predict running velocity relatively
precise. Evaluation results of actual sections of
highway suggest that it is realistic to use BP neural
network to evaluate them with given indexes. And
conclusions obtained are matched actual situation in
general.
7. References
[1] Li Qingyao, “Researches on Highway Alignment
Evaluation and Prediction of Operating Speed”, Master thesis,
South West Jiaotong University, China 2007
212
2008 International Conference on Intelligent Computation Technology and Automation
#
accurately the dynamic character of the system. The W3
any cases, the bigger this value is, the better it is. As
follows:
1 p
Fig. 2 Structure of the modified Elman net f = ∑ (Y (k ) − y (k ))2
2 k =1
2.2. Internal time delayed recurrent NN Where Y ( k ) is the output sample, y (k ) is the
output of the NN, p is the sum of sample. The fitness
In this NN, there is internal time delayed back- function in the GA is shown as follow:
forward in the hidden layer of NN. It is shown in Fig.3. F = 1/ f
(3) Elitist GA
The elitist GA is a kind of improved GA. A new
W2
W1 generation population is produced by crossover and
WH mutation for the N dyads in the standard GA (SGA).
# y (k ) But for the elitist GA, a new population is produced by
u (k ) crossover and mutation in the N-1 dyads and the
biggest fitness value individual is selected in
population as the last individual in new generation.
The monotony of the population fitness value is kept
input layer hidden layer output layer
by this modify. The convergence is very important in
Fig. 3 Structure of the internal time delayed theory for the algorithm. After adopting the elitist GA,
recurrent NN the GA’s convergence is proved in real-number
When the one hidden layer is adopted in the NN, coding[12].So the elitist GA is used in this paper.
mathematical description can be given as follows: (4) Selection
y( k ) = W 2 F (W H x( k − 1) + W 1u (k ))
It is roulette selection in the elitist GA.
(5) Crossover
x(k − 1) = F (W H x( k − 2) + W 1u (k − 1)) The heuristic crossover operator can confirm the
Where, W 1 is weight matrix between input layer search direction of genetic by the means of the value of
and hidden layer, W 2 is weight matrix between hidden target function. The next generation x will be birth by
layer and output layer and W H is weight matrix among the parent x1 and x2 . The formula is as follows:
the nodes of hidden layer. x = r * ( x2 − x1 ) + x2
214
Where r is the random number between one and zero. hidden layer and one node in the output layer in this
(6) Mutation paper. The structure of the modified Elman net is the
The Gauss mutation is adopted that can search local same of the Elman net.
area of the individual’s neighborhood.
1.5
The main parameters are selected as follows: Y(k)
Population size: 40 1
y(k)
error
Crossover rate: 0.85
Mutation rate: 0.1 0.5
Elite reservation rate: 0.1
The stop criterion of the algorithm is that the 0
optimization solution isn’t evolution after 30
generations. The sketch map shows in Fig.5: -0.5
-1
-1.5
0 100 200 300 400 500 600 700 800 900 1000
P (t )
Fig.5. Test curve and error curve of Elman net
When the modified Elman net is adopted, the
a = 0.1 , the simulation figure of testing is shown in
Fig. 6.
1.5
P(t + 1)
Y(k)
1 y(k)
error
0.5
-0.5
N
Y -1
-1.5
Fig.4. Sketch map of the GA 0 100 200 300 400 500 600 700 800 900 1000
215
dynamic NN. The test errors of Elman net and
1.5
Y(k) modified Elman net are the smaller. But they are
y(k)
error
bigger in the internal time delayed recurrent NN and
1
time delayed NN. The train time of Elman net is the
0.5
shortest.
0 5. Conclusion
0
6. References
-0.5
[1] K. S Narendra, K. Parthasarathy. “Identification and
control of dynamical systems using neural”[J]. IEEE
-1
Transactions on Neural Networks, 1990,1(1):4-26.
-1.5
0 100 200 300 400 500 600 700 800 900 1000
[2] Hopfield J J. “Neural networks and physical systems with
emergent collective computational abilities” [A].
Fig.8. Test curve and error curve of the time
Proceedings of the Academy of Science[C], U S,1982,79:
delayed NN
2554-2558
4.4. Result of training and testing of the
[3] Elman J. “Finding Structure in Time”[J].Cognitive
different dynamic NN
Science,1990, 14:179-211
Table 1 Comparison of different dynamic NN
Train error Train time Test error [4] Jordan M I. “Supervise leaning and systems with excess
Elman net 0.066 41.3668s 0.0871 degrees of freedom”[R]. Massachusetts Institute of
Modified Elman net Technology: COINS Technical Report, 1988. 88-27.
0.053 103.65s 0.0867
( a = 0.1 )
Internal time-
delayed recurrent 0.094 177.17 0.2112 [5] Pham D T, Liu X. “Dynamic system identification using
NN partially recurrent neural networks” [J]. Jounal of Systems
Time delayed NN 0.0299 124.38s 0.1929 Engineers. 1992:2(2):90-97
In table 1, it can be known that the all four kinds of
dynamic NN can provide the high precision of model [6] Ku C C, Lee K Y. “Diagonal recurrent neural networks
of the nonlinear dynamic system after the training for dynamic systems control”[J]. IEEE Transactions on
based on the GA. When the test signal is used to test Neural Networks. 1995,6(1):144-155
the model, there are different test errors in these
216
[7] Pham D T, Liu X. “Training of Elman networks and algorithms”[J]. Artificial Intelligence in Engineering,
Dynamic system Modeling”[J]. International Journal of 1999,13: 107-117
System Science, 1996,27(2):221-226
[11] Feng Hao, He Hongyun el . “Nonlinear System
[8] Dai Xian zhong.”Neural network inverse control of the Identification with Recurrent Neural Network Based on
MIMO nonlinear system” [M].Beijing:science publishing Genetic Algorithm”[J]. Journal of Southwest Jiaotong
company,2005. University. 2002,37(4):404-407
[9] Cong Shuang, Gao Xue peng. “Recurrent Neural [12] Lin Dan, Li Minqiang, Kou Jisong. “On the
Networks and their application in system identification”.[J]. convergence of real coded genetic algorithms” [J]. Journal of
Systems Engineering and Electronics, 2003,25(2):194-197 Computer Research and Development, 2000,37(11):1321-
1327
[10] Pham D T, Karaboga D. “Training Elman and Jordan
Networks for system Identification Using genetic
217
2008 International Conference on Intelligent Computation Technology and Automation
Where η is the learning rate of the neural Provided that the condition of known X, Y, we
network,Equation (4) is also defined by determine a, b through learned network. For the values
of known (t1,t2,…,tn), we calculate R(ti) estimation
Δwij = ηδ i p j (5)
value through the following equation.
δ i = d i − ai (6) R(t ) = 1 − ni−+00..34 (i=1,2,…,n) (12)
Where δ i is error value of output joint i.
Thus, the values of (x1,y1) , … , (xn,yn) are
Equation (5) is called W-H learning rule, is also obtained, and (xi,yi) is input to the neural network in
called δ learning rule, and perhaps the least mean figure 2, weight a is gained via trained and learned
square algorithm. neural network, compared equation (10) with equation
∧
3. Parameters estimation (11), estimation value λ of parameter λ equals a.
219
Distribution function is given by Value of estimation β and η is given by
− ( ηt ) β ∧ ∧
F (t ) = 1 − e (14) − βb
β =w η =e (18)
Reliability function is given by
− ( ηt ) β
R (t ) = e (15) 3.3. Numerical simulation
We select y = ln(− ln R(t )) , x = ln t , thus formula
Exponential distribution data of parameter λ =30,
(15) is transformed into the following equation. sample n=30 is produced through method of random
y = β ( x − ln η ) = βx − β ln η (16) simulation; Similarly, Weibull distribution data of
It is similar to exponential distribution, and the parameters β = 2.5 、 η = 30 is also obtained. These
values of (x1,y1) , … , (xn,yn) are obtained. (xi,yi) is data are shown in table 1 and table 2. These data are
input to the neural network in figure 2, compared (11) complete, and estimation of reliability is given by
with (16), value of weight a through trained network formula (12). For the above discussed adaptive linear
equals shape parameter β ,and value of threshold b neural network, program of neural network is written
equals − β ln η . It is given by with Matlab. Neural network having been trained and
− βb learned, its result is given as follow:
η =e (17)
Table 1 Random numbers of an exponential distribution
Serial number 1 2 3 4 5 6 7 8 9 10
Value of sample 1.1 2.6 4.3 5.9 7.8 10.0 11.6 14.5 17.0 19.7
Serial number 11 12 13 14 15 16 17 18 19 20
Value of sample 21.6 25.4 30.2 34.4 37.9 46.5 54.0 56.8 83.4 104.8
220
reason is that quality of components and parts is up to [4] Kaili ZHOU, Yaohong KANG, Model of the Neural
standard and maintenance and repairs are not proper. Network & Simulation Program Design for Matlab. Tsinghua
First failure time of hydraulic system in the University Press, Beijing, 2005.
vibratory roller is one of the important reliability [5] Qingsheng XIE, Jian YI, Method of the Neural Network
in Mechanical Engineering, China Machine Press, Beijing,
indexes, which expresses good work time before failure 2003.
occurs firstly in the roller. According to failure data in [6] Hagan M T, Demuth H B, Beale M. Neural Network
table 3, through analysis of mathematical statistics and Design, PWS Publishing Company New York,2002
probability paper, first failure time agrees with Weibull [7] Heqing LI, Qing TAN. “Reliability Analysis of Hydraulic
distribution. Applying method of the third section, System for Type Crane”. Chinese Hydraulic & Pneumatics,
program of neural network is written with Matlab, China International Book Trading Corporation, Beijing, No.5
parameters estimation is obtained as 2007: 43-46.
follow: β = 2.012,η = 999.9183 .From the above,
density function of first failure time, relevant failure
time distribution function and reliability function are
given separately by
− ( 999.t9183 ) 2.012
f (t ) = ( 999
2.012
)( t )1.012 e
.9183 999.9183
− ( 999.t9183 ) 2.012
F (t ) = 1 − e
−( t
) 2.012
R(t ) = e 999.9183
According to the above function, the value of
reliability index is calculated in different operation
period of hydraulic system of the vibratory roller.
Aimed at operation state in different period, we shall
take some technical and management measures to
prevent failure and even accident from occurring.
5. Conclusion
Based on description of the traditional method of
parameters estimation of reliability model, the method
of parameters estimation of reliability model based on
the adaptive linear neural network is proposed.
According to this method, the parameters estimation of
the reliability model could be quickly obtained if the
life data of the known probability distribution was
input to the model of the adaptive linear neural
network. In practical applications, the method is easy to
operate, at the same time, this method offers reference
for other product reliability model. By this means,
parameter estimation of reliability model of first failure
time in hydraulic system of the vibratory roller is
obtained.
References
[1] Tianjue LEI, Hydraulic Engineering Hand Book, China
Machine Press, Beijing, 1998.
[2] Yaoming XU, Hydraulic Reliability Basic Engineering,
Harbin Institute of Technology Press, Harbin, 1991.
[3] Yongping WU, Reliability of the Construction Machinery,
People Traffic Press, Beijing, 2002.
221
2008 International Conference on Intelligent Computation Technology and Automation
considerable attention due to their applications in many F0 - measurable C ([ −τ , 0] ; \ n ) -valued random variables
{ }
areas such as pattern recognition, image processing,
φ (θ ) such that sup −τ ≤θ ≤0 E φ (θ ) < ∞ . \ + = [ 0, ∞ ) .
2
and optimization problems. Stability analysis, one of
the important subjects of various neural networks, has
been widely investigated, for example, [1]–[4] and the 2. Problem formulation
references therein. Among them, the stability analysis
issue of recurrent neural networks with time delays has
Consider a impulsive neural network with time
been an attractive topic of much research in the past
delay described by the following systems of delay-
decade, since the dynamic behavior of many biological
differential equations:
and artificial neural networks contains inherent time
delays. On the other hand, the stochastic phenomenon ⎧ x ( t ) = − Ax ( t ) + W0 f 0 ( x ( t ) )
usually appears in the electrical circuit design of ⎪⎪ (1)
⎨ + W1 f1 ( x ( t − τ ) ) + J , t ≠ tk
neural networks. The stochastic stability analysis is ⎪
considered for delayed recurrent neural networks with ⎪⎩Δx ( tk ) = Ek x ( tk )
Markovian jumping parameters or external stochastic where x ( t ) = ⎡⎣ x1 ( t ) , x2 ( t ) ," , xn ( t ) ⎤⎦ ∈ \ n is the state
T
-τ ≤θ ≤ 0
{
(9) }
disturbed by environmental noises [5], [6]. In this holds for all parameters satisfying (7).
paper, we consider the following impulsive delayed The following definition can be regarded as an
recurrent neural networks with Markovian jumping extension of Definition 1 in [7] to stochastic case.
parameters: Definition 2: The system (5) is said to be passive if
⎧ x ( t ) = − A ( r ( t ) ) x ( t ) + W0 ( r ( t ) ) g 0 ( x ( t ) ) for any T ≥ 0 and some a scalar γ ≥ 0 , under zero
⎪
⎪ + W1 ( r ( t ) ) g1 ( x ( t − τ ) ) + u ( t ) , t ≠ tk (5) initial state, the following condition is satisfied:
⎨
⎪ ( k ) = Ek x ( tk ) ,
Δ x t
⎪ z (t ) = C ( r (t )) x (t ) ,
{∫
E 2 z T ( s ) u ( s ) ds ≥ −γ E
T
0
T
}u T ( s ) u ( s ) ds{∫
(10)
0 }
⎩
where u ( t ) ∈ R n is the input vector , z ( t ) ∈ R n is the 3. Main results
output vector. r ( t ) is a continuous-time Markovian
A sufficient condition for the passivity of system (5)
process with right continuous trajectories and taking
is formulated into linear matrix inequalities as shown
values in a finite set S = {1, 2," , s} with transition
in the following theorem.
probability matrix Λ {π ij } given by Theorem 1: The dynamics of the neural network (5)
is robustly stochastically stable when u ≡ 0 and
⎧⎪ π ij Δ + ο ( Δ ) if i ≠ j
{
P r (t + Δ ) = j r (t ) = i = ⎨ }
⎪⎩1 + π ij Δ + ο ( Δ ) otherwise
passive if for some given scalars 0 < ρ1 < 1 , ρ2 > 0 ,
there exist scalars ε 0 > 0 , ε1 > 0 , γ ≥ 0 , a sequence of
where π ij ≥ 0 for all i ≠ j and π ii = − ∑ j∈S , j ≠ i π ij for all
ο (Δ)
positive definite matrices P1i > 0 and a sequence of
i ∈ S , Δ > 0 and lim Δ→0 Δ =0.
223
matrices P2i , P3i ( i ∈ S ) that satisfy the following linear ⎡ 0 ⎤
2ξ T ( t ) PiT ⎢ ⎥ g0 ( x ( t ) )
matrix inequalities: ⎣W0i (α ) ⎦
ε1 F1T F1 < P1i , i ∈ S (11) ⎡ 0 ⎤⎡ 0 ⎤
T
≤ ε ξ ( t ) Pi ⎢
−1 T T
⎥⎢ ⎥ Piξ ( t )
⎡Φ (i l ) P1i − P2Ti + Ai(l ) P3i P2Ti W0(il ) ⎣W0i (α ) ⎦ ⎣W0i (α ) ⎦
0
⎢
⎢ ∗ − P3i − P3Ti P3Ti W0(il ) +ε 0 xT ( t ) F0T F0 x ( t ) (17)
⎢ ∗ ∗ −ε 0 I
⎢ and
⎢ ∗ ∗ ∗ ⎡ 0 ⎤
⎢ 2ξ T ( t ) Pi T ⎢ ⎥ g1 ( x ( t − τ ) )
⎣ ∗ ∗ ∗ ⎣W1i (α ) ⎦
( ) + P2Ti ⎤
T
P2Ti W1(i ) − Ci( )
T
l l
⎡ 0 ⎤⎡ 0 ⎤
⎥ ≤ ε1−1ξ T ( t ) Pi T ⎢ ⎥⎢ ⎥ Piξ ( t )
P3Ti W1(i )
l T
P3i
⎥ (12) ⎣W1i (α ) ⎦ ⎣W1i (α ) ⎦
⎥
0 0 ⎥ < 0, i ∈ S , l ∈ N + xT ( t − τ ) P1i x ( t − τ ) (18)
⎥
−ε1 I 0 ⎥
Borrowing the idea of Razumikhin-type theorem [9],
∗ −γ I ⎥ we suppose that
⎦
( I + Ek )
T
P1i ( I + Ek ) − ρ1 P1i ≤ 0 i ∈ S (13) { i∈S
} {
E min AV ( x ( s ) , i, s ) < qE max V ( x ( t ) , i, t )
i∈S
} (19)
where
s for all t − τ ≤ s ≤ t and some number q > 1 . Let u ( t ) = 0 ,
Φ i( ) = ∑ π ij P1 j − P2Ti Ai( ) − Ai( ) P2i + ε 0 F0T F0 + (1 + ρ 2 ) P1i .
l l l
+ε 0−1 PiT (α ) ⎢ ⎥ ⎢ ⎥ Pi (α )
0
⎡P 0 ⎤, ⎡ x (t ) ⎤ , Ψ i (α ) = − P2Ti Ai (α ) − Ai (α ) P2i + ∑ π ij P1 j
Pi = ⎢ 1i ⎥ ξ (t ) = ⎢ ⎥ j =1
⎣ P2i P3i ⎦ ⎣m ( t )⎦ +ε 0 F0T F0 + ( q + ρ 2 ) P1i
then for r ( t ) = i ∈ S , t ∈ ( tk −1 , tk ] , according to the
Using the Schur complement, it can be seen that
Itοˆ ′s rule, the weak infinitesimal operator A of the Ωi11 (α ) < 0 is equivalent to
process { x ( t ) , r ( t )} ( t ≥ 0 ) is given by [8]
⎡ Ψ i (α ) P1i − P2Ti + Ai (α ) P3i P2Ti W0i (α ) P2Ti W1i (α ) ⎤
s
⎢ ⎥
AV ( x ( t ) , i, t ) = 2 x T
( t ) P1i m ( t ) + ∑ π ij x ( t ) P1i x ( t )
T
⎢ ∗ − P3i − P3Ti P3Ti W0i (α ) P3Ti W1i (α ) ⎥
<0
j =1 ⎢ ∗ ∗ −ε 0 I 0 ⎥
⎧⎪ ⎡ m (t ) ⎤ ⎢ ⎥
⎣⎢ ∗ ∗ ∗ −ε1 I ⎦⎥
= 2ξ T ( t ) Pi T ⎨⎢ ⎥+
⎪⎩ ⎣ −m ( t ) − Ai (α ) x ( t ) ⎦ (21)
s
⎡ 0 ⎤ ⎡ 0 ⎤
⎢W α ⎥ g 0 ( x ( t ) ) + ⎢W α ⎥ g1 ( x ( t − τ ) ) i 2i i i 2i ∑ ij 1 j
Let Φ (α ) = − PT A (α ) − A (α ) P + π P +
⎣ 0i ( ) ⎦ ⎣ 1i ( ) ⎦
j =1
+ε 0 F0T F0 + (1 + ρ 2 ) P1i
⎡0⎤ ⎫ s
+ ⎢ ⎥ u ( t ) ⎬ + ∑ π ij xT ( t ) P1i x ( t ) (16)
then if the following inequality
⎣ ⎦
I ⎭ j =1
By Lemma 1, (4) and (11), we have
224
⎡Φ i (α ) P1i − P2Ti + Ai (α ) P3i
⎢
P2Ti W0i (α ) P2Ti W1i (α ) ⎤
⎥
P3Ti W0i (α ) P3Ti W1i (α ) ⎥
≤−
1
ρ2
{(
E V x ( t0+ ) , i, t0+ κ )} (26)
⎢ ∗ − P3i − P3Ti
<0
⎢ ∗ ∗ −ε 0 I 0 ⎥ where
⎢ ⎥
⎢⎣ ∗ ∗ ∗ −ε1 I ⎥⎦
⎣ ( 2 1 0
)
κ = ⎡ e− ρ (t −t ) − 1 + ρ1 e − ρ (t −t ) − e− ρ (t −t ) ( 2 2 0 2 1 0
)
( )
(22) − ρ 2 (T − t0 )
holds, then there exists a number δ > 0 such that + " + ρ1k e − e − ρ 2 ( t k − t0 ) ⎤ < 0
⎦
q = 1 + δ > 1 satisfies (21).
Let c = − κλmax ( P1i ) , then
Since the left term in (22) is affine in α = [α1 , α 2 , ρ 2 λmin ( P1i )
" , α l ]T , (22) holds for all possible α if (12) hods for
all i ∈ S , l ∈ N . Hence, when u ( t ) = 0 , it follows from
lim E
T →∞
{∫ V ( x (t ) , i, t ) dt} ≤ c
T
t0+
sup E φ (θ )
-τ ≤θ ≤ 0
{ 2
}.
Therefore, the dynamics of the neural network (5) is
(20) that
robustly stochastically stable when u ( t ) ≡ 0 .
{ }
E AV ( x ( t ) , i, t ) ≤ − ρ2E V ( x ( t ) , i, t ) { } (23)
Now we show that the dynamics of the neural
According to Dynkin formula and Grownwall- network (5) is passive.
Bellman's inequality, it follows from (23) that, for any Combining (16)-(19), we obtain that
i ∈ S , t ∈ ( tk −1 , tk ] , k = 1, 2," , E { AV ( x ( t ) , i, t ) − 2 zT ( t ) u ( t ) − γ uT ( t ) u ( t )}
{ } { (
E V ( x ( t ) , i, t ) ≤ E V x ( tk+−1 ) , i, tk+−1 e )} − ρ2 ( t −tk −1 )
(24) ⎧⎪ ⎡ξ ( t ) ⎤ ⎫⎪ − ρ V x t , i, t (27)
≤ E ⎨ ⎡⎣ξ T ( t ) uT ( t ) ⎤⎦ Ωi (α ) ⎢ ⎥⎬ 2 ( ( ) )
Moreover, it follows from (13) that ⎩⎪ ⎣ u ( t ) ⎦ ⎭⎪
{(
E V x ( tk+ ) , i, tk+ )} = E {x (t ) P x (t )}
T +
k 1i
+
k
where
⎡ ⎡ −CiT (α ) + P2Ti ⎤ ⎤
{
≤ E ⎡⎣( I + Ek ) x ( tk ) ⎤⎦ P1i ⎡⎣( I + Ek ) x ( tk ) ⎤⎦
T
} ⎢Ωi11 (α ) ⎢
Ω i (α ) = ⎢ ⎣ P3Ti
⎥⎥ .
⎦⎥
⎢ ∗ ⎥
{
≤ ρ1E xT ( tk+ ) P1i x ( tk+ ) } (25) ⎣ −γ I ⎦
Following the same line as the above, we can show
For t ∈ ( t0 , t1 ] ,
that Ωi (α ) < 0 . Hence, for all T > 0 ,
{ } {(
E V ( x ( t ) , i, t ) ≤ E V x ( t0+ ) , i, t0+ )} e − ρ 2 ( t − t0 )
E {∫ AV ( x (t ) , i, t ) dt}
T
0
which gives that
{ } {(
E V ( x ( t1 ) , i, t1 ) ≤ E V x ( t0+ ) , i, t0+ )} e − ρ 2 ( t − t0 )
< E {∫ ( 2 z ( t ) u ( t ) + γ u ( t ) u ( t ) ) dt}
T
T T (28)
0
and where
{ ( ) , i, t )} ≤ ρ E {V ( x (t ) , i, t )}
E V x (t +
1
+
1 1 1 1 E{∫ AV ( x (t ) , i, t ) dt} = E {∫ AV ( x (t ) , i, t ) dt}
T t1
≤ ρ E {V ( x ( t ) , i, t )} e
0 0
t1+ tk+
Similarly, for t ∈ ( t1 , t2 ] ,
{ } { (
= E V ( x ( t1 ) , i, t1 ) − E V x ( t0+ ) , i, t0+ )} + E {V ( x ( t ) , i, t )}
{ }
E V ( x ( t ) , i, t ) ≤ ρ1 E V x ( t0+ ) , i, t0+{( )} e
− ρ 2 ( t − t0 ) 2 2
In general, for t ∈ ( tk , tk +1 ] , {(
−E V x ( t1+ ) , i, t1+ )} +" +E {V ( x (T ) , i, T )}
{ } {(
E V ( x ( t ) , i, t ) ≤ ρ1k E V x ( t0+ ) , i, t0+ )} e − ρ 2 ( t − t0 ) −E {V ( x ( t ) , i, t )} +
k
+
k
(29)
tk+ }
V ( x ( t ) , i, t ) dt ≤ −
1
ρ2
{(
ρ1k E V x ( t0+ ) , i, t0+ )} E {∫ AV ( x (t ) , i, t ) dt} =
T
× e ( − ρ 2 ( tk +1 − t0 )
−e
− ρ 2 ( t k − t0
)
) , { } { ( )}
E V ( x (T ) , i, T ) − E V x ( t0+ ) , i, t0+
+ ∑ (1 − ρ ) E {V ( x ( t ) , i, t )} ≥ 0
k
we obtain that for all T > 0 , (30)
{∫ V ( x (t ) , i, t ) dt} = E {∫ V ( x (t ) , i, t ) dt} +
1 j j
T t1
j =1
E
t0+ t0+
under the initial condition. Thus,
E {∫ V ( x ( t ) , i, t ) dt} + " +E {∫ V ( x ( t ) , i, t ) dt} { } {∫ z ( s ) u ( s ) ds} .
t2 T
E 2∫ z T ( s ) u ( s ) dt ≥ −γ E
T T
T
t1+ tk+ 0 0
225
This completes the proof. This paper has studied the robust stochastic stability
and passivity of impulsive delayed neural networks wi-
4. A numerical example th polytopic type uncertainties and Markovian jumping
parameters. Based on Lyapunov stability theory and a
In this section, we present an example to illustrate descriptor system approach, sufficient conditions are
the effectiveness of our results. established for the impulsive delayed neural networks
Example 1: Consider a two-neuron stochastic to be internally stochastic stable and passive. Future
neural network (5) with two modes and delays. The research regarding this topic will be devoted to delay-
network parameters are given as follows: dependent passivity of impulsive neural networks with
⎡1 0 ⎤ , ⎡2 0 ⎤ , multiple delays.
A1(1) = A1( 2) = ⎢ ⎥ A2( ) = A2( ) = ⎢
1 2
⎥
⎣ 0 1.8⎦ ⎣ 0 1.6 ⎦
Acknowledge
⎡0.3 0 ⎤ , ⎡0.2 0 ⎤ ,
F0 = ⎢ ⎥ F1 = ⎢ ⎥
⎣ 0 0.3⎦ ⎣ 0 0.2 ⎦ This work was partially supported by National Natural
⎡ −2 0.2 ⎤ , ⎡ −1 0.2 ⎤ , Science Fundation of China (60674046 and 10671073),
W01(1) = ⎢ ⎥ W01( 2) = ⎢ ⎥ Natural Science Fundation from Jiangsu Province
⎣0.2 −1.2 ⎦ ⎣0.2 −1.2⎦
(BK2007061), Natural Science Fundation from the
⎡ −1.2 0.5 ⎤ , ( 2 ) ⎡ −1.2 0.5⎤ ,
W02(1) = ⎢ ⎥ W02 = ⎢ 0.5 −1 ⎥ Jiangsu Provincial Department for Education (06KJB
⎣ 0.5 − 0.2 ⎦ ⎣ ⎦ 120088) and the fund for Doctorial program of
⎡ 1 0.4 ⎤ ⎡ 1 0.4 ⎤ Nantong University (07B14).
W11( ) = ⎢
1 , ( )
⎥ W11 = ⎢0.7 0.2 ⎥
2 ,
⎣0.7 0.8⎦ ⎣ ⎦
⎡0.6 0.2 ⎤ , ⎡0.6 0.2 ⎤ , References
W12(1) = ⎢ ⎥ W12( 2) = ⎢ ⎥
⎣ 0.5 0.2 ⎦ ⎣ 0.5 1 ⎦ [1] S. Arik, “Global asymptotic stability of a class of
⎡1 0 ⎤ , (1) ⎡0.5 0.1⎤ .
C1(1) = C1( 2) = ⎢ ⎥ C2 = C2( 2) = ⎢ ⎥
dynamical neural networks”, IEEE Trans. Circuits Syst. I,
⎣0 0.5⎦ ⎣ 0 0.5⎦ Fundam. Theory Appl., 47(4), 2000, pp. 568-571.
The transition probabilities are assumed to be [2] A. N. Michel, D. Liu, Qualitative analysis and synthesis
of recurrent neural networks. New York: Marcel Dekker,
π 11 = −0.4 , π12 = 0.4 , π 21 = 0.7 , π 22 = −0.7 . 2002.
For simplicity, we choose [3] S. Xu, J. Lam, D. W. C. Ho, and Y. Zou, “Novel global
⎡ −0.5 0 ⎤,
ρ1 = 0.5 , ρ 2 = 0.05 , asymptotic stability criteria for delayed cellular neural
Ek = ⎢
⎣ 0 −0.5⎥⎦ networks”, IEEE Trans. Circuits Syst. II, Analog Digit.
Signal Process, 52(6), 2005, pp.349-353.
then by solving the LMIs (11)-(13) in Theorem 1, the
obtained minimum of γ is γ min = 0.0112 and the [4] J. Cao and J. Wang, “Global asymptotic and robust
stability of recurrent neural networks with time delays”,
associated parameters are given by IEEE Trans.Circuits Syst. I, Fundam. Theory Appl., 52(2),
⎡0.3675 0 ⎤, ⎡ 0.9816 0.0099 ⎤ , 2005, pp. 417-426.
P11 = ⎢ ⎥ P21 = ⎢ −0.0006 0.5127 ⎥
⎣ 0 0.3863 ⎦ ⎣ ⎦ [5] Z. Wang, Y. Liu, K. Fraser, and X. Liu, “Stochastic
stability of uncertain Hopfield neural networks with discrete
⎡0.3675 0 ⎤, ⎡1.0757 −0.2291⎤ ,
P12 = ⎢ ⎥ P22 = ⎢ ⎥ and distributed delays”, Physics Letters A, 354, 2006, pp.288
⎣ 0 0.7454 ⎦ ⎣0.1655 1.0015 ⎦ -297.
⎡ 0.4250 −0.0042 ⎤ , ε = 12.3295 , [6] Z. Wang, Y. Liu, L. Yu, and X. Liu, “Exponential stabil-
P31 = ⎢ ⎥ 0 ity of delayed recurrent neural networks with Markovian
⎣ −0.0042 0.0949 ⎦
jumping parameters”, Physics Letters A, 356, 2006, pp. 346-352.
⎡ 2.6770 0.0414 ⎤ , ε = 9.1867 .
P32 = ⎢ ⎥ 1 [7] C. Li, X. Liao, “Passivity analysis of neural networks
⎣ −0.0130 0.0864 ⎦ with time delay”, IEEE Transaction on Circuits and Systems
Therefore, it follows from Theorem 1 that the delayed —II: Express Briefs, 52( 8), 2005, pp.471-475.
stochastic neural network (5) with Markovian jumping [8] C. Yuan., X. Mao, “Robust stability and controllability of
parameters is robustly stochastically stable and passive. stochastic differential delay equations with Markovian
switching”, Automatica, 40, 2004, pp. 343-354.
5. Conclusions [9] X. Mao, J. Lam, S. Xu, H. Gao, “Razumikhin method
and exponential stability of hybrid stochastic delay interval
systems”, J. Math. Anal. Appl., 314, 2006, pp. 45–66.
226
2008 International Conference on Intelligent Computation Technology and Automation
1,2
Hu Han Jian-Wu Dang2 En-En Ren2
1.School of Mathematics, Physics and Software Engineering, Lanzhou Jiaotong University,
Lanzhou 730070,China
2. School of Electronic and Information Engineering, Lanzhou Jiaotong University,
Lanzhou 730070, China
hanhu-lzjtu@163.com
228
i x’(i) x’(i+1) x’(i+2) x’(i+3) x’(i+4) y’(i)
0 0.9141 0.8853 0.9171 0.9999 0.9279 0.7804
1 0.8853 0.9171 0.9999 0.9279 0.7804 0.7752
2 0.9171 0.9999 0.9279 0.7804 0.7752 0.8129
3 0.9999 0.9279 0.7804 0.7752 0.8129 0.8598
4 0.9279 0.7804 0.7752 0.8129 0.8598 0.8866
5 0.7804 0.7752 0.8129 0.8598 0.8866 0.8377
6 0.7752 0.8129 0.8598 0.8866 0.8377 0.7729
7 0.8129 0.8598 0.8866 0.8377 0.7729 0.7608
8 0.8598 0.8866 0.8377 0.7729 0.7608 0.7753
9 0.8866 0.8377 0.7729 0.7608 0.7753 0.8167
10 0.8377 0.7729 0.7608 0.7753 0.8167 0.8567
11 0.7729 0.7608 0.7753 0.8167 0.8567 0.8574
12 0.7608 0.7753 0.8167 0.8567 0.8574 0.8611
3.2. Model selection function is used to select the weighting factors. The
last sample is considered as the most important one
Kernel function selection and parameters optimization and the weighting factor is s10 = 1 , whereas the first
can greatly improve the generalization of SVM. In this
sample is given the smallest weighting factor
work, RBF kernel function is chosen in LS-SVM
because the good performance in nonlinear as s0 = 0.5 , the rest weighting factors of samples are
approximation. The parameters that should be calculated by the linear interpolation function as
optimized are the regularization constant and the kernel
s (i ) = 0.5i / 9 + 0.5 .
parameter. Grid search is used to find the best γ and σ
[8], pairs of ( γ , σ ) are tried and the one with the
3.4. Prediction result
smallest mean square error is chosen to establish the
weighted LS-SVM model. Two groups of experiments are done in our work. In
the first group, the standard LS-SVM is used to
3.3. Weighting factor selection prediction of railway passenger traffic volume, the
weighted LS-SVM is used in the second experiment.
In weighted support vector machine, the weighting The predict results in the testing data set are listed in
factor selection varies in a great diversity of Table 3
applications [6][9]. In our work, the linear
interpolation
Table 3 Comparison of passenger prediction results by LS-SVM and WLS-SVM
Actual Prediction Value Relative Error(%) MSE
Year volume LS-SVM WLS-SVM LS-SVM WLS-SVM LS-SVM WLS-SVM
2000 0.8567 0.8417 0.8511 1.800 0.654
2001 0.8574 0.8522 0.8528 0.605 0.537 0.0012 0.0004
2002 0.8611 0.8139 0.8338 5.482 3.170
229
factors do not change linearly and how to efficiently [5]. V. David Sanchez A. Advanced support vector machines
confirm the weighting factors is worth studying in the and kernel methods[J], Neuro computing 55 (2003) 5-20
future works. [6]. DU Shuxin, WU Tiejun. Weighted support vector
machines for regression and its application[J].Journal of
Zhejiang University.Mar.2004,38(3).
References [7]. XIA Guoen, JIN Weidong, ZHANG Gexiang, Improved
Support Vector Regression and Its Application to Prediction
[1]. LENG Junfeng, LU Fengshan, WANG Meiyun. Study on of Passenger Traffic Volume[J]. Journal of Southwest
forecast of the passenger traffic volume of high speed Jiaotong University, 2007, 42(4).
railways[J]. Journal of Southwest Jiaotong University, 2001, [8]. Cherkassky, Vladimir, Ma Yunqian. Practical selection
36(1): 88-91. of SVM parameters and noise estimation for SVM
[2]. N.Cristianini and J.Shawe-Taylor, An introduction to regression[J]. Source: Neural Networks, 2004,17(1): 113 -
Support Vector Machines and Other Kernel-based Learning 126.
Methods, Cambridge University press, 2000. [9]. Chun-Fu Lin and Sheng-DeWang. Fuzzy Support Vector
[3]. V.Vapnik, The Nature of Statistical Learning Theory, Machines[ J]. IEEE TRANSACTIONS ON NEURAL
New York: Springer-Verlag, 1995. NETWORKS, MARCH 2002, 13(2)
[4]. Suykens, J.A.K., Vandewalle, J.: Least Squares Support
Vector Machine Classifiers. Neural Process. Lett. 9(3) (1999)
290-301
230
2008 International Conference on Intelligent Computation Technology and Automation
In study on mechanical product reliability, we strength between neurons, where Wij is the connection
mainly hope that life distribution law of random, such weight between neuron i in the k-th layer and neuron j
as life, material strength and load of mechanical in the k-1-th layer. bki is the threshold of neuron,
product, are obtained. Life distribution is one of main
x i (i=0~n) is the input of neurons, y j (j=0~m) is the
mathematical methods in describing product reliability.
If mastering product life distribution, we should be output of neurons, and F(·) is a transfer function from
beneficial to improve product reliability and work out the (k-1)-th layer to the k-th layer.
scientifically product maintenance strategy.
In analyzing random data, we must select a
probability distribution. In general, we describe three
different methods to select an appropriate distribution
form: histogram, probability plots, and hypothesis test.
The former two methods are direct and rough, but the
third one should estimate parameter first and its results
depend on the level of accuracy. Based on analyzing
mass fault data, this paper describes recognition of Figure 1.model structure of BP neural network
reliability model of the vibrator roller by the artificial
neural network technique. The neural network solving
232
individually. Then selection of quantile of statistical
features in a probability distribution is regard as
training sample set of recognition system. In order to
reduce sample feature absolute value has influence on
approximation accuracy, 10 quantiles in each sample is
likely to need normalization processing. Parts of
learning sample is shown in table 1, E is exponential
distribution, N is normal distribution, L is lognormal
distribution, and W is two parameters Weibull
distribution, whose density function is given by Finally, method of random simulation produces
t β
respectively 20 groups of exponential, normal,
β t −( )
lognormal and Weibull distribution as testing sample,
f (t ) = ( ) β −1 e η (t ≥ 0) ,where β is shape
η η trained neural network recognizes these data, its
parameter, and η is scale parameter. recognition rate is shown in table 2:
According to recognition types and learning sample, Table 2 recognition rate about BP neural n
objective response of network is given as follow: etwork system to reliability model
⎡ ⎤ Distribution type E N L W
⎢1"1 0 " 00 " 00 " 0⎥
⎢ ⎥ Recognition rate 92% 98% 92% 94%
0 " 01"1 0 " 00 " 0⎥
y = ⎢⎢
0 " 00 " 01"1 0 " 0⎥
⎢ ⎥
⎢0 " 00 " 00 " 01"1 ⎥ 4. Determining reliability model of the
⎣⎢ 10 10 10 10 ⎦⎥ vibrator roller
After determining the input sample and the output
response, unit numbers of the input layer and the output 4.1. Statistics of mean time between failure of
layer are also determined. By experiment, layer the vibrator roller
numbers of BP neural network of recognition reliability
model is three layers. The numbers of neurons of the Aimed at collection of using information of the
input layer, hidden layer and output layer are 10, 21, 4 vibrator roller, by analyzing given information, data of
respectively. The transfer function of hidden layer and mean time between failure of the roller are obtained, it
output layer is a sigmoid function, namely, it is is shown in table 3.
1 Because reliability of the roller depends on
f (s) = .Selection of related parameters: the
1 + e −s reliability of units and parts, in fault times of view,
most learning times is me=1000, the least expectation faults proportion hydraulic and dynamic system is
error is eg=0.002, and the learning rate of adaptation of much higher, account for 45.3% and 30.8% total fault
weight is η = 0.01 .Corresponding training process individually. Faults of classis system and operation unit
curve is shown in figure 2. account for 15.9% and 8%. From analyzing fault
reason, it is mostly caused by quality still and improper
maintaining.
Figure 2 BP Neural network choice training
process
Table 3 Mean time between failure of twenty the vibrator roller
Serial number 1 2 3 4 5 6 7 8 9 10
Mean time 1161 589 985 1832 307 853 426 1174 1855 535
between failure
Serial number 11 12 13 14 15 16 17 18 19 20
Mean time 302 210 446 417 509 763 1293 1182 732 411
between failure
4.2. Recognition reliability model of the A great deal of engineering practice and theoretic
vibrator roller based on BP neural network analysis are proven: In general, reliability model of
repairable system based on random process obeys
exponential distribution and Weibull distribution. Data
233
in table 4 are implemented normalization processing, roller based on BP neural network. The neural network
selection of ten arbitrary data is regarded as one group technique is introduced to analyzing reliability model.
of input vector, other data as another one group of According to this method, the reliability model could
input vector. The above two groups of data are be quickly obtained if the life data of the unknown
regarded as input vector, which are input to trained BP probability distribution was input to the model of the
neural network. According to the output results, we neural network. By this means, reliability model of the
determine much suitable reliability model, and vibratory roller are obtained. In practical applications,
recognition results are given as follow: the method is easy to operate. Meantime, this method
y1=0.0789 y2=0.0001 y3=0.0072 y4=0.9295 offers reference for other product reliability model.
y5=0.0023 y6=0.0029 y7=0.0633 y8=0.9789
According to the maximal membership principle, References
compared the output results with objective response,
y4=0.9295 and y8=0.9789 are most close to objective [1] Shicheng QING, Vibrator Roller. China Chemistry Press,
response, thus, recognition model of BP neural network Beijing, 2006.
tallies with Weibull distribution, the result is in [2] Yongping WU, Reliability of the Construction Machinery.
accordance with one obtained by mathematical People Traffic Press, Beijing, 2002.
statistical. So selection of Weibull distribution is [3] Kaili ZHOU, Yaohong KANG, Model of the Neural
regarded as reliability model of the roller. Network & Simulation Program Design for Matlab. Tsinghua
University Press, Beijing, 2005.
[4] Qingsheng XIE, Jian YI, Method of the Neural Network
5.Conclusion in Mechanical Engineering. China Machine Press, Beijing,
2003.
On basis of description of the structure of neural [5] Hagan M T, Demuth H B, Beale M. Neural Network
network and the traditional reliability model, the Design, PWS Publishing Company New York, 2002
methods of recognition reliability model of the vibrator
234
2008 International Conference on Intelligent Computation Technology and Automation
Abstract coming from the test data to the sorter, to realize the
pipeline leakage state recognition.
Aimed at the problem during the pipeline leakage This paper utilizes the wavelet packet analysis
state detecting process, that the datum which the method to extract eigenvectors in frequency field of the
sensor directly surveys are quite big and the pipeline leakage state, and adopts support vector
characteristic are not strong, this paper brings forward machines (SVM), which is a kind of machine learning
one pipeline leakage state classification method, which method, to solve the analysis question of leakage state
combines the wavelet packet analysis and support under the limited samples.
vector machines. Through using the wavelet packet to
the original data, carrying on the frequency band 2. Eigenvectors selection of wavelet packet
decomposing and the energy analysis, obtains the analysis
characteristic that can most reflect the classified
essence. State sorter constituted by the support vector 2.1 Wavelet packet analysis theory
machines, only needs a few training samples, can make
signal frequency band energy as the eigenvector to The traditional signal analysis method like Fourier
recognize and classify. The experiment datum shows transformation is one kind of overall transformation, is
that, this method effectively realizes the classified unable to indicate the time frequency nature of the
recognition of leakage state. signal, and does not suit the non-steady signal analysis.
Along with the wavelet theory development, by way of
1. Introduction the new signal processing method, the wavelet analysis
has widely applied in fault diagnosis and other flied.
Pipeline transport run through each domain in Although wavelet transformation satisfies this kind of
industrial production, and its decision effect is more non-steady signal analysis because of its good time
prominent in the national economy. The often occur of frequency localization and the multi-distinguish
pipeline leakage already becomes the key barrier of the characteristic, it does not decompose the high
enterprise run and the economic benefit, so earnest frequency part again[1]. The wavelet packet
studying the pipeline leakage online monitor transformation makes up this shortage, it can provide
technology has important social and economic benefit one careful analysis method for the signal. It carries the
to guarantee equipment safety operation. frequency band through multi-level partition, does
In the leakage state monitor process, the signal get further decompose to high frequency part which
through the sensor are measure data. Therefore the multi-distinguish analysis does not subdivision, and
leakage state recognition faces questions as follows: averagely decomposes the original function frequency
One is how can do effective feature extraction to the range into 2 j entries of the equal size frequency
measure data; the other is designing an effective sorter, segment. If sampling frequency is known, the analyze
to realize the pipeline leakage state recognition. After layers are enough , then may make frequency range of
these two questions settled, may input all eigenvectors each frequency segment to be small, thus carries on a
Make g (k ) (1) k h(1 k ) , then the recurrence formula the disperse points breadth cost of the restructuring
of the wavelet packet decomposition is: signal S kj .Signal total energy E k equals to the sum
of the various frequency bands energy, namely:
D2 n (t ) 2 ¦ h( k ) Dn (2t k )
k (3) p
D2 n1 (t ) 2 ¦ g ( k ) D n (2t k )
Ek ¦E
j 0
kj
(8)
k
236
possessing special nature nuclear function, support l
¦D i yi 0
i 1 3.2 Multi-classified question
Solves the various coefficients in above formula,
educes the classified distinguish function is: In order to solve the fault diagnosis and so on the
multiple value classified question, needs to establish
l
the multi-classified support vector machines.With the
f ( x) sign[(¦ D i yi K ( x, xi )) b] (12)
mathematical language describing as, according to
i 1
training regulations which assigns:
Therefore, may distinguish the sample x respective
category, according to the positive or negative of the T {( x1 , y1 ),...( xl , yl } ( X u Y ) l .
classified function.
Among them, xi X R n , yi Y {1,..., M } , i 1,..., l ,
The commonly used nuclear function includes:
Polynomial function K ( x, y ) ( x y 1) d , (d 1,2,...) , seeks a decision-making function f (x) : x Rn o y .Thus it
d is the polynomial coefficient; Radial group function can be seen, solves the kinds of multi-classification
questions, materially is to find a rule, which divides the
ª x y 2
º , V is the extent of the
K ( x, y ) exp « » points in the R n into M part. At present classification
«¬ 2V 2 »¼ arithmetic mainly has one to one, one to more and etc,
nuclear function; Sigmoid nuclear function this article applies one to one classification arithmetic.
K ( x, y ) tanh(b( x y ) c) , b and c respectively be One to one classification arithmetic is based on the
scale and attenuation parameter. classification method of two kinds of problems.The
The support vector machines solution process needs concrete arithmetic is, to all (i, j) {(i, j) | i d j,i, j 1,...,M}.
to solve a hypo-two programming problem, when Extracts all y i and the y j sample points from the
sample point number are bigger, directly solving this training regulations. Composes training regulations
hypo-two programming problem needs quite large Ti j based on these sample points, uses the support
calculate quantity and storage capacity, that will cause
vector machines that solve the two kinds classification
arithmetic invalidation [4].Therefore many scholars
problems to get real-value function g i j (x) and
bring forward the special arithmetic to deal with the
large issue, for example, the choosing block arithmetic, determines the interpolator of that, x X belong to
the decomposition arithmetic and SMO (sequential the i kind or the j kind[5].
minimal optimization) arithmetic. Hereinto, SMO
i, g i j x ! 0
training arithmetic is a simple and fast arithmetic, it f i j x ® (14)
will change large-scale hypo-two programming ¯ j, others
question into a series of the optimization sub-question
only containing two variables, and will be able to solve 4. Pipeline leakage state example analysis
directly by applying parsing method, and causes
computing process celerity and nicety. The experiment selects one pipeline that its diameter
The SMO arithmetic is as follows: assigns precision is 50mm, wall thickness is 2.5mm, the crack and the
H , D 0 0 , makes k 0; selects optimization variable vent is the artificial simulation. When the pressure is
D 1k , D 2k , parses this optimization problem about these 0.5MPa, flux is 3.525L/min, under such working
two variable, so gets the optimization solution condition, separately carries on the pipeline equipment
state experiment in the normal, the crack and the vent 3
D1k 1 ,D 2k 1 , according to the above renews D to D ;
k 1
kinds. Hereinto, support vector machine adopts SMO
Among precision H , if satisfies the engine off rule: arithmetic, and combines the work collection’s
selection policy in the SVMlight arithmetic. The type is
237
C-SVC, the nuclear function is the radial direction machines input vector is feasible, also the classified
group function, to the multi-classified questions, adopt effect is very ideal. The test results in Table 4 indicate
one to one classified arithmetic. the accuracy is 100%.
Figure 1 respectively contains the original signal
and the restructuring sketch map of various frequency 5. Conclusions
bands after the wavelet packet decomposing under 3
conditions, Table 1 represents frequency range of every Aimed at the existing problems in the pipeline
nodes in the 3rd layer after the wavelet packet leakage state detection, this paper proposes a
decompounds. classification method which combines the wavelet
Utilizing wavelet packet energy method analyzed packet analysis and support vector machines. The
above extracts signal’s eigenvector. In this example, research results indicate that using wavelet packet to
the signal sampling points are 2048, decomposing to original data to do frequency decomposition and
the 3rd layer dispersion points are 256, therefore energy analysis, can get the most essential character
n=256.Taking various frequency bands energy as that reflects classification, and the state sorter
element to construct support vector machines’ input classification which composed by support vector
vector T [ E30 , E31 ,..., E37 ] . Takes 12 groups training machines is quite effective. It offers an effective
datum (see Table 2), there into 4 groups are the normal approach for pipeline leakage fault diagnosis, and has a
state, 4 groups are the vent state, 4 groups are crack broad application foreground.
state. Taking 8 groups test datum to carry through the
test (see Table 3).The output of the support vector Reference
machines is Y , when the pipeline is under the vent
state, Y 1 ; when the pipeline is under the crack [1] ShingDongFeng, BaoMing, QuLiangSheng. Wavelet
state, Y 2 ; when the pipeline is under the normal state, envelope analysis in rolling bearing diagnosis application[J].
Chinese mechanical engineering, 2002, 11(12) , 1382-1385
Y 3.
From table 2, may see in the different frequency [2] LiangPing, BaiLei, LongXinFeng, FanLiLi. The steamer
range the energy distributing rate is different. Under rotor vibration fault diagnosis based on the wavelet packet
the normal state signal frequency mainly distributes in analysis and the neural network [J]. Control theory and
E31, under the crack state signal frequency mainly application. 2007, 24(6),981-985
distributes in E32, under the vent state signal frequency
then mainly distributes in E36. The experiment [3] Nello Cristianini, John Shawe – Taylor. LiGuoZheng,
indicates that, the wavelet packet energy analysis can WangMeng, ZengHuaJun translate. Support vector machines
reflect obviously the running status of the pipeline, the introductory remarks[M]. Beijing: Electronics industry
publishing house, 2004.
different fault type is corresponding the different
frequency band energy distribution. [4] HeXueWen, ZhaoHaiMing. Support vector machines and
May know from the test results (see Table 4), the its application in mechanical fault diagnosis [J]. South central
Table 4. Result of SVMs in testing university journal, 2005,36(1).
Serial number 1 2 3 4 5 6 7 8
State 2 2 2 1 1 3 3 3 [5] DengNaiYang, TianYingJie. New method in data mining
Test result 2 2 2 1 1 3 3 3 - support vector machines[M]. Beijing: Scientific publishing
house, 2004.
signal eigenvector extracts with the wavelet packet
energy method, take this as the support vector
238
Table 1. Frequency extension of every nodes in the third layer after wavelet analysis
Signal d30 d31 d32 d33 d34 d35 d36 d37
Frequency/kHz 0-2.5 2.5-5 5 -7.5 7.5-10 10-12.5 12.5-15 15-17.5 17.5-20
239
2008 International Conference on Intelligent Computation Technology and Automation
SUN Lingfang1,2 ZHANG Yingying1 ZHENG Xinpeng1 YANG Shanrang1 QIN Yukun2
1. School of Automation Engineering, Northeast Dianli University, Jilin City, China, 132012
2. Power Engineering and Engineering Thermophysics Postdoctoral Workstation, Harbin
Institute of Technology, Harbin City, China,150001
E-mail:dr_sunlf@163.com
regression function: sv
∑ (a
i =1
*
i + ai ) ≤ C ⋅ v analysis to prove this technology is reliable, rational
and suitable for real engineering application.
According to the methods in the reference 2, we found
Obtain the solution a = ( a 1 , a 1 , ..., a l , a l ) ,
(*) * * T
241
divided into two groups; the former 120 data were used fouling resistance. The result was showed in Table 1. It
for training, the rest ones were used for predicting. is showed in figures that, the SVM regression has
better generation and precision ability than the RBF
3.2. Kernel function and chosen of the network in the other group.
parameters
With a lot of experiments, we found that the
prediction of fouling was not sensitive to the choosing
of the kernel functions of linear, Polynomial of degree
d, Gaussian RBF. But bad for the Multilayer
perceptron function. In this work, the Gaussian RBF
was used as the most important one.
3.3. Building the network
Input the learning samples to the SVM. Get the Figure 1. Real value of fouling resistance
precise mapping relationships of the input and the
output. Cross validation was used for choosing the
parameters of C, δ . That c is the tradeoff parameter
between error and margin. When the C increases, the
prediction-errors get smaller; when the C increases for
a large degree, the prediction-errors fix steadily; when
c increases to a huge scale, it will be over-learning, and
then the generation-ability gets worse. The parameter
v which is the lower and upper bound on the number
of examples that is support vectors and that lie on the
wrong side of the hyper-plane. The parameter δ is the Figure2. Prediction curve (-), real curve (*)
mean squared error of the radial basis function, also the
width of it. When δ is small, the regression ability is
good, but when it turns much smaller, the generation
ability of the model get worse.
3.4. Prediction of fouling resistance
Putting the new data into the SVM to do the
prediction, calculate the errors. Change the C, v ,
δ and add new learning data to the SVM to improve
the prediction ability of the SVM.
Figure 3. Relative error curve
4. Results and Discussion
The prediction simulating experiments were done in
the environment of Matlab 7.1. The former 120
samples were used for training data, the rest of 50
samples were used for prediction. The kernel function
was the radial basis function. The real value of fouling
resistance was showed in Fig.1. The prediction value in
red was contrastive with real one in blue showed in
Fig.2. Relative error curve was showed in Fig.3. It was
observed that the fouling resistance was both in the Figure 4. Group 2 curve
formation and denudation process. The net trained used Prediction curve-2, real curve-1
in the second group, as showed in Fig.4 and 5, it can
still work well. Thus, the SVM model has good
generation ability. To see the advantages of the SVM,
the RBF network was found to train and predict the
242
Fossil-Fired Power Plant System and Artificial Neural
Network Method”, Electric Power Environmental
Protection, 1995.11.4, pp.37-44.
243
[15] V.N. Vapnik, An overview of statistical learning theory, Cambridge,2000, vol.12,no.5,pp.1207-1245.
Neural Networks, IEEE Transaction, 1999, vol.10, pp.
988-999. [18] Yang Shanrang, Xu Zhiming, Sun Lingfang,
“Automatic On-line Monitor of Fouling Thermal
[16] J.A.K. Suykens,J. Vandewalle, “Least Squares Support Resistance and its Application”, Journal of Engineering
Vector Machine Classifiers”, Neural Processing Thermophysics, Beijing, 2001, vol.22, pp.150-152.
Letters, Springer Netherlands,1999,vol.9,no.3,pp.293-
300. [19] Sun Lingfang. “Uncertainty analysis of on-line fouling
resistance monitoring technology with times series
[17] Bernhard Scholkopf, Alex J.Smola., et.al., “New analysis method”, Journal of Thermal Science and
Support Vector Algorithms”, Neural Computation, Technology, Dalian University of Technology, Dalian,
Massachusetts Institute of Technology, 2003, vol.2, no.3, pp.266-269.
244
2008 International Conference on Intelligent Computation Technology and Automation
246
Tries BP-GA algorithm introduced in reference [7] 100 wouldn’t add time consuming apparently.
for several times, results show that this method is Nevertheless research reveals that final values often
ineffective and final fitting performance is poor, the exceed permitted range, sometimes negative values are
best evaluative value(MSE) is 0.3950, and worse, taken. The reason is that standard GA is aiming at
matrixes obtained from GA are often singular, and BP global minima with crossover and mutation only,
algorithm can’t go on in this case. exceeding boundary is inevitable without exceptional
An improved combination method is proposed to measures.
reduce time spending and enhance the BP performance. There are three methods to solve this problem. The
One part of original individuals are gotten by various first one is to design a new encoding rule to guarantee
training parameters and NN training function, such as the availability of chromosome. The second is to check
traingdx, traingd, trainbr etc[8], another individuals are the value of gene during heredity operation so as to
generate stochasticly, flowchart is shown as fig.2. stipulate the acceptability of variables. The third one is
Tournament selection is used and two elites are to adjust evaluative value by penalty coefficient once
ensured to be selected into next generation during the unreasonable value occurs. The third method is
itteration, Gaussian mutation function is adopted, used here by adopting an adaptive coefficient which is
crossover fraction is 0.7, best evaluative value(MSE) decided with distance to reference value. Some optimal
1.1953*10-6 is achieved, this indicates that BP results are shown in table 3.
coincidence with welding procedure very well. Table 3. Testing results with penalty coefficient
BEGIN
Various NN
training method
20 stochastic
20 individual
individual
Initial population
Calculate FEV ( X )
Selection,crossov
5. Conclusions and outlook
er,mutation
It is feasible to search the best welding parameters
GEN = GEN + 1
from original test data with combination of BP and GA,
N GA stop?
methods proposed in our research is practical. Further
Y
more, some conclusions can be drawn as follows:
Save results
1. GA is good at searching near optimal solutions,
and BP is highly evaluated for finding a precise local
END optimum solution.
2. The final accepted optimal welding parameters is
Figure 2. Follow chart of BP+GA not the only one, and the same to optimal BP network.
3. Influence on welding result caused by special
4. Searching optimal welding parameters input variable can be studied conveniently. For
with GA example, if diameter is set to be different values at first,
the other four welding parameters will change too in
GA is used for global searching and BP is used for final results.
calculating evaluative value in our study. Each 4. Methods used here can be put into use in similar
chromosome consists of five float genes which are optimizing problem.
correspond to variables of welding current, welding
voltage, welding speed, rotating frequency and rotating References
diameter. Permitted variation zone has shown in table
2. [1]Dongkyu Sohn, Shingo Mabu, Kaoru Shimada etc,A
Evaluative function is still MSE(mean square error) Global Optimization Method RasID-GA for Neural Network
like formula 1, because of the short length of Training,Advanced Computational Intelligence and
chromosome that enlarging the size of population to Intelligent Informatics, 2008,12(1), pp. 85-91
247
[2]Hao peng, Xiang ling. Optimal design approach for the
plate-fin heat exchangers using neural networks cooperated
with genetic algorithms. Applied Thermal Engineering,
ScienceDirect 28(2008), pp.624-650
248
2008 International Conference on Intelligent Computation Technology and Automation
Yafei Huang
College of Electrical and Information Engineering, Changsha University of Science and
Technology, Changsha, Hunan Province, 410076, China
E-mail: xyrhyh@163.com
250
layer with J nodes given a threshold ϕ j , j = 1,2,…, represented as Z i = ( zi1 , zi 2 ,…, ziE ) in the
J ; w ji is the connecting weight between the j th unit in E-dimensional space. The best previous position of the
middle layer and the i th unit in input layer, and ukj is i th particle is recorded and represented as Pbi = ( pbi1 ,
the connecting weight between the k th unit in output pbi 2 ,…, pbiE ). The index of the best particle among
layer and the j th unit in middle layer. If take sigmoid all the particles is treated as global best particle, and is
function as the transfer function of hidden layer, then represented as Pg = ( pg1 , pg 2 ,…, pg E ). The rate of
network outputs are: velocity for i th particle is represented as Vi = ( vi1 ,
J
⎧ I
⎫ vi 2 ,…, viE ). The modified velocity and position of each
ykl = ∑ ukj ⎨1 {1 + exp[−(∑ w ji xil − ϕ j )]}⎬ (8) particle can be calculated using the current velocity and
j =1 ⎩ i =1 ⎭
distance as shown in following equations (the
We can use average square error to evaluate the
superscripts denote the iteration):
performance of BP network:
vik +1 = ω vik + c1 R1 ( pbik − zik ) + c2 R2 ( pg k − zik ) (10)
1 L
MSE = ∑ (Yl − Yˆl )2
L l =1
(9)
zik +1 = zik + vik +1 (11)
The wavelet network model(WNM) can be Where i = 1,2,…,M (M is the particles population size);
established as follow. Firstly, original traffic flow signal ω is the inertia weight factor; c1 and c2 are acceleration
series f (t ) are decomposed into a certain number of constants, called the cognitive and social parameter
sub-series { D1 , D2 , … , DP , CP } by wavelet transform respectively; R1 and R2 are random numbers
algorithm. D1 , D2 , … , DP are detail flow signal series, uniformly distributed within the range [0,1].
and CP is background signal series. They play The acceleration constants c1 and c2 are often set to
different role in the original traffic flow series and the be 2.0 according to past experiences. Suitable selection
behavior of each sub-series is distinct. The input data of of inertia weight ‘ω’ provides a balance between global
BP network in WNM can be composed by the traffic and local explorations, thus requiring less iteration on
flow sub-series at t time, i.e. X = [ D1 (t ) , D2 (t ) , …, average to find a sufficiently optimal solution. As
DP (t ) , CP (t )]′ . The output layer has only one node and originally developed, ω often decreases linearly from
the desired output is Y = [ f (t + T)] , where T is about 0.9 to 0.4 during a run. In general, ω is set
forecasting time interval. The nodes of hidden layer are according to the following equation[10]:
determined by trial and error. The network weights w ji , n
ω = ωmax − (ωmax − ωmin )
ukj and threshold ϕ j can learned by standard BP N
algorithm or self-adapted BP algorithm and so on. In Where ωmax and ωmin are maximum and minimum value
this paper, in order to enhance the learning capability as of the weight factor respectively, N is the maximum
well as the training efficiency, the particle swarm number of iterations, n is the current iteration
algorithm is adopted to optimize those parameters of number.
WNM, which will be discussed in the next section.
3.2. WNM Combined with PSO
3. Hybrid WNM combined with PSO
In WNM Combined with PSO algorithm
(PSO-WNM), if the wavelet network model was
3.1. Overview of PSO
assigned dozens of different set of weights( w ji , ukj )and
Particle Swarm Optimization (PSO) is heuristic thresholds( ϕ j ) stochastically, for the same input data,
parallel global optimization method, which was firstly each set of weights and thresholds have different
proposed by Kennedy and Eberhart in 1995[9]. In outputs, so we can use those information to optimize
contrast to traditional optimization algorithms, PSO WNM[11]. Let particles position Z in PSO constituted
algorithm is so simple and few parameters need to be by BP network weights and thresholds, that is
adjusted, it deeply attracted the evolutionary Z = {…, wij ,…, uij , …, ϕ j …} . Then the weights and
computation field scholars as soon as PSO was thresholds of network can be optimized using PSO
proposed, it can be used to solve nonlinear, non- algorithm, and the fitness function value used in this
differentiable, multi-peak optimization problems, and algorithm can take the value of BP network’s MSE as
now it has been widely used in function optimization, formula (9) expressed. The training process of
neural networks, fuzzy system control, and so on. PSO-WNM was shown in Figure 2. The terminate
Let Z and V denote particles position and velocity condition in PSO-WNM is the judgment whether the
in a search space respectively. Each i th particle is maximum iteration value achieve or whether average
treated as a without-volume particle, the i th one square error less than a very small number.
251
then X = {D1(t), D2 (t), C2 (t), D1(t −97), D2 (t −97), C2 (t −97)} .
f (t )
The number of nodes in input layer is equal to 6,
hidden layer nodes take 5 by trial and error. So the
X = {D1 (t ),…, D p (t ), C p (t )}
structure of WNM is 6-5-1. The weights and threshold
of network are estimated by PSO algorithm. According
Z m = {…, wij ,…, uij ,…, ϕ j …} (m = 1, 2, …, M) to the structure of WNM, PSO search space is
40-dimensional space, and the particles population size
M=40, the number of training of PSO-WNM is 1000. In
order to compare, the average square error curves in
wij , uij ϕj
Zm training process using PSO-WNM and standard WNM
were shown as Figure 3, here standard WNM mean that
weights and threshold of network optimized by standard
BP algorithm.
Zm
Z m (m = 1, 2,…, M) 103
102 PSO-WNM
101
Error
100
10-1 WNM
Training
-2
10
10-4
10-5
4. Traffic flow forecasting simulation 0 200 400 600 800 1000
Epoch
4.1. Data structure of sample
Figure 3. Training Error in 1000 epochs of WNM and
The paper applied the traffic-flow forecasting PSO-WNM
optimal control system, which was designed based on
PSO-WNM, to real-time traffic optimal control. There
The corresponding simulation curves of original data
is 2-month(2003.07- 2003.08) record of hourly traffic and fitting data are shown as Figure 4(1-100),
flow of Ma-Jia-Bao toll station on Ma-Ping-Xi respectively. We were regarded the new data that were
Expressway, the daily record is between 8:00 and 22:00, processed by wavelet transform as the input of WNN
so there is 14 data everyday. The first 55 days flow model. The fitting between forecasting values and
series are used for calibration or training of the model, detecting values of hourly traffic flow data in the last
and the remaining one week data are used for week of Aug, 2003 was shown as Figure 5.
verification or testing purposes. In this research the
length of series N =55×14, then the scale number P=2.
Through à Trous algorithm, an hourly traffic flow
time series is denoted by discrete quantities f (t )
( t =1,2,…, N ), it should be decomposed into the
sub-series: { D1 (t ), D2 (t ), C2 (t ) }. Given the forecasting
interval T =1, that is we will forecast traffic flow on
Ma-Jia-Bao toll station one hour later. Here three-layer
network: input layer, hidden layer and output layer, is
adopted. Because traffic flow presents a weekly
repeated of the cyclical basically, flow series at t +1
time maybe have highly relevant with series at
Figure 4. Distribution plot of raw traffic flow data
t -7×14+1 time, add them into the input data of WNM,
252
3) The further improvement on the proposed method
should be in the following two ways. 0ne is to research
the mathematics principle of the particle optimization
algorithm; the other is to study better approaches for
combination of the swarm intelligent algorithm with the
WNM.
References
[1] Zhu Z., Yang Z.S.: Real time traffic flow prediction model
based on ANN. China Journal of Highway and Transport,
1998, 11(4), pp. 89-92.
[2] Li C.J., Yang R.G., Zhang J.S. Traffic flow forecasts based
on wavelet analysis. Journal of Computer Applications.
Figure 5. Comparison of detected and forecasted series of 2003, 23(12), pp. 7-8.
PSO-WNM [3] Yi J. Dynamic Prediction of Traffic Flow and Congestion
at Freeway Construction Zones. Journal of Construction
Education. 2002, 7(1), pp. 45-57.
4.2. Forecasting results and analyses
[4] Jianming H., Jingyan S., Yi Zh. Modeling and Analysis for
Figure 3 show the average square error for 1000 Self- organization of Urban Traffic Flow. The 8th
epochs in the network training process by PSO-WNM International IEEE Conference on Intelligent
Transportation Systems, Vienna, Austria, September 13-16
and standard WNM, respectively, where y-axis id the
(2005), pp. 490-495.
value of squared error for each learning epoch, and the
[5] Da-rong H., Da-cheng W., Jun S. Forecasting Model of
x-axis is the number of the machine learning epochs in Traffic Flow Based ARMA and Wavelet Transform.
the training process. The minimum of the sum-error in Proceeding of Dynamics and Impulsive Systems, Qingdao,
the training process by PSO-WNM is 3.62 ×10−4 , and China, An supplementary volume: Dynamics of
that of standard WNM is 3.78 ×10−4 . So the precision of Continuous, Discrete and Impulsive Systems, series A:
PSO-WNM is increased by 4.23% compared to the Mathematic analysis, 2006, pp. 860-869.
traditional WNM. While the CPU time for training the [6] Wensheng Wang, Jing Ding. Wavelet Network Model and
PSO-WNM model is about 8s less than WNM. Its Application to the Prediction of Hydrology. Nature and
Science, 2003, 1(1), pp. 67-71.
Figure 5 shows a comparison of the detected traffic
[7] Chui C K. Wavelet: a Tutorial in Theory and
flows and the forecasted flows using the PSO-WNM
Application[M]. New York: Academic, 1992.
model for a period of the last 7 days in August 2003. [8] Aussum A, Campbell J, Murfagh F. Wavelet-based feature
From Figure 5 we can see that the forecasted curve extraction and decomposition strategies for financial
follows the detected curves pretty accurately, the forecasting. Journal of Computational Intelligence in
forecasting results show that the proposed model can France, 1997, pp.1-17.
capture effectively continuous and subtle information [9] Eberhart R C, Kennedy J. A new optimizer using particle
about the traffic flow signals. swarm theory. Proceedings of the Sixth International
Symposium on Micro Machine and Human Science,
Nagoya, Japan, Piscataway, NJ: IEEE Service Center,
5. Conclusion 1995, pp. 39-43.
[10] Huang C.M., Huang C.J., Wang M.L.. A particle swarm
1) The forecasting results indicate that WNM optimization to identify the ARMAX model for short term
combined with PSO is better than standard WNM in load forecasting. IEEE Trans. on Power Syst., 2005(2), pp.
both forecasting effect and network function. With the 1126-1133.
advantages of higher precision, faster speed and better [11] Liliana C, Agamennoni R.D, Attellis O E, et a1.
stability in the short-term traffic flow forecasting, this Identification structures using rational wavelets: Examples
model avoids the curse of dimensionality problem in of application. Applied Numerical Mathematics, 2003,
47(4), pp. 345-363.
WNM.
2) Due to the superiority of WNM combined with [12] Huang K ,Chen S F, Yuan X, Zhou Z G. Neura1 network
optimal design based on orthogonal experiment method.
PSO to the traditional neural networks, the applied Systems Engineering Theory Methodology Applications,
effect will be further in proved if some optimization 2004, 3(3), pp. 272-275.
calculating methods are adopted to overcome the
defects of WNM.
253
2008 International Conference on Intelligent Computation Technology and Automation
Chen Haixia
Changsha University of Science and Technology, Changsha, 410076, China
Chenhaixia-1973@163.COM
255
In recent years, “pattern drifting” phenomenon is 3.2 Examples of Iris Dataset Classification
often Involved in domestic applied research of ART2
Iris data are 50 samples of three kinds of flowers
network [4][6] . “Pattern drifting” phenomenon is that In
that are Setosa、Versicolor and Virginica. In order To
fast learning rules, when the similarity r of input mode
facilitate comparison, input the samples at a fixed
I gradually Changes in a certain direction of slightly
sequence: a Setosa, a Versicolor, a Virginia again,
larger than vigilance coefficient ρ, memory values zJi
carry on 50 times of this cycle. The network parameter
and ziJ of long-term memory system will slowly drift
besides must make the revision with the sample length
to other models with the changing (Fig.2(a) generally
m related parameter, other parameters are invariable,
displays this kind of drift phenomenon). Various
the security values ρ=0.9999.
improved algorithms present to control pattern drifting.
separately in situation of a=b=1, a=b=5, a=b=10 and
Literature [6] even clear that pattern drifting is ART2
a=b=20,to carry on experiments 4 times, the results of
network’ own flaw. These improved algorithms are
the classification are shown in Fig.3,and three kinds
essentially similar to learning rate of other networks,
of flowers shape take different marks.
that is, increase the original LTM vectors’ weight. As
When a=b=1, the Setosa samples activated the 1st, 5th,
shown in Fig.2, pattern drifting can be obviously
7th neurons of the F2 level, that is 3 subclasses
controlled when parameter a and b are enough great.
branched out. Digital underlined present the neuron
Obviously, compared to directly adjustment of
activated at first time when this sample input.
parameters a and b, the changes of the learning
Versicolor activated the 2nd, 4th, 8th, 9th neurons and
algorithm will largely increase the computing capacity
formed 4 subclasses, but the 19th, 21st, 23rd, 34th
of the system.
samples are mistaken for Virginia. The Virginia
9
z 1iF samples activated the 3rd, 6th, 10th neurons;
8
simultaneously over 20 samples are mistaken for
7 Versicolor.
6
When a=b=5, the situation has improved, which the
z 1iS
wrong number of identification reduces to 12, while
5
z 2iF further reduces to 9 when a=b=10.
4 z 2iS Simultaneously we noted, when the study just
z jiInt
3 started, because still few understanding to the
3 4 5 6 7 8 9
Versicolor, Virginica is mistaken for Versicolor. When
9
z 1iF a=b=1, the Virginica first 4 samples are mistaken. The
8
other situations mistaken are the first 3, 2, 1 sample
7 respectively. The situations mistaken reduce along
6
with a, b increase. Contrasted in Fig.2, this is
z1iS
obviously because the LTM vectors can well maintain
5
z2iF the stable result when the values of a, b is high.
4 z2iS When a=b=20, two points should be emphasized
zjiInt
3 specially: 1) the wrong number of classification not to
3 4 5 6 7 8 9
continue to reduce along with the value of parameter a,
(1) a=b=1 (2) a=b=10
b further increase. The number of mis-classification
Fig.2. Track of LTM vectors
achieves 14. The reason lays ART2 already relative
256
“stubborn” in this time, which obviously influenced by remembered the newest learning sample. While a=0
the input samples series. If the first input of ART2 reduced zJi’s contribution directly to u.
network is exactly the samples located at the type edge,
there must exist certain resistance to enable the LTM
vectors finally to aim at the type center, thus it will
influence the classification result; 2) the 6th neuron of
F2 level is activated by the 24th sample of Versicolor.
For Versicolor activates it 3 times, while Virginica
activates it 8 times, there should think what stored in
the neuron is Virginica. Here cannot think that the 6th
neuron's LTM vectors has had the pattern drifting, that
is because from the sampled data, these samples;
components is quite close. Three samples in the
Versicolor are likely small Virginica (subclass 6). In a,
b with others’ value, has not had the same mistake,
which can only be understood that it is influenced by
the LTM vector's change of the motion track of LTM
vectors.
4. Conclusions
257
In the situation of a=0, and b is great or a and b with [5] Huang Gexiang, Chen Jirong. Application of ART2
medium values, the learning rate is almost the same. neural network in recognition of handwritten Chinese
Other aspects’ affects is out of the Discussion scope of character [J]. Computer Simulation,
this article. 2006,( 07) :153~156
[6] Han Min, Chen Lei, Tang Xiaoliang. Applied research of
Appendix Fuzzy ARTMAP Neural network in land cover
classification [J]. Chinese Image Graph Journal,
The ART2 network's parameters setting are: 2005,( 04) : 415~419
The length of input vector m=2;b=1; c=0.1; d=0.9; [7] Han Xiaoyun,Liu Ruiyan. Improvement of ART - 2
e=0.0001;threshold θ =0;the neuron’s number of Network learning algorithm [J]. Data acquisition and
layer F2 is 2; processing, 1996, 11(4):241~245.
The connection weight of layer F1 and layer F2
based on literature [2] as follows:F1->F2, connection
0.5
(
weight zij initialize according to formula 1- d) m ;
F2->F1, connection weight zji initialization is 0
completely.
Acknowledgement
Reference
258
2008 International Conference on Intelligent Computation Technology and Automation
3. Study on Peak Discharge periodicity of From this two figures, we can get that for Zi River
basin, the negative energy Oscillation Center in (1974,
Zi River 45) occupies a lot of scope, affecting from 1965 to
1985. Furthermore, Scale Center arranges regularly
Most flood of Zi River is caused by rainstorm and three positive Centers and two negative centers in the
mountain torrents. Flood disaster is easy to form, so point of the 20th year. Scale fluctuates are jumbled
the study on rainfall periodicity of Zi River has very under the point of 10 years, although they have definite
important significance. As referred in part 2, there are energy, the energy of high- frequency vibration is very
two rainstorm Center in Valley, one is nearby weak. From Fig.3, there are two fluctuations of
Liuduzhai in the Upstream and the other is in the area
260
periodicity appear in 23-years [10] and 18-years. In [3] Mladen Victor Wickerhauser. Adapted Wavelet Analysis
addition the low- frequency fluctuation and the high- from Theory to Software, A K Peters Ltd, 1994, ISBN
frequency fluctuation are weak. 1568810415.
261
2008 International Conference on Intelligent Computation Technology and Automation
Wu Fuzhong
School of Engineering, Shaoxing College of Arts and Sciences, Shaoxing, China
wufuzhong75@zscas.edu.cn
Construct GRNN
263
Fig.9. Known form Fig.8 and Fig.9, the error is less
than 0.01 when the 40 sample points are chosen. The
requirement of reconstruction surface can be met
basically.
Error value
No. of points
Fig.5 Error analysis
Fig. 8 Points excluding noise
Error value
0.03
No. of points
Fig.6 Distribution of error probability Fig.9 Error after noise points eliminated
264
Error value
Fig.10 Distribution of boundary points No. of points
Fig.13 Error of surface reconstruction
5. Surface reconstruction
Supposed the measured points excluding noise are
denoted with Dm = { Pi m , Z im , i = 1, 2, …, 813}. The 6. Conclusions
GRNN is again constructed with Dm, the steps are
given as follows. It is demonstrated that surface reconstruction
method on the basis of generalized regression neural
net = newgrnn( Pi m , Z im , 0.005); %Construct GRNN net is practicable in this paper. The noise points can be
A=sim(net, Pi m i); %Calculate output value properly eliminated from measured points, and the
precision of surface reconstruction can be improved by
e= Z im –A %Calculate approximation error
changing spread constant. Compared with other surface
The result of reconstruction surface is shown in reconstruction methods, the present method in this
Fig.11. The trimmed surface is shown in Fig.12. The paper has following characteristics: (1) the algorithm is
final reconstruction error is shown in Fig.13. The simpler; (2) the reconstruction precision is higher; (3)
maximum error is 6e-5. the requirement for topological structure of measured
points is lower.
7. References
[1] Z. X. Sun, “Product design on the basis of reverse
engineering technique”, Journal of Shanxi University of
Technology, 2006, 22(2), pp. 7 - 9.
[2] X. M. Wu, G. X. Li, W. M. Zhao, “Surface reconstr-
uction aiming at points cloud data based on generalized
regression neural network”, Chinese Journal of Construction
Machinery, 2006, 4(2), pp. 150 - 153.
[3] Y. D. Yang, Y. Q. Zhou, T. S. Li, etc, “Method for curve
reconstruction based on radial basis function network”,
Fig.11 Reconstructed surface Computer Engineering and Design, 2007, 28(10), pp. 2405 -
2407.
[4] P. Gu, X. Yan, “Neural network approach to the
reconstruction of freeform surface for reverse engineering”,
Computer-Aided Design, 1995, 27(1), pp. 59 - 64.
[5] D. F. Spech, “A general regression neural network”,
IEEE Trans on Neural Networks, 1991, 2(6), pp. 568 - 576.
[6] Y. G. Fan, X. M. Liu, J. Chen, “Approach 0f NURBS
Free-fornl Surface Reconstruction from Scattered Data Based
on RBFNN”, Computer Engineering and Applications, 2005,
41(11), pp. 66 - 69.
[7] L. X. Gao, S. H. Qi, “Tool-path generation from the
scattered points”, China Mechanical Engineering, 2006,
17(11), pp. 1101 - 1104.
Fig.12 Trimmed surface
265
2008 International Conference on Intelligent Computation Technology and Automation
population adjustment factor for zone j; N is the 4.1 The methodology to determine the
number of traffic zones; d ij is the distance between parameters based on genetic algorithm
zone i and zone j; β is the parameter of the impedance Population adjustment factor, employment
of the impedance function. adjustment factor and parameter β of the impedance
Substituting the population that each employee can function are three parameters of the improved Lowry
bring up into the equation (1), the population who live model needed to be calibrated. If there are 100 traffic
in each traffic zone can be calculated by: zones, the number of parameters which are to be
N N WPi ⋅ dij-β calibrated is 201(100 × 2+1). And coefficient α and
Pi =α ⋅ ∑TEji =α ⋅ ∑E j ⋅ N
(2) coefficient γ should be settled beforehand.
j=1 j=1
∑WP ⋅ d k
-β
ik Adjustment factors are calibrated by genetic
k=1 algorithm, and its target function is determined basing
Where, Pi is the population of zone i; α is the on the maximum likelihood function. Before that was
number of people that each employee can bring up; the done, population and service employment of each
other variables are the same as the aforesaid ones. traffic zone are supposed to submit to normal
distribution, hence, probable density of which are
3.2 Improvement of population distribution given as:
function
Population distribution function of Lowry model is ( )
f Pi =
σ P 2π
1
((
exp - Pi - Pi )
2
2σ P
2
i
) (5)
used to solve such a problem that how employees i
(( )
choose their service site. Based on this basic function,
( ) )
1 2
2σSE
2
an employment adjustment factor is introduced in to f SEi = exp - SEi - SEi (6)
further describe this problem. The larger the σ
SEi
2π i
∑
k =1
WEk ⋅ d
-β
ik
variance of population and service employment for
zone i.
Observation value of population and service
Where, TPij is the number of employee who receive
employment number for each traffic zone are further
service from zone i to zone j; Pi is the total number of supposed to be independent identical distribution, so
population for zone i; WE is the employmentj
the Likelihood function can be expressed as:
adjustment factor for zone j. N ⎛ ⎞
( )
2
exp ⎜⎜ − Pi − Pi 2σ2 ⎟⎟ ×
1
Substituting the service employment number that L=
i =1 σ P 2 π Pi
⎝ ⎠
each person needs into the equation (3), the service i ⎛ ⎞
N
( )
2 (7)
exp ⎜⎜ − SEi −SEi 2σ2 ⎟⎟
employment number for each traffic zone can be 1
calculated by: i =1 σSE 2 π ⎝
SEi
⎠
i
N N WEi ⋅ d-jiβ
SEi =γ ⋅ ∑TPji =γ ⋅ ∑P j ⋅ N
(4) Substituting the Eq.(2) and Eq.(4) into the Eq.(7)
∑WE ⋅ d
j=1 j=1 -β which has been carried on logarithms transformation,
k jk the optimal target function of genetic algorithm can be
k=1
expressed as:
267
⎛ ⎞
2 ⎛ ⎞
2 adjustment factor of all 50 traffic zones are completely
⎜ ⎟
N Pj ⋅WEi
⎜ ⎟
N E ⋅WP
⎜ ⎟ ⎜ ⎟
⎜ ⎟
γ⋅ ∑
⎜ ⎟ calibrated and partial results are shown in table 1.
α⋅ ∑ j i −Pi ⎟⎟
⎜ ⎜
−SEi ⎟⎟
⎜
⎜ β ⎟
⎜
⎜ β ⎟
From the result we know, the relative error for
N ⎜j=1 d ji ⎟
N j=1 d ji
⎜
⎜
⎟
⎟
∑ +∑
⎜ ⎟
⎛ ⎞ ⎜ ⎟ ⎜ ⎟
Max ⎜ lnL⎟= ⎝ ⎠ ⎝ ⎠
(8) population and service employment of 80% traffic
⎝ ⎠
i=1 σ 2
Pi i=1 σ SE
2
zones are all within 10%, furthermore, the relative
i
error of the total number of population and service
employment are only 2.79% and 1.56%, which satisfy
4.2 The determination of the basic parameters the precision request.
for genetic algorithm and the calibration of the
adjustment factor
Parameters for genetic algorithm that realized by
VB programming are determined as follows: the
population size takes 100; the crossover probability
takes 0.6; the mutation probability takes 0.08; the
adjustment factor searches extent for [0,5]; the
impedance of parameter searches extent for [0,1]; the
iteration number of times take 1000. The procedure
interface is showed in figure 2.
Parameters for genetic algorithm can obtained
through an experimentation process from survey date,
which comes from residential trip O-D in Liaoyang
city, Liaoning province, china, in 2005. The population
Figure 2. Dialog box of GA
adjustment factor as well as the employment
Table 1. Adjustment factors calibrated and the relative errors
Adjustment factor Error analysis of population Error analysis of service employee
zone Population Employment
Observation Calculation Relative Observation Calculation Relative
adjustment adjustment
value value error (%) value value error(%)
factor factor
1 0.018 0.015 4001 4493 12.30 1181 1274 7.87
2 0.020 0.002 4823 4903 1.66 263 178 -32.32
3 0.022 0.040 5800 6223 7.29 3367 3638 8.05
4 0.021 0.059 6420 6266 -2.40 5482 5349 -2.43
5 0.019 0.042 5935 5285 -10.95 3846 3623 -5.80
… …… …… …… …… …… …… …… ……
46 0.027 0.009 5239 4986 -4.83 515 558 8.35
47 0.035 0.008 5572 5833 4.68 332 465 40.06
48 0.041 0.001 4910 5426 10.51 218 54 -75.23
49 0.011 0.003 1490 1465 -1.68 25 146 484.00
50 0.003 0.010 482 823 70.75 337 491 45.70
Total 387980 398794 2.79 105558 107200 1.56
indicate that population adjustment factor of each
4.3 Relationship between adjustment factors traffic zone mainly connects with residential land use,
and land use municipal facilities land use and educational research
According to the results of adjustment factors and land use; employment adjustment factor mainly
land use calibrated in present year in table 1, the types connects with commercial land use, health and medical
of land use which contribute greatly to the population service land use and administrative office land use,
adjustment factor and the employment adjustment which agree with actual meaning of adjustment factors.
factor are determined through SPSS statistics software Correlations between adjustment factors and land use
by multi-stepwise regression analysis. The results are showed in equation (9) and equation (10).Unit:
Hectare:
268
forecast model are built up respectively. For elastic
WP =0.01⋅ RE +0.01⋅ MU +0.03⋅ ED +0.013
i i i i (9) trip, we introduce in effect function to indicant
Where, WPi is the population adjustment factor of influence that peripheral zone effect to the central
zone, in which employment is an important influencing
zone i; REi , MU i and EDi are residential land use, factor. Trip generation forecast model for different trip
municipal facilities land use and educational research purpose can be expressed as follows:
land use. G = 2.51 ⋅ P + 1258
iW (11)
WE =0.01⋅ CO +0.01⋅ ME +0.01⋅ AD +0.017 iW
i i i i (10)
Where, WEi is the employment adjustment factor of
G = 2.87 ⋅ P + 755
iS iS (12)
zone i; COi , MEi and ADi are commercial land use,
N PEj j
health and medical service land use and administrative G =0.55⋅ P +0.60⋅ E +0.001⋅ ∑ -1571 (13)
iT i i
office land use. j =1 dij
4.4 Program designed for calculating the Where, GiW , GiS and GiT are trip volume(No. per
improved Lowry model day) to work trip, schooling trip and elastic trip of zone
Taking the adjustment factor calibrated from 4.2 i; PiW and PiS are population number of work and
section to Lowry model, one examines whether it's schooling; Pi and Ei are total number of population
superior or inferior to distribution function; the other
and total number of employment for zone i. The other
examines iterative convergence accuracy of the
variables are the same as the aforesaid ones.
improved Lowry model. The iterative calculation
process of Lowry model is realized by macro of Excel
loading, which is showed in figure 3 6 Case study
This paper takes the loan item,” Research on
transportation demand analysis of traffic foundation
facilities in Jinzhou city” from The World Bank in
Liaoning province, as an example to carry on a case
study.
In the process of transportation demand analysis,
the planning areas of Jinzhou city are totally divided
into 80 zones, and areas of different land use and
fundamental employees are ascertained from urban
overall planning.
Figure 3. Interface of Lowry model 6.1 Population and employee calculated
Carrying on a calculation to 50 traffic zones that
mentioned above and calculating way converge after First, according to Eq.(9),(10) and kinds of land use,
20 iterative times. The results show that accuracy of population adjustment factor and employment
population and employment for different zones that adjustment factor for each traffic zone can be
calculated by the Lowry model is very high; the calculated. Second, in view of the fact of Jinzhou city,
relative errors are 0.23% and-0.53%. take coefficient α, β, γ which are 4.4, 0.42 and 0.10
into the improvement Lowry model. The last,
5 Trip generation forecast model circulating this improved Lowry model to get
population and employment for each traffic zone in
First, trip production is divided into 3 types for 2010. The results are shown in table2.
different trip purpose: work trip, schooling trip and
elastic trip. Then, according to that trip production
Table 2. The number of population and employee computed
zone 1 2 3 4 5 …… 76 77 78 79 80 Total
Population(person) 6924 2415 6027 7591 3548 …… 4561 443 284 4415 598 830861
Employment(No.) 64 1248 1503 453 411 …… 205 19 12 69 22 188832
269
corresponding trip volume. The results of residential
6.2 Results of trip production trip production volume for different trip purposes in
From trip production forecast equation for different 2010 are shown in table 3.
trip purpose, we know that the model needs to be input
the number of work and schooling, and then it could 7. Summary
calculate trip volume related. The number of work and
schooling can be ascertained through multiplying The population and employment of the target year
population by a corresponding proportion. The ratio should be predicted firstly for the urban transportation
that employment and school number of a city in each demand analysis, especially to those new areas that we
year share the total number of population doesn’t float can’t obtain continuous historical population data and
greatly, and the float has no correlation with economic continuous historical employment data. In order to
index, which is shown in figure 4. (The data comes solve this problem, the main body of this paper does
from the statistics yearbook of Liaoning province in research on relationship between land use——
2005). population and employment distribution——residential
人均GDP(千元) 就业人数占总人数百分比 人均GDP(千元) 就学人数占总人数百分比 production trip volume by improving population
18
18
16
adjustment factor and employment adjustment factor of
16
14 14 the Lowry model; and also use genetic algorithm to
12 12 calibrate population adjustment factor and employment
10 10
8
adjustment factor, which determine the relationship of
8
6 6 population, employment adjustment factor and land
4 4 use. Based on these basic rationales, iterative process
2 2
0 0
of the improved Lowry model is realized by computer
1995 1996 1997 1998 1999 2000 2001 2002 2003 2004
年份
1995 1996 1997 1998 1999 2000 2001 2002 2003 2004
年份
programming, and the results predicted can be taken as
the fundamental data for trip production forecast. In
Figure 4. GDP, employment ratio and student ratio of view of case study, we can see this methodology can be
Jinzhou in recent 10 years effectively applied to the actual project and it gets high
Table 3. Production predicted for each trip purpose accuracy.
work trip school trip Elastic trip
zone Total
(No./day) (No./day) (No./day) 8. References
1 9400 3115 2553 15068
2 4062 1578 1417 7057
3 8338 2809 2521 13668 [1] GAO Feng and RONG Gang. "Parameter Rules in GA
4 10189 3342 2677 16208 and it’s Application in Analyzing an Instance of Model
5 5403 1964 1711 9078 Identification."Mechanical & Engineering Magazine, (2003),
…… …… …… …… …… 20(3), 31-33.
76 6602 2309 1912 10824
77 1727 906 730 3363 [2] LIU Chanqi. "Modern Transportation Planning." China
78 1539 852 750 3140 Communication Press, (2001), 63-66.
79 6430 2260 1875 10565
80 1911 959 821 3692 [3] SHI Fei, JIANG Wei. "Research on forecast method for
traffic creating based on characteristic of land utilizing."
In the case, employment ratio and student ratio take
China civil engineering journal, (2005), (3), 115-124.
the average value of the recent 10 years which are
45.21% and 16%. According to The total population [4] YANG Ming and QU Dayi. "Research on the
that obtained from 6.2 section computed, we can get Relationship between Urban Land Use and Traffic Demand."
employment and student number immediately. Taking Journal of Highway and Transportation Research and
the results into Eq.(11) and Eq.(12), we gain a Development, (2002), (2), 72-75.
270
2008 International Conference on Intelligent Computation Technology and Automation
f (x) = wT x + b (3)
where
Figure 1. To fit data points with a line, LS
l
method minimizes the sum of |ei |, while TLS |yi − wT xi − b|
method minimizes the sum of ri E(w, b) = ri2 , ri = √
i=1
1 + wT w
272
subject to
+ε
0 yi − ((w · xi ) + b) = ξi , i = 1, 2, · · · , l (13)
−ε
Where C is the chosen coefficient, ξ = [ξ1 , ξ2 , · · · , ξl ]T ,
ξ ξi (i = 1, 2, · · · , l) is the difference between the sample
points (xi , yi ) and the regression function f (x) = wT x+b.
1 ∗
l
|yi − wT xi − b|
min W (α, α∗ ) = (α − αi )(αj∗ − αj )xTi xj ri = √ , i = 1, 2, · · · , l (15)
2 i,j=1 i 1 + wT w
l
Where C is the chosen coefficient.
+ε (αi∗ + αi ) (9) For the convenience, we firstly introduce some notations,
i=1 let
l
l
1 ȳ 1 yi
− yi (αi∗ − αi ) a= , =
−w x̄ l xi
i=1
i=1
subject to ⎡ ⎤
l
l
yi2 yi xTi ⎥ 2
l
1⎢
⎢ i=1 i=1 ⎥ , K̄ = ȳ ȳx̄T
(αi∗ K̂ =
− αi ) = 0 (10) l⎣
l l ⎦ ȳx̄ x̄x̄T
i=1 yi xi xi xTi
i=1 i=1
0 ≤ αi , αi∗ ≤ C i = 1, 2, · · · , l (11)
K11 K1n
Where α = [α1 , α2 , · · · , αl ]T , α∗ = [α1∗ , α2∗ , · · · , αl∗ ]T K = K̂ − K̄ =
Kn1 Knn
are the Lagrange multiplier vectors of the corresponding
slack variables ξ, ξ ∗ . From this dual optimization pro- Where K11 is a number, K1n ∈ R1×(n−1) , Kn1 ∈
gramming, we can easily obtain the solutions of variables R(n−1)×1 , Knn ∈ R(n−1)×(n−1) . K is a symmetric ma-
w and b. Thus we get the regression estimate function trix, so KT1n = Kn1 .
f (x) = wT x + b. Thus
After that, many academicians presented a lot of kinds
support vector machines for regression. For example, l
1
B.Schölkopf et al proposed ν − SV M [14], J.A.K. Suykens E(w, b) = w2 +
C
(yi − wT x − b)2
2 T
2(1 + w w) i=1
et al introduced Least Square Support Vector Machine(LS-
SVM) [15], which is to solve the minimum as follows: l
2
1 C yi
= w2 + a T
− b
1
l
C 2 2 2(1 + wT w) xi
min E(w, ξ) = w2 + ξ (12) i=1
2 2 i=1 i (16)
273
We can obtain 14
dE(w, b) ȳ 12
4
y
ȳ
b = aT (18) 2
x̄ 0
−2
Taking (18) into (16), E(w, b) reads
−4
−6
−1 0 1 2 3 4
1 lC x
E(w, b) = w2 +
2 2(1 + wT w)
l T Figure 3. The 301 samples, which come from
1 T yi yi
× a a the model y = 2x + 1, are disturbed by the
l i=1 xi xi Gaussian noises.
T
T ȳ ȳ
−a a
x̄ x̄
step 1: For the given data points, to compute the
1 lC
= w2 + (aT K̂a − aT K̄a) derivative of the optimization objective with the parameter
2 2(1 + wT w) vector w;
1 lC step 2: For the given coefficient C, to solve the nonlin-
= w2 +
2 2(1 + wT w) ear equations F (w) = 0 by using the Newton method,thus
×(K11 − 2wT Kn1 + wT Knn w) we obtain the w;
step 3: To calculate b by taking the formula (18),thus
(19)
we obtain the regression model f (x) = wT x + b.
Let q(w) = K11 − 2wT Kn1 + wT Knn w. We can
seek the optimal w by taking the derivatives of the opti- 5. Experiment Simulations on Line Regression
mization objective with respect to the parameters w and set
them equal to the zero vector We generate an artificial data set S = {(xi , yi )|i =
1, 2, · · · , 301} which satisfies line function y = 2x + 1. On
this pure data set, both LS method and our presented TLS-
∂E(w, b) lC
= w+ (Knn w − Kn1 ) SVR method can give the perfect solution, and this simple
∂w 1 + wT w case is not considered here. Indeed,what we are interested
lCq(w) in is the case when Gaussian noise is added to S according
− w
(1 + wT w)2 to the following formulas:
lC(1 + wT w)
= w+ x = x + nx , y = y + ny
(1 + wT w)2 − lCq(w)
× (Knn w − Kn1 ) Where E(nx ) = 0, V ar(nx ) = 0.3, E(ny ) =
= 0 (20) 0, V ar(ny ) = 2 (see figure 3). Experiment simulations are
conducted on the noise sample set by using both LS method
If we introduce the notation and our presented TLS-SVR method.
1. LS: we firstly seek the solution of the noised data by
lC(1 + wT w)
F (w) = (Knn w − Kn1 ) + w using the standard LS method with a line model y = wx+b,
(1 + wT w)2 − lCq(w) where w, b are the parameters. We obtain w = 2.1508, b =
(21)
0.8716 (see Table 1, Figure 4).
thus we get
2. TLS-SVR: As mentioned in section 4, if we chosen
F (w) = 0 (22)
the parameter C(In this case, C = 0.0047), the method
Equation (22) denotes a nonlinear equations with respect to we proposed comes down to solve a nonlinear equations
vector variables w, thus we can get the solution by taking set, and we can take Newton method to obtain the solution:
the Newton method. According to the analysis as above , w = 2.0619, b = 1.0042.(see Table 1, Figure 4).
we get the following algorithm:
274
[4] S. Van Huffel, J. Vandewalle. Analysis and solution
14
Data points of the nongeneric total least squares problem. SIAM J. Ma-
12 Ideal
TLS−SVR LS
trix Anal. Appl. 9 (1988) 360-372.
10 LS [5] J. Leuridan, D. De Vis, H. Van Der Auweraer, F.
8 Lembregts. A comparison of some frequency response
6
function measurement techniques. in: Proceedings of the
Ideal Fourth International Modal Analysis Conference, 1986, pp.
4
Y
TLS−SVR
908-918.
2 [6] M. Levin, Estimation of a system pulse transfer func-
0 tion in the presence of noise. IEEE Trans. Automat. Con-
−2
trol 9 (1964) 229-235.
[7] K. Fernando, H. Nicholson, Identification of linear
−4
systems with input and output noise: the Koopmans-Levin
−6
−1 0 1 2 3 4 method. IEE Proc. D 132 (1985) 30-36.
X [8] R. Kumaresan, D. Tufts. Estimating the angles of ar-
rival of multiple plane waves, IEEE Trans. Aerospace Elec-
Figure 4. The line regression results by LS, tronic Systems 19 (1) (1983) 134-139.
TLS-SVR are visualized in comparison with [9] E. Dowling, R. Degroat. The equivalence of the to-
the ideal which is plotted as the solid line. tal leastsquares and minimum norm methods. IEEE Trans.
Signal Process. 39 (1991) 1891-1892.
[10] P. Wentzell, D. Andrews, D. Hamilton, K. Faber, B.
Kowalski. Maximum likelihood principle component anal-
ysis, J. Chemometrics 11 (1997) 339-366.
Table 1 [11] M. Schuermans, I. Markovsky, P. Wentzell, S. Van
w b E(w,b)
Huffel. On the equivalence between total least squares and
Ideal 2 1
maximum likelihood PCA, Anal. Chim. Acta 544 (2005)
LS 2.1508 0.8716 1.2284 × 103
254-267.
TLS-SVR 2.0619 1.0042 2.6763
[12] Vapnik, V.N.,Statistical learning theory. John Wiley,
New York(1998).
6. Conclusion [13] B.Schölkopf,A.J.Smona,K.R.Müller:Nonlinear
component analysis as a kernel eigenvalue problem.Neural
In this paper, we proposed a method to fit a set of data Comput.1998,10:1299-1319.
points with a linear modeling in total least square method [14] B.Schölkopf et al. New Support Vector Algorithm
sense. The new method for linear regression finally needs to Neural Computation 12,1207-1245 (2000).
solve a nonlinear equations by using Newton method. From [15] J.A.K. Suykens et al. Least Square Support Vector
the results of experiments, the algorithm is acceptable and Machine Classifier.(1999).
available. our proposed TLS-SVR outperforms the tradi- [16] Golub,G.,Van Loan,C.:Matrix computations.Johns
tionally used least square regression in our computer sim- Hopkings University Press(1983).
ulation. however, the new method just works on the linear [17] Vapnik, V., Chervonenkis, A. Theory of pattern
regression case, how to generalize this method to the non- recognition. Nauka: Moscow(1974).
linear modeling deserves further effort. [18] Boser, B. E., Guyon, I. M., Vapnik, V. N. A train-
ing algorithm for optimal margin classi.ers. In D. Haus-
References sler (Ed.), Proceedings of the 5th Annual ACM Workshop
on Computational Learning Theory (pp. 144C152). Pitts-
burgh, PA: ACM Press(1992).
[1] G. Golub, C. Van Loan. An analysis of the total least [19] Vapnik, V.N., The nature of statistical learning the-
squares problem. SIAM J. Numer. Anal. 17 (1980) 883- ory. New York: Springer- Verlag(1995).
893.
[2] Pearson,K.:On lines and plane of closest fit to sys-
tems of points in space. Phi.Mag. 1901,2:559-572.
[3] J. Staar. Concepts for reliable modelling of linear
systems with application to on-line identification of multi-
variable state space descriptions. Ph.D. Thesis, Department
EE, K.U. Leuven, Belgium, 1982.
275
Session 3
Control Theory
and Application
ICICTA 2008
2008 International Conference on Intelligent Computation Technology and Automation
280
3.1. A simplified algorithm complexities could further satisfy the real time control
requirement. The simplified algorithm in this paper
In the theory of predictive control, it uses output softens the input signals by constraining the rolling
reference trajectory to soften output. This method can optimization sequence of the controller and subtly
be extended in softening the input control actions. The avoids calculating the inverse matrix. And that could
characteristic of model predictive control lies in be easily discovered by comparing (19) and (23),
adopting rolling optimization strategy. So it is feasible (OI AT RA) in (19) is a matrix of the dimension MhM,
to soften the input signals by constraining the rolling and its inverse operation is very complex. However,
optimization sequence of the controller. It is hoped that ( A1T O A1 A2T RA 2 ) in (23), is just a scalar, since
the control increment tends to 0 smoothly in control
horizon (M) and has little change out of control A2 A A1 is a column vector of dimension Ph1, and
horizon. The adjustment is just in M steps. Based on its inverse operation is very simple, that is just taking
this, we put forward a design scheme to make the the reciprocal of a number. Compared to inversion
control increment u(t+j) (j=0, 1, 2,Ă, M) tend to 0 computation of matrix, it is obvious that this simplified
smoothly as demonstrated in the Figure1. It gives a algorithm reduces the computational load greatly.
clear vision of the changed tendency for u(t) as
expected. 4. Simulation study
This mode is used for the following simulations,
5
G ( s)
s 2 30 s 1
281
Generally, the simplified algorithm has the
advantages of less on line computation, steady output,
and small fluctuation of input and good control
performance.
282
input signals by constraining the rolling optimization
sequence of the controller. This simplified algorithm [3]Xi Yugeng, Predictive control, Press of China National
avoids complexities of calculating the matrix inversion Defense Industry, Beijing,1993.
and just needs to take the reciprocal of a number. The
[4]Zhang Qing Chen Zengqiang, “A simple algorithm of PI
simulation results demonstrate that this simplified generalized predictive self-adjusted controller” Journal of
algorithm is feasible and effective with the advantages Civil Aviation of China, 1998, 16(4):16-19.
of good control performance, less on line computation,
and good application prospect. [5]Chen Zengqiang, Che Haiping, Yuan Zhuzhi, “A
generalized predictive self-turning controller with proportion
6. References and integration structure”, control and
design,1994,9(2):105~110
[1] Culter C R, Ramaker B L, Dynarmc MatrixControl-A
Computer Control Algorithm ,Proc JACC, San- [6]Jin Yuanyu,”New generalized predictive control with
Francisco,l980 input constraints”, control and design, 2002, 17(4):506-508.
283
2008 International Conference on Intelligent Computation Technology and Automation
n −1
m
-φ ≤ s[ ∑ce
i =1
i i +1 + xd
( n)
+ f max + D] + sb( x , t )V (u )
n −1
Fig.1 Characteristic of dead zone = s[ ∑ce
i =1
i i +1 + xd
( n)
+ f max + D] + s sgn(s )b( x, t )V (u )
n −1
3. Controller design
≤ s[ ∑ce
i =1
i i +1 + xd
( n)
+ f max + D] − s b( x , t )m Δu
3.1. VSC controller design for the plant n −1
= − s ρ[ ∑ce
i =1
i i +1 + xd
( n)
+ f max + D] ≤ 0
Define the desired output as xd, then the tracking
error, e, as the difference between the plant output and So we can see that the system is asymptotically
desired output, that is stable.
e = x − xd = [e e&L e( n −1) ]T = [e1 e2 L en ]T (3) Obviously, if V(u)=u, the control input has not
A switching surface in the error space is defined as contain dead zone, control law (6) can be applied as
s( x, t ) = ce (4) long as m<1. Also, it is still valid to nonlinear
continuous control system (u0=0).
where c =[c1 c2 K cn−1 1] . s ( x, t ) is the weight sum of
error, with given initial state xd(0)=x(0), the problem 3.2. Aaptive neuro SMC controller design for
of tracking x≡xd is equal to system states reach sliding the plant
surface s=0, and then move along the sliding surface
all the time when t>0, s≡0 represent linear differential Sometimes, it is difficult or impossible to predictive
equation, pole assignment method can be used to work fmax, b(x,t) and D in practical control systems, and it
out the proper c, for the purpose of obtaining stable leads to dissatisfy the control law (6). Due to the
sliding modes. capability of approximating arbitrary nonlinear
Design sliding mode equivalent control Veq, assume
function, fmax, b(x,t) and D can be substituted by fˆ , b̂
that s&( x, t ) = 0 , i.e.
n −1 and D̂ which are the outputs of RBF neural networks,
s&( x , t ) = ce& = ∑c e
i =1
i i +1 − xd ( n ) + f ( x , t ) + b( x , t )V (u )) + d (t ) = 0 in order to deal with adaptive neuro SMC in the paper.
The structure of RBF neural networks is shown in
Thus Veq can be described as Fig. 2.
n −1
∑
1
Veq = [− ci ei +1 + xd − f ( x, t ) − d (t )]
(n) (5)
b( x , t ) i =1
The function of Veq is to ensure that system states
maintain it onto sliding surface, if the system initial
285
n −1
ss& = s(∑ ci ei +1 − xd + f ( x, t ) + b( x, t )V (u ) + d (t ))
(n)
h1
i =1
n −1
= s[ f ( x, t ) + d (t ) + ∑ ci ei +1 − xd ] + s[b( x, t ) − bˆ( x, βt ) + bˆ( x, βt )]V (u )
(n)
h2 i =1
x1 α f n −1
≤ s ( f max + D + ∑ ci ei +1 + xd ) + s[b( x, t ) − bˆ( x, βt )]V (u ) − s bˆ( x, βt ) m Δuˆ
(n)
i =1
β n −1
x2 b = s ( f max + D + ∑ ci ei +1 + xd ) + s[b( x, t ) − bˆ( x, βt )]V (u ) − s (1 + ρ )( fˆ ( x, αt )
(n)
i =1
n −1
xn γ d + dˆ ( x, γ t ) + ∑ ci ei +1 + xd
(n)
)
i =1
hm = s [ f max − fˆ ( x, αt )] + s[b( x, t ) − bˆ( x , βt )]V (u ) + s [ D − dˆ ( x, γ t )] − ρ s ( fˆ ( x , αt )
i n −1
+ dˆ ( x , γ t ) + ∑ ci ei +1 + xd )
(n)
j i =1
i =1
286
⎧(u − 0.2(
) 1.1 − 0.05e
cos 20 u
) u > 0.2
Case 1: ⎪
V (u ) = ⎨ 0 − 0.2 ≤ u ≤ 0.2 1
⎪(u + 0.2(
) 1.1 − 0.05e
cos 20 u
) u < −0.2
⎩ 0.8
Case 3: V (u ) = u 0.4
e1
The desired input signal x d = sin πt . The control 0.2
e2
nonlinearity input and the system without input
nonlinearity.
-10
0.8
case1
-15
0.6 case2 0 1 2 3 4 5 6
case3 t/s
0.4 Fig.4 Track error of control law (18)
e1
0.2
5. Conclusions
0
Acknowledgements
1 2 3 4
t/s
Fig.3 Track errors of control law (11) This work is supported by the National Natural
If the dead zone characteristic is neglected in the Science Foundation of China No. 50675204, and the
system containing a dead zone, one has the following Natural Science Foundation of Zhejiang Province of
controller China No. Y107605, and the Opening Foundation of
n −1
1+ ρ Zhejiang Province Top Disciplines of China No.
u = − sgn( s )
bˆ( x , β t )
[ ∑ce
i =1
i i +1 + xd
(n)
+ fˆ ( x , α t ) + dˆ ( x , γ t )]
IME200706-009.
(18)
The track error applied to case 1 is shown as Fig.4, References
from the simulation results, the traditional variable
structure controller cannot control an uncertain system [1] Merritt H. E. Hydraulic control systems, John-Wiley,
containing a dead zone to obtain the desired dynamics New York. 1967.
of the system.
287
[2] Oldenburger R. “Signal stabilization of a control system”. [7] Song Zuoshi, Yi Jianqiang, Zhao dongbin, “An adaptive
Trans. AIEE: Applications and Industry, vol. 78, 1959, pp. sliding mode control for a class of uncertain nonlinear
96-100 . systems based on neural networks”, Electric Machines and
[3] Kuo-Kai Shyu, Yun-Yao Lee. “Compensation and Control, vol. 9, no. 5, 2005, pp. 481-490.
control of dither-smoothed nonlinearities”, JSME [8] Chen Zengqiang, Lu Zhao, Yuan Zhuzhi, “Neural
International Journal, Series C, vol. 49, no. 2, 2006, pp. 512- Network Varying Structure Control For Nondeterministic
519. System”, Journal of Nankai University, vol. 34, no. 4, 2001,
[4] Xie Qi, Yang Maying, Zhang Junying, “Nonlinear pp. 48-52.
Predictive Functional Control with Dead Zone Pre- [9] Niu Yugang, Zhao Jiancong, Yang Chengwu, “Adaptive
compensation”, Control Engineering of China, vol. 10, no. 5, Neural Tracking Control of a Class of Nonlinear Systems”,
2003, pp. 466-468. Systems Engineering and Electronics, vol. 22, no. 12, 2000,
[5] Gang Tao, Kovotovic, P V. “Adaptive control of plants pp. 57-59.
with unknown dead-zone”, IEEE Trans on Automatic [10] M. Ertugrul, O. Kaynak, “Neuro sliding mode control of
Control, vol. 39, no. 1, 1994, pp. 59-68. robotic manipulators”, Mechatronics, vol. 10, no.1, 2000, pp.
[6] Ming Tian and Gang Tao. “Adaptive output dead-zone 239-263.
compensation”, Proceedings of the 36th IEEE Conference on
Decision and Control, San Diego, CA, 1997, pp. 1157-1161.
288
2008 International Conference on Intelligent Computation Technology and Automation
A
e Fuzzi f i cat i on
290
Table 1. Fuzzy inference rules
de
Δkp/Δki/Δkd NB NM NS ZO PS PM PB
3. Simulation results
Indoor CO2 level should have been measured by a
sensor. But if the controller can work well in the
simulation, it can work well too in the practical project.
Taking a residential house(Assume the room volume
V=60m3 , maximum fresh air volume Lmax =0.44m3/s)
for example, the measured indoor CO2 level is
influenced by a lot of respects, such as the precision
and position of the sensor , indoor pollution sources ,
(a) return air vent position , air flow form. It is difficult to
deduce the transfer function exactly linking fresh air
volume with the indoor CO2 level. The fuzzy PID
controller is now examined for its ability to control
linear system, and to evaluate its performance in
comparison with the corresponding conventional PID
controller. The system to be tested is a third-order
linear system with a transfer function as following.
K
G (s) = (2)
s ( s + 2ξωn + ωn 2 )
2
(b)
Where, ξ from 0.3~0.75, ωn =100, K =50000. For
this system, our best choice of continuous PID
controller gains ( ξ =0.3) are 0.4 for the proportional
term, 0 for the integral term, and 1.0 for the derivative
term. The sampling time is 1 ms and the desired set
point value is 1. The first plot ( ξ =0.3) shown in Fig.
5a presents the results from these two simulations. As
expected, both controllers produce excellent
trajectories. To investigate the robustness and dynamic
performance of the two controllers, the transfer
function G(s) is changed (ξ=0.45, 0.6, 0.75).
(c) Simulation results see Fig.5b,c,d. The fuzzy PID
controller reached the desired set point has an order of
Fig.4. Membership functions of kp/ki/kd. magnitude faster than the routine controller, implying
that the fuzzy PID controller is more robust in terms of
hitting the set point in a reasonable amount of time.
291
For fuzzy PID controller, kp/ki/kd vary with sampling
time (Fig.6a,b,c) in order to keep good control
performance.
(a) ξ =0.3
(a)
(b) ξ =0.45
(b)
(c) ξ =0.6
(c)
292
very great influence in the course regulating and [10] GU Xiao-song, WANG Han-qing, “Fuzzy control
simulation result, so, it should be paid more attention of fresh air in residential air conditioning system”,
to. Journal of Harbin Institute of Technology (New
The fuzzy PID controller derived in this paper Series), vol.14, 2007, pp.489-492.
successfully demonstrated better performance than the
conventional PID controller in such aspects as
precision, stability, dynamic performance. The fuzzy
PID controller is also able to tolerate many poor
selections or inadequate implementations of the
controller gains which would make most conventional
controllers unstable. Since nonlinearity will be
encountered in many complex systems, such as VAV
air conditioning system, the ability of the fuzzy PID
controller to tolerate these nonlinear and gain-value
variation factors is a substantial improvement over
conventional linear PID controllers.
5. Acknowledgement
6. References
[1] Petr Hájek, “What is mathematical fuzzy logic”,
Fuzzy Sets and Systems, vol.157, 2006, pp.597-603.
[2] Mendel, “Fuzzy logic systems for engineering”, a
tutorial Proc IEEE, vol.83, 1995, pp.345–77.
[3] Fumio Matsuoka, “Refrigerating air conditioning
fuzzy control technique”, Japanese Refrigeration
Institute Transaction, vol.8,1991, pp.149-155.
[4] Jili Zhang, Dexing Sun, “Study on the fuzzy
control of the comfortable air-conditioning
system”, Refrigeration Journal (P.R.C), vol.3,
1996, pp. 37~44.
[5] Jili Zhang, Jinping Ou, Dexing Sun, “Study on
fuzzy control for HVAC system Part one:
Functioning fuzzy-subset Inference and
development of single-chip fuzzy controller”,
ASHRAE Transactions, vol.109, 2003.
[6] Jili Zhang, Dexin Sun, “Design of a microprocessor
controller for fan-coil units”, HVAC (P.R.C),
vol.27, 1997, pp.39~41.
[7] Haissig, “Adaptive fuzzy temperature control for
hydronic heating systems”, IEEE Control Systems
Magazine, vol.20, 2000, pp. 39~48.
[8] Gouda, S.Danaher, “Quasi-adaptive fuzzy heating
control of solar buildings”, Building and
Environment, vol.41, 2006, pp.1881-1891.
[9] Mateja, “Fuzzy control for the illumination and
temperature comfort in a test chamber”, Building
and Environment, vol.40, 2005, pp.1626-1637.
293
2008 International Conference on Intelligent Computation Technology and Automation
where the coupling term z1 z2 will be canceled in the where U i ( Z i ) = U i −1 ( Zi −1 ) + zi f i ( xi +1 ) − αi −1 and
next step. T
Z i = xi +1 , yr , y r ," , yr( ) .
i −1
295
When i = n − 1 , (20) can be rewritten as εˆ = −εˆ + γ zn (30)
n −1
Vn −1 = −∑ k j z 2j + z n −1 zn + U n −1 ( Z n −1 ) (21) Using (29), the following inequality is true
j =1 1 T
W Wˆ − Γz S ( Z ) = −W T Wˆ = −W T W + W *
( )
Step n : the practical control input u will be Γ n n
constructed. = −W T W + W T W *
When zn = 0 , let u = 0 . Then it is achieved to make
1 1
zn as small as possible. In the following, we give the ≤ − W T W + W * (31)
2 2
design procedure in the case where zn ≠ 0 . Using (30) and Assumption 1, the following inequality
The time derivative of zn is is true
zn = xn − α n −1 = f n ( xn ) + u − α n −1 εˆ 2 zn2 εˆ 2 zn2
zn ε * ( Z n ) − ˆ ≤ zn ε −
+ εε ˆ
+ εε
The above equation can been changed as εˆ zn + τ εˆ zn + τ
U (Z ) εˆ 2 zn2
zn = u + U n ( Z n ) − n −1 n −1 (22) = zn εˆ −
εˆ z n + τ
1
γ
(
+ ε εˆ − γ zn )
zn
where U n ( Z n ) = f n ( xn ) − α n −1 + U n −1 / zn . ≤ τ − εε
ˆ = τ − ε 2 − εε
In the following we will use the FLS to approximate 1 1
≤ τ − ε 2 + ε 2 (32)
unknown function U n ( Z n ) , then, U n ( Z n ) written as 2 2
Substituting (21) and (31)-(32) into (28), we obtain
U n ( Zn ) = W *S ( Zn ) + ε * ( Z n ) (23) n
1 1 1 1
Vn ≤ −∑ k j z 2j − W T W − ε 2 + ε 2 + W * + τ (33)
where W is the optimal weight vector, and ε ( Z n )
* *
j =1 2 2 2 2
denotes the minimal approximation error to be So far, the design procedure is finished. Then we
bounded by constant ε . Ŵ and εˆ will be used to obtain the following controller
estimate W * and ε , respectively. Let W = Wˆ − W *
and ε = εˆ − ε . u = 0, when z n = 0
Substituting (23) into (22), we get
u = − zn −1 − kn zn − Wˆ S ( Z n )
T
(34)
U (Z )
zn = u + W * S ( Z n ) + ε * ( Z n ) − n −1 n (24) εˆ zn
2
zn − , when zn ≠ 0
εˆ zn + τ
Construct the following actual controller
εˆ 2 zn The following theorem shows the stability of the
u = − zn −1 − kn zn − Wˆ T S ( Z n ) − (25) closed-loop system and the control performance.
εˆ zn + τ
Theorem 1. Under the assumption 1, let yr ( t ) be a
Consider the following Lyapunov function candidate
bounded reference signal for all t ≥ 0 . Consider the
1 1 T 1 2
Vn = Vn −1 + zn2 + W W + ε (26) systems consisting of (1). By constructing the virtual
2 2Γ 2 controller α i , i = 1," , n − 1 and the actual controller u ,
where Γ is adaptation gain matrix.
The time derivative of Vn is the weight adaptation law Ŵ , then, it can be
guaranteed that all the signals of the systems are
1
Vn = Vn −1 + zn zn + W T Wˆ + εε ˆ (27) uniformly bounded and the tracking error converges to
Γ a small neighborhood of zero by suitably choosing the
Substituting (24) and (25) into (27), it is obtained that design parameters.
Vn = Vn −1 − zn −1 zn − k n zn2 + zn ε * ( Z n ) Proof: This proof will follow the quite standard
εˆ 2 zn2 1 stability analysis techniques of NN based on adaptive
− ˆ − U n −1 ( Z n −1 )
+ εε control as can be found in [7-11]. From (6), (11), (17)
εˆ zn + τ 2 and (26), we obtain
+ W T Wˆ − Γzn S ( Z n )
1 n
1 1 T 1 2
(28) Vn = ∑ z 2j + W W + ε (35)
Γ j =1 2 2 Γ 2
Choose the following adaptation law (33) can be rewritten as follows
Wˆ = −ΓWˆ + Γz S ( Z ) n n (29) Vn ≤ − µVn + δ (36)
296
where µ = min ( 2ki , λmin ( Γ ) ,1) , λmin ( Γ ) is minimal where x1 and x2 are states, and y is the output of the
1≤ i ≤ n
systems. The initial conditions are x1 ( 0 ) = 1, x2 ( 0 ) = 0
eigenvalue of Γ , δ = 1 ε 2 + 1 W * + τ .
2 2 and the desired reference signal is yr = cos ( t ) / 2 .
The process of proof is similar to that of the theorem
1 in [12-14]. Using (35), we conclude that
zi , i = 1," , n and Wˆ , εˆ are bounded.
4. Simulation µ A ( x1 ) = exp(−( x1 ) 2 )
2
1
µ A ( x1 ) = exp(−( x1 + 0.5)2 )
3
In this section, simulation experiment is presented to 1
as µ A ( x2 ) = exp(−( x2 )2 )
2
2
x2 = x1 x2 + 2 cos( x1 ) + u,
2
(37)
y = x ,
1
297
The design parameters are chosen as γ = 10,τ = 0.1,
[1] L. X. Wang, “Fuzzy systems are universal approximators,”
Γ = diag ( 2, 2 ) , k1 = 5, k 2 = 15 . The initial value of the IEEE International Conference on Fuzzy Systems, San Diego,
CA, USA, pp. 1163-1170, Mar. 1992.
adaptive parameters are defined as Wˆ ( 0 ) = 0, [2] L. X. Wang, “Stable adaptive fuzzy control of nonlinear
εˆ ( 0 ) = 0 . systems,” IEEE Trans. Fuzzy Systems., vol. 1, no. 1, pp. 146–
155, Jan. 1993.
[3] B. S. Chen, C. H. Li, and Y. C. Chang, ‘‘H∞ tracking design of
uncertain nonlinear SISO systems: Adaptive fuzzy approach,’’
IEEE Trans. Fuzzy Syst., vol. 4, no. 1, pp. 32---43, Feb. 1996.
[4] D. V. Diaz and Y. Tang , “Adaptive robust fuzzy control of
nonlinear systems,” IEEE Trans. Systems, Man, and
Cybernetics-Part B: Cybernetics, vol. 34, no. 3, pp. 1596-1601,
Jun. 2004.
[5] S. C. Tong and H. X. Li, ‘‘Fuzzy adaptive sliding model
control for MIMO nonlinear systems,’’ IEEE Trans. Fuzzy
Systems, vol. 11, no. 3, pp. 354---360, Jun. 2003.
[6] S. C. Tong, B. Chen and Y.F. Wang, “Fuzzy adaptive output
feedback control for MIMO nonlinear systems,” Fuzzy Sets and
Systems, vol. 156, no. 2, pp. 285–299, Dec. 2005.
[7] W. Y. Wang, M. L. Chan, T.T. Lee, C.H. Liu, “Adaptive Fuzzy
Control for Strict-Feedback Canonical Nonlinear Systems with
H∞ Tracking Performance,” IEEE Trans. Systems, Man, and
Cybernetics-Part B, vol. 30, no. 6, pp. 878-885, Dec. 2000.
[8] Y. S. Yang, G. Feng and J. S. Ren, “A combined backstepping
and small-gain approach to robust adaptive fuzzy control for
Fig. 5. The adaptation law εˆ strict-feedback nonlinear systems,” IEEE Trans. Systems, Man,
and Cybernetics-Part A: Systems and humans, vol. 34, no. 3,
Figs. 1-5 show the simulation results which are pp. 406–420, May. 2004.
obtained by applying the previous scheme to the [9] Y. S. Yang and C. J. Zhou, “Robust adaptive fuzzy tracking
control for a class of perturbed strict-feedback nonlinear
system (37) for tracking the reference signals systems via small-gain approach,” Information Sciences, vol.
yr = cos ( t ) / 2 . The tracking performance is good, as 170, no. 2, pp. 211–234, Feb. 2005.
[10] M. Wang, B. Chen, S. L. Dai, “Direct adaptive fuzzy tracking
shown in Figs. 1 and 2. From Fig. 3, it can be seen that control for a class of perturbed strict-feedback nonlinear
the boundedness of the controller u . Figs. 4 and 5 systems,” Fuzzy sets and systems, vol. 158, no. 24, pp. 2655-
2670, Dec. 2007.
illustrate that the adaptation parameters Ŵ and εˆ are [11] M. M. Polycarpou, “Stable adaptive neural control scheme for
nonlinear systems,” IEEE Trans. Automat. Contr., vol. 41, no.
bounded. 3, pp. 447–451, Mar. 1996.
[12] M. M. Polycarpou and M. J. Mears, “Stable adaptive tracking
5. Conclusion of uncertain systems using nonlinearly parametrized on-line
approximators,” Int. J. Contr., vol. 70, no. 3, pp. 363–384, Jun.
1998.
A stable adaptive fuzzy control approach for [13] D. Wang and J. Huang, “Adaptive neural network control for a
uncertain nonlinear strict-feedback systems is class of uncertain nonlinear systems in pure-feedback form,”
proposed. The control input and the adaptation law are Automatica, vol. 38, no. 8, pp. 1365–1372, Aug. 2002.
[14] C. Wang, D. J. Hill, S. S. Ge and G. R. Chen, “An ISS-modular
obtained using Lyapunov synthesis approach. Overall approach for adaptive neural control of pure-feedback
control scheme is achieved by utilizing only one FLS. systems,” Automatica, vol. 42, no. 5, pp. 723–731, May. 2006.
The running cost is reduced and the controller has the [15] H. B. Du, H. H. Shao and P. J. Yao, “Adaptive neural network
simple structure. control for a class of low-triangular-structured nonlinear
systems,” IEEE Trans. Neural Networks, vol. 17, no. 2, pp.
509–514, Mar. 2006.
