Proceedings of 2019 Chinese Intelligent Automation Conference [1st ed. 2020] 978-981-32-9049-5, 978-981-32-9050-1

The proceedings present selected research papers from the CIAC2019, held in Jiangsu, China on September 20-22, 2019. It

885 108 75MB

English Pages XI, 747 [759] Year 2020

Report DMCA / Copyright

DOWNLOAD FILE

Polecaj historie

Proceedings of 2019 Chinese Intelligent Automation Conference [1st ed. 2020]
 978-981-32-9049-5, 978-981-32-9050-1

Table of contents :
Front Matter ....Pages i-xi
Research on Combat Deduction Platform Technology for Intelligent Operational Decision (Xin Liao, Zheng-hao Sun)....Pages 1-13
Study of the Auxiliary Robot Used to Disassemb and Assemb Mid-Set Switch Cubicle Based on BCI (Weiwei Huang, Bihui Zhang, Rui Li)....Pages 14-21
Ship Detection Based on Faster R-CNN Network in Optical Remote Sensing Images (Min Zhai, Huaping Liu, Fuchun Sun, Yan Zhang)....Pages 22-31
An Efficient Real-Time Indoor Autonomous Navigation and Path Planning System for Drones Based on RGB-D Sensor (Ran Xiao, Hao Du, Chaowen Xu, Wei Wang)....Pages 32-44
Research on Port Throughput Prediction of Tianjin Port Based on PCA-SVR in the New Era (Jinyu Wei, Yuqiao Tang, Yang Yu, Xueshan Sun)....Pages 45-52
Research on Automatic Detection Method of Part Shape Based on Projection Optics and Image Processing (Xiangyang Sun, Binggao He, Can Wang, Yuegang Fu)....Pages 53-59
Signal Detection, Processing and Challenges of Non-invasive Brain-Computer Interface Technology (Xiaoyuan Li, Feng Chen, Yaohui Jia, Xinyu Liu)....Pages 60-67
An Iterative Model from Grid Cells to Place Cells (Naigong Yu, Yishen Liao, Xiangguo Zheng, Hui Feng)....Pages 68-78
Visual Stabilization of Wheeled Mobile Robots with Unknown Visual Parameters (Yao Huang, Jianbo Su)....Pages 79-87
A Game Model for Gomoku Based on Deep Learning and Monte Carlo Tree Search (Xiali Li, Shuai He, Licheng Wu, Daiyao Chen, Yue Zhao)....Pages 88-97
Cascading Failure Analysis of Military Command and Control Network Based on SIS Model (Jichao Xing, Zhaoliang Zhu, Chuxiang Chen, Xiaofeng Guo)....Pages 98-105
Laser Scan Matching in Polar Coordinates Using Gaussian Process (Yinqiang Wang, Bo Li, Bo Han, Yu Zhang, Wenjie Zhao)....Pages 106-115
An Evolutionary Membrane Algorithm Based on Competition Mechanism for Multi-objective Optimization Problems (Zhiqiang Geng, Yunfei Cui, Yongming Han)....Pages 116-123
Design of Intelligent Measuring Device for On-line Machining Parts of Lathe (Xiangyang Sun, Binggao He, Lijuan Shi, Can Wang, Yuegang Fu)....Pages 124-130
Algorithm Research on Optimizing Ordering and Pricing Policy for Perishable Items (Xin Yang, Yuan Zhao, Jin-yu Wei, Yang Yu)....Pages 131-137
Facial Expression Recognition System Based on Deep Residual Fusion Neural Network (Haonan Wang, Junhang Ding, Fan Wang, Zhe Ma)....Pages 138-144
Research and Application on Ensemble Learning Methods (Yuzhong Wang)....Pages 145-155
Optimal Fault Tolerant Control of Five-Phase Permanent Magnet Synchronous Motor Under One-Phase Open-Circuit Fault (Song Jie)....Pages 156-165
Enhanced Pulse Density Modulation for Efficiency Optimization in Inductive Power Transfer Systems (Hong Zheng, Rui Bian, Yubing Gu)....Pages 166-173
RGB-D Saliency Object Detection Based on Adaptive Manifolds Filtering (Lingling Zi, Xin Cong, Yanfei Peng, Xitao Chen)....Pages 174-181
Study of Speed Stabilization Loop for Airborne Photoelectric Platform Based on Active Disturbance Rejection Control (Yongli Bi, Shigang Wang)....Pages 182-190
Active Disturbance Rejection Control of Drum Water Level with Generalized Extended State Observer (Cuiping Pu, Jie Ren, Jianbo Su)....Pages 191-199
Improved Cuckoo Search Algorithm Based on Exponential Function (Kun Wang, Xiaofeng Lian, Bing Pan)....Pages 200-207
Autonomous Intelligent Control for Path Following of Unmanned Surface Vessels with Input Constraints (Yalei Yu, Chen Guo, Haomiao Yu)....Pages 208-215
Investigation on Energy Feedback Potentiality of New Hydraulic Interconnected Energy-Regenerative Suspension (Zeyu Sun, Ruochen Wang, Xiangpeng Meng, Qiuiming Jiang)....Pages 216-225
Sliding Mode Control with Uncertain Model for a Quadrotor UAV’s Automatic Visual Landing Problem (Qing Fei, Jiaxiang Zhang, Zhengyang Wang, Xiaosong Huang)....Pages 226-233
Depth-Fusion Based on Gaussian Mixture Model for RGB-D Visual SLAM (Zhaotong Ding, Ran Huang, Biao Hu)....Pages 234-242
Error Analysis of Dual Antenna UAV Tracking System (Shujuan Li, Junhang Ding, Jianzhi Li)....Pages 243-250
Fault Tolerant Control Allocation Based on Adaptive Sliding Mode Control for Distributed-Driven Electric Vehicle (Guohai Liu, Shuangjian Wang, Duo Zhang, Yue Shen, Zhen Yao)....Pages 251-261
Research on Sliding Mode Active Disturbance Rejection Control and Thrust Allocation of Dynamic Positioning System (Zaiji Piao, Chen Guo)....Pages 262-269
Research on Indoor Positioning Method Based on Improved HS-AlexNet Model (Libiao Zhang, Rui Zhao, Yuqing Liu, Xinyu Yang, Shipeng Li)....Pages 270-277
A Modified Energy and Signal Coordination Control Strategy for a Robotic System (Yu Wang, Haisheng Yu, Jinpeng Yu, Herong Wu, Xudong liu)....Pages 278-286
Parameter Optimization Control of Multiple Response Process Based on Hesitant Fuzzy Sets (Jun Wang, Jian-li Yu, Feng-ying Gu, Hong-Gen Chen)....Pages 287-295
Active Disturbance Rejection and Adaptive Backstepping Control for Induction Motor with Smooth Switching of Rotor Flux (Fei Gong, Haisheng Yu, Jinpeng Yu, Xudong Liu)....Pages 296-304
Super-Twisting and Nonsingular Terminal Sliding Mode Direct Torque Control of Induction Motor Drives (Wenchao Lv, Haisheng Yu)....Pages 305-312
Four Quadrant PMSM Drive System via Backstepping and Hamiltonian Control (Guanglin Lv, Haisheng Yu, Xudong Liu)....Pages 313-319
Sliding Mode Control of Induction Motor Based on AC-DC-AC Converter (Huipeng Zhang, Haisheng Yu)....Pages 320-328
Field Environment Intelligent Navigation System for Tomato Transportation Robot Based on Dijkstra (Xiaonan Guo, Yifei Chen, Jianwei Zhao, Liu Yang, Wenwen Gong)....Pages 329-336
Reducing Bullwhip Effects in Supply Chain Systems via \( \varvec{H}_{\infty } \) Control (Chen Qian, Qingwei Chen)....Pages 337-346
Visual-Inertial Localization and Map Summarization Based on Prior Map (Bo Fu, Yanmei Jiao, Xiaqing Ding, Yue Wang, Rong Xiong)....Pages 347-355
A Deep Learning Method for Heartbeat Detection in ECG Image (Zewen He, Jinghao Niu, Junhong Ren, Yajun Shi, Wensheng Zhang)....Pages 356-363
Multi-mode Design and Constant Current Control of Hydraulically Interconnected Energy-Regenerative Suspension (Ruochen Wang, Dong Sun, Renkai Ding, Xiangpeng Meng)....Pages 364-372
A Temperature Control Method for Car Room Based on Single User Personalized Comfort (Nan Ye, Lin-hua Zhuang, Ning Li)....Pages 373-381
Three-Dimensional Trajectory Optimization Design of Parafoil System Obstacle Avoidance Based on Switched System Method (Qiaodan Liu, Xiang Wu)....Pages 382-392
Design of Automatic Illumination Culture System for Haematococcus pluvialis Based on LED (Shigang Cui, Xinqi Li, Yongli Zhang, Xingli Wu, Lin He)....Pages 393-400
Study on pH Control of Haematococcus pluvialis Solution Based on Neural Network Controller (Shigang Cui, Yunqi Huang, Lin He, Yongli Zhang, Xingli Wu)....Pages 401-407
An Autoencoder-Based Dimensionality Reduction Algorithm for Intelligent Clustering of Mineral Deposit Data (Yan Li, Xiong Luo, Maojian Chen, Yueqin Zhu, Yang Gao)....Pages 408-415
The Pressure Control System for Tea Rolling Based on Fuzzy Control (Yao Li, Zhe Tang, Fang Qi, Chunwang Dong)....Pages 416-425
Design of Differential GPS System Based on BP Neural Network Error Correction for Precision Agriculture (Gangshan Wu, Chiyuan Chen, Ning Yang, Haifang Hui, Peifeng Xu)....Pages 426-438
Multi-view Based Pose Alignment Method for Person Re-identification (Yulei Zhang, Qingjie Zhao, You Li)....Pages 439-447
A Novel Contribution Graph Based Likert Scale Method and Its Application to Real-Time Alarm Evaluation (Qun-Xiong Zhu, Rui Ding, Yan-Lin He, Yuan Xu)....Pages 448-455
Research on Optimization of Intelligent Assignment of Crane Task Priority (Hexu Sun, Pengcheng Wang, Zhaoming Lei)....Pages 456-464
Optimization of Vehicle Scheduling Within the Steel Enterprises Based on IAGSO Algorithm (He-xu Sun, Fan Zhao, Zhaoming Lei)....Pages 465-472
Research on Wind Power Optimization Scheduling Based on Improved Plant Growth Simulation Algorithm (Hexu Sun, Hang Zhang, Zhaoming Lei)....Pages 473-481
An Improved BING/NMS Algorithm for Aircraft Detection (Jianxin Feng, Junmei Liu, Chengsheng Pan)....Pages 482-493
Research on Wind Power Consumption Dispatching Based on Improved Whale Optimization Algorithm (Hexu Sun, Wei Zhang, Zhaoming Lei)....Pages 494-502
Time Delay Estimation Based PD Sliding Mode Control of Hybrid Robot for Automobile Electro-Coating Conveying (Qiuyue Qin, Guoqin Gao, Shilin Lei)....Pages 503-511
A Predictive Speed Control Method Based on Sliding Mode Model for PMSM Drive System (Qian Guo, Tianhong Pan)....Pages 512-520
The Optimal Mars Entry Guidance with External Disturbance Using Neural Network Solution (Maomao Li, Ruike Guo)....Pages 521-528
Fault Tolerant Control for Five-Phase Synchronous Reluctance Motor by Third Harmonic Current Injection (Guohai Liu, Jiajun Ni, Qian Chen)....Pages 529-536
Echo State Network with Hub Property (Fanjun Li, Ying Li, Xiaohong Wang)....Pages 537-544
Robust Control of Fractional-Order Horizontal Platform System with Input Saturation (Xiaomin Tian, Zhong Yang)....Pages 545-552
IoT System Data Quality Optimization: Research Status and Problem Analysis (Haoyu Jiang, Jiacheng Ji, Quanbo Ge, Chunxi Li)....Pages 553-561
Numerical Verification and Robotic Application of New DTZD Algorithm for Solving System of Time-Varying Nonlinear Equations (Zhijing Huang, Xinjie Lin, Yiwen Zhang, Zhixin Zhang, Dongsheng Guo)....Pages 562-570
Fault Detection Based on Multi-local SVDD with Generalized Additive Kernels (Huangang Wang, Daoming Li, Junwu Zhou, Xu Wang)....Pages 571-579
A Cooperative Target 3D Tracking Method Based on EPnP and Adaptive Kalman Filter (Haodong Ding, Kun Liu, Peng Chen, Haiyong Chen)....Pages 580-591
Adaptive Sliding Mode Control for a 6 DOFs Magnetic Levitation System (Meng Duan, Yingmin Jia, Kai Gong, Yuxin Jia)....Pages 592-602
Research on the Intelligent Control System for Solar Greenhouse in Consideration of Indoor Dynamic Environment Information (Wenwen Gong, Dong Pu, Xiaonan Guo, Xiangnan Zhang, Yifei Chen)....Pages 603-610
Recursive Relaxation Algorithm for Identification of Multiple Input Multiple Output Systems (Ying Zhou, Jing-song Yang, Tong Wang, Hong Wang)....Pages 611-619
Image Restoration Based on Wavelet Semi-soft Threshold Transform and BP Fuzzy Neural Network (Wenjing Pei, Yingmin Jia)....Pages 620-628
An Iterative Parameter Tuning Method for Robot Joint Motor’s Sliding Mode Controller (Jie Li, Haibo Yu, Yanbo Wang, Bokai Xuan, Zhe Chen)....Pages 629-637
Fault Feature Extraction of Wind Turbine Rolling Bearing Based on PSO-VMD (Ping Zhang, Jingmin Yan)....Pages 638-646
Quantized Kernel Learning Filter with Maximum Mixture Correntropy Criterion (Lin Chu, Wenling Li)....Pages 647-655
Discovering Bursty Events Based on Enhanced Bursty Term Detection (Liyan Zhou, Junping Du, Wanqiu Cui, Zhe Xue, Chengcai Chen)....Pages 656-663
Dynamic Job Shop Scheduling Problem with New Job Arrivals: A Survey (Zhen Wang, Jihui Zhang, Jianfei Si)....Pages 664-671
Overview of Longitudinal and Lateral Control for Intelligent Vehicle Path Tracking (Tengfei Fu, Chenwei Yao, Mohan Long, Mingqin Gu, Zhiyuan Liu)....Pages 672-682
The Development of Web Application Front-End of Intelligent Clinic Based on Vue.js (Minghang Li, Jianghai Hu, Xianwu Lin)....Pages 683-690
Topic Detection Based on Semantics, Time and Social Relationship (Pengchao Cheng, Junping Du, Feifei Kou, Zhe Xue, Peihua Chen)....Pages 691-698
Research on Metadata System and Model of Military Logistics Information Resources (Jun Wang, DaRong Ling, Wenbing Liu, Siying Hu, Fan Jiang)....Pages 699-708
A General Technique to Combine Off-Policy Reinforcement Learning Algorithms with Satellite Attitude Control (Jian Zhang, Fengge Wu, Junsuo Zhao, Fanjiang Xu)....Pages 709-719
Finite-Time Event-Triggered Attitude Consensus Control for Multiple Unmanned Surface Vessels (Sichen Liu, Qing Fei, Changwen Wu, Xiaosong Huang)....Pages 720-727
Kinect-Based Gesture Tracking in Remote Operation of Rocket Casket (Jianxin Zhang, Xiaowang Jiang, Guolei Wang, Zhiliang Chen, Wenzhu Deng)....Pages 728-735
Water Quality Modeling and Prediction Method Based on Sparse Recurrent Neural Network (Zhenbo Cheng, Zhengyuan Shen, Tianqi Zhu, Huaidi Lin, Leilei Zhang)....Pages 736-747

Citation preview

Lecture Notes in Electrical Engineering 586

Zhidong Deng Editor

Proceedings of 2019 Chinese Intelligent Automation Conference

Lecture Notes in Electrical Engineering Volume 586

Series Editors Leopoldo Angrisani, Department of Electrical and Information Technologies Engineering, University of Napoli Federico II, Naples, Italy Marco Arteaga, Departament de Control y Robótica, Universidad Nacional Autónoma de México, Coyoacán, Mexico Bijaya Ketan Panigrahi, Electrical Engineering, Indian Institute of Technology Delhi, New Delhi, Delhi, India Samarjit Chakraborty, Fakultät für Elektrotechnik und Informationstechnik, TU München, Munich, Germany Jiming Chen, Zhejiang University, Hangzhou, Zhejiang, China Shanben Chen, Materials Science and Engineering, Shanghai Jiao Tong University, Shanghai, China Tan Kay Chen, Department of Electrical and Computer Engineering, National University of Singapore, Singapore, Singapore Rüdiger Dillmann, Humanoids and Intelligent Systems Lab, Karlsruhe Institute for Technology, Karlsruhe, Baden-Württemberg, Germany Haibin Duan, Beijing University of Aeronautics and Astronautics, Beijing, China Gianluigi Ferrari, Università di Parma, Parma, Italy Manuel Ferre, Centre for Automation and Robotics CAR (UPM-CSIC), Universidad Politécnica de Madrid, Madrid, Spain Sandra Hirche, Department of Electrical Engineering and Information Science, Technische Universität München, Munich, Germany Faryar Jabbari, Department of Mechanical and Aerospace Engineering, University of California, Irvine, CA, USA Limin Jia, State Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University, Beijing, China Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences, Warsaw, Poland Alaa Khamis, German University in Egypt El Tagamoa El Khames, New Cairo City, Egypt Torsten Kroeger, Stanford University, Stanford, CA, USA Qilian Liang, Department of Electrical Engineering, University of Texas at Arlington, Arlington, TX, USA Ferran Martin, Departament d’Enginyeria Electrònica, Universitat Autònoma de Barcelona, Bellaterra, Barcelona, Spain Tan Cher Ming, College of Engineering, Nanyang Technological University, Singapore, Singapore Wolfgang Minker, Institute of Information Technology, University of Ulm, Ulm, Germany Pradeep Misra, Department of Electrical Engineering, Wright State University, Dayton, OH, USA Sebastian Möller, Quality and Usability Lab, TU Berlin, Berlin, Germany Subhas Mukhopadhyay, School of Engineering & Advanced Technology, Massey University, Palmerston North, Manawatu-Wanganui, New Zealand Cun-Zheng Ning, Electrical Engineering, Arizona State University, Tempe, AZ, USA Toyoaki Nishida, Graduate School of Informatics, Kyoto University, Kyoto, Japan Federica Pascucci, Dipartimento di Ingegneria, Università degli Studi “Roma Tre”, Rome, Italy Yong Qin, State Key Laboratory of Rail Traffic Control and Safety, Beijing Jiaotong University, Beijing, China Gan Woon Seng, School of Electrical & Electronic Engineering, Nanyang Technological University, Singapore, Singapore Joachim Speidel, Institute of Telecommunications, Universität Stuttgart, Stuttgart, Baden-Württemberg, Germany Germano Veiga, Campus da FEUP, INESC Porto, Porto, Portugal Haitao Wu, Academy of Opto-electronics, Chinese Academy of Sciences, Beijing, China Junjie James Zhang, Charlotte, NC, USA

The book series Lecture Notes in Electrical Engineering (LNEE) publishes the latest developments in Electrical Engineering - quickly, informally and in high quality. While original research reported in proceedings and monographs has traditionally formed the core of LNEE, we also encourage authors to submit books devoted to supporting student education and professional training in the various fields and applications areas of electrical engineering. The series cover classical and emerging topics concerning:

• • • • • • • • • • • •

Communication Engineering, Information Theory and Networks Electronics Engineering and Microelectronics Signal, Image and Speech Processing Wireless and Mobile Communication Circuits and Systems Energy Systems, Power Electronics and Electrical Machines Electro-optical Engineering Instrumentation Engineering Avionics Engineering Control Systems Internet-of-Things and Cybersecurity Biomedical Devices, MEMS and NEMS

For general information about this book series, comments or suggestions, please contact leontina. [email protected]. To submit a proposal or request further information, please contact the Publishing Editor in your country: China Jasmine Dou, Associate Editor ([email protected]) India Swati Meherishi, Executive Editor ([email protected]) Aninda Bose, Senior Editor ([email protected]) Japan Takeyuki Yonezawa, Editorial Director ([email protected]) South Korea Smith (Ahram) Chae, Editor ([email protected]) Southeast Asia Ramesh Nath Premnath, Editor ([email protected]) USA, Canada: Michael Luby, Senior Editor ([email protected]) All other Countries: Leontina Di Cecco, Senior Editor ([email protected]) Christoph Baumann, Executive Editor ([email protected]) ** Indexing: The books of this series are submitted to ISI Proceedings, EI-Compendex, SCOPUS, MetaPress, Web of Science and Springerlink **

More information about this series at http://www.springer.com/series/7818

Zhidong Deng Editor

Proceedings of 2019 Chinese Intelligent Automation Conference

123

Editor Zhidong Deng Tsinghua University Beijing, China

ISSN 1876-1100 ISSN 1876-1119 (electronic) Lecture Notes in Electrical Engineering ISBN 978-981-32-9049-5 ISBN 978-981-32-9050-1 (eBook) https://doi.org/10.1007/978-981-32-9050-1 © Springer Nature Singapore Pte Ltd. 2020 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd. The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721, Singapore

