Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777779
T. Khanzada, A. Ali, A. Omar
This paper presents the utilization of super resolution algorithms for the indoor positioning applications in order to estimate Time difference of Arrival (TDOA) and distances using OFDM transceiver. Optimal reduction in Distance Measurement Error (DME) is achieved. We have utilized OFDM/SC-DFE signal structure presented in our previous works. Three super resolution algorithms i.e. Estimation of Signal Parameters via Rotational Invariance Technique (ESPRIT), Root-Multiple Signal Classification (RootMUSIC) and Matrix Pencil (MP) are being compared for DME estimation. We have applied Minimum Descriptive Length (MDL) criteria to these algorithms, that provides optimize estimate of the length of actual CIR by eliminating the noise component from the dispersive CIR. Our scheme is based on two different antennas used to transmit the pre-half-zero-carriers and post-half-zero-carriers OFDM symbols respectively, mapped to multiple carriers using Wireless Local Area Network (WLAN) system and received by a single to be positioned object. An analysis of DME estimation is presented for varying Signal to Noise Ratio (SNR). DME reduction approaching to zero is achieved by the MP algorithm using our scheme.
{"title":"Time Difference of Arrival estimation using super resolution algorithms to minimize Distance Measurement Error for indoor positioning systems","authors":"T. Khanzada, A. Ali, A. Omar","doi":"10.1109/INMIC.2008.4777779","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777779","url":null,"abstract":"This paper presents the utilization of super resolution algorithms for the indoor positioning applications in order to estimate Time difference of Arrival (TDOA) and distances using OFDM transceiver. Optimal reduction in Distance Measurement Error (DME) is achieved. We have utilized OFDM/SC-DFE signal structure presented in our previous works. Three super resolution algorithms i.e. Estimation of Signal Parameters via Rotational Invariance Technique (ESPRIT), Root-Multiple Signal Classification (RootMUSIC) and Matrix Pencil (MP) are being compared for DME estimation. We have applied Minimum Descriptive Length (MDL) criteria to these algorithms, that provides optimize estimate of the length of actual CIR by eliminating the noise component from the dispersive CIR. Our scheme is based on two different antennas used to transmit the pre-half-zero-carriers and post-half-zero-carriers OFDM symbols respectively, mapped to multiple carriers using Wireless Local Area Network (WLAN) system and received by a single to be positioned object. An analysis of DME estimation is presented for varying Signal to Noise Ratio (SNR). DME reduction approaching to zero is achieved by the MP algorithm using our scheme.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114762174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777722
Muhammed Khalid Anis, Muhammad Khurram Khan, S. J. H. Zaidi, A. Mansoor, Zohaib Khan, Adil Khan, Shoab A. Khan
This paper presents a novel algorithm based on fuzzy morphology for the computer-assisted enhancement of exudates in fundus images of human retina for the diagnosis of diabetic retinopathy. Diabetic retinopathy is a common disease in diabetic persons. The disease is diagnosed by the presence of exudates in the macular region. Here, we use fuzzy morphology for the enhancement of exudates. The fundus image is first converted to grayscale followed by a series of fuzzy erosion and fuzzy dilation (morphological closing operation) with a diamond shaped structuring element. Finally, the resulting image is added to the original image to transform into enhanced one. Experiments were performed on a database of variety of fundus images with and without the disease. The experiments led to convincing results and the images were enhanced for easier clinical examination.
{"title":"Enhancement of exudates for the diagnosis of diabetic retinopathy using Fuzzy Morphology","authors":"Muhammed Khalid Anis, Muhammad Khurram Khan, S. J. H. Zaidi, A. Mansoor, Zohaib Khan, Adil Khan, Shoab A. Khan","doi":"10.1109/INMIC.2008.4777722","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777722","url":null,"abstract":"This paper presents a novel algorithm based on fuzzy morphology for the computer-assisted enhancement of exudates in fundus images of human retina for the diagnosis of diabetic retinopathy. Diabetic retinopathy is a common disease in diabetic persons. The disease is diagnosed by the presence of exudates in the macular region. Here, we use fuzzy morphology for the enhancement of exudates. The fundus image is first converted to grayscale followed by a series of fuzzy erosion and fuzzy dilation (morphological closing operation) with a diamond shaped structuring element. Finally, the resulting image is added to the original image to transform into enhanced one. Experiments were performed on a database of variety of fundus images with and without the disease. The experiments led to convincing results and the images were enhanced for easier clinical examination.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125809146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777698
J. Kaur, N. Prakash, S. S. Rajput
A current mirror (CM) is reconfigured based on self cascode (SC) arrangement, useful for low voltage (LV) analog and mixed mode circuits. The CM uses 4 MOSFETs, has high input and output swing, operating at plusmn0.5 V supply. Further, a novel CMOS CCII has been revisited and implemented using this CM for sourcing the mirrored current into a high impedance output node. P-spice simulations confirm the performance of CM and CCII. The CCII has voltage transfer bandwidth of 76 MHz and a current transfer bandwidth of 77 MHz respectively.