6. References
298
2008 International Conference on Intelligent Computation Technology and Automation
∧ y (t + j ) = f (t + j ) + G j Δu (t + j − 1) (8)
y (t + j ) is predictive system output correction value With the functions
in future P steps. w(t + j ) is given as a set value e(t + j) = [w(t + j) − f (t + j)] − Gj Δu(t + j −1), j = 1,2,", N
soften sequence from Δe(t + j) = [Δw(t + j) −Δf (t + j)] −[Gj Δu(t + j −1) − Gj Δu(t + j − 2)]
w(t ) = y(t ), j = 2,", N
w(t + j ) = α w(t + j − 1) + (1 − α ) yr (t ), (3) Δe2 (t + j) = [Δ2 w(t + j) − Δ2 f (t + j)] − [G j Δu(t + j −1) −
j = 1,", N 2Gj −1Δu(t + j − 2) + Gj −2Δu(t + j − 3)], j = 3,", N
Where yr (t ) is the set value on t time, α (0 ≤ α < 1) Vector and matrix are introduced to facilitate the
derivation
is soften factor. Assume that
∧ w = [ w(t + 1)," , w(t + N )]T
e(t + j ) = w(t + j ) − y (t + j ) Δw = [ w(t + 1), Δw(t + 2)," , Δw(t + N )]T
j = 0,1," , N Δ2w = [w(t +1), Δw(t + 2) − w(t +1), Δ2w(t + 3),", Δ2w(t + N)]T
Thus the performance index can be expressed as
N Nu f = [ f (t + 1)," , f (t + N )]T
J = ∑ e(t + j ) + λ ∑ [+u (t + j − 1)]
2 2
(4) Δf = [ f (t + 1), Δf (t + 2)," , Δf (t + N )]T
j =1 j =1
Add PID parameters in this algorithm, a new PIDGPC
Δ2 f = [ f (t +1), Δf (t + 2) − f (t +1), Δ2 f (t + 3),", Δ2 f (t + N)]T
objective function can be obtained e = [e(t + 1)," , e(t + N )]T
N
J = ∑{Ki [e(t + j)]2 + Kp[+e(t + j)]2 + Kd [+2 e(t + j)]2} Δe = [e(t + 1), Δe(t + 2)," , Δe(t + N )]T
j =1 (5)
Nu
Δ2e = [e(t +1), Δe(t + 2) − e(t +1), Δ2e(t + 3),", Δ2e(t + N)]T
+λ∑[+u(t + j)]2 U = [Δu (t )," Δu (t + NU − 1)]T
j =1
e (t ) = Δ e ( t ) = 0 ⎡ g0 0 " 0 ⎤
∧ ⎢ g g0 % # ⎥⎥
e(t + j ) = w(t + j ) − y (t + j ) ⎢ 1
Where K p K i K d are the coefficients of proportion,
Gi = ⎢ # g1 % 0 ⎥
⎢ ⎥
integral and differential respectively. To facilitate the ⎢ g N −2 # % g0 ⎥
−1
) = 1 , introduce a set ⎢ g N −1 g N −2 " g N − Nu ⎥⎦
derivation, we can assume C ( q ⎣ N × Nu
of Diophantine equations
1 = E j (q −1 ) AΔ + q − j Fj (q −1 )
(6)
E j B = G j + q− j H j
300
⎡ g0 0 " 0 ⎤ 3. Simulation and analysis
⎢ g −g g0 % # ⎥
⎢ 1 0 ⎥ Model Transfer Function is
Gp = ⎢ # g1 − g0 % 0 ⎥ G ( s ) = 1 /( s + 1)(3 s + 1)(5 s + 1)
⎢ ⎥
⎢ g N−2 −gN −3 # % g0 ⎥ We make Periodic Sampling T=1, the model is
⎢ gN −1 − gN −2 gN −2 − gN −3 " gN −NU − gN −NU −1 ⎥⎦ dispersed by
⎣ N×Nu
⎡ g0 0 " 0 ⎤
G(q−1) = (0.0077q−1 + 0.0212q−2 + 0.0036q−3 )/
⎢ ⎥
⎢ g1 − 2g0 g 0 % # ⎥ (1−1.9031q−1 +1.1514q−2 −0.2158q−3 )
Gd = ⎢ g2 −2g1 +g0 g1 −2g0 % 0 ⎥ Using step input and least squares identification,
⎢ ⎥
# # %
⎢ g0 ⎥ with na = 1 , nb = 1 ,the identification model can be
⎢gN−1 −2gN−2 + gN−3 gN−2 −2gN−3 +gN−4 " gN−Nu −2gN−Nu−1 +gN−Nu −2 ⎥⎦
⎣ N×Nu written as
As gi is the coefficient of q − i in G j (q −1 ) , we can G0 (q−1 ) = (0.0419q−1 + 0.0719q−2 ) /(1− 0.8969q−1 )
obtain There are comparisons between PIDGPC algorithm
e = w − f − GU
i
and GPC algorithm in figure 1 and figure 2, with
Δe = Δw − Δf − GPU Nu = 3 , N = 3 , α = 0 , λ = 5 , Ki = 0 ,
K P = 9 , K d = 5 in figure 1 and N u = 3 , N = 3
Δ 2 e = Δ 2 w − Δ 2 f − GdU
The new objective function is , α = 0.8 , λ = 5 , K i = 8 , K P = 12 ,
J = Ki eT e + K p ΔeT Δe + Kd Δ2eT Δ2e + λU TU (9) K d = 2 in figure 2.From the two figures, we can see
Assume ∂J / ∂U = 0 ,then simplify it, the result can that by adjusting parameters, the advanced PIDGPC
be represented as algorithm does better in restraining overshoot
suppression, fast tracking system, improving the
Δu(t) = R p (Δw−Δf ) + Ri (w− f ) + Rd (Δ2w−Δ2 f ) (10) dynamic performance and maintaining the stability of
Where system comparing with basic GPC algorithm.
Then we can test the influence of each parameter
Rp = e1T (λI + KpGTp Gp + KG T T −1
i i Gi + Kd Gd Gd ) KpGp
T
over the system by adjusting them. In figure 3, output
Ri = e1T (λI + KpGTp Gp + KiGiT Gi + Kd GdTGd )−1 KiGiT curves of system are given with different values of K i ,
Rd = e1T (λI + KpGTp Gp + KG T T −1
i i Gi + Kd Gd Gd ) KdGd
T
where Nu = 3 , N = 3 , α = 0 , λ = 5 ,
e1T = [1, 0," , 0]TNu ×1 K P = 12 , K d = 2 . With the value increase of K i ,
We use a matrix to simplify the formula the system dynamic performance is enhanced and
response speed is increased. But overshoot is also
⎡1 0 0 " 0⎤
⎢−1 1 increased and stability of system is decreased.
⎢ 0 % # ⎥⎥ In figure 4, output curves of system are given with
S = ⎢ 0 −1 1 % 0 ⎥ different values of K p , where N u = 3 , N = 3 ,
⎢ ⎥
⎢ # % % % 0⎥
α = 0 , λ = 1 , Ki = 8 , K d = 2 . With the value
⎢⎣ 0 " 0 − 1 1 ⎥⎦
Results can be obtained increase of K p , the system dynamic performance is
G p = SGi , Gd = S Gi , Δw = Sw ,
2 enhanced and response speed is increased. But
overshoot is also increased, which affects the stability
Δ 2 w = S 2 w , Δf = Sf , Δ 2 f = S 2 f , of system.
Using the equation
Ω = K i I + K p S T S + K d ( S 2 )T ( S 2 )
We can see
Δu (t ) = e1T (λ I + GiT ΩGi ) −1 GiT Ω( w − f ) (11)
301
Figure 1. Comparison of PIDGPC and GPC Figure 4. Influence of Kp on system output
4. Conclusion
On the basis of generalized predictive control, we
unify the PID control method to form a new predictive
Figure 3. Influence of Ki on system output control algorithm by changing objective function,
enable it has generalized structural feature of
proportion (P), integral (I), and the derivative
(D).There is also a certain similarity between the
parameter setting and the conventional PID parameter
variation. We can see from the above simulation
302
testing: Comparing with GPC, PIDGPC may [5]. C Lu and C Tsai. “Generalized Predictive Control using
effectively restrain overshoot, have a better dynamic recurrent fuzzy neural network for industrial
performance and quicker system tracking by processes,” Journal of Process Control, 2007, vol.17,
no.1, pp.83-92.
adjusting K i , K p , K d parameters properly. It is [6]. Y. LIU, “Nonlinear Predictive PID Control Based on
more precise, robust, stable and suites industrial Neural Networks,” Control Theory and applications,
applications for improving the industrial quality. 2003, vol.9, no.22, pp.19-20.
[7]. Y Kansha, L Jia and M Chiu. Self-Tuning PID
Controllers based on the Lyapunov approach.
5. Acknowledgment Chemical Engineering Science, 2008.
[8]. L WANG, “PID feedback correction strategy
This work is supported by the National High-Tech overcoming model parametric mismatch of GPC,”
Research and Development (863) Program of China Journal of Zhejiang university of technology, 2005,
(No.2006AA040308) and the Research Fund of vol.33, no.3, pp.266-267.
Nanjing University of Information Science and [9]. K. Tan, S. Huang, “Development of a GPC-based PID
controller for unstable systems with dead time,”
Technology (No.20070089).
Transactions, 2000, vol.1, no.39, pp.57-70.
[10]. Z. CHEN, H. CHE and Z. YUAN, “Generalized
6. References Predictor and Self-Corrector Control with P I
Structure,” Control and Decision, 1994, vol.2, no.9,
[1]. S. LI, Computer Control Basic. Hefei: University of pp.106-108.
Science and Technology of China Press. 2001. [11]. F. WANG, Z. CHEN and X.YAO, et al, “Frequency-
[2]. W WANG, Generalized Predictive Control theory and domain-based Robustness Analysis for PID
its applications. Science Press. 1998. Generalized Predictive Control,” Engineering Science,
[3]. D. Clarke, C. Mohtadi and p. Tuffs, “Generalized 2006, vol.8, no.10, pp.66-70.
Predictive Control: Part 1 and Part 2,” Automatica, [12]. P. ZHANG, B. QU. “Generalized Predictive Self-
1987, vol.1, no.23, pp. 137-160. tuning PID Controller for Non-minimum Phase
[4]. M. Xu and S. Li, “Practical generalized predictive Systems,” Control Theory and Applications, 2004,
control with decentralized identification approach to vol7, no.23, pp.15-18.
HVAC systems,” Energy Conversion and Management,
2007, vol.1, no.48, pp.292-299.
303
2008 International Conference on Intelligent Computation Technology and Automation
Analysis of Vehicle Rotation during Passage over Speed Control Road Humps
θ m B , ρΛ ⎛1 0 ⎞ ⎛ 0 1⎞ ⎛x ⎞
⎜⎜ ⎟⎟ ∂ t y = ⎜⎜ ⎟⎟ y + E ⎜⎜ 2 F ⎟⎟
ˆ
⎝0 M ⎠ ⎝K C⎠ ⎝ x2 R ⎠
l1F x1F x1R l1R Mˆ = diag (M ρΛ m F mR ) , (4)
T
⎛ 0 " 0 ϕ2F 0 ⎞
mF mR E = ⎜⎜ ⎟⎟
⎝ 0 " 0 0 ϕ2R ⎠
l2 F
x2 F x2 R l2 R Taking the Laplace transform of Eq. (4) and solving
for the states Y we obtain (Φ n ≡ k n + scn ) ,
⎜ al −a l −a l1F +a l1R
2 2
− al1F a l1R ⎟ ⎜ ⎜ ⎟⎟ . (6)
L = ⎜ 1F 1R . (1) ⎝ ⎝ v ⎠⎠
l1F − al1F −l1F −l2 F 0 ⎟ = (0 1 0 " 0)
⎜ ⎟ P
⎜ l −l1R −l2 R ⎟⎠
⎝ 1R a l1R 0
For convenience, each subsystem may be defined by its
When used for the spring (damping) constants resonance frequency ω n and relative damping ζ n ,
l n = k n (ln = cn ) , the matrix will be denoted K (C ) .
kn cn
As the vehicle moves, local vibrations will scatter into ωn = ~ ζn = ~
the entire vehicle since the matrix is non-diagonal. This m n 2 knm
( )
n
is the mechanism behind the excitation of the whole ~
m = mB ρ + a 2 2 ~
m = mF . (7)
1F 2F
vehicle as it moves along the road. The equations of
motion are Newton’s force and torque laws,
~
m 1R = mB (ρ 2
+a 2
) ~
m 2R = mR
∑f n
kn = mk ∂ t2 xk 2.2. Digital filtering for vehicle response
μ kn . (2)
∑ n Λ
= ρ 2 mB ∂ t2 (Λθ ) The vehicle is will here be realized as a digital
‘vehicle filter’, synthesized to have the frequency
response derived in section 2.1. The often preferred
where ∂ t is the time-derivative while f kn and μ kn mapping technique [8] will be applied. First, the
represent the n-th force and torque. The spring and transfer function (Eq. 6) is written in terms of zeros
damping forces of the model equal − kΔx and −c∂ t Δx (~z k ) and poles ( ~p k ) in the continuous time Laplace s-
for a contraction Δx , respectively. Finding the plane,
solution is facilitated by a transformation of Eq. 2 to a
305
∏ (1 − s ~z )
Hθ (s ) = .
k
(8)
0.04
∏ (1 − s ~p ) k 0.02
BUS: θ Λ
0
These poles and zeros are then transformed to the
-0.02
discrete time z-plane with the exponential conformal
-0.04
mapping, 0 5 10 15 20
q = exp(q~ f ), q = z , p .
Distance (m)
k k S (9) k k k 0.04
CAR: θ Λ
4 0
( z−z ) 4
(1− p )
∑b z 4 k
k
-0.02
5 km/h
G (z ) = ∏
30 km/h
(1 − z ) ∏ (z − p )
k =0
θ
k
≡ k
4
. (10) -0.04
60 km/h
k =1 k
∑a z k =1 k
k =0
k
k 0 5 10
Distance (m)
15 20
m B m F−1 m R−1
0.1
a 0.40 0.60 0.05
ρ 0.25 0.35 0
-0.05
Λ 3m 7m -0.1
15 km/h
Q-value [5]. The center-of-mass differs since the 0.1 30 km/h
engine often is placed in the front in cars but in the rear 0.05
45 km/h
For the transient excitations caused by any localized Fig. 4 Auto-correlation of impulse responses.
road disturbance it is convenient to study the impulse Evidently, a critical hump length for both vehicles is
responses of the vehicles as functions of distance. given by the axle separation (minimum at the vertical
Their variation with speed is the operating principle of lines), which is the ‘static’ result. There is only the
road humps. The impacts of the front and rear axles (static) shallow minimum of correlation for the car but
separated by Λ are easily identified, see Fig. 3. several minima for the bus: For a short lag/hump
length around 2 m the rotation is really strong if
v = 30 km/h . This is likely caused by the stiffness of
the bus which induce oscillations around 2 Hz or a
wavelength of about 5 m – when the front axle has
306
traveled this distance from the rear side of the hump, max θ Λ CAR = 0.1 is increased to 0.132 due to each
the rear axle hits its front side and maximum
passage over the front and rear ends of the hump, as
constructive interference results. If v ≈ 15 km/h , the
can be seen for the 20 m hump. The combined
correlation is increased to maximum (Fig. 4) and the
rotation is reduced. Alternatively, if the velocity is excursion is further increased to max θ Λ CAR = 0.173 .
exceedingly low, typically v ≤ 5 km/h , the 2 Hz Passing the hump at the speed limit instead of very
oscillation triggered by the front axle passing the rear slowly thus gives 70% larger rotation of the car. For
hump side has had time to disappear before the rear Ω = Λ CAR , max θ BUS ≈ 0.4 max θ CAR . Increasing the
axle receive the front hump pulse. The hump length
length to Ω = 20m > ΓBUS , the bus rotation is reduced
then exceeds the correlation length of the impulse
response function (Γ ) , estimated as the maximum lag from max θ Λ BUS = 0.175 to max θ Λ BUS = 0.148 .
for which the correlation function is ‘substantial’. The variation of the response with velocity is the
A possible road hump design is to avoid less fundamental operating principle of road humps. A
predictable interactions originating from the two sides ‘dynamic’ design of the hump for buses is, according
of the hump. A static analysis would yield a hump to Fig. 4, to use a length Ω = 4.5 m : For this lag the
length Ω ≥ Λ . The dynamic correlation length impulse response has minimum correlation for
increases with velocity and is typically 2Λ . Typically, v = 20 km/h but maximum for v = 30 km/h . The
the road hump should be around 15 m for the studied rotation should thus be more violent for the lower than
bus and 6 m for the car, if the speed limit is 30 km/h . the larger speed, which is also confirmed in Fig. 6. At
This is almost twice as long as the recommended v = 5 km/h the bus is able to follow the hump profile.
length Ω ≥ 8 - 10 m for bus passage in Sweden.
0.15
0.1
For buses with large overhang and the engine in the
BUS: θ Λ
0
rear, the distance between the driver’s seat and the
center-of-mass is comparable to the axle separation.
-0.1
-0.2
The acceleration, in units of g = 9.81 m/s 2 , the driver
0 5 10 15 20 25 30 35 40
Distance (m) Ω=ΛCAR=3 m
will be exposed to is then of the order of ∂ t2θ Λ . The
0.2 Ω=ΛBUS=7 m limit of acceptable acceleration is around 0.1g . Here it
0.1 Ω=ΓBUS=20 m may be much larger, see Fig. 7.
CAR: θ Λ
-0.1
-0.2
0 5 10 15 20 25 30 35 40
Distance (m)
307
acceleration than the drivers of cars – a road hump
0.8
designed for a speed limit of v = 30 km/h for cars may
5 km/h
10 km/h result in a maximum speed for acceptable acceleration
0.6 30 km/h due to rotation in buses of only about v = 10 km/h .
0.4
BUS: ∂t θ Λ/g
0.2
5. Acknowledgment
2
acceleration with a soft suspended seat. [3] J. P. Hessling, P. Y. Zhu, D.S. Liu, “Optimal road hump
Rotation is likely not nearly as fatal for cars. The for comfortable speed reduction”, 4th ISPMM’ 2008,
distance between the seat and center-of-mass is usually International Symposium on Precision Mechanical
a small fraction of the axle separation. This implies Measurements, Anhui, China, Aug. 25-29, 2008.
that the drivers and passengers will be exposed to an
[4] http://www.dynamicmeasurementsolutions.com/Articles/
angular acceleration much less than ∂ t2θ Λ . The imacXXVI230__BRA.pdf
threshold velocity for acceptable angular acceleration
might be well above the speed limit. [5] K. Ahlin, J. Granlund, and R. Lundström, Whole-body
Vibration When Riding on Rough Roads – A shocking Study,
Swedish National Road Administration, Vol. 31E, 2000.
4. Conclusion http://www.vv.se/filer/skakstudie.pdf.
A method to study the rotation of vehicles passing [6] ISO 2631-5: 2004 Evaluation of the Human Exposure to
over speed control road humps has been proposed. The Whole-Body Vibration, Geneva: International Standard
hump may either be made for the interference between Organization, 2004.
the responses when the vehicle hits its front and rear [7] J. P. Hessling, “Dynamic calibration of uni-axial material
sides, or be of sufficient length to avoid it. Simple testing machines”, Mech. Sys. Sign. Proc., 22 No. 2, 2008,
criteria for both alternatives have been proposed. To pp. 451-466.
avoid interference, the hump length Ω should exceed
the correlation length of the angular vehicle impulse [8] Chen Chi-Tsong, Digital Signal Processing, New York:
response. This length was found to be around twice the Oxford University Press, 2001.
axle separation Λ . The recommended static estimate [9] http://www.vti.se/epibrowser/Webbdokument/Transportf
Ω ≥ Λ may thus result in strong interference and orum/TP-
unpredictable rotation. f%C3%B6redrag%202008/24%20Test%20av%20befintliga
The principal differences between buses and %20Granlund.pdf
personal cars were also explored. At the same speed,
the drivers of buses may experience a much larger
308
2008 International Conference on Intelligent Computation Technology and Automation
)
−1 T
(
2 2 2
Δ e ( k +1 ) = Δ Y ( k +1 ) − Δ Yˆ ( k + 1 )
the first row of the matrix A2T QA2 + R A2 Q , d 0 (6)
− ⎡⎣ A 2U ( k ) − 2 A2U ( k −1 )+ A2 U ( k − 2 ) ⎤⎦
T
Yˆ0 ( k +1)= Ap Xˆ ( k )= ⎡⎣ xˆ2 ( k ), xˆ3 ( k ),", xˆ p +1( k ) ⎤⎦ , To facilitate the derivation, vectors and matrixes are
⎡ h1 0 " ⎤
0 introduced as follows:
⎢ h ⎥ T
⎢ 2 h1 % #
⎥ Yd = ⎡⎣ yd ( k +1),", yd ( k + P ) ⎤⎦ ,
⎢ # % % 0 ⎥ T
⎢ ⎥ ΔYd = ⎡⎣ yd ( k +1),Δyd ( k + 2 ),",Δyd ( k + P ) ⎤⎦
⎢ hm hm −1 " h1 ⎥
A2 = ⎢
h1+ h2 ⎥
T
" " ⎡ ⎤
⎢ m +1
h
⎥ yd ( k +1),Δyd ( k + 2 ) − yd ( k +1),Δ 2 yd ( k +3), ⎥
Δ Y =⎢
2
⎢ # " " # ⎥
⎢ d ⎢", Δ 2 y ( k + P ) ⎥
p −m +1 ⎥ ⎣⎢ d ⎦⎥
⎢ h ⎥
⎢ p h p −1 " ∑ hi ⎥ T
⎣ i =1 ⎦ P×m Yˆ0 = ⎡⎣ yˆ0 ( k +1),", yˆ0 ( k + P ) ⎤⎦ ,
Yˆp ( k +1) is predictive output correction value. ΔYˆ0 = ⎡⎣ yˆ0 ( k +1),Δyˆ0 ( k + 2 ),",Δyˆ0 ( k + P ) ⎤⎦
T
T
⎡ yˆ ( k +1),Δyˆ ( k + 2 )− yˆ ( k +1),Δ 2 yˆ ( k +3),⎤
3. PIDMAC controller 2
Δ Y0 =ˆ ⎢ 0 0 0 0 ⎥
⎢ ⎥
⎣",Δ yˆ0 ( k + P )
2
⎦
PID control is combined with MAC control for the
T
sake of improving the control performance of control e = ⎣⎡e( k +1),",e( k + P ) ⎦⎤ ,
system. By introducing proportion, integral and T
differential into the new objective function, the Δe = ⎣⎡e( k +1),Δe( k + 2 ),",Δe( k + P ) ⎦⎤
structure of the deduced controller is characterized by T
general proportion, integral and differential. The new Δ 2e= ⎡ e( k +1), Δe( k + 2 )−e( k +1),Δ 2e( k +3),",Δ 2e( k + P ) ⎤
⎣⎢ ⎦⎥
performance index has generalized structure of
T
proportion, integral and differential. U = ⎣⎡u ( k ),",u ( k + m −1) ⎦⎤
310
⎡ h1 0 0 " 0 ⎤ where
⎢ ⎥
( )
" −1 T
⎢ 2h h1 0 0 ⎥ T T T
R = e λ +K p A2P A2P +Ki A2I A2I +Kd A2D A2D K A
⎢ # % % # 0 ⎥ P 1 p 2P
⎢ ⎥
( λ + K p A2 PT A2 P + Ki A2 I T A2 I + Kd A2 DT A2 D ) Ki A2 I T
" " " −1
⎢ hm h1 ⎥
= e
A =⎢ R
2I " " " h1+h2 ⎥ I 1
⎢ m+1
h
⎥
R = e ( λ + K p A2 P A2 P + K i A2 I A2 I + K d A2 D A2 D ) K A
−1
⎢ # % % # # ⎥ T T T T
⎢ ⎥ D 1 d 2D
⎢ P− m +1 ⎥
h
⎢ P hP−1 " " ∑ i⎥ h e1 =[1,0,",0]m×1 .
T
⎣ i=1 ⎦ P×m
⎡ h1 0 " " 0 ⎤
⎢ h −h h " " 0 ⎥⎥ 4. Simulation research and analysis
⎢ 2 1 1
⎢ # # % # # ⎥
⎢ ⎥ The transfer function of the simulation model
A2P =⎢hm −hm−1 hm−1 " h2 −h1 h1 ⎥
⎢h −h hm −hm−1 " h3−h2 h2 ⎥ is G ( s )= s + 2 15s 2 + 2 s +1 . Sampling period is T =3 , and
⎢ m+1 m ⎥
⎢ # % % # # ⎥ input is used. Fig. 1 is PIDMAC algorithm compared
⎢ h −h ⎥
⎣ P P−1 hP−1−hP−2 " hP−m+2 −hP−m+1 hP−m+1⎦ P×m with conventional MAC algorithm, where
λ =5, K P =5, Ki =10, K d = 2 . The improved algorithm has
A2 D = smaller oscillation and better to maintain system
stability. Overshoot is reduced, so the system can be
⎡ h1 0 " " 0 ⎤
⎢ ⎥ fast tracked in the process to the stable condition and
h2 − 2 h1 h1 % # 0
⎢ ⎥ the dynamic performance is improved by adjusting the
⎢ h3 − 2 h2 + h1 h2 − 2 h1 % # 0 ⎥ parameters K p , Ki and K d as figure 2~figure 4.
⎢ # % % # #
⎥
⎢ ⎥
⎢ hm − 2 hm −1 + hm − 2 " " " h1 ⎥
⎢ ⎥
⎢ hm +1 − 2 hm + hm −1 " " " h2 − h1 ⎥
⎢ # % % # # ⎥
⎢ ⎥
⎣ hP − 2 hP −1 + hP − 2 " " hP − m + 2 − 2 hP − m +1 + hP − m hP − m +1 − hP − m ⎦
P×m
311
Through the adjustment of parameters, the influence
that each parameter has on system and comparison 5. Conclusion
with the model algorithmic control conventional
algorithm can be tested. Fig.2 illustrates the influence Making use of the advantages of both control
of Kp on system control performance, algorithms, A new predictive control algorithm is
where λ =5, Ki =5, K d =0 . There are system output formed. The parameter setting has certain similarity
with conventional PID control algorithm for its
response curves of different values of parameter K p .
generalized structure of proportion, integral and
Within a certain range, the dynamic performance of differential. Parameter design of PIDMAC control
system is enhanced, tracking speed is up, overshoot is algorithm is guided and the changes of control system
reduced along with the increase of K p . performance are analyzed by simulations through. It
lays a foundation for further researching selecting
ranges of performance optimized parameter as well as
algorithm’s application in cascade control. The
obtained method has achieved certain engineering
practical values.
6. Acknowledgment
This work is supported by the National High-Tech
Research and Development (863) Program of China
(No.2006AA040308) and the Research Fund of
Nanjing University of Information Science and
Technology (No.20070089).
312
2008 International Conference on Intelligent Computation Technology and Automation
JRa
τm = (7) e ( e = δ * − δ ) is the error between desired rudder
Ke Km deflection δ* and actual rudder deflection δ . Let
From equation (5), we can see that a typical missile
electromechanical actuator system can be simplified to
state variable x1 = e , x2 = e , equation (9) may be
a second-order time-variant system. According to rewritten as follows.
equation (6), the transfer function parameter K is dx2 x K
=− 2 − u+ f (10)
determined by the hinge moment M h and the control dt τm τm
voltage u without regard to the variations of other
314
d 2δ * 1 dδ * ⎧ Kϕ1
where f = +
dt 2 τ m dt
. ⎪− τ x1s < 0
⎪ m
Equation (10) can be rewritten in the form of state ⎨ (17)
⎪⎛ c − 1 − Kϕ2 ⎞ x s < 0
⎪⎜⎝ τ m τ m ⎟⎠ 2
equation,
⎧ x1 = x2 ⎩
⎪ Thus the switching gains of the control law are
⎨ 1 K (11)
⎪ x2 = − τ x2 − τ u + f ⎧α > 0, x1s > 0
⎩ m m ϕ1 = ⎨ 1 (18)
The switching function can be written as ⎩ β1 < 0, x1s < 0
s = cx1 + x2 (12) ⎧⎪α 2 > (τ m c − 1) K , x2 s > 0
where c is the sliding surface gradient. ϕ2 = ⎨ (19)
When the system state is in the sliding mode phase, ⎪⎩ β 2 < (τ m c − 1) K , x2 s < 0
the switching function maintains zero. The configuration of variable structure control for
s = cx1 + x2 = cx1 + x1 = 0 (13) missile electromechanical actuator system is shown in
Fig.2.
The solution of equation (13) is
α1 ϕ1 x1
x1 ( t ) = x1 ( 0 ) e− ct (14) δ* x1
β1 K δ
It is obvious that when c > 0 in the sliding mode s
u
α2 s ( τm s + 1)
phase, the second-order system looks like an
asymptotically stable first-order system with a time x2 β2 ϕ2 x2
constant of c . The dynamic characteristics are
independent of system equation.
Choose the variable structure control law as Fig.2 Diagram of variable structure control for
u = ϕ1 x1 + ϕ2 x2 (15) missile electromechanical actuator
where ϕ1 and ϕ2 are switching gains. 4. Simulation Results and Discussion [6]
According to the sliding mode condition, when the
system state has not been in the sliding mode action From equation (6), all the influences of load
phase, the following hitting condition must be satisfied disturbance and variations of environment and missile
to direct the system state towards the sliding surface flight state on electromechanical actuator system can
from any initial state and keep it in the sliding mode be boiled down to the influence on the parameter K .
stably and reliably. When the flight state changes, the parameter K will
⎧⎪ lim+ s < 0 change accordingly.
s →0
⎨ Or ss ≤ 0 (16) To verify the feasibility of the proposed variable
lim
⎪⎩ s →0− s > 0 structure control system, simulation of different cases
of K has been performed and the results were
Substitute equation (11) and (15) into (16), and
compared with conventional controlled actuator. The
assume the given rudder deflection δ * is a step signal, cases of parameter K are as follows: (1) do not
we can obtain change, (2) shrunk to 1/10, (3) expanded 10-fold. The
⎡ 1 K ⎤ parameters of electromechanical actuator used in this
s ⎢cx2 − x2 − (ϕ1 x1 + ϕ2 x2 ) ⎥ simulation are given as follows [7]:
⎣ τm τm ⎦ K m = 0.0205rad/Nm K e = 0.0205V/ ( rad/s )
Kϕ1 ⎛ 1 Kϕ2 ⎞ Ra = 1.38Ω La = 0.22mH
=− x1s + ⎜ c − − ⎟ x2 s < 0
τm ⎝ τm τm ⎠ −6
J = 4.16 ×10 Kg ⋅ m 2
η = 85% Ki = 216
The sufficient conditions to satisfy the hitting The simulation results are shown from Fig.3 to
condition are as follows. Fig.5. Fig.3 shows the response outputs of
electromechanical actuator system with both variable
structure control and conventional control when
parameter K do not change. It is obvious that for both
control types, the dynamic response has no overshoot
315
and steady-state error, the quality of transition process
is good. But the response of variable structure control
is obviously faster than conventional control. Fig.4 is
the output when the parameter K is shrunk to 1/10 of
its original value. Reduction of K is equivalent to
reduction of electromechanical actuator open-loop gain,
so the response slows down. But still, the response of
variable structure control is faster than that of
conventional control. Fig.5 is the response curve when
parameter K is expanded to 10 times of its original
value. By virtue of the increase of open-loop gain, the
response of conventional control becomes to have
overshoot, the dynamic characteristics become worse.
On the contrary, the dynamic and steady characteristics
Fig.5 Expanded to 10 ⋅ K
of variable structure control nearly hold the line before
and after variation of parameter K .
It can be seen from the above simulation results 5. Conclusion
that the proposed variable structure control can still
satisfy the performance requirements despite the
A variable structure controller for missile
acutely variation of electromechanical actuator system
electromechanical actuator system has been proposed
parameter. This control method can enhance the stable
in this paper. The validity for practical implementation
precision and improve the dynamic characteristics of
is demonstrated through computer simulation. The
system.
simulation results show that the proposed controller
can provide the properties of insensibility to parameter
variations and robustness to load disturbance, and is
suitable for complex and variable flight environments.
Acknowledgement
This work is supported by Weapons Preliminary
Research Focused Funds of P.R. China under Grant No.
9140A01010106HK03.
References
[1] Tahara J L, Tsuboi K, Sawano T, Nagata Y, “An Adaptive
VSS Control Method with Integral Type Switching Gain”,
Proceedings of the IASTED International Conference
Fig.3 No change of K
Robotics and Applications, Florida, USA, 2001,
pp.106-111.
[2] Yan-jun Li, Ke Zhang, Self Adaptive Control Theory and
Application, Northwestern Polytechnical University Press,
Xi’an, 2005.
[3] Zhong-xu Gao, Mechanical and Electrical Engineering,
Tsinghua University Press, Beijing, 2002.
[4] Xue-fu Lv, Missile Flight Mechanics, Northwestern
Polytechnical University Press, Xi’an, 1995.
[5] Wei-bing Gao, Variable Structure Control Theory, China
Science and Technology Press, Beijing, 1990.
[6] Jin-kun Liu, MATLAB Simulation of Variable Structure
Control with Sliding Mode, Tsinghua University Press,
Beijing, 2005.
[7] Yuan Gao, Liang-xian Gu,“Research on Self Adaptive
Control Method of Missile Electric-Servo-Actuator
Fig.4 Shrunk to K 10 System, Measurement and Control Technology, Beijing,
2007,26(11),pp. 33-35.
316
2008 International Conference on Intelligent Computation Technology and Automation
318
~
x = Fμ ( x; μ ) (4) form reduction to analytically derive the stability
condition with respect to the nonlinear gain vector K 3 .
where x is the vector ( x, w) , and
~ Assume that λ1 ( μ 0 ) = ω0i and λ1 ( μ 0 ) = −ω 0 i with
~ ⎛ f ( x, u; μ ) ⎞
Fμ ( x; μ ) = ⎜⎜ μ ⎟ . Suppose that ( x 0 ; μ 0 ) is ω 0 = Im(λ1 ( μ 0 )) > 0 is the pair of pure imaginary
⎟
⎝ x − dw ⎠ eigenvalues of D F ( x ; μ , K * ) and M is the
x 0 0 1
the desired bifurcation point where would occur the
catastrophe oscillation. eigenmatrix with respect to the other eigenvalues
λ j ( μ 0 ) with Re(λ j ( μ0 )) < 0 ( 3 ≤ j ≤ n ). Denote v j
3.1. Linear control gain vector K 1 as the eigenvector of λ j ( μ 0 ) ( 1 ≤ j ≤ n ) and
N = (Re v1 ,− Im v1 , r3 , r4 , " , rn ) where rj = v j
As a critical condition of linear gain term K 1 , the
~ if λ j ( μ 0 ) is real or r j = Re v j and r j +1 = − Im v j if
eigenvalue assignment must require D x F ( x 0 ; μ 0 , K 1 )
having a pair of pure imaginary eigenvalues and the the λ j ( μ 0 ) and λ j +1 ( μ 0 ) are a complex conjugate pair.
others with negative real parts. But the Jacobi matrix Taking a coordinate change x = x0 + Ny where
would never be a constant one for import the gain
y = ( y1 , y 2 , ", y n ) T , we can convert the system (4)
vector K 1 . Since it is difficult to calculate all the
into the form,
explicit eigenvalues in high dimension system, we
adopt the implicit criterion (H1) to choose a proper y = F ( y; μ ) (5)
Where
K 1 for catastrophe oscillation. Under the ~
F ( y; μ ) = ( F 1 , F 2 ," , F n ) T = P −1 F ( x 0 + Ny ; μ )
constrains pn (μ 0 , K1 ) > 0 ,
with F (0; μ ) = 0 and its Jacobi matrix
Δ1 (μ 0 , K1 ) > 0 , Δ 2 ( μ 0 , K1 ) > 0 , " ,
⎡0 −ω0 0⎤
Δ n −2 ( μ0 , K1 ) > 0 , to compute the
equation Δ n −1 ( μ 0 , K 1 ) = 0 would be easily.
A( μ0 ) = ⎢⎢ω0 0 0 ⎥⎥ (6)
319
g 21 ( μ0 , K3 ) = G21 ( μ0 , K3 ) ⎧ ⎡ u ⎤ ⎡ wq − vr ⎤ ⎡ zG q − yG r ⎤ ⎡ ( yG p − xG q )q + ( zG p − xG r )r ⎤ ⎫ ⎡ X ∑ ⎤
⎪ ⎪
m ⎨ ⎢⎢ v ⎥⎥ + ⎢⎢ur − wp ⎥⎥ + ⎢⎢ xG r − zG p ⎥⎥ + ⎢⎢ ( zG q − yG r ) r + ( xG q − yG p ) p ⎥⎥ ⎬ = ⎢⎢ Y∑ ⎥⎥
n−2 (11b) ⎪ ⎢ w ⎥ ⎢ vp − uq ⎥ ⎢ y p − x q ⎥ ⎢ ( x r − z p ) p + ( y r − z q )q ⎥ ⎪ ⎢ Z ⎥
+ ∑ (2G110
k
s11k + G101
k k
s20 ) ⎩⎣ ⎦ ⎣ ⎦ ⎣ G G ⎦ ⎣ G G G G ⎦⎭ ⎣ ∑ ⎦
k =1
⎡ Ix I xy I xz ⎤ ⎡ p ⎤ ⎡ ( I zx p + I zy q + I z r )q − ( I yx p + I y q + I yz r ) r ⎤
⎢ ⎥ ⎢ ⎥
⎢ I yx Iy I yz ⎥ ⎢⎢ q ⎥⎥ + ⎢ ( I x p + I xy q + I xz r )r − ( I zx p + I zy q + I z r ) p ⎥
where
⎢ I zx I zy I z ⎦ ⎣⎢ r ⎦⎥ ⎣ ( I yx p + I y q + I yz r ) p − ( I x p + I xy q + I xz r ) q ⎥⎦
⎥ ⎢
⎣
1 ⎛ ∂3 F 1 ∂3 F 1 ∂3 F 2
G21 ( μ0 , K3 ) = ⎜ + + ⎡ yG w − zG v ⎤ ⎡ yG (vp − uq ) + zG ( wp − ur ) ⎤ ⎡ K ∑ ⎤
⎢ ⎥
8 ⎝ ∂y1∂y1∂y1 ∂y1∂y2 ∂y2 ∂y1∂y1∂y2 + m ⎢⎢ zG u − xG w ⎥⎥ + m ⎢⎢ zG ( wq − vr ) + xG (uq − vp) ⎥⎥ = ⎢ M ∑ ⎥
⎢⎣ xG v − yG u ⎥⎦ ⎢⎣ xG (ur − wp) + yG (vr − wq ) ⎥⎦ ⎢⎣ N ∑ ⎥⎦
∂F3 2
⎛ ∂3F 2 ∂3 F 2
+ +i⎜ + (18)
∂y2 ∂y2 ∂y2 ⎝ ∂y1∂y1∂y1 ∂y1∂y2∂y2 The symbols of the model are described in Ref. [7].
Substituting the influence of hydrodynamic
∂3 F 1 ∂3 F 1 ⎞ ⎞
− − ⎟⎟
coefficients into the model respectively, the following
∂y1∂y1∂y2 ∂y2 ∂y2 ∂y2 ⎠ ⎟⎠ matrix form is obtained,
(12) A(u v w p q r)T = ( f x f y f z f k f m f n )T
j −2 1⎛ ∂ F 2
∂ F1 ⎛ ∂ F
2 2
∂ F 2 2 2 1 ⎞⎞ (19)
G110 = ⎜ + +i⎜ − ⎟⎟ ⎟ According to experiences, the axial equation can be
2 ⎜⎝ ∂y1∂y j ∂y2 ∂y j ⎜⎝ ∂y1∂y j ∂y2∂y j ⎠⎠
⎟ replaced by the experiential expression
( ) = U ⎛⎜⎝1 − e ⎞.
−0.52 R −0.52 u
(13) U ≈ u ≈ U0 1− e |ψ | L
L
⎟
⎠
0
j −2 1 ⎛ ∂2 F 1 ∂2F 2 ⎛ ∂2 F1 ∂2 F 2 ⎞⎞
G101 = ⎜ − +i⎜ + ⎟⎟ ⎟ A = (aij )6×6
2 ⎜⎝ ∂y1∂y j ∂y2 ∂y j ⎜⎝ ∂y2 ∂y j ∂y1∂y j ⎠⎠
⎟
⎡∗ ∗ ∗ ∗ ∗ ∗ ⎤
(14) ⎢∗ 14448 0 −0.22 0 −0.152 ⎥
⎢ ⎥
In (11b), s11 = (s11
1
, s112 ,", s11n − 2 ) T and ⎢* 0 14297.57 0 0.163 0 ⎥
n−2 T =⎢ ⎥
s 20 = ( s 120 , s 20
2
, ", s 20 ) are the solutions of the ⎢* −0.155 0 24071.24000 0 −0.234 ⎥
following linear equations, respectively, ⎢* 0 0.136 0 244304 0 ⎥
⎢ ⎥
Ms11 = −h11 and ( M − 2iω 0 I ) s 20 = − h20 (15) ⎣* −0.195 0 0.158 0 265680⎦
(20)
The vectors h11 = (h111 , h112 , " , h11n − 2 ) T and
f y = 14401.2 wp − 14220ur
h20 = (h20
1
, h202 , " , h20n −2 ) T is
+ 10.56 pq + 8.86uv + 48u 2δ r
1⎛ ∂ F
2
∂ F
j
⎞2 j
f z = 14234.8uq −14448vp +10.72 p2 +12.16rp
h11j − 2 = ⎜⎜ + ⎟⎟ (16)
4 ⎝ ∂y1∂y1 ∂y 2 ∂y 2
⎠ + 0.626u2 − 9.6uv − 4.28u2δs
1 ∂ F
2 j
∂ F
2 j
∂2 F j
h20j − 2 = ( − − 2i ) (17) f m = 220154rp − 856uq − 12.16vp − 0.712u 2
4 ∂y1∂y1 ∂y2∂y2 ∂y1∂y2
+ 33.4uw − 112v 2 − 40u 2δ b
In what follows, the stability of the bifurcation
solutions in system (4) can be stated as, the created f k = −28.8up − 18.72ur + 1.6vq − 10.72wp
limit cycle is stable if β ( K 3 ) < 0 and unstable − 1.6wr + 8.8uv + 21.28vw
if β ( K 3 ) > 0 . So, the stability of the created f n = −220154 pq − 12.64up
bifurcation solutions can be desirably manipulated by
− 840ur − 10.56 wp − 40u 2δ r
choosing K 3 to adjust the sign of β ( K 3 ) .
(21)
Employ the washout filter: m = w − dm . The control
4. Application to submarine analysis input is u = k1 ( w − dm) + k3 ( w − dm)3 .
To show the feasibility of the proposed control We expect to create a catastrophe oscillation at
algorithm in high-dimension system, we investigated desired location ϕ = 0 and x0 = ( − 0.9715473757 ,
the following submarine’s space motion model. 1.339828467 , − 0.4251731961 , 0.07135276657 ,
− 0.002450682016). Selecting d = 0.1 and then
320
determine K 1 = 6.292202428 by (H1) and (H2). stabilization of the bifurcation solutions. As example,
the submarine motion equations for creating a stable
Therefore, we can numerically compute all eigenvalues
limit cycle were considered. The occurrence of period
and eigenvectors as − 2.39 ± 0.000556 i , − 0.0388,
solution can provide a warning signal to helmsman.
± 0.0042 i , − 0.0267. Next, following the procedures This catastrophe control algorithm presented a new
of the center manifold theory and normal form approach for monitoring and controlling complex
reduction, the nonlinear gain is given as K 3 = 2.13245. nonlinear systems, and may be widely applied in
Thus, we get the stable limit cycle. designing of control systems.
6. Acknowledge
This paper was supported by National Natural Science
Foundation of China (60672035), and Doctoral
Program Foundation of Institutions of Higher
Education of China (20050217021).
7. References
[1] F.H. Ling, Catastrophe Theory and Application,
Shanghai Jiaotong University, Shanghai, 1987
[2] T. Tamaki, T. Torii, K. Meada, Stability analysis of black
holes via a catastrophe theory and black hole
Figure 2. The created stable limit cycle thermodynamics in generalized theories of gravity. Physical
Review D, 2003, pp. 1-9.
From this example, we study the catastrophe
[3] J. Guckenheimer, P. Holmes, Nonlinear Oscillations,
oscillation control in high-dimensional system of a Dynamical Systems and Bifurcations of Vector Fields,
submarine arbitrarily close to the capsizing attack Springer-Verlag, New York, 1986.
angle, in a manner which provides an impending lost [4] G.L. Wen, D.L. Xu, Control algorithm for creation of
stability warning signal. This signal is a small- Hopf bifurcations in continuous-time systems of arbitrary
amplitude, stable limit cycle-type pitching motion of dimension. Physics Letters A, 2005, pp. 93-100.
the submarine which persists to within a prescribed [5] W.M. Liu, J. Math, Anal. Appl. 1994.
margin from impending capsizing. [6] L.P. Tang, Y. Sun and Y.C. Bi, Catastrophe Establish
Control, Automation Technique and Application, 2004, pp. 8-
10.
5. Conclusion [7] W.W. Wang, A Study on Submarine Voyage Training
Simulator Based on Virtual Reality, Harbin Engineering
In this paper, we proposed a general control University, Harbin, 2002.
algorithm for creating catastrophe properties in high [8] E.H. Abed, J.H. Fu, H.C. Lee and D.C. Liaw, Bifurcation
dimension system. Washout filter aided feedback Control of Nonlinear Systems, Proceedings of the New
controllers preserve the original equilibrium of system, Trends in System Theory Conference, Italy, 1990.
which satisfy the engineering applications. The method
involves computation of implicit critical conditions and
321
2008 International Conference on Intelligent Computation Technology and Automation
323
5. Robust stability analysis M 3 = − ( A d +ΔAd ) PBD ( BT PB ) -1 BT PA
− AdT PB( BT PB )-1 DBT P( A+ ΔA)
Theorem 1 For any x ∈ R p , y ∈ R q , G and E are
+ AdT PB ( B T PB ) -1 DB T PBD ( B T PB ) -1 B T PA
matrices with compatible dimensions, the following
inequality holds +( Ad + ΔAd )T P( A+ ΔA) (22)
−2 xT GEy ≤ xT GG T x + yT E T Ey (16) M 4 = − ( Ad + ΔAd ) PBD ( B PB ) B PAd
T -1 T
Proof 0 ≤ (G x + Ey ) (G x + Ey )
T T T
− AdT PB( BT PB )-1 DBT P( Ad + ΔAd ) − Q
= xT GG T x + 2 xT GEy + yT E T Ey + AdT PB ( B T PB ) -1 DB T PBD ( B T PB ) -1 B T PA
⇒ −2 x GEy ≤ x GG x + y E Ey □
T T T T T
+( Ad + ΔAd )T P( Ad + ΔAd ) (23)
Theorem 2 Consider the dynamic equation of the Consider M 1 and according to Theorem 1, Lemma 1.
quasi-sliding mode (15) is asymptotically stable if
there exists symmetric position-definite P , Q such that − xT ( k )( A+ ΔA)T PBD ( BT PB ) −1 BT PAx ( k )
the following linear matrix inequalities hold, ≤ 1/ 2 xT (k )( A+ ΔA)T PBD ( BT PB) −1 DBT P( A+ ΔA) x(k )
⎡ 2 AT PA − P + Q + 2 AT A + ( A + ΔA)T P ( A + ΔA) +1/2 xT (k ) AT PAx(k ) (24)
⎢
⎢ ( Ad + ΔAd )T P( A + ΔA) T T T −1
− x ( k ) A PB ( B PB ) DB P ( A+ ΔA) x (k )
T
⎢ 2 DBT P ( A + ΔA)
⎢ ≤ 1/ 2 xT (k )( A+ ΔA)T PBD ( BT PB) −1 DBT P( A+ ΔA) x(k )
⎣⎢ 0
+1/2 xT (k ) AT PAx(k ) (25)
( A + ΔA) P( Ad + ΔAd )
T
If the following conditions are satisfying,
2 Ad PAd + 2 AdT Ad − Q + ( Ad + ΔA d )T P ( Ad + ΔAd )
T
⎧ I + BD ( BT PB ) −1 DBT < 0
0 ⎨ (26)
⎩ − I + P −1 < 0
2 DBT P ( Ad + ΔAd )
xT (k ) AT PB( BT PB ) −1 DBT PBD ( BT PB ) −1 BT PAx ( k )
2( A + ΔA)T PBD 0⎤
⎥ < xT (k ) AT Ax(k ) (27)
0 2( Ad + ΔAd ) PBD ⎥
T
324
ΔV < 0 ⇔ Σ < 0 (31)
By applying Schur complement to (26) and
(29), we have
⎡ 2 AT PA − P + Q + 2 AT A + ( A + ΔA)T P ( A + ΔA)
⎢
⎢ ( Ad + ΔAd )T P( A + ΔA)
⎢ 2 DBT P ( A + ΔA)
⎢
⎢⎣ 0
( A + ΔA)T P ( Ad + ΔAd ) Fig 2. Traditional SMC. Sliding surface.
2 A PAd + 2 AdT Ad − Q + ( A + ΔA)T P( Ad + ΔAd )
T
d
0
2 DBT P( Ad + ΔAd )
2( A + ΔA)T PBD 0 ⎤
⎥
0 2( Ad + ΔAd ) PBD ⎥T
⎥<0
−( BT PB ) 0 ⎥
0 −( BT PB) ⎥⎦
⎡ I BD ⎤ ⎡− I I ⎤ (b)
⎢ DBT − BT PB ⎥ < 0 ⎢ I − P ⎥ < 0 Fig 3. Traditional SMC. Control input
⎣ ⎦ ⎣ ⎦
Obviously, sign function in u (k ) (34) causes
The proof is complete.
chattering, and large control input exists.
So we can draw a conclusion that the system Then, LS-SVM is used for replacing sign function of
trajectories starting from any initial state will the reaching law (33).
asymptotically convergent the sliding surface, and
system trajectories restricted to the sliding surface are
robust stable from Theorem 2.
6. Numerical example
Consider uncertain time delay system in the form
[17] and the discrete system of [17] is described as
follows: (sampling time ts = 0.05 , h = 10 )
Fig 4. LS-SVM-SMC. Sliding surface.
⎡ 0.9489 0.0452 ⎤ ⎡ 0.1sin(2k ) −0.3sin(k ) ⎤
A=⎢ ⎥ ΔA = ⎢ ⎥
⎣ −0.0904 0.8585 ⎦ ⎣ −0.1sin(k ) 0.075sin(3k ) ⎦
⎡0.9999 −0.0051⎤ ⎡ 0.0500 −0.0001⎤
Ad = ⎢ ⎥ B=⎢ ⎥
⎣0.0256 1.0512 ⎦ ⎣ 0.0006 0.0256 ⎦
⎡ −0.2 sin(2k ) 0.1sin(3k ) ⎤
ΔAd = ⎢ ⎥ (32)
⎣ 0.1sin(k ) −0.175sin( k ) ⎦
First, consider the system (32) without input
saturation, in other words, D = [1 0;0 1] , q = 10 ,
ε =1 Fig 5. LS-SVM-SMC. Control input
s(k + 1) = s(k ) − qTs (k ) − ε T sgn( s( k )) (33) One can see from Fig 4 that sliding surface is
u (k ) = −(CB) −1[CAx( k ) + CAd x( k − h)] smooth. Fig 5 indicates that chattering is eliminated,
but large control input still exists. Then, the algorithm
+ (CB) −1[(1 − qT ) s(k ) − ε T sgn( s (k ))] (34) with input saturation in the scheme is considered.
uH = 20, − uL = −20 (35)
325
References
[1]V.I.Utkin, “Variable structure systems with sliding mode”,
IEEE Transactions on Automatic Control, 22(2), 1977,
pp.212-222.
[2]W.Gao, Y.Wang, A.Homaifa, “Discrete-time variable
structure control systems”, IEEE Transactions on Industrial
Electronics, 42(2), 1995, pp.117-122.
[3]A.Bartoszewicz, “Discrete-time quasi-sliding-mode
control strategies”, IEEE Transactions on Industrial
Electronics, 45(4), 1998, pp.633-637.
Fig 6. System state [4]Z.Cherati, M. Motlagh, “Control of spatiotemporal chaos
in coupled map lattice by discrete-time variable structure
control”, Physics Letters A, 370, Elsevier, 2007, 302-305.
[5]Z.Wang, Y.Zhang, “Design and verification of a Robust
formation keeping controller”, Acta Astronautica, 61,
Elsevier, 2007, 565-574.
[6]L.Xiao, H.Su, X.Zhang, J.Chu, “A new discrete variable
structure control algorithm based on sliding mode prediction”,
2005 American Control Conference, Portland, OR, USA,
June 8-10, 2005, pp.4643-4648.
[7]J.Choi, “On the stabilization of linear discrete time
systems subject to input saturation”, System & Control
Fig 7. Sliding surface Letters, 36, Elsevier, 1999, pp.241-244.
[8]T.Hu, Z.Lin, “An analysis and design method for linear
systems subject to actuator saturation and disturbance”,
Proceedings of the American Control Conference, Chicago,
Illinois, June 2000, pp.725-729.
[9]F.Gouaisbaut, M.Dambrine, J.P.Richard, “Robust control
of delay systems: a sliding mode control design via LMI”,
System & Control Letters, 46, Elsevier, 2002, 219-230.
[10]Y.Niu, D.W.C.Ho, J.Lam, “Robust integral sliding mode
control for uncertain stochastic systems with time-varying
delay”, Automatica, 41, Elsevier, 2005, 873-880.
[11]K.Shyu, W.Liu, K.Hsu, “Design of large-scale time-
Fig 8. Control input delayed systems with dead-zone input via variable structure
Obviously, the system is asymptotical stable, and control”, Automatica, 41, Elsevier, 2005, 1239-1246.
[12]V.Vapnik, The nature of statistical learning theory,
sliding mode motion trends to the origin point in finite Springer-Verlag, New York, 1995.
time in the present of unmatched parameter [13]X.Chen, Y.Li, R.Harrison, Y.Zhang, “Type-2 fuzzy logic
uncertainties and time delay. Compared Fig 3、Fig 5 based classifier for support vector machine”, Applied Soft
with Fig 8, the control input is reduced effectively Computing, 8, Elsevier, 2008, 1222-1231.
[14]J.Suykens, T.Gestel, J.Brabanter, B.Moor, J.Vandewalle,
Least squares support vector machines. World Scientific
7. Conclusion Publishing, Singapore, 2002.
[15]J.Suykens, J.Vandewalle, “Least squares support vector
In this paper, a LS-SVM-SMC for uncertain discrete machine classifiers. Neural Processing Letters. 9(3), 2002,
time-delay systems with input saturation is proposed. 293-300.
The sign function of reaching law in conventional [16]Y.Cao, Y.Sun, C.Cheng, “Delay-dependent robust
SMC is replaced by the output of LS-SVM. An stabilization of uncertain systems with multiple state delays”,
equivalent matrix is constructed with input saturation, IEEE Transactions on Automatic Control, 43, 1998, pp.1608-
and parameters of sliding surface and controller can be 1612.
determined by solving LMIs. The derived controllers [17]C.Chou, C.Cheng, “Design of adaptive variable structure
are robust so that the closed-loop system is stable in controllers for perturbed time-varying state delay systems”,
the presence of unmatched parameter uncertainties and Journal of the Franklin Institute, 338, Elsevier, 2001, 35-46.
time delay. The chattering in conventional switching-
type sliding controls is eliminated, and input saturation
is considered.
326
2008 International Conference on Intelligent Computation Technology and Automation
328
Consider a PI controller of the form with undamped natural frequency
GPI 1 ( s) = K P1 + K I 1 / s (8) 2πf u K I1
where KP1 and KI1 are constants, applying to (7) with
ωu = = (11)
n C
the required supply current derived from the supplied Clearly the undamped natural frequency wn is
voltage us(s), the block diagram of the voltage control independent of the load current. If the bandwidth of
loop is shown in Fig. 4a where α is a constant. the voltage loop is set to 1/n times the supply
Assuming that a steady state can be reached and the frequency fu, the integral gain KI1 becomes
steady-state output of the PI controller w(t) is Wo, the
(2πf u ) 2 C
block diagram of the voltage loop at the steady state K I1 = (12)
can be approximate by Fig. 4b. The output bus voltage n2
can be approximated as If the damping ratio ξ of the voltage loop is set to
Gu (s) W one, the proportional gain KP1 becomes
U C (s) = (αW0U S ( s ) − 0 + I L ( s )) 4πf u C
1 − G cu ( s )G u ( s ) s K P1 = 2ξω n C = (13)
G cu ( s )Gu ( s ) n
− U C* ( s ) u S (t )
1 − Gcu ( s )Gu ( s ) α
s W0 *
u (t ) iS* (t )
=− (αW 0U S ( s ) − + I L ( s )) C
Cs + K P1 s + K I 1
2
s G PI 1 ( s) × G r (s )
K P1 s + K I 1 iS (t )
+ U C* ( s ) (9) uC (t )
Cs + K P1 s + K I 1
2
where U C* ( s) is the Laplace transform of the reference Fig. 5 Full block diagram of control for active filter
voltage U C (t ) .If the steady-state PI controller output is A full block diagram of the proposed control
smooth, the generated supply current reference will scheme is shown in Fig. 5.
have small THD.
iL (t ) 4. Experimental results
αu S (t ) To demonstrate the simple design and effectiveness
of the proposed controller, an experimental shunt
iS* (t ) active filter was built with L=500mH, C=470mF,
uC* (t ) uC (t )
Gcu (s ) × Gu (s) nominal supply voltage was 110VRMS and the supply
iF (t ) frequency was fuٛ 50 Hz. The bus DC voltage was set
to Uc=200V. Note that the setting of Uc had to be
(a) larger than the peak supply voltage us(t), and α was
iL (t ) set to 0.01 such that the peak value of αu S (t ) was
αW0 u S (t ) − W0 about 1.56 V. The setting of α was to make sure that
the multiplier output would not be easily saturated. MS
uC* (t ) iS* (t ) uC (t ) and ws are 4.5 and 3141rad/s respectively,hence τ p is
Gcu (s ) w(t ) Gu (s )
iF (t ) 0.06. The algorithm soft is programmed in a DSP
TMS320LF2808.
A common nonlinear load was AC to DC
(b) conversion using a full-bridge rectifying circuit. The
Fig. 4 Block diagram of voltage control loop nominal supply voltage was 110VRMS and the voltage
(a) Voltage control loop THD was around 3%. Fig, 5 shows the load current
(b) Steady-state approximation of voltage control loop waveform, the load current spectrum, the load current
If the bandwidth of the voltage loop is too high, the THD and the power factor obtained from the Fluke
disturbances will be reflected on the bus voltage and as 41B power harmonics analyser. The RMS load current
a result on the generated supply current reference. The was 1.97A. There were clearly a lot of 3rd, 5th, 7th etc.
supply current reference will be corrupted by higher high-order harmonics and the current THD was 61.8%.
harmonics. The voltage loop characteristic equation is The power factor of the circuit was 0.77. When the
given by active filter was introduced, there was clearly a
Δ( s ) = Cs 2 + K P1 s + K I 1 (10) significant improvement in the power factor and the
current THD. Fig. 6 shows the effects when the
329
proposed active filter was added. The RMS supply
current became 1.93 A. The high order harmonics had
clearly been reduced and the current THD was 5.6%.
The power factor of the overall system was 0.98.
(a)
(a)
(b)
(b)
(c)
(c)
(d)
Fig. 6 Performance of active filter.
(a) Supply current waveform
(b) Supply current spectrum
(c) THD of supply current
(d) (d) Power factor
330
and harmonics is not required. [3] S. Fukuda and S. Sugawa, “Adaptive signal processing based
control of active power filters,” in Proc. IEEE IAS Annu.
6. Acknowledge Meeting, pp. 886–890,1996.
Project supported by Provincial Natural Science [4] Y. Sato, T. Ishizuka, K. Nezu, and T. Kataoka, “A new control
Foundation of Hunan (06JJ50101) strategy for voltage-type PWM rectifiers to realize zero steady-
state control error in input current,” IEEE Trans. Ind. Applicat.,
7. References vol. 34, pp. 480–486, May/June 1998
[1] S. Buso, L. Malesani, and P. Mattavelli, “Comparison of current [5] Xiaoming Yuan, Willi Merk, Herbert Stemmler, and Jost
control techniques for active power filters,” IEEE Trans. Ind. Allmeling, “Stationary-Frame Generalized Integrators for
Electron., vol. 45, pp 722 -729,1998. Current Control of Active Power Filters With Zero Steady-State
[2] H. Komurcugil and O. Kukrer, “A new control strategy for Error for Current Harmonics of Concern Under Unbalanced and
single-phase shunt active power filters using a Lyapunov Distorted Operating Conditions,” IEEE Trans. Ind. Applicat.,
function,” IEEE Trans. Ind. Electron., vol. 53, no. 1, pp. 305– vol. 38, pp. 523–532, March/April 2002.
312, Feb. 2006.
331
2008 International Conference on Intelligent Computation Technology and Automation
Hongfu Zhou[1]
1
Mechanical School in South China U. of Technology, Guangzhou 510641
E-mail:mehfzhou@scut.edu.cn[1]
333
depend on the control system, which it includes input
position value, encoder feedback and PID control.
The PWM control shows in Figure 7, where the
PWM signal get from output in DSP module, and the
signal send to H Bridge for drive DC servomotor. The
4 DC motor drive board shows in Fig 5.
334
3. PID control 3.2. PID control program
3.1. PID control model Software architecture in the PID control, it consists
DC motor control hardware architecture module main sub program, interrupt sub program and PID
show in Fig 8, where the PID controller is in DSP control sub program, where the main sub program is
microprocessor program. for initial control data, interrupt program is for PWM
output and PID motor control adjust, and PID sub-
program is for calculate error e and PID output value.
Following function PIDcontrol() is PID control sub
program.
Void PIDcontrol()
Fig 8 PID control Hardware Architecture {
The PID control model consists of proportional, static double dValue[3];
integral and derivative, which show in Fig 9, where static double dOldError;
e(t) is error signal it receive, and u(t) is output from the double dError;
controller. For best property in motor control, it can be double dDemandSignal=GetDemandSignal();
got by chose different coefficient KP, KI, and KD. double dFreedbackSignal=GetFeedbackSignal();
dError=dDemandSignal- dFreedbackSignal;
dValue[0]=Kp*dError;
dValue[1]= dValue[1] + Ki*dError*dTimeInterval;
dValue[2]=Kp*(dError-dOldError)/ dTimeInterval;
(1)
Following it is PID differential equation. Fig 10. Experiment for one DC motor in PID control
In the hardware, the connect diagram for emulator,
k DSP developing board and computer show in Fig 11,
U(K)=Kp e(k)+ Ki (sum e(t) T + Kd (e(k)-e(k-1))/T where the note book computer to DSP developing
board connect by USB to RS232 transfer cable, which
where Kp—proportion coefficient, download program or data from up computer to DSP
Ki —integral coefficient, Ki=Kp/Ti developing board, and simulator connect by JTVG
Kd—deferential coefficient, Kd=Kp *Td between emulator and DSP developing board.
335
The DSP embedded module show in Fig 12, where In Fig15, it shows data process interface for DC motor
DSP system received up computer data, encoder data speed feedback in CCS (Code Composer Studio), which
from DC motor, and send PWM data to H bridge. is software for DSP control interface.
References
[1]Y. Zhang, L.S. Shieh, C.M. Akujuobi & W. Ali, Digital
Fig 12. DSP module cable PID controller design for delayed multivariable systems,
Fig 13 shows the key parts for the embedded Asian Journal of Control, 6(4), 2004.
system, where it includes DSP module, encoder [2]A.A.EI-Samahy, M.A.EI-Sharkawi,and S.M.Sharaf,
“Adaptive multi-layer self-tuning high performance tracking
module, and DC power board.
control for DC brushless motors,” IEEE Trans. on Energy
Conversion, vol. 9, pp. 311-316, 1994.
[3]J. Y. Hung, R. M. Nelms, and P. B. Stevenson, “An output
feedback sliding mode speed regulator for dc drives,” IEEE
Trans. Ind. App., vol. 30, pp. 691-698, 1994.
[4] F. F. Cheng and S. N. Yeh, “Application of fuzzy logic in
the speed control of AC servo system and an intelligent
inverter,” IEEE Trans. On Energy Conversion, vol. 8, pp.
312-318, 1993.
[5]A. Leva, “PID auto-tuning algorithm based on relay
feedback,” Proc. Inst. Electr. Eng., pt. D, vol. 140, pp. 328-
338, 1993.
[6]TMS320F/C24x DSP Controller Reference Guide,
Peripheral Library and Specific Devices, Number
Fig 13 shows the key parts
SPRU161C, Texas Instrument, June 1999.
336
2008 International Conference on Intelligent Computation Technology and Automation
in equation (2),
M zZz , M zD , M zG represents the pitch The poles assignment method is used to design the
controller for the inner loop. Ignoring the affection of
D G
moment derivative separately, Y , Y represents the
a5 , the transform function of the inner loop is as
a ,a
dynamics coefficient 3r 5 r represents the moment D (s) a3
efficiency and force efficiency of one micro pulse G z ( s ) s (a1 a4 ) s (a2 a1a4 )
2
engines separately.
the equations(4) and (5) can be written as
M zGi transform function matrix.
a3r
Jz G (s) g (s) / d (s)
(3)
Y Gi ª a3 s a3 a4 º
a5 r g (s) « »
mV ¬ a3 ¼
d (s) s 2 (a1 a4 ) s (a2 a1a4 ) (6)
the expected characteristic polynomial is as
follows:
338
dc ( s ) d ( s ) K T g ( s ) Td
1
(8) a2 a1a4
> kZ kD @
T
K a1 a4
let , equation(8) can be written as [d
follows: 2 a2 a1a4
a3 a4
ª a3 0 º ª kZ º ª 2[ d/ Zd/ ( a1 a4 ) º Kd
« « /2 » (9) a2 a1a4
¬ a3 a4 a3 »¼ «¬ kD »¼ ¬ Zd ( a2 a1a4 ) ¼
1
k ,k
So the controller gain Z D can be get from equation T1d
a4
(9).
The integral controller is always used in the KDn qSC Dy /( mg )
acceleration control loop to eliminate the static error.
a3r a4
The controller is as follows˖ K dr
kI a2 a1a4
G (s)
s a5 rV
(10) K nGi
mg
3.3 Design of the Reaction-jet Control
Autopilot because of
Td 2 T1d K d 1 KDn and
Assume the feed-forward controller of the reaction-jet Td [ T1d K d 1 KD n
,the equation(11) can be
control system is r
G ( s) a
, and 5 can be neglected.
predigested as follows˖
Then the closed loop transform function of the multi-
control system is as follows: Td2 s 2 2] Td s 1 K w Kdr KD KwT1d Kdr
N ( s) Gr (s)
Gc ( s ) (11) T1d Kd KDn
(16)
M ( s)
1 Kw Kdr KD KwT1d Kdr
in the equation(11)ˈ |
T1d Kd KDn
N(s) kI kD kZT1d Kdr KnD Gr (s)T1d KnD Kd
sP(s)Gr (s)KnD sGr (s)KnGi kZ Kdr (T1d s 1) (12) 4. Simulation and Analysis
sGr (s)KnGi kZkD KdrT1d Suppose the sampling cycle of pulse engines is 0.02s.
D
M(s) sP(s) skZKdr skDkZT1d Kdr kI kZkDT1d Kn Kdr Fig (5) ̚Fig (7) gives the response of over loading of
the multiple control system and the number of the
sP(s)Gr (s)KnGi sGr (s)KnGi kZKdr (T1d s 1) (13) micro pulse engines under different conditions and
Gi different commands. n=0, 1,2,3,4 represents number of
sGr (s)Kn kZkD KdrT1d
the micro pulse engine fired one time.
P( s ) Td2 s 2 2[ d Td s 1 (14)
According to the entirety compensation condition of
the feed-forward control[6]˖
Td2 s 2 2[d Td 1 KZ K dr KD KZT1d K dr
Gr ( s) (15)
T1d K d KDn
in the equation(15) ˈ Z D K ,K
represents the
controller gain of the pitch rate feedback loop and
estimation of attack angle feedback loop separately.
And the formulas of coefficients of transform function
Td , [ d , K d , T1d , KDn , K dr
as follows:
339
more speedy. That is to say, the multi-control system
has shorter raise time. However the multi-control
system has the bigger overshot with the number of the
micro pulse engine increasing. In Fig (5), when the
number of the pulse engine exceed 3, the Reaction-jet
can not increase the performance yet, In Fig (6) and
Fig (7) , when the number of the pulse engine exceed 2,
the overshot of the multi-control system has achieved
20%. So this scheme has a problem of optimized
number of the Reaction-jet engine, and this problem is
needed to study deeply later
5.Conclusion
Fig 5 V˙1.2MaˈH˙100m, response of the over load From the simulation above, we can draw the
conclusions:
1) This scheme can increase effectively the response
speed of autopilot.
2) The multi-control system has different performance
with different number of the Reaction-jet engine. So
the multi-control system has a optimized number of the
Reaction-jet engine
6. References
[1] Fan Y.H Yang J. Research of Using Aerodynamic
Reaction-jet Controller for Designing Missile Autopilot
[J]. CONTROL TECHNOLOGY OF TACTICAL
MISSILE, N0.3,2005:2̚4.
[2] Jia X.H. Fan Y.H, Yang J. The Design of
Aerodynamic/Reaction-jet Controller of Missile
Autopilot [J]. Journal of Projectiles, Rockets, Missiles
and Guidance, Vol.25, NO.3,2005: 2̚4.
Fig 6 H=4000mˈV=3Ma, response of the over load
[3] Ji G. Yang J. Analysis on Side Jet/Aerodynamics
Compound Control of Air to Air Missile in Endgame[J].
Journal of Projectiles,Rockets,Missiles and Guidance,
Vol.24,NO.4, 2004:17~18.
[4] Jia X.H. Fan Y.H, Yang J. Research of the Robust and
Stability for Aerodynamic/Reaction-jet controller of
Missile Autopilot [J]. Journal of Projectiles, Rockets
Missiles and Guidance, Vol.25, NO.4,2005:1~2.
[5] Fan Y.H, Xue Y, Yang J. Research of the Robust and
Stability for Aerodynamic/Reaction-jet controller of
Missile Autopilot [J].CONTROL TECHNOLOGY OF
TACTICAL MISSILE, N0.3,2006:5~7.
[6] Wen J. Zhao G. L, Numerical simulation on lateral jet
interaction in supersonic flows Journal of Beijing
University of Aeronautics and Astronautics Vol.31,No.6,
2005:691~695
Fig (5)~ Fig (7) show that the more micro pulse engine
works, the performance of the multi-control system is
340
2008 International Conference on Intelligent Computation Technology and Automation
F
Air Balance Cal.
Secondary Air
Primary Air Cal.
SV
Thickness Flue Gas
Grate Speed Temperature O2
Cal. Finishing Line
Grate Furnace Boiler
M ass Flow Air Flow System Loops
Selection Block Grate System Loops
Figure2. Combustion Control System
342
Figure 2 shows the main combustion control loop.
The combustion control system includes grate system,
primary air system and a secondary air system. The key 60
of the control loop design is to consider these systems
50
as an entirety. The steam flow affects both the air flow
Wast e Layer
40
in oxygen content is controlled by secondary air while
the major corrections are done by the air flow.
30
343
Only by stable combustion can generate enough steam
and flue gas. Conversely, the steam guarantees the [6] Hao Zhou, Kefa Cen, Jianren Fan, 1998, “Modeling and
working of the steam air pre-heater. optimization of the NOx emission characteristics of a
tangentially fired boiler with artificial neural networks”,
Energy, 29(2004), pp. 167-183.
5.2.2 Secondary air During the processes
occurring on the grate, the combustible waste materials [7] K. Jørgensen, O.H. Madsen, “Modern Control Systems
are transformed into a gaseous form consisting in a for MSW Plants”, Process Safety and Environmental
mixture of many volatile components. Secondary air is Protection, (1) 2000, pp. 15-20.
injected into the furnace through high velocity nozzles,
[8] Olar Zerbock, “Waste Reduction in Developing Nations”,
to mix the flue gas. It also resulted in an increase in the
Urban Solid Waste Management, Michigan Technological
velocity of the main hot gas stream. This can therefore
University, 2003, pp. 261-262.
cause a significant operational problem in the plant.
Poor penetration and high velocities in this region
could also result in a sudden lack of oxygen availability
in the core of the hot main gas stream. Thus,
optimization of the secondary air would be necessary to
achieve faster gaseous mixing.
In this combustion air control strategy, the secondary
air flow is calculated according to oxygen content or
boiler temperature. The selection block in Figure 2 is
used to select these two modes. If the boiler
temperature is high than certain value, it will switch to
temperature control, otherwise is oxygen content
control.
6 Conclusion
This paper has presented the control philosophy
applied at the MSW plant. The overall design
philosophy has been incorporated into the distributed
control system (DCS). This gives a plant with a good
combustion characteristic.
7 References
[1] Harmless Disposal of Garbage, National Bureau of
statistics of China, (2008), pp.1193-1197.
344
2008 International Conference on Intelligent Computation Technology and Automation
1. Introduction
Fig.1 Sketch map of SVG molding
Weld line is one of the defects occurring in
injection molded parts, which affects both the 2. Methodology
appearance and the strength of the products [1-2]. In
the multi-gated injection molding process, weld lines A three-stage optimization methodology, namely
will inevitably be present. If weld lines can’t be molding partitioning, optimum valve gates locations
avoided, they should be positioned at low-stress and determination and opening timings of valve gates
non-critical areas. adjusting, is proposed. The basic procedures are as
Zhong et al. [3] presented an approach to make the follows.
total length of the weld lines minimized and the
weld-line locations furthest away from the sensitive 2.1. Molding partitioning
places by applying genetic algorithm. Chen et al. [4]
presented an approach to apply fuzzy control logic in
controlling the weld line position for an injection
molded part. Zhai et al. [5] presented an approach to
specify the locations of the weld lines by sizing the
runners in a multi-gated injection molding with the
optimum gate locations. The methodology repositions
the weld lines to the desired locations by varying the
runner sizes.
Based on the above mentioned methods to control
the weld-line locations, this paper presents an approach
to effectively specify the locations of the weld lines by
exploiting sequential-valve-gate (SVG) molding.
Fig.1 shows a typical sequence in sequential valve Fig.2 Partitioning the molding into
gate molding. This is accomplished by opening the sub-moldings
single gate at the start of fill and allowing the flow to
extend radially outward. Once the arbitrary later time Weld lines are usually visual defects and structural
346
If we denote the volume of every sub-molding as: locations is listed in Fig.6.
V1 ,V2 ,…,VN (V1<V2<…<VN ), then the total filling
time may be expressed as: Reading desired weld-line locations
N
∑V i
t= i =1
(i = 1, 2,3,", N ) ,
ν Partitioning the molding
the opening timing of every valve gate may be
expressed as:
V − Vi −1
ti = i (i = 1, 2,3,", N ) , (2) Computing f of gate points in a sub-molding
ν
where ν is flow rate in injection molding.
Because of the complexity of the part geometry, Searching the minimum f in a sub-molding
the actual weld line will still be unconformable to the
desired position when the opening timing of every
valve gate is set according to Eq.2. At the same time, Searching all optimum valve-gate positions
a weld line isn’t always straight, so the difference
between the desired and the actual weld line couldn’t
be specifically represented. Evaluating weld-line positions according to ti
In order to effectively control the weld lines to
appear at the desired positions, a new representation is
presented to indicate the difference between the Repositioning by adjusting ti and γi
actual and the desired weld-line locations. Since a weld
line is formed at the location where two flows meet, the Fig.6 Flow chart of the proposed scheme
ratio of volume filled to the total volume of the
sub-molding indicates whether the actual weld line is at 3. Example
the desired location. Let Vfilled is the volume filled by a
valve gate within a sub-molding and Vi is the total An example is presented here to illustrate the
volume of the sub-molding. Define a ratio γi to approach. A part with two chambers connected by a
represent the index of conformity degree between the hinge as shown in Fig. 7 is studied. The dimensions of
actual and the desired weld-line locations: each chamber are 150mm × 100mm × 25mm with
V filled material Generic PP. The average wall thickness is
γi = (i = 1, 2,3,", N ) .
Vi 2.0mm. The processing condition are melt temperature
To have γi exactly equal to 1 is difficult, and an = 230℃, mould temperature = 40℃. This part is
iteration process is used to adjust ti so that the deviation molded by a two valve-gate injection mold. A weld line
of γi from 1 is minimized. The final weld-line positions is expected between the gates. As the weld line
are shown in Fig.5. significantly reduces the strength of the part, it should
not be across the hinge. The weld line is specified in
the left chamber as depicted in Fig.7.
A B
347
sub-moldings are subdivided into boundary and inner 4. Conclusions
points by means of the FEM software Moldflow. The
optimum valve-gate locations in A and B inner points Many approaches have been presented in weld line
are determined by means of the data analysis software positioning. Various objective functions and theories
Matlab. The calculation results show that G1 and G2 are used for optimization to control the weld-line
are the optimum valve-gate locations of A and B locations. These methods are not only complex but also
sub-moldings as shown in Fig.8. deep. Sequential-valve-gate molding is an alternative
and appropriated method to control the flow for weld
line positioning for multi-gated parts. The method is
not only simple but also maneuverable. The example
examined indicated that the proposed method is
effective in re-positioning the weld lines to desired or
specified regions of the part. So, the method is an
G1 G2 important reference and can be applied in engineering
practice.
5. Acknowledgements
This work is supported by Guangzhou S&T
Fig.8 Actual and desired weld-line locations
Planned Project under the grant 2007Z2-D9091. Many
people gave me support and help in the process of
Through calculation, the volume of A sub-molding
3 writing the paper. I’d like first to give my grate to my
is 35.1942cm , the volume of B sub-molding is
dear teacher, professor Mr.Ruan, who generously gave
35.1942cm . By setting the flow rate of 30cm3/s, the
3
me his kindly help and instructions during the whole
total filling time is 3s, the delay opening time of G1
process of my paper-writing. Then I’d like to give my
compared with G2 is 0.75s. The actual weld line isn’t many thanks to my classmates who helped me a lot
conformable to the desired position according to 0.75s with my information collecting and paper-polishing.
as shown in Fig.8. An iteration process is used to
control weld line to the desired locations by adjusting ti
and γi.
References
By setting the delay opening time of t = 1.3s, the
3 [1] W.R. Jong, and K.K. Wang, “Automatic interpretation of
volume filled by G1 is 34.5144cm , the ratio γ1 of weld lines and air traps in injection molding by synthesizing
volume filled by G1 to the total volume of A deterministic and heuristic knowledge”, ANTEC, May 7-11,
sub-molding is 0.9807; the volume filled by G2 is 1990, pp.197-202.
3
58.4761cm , the ratio γ2 of volume filled by G2 to the [2] S. Dairanieh, A. Haufe, H. J. Wolf, and G. Mennig,
total volume of B sub-molding is 1.0118. The deviation “Computer simulation of weld lines in injection molded
of γ1 and γ2 from 1 is minimized, so the final weld-line poly(methyl methacrylate)”, Polymer Engineering and
location is conformable with the desired location as Science, v 36, n 15, Mid-Aug, 1996, pp.2050-2057.
[3] H.D. Zhong, and Y.M Deng, “Optimization of length and
shown in Fig.9.
location of weld-line in injection molding based on genetic
algorithm”, China Plastics Industry, 2006(11), pp.27-32.
[4] M.Y. Chen, Y.C. Chen, and S.C. Chen, “To apply fuzzy
theory in the control of weld line of plastic injection
Molding”, Proceedings of the 2004 IEEE Conference on
Cybernetics and Intelligent Systems, 1-3 December, 2004,
pp.1137-1142.
[5] M. Zhai, Y.C. Lam, and C.K. Au, “Runner sizing and
weld line positioning for plastics injection molding with
multiple gates”, Engineering with Computers, 2006(21),
pp.218-224.
[6] H.Y. Xiang, S. Sun, and Y.X. Zhong, “Optimization of
gate position for plastic injection mold based on point set
distribution of part boundary”, Journal of Computer Aided
Fig.9 The final weld-line location of the model Design & Computer Graphics, 2003(12), pp.1544-1548.
348
2008 International Conference on Intelligent Computation Technology and Automation
350
The overall structure of freeway feedback ramp Where, ηI , ηP , ηD is the learning rate of
metering based on neuron adaptive PID control
algorithm is shown in Figure 3. integral, proportion and differential cell. The effect of
freeway feedback ramp metering based on neuron
adaptive PID control algorithm is influenced by the
selection of regulator parameter K , η I , η P , η D .
351
Where,
0.025 ≤ c ≤ 0.05 ⎫
⎪
0.05 ≤ L ≤ 0.1
*
⎪
x1(k) = e(k) ⎪
⎪⎪
x2 (k) =+e(k) = e(k) − e(k −1) ⎬ (12)
⎪
x3 (k) =+ e(k) = e(k) − 2e(k −1) + e(k − 2)⎪
2
352
Ramp metering is implemented in many countries.
There are no uniform or standard evaluation criteria
and the measures of effectiveness (MOE) vary with the
system objectives. But it is clear that if neural network
is properly implemented, ramp metering can
significantly reduce the oscillator of traffic density and
the ramp metering and maintain a desired level, which
can prevent congestion and increase traffic throughput.
Furthermore, due to the advantages of neural
network, It is a meaningfully topic to adopt artificial
neural networks into the system wide ramp metering
strategies. Neural network-based ramp metering is
shown to be able to directly handle nonlinear systems
without resorting to linearization. It can also be tuned
Figure 8. Curve of traffic flow entering the on-line, which makes them adaptive to a changing
mainline section from the upstream environment.
At the same initial state, ALINEA, Freeway
feedback ramp metering based on neuron adaptive PID 6. References
and PSD control algorithms are adopt respectively. The
curves of ramp metering are shown in Figure 9. [1] V. Pravin, “Reducing highway congestion: an empirical
approach, Special Issue: Fundamental Issue in Control”,
European Journal of Control, SPRINGER Country of
publication Great Britain, Great Britain, 2005, pp.301-309.
5. Conclusions
353
2008 International Conference on Intelligent Computation Technology and Automation
Yun Chen
College of Electronic Engineering, Naval University of Engineering, Wuhan 430033, China
mathyun@sina.com
Xiaofeng Wu
Guangzhou Naval Academy, Guangzhou 510430, China;
College of Electronic Engineering, Naval University of Engineering, Wuhan 430033, China
Zhifang Gui
College of Electronic Engineering, Naval University of Engineering, Wuhan 430033, China
355
⎛ s11 s12 s13 s14 ⎞ optimization issue is to choose μ1 > 0 and μ 2 > 0
⎜ ⎟
⎜ s12 s22 0 0 ⎟ such that the value of the function,
S = H ( x) P + PH ( x ) = ⎜
T
p,
s 0 s33 0 ⎟ C(μ1, μ2 ) = −α + 1
[μ (r + ρ3 ) +α]2 μ 1ρ22
+ +
(γ − μ2 )2
⎜ 13 ⎟ ,
⎜s ⎟ 4μ 1(1+ k2 ) 4(β + k3 ) 4μ 2(α + k4 )
⎝ 14 0 0 s44 ⎠
is minimal.
where, s11 = −2(α +k1) , s22 = −2μ1(1+ k2 ) ,
Let
s33 = −2μ1(β + k3) , s44 = −2μ2(α +k4) , s12 = α + μ1(r − x3) ,
[ μ (r + ρ 3 ) + α ] 2 μ1 ρ 2 2
s13 = μ1x2 , s14 = γ − μ2 . Δ1 ( μ1 ) = 1 +
4 μ1 (1 + k 2 ) 4( β + k 3 )
Let
⎡ (r + ρ 3 ) 2 ρ22 ⎤ α2 (r + ρ3 )α
⎛s s ⎞ ⎛s s14 ⎞ =⎢ + ⎥ μ1 + + ,
S11 = ⎜⎜ 11 12 ⎟⎟ , S12 = ⎜⎜ 13 ⎟ , ⎢⎣ 4(1 + k2 ) 4(β + k3 ) ⎥⎦ 4(1 + k 2 )μ1 2(1 + k 2 )
⎝ s12 s22 ⎠ ⎝ 0 0 ⎟⎠
(γ − μ2 )2 μ2 γ2 γ
⎛s 0 ⎞ Δ2 (μ2 ) = = + − .
S 22 = ⎜⎜ 33 ⎟⎟ . 4μ2 (α + k4 ) 4(α + k4 ) 4(α + k4 )μ2 2(α + k4 )
⎝ 0 s 44 ⎠
From the Lemma, we can respectively obtain that
According to Schur theorem in matrix theory [27],
the minima of the Δ1 and Δ 2 , as follows,
the above matrix S is negative definite if and only if
⎛ α2 ⎞
⎛s 0 ⎞ ⎛ − 2μ1(β + k3 ) 0 ⎞ ⎜ ⎟
S22 = ⎜⎜ 33 ⎟⎟ = ⎜⎜ ⎟ < 0 , (15) ⎜ ⎟
⎝ 0 s44 ⎠ ⎝ 0 − 2μ2 (α + k4 )⎟⎠ Δ 1m = Δ1 ⎜
4 (1 + k 2 )
⎟
and ⎜ (r + ρ 3 ) 2
ρ2 2
⎟
⎜ +
⎛ 2 2 ⎞ ⎝ 4 (1 + k 2 ) 4( β + k 3 ) ⎟⎠
−1 T ⎜ s11 − s13 − s14 s12 ⎟
S11 − S12 S 22 S12 = ⎜ s33 s 44 ⎟ < 0 . (16) α 1 ⎡ (r + ρ 3 ) 2 ρ 2 2 ⎤ ( r + ρ 3 )α
⎜ s22 ⎟⎠ = ⎢ + ⎥+ ,
⎝ s12 2 (1 + k 2 ) ⎣⎢ 1 + k 2 β + k 3 ⎦⎥ 2(1 + k 2 )
It is obvious that inequality (15) is satisfied if both
the inequalities (13) and (14) hold. Δ 2 m = Δ 2 (γ ) = 0 .
Again, inequality (16) is satisfied if and only if As a result, the minimum C * of C(μ1 , μ 2 ) for
s22 = −2 μ1 (1 + k 2 ) < 0 , (17) μ1 > 0 and μ 2 > 0 is
and
C * = −α + Δ1m + Δ 2 m
s 2 s 2 s 2 s 2 s 2
s11 − 13 − 14 − s12s22−1s12T = s11 − 13 − 14 − 12 ⎡ (r + ρ 3 ) 2
s33 s44 s33 s44 s22 α 1 ρ 2 2 ⎤ ( r + ρ 3 )α
= −α + ⎢ + ⎥+ .
2 (1 + k 2 ) ⎣⎢ 1 + k 2 β + k 3 ⎦⎥ 2(1 + k 2 )
s12 2 s13 2 s14 2
= −2(α + k1 ) − − − < 0,
s 22 s33 s44 Based on the above, the synchronization criterion
(11)-(14) can be optimized to produce a sharper
i.e.,
criterion, presented in the following corollary.
s122 s132 (γ − μ2 ) 2 Corollary 1. The synchronization scheme (3) achieves
k1 > −α + + + . (18)
4μ1 (1 + k2 ) 4μ1 (β + k3 ) 4μ2 (α + k4 ) global chaos synchronization if there exists a coupling
It follows from the Assumption that matrix K = diag{k1, k2 , k3 , k4 } such that
s13 2 = ( μ1 x2 ) 2 ≤ μ12 ρ 2 2 , α 1 ⎡(r + ρ3 )2 ρ2 ⎤ (r + ρ3 )α
2
k1 > −α + ⎢ + ⎥+ , (19)
s12 2 = [α + μ1 (r − x3 )]2 ≤ [μ1 (r + ρ 3 ) + α ]2 . 2 (1+ k2 ) ⎢⎣ 1+ k2 β + k3 ⎥⎦ 2(1+ k2 )
Thus, both the inequalities (17) and (18) hold k 2 > −1 , (20)
provided that both the inequalities (11) and (12) are
k3 > − β , (21)
satisfied.
This completes the proof. k 4 > −α . (22)
Remark. The criterion obtained above is only The following criterion is related to a simple
sufficient but not necessary for the synchronization. In coupling matrix.
practice, it is always expected that the sufficient Theorem 2. The synchronization scheme (3) achieves
criterion can provide a wide range of the coupling global chaos synchronization if there exist the
coefficients k i (i = 1, 2, 3, 4) . Such a criterion is thought
to be less conservative or sharper. Thus, an interesting
356
constants μ i > 0 (i = 1, 2) and a coupling matrix
K = diag{k1 , 0, 0, 0} such that
[μ1 (r + ρ3 ) + α ]2 μ1ρ 2 2 (γ − μ2 ) 2
k1 > −α + + + .
4μ1 4β 4μ2α
(23)
Similar to Corollary 1, criterion (23) can be
optimized, as seen in Corollary 2.
(b)
Corollary 2. The synchronization scheme (3) achieves
global chaos synchronization if there exists a coupling
matrix K = diag{k1 , 0, 0, 0} such that
α ρ2 2 (r + ρ3 )α
k1 > −α + (r + ρ3 ) 2 + + . (24)
2 β 2
3. Numerical simulations
(b)
Consider a Lorenz-Stenflo system with the Figure 1. The chaotic trajectories of the master and
parameters α = 1.0 , γ = 1.5 , r = 26.0 and β = 0.7 . slave Lorenz-Stenflo systems. (a) Master system; (b)
Slave system.
The initial conditions of the master and slave systems
are freely chosen as
( x1 (0), x2 (0), x3 (0), x4 (0)) = (5, 1, 25, − 2) ,
( z1 (0), z 2 (0), z3 (0), z 4 (0)) = (−2, − 8, 10, 2.4) ,
respectively. The chaotic trajectories of the master and
slave systems are illustrated in Figure 1. Based on the
optimized criterion (19)-(22), we obtain a coupling
matrix K = diag{33.0, 1.0, 2.5, 3.0} , which can lead to
the synchronization of the master and slave chaotic Figure 2. Chaos synchronization of the master and
systems, as shown in Figure 2. Based on the optimized slave Lorenz-Stenflo systems coupled by K =
criterion (24), we obtain another coupling matrix diag{ 33.0, 1.0, 2.5, 3.0} .
K = diag{67.5, 0, 0, 0} . The synchronization evolution
of the master and slave chaotic systems via the latter
coupling matrix is shown in Figure 3.
4. Conclusion
Some sufficient criteria for global chaos synchro-
nization of the master-slave Lorenz-Stenflo systems
via the linear state error feedback control have been
obtained. Optimization technique has been applied to
(a) improve the sharpness of these criteria. The illustrated
examples have verified the effectiveness of the criteria.
All the obtained criteria are expressed as the form of
357
algebraic inequality, showing their advantage in Lur’e systems via replacing variables control”, J.
applications. Control Theory and Applications, vol. 3, 2004, pp. 259-
266.
Acknowledge [14] X. F. Wu and M. H. Wang, “Robust synchronization of
chaotic Lur’e systems via replacing variables control”,
Int. J. Bifurcation and Chaos, vol. 16, 2006, pp. 3421-
This wok was supported by the National Nature 3433.
Science Foundation of China under grant No. [15] Y. M. Lei, W. Xu, J. W. Shen and T. Fang, “Global
60674049. synchronization of two parametrically excited systems
using active control”, Chaos, Solitons and Fractals, vol.
References 28, 2006, pp. 428-436.
[16] J. Lu, X. Han, Y. Li and M. Yu, “Adaptive coupled
[1] L. M. Pecora and T. L. Carroll, “Synchronization in synchronization among multi-Lorenz systems family”,
chaotic systems”, Phys. Rev. Lett., vol. 64, no. 8, 1990, Chaos, Solitons and Fractals, vol. 31, 2007, pp. 866-
pp. 821-824. 878.
[2] R. Brown and N. F. Rulkov, “Designing a coupling that [17] F. M. Kakmeni, S. Bowong, C. Tchawous and E.
guarantees synchronization between identical chaotic Kaptouom, “Chaos control and synchronization of a Φ6-
systems”, Phys. Rev. Lett., vol. 78, 1997, pp. 4189-4192. Van der Pol oscillator”, Phys. Lett. A, vol. 332, 2004, pp.
[3] D. J. Gauthier and J. C. Bienfang, “Intermittent loss of 305-323.
synchronization in coupled chaotic oscillators: Toward a [18] Y. Yu and S. Zhang, “Adaptive backstepping
new criterion for high-quality synchronization”, Phys. synchronization of uncertain chaotic system”, Chaos,
Rev. Lett., vol. 77, 1996, pp. 1751-1754. Solitons and Fractals, vol. 21, 2004, pp. 643-649.
[4] Z. M. Ge and W. Y. Leu, “Chaos synchronization and [19] J. P. Cai, X. F. Wu and S. H. Chen, “Synchronization
parameter identification for loudspeaker systems”, criteria for non-autonomous chaotic systems via
Chaos, Solitons and Fractals, vol. 21, 2004, pp. 1231- sinusoidal state error feedback control”, Physica Scripta,
1247. vol. 75, 2007, pp. 397-387.
[5] X. F. Wu, J. P. Cai and M. H. Wang, “Master-slave [20] L. Stenflo, “Generalized Lorenz equations for acoustic-
chaos synchronization criteria for the horizontal gravity waves in the atmosphere”, Physica Scripta, vol.
platform systems via linear state error feedback control”, 53, 1996, pp. 83-84.
J. Sound and Vibration, vol. 295, 2006, pp. 378-387. [21] Z. Liu, “The first integral of nonlinear acoustic gravity
[6] J. Sun and Y. Zhang, “Some simple global wave equation”, Physica Scripta, vol. 61, 2000, pp. 526.
synchronization criterions for coupled time-varied [22] S. Banerjee, P. Saha and A. R. Chowdhury, “Chaotic
chaotic systems”, Chaos, Solitons and Fractals, vol. 19, scenario in the Stenflo equations”, Physica Scripta, vol.
2004, pp. 93-98. 63, 2001, pp. 177-180.
[7] G. P. Jiang and W. K. S. Tang, “A global [23] S. Banerjee, P. Saha and A. R. Chowdhury, “On the
synchronization criterion for coupled chaotic systems application of adaptive control and phase
via unidirectional linear error feedback approach”, Int. J. synchronization in nonlinear fluid dynamics”, Int. J.
Bifurcation and Chaos, vol. 12, 2002, pp. 2239-2253. Nonlinear Mech, vol. 39, 2004, pp. 25-31.
[8] G. P. Jiang, W. K. S. Tang and G. Chen, “A simple [24] U. E. Vincent, “Synchronization of identical and non-
global synchronization criterion for coupled chaotic identical 4-D chaotic systems using active control”,
systems”, Chaos, Solitons and Fractals, vol. 15, 2003, Chaos, Solitons and Fractals, in press, doi: 10. 1016/j.
pp. 925-935. chaos. 2006.10. 005.
[9] Y. Yu and S. Zhang, “The synchronization of linearly [25] P. F. Curran and L. O. Chua, “Absolute stability theory
bidirectional coupled chaotic systems”, Chaos, Solitons and the synchronization problem”, Int. J. Bifurcation
and Fractals, vol. 22, 2004, pp. 189-197. and Chaos, vol. 7, 1997, pp. 1357-1382.
[10] X. Wu, G. Chen and J. Cai, “Chaos synchronization of [26] J. E. Slotine and W. P. Li, Applied nonlinear control,
the master-slave generalized Lorenz systems via linear China Machine Press, Beijing, 2004.
state error feedback control”, Physica D, vol. 229, 2007, [27] R. A. Horn and C. R. Johnson, Matrix Analysis,
pp. 52-80. Cambridge University Press, Cambridge, UK, 1985.
[11] J. A. Lu, X. Q. Wu and J. H. Lü, “Synchronization of a
unified chaotic system and the application in secure
communication”, Phys. Lett. A, vol. 305, 2002, pp. 365-
370.
[12] X. F. Wu, Y. Zhao and S. Zhou, “Lag synchronization
of Lur’e systems via replacing variables control”, Int. J.
Bifurcation and Chaos, vol. 15, 2005, pp. 617-635.
[13] X. F. Wu, Y. Zhao and X. H. Huang, “Some new
algebraic criteria for lag synchronization of chaotic
358
2008 International Conference on Intelligent Computation Technology and Automation
360
T
A ( t − kT ) A ( t − kT ) obtained that
x0 ≡ 0, ∀t ∈ [ kT , kT + T )
T
x0 e QNe (8) T
x ( kT ) T
A ( t − kT ) A ( t − kT ) x ( kT )
for some T > 0, then x0 = 0. A ( t − kT )
e QNe A ( t − kT )
e x ( kT ) e x ( kT )
Proof Let
T
A ( t − kT ) A ( t − kT )
ϕ (t ) = x0 e x0 .
T
QNe
≡ 0, ∀t ∈ [ kT , kT + T ),
Firstly, we will prove that
T
A ( t − kT ) A ( t − kT )
which contradicts Lemma 1. Therefore, x ( kT ) = 0.
ϕ (t ) = x0 e x0 , i = 0, 1, " , m,
(i) T
Si e (9) Furthermore, (12) holds from (13). ,
where Si is defined as in Assumption 2. Lemma 3 Let system (1) satisfy Assumption 2, T > 0 ,
It is proceeded by induction on i . From (8) and the and x (t ) be a nonzero solution of the closed-loop
system formed by (1) and (3). And denote
definitions of ϕ (t ) and S 0 , it is easy to see that (9)
K = {k | x ( kT ) ≠ 0, k is a nonnegative integer} ,
holds if i = 0. Assume that (9) holds for i = p , and so
∫ ( xˆ (t )QNxˆ (t ) ) dt, ∀k ∈ K ,
kT + T 2
it is Bk = T
T
kT
A ( t − kT ) A ( t − kT )
ϕ ( t ) = x0 e x0 .
( p) T
S pe then inf Bk = μ > 0.
k ∈K
When i = p + 1, one has
Proof Let
= {ψ (t ) ∈ X | ψ ( kT ) ≠ 0, ∀k ∈ K } ,
T
( p +1) A ( t − kT ) A ( t − kT )
ϕ ( t ) = x0 e
T T
A S pe x0 X
+ x0T e A
T
( t − kT )
S p e A ( t − kT ) Ax0 where X is the set consisting of all solutions of the
is
closed-loop system formed by (1) and (3). Then X
from the above equation, and hence
( p +1)
T
A ( t − kT ) A ( t − kT ) . If we write
not empty, since x (t ) ∈ X
ϕ ( t ) = x0 e ( A S p + S p A) e
T T
x0
= x0T e A
T
( t − kT )
S p +1e A ( t − kT ) x0 {
G = ψ ( kT ) | ψ (t ) ∈ X
,k ∈K , }
then G is a subset of the unit sphere S in \ . And
A ( t − kT ) A ( t − kT ) n
from (6) and e A = Ae . . So (9) holds.
Secondly, putting t = kT into (9), we have define a scalar function B (⋅) on S satisfying
x0 Si x0 = 0, i = 0, 1, " , m.
(
B ψ ( kT ) = ) (ψ (t )QNψ (t ) ) dt,
T kT + T 2
∫
T
kT
These identities can be put into a matrix from (14)
x 0 [ S 0 x0
T
S1 x0 " S m x0 ] = 0. (10) ∀ψ ( kT ) ∈ G.
This, together with Assumption 2, implies that It is easy to see taht the closed-loop system formed
x0 = 0. , by (1) and (3) has the form
Lemma 2 Let system (1) satisfy Assumption 2, T > 0 , x (t ) = Ax (t ) − ρ ( xˆ T (t )QNxˆ (t ) ) Nx (t ). (15)
and k be a nonnnegtive integer, If x (t ) is a solution Since the right-hand side of the above equation has
of the closed-loop system formed by (1) and (3), then first-order derivative with x (t ), it follows that the
xˆ (t )QNxˆ (t ) ≡ 0, ∀t ∈ [ kT , kT + T )
T
(11) arbitrary solution ψ (t ) ∈ X of (15) depends
if and only if continuously on its initial condition ψ ( kT ). B (⋅) can
x (t ) ≡ 0, ∀t ∈ [ kT , kT + T ). (12)
be viewed as continuous function with ψ (t ), and thus
Proof The sufficiency is obvious. Now we will show
the necessity. one can deduce that B (⋅) is continuous with ψ ( kT ).
One has u (t ) ≡ 0, ∀t ∈ [ kT , kT + T ) from (3) and
Since the domain of B (⋅) is compact, it follows that
(11). So the closed-loop system formed by (1) and (3)
B (⋅) has the minimum value η on S . Moreover, it is
such that
x (t ) = Ax (t ), ∀t ∈ [ kT , kT + T ), easy to see that inf B (ψˆ ( kT )) ≥ η ≥ 0 from the
ψˆ ( kT )∈G
and hence
A ( t − kT )
definition of B (⋅).
x (t ) = e x ( kT ), ∀t ∈ [ kT , kT + T ). (13)
If there exist k 0 ∈ K and ψˆ 0 (t ) ∈ G such that
If x ( kT ) ≠ 0 , by substituting (13) into (11), it is
361
( )
B ψ 0 ( k 0T ) = 0, that is V ( kT + T ) − V ( kT )
( k +1) T
( ) = ∫ x (t )( A Q + QA) x (t ) dt
2 T T
k0T + T
∫ ψ 0 (t )QNψ 0 (t ) dt = 0.
T
(16) kT
k0T
∫ ( xˆ (t )QNxˆ (t ) )
kT + T 2
−2 ρ
2
to ψ 0(t )
T
According continuously with t [7], x (t ) dt
kT
(ψ (t )QNψ (t ) ) ρ
2
∫ ( xˆ (t )QNxˆ (t ) ) V (t ) dt
T kT + T 2
is nonnegative and continuous with ≤ −2 T
λmax
0 0 kT
ψ 0 (t )QNψ 0 (t ) ≡ 0, ∀t ∈ [ k 0T , k 0T + T ).
2
≤ −2 V ( kT + T )
T T
(19)
λmax kT
= x (t )( A Q + QA) x (t )
T T
(21) and the definition of V (t ), one has
−2 ρ ( xˆ (t )QNxˆ (t ) ) x (t ) .
T 2 2
2
(18) Px ( kT ) = x ( kT ) P Px ( kT )
T T
362
where a = A . Taking the time derivative of the
2
6. Acknowledge
= x (t ) x (t ), one obtains
T
identity x (t )
d This work is supported by the Postdoctoral Fund of
x (t ) = 2 x (t ) x (t ) ≤ 2 x (t ) x (t ) , (24)
T
2 x (t ) Heilongjiang Province.
dt
where the inequality results from the Schwarz 7. References
inequality. Cancelling x (t ) from (24) and using (23),
one has [1] Chen M. S., Exponential stabilization of a constrained
bilinear system. Automatica, Vol. 34, No. 8, 1998, pp. 989-
d 992.
x (t ) ≤ ( a + ρ n 2q ) x (t ) .
dt [2] Bruni C., Dipillo G., and Koch G., Bilinear systems: An
appealing class of “nearly" linear systems in theory and
And it concludes that application. IEEE Trans. Auto. control, Vol. 19, No. 2, 1974,
( a + ρ n 2q )( t − kT )
x (t ) ≤ e x ( kT ) pp. 334-348.
[3] Genesio R. and Tesi A., The output stabilization of SISO
T ( a + ρ n 2q )
≤e x ( kT ) , ∀t ∈ [ kT , kT + T ). (25) bilinear systems. IEEE Trans. Auto. control, Vol. 33, No. 10,
−1 −1
1988, pp. 950-952.
Since x ( kT ) = P Px ( kT ) ≤ P Px ( kT ) , one has [4] Khapalov A. Y. and Mohler R. R., Reachable sets and
controllability of bilinear time-invariant systems: A
T ( a + ρ n 2q ) −1
x (t ) ≤ e ( θ) P x (0) ,
k
P qualitative approach. IEEE Trans. Auto. control, Vol. 41, No.
(26) 9, 1996, pp. 1342-1346.
∀t ∈ [ kT , kT + T ) [5] Longchamp R., Controller design for bilinear systems.
from (22) and (25). It is easy to see that there exists a IEEE Trans. Auto. control, Vol. 25, No. 3, 1980, pp. 547-548.
(T + T )
[6] Lu G. P. and Zheng Y. F., Global stabilizability of
γ ∈ (0, 1) such that θ =γ k
, and hence bilinear systems (in Chinese). Acta Automatica Snica, Vol.
( kT + T ) ln γ
25, No. 6, 1996, pp. 820-823.
( θ) =e
k
. This, together with (26), implies [7] Moheer R. R., Bilinear Control Processes, New York and
that London: Academic, 1973.
T ( a + ρ n 2q ) −1 ( kT + T ) ln γ
[8] Rahn C. D., Stabilizability conditions for strictly bilinear
x (t ) ≤ e P e P x (0) , systems with purely imaginary spectra. IEEE Trans. Auto.
(27) control, Vol. 41, No. 1, 1996, pp. 1346-1347.
∀t ∈ [ kT , kT + T ). [9] Ryan E. P. and Buckingham N. J., On asymptoatically
By using (27) and stabilizing feedback control of bilinear systems. IEEE Trans.
( kT + T ) ln γ t ln γ Auto. control, Vol. 28, No. 8, 1983, pp. 863-864.
e ≤e , ∀t ∈ [ kT , kT + T ), [10] Xu, D. X., Research on optimal control of bilinear
one obtains system (in Chinese). Master Degree Thesis of Xi’an
T ( a + ρ n 2q ) −1 t ln γ University of Technology, 2005.
x (t ) ≤ e P P e x (0) . (28) [11] Zhang, X. H. and Zhang, Q. L., Analysis of stability
T ( a + ρ n 2q ) −1 control for bilinear singular system (in Chinese). J. Systems
Let α = e P P , β = − ln γ , it is easy to Engineering, Vol. 21, No. 2, 2006, pp. 192-195.
see that α > 0, β > 0. From (28) one has
−βt
x (t ) ≤ α e x (0) .
Hence the closed-loop system formed by (1) and (3) is
globally exponentially stable. ,
5. Conclusion
The globally exponentially stabilizing control
problem of a class of single-input continuous-time
bilinear systems is studied. For the systems, we give a
nonlinear control. Under weaker premise than that used
by [1], the globally exponential stability of the close-
loop systems under the control is investigated by using
Lyapunov’s stability theory. Hence, the conclusion of
this paper can be widely applied in many fields.
363
2008 International Conference on Intelligent Computation Technology and Automation
x ( t ) = φ ( t ) , t ∈ ⎡ − max hi , 0 ⎤ ,
perturbations is inevitable for real systems. Thus,
robust performance and anti-perturbation capability ⎣⎢ i =1,2,...,k ⎦⎥
should be considered in the system design. Guaranteed y ( t ) = Cx ( t ) + Du ( t ) .
cost control holds a definite quadratic performance
where x ( t ) ∈ R n is state vector; φ ( t ) is initial condition.
upper bound or minimal quadratic stability. and H∞
control is an effective method for perturbations. So, hi ( t ) denotes time-varying-delay , i = 1,… , k ,
combining the characters of both guaranteed cost which meets
control and H ∞ control, the closed loop time-delay 0 ≤ hi ( t ) ≤ hi , h ( t ) ≤ ηi < 1, i = 1,… , k . (2)
systems will have better dynamic capability for time-
Ai , B, H , C i = 0,… , k is constant matrix with
delay uncertain system. Therefore, guaranteed cost
control attracts many researchers’ interest [1-6]. appropriate dimensions; ΔAi , i = 1,… , k denotes
Petersen[1] adopts Riccati equation methods of uncertain matrix with appropriate dimensions and such
uncertain system with quadratic stabilization, forms as fellows
providing optimal guaranteed cost controller rule, ΔAi = NF ( t ) Ei ,
where system is no delays. Guaranteed cost controller (3)
F ( t ) = diag { F0 ( t ) , F1 ( t ) , … , Fk ( t ) }
for time-invariant delay system with parameter
uncertainties is studied by scholars, and some results where D and Ei , i = 1,… , k is real matrix with
are achieved by matrix inequation technique [2, 3]. For appropriate dimensions; Fi ( t ) ∈ R ni ×ni is time-varying
where A0 = A0 + BK , C = C + DK . Lii = − ( 1 − ηi ) Ti , Li = AV
i − Si , Lh = H , Lhh = γ ,
2
Lemma 1 [7]
: Assume that a ( ⋅) ∈ R , b ( ⋅) ∈ R and
na nb
N a = ( A0V + BU )T , Nb = ( CV + DU )T ,
N ( ⋅) ∈ R na ×nb are defined on the interval Ω . If G = diag { a0VG0T , a1VG1T , … , akVGkT } ,
⎡X Y ⎤ na ×na LG = diag { ρ −1 I , ρ −1 I … , ρ −1 I } ,
⎢ * Z ⎥ ≥ 0 for any matrices X ∈ R , Y ∈ R na ×nb and
⎣ ⎦ 1 − ηi
W = ∑ i =1
k
V ,, i = 1,… , k .
Z ∈ R nb ×nb , then the following holds: hi
Then the system (9) can realize guaranteed cost robust
⎡a ( s )⎤ ⎡ X Y − N ⎤ ⎡a ( s )⎤
T
dimensions with FF T ≤ I . Then, for any scalar ε > 0 , System (9) can be rewritten as
Q + HFE + E F H < 0 T T T
holds if there exists
k
(
x ( t ) = A0 + ∑ i =1 Ai x ( t ) ) (15)
Q + ε HH + ε E E < 0.
-1 T T
−∑
k
A
t
∫ x ( s ) ds + f ( t ) + Hw ( t ) .
i =1 i t − hi ( t )
365
Choose Lyapunov functional V = V1 + V2 + V3 , where G11 = PA0 + A0T P + ∑ i =1 ( hi X i + Yi + YiT + Qi ) + A0T ZA0 ,
k
V1 = xT ( t ) Px ( t ) , V3 = ∑
t
∫
k
i =1 t − hi ( t )
xT ( s ) Qi x ( s ) ds. G12 = ⎡⎣ PA1 − Y1 + A0T ZA1 , … , PAk − Yk + A0T ZAk ⎤⎦ ,
V2 = ∑ i =1
1 0 t G13 = P + A0T Z , G33 = Z , G23 = ⎡⎣ A1T Z1 , … , AkT Z ⎤⎦ ,
1 − ηi ∫− hi ( t ) ∫t + r
k
xT ( s ) Px ( s ) dsdr ,
⎡ L1 + A1T ZA1 A1T ZA2 ,… A1T ZAk ⎤
Along the solution of V we obtain ⎢ ⎥
A2T ZA1 A2T ZAk
G22 = ⎢ ⎥,
V1 = 2 xT ( t ) P ∑ i =0 Ai x ( t ) + 2 xT ( t ) Pf ( t )
k ⎢ ⎥
(16) ⎢ ⎥
⎢⎣ AkT ZA1 AkT ZA2 ,… Lk + AkT ZAk ⎥⎦
+2 xT ( t ) PHw ( t ) − 2∑ i =1 xT ( t ) PAi ∫
k t
x ( s ) ds.
t − hi ( t )
Li = − ( 1 − ηi ) Qi , i = 1, 2,… , k .
Defining a ( ⋅) , b ( ⋅) and N in (14) as a ( s ) = x ( t ) ,
let Ξ 0 ( t ) = Ξ0 ( t ) + z T ( t ) diag { R, 0, 0 } z ( t ) , 则有
b ( s ) = x ( s ) and N i = PAi for all t − τ i ( t ) ≤ s ≤ t , and
⎡ G11 G12 G13 ⎤
applying Lemma 1 will supply Lemma 1 we have ⎢ T ⎥
t Ξ 0 ( t ) = z T ( t ) ⎢ G12 G22 G23 ⎥ z ( t ) ,
−2 xT ( t ) PAi ∫ x ( s ) ds ≤
t − hi ( t ) ⎢⎣ G13
T T
G23 G33 ⎥⎦
⎛ hi X i + Yi − PAi ⎞
xT ( t ) ⎜ ⎟ x ( t ) + 2 x ( t )( PAi − Yi ) (17)
T where G11 = G11 + Q0 . Inequation (5) can rewritten as
⎝ +Yi − Ai P + Qi
T T
⎠
t
Ξ1 ( t ) = z T ( t ) diag ⋅ (
⋅x ( t − hi ( t ) ) + ∫ x ( s ) Px ( s ) ds.
T (21)
t − hi ( t ) − a02G0T G0 , −a12 G1T G1 ,… , −ak2 GkT Gk , I ) ⋅ z ( t ) ≤ 0.
also By lemma 2,if ρ > 0 let
V2 ≤ ∑ i =1 hi / ( 1 − ηi ) xT ( t ) Px ( t )
k
Ξ 0 ( t ) − ρΞ1 ( t ) = z T ( t ) Ξz ( t ) < 0, (22)
−∑
t
∫
k
i =1 t − hi ( t )
xT ( s ) Px ( s ) ds where
⎡ G11 G12 G13 ⎤
( )
T (18)
= A0 x ( t ) + ∑ i =1 Ai x ( t − hi ( t ) ) + f ( t ) + Hw ( t ) ⎢ T ⎥ ⎡ Xi Yi ⎤
k
Ξ = ⎢ G12 G22 G23 ⎥ , ⎢ T ≥ 0, i = 1, 2,..., k
⎣ Yi P ⎥⎦
(
×Z A0 x ( t ) + ∑ i =1 Ai x ( t − τ i ( t ) ) + f ( t ) + Hw ( t )
k
) ⎢⎣ G13
T T
G23 G33 ⎥⎦
−∑ i =1 ∫
k t
xT ( s ) Px ( s ) ds, G11 = G11 + Q0 + ρ a02 G0T G0 , G33 = Z − ρ I ,
t − hi ( t )
⎡ L1 + A1T ZA1 A1T ZA2 ,… ⎤
A1T ZAk
h
k
⎢ ⎥
where Z = ∑ i P , and A2T ZA1 A1T ZAk
1 − ηi G22 =⎢ ⎥,
i =1 ⎢ ⎥
⎢ ⎥
V3 ≤ ∑
k
i =1
xT t Qi x ( ) (t ) ⎢⎣ AkT ZA1 Ak ZA2 ,… Lk + Ak ZAk ⎥⎦
T T
(19)
−∑ Li = − ( 1 − ηi ) Qi + ρ ai2 GiT Gi , i = 1, 2,… , k.
k
i =1
(
1 − ηi xT ) ( t − hi ( t ) ) Qi x ( t − hi ( t ) ).
then Ξ 0 ( t ) < 0 ,that is , V ≤ Ξ0 ( t ) < 0 holds for all
When w ( t ) = 0 , we have
z ∈ R 3n − { 0 } satisfying (15). Based on Lyapunov-Kra
V = V1 + V2 + V3 ≤ zT ( t ) Ξ 0 z ( t ) = Ξ 0 ( t )
sovskii stability theorem, (22) means equation (9) is gr
⎡ G11 G12 G13 ⎤ (20) adual stable at w ( t ) = 0 . By V ≤ Ξ0 ( t ) < 0 we obtain
= z ( t ) ⎢ G12
T T
G22 G23 ⎥ z ( t )
⎢ ⎥ V ≤ Ξ0 ( t ) − z T ( t ) diag { Q0 , 0, 0 } z ( t )
⎣⎢ G13 G23 G33 ⎦⎥
T T
366
J ≤ V ( 0 ) = ∑ i =1
1 0 0 T ⎡ Ω P A0T Z ⎤
1 − ηi ∫− hi ∫r
k
φ ( s ) Pφ ( s ) dsdr L1 Lk Lh
⎢ T ⎥
⎢ L1 L11 0 0 0 0 A1T Z ⎥
+ φ T ( 0 ) Pφ ( 0 ) + ∑ i =1 ∫
k 0
φ T ( s ) Qiφ ( s ) ds = J ∗ . ⎢ 0 0 0 0 ⎥
− hi
⎢ T ⎥
We now prove y ( t ) 2 ≤ γ w ( t ) 2 . Set zero initial ⎢ Lk 0 0 Lkk 0 0 Ak Z ⎥ < 0 , (28)
T
where
sides of equation (27) with diag { P −1 , P −1 } , and
z T ( t ) = ⎡⎣ xT ( t ) , qT ( t ) , f T ( t ) , wT ( t ) ⎤⎦ ,
introduce variables
qT ( t ) = ⎡⎣ xT ( t − h1 ( t ) ) , , xT ( t − hk ( t ) ) ⎤⎦ ,
U = KP −1 , V = P −1 , W = Z −1 , Ri = P −1 X i P −1 ,
U11 = C T C + G11 , G14 = A0T ZH , Si = P −1Yi P −1 和 Ti = P −1Qi P −1 , we get equation (10)
T
G24 = ⎣⎡ H T ZA1 , … , H T ZAk ⎦⎤ , 1 − ηi
and equation (11), where W = ∑ i =1
k
V ,, i = 1,… , k .
G34 = H Z , G44 = H ZH − γ I .
T T 2 hi
□
Let Π 0 ( t ) = Π 0 ( t ) + z T ( t ) diag { Q0 , 0, 0, 0 } , and
In the following, the condition of robust
inequation (5)can be rewritten as stabilization for closed loop system (9) with state
Π1 ( t ) = z T ( t ) ⋅ diag (−a02 G0T G0 , feedback is studied..
(25)
− a12G1T G1 ,… , −ak2 GkT Gk , I , 0) ⋅ z ( t ) ≤ 0. Theorem 2: Let 0 ≤ hi ( t ) ≤ hi , hi ( t ) ≤ ηi < 1 ,
By lemma 3, if ρ > 0 let i = 1,… , k for all time-varying delay, if there exist
Π 0 ( t ) − ρΠ1 ( t ) = z T ( t ) Π z ( t ) < 0, that is Δ = diag [ ε 0 I n 0 , ε1 I n1 , …, ε k I nk ] > 0 ,
V > 0, Ti > 0, Ri , Si ,Wi ,U 和 ρ > 0 i = 1,… , k ,which
⎛ U11 G12 G13 G14 ⎞
⎜ T ⎟ make the below hold
G G22 G23 G24 ⎟
Π = ⎜ 12 , (26) ⎡ Σ
⎢ T
L1 Lk Lh I Na M Δ VE0T Nb G VQ0 ⎤
⎥
⎜ G13
T
G23T
G33 G34 ⎟ ⎢ L1 L11 0 0 0 0 VA1T 0 VE1T 0 0 ⎥
⎜ T T T ⎟ ⎢ 0 0 0 0 0 0 0 0 ⎥ ,
⎝ G14 G24 G34 G44 ⎠ ⎢ T
⎢ Lk 0 0 Lkk 0 0 VAkT 0 VEkT 0 0 ⎥
⎥
⎢ LT 0 ⎥
⎡ X i Yi ⎤ ⎢ h
0 0 0 − Lhh 0 HT 0 0 0 0
⎥
⎢ Y T P ⎥ ≥ 0, i = 1, 2,..., k (27) ⎢ I 0 0 0 0 −ρ I 0 0 0 0 0 ⎥
<0
⎣ i ⎦ ⎢ NT
⎢ a A1V AkV H I −W MΔ 0 0 0 0 ⎥⎥
⎢ ΔM T 0 ⎥
Where U11 = U11 + ρ a02 G0T G0 + Q0 . 则 Π 0 ( t ) < 0 mea ⎢
0 0 0 0 0 ΔM T −Δ 0 0 0
⎥
⎢ E0V E1V Ek V 0 0 0 0 −Δ 0 0 0 ⎥
ns that system (9) is gradually H ∞ stable. Applying Sc ⎢ NbT 0 0 0 0 0 0 0 0 −I 0 0 ⎥
⎢ T ⎥
⎢ G 0 0 0 0 0 0 − LG 0 ⎥
hur complementary to Π 0 , we have ⎢ T −Q ⎦⎥
⎣ Q0 V 0 0 0 0 0 0 0 0 0 0 0
(29)
⎡ Ri Si ⎤
⎢ ST ≥0 (30)
⎣ i V ⎥⎦
Where
367
Σ = A0V + BU + ( A0V + BU )T ⎛0 0 ⎞ ⎛ −2 −0.5 ⎞ ⎛ 1.2 ⎞
A0 = ⎜ ⎟ , A1 = ⎜ 0 ,B = ⎜
⎝ 0 −1 ⎠ ⎝ −1 ⎟⎠ ⎝ 1 ⎠
⎟,
+ ∑ i =1 ( hi Ri + Si + SiT + Ti ),
k
C = ( 0 1 ) , D = 0.1, a0 = 1, a1 = 0.3,
(41)
N ii = − ( 1 − ηi ) Ti , N i = AV
i − Si , Lh = H , Lhh = γ ,
2 ⎛1⎞ ⎛1 0⎞ ⎛1 0⎞ ⎛1 0⎞
H = ⎜ ⎟ , Q0 = ⎜ ⎟ , G0 = ⎜ =
1 ⎟⎠ ⎜0 1⎟
, G1 ,
⎝1⎠ ⎝0 1⎠ ⎝0 ⎝ ⎠
N a = ( A0V + BU )T , Nb = ( CV + BU )T ,
⎛1 0 1 0⎞ ⎛1 0 1 0⎞
E0 = ⎜ ⎟ , E1 = ⎜ 0 1
G = diag { a0VG0T , a1VG1T , … , ak VGkT } , 0 1 ⎟⎠
,
⎝0 1 0 1⎠ ⎝
⎛ ⎞
LG = diag { ρ −1 I , ρ −1 I … , ρ −1 I } ,
0.1 0 0.2 0
J =⎜ ⎟,
⎝ 0 0.1 0 0.2 ⎠
hi
W = ∑ i =1 set φ ( s ) = ( 0.3s 0.1 )T , s ∈ ( −1, 0 ) , and given
k
V , i = 1,… , k .
1 − ηi
γ = 5,η = 0.1 ,we get delay upper
Then the system (9) is H ∞ stabilization by state
bound h = 0.1325 and the following matrices
feedback controller (7), where the gain of controller is:
⎛ 0.0142 0.0137 ⎞ ⎛ 0.0613 0.0515 ⎞
K = UV −1. (31) V =⎜ ⎟ ,T = ⎜ ⎟,
And one guarantied cost of system (1) is ⎝ 0.0137 0.0369 ⎠ ⎝ 0.0515 0.0601 ⎠
1 0 0 T ⎛ 0.0152 0.0152 ⎞ ⎛ −0.0144 −0.0137 ⎞
J ∗ = ∑ i =1 R=⎜ ,S = ⎜
1 − ηi ∫−τ i ∫r
k
φ ( s ) V −1φ ( s ) dsdr ⎟ ⎟,
(32) ⎝ 0.0152 0.0558 ⎠ ⎝ −0.0192 −0.0450 ⎠
+ φ ( 0 )V φ ( 0 ) + ∑
0
∫ U = ( −0.0608 −0.0454 ) , ρ = 54.1377,
−1 k −1 −1
T
( s )V TiV φ ( s ) ds.
i =1 −τ i
φT
368
[6] Mahmoud, M S., and Xie, L., Guaranteed cost control
of uncertain discrete systems with delays, Automatica, 2000,
73: 105-114.
369
2008 International Conference on Intelligent Computation Technology and Automation
Jianying Gong, Rong Xie, Weiguo Liu (Senior Member, IEEE), Shuanqin Xie
School of Automation, Northwestern Polytechnical University, Xi’an 710072 China
gongjianying@tom.com
1. Introduction
Figure 1 configuration diagram of synchronous
In aircraft ac power supply system, certain loads generator, a) Setting of winding, b) Direction of
require regulated 115V ac supplies for their operation, voltage and current
when the load changes. With the development of In a three phase synchronous generator, there are
control theory, more and more new control methods time-varying parameters in its circuit equations
have being used to design controllers which will because the self-inductances and mutual inductances of
control the operation of synchronous electrical the machine windings depend on the rotor position.
machine. Direct modeling of the system in the three-phase
The H∞ control theory which use the H∞-norm as reference frame is embarrassing. So we converted the
the performance evaluation is one of the most mature ac system variables into equivalent dc variables in dq
and well-used theory in the field of robust control, and coordinates. The synchronous generator represents a
the H∞ control theory is already become one of the linear DC field synchronous machine. The voltage
most popular subject which researched by many equations and flux-linkage equations of the machine is
people in both control theory and engineering described as follows.
application. In recent years, the H∞ control problem Voltage equations:
have been simplified in both concept and algorithm, d
and the correlative software package have been vd = ψ d − ωψ q − Rs id (1)
developed and well used, so the H∞ control theory dt
d
gradually become a practical engineering theory. vq = ψ q + ωψ d − Rs iq (2)
In this research, H∞ control theory is used in the dt
design of the generator controller to make the d
v f = Rf if + ψf (3)
regulating process of the output terminal voltage dt
become smoother. d
0= ψ D + RD iD (4)
dt
2. Synchronous generator modeling d
0= ψ Q + RQ iQ (5)
dt
Where,
RQ -damper winding resistance in q axis, z ∈ R -the output signal which include tracking
r
In the Fig.2, K(s) is the controller which to be γ0 is the minimum which could be achieved. But it
designed; P(s) is a linear time-invariant system, or is quite difficult to minimize the performance demand
directly. Compared with the H∞ optimal control
371
problem, the H∞ suboptimal control problem is easier According to Theorem 1, the γ-suboptimal state-
to be solved. The approach of the H∞ suboptimal feedback controller can be obtained from solving the
control problem can be described as two steps. First, linear matrix inequality above.
give certain conditions to the system. Second, check Based on the formula (20), the following optimal
whether the controller can be norm-bounded under the problem can be established and solved:
given conditions. min ρ
⎡ AX + B2W + ( AX + B2W )T B1 (C1 X + D12W )T ⎤
4. Algorithm of the H∞ Control Problem ⎢ ⎥
s. t ⎢ B1T −I D11T ⎥<0 (21)
⎢ C1 X + D12W D11 −ρ I ⎥
⎣ ⎦
From the complicated operator method to the Riccati
X >0
equation, there are many algorithms can solve the H∞
If the optimal problem can be solved, combined with
standard control problem. One of the widely used
Theorem 1, the optimal H∞ controller can be obtained
algorithms at the present is the LMI approach. The
using the optimal solution of the optimal problem
advantage of the LMI approach is that it can use the
above, and the corresponding minimum quantitatively
matrix operation which is comparatively direct to
evaluation is ρ .
design the controller, and have no more restrictions to
the system. Formula (21) is a convex optimization problem
The conditions and the algorithm of the H∞ optimal which using the linear matrix inequality restriction and
control problem are defined as the following [3][4]: the linear target function, and can be solved by using
Theorem 1: When there are a positive definite the element solver mincx in the LMI toolbox.
matrix X and a matrix W, which make the following
matrix inequality (17) come into existence, a H∞ state- 5. Controller Design
feedback controller can be designed to the system (11).
The matrix inequality is expressed as the following: The control problem considered in this paper is to
⎡ AX + B2W + ( AX + B2W ) T
B1 (C1 X + D12W ) T
⎤ regulate output terminal voltage of generator to a
⎢ ⎥ specified value. Basically, damper windings have no
⎢ B1T −I D11T ⎥<0 (17)
⎢ C1 X + D12W D11 −I ⎥ influence on the regulation of generator’s output
⎣ ⎦
voltage, so the damping windings are ignored. The
If X* and W* are the feasible results of the matrix phase currents isd and isq, being state variables, cannot
inequality (17), K=W*(X*)-1 is a state-feedback be the input variables at the same time. Therefore, a
controller of the system (11). fictitious terminal resistance Ra was added to the model.
The matrix inequality (17) is linear matrix inequality This resistance has a relatively high value and does not
of the matrix variables X and W, it can be solved using affect other variables. So the equivalent circuit of the
the element solver feasp which is in the LMI toolbox synchronous generator can be represented in Fig. 3.
of MATLAB. ωψ q
For the given performance scalar γ>0, a suboptimal id isd Rs Lls if
state-feedback controller can be designed for the −+
+ iad Rf
system (11). The suboptimal state-feedback control imd
problem can be described as: vd Ra Lmd Lf
Twz ( s ) ∞ < γ (18)
vf +
The formula(19) can be educed from the −
−
formula(18):
γ −1Twz ( s ) ∞ < 1 (19) iq isq Rs ωψ d Lls
Use the γ C1 , γ D11 and γ D12 to replace the
-1 -1 -1 +−
+ iaq
matrices C1、D11 and D12 in the system (19), and the γ- Lmq
vq Ra
suboptimal state-feedback controller can be designed
using the following matrix inequality: −
⎡ AX + B2W + ( AX + B2W)
T
B1 γ (C1 X + D12W) ⎤
−1 T
Figure 3 equivalent circuit of the synchronous
⎢ ⎥
⎢ B1T −I γ −1D11T ⎥<0 (20) generator
⎢ γ −1 (C1 X + D12W) γ −1D11 −I ⎥ To make the description of the synchronous
⎣ ⎦
generator conform to the system (19), the equations
corresponding to Fig. 3 can be described as a linear
system in state-space form:
372
⎧ x = Ax + B1 w + B2 u ⎡ 29699 -2059.7 27522 ⎤
⎨ (22) W *= ⎢ -121.78 -2064.9 -112.86 ⎥
⎩ z = C1 x + D11 w + D12 u ⎢ ⎥
Where, the matrixes A, B1, B2, C1, D11 and D12 are ⎣⎢ 5.3534 -0.34243 4.4479 ⎦⎥
− ⎢ ⎥
⎢⎣ Ldf Ldf Ldf ⎥⎦ ⎣⎢ 0.1227 -0.0000 -0.1323 ⎦⎥
⎡ L ff Ra Lmd ⎤
⎢ 0 ⎥ 6. Results Analysis
⎡ ⎤
0 ⎢ Ldf Ldf
⎥
⎢ ⎥
B1 = ⎢ 0 ⎥ , B = ⎢ 0
R
⎢ ⎥ 2
a
0 ⎥, In order to compare with the simulation results of
⎣⎢1 ⎦⎥ ⎢ Lq ⎥ the H∞ controller in the same conditions, a Power
⎢L R Ld ⎥
System Stabilizer (PSS) excitation controller of a
⎢ md a 0 ⎥ synchronous generator obtained in literature [2] is used.
