Loading...
Search for: constraint-theory
0.004 seconds
Total 49 records

    Assisted passive snake-like robots: Conception and dynamic modeling using Gibbs-Appell method

    , Article Robotica ; Volume 26, Issue 3 , 2008 , Pages 267-276 ; 02635747 (ISSN) Vossoughi, G ; Pendar, H ; Heidari, Z ; Mohammadi, S ; Sharif University of Technology
    2008
    Abstract
    In this paper, we present a novel structure of a snake-like robot. This structure enables passive locomotion in snake-like robots. Dynamic equations are obtained for motion in a horizontal plane, using Gibbs-Appell method. Kinematic model of the robot include numerous nonholonomic constraints, which can be omitted at the beginning by choosing proper coordinates to describe the model in Gibbs-Appell framework. In such a case, dynamic equations will be significantly simplified, resulting in considerable reduction of simulation time. Simulation results show that, by proper selection of initial conditions, joint angles operate in a limit cycle and robot can locomote steadily on a passive... 

    Utility constrained energy minimization in aloha networks

    , Article 2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007, Las Vegas, NV, 11 January 2007 through 13 January 2007 ; January , 2007 , Pages 665-669 ; 1424406668 (ISBN); 9781424406661 (ISBN) Khodaian, A ; Hossein Khalaj, B ; Talebi, M. S ; Sharif University of Technology
    2007
    Abstract
    In this paper we consider the issue of energy efficiency in random access networks and show that optimizing transmission probabilities of nodes can enhance network performance in terms of energy consumption and fairness. First, we propose a heuristic power control method that improves throughput, and then we model the Utility Constrained Energy Minimization (UCEM) problem in which the utility constraint takes into account single and multi node performance. UCEM is modeled as a convex optimization problem and Sequential Quadratic Programming (SQP) is used to find optimal transmission probabilities. Numerical results show that our method can achieve fairness, reduce energy consumption and... 

    Formalizing compatibility and substitutability in communication protocols using I/O-constraint automata

    , Article 2nd IPM International Symposium on Fundamentals of Software Engineering, FSEN 2007, Tehran, 17 April 2007 through 19 April 2007 ; Volume 4767 LNCS , 2007 , Pages 49-64 ; 03029743 (ISSN); 9783540756972 (ISBN) Niamanesh, M ; Jalili, R ; Sharif University of Technology
    Springer Verlag  2007
    Abstract
    A communication protocol consists of a sequence of messages used by peer entities to communicate. Each entity in a network is equipped by at least one protocol stack. Due to the need for on-the-fly reconfiguration of protocol stack in future communication and computation devices, formalizing substitutability and compatibility of protocol entities are important in correctness assessment of dynamic reconfiguration. In this paper, we extend Constraint Automata and propose I/O-Constraint Automata to model behavior of protocols and propose enough formalism for substitutability and compatibility relations between protocols. We introduce input-blocking property of communication protocols, and show... 

    Design of an stable GPC for nonminimum phase LTI systems

    , Article Wec 05: Fourth World Enformatika Conference, Istanbul, 24 June 2005 through 26 June 2005 ; Volume 6 , 2005 , Pages 88-91 ; 9759845857 (ISBN); 9789759845858 (ISBN) Yaghobi, M ; Haeri, M ; Sharif University of Technology
    2005
    Abstract
    The current methods of predictive controllers are utilized for those processes in which the rate of output variations is not high. For such processes, therefore, stability can be achieved by implementing the constrained predictive controller or applying infinite prediction horizon. When the rate of the output growth is high (e.g. for unstable nonminimum phase process) the stabilization seems to be problematic. In order to avoid this, it is suggested to change the method in the way that: first, the prediction error growth should be decreased at the early stage of the prediction horizon, and second, the rate of the error variation should be penalized. The growth of the error is decreased... 

    A new stabilizing GPC for nonminimum phase LTI systems using time varying weighting

    , Article Wec 05: Fourth World Enformatika Conference, Istanbul, 24 June 2005 through 26 June 2005 ; Volume 6 , 2005 , Pages 156-158 ; 9759845857 (ISBN); 9789759845858 (ISBN) Yaghobi, M ; Haeri, M ; Sharif University of Technology
    2005
    Abstract
    In this paper, we show that the stability can not be achieved with current stabilizing MPC methods for some unstable processes. Hence we present a new method for stabilizing these processes. The main idea is to use a new time varying weighted cost function for traditional GPC. This stabilizes the closed loop system without adding soft or hard constraint in optimization problem. By studying different examples it is shown that using the proposed method, the closed-loop stability of unstable nonminimum phase process is achieved. COPYRIGHT © ENFORMATIKA  

