کتابخانه مرکزی دانشگاه صنعتی شریف
    • [نمايش بزرگتر]
    • [نمايش کوچکتر]
  • صفحه 
     از  0
  • [صفحه قبل]
  • [صفحه بعد]
  • [نمایش تمام صفحه]
  • [بستن]
 
A bridge technique for memristor state programming
Tarkhan, M.

اطلاعات کتابشناختی

A bridge technique for memristor state programming
Author :   Tarkhan, M.
Publisher :   Taylor and Francis Ltd,
Pub. Year  :   2020
Subjects :   Memristor programmer. Memristor state programming. Memristor tuning. Bridge circuits. ...
Call Number :  

جستجو در محتوا

ترتيب

فهرست مطالب

  • Cover (1)
  • Advances in Industrial Control (3)
  • Internet-based Control Systems (4)
  • ISBN 9781849963589 (5)
  • Advances in Industrial Control (8)
    • Series Editors’ Foreword (10)
  • Preface (12)
  • Acknowledgements (14)
  • Contents (16)
  • Chapter 1: Introduction (22)
    • 1.1 Networked Control Systems (NCS) (22)
    • 1.2 Internet-based Control Systems (ICS) (23)
    • 1.3 Challenges of NCS/ICS (24)
    • 1.4 Aims of the Book (25)
    • References (26)
  • Chapter 2: Requirements Specification for Internet-based Control Systems (28)
    • 2.1 Introduction (28)
    • 2.2 Requirements Specification (28)
    • 2.3 Functional Modelling of Internet-based Control Systems (30)
    • 2.4 Information Hierarchy (33)
    • 2.5 Possible Implementation of Information Architecture (35)
    • 2.6 Summary (36)
    • References (37)
  • Chapter 3: Internet-based Control System Architecture Design (38)
    • 3.1 Introduction (38)
    • 3.2 Traditional Bilateral Tele-operation Systems (38)
    • 3.3 Remote Control over the Internet (42)
    • 3.4 Canonical Internet-based Control System Structures (45)
    • 3.5 Summary (47)
    • References (47)
  • Chapter 4: Web-based User Interface Design (50)
    • 4.1 Features of Web-based User Interface (50)
    • 4.2 Multimedia User Interface Design (50)
    • 4.3 Case Study (52)
      • 4.3.1 System Architecture (52)
      • 4.3.2 Design Principles (54)
      • 4.3.3 Implementation (55)
    • 4.4 Summary (56)
    • References (56)
  • Chapter 5: Real-time Data Transfer over the Internet (58)
    • 5.1 Real-time Data Processing (58)
      • 5.1.1 Features of Real-time Data Transfer (59)
      • 5.1.2 Light and Heavy Data (59)
    • 5.2 Data Wrapped with XML (61)
      • 5.2.1 Structure Mapping (61)
      • 5.2.2 Data Mapping (63)
    • 5.3 Real-time Data Transfer Mechanism (63)
      • 5.3.1 RMI-based Data Transfer Structure (63)
      • 5.3.2 Data Object Priority (65)
    • 5.4 Case Study (66)
      • 5.4.1 System Description (66)
      • 5.4.2 Priority of Data Transfer (68)
      • 5.4.3 Implementation (68)
      • 5.4.4 Simulation Results and Analysis (69)
      • 5.4.5 Advantages of RMI-based Data Transfer (71)
    • 5.5 Summary (72)
    • References (73)
  • Chapter 6 : Dealing with Internet Transmission Delay and Data Loss from the Network View (74)
    • 6.1 Requirements of Network Infrastructure for Internet-based Control (74)
      • 6.1.1 Six Requirements for Ideal Network Infrastructure for Internet-based Control (74)
    • 6.2 Features of Internet Communication (75)
    • 6.3 Comparison of TCP and UDP (76)
    • 6.4 Network Infrastructure for Internet-based Control (77)
      • 6.4.1 Real-time Control Protocol (78)
        • 6.4.1.1 Reliable Transmission (79)
        • 6.4.1.2 Real-time Transmission (79)
      • 6.4.2 Quality Service Provider and Time Synchronization (80)
    • 6.5 Typical Implementation for Internet-based Control (81)
      • 6.5.1 Experimental Set-up (81)
      • 6.5.2 Implementation (83)
    • 6.6 Summary (85)
    • References (86)
  • Chapter 7: Dealing with Internet Transmission Delay and Data Loss from the Control Perspective (88)
    • 7.1 Overcoming the Internet Transmission Delay (88)
    • 7.2 Control Structure with the Operator Located Remotely (89)
    • 7.3 Internet-based Control with a Variable Sampling Time (90)
    • 7.4 Multi-rate Control (92)
      • 7.4.1 Two-level Hierarchy in Process Control (92)
      • 7.4.2 Multi-rate Control (93)
    • 7.5 Time Delay Compensator Design (94)
      • 7.5.1 Compensation at the Feedback Channel (97)
      • 7.5.2 Compensation at the Feed-forward Channel (98)
    • 7.6 Simulation Studies (99)
      • 7.6.1 Simulation of Multi-rate Control Scheme (99)
      • 7.6.2 Simulation of Time Delay Compensation with a Variable Sampling Time (100)
        • 7.6.2.1 Simulation Design (100)
        • 7.6.2.2 Simulation Results (102)
    • 7.7 Experimental Studies (106)
      • 7.7.1 Virtual Supervision Parameter Control (106)
        • 7.7.1.1 Hardware Structure (107)
        • 7.7.1.2 Software Structure (108)