⎣⎢ Ldf Ldf ⎦⎥ The PSS controller is shown in Fig. 4.
⎡ Ra 0 0 ⎤ , ⎡0 ⎤
C1 = ⎢ 0 R 0 ⎥ D11 = ⎢1 ⎥
⎣ a ⎦ ⎣ ⎦
⎡ a
− R 0 0 ⎤
D12 = ⎢ ⎥
⎣ 0 − R a
0 ⎦
Ld = Lls + Lmd ,
Figure 4 PSS controller of synchronous generator
Lq = Lls + Lmq , In the simulation, the load was loaded up the
generator and cut down from the generator
L ff = L f + Lmd ,
respectively. The regulating processes of two
Ldf = Lls ⋅ L f + Lls ⋅ Lmd + Lmd ⋅ L f 。 controllers are shown in figures. When the load which
is 10kW was loaded up, changes of output power and
The parameters of synchronous generator were
output terminal voltage were shown in Fig.5 and Fig.6
obtained form literature [8].
respectively.
The state variables x, input variables u, reference
signals w, and the measurement signals z are defined 30
⎢⎣ i f ⎥⎦ ⎢⎣ v f ⎥⎦ 15
X * can be solved using the iterative LMI. Figure 5 regulating processes of output power,
when load increased
373
makes the regulating process smoother and has
200
stronger robustness.
100
(V)
0 7. Conclusion
abc
V
-100
0
was designed. The simulation results of that the load
was loaded up the generator and cut down from the
V
-100
20 Beijing, 2004
15
[3] D. Xie, L. Wang. “Robust stability analysis and control
10
synthesis for discrete-time uncertain switched systems”.
5
Proceedings of the 42nd IEEE conference on decision and
0
0.08 0.1 0.12 0.14 0.16 control, Maui, Hawaii USA, December 2003, pp. 4812-4817.
t (s)
Figure 7 regulating processes of output power, [4] Li Yu. Robust Control-Linear Matrix Inequalities,
when load decreased Beijing: Tinghua University Press, 2002
0 Astronautica,2004,54(5):307-314
V
374
2008 International Conference on Intelligent Computation Technology and Automation
H∞ State Feedback Control for the Stabilization of the Three Euler Angles of
Helicopter Based on LMI
As a space vehicle which has special agility, Assume ignoring the influence of flexibility
helicopter has been used more and more in both oscillation and distortion, and choosing the proper
military and civil areas. Helicopter is usually statically reference frame, the little perturbation principle can be
unstable, the flight control system of helicopter is used to obtain the 6 degree-of-freedom dynamics
nonlinear, multi-variables and strong-coupling, and the differential equations, and the linearization equations
airscrew’s aerodynamics characteristic is also very of helicopter’s disturbed movements can be obtained
complicated. In addition, much uncertain factors may by linearized the 6 degree-of-freedom dynamics
have influences on the flight system when helicopter is differential equations.
in flight. Because of the reasons mentioned above, the The forces and the moments on the 3-axies of
flight control system of helicopter must have strong helicopter can be expressed as the following form:
robustness in order to restrain the model uncertainties X u u + X w w+X u u + X w w + X v v + X ϑϑ + X ϑϑ + X γγ
(1)
from inside of the flight system and the disturbances + Xψψ + X Bic Bic + X Aic Aic + X δ rc δ rc + X ϑc ϑc = 0
from outside of the flight system. Y v + X w+Y u + Y w + Y v + X γ + X ψ + Y ϑ
v w u w v γ ψ ϑ
The H∞ control theory which use the H∞-norm as (2)
+Yγ γ + Yψψ + YBic Bic + YAic Aic + Yδ rc δ rc + Yϑc ϑc = 0
the performance evaluation is one of the most mature
and well-used theory in the field of robust control, and Zϑϑ + Z w w+Zu u + Z w w + Z v v + Zϑϑ + Zϑϑ + Zγγ
(3)
the H∞ control theory is already become one of the + Zψψ + Z Bic Bic + Z Aic Aic + Zδ rc δ rc + Zϑc ϑc = 0
most popular subject which researched by many people Lγγ + Lw w+Lψψ + Lu u + Lw w + Lv v + Lϑϑ + Lϑϑ
in both control theory and engineering application. In (4)
+ Lγ γ + Lψψ + LBic Bic + LAic Aic + Lδ rc δ rc + Lϑc ϑc = 0
1981, Zames used the H∞-norm as a target function to
M w w+M ϑϑ + M u u + M w w + M v v + M ϑϑ + M γ γ
optimize the system performance, which is considered (5)
as the real beginning of the H∞ control theory. In 1989, + Mψψ + M Bic Bic + M Aic Aic + M δ rc δ rc + M ϑc ϑc = 0
Doyle summarized the H∞ control problem as solving N w+N ϑ + N γ + N u + N w + N v + N ϑ + N γ
w ϑ γ u w v ϑ γ
the Lyapunov function and the Riccatti function, (6)
+ Nψψ + N Bic Bic + N Aic Aic + Nδ rc δ rc + Nϑc ϑc = 0
provided a clear idea for the design of the robust
376
J = Tw z ∞
According to Theorem 4.1, the γ-suboptimal state-
(16) feedback controller can be obtained from solving the
= ( P11 + P12 K ( I − K P22 ) − 1 P21 ) <γ
∞ linear matrix inequality above.
In the formula (16), γ ≥ γ 0 . The H∞ suboptimal Based on the formula (20),the following optimal
problem can be established and solved:
control problem is also called the H∞ standard control
min ρ
problem.
⎡ AX + B2W + ( AX + B2W )T B1 (C1 X + D12W )T ⎤
⎢ ⎥
s. t ⎢ B1T −I D11T ⎥<0 (21)
4. Algorithm of the H∞ Control Problem
⎢ C1 X + D12W D11 −ρ I ⎥
⎣ ⎦
From the complicated operator method to the Riccati X >0
equation, there are many algorithms can solve the H∞ If the optimal problem can be solved, combined with
standard control problem. One of the widely used Theorem 4.1, the optimal H∞ controller can be
algorithms at the present is the LMI approach. The obtained using the optimal solution of the optimal
advantage of the LMI approach is that it can use the problem above, and the corresponding minimum
matrix operation which is comparatively direct to quantitatively evaluation is ρ .
design the controller, and have no more restrictions to Formula (21) is a convex optimization problem
the system. which using the linear matrix inequality restriction and
The conditions and the algorithm of the H∞ optimal the linear target function, and can be solved by using
control problem are defined as the following [4-6]: the element solver mincx in the LMI toolbox of
Theorem 4.1: When there are a positive definite MATLAB.
matrix X and a matrix W, which make the following
matrix inequality (17) come into existence, a H∞ state-
5. Controller Design
feedback controller can be designed to the system (10).
The matrix inequality is expressed as the following:
In this section, the control law which designed using
⎡ AX + B2W + ( AX + B2W ) T B1 (C1 X + D12W ) T ⎤
⎢ ⎥ the H∞ state-feedback control under the disturbance of
⎢ B1T −I D11T ⎥<0 (17) the external wind is given.
⎢ C1 X + D12W D11 −I ⎥
⎣ ⎦ The full-order state equation of helicopter is used in
If X* and W* are the feasible results of the matrix the simulation, and the models of actuators in each
inequality (17), K=W*(X*)-1 is a state-feedback channel of helicopter are added into the simulation for
controller of the system (10). lifelike effects. Choose the group of parameters which
The matrix inequality (17) is linear matrix inequality represents the helicopter in flight on the conditions of
of the matrix variables X and W, it can be solved using high attitude and high speed, the system matrices A and
the element solver feasp which is in the LMI toolbox B are deduced from the parameters above, the
of MATLAB. dimension of the system matrix A is 9×9, the
For the given performance scalar γ>0, a suboptimal dimension of the input matrix B is 9×4.
state-feedback controller can be designed for the In this controller, the main goal is considered as how
system (10). The suboptimal state-feedback control to use the H∞ state-feedback controller to ensure the
problem can be described as: stability of the three Euler angles of helicopter under
Twz ( s ) ∞ < γ (18) the disturbance of the external wind. The external wind
is mainly considered as the vertical wind in this
The formula(19) can be educed from the research.
formula(18): After adding the disturbance of the vertical wind, the
γ −1Twz ( s ) ∞ < 1 (19) full-order state equation of helicopter can be expressed
Use the γ-1C1 , γ-1D11 and γ-1D12 to replace the as the following:
matrices C1、D11 and D12 in the system (10), and the γ- ⎡U ⎤
X = AX + BU + BF F = AX + [ B BF ] ⎢ ⎥ (22)
suboptimal state-feedback controller can be designed ⎣F ⎦
using the following matrix inequality: In formula (22), BF is the linearized matrix of the
⎡ AX + B2W + ( AX + B2W)T B1 γ −1 (C1 X + D12W)T ⎤ vertical wind disturbance; F is the input of the vertical
⎢ ⎥
⎢ B1T
−I γ −1D11T ⎥<0 (20) wind disturbance.
⎢ γ −1
(C X + D W ) γ −1
D − I ⎥ The upper bound of the performance demand is
⎣ 1 12 11 ⎦
selected as γ=0.8, and W* and X * can be solved using
the iterative LMI.
377
W*= Hinf Control Compares with PID
⎡ − 0.3438 − 0.0783 − 0.9575 0 0 0 0.1618 0.0056 − 0.0412 ⎤ 10
⎢ − 0.0005 − 0.2328 0.0746 0 0 0 0.0002 − 0.5072 − 0.0379 ⎥⎥
Hinf Control
⎢ 5
θ [Deg]
PID-uncertainty
⎢ − 0.0012 0.0261 0.0009 0 0 0 0.0004 0.0187 − 0.0313 ⎥
⎢ ⎥ 0
⎣ 2.9217 4.0202 70.283 0 0 0 − 2.6851 − 4.7802 − 5.2957 ⎦
-5
X *= 0 10 20 30 40 50 60 70 80 90 100
⎡ 0.6244 0.2538 1.87 0.0091 0 −0.0012 −0.2645 −0.0728 −0.0568⎤ time /s
⎢ 0.2538 2.1037 1.9832 0.0029 −0.0028 −0.0292 −0.1556 0.0686 0.0075 ⎥⎥ 20
⎢ Hinf Control
⎢ 1.87 1.9832 45.323 −0.0013 −0.0005 0.0176 −1.713 −1.6825 −2.9613⎥
⎢ ⎥ 10
γ [Deg]
PID-uncertainty
⎢ 0.0091 0.0029 −0.0013 0.0007 0 0 −0.0048 −0.0001 −0.0003⎥
⎢ 0 −0.0028 −0.0005 0 0.0008 0 0 −0.0048 −0.0002⎥ 0
⎢ ⎥
⎢ −0.0012 −0.0292 0.0177 0 0 0.0005 0 −0.0001 −0.0036⎥ -10
⎢ −0.2654 −0.1555 −1.713 −0.0048 0 0 0.1547 0.0656 0.0865 ⎥ 0 10 20 30 40 50 60 70 80 90 100
⎢ ⎥ time /s
⎢ −0.0728 0.0686 −1.6825 −0.0001 −0.0048 −0.0001 0.0656 0.4635 0.1494 ⎥
⎢ −0.0568 0.0075 −2.9613 0.0003 −0.0002 −0.0036 0.0866 0.1495 0.2652 ⎥⎦
⎣ 10
Hinf Control
According to Theorem 4.1, the H∞ state-feedback 5 PID-uncertainty
ψ [Deg]
controller can be obtained as the following:
0
K_inf =
⎡−0.0773 0.0168 −0.0191 10.9248 −0.0321 −5.7116 1.6028 0.0199 −0.9834 ⎤ -5
⎢−0.0094 −0.0616 −0.0194 0.9973 −7.9230 −0.7739 0.1198 −1.3714 0.3594 ⎥⎥
0 10 20 30 40 50 60 70 80 90 100
⎢ time /s
⎢ 0.0288 0.0172 −0.0519 −2.2134 0.5610 −1.9027 −0.2246 0.1205 −0.7136 ⎥
⎢ ⎥
0.0417 0.4207 −35.0650 −27.1881 −95.1579 −4.3918 −4.3743 −12.6597⎦
Figure 2 Comparison of the PID control v.s the
⎣ 0.2072
H∞ state feedback control under the disturbance
of vertical wind of 5m/s
6. Simulation Results
Hinf Control Compares with PID
20
Hinf Control
The simulation results of H∞ state-feedback control 10 PID-uncertainty
θ [Deg]
angles stable. 10
Hinf Control
The simulation results of the three Euler angles 5 PID-uncertainty
ψ[Deg]
378
zero. The process of control accommodation is smooth, [9] C Charbonnel. H∞ and LMI attitude control design:
do not have much oscillation. towards performances and robustness enhancement. Acta
Astronautica,2004,54(5):307-314
7. Conclusion [10] T Iwasaki, RR Skelton. All controllers for the general
H∞ control problem: LMI existence conditions and state
The H∞ state feedback control for the stabilization space formulas. Automatica,1994,30(8)
of the three Euler angles of helicopter when the system
exist disturbance of external wind is studied. The H∞ [11] Kalman R E. When is a linear control system optimal.
state feedback control theory is developed using the [J]. Trans. ASME. J. Basic Eng, Ser. D, 1964, 86(1): 51-60
Iterative Linear Matrix Inequality (LMI) approach. The
simulation is finished, and the simulation results shows [12] Belletrutti J J, MacFarlanne A G J, Characteristic loci
techniques in multivariable control system design [J]. IEE
that the designed H∞ state feedback control law have
Proc, 1971, 118(11): 1291-1297
good restraining effect to the external disturbance, and
ensure the system have certain performance demand at [13] Rosenbrock H H. Design of multivariable control system
the same time. Finally, the simulation results of the H∞ using the inverse Nyquist array [J], IEE Proc, 1969, 116(12):
state feedback controller and the PID controllers are 1929-1936
compared, the final results demonstrate the
effectiveness of the H∞ state feedback controller.
8. References
[1] Vidyasagar M, Viswanadham N. Algebtraic design
techniques for reliable [J]. IEEE Trans. Automatic. Control,
1982,AC-29 (5): 1085-1095
379
2008 International Conference on Intelligent Computation Technology and Automation
1. Introduction (T
)
denoted by M = λmax M M . E ( x ) stands for
the expectation of stochastic variable x . Matrices, if
In the past two decades, the research related to not explicitly stated, are barely assumed to have
Hopfield neural networks has received considerable compatible dimensions.
attention. Many applications have been developed in
different areas such as combinatorial optimization,
knowledge acquisition and pattern recognition [1]. 2. Problem formulation
Recently, it has been realized that axonal signal
transmission delays often occur in various neural Let {r ( t ),t≥0} be a right-continuous Markov chain
networks, and may cause instability and oscillations in
system. In [2], it considers the time delay is constant on the probability space taking values in values in the
and gets some conservative results. In [3], it considers finite space S = {1,2,…, N } with the following
only the stability of a class of linear time-delay system, transition probabilities:
but the other system performance analysis and ⎧⎪ γ ij Δ+ o( Δ ) if i ≠ j
controller synthesis were not studied. P {r ( t +Δ )= j|r ( t )=i} = ⎨
In this paper, we focus on the H ∞ control synthesis ⎪⎩1+γ ii Δ+ o( Δ ) if i = j
{
dx ( t ) = Ai x( t )+ Adi x( t −τ ( t ) )+Wi f ( x( t −τ ( t ) ) ) ⎣⎢ 0 ⎦⎥ ⎣⎢ 0 ⎦⎥
(1)
{ }
+ Buiu ( t )+ Bvi v( t )} dt + H 0i x( t )+ H1i x( t −(τ ( t ) ) ) d ω 3. H Control problem
∞
z ( t ) = Ci x ( t ) + Cui u ( t ) + Cvi v ( t )
(2) First we will give the following lemma which will
be frequently used in the proofs of our main results in
x ( t ) = φ ( t ) , r ( t ) = r ( 0 ) ∀t ∈ [ −τ ,0]
this paper.
(3) Lemma1. [6] For any constant matrix
T n
where x ( t ) = ⎡⎣ x1( t ), x2 ( t ),…, xn ( t )⎤⎦ ∈ ℜ is the neural n×n T
M ∈ℜ , M = M > 0 , scalar γ > 0 , vector
r n
state vector, u ( t ) ∈ R is the control input, function ω : ⎡⎣ 0,γ ⎤⎦ → ℜ such that the integrations are
p well defined, the following inequality holds:
v ( t ) ∈ R is the disturbance input which belongs
⎡ γ ω s ds ⎤ M ⎡ γ ω s ds ⎤ ≤ γ γ ω T ( s ) M ω ( s ) ds .
T
⎢⎣ ∫0 ( ) ⎥⎦ ⎢⎣ ∫0 ( ) ⎥⎦ ∫0
q
to L2 [ 0,∞ ] , z ( t ) ∈ R is the controlled output. τ ( t )
is the unknown time-varying delays, which satisfies We focus on the design of H ∞ controller for the
0 ≤ τ ( t ) ≤ τ and τ ( t ) ≤ d < 1 where τ and d are system in (1) - (3). In order to solve this problem, we
known constants. Ai = diag ( a1i ,a2i ,…ani ) is a first consider the problem of H ∞ performance
diagonal matrix, and aij > 0, i = 1, 2, … , n, analysis for the unforced system, namely u ( t ) ≡ 0 .
n×n Assumed that the initial condition is zero, we have the
j = 1, 2 … N . Wi ∈ ℜ is the connection weight following theorem.
n×n n×n Theorem 1. Given a scalar γ > 0 and consider
matrix. H 0i ∈ ℜ and H1i ∈ ℜ are known real
stochastic time-delay jumping neural network system
m
constant matrices . ω ( t ) = ⎡⎣ω1( t ),ω2 ( t ),…,ωm ( t )⎤⎦ ∈ ℜ (1)—(3). Assume that there exist symmetric positive
is a m-dimensional Brownian motion, definite matrices Pi , Q, S such that the following
satisfying E {dω (t )} = 0 , and linear matrix inequalities hold:
⎡
n
f ( x ) = ⎡⎣ f1( x1 ), f 2 ( x2 ),…, f n ( xn ) ⎤⎦ ∈ ℜ is the neuron ⎢ Ψ1i Pi Adi Pi Bvi H 0iΤ Pi CiT PiWi ⎤⎥
⎢ ⎥
activation function with f ( 0 ) = 0 . And we suppose ⎢ ∗ Ψ 2i 0 H1i Τ Pi 0 0 ⎥
⎢ ⎥
that f ( ) is bounded and satisfies the following Εi = ⎢ ∗ ∗ −γ 2 I 0 CviT 0 ⎥<0 ( 5)
⎢ ∗ ∗ ∗ − Pi 0 0 ⎥
Lipschitz condition: ⎢ ⎥
⎢ ∗ ∗ ∗ ∗ −I 0 ⎥
f ( x ) ≤ Gx (4) ⎢ ∗
⎣ ∗ ∗ ∗ ∗ − I ⎥⎦
n×n
where G ∈ ℜ is a known constant matrix. i = 1, 2, N
Definition 1. The delayed Hopfield network is said to
be globally stochastically asymptotically stable, for Τ N
Ψ1i := P A + A P + ∑ γ P + Q + τ S
every network mode satisfying (1) in the mean square i i i i ij j
if the following condition holds j =1
⎛ 2⎞ Τ
lim E ⎜ x( t ,r ( t ) ) ⎟ = 0 ∀t > 0 Ψ 2i := − (1−d ) Q + G G
t →∞ ⎝ ⎠
then, the system is stochastically stable with the given
disturbance attenuation γ .
381
Proof: Using Schur complement (see [7]),
Εi < 0 implies that
Noting (4) and using the simple inequality
⎡ T ⎤
⎢ Ψ1i + PW
i iWi Pi Pi Adi Pi Bvi 0 ⎥ (9 )
⎢ ∗ Ψ 2i 0 0 ⎥
T T T T
x y+ y x≤ x x+ y y ( x, y ∈ R n )
Ε0i = ⎢⎢ ⎥
0 ⎥⎥
we get that
⎢ ∗ ∗ −γ 2 I
i i f ( x ( t − τ ( t ) ) ) ≤ x ( t ) PW
(t ) PW
T T T
⎢ −1 ⎥ 2x i iWi Pi x ( t )
⎢⎣ ∗ ∗ ∗ −τ S ⎥⎦
⎡ Τ⎤
+x
T
(t − τ ( t )) GT Gx (t − τ ( t ))
⎢ H 0i ⎥ (10)
⎢ Τ⎥
+ ⎢ H1i ⎥ Pi ⎡⎣ H 0i 0 0⎤⎦ N
⎢ ⎥
H1i For ∑ γ ij = 0 substituting (10)to £ V ( x( t ),r ( t ) ) ,
⎢ 0 ⎥ j =1
⎢ 0 ⎥
⎣ ⎦ letting
⎡ Τ⎤ v (t ) = 0
⎢ Ci ⎥
⎢ 0 ⎥
⎢ ⎥ ⎣⎡Ci 0 Cvi 0⎦⎤ < 0 and
⎢ Τ ⎥ ⎡ Τ
⎢Cvi ⎥ ⎢ Τ ⎛ t ⎞ ⎤⎥
Τ Τ
⎢ 0 ⎥
⎣ ⎦ η0 ( t ) = ⎢ x ( t ), x ( t −τ ( t ) ),⎜⎜ ∫ x( s )ds ⎟⎟ ⎥
⎢ ⎜ t −τ ( t ) ⎟ ⎥
(6) ⎣ ⎝ ⎠ ⎦
one can get
£ V ( x( t ),r ( t ) )
Constructing a positive definite Lyapunov-Krasovskii
function V ( x( t ),r ( t ) ) as follows:
⎡ Ψ1i Pi Adi 0 H 0iT P PiWi ⎤
⎢ ⎥
V ( x ( t ) , r ( t ) = i ) := xΤ ( t ) P x ( t )
i
i ⎢ ∗ Ψ 2i 0 H1iT Pi ∗ ⎥
Τ ⎢ ⎥
t t (7) ≤ η (s) ⎢ −1 ⎥ η (s)
+ ∫ xΤ ( s )Qx ( s ) ds + ∫ 0 ∫ xΤ (η )Sx (η ) dη ds 0 ⎢ ∗ ∗ −τ S 0 ∗ ⎥ 0
t − τ (t ) −τ t + s ⎢ ∗ ∗ ∗ − Pi ∗ ⎥⎥
⎢
From (1) - (3), the weak infinitesimal operator £ of ⎣⎢ ∗ ∗ ∗ ∗ − I ⎦⎥
382
Next, let then, with the state feedback controller given
⎡ Τ −1
⎢ Τ Τ ⎛⎜ t ⎞ ⎤⎥ by u ( t ) = Ki x ( t ) , where Ki = K i X i the system is
Τ Τ ⎟
η1 ( t ) = ⎢ x ( t ), x ( t −τ ( t ) ),v ( t ),⎜ ∫ x( s )ds ⎟ ⎥ stochastically stable with the given disturbance
⎢ ⎜ t −τ ( t ) ⎟ ⎥
⎣ ⎝ ⎠ ⎦ attenuation level γ .
Substituting (10)to £ V ( x( t ),r ( t ) ) and utilizing
Proof: First of all, the closed-loop system can be
expressed as follows:
Schur complement, we have that
Τ 2 Τ {
dx ( t ) = Ai x(t )+ Adi x(t −τ ( t ) )+Wi f ( x( t −τ ( t ) ) )
z ( s ) z ( s ) − γ v ( s ) v ( s ) + £ V ( x( s ),r ( s ) ) (16)
Τ {
+ Bvi v(t )} dt + H 0i x( t )+ H1i x( t −(τ ( t ) ) ) d ω}
≤ η1 ( s ) Ε0iη1 ( s )
z ( t ) = C ui x ( t ) + Cvi v ( t ) (17)
From the definition 2, the closed-loop system (1)-(3) is
stochastically stable with a disturbance attenuation where Ai := Ai + Bui Ki , C ui := Ci + Cui Ki
level γ > 0 . The proof is now completed.
Hence, the result follows immediately by applying
Theorem 2. Given a scalar γ >0 and consider stochastic the proof of Theorem1, representing Ai by Ai ,
time-delay jumping neural network system (1)-(3).
Assume that there exist symmetric positive definite Ci by C ui , we get
383
⎤ ⎡ −0.6 0 ⎤ ⎡0.002 0 ⎤
( Ci +Cui Ki )T PW
i i I I ⎥ Bv 2 = ⎢ ⎥ Bu 2 = ⎢ ⎥
0 0 0 0 ⎥ ⎢⎣ 0 −0.6 ⎥⎦ ⎢⎣ 0 0.002 ⎥⎦
⎥
Using Matlab LMI control Toolbox to solve the LMIs
T
Cvi 0 0 0 ⎥
⎥ (15), we obtain the solution as follows:
0 0 0 0 ⎥<0 ⎡ 0.0355 -0.1037 ⎤
⎥ (19)
−I 0 0 0 ⎥ K1 = 1.0e + 003 * ⎢ ⎥
⎣⎢ 0.5363 -1.4645 ⎦⎥
∗ −I 0 0 ⎥
⎥
∗ ∗ −uI 0 ⎥ ⎡0.0355 -0.1037 ⎤
K 2 = 1.0e + 003 *
−1 ⎥ ⎢⎣0.5363 1.4645 ⎥⎦
∗ ∗ ∗ −τ S ⎥⎦
Τ N
Θ1i := Pi ( Ai + Bui Ki ) + ( Ai + Bui Ki ) Pi + ∑ γ P 5. Conclusions
ij j
j =1
Pre-multiplying and post-multiplying the inequality (15) In this paper, the H ∞ problem for a class of
by uncertain stochastic delayed neural networks with
diag ⎡⎣ Pi I I Pi I I I I ⎤⎦ Markovian jumping parameters has been considered.
Stabilization and disturbance attenuation have been
−1 −1
where Pi = X i , K i = Ki Pi and using Schur guaranteed by our proposed H ∞ control with LMI
complement, we get (19). Σ 2i < 0 implies Σ1i < 0 . optimization approach, which can be tested easily
using the Mat lab LMI toolbox. A simple example has
The proof is now completed.
been used to demonstrate the usefulness of the main
result.
4. Numerical example
In this section, an example is used to illustrate the 6. Acknowledge
usefulness of the theory presented in this paper.
Example 1.Consider the system (1)-(3) is as follows: This work is supported by National Nature Science
⎡γ γ12 ⎤ ⎡ −0.5 0.5 ⎤ ⎡ 0.5 0 ⎤ Foundation of China under Grant 60674071
⎢ 11 ⎥=⎢ ⎥ G=⎢ ⎥
⎢⎣γ 21 γ 22 ⎥⎦ ⎢⎣ 0.5 −0.5⎥⎦ ⎣⎢ 0 0.5⎦⎥
7. References
τ = 0.12 d = 0.375 r = 0.4 u = 0.5
Mode I: [1] Z. Wang, Y. Liu, X. Liu, On global asymptotic stability
⎡ −3 0 ⎤ ⎡ 0.1 0 ⎤ ⎡1 0 ⎤ of neural networks with discrete and distributed delays,
A1 = ⎢ ⎥ A =⎢ ⎥ W1 = ⎢ ⎥ Physics Letter A 345, 299-308, 2005
⎢⎣ 0 −2 ⎥⎦ d 1 ⎢⎣ 0 0.3⎥⎦ ⎢⎣ 0 1 ⎥⎦ [2] G. Wei, Z. Wang, Nonlinear H control of stochastic
, ∞
⎡ −0.001 0 ⎤ ⎡0.001 0 ⎤ time-delay systems with Markovian switching, Chaos
H 01 = ⎢ ⎥ H11 = ⎢
⎣ 0 0.005⎥⎦
, Solitons &Fractals 35, 2008, 442-451
⎢⎣ 0 0.001⎥⎦ [3] X. Jang, Q. Han, Delay-dependent robust stability for
,
⎡ −0.5 uncertain linear systems with interval time-varying delays,
⎡0.001 0 ⎤ 0 ⎤
B =⎢ ⎥ Bv1 = ⎢ ⎥ Automatica 42,2006,1059-1065
u1 ⎣ 0 0.001⎦ ⎣⎢ 0 −0.5⎦⎥ [4] J. Wu, T. Chen, Delay-dependent robust stability
C1 = ⎡⎣ 0.5 0.2⎤⎦ Cu1 = ⎡⎣0.2 0.1⎤⎦ Cv1 = 0 and H control for jump linear systems with delays, Systems
∞
Control Letters 55, 2006, 939-948
Mode Ⅱ:
[5] J. Chen, Delay-dependent robust H control of uncertain
⎡ −3.1 0 ⎤ ⎡1 0 ⎤ ⎡ 0.2 0 ⎤ ∞
A2 = ⎢ ⎥ W2 = ⎢ ⎥ A = ⎢ ⎥ neural systems with state and input delays: LMI optimization
⎢⎣ 0 −2 ⎥⎦ ⎢⎣ 0 1 ⎥⎦ d 2 ⎢⎣ 0 0.4 ⎥⎦ approach, Chaos Solitons &Fractals 33, 2008, 442-451
, ,
[6] K. Gu. An integral inequality in the stabilty problem of
C2 = ⎡⎣0.52 0.21⎤⎦ Cu 2 = ⎡⎣0.21 0.12 ⎤⎦ Cv 2 = 0
, , time-delay systems, in: Proceedings of 39th IEEE Conference
⎡ −0.002 on Decision and Control, December 2000, Sydney, Australia,
0 ⎤ ⎡ 0.002 0 ⎤
H 02 = ⎢ ⎥ H12 = ⎢ ⎥ 2000, pp. 2805-2810
⎢⎣ 0 0.002 ⎥⎦ ⎢⎣ 0 0.005⎥⎦ [7] S. Boy, L. E. Ghaoui, E. Feron, V. Balakrishnan, Linear
,
matrix inequalities in system and control theory. Philadelphia:
SIAM; 1994
384
2008 International Conference on Intelligent Computation Technology and Automation
{
x ( k ) ∈ Si , f λ k = 1
λi ( k ) = 1,
0, otherwise ∑ i =1 i ( )
Vi ( x (k )) = x T ( k ) Pi ( k ) x ( k )
f
Pi (k ) = ∑ hli ( k ) Pli ( k ) (8)
l =1
∆Vi ( x ( k ) )
3. H ∞ Control
386
× Gmn
i
x ( k ) + Dmi w ( k ) − xT ( k ) Pli x ( k ) } x (k )
≤ hli ( k ) h ji ( k )
T
f f f f f
x (k )
T
w ( k )
= ∑ hρ i ( k + 1) ∑ ∑ ∑ ∑ hli ( k ) h ji ( k ) ( G i )T P G
w ( k ) ( Glji ) Pρ i D li x ( k )
T
ρ =1 l =1 j =1 m =1 n =1 × lj ρ i li
(10)
D liT Pρ i G lj D liT Pρ i D li w ( k )
× lj
( )
Gi T P
ρi
hmi ( k ) hni ( k ) G mn
i
x (k )
Dmi
Substituting (10) into (9), we have:
w ( k )
T
Dli Pρ i
x (k )
T
x ( k ) Pli
T
0 x ( k ) ∆Vi ( x ( k ) ) ≤ hli ( k ) h ji ( k )
w ( k )
(9)
−
w ( k ) 0 0 w ( k )
( G i )T P G (G )i
Pρ i Dli x ( k )
T
Define the vectors:
× lj ρ i li lj
x (k )
T
( G i )T P Dli Pρ i G lj
T
DliT Pρ i Dli w ( k )
a = hli ( k ) h ji ( k )
T
lj ρi
w ( k )
lj Thus:
Dli Pρ i
T
∆Vi ( x ( k ) ) + y T ( k ) y ( k ) − γ 2 w T ( k ) w ( k )
x (k )
bmn = hmi ( k ) hni ( k ) Gmn Dmi f 2 x (k )
i T
f
≤ ∑ hρi ( k + 1) ∑ hli ( k )
w ( k )
ρ =1 l =1 w ( k )
From lemma 3.1, we know that:
1 1 T −1 ( G i )T P G
a b ≤ aljT Λalj + bmn Λ bmn (G )
T
lj Pρ i Dli x ( k )
T ρ i li i
lj mn
× − P + C T C
lj
2 2
where 0 ≤ hli ( k )≤1 , Λ= Pρ−i1 , applying to alj , bmn , li T li i li w ( k )
Dli Pρ i G lj Dli Pρ i D li − γ I
T 2
we can get:
x (k )
T
f f
+2∑∑ hli ( k ) hji ( k )
f f f f
∑∑∑∑ h ( k ) h ( k ) h ( k ) h ( k )
l =1 j =1 m =1 n =1
li ji mi ni
l =1 i < j
w ( k )
ΞT i Pρ i iΠ x ( k )
( lj ) ρ i mn (G )
x (k )
T
Gi T P Gi Pρi Dmi x ( k )
i T ΞT i Pρ i iΞ − Ω + Θ
× lj
×
Π T i Pρ i iΞ ΠT i Pρi iΠ − γ 2 I w ( k )
w ( k ) T DliT Pρi Dmi w ( k )
i
Dli Pρi Gmn
1 x (k )
T ( )
where Ξ= Glji +G ijl 2 , Π=( Dli + D ji ) 2 , Ω=( Pli +Pji ) 2 ,
≤ hli ( k ) h ji ( k ) Θ=( CT C ji + CTjiCli ) 2 .
2 w ( k ) li
387
(G ) i T
lj Pρi Gli − Pli + CliT Cli < 0 (14)
x2 ( k )
x1 ( k ) M 11 M 21 M 31
−2 0 2
For CliT Cli >0 ,it’s obvious that: −2 R 1 R2 R3
M 12
(G ) i T S1 S2
lj Pρi Gli − Pli < 0 (15)
( )
M 22
That is ∆Vi x ( k ) < 0 0 R4 R5 R6
M 32
∆V ( x( k ) ) + yT ( k ) y ( k ) −γ 2wT ( k ) w( k ) < 0 2 R7 R8 R9
Fig.1. The structure of premise rules
∆V ( x ( k ) ) < 0 (16) The equal of Henon two-dimensional mapping
According to (16), we know that closed loop system system state is:
(4) is asymptotically stable when w=0 . x(k + 2) = 1 + bx (k ) − ax 2 (k + 1) (20)
By setting the initial value equal to zero,we have: And the system presents the chaotic state[6] when
∑
∞
k =0
yT ( k ) y ( k ) − γ 2 w T ( k ) w ( k ) < 0 a =1,b=0.3 as shown in Figure 2.
The related parameters are as follows:
y 2 <γ2 w
2 2
that is: (17) C = 0.5 −1 ; C = −1 0 ; C = 0 1 ; C = C = C ;
2 1 2 3 4 7 1
By (16) and (17), we know that closed loop system C = C =C ; C =C =C ; D = 0.1 0 ; D = 0 0.2 ;
5 8 2 6 9 3 1 2
(4) is asymptotically stable. D = −0.1 0.1
; D4 = D7 = D1 ; D5 = D8 = D2 ; D6 = D9 = D3
3
Then we prove that inequalities (6), (7) equal to
By the state feedback control, we set the linear
inequalities (10), (11).
subsystem expected closed-loop pole values as follows:
By Schur complement, inequalities (11) and (12)
equal to (18) and (19): P11 = P12 = P13 = P21 = P22 = P23 = P24 = P31 = P32 ;
− Pρ−i1 Glli Dli P33 = P34 = P41 = P42 = P43 = P44 = −0.75
T
−0.75 .
( Glli )
T
0 < 0 (18)
1.5
− Pli + CliT Cli
T
Dli −γ 2 I
1
0
0.5
−1
−2Pρi Glji + Gijl Dli + Dji
x2
0
−Pli − Pji
( Glji + Gijl )
T
0 < 0 (19)
+CliT Cji +CTjiCli
-0.5
( Dli + Dji )
T
−2γ 2 I
-1
0 -1 -0.5 0
x1
0.5 1 1.5
388
K = [-0.2960,-0.7333] K = [ -0.2273,-0.3666] piecewise fuzzy Lyapunov function (PFLF) approach,
11 12 H ∞ state feedback control and zero-pole assignment
K = [ -0.5333,-0.7333] K = [-0.25193,-0.36667] method, we obtain a new stable condition in the form
13 14
According to LMI method, we find the common of LMIs and a new method for designing controller
which has been applied to the closed discrete fuzzy
positive definite matrix Pi which satisfied Theorem system. And the simulation results indicate that the
3.1 to be: controller is effective which demonstrates the feasible
4.8502 1.1913 5.1577 0.5767 of the presented method.
P = ,P =
11 1.1913 6.7468 12 0.5767 6.0779
5.0223 0.5104 5.0223 0.5104
Acknowledge
P = ,P =
13 0.5104 6.4047 14 0.5104 6.4047
This work is supported by the National Natural
6.7705 1.1749 6.3834 1.0724 Science Foundation (No.60774030) and the Program
P = ,P =
21 1.1749 5.2026 22 1.0724 5.3913 for Innovative Research Team of Jiangnan University
6.7574 1.0785 6.2842 0.5666
P = P24 =
23 1.0785 5.16
0.5666 5.2432
References
6.3850 0.9053 6.6564 1.1669 [1] Tanaka K, Sugeno M. Stability Analysis and Design of
P = P =
31 0.9053 5.5151 32 1.1699 5.4048 Fuzzy Control System [J]. Fuzzy Sets and Systems
(S0165-0114), 1992, 45(2): 135-156.
6.3003 0.6952 6.6615 0.6979
P =
33 0.6952 5.4810 34 0.6979 5.2323
P =
[2] Wang H O, Tanaka K, Griffin M F. An Approach to Fuzzy
Control of Nonlinear Systems: Stability and Design
7.2920 1.4550 6.7785 0.9153
P = Issues [J]. IEEE Trans. Fuzzy Systems (S1063-6706),
41 1.4550 4.7481 42 0.9153 4.8391
P =
1996, 4(1): 14-23.
7.2384 0.9585 6.7927 1.0643
P =
43 0.9585 4.5492 44 1.0643 4.8864
P = [3] Jamal Dafouz, Pierre Riedinger, and Claude Jung.
Stability Analysis and Control Synthesis for Switched
T Systems: A Switched Lyapunov Function Approach [J].
The initial value of the state is X0 (k) = −1 1 . IEEE Trans. Automatic Control (S0018-9286), 2002,
The white-noise is adding from the sample time 70 47(11): 1883-1887.
to 100. The response is showing in Fig.3.
1
[4] Tanaka K, Hori T, Wang H O. A Multiple Lyapunov
0.8
x1 Function Approach to Stabilization of Fuzzy Control
x2
Systems[J]. IEEE Trans. Fuzzy Systems (S1063-6706),
0.6
2003, 11(4): 582-589.
0.4
0.2
[5] Xiu Z H, Ren G. Stability Analysis and Systematic
0 Design of T-S Fuzzy Control Systems [J]. Acta
x
389
2008 International Conference on Intelligent Computation Technology and Automation
391
use of the greenhouse's existing equipments. At present
Intelligence control
centre
the alterable control system mainly focused on the
research of temperature, illumination, relative
Intelligence-analysis Configure
Agent file
humidity, CO2 concentration. Each parameter’s weight
in the system isn’t the same in the greenhouse. In order
to control each greenhouse accurately and real-time, a
task
mathematical model based on the environmental
Collecting Agent
scheduling parameters in the greenhouse was established for the
center
Role
development of intelligent analytic Agent aimed at its
-processing Agent collection specific circumstances. In the model there is a random
variable Y and m variables x0 ,x1 ,...,xm-1,
-transmitting Agent
where xi was the system collected environmental
parameter. For one time of the system’s operation on
the assumption of n groups of observation data (
x0i,x1i,…,xn-1,i,yi ) (i=0,1,…,n-1), the relationship
Binary file between variable Y and each environment parameter
Database XML File
was expressed by linear formula (1).
Fig.2 Architecture of intelligent control center Y=a0x0+a1x1+…+an-1xn-1+an (1)
Each Agent of intelligent control center uses a Where a0,a1,…,an-1 were the partial regression
independent thread which parallel run with the main coefficients, and satisfied the equation(2).
thread to develop, simultaneously uses tabulation data
structure to construct task list to preserve all
assignments. The data collecting Agent thread read the a0 y0
task list and sent the task, finally using the round-robin a1 y1
queue structure constructs data processing Agent data a2 y2
queue to save all the data from the threads. The data ⋅ ⋅
transmitting Agent thread reads the data and take (CCT) ⋅ = ⋅
corresponding treatments. The collected data is stored (2)
⋅ ⋅
in the USB memory connected with the up-machine in am-1 yn-2
order to reduce the network bandwidth and raise the am yn-1
data communication speed. If up-machine need
examine a certain greenhouse’s condition, we can start
the examination thread, meanwhile the network only where
has the data of the designated greenhouse, thus the data
communication speed is raised and the data error rate is
lower. x00 x01 x02 ... x0,n-1
x10 x11 x12 ... x1,n-1
5. Intelligent Analysis Agent Design . . . . .
The research found that it cannot enable the crops to C= . . . . .
achieve the best output in the greenhouse to use the . . . . .
precise computer environment control procedure to xm-1,0 xm-1,1 xm-1,2 ... xm-1,n-1
regulate the greenhouse’s environment according to 1 1 1 ... 1
setting value. Crops’ growth and development doesn’t
depend on a particular temperature of one time, but
mainly depends on the average temperature levels in a In order to make the system at the best running
time. It causes the control system develop to the "set status, the system model correspondence leaning
free" system. In the research of the synthesis variance sum of squares q should achieve a minimum.
temperature control system it doesn’t set a fixed According to the least square method principle to
temperature value. The temperature in the greenhouse enable
n −1
q = ∑ [ yi − (a 0 x 0 i + a1 x1i + ... + am − 1 xm − 1, i + am)]2
changes between the highest and the lowest to achieve
the ideal average temperature in a long time. So the
i =0
computer may adjust freely according to the outdoor
climate at the lowest energy consumption and the best to achieve a minimum, the first is to calculate q using
392
the Cholesky decomposition to the equation(2),then environmental data of each greenhouse rather than
calculate the duplicate correlation coefficient of each stored data under normal circumstance. If the up-
environment parameter r = 1− q / t .Where machine needed to collect a certain greenhouse’s data,
it only needed to start the corresponding data copy
n −1 n −1
t = ∑ (Yi − Y ) 2 and Y = ∑ Yi / n .When r is closer
order, set the looked data source, then the data repeater
Agent of the corresponding greenhouse’s up-machine
i=0 i =0
will repeater the corresponding data to the up-machine.
to 1, the relative error q/t is closer to zero, the effect of Such the system time expense was the sum of the time
the system linear regression is good, and it is indicated (t1'=max (t11, t12 ...... t1i)) that the up-machine data
that currently the greenhouse’s operational situation is information was sent to the up-machine and the
good. Finally calculate the relation between Y and the time(t2'=max (t21, t22 ...... t2i)) that the collection
partial correlation coefficient order from the up-machine transmission was sent to the
vj = 1 − q / qj , ( j = 0,1,..., m − 1) to regulate greenhouse. That is: T'=t1'+t2'.
system’s each environment parameter real-time. Where As the up-machine didn’t stored data and its main
function is to control the system. Even if the monitor-
n −1
⎛ m −1
⎞ staff needed to see a certain greenhouse’s or several
qj = ∑ [ yi − am + ∑ akxki ⎟]2 When vj is bigger, it
⎜ greenhouses’ real-time and historical data, the superior
i=0
⎜⎜ k =0
⎟⎟ machine needn’t to increase the extra expense because
⎝ k≠ j ⎠ the system data collection, processing and repeater
is indicated that this parameter’s influence is more function was executed by the up-machine
remarkable to Y and indicated that this environment corresponding Agent thread. So the environmental data
parameter is at a abnormal state simultaneously. When curve or the video data that the up-machine showed
the system started to work, the initial value was 1 for was smooth it had better realized the system
variable Y. When Y≥0.5, the data repeater Agent requirements without blocking and the noise.
module stored the data in the USB memory connected
with the up-machine. It reduced the network data 7. Conclusion
current capacity effectively. Once the data processing
Agent found vj parameter exceeded the normal At present the greenhouse control system has
threshold continuously in a time or Y <0.5, the alarm developed to the crop growth model, the greenhouse
thread was started immediately and the abnormal data integrated environment factor analysis model and the
was sent to the data collecting control center automatic collection and intelligent control of the
simultaneously. agronomist system's greenhouse information. The
foreign greenhouse industry is devoting to the
6. System Performance Analyses & Test telemetry, the network technology, the distributional
intelligent control to apply in the greenhouse
In the tradition monitor system, the system collected management and control, simultaneously the climate
data was often stored in data server connected with the adjustment, the irrigation system and the nourishing
up-machine. The time of data collection for once was supply system looks as a whole to realize the remote
the sum of t1, t2, t3, s and c. That is: control. Compared with the foreign technology, the
T=t1+t2+t3+s+c.Where t1, t2, t3, s and c respectively hardware system of our country's greenhouse control
was the time that the data message was sent to the up- technology has basically achieved the international
machine, collection order was sent to the collection synchronized level, but the system's intellectualized
equipment from the up-machine, the up-machine degree is still far from enough. The paper proposed the
connected with the data server, the software expense greenhouse control system based on Agent, designed
when the up-machine connected with the data server system architecture model based on Agent and
and the collected information processing time. discussed the application of Agent technology in the
In the intelligent greenhouse system based on Agent, greenhouse control. Therefore, the Agent technology
the data collection Agent thread of the up-machine is based on remote control to be applied in the
mainly responsible for the duty's distribution and greenhouse real-time monitoring and the automatic
control. It didn’t collect and store the data. When Y regulation technology will be a new luminescent spot
from the data communication Agent is 1, it issued data and the development trend in the greenhouse control
collection order to the corresponding greenhouse’s development.
intelligent control center data processing Agent. The 8. References
up-machine only show the most important
393
[1]Xu Dahua. Development of intelligent monitor- [2] Geoff Nitscke. Cooperating air traffic control
system based on Agent[C]. Proceedings of the 26th agent[J]. Applied Artificial Intelligence, 2001, 15(13):
Chinese Control Conference, 2007, Volume (4):639- 209-235.
642
394
2008 International Conference on Intelligent Computation Technology and Automation
2 2 2 reference
Where, J R is the inertia of web material. J r represents magnetic output
tension transport
the inertia of unwind roll core. ρ is the density of controller
D/A power
device
- brake
packaging material. ρ1 is the density of unwind roll
core. b is the width of the material. J 0 is constant A/D tension transducer
calculated with J 0 = πb( ρ1 − ρ )r 4 / 2 .
Figure 2. Elements diagram of tension control system
When material is wound out of the unwind roll, J
and ω are time variables because of getting smaller of
3.2. Control system structure
unwind roll radius. Based on the formula of ω = v / R ,
the following equation can be obtained: Because the radius and inertia of the unwind roll are
dω 1 dv v dR time-variable, effective control is difficult to be
= − (3)
dt R dt R 2 dt provided by the conventional PI control. Adaptive
Because thickness of material is rather small, the control method can be used to identify the model
following assumption can be deduced: structure and system parameters, and adjust the
δvdt = 2πRdR parameters of the controller according to the transient
Then, the change of the radius can be described as state of the system. So, adaptive control is even more
the following formula: effective than conventional PI control to control the
dR δv web tension in a nonlinear and time varying system.
= (4)
The typical structure is shown in fig.3. Based on the
dt 2π R
With the Eqs. (1)-(4), tension can be calculated as: difference between output of the reference model and
1 dω dJ output of the adjustable system, the control system
FT = ( M R + M f + J +ω )
R dt dt reference model ym(t)
MR Mf 1 J dv 3 Jδ (5) r(t) e(t)
= + + ( πbρR2 + 02 ) + ( bρδ − 0 4 )v2
R R 2 R dt 4 2πR yp(t -
If friction torque is ignored, and velocity is adjustable system
)
constant, the tension can be calculated simply with
equation (6). adaptive mechanism
M 3 Jδ
FT = R + ( bρδ − 0 4 )v 2 (6)
R 4 2πR Figure 3. Model reference adaptive control
According to equation (6), M R and R are the main system with parallel structure
factors that affect the web tension. To control and
396
parameters can be adjusted by the adaptive mechanism 1 t
according to established adaptive laws. Therefore, f ( K p , Ti ) =
2 ∫ t0
e2dτ (8)
optimal control effect can be obtained[6].
Where, f ( K p , Ti ) is the system performance index.
MRAC is combined with PI control in this paper
considering practical requirement of the web transport e = M m − M p is the generalized error. K p and Ti are
system. Fig.4 shows the structure of the model proportion coefficient and integral time constant of the
reference adaptive PI control system. M m is the output controller.
of reference model. M p is the torque of adjustable Gradient of the f ( K p , Ti ) can be expressed as:
system. K p and Ti are proportion coefficient and T
integral time constant of the PI controller. Fr and F ⎡ ∂f ∂f ⎤
∇f ( K p , TI ) = ⎢ ⎥
are the referenced tension and the fact output tension ⎢⎣ ∂K p ∂Ti ⎥⎦
respectively. K A and K J are the scale coefficients of On the assumption that gain includes initial value
D/A converter and tension sensor. K v and Tv are and variable value, expression of gain is:
magnification and inertia time constant of the magnetic t ∂e (9)
power brake. e is generalized error. K = K p + ΔK = K
p0 −λ e pdτ p0 k ∫t0 ∂K p
397
Transport velocity is 5m/s. Thickness of packaging A. An dynamic model for the transport system of
material is 0.05mm. The radius of unwind roll core is web packaging material is developed successfully.
200mm. Width of packaging material is 1000mm. Dynamic analysis is executed and the formula of
Magnification and inertia time constant of the tension is deduced. Based on the formula, main factors
magnetic power brake are 5.0 and 0.02 respectively. that affect tension are obtained and analyzed.
Scale coefficient of tension sensor is 0.1. Proportion B. To remedy the defection of traditional PI control
coefficient and integral time constant of the controller on the constant tension control, a control strategy of
are set 1.01 and 0.021 respectively. MRAC is presented to control and maintain the web
Fig.5 and fig.6 are the simulation results of the tension at an appropriate level. Simulation results show
system with Matlab. As shown in fig.5, Compared that the method is effective to control web tension, and
with PI control, the presented control method reduces a satisfactory web quality is obtained.
the overshoot and oscillating amplitude. Also, the C. Despite the great amount of work done in this
regulation time is decreased, and dynamic paper, there are still a lot of things to be taken care of
performance is improved significantly. From fig.6, and significant gains to be achieved, such as
when the radius of unwind roll is changed obviously, relationship between transmission speed and tension,
PI control can not provide an effective control to the tension estimation, compensation of inertia and friction.
web tension. Therefore, the system becomes unstable.
MRAC controller can adjust the controller parameters 6. Acknowledgement
on line according to the transient state of the transport
system. So, the web tension is controlled and The work is supported by the open foundation of
maintained effectively, and the stability of system is Jiangsu key laboratory of advanced numerical control
guaranteed. technology (Grant KXJ06121), and also is supported by
12 the scientific foundation of Nanjing institute of
PI
technology (Grant KXJ07001).
10
8
MRAC 7. References
Amplitude
6 [1] C.W. Cheng, C.H. Hsiao, C.C. Chuang, and K.C. Chen,
“Observer-Based Tension Feedback Control of Direct Drive
4 Web Transport System”, Proceeding of the 2005 IEEE
International Conference on Mechatronic, Taipei, 2005, PP.
2 745-750.
0
0 0.2 0.4 0.6 0.8 1 [2] Wang chunxiang, Wang yongzhan, Lu hua, et al, “A
Time(s)
Research of the Precise Tension Control System and Control
Figure 5. Step response Precision”, Chinese Journal of Scientific Instrument, 2000,
vol.21, No.4, pp.407-409.
13 13
[3] Kenji Okada, Tetsuzo Sakamoto,“An adaptive fuzzy
12 12 control for web tension control system”, IEEE transaction on
industry applications, 1998, vol.34, No.4, pp.1762-1767.
11 11
[4] F.Janabi-Sharifi, “A neuron-fuzzy system for looper
10 10 tension control in rolling mills”, Control engineering
practice, 2005, vol.13, No.1, pp.1-13.
9 9
Figure 6. Step response with radius becoming smaller [6] Xie Xinmin, Ding feng, Adaptive control, Tsinghua
publishing house, Beijing, 1999.
5. Conclusions
From the results of this research, the following
conclusions can be drawn.
398
2008 International Conference on Intelligent Computation Technology and Automation
Hongwei Cui
School of Transportation & Automotive Engineering, Shenzhen Polytechnic
E-mail: hongweicui@szpt.edu.cn
Fig.1 The ignition control system of LPG engine Fig.2 The structure of RBF network
3. Optimizing ignition angles based on RBF RBF neural network can be described as follows.
neural network n
f ( X ) = ∑ wiϕ ( X − ci ) (1)
i =1
Ignition timing of gas mixture is crucial to the In formula (1), n is the number of nodes in hidden
performance, efficiency and emissions of a spark
is the input. {ci }i =1 is the vector which
n
ignition engine. If ignition advance angles are not layer. X = {x j }mj=1
appropriate, thermal efficiency and power performance connects input layer to hidden layer. {wi }in=1 is the
will decrease. The fuel consumption and emission will
weight vector. ϕ (⋅) is the radial basis function. ϕ (⋅)
increase correspondingly. Late ignition timing can
deteriorate engine power. Early ignition timing will is often adopted as Gaussian function.
increase the exhaust gas of NOx and HC. Therefore it is x j − ci
2
400
Because air-fuel ratio is often controlled near the β is the speed rate of learning. Original centre value is
stoichiometric value, the influence of air-fuel ratio on
ignition is not considered. There are three nodes in the selected as follows.
input layer of RBF neural network as follows. c11 (0) = 0.89 , c12 (0) = 0.76 , c13 (0) = 0.45 ,
x1 = n , x 2 = p , x 3 = t . The output of RBF neural c21 (0) = 0.02 , c22 (0) = 0.82 , c23 (0) = 0.44 ,
network is the optimal ignition angle. Fifty groups of c 31 (0) = 0.62 , c 32 (0) = 0.79 , c33 (0) = 0.92 .
data are acquired via engine bench experiments. Data The Euclidean distance is computed.
distribution of engine speed and engine load is shown
d1 = [ x1 − c11 (0)]2 + [ x 2 − c12 (0)] 2 + [ x3 − c13 (0)]2 = 0.86
in Figure 3.
d 2 = [ x1 − c 21 (0)]2 + [ x 2 − c 22 (0)]2 + [ x3 − c 23 (0)]2 = 0.49
401
network. Optimal ignition angles can be acquired When changing the ignition angle, the output torque is
during the whole work condition of LPG engine. tested and compared under the engine speed of
During the ageing and wearing process of LPG engine, 2000rpm. Experimental results are shown in Figure 6.
optimal ignition angles can also be acquired by As a result, higher torque of LPG engine can be
retraining the RBF neural network. The LPG engine achieved at the optimum ignition angle. At the same
performance is greatly improved. In order to verify the time, the emission performance is also improved.
accuracy of ignition angles acquired by the training of
RBF neural network, experimental optimum ignition
angles under the engine speed of 1800 rpm are
compared with optimal ignition angles acquired by
RBF neural network. The deviation curve is shown in
Figure 5. The comparing result shows that the
deviation is tiny. At the 80 percent of engine load, the
training result of RBF neural network is the same as
experimental ignition angle. The deviation is also tiny
at other engine loads. These experimental results
indicate the distinct advantage of RBF neural network
in solving the optimizing ignition problem. Optimum
ignition angles acquired by RBF neural network are
accurate and reliable.
6. Conclusions
Based on RBF neural network, the optimizing
ignition problem of LPG engine is studied in this
paper. Optimal ignition angles are acquired through
Fig.4 The result of optimizing ignition angle fifty training samples by using K-means clustering
method and LMS algorithm. By comparing
experimental ignition angles and training ignition
angles, the effect of RBF neural network adopted in
ignition control is demonstrated. Test of a spark-
ignition LPG engine is performed. Higher torque of
LPG engine can be achieved at the optimum ignition
angle. Meanwhile, the emission performance and fuel
economy maintain good status. The result shows that
this method presented in this paper is accurate and
practical.
7. Acknowledgment
This work is partially supported by Shenzhen
Fig.5 Deviation curve Scientific Project Fund. The project number is
05KJS015.
Experimental results also show the great influence
of ignition timing on the performance of LPG engine.
402
8. References
[1] M Hafner, M.Schuler, O.Nelles, R.Isermann, “Fast neural
networks for diesel engine control design”, Control
Engineering Practice, 2000, pp. 1211-1221.
403
2008 International Conference on Intelligent Computation Technology and Automation
405
~ ~ ~
V ( z, ~
x 1 , θ ) = 0.5(z T z + ~
x 1T M (q )~
x 1 ) + θ T Γ −1θ ) The following result can be attained use formula
(11) and (12):
(19)
Above formula derivative with respect to time: − z T D z z + z T W~
x 1 − 0.25~
x 1T P~
x1
= z T z + ~ ~ ~
x 1T M (q )~
x 1 + θ T Γ −1θ 3
1 ~ T ~ 1
= −∑ [d i (~zi −
V
x 1 ) ( zi − ) + d i+3
Subtracting formula (3) and (5): i =1 2d i 2d i
x 1 = −C(q, x 1 ) x 1 + C(q, x̂ 1 ) x̂ 1
M (q ) ~ 1 ~ T ~ 1 ~
− M(q)K~x1 − γ (20)
(~zi +3ω i +3 − x 1 ) ( z i + 3ω i + 3 − x1 ) < 0
2d i + 3 2d i + 3
where (26)
γ = (M(q )ψ + C(q, x̂ 1 ) x̂ 1 + G (q)) Then formula (25) can be rewritten as:
− (M̂ (q )ψ + Ĉ(q, x̂ 1 ) x̂ 1 + Ĝ (q ))
(21) V ≤ −z T C z + z T D (z − M ) − ~ x 1T (M (q)
z z
Above formula (21) can be rewritten by using + C( q , x 1 ) − C( q , ~
x1 ) − 0.25P)~ x1 (27)
character 5:
Definition: σ = λ min ( KM (q ) + M (q ) K ) 2
γ = ϕ 0 (q, x̂ 1 ,ψ ) + ϕ (q, x̂ 1 ,ψ )θ − ϕ (q, x̂ 1 ,ψ Using character 1, 3and hypotheses, attain the
~
− ϕ (q, x̂ 1 ,ψ )θˆ = ϕ (q, x̂ 1 ,ψ )θ (22) following result:
Inserting formula (21) in formula (19): ≤ − z T C z + z T D (z − M) − (σ
V z z
x 1 = −C(q, x 1 ) x 1 + C(q, x̂ 1 ) x̂ 1
M (q ) ~ −C ω −C ~ x − 0.25P) ~ x
2
M max M 1 1
~
− M (q )K~x 1 − ϕ (q, x̂ 1 ,ψ )θ (23) Continue settle above formula:
≤ − z T C z + z T D z t (0.5z − 1)dτ
z ∫
Inserting formula (6), (18) and (23) in above
formula, attain: V z 0
= z T [−(C + E)z − D M + W~
V x1 ] − (σ − C M ω max − C M ~
x 1 − 0.25P) ~
2
z z x1
+~x 1 [−C(q, x 1 ) x 1 + C(q, x̂ 1 ) x̂ 11
T
t
~ Because lim ∫ (0.5z − 1)dτ < 0 , so when the
− M (q )K~x 1 − ϕ (q, x̂ 1 ,ψ )θ ] (24) t →∞ 0
406
⎛ m 2 l 2 g cos(q 1 + q 2 ) ⎞
⎜ ⎟
G (q ) = ⎜ + (m1 + m 2 )l1g cos(q 1 ) ⎟
⎜ m l g cos(q + q ) ⎟
⎝ 2 2 1 2 ⎠
5. Conclusion
This paper presents an observer-based adaptive
Fig. 1 Two-link manipulator model control scheme for robot system, for which we have
The dynamic equation and the parameters of the both unmeasured velocity and uncertain parameters.
manipulator choose as: Backstepping Using the observer backstepping
m1 = 1[Kg], m 2 = 1.5[Kg], l1 = 1[m], l 2 = 1[m] method, an adaptive velocity observer can be designed
independently from the state-feedback controller, and
The observer parameters and initial condition setting
introduce integral item to compensate observer error.
as:
The closed loop system of robot is proved
K = 5I , Γ = 0.1, α = 2 , d i = 1(i = 1,...,4) asymptotically stable by using Lyapunov stability
C1 = 2I , C 2 = 2I , q(0) = (0,0)[rad] theory. In the end the simulation indicate using the
control method designed in the paper robot system still
q (0) = (0,0)[rad s] , x̂ 1 (0) = (1,1)[rad s] has good control performance when being noise or the
This paper suppose m 2 is an unknown parameters, control signal is small.
the robot is controlled to track a circular diameter of
0.5 meters, and the most programming velocity of 6. References
−1
circle is 0.62m ⋅ s , the simulation result as
Fig.2,Fig.3 and Fig.4. [1] M. Krstic, I. Kanellakopoulos, and P. Kokotovic:
Nonlinear and Adaptive Control Design. Wiley, 1995, pp.
223-228.
407
IEEE Transactions on Automatic Control, Vol. 43, No. 9,
Sep. 1998,pp.178-189.
408
2008 International Conference on Intelligent Computation Technology and Automation
410
There exists a matrix A with n × n and a vector b ratio , and ζ max is the upper limit upper limit of damp
with n × 1 , which satisfied the equations given as ratio.
follows:
k1 and k2 form a K-space (it’s a plane). And with
det R ≠ 0 ,
computer used, the parameter area with Γ -stability
R = ⎡⎣b, Ab," , An −1b ⎤⎦ can be painted expediently.
According to the method given above, the sector
det(λ I − A + bK ) = ⎡⎣ P
T T
1⎤⎦ λ described by the performance demand given in chapter
and the exclusive solution is 3.1 can be divided with grid method, and each ( ωi ,
⎡ eT ⎤ ξi ) of points of intersection can obtain corresponding
⎢ T ⎥
e A⎥
1⎤⎦ E , E = ⎢
parameter space of all modes with theorem of pole-
K T = ⎡⎣ PT
⎢ " ⎥ placement, see in figure 3 to figure 5.
⎢ T T⎥
⎣e A ⎦
T −1
Where e is the last row of R .
Then the parameter space computer aid design
method of second-order system is briefly introduced as
follows.
The system is described by
⎡ 0 1 ⎤ ⎡0⎤
x = ⎢ ⎥ x+ ⎢ ⎥u (4)
⎣ −a0 −a1 ⎦ ⎣b0 ⎦
Assume the polynomial of above system to
be p (λ ) = p0 + p1λ + λ 2 , so P = [ p0 p1 ] .
According to the theorem of pole-placement given Figure 3. The parameter space of well mode
above, the feedback gain is
T
⎡1 1 ⎤
K = ⎢ ( p0 − a0 )
T
( p1 − a1 ) ⎥ (5)
⎣ 0
b b0 ⎦
According to the demand of Γ -stability, the
parameter P = [ p0 p1 ] of anticipant pole
polynomial must satisfy a group of restriction
⎧ ωn2min − a0
⎪ k1 ≥
⎪ b0
⎪ ω 2 − a0
⎪ k1 ≤ n max
⎪ b0
⎨ (6) Figure 4. The parameter space of fault mode 1
⎪ k ≥ 2ζ min b0 k1 + a0 − a1
⎪ 2 b0
⎪
⎪ 2ζ max b0 k1 + a0 − a1
⎪k2 ≤
⎩ b0
Where, ωn min is the lower limit of natural
frequency, and ωn max is the upper limit upper limit of
natural frequency. ζ min is the lower limit of damp
411
4. Performance demands confirmation of
fault diagnosis algorithm
With the result of controller design, it can be known
that there is not a common controller for the
performance demands of all modes, so the conclusion
of adopting active fault tolerant control can be drawn.
That is to say, the fault diagnosis algorithm is required.
And according to the result that there be an
common controller between well mode and fault mode
1, without an common controller between well mode
and fault mode 2, the sensitivity performance demand
of fault diagnosis algorithm can be confirmed that the
fault diagnosis algorithm needs to be sensitive to the
Figure 5. The parameter space of fault mode 2 fault mode 2, meanwhile, it needs not to be sensitive to
the fault mode 1.
The parameter space of common controller can be To this step above, all the work, including
obtained by painting the parameter space of all modes performance demands, controller design, the scheme
in one K plane, see in figure 6. choice of active/passive fault tolerant control and main
performance demands confirmation of fault diagnosis
algorithm, are accomplished.
5. Conclusion
With the reference of traditional controller design
method, parameter space method of active fault
tolerant control system is adopted to attempt to find the
relationship between fault modes, performance
demands , controller performance and performance
demand of fault diagnosis algorithm. And it is wished
to be helpful to the research work of active fault
tolerant control system design.
Figure 6. The parameter space of common controller
412
2008 International Conference on Intelligent Computation Technology and Automation
Abstract
2. Preliminaries
Basis on stable fractional theory and state-space
realization of generalized systems, the pole-placement Consider the following linear time-in-variant
problem are analyzed in a single generalized system generalized system P:
stabilization at first. Then, parameterization of all ⎧ Ex = Ax + Bu
simultaneous stabilizing controllers for a set of ⎨ (2.1)
generalized plants has been proposed in term of stable ⎩ y = Cx + Du
inverses and stable null spaces, which is shown to have The transfer function matrix of (2.1) is denoted by
a structure similar to the controller parameterized P( s ) = C ( sE − A) −1 B + D , or
results for a single generalized plant. Finally the pole- ⎡ sE − A B ⎤
placement problem for simultaneous stabilization of ⎢ ⎥, (2.2)
generalized systems is proposed, which is an extension ⎣ C D⎦
of result that the pole-placement problem for a single Where the state is x ∈ R n , the input is u ∈ R m , and
generalized system stabilization. At last a case study
the output y ∈ R p , the matrix E may be singular with
shows the method is right and effective.
rankE < n . To guarantee that system (2.1) has a
unique solution, we assume that it is regular, i.e.,
1. Introduction
det( sE − A) −1 ≠ 0, s∃C . In addition, it is necessary for
Pole-placement plays an important role in linear us to assume the system (2.1) to be properly
control system. It has been used to construct the stabilizable and properly detectable in this paper for
asymptotic stability and optimize the dynamic application significance.
performance of system. Thus the pole-placement for Some notations are first given for discussion later:
generalized system simultaneous stabilization is S, class of proper stable rational functions.
discussed indispensably. Stable factorization theory is μ (S ) , set of proper stable rational matrices with
an effect method in study the many variables control arbitrary sizes.
system, which has been widely used in simultaneous Rm×r, set of real matrices of size m×r.
stabilization and robust stabilization for ordinary I, identity matrices of size with arbitrary.
system, for example reference [1,2,3]. In generalized U, subset of units of S, that is, given f ∈ U , then
system, stable factorization theory has also been
−1
studied thoroughly in reference [4-8]. However, the f ∈S .
simultaneous stabilization problem and pole-placement U(S), subset of units of μ (S ) ,that is, given
problem of generalized system is not studied enough
for complex. In the paper, stable factorization theory A∈ U (S ) , then A −1 ∈ μ ( S ) .
and state-space realization have been used to analyze l.c. , left coprime.
pole-placement for single generalized system l.c. f . , left coprime factorization.
stabilization. Then, a class of controller simultaneously r.c. , right coprime.
stabilizing generalized systems is proposed and r.c. f . , right coprime factorization.
accordingly pole-placement is discussed in the
simultaneous stabilizing generalized systems.
(3.2)
414
⎡ sE − A + FC B F⎤ Consider a set of r linear time-invariant generalized
⎡ sI − Ar 0 Br ⎤ ⎢
=⎢ r ⎥ ⎢ K I 0 ⎥⎥ plants Pi , (i = 1,2, " , r ) , having minimal realizations
⎣ Cr Ir Dr ⎦
⎢⎣ −C 0 I ⎥⎦ ⎧ E x = Ai xi + Bi u
Pi , ⎨ i i . (4.1)
⎡ sE − A + FC 0 B F⎤ ⎩ y = C i x i + Di u
⎢ Br C sI r − Ar 0 Br ⎥⎥ The transfer function matrix of (4.1) is denoted as
=⎢
P(s ) ,
⎢⎣ K − Dr C Cr Ir Dr ⎥⎦
⎡ sE − Ai Bi ⎤
Pi ( s ) ↔ ⎢ i
Di ⎥⎦
So, state-space realization of controller C (s ) can be (4.2)
given by below description, ⎣ Ci
⎡ sE − A + FC 0 ⎤ ⎡ B⎤ Where, xi ∈ R ni is the state vector, u ∈ R m is the
sEC − AC = ⎢ ⎥ + ⎢ ⎥[K − Dr C Cr ]
⎣ Br C sI r − Ar ⎦ ⎣0⎦ input vector, and y ∈ R p is the output vector of the i-th
⎡ sE − A + FC + BK − BK − BDr C BC r ⎤ plant. The symbol ↔ is used to indicate the state space
=⎢ ⎥, realization of transfer function matrices.
⎣ Br C sI r − Ar ⎦ ~ −1 ~ ~ ~
If, Pi = Di N i , N i ∈ μ p×m ( S ) , Di ∈ μ p× p ( S ) ,
⎡ F ⎤ ⎡B⎤ ⎡ F − BDr ⎤ then defining M,
BC = ⎢ ⎥ − ⎢ ⎥ Dr = ⎢ ⎥,
⎣ Br ⎦ ⎣ 0 ⎦ ⎣ Br ⎦ ~ ~
⎡D N1 ⎤
CC = [K − Dr C C r ] , ⎢ ⎥
1
M =⎢ # # ⎥ , ( M ∈ μ pr ×( m + p ) ( S )) . (4.3)
DC = Dr . ⎢D~ ~ ⎥
⎣ r Ni ⎦
Then, the eigenmatrix of closed-loop control system
By Lemma 2,we have,
involving P(s ) and C (s ) is derived ,
⎡ sE − AM B M ⎤
sE cl − Acl = M ↔⎢ M ⎥
⎡ sE − A + BDC ( I + DDC ) −1 C BCC − BDC ( I + DDC ) −1 DC ⎤ , ⎣ CM DM ⎦
⎢ −1 ⎥ ⎡ sE1 − A1 + H1C1 " − H1 B1 ⎤
⎣ − BC ( I + DDC ) C sEC − AC + BC ( I + DDC ) −1 DC⎦ 0
⎢ # % # ## ⎥⎥
that is, sE cl − Acl ⎢
⎢ 0 " sEr − Ar + H r Cr − H r Br ⎥ . (4.4)
=⎢
⎡ sE − A + BDr C BK − BDr C BC r ⎤ C1 " 0 I D1 ⎥
⎢ ⎥
= ⎢⎢ − FC + BDr C sE − A + FC + BK − BDr C BC r ⎥⎥ . ⎢ # % # # # ⎥
⎢ I Dr ⎥⎦
⎣⎢ − Br C Br C sI r − Ar ⎦⎥ ⎣ 0 " Cr
Then, matrices sE cl − Acl can be primary transformed, Obviously, M is a model of generalized observer. It
we have, exists a right null space S and a stable right inverse R
⎡ sE − A + FC 0 0 ⎤ if choosing rankE M = pr and m+p>pr by reference
⎢
sE cl − Acl ~ ⎢ FC + BD r C sE − A + BK BC r ⎥⎥ [10]. That is , MS = 0 pr ×( m + p − pr ) and MR = I pr .
⎢⎣ Br C 0 sI r − Ar ⎥⎦ Theorem 2 The parameterization of all simultaneously
stabilizing controller of a set of plants (4.1) is given by
⎡ FC − BD r C BC r sE − A + BK ⎤
⎢ ⎥. C = ( R2U + S 2 Q)( R1U + S1Q) −1 , (4.5)
~⎢ Br C sI r − Ar 0 ⎥ where,
⎢⎣ sE − A + FC 0 0 ⎥⎦
U ∈ U pr × p ( S ) , Q ∈ μ ( m + p − pr )×( m + p − pr ) ( S ) , (4.6)
Let det( sEcl − Acl ) = 0 , that is,
MS = 0 pr ×( m + p − pr ) , MR = I pr ,
FC − BDr C BCr sE − A + BK
R = [ R1 R 2 ]T , S = [ S 1 S 2 ]T ,
det Br C sI r − Ar 0 =0.
sE − A + FC 0 0 R1 ∈ μ ( S ) p× pr , R 2 ∈ μ ( S ) m× pr ,
Thus, S1 ∈ μ ( S ) p×( m + p − pr ) , R 2 ∈ μ ( S ) m×( m + p − pr ) ,
det( sE − A + BK ) det( sE − A + FC ) det( sI r − Ar ) = 0 . ( R1U + S1Q) is nonsingular.
Q.E.D. Proof: (Necessity) Given U and Q satisfying (4.6),
4. Pole placement for the simultaneous there exist a simultaneously stabilizing controller
stabilization of generalized systems C = ( R 2U + S 2 Q)( R1U + S1 Q) −1 ,
415
⎡ Yˆ ⎤ ⎡U ⎤
or , ⎢ C ⎥ = [R S ]⎢ ⎥ = RU + SQ . 5. Design examples
ˆ
⎣⎢ X C ⎦⎥ ⎣Q ⎦
Since MR = I, MS =0, it follows that, This section discusses a design example to illustrate
⎡ Yˆ ⎤ the main results of the paper. Consider two plants P1,
M ⎢ C ⎥ = M ( RU + SQ) = U P2:
ˆ
⎣⎢ X C ⎦⎥
⎧ ⎡0 1⎤ ⎡1 0 ⎤ ⎡2 1 ⎤
satisfying Lemma 1, C is controller, which can ⎪ x = ⎢ ⎥ x + ⎢1 0⎥u
stabilize a set of plants (4.1). P1: ⎨⎢⎣0 0⎥⎦ ⎣ 0 1 ⎦ ⎣ ⎦
(Sufficiency) Given a simultaneously stabilizing ⎪
⎩ y = [− 1 1]x + [1 0]u
−1
controller C = Xˆ C YˆC , we need to find a U and a Q ⎧ ⎡1 0 ⎤ ⎡1 0⎤ ⎡0 2⎤
⎪ x = ⎢ x+⎢
such that the controller can be expressed as (4.5), that P2: ⎨⎢⎣0 0⎥⎦ ⎥
⎣5 2 ⎦ ⎣3 0⎦
⎥u
is, ⎪
⎩ y = [1 1]x + [0 1]u
⎡ YˆC ⎤ ⎡U ⎤
⎢ ˆ ⎥ = [R S ]⎢ ⎥ = RU + SQ .
A controller C will simultaneously stabilize them,
⎣⎢ X C ⎦⎥ ⎣Q ⎦ the desired close-loop poles each is σ 1 = (−1.5,−5.6) ,
From reference [10], there always exist σ 2 = (−5,−5.6) .
⎡ M ⎤ ⎡ YˆC ⎤ ⎡U ⎤ ⎡ 4⎤ ⎡ − 2⎤
⎢ G ⎥ ⎢ ˆ ⎥ = ⎢Q ⎥ . Select H 1 = ⎢ ⎥ , H 2 = ⎢ ⎥ ,
⎣ ⎦ ⎣⎢ X C ⎦⎥ ⎣ ⎦ ⎣ 2⎦ ⎣1 ⎦
Their proofs are omitted here for the sake of space. Thus, using Lemma 2, system M can be constructed by
⎡ Yˆ ⎤ ⎡ Yˆ ⎤ l.c. f . of P1 and P2 , that is
Thus, U = M ⎢ C ⎥ , Q = G ⎢ C ⎥ . ⎡− 5 s + 4 0 0 −4 6 1 ⎤
⎢⎣ Xˆ C ⎥⎦ ⎢⎣ Xˆ C ⎥⎦ ⎢− 2
satisfying (4.5). ⎢ 1 0 0 − 2 3 0 ⎥⎥
Q.E.D ⎢0 0 s −3 −2 2 0 4 ⎥
M ↔⎢ ⎥.
Remark, Clearly, by Lemma 2 and Lemma 3, we
⎢0 0 − 4 − 1 − 1 3 − 1⎥
can derive that Ŷ , X̂ , − N̂ , D̂ , and R are equivalent ⎢ −1 1 0 0 1 1 0 ⎥
⎢ 1 0 1 ⎥⎦
to R1U , R2U , S1 , S 2 , and Q in the equation (4.5) ⎣ 0 0 1 1
respectively. Thus, the class of all the controllers for Clearly, det( sE M − AM ) = 0 → s1 = −1.5, s 2 = −5.
simultaneously stabilize a set of plants (4.1) can be By reference [10], a stable right inverse R of M can be
generated by use of a generalized observer-based
controller, with an additional internal feedback loop obtained, then choose Q=0 and U = [1 1]T , we have
involving a proper and stable dynamics plant according ⎡0 s + 43 45 12 4 ⎤
to the work by reference [9]. This result is similar to ⎢0 19 20 5 2 ⎥⎥
⎢
the controller parameterized for a single generalized ⎢2 6 s + 9 4 − 2⎥
plant. Thus, theory of Theorem 1 can be extended to RU ↔ ⎢⎢0 12 7 1 7 ⎥
⎥,
solve pole-placement for generalized system
⎢ −1 − 3 − 4 −1 1 ⎥
simultaneous stabilization. From Theorem 1 and ⎢ 0 4 4 1 0 ⎥
reference [10], we can obtain a corollary. ⎢ ⎥
⎣⎢ 1 3 5 2 0 ⎥⎦
Corollary 1 Given a set of plants (4.1) is
det( sE RU − ARU ) = 0 → s = −5.6.
simultaneously stabilized by controller C obtained
Such that C controller simultaneously stabilized
from theorem 2, such that the closed-loop poles of P1 and P2 can be given by Theorem 2. Transfer
simultaneously stabilizing control system function of C is illustrated as,
are {σ M , σ RU , σ Q } , where σ M are finite eigenvalues 1 ⎡ 5s + 21 ⎤
GC ( s ) = 2 ⎢ ⎥.
of generalized observer M, σ RU are finite eigenvalues 3s + 76 s + 251 ⎣11s + 48⎦
of generalized controller RU, and σ Q are finite From above, the transfer function of close loop
control system that is made of controller C, P1 and P2
eigenvalues of poles of properly stabilizing plant Q. can be expressed respectively, that is,
Thus from above corollary, It is easy to obtain
arbitrarily poles-placement for generalized system
simultaneous stabilization.
416
above works are satisfying and significant by an
[2.3s 2 + 15.2 s + 7.5 3.7 s + 4.1] example.
H ( P1 , C ) = ,
s 2 + 7.1s + 8.4
7. References
[4.3s + 9 s 2 + 12.4s + 5.6]
H ( P2 , C ) = .
s 2 + 10.6 s + 28 [1] M, A. Kale, J. H. Chow and K. D. Minto, “A controller
Thus, poles of H ( P1 , C ) and H ( P2 , C ) can be parameterization and pole-placement design for simultaneous
stabilization”, Proceedings of 1990 American Control
calculated, which are (-1.5,-5.6) and (-5,-5.6). Conference, 1990, pp.116-121.
Obviously, they satisfied all requirements of pole-
placment. Moreover meet points of corollary 1. [2] GAO Zhiwei, XU Nini and WANG Xianlai,
⎡sin t ⎤ “Doubly Coprime Factorizations for General Proper Systems
Suppose u = ⎢ ⎥ , thus, simulation of output by using Reduced-Order Observer-Based Controllers”,
⎣u (t ) ⎦ Control theory and applications, Tianjin, Dec., 2000, Vol.17,
response for simultaneous stabilizing control system No.6, pp. 836-840.
can be given respectively as Figure 2 and Figure 3.
[3] ZHANG Gao-Min JIA Ying-Min . “Robust stability of
feedback system with coprime factor perturbations”. Acta
Automatica Sinica, Beijing, Nov., 2002, Vol.28, No.6, pp.
974-976.
Figure 2. Output response of H ( P1 , C ) [5] GAO Zhi-wei, “stable factorization theory of generalized
system”, postdoctor report, mathematics sciences institute of
Nankai University, Tianjin, 1998.
In the paper, stable factorization theory and state [9] Gao Zhiwei, Wang Xianlai, Li Guangquan, “Analysis
space realization have been used to analyze the pole- for the Bzout identity of generalized systems”, Transactions
placement problem for generalized system of Tianjin University, Tianjin , 1998, Vol.4 . No.1, pp. 15-21.
simultaneous stabilization, which is an extension of
[10] MA Jing, GAO Zhi-Wei, “Simultaneous stabilization
result that the pole-placement problem for a single for singular systems”, 2007 Chinese Control Conference,
generalized system stabilization. In addition Zhangjiajie, China. 2007, Vol.2, pp. 180-184.
simultaneous stabilization of a set of linear time-
invariant generalized plants is discussed and
parameterization for controllers is obtained in terms of
stable right inverse and stable right null space.
Obviously controller which is shown to have a
structure by use of a generalized observer-based
controller, with an additional internal feedback loop
involving a proper and stable dynamics plant. All
417
2008 International Conference on Intelligent Computation Technology and Automation
Instrument
Wei He Yunfei Li
School of Computer science &Technology, School of Computer science &Technology,
Soochow University, Suzhou, Jiangsu, 215006, Soochow University, Suzhou, Jiangsu, 215006,
China China
hewei-2100@163.com liyf@suda.edu.cn.
419
If beam changed in the radiation process, the which could realize the flow control of radiation and
transmission speed must be changed to satisfy the management of produce process, such as output
[6,7,8]
balance of them. However, because of the mechanical statistics, consume calculation . Figure 3 is the
transmission delay (second level), the real-time effect practical interface of radiation control system.
of "tracking" is not very well. How to solve this
problem has been a hot issue in recent years. In this
paper we dealt with the speed according to the value of
real-time beam. The math model of speed is as follow:
Real-time speed= (device speed/beam default) ×
real-time beam
vdevice− speed
vreal −time− speed = × I real −time −beam × k
I speed − default
420
Table 1 VI control optimize result
Product Group v
v
… … … …
v is the average speed after the device is controlled radiation control system based on virtual instruments.
The characters of virtual instruments are used to
by VI, v is the average speed before the device is
resolve several technologies difficulties in the process
controlled by VI. See table 1, the product efficiency is of system design and development, such as
improved by the radiation control system based on VI. pyrocondensation material identification, speed raise,
This system improves the degree of automation and beam tracking, etc. This system has been successfully
lays a solid foundation foe radiation control. applied in one pyrocondensation material radiation
workshop, realized production automation, improved
4. Conclusion the production efficiency and the quality of products,
obtained obvious economic benefits, and had high
This paper puts forward the pyrocondensation promotion value.
421
5. Reference
422
2008 International Conference on Intelligent Computation Technology and Automation
Xingmin Ji
Department of Mathematics and Physics , Xi’an Institute of Post and Telecommuncation , Xi’an,
Shaanxi Provine,China 710061
jxmin@xiyou.edu.cn
424
2
1
μ i G Px −
T 1
Ψi ( x) x − ≤ M iT K iT K i M i + β i PDi DiT P .
i
μi βi
1 Let V ( x) = xT Px , then the time-derivative of
x ( Fi Fi − Σ (t )Σ i (t )) x −
T T T
1 d
x T ( H iT H i − ΨiT ( x) Ψi ( x)) x − ε i x T x dt
V ( x(t ))
μ i2
2 = x T [( Ai + Bi M i ) T P + P( Ai + Bi M i )]x +
≤ −ε x ,
2 x T PΔAi (t ) x + 2 x T PΔBi (t ) x + 2 x T PΔf i ( x)
where ε = min{ε i , i = 1,2,", m} . Thus, the
≤ x T [( Ai + Bi M i ) T P + P ( Ai + Bi M i ) +
conclusion is proved. ▇
ΔAi (t ) 1
Assumption 4 The parameter uncertainty ( Fi T Fi + M iT K iT K i M i ) +
is as follows βi
ΔAi (t ) = Ei Σ i (t ) Fi , i = 1,2, " , m β i P( Ei EiT + Di DiT ) P]x −
where Σ i (t ) is an unknown matrix function and 1
2
2
β i Δf i ( x ) − Px + β i2 Δf i ( x ) +
satisfies Σ (t )Σ i (t ) ≤ I ( i = 1,2, " , m ), Ei ,
T
i βi
Fi are known real constant matrices of suitable 1
xT P 2 x
dimensions. β i
2
Δf i (x) satisfies
1
Δf i T ( x)Δf i ( x) = x T GiT Gi x , i = 1,2, " , m ( Fi T Fi + M iT K iT K i M i ) +
βi
where Gi is known real constant matrices of suitable
β i P( Ei EiT + Di DiT ) P]x −
dimensions. 2
Theorem 2 Under Assumption 1,Assumption 4 and 1
β i Δf i ( x) − Px + β i2 x T GiT Gi x +
Assumption 5, system (1) is quadratically robust βi
stabilizable under arbitrary switching laws if there exist
1
constant scalars β i > 0 ( i = 1,2," , m ) such that xT P 2 x
β i2
the family of matrices
− Qi = ( Ai + Bi M i ) T P + P ( Ai + Bi M i ) + ≤ x T [( Ai + Bi M i ) T P + P( Ai + Bi M i ) +
1
1
( FiT Fi + M iT K iT K i M i ) + ( FiT Fi + M iT K iT K i M i ) + β i P ( E i E iT +
βi βi
1
β i P( E i E iT + Di DiT ) P + β i2 GiT Gi +
1
P2 Di DiT ) P + β i2 GiT Gi + P 2 ]x
β 2 β i2
i
, d
V ( x(t )) ≤ − x T Qi x ≤ −λ min (Qi ) x
2
Hence .
i = 1,2, " , m is negative definite. dt
Proof By Lemma 1, for any real scalars Then Theorem 2 is proved. ▇
β i > 0 ( i = 1,2," , m )
1 4. Conclusion
ΔAiT P + PΔAi ≤ FiT Fi + β i PEi EiT P ,
βi In this paper, the problem of quadratically robust
stabilizable for a class of linear switched systems
(ΔBi M i ) P + P (ΔBi M i )
T
425
with uncertainties is discussed. The strict completeness
of certain family of matrices guarantee gives quadratic [7]D.Liberzon , A S.Morse, “Basic problems in stability and
robust stabilization. A switching law is also designed design of switched systems ” ,IEEE. Control System
according to the strict completeness. Magazine, 1999,19(5),pp. 59-70.
[3] L.Yang, J.M.Li,“Sufficient and necessary conditions of [10] W.A.Sun , F.Q.Yuan , F.Dong et al,“ Sufficient
controllability and observability of a class of linear switching conditions for quadratic Robust stability of a class of
systems ” ,Systems Engineering and switched linear systems with uncertainties ”, Mathematica
Electronics,2003,25(5),pp. 588-590. Applicata, 2006,19(3),pp. 492-497.
[4]G.M.Xie , D.Z.Zheng,“Research on controllability and [11] X.L.Zhang ,Y.Z.Liu ,J.Zhao,“Robust control of a class
observability of hybrid dynamical systems”,Control Theory of switched systems ” ,Journal of Northeastern
and Applications,2002,19(1),pp. 139-142. University,2000,21(5),pp.498—500.
[6] M S.Branicky, “Multiple Lyapunov functions and other [13]X.M.Ji ,“Robust state feedback stabilization of a class of
analysis tools for switched and hybrid systems ” ,IEEE. switched linear systems with uncertainties”,Proceddings of
Transactions on Automatic Control,1998,43(4),pp.475-482. the 26th Chinese Control Conference,2007,pp. 690-692.
426
2008 International Conference on Intelligent Computation Technology and Automation
1. Introduction
Suspension is one of the most important part in cars
nowadays, its main function is to transfer the forces
and moments between body and wheels, mitigate the
impact loads from the roughness road surface,
attenuate the vibration caused by the loads so as to
make the cars drive stable and unblock. The passive Figure 1 Semi-active suspension system of vehicle
suspension system cannot fit the different road surfaces Ignore the mass of spring, considering the lag
for its unchanged parameters. At this time, The active character of the MR damper[11], We establish the
suspension system replace the passive one, whose model by using the law of force and acceleration, at the
parameters can be changed to fit the road surface. The same time, the road incentive is considered as random
Active control and VOFB control of the suspension force, F is the control force, the stochastic model can
system have been discussed. But the active suspension be described as follows:
1 + c2q = αqW(t) + βW(t) + F
mq +kq +c0q +cq3 3
system costs much money and consumes lots of (1)
energy, which restricts the application of active where m presents the mass of vehicle, k presents the
suspension system[1-2]. The semi-active suspension
stiffness of spring, c0 presents the damp coefficient,
system whose damp can be changed can fit the
demands of different road conditions, improve the c1q 3 + c2 q3 presents the lag effect of MR damper
comfortability and stability by changing the value of according to [12], α qW (t ) presents the force brought
damp. Compared with active suspension, the semi-
428
the maximum value, so that the optimal control Refer to other document data, we obtain the values of
forcefulfills: parameters. Select the safety area boundary Γ = 10 , time
∂H ∂V interval Δt = 10 −5 , the figures of reliability function and
u* = bsign( ) (14) conditional moment of the first-passage time function are
∂p ∂H
given as Fig2-Fig3.
For the value function V ( H ) is the decreasing
function of H , that is, ∂V / ∂H < 0 , so the equation 1.000
R(t)
get b=0.5
∂H 2 2b 1/ 2
<u >= − H (16)
∂p π b=0
Where :
2 2b Figure 2-a Conditional reliability function when H = 4
m ′( H ) = m( H ) − H 1/ 2 (18)
π 1.000
∂Ropt (t | H 0 )
popt (T | H 0 ) = − |t =T (23)
∂t
0.95
b=0
be rewritten as follows: 0.85
b=0.5
∂Ropt ∂Ropt
= m( H 0 ) , H0 = 0 (24) b=1
∂t ∂H 0 0.80
0.75
4. Numerical result 0 2 4
t
6 8 10
For the BK (Backward-Kolmogorov) function Figure 2-c Conditional reliability function when H = 8
reliability function fulfils is partial differential
function, the analytical solutions usually cannot be
obtained. Here we use finite difference method to
obtain the numerical solution.
429
the enhance of the control force can make the system more
0.0010 b=0
safety.
From Figure 3a-c we can see that the conditional moment
0.0008 b=0.5
of the first-passage time function p (T | H 0 ) exists a peak in
b=1
0.0006 its sharp with the passage of time and the peak value
increases with H increases, that is, the system becomes
p(T)
0.0004
dangerous than before, but the enhance of the control force
can reduce the peak value and fortify the system.
0.0002
5. Conclusion
0.0000
0 2 4 6 8 10
T The optimal control problem of semi-active
suspension system model suffered with random
Figure 3-a Probability density of first-passage time excitation has been discussed in this paper. The
when H = 4 Hamilton function has been described as one
dimension diffusion process by using stochastic
b=0
0.010
average method, the backward Kolmogorov equation
b=0.5
for reliability function and conditional moment of the
0.008
first-passage time have been established, the numerical
results are given in virtue of figures according to the
0.006
classification of boundary conditions and initial
p(T)
430
System”, China Academic Journal Electronic Publishing [11] Pan Cunzhi, Yang Shaopu, et al, “Experimental study of
House, 2007, 18(9), pp. 1121-1124. a Semi-active control isolation System with Magneto-
[8] Roberts J B, Spanos P D, “Stochastic averaging: An rheologicaI Damper”, Journal of Shijiazhuang railway
approximate method of salving random vibration problem”, institute, 2006, 19(3), pp. 36-39.
Int J Nonlinear Mechanics, 1986, 21, pp. 111-134. [12] Yang Shaopu, Shen Yongjun. Bifurcation and
[9] Zhu W. Q, Ying, Z. G, Soong, T.T, “An optimal singularity of lag nonlinear system. Beijing, Science Press,
nonlinear stochastic control strategy for randomly excited 2003.
structural systems”, Nonlinear Dynamics, 2001, 24, pp. 31- [13] Zhu Weiqiu, Nonlinear stochastic dynamics and control,
51. Beijing, Science Press, 2003.
[10] Ma YF, Xiu ZL, Sun LH, et al, “Hopf bifurcation and
chaos analysis of a microbial continuous culture model with
time delay”, International Journal of nonlinear sciences and
numercal simulation, 2006, 7(3), pp. 305-308.
431
2008 International Conference on Intelligent Computation Technology and Automation
433
temperature and the past gain weight and the past feed function synthesizes the rise time, the exceeding,
consumption , The output is the pig gain weight W (K) steady state error, and many other performance
and feed consumption D (K) of the current moment, indicators of the system. The goal of optimization is to
the paper has adopted BP algorithm improved, the make fitness function T the largest. The three layer BP
training's goal of BP neural network is to make the neural network [5] identifies model of the pig’s growth
average square error (MSE) Minimum: environment during the optimizing process.
(2) (1) fuzzy controller design
E =
MSE
1
N
( 2
)
(∑∑WJ(K)−HJ(K) +∑∑ DJ(K)−MJ(K) )
2
( ) In the realization of fuzzy control algorithm, the
0 J K J K
among formula: N0 is the total number of data points, accuracy value of inputs must be transformed into a
The Wj(k) and Hj(k) denote the j output of k data corresponding value of fuzzy sets domain, this is the
point expectations heavy of pigs and the actual output conversion of the basic domain (exact quantity) to the
of the model, the Dj(k) and Mj(k) figure the j output fuzzy set domain (fuzzy quantity), this conversion
of k data point feed consumption expectation and the process need introduce the concept of quantitative
actual output of the model. The data trained are quality factors. If the error and error rate are two inputs of
pigs gaining weight and feed consumption at different fuzzy controller, the error quantization factor is ke,the
temperatures, they are provided for the neural network quantization factor of error change rate is kc, similarly,
during the training process. According to the principle the output of the fuzzy control algorithm can not
of the minimum mean square error and the shortest directly control object, which must be switched the
training time, the network chooses 64 neuron numbers basic domain accepted by the system object through
hidden layer. the scale factor ku. Theoretical analysis and
(2) genetic coding experimental results have shown that the size of
Genetic coding is conversion methods ,the quantitative factors and scale factor and two
feasibility solution of question is transformed from quantitative relationship of the fuzzy controller will
solution space to searching space of the genetic make a great impact on the controlling performance;
algorithm, during genetic algorithm running process, it their size identified is often a very tedious process by a
doesn’t directly operate the actual decision variables of lot of debugging. Prerequisite language variables of
solving problems, but the individual coding of feasible fuzzy control rules form the space of fuzzy input; the
solution is imposed various genetic manipulation to linguistic variables of the conclusions constitute a
achieve the purpose of optimization. Optimizing fuzzy output space. Each fuzzy linguistic value is
system I, it is necessary to optimize the parameters of corresponding a fuzzy subset and determines the curve
temperature settings value, which has a certain shape of the subset membership function in fact; the
precision and a relatively small number, therefore, the shape of the fuzzy subset membership function largely
paper uses binary encoding method, their mapping influences the controlling effects. The sharp shape of
relations: the membership function has high resolution
characteristics; instead, it is low resolution
T = T + binrep 2 L (T − T ) (3)
i i min
i
i max i min characteristics. This paper takes to improve the
Among formula: Ti as the temperature settings, temperature of pigs growth environment as an example
[Timin, Timax] is range of the temperature change, in winter and closes the other implementing
binrep expresses the binary integers of the Li long equipment, A hot stove enhances the temperature of
string of binary. the environment, following figures 4 and 5 for
membership function of temperature error and
2.3. Optimization system Ⅱ temperature error change rate, figure 6 output of hot
stove ventilation membership function of working
Optimization System Ⅱ, FGA optimizes time, figure 7 hot stove heating the fuzzy rules of
quantifying factor, scale factor, membership function working length.
width and fuzzy rules, and finds the best parameters of
fuzzy controller to ensure the temperature accuracy of
pig’s growth environment, this paper adopts the
opposite value of absolute between the system settings
and the system output error as fitness function, namely:
N
(4)
T =− −∑T
k =1
set T i
434
as Figure 9 from an initial temperature at 25 oC to
temperature settings at 28 oC in winter, which is
compared with the fuzzy controller which wasn’t
optimized, the results have showed that the controlling
error of temperature were smaller and the system will
be able to provide the better growth environment for
quality pigs.
Figure 6. Time function Figure 7. Fuzzy rules
435
temperature setpoint optimization, Transactions of the
CSAE, 2006, 22(11): 187-191.
[3] QI Zhi dong, ZHU Xin Jian, ZHU Wei Xing, Integrated
Optimization of Neuron-fuzzy Controller Base on Fuzzy
Genetic Algorithm, Computer Simulation, 2004, 21 (6):
122 -126.
[4] Wang Da Yi, Ma Xing Rui, Neuron-Optimal Guidance
Law for Lunar Soft Landing, Engineering and Electronic
Technology, 1999, 21 (12):31~34.
[5] Gong Chi Kun, Mao Han ping, Summer Temperature-
Humid Fuzzy-Neural Network Control in Greenhouse
By Using Genetic Algorithm, Transactions of the
CSAE, 2000, 16(4):106-109.
436
2008 International Conference on Intelligent Computation Technology and Automation
Wanzhi Chen
Liaoning Technical University, HuLuDao 125105, China
chenwanzhi@hotmail.com
438
The output variable ΔU f ( k ) use the symmetrical system besides eliminating the deviation, preventing
singleton subordinated function, as Figure3. the system from overshooting, even cause the system
oscillate.
Table1.Control Rules of Fuzzy Forecast We use the arithmetic of weight average to explain
the output of the fuzzy forecast control; it is decided by
ΔU f ΔE the following algorithm [4].
P Z N
E n
P PB PM PS Δu f ( k ) = Ku ∑ W (i , j )Cl ( ΔU f ( k ))
Z PS ZE NS i , j =1
N NS NM NB u ( k ) is the control value of the process input.
2
Ai ( E ) u ( k ) = g ( k )[e ( k ) + 2 K ( k ) ec ( k ) + 2 K ( k )er ( k )]
c c
N Z P n
+ K ∑ W (i , j )Cl ( ΔU f ( k ))
u
i , j =1
-a 0 a E
3.3. The Control Model
Figure 2. Subordinate function of fuzzy sets 1
According to the many factors in the pipe
C(l ΔU f )
production we get the final model process using the
NB NM NS ZE NB NB NB method that combine the principle modeling with
process modeling through the industry experiments.
Ke −τ s
-c 0 c ΔU f G ( s)=
1+Ts
Figure 3. Subordinate function of fuzzy sets 2 K means proportional coefficient, T means inertial
coefficient, τ means time lag constants.
Using the adaptive control methods based on fuzzy
forecast to control the pipe production process
described in the above equation. According to the
demand of controlling craft in fermentation process,
we make the fuzzy proportional factor
Ke =5 and K Δe = 20 , clear factor K = 2 , sampling time
T = 0.1s in fuzzy forecast control, the gain parameter
of the unidentifiable adaptive control
algorithm L∗ =0.08 , controller’s parameter δ =0.035 .
Then we get a good result.
14
12
10
Figure 4. Illustration of fuzzy control input and output
8
6
± a and ± c in Figure 2 and 3 is the bounds of the
4
fuzzy domain, Ai ( E ) and Cl ( ΔU f ) is the subordinated
2
function of the fuzzy variables E and ΔU f .
0 2 4 6 8 10 12 14 16 18 20 22
We can get the relationship about the fuzzy
controller’s language rules’ outputs and inputs using Figure 5. Recorded curved line of pipe production
the rules of Form 1 to infer the result. As Figure 4 In the actual process experiment, the actual running
shows, it is a curved surface which shows the nonlinear curve is showed as Figure 5 through the process of a
relationship between the input and output. when the period, the dynamic property of the temperature
deviation changes bigger, the change of the controlling controlling curve is very good.
value can decrease it swiftly, when the deviation
changes smaller, we must consider the stability of the
439
2nd International Conference on Computer Science &
Education, ICCSE 2007, pp. 245-248.
4. Conclusion
[2] Marsik, J. - Klan, P. - Strejc, V, “Easy Design of
Through the actual running situation about the Deadbeat Control Using Plant Step Response Only”, Control
industrial control of the pipe production. We can see Engineering Practice, vol. 2, January. 1993, pp. 381–384.
that the system’s dynamic property is good, so we can
get good effects of production process, industrial [3]Mamzic, C., “Guidelines for the application of statistical
process which with time lag, uncertainty strong inertia process control in the continuous process industries”,
by using this control method, which adaptive fuzzy Measurement and control, vol. 28, March. 1995, pp. 69–73.
forecast [5].
[4]Takagi T, Sugeno M, “Fuzzy identification of System and
Acknowledge its application to modelling and control”, IEEE Trans. Syst,
Man, and Cybern, vol. 15, Feb. 1985, pp. 116–132.
This work is partially supported by LTU Grant
07A128 [5]Jinxian Zhao, “Research of Monitoring System by
Microcomputer in the Beer’s Fermentation Process”, PH.
Degree Paper, Sep.2001
References
[1]Wanzh Chen, “Research of Temperature Characteristics
and Control Algorithm in Beer’s Fermentation Process”, The
440
2008 International Conference on Intelligent Computation Technology and Automation
Xingmin Ji
Department of Mathematics and Physics , Xi’an Institute of Post and Telecommuncation , Xi’an,
Shaanxi Provine,China 710061
jxmin@xiyou.edu.cn
Abstract ⎧ •
⎪ E x(t ) = [ A + ΔA(t )]x(t ) + [ B + ΔB (t )]u (t ) + Cx (t − τ 1 (t ))
⎪ + ΔC (t ) x(t − τ 2 (t )) + Du (t − τ 3 (t )) + ΔDu (t − τ 4 (t ))
The uncertain linear differential algebraic systems ⎨
with multiple time delays in system state and control ⎪ + Δf 1 ( x(t )) + Δf 2 ( x (t − τ 5 (t ))), t > 0
⎪
are studied. The systems not only contain uncertainties, ⎩ x(t ) = φ (t ), t≤0
but also experience uncertainties in the input channels. (1)
The condition for robust stabilizable independent of
delay of this kind of systems is presented by using where x(t ) ∈ R n is the state, u (t ) ∈ R m is the
Lyapunov methods. Using solutions of Lyapunov and
control. A, C ∈ R n×n and B , D ∈ R n×m are
Riccati equations, a linear state feedback control law
n× n
is put forward here. known matrices. ΔA(t ), ΔC (t ) ∈ R and
n×m
1. Introduction ΔB(t ), ΔD(t ) ∈ R are time varying uncertainties,
which satisfying
The problem of stabilizing uncertain systems with ΔA(t ) = M 1 F1 (t ) N 1 , ΔB(t ) = M 2 F2 (t ) N 2 ,
time varying and bounded parametric uncertainties has
ΔC (t ) = M 3 F3 (t ) N 3 , ΔD(t ) = M 4 F4 (t ) N 4 (2)
attracted a considerable amount of interest in recent
years.Sufficient conditions for quadratic stability of where M i ∈ R n×si (i = 1, " ,4) ,
linear systems with time-varying structured qi × n qi × n
Ni ∈ R (i = 1,3) or N i ∈ R (i = 2,4) are
uncertainties are formulated in [1] and[2].The robust
stability of time delay systems are discussed in [3]-[7]. known constant matrices, and
si × qi
But the systems in [3] –[7] are only subject to state Fi ∈ R (i = 1, " ,4) are unknown matrix
delay without control delay. The robust stability of a satisfying
kind of linear uncertainties systems with time delay is
Fi T (t ) Fi (t ) ≤ I ∀i = 1, " ,4, ∀t > 0
considered in [8]. But the uncertainties are all linear. A
kind of uncertainties systems which subject to time Δf1 ( x(t )) = G1δ ( x(t )) ,
delay in system state and control is studied, and the Δf 2 ( x(t − τ 5 )) = G2δ ( x(t − τ 5 )) ,
uncertainties maybe nonlinear.
δ ( x) ≤ Gx(t ) , (3)
2. Problem Statement and Preliminaries τ i (t )(i = 1,",5) are arbitrary differentiable
Consider the class of uncertain linear differential functions satisfying :for all t > 0
algebraic systems with time delay described by
•
equations of the following form 0 ≤ τ i (t) ≤ d i < ∞ , τ i (t ) ≤ ξ i < 1 , i = 1," ,5
(4)
1 V ( x, t ) ≤ x T (t )( P T A + A T P + P T BK + K T B T P +
2 y z ≤ ry y + z T z
T T
5
r ∑ R ) x(t )
i =1
i
(6) 1 T T
T T K N 2 N 2 K ]x (t ) (13)
Rˆ = R +
N N2
+ 2 Im
+
N N4 4
, μ2
μ2 μ 5 (1 − ξ 3 ) μ 6 (1 − ξ 4 ) 2 x (t ) PCx (t − τ 1 ) ≤ μ 3 x T (t ) PCC T P T x(t ) +
T
∧ 1
G= GT G (7) 1 T
x (t − τ 1 ) x (t − τ 1 ) (14)
μ 8 (1 − ξ 5 ) μ3
H = μ1 M 1 M 1T + μ 2 M 2 M 2T + μ 3 CC T + 2 x T (t ) PΔEx (t − τ 2 ) ≤ μ 4 x T (t ) PM 3 M 3T P T x(t )
μ 4 M 3 M 3T + μ 5 DD T + μ 6 M 4 M 4T + 1
+ x T (t − τ 2 ) N 3T N 3 x(t − τ 2 ) (15)
μ 7 G1G + μ 8 G 2 G
T T
(8) μ4
1 2
Then the system (1) is robust stabilizable independent 2 x T (t ) PDKx (t − τ 3 ) ≤ μ 5 x T (t ) PDD T P T x(t )
of the time delays, and the state feedback controller is 1
+ x T (t − τ 3 ) K T Kx(t − τ 3 ) (16)
u = Kx = − Rˆ −1 B T Px (9) μ5
Proof Let the Lyapunov function be
t 2 x T (t ) PΔDKx (t − τ 4 ) ≤ μ 6 x T (t ) PM 4 M 4T P T x(t )
V ( x, t ) = x (t ) E Px(t ) + ∫
T T
x ( s ) R1 x( s )ds +
T
1
t −τ 1
+ x T (t − τ 4 ) K T N 4T N 4 x(t − τ 4 ) (17)
μ6
442
2 x T (t ) PΔf 1 ( x(t )) = 2 x T (t ) PG1δ ( x(t )) ≤ GT G
+ ]x(t )
1 μ 8 (1 − ξ 5 )
μ 7 xT (t ) PG1G1T P T x(t ) + δ Tδ
μ7 •
that is
1 V ( x, t ) ≤ x T (t )( P T A + AT P − PBRˆ −1 B T P
= μ 7 x T (t ) PG1G1T P T x (t ) + x T (t )G T Gx(t )
μ7 + Qˆ + PHPT + G) x(t )
∧
(18)
− x T (t )(Q + K T RK ) x(t ) +
2 x (t ) PΔf 2 ( x(t − τ 5 )) = 2 x (t ) PG 2 δ ( x(t − τ 5 ))
T T
x T (t )( Rˆ −1 B T P + K )T Rˆ ( Rˆ −1 B T P + K ) x (t )
∧
1
≤ μ 8 x (t ) PG2 G P x (t ) +
T T T
δ δ T where Q̂ , R̂ , G , H are given by (6)-(8). With
μ8
2
(5) ,we have
•
= μ 8 x T (t ) PG 2 G 2T P T x (t ) + V ( x, t ) ≤ − x T (t )(Q + K T RK ) x(t ) < 0
1 Therefore , the system (1) is robust stabilizable
xT (t − τ 5 )G T Gx (t − τ 5 ) (19)
μ8 independent of the time delays. ▇
443
Transactions on Automatic Control 1998,43,pp. 1593---1596.
[6]S.Phoojaruenchanachai, K.Furuta, “ .Memoryless
stabilization of uncertain linear systems including [9] J.P..Hespanha , D.Liberzon , E.D.Sontag ,“Nonlinear
time-varying state delays ” , IEEE Trans. norm-observability notions and stability of switched
Automat.Contr.,1992,37,pp.1022---1026. systems”,IEEE Transactions on Automatic
Control,2005,50,pp.154—168.
[7] M.N.A Parlakci, “ Robust stability of uncertain
time-varying state-delayed systems ” ,IEE Proc.-Control [10] W.A.Sun , F.Q.Yuan , F.Dong et al, “ Sufficient
Theory Appl. 2006,153,pp.469-477. conditions for quadratic Robust stability of a class of
switched linear systems with uncertainties” , Mathematica
[8] J.S.Luo , P.P.J.van den Bosch , S.Weiland , Applicata, 2006,19,pp.492-497.
A.Goldenberge ,“ Design of performance robustness for
uncertain linear systems with state and control delays”,IEEE
444
2008 International Conference on Intelligent Computation Technology and Automation
446
Since we are most interested in the low frequency band. ⎡108 ⎤ ⎡0.34 ⎤ ⎡108 ⎤
So we have x o = ⎢⎢ 66.65⎥⎥ , u o = ⎢⎢0.69 ⎥⎥ , y o = ⎢⎢ 66.65⎥⎥,
K p = Dk − c 2 a 2−1b2 , K i = c1b1 , K d = −c 2 a 2−2 b2 . (16) ⎢⎣ 428 ⎥⎦ ⎢⎣0.436 ⎥⎦ ⎢⎣ 0 ⎥⎦
5.Experiment
z System model
Consider a 160MW boiler system, its nonlinear model
equation is:
⎧ x1 = −0.0018u 2 x19 / 8 + 0.9u1 − 0.15u 3
⎪ frequency
⎪ x 2 = (0.073u 2 − 0.016) x1 − 0.1x2
9/8
Figure 2. Open-loop singular values-nominal plant
⎪⎪ x = (141u − (1.1u − 0.19) x ) / 85
⎨
3 3 2 1
⎪ 1y = x1
⎪y = x
⎪ 2 2
447
⎡ 0.0011 0.0037 0.0271 ⎤ ⎡3(1 + 1 / s) 0 0 ⎤ in-realizable parts (namely the proportion and integral
W1 = ⎢- 0.0043 0.0071 - 0.0000⎥ ⎢ 0 3(1 + 1 / s ) 0 ⎥ sign opposite parts). The PI controller approximation as
⎢ ⎥⎢ ⎥
⎢⎣- 0.0005 0.0060 0.1625 ⎦⎥ ⎣⎢ 0 0 3(1 + 1 / s)⎦⎥ follows:
⎡0.0582 + 0.0031/ s 0 0.9818 + 0.0321/ s ⎤
K ( s) = ⎢⎢ ⎥
Secondly, Robust stabilization, it synthesize a feedback
0 0.0233 + 0.0093 / s 0 ⎥
controller K ∞ ,which robustly stabilizes the normalized
⎢⎣ 0 0 5.8946 + 0.1925 / s ⎥⎦
~
left coprime factorization of G , with stability margin
ε max = 0.40597 . z Simulation
Thirdly, the final robust H ∞ controller is 8 rank We use H ∞ controller and multivariable PI controller
controller. Its state space is: to simulate for three instances.
⎡0 0 0 0.0003 - 0.0011 - 0.0023 - 0.0140 - 0.0447 ⎤ Firstly, t=10s, input Δu1 = 10% step input
⎢0 ⎥
⎢ 0 0 0.0002 - 0.0056 - 0.0024 - 0.0184 - 0.1782 ⎥ disturbance, t=200s, input Δy1 =10Kg/cm2 step output
⎢0 0 0 0.0001 - 0.0028 - 0.0040 - 0.0610 - 0.0442 ⎥
⎢ ⎥ disturbance, t=500s, Δr1 =-10Kg/cm2 setpoint disturbance
0 0 0 - 0.1261 0.8475 0.0975 - 7.9245 28.3476 ⎥
Ak = ⎢ for 1st channel. See fig.4.
⎢0 0 0 0.0358 - 1.2294 - 0.4397 - 0.9873 - 13.0859 ⎥
⎢ ⎥ Secondly, t=10s, input Δu2 =10% step input
⎢0 0 0 0.0247 - 0.3236 - 0.3556 - 1.8249 - 0.9345 ⎥
⎢0 0 0 - 0.0019 0.0283 0.0202 - 0.1148 - 0.2374 ⎥ disturbance, t=200s, input Δy2 = 10MW step output
⎢ ⎥
⎣⎢0 0 0 - 0.0012 0.0339 0.0139 - 0.0162 - 0.23100 ⎦⎥ disturbance, t=500s, Δr2 =20MW setpoint disturbance for
⎡3.0000 0 0 0.0008 - 0.0034 - 0.0070 - 0.0419 - 0.1342 ⎤ 2st channel. See fig.5.
C k = ⎢⎢0 3.0000 0 0.0006 - 0.0169 - 0.0071 - 0.0553 - 0.5345 ⎥⎥ Thirdly, t=10s, input Δu3 =10% step input disturbance,
⎢⎣0 0 3.0000 0.0004 - 0.0085 - 0.0120 - 0.1830 - 0.1327 ⎥⎦
t=200s, input Δy3 =0.1m step output disturbance, t=500s,
⎡ 0.0024 0.0001 - 0.0001⎤
Δr3 =0.1m setpoint disturbance for 3st channel. See fig.6.
⎢ 0.0001
⎢ 0.0000 0.0000⎥⎥
⎢ - 0.0179 - 0.0004 0.0008 ⎥
⎢ ⎥
- 4.5058 - 1.7578 42.7012 ⎥
Bk = ⎢
⎢ - 0.1048 1.8776 - 1.3498 ⎥
⎢ ⎥
⎢ - 0.1799 0.5390 6.7136 ⎥
⎢ - 0.0613 - 0.0888 - 1.1121 ⎥
⎢ ⎥
⎣⎢ 0.0076 - 0.1117 0.1178 ⎦⎥
⎡ 0.0073 0.0002 - 0.0003 ⎤
Dk = ⎢⎢ 0.0002 0.0000 0.0000⎥⎥
⎢⎣- 0.0536 - 0.0012 0.0023⎥⎦
② the PID controller approximation of
the H ∞ controller by equation (16) is:
⎡ 0.0582 - 0.0196 0.9818⎤
K p = ⎢⎢ 0.0018 0.0233 0.0002 ⎥⎥
⎣⎢- 0.1158 - 0.1516 5.8946⎦⎥
⎡ 0.0031 0.0023 0.0321⎤
K i = ⎢⎢- 0.0004 0.0093 - 0.0001⎥⎥
⎢⎣- 0.0004 0.0011 0.1925⎥⎦
⎡ - 0.5608 0.3134 - 14.1128⎤
K d = ⎢⎢ - 0.0095 - 0.0224 0.0049 ⎥⎥
⎣⎢ - 1.2731 1.9245 - 84.6233 ⎦⎥
Because the differential effect can cause the high Figure 4. Response for 1st(solid: H ∞ controller, dashed: proposed PI)
frequency un-modeling trend, so commonly it isn’t Fig 4~6show that:
recommend to use the differential effect. Ignore the (1) Output y1 and y2 influences each other very small,
smaller coefficient item within K p , K i and all of the which satisfied decoupling.
448
(2) Output y3 and y1 , y3 and y2 are decoupling, that
is y3 step change influence y1 and y2 very small, on
the contrary, not true.
(3) Close system track load changing fast, which
guarantee safety for system.
(4) System is influenced by input and output very small
and disappeared fast.
6. Conclusion
A robust PID controller design method was proposed to
deal with both performance and robust stability
specifications for multivariable processes. It was shown
that the H ∞ controller guaranteed stability properties of
the close-loop system. The final PID controller
parameters is easy to achieve by reduction of
H ∞ controller. Illustrative example show that the
method is easy to use and can find PID settings that have
good time-domain performance and robustness.
7. Acknowledgment
8. References
[1] J. Bao, J. F. Forbes, and P. J. Mclellan, “Robust multiloop PID
controller design: A successive semidefinite programming
approach,” Ind. Eng. Chem. Res., vol.38,pp. 3407-3419, 1999.22
[2] B. S. Chen, Y. M. Chiang, and C. H. Lee, “A genetic approach to
mixed H2/H∞ optimal PID control,” IEEE Control System Magazine,
vol.15, pp.51-56, 1995.
[3] J. C. Doyle, B. A. Francis, and A. R. Tannenbaum, Feedback
Control Theory,New York: Macmilan Publishing Company, 1992.
[4] Skogesstad, S. and I. Plstlethwaite, Multivariable Feedback
Control: Analysis and Design, Wiley, New York, 1996.
[5] D.C. McFarlane, and K. Glover, Robust Controller Design Using
Normalized Coprime Factor Plant Descriptions, Spring-Verlag,
New York, 1990.
[6] J. W. Dong, and G.. B. Brosilow, “Design of robust multivariable
PID controllers via IMC,” Proc. American Control Conference,
Albuquerque, New Meico, pp.3380-3384, 1997.
[7] H. Panagopoulos and K.J. Astrom, “PID Control Design and H∞
Loop Shaping,” Proc. IEEE Conf. Contr. Appl., Hawaii, USA,
pp.103-108(1999).
[8] A. Visioli, “Optimal tuning of PID controllers for integral and
unstable processes,” IEEE Proc. Control and Applications, vol.148,
no.2, pp.180-184, 2001.
[9] X. Jin, W. Tan, ZH. J. Li, and J. Z. Liu, “Tuning of robust PID
controllers for typical industrial processes,” Control Theory &
Applications, vol.22, no.6, pp.943-953, December 2005.
[10]W. Tan, “Tuning of a modified Smith predictor for processes with
time delay,” Control Theory & Applications, vol.20, no.2,
pp.297-301, April 2003.
449
2008 International Conference on Intelligent Computation Technology and Automation
451
difficult for us to analyze and control the robot
frequently and accurately. So we introduce an Use LMI tool box in Matlab, we can get suited
approximate linearizing algorithm[8] to transform the matrix X and matrix Y. Then, a proper local feedback
model to linear control system. H∞ controller is obtained:
⎧ x = Ax + Ew + Bu + Ad x(t − τ ) ⎡ -0.1620 -0.0622 -1.2221 -0.1093⎤
⎨ (15) k =⎢ ⎥
⎩ y = Cx ⎣ -0.0617 0.0003 -0.0971 -0.0155 ⎦
u y
K(s)
452
From Fig.5.we can see that when there exists
time-delay, the system is not convergent, so the control
result is not satisfied.
According to the method introduced above, a robust
H∞ feedback controller is designed to improve the
situation. The angular speed and linear velocity plots
are shown in Fig.6.
5.Conclusions
In this paper, based on the kinematic and kinetic
analysis for the AS-R 3-DOF differential wheeled
mobile robot, a mathematical model with time delay
and uncertain disturbance for such robots is proposed..
Based on model reduction, a partial output feedback
H∞ robust controller is designed via LMI. Simulation
results show the whole system is reasonably stable.
Our results can be extended to nonlinear systems
widely existing in engineering situations.
453
This paper is supported by Tianjin Natural Science
Foundation (06YFJMJC03600).
REFERENCES
[2] Fioretti, S., Leo, T., & Longhi, S.. Navigation systems for
increasing the autonomy and security of mobile bases for
disabled people. Proceedings of the IEEE Robotics and
Automation pp. 393–398, 1998
454
2008 International Conference on Intelligent Computation Technology and Automation
Abstract: In this paper, we address the robust linear systems subject to exponential uncertainties by
H ∞ control problem of discrete-time switched linear using Taylor series approximation and convex polytope
technique. It is assumed that the switching strategy
systems with exponential uncertainties. By using Taylor
used in this paper is picked in such a way that there are
series approximation and convex polytope technique,
finite switches in finite time.
exponential uncertain discrete-time switched linear
system is transformed into an equivalent switched Our goal is to design a switching strategy σ (k ) and
polytopic model with an additive norm bounded associated state feedback sub-controllers such that the
uncertainty. For such equivalent switched model, we resulting closed-loop system is asymptotical
design its switching strategy and associated state stabilization with a prescribed H ∞ disturbance
feedback sub-controllers so that such switched model is attenuation level for all admissible exponential
asymptotical stabilization with H ∞ disturbance uncertainties. Firstly, we show that exponential
attenuation based on multiple Lyapunov function uncertain switched system is transformed into an
technology and LMI approach. equivalent polytopic model with an additive norm
bounded uncertainty based on Taylor series
1. Introduction approximation and convex polytope technique. And
then, the robust disturbance attenuation property of
Switched linear system belongs to a special class of such equivalent switched model is investigated by
hybrid system, which comprises a collection of taking advantage of multiple Lyapunov function
subsystems described by linear dynamics together with technology and LMI approach.
a switching law that specifies the switching between
the subsystems. 2. Problem Statements
Generally speaking, exponential uncertainty
ρ In this paper, based on multiple Lyapunov function
represents the terms like e M ρ or ∫
0
e M τ dτ that depend
technology and LMI approach, we investigate the
on an unknown, possibly discrete event parameter ρ . asymptotical stabilization with H ∞ disturbance
The H ∞ control problem for switched system subject attenuation for the exponentially uncertain switched
to exponentially uncertain is a very challenging discrete-time linear system (1) via switched state
problem. In the present literature, this problem is feedback.
treated by assuming estimable delay-uncertainties [1]. ⎧ x(k +1) = Aσ ( ρ (k )) x(k ) + B1σ ( ρ (k ))u(k ) + B2σ ω
Andrea Balluchi, et al [2] treats the uncertain ⎨ (1)
⎩ z (k ) = Cσ ( ρ (k )) x(k ) + Dσ ( ρ (k ))u(k )
exponential terms as bounded uncertainties. L. Hetel, et
al [3] studies the stabilization problem for a class of
discrete-time switched linear systems with exponential
with Aσ ( ρ (k)) = eMσ ρ ( k ) , B1σ ( ρ (k )) = (∫ ρ (k ) M s
0
σ
e )
ds Nσ ,
, D ( ρ (k )) = ( ∫ ds ) R .
ρ (k ) Q s
uncertainties under the arbitrary switching rule, and Cσ ( ρ (k )) = eQσ ρ ( k ) ρ e σ
σ
0
then obtained results are extended to cope with network
controlled systems. The H ∞ control problem for some where x ∈ n
is the system state; u ∈ is the control m
∑z
k =0
T
(k ) z (k ) < γ 2 ∑ ω T (k )ω (k ) for all nonzero ω
k =0 3. Robust H ∞ Control via Switched State
∞
Feedback
satisfying ∑ω
k =0
T
(k )ω (k ) < ∞ and all admissible
⎧⎪U1 = L0 + L1 ρ + + Lh ρ h , U 2 = L0 + L1 ρ + + Lh ρ h ⎪
⎨
⎪⎩ … ,U h +1 = L0 + L1 ρ + + Lh ρ h
⎪⎩ ( Dσh ( ρ (k ) + ΔDσh ( ρ (k ) ) ) u(k )
Aσh ( ρ (k )) = ∑ i =1 μi ( ρ (k ) ) U σAhi
h +1
The relation between the uncertain parameter ρ where (3)
and μ j ( ρ ) is given by B1hσ ( ρ (k )) = ( ∑ ( μ ( ρ (k ) )U ) ) N
h +1
i =1 i
B1h
σi σ (4)
⎧ ρ−ρ
Cσh ( ρ (k )) = ∑ i =1 μi ( ρ (k ) ) U σChi
h +1
⎪1 − , j =1 (5)
⎪ ρ −ρ
⎪ j −1
⎪ρ − ρ
j −1
ρj −ρj
Dσh ( ρ (k )) = ( ∑ ( μ ( ρ (k ) )U ) ) R
h +1
i =1 i
Dh
σi σ (6)
μ j ( ρ ) = ⎨ j −1 − , j = 2,3, ,h
∑
j −1 h +1
⎪ρ − ρ ρj −ρj
i =1
μi ( ρ ) = 1, μi ( ρ ) > 0, i = 1, 2, , h + 1. (7)
⎪ h
⎪ρ − ρ ,
h
⎧ Ah M σ2 2 Mh
j = h +1 ⎪ Uσ 1 = I + M σ ρ + ρ + + σ ρh
⎪ρh − ρh
⎩ ⎪⎪ 2! h!
Lemma 2.2 (Schur complement, [16]): For ⎨ … (8)
constant matrices M, L and Q with appropriate ⎪ 2 h
⎪U σAh, h +1 = I + M σ ρ + M σ ρ 2 + + M σ ρ h
⎪⎩ 2! h!
456
⎧ B1h Mσ 2 M σh stabilization with H ∞ disturbance attenuation γ via
⎪ Uσ 1 = ρ I + ρ + + ρ h +1 switched state feedback if there exist symmetrically
⎪ 2! ( h + 1)!
⎪ positive definite matrix X i and matrices Yi with
⎨ … (9)
⎪ h i = 1, 2, , N and j = 1, 2, , h + 1 such that the
⎪U σB1, hh +1 = ρ I + M σ ρ 2 + + M σ ρ h +1 following linear matrix inequality is satisfied for any
⎩⎪ 2! (h + 1)!
i = 1, 2, , N and j = 1, 2, , h + 1 .
⎧ Ch Qσ2 2 Qσh h ⎡ −Xi 2(U ijAh X i + U ijB1hYi )T
⎪ σ1U = I + Q ρ + ρ + + ρ 0
σ
2! h! ⎢
⎪⎪ ⎢ 0 Xi Xi
⎨ … (10) ⎢
⎢ 2(U ij X i + U ij Yi ) X i −Xi
Ah B1h
⎪ 2 h
⎪U σCh, h +1 = I + Qσ ρ + Qσ ρ 2 + + Qσ ρ h ⎢ 2(U Ch X + U DhY ) 0
⎪⎩ 0
2! h! ⎢ ij i ij i
⎢ Fi Yi 0 0
⎧ Dh Qσ 2 Qσh ⎢
⎪ Uσ 1 = ρ I + ρ + + ρ h +1
2! ( h + 1)! ⎢⎣ Ei X i 0 0
⎪
⎪
⎨ … (11) 2(UijCh X i + UijDhYi )T Fi YiT Ei Xi ⎤
⎪ h ⎥
⎪U σDh, h +1 = ρ I + Qσ ρ 2 + + Qσ ρ h +1 0 0 0 ⎥
⎪⎩ 2! (h + 1)! 0 0 0 ⎥
⎥<0 (14)
⎧ h h M
j −I 0 0 ⎥
⎪ΔAσ (ρ (k )) = e
M ρ (k )
− ∑ j =0 ρ j (k )
j ! 0 −I 0 ⎥
⎪ ⎥
⎪ h ⎛ ρ (k ) h +1 M
j −1
⎞ 0 0 −I ⎥⎦
⎪ΔB1σ (ρ (k )) = ⎜ ∫ eMs ds − ∑ j =1 ρ j (k ) ⎟ Nσ where
⎪ ⎝ 0 j! ⎠
⎨ j
(12) Ei = 4ηi γ A−2 + 4γ C−2 + 2γ −2γ A−2ψ 22iηi2 ,ηi = tr ( X i−1 ),
⎪ΔC h (ρ (k )) = eQρ (k ) − Q
∑ j = 0 j ! ρ j (k ) ,
h
⎢ Fi K i h
0 0
is actually a switched polytopic system subject to an ⎢
additive norm bounded uncertainty. As lemma 3.1 has ⎢⎣ Ei I 0 0
showed, such a switched model can be used to
represent the switched linear system (1). Therefore, 2(Cih ( ρ ))T Fi ( K ih )T Ei I ⎤
⎥
stabilizing switched dynamic model (2) is equivalent to 0 0 0 ⎥
doing the system (1). 0 0 0 ⎥
For disturbance attenuation performance of system ⎥<0 (16)
(2), we have the following result. −I 0 0 ⎥
Theorem 3.1: Given any constant γ > 0 , the 0 −I 0 ⎥
⎥
switched linear control system (2) is asymptotically 0 0 − I ⎥⎦
457
where ⎡ 2( Arhm ( ρ ))T Prm Arhm ( ρ ) + Frm ( K rhm )T K rhm
Aih (ρ ) = Aih (ρ) + B1hi (ρ)Kih , Cih (ρ) = Cih (ρ) + Dih (ρ)Kih . ⎡ 2 T T ⎤ ⎢
= ⎢ xT (k ) ω B2 rm ⎥ × ⎢ +2(Crhm ( ρ ))T Crhm ( ρ ) + Erm I − Prm
In view of Lemma 2.2, the matrix inequality (16) is ⎣ 2 ⎦ ⎢
⎢⎣ 2 Prm Arhm ( ρ )
equivalent to the following inequality.