    An effective approach for dynamic analysis of rovers

    , Article Robotica ; Volume 23, Issue 6 , 2005 , Pages 771-780 ; 02635747 (ISSN) Meghdari, A ; Karimi, R ; Pishkenari, H. N ; Gaskarimahalle, A. L ; Mahboobi, S. H ; Sharif University of Technology
    2005
    Abstract
    In this paper a novel approach to dynamic formulation of rovers has been presented. The complexity of these multi-body systems especially on rough terrain, challenged us to use the Kane's method which has been preferred to others in these cases. As an example, symbolic equations of a six-wheeled rover, named CEDRA Rescue Robot which uses a shrimp like mechanism, have been derived and a simulation of forward and inverse dynamics has been presented. Due to the clear form of equations, each term defines a physical meaning which represents the effect of each parameter, resulting in a frame-work for performance comparison of rovers. Although the method has been described for a 2-D non-slipping... 

    Stability and performance preserving controller order reduction via Youla parameterization and lmis

    , Article 2003 10th IEEE International Conference on Electronics, Circuits and Systems, ICECS2003, Sharjah, 14 December 2003 through 17 December 2003 ; Volume 2 , 2003 , Pages 663-666 ; 0780381637 (ISBN); 9780780381636 (ISBN) Amirgar, R ; Sadati, N ; Sharif University of Technology
    2003
    Abstract
    This paper develops a stability and performance preserving controller order reduction method for linear time-invariant continuous-time single-input, single-output systems. In this method, the error between the complementary sensitivity functions of the nominal closed-loop system and closed-loop system using the reduced-order controller is converted to a frequency-weighted error between the Youla parameters of the full-order and reduced-order controllers and then the H∞norm of this error, subject to a set of linear matrix inequality constraints, is minimized. The main ideas of order reduction and stability preservation are contained in the constraints of the optimization problem. However,... 

    Query-point visibility constrained shortest paths in simple polygons

    , Article Theoretical Computer Science ; Volume 389, Issue 1-2 , 2007 , Pages 1-11 ; 03043975 (ISSN) Khosravi, R ; Ghodsi, M ; Sharif University of Technology
    2007
    Abstract
    In this paper, we study the problem of finding the shortest path between two points inside a simple polygon such that there is at least one point on the path from which a query point is visible. We provide an algorithm which preprocesses the input in O (n2 + n K) time and space and provides logarithmic query time. The input polygon has n vertices and K is a parameter dependent on the input polygon which is O (n2) in the worst case but is much smaller for most polygons. The preprocessing algorithm sweeps an angular interval around every reflex vertex of the polygon to store the optimal contact points between the shortest paths and the windows separating the visibility polygons of the query... 

    Efficient cooperative spectrum sensing in cognitive radio networks

    , Article 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC'07, Athens, 3 September 2007 through 7 September 2007 ; December , 2007 ; 1424411440 (ISBN); 9781424411443 (ISBN) Taherpour, A ; Nasiri Kenari, M ; Jamshidi, A ; Sharif University of Technology
    2007
    Abstract
    Rcent measurements suggest the possibility of sharing spectrum among different parties subject to interference-protection constraints. In order to enable access to an unused licensed spectrum, a secondary user has to monitor licensed bands and opportunistically transmit whenever no primary signal is detected. In this paper, we study spectrum-sharing between a primary licensee and a group of secondary users. The structure of an asymptotically optimum detector based on the measurements of all secondary users is derived and the effect of the quantization error in such a system is evaluated. The results show the superiority of the proposed detector to other schemes. © 2007 IEEE  

    Design and application of industrial machine vision systems

    , Article Robotics and Computer-Integrated Manufacturing ; Volume 23, Issue 6 , December , 2007 , Pages 630-637 ; 07365845 (ISSN) Golnabi, H ; Asadpour, A ; Sharif University of Technology
    2007
    Abstract
    In this paper, the role and importance of the machine vision systems in the industrial applications are described. First understanding of the vision in terms of a universal concept is explained. System design methodology is discussed and a generic machine vision model is reported. Such a machine includes systems and sub-systems, which of course depend on the type of applications and required tasks. In general, expected functions from a vision machine are the exploitation and imposition of the environmental constraint of a scene, the capturing of the images, analysis of those captured images, recognition of certain objects and features within each image, and the initiation of subsequent... 