Contents

Research on Combat Deduction Platform Technology for Intelligent Operational Decision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xin Liao and Zheng-hao Sun

1

Study of the Auxiliary Robot Used to Disassemb and Assemb Mid-Set Switch Cubicle Based on BCI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Weiwei Huang, Bihui Zhang, and Rui Li

14

Ship Detection Based on Faster R-CNN Network in Optical Remote Sensing Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Min Zhai, Huaping Liu, Fuchun Sun, and Yan Zhang

22

An Efficient Real-Time Indoor Autonomous Navigation and Path Planning System for Drones Based on RGB-D Sensor . . . . . . Ran Xiao, Hao Du, Chaowen Xu, and Wei Wang

32

Research on Port Throughput Prediction of Tianjin Port Based on PCA-SVR in the New Era . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jinyu Wei, Yuqiao Tang, Yang Yu, and Xueshan Sun

45

Research on Automatic Detection Method of Part Shape Based on Projection Optics and Image Processing . . . . . . . . . . . . . . . . . . . . . . Xiangyang Sun, Binggao He, Can Wang, and Yuegang Fu

53

Signal Detection, Processing and Challenges of Non-invasive Brain-Computer Interface Technology . . . . . . . . . . . . . . . . . . . . . . . . . . Xiaoyuan Li, Feng Chen, Yaohui Jia, and Xinyu Liu

60

An Iterative Model from Grid Cells to Place Cells . . . . . . . . . . . . . . . . . Naigong Yu, Yishen Liao, Xiangguo Zheng, and Hui Feng Visual Stabilization of Wheeled Mobile Robots with Unknown Visual Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Yao Huang and Jianbo Su

68

79

v

vi

Contents

A Game Model for Gomoku Based on Deep Learning and Monte Carlo Tree Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Xiali Li, Shuai He, Licheng Wu, Daiyao Chen, and Yue Zhao

88

Cascading Failure Analysis of Military Command and Control Network Based on SIS Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Jichao Xing, Zhaoliang Zhu, Chuxiang Chen, and Xiaofeng Guo

98

Laser Scan Matching in Polar Coordinates Using Gaussian Process . . . 106 Yinqiang Wang, Bo Li, Bo Han, Yu Zhang, and Wenjie Zhao An Evolutionary Membrane Algorithm Based on Competition Mechanism for Multi-objective Optimization Problems . . . . . . . . . . . . . 116 Zhiqiang Geng, Yunfei Cui, and Yongming Han Design of Intelligent Measuring Device for On-line Machining Parts of Lathe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124 Xiangyang Sun, Binggao He, Lijuan Shi, Can Wang, and Yuegang Fu Algorithm Research on Optimizing Ordering and Pricing Policy for Perishable Items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 Xin Yang, Yuan Zhao, Jin-yu Wei, and Yang Yu Facial Expression Recognition System Based on Deep Residual Fusion Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 Haonan Wang, Junhang Ding, Fan Wang, and Zhe Ma Research and Application on Ensemble Learning Methods . . . . . . . . . . 145 Yuzhong Wang Optimal Fault Tolerant Control of Five-Phase Permanent Magnet Synchronous Motor Under One-Phase Open-Circuit Fault . . . . . . . . . . 156 Song Jie Enhanced Pulse Density Modulation for Efficiency Optimization in Inductive Power Transfer Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 Hong Zheng, Rui Bian, and Yubing Gu RGB-D Saliency Object Detection Based on Adaptive Manifolds Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 Lingling Zi, Xin Cong, Yanfei Peng, and Xitao Chen Study of Speed Stabilization Loop for Airborne Photoelectric Platform Based on Active Disturbance Rejection Control . . . . . . . . . . . . . . . . . . . 182 Yongli Bi and Shigang Wang Active Disturbance Rejection Control of Drum Water Level with Generalized Extended State Observer . . . . . . . . . . . . . . . . . . . . . . 191 Cuiping Pu, Jie Ren, and Jianbo Su

Contents

vii

Improved Cuckoo Search Algorithm Based on Exponential Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200 Kun Wang, Xiaofeng Lian, and Bing Pan Autonomous Intelligent Control for Path Following of Unmanned Surface Vessels with Input Constraints . . . . . . . . . . . . . . . . . . . . . . . . . 208 Yalei Yu, Chen Guo, and Haomiao Yu Investigation on Energy Feedback Potentiality of New Hydraulic Interconnected Energy-Regenerative Suspension . . . . . . . . . . . . . . . . . . 216 Zeyu Sun, Ruochen Wang, Xiangpeng Meng, and Qiuiming Jiang Sliding Mode Control with Uncertain Model for a Quadrotor UAV’s Automatic Visual Landing Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226 Qing Fei, Jiaxiang Zhang, Zhengyang Wang, and Xiaosong Huang Depth-Fusion Based on Gaussian Mixture Model for RGB-D Visual SLAM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234 Zhaotong Ding, Ran Huang, and Biao Hu Error Analysis of Dual Antenna UAV Tracking System . . . . . . . . . . . . 243 Shujuan Li, Junhang Ding, and Jianzhi Li Fault Tolerant Control Allocation Based on Adaptive Sliding Mode Control for Distributed-Driven Electric Vehicle . . . . . . . . . . . . . . . . . . . 251 Guohai Liu, Shuangjian Wang, Duo Zhang, Yue Shen, and Zhen Yao Research on Sliding Mode Active Disturbance Rejection Control and Thrust Allocation of Dynamic Positioning System . . . . . . . . . . . . . . 262 Zaiji Piao and Chen Guo Research on Indoor Positioning Method Based on Improved HS-AlexNet Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270 Libiao Zhang, Rui Zhao, Yuqing Liu, Xinyu Yang, and Shipeng Li A Modified Energy and Signal Coordination Control Strategy for a Robotic System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278 Yu Wang, Haisheng Yu, Jinpeng Yu, Herong Wu, and Xudong liu Parameter Optimization Control of Multiple Response Process Based on Hesitant Fuzzy Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287 Jun Wang, Jian-li Yu, Feng-ying Gu, and Hong-Gen Chen Active Disturbance Rejection and Adaptive Backstepping Control for Induction Motor with Smooth Switching of Rotor Flux . . . . . . . . . . 296 Fei Gong, Haisheng Yu, Jinpeng Yu, and Xudong Liu Super-Twisting and Nonsingular Terminal Sliding Mode Direct Torque Control of Induction Motor Drives . . . . . . . . . . . . . . . . . . . . . . 305 Wenchao Lv and Haisheng Yu

viii

Contents

Four Quadrant PMSM Drive System via Backstepping and Hamiltonian Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313 Guanglin Lv, Haisheng Yu, and Xudong Liu Sliding Mode Control of Induction Motor Based on AC-DC-AC Converter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320 Huipeng Zhang and Haisheng Yu Field Environment Intelligent Navigation System for Tomato Transportation Robot Based on Dijkstra . . . . . . . . . . . . . . . . . . . . . . . . 329 Xiaonan Guo, Yifei Chen, Jianwei Zhao, Liu Yang, and Wenwen Gong Reducing Bullwhip Effects in Supply Chain Systems via H 1 Control . . . . Chen Qian and Qingwei Chen

337

Visual-Inertial Localization and Map Summarization Based on Prior Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347 Bo Fu, Yanmei Jiao, Xiaqing Ding, Yue Wang, and Rong Xiong A Deep Learning Method for Heartbeat Detection in ECG Image . . . . . 356 Zewen He, Jinghao Niu, Junhong Ren, Yajun Shi, and Wensheng Zhang Multi-mode Design and Constant Current Control of Hydraulically Interconnected Energy-Regenerative Suspension . . . . . . . . . . . . . . . . . . 364 Ruochen Wang, Dong Sun, Renkai Ding, and Xiangpeng Meng A Temperature Control Method for Car Room Based on Single User Personalized Comfort . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373 Nan Ye, Lin-hua Zhuang, and Ning Li Three-Dimensional Trajectory Optimization Design of Parafoil System Obstacle Avoidance Based on Switched System Method . . . . . . 382 Qiaodan Liu and Xiang Wu Design of Automatic Illumination Culture System for Haematococcus pluvialis Based on LED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393 Shigang Cui, Xinqi Li, Yongli Zhang, Xingli Wu, and Lin He Study on pH Control of Haematococcus pluvialis Solution Based on Neural Network Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401 Shigang Cui, Yunqi Huang, Lin He, Yongli Zhang, and Xingli Wu An Autoencoder-Based Dimensionality Reduction Algorithm for Intelligent Clustering of Mineral Deposit Data . . . . . . . . . . . . . . . . . 408 Yan Li, Xiong Luo, Maojian Chen, Yueqin Zhu, and Yang Gao The Pressure Control System for Tea Rolling Based on Fuzzy Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416 Yao Li, Zhe Tang, Fang Qi, and Chunwang Dong

Contents

ix

Design of Differential GPS System Based on BP Neural Network Error Correction for Precision Agriculture . . . . . . . . . . . . . . . . . . . . . . . . . . . 426 Gangshan Wu, Chiyuan Chen, Ning Yang, Haifang Hui, and Peifeng Xu Multi-view Based Pose Alignment Method for Person Re-identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439 Yulei Zhang, Qingjie Zhao, and You Li A Novel Contribution Graph Based Likert Scale Method and Its Application to Real-Time Alarm Evaluation . . . . . . . . . . . . . . . 448 Qun-Xiong Zhu, Rui Ding, Yan-Lin He, and Yuan Xu Research on Optimization of Intelligent Assignment of Crane Task Priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 456 Hexu Sun, Pengcheng Wang, and Zhaoming Lei Optimization of Vehicle Scheduling Within the Steel Enterprises Based on IAGSO Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465 He-xu Sun, Fan Zhao, and Zhaoming Lei Research on Wind Power Optimization Scheduling Based on Improved Plant Growth Simulation Algorithm . . . . . . . . . . . . 473 Hexu Sun, Hang Zhang, and Zhaoming Lei An Improved BING/NMS Algorithm for Aircraft Detection . . . . . . . . . 482 Jianxin Feng, Junmei Liu, and Chengsheng Pan Research on Wind Power Consumption Dispatching Based on Improved Whale Optimization Algorithm . . . . . . . . . . . . . . . . 494 Hexu Sun, Wei Zhang, and Zhaoming Lei Time Delay Estimation Based PD Sliding Mode Control of Hybrid Robot for Automobile Electro-Coating Conveying . . . . . . . . . . . . . . . . . 503 Qiuyue Qin, Guoqin Gao, and Shilin Lei A Predictive Speed Control Method Based on Sliding Mode Model for PMSM Drive System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 512 Qian Guo and Tianhong Pan The Optimal Mars Entry Guidance with External Disturbance Using Neural Network Solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 521 Maomao Li and Ruike Guo Fault Tolerant Control for Five-Phase Synchronous Reluctance Motor by Third Harmonic Current Injection . . . . . . . . . . . . . . . . . . . . . . . . . . 529 Guohai Liu, Jiajun Ni, and Qian Chen Echo State Network with Hub Property . . . . . . . . . . . . . . . . . . . . . . . . . 537 Fanjun Li, Ying Li, and Xiaohong Wang

x

Contents

Robust Control of Fractional-Order Horizontal Platform System with Input Saturation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545 Xiaomin Tian and Zhong Yang IoT System Data Quality Optimization: Research Status and Problem Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553 Haoyu Jiang, Jiacheng Ji, Quanbo Ge, and Chunxi Li Numerical Verification and Robotic Application of New DTZD Algorithm for Solving System of Time-Varying Nonlinear Equations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562 Zhijing Huang, Xinjie Lin, Yiwen Zhang, Zhixin Zhang, and Dongsheng Guo Fault Detection Based on Multi-local SVDD with Generalized Additive Kernels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 571 Huangang Wang, Daoming Li, Junwu Zhou, and Xu Wang A Cooperative Target 3D Tracking Method Based on EPnP and Adaptive Kalman Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 580 Haodong Ding, Kun Liu, Peng Chen, and Haiyong Chen Adaptive Sliding Mode Control for a 6 DOFs Magnetic Levitation System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 592 Meng Duan, Yingmin Jia, Kai Gong, and Yuxin Jia Research on the Intelligent Control System for Solar Greenhouse in Consideration of Indoor Dynamic Environment Information . . . . . . . 603 Wenwen Gong, Dong Pu, Xiaonan Guo, Xiangnan Zhang, and Yifei Chen Recursive Relaxation Algorithm for Identification of Multiple Input Multiple Output Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 611 Ying Zhou, Jing-song Yang, Tong Wang, and Hong Wang Image Restoration Based on Wavelet Semi-soft Threshold Transform and BP Fuzzy Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 620 Wenjing Pei and Yingmin Jia An Iterative Parameter Tuning Method for Robot Joint Motor’s Sliding Mode Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 629 Jie Li, Haibo Yu, Yanbo Wang, Bokai Xuan, and Zhe Chen Fault Feature Extraction of Wind Turbine Rolling Bearing Based on PSO-VMD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 638 Ping Zhang and Jingmin Yan Quantized Kernel Learning Filter with Maximum Mixture Correntropy Criterion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 647 Lin Chu and Wenling Li

Contents

xi

Discovering Bursty Events Based on Enhanced Bursty Term Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 656 Liyan Zhou, Junping Du, Wanqiu Cui, Zhe Xue, and Chengcai Chen Dynamic Job Shop Scheduling Problem with New Job Arrivals: A Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 664 Zhen Wang, Jihui Zhang, and Jianfei Si Overview of Longitudinal and Lateral Control for Intelligent Vehicle Path Tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 672 Tengfei Fu, Chenwei Yao, Mohan Long, Mingqin Gu, and Zhiyuan Liu The Development of Web Application Front-End of Intelligent Clinic Based on Vue.js . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 683 Minghang Li, Jianghai Hu, and Xianwu Lin Topic Detection Based on Semantics, Time and Social Relationship . . . 691 Pengchao Cheng, Junping Du, Feifei Kou, Zhe Xue, and Peihua Chen Research on Metadata System and Model of Military Logistics Information Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 699 Jun Wang, DaRong Ling, Wenbing Liu, Siying Hu, and Fan Jiang A General Technique to Combine Off-Policy Reinforcement Learning Algorithms with Satellite Attitude Control . . . . . . . . . . . . . . . . . . . . . . . 709 Jian Zhang, Fengge Wu, Junsuo Zhao, and Fanjiang Xu Finite-Time Event-Triggered Attitude Consensus Control for Multiple Unmanned Surface Vessels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 720 Sichen Liu, Qing Fei, Changwen Wu, and Xiaosong Huang Kinect-Based Gesture Tracking in Remote Operation of Rocket Casket . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 728 Jianxin Zhang, Xiaowang Jiang, Guolei Wang, Zhiliang Chen, and Wenzhu Deng Water Quality Modeling and Prediction Method Based on Sparse Recurrent Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 736 Zhenbo Cheng, Zhengyuan Shen, Tianqi Zhu, Huaidi Lin, and Leilei Zhang

Research on Combat Deduction Platform Technology for Intelligent Operational Decision Xin Liao1,2(&)

and Zheng-hao Sun1,2

1

2

Aerospace System Development Research Center, China Aerospace Science and Technology Corporation, Beijing 100094, China [email protected] R&D Center, China Academy of Launch Vehicle Technology, Beijing 100076, China

Abstract. Artificial intelligence technology is expected to become a powerful force to promote the evolution of war patterns in the future. AI technology has the ability to use data fusion for rapid decision-making, and will become a key supporting technology for operational command. This paper analyzes the relation between military and intelligent decision-making, analyzes the structural characteristics of combat problems according to the requirements of command decision-making learning and training of artificial intelligence, proposes a design idea of antagonistic deduction platform, and explains the key problems in its architecture design, as well as the data exchange method between platform and intelligent learning methods. Finally, the system implementation and technical verification are carried out in a small area denial scenario. The platform supports the access to intelligent command program based on autonomous game decision net, can run real-time intelligent confrontation under asymmetric information, and provides intelligent opponent and benchmark for combat command training. Keywords: Artificial intelligence Combat deduction

 Assistant decision-making 

1 Introduction The development and application of intelligent technology has brought ceaseless changes to the military field. As a groundbreaking technology in the development pattern of science and technology, if applied in the battlefield, AI technology will become a multiplier of battlefield intelligent perception and information processing. It will greatly enhance the capability of a specific link or a single technology in the battle process, leading to the change of the overall war form. Nowadays, the new equipment and new combat concepts such as unmanned military platform, bionic robot, soldier’s physical fitness/intelligent assistant equipment, intelligent command and control assistant decision-making and so on in the fields of intelligent perception and information processing are emerging in endlessly. Among © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 1–13, 2020. https://doi.org/10.1007/978-981-32-9050-1_1

2

X. Liao and Z. Sun

them, developing battlefield situation understanding and rapid decision-making ability based on multidimensional information, realizing battlefield integrated perception and the intelligence of decision-making, and applying it to command and control intelligent assistant decision-making or pre-war global confrontation deduction required in future warfare, has been one of the research hot-spots in the field of military intelligence [1]. Intelligent algorithms, application scenarios and data are the three main elements of the application of intelligent technology. In order to introduce the reinforcement learning method into the decision-making of combat command, it is necessary to analyze and extract the application scenarios, that is, the combat mode, and then visualize, and establish a combat simulation environment that can simulate the realtime confrontation of all parties in the operation, so as to provide effective training data, learning environment and verification method for the deep reinforcement learning method. This paper focuses on how to construct the deduction platform of combat confrontation supporting AI, and analyzes the key problems of military intelligent decision-making, analyzes the wide-area denial combat scenarios, proposes an integrated technical framework of combat decision-making training and demonstration for machine learning needs, integrates military models such as sea, air and rocket under limited scenarios, and defines the overall combat scenario and equipment rules. It supports equipment operating strategy confrontation under uncertain and incomplete information conditions, forms an effective training data source of intelligent algorithm, completes the early part of technical verification of operational command intelligence, and lay a technical foundation for operational decision-making of high dynamic confrontation including multi-services and arms under simulated real scenarios.

2 Military and Intelligent Decision Making One of the starting points of AI is to optimize decision-making, and then achieve the best result, which is the same problem faced by many other fields, including military command and operations. In recent years, a series of new research achievements, such as deep reinforcement learning technology and Multi-Agent Reinforcement Learning method, have brought opportunities to the intelligence of operational command information system. AI go player AlphaGo [2], AI assistants for fighter pilots ALPHA [3], DeepStack [4], Libratus [5] and other AI programs, in chess, flight, card games, Star-Craft and other confrontational scenarios to challenge human players, trying to collect data from their own side and the other side within a limited time, analyze the current situation and predict the other side’s actions in real time, and then make the correct response. Some strategy controllers work unexpectedly and even surpass human beings in some cases. In some cases, it is necessary to consider how to make reasoning and planning under incomplete information, and even to use multi-agent cooperation in complex tasks to measure the short-term/long-term benefit balance. This kind of game can actually be seen as a partial simplification of the real battlefield. The implementation

Research on Combat Deduction Platform Technology

3

mode of AI controller, including multi-agent learning architecture, can provide effective reference for intelligent decision-making in combat scenarios from the following two aspects. Firstly, in the traditional battle command mode, the understanding of the integrated battlefield situation largely depends on the commander’s intuitive judgment. When confronted with incomplete information and too complex weaponry, it is difficult for commanders to conduct effective command of system-of-systems confrontation operations. Only a small number of expert commanders who have been engaged in equipment development and command training for a long time can make relatively good judgments. Compared with manual information analysis, AI has great advantages in massive data search, storage, calculation and mining. Using Value Network algorithm similar to AlphaGo to judge the situation of chess and the probability of winning or losing can provide data support for commanders to understand the battlefield situation, help commanders to achieve rapid decision-making, and gain strategic priority in battle command. Secondly, the traditional auxiliary methods of war situation deduction are limited by the prior knowledge of the participants and the unclear use of equipment, which has limited assistant decision-making role for commanders. With the development of indepth learning methods and deepening research, AI technology has gradually changed from sample learning mode based on massive data to self-learning evolution mode in small sample or no sample environment. Algorithms such as deep reinforcement learning, multi-agent learning and migration learning can improve the command ability of intelligent assistants and provide assistant support for commanders decision-making [6]. Of course, because the complexity of war is much more than the regular games, AI has a long way to go if we want to truly realize the simulation and decision support of war [7].

3 Analysis and Modeling of Operational Problems Operational process generally includes “detection, control, judgment, fight and evaluation” processes, involving “information chain”, “command chain”, “strike chain” and multiple links collaboration. It requires that under the support of interconnected information network, multiple parts seamless connection, efficient collaboration, forming a closed loop, realizing the information flow to tract material flow, and win operational advantage with information advantage. In order to achieve effective simulation of combat confrontation process, this paper simplifies and abstracts the combat scenario, and constructs a complete multidimensional combat process link by using weapon equipment platform and capability model, combat rules model based on expert system and combat deduction environment model, as shown in Fig. 1.