⎡ x(k ) ⎤
⎡ 2( Aih ( ρ ))T Pi Aih ( ρ ) + Fi ( K ih )T K ih ⎤ 2( Arhm ( ρ ))T Prm ⎤ ⎢ ⎥
⎢ 2( Aih ( ρ ))T Pi ⎥ ⎥× 2
⎥⎦ ⎢ B2 rm ω ⎥
⎢ +2(Ci ( ρ )) Ci ( ρ ) + Ei I − Pi ⎥ < 0 (17)
h T h 2 Prm
⎣⎢ 2 ⎦⎥
⎢ ⎥
⎣⎢ 2 Pi Aih ( ρ ) 2 Pi ⎦⎥ Assume x(0) = 0 and introduce the performance
l
⎧1 k ∈ Κ i J = ∑ ( z T (k ) z (k ) − γ 2ω T (k )ω (k ))
Consider the notations: α i (k ) = ⎨
⎩0 k ∉ Κ i k =0
Let
where
Κ i = {k ∈ the ith subsystem is active at the k th step}
{(km , rm ) | rm ∈ ; m = 1,2, ; 0 = k1 < k2 <
< ks < l}
be switching sequence that is generated by the
The closed-loop dynamic of system (2) with state
switching strategy (15) in the set {0,1, 2, ,l} . Noting
feedback controller (15) is given by:
that x(k1 ) = x(0) = 0 , then for every ω satisfying
⎪⎧x(k +1) = ( Aσ ( k ) (ρ ) + ΔAσ ( k ) (ρ )) x(k ) + B2σ ω
h h
⎨ (18) ∞
⎪⎩ z(k ) = (Cσh(k ) (ρ) + ΔCσh( k ) (ρ )) x(k ) ∑ω
k =0
T
(k )ω (k ) < ∞ ,
where ΔArhm ( ρ ) = ΔArhm ( ρ (k )) + ΔB1hrm ( ρ (k )) K rhm , l l
ΔC ( ρ ) = ΔC ( ρ (k )) + ΔD ( ρ (k )) K .
h h h h J = ∑(zT (k)z(k) −γ 2ωT (k)ω(k) +ΔV(x(k))) − ∑ΔV(x(k))
rm rm rm rm k=0 k =0
Consider switched parameter dependent Lyapunov- l
(∑ )
k=0
N
V ( x(k )) = xT (k ) α (k ) Pi x(k ) (19) l
≤ ∑(zT (k)z(k) −γ 2ωT (k)ω(k) +ΔV(x(k)))
i =1 i
Lyapunov-like function (19) along with the trajectory By virtue of the matrix inequality (17), it follows
of the closed-loop dynamic system (18) is given by that J < 0 . That is to say
l l
ΔV = xT (k) ⎡⎣(Arhm ( ρ ))T Prm Arhm ( ρ ) + ∑z
k =0
T
(k ) z (k ) < γ 2 ∑ ω T (k )ω (k )
k =0
2(Arhm ( ρ ))T Prm ΔArhm ( ρ) + (ΔArhm ( ρ))T Prm ΔArhm ( ρ ) − Now, we prove that the switched system (2) with
Prm ⎤⎦ x(k) + 2xT (k)(Arhm ( ρ ))T Prm B2rm ω + ω ≡ 0 is asymptotically stable.
Let
2xT (k)(ΔArhm ( ρ ))T Prm B2rmω +ωT B2Trm Prm B2rm ω {(km , rm ) | rm ∈ ; m = 1,2, ; 0 = k1 < k2 < < ks < }
⎡2( Arhm ( ρ))T Prm Arhm ( ρ) ⎤ be switching sequence that is generated by the
≤ xT (k) ⎢ ⎥ x(k) + switching strategy (15) in the set of natural numbers.
⎢⎣+2(ΔArm ( ρ )) Prm ΔArm ( ρ) − Prm ⎥⎦
h T h
For any k ∈ K m , the derivative of V ( x ) along with
2xT (k)( Arhm ( ρ ))T Prm B2rmω +ωT B2Trm Prm B2rm ω +γ 2ωTω + the trajectory of the switched system (18) with ω ≡ 0
is given by
γ −2 xT (k)(ΔArh ( ρ ))T Pr B2r B2Tr Pr ΔArh ( ρ ) x(k)
m m m m m m
⎡ 2( Arhm ( ρ ))T Prm Arhm ( ρ ) + 4η rm γ A−2 I ⎤
⎡2(Crhm ( ρ ))T Crhm ( ρ ) + ⎤ ΔV ≤ x T ( k ) ⎢ ⎥ x(k )
⎣⎢ +4η rm γ B ( K rm ) K rm − Prm
−2
−z (k)z(k) + x (k) ⎢ ⎥ x(k) ⎦⎥
T T h T h
458
for any k ∈ K m , the discrete difference of Lyapunov- [4] S. Pettersson and B. Lennartson, “Hybrid system stability
and robustness verification using linear matrix
like functions (19) alone with the trajectory of the inequalities.” International Journal of Control, 2002,
switched system (18) with ω ≡ 0 is less than zero. vol.75, pp.1335-1355.
Without of generally, suppose that km +1 ∈ K m +1 and [5] Z. Ji, L. Wang and D. Xie, Robust H ∞ control and
km +1 − 1 ∈ K m . Then by Lyapunov-like functions (19), quadratic stabilization of uncertain switched linear
systems, Proceedings of the 2004 American Control
switching strategy (15) and Pi −1 = X i , i = 1, 2, ,N .
Conference, June 30 - July 2, pp. 4543-4548, 2004.
V ( x ( km +1 ) ) − V ( x ( k m +1 − 1) ) [6] D. Xie, L. Wang, F. Hao and G. Xie, LMI approach to
L2 -gain analysis and control synthesis of uncertain
= xT (km +1 ) Prm+1 x (k m +1 ) − xT (km +1 − 1) Prm x(km +1 − 1)
switched systems, IEE Proc.-Control Theory Appl., Vol.
= xT (km +1 ) X r−m1+1 x (k m +1 ) − xT (km +1 − 1) X r−m1 x(km +1 − 1) < 0 151, No. 1, January 2004, pp. 21-28.
[7] H. Nie and J. Zhao, Hybrid state feedback H ∞ robust
Hence by Lyapounv stability theory, under the action
of switching controller (15), the asymptotic stability of control for a class of linear systems with time-varying
norm-bounded uncertainty, Proceedings of the American
system (2) with ω ≡ 0 follows immediately. This
Control Conference, Denver, Colorado, 2003, pp.3608-
completes the proof. ■ 3613.
[8] F. Long, S. M. Fei, Z. M. Fu, S. Y. Zheng and W. Wei,
4. Conclusions H ∞ Control and quadratic stabilization of switched linear
systems with linear fractional uncertainties via output
The robust H ∞ control problem has been studied feedback, Nonlinear Analysis: Hybrid Systems, to appear,
via switched state feedback for switched linear discrete 2007.
systems with exponential uncertainties by using Taylor [9] F. Long, S. M. Fei, Z. M. Fu and S. Y. Zheng, Robust
series approximation, convex polytope technique and H ∞ state feedback control for switched linear systems
LMI method. Sufficient conditions are, by solving with linear fractional uncertainties based on LMI,
linear matrix inequalities, presented to realize the H ∞ Proceedings of the Chinese Control Conference,
Guangzhou, pp.930-934, July 2005.
control design. How to design a switching strategy and [10] G. Zhai, H. Lin and P. J. Antsaklis, Quadratic
an associated output feedback controller to improve the stabilizability of switched linear systems with polytopic
performance of switched systems should be further uncertainties, International Journal of Control, 2003,
studied in the future work. Vol.76, No.7, pp.747-753.
[11] F. Long and W. Wei, On Neural Network Switched
Acknowledgements Stabilization of SISO Switched Nonlinear Systems with
Actuator Saturation, Lecture Notes in Computer
This work was partially supported by the Natural Scienc,Vol. 4491, pp. 296-305, 2007.
Science Foundation of China under Grant No. [12] Song, Y., et al: Control of Switched Systems with
60764001, the Science Foundation of Guizhou Actuator Saturation. Journal of Control Theory and
Province under Grant No.20072208, the West Light Applications 1 (2006) 38-43
[13] F. Long, S. M. Fei, Z. M. Fu and S. Y. Zheng, Adaptive
Talent Project of The Chinese Academy of Sciences Neural Network Control for Switched System with
(2007) and the Indraught Talents Foundation of Unknown Nonlinear Part By Using Backstepping
Guizhou University (2007). Approach: SISO Case, Lecture Notes in Computer
Science, vol. 3972, Berlin Heidelberg, Springer-Verlag,
References 2006, pp. 842-848.
[14] F. Long, S. M. Fei, Z. M. Fu and S. Y. Zheng, H ∞
[1] W.Zhang, M.S. Branicky, and S.M. Phillips, “Stability of
networked control systems,” IEEE Control Systems Neural Network Control for Uncertain Nonlinear Switched
Magazine, vol. 21, no.1, pages 84–99, 2001. Impulsive Systems, Lecture Notes in Computer Science,
[2] B. Andrea, M. Pierpaolo, L. Alberto and S. Vincentelli, vol. 4234, Berlin Heidelberg, Springer-Verlag, 2006, pp.
“Controller synthesis on non-uniform and uncertain 664-673.
discrete time domains,” In The eighth International [15] L. Hetel, J. Daafouz and C. Iung, Stabilization of
Workshop on Hybrid Systems: Computation and arbitrary switched linear systems with unknown time
Control(HSCC05), Zurich, Switzerland, 2005. varying delays, IEEE Trans. On Automatic Control, vol.
[3] L. Hetel, J. Daafouz, C. Iung, “LMI control design for a 51, no. 10, pp. 1668-1674, October 2006.
class of exponential uncertain system with applications to [16] Carsten Scherer and Siep Weiland, Lecture Notes DISC
network controlled switched systems.” Proceedings of Course on Linear Matrix Inequalities in Control, Springer-
American Control Conference 2007, 9-13 July 2007, pp. Verlag, April, 1999.
1401-1406.
459
2008 International Conference on Intelligent Computation Technology and Automation
Abstract
2. Problem formulation
The problem of robust stabilization for a class of
uncertain switched linear systems is studied. Supposed Consider a class of switched linear system given by
that there exist finite appointed static output feedback x = ( Aσ + ΔAσ )x +( B σ + ΔB σ )u
controllers, the subsystem can’t be stabilized by using a
single appointed controller accordingly. The parameter y = Cx (1)
uncertainties are time-varying and unknown but are where x∈R n
, u∈R m
, y is output and
norm-bounded. By using the completeness and LMI σ :[ 0,+∞) → P = {1,2, " p} is the switching law
(linear matrix inequality) method, a sufficient
condition of robust stabilization for uncertain switched indicating the active subsystem at each instant.
linear systems is obtained. The method of hybrid output Ai , Bi are state matrix and input matrix of the i-th
feedback control is designed to make the closed-loop subsystem respectively and C is output matrix.
systems be asymptotically stable on the equilibrium ΔAi , ΔBi are uncertainties. Uncertainties have the
point. following forms
ΔAi = E i F( t )Di , ΔBi = M i F( t )N i (2)
1. Introduction where Ei , Di , M i , N i are constant matrices. F( t )
satisfies
Switched systems consist of several subsystems and
a switching law determining at any time instant which F T( t )F( t ) ≤ I (3)
subsystem is active. Switched systems have been Lemma: For any matrix X , Y with suitable
studied in many fields of science ranging from dimensions and a constant α > 0 , the following
intelligent robots to spaceflight in recent years. There expression holds
has been increasing interest in the stability analysis of X T Y + Y T X ≤ αX T X + α −1Y T Y
switched systems. Most of the results are obtained and The systems (1) have p appointed output feedback
based on the Lyapunov function or linear matrix controllers u = Fi y . Each of them can not stabilize the
inequalities or other methods (see e.g., [1-4]). However,
the results on robust stabilization for uncertain corresponding subsystem. By using output information,
switched systems are few (see [5,6]). the switching law is designed to make switched
In this paper, robust output feedback stabilization for systems be stable.
a class of switched linear systems is considered. State
matrix and input matrix of each subsystem have 3. Main results
uncertainties with norm-bounded. By using the single
Lyapunov function method and the multiple Lyapunov Definition: If there exists i ∈{1,2, " , p} and a set of
function method, sufficient conditions of asymptotical symmetrical matrices generated by {Z 1 , Z 2 ," , Z p } ,
stability for closed-loop systems are obtained
respectively. There exist finite appointed static output such that x T Z i x ≤ 0 holds for any x ∈ R n . Then the
feedback controllers. Under the assumption of the each set is complete. If there exists i ∈{1,2, " , p} and a set
subsystem can not be stabilized, the switched systems
are stabilized by using hybrid output feedback method.
of symmetric matrices generated by{Z 1 , Z 2 ," , Z p } ,
1 1 1 1
PE i E i P + γS T S + PM i M i P is complete strictly,
T T
εD2 D2 − P2 E2 E2 P2 − γS T S − P2 M 2 M 2 P2 > 0
T T T
ε γ ε γ
where S = N i Fi C . Then uncertain switched (11)
closed-loop systems (1) are asymptotical stable. Then we find consequentially a switching law
Proof : Appointed output feedback controllers σ :[ 0,+∞) → P = {1,2} to stabilize the switched
u = Fi y (6) closed-loop systems (1).
Design a switching law Proof: Without a loss of generality, we assume that
i = arg{min x T[( Ai + Bi Fi C )T P + P( Ai + Bi Fi C ) + β1 and β 2 are positive.
j
1 1 If x T( P1 - P2 )x ≥ 0 and x ≠ 0 , we have
εDi Di + PEi Ei P + γS T S + PM i M i P]x} (7)
T T T
ε γ
x T[ P1 A1 + A1 P1 + P1 B1 F1 C + C T F1 B1 P1 +
T T T
(8)
1 1
εD2 D2 + P2 E2 E2 P2 + γS T S + P2 M 2 M 2 P2 ]x < 0(13)
T T T
Take Lyapunov function V( x) = x T Px ε γ
p
where P is determined by ∑ Zi < 0 Let Ω 1 = { x | x T( P1 - P2 )x ≥ 0 , x ≠ 0}
i =1
Ω 2 = { x | x T( P2 - P1 )x ≥ 0 , x ≠ 0}
V( x) = 2 x T P( Ai + ΔAi + Bi Fi C + ΔBi Fi C )x
Take V1( x) = x T P1 x , V 2( x) = x T P2 x
= x [( Ai + Bi Fi C ) P + P( Ai + Bi Fi C )] x +
T T
Design a switching law
x T[( ΔAi + ΔBi Fi C ) T P + P( ΔAi + ΔBi Fi C )] x ⎧1 x ∈ Ω1
σ( x( t )) = i = ⎨ (14)
≤ x T[( Ai + Bi Fi C ) T P + P( Ai + Bi Fi C ) + ⎩ 2 x ∈ Ω 2 − Ω1
1 1 If x ∈ Ω1 ,we have
εDi Di + PEi Ei P + γS T S + PM i M i P] x (9)
T T T
ε γ V1( x) ≤ x T[ P1 A1 + A1 P1 + P1 B1 F1C + C T F1 B1 P1 +
T T T
ε γ
3.2. The multiple Lyapunov function method
(16)
461
If x T( P1 - P2 )x ≥ 0 and x ≠ 0 , matrix inequality the feasibility of the adopted methods.
(15)holds. Else x T( P2 - P1 )x ≥ 0 and x ≠ 0 ,matrix
inequality(16)holds.
The switched closed-loop systems are asymptotical
stable under the given switching law(14).
4. Numerical example
Consider uncertain switched systems
x = ( Ai + ΔAi )x +( Bi + ΔBi )u Figure 1. State response curves of switched systems
i = 1,2 (17)
y = Cx
⎡− 4 1 ⎤ ⎡ 2 0⎤
where A1 = ⎢ ⎥ , A2 = ⎢ ⎥ ,
⎣ 1 2⎦ ⎣0 1⎦
⎡ 2 0⎤ ⎡0.1sin( t ) 0 ⎤
B1 = ⎢ ⎥ , ΔA1 = ΔA2 = ⎢ ⎥,
⎣ 0 1⎦ ⎣ 0 0.1 cos( t )⎦
⎡1 0 ⎤ ⎡0.2 sin( t ) 0 ⎤
B2 = ⎢ ⎥ , ΔB1 = ΔB2 = ⎢ ⎥,
⎣ 0 2 ⎦ ⎣ 0 0. 2 cos( t )⎦
Figure 2. State trajectory of switched systems
⎡ 0 .1 0 ⎤ ⎡0 . 2 0 ⎤
E1 = E 2 = ⎢ ⎥ , M1 = M 2 = ⎢ ⎥,
⎣ 0 0 . 1⎦ ⎣ 0 0.2⎦ 5. Conclusion
⎡3 ⎤ ⎡ − 2⎤
D1 = D2 = N 1 = N 2 = I , F1 = ⎢ ⎥ , F2 = ⎢ ⎥ ,
⎣ − 2⎦ ⎣ − 3⎦ The problem of robust output feedback stabilization
for a class of switched linear systems with
C = [0 1] , x 0 = [ 0.3 2] T
uncertainties is studied. Some systems can not be
Z i = ( Ai + Bi Fi C ) T P + P( Ai + Bi Fi C ) + stabilized by static output feedback. However, they can
be stabilized by using the methods of hybrid output
1 1
εDi Di + PEi Ei P + γS T S + PM i M i P (18)
T T T
feedback.
ε γ
2
By ∑ Z i < 0 ,we obtain References
i =1
462
2008 International Conference on Intelligent Computation Technology and Automation
∑p
under a full reliability assumption that all actuators are
operational. However, in practical situations, actuator with pij ≥ 0 for i, j ∈ S ,and ij = 1 , for
j =1
failures may be encountered sometimes. Since
actuators are very important in transforming the i∈S .
controller output to the plant, how to preserve the Consider a discrete-time Markovian jump linear
closed-loop control system performance in the case of system with actuator failures in the state. The system
actuator failures will be more meaningful. For general parameters contain norm-bounded uncertainties. Let
linear systems, the problem of reliable control has been the system dynamics be described by the following:
~ ~
studied in [1-3],and for general nonlinear systems in x k +1 = A(k , rk )x k + B(k , rk )u kf + B w (rk )w k (1)
[4-7]. To the best of our knowledge, it seems that the ~ ~
reliable control for Markovian jump systems has only z k = C(k , rk )x k + D(k , rk )u kf + D w (rk )w k (2)
been studied in [8].However, the actuator failures are
modeled as outages in [8],i.e., when a failure occurs, x s = φ( s ), s ∈ {−d , ,0}, r (0) = r0 (3)
the control action simply becomes zero. The outage where x k ∈ R n is the system state,
model is the simplest case of control component
failures, but it can not represent the failures exactly. ukf = [u kf1 u kf2 f
u km ]T ∈ R m is the signal from
There are no results on the reliable control for discrete-
time Markovian jump systems. the actuator that has failed, w k ∈ R q is the
This paper considers the robust reliable H∞ control disturbance input which belongs to L2 [0, ∞), and
problem for discrete-time Markovian jump systems
with actuator failures. A more general failure model is zk ∈ R p
is the controlled output. To simplify the
adopted for actuator failures, which consists of a notation, W (k , i ) will be denoted by W i (k ) .For
scaling factor with upper and lower bounds to the
control action. A sufficient condition for the existence
Denote
Pi = ∑ pij P j and K i = MK i .
j =1
M = diag{α 1 , α 2 , … , α m }, The remaining of this section is devoted to designing
M 0 = diag{α 01 , α 02 , , α 0 m } , a robust, mode-dependent state feedback controller in
the form of
J = diag{ j1 , j 2 , …, j m }, uk = K i x k (12
L = diag{l1 , l 2 , …, l m } , )
Theorem 2 There exist reliable state feedback
L = diag{ l1 , l 2 , , l p }, controllers for the system(1)-(3),if there exist positive
α lθ + α uθ α uθ − α lθ scalar ε 1i , ε 2i and matrices Xi > 0 ,
where α 0θ = , jθ = ,
2 α uθ + α lθ
464
R > 0 and Yi , i = 1,2,… N satisfying the following ~ ~ ~ ~
Ξ1i = ( A i (k ) + B i (k )K i ) T Pi (A i (k ) + B i (k )K i )
matrix inequalities − Pi < 0 (14)
⎡ν1i ν 2i ⎤
⎢* <0 Pi = Vi ηViT ,where
ν 3i ⎥⎦
(13) Noting that
⎣ η = diag{P1 ,…, PN } ,
then the mode-dependent reliable state feedback
controller(12) with K i = Yi X i−1 stabilizes the Vi = [ pi1 I , , piN I ] ,thus Ξ 1i can be
uncertain jump system with actuator failure (1)- (3), From the Schur complement, it is easy to find that the
where matrix inequality (14) is equivalent to the following
matrix inequality:
⎡− X i a13 a16 ⎤ ~ ~
⎢ * ⎡− P ( A i (k ) + B i (k )K i ) T Vi ⎤
⎢ a 23 a 24 a 26 ⎥⎥ Ξ 2i = ⎢ i ⎥<0
⎣ * − η −1 ⎦
ν 1i = ⎢ * * a34 a36 ⎥
⎢ ⎥ (15)
⎢ * * * ⎥ Note that
⎢⎣ * * * * a56 ⎥⎦ Ξ 2i = Λi + Θi + ΘiT ,where
⎡ a17 YiT M 0T J
1
2
Xi ⎤ ⎡− P ( A i + B i K i ) T Vi ⎤
⎢ ⎥ Λi = ⎢ i ⎥
0⎥ ⎣ * − η −1 ⎦
⎢a 27 0
ν 2i = ⎢a 37 0 ⎥, ⎡ 0 ⎤
Θ i = ⎢ T ⎥ Δ i (k )[H 1i + H 2i K i 0] .
0
⎢ ⎥
⎢ ⎥ ⎣Vi E1i ⎦
⎢a
⎣ 47 0 0 ⎥⎦ By Lemma 1[9] ,it is obvious that (15) holds if and
only if there exists a positive scalar ε 1i such that
ν 3i = diag{a 67 ,−ε 2i I,0} ,
⎡ 0 ⎤
where
[
Λ i + ε 1i ⎢ T ⎥ 0 E1Ti V ]
a13 = pi1 ( Ai X i + Bi M 0Yi ) T , ⎣Vi E1i ⎦
⎡( H + H 2 i K i ) T ⎤
⎥[H 1i + H 2i K i 0] < 0
a16 = piN ( Ai X i + Bi M 0Yi ) T , + ε 1−i1 ⎢ 1i
a17 = (H 1i X i + H 2i M 0 Yi ) , T ⎣ 0 ⎦
(16)
a 23 = − X1 + ε 1i pi1E1i E1Ti + ε 2i pi1B i JB Ti , Therefore, using Schur complement, one can find that
(16) is equivalent to (22).
a 24 = ε 1i pi1 pi 2 E1i E1Ti + ε 2i pi1 pi 2 B i JB Ti
⎡− Pi q1i q 2i ⎤
a 26 = ε 1i pi1 piN E1i E1Ti + ε 2i pi1 piN B i JB Ti ⎢ q3i 0 ⎥⎥ < 0 (17)
⎢
a 27 = ε 2i pi1 B i JH , a 37 = ε 2i pi 2 B i JH ,
T
2i
T
2i ⎢⎣ − ε 1i I ⎥⎦
a 34 = − X 2 + ε 1i p i 2 E1i E1Ti + ε 2i pi 2 B i JB Ti , where
q1i = ( Ai + Bi K i ) T Vi , q 2i = (H 1i + H 2i K i ) T ,
a 36 = ε 1i p i 2 p iN E1i E1Ti + ε 2i p i 2 p iN B i JB Ti
q 3i = − η −1 + ε 1i ViT E1i E1Ti Vi .
a 56 = − X N + ε 1i piN E1i E1Ti + ε 2i piN B i JB Ti ,
By (8) and (17),and using Lemma2[3],it follows that
a 47 = ε 2i piN B i JH , T
2i ⎡ g 1i g 4i ( H 1i + H 2i M 0 K i ) T ⎤
a 67 = −ε 1i I + ε 2i H 2i JH T2i . ⎢ ⎥
⎢* g 2i ε 2iVi Bi H 2Ti ⎥<0 (18)
Proof From the Theorem 1,the sufficient condition ⎢* * g 3i ⎥
for stochastic stability of the uncertain jump system ⎣ ⎦
with actuator failures (1)-(3) with uk = K i x k is that where
the following inequalities hold: g 1i = − Pi + ε 2−i1K Ti M T0 JM 0 K i ,
465
g 2i = −η −1 + ε 1iViT E1i E1Ti Vi + ε 2iViT Bi JBiT V , b49 = a 37 , b55 = a 44 , b57 = a 46 ,
g 3i = −ε 1i I + ε 2i H 3i JH , T
3i b58 = ε 1i pi 2 E1i E 2Ti + ε 2i pi 2 Bi JDiT ,
g 4i = ( Ai + Bi M 0 K i ) T V . b59 = a 47 , b77 = a 66 , b79 = a 67 ,
Let X i = Pi−1 , Yi = K i X i . b78 = ε 1i piN E1i E 2Ti + ε 2i piN Bi JDiT ,
Pre- and postmultiplying (18) by diag{X i , I, I} and b88 = − I + ε 1i E 2i E 2Ti + ε 2i Di JDiT ,
then using Schur complement,it is easy to check that
(18)is equivalent to (13).This completes the proof.
b89 = ε 2i Di JH 3Ti , b99 = a 77 .
4. Robust reliable H∞ controller synthesis Proof Define a performance function J T by
Theorem 3 There exist reliable H∞ controller for T −1
− γ 2 wk = E{∑ ( z kT z k − γ 2 w Tk w k )}.
2 2
the system(1)-(3) , if there exist positive scalar JT = zk 2 2
ε 1i , ε 2i and matrices X i > 0, R > 0 ,and Yi , k =0
Assume zero initial condition, hence
i = 1,2,… N satisfying the following matrix T −1
inequalities J T = E{∑ ( z kT z k + Vk +1 ( X k +1 , rk +1 ) − Vk ( X k , rk )
⎡ϑ1i ϑ 2 i ϑ3i ⎤ k =0
T −1
⎢* ϑ4i 0 ⎥⎥ < 0 (19) − γ 2 w Tk w k )} − E{VT ( X T , rT )} ≤ ∑ ξ Tk Φ i ξ k
⎢ k =0
⎢⎣ * * ϑ5i ⎥⎦ where
then the mode-dependent state feedback controller(12)
−1
ξ k = [ x kT x kT−d w kT ]T ,
with K i = Yi X stabilizes the uncertain jump
i
⎡Φi11 Φi12 Φi13 ⎤
system with actuator failures (1)-(3),and guarantees
that the closed-loop system verifies noise attenuation Φi = ⎢⎢ * Φi 22 Φi 23 ⎥⎥ ,
level γ ,
⎢⎣ * * Φi 33 ⎥⎦
where
where
ϑ1i = diag{− X i ,−γ 2 I}, ~ ~ ~ ~
Φ i11 = ( A i + B i K i ) T Pi ( A i + B i K i ) − Pi
⎡b14 b17 b18 b19 ⎤ ~ ~ ~ ~
ϑ2 i = ⎢ + (C i + Di K i ) T (C i + Di K i ) ,
⎣ pi1 Bwi
T T
piN Bwi T
Dwi 0 ⎥⎦ ~ ~ ~ ~ ~ ~
Φi12 = ( Ai + Bi K i ) T Pi Adi + (C i + Di K i ) T C di ,
⎡Y T M T J 1 / 2 Xi ⎤ ~ ~ ~ ~
ϑ3i = ⎢ i 0 ⎥, Φi13 = ( Ai + Bi K i ) T Pi B wi + (C i + Di K i ) T Dwi
⎣ 0 0⎦
,
ϑ5i = diag{−ε 2i I}, ~ ~ ~ T~
Φ i 22 = A Tdi Pi A di + C di C di ,
⎡b44 b45 b47 b48 b49 ⎤ ~ ~ T
⎢* Φi 23 = AdiT Pi B wi + C di Dwi ,
⎢ b55 b57 b58 b59 ⎥⎥
Φi 33 = B wi
T
Pi B wi + Dwi
T
Dwi − γ 2 I .
⎢* * ⎥
ϑ 4i = ⎢ ⎥, If Φi < 0 ,then J T < 0 holds.
⎢* * * b77 b78 b79 ⎥ Then using the same argument as in the proof of
⎢* * * * b88 b89 ⎥ Theorem 2, (19) is obtained. This completes the proof.
⎢ ⎥ 5. Numerical example
⎣⎢ * * * * * b99 ⎦⎥ To illustrate the proposed results, a numerical
where example is considered for robust reliable H∞ control.
b14 = a13 , b17 = a16 , b18 = (C i X i + Di M 0Yi ) T , The system is described by(1)-(3) and assumed to
have two modes, i.e., S = {1,2}. The mode switching
b19 = a17 , b44 = a 33 , b45 = a 34 , b47 = a 36 ,
is governed by a Markov chain that has the following
b48 = ε 1i pi1 E1i E 2Ti + ε 2i pi1 Bi JDiT , transition probability matrix:
466
⎡0.2 0.8⎤ ,
p=⎢ ⎥
⎣0.6 0.4⎦
The other data are as follows:
⎡0.5 0 ⎤ , ⎡1 0.2⎤ , ⎡0.6 0 ⎤ ,
A1 = ⎢ ⎥ A2 = ⎢ 0 1 ⎥ B1 = ⎢ ⎥
⎣ 0 0 .5 ⎦ ⎣ ⎦ ⎣ 1 0.1⎦
⎡0.8 0 ⎤ , ⎡ 0.1 0⎤ , ⎡ 0 0.2⎤ ,
B2 = ⎢ ⎥ C 11 = ⎢ ⎥ C 12 = ⎢ ⎥
⎣0.3 0.1⎦ ⎣0.2 0⎦ ⎣0.1 0 ⎦
⎡ 0. 1 0 ⎤ , ⎡ 0 0.1⎤ ,
C 21 = ⎢ ⎥ C 22 = ⎢ ⎥
⎣− 0.1 0⎦ ⎣0.1 0 ⎦
⎡− 0.1 0.1⎤ , ⎡− 0.1 − 0.2⎤ ,
D11 = ⎢ ⎥ D12 = ⎢
⎣ 0 0.2⎦ ⎣ 0 0.1 ⎥⎦ Fig.1. Evolution of modes,states versus time
⎡0.1 0⎤ , ⎡− 0.1 0 ⎤ 6. Conclusions
, E11 = ⎡
0 0⎤
D 21 = ⎢ ⎥ D 22 = ⎢ ⎥ ⎢ ⎥
, This paper discusses the reliable design problem for
⎣ 0 0⎦ ⎣ 0 − 0.1⎦ ⎣0 0.1⎦ discrete-time Markovian jump systems with actuator
⎡ 0 0⎤ , ⎡0.1 0⎤ , failures. The resulting control systems are reliable in
E 12 = ⎢ ⎥ E 21 = ⎢ ⎥ that they remain stable and provide guaranteed H∞
⎣0.1 0⎦ ⎣ 0 0⎦ performance when all actuators are operational as well
⎡0 0 ⎤
, H 11 = ⎡
0.2 0 ⎤ as when some actuator failures.
E 22 = ⎢ ⎥ ⎢ ⎥
,
⎣ 0 − 0 . 1 ⎦ ⎣ 0 .1 0 . 1⎦ 7. References
⎡0.2 0 ⎤ ⎡ 0.3 0.2⎤ [1]Veillette R J, Medanic J V, Perkins W R. Design of
H 12 = ⎢ ⎥ H 21 = ⎢− 0.1 0.1⎥
, , reliable control system.IEEE Trans Automat
⎣ 0.1 − 0.1⎦ ⎣ ⎦ Contr,1992,37:770-784.
⎡ 0.3 0.2 ⎤
, H 31 = ⎡
0 0⎤ [2]Guan L , Wang J, Wang F. Robust H∞ Control with
H 22 = ⎢ ⎥ ⎢ ⎥
, Actuator Faults.Computing Technology and Automation,
⎣− 0.1 − 0.1⎦ ⎣− 0.2 0⎦ 2006,25(2):4-7.
⎡ 0 0.2⎤ , ⎡0⎤ [3]Wang F Z, Yao B. Optimal Reliable Guaranteed Cost
H 32 = ⎢ ⎥ x0 = ⎢ ⎥ , d = 3 , γ = 2 . Control for Uncertain Linear Systems.Mathematics In
⎣0.2 0 ⎦ ⎣0.1⎦ Practice And Theory,2005,35(6):153-160.
It is assumed that two control channels of the [4]Wang Z D, Huang B, Unbehauen H. Robust reliable
system have partial failure as follows: control for a class of uncertain nonlinear state-delayed
0.1 ≤ α 1 ≤ 1.1,0.2 ≤ α 2 ≤ 1.2 ,i.e., systems .Automatica,1999,35:955-963.
[5]Yang G. H, Lam J & Wang J L. Reliable H∞ control for
⎡0.8333 0 ⎤
, M0 = ⎡
0.6 0 ⎤ affine nonlinear systems .IEEE Transactions on
J =⎢ ⎥ ⎢ ⎥ Automatic Control,1998,43(8):1112-1117.
⎣ 0 0.7143⎦ ⎣ 0 0.7⎦
[6]XiaoY L, Xu Z D. Robust Reliable Control for Uncertain
Let the uncertainties in each mode be given Nonlinear Systems With Time-Delay.Systems
by Engineering and Electronics,2002,24(5):32-40.
⎡0.2 0 ⎤ , ⎡0.1 0 ⎤ , [7]Fu Y S, Tian Z H, Shi S J. Reliable H∞ State Feedback
Δ1 (t ) = ⎢ ⎥ Δ2 (t ) = ⎢ 0 0.1⎥ Control of Uncertain Nonlinear Systems.Journal Of
⎣ 0 0 .2 ⎦ ⎣ ⎦ Applied Sciences,2000,18(3):280-282.
Assume α 1 = 0.2, α 2 = 0.3 ,the results of the simulation [8]Yu Z X, Wu T H, Sun J T. Robust reliable H∞ control of
uncertain Markovian jump systems with time-
are shown in Fig.1. where w k is given by delays.//Proceedings of the 42nd IEEE conference on
⎧1, 0 ≤ k ≤ 5 Decision and control,2003:5032-5034.
wk = ⎨ [9] Wang Y, Xie L, de Souza C E, Robust control of a class
⎩0, k >5 of uncertain nonlinear system.System &
It is observed that when actuator failures occur, the ControlLett,1992,19:
139-149.
closed-loop system with the robust reliable H∞
controller operates well.
467
2008 International Conference on Intelligent Computation Technology and Automation
CHEN Chang-song
Changsha Univ. of Sci. & Tech.Changsha, China
(changsongchen@vip.sina.com)
Abstract trace, and the bridge can not to reach the last ideal
state. How to adjust control variety values according to
To reach the optimum mechanics state of long span the parameters’ error is one of the tasks in construct
prestressed concrete cable-stayed bridge after it control to insure the bridge close to the ideal state as
erected by construct control, a method is proposed to far as possible and to satisfy the design request. It is a
identify, predict and adjust parameter in construct complex process in data analysis during construct of
control of cable-stayed bridge, which integrates the cable-stayed bridge. It is necessary to establish a com-
minimum square method, grey prediction theory model pleted computer deal procedure so as to analyze in
and influence matrix adjustment method compositively. time and quickly get a conclusion on the spot.
The method is also verified by construct control of the At present identification and prediction of parame-
longest span prestress concrete bridge in Asia, and the ters error in construct control is still on the research
effect of construct is very successful. This work of con- stage, which have such main methods as Karlman,
struct control can absolutely demonstrate the validity grey prediction theory model, the minimum square
and practicability of the method. method [1] (or with weight coefficient) and so on. Be-
cause these methods come from mathematic statistics
1. Introduction model or random data assumption, they may neglect
the necessary relationship between mechanical re-
The construction process of prestressed concrete sponse and parameters error, and have less physical
cable-stayed bridge is very complex and has lots of meaning, and all these leads them still far from engi-
influence parameters. On the stage of design, these neering application.
parameters are generally assumed ideal. According to
the construction process, the theoretical value of con- 2. Identification, Prediction and Adjust-
trol parameters such as control tensile of cable and ment of Parameters
setting elevation may be determined by some methods
in order to reach the ideal state of bridge after it com- We must make use of the tested data which has
pleted. In fact, because these parameters have errors been disposed by temperature influence [2] to identify
and if the control variety values also use theoretical and predict the parameter error. One of the main tasks
values on the process of the construction, the mechan- in construct control is to identify the parameters error
ical state of bridge would deviate from theoretical
2.1 Selection of Parameters The tested value of state variable is {S R }10 , the
Choosing the suitable parameters which are used to
corresponding theoretical valve is {S L }10 , then the
identify and predict is very important. In section 3, we
have already been the first step analysis to the sensitive difference array of state variable is
of the parameters. It can not include too marry para-
{ΔS }10 = {S R }10 − {S L }10
meters but they must be representative. The parameters
which affected accuracy of control obviously can not If the influence matrix between parameter array and
be neglected. Because the cable tension has bean cali-
state variable is denoted by [ APS ]10×4 , the element in
brated by the high precision instrument, we could as-
sume cable tension without error. We choose the
the matrix means: if there a unit change of in {P}4
weight of every segment as the object to identify and
predict. In this process, we suppose that all test data
then there are corresponding change in {S }10 . Divide
have been already eliminated with temperature influ-
ence. Then we can suppose the influence parameter
[ APS ]10×4 into
vector is
{ΔG} = [ΔGL ΔG R ]T , {ΔT } = [ΔTL ΔTR ]T [ AGS ]{ΔG} = {ΔS }10 − [ ATS ]{ΔT }
If
Among them, ΔTL and ΔTR are obtained by test
469
{ΔS G }10 = {ΔS }10 − [ ATS ]{ΔT } {ΔG} = [0.2477 − 0.0515]T
Then From the result, we know that the left cantilever
By the ahead calculation we can get the influence then we can produce the sequence of new data.
matrix
{G } = [0.2105
(1)
0.4850 0.7970 1.0106 1.2583]T
⎡− 24.8 5.5 24.8 0.7⎤
⎢− 21.6 5.2 18.3 0.6⎥⎥
⎢ Substitute white-form differential equation into li-
⎢ − 18.4 5.0 14.3 0.6⎥
⎢ ⎥ near equations as follows
⎢ − 15.3 4.8 10.7 0.6⎥
[ APS ]10×4
⎢ − 12.7
=⎢
4.5 7.6 5.3⎥
⎥
{aˆ} = ([B ]T [B ]) −1 [B ]T {YN }
⎢ 3.6 − 7.8 0.0 6.3⎥
⎢ 4.0
⎢
− 8.7 0.1 6.1⎥
⎥
Among them, {aˆ} = [a b] is the parameter ar-
T
470
⎡ 1 (1) ⎤ So we should not predict too many number of weight
⎢ − 2 [G (1) + G ( 2)]
(1)
1⎥
error, generally, not more than two.
⎢ 1 ⎥ ⎡ − 0.3478 1⎤
⎢ − [G (1) ( 2) + G (1) (3)] 1⎥ ⎢ − 0.6410 1⎥⎥ 2.4 Adjustment.
[B] = ⎢ 12 ⎥=⎢
⎢ − [G (1) (3) + G (1) (4)] ⎢
1⎥ ⎢ − 0.9038 1⎥
⎢ 2 ⎥ ⎥ Weight error of segment will influence the control
⎢ 1 (1) ⎥ ⎣− 1.13445 1⎦
target and lead the final state of the bridge to deviate
⎢− [G (4) + G (5)] 1⎥
(1)
According to the formula we can predict the weight Among them, M, T, H denote section bending mo-
error of “28” and “29” segment. When k=6 , weight ment (unit: kN.m), cable tension (unit: kN ) and bot-
tom elevation respectively.
error of “28” segment is Gˆ ( 0 ) (6) = 0.2059 ,so the
In the following, we still take the last cable tension
weight of this segment is heavier of 1.03%. When k=7, adjustment of “27” segment as an example to explain
the weight error of “29” segment this process. According to the forward calculation, we
can obtain the ideal theoretical state. The relevant con-
ˆ
is G
(0)
(7) = 0.1924 , its weight is heavier of 0.96%.
trol target of nearby segment is
According to the formula, if we always adopt to {F} =[−321765
.5 822.9 −3785.4 −11121
.2 9900.4 9819.2 9962.7 61.905 61.881]T
471
If influence matrixes of control target due to para- bridges, It integrates the minimum square method, grey
prediction theory and influence matrix adjustment me-
meter and cable tension are [ AGF ] and [ ATF ] respec-
thod to carry out the identification, prediction of para-
tively, then according to the forward calculation result, meters and adjustment, and the whole comprehensive
they are method is clear, which is verified by real bridge. It can
⎡2.174 11.873 20.193 6.533 1.524 0.108 − 0.019 − 39 − 45⎤
T
satisfy the construct control needs of the long span
[ AGF ] = ⎢ ⎥
⎣2.258 97.059 − 4.808 6.452 1.147 1.482 − 0.037 − 35 − 41⎦ concrete cable-stayed bridge and is instructive.
T
⎡0.019 − 84.299 −12.538 − 4.027 −1.912 4.755 − 0.259 28 34⎤
[ ATF ] = ⎢ ⎥
⎣0.018 −187.009 22.790 − 3.684 −1.476 −1.949 4.880 22 28⎦ Acknowledgments
Then we have the adjustment equation of cable ten-
sion My work is supported by National Natural Science
472
2008 International Conference on Intelligent Computation Technology and Automation
0.2
0
-3 -2 -1 0 1 2 3
(a) e and ec ’s membership function curve
1NB NM NS Z PS PM PB
0.8
0.6
0.4
The structure of the self- adapting fuzzy PID control -0.3 -0.2 -0.1 0 0.1 0.2 0.3
of variable universe is shown in Fig. 2. Control system (b) ΔK p ’s membership function curve
uses e (error) and the ec (error change ratio) as inputs,
and ΔK p , ΔK i , ΔK d as outputs of a fuzzy controller. 1NB NM NS Z PS PM PB
Meanwhile, the input and output of the universes are
0.8
modified in real time by flex-factor. And then the
adjusted K p , K i , K d are used to control object, we 0.6
can complete real-time self-adapting control of the 0.4
object.
0.2
0
-0.12 -0.08 -0.04 0 0.04 0.08 0.12
(c) ΔK i ’s membership function curve
1NB NM NS Z PS PM PB
0.8
0.6
0.4
0.2
Fig. 2 Variable universe self-adapting fuzzy PID
0
controller structure graph
-3 -2 -1 0 1 2 3
2.2 Enactment of membership functions and
initial universes of input and output fuzzy sets (d) ΔK d ’s membership function curve
Fig. 3 Fuzzy subsets’ initial universes and
All the variables’ fuzzy subsets are defined as
membership functions
(NB,NM,NS,Z,PS,PM,PB). Taking into account of the
coverage , sensitivity ,robustness of universe, the fuzzy
subsets of the membership functions use “Z”- shaped
474
membership function in the left, triangulare 1.4
Amplitude
0.8
functions and initial universes is illustrated in Fig. 3.
0.6
experience of operators’ (experts) long-term practical (a) The step response curve
accumulation, but relying on the experts has some
difficulties in setting the fuzzy controls rules. This
article puts forward an analytical method of fuzzy
control rules which is based on the plane
characteristics of the step response. This method
reduces the dependence of the expert’s experiences to a
certain degree.
The closed loop step response of the stable system
curve and the phase plane characteristics curve are
shown in Fig. 4, and (a) is the step response curve, (b)
is the plane characteristics curve. B1, B2, B3, B4, c1, (b) The phase plane characteristics curve
c2, d1, and d2 in the step response curve respectively Fig. 4 Step response and phase
corresponds each region and spot of the phase plane. characteristics of plane
In B1’s region, the error is relatively large, we
should increase the output u(k) to reduce the rising zone (e>0,ec>0), we should increase u (k ) ,that is,
time. When the curve arrives at c1 point and enters into
increase the value of K p and decrease the value
B2’s zone, we should reduce the output u(k) to prevent
overshoot [4]. When the curve is in B3’s zone, we of K i . When the response curve is closed to d2 point
should continue to reduce u(k) to make the curve return we should decrease the value of K p and increase
to c2 as soon as possible. When the curve passes c2
point and enters B4’s zone, we should increase u(k) to the value of K i to make the curve return to the steady
reduce error. state as soon as possible.
If not considering the impact of the differential, it As regards to K d , in B1’s zone (e <0, ec > 0),
appears Δu (k ) = K p ec(k ) + K i e(k ) , by which we when the curve is near to c1 point, with the decreasing
analyse K p and K i ’s impact on Δu(k) [7]. When the of error, in order to speed up the response and decrease
the rising time, the value of K d is decreased. In B2’s
phase plane characteristic curve in B1’s zone (e>0,
ec <0), u (k ) should be increased to improve the zone (e<0, ec <0) , to decrease the overshoot and make
the system return as soon as possible, we should
system response speed , so K i must be a greater value, continue to decrease the value of K d . In B3’s (e>0,
K p must be a smaller value. When it is near c1 point ec <0) zone, the system is in the state of call-back.
and enters B2’s zone (e<0, ec <0), in order to decrease When the curve is near to c2 point, to prevent
the overshoot we should reduce u (k ) , increase the overshoot, we should increase the value of K d .When
value of K p and decrease the value of K i . When it is the curve in B4’s zone (e>0, ec > 0) where it is closed
near point d1 and enters B3’s zone (e<0, ec > 0), we to d2 point, to make the system return to the steady
state against time, we should increase the value
should decrease the value of K p and increase the
of K d .The fuzzy rules which are the integration of the
value of K i . When it is near point c2 and enters B4’s
above analysis and experience [6] is exhibited in Fig. 5.
475
Ec/E NB NM NS Z PS PM PB 523500
NB PB PB PM PM PS PS Z part is G ( s ) = , non-linear part
NM PB PB PM PM PS Z Z s + 87.35s 2 + 10470 s
3
476
Fig. 9 The result of general PID control
1 - Step response curve of self-adapting fuzzy PID in the test-bed
control with variable universe
2 - Step-response curve of conventional fuzzy PID
control
Fig.7 Comparison of step response curves between
conventional fuzzy PID control and self-adapting
fuzzy PID control with variable universe
477
Hunan Provincial Education Department (05A017).
7. References
[1] Yu Yongquan, HuangYing, Zeng Bi. The Discourse Self- industrial applications. Engineering Applicatons of Articial
adapting Fuzzy Controller for Temperature Control Intelligence,13(2000), pp.419-430.
Processing in Disinecting Cupboard. Proceedings of the
2004 IEEE International Conferenceon Fuzzy Systems, [6] Liu Jinkun. Advanced PID control and MATLAB
vol(3),2007,pp. 1263-1267. simulation. BeiJing: Publishing House of Electronics
Industry,2004.
[2] Li Zhen, ChenYi, Han Yuanjie. Design and Simulation of
a Fuzzy-PID Controller with Variable Universe. Techniques [7] Tao Yonghua, Yin Yixin,Ge Lusheng. New –type PID
of Automation and Applications, 2004,23 (12),pp. 29-31. control and application. Bei Jing: China Machine
Press,1998.
[3] Zhuang Lifeng, Yang Huizhong. Design and application
of self-adapting fuzzy PID controller. Automation and [8] ZHU Yan, GUO Junping. The Study and Simulation of
Instrumentation, 2005(1),pp.37-39. Fuzzy PID Based on Mutative Field. Journal of Air force
Engineering University (Natural Sciece Edition),
[4] Seok-Yong Oh and Dong-Jo Park. Self-Tuning Fuzzy 2005,6(5),pp.11-13.
Controller with Variable Universe of Discourse. IEEE
International Conference on Systems, Man and Cybemetics, [9] Li Hongxing, Miao Zhihong, Wang Jiaying. Stable
1995, Intelligent Systems for the 21st Century, vol(3), adaptive fuzzy control with variable universe of nonlinear
1995,pp.2628-2632. systems Scienc in China (Ser.E), 2002, 32(2),pp.211-223.
[5] Leonid Reznika, Omar Ghanayemb, Anna Bourmistrov. [10] Li hongxing. The Essence of Fuzzy Control and a kind
PID plus fuzzy controller structures as a design base for of Fine Fuzzy Controller. Control Theory & Applicatios.
1997,14(6),pp.868-871.
478
2008 International Conference on Intelligent Computation Technology and Automation
480
detailed information table of entity Agent description; medium and common Agents uses subscription
AgentService, a group information tables of specific web mechanism, which can be realized by some standard
services description; bingingTemplate, the technical OGSI interfaces including NotificationSource,
information table about the service entrance and structure NotificationSubscribscription, NotificationSink, etc.
standard; tModel, the expression table of points and
technology in standard descriptions; AgentAssertion, the 3. Coordination control of MAS
information table which describes correlative relations
among Agents as well as AgentSubscription, the table
which describes the subscription information of data 3.1 Features of coordination control
entities and so on.
Since there is no global target, MAS is not suitable to
2) The community medium Agent decomposes a task
adopt the completely centralized control mode. It should
into low coupled subtasks and carries on the coordinated
adopt the mode of loose coupled centralized control,
assignment among the Agents in the local community.
namely, the mode of medium service coordination control,
When the load of the local community is heavy or the task
which has the following characteristics:
can’t be accomplished for some Agent’s abnormities, it is
1) Each Agent control itself so as to attain its stability.
required that the social medium Agent assigns the Agents
2) Agents can perceive and communicate with each
in a remote community to carry out the task. Then, the
other so as to interact rapidly.
local Agents and the remote Agents compose a temporary
3) Agents can’t predict and control the global state of
federation, and cooperate with each other to complete the
the system directly except for the medium Agents. But
task under the coordination of the local community
they can perceive exterior environment and ask the
medium Agent. After completing the task, the remote
medium Agents to modify or adjust system parameters to
Agents return to its community and the temporary
coordinate system balance.
federation is automatically dismissed.
3) When a remote community Agent composes the 3.2 Coordination control form
temporary federation with the agents in local community,
it brings the corresponding subtask to its community. The When the MAS adopts the mode of medium service
subtask can be further assigned among the Agents in its coordination control, common Agents adjust and control
local community, which indirectly makes the task get a their behaviors spontaneously through perceiving exterior
reasonable assignment in the network without transmitting environment and information exchange because the
the description of subtask relation between communities. medium Agents just take responsibility for coordination
management such as the registry, inquiry, publication,
2.4.2 Role-based medium service collaboration discovery, binding of service. At the same time, they
mechanism coordinate system balance dynamically according to their
The system assigns an Agent to the community aim and desire. Based on the differences of
according to its role, which establishes a hierarchical communication mode and message channel structure
cooperative relationship among system entities and among Agents, the coordination may adopt the following
realizes the flexibility, expansibility and reducibility of forms[1][7]:
the system. Because the community management not only 1) Guiding coordination. Select an Agent as leading
can implement service management with finer granularity, subsystem, and other Agents as dependent subsystems.
but also can make more explicit service and management The leading subsystem observes, evaluates and adjusts the
strategies so that service providers and requesters can be running states of dependent subsystems. It performs the
connected rapidly and timely. coordination control of the dependent subsystems by
Service medium establishes an indirect cooperation sending guiding coordination signals. Under the
mode between service providers and requesters. On one leadership of the leading subsystem, the system completes
hand, adopting this mode remarkably decreases the the whole target and task. The corresponding channel
communication traffic of the system because service structure of communication is as shown in Fig. 2(a).
requesters only send service requests to fixed service 2) Circulation coordination. All Agents are equal.
mediums, instead of aimlessly sending requests to all According to a certain order, they carry on the
service providers, which differs from adopting a direct coordination in a serial mode and the direction can be
cooperation mode. On the other hand, it can avoid wasting clockwise or counter-clockwise. In the circulation,
of resources and deadlock because service medium can neighboring Agents are coordinators, and at the same time
make an overall consideration and management for finite are coordinated. This method is adaptive to the condition
system resources. The greatest advantage of adopting this that serial structure and dependent relation exist among
indirect cooperation mode is that service medium can find tasks. The channel structure is as shown in Fig. 2(b).
a cooperation partner for each entity timely, correctly and 3) Grouped coordination. The MAS is grouped by the
expediently [6]. The message passing between service Agent’s location, coupling, communication and the need
481
of coordination. Different groups may adopt different large-scale system can be realized through the task
coordination schemes independently. The broken lines coordination and resource coordination.
between different groups show that the need of In MAS, each Agent can be looked as a virtual
coordination is low and the coupling is weak or the artificial life. Therefore, inspired by the experiences and
communication is very difficult to accomplish. Under the lessons from the coordination, negotiation and
condition, the system has to adopt the off-line and non- collaboration among human body’s interior organs and
real-time coordination. The channel structure is as Fig. among persons in human society, effective and successful
2(c). methods of coordination, negotiation and collaboration for
4) Holo-coordination. There is an entire channel of the MAS should be studied based on the simulation
communication and bi-directional coordination between human body and human society. For example:
any two Agents. In an Agent system adopting holo- * “win-win” coordination principle: Both sides in the
coordination, any two Agents may coordinate, cooperate, collaboration should obtain benefits from the cooperation.
restrict and promote each other to achieve the aim of * “equity” coordination principle: The statuses of both
coordination control. The holo-coordination may be sides in the collaboration are equal and “the game rules”
looked as the integration form of leading coordination, are fair to both sides.
circulation coordination and grouped coordination. The The interior management and control system of human
channel structure is as Fig. 2(d). body is a product of the human’s long-term evolution and
has various multi-level coordination mechanisms, which
is worth study and reference. For example:
1) The multi-level coordination of the nervous system,
such as:
* The reflection coordination of the cerebral cortex
* The sensory information fusion and coordination of
the thalamencephalon
* The movement coordination and postural balance of
Fig.2 Coordination control form the cerebellum
* The physiological function coordination of the brain
The above four coordination forms are typical control stem
schemes of distributed systems. In a real system, they can * The sectional coordination of the spinal cord
combine with each other and be used flexibly. For a large * The bidirectional coordination of the sympathetic and
scale MAS, it’s very difficult to adopt holo-coordination parasympathetic
and grouped coordination is a better choice. The 2) The multi-level coordination of the hormone system,
coordination control of a group and inter-group may adopt such as:
leading coordination, circulation coordination or holo- * The hypothalamic center-pituitary (“hormone main
coordination flexibly. center”) carries the coordination among various glands by
3.3 Coordination control strategy hormones.
* The bidirectional coordination of the incretion
In MAS, it may use the multi-level coordination hormone, e.g. the insulin depresses the blood sugar and
control and the strategy of partial global planning. the glucagon raises the blood sugar.
3.3.1 Multi-level coordination control. 3.3.2 Partial global planning
The coordination in MAS is processing various Partial global planning (PGP) strategy is a typical
contradictions of the system and the management distributed coordination technique, whose characteristic is
procedure reasonably and correctly, making overall plans that every node collects not only the actual states but also
and taking all factors into consideration, homeostasis, the target information of other nodes. Therefore, the
harmonized cooperation and global optimization. In partial-global planning can provide flexible coordination,
"Large Systems Cybernetics", the “disassemble- guarantee the alternation and avoid the task redundancy
coordination” method has two steps to solve the question among nodes. It will issue a notice when some nodes have
of large-scale system optimization: the same middle target. Every node maintains its own
* Disassemble: The global optimization of large-scale PGP, uses PGP to coordinate its behaviors independently
system is disassembled into the local optimization of and asynchronously so as to accomplish the whole task[7].
many subsystems, including: The task disassemble, the 1) Task library
resource disassemble, which can be resolved parallel. The relation among the tasks of Agent includes
* Coordination: On the basis of achieving the local behavior equality and contextual relation. The former
optimization of subsystems, the global optimization of means that when some Agents have the same task and
they have realized this thing, they will assign only one
482
Agent to accomplish the task independently for avoiding builds the structure graph of showing the relations
redundancy. The latter means that the completion of one between nodes.
task is the precondition of another. The task continues
only when the precondition is completed. The 4. Conclusion
independent relation of the tasks of Agent also reflects on
time. It has to consider the beginning and end time of a This paper makes a preliminary study on the service-
task for those Agent systems with high real-time oriented organization management and coordination
requirements. Apparently, the sequence and time of tasks control scheme of the MAS, elaborates the SOAP-based
will influence the performance of the Agent system. So, communication mode and central-decentralized
Agent has to recognize these relations and manage them management mode, proposes the loose coupled
as the constituent parts of their behaviors. This needs to management strategy which takes the social medium
build a task library. The task library has the task set, the Agent and the community medium Agents as the service
task structure view and the dependent relations of tasks. medium and the role-based medium service collaboration
Where: mechanism. Then, linking the "Large Systems
The task set, T={T1,T2,… Tn}, includes all the system Cybernetics", this paper introduces the features and forms
tasks; of coordination control and discusses the multi-level
The structure view, Ti={ Ti1, Ti2, , Tim }, shows the coordination control and PGP strategy.
constitution of a task;
The dependent relation, Depend(Ta,Tb), shows task Ta References
depending on task Tb; Commitment(t, T, A, B), shows [1] Tu Xuyan, Wang cong, Guo Yanhui. Large systems
that Agent A promises Agent B accomplishing the task T cybernetics [M]. Beijing University of Posts and
before time t. Telecommunications Press, 2005
Every task has execution priority, deadline and [2] Gao Ji, Yuan Chengxiang, Wang jin. SASA5: A
promise of Agent. Promise is the key of coordination. method system for supporting Agent social activities
2) Basic method [J]. Chinese Journal of Computers, 2005, 28(5): 838-
(1) When a task starts, Agents get local task set, 848
structure view and the independent relations of tasks from [3] Ian Foster, Carl Kesselman. Jin Hai, Yuan Pingpeng,
the task library. The PGP planner accomplishes the local Shi Ke translation, Grid computing (The second
plan according to the priority, the estimate of execution edition) [M]. Publishing House of Electronics Industry,
time and deadline, adds them to plan-behavior queue and 2004
makes a promise for the task execution. [4] Xu Zhiwei, Feng Baiming, Li Wei. Grid computing
(2) In order to promote the coordination, the PGP technology [M]. Publishing House of Electronics
planner predicts the cost, result and practicability of the Industry, 2004
behavior and rearranges the behaviors in the plan- [5] Shen Jiquan, Zheng Xuefeng, Tu Xuyan. Research on
behavior queue to find a better behavior sequence. For information grid management model based on
example, if there is a time restriction relation between a generalized artificial life [J]. Computer Applications,
local Agent’s task and a remote Agent’s task, such as the 2005, 25(12): 2787-2788
local task depends on the remote task, the local Agent [6] Mao Xinjun, Zhao Jianmin, Wang Huaimin. Abstract
doesn’t execute its task until receiving the result of the cooperation models of Multi-Agent System [J].
remote task. The delay time depends on the deadline Journal of Computer Research and Development,
promised by the remote Agent. 2004, 40(5): 787-795
(3) According to the rearranged plan-behavior queue, [7] Lu Qingling, Zeng Guangping, Zhang Wei, et al.
the PGP planner modifies the local plan so as to follow Autonomous decentralized organization model and
the main steps of it in a better coordination mode and coordination control of Agent crowd [J]. Control and
Decision, 2006, 21(1): 56-63
483
2008 International Conference on Intelligent Computation Technology and Automation
485
We can derive Id(t) from (9), (10) and (11),that
results:
First case (input voltage disturbances):
vip I pio
I d (t ) = (12)
vip (t )
Second case (load perturbations):
RI pio
I d (t ) = (13)
R(t )
3. Simulation
Simulations were realized in Matlab7.0
Fig.5 Harmonics spectrum of input current
environment with Simulink. The simulative parameters
have values Vs=220V, 50Hz; L= 1mH; C= 1410μF. The scaled input AC voltage and input current are
Reference output voltage Vd=400V. Nominal load shown in Fig.3 and Fig.4. As expected, the line-current
resistance is initially set to R=100 Ω and abruptly tracks the shape of the line voltage with a slight
changes at 0.3 sec to R= 50Ω. distortion.
The input current is analyzed by FFT, and the result
Input voltage and current is shown in Fig5. The THD of input current is 1.13%.
400
Obviously, it is satisfied to IEC 61000-3-2 standard.
200 Output voltage
300
0 250
200
-200
150
-400 100
0.2 0.22 0.24 0.26 0.28 0.3 0.32 0.34 0.36 0.38 0.4
Time.sec 50
Input voltage and current Fig.6 Output voltage with step load
400 50%(Traditional SMC)
0 250
200
-200
150
100
-400
0.16 0.162 0.164 0.166 0.168 0.17 0.172 0.174 0.176 0.178 0.18
Time.sec 50
486
The output voltage of the converter controlled by
traditional SMC is shown in Fig.6
The output voltage of the converter controlled by
sliding mode control with time-varying sliding surface
is shown in Fig.7. They illustrate the better
performance of time-varying SMC to attenuate
disturbance than traditional one.
4. Conclusion
A sliding mode controller for boost AC-DC
conversion using time-varying sliding surface with
input current quality and robustness improvement
compared with classical SMC is proposed. The results
from the proposed scheme illustrate the good quality of
input current and the robustness of system in the
presence of load variation.
References
[1] J. Sebastiin, M. Jaureguizar and J. Uceda, “An overview
of power factor correction in single-phase off-line power
supply systems”, IECON’94, pp.1688-1693.
[2] S.Baev, Y.Shtessel, I.Shkolnikov, “Nonminimum-phase
output tracking in causal systems using higher order sliding
modes”, Proceedings of IEEE ACC’07 – to appear.
[3] M.E.Elbuluk, G.C.Verghese, D.E.Cameron, “Nonlinear
control of switching power converters”, IEEE Trans. Control
Systems Technology, vol.5, no.4, pp.601-617, 1989
[4] G.Escobar, H.Sira-Ramirez, “A passivity based sliding
mode control approach for the regulation of power factor
precompensators”, in Proc. IFAC NOLCOS, Enschede, The
Netherlands, 1998
[5]Juan M. Carrasco, Jose M. Quero , “Sliding Mode Control
of a DC/DC PWM Converter with PFC Implemented by
Neural Networks”, IEEE Trans. Circuits and
Systems,vol.44,no.8,August 1997.
[6]Fossas E.et al. “Sliding Mode Control Reduces
Audiosusceptibility and load perturbation in the Cuk
Converter”, IEEE Trans. CAS, 1992 ,39( 10) :847~849.
[7]S.Baev, Y.Shtessel, H.Biglari, et al. “Sliding Mode
Control of a Unity Power Factor AC-to-DC boost converter”,
IEEE Conference on Decision and Control, New Orleans, LA,
USA,Dec.12-24,2007
[8]Yuri B. Shtessel, Alan S.I. Zinober, A.Shkolnikov,
“Sliding mode control of boost and buck-boost power
converters using the dynamic sliding manifold”, International
Journal of Robust and Nonlinear Control 2003,13:1285-
1298.
[9]R. Morici, C. Rossi, A. Tonielli, “Variable Structure
Controller for AC/DC Boost Converter” , Proceedings of
the International Conference IECON94, pp1449-1454, 1994
487
2008 International Conference on Intelligent Computation Technology and Automation
+ Gi Bi v(t )]d (τ ) (3) And substitute the previous equation ueq (t ) into (1),
With Gi ∈ R m×n and Gi C1i = 0 . one obtain
x(t ) = Ai x(t ) + Bi v(t ) + C1i w(t ) (10)
489
For the class of sliding motion under consideration can Notice that Λ 1i < 0 ,then for all ζ (t ) ≠ 0 ,we have
be state as L2–L∞ control problem: given γ 2 ,∞ > 0 ,
J 2,∞ < 0 ,i.e.
find an admissible controller, one can obtain
On the other hand, LMI (12) implies
y (t ) ≤ γ 2 ,∞ w(t ) ∀w ∈ l 2 [0, ∞)
⎡ DiT ⎤ T ⎡P 0⎤
[ ]
∞ 2
⎢ T ⎥ Di EiT < γ 22,∞ ⎢ i
Theorem 1: For a given γ 2 ,∞ > 0 , the jump system
⎣ Ei ⎦ ⎣0 I ⎥⎦
in (10)(2) with v(t ) = 0 is robustly stable along the Therefore, the following holds:
pass and has an L2–L∞ performance level γ 2,∞ ,if there y T (t ) y (t ) = [ Di x(t ) + Ei w(t )]T [ Di x(t ) + Ei w(t )]
exit matrices Pi > 0 such that the following LMIs are < γ 22,∞ ∫ [ wT (θ ) w(θ )]dθ
t
feasible: 0
Taking the supremum
⎡Q Pi C1i ⎤
Λ1i = ⎢ 1i <0 < γ 2,∞ w(t ) 2 .
− I ⎥⎦
(11) y (t ) ∞
⎣* Definition 1.The disturbance-free jump system is said
⎡− Pi 0 DiT ⎤ to be stochastically stabilizable if there exists a linear
⎢ ⎥ feedback control law F (rk = i) = Fi (constant for
Λ 2i = ⎢ * − I EiT ⎥ < 0 (12)
⎢ * each value of i ), when r (t ) = i
⎣ * − γ 22,∞ ⎥⎦
u (t ) = − Fi x(t ) (16)
With
Such that the closed-loop system
Q1i = AiT Pi + Pi Ai + ∑ j =1π ij Pj
N
~
⎧⎪ x(t ) = Ai x(t ) + C1i w(t )
Proof: First, the stability is established along the pass ⎨ ~ (17)
of the nominal process in (10) with w = 0 .Choose the ⎪⎩ y (t ) = Di x(t ) + Ei w(t )
following Lyapunov functional candidate: With
V ( x(t ), i ) = x T (t ) Pi x(t ) ~
Ai = Ai + Bi Fi (18)
The infinitesimal operator ϑ (⋅) of the random process ~
Di = Di + C 2 i Fi (19)
{( x(t ), r (t ), t ≥ 0)} is given by is stochastically stable.
ϑV ( x(t ), i ) = x (t )( Ai Pi + Pi Ai + ∑ j =1π ij Pi ) x(t ) The following theorem give a solution to the L2–L∞
T T N
static feedback control problem.
(13) Theorem 2 Consider the systems (1) and let γ 2 ,∞ > 0
Notice that condition (11) implies
be a prescribed scalar. There exits a feedback
ϑV ( x(t ), i ) ≤ 0 controller of the form(16) such that the systems (17) is
So we conclude that the sliding motion described by robustly stable and has an L2---L∞ performance level
(10), with w(t ) = 0 ,for all t ,is stochastically γ 2,∞ ,if there exist some symmetric positive definite
stabilization.
Next, in order to establish the L2---L∞ performance, the matrices ( X 1 … X N ), (Y1 …YN ) such that the
zero boundary condition is assumed. Consider the following LMIs are feasible.
following performance index:
⎡Q C1i X i ⎤
Λ 3i = ⎢ 2 i <0
J 2,∞ = V ( x (t ), i ) − ∫ wT (θ )w(θ )dθ − I ⎥⎦
t (20)
(14)
0 ⎣ *
According to the stability along the pass of the process ⎡− X i 0 X i DiT + Yi C2Ti ⎤
and the zero boundary condition, then ⎢ ⎥
Λ 4i = ⎢ * −I EiT ⎥<0 (21)
J 2,∞ = V ( x (t ), i ) − V ( x(0), i ) − ∫ wT (θ )w(θ )dθ
t
0 ⎢ * * − γ 2,∞
2 ⎥
∞ ⎣ ⎦
= E{∫ (ζ T (t )Λ 1iζ (t ))dt}
∑
N
0 With Q3i = X i Ai + Ai X i +
T
j =1
π ij X j
Where
Proof. Substituting the controller(4) into (1),we obtain
ζ (t ) = [ x T (t ), wT (t )]T (15) the close-loop process as in (5).According to the proof
490
~ ~ According to (24) and setting si (t ) = si (t ) = 0 ,
of Theorem 1,replacing Ai and Di with Ai and Di in
(18) and (19),respectively, we can see that the closed- ueq (t ) can be obtained and substituted into (1) ,
loop systems in (17) is robustly stable along the pass
and has an L2–L∞ performance, if there exit matrices x(t ) = Ai x(t ) + Bi v(t ) + {I − Bi (Gi Bi ) −1 Gi } f n (t )
Pi > 0 satisfying + Ci w(t ) (27)
⎡Q Pi C1i ⎤ Theorem 3: Given γ 2 ,∞ > 0 ,suppose that, for some
Λ 5i = ⎢ 3i <0
I ⎥⎦
(22)
⎣* symmetric positive definite matrices( X 1 … X N) ,
~
⎡− Pi 0 DiT ⎤ (Y1 …YN ) ,the inequality (21) and (28)holds:
⎢ ⎥
Λ 6i = ⎢ * − I EiT ⎥ < 0 (23) ⎡Q4i C1i X i Ti X i ⎤
⎢ *
⎣ * − γ 22,∞ ⎥⎦ Λ 7i = ⎢⎢ * − I + β2 I2
0 ⎥⎥ < 0 (28)
~T ~ ⎢⎣ * 1 α ⎥
With Q3i = Ai Pi + Pi Ai + ∑ π ij Pj ⎦
N * 2
j =1
Q3i = X i AiT + Ai X i + ∑ j =1π ij X j + 2 β12 ,
N
Performing congruence transformations to (22) and With
(23) by diag ( Pi −1 , I ) and diag ( Pi −1 , I , I ) , Ti = I − Bi (Gi Bi ) −1 Gi
respectively. defining X i = Pi −1 , Fi X i = Yi and Then, the system (1) can be stochastically stabilization
invoking the Schur complement, we know that (20) with L2–L∞ performance level γ 2 ,∞ by a state-
and (21) hold if (22) and (23) hold, and this concludes feedback controller of the form
the proof. −1
4. system with matched and unmatched v(t ) = Fi x(t ) = Yi X i x(t )
uncertainties Proof: Let the Lyapunov functional be given by
In this section, we apply the integral-type sliding V ( x(t ), r (t ) = i ) := x T (t ) Pi x(t ) (29)
surface (3) to general class of unmatched uncertainties Then, differentiating the Lyapunov function (29) with
which may satisfy assumption 3. respect to time using (1) yields
Differentiating (3) with respect to time using (1), One
obtains ϑV ( x(t ), i ) = ϑV ( x(t ), i ) + 2 x T (t ) PiTi f n (t )
s (t ) = Gi x(t ) − Gi Ai x (t ) − Gi Bi v (t ) Using Lemma 1, then
= Gi Bi {[ I + ΔBi ]u (t ) + f m (t ) − v(t )} + Gi f n (t ) 2 xT (t ) PiTi f n (t ) ≤ α −1 xT (t ) PiTiTi T Pi x(t )
(24) + αf nT (t ) f n (t )
The VSC law is in the same form as (5) while the According to assumption (c), we obtain
switching gain satisfies the following
f nT (t ) f n (t ) ≤ 2β1 x T (t ) x(t ) + 2 β 22 wT (t ) w(t )
2
1
ρ (t ) > {ρ m + (1 − ε b ) v(t ) The following proof is similar to the proof of theorem
εb 1.
+ (Gi Bi ) −1 Gi f n (t ) max
} (25) 5. Numerical example
In this section, we present a numerical example to
V (t ) =
T
Differentiating the Lyapunov function 1 s si
2 i illustrate the usefulness of the proposed theoretical
with respect to time using (10),one yields results. Let us consider a system with two modes and
continuous state x (t ) ∈ R .Let the dynamics in each
2
V (t ) = siT (t )Gi Bi {( I + ΔBi )u (t ) + f m (t )
mode be described as follows:
− v(t ) + (Gi Bi ) −1 Gi f n (t )} (26) Mode 1:
We can prove the V (t ) < 0 in a similar way in
the system with matched uncertainties .Hence, the
sliding mode can be maintained by the controller (5)
using the switching gain (25).
491
⎡ − 1 1 0⎤ ⎡1 0 0⎤ ⎡1⎤ + 2.1001) + [− 0.2310 0.9538]x(t )
A1 = ⎢ 0 0 1⎥ , B1 = ⎢1 1 0⎥ , C11 = ⎢⎢0⎥⎥ ,
⎢ ⎥ ⎢ ⎥
u 2 (t ) = −
1
(0.2 sin(t ) cos( x2 ) + 2.5326 x
⎢⎣ 0 1 0⎥⎦ ⎢⎣0 0 1⎥⎦ ⎢⎣1⎥⎦ 0.8
+ 2.1045) + [− 0.3541 0.1344]x(t )
⎡ 0.1 ⎤ ⎡ 0.1 ⎤ The following figure shows output.
D1 = ⎢ 0.1 ⎥ , E1 = ⎢⎢0.05⎥⎥ ,
T ⎢ ⎥ T
r
⎡ 0 ⎤ 0.15
⎢
ΔB1 = ⎢0.1sin(t ) cos( x1 )⎥⎥ , C21 = 1 ; 0.1
⎢⎣ 0 ⎥⎦ 0.05
Mode 2:
⎡1 0 0⎤ ⎡0.5 0 0⎤ ⎡0 ⎤
0
A2 = ⎢1 1 3⎥ , B2 = ⎢ 0 1 0⎥ , C12 = ⎢⎢1⎥⎥ ,
⎢ ⎥ ⎢ ⎥ -0.05
0 2 4 6 8 10 12 14 16 18 20
time(second)
492
2008 International Conference on Intelligent Computation Technology and Automation
494
concepts, assess simulation results and validate system
performance till achieving design requirement very 4. Establishment and adjustment of ABS
conveniently state flow has advantage in integrating control logic state flow model
and interactive with MATLAB/Simulink development
environment. Simulink supports development of Because the logic control principle of four channels
continuous and discrete dynamic system in graphic’s is rather similar. We choose the first channel as the
model environment. Control behavior by state flow example to illuminate. On figure5, control logic flow-
modeling is a powerful complement to simulink chart of the first channel is realized successfully by
algorithm model, integration into simulink model of state flow. The box in the figure stands for system state.
it’s’ flow-chart greatly strengthen the event-driven The state produces dynamic alteration following the
ability of simulink. The combination of all of state changes of event and condition. It id called event
flow model in simulink model is a “machine”, state driven: only when event accrues, state flow is awoken
flow encoder model can produce integer and floating and response, every state has four actions. They are
code based on the machine, immediate workplace entry, during, Exit and on event name. And they
produces code for simulink part in the model. Both express respectively entering in staying in exiting
codes can be seam less integrated. from the state and action occurred between the states
because of some event. Circle represent connecting
nodes, multiple different jump-approach can be chosen
in the in the nodes. Flow-lines with arrowhead
between two nodes or between node and state stand for
jump-approach. That is access road from source object
to goal object. The current sign is: event [condition], it
Valve Signal
represents respectively event “occurred”﹑ “condition”
Wheel Speed
Convert Function of the event ﹑ “conditioned behavior” and “jump
behavior”. Good application of these sign can avoid
from using some unnecessary state and express
structure of control-flow effectively.
495
state in state flow :S0(boost pressure state) ﹑
S1(decompression state) ﹑ S2(pressure maintaining 5. Conclusion
state)﹑S3(small step boost pressure state ), S0﹑S1﹑
S2,the stable states ,are expressed “Steady” uniformly In this paper, basing on MAYLAB/Simulink
in P_logic. S3 is unstable state, it contains two sun development environment, by the aid of building
states S31 and S32, which respond to control of boost mathematic model for the Anti-lock Braking System,
pressure and pressure maintaining in small step process. we build state flow finite state machine model aim at
The time it relatively lasts in a small-step loop is the ABS electronic control unit, and further
identified by parameter L1 and L2.L1 and L2 can successfully architectures the logic State flow diagram
control steeper and temper. It plays the role of pressure four channel ABS system and obtains satisfying
minor adjusting. Parameter is used to enactment system performance by debugging. Basing on this
angular add speed threshold which jumps among four administration’s duty, we can adopt another important
pressure-adjust state. In the course of State flow functional model of Simulink, Real-Time Workshop,
model’s operation, corresponding states carry out and acquire portable program source code of C
during (abbr du) action and assign electromagnetic Language from the built model directly, architecture
valve signal differently. So it can achieve adjustment application process which can real-time executive in a
of braking line pressure and intention of Anti-lock variety of circumstances automatically, like real-time
braking .The threshold valve reference slip ratio SR system and single simulation. As a result, the course
adopts. from designing to effecting of Anti-lock Braking
After we designed controller model by State flow, System will be very rapid, and the development
we can add a Scope model to the whole Vehicle efficiency of Anti-lock Braking System will be
models which are architect in simulink. The scope improved greatly.
model can be used to in actual time inspect the control
results of Anti-lock Control Logic when operating
vehicle models. If we find the results can not hit for, REFERENCES
can change the par A, B, C in State flow model at 1. ZHANG Xin, Theory and Practices for Hydraulic
anytime, and can use the fine turning L1, L2, then re- ABS, Press of Central South University, 2005. 1
operate vehicle model to simulate, until we get (in Chinese)
satisfied effect. The whole course is very convenient to 2. The MATHWORKS, Inc. STATEFLOW®:For
operate, and the design efficiency will be improving Use with SIMULINK, User’s Guide Version 2,
greatly. 1999.9
The result of Anti-lock control of vehicle in high 3. The MATHWORKS, Inc. Real-Time Workshop®
adhesion road by using this model is showed on Figure For Use with SIMULINK, User’s Guide Version 3,
6.Braking initial speed is 45km/h. from the figure we 1999.9
know that the braking effect is fairly satisfy, the 4. Lutz Koester, “Automatic Code Generation for the
wheels are always keep in good loop without occurring TriCore Architecture from Infineon Technologies”,
lock event. Occasion of Embedded Intelligence, Nuremberg,
2000
5. ZHANG Xin, WU Weiguo, LIU Jiaqi, The
Wheel Speed km/h
Time s
496
Brake Torque
Brake Pedal
Valve Signal
Brake System Wheel Rotate Speed
Driving System
497
2008 International Conference on Intelligent Computation Technology and Automation
Tele-operation consists of motion control and force The interactive 6-DOF tele-operated system
control, of which the key is tele-presence. This paper includes: two isomorphic manipulators with 6-DOF,
presents the components of interactive 6-DOF electro-hydraulic servo system, and computer control
tele-operation system, displacement and force servo system.
control principle. Bilateral servo control is the core of
interaction technology which provides the operator 2.1. Construction design of the manipulator
with force tele-presence and is the important
foundation of the operator’s decision to complete the The master and slave manipulators have the same
tele-operation tasks successfully. The slave constructions shown as Fig.1, which is easier to control
manipulator’s free motion and limited motion the slave’s motion than those have different
experiments show that this system has realized the constructions [3], for the slave manipulator follows the
accurate displacement control and force tele-presence. motion of the master one at a certain ratio. The design
There is a satisfactory interaction between the master is based on the Stewart platform. The handle is bolted
and slave manipulators. to upper platform which is moveable. The bottom
platform is the base one. The two platforms are
connected with six single link hydraulic cylinders and
1. Introduction universal joints at the two ends of the cylinder. At the
upper platform side, there is an S shape pull and press
With the development of space, ocean and atomic force sensor used to measure and sense the force
energy technologies, the robots which are able to work
under the danger, uncertainty and the environment
difficult for human to reach are in urgent demand. So 1
the interactive tele-operated robots are deservedly 2
concerned. The realization of the tele-operated robot 5
system based on the interactive technology will
improve the robot’s capability greatly [1]. The danger
or remote operation tasks such as tele-manufacture, 6 3
tele-operation, tele-design, tele-medical treatment, tele-
experiment, space research, ocean development and so
on can be completed by the robot with which people 4
7
combined their intelligence and improved technique.
For this purpose, the interactive 6-DOF tele- operate
system is developed. With this system, further
researches on the tele-presence technology of force
feedback and interactive tele-operation technology [2] Fig.1. Manipulator based on Stewart platform
can be made. 1. Moveable Platform 2. Universal Joint
3. Hydraulic Cylinder 4. V Block 5. Force Sensor
6. Displacement Sensor 7. Base Platform
499
Only with effective perception can the right decision be information and force information that can be
made. For the purpose to improve the operator’s transmitted between the master robot and the slave
perception and the kinship of the system to the operator, robot. And ideally, the operator and the slave robot are
tele-presence conception is given. So tele-presence is equivalent. The force can be feedback to the master
the main idea of interaction technology. robot when the slave works on the object. So the
Tele-presence includes video, haptic, force and operator can feel the same operation force.
motion tele-presence. Though video tele-presence
provides the operator with true displacement 3.1. Displacement servo control
information of the robot in the environment and
realizes the perfectly combination of human video and Takes one cylinder’s displacement controlling for
robot video, and expends the robot’s capability, only example, see Fig.3. The computer obtains the displace-
the force tele- presence can really reappear the force ment state of the manipulator with force feedback
characteristics and state of the remote slave robot in all through wireless communication, at the same time the
the tele- presence technologies. When the tele-operate displacement sensor sends the cylinder’s displacement
robot performs haptic task on the object, such as grab, to the computer after A/D conversion. Control signal is
screw, insert, the environment kinetics seems especially obtained after PID control algorithm based on these
important. In all these tasks, 70% of information is two signals, and then it is input into the electro-
provided by force tele-presence. hydraulic subsystem so the cylinder displacement
The principle of the interactive 6-DOF tele-operate control is realized.
system is based on bilateral servo control, the motion
500
are the mass, damping and stiffness coefficients of the mainly was the force tele-presence. When the object
master manipulator correspondingly. was soft, the result that the slave manipulator followed
Slave manipulator the motion and force of the master manipulator was
f s − f e = m s
x s + b s x s + k s x s (2) shown in Fig.6. While the object was too hard to be
operated, that is the slave manipulator was completely
Here, xs is displacement of the slave manipulator, fe
limited, the results are shown in Fig. 7.
is the object’s reaction force on the slave manipulator,
From all the results, it can be seen that whether the
fs is the force brought by the force feedback system on
slave manipulator moves freely or limited, the slave
the slave manipulator. ms, bs, ks are the mass, damping
manipulator can follow the master manipulator’s
and elastic coefficient of the slave manipulator
motion and force accurately.
correspondingly.
Object
4000
f s = m e
x s + b e x s + k e x s (3)
Displacement of manipulator
quantized valve
Displacement
Displacement of cylinder
Here, me, be, ke are the mass, damping and stiffness 3000
coefficients of the object. 2000
The operator operates the object through the master
manipulator, communication and slave manipulator. 1000
While the reaction force on the slave manipulator and
0
the environment information are fed back to the 0 2 4 6 8 10 t/s 12
operator through this way. During this process, bilateral
2500 Operation force
displacement and force control are realized. Ideally, the
quantized valve
Feedback force
speed of the slave manipulator is equal to that of the Force 2000
master and the force the operator feels is equal to the
reaction force on the slave manipulator when it works 1500
stably [5]. That is, 1000
fm = fe
(4) 0
f s = k c 1 ( x m − x s ) + k c 2 ( x m − x s ) + f o 0 2 4 6 8 10 t/s 12
Here, kc1, kc2 is the uncertain error gain of speed and Non load
displacement.
Fig.5. Motion and force following when the
slave manipulator moved freely
4. Experiment and the results
4000 Displacement of manipulator
This experimental system mainly tests the control of
quantized valve
Displacement
501
References
quantized valve 4000 Displacement of manipulator
Displacement
Displacement of cylinder
3000 [1] Yokokohji Y, Yoshikawa T. Bilateral control of
master-slave manipulators for ideal kinesthetic coupling
2000
formulation and experiment [J]. IEEE Trans on Rob and Auto,
1000 1994, 10(5): 605~619.
502
2008 International Conference on Intelligent Computation Technology and Automation
504
Obviously, proper choice of positive constants s1 , s 2 , s 3 It is nature that a sharp criterion is expected to provide
can lower the minimal upper bound of k1 , k 2 or k 3 . For more choices of coupling coefficients. By the property that
similar matrices have the same eigenvalues, we apply the
example, in case of s1 = 3, s 2 = 2, s 3 = 1, k1 = 24, k 2 = 33,
Gerschgorin disc theorem to matrix P −1 HP with P = diag
k 3 = 13.6 are then gained to verify the inequalities(10). Fig.3
( p1 , p 2 , p 3 ), p i > 0, i = 1,2,3. More flexible synchronization
shows that the error responses approach to origin.
on criteria can be obtained as follows,
1
2k1 s1u1 > ( p2 1 + a + p3 b ),
p1
(12)
1
2k2 s2 u2 > −1.4 + ( p1 1 + a + p3 c ),
p2
1
2k3 s3u3 >
( p1 b + p2 c ).
p3
Similarly, the state variables are further restricted in the
3π
area of D0 = { x i − y i ≤ }, i = 1,2,3. The following
4
Fig.3 Chaos synchronization in the case of k1 = 24, k 2 = 35, k3 = , synchronization criteria are gained based on inequalities (12).
3π
13.7 , with initial condition ( x1 , x2 , x3 ) = (1,1,1), ( y1 , y 2 , y3 ) k1 > ( p 2 1 + a + p3 b ),
= (−1,−1,−1) . 4 2 s1 p1
3π 1
k2 > (−1.4 + ( p1 1 + a + p 3 c )), (13)
Especially, if k 2 =0, that is, the controllers are added 4 2s2 p2
respectively in the first and third state variables, the 3π
k3 > ( p1 b + p 2 c ).
inequality 1 + a + c < 1.4 should be held. If the coupling 4 2 s 3 p3
coefficients k1 , k 3 are selected such that The minimal upper bound of k1 , k 2 or k 3 can be reduced by
3π selecting appropriate coefficient of p1 , p2 and p 3 . For
k1 > (1.4 − c + b ),
4 2 instance, p1 = 1.5, p 2 = 1, p 3 = 0.5, s1 = 1, s 2 = 1, s 3 = 1
3π and k1 = 25.1, k 2 = 50.2, k 3 = 35.7 are chosen to satisfy the
k3 > ( b + c ). (11)
4 2 criterion (13). From Fig.5, we can see that synchronization
then the systems(1) and (2) achieve synchronization. error converge to zero quickly.
For example, s1 = 1, s 2 = 1, s 3 = 1 and k1 = 6, k 2 = 0,
k 3 = 13.7 are selected to satisfy inequalities (11). From Fig.4,
it can be seen that synchronization error with the initial
conditions ( x1 , x2 , x3 ) = (1,1,1) , ( y1 , y2 , y3 ) = (−1, −1, −1)
converges to zero finally.
505
Fig.2, and the initial conditions ( x1 , x2 , x3 ) = (3, −1, −2), [2] Fotsin H, Bowong S, Daafouz J. Adaptive synchronization of
two chaotic systems consisting of modified Van der
( y1 , y2 , y3 ) = (−1, −2,5) are outside of the region D . Pol-Duffing and Chua oscillators, Chaos, Solitons and Fractals,
2005, 26:215-229.
[3] Yassen MT. Adaptive synchronization of two different uncertain
chaotic systems, Physics Letter A, 2005, 337: 335-341.
[4] Curran PF, Chua LO. Absolute stability theory and the
synchronization problem, International Journal of Bifurcation
Chaos, 1997, 7:1375-1382.
[5] Chen HK. Chaos and chaos synchronization of a symmetric gyro
with linear-plus-cubic samping, Journal of Sound and
Vibration, 2002, 255:719-40.
[6] Wu XF, Cai JP, Wang MH. Master-slave chaos synchronization
riteria for the horizontal platform systems via linear state error
feedback control, Journal of Sound and Vibration, 2006,
Fig.6 The failure of synchronization in the case of 295:378-387.
[7] Tao CH, Xiong HX, Hu F. Two novel synchronization criterions
k1 = 72, k 2 = 65.5, k3 = 13.7 with initial condition ( x1 , x2 , x3 ) = for a unified chaos system, Chaos, Solitons and Fractals, 2006,
27:115-120.
(3, −1, −2), ( y1 , y 2 , y3 ) = ( −1, −2, 5) .
[8] Chen HK. Synchronization of two different chaotic systems: a
new system and each of the dynamical systems Lorenz, Chen
3 Conclusions and Lǔ , Chaos, Solitons and Fractals, 2005, 25:1049-1056.
[9] Liu YZ, Jiang CS, Lin CS, Jiang YM. Chaos synchronization
between different 4D hyperchaotic Chen systems,Chinese
Chaos synchronization of the drive-slave non-autonomous Physics, 2007, 1009-1963 16(03) 0660-06.
fly-ball systems coupled by sinusoidal state error feedback [10] Idowu BA, Vincent UE, Njah AN. Synchronization of chaos in
non-identical parametrically excited systems, Chaos , Solitons
control is studied in this paper. We have got some sufficient
and Fractals, 2007, dio:10.1016/j.chaos.2007. 06.128.
synchronization criteria in the form of algebraic inequalities [11] Chen HK. Global chaos synchronization of new chaotic systems
by using the Lyapunov direct method and Gerschgorin disc via nonlinear control, Chaos, Solitons and Fractals, 2005,
theorem. Moreover, the property that similar matrices have 23:1245-1251.
the same eigenvalues is applied to get more flexible criteria. [12] Lei Y, Xu W, Shen JW, Fang T. Global synchronization of two
Numerical simulations are given to verify the effectiveness parametrically excited systems using active control, Chaos,
and convenience of this method. Solitons and Fractals, 2005, 28: 428-436
[13] Ge ZM, Lin TN. Chaos chaos control and synchronization of
electro-mechanical gyrostat system, Journal of Sound and
Acknowledge Vibration, 2003, 285:1151-70.
[14] Ge ZM, Yu TC, Chen YS. Chaos synchronization of a
This work is supported by the Foundation for supporting horizontal platform system, Journal of Sound and Vibration,
Universities in Fujian Province under grant No 2007F5099. 2003, 268:731-49.
[15] Cai JP, Wu XF, Chen XH. Synchronization criteria for
non-autonomous chaotic systems via sinusoidal state error
References feedback control, Physica.Scripta, 2007, 75: 379-387
[16] Slotine J, Li WP. Applied nonlinear control, New
[1] Boccaletti S, Kurths J, Osipov G, Valladares DL, Zhou CS. The Jersey:Prentice-Hall, 1991.
synchronization of chaotic systems, Physics Reports, 2002, [17] Horn RA, Johnson CR. Matrix analysis, Cambridge:
366:1-101. Cambridge University Press, 1985.
[18] Ge ZM, Chen YS. Synchronization of unidirectional coupled
chaotic systems via partial stability, Chaos, Solitons and
Fractals, 2004, 21:101-111.
506
2008 International Conference on Intelligent Computation Technology and Automation
Luo Yong
The college of traffic and Auto. Xihua University. Chengdu. China, zip code: 610039,E-mail:
luoyonggorden@sina.com.cn
Yao Yun
The college of traffic and Auto. Xihua University. Chengdu. China, zip code: 610039
Gao Hongli
The college of traffic and Auto. Xihua University. Chengdu. China, zip code: 610039
right and prepare to open the green light to across for screen
150 m
bus as soon as possible. At the same time it must be
meet the requirements of the shortest time and interval
to open the green light for conflict traffic flow to
ensure that the traffic flow smooth and security. If the
Normal
bus lane speed of 60km/h in average, the average speed
lane
of bus is 50km/h(14m/sec) when it entered the junction.
When the Cross-signal control we chose a relatively
simple single-point induction control in recently and
chose network coordination optimal control in
long-term. The former can come out the induction Bus only
Sig
control in the intersection signal machine, the
nal
technology and equipments are relativity simple but it
mac
may bring disturbs to traffic flows in other conflicted
hine
direction to a certain extent, when there is a
bidirectional BRT requirement, in some Individual
circumstances the bus which has BRT request will have
10 seconds following the red light time [3,4]. The latter
must make use of signals and exit induction circuit 10seconds distends
Up Down
network to calculate and correspond in the traffic
request reques
control center.
circuit t
2.1 The induction layout of single-point
induction control junction
According to the figure 1, buses trigger the Figure 1.Induction control of the cross intersection
request circuit when they entered the place where 10
2.2 Conflict matrix of phase in BRT
seconds a way from the entrance stop line then the
intersection
508
Generally BRT at junctions reflect two aspects first request requested through or it will be forbidden
confliction with different phase: space conflict and time the phase will no longer support the second request in
conflict. The signal machine makes choice according this cycle and give it give priority in next phase. If the
with safety, efficiency and the principle of priority. request is in a time of Green Red conversions of p1
Now it is assumed that the phase is straight from east to phase such as green flashing or yellow light then p1
west, t is the time that BRT through the junction, phase will prolong automatically, but if it in other
residuary green time for current phase is Ґ and the BRT phase the phase of priority will be inserted at the
junction conflict matrix as follows. (Table 1) beginning of the next phase. Conflicts never exist
Table 1.table of BRT junction conflict matrix between turn right phase and phase of priority and are
generally in other phases so it is just need to arrange
Secon these typical phases. Pedestrian phase always with the
First
same direction to the straight or turn right directions,
time Ґ 0<Ґ d
reques for example although South-North Pedestrian phase
Space ≥t+10 <t+10 reques conflict with phase of priority but it accord with
t
straight from south to north, so only to discuss the latter.
t
There is only one kind of conflict between two-phase
√ junction and the phase of priority, and the handle way
P1 √ √ √
is similar with the four-phase junction. If there are
(delay)
more than four phases in junction, also analogize
P2 × × √ accord with the form.
509
is possible to interrupt this phase and turn into the first
phase in advance.
East-W
East- BRT phase
est
West
straigh
straigh Time
Time interval
t p1
t p1 diagram before
diagram
request
request
First request
(A) Time interval diagram after first request
Two BRT phase
Second request
(B) Time interval diagram after second request
Reque
The most impossible time
st
interval diagram after
mome
request
nt
510
3. Network coordination and optimal cost is 1/4 of the light rail and its transport speed is
control close to light rail faster than ordinary bus it has
advantages of constructing flexible operating quack
and so on. So it should be considered as an important
Set up two earth inductive coil at advanced
part of the main public traffic of city. The BRT signal
entrance of the rapid lane (general in the exit near to
control scheme in this paper is especially against the
e-card), connect to the signals server in center control.
typical signal control cross. This scheme can resolve
As long as the BRT vehicles entered the lane,
the problem of vehicles in ordinary road can achieve
according to 50km/h speed calculated the time when
the prior control rapid public transit and even point out
the bus arrived at the next junction. According to the
the plan to resolve phase conflict and the design of time
request time of the signal phase, calculate time
interval diagram. And have a discussion about the BRT
difference between two buses when they reached the
network optimization control on the section of the road
mid-point of the priority phase. If time difference is
that is based on single point signal control.
more than one cycle adjust the cycle, else change the
phase time and let the BRT vehicles through the phase
5.References
of priority.
If the request requested at the 60 second point of
[1] Juwu Bao, Analysis and application of Numerical
3rd phase, and there are 1200m from the next junction.
simulation Beijing: Academy Press 1993
The BRT vehicles are at the speed of 50km/h and will
[2] Guangleng Xiong Digital simulation algorithm and
need 90 seconds to get there, coordinate and distribute
software Beijing: China astronautic press 1991
in accordance with the normal operation of signals at
[3] Luo Yong, Report of urban bus station’s optimization and
the A point where the end of the second phase and there
simulation 2004
are 20 seconds time difference with the phase of
[4] Luo Yong etc. Comprehensive assessment study on
priority. Distribute the 22 seconds (two seconds
service level of the urban public transport system .AADT
redundancy) with the ratio of 2:3:3, the 3rd phase
Beijing:China Communications Press2004.5
extent 6 seconds, 4th phase extends 8 seconds and the
1st extent 8seconds. After such adjustment the BRT
vehicles is through the first phase.
4. Conclusions
511
2008 International Conference on Intelligent Computation Technology and Automation
513
At the time of measurement, the tilt sensor output Table 1
the corresponding analog signal, after A/D conversion,
digital filter then sent the data into MCU, read out the temperature
-40 -20 0 27 60
value of zero offset from the EEPROM, compensate to ˄ć˅
the current measurement value, then transform it into before
0.186 0.078 0.025 0.006 -0.103
angle value. calibration
after
4. Step motor selection calibration
0.016 0.010 0.007 0.005 -0.012
514
From the measurement data, we can see the impact method is feasible. The accuracy of the inclinometer
of the vibration to the inclinometer is relatively small. can be significantly improved. The accuracy reaches to
The data indicate the anti-vibration characteristic of the 0.02 嘙 in the range of ±15 嘙 and the temperature
inclinometer is good and it is satisfied with the design between -40ć to +60ć, simultaneity the inclinometer
requirements. has good anti-vibration characteristic and stability. The
5.3. Continuous work experiments high precision inclinometer install on the robot, the
accuracy of the robot attitude control can be
Powered the inclinometer 12 hours, and recorded guaranteed
the angle value every four hours. The data are recorded
in Table 3. Acknowledgements
Table 3 The authors would like to thank the financial
angle support by National Natural Science Foundation of
-14 -6 0 6 14
˄º˅ China (No. 60672022).
first -13.996 -5.996 0.002 6.003 14.005
References
second -13.995 -5.996 0.003 6.004 14.005
[1] Lizhi Wang, Xi Zhang, Principle and Adjustment of the
Bubble Level, Journal of Yunnan Normal University, 1996,
third -13.995 -5.996 0.003 6.004 14.005 43-44.
[2] K. Yamada and T. Kuriyama, Sensors and Actuators A,
The experimental data indicate that the 43, pp. 120-127, (1994)
inclinometer has good stability. [3] Lanxiang Liu, Qiusheng Zhang, The applications and
development of examples about ATmega128 microcontroller,
6. Conclusion Beijing Machinery Industry Publisher, 2006.
[4] Baoting Liu, Shukang Cheng, Step motor and the drive
The core of the paper is MCU ATMEGA16. The control system, Harbin Industry University Publisher, 1997.
MCU controlled the step motor rotating 180 嘙
[5] Xue Pan, Guowei Gao, Chao Wang, Yu Zhao, Jun Zhang,
accurately, and completed the process of automatic Electronic gradienter design and realization of dispelling zero
calibration. The temperature experiments indicate the excursion automatically, Transducer and MicroSystem
elimination of the zero drift automatic calibration technology,2008,79-81.
515
2008 International Conference on Intelligent Computation Technology and Automation
Minxiu Yan
School of Information Science and Engineering, Northeastern University, Shenyang, China
Information University, Shenyang Institute of Chemical Technology, Shenyang, China
cocoymx@sohu.com
Yuanwei Jing
School of Information Science and Engineering, Northeastern University, Shenyang, China
Youguo He
Faculty of Information Engineering, Shenyang University, Shenyang, China
⎣ ΔAd 21 ΔAd 22 ⎦
present the design of the sliding mode control
That is
algorithm. Matlab simulation results are presented in
z1 ( k + 1) = ( A11 + ΔA11 ) z1 ( k ) + ( A12 + ΔA12 ) z2 ( k )
section 4. Finally, we conclude our work in section 5.
+ ( Ad 11 + ΔAd 11 ) z1 (k − τ ) (4)
2. Problem formulation and preliminaries + ( Ad 12 + ΔAd 12 ) z2 ( k − τ ),
z2 (k + 1) = ( A21 + ΔA21 ) z1 (k ) + ( A22 + ΔA22 ) z2 (k )
Consider the following unmatched time-delay
+ ( Ad 21 + ΔAd 21 ) z1 (k − τ )
systems: (5)
x(k +1) = ( A +ΔA)x(k) + ( Ad +ΔAd )x(k −τ ) + ( Ad 22 + ΔAd 22 ) z2 (k − τ )
y(k) = Cx(k) ,
3. Design of discrete-time variable
where x(k ) ∈ R n is the state vector, u (k ) ∈ R m is the structure control algorithm
control input, y (k ) ∈ R p is the output. The term A ,
B and C are some constant matrices of appropriate 3.1. Design sliding surface using LMI
dimensions, Δ A , ΔAd and Δ B are the parameter Traditional design methods of sliding surface
uncertainties. τ > 0 is a constant. include pole placement method and LQR method etc.
We assume the following to be valid: These methods design sliding surface based on
Assumption 1: The pair ( A, B ) is controllable; the nominal system, which do not possess ideal robustness
when system includes unmatched uncertainties. Some
pair ( A, C ) is observable, B and C have full rank. literatures have been developed to deal with the
Assumption 2: p ≥ m and rank (C B ) = m . problem of designing stable sliding surface for
continuous-time systems with unmatched uncertainties.
Assumption 3: Δ A is unmatched uncertainty and But almost all of previous works discuss continuous-
Δ B has the structure satisfy the following form time systems. In this section we consider the design of
Δ B = B × ΔB . discrete-time sliding mode. For a class of linear
For analyzing the system (1), we will transform it to systems with unmatched uncertainties a discrete-time
its regular form. We suppose B = [b1 b2 ]T sliding mode is designed and the sliding mode
517
parameters are solved by means of LMI technique in The main result on the asymptotic stability of the
order to improve system robustness. sliding mode dynamics (10) is summarized in the
The sliding surface is defined as following following theorem.
according to output feedback VSC. Theorem1: If there exists a symmetric and positive
s (k ) = Fy (k ) = FCz (k ) = 0 (6) definite matrix P , Q , some matrixW and some scalar
When Assumption 1 and Assumption 2 are satisfied λ > 0 such that the following LMI (13) is satisfied,
the sliding surface can be changed into the structure as then the sliding mode dynamics (10) is asymptotically
following according to theorems in [8]: stable
s (k ) = FC[ z1 (k ) z2 (k )] = [ FC1 ]z1 ( k ) + [ FC2 ]z2 ( k ) (7) ⎡ H−X * * * ⎤
⎢ 0 −H * * ⎥⎥ (13)
⎢
Suppose rank[ FC2 ] = m, x2 (k ) ∈ R m .In sliding ⎢A X + A W
< 0.
Ad 11 X + Ad 12W X * ⎥
⎢ 11 12
⎥
mode s (k ) = FCz (k ) = 0 . ⎣⎢ E1 X + E2W E3 X + E4W 0 −λ I ⎦⎥
It is easy to find the following equality where H = P −1QP −1 , X = P −1 , W = − FC1 X ,
z2 (k ) = [ FC2 ]−1 ( FC1 ) z1 (k ) (8) X = − X + λ DDT , and ∗ denotes the transposed
Substituting (8) into (4) yields: elements in the symmetric positions.
z1 (k + 1) = ( A11 − A12 ( FC2 ) −1 FC1 + ΔA11 Proof: Consider Lyapunov function candidate
k −1
∑τ z
−ΔA12 ( FC2 ) −1 FC1 ) z1 (k ) + ( Ad 11 − Ad 12 ( FC2 ) −1 FC1 (9)
v(k ) = z1T (k ) Pz1 (k ) + 1
T
(α )Qz1 (α ) . (14)
−1
+ΔAd 11 − ΔAd 12 ( FC2 ) FC1 ) z1 ( k − τ ). α =k −
For simplicity, here we make the assumption of where P and Q are positive definite symmetrical
FC2 = I , then (9) yields: matrices. The difference of v(k ) is
z1 (k + 1) = ( A11 − A12 FC1 + ΔA11
Δv (k ) = v( k + 1) − v (k )
k
∑τz
− ΔA12 FC1 ) z1 (k ) + ( Ad 11 − Ad 12 FC1 (10)
= z1T (k + 1) Pz1 ( k + 1) + 1
T
(α )Qz1 (α )
+ ΔAd 11 − ΔAd 12 FC1 ) z1 (k − τ ). α= k +1−
k −1
In (10), we propose the uncertainties
Δ A11 , ΔA12 , ΔAd 11 and , ΔAd 12 are admissibly norm-
− z1T ( k ) Pz1 ( k ) −
α
∑τ z
=k −
1
T
(α )Qz1 (α )
dimensions, the following inequality holds: where ∗ denotes the transposed elements in the
Y + DG (k ) E + E T G T (k ) D T < 0 , symmetric positions.
where G (k ) satisfies G T (k )G (k ) ≤ I , if for some scalar By (11), (16) can be rewritten as:
λ >0 Γ + DG (k ) E + E T G T (k ) DT < 0, (17)
Y + λ DDT + λ −1 E T E < 0 where
holds.
518
⎡ Q−P ∗ ∗ ⎤ ⎡ FCAz (k ) + FCAd z (k − τ ) + FCφ (k )⎤ . (23)
u (k ) = −( FCB) −1 ⎢ ⎥
Γ = ⎢⎢ 0 −Q ∗ ⎥⎥ , ⎣− (1 − qT ) s (k ) + εTsgins (k ) ⎦
519
[2] W.B. Gao, Theory and Design Method of Variable
Structure Control, Science Press, Beijing, 1996.
Figure.2. Response of system control input u [11] Y. Dote, R.G. Hoft, Mieroprocessor Based Sliding
Mode Controller for DC Motor Drivers, IAS Annual
Meeting, Cincinnati. OH, 1980.
5. Conclusion
[12] W.B. Gao, “Variable Structure Control of Discrete-time
Systems”, Acta Automatica Sinica, 1995, pp. 154-161.
The problem of output feedback variable control of
discrete-time linear systems with unmatched [13] J. Wang, Y. Qiao, and X.L Wang, “Variable Structure
uncertainties and time-delay is considered in this Output Feedback of Discrete Systems ”, Control Theory and
paper. When the unmatched uncertainties systems are Application, 2001, pp.181-184.
not full observability, the sliding surface is designed by
system output. The sufficient condition for the [14] W.J. Wang, G.H. Wu, and D.C. Yang, “Variable
existence of stable sliding surface is derived in terms Structure Control Design for Uncertain Discrete-time
of LMIS. Then the design of sliding mode control is Systems ”, IEEE AC, 1994, pp. 99-102.
presented, which drives system state trajectories to
[15] L.H. Xie, “Output Feedback H ∞ Control of System
arrive at the switch band in limit time and thereafter
maintain in the switch band. The proposed control has with Parameter Uncertainty”, International Journal of
Control, 1996, pp. 741-750.
better results than state feedback for practical systems.
[16] Lee. H. J., Park. B. J., and Chen G R, “Robust Fuzzy
6. References Control of Nonlinear Systems with Parametric
Uncertainties”, IEEE Transactions on Fuzzy Systems, 2001,
[1] V.I. Utikin, Sliding Mode in Optimization and Control, pp. 369-379.
Springer-Verlag, New York, 1992.
520
2008 International Conference on Intelligent Computation Technology and Automation
⎡ 1 ⎤ ⎡ 1 ⎤
⎢− L ⎢− L
Here the output equation 0 ⎥ 0 ⎥ Q
⎡ d⎤
dv 3
C dc = (id S d + iq Sq ) − iL B=⎢ ⎥, f′=⎢ ⎥⎢ ⎥
dt 2 ⎢ 0 − ⎥
1 ⎢ 0 − ⎥⎣ q⎦
1 Q
⎢⎣ L ⎥⎦ ⎢⎣ L ⎥⎦
Let
522
Considering the uncertainties of the rectifier sT
parameters, it is assumed in (2) that the parameters are V (t ) = (G ( A + ΔA) x + G ( B + ΔB)u + Gf )
s
bounded as follows.
According to the assumptions and (13), then
Rmin < R = R0 + ΔR < Rmax
sT
Lmin < L = L0 + ΔL < Lmax = (GAx + G ΔAx + GB (u L + u N )
s
where ‘Δ’ denote the uncertainties. +G ΔB (u L + u N ) + Gf )
So (8) can be rewritten as
sT
x = ( A + ΔA) x + ( B + ΔB )u + f (10) = [G ΔAx + Gf − GEAx
s
Assumption 1: The uncertainties and disturbance 1+ E
satisfy − (σ + δ x ) sign( s )]
1 −η
ΔB = BE
sT
Assumption 2: ξ , η , β are positive constant and = [(G ΔA − GEA) x
s
satisfy
1+ E
ΔA ≤ ξ , E ≤ η < 1, f ≤ β − (σ + δ x ) sign( s ) + Gf ]
1 −η
sT
3. The design of VSC controller ≤ [( G ξ + η G A ) x
s
Let the sliding surface of system (9) as following. −(σ + δ x ) sign( s ) + G β ]
s = Gx (11) ≤ V + V
1 2
The selection of G should assure the sliding on where
surface of the system global asymptotic stability. And
sT
the selection of G may base the convergence speed of V1 = [( G ξ + η G A ) x − δ x sign( s)]
the sliding. s
When the system come to the sliding mode, there is
sT
s = s = 0 = [( G ξ + η G A − δ ) x sign( s)] < 0
s
So, the equal control is following. sT
−1
V2 = [ G β − σ sign( s )] < 0
u = −[G ( B + ΔB )] G[( A + ΔA) x + f ]
eq
(12) s
And the sliding equation is following. Therefore, there is V < 0 . That is to say, the sliding
x = [ I − B (GB) −1 G ] Ax mode exists, and the system (10) is asymptotically
stable.
Let the decentralized controllers are given by
u = uL + uN (13)
4. Simulations and experiments
−1
u = −(GB ) GAx
L
523
time. Fig.4 shows the output DC voltage based on VSC,
Fig.5 shows the output DC voltage based on PID. It is
observed in these two figures that the response time of
the VSC is shorter than the PID. Fig.6-Fig.9
respectively shows simulation waveform that the load
varieties from 25Ω to 12.5Ω at 0.3s. Fig.6 shows the
input voltage and current waveform based on the VSC.
Fig.7 shows the input voltage and current waveform
based on the PID. It is observed in these two figures
that the current wave of electricity net side is ensured
being sine, the power factor is approaching unity, but
the Fig.7 has shorter response time. Fig.8 shows the
output DC voltage based on VSC, Fig.9 shows the
output DC voltage based on PID. It is observed in
these two figures that the response time of the VCS is
shorter than the PID and the overshoot of the VCS is Figure 4. The simulation result of the output
smaller than the PID. These results show if the load DC voltages based on VSC
variation, the output based on the VSC has little
fluctuate and quickly come back stabilization.
524
This paper studied PWM rectifier systems which
contains the uncertainties parameters. Based on
variable-structure control approach, design the sliding
surfaces and controllers. The key difficulty is to solve
the problem induced by uncertainties parameters in
PWM rectifier mathematical model. The simulation
result shows the proposed approach is effective.
If the emf of each phase has fluctuant, the proposed
method of this paper can also have well performance.
The power factor may also be designed adjustable.
6. References
[1] Wang Xinggui, Ren TInghui, and Huang Zhongliang,
“Sliding Mode Control of Three-phase Voltage-source PWM
Figure 7. The simulation result of a-phase
Rectifier”, Power Electronics, 2007, Vol.41, No.1, pp.31-33.
current/voltage based on PID control (50%
variation of resistance at 0.3s) [2] S.R.Bowes, S.Grewal, “Novel harmonic elimination
PWM control strategies for three-phase PWM inverters using
space vector techniques”, Electric Power Applications, IEE
proceeding, Sept. 1999, Volume 146, pp. 495-451.
Figure 8. The simulation result of the output [6] Li Hua, Liu Xiaozhi, Jing Yuanwei,and Zhang Siying,
DC voltages based on the VSC (50% variation “Decentralized Variable Structure Control for Uncertain
Interconnected Systems”, Journal of Northeastern
of resistance at 0.3s)
University, 2003, Vol.24, No. 7, pp.613-615.
525
Session 4
ICICTA 2008
2008 International Conference on Intelligent Computation Technology and Automation
530
When bias voltage Vdc and sound pressure P are k ps
m ps = , (7)
given, wps can be obtained by solving (2): (2π f 0 )2
2hgap k ps + PAps 24 / 3 ( PAps − hgap k ps )2 Den where f0 is the resonant frequency of membrane cell
wps = − − (3)
3k ps 3k ps Den 21/ 36k ps without any bias voltage and fluid interactions.
where Because the fluid interaction also influences the
Den = (−16( PAps − hgap k ps )3 + 33 / 2 (432(ε AelVdc2 k ps2 ) 2 + dynamic behavior, the fluid impedance has to be taken
. into account, which can be written as:
128ε AelVdc2 k ps
2
( PAps − hgap k ps )3 )1/ 2 − 108ε AelVdc2 k ps2 )1/ 3
Z r = jX r + Rr , (8)
According to [10], the connection between piston
stiffness kps and piston area Aps can be acquired: where Xr and Rr can be described by an additional mass
2 term and an additional damping to the system
k ps Aps
= 2
, (4) according to [10] and Xr can be approximated by:
kmem Apitch
8 rps 1.4
where kmem is the membrane stiffness which can be Xr = ρ fl Aps rps (1 − ) , (9)
3π rpitch
calculated, using FEM simulation, from the average
membrane displacement as a reaction to static pressure where ρfl is the density of the fluid, rps is the radius of
load over Apitch. the piston, and rpitch is the radius of the membrane.
In line with [3], the link between the equivalent
electrical active area Ael and the piston stiffness kps can
be obtained:
8 k ps
Ael = ⋅ ⋅ hgap
3
, (5)
27 εU crit
2
531
B. 1-D Theoretical Model in Receiving Mode ⎛ δ x• ⎞ ⎛ ∂f1 ∂f1 ∂f1 ⎞ ⎛ ∂f1 ⎞
⎜ 1⎟ ⎜ ⎟ ⎛ δ x1 ⎞ ⎜ ⎟ ⎛ δ x1 ⎞
⎜ • ⎟ ⎜ ∂x1 ∂x2 ∂x3 ⎟ ⎜ ⎟ ⎜ ∂p ⎟ ⎜ ⎟
(15)
⎜δ x ⎟ ⎜ ∂f2 ∂f2 ∂f2 ⎟ ⎜δ x2 ⎟ ∂f
⎜ 2⎟ ⎜δ x2 ⎟
From Fig.3, we have: ⎜ 2 ⎟ = ⎜ ∂x ∂x2 ∂x3 ⎟ ⎜ ⎟ + δ p ⎜ ∂p ⎟ = As ⎜ ⎟ + Bsδ p
⎜ • ⎟ ⎜ ∂f1 ⎜δ x3 ⎟ ⎜δ x3 ⎟
• ∂f3 ∂f3 ⎟ ⎜ ⎟
⎜ ∂f3 ⎟
⎜ ⎟
dCV dV dC dg 1 ⎜δ x3 ⎟ ⎜ 3 ⎟ ⎝ ⎠ ⎜ ⎟ ⎝ ⎠
I =Q= =C +V = (Vdc − V ) , (11) ⎜ ⎟ ⎜ ∂x1 ∂x2 ∂x3 ⎟⎠X ,V ⎝ ∂p ⎠X ,V
dt dt dg dt R ⎝ ⎠ ⎝ 0 0 0 0
•• • where
Fe + Fr + Fs + m g + b g + k ps ( g − g 0 ) = 0 , (12)
⎛ wmean −g0 X1Ael (g0 −wmean) ⎞ ⎛ ⎞
⎜ 0 ⎟ ⎜ ⎟
where the electrostatic force applied on top electrode of
⎜ Rε A pitch A X2
pitch 2 ⎟ ⎜ 0 ⎟
the piston is Fe=εAelV2/(2g2); the pressure from the As =⎜ 0 0 1 ⎟; Bs =⎜ 0 ⎟δ p.
⎜ εAel X1 εAel X12 −kps X23 −bsys ⎟ ⎜ Aps ⎟
medium is Fs=P·Aps; the second radiation reaction ⎜ ⎟ ⎜−m ⎟
⎝ −msys X2
2 3
msys X2 msys ⎠ ⎝ sys ⎠
force of the medium is Fr=–Zru (u is the velocity of
the sound source); the total capacitance is C=Ca+Cp; Q The Laplace transform of (15) can be computed:
is the charge on the electrode; g is the gap between the
δ X ( s) = ( sI − As ) −1 Bsδ P( s) , (16)
electrode and substrate; g0 is the initial gap; V is the
Y ( s ) = Cs δ X ( s ) , (17)
voltage across the capacitor; Vdc is the DC bias voltage;
R is the series resistance in the circuit; kps is the where X(0)=X0=[X1, X2, 0]; Cs=(1 0 0).
equivalent spring constant; m is the equivalent piston Since δp is a small sound pressure applied on top
mass; b is the equivalent damping constant; Ael is the electrode of the piston which is operating in small
electric active area. signal mode [11], we can obtain the transfer function of
As mentioned before, since Xr and Rr can be the system:
equivalent to an additional mass and an additional Y (s) ε RX 22 ( g0 − wmean ) X1 Ael Aps s
H (s) = = Cs (sI − As )−1 Bs = (18)
damping to the system, Equation (12) can be rewritten δ P(s) Denom
as: where
ii i
Fe + Fs + msys g + bsys g + k ps ( g − g 0 ) = 0 , (13) Denom = −ε RX 24 msys Apitch s 3 − ε RX 24 bsys Apitch s 2 +
i
( wmean − g 0 ) X 24 msys s 2 + ε 2 RX 2 X 12 Ael Apitch s +
If we set x1=V; x2=g; x3= g , and y=Vout=Vdc-V=Vdc-x1,
( wmean − g 0 ) X 24 bsys s − ε RX 24 k ps Apitch s − k ps X 24 ( g 0 − wmean )
we can obtain the following set of state equations:
− ε 2 RX 12 Ael2 ( g 0 − wmean ) s + ε Ael X 2 X 12 ( g 0 − wmean )
⎧ • ( g 0 − wmean )(Vdc − x1 ) x1 x3 Ael ( g 0 − wmean )
⎪ x1 = ε Apitch R
+
Apitch x22 .
⎪•
⎪x = x III. Simulation and Verification
⎨ 2 3 (14)
⎪• 1 ε Ael x12
⎪ x3 = − m ( 2 x 2 + k ps ( x2 − g0 ) + pAps + bsys x3 ) In this section, a typical CMUT membrane cell is
⎪ sys 2
⎩ y = Vdc − x1 calculated using the proposed 1-D theoretical model for
where p is the input sound pressure from the medium. reception. It is also simulated by harmonic FEM
It is obvious that (14) is nonlinear and thus not easy to analysis, where the membrane radius rpitch=50 µm,
handle. We can linearize these equations by letting the electrode radius rel=50 µm, metallization layer
device work around an equilibrium operating point. thickness hel=200 nm, membrane thickness hmem=800
We can calculate the operating point by setting nm, effective gap height hgap=1 µm.
equation (14) to 0 and obtain the operating point The commercial available software ANSYS is
X0=[X1, X2, 0] when Vdc=V0. used to perform the FEM analysis. Trans126 element is
532
a capacitor element. A series of trans126 elements The first-order resonant frequency without bias
generated by EMTGEN macro provided by ANSYS voltage and fluid interaction f0 can be obtained as
are used to simulate the effective gap between 1.4135x106 Hz. The damping coefficient δ at bias
membrane and substrate. Solid45 element is for the voltage of 30V is -6095.8 1/s. With these results,
membrane, Circu124 element for the series resistance, according to Section II.A, the 1-D parameters can all
fluid30 element for the fluid environment around the be calculated, as listed in Table I.
CMUT, and fluid130 element for the absorbing With all of these data, we can compute the
boundary to avoid the reflection and refraction of the frequency response of output voltage with respect to
sound like an infinite boundary input sound pressure using FEM and our 1-D
By some static, modal, and harmonic analyses, the theoretical model in receiving mode. Since CMUT
static collapse voltage Ucrit is obtained to be 85.6 V. An usually operates at base mode, only the frequency
average displacement of the membrane at bias voltage range around the first-order resonant frequency is
of 30 V is 1.0934e-2 µm, and the mean membrane considered to reduce computational complexity. First
displacement under different sound pressure at bias we mesh the FEM model coarsely with an element size
voltage of 30V is shown in Fig.5. of 3.125 µm. It runs on Dawning mainframe computer
for about 81 minutes, which has 16 Intel Pentium CPU
cores and 16G bytes memory. The simulation is for 500
time steps. The simulation result is compared with that
obtained by our proposed 1-D theoretical model, where
the calculation is finished less than 1 second, as shown
in Fig.6 (a).
Fig.5. The mean membrane displacement under different
sound pressure at bias voltage of 30V.
DC bias voltage V0 30V When we further refine the mesh and reduce the
Radius of Piston *rps 37.2344µm element size to 2.0833 µm, the result obtained from
FEM, after running for about 9 hours on the same
Spring constant *kps 8.8097 x102µN/µm
machine, is shown in Fig.6 (b), where the result
Mass *mps 1.1169 x10-11kg
obtained from our proposed 1-D theoretical model is
Damping constant *bps 1.3646 x10-7µNs/µm
also plotted in Fig.6 (b). This time the two results
Electric active area *Ael 4023.4µm2
match each other very well. Comparing Fig.6 (a) and
Fig.6 (b), we can see that FEM gives a large simulation
533
error when element size is 3.125µm. The proposed 1-D 128-137, 2003.
theoretical model has much less computational cost [3] I. Ladabaum, X. Jin, H.T. Soh, A. Atalar, B.T.
than FEM simulation. In addition, it provides better Khuri-Yakub, “Surface micromachined capacitive
understanding of the effect of each parameter. ultrasonic transducers,” IEEE Trans. on UFFC, vol. 45,
No. 3, pp. 678-690, May, 1998.
IV. Conclusion [4] J. McLean and F. Degertekin, "CMUTs with dual
electrodes structure for improved transmit and receive
A 1-D theoretical model of CMUT in receiving performance,” Proceedsing of IEEE Ultrasonics
mode is proposed to study CMUT’s behavior with fluid Symposium, 2004.
load. The proposed model is suitable for fast parameter [5] B. Bayram, G. Yaralioglu, G. Ergun, and B.T.
optimization. A 3-D membrane cell is first mapped to a Khuri-Yakub, “Influence of the Electrode Size and
1-D piston using FEM analysis based on some Location on the Performance of a CMUT,” Proc., IEEE
reasonable assumptions. The error of these assumptions Ultrason. Symp., pp. 949-952, 2001.
is also investigated. Considering the influence of the [6] B. Bayram, E Hggstrom, G.G. Yaralioglu, and B.T.
acoustic impedance of fluid, we derive the motion Khuri-Yakub, “A New Regime for Operating Capacitive
equations of the piston driven by the sound pressure at Micromachined Ultrasonic Transducers,” IEEE Trans.
a certain bias voltage and find the relationship between Ultrason. Ferroelect., Freq. Contr. 50(9), pp. 1184-1 190,
piston motion and output voltage. The transfer function Sept., 2003.
between the output voltage and input sound pressure is [7] Y. Huang, E.O. Hæggström, X. Zhuang, A.S. Ergun, and
obtained based on control theory. To verify the B. T. Khuri-Yakub, “Optimized membrane
proposed 1-D theoretical model, a typical 3-D CMUT configuration improves CMUT performance,” Proc.
membrane cell is mapped to its equivalent 1-D lumped IEEE Ultrasonics Symposium, pp. 505-508, 2004.
model. Then FEM simulation of the 3-D CMUT [8] A. Lohfink, P.C. Eccardt, W. Benecke, and H. Meixner,
membrane cell and calculation of the 1-D equivalent “Derivation of a 1D CMUT model from FEM results
model using our proposed theoretical model are for linear and nonlinear equivalent circuit simulation,”
performed respectively. The results achieved by these in Proc. IEEE Ultrason. Symp., pp. 465-468, 2003.
two methods agree very well when element size in [9] A.S. Ergun, G.G. Yaralioglu, and B.T. Khuri-Yakub,
FEM is small enough. Our proposed model has much “Capacitive Micromachined Ultrasonic Transducers:
less computational cost and can provide comprehensive Theory and Technology,” Journal of Aerospace
understanding of the effect of each parameter, which is Engineering, Volume 16, Issue 2, pp. 76-84, April,
very useful in CMUT design. 2003.
[10] Annette Lohfink, and Peter-Christian Eccardt, “Linear
References and Nonlinear Equivalent Circuit Modeling of
CMUTs,” in IEEE Transactions on Ultrason.,
[1] M.I. Haller and B.T. Khuri-Yakub, “A surface Ferroelectrics, and Frequency Control, vol. 52, NO. 12
micromachined electrostatic ultrasonic air transducer,” pp. 2163-2172 December, 2005.
in Proc. IEEE Ultrason. Symp., pp.1241-1244, 1994. [11] Yongli Huang, “Capacitive Micromachined Ultrasonic
[2] Y. Huang, A.S. Ergun, E.O. Haggstrom, M.H. Badi, B.T. Transducers (CMUTs) Built with Wafer-bonding
Khuri-Yakub, “Fabricating capacitive micromachined technology”, Ph.D. dissertation, Stanford University,
ultrasonic transducers with wafer-bonding technology,” CA., USA, March, 2005.
Journal of microelectromechanical systems 12(2), pp.
534
2008 International Conference on Intelligent Computation Technology and Automation
only one job at a time, and the jobs are processed only f = 2, " , F ; j = 2,", N f ; m = 2,",4 (9)
one machine at a time; ⑷The jobs are available at time Constraints (5) ensure that all jobs in a run are
zero, and on the machines without preemption; ⑸Each processed consecutively and once the processing of a
machine is available at time zero. run starts, it cannot be interrupted until all jobs of that
In order to describe this problem, first a definition is run are processed.
given as follow: The makespan, Cmax , and maximum tardiness,
Definition: A sequencing of all jobs from same type Lmax , are defined as:
are processed consecutively is called run.
According to the definition, a feasible scheduling Cmax = STF , N F 4 + PF , N F 4 (10)
consists of a serial runs, and jobs in each run are from Lmax = max{ST f , j 4 + P f , j 4 − d f , j ,0}
same type. The two adjacent runs belong in a different f,j
type, a setup time is required. f = 1,2, " , F ; j = 1,2,", N f (11)
Assume that a scheduling consists of F runs, and With these definitions and computations, the
are represented as 1 , 2 , … , F sequentially. Let problem considered in this paper is to find a processing
those jobs be numbered sequentially such that the first sequence of jobs so as to minimize Cmax and Lmax .
N 1 jobs belong to the first run1, the next N 2 jobs
belong to run2, and so on until finally N F jobs belong 3. Modified genetic local search algorithm
to run F .Thus, n = N1 + N 2 + " + N F .