    Conflict detection and resolution in context-aware authorization

    , Article 21st International Conference on Advanced Information Networking and ApplicationsWorkshops/Symposia, AINAW'07, Niagara Falls, ON, 21 May 2007 through 23 May 2007 ; Volume 2 , 2007 , Pages 505-511 ; 0769528473 (ISBN); 9780769528472 (ISBN) Masoumzadeh, A ; Amini, M ; Jalili, R ; IEEE Technical Committee Distributed Processing (TCDP); Nokia ; Sharif University of Technology
    2007
    Abstract
    Pervasive computing environments introduce new requirements in expressiveness and flexibility of access control policies which are almost addressable leveraging contextual information. Although context-awareness augments the expressiveness of policies, it increases the probability of arising conflicts. Generally, context-aware authorizations are defined using some contextual constraints on the involved entities in an access request. Accordingly, principles like "more specific overrides", which are employed to resolve possible conflicts, are required to consider the contextual constraints. In this paper, we formalize the use of context constraints in a typical context-aware multi-authority... 

    Unit commitment using particle swarm-based-simulated annealing optimization approach

    , Article 2007 IEEE Swarm Intelligence Symposium, SIS 2007, Honolulu, HI, 1 April 2007 through 5 April 2007 ; 2007 , Pages 297-302 ; 1424407087 (ISBN); 9781424407088 (ISBN) Sadati, N ; Hajian, M ; Zamani, M ; Sharif University of Technology
    2007
    Abstract
    In this paper, a new approach based on hybrid Particle Swarm-Based- Simulated Annealing Optimization (PSO-B-SA) for solving thermal unit commitment (UC) problems is proposed. The PSO-B-SA presented in this paper solves the two sub-problems simultaneously and independently; unit-scheduled problem that determines on/off status of units and the economic dispatch problem for production amount of generating units. Problem formulation of UC is defined as minimization of total objective function while satisfying all the associated constraints such as minimum up and down time, production limits and the required demand and spinning reserve. Simulation results show that the proposed approach can... 

    Solving the discrete time/resource trade-off problem in project scheduling with genetic algorithms

    , Article Applied Mathematics and Computation ; Volume 191, Issue 2 , 2007 , Pages 451-456 ; 00963003 (ISSN) Ranjbar, M. R ; Kianfar, F ; Sharif University of Technology
    2007
    Abstract
    In this paper, we develop a metaheuristic procedure for solving the discrete time/resource trade-off problem in the field of project scheduling. In this problem, a project contains activities interrelated by finish-start-type precedence constraints with a time lag of zero, which require a single constrained renewable resource. Each activity has a specified work content and can be performed in different modes, i.e. with different durations and resource requirements; as long as the required work content is met. The objective is to schedule each activity in one of its modes in order to minimize the project makespan. To tackle this problem, we use a genetic algorithm in which a new method based... 

    Empirical performance evaluation of adaptive routing in necklace hypercubes: a comparative study

    , Article International Conference on Computing: Theory and Applications, ICCTA 2007, Kolkata, 5 March 2007 through 7 March 2007 ; 2007 , Pages 193-197 ; 0769527701 (ISBN); 9780769527703 (ISBN) Meraji, S ; Nayebi, A ; Sarbazi Azad, H ; Sharif University of Technology
    2007
    Abstract
    The necklace hypercube network has recently been introduced as an attractive alternative to the well-known hypercube. Previous research on this network topology has mainly focused on topological properties and VLSI aspects of this network. In this paper, we propose some adaptive routing algorithm for the necklace hypercubes. The performance of necklace hypercubes using the proposed routing algorithm is then evaluated by means of simulation experiments. Experiments are realized under different working loads and for different network factors. Moreover, a comparison between the necklace hypercube and the well-known hypercube network is conducted. The comparison has been done considering... 

    Real-time trajectory generation for mobile robots

    , Article 10th Congress of the Italian Association for Artificial Intelligence, AI IA 2007, Rome, 10 September 2007 through 13 September 2007 ; Volume 4733 LNAI , 2007 , Pages 459-470 ; 03029743 (ISSN); 9783540747819 (ISBN) Sahraei, A ; Manzuri, M. T ; Razvan, M. R ; Tajfard, M ; Khoshbakht, S ; Sharif University of Technology
    Springer Verlag  2007
    Abstract
    This paper presents a computationally effective trajectory generation algorithm for omni-directional mobile robots. This method uses the Voronoi diagram to find a sketchy path that keeps away from obstacles and then smooths this path with a novel use of Bezier curves. This method determines velocity magnitude of a robot along the curved path to meet optimality conditions and dynamic constrains using Newton method. The proposed algorithm has been implemented on real robots, and experimental results in different environments are presented. © Springer-Verlag Berlin Heidelberg 2007  

