Loading...
Search for: control-model
0.014 seconds
Total 53 records

    Simple fractional order model structures and their applications in control system design

    , Article European Journal of Control ; Volume 16, Issue 6 , 2010 , Pages 680-694 ; 09473580 (ISSN) Tavakoli Kakhki, M ; Haeri, M ; Tavazoei , M. S ; Sharif University of Technology
    2010
    Abstract
    In this paper, firstly a four-parameter fractional order model structure is introduced to approximate processes having S-shaped step responses. Three different strategies are presented in order to determine the parameters of the proposed model. In a special case where the proposed model is not satisfactory, another fractional order model structure with five free parameters is introduced to improve the model approximation. Also in this case, a procedure is provided to estimate the parameters of the introduced five-parameter model. Then, some common classical integer order control design approaches are modified or extended to their fractional order counterparts in order to incorporate the... 

    Path-following in model predictive rollover prevention using front steering and braking

    , Article Vehicle System Dynamics ; Volume 55, Issue 1 , 2017 , Pages 121-148 ; 00423114 (ISSN) Ghazali, M ; Durali, M ; Salarieh, H ; Sharif University of Technology
    Abstract
    In this paper vehicle path-following in the presence of rollover risk is investigated. Vehicles with high centre of mass are prone to roll instability. Untripped rollover risk is increased in high centre of gravity vehicles and high-friction road condition. Researches introduce strategies to handle the short-duration rollover condition. In these researches, however, trajectory tracking is affected and not thoroughly investigated. This paper puts stress on tracking error from rollover prevention. A lower level model predictive front steering controller is adopted to deal with rollover and tracking error as a priority sequence. A brake control is included in lower level controller which... 

    A context-aware access control model for pervasive computing environments

    , Article 2007 International Conference on Intelligent Pervasive Computing, IPC 2007, Jeju Island, 11 October 2007 through 13 October 2007 ; 2007 , Pages 51-56 ; 0769530060 (ISBN); 9780769530062 (ISBN) Emami, S. S ; Amini, M ; Zokaei, S ; Sharif University of Technology
    2007
    Abstract
    In pervasive computing environments, a user can access resources and services from any where and at any time; thus a key security challenge in these environments is the design of an effective access control model which is aware of context modifications. Changes in context may trigger changes in authorizations. In this paper, we propose a new context-aware access control model based on role-based access control model for pervasive computing environments. We assign roles to users dynamically based on the long-term context information and tune active role's permissions according to the short-term context information of the users and environment. © 2007 IEEE  

    Control effectiveness investigation of a ducted-fan aerial vehicle using model predictive controller

    , Article International Conference on Advanced Mechatronic Systems, ICAMechS ; 2014 , pp. 532-537 Banazadeh, A ; Emami, S. A ; Sharif University of Technology
    Abstract
    Special attention is given to vertical takeoff and landing air vehicles due to their unique capabilities and versatile missions. The main problem here is control effectiveness at low flight speeds and transition maneuvers because of the inherent instability. RMIT is a small sized tail-sitter ducted fan air vehicle with a particular configuration layout, multiple control surfaces, low weight, and high-speed flight capability. In the current study, a comprehensive nonlinear model is firstly developed for RMIT, followed by a validation process. This model consists of all parts including aerodynamic forces and moments, control surfaces term together with the gravity and driving fan forces.... 

    Robust model predictive control of nonlinear processes represented by Wiener or Hammerstein models

    , Article Chemical Engineering Science ; Volume 129 , 2015 , Pages 223-231 ; 00092509 (ISSN) Khani, F ; Haeri, M ; Sharif University of Technology
    Elsevier Ltd  2015
    Abstract
    Representing nonlinear systems by linear models along with structured or unstructured uncertainties and applying robust control strategies could reduce the computational complexity in comparison with implementing the nonlinear model predictive controllers. In this paper design of robust model predictive controllers which are based on special classes of nonlinear systems representations called Wiener and Hammerstein are presented. The proposed algorithms approximate the nonlinear systems by uncertain linear models and reduce online the computational demands in the control implementation. The advantages of the proposed approaches are illustrated by two examples  

    A temporal description logic based access control model for expressing history constrained policies in semantic web

    , Article Proceedings - 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2009, 20 July 2009 through 22 July 2009, London ; 2009 , Pages 142-149 ; 9780769537429 (ISBN) Faghih, F ; Amini, M ; Jalili, R ; Sharif University of Technology
    2009
    Abstract
    An access control model for Semantic Web should be compatible with the corresponding semantic model. The access control procedure(s) should also take the semantic relationships between the entities (specified as ontologies) into account. Considering the benefits of logic-based models and the description logic foundation of Semantic Web, in this paper, we propose an access control model based on a temporal variant of description logics (TL-ALCF). This logical schema enables us to express history constrained policies to enrich the policy-base with dynamic properties based on previous accesses. The specification of each component of the model as well as the approach to define history... 