Let STf , j m and Pf , j m denote the starting time and the The above-mentioned model is a multi-objective
optimization problem. Usually, for a multi-objective
processing time of j th job within the run f at machine problem, there is not a single optimum but rather the
m respectively. The S f , g m take place when the run g so-called set of Pareto optimal solutions (i.e., no-
dominated solutions). In this paper, a modified genetic
is processed immediately after run f on machine m ,
local search (MGLS) algorithm is designed to solve the
where S f , f m = 0 . Let L f ,1 m be the starting time of first above-mentioned model. Genetic local search
algorithm had been developed for scheduling problem
job within the run f at machine m later than at
and had proved to be effective [9], [10]. Because the
machine m − 1 . Let d f , j denote the due date of j th job discussed problem is from industrial practice, there are
within the run f .The staring times of various jobs at some essential and apparent characteristic information
different machines are then calculated recursively as more or less. So, a local search that includes specific
described below. problem domain knowledge is designed. The MGLS
algorithm is illustrated below.
ST1,11 = 0 (1)
ST1, j1 = ST1, j−11 +P1, j−11 j = 2, " , N1 (2) 3.1. Solution representation
STf ,11 = STf −1, N f −11 + Pf −1, N f −11 + S f −1, f 1 f = 2, " , F (3)
Solution x = ( x1 , x 2 , " , x n ) , represents the order in
ST f , j1 = ST f , j −11+ Pf , j −11 f = 2, " , F ; j = 2,", N f (4) which the jobs are processed. For example, supposing
L f ,1m = max{E f ,1m, E f ,2m,", E f , j m,", E f , N f m} there are five jobs to be scheduled, x = (3,2,4,5,1)
j j −1
represents the operation sequence of jobs where job3
where E f ,1m = Pf ,1m−1 E f , jm = ∑ Pf ,i m −1 − ∑ P f ,i m gets processed first on all the machines, followed by
job2 and so on.
i =1 i =1
m = 2,",4 ; f = 1,2, " , F j = 2,", N f (5)
ST1,1m = ST1,1m −1 + L1,1m m = 2,",4 (6)
3.2. Genetic operators
ST1, j m = ST1, j −1m + P1, j −1m We use the two-point crossover[9]. We use the
m = 2,",4 ; j = 2, " , N 1 (7) SHIFT mutation, were a randomly picked position in
the sequence is relocated at another randomly picked
position and the jobs between these two positions
move along.
536
Step1. (LS1) Initialization. Specify an initial
3.3. Selection operation solution x 0 , kmax is a small number of neighborhood
solutions are examined. Let current solution x := x 0
For the objective minimization problem, usually,
Step2. Let k := 1
the smaller the objective function value an individual
has, the higher fitness value it has. A fitness value of Step3. Randomly generated a neighborhood
each solution x in the current population ψ is solution x ′ of the current solution x (i.e., x ′ ∈ N1 ( x) )
calculated by (12) and is randomly specified at each Step4. If x ′ is a better than the current solution x ,
generation replace the current solution x with x ′ (i.e., x := x ′ ),
f (x ) = − w Cmax - ( 1 − w ) Lmax ( 0 < w < 1 ) (12) let ; otherwise
where w is randomly specified at each generation. Step5. If k > kmax , go to step 6; otherwise go to
The selection probability P(x ) of a solution x in a step3
population ψ is specified as Step6. (LS2) Initialization. Let current solution
y := x
f ( x ) − f min ( ψ ) (13)
P ( x) =
∑ ( f ( x ) − f min (ψ )) Step7. Let k := 1
Step8.Randomly generated a neighborhood solution
x∈ψ
'
where f min (ψ ) = min{ f ( x) x ∈ ψ} (14) y of the current solution y (i.e., y′ ∈ N 2 ( y ) )
According to this selection probability, applying the Step9. If y ′ is a better than the current solution y ,
roulette wheel selection, a pair of parent for crossover replace the current solution y with y ′ (i.e., y := y ′ ),
is selected from the current population. let k := 1 ; otherwise k := k + 1
Step10. If k > kmax , output y ; otherwise go to
3.4. Elitist strategy
step8.
An elitist external set is also created to maintain
elitist solutions in the whole evolution process. This set 3.6. Steps of MGLS
is updated at each generation according to the elitist
scheme. This is, Pareto-optimal individuals are first The steps of the MGLS Algorithm can be described
copied from the population to the archive set which is as follows:
updated at each generation by introducing new Pareto- Step1. Parameters setting: population size N pop ,
solutions and removing dominated ones. crossover probability Pc , mutation probability Pm ,
During the evolutionary process, small number R of elitist number N elite , local search number of
elitist external set solutions are also randomly selected
neighborhood solutions kmax
and reintroduced into the population in order to
undergo recombination operators and produce quality Step2. Initialization: The initial population consists
children. of N pop randomly generated job sequences. Calculate
the objective for each solution in the current
3.5. Local search population. Initialize external set ND1 = ∅ .
Step3. Update external set NDt : Non-dominated
The specification of neighborhood structure is individuals in the Pt recopied to the NDt and remove
important in the local search algorithm. To make the
search process efficient, this paper uses two dominated ones from NDt .
neighborhood definitions: run-swap and in-run-swap. Step4. Evaluation: Calculate the value of the fitness
The neighbors are obtained by systematically swapping by Section 3.3 each individual in the population Pt .
all pairs of runs in the sequence in the case of run- Step5. Select and Crossover and Mutation: Apply a
swap; or by systematically swapping all pairs of jobs crossover operation to each of the selected N pop -
within same run in the sequence in the case of in-run- pairs of parents with the crossover probability Pc
N elite
swap. Let N1 (⋅) and N 2 (⋅) represent the run-swap and
. A new solution is generated from each pair. Then
the in-run-swap respectively. First, the run-swap
apply a mutation operation to each new solution with
neighborhood definition is used in the local search
the mutation probability Pm .Next generation
(LS1). Then the in-run-swap neighborhood definition
is use in local search (LS2). The initial solution of LS2 population Pt +1 is created.
is regarded as output of LS1. The basic steps of the
local search are as follows.
537
Step6. Elitist Strategy: Select N elite elitist from the Fig.1, we can see the MGLS algorithm can generate
set NDt (at random and without repetition) and add to more and more extensive Pareto-solutions. These
results demonstrate the MGLS can not only generate
the set Pt +1 .
better solutions than other scheduling methods, but
Step7. Local search: Apply the local search on each also can find more efficient solutions to provide
individual in the population Pt +1 according to Section schedulers further decision making.
3.5, get population Pt +1* .
Step8. Termination criterion: If termination Table1 Simulation results of each algorithm
problem MGLS IM-MOGLS J-MOGLS
criterion is met, output external set. Otherwise replace 5×5 9/9 5/7 1/9
population Pt by Pt +1* , return step3. 6×6 9/9 0/7 0/2
7×7 10/10 0/8 0/4
8×8 8/8 0/7 0/3
4. Simulation experiment 9×9 4/4 0/4 0/6
10×10 11/11 0/3 0/6
According to the actual situation, six different size B/A: let A denote the number of obtained solutions,
let B denote the number of no-dominated solution
problems were created to evaluate the MGLS
algorithm. These data sets are referred to as n f × F , Table2 Average CPU time of each algorithm /s
where nf and F denote the number of jobs per type problem MGLS IM-MOGLS J-MOGLS
5×5 37 40 53
and number of types respectively .The processing 6×6 49 60- 68
times of the jobs in these data sets were integers from a 7×7 65 79 90
uniform distribution over the range of [20, 120]. The 8×8 106 142 146
type setup times were integers from a uniform 9×9 135 171 190
distribution over the range of [10, 100]. The due dates 10×10 184 233 270
are integers which were assigned as following.
di = ( p j + s j ) × (1 + random × 3) 3000
maximum tardiness
538
References [6]A. Allahverdi, “Two-stage production scheduling with
separated setup times and stochastic breakdowns”, Journal of
the Operational Research Society, vol.46, pp.896-904, 1995.
[1]R. Z. Rios-Mercado, and J. F. Bard, “Computation
[7]A. Allahverdi, “Scheduling in stochastic flowshop with
experience with a branch-and-cut algorithm for flowshop
independent setup processing and removal times”,
scheduling with setups”, Computers and Operations
Computers and Operations Research, vol.24, pp.955-960,
Research, vol.25(5), pp.351-366, 1998.
1997.
[2]R. Z. Rios-Mercado, and J. F. Bard, “Heuristics for the
[8]C. Rajendran, and H. Ziegler, “Scheduling to minimize
flow line problem with setup costs”, European Journal of
the sum of weighted flowtime and weighted tardiness of jobs
Operational Research, vol.110, pp.76-98,1998.
in a flowshop with sequence-dependent setup times”,
[3]R. Ruiz, C. Marcoto, and J. Alcaraz, “Solving the
European Journal of Operational Research, vol.149, pp.513-
flowshop scheduling problem with sequence dependent setup
522, 2003.
times using advanced metaheuristics”, European Journal of
[9]H.Ishibuchi, and T. Murata, “Multi-objective genetic local
Operational Research, vol.165, pp.34-54, 2005.
search algorithm and its application to flowshop scheduling”,
[4]R. Ruiz, and T. Stutzle, “An iterated greedy heuristic for
IEEE Transaction on Systems Man and
the sequence dependent setup times flowshop problem with
Cybernetics,vol.28(3), pp.392-403, 1998.
makespan and weighted tardiness objectives”, European
[10]A. Jaszkiewicz, “Genetic local search for multi-objective
Journal of Operational Research, vol.187, pp.1143-1159,
combinatorial optimization”, European Journal of
2008.
Operational Research, vol.137, pp.50-71, 2002.
[5]S. Parthasarathy, and C. Rajendran, “experimental
evaluation of heuristics for scheduling in a real-life flowshop
with sequence-dependent setup times of jobs”, International
Journal of Production Economics, vol.49, pp.255-263, 1997.
539
2008 International Conference on Intelligent Computation Technology and Automation
In advanced applications of electric network, When the graph of electric network is drawn in GIS
Modeling and connectivity analysis of network platform, the topology information can automatically
topology are essential in many advanced applications be stored in node table, branch table and switch table
of electric network such as power flow calculation, in relation database.
load forecasting, network reconfiguration, outage The switch only is an additional component of a
analysis, power system fault and recover, etc [1]-[2]. branch (line) instead of being taken as a branch, which
Nowadays, the facility management and applied controls the state of its attaching branch and an
calculation for electric network are almost based on attribute called ‘put-cut state’ is added to the branch.
graphic information system (GIS). So, in using GIS One switch is only attached to one branch (line).
platform, the storage mode and the connectivity One branch can be with two switches at most. The
analysis of the electric network topology become a hot difference of new modeling in this paper from the
research topic [3]-[5], because there is a close relation traditional modeling is that switch is an attached
between them. control component for branch (line) instead of being
For the modeling of electric network, switch is taken as a branch. For an example with one branch and
taken as a branch almost in all of traditional methods. two switches, the comparison of them is shown in
541
randomly and given a dynamic number and an electric By connectivity analysis using the search method
island number, then its associated branch is searched proposed in this paper, this network is divided into
one by one, if the other node of the searched branch is three electric islands and the time cost is little. Here,
without electric island number, a dynamic number and one of the three electric islands is shown as figure 5.
an electric island number will be given to it and a
dynamic number will be given to the searched branch.
c. The next node with dynamic number and electric
island number is taken and its associated branch is
searched one by one. Till associated branches of all
nodes with dynamic number and electric island number
are searched, this electric island is finished.
d. The nodes and branches with electric island
number are filtered, if there are nodes without electric
island number left, go to step b till all nodes have their
electric island number. Figure 5. One of the three electric islands
Since switch is not taken as branch, these branches
with cut state are filtered during the search process. In figure 5, (a) shows the nodes and branches with
The reduced number of nodes and branches their static numbers before connectivity analysis, (b)
respectively are about one and a half times as many as shows the nodes and branches with their dynamic
the number of switches. Furthermore, if we hope these numbers after connectivity analysis.
electric islands with supply nodes are searched, only
these supply nodes are taken as the prior searched
nodes till every supply node has its own electric island 5. Discussions
number, the scale of effective network analysis will be
reduced more. The storage of network topology based on relation
database has the advantage of using some developing
4. An example tools to make efficient program [13]. In this paper,
Mapinfo is used as the GIS platform, which is as an
A sub-transmission network topology is shown as OLE automation server connected to PowerBuilder
figure 4. These numerals without brackets are static development tool. All run-time operations of switches
node number and these numerals with brackets are are carried in this platform, PowerBuilder is taken to
static branch. Through a series of switch operations, finish the connectivity analysis in the example, its
these branches include (1), (2), (3), (5), (8), (21), (22) functions like filter function and sort function are very
are in cut state, the other branches are in put state. convenient for the data reorganization to get a high
search speed.
It is noted that those branches with two switches
may be argued. If one switch is in ‘off’ state and the
other is in ‘on’ state, then the branch will be in ‘cut’
state, so that this branch will not be considered in
connectivity analysis, but which is not always true (in
fact, in order to prevent some facilities not to be stolen,
some power lines are always charged). Therefore, if we
need, such branches can be separately added to one of
electric islands according to the information of switch
table. Fortunately, such branches must locate at the
edge of electric island, like the leaves of a tree, can be
tackled easily and will not affect the finished work.
Tie switch should be attached to a virtual branch.
6. Conclusions
Figure 4.A sub-transmission network topology
A modeling and connectivity analysis method for
542
electricity distribution network based on relation transmission line based on graph theory”, Journal of China
database in GIS is proposed in this paper, whose Gorges University (Natural Sciences), 2006, vol.28, no.4,
features are as follows. pp.321-323.
a. Instead of taking switch as a branch, we add it to [7] Y.S. Ong, H.B. Gooi, and C.K. Chan, “Algorithms for
a branch and add put-cut attribute to describe branch’s automatic generation of one-1ine diagrams”, IEEE
status, the attribute value depends on the attached Proceedings Gener, Transm, and Distrib, 2000, vol.147,
switches. Before a connectivity analysis is carried, the no.5, pp.292-298.
attached switches can define the branches’ status, so
the analysis scale of network is reduced. [8] X.Z. Wang, and X.L. Li, “Topology identification of
power network based on incidence matrix”, Power System
b. If the purpose is to get electric islands with supply Technology, 2001, vol.25, no.2, pp.10-16.
nodes, using the proposed search method will be very
suitable. In general, electricity distribution networks [9] K.C. Lu, and H.M. Lu, Graph Theory and Its Application,
always operate in radial configuration though they are Tsinghua University Press, Beijing, 1995.
usually designed as meshed networks in order to
increase the reliability of supply, so those got electric [10] R.C. Luo, and ·W.G Li, “Research on the algorithm of
islands are radial networks, dynamic node number will electric connectivity analyzing for distribution network based
be of advantage to carry power flow calculation by on graph theory”, Transactions of China Electrotechnical
Society, 2005, vol.20, no.10, pp.98-101.
back/forward sweep method.
c. The storage of network topology based on [11] T. Sawa, T. Furukawa, M. Nomoto, T. Nagasawa, T.
relation database has the advantage of using some Sasaki, K. Deno, and T. Maekawa, “Automatic scheduling
developing tools to make efficient program. method using Tabu search for maintenance outage tasks of
transmission and substation system with network constraints”,
7. Acknowledgement IEEE Power Engineering Society Winter Meeting, 1999,
vol.2, pp.895-900.
The authors wish to thank the Doctoral Foundation
[12] X.M. Li, Y.H. Huang, and X.G Yin, “The improving
of North China Electric Power University for the GA coding and decoding techniques for distribution network
financial support (No.200712002). reconfigurations”, 39th International Universities Power
Engineering Conference, 2004, vol. 1, pp.79-84.
8. References
[13] P. Wang, X. Wu, Z.Y. LU, and K.Y. Lin, “Connectivity
[1] F.V. Gomes, S. Jr. Carneiro, J.L.R Pereira, M.P. Vinagre, judgement for electrical power network based on relation
P.A.N. Garcia, E.J. Oliveira, and L.R. Araujo, “A new database”, Journal of Tianjin University, 2002, vol.35, no.4,
distribution system reconfiguration approach using optimal pp. 501-505.
power flow technique and sensitivity analysis for loss
reduction”, IEEE Power Engineering Society General
Meeting, 2005, vol. 1, pp.897-901.
543
2008 International Conference on Intelligent Computation Technology and Automation
turbulence are included, with the geometry of the muU u = H u m u + Q u − pVu (1)
combustion chamber. The empirical ratio of the
turbulent to the laminar burning velocity can be
∂U u
U u = Tu = cvu Tu (3) 2 mz
∂Tu
3 mz
∂U b ∂U b ∂U b
U b = Tb + p = cvbTb + p (4) nA
∂Tb ∂p ∂p mz
In unburned and burned zones, the state equations
of perfect gas are, respectively: Fig. 2 Schematic diagram of the multi-zone model
divided by the equipartition of mass
pVu = mu Ru Tu (5)
Supposing that the total mass of the mixture in a
combustion chamber is m and it is divided into n
pVb = mb RbTb (6)
parts, then, the mass in each small zone is
The relationship of the rate of burning fuel, the
m z = m / n . Again, supposing that m x is the mass
velocity of the turbulent flame and the area of the
flame front can be expressed as: of burned mixture in a preparing zone (in this zone,
Equations 1~7 are the fundamental equations for the preparing zones. In combustion, a new preparing
545
Vx = Vu ( p / p + m x / mu − Tu / Tu ) + V − ∑Vi (13)
zone is formed, if
mx ≥ mz (8)
Equations 10~13 constitute the diagnostic model
This process continues until of the multi-zone model.
m x = Ax / B x (12) ( )
Tu = Vu p + Q u / (mu c pu ) (15)
546
Equations 14~17 constitute the predictive model temperature of chamber walls.
of the multi-zone model. Combined with sub-models
such as the model of the characteristics of the mixture 5.Prediction of Performances Changing
and the geometry model, they can be solved by a with Variable Parameters Based on the
fourth order Runge-Kutta method and the predictive Multi-zone Model
calculation can be carried out.
5.1. Effects of the Change of Ignition
4. Validation Advance Angle on Performance
Parameters
In order to verify the validity and effectiveness of
the combustion models and calculation programs The experimental gasoline engine was a
proposed in this research, the indicator diagram and production BJ492Q with operating conditions 2500
the characteristic parameters at full throttle in a r/min, 29.4 kW. In calculations, a single parameter is
BJ492Q gasoline engine were measured, and the changed at a time. The effects of the changes on
corresponding data were calculated. Figure 3 gives the combustion can be predicted, and some important
comparison of these experimental measurements with factors relative to the saving of energy and pollution
the calculation results. control in gasoline engines can be found.
Figure 4 gives the calculation results of the
4
pressure, temperature, velocity of turbulent flame and
3
the concentration of NOx with the change of
2
ignition advance angle. Obviously, with the reduction
test curve
p/Mpa
1
of ignition advance angle, the curves of indicator
calculation curve diagram moves rightwards, the increase of the pressure
slows down, the maximums of the temperature and
60 90 120 150 180 210 240 270 300
velocity of the turbulent flame go down and the
Fig.3 Comparison of the experimental
amount of NO x lessens.
measurements and the calculation results of the
indictor diagram at 2500 RPM, 24.9kW, with the
coefficient of the residual exhaust gas Fr=0.94 in a 5.2. Effects of the Change of the
BJ492Q gasoline engine Coefficient of the Residual Exhaust Gas on
Performance Parameters
It is known from Figure 3 and that the relative
error of the pressure in cylinder is less than 5%, and
Figure 5 shows the calculation results with the
that of indicated work is less than 4% during
change of the coefficient of the residual exhaust gas
combustion. Obviously, the computations have been
improved due to that the effects of turbulence on Fr , which is the ratio of the mass of the residual
combustion were considered. The case of error comes
exhaust gas to the fresh mixture. When the range of
from the assumptions made in the models. Another
reason is the lack of precise experimental Fr is 0.03~0.09, the change of the indicator diagram
measurements of the coefficient of heat transfer, the
and indicated work is slight, and the change of the
coefficient of residual exhaust and the transient
547
temperature and the velocity of the turbulent flame is (EGR) and reduction of ignition advance angle can be
also slight in both burned and unburned zones. used to reduce the explosion pressure and the
maximum of the temperature in combustion.
However, the change of the concentration of NO x is
Meanwhile, these measures can reduce NOx
great. The concentration of NOx reaches its
emitted with only little influence on indicated work
and thermal efficiency.
minimum at Fr =0.09. So, Exhaust Gas Recirculation
Tu Tb / K
22¡ã
p/MPa
22¡ã 16¡ã
2 16¡ã
2000
1000
1 1500 26¡ã22¡ã
500 16¡ã
90 120 150 180 210 240 270 90 120 150 180 210 240 270
crank angle/¡ã crank angle/¡ã
20
UT/ms - 1
10 -3
ignition advance angle 26¡ã 6.4 ignition advance angle 26¡ã
15
4.8
NOx
10 22¡ã 22¡ã
3.2
16¡ã 16¡ã
5
1.6
160 170 180 190 200 160 180 200 220 240 260
crank angle/¡ã crank angle/¡ã
Fig.4 Effects of the change of ignition advance angle on the performance parameters
at 2500 RPM, 29.4kW in a BJ492Q gasoline engine
4 3000 Fr:0.03
Fr:0.03
3 2500 0.06
0.06
Tu Tb /K
0.09
p/MPa
2 0.09 2000
1000
1 1500 0.09
500 Fr:0.03 0.06
90 120 150 180 210 240 270 90 120 150 180 210 240 270
crank angle/¡ã crank angle/¡ã
NOx 10 -3
8.0
Fr:0.03
6.0
0.06
4.0
2.0 0.09
Fig.5 Effects of the change of the coefficient of the residual exhaust gas on the performance parameters at
548
2500 RPM, 29.4Kw in a BJ492Q gasoline engine
6. Summaries
(1)A multi-zone model has been investigated for sensitive to the coefficient of residual exhaust.
combustion in a gasoline engine. The calculation (3)In the multi-zone model, the burned zone is
results agree well with experimental measurements, divided into some small zones with different
showing that the simulation is reasonable. temperatures, so that the combustion in the cylinder
(2)The modeling identifies some parameters can be described more realistically.
which greatly affect an engine’s performance. For
Acknowledge
The authors are grateful for the supports given by (06JJ20045) and the foundation of the bureau education
the natural science foundation of Hunan Province of Hunan Province (07A004).
References
[1] Liu Xun-jun, Combustion Modeling in [3] Li Yue-lin, “A Multi-area Model and Its
Reciprocating Engines, China Machine Press, Beijing, Applications to Combustion in Gasoline Engines”, A
China, 1987. Dissertation Submitted to the Academic Degree’s
[2] Jiang De-ming, Combustion and Emission in Evaluation Committee of Chang’an University for the
Internal Combustion Engines. Xi’an Jiaotong Degree of Doctor of Philosophy in Engineering, Xi’an,
University Press, Xi’an, China, 2001. China,2001, pp.15-20.
549
2008 International Conference on Intelligent Computation Technology and Automation
551
52 7.5997 7.6440 0.0443
27 0.3568 0.3520 0.0048 In this paper, firstly we extract the low frequency
part after the “non-stationary signal” wavelet
28 0.5472 0.5410 0.0062
decomposition, and then input it to the BPWN, by
29 0.5766 0.5810 0.0044 doing this, sufficiently apply the wavelet multi-
30 0.5006 0.4940 0.0066 resolution analysis and neural network model free
characteristics.
31 0.6086 0.6110 0.0024
We apply our scheme to the US CDC %ILI dataset
32 0.5185 0.5330 0.0145
and result shows that it has effective predicting ability.
33 0.5173 0.5220 0.0047 Application of the technique described in this paper is
34 0.5652 0.5730 0.0078 possible for non-stationary time series prediction and
detecting specific to many settings, and hold promise
35 0.6422 0.6600 0.0178
for the better understanding of the role that signal
36 0.6066 0.6140 0.0074 processing plays in the spread of infectious disease
37 0.6488 0.6580 0.0092 forecasting.
In fact, excepting for long trend term separated after
38 0.7277 0.7270 0.0007
the wavelet-decomposed procedure, others levels
39 0.6919 0.6940 0.0021
include periodic and random term. In practical
applications, also we can utilize the decomposed
periodic term for epidemic outbreak possible
552
periodicity forecasting, if those random noise term can http://www.cdc.gov/flu/weekly/weeklyarchives2002-
be ignored. All those will be our next research focuses. 2003/data/senallregt02-03.htm
553
2008 International Conference on Intelligent Computation Technology and Automation
555
Begin Distribution strategy is important for the Parallel
model. The distribution strategy will have a direct
impact on the efficiency of the whole parallel
Filtering character are can’t be composed into words algorithm. We can describe the distribution strategy of
data from three aspects for the statistic parallel
Decompose word set and send to slave machine segmentation.
(1) Distribution of Data
The important part of statistics parallel segmentation
algorithm is how to distribute the terms in the sentence
Is pattern string in
dictionary? yes to every slave machine. If we split it evenly the
original semantics might be destroyed and we may not
NO get a correct unknown phrase. We improve the
Send pattern string to slave machine dividing of word set which are distributed on the slave
machine. We can assume that there are p computers
Slave send word frequency of pattern can be used for the parallel computing. So there are
string to master machine k=n/p characters has been assigned to each computer.
If on the position of k is not punctuation, we can search
Compute word frequency and
for the next until there is a punctuation mark.
mutual information.then add word If the punctuation had been found after k characters
to dictionary the number of the characters had been send to the first
slave machine is k+m. The characters which has been
send to the second nod machine can start to search
Do get all pattern string ? from the position of k+m+1 and the number of the
no
yes
characters would be searched is also k . it will estimate
whether there is a punctuation. If no punctuation had
End
been found it would continue to search until there is
punctuation. If not, it will continue to search for
Figure 1 Process of Parallel Principles of Mutual punctuation. Then this sentence information will be
Information Segmentation Word send to the second slave machine. It will be distributed
until all slave machines have word set.
3.1 Parallel model environment (2) Asynchronous Data Exchange
Because the computing capability and the
The architecture of the parallel model in this paper hardwareenvironment are very different of the
is Master/Slave. The parallel software is PVM for the computers which are used for the parallel calculation.
Linux operating system. PVM is a general messaging Therefore, the time they need to match the same
system. We can make the computer in network become character strings is different. We will exchange the
a parallel virtual machine. The message mechanism of data asynchronism between the Master and the slave. If
PVM is important partial in PVM. PVM support the slave machine finished the matching task which the
various parallel computing models which are including Master had been assigned to,it will send back the
Tree model and Crowd model and Master-Slave model result to the Master. The Master received the result and
and Function-Based model. Because PVM support lots saved it then it would assign the next task for it. When
of computing model so its flexibility and function has all the pattern string matching had been send back to
been strengthened. In particular, when a certain model the master, the Master would compute the word
of the sub-tasks may be expressed by other parallel frequency. Finally, it will estimate the pattern string
programming model we can select a very flexible whether is an unknown word or not.
manner to program. The common models are SPMD For example: after slave machine finished two
(Same Processor Multiple Data) and the Mater/Slave words of matching, word frequency will be send
in the computing models of PVM. Master/Slave is master machine, then master machine send three words
widely used. Master machine can divide and distribute pattern string to the client machine that finished two
the task and collect the results. Meanwhile,Slave words of matching. When all slave machines finished
machine will execute sub-task. We adopted two words of matching, master machine record word
Master/Slave model in this paper. frequencies that come from all slave machines and
send three words pattern string to other slave
3.1.1 The distribution strategy of data machines.
556
(3) Periods Chinese Pattern String and Overlap
Chinese Pattern String
Definition 2[8]: Period Chinese String. if string P is
prefix of Uk(K≥2)which is substring of P, string
Uk is called period of string P, period of the most
short length called minimal period . for Chinese string:
“ 五 五 摊 销 法 与 摊 销 法 的 区 别 ...... ” ,result of
cleaning the string is “五五摊销法摊销法区别......”
, “摊销法摊销法” called Period Chinese String, “
摊 销 法 ” is minimal period. Period Chinese String
often happen in Chinese.
Definition 3 : Overlapped Chinese string. If the
Chinese string have a U1k U2k…Unk (K≥2)form to
be called overlapped Chinese string. For example: “
花花绿绿”, A lot of words are overlapped Chinese
string in Chinese.
Period Chinese pattern string and overlapped
Chinese pattern string will be compressed and
distributed to each slave machine during segmentation
word processing. For Chinese pattern string “摊销法
摊销法区别”,it only sendchinese string “摊销法
” and repeat count 1, it send chinese string “区别”
At last. slave machine receive these messages and
4. Experimental evaluations
uncompress the Chinese pattern string to begin
The experiment base on parallel model in this
matching. Overlapped Chinese pattern string is similar
paper. Experimental conditions are three computers
to Period Chinese pattern string during processing.
that have 667M CPU and 512M memory and two
computers that have 1.2G CPU and 256M memory. All
3.2 Parallel model architecture machines use Red Hat Linux 8.0 and PVM, word sets
are Chinese characters and 1.2M. Steps in the
The parallel model introduces architecture of Master- experiment:
Slave. Master machine use strategy that is proposed in (1) A computer that have 512M memory is used to
3.1.1 section to send data to slave machine. At the master machine.
same time, master machine will collect the result that is (2) Increasing the numbers of slave machines.
return by slave machine. When slave machine receive (3)Observing Segmentation efficiency and
the data that is send by master machine, it will use Accuracy when we use different numbers of slave
mutual information segmentation algorithm to compute machines.
data. After slave machine finish the count. Its can send (4) Comparing with serial conditions and
the result to master machine. Master machine use computing the accelerator ratio of parallel model. The
Asynchronous data exchange strategy that is experiment result is shown in table 1
introduced in 3.1.1 section and multithreaded Number 1 2 3 4 6
programming method to exchange of data. The parallel machine
model is showed in figure 2: Accuracy 82.2% 81.1 81.3 81.2 82.4
% % % %
Spending time 213 202 193 184 176
(second)
Table 1 experiment result
557
serial running time Journal of Computer Research and Development.sep 1999,
ratio = Vol 36, No 9
N compters' running time [4] HAN Ke-song, WANG Yong-cheng, CHEN Gui-lin.
Research on Fast High-frequency Strings extracting and
Compter’s number Statistics Algorithm with no thesaurus. Journal of Chinese
Information Processing .Vol 15.No 2
2 3 4 6 [5] WU Sheng-Yuan. Study of a Parallel Word Segmentation
Serial algorithm 1 Method. Journal of Computer Research and
speedup ration Development.July 1997.Vol 34 No 7
Parallel 1.057 1.107 1.160 1.232 [6] Yang Chunhua, Wan Jiancheng,Jiang He.A System
algorithm Architecture Model of Parallel Word Segmentation.
relative Computer Engineering and Applications.2004 33
speedup ration [7] Wang Suqin, Zou Xukai. An Optimal Parallel Algorithm
to Char/Chinese Character String Matching.ournal of
Table 2 speedup ratio Chinese Information Processing.Vol 9.No 1
[8]Chen Guo Liang. Parallel Algorithm Design and
5. Conclusion implement.Higher Education Press.2002.8
[9] CHEN Gui-Lin, WANG Yong-Cheng, HAN Ke-
Parallel algorithm is applied to mutual information Song,WANG Gang. An Improved Fast Algorithm For
in this paper, at the same time; directory segmentation Chinese Word Segmentation.Apr 2000.vol 37, No 4
is also combined with parallel algorithm to improve the [10] Liubo.Application and Research of Parallel Genetic
Algorithm In K-Medians. Chong Qing University Press. July
efficiency. Parallel software is PVM that can organize
2004
together different performance computer in LAN to
reduce computing cost, PVM has also higher
extensible. We present dispatching policy of data for
parallel model in this paper. It is proved that the
parallel model have high speedup ratio by experiment.
Parallel algorithm and model in this paper can be
applied to other segmentation algorithm which base on
statistic of word frequency. Parallel model of
segmentation word in heterogeneous environment will
be research in following step.
6. Acknowledgement
This work was supported by :
(1)Supported in part by Chong qing Science &
Technology Commission ,CSTC,2005AC2090
(2)Supported in part by Chong qing Education
Commission ,KJ060704
(3) "11th Five-Year Plan" national scientific and
technological support for major projects planned ,
2006BAJ05A06
(4)Supported in part by Chong qing Science &
Technology Commission CSTC, 2008 AC0043
References
[1] SUN Mao-Song ,Xiao Ming ,TSOU B K . Chinese Word
Segmentation without Using Dictionary Based on
Unsupervised Learning Strategy. CHINESE OURNAL OF
COMPUTERS. June 2004 Vol.27 No.6
[2] ZHAI Feng-wen , HE Feng-ling, ZUO Wan-li.Chinese
Word Segmentation Based on Dictionary and
Statistics.MINI-MICRO SYSTEMS. Sep 2006.Vol 27.NO 9
[3] FU GUO HONG,WANG XIAO-LONG.. Models and
Algorithm for Assigning Word Breaks to Chinese Text.
558
2008 International Conference on Intelligent Computation Technology and Automation
560
⎡ Rˆ / λ k + C k Pk |k −1C kT C k Pk |k −1 ⎤ whereas the left one is ω L . ΔT is sampling period.
⎢ ⎥ (24)
Pk |k −1C kT The observation model is
⎣⎢ Pk |k −1 ⎦⎥
Yk +1 = X k +1 + vk +1 (32)
⎡ Tk1 / 2 0 ⎤ ⎡TkT / 2 Tk−1 / 2 C kT Pk |k −1 ⎤ =
⎢ ⎥⎢ The constant in the model of (30) are chosen as
T −T / 2 ⎥
⎢⎣ Pk |k −1C k Tk Pk1 / 2 ⎥⎦ ⎣ 0 PkT / 2 ⎦ b = 0.80m , r = 0.40m , ΔT = 0.1s .The basic comparison
considers that the value for the standard deviation of
⎡ Tk C k Pk |k −1 ⎤
⎢P C T (25) both the angle process and measurement noises are
⎣ k |k −1 k Pk |k −1C Tk C k Pk |k −1 + Pk ⎥⎦
−1
T
k both 5% of nominal value and uniformly distributed.
Comparing the right sides of (24), (25) will confirm Simulation results are shown on Figure 1 and Figure 2.
the validity of (23). On both figures it can be observed that the square root
Assuming that there exists an orthogonal matrix ESM(SRESM) is more accurate than the ESM.
U k such that
⎡( Rˆ / λ k )1 / 2 C k Pk1|k/ −21 ⎤ ⎡X 0 ⎤ (26)
⎢ 1/ 2 ⎥U i = ⎢ ⎥
⎣⎢ 0 P ⎥
k |k −1 ⎦ ⎣ Y Z ⎦
where { X , Y , Z } are matrices of appropriate
dimensions. Then we proceed by squaring both sides
Distance Y(M)
of (26)
⎡( Rˆ / λ k )1 / 2 C k Pk1|k/ −21 ⎤ ⎡( Rˆ / λ k )1 / 2 0 ⎤
⎢ 1/ 2 ⎥⎢ T / 2 T T /2 ⎥
=
⎣⎢ 0 Pk |k −1 ⎦⎥ ⎣⎢ Pk |k −1C k Pk |k −1 ⎦⎥
⎡ X 0 ⎤ T ⎡ X T Y T ⎤ ⎡ X 0 ⎤ ⎡ X T Y T ⎤ (27)
⎢ Y Z ⎥U k U k ⎢ T ⎥
=⎢ ⎥⎢ T ⎥
⎣ ⎦ ⎣ 0 Z ⎦ ⎣Y Z ⎦⎣ 0 Z ⎦
Comparing terms on both sides of the equality with
those in (23), it is easy to identify that
X = Tk1 / 2 , Y = Pk |k −1C kT Tk−T / 2 , Z = Pk1 / 2 (28)
and we obtain Figure 1. Robot localization using the ESM and the SRESM
−1 (5% of nominal value and uniformly distributed)
K k = YX (29)
Therefore, the main computation of this square root
ESM is in (27) and we can choose the QR
decomposition, Cholesky factor updating and efficient
least squares to achieve U k .
4. Simulation
In order to show efficiency of the proposed
approach, we consider state estimation for a mobile
robot. Denote by X = [ x y ϕ ]T the robot state. The
discrete-time model is described by the following
equations:
⎡ xk +1 ⎤ ⎡ x k ⎤ ⎡ Vk ΔT cos(ϕ k ) ⎤ Figure 2. Estimation error for both methods
⎢ ⎥
X k +1 = ⎢⎢ y k +1 ⎥⎥ = ⎢⎢ y k ⎥⎥ + ⎢ Vk ΔT sin(ϕ k ) ⎥ + wk
(30)
The numerical stability problem that the dynamic
⎢⎣ϕ k +1 ⎥⎦ ⎢⎣ϕ k ⎥⎦ ⎢⎣rΔT (ω R ,k − ω L,k ) / 2b⎥⎦ equations have on both methods is also checked. For
Where the linear speed of the robot at time k can be this test, the standard deviation for the process and
obtained as equation (30) shows: measurement noises was modified by a 20% up and
Vk = r (ω R , k + ω L, k ) / 2 (31) down. It can be seen in Figure 3 that when noises are
incremented, the estimation error increases in both
The body is considered a circular disc of radius b,
methods, but the estimation error of the square root
with two independent wheels of radius r each. The
ESM remains bounded and stable, and the estimation
angular velocity of the right wheel is defined as ω R ,
error of the ESM is no longer bounded and diverges.
561
[2] Milanese M, Vicino A. “Estimation theory for
nonlinear models and set membership uncertainty”,
Automatica, vol.27, no.2, 1991, pp. 403-408.
[3] Scholte, E., Campbell, M., “On-line nonlinear
guaranteed estimation with application to a high performance
aircraft”, American Control Conference, Anchorage AK,
2002, pp. 184-190.
Distance Y(M)
562
2008 International Conference on Intelligent Computation Technology and Automation
Abstract—The green ratio model of Webster ignores the delay, stop ratio and queue length etc., then it requires proper
difference of traffic flow in different traffic state. The paper signal cycle and green ratio that make the capacity of signal
introduces an idea of traffic priority. It deals out more green intersection a little higher than the traffic demand[2]. In
time for the phase which has the highest traffic demand in oversaturated traffic, the optimising object of control parameter
oversaturated traffic, so as to prevent and clear off the at signal intersection should prevent traffic congestion and
crowded traffic flow as soon as possible. Each phase gets the clear off traffic blockage quickly, so, the cycle is longer
priority by turns, so the improved green ratio model can befittingly in reasonable extension, but the green ratio model of
realize the goal of preventing traffic congestion and clearing Webster that clears off crowded traffic flow synchronously at
off traffic blockage quickly. It is more effective than the each approach of signal intersection is not suitable, proved by
Webster’s one in dealing with oversaturated traffic flow by practice.
simulating experiment based on VISSIM. And when vehicle
arrival rate of each phase varies much, the improvement is 2. TRAFFIC FLOW RUNNING CHARACTERISTIC IN
obviously more. OVERSATURATED TRAFFIC
5
another economical and effective way to solve signal
4
intersection congestion. Although the mature and extensive
3
applied regional control system (such as SCATS, SCOOT,
2
TRANSYT), linear control system(such as MAXBAND,PASSER
1
II) and single-dot adaptive control system(such as MOVA,
OPAC) are applied one after the other, but only in unsaturated 0
1 2 3 4 5 6 7 8 9 10 11 12 13
traffic, they are proved to be effective by practice and they can
increase the capacity of signal intersection. Moreover, these Figure 1. Distributing map of headway in unsaturated traffic
systems’ performance descends in oversaturated traffic[1]. So,
it is quite necessary to seek the signal control ways and means
of oversaturated traffic again.
In unsaturated traffic, the optimising object of control
parameters at signal intersection is the minimum index of
average headway(s)
4 assigned properly to each phase, which can reduce delay and
3 queue length etc. at signal intersection efficiently. This has
2 been proved by _ptimiza application in the last several decades.
1
But in oversaturated traffic, because transverse and lengthways
0
interference between cars is aggravating, the capacity of signal
1 2 3 4 5 6 7 8 9 10 11 12 13 intersection falls down apparently. The green time assigned to
each phase by Webster’s green ratio arithmetic often comes to
Figure 2. Distributing map of headway in oversaturated traffic end when the traffic flow is just in optimal state, accordingly
2.2 Saturation flow rate the capacity increase of signal intersection is restricted and the
traffic state becomes worse. Just because of this shortcoming,
We take the signal intersection of Guogeli Street and many scholars who are attracted by this problem all over the
Huayuan Street as examples to analyze the saturation flow rate world began to study the signal control parameter _ptimizati in
in oversaturated traffic. Much headway data (only straight- oversaturated traffic. And they put forward multiplicative
going lane) was observed at this intersection in unsaturated and signal control parameter _ptimization models from all
oversaturated traffic, and fifty troop data was selected. The aspects[1,3-13], such as cycle _ptimization model, green ratio
average headway of steady flow were 2.12s and 2.34s in _ptimization model and phase _ptimization model. The paper
unsaturated and oversaturated traffic, then the saturation flow studies the green ratio model from another aspect, and supposes
rate of the straight-going lane were 1698pcu/h and 1538pcu/h cycle and phase to be already in optimal state.
accordingly. We can see from the result that the capacity of
signal intersection falls down apparently in oversaturated
3. IMPROVED GREEN RATIO MODEL
traffic.
Table I lists the metrical saturation flow rate of a straight-
going lane at six signal intersections in different traffic states, 3.1 Optimizing principle
there have same conclusion with our analysis. According to the idea of attemperment priority, in
TABLE I. SATURATION FLOW RATE IN DIFFERENT TRAFFIC STATE AT SIX oversaturated traffic, a change switch is settled and a value of
SIGNAL INTERSECTIONS(PCU/H)
q o is offered. Here we will explain the green ratio principle
The name of signal Saturation flow rate in Saturation flow rate in with vehicle queue length as an example. When the queue
intersection unsaturated traffic oversaturated traffic
length of q r of phase r has q r ≥ qo , then a g max green
Guogeli street and
1698 1538 time is assigned to phase r in order to clear off the queue
Huayuan street
East big straight street length quickly. Accordingly, it can prevent traffic congestion.
1653 1492
and Guogeli street When there are several phases’ queue length q i , q j , " which
West big straight street
and Tongda street
1732 1546 all have qi ≥ q o , q j ≥ qo ," at the same time, we select the
West big straight street
1721 1589 maximum and assign green time g max to the phase, that is, the
and railroad street
phase which most easily comes into being crowded is offered
Hongqi street and
Huanghe road
1736 1596 passage priority firstly to clear off the queue length and release
Hongqi street and the traffic congestion. After offering green time g max to the
1748 1598
Xianfeng road
phase r , the remanent green time ( c − g max − nL , n refers
to phase number, L refers to phase change time) will be
WEBSTER’S GREEN RATIO MODEL
assigned proportionally to other phases according to critical
After specifying the cycle, the green time is assigned lane traffic flow rate. If all phases’ queue length qi has
proportionally to each phase according to critical lane flow qi < qo , then the green time of each phase is assigned by
rate. Equation (1) introduces the assigning method:
Webster’s green ratio model.
(c − L ) × (v / s ) i 3.2 Value of q o
gi = (1)
∑ (v / s ) i The value of q o should be neither too bigger nor too
smaller, it’s related with the biggest arrival rate of vehicle in all
Where g i is green time of the ith phase (s); (v / s )i is rate phases. If the value is too bigger, a situation would occur that
of the ith phase’s critical lane flow rate; c is cycle(s); L is there is not phase r whose queue length q r ≥ qo . So the
loss time in one cycle(s). original intention of preventing traffic congestion can’t be
564
attained. Otherwise, if the value is too smaller, then the Here we need necessary auxiliary facilities to define the
difference of vehicle arrival rate to each phase will be ignored, value of q r . Two detectors are set per lane. One is located in
so each phase will obtain priority by turns. It won’t help to
the stop line and close to the line; another is placed at a
settle traffic congestion.
distance of 50-100 meters behind the stop line (see Figure.4).
Here, we define a rule: to one or two phases in which the The first detector (close to the stop line) is used to count the
traffic congestion is easy to happen, when traffic congestion leaving vehicles, etc. The second one detects the parameters
has happened or being happening, they will obtain passage such as vehicle number, speed and vehicle interval, etc., and
priority frequently and by turns. To other phases, because the provides data of determining the signal intersection traffic state
green time assigned reduces, the queue of vehicle will come and forecasting traffic parameter.
forth accumulative effect. The phase will obtain passage
priority when the queue of vehicle is long enough.
565
Where g max is green time aligned to the priority phase(s); 78 50 13 42′57″
4. CASE STUDY
566
REFERENCES [8] Ceylan, Halim; Bell, Michael G.H. “Traffic signal timing
optimisation based on genetic algorithm approach,
[1] Chang, Tang-Hsien; Lin, Jen-Ting. “Optimal signal including drivers’ routing”. Transportation Research Part
timing for an oversaturated intersection”. Transportation B: Methodological Volume:38, Issue:4, 2004, P329-342.
Research Part B: Methodological Volume:34, Issue:6, [9] Mirchandani, Pitu; Head. “Larry A real-time traffic signal
2000, P 471-491. control system: architecture, algorithms, and analysis”.
[2] Yang Peikun, Zhang Shusheng. Traffic management and Transportation Research Part C: Emerging Technologies
control. Pepole’s Traffic Press, 1995. Volume: 9, Issue: 6, 2001, P415-432.
[3] Li Gang, Sun Yihe, Hua Zeqing. “Study of City [10] Mung, Gregory K. S.; Poon, Antonio C. K.; Lam,
Intelligent Signal Control Arithmetic Suitable to the William H. K. “Distributions of queue lengths at fixed
Situation of China”. ITS Communication, 2001, Vol.2, time traffic signals”. Transportation Research Part B:
P42-49. Methodological Volume: 30, Issue: 6, 1996, P421-439.
[4] Mchalopoulos, P.G, Stephanopolos, G.May. “Optimal [11] Dion, Francois; Rakha, Hesham; Kang, Youn-Soo.
Control of Oversaturated Intersections Theoretical and “Comparison of delay estimates at under-saturated and
Practical Considerations”. Traffic Engineering & Control, over-saturated pre-timed signalized intersections”.
1978, P216-221. Transportation Research Part B: Methodological Volume:
38, Issue: 2, 2004, P99-122.
[5] Corinne Ledoux. “A Neural Network Traffic Flow Model
for Heavy Traffic Conditions”. Applications of Advanced [12] Su, Chih-Chiang. An adaptive “traffic signal control
Technologies in Transpotation, 2000, P265-279. system”. Transportation Research Part A: Policy and
Practice Volume: 31, Issue: 1, 1997, P58.
[6] Hong K.Lo. “A Cell-Based Traffic Control Formulation:
Strategies and Benefits of Dynamic Timing Plans”. [13] Yang, Baiyu; Miller-Hooks, Elise. “Adaptive routing
Transportation Science, 2001, Vol.35, No.2, P148-164. considering delays due to signal operations”.
Transportation Research Part B: Methodological Volume:
[7] Francois Dion, Bruce Hellinga. “A Rule-Based Real-
38, Issue: 5, 2004, P385-413.
Time Traffic responsive Signal Control System with
Transit Priority: Application to an Isolated Intersection”.
Transportation Research Part B, 2002, Vol.36:325-343.
567
2008 International Conference on Intelligent Computation Technology and Automation
569
(2) A mass-spring model to get two animations
segments.
570
parameters and the iteration times of our method and model the pre-shape and the final shape of the cloth
the traditional mass-spring model. With the same geometrically. A mass spring model is than build to get
parameters, the iteration times of our two animation the dynamic procedure. We iterate the ODE from both
segments method is 2700 while traditional one segment the ‘up-down’ and the ‘down-up’ directions and a
is 4000. virtual force is added to get the ‘rebounded’ velocity. A
In this example, the computational costs are local refinement is used to avoid the overlap of the two
largely reduced. By compare figure 3 and figure 4, we directions iterations. Experiments demonstrate that our
method is efficient and effective.
can see that the draping shape by our method is more For most draping cloth, we can get its geometry
realistic than the traditional mass spring model as the shape and the positions of each point at the grid. In the
‘super elastic ’of the ‘springs’ is more evident in the past, we did not make full use of this information. With
latter model. the two-direction iterations proposed in this paper, we
can increase the simulation speed largely and the
simulation result can be adjusted to be more realistic.
With the development of 3D geometry models and 3D
solid scan and analyse, in the future, we can get the
final shape more easily and more realistic, which will
push the application of this algorithm.
6. Reference
Fig 3 the draping shape of the cloth
by our method [1] I Rudomin, J Castillo, Real-time clothing: geometry
and physics [M].WSCG, 2002.
[2] Volino P, Magnenat-Thalmann N, An evolving system
Table 1 Cloth model parameters for simulating clothes on virtual actors [J]. IEEE Computer
Graphics and Application. 1996, 16(5): 42-51.
size of cloth model 9x9 [3] Volino P, Magnenat-Thalmann N. Developing
types of the Spring coefficient Spring simulation technique for an interactive clothing system[C].
Springs damping VSMM 97 proceedings, 1997.
Structural spring 4 0.6 [4] Meyer M, Debunne G, Desbrun M, et al.,Interactive
Shear spring 4 0.6 animation of cloth-like objects in virtual reality[J]. Journal of
Visualization and Computer Animation. 2001, 12.
Flexion spring 2.4 0.8
[5] Liu Hui, Chen Chun, Shi Bai-Le, Simulation of 3D
Gravity -0.2 Air 0.04 Garment Based on Improved Spring-Mass Model [J]. Journal
damping of Software, 2003, 14(3):619-627ˊ
One Time 0.01 Iteration 4000 [6] Deshbrun M., Meyer, M., Schroder P., Barr A.H.,
animation step seconds times Implicit Fairing of Irregular.Meshes using Diffusion and
segment Curvature Flow, SIGGRAPH 99 Conference
Two Time 0.01 Iteration 2700 Proceedings,1999:317-324,
animation step seconds times [7] Oshita, M., Makinouchi, A. Real-Time Cloth
segment Simulation with Sparse Particles, SIGGRAPH 2001 Sketches
and Applications, 2001:250-258.
[8] Vlachos, A., et al., Curved PN triangles, 2001 ACM
Symposium on Interactive3D Graphics, 2001.
[9] Weil, Jerry, Synthesis of Cloth Objects. Computer
5. Conclusions and future work Graphics (ACM).1986, 20(4):49-54ˊ
[10] P S Karthikeyan, P S Ranganathan. Tutorial on Cloth
The 3D dynamic simulation of cloth is a complex Modeling,
system, covering many kinds of technologies, and it is http://www.geocities.com/SiliconValley/Heights/5445/cloth.h
of great importance in many fields, such as fabric tml.
designing, movie making, animation studios, virtual
reality, etc.
In this paper, we propose a 3D dynamic cloth
simulation algorithm based on a mass-spring model. A
reversed animation segment is added which takes the
final positions as its initial condition. It is an efficient
method for the real-time simulation of cloth. We first
571
2008 International Conference on Intelligent Computation Technology and Automation
Xian-Min Ma
School of Electrical and Control Engineering,Xi’an University of Science & Technology,
Xi’an,710054, China
maxm@xust.edu.cn
3. Intelligent Algorithm
In coal mining well, the fire event is abrupt
Figure 3. Gas concentration error change Ec
happening, because the temperature rising and the
increasing of CO strength and smog thickness and gas
concentration are very fast in burning commencement
stage. Therefore it is very difficult to educe the
accurate mathematical model for the coal fire
happening. So the intelligent algorithm of fuzzy logic
theory combined with neural network is proposed to
extract the fire probability.
3.1. Fuzzy logic characteristic fusion algorithm Figure 4. Membership of the output variable
In order to realize the reasonable prediction, a two- The “if… then…”production rule is used to define
dimensional fuzzy controller is used as the regulator. the fuzzy rules. If “temperature is PV” and “smog is
Regarding the membership function, there are five PB” and “CO is PM” and “gas concentration is PS”,
levels, namely, the very big probability (PV), the big then “the fire probability is PB”. According to the
probability (PB), the medium probability (PM), the biggest membership rule, the fuzzy control decision
small probability (PS), the zero probability (ZO). For rules used in the system are shown in Figure 5.
example, the input variables of the fuzzy controller for
the gas concentration are error E and the error change
Ec, and the output variable is the probability ratio. The
set of linguistic term is{PV, PB, PM, PS, ZE}, the
variable universe of discourse is defined as
{8,7,6,5,4,3,2,1,0} corresponding to real values of
{0.8, 0.7, 0.6, 0.5, 0.4, 0.3, 0.2, 0.1,0}. The variable
universe of the error change Ec is defined as {-5,-4,-3,-
2,-1,0,1,2,3,4,5}, its fuzzy linguistic set is{NB, NS, 0,
PS, PB}. The membership function of the output
linguistic variable is the same as error E, namely, PV, Figure 5. Control decision
PB, PM, PS, ZE. The gas concentration membership
functions of the variables are shown in Figure 2, Figure The simulation results of the fuzzy inference of the
3, and Figure 4 respectively. temperature, CO, smoke and gas to predict the probability
P1 are carried out with MATLAB. The one of the
results is shown in Figure 6.
573
3.2. BP neural network fusion algorithm where, v(x) is step function, Pi(x) is the fire probability
fused from both the fuzzy logic system and the neural
In character layer, the three layers BP network is network system. In this paper, the fire continuance
adopted in order to raise the speed of detection. The time is divided into two grades as short duration (PS)
input signals are the temperature, smoke thickness and and long duration (PB). If the output of the fuzzy
CO strength and gas concentration, respectively. The fusion algorithm is PS, the gas monitoring and control
hidden layer has eight cells, and the output layer gives system sends out the warning information, so the
the fire happing probability P2. extinguishing machine is quick on the trigger at once.
Supposing that the weights of the neural network is If output result of the fuzzy fusion algorithm is PB, the
matrix w, the input vector is X, the expectation output mining workers retreat immediately and the power
is T , the threshold matrix of hidden layer isθ, f is the supply is shut down.
sigmoid function, hidden layer output is as follows [3]: The some the output fire probability P2 are shown in
y i = f (∑ wij x j − θ i )
Table 1, S denotes the smog thickness, Te expresses
(1)
the temperature, EX presents desired computations, and
j
RV is real values.
The output computation in the output layer is:
ol = f (∑ Tli y i −θ l ) (2) Table 1. The fire probability P2
i Input Output
The output error between desired and real values is: P2
1
Gas S CO Te
EX RV
∑ (3)
2
E= (t − o ) l l
2 l 0.26 0.24 0.13 0.3 0.30 0.312
According to Chinese fire standard, the all values 0.33 0.32 0.24 0.4 0.40 0.404
are first normalized and entered into the input level of 0.42 0.45 0.32 0.2 0.50 0.491
nerve network. Then the output fire probability is 0.57 0.57 0.46 0.4 0.60 0.602
iterated from the training weight values and the input 0.64 0.24 0.51 0.5 0.70 0.711
values, until the error is smaller than the desired 0.70 0.43 0.60 0.3 0.80 0.783
values. In this algorithm, the CO signal range is [0,1]
corresponds to 0-100ppm, the smoke signal range is 4. System Design
[0,1] corresponds to 0-20%/M, temperature signal
range is [0, 1] corresponds to 0-10˚C/min, gas The whole system is designed to verify the theory
concentration is [0, 1]. The error curve is shown in analysis. The experiment prototype is mainly made up
Figure 7. of the data acquisition and conditioning circuits, filter,
amplification, A/D converter, ARM7 CPU processing
core, and the memory, etc. For real time prediction and
control, the ARM7 development platform is used as
the main hardware structure, shown in figure 8.
574
has a high performance 32-bit RISC architecture with a alarm threshold Ts. The gas monitoring and control
high density 16-bit instruction set and very low power system sends out the warning information and
consumption. In addition, a large number of internally implements corresponding action to extinguish fire, if
banked registers result in very fast operation, making there is fire happening. Otherwise, the program returns
the device ideal real-time control applications. back to collect data again.
The design software partly is included: the program
of the ARM microcontroller port, the program of the 5. Conclusion
host computer PC and the driver of the ARM
microcontroller interface board. ARM microcontroller Based on multi-sensor data fusion theory, a novel
port is divided into 4 sub-modules: the system coal gas fire prediction and control system is proposed
initialization, data acquisition, data fusion information in the paper. The temperature, CO, smoke, and gas
processing, the communication program between ARM concentration sensors are adopted to collect the
microcontroller and the PC. The main program original data information. For veracious prediction, the
flowchart of the whole system is as shown in Figure 9. fuzzy fusion algorithm and neural network fusion
algorithm are described for the fire happening
probability inference. In order to get real time control
begin
effectiveness, The ARM7 microcontroller is used to
control fire alarm. The theory analysis and simulation
initialization results show that the system has some merits such as
real-time capability, reliable and flexible. It gives a
new way to decrease the mistake report rate of the fire
detection and improve reliability of the existing gas
any data?
N monitoring and control system.
Y
data acquisition
Acknowledgment
The project is supported by the Natural Science
data preprocess controller Foundation of Shaanxi Province Education Department
(07JK319). I am grateful to De-feng Zheng for her help.
575
2008 International Conference on Intelligent Computation Technology and Automation
Center
577
samples, which through m steps shift from state i to 5. Application of Grey-markov forecasting
state j , Mi is the number of original data samples, model
which in the state of i , we label
As is shown in Table 1, there is the historical
M ij ( m)
pij ( m ) =
+ +
, i, j = α , α , β , γ , γ , as the mth state order volume from the week of 1st to the 13rd in a
Mi distribution center. Now according to the order volume
from the week of 1st to the 11th, we apply the
transition probability and P ( m) as the mth state
Grey-markov model to forecast the order volume of the
transition matrix, that is 12nd and 13rd week. Then we compare the forecasting
⎡ p11 ( m) p12 ( m ) " p1n ( m) ⎤ results of GM (1, 1) model and Grey-markov model
⎢ p ( m ) p ( m ) " p ( m )⎥ with the actual value.
P ( m) = ⎢ 21 22 2n ⎥
⎢ # # # # ⎥
⎢⎣ pn1 ( m) pn 2 ( m) " pnn ( m )⎥⎦ Table 1 Historical order volume
Week 1 2 3 4 5 6 7
P ( m) reflects the transition law between any two
Order volume 1346 1399 1467 1567 1595 1588 1622
states, which is the foundation of the Grey-markov Week 8 9 10 11 12 13
forecasting model and can be used to forecast the Order volume 1611 1615 1685 1789 1790 1829
578
5.3. Fixing state transition matrix laws behind the disorderly surface of system. The
Markov process model reflects the laws of system state
According to the calculation of assessment and its transition. The grey-markov model has the
indicator and the division of states, we can get the advantages of the above two models, which achieves
states shift of order volume, which is shown in Table 3. better effect in the practical application. Because the
forecasting accuracy of the grey-markov model is
Table 3 States shift of order volume related with the division of the markov state transition,
α β γ which has no unified standard. This paper assumes the
residual is subjected to the normal distribution and uses
α 1 1 0 the standardized deviation of residuals as the state
β 1 1 2 division standard. Therefore, there is further
γ 1 1 2 improvement to the grey-markov model.
According to Table 3, we can obtain the states [1] Deng Julong, “The Primary Methods of Grey System
Theory” , Huazhong University of Science and Technology
transition matrix, which is
Press, 2005.
⎡1/ 2 1/ 2 0 ⎤
⎢1/ 4 1/ 4 1/ 2⎥ [2] Xue Chunming, and Zeng Yingkun, “On grey prediction
⎢ ⎥ model for road traffic freight volume”, Journal of Kunming
⎣⎢1/ 4 1/ 4 1/ 2⎦⎥ University of Science and Technology, 2006,31(4), 98-103.
Therefore, the state vectors of the 12nd and 13rd [3] Zeng Xiaoming, Gao Rongtang, Luo Qizhi, and Zhang
6. Conclusion
579
2008 International Conference on Intelligent Computation Technology and Automation
581
passenger from district j choose station i ( i ∈ A jd ) to
go to direction d .
♦ set C jd : In an allocation scheme, the set includes
the stations that the value of Cid is the least when the
passenger from district j choose station i ( i ∈ B jd ) to
go to direction d .
♦ h Bjd : The number of elements in the set B jd .
♦ hCjd : The number of elements in the set C jd .
∑ ∑C
n 4
id X id ;
i =1 d =1
Figure 1. Interactive relationship of leader &
♦ The total general expense for all the stations to follower
offer new passenger routes:
∑ ∑C t
n 4
∑t
i =1
id ≥ 1. (2)
L: min f ji ; (3)
subject to
582
n requirement of Eq. (2), solve the lower programming
∑δ
i =1
jdi ≥1; (4)
model and get the passenger selection set δ m× D× n . The
value of Xid can also be obtained which stands for the
X id = ∑ δ jdi ( a jd / h Cjd ) .
m
and boasts for its optimal searching algorithm with parameter values are shown in Table 4-1 and Table 4-2.
simplicity, generality, parallelism and strong Two kinds of scenario are given. In Scenario 2,
robustness, is adopted to solve the problem. government is apt to the benefit of passengers among
When solving the bi-level programming model with the three influencing factors. Set χ 1 = 1 , χ 2 = 5 ,
the genetic algorithm, each solution or choice can be generation numbers T = 70 and the number of the
seen as an individual of a whole population. The upper initial individuals as 20. Program and calculate by the
level objective function is used as the fitness function, “Genetic Algorithm and Direct Search Toolbox” of
by which the population individuals are imposed of the Matlab7.0, the optimum allocation schemes of the two
genetic operation to realize a reorganization of the scenarios are:
structure of the population. Go through generation by ⎡0 1 1 0 ⎤ ⎡1 1 1 0 ⎤
1 2
generation, the optimum solution of the bi-level Tn×D = ⎢0 1 1 1 ⎥ , Tn×D = ⎢0 1 1 1 ⎥ .
programming problem can be founded ⎢⎣1 0 0 0 ⎥⎦ ⎢⎣1 1 1 1 ⎥⎦
Since the passenger route allocation scheme Tn× D is t = 0 means that Station 3 does not have to offer
1
34
contains n × D 0-1 variables, a Binary coding method
is adopted in the algorithm. The individual is expressed the route to Direction 4 in Scenario 1; t 342 = 1 means
as a group of binary codes in which each of the that Station 3 should offer the route to Direction 1 in
elements is corresponding to the value of tid in the Scenario 2. The results show that when the government
two-dimensional matrix Tn× D . The initial individuals is apt to the passenger’s interest, more routes should be
are generated randomly. Each of the individuals is allocated among different stations, and higher the
general cost will be. In addition, transport companies
corresponding to a passenger allocation scheme Tn× D .
operating different stations can optimize the
Step 1: Initialization. Generate N individuals
distribution methods according to the value of Xid .
randomly as the initial population P(0) . Set the
⎡ 0 2400 2550 0 ⎤
evolutional generation counter t = 1 , and define the X1n×D = ⎢ 0 850 1200 4650 ⎥ ;
maxim generation numbers as T ⎢⎣ 3950 0 0 0 ⎥⎦
Step 2: Set fitness function. Transform the upper ⎡1300 950 1150 0 ⎤
level objective function to the fitness function of the X 2n×D = ⎢ 0 400 350 1100 ⎥ .
genetic algorithm. ⎣⎢ 2650 1900 2250 3550 ⎦⎥
Step 3: Find the fitness degree of each individual. Table 1. Value of a jd and f ji
Decode the binary codes and get the corresponding
allocation scheme. If the scheme meets the constraint j ( a j1 , a j 2 , a j 3 , a j 4 ) ( f j1 , f j 2 , f j 3 )
583
1 (300,250,500,600) (7,6,3) Method of Highway Passenger Terminals”, Journal of
Highway and Transportation Research and Development,
2 (450,200,350,700) (10,8,2)
Beijing, China, 2007, 24(11), pp. 140-142.
3 (350,600,400,350) (2,9,5)
4 (250,150,300,650) (3,8,6) [2] Chen, S.Y., “Research on the Planning of Urban Highway
5 (400,250,600,200) (3,4,2) Passenger Terminals Based on Traffic Integration”, M.S.
thesis, Southeast University, Nanjing, China, 2008.
6 (700,200,450,500) (5,6,7)
7 (550,400,350,600) (9,2,5) [3] Vladimir Marianov, Daniel Serra, and Charles ReVelle,
8 (300,700,350,450) (4,6,3) “Location of Hubs in a Competitive Environment”,
9 (650,500,450,600) (5,6,2) European Journal of Operational Research, 1999, 114(2), pp.
363-371.
Table 2. Value of Cid [4] Yang, Z.C., “Adjust and Optimize the Structure of the
i ( Ci 1 , Ci 2 , Ci 3 , Ci 4 ) Transportation to Promote the Development of the
Transportation Economy”, Hunan Communication Science
1 (10,7,6,20) and Technology, Hunan, China, 2000, pp. 62-63.
2 (20,6,8,4)
3 (5,12,15,100) [5] Jin, W.Z., J. Zhang, and Q. Li, “Optimal Dispatching
Methods on Coach Operations”, Journal of Highway and
Transportation Research and Development, Beijing, China,
1999, 16(4) pp. 82-84.
Figure 2. Calculation process of Scenario 1 [7] Yao, Z.G., W. Zhou, Y.Q. Wang, and Z.K. Liu,
“Comparison of Operation Models of Intercity Bus Hub”,
Journal of Chang An University: Natural Science Edition,
Xi’an, China, 2006, 26(1), pp. 71-74.
References
[1] Jin, L., J. Fan, S.Y. Chen, and H.N. Huang, “Preliminary
Research on Route Organization and Route Allocation
584
2008 International Conference on Intelligent Computation Technology and Automation
Qiang LI
Dept. of Mechanical Engineering, Beijing University of Science & Technology
Dept. of Mechanical Engineering, Inner Mongolia University of Science & Technology
nkdlq@126.com
Haishan WENG
Dept. of Mechanical Engineering, Beijing University of Science & Technology
Lijun LIU
Dept. of Mechanical Engineering, Inner Mongolia University of Science & Technology
586
4.4. The Creation of 3-D Finite Element Model
of the Gear
587
LESIZE, 9,,, 2,,,,,1 References
LESIZE, 6,,, 9,,,,,1
LCCAT, 11, 4 [1] Heng SUN, Mechanical Principle, Higher Education
LCCAT, 12, 8 Press, Beijing, 2001.
LCCAT, 1, 15 [2] S. MOAVENI. Finite Element Analysis -Theory and
MSHAPE, 0,2D Application with ANSYS, Prentice-Hall, Inc., New Jersey,
MSHKEY, 1 1999.
AMESH, 1, 7, 1 [3] ANSYS, Inc., ANSYS Tutorials for Release 5.5, ANSYS,
Inc., 1998
CSYS, 4 [4] Youlin WANG, Qing YU, and Ying JIANG, “The
WPROT, ang1 Practical Involute Equation under Cartesian Coordinates
ARSYM, Y, 1, 7, 1,, 0,0 System”, Journal of Mechanical Transmission, 26(3), 2002,
WPROT, ang1 pp.41-43.
ARSYM, Y, 1, 14, 1,, 0,0 [5] Jingzhong XING, “Methods of Creating Model and Grid
WPROT, ang Partition of ANSYS”, China Water Transport (Academic
ARSYM, Y, 1, 28, 1,, 0,0 Version), 6(09), 2006, pp. 116-118.
WPROT, 2*ang
ARSYM, Y, 15, 56, 1,, 0,0
…………………….
ASEL, R, LOC, Z, 74/1000
CM, AREA2, AREA
TYPE, 2
ESIZE, zesize, 0
CMSEL, S, AREA2
VDRAG, AREA2,,,,,, 1043
…………………….
ALLSEL, ALL
ESEL, S, TYPE,, 1
ACLEAR, ALL
NUMMRG, ALL,,,, LOW
NUMCMP, ALL
……………………
5. Conclusion
(1) The programmed APDL command stream can
be, easily and conveniently, applied to created similar
involute spur gears (standard gear or profile shifted
gear) by only modifying some parameters in program.
(2) For the above 3-D finite element model of
complicated structure cylindrical involute internal spur
gear, its strongpoint is completely regular mesh and
convenient modification in mesh size. The completely
regular meshing is benefit to improve the precision of
results, and convenient modification in mesh size can
adjusts the contradiction between computation time
and precision of results.
Acknowledge
The authors gratefully acknowledge the sponsorship
of this work by the Natural Science Foundation of
Inner Mongolia Autonomous Region, PR China
(200607010707).
588
2008 International Conference on Intelligent Computation Technology and Automation
PME
PME
PM Intelligent
Intelligent
PM Algorithms
Algorithms analysis
analysis
4. Design of Process remodeling method (Case_id), the task name (Task), the performer name
based on Markov matrix (Performer), the execution time (Time) and so on. The
basic structure of log can be described as TableI.
Although in different systems the structure forms of TABLE1. The basic structure of process log
the log are different, the recorded basic information is Case_id Task Performer Time
nearly same, which includes the name of process case
590
4.1 Setting-up of Markov matrix ∃xi ∈ X and ∀x j ∈ X if pij = 0 then X E = xi
With the continuous execution of process, the Rule3:To identify the sequence relation between tasks
system will record large numbers of process logs. ∀xi , x j ∈ X if pij ≠ 0 then xi >x j
According to the logs a Markov transition matrix of the
process can be set up. The concrete process is Rule4:To identify the casual relation between tasks
following. ∀xi , x j ∈ X if pij = 1 and xi ≠ x j then
(1) To count the repetitious execution times of the
process and denote it as n, viz. Case_1, Case_2,…, xi → x j
Case_n; Rule5:To identify the parallel relation between tasks
(2)To analyze every process case and set up the task
Rule5.1:To identify And-Split
set X of the process, viz. X = { x0 , x1 ,..., xk } ; ∀xi , xηk ∈ X
(3) To calculate the transition probability among
1
tasks with pij = mij / n ( mij ≤ n , i, j ∈ I ) , if piη1 = piη2 = ... = piη = ≠ 0 and xi ≠ xηk
k k
mij denotes the times from task xi to task x j within then { xη // xη2 // ...// xηk ; xi > xηk ; xi is the
1
one-step in all process cases.
task with And-Split }
(4) To set up the Markov transition matrix of the
Rule5.2:To identify And-Join
process based on all pij ( i, j ∈ I ), denoted as P.
x0 x1 ... xk ∀xi , xηk ∈ X
x0 ⎡ p00
⎢p
p01 ... p0k ⎤ if pη1i = pη i = ... = pη i = 1/ k ≠ 0 and xi ≠ xηk
P = x1 ⎢ 10 p11 ... p1k ⎥⎥ 2 k
... ⎢ ... ... ... ... ⎥ then { xη // xη // ...// xηk ; xηk > xi ; xi is the task
⎢ ⎥ 1 2
xk ⎢⎣ pk 0 pk1 ... pkk ⎥⎦ with And-Join }
Based on Chapman-Kolmogorov equations, pij and Rule6:To identify the exclusive relation between tasks
Rule6.1:To identify OR-Spli
ij ∑ ik kj
P have the following properties. (1) p ( k ) = p p ( k −1) .
k ∈I ∃xi , xηk ∈ X , piηk > 0
(2) P ( k ) = P i P k −1 = P k if ∑ piη k
=1
4.2 Design of Process mining algorithm based k
The following is the mining rules of process logical Rule8:To identify the k- step iteration among tasks
relations (from rule1 to rule 8) are designed as follows. Rule8.1:To identify the iterative tasks
Rule1:To identify the start task X S of the process
∀xi , xη ∈ X , xi ≠ X S ,
∃x j ∈ X and ∀xi ∈ X if pij = 0 then X S = x j k
xi ≠ X E and x j ≠ X E , X re = ∅
Rule2:To identify the end task X E of the process
591
if pij = 0 , p ji > 0 and ∃k ( k ≤ n − 1) and WE : a multi-task set in which the relation among
p (k )
ij > 0( p (k )
ij ∈P k
) tasks is exclusive. WE = {( xη , xη ,...) xη # xη # ... }
1 2 1 2
then {there are a k+1 step iteration
Mining algorithm _Process (P,X):
between xi and x j ,and x j > xi ;
X re = X re + {xi , x j } W = ∅ , WP = ∅ , WE = ∅
Step1:
Refunction ( )
} For ( i ≤ n + 1 , i = 0 , i + )
Refunction ( ) ∀xi ∈ I
Do
{ for ( η ≤ n + 1 , η = 0 ,η + ) If Rule1 then X S = xi
Input: P: Markov transition matrix of the process if ∃xη , xη ,..., xη ∈ X and Rule6.2
1 2 k
then{
X: a task set of the process, X = { x0 , x1 ,..., xn }
Output: W: a dual-task set in which the relation WE = WE +{( xη , xη ,...,xη ) xη # xη #
1 2 k 1 2
between the dual tasks is casual, sequent or iterates. ... # x }
ηk
W = {(xi , x j ) xi → x j or xi > x j or xi ◇ x j }
W = W + {( xηk , xi ) xηk > xi } }
WP : a multi-task set in which the relation among
if Rule7
tasks is parallel. WP = {( xη , xη ,...) xη // xη // ...}
1 2 1 2
592
Data and Knowledge Engineering, Vol 47, No. 2, pp.
then { W = W + {( xi , xi ) ◇
237-267, 2005.
xi } +{( xi , xηk ) xi > xηk } } } [4] R. Agrawal, D. Gunopulos, and F. Leymann, Mining
process models from workflow logs, In Sixth
Step4: International Conference on Extending Database
for ( i ≤ n + 1 , i = 0 , i + ) Technology, pp. 469–483, 1998.
[5] J. E. Cook , A. L. Wolf, Event-based detection of
for ( j ≤ n + 1 , j = 0 , j + )
concurrency, Proceedings of the Sixth International
if Rule8.1 Symposium on the Foundations of Software
then Engineering.
W = W + {( xi , X rS ) xi > X rS } + [6] G. Schimm, Process miner - a tool for mining process
schemes from event based data”, Proceedings of the 8th
{( X rE , x j ) X rE > x j } + {( xη , xη ) xη ◇ xη } European Conference on Artificial Intelligence
k −1 k k −1 k
(JELIA), Vol 2424 of Lecture Notes in Computer
Science, pp. 525–528, Springer-Verlag, Berlin, 2002.
5. Conclusions [7] J. Herbst , D. Karagiannis, Integrating machine
learning and workflow management to support
IBPS extend the traditional BPMS. The extended acquisition and adaptation of workflow models,
functions include process analysis, monitoring and Proceedings of the Ninth International Workshop on
Database and Expert Systems Applications, pp. 745–
control, prediction and optimization. This paper
752, IEEE, 1998.
focuses on design its benchmark model. PME is the [8] J. E. Cook , A. L. Wolf, Discovering models of
key component of IBPS. This paper designs a process software processes from event-based data, ACM
remodeling method based on Markov matrix. The Transactions on Software Engineering and
actual process model can be automatically deduced Methodology, Vol 7, No. 3, pp. 215–249, 1998.
from process logs. Next step we will research how to [9] W. M. P. van der Aalst, A.J.M.M. Weijters, and
analyze the difference between actual model and L. Maruster, Workflow mining: discovering process
predefined model to improve process managers’ models from event logs, IEEE Transactions on
decision capability. Knowledge and Data Engineering, 2004.
[10] L. Maruster, A.J.M.M. Weijters, W. M. P. van der
Aalst, and A. van den Bosch, Process mining:
6. Acknowledgement discovering direct successors in process logs
Proceedings of the 5th International Conference on
This work is supported by management science and Discovery Science (Discovery Science 2002), Vol 2534
engineering key disciplines in Shanghai Maritime of Lecture Notes in Artificial Intelligence, pp. 364–373,
University (NO:XR0101), and shanghai’s excellent Springer- Verlag, Berlin, 2005.
[11] A. J. M. M. Weijters , W.M.P. van der Aalst, Process
young teachers scientific research fund. mining: discovering workflow models from event-
based data, Proceedings of the 13th Belgium-
7. References Netherlands Conference on Artificial Intelligence
(BNAIC 2001), pp. 283–290, 2001.
[1] M. Weske, W. M. P. van der Aalst, H.M.W. Verbeek, [12] L. Wen, J. Wang, W. M. P. van der Aalst, Z. Wang,
Advances in business process management, Data & and J. Sun, A novel approach for process mining based
Knowledge Engineering, Vol 50, pp. 1-8, 2007. on event types, BETA Working Paper Series, WP 118,
[2] Daniela Grigori, Fabio Casati, Malu Castellanos, Eindhoven University of Technology, Eindhoven, 2007.
Business process intelligence, Computers In Industry, [13] A. K. A. de Medeiros, W. M. P. van der Aalst, and
Vol 56, pp. 321-343, 2004. A.J.M.M. Weijters, Workflow mining: current status
[3] W. M. P. van der Aalst, B. F. van Dongen, J. Herbst, and future directions, Computer Science, Vol 2888, pp.
L. Maruster, G. Schimm, and A.J.M.M. Weijters, 389-406, 2005.
Workflow mining: a survey of issues and approaches,
593
2008 International Conference on Intelligent Computation Technology and Automation
Sheng Shangxiong
School of Mechanical and Electronical Engineering, Lanzhou University of Technology,
Lanzhou,Gansu,730050,P.R.China
Sshang600@sina.com
In order to fulfill the functioning of an HMS, it is According to TPN order form processing model
necessary to form an efficient, flexible and responsive presented in former section, assume one task Holon
network of agents, which are intra-holonic entities that can process n order form, each order form can be
inherit the same characteristics as the holons. One of finished in unit time, for order form i, there having
the most important problem to realize function of HMS consignation date constriction Di > 0 , if and only if
is how to tackle order form effectively, in other words, the order form can be finished before date constriction,
order Holon is the key component for HMS[4][5]. then there are profit that Fun>0. one solution to the
question is a subset J of n order form, all the order
3. Timed Petri-net(TPN)[6] Based order form in J can be finished before consignation date
holon constriction. So the profit of feasible solution is the
Definition.
sum of J, that is ∑ Fun j . The feasible solution
i∈ j
1. K : P → {1,2,", n} is the capacity funcition of having maximum profit is the optimization solution.
CN. The optimization function can be simplified to
2. Mp : P → {0,1, " , n − 1} is the flow mark of CN, equation 1. where, Pw, tw, qw, rw are the weight value
if ∀p ∈ P : M p ( P) ≤ K ( p ) of cost, time, quality and reliability, Plinkt,Tlinkt are
595
the order connection and order connection weight in Initialize: generate the DE population
the evaluation process randomly
⎡ m n m n ⎤ Evaluate the individual
⎢ pw (
⎢
∑∑ x P
i =1 j =1
ij ij
'
+ Plinkt ) + t w ( ∑∑ x T
i =1 j =1
ij ij
'
+ Tlinkt ) +⎥
⎥ Get the best solution X best
f ( x) = max⎢ ⎥ ""(1)
m n m n
⎢ ⎥ While (the end qualification is not met )
⎢q w ( ∑∑ x Q ij ij
'
∑∑ x R
) + rw ( ij ij
'
) ⎥
Exert mutation operation to each
⎣⎢ i =1 j =1 i =1 j =1 ⎦⎥
⎧1, if ith sub order is selected by jth candidate; individual to acquire corresponding mutation
x ij = ⎨
⎩0, if ith sub order is not selected by jth candidate individual
Vi (t + 1) = X best (t ) + F ( X r1 (t ) − X r 2 (t ))
4.2 The hybrid algorithm based on PSO[7][8] Exert mutation operation, then crossover
and DE operation to get the experiment individual
problem is required. What we have to know is just the Evaluate the object value of experiment
fitness evaluation for each solution. This advantage individual
makes PSO more robust than many other search Exert selection operation between
algorithms. However, as a stochastic search algorithm, individual and individual to generate new individual
PSO is prone to lack global search ability at the end of U i (t + 1), if F (U i (t + 1)) < F ( X i (t ))
Xi (t + 1) = {
a run. PSO may fail to find the required optima in case Xi (t ), otherwise
when the problem to be solved is too complicated and Update X best
complex. DE employs certain probability to avoid End While
becoming trapped in a local optimal and the search Output X best and objective value
process can be controlled by the altering status of best
END
particle, we can control the search process and avoid
Where, r1, r 2 ∈ {1,2," N } are different each
individuals being trapped in local optimum more
efficiently. Thus, a hybrid algorithm of PSO and DE, other;
named HPSO, is presented as follows. F ∈ [0,2] is zoom scale factor which is used to control
Begin the ratio of father generation differential vector
STEP 1 Initialization X r1 (t ) − X r 2 (t )
Initialize swarm population, each particle’s X best (t ) is the basic vector after exerting disturbance.
position and velocity;
Evaluate each particle’s fitness; The generation will share the information of best
Initialize gbest position with the lowest fitness solution;
particle in swarm; rand ( j ) is the random variable of jth separate
Initialize pbest position with a copy of particle random in [0,1]
itself; rand (i ) is the random number in aggregation
Initialize ϖ max , ϖ min , c1 , c2 ,maximum {1,2,", d }
generation, and generation=0. CR ∈ [0,1] is crossover parameter to control scatter
dimension of population.
STEP 2 Operation
For PSO STEP 3 Output optimization results.
do { END
generate next swarm by Eq.(2) to Eq.(8);
find new gbest and pbest; As a new evolutionary technique, differential evolution
update gbest of swarm and pbest of the (DE)[9][10] was mainly proposed for continuous
particle; optimization .DE is a population-based globally
generation++; evolutionary algorithm, which uses a simple operator
} to create new candidate solutions and one-to-one
while (generation<maximum generation) competition scheme to select new candidate greedily.
For DE DE have the merits of memorizing the best solution
For gbest particle S of swarm and sharing the group information in the candidate. De
{ BEGIN adopt the differential operation to generate new
596
candidates. The compete mechanism DE used is the reconfiguration model based on time Petri-net is put
one to one greedy selection[11]. The real number code forward, order intelligent operation series is guided by
is used in the algorithm, so the complicated gene Differential Evolution (DE) . Simulation results show
operation in GA algorithm is avoided. that the proposed model and algorithm are effective to
In the first place, DE generate the initialization order evaluation and implementation .
population random in the feasible solution in the
problem space. The current population are exerted References
mutation and crossover operation to generate a new
population. Secondly two population are selected with [1] Fowler, John W.,Rose, Oliver, “Grand challenges in
one to one mechanism by greedy theory to gain the modeling and simulation of complex manufacturing systems”,
ultimate new generation. The best solution in DE is Simulation, 80(9), 2004,pp.469-476.
obtained by the distance of individuals in population [2] Babiceanu, R.F., Chen, F.F., Sturges, R.H. , “Framework
and direction information. So each individual in for the control of automated material-handling systems using
population change the search action by altering the the holonic manufacturing approach”, International Journal
of Production Research, 42(17) ,2004,pp.3551-3564.
direction of differential item and step. In each [3]Giret, Adriana, Botti, Vicente., “Holons and agents”.
generation, mutation and crossover operation exerted Journal of Intelligent Manufacturing ,15(5), 2004,pp.645-
to individuals to generate a new population. Finally the 659.
next generation is generated by selection in the old [4]Hsieh, Fu-Shiung, “Model and control holonic
generation. manufacturing systems based on fusion of contract nets and
Petri nets”. Automatica,40(1),2004,pp.51-57.
5. simulation result [5]Sousa, Paulo, Ramos, Carlos,Neves, Jose, “The Fabricare
system: A multi-agent-based scheduling prototype”,
Production Planning and Control, 15(2),2004,pp.156-165.
Assume there are 30 order form at time t in DHVE [6]Reddy, J.P.,Kumanan, S., Chetty, O.V.K. Application of
system. Petri nets and a genetic algorithm to multi-mode multi-
resource constrained project scheduling. International
Table 1. comparisons of different algorithm Journal of Advanced Manufacturing Technology,
Best rate(100%) HPSO GA Enumeration 17(4),2001,pp.305-314.
Best 855 843 829 [7] Ratnaweera A, Halgamuge SK, Watson HC. “Self-
Mean 838 834 798 Organizing hierarchical particle swarm optimizer with time-
varying acceleration coefficients”. IEEE Trans. on
Maximum 820 825 766
Evolutionary Computation, 8(3),2004,pp.240-255.
CPU time 21.23” 49.00” 1529.0”
[8]Shi, X.H., Liang, Y.C., Lee, H.P.,An improved GA and
PSO culled hybrid algorithm for antenna array pattern
When the problem size become larger and larger, synthesis. Progress in Electromagnetics
EA algorithm can reach optimum with high speed. To Research,80,2008,pp.461-476.
test performance of HPSO, the compute result with [9]ChangYP,Wu CJ, “Optimal multiobjective planning of
different size got by HPSO, GA, enumerations are large-scale passive harmonic filters using hybrid differential
provided in table 1. evolution method considering parameter and loading
uncertainty”, IEEE Transactions on Power Delivery,
20(1),2005,pp.408–416.
6. conclusion [10]Onwubolu GC, “Optimizing CNC drilling machine
operations: traveling salesman problem-differential evolution
Holonic Manufacturing System (HMS) is a new approach”, In: Onwubolu GC, Babu BV, editors. New
concept for enterprise reconfiguration, order form optimization techniques in engineering. Heidelberg,
selection and evaluation are very important problem in Germany: Springer,2004, pp. 537–565.
task allocation and carry out. The problem of how to [11]Nearchou AC, “A differential evolution approach for the
common due date early/tardy job scheduling problem”,
model the unit of the manufacturing system,
Computers & Operations Research, 2006, doi:
management style of the unit, control structure and the 10.1016/j.cor.2006.08.013.
corresponding control method are presented in this
paper. The model on order settlement in system
597
2008 International Conference on Intelligent Computation Technology and Automation
⎪m
⎪ ∑ sij = si ; i = 1, 2," , n
2.1.1. Quantity of planning parking facilities ⎪ j =1
⎪ n
Choosing-position planning should determine the ⎪ ∑ sij = d j ; j = 1, 2," , m
capacity of facility reasonable according to the studied ⎪ i =1
⎪ s > 0, if θ = 1
city scale. The number of facilities can be determined ⎪ ⎧⎪ ij ij
; i = 1, 2," , n, j = 1, 2," , m
by calculating the predicting total parking demands ⎪ ⎨⎪ sij = 0, if θ ij = 0
⎪⎪ ⎩
( Q ) of parking area[5]. Assuming that the minimum
s.t . ⎨ N min ≤ n ≤ N max (4)
capacity of facility is cmin , and the maximum capacity ⎪
⎪ d pq = ( x p − xq ) + ( y p − yq ) ≥ 50;
2 2
is cmax , the number of facility is N, then
⎪
⎪ p , q = 1," , n
Q Q
N = [N min ,N max ] = [ , ] ⎪
⎪ D ( X i , Pj ) = ( xi − a j ) + ( yi − b j )
2 2
cmax cmin
Where, N is integer. And according to the principle of ⎪ q
⎪ × (1 + 2.62( a ) 5 )
dispersing deployment, the space between each facility ⎪ Ca
should not be shorter than 50m. ⎪
⎪ ⎧Ci > 0, if δ i = 1
; i = 1, 2," , n
⎪ ⎨⎩Ci = 0, if δ i = 0
2.1.2. Parking facility fare ⎪
⎪ ⎧⎪ wij = 1, if θ ij = 1
⎪⎨ ; i = 1, 2," , n , j = 1, 2, " , m
⎩⎪ ⎩⎪ wij = 0, if θ ij = 0
Parking facility fare ( Ci ) mainly consists of fixed
fare and operational fare, which can be varied on the Where, m—parking demand point amount; n—parking
different position. The objective of this research aims facility point amount; sij —amount of parking facility i
at minimizing the parking facilities’ quantity and it will
increases the scale of parking facilities and reduces the with serving for j; X i = (xi , yi ) —location coordinate
number of parking facilities by the satisfactions of of parking facility i; Pj = (a j ,b j ) —location coordinate
parking demand. If there is a facility on point i , then
599
of parking demand point j; D(X i ,Pj ) —generalized computation is very complex, the results are also
fare from parking facility i to parking demand point j; mathematically optimization, but can not reflect the
real situation. This paper introduces ant algorithm, and
si —capability of facility i; d j —parking demand point
analyses the location problem through simulating ants’
j; θij —service relation between demand and facility; multi-stage action choosing. Site selection process is to
wij —The demand cost(or distance, impedance and so remove alternative points of the parking facilities
whose attraction power is poor, and take the restricted
on) per unit from facility i to facility j is the same to capacity of facilities into account.
transportation cost per unit, and it can be considered as Assuming that each parking demand point is an ant
the same unit freight in the parking facility, unit fare is cave, each alternative parking facility point is "food
1. source", parking location planning equal to the
This model is mainly to solve the total cost of resource allocation problem of ant multi-group and
system under the restrictive condition(4). Its aim is to food multi-source. It is not all parking persons that will
minimize the charge to meet the parking demand. choose the recent parking facilities; they are likely to
There are some limits in the model in order to reduce gain the facilities’ service on the demand points of the
inaccuracies in actual use and really exert the facilities affecting areas.
effectiveness of the model.
3.2. Max-Min ant algorithm
3. Model algorithm to solve
According to choice characteristics of parking
The constraint conditions of parking facility behavior, the paper uses the ant algorithm restricted by
location optimization model are relatively complex, pheromone, that is, setting pheromone virtual
because of the uncertain number of facilities, and the
unknown services objects and services quantity ]
value ⎡⎣τ max ,τ min to make sure the pheromone on each
provided by each facility, so the solution to the model path in the virtual value, because of setting the
has caused great difficulties. In recent years, the study minimum level of pheromone, the probability of
of NP gradual evolves to the two directions: One is to certain points being selected is on the small side and
explore the calculation time with polynomial, and get will never be zero, it meets the actuality of parking
on with that heaven of the algorithm; the other method location behavior. This can increase the "ants’" search
is to explore the heuristic search method[6]. Facility level, simulate the reality well, and get stable results.
location research in the site of the NP problems can be Generally pheromone initialization is a big value
solved by the branch-and-bound method. The article which is more than the maximum and able to ensure
bases on the characteristics of the parking behavior that at the beginning there is a higher exploration
choice and the facility location, uses improved ant probability and can traverse the search space.
algorithm[7,8] to study, including the Max-Min ant
algorithm, mixed ant algorithm and so on. 3.3. Solving process of parking location model
3.1. Ant algorithm and solution of parking According to location model structures, the
facility location objective function mainly consists of two parts Z and
C, Z is the system's total impedance whose unit is
When drivers choose public parking facilities, it is distance length, and mainly to get through walking
similar to the ants finding food, but the difference is distance after stopping and parking facilities
that the parking persons have enough information to accessibility; C is the cost of parking facilities, which
know the general location and distribution of parking is measured with money, and mainly consists of land-
facilities, and understand the basic conditions of use fees, construction costs, operating costs etc.. The
parking facilities, they have some priori knowledge. solving result is the minimum of the objective function
According to the construction of location model, the made up of the above two parts, but parking facility
planning stage is generally certain by multi-facility, fare is affected by multiple factors, and also by the type
and needs to select a certain number of parking of facilities, business model, the location of facilities
facilities within a mass of prepared points to meet the and so on, it can not be accurately calculated in the
parking demand in regions. The uncertain number of planning stage. Therefore, the model is divided into
specific facilities and the complexity of choosing the two stages to solve, the first stage is z as the main
combination will cause many points combinatorial objection, with the public parking demands satisfied
explosion, the use of a simple optimization algorithm fully, calculate the commitment service quantity of
is difficult to get the optimal solution set, and its each facility, ensure all the restrictive conditions met.
600
C is the major for the second phase which is based on of Baling Road and the East Maoling to do the research
the results of the first phase, considering the factor of of parking location planning.
unpredictable costs, the study starts at the principle of In order to express intuitively the parking quantities
least-cost and least number of facilities, the premise is of the parking demand points and the facility points,
that z is change in the permitted range. the rectangular coordinate system has been established.
Each road’s V/C in the planning characteristic year is
3.4. Algorithm explanation showed in Table1, the parking demand points’
coordinates and the demand magnitudes are in Table2,
(1) Initialization. Prognoses the parking demand, and the alternative spots’ coordinates of parking
determines coordinates and No. of demand, and facilities are in Table3.
then calculates regional road v/c ratio.
(2) Identify alternative facilities and cull options Table1 The roads’ V/C
point initially. Determine coordinates and Road No. ① ② ③ ④ ⑤ Auxiliary Road
facilities numbers to meet that space between
V/C 0.73 0.69 0.58 0.42 0.54 0.01
arbitrary two facilities is more than 50m.
(3) Establish the set of demand point to the facilities Note: Traffic flow magnitude in auxiliary road is very
300m from the demand points. small, the road’s V/C may use 0 to replace, and here it
(4) Parking demand distribution and output the Initial takes 0.01.
result.
(5) Sensitivity analysis. Analysis for the initial result, Table2 The parking demand points’ coordinates and the
if the result is up to the mustard, then output the demand magnitudes
final result. Otherwise, calculate the initial result
over again with Ant algorithm. The Ant algorithm No. coordinates demand No. coordinates demand
process is shown in figure1. 1 (263,0) 50 9 -680,380 40
(6) Output the final result. 2 (624,0) 100 10 -1,380,260 80
3 (1382,50) 80 11 -1,380,360 100
A smart point demand -
4 -289,165 60 12 (0,420) 100
Intelligent Ant
5 -931,160 80 13 -230,420 50
State transfer 6 -781,188 50 14 -315,420 100
7 -624,200 100 15 -405,530 50
Pheromone N Inspect facilities 8 -75,300 160
update capacity constraints
Y
Table3 Parking facility alternative spots’ coordinates
Calculate objective
function value No. coordinates No. coordinates No. coordinates
1 (300,0) 5 (1380,160) 9 (400,450)
Test error
2 (620,0) 6 (624,200) 10 (660,420)
Y
N 3 (310,160) 7 (100,420) 11 (930,420)
Initial results
4 (1000,150) 8 (315,400) 12 (1160,420)
Figure1 Flow chart of Ant Algorithm
Using the established model and ant algorithm,
the facilities distributions and the demands which need
4. Case study to undertake in the center of YueYang city are obtained
through the VC++ programming computation as shown
This paper takes part of data of the centre of in figure2.
Yueyang city as an example. The centre of Yueyang
city is an integration of working, transport, business
and so on, the parking attraction intensity is great,
especially the demand of public parking. But the
lagging building of the public parking facilities is
relatively serious. This article chooses the nearby areas
601
6. References
[1] Chen Jun, Wang Wei, Hu Keding. Study on Location
Planning Model for Urban Public Parking Area, Systems
Engineering Theory & Practice [J], 2000, (11): 117-124.
[2] Guo Tao, Yang Tao. Study on the Location Model for
Urban Public Parking Area Based on GA[J], Journal of
Transportation Engineering and Information, 2006,4(1) .
[4] Wu Suli, Leng Jie, Wang Ya, Yan Kefei. Model Based on
Locating Plan of Urban Public Parking Lot [J],
Figure2 Results of parking facility distribution and Transportation Science & Technology, 2005, 208(1).
allocation demand quantity
[5] Lu Huapu. Theory and Method in Transportation
Note: ①~⑤—Road number; △—Parking demand Planning [M]. Bei Jing:Qing Hua University Press,1998.
point; *—Parking facility point; the real line is road;
the broken line is auxiliary spur track; the numbers in [6] Cai Zixin. Artificial Intelligence and Application [M],
the figure are undertaking demand magnitudes for the Qing Hua University Press, 2004.
parking facilities
[7] Zhan Shichang, Xu Jie, Wu Jun. The Optimal Selection
on the Parameters of the Ant Colony Algorithm [J], Bulletin
5. Conclusions of Science and Technology, 2003, 19(5): 381-386.
This paper concerns the location of public facilities. [8] Marco Dorigo, Vittorio Maniezzo, Alberto Colorini. Ant
A restricted parking facility location model is first System Optimization by a Colony of Cooperating Agents.
formulated with the objective to minimize the total IEEE Transactions on System. Man and Cybernetics-Part B
system cost. With the analysis of the complexity of Cybernetics, 1996, 26(1):29-41.
algorithm for the public parking facility location
model, a meta-heuristic optimization algorithm Acknowledgements
modeling the transition process from the ant group to
the food source to analyze drivers’ parking choice This work is sponsored by National Natural
behaviors is then proposed to obtain the optimal Science Foundation of China (No.50348027), the
facility location. Ministry of Communications of China Application
Finally, an example is given to illustrate the Foundation (No.2006319815080, 200431982515), and
application of the proposed methodology. Hunan Province Natural Science Foundation
(No.06JJ50104)
602
2008 International Conference on Intelligent Computation Technology and Automation
604
Table 1. classic input and out samples
µ T1∗ p∗ s∗ L(T1∗ , p∗ , s∗ ) µB(T1∗ , p∗ , s∗ )
1 0.5193 1646.78 42.79 4922.23 20.6536
10−1 0.5168 1648.90 42.80 4903.65 2.0649
10−2 0.5166 1649.11 42.80 4901.80 0.2065
10−3 0.5165 1649.13 42.80 4901.61 0.0206
10−4 0.5165 1649.13 42.80 4901.58 0.002
10−5 0.5165 1649.13 42.80 4901.58 0.0002
s.t. suppose
d(s) < p ≤ p
M = d(s)λ(p)(A0 + B)/ch (p − d(s))
p − d(s)
T1 ≥ L2 p
d(s) 4M 2 /9 + 8M p/λ(p)
2M/3 +
T1 =
The best optimization producing time T1 ,productivity 2p
pproduct retail price s is the optimization objective, and the p
M + M 2 + 8M p/λ(p)
unit time expectation profit EAP (T1 , p, s) is the best. The T1 =
second constraint condition is that the time without produc- 2p
ing is not less than the time Preventive servicing without Property 2 The best planning producing time T1 satisfy
equipment fault. T1∗ ≤ T 1 ,where p is the productivity and s is product retail
price.
2.3 Model Property Proof: By the Property of reference [5]
x2 x2
Property 1 The unit time expectation profit EAP > e−x − 1 + x >
(T1 , p, s) is T1 unimodal function,where p is the productiv- 2 + 2x/3 2+x
ity and s is product retail price. so
Proof:
F (T 1 ) = e−λ(p)T 1 + λ(p)T 1 − 1
∂EAP e−λ(p)T1
= {d(s)λ2 (p)(A0 + B) (A0 + B)λ2 (p)d(s)
∂T1 p(1 − e−λ(p)T1 )2 −
ch p(p − d(s))
− ch p(p − d(s))[e−λ(p)T1 + λ(p)T1 − 1]}
(λ(p)T 1 )2 (A0 + B)λ2 (p)d(s)
ch p(p − d(s))e−λ(p)T1 −λ(p)T1 < −
= − [e 2 + 2λ(p)T 1 /3 ch p(p − d(s))
p(1 − e−λ(p)T1 )2
(A0 + B)λ2 (p)d(s) Let
+ λ(p)T1 − 1 − ]
ch p(p − d(s)) (λ(p)T 1 )2 (A0 + B)λ2 (p)d(s)
− =0
2 + 2λ(p)T1 /3 ch p(p − d(s))
Let
(A0 + B)λ2 (p)d(s) So F (T 1 ) < 0 = F (T1∗ ),since F (T1 )is a strictly in-
F (T1 ) = e−λ(p)T1 + λ(p)T1 − 1 − creasing function of [0, ∞),so T 1 ≤ T1∗
ch p(p − d(s))
since
then
F (T 1 ) = e−λ(p)T 1 + λ(p)T 1 − 1
(A0 + B)λ2 (p)d(s) (A0 + B)λ2 (p)d(s)
F (0) = − < 0, F (∞) > 0, −
ch p(p − d(s)) ch p(p − d(S))
F 0 (T1 ) = λ(p)[1 − e−λ(p)T1 ] > 0 (λ(p)T 1 )2 (A0 + B)λ2 (p)d(s)
> −
2 + λ(p)T 1 ch p(p − d(s))
Then, it exists a unique T1∗ ,such that F (T1∗ ) = 0.that is
to say, such that ∂EAP
∂T1 > 0,when T1 < T1∗ ; ∂EAP ∂T1 < 0 Let above equation is 0,then
∗
WhenT1 > T1 , So EAP (T1 , p, s) is T1 unimodal function. F (T 1 ) > 0 = F (T1∗ ), soT1∗ ≤ T 1 .
605
2.4 Model solution table 3 ,with the increase of αandβ, decrease of unit time
profit and reduction of unit time, But the productivity and
Because model (2) is a constraint nonlinear program the retail price is increased. it is shown that the unit profit
problem, it is difficult to get detailed expression. we use decreased with the decrease of equipment lifetime ,and
penalty function to resolve the best solution of the model. when α = 0, that is the equipment is the perfect working
Firstly, The model(2) expressed the following form. situation ,the unit time profit is the best; whenβ = 0, that
is the equipment fault rate is without productivity, the unit
M inf (T1 , p, s) = −EAP (T1 , p, s) time profit is bigger than β > 0. The table 4 is that unit time
s.t. profit ,planning producing time and retail price decreased
c1 (T1 , p, s) = p − Ks−γ > 0 (1) with increase of γ,and the profit changed obviously. When
c2 (T1 , p, s) = p − p ≥ 0 γ > 1, the price is influenced obviously by demand
c3 (T1 , p, s) = (p − Ks−γ )T1 − L2 Ks−γ ≥ 0
So ,We established penalty function Table 2. classic input and out samples
α T1∗ p∗ s∗ EAP ∗
L(T1 , p, s, µ) = f (T1 , p, s) + µB(T1 , p, s) 0.0 0.5361 1493.30 41.95 4946.43
1.0 0.5165 1649.13 42.80 4901.58
Where
1.1 0.5150 1663.48 42.89 4897.06
3
X 1.2 0.5136 1677.94 42.98 4892.54
B(T1 , p, s) = − log ci (T1 , p, s) 1.4 0.5103 1707.34 43.16 4883.51
i=1 1.5 0.5086 1722.25 43.25 4879.00
606
[4] Chung K J. Bounds for production lot sizing with
Table 5. classic input and out samples machine breakdown. Computers and Industrial Engineer-
p s T1∗ T1 T1 ∆(%)
ing, 1997, 32: 139-144.
1650 43 0.5140 0.5121 0.5340 0.37
[5] Chung K J. Approximations to production lot sizing
1650 43 0.5104 0.5085 0.5302 0.37
1650 45 0.4931 0.4914 0.5117 0.35 with machine breakdowns. Computers & Operations Re-
1650 50 0.4488 0.4475 0.4644 0.29 search, 2003, 30: 1499-1507.
[6] Giri B C, Yun W Y, Dohi T. Optimal design of unreli-
able production-inventory systems with variable production
rate. European Journal of Operation Research, 2005, 162:
4 Acknowledge 372-386.
[7] Giri B C, Yun W Y. Optimal lot sizing for an unre-
This research was partially supported by the Eeduction liable production system under partial backlogging and at
Ministry Foundation of Hubei Province P.R. China under most two failures in a production cycle. International Jour-
the grant no. Q200729003 and Foundation of Hubei Insti- nal of Production Economics, 2005, 95: 229-243.
tute for Nationalities under the grant no 200618. [8] Lin G C, Gong D C. On a production-inventory
system of deteriorating items subject to random machine
breakdowns with a fixed repair time. Mathematical and
5 reference
Computer Modelling, 2006, 43: 920-932.
[9] Giri B C, Dohi T. optimal lot sizing for an unreliable
[1] Bielecki T, Kumar P R. Optimality of zero-inventory production system based on net present value approach. In-
policies for unreliable manufacturing systems. Operations ternational Journal of Production Economics, 2004, 92:157-
Research, 1988, 36(4): 532-541. 167.
[2] Kim C H, Hong Y. An extended EMQ model for [10] Hsieh C C, Lee Z Z. Joint determination of pro-
a failure prone machine with general lifetime distribution. duction run length and number of standbys in a deteriorat-
International Journal of Production Economics, 1997, 49: ing production process. European Journal of Operation Re-
215-223. search, 2005, 162: 359-371.
[3] Groenevelt H, Pintelon L, Seidmann A. Production
lot sizing with machine breakdown. Management Sciences,
1992, 38: 104-123.
607
2008 International Conference on Intelligent Computation Technology and Automation
quality of system
1. Problem Analysis and Assumptions = 65.2335 + 30.8046 ∗ x1 + 0.1677 ∗ x 2 + 1.3456 ∗ x3 − 0.1868 ∗ x 4
Country actual model Country actual model Country actual model Country actual model
United States of America 96.4384
609
than France government, with 5 percent higher of metric influence the performance of the health care
GDP, showing that the United States government system.
offers more medical source to public than that of Using data from World Health Statistics 2007 [4]
France. The only big difference of metric between the that are needed by the multiple regression model, we
two countries is percentage of private expenditure of could repeat the procedure of comparing US and
total expenditure on health, of which the United States France. The quality points of both systems of US and
is 55.3%, while France is only 21.6%, showing that the China are listed below (Table 4).
residents in United States paid more than half of their Country Points
medical fee, while in France, people have only to pay
1/5.
China 92.7148
Therefore, we could conclude that: despite that the
United States has spent much more money on the
health care system, the HALE is still less than that of United States of America 96.4384
France, which shows that the health care system in
France is better. Therefore, we recommend that the
United States should check whether there are problems Table 4.Total points of China and US by the
with the efficiency of health care system – higher multiple regression equation
expenditure, but lower life expectance. Associating From the points above, we could get a definite and
with number of physicians and nurses in United States, clear conclusion that the United States of America has
maybe because that there are too many nurses, which a better health care system. Again we have to analyze
are four times those of France; or it is possible that why this situation happens. We make a table of
physicians in America get too much payment; or specific value of each metric of China and the United
perhaps that the distribution of physicians and nurses States (Table 5).
Physicians and nurses Total expenditure on Private expenditure as
are not equal in the United States – too much in urban HALE density per 1000 people Health as % of GDP % of total expenditure
areas, but insufficient in uptowns and villages. Another (PN) (TE) on health (PE)
610
will not be able to afford expensive medicine fee and must have some restrictive relationships with HALE,
as a result, could not get good health care. in other words, changing the value of the other three
According to the comparison above, we could metrics will have an impact on the value of HALE, and
conclude that although China has made great progress in turn influent the system quality in future.
in building the health care system, the situation China In order to perform this relationship, we use multiple
government faces is still spiny. So as to improve health regression model again, with HALE as the dependent
care system, firstly, China has to increase financing on variable and the other three metrics as independent
health care system of GDP. Because without enough variables. The data are also from World Health
money, there will not be enough resource to meet Statistics 2005 [5]. Specific procedures are the same as
health care need of 1.3 billion people. If funds of the model above.
health care system is sufficient, problem of physicians Therefore, we obtain the predictive regression
and nurses will be solved as well. Private expenditure equation:
of total expenditure on health as percentage of China is
also far too high, since the situation in America is not HALE = 0.7981 + 0.1687 ∗ x1 + 0.0020 ∗ x 2 − 0.0361 ∗ x3
good by comparison with France, situation of China is
even worse. Adding that there are 0.9 billion farmers
where x1 is the unitary value of number of
who live a miserable life even without fundamental
health care, much work will be done to solve this physicians per 10 000 and number of nurses per 10
problem. For example, China government should 000; x2 is the unitary value of general government
improve their insurance system in order that the poor expenditure on health (% of total government
can get health care for free. Therefore, the HALE of
expenditure); x3 is the unitary value of total
China will be higher, and in future maybe China could
get a better quality points in our model. expenditure on health (% of gross domestic product).
In contract, all data of the United States is better Thus, by measuring the value and analyzing the
than that of China, showing that health care system in coefficients of each metric, we could get the value of
US is undoubtedly better in this comparison with HALE, which is regarded as the dominant indicator of
China. This is due to sufficient medical resource and future health care system quality.
longer HALE. However, we should not ignore the high
percentage of private expenditure of the United States 4.2 Test of the Predictive Model
as well. The same as test of the system quality model, as a
first check of the equation, we analysis the outcome of
4. Predictive Model on Health Care System Matlab 6.5:
Change
beta =
0.7981
4.1 Construction of Predictive Multiple 0.1687
Regression Model 0.0020
Consider the four metrics of multiple regression -0.0361
model. HALE stands for the average life expectancy of rmse =
the whole nation, which could not be changed directly 0.0971
by government. However, the other three metrics could
be affected by the change of new healthy policy and where beta is the coefficients of metrics, analyzing
control, for example, total expenditure on health as % the beta could allow us to have a general idea about the
of gross domestic product could be changed if the rightness of our model. Firstly, for the coefficient of
government increase the funds of health care system private expenditure on health as % of total expenditure
and enlarge the percentage of health care system on health, which is a negative number, shows that the
spending of GDP; private expenditure on health as % more private pays for health care fee, the worse the
of total expenditure on health could be ameliorated if system is. This accords with our conclusion in system
health insurance system is developed and more people quality model very well. Beta of total expenditure on
can enjoy social security; system coverage ratio could health as % of gross domestic product and system
be increased by increasing the number of physicians coverage ratio is positive, which also fits our former
and nurses and ameliorating the distribution of urban conclusion well. The rmse of this model, 0.0971, so
and village medical source. close to zero, shows that the significance of regression
Since HALE is the dominant factor of determining equation is outstanding.
the health care system quality, the other three metrics
611
As a second test of the equation, we use the equation ●When we are choosing the metrics, responsiveness
to simulate the ranking of countries’ HALE [1] (Table level and distribution are only found in data of the year
6) 2000 and it is measured by a number of surveys and
statistics which is hard to get, so we exclude
34 countries
responsiveness as a viable metric. But the equation we
obtain from the refined model shows obviously that the
Country actual model Country actual model Country actual model Country actual model
sensitivity of responsiveness is only a little lower than
France 3 5 Malaysia 12 12 Bahamas 13 19 China 10 28 that of Performance on health level (HALE). So,
Spain
Portugal
2
6
6
10
Venezuela 9
Senegal 30
26
32
Saint K&N 16
Cook Islands 15
14
15
Uganda
Tajikistan
32
26
33
23
ignoring responsiveness will surely bring some error to
United Kingdom 4
Sweden 1 3
1 Kazakhstan 23
Belize 19
9
25
India 27
Uzbekistan 20
34
8
Madagascar 29
Cameroon 33
27
31
our model.
Morocco 19 25 Saint V&G 17 21 Micronesia 22 13 Niger 34 29
Denmark 5 4 Ukraine 20 8 Guyana 24 17 South Africa 31 22
Cuba 7 2 Mauritius 14 20 Sao T&P 25 18 6. References
Qatar 8 11 Macedonia 12 12 Gabon 28 16
5.1 Strengths
● The Multiple regression model we used is linear,
so it is easy to carry out.
● The metrics we choose, including HALE, number
of physicians and nurses per 1 000 people, total
expenditure on health as percentage of gross domestic
product and private expenditure on health as
percentage of total expenditure on health, obviously
make the difficulty in statistics decline, compared with
responsiveness and coverage ratio.
● The result of the model is precise in practice
using, is able to be used in comparing performances of
health care system in other countries which have
obvious differences in the system quality.
5.2 Weaknesses
●Ranking of the World Health Systems is
established by WHO in 2000, while the coefficient of
equation is determined by World Health Statistics
2005. Thus to some degree the accuracy of model is
affected by this data flaw.
612
2008 International Conference on Intelligent Computation Technology and Automation
614
d ( M 3 C p - 3 t b -3 ) (3) Put the algorithm program to STAR-90 library;
= Q i coal -3 + Q i 2-3 − Q o 3-c − Q o 3− 2 − Q o ww−3 this step can be done with C++ build.
dt
(4) Integrate the new algorithm library into model
driven program of STAR-90.
M 3 ,Cp-3 is the material mass and specific heat in (5) Define graphic element of the algorithm. After
dilute phase zone, t b-3 is the bed temperature of finishing step (1)-(4), the STAR-90 support system
will assign a default graphic element to new algorithm.
materials in dilute phase zone. Figure 4. shows the definition process of graphic
The above model is only energy balance part of element of combustion chamber.
CFBB model. To establish whole model of CFBB,
many models of other parts should be setup.
615
inputs. The simulation results are shown in Figure 6- dilute-phase zone at the top of furnace is
Figure 9. opposite. Generally, the temperature at furnace outlet
increases with the coal flow. This kind of dynamic
characteristics can be explained as follow: at the
beginning, with the increasing of coal flow and total air
flow, the temperature in dense phase zone will
decrease, after the new coal is heated to the kindling
point, it begins to burn and release heat, the
temperature of furnace increases again and reaches a
new balance.
Fig.6 Coal feed 10% step Fig.7 Air flow 10% step
Fig.10 PA flow 10% step Fig.11 SA flow 15% step
The bed temperature responds in dense-phase zone
The bed temperature responds in dense-phase zone
and dilute-phase zone are shown in Figure 8 – Figure
and dilute-phase zone are shown in Figure 12 - Figure
9.
13.
In Figure 8., the bed temperature of dense phase
When PA flow decrease, the heat carried away by
zone falls down at first, it rises to a new balance
gas and particles will decrease, the bed temperature
gradually after reaches a low-point, the temperature of
616
of dense phase zone will increase at beginning. The can be used to train operator of CFBB power plants or
decrease of PA flow will deteriorate fluidizing and study dynamic process of CFBB.
burning, the temperature will decrease gradually and
reach to a new balance, it is shown as Figure 12. The 6. Acknowledgements
temperature of dilute phase zone will change on the
contrary. This paper is supported by The High-Tech Research
and Development Program of China (The 863
Program):2007AA041106.
7. References
[1] W. Nowak, “Clean Coal Fluidized Bed Technology in
Poland”, Journal, Applied Energy, 2003, pp. 405–413.
Fig.12 Temp. of dense zone Fig.13 Temp. of dilute zone
[2] Scott L., Darling and Sean Li. Foster Wheeler,
“experience with clean coal technology in China”,
WWW.FWC.COM WEB Publication
5. Conclusion
[3] K. Sivakumar, M.L. Temi, and K.A. Pradeep,
According to structure and characteristics of “Mathematical Modeling of Fluidized Bed Combustion 3:
1025t/h CFBB, a set of simulation algorithms library is Simultaneous Combustion of Char and Combustive Gases”,
setup on a professional modeling and simulation Journal, Fuel, 1999, pp.403-417.
support system STAR-90. The whole combustion
chamber model is established in STAR-90 software [4] G. Steve, “Integration of the Benson Vertical Out
environment using above algorithms library and technology and the compact CFB boiler”, PowerGen
simulation research is done to verify the performance International, Orlando, Florida, November 2000.
of the simulation model.
[5] J. Stephen, Goidich, H. Timo, and K. Kari, “CFB Boiler
It is shown by Simulation results that the
Design and Operation Using the Intrex Heat Exchanger”, 6th
performance of CFBB model established in this paper International Conference on Circulating Fluidized Beds,
is close to actual reference power unit. The errors of Würzburg, Germany, August 22-27, 1999.
key parameter is smaller than 1%;the errors of main
parameter is smaller than 2%;the errors of common [6] C. Yang, Z.W. He, and M.D. Xin, “Dynamic Modeling
parameter is smaller than 3%. That means the for Simulation of 410t/h CFB Boiler”, Proceedings of 17th
combustion chamber simulating model can reflect the ICFBC, Jacksonville, Florida, May 18-21, 2003.
thermal and dynamic characteristics of actual CFBB. It
617
2008 International Conference on Intelligent Computation Technology and Automation
Abstract
2. Modeling and Simulation of Aircraft
In research of aircraft movement, the general movement
method for modeling and simulation is
Matlab/simuink, not Matlab/S-function. But in complex
kinematics system, Matlab/S-function is of great use. 2.1 preparation Modeling preparation
This paper mainly introduces how to use S-Function to To simplify the equations of motion derived, make
model and simulate kinematics equation, and analyzes the following basic assumption(Ref.[3]):
the meaning and function of various modules. The
﹙1﹚Take aircraft as a rigid object, which is to say
figureures of three angular velocities and location of
that any two points in the aircraft are independent.
aircraft in earth-fixed coordination are obtained
through simulating. The results indicate that this ﹙2﹚Ignore the ground curvature, regard the Earth
method is accurate and effective, and make the model as a plane.
contact interface more succinct. ﹙3﹚Ignore fuel consumption.
﹙4﹚Mass is evenly distributed in X B OZ B -plane,
1. Introduction
so inertia moment of I xy I yz is close to 0.
Modeling and simulation technology has been Under the above assumptions, there are six degrees
widely used in the research of aircraft, such as of freedom in aircraft movement (rotation and
programme appraisal, design, analysis, operation and transformation in three dimensional spaces). Vehicle
so on. Simulation model is taken the physical dynamic characteristics can be described through
conception, the change rule, the test result and the position, velocity and angular velocity.
experience summary as basis, and then is established a ⎛
T
⎞
theoretical model which we need with mathematical Position vector PE = ⎜ xE ,yE ,zE ⎟ is a description
⎝ ⎠
expression and experimental data. Thereby, simulation form in fix-earth coordinate.
model is original from system theoretical model.
Velocity vector V = ( u,v,w ) ,
T
Establishing simulation model should accord to the
following process(Ref.[1]). First, divide the overall Where u is vertical velocity, v is horizontal velocity,
system into a series of relatively independent objects w is normal velocity.
and transform them into respective mathematical
model. Then build simulation model libraries. Finally (
Angular velocity vector ω = p,q,r T , )
use the simulation module libraries to constitute the where p , q and r is roll angular velocity, pitch
control system simulation model of flight vehicle. angular velocity and yaw angular velocity respectively.
In practical application, it usually uses
MATLAB/Simulink to carry on the modeling and 2.2 Quaternion expressions of kinematics
simulation to the flight vehicle system(Ref.[2]). This equations
paper will focus on analysis of how to use the Simulink
/S-Function to do it. The aircraft can also be used Euler model. But when
the pitch angular becomes 90 degree, some differential
equations will have a singular, while quaternion can
avoid it(Ref.[4]). Therefore, it adapts to all flight
( )
X +F Using Simulink to model aircraft is shown in
u = rv − qw + + 2 q1q3 − q0 q2 q Figure-1.The module of Kinematics equations has
m
three inputs and one output, where one of the inputs is
v = pw − ru +
X
m
(
+ 2 q2 q3 + q0 q1 q ) a feedback input(Ref.[7]). motion.c programmed by S-
Function is the main module to deal with the
w = qu − pv +
Z
m (
+ q02 − q12 − q22 + q32 q ) movement.
( ) (
p = c1r + c2 ⋅ p q + c3 L + c4 N + H E ⋅q )
( ) (
q = c5 ⋅ p⋅r − c6 p 2 − r 2 + c7 M + FT ⋅ zT − H E ⋅r )
( ) (
r = c8 p − c2 ⋅r q + c4 ⋅ I + c9 N + H E ⋅q )
⎡ 2 2 2 2
⎡ x ⎤ ⎢ qo +q1 -q2 -q3 ( ) 2( q1q3 +q0 q2 ) ⎤⎥ ⎡ u ⎤
2 q1q2 -q0 q3
⎢ ⎥ ⎢E ⎥ Figure 1: Kinematics equations module
(
⎢ y E ⎥=± ⎢ 2 q1q2 +q0 q3
⎢ ⎥ ⎢
) 2( q2 q3 -q0 q1 ) ⎥ ⎢⎢ v ⎥⎥
qo2 -q12 +q22 -q32
⎥ ⎢ w⎥ The programme contains two macro definitions:
⎣⎢
(
⎢⎣ zE ⎥⎦ ⎢ 2 q q -q q
1 3 0 2 ) 2( q2 q3 +q0 q1 ) qo2 -q12 -q22 +q32 ⎥⎦⎥ ⎣ ⎦ #define S_FUNCTION_NAME motion
#define S_FUNCTION_LEVEL 2
Where
#include "simstruc.h"
⎡ ϕ θ ψ ϕ θ ψ⎤ /* ISA atmospheric model, there is no detailed*/
⎢ cos 2 cos 2 cos 2 + sin 2 sin 2 sin 2 ⎥
⎡ q0 ⎤ ⎢ ⎥ #include "aerodata/ISAatmos.c"
⎢ ⎥ ⎢ sin ϕ cos θ cosψ − cos ϕ sin θ sinψ ⎥ /*engine model, there is no detailed */
⎢ 1⎥ ⎢ 2
q 2 2 2 2 2⎥
⎢ ⎥ =± ⎢ ⎥ #include "aerodata/engine_model.c"
ϕ θ ψ
⎢ 2 ⎥ ⎢ cos sin cos + sin cos sin ⎥
q ϕ θ ψ #define mass 9295.44
⎢ ⎥ ⎢ 2 2 2 2 2 2⎥
⎣⎢ q3 ⎦⎥ ⎢ ϕ ⎥ The first definition defines S-function name and the
θ ψ ϕ
⎢ cos cos sin − sin sin cos ⎥ θ ψ second one instructs this S-function is the Level-2
⎣⎢ 2 2 2 2 2 2 ⎦⎥ format. The first document contains "simstruc.h",
where the SimStruct data structure and MATLAB
X is axial force component(N) application program interface (API) function are
Y is lateral force component(N) defined.
SimStruct is used to maintain data structure of
Z is normal force component(N).
Simulink S-function information. There is macro
2
H E is engine angular momentum ( kg.m /s). definitions employed to set for MEX and acquire
F is thrust motivation (N) SimStruct value in "simstruc.h".
Define the variables in form of array:
2.3 Use the S-Function Modeling …..
In the actual modeling process, complex models are #define p_body x [2]
encounted frequently, which is very complicated or ……
impossible to create directly by Simulink. But S- #define x_earth x [6]
function, the acronym for system-Function, is able to ……
resolve this problem satisfactorily. S-Function can be The static void mdlInitializeSizes (SimStruct *S)
described by MATLAB, C language or C++ language. function is used to inquire input and output ports, port
All can be directly transferred through Simulink. S- capacity and objects (such as number of state)
function enhances and expands the capacity of /* Mathematical formula contains 11 state variables*/
Simulink, and Real Time Workshop can be used for ……
real-time simulation(Ref.[5]). SsSetNumContStates(S, 11);
S-function has fixed compilation form and default ssSetOutputPortWidth(S, 0, 11);
pattern in Matlab. It uses a non-graphic way to SsSetNumInputPorts(S, 3);
describe a system. Its interior uses text-input method to ssSetNumOutputPorts(S, 1);
619
SsSetNumRWork(S, 23); So it must get a mux module or a demux to make some
…… single input to synthesize a composite input or to make
Initialize state vector in static void mdlStart a composite output to decompose into some single
(SimStruct * S) function. ones.
/* Initialize the state vector */
for (i = 0; i < ssGetNumContStates(S); i++) 3. Conclusion
{X[i] = mxGetPr (ssGetSFcnParam(S, 0)) [i] ;}
…… S-Function, providing a powerful tool for Simulink
In static void mdlDerivatives(SimStruct *S) function module libraries, uses a specific syntax to make
the first thing is to define the state variables as double. functions and Simulink solution interact with each
Then edit all system formula and equation in this other. In face of complex models, S-function is widely
function. applied, and can be effective in reducing errors in the
Finally, debug programme, and use it to simulate modeling. Meanwhile it can make model interface
the movement of aircraft(Ref.[8]). Assumption aircraft more concise.
altitude is 16,000 meters; flight speed is 500 m/s. The
ω = ( p,q,r ) is shown in
T
Angular velocity vector Acknowledgements
Figure 2,and the location of Aircraft in earth-fixed
coordination is shown in Figure 3. This work is partially supported by Fund of
Beforehand Research of National Defence, Grant
#9140A09020507DZ0301in China.
References
[1] Tank,M.,and speyer,J,T., “Target Tracking Problems
Subject to Kinematic Constraints”,IEEE,Transactions on
Automatic Contol, Vol.35,No.3.pp324-326
[2] Redelinghuys, “A Flight Simulation Algorithm for a
Parafoil Suspending an Air vehicle”,AIAA,Journal of
Guidance ,Control and Dynamics,Vol.30, No.3. 2006.
pp 719-803
[3] Lars Sonneveldt. “Nonlinear F-16 Model Description.
Control and Simulation”. Division,Delft University of
Technology.2006
[4] Quon, Leighton .“Modeling and simulation needs for
Figure 2 p、q、r Angular velocity next generation air transportation system research”. AIAA
Modeling and Simulation Technologies Conference, 2006,
pp 1-8
[5] Huang Yong’an. MATLAB7.0/Simulink6.0 Modeling and
Simulation Application Development and senior
engineering.Tsinghua University Press,2005
[6] Xia Fei, Huang, Jin-Quan; Zhou, Wen-Xiang. “Modeling
of and simulation research on turbofan engine based on
MATLAB/SIMULINK”. Hangkong Dongli
Xuebao/Journal of Aerospace Power, v 22, n 12,
December, 2007, pp 2134-2138
[7] Christhilf, David M, Bacon, Barton J. “Simulink-based
Simulation Architecture for Evaluating Controls for
Aerospace Vehicles (SAREC-ASV) ”. AIAA Modeling
and Simulation Technologies Conference, 2006, pp 1032-
1045
[8] Yuwen Li and Meyer Nahon, “Modeling and Simulation
of Airship Dynamics”, AIAA, Journal of Guidance,
Control and Dynamics, Vol.30, No.6. 2007,pp1691-1700
Figure 3 Location of Aircraft in earth-fixed
coordination
Some attention: S-function may ignore ports, when
there is multi-variable input or multi-variable output.
620
2008 International Conference on Intelligent Computation Technology and Automation
622
1 1 1 1 3.2. Self-adaptive fuzzy PID control system
V = km1(θ1 −θ10)2 + km2(θ2 −θ20)2 + ke3(x −θ6r)2 + ke4(x −θ7r)2
2 2 2 2
The conventional PID controller is described in (8).
1 1 1 1
+ k3(θ4 −θ6)2 + k4(θ5 −θ7)2 + ke1(θ4r −x1)2 + ke2(θ5r −x2)2 de(t )
2 2 2 2 u (t ) = K P e(t ) + K I ∫ e(t )dt + K D (8)
dt
1 1
+ ke5(x − x1′)2 + ke6(x − x2′)2 (2) Where, KP, KI, KD are the proportional, integral and
2 2 derivative gains respectively, u(t)is the output of
1 1 1 1 controller; e(t)is the error signal.
D= cm1(θ1 −θ10)2 + cm(θ2 −θ20)2 + ce3(x −θ6r)2 + ce4(x −θ7r)2 The fuzzy controller has four main components: (1)
2 2 2 2
The rule-base holds the knowledge, in the form of a set
1 1 1 1
+ c3(θ4 −θ6)2 + c4(θ5 −θ7 )2 + ce1(x−θ4r)2 + ce2(x−θ5r)2 of rules, of how to control the system best. (2) The
2 2 2 2 inference mechanism evaluates which control rules are
1 1 relevant at the current time and then decides what the
+ ce5(x −x1′)2 + ce6(x − x2′)2 (3) input to the plant should be. (3) The fuzzification
2 2 interface simply modifies the inputs so that they can be
Where, the meaning of the main parameters is defined interpreted and compared to rules in the rule-base. And
concretely. m denotes mass of object; J denotes inertia; (4) the defuzzification interface converts the
k and c denote the spring and damping coefficient; x conclusion reached by the inference mechanism into
denotes displacement; θ denotes angle; the differential the inputs to the plant.
coefficient of x denotes the velocity; the differential Fuzzy PID control, combining the advantages of
coefficient of θ denotes the angular velocity; r denotes PID control and fuzzy logic, demonstrates the
the radius of pulley. The lower tags represent the parts significant performance improvement over the standard
according to the Fig.3. Take the parameter km1 for PID control. The adaptive fuzzy PID control structure
example, k denotes the spring as mentioned above, m1 is shown in Fig.3.
is equivalent to the rope m1 between the motor 1 and
the guide-rail 1, so the parameter km1 denotes the spring
KP KI KD
coefficient between the motor 1 and the guide-rail 1. r+ e y
θ10, θ20 are turning angle of the motor shaft ec
− de / dt
respectively; x1’, x2’ are the displacement of slider in
theory, when the motor turns over the angle θ1, θ2 Figure 3. Structure schematic of the lifter system
respectively. This paper takes the error and the change in error as
Based on the above equations and the second class fuzzy controller’s inputs (e represents error and ec
Lagrange (4), the system dynamics are modeled by the represents the rate of change in error), while the output
nonlinear differential (5). variables are the PID gains as KP, KI, KD. The universe
d ⎛ ∂T ⎞ ∂T ∂V ∂D of discourse of e and ec will be divided into [-3, -2…
⎜ ⎟− + + =Q (4)
dt ⎝ ∂xi ⎠ ∂xi ∂xi ∂xi 2, 3]. Using the fuzzy sets of the input variables and
output variables as defined above, the fuzzy interface
[ M ] { X } + [C ] { X } + [ K ] { X } = {Q} (5) system adopts the Mamdani implication to infer and
Where, [M]denotes mass matrix, and it includes mass the Centroid method is used as Defuzzification. The
of lifter, counterweights and inertia of motors and tables based on the relative human experience involve
pulley block. X denotes state matrix, the extended 49 rules for regulating the three parameters [4].
vector is X=[x x1 x2 θ1 θ2 θ4 θ5 θ6 θ7] T. [K], [C]
denotes spring matrix and damping matrix, which is 3.3. Simulation based on the fuzzy self-adaptive
time-varying and consistent. Q denotes generalized controller
inspire force, which is relative to the torque of motors.
