66 research outputs found
An Adaptive Fuzzy Sliding Mode Control Design for a Class of Uncertain Horizontal Platform Systems
This paper presents an adaptive fuzzy sliding mode control design for a class of uncertain horizontal platform systems (HPSs). Firstly, a nonsingular terminal sliding surface is proposed for HPSs. Then, a fuzzy logic system is introduced to estimate the system uncertainties. The adaptive fuzzy sliding mode controller can guarantee the stability of the closed-loop system. The corresponding numerical simulations are demonstrated to verify the effectiveness of the proposed method
Time-Delay Systems
Time delay is very often encountered in various technical systems, such as electric, pneumatic and hydraulic networks, chemical processes, long transmission lines, robotics, etc. The existence of pure time lag, regardless if it is present in the control or/and the state, may cause undesirable system transient response, or even instability. Consequently, the problem of controllability, observability, robustness, optimization, adaptive control, pole placement and particularly stability and robustness stabilization for this class of systems, has been one of the main interests for many scientists and researchers during the last five decades
DII-Based Linear Feedback Control Design for Practical Synchronization of Chaotic Systems with Uncertain Input Nonlinearity and Application to Secure Communication
The concept of practical synchronization is introduced and the chaos synchronization of master-slave chaotic systems with uncertain input nonlinearities is investigated. Based on the differential and integral inequalities (DII) approach, a simple linear control is proposed to realize practical synchronization for master-slave chaotic systems with uncertain input nonlinearities. Besides, the guaranteed exponential convergence rate can be prespecified. Applications of proposed master-slave chaotic synchronization technique to secure communication as well as several numerical simulations are given to demonstrate the feasibility and effectiveness of the obtained result
Dynamical Systems
Complex systems are pervasive in many areas of science integrated in our daily lives. Examples include financial markets, highway transportation networks, telecommunication networks, world and country economies, social networks, immunological systems, living organisms, computational systems and electrical and mechanical structures. Complex systems are often composed of a large number of interconnected and interacting entities, exhibiting much richer global scale dynamics than the properties and behavior of individual entities. Complex systems are studied in many areas of natural sciences, social sciences, engineering and mathematical sciences. This special issue therefore intends to contribute towards the dissemination of the multifaceted concepts in accepted use by the scientific community. We hope readers enjoy this pertinent selection of papers which represents relevant examples of the state of the art in present day research. [...
Design and Implementation of Secure Chaotic Communication Systems
Chaotic systems have properties such as ergodicity, sensitivity to initial conditions/parameter mismatches, mixing property, deterministic dynamics, structure complexity, to mention a few, that map nicely with cryptographic requirements such as confusion, diffusion, deterministic pseudorandomness, algorithm complexity. Furthermore, the possibility of chaotic synchronization, where the master system (transmitter) is driving the slave system (receiver) by its output signal, made it probable for the possible utilization of chaotic systems to implement security in the communication systems. Many methods like chaotic masking, chaotic modulation, inclusion, chaotic shift keying (CSK) had been proposed however, many attack methods later showed them to be insecure. Different modifications of these methods also exist in the literature to improve the security, but almost all suffer from the same drawback. Therefore, the implementation of chaotic systems in security still remains a challenge. In this work, different possibilities on how it might be possible to improve the security of the existing methods are explored. The main problem with the existing methods is that the message imprint could be found in the dynamics of the transmitted signal, therefore by some signal processing or pattern classification techniques, etc, allow the exposition of the hidden message. Therefore, the challenge is to remove any pattern or change in dynamics that the message might bring in the transmitted signal
Modelling, Monitoring, Control and Optimization for Complex Industrial Processes
This reprint includes 22 research papers and an editorial, collected from the Special Issue "Modelling, Monitoring, Control and Optimization for Complex Industrial Processes", highlighting recent research advances and emerging research directions in complex industrial processes. This reprint aims to promote the research field and benefit the readers from both academic communities and industrial sectors
Benelux meeting on systems and control, 23rd, March 17-19, 2004, Helvoirt, The Netherlands
Book of abstract
Computational intelligence approaches to robotics, automation, and control [Volume guest editors]
No abstract available
Design and implementation of secure chaotic communication systems
Chaotic systems have properties such as ergodicity, sensitivity to initial conditions/parameter mismatches, mixing property, deterministic dynamics, structure complexity, to mention a few, that map nicely with cryptographic requirements such as confusion, diffusion, deterministic pseudorandomness, algorithm complexity. Furthermore, the possibility of chaotic synchronization, where the master system (transmitter) is driving the slave system (receiver) by its output signal, made it probable for the possible utilization of chaotic systems to implement security in the communication systems. Many methods like chaotic masking, chaotic modulation, inclusion, chaotic shift keying (CSK) had been proposed however, many attack methods later showed them to be insecure. Different modifications of these methods also exist in the literature to improve the security, but almost all suffer from the same drawback. Therefore, the implementation of chaotic systems in security still remains a challenge. In this work, different possibilities on how it might be possible to improve the security of the existing methods are explored. The main problem with the existing methods is that the message imprint could be found in the dynamics of the transmitted signal, therefore by some signal processing or pattern classification techniques, etc, allow the exposition of the hidden message. Therefore, the challenge is to remove any pattern or change in dynamics that the message might bring in the transmitted signal.EThOS - Electronic Theses Online ServiceGBUnited Kingdo
- …