    Context-aware provisional access control

    , Article 2nd International Conference on Information Systems Security, ICISS 2006, 19 December 2006 through 21 December 2006 ; Volume 4332 LNCS , 2006 , Pages 132-146 ; 03029743 (ISSN); 9783540689621 (ISBN) Masoumzadeh, A. R ; Amini, M ; Jalili, R ; Sharif University of Technology
    Springer Verlag  2006
    Abstract
    High heterogeneity and dynamicity of pervasive computing environments introduces requirement of more flexible and functional access control policies. The notion of provisional actions has been defined previously to overcome the insufficient grant/denial response to an access request and has been incorporated in the provision-based access controlmodel(PBAC).BasedonPBAC,weproposeacontext-aware provision-based access control model, capable of dynamic adaptation of access control policy according to the changing context. In particular, the model facilitates the definition of context-aware policies and enriches the access control by enforcing provisional actions in addition to common permissions.... 

    A trust and reputation-based access control model for virtual organizations

    , Article 2012 9th International ISC Conference on Information Security and Cryptology, ISCISC 2012, 13 September 02012 through 14 September 2012 ; September , 2012 , Pages 121-127 ; 9781467323864 (ISBN) Arasteh, M ; Amini, M ; Jalili, R ; Sharif University of Technology
    2012
    Abstract
    Virtual organization (VO) is aimed to provide inter-organizational collaborations. Constructing a VO necessitates provision of security and access control requirements which cannot be satisfied using the traditional access control models. This is basically due to special features of VOs; such as temporality, unknown users, and diverse resources. In this paper, after expressing our assumption on a framework for VOs; the concept of organizational trust and reputation is used to establish an access control model for VOs. Each member of an organization inherits its organizational reputation. Resource providers announce the behavior of their interacting users to their organization manager.... 

    Specification of history based constraints for access control in conceptual level

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 17 December 2010 through 19 December 2010, Gandhinagar ; Volume 6503 LNCS , 2010 , Pages 186-200 ; 03029743 (ISSN) ; 9783642177132 (ISBN) Faghih, F ; Amini, M ; Jalili, R ; Sharif University of Technology
    2010
    Abstract
    An access control model for Semantic Web should take the semantic relationships among the entities, defined in the abstract conceptual level (i.e., ontology level), into account. Authorization and policy specification based on a logical model let us infer implicit security policies from the explicit ones based on the defined semantic relationships in the domains of subjects, objects, and actions. In this paper, we propose a logic based access control model for specification and inference of history-constrained access policies in conceptual level of Semantic Web. The proposed model (named TDLBAC-2) enables authorities to state policy rules based on the history of users' accesses using a... 

    A low-overhead and reliable switch architecture for Network-on-Chips

    , Article Integration, the VLSI Journal ; Volume 43, Issue 3 , June , 2010 , Pages 268-278 ; 01679260 (ISSN) Patooghy, A ; Miremadi, S. G ; Fazeli, M ; Sharif University of Technology
    2010
    Abstract
    This paper proposes and evaluates Low-overhead, Reliable Switch (LRS) architecture to enhance the reliability of Network-on-Chips (NoCs). The proposed switch architecture exploits information and hardware redundancies to eliminate retransmission of faulty flits. The LRS architecture creates a redundant copy of each newly received flit and stores the redundant flit in a duplicated flit buffer that is associated with the incoming channel of the flit. Flit buffers in the LRS are equipped with information redundancy to detect probable bit flip errors. When an error is detected in a flit buffer, its duplicated buffer is used to recover the correct value of the flit. In this way, the propagation... 

