The control of an aerial flexible joint robot (FJR) manipulator system with underactuation is a difficult task due to unavoidable factors, including, coupling, underactuation, nonlinearities, unmodeled uncertainties, and unpredictable external disturbances. To mitigate those issues, a new robust fixed-time sliding mode control (FxTSMC) is proposed by using a fixed-time sliding mode observer (FxTSMO) for the trajectory tracking problem of the FJR attached to the drones system. First, the underactuated FJR is comprehensively modeled and converted to a canonical model by employing two state transformations for ease of the control design. Then, based on the availability of the measured states, a cascaded FxTSMO (CFxTSMO) is constructed to estimate the unmeasurable variables and lumped disturbances simultaneously in fixed-time, and to effectively reduce the estimation noise. Finally, the FxTSMC scheme for a high-order underactuated FJR system is designed to guarantee that the system tracking error approaches to zero within a fixed-time that is independent of the initial conditions. The fixed-time stability of the closed-loop system of the FJR dynamics is mathematically proven by the Lyapunov theorem. Simulation investigations and hardware tests are performed to demonstrate the efficiency of the proposed controller scheme. Furthermore, the control technique developed in this research could be implemented to the various underactuated mechanical systems (UMSs), like drones, in a promising way.
The presence of different noise sources and continuous increase in crosstalk in the deep submicrometer technology raised concerns for on-chip communication reliability, leading to the incorporation of crosstalk avoidance techniques in error control coding schemes. This brief proposes joint crosstalk avoidance with adaptive error control scheme to reduce the power consumption by providing appropriate communication resiliency based on runtime noise level. By switching between shielding and duplication as the crosstalk avoidance technique and between hybrid automatic repeat request and forward error correction as the error control policies, three modes of error resiliencies are provided. The results show that, in reduced mode, the scheme achie
... Show MoreIn this paper, our purpose is to study the classical continuous optimal control (CCOC) for quaternary nonlinear parabolic boundary value problems (QNLPBVPs). The existence and uniqueness theorem (EUTh) for the quaternary state vector solution (QSVS) of the weak form (WF) for the QNLPBVPs with a given quaternary classical continuous control vector (QCCCV) is stated and proved via the Galerkin Method (GM) and the first compactness theorem under suitable assumptions(ASSUMS). Furthermore, the continuity operator for the existence theorem of a QCCCV dominated by the QNLPBVPs is stated and proved under suitable conditions.
This study presents an adaptive control scheme based on synergetic control theory for suppressing the vibration of building structures due to earthquake. The control key for the proposed controller is based on a magneto-rheological (MR) damper, which supports the building. According to Lyapunov-based stability analysis, an adaptive synergetic control (ASC) strategy was established under variation of the stiffness and viscosity coefficients in the vibrated building. The control and adaptive laws of the ASC were developed to ensure the stability of the controlled structure. The proposed controller addresses the suppression problem of a single-degree-of-freedom (SDOF) building model, and an earthquake control scenario was conducted and simulat
... Show MoreElectronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s
... Show More