{"title":"Low voltage high performance self cascode CCII","authors":"J. Kaur, N. Prakash, S. S. Rajput","doi":"10.1109/INMIC.2008.4777698","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777698","url":null,"abstract":"A current mirror (CM) is reconfigured based on self cascode (SC) arrangement, useful for low voltage (LV) analog and mixed mode circuits. The CM uses 4 MOSFETs, has high input and output swing, operating at plusmn0.5 V supply. Further, a novel CMOS CCII has been revisited and implemented using this CM for sourcing the mirrored current into a high impedance output node. P-spice simulations confirm the performance of CM and CCII. The CCII has voltage transfer bandwidth of 76 MHz and a current transfer bandwidth of 77 MHz respectively.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123699783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777742
F. Leghari, J. Ahmad, Mmh Sarker, M. Hoque, K. K. Islam
South Asian countries are full of rivers, and big/small boat is an important vehicle for communication in many places. It is an unavoidable issue to rescue the people when they fall on danger for any natural and/or man-made cause. Water vehicle shows better efficacy instead of air vehicle for developing countries. Therefore, the basic principles and methods towards an automated rescue system is outlined. The architectures of distributed system along with math-logics are presented. Electronic devices/components used for data is discussed. Performance of the present system is analyzed and presented.
{"title":"Towards a model of a multi- mobile robot system","authors":"F. Leghari, J. Ahmad, Mmh Sarker, M. Hoque, K. K. Islam","doi":"10.1109/INMIC.2008.4777742","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777742","url":null,"abstract":"South Asian countries are full of rivers, and big/small boat is an important vehicle for communication in many places. It is an unavoidable issue to rescue the people when they fall on danger for any natural and/or man-made cause. Water vehicle shows better efficacy instead of air vehicle for developing countries. Therefore, the basic principles and methods towards an automated rescue system is outlined. The architectures of distributed system along with math-logics are presented. Electronic devices/components used for data is discussed. Performance of the present system is analyzed and presented.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123242484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777752
S. Kamal
The determination of an orbit, having a specified transfer time (time-of-flight) and connecting two position vectors, frequently referred to as the Lambert problem, is fundamental in astrodynamics. Of the many techniques existing for solving this two-body, two-point, time-constrained orbital boundary-value problem, Gauss' and Lagrange's methods were combined to obtain an elegant algorithm based on Battin's work. This algorithm included detection of cross-range error. A variable TYPE, introduced in the transfer-time equation, was flipped, to generate the inverse-Lambert scheme. In this paper, an innovative adaptive scheme is presented, which is called ldquothe multi-stage-Lambert schemerdquo. This scheme proposes a design of autopilot, which achieves the predecided destination position and velocity vectors for a multi-stage rocket, when each stage is detached from the main vehicle after it burns out, completely.
{"title":"The Multi-Stage-Lambert Scheme for steering a satellite-launch vehicle (SLV)","authors":"S. Kamal","doi":"10.1109/INMIC.2008.4777752","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777752","url":null,"abstract":"The determination of an orbit, having a specified transfer time (time-of-flight) and connecting two position vectors, frequently referred to as the Lambert problem, is fundamental in astrodynamics. Of the many techniques existing for solving this two-body, two-point, time-constrained orbital boundary-value problem, Gauss' and Lagrange's methods were combined to obtain an elegant algorithm based on Battin's work. This algorithm included detection of cross-range error. A variable TYPE, introduced in the transfer-time equation, was flipped, to generate the inverse-Lambert scheme. In this paper, an innovative adaptive scheme is presented, which is called ldquothe multi-stage-Lambert schemerdquo. This scheme proposes a design of autopilot, which achieves the predecided destination position and velocity vectors for a multi-stage rocket, when each stage is detached from the main vehicle after it burns out, completely.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"179 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120888213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777757
M.O. Farooq, S. Aziz
In this paper we propose QoS based distributed multipath routing algorithm for IPv6 (QoS-MPR). The algorithm is able to work alongside traditional routing algorithms and it can construct label switched paths in order to provide rigorous QoS guarantees. QoS-MPR is developed to work with differentiated services architecture and its capability to establish label switched paths allows us to inject more QoS sensitive traffic into the network hence, network utilization increases as shown in the simulation results. Our simulation results show that QoS-MPR provides splendid packet delivery ratio, it utilizes resources present on multiple paths to the destination, network utilization increases as a function of number of paths exits to a network, QoS flows established using QoSMPR experience less delay and each admitted flow shows compliance with its service level agreement (SLA).