        • 7.7.1.3 System Implementation (109)
      • 7.7.2 Dual-rate Control with Time Delay Compensation (112)
        • 7.7.2.1 System Architecture (112)
        • 7.7.2.2 Experimental Results and Analysis (113)
    • 7.8 Summary (116)
    • References (117)
  • Chapter 8: Design of Multi-rate SISO Internet-based Control Systems (120)
    • 8.1 Introduction (120)
    • 8.2 Discrete-time Multi-rate Control Scheme (121)
    • 8.3 Design Method (122)
    • 8.4 Stability Analysis (125)
    • 8.5 Simulation Studies (126)
    • 8.6 Real-time Implementation (128)
    • 8.7 Summary (131)
    • References (132)
  • Chapter 9: Design of Multi-rate MIMO Internet-based Control Systems (134)
    • 9.1 Introduction (134)
    • 9.2 System Modeling (135)
      • 9.2.1 State Feedback Control (135)
      • 9.2.2 Output Feedback Control (136)
    • 9.3 Controller Design (137)
    • 9.4 Stability Analysis (139)
    • 9.5 Design Procedure (142)
    • 9.6 Model-based Time Delay Compensation (142)
      • 9.6.1 Compensation of the Transmission Delay at the Feedback Channel (144)
      • 9.6.2 Compensation of the Transmission Delay in the Feed-forward Channel (145)
      • 9.6.3 Unified Form of the State Feedback Control of the Remote Controller (146)
    • 9.7 Simulation Study (146)
    • 9.8 Summary (148)
    • References (149)
  • Chapter 10: Safety and Security Checking (152)
    • 10.1 Introduction (152)
    • 10.2 Similarity of Safety and Security (153)
    • 10.3 Framework of Security Checking (153)
      • 10.3.1 Framework of Stopping Possible Malicious Attack (153)
      • 10.3.2 Framework-based What-If Security Checking (155)
    • 10.4 Control Command Transmission Security (157)
      • 10.4.1 Hybrid Algorithm (157)
      • 10.4.2 Experimental Study (159)
    • 10.5 Safety Checking (160)
    • 10.6 Case Study (162)
      • 10.6.1 Ensuring Security (163)
      • 10.6.2 Safety Checking (163)
    • 10.7 Summary (165)
    • References (165)
  • Chapter 11: Remote Control Performance Monitoring and Maintenance over the Internet (168)
    • 11.1 Introduction (168)
    • 11.2 Performance Monitoring (169)
      • 11.2.1 Acquisition and Storage of Data (170)
      • 11.2.2 Data Analysis and Performance Identification (170)
      • 11.2.3 Categories of Performance Monitoring (171)
    • 11.3 Performance Monitoring of Control Systems (172)
      • 11.3.1 General Guidelines of Control Performance Monitoring (172)
      • 11.3.2 Control Performance Index and General Likelihood Test (173)
        • 11.3.2.1 Control Performance Index (173)
        • 11.3.2.2 General Likelihood Test (174)
        • 11.3.2.3 Structure for Controller Fault Detection (175)
      • 11.3.3 Performance Compensator Design (176)
    • 11.4 Remote Control Performance Maintenance (177)
      • 11.4.1 Architecture of Remote Maintenance (177)
      • 11.4.2 Implementation of Back-end System (179)
      • 11.4.3 Implementation of Front-end System (180)
        • 11.4.3.1 Compensator Testing (180)
        • 11.4.3.2 Compensator Migration (181)
    • 11.5 Case Study (182)
      • 11.5.1 System Description (182)
      • 11.5.2 Setting up a Fault (183)
      • 11.5.3 Fault Compensation (185)
    • 11.6 Summary (186)
    • References (187)
  • Chapter 12 : Remote Control System Design and Implementation over the Internet (190)
    • 12.1 Introduction (190)
    • 12.2 Real-time Control System Life Cycle (191)
    • 12.3 Integrated Environments (192)
      • 12.3.1 Interaction Between Real World and Virtual World (192)
      • 12.3.2 Available Integrated Frameworks (194)
        • 12.3.2.1 Service-Oriented Architecture (194)
        • 12.3.2.2 Data-Centric Framework (196)
        • 12.3.2.3 Java-based Jini Architecture (197)
      • 12.3.3 Architecture of a General Integrated Environment (198)
    • 12.4 A Typical Implementation of the General Integrated Environment (199)
      • 12.4.1 Design Workbench (201)
        • 12.4.1.1 Running the Workbench in ``Fat´´ and ``Thin´´ Styles (201)
        • 12.4.1.2 Testing a Model and a Controller at the Workbench (203)
      • 12.4.2 Implementing a New Design of a Controller (203)
      • 12.4.3 Collaboration in the Integrated Environment (206)
    • 12.5 Case Study (208)
      • 12.5.1 Workbench for Testing (209)
      • 12.5.2 Testing the Model and the Controller of the Water Tank at the Workbench (209)
      • 12.5.3 Installation of the New Design of Real Controllers (211)
    • 12.6 Summary (213)
    • References (214)
  • Chapter 13: Conclusion (216)
    • 13.1 Summary (216)
    • 13.2 Future Work (217)
    • References (218)
  • Index (220)
Loading...