4

X. Liao and Z. Sun

Fig. 1. Model combination diagram

3.1

Weapon Equipment Platform and Capability Model

The model system of combat deduction platform research should cover all types of weapons and equipment involved in combat scenario. At the same time, the equipment behavior of both sides should be analyzed in combination with the respective decisionmaking modes of the two sides, and the model system and behavior response suitable for both sides operation should be constructed. The model system is divided into red-square model set and blue-square model set according to combat. In the current scenario, the model set is responsible for the capability, behavior and response of land, sea, air and space equipment, including the capabilities of damage, detection, maneuvering, penetration, communication and information confrontation. Red and blue are back-to-back confrontations, and their perceptions are limited. They can only get the situation information of each other through the detection and monitoring means. 3.2

Operational Rule Model Based on Expert System

The operational rule model is equivalent to the director/referee role in the operational confrontation deduction platform. Based on the weapon equipment platform and capability model, the basic operational interaction rules of the red and blue sides in their respective operational objectives and confrontation are stipulated, and the initial operational resources are allocated. In the process of deduction, expert system is used to make decision, and the rules of confrontation arbitration between red and blue parties are given. The operational rules model defines the constraint rules from the aspects of battlefield overall situation, operational interaction and system deduction, including interception rules, missile launching rules, equipment deployment rules, deduction event triggering rules, communication rules, environment constraint rules, mission rules and mission evaluation rules. 3.3

Battle Deduction Environment Model

Environmental model is the basic model in operational deduction, including morningdusk model (solar model), meteorological environment model and geographic

Research on Combat Deduction Platform Technology

5

environment model (terrain, road network, sea state, navigation channel). Through the definition and management of these environments, environmental impact factors are provided for weapon equipment model, and the impact of different battlefield environment research on operational process can be analyzed.

4 Architecture Design of Battle Deduction Platform Supporting AI Aiming at the requirements of intelligent command training and application, the promotion mechanism and application environment technology suitable for multi-agent joint operation are studied. A scalable, flexible and fast human-computer interaction platform is constructed to realize the functions of training process management, confrontation process promotion, model management, event and message management, data recording and acquisition, human-computer interaction interface and so on. The battle deduction platform supporting AI needs to be deployed from four levels: hardware platform, system layer, management service layer and application layer. The hardware platform provides AI-oriented architecture design, using GPU and FGPA to provide fast training and reasoning computing resources; the system layer manages, dispatches and monitors computing resources for complex computing environment, deploys management infrastructure system to achieve effective utilization of the system; and the management service layer aims at the core of operational countermeasures data training and verification business on the basis of the system layer. It encapsulates general functions in the form of modules, which are provided to the application layer for invocation. The application layer mainly provides direct display interface for users, and designs deep learning model and algorithm for practical application requirements. The four-tier structure is shown in the following Fig. 2.

Fig. 2. Platform overall hierarchy division

6

X. Liao and Z. Sun

Combat deduction platform provides three modes: man-machine confrontation, man-to-man confrontation and machine confrontation. It integrates the data of personnel participating in confrontation and self-learning data, updates the training model by using the evaluated data, and provides self-labeling, aggregation and adjustment of training data. Compared with the traditional confrontation simulation system, the deduction platform studied in this paper improves the process propulsion technology, battlefield situation data interface and situation display mode aimed at the requirements of intelligent technology. 4.1

Propulsion Engine Based on Intelligent Rules

In order to meet the needs of data training and learning, the combat deduction platform needs to meet the needs of both the speediness of process advancement and the embedded operation of operational decision. On the one hand, it is necessary to control a large amount of time-consuming weapon equipment action time and quickly accumulate the results of confrontation as training data. On the other hand, it is necessary to leave operating space for the action instructions given by the strategy controller. Therefore, multiple modes and variable step-size propulsion mechanism is adopted to support multi-trigger mode to meet the real-time acceleration and deceleration needs of both sides in the course of confrontation. With the unified management of simulation time, the functions of simulation time advance, pause and acceleration are realized, and the simulation time with different synchronization is unified to drive the simulation process and synchronize the model. At the same time, the current simulation time is pushed to both sides of the confrontation and each situation display side. In the system design, the function of counteracting real-time interference is added. In the time step, the adjusted rule map is integrated with the current combat situation to realize the control of combat confrontation. Based on operational model, rules of engagement and basic data, the adjustment of operational process and command and control activities is completed. The contents of adjustment include troop deployment, force formation, equipment configuration, task allocation plan, operation time and steps, etc. Adding model run triggers to the system, adding the definition interface of state, time and event triggers, and providing the definition of the relationship between various triggers and combat phases, as shown in Fig. 3.

Research on Combat Deduction Platform Technology

7

Fig. 3. Process propulsion diagram

4.2

Intelligent Tactical Decision and Situation Awareness Interface Technology

In combat confrontation, AI agents or people are required to give tactical decisionmaking actions according to the change of battlefield situation, including equipment configuration, supply, attack, penetration and defense actions. The battlefield situation awareness interface involves the description of environmental uncertainty, the expression of multidimensional and massive situation information, and the comprehensive quantitative analysis technology of threat situation. In order to improve the accuracy of situation awareness and provide more abundant local information, battlefield situation includes not only the information of the current confrontation space state, but also the information of the historical process of each past round. Therefore, battlefield situation awareness is not only a problem of modeling and transferring complex static data (data at a time in confrontation space), but also a problem of modeling dynamic sequential data. 4.3

Multidimensional Confrontation Situation and Evolution Display of AI Learning

In the process of AI learning evolution, we need to understand the probability distribution of all possible deployment and utilization of the opponent’s military resources, and update the probability distribution as the game progresses. Therefore, it is necessary to integrate the learning results of each stage of intelligent evolution and display the key information intuitively through the interface. 2D and 3D perspectives can show the different focus of the combat process. Using the characteristics of 2D map, which is easy to display and understand, we focus on the battlefield situation, and show the global and local situation of the battlefield by color, block, data and chart. The use of 3D maps is conducive to display the characteristics of space confrontation, focusing on the global battlefield environment, space confrontation situation, while switching to

8

X. Liao and Z. Sun

close-range camera to focus on the impact factors and evaluation results of single, single and local objects.

5 Learning Framework of Confrontation Strategies In the intelligence of combat decision-making, it is necessary to select appropriate intelligent learning methods to test and find the best model of battlefield situation understanding and trend prediction. Deep reinforcement learning combines the perception ability of deep learning with the decision-making ability of reinforcement learning. It can continuously carry out end-to-end learning through simulation and deduction, and realize direct control from original input to output. Combining with combat confrontation deduction platform, it can effectively realize combat assistant decision-making ability. Deep learning combines the characteristics of battlefield situation and decision-making factors by using the multi-layer network structure and the non-linear transformation between the multi-layers to form an abstract and more accurate high-level representation, which has a better effect on battlefield situation perception, analysis and understanding. The cumulative reward value gained by reinforcement learning through deduction and operation, which constantly revises the network, is very suitable for solving the problem of limited amount of data such as combat assistant decision-making. Combining deep learning with reinforcement learning, the learning data are generated by antagonistic deduction platform, and the circulation path of information flow and decision-making flow is established. The learning process of operating strategy is shown in Fig. 4. The state information in the perception domain is acquired by the combat deduction platform, and then the perception information is extracted and analyzed, and integrated into the battlefield state. The decision network inputs decision space and battlefield state, and outputs optimal decision. The network evaluates the quality of the actions selected by the decision-making network, and generates prediction differences to guide the updating of the network.

Fig. 4. Schematic diagram of learning framework for confrontation strategies

Research on Combat Deduction Platform Technology

9

In the process of continuous reinforcement learning, the action reward given by battlefield situation determines the quality of action. In order to win the final battle decision-making, it is necessary to evaluate every strategic node in the battlefield, that is, the action space in the current state, until the best action decision-making sequence is found.

6 Verification Examples Taking the deduction platform as the basic framework and the local area of the East China Sea as the confrontation scenario, the unit models of anti-ship missile, launcher, satellite, destroyer and cruise missile are constructed, and the confrontation strategy learning and verification of small-scale missile combat cluster against warship formation battle group based on RESNET network are realized, including time-sensitive target and missile attack and defense under incomplete information. There are two kinds of reconnaissance-strike-evaluation loops in war. In a given scenario, the AI commander’s ultimate success rate exceeds the human average by 15%. In this example, the command decision process is simplified, the information transmission system is omitted, and the command decision process is simulated by AI command system outside the platform. The simulation of attack process, defense process and sensor detection process are considered in the process of warfare confrontation. Design details such as the capability unit model are as indicated below. 6.1

Capability Unit Model

The application background of the validation example is the denial battle in the smallscale coastal battlefield, so the red and blue weapon systems only consider the movable platform, including multiple anti-ship missile, launcher, satellite, destroyer and cruise missile. The red side considers anti-ship missiles, launch vehicles and satellites. The blue side considers satellites, destroyers and cruise bombs. The action decision space of the unit model involved in the example is shown in Fig. 5. Missile Model. The missile model includes anti-ship missile and cruise missile. It has the ability of target terminal detection, terminal guidance, mid-range maneuver and damage. The key type parameters of missile model include name, type, range, speed, launch preparation time, cruise altitude and terminal guidance distance. Missile operation includes launching, medium range maneuver and explosion. Satellite Model. The satellite model is responsible for the operation of the satellite platform, and its key type parameters include orbit parameters, load and orbit time. Missile Launcher Model. The missile launcher model is responsible for concealing the speed, erection, withdrawal, reloading, concealment and withdrawal of the missile launcher. The operation of missile launcher includes single movement, state operation, formation movement and salvo.

10

X. Liao and Z. Sun

Fig. 5. Action decision space of unit model

Ship Model. The ship model is responsible for the navigation of the fleet. Ship operation includes attack missile launching, interceptor missile launching, shipborne radar switch, formation movement and salvo launching. Base Model. Each base model includes multiple positions, which are connected by road network and responsible for the operation and transfer of missile launchers. Damage Capability Model. The damage capability model is responsible for managing the warhead characteristics on the red and blue attack bombs. The key parameters include the type of damage target, damage capability and damage range.

Research on Combat Deduction Platform Technology

11

Defense Capability Model. The defense capability model is responsible for managing the defense characteristics on the red base. Its key parameters include defensive target type, defensive capability and defensive scope. Detection Capability Model. The detection capability model includes three kinds of payload: infrared loads on satellites, electronic reconnaissance loads and radar detection loads on ships. Its key parameters include load type, detection target type, detection range and so on. 6.2

Model of Operational Rules

The platform implements regular statistical item definition, which supports users to customize statistical items that need statistics and analysis, and supports more flexible evaluation of system against deduction. Equipment Behavior Rules. The behavior rules are for a single type of equipment. For different types of equipment, a number of groups of behavior rules are established. For example, for missile model, there are rules such as missile strike range limitation and target type limitation. Rules of Conduct. Behavior rules include rules that equipment need to follow when equipment is maneuvering, damage confrontation and detection confrontation. Rules of Termination. The rules of termination are responsible for determining whether the red and blue sides have reached the winning or losing termination conditions at each step. The factors that can be considered include the battle damage situation, the firepower survival situation, the battle process of both sides and so on. 6.3

Confrontation Environment Model

According to the background and requirement of AI confrontation, the definition and realization of geographical environment, morning and evening environment and road network in local battlefield are completed. 6.4

Intelligent Tactical Decision and Situation Awareness Interface

Aiming at the basic process of AI learning, the decision-making and perception interface between man-machine confrontation platform and AI model is designed to support training and confrontation simulation of missile, satellite, destroyer and other models, and the exchange mechanism between man-machine interface port and AI interaction port is also supported. Among them, the situation feedback interface realizes the initialization data interface including base, vehicle, missile and other models, as well as the deduced state data interface of vehicle, missile, ship, victory or defeat results, which can be used in step-by-step confrontation. According to the basic functional requirements, the control interface realizes the vehicle, ship movement command, launch vehicle release command and missile launch command. The typical interface sketch of the confrontation platform is shown in Figs. 6, 7 and 8.

12

X. Liao and Z. Sun

Fig. 6. Diagram of ship detection capability

Fig. 7. Diagram of satellite overhead detection capability

Fig. 8. Diagram of missile strike scenario

7 Conclusions Future warfare will show the characteristics of multidimensional battlefield, complex weapon use and diversified forms of confrontation, which will pose a high challenge to the wartime situation analysis, assessment and mission decision-making of our commanders. By building the platform of human-machine intelligent confrontation and deduction supporting AI, this paper explores the technological ways to realize the ability of self-evaluation of multidimensional complex situation and the ability of self-

Research on Combat Deduction Platform Technology

13

assisted decision-making based on AI, which can provide high-level opponents and benchmarks for the commander system’s operational command training, situation analysis, scheme generation and assistant decision-making support for the system’s operational command. The development of war command and confrontation control is of great significance.

References 1. Hu X, Guo S, He X (2016) Intelligent challenge of command information system - “deep green” plan and enlightenment and reflection from AlphaGo. Command Inf Syst Technol 7 (3):1–7 2. Hu X, He X, Tao J (2017) AlphaGo’s breakthrough and the challenge of chess deduction. Sci Technol Rep 35(21):49–60 3. Ma S (2017) AI pilots win over human pilots. Aviat World 44–47 4. Wang L (2017) Technical analysis of deep stack artificial intelligence system defeating texas poker professionals. Defense Perspect 64 5. Zhang X (2017) Hot spots in artificial intelligence in 2017. Big Data Era 6:69–71 6. Jin X (2018) Research on decomposition of intelligent command and control problems. J Command Control 3:64–68 7. Zhu F, Hu X, Wu L, He X, Lu X, Liao Y (2018) From situation cognition to situation intelligence cognition. J Syst Simul 3:761–771

Study of the Auxiliary Robot Used to Disassemb and Assemb Mid-Set Switch Cubicle Based on BCI Weiwei Huang(&), Bihui Zhang, and Rui Li Zhaotong Power Supply Bureau of Yunnan Power Grid Co., Ltd., Zhaotong 657000, Yunnan, China [email protected]

Abstract. In order to solve the problem that the working space of the central switchgear is limited or the current transformer is limited, and the single person cannot complete the operation, the brain-computer interface (BCI) technology is applied to the actual operation. In this paper, the d (0–4 Hz) and h(4–8 Hz) subbands of EEG signals are obtained by wavelet decomposition (WD). The relationship between the 14 pairs of EEG channels was determined using the Pearson correlation coefficient. The motion characteristics are then analyzed using the validity of brain network parameters. At the same time, eye movement features are extracted from the F3 and F4 channels. Finally, the movement characteristics identified by the brain network and eye movement features can aid in the disassembly and assembly of the transformer. The experimental results show that the accuracy of left and right motion recognition is over 97%. Compared with the traditional disassembly method, the efficiency has increased by nearly 60%. Keywords: Mid-set switch cubicle  Current transformer Disassemb and assemb  BCI  Brain networks



1 Introduction Research shows that the central switchgear is a kind of power equipment widely used in the power industry. However, when we maintain a central switchgear, it is difficult to disassemble or assemble the current transformer. The traditional operation requires two people to work together. One person lifts a current transformer with a weight of 30 kg in the middle switch cabinet with limited working space, and the other person disassembles or assembles the current transformer. However, this mode of operation is inefficient. It is easy to cause potential safety hazards of current transformer sliding, breaking or falling injury [1]. In practical application, due to the interference of environmental vibration factors in power plant, the originally aligned screw holes often slide left or right, which causes the bolt to become to be jammed (Fig. 1). Therefore, we need to develop an auxiliary device that can perform appropriate left and right fine adjustment of the current transformer position to meet the needs of transformer disassembly. © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 14–21, 2020. https://doi.org/10.1007/978-981-32-9050-1_2

Study of the Auxiliary Robot

15

The BCI technology is a method of direct communication between the brain and the controlled device using signal acquisition and processing equipment [2]. This technology makes it possible to use the human brain to directly control external devices to help humans complete related operations [3–5]. Previous studies have shown that modern complex network theory is widely used to simulate brain function [6–8]. Combined with the characteristics of the EOG signal, the BCI technology is applied to the control of the left and right motion of the auxiliary robot. This method can ensure that the screw holes on the current transformer are aligned with the screw holes on the fixing plate of the middle switch cabinet, thereby smoothly completing the bolt removal operation. The experimental results show that the method adopts BCI technology, and only one person can complete the operation, which facilitates the disassembly or assembly operation of the current transformer.

Fig. 1. The operation of disassembly or assembly current transformer in mid-set switch cubicle

2 Algorithm 2.1

The Characteristics Analysis of Eye Movement

When one eye moves, an important EOG signal appears in the frontal lobe of the brain, which is the active area of the eye signal. This study used the channels AF3 and AF4 to study the characteristics of eye movement. It is worth noting that the waveform in Fig. 2 is symmetrical when the eye is moving. Figure 2 shows the EOG signal for monocular motion extracted from channels AF3 and AF4. Then the relationship between AF3 and AF4 was analyzed by using Pearson correlation coefficient. The Pearson correlation coefficient is expressed as: rXY ¼

E½ðX  EðXÞÞðY  EðYÞÞ EðXYÞ  EðXÞEðYÞ ¼ rX rY rX rY

ð1Þ

16

W. Huang et al.

Fig. 2. Eye movement signals

Where E() is the expectation operator, and a sequence consisting of n data samples needs to be calculated. Correspondingly, the correlation coefficient is calculated as follows:

rXY

n P xi yi  nxy n X 1 xi  x yi  y i¼1 ¼ ð Þð Þ¼ n  1 i¼1 rX rY ðn  1ÞrX rY

ð2Þ

In this paper, the moving window of n = 35 is used to calculate the eye movement signals of AF3 and AF4 channels. An eye movement can be recorded only if the correlation coefficient calculated by Eq. (2) satisfies the condition −1 < Rxy < −0.8. 2.2

The Complex Brain Networks

Nodes and edges are two important elements of a graph. The graph-based approach is to construct the brain network by using the various regions of the brain as a “node” and connecting the connections between the various regions of the brain as a “edge.” [9, 10]. In this study, we used the clustering efficiency and global efficiency of complex brain networks to analyze differences in brain function of operators. Clustering Coefficient. The connectivity of a node refers to the number of edges connected to the node, which can indicate the importance of the node in the network. It can be expressed as. Ci ¼

Ei Di ðDi  1Þ=2

ð3Þ

Where Ei is the number of existing edges between adjacent nodes of node i, and Di is the degree of connectivity of the node. Di(di − 1)/2 is the maximum possible number of edges between adjacent nodes of node i [10].

Study of the Auxiliary Robot

17

3 Experiment 3.1

Subjects

Twelve healthy subjects (10 males and 2 females, age 26 ± 1.8 (s.d)) were randomly selected from the volunteers for the experiment. All subjects had no sleep related diseases. Moreover, no type of stimulant is allowed during the experience. Figure 3 shows the experimental set-up. 3.2

Experimental Process

The Emotiv, As a portable EEG acquisition device, the sampling frequency is 128 Hz. Use under actual driving conditions. The electrodes were pressed against the scalp according to the International 10–20 system (14 channels = AF3, AF4, F3, F4, FC5, FC6, F7, F8, T7, T8, P7, P8, O1 and O2). The test is carried out in the power plant workshop environment, and the surrounding environment has the characteristics of strong magnetic field, strong noise and frequent vibration. Each participant conducted two types of experiments. One type is that the subject observes the cross mark (Fig. 4) and then moves the eye to the end of the left yellow arrow. The eye movement process was completed in 0.5 s and then the subject moved the eyes back to observe the cross mark. The other type is that the subject observes the cross mark (Fig. 4) and then moves the eye to the right black arrow. The experimental procedure is the same as the previous experiment. The visual stimulation model is shown in Fig. 4.

Fig. 3. Experimental set-up

3.3

Data Preprocessing

In the experiment, the EEG signal is sensitive to noise. Therefore, signal noise must first be eliminated. In the present study, EEG signals of 0.5 Hz and 32 Hz were obtained by Butterworth high-pass and low-pass filters. The EEG signal is then divided into a low wavelet coefficient and a high wavelet coefficient. These low and high

18

W. Huang et al.

Fig. 4. The model of visual evoked stimulation

wavelet coefficients are further divided into a second high wavelet coefficient and a second low wavelet coefficient. From the original EEG signals we get d (0–4 Hz) and (4–8 Hz).

4 Results In the actual production site of the power plant, there are strong magnetic field, strong noise and mechanical vibration factors around the mid-set switch cubicle, which bring some difficulties to the identification of EEG motion characteristics. in this paper, the characteristics of the human brain network are combined with the characteristics of the eyeball motion signals in the moving image, and the characteristics of the human brain motion characteristic signals are comprehensively recognized. 4.1

Characteristics of Brain Network

Taking the brain signals of the main brain regions in this study as the research object, The correlation coefficient between each two electrode channel signals is calculated. and constructed a brain network, which was shown in Fig. 5.

10

8

8

6

6

4

4

Y

Y

10

2

2

0

0 -2 -2

0

2

X

4

6

(a) Move to the left

8

-2 -2

0

2

X

4

6

(b) Move to the right

Fig. 5. The brain networks when moving right and left

8

Study of the Auxiliary Robot

19

As can be seen from Fig. 5, when the eye is rotated to the left, the connection density of the corresponding right brain network is significantly lower than that of the left brain. Conversely, when the eye moves to the right, the connection density of the left brain electrode is significantly lower than that of the right brain, which means that when the brain performs motor activity, the relevant brain region is in a neural activity state, and signal synchronism is poor. Figure 6 shows a comparison between clustering coefficients of brain network parameters and global variables as the subject moves left and right.