    A fuzzy queuing location model with a genetic algorithm for congested systems

    , Article Applied Mathematics and Computation ; Volume 181, Issue 1 , 2006 , Pages 440-456 ; 00963003 (ISSN) Shavandi, H ; Mahlooji, H ; Sharif University of Technology
    2006
    Abstract
    This article presents a fuzzy location-allocation model for congested systems. In service networks, such as health and emergency services, public safety, fire fighting and so on, the location of servers and allocation of demand nodes to them have a strong impact on the congestion at each server and as such, on the quality of service. The previous efforts in this area have concentrated on enhancing the reliability and quality of service with a probabilistic orientation. In this paper we utilize fuzzy theory to develop a queuing maximal covering location-allocation model which we call the fuzzy queuing maximal covering location-allocation model. We consider fuzzified queuing parameters as well... 

    Impedance control of a two degree-of-freedom planar flexible link manipulator using singular perturbation theory

    , Article Robotica ; Volume 24, Issue 2 , 2006 , Pages 221-228 ; 02635747 (ISSN) Vossoughi, G. R ; Karimzadeh, A ; Sharif University of Technology
    2006
    Abstract
    In this article, impedance control of a two link flexible link manipulators is addressed. The concept of impedance control of flexible link robots is rather new and is being addressed for the first time by the authors. Impedance Control provides a universal approach to the control of flexible robots, in both constrained and unconstrained maneuvers. The initial part of the paper concerns the use of Hamilton's principle to derive the mathematical equations governing the dynamics of joint angles, vibration of the flexible links and the constraining forces. The approximate elastic deformations are then derived by means of the Assumed-Mode-Method (AMM). Using the singular perturbation method, the... 

    A novel method on singularity analysis in parallel manipulators

    , Article 8th Biennial ASME Conference on Engineering Systems Design and Analysis, ESDA2006, Torino, 4 July 2006 through 7 July 2006 ; Volume 2006 , 2006 ; 0791837793 (ISBN); 9780791837795 (ISBN) Pendar, H ; Mahnama, M ; Zohoor, H ; Sharif University of Technology
    American Society of Mechanical Engineers  2006
    Abstract
    A parallel manipulator is a closed loop mechanism in which a moving platform is connected to the base by at least two serial kinematic chains. The main problem engaged in these mechanisms, is their restricted working space as a result of singularities. In order to tackle these problems, many methods have been introduced by scholars. However, most of the mentioned methods are too much time consuming and need a great amount of computations. They also in most cases do not provide a good insight to the existence of singularity for the designer. In this paper a novel approach is introduced and utilized to identify singularities in parallel manipulators. By applying the new method, one could get a... 

    Analytic performance evaluation of OTIS-hypercubes

    , Article IEICE Transactions on Information and Systems ; Volume E89-D, Issue 2 , 2006 , Pages 441-451 ; 09168532 (ISSN) Najaf Abadi, H. H ; Sarbazi Azad, H ; Sharif University of Technology
    Institute of Electronics, Information and Communication, Engineers, IEICE  2006
    Abstract
    In this paper, routing properties of cube-based optoelectronic OTIS networks are explored. We show emulations of various cubical network topologies on their OTIS augmented variants, including the nD grid networks, shuffle-exchange, and de Brujin networks. An analytical performance model for OTIS-cube networks is proposed. The model is validated by means of comparison with rigorously obtained simulation results. Using this model, the performance characteristics of the OTIS-hypercube network are evaluated in view of a number of different constraints. Moreover, we compare the performance characteristics of the OTIS-hypercube with that of equivalent fully-electronic networks under various... 

    A new structure for electricity market scheduling

    , Article 2006 International Conference on Power Electronics, Drives and Energy Systems, PEDES '06, New Delhi, 12 December 2006 through 15 December 2006 ; 2006 ; 078039772X (ISBN); 9780780397729 (ISBN) Soleymani, S ; Ranjbar, A. M ; Shirani, A. R ; Sharif University of Technology
    2006
    Abstract
    On pool market structure, the generating units are typically dispatched in order of lowest to highest bid as needed to meet demand requirement as well as considering network constraints. Generally, no account is taken of generating unit's reliability when scheduling them. This paper proposes a new structure for electricity market to consider generating unit's reliability in the scheduling problem. GAMS (General Algebraic Modeling System) language has been used to solve the social welfare maximization problem using CPLEX optimization software with mixed integer programming. ©2006 IEEE