    Design of sliding mode and model reference adaptive control strategies for multivariable tape transport mechanism: a performance comparison

    , Article Microsystem Technologies ; Volume 22, Issue 2 , 2016 , Pages 419-431 ; 09467076 (ISSN) Abbasi, M. H ; Moradian, H ; Moradi, H ; Sharif University of Technology
    Springer Verlag 
    Abstract
    This paper presents sliding mode control and model reference adaptive control strategies for the tape transport mechanism. A nonlinear multivariable MIMO model of the process, consisting of take-up and supply reel servos for tape tension control and capstan servo for speed control is considered. The sliding mode control is applied for the nonlinear dynamic model of the process, while the model reference adaptive control deals with the linearized one. Moreover, in order to associate with the realistic model of system, design of controllers is accomplished with respect to parametric uncertainties. It is shown that both control strategies can guarantee asymptotic stability of the closed-loop... 

    Vehicle trajectory challenge in predictive active steering rollover prevention

    , Article International Journal of Automotive Technology ; Volume 18, Issue 3 , 2017 , Pages 511-521 ; 12299138 (ISSN) Ghazali, M ; Durali, M ; Salarieh, H ; Sharif University of Technology
    Abstract
    High center of mass vehicles are likely to rollover in extreme maneuvers. Available works present control strategies to prevent rollover. In these works, however, other important parameters such as path trajectory tracking are not a main concern. In this paper conflicts between rollover prevention and trajectory tracking is investigated. Model predictive control (MPC) is adopted to predict and avoid rollover while tracking desired trajectory. For this regard a model based future error estimation is introduced. The control framework predicts both rollover and trajectory error simultaneously. It avoids rollover while tries to track the trajectory. Simulation results for two controllers with... 

    Nonlinear robust adaptive sliding mode control of influenza epidemic in the presence of uncertainty

    , Article Journal of Process Control ; Volume 56 , 2017 , Pages 48-57 ; 09591524 (ISSN) Sharifi, M ; Moradi, H ; Sharif University of Technology
    Elsevier Ltd  2017
    Abstract
    In this paper, a nonlinear robust adaptive sliding mode control strategy is presented for the influenza epidemics in the presence of model uncertainties. The nonlinear epidemiological model of influenza with five state variables (the numbers of susceptible, exposed, infected, asymptomatic and recovered individuals) and two control inputs (vaccination and antiviral treatment) is considered. The objective of the proposed controller is decreasing the number of susceptible and infected humans to zero by tracking the desired scenarios. As a result of this decreasing, the number of exposed and asymptomatic individuals is also decreased and converged to the zero. Accordingly, it is shown that the... 

    Enforcing access control policies over data stored on untrusted server

    , Article 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2017, 6 September 2017 through 7 September 2017 ; 2018 , Pages 54-57 ; 9781538665602 (ISBN) Soltani, N ; Jalili, R ; Sharif University of Technology
    Abstract
    One of the security issues in data outsourcing scenario is the enforcement of data owner's access control policies. This includes some challenges; namely, the number of keys required to access authorized resources, efficient policy updating, write access control enforcement, user and data owner overhead, and preserving confidentiality of data and policies. Most of the existing solutions address only some of the challenges, while they impose high overhead on both the data owner and users. Though, policy management in the Role-Based Access Control (RBAC) model is easier and more efficient due to the existence of role hierarchical structure and role inheritance; most of the existing solutions... 

    A cascade multiple-model predictive controller of nonlinear systems by integrating stability and performance

    , Article 27th Iranian Conference on Electrical Engineering, ICEE 2019, 30 April 2019 through 2 May 2019 ; 2019 , Pages 951-955 ; 9781728115085 (ISBN) Rikhtehgar, P ; Ahmadi, M ; Haeri, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    To deal with strong nonlinearity in nonlinear systems, a new method called cascade multiple-model predictive controller based on gap metric and stability margin, is proposed. The gap metric is utilized to describe the nonlinear system by a linear model bank. It is possible to select nominal local models from the linear model bank by an algorithm based on the gap metric and stability margin to avoid the redundancy of the local controllers. By scheduling proportional controller for each nominal local model, the robust stability is guaranteed whereas there will be no guarantee for the desired performance. Then, by designing a model predictive controller in the cascade structure, the closed loop... 