The lifter’s velocity is used as the output variable in To demonstrate the effectiveness of the designed
order to estate the dynamic traits of the lifter in-depth controller, the simulations are done in the Matlab
and suppress the vibration of the lifter. The state-space statements. The control objective is to force the lifter
and output equation are obtained. velocity to follow a given reference trajectory.
According to the above dynamic model and real
X = AX + BU (6) condition applied in Zhang Jiagang Hospital, the actual
Y = CX (7) velocity is about 1.0 m/s. The initial parameters of PID
control are KP=1000, KI=0, KD=60. The simulation
curves are shown in Fig.4, Fig.5, Fig.6.
623
Fig.4 shows the output and error of lifter system 4.1. Problem Description
with routine PID controller and fuzzy adaptive PID
controller respectively. The fuzzy adaptive PID method The scheduling optimization must take the
has faster response rate and better tracking following factors into account such as the particularity
performance and it basically realizes the no error of medicines storage, the irregularity of packages size,
control of system, while the routine PID control has the the diversity of canals and the parallel operations in
defects of lower response rate, longer delay time and dispensing and filling.
regulating time and larger overshoot. To ensure the smooth input and output of packages,
According to the Fig.5 and Fig.6, when there is it is significant to confine the distance between the
disturbance because of the external world, the fuzzy packages and the canals in a certain extent, or it will
adaptive PID controller can suppress the disturbance cause a series of problems, such as less sliding force,
quickly and the lifter fluctuation is smaller and overlaps and jam of packages and other problems
restoring time is relatively short. So the fuzzy adaptive affecting the normal operation of implementation. It is
PID controller has robustness against the parameters of importance to enhance the efficiency of inputting
vibrations. and outputting drugs, cutting costs, and improving
space utilization to optimize the canal specifications,
the layout of canals and the layout of drugs as well.
The problem is described as the following:
p q
M inE = ∑∑I
i = 1 R =1
i iR (9)
n
MinS = ∑ W j (10)
j =1
m
MinT = ∑ H i (11)
i =1
Figure 4. Response results for routine PID controller
l ki
and fuzzy adaptive PID controller
MinM = ∑∑ Fij Sij (12)
i =1 j =1
624
4.2. Simulation based on the genetic algorithm
625
2008 International Conference on Intelligent Computation Technology and Automation
a
0 λ ij
ij
ij
a a ≤μ (9)
a∈ A a∈ A
(1)
oi = ∑ d ij (o ) ≤ o max
, ∀i ∈ I ,
s.t. ∑d
j∈J
ij = oi , ∀i ∈ I (2)
j∈J
i (10)
d j = ∑ d ij (o ) ≤ d max , ∀j ∈ J ,
∑f
r∈Rij
r
ij = d ij , ∀i ∈ I , j ∈ J , (3)
i∈I
j (11)
oi ≥ 0, ∀i ∈ I , (12)
Lower:
627
min z ( x, d ) = ∑ ∫ t a (ω )dω
xa
1.1 Define the crossover probability pc , mutation
0
a probability pm , individual amount P in each
1
+
λ
∑ (d
ij
ij ln d ij − d ij ) − ∑ M j d ij (13)
ij
generation and the maximum evolution generation
number N in genetic algorithm.
s.t. : 1.2 Define internal recycle times of simulated
∑d
annealing algorithm M , initial value of disturbance
ij = oi , ∀i ∈ I (14)
step size κ , constant η and initial temperature
j∈J
T = T0 .
∑f
r ∈Rij
r
ij = d ij , ∀i ∈ I , j ∈ J , (15)
value T0 , set
1.3 According to objective function in upper-level
problem, the rational fitness function form has been
xa = ∑∑∑ fijrδijar , ∀a ∈ A, (16) ascertained. Encoding the decision variable in upper-
i∈I i∈J r∈Rij
level problem oi , produce initial population
fijr ≥ 0, ∀i ∈ I , j ∈ J , r ∈ Rij (17)
randomly o(1) = (...., oi (1),....) , i=1,2,…,P, set the
d ij ≥ 0, ∀i ∈ I , j ∈ J , (18) evolution generation number n = 1 .
In upper, (8) is road network capacity under the Step2: Producing middle population X (n ) by
given network service level; (9) is constraint of road applying simulated annealing algorithm under
network service level; (10) is the maximum trip
temperature level T , then calculating the fitness of
production constraint on origin, and (11) is the
maximum trip attraction constraint on destination; (12) each individual xi (n ) .
is nonnegative constraints of trip production. Lower is 2.1 Set circulation turning count m = 1 , and
the combined traffic distribution-assignment model.
individual suffix i = 1 .
2.2 Utilizing disturbing function to produce new
5 Algorithm
individual xi (n ) ,and put it into lower -level problem
The solution methods of bi-level programming for calculating, and then we can get lower optimum
model in traffic are always very complicated. On one solution and put it into upper model, at last calculating
hand, the bi-level programming problem is a NP-hard the fitness of the new individual.
problem whether it’s simple or not, and have no 2.3 Accept the new individual xi (n ) by
polynomial solution algorithm; on the other hand, a
Metropolis probability formulae.
substantial cause is that the lower problem in bi-level
planning model are always convex planning, which 2.4 If i = P , turn to 2.5; otherwise, set i = i + 1
means there exists local optimal solution, and it is hard ,turn to 2.2.
to find global optimal solution(Yang Hai,1995). A kind 2.5 If m ≤ M , set m = m + 1 , the new
of hybrid optimization algorithm combined genetic individual subscript is i = 1 ,turn to 2.2;otherwise,
we can get middle population X (n ) , turn to Step3.
algorithm and simulate annealing has been used in this
paper to solve road network capacity problem, GASA
combined genetic algorithm and simulated annealing Step3: Random select constructive crossover
algorithm, learn from other’s strong points to offset its probability value for interlace operation( p c ).
weakness. It has higher efficiency and credibility in Step4: Random select constructive mutation
solving bi-level programming problems. The basic idea
probability value for mutation operation( p m ), then
for solving bi-level programming model by GASA is:
encoding the decision variable in upper problem, then get new population O (n + 1) , and calculate fitness of
reproduction, crossover, mutation and simulated each individual.
annealing, by solve fitness of each chain in lower
Step5: If n = N ,the sample make use of the
problem, we can finally get optimum solution. The
highest grade of fit to be a near-optimization solution
concrete solution algorithm steps are as follows(Liu
Wei-ming etc.2003): for this problem; otherwise, n = n +1 ,
κ = κ η 0.11M turn to step2.
5.1 GASA for solving bi-level program In order to solve the road network service level
limit in the upper-level problem, the fitness function
Step1: Initialization:
628
should incorporate the constraint violations by means
of penalty method. Grade of fit function with penalty qijk +1 exp[−λ (cijk − M j )]
factor ρ has been formulated as follows: − ≤ ε (∀r , s ) ,
F ( x ) = f ( x ) − ρ [max(0, δ − μ )]
Oi ∑ exp[−λ (c
m
n
ij − M m )]
m
Figure 1 Test Network
2.3 Assign d ijk to the route with the shortest
Table 1 link free flow travel time, link capacity, link length
j
travel time path from origin i to destination , and
then yield a link-flow pattern {y a }.
link free flow
k capacity/(pcu·h-1) length/km
No. travel time/min
Step3: Determine the step size. Find a k that 1 2 80 1
minimizes the function.
(
xak + ak y ak − vak ) 2 3 60 2
min ∑ ∫ t a ( x )dx
0 ≤ a k ≤1
a∈ A
0 3 8 100 4
∑∑ [q ( )]
1 4 4 130 2
+ k
+ a k d ijk − q ijk
θ
ij
i∈I j∈J 5 7 90 3
[
× ln (q ) + a k (d − q ) − 1 − λM j
k
ij
k
ij
k
ij ] 6 2 60 2
Step4: Update the link flows and O-D, set:
x ak +1 = x ak + a k ( y ak − x ak ), ∀a ∈ A,
7 1 60 1
; Set the maximum trip production o max
of i is 500,
(
qijk +1 = qijk + a k d ijk − qijk , ∀i ∈ I , j ∈ J , ) and the maximum trip attraction d max
i
of j is 500,
j
Step5: Test the convergence,
impedance parameter λ is 1, M 5 = M 6 = 0 , calculate
the capacity of road network under different threshold
of network service level, and show it in table 2.
629
Table 2 the capacity of road network model and algorithm are demonstrated by a simple
example. The computational process has proclaimed
project network
μ O-D pairs O-D flow
capacity
that the modeling algorithm can obtain road network
capacity estimated value under different network
1-5 42.92 service level by minor cost.
630
2008 International Conference on Intelligent Computation Technology and Automation
τk = τk = τk
a b
.Therefore, Fig.2 is equivalently Let a1=K p1 +K i 1h + K d 1 /h ,
transformed into Fig.3 because of the linearity of PID2. b1 = −( K p1 + 2 K d 1 / h) , c1 = K d 1 / h (4)
632
(3) can be rewritten as Integrating (13) over one sampling period, we obtain
u1 ( k ) = u1 ( k − 1) − a1C p1 x p1 ( k ) the discrete-time form of Plant1
(5) ⎧ xp1 (k + 1) = Φ p1 xp1 (k) + Γ p1 yp2 (k)
− b1 y p1 ( k − 1) − c1 y p1 ( k − 2) ⎨ (14)
The input of PID2 is the error ⎩ yp1 (k) = Cp1 xp1 (k)
e2 ( k ) = u1 ( k ) − y p 2 ( k )
∫
h
(6) Where Φ p1 = exp(A p1h) , Γ p1 = exp(A p1s)dsBp1 .
0
The transfer function of PID2 is presented by
Defining the augmented state vector as
Gc 2 ( s ) = K p 2 (1 + 1 / Ti 2 s + Td 2 s )
(7) Ζ(k) = [ xp1T (k), xp2 T (k), u1T (k − 1), u1T (k − 2),
= K p 2 + Ki 2 / s + Kd 2 s
u2 T (k − 1), yp1T (k − 1), yp1T (k − 2), yp2 T (k − 1), ,
Similarly, we obtain
u2 ( k ) = u2 ( k − 1) + ( K p 2 + K i 2 h + K d 2 / h)e2 ( k ) yp2 T (k − 2)]T
(8)
− ( K p 2 + 2 K d 2 / h)e2 ( k − 1) + K d 2 / he2 ( k − 2) and we obtain the augmented closed-loop system
Ζ(k + 1) = Ψ k Ζ(k) (15)
Here a 2 = K p 2 + K i 2 h + K d 2 / h ,
⎡ Φp1 Γp1Cp2 0 0 0 0 0 0 0 ⎤
b 2 = −( K p 2 + 2 K d 2 / h) , c 2 = K d 2 / h . (9) ⎢−Γ a2a1C
0
Φp2 Γp2 (a2+b2) Γp2c2 Γp2 −Γp2a2b1 −Γp2a2c1 −Γp2b2 −Γp2c2⎥
0 0 1 0 0 0 0
⎢ 0 ⎥
⎢ 0 1 0 0 0 0 0 0
⎥
− a 2b1 y p1 ( k − 1) − a 2c1 y p1 ( k − 2) − a 2C p 2 x p 2 ( k ) Ψk =⎢ −a2a1C 0 a2+b2 c2 1 −a2b1 −a2c1 −b2 −c2 ⎥
⎢ ⎥
p1
+ b 2u1 ( k − 1) − b 2 y p 2 ( k − 1) + c 2u1 ( k − 2) − c 2 y p 2 ( k − 2) ⎢ C p1
0 0 0 0 0 0 0 0
⎥
(10) ⎢ 0 0 0 0 0 1 0 0 0 ⎥
⎢ ⎥
The input to Plant2 is u2 (t) , which is the delayed ⎢ 0 Cp2 0 0 0 0 0 0 0 ⎥
⎨
p2 p2
(12) u 2 (k) = [u 12 (k), u 22 (k), " , u 2m (k)]T . The network
⎪⎩ yp2 (k) = C p2 xp2 (k) can be modeled as a switch closing at a certain rate.
h-τ k
When the switch is at S m , u 2 (k) = u 2 (k-1) ,
1 1
Φ p2 = exp(A p2 h) , Γ 0p2 = ∫ exp(A p2 s)dsBp2 ,
0
u 22 (k) = u 22 (k-1) , " , u 2m (k) = u 2m (k) .
Γ =∫
h
1
p2
exp(A p2 s)dsBp2 .
h-τ k
633
⎡ Φp1 Γp1Cp2 0
⎢-Γ0 a2a1C Φ −Γ0 a2C Γ0 (a2+b2)
0 0 0 0 0 0 0⎤
⎧ x p2 (k + 1) = Φ p2 x p2 (k) + Γ p2 u 2 (k − 1)
Γ0p2c2 (Γ0p2 +Γ1p2) 0 -Γ0p2a2c1 -Γ0p2a2c1 -Γ0p2b2 -Γ0p2c2⎥ ⎨ (16)
⎢ p2 p1 p2 p2 p2 p2
⎥
⎢ −a1Cp1 0 1 0 0 0 −b1 −c1 0 0⎥ ⎩ y p2 (k) = Cp2 x p2 (k)
⎢ ⎥
∫
⎢ 0 0 1 0 0 0 0 0 0⎥ 0 h
⎥
PID2 and Plant2. The network can be modeled as a ⎢ 0 0 0 0 0 1 0 0 0 0
⎥
switch that closes at a certain rate. When the switch is ⎢ C 0 0 0 0 0 0 0 0 0 ⎥
⎢ ⎥
p1
However, when the switch is at S 2 , the output of the From the augmented closed-loop systems derived
switch is held at the previous value and the packet is under the above four different cases, it’s easy to follow
lost, u2 (t ) = u2 (k − 1) kh ≤ t < ( k + 1) h . that the kind of NCCS based on fieldbus as shown in
The discrete-time representation of Plant2 is Fig.3 may be time-variant since Ψ will depend on the k
634
linear time-invariant, and therefore the bound of the of Networked Control Systems”, Proceedings on
delay can be determined based on the stability criterion American Control Conference, San Diego, CA, 1999,
that all the eigenvalues of Ψ k are all in the unit circle. pp.2876-2880.
635
2008 International Conference on Intelligent Computation Technology and Automation
Abstract impact from drivers and vehicles are all taken into
consideration in this model. The driver controlling
The driver controlling model of car-following mode of car-following based on Preview Follower
based on Preview Follower Theory is advanced by Theory is advanced by analyzing the relation of
analyzing the relation of direction controlling and direction controlling and velocity controlling on the
velocity controlling on the following car and following car and regarding the whole car-following
regarding the whole car-following course as course as preview-follow to the velocity of the leading
preview-follow to the velocity of the leading car for n car for n times. The model could imitate the
times. The model could describe the car-following car-following controlling course in different operation
behaviors more truly due to the safety decision index conditions, show the differences among different
is the time headway, not the headway distance. And drivers and adapt for the change of traffic
how to establish the comprehensive evaluation object environment by setting the felicitous parameters for
function is analyzed mainly. The model could imitate each driver, so it is with portability.
the controlling course of car-following in different
operation conditions, show the differences among 2. Foudation of model’s establishing
different drivers, so it could adapt for the change of
traffic environment by setting the felicitous The drivers judge whether the running vehicle is
parameters for each driver. It is with portability. safety or not is according to whether there is enough
headway distance or not, commonly. The actual value
1. Introduction of headway distance is determined by the controlling
to acceleroqraph and brake pedal from drivers. When
The presence of car-following behavior is very the driver put an action to the acceleroqraph or the
common in daily life. The research of it could help us brake pedal, the vehicle could get a relative
catch on the characters of traffic flow and the reasons acceleration/deceleration, and then the velocity would
for rear-end accidents. A lot of models are established be changed subsequently. At the moment, the driver
by researchers from the 1940’s. These models don’t has adjusted the velocity of the vehicle. So the change
consider the different characters of different drivers, of following velocity is not only the results of the
who are active and decisive in the road system, and controlling to acceleroqraph or the brake pedal from
the assumptions of the models are too easy to reflect drivers, but also the reasons for the change of
the fact, although they have come true some expected headway distance. It is a bridge for drivers’ behavior
objects [1]. Preview following theory is advanced and the final running states of vehicles. That is to say,
by Guo Kong-hui in 1982 [2], which have been the preview on the vehicles’ trace is equal to the
applied to driver direction control. And the theory regulation of the vehicles’ velocity in fact. So the
describes a system which could preview the future Optimal Curvature Model advanced by Guo Konghui
behaviors according to the controlling information could be applied to driver car-following model. Some
inputted. Based on it, Optimal Curvature Model is researches have been studied by Gao Zhenghai and
advanced by Guo Kong-hui, which is composed in Guan Xin [3]. They have discussed how to control the
series by a preview receptor and a following receptor. velocity at a certain spot. The author thinks the whole
Suppose the drivers determine the running trace car-following course could be regarded as discrete
according to the kinematic characteristic of vehicles preview behaviors for n times, if we divide the
and correct the car-following behavior according to continuous car-following course into n segments, and
the kinetic characteristic of it. So we could think the set the velocity of the leading vehicle as the goal in
(1) The forecasting of the feasible and checking a lot of statistical datum. So the author
acceleration/deceleration would select the security time headway as
Supposed the state of the following car at t determinant index. The actual researching course
moment is as followings: the position is x(t ) , the would be shown in section 3.1. And the expression of
speed is x (t ) and the acceleration or deceleration headway time at the time of t +T p could be written as:
is x(t ) . So the state of the following car at t + T p
moment could be expressed as following: Ts (t +T p) = Dr (t +T p) / v(t +T p ) (3)
637
In which, td is the lagging time of neural response, tb Ts > (td + th + tb ) +
v
−
v L
+
(6)
is the brake lagging time which is caused by the leg’s 2xf 2xl v
diversion from the accelerator pedal to the brake
paddle and Th is the muscle responsive lagging time, Obviously, the headway time Ts relations to the
Tnx, Tdx are all the time constants, and Gax is the gain whole lagging time t d + t h + t b , the velocity of the
of acceleration/deceleration.
leading and following vehicles before and after
decelerating and the length of vehicle L. Set the
3.1The choose of the security index
velocity before decelerating is 15m/s, xl = x f and
The security time headway is chosen as L=6m. Then the Ts could be met in with the
determinant index to judge the safety of drivers and following:
vehicles in this paper although headway distance is
used into direction control by Guo Konghui. This is Ts > (0.305 + 0.467 + 0.259) +
6
= 1.431s (7)
because headway distance would increase with the 15
increase of speed according to the research results of
driving behavior, but the time headway is fixed for the Considering the actual value of headway time is
eligible drivers in the driving course. So the fixed bigger than the theoretic ones for the self-safety, the
value of headway distance could not reflect the author sets the range of security headway time is [1.5s
character of car-following behavior accurately, we , Ts (diver) + 1s ] based on the above researching
should choose the fixed security time headway as results. If the value of Ts is less than 1.5 seconds, the
determinant index. The relation of headway distance
and vehicle’s velocity obtained from a project named car-following behavior is unsafe, the corresponding
“The Research on Driving Suitability and Detection acceleration/deceleration should be abnegated. If the
Method on The Professional Driver ” is shown is value of Ts is more than Ts (diver) +1 seconds, the
Fig2. The shown samples could delegate to the whole. current driving course don’t belong to car-following
Two conclusions could be got easily from the figure. behavior, the corresponding acceleration/deceleration
Firstly, the headway distance increases with the should be abnegated, too. And if the value of Ts is
increase of velocity. Secondly, the ratio of headway
between 1.5 seconds and Ts (diver) +1 seconds, the
distance and velocity, being called time headway, is
almost fixed for each kind of drivers. That is to say, corresponding values of acceleration/deceleration
the value of time headway for each driver is stable. So should be inputted to the corresponding sets,
set the security time headway as index to judge the respectively, according to the result of expression
safety is more reasonable than headway distance. Δx(t + T p ) = x(t + T p ) − x(t ) is positive or negative. And if
the feasible acceleration/deceleration sets at t +T p
moment is empty, then we could choose the sum of
the actual acceleration/deceleration at the t moment
and the max increment as the chosen value at the
t +T p moment. And Ts (diver) is the average of
headway time for each sample, which is different to
different drivers.
Fig2 The samples of headway distance & velocity 3.2The foundation of compositive evaluation
function
If the following is come into existence, the leading
and following vehicles would not be rear-ends:
A compositive evaluation function J is established
to make optimal behavior decision. We could use it to
x 2f x l2 (5)
D r > x f (t d + t h + t b ) + − +L pick up the ideal acceleration/deceleration from all the
2 x f 2 xl feasible acceleration/deceleration. The author thinks
all the drivers would try their best to copy the running
Supposed the leading and following velocity have behavior of the leading vehicle for their self-safety. At
the same velocity before decelerating, and then we the same time, all the drivers could not change the
could get the following: values of acceleration/deceleration very frequently
due to the physio-limitation. So the discrepancy of
638
velocity D1, the driving safety D2, the driving The above formula could reflect the discrepancy
portability D3 and the driving amenity D4 are selected between the feasible acceleration/deceleration and
as compositive indexes. drivers’ ideal value. The smaller the value of J is, the
The discrepancy of velocity D1 is the d-value of better the result is. So the ideal value could be got by
velocity at the t +Tp moment and the t moment in the the following:
feasible set, which could reflect the degree of
car-following conscious: x* (t + T p ) = min J ( x(t + T p )) (13)
The driving safety D2 is the d-value of the actual The simulating data comes from ten drivers in the
headway distance and the security distance in the reference [10], which include the velocity and
feasible set, which could reflect the degree of driving acceleration/deceleration of the leading vehicle, the
safety conscious: velocity and acceleration/deceleration of the
following vehicle, the headway distance and the
D2 =(1.5xf (t) +0.5xf (t +Tp)⋅1.52 −1.5xl (t))−Ts(driver
)⋅ (xf (t) +1.5xf (t +Tp)) (9) headway time apperceived by drivers. Among all the
data, the frontal-700 is used to fix on the parameters
=(1.5−Ts)xf (t) +(1.125+1.5Ts)xf (t +Tp) −1.5xl (t))
and the rest data is used to carry on off-line testing.
To begin with, we should analyze the regularities of
The driving portability D3 is the increment of the distribution on headway distance vs. velocity, which
following velocity during the T p moment, which is shown in Fig 3. Form the figure we could see that
could reflect the limitation of variational frequency on ten-driver is divided into two classifies, in which,
the follower: NO.3 is the representation of the part A and the NO. 9
is the representation of the part B. The drivers belong
D3 = x f (t + T p ) − x f (t ); (10) to part A have the stronger car-following conscious
than part B because the trace of their distribution
curve spreads longitudinal; while the drivers belong to
The driving amenity D4 is the part B is more care about their safety because the
acceleration/deceleration of the following vehicle, trace of their distribution curve spreads transverse [7].
which could reflect the limitation of variational range: The author would introduce the simulation in the
representation of NO.3 and NO.9. And the samples
D4 = x f (t + T p ); (11) are shown in Tab1.
20
20
In which, D2 and D1 are used to estimate the final 18
drvers A
18
divers B
14 14
velocity(m/s)
12 12
physio-limitation. 10 10
6 6
4 4 distribution
0 0
the compositive function J could be expressed as: 0 5 10 15
(a)
20 25 30
headway distance(m)
0 5 10 15
(b)
20 25 30
headway distance(m)
35
Tab1 Samples
Velocity Acceleration Headway Headway
index Velocity of Acceleration Velocity of Acceleration
of leading of distance of distance of remark
NO. 2 NO.3(m/s) of NO.3(m/s2) NO.9(m/s) of NO.9(m/s2)
(m/s) leading(m/s ) NO.3(m) NO.9(m)
0 0 0 0 0 0 0 0 0
1 0.50 0.50 0 0 7.19 0 0 7.19 NO.3:
Ts(driver)=1.736s
2 1.00 0.50 0.61 0.61 8.14 0.50 0.50 8.56
3 1.76 1.03 1.32 0.71 9.45 0.50 0.63 10.36
4 2.86 1.11 2.15 0.83 11.11 0.50 0.76 12.48
NO.9:
5 3.94 1.11 3.11 0.96 12.98 0.50 0.84 13.97
Ts(driver)=2.046s
… … … … … … … … …
639
4.1Fixing on the parameters output for each work condition are shown in Fig 5.
We could get the following conclusions easily by
Considering the diversity of drivers’ analyzing the results:
characteristics, it is not possible and suitable to (1) The car-following behavior could be simulated
establish the unique behavior model. So the author satisfied in different work conditions. That is to say,
sets up the different parameters for different drivers. the model could advice the follower to complete the
Only to do like this could get the satisfied results. The acceleration course when the leader is being
weights and thresholds for each parameter need to set acceleration, which is shown in Fig 4(a); the model
up are ωi(i=1,2,3,4) and Ci(i=1,2,3,4). In which, the could advice the follower to complete the deceleration
weight is got by PCA method. And the threshold C3 course when the leader is being deceleration, which is
is C3 = max ( xf (t + T p ) − xf (t )) , which could be got by shown in Fig 4(b); the model could advice the
follower to approach to the leading vehicles in the
the arithmetic on samples; C4 is the absolute value on
max velocity and maintain the value of
sixty-five percent of the max
acceleration/deceleration almost as zero when the
acceleration/deceleration, which is constant. While
states of the leader is almost constant, which is shown
how to get the value of C1 and C2 could be introduced
in Fig 4(b) after NO.33 and Fig 4(b) after NO.35.
as follows. C1 could be got by the below formula:
19
20
C1 = max(D1 ) = max ( x f (t ) + 1.5xf (t + Tp )) − xl (t ) (13)
18
≤ max x f (t ) − xl (t ) + max 1.5xf (t + Tp ) 18 the leading vehicle
NO.9
velocity(m/s)
17
velocity(m/s)
16 the leading
In order to get the value of C2, we should do a NO.3 16
vehicle
NO.9
fitting at 3-power for the samples, first: 14
15 NO.3
12
D = p 3 x 3 + p 2 x 2 + p 1 x + p 0
(14) 10 20 30 40
14
5 10 15 20 25 30 35 40
NO. NO.
(a) (b)
In which, pi (i=0, 1, 2, 3) is the coefficient of the Fig 5 Simulating results of NO.3 and NO.9
curve.
Then C2 could be written as: (2) The diversity of drivers could be in present
felicitous in the model. We could see easily the
C2 = maxD2 = max p3 x 3 + p2 x 2 + p1 x + p0 − Ts (driver)x velocity curve of NO.3 is more approach to the actual
(15) curve than NO.9’s, so it is the changeable range of
velocity on them. While the velocity curve of NO.9 is
In order to get the value of C2, we should do the smoother than NO.3. These conclusions are consistent
followings: Firstly, complete a one-derivation to with the fact that the 3rd driver has a higher degree of
formula (15) and set the result of derivation as zero to car-following conscious and the 9th driver is more care
get the value of x . Secondly, calculate the results of about self-safety.
p3 x 3 + p2 x 2 + p1x + p0 − Ts (driver) x when the value of x (3) The changeable trend of output in the model is
is fixed on. At last, choose the one having the max consistent with the actual, so the driver car-following
absolute value as the final value of C2. The parameters model advanced by the author is feasible. The
for NO.3 and NO.9 are shown in Tab2. conclusion could be tested in Fig 5.
Of course, the other tests by the rest samples have
Tab2 Parameters in simulation the same results.
NO. parameter C1 C2 C3 C4 ω1 ω2 ω3 ω4
No.3 2.36 6.12 0.44 1.2 0.33 0.27 0.2 0.2 5. Conclusions
No.9 4.73 2.56 0.21 1.2 0.23 0.35 0.21 0.21
Driver controlling model of car-following based
4.2 Simulation testing on Preview Follower Theory is advanced by regarding
the whole car-following course as preview-follow on
Off-line testing is carried on by inputting the rest velocity of leading car for n times. The off-line testing
five-hundred data. Set the max-velocity is 20 meters shows that the changeable trend of output is consistent
per second. The results in two work conditions for with the actual, so it is feasible to apply the Preview
NO.3 and NO.9 are shown in Fig 4. And the Follower Theory to research the driver car-following
comparative results between the actual value and the behavior. And the model could imitate the
640
car-following controlling course in different operation Amsterdam: North Holland, 1993, P. 91–100.
conditions; show the differences among different
drivers. It is with portability. [7] C. Miyajima, Y. Nishiwaki, K.Takeda. Driver
Acknowledgement: this project is sponsored by Modeling Based on Driving Behavior and Its
Provincial Natural Science Foundation of Hunan Evaluation in Driver Identification. In: Processing of
(NO.08jj3120) and by the Ministry of Communication the 2007 IEEE. February, Japan, 2007, 427-437.
P.R. China. (NO. 200431982515)
(a2)
[8] Luo Jiyu, Xin Yin. Statistical analysis method and
(a1)
20
NO.3
19
forecast on economy [M]. Beijin: Publishment of
18 NO.9
Qinghua University, 1985, P. 107-124.
17
18 velocity(m/s)
velocity(m/s)
16
16 15
14
14 13
output of simulation output of simulation
actual values 12
acual values
12 11
0 10 20 30 NO. 40 0 10 20 30 40
(b1) NO.
(b2)
19 19
output of simulation output of simulation
18 actual values actual values
18
velocity(m/s)
velocity(m/s)
17 17
16
16
15
15
NO.3 NO.9
14
0 10 20 30 40 14
NO. 0 10 20 30 40
NO.
6. References
[1] Pan Lin. Establishment of the Car-following
Based on Driver’ Cognition Behavior [D]. Jiling
University. 2005, 7-19
641
2008 International Conference on Intelligent Computation Technology and Automation
LI Xiao-yan
SHI Zhong-ke
(1. Ph.D candidate, School of Mechanics, Civil Engineering and Architecture, Northwestern
Polytechnical University, Xi’an 710072, China
2. Professor, School of Automation, Northwestern Polytechnical University, Xi’an 710072,
China )
lixiaoyan309@163.com
643
0.95 0.90 0.75 0.90
3. Calculation models of TEPCC
Table 2. Adjustment factors for urban
intersections The transportation-related pollutions in urban can be
divided into air pollution, noise pollution, vibration,
express major minor collector Road erosion, insolation interference and electromagnetic
way arterial arterial road network interference and so on. Currently, TEPCC can be
0.45- calculated by the following model:
0.75 0.55-0.6 0.35-0.40 0.40-0.50
0.50
TEPCC = MIN (APC,NPC,VPC) (7)
2.2 TERCC models based on the ERC APC—transportation carrying capacity constrained by
limitation air pollution,
NPC—transportation carrying capacity constrained by
Pedestrian trip mode and bicycle trip mode consume noise pollution,
lower oil. But energy consumption of these modes is VPC—transportation carrying capacity constrained by
not equaled to zero, as producing and maintaining vibration.
process of the bicycle need to expend energy, and the
building, managing and servicing of infrastructures 3.1 APC research approach
also need to consume energy. From long term, TERCC
should be computed by ecological footprint method. The CO, NOx and HC were selected as vehicle
But in this paper, the emphasis was focused on the emission forecast factors to find out transportation-
mathematic modeling based on the oil consumption. related share-rates in urban area, for there are other
pollution sources to contribute air pollution.
ETO ET ⋅ μ
ERC = = (5) Accordingly, air pollution emission as an emission
∑∑ e
i j
ij ⋅ Li j ⋅ xi j ∑∑ e
i j
ij ⋅ Li j ⋅ xi j control limitation can be established by the field survey
and data analysis by environment protection
ETO—the maximum amount of urban transportation oil
department, public security department and
consumption in planning year (MJ),
petrochemical department.
eij—practical oil consumption per kilometer of vehicle
The model of pollution emission amount control
type j of trip mode i in planning year (MJ/km),
is shown as following:
Lij—average mileage per kilometer of vehicle type j of
EQP × S P
trip mode i in one planning year (km), TQ p = ×ηP (8)
xij—the percentage of vehicle type j amount in trip CP
mode I in one planning year (%), TQP—amount of pollutant P exhausted by motored
μ—the percentage of oil consumption of urban vehicle in the planning year (t/year),
transportation in urban oil energy (%). EQP—total amount of pollutant P exhausted by
We can get the value of ET according the planning of motored vehicle in the basic year (t),
the society and economy development, and the city SP —standard value of pollutant P exhausted by
function feature. Along with the development from the motored vehicle according to integrated emission
common city to the eco-city, the amount of oil energy standard of air pollutants (GB 16297-1996) in planning
consumption in urban transportation system will year (mg/m3),
decrease, thus the value of will reduce gradually. CP—monitoring value of pollutant P in urban area in
Otherwise, the amount of automobile will increase the basic year (mg/m3),
remarkably. As a result, it is the only way to decrease ηP—share rate of pollutant P exhausted by motored
the value of μ by reducing oil energy consumption vehicle in the planning year(%).
coefficient per vehicle. This model is based on two hypotheses: the
At present, we can forecast the value of ETO by the amount of pollutant P is in the direct ratio to pollutant
investigation and analysis of the oil energy density value of environmental background; the
consumption in urban transportation system. If the trip share rates of stationary sources and mobile sources are
modes structure doesn’t have dramatic change and the all reduced with the same speed to the control
oil consumption per vehicle doesn’t increase objectives of urban environment.
remarkably, the present μ can replace the future μ. It is
feasible to do so in the strategic planning. 3.2 Calculating model of APC limited by air
pollution
2.3 Integrated model of TERCC
TQ p = ∑∑ (APC P × Lij × Ef ijp × xi j ) (9)
TERCCm = MIN ( LRCm ,ERCm ) (6) i j
644
6. Conclusion
APCP—air pollution capacity constrained by pollutant
P in the planning year, TECC is not only can be used as control factors in
EfijP—average emission weight of pollutant P let by strategic transportation planning and trip mode
vehicle type j in the planning year, structure optimization, but also used as evaluation
TQ p index in other researches. Thus it is important to
APC P =
∑∑ ( xi × βij × Lij × Efijp )
modeling TECC in transportation field.
i j
(10) References:
EQP × S P ×η P
= [1] Sheng Jin-sheng, Lei Li,, Xu Yi-fei, “ Research on
C p × ∑∑ ( xi × βij × Lij × Efijp ) dynamic mechanism of sustainable urban transportation”
i j SYSTEM ENGINEERING,1997,15 (5):8-12
[2] Sheng Jin-sheng, Lei Li, , Xu Yi-fei, “ Discussion about
APC = MIN (δ CO APCCO , δ NOX APC NOx , δ HC APC HC ) traffic environmental capacity and traffic environmental
carrying capacity”, ECONOMIC GEOGRAPHY,
We can individually calculate the value of APC 1997,17(1):97-99
based on the weighted average APCP (CO, NOx or HC, [3] Liu Zhi-shuo, Sheng Jin-shen,Zhang Zhi-wen,, Wei
and so on) emission by motor vehicles in urban area. Hong-ye,” Method of calculating the urban traffic capacity
based on traffic environment carrying capacity and its
applications”, CHINA JOURNAL OF HIGHWAY AND
4. Integrated model of TECC TRANSPORT[J] 2004,17(1):70-73
[4] Dock, Frederick, Bochner, Brian S, Greenberg, Ellen C
TECCm = MIN ( TERCCm , TEPCCm ) (11) “Multidimensional framework for context-based design of
From the above formulas, the TECC value can be major urban thoroughfares”,[J]. Transportation Research
Record 2004:81-87
improved greatly by optimizing the traffic modes
[5] Chen Chun-mei, “Review of road network
structure and increasing the vehicle carrying capacity or capacity” ,JOURNAL OF HIGHWAY AND
load rating. But the transportation service of level will
TRANSPORTATION RESEARCH AND DEVELOPMENT[J
go down in the vehicle with high carrying capacity or ],2002,19(3):97-101
load rating which causes the TEECC declining. [6] Li Chao-yang, Wang Zheng, “Supply-demand models for
Therefore, the proper trip structure can effectively time and space resources of urban road and their application”,
increase the capacity of transportation system to urban JOURNAL OF BASIC SCIENCE AND ENGINEERING[J]
environment. 1998,6(3):141-147
[7] Xiang Qiao-jun, “Importance of Reducing Fuel
5. Example Consumption of Urban Transportation”, JOURNAL OF
HIGHWAY AND TRANSPORTATION RESEARCH AND
The emission factor NOx is selected as air pollution DEVELOPMENT,[J] 2000,17(4):80-82
emission factor to calculate TEPCCV based on the data
of Xi’an city in 2005. The calculated results are shown
in Table 3:
Table 3. TECC calculation results of Xi’an
Carrying Capacity value
LRCW(persons) 4,003,168
LRCB(vehicles) 784,608
LRCv 125,071
TECCV( TRRCCV
ERCV 132,227 125,071
pcu)
TEPCCV 129,447
According the practical condition of the resource
usage and pollution in Xi’an, the true value of LRCv is
a little bigger than the one in Table 3. The practical
average occupation area per vehicle is less than sV, as
the drivers often keep less safety space headway.
645
2008 International Conference on Intelligent Computation Technology and Automation
Abstract
the random parameters for an unsampled location. The
Nonlinear mixed-effects modeling approach was objectives of this study were to develop height growth
used to model the individual tree height–age models for Mongolian pine from natural stands based
relationship in Mongolian pine (Pinus sylvestris on a nonlinear mixed-effects modeling approach.
L.var.mongolica Litv.). A set of 345 pairs of height–
age measurements was used to fit the model. These 2 Materials and methods
were taken at 30 temporary plots from natural stands.
Ten nonlinear growth equations were evaluated to
find a local model, which only includes the ages of the 2.1 Data
tree as explanatory variables. After selecting the local
model, a nonlinear mixed model technique was Stem analysis data from Mongolian pine natural
applied to fit the local model. The model building stands were collected from Daxinganling region in
process involved the estimation of fixed and random Heilongjiang Province, northeast China. This species
parameters and autoregressive correlation structures. is common and commercially important in northeast
The second-order moving average model MA (2) was China. One site tree was selected from temporary plots
incorporated into the mixed-effects model. The MA (2) ranging in size from 0.04 to 0.06 ha. The criteria for
correlation structure can explain the dependency selecting the trees required them to be the largest
among repeated measurements within the tree. By diameter, in the dominant or codominant crown class,
calibrating the model it is possible to predict random unsuppressed, and free of biotic and abiotic damage.
parameters of the mixed model from height Stem analysis data from 30 trees were collected by
measurements previously taken from a subsample of felling the site trees and sectioning them. The rings at
trees. The different alternatives tested reveal that only each section were counted, resulting in a set of height-
two or three trees are necessary to calibrate the model. ring count data for each sample tree.
scal
10
independent. θ1i is horizontal asymptote. θ 2i is the
inflection point of the curve. θ 3i is the scale paraemter.
8
8 10
35 30 35
In the basic assumptions, the nonlinear mixed-
effects model requires the asymptotic normal 30
12 14 16
For the construction of a mixed model it is Figure 2. Pairs plot for the estimated random
necessary to determine parameter effects. An intuitive effects from the mixed model.
approach is to obtain separate fits for each individual
(tree) and assess the variability of estimated To avoid over-parameterization problems and ill-
parameters by considering the individual confidence conditioning problems of variance-covariance matrix,
intervals. The parameters with high variability and less different combinations of fixed and random
overlap in confidence intervals across trees should be parameters was explored (Table 1). In all cases, those
considered as mixed effects (Pinheiro and Bates models containing mixed effects (fixed and random
1998). parameters) performed better than models with only
Asym xmid scal
30
29
| | |
| | |
| | |
||| | | |
| | | fixed effects (P<0.0001). The model with the three
28
27 | | |
| | | | | |
| | | | | |
| | |
parameters as mixed-effects has lowest AIC, BIC
| | | | | | | | |
26
25 | | | | | | | | | values, indicating that the mixed model with the three
24 | | | | | | | | |
23
22
| | |
| | |
| | |
| | |
| | |
| | |
random parameters provided more accurate height
21
20 | | |
| | | | | |
| | |
| | |
| | | prediction.
19 | | | | | | | | |
18 | | |
| | |
| | |
| | |
|
| | |
| | Our sample data is repeated-measurements data so
17
16 | | | | | | | | |
it is likely that there are some serial correlations
Tree
15 | | | | | | | | |
| | | | | | | | |
14
13 | | | | | | | | | among the measurements on each individual.
12 | | | || | | | |
11
10 | | |
| | |
| | |
|||
| | |
| | | Correlation structures are used to model dependence
9
8 | |
| | |
| |
| | |
| | |
| | |
| | among observations. In the context of mixed effects
| | | | | | | | |
7
6 | | |
| | |
| | |
| | |
| | |
| | |
models, Correlation structures can be incorporated
5
4
3
| | |
| | | |||
| | | | | |
| | |
into mixed-effects models (Chi and Reinsel 1989,
2
1
| |
|
|
| | |
|
|
| |
|
| |
|
|
| | Lindstrom and Bates 1990, Pinheiro and Bates 2000).
5 10 15 20 10 20 30 40 50 5 10 15 20 In this study, the AR(1), MA(2), and ARMA(1,1)
Figure 1. Ninety-five percent confidence interval on correlation structures were tested for inclusion in the
the model parameters for each tree. mixed-effects model. The AR(1) and ARMA(1,1)
models failed to converge. The mixed model with
Figure 1 gives the approximate 95% confidence MA(2) correlation structure resulted in smaller AIC
interval for the three parameters for each tree. It values. LRT (P<0.0001) further indicated a
indicates that there is more variability from tree to tree statistically significant difference for the mixed model
in the confidence intervals so all parameters should be with and without autocorrelation structure MA(2). The
considered as mixed effects. MA(2) correlation structure could explain the
dependency among repeated measurements within the
individual. The final model is mixed-effects model
647
with autocorrelation structure MA(2). Parameters mixed-effects model provided better predictions than
estimates for the final model are presented in Table2. the model using only the fixed parameters.
Asym xmid scal
4 Conclusions
1
The three-parameter Logistic growth model was
Quantiles of standard normal
648
Table 1. Likelihood ratio tests (LRT) for nonlinear mixed-effects models.
Random No. of Log-
Model parameters parameters AIC BIC likelihood LRT P-value
1 b1 , b2 , b3 10 858.22 896.62 -419.11
2 b1 , b2 7 888.01 914.89 -437.00 35.793 <0.0001
3 b1 , b3 7 1004.14 1031.03 -495.07 151.929 <0.0001
4 b2 , b3 7 1073.73 1100.61 -529.86 221.514 <0.0001
5 None 4 1570.70 1586.07 -781.35 724.489 <0.0001
Table 2. Parameter estimates for fixed effects, random effects and correlation.
Correlation
Random Random effect
Parameter Estimate S.E. parameter standard deviation b2 b3
β1 15.4608 0.5322 b1 2.7405 -0.196 -0.065
β2 23.6473 0.7874 b2 3.6826 - 0.991
β3 9.7662 0.3630 b3 1.0833 - -
θ1 * 0.9038
θ2 * 0.4975
σ2 0.5070
* Correlation parameter for MA (2)
Fixed Mixed
fixed Tree
10 20 30 40 50 60 70 10 20 30 40 50 60 70
26 27 28 29 30
ºº ººº
º
ºº
20
ºº
ººº
º ºº ºº ººº
ºº
15
º ºº ºº º º º
º
ººº ºº º º
º
ºº
10
ºº º
ººº º
º
º
º
º
º
º 5
º º 0
21 22 23 24 25
20
º ºº º ºº
15
ºº ºº ººº
ºº ºº
ºº ºº ººº
10
º º
º º ºº ººº ºººº
º ºº
º º º º
5
ºº
º
ºººº
º ººº
0
ºº ºº ººº
16 17 18 19 20
20
º
ººº ººº
15
ºº ººººº ºº
ººº ºººº ºº ººº ººº
ºº ººº ºº ºº 10
Height(m)
º ºº º
º º º ºº ºº 5
º ºº ºº º ºº 0
11 12 13 14 15
20 º º ºº º º ºº
ºº
º ºº º ºº ºº ºººº
ºº ººº
15
º º ºº
ºº ºº º ºº ºº
ºº
10
º º º º
º º º º
5 º
ºº ºº ºº ºº º
0
6 7 8 9 10
20
º ºº
º ºº ºº ºº
ºº 15
ººº
º ººº ºº º
º
ºº 10
ºº º ºº ºº º ºº
º ººº ºº
5
ºº
º º ºº ºº 0
1 2 3 4 5
20
º
ººº ººº ºº
º º ºº
ºº
15
ºº ººº ºº ºº
10
ºº
º
ºº º ººº º
ºº º º ºº ºº
5
ºº ºº º
0
º ººº º
º
ºº
º º
10 20 30 40 50 60 70 10 20 30 40 50 60 70 10 20 30 40 50 60 70
Age(years)
649
2008 International Conference on Intelligent Computation Technology and Automation
γ
The matrices Ai ∈ R
n×n
, Bi ∈ R
n×m
and C ∈ R
n× p
. Vi ( x ) < − Vi ( x ) (8)
β
Consider the system given by (1); we construct a
group of observers for each subsystem as follows: Let V (t ) = Vi ( x ) , i ∈ I and from (8) we have
xˆ = Ai xˆ + Bi u + Li ( y − Cxˆ )
γ γ
(2) − ( t −tk )
+
− ( t − t0 )
β
V (t k ) < ( β α ) e β
k
V (t ) = e V (t 0 ) (9)
where the estimated state is denoted by x̂ , and
− +
Li ∈ R
n× p
is the observer gain matrix. where V (t k ) := lim V (t ) and V (t k ) := lim V (t ) .
− +
t →tk t → tk
Therefore the error in the state estimate, x = x − xˆ , From the Definition 1 we have
has the following dynamics: t − t0
(β α ) ≤ (β α ) (β α ) τ
k N0
time, if there are two numbers N 0 ≥ 0 and τ a > 0 such where C = (β α ) ( − ). and λ =
2 β τa
that From Condition 3 we can get λ > 0 , therefore the
T −t error dynamics is exponentially stabilized by
N σ (t , T ) ≤ N 0 + , ∀T > t ≥ 0 (5)
τa −1
Li = Pi X i ■
where N σ (t , T ) is the number of switches in (t , T ) . Remark 1 Due to the nonlinearity β ln( β α ) the
In this paper, the observer design and analysis for observer design procedure is more than solve an LMI
switched system with τ a will be investigated. problem, which is given as follows
Step 1 Initialize the parameter γ = 1 ;
Step 2 Solve LMI problem
3. Observer design for switched systems
with precisely matching switching signal ⎡α I − Pi 0 0⎤
⎢ 0 Pi − β I 0⎥<0
Theorem 1 Given the switched system (1) with ⎢ ⎥
average dwell time τ a . If there exist matrices Pi , X i ⎣⎢ 0 0 Qi ⎦⎥
where Qi = Ai Pi + Pi Ai − C X i − X i C + γ I .
T T T
and constants α > 0 , β > 0 , γ > 0 satisfying
1 α I < Pi < β I , ∀i ∈ I Step 3 Verify parameters α , β , γ whether satisfy
Condition 3. If Condition 3 is not satisfied, reset
2 Ai Pi + Pi Ai − C X i − X i C + γ I < 0
T T T
γ ' = 2γ and go back to step 2 where let γ = γ ' in
3 β ln( β α ) − γτ a < 0 LMI. If Condition 3 is satisfied, terminate procedure
−1
651
In this section, observer design for switched systems Due to k = N σ (t 0 , t ) and k − n = N σ (t n , t ) and let
will be taken into consideration when the observer
switching signal mismatches the original system’s. 1 γ ln( β α )
λ= ( − ) we have
An assumption is necessary for the following results. 2 β τa
Assumption 1 Assume the original system state x
∫
t
−2 λ ( t − t0 ) −2 λ ( t −τ )
V (t ) < ( β α ) e V (t 0 ) + μ ( β α ) dτ
N0 N0
and the input u satisfy x < ξ and u < ρ . t0
e
Regardless of the observer mode location, which It yields that
means observer totally mismatches the switched
μ (β α )
N0
3 β ln( β α ) − γτ a < 0
and from Condition 1 we have
where Qi = Ai Pi + Pi Ai − C X i − X i C + γ I , then the
T T T
γ
Vi ( x ) < − Vi ( x ) + ε x + η u
2 2
(11)
β error state x is eventually bounded according to
Let V (t ) = Vi ( x ) , i ∈ I we get μ ( β α ) (e
2 λΔ
N0
− 1)
lim x (t ) < 2 λ Tmin
−
γ
( t − tk ) −
γ
( t −τ )
t →∞ 2λ ( e − 1)
V (t k ) + μ ∫ e
t
V (t ) < e β β
dτ , t ∈ [t k , t k +1 ) (12) −1
tk
by the observer gain matrix Li = Pi X i .
where μ = εξ + ηρ . By iterating the (12), we get
2 2
Proof Similar to proof line as above we easily get
−
γ
( t − t0 ) ⎧ − γ V (t ) + ε x 2 + η u 2
tk < t < tk + Δ k
V (t ) < ( β α ) [ e ⎪⎪ β
k β
V (t 0 )
γ γ V (t ) < ⎨
k − ( t −τ ) − ( t −τ )
⎪ γ
∑ (β ∫ ∫
−n tn t
+μ α) e β
dτ ] + μ e β
dτ − V (t ) t k + Δ k < t < t k +1
n =1
t n −1 tk
⎪⎩ β
652
Then due to Assumption 1 we get 1. When the switching signals matches, we consider
⎧ −
γ
( t − tk ) −
γ
( t −τ )
the switched system (1) with two subsystems:
∫
t
⎪e
β
V (t k ) + μ e β
dτ tk < t < tk + Δ k ⎡ −1 10 ⎤ ⎡1⎤
V (t ) < ⎨
tk
A1 = ⎢ ⎥ , B1 = ⎢ ⎥ , C = [ 2 1]
⎪ −
γ
( t − t k −Δ k ) ⎣ −2 −1⎦ ⎣1⎦
⎩
β
e V (t k + Δ k ) t k + Δ k < t < t k +1 ⎡ −1.5 8⎤ ⎡0 ⎤
A2 = ⎢ ⎥ , B2 = ⎢ ⎥ , C = [ 2 1]
⎣ −7 −2 ⎦ ⎣1 ⎦
where μ = εξ + ηρ . Let TΔ (t0 , t ) denote the mode
2 2
∫ TΔ ( t 0 , t )
e
−2 λ ( t −τ )
dτ ∑ (e 2 λ ( tn + Δ − t )
−e
2 λ ( tn − t )
)
e
2 λΔ
−1 Chose x (0) = [ 3 −5 ]
T
and x (0) = [10 7]
T
and
< n =1
= 2 λTmin input u = 10 . The simulation result is shown in figure
∫ −1
t k
∑ (e
−2 λ ( t −τ )
e dτ 2 λ ( t n + Tmin − t )
−e
2 λ ( tn − t )
)
e
t0 1.
n =1
10
which implies error state x1
2 λΔ 2 λΔ
e −1 e −1 error state x2
∫ ∫
t
−2 λ ( t −τ ) −2 λ ( t −τ )
e dτ < 2 λ Tmin
e dτ < 2 λ Tmin
5
TΔ ( t0 , t )
e −1 t0
2λ (e − 1)
(15) 0
-5
μ ( β α ) (e 2 λΔ − 1)
N0
−2 λ ( t − t 0 )
V (t ) < ( β α ) e
N0
V (t 0 ) + 2 λ Tmin
2λ ( e − 1) -10
N 0 +1 μ ( β α ) (e
N0 2 λΔ
− 1) Figure 1. Estimated error state x
where C = (β α ) , b= 2 λTmin
.■ It is shown the error state converges to the origin.
2λ ( e − 1) 2. When the switching signal mismatches the
Remark 2 From Theorem 3 we can see that x (t ) original system’s switching signal precisely, we
consider the switched system (1) in the above example
is related to the length of interval Δ . If Δ → 0 we
with Δ = 0.5 . We get α = 0.0542 , β = 0.6182 ,
2 λΔ
μ ( β α ) (e
N0
− 1) λ = 4 , matrices
have lim b = lim = 0 , then we
Δ →0 Δ→ 0 2λ ( e
2 λ Tmin
− 1) ⎡ 0.4655 −0.1073⎤ ⎡ 0.5764 −0.1478 ⎤
P1 = ⎢ ⎥ P = ⎢ −0.1478 0.096 ⎥
⎣ −0.1073 0.101 ⎦ ⎣ ⎦
2
have lim x (t ) = 0 , which means that error dynamics
t →∞
2 λΔ
μ ( β α ) (e μ (β α )
N0 N0
− 1) The simulation result is shown in figure 2.
lim
2 λT
=
2λ ( e
Δ →0 − 1) min
2αλ
which is the results in Theorem 2.
5. Numerical examples
653
4
This work was supported by Sichuan ministry of
error state x1 education scientific research project (No. 07Zd1123).
2 error state x2
0 References
-2
[1] A. Balluchi, M.D. Benedetto, C Pinello, C. Rossi and A.
-4
x
Acknowledge
654
2008 International Conference on Intelligent Computation Technology and Automation
Qinzhen Huang
Institute of Electrical and Information Engineering,
Southwest University for Nationalities of China
qinzhenhuang@gmail.com
656
In other words, the fact that is a
(3.6) Schur matrix is equivalent to (3.5).
Furthermore,
(3.7)
Moreover, Similarly,
Proof. This proof will be finished by showing I II,
II III and II IV.
I II. We first show that I II, and then I II.
Consider the augmented system corresponding to
(3.1) and (3.3),
That is, and
(3.8) are equivalent to
This part is finished.
Finally show that II IV. Suppose
where is a zero matrix with appropriate dimension. is a Schur matrix.
By Lemma 4, (3.8) is positive if and only if As already stated, is a positive
Schur matrix, which is further equivalent to that there
Define the error vector between and exist a matrix such
as , and the the following error dy- that (by Lemma 3)
namics is obtained
(3.10)
(3.9)
By Lemma 6, (3.10) is equivalent to
Since the error will asymptotically converge to
zero, (3.9) is stable. Obviously, (3.9) is positive. Ac-
cording to Remark 1, is a Schur (3.11)
matrix. Thus I II holds.
To show II I, it suffices to note that the above- Let , and it follows from (3.11) that
mentioned process is reversible, and therefore if condi-
tions in II hold, then (3.2) is a positive observer for
system (3.1). So, Statements I and II are equivalent.
II III. Suppose that
and is a Schur matrix,
and that with
and .
Because .
Therefore, is a positive Schur matrix
and so is . By Lemma 2, this is Therefore, (3.7) holds.
equivalent the existence of a vector such On the other hand,
that .
Since one has
Moreover,
Likewise, it is easy to show
657
4. Numerical example LMI method. By means of LMI toolbox and IV in
Theorem 1, gain matrix is calculated
Consider the following system
x(w)
3
0
0 50 100 150
w
Since (4.1) must be positive.
Figure 4: States of system (4.1)
Two methods are used to design the Luenberguer-type
8
observers: LP method and LMI method. 7
{ˆ1 (w)
{ˆ2 (w)
LP method. Using Linear Programming toolbox 6
and III in Theorem 1, one obtains 5
x̂(w)
4
7 1
{1 (w)
6 0
{2 (w) 0 50 w 100 150
5
Figure 5: States of the observer for system (4.1)
4
1.2
x(w)
h1 (w)
3
1
h2 (w)
2
0.8
1
0.6
e(w)
0
0 50 100 150 0.4
w
0.2
Figure 1: States of system (4.1)
0
8
{ˆ1 (w)
7 -0.2
{ˆ2 (w) 0 50 w 100 150
6
5
Figure 6: States of the error dynamic system
4
x̂(w)
3 5. Conclusions
2
0.6
6. References
e(w)
0.4
658
[3] D. G. Luenberger, Introduction to Dynamic Systems. New [14] H. Gao, J. Lam, C. Wang, and S. Xu, “Control for sta-
York: Wiley, 1979. bility and positivity: Equivalent conditions and computa-
tion,” IEEE Trans. on Circuits and Systems-II, vol. 52, no. 9,
[4] L. Benvenuti, A. D. Santis, and L. Farina, Positive Sys- pp. 540-544, 2005.
tems, Lecture Notes in Control and Information Sciences.
Berlin: Springer-Verlag, 2003. [15] M. A. Rami and F. Tadeo, “Controller synthesis for
positive linear systems with bounded controls,” IEEE Trans.
[5] D. Hinrichsen, N. K. Son, and P. H. A. Ngoc, “Stability on Circuits and Systems-II, vol. 54, no. 2, pp. 151-155, 2007.
radii of higher order positive difference systems,” System &
Control Letters, vol. 49, pp. 377-388, 2003. [16] X. Liu, L. Wang, W. Yu, and S. Zhong, “Constrained
control of positive discrete-time systems with delays,” IEEE
[6] T. Kaczorek, “Some recent developments in positive 2D Trans. on Circuits and Systems-II, vol. 55, no. 2, pp. 193-197,
systems,” in POSTA, 2003, pp. 345-352. 2008.
[7] J. E. Kurek, “Stability of positive 2-D system described [17] W. M. Haddad and V. Chellaboina, “Stability theory for
by the roesser model,” IEEE Trans. Circuits and Systems-I, nonnegative and compartmental dynamical systems with
vol. 49, no. 4, pp. 531-533, 2002. time delay,” Systems & Control Letters, vol. 51, no. 5, pp.
355-361, 2004.
[8] P. D. Leenheer and D. Aeyels, “Stabilization of positive
linear systems,” Systems &Control Letters, vol. 44, no. 4, pp. [18] M. A. Rami, U. Helmke, and F. Tadeo, “Positive obser-
259-271, 2001. vation problem for time-delays linear positive systems,” in
The 15th Mediterranean Conference on Control and Auto-
[9] M. A. Rami and F. Tadeo, “Positive observation problem mation, 2007.
for linear discrete positive systems,” in Proceedings of the
45th IEEE Conference on Decision & Control, 2006, pp. [19] J. M. Van Den Hof, “Positive linear observers for linear
4729-4733. compartmental systems,” SIAM Journal on Control and Op-
timization, vol. 36, no. 2, pp. 590-608, 1998.
[10] M. E. Valcher, “On the internal stability and asymptotic
behavior of 2-D positive systems,” IEEE Trans. Circuits and [20] L. Farina and S. Rinaldi, Positive linear systems: theo-
Systems-I, vol. 44, no. 7, pp. 602-613, 1997. rey and applications. New York: John Wiley & Sons, Inc.,
2000.
[11] M. BusÃlowicz, “Robust stability of positive discrete-
time linear systems with multiple delays with linear unity [21] X. Liu, “Stability analysis and constrained control of
rank uncertainty structure or non-negative perturbation ma- discrete-time positive systems with delays,” Submitted to
trices,” Bulletin of the Polish Academy of Sciences Technical IEEE Trans. on Circuits and Systems-I.
Sciences, vol. 55, no. 1, pp. 1-5, 2007.
[22] S. Boyd, E. Ghaoui, E. Feron, and V. Balakrishnan,
[12] T. Kaczorek, “Stabilization of positive linear systems by Linear matrix inequalities in system and control theory.
state feedback,” Pomiary, Automatyka, Kontrola, vol. 3, pp. Philadephia: SIAM, 1994.
2-5, 1999.
[23] D. G. Luenberger, “An introduction to observers,” IEEE
[13] M. A. Rami, F. Tadeo, and A. Benzaouia, “Control of Trans. Automatic Control, vol. 16, no. 6, pp. 596-602, 1971.
constrained positive discrete systems,” in Proceedings of the
2007 American Control Conference, 2007, pp. 5851-5856.
659
2008 International Conference on Intelligent Computation Technology and Automation
661
3.1.Chromosome Representation of flag i
Constellation The parameters is used to illustrate
whether the i-th satellite is in the constellation
Each satellite in the space of six locations can be flag i =0 means false; that flag
i = 1 means true), so
(
used to define classical orbital parameters: orbit semi- the length of this constellation of chromosomes can be
major axis a, eccentricity e, inclination i, longitude kept constant, while the number of satellites in the
ascending nodeΩ,perigee angleω,and mean anomaly N max
M. Considering the impact of perturbation and launch N= ∑ flag
i =1
i
issues, each satellite in a constellation has the same constellation is : .
orbit semi-major axis, eccentricity and inclination Simple genetic algorithm often uses binary encode,
generally, so that there are 3N+3 parameters regarding In this paper we use real number encode instead of
a constellation which owns N satellites. binary encode in order to enhance the accuracy of
Established the possible maximum number of chromosome description and the precision of the
N
max , Constellation
algorithm.
satellites in constellation is
chromosome structure is shown in Figure 3.
∑
borne sensors are known in advance .so optimization
of objective O2 can be transformed into satellite orbit TN<= TN ij .Here involved merger of the visibility
i =1
height restrictions prior to the beginning of
optimization process . Therefore optimization process time window, the merger strategies of the visibility
only need to consider the spot target of the maximum time window are as follows:
revisit gap(O1). The spot target of maximum revisit
662
Traversing satellites each time window, Sort time 2006,and ended at 12:00 on July 1, 2006. Assuming
window of all K satellites according to the time that there are ten important ground targets which
sequence and then get a time window sequence of distribute in the region, the reconnaissance satellite
entire K satellites. constellation meets the requirements of every 12 hours
If the start time of the following time window is less to carry out a reconnaissance imaging for every given
than the end time of the previous time window, the target (established some factors such as clouds and
time window merger operations is done. weather are not considered here). Table 1 shows the
After the merger, the start time of the time window is location of key observation.
the start time of previous time window, the end time is
Table1 location of key observation
the end time of following time window.
target longitud(degree) latitude(degree)
target1 80 10
target 2 120 40
STK\Connect
target 3 130 10
target 4 130 50
target 5 98 48
target 6 98 5
target 7 95 25
STK\Connect
target 8 110 20
target 9 83 35
target10 78 50
Sun-synchronous orbit satellites with an orbital altitude
Yes
800 kilometers are considered here. Assuming that
space-borne sensors are rectangular sensor, with
STK\Connect
No
vertical field of view angle 45 degrees and level field
of view angle 1 degree. elevation angle is±30 degrees.
Population size is 20 and the generation span is 100.
NSGA-II algorithm is achieved by Visual C++. The
computation of the O1 parameters is achieved by STK
which is a powerful analytical tool of satellite.
We use optimization algorithm to find a set of Pareto
solutions, then adopt lexicographic order method to
Yes
choose among these solutions.
No
Yes
Table2 Optimization design schemes
O1 scheme1 scheme 2 scheme 3 scheme 4
No
target1(min) 343 541 567 537
target 2(min) 346 529 486 717
target 3(min) 609 585 651 710
Figure 4. simulation flowchart target 4(min) 320 521 481 504
Thus, maximum revisit gap of the target point j can be target 5(min) 342 629 425 629
calculated as follows: target 6(min) 713 654 753 654
TN −1
Tj = max ( bl − el−1 )
target 7(min) 703 702 643 518
The simulation flowchart is shown in Figure4. target 9(min) 637 526 478 509
target 10(min) 628 521 628 504
663
requirement that a reconnaissance imaging is carried Astrodynamics specialist conference, San Diego, California,
out every 12 hours. According to the guideline, user 1996, 582-588.
chooses scheme 1 using lexicographic order method. [2] E. R. George, “Optimization of satellite constellations for
Table3 gives corresponding constellation discontinuous global coverage via genetic algorithms”,
AAS/AIAA Astrodynamics specialist conference, Sun
configuration. Valley, 1997, 333-346.
Table 3 Optimization results [3] M. Asvial, R. Tafazolli, B. G. Evans, “Non-GEO Satellite
Constellation Design with Satellite Diversity Using Genetic
ω Satellite
a(km) e i(deg) Ω(deg) M(deg) Algorithm”. 20th AIAA International Communication
(deg) number
274.4734 205.1919 Satellite Systems Conference and Exhibit , Montreal,
293.7607 249.0380 Quebec, Canada,2002
[4] William J. Mason, Coverstone-Carroll V., and Hartmann
195.5663 192.1405
7178.137 0 98.5957 0 6 J. ‘‘Optimal Earth Orbiting Satellite Constellation via a
286.1518 77.0404
Pareto Genetic Algorithm’’, AIAA/AAS Astrodynamics
219.8671 282.2492 Specialist Conference and Exhibit, Boston, Massachusetts,
209.2453 266.6257 1998, pp.169-177.
Simulation results show NSGA-II can solve multi- [5] Yan Zhi-wei, Tian Jing et al. “Optimization of regional
objective optimization problem and get a number of coverage satellite constellation by Improved NSGA-II
Pareto solutions, these solutions have their own algorithm”. Chinese Journal of space Science,24(1) ,2004,
advantages in different optimization objects, decision- pp. 43-50.
makers select solutions based on different requires. [6] Zeng Yu-jiang, Hu Xiulin,Wang Xianhui, Ying Wang.
“Regional telecommunication satellite constellation design
Compared with simple genetic algorithm, The main tradeoffs”. Second International Conference on Space
advantages of the method are followings:(1)Avoid Information Technology, Proceedings of the SPIE, 6795,
selecting weights of objects. When using simple 2007, 679559.
genetic algorithm, multi-objective problem are [7] Li Su-dan , Zhu Jiang, and Li Guang-xia. “Optimization
transformed into single-objective problem and of LEO regional communication satellite constellation with
selection of the weights are subjective.(2)Algorithm GA algorithm”. Chinese Journal on Communications ,
has good flexibility. NSGA-II only needs to use 8(2),2005, pp. 254-259.
lexicographic order method to sort previous Pareto [8]Deb K., Agrawal S., Pratap A., Meyarivan T., “A Fast
solutions, avoid calculating the solution again. Elitist Non-dominated Sorting Genetic Algorithm for Multi-
Objective Optimization: NSGA-II”, Proceedings of the
Parallel Problem Solving from Nature VI (PPSNVI) ,2000,
5. Conclusion 849-858.
[9]Carlos,A, Coello Coello, “A Comprehensive Survey of
In recent years, genetic algorithm are widely used in Evolutionary-Based Multiobjective Optimization
the design of regional coverage satellite constellation. Techniques”. Knowledge and Information Systems.
This paper deal with regional coverage satellite 3(1),1999, pp. 269-308.
Constellation optimization as MOP, applies improved [10]Van Veldhuizen,D.A., Lamont G.B, ‘‘Multiobjective
NSGA-II algorithm and multi-attribute decision- Evolutionary Algorithms:Analyzing the State-of-the-Art’’.
making method to regional coverage satellite Evolutionary Computation, Vol.8, No.2 (2000) pp. 125-147
[11]M. Asvial, R. Tafazolli, and B. G. Evans, “Modified
constellation on the basis of foregoing researches. To
GSC for hybrid satellite constellation”, IEE Electronics
illustrate the method in the paper, simulation are Letters, 26th September, 2002.,vol. 38, no. 20, pp.1216–1217.
presented. Simulation results prove the method is [12]M. Asvial, R. Tafazolli, and B. G. Evans, “Genetic
practical and effective. Compared with traditional hybrid satellite constellation design”, 21st International
simple genetic algorithm, the method have some Communications Satellite Systems Conference and Exhibit,
advantages such as good flexibility and avoiding 2003.
selecting weights of objects, so the algorithm is more [13]M. Asvial, R. Tafazolli, and B. G. Evans, “Satellite
practical for optimization of regional coverage satellite constellation design and radio resource management using
constellation optimization. In addition, the method genetic algorithm”, Communications, IEE Proceedings ,
presented in the paper can be applied to the general June,2004, pp. 204-209.
satellite constellation optimization problem.
6. References
[1] E.Frayssinhes, “Investigating new satellite constellation
geometries with genetic algorithms”, AAS/AIAA
664
2008 International Conference on Intelligent Computation Technology and Automation
666
in our former work, the global explanation and ⎧ 1
consistency analysis will be considered in next stage. ⎪⎪(k1 + k2 )β + V ( ak1-bk2 ) r-k1δ = M (v '+ rV ) (6)
The carrying truck can be looked as a two-degree of ⎨
freedom kinetic system. Here we will build the steady- ⎪ (ak -bk )β + 1 ( a 2 k + b 2 k ) r-ak δ = I r '
state response of the truck when it is running at a ⎪⎩ 1 2
V
1 2 1 z
uniform speed and suddenly suffering an input from Because the truck that we are studying is supposed
the fore wheel, which implies the steering wheel turns to take a uniform speed, so the weaving angular
with a rush. As showed in the figure 4. velocity r is constant, and we have v ' = 0 and r ' = 0 .
Then the equations (6) turn to:
⎧ v 1
⎪⎪ (k1 + k2 ) V + V (ak1-bk2 )r-k1δ = MVr
⎨ (7)
⎪(ak -bk ) v + 1 (a 2 k + b 2 k )r-ak δ = 0
⎪⎩ 1 2
V V
1 2 1
667
investigated, it is an analysis of the truck dynamics and ⎧ LENa = < LMAX , std >
not an analysis of design. ⎪ (11)
P3: d = d 2 ⎨ LENb = < 0, std >
So we take a different perspective to handle the ⎪ K = < (0, +∞), std >
problem, which means that the time functions of ⎩
velocity and acceleration are looked as invariables, and We can describe the qualitatively state transition
the design parameters as continuously differentiable graph of the designing parameters:
functions. In this processing mode the influencing
relationship between the needed design parameters can
be gained when the truck is moving. According to the
equations above, the differential expression of K is
turned to Qualitative Differential Equations (QDE).
Then we get the QDE of the truck’s steady state
response as follows:
⎧ 1
⎪ MULT (a, k , f1 )
⎪ 2
⎪ 1
(10)
⎪ MULT (b, k , f 2 )
⎪
⎨
1
⎪ MINUS ( f3 , f 2 )
⎪ ADD( f , f , f )
⎪ 1 3 4
⎪ MULT ( f , M , K )
⎪⎩ 4
L2
We define the length of a and b as LENa and LENb,
and the both lengths are looked as continuously
differentiable function of certain abstract design
variable d. Here d has no actual meaning by itself
because the change of the parameter depends on our
design. We use d just to imply the change of parameter
a and b. It is supposed that the length of a increases Figure 3. Qualitative state graph
from zero. The length of the whole bodywork of the From the Figure 3, we can gain the information
truck is defined as LMAX. As the length of the truck’s being represented in following cases:
bodywork is composed of the sum of length a and b, When K = 0, the turning of the truck is neutral;
so the LENb decreases from whole length of LMAX. When K > 0, the turning of the truck is deficient;
According to the I-transition and p-transition in the When K < 0, the turning of the truck is sufficient.
QSIM, the qualitative states of changing parameters in It is generally thought that in the case of K<0, i.e.
designing process are gained. It is shown as follows: the sufficient turning of the truck, the performance of
⎧ LENa = < 0, inc > the truck is very well. And from the figure 3 above we
⎪ can see the relationship between the steady response
P1: d = d 0 ⎨ LENb = < LMAX , dec >
⎪ K = < (-∞, 0), inc > parameter K and the barycentric position parameters a
⎩ and b, which means the barycentre of the bodywork is
⎧ LENa = < (0, LMAX ), inc > important to steady response in the design process.
⎪
I1: d ∈ (d 0 − d1) ⎨ LENb = < (0, LMAX ), dec >
⎪ K = < (-∞, 0), inc > 6. Conclusion
⎩
⎧ LENa = < (0, LMAX ), inc > In this paper, the global explanation and
⎪
P 2 : d = d1 ⎨ LENb = < (0, LMAX ), dec > consistency analysis are considered as the next stage
⎪ K = < 0, inc > using qualitative simulation algorithm after the
⎩
qualitative reasoning of the conceptual design in the
⎧ LENa = < (0, LMAX ), inc > mechanism configuration. The qualitative information
⎪
I 2: d ∈ (d1− d 2) ⎨LENb = < (0, LMAX ), dec > matrices and the qualitative algebraic relations of the
⎪ K = < (0, +∞), inc > sign are given to be the basic parts of qualitative
⎩
reasoning. The carrying truck is looked as a two-
degree of freedom kinetic system. The steady-state
668
response of the truck is built when it is running at a
uniform speed. The relationship between the steady [4] L. Jiming, “Method of spatial reasoning based on
response parameter and the barycentric position qualitative trigonometry”, Artificial Intelligence, 1998, vol.
parameters are given, and the results show that the 98, no. 1-2, pp. 137-168.
barycentre of the bodywork is important to steady [5] J. Lunze, “Qualitative Modeling of Linear Dynamical
response in the design process and the qualitative Systems with Quantized State Measurements”, Automatica,
simulation can be an alternative method to reason with 1994, Vol. 30, no. 3, pp. 417-431.
incomplete knowledge.
[6] A. Chakrabarti, T.P. Bligh, “An approach to functional
Acknowledge synthesis of solutions in mechanical conceptual design, Part
III: spatial configuration”, Research in Engineering Design,
1996, Vol. 8, no. 2, pp.116-124.
This work was supported by Scientific Research
Foundation of Zhejiang Forestry University, [7] H. Younghyun, L. Kunwoo, “Using sign algebra for
2351000848; Zhejiang Science and Technology qualitative spatial reasoning about the configuration of
Project, 2007C21045. mechanisms”, Computer-Aided Design, 2002, vol. 34, no. 11,
pp. 835-848.
7. References
[8] S. Chenxi, X. Yi, and Z. Yi, “Qualitative Spatial
[1] K.D. Forbus, P. Nielsen, and B. Faltings, “Qualitative Reasoning and Simulation of Mechanism’s Configuration”
spatial reasoning: the clock project”, Artificial Intelligence, Journal of System Simulation, 2005, vol. 17, no. 8, pp. 2008-
1991, vol. 51, no. 1-3, pp. 417-471. 2011.
[2] B. Kuipers, Qualitative Reasoning, MIT Press, [9] M. Reinhard, R. Marco, “Qualitative spatial reasoning
Cambridge, MA, 1994. about relative point position”, Journal of Visual Languages
& Computing, 2008, Vol. 19, no. 1, pp. 75-98.
[3] B. Fangzhou, L. Zhang, Introduction of qualitative
simulation. Publishing company of University of Sci. and
Tech. of China. 1998.
669
2008 International Conference on Intelligent Computation Technology and Automation
671
language and MFC(Microsoft Foundation Class)as The Server needs a configuration file to work
static compiler. The development toolkits is Following: properly, which is a simple plain text file, the record
(1) SDK provided by OPC foundation; format as shown in Table 1. The left of form is
(2) DCOSE SDK provided by Tsinghua Tongfang simulation variable name for measuring points and the
Simulation System right is description of variable name. This
(3) The open-source Light-OPC Development configuration file is save as
Library “C:\WINDOWS\OPCServer.cfg”for reading of the
interface software.
5.3.1. Compiling Codes. The following is the hard-
core of source codes of Server. Table 1. Server configuration file
int WriteTags(const loCaller *ca, MW-SLD.C_APV Unit Load
unsigned count, loTagPair taglist[], VARIANT 30MKA10CE027.C_APV Frequency
values[], MS-TE22.C_APV Main Steam Temperature
HRESULT error[], HRESULT *master_err, LCID); MSP-SLD.C_APV Main Steam Pressure
{HRESULT hr = S_OK; ……… ……
int i = taglist->tpTi - 1;
EnterCriticalSection(&g_Lock); At last, it is to run the interface grogram that is the
hr = ariantChangeType(&g_pTagList[i].tvValue, self-defined OPC Server which should be registered at
values, 0, V_VT(&g_pTagList[i].tvValue)); first time of running with selecting “register” from
#if _CONNECTED “Server Management” (Fig.3.). Selecting “Start server”
g_RTConn.SetValue(g_pTagInfo[i].szName, from the drop-down menu of “Run” and inputting host
var2str(values[0])); computer name and SimuShop in the pop-up box (Fig .
#endif 4), the sever is connect to real time database and read
loCacheUpdate(g_pService, g_nTagCount,
g_pTagList, 0);
LeaveCriticalSection(&g_Lock);
return hr;
}
5.3.2. Class Diagrams for Compiling Codes. The
project can be divided into a few classes, and the
following class diagrams can be got by UML reversing
codes with using Visio: TAGb (Fig. 2.),
CMyServerDlg, IMyClassFactory and Utility. The
other class diagrams aren’t listed for the reason of
paper length.
672
Fig.5. HOLLiAS OPC Client reading variables
of OPC labels
6. Conclusions
In this design the 600MW simulation system of
Tsinghua Tongfang is able to communicate with OPC
Client of HOLLiAS MACS V DCS with the interface
software which is transparent. A further thing that must
be done is to configure MACS appropriately to realize
reading and writing various variables from DCOSE
database of simulation support system. The final test
has proved the feasibility of the scheme which has
good referenced value for the similar interconnection
of systems in the future.
Of course, now the procedure in security, stability,
function needs to be improved further.
7. References
[1] OPC Foundation. OPC data Access Custom Interface
Standard (Version 2.05A) . 2002
[2] Yang QingBai, Zhao ChunYuanm, Zhang YuYan. OPC
technology and its application direction. Journal of
Shenyang Electric Power Institute, 2003, 5 (4): 20-22.
[3] Youping Wu, Xudong Ma. The OPC Technology and
Application in Integration of Intelligent Building
System. Modern Electronic Technique, 2006, 29 (3):
90-91.
[4] OPC Foundation. OLE for Process Control Data Access
Standard Version 1.0A. 1997.
[5] Xing Jianchun, Wang Ping..Summarize on OLE for
Process Control. Industrial Control Computer,
2000,13(1):29-32
673
2008 International Conference on Intelligent Computation Technology and Automation
Abstract: From the operation mechanism of the ball quality control of the ball mill in operation
mill with double inlets and outlets, this paper gives a automatically partly or entirely is to be improved.
research work to the simulation of the ball mill with Figure 1 is the control model of the ball mill with
double inlets and outlets, and proposes a double inlets and outlets .In this paper, six controlled
corresponding mathematical model of the six with the corresponding six control variables are
controlled with six control variables of the ball mill presented, and the six controlled are the outlet
with double inlets and outlets, and simulates with temperature of the driver end and the non-driver end
Matlab using the operation data of a power plant. The
of the ball mill (Tq , T f ) ; load of the driver end and the
result of the simulation shows that the proposed
dynamic equation is similar to the actual dynamic
non-driver end of the ball mill ( Bq , Bf ) ; coal level of
characteristic of the ball mill with double inlets and
outlets, which provides a complete and good the driver end and the non-driver end of the ball
mathematical model for designing, parameter
mill ( H q , H f ) ; and the six control variables are the
adjustment, analysis of the system of the ball mill with
double inlets and outlets in power plant. flow of the hot air of the driver end and the non-driver
end of the ball mill (Grq , Grf ) ; flow of the cold air of the
1. Introduction
driver end and the non-driver end of the ball
The ball mill with double inlets and outlets is a
mill (Giq , Gi f ) ; flow of coal supplied by the driver end
complicated object with multi-variable coupling,
nonlinear and time-delay, and the mathematical mode
and the non-driver end of the ball mill (Gmq , Gmf ) 【1】。
is difficult to be set up due to its complicated dynamic
characteristic, and no way can be found to understand
the dynamic characteristic of the ball mill through 2. Foundation of the mathematical model
generally experiments. At the present time, the ball
mill with double inlets and outlets is difficult to be 2.1 Mathematical model of the outlet
operated automatically in many power plants, and the temperature
+Cmf Gm dTm + Ctf Gtf dTtf + ClGmmf dTmmf (1) BIN = Gmq + Gmf (3)
In the equation, dT means the ratio of the The load of the ball mill:
dt
Bm = Gtf / µ (4)
temperature change; Cgq , Cm , Cr , CI , Cmf , Ct means the
In the equation, Gtf =Gvo dP / 3700 K P ,
specific heat of the ball, the specific heat of the raw
coal, the specific heat of the cold air, the specific heat Gvo is the total flow designed of the segregator
of the coal powder, the specific heat of the air exported 3
(m /h ); µ is the ratio of the air and the coal; dP is the
of the ball mill respectively; Wgq , Wm , Gtf means the
differential pressure between the inlet and the
load of the ball, the load of coal inside the ball mill, outlet; K P is the ratio of the pressure between the local
the total flow of the air atmosphere and the sea level.
exported; dTrq , dTlq , dT , dT , dT , The corresponding area of the top surface of coal
mq rf Lf
of the ball mill at the coal level of the present:
dTmf , dTm , dTtf means the temperature changed of the
S = 2LTT R2 − (R − H)2 = 2LTT 2RH − H 2 (5)
hot air of the driver end, the temperature changed of
675
In the equation, LTT is the length of the power plant as an example. Some related parameters
canister; R is the radius of the canister of the ball of the ball mill in the rated operating conditions are
mill; H is the coal level measured of the ball mill of presented in the table 1.
the present. According to the data in the table 1 and the equation
From the equation(2),(3),(4),(5),the dynamic (1),(6),(9),the mathematical model of the ball
equation of the coal level of the ball mill can be mill with double inlets and outlets is obtained:
impact of the air change over pressure in the ball mill, In the equation, Vrq , VLq , N q , Vrf , VLf , N f means the
and assume K fp = 3 ( 1+0. 8µ)V ck 2 ; linear coefficient of the hot air baffle plate of the driver
end , the linear coefficient of the cold air baffle plate of
Vck is the flow rate of the air exported of the ball
the driver end, the coefficient of the rotation rate of the
mill; Vmmj is the air volume inside the ball mill. driver end of the coal feeder, the linear coefficient of
the hot air baffle plate of the non-driver end , the linear
dp=3700(Bmµ/ GVO)KP 2
(8) coefficient of the cold air baffle plate of the non-driver
end, coefficient of the rotation rate of the non-driver
From the equation (7),(8),the load equation of the
end of the coal feeder.
ball mill can be obtained:
dBm (13 +0. 8µ)µ 2Gvo 2 Bm 3.2 Simulation block diagram of the
= (Grq + Glq mathematical model
dt 7400 K PVmmj
Simulate with Matlab, and give simulation to the
+Grf +GLf +Gmmf − Gtf ) (9) equation(10),(11),(12)respectively, the block
diagrams is obtained as the figure 2.
676
20 %, the curve of the outlet temperature of the ball of the coal supplied by the driver end of the ball mill
mill is obtained as the figure 3(a), and the changed drops by 20 %, the curve of the outlet temperature of
parameters are in table 2; And when the opening of the ball mill is obtained as the figure 3(c), and the
the cold air baffle plate of the driver end of the ball mill changed parameters are in table 2. When the other
drops by 20 %, the curve of the outlet temperature of control variables of the non-driver end change, the
the ball mill is obtained as the figure 3(b),and the changes of the outlet temperature are similar to the
changed parameters are in table 2; And when the flow driver end.
Table 1 Some related parameters of the mill with double inlets and outlets
Parameter Number Parameter Number
Outlet temperature of the ball mill 100℃ Flow of the coal saved 16t
Coal level of the ball mill 1270mm Specific heat of the ball 0.502 k j/(kg﹒k)
Flow of the coal of each coal feeder 23t/h Specific heat of the hot wind 1.0316 k j/(kg﹒k )
Temperature of the hot air 340℃ Specific heat of the cold wind 1.0125 k j/(kg﹒k )
Temperature of the raw coal 15℃ Specific heat of the wind circulated 1.0168 k j/(kg﹒k )
Temperature of the cold air 30℃ Specific heat of the coal 1.4014 k j/(kg﹒k )
The efficient cubage of the ball mill 61.2 m3 Specific heat of the coal powder 1.5408 k j/(kg﹒k )
3
Density of the raw coal 1200 kg/m Capacity of the air sealed 3300m3/h
Density of the ball 4900kg/m3 Density of the air (100℃) 0.978 kg/m3
(a) (b)
677
(c) (a)
Figure 3 Curves of the outlet temperature
Table 2 Analysis of the curves of the outlet
temperature
Input variable Vrq (Vrf) Vlq (Vlf) Nq (Nf)
output temperature(s) 33 33 33
678
similar to the driver end[4-5]. The results of the simulation show that the
mathematical model is accurate and in accord with the
operating data of the ball mill with double inlets and
outlets basically. The model describes the dynamic
characteristic of the ball mill with double inlets and
outlets in the rated operating conditions According to
the model, we can give simulation research to varieties
of the ball mills with double inlets and outlets.
References
(a)
[1]PAN Wei-jia.Control System in Series of the Twin Ratio
of the Ball mill . Equipment of Generating
Electricity,2003(6):14-17(in Chinese).
[2]TAO Wen-hua, Chai Tian-you, YUE Heng.Research of
Simulation and Mathematic Model of Dynamic Parameters
of the mill.Transaction of the Simulated System.2004,16
(4):778-800(in Chinese).
[3] LI Ying, ZHU Bo-li, ZHANG Wei. The Foundation of
(b) Simulation and Modeling of Dynamic System.Press of the
Figure 5 Curves of the load Xi-an University of Science and Technology, 2004(in
Table 4 Analysis of the curves of the load Chinese).
Input variable Vrq (Vrf) Vlq (Vlf) [4] ZHANG Ping.The Foundation of MATLAB and Concise
Steady time(s) 15 15 Tutorial of Application.Press of the Beijing University of
Variety of the load(kg/s) 0.6 0.62 Spaceflight,2001(in Chinese).
[5] Jim Montague.Ethernet Hits Real-Time…Really. Control
4. Conclusions Engineering China,2004,2:217-219.
679
2008 International Conference on Intelligent Computation Technology and Automation
681
edges is one more than the number of parameter) by 3.3. The hardware structure and software
using the optimization parameter space directly and procedure of furnace temperature controller:
calculates the objective function value of n+ 1 vertex.
Then the method of changing one vertex is used in the With the 8098 Single chip computers of 16 figures
parameter optimization by the following 4 processes: as Master Chip, the temperature controller
reflex, extension, contract and edge lengthen reduction. communicates with host computer by RS232 bus, and
When the difference of objective function values of all sets the temperature control points, and sends the
vertexes is produced, the search is stopped in the practical temperature measuring data to host computer.
certain permitted range and the optimized PID The figure 3 shows the system hardware. As the wide
parameter value is reached. range of thermocouple output, the programmable gain
This paper has the programming and system amplifier AD526 is adopted here, and Sample-and-
Simulation in the MATLAB6.5. The figure 2 is the Hold Amplifiers AD585 is put in the front of 526. the
changing situation (K=1.2) of the output of reference set time is 3us, the width of aperture is 0.5 ns ,
model and practical model, amplifier gain of +1, -1, +2 is reached by feedback
connection. The programmable gain of Front-End
Amplifier and A / D Conversion is applied to the most
thermocouple ,A / D Conversion Chip adopts the
converter of 16 figures produced by AD company, and
the 16 figures error free output of 0.003% nonlinear
can be reached. The gain and renewal rate of data
output can be set by programming. The heating
machine power is controlled by the pressure regulating
method of Bi-directional Triode Thyristor or controlled
by the method of absolute trigger. As to Bi-directional
Triode Thyristor, one trigger impulse is output in every
half Cycle, so after alternate current uses the way of
full-wave rectification , and becomes Zero-Crossing
Pulse by Triode, then antipodal signaling is added to
INT0 of single chip , which is the synchronizing datum
signal. The temperature display adopts OCMJ4X8
Fig. 2 Output of controlled object (1) and model (2) LCD with character library.
Signal modulation
per unit input part Storge
and r(t) is input as unit-step signal. The original AD585 AD526 AD7705
parameter is the following: the number of variable N=3, RS232
TO PC
calculation precisionε=0.001, the shape of the original CPU
8098
simplex L = 0.02, Simulation time is 800 seconds, Heating power Zero-crossing
Signal generator
8297
γ = 2.0,
Power adjust Optical isolation 4X4Keyboard
Coefficient The coordinate ( K P 、 Ti 、 Td ) circuit of BTT MOC3021
682
program is charge of keyboard management, system
initialization and the calling of Module of every 4. Conclusion
function. The figure 4 shows the software process.
The creation of this paper: the model reference
Start adaptive control is adopted, and the simplex method is
adopted in the parameter optimization to make the
practical output of verification furnace near the output
Simplex PID parameter of reference model. Then the control affection
Initialization
optimization becomes worse because verification furnace model
parameter produce time change with the environment
temperature change. The above situation can be
Error calculation of reference
Temperature set
module and practical temperature
inhibited.
5. References
Collection and processing Collection and processing
of temperature signal of temperature [1] Tong li quang , Some Problems and Analysis in
Temperature control of the Thermocouple calibrating Stove .
Metrology and Measurement Technique,2002,NO3:19,28
Rapid heating Power adjust module
[2] zhang zheng rong, Heat Transfer ,Beijing ,advanced
education press,1993
683
2008 International Conference on Intelligent Computation Technology and Automation
only by the probability, indicates the uncertain degree So the normalized memberships are f1 ( x2 ) = 0.3566 ,
of random variable. While the squared error, decided
f 2 ( x2 ) = 0.3605 and f 3 ( x2 ) = 0.2829 , respectively.
by both the probability and the value taken by the
random variable, is used to measure the dispersion Through them, FUE is calculated as
degree of the values taken by random variable. H F ( x2 ) = −(0.3566 × log 2 0.3566
+0.3605 × log 2 0.3605
2.2. Fuzzy uncertainty
+0.2829 × log 2 0.2829) =1.5764 .
Fuzzy membership degree indicates in how much Thus, H F ( x1 ) < H F ( x2 ) , that is, the FUE of
x1 is less
degree the value taken by a variable belongs to some
fuzzy set decided by some fuzzy concept [6][7]. than that of x2 . As suggests that, relative to x2 , it is
Assumed that x is a fuzzy variable, correspondingly easier for us to judge to which fuzzy set x1 should
there are a group of fuzzy sets and each fuzzy set has a
belong. In fact, from the memberships, it can be seen
fuzzy membership function. So these fuzzy sets and
too. Since, the set defined by the youth is centered
the corresponding membership functions can be
notated as { Ai / fi } . Then, the memberships of x at x1 . While the memberships of x2 for the sets defined
belonging to each fuzzy set are normalized. The result by the youth and the wrinkly are nearly equivalent.
n Thus, it is hard to judge which set x2 should belong
is f ( x) = f ( x) /
i i ∑ f j ( x) , where n is the number of
j =1 to, which means that the value x2 is fuzzier than x1 .
fuzzy sets. Now the fuzzy uncertain entropy (FUE) can To sum up, for the fuzzy variable x , the lager the
represented as below: fuzzy uncertain entropy of x is, the harder which set
n
H F ( x) = −∑ fi ( x) log 2 ( fi ( x)) (2) the value x is judged to belongs to. It just embodies
i =1 that the fuzzy uncertain entropy can be used to measure
FUE means the fuzzy degree of the value taken by the degree of fuzzy uncertainty of the value taken by
fuzzy variable. For example, there are three fuzzy sets fuzzy variable.
derived from the concepts youth, wrinkly and elderly.
Then, the membership functions are defined 2.3. Inconsistent uncertainty
correspondingly as:
⎧ 100− | x − 25 | Dempster-Shafer (D-S) evidence theory was first
⎪ f ( x1 ) = 100 put forward by A.P.Dempster, which was improved by
⎪ . G.Shafer further[8]. The D-S evidence theory was
⎪ 100− | x − 40 |
⎨ f ( x2 ) = developed to process multiple evidences with
⎪ 100
⎪ 100− | x − 60 | inconsistence. In D-S evidence theory [8-9], first, the
⎪ f ( x3 ) = frame of discernment is defined as a space which
⎩ 100
consists of all possible results of the identified object,
Assumed that fuzzy variable x1 = 25 and x2 = 33 , then
which is notated as Θ . The set that consists of all the
for x1 = 25 , there is
subset of Θ is notated as 2Θ . For any set A in 2Θ , A
must meet that m( A) ∈ [0,1] , m(φ ) = 0 , And
3
685
respectively. The four situations composed a frame of Therefore, H c (mu ) < H c (mu′ ) , which indicates that
discernment.
In D-S theory, there are three functions: basic uncertainty of the fused evidence mu is less than that
probability assignment function m , belief function of mu′ , so, it is easier to make decision under situation
bel and plausibility function pl . Belief degree of A
of mu than under mu′ . In fact, from mu , we can find
is defined as the sum of basic probabilities of all
∑
that the possibility that the person to be identified as P2
subsets of A , bel ( A) = m( B ) .The rule of the
B⊆ A was much larger than the others, but for mu′ , it is not so
evidences fusion is [8-9] obvious that the person was P2 .
∑
Ek ∩ El = A
mi ( Ek ) m j ( El )
( mi ⊕ m j )( A) = . 2.4. Dynamic uncertainty
1− ∑ φ m ( E )m ( E )
Ek ∩ El =
i k j l
H c (mu ) = − ∑ mu ( A) ⋅ log 2 mu ( A) . (3) dynamic uncertainty, first define the states space
A∈2 Θ as Ω t2 = ( S1t2 , S 2t2 ,..., S nt2 ) , which is the set of all
H c ( mu ) indicates how much the fused evidence possible states at time t2 that can be reached from the
helps to make the decision, which can be understood as
state St1 at time t1 . Thus, the probability of each state
inconsistent degree of evidences. In the above example
of person identification, if the evidence fused from in states space to be reached can be specified by a
multiple sources is mu , mu is defined as mu ( A) = 0.2 dynamic probability assignment function p .
, mu ( B ) = 0.6 , mu ({ A, B}) = 0.2 . So, IUE can be p ( S t1 , S it2 ) means the probability with which the state
t
calculated: of thing transfer from S 1 at time t1 to Sit2 at time t2 ,
H c (mu ) = −(0.2*log 2 0.2 + 0.6 and must meet following equation:
*log 2 0.6 + 0.2*log 2 0.2) = 1.392 n
∑ p(S t1
, Sit2 ) = 1 .
If the fused evidence mu′ is defined as following: i =1
Now, based on above discussion about the dynamic
mu′ ( A) = 0.3 , mu′ ( B ) = 0.4 , mu′ ({ A, B}) = 0.3 , then uncertainty and the corresponding model, the entropy
IUE is representation of Dynamic uncertainty can be
H c ( mu′ ) = −(0.3* log 2 0.3 + 0.4 developed.
*log 2 0.4 + 0.3*log 2 0.3) = 1.57 .
686
The representation of dynamic p ( S t1 , Sit2 ) can be
rewritten as pi for short. Using the concept entropy, 4. Conclusion
dynamic can be notated as When various types of uncertainty are represented
H D ( p) = −∑ pi ⋅ log 2 pi . (4) by UE consistently, the uncertainty can be studied
i through the properties of information theory.
The dynamic uncertainty is developed to measure Correspondingly, the larger the IE is, the higher the
the unknown degree of the dynamic of thing in the uncertain degree is. For trying to decrease the
world. The dynamic of thing can be changed by uncertainty, the UE should be lowered. To do so, the
specific model m , through which, the state St2 can be thing being studied can be modeled to lower the
uncertainty and so to decrease the UE.
m changed
predicted from the state St1 . So the model
the dynamic probability assignment function p , the 5. References
changed function can be notated as pm . Through the [1] Deyi Li, Changyu Liu, Yi Du, Xu Han, “Artificial
state prediction model m , dynamic uncertain entropy Intelligence with Uncertainty”, Journal of Software., vol. 15,
m no.11, pp. 1583-1594, Nov. 2004.
(DUE) is changed into H d . The function of model
m can be understood to increase the probability of [2] Kanglin Peng, “The Measurement of Decision
Uncertainty By Shannon's Entropy”, Ming Hsin Journal, vol.
some states that is more possible in Ω 2 , while to
t
31, no.10, pp. 171-181, Oct. 2005.
decrease the probability of some other states that is less
possible in Ω 2 . That is, the model
t [3] C. E. SHANNON, “A Mathematical Theory of
m has changed the
Communication”, The Bell System Technical Journal, vol.
probability distribution in space Ω 2 , as made the
t
27, no.10, pp. 623-656, Oct. 1948.
distribution more focused on some specific states than
before. So the state prediction model should [4] H. DeGroot, J. Schervsh Probability and Statistics, 3rd
make H < H d . It indicates that the model ed., Springfield: Oxford University Press, 2005, pp.6-9.
m
d m
lowered the dynamic uncertain degree. [5] Lotfi A. Zadeh, “Fuzzy logic, neural networks, and soft
computing” ACM, vol. 37, no. 3, pp. 77-84, March 1994.
3. Uncertain entropy
[6] Christian Freksa, “Fuzzy Logic: An Interface Between
Logic and Human Reasoning” IEEE Expert, vol. 9, no. 4, pp.
Uncertain entropy (UE) is defined as the 20-24, Aug. 1994.
measurement of uncertain degree. In terms of the
definition of UE, UE can include random, fuzzy, [7] George Klir., “Fuzzy Sets: An Overview of
inconsistent and dynamic uncertain entropy etc. It is a Fundamentals, Applications, and Personal Views”. Beijing:
relative open definition. Beijing Normal University Press, 2000, pp.10-18
The properties of UE are similar to these of
information entropy, since they have similar [8] Ladyman, James, Presnell, Stuart, Short, Anthony J. “A
mathematical form. In the following, some properties simple view of the Dempster-Shafer theory of evidence and
its implication for the rule of combination”. Repository
of UE are given without being proved [3].
PhilSci Archive (United States). http://philsci-
①Continuous: H I ( P,1 − P) is a continuous function archive.pitt.edu/archive /00003009/01/InfoEntropy.pdf 2006.
of P(0 ≤ P ≤ 1) ;
[9] Chen et al., “A new fusion approach based on distance of
② Symmetric: H I ( P1 , P2 ,..., Pn ) has no relation to evidences” J Zhejiang Univ SCI, vol. 6A, no. 5, pp. 476-482,
the order of P1 , P2 ,..., P ; March 2005.
687
2008 International Conference on Intelligent Computation Technology and Automation
689
⎧τ = σ α1TN + α 2TN 2 + α 3TN 3 + K 0 = K
⎪
⎨ 2r (3) so F ( x, T ) is defined by the equation as follow
⎪⎩ε = πD 2 N x
F ( x, T ) = ( K 0 + α 1T + α 2T 2 + α 3T 3 ) x
where D is diameter of SMA spring, N is the number
of spring circle, x is displacement of SMA spring, + Ex 2 + Hx 3 + Jx 3 (6)
Both the hysteresis of the strain-stress curve of
x = x1 − x2 . SMA and the nonlinearity of the stiffness-temperature
The resilience of SMA spring can be shown as curve of SMA were considered in the expression of
4π
d
F ( x, T ) . It can describe the different courses in
F ( x) =
D ∫
0
2
τr 2 dr = Kx + Ex 2 + Hx 3 + Jx 3 cyclic loading test well. Moreover, it admits the
existence of error of controlling temperature. Linear
(4)
SMA models, such as Nitzsche-Breitbach-Elmar model
where d is diameter of SMA wire, K = φd
4
, or Landau-Devonshire model, can only be applied in
8D 2 N the region between TM and T A , and SMA
χd 5 αd 6
E= , H= , temperature must be controlled rigorously, otherwise
10πD 4 N 2 12π 2 D 7 N 3 great error will be brought. Obviously, the model
βd 6 above will bring many advantages to vibration control.
J= .
12π 2 D 7 N 3
In the resilience of SMA spring shown as eq.(4), 3. Stability and bifurcation of suspension
only the hysteresis of the strain-stress curve of SMA system
was considered. However, temperature can also affect
the stiffness of SMA. Some researchers think that the In controlled state, control rules will affect the
variation of the stiffness of SMA is linear. In fact, the stability and bifurcation characteristics of suspension
variation of the stiffness of SMA with temperature is system and cause different control effects. Here we
caused by phase conversion from martensite to only study dynamic characteristic of suspension system
austenite. There are initiative temperature TM and with SMA spring in uncontrolled state.
In uncontrolled state, the temperature of SMA is the
terminative temperature T A in SMA phase conversion. normal temperature TN . Therefore
The stiffness of SMA only varies linearly
approximatively between TM and T A , and hardly
F ( x, TN ) = Kx + Ex 2 + Hx 3 + Jx 3 (7)
varies in other temperature regions. Therefore, some where x = x1 − x 2 .
researcheres used subsection function to describe the Let x1 = z1 , x 2 = z 2 , eqs.(1) can be shown as
variation of the stiffness of SMA in different
temperature regions, which is hard to be analyzed. In ⎧ x1 = z1
this paper, arctangent function was introduced to ⎪ z = F − a ( x − x )
describe the varying course of SMA stiffness with ⎪ 1 1 1 1 2
⎨ (8)
temperature.
⎪ x 2 = z 2
According to Fig.4 and supposing that the stiffness-
temperature curve of SMA is symmetrical about the
⎪⎩ z2 = F2 + b1 ( x1 − x2 ) − b2 x2
point P ( TP , K P ), we obtained the approximative Fc Fc + k 2 q Fc + k 2 A sin ωt
where F1 = − , F2 = = ,
relationship between stiffness and temperature as m1 m2 m2
follow
Fc = c ( z1 − z 2 ) + J ( z1 − z 2 ) 3 + E ( x1 − x2 ) 2 + H ( x1 − x 2 ) 3
K (T ) = μ arctan[υ (T − TP )] + K P
K K k
Transforming arctangent function to multinomial , a1 = , b1 = , b2 = 2 .
function in Taylor series, we obtained m1 m2 m2
K (T ) = α1T + α 2T 2 + α 3T 3 + K 0 (5) The first-order nonlinear approximate solution in
averaging method is
At normal temperature TN , the rigidity K (TN )
x1 = A1ϕ11 (θ ) + A2ϕ12 (θ )
should be K , the restriction condition is
z1 = A1ϕ 21 (θ ) + A2ϕ 22 (θ )
690
x2 = A1ϕ 31 (θ ) + A2ϕ32 (θ ) 2) System is stable when c11 − c13 cosϑ1 < 0 and
z 2 = A1ϕ 41 (θ ) + A2ϕ 42 (θ ) c21 − c23 cos ϑ2 < 0 ;
where ϕ1k = cos(λk t ) , ϕ 2 k = −λk sin(λk t ) , 3) Pitchfork bifurcation will appear when
a1 − λ 2
λ (a − λ ) 2 c11 − c13 cosϑ1 = 0 or c21 − c23 cosϑ2 = 0 ;
ϕ 3k = cos(λk t ) , ϕ1k = − k 1
k
sin(λk t ) ,
k
a) Subcritical Pitchfork bifurcation will
a1 a1
k=1, 2. appear when ci1 − ci 3 cosϑi = 0 and
λk (k = 1,2) is defined by the equation as follow ci 2 > 0 i = 1,2 , which is shown in
λ 4 − λ 2 (a1 + b1 + b2 ) + a1b2 = 0 (9) Fig.6-1;
b) Supcritical Pitchfork bifurcation will
so
appear when ci1 − ci 3 cosϑi = 0 and
1
λ12 = ⎡(a1 + b1 + b2 ) − (a1 + b1 + b2 )2 − 4a1b2 ⎤ ci 2 < 0 i = 1,2 , which is shown in Fig.
2⎣ ⎦
1 6-2.
λ22 = ⎡(a1 + b1 + b2 ) + (a1 + b1 + b2 ) 2 − 4a1b2 ⎤ c11 − c13 cosϑ1 > 0 or
2⎣ ⎦ 4) System is unstable when
Ak (k = 1,2) is defined by the following equations c21 − c23 cosϑ2 > 0 .
⎧ dA1
⎪⎪ dt = c11 A1 + c12 A1 − c13 A1 cosϑ1
3
⎨ (10)
⎪ dA2 = c A + c A3 − c A cosϑ
⎩⎪ dt
21 2 22 2 23 2 2
where
1 1 a1 − λ12 cλ12
c11 = − ( − ) , Fig.6-1 Subcritical Pitchfork Fig.6-2 Supcritical Pitchfork
Δ1 m1 m2b1 2a1 Bifurcation bifurcation
691
5. Acknowledgements
The authors gratefully acknowledge the support of
the Key Item of the Natural Science Foundation of
China (NSFC-Key) through grant no. 10732020 and
the Chinese Postdoctoral Foundation (CPF) through
grant no. 2004035148.
6. References
Fig.8 Time histories and Phase diagram of m2 when
J = 25000 Ns 3 / m 3 [1] M.M. Rashid, M.A. Hussain, N.A. Rahim, “Application
of magneto-rheological damper for car suspension control”,
Journal of Applied Sciences, 2006, 6(4), pp. 933-938
692
2008 International Conference on Intelligent Computation Technology and Automation
Set Pair Analysis for Mass Rapid Transit Grey Model Selection
Chen Wang, Jun Chen
Southeast University
atalandisi@163.com
Abstract
The mass rapid transit system is essential both to The grey number can be defined by
− + − +
rational utilization of the economical resource and a (⊗) ∈ [ a , a ], −∞ ≤ a ≤ a ≤ +∞ .When
optimization of overall arrangement of urban land use. − +
Choice models diffusely used in China now are largely −∞ ≤ a = a ≤ +∞ ”, “ a (⊗) ”is a certain number (white
based on the certain values which fall short of the − +
number).When“ −∞ ≤ a < a ≤ +∞ ”, “ a (⊗) ” is a
practice. In this passage, grey numbers are used to
black number.
estimate the practical situation and the set pair analysis is
In this passage, a grey model for Mass rapid Transit
introduced to determine the best choice. The example of
Selection will be established for the grey numbers which
Yangzhou city in China is taken to validate the feasibility
are imprecise are more authentic than the numbers which
of the model. Based on the indices’ values which are
are precise.
derived from the data collected by investigation and
calculated by Delphi method and indices’ Weights
decided by the AHP, the decision-making matrix is 1.2 Set pair analysis
established to acquire the set pair potential which can
determine the rank of the options to be chosen. By The set pair analysis (SPA), proposed by Keqin Zhao
calculation, among three choices (Sub way, LRT, BRT), in 1989, is a modified uncertainty theory considering both
BRT model which has the highest potential is finally certainties and uncertainties as an integrated certain and
adopted in the city. uncertain system and depicting the certainty and
uncertainty systematically from three aspects as identity,
1. Introduction discrepancy and contrary. The uncertainty analysis has
been applied to some transportation research for the
transportation science has too many uncertain factors.
Mass rapid transit system contains Light Rail Transit
Set pair refers to a couple that consists of two
(LRT), Rapid Rail Transit (RRT), Bus Rail Transit (BRT),
interrelated sets. The basic idea of SPA is to analyze the
electric trolley buses, etc. Nowadays in china, with the
features of a set pair and set up a connection degree
economy increasing rapidly, many small cities are
formula of these two sets including identity degree,
becoming larger with the increasing pressure of
discrepancy degree and contrary degree under certain
transportation and traffic correspondingly. Under this
circumstances. Based on the connection degree formula, a
situation, mass rapid transit is imperative to be
series of SPA-based researches have been conducted.
constructed in these cities in the future. How to choose a
Putting together set A and B to form Set Pair M with
kind of the mass rapid transit based on the different
respect to the Problem O, give the definition of the
situation and demands of different cities is now a new
connection degree of Set Pair M as Eq.(1):
problem which we must face and there should set up some
S F P
choice system or model for us to use in China. μ ( w) = + i+ j (1)
N N N
1.1 Mass rapid Transit Grey Mode where S represents the number of identity
characteristics, N denotes the total number of
In traditional choice model of multi-attribute characteristics of the set pair, i is the connection degree
assessment in transportation in China, the indices mostly of the set pair, P is the number of contrary characteristics,
use the certain numbers [1]-[4]. However, in practice, F = N-S-P is the number of the characteristics of these
many attributes in transportation system are uncertain two sets that are neither identity nor contrary, S/N,F/N,
because of human factors and so on. In mass rapid transit and P/N represent the identity degree, discrepancy degree
selection, many attributes which should be considered are and contrary degree of these two sets respectively, j is the
uncertain. Consequently, the values of these attributes coefficient of the contrary degree, and is specified as-1.
should be grey numbers which are existed between an As the coefficient of the discrepancy degree, i is an
internal. It has been used in some other models. [5]- [7] uncertain value between -1 and 1, in terms of various
694
a
rk = k (11) Based on the consultation of the experts, 9 indices
ck should be calculated totally. These indices set up a indices
Larger the value is, better the situation will be. system for choice of mass rapid transit. There are total
cost, construction cost, passenger transport ability,
running velocity and trip charge, impact of environment
3.Case study and resources, safety, coordination with utilization of land
and coordination with increase of population.
Apply the SPA to the transportation planning case. The indices which can be quantized are system cost,
2 construction cost, ability of passenger transport, running
Take Yangzhou, China for example. The city is 118 km
and the population is 1 million. It will become metropolis velocity and trip charge. As to the indices which can be
in the next few years. However, with the population and quantized, the values can be obtained by the statistics
size of the city becoming larger and larger, the traditional surveyed while others (impact of environment and
transportation can not reach the demand of the city. The resources, safety, coordination with utilization of land and
mass rapid transit should be taken into account to urban coordination with increase of population) can not be
planning. SPA had been introduced to tackle the issue for quantized; the improved Delphi method is introduced to
the choice among subway, LRT and BRT. get the values. It supply 5 grades (the value is accordingly
5, 4, 3, 2, 1) to choose and every experts could give a grey
number. Collect all the grey numbers and make a
3.1 Values of indices statistical analysis. Carry on the circulation computation
several times and finally get a credible result.
According to the specific condition of the urban The matrix of indices’ values can be calculated.
transportation planning, the assessing indices are defined (Table1)
by the various existing assessing indices of urban Standardize the values to get the new matrix. (table 2)
transportation planning.
695
3.2 weights of indices
The indices contain two layers: the criteria layer and service (form A3 to A5 and A7), and coordination
the index layer. Use the Analytic hierarchy process (AHP) (A8andA9) and environment (A6).
to determine the weight of each index. The nine indices Use C1 to C4 to describe the four parts in turn.
can be separated into four parts which can be defined as The judgment matrix of criteria layer and index layer
criteria layer, including cost (A1andA2), function of are shown in Table 3, 4and 5.
Firstly, the indices of benefit and the indices of cost M ⊗ ={[0.6,0.1],[0.833,1], [0.214,0.286], [0.429,0.514],
can be determined. The indices of benefit are A3, A4, A7- [0.6,1], [0.5,1], [0.375,0.5], [0.333,0.5], [0.4,0.6]}
A9 while the cost A1, A2, A5, A6. With the equations [7] and [8] mentioned in the
Based on the standardized matrix of the values of paragraph 2, the matrix of the connecting degree, that is,
indices and the sort of each index, establish optimal the decision-making matrix can be made. (Table 6)
evaluation set M ⊗ and the worst evaluation set M ⊗ From the table 6, with the equations [9], [10] and [11]
depending on the matrix and by the eqs.[3]-[6]: the set pair potential of each choice can be calculated.
(Table 7)
M⊗ Tab.7 matrix of set pair potential
={[0.08,0.2],[0.056,0.111],[0.714,1],[0.857,1],[0.08,0.2],[ Sub way 0.58731+0.7194j r1=0.79669
0.033,0.2],[0.875,1],[0.9,1],[0.8,1]} LRT 0.48081+0.5455j r2=0.88135
BRT 0.999+0.5876j r3=1.73412
696
From the final results, the decision can be made by the situation. Consequently, BRT will be a best choice for
potential r. For r1<r2<r3, the mode of BRT be the best Yangzhou city.
Tab.6 Decision-making matrix
A1 A1 A3 A4 A5 A6 A7 A8 A9
Subway 0.152+1. 0.082+1. 1.000+0. 1.000+0. 0.152+1. 1.000+0. 1.000+0. 0.438+1. 0.556+1.
000j 000j 294j 501j 000j 155j 459j 000j 000j
LRT 0.429+0. 0.246+0. 0.467+0. 0.685+0. 0.464+0. 0.153+0. 0.733+0. 0.614+0. 0.778+0.
375j 333j 666j 737j 325j 5j 629j 699j 700j
BRT 1.000+0. 1.000+0. 0.292+1. 0.503+1. 1.000+0. 0.085+1. 0.467+1. 1.000+0. 1.000+0.
175j 091j 000j 000j 175j 000j 000j 422j 540j
4. Conclusion
[3] C.S. Chang, W. Wang, A.C. Liew, and F.S. Wen,
With the rapid progress of urbanizing in China, many "Bicriterion optimisation for traction substations in mass
middle and small cities in China are running for rapid transit systems using genetic algorithm", IEE Proc-
metropolis. With the increasing demand of transportation Electr. Power Appl. vol 145, No.1, Jan 1998
and traffic, it’s time for mass rapid transit to be adopted. [4] C.S. Chang and B.S.Thia, "Online Rescheduling of mass
Many choice model for mass rapid transit used in China rapid transit systems: fuzzy expert system approach", IEE
are established based on the certain values .To get a more Proc-Electr. Power Appl., vol. 143, No.4, July 1996, pp.
precise and authentic result, a new model for mass rapid 307-316.
transit selection is set up. There main innovations are [5] Lai, V. S., Wong, B. K. and Ceung, W, “Group decision-
making in a multiple criteria environment: A case using the
listed below: AHP in software selection”, European Journal of
(1) All the values in the model which are grey numbers Operational Research, 137, 134-144.
are in accord with the practice for it is more precise to [6] C.M.Mi, S.F.Liu, Z.G. Fang, “The Driver’s Shortest Path
evaluate a situation with an uncertain number. Decision-Making Model And ITS Algorithm Study Based
(2) Set pair analysis invented by Mr. Zhao which has On Grey Number Superiority Relationship”, Proceedings of
advantage as a simple mathematic depiction with clear the Fifth International Conference on Machine Learning
physical meaning is taken to calculate the model. Based and Cybernetics, Dalian, 13-16 August 2006.
on the best and worst values of the indices, the identity [7] Z.G.Fang, S.F.Liu, F.Lu, “Study on Improvement of Token
degree and contrary degree of the set pair and the decision and Arithmetic of Interval Grey Numbers and Its
GM(1.1)Model”, Engineering Science. VOL, 7, NO, 2.
matrix are set up. Based on the set pair potentials 2005:58-61
calculated by the degrees, the best choice is found easily [8] Keqin Zhao. Set pair analysis and its preliminary
and accurately. applications. Zhejiang Science and Technology Press,
(3) The example of transportation planning for Hangzhou, 2000.
Yangzhou city in China is taken to validate the feasibility [9] Y.L.Jiang, Y.T.Zhuang, Z.X.Li, H.P.Cao, “Application of
of the model. Set Pair Analysis in Urban Planning Project
Comprehensive Evaluation”, IEE Proceedings of the Fourth
International Conference on Machine Learing and
5. Acknowledgement Cybernetics, 18-21, August 2005.
[10] L.H. Feng, X.C. Zhang, J.L. Gong. “Statistical forecast of
This research is supported by National Basic Research change tendency of water resources based on the set pair
Program of China (Project 2006CB705500) and National analysis”, Hydrology 2004;24(2)
High-tech R&D Program (2008AA11Z201).
6. References
697
2008 International Conference on Intelligent Computation Technology and Automation
Where:
Considering the information sources and study T -The number of network hierarchy;
targets, this article only conducted simulation with M i - The weight value of lower layer to the overall
SIMMOD package for Guangzhou APP and Zhuhai
Terminal Control Area, as well as the multi-airport goal, namely the importance index of each level of
system which composed by Guangzhou, Shenzhen and network;
Zhuhai airport. Li (θ ) -The objective function value of each level of
Based on the data and information from Civil network.
Aviation Airport Utilization Guide, aviation chart and Using the total flight delay cost in the network as
field investigation, the detailed description of airport the index to quantificational assess the system,
ground surface, airspace as well as the air traffic according to a technical report [7] which compiled by
situation were input to SIMMOD and the simulation Geisinget of FAA, it is known that, for the average
scenario was then established. The simulation input flight, taxiway delay cost 2.38 times more than air
data generally include: airport, facility, relevant airport, traffic controller-induced gate-holding delay, and
runway and taxiway layout (DXF format), airspace airborne delay cost 3.86 times more than gate-holding
chart, runways, taxiways, gates, details of airspace delay per hour. To minimize the delay cost of the
structure, flight schedule, fleet mixes, historical wind whole network, in terms of p flights, the objective
direction, the runway operational procedures(including function of each level of network is as follows:
takeoff/ landing distance and time interval), departure Li (θ ) = mgi (θ ) + 2.38mti (θ ) + 3.86mai (θ ) (2)
queue location and capacity, taxiways
Where:
operation(including location, overtake rules, speed,
θ - The time of the flight entering the system,
direction, the restriction of use), gate
operation(including location, capacity, blocking state, θ ∈Rp;
way of push out, maximum allowable aircraft type)etc. m gi (θ ) , mti (θ ) and mai (θ ) are the total number of
Through parameters setting for speed, route, gate, taxiway, and airborne delay time of all p flights
altitude, time, interval and control strategy etc., to the i th level.
SIMMOD can simulate the entire movement process of
Here, the multiple objective functions of the multi-
aircraft. Consequently it can accurately describe the
level network model transforms into one objective
actual situation of aircraft operation. After simulation
function as:
running, SIMMOD can output data such as aircraft T
flight time, the capacity and flow of airspace or airport, L(θ ) = ∑ ( M i * Li (θ ))
location and causes of delay and fuel consumption etc. i =1
T
(3)
3. The multi-level programming model = ∑ [ M i * (mgi (θ ) + 2.38mti (θ ) + 3.86mai (θ ))]
i =1
based on the importance of the route As the airport being a special network node, in the
network nodes nearby area, it’s importance is higher than that of other
nodes on the route, therefore, it is feasible to use the
In the route network, the traffic flow, type of air airport as hub nodes and as the basis for hierarchical
route and geographical location of each network node division of network. When the importance of airport
(city airport or frontier in and out point) are different, and surrounding region are used as the basic criterion
therefore it has different importance for the political, of network hierarchy division, the objective function of
economic, social and other aspects. This causes that the aforementioned multi-level programming model
each network node is ranked among different levels transforms into one objective function as:
and formed hierarchical network design based on the T
importance of nodes. With this multi-level L(θ ) = ∑ (M
i =1
i * Li (θ ))
programming model the optimum solution both for the (4)
T
∑[m * w * (m
whole and the individual in a local area can be
= i i gi (θ ) + 2.38mti (θ ) + 3.86 mai (θ ))]
guaranteed. i =1
For multi-level programming model, during the Here T is the number of airports.
process of solving, multiple objective functions can be Taking into account that the impacts of each flight
combined into one objective function by introducing upon the flight delay costs of various airports are
weights. It is:
699
different, the importance index M i of each level of different ranks, so mi was assumed to take the values of
network is decomposed into two components 1, 2, 3 respectively. The weights chosen here are just
wi and mi : trying to verify whether this optimization method and
wi -which represents the impact of the flight on the model is applicable to such problems. Many methods
such as questionnaire investigation etc. can be used to
airport delay cost, that is, the non-base flight has less or determine the weights. This is a problem need to be
even no impact on the airport flight delays. It depends studied in the future to further improve the
mainly on the conflict of routes used by this flight and optimization model.
the base flight.
mi -the airport its own weight, which is the 4.2. SPSA optimization
importance index of the airport being a network node. The simultaneous perturbation estimate gˆ k (θ k ) of
the gradient can be obtained based on the simulation
4. Simulation optimization of multi-airport output. This is one advantage of SPSA algorithm which
system in Pearl River Delta only requires measurements (possibly noisy) of an
objective function to form gradient estimates and
4.1. Optimization model
converge to a local optimum. The SPSA algorithm
The flight delay cost of multi-airport system in Pearl attempts to find a local minimum θ ∗ by starting at a
River Delta was optimized using above mentioned fixed θˆ0 and iterating according to the following
multi-level programming model. Guangzhou, Shenzhen
and Zhuhai Airport are considered as three network scheme:
nodes with different importance. In our problem we θˆk +1 = π Θ (θˆk − ak gˆ k (θˆk ) − ak rk pˆ k (θˆk )) (7)
consider as one constraint the goal to effect a 40%
reduction in flight delay cost.
( )
Here pˆ k θˆk is an estimate for the gradient of the
Following the method of Wang and Spall [8], the penalty function.
goal-defining constraints can be placed in the penalty
function using a class of penalty functions defined by:
1
P( x) = max( x,0) β (5)
β
where 1 ≤ β ≤ 2 . Our goal is to reduce 40% of the delay
cost, so the penalty weight rk is set to 0.4. In addition,
since we expect that the penalty function is stable and
converges and also sensitive to perturbation, so the
absolute value function was chosen as the penalty
function, that is, in the formula(5)let β = 1 .
The optimization model was then obtained by
adding a penalty term in (4):
T
∑ (M * L (θ )) + r
1
min L(θ ) + rk P(θ ) = max(ΔL(θ ),0) β
β
i i k
i =1
T
= ∑[m * w * ( m
i =1
i i gi (θ ) + 2.38mti (θ ) + 3.86mai (θ ))
Figure 1. The flow chart of Simulation optimization
1
+ rk max(L(θ ) − L(θ 0 ),0) β
700
want to increase the amount of flight while controlling
5. Main results the delays in acceptable extent, it needs to adjust the
routes structure, or change the operating procedures
We obtained the optimized flight schedule that and rules. This is the system capacity bottlenecks
achieved the delay cost reduction goal described above. reflected by simulation optimization of Guangzhou
The departure and arrival flights distribution in three airport flight operations.
airports are shown in Figure 2. For Shenzhen Airport, the taxiway delays have a
significant reduction after optimization and some
35
taxiway delay have been converted into gate holding
30 delay. For the airborne delay, the peak value decreased,
25 but its distribution range has extended. This is mainly
20 caused by the coefficient selection of the objective
15 function.
10 When there is congestion in airspace, compared to
5 Shenzhen airport, the airborne delay weight value of
0 Guangzhou Airport is greater. The arrival and
00:00 03:00 06:00 09:00 12:00 15:00 18:00 21:00
- - - - - - - -
01:00 04:00 07:00 10:00 13:00 16:00 19:00 22:00
departure flights in Guangzhou Airport have priority
use of the airspace resources. So the flights in
ZGSDARR ZGSDDEP ZGSZARR ZGSZDEP ZGGGARR ZGGGDEP Shenzhen airport should wait in the air or adjust the
Figure 2. The departure and arrival flights speed, this caused that the delay distribution range
distribution of each airport (optimal solution) extended. The reduction of the peak value of airborne
We also analyzed the changes of the whole system delay was mainly gained by the optimization.
delay at the gate, on the ground, and in the air during The airborne delay times of arrival flights in Zhuhai
the optimizing process. There is significant reduction airport increased because of the weight value choice,
for the gate position waiting time, and the taxiway which has been explained above. Although in the
waiting time in the mid-prophase. For the delay in the actual operation, these weight values may be not
air, throughout the iterative process of optimization desirable, but it’s feasible to be applied to verify the
there is only a slight reduction, which shows that the effectiveness of the model in theory. From this point of
flight operation based on the current route network has view, the model and optimization method proposed in
reached saturation, it will not produce tangible results the paper is effective and sensitive. If we properly
to adjust the flow by controlling the ground waiting adjust the parameters of the model, it can be concluded
time. If it needs to further increase the capacity and that we can obtain good flight schedule optimization
flow, it is necessary to adjust the geometric layout and results based on the route network. As mentioned
structure of the route network. above, the determination of appropriate parameters will
In addition, the weight value choice of each route be the subject of future research. It may also be
nodes has an impact on the optimization scheme. For preferable to add the waypoint’s importance weight
example, the choice of weight value described as value into the model.
section 4.1 directly produced the result that the
Shenzhen airport taxiway waiting time having a greater 6. Conclusions
impact on the objective function value than the Zhuhai
airport delays in the air. This is also one reason why the Multi-airport system simulation optimization can
proportion of the air delay increased during the final make full use of the advantages of the air traffic
stage of iteration. simulation packages. It has great development potential
The flight delay of the optimal solution can also be in air traffic optimization domain. Based on the
compared with that of current flight schedule for each restricted SPSA optimization algorithm and the theory
airport. of multi-level programming model, an area multi-
For Guangzhou airport, the taxiway delay and gate airport system optimization model and algorithm was
holding delay reduced greatly, however, the airborne proposed. In our model we took into account of the
delay didn’t decrease significantly. This shows that, importance of the network nodes in the multi-airport
with the restrictions of current airspace structure, system and the goal restriction.
operational procedures and rules, it is unable to reduce It confirmed that the delay cost can be reduced in
the flight delays by adjusting the aircraft operation or accordance with the goal expectations by simulation
arranging reasonable flight schedule. The air traffic optimization of the Pearl River Delta multi-airport
flow has reached the capacity of the airspace. If we system. In addition, according to the statistical analysis
701
of data, it can clearly identify where the crux of the
problems and bottlenecks are in existing system, and
provide initial reference for verifying the feasibility of
various improved measures.
7. Acknowledgements
This work was supported by a grant from the
National High Technology Research and Development
Program of China (863 Program) (No.
2006AA12A105)
References
[1] Zhang Yue, Research on Harmonized Operation of
Regional Multi–Airport System of ZhuJiang River
Delta, Paper for degree of Doctor of Philosophy,
School of Transportation Engineering, Tongji
University, 2007.
[2] Wang Feng, Ma Shoufeng, He Guoguang, “A Study on
Flight Timetable Optimizing Model”, Journal of
Systems Engineering, vol.11, no.1, pp.50-56, 1996.
[3] Hu Minghua, Zhu jingbo, Tian Yong, “Research of
Multi-Restrict Airline Schedule Optimization Model
and Method”, Journal of Nanjing University of
Aeronautics & Astronautics, vol. 35, no.3, pp. 326-332,
2003.
[4] Nathan L. Kleinman, Stacy D.Hill, Victor A. Ilenda,
“SPSA/SIMMOD Optimization of Air Traffic Delay
Cost”, Proceedings of the American Control
Conference, pp. 1121-1125, 1997.
[5] Nathan L. Kleinman, Stacy D.Hill, Victor A. Ilenda,
“Simulation Optimization of Air Traffic Delay Cost”,
Proceedings of the 1998 Winter Simulation Conference,
pp. 1177-1181, 1998.
[6] David W. Hutchison, Stacy D.Hill, “Simulation
Optimization of Airline Delay with Constraints and
Multiple Objectives”, Proceedings of the Fourth
International Symposium on Uncertainty Modeling and
Analysis, pp. 417-422, 2003.
[7] K.Geisinger, Airline delay: 1976-1986, Technical Report
FAA-APO-88-13, Federal Aviation Administration,
Washington, DC, Mar. 1989.
[8] Wang I.-J., and J. C. Spall, “A constrained simultaneous
perturbation stochastic approximation algorithm based
on penalty functions”, Proceedings of the American
Control Conference, pp. 393-399, 1999.