(a) Move to the left

(b) Move to the right

Fig. 6. The comparison of brain network parameters when a subject turns right or left

As can be seen from Fig. 6, for one subject, There is a significant difference between the brain network clustering coefficient and the overall efficiency corresponding to the left and right movement thinking imagination. In the experiment, when subjects are visually induced to move leftward, The density of attachment of the right hemisphere is less than the density of attachment of the left hemisphere, and the corresponding clustering coefficient and global efficiency value of the left cerebral hemisphere are greater than that of the right cerebral hemisphere. This means that the right hemisphere of the human brain is relatively active at this time, and each neuron cluster completes its own neural activity. So the correlation of neuron cluster activity in each brain region is relatively small, while the neural activity in the left hemisphere of the brain is inhibited, and the activities of each neuron cluster tend to be consistent and have relatively large correlation. 4.2

Comprehensive Judgment

In the actual production site of the power plant, there are strong magnetic field, strong noise and mechanical vibration factors around the central cabinet, which brings some difficulties to EEG signal acquisition, especially the recognition of EEG motion characteristics. In this study, the EEG motion characteristics were comprehensively recognized by combining the characteristics of eye motion signals and ERP-induced stimulus motion imagination. In our paper, we construct the brain network for the subsequent EEG signals, calculate the global efficiency and clustering coefficient corresponding to the brain network of the left and right hemispheres after recognizing

20

W. Huang et al.

that the time domain signal has left and right eye movement fluctuations by formula (2), and finally determine the movement direction according to the logical relationship between the two. Take leftward movement as an example, the discrimination logic is shown in Fig. 7 below.

Fig. 7. The logic of motion discrimination

5 Discussion In the experiment, the features of brain network and eye movement were used to identify human motion features. Although the recognition rate has reached a high accuracy rate, there are still some interferences and misjudgments, which bring some difficulties to the actual disassembly and assembly operation of the current transform in the mid-set switch cubicle. However, the accuracy rate can reach more than 97% by comprehensive discrimination of the two methods. The results are shown in Table 1. Table 1. Accuracy comparison of motion direction recognition Subject Subject Subject Subject Subject Subject Subject Subject Subject Subject Subject Subject

Brain network Eye movement Comprehensive test 1 80 90 100 2 85 95 100 3 75 85 95 4 85 100 100 5 90 90 100 6 85 100 100 7 85 100 95 8 90 95 95 9 85 90 90 10 80 85 100 11 85 90 95 12 100 100 100

From Table 1, it can be concluded that the comprehensive discrimination method based on human brain network features and eye movement signal features has high recognition accuracy for human left and right movements, which is suitable for recognizing EEG signals in power plant environment. In addition, the contrast between the

Study of the Auxiliary Robot

21

brain machine auxiliary mode and the traditional disassembly and assembly mode is remarkable in the verification process of the actual power plant by adopting the method. In actual disassembly and assembly operations, the traditional disassembly and assembly mode requires two people, and it takes 4–5 min to complete one disassembly and assembly, while the brain machine auxiliary mode requires only one person, and it takes 5–6 min to complete one disassembly and assembly. It can be concluded that the working efficiency of the brain-computer aided mode is improved by nearly 60% compared with the traditional mode.

6 Conclusion In the actual maintenance of the power plant, the disassembly and assembly operation of that current transform in the mid-set switch cubicle, which is not easy for people to cooperate, is time-consuming and labor-consuming. In this study, we apply BCI technology to the actual operation. The method combines ERP visual evoked stimulation technology, adopts portable brain electrical acquisition equipment, collects EEG signals in real time, and extracts EEG motion characteristics. The result proves that the method can be well controlled the left and right motion adjustment of the robot, so that the screw holes of the current conversion and the screw holes of the fixed beam are always consistent. That makes the operation of disassembing or assembing a current transformer is easy and safety, which provides a new method for the maintenance of the mid-set switch cubicle in the power plant.

References 1. Broetz D, Braun C, Weber C et al (2010) Combination of brain-computer interface training and goal-directed physical therapy in chronic stroke: a case report. Neurorehabilitation Neural Repair 24(7):674–679 2. Rai R, Deshpande AV (2016) Fragmentary shape recognition: a BCI study. Comput Aided Des 71:51–64 3. Weisz J, Elvezio C, Allen P K (2013) A user interface for assistive grasping. In: 2013 IEEE/RSJ international conference on intelligent robots and systems. IEEE, pp 3216–3221 4. Bakardjian H, Tanaka T, Cichocki A (2010) Brain control of robotic arm using affective steady-state visual evoked potentials. In: Proceedings of the 5th IASTED International conference human-computer interaction, pp 23–25 5. Kennel M, Hinrichs H, Reichert C et al (2014) A robot for brain–controlled grasping. In: Workshop on HRI 2014, vol 3, p S4 6. Staufenbiel SM, Brouwer AM, Keizer AW et al (2014) Effect of beta and gamma neurofeedback on memory and intelligence in the elderly. Biol Psychol 95:74–85 7. Wang F, Wang H, Fu R (2018) Real-time ECG-based detection of fatigue driving using sample entropy. Entropy 20:196. https://doi.org/10.3390/e20030196 8. Cai SM, Chen W, Liu DB, Tang M, Chen X (2017) Complex network analysis of brain functional connectivity under a multi-step cognitive task. Phys A Stat Mech Appl 466:663–671 9. Kar S, Bhagat M, Routray A (2010) EEG signal analysis for the assessment and quantification of driver’s fatigue. Transp Research Part F Traffic Psychol Behav 13(5):297–306 10. Messé A, Marrelec G, Bellec P et al (2012) Comparing structural and functional graph theory features in the human brain using multimodal MRI. IRBM 33(4):244–253

Ship Detection Based on Faster R-CNN Network in Optical Remote Sensing Images Min Zhai1,2(&), Huaping Liu2, Fuchun Sun2, and Yan Zhang3 1

2

The State Key Laboratory of Astronautic Dynamics, Xi’an Satellite Control Center, Xi’an, China [email protected] The Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China [email protected] 3 Xi’an Satellite Control Center, Xi’an 710043, China

Abstract. A ship detection model based on Faster R-CNN is proposed for ship detection tasks in optical remote sensing images. Deep convolutional neural network could replace traditional manual design feature to extract ship features automatically and quickly from makes the detection performance of ship no longer relying on the design of artificial features. This paper proposes a strategy that combines the model with two different size of convolution neural networks respectively. Experiments on datasets HRSC16 verify the models detection capabilities and the mean average precision can achieve 78.2%. For the problem of low recall rate in the detection of adjacent vessels, this paper adopts the SoftNMS method. Compared with the traditional NMS, the Soft-NMS method can electively improve the model detection performance to 80.1%. At the same time, it also shows that the model we proposed is a robust model and has a certain degree of generalization ability. Keywords: Ship detection

 Faster R-CNN  Deep learning  Soft-NMS

1 Introduction Ship detection has become an increasingly important area, playing a more and more important role in military and civilian fields, such as: land and sea resources scheduling, marine transportation, marine safety and so on. In earlier years, Synthetic Aperture Radar (SAR) images (see in [1]) were usually used for ship detection because they were not affected by light and clouds and could be seen in all kinds of weather. However, one disadvantage of SAR images is that they provide less details on ships and lack color details, which is very important for ship detection, leading to low ship detection accuracy. In recent years, the development of technologies in remote sensing images has made it possible to get many remote sensing satellite images, many researchers have studied the problem of ship detection in optical remote sensing images.

© Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 22–31, 2020. https://doi.org/10.1007/978-981-32-9050-1_3

Ship Detection Based on Faster R-CNN Network in Optical Remote Sensing Images

23

The existing methods are mainly a coarse to fine detection process, which are generally divided into two phases: image preprocessing stage and ship identification stage. The image preprocessing stage mainly includes three operations: image augmentation, cloud removal and sea-land segmentation. The stage of ship identification mainly includes the extraction of candidate and the ship detection. Yang in [2] proposed a model based on the analysis of sea level. Zhang in [3] proposed a method for comprehensively utilizing the SIFT feature points and Harris corners for class identification of ships, which achieves high recognition rate. Zhai in [4] proposed a detection method based on tower keyword histogram and support vector machine. The method can be directly used to classify UAV aerial images or camera images to improve detection speed and accuracy. Li in [5] proposed a method for detecting ships using multi-layer sparse coding. A common disadvantage of these traditional methods is that the accuracy of ship detection depends on the quality of the manual designed features. On the other hand, since the amount of remote sensing images we can gather has grown rapidly, traditional methods can no longer meet the needs of remote sensing image detection under big data. Deep learning has developed rapidly in recent years and has made it possible for the problem of ship detection. Methods such as Faster RCNN [6] based on the idea of the region proposal and YOLO (see in [7]) and SSD (see in [8] based on the regression idea have achieved good performance in object detection. Lin in [9] use the pixel-based FCN network for ship detection, but the small target detection capability is weak, the false alarm rate is high. Zou in [10] used CNN (convolutional neural network) to construct SVD (singular value decomposition) Network for ship detection based on singular value decomposition. Based on Fast RCNN, Liu in [11] used SRBBS (Ship Rotated Bounding-Box Space) as a candidate area generation network for ship detection. Liu in [12] proposed the RR-CNN network based on the Rotated Region. The network can provide more accurate bounding box positions, but the detection accuracy is lower on the public dataset. Since there are not many studies on the use of the Faster R-CNN for ship detection in remote sensing images, a model which is based on Faster R-CNN is proposed to solve the problem of ship detection in optical remote sensing images. Considering that there is a low recall rate when detecting adjacent ship, we use a new NMS method named Soft-NMS [13] to suppress overlapping bounding boxes. The rest of the paper is organized as follows: the related work is introduced in Sect. 2; the detail information of our model is introduced in Sect. 3; the experimental results are shown in Sect. 4 and the conclusion is presented in Sect. 5.

2 Principle of Faster R-CNN Network In this paper, the model we proposed is based on Faster R-CNN framework. Compared with Fast R-CNN, the main improvement is that the region proposal also uses a convolutional neural network. For simply understanding, Faster R-CNN network can be thought as two parts: a region proposal network named RPN and a detection

24

M. Zhai et al.

network named Fast R-CNN network. In Sect. 2.1, the details of RPN are introduced and in Sect. 2.2 how both parts share convolution features in training and test stage are introduced. 2.1

RPN

RPN is used to generate region proposals. The purpose of the RPN network is to directly derive the slide window directly from the convolutional feature map with indefinite positions and sizes, thereby alleviating the calculation pressure of the subsequent network. By adding a RPN network, the training model is simplified, and the speed of training and detection are improved. In RPN structure, Faster R-CNN introduces an anchor mechanism, which generates 3 * 3 anchor points for each sliding window. Therefore, for the bounding box regression layer, each sliding window has 4 * 9 position outputs. For the classification layers, each sliding window has 2 * 9 categories of output. 2.2

Sharing Convolution Features for RPN and Fast R-CNN

In this paper, Fast R-CNN [15] is used as our detection network. During the entire Faster R-CNN network training process, in order to simplify the model and improve training efficiency, the convolutional layer calculation between the RPN and Fast RCNN is shared. The whole training process can be divided into 4 steps: First, we train the RPN which is initialized with an model which is pre-trained on ImageNet and then our RPN will be fine-tuned for region proposal; Second, we train the detection network, during the training process, the proposals generated by RPN will be used; Third, the RPN is initialized by the detection network; At last, the layers of Fast R-CNN will be fine-tuned. The two networks share the same convolutional layers in this way. The training accuracy and speed are improved. The ZF network and VGG16 network are used as the backbone. An pre-trained model on ImageNet is used to initialize the training network.

3 Methods 3.1

Data

Because of the lack of public remote sensing datasets for ship detection, many researchers do their experiments on images collected from Google Earth or other highresolution satellites, such as QuickBird, GF-1, GF-2 satellite. In our experiment, we use the data set named HRSC2016 [14]. HRSC16 dataset contains 1070 images collected from Google Earth which includes ships inshore and on the sea. The image sizes differ from 300  300 to 11500  900. The whole dataset is splited into training sets with 1207 samples in 443 images, validation sets with 541 samples in 183 images, and test sets with 1071 samples in 444 images.

Ship Detection Based on Faster R-CNN Network in Optical Remote Sensing Images

3.2

25

The Detection and Classification System

Our ship detection model is seen in Fig. 1, which can achieve an end-to-end detection system based on deep learning method. After experiments, VGG16 network is chosen as the base network, which is easy to be fine-tuned. As discussed in Sect. 2.1, a RPN network is used to gather region proposals with different scales and aspect ratios. Fast R-CNN [15] is adopted as the detection network. By using the suitable training method, both CNN network can share their convolutional layers, which improves running speed and detection accuracy.

Fig. 1. Ship detection and classification system.

3.3

Training

The system is 64-bit ubuntu; GPU: NVIDIA GTX 1080 Ti; deep learning framework: caffe; program language: python. The initial learning rate is set to 0.001 and is divided by 10 on the 120000th iterations and the 240000th iterations. Loss Function. The loss function of our model is defined as Eq. (1): Lð p i ; b i Þ ¼

    1 X 1 X  Lcls pi ; pi þ k pi Lreg bi ; bi Ncls i Nreg i

ð1Þ

Here, i means the number of the anchor, pi is the predicted probability whether an anchor is going be on object. pi has 2 values: 1 when the anchor is positive and 0 in other situations. bi is represents the bounding box which is predicted by our model, and bi represents the ground truth bounding box. Ncls is usually normalized by the size of a batch and Nreg is usually normalized by the number of anchors. k is usually set 10. Lcls

26

M. Zhai et al.

represents the classi_cation loss and Lreg represents the regression loss, described as follow:   Lreg ¼ R bi  bi where R is the L1 function de_ned as Eq. (2) which is less sensitive to outliers compared with L2 loss.  0:5x2 ; if j xj \1 smoothL1 ð xÞ ¼ ð2Þ j xj  0:5; otherwise For bounding box regression, we parameterize the coordinates as Eq. (3) bd x ¼ ðdx  dxi Þ=wi ; bd y ¼ ðdy  dyi Þ=hi bw ¼ logðw=wi Þ; bh ¼ logðh=hi Þ bpdx ¼ ðdxp  dxi Þ=wi ; bpdy ¼ ðdyp  dyi Þ=hi

ð3Þ

bpw ¼ logðw =wi Þ; bph ¼ logðhp =hi Þ Where ðdx; dyÞ represents of the bounding box’s center coordinates, ðh; wÞ denote the bounding box’s width and height. ðdx; dy; h; wÞ represents the ground truth bounding box, ðdxp ; dyp ; hp ; wp Þ represents the predicted bounding box, and ðdxi ; dyi ; hi ; wi Þ represents the anchor bounding box. 3.4

Testing

NMS. NMS (non-maximum suppression) is often used to generate the final detection results. The traditional NMS method uses a greedy strategy. A simple understanding is that we locally search for maxima and suppress non-maximal elements. In the process of object detection, we assume that the list of detected bounding boxes is B, the list of confidence scores corresponding to each bounding box is S, and the final result of the detection is D. The traditional NMS method first select the bounding box b which has the maximum score N , and then removes b from B. The bounding box b will be put into D. Any bounding box whose overlap is greater than the threshold Nthreshhold in B will also be removed by setting the score of the bounding box to zero. This process is repeated until the list of B is empty. However, for the detection of adjacent ships, when one ship is detected, the adjacent ship is actually present in the overlap threshold, which will be suppressed and lead to a low recall and a drop in average precision. In this paper, a different NMS method will be used. Instead of simply setting the score of the other bounding box whose overlap is greater than the threshold Nthreshhold to zero, the scores will be set as a function of its overlap with N . It is defined as follows:  if iouðN ; bi Þ [ Nthreshhold si; si ¼ ð4Þ si ð1  iouðN ; bi ÞÞ; otherwise s i ¼ e

iouðN ;bi Þ r

2

; 8bi 62 D

ð5Þ

Ship Detection Based on Faster R-CNN Network in Optical Remote Sensing Images

27

si represents the score of each bounding box, iouðN ; bi Þ represents the overlap between the bounding box which has the maximum score N and other bounding boxes in list of B, Nthreshhold represents the iou threshold. Equation (4) is a linear function of overlap between the two bounding boxes. It means that bounding boxes whose overlap with the bounding box which has the maximum score N will not be affected. Considering the continuity of the function, we also adopt another function, which is a Gaussian function, as shown in Eq. (5). The recall rate and the average precision can be improved by this method in adjacent ship detection.

4 Experimental Results and Analysis 4.1

Faster R-CNN Results and Analysis

Experiments have be done on HRSC16 provided by [14]. The ZF [15] netand the VGG16 [16] net are used in our experiment. The results in [14] is used as the baseline. Mean average precision(mAP) is used as the criteria. Table 1 shows the results of the experiment we have done. From Table 1, it can be seen that the mAP of our model is signi_cantly higher than [14]. Performance of our model that uses VGG16 net is much better than that with ZF net. The main reason is that VGG16 net is suitable for large scale images than ZF network. Images in our data set are usually larger than 1000  600. So we get better performance than using ZF network. We can see that Faster R-CNN +VGG16 outperforms Faster R-CNN +ZF and [14] by +1.2% and +5.5% mean average precision respectively.

Table 1. mAP of our model on HRSC2016 data set Ship. [14] 45.1% ZF 46.2% VCG16 54.1%

Mer. 74.1% 75.1% 78.7%

War. 89.4% 89.6% 90.0%

Air. 87.2% 88.0% 90.5%

mAP. 72.7% 73.9% 78.2%

We also use the precision and the recall rate of the detection results to evaluate our model, which are computed as follows: precision ¼ NTPNþTPNFP recall ¼ NFPNþTPNFN

ð6Þ

28

M. Zhai et al.

Where NTP represents the number of true positives, NFP represents the number of false positives, and NFN represents the number of false negatives. The results of our model with VGG16 net is show in Fig. 2.

(a) Aircraft carrier.

(b) Warcraft.

(c) Merchant Ship.

(d) Ship.

Fig. 2. The Precision-Recall curve of four object detection classes

Figure 2 and Table 1 both show that aircraft carrier and warcraft detection results are much better than merchant ship and ship. Examining images of the four object classes in our data set we find that samples of aircraft carrier and warcraft are large scale and have uniform class distribution. However, samples of merchant ship and ship have different size and different appearance, which leads to a lower mean average precision compared with the other two classes. Some detection results of our model are presented in Fig. 3. It can be seen that our model has a good detection and classification ability from the results. The false alarm rate is greatly reduced. From the top row, we can see that even in the condition with mist or wave, our model still can detect ships without image preprocessing, which shows our model is robust.

Ship Detection Based on Faster R-CNN Network in Optical Remote Sensing Images

29

Fig. 3. Some detection results of our model

4.2

Sof-NMS Result and Analysis

As the last two pictures of the bottom row shown in Fig. 3, when we detect the adjacent ships, a true positive get suppressed with traditional NMS, which leads to a lower average precision and recall rate. In our model, we use soft-NMS replaced of traditional NMS. We perform experiments on HRSC2016 with Faster R-CNN + VGG16 Net. The results can be seen in Table 2. Table 2. Results on HRSC2016 for Faster R-CNN + VGG16 Net with different NMS methods Ship. Mer. War. Air. mAP. Traditional NMS 54.1% 78.7% 90.0% 90.5% 78.2% Soft-NMS 55.3% 83.4% 90.8% 91.0% 80.1%

Figure 4 show some detection results of our model with Soft-NMS. In Fig. 4, when we detect the adjacent ship, the bounding box will be suppressed with traditional NMS, which will not happen with Soft-NMS method. From Table 2, we can see that Soft-NMS obtains an improvement of 1.9% mean average precision. We also observe that Soft-NMS improves maximum performance of 4.7% object detection classes. The main reason is that there are more adjacent samples of merchant ship than samples of other categories in our data set.

30

M. Zhai et al.

Fig. 4. The results of adjacent ship detection with different NMS methods, the left images are the results of traditional NMS, while the right images are the results of Soft-NMS

5 Conclusions In this paper, we propose a ship detection model in optical remote sensing images based on Faster R-CNN network. Through the public data set HRSC16, we have obtained an ship detection model which is an end-to-end detection model. When dealing with the adjacent ship detection, we use Soft-NMS instead of traditional NMS, which effectively solves the problem of adjacent ship detection and obtains an improvement of 1.9% mean average precision and an improvement of 4.7% average precision for merchant ship in the four object detection classes. And in our detection pipeline, we do not need to do image pre-processing, such as removing cloud and landsea segmentation. The mean average precision can reach 80.1%, which has an improvement of 6.4% compared with the results in [14]. There is still room for improvement in terms of small ship detection. This is our future work direction.

