Discussion on: "Development and Experimental Verification of a Mobile Client-Centric Networked Controlled System"
نویسنده
چکیده
The paper under discussion [12] presents the analytical results underlying the authors’ design of a networked control system (NCS) operating over a cellular network. Their formulation fits the common framework [7, 14], in which there are transmission delays present in the sensor/controller and controller/actuator paths. One key difference between this work and existing literature relates to the use of a client-centric system, which is mandated by security issues. However, this seems to make little to no functional difference in the implementation or resulting analysis. The chief theoretical results of the paper are based upon linear matrix inequality (LMI) theory. In particular, the authors have provided an interesting, LMI-derived analytical result for ascertaining the stability of a networked control system with delays. Some existing work [4] has pursued similar derivations for systems with time-varying delays without applying the results directly to networked control systems; a complementary approach [1] provided LMIs that could be used to guarantee the stability of an undelayed networked control system under packet losses. Another key point in the work here is that the authors assume that the application of control signals and delivery of state information happens on the boundaries of sampling intervals. This approach is advantageous to their analytical approach, which augments the system with delayed state measurements up to a certain bound. Moreover, it provides results for situations in which the delay is greater than the sampling period, a scenario that is often neglected in NCS research, but fairly common in wide-area networks. In summary, their different viewpoints plus the development of an endto-end system under quite restrictive bandwidth and delay constraints is of obvious value to the progress toward a larger vision of networked control. The Bigger Picture
منابع مشابه
A Formal Petri Net Based Model for Antivirus Update Agent System
In this paper, a formal model for antivirus update agent system is presented based on mobile agent technology and predicate/transition Petri nets. The mobile agent system contains two mobile agents called DCA and UNA. It sends out agents to update antivirus on client computers in a network. Each agent takes on a specified responsibility. First, DCA roams through the network and check the last d...
متن کاملA Formal Petri Net Based Model for Antivirus Update Agent System
In this paper, a formal model for antivirus update agent system is presented based on mobile agent technology and predicate/transition Petri nets. The mobile agent system contains two mobile agents called DCA and UNA. It sends out agents to update antivirus on client computers in a network. Each agent takes on a specified responsibility. First, DCA roams through the network and check the last d...
متن کاملMethod of Video-Measurements of Traffic Flow Characteristics at a Road Junction
In the theory of traffic flows the main characteristics are: intensity, speed, and density. They make it possible to use hydrodynamic models. In connection with the development of modern highways and road networks, traffic flows behavior is becoming more and more complex and diverse. In particular, the B.Kerner studies have shown that the laminar solution of hydrodynamic models is poorly corre...
متن کاملCommunity-centric mobile peer-to-peer services: performance evaluation and user studies
The popularity of social networking services emphasises the importance of user communities. As the next evolutionary step, social networking will evolve towards user communities that are dynamically established according to contextual aspects such as the shared location and/or activities of people. In this vision, distributed peer-to-peer (P2P) technologies provide a respectable alternative to ...
متن کاملStimulating Intelligence in the Mobile Networked Systems
The mobile networked systems (4G and upcoming 5G) are at a critical stage of the technology revolution. Despite offering working solutions for billions of users, they are complex and closed: The infrastructure lacks guarantees for the correct designs and operations, while the mobile client lacks the insights of the ”black-box” network behaviors. Both fundamentally limit our understanding of why...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Eur. J. Control
دوره 11 شماره
صفحات -
تاریخ انتشار 2005