[9] J.C.Spall, “Implementation of the Simultaneous
Perturbation Algorithm for Stochastic Optimization”,
IEEE Transactions on Aerospace and Electronic
System, vol. 34, pp. 817-823, 1998.
702
2008 International Conference on Intelligent Computation Technology and Automation
Automobile gasoline engine operates mostly under 2. Fuel Film Dynamic Model
transient condition, the working parameter of gasoline 2.1 Costumed Fuel Film Model
engine such as throttle degree; engine rotate speed and
engine load during the actual operating process are The Aquino fuel film model (abbreviation A model)
variable. The air-fuel ratio control is especially difficult is described that fuel mass minj injected, of which a
to be carried out in throttle transients because of the
complexity of relevant air flow and fuel flow part enters the cylinder directly in the fuel vapor form;
evaporation dynamics and the time delay of another part deposits on the intake manifold wall to
transmission. For EFI gasoline engine, Injected fuel is form fuel film. Fuel film evaporates at 1 / τ f speed
near to intake valve so that a fraction of injected fuel ratio on and on, and evaporative fuel vapor and the
which collides with intake port and intake valve surface above fuel vapor enter cylinder together. Fuel film
is deposited on the wall as liquid film. During transient dynamic model of gasoline engine may be described by
condition fuel film dynamics is destroyed, which the follow mathematical formula.
makes the fuel quantity from nozzle and fuel quantity m ff
into the cylinder not be equaled. To control emission of m in = (1 − x ) m inj + τ (1)
f
gasoline engine, the catalytic converter always is used m ff
which requires that air fuel ratio must remain at a m ff = xm inj − τ (2)
f
physical meaning of a model is equal to H model. Take Where τ v is the time constant of fuel film
A model as object, the A model is analyzed in detail in
this paper. fv respectively is the mass flow
transiting,[5] m fv and m
of fuel film evaporating and mass flow rate of fuel film
2.2 A Model Analysis evaporating in the intake port. The most different
between new model and a model is that injected fuel,
The dynamics balance of fuel film formation rate of which a part enters the cylinder directly in the fuel
and evaporation rate is built up by a model in stable vapor form, and evaporative fuel vapor and the above
condition. The main reason which A model produces fuel vapor enter cylinder together need to be entered in
tremendous error under transient condition is that time the cylinder after τ v time, τ v can be shown by the
constant of fuel evaporating ( τ f ) and fuel distribution induction air flow equation of intake port [6].
coefficient ( x ) of A model is hardly accurate identified. ρlA
According to [4], fuel distribution coefficient ( x ) is τv = c (8)
mac
directly related to throttle position because fuel is Where, ρ is gas density of intake manifold; l is the
immediately injected on the throttle valve. Fuel
distribution coefficient is regarded as an approximate distance between fuel nozzle and intake valve; mac is
constant due to the variable of throttle angle is fast and the air flow in the cylinder; Ac is the section area of
the time of this process is short. Besides, the
intake manifold. The section area of intake manifold
relationship between time constant of fuel evaporating
and the distance of nozzle and intake valve is a very
( τ f ) and intake port temperature is intimate so that
little constant, so τ v is approximately treated as zero in
704
fv is equal to
the light of equation (8). Consequently, m engine rotate speed, τ f is affected by the velocity of
zero and the new model presented in this paper is to airflow behaving in two parts. On the one hand, when
become A model. Besides, τ v should be calculated the velocity of airflow accelerates, which makes fuel
film evaporation is quickly moved and contributes to
according to equation (9) in this paper. the fuel film evaporate. On the other hand, airflow
m
τv = ma (9) makes fuel film expand to liquidity direction, increases
ac the area of fuel film and makes for fuel film evaporate,
Where ma is the air flow of intake pipe; Injected τ f is affected by intake pipe wall also behaving in
fuel which a part enters the cylinder directly in the fuel two section. The heat transfer of fuel film is
vapor form; the other part deposits on the intake strengthened by the raise of intake pipe wall
manifold wall to form fuel film. In fuel film, of which a temperature, which makes the increase of fuel film
part enters in the cylinder in means of evaporating with temperature. On the second place, the raise of wall
air flow, the other part enters in the cylinder by flowing, temperature promotes the viscosity of fuel film to
therefore, the intake port is full of fuel evaporation, and decline, which makes fuel film expand easily and
fuel evaporation of intake port is variable. The constant increase the surface area of fuel film. So the
of τ v is described as the time of fuel evaporating form evaporation of fuel film is strengthened by the two
to enter in the cylinder, which the variable range is factors.
increasing when the liquidity fuel evaporation of intake The variable of fuel film parameter is related to
port is strengthened. Therefore, it is reasonable for engine rotate speed and intake pipe wall temperature.
According to [9], the affected fuel film parameter
equation (9) to calculate τ v constant. ma And mac is factors are simplified. The intake pipe wall temperature
computed by the method of speed and density is stable when engine works in a period of time.
according to [7].The constant of τ v is shown as follows. Therefore, engine rotate speed is the main factor of fuel
120V film parameter, which can be calculated by the engine
τ v = nV ηm (10) operating condition point. It is shown as follows.
d v −4
Where Vm is intake pipe volume; n is the engine x = 10 n + 0.42 (11)
−0.65
τ f = 7.27 n (12)
rotate speed; Vd is the engine displacement; ηv is
Where n is engine rotate speed (rad/s).
charge efficiency.
It is an important parameter for τ f and x to affect
3. Simulation Result Analysis Of Dynamic
the accuracy of fuel film model. Many scholars make
an intensive study on it. The variable discipline of fuel Fuel Film
film parameter is obtained by lots of gasoline engine
condition experiments according to [8, 9]. Seen from The mean value engine model is established in this
[8, 9], x is mainly related to engine rotate speed and paper, which mainly consists of three subsystems such
as the air-flow dynamics, the fuel-flow dynamics and
intake pipe wall temperature. Fuel and air mix is
promoted by the rotate speed increasing, and contribute the crankshaft dynamics. The costumed fuel film model
to fuel and air vaporize. Moreover, it is useful for the is particularly introduced in section two of this paper
vaporization of fuel and the increase of intake air and a new fuel film model is also advanced. The
detailed modeling process of air-flow dynamics and the
temperature to the raise of intake pipe wall temperature,
which makes the fuel into fuel film decline. crankshafts dynamic is shown in [6]. Under the
environment of SIMULINK, a simulation model of
The constant of τ f is also related to engine speed
mean value engine model is built up, which takes
and intake pipe wall temperature. The velocity variable HL495Q engine as simulation engine in this paper.
of fuel film surface is attracted by the variable of
705
3.1 The Simulation Of Throttle Angle the time constant of fuel film transiting is in a narrow
Changing From 10 Percent To 30 Percent range when the variable of throttle degree is in stable
condition. Although the variable of τ v constant is
The variable of throttle position is shown on Fig 1. neglected in a model, which can accurately
The simulation result with air fuel ratio variable of two approximate the variable of actual air fuel ratio. The
fuel film models is shown on Fig2. accuracy of fuel film model presented in this paper is a
The variable of throttle degree is displayed on Fig 1 little superior to a model. During the narrow variable
such as the initial degree is 10 percent, and the throttle range of throttle degree, τ v is in a narrow range, which
degree is turned on 30 percent from 2 second to 8 can not be neglected in stable condition and affected by
second, and the throttle degree is closed to 10 percent the variable of airflow in the intake pipe and airflow
until 10 second. The time of simulation is 10 second. into the cylinder. Therefore, τ v is considered as a very
small constant in the narrow variable of throttle degree.
The fuel quantity of injected fuel into the cylinder is
close to testing data by using the new fuel film model
presented in this paper. It is show that the air fuel ratio
variable of new model presented in this paper is
identical with experiment data in Fig2.
706
4. Conclusions
707
2008 International Conference on Intelligent Computation Technology and Automation
To simplify the analysis with enough accuracy, the Where Sx(ω) is power spectral density(PSD) of rail
following assumptions are used: (1) The carbody, track as the input excitation from American Railway
bogies, wheel-sets are regarded as rigid components, Standard, ωk (k=1,N) are the lower and upper limit
neglecting their elastic deformations during vibration. frequencies in the frequency domain, Δω is the
(2) The connections between these components are frequency band and φ is a random variable with
represented by two linear springs and two viscous uniformity distribution in 0-2π and independent each
dashpots of the same properties in three directions. other.
The vehicle is modeled as a multi-body system with
23 Degree-Of-Freedoms (DOFs). The carbody and the 2.5. Equations and solutions
two trucks are assigned respectively 5 DOFs, which are
vertical, lateral, pitch, roll and yaw, while each wheel- Finally, the dynamic equations of vehicle-track
set is assigned 2 DOFs, i.e. lateral and yaw, system are written as:
respectively. (2)
(3)
2.2. Track model Where the subscripts “v” and “t” represent the
vehicle and track; M, C, K denote the mass, damping
Track structure consists of rail, concrete slab and and stiffness matrices, x , x , x denote the vectors of
foundation. The rails are modeled as Euler beam laid accelerations, velocities and displacement; Fv and Ft
on the discrete-continuous elastic supports in vertical are external forces, and Fvt and Ftv are coupling forces
and Euler beam laid on Winkler foundation in lateral. of vehicle and track, respectively.
The track slabs are modeled as elastic thin plate laid on The Newmark-β integration method and a separated
the elasticity supports in vertical and rigid body motion iterative procedure are used in solving the system. The
in lateral. flow chart in each time step is shown in Figure 2.
709
(m)
Length of Ts1 Ts2 Ts3
vertical curve
200 300 300
(m)
Radius of R1 R2 R3 R4
plan curve
2000 2500 10000 5000
(m)
Length of Ly1 Ly2 Ly3 Ly4
plan curve
200 400 1000 300
Plane (m)
Type of
Cubical parabola
transition curve
Length of Lh1 Lh2 Lh3 Lh4
transition curve
350 400 800 300
(m)
Type of
Only lifting outer rail
Transverse superelevation
Figure 2. Separated iterative procedure in each time step section superelevation h1 h2 h3 h4
(mm) 160 150 120 30
3. Dynamic simulation and analysis Track Lower interference track spectrum of
irregularity German high-speed railway
i1 i2 i4
Longitudinal i3
section
Rs1 Rs2 Rs3
Plane
R1 R2 R3 R4
Transverse
section h1 h2 h3 h4
0 2 4 6 8 10 12 14 16 18
Kilometrage / km
Figure 3. Route scheme with match velocity
Table 1. Parameters of route scheme Figure 5. Lateral acceleration of carbody on curve two
Running V1 V2
(km/h)
speed 200 350
Grade i1 i2 i3 i4
(‰) 20 -10 8 6
Longitudinal Slope length Li1 Li2 Li3 Li4
section (m) 2679 2740 4290 8208
Radius of Rs1 Rs2 Rs3
vertical curve 15000 25000 30000
710
safety limit values. The lateral and vertical Sperling
index is at the rank of “Excellence”, as show in Table 2.
(2) The district with plane curve overlapping
vertical curve has great impact on the running safety
and ride comfort, such as “curve two” and “curve
three” where the vector sum of the carbody lateral and
vertical acceleration is up to 0.69 and 0.83 m/s2
respectively. On “curve three”, the derailment
coefficient is up to 0.54 and the reduction rate of wheel
load is up to 0.77, which are both very close to safety
limit values.
(3) In this route plan, the track velocity-curve is
Figure 6. Lateral acceleration of carbody on curve three introduced, so route alignment parameters can be
decided in accordance with different design velocity at
different section. In reality, the velocity in the district
nearby railway station is much lower than the
maximum design velocity. Therefore, designing route
alignment based on real running speed can make route
selection more flexible, and make the engineering
project more economical. From Figure 3, it is clear that
on “curve one” the real maximum velocity is lower
than 200 km/h, thus 200 km/h can be used as design
velocity of this district, and the plane curve radius is
2000 m, the vertical curve radius is 15000 m and grade
is 20 ‰. These parameters are all much lower than
those that the district maximum velocity 350 km/k
Figure 7. Lateral acceleration of carbody on curve four
requires. However, each dynamic performance index is
below corresponding safety limit value, as shown in
Table 2. Maximum values of dynamic performance index
Table 2.
(4) “Curve two” is set up under the assumption that
Curve Curve Curve Curve
Route the location of the line is restricted by geographic
one two three four
Carbody lateral condition, thus the running speed is limited. In order to
0.17 0.28 0.30 0.18 reduce the influence on traveling speed and frequently
ACC (m/s2)
Carbody vertical accelerating and decelerating, the curve should be set
0.24 0.63 0.77 0.19
ACC (m/s2) up on the speed-up and slow-down sections and the
Wheel/rail lateral
16.1 19.5 45.1 11.7
sections with low level alignment parameters should be
force (kN) set up closely, such as “curve one” and “curve two”.
Wheel/rail vertical (5) In the section with varying running speed, the
94 100.8 126.3 86.7
force (kN) ride comfort should be paid special attention to, such
Derailment as “curve one” and “curve four”, which are both with
0.22 0.28 0.54 0.16
coefficient
varying running speed but the maximum running
Reduction rate of
wheel load
0.35 0.52 0.77 0.22 speeds are lower than 200 km/h. Figure 4 indicates that
Lateral Sperling the direction of carbody acceleration gets shifted as
0.96 1.04 1.47 0.90 trains pass “curve one”. The reason is that, at the low
index
vertical Sperling speed, the trains are under the action of centripetal
1.21 1.14 1.22 1.07 force; but at high speed, the trains are under the action
index
of centrifugal force, which exerts great impact on
From the computation results, the followings can be passenger ride comfort. Therefore, this phenomenon
concluded: should be avoided. Figure 7 shows on “curve four” this
(1) Each dynamic performance index is below phenomenon is avoided. The effective measure for
corresponding safety limit value. As to the carbody solving this problem is to increase the curve radius. For
acceleration and lateral wheel/rail force, there is instance, the radius of “curve one” is only 2000 m,
comparatively large room between the results and the while the radius of “curve four” is 5000 m. In general,
in order to avoid passenger bearing the acceleration
action of two opposite directions when trains pass one
711
single curve, the maximum and minimum running References
speed should be both considered.
[1] Z. Krzysztof, “Dynamical investigation of railway
4. Conclusions vehicles on a curved track”, European Journal of Mechanics,
A/Solids, 1998, 17(6), pp. 1001-1020.
In this paper, a vehicle-structure dynamic [2] K Miyagaki, M Adachi and Y Sato. “Analytical study on
effects of form in transition curve”. Vehicle System Dynamic,
interaction analysis model was established based on 2004, 41(Suppl.), pp. 657-666.
the route alignment condition and the characteristics of [3] Wang Kaiyun, Zhai Wanming et al. “Research on the
vehicle and track structure. This model is suitable for lateral dynamic interaction between speed-increased train and
investigating into the effects of route alignment curved track”, China Railway Science, 2005, 26(6), pp. 38-43.
condition on the running safety and ride comfort, and (in Chinese)
compensates for the deficiencies of the traditional [4] Lian Songliang, Liu Yishu, “Research of safety and
study on route alignment parameters without stability of train running on the track overlapped elevation
considering the dynamic interaction between train and Curve on Spiral Curve”, Journal of Shanghai tiedao
structure. university, 1996, 17(3), pp. 11-18. (in Chinese)
[5] Lian Songliang, Chen Songlin and Li Xiangguo, “Test of
Through the analysis of the train running quality of vertical curve overlapping plane curve for dedicated
the simulated route plan by means of this model, the passenger traffic tailway line”, Journal of the China Railway
basic principles of alignment parameter selection and Society, 2005, 27(2), pp. 75-79. (in Chinese)
an evaluating and optimizing method for district route [6] Long Xuyou, Wei Qingchao and Zhao jinshun,
design were presented. This study provides theoretical “Modeling and simulation of curve negotiation of linear
supports for selecting the alignment parameters which metro vehicle”, Journal of System Simulation, 2007, 19(13),
is lower than those that existing route design standard pp. 3105-3107. (in Chinese)
requires, thus enormously enhances the flexibility of [7] K. L. Knothe and S. L. Grassie, “Modeling of railway
high-speed railway route selection with the guarantee track and vehicle/track Interaction at high frequencies”,
Vehicle System Dynamics, 1993, 22(3-4), pp. 209-262.
of running safety and ride comfort. [8] Zhai Wanming. Vehicle-track coupling dynamics (third
edition), Science Press, Beijing, 2007. (in Chinese)
712
2008 International Conference on Intelligent Computation Technology and Automation
714
approximated by a portion of the surface of a sphere. 3.2 Action principle of oxygen
Thus the mean burned gas front can also be Laminar flame speed S L is normalized by chemist
approximated by a sphere. Then, for a given dynamical factors, commonly it is calculated by
combustion chamber shape and assumed flame center equation based on experimental data. Since we study
location (e.g., the spark plug), the spherical burning the effect of oxygen entering into cylinder on
area Ab , the burned gas volume Vb , and the combustion characteristic in the paper, here we use the
combustion chamber surface “wetted” by the burned derivation of Von Tiggelen:
S L = KC ′ ⎡⎣ X F a X O2 b exp ( − E / RTm ) ⎤⎦
1/ 2
gases can be calculated by a given flame radius rb and (18)
piston position ( defined by crank angle) from purely
(
Where, C ′ = 8RTm / π M )
1/ 2
geometric consideration. The practical importance of , is the average
such model calculations is that, the mass burning rate molecule velocity of chain reaction carrier, M is
for a given burning speed ST (which depends on local relative molecule mass, Tm is average temperature in
turbulence and mixture composition ) is proportional to
the reaction zone, equation is Tm = Tu + 0.74 (Tb + Tu ) ,
the spherical burning area Ab . The flame is initiated at
the spark plug, however, it may move away from the Tb and Tu is the temperature of burned and unburned
plug during the early stages of its development. We zone respectively. X F a and X O2 b are mole fractions of
define the flame front area Af as the spherical surface fuel and oxygen respectively, a and b are steps of
of radius rf coinciding with the leading edge of the reaction for fuel and oxygen respectively, for
flame contained within the combustion chamber. Thus hydrocarbon fuel, a + b = 1 , E 、 M 、 a and b
the mass burning rate can be expressed as: should be obtained by test, here they are fitted with,
dmb
= ρu Af ST (14) E = 161.6kJ/mol , M = 68 , α = −0.22 , a = −0.71 ,
dt α
2Tu ⎛ p⎞
The developed turbulent flames in spark-ignition K= ⎜ ⎟
engines, under normal operating conditions, are highly 3π Tm ⎝ pr ⎠
wrinkled and probably multiply-connected thin where, pr is referenced pressure, pr = 98.1kPa .
reaction sheets, it is difficult to calculate ST accurately. To apply equation (18), the combustion velocity,
An important intrinsic property of a combustible the heat release of fuel and even the work capacity and
fuel, air, burned gas mixture is its laminar burning efficiency of engine were affected by flame
velocity. This burning velocity is defined as the propagation velocity. However the flame propagation
velocity, relative to and normal to the flame front, with velocity was affected by mole fraction of oxygen in
which unburned gas moves into the front and its fuel-air mixture entering cylinder. So it can be said that
transformed to products under laminar flow conditions. the most important factor that determine the power an
It can be assumed that, there is some relation between engine can produce is oxygen concentration in air
ST and S L : entering cylinder, here we study the affection on mass
burning rate of oxygen concentration.
FSR = ST / S L = f (15)
It can be concluded that, there is exponential
Where, FSR is the ratio of ST and S L . Based on relationship between laminar flame propagation
coupled analysis of flame front location and cylinder velocity S L and oxygen concentration in unburned
pressure data, Mathur have derived the following mixture, assuming that other parameters remain the
burning equation: same, thus:
f = 1 + β u′ / SL (16) ST = fS L
Here, u ′ is the intensity of turbulent flame, equation of
= fKC ′X F a / 2 X O2 b / 2 exp ⎡⎣1/ 2 ( − E / RTm ) ⎤⎦
u ′ is u ′ = kD 2 um , D is diameter of cylinder, β is
So the relationship between mass burning
constant, β = 4.01 .
rate m b and oxygen concentration can be derived.
Combining the equations above, mass burning rate
Programs are developed to calculate the temperature,
can be expressed as:
pressure and oxygen concentration, as well as other
dmb
= ρu A f ( S L + β u ′ ) (17) thermodynamics parameters.
dt
Thus, the problem is translated into calculation of
SL .
715
4. Experiment of oxygen-enriched flame more quickly, therefore the time of maximum pressure
propagation was reached earlier.
experiment
5
simulation
4.5
torque(N/m)
3.5
716
principal indicator (or main parameter) which reflect
experiment the level of gasoline combustion velocity and flame
6.5 propagation.
simulation
6 (3) Experiments are performed on a single-
torque(N/m)
717
2008 International Conference on Intelligent Computation Technology and Automation
719
Agents can help design an Inventory Management [11] J.F. Robeson, W.C. Copacino and R.E. Howe, The
System that is reliable, more accurate, intelligent, Logistics Handbook. (NY: The Free Press, 1994).
distributed, scalable, faster, and simpler in design.
Such a system is very much needed in this time and in [12] E.A. Silver, D.F. Pyke, and R. Peterson, Inventory
Management and Production Planning and Scheduling. (NY:
the future especially with the growing economy and
John Wiley & Sons, 1998).
the growth of the Internet. The future of such systems
lies in creating a component that can negotiate online [13] R.B. Chase, N.J. Aquilano, and F.R. Jacobs,
orders for restocking inventory with online suppliers. Production and Operations Management. Eighth Edition.
Our current decision support system is limited to the (Boston: Irwin McGraw-Hill, 1998).
inventory system (excluding supply chain activities)
for a medium sized department store in China. We plan [14] N. R. Jennings and M. J. Wooldridge, Agent
to add to this system a simulation of the store’s supply Technology. (Berlin: Springer, 1998).
chain (or at least some part of it) to test how the
[15] R. Aylett, F. Brazier, N. Jennings, M. Luck, H.
inventory system will behave in a more dynamic
Nwana, and C. Priest, 1998. “Agent Systems and
scenario (i.e. testing various supply chain situations ). Applications”.
[2] Goyal, S., Giri, B., 2001. Recent trends in modeling of [18] R. Signorile and M. Rawashdeh, “Inventory
deteriorating inventory. European Journal of Operational Management Simulation with Agents”, Proceedings of
HMS2000, Oct. 2000
Research 134 (1), 1–16.
[3] Kahn, B.E., Schmittlein, D.C., 1989. Shopping trip [19] R. Signorile and K. Lester, “Multi Agent Simualtion”,
behavior: An empirical investigation. Marketing Letters 1 Proceedings of SCI200
(1), 55–69.
[20] N. Jennings, K. Sycara, and M Wooldridge. A Roadmap
[4] Kok, G., Fisher, M., 2003. Demand estimation and of Agent Research andDevelopment. Kluwer Academic
assortment optimization under substitution: Methodology and Publishers, Boston, MA, 1998.
application. Working paper.
[21] Signorile, R, and Segritch A., ”Distributed Intelligent
[5] Mahajan, S., van Ryzin, G., 2001. Stocking retail Agents for a Collaborative Webbased Simulation”, In the
assortments under dynamic consumer substitution. Proceedings of WEBSIM2000, San Diego, CA, January,
2000.
Operations Research 49 (3), 334–351.
[6] McGillivray, A., Silver, E., 1978. Some concepts for [22] Signorile R. and McNulty, M., “Simulating the Use of
inventory control under substitutable demand. INFOR 16, Intelligent Agents in an Automated Distributed
Multi-Constrained Scheduling System”, In Proceedings of
47–63.
the 11th European Simulation Symposium (Germany), SCS.
[7] Mood, A.M., Graybill, F.A., Boes, D.C., 1974.
Introduction to the Theory of Statistics. McGraw-Hill, [23] Signorile, R. “A Framework for Distributed Intelligent
Kogakusha, Tokyo. Agents in the Simulation of External Logistics of an
Enterprise”, In the Proceedings of the HMS1999, Genova,
[8] Nahmias, S., 1982. Perishable inventory theory: A Italy, Oct. 1999.
review. Operations Research 30 (3), 680–708.
[24] Rosaria Conte, Jaime S. Sichman,G. Nigel Gilbert,
Proceedings of the Multi-Agent Systems and Agent-Based
[9] Netessine, S., Rudi, N., 2003. Centralized and
competitive inventory models with demand substitution. Simulation : First International Workshop, Mabs '98, Paris,
Operations Research 51 (2), 329–335. France, July 1998.
720
2008 International Conference on Intelligent Computation Technology and Automation
b2
Δl
A′
l2
B′
b0
α b1 α
b0
b1
l1
l′
l
l1
b2
l2
A
π n2d π n1d π n2d π n2d π n1d π n2d
Δl
π nd π nd
722
thread length of column with voluble circle number is c — constant, confirm by borderline condition or
constant. So the equation is set up: especial point.
b0 b Supposing the ellipse curve equation with axial
= 1 = λ1 (9) section in the end transition part:
n0π n1π
x2 y2
Column diameter also can be shown: + =1 (12)
d sin α b2 a2
d= 0 (10)
sin α 0 order: a b = k ( 0 < k < ∞ )
Summarize, when we confirm the original estate, the From above formula we can draw:
diameter of column part is only decided by y = a2 − k 2 x2 (13)
corresponding braided angle, in other word, the
diameter of column part is corresponding with braided
angle one by one, and this geometry relationship y
provided advantaged condition for model constructing
and accounting.
a=R
PAM can be considered as stable voluble question
r0
above some certain figure geometry style, only but the
PAM’s volume is changing when it working. Above
suppose already confirmed the figure of PAM, and x
O l2
now we will resolve the question of volume size and
length changing. It can be proved that the most stable
line on curved is geodesic from theory of differential b
geometry, and the geodesic on the column is spiral
Fig.4 section graph in the end transition part
curve so the thread voluble in middle column of PAM
must be spiral curve. The spheroid of end transition part caused by curve
2
x y2
1
2
+ = 1 rotating around semi axis b. Fig.4 set out
a2 b2
the curve.
3 Bases on anterior supposing, the most radius of
3′ transition part is equal to middle column radius, get
a = d 2 = R , r0 = d 0 2 , and we can get the
transition area length when we take it into elliptic
equation:
The total goal function of network is:
α1 —no-geodesic braided angle α 2 —geodesic braided angle
1
1—thread silky practicality direction l2 = d 2 − d02 (14)
2—geodesic thread silky direction 3—PAM axes 2k
Fig.3 PAM threads silky direction on end transition part
Total fibre threads length of PAM
b0 = b1 + 2b2 (15)
Fig.3 is PAM end part deformation picture, from Middle column volume
picture we can see, the thread direction on column is V1 = π d 2l1 4
opposite to bent cover on end part, from literature we (16)
know that the thread voluble fashion of bent cover on At end part, from y = r ( x) , the volume of one end
end part is no-geodesic voluble[4][5], so stability part transition area
l2
condition is: V2 = ∫ π r 2 ( x)dx
ri cos α i = c (11) 0 (17)
where: PAM total volume
ri —radius of turn; V = V1 + 2V2 (18)
α i — ri corresponding braided angle; From above formula we can draw:
723
1
d 2 − d 02 d2 and K was obtained as shown in fig.5. From fig.5 (a)
V =π ∫ 0
2k
(
2
− 2 k 2 x 2 ) dx
dV dV dε
F = −p = −p (23)
dL dL d ε max
•
max
•
max
•
max
•
max
•
max
•
braided angel α /D
( b ) l 0 = 165 mm d 0 = 20 mm
( a ) R ≤ 11 .98 mm
max
•
•
max
max
•
max
•
max
•
max
•
braided angel α /D
( c ) l 0 = 300 mm d 0 = 10 mm
( b ) R ≥ 11 . 98 mm
Fig.5 V − k simulation curves of end part restriction model
Fig.6 V − α simulation curves of ideal column model and end
part restriction model
5. Simulation analysis
Owing to formula(19)is complex, it is very and (b) we can know the most extremum point V is
difficulty to get the series roots. In this paper, K=1, whether d is any value. That is to say the end
numerical value method was applied. transition cured surface is spherical. In addition, when
When l0 = 165mm , α 0 = 20° , d 0 = 10mm , the relation of V d change from small to great, V increase continually ,
when d is up to 19.98mm, if d increase unceasingly,
724
volume V decrease gradually, so it is impossible for This article presents a new method for making
principle of PAM , but we can conclude that PAM PAM’s theory model .When the end part restrict of
have a extremum diameter. PAM is considered, the maximum volume of PAM is
From fig.6 we can get volume V from big to small smaller than ideal column model, and the output power
with braided angel increase, but for actual PAM, When is smaller than the output power of ideal column
simulation curve volume get the maximal value, model, for this reason, when the end part restrict of
braided angel also get maximal value; however, for PAM is considered, the output force of PAM is
original length same and original diameter differ smaller, all of this is happening because working
muscle deal column and the mathematic model ability is reducing.
considered end part restrict simulation curve will
evidence increasing with angel increase. This verify 7. Acknowledgment
the distance of the deal column volume and the volume
of mathematic model considered end part restriction is The authors gratefully acknowledge the support of
increase gradually. The value of ideal column model Heilongjiang Province Natural Science
maximum braided angel is bigger than the mathematic Foundation(E2005-02), Heilongjiang Province office
model considered end part contrition, the value of ideal of Education science and technology projects
column model maximum volume is bigger than the (11531372) and Zhejiang University, The State Key
mathematic model considered end part restrict. Laboratory of Fluid Power Transmission and
From fig.7 , we can get the load decreese gradually Control(GZKF-2002004).
of three curve with contraction ratio increase, Above
all, to compare the simulation curve which considers 8. References
the end part restrict with the ideal column model, the
former is closed with experimental curve. [1] Chou C P, Hannafonl B, “Static and dynamic
characteristics of McKibben pneumatic artificial muscles”, In
IEEE Conference on Robotics and Automation [C].San
Diego,USA: 1994 264-269.
l0 = 165mm d0 = 10mm [5]Fu Hongya,Huang Kaibang and Zhu Fangqun ect, “Non-
Fig.7 F − ε simulation and experiment curves geodesic winding stability of the boundary conditions and
stability equation”, Harbin Institute of Technology
Journal,1996.4(2).125-127.
6. Conclusion
725
2008 International Conference on Intelligent Computation Technology and Automation
Xin MA1, 2
1. School of Management and Economics,
North China University of Water Conservancy and Electric Power,
Zhengzhou, China, 450011.
2. State Key Lab of Systems Ecology,
Research Center for Eco-Environmental Sciences,
Chinese Academy of Sciences,
Beijing, China, 100085.
E-mail: maxin72@163.com
The electricity industry is undergoing deregulation A real option is the right, but not the obligation, to
around the world. Generators must adjust the new risks undertake some uncertainty decision. The real option
of volatile spot prices, which are accompanying the method enables corporate decision-makers to leverage
competitive marketplace. uncertainty and limit downside risk.
Hsu Michael put up the spark spread options concept In the electricity market the generator will face the
and constructs the model with the relation of gas price validity of spot price and reserve price and fuel price,
and electricity price
[1]
. The unit constraints is all these factors are uncertainty in the future, the
incorporated in research of Tseng ,and based on the revenue of generator will change according to these
financial options approaches the power plant valuation factors. Suppose the generator is a price taker in
problem as a multistage stochastic problem with the electricity market, it can decide the unit startup or
prices for electricity and the fuel consumed shutdown in time period t , and the output power level
[2]
characterized as uncertainties is formulated , but the of spot and reserve. This equals that the generator
reserve market is not be considering and the risk of owns an options contract, the generator will have right
power plant valuation is not evaluated. to decide to startup or shutdown on the executed price
In this paper the real options model of operating in time period t , and it also has right to decide to sell at
capital value of generator for spinning reserve is spot market or reserve market. The value of this
constructed under uncertainty market conditions contract is validity as financial options contract, if
including uncertainty electricity price, reserve price market price is higher than executed price, the
S (5)
p : electricity price of spot market in time period t .
t Where costs function is:
ptR : pice of reserve market in time period t . C (qtS , ptF ) = [α (qtS ) 2 + β qtS + γ ] ptF (6)
p tF : fuel price in time period t .
ut generation unit-commitment decision variable 3.3. Constraints
made in time period t , u t ∈ {0,1} ; when ut = 1
Formulation (1) satisfy the following constraints.
,the unit will be startup in time period t + 1 , • Minimum up/down time constraints
when u t = 0 , the unit will be shutdown in 1 if 1 ≤ xt < τ on
period t + 1 . ut = { 0 if − τ off < xt < −1
(7)
xt : state variable indicating the length of time that 0or1 otherwise
the unit has been up or down in time period t . • Unit state transition constraints
727
Min(τ on , xt −1 + 1) if 0 < xt −1 & ut −1 = 1 • if qtS * = q min
−1 ifxt −ψ = τ on & ut −ψ = 0 (8) 1 ptR pS q min
xt = { qtR* = min(q max − q min , max(0, ( + tF − β ) − ))
Max(−τ off , xt −1 − 1) ifxt −1 < 0 & ut −1 = 0 2αλ λpt F
pt λ
1 ifxt −φ = −τ off & ut −φ = 1 (16)
qtS* = min(q max , max(q min ,
• Total unit capacity in time period •
if 1 pS pR
qt = qtS + qtDR (9) ( tF − F t − ( β + 2λαq max ))))
2α (1 − λ ) pt pt (1 − λ )
• Unit capacity constraints
q min sign ( xt ) ≤ qt ≤ q max sign ( xt ) qtR* = q max − qtS (17)
S
(10) • if qtS * = min(q max , max(q min ,
1 p
( − β )))
t
where t = 1,", T 2α p t
F
multi-stage decision problem, and use Monte Carlo + Et [ J t +1 ( xt +1 ; ptS+1 , ptR+1 , ptF+1 )]
simulation to solve this multistage stochastic (21)
[3]
problem , this method is employed not only in The boundary conditions are:
forward-moving simulation, but also backward-moving J TR ( xT ; pTS , p TR , pTF ) = f TR ( xT ; q TS * , q TR* , pTS , p TR , pTF ) (22)
recursion of dynamic programming. The model In our stochastic model, a commitment decision
divided two parts, the first part is the operating must be made before the commitment becomes
decision problem, that means the decision variable effective. At each time t, the generator’s decision
xt ∈ Φ = {τ on ,−τ off } is now the commitment decision dependent on the price vector ( p tS , p tR , p tF ) ,
which has to be made before the uncertainties ptS , ptR
At each state xt ∈ Φ , the optimal determines can
and p tF . The second part is unit-commitment problem,
be expressed as the function g t ( x t ; p tS , p tR , p tF ) :
the generator is risk neutral so that its objective is to
maximize the expected profit, and the generator will 1 if g t ( xt ; ptS , ptR , ptF ) > 0
ut = { (23)
decide the output level between spot market and 0 if g t ( xt ; ptS , ptR , p tF ) < 0
reserve market. Suppose the unit is on operating state In time period t , if ( p tS , p tR , p tF ) on the locus of
in time period t , the deterministic problem is as
follows: g t ( xt ; p tS , p tR , p tF ) = 0 , its mean the profit of
Max p tS ( q tS + λ q tR ) + p tR q tR − C ( q tS , q tR , q tDR , p tF ) (15) generator is equality whatever the determines of
q S , qtR generator is turn on or turn off the unit, this locus is
q min ≤ qtS ≤ q max defined as indifference locus, and state belongs to
s.t. {
0 ≤ qtR ≤ q max − qtS xt ∈ Φ [2]. Suppose in time period t 0 , the state
Solving formulation (15) and the optimal value is is xt0 ,we know all the indifference locus and xt ∈ Φ
obtained
728
, t = t 0 + 1, " , T , initial determines variable is u t0 , (27)
These equal:
the operating capital value of generator ^
R S R F
J t0 ( xt0 ; u t0 , pt0 , pt0 , pt0 ) can be solved during the time • if x t = τ on , t ≤ T − ψ
^ S ^ R ^ F ^ S ^ R ^ F
period [t 0 , T ] : Et [ J tR+1 (τ on ; p t +1 , p t +1 , p t +1 )] = Et [ J tR+ψ (−1; p t +ψ , p t +ψ , p t +ψ )
Step0: at time period t 0 ,price vector ( ptS , ptR , ptF ) ,the ^
− SD ( x t )] (28)
0 0 0
(23). g t ( y ) = J tR ( x t ; ut = 1, p t , p t , y ) − J tR ( x t ; ut = 0, p t , p t , y ) (30)
Step4: set ^ S ^ R
∑ρ (i )
(25)
Time(h) 13 14 15 16 17 18
ρ≈ i =1
729
The volatility of spot price and reserve price is Output constraints of unit is 250MWh ≤ qt ≤ 750MWh ,
Markov and mean-reversion characteristic[4], residual simulation time N=5000,the other physical constrains
of these price series satisfy AR(1) stochastic model: see Table 4,the result is V = 70705$ ,VaR= 30644$.
p K (i ) = p K (i) + Δp K (i) (32) • Case 2
{ K
Δp (i) = aΔp K (i − 1) + σε (i ) Output constraints of unit is 250MWh ≤ qt ≤ 750MWh ,
where, K ∈ {S , R} , it is a spot price model when set simulation time N=5000,the other physical constrains
upper symbol K ← S , otherwise a reserve price model see Table 4, the result is V = 57715$ ,VaR= 14905$.
when set upper symbol K ← R . p K (i ) is the mean Table 4. Mean of operating value of
value of price series, Δp K (i ) is residual series, generator under difference cases
a and σ are constant , the constraint is a < 1 ,its mean Case No. 1 2 3
the volatility is mean-reversion. ε (i ) ~ WN (0,1) is τ on
(hr) 0 4 6
white noise. We can get these data through historical τ (hr)
off
0 4 6
data statistic. The mean value of spot price and the φ (hr) 0 2 3
mean value of reserve price at each 24 hours of future ψ (hr) 0 2 3
month show as Table 1 and Table 2.
x0 1 4 6
Table 2. Mean of reserve price of each hour ST ($) 0 1000 1100
Time(h) 1 2 3 4 5 6 SD ($) 0 600 650
R expected operating capital
p (i) 3.75 3.9 3.0 3.35 4.0 7.5
value of generator ($)
70705 57715 40054
Time(h) 7 8 9 10 11 12 • Case 3
p R (i) 9.0 10.75 8.5 11.0 11.5 10.5 Output constraints of unit is 250MWh ≤ qt ≤ 750MWh ,
Time(h) 13 14 15 16 17 18 simulation time N=5000,the other physical constrains
R
p (i) 9.5 9.0 12.0 11.5 10.5 12.5 see Table 4, the result is V = 40054$ ,VaR= -1076.8$.
Time(h) 19 20 21 22 23 24
p R (i) 10.5 10.0 7.5 7.0 7.35 4.5
730
From figure2,3,4 and the value of VaR in three cases, physical constrains of unit will reduce the possibility to
these result show that the expected operating capital lower evaluation of risk.
value of generator in future 24 hours will lower than
$30644 at a probability level not exceed 5% in Case1, 7. References
and the expected value in future 24 hours will lower
than $14905 at a probability level not exceed 5% in [1] M Hsu. “Spark spread options are hot!”. The Electricity
Case2, its means the value of risk will be obviously Journal, 1998,11(2),pp:1-12.
lower evaluated. If we compare with Case 2 and Case 3, [2] Chung-Li Tseng, Graydon Barz. “Short-term generation
we will find that the strict technical constrains of unit asset valuation: a real options approach”. Operations
will reduce the possibility to lower evaluation of risk. Research. 2002, 50(2),pp: 297-310
[3] Dowd, K. Beyond value at risk. New York: Wiley.1998.
[4] B.Roger, Haili Song, Chen-Ching Liu, Robert D.,
“Pricing flexible electricity contracts”. IEEE Trans. on
Power System, 2000, Vol.15 (2),pp: 477-482.
6. Conclusion
In this paper we present a new method for valuing
the operating capital of generator for spinning reserve
capacity and evaluating the value of risk using Monte
Carlo simulation. The real options contracts and the
concept of VaR are introduced and emphasizing the
need for incorporating physical constraints into the
problem modeling. Without considering physical
constraints, the expected operating capital value of
generator will be higher evaluated, and the strict
731
2008 International Conference on Intelligent Computation Technology and Automation
733
n ∂Tp K The experimental test consists in measuring the
Di = ∑ − m p g r rp campaign trajectory involving whole-body motion and
p =1 ∂qi applying the control algorithm in the simulator.
(8)
Here, Numerous experiments were carried to test the
simulator of kinematic models. In the example, the
⎡ xi2 xi yi xi zi ⎤ arms are controlled in the same manner. The simulator
⎢ ⎥
Trace(ViViT ) = Trace ⎢ y i xi yi2 y i zi ⎥ could successfully reach arms to the expectation
place.Fig.2 show the campaign trajectories. A snapshot
⎢ zi xi zi yi zi2 ⎥⎦
⎣ of the motion is illustrated in Fig.3.
= xi2 + yi2 + zi2 (9)
91.42 229.09
K 41.42
Where rp is the vector of connecting bar mass center -8.58
179.09
129.09
0
1.8
3.6
5.4
7.2
9
in the relevant coordinate system. -58.58
y
x
79.09
-108.58
In this setting, the kinematic modeling involves 29.09
-158.58
the specification of joint axes positions and the -208.58 -20.91
0 1.5 3 4.5 6 7.5 9
placement of local body part coordinate systems, all t/s t/s
3. Simulations 41.77
z
31.77
21.77
11.77
734
all the subcomponents and compare them with the [4] Sciavico, Lorenzo, Bsiciliano, Modeling and Control of
numerical results. Robot Manipulators, McGraw-Hill, New Yerk, 1996.
[5] Bornner, Susan, K, G.Shin,”A Comprehensive Study of
Robot Languages,”IEEE Computer, December 1982,
4. Conclusion pp.82-96.
[6] Paul, Richard P, Robot Manipulators, Mathematics,
We have developed the simulator based on Programming, and control, The MIT Press, 1981.
Pro/ENGINEER as an infrastructure for humanoid [7] Joseph L. Anita M, Bruce A. mobile robots, Inspiration to
robotics research. The feature of simulator includes mplementation [M].USA: Eagle, 1998.
seamless dynamics simulation of humanoid robots, [8] http://www.ptc.com
[9] Hirukawa Hirohisa, Kanehiro Fumio, Kaneko Kenji.
motion planners and controllers as the basic library
Humanoid robotics platforms developed in HRP [J].
including biped locomotion, dynamics balancing at the Robotics and Autonomous Systems (S0921-8890), 2004,
standing position. The simulation is to be widely used 48(4), pp.165-175.
under the project as the foundation for exploiting [10] White Robert B, Read R K, Koch M W, Schilling R J. A
applications and testing the control algorithms. Graphics Simulator for a Robotic Arm [J]. IEEE
Transactions on education (S0018-9359), 1989, 32(4),
5. References pp.417-429.
[11] A. Go swami:”Posturel Stability of Biped Robots and
the Foot-rotation Indicator (FIR) Point,” Int. j. of Robotics
[1] Valenti, Michanel,”A Robot Is Born,” Mechanical Research, 1999, 18(6), pp.523-533,.
Engineering, June 1996, pp, 50-57. [12] K.G.M.Gerritsen, A.J. van den Bogert,B.m.Nigg,Direct
[2] T.McGeer, Passive dynamic walking, The International dynamics simulation of the impact phase in heel-toe
Journal of Robotics Research, 1990, 9(2), pp.62-82. running, Journal of biomechanics ,1995,28(6),pp.661-668.
[3] Craig, John j, Introduction to Robotics: Mechanics and
Control, 2d Edition, Addison Wesley, 1989.
735
2008 International Conference on Intelligent Computation Technology and Automation
737
reality about the LWZ, because in reality signal phase time. In order to reflect the fluctuation of the traffic,
at ① is not exist. This way of modeling the left-turn we conducted field observation during the peak hour,
movement is named the dummy signal phase method the off-peak hour and the low peak hour under the
because it uses an extra signal phase to change the left normal weather conditions.
turning into two steps. So the LWZ model in VISSIM 2) Intersection geometric data survey. The geometry
software will be able to achieve. data reflecting the conditions of the intersection is
needed. The data includes the grades, the road transect,
the design speed, the road width, the function of each
lane, the number of lanes, the area of the intersection
and so on.
3) Intersection signal control data survey. The basic
requirement is that the LWZ must work together with
the left-turn signal and the left-turn lane, so it is
necessary to investigate the signal phase composition
and timing data at the intersection. Signal cycle, signal
phase, signal phase sequence, red, green and yellow
light time were observed to simulate the LWZ.
4) Other related survey. For example, collection of
the electronic map can simplify the modeling work in
Fig.2 Graphic description of the LWZ simulation the software. In addition, traffic organization survey,
model traffic environment survey, and other ancillary
facilities survey also can play an auxiliary role to
3.2 The simulation evaluation indexes establish the simulation model.
We know that the traffic system itself is very A typical urban intersection was investigated based
complicated with random factors and variability. And on the above analysis of the data survey, and the
it is often difficult to be described accurately by using intersection geometry survey data is shown in Figure 3.
empirical model or mathematical model, but the
simulation technology turns the complicated traffic
movement into a visualized image, which is convenient
to be analyzed [8]. The before-after performance of the
LWZ can be compared and evaluated quantitatively
based on simulation statistical data. The VISSIM can
provide the evaluation indexes such as traffic volume,
travel time, queue length and so on. We should choose
the most descriptive indexes according to the
characters about the LWZ at the signalized intersection
and the simulation software. As the capacity of the
intersection is mainly concerned, the left-turn traffic
volume was considered to be the index of evaluation.
Fig.3 Case signalized intersection
4. Case study
The traffic volume in different entrance at the
The data survey is an important aspect for modeling intersection and its each distribution ratio are shown in
and evaluating the measure by micro-simulation Table 1. Because the LWZ is mainly used for the
software. Ensuring the accuracy of the survey data can vehicles, in order to simplify the problem here, the
guarantee the authenticity and reliability of the non-motor vehicles and pedestrians were not taken into
simulation results, and the comparative analysis on the account in the study.
management methods at the target intersection can be The signal timing data at the intersection related
carried out effectively. The main contents of data with the before-after layout of the LWZ was set up as
survey are listed as follows: in Figure 4 and Figure 5.
1) Intersection traffic volume survey. The volume
information needed in the simulation software is the
entrance volume at intersection, and the turning ratio
for different directions should be collected at the same
738
Fig.4 Traffic signal timing before setting LWZ
Fig.5 Traffic signal timing after setting LWZ
The simulation was carried out with the above data, can fully prove that the operational efficiency has been
and the simulation results are listed in table 2: significantly improved.
The simulation results in the same simulation cycle Further analysis shows that the layout of the LWZ
listed in table 2 shows that compared with that the is not just forward displacement of stop line on the left-
implementation of the LWZ before, the left-turn traffic turn lane simply. The purpose of the LWZ is to utilize
volume at signalized intersection increased by 5.9%, the space of the intersection maximally and let the
6.7% and 4.3% percent after setting the LWZ in the vehicles enter into the LWZ early when the opposing
peak hour, the off-peak hour and the low-peak hour through light is green, while the opposing through
respectively. The above case quantitatively describes vehicles will not be affected. The measure motioned
the traffic flow changing with time and space, which above reduces delay time for the left-turn vehicles, as
739
well as improves the traffic movement and efficiency [7] PTV.VISSIM 4.20 User Manual[Z] .German:Planung
at the intersection. Particularly when optimizing the Transport Verkeher AG, 2005.
signal timing considering the speed of the vehicle, and
the length of the LWZ, most left-turn vehicles need not [8] Zhang Ning, Chen Kai, Gao Zhao-hui, et al. “Site
to stop at the LWZ and run through the intersection Planning of U-turn Followed by Right-turn Based on Micro-
quickly. simulation”, Journal of Traffic and Transportation
Engineering, Xi’an, 2008, 8(1), pp.78-82.
5. Conclusions
The conflict and interference at the signalized
intersection leads to a lot of delay and traffic
congestion which reduces the intersection capacity in
the urban road network. The LWZ is an effective
means of easing the congestion at the intersection. The
research in this paper is mainly on the realization and
evaluation of the widely used LWZ by simulation tool.
And a simulation model was analyzed by a case, which
proves that the simulation model proposed in this paper
can truly reflect the traffic movement after the
implementation of the LWZ. This modeling method
expands the application scope of simulation software.
The simulation result convincingly proves that the
layout of the LWZ has a role to alleviate the growing
congestion problem at signal intersection.
6. References
[1] Federal Highway Administration. Safety Effectiveness of
Intersection Left- and Right- Turn Lanes[R]. U. S. Depart-
ment of Transportation: Washington D.C., 2002.
740
2008 International Conference on Intelligent Computation Technology and Automation
1. Introduction
Where B2 ∈ R m× m is nonsingular.
Conclusion 2: For system (2), if (A0,B0) is 3. 2 Design of the control law
controllable, (A11,A12) is also controllable in (3).
To satisfy the reaching condition of sliding surface,
we use the exponential reaching law:
742
S = − kS − ε sgn( S )
⎡0 0 0 1 0⎤ ⎡−13.7⎤
Because S=Cx, S = −kS − ε sgn( S ) can be dealt to ⎢0 0 0 0 1⎥ ⎢−78.3⎥
A11 = ⎢0 0 0⎥ , A12 = ⎢ 1 ⎥
this:
0 0
S = Cx = CAx + CBu = −kS − ε sgn( S ) ⎢0 -529.2 519.4 0 0⎥⎥ ⎢ 0 ⎥
Control law is as below: ⎢ ⎢ ⎥
⎣0 -2940 2940 0 0⎦ ⎣ 0 ⎦
u = − ( CB ) (CAx + kS + ε sgn( S ))
−1
(10)
The poles of the subsystem (A11,A12) is specified
So the sliding mode controller can be got by C and according to the experience and experiment process.
(10), where the selection of parameter k is mainly At last we specify the desired poles of the sliding mode
determined by the dynamic characteristics of reaching subsystem as P=[-13; -2+2*i;-2-2*i;-6+6*i; -6-6*i].
sliding surface. The selection of ε is to attenuate Using K=place (A11, A12, P) in the software of
friction, parameter perturbations and so on. All of these MATLAB it can be got:
are to guarantee the robustness of close-loop system. K=[-0.2599 -0.3101 1.1462 -0.1933 0.0236]
For (8) the sliding surface matrix C=[-0.2599
3. 3 The elimination of system chattering -0.3101 1.1462 -0.1933 0.0236 0.1944]. In
(10) we specify k=0.5, ε =0.01. In (11) we specify
For the variable structure control system, it has a δ =0.005.
ideal switch characteristics because of the sgn(S) in After designing switch function parameter C and
(10), which generates the floating mode on the sliding control law (10), the variable structure controller is
surface. Because of delay, friction and other factors, completed.
the engineering system usually can not satisfy the ideal
characteristics, and the system states will chatter near
the sliding surface in fact. So we apply a continuous
function to substitute symbol function sgn (s) in order
to attenuate chattering.
s
θ (s) = (11)
s +δ
743
goes to -0.23m. After 4 seconds the system returns to
the origin point.
We specify other groups of desired poles to get
some controllers with different parameter. Every
controller can control the system successfully. The
difference between them is that: the smaller is the
absolute value of negative real part of dominant poles,
the faster is the close-loop system. But the overshoot
of pendulum angle will increase during the running.
4. Conclusions
The sliding model variable structure control theory
is applied on the double inverted pendulum system
successfully, and we get a good control performance.
From the result of experiment, it is known that the
variable structure control theory is easy to apply and
can be implemented generally. Under variable structure
controller, the close-loop system has a fast response
and low overshoot. According to the above it comes a
conclusion that: the variable structure control theory is
a good solution to the unlinear, unstable system with
the parameter perturbation and unmodeled dynamics.
References
744
Session 5
Rough Set
and Data Mining
ICICTA 2008
2008 International Conference on Intelligent Computation Technology and Automation
748
3.1 view of data set lOComment: Halstead's count of lines of comments
lOBlank: Halstead's count of blank lines
The data sets used in this study are shown in Table lOCodeAndComment: numeric
1 and are freely available to other researchers via the uniq_Op: unique operators
web interface to NASA’s Metrics Data Program (MDP) uniq_Opnd: unique operands
at http://mdp.ivv.nasa.gov, which is created by NASA, total_Op: total operators
then the NASA Metrics Data Program on December 2 total_Opnd: total operands
2004. On the topic of software defect prediction, there branchCount: of the flow graph
are five data sets: CM1, JM1, KC1, KC2 and PC1. We defects: module has/has not one or more reported
use CM1 to demonstrate our proposal. defects
Table 1 Data sets used in this study The class value (defects) is discrete:
project modules with defects
false: 449 = 90.16%
CM1 498 9.7%
true: 49 = 9.83%
JM1 10883 19%
KC1 2107 15.4%
KC2 520 20% 3.2 Preprocessing of data set
PC1 1107 6.8 CM1 have 498 instances and 22 attributes. It is a
CM1 is a NASA spacecraft instrument written in matrix of 22×498. For each attribute in CM1, we
"C". Data comes from McCabe and Halstead features cluster it into three classes: High, Medium and Low.
extractors of source code. These features were defined There are many methods of computing distance,
in the 70s in an attempt to objectively characterize such as presented by Euclidean, Hamming,
code features that are associated with software quality. Tchebyschev, Minkowski and Canberra [11].
The McCabe and Halstead measures are "module"- Tchebyschev distance is adopted in the processing of
based where a "module" is the smallest unit of data set. So 22 attributes of CM1 can be treated as
functionality. Table 2.
McCabe argued that code with complicated Table 2 The attributes of CM1
pathways are more error-prone. His metrics therefore
attribute Low Medium High
reflect the pathways within a code module. Halstead
argued that code that is hard to read is more likely to loc numeric 471 23 4
be fault prone. Halstead estimates reading complexity v(g) numeric 487 8 3
by counting the number of concepts in a module. ev(g) numeric 375 117 6
The McCabe metrics are a collection of four
software metrics: essential complexity, cyclomatic iv(g) numeric 460 35 3
complexity, design complexity and LOC, Lines of n numeric 214 279 5
Code. The Halstead falls into three groups: the base v numeric 412 81 5
measures, the derived measures, and lines of code
l numeric 485 11 2
measures.
Number of instances in CM1 is 498.And Number of d numeric 489 6 3
attributes is 22, including 5 different lines of code i numeric 485 7 6
measure, 3 McCabe metrics, 4 base Halstead measures, e numeric 52 -21 467
8 derived Halstead measures, a branch-count, and 1
goal field. List as follows: t numeric 483 9 6
loc: McCabe's line count of code lOCode numeric 473 18 7
v(g): McCabe "cyclomatic complexity" lOComment numeric 487 7 4
ev(g): McCabe "essential complexity"
lOBlank numeric 445 48 5
iv(g): McCabe "design complexity"
n: Halstead total operators + operands locCodeAndComment
496 1 1
v: Halstead "volume" numeric
l: Halstead "program length" uniq_Op numeric 489 7 2
d: Halstead "difficulty" uniq_Opnd numeric 466 29 3
i: Halstead "intelligence"
e: Halstead "effort" total_Op numeric 450 43 5
b: Halstead total_Opnd numeric 475 17 6
t: Halstead's time estimator branchCount numeric 488 7 3
lOCode: Halstead's line count
749
4. Experimentation on data set T15 0 0 1 1 1 0 1 0
T16 0 0 1 1 1 0 2 0
We change CM1 into rough set information table.
Afterwards applying data reduction algorithm, rule T17 0 0 2 1 1 0 2 0
discovery algorithm and rule reduction algorithm given T18 0 1 1 1 1 0 2 0
by us, some available rules are discovered.
Part of information table of software defect T19 1 0 0 1 1 0 2 0
prediction coded as η=<U, C, D, Vq, fq> depicted in T20 1 0 1 0 1 0 2 0
Table 3. We have incorporated complete identical
T21 1 0 1 1 1 0 2 0
samples into a record. The n denotes the number of
records. The {a, b, c, d} are all condition attributes. 'a' T22 1 1 1 0 1 0 2 0
as loc numeric, 'b' as v(g) numeric, 'c' as ev(g) T23 1 1 1 1 1 0 2 0
numeric, ..., 'u' as branchCount. The value of 0, 1 and 2
in the cells instead of Low, Medium and High. The 'e' T24 1 1 2 1 2 0 2 0
is decision attribute as defects, and the value of 0, 1 T25 2 2 2 2 2 0 2 0
means False, True.
T26 0 0 0 0 0 0 1 1
Table 3 Information table η
Attributes Decision T27 0 0 0 0 0 2 0 1
case
a b c … u z T28 0 0 0 0 1 0 1 1
R1 0 0 1 … 0 0 T29 0 0 0 0 1 0 2 1
R2 0 0 0 … 0 1 T30 0 0 1 0 1 0 1 1
R3 0 0 0 … 0 0 T31 0 0 1 0 1 0 2 1
… … … … … … … T32 0 0 1 1 1 0 2 1
R498 0 0 1 … 0 1
T33 1 0 0 1 1 0 2 1
Discernibility matrix M(C, D) is calculated by
information table η[12]. Then the reduced T34 1 0 1 1 1 0 2 1
discernibility matrix, RULE information table η' and T35 1 1 0 1 1 0 2 1
reduced RULE table can be can be reasoned.
T36 2 1 2 1 2 0 2 1
Table 4 The result table of CM1
Attributes Decision T37 2 2 2 2 2 0 2 1
case Using data reduction algorithm, we get reduced
a b c d e g j z information table. Now condition attributes are only a,
T1 0 0 0 0 0 0 0 0 b, c, d, e, g and j, which means loc numeric, v(g)
numeric, ev(g) numeric, iv(g) numeric, n numeric, l
T2 0 0 0 0 0 0 1 0 numeric and e numeric.
T3 0 0 0 0 0 1 0 0 Applying rule discovery algorithm, we get RULE
T4 table. Using rule reduction algorithm, get a new RULE
0 0 0 0 1 0 1 0
table as Table 4.
T5 0 0 0 0 1 0 2 0 So, the data set CM1 with 22 attributes and 498
T6 0 0 0 0 1 0 1 0 instances is reduced to a new matrix of 7×37. The
theory of rough set and farther researches assure the
T7 0 0 0 1 1 0 1 0 new matrix preserving the characteristic of CM1.
T8 0 0 0 1 1 0 2 0 Researching software defect prediction on the new
T9 table instead of CM1, the ratio of the record and
0 0 1 0 0 0 1 0
attribute number is 37:498 and 7:22.
T10 0 0 1 0 0 2 0 0
T11 0 0 1 0 1 0 1 0 5. Conclusions
T12 0 0 1 0 1 0 2 0
We proposes a rough set model for software defect
T13 0 0 1 0 1 0 1 0 prediction, and applies to the most famous public
T14 0 0 1 0 1 0 2 0 domain data set created by the NASA's Metrics Data
750
Program(MDP). The result shows its splendid [2] V. U. B. Challagulla, F. B. Bastani, I.-L. Yen, and R. A.
performance. Paul, "Empirical assessment of machine learning based
Rough set theory draws into approximation space software defect prediction techniques," The 10th IEEE
from equivalence relation. Its upper approximation and WORDS'05, 2005.
[3]F. N and N. M, "A Critique of Software Defect Prediction
lower approximation concepts give the area of Models," IEEE Transaction on Software Engineering, vol.
certainty and the area of uncertainty. Using these 25, pp. 675-689, 1999.
concepts, we can process the data set of software [4] N. E. Fenton, Krause, Paul., Neil, Martin., "A
defect prediction effectively. Probabilistic Model for Software Defect Prediction", for
We have presented knowledge representation model submission to IEEE Transactions in Software Engineering,
propitious to rough set. We have given data reduction 2001.
algorithm, rule discovery algorithm and rule reduction [5] G. Denaro and M. Pezze, "An empirical evaluation of
algorithm. Predicting the software defect, using the fault-proneness models," The 24th International Conference
model given, some available rules are discovered. This on Software Engineering (ICSE'02), 2002.
[6] N. s. M. D. Program, "http://mdp.ivv.nasa.gov/."
shows that our model and algorithms are feasible. [7] J. G. Tim Menzies, Art Frank, "Data Mining Static Code
Attributes to Learn Defect Predictors," IEEE Transactions on
Acknowledgements Software Engineering, vol. 33, 2007.
[8] Iker and Gondra, "Applying machine learning to software
This work is supported by the National Natural fault-proneness prediction," Journal of Systems and Software
Science Foundation of China under grant vol. 81, pp. 186-195, 2008.
No.60273043. This paper is supported by the Talent [9] P. Z. e. al, "Rough sets," Communications of the ACM,
vol. 38, pp. 89-95, 1995.
Team Construction Item of Anhui University under [10] P. Z. e. al, Rough set approach to multi-attribute
grant No. 02203104. decision analysis: Warsaw University of Technology, 1993.
[11] W. Pedrycz, CLUSTERING - From Data to Information
References Granules: John Wiley & Sons, Inc, 2005.
[12] L. Li, W. Yang, X. Li, and Y. Xu, "Research on Data
[1] K. Kaminsky and G. D. Boetticher, "Better Software Mining Model Based on Rough Sets," The First International
Defect Prediction using Equalized Learning with Machine Symposium on Pervasive Computing and Applications
Learners," Knowledge Sharing and Collaborative (SPCA06), 2006.
Engineering. 2004.
751
2008 International Conference on Intelligent Computation Technology and Automation
753
This deduction shows that if the attribute reduction reduce the redundant attribute in the reduction set as
takes the core of the decision table as the beginning, far as possible.
the conditional entropy's change rule is the monotone The algorithm is described as follows:
decreasing in the reduction process. When the Input: Decision table T = (U , C ∪ D ) , C is the
candidate attribute reduction set becomes the final condition attribute set, D is the decision attribute set,
attribute reduction set, its conditional entropy and D={d};
relativing to decision attribute set is equal to the initial Output: Reduction attribute set B;
condition attribute's, that is: H ( D | B ) = H ( D | C ) . Step1: Calculate the conditional entropy of D
relative to C: H ( D | C ) ;
3. The algorithm of attribute reduction Step2: Create the discernibility matrix M, compute
the core attribute set C0 , and P=C- C0 ;
In known research results about rough set theory,
people have discovered that the core of the decision Step3: Delete the elements of which the intersection
table can be obtained easily through the discernibility with C0 are not null in M, and the filtered discernibility
matrix proposed by Skowron [8]. The decision table's matrix M ′ is obtained;
core is unique, so it can be the beginning of seeking the
Step4: For all ck ∈ P and ck in M ′ , compute the
smallest attribute reduction. The algorithm in this
paper obtains the core set through the discernibility frequency function of attribute P (ck ) , and arrange
matrix from the algebra view: the core attributes are them according to the frequency from large to small,
the attributes whose element combination number is
one. Then the core set is as the initial candidate sequence c j is obtained, therein, j = 1, 2 m (m is the
reduction set and the frequency of attributes is used as number of attributes in M ′ );
the heuristic information of attributes selection. The Step5: Make B= C0 , if card ( B ) = 0 , then there is
attribute subset is arranged according to the frequency
from large to small. At first, the attribute which has the no core, and evaluate an initial value:
biggest frequency is chosen and joined to the initial H ( D | B) = H ( D | C ) + 1 ; otherwise compute
candidate reduction set. If there are attributes of which H ( D | B) ;
the frequencies are equal, then their conditional Step6: If H ( D | B ) = H ( D | C ) , then the algorithm
entropy from the information theory view are used as
the chosen judgment. If terminal condition of the is end, and B is a reduction of C relative to D;
algorithm is dissatisfied, then the next attribute is Otherwise if H ( D | B ) > H ( D | C ) , turn to Step7;
joined according to sequence, repeating this until the Step7: Choose cq which has the biggest frequency
terminal condition is satisfied. Then a relative
reduction is obtained. According to the front from the sequence c j , if there is only one attribute
deduction, the terminal condition of the algorithm can
satisfied, then add cq into the reduction
be realized by conditional entropy from the
information theory view set: B ∪ cq → B , and delete cq from c j , compute
The algorithm can obtain the core attribute set and
H(D|B) and turn to Step6; If there are more than one
the frequency of attributes. Certain attributes'
attribute satisfied, then compute
frequency are very big and simultaneously these
attributes are relating closely to the core attributes, so their H ( D | B ∪ cq ) and add cq which has the smallest
they usually exist along with the core attributes in the value of conditional entropy into the reduction
discernibility matrix and the frequency of they
set: B ∪ cq → B , and delete cq and all attributes which
independently exist in the matrix items is very low.
The classification capability of these attributes can be have the same frequency with cq from c j , compute
replaced by the core attributes. Therefore, even if their
frequency is very big, they are redundant in the H ( D | B ) and turn to Step6.
reduction. Taking this into consideration, the filtered
discernibility matrix can be obtained. That is, delete all 4. Test and verify the algorithm
the elements of which the intersection with the core
attribute set are not null in the discernibility matrix M. In order to explain the validity of the attribute
The filtered discernibility matrix reflects the reduction algorithm, a group of data of load forecasting
classification capability of non-core attributes and can is adopted to test this algorithm. The algorithm is used
to reduce the climatic factors which affect the load to
754
obtain the core factors. The condition attribute set temperature; The sunlight may be divided into clearly
includes temperature, wind direction, rainfall, air and cloudy, denoted as 0 and 1 respectively; The
pressure, wind speed, sunlight and humidity, denoted decision attribute, namely the meteorological load of d
as t, d, r, p, w, s, h respectively. day, can be divided into high, low, none according to
At first, condition attributes and decision attribute the historical statistics' the biggest meteorological load,
should be quantified. The following method is adopted: the smallest load. Table 1 is the decision table which is
The temperature is divided into ten sections, [- 10, -5) composed of five days' weather information and the
is marked 0, [- 5,0) is marked 1, [35,40] is marked 9; load data. The algorithm samples eight points of daily
The wind speed and the rainfall are similar to the meteorological data.
Table 1. Reduction table of weather factors
Serial number Condition attributes Decision attribute d
t d r p w s h
1 3 1 2 0 4 1 5 1
2 5 2 2 1 2 1 3 2
3 5 2 1 1 3 1 8 0
4 7 2 4 0 0 0 8 1
5 9 2 5 0 3 0 5 1
6 7 1 4 1 2 1 7 2
7 4 1 1 1 4 0 9 1
8 2 2 1 0 1 1 6 0
9 0 1 2 1 2 1 5 2
… … … … … … … … …
40 6 2 5 1 1 0 6 0
The discernibility matrix M obtained from table 1 is the diagonal line. So only its under triangle needs to be
a 40×40 matrix. According to the definition of the considered (such as table 2).
discernibility matrix, it is a symmetrical matrix along
Table 2. The discernibility matrix M
{d,t,p,r} {d,w,t,h,r} {d,t,p} {t} … 0
… … … … … {d,t} 0
The core attribute set {t, r} is obtained from M. The This paper analyses the information view and the
reduction set {t, r, w}, namely {temperature, rainfall, algebra view of rough set theory, and obtains an novel
wind speed}, is obtained by using the algorithm in this attribute reduction algorithm by combining the two
paper. If the frequency of attribute is not obtained from views. The change rule of the conditional entropy of
the filtered discernibility matrix but from the condition attribute set relativing to decision attribute
discernibility matrix, then the frequency of attribute d set can be obtained from the information view and is
is the biggest. But according to the definition of the applied in the attribute reduction. The core attributes
reduction, d is redundant attribute. So the redundant and the frequency of attributes can be obtained quickly
attributes can be deleted effectively if the frequency of from the discernibility matrix. The algorithm adopts
attribute is obtained from the filtered discernibility the frequency of attributes as the heuristic information
matrix. of attributes selection. The example analysis indicates
that this algorithm can obtain the smallest attribute
5. Conclusion reduction of the decision table and can also reduce the
redundant attributes in the attribute reduction set to
some extent.
755
6. References
[1] Pawlak Z, “Rough Sets-theoretical aspects of reasoning
about data”, Kluwer Academic Pub, 1991, pp. 68-162.
[2] Tay,F., et al., “Fault diagnosis based on rough set
theory”, Eng. Appl.Artif. Intell., 2003, 16(1), pp. 39-43.
[3] Ma Guangzhi Wu Liming, “A Reduction Algorithm of
Attr ibute Based on Rough Set Theory”, Computer
Engineering and Applications, 2006, 18, pp. 171-172,175.
[4] Shi Zhongzhi, Knowledge Discoverity, Beijing, Tsinghua
University publishing house, 2002.
[5] Ren Xiaokang, Wu Shangzhi, Ma Ruyun, “An algorithm
of attribute frequency reduction based on discernibility
matrix”, Journal of Lanzhou University(Natural Sciences),
2007, 43(1), pp. 138-140.
[6] Ivo Duntsch, Gunther Gediga, “Uncertainty mesaures of
rough set prediction”, Artificial Intelligence, 1998, 106, pp.
109-137.
[7] Yu Hong, Ysng Dachun, Wu Zhongfu etc, “Rough Set
based attribute reduction algorithm”, Computer Engineering
and Application, 2001, 17, pp. 22-23,47.
[8] Wang Xiaoyan, “Algorithm for Attribute Reduction
Based on Attribute Significance of Binary Discernible
Matrix”, Journal of Anhui University of Technology, 2007,
24(1), pp. 76-78, 97.
756
2008 International Conference on Intelligent Computation Technology and Automation
result and analysis. Finally, conclusions are presented cut the unfrequent item in BWi , the support count of A
in Section 6.
in SW is S* | SW | −∑ f BW (i ∈1,2,3,...) with ( f BW ( A) < ε * | BWi |) .
i i
i
758
transaction, we have to traversal the whole tree. But if 4 Mine and adjust NC-Tree
using B_List, we only need to traversal from
downward to upward along one path and cut nodes in In the process of mining NC-Tree, we also need to
the path directly. This structure not only saves build condition pattern tree like FP_growth algorithm.
adjusting time, but also saves memory space, Unlike FP_growth algorithm, we use stack to finish the
especially for the dataset made up of long transactions, mining, but not recursion.
because it puts all time information of one path into a Why do we use stack instead of recursion? For data
node. stream mining, the memory space is finite, so we need
From above, the NC-Tree frame contains three to free the condition pattern tree that is no use to
parts, NC_Tree, NC_Table, and NC_B_List. The provide enough idle space.
structures of NC_Table are similar to Head Table in the This paper proposes updating the NC_Tree with
algorithm FP_growth. B_List directly. Because every node in B_List is
The whole structure of NC-Tree frame is shown in ordered by time-stamp, the transactions arriving early
Fig.1. are on the end of list, we can directly cut the
Head table R
o transactions pointed by the end node of the B_List and
f
insert the data in new Basic Window into NC_Tree.
c
f Like this, we finished updating process without visiting
c more nodes.
b
c b
a 4.1 The algorithm of mining NC_Tree
p
b a
NC_Mining() {
While(!Stack_IsEmpty(S)) { //if stack not empty
p Stack_Pop(S,Con_Tree_Root); //pop the stack
3 2 1 B-List If(Is_SinglePath(Con_Tree_Root) // if the tree with
Combination(Con_Tree_Root); // single path
Fig.1 The structure of NC_Tree Else {
While(Table_Cur!=NULL) {
3.3 The algorithm of NC-Tree construction Con_Tree_Construct(Con_Tree_New);
While(Window_Size<slide_window) { Stack_Push(Con_Tree_New);
GetBuffer(Tran_Buffer); // put the new data into Table_Cur=Table_Cur->pre;
basic window }
Recode_Buffer(Recode_Buffer,Tran_Buffer); }
//recode the basic window Con_Tree_Free(Con_Tree_Root); //free the condition
Buffer_Filter(&Recode_Buffer,Hash_Table, pattern tree
preMinsup); //filter the upfrequent items in basic }
window }
Tree_Cur=NC_Tree_Insert(Tree_Root,Table_Root, Algorithm 2 NC-Tree mining
Recode_Buffer); // insert data into tree When constructing frequent pattern tree, we can cut
B_Insert(B_List,Tree_Cur); more useless information with hash table. The
Windows_Size++; //change current size of window experiment results show this algorithm will save plenty
} of time in the mining process. First, the dataset become
Algorithm 1: NC-Tree construction small because of the filtering. Moreover, the complex
Comparing with the construction process of items become integers because of the recoding. So
CanTree, we proposed recoding and filtering data by operating every node becomes easy.
constructing hash table. We also construct list B_List
in order to update NC-Tree rapidly. In the whole 4.2 The algorithm of adjusting NC_Tree
process, some time is spent in constructing tree, but
Because data stream is continuous and varying with
more time is saved during mining, because the
time, NC_Tree needs to receive new data and cut old
recoding and filtering operate liner data structure,
data in time. Here, we can resolve the data updating
which is more simply than operate tree structure. So
problem by adjusting NC_Tree. In the adusting
although we add two processes in the NC-Tree
process, we first find the nodes in B_List which point
construction process, the efficiency of mining is
to transactions in the last basic window and delete the
increased. The experiment results in section 5 will
transactions, at the same time, we insert the new data
show this point.
into NC_Tree.
759
deviation permit will improve mining efficiency very
NC_TreeAdjust() { much.
While(B_Node->pre!=NULL&&B_Node->time==Time) Fig. 4 shows when the deviation permit is close to
Tran_Del(B_Node->Tree_Node); //cut the transaction. minimum support threshold, mining accuracy starts to
Windows_Size--; decrease rapidly. So when we try to improve mining
Recode_Buffer(New_Buffer); //recode
Buffer_Filter(New_Buffer);//filter the new basic Window
efficiency, we need to select proper deviation permit to
NC_TreeInsert(New_Buffer); //insert new data insure accuracy. But whether the selected deviation
B_Insert(B_List); permit is proper relates to not only the minimum
Window_Size++; support, but also the dataset. So how to select proper
} deviation permit on different datasets is an interesting
Algorithm 3 NC-Tree Adjusting problem deserving to research.
From algorithm 3, we can see that, in the adjusting
process of NC_Tree, we don’t need to traversal the 30
25 deviation
whole tree, but cut and insert directly. So the adjusting
Runtime(second)
permit=0
20
process of this structure is simpler.
15 deviation
10 permit=0.01
5 Experimental results 5
deviation
0 permit=0.00
In order to compare efficiency with the CanTree 0.02 0.03 0.05 0.07 0.1 0.2 5
Minimum support threshold
theory, we do some experiments using some real-life
databases from UC Irvine Machine Learning
Depository, which contains the dataset T10I4D100K. Fig. 3 Runtime with different min-sup
This dataset includes 1000 items in all, and every minimum support=5(percent) minimum support=3(percent)
transaction has an average length of 10 items. The
100
CPU is Pentium 4 2.4GHz and Memory is 500 M.
Accuracy(percent)
80
In the experiment, every Basic Window contains 60
10000 transactions and Slide Window is made up of 10 40
20
Basic Windows.
0
For all algorithms mentioned in related work, 1 2 3 4 5 6 7
CanTree is a representative algorithm. Our experiment Deviation permit(percent)
NC_Tree with Windows will affect the mining efficiency. If the size
90 adjust
of Basic Window is too small, many Basic Windows
60
CanTree will be recoded and filtered, and the data in the Basic
30
Windows will be inserted into NC-Tree. This will
0
NC_Tree without decrease the mining efficiency. On the other hand, if
0.1 0.2 0.3 0.4 0.5 0.6 adjust
the size of Basic Window is too big, even equals to the
Sizeof database(million
Slide Window, the operation of filtering on Basic
transactions)
Window is useless, which also can not improve mining
Fig. 2 Comparison between NC_Tree and CanTree efficiency. So for a Slide Window with certain size, we
Fig. 2 also shows that when data amount is more should select Basic Window with proper size to get the
than the size of slide window, adding the adjusting best mining efficiency.
process will improve the mining efficiency very much.
This is because we need to continue enlarging the
window size without adjusting process, but when 6 Conclusions
adding this process, we only need to deal with data in
the window with fixed size. In a short word, this This paper proposes a new idea on data stream
process increases adjusting time to save more mining frequent pattern mining. First, we present a method to
time. The experiment shows this idea is efficient. recode and filter data, which can compress dataset for
Fig. 3 shows the mining result of T10I4D100K mining and insure the mining accuracy at the same
with different deviation permit. Obviously, proper time. Besides this, we can deal with infinite data on
finite memory space with the slide window.
760
Experiment shows that by recoding and filtering, we Proceedings of the ICDM 2005. IEEE Computer
reduce the time of constructing tree and save the time Society Press,Los Alamitos, CA, pp 274-281.
of mining, especially for the datasets made up of [6] J.-L.Koh and S.-F.Shieh. An efficient approach for
complex items. maintaining association rules based on adjusting FP-tree
structures. In Proc. DASFAA 2004, pp. 417-424
[7] C.Leung and Q.Khan. Effcient Mining of Constrained
slide window=100(thousand)
Frequent Patterns from Streams. In Proc. IDEAS 2006,
Dec. pp, 61-68.
Mining time(second)
15
[8] D.Lee, W.Lee. Finding maximal frequent itemsets over
10 online data streaming data. In: Proceedings of the Fifth
IEEE International Conference on Data Mining.
5
Houston, USA: IEEE Press, 2005. 210-217
0
[9] C.Yun,W.Haixun,Yu. Moment: maintaining closed
1 2 5 10 15 20 50 100 frequent itemsets over a stream sliding window. In Data
Size of basic windows(thousand) Mining: ICDM 2004, Fourth IEEE International
Conference. PP 59-66.
Fig. 5 Efficiency with different size of Basic Windows [10] L.X.jun, X.H,bing, D.Y.sheng. Mining frequent closed
pattern from a sliding window over Data Streams. In:
This paper also introduces the idea of B+ tree to Journal of computer research and development, 2006.
arrange all transactions in time order. This can help us [11] J.LKoh, S.N.Shi. An approximate approach for mining
update tree more easily and efficiently. In the mining recently frequent itemsets from data streams. In: Tjoa,
algorithm, we free the condition pattern tree A.M., Trujillo, J. (eds.) DaWaK 2006. LNCS, vol. 4081,
immediately when the work on it is over. This process Springer, Heidelberg(2006).
insures we have enough idle memory space. [12] T.Peiyi and P.TurKia. Mining Frequent Itemsets with
Partial Enumeration. In Proceedings of the 44th Annual
As discussed in section 5, deviation permit and the Association for Computing Machinery Southeast
size of Basic Windows are important to the efficiency Conference(ACMSE’06), pages 180-185, Melbourne,
and accuracy of mining. How to select proper deviation Florida, USA, March 2006.
permit and the size of Basic Windows is our future [13] T.Peiyi and P.TurKia. Mining frequent web access
work. patterns with partial enumeration. In Proceedings of the
In addition, in all the algorithms of mining frequent 45th annual southeast regional conference(ACM), page
patterns, the depth of mining is a problem hard to 226-231, Winston-Salem, North Caroline, March 2007.
conquer, especially for the datasets with long
transactions and high density. For this problem,
P.y.Tang proposed the theory of Partial Enumeration
[12][13]
. But this theory is not perfect and can’t be
applied in the real mining problem directly, so how to
mining the datasets like this is an important research
task.
Reference
[1] R.Agrawal, T.Imielinski, and A.Swami, Mining
Association Rules between Sets of Items in Large
Database, Proc. 1993 ACM_SIGMOD Int’1 Conf. On
Management of Data(SIGMOD’93), Washington, DC,
1993, pp.207-216.
[2] J.Han, J.Pei, and Y.Yin. Mining frequent patterns without
candidate generation, Proc.2000 ACM SIGMOD
International Conference on Management of Data,
volume 29(2) of SIGMOD Record, ACM Press, 2000,
pp.1-12.
[3] C.Giannella et al. Mining frequent patterns in data
streams at multiple time granularities. In Data Mining:
Next Generation Challenges and Future Directions,
AAAI/MIT Press, 2004, ch.6
[4] W.Cheung and O.R.Zaiane. Incremental mining of
frequent patterns without candidate generation or
support constraint. In Proc. IDEAS 2003, pp. 111-116.
[5] Leung CK-S, Khan QI, Hoque T(2005) CanTree: a tree
structure for efficient incremental mining of frequent
patterns. In: J.Han, BW.Wah, V.Raghavan. et al(eds)
761
2008 International Conference on Intelligent Computation Technology and Automation
An Index Selecting Model for Complex System Based on Grey System and
Rough Set Theory and Its Application
Here, a question is put forward, i.e. whether a few min min xi (k ) − x j (k ) is the smallest absolute
indexes can be found to act as what the mentioned j k
parameters do in analyzing the evolution of a system. subtraction of any two indexes;
Actually, it is can be solved by selecting a few
max max xi (k ) − x j (k ) is the biggest absolute
indexes as possible, with redundant indexes being j k
removed, to show the evolutional situation of the subtraction of any two indexes.
system. In this paper, based on gray clustering and It should be added that i, j = 1,2,...,n , k = 1,2,...,m
rough set theory involved in finding core and
and ρ is resolution coefficient to raise difference
reduction, the author introduces an approach to select
index, which turns out to be effective in the significance among discernible coefficients. In
early-warning practice of the real estate of Wuhan. general, ρ ∈ (0.1,1) .
763
Continued Table1.
10 11 12 13 14 15 16
Construction
Per capita Consume Per capita
Year Total GDP Capital cost Land sale area industry
income price index living space
output value
1988 156.44 1261.08 120.5 141755 123.45 176652 5.77
1989 173.48 1407.12 113.4 117340 114.5 195339 5.9
1990 176.83 1555.8 103 142665 89.42 207581 6.1
1991 207.95 1771.68 107.3 177894 98.8 237301 6.2
1992 255.42 2116.9 111.4 324181 130.8 303877 6.3
1993 357.23 2872.9 119.8 471368 293.05 502134 6.5
1994 485.76 3769.8 126.3 751348 275.72 795827 6.9
1995 606.91 4453.9 118.4 1114959 142.64 1071878 7.2
1996 782.13 4915.86 112.2 1353224 161.6 1113665 7.5
1997 912.33 5573.04 103.1 1220022 282.17 1088014 7.8
1998 1015.89 5912.52 97.4 1297707 190 1165540 8.1
1999 1085.68 6198.24 96.1 1322586 196.54 1352129 8.6
2000 1206.84 6953.94 100.6 1411232 212.6 1553941 8.8
2001 1347.8 7305.05 99.5 1653600 223.1 1098300 9.65
* Source: Statistical Yearbook of Wuhan \ Annual Report of Real Estate Trading of Wuhan
Table 2. The degree of correlation of the indexes
1 2 3 4 5 6 7 8
1 1.0000 0.7028 0.6314 0.6316 0.6263 0.7014 0.7084 0.6278
2 0.7199 1.0000 0.7860 0.7893 0.7785 0.8897 0.7306 0.7754
3 0.6914 0.8237 1.0000 0.9806 0.9856 0.8367 0.6864 0.9787
4 0.6860 0.8220 0.9798 1.0000 0.9824 0.8374 0.6808 0.9653
5 0.6871 0.8175 0.9856 0.9830 1.0000 0.8324 0.6812 0.9776
6 0.7297 0.8960 0.8122 0.8178 0.8074 1.0000 0.7143 0.8029
7 0.7746 0.7671 0.6897 0.6905 0.6851 0.7476 1.0000 0.6848
8 0.6904 0.8168 0.9791 0.9673 0.9781 0.8305 0.6843 1.0000
9 0.7566 0.8934 0.7625 0.7640 0.7548 0.9047 0.7409 0.7534
10 0.6932 0.8630 0.9086 0.9161 0.9012 0.8749 0.6886 0.8931
11 0.6936 0.8492 0.9392 0.9483 0.9324 0.8606 0.6901 0.9230
12 0.6866 0.8109 0.9733 0.9639 0.9784 0.8259 0.6813 0.9904
13 0.7022 0.9118 0.8439 0.8501 0.8377 0.8903 0.7082 0.8308
14 0.6904 0.8206 0.9857 0.9752 0.9837 0.8370 0.6873 0.9770
15 0.7067 0.8804 0.8987 0.9064 0.8921 0.8908 0.7061 0.8847
16 0.6879 0.8161 0.9860 0.9730 0.9869 0.8289 0.6819 0.9870
764
Continued Table 2.
9 10 11 12 13 14 15 16
1 0.7354 0.6541 0.6453 0.6223 0.6747 0.6295 0.6600 0.6266
2 0.8910 0.8472 0.8250 0.7677 0.9067 0.7817 0.8607 0.7762
3 0.7970 0.9188 0.9434 0.9727 0.8677 0.9856 0.9060 0.9859
4 0.7934 0.9230 0.9501 0.9617 0.8692 0.9741 0.9101 0.9717
5 0.7905 0.9121 0.9369 0.9778 0.8623 0.9836 0.8997 0.9868
6 0.9080 0.8683 0.8472 0.7971 0.8906 0.8124 0.8808 0.8024
7 0.7771 0.7122 0.7049 0.6813 0.7397 0.6901 0.7216 0.6844
8 0.7914 0.9063 0.9295 0.9904 0.8583 0.9773 0.8945 0.9871
9 1.0000 0.8109 0.7951 0.7461 0.8668 0.7589 0.8277 0.7533
10 0.8247 1.0000 0.9634 0.8848 0.9244 0.9030 0.9685 0.8958
11 0.8169 0.9654 1.0000 0.9143 0.9008 0.9333 0.9511 0.9261
12 0.7857 0.8992 0.9217 1.0000 0.8528 0.9776 0.8874 0.9866
13 0.8701 0.9192 0.8889 0.8240 1.0000 0.8405 0.9354 0.8329
14 0.7944 0.9140 0.9381 0.9772 0.8651 1.0000 0.9019 0.9872
15 0.8455 0.9700 0.9507 0.8766 0.9423 0.8941 1.0000 0.8871
16 0.7899 0.9078 0.9315 0.9864 0.8588 0.9872 0.8957 1.0000
(1) If u i ≠ u j , u i and u j will be discernible
3. A model to Simplifying Index System
within X .
Based on Rough Set Theory
(2) If u i in a pair is discernible in X , S will be
In the real estate system S of Wuhan, the index discernible within X and can be noted as ind ( X ) .
system is X = {x1 , x 2 ,..., x n } , each index has data as
(3) If any index xi is removed from X and S is
many as m (Table 1). After changing the form Table 1
according to Table 3, an information matrix of the still discernible, i.e. ind ( X − xi ) = ind ( X ) , xi
whole real estate system can be described as a matrix will be redundant in X .
X ( m × n ). (4) If any index in X is not redundant, X will
be independent (which indicates that any index in the
Table 3. The General Description of a System
system is indispensable).
Indexes
Data Time
x1 x2 … xn (5)For any subset A ⊆ X of X , if
ind ( A) = ind ( X ) with A being independent, A
u1 x11 x 21 … x n1
will be the smallest subset of X , i.e. min( X )(the
u2 x12 x 22 … xn 2 smallest subset of X may be beyond one).
(6)The assimilation X c of all the smallest subsets
… … … … … in X is named the core of X , i.e.
k
X c = ∩ min i ( X ) with k being the amount of
um x1m x2m … x nm
i =1
all the smallest subsets.
u1 ⎛ x11 x21 ... xn1 ⎞
⎜ ⎟ Indexes of X c are necessary for the description of
u2 ⎜ x12 x22 ... xn2 ⎟ a system. Furthermore, X c is used to be got in basis of
X= ⎜
... ... ... ... ... ⎟ (6) discernable matrix, whose establishment, namely D , is
⎜ ⎟
um ⎜⎝ x1m x2m ... xnm ⎟⎠
the key. For the index system X of the system S, its
discernable matrix D is m -order matrix originating
According to table 3, some definitions in rough set from subsets of X .
theory are given,
765
⎛ d11 d 12 ... d1m ⎞ Wuhan.
⎜ ⎟
⎜d d 22 ... d 2 m ⎟ 4. Conclusions
D = ⎜ 21 ;
... ... ... ... ⎟
⎜ ⎟
⎜d ... d mm ⎟⎠
The model of Index Selecting can be used in
⎝ m1 d m2 researching the stability of the society and the structure
of economic system, with the development of the
⎛0 xij = xik
d ij = ⎜⎜ ; j, k = 1,2,3,..., m . (7) model, many problems of economic also can be studied
⎝ xi xij ≠ xik and solved in this method.
It is made clear in the above definition that D is an
m-order matrix whose main diagonal is 0. References
According to the above method, with the help of
MATLAB, core finding are implemented in the data [1] Paw Lak Z. Rough sets theory and its applications to
data analysis. Cybernetics and systems, 1998,29:
processing of Table 1, and the result is 661-668.
Xc = {x1, x2 , x3 , x4 , x6 , x7 , x10, x11, x13, x14, x16}. [2] Haken. Synergetics—the Mystery that Nature
Constitutes [M]. Ling Fuhua, trans. Shanghai
If there is a relationship between translation publishing house, 2001.
indexes xi and x j in X c , i.e. xi = kx j ( k ≠ 0 )or a [3] Deng Julong. The basic method and theory of gray
system. The Press of Huazhong University of Science
correlation coefficient between them, and Technology, 1987.
i.e. r ( xi , x j ) > α ( α is the threshold which is used in [4] Hu Xuefeng. On the establishment and improvement of
the statistical indexes system of Real estate, The
evaluating systems.),we can remove one index or Journal of ShanXi Einance and Economics University,
2002.2,86-89.
replace it with another, which can further simplify X c .
[5] Tang Jianguo,Tan Shuming. Research into finding core
In terms of the mentioned indexes grey clustering algorithm about decision system in rough set theory,
constraints, the core of real estate system of Wuhan Control and Decision, 2003(4 ): 449-452. ( in
Chinese)
is I = {x1 , x2 , x3 , x4 , x6 , x7 , x10 , x13 , x14 } . [6] Wang Xiaobo. The study of economy cycle and early
The application of these indexes in analyzing the warning, The Press of Metallurgy Industry, 1993.
operation trends of the real estate works to that whether [7] Ye Yanbing, Ding Lieyun. Design and study of real
estate early warning indexes system. Optimization of
these indexes can correctly reflect the operation trends Capital Construction,2001.3, 1-3.
of the real estate system of Wuhan or not. Among
many approaches, we select the diffusion index (Wang
Xiaobo, 1993) to analyze the real estate system. The
result is presented as follows:
766
2008 International Conference on Intelligent Computation Technology and Automation
768
2.3. Discretization Algorithm ( x, m,Vm ), ( x, m,Vm′ ) ∈ G × M × V ,if Vm = Vm′ .
K=(G,M,V) is called a discretization formal context.
Algorithm
Input: The data table of information system S; In a discretization formal context, A ⊆ G , let
Output: Optimization cut-splitting set; AL = {(m, w) | m( g ) = m(h) = w, m ∈ M , ∀g , h ∈ A}
1. Built a candidate cutting set;
and A = {g ∈ G | m( g ) = w, ∀( m, w) ∈ A } .
LL L
2. Compute cut-splitting discernibility
matrix, m(x,y)= { cθi∈C |f(x,θ)≠ Then
f(x,θ),x,y∈G}; A LLL = ( A LL ) L =
3. Compute
n {(m, w) | m( g ) = m(h) = w, m ∈ M , ∀g , h ∈ A LL }
p(cθi)= ∑ (k
l =2
l × counterciθ ) / l ; and
ALLLL = ( ALLL ) L = {g ∈ G | m( g ) = w, ∀(m, w) ∈ ALLL }
4. Delete repetition of cut-splitting.
Complexity hold.
The first step is computing the discernibility matrix. It ia obviously that we draw a conclusion base
Its time complexity is O(k| M|×|G|2 ) , k =|V|. Then, on ALL is a subset of G .
Computing all p(cθi) consume O(k| M|×|G|2 ). The Definition 5 A formal concept of the discretization
kernel step is seeking complete cut-splitting set. The formal context K=(G,M,V) is a pair (ALL,AL) with A⊆G,
time complexity is O((k| M|×|G|2 )/2). At the worst, the ALLL=AL. We call ALL the extent and AL the intent of the
cycle-criterion is all over attribute set. The complexity concept (ALL,AL). ℜ denotes the set of all concepts of
is O(k| M|×|G|2 ). the context K=(G,M,V). If (A1,B1),(A2,B2)∈ℜ are
Suppose average of attribute numbers be m, the time concepts of the context, (A1,B1) is called a subconcept
complexity is |G|2|M|2m. It’s of advantage to more of (A2,B2),provided that A1⊆A2 (which is equivalent B2
attribute value and complex value comparing with ⊆ B1). In this case, (A2,B2) is superconcept of (A1,B1).
those methods[7]. One can prove that (ℜ,≤) is a partial order complete
lattice.
4. Galios lattice on the discretization Example 2. Galois lattice of discretization of the
system iris.data is given in figure 1. Thereinto, a1 denotes
a(x1)=1, (x1x2, a1b3d1) to ({x1,x2},{ a1, b3, d1}),etc.
After discretization, the system becomes a data set
that all attribute values are signless integrals positive
(x1x2x3x4x5x6, ∅)
integer. Extending from standard concept lattice we
can define and construct a Galois lattice on this
discretization data set.
(x1x2,a1b3d1) (x3x4,b2) (x4x5,d4) (x3x5, a4c5) (x5x6, b1)
In classical formal concept analysis, there is a map
between A ⊆ G and B ⊆ M: (x1,a1b3c2d1) (x2, a1b3c1d1) (x3, a4b2c5d3) (x4, a3b2c4d4) (x5, a4b1c5d4) (x6, a2b1c3d2)
A′ := {m ∈ M ∀g ∈ A ⋅ g Im} , (∅,a1a2a3a4b1b2b3c1c2c3c4c5d1d2d3d4)
769
Supposing formal concepts C1=(A1,B1) information. Having a strategy for using the stored data
,C2=(A2,B2) in ℜ and C1≤C2, the support of association to extract hidden information would typically be
rule {B2⇒B1\B2} is support(B2⇒B1\B2)=|A2|/|G|. The beneficial for a company or organization.One typical
confidence is confidence(B2⇒B1\B2)=|A1|/|A2|. example is a medical system where a diagnosis is
For a given threshold minsup, one can compute suggested based on previous similar cases. In this
attributes that supports are great than minsup. A Galois section we present important association rules
lattice is constructed by the attributes. Then the discovered by our algorithm. Our algorithm
association rules are discovered from the lattice in implementation was done in the C# language.
order to reduce complexity. Our experiments were based on data set Cleveland
of Heart Disease Databases obtained UCI. The data set
5.Experiments
consisted of 303 patient records having 77 attributes.
Modern computer technology enables the storing
We selected the 11 most important medical attributes
of huge amounts of data at a moderate cost. The
for mining listed in table3.
collected data could contain potentially valuable
Table 3. The attribues and their meanings
No. attribute meanings
3# age age in years
4# sex sex (1 = male; 0 = female)
10# trestbps resting blood pressure (in mm Hg on admission to the hospital)
12# chol serum cholestoral in mg/dl
16# fbs (fasting blood sugar > 120 mg/dl) (1 = true; 0 = false)
resting electrocardiographic results
0: normal
19# restecg 1: having ST-T wave abnormality (T wave inversions and/or ST elevation or
depression of > 0.05 mV)
2: showing probable or definite left ventricular hypertrophy by Estes' criteria
32# thalach maximum heart rate achieved
38# extang exercise induced angina (1 = yes; 0 = no)
40# oldpeak ST depression induced by exercise relative to rest
the slope of the peak exercise ST segment
1: upsloping
41# slope
2: flat
3: downsloping
diagnosis of heart disease (angiographic disease status)
58# num 0: < 50% diameter narrowing
1: > 50% diameter narrowing
On the assumption that minsups of support and who exercises induced angina, the resting blood
confidence are 20%,60%, we have tables as follows. pressure, fasting blood sugar and depression induced
Only association rules with a conclusion ‘num =0’ or by exercise relative to rest are normal. The possibility
‘num =1’ are listed on account of the relation between is 85%.
possible causes and heart disease. One is a heart
disease patient if his num =0. Otherwise, num =1.
In this case some medical fields are mined for
association rules. All these rules have the potential to
improve the expert system. In table 4, we can see there
is more incidence of coronary disease in the patients
whose oldpeak>=1.55. The fourth rule has higher
support, compared to the other rules. It states that one
is older than 55, his ST is abnormality and peak value
of ST is smooth, has a higher chance of having
coronary disease; note that there is the chance that
some of these patients are around 74%.
Table 5 shows the impact of the factors on
coronary disease. For instance, the third rule denotes a
percentage of 19 patients have no coronary disease,
770
Table 4. Association rules that conclusion is ‘num =0’
ID association rule support confidence
1 If age>54.5and sex=male then num=0 0.3 0.61
2 If age>54.5 and sex=male and oldpeak>1.55 then num=0 0.23 0.73
3 If sex=male and oldpeak>1.55 and slope=2 then num=0 0.22 0.82
4 If age>54.5 and oldpeak>1.55 and slope=2 then num=0 0.22 0.74
5 If chol=0 and oldpeak>1.55 then num=0 0.21 0.63
6 If restecg=1or restecg=2 and oldpeak>1.55 then num=0 0.20 0.66
7 If age>54.5 and extang=no then num=0 0.18 0.8
8 If extang=no and oldpeak>=1.55 then num=0 0.21 0.86
771
2008 International Conference on Intelligent Computation Technology and Automation
773
SPSS 13.0 are used in this paper. The total sample is indicators of BOD structure are relative with indicators
consisted of 520 business groups’ members, including of firm performance.
134 headquaters and 386 subsidiaries. All financial Tab. 1 Descriptive statistics of the subsidiaries
data is from annual reports of these companies. Variables Mean Std. Deviation Minimum Maximum
EPS 0.240 0.230 0.010 1.290
3.2 Variables Firm ROE 6.745 6.555 0.000 38.350
PerformanceCROA 12.954 8.532 - 14.805 54.942
Four indicators are taken to represent firm Q 1.079 0.224 0.370 3.790
performance: earnings per share(EPS), return on TSR 0.398 0.111 0.027 0.878
equity(ROE), critical business return on asset(CROA),
CR1 0.462 0.161 0.000 0.838
and Tobin’Q. We suggest five indicators to reflect the Ownership
CR5 0.594 0.133 0.000 0.957
informantion of ownership structure in this paper, Structure
Z 48.039 98.419 1.000 596.555
namely, percentage of tradable shares(TSR), share
MSR 2.769 31.914 0.000 570.974
percentage of the first shareholder(CR1), share
percentage of the top five shareholders(CR5), rate of CHA 0.331 0.222 0.000 1.000
the first shareholder’ sharing on the second BOD IND 0.344 0.042 0.180 0.500
shareholder’s(Z), and percentage of managerial Structure INT 0.105 0.113 0.000 0.440
ownership(MSR). Structure of BOD can be reflected OWN 0.167 0.219 0.000 0.860
by four indicators, which is respectively rate of chain DEBT 1,673,150,0472,804,159,379 8,099,392 24,234,071,360
Size
directors(CHA), independent directors(IND), internal ASSET 3,213,592,6874,087,336,83641,315,132 33,358,929,103
directors(INT), and directors who own corporate
ownership(OWN). Also two controlling variables, total Tab. 2 Descriptive statistics of the headquarters
asset and total debt, are put in the research.
4. Results
The descriptive statistics of the variables in the
subsidiaries and headquarters are respectively shown in
Tab. 1 and Tab. 2. It can be seen that values of the
standard deviation of variables are quite large, which
means there are significant differences on firm
performance, ownship structure and BOD structure
between subsidiaries and headquarters. Tab. 3 and Tab.
4 report the correlation matrixs of these variables in
these two group companies
In this paper, a SEM tool, LISREL 8.7, is taken to
do regression analysis of the modles of the relation
between ownership structure and firm performance and
between BOD structure and firm performance.
Fig.1 and Fig 3 show the regression results of the
relation between ownership structure and corporate Tab. 3 Correlation matrix of variables in the
perfromance. It is can be seen that in subsidiaries, subsidiaries
according to the t-values, EPS is positively related to
CR1 and ASSET and negatively related to Z and
DEBT. ROE is negatively related to Z and positively
related to ASSET. CROA is positively related to Z and
negatively related to DEBT. There is no relation
between Q and ownership structure indicators.
However, in headquarters, there is only MSR which
has positive effect on ROE, while there are no
relationships among other indicators of firm
performance and ownership structure. With the t-
values of Fig. 2 and Fig. 4, it is not found that four
774
Significant at * p<0.1, **p<0.05, ***p<0.01.
Fig. 3 Regression results of the model of ownership
structure and firm performance in headquarters
Tab. 4 Correlation matrix of variables in the
headquarters
5. Conclusions
In this paper, a data mining method based on SEM
Fig. 2 Regression results of the model of BOD is used to analyze corporate governance issues in
structure and firm performance in subsidiaries Chinese business groups. With the foundings of this
paper, it can be suggested that ownership structure play
a significant role in corporate governance, since five
indicators we have chosen representing ownership
structure show different effect on firm performance.
Specifically speaking, the first shareholder’s ownership
and managerial ownership are positively relative to
firm performance while Z indicator has negative effect
775
on firm performance. It is found that BOD structure [13] Morck R, Shleifer A, Vishny R. (1988). Management
have no significant relationship with firm performance. Ownership and Market Valuation:an Empirical Analysis.
And it shows that there are significant differentces in Journal of Financial Economics, 20:293-315.
subsidiaries and headquarters in business groups in [14] Cho M H. (1998). Ownership Structure,Investment and
the Corporate Value: An Empirical Analysis. Journal of
China. All these foundings can be used to help
Financial Economics, 47:103-121.
shareholders and managers in decision-makings. [15] McConnell J, Servaes H. (1990). Additional Evidence
on Equity Ownership and Corporate Value. Journal of
6. Acknowledgment Financial Economics, 27:595-612.
[16] Han K C, Suk D Y. (1998) The Effects of Ownership
This research was supported by foundations of Structure on Firm Performance: Additional Evidence.
Ministry Education of China under Grant 04JZD0018, Review of Financial Economics, 7:143-155.
[17] Akimova I, Schwodiauer G. (2004). Ownership
New Century Excellent Talents of Ministry Education
Structure, Corporate Governance and Enterprise Performance:
of China under Grant NECT-04-0815(2005no.35) and Empirical Results for Ukraine. International Advances in
National Natural Science Foundation of China under Economic Research, 10(1):28-42.
70772028. [18] Miguel A, Pindado J, Torre C. (2004). Ownership
Structure and Firm Value: New Evidence form Spain.
7. References Strategic Management Journal, 25:1199-1207.
[19] Yuan Guoliang, Zheng Jianghuai, Hu Zhiqian. (1999). A
[1] Pass S. (1997). Discovering in a value mountain of data. Case Study of the Financing Propensity and Ability of
ORMS Today, 10: 24-28. Chinese Quoted Corporations. Management World, (3):150-
[2] Shi Y., Wise M., Luo M., Lin Y. (2001). Data mining in 157(in Chinese).
credit card portfolio management: a multiple criteria decision [20] Wei Gang. (2000). Incentives forTop-Management and
Performance of Listed Companies. Economy Research,
making approach, eds. M. Koksalan, S. Zionts. Multiple
(3):32-39(in Chinese).
Criteria Decision Making in the New Millennium, 427–436.
[3] Tsoukalas L. H., Uhrig R. E. (1997). Fuzzy and Neural [21] Yu Dongzhi. (2003). Board of Directors, Corporation
Applications in Engineering. Wiley, New York. Governance and Performance: An Empirical Analysis of
[4] Jang J. S. R., Sun C. T., Mizutani E. (1997). Neuro- Listed Companies in China. Social Science in China, (3):29-
Fuzzy and Soft Computing. Prentice Hall, Upper Saddle 41(in Chinese).
River, New Jersey.
[5] Khanna T, Rivkin J W. (2001). Estimating the
Performance Effects of Business Groups in Emerging
Markets. Strategic Management Journal, 22(1).
[6] Keister L.(1998). Engineering Growth: Business Group
Structure and Firm Performance in China’s Transition
Economy. American Journal of Sociology, 10:404-440.
[7] Perotti E C, Gelfer S. (2001). Red Barons or Robber
Barons? Governance and Investment in Russian Financial-
Industrial Groups. European Economic Review, 45(9):1601.
[8] Chang S J, Choi U. (1998). Strategy, Structure and
Performance of Korean Business Groups: A Transactions
Cost Approach. Journal of Industrial Economics, 37(2):141-
159.
[9] Khanna T, Palepu K. (1999). Policy Shocks, Market
Intermediaries and Corporate Strategy: Evidence from Chile
and India. Journal of Economics and Management Strategy,
2(1):271-310.
[10] Khanna T, Palepu K. (2000). The Future of Business
Groups: Long Run Evidence From Chile. Academy of
Management Journal, 43:268-285.
[11] Weinstein D E, Yafeh Y. (1995). Japan's Corporate
Groups: Collusive or Competitive? An Empirical
Investigation of Keiretsu Behavior. The Journal of Industrial
Economics, 43(4):359-366.
[12] Jensen M C, Meckling W H.(1976). Theory of the Firm:
Managerial Behavior, Agency Costs and Ownership
Structure. Journal of Financial Economics, (3):305-360.
776
2008 International Conference on Intelligent Computation Technology and Automation
778
the actual contents of data mining and information correlation table, which Experts from various
decision-making. departments have done the same results of evaluation,
Table 2. The representation of elements in to facilitate data mining. Data mining is usually to find
quotient set the association rules given in the relations with certain
Granule Granule number form: Let X and Y are two basic sets given in the
Granule relations, if the times, which the association rules or
name of binary system
[A1] {u1,u3,u8,u9,u12} 101000011001 individual given in the relations occurred, reach s% or
[A2] {u2,u7,u10} 010000100100 more, we calls the association rules can be extracted,
[A3] {u4,u6} 000101000000 marking as (X, Y). Here given the general process for
[A4] {u5} 000010000000 searching the association rules (X, Y):
[A5] {u11} 000000000010 (1) Computing the combination formats of all the X
Table 3 is the expansion of Table 1, viz., the and Y may be;
individual of a single attributes extends to the (2) Counting the time which some possible formats
information table of many characters. Here only listed appear in the given format;
three characters in the information table. For the (3) To find out the association rules of which the
relationship in table 3, its equivalence class sets of the appearance time ≥ s% given in the relations.
attribute in each column are listed below: Now in terms of these principles, we can seek the
(1) U/IND(departments)={[A1], [A2], [A3], [A4], association rules through Granule computing.
[A5]}; expressed 12 assessment experts are from five Obviously, the number of the association rules (X, Y)
different departments. which satisfied the conditions ≤ the number of Granule
(2) U/IND(assessment items)={[X1], [X2], [X3], in quotient set, so it is another data reduction from
[X4], [X5]}; expressed the five items will be evaluated. quotient set to the association rules set.
Of which: It is one association degree between experts from
[X1]={u1,u5,u6};[X2]={u2,u8,u12};[X3]={u3,u9,u11};[ different departments and the same excellent results of
X4]={u4};[X5]={u7, u10};expressed the experts of evaluation.
corresponding serial number were selected randomly For this we fully integrate the Boolean calculation
will evaluate different items. of binary digit, which puts forward more simple to
(3) U / IND (evaluation results)={[lower], [general], determine the relations:
[excellent]}. Table 4. Granule on-bit AND operation
Of which: Combina Binary AND The binary The total
[lower] = {u5}; [general] = {u1, u4, u7, u10, u11}; tion operation numbers number
[excellent] = {u2, u3, u6, u8, u9, u12}; expressed the results of of 1
evaluation results given by the experts of different operation appeared
serial number for assessment items. [A2] 0100001001 0100000000 1
Table 3. Multi-attribute relations list AND 00 AND 00
U Department(A) Assessment Evaluation [excellen 0110010110
items(X) results t] 01
u1 A1 X1 general [A3] 0001010000 0000010000 1
u2 A2 X2 excellent AND 00 AND 00
u3 A1 X3 excellent [excellen 0110010110
t] 01
u4 A3 X4 general
[A4] 0000100000 0000000000 0
u5 A4 X1 lower
AND 00 AND 00
u6 A3 X1 excellent
[excellen 0110010110
u7 A2 X5 general
t] 01
u8 A1 X2 excellent
[A5] 0000000000 0000000000 0
u9 A1 X3 excellent AND 10 AND 00
u10 A2 X5 general [excellen 0110010110
u11 A5 X3 general t] 01
u12 A1 X2 excellent [A1] 1010000110 0010000110 4
The classification of the various attributes combined AND 01 AND 01
Table 3 can be intuitive to elicit: more than 66% in [excellen 0110010110
excellent evaluation of the items is the experts from the t] 01
department A1 presented; If this judgment requires us
to make a detailed description, and to make a
779
In table 4 are presented the corresponding binary [excell 0110010110
AND operation under the combination and gaining ent] 01
possession of the assessment experts’ subordinate [A3] 0001010000
department and the excellent results of the evaluation, NOR 00 NOR 1000101001
and their results are listed in corresponding to the right 5
[excell 0110010110 10
column. the assessment experts from the sector A1 and ent] 01
the excellent results of the evaluation are present to the [A4] 0000100000
bottom line in table 4, which the total number that 1 NOR 00 NOR 1001001001
appears is 4; if s = 10, clearly A1 meet the 5
[excell 0110010110 10
requirements; if S = 5, At this point A1、A2、A3 are ent] 01
all to meet requirements, if the data mining asked to [A5] 0000000000
mine the two rules of the largest association degree, NOR 10 NOR 1001101001
5
then how to select again from A2、A3. [excell 0110010110 00
In the binary on-bit XOR logic operation: while ent] 01
input the same two digits, it will output 0, while input [A1] 1010000110
the two different digits, it will output 1. In the binary NOR 01 NOR 0001101001
5
on-bit NOR logic operation: what input has 1 then [excell 0110010110 10
output 0, what input is all 0 then output 1. For the ent] 01
combination of the various Experts’ subordinate
departments and the excellent evaluation, the doneness 4. The Associated Gray Matrix of Granule
of binary on-bit XOR and on-bit NOR operations were computing based on the number of binary
shown in tables 5, 6.
Table 5. Granule on-bit XOR operation
system
The binary The total
Binary We can conclude clearly from Table 4, 5, 6: the sum
Combi numbers number of
XOR of probability gained in the same context is 1 after the
nation results of 1
operation AND, XOR, NOR operation. The binary sort of table
operation appeared
[A2] 0100001001 can be understood as: the sort of the voting results, 1
XOR 00 XOR 0010011111 presented assent, 0 presented opposition. For the
7 binary sort of excellent results of assessment, it can be
[excell 0110010110 01
ent] 01 represented the survey results that the projects assessed
[A3] 0001010000 by public opinion, so that its all sort in each table
XOR 00 XOR 0111000110 remains unchanged. For U/IND (departments)
6 ={[A1],[A2],[A3],[A4],[A5]},the different binary
[excell 0110010110 01
ent] 01 arrangement listed by the different departments can be
[A4] 0000100000 understood as: the projects of assessment sort in
XOR 00 XOR 0110110110 various sectors with internal point of view. 1 or 0 are
7 on both sides in the table 4, 5, 6, explaining the experts
[excell 0110010110 01
ent] 01 have the same points of view with public opinion for
assessment of this project, are in favor of or against
[A5] 0000000000
this project's implementation. If 1 and 0 on both sides
XOR 10 XOR 0110010110
7 are not appearance at the same time, show that
[excell 0110010110 11
opinions of group of the assessment experts and the
ent] 01
views of public opinion on this project are different,
[A1] 1010000110
and the implementation of this project needs to assess
XOR 01 XOR 1100010000
3 once again.
[excell 0110010110 00
The results of on-bit AND operation used in this
ent] 01
paper are defined as certainty information, that of on-
Table 6. Granule on-bit NOR operation bit XOR operation are defined as uncertainty
The binary The total information, and that of on-bit NOR operation are
Binary
Combi numbers number of defined as the opposed information. The probabilities
NOR
nation results of 1
operation of their counterparts were expressed as: tA、fA、 1−tA − fA .
operation appeared
[A2] 0100001001 1001100000 Obviously: the association degree of each
4 1− f
NOR 00 NOR 10 evaluation attributes are all a grey number γ (⊗)|tA A ,
780
viz.: γ (⊗) ∈[ t A ,1-fA ] , order γ (⊗) represented the t A1 = 4 /12 = 1/ 3, t A 2 = 1/12, t A3 = 1/12, t A 4 = 0, t A5 = 0
corresponding grey association degree, then t A1 > t A 2 = t A3 > t A 4 = t A5 ,
inf γ (⊗) = t A , sup γ (⊗) = 1-fA ; their whitening g D (⊗ A1 ) < g D (⊗ A3 ) < g D (⊗ A 2 ) = g D (⊗ A 4 ) = g D (⊗ A5 ) .
) = α t + (1 − α )(1-f ), α ∈ [0,1] ,
association degree γ (⊗ So we learn that A1, A3 are the two information
A A
781
2008 International Conference on Intelligent Computation Technology and Automation
Abstract-Survival in a knowledge-based economy is derived from improves organizational decision-making, creates knowledge
the ability to convert information to knowledge. To do so, and provides added value to customers. And researchers
researchers and managers are increasingly relying on the field of increasingly have tremendous opportunities to identify and
data mining. Data mining identifies and confirms relationships examine patterns in information to create valuable knowledge
between explanatory and criterion variables. Data mining are for society.
increasingly popular because of the substantial contributions
Survival in a knowledge-based economy is derived from
they can make in converting information to knowledge.
the ability to convert information to knowledge. To do so,
Marketing is among the most frequent applications of the
researchers and managers are increasingly relying on the field
techniques, and whether you think about product development,
of data mining. The purpose of this paper is to provide an
advertising, distribution and retailing, or marketing research
overview of data mining, summarize how it is impacting
and business intelligence, data mining increasingly are being
knowledge creation in marketing, and suggest future
applied. The purpose of this paper is to provide an overview of
developments in marketing and data mining for both
data mining, summarize how it impact on knowledge creation in
organizations and researchers.
marketing, and suggest future developments in marketing and
data mining for both organizations and researchers. II. DATA MINING: AN OVERVIEW
Keywords-Knowledge creation; data mining A. Definition
I. INTRODUCTION “Data mining” is defined as a sophisticated data search
A cornerstone of innovation in the knowledge-based capability that uses statistical algorithms to discover patterns
economy is information. But to use information to improve and correlations in data [4]. The term is an analogy to gold or
decision-making and stimulate innovation, we must convert it coal mining; data mining finds and extracts knowledge (“data
to knowledge. The challenge of converting information to nuggets”) buried in corporate data warehouses, or information
knowledge was first identified by Tom Peters in his book that visitors have dropped on a website, most of which can
Thriving on Chaos[1]. The challenge has increased lead to improvements in the understanding and use of the data.
dramatically in recent years, with experts estimating that in the The data mining approach is complementary to other data
next three years (2007-2009) humanity will generate more data analysis techniques such as statistics, on-line analytical
than it has in the past 1,000 years[2]. processing (OLAP), spreadsheets, and basic data access. In
simple terms, data mining is another way to find meaning in
In the past decade, more than one-half of the human race
data.
has moved its work, shopping, playing and chatting online,
creating mountains of digital data that once would have Data mining discovers patterns and relationships hidden in
languished on scraps of paper or vanished as forgotten data [5], and is actually part of a larger process called
conversations [3]. Today, virtually all organizations can “knowledge discovery” which describes the steps that must be
convert what was a “waste by-product” into a resource that taken to ensure meaningful results. Data mining software does
783
Kraft Foods 2.5 million customer records. General Motors has
III. KNOWLEDGE CREATION IN MARKETING BASED ON DATA
12 million GM credit card holders in a database containing
MINING
detailed data on customer buying habits. For each name in the
A. Traditional research versus data mining database, the companies have an average of 20 separate pieces
Controversy has arisen over the application of these new of information that can be translated into effective strategies to
analytical tools. Traditional quantitative researchers use theory better serve customers. As an example, Nokia examined six
to develop hypotheses that are then tested. But the newer tools billion data points from customer surveys to create its do-it-all
do not start with theory. Instead they are data driven. As shown multimedia phones under the Nseries brand [9]. Similarly,
in Figure 1, traditional research is based on a theoretical Vodafone typically examines 20 or more predictive models
foundation. But data mining begin by identifying relationships every month in an effort to better understand and predict likely
in data (Figure 2). Hypotheses are then developed and tested as market developments in the telecommunications industry.
part of model building and validation. Once a model is Traditional researchers criticize data mining and data
validated, it is used in data mining. Theory may or may not be mining as unscientific because the techniques are data driven
part of model building. instead of theory driven. They say research based on data
Researchers who use data mining claim that data mining may search for relationships to support preconceived
warehouses are so large it is difficult to fully examine the data notions, or researchers may develop stories to fit relationships
and relationships in order to apply theories to hypothesis found in the data. But even if this does not happen, traditional
development and testing. In fact, today’s largest data researchers argue that judgment may not be used in applying
warehouses have a capacity of 300 or more terabytes, and the findings of these newer tools because too often
many organizations have 100 terabytes of storage capacity. For inexperienced researchers or managers believe if the numbers
example, Vodafone, Tesco, IBM and WalMart all claim to suggest a believable relationship they must be correct.
have data warehouses with a capacity of 250-300 terabytes. As The debate over data driven or theory driven approaches to
a basis of comparison, a single terabyte is equal to 1,024 conducting research will not be resolved quickly. But looking
gigabytes, or one trillion bytes. A single terabyte is equal to beyond these issues most researchers agree that data mining
50,000 trees made into paper and printed, or 10 terabytes is have many advantages. Among the most important advantages
equal to all the print collections in the USA Library of is relationships that would remain hidden are identified by the
Congress [8]. However, you evaluate the capacity of data tools, and decision-making is therefore more informed and
warehouses, one must certainly conclude they contain a better. The reason for improved decision-making is more
tremendous amount of information – enough to overwhelm the complex understanding of the data and its underlying patterns,
data analyst unless the proper software and statistical tools are and more accurate predictions. As a result decisions are more
used. consistent and thus more accurate. When researchers and
The sheer size databases can be amazing. Ford Motor managers increase the accuracy of their decision-making the
Company has 50 million names in its customer database. outcome is increased customer satisfaction and retention for
Citicorp has 30 million names, Kimberly Clark 10 million, and the organization, and therefore lower costs and higher profits.
784
Discovery: the process of looking in a database to find building blocks of matter were cracked open and understood
hidden patterns without a predetermined idea or hypothesis [13]. To date most data mining applications have concentrated
about what the patterns may be. on structured data (numeric and categorical) such as date last
paid, geographic location, average payment, days delinquent or
Predictive Modeling: the process of taking patterns
average balance, and number and type of products and services
discovered from the database and using them to predict the
purchased. Numeric values such as these are readily
future.
understandable and computable. For example, analyses easily
Forensic Analysis: the process of applying the extracted recognize that a customer who uses a product or service ten or
patterns to find anomalous or unusual data elements. more times a year is in a different category than one who
Data mining is used to construct six types of models aimed seldom or never uses the product. Similar results have been
at solving business problems: classification, regression, time developed in predicting customer losses in financial services,
series, clustering, association analysis, and sequence discovery churn in wireless telecommunications, and fraud in insurance
[11]. The first two, classification and regression, are used to and healthcare [14].
make predictions, while association and sequence discovery Different technologies vary in terms of effectiveness and
are used to describe behavior. Clustering can be used for either ease of use. It is businesses and managers who determine how
forecasting or description. Companies in various industries can to exploit collected data, in other words, more of a policy issue
gain a competitive edge by mining their expanding databases than a technology issue. Several precautions have to be taken
for valuable, detailed transaction information. Examples of by business to assure consumers that their privacy will be
such uses are provided below. respected and personal information will not be disclosed
Each of the four applications below makes use of the first without permission. Businesses also have a duty to execute
two activities of data mining: discovery and predictive their privacy policy so as to establish and maintain good
modeling. The discovery process, while not mentioned customer relationships [15].
explicitly in the examples (except in the retail description), is
ACKNOWLEDGMENT
used to identify customer segments. This is done through
The Research is supported by the talent research fund of
conditional logic, analysis of affinities and associations, and
Hunan Agriculture University “Research of Customer Lifetime
trends and variations. Each of the application categories
Value Management System” under the grant No: 07YJ04 and
described below describes some sort of predictive modeling.
Hunan Provincial Natural Science Foundation of China under
Each business is interested in predicting the behavior of its
Grant No: 07JJ5114.
customers through the knowledge gained in data mining [12].
REFERENCES
IV. FUTURE DEVELOPMENTS
[1] Tom J. Peters. Thriving on Chaos: Handbook for Management
So what does the future hold for the emerging field of data Revolutions[M]. New York: Alfred P. Knopf, 1988.
[2] Mark, E. (2006), “Fragile digital data in danger of fading past history’s
mining? Data will continue to increase exponentially, but data reach”, Atlanta Journal Constitution, June 7, p. A1.
quality will need to improve. There is no indication the amount [3] Goldman, N. (2006), “Math will rock your world”, Business Week
Online, January 23.
of data will decrease. Indeed, it appears evident that it will [4] Newton’s Telecom Dictionary, Harry Newton, CMP Books,
continue to increase substantially. The task ahead then is to http://www.cmpbooks.com
[5] Koh Hian Chye, Chan Kin Leong Gerry, Data mining and customer
ensure the quality of data increases. Much progress has been relationship marketing in the banking industry, Singapore Management
made in recent years, but the pressure to cut costs and make Review, 2002; 24, 2;
[6] T. Fawcett, F. Provost, Combining data mining and machine learning
quick decisions will slow efforts to improve the quality of data. for effective user profiling, Proc. of 2nd ACM SIGKDD Int’l Conf. on
Knowledge Discovery and Data Mining (KDD-96), ACM, New York,
If used properly, the huge databases created by businesses NY, 1996, pp. 8– 13.
[7] M.J. Shaw, C. Subramaniam, G.W. Tan, M.E. Welge, Knowledge
worldwide will revolutionize the ability to identify, understand management and data mining for marketing, Decision Support Systems
31 (1) Elsevier, Amsterdam, The Netherlands (2001) 127– 137.
and predict customer needs and market developments. Indeed,
[8] London, S. (2002), “Customer information is the new commodity”,
access to the information captured and made manageable by Financial Times, p. 12.
modern databases is the business equivalent of the scientific [9] Edwards, C. and Ihlwan, M. (2006), “The future of tech”, Business
Week, December 4, p. 78.
breakthroughs of the last century when the fundamental
785
[10] [Jiawei Han, Michelline Kamber, Data mining: conception and
technology, Beijing:Mechanic Industry Publish, 2002.
[11] Yun Chen, Guozheng Zhang, Dengfeng Hu and Shanshan Wang (2006),
Customer Segmentation in Customer Relationship Management Based
on Data Mining, Knowledge Enterprise: Intelligent Strategies in Product
Design, Manufacturing, and Management, Volume 207, pp.288-293
[12] Yun Chen, Guozheng Zhang, etc, Customer Segmentation Based on
Survival Character[J], Journal of Intelligent Manufacturing, Volume 18,
Number 4, August 2007, pp.513-517.
[13] P.B. Chou, E. Grossman, D. Gunopulos, P. Kamesam, Identifying
prospective customers, Proc. of 6th Int’l Conf. on Knowledge Discovery
and Data Mining, ACM, New York, NY, 2000, pp. 447– 456.
[14] J. H. Lee, and S. C. Park, Intelligent profitable customers segmentation
system based on business intelligence tools [J], Expert Systems with
Application, 29, pp. 145-152, 2005.
[15] Karim K Hirji, Exploring data mining implementation Association for
Computing Machinery [J]. Communications of the ACM; Jul 2001; 44,
7; pp.87-100.
786
2008 International Conference on Intelligent Computation Technology and Automation
788
could not change the conditions of the environments Hypothesis. We made an assumption that upstream
actively, we could query and explore different traffic links might be more congested than downstream links
phenomena in different environments through around an intersection. But after studying the recorded
changing the query conditions because each traffic data of that links, it seemed it was not true.
phenomenon was stored in the traffic data warehouse. Verification. To verify the assumption we made, we
There three kinds of online analysis in IETS. chose three adjoining links appeared unusual with two
First was online analysis of micro traffic state. We links before an arterial intersection and one follow the
could present all micro traffic state recorded in data intersection. To simplify the result, we numbered the
warehouse and replay traffic evolvement in different three links as 1, 2 and 3. Figure 3 shows the study links.
time and space. In this case we displayed phenomena The traffic flow direction was the same as the arrow
relative to geographic space using GIS techniques. showed. The yellow area was an intersection where
Those phenomena included traffic state of a whole two arterial roads crossed.
road network, or trajectory of one vehicle.
Second was mesoanalysis of traffic information. We
could make the micro data more understandable
through aggregating the data according to different
conditions such as time and space. The results were
presented as traditional statistical reports, also were
sliced, diced, and drilled up and down in varied
dimensions. In this case we provided analysis of top
congested roads and links, or congested time spans.
Third was exploring of unknown phenomena. For
example, we could analyze the relationship by data
mining tools between the travel speed of one link and
Figure 3. Studying links
that of its reversed link to explore how “tide” traffic
We compared the processed traffic state among the
evolved in different time and space.
three links in some time span. In this case, the data
In the knowledge discovering procedure, we often
were retrieved from 3pm to 4pm in Mar 24, 2008. The
abided by an observation-hypothesis-verification
traffic state was processed into three states, 1 as
principle. We first made some hypothesis through
blocked, 2 as congested and 3 as free. The compare
observation from the statistical results or visual map,
result is shown in figure 4. We were surprise to found
and then we used the data again to confirm our
that the downstream link, link 3, was more likely to be
assumption. An example of data exploring was given
congested than the upstream link, link 1 was. Then we
below.
could draw a conclusion that in flat hours the effect of
Observation. In the case, we could learn real time
an arterial intersection to the downstream link is more
road traffic states through color filled in the roads’
serious than that to the upstream link, except the
shape. Here the color blue, yellow, red represents three
upstream link adjoining the intersection.
traffic states free, congested, blocked in turn. Figure 2
shows a general traffic state view of a road network. Wusong road(Yuhang-Haining North) traffic
The network states changed while time elapsed. And state (2008-3-24 15:00~16:00)
0
15:00 15:05 15:10 15:15 15:20 15:25 15:30 15:35 15:40 15:45 15:50 15:55
Time span
Link 1 Link 2 Link 3
789
from the intersection would spread to the next support to the planers and managers of transportation
upstream link. systems.
To exploring more information, we could also look In this case we illustrated a procedure of knowledge
into more detail data. Considering the links in figure 3 discovery in IETS. Because the IETS was still under
again, we saw about the travel speed of link 1 and link constructing and the data, to some extent, were instable
2. This time the data told us that in flat hours and peak and insufficient, the results we gained might not match
hours, the effect was different. Figure 5 shows the the factual transportation system. Another problem was
travel speed of link 1 and link 2. The data was retrieve that we hadn’t made the data exploring procedure
from 3pm to 8:30pm in Mar 24, 2008. automatization. Most of the jobs were done by manual.