    CEBAC: A decentralized cooperation enforcement based access control framework in MANETs

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 427-434 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Saremi, F ; Mashayekhi, H ; Movaghar, A ; Jalili, R ; Sharif University of Technology
    2008
    Abstract
    Prevention of unauthorized access to services in mobile ad hoc networks is a more sophisticated problem than access control in other networks, due to interconnection facilities and lack of any fixed network infrastructure in such networks. Therefore regarding the nature of these networks, controlling access to services should be in a decentralized manner providing good performance and preserving network security. In this paper, we propose a decentralized Cooperation Enforcement Based Access Control (CEBAC) framework for mobile ad hoc networks. CEBAC comprises several groups of Service Authorizers, each issuing Credentials for access to a specific kind of services. The User Authorization for... 

    A history based semantic aware access control model using logical time

    , Article Proceedings of 11th International Conference on Computer and Information Technology, ICCIT 2008, 25 December 2008 through 27 December 2008, Khulna ; 2008 , Pages 43-50 ; 9781424421367 (ISBN) Noorollahi Ravari, A ; Amini, M ; Jalili, R ; Jafarian, J. H ; Sharif University of Technology
    2008
    Abstract
    With the advent of semantic technology' access control cannot be done in a safe way unless the access decision takes into account the semantic relationships among the entities in a semantic-aware environment. The SBAC model (Semantic Based Access Control model) considers this issue in its decision making process. However' time plays a crucial role in new computing environments'which is not supported in SBAC. In this paper' we propose the Temporal Semantic Based Access Control (TSBAC) model' as an extension of SBAC' which enhances the specification of user-defined authorization rules by constraining time interval and temporal expression over users' history of accesses. TSBAC uses logical... 

    Chaos control in continuous mode of T-AFM systems using nonlinear delayed feedback via sliding mode control

    , Article ASME 2007 International Mechanical Engineering Congress and Exposition, IMECE 2007, 11 November 2007 through 15 November 2007 ; Volume 11 , 2007 , Pages 201-208 ; 079184305X (ISBN) Sadeghian, H ; Salarieh, H ; Alasty, A ; ASME ; Sharif University of Technology
    American Society of Mechanical Engineers (ASME)  2007
    Abstract
    The taping mode Atomic Force Microscopic (T-AFM) can be assumed as a cantilever beam which its base is excited by a sinusoidal force and nonlinear potential interaction with sample. Thus the cantilever may cause chaotic behavior which decreases the performance of the sample topography. In order to modeling, using the galerkin method, the PDE equation is reduced to a single ODE equation which properly describing the continuous beam. In this paper a nonlinear delayed feedback control is proposed to control chaos in T-AFM system. Assuming model parameters uncertainties, the first order Unstable Periodic Orbits (UPOs) of the system is stabilized using the sliding nonlinear delayed feedback... 

    Adaptive model predictive TCP delay-based congestion control

    , Article Computer Communications ; Volume 29, Issue 11 , 2006 , Pages 1963-1978 ; 01403664 (ISSN) Haeri, M ; Mohsenian Rad, A. H ; Sharif University of Technology
    2006
    Abstract
    Adaptive Model Predictive Transmission Control Protocol (AMP-TCP) as a new TCP delay-based congestion control algorithm is introduced. Both aspects of design and implementation of the algorithm are described using simulations on the ns-2 network simulator. The design stage is composed of two steps. First, a recursive system identification approach is proposed to capture the network delay dynamics from TCP source view. Second, the proposed modeling is employed to develop an adaptive model predictive TCP congestion control strategy in the absence of any explicit congestion notification. The characteristics and performance of AMP-TCP are investigated using several network simulations. Finally a... 

    Data-driven model-free adaptive control of z-source inverters

    , Article Sensors ; Volume 21, Issue 22 , 2021 ; 14248220 (ISSN) Asadi, Y ; Ahmadi, A ; Mohammadi, S ; Moradi Amani , A ; Marzband, M ; Mohammadi Ivatloo, B ; Sharif University of Technology
    MDPI  2021
    Abstract
    The universal paradigm shift towards green energy has accelerated the development of modern algorithms and technologies, among them converters such as Z-Source Inverters (ZSI) are playing an important role. ZSIs are single-stage inverters which are capable of performing both buck and boost operations through an impedance network that enables the shoot-through state. Despite all advantages, these inverters are associated with the non-minimum phase feature imposing heavy restrictions on their closed-loop response. Moreover, uncertainties such as parameter perturbation, unmodeled dynamics, and load disturbances may degrade their performance or even lead to instability, especially when...