{"title":"QoS based Distributed Multipath Routing Algorithm for IPv6","authors":"M.O. Farooq, S. Aziz","doi":"10.1109/INMIC.2008.4777757","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777757","url":null,"abstract":"In this paper we propose QoS based distributed multipath routing algorithm for IPv6 (QoS-MPR). The algorithm is able to work alongside traditional routing algorithms and it can construct label switched paths in order to provide rigorous QoS guarantees. QoS-MPR is developed to work with differentiated services architecture and its capability to establish label switched paths allows us to inject more QoS sensitive traffic into the network hence, network utilization increases as shown in the simulation results. Our simulation results show that QoS-MPR provides splendid packet delivery ratio, it utilizes resources present on multiple paths to the destination, network utilization increases as a function of number of paths exits to a network, QoS flows established using QoSMPR experience less delay and each admitted flow shows compliance with its service level agreement (SLA).","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130323725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777769
A. Us Saeed, M. Afzal, A. Latif, K. Tochtermann
New developments in the collaborative and participatory role of Web has emerged new web based fast lane information systems like tagging and bookmarking applications. Same authors have shown elsewhere, that for same papers tags and bookmarks appear and gain volume very quickly in time as compared to citations and also hold good correlation with the citations. Studying the rank prediction models based on these systems gives advantage of gaining quick insight and localizing the highly productive and diffusible knowledge very early in time. This shows that it may be interesting to model the citation rank of a paper within the scope of a conference or journal issue, based on the bookmark counts (i-e count representing how many researchers have shown interest in a publication.) We used linear regression model for predicting citation ranks and compared both predicted citation rank models of bookmark counts and coauthor network counts for the papers of WWW06 conference. The results show that the rank prediction model based on bookmark counts is far better than the one based on coauthor network with mean absolute error for the first limited to the range of 5 and mean absolute error for second model above 18. Along with this we also compared the two bookmark prediction models out of which one was based on total citations rank as a dependent variable and the other was based on the adjusted citation rank. The citation rank was adjusted after subtracting the self and coauthor citations from total citations. The comparison reveals a significant improvement in the model and correlation after adjusting the citation rank. This may be interpreted that the bookmarking mechanisms represents the phenomenon similar to global discovery of a publication. While in the coauthor nets the papers are communicated personally and this communication or selection may not be captured within the bookmarking systems.
{"title":"Citation rank prediction based on bookmark counts: Exploratory case study of WWW06 papers","authors":"A. Us Saeed, M. Afzal, A. Latif, K. Tochtermann","doi":"10.1109/INMIC.2008.4777769","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777769","url":null,"abstract":"New developments in the collaborative and participatory role of Web has emerged new web based fast lane information systems like tagging and bookmarking applications. Same authors have shown elsewhere, that for same papers tags and bookmarks appear and gain volume very quickly in time as compared to citations and also hold good correlation with the citations. Studying the rank prediction models based on these systems gives advantage of gaining quick insight and localizing the highly productive and diffusible knowledge very early in time. This shows that it may be interesting to model the citation rank of a paper within the scope of a conference or journal issue, based on the bookmark counts (i-e count representing how many researchers have shown interest in a publication.) We used linear regression model for predicting citation ranks and compared both predicted citation rank models of bookmark counts and coauthor network counts for the papers of WWW06 conference. The results show that the rank prediction model based on bookmark counts is far better than the one based on coauthor network with mean absolute error for the first limited to the range of 5 and mean absolute error for second model above 18. Along with this we also compared the two bookmark prediction models out of which one was based on total citations rank as a dependent variable and the other was based on the adjusted citation rank. The citation rank was adjusted after subtracting the self and coauthor citations from total citations. The comparison reveals a significant improvement in the model and correlation after adjusting the citation rank. This may be interpreted that the bookmarking mechanisms represents the phenomenon similar to global discovery of a publication. While in the coauthor nets the papers are communicated personally and this communication or selection may not be captured within the bookmarking systems.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129677582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777762
W. Afzal, R. Torkar, R. Feldt
Software reliability growth modeling helps in deciding project release time and managing project resources. A large number of such models have been presented in the past. Due to the existence of many models, the models' inherent complexity, and their accompanying assumptions; the selection of suitable models becomes a challenging task. This paper presents empirical results of using genetic programming (GP) for modeling software reliability growth based on weekly fault count data of three different industrial projects. The goodness of fit (adaptability) and predictive accuracy of the evolved model is measured using five different measures in an attempt to present a fair evaluation. The results show that the GP evolved model has statistically significant goodness of fit and predictive accuracy.