Wusong road(Yuhang-Haining) travel speed
(2008-3-24) 5. Acknowledgement
9
8
7 This research was sponsored by funding the grand
Travel speed (m/s)
15:15
15:30
15:45
16:00
16:15
16:30
16:45
17:00
17:15
17:30
17:45
18:00
18:15
18:30
18:45
19:00
19:15
19:30
19:45
20:00
20:15
20:30
790
2008 International Conference on Intelligent Computation Technology and Automation
792
If confω (¬A⇒B) ≥ minconf then
3.2 Mining association rules in multi-database NARs = NARs∪ {¬A⇒B};
}
We revision P-S interestingness and extended it to };
mining association rules in multi-database. If the rule output PARs and NARs
A⇒B is interesting only if it meet the condition that
|suppω(A∪B) −suppω(A)*suppω(B) |≥mininterest. The 5. Experimental results
correlation of association rules can solve the self-
contradictory rules, so we improved the P-S In order to demonstrate that our method is effective,
interestingness. Let the correlation of the synthesized we do the experiment on AMD3000+,1.8GHz,
frequent itemset A and B is corr ω(A, B) 512RAM,WinXP,PowerBuilder6.5,suppose three
Corr ω(A,B)= suppω (A∪B)−suppω (A)suppω (B) databases is D1,D2,D3, the number of transaction is
Where suppω(A∪B), suppω (A), suppω (B) is the 4,6,10,as follows:
support of frequent itemset AB, A, B in each database D1={(A,B,D); (A,B,C,E); (A,B,C,D); (B,C,D); }
after synthesizing. If corrω(A,B)>0 then (1)corrω(A,¬B)<0 D2={(A,B,C); (A,C,D,E); (B,C,D); (B,D,E); (A,C,E);
(A,B,D,E); }
(2)corrω(¬A,B)<0 (3)corrω(¬A,¬B)>0,and vice versa. The
D3={(A,B,C); (A,B,C,D); (A,B,C,E); (B,D,E);
theorem is the same with reference [2]
(B,C,D,E); (A,B,C,D,E); (B,C,E); (C,D,E);
(1) If corrω(A,B)>0 we mine rules of the forms A⇒B and
(A,C,D,E); (A,B,D,E); }
¬A⇒¬B
So the weight of database is ω1=0.2, ω2=0.3, ω3=0.5,
(2) If corrω(A,B)<0, we mine rules of the forms A⇒¬B
we set the minsupp is 0.3, 0.3, 0.4, minsuppω=0.2,
and ¬A⇒B
minconf=0.3. We synthesized frequent itemset by the
(3) If corrω(A,B)=0, there is no rules generated weight of database after got frequent itemsets by
Aprior. Table.1 is the number of association rule
4. Algorithm design generated by PNAR_MDB _on P-S measure .Flag=11,
flag=12, flag=13, flag=14 denote association rules of
Algorithm: PNAR_MDB _on P-S measure the form A⇒B, A⇒¬B, ¬A⇒B, ¬A⇒¬B respectively.
Input: FS1, FS2…FSm: the frequent itemsets database
D1, D2…Dm Table 1. The number of association rules
minsuppω: the threshold of the globe support,
minconf: the threshold of the confidence interestingness 11 12 13 14 prune Total
0 24 4 4 24 ⎯ 56
ω1, ω2 … ωm: the weight of database D1, D2…Dm
0.03 20 4 4 18 8 48
mininterest: the minimum of interestingness
0.06 18 4 4 18 12 44
Output: PARs and NARs: Put databases in
① FS ← {FS1, FS2…FSm}; PARs =Φ; NARs =Φ single data by 75 ⎯ ⎯ ⎯ ⎯ 75
② for each frenquent itemset X in FS do Apriori
suppω (X) =ω1×supp1 (X) +ω2×supp2 (X) +…+ωm
×suppm (X) From table.1, we can see that the number of
If suppω (X) <minsupp association rules by Apriori is 75, but by the method of
FS ←FS -{X} our proposed, the number is decreased obviously. At
③for each synthesized frequent itemset X in FS do the same time, with interestingness increasing, the
For any itemset A∪B =X and A∩B=Φ do { number of pruned rules also increases. This means that
the interestingness can be used to prune less valued
If|suppω(A∪B)−suppω(A)suppω(B)|≥mininterest
rules effectively.
then {
If suppω (A∪B) −suppω (A) suppω (B)>0 then {
If conf ω (A⇒B) ≥ minconf then
6. Conclusions and future work
PARs = PARs∪ {A⇒B};
When mining multi-database, because the factor of
If conf ω (¬A⇒¬B) ≥ minconf then
volume of business , profit and so on is different ,so
NARs = NARs∪ {¬A⇒¬B}; the weighting of database is different, synthesizing the
} frequent itemset which in different databases, which
If suppω (A∪B)−suppω (A)suppω (B)<0 then { can avoid Knowledge conflicts within databases
If confω (A⇒¬B) ≥ minconf then may occur when mining both the positive and negative
NARs = NARs∪ {A⇒¬B}; association rules simultaneously, Moreover, according
793
to Piatetsky-Shapiro’s argument, an association rule is [3] Brin, S., Motwani, R., Silverstein, and C.Beyond Market:
interesting only if the rule meets the minimum Generalizing Association Rules to Correlations. In
interestingness condition. This condition is extended Processing of the ACM SIGMOD Conference, 1997:
association rules in multi-database. This way can prune 265-276
[4] Savasere, A., Omiecinski, E., Navathe, S. Mining for
the rules, whose interestingness is low. Strong Negative Associations in a Large Database of
Customer Transaction. In Proceedings of the 1998
Acknowledgements International Conference on Data Engineering, 1998:
494-502
This work was partially supported by Shandong [5] Zhang, C., Zhang, S.: Association Rule Mining, LNAI
Science Foundation (Y2007G25); the National Post 2307, Springer-Verlag Berlin Heidelberg (2002) 47-84.
Doctor Foundation of China under Grant [6] Dong, X., Wang, S., Song, H.: Study of Negative
Association Rules, Beijing Institute of Technology
(20070420302) and Excellent Young Scientist Journal 2004, 24(11): 978-981.
Foundation of Shandong Province, China [7] Dong, X., Sun, F., Han, X., Hou, R.: Study of Positive
(2006BS01017). and Negative Association Rules Based on Multi-
confidence and Chi-Squared Test. LNAI 4093,
8. References Springer-Verlag Berlin Heidelberg (2006) 100-109
[8] Dong, X., Niu, Z., Shi, X., Zhang, X., Zhu, D.: Mining
[1]Tang, Y., Niu, L., Zhang, S.: Algorithm Research of both Positive and Negative Association Rules from
Mining Association Rules in Multi-data Sources. Frequent and Infrequent Itemsets. ADMA 2007, LNAI
Journal of Guangxi Normal University, 2002:20(4): 27- 4632, Springer-Verlag Berlin Heidelberg (2007) 122–
31 133.
[2]Dong, X., Song, H., Jiang, H., Lu, Y.: Minimum [9] Ramkumar, T., Srinivasan, R.: Modified algorithms for
Interestingness Based Method for Discovering Positive synthesizing high-frequency rules from different data
and Negative Association Rules. Computer project and sources. Springer-Verlag London (2008)
application, 2004.27:24-31
794
2008 International Conference on Intelligent Computation Technology and Automation
Abstract
2. Data mining and ANN
This paper presents a runoff forecasting method based
on data mining. A runoff forecasting model is built up by Data mining is also known as knowledge discovery in
the data mining tool ANN. Data mining is carried on by database (KDD), which is usually used to analysis huge
BP model and the convergence speed is improved by the data set in order to find unknown relationships and
modification of the weight coefficients. The model is aggregate data characteristics with flexible ways for the
tested in a real project and compared with general database owner. Through data mining, a lot of original
models. The test result and analysis illustrate its good data can be easily understood by attractive modes.
precision of forecasting and good value in the Artificial Neural Network (ANN), or Connectionism
application. Model or Parallel Processing Model, is based on modern
neural science research, which is connected by plenty of
1. Introduction neurons and performs the characteristics of human brain.
ANN is an abstractive and simplified simulation of human
Runoff forecasting is a hydrology problem which is brain. It is a common algorithm of data mining and its
indispensable of reservoir optimal scheduling. Former application into power system causes the hydrological
general methods perform low precision in long-term forecasting come into a new research region [3, 4].
runoff forecasting and can hardly serve for long-term Basic theory of ANN is presented in many references
[4,5]
reservoir optimal scheduling, which leads to the . In this approach, BP is used as a data mining tool to
inevitability of the research about new-style methods, make runoff forecasting. BP was produced by Rumelhart
improvement methods and hybrid methods. in 1985. During the BP study period, the mapping from
Generally, runoff forecasting methods contain process- input to output is achieved by minimizes a price function.
driver model and data-driver model [1]. The former is When the signal is input, it is first sent to the hidden node,
based on hydrology conceptions and principles, which is a through the functional function, the output signal from the
mathematic model for stream flow process forecasting by hidden node is transported to the output layer. After a
simulating the runoff formation process and the river certain treatment, the final result is achieved. The back
evolution process; the latter is a black box method which propagation calculation is relatively difficult; however,
goal is to build optimal mathematic relations between weight coefficient amendment method can be used to
input and output without concerning to the physical improve the precision. A weight coefficient amendment
characteristics. Data-driver model is widely used in many equation is shown in (1).
research fields and new forecasting algorithms develop Δω i (m + 1) = η ∑ δ i O j + aΔω i (m) (1)
rapidly during these years. ANN, nonlinear time series k
analysis model, fuzzy mathematics method and gray Where k is the samples number, η is the study step,
system mode are all data-driver models. Data mining is a
novel technique which has been used in load forecasting δi is the error of iterativation, which is different from
and plant operation for electric system. It’s is an inside units to output units. Unfortunately, in this
innovation to apply data mining technique to runoff amendment method, some of the steps leads to more
forecasting [2]. iterative times although it causes less error than other
3.1. Input and output net structure Where Q̂t is the output value after smoothness
treatment, Qmax ,Qmin are the max. and min. values of
As shown in fig.1. x k (k = 1,2,..., n) are input nodes, the history date of the training sample set.
Ol is the output node, ω ij is the weight value of input
3.3. The forecasting process
796
At first, the history data sample is trained, then the is not a recognized criterion to evaluate the precision of
relationship between input(the history data) and long-term runoff forecasting, therefore, relative error less
output(the real reservoir inflow) is built up, finally the than 30% serves as the criterion in this research.
trained ANN model is used to calculate the corresponding
forecasting values[5,6]. Steps are shown as follow:
(a) Initialize all the weight confidents values and
threshold parameter values. All above initialization values
are evaluated by stochastic numbers in [0, 1].
(b) Set the training sample set. Choose 5 years history
data what relate to the forecasting runoff to serve as the
history sample. Set 5 ANN input nodes, 10 connotative
nodes and 1 output node. All the sample are normalized to
[0, 1]. Through ANN model training, nonlinear mapping Fig.3 Parameter training process
relation between input and output can be achieved.
(c) Calculate the connotative layer output value yi and the Table 1 and Fig. 4 show that the most of the streamflow
output layer output value Ol, (5), (6). occurs from June to October, the maximum value is in
yi = f (∑ ω ij xi − θ l ) (5) September. From December to the next March is the
j period with the least streamflow and the minimum value
Ol = f (∑ Tli yi − θ l )
occurs in February. Fig. 5 shows that the relative error of
(6) forecasting model is less in low water season. But at the
i
beginning and the end of the flood period or under some
(d) Calculate the sample error, (7). extreme circumstances, the relative error is comparatively
1 1
E= ∑
2 t
(tl − Ol ) 2 = ∑(tl − f (∑Tli yi − θl ))2
2 l l
large. This is mostly owing to high indetermination of
month streamflow which may cause high instability in
(7) average stramflow of multi years. Therefore, month
1
= ∑tl − f (∑Tli f (∑ωij x j − θl ) − θl ) 2 runoff forecasting is more difficult in long-term runoff
2 l forecasting.
l j
(e) If the sample error value is less than allowable one, the
training process is completed, otherwise, go step (f).
(f) Calculate error value of the connotative layer and the
output layer.
(g) Update the weight coefficient values and the threshold
parameter values of each layer and training again.
797
Table 1. Data mining result from 2001 to 2003
Forecasting Value/(m3/s) Real Value/(m3/s) Error/(%)
Month
2001 2002 2003 2001 2002 2003 2001 2002 2003
1 338.89 328.97 1302.00 310.55 322.54 1158.00 12.71 6.87 11.90
2 279.97 292.54 2.57 233.62 183.13 29.47 211.45 185.99 8.45
3 580.34 478.35 26.33 298.53 400.32 24.78 285.06 312.45 7.45
4 782.12 876.97 13.45 630.21 659.21 6.53 725.29 1010.00 28.00
5 676.88 1160.82 39.66 469.88 1023.67 53.38 715.69 480.45 51.12
6 970.3 1185.36 17.97 313.39 492.21 36.35 1356.00 610.56 122.30
7 1378.63 1025.87 34.66 646.61 2135.58 70.74 1852.11 744.06 141.11
8 1056.81 2049.2 48.67 2070.01 1817.89 14.16 1649.87 1076.56 53.45
9 1470.93 2540.06 42.13 2974.99 5757.68 58.28 1889.86 3230.56 41.49
10 954.67 1668.89 43.34 1999.94 3267.97 38.99 1011.43 1540.34 39.31
11 1037.65 753.67 37.78 756.38 932.57 19.22 493.97 622.21 19.81
12 444.67 410.62 9.38 308.64 495.48 37.80 527.00 418.99 26.01
Table 2. Degree of risk If the runoff history sequence is not long enough then
Date Forecasting Real Error/(%) the data mining result may not reach the prospective point.
Value/(m3/s) Value/(m3/s) At this time, the forecasting veracity is suspicious. For
21 610 901 32.29 those water plant with not enough data, the forecasting
22 487 411 18.49 precision is hardly acceptable or even the data mining
23 469 422 11.13 work can not be carried through and larger error will
24 466 523 10.89 occur in flood period. Further more, the choice of
origninal data for forecasting genes and the training
25 455 378 20.37
threshold value may affect the precision in different
26 401 801 49.93
valley and reservoir. So this eigenvalues should be
27 431 766 43.73
adjusted according to different circumstances.
28 476 1023 53.47
The authors gratefully acknowledge the financial
29 509 683 25.47 supports from National Natural Science Foundation of
30 531 672 20.98 China under Grant No. 50779020.
31 512 620 17.42
References
[1] Chen Shouyu, “Integrative analysis theory mode and
method to long-term hydrologic forecast”, Jurnal of Hydraulic
Engineering, 1997, 8: pp. 15-21.
[2] Ding Jie. Wei Minwen, Dai Jie etc., “Application of
warehouse & data dining technology to Hunan reservoir
scheduling”, Hydropower Automation and Dam Monitoring,
Vol. 29 No. 3 June 20, 2005.
[3] W. H. Inmon, Building the Data Warehouse. John Wiley &
Fig. 5 The last 10 days inflow in March 2003 of Dan Sons, New York. 2003.
Jiangkou reservoir [4] Xu Yonggong, Li Shu qin Pei Jingping, “Establishment and
5. Conclusion application of the BP neural network model on medium-and
long-range forecast of runoff”, Agricultural Research in the Arid
Areas, 2001, (3): pp. 38-42.
In this approach, a long-term integrative ANN runoff [5] Scott Weaver, Leemon Baird, Marios Polycarpou, “Using
forecasting model is built up, data mining technology is localizing learning to improve supervised learning algorithms”,
applied to hydrologic forecasting and BP algorithm of IEEE Transaction on neural networks, 2001, 12(5): pp.1037-
ANN is used to make the data mining work. Compared 1046.
with traditional runoff forecasting method, this approach [6] Chi-Tat Tommy, W. S. Chow, “Adaptive regularization
needs less input data requirement, less maintenance and parameter selection method for enhancing generalization
capability of neural networks”, Artificial Intelligence, 1999,
performs more simple forecasting process. The test result
107(2): pp. 347-356.
shows that the precision is fit for engineering project.
798
2008 International Conference on Intelligent Computation Technology and Automation
800
as a simple interface to operations on data objects in consists of three layers, namely, global schema,
such data space. fragment schema and allocation schema, each of which
CAD/CAM systems are well-known major tools for is defined well to explain how the product data is
design and manufacturing tasks. Inside a company, arranged and stored with different level of views from
there may be many CAD/CAM users who use different outline to detail under a distributed collaborative
CAD/CAM systems, which are running on various environment.
kinds of platforms with different output file formats, (1) Product data global schema, which is the virtual
and frequently exchange data. For an enterprise logic layer and a global user view, realizes the
alliance with its partners residing in different location, definition of product data as well as its global
it is the same situation. A framework to exchange data directory. The global directory, which is actually a
between different CAD/CAM users is proposed, and product structure, provides a hierarchical classification
used to tackle this issue [9]. The framework comprises of component parts that form a product. The product
index server and clients, which establish a data structure normally lists all component parts of product
exchange and sharing environment for distributed with the basic attributes of each component as well as
CAD/CAM users across different platforms. The index the relationship between each part and parent product
server can manage user information, convert different in the hierarchical structure. Besides, it is needed to
output formats into a standard format, and handle indicate which stage of product lifecycle each part
communication between client users. The client side of shown in the global directory belongs to.
the architecture can help a user access to the index (2) In product data fragment schema, product data is
server and other client users, response to all file partitioned into data fragments according to certain
transfer requests and transfer files. Therefore, the constraint relations. Here the constraint relations
architecture satisfies the following requirements: cross mainly involve the application of specified product
platform, data browsing, data search, auto format data to production activities by partners who have
recognition and translation. However, because of different divisions in a collaborative enterprise
differences in clients' CAD/CAM systems, this alliance. For example, a manufacturer named k who is
framework is not suitable for a centralized or a a member of the collaborative enterprise alliance,
distributed database system, and just a semi-centralized undertakes tasks of manufacturing some parts, should
data-sharing framework [9]. store the needed process data, NC code and relevant
tooling data in its own database management system
3. Reference model of distributed product for product data. As a partition operation to product
data storage data, two important rules, namely the integrity and the
reconstruction, should be followed during the
The product-oriented enterprise alliances can be procedure of partition. The integrity means that overall
organized in two ways when considering respectively product data must be stored in, and mapped to the
product lifecycle and product components. In view of product database for an enterprise. The reconstruction
stages in product lifecycle, one alliance may comprise denotes that the whole product data model can be
the partners who play different roles in production reconstructed by using all product data fragments.
activities such as design, analysis, manufacturing and (3) Product data allocation schema stores product
so on, and these alliances are called the lifecycle- data fragments into product databases of different
oriented alliance. On the other hand, with a view to partner nodes according to certain redundancy and
parts that are needed to compose one product, an specified redundant storage pattern. Communication
alliance can consist of companies with each partner cost, efficiency and necessary redundancy should be
accomplishing the tasks of designing and fully considered to determine the degree of
manufacturing its appointed parts, and these alliances redundancy. For instance, some basic information
are named the component-oriented alliance. In about product data, such as part name, part number,
addition, there may be an alliance, which is lifecycle- relationships with one another and so on, must be
oriented as well as component-oriented, with each stored in each node with some redundancy.
partner responsible for assigned parts throughout
product life cycle. Therefore, according to mentioned
above, for one product, the related product data owned
by different type of alliance differ from each other.
By the way the product data is structured and
layered, a reference model of distributed product data
storage is proposed in this paper. The reference model
801
4. Data storage model of product-oriented control plans and so forth. Here is a example of how
multi-alliance the constraint conditions affect the forming of
alliances: for a special purpose, one type of airplane
4.1 Definition of information correlation model requires to be designed jointly by the specified
under multi-alliance environment research institute 1, 5, and manufactured
collaboratively by the chosen aircraft corporation 2, 3,
Under the condition of global market competition in and then all of them group into collaborative enterprise
the future, the dominant company of collaborative alliance DyEnp(i); For another type of airplane,
enterprise alliance may lose its station because of the considering the factors of resource advantages and
frequently changing of business opportunities, business collaborative relationships, research institute 1, aircraft
objectives, core resource, material supply chains and corporation 1 and 2 need to form collaborative
ratio of risk to interest. Furthermore, any partner in a enterprise alliance DyEnp(j). Element ProdSet(i),
collaborative enterprise alliance can affiliate itself with corresponding to enterprise alliance DyEnp(i), stands
other alliances simultaneously via different network for a product object set composed of all products about
connections based on market demand and product which the alliance DyEnp(i) concerns. The pair of
characteristics. But, generally, one company can only {DyEnp(i), ProdSet(i)} denotes enterprise alliance
have one PDM system. Therefore, for such a company DyEnp(i) and its product object set ProdSet(i).
who has joined more than one enterprise alliances, in Definition 2. Set of companies constituting
order to make the partitioned product data fragments collaborative enterprise alliance: DyEnp(k) = {Enp(1),
that come from different enterprise alliances to coexist Enp(2), …, Enp(i), …, Enp(n)}.
and function well in its own PDM system, the In definition 2, DyEnp(k) represents a collaborative
reasonable and effective product data storage approach enterprise alliance constituted by companies who must
and storage model should be adopted to tackle this satisfy certain constraint conditions such as
situation. Besides, in a multi-alliance environment, complementary advantages, basic principles of sharing
under the management and operation by distributed risks and profits, macroscopic adjustments and controls
PDM (DPDM) system, one company can accomplish by government, or considerations for national security
integrating the chosen data fragments into product data and so on. In collaborative enterprise alliance, each
that is relevant to each alliance to which the company member Enp(i) has its specializations that maybe
belongs. include designing, trial manufacturing, manufacturing,
It is supposed that each company has one PDM material supplying, selling and maintaining of product
system, which is made up of a PDM server, a in stages of All Lifecycle of Product (ALCP). Among
distributed database management system, a distributed collaborative enterprise alliance, there may exist more
file management system, several databases, and a than one company that can undertake and accomplish
couple of electronic document libraries. Based on this same tasks. For example, a collaborative enterprise
supposition, in the following, four definitions are given alliance may comprise two companies or departments
for the better description of the relationships between to design jointly, two manufactories to manufacture
alliance, company, product data and PDMs. cooperatively, and many suppliers to supply materials
Definition 1. Set of collaborative enterprise and outsourcing parts.
alliances: EnpAlliaSet={{DyEnp(1),ProdSet(1)} , Definition 3. Set of product data:
{DyEnp(2), ProdSet (2)} , … , {DyEnp(i), ProdSet EnpProdDataSet(k)={AlLocProd(1), AlLocProd(2),
(i)} ,…,{DyEnp(n), ProdSet (n)}}. …, AlLocProd(i), …, AlLocProd(n),
In definition 1, EnpAlliaSet denotes set of NoAlProdDataSet}.
companies who are capable of producing some sort of In definition 3, EnpProdDataSet(k) represents all
product in a certain industry or production field. For product data owned and managed by company k who is
example, China Aviation Industry Corporation governs partners of several enterprise alliances. Such product
many companies with each having the capability of data can then be divided logically into two distinct
either designing or manufacturing in production of sections since parts of it come from different alliances.
airplane. Therefore, under certain constraint The first is the shared product data portion, i.e., the
conditions, all combinations of above-mentioned elements of EnpProdDataSet(k) from AlLocProd(1) to
companies give the domain for set of collaborative AlLocProd(n), which are used by company k to
enterprise alliances that engage in airplane designing collaborate with other partners for the production of
and manufacturing. The element DyEnp(i) in this set products assigned by its joined alliances. The
represents a collaborative enterprise alliance formed remaining elements of EnpProdDataSet(k), namely
under certain constraint conditions such as designing, NoAlProdDataSet, form the private product data
manufacturing, resource advantages, industrial macro- section possessed exclusively by company k without
802
sharing it with other partners. Therefore, in multi- the elements, PDMServ, DBMS, FMS, DBSet, FVSet,
alliance environment, since product data is dispersed denote PDM system, database management system,
among partner nodes to better serve to collaboration, file management system, distributed product databases,
such situation becomes the key issue to be tackled distributed document vaults respectively. Hereinto,
when designing and constructing the product data DBSet={DB(1), DB(2), …, DB(i), …, DB(n)}, and
storage model. In definition 3, AlLocProd(i) represents FVSet ={FV(1), FVB(2), …, FV(i), …, FV(n)}. DB(i)
one product data fragment of a certain product, which indicates the structural product data segments stored in
is managed by PDM system of company k. Therefore, company k, while FV(i) is non-structural data (i.e., 3D
all product data segments can be combined to model files, 2D drawing files and other technique
assemble an entire product data. documents).
Definition 4. Set of DPDM system resource:
EnpDPMsysSet(k)={PDMServ, DBMS, FMS, DBSet,
FVSet}
In this definition, EnpDPMsysSet(k) represents the
essential software system resource for company k, and
Figure 1. Interrelationship between alliances, enterprises, product data and software resources
803
document vaults of company Enp(1), Enp(2), Enp(4); In this section, we describe an instance to show how
similarly, DyAE(2) consists of Enp(2), Enp(3) and our distributed product data storage model can be
Enp(4), and ProdDSet(2) is distributed among Enp(2), applied, which has been implemented in our previous
Enp(3), Enp(4); and so on. The third layer in Figure 1 aviation project. As shown in Figure 2, company A and
is for data fragments storage. For example, as shown in B form a collaborative enterprise alliance i due to
Figure 1, company Enp(1) participates simultaneously product X1 and X3 that constitute the product object set
in two alliances DyAE(1), DyAE(3), so, in its database of alliance i. In company A, product X1 has one ID
there are two product data segments ProdDset1.Seg1, number in database managed by its PDM system while
ProdDset3.Seg1, respectively coming from product product X3 has another ID number. Similarly, in
object set ProdDSet(1), ProdDSet(3). In the same way, company B, product X1 has one ID number while
since Enp(2) joins DyAE(1), DyAE(2), and product X3 has another ID number. In addition,
ProdDset1.Seg2, ProdDset2.Seg1 respectively from company A and C establish another collaborative
ProdDSet(1), ProdDSet(2) are stored in its database. enterprise alliance j due to product X2 that is stored
respectively in database of company A, C. All above-
5. A distributed product data storage mentioned databases ID should be unique.
instance under multi-alliance environment
INTERNET/INTRANET
INTERNET/INTRANET
Company A Company B
PDM SERVER PDM SERVER
DB1 DB2 DB3 FSV3 FSV2 FSV1 DB1 DB2 DB3 FSV3 FSV2 FSV1
804
segments can be assembled into one integrated product [5] K.K. Leong, K.M, Yu and W.B. Lee, “Product data
dataset by using our model in this paper. allocation for distributed product data management system”,
Computers in Industry, 2002, 47, pp. 289-298.
[6] Y.J. Wang and S.J. Li, “Research and performance
7. References evaluation of data replication technology in distributed
storage system”, Computers and Mathematics with
[1] K. Hyun, H.S. Kim, J.H. Lee, J.M. Jung, J.Y. Lee and Applications, 2006, 51, pp. 1625-1632.
N.C. Do, “A framework for sharing product information [7] H. Nadeem and Daudpota, “Five steps to construct a
across enterprises”, Int J Adv Manuf Technol, 2006, 27, pp. model of data allocation for distributed database systems”,
610-618. Journal of Intelligent Information Systems, 1998, 11, pp.
[2] W.D. Li, S.K. Ong, J.Y.H. Fuh, Y.S. Wong, Y.Q. Lu and 153-168.
A.Y.C. Nee, “Feature based design in a collaborative and [8] S.P. Olesen, S.E. Chodrow, M. Grigni and V.S.
distributed environment”, CAD, 2004, 36(9), pp. 775–797. Sunderam, “Distributed Data Management Support for
[3] Z.Q. Wei, “Research on digital product definition and Collaborative Computing”, Proceedings of HPCN 1997,
product data management techniques based on distributed Vienna, Austria, April 1997, pp. 487 - 490.
environment”, PhD thesis, Tsinghua University, 2000(in [9] P.Y. Chao, “A data exchange framework for networked
Chinese). CAD/CAM”, Computers in Industry, 2001, 44, pp. 131-140.
[4] Q.W. Gao and X.M. Mo, “Product Data Management and
Implement”, Mechanical Industry Press: Beijing, 1998 (in
Chinese).
805
2008 International Conference on Intelligent Computation Technology and Automation
Xu Donghua Wu Zhaolin
Dalian Maritime University, Dalian, China 116026
lnmsaxdh@yahoo.com.cn
807
= [6,12), 2=[12,18), 3=[18,24), 4=[24,30), 5= seafarer’ age is an inverse ratio to the membership
[30,36), 6=[more than 36] . degree.
4. Seafarer’s last rank related sea experience 0.25
0.22
factor. Last rank related sea experience is also divided 0.2
0.2 0.2
U C1 C2 C3 C4 C5 C6 D1 0.05
0
1 3 4 2 3 3 1 1 1 2 3 4
0
1 2 3 4 5 6 7
3.3. Findings
Figure 3. Membership degrees of current rank
1. Age factor related sea experience factor
The membership degree of seafarers with current
The membership degrees that ages contributing to
rank related sea experience less than 12 months is 0.46.
marine accidents are showed in figure 1.
However, seafarers with 30-36 months have the lowest
We can find that the membership degree of
membership degree. Generally speaking, the current
seafarers less than 39 years old is 0.62. Those between
rank related sea experience has an inverse ratio to the
24 and 29 years old have highest membership degree.
membership degree.
However, seafarers between 49 and 54 years old have
4. Last rank related sea experience factor
lowest membership degree. Generally speaking, the
The membership degrees that various last rank
808
related sea experiences contributing to marine 3.4. Verification
accidents are showed in figure 4.
0.3 We conduct a survey to management level officers
0.25 0.24 0.24
0.22
to verify the reliability of our findings. The
0.2
questionnaire includes our main findings: (1) the
0.15 0.14 seafarer’s age is an inverse ratio to the degree of
0.12
membership; (2) the seafarers with higher maritime
0.1
0.04
education have lower possibility to marine accidents;
0.05
(3) generally speaking, the current rank and last rank
0
1 2 3 4 5 6
related sea experience has an inverse ratio to the
possibility of marine accidents; (4) the master has
Figure 4. Membership degrees of last rank highest membership degree to marine accidents and (5)
related sea experience factor the membership degree in watch-keeping period 0000
We can find in figure 4 that the seafarers with last ~ 0004 is higher than any other periods, however the
rank related sea experience between 6 and 12 months membership degrees in 0012 ~ 0016 and 0020 ~ 0024
and between 12 and 18 months have same high are lowest. The Likert scale is introduced to indicate
membership degree. However, the general trend is that the reliabilities of our findings, which are 1—strongly
the last rank related sea experience has an inverse ratio disagree, 2—disagree, 3—agree, 4—highly agree and
to the membership degree. 5—strongly agree.
5. Rank factor 154 valid questionnaires return back from masters,
The membership degrees of 4 ranks are showed in 1st officers (1st/O), chief engineers (C/E) and 2nd
figure 5. engineers (2nd/E) from the jurisdictions of Liaoning,
0.45
0.4 Tianjin and Shandong MSA. The results are showed in
0.4
0.35
table 2.
0.3 The first column in table 2 indicates 4 different
0.25 0.22 0.22 ranks. The numbers of column 1 to column 5 indicate
0.2 0.16
0.15
the numbers of persons who have selected certain
0.1 reliability. For example, in master, no one selects
0.05
“strongly disagree”; 3 people select “disagree”; 23
0
1 2 3 4 people select “agree”; 5 people select “highly agree”,
no one selects “strongly agree”.
Figure 5. Membership degrees of rank factor
The average reliabilities of 4 ranks are calculated
It is revealed in figure 5 that the master has the
in column 6.
highest membership degree. However, the 1st officer
We can find that the average reliability in every
has the lowest membership degree. The 2nd officer and
rank is more than 3, which means the respondents
3rd officer have the same membership.
agree with our findings.
6. Watch-keeping time factor
Table 2. Questionnaire results
The membership degrees of watch-keeping time
Average
are showed in figure 6. Rank 1 2 3 4 5
reliability
0.35
0.3 Master 0 3 23 5 0 3.06
0.3 0.28 0.28
0.25
1st/O 1 10 30 17 0 3.08
0.2
C/E 4 5 10 15 0 3.06
0.15 2nd /E 1 0 15 15 0 3.42
0.1
0.1
809
main findings are verified, which means that the rough competence of seafarers under the STCW78/95
set theory is a proper way to study the competency for Convention”, Journal of Dalian Maritime University,
seafarers. However, the prospect of the application of 1999, 25(2), pp. 60-62.
rough set theory in shipping industry will be splendid. [8] L. Chen, W. Ji, “Discussion on Test and Evaluation on
Mariners”, Journal of Zhanjiang Ocean University,
For example, the rough decision rules [16] will be 2002, 22(4), pp. 52-55.
used in the prediction and prevention of marine [9] Q. Chen, “The Development of Seamen’ Competence
accidents to eliminate the influence of human Standards and Maritime Qualification Education”,
elements. Journal of Qingdao Ocean Shipping Mariners College,
2006, 27(3), pp. 32-34.
References [10] Y. Huang, Z. Wu, “Research upon quantitative
evaluation of human error in maritime accident
[1] IMO, International Convention on Standards of prevention”, Journal of Dalian Maritime University,
Training, Certification and Watch-keeping for Seafarers, 1998, 24(3), pp. 1-5.
[11] H. Zeng, Z. Wu, “Application of the fuzzy inference
1978, London, 1997.
[2] J. Bordal, “Future Competence of Seafarers”, system to quantitative assessment of the personal
EUROPEAN JOURNAL of NAVIGATION, Apr, 2003, factors of seafarers”, Journal of Dalian Maritime
1(1), pp. 24-26. University, 2001, 27(1), pp. 14-18.
[3] J. Horck, “An analysis of decision making process in [12] X. Liu, Y. Zhu, “Fuzzy comprehensive assessment for
multicultural maritime scenarios”, Maritime Policy and seafarer’s competence after gaining competency
Management, Jan-Mar, 2004, 31(1), pp. 15-29. certificate”, Journal of Dalian Maritime University,
[4] M. Barnett, D. Gatfield, B. Overguard, C. Pekcan and A. 2004, 30(4), pp. 30-33.
Graveson, “Barriers to progress or Windows of [13] Z. Pawlak, “Rough Sets”, International Journal of
Opportunity? A Study in Career Path Mapping in the Computer and Information Science, 1982, 11(5), pp.
Maritime Industries”, WMU JOURNAL OF MARITIME 341-356.
AFFAIRS, 2006, 5(2), pp. 127-142. [14] Z. Pawlak, A. Skowron, “Rough membership
[5] A. Walczak, “The effort of human factor on the functions”, in: Advances in the Dempster-Shafer Theory
frequency of navigational accidents”, In: Proceedings of Evidence, R. R. Yager, M. Fedrizzi, and J. Kacprzyk.
of the international conference on preventing collision (Eds.), John Wiley and Sons, New York, 1994, pp.
at sea, Marine Collision and Prevention, J. Zhao, P. A. 251-271.
Wilson, Z. Hu and F. Wang (Eds.), Chiavari Publishing, [15] IMO, Amendments to the code for the investigation of
1996, pp. 284-290. marine casualties and incidents (Resolution A. 849(20)),
[6] S. Fan, “Discussion on Improving Seafarers’ (Resolution A. 884(21)), London, 2000.
competency Assessment”, Maritime Education [16] Z. Pawlak, Rough Sets: Theoretical Aspects of
Research, 2004, 4, pp. 48-49. Reasoning about Data, Dordrecht: Kluwer, 1991.
[7] Y. Zhu, C. Jiang and K. Li, “The ways to ensure the
810
2008 International Conference on Intelligent Computation Technology and Automation
812
Φ(x j ) − a ≤ R 2 ∀ j
2
(4)
3.4 Cluster Assignment
Where || · || is the Euclidean norm and a is the center
of the sphere. Soft constraints are incorporated by The cluster boundary detection algorithm does not
adding slack variables ξ j : find points that belong to different clusters. To do so, a
geometric approach is used: given a pair of data points
Φ (x j ) − a
2
≤ R2 + ξ j (5) that belong to different clusters, any path that connects
them must exit from the sphere in feature space.
Therefore, such a path contains a segment of points y
With ξ j ≥ 0 . To solve this problem we introduce such that R(x) > R. This leads to the definition of the
the Lagrange
( )β
adjacency matrix Aij between a pair of points x i and
L = R 2 − ∑ R 2 + ξ j − Φ (x j ) − a
2
j x j whose images lie in or on the sphere in feature
j (6)
space:
− ∑ξ j μ j + C∑ξ j
⎧1, R(xi + λ (x j − xi )) ≤ R, ∀λ ∈ [0,1]
aij = ⎨ (11)
Where βj ≥0 and μj ≥ 0 are Lagrange ⎩0, other
multipliers, C is a constant, and C ∑ ξ j is a penalty Clusters are defined as the connected components
term. Setting the derivative of L to zero with respect to of the graph induced by A. Checking the line segment
is implemented by sampling a number of points. BSVs
R, a and ξ j , respectively, leads to are unclassified by this procedure since their feature
space images lie outside the enclosing sphere. One
∑β j =1 may decide either to leave them unclassified, or to
j assign them to the cluster that they are closest to.
R 2 (x ) = K ( x, x ) − 2∑ β j K (x j , x )
wavelet through two areas which are eye part and
mouth part. Generally speaking, no color information
j is used.
+ ∑ β i β j K (xi , x j )
(7)
i, j
Where (
K (xi , x j ) = exp q xi − x j
2
) (8)
The radius of the sphere is:
R = {R( xi )}, xi is support vector (9)
The contours the enclose the points in data space
are defined by the set
{x | R(x ) = R} (10)
813
Figure 5 Some data points of the dataset clustered by
In the process of clustering, it is import to control the SVC algorithm with constant C = 1.
the parameters of clustering, such as the parameter q
that specifies the width of the Gaussian kernel [8,9]
and the parameter constant C in equation (5). We
assume that the value of C is fixed so that the number
of outliers is not varied. We estimate the number of q
values generated by the secant-like algorithm using
known results on secant method convergence [8]. The
estimate relies on spatial characteristics of the facial
expression dataset but not the number of data points or
dimensionality of the dataset.
(a)
814
and we obtain the corresponding radius of smallest (20070533131) and Natural Science Foundation of
hypersphere, R = 0.793. Hunan Province (06JJ50109).
Using the above mentioned method, we also get the
respective radius of seven facial expressions according References
to experiment, Table 1 shows the results of seven
cluster radius (E represents Expression). [1] J.M. Susskind, G. Littlewort, M.S. Bartlett, J. Movellan,
A.K. Anderson. Human and computer recognition of facial
Table 1. The radius R for each expression cluster expressions of emotion. Neuropsychologia, 45(1):152-162,
2007.
E AN DI FE HA NE SA SU [2] Tobias Werther, Ewa Matusiak, Yonina C. Eldar, Nagesh
K. Subbana. A unified approach to dual Gabor windows.
R 0.557 0.462 0.247 0.675 0.492 0.351 0.653 Signal Processing, IEEE Transactions on Signal Processing,
55(5-1): 1758-1768, 2007.
[3] Reza Fazel-Rezai, Witold Kinsner: Image Decomposition
5. Conclusion and Reconstruction using Two-Dimensional Complex-
Valued Gabor Wavelets. IEEE ICCI 2007: 72-78
[4] Shishir Bashyal, Ganesh K. Venayagamoorthy.
In this paper, a facial expression clustering Recognition of facial expressions using Gabor wavelets and
algorithm based on SVC is proposed. We select the learning vector quantization. Engineering Applications of
most effective region of facial expression to extract Artificial Intelligence, In Press, Corrected Proof, Available
features using Gabor method, then we find the optimal online 14 January 2008.
value of the kernel width at which this method [5] LinLin Shen, Li Bai, Michael Fairhurst. Gabor wavelets
produces its best clustering. In order to verify the and General Discriminant Analysis for face identification and
effectiveness of the algorithm, the corresponding verification. Image and Vision Computing, 25(5):553-563,
2007.
algorithms are performed on the JAFFE database. The
[6] Loris Nanni, Dario Maio. Weighted Sub-Gabor for face
performance of the algorithm mainly relies on the recognition. Pattern Recognition Letters, 28(4):487-492,
effective clustering strategy. The experiments indicate 2007.
that the fusion methods are feasible combining Gabor [7] Hur A B, Horn D, Siegelmann H T, et al. Support vector
method with SVC. clustering [J]. Machine Learning Research, 2001, 2: 125-137.
Future work will seek an efficient fusion method for [8] Sei-Hyung Lee and Karen Daniels, Gaussian Kernel
facial expression recognition. Width Exploration in Support Vector Clustering 2004-009,
Technical Report, University of Massachusetts Lowell,
(2004).
Acknowledge [9] Dragomir Yankov, Eamonn J. Keogh, Kin Fai Kan.
Locally Constrained Support Vector Clustering. ICDM 2007:
This research is partially supported by National Key 715-720
Basic Research and Development Program of China
(2002CB312203), National Research Foundation for
the Doctoral Program of Higher Education of China
815
Session 6
Intelligent System
ICICTA 2008
2008 International Conference on Intelligent Computation Technology and Automation
820
domain. Feature model describes all kinds of attributes and <rdfs:comment>describe the scale of element.for
AIS knowledge. For example:how many representations are example: 0 to 1</rdfs:label>
there in AIS system ? How many steps in AIS life cycle? <rdfs:label>length</rdfs:label>
We can gain a lot of knowledge which can help us master <rdfs:comment>describe the lenth of element.
content of AIS quickly and create a new AIS model. </rdfs:label>
Meta-language is used to describle feature model.In <rdfs:label>fromat</rdfs:label>
order to make the meta–model understood by computer,we <rdfs:comment>describe the format of element.
choose DAML[15,16] language as meta-language. </rdfs:label>
As one of the description language for semantic web, <daml:Class rdf:ID="sequercial">
DAML has abandunt semantic, so it can precisely describe <rdfs:label> sequercial </rdfs:label>
AIS meta-model and correlative knowledge.DAML has <rdfs:comment> sequercial allocation
stronger description ability than RDF(S)[17]. It expands </rdfs:comment>
RDF(S) and has more acute semantic.That we make use of </daml:Class>
DAML to describe AIS meta-model has some benefits. <daml:Class rdf:ID="link ">
DAML enriches RDF(S) semantic and takes XML[18] <rdfs:label> link </rdfs:label>
as basic.So,DAML has expansibility and interaction.On the <rdfs:comment>link allocation </rdfs:comment>
one hand,it can describe concept without different <daml:disjointWith rdf:resource="# sequercial "/>
meanings.On the other hand, we can expand our model . </daml:Class>
when required. </daml:Thing>
For example,We make use of DAML to describle the <daml:Thing rdf:ID=" Hyper-sphere ">
representation of AIS which include Bit String,Digtal <rdfs:label>linux</rdfs:label>
Sequence,Hyper-sphere, etc .In the description ,the relation </daml:Thing>
about elements of AIS representation include “one </daml:oneOf>
of ”,”part of ” etc,next,we can make use of “reverse of ” </daml:Class>
label,and all about these can be understood by computer. Of
course, we must make the AIS domain analyse before we 3.2 the level of AIS ontology
create Feature model.
<daml:Class ID="Availability"> In the process of modeling the AIS,the level of abstract is
<daml:oneOf parseType="daml:collection"> an important problem.It make us understand the AIS model
<daml:Thing rdf:ID=" representation "> through different levels. With the corresponding of Fig.
<rdfs:label> Bit String </rdfs:label> 1,the level of ontology should be divided into three
</daml:Thing> level:AIS top ontology,model ontology and resource
<daml:Thing rdf:ID=" Digtal Sequence "> ontology(from high to low).Top ontology describe the
<rdfs:label>element type</rdfs:label> theory ,application,advantage and difference with other
<rdfs:comment>describe the type of element discipline,the knowledge of top ontology is that same to
</rdfs:label> what a review paper tell you.Model ontology describe main
<daml:oneOf parseType="daml:collection"> model and relation NAS,CSA and their character.Resource
<daml:Thing rdf:ID=" element type "> ontology is a lib which include common representation,
<rdfs:label>float</rdfs:label> measures and their restriction rules,such as “Mutex”,”one of
<rdfs:comment>integer</rdfs:label> “,”part of “ ect,of course,their relation can be described by
</daml:Thing> DAML language.Computer can implement the inferences
</daml:oneOf> intelligently with the help of DAML+OIL system.
<rdfs:label>scale</rdfs:label>
821
[4] Bersini H Immune system modeling: the OO way. In:Bersini
high
H, Carneiro J (eds) Proceedings of the 5th International
Conference on Artificial Immune Systems, LNCS, vol
Describe the AIS basic
Top ontology 4163.Springer, Berlin, pp 150–163 (2006)
theory and application,
[5]Folwer M UML Distilled. Addison-Wesley, Reading,
academic schools etc
MA(2004)
Model ontology [6]. Gamma E, Helm R, Johnson R, Vlissides J Design
Describe main model
patterns.Addison-Wesley, Reading, MA (1995)
and relation NAS,CSA
[7] Harel D Statecharts: a visual formalism for complex systems.
Sci Comput Program 8:231–274(1987)
Resource ontology
Lib which include [8] Andrews PS, Timmis J Inspiration for the next generation of
common Representation, artificial immune systems. In: Jacob C, Pilat M, BentleyP, Timmis
Measuresn and their J (eds) Proc of the 4th International Conference on Artificial
restriction rules Immune Systems (ICARIS), Lecture Notes in Computer Science,
vol 3627. Springer, Berlin, pp 126–138(2005)
low
[9] Stepney S, Smith R, Timmis J, Tyrrell A, Neal M, Hone A
Fig.2 the level of AIS ontology Conceptual frameworks for artificial immune systems.Int J
Unconventional Comput 1(3):315–338(2006)
4 CONCLUSION [10] Bersini H Immune system modeling: the OO way. In:Bersini
H, Carneiro J (eds) Proceedings of the 5th International
In this paper,we design an integrated AIS model based Conference on Artificial Immune Systems, LNCS, vol
on ontology which can integrate a lot of specials models 4163.Springer, Berlin, pp 150–163 (2006)
and share with other researchers.It has strong semantic and [11] Timmis J (2007) Artificial immune systems: today and
expansibility. AIS ontology is devided into three levels tomorow. Nat Comput 6(1):1–18
which implement the different level abstract.DAML+OIL [12] Cohen IR (2007) Real and artificial immune systems:
language is adopted to describe the AIS ontology,it will computing the state of the body. Imm Rev 7:569–574
make computer understand the semantic and can implement [13] Gruber, T.R. (1993). A translation approach to portable
inferences intelligently.In the future,the update of AIS ontology specifications.Knowledge Acquisition, 5, 199-220.
ontology will be researched,because the knowledge about [14] ]Lee T B, Herndler J, Lasilla O. The Semantic Web
AIS may change. .Scientific American, 2001-05
Acknowledgment [15] DAML Query Language (2002-08).
This work is supported by the National Natural Science http://www.daml.org/2002/08/dql/
Foundation of China under Grant No. 60673194 [16] Horrocks I. DAML+OIL: A description logic for the semantic
Web. Bulletin of the IEEE Computer Society Technical
5 REFERENCES Committee on Data Engineering, 2002,25(1):4−9.
[17] Lassila O, Swick R R. Resource Description
[1] J. Timmis Artificial Immune Systems - Today and Tomorrow.. Framework(RDF)
Natural Computing 6(1) pp. 1-18. (2007) [18] XML Query Language http://www.w3.org/TR/Xquery
[2] J. Timmis P. Andrews,N.OwensÆ.Clark An interdisciplinary
perspective on artificial immune systems Evolutionary
Intelligence 2008
[3]ForrestS,Beauchemin,C Computer immunology. Immunol Rev
216(1):176–197,2007
822
2008 International Conference on Intelligent Computation Technology and Automation
824
are a series position of point P on the workspace. ⎡ci − si cα i si sα i ai ci ⎤
⎢s ai si ⎥⎥ (1)
Because of the orientation mechanism of manipulator
ci cα i − ci sα i
is a 3 DOF concurrent structure, so the pose of i −1
Ai = ⎢ i
end-effector is a part sphere at the center of point P ⎢0 sα i cα i di ⎥
⎢ ⎥
(-135<θ6<135),the sector is the pose section diagram ⎣0 0 0 1 ⎦
that the end-effector can reach. where: si = sinθi , ci = cosθi , sαi = sinαi , cαi = cosαi
As can be seen from Figure 4:
1) In the main view,the work scope of point P in z Insert the link parameters from Tab.l in equation (1),
the pose of end-effector is given:
axis is larger than the height of tomato plant; In the top
view, the section diagram of the achievable pose for ⎡nx ax ox px ⎤
⎢n a o p ⎥
end-effector covers the projection of the tomato y ⎥ (2)
0
A6 =0A1 1 A2 2 A3 3 A4 4 A5 5 A6 = ⎢ y y y
growing space in XOY plane. So the workspace W(P) of ⎢nz az oz pz ⎥
harvesting robot envelopes the tomatoes distribution ⎢ ⎥
space of one plant W(T) ⎣0 0 0 1 ⎦
2) The workspace hasn’t consisted in cavum, thereby where:(nx,ny,nz) is a normal vector;(ax,ay,az) is ,a
the reference point of end-effector can reach its every approach vector;(ox,oy,oz) is a orientation vector;
point, and this robot is easy to use. (px,py,pz) is the end-effector position vector.
3) The end-effector can reach the same point with 4.1.2 Forward kinematics simulation.The forward
many poses, so the harvesting robot has high flexibility. kinematics simulation is to simulate the attainable pose
of end-effector in terms of the actual paraments of
robot link.
First, a harvesting robot model was found by using
the Robotics tool, it can be seen from Figure 5:
825
2)Rotate joint (XOZ plane) simulation:First, keeping Let : N = 0 A1−1 ⋅0 A6 ⋅5 A6−1 ⋅4 A5−1
the rotate joint variables θ1、 θ 4、 θ 6 are 0,and only let
⎡ε 1c5 + ε 2 s5 ε 1 s5 − ε 2 c5 ε3 γ⎤
θ 2、 θ 3、 θ 5 change within its limits,Table 2 is the ⎢v c + a s v s − a c n s − o c λ⎥
=⎢ 1 5 z 5 1 5 z 5 z 6 z 6 ⎥
simulated data both the rotated angle and the end ⎢ η1 s5η2 c5 η1 s5 −η2 c5 η3 b⎥
effector pose. ⎢ ⎥
Table 2. Rotated angle and end coordinate ⎣ 0 0 0 1⎦
θ2 θ3 θ5 Where:
px py pz
ε 1 = (c1 n x + s1 n y )c6 − (c1o x + s1o y ) s 6
-30 -30 45 89.41 0 350.04
45 30 60 848.1 0 721.99
ε 2 = c1 a x + s1a y ; v1 = n z c 6 + o z s 6
90 60 120 -121.9 0 815.17 ε 3 = (c1 n x + s1 n y ) s 6 − (c1o x + s1o y )c 6
180 90 135 -195.0 0 -63.12 η1 = ( s1 n x − c1 n y )c 6 + ( s1o x − c1o y ) s 6
Meanwhile, the permissible rotate angles are given:
η 2 = s1 a x − c1 a y
− 380 < θ 2 < 1800
− 42 0 < θ 3 < 180 0 η 3 = ( s1 n x − c1 n y ) s 6 + ( s1o x − c1 o y )c6
− 108 0 < θ 5 < 180 0 b = −η 2 d 6 + s1 p x − c1 p y
3)Rotate joint(XOY plane) simulation:First, keeping
the rotate joint variables θ 2、 θ 3、 θ 5 is 0,and only let
γ = −ε 2 d 6 + c1 p x + s1 p y − a1
θ 1、 θ 4、 θ 6 change within its limits, Table.3 is the λ = − a z d 6 + p z − d1
simulated data both the rotated angle and the obtained (4~9):
end-effector pose. θ1 = arctg[( p y − a y d 6 ) ( p x + a x d 6 )]
Table 3. Rotated angle and end coordinate
d 42 + a 32 − γ 2
− λ 2 − a 22 γ
θ2 θ4 θ6 px py pz θ 2 = ± arcsin( ) − arctg ( )
− 2a2 γ 2
+ λ2 λ
-150 -120 -135 -407.03 -235.00 -310.00
γ − a2 c2 a3
-60 -30 -45 235.00 -407.03 -310.00 θ 3 = ± arcsin( ) − arctg ( ) − θ2
d +a
2
4
2
3
d4
90 60 120 0 470 -310.00
180 90 135 -470.00 0 -310.00
θ 4 = ± arccos((s1 n x − c1 n y )s6 + (s1o x − c1o y )c6 )
Meantime, the permissible motional angles are given: tg(θ 2 + θ 3 )(c1o x + s1o y ) − o z
θ 6 = arctg( )
− 170 0 < θ1 < 170 0 n z − tg(θ 2 + θ 3 )(c1 n x + s1 n y )
− 180 0 < θ 4 < 180 0 s1ax − c1a y
− 180 0 < θ 6 < 180 0 θ5 = arctg( )
(s1nx − c1n y )c6 + (s1ox − c1o y )s6
4.2.2 Nonuniqueness of solution.The θ 2 , θ 3 and θ 4
4.2. Inverse kinematics analysis
have respectively two values from the above
expression of solution, so the robot joint variables have
4.2.1 Inverse kinematics solution.The inverse eight groups solution, and it is apt to result in a
kinematics is to solve the joint variables as the catastrophe problem of joint. In order to keep the
end-effector pose is given, transforming equation (2) transfer path continuous, θ 2 , θ 3 and θ 4 must be limited
into: its scopes from the control algorithm:
1
A2 2 A3 3 A4 = 0 A1−1 ⋅0 A6 ⋅5 A6−1 ⋅ 4 A5−1 (3) 1)Scopes of θ 2 and θ 3 :Limited its scopes in the first
Let: M=1A2 2 A3 3 A4 and the fourth quadrant.
⎡c23c4 − s23 − c23s4 s23d4 + c23a3 + a2c3 ⎤ 2)Scope of θ 4 :limited the θ 4 with the arithmetic of
⎢s c c
⎢ − s23s4 − c23d4 + s23a3 + a2 s2 ⎥⎥ numerical value comparision.when the end-effector
= 23 4 23
was moved to the i and i-1 point, the θ 4 was
⎢ s4 0 c4 0 ⎥
⎢ ⎥ respectively signified with θ 4i and θ 4i −1 ,and the two
⎣ 0 0 0 1 ⎦
values of θ 4i was signified with θ 4i n (n=1,2):
Where:
s23 = sin(θ2 +θ3 ),c23 = cos(θ2 +θ3 ), s4 = sinθ4 , c4 = cosθ4 Let d k = θ 4i n − θ 4i −1 + kπ , k = 0,±1
min
826
if d 0 is minimum, θ 4i = θ 4i n 5.Conclusion
θ 4i n > 0,θ 4i = θ 4i n − π
else:
θ 4i n < 0,θ 4i = θ 4i n + π 1)The workspace of harvesting robot was visually
verified that it covers the tomatoes distribution space of
one plant and hasn’t cavity with the pose diagrams of
4.3.Motion simulation and analysis end-effector, and the designed robot has high flexibility
and can work well in greenhouse.
4.3.1.Motion simulation.On the workspace, the 2)The range of joint variables was obtained by the
end-effector coordinate of initial position A is (760,0, simulation of forward kinematics; it lays the foundation
620) ,and the harvesting object position B is(800,0, for the motion control and the trajectory planning of
350) ,the movement of harvesting robot from A to B harvesting robot in future
was simulated by using the Robotics Toolbox in 3)The inverse solution was gained, and the
MATLAB, The curves of rotated angle、velocity and catastrophe problem of robot joint value was solved
acceleration can be seen from Figure 6, The trajectory with the arithmetic application of numerical value
of end can be seen from Figure 7. comparison.
4)The kinematics of harvesting robot was simulated in
the Robotics toolbox on the workspace, the motion
continuity of which indicates the parameters of the
designed end-effector are rational, and this end-effector
can work well with the manipulator. So the harvesting
robot can meet the working requirement in greenhouse.
Acknowledgments. This research is performed
under support of the National natural science
foundation of China under Grant 60575020.
References
Figure 6. rotated angle、velocity and acceleration [1] Japanese robot academy.Robotics Manual, Science Press,
Beijing,1996(10).
[2] Naoshi Kondo,Ting K C.Robotics for plant production,
Artificial intelligence review,1998(12):pp227-243.
[3] Mikio Umeda,Michihisa Iida.Development of watermelon
harvest robot,Robot,1997(7), pp20-25.
[4] Noriyuki murakami,Kanji otsuka,and Keichi inoue,et al.
ROBOTIC CABBAGE HARVESTER,Autonomous Robots,
1999(13),pp28-34.
[5] D.Erdogan,M.guner.Mechanical Harvesting of Apricots,
Biosystems Engineering,2003(1),pp19-28.
[6] Van Henten E J, Hemming J, and Van Tuijl B A J, et al.
An autonomous robot for harvesting cucumbers in
greenhouses, Autonomous Robots, 2002 (13),pp241-258.
[7] Achmad Irwan Setiawan, Tomonari Furukawa,and Adam
Figure 7. Trajectory of the end Preston. A low-cost gripper for an apple picking robot.
4.3.2 Motion analysis Proceedings of the IEEE International Conference on
1)Motion Analysis of Joints:As can be seen from Robotics & Automation, 2004.
Fig.8,the curves of rotated angle and velocity for joint [8] Jizhan Liu,Pingping Li,and Zhiguo Li.Hardware Design
of the End-effector for Tomato-harvesting Robot.
2、3 are smooth, and the others are the same. Transactions of the Chinese Society for Agricultural
2)Motion Analysis of the End: As can be seen from Machinery,2008(3),pp39-42.
Fig.9,after the end-effect moved from A to B,its end [9] Jizhan Liu,Pingping Li,and Zhiguo Li.A multi-sensory end
coordinate X 、 Y and Z respectively become 8.02m, effector for spherical fruit harvesting robot,Proceedings
-3.82m and 3.93m from initial position,it indicates the of the IEEE International Conference on Automation and
last three joint can achieve many poses. Logistics, ICAL 2007.
[10] Xiangfeng Ma.Robot Kinematic, CHINA MACHINE
PRESS, Beijing,1991,pp106-114
827
Session 7
Fuzzy System
and Application
ICICTA 2008
2008 International Conference on Intelligent Computation Technology and Automation
The design of overlay network has been widely 2. Hierarchical Routing Issue Formulation
considered for the past several years, which aims to
optimize and enable new-generation applications over An overlay network in computer network is a logic-
the existed Internet [1].Multicast services are one connected network which is built on top of current
important kind of applications in overlay network [2], network infrastructure. It can be modeled as a complete
which may be called as overlay multicast. Overlay directed graph: Each tree edge corresponds to a unicast
multicast is an application-level multicast based on a path between a pair of MSNs (overlay path delay), and
set of distributed Multicast Service Nodes (MSN: a each tree node degree represents MSN access
kind of application server directly accessing to near bandwidth [3].
access router with high access bandwidth) that (1) Model Routing Optimization
provides multicast services to end users on top of the
general Internet unicast infrastructure [3]. Definition: Overlay Multicast Routing
Similar to the goal of application layer multicast [4], Optimization: Give an undirected complete graph
the goal of overlay multicast is to construct and G = (V , E ) , a MSN access bandwidth bound
maintain efficient distribution trees between the
multicast session participants, minimizing the multicast Bmax (v) ∈ N for each vertex v ∈ V , and path latency
cost involved with overlay network processing. Hence,
(
f = ∑ i , j∈T L i , j + R i , j ) (2)
bandwidth within each MSN i .The two routing-related
metrics for each MSN i ∈ M are normalized as
(2) Construct Hierarchical Routing Tree follows:
ratio of BT (i ) / Bmax (i ) .
832
3.2 Fuzzy Membership Matrix Calculation
⎡ r11 r12 " r1v ⎤
The proposed scheme aims at clustering MSN’s ⎢r r22 " r2 v ⎥⎥
related feature vector (one point in the feature space) R = ⎢ 21
by its feature similarity, by which the hierarchical ⎢# # % # ⎥
⎢ ⎥
routing tree will optimize the routing better. ⎢⎣ rv1 rv 2 " rvv ⎥⎦
DFCluster selected Euclidean distance to measure
the feature similarity, which corresponds to the unified (a) Fuzzy Membership Matrix
routing function as Equation (1).
Assume V is a MSN set containing v MSNs; the fuzzy theshold
833
c j are the centers of Cluster Gi and Cluster G j average inter-distance J inter in DFCluster fluctuates in
respectively. large range (0.48~0.74) compared with that of HCM in
small one (0.43~0.59). With the help of the fuzzy
4.1 Clustering Experiment clustering, DFCluster possesses of less J intra and
Firstly we discussed the clustering performance by more J inter than HCM, which implies better clustering
performance.
average intra-cluster distance J intra and average inter-
cluster distance J inter , in which less J intra and more 4.2 Routing Optimization Experiment
J inter imply the better clustering performance. Fig.3
is the experiment results, in which the x-axis Then we discussed the routing performance by the
represents MSN number and the y-axis represents united optimization function f , in which less f also
J intra and J inter respectively. implies that the related overlay multicast routing tree
performs better. Fig.4 is the results with x-axis and y-
0.55 axis representing MSN number and the united
0.50
optimization function f of the related routing tree
0.45
Intra-Cluster Distance
0.40 respectively.
0.35 Non-Cluster
0.30
HCM
DFCluster 150
0.25 Non-Cluster
135
0.20 HCM
0.15 Optimization Function f 120
DFCluster
105
0.10
0.05 90
0.00 75
0 20 40 60 80 100 120 140 160 180 200
60
MSN Number 45
30
0
0 20 40 60 80 100 120 140 160 180 200
0.78
MSN Number
0.72
0.66
Inter-Cluster Distance
MSN Number number increasing which implies that the size of the
related multicast routing tree expands; (c) DFCluster
performs less cost f (2.04~31.72) compared with that
(b) Inter-Cluster Distance J inter
Figure 3 Exp. Clustering Performance of HCM in (2.4~52.25), which implies that DFCluster
possesses of better routing results.
Fig.3 indicates some observations with increasing
MSN number for topology cluster detection: (a) the
intra-cluster distance of the cluster schemes including 5. Conclusion
HCM and DFCluster is shorter than that of non-cluster
scheme, while the inter-distance is longer; (b) the This paper proposed a dynamic fuzzy clustering
scheme with adaptive fuzzy threshold to cluster
average J intra in both schemes
intra-distance topology nodes for the hierarchical topology
decreases; while DFCluster achieves less J intra construction in overlay multicast. The simulation
(0.04~0.16) than that in HCM (0.06~0.26); (c) the illustrated that it achieved better clustering and routing
performance.
834
[4] E. Brosh, Y. Shavitt, “Approximation and Heuristic
Acknowledgement Algorithms for Minimum Delay Application-Layer Multicast
Trees”, IEEE Infocom’04, 2004.
Lu thanks North China Electronic Power University [5] B. Suman, B. Bobby, K. Christopher, “Scalable
(NCEPU), for supporting his studies. This research is Application Layer Multicast”, ACM Sigcomm'02, Pittsburgh,
funded by NCEPE Doctor Research Fund. Pennsylvania, August 2002.
835
2008 International Conference on Intelligent Computation Technology and Automation
Abstract and added into an overall interval, and finally this overall
interval is transformed back into an aggregate trapezoidal
The aggregation of fuzzy opinions is an important fuzzy number. Lee[4] presented an optimal consensus
component of group decision analysis with fuzzy approach for aggregating individual fuzzy opinions,
information. In this paper, a minimax disparity method which minimizes the sum of weighted dissimilarities
for the assessment of the weights to be associated with between aggregate consensus and individual opinions.
fuzzy opinions is proposed. The proposed approach Compared with the other methods noted above, Lee’s
generates the weights by minimizing the maximum the approach has some advantages. It is valid even in the
difference of any two adjacent individual weighted fuzzy case when fuzzy opinions are disjoint. Also it determines
opinions and the difference of individual weighted fuzzy the weights by an optimization model and is therefore
opinion and the weighted mean value, which is called the optimal with respect to the criterion of the model.
possibilistic mean value minimax difference method However, Lee’s approach is nonlinear and
(MVMDM). Three numerical examples are provided to computationally complex, which renders its application
illustrate the application of the proposed approach in impractical in real-life fuzzy group decision analysis.
aggregating fuzzy opinions in a simple and effective way. Recently, Wang[5] presented two approaches that
overcome the drawbacks of Lee’s method. The first
Keywords: Fuzzy opinions aggregation; group approach minimizes the sum of squared distances from
consensus opinions; possibilistic mean value; minimax one weighted fuzzy opinion to another and is called the
least squares distance method (LSDM). The second
approach minimizes the sum of squared differences
1 Introduction between the defuzzified values of any two weighted
fuzzy opinions and is called the defuzzification-based
In fuzzy group decision analysis it is often required least squares method (DLSM).
that individual fuzzy opinions be aggregated to form In this paper, we also presented an optimal consensus
group consensus as the basis of group decision. Several method for aggregating individual fuzzy opinions, called
methods have been proposed in the literature deriving the possibilistic mean value minimax difference method
group consensus from individual fuzzy opinions. Hsu (MVMDM). This approach does not entail the solution
and Chen[1] suggested a similarity aggregation method of any nonlinear optimization problems or an inverse
(SAM) for aggregating individual fuzzy opinions that are matrix, and no partitioning is required. All that is needed
subjectively estimated by experts and represented by the solution of a linear programming (LP) model using
positive trapezoidal fuzzy numbers (TFNs). Their Excel’s solver or an LP software such as Lindo.
method first measures the degree of agreement between
any two fuzzy opinions using a function of pairwise
2 Optimization approach for assessing the
similarity. For each fuzzy opinion, the degrees of
agreement with respect to the other opinions are weights of fuzzy opinions
averaged. Subsequently the average degrees of
agreement are normalized and combined linearly with Consider a group decision making situation where
the relative importance weights of the experts to obtain group members express their fuzzy opinions as positive
triangular or trapezoidal fuzzy numbers: Ri = ( ri1 ," ,
the final composite weights for aggregating the
individual fuzzy opinions. When fuzzy opinions do not
overlap SAM is not applicable. Moon and Kang[2] rim ), i = 1," , n ,n being the number of individuals in
suggested an approach to determine the total integral
the group, and m=3 is for triangular fuzzy numbers and
value of a triangular fuzzy number. The total integral
m=4 for trapezoidal fuzzy numbers. Let
values are subsequently normalized to become the
weights of the fuzzy opinions. Kumar and Karmakar[3] R = (r1 ,", rm ) = F ( R1 ,", R n ) be the aggregate of the n
presented an aggregation method based on experts’ fuzzy opinions. Generally speaking, there exist many
relative importance and confidence interval of aggregation operators and rules that can be used to
trapezoidal fuzzy numbers. In their method, individual aggregate fuzzy opinions. The fuzzy opinions of the
trapezoidal fuzzy numbers are first transformed into group members will be aggregated using a commonly
intervals using α-cut, which are subsequently weighted used linear additive procedure[6,7]. According to the
∑wi =1
i =1 (2) Then the optimal weights W = ( w1 , " , wn )
∗ ∗ ∗ T
of
model (8) can be generated by
The problem of aggregating the n fuzzy opinions is
G −1e
essentially the same as the problem of determining the W∗ = (9)
weight vector W. In order to determine the weights, eT G −1e
Lee[4] constructed the following optimization model:
Where e = (1," ,1) is the transpose of e and
T
n
Min Z p ,c (W , R ) = ∑ (w i ) p (c − S2 ( Ri , R )) G −1 is the inverse of G = ( gij )n×n , which is defined as
i =1
(3) ⎧ m
⎧ n
⎫
s.t. W ∈ ⎨W | W = (w1 ,", w n ), w i ≥ 0, ∑ w i = 1⎬ ⎪
⎪
( n − 1) ∑
k =1
rik2 , i = j = 1, " , n
⎩ i =1 ⎭ gij = ⎨ m (10)
⎪ − r r , i, j = 1," , n, j ≠ i
⎪⎩ ∑
Where p>1 is an integer, c>1 is a constant, and
S 2 ( Ri , R ) is a similarity measure between Ri and R ,
ik jk
k =1
4(max(U ) − min(U ))2 fuzzy opinions are made as small as possible. Or, the
differences between the individual weighted fuzzy
The expression (c − S 2 ( Ri , R )) represents the opinions and the value of a weighted mean value fuzzy
dissimilarity between R and R , while d ( R , R ) is
opinions are made as small as possible.
i 2 i In what follows, we present one such analytical
the Euclidean distance between them. U is the universe approach. We begin with the definition of the
of discourse. The optimal solution of the model (3) can possibilistic mean value weighted distance between two
be obtained by solving the following nonlinear equations fuzzy numbers.
iteratively: Definition1[8] Let a ∈ φ is a fuzzy number with a
n
1
R = ∑ ( w ) p
Ri (5) α -level set a (α ) = [a1 (α ), a2 (α )],α ∈ [0,1] . Then the
∑
n i
(w i ) i =1
i =1
p
possibilistic mean value of a is
[1/(c − S ( R , R ))]1/( p −1)
1
M ( a ) = ∫ α ( a1 (α ) + a2 (α )) dα
w i = 2 i
(6) 0
837
Definition 2 Let Ri = ( ri1 ," , rim ) and R j = ( rj1 , And
" , rjm ) be two triangular or trapezoidal fuzzy numbers ⎪⎧ wk M ( R k ) − wk +1M ( Rk +1 ) − ρ 2 ≤ 0, k = 1," , n − 1
⎨
with m=3 for triangular fuzzy numbers and m = 4 for ⎪⎩ − wk M ( R k ) + wk +1M ( R k +1 ) − ρ 2 ≤ 0, k = 1," , n − 1
trapezoidal fuzzy numbers. The possibilistic mean value Thus, the minimax difference model (16) can be
distance between Ri and R j , is defined as reconfigured as the LP model shown below:
Min ρ1 + ρ2
dij = f ( Ri , R j ) = M ( Ri ) − M ( R j ) (13)
⎛ P −e 0 ⎞
So, the differences between the possibilistic mean ⎜ ⎟ ⎛W ⎞
− P −e 0 ⎟ ⎜ ⎟
value of a weighted fuzzy number wi R i and the s.t. ⎜ ρ1 ≤ 0 (17)
possibilistic mean value of a weighted mean value fuzzy ⎜Q 0 −e ⎟ ⎜⎜ ⎟⎟
⎜ ⎟ ⎝ ρ2 ⎠
⎝ −Q 0 −e ⎠
n
1
number of Z =
n
∑ w R i i are
n
∑w
i =1
n i = 1, wi ≥ 0, i = 1," , n
1
gi = f (wi Ri , Z ) = wi M (Ri ) − ∑ wj M (R j )) i =1
ρ2 = Max qk = Max wk M ( Rk ) − wk +1M ( R k +1 ) In this section, we offer three numerical examples to
illustrate the use of the proposed method (MVMDM).
k =1,",n −1 k =1,",n −1
The first two examples illustrate the aggregation of
We have trapezoidal fuzzy numbers and triangular fuzzy numbers,
n
respectively. The third example involves the aggregation
1
∀i = 1," , n, wi M ( Ri ) − ∑ w j M ( R j )) ≤ ρ1 of combination of interval numbers, triangular fuzzy
n j =1 numbers, and trapezoidal fuzzy numbers.
Example 1. Consider a group decision analysis problem
∀k = 1," , n − 1, wk M ( Rk ) − wk +1M ( R k +1 ) ≤ ρ 2 investigated by Lee[4] and Hsu and Chen[1] and Wang[5]
in which three experts express their opinions as captured
That is by the following trapezoidal fuzzy numbers:
⎧ n
) − 1 ∑ w M ( R )) − ρ ≤ 0, i = 1, " , n R1 = (1,2,3,4), R 2 = (1.5,2.5,3.5,5), R3 = (2, 2.5,4,6)
⎪ iw M ( Ri j j 1
⎪ n j =1 For the application of MVMDM, we first construct
⎨ n
the following matrix:
⎪w M ( R ) − 1 w M ( R )) − ρ ≤ 0, i = 1, " , n
⎪⎩ i i ∑
n j =1
j j 1
838
⎛1.6667 1.0278 1.1667 ⎞ W ∗ = (0.3306,0.2548,0.4146)T
⎜ ⎟
P = ⎜ 0.8333 2.0556 1.1667 ⎟ 3
Whose inverse is: Thus, the method produces aggregate values that is
very similar to those obtained by Wang’s LSDM and
⎛ 2.5000 -3.0833 0⎞
Q=⎜ ⎟ DLSM R ∗ = (2.8945,3.5539,4.6175,5.2770) , R ∗ =
⎝ 0 3.0833 -3.5000 ⎠ (2.8835,3.5437,4.6117,5.2718) .
Then, by Eqs. (17) and (1), we obtain the optimal
weights and optimal aggregation as
4 Conclusions
W ∗ = (0.4231, 0.3175, 0.2594)T
3 In this paper, we have proposed a new method, called
R ∗ = ∑ wi∗ Ri = (1.4181,2.2884,3.4181,4.8363) minimax disparity approach (MVMDM), to obtain the
i =1 weights of individual fuzzy opinions in fuzzy group
Our method produces aggregate values that is very decision analysis so that fuzzy opinions can be
similar to those obtained by Lee’s optimization aggregated in a simple and effective manner to obtain a
method[4], R ∗ = (1.5066,2.3370,3.5006,5.0012) , and group consensus. The MVMDM is simpler than the
existing approaches because it requires only the
Wang’s LSDM and DLSM [5] R ∗ = (1.4388,2.3003 formulation and solution of an LP model as opposed to a
3.4388,4.8776) R ∗ = (1.4377,2.2992,3.4377,4.8753) constrained nonlinear optimization model or the
requirement that an inverse matrix be solved. We have
Our approach is markedly simpler than Lee’s
illustrated the application of our approach by three
procedure.
numerical examples and verified its validity in
Example 2. Consider an aggregation problem with
generating valid weights of individual fuzzy opinions.
missing data point, which in the opinion of three experts
can be estimated by the three triangular fuzzy numbers
below:
References
R1 = (2,3, 4), R2 = (2, 4, 5), R3 = (3, 4, 5)
Using MVMDM, we have [1] H.M. Hsu, C.T. Chen, Aggregation of fuzzy opinions
∗
W = (0.4286,0.3012,0.2701) T under group decision making, Fuzzy Sets and Systems,
vol. 79, no. 3, 1996,pp.279-285.
3
R ∗ = ∑ wi∗ Ri = (2.2701,3.5714,4.5714)
[2] J.H. Moon, C.S. Kang, Use of fuzzy set theory in the
aggregation of expert judgments, Annals of Nuclear
i =1
Energy,vol.26,no.6, 1999,pp.461-469.
Thus, the method produces aggregate values that is [3] A. Kumar, G. Karmakar, Aggregation of opinions
very similar to those obtained by Lee’s optimization using fuzzy numbers, International Journal of Systems
method R ∗ = (2.3334,3.6712,4.6712) , and Wang’s Science, vol.32, 2001,pp.1399-1411.
LSDM and DLSM R ∗ = (2.2967,3.6093,4.6093) R ∗ = [4] H.S. Lee, Optimal consensus of fuzzy opinions under
group decision making environment, Fuzzy Sets and
(2.2920,3.6106,4.6106) . Systems,vol. 132, no.3, 2002,pp.303-315.
Example 3. Consider the following scenario: Three real [5]Ying-Ming Wang, Celik Parkan, Two new approaches
estate agents, experts whose opinion we are interested in, for assessing the weights of fuzzy opinions in group
predicted the average price a certain property would decision analysis, Information Sciences, vol.176,no.23,
command over the next quarter. There opinions can be 2006,pp.3538-3555.
characterized, respectively, by an interval number, a [6] K.S. Park, S.H. Kim, A note on the fuzzy weighted
triangular fuzzy number, and a trapezoidal fuzzy number, additive rule, Fuzzy Sets and Systems, vol.77, no.3, 1996,
as shown below where the formats[5]: pp.315-320.
R1 = (3,5), R 2 = (4,5, 6), R3 = (2,3, 4, 5) [7] R. Ramakrishnan, C.J.M. Rao, The fuzzy weighted
additive rule, Fuzzy Sets and Systems, vol.46, no.2, 1992,
Since interval numbers and triangular fuzzy numbers
pp.177-187.
can both be viewed as special cases of trapezoidal fuzzy
[8] Christer Carlsson, Robert Fuller, On possibilistic
numbers, the three opinions are represented by
mean value and variance of fuzzy numbers, Fuzzy Sets
trapezoidal fuzzy numbers as
and Systems,vol.122, no.2,2001,pp.315-326.
R1 = (3,3,5,5), R 2 = (4,5,5,6), R3 = (2,3, 4,5)
MVMDM produces the following results:
839
2008 International Conference on Intelligent Computation Technology and Automation
841
b) switch vibration
Figure 4. Unexpected switching results
842
absolute value of error may result in mistaken switches.
The proposed fuzzy control outputs a reasonable value
which can select the switch moderately. The control
algorithm is shown in Figure 9 and explained below.
e(k+1) e(l+1)
e(k) e(l) Enmax
e(i) e(j+1)
Epmax
e(i+1) e(j)
Figure 10. Variable-parameter fuzzy controller simulation
843
5. Conclusion
In this paper, a fuzzy PID compound controller is
demonstrated in a digital DC/DC converter, and is
applied to a fixed-structure variable-parameter (two
PID parameters) system aiming at solving the problem
of vibration and bounce-back occurred at switching
moments. The fuzzy control is used to determine
which PID controller will be selected. Experimental
results indicate that fuzzy control is helpful to smooth
the switches and improve robustness, and the
performance of the system is ensured by variable-
parameter controllers. A better result can be obtained:
a) 10%~50% output voltage variation is less than 0.3%, overshoot
and undershoot of 10%~50% step load response is
144mV and 162mV, 50%~100% step load response is
206mV and 210mV, the efficiency is 84%.
6. References
[1] Geof Potter, “An Introduction to Digital Control of
Switching Power Converters”, DCDC Technical White
Paper from Astec Power, 2004.
[2] Laszlo balogh, “A Practical Introduction to Digital Power
Supply Control”, Texas Instruments Incorporated, 2005.
[3] A. J. Forsyth, S. V. Mollov. “Modelling and control of
b) 50%~100% DC-DC converters”, Power Engineering Journal, 1998, Oct.
Figure 12. Step load simulation [4] Qing Chen, Fred C. Lee and Milan M. Jovanovic,
“Small-signal Modeling and Analysis of Current-Mode
Control for Multiple-Output Forward Converters”, IEEE,
1994, pp. 1026-1033.
[5] J. A. Oliver, R. Prieto and V. Romero, “Behavioral
Modeling of DC-DC Converters for Large-Signal Simulation
of Distributed Power Systems”, IEEE, 2006, pp. 1204-1209.
[6] Jaber A. Abu-Qahouq, Ehab Shoubaki and Yangyang
Wen, “Piecewise Digital Control Method for DC-DC
Converter”, IEEE, 2005, pp. 41-49.
[7] J. C. Wu, T. S. Liu, “A Sliding-Mode Approach to Fuzzy
Control Design”, IEEE Transactions on Control System
Technology, 1996, 4(2), pp. 141-149.
[8] Wei Jingyi, Fan Yinhai, “A Fuzzy PID Controller for
Ship Course Based on Engineering Tuning Methods”, IEEE,
a) 10%~50% 2001, pp. 376-381.
[9] Qingjie Zhao, Fasheng Wang and Wei Wang, “Adaptive
Fuzzy Control Technology for Automatic Oil Drilling
System”, IEEE, 2007, pp. 2123-2127.
[10] Xu Haiping, Wen Xuhui and Kong Li, “Analysis and
Design of Digitally Controlled Bi-directional DC/DC
Converter”, Power Electronics, 2003, 37(6), pp.13-16.
[11] Duan Ruiling, Li Yuhe and Li Qingxiang, “Design and
Simulation on Fuzzy-PI-Based Control Method for Precision
Servo-worktable”, Computer Measurement and Control,
2006. 14(6), pp. 751-753.
b) 50%~100%
Figure 13. Step load response
844
2008 International Conference on Intelligent Computation Technology and Automation
1. Introduction
ABS (Antilock Braking System), on the basis of
traditional braking system, adopts electronic control
technology to modulate the oil pressure of the brake
automatically. During to ABS system, the brake wheel
is prevented from lockup [1]. In general, there are two
kinds of ABS systems, one is based on the wheel Figure 1. Basic principle of an antilock braking
deceleration, the other is based on the wheel slip ratio. system
The first can work without signals of vehicle velocity,
but the full force offered by road can’t be used If a wheel speed sensor signals severe wheel
completely. The second aimed to maintain the oil deceleration to the electronic controller that indicate
pressure around the optimum point. In a way, the the wheel is likely to lock up, the braking pressure at
maximal braking force can be used [2], [3]. the wheel involved is initially kept constant as opposed
Furthermore, the wheel can also be prevented from to being further increased. If the wheel still continues
lockup. Following problem should be solved during to decelerate, the pressure in the wheel brake cylinder
designing the second ABS system: 1) Identifying the is reduced so that the wheel is broken less heavily. The
road condition, in other words, how to calculate wheel will accelerate again as a result of the reduced
adhesive coefficient on the condition of the slip ratio braking pressure. Upon reaching a specified limitation,
which is already known. 2) The method to look for the controller registers the factor that the wheel is not
ideal slip ratio, which is corresponding with maximum braked sufficiently now. The former reduced pressure
adhesive coefficient. 3) The arithmetic to control slip is then increased so that the wheel is decelerated again.
ratio [4], [5].
The first problem is solved through experiment
mainly, a commonly used method include straight line
846
coefficient is the maximum. So we should control the
ratio near to the point.
In general ABS controller, input is single, dϕ / ds
e.g. If we set the dϕ / ds and (dϕ / ds) / dt as input,
and braking pressure ΔP as output. The key aspect is
that pressure modulating value U is variable. This can
be actuated by a PWM modulation electromagnetic
valve. First, the input and output variables are altered
to the scale [-5, +5], and then input is divided into five
discussed scale, {NL, NS, ZE, PS, PL}, witch is shown
as Figure 4. The fuzzifition of the output is divided
into seven fuzzy set, {NL, NM, NS, ZE, PS, PM, PL}
as Figure 4. The Gaussian method is applied.
847
general ABS system, the new antilock braking system
improves the pushback feeling on the braking pedal.
Fig. 10 indicates that the braking distance of the new
system is shorter than the general one. The reason of
this is easily found in Figure 8 and Figure 9. That is
because the wheel speed can maintain nearer to the
ideal speed than that of general one, and the adhesive
coefficient also can maintain nearer to the ideal value.
848
Performances comparing between general ABS
simulation result and new ABS simulation (2) 8. References
Vehicle MFDD (m/s2)
speed Relative [1] MA Ming-xing, MAO Wu-ben, and ZHU Wei-xing,
General New Increment
(km/h) increment “Vehicle ABS controls theory analysis of the algorithm and
ABS ABS
experimental study,” Mechanical Journal for Agriculture.
50 8.95 9.05 0.10 1.12
April 2002, pp. 29-37
80 9.63 9.72 0.09 0.93
[2] MA Ming-xing, CHOU Qi-ya, “The braking simulation
100 9.88 9.96 0.08 0.81 study of vehicle based MATLAB,” Group Technology &
We can get a conclusion from Table 3 that braking Production Modernization, March 2004, pp. 11-14
distance is shorten maximum relatively 5.83 percent. [3] Long Xiao-lin, Du Xiao-fang, and Xu Da, “The
automobile ABS analysis and simulation based on slip and
MFDD maximum relative value increment is 1.12 variable structure modulation control,” ZHUAN YONG QI
percent. Simulation results fully demonstrated that this CHE, March 2004, pp. 25-26
new system can shorten the ABS braking distance. It [4] SUN Jun, “The simulation of antilock braking system
can raise the braking average speed and improve the based on fuzzy control,” Computer Simulation, October
braking performance of vehicles. 2004, pp. 160-162
[5] Li Jun, YU Fan, and ZHANG Jian-wu, “The research of
7. Conclusion ABS fuzzy control system on the basis of identifications
automatically,” Mechanical Journal for Agriculture. May
2002, pp. 26-29
This study aims to get the maximum adhesive [6] Qi Zhang, Guo-fu Liu, Yue-ke Wang, and Ting-ting
coefficient and control it to maintain near to the ideal Zhou. “A Study of Calculation Method of Wheel Angular
value. Fuzzy control method is adopted which has two Acceleration in ABS System,” Proceedings of 2004
input variable, dϕ / ds and (dϕ / ds) / dt . During the International Conference on Information Acquisition.
reducing, maintaining and increasing pressure, the September 2004, pp. 147-150.
[7] Dengfeng Yang, Zhihua Feng, Desheng Ma, and Gang
velocity is defined variable. This can carry out through
Sun, “Development of Anti-lock Brake System in Virtual
a PWM modulating electromagnetic. This is the next Environment,” IEEE Human-Computer Interfaces and
work. The ABS control system is simulated in Measurement Systems, June 2004, pp. 131-135
Matlab/Simulink environment. The result indicates
that, compared with the single input, the multi-input
can improve the pushback on the pedal.
849
2008 International Conference on Intelligent Computation Technology and Automation
set U ⊂ R n ,for each given ε > 0 ,it is satisfied that ② If | S |< ϕ ,then Sd = Sd = 0
supx∈U | h(x) − f (x) |≤ ε , Fuzzy basic function network controller u is used to
k
Where f ( x ) = ∑ξ
j =1
j ( x )θ j = ξ T ( x ) θ = θ T ξ , where approximate u * in (8). According to Theorem 1, it is
designed as follows:
θ = (θ1,θ 2 , ⋅⋅⋅, θ k )T is adjustable parametric vector; u = u fz ( x | θ) = θT ξ ( x) = ξT ( x)θ (10)
ξT ( x) = (ξ1 , ξ 2 , ⋅⋅⋅, ξ k )T is fuzzy basis function vector. Adaptive law about parameter θ is given by
Here, ξ j ( x) is given by θ = η S (t )ξ ( x)
1 d (11)
n Meanwhile, considering effect of approximation error
∏μ Aij
( xi ) and external disturbance, compensation controller is
ξ j ( x) = k
i =1
n
( j = 1, 2, ⋅⋅⋅, k ) (4) added. Ultimately, we have
∑ (∏ μ A j ( xi ))
j =1 i =1
i
u = u fz ( x | θ) + kc uc (12)
Where u fz ( x | θ ) is called fuzzy approximation
According to theorem 1, fuzzy basic function network
controller is designed as follows: controller; uc , compensation controller; and kc ,
u fz ( x | θ ) = θ ξ ( x ) = ξ ( x ) θ T T
(5) compensation controller gain. The compensation
controller gain kc is described as follows:
Typical adaptive law of parameter θ [5] is given by
kc = ω + K d (13)
θ = η1 ⋅ S ⋅ ξ ( x) (6)
Where ω is called control gain of approximation error,
Direct fuzzy adaptive controller with θ in (6) is
which is a time-varied function about Sd , and K d is
sensitive to approximation error and external
disturbance. Also, continuous unfit modifications of called gain of suppressing external disturbance, which
parameter for fuzzy system result in control are respectively determined by the following formulas:
performance reduction. In order to overcome above ω = μ2 | Sd | (14)
mentioned questions, the parameter θ is given by Kd =
D (15)
θ = η ⋅ ( S + λ S ) ⋅ ξ ( x)
1 (7) d
bL
Although control performance of fuzzy adaptive In the (11) and (14), η1 > 0 and η 2 > 0 respectively are
controller with θ in (7) is improved, convergent speed adaptive law with respect to θ and ω . D is upper
become slower. bound of external disturbance, | d(t)|≤ D,and b L is lower
In order to solve questions in (6) and (7), their bound of control gain about system in (2),
advantages are combined to overcome the namely 0<bL <b .In order to compensate effect of
disadvantages of each other. Quasi-sliding region is
approximation error and external disturbance for
designed by use of sliding mode control theory and
fuzzy control method. Therefore, design process of system, compensation controller uc in(12)is designed
adaptive fuzzy sliding mode controller is as follows: as follows:
Ideal controller in(3) is redesigned ,we have uc = I ⋅ sgnS , | S |> ϕ
n −1
1
u* = [− f ( x ) + λ Sd + ∑ ci ei +1 + ym ( n ) ] (8) uc = S + λd S , | S |≤ ϕ (16)
b i =1
In above expressions, I = 1 and λd > 0 , sgn (⋅) is sign
function, if S > 0 ,then sgn S = 1 .if S < 0 ,then
851
sgnS =−1 .From equations (2),(8),and(12),we obtain Noting that θ = -θ , ω = −ω , and by substituting
dynamic equation of tracing error as follows: (11) ,(14) and(15) into above inequality, we get the
n −1
time derivative of Lyapunov function V as follows:
e (n ) = − λ S + b (u * − u ) −
d c e ∑
− d (17) i i +1
S 2
i =1 V ( t ) = − λ d + S d θ T ξ ( x ) + | S d | ω +
b
3.2. Stability and robustness analysis D D
| Sd | ( | S d | ω − ) − S d θ T ξ ( x ) − | S d | ω
bL bL
Theorem2.In the nonlinear system(2) u is designed as
(12),where approximation controller u fz is in (10), Sd 2
≤ −λ <0 (22)
corresponding adaptive law about parameter is in (11), b
compensation controller uc is in (16), corresponding Therefore, for arbitrary bounded initial conditions
Sd (0) , θ ( 0 ) ,and ω (0) , it is known that Sd (t ) , θ (t ) and
adaptive law of control gain about approximation error
is in (14), gain of suppressing external disturbance is in ω (t ) are bounded. if e(0) is bounded, then e(t ) is
(15),then the states x of closed loop system and control bounded. Thus, system state is bounded for bounded
variable u are bounded, and tracing error converge in reference output ym and its all-order derivatives. Each
neighborhood of zero[6]. team in (12) is bounded, so that control variable u is
Proof. Let the Lyapunov function be also bounded. In order to prove tracing error converge
1 1 T 1 2 in neighborhood of zero, only prove as
V (t ) = b −1 S d 2 + θ θ+ ω (18)
2 2η1 2η2 t → ∞ , Sd → 0 .So, let
where θ = θ* - θ and ω = ω * − ω are estimation error V1 (t ) = V (t ) − ∫ (V (τ ) +
t λ
Sd 2 (τ ))dτ (23)
with respect to optimal weight vector θ* and ω * , 0 bL
respectively. Here ω * is define as approximation error then
of fuzzy approximation controller, that is λ
V1 (t ) = − Sd 2 (t ) (24)
| u* − u fz ( x | θ) |= ω * (19) bL
The time derivative of V in (18) is Because Sd is bounded, V1 (t ) is uniformly
S S 1 T 1
V ( t ) = d + θ θ+ ω ω (20) continuous. V1 (t ) has lower bound and its lower bound
b μ1 μ2
is zero, and V (t ) ≤ 0 for all t. According to Barbalat
If | S |≤ ϕ , then Sd (t ) = 0 ,at the same time ,noting that
1
852
to predetermined precision at a definite speed. The first group: T1 =100(s) , T2 =250(s), τ =25(s).
In addition, in(16) not only considering distance Step response curve of the controlled temperature is
between tracing error and sliding surface in phase curve 1 in Fig2.
space bur also considering motion information of the The second group: T1 =100(s),T2 =350(s),τ=25(s).
tracing error. Compared with the method that is Step response curve of the controlled temperature is
considering pure motion information, the method curve 2 in Fig2.
proposed in this paper make anti-interference ability of
closed-loop system stronger, and dynamic performance 90
μ A ( x1 ) = ex p { − [( x1 − 6 5) / 2 .5] 2 }
transient time ts=40(s),remain constant. This proves
2
1
that system robustness is strong and control
μ A ( x1 ) = ex p { − [( x1 − 7 5) / 2 .5] 2 }
3 performance is good.
1
μ A ( x1 ) = ex p { − [( x1 − 8 5 ) / 2 .5] 2 }
1
4
4.2. PID controller simulation
μ A ( x1 ) = ex p { − [( x1 − 9 5) / 2 .5 ] 2 }
5
1
The model of controlled plant and parameters are the
μ A ( x 2 ) = ex p { − [( x 2 + 1) / 0 .5 ] 2 }
1
2 same as mentioned above. Step response curves of the
μ A ( x 2 ) = e x p { − [( x 2 + 0 .5 ) / 0 .5 ] 2 }
2 controlled plant under the control of PID controller are
2
μ A ( x 2 ) = e x p { − [( x 2 ) / 0 .5 ] 2 }
3
shown in Fig.3.
2
System performance indexes of curve 1 in Fig.3:
μ A ( x 2 ) = e x p { − [( x 2 − 0 .5 ) / 0 .5 ] 2 }
overshoot σ=11.8%, steady state error ess= 1.5℃, and
4
2
μ A ( x 2 ) = e x p { − [( x 2 − 1) / 0 .5 ] 2 }
5
transient time ts=52(s).System performance indexes of
2
Therefore according to above membership functions, curve 2 in Fig.3: overshoot σ =18.8%,steady state
we obtain twenty-five fuzzy rules to approximate ideal error ess=1.5℃,and transient time ts=65(s).
controller u ∗ , that is The comparison between Fig.2and Fig.3 indicates
R1:if x1 is A11 , x2 is A21 then y1 is B1 that the system with adaptive fuzzy sliding mode
controller can effectively suppress bad influences of
R2:if x1 is A11 , x2 is A22 then y2 is B 2 time delay and nonlinearity, also, when parameters of
..
25
the model change greatly and external disturbances
R :if x1 is A15 , x2 is A25 then y25 is B 25 exist, the system still has satisfactory effect of control.
Parameters of adaptive fuzzy sliding mode controller The performance indexes of the system with adaptive
are: λd = 300 , η 1 = 0 . 56 , η 2 = 1 , ϕ = 0.15. fuzzy sliding mode controller, for example overshoot,
The model of controlled plant is given by (1).We set steady state error and transient time, have evident
parameters of model as follows: advantage over the performance indexes of the system
853
with PID controller. Dynamic performance of the [4] Wang lix-in, Adaptive Fuzzy System and Control—
control system is obviously improved. Design and Analysis, National Defence Industry Press
,beijing,1989.
120 [5] Soo Yeong Yi, Myung Jin Chung , “Systematic Design
Controlled Temperature (degree Celsius)
40
20
0
0 50 100 150
Time (sec)
5. Conclusion
In this paper, we designed an adaptive fuzzy sliding
mode controller for the temperature control system of
heat exchanger in district heating. Simulation results
show that the system with adaptive fuzzy sliding mode
controller have better rapidity, stronger robustness and
higher control precision. Dynamic performance of
control system is obviously improved. The controller is
suitable for the temperature control system of heat
exchanger. It is also suitable for temperature control of
other industrial processes. Therefore, it has high
application value.
Acknowledgements
This work has been supported by Tianjin Natural science
Foundation under grant No: 07JCYBJC05600.
References
[1] Yu Shu-rong ,Qi Zhen-qiang et al, “System Modeling of
Two Stage Heat Exchanger Unit in Thermal Station of
Centralized Heating System”, Journal of Gansu
University of Technology,Editorial Office of Journal of
Gansu University of Technology,2002,(28)PP.57-61.
[2] Zhang Cheng, “Design of the Amendatory Fuzzy-PID
Temperature control System of Heating Net”, Control
and Automation, Control and Automation Publication
Group,2005,(21)pp.53-55.
[3] Zeng Ke’e, Xie Qing-guo et al, “Adaptive Fuzzy
Controller of Central Heating Net”,Journal of Huazhong
University of Science & Technology, Editorial office of
Journal of Huazhong University of Science &
Technology,2000,(28)PP.111-113.
854
2008 International Conference on Intelligent Computation Technology and Automation
β i ( x) = j =1 μi 2
3 Φi = ⎢ (8)
∑k =1∏ Akj ( x j ) ⎢ # # % # ⎥
M
⎢ ⎥
j =1
⎣0 0 " μ iN ⎦
0≤ β i ≤1 (4)
according to least squares method, the solution is:
3.2. Fuzzy model identification
θ i = ( X e T φi X e ) −1 X eT φi y (9)
856
3.2.4. Genetic algorithm (2) Simple arithmetic crossover svt and s wt are
The projection of clusters onto the input variables
and their approximation by parametric functions chromosomes selected for cross over at the kth position.
introduces a structural error since the resulting premise The resulting offsprings are:
partition differs from the cluster partition matrix, svt +1 = r.( svt ) + (1 − r ) s wt
moreover the separate identification of the rule
antecedents and the rule consequents prohibits s wt +1 = r.( s wt ) + (1 − r ) svt (14)
interactions between them during modeling. To where, r∈[0,1] is a random number, t=0,1,…,T is the
improve the approximation capability of the rule base, generation number.
a real-coded GA [7] is used for the simultaneous (3) Uniform mutation: a random selected
optimization of the parameters of the antecedent element vk is replaced by vk′ ,
membership functions and the rule consequents. The
main aspects of the proposed GA are discussed below:
A. Code scheme v′k ∈ [vkmin , vkmax ] , vkmax , vkmin are the lower and upper
Chromosomes are used to describe the solution. bounds, respectively. The resulting chromosome is
With a population size L, we encode the parameters of s vt + 1 = ( v 1 , " , v k' , " , v m ) .
each fuzzy model in a chromosome sl , l = 1,", L ,as D. Terminate condition
a sequence of elements describing the fuzzy sets in the The genetic search stops when the highest fitness in
rule antecedents followed by the parameters of the rule the population reaches a predefined value.
consequents. A TS model with M fuzzy rule is encoded Through aboved four steps, we can get a
as: transparent and accurate fuzzy model.
sl = (ant1 ,", ant M ,θ1 ,",θ M ) (10)
4. Simulation results
Where anti = (ai1 , bi1 ,", ai 3 , bi 3 ) is the
antecedent parameters of the ith rule, θ i contains the in this section, some simulation results are
presented to illustrate the application of fuzzy
consequent parameters of the ith rule. In the initial modeling approach to identify the soil resistivity of
population S 0 = ( s10 ,", s L0 ) , s10 is the initial model, dynamic grounding system. The data used for fuzzy
clustering came from ref.[2][8].
and s 2 ,", s L are created by random variation with a
0 0
TABLE 1: RELATIVE ERROR RATE OF THE SOIL RESISTIVITY
uniform distribution around s1 .
0
f R Rch ρm ρr error
B. Fitness function (Hz) (Ω) (Ω) (Ω.m) (Ω.m) (%)
The performance of the model is expressed as 100 140.9 78.5 1997 2000 0.15
1 N ∧ 200 67.7 38.3 1011 1000 1.1
J = ∑ ( yk − yk ) (11) 300 6.3 3.5 100 100 0.0
N k =1
400 101.7 57.6 1587 1600 0.8
∧
where, yk is real value, y k is model output. Fitness 500 31.7 17.9 499 500 0.2
600 6.3 3.5 101 100 1.0
function is defined as 700 30.8 17.4 17.4 500 0.4
1 In Table1, ρ m is model output of soil resistivity,
f = (12)
J2 ρ r is real value of soil resistivity. From Table 1, it is
C. Genetic operators observed that the proposed approach provides result
(1) Reproduction The roulette wheel selection near real value, the error is lower and acceptable. All
method is used to select chromosomes for operation. these results demonstrate that problems involving
The chance on the roulette-wheel is adaptive and is identification of characteristics of grounding system
given as can be effectively mapped by fuzzy modeling approach.
n
pl = f l ∑f k (13) 5. Conclusion
k ' =1
The inverse of the selection function is used to select In this paper, a novel approach based on fuzzy
chromosomes for deletion. modeling is proposed to map the relationship among
the soil resistivity in relation to several variables that
857
indicate the features to grounding system. It achieves
good result and decreases time involved with tests in [3] Xie Guang Yun Grounding technique in power system
laboratory, it can be seen as an efficient tool to provide Hydroelectric power press 1998
alternatives to the conventional method. Other
[4] T.Takagi, M.Sugeno, Fuzzy identification of systems and
parameters such as grounding resistance, over-voltage its application to modeling and control, IEEE Tran. Systems,
can also be identified by this approach in the same way. Man and Cybernetics 15(1985)116-132
6. Acknowledgement [5] Zhang Zhi Xing Sun Chun Zai Neuro-Fuzy and Soft
Computing. Xian jiaotong university press ,2004
This work is partially supported by the Provincial
Natural Science Foundation of Hunan under Grant [6] M.Setnes, R.Babuska, U.Kaymak. Similarity measures in
fuzzy rule base simplification. IEEE Transactions on
06JJ2011 and Scientific Research Fund of Hunan systems, Man and Cybernetics. Part B,28(3) (1998),376-386
Provincial Education under Grant 07A002.
[7]Z.Michalewicz, GeneticAlgorithms+Data Structure
7. References =Evolution Programs, 2nd ed. New York: Springer-Verlap,
2004.
[1] IEEE WG Report. A Simplified method for estimating
lightning performance of transmission lines.IEEE Trans on [8] S.Visacro.”evaluation of models for representing usual
Power Apparatus and System, vol.PAS-104, no.4, April grounding electrode configurations of distribution lines in
2005,pp.919-932 Brazil”. Proceedings of V international Symposium on
Lightning Protection,pp.104-108,may 2005,brazil.
[2] Andre Nunes de Souza,Ivan Nunes da Silva, “Application
of neural network to identify features of dynamical
grounding system ” Proceedings of international Symposium
on neural network ,pp.181-186,July, 2007,seattle,USA
858
2008 International Conference on Intelligent Computation Technology and Automation
860
The virtual work of the robot is Substituting Lagrange function and generalized force
δW = τ T δq = τ 0δθ 0 + τ 2δx1 + τ 3δy 4 (4) into the Lagrange equations yields
⎡ ⎤
Referrinh to the Fig. 2, we can derive the following d ⎢ ∂L ⎥ ∂L (i = 1,2,3) (17)
− = Qi
geometry relation dt ⎢ ∂ q• ⎥ ∂qi
⎣ i⎦
⎧ x1 = l0c2 − l3c3
⎨ (5) Arranging and deriving after substiting (1)~(16)
⎩ y4 = l3 s3 − l0 s2 into (17), in matrix form those nolinear dynamic
equations of the robot can be written as
Differenttiating the above expression gives •• • •
⎧δx1 = −l0 s2δθ 2 + l3 s3δθ 3 M (θ )θ + C (θ ,θ )θ = Dτ (18)
⎨ (6)
⎩δy4 = l3c3δθ3 − l0c2δθ 2 ⎡ M 11 0 0 ⎤
Substituting (6) into (4) results in Where M = ⎢ 0 M 22 M 23 ⎥⎥ is a 3×3 positive
⎢
δW = τ 0δθ 0 + (− l0 s2τ 2 − l0 c2τ 3 )δθ 2 ⎢⎣ 0 M 32 M 33 ⎥⎦
(7)
+ (l3 s3τ 2 + l3 c3τ 3 )δθ 3 definite, symmetry and time-varying generalized
With the virtual work principle, we have quality matrix:
M 11 = m1 (l0c2 − l3c3 − l ) + m2 (l0c2 + l2 c c2 − l3c3 − l )
2 2
δW = τ 0*δθ 0 + τ 2*δθ 2 + τ 3*δθ 3 (8)
+ I 0 + m3 (l0 c2 − r3c3 − l ) + m4l 2 + m5 (l5c c2 − l )
2 2
Comparing (7) with (8) gives the generalited force
is
+ m6 (l5c2 − l6c c3 − l ) + m7 (l5c2 − l6 c3 − l )
2 2
τ * = Dτ (9)
(
M 22 = s22 m1l02 + m2 r22 + m3l02 + m5l52c + m6l52 + m7l52 )
2.4 System’s dynamical model 2
2 (
+ c m l + m r + m l + m l + m l + I2 + I5
2
2 2c 4 5
2 2
5 0
2
6 2
2
7 2 )
To simply the force analysis of the three- (
M 23 = M 32 = c2c3 m5l3r5 − m4l0l3 − m6l0 r6 − m7l2 r6' )
dimensional mode, we first derived Lagrangian + s2 s3 (− m1l0l3 − m2l3r2 − m3l0 r3 − m6l5l6c − m7l5l6 )
equations of the system.
M 33 = I 3 + I 6
2.4.1. Vector radius of link’s mass center. [7-8] (
+ s32 m1l32 + m2 l 32 + m3 r32 + m6 l 62c + m7 l 62 )
( )
Supposing that the vector radius of every link into the
2
coordinates OXYZ is ri (i=1,2,…7). Referring to their + c32 m3l32c + m4l32 + m5l32 + m6 r62 + m7 r6'
geomtrical relation, yields The other elements of the matrixes have been
( ) (
r1 = l0c2 − l3c3 − l c1i + l0c2 − l3c3 − l s1 j (10) ) derived out, but they are omittted here because of their
r2 = (l0 c2 − l3c3 + l 2 c c 2 − l )c1i long expressions.
(11)
+ (l0 c2 − l3 c3 + l2 c c2 − l )s1 j + l 2 c s2 k
3. Self-adaptive Fuzzy PID Control
( ) ( )
r3 = l0c2 − r3c3 − l c1i + l0c2 − r3c3 − l s1 j + l3c s3 k (12)
r4 = −lc i − ls j + (l s − l s )k
1 1 3 3 0 2
(13) The fuzzy inference of the self-adaptive fuzzy PID
r5 = (l5 cc2 − l )c1i + (l5 cc2 − l )s1 j + (l3 s3 + r5 s2 )k (14) controller is based on the fuzzy rule table. The
parameters of PID can be adjusted on-line, which can
r6 = (l5 c2 − l 6 c c3 − l )c1i be changed through the inquiry to the fuzzy control
(15)
+ (l5 c2 − l6 c c3 − l )s1 j + (l 2 s 2 − r6 s3 )k rules table saved aforehand in the computer. [9-11]
r7 = (l5 c2 − l6 c3 − l )c1i + (l5 c2 − l6 c3 − l )s1 The conventional PID controller can be described as
(16)
∫
de(t )
( )
+ l2 s2 − r6' s3 k u (t ) = K P e(t ) + K I e(t )dt + K D
dt
(19)
Where s1=sinθ1, c1=cosθ1, s2=sinθ2, c2=cosθ2, s3=sinθ3, Where, KP, KI and KD are the proportional, integral
and c3=cosθ3, the following is as so. and derivative gains respectively, u(t) is the output of
Differenttiating the expression of (10) to (16), we controller; e(t) is the error signal. The design algorithm
can have the volecity expression of every link of PID controller in this paper is to adjust the KP, KI
vi(i=1,2,…7). and KD parameters on line trough fzzy inference based
on the current e and de(t)/dt to make the controlled
2.4.2. Dynamical model of the system. object attain the good dynamic and static performances.
861
The block diagram of self-adaptive fuzzy PID fuzzy rule tables. The exact value of them can be
controller is shown in Figure 3. [13-14] obtained after the defuzzification. The practical control
value is the production of exact value and the quantum
factors.
4. Simulation results
Figure 3. Block diagram of self-adaptive fuzzy PID To demonstrate the effectiveness of the designed
controller controller for the palletizer, the MATLAB software is
used to the whole system simulation. To make the
The four aspects of the design process of controller robot rapid response and without overshoot, we
are as following: design the controller by means of the above self-
(1) The input and output variables. The e and ec are adaptive fuzzy PID algorithm.
used as fuzzy input and the KP, KI and KD are used as With the block diagram of the self-adaptive fuzzy
fuzzy output. PID control principle in the Figure 3 and the fuzzy
(2) Fuzzy language of input and output variables. control rules, the simulation results are shown in the
Here, quantum rank of the input variables e, ec is Figure 6. Now, to avoid the paper too long, here we
chosen as thirteen ranks, e, ec ={-6, -5, -4, -3, -2, -1, 0, only pay an attention on the controls of the waist of the
1, 2, 3, 4, 5, 6,}. The fuzzy sets of them are all defined robot, the responses of the other links are omitted.
as {NB, NS, ZO, PS, PB}, where NB, NS, ZO, PS and From the Figure 6, we can see that when the input
PB represent negative big, negative, small, positive, angle of the waist is 1 radian, the ascending time is
small and positive big, respectively. The quantum rank 50ms, the adjusting time is 10ms, the error of the
of KP, KI and KD is chosen as ten ranks, KP, KI and KD steady state is 1.4% with the self-adaptive fuzzy PID
={0, 1, 2, 3, 4, 5, 6, 7, 8, 9}. The triangle distrbution control, while the tranditional PID control has the
membership function of each variable is shown in defects of lower response rate and longer delay time,
Figure 4 and Figure 5, respectively. The suitable so the self-adaptive fuzzy PID control has more
quantum factor of each variable is adopted by obvious advantage than the traditional PID control in
considering the experiment and simulation results of response for the nonlinear system, and have no
the Palletizer, where the quantum factor of e is Ke=10; overshoot which is easy to occur in the fuzzy control.
the quantum factor ec is Kec=100; The quantum factor Therefore, the controller can satisfy the performance
of KP, KI and KD is KUP=3; KUI=0.7; KUD=0.5 [13-14]. requirement of the palletizer system.
862
system, the response of the waist is shown in the see that the self-adaptive fuzzy PID control has more
Figure 7, the others are omitted here. obvious advantage than the traditional PID control, and
From the Figure 7, we can see that the robot may the controller designed by the self-adaptive fuzzy PID
still work in an normal condition under the jamming of control algorithm can eliminate overshoot and posses
10N.m cosine singnal, hence the controller have strogh strong robustness.
robustness.
6. References
[1] H. G. Hu, J. H. Gao, R. Q. Yang. “The development of
palletizing technology”, Modular Machine Tool & Automatic
Manufacturing Technique, 2000, 6. pp. 35-39.
[2] T. S. Wang. Robot Kinematics and dynamics, Xidian
University Press, Xi’an, 1990, pp. 125-135.
[3] W. Huo. Robot dynamics and control, High Education
Press, Beijing, 2005, pp.211-221.
[4] Z. X. Zhu, Q. H. Zhou, J. S. Yin, Theoretical Mechanics.
Beijing University Press, 1997, pp. 315-325.
[5] Fei xuebo, Advanced Dynamics, Zhejiang University
Figure 7. Output response of the system with
Press, 1993, pp. 27-42.
jamming signal [6] Fei Renyuan, Zhang Huihui, Mechabical design and
analysis of robots, Beijing Industry University Press, 1998,
5. Conslusion pp. 75-83.
[7] X. Y. Tang, W. Li, “Effect of parallel four-bar
mechanism on spotwelding robot”, Journal of China
The MJR120 palletizer can satisfy the requirement Agricultural University, 2003, 8(4), pp. 36-40.
of high-speed and heavy load for material handling, [8] Ma Xiangfeng, Robot Mechanisms, Medical Industry
whose parallel four-bar mechanism makes the Press, 1991, pp. 233-239.
actuators of the two arms and their reducing [9] Mark W. Spong, M. Vidyasagar, Robot Dynamics and
mechanism can be installed on the its waist to improve control, United States of America. 1989, pp. 278-297.
its dynamic features. On the base of Lagrangian [10] T. Terano, K. Asai, M. Sugeno, "Applied Fuzzy
method, this paper analyses its dynamical performance Systems", AP Professional 1994, pp.302
[11] K. Tanaka, M. Sugeno, “Stability Analysis and Design
and sets up its inverse dynamic model, which is a
of Fuzzy Control Systems”, Fuzzy Sets and Systems, 1992,
foundation for its next trace and torque control. vo1.45, No.2, pp. 135-156.
In the case of having no overshoot, it is very [12] Tao Y H, Yin Y X, Ge L S, “The control and
difficult to increase the response velocity of the system application of late-model PID”. China Machine Press,
with the traditional PID control algorithm. In response, Beijing, 1999, pp. 179-195.
the paper introduces the self-adaptive fuzzy PID [13] GS. Buja and F. Todesco. "Neural network
control algorithm into the control system of the implementation of fuzzy logic controller”, IEEE Trans. Ind.
MJR120 palletizer. From the simulation results, we can Rlectron, vol 41, 1994, Dec. pp.663-667.
863
2008 International Conference on Intelligent Computation Technology and Automation
Based on the Fuzzy Math of the major Rivers in Hunan Province Water
Quality Assessment
B the domain
U = {u1 , u 2 , u 3 , "" , u n } of the
1. Introduction
fuzzy sets, the close-degree of A and B is:
Water-quality evaluation is an important segment in n
(B, A ) = max(B , A )
.
j i k (1≤k≤m) (2)
Form formulas (3) and (4), and you will get all
kinds of standards corresponding to the fuzzy
Says B and Bi is the nearest.
set
A1 , A2 ,""" Am and monitoring the
If the models meet the formula (2), judgment B
corresponding value of the fuzzy subset of B, this
Aj
should be classified model , the principle known as comprehensive water quality Evaluation
the Optional nearly principal.
on
A1 , A2 ,""" Am to choose the closest fuzzy
This article provides for the evaluation of projects
all types of water quality standards corresponding to sets with B, this will be the membership function into
the value from formula (1), can be obtained the close
the fuzzy
Aj
(
1 ≤ j ≤ m ) monitoring the
degree of
A1 , A2 ,""" Am with B, then under the
corresponding value of the fuzzy sets for and the
establishment of membership functions are as follows: optional nearly principle of choice close to the greatest
degree of fuzzy sets standards corresponding with B to
S ij
u A j (u i ) = m the type of comprehensive evaluation as a results.
H • ∑ S ij
i =1 (3)
3. Water-quality of rivers in Hunan
C Province
u B (u i ) = m
i
H • ∑ j =1
S ij Water crisis has become a world concern; it restricts
(4)
the development of human society and the level [4]. In
u A j (ui ) j Water
China, Hunan province is rich in water resources. Per
Above the two formula, - capita possession of water resources for many years an
quality standards corresponding to the fuzzy focus of average of 3381 m3, about 1.5 times the national
the project membership functions; average. However, water pollution has become
u B (ui ) - Monitoring the corresponding value of increasingly prominent in Hunan Province, the season
of water resources and water quality of water shortage
the fuzzy focus of the i project membership relatively prominent, and its economic and social
functions; development constraints increasingly appear.
Water-pollution is quite common in Hunan
S ij j water quality standard
-i Project of the province. State-controlled, the provincial serious
value; pollution control section of the super-section three
Water quality statistics section above 1 / 3, nearly half
Ci - The monitoring of i projects;
of the rivers in the middle above the level of pollution.
There are more than 60 percent of the river cannot use
H -Are integral to meet:
functional requirements. In recent years, despite
865
concentrations of pollutants ups and downs changes, 4. The evaluation of the water-quality in
but still very high. Local waters of heavy metal Hunan Province
contamination prominent, sewage has become
increasingly obvious impact on water quality, As shown in Table 1, there are four major rivers in
non-point source pollution is not effectively controlled, Hunan Province, Xiangjiang, Ziwater, Yuanjiang and
some enterprises discharge standards cannot achieve Liwater. The pollution problem of Xiang River is the
stability. The shore of the city's pollution is serious, most serious of the four, and the Li River has the best
direct threat to water safety. water quality, the Xiangjiang River pollution in the
In this paper, water environment monitoring data in most serious, and the best water quality of the Liwater
2005 was selected, using models of Hunan four river River. Below optional surface water environmental
wet and withered water period water quality of quality standards for the water situation in Hunan four
comprehensive evaluation and the results and the use of water comprehensive evaluation.
composite index of the evaluation results compared. Based on Table 2 in the surface water environmental
The water quality monitoring situations of Hunan in quality standards and using the model for Hunan four
[5]
2005 are shown in Table 1 and Table 2 . water do comprehensive evaluation, the results in Table
Table 1 2005 in Hunan Province four water 3, Table 4.
quality monitoring the situation The data of Table 1, Table 2 and Table 3 into the
(High water period) formula (3), and formula (4), can be calculated in
River Xiangjiang Ziwater Yuanjiang Liwater Hunan Province in the water environment projects
under the function of the water quality.
︱7.5-PH︱ 0.36 0.11 0.08 0.09
15-DO 10.56 8.64 8.1 7.29 Table 3 Surface water quality standard
Ⅰ Ⅱ Ⅲ Ⅳ Ⅴ Total
CODcr 4.64 0.7 4.68 6.36
︱7.5-PH︱ ≤ 1 1 1 1 1.5 5.5
BOD5 0.45 0.75 0.48 0.79
15-DO ≤ 7 9 10 12 13 51
oilL 0.008 0.015 0.01 0.008
866
Table 4 Categories of water quality and river Table 7 Types of water quality and water quality
water quality in calculation results in table in rivers close to the table of results
members’ hip function (Withered water period)
(High water period) River
0.0909 0.6364 1.3636 0.2727 0.0045 0.0002 Xiangjiang 0.7578 0.7143 0.7224 0.7981 0.6253
0.0909 0.8182 1.3636 0.2727 0.0045 0.0002 Ziwater 0.639 0.6863 0.6906 0.4873 0.3805
0.0909 0.9091 1.3636 0.3636 0.0045 0.0005 Yuanjiang 0.6472 0.6939 0.6977 0.4927 0.3847
0.0909 1.0909 1.8182 0.5455 0.0455 0.0009 Liwater 0.7895 0.7932 0.6843 0.5206 0.4065
0.1364 1.1818 2.2727 0.9091 0.0909 0.0091
Based on the data in Table 6 and Table 7, under the
Xiang 0.0327 0.9600 0.4218 0.0409 0.0007 0.0001 optional nearly principle, can be drawn: the Xiangjiang
Zi 0.0100 0.7855 0.0636 0.0682 0.0014 0.0001 River water for the withered water period categories,
Yuan 0.0073 0.7364 0.4255 0.0436 0.0009 0.0002 high water period ; funded water for the withered
water period the water quality class , high water
Li 0.0082 0.6627 0.5782 0.0718 0.0007 0.0001
period ; Yuanjiang for the withered water period
Table 5 Categories of water quality and river the water quality category, high water period ;
water quality in calculation results in table Liwater for the withered water period the class , high
members’ hip function water period for the class . Therefore, the Xiangjiang
(Withered water period) River pollution is most serious, major pollution
Ⅰ 0.0909 0.6364 1.3636 0.2727 0.0045 0.0002 indicators are chemical oxygen demand, the annual
withered water period the most pollution. The best
Ⅱ 0.0909 0.8182 1.3636 0.2727 0.0045 0.0002
water quality of the Liwater, and wet achieve Water
Ⅲ 0.0909 0.9091 1.3636 0.3636 0.0045 0.0005
quality standards, and this results in line with the actual
Ⅳ 0.0909 1.0909 1.8182 0.5455 0.0455 0.0009 monitoring data shows that use fuzzy math in the law
Ⅴ 0.1364 1.1818 2.2727 0.9091 0.0909 0.0091 to close to the comprehensive evaluation of the quality
867
water quality, they impact on water quality is membership, integrated assessment of water quality
equivalent. Therefore, close-degree method is directly was not affected.
based on the value and purpose of monitoring all types In short, both close to the perfect degree of fuzzy
of close to the water quality standards to evaluate the math evaluation methods have provided a
extent and therefore cannot be considered weight, can comprehensive evaluation of water quality model, but
also draw accurate evaluation of the results. However, an objective evaluation of the results reliable,
with close to the water quality evaluation, the comparable and effective method of simple steps.
evaluation of projects, assuming that the other items on
the contribution of zero pollution under the premise References
made. Therefore, the choice of evaluation projects, as
far as possible to select those that cause serious [1] Zhang Jie editor-in-chief. Environmental Engineering
pollution of local water targets, otherwise it will cause Manual [M]. Water Pollution Prevention Vol. Higher
the results do not accurately evaluate the problem, such Education Press, 1996.27 - 50.
as ammonia and potassium permanganate should be [2] Ping Deyi, such as the Expo floor. Die Xu mathematical
considered the serious pollution of water quality index. methods and application of [M]. Seismic Press, 1983.55 -58.
Because of the law itself closer to the characteristics [3] WANG Pei Chuang. Flail-set theory and its applications
of those of lesser pollution can not participate in the [M]. Shanghai Science and Technology Press, 1983.91- 93.
evaluation of the project, the first little effect on the [4] Mr Nanhu. Conservation and rational exploitation of
results of the evaluation, the evaluation of the project is water resources in response [J], water purification
to reduce the savings related to data processing. In the technology, 2002.21 (3).
formula H value was only less than or equal to the [5] Hunan Provincial Environmental Quality Report 2001 ~
mathematical definition of an established in the 2005 [M], Hunan Provincial Environmental Protection
Bureau, 2006.3.
868
2008 International Conference on Intelligent Computation Technology and Automation
Shijing Wu, Enyong Zhu, Ming Qin, Hui Ren, Zhipeng Lei
School of Power and Mechanical Engineering, Wuhan University
wsj @whu.edu.cn
870
lateral acceleration a y and current steering angle of
front wheel δf . The output linguistic variable is
steering angle of rear wheel δ r . It should be pointed
out that in the course of vehicle moving will be
impacted inevitably by external factors such as
crosswind. So in order to overcome the impact of
(b) Curves of yaw rate changing with time external factors, lateral acceleration is taken as one of
Figure 2 Responses of the system the control variables. In the process of actual control,
Compared two pairs of curve shown in figure 2, it is lateral acceleration will be measured using sensors. It
easy to find that the error between output of neural is obtained by computing here. First, it is assumed that
network model and the one of nonlinear mathematics the crosswind acts on the wind pressure center, and the
model is very small. Therefore, this fact proves that the crosswind’s heading is always perpendicular to the
identification method proposed in this paper is vertical plane of symmetry of the vehicle, then the
reasonable and effective. lateral force caused by crosswind can be expressed as:
Fy = ρV f 2 ACy / 2 (5)
3 Design of fuzzy neural network control
Where Fy is force caused by crosswind, ρ is air
system
density, V f wind speed, A is lateral area which vehicle
The main purpose of 4WS controller is to control projects on its axis of bank, C y is lateral force
the steering angle of rear wheel to make the absolute coefficient. Then lateral acceleration can be figured out
value of side slip angle of vehicle be close to zero as by the following formula.
possible. However, the core issues of fuzzy controller- Y f + Yr − Fy
"automatic extraction of fuzzy rules "and" automatic ay = (6)
generation of fuzzy membership functions" are two
m
major puzzle of fuzzy logic control. In this paper, the Steering angle of front wheel δ f and lateral
genetic fuzzy neural network is a control technology, acceleration a y are conveyed in five grades: NB
in which, by introducing the neural network into fuzzy
system as a computing tool, and neural network (negative big), NS(negative small), Z(zero), PS
generates reasonable fuzzy rules through learning, and (positive small), PB(positive big). The speed of vehicle
membership functions of fuzzy system will be is divided to three grades: L(low), M(middle), H(high).
optimized by genetic algorithm to make controller Gaussian is adopted as fuzzy membership function. Its
achieve the best control performance. mathematical expression is as following:
( x − ck )2
−
3.1 Design of fuzzy neural network controller 2σ k 2 (7)
μk ( x ) = e
To ensure the continuity of the network output
surface, this paper adopted a band T-S fuzzy neural Where ck is position parameter of the fuzzy
network model. The fuzzy neural network model is membership function, σ k is its shape parameter and
composed 5-layer. Xi, Y are inputting and outputting
linguistic variables respectively. It integrates the basic the subscript k represents each fuzzy variable.
elements and functions of traditional fuzzy control The signal propagation and the basic function in
(such as membership function, fuzzy control rules, each layer are as follows.
fuzzification, defuzzification, etc.) into a neural Layer 1: input layer
network structure. In order to make the side slip angle y i1 = xi1 (8)
and yaw rate be smallest, objective function is Layer 2: fuzzification layer
introduced, shown as the formula (4). (u i2 − mij )
1 f = M xji ( mij , σ ij ) = − j = 1, " , n (9)
J = ( ρ1β 2 + ρ2γ 2 ) (4) σ ij2
2
Where ρ1 , ρ 2 are weight coefficient. In this x 2j = w 2ji y i1 (10)
871
xi3 = ∏ w 3ji y 2j (12)
(2) Input the representative data of the fuzzy neural
j network controller each chromosome represents, and
get the output results of controllers. The fitness
yi3 = xi3 (13) function is shown as formula (18). Evaluate the fitness-
Layer 4: defuzzification layer value of each output.
x k4 = ∑ wik4 y i3 n
J = ∑ ( yi − yid )
2
(14) (18)
k
i =1
y = min(1, x )
4
k
4
k (15)
Where yi is reference output; yi d is output of
Layer 5: output layer
controller.
x5 = ∑ (ckσ k ) yk4 (16) (3) Select those offspring individuals with a less
k
fitness-value for the next generation. In this paper,
x5 Roulette wheel is adopted.
y5 =
∑σ
k
k y k4 (17) (4) Generate a new generation through crossover
and mutation. The mutation rate is 0.001.
k
Where xi and y ik are the input and output of the (5) Evaluate the fitness-value of the new generation,
then go back to step (2), until certain criteria (such as a
i th node in layer k , respectively. wijk is the link fixed number of generations, or a time limit) or the
weight between the i th node in layer k − 1 and targets is met.
(6) Save optimization results and terminate the total
the j th node in layer k The link weights in each layer
process.
are unity expect that of layer five.
3.2. The optimization of fuzzy neural network 4. Simulation and analysis of results
controller by genetic algorithm
To verify the availability of GA fuzzy neural
The selection of parameters σ k and ck of the network 4WS intelligent control system, a simulation
membership function greatly affects the performance model is built based on MATLAB/Simulink. The
of fuzzy neural network controller. On the premise that entire control system is shown in Figure 3. To reflect
the fuzzy control rules have been determined, the the superiority of genetic GA fuzzy neural network
control effect primarily lies on the membership 4WS control, it is taken for comparative analysis with
function which is required to be able to objectively 2WS control and linear 4WS control.
reflect the actual situation. Researchers often adopt the δf
default membership function shape whose fuzzy state β
NN
is average distribution. When variables’ change is non- v γ
uniform, the reasoning results of this design are δf
obviously not ideal, so the fuzzy state is distributed v FNN δr
non-uniformly based on experience. Nevertheless, ay
because this is an optimization problem with multi-
variable, it is neither inefficient to adjust parameter nor GA
easy to get the best control effect. This paper will use Figure 3 GA fuzzy neural network control system
the genetic algorithm to optimize σ k and ck , so that After the simulation model is established, wind
the fuzzy neural network controller can achieve the speed is set to change as shown in Figure 4 and its
best control performance. heading is along the turning radius toward the center.
According to the above analysis, in the following text The steering angle of front wheel is set to change as the
the controller will be optimized by genetic algorithm. curve shown in Figure 5. Vehicle speed is set for 25
m/s. Then the side slip angle and yaw rate will be
The optimization parameters are σ k and ck , and the obtained, as shown in Figure 6.
number of variables is 26. Considered the actual In the simulation process, with the change of
situation, the basic optimization steps are as follow: steering angle of front wheel, the amplitude of side slip
(1) Select encoding strategy. This paper adopts angle of vehicle controlled by GA fuzzy neural
binary encoding which is the common one. Set that network enlarges, but quickly returns to the stable
each population consists of 40 chromosomes, and then condition that the amplitude is close to zero. The great
the first generation is initialized. fluctuation does not happen to side slip angle and yaw
rate with the sharp fluctuations in wind speed and the
872
sudden change of steering angle of front wheel. So the simulation experiments proved that the control laws to
entire control system is robust. Compared with linear the 4WS designed from fuzzy neural network is more
4WS control law and 2WS control law, the genetic GA effective than that of linear 4WS control law and 2WS
fuzzy neural network controller designed in this paper control law. GA fuzzy neural network control system
can significantly reduce the amplitude of side slip can significantly reduce the amplitude of side slip
angle and yaw rate. angle and yaw rate and has more strong robust. So
vehicles adopting this control system will be more
smooth, flexible and safer.
References
873
2008 International Conference on Intelligent Computation Technology and Automation
875
Fig.6 Simulation output curve of regional economic
Fig.3 trained membership function of the regional evaluation system based on neural fuzzy control
competitiveness core element
876
intelligence of the scheme; it can be applied to other
Economics and Management fields’ applications for improved
performance. In addition, this scheme has the potential to
overcome problems with the existing stock or future analysis
systems.
References
877
2008 International Conference on Intelligent Computation Technology and Automation