References 1. Eldhuset K (1996) An automatic ship and ship wake detection system for spaceborne SAR images in coastal regions. Geosci Remote Sens IEEE Trans 34(4):1010–1019 2. Yang G, Li B, Ji S, Gao F, Xu Q (2013) Ship detection from optical satellite images based on sea surface analysis. Geosci Remote Sens Lett 11(3):641–645 3. Zhang S, Li YX, Zhou ZM (2016) Ship recognition in optical remote sensing image. J Shanghai Jiaotong Univ 50(9):1415–1421 4. Zhai Y, Chi W, Jin L (2017) Real-time detection method based on PHOW for ship images classification. Sci Technol Eng 17(33):131–135 5. Li Z, Yang D, Chen Z (2015) Multi-layer sparse coding based ship detection for remote sensing images. In: IEEE international conference on information reuse and integration, pp 122–125

Ship Detection Based on Faster R-CNN Network in Optical Remote Sensing Images

31

6. Ren S, He K, Girshick R, Sun J (2017) Faster R-CNN: towards real-time object detection with region proposal networks. IEEE Trans Pattern Anal Mach Intell 39(6):1137–1149 7. Redmon J, Divvala S, Girshick R, Farhadi A (2016) You only look once: unified, real-time object detection. In: Computer vision and pattern recognition, pp 779–788 8. Liu W, Anguelov D, Erhan D, Szegedy C, Reed S, Fu CY, Berg AC (2016) SSD: single shot MultiBox detector. In: European conference on computer vision, pp 21–37 9. Lin H, Shi Z, Zou Z (2017) Fully convolutional network with task partitioning for inshore ship detection in optical remote sensing images. IEEE Geosci Remote Sens Lett 14(99):15 10. Zou Z, Shi Z (2016) Ship detection in spaceborne optical image with SVD networks. IEEE Trans Geosci Remote Sens 54(10):5832–5835 11. Liu Z, Wang H, Weng L, Yang Y (2017) Ship rotated bounding box space for ship extraction from high-resolution optical satellite images with complex backgrounds. IEEE Trans Geosci Remote Sens 13(8):1074–1078 12. Liu Z, Hu J, Weng L, Yang Y (2018) Rotated region based CNN for ship detection. In: IEEE international conference on image processing, pp 900–904 13. Bodla N, Singh B, Chellappa R, Davis LS (2017) Improving object detection with one line of code 14. Liu Z, Liu Y, Weng L, Yang Y (2017) A high resolution optical satellite image dataset for ship recognition and some new baselines. In: International conference on pattern recognition applications and methods, pp 324–331 15. Girshick R (2015) Fast R-CNN. In: IEEE international conference on computer vision, pp 1440–1448 16. Karen S, Andrew Z (2014) Very deep convolutional networks for large-scale image recognition. Comput Sci

An Efficient Real-Time Indoor Autonomous Navigation and Path Planning System for Drones Based on RGB-D Sensor Ran Xiao1,2(B) , Hao Du1,2 , Chaowen Xu1,2 , and Wei Wang1,2,3

3

1 Institute of Applied Research Intelligent Science and Technology, Jiangsu and Chinese Academy of Sciences, Changzhou 213164, Jiangsu, China [email protected] 2 Changzhou Research and Industrialization Center for Advanced Manufacturing Technology, Chinese Academy of Sciences, Changzhou 213164, Jiangsu, China School of Automation, Nanjing University of Information Science and Technology, Nanjing 210044, Jiangsu, China

Abstract. An efficient real-time autonomous drone navigation and path planning system is proposed by using an RGB-D sensor in the GPSdenied indoor environment. Firstly, the RGB images and their corresponding depth images collected by the sensor were used for real-time pose estimation and dense point cloud map reconstruction based on ORB-SLAM (Simultaneous Localization And Mapping system based on the ORiented BRIEF feature). With the attitude angle data from the Inertial Measurement Unit (IMU) used in the pose initialization, the SLAM system can provide a more accurate pose information, and therefore a better 3D map when the drone flies with a high speed. In the second phase, a simple and efficient pathfinding program was developed. In this procedure, the point cloud map data would be translated to a map based on the octree structure, which contains the occupied and free voxels. The size of occupied nodes in the octree map is three times smaller than that of free nodes, which ensures more free area for the drone’s flight. Every free voxel in the octree map was set to have enough space for the drone to cross. An improved A∗ algorithm map was used to plan the route based on the octree. The simulation result showed that this efficient pathfinding method can reduce execution time and memory space significantly. In the actual flight, a local path planning system was proposed to avoid obstacles in real time. Keywords: Indoor Visual SLAM · Drone Collision avoidance · Path planning

1

· Octree ·

Introduction

With the increasing of the natural and man-made disasters in recent years, the prediction and prevention of disasters have received widespread attention. At the c Springer Nature Singapore Pte Ltd. 2020  Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 32–44, 2020. https://doi.org/10.1007/978-981-32-9050-1_4

Indoor Autonomous Navigation and Path Planning

33

same time, to organize effective rescues and to reduce the losses after disasters have become very important. The small-size drones have been proved as a useful tool during missions of search and rescue [1], fire-fighting [2], target tracking [3], intelligent patrol [4], and surveillance [5]. Compared with helicopters and ground robots, drones have a lot of merits in the complex surroundings: light weight, small size and better dynamic performance and so on. Currently, for flood and earthquake disasters, small and medium-sized fixed-wing or multi-rotor drones are mostly used to carry out on site investigation; by collecting image information of the affected areas, the disaster can be quickly and accurately detected, assessed, and processed. However, it is still difficult to investigate interior situations of the GPS-denied damaged buildings. In these environments, drones should have the ability of autonomous navigation and 3D map reconstruction of surroundings (namely SLAM) and the ability of path planning. SLAM is the key technology to improve the intelligent performance of robots, while the localization technology enables drones to know where they are, so that they can execute tasks in the unknown environment; the 3D scene reconstruction technique can not only provide necessary information for localization, navigation and obstacle avoidance, but also enable drones to perceive surroundings and identify objects. The sensors used in the current SLAM research are always lasers, cameras or multi-sensors [6–8]. Although lasers can provide the accurate range information, they are usually very expensive and heavy and not suitable for low-cost and small-size indoor drones. Cheap and light-weight cameras are a best choice for the SLAM research. Mur-Artal et al developed a convenient SLAM system for Cameras [9], but the sparse point cloud map they constructed just can provide optimization information for localization and not appropriate for the clear scene recognition and pathfinding. Lv et al [10] provided dense 3D reconstruction and the octree map based on ORB-SLAM, but they did not consider the path planing based on the 3D map. In our system, an RGB-D sensor is used in the drone (see Fig. 1) to construct both the dense point cloud map and the octree map for surveillance and pathfinding; the data of roll, pitch and yaw from the IMU provide the initial attitude information, which improves the accuracy of the pose estimation and the 3D map construction in the non-linear flight with high speed. The popular path planing methods are mainly based the graph theory (such as Voronoi diagrams [11] and PRM [12]) and grid algorithm (e.g. A∗ and Dijkstra [13] algorithm). These methods may work well in the simple 2D map, but in the complex 3D environment, they are always time-consuming and sometimes can not find an efficient path. The octree map, where the 3D space is recursively subdivided into eight octants, can compress the memory space and its resolution is adjustable according to the practical requirement. Yan et al [14] gave a PRM pathfinding method based on octree algorithm, but the computation of the connectivity evaluation in each bounding box is very complicated. V¨ o r¨ o s [15] provides a highly efficient method for the neighbor searching by using the octree matrix instead of a voxel to represent the octree map. In the matrix octree data, each octant or node is expressed by an n × 3 matrix, where n means

34

R. Xiao et al.

the octree depth level and the 3 digits in each row indicate a number in base 8 of a binary form of the corresponding level of the octree map. Based on this matrix octree representation, Rodenberg et al [16] proposed an A∗ pathfinding method through a matrix octree representation of a point cloud map, they considered all the free-region neighbors including sharing faces, edges and vertexes, the disadvantage is the requirement of calculating the maximal crossing value of neighboring empty nodes.

Fig. 1. The drone equipped with the ASUS Xtion Pro-Live camera in this work.

In this research, an RGB-D sensor is used to estimate the real-time pose of the indoor drone based on ORB-SLAM, meanwhile the 3D dense point cloud map with color information is constructed for environment exploration. With the help of the pose initialization data from IMU, an accurate trajectory and a globally consistent map are achieved. In this SLAM method, IMU just provides the initial angle data in every pose estimation process, which can eliminate the effect of the IMU drift and give a precise initial angle change for the pose estimation. After completing the model construction, the saved point cloud data are compressed to the octree map represented by matrix [15] with an optimal free space resolution three times larger than the resolution of the occupied space, where the free node resolution is a little larger than the drone’s maximum physical size. In the pathfinding process, the equal-size free face neighbors of the current node are considered. This method can not only give much more free space but also can make the drone pass through the free space safely. Then the A∗ algorithm is used at the start and the goal at the same time for the offline path planning process, we named this method as bidirectional A∗ method. The simulation results showed that this method reduced a lot of pathfinding time compared with the normal A∗ algorithm. In the actual flight, a dynamic obstacle avoidance drone system is proposed, which ensures the drone to replan the path in real time when some dynamic unexpected obstacles appear in the originally planned path.

Indoor Autonomous Navigation and Path Planning

2

35

RGB-D SLAM System

ORB-SLAM is a precise visual-based SLAM system by using feature matching and nonlinear optimization methods [9]. It can be realized with monocular, binocular and RGB-D cameras. This SLAM system takes long time to initialize and suffers from scale drift when the monocular camera is used. For the binocular camera, the inaccuracy of the disparity calculation is a major disadvantage for the SLAM pose estimation. All there issues can be solved by using an RGB-D sensor, because this camera can provide the depth information of the feature point. In this paper, we build our indoor SLAM system by using an Xtion Pro-Live camera based on ORB-SLAM. The accurate pose estimation and dense and colorful point cloud map are constructed in real time on the on-board minicomputer in this process.

Fig. 2. Indoor SLAM work flow

In the flight experiment, the ORB-SLAM frame can work well with the only RGBD sensor when the drone flies slowly. But the 3D map is in a mess when the drone flies with a high speed (>5 m/s) especially in the non-linear flight. So an SBG IMU (Ellipse2-N) is used in the SLAM system to help improve the mapping performance, for the detailed work flow please see Fig. 2. The RGB-D camera provides both the RGB frame and depth frame (D frame) with 30 Hz, the ORB features are extracted from the RGB frame and then the corresponding depth information from the D frame is picked up to generate the 3D feature points. In the tracking period, the first step is to initialize pose with three modes: motion model, reference key frame, and relocalization. The attitude angle information from the IMU replaces the original estimated angle data as the initial pose in these three modes. The original initial pose is a transformation matrix Tini which composes a rotation matrix Rint and a translation vector tint , as shown in Eq. (1):     Rini tini Rimu tini Tini = ; Tnew = ; (1) OT 1 OT 1

36

R. Xiao et al.

For the transformation matrix (Tnew ) in our research, the rotation matrix Rini in the initial pose Tini is replaced by the Rimu , where Rimu is the rotation matrix derived from the values of roll, pitch, and yaw from the IMU. Then the computation system begins with three main parallel threads: tracking, local mapping and loop closing. Finally, the global BA (Bundle Adjustment) is used to optimize the pose and the global map in the fourth thread. In this research, the color information of the points of the key frame is extracted in the tracking thread, and these colorful frames are used to construct the dense 3D colorful map by optimal transformation using their optimized pose matrix in the world coordinate system.

Fig. 3. The trajectories and 3D maps before and after using the IMU data. Figure (a) and (b) give the trajectories with and without IMU data, respectively. Figure (c) and (d) present the 3D dense maps with and without IMU data, respectively.

The indoor SLAM experiments are carried out with and without IMU data, respectively, and the results of the drone trajectory of 6 circles around a table and the indoor map are shown in Fig. 3, where the table is 1.5 m in the width and 6 m in the length. From Fig. 3(a) and (b), it is clear to see that with the help of the IMU data, the trajectory is more accurate than that without using IMU, and the pose computation rate is about 17 to 20 Hz, which can meet the

Indoor Autonomous Navigation and Path Planning

37

requirement of the real-time flight. For the map construction in the bottom of Fig. 3(c) and (d), it is shown that the map without using IMU data is not globally consistent, this map is too messy to be used for scene investigation and the drone navigation. Apparently the map constructed with IMU data is better for this SLAM system.

3 3.1

Pathfinding System Based on the Octree Map Brief Introduction of the Octree Map

The octree algorithm is used to divide the 3D space to eight same-size cubes recursively till it reaches the maximum recursive depth N . Each cube or octant in its parent node can be located at one of the two sides of the split plane, which will be indicated by either a 0 (after/left/above of the split plane) or 1 (before/right/up of the split plane) in x-,y-, and z-dimension. In Fig. 4 (a), for depth level 1, the eight octants can be represented as [0,0,0], [1,0,0], [0,1,0], [1,1,0],  [0,0,1],  [1,0,1], [0,1,1],   [1,1,1];  for level 2, the eight children of node [1,0,1] 1, 0, 1 1, 0, 1 1, 0, 1 are , , and so on; for level 3, the children of node 0, 0, 0 ⎡ 1, 0, 0⎤ ⎡ 0, 1, 0 ⎤ ⎡ ⎤   1, 0, 1 1, 0, 1 1, 0, 1 1, 0, 1 are ⎣ 1, 1, 1 ⎦ , ⎣ 1, 1, 1 ⎦ , ⎣ 1, 1, 1 ⎦ , ... . And for level n, each octant 1, 1, 1 0, 1, 0 0, 0, 0 1, 0, 0 ⎡ ⎤ x1 , y1 , z1 ⎢ ⎥ ... ⎢ ⎥ ⎢ can be represented as a matrix⎢ xi , yi , zi ⎥ ⎥ , where xi , yi , and zi represent 0 ⎣ ⎦ ... xn , yn , zn or 1 (1 < i < n), [xi , yi , zi ] is the ith number of a node in level n. The node can be encoded with only 3 binary bits for every level in the octree map. Each 3-bit number can be simplified to a single number in base 8 (from 0 to 7), where zi and xi are the most and least significant bits, respectively. At this point each free or occupied octant in different levels and different positions can be replaced by an integer, if the level is n, the node code contains n integers, the code of the parent node is put before the child node code, for details please see Fig. 4(b). For example, the eight octant codes of node of “5” (n = 1) are 50 to 57 (n = 2). We just need to save the digital labelled cells instead of the dense point cloud map. In this octree map, if a node has obstacle points inside, whether these points occupy the node completely or not, this node is considered as an occupied node; and the node which is not occupied by the obstacle is called the free node or empty node. It is obvious that the larger the resolution of the nodes is, the smaller the free area can be used in the flight area. The small octree map resolution can give more free region for the drone, but the drone needs enough space to pass through each node safely. So two different resolutions are used for the occupied nodes and free nodes. In our research, if the eight face neighbors of the initial free node are free, this node is considered as a new free node.

38

R. Xiao et al.

Therefore, the new free node resolution is three times larger than the occupied node. And only these larger size free nodes are used as the area for pathfinding. All the free nodes mentioned below are large size free nodes.

Fig. 4. Subdivision of an octree. Figure (a) and (b) give the matrix and digital code representation of the octants, respectively. White octants mean free nodes, and gray octants are occupied nodes.

3.2

Pathfinding Based on A∗ Algorithm

The free nodes collected in Sect. 3.1 by using the octree subdivision method are used for the drone path planning. In our research, both the global off-line and the real-time pathfinding methods are used in the drone to improve the performance of dynamic obstacle avoidance and the safety of real-time planning. Global Bidirectional A∗ Pathfinding Algorithm. The free area separated out from the map are used for the A∗ path-finding method, which can speed up the efficiency of the path planning. The principle of the normal A∗ algorithm is as follows in Eq. (2): f (M ) = g(M ) + h(M ) (2) where f (M ) is the estimated cost from the start node S to the goal node G through the current node M , g(M ) is the practical cost from S to M , h(M ) is the estimated cost from M to G, in this research it computes the Manhattan distance between M and G. In the path planning, the next node with the minimum total cost f (M ) is chosen. According to the octree division method, the map will be processed as a big cube, this cube is normally larger than the actual map, and accordingly the collected free area is always outside of the drone’s flight scope. So only these free nodes in the octree map inside the 3D map are taken into account. What’s more, only the equal-size free face neighbor nodes are considered to enable the drone to pass safely and improve the pathfinding

Indoor Autonomous Navigation and Path Planning

39

efficiency simultaneously. In the off-line path planning phase, unlike the conventional A∗ method, we apply the bidirectional A∗ algorithm to search the route from the departure and destination points parallelly, the specific steps are show in Algorithm 1. In this algorithm, OpenSet1 and OpenSet2 are two sets to save the not evaluated nodes, CloseSet1 and CloseSet2 are two sets to save nodes which are already evaluated, ComeF rom1 and ComeF rom2 are to save the relation between the current node and its previous node with the minimum actual cost. And g1(N 1), g2(N 2) are the actual costs from S to node N 1 and from node G to node N 2, respectively, where N 1 and N 2 are the current nodes of the bidirectional A∗ method from S and G; f 1(N 0) and f 2(N 0) describe the total costs from S to N 2 and from G to N 1 through node N 0, respectively. Distance(N 1, N 0) computes the distance from N 1 to N 0, neighbors(N 1) gives the face neighbors of N 1 in the scope of free nodes. By using this search method, the path data are saved in vector P by the combination of two routes from S and G, and the final global path graph P is sent to the drone’s flight controller. In order to prove the advantage of the bidirectional A∗ algorithm, both the path planning performance of the bidirectional A∗ and the normal A∗ algorithms are computed in our research in a complicated map with the area of 100 × 100 × 50 m3 and with the map point number of 209,361. In the simulation, we assume that the drone flies from start point (13, 92, 45) m to the goal point (97, 10, 3) m. We simulate these two pathfinding methods in different free node octree map resolutions of R, 2R, 4R and 8R respectively, where R is 0.38 m. The computer system in this simulation has an Intel Core i7-4790 CPU (3.60 GHz) processor and 8.00 GB of RAM with Ubuntu14.04 64 bits. The simulation result in Table 1 shows that the bidirectional A∗ and the normal A∗ method have the almost same path distance in different resolutions. The number of the empty leaf nodes and the computation time of different octree map resolutions are shown in Fig. 5. From this figure, it is obvious that the larger the resolution is, the less the empty node number is, and the less the flight area (resolution × (empty node number)) is. The computation time also varies inversely with the octree map resolution. In order to take account of both computation time and the flight area, the free node resolution is larger than the occupied node’s and the free node resolution is set as a value which is a little bigger than the drone’s physical size to enable this drone to pass through safely. Comparing the computation time of the A∗ and bidirectional A∗ methods, we can see that the former is almost one order of magnitude larger then the latter. And the smaller the resolution is, the larger of the two kinds of computation time difference value is. According to the above simulation analysis, the bidirectional A∗ method is used for searching an efficient route in the global pathfinding. And the result of the global path planning in the real indoor environment is expressed in Fig. 6(a), where the map size is 6.71 × 12.58 × 3.16 m3 and the size of the free node is 0.80 m. Figure 6(b) shows the octomap of the indoor environment with the occupied node resolution of about 0.27 m.

40

R. Xiao et al.

Algorithm 1. Bidirectional A∗ algorithm OpenSet1.push(S); OpenSet2.push(G) CloseSet1=empty set; CloseSet2=empty set ComeF rom1=empty map; ComeF rom2=empty map g1[S]=0; g2[G]=0 f 1[S]=Distance(S, G); f 2[G]=Distance(G, S) while OpenSet1!=Null & OpenSet2!=Null do N 1=Node in OpenSet1 with smallest f 1; OpenSet1.remove(N 1) // Extract the node with smallest f 1 and remove this node from OpenSet1 N 2=Node in OpenSet2 with smallest f 2;OpenSet2.remove(N 2) if N 2 in neighbors(N 1) then return ComeF rom1, ComeF rom2, g1, g2 end if for N 0 in neighbors(N 1) do gnew=g1(N 1)+Distance(N 1, N 0) //gnew is the new actual cost if N 0 not in CloseSet1 or gnew < g1(N 0) then g1(N 0)=gnew f 1(N 0)=g1(N 0)+Distance(N 2, N 0) OpenSet1.push(N 0); CloseSet2.push(N 0);ComeF rom1[N 0]=N 1 for N 0 in neighbors(N 2) do gnew=g2(N 2)+Distance(N 2, N 0) if N 0 not in CloseSet2 or gnew < g2(N 0) then g2(N 0)=gnew f 2=g2(N 0)+Distance(N 1, N 0) OpenSet2.push(N 0);CloseSet2.push(N 0);ComeF rom2[N 0]=N 2 end if end for end if end for end while

Table 1. The path distances of different octree resolutions. Resolution/m R Path cost/m

2R

4R

8R

207.68 208.05 208.83 213.47

Dynamic Obstacle Avoidance System Proposal. The former part of Sect. 3.2 gives the off-line global path planning. This method is adequate for the static environment, but in the actual flight, there are always some dynamic obstacles. So the local dynamic path planning method in the drone’s flight is proposed as in Fig. 7. In the task of flight mission, the drone flies according to the path P from the start point S and detects the surrounding environment in real time. Then the on-board computing system judges whether there are obstacles in the area of next 1 to T nodes after the current node in the current path, where

Indoor Autonomous Navigation and Path Planning

41

Fig. 5. The empty leaf node number and the computation time of different octree map resolutions where R = 0.38 m.

T ∗ R is the safe distance of the drone to obstacles and R is the size of the empty node. If there is no obstacle until the drone arrive at goal point, this real-time navigation ends successfully. If there are obstacles in the path, these occupied nodes will be set as set O. The next step is to search out whether there is a route from the current node N to the next node in the path graph P skipping the set O to the destination G by using the normal A∗ method. If there is a route, the node is set as W , and the original route is repaired by replacing the path from current node N to node W by the new path, noted as new path P . And then the drone will fly along path P and detect the surrounding environment in a circular manner in real time till it arrives at point G. If there is no new path, this pathfinding process ends in failure.