{"title":"prediction of fault count data using genetic programming","authors":"W. Afzal, R. Torkar, R. Feldt","doi":"10.1109/INMIC.2008.4777762","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777762","url":null,"abstract":"Software reliability growth modeling helps in deciding project release time and managing project resources. A large number of such models have been presented in the past. Due to the existence of many models, the models' inherent complexity, and their accompanying assumptions; the selection of suitable models becomes a challenging task. This paper presents empirical results of using genetic programming (GP) for modeling software reliability growth based on weekly fault count data of three different industrial projects. The goodness of fit (adaptability) and predictive accuracy of the evolved model is measured using five different measures in an attempt to present a fair evaluation. The results show that the GP evolved model has statistically significant goodness of fit and predictive accuracy.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132757691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777733
M. J. Chaudhry, S. Murawwat, F. Saleemi, S. Tariq, M. Saleemi, F. J. Chaudhry
Bluetooth is one of the emerging technologies, which is capable of providing many services such as High data throughput, Adhoc networks, providing an excellent data transmission medium and many more other services and applications. To provide all these features and services power consumption is quite high in comparison with other mobile devices. Like keeping the device size small will result in less operation tine of device or degraded the throughput, so there is a strong need for a power optimized algorithm which keeps the data throughput higher using minimum power consumption. As Bluetooth defines a uniform structure for huge range of devices to communicate and transfer data with each other, with minimum user efforts, Bluetooth also offers wireless access to LANs, the mobile phone network and the internet for a host of many home appliances and portable handheld devices. As Bluetooth has to provide many services security issues have to satisfied like Bluetooth devices are part of peoples personal usage and will communicate and transfer their very personal information, confidential business information or other sensitive data. This must be protected from being spoofed or mutilated. Encryption facility is very excellent solution for security vulnerabilities occurs in Bluetooth communication. This paper presents the detailed comparison study of old and current algorithms and techniques used for power optimization and security issues in Bluetooth communication and an appropriate solution will be presented particularly for two major issues of Bluetooth power consumption, security and other issues related to both of them finally, an efficient scheme which will positively enable us to provide all the desired services and application but in an economical and secure way with respect to power consumption and security vulnerabilities. Furthermore, this research also presents the discussion of how proposed scheme can be implemented in a straight-forward fashion.
{"title":"Power optimized secure Bluetooth communication","authors":"M. J. Chaudhry, S. Murawwat, F. Saleemi, S. Tariq, M. Saleemi, F. J. Chaudhry","doi":"10.1109/INMIC.2008.4777733","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777733","url":null,"abstract":"Bluetooth is one of the emerging technologies, which is capable of providing many services such as High data throughput, Adhoc networks, providing an excellent data transmission medium and many more other services and applications. To provide all these features and services power consumption is quite high in comparison with other mobile devices. Like keeping the device size small will result in less operation tine of device or degraded the throughput, so there is a strong need for a power optimized algorithm which keeps the data throughput higher using minimum power consumption. As Bluetooth defines a uniform structure for huge range of devices to communicate and transfer data with each other, with minimum user efforts, Bluetooth also offers wireless access to LANs, the mobile phone network and the internet for a host of many home appliances and portable handheld devices. As Bluetooth has to provide many services security issues have to satisfied like Bluetooth devices are part of peoples personal usage and will communicate and transfer their very personal information, confidential business information or other sensitive data. This must be protected from being spoofed or mutilated. Encryption facility is very excellent solution for security vulnerabilities occurs in Bluetooth communication. This paper presents the detailed comparison study of old and current algorithms and techniques used for power optimization and security issues in Bluetooth communication and an appropriate solution will be presented particularly for two major issues of Bluetooth power consumption, security and other issues related to both of them finally, an efficient scheme which will positively enable us to provide all the desired services and application but in an economical and secure way with respect to power consumption and security vulnerabilities. Furthermore, this research also presents the discussion of how proposed scheme can be implemented in a straight-forward fashion.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114602076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777788
A. Ali, W. Qing
The challenging task of designing an auto pilot for non linear time varying flexible flight vehicle system under conflicting design requirements requires a gain scheduled controller throughout the flight. But still the final solution is bound to end up in some compromises with proper gain scheduling. The switching from one gain to another gain value creates disturbances in the flight and therefore this transition of gains must be smoothened. This is achieved by introducing an adaptive pid controller based on neural network as a supplementary to the main controller.
{"title":"Smoothing the response of a gain scheduled autopilot for flexible flight vehicle by online tuning based on neural networks","authors":"A. Ali, W. Qing","doi":"10.1109/INMIC.2008.4777788","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777788","url":null,"abstract":"The challenging task of designing an auto pilot for non linear time varying flexible flight vehicle system under conflicting design requirements requires a gain scheduled controller throughout the flight. But still the final solution is bound to end up in some compromises with proper gain scheduling. The switching from one gain to another gain value creates disturbances in the flight and therefore this transition of gains must be smoothened. This is achieved by introducing an adaptive pid controller based on neural network as a supplementary to the main controller.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133766484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}