4

Discussion and Summary

In this paper, we discussed the vision-based SLAM system based on ORB-SLAM and the real-time path planning system with an RGB-D camera. The SLAM process is very critical because an accurate and perfect map is a prerequisite for the path planning. The experiment results showed that the trajectory and the point cloud map were more accurate with the IMU data using in the pose initialization process. After reconstructing the colorful dense point cloud map, in order to increase the efficiency of the A∗ pathfinding method, we use the octree algorithm to divide the space to the empty area and the occupied area. In the octree map, the empty node’s resolution is three times larger than the occupied node’s, so that more space can be used for the drone to pass through

42

R. Xiao et al.

Fig. 6. The global path planning in indoor environment. In Figure (a), the magenta square area give the flight area from the start point to the goal point. Figure (b) gives the octomap of the indoor environment.

safely. Two kinds of the A∗ algorithm are used in the process of pathfinding: the bidirectional A∗ algorithm and normal A∗ algorithm. The former method is used for the global path planning, which starts the A∗ method from the start and goal points parallelly and improve the path planning efficiency compared with the normal A∗ algorithm starting from one point. The latter method is used when the drone flies to avoid obstacles in real-time in the real flight operation in the local path planning. The global path-finding simulation in the complicate map with different octree resolutions shows that the bidirectional A∗ method can improve the computation time significantly.

Indoor Autonomous Navigation and Path Planning

43

Fig. 7. The path-finding method with dynamic obstacle avoidance work flow.

Acknowledgement. This research was supported by National Key Research and Development Program of China (No. 2017YFC0806500).

References 1. Graham-Rowe D (2010) Cheap drones could replace search-and-rescue helicopters. New Scientist 207(2769):20 2. Qin H, Cui JQ, Li J et al (2016) Design and implementation of an unmanned aerial vehicle for autonomous firefighting missions. In: IEEE international conference on control and automation. IEEE, Kathmandu, pp 62–67 3. Chakrabarty A, Morris R, Bouyssounouse X et al (2016) Autonomous indoor object tracking with the Parrot AR.Drone. In: International conference on unmanned aircraft systems. IEEE, Arlington, pp 25–30 4. Qiu Z, Zhang K, Dong Y (2017) Research on the system of patrol unmanned aerial vehicle (UAV) docking on charging pile based on autonomous identification and tracking. In: International conference on intelligent and interactive systems and applications. Springer, Cham, pp 517–523 5. Geng L, Zhang YF, Wang JJ et al (2013) Mission planning of autonomous UAVs for urban surveillance with evolutionary algorithms. In: IEEE international conference on control & automation, Chengdu, vol 45, no 5, pp 828–833 6. Doer C, Scholz G, Trommer GF (2017) Indoor laser-based SLAM for micro aerial vehicles. In: Gyroscopy & Navigation, vol 8, no 3, pp 181–189 (2017) 7. Li´enard J, Vogs A, Gatziolis D, Strigul N (2016) Embedded, real-time UAV control for improved, image-based 3D scene reconstruction. Measurement 81:264–269 8. L´ opez E, Barea R, G´ omez A, Nemra A (2016) Indoor SLAM for micro aerial vehicles using visual and laser sensor fusion. In: Robot 2015: second Iberian robotics conference. Advances in intelligent systems and computing, vol 417. Springer, Cham

44

R. Xiao et al.

9. Mur-Artal R (2017) Tard´ os JD (2017) ORB-SLAM2: an open-source SLAM system for monocular, stereo, and RGB-D cameras. IEEE Trans Robot 33(5):1255–1262 10. Lv Q, Lin H, Wang G, Wei H, Wang Y (2017) ORB-SLAM-based tracing and 3D reconstruction for robot using Kinect 2.0. In: Control and Decision Conference, Chongqing 11. Beard RW, Mclain TW, Goodrich M, Anderson EP (2002) Coordinated target assignment and intercept for unmanned air vehicles. IEEE Trans Robot Autom 18(6):911–922 12. Mark H, Overmars Mark H, Overmars T (1992) A random approach to motion planning. RUU-CS (92-32) 13. Dijkstra EW (1959) A note on two problems in connexion with graphs. Numerische Mathematik 1(1):269–271 14. Yan F, Liu YS, Xiao JZ, Yan F, Liu YS, Xiao JZ (2013) Path planning in complex 3D environments using a probabilistic roadmap method. Int J Autom Comput 10(6):525–533 15. V¨ or¨ os J (2000) A strategy for repetitive neighbor finding in octree representations. Image Vis Comput 18(14):1085–1091 16. Rodenberg O, Verbree E, Zlatanova S, Zlatanova S (2016) Indoor A* pathfinding through an octree representation of a point cloud. ISPRS Ann Photogram Remote Sens Spat Inf Sci IV-2/W1:249–255

Research on Port Throughput Prediction of Tianjin Port Based on PCA-SVR in the New Era Jinyu Wei1, Yuqiao Tang1(&), Yang Yu1, and Xueshan Sun2 1

2

College of Management, Tianjin University of Technology, Tianjin 300384, China [email protected] Central College of Information, Tianjin University of Technology, Tianjin 300380, China

Abstract. By selecting nine indicators related to Tianjin Port throughput in the new era, a PCA-SVR prediction model is constructed and the throughput of Tianjin port in 2017–2018 years is predicted. Based on the predicted results, the growth rate and influencing factors of Tianjin port throughput are analyzed. The research shows that the growth rate of Tianjin Port throughput has a downward trend in the next two years. In numerous influencing factors, the three indicators of the total value of imports and exports of foreign trade commodities, the added value of tertiary industry and Hebei port throughput accounts for the percentage of total throughput of Beijing-Tianjin-Hebei port have a significant impact on Tianjin Port throughput. Keywords: the Belt and Road Port through-put  PCA-SVR

 Beijing-Tianjin-Hebei integration 

1 Introduction For many years, the prediction of port throughput has been the focus of scholars in port research. Lu [1] established a dynamic penalty support vector regression model to study the influence of situational changes on port throughput. By dynamically adjusting the penalty coefficient of the data, the model can quickly adapt to the development law of things under the new situation and the prediction precision of the model is enhanced. And the annual cargo throughput data of Dalian Port and Tianjin Port are used to do empirical research. Duan [2] used NBS-SA software to analyze the impact of seasonal data on the throughput of the Bohai Rim port and to adjust it, which provides a new perspective for the study of port integration in the Bohai Sea. Yang [3] analyzed the effect of political and economic events and policy transformation on port throughput in China through historical data, finding the important impetus was political and economic element. Kang [4] studied the relationship between port network characteristics and cargo throughput, used network analysis to evaluate port network characteristics, and conducted panel regression analysis. The results show that throughput performance depends not only on macroeconomic variables and service capabilities, but also on the © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 45–52, 2020. https://doi.org/10.1007/978-981-32-9050-1_5

46

J. Wei et al.

central location of the port in the network. Chang [5] examined the impact of exchange rate movements, global economic activity, and the Baltic Dry Index (BDI) on cargo throughput fluctuations in Korean loading ports. Studies have shown that BDI volatility has a negative impact on cargo throughput, while nominal exchange rates and the growth of global economic activity have a positive impact. In order to investigate the impact of extreme wind events on port throughput, Zhang [6] used regression model to analyze it and conducted empirical analysis in Ningbo and Shanghai ports. Chen [7] quantitatively studied the relationship between Shanghai port throughput and Shanghai urban population growth rate by establishing an all-speed growth model between port throughput and port urban population. In summary, many scholars have done some relevant researches on port throughput prediction. However, the research on the combination of “Belt and Road” and the new era of Beijing-Tianjin-Hebei integration is scarce. Therefore, this paper selects nine indexes related to the throughput of Tianjin Port under the new situation. Based on the key influencing factors extracted by PCA, the SVR method is used to predict the throughput of Tianjin Port, and then to study the increasing trend of throughput, which provides a reference for the management of Tianjin Port in the future.

2 Research Method In order to eliminate the multiple collinearity between the index variables and improve the prediction precision, PCA-SVR model is used to predict the port through-put. The basic idea is to use PCA to extract the key impact factors affecting through-put, and then use it as an input variable to build an SVR model. Specific steps are as follows: (1) In order to eliminate the difference in the dimension of the indicator variables, the sample data is subjected to preconditioning standardization pre-processing; (2) Use PCA to reduce the dimensionality of the standardized data and extract key impact factors affecting port throughput; (3) Taking the extracted key impact factors as input variables, randomly select 65% of the samples from the sample data as the training set, and the remaining 35% of the samples as the test set, select the appropriate SVR kernel function and model parameters, and establish the SVR prediction model. 2.1

Principal Component Analysis (PCA)

Principal component analysis (PCA) is a commonly used data dimensionality reduction method, which can synthesize several variables into several representative variables, which is usually called principal component. There is no information redundancy between principal components, and most of the original information is included, thus simplifying complex problems.

Research on Port Throughput Prediction of Tianjin Port

2.2

47

Support Vector Regression (SVR)

The principle and method of SVR are as follows: for a given training sample fðxi ; yi Þjxi 2 Rn ; yi 2 R; i ¼ 1; 2; 3; . . .g, SVR uses the nonlinear mapping function UðxÞ to map the input data xi from n dimensional input space to the high-dimensional characteristic space, and conducts linear regression in the high-dimensional characteristic space to obtain the optimal decision function f ¼ x  Uðxi Þ þ b. Where x is the weight, b is the offset. Introducing insensitive function e, slack variable ni , and ni , SVR model solving can be transformed into the solution of the following planning problem: max

Wða; a Þ ¼ 12 þ

n P n P i¼1 j¼1 n P

ðai  ai Þðaj  aj ÞKðxi ; xj Þ

n P ðai  ai Þyi  e ðai þ ai Þ i¼18 i¼1 n X >  < ðai  ai Þ ¼ 0 s:t i¼1 > : 0  ai ; ai  C

ð1Þ

Among them, C is the penalty parameter, a; ai  0 is the Lagrangian multiplier,   Kxi ; xj ¼ /ðxi Þ  / xj is the kernel function. This paper will select the Gaussian radial basis kernel function to construct the SVR model, and its expression is as follows: Kðx; zÞ ¼ expð

kx  z k2 Þ 2r2

ð2Þ

  Assuming the optimal solution for the problem is a1 ; a1 ; a2 ; a2 ; . . .; an ; an , the final support vector regression model is as follows: f ðxi Þ ¼

n X j¼1

ðai  ai ÞKðxi ; xj Þ þ b

ð3Þ

3 Outcome of Practice 3.1

Variable Selection and Data Source

From the angle of the construction of Tianjin Port itself, this paper selects the following indexes: the number of dock berths, Beijing-Tianjin-Hebei railway operating mileage, Beijing-Tianjin-Hebei road operating mileage, the primary industry value added, the secondary industry value added, the tertiary industry value added, the total GDP of Beijing-Tianjin-Hebei, the total value of foreign trade imports and exports and the percentage of port throughput of Hebei Province to the total throughput of BeijingTianjin-Hebei port. The datas mainly comes from the national data network, and some

48

J. Wei et al.

of the data comes from the Hebei Economic Yearbook, the Tianjin Statistical Yearbook and the Beijing Statistical Yearbook. 3.2

Data Standardization

Before using PCA to reduce the dimension of the selected index variables, in order to eliminate the difference in the dimension of the index variable and improve the prediction accuracy, the data should be pre-differentiated and standardized. The formula is as follows: xi0k

 i  xk  minðxi Þ  ð0:9  0:1Þ ¼ 0:1 þ ½maxðxi Þ  minðxi Þ

ð4Þ

Among them, xi0k indicates the value of the i indicator deviation normalization in the k year, x0k indicates the original value of the i indicator in the k year, and xi indicates the original value of the i indicator in all years. 3.3

Dimensionality Reduction by PCA

In order to quantitatively analyze the correlation of sample characteristics, this paper uses SPSS statistical analysis software to perform KMO test and Bartlett spherical test on sample data. The results are shown in Table 1. Table 1. KMO test and Bartlett spherical test results KMO test Spherical test Bangla Degree of freedom Significant

0.792 973.509 36 .000

It can be seen from Table 1 that the KMO test value reaches 0.792 (>0.5), and the Bartlett spherical test significance level is 0.000 ( > < > > :

1 q ¼ arctan yx22 y x1 ;

0 qd ¼ 2arctan xyc0x yc ;

c ¼ rqd ¼

2 2 1 ðxc x0 Þ þ ðyc y0 Þ xc x0 2

ð4Þ qd :

Then a new state vector is defined as   c f ¼ 2 R2 ; a ¼ q  qd : a

2.3

ð5Þ

System Kinematics

Without loss of generality, a camera-robot system can be developed by differentiating (5) with respect to time as follows:   d c @f f_ ¼ ¼ Jc Jr Ur ¼ Ji Jc Jr Ur ; dt a @pc

ð6Þ

Visual Stabilization of Wheeled Mobile Robots with Unknown Visual Parameters

83

where  Ji ¼

l2 l1 l2 l1 l3 þ l5 l6  l4 l5  l3 l4 þ l6

 ð7Þ

the details of Ji refer to [10] and Jc 2 R46 is the image Jacobian or interaction matrix. Since the mobile robot moves on a plane, the motion of camera along z axis is not happened so that the height information of the feature points in F c maintains constant during the visual servoing task. The relationship can be represented as: Yic ¼ Yi ; i ¼ 1; 2;

ð8Þ

According to the geometric relation of the pinhole camera model with the perspective projection, the variables Z1c can be calculated as i

1 yi ; i ¼ 1; 2; c ¼ Zi fv Yic

ð9Þ

where fu , fv are the unknown focal lengths of the camera. According to the Assumption 2, there is Y  , Y1 ¼ Y2 . Then substituting (2), (7), (8), (9) to (6), the system kinematic model could be obtained: " f_ ¼

G5 F3

P4 i¼1

Gi F i

#

Ur ; P4 G5 F7 i¼1 Gi F4 þ i |fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl}

ð10Þ

H ðpc Þ

Where   1 a fu b 1 T G ¼ fu ; ;  ;  ;  2 R5 ; fu fv Y fv Y fv Y is an unknown constant vector about the camera parameters and three-dimensional scene information. Fi ; i ¼ 1    7 is the function about the feature points which can be calculated.

3 Control Strategy Design and Analysis The vision based set-point stabilization task is to converge the image radian error c and the state a to zero simultaneously. Meanwhile, the visual features should keep in the field of view during the regulation task of the wheeled mobile robot. Since these two states are defined as relative values with respect to the goal position, the system matrix H ðpc Þ will be singular at the goal position which is analyzed in [10]. This problem can be tackled by a switching control strategy to make the system states converging around the goal position. In addition, the inverse of the matrix H ðpc Þ cannot be directly

84

Y. Huang and J. Su

calculated due to the unknown constant vector G. In order to achieve the control object, the controller should be designed to deal with the un-modeled uncertainty in H ðpc Þ and external disturbance. From the above analysis, a linear ESO is designed to estimate the uncertainties and compensate to the controller. Rewrite the system model (9) to a suitable form with the total disturbance as follows: " # P4 ^ 5 F3 ^ iFi G G i¼1 f_ ¼ Ur þ DðtÞ; ð11Þ P4 ^ i F4 þ i ^ 5 F7 G G i¼1 |fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl ffl} ^ ðtÞ H

^ is a roughly estimated parameter vector, and H ^ is a function of the image where G points pc . DðtÞ denotes the total disturbance including the system uncertainty and external disturbance defined as   ^ ðtÞ Ur þ d ðtÞ: D ð t Þ ¼ H ð pc Þ  H

ð12Þ

Then a normal linear ESO is constructed for (10) to estimate the DðtÞ in real-time (

^ ðtÞUr  b1 ðZ1  f Þ; Z^1 ¼ Z2 þ H Z_ 2 ¼ b2 ðZ1  f Þ;

ð13Þ

where b1 , b2 are the positive parameters to be tuned such that the output Z2 of ESO can estimate the total disturbance DðtÞ. By using the estimation Z2 , the controller is designed as ^ 1 ðtÞðK  ðZ1  f  Þ  Z2 Þ: Ur ¼ H

ð14Þ

This control law will enable the system converge to the equilibrium point expo^ is singular at the goal position. To avoid this situanentially. However, the matrix H tion, a switchback strategy is adopted. If the midpoint of the current features ðxc ; yc Þ is close to the goal midpoint ðx0 ; y0 Þ with a nonzero image orientation error, a subgoal is  0 0   ^ 1 q; k2 y0 , where k1 [ 0, 0\k2 \1, will be used as the new chosen as x0 ; y0 ¼ k1 G reference in next iteration of the control loop. Then the switched subgoal will be judged in the same way until the system states converge around the goal position.

4 Simulations In this section, two groups of simulation are presented to validate the effectiveness and robustness of the proposed control strategy. A camera is fixed on the mobile robot and the intrinsic and extrinsic parameters are unknown. The desired posture is always set at origin, i.e. ðx ; y ; h Þ ¼ ð0m; 0m; 0 Þ. Then a pair of points in the world frame that satisfies the assumptions are selected as P1 ¼ ð0:1; 1; 2Þ, P1 ¼ ð0:1; 1; 2Þ. The virtual camera parameters are set as fu ¼ 672:18, fv ¼ 670:80, a ¼ 0:1, b ¼ 0:2. Then the

Visual Stabilization of Wheeled Mobile Robots with Unknown Visual Parameters

85

parameters of the control strategy are tuned as b1 ¼ 0:8, b2 ¼ 0:16, K ¼ diag f0:4; 0:4g, k1 ¼ 0:3, k2 ¼ 0:75. The switching condition is set according to the midpoint error as jxc  x0 j\10ðpixelÞ, jyc  y0 j\10ðpixelÞ and the orientation error as jqj [ 0:05ðrad Þ. A random image noise with a maximum magnitude of 3 pixels is added to the system.

Fig. 3. Control performance and stabilization task with external disturbance.

86

Y. Huang and J. Su

The initial posture of the mobile robot is set at ðx; y; hÞ ¼ ð2m; 1m; 30 Þ. An ^ is taken as estimated constant vector G  T ^ ¼ 650; 1 ; 0:15 ; 0:15; 1 G 650 650 650 for example to observe the control performance. Then large external disturbances are exerted on the states of the mobile robot to verify the robustness of this control strategy. The control parameters are not returned. We take the case with disturbances of ð1m; 0:5m; 5:7296 Þ for example. Figure 3(a) and (d) display the feature trajectories in image plane. These short segments are the lines connecting the two image points, and they are drawn at 50 sampling intervals. The circular points denote the features extracted at the initial pose and the star ones are the goal features. The image points move toward the goal features along an arc which pass though the midpoints of the goal features and current features. Therefore, the image trajectories always concentrate around the arcs which considerably decrease the possibility of missing features during the task. The motion path is shown in Fig. 3(b) and (e), the switchback is happened to avoid the singular position. It is obviously that a large slipping happened on the motion plane depicted in Fig. 3(e). After two switchbacks, the mobile robot arrives at the desired position. The control inputs of the two simulations are shown in Fig. 3(c) and (f). The red signal  on the curves denote the switching time. A pair  means one switchback motion of the mobile robot.

5 Conclusion A new approach to the visual servoing for wheeled mobile robot is provided with both uncertain camera parameters and unknown depth. The simplicity of the controller design in the ADRC framework is kept for the visual servoing of the wheeled mobile robot. Simulation results validate the proposed approach. Acknowledgment. The authors gratefully acknowledge the financial support of the National Natural Science Foundation of China (NSFC) under grants 61533012 and 91748120.

References 1. Li Z, Ying Z, Wen C (2017) Parking of nonholonomic mobile robots via switched control in the discrete time domain. In: IEEE international symposium on industrial electronics, Edinburgh, Scotland, pp 526–532 2. Mariottini GL, Oriolo G, Prattichizzo D (2007) Image-based visual servoing for nonholonomic mobile robots using epipolar geometry. IEEE Trans Rob 23(1):87–100 3. Lopez-Nicolas G, Gans NR, Bhattacharya S, Sagues C, Guerrero JJ, Hutchinson S (2010) Homography-based control scheme for mobile robots with nonholonomic and field-of-view constraints. IEEE Trans Syst Man Cybern Part B (Cybern) 40(4):1115–1127

Visual Stabilization of Wheeled Mobile Robots with Unknown Visual Parameters

87

4. Huang Y, Su JB (2016) Simultaneous regulation of position and orientation for nonholonomic mobile robot. In: 2016 international conference on machine learning and cybernetics (ICMLC), vol 2, pp 477–482 5. Li B, Fang Y, Zhang X (2014) 2D trifocal tensor based visual servo regulation of nonholonomic mobile robots. Acta Automatica Sinica 40(12):5764–5769 (in Chinese) 6. Ito M, Hiratsuka T, Shibata M (2010) Feature-based visual target following for a nonholonomic wheeled mobile robot with a single camera. In: IECON 2010 - 36th annual conference on IEEE industrial electronics society, pp 2721–2726 7. Zhang X, Fang Y, Liu X (2010) Adaptive visual servo regulation of mobile robots. Control Theory Appl 27(9):1123–1130 (in Chinese) 8. Zhang X, Fang Y, Li B, Wang J (2017) Visual servoing of nonholonomic mobile robots with uncalibrated camera-to-robot parameters. IEEE Trans Industr Electron 64(1):390–400 9. Han J (1998) Active disturbance rejection controller and its application. Control Decis 13 (1):19–23 (in Chinese) 10. Hashimoto K, Noritsugu T (1997) Visual servoing of nonholonomic cart. In: Proceedings in IEEE international conference on robotics and automation, vol 2, pp 1719–1724

A Game Model for Gomoku Based on Deep Learning and Monte Carlo Tree Search Xiali Li, Shuai He, Licheng Wu(&), Daiyao Chen, and Yue Zhao School of Information Engineering, Minzu University of China, Beijing 100081, China [email protected] Abstract. Alpha Zero has made remarkable achievements in Go, Chess and Japanese Chess without human knowledge. Generally, the hardware resources have much influence on the effect of model training significantly. It is important to study game model that do not rely excessively on high-performance computing capabilities. In view of this, by referring to the methods used in AlphaGo Zero, this paper studies the model applying deep learning (DL) and monte carlo tree search (MCTS) with a simple deep neural network (DNN) structure on the Game of Gomoku Model, without considering human expert knowledge. Additionally, an improved method to accelerate MCTS search is proposed on the base of the characteristics of Gomoku. Experiments show that this model can improve the chess power in a short training time with limited hardware resources. Keywords: Game theory  Gomoku  Deep learning  Monte Carlo tree search

1 Introduction DNN [1, 2] and MCTS [3–5] can achieve superhuman performance even without supervision on human gameplay datasets. The emergence of DeepMind’s AlphaGo [6], AlphaGo Zero [7], and Alpha Zero [8] in Go, Chess, and Japanese Chess are remarkable, but for the majority of the research community, the training performance of the deep learning model is not obvious due to limited hardware resources. Before the advent of practical deep learning, classical search methods enjoyed initial success. The Methods used in Gomoku include Alpha-Beta pruning algorithm [9], Temporal-Difference algorithm [10], Markov decision process and Bayesian equalization algorithm. The Alpha-Beta pruning algorithm is a recursive tree search algorithm based on the Minimax algorithm [11] combined with the pruning method, and the evaluation method uses static situation assessment, relies on a large amount of expert knowledge to support the opening library [12], and the complex design of the valuation function. The system based on Temporal-Difference algorithm is fiercely over-reliant on human knowledge. The Markov decision process is based on the value iterative method and the strategy iterative method, so the strength is limited by the iterative method. The Bayesian equalization algorithm is based on scoring different patterns of the chessboard, and then accumulating the scores of all patterns, but it is impossible to systematically and comprehensively evaluate. Therefore, this paper studies the combination of the improved MCTS and DNN in the case of limited hardware resources, to reproduce, study, and extend AlphaGO Zero on © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 88–97, 2020. https://doi.org/10.1007/978-981-32-9050-1_10

A Game Model for Gomoku Based on Deep Learning and MCTS

89

Gomoku game model. The model consists of three main parts: rules design, simple DNN design, and the improved MCTS. The rules include the basic rules of Gomoku and the rule of forbidden hands, although these forbidden rules reduce the training speed of the model, they can effectively solve the problem of “first-hand win” in Gomoku. The DNN is used for the evaluation of the board, where the value networks are responsible for a comprehensive assessment of the board’s score, while the policy networks are responsible for the prediction of the optimal move. The DNN guides the MCTS to realize the process of self-training to continuously improve the strength. Based on the Gomoku rules, we improve the MCTS process. The work in this paper is as follows: Firstly, do not rely on human knowledge and experience to improve strength. The model uses only the simple rules of Gomoku and the forbidden moves rules that are necessary to satisfy the model’s self-play process. Secondly, improved MCTS is presented to simplify the move strategy. This paper improves MCTS according to the basic rules and forbidden moves rules of Gomoku. Finally, DNN is applied to evaluate board positions and select moves. DNN are constructed by using a certain number of residual layers [13], combining the mature Tensorflow [14] and Keras [15] technologies, so that the whole model can gain a greater strength in a relatively short time with only one GPU. The rest of the paper is organized as follows. Section 2 introduces a simple DNN structure of Gomoku model. Section 3 deals with the improved MCTS. Test and analysis are presented in Sect. 4. Finally, the conclusion is summarized in Sect. 5.

2 The Design of Simple DNN Structure In order to reduce the depth of the neural network, in the first part of the whole neural network, we concentrate and merge the two branches of the value network and the policy network, and share the residual layers, from the second to fifth layers. Although the prediction accuracy of the neural network is slightly reduced, the process of model training is accelerated [7]. Starting from the sixth layers, it is divided into two branches, as shown in Fig. 1.

Input … …

Plain block

Residual

Policy head

Value head Fig. 1. The simple DNN structure.

90

X. Li et al.

The networks trained here take as input a representation of the current position and output a probability distribution over all chess on the board, which are interpreted as a probability distribution over the possible places an expert player could place a chess. In order to prevent parameters from overfitting, the regularization term imposed on weights is partly accomplished by the method provided by Keras, which prevents overfitting by applying the regularizer function to the kernel weights matrix [16].

3 MCTS in DNN and Its Improvements 3.1

MCTS in DNN

The edge of the Monte Carlo tree stores the information obtained by each simulation [6, 7], and the information stored on each edge ðs; aÞ is as follows with the prior probability Pðs; aÞ, the mean action-value Qðs; aÞ and the visit count Nðs; aÞ, total actionvalue Wðs; aÞ. The process of MCTS in DNN, divided into the following steps: select, expand and evaluate, backup. 3.1.1 Select First of all, we assume that the data mentioned above already exist in the tree edge. In fact, we use these data to treat each position as a multi-armed bandit problem, and use UCT [17, 18] algorithm to select a max upper confidence bound Qðs; aÞ þ Uðs; aÞ, where pffiffiffiffiffi Na U(s; a) ¼ Cput  ðð1  epsilonÞ  Pðs; aÞ þ epsilon  nu½idxÞ  1 þ Nðs; aÞ

ð1Þ

Cpuct is a constant determining the level of exploration, epsilon is the proportion of noise interference, and nu½idx means Dirichlet noise, by adjusting Cpuct, epsilon and nu½idx, UCT algorithm can be as diverse as possible in the process of selecting action. And then, Na is the sum of visits of all nodes on a sequence with a as the root node. And 1

Pðs; aÞ ¼ Natan

ð2Þ

where tau is a parameter controlling temperature, when the total number of chess is less than the threshold, tau tends to be 1, ensure a diverse choose, otherwise, tau tends to be 0, to choose a maximum visit count move. This search control strategy initially prefers actions with high prior probability and low visit count, but asymptotically prefers actions with high action value. In the meanwhile, Pðs; aÞ is normalized. 3.1.2 Expand and Evaluate The selection process would then proceed until you reach a position where not all of the child positions have statistics recorded. The second phase, expansion, occurs when you

A Game Model for Gomoku Based on Deep Learning and MCTS

91

can no longer apply UCT. At this time, the current state s of the board is passed as an input to the neural network, through policy networks, to provide placeholder prior probabilities for action selection Pðajs0 Þ, a is a legal move, which requires basic rules and forbidden rules to determine it’s legitimacy, and a is the set of A, s0 is the successor state. In the meanwhile, value networks gets a score for the current state s, VðsÞ. when chose one legal move a from A as the next simulation move a0 , there will be two choices: (1) When tau ! 0, select maximum visit count(highest probability) move a as a0 . If there are several move with the highest probability, then randomly select one of them. (2) When tau ! 1, a move will be randomly selected from the multinomial distribution. When we get a0 , a new record node a0 is added to the tree of statistics, the successor state s0 is added to the search tree. 3.1.3 Backup Backup occurs in two situations (stop the simulation and select a recommending move a to play). when the simulation reaches a leaf node at count MCTS SIMS, where MCTS SIMS is the upper limit of simulation times, and then, we will get Vðs; aÞ 2 ð1; 1Þ. Or when the playout reaches the end of the game, we will get Vðs; aÞ ¼ 1 or  1. According to value networks, we get the value of current state Vðs; aÞ after take action a, and one path L from root to a is also determined. For all nodes that at ðt 2 LÞ, the following values are updated: (1) Nt ¼ Nt þ 1, For a new node, the value of N is initialized to 1. (2) Wt ¼ Wt þ Vðs; aÞ  ðdirectionÞt , where ðdirectionÞt ¼ 1 or  1 Qt ¼ Wt =Nt As more and more playouts are run, the tree of statistics grows in memory and the move that will finally be chosen will converge towards the actual optimal play. 3.2

Improvements of MCTS

For AlphaGo Zero, a single training run requiring millions of self-play games needs days of training on thousands of TPUs, compared to Go, although the model of Gomoku is simpler, when we have only one GPU for training, the time consumed is quite large. Based on the characteristics of Gomoku, this paper proposes the following improvements. As shown in Fig. 2, When in state s, assuming that there is already a “connectfour”, value networks will give a very high score VðsÞ, and VðsÞ will not be equal to 1 or −1, but close to 1 or −1. At the same time, policy networks will also give the best move that predicted based on the current state P, and then, in the simulation process, a0 will be selected as the best move for the next step. If the simulation ends, backup, we will take a0 as the next move, s ! s0 . As mentioned earlier in the paper, in the process of model training, only when the evaluation result of value networks is equal to 1 or −1, or the simulation reaches a leaf node at count MCTS SIMS, then will backup. we

92

X. Li et al.

1

1

3

1

2

3

......

1

...... Networks P

V =1 P

3

Backup Continue

V =1 Backup

s

...... 3

...... Networks

Basic rule

V =0~1

2

P

V =1 P

V =0~1

Backup Continue s’

Fig. 2. Improvements of MCTS.

know that VðsÞ is not equal to 1 or −1, and for the next state s0 , can be sure that the Vðs0 Þ equal to 1 or −1, but we need to call the DNN again to complete the process of VðsÞ ! Vðs0 Þ. The simulation process (choose a0 ) occurs before the DNN is called(get Vðs0 Þ), so this paper makes the following changes: in the simulation process, when choose a move a0 , call the basic rules to determine whether this move can form “connect-five”. If so, return directly to Vðs0 Þ ¼ 1 or  1, skipping the operation of the next value networks and policy networks; otherwise, it will work normally. In Fig. 3, we cite some of these situations, in which the winning or losing can be completely determined, so there is no need to continue with the subsequent simulations. Further research shows that there are many similar situations in the model of Gomoku, so these states can be added to the basic rules of judging the win.

Fig. 3. The winning board of Gomoku (a) black chess place at 9 (b) black chess place at 11

A Game Model for Gomoku Based on Deep Learning and MCTS

93

Through such a change, the training process is greatly accelerated. The reasons why it is possible and can be accelerated are as follows: Compared with Go, judgment of winning or losing depends on all the chess on the board, in Gomoku, focus more on the outcome of the latest move, so when we get the next best move a0 by policy networks, we can already judge whether form “connect-five”, win or not, and it is not necessary to judge by value networks. And then When the MCTS SIMS is relatively high, most of the cases that trigger backup is Vðs0 Þ ¼ 1 or  1, so, we can foresee that a complete self-play process can skip a lot of time for running DNN. In the meanwhile, the score Vðs0 Þ that return directly is consistent with the score Vðs0 Þ returned by value networks, so it is guaranteed that the score will not be ambiguous can be used by MCTS. Finally, the rules for judging win belong to the category of basic rules.

4 Test and Analysis This paper verifies and analyzes some aspects involved in the Gomoku model, including the comparison of the model’s strength, the analysis of the model error, the comparison of the moving speed before and after the improvement of the MCTS, and the learning process of the model in training. 4.1

Result of Competitions

In order to observe the changes of strength, we use Keas to save the parameters obtained from self-play. After one-week training, 53 different versions of the network model are collected. Table 1 selects 27 of them, lets them play against with other version 10 times. Take the number 1 as an example, 1 vs 2, which means that black chess is the first version and white chess is the second version, 5:0:5 shows that in 10 confrontations, black chess wins 5 times, white chess wins 5 times and draw 0 times. From the number of 1–5, we can see that chess strength has obviously improved, and white chess is better than black chess. In order to observe the restrictions of the forbidden rules for the “first-hand win” advantage in self-play, in the numbers 6–16, we let black side uses the later version and white side uses earlier version, it is found that the forbidden rules will limit the chess power of black at the beginning, but as the training version increases, black side’s “first-hand win” advantage gradually becomes obvious, finally, this advantage exceeds the limit of the forbidden rules. From the number of 17–21, black side uses earlier version, the later version of Gomoku model achieves better performance than the earlier version, but in fact, the “first-hand win” advantage of black side weakens this “better performance”. Although “first-hand win” has a great impact on the self-play process, overall, the strength of the model has been improving, we used the last version against the first version for 100 times, and the last version had obvious advantages.

94

X. Li et al. Table 1. The results of the competitions.

Number Version Result Number Version Result Number Version Result

4.2

1 1 vs 2 3:0:7 9 10 vs 9 5:0:5 17 18 vs 19 3:0:7

2 2 vs 3 5:0:5 10 11 vs 10 6:1:3 18 19 vs 20 4:1:5

3 3 vs 4 3:0:7 11 12 vs 11 8:0:2 19 20 vs 21 4:0:6

4 4 vs 5 4:0:6 12 14 vs 13 5:0:5 20 21 vs 22 5:1:4

5 5 vs 6 1:0:9 13 15 vs 14 7:1:2 21 22 vs 23 6:0:4

6 7 vs 6 5:0:5 14 16 vs 15 9:0:1 22 1 vs 53 0 : 1 : 99

7 8 vs 7 4:1:5 15 17 vs 16 5:2:3 23 53 vs 1 100 : 0 :

8 9 vs 8 6:1:3 16 18 vs 17 5:1:4

0

Model Error

The target of using DNN to train model is to minimize the error between the actual winner and the value networks’ predicted winner, and to maximize the similarity between the actual movement and the policy networks’ predicted movement, Fig. 4 records the training errors of the value network and the policy network during self-play.

Train policy loss

Train overall loss

Train value loss

Fig. 4. Model’s training loss varies with the number of self-play.

The top line is the error in the policy networks, which is calculated by the mean square error, the bottom line is the error in the value networks, which is calculated by the cross entropy. The middle line is the average of both errors. In the beginning, the

A Game Model for Gomoku Based on Deep Learning and MCTS

95

model loss is relatively large, because the Gomoku model has no experience for selecting a move, most of them are randomly selected. After more training, some experience is stored. The move is relatively reasonable and the error is reduced. And then, the error of the model decreases slowly, which also shows that the improvement of strength is slower than before. 4.3

Moving Speed

When DNN is used to guide MCTS, we speed up the moving time in training by changing the time of calling the basic rules. In 9 * 9 board, every step uses an MCTS with 100 simulations to select each move ðMCTS SIMS ¼ 100Þ. In the 1600 self-play games, the average time of the first 26 steps was recorded, and Gomoku model plays under no time limit. The average moving time before and after improvement is shown in Fig. 5. It can be seen that the speed of the move increases as the number of chess increases. This is because the search space of the legal moves decreases as the number of chess on the board increases, in the meanwhile, the thinking time also decreases. Besides, when the number is odd, the time is longer, in which the odd number is black and the even number is white. The black side needs to consider complex rules of forbidden moves, so the time of thinking will be longer.

Fig. 5. The mean time of each move.

4.4

Learning Process

The knowledge learned by the model is increasing, and a more stable opening formula is gradually adopted, the randomness of moving is gradually reduced, more moves prefer to be effective ones, and some common techniques used by human players are also learned to help expand the advantages of the situation, as shown in Fig. 6.

96

X. Li et al.

Fig. 6. (a) In the 70 self-play games, Gomoku model has learnt to form double three: 3–11–7, 12–10–8. (b) In the 150 self-play games, learn to prevent the enemy from forming “connect-five” and “connect-four”: 11–7–13–5, 4–16–2. (c) At around 70 games, learn to expand advantage without triggering the forbidden moves rules, and there is “block-three-three”, and no forbidden rules are triggered: 4–3–11–5, 11–7–9–10.

5 Conclusion For the study of the game mode of Gomoku, this paper uses the tree search evaluated positions and selected moves using DNN. It only requires the basic rules and some forbidden rules of Gomoku, and doesn’t require expert knowledge. According to the characteristics of Gomoku, it is appropriate to change the search strategy of MCTS and improve the speed of the move. Tensorflow and Keras are used to build the neural networks, the training speed of the Gomoku model is guaranteed with only one GPU and single thread. After 1600 self-play games, the chess strength of the model has been greatly improved. Although it can’t achieve superhuman performance, it provides new insights for the ancient game of Gomoku, and provides a possibility to reproduce, study, improve upon, and extend AlphaGO Zero. Acknowledgment. This work is funded by National Natural Science Foundation of China (61602539, 61873291 and 61773416).

References 1. LeCun Y, Bengio Y, Hinton G (2015) Deep learning. Nature 521:436–444 2. Mnih V et al (2015) Human-level control through deep reinforcement learning. Nature 518 (7540):529–533 3. Bouzy B, Helmstetter B (2004) Monte-Carlo go developments. In: ACG, pp 159–174 4. Bouzy B (2006) Move-pruning techniques for Monte-Carlo go. In: Advances in computer games, pp 104–119 5. Guo X et al (2014) Deep learning for real-time atari game play using offline Monte-Carlo tree search planning. Adv. Neural Inf. Process. Syst. 4(27):3338–3346 6. Silver D et al (2016) Mastering the game of go with deep neural networks and tree search. Nature 529(7587):484–489

A Game Model for Gomoku Based on Deep Learning and MCTS

97

7. Silver D et al (2017) Mastering the game of go without human knowledge. Nature 550 (7676):354–359 8. Silver D et al (2018) A general reinforcement learning algorithm that masters chess, shogi, and go through self-play. Science 362(6419):1140–1144 9. Papadopoulos A et al (2012) Exploring optimization strategies in board game abalone for alpha-beta search. In: 2012 IEEE Conference on Computational Intelligence and Games (CIG), pp 63–70 10. Barto AG (2007) Temporal-difference learning. Scholarpedia 2(11):1604 11. Hoki K, Kaneko T (2014) Large-scale optimization for evaluation functions with minimax search. J Artif Intell Res 49(1):527–568 12. Mnih V et al (2013) Playing atari with deep reinforcement learning. ArXiv Preprint arXiv: 1312.5602 13. He K et al (2016) Identity mappings in deep residual networks. In: European Conference on Computer Vision, pp 630–645 14. Abadi M et al (2016) TensorFlow: a system for large-scale machine learning. In: Operating systems design and implementation, pp 265–283 15. Choi K et al (2017) Kapre: on-GPU audio preprocessing layers for a quick implementation of deep neural network models with keras. ArXiv Preprint arXiv:1706.05781 16. Jain P et al (2010) Inductive regularized learning of kernel functions. Adv Neural Info Process Syst 23:946–954 17. Wang Y, Gelly S (2007) Modifications of UCT and sequence-like simulations for montecarlo go. In: 2007 IEEE Symposium on Computational Intelligence and Games, pp 175–182 18. Kocsis L, Szepesvári C (2006) Bandit based Monte-Carlo planning. European conference on machine learning, Springer, Heidelberg

Cascading Failure Analysis of Military Command and Control Network Based on SIS Model Jichao Xing1(&), Zhaoliang Zhu1, Chuxiang Chen2, and Xiaofeng Guo2 1

Graduate School, Information Engineering University, Zhengzhou 450001, China [email protected] 2 Department of Information Warfare Command, Information Engineering University, Zhengzhou 450001, China

Abstract. As the “central nervous system” of joint operations system, the military command and control network has become a key factor for the effectiveness of the system. Based on the characteristics of military command and control network, this paper proposes a networked command and control model based on the traditional hierarchical command and control model and study the problem of cascading failure on the network according to the classic infectious disease SIS model. The simulation and experiment of random failure and important node failure are carried out to verify the validity and usability of the model, which provides a new idea and method for subsequent research. Keywords: Military command and control network Cascading failure

 SIS model 

1 Introduction Cascading failure is the failure of one or a few nodes or edges in a complex network triggering the failure of other nodes owing to the coupling relationship among the nodes, which eventually leads to the collapse of a considerable number of nodes or even the entire network. Due to the emergence of complex networks, once a part of it fails, it is possible to amplify the impact of the fault through the connections of nodes, which ultimately has catastrophic consequences for the entire network [1]. Since 2002, Motter and Lai proposed the cascading failure theory analysis model for the first time, and commenced the study of cascading failure on scale-free network [2]. Researchers have proposed different cascading failure models for different networks such as power transmission networks, transportation networks, Internet, military networks, infectious disease cascades and so on. With the development of information technology, the current form of warfare is gradually transforming into a military system that is supported by information systems and combined with various combat forces such as land, sea, air, space, and cyberspace, which lays stress on integrity and emergence [3, 4]. As the “central nervous system” of © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 98–105, 2020. https://doi.org/10.1007/978-981-32-9050-1_11

Cascading Failure Analysis of Military Command and Control Network

99

joint operations system under the conditions of informationization, the command and control (abbreviated below as C2) network plays a vital role in obtaining battlefield dominant control, supporting the system framework and enhancing operational efficiency. When the key nodes in the network are invalidated, it is highly probable that cascading failure will eventually result in deconstruction of the entire combat system. Therefore, the study of cascading failures in C2 network is an effective way to explore the immanent mechanism of warfare complex system and enhance the survivability and robustness of combat system. At present, the study of failure of military networks (such as C2 networks or communication networks) is mainly based on percolation theory [5–7]. However, the model assumes that node failure is an irreversible process. In other word, once a node fails, it will not be restored, which deviates from the actual situation of the combat operation. Therefore, this paper attempts to propose a new analysis method of cascading failure problem in military C2 network by means of the SIS (SusceptibleInfectious-Susceptible) model, which may provide reference for subsequent research.

2 Military Command and Control Network Modeling Through the use of various combat forces, the C2 network integrates the battlefield distribution’s combat power to maximize the combat space situation and achieve unified planning of operational resources [8]. Therefore, the military C2 network can be described as G = (V, E), nodes set V = {v1, v2, v3, …, vn} represents all levels and types of command agencies, edges set E = {e1, e2, e3, …, em} represents the command and control relationship command agencies. Referring to [9], the C2 network model can be divided into the traditional hierarchical C2 model and the networked C2 model. 2.1

The Traditional Hierarchical Command and Control Model

According to the traditional military system, the C2 network can be described as a tree network model in which “the first-level node commands and controls multiple secondary-level nodes, and multiple secondary-level nodes respectively command and control multiple lower-level nodes”, as shown in Fig. 1.

Fig. 1. Schematic diagram of the traditional hierarchical C2 model

100

J. Xing et al.

Therefore, the traditional hierarchical C2 model can be generated according to the following algorithm: Step 1. Determine the level L of the C2 network, the command and control span M of each node (the number of lower nodes commanded and controlled). Step 2. Generate a No. 1 level node (root node) and set the level flag Lindex = 1. Step 3. According to the command and control span M determined in Step 1, M subordinate nodes are generated and connected to the upper nodes respectively, Lindex = Lindex + 1. Step 4. Repeat Step 3 until Lindex = L. 2.2

The New Networked Command and Control Model

The new networked C2 structure is an improvement of the traditional hierarchical C2 model to maximize the interconnection efficiency among the C2 nodes. The model is formed on the basis of the traditional hierarchical C2 model by increasing the synergy between peers and the level of command relationship between cross-level nodes, as shown in Fig. 2.

Fig. 2. Schematic diagram of the new networked C2 model

The generation algorithm can be modified by adding the following steps based on the traditional hierarchical C2 model generation algorithm: Step 5. Determine the probability of synergy connection rc and the probability of cross-layer connection rs. Step 6. According to the level flag Lindex = 2, find a node set and add edges between two nodes according to the probability of synergy connection rc, Lindex = Lindex + 1. Step 7. Repeat Step 6 until Lindex = L. Step 8. An upper-level node set can be found according to the level flag Lindex = 1 and a lower-level nodes set can be found according to the level flag Lindex = Lindex + 2, Lindex = Lindex + 3,…, Lindex = L. Edges shall be added between two nodes according to the probability of cross-level connection rs, Lindex =Lindex + 1. Step 9: Repeat Step 8 until Lindex = L.

Cascading Failure Analysis of Military Command and Control Network

2.3

101

Model Instance

Referencing paper [9], set L = 3, M = 8, rc = 0.1, rs = 0.05 and a new networked C2 model is generated according to the new networked C2 model generation algorithm. Table 1 shows the basic parameters of the network. Table 1. Basic network parameters of the new networked C2 model Number of nodes N 73

Number of edges E 560

Average degree 7.6712

Network diameter D 4

Average path length 2.2915

Clustering coefficient C 0.1130

3 Cascade Failure Analysis Based on SIS Model Both the SIR(Susceptible-Infective-Removal) model and the SIS model are classic infectious disease models, which were proposed by Kermack and McKendrick in 1926 and 1931 [10, 11]. A node of state I (Infective) in the SIS model can propagate the disease to a node of state S (Susceptible). At the same time, the node state will be changed from I to S, which means that the node is back to normal but resistless and may still be affected by other I nodes. In the actual combat process, the cascading failure process in the C2 network is like the SIS model. On one hand, C2 nodes may become ineffective due to internal or external factors and affect other nodes causing certain cascading failures; on the other hand, the failed node can be restored to normal state through certain repair work, but it does not mean that it has produced “antibody”. 3.1

Basic State Description of Nodes

The model is described as: In the military C2 network, owing to enemy damage or internal damage of the system, the nodes in the node set Xini are destroyed and affect other nodes in the form of probability propagation. Therefore, the node has the following two states. Normal State: The state in which the nodes operate normally and may be affected by other nodes. Because the importance of the nodes in the C2 network is different, the propagation factor ai is different when the nodes fail. Failure State: In the C2 network, a node fails due to external or internal factors. It has the possibility of transmitting the failure state to other alleged nodes, and at the same time, the failed node can be transformed into a normal state by self-repair. Generally, its recovery factor is determined by the node’s own attribute bi . 3.2

Propagation Factor and Recovery Factor

The values of the propagation factor ai and the recovery factor bi of the nodes in the C2 network reflect the diversity of the protection capabilities and propagation capabilities. Important nodes tend to have larger propagation factors and small recovery factor,

102

J. Xing et al.

which is difficult to restore to a normal state effectively once a failure phenomenon occurs owing to their own complicated structures. On the other hand, the general node’s propagation ability is not strong, which can be restored in time once the failure occurs because of its relatively simple system. In general, there are many factors that influence the importance of the node, such as location, node level, device performance, etc. In this paper, we selected degree centrality and betweenness centrality to calculate the propagation factor and recovery factor of nodes for the convenience of model simplification and experimental simulation according to reference paper [12, 13]. Degree centrality and betweenness centrality are parameters used to reflect the relative importance of each node in the network. The degree of centrality is defined as: the degree centrality Ci of node vi is the degree ki divided by the maximum possible degree N − 1, i.e. CD ðvi Þ ¼ ki =ðN  1Þ

ð1Þ

The betweenness centrality is defined as: the normalized betweenness of nodes vi, i.e. Bi ¼

X

½njl ðiÞ=njl 

ð2Þ

1  j  l  N;j6¼i6¼l

CB ðvi Þ ¼ 2Bi =½ðN  1ÞðN  2Þ

ð3Þ

In which, Bi is the betweenness of nodes vi, CB(vi) is the value of the betweenness centrality of node vi; njl is the shortest path between nodes vj and vl, njl(i) is the shortest path between nodes vj and vl through node vi, and N is the total number of nodes in the network. The calculation methods for the propagates factor and recovery factor of the node vi are respectively set as: 0

0

ai ¼ ð1  hÞekðCD ðvi Þ1Þ þ hekðCB ðvi Þ1Þ 1

1

0

0

bi ¼ ð1  hÞeuCD ðvi Þ þ heuCB ðvi Þ 1

1

ð4Þ ð5Þ

In which, CD0 ðvi Þ is the normalized value of the degree centrality of the node vi, is the normalized value of the betweenness centrality of node vi, h 2 ð0; 1Þ is a weight parameter, and k and u are adjustment parameters.

CB0 ðvi Þ

3.3

Propagation Process

It is assumed that the C2 network is attacked by enemy or fails to complete the command and control task for its own sake. The failed node i 2 Xini will affect the normal state nodes connected to it which result in the blocking or overloaded and eventually lead to its failure. In other word, the failed node will propagates the failure

Cascading Failure Analysis of Military Command and Control Network

103

state to the nodes connected to it. Event A is that the failed node i propagates its failure state to the node j connected to it is A, then: Pi;j ðAÞ ¼ ai

ð6Þ

Under the influence of the failed node, other nodes will also gradually generate a failure state. Meanwhile, the failed node can be restored to its normal state by repairing itself. Event B is that the failed node j recovers from the failed state to the normal state is B, then: Pj ðBÞ ¼ bj

ð7Þ

As the process progresses, the C2 network will eventually exhibit a state of dynamic equilibrium. According to the analysis, the simulation steps of the propagation process are as follows: Step 1. Calculating the degree centrality and betweenness centrality of each node in the C2 network. Step 2. Calculate the propagation factor and recovery factor of each node according to formula (4) and (5). Step 3. Set the initial failed node set Xini according to the experimental requirements and update the failed node set XFai . Step 4. Judge whether the failed node returns to the normal state according to formula (3) and (7), and if it is restored, removing the nodes from XFai . Step 5. The failed node set A has an influence on other nodes. Judging whether a node j in the C2 network is also invalid according to formula (6), and if so, classify it into B. Step 6. Repeat Step 4 and Step 5 until the number of iterations is reached.

4 Simulation Results and Analysis According to the analysis, set the weight parameter h ¼ 0:5, adjustment parameters k ¼ u ¼ 1, the initial number of failed nodes is 7, and the number of simulation iterations is 50. Simulation experiments were carried out on two different cases of random failure and important node failure of the C2 network built in Sect. 2.3. The random failure is to randomly select 7 initial failure nodes from the network, reflecting the evolution of the nodes when the network is against random attacks. And the important node failure is to select 7 out of the 9 important nodes among level flag Lindex  2 as the initial failure node, reflecting the evolution of the node when the network is against the enemy’s precision attack. At the same time, in order to eliminate the random error that may occur in the simulation experiment, 50 experiments were repeated, and the overall results were analyzed. The results are shown in Fig. 3. As the figure shows, the ratio of normal nodes decreased at the beginning, when the C2 network suffers from random failure attacks. And because the nodes have repair capabilities, they can timely deal with node failures and eventually make normal node

104

J. Xing et al.

ratio in the network stabilize at around 90%, which basically eliminates the impact. When the C2 network is attacked by precision attack, the cascading failure problem of the network can affect more than half of the nodes in a short time. Ultimately, it is difficult to rely on the repair capability of the network itself to eliminate the impact of the cascading failure problem.

Fig. 3. Random node failure and important node failure simulation result curve

Simulating our network in the model constructed in paper [12] with the same initial parameters. The result that the node survival rate is 0.876 under the random attack and is 0.523 under the precision attack is basically consistent with this paper. Therefore, the C2 network model constructed in this parer has certain validity, and its “robust and fragile” characteristics are in line with the characteristics of the command and control system [4]. Based on the experiments, set parameter u ¼ 1; u ¼ 1:1; u ¼ 1:2; u ¼ 1:3 and simulate the important node failure problem of the C2 network. The results are shown in Fig. 4.

Fig. 4. Simulation results of important node failures under different parameter u

The result shows that, as the recovery ability of important nodes increases gradually, the impact of the C2 network cascading failure can be alleviated to some extent. However, due to the influence of important nodes, even if the recovery capability of important nodes increases, it is still impossible to avoid the phenomenon that the network performance declines more seriously in the early stage of failure. Therefore, how to accurately identify

Cascading Failure Analysis of Military Command and Control Network

105

the important nodes in the C2 network and enhance the anti-destructive performance of important nodes are the key to improving the survivability of C2 network.

5 Conclusion The military C2 network is the key system in the future information warfare. Based on the characteristics of C2 network under the conditions of informationization, this paper establishes a new networked C2 model with traditional hierarchical C2 model. And simulating the cascading failure problem on the C2 network based on SIS model provides a way of addressing such problems. The shortcoming is that the parameter setting of the propagation and recovery capability is relatively simple, and the influence of defense capability and fault tolerance of nodes is not considered. In the next step, relevant in-depth research will be carried out.

References 1. Lao S, Wang J, Bai L (2016) Review of the interdependent networks. J Natl Univ Defense Technol 38(01):122–128 (in Chinese) 2. Motter AE, Lai YC (2002) Cascade-based attacks on complex networks. Phys Rev E 66 (8):065102 (S1539–3755) 3. Shen S, Zhang G, Zhu J (2012) Combat complex system modeling and experiment. National Defense Industry Press, Beijing (in Chinese) 4. Hu X, Yang J, Si G, Zhang M (2008) Simulation analysis and experiment of war complex system. National Defense Industry Press, Beijing (in Chinese) 5. Zhu T, Chang G, Zhang S, Guo R (2010) Research on model of cascading failure in command and control based on complex networks. J Syst Simul 22(08):1817–1820 (in Chinese) 6. Sun Z, Zhang B, Wang Q (2014) A cascade failure model based on war networks. J Lanzhou Univ Technol 40(05):95–99 (in Chinese) 7. Li K, He Y, Wu W, Liu F (2018) Reliability of complex hierarchical network for cascading failure. J Huazhong Univ Sci Technol (Nat Sci Ed) 46(09):45–51 (in Chinese) 8. Peng J, Zhang M (2016) Study of complexity, modeling and simulation of network information systems of system. J Equipment Acad 27(06):106–111 (in Chinese) 9. Luo J, Mao X, Liu Y, Wang C (2018) Research on modeling and evaluation of combat command system network structure. J CAEIT 13(06):642–649 (in Chinese) 10. Kermack WO, McKendrick AG (1927) Contributions to the mathematical theory of epdemics. Proc Roy Soc A115:700–721 11. Kermack WO, McKendrick AG (1932) Contributions to the mathematical theory of epdemics. Proc. Roy. Soc. A138:55–83 12. Shen D, Ren Q, Wang P, Zhu R (2018) Research and simulation of risk propagation model of military multiple elements state cyberspace. Syst Eng Electron 41(02):365–371 (in Chinese) 13. Kitsak M, Gallos LK, Havlin S et al (2010) Identification of influential spreaders in complex networks. Nat Phys 6(11):888–893

Laser Scan Matching in Polar Coordinates Using Gaussian Process Yinqiang Wang, Bo Li, Bo Han(&), Yu Zhang, and Wenjie Zhao Zhejiang University, Hangzhou, China {wangyinqiang,11224012,bhan1,zhangyu80, zhaowenjie8}@zju.edu.cn

Abstract. Laser scan matching serves an important role as pose estimation in autonomous navigation for mobile robots. As a classic approach, iterative closest point (ICP) finds corresponding point pairs in a brute-force way, which is time consuming. For eliminating the cost of searching the correspondence between the point pairs, polar scan matching (PSM) uses a matching bearing rule by making use of the laser measurements collected in polar coordinates. However, PSM might occur mismatching when the irrelevant region of the reference and current scans has a similar distribution on polar range. In order to obtain better results, we propose a novel laser scan matching method based on a new type of map representation using GP regression in polar coordinates. With this map representation, the corresponding point pairs can be found in a simple and efficient way. Based on these pairs, we get the robot pose by iteratively estimating the orientation and translation. For dense-point-scan data sets, our approach demonstrates an outstanding performance compared with traditional approaches like ICP and PSM in terms of both accuracy and efficiency. Keywords: Laser scan matching

 Gaussian process  Polar coordinates

1 Introduction Laser scan matching plays an essential role in mobile robots navigation. Given two sets of laser range measurements, scan matching finds the rotation and translation that best align them. According to different types of sensors, laser scan matching can be classified into 2D and 3D situations. A 2D laser scan is a two-dimensional point set of noisy range measurements along with their incremented angles. This paper focuses on 2D laser scan matching. In the past, the problem of 2D laser scan matching has been well studied and there exists many approaches. Iterative closest point (ICP) [1] is widely used as a classic point-to-point matching approach. As its name suggests, ICP iteratively finds the closest points as corresponding pairs. Due to the closest principle, two scans have to be traversed for determining correspondence. This brings increased complexity and runtime consumption. In order to eliminate the cost of the search for point pair correspondence, polar scan matching (PSM) is proposed by Diosi [2]. PSM creates a matching bearing rule by making full use of the laser measurements in polar coordinates, where the polar radiuses can be associated with each other based on same © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 106–115, 2020. https://doi.org/10.1007/978-981-32-9050-1_12

Laser Scan Matching in Polar Coordinates Using Gaussian Process

107

azimuth. PSM, however, might bring mismatching problem when the irrelevant region of the reference and current scans has a similar distribution on polar range. In pursuance of better results, we propose a novel laser scan matching method based on a Gaussian process (GP) regression in polar coordinates. First, we present a new representation of scan based on the Gaussian process map reconstruction method. This new representation is compact and can inherit the spatial structure of the raw laser scans. Based on this representation, we build a simple and efficient matching rule, which sets point pairs at same bearings. The pose is obtained by iteratively carrying out the orientation estimation and translation estimation. The work is a variation of our previous work [3], which used GP in Cartesian coordinates. The major contributions of this work are as follows, (1) A new representation of scan is proposed. Laser scans are reconstructed based on Gaussian process regression, which fully describes the spatial structure of the environments. This new representation can effectively avoid getting stuck in wrong local minima in orientation estimation. (2) A new matching rule is proposed, which can reduce the computational cost of transformation estimation. The structure of our paper is organized as follows: Sect. 2 describes the proposed GP-based laser scan matching approach. Section 3 presents the experiment results, where our approach is compared with ICP and PSM. Finally, Sect. 4 summarizes the proposed work.

2 Approach 2.1

Gaussian Process Map Reconstruction

In our work, GP is used for processing laser scans as a map reconstruction. There are two goals of GP map reconstruction: one is to convert the raw sensor into a lowerdimensional form to avert getting trapped in the wrong local minima in the scan matching process; the other is to adjust the new test locations into the desired locations, which is a fundamental step for finding the point pair correspondence. With these two goals, our approach can be regarded as a type of interpolation. We formulate the interpolation as a GP regression by taking the raw data as training points and using the test locations and predictions as the map reconstruction results. The procedures below are directly based on the work of Rasmussen [4]. The nonlinear regression problem is usually formed as follows: given a training data set T ¼ fli ; zi gni¼1 of n pairs of locations li 2 R and noisy observations zi 2 R, obtain the predictive distribution for the realization at the test locations li , denoted by zi ¼ f ðli Þ. In the typical GP regression, a joint Gaussian distribution with average  function mðli Þ and covariance function k li ; lj is considered to model the data set. In addition, we that the covariance on every observation is given  assume 2 cov ¼ k li ; lj þ rn , where r2n represents the variance of an independent and normally

108

Y. Wang et al.

distributed noise term. Defining l ¼ ½l1 ; l2 ; . . .; ln , z ¼ ½z1 ; z2 ; . . .; zn , l ¼ ½l1 ; l2 ; . . .; lm  and z ¼ ½z1 ; z2 ; . . .; zm , the joint distribution is 

   kðl; lÞ þ r2n I z  N mðlÞ; z kðl; l ÞT

kðl; l Þ k ðl  ; l  Þ

 ;

ð1Þ

Where mðlÞ is the mean value of l, I is the identity matrix, kðl; lÞ is the matrix which is the so-called kernel function, and k ðl; l Þ, ðl ; l Þ is similar. In our work, we choose the exponential kernel as the covariance function to cope with more general environments. The exponential kernel function is given as     k li ; lj ¼ expðrf li  lj Þ;

ð2Þ

where rf is a length-scale. Given the joint distribution of Gaussian variables, the predictive value z at the test locations l is

1 z ¼ k ðl; l ÞT k ðl; lÞ þ r2n I z;

ð3Þ

and its uncertainty is provided by the covariance function

1 covðz Þ ¼ kðl ; l Þ  kðl; l ÞT k ðl; lÞ þ r2n I kðl; l Þ:

ð4Þ

In the context of the problem at hand, each location l is equal to / and each observation z is equal to q, where / and q are the bearing (azimuth angle) and the polar radius in polar coordinates, respectively. Involving calculating the inverse matrix of kðl; lÞ, the computational speed of the scan matching would dramatically slow down when the amount of the used data set is enormous. To deal with this issue, we use a fast approximation approach by utilizing the local information from the neighboring training points near each test bearing. Here, we choose the kd-tree as our nearest neighbor search tool. First, we create a kd-tree that arranges on the training points, which are stored by their distribution on bearings. By performing a kd-tree search, we find p training points for each test bearing. Then the prediction at this test bearing is computed using these training points. Based on the characteristic of the exponential kernel, the interrelationship would become weak when the distance between points is large. Therefore, this local approximation method could guarantee the accuracy while reducing the computational complexity. By querying the test bearings, the predictive points along with their variances are calculated using GP regression. Ambiguous predictions with large variance must be removed to obtain an accurate map. We use an example of typical laser scan data to illustrate the removing step of our map reconstruction method in Fig. 1. The predictive points with their variances are denoted by as scatter plots in Fig. 1(a). By selecting predictive points with variance below a certain threshold (like r \ 0:1), an accurate point-set-like map is obtained as shown in Fig. 1(b).

Laser Scan Matching in Polar Coordinates Using Gaussian Process

109

Fig. 1. Illustration of the prediction selection procedure in Cartesian coordinate.

Back to the two goals introduced at the beginning of this sub-section, these goals can be achieved by customizing the number and values of the test bearings. By customizing the number of test bearings, the dimension of the map representation is reduced and the problem of getting stuck in wrong local minima is avoided. Customizing the values of the test bearings ensures that the corresponding relationship between the predictive point pairs used for scan matching is fixed, which avoids the expensive search for finding the point pair correspondence. 2.2

Iterative GP Points Scan Matching

Following an approach similar to that of PSM, we proceed with an iterative scan matching strategy and represent the rigid transformation by orientation estimation and translation estimation, separately. Assume that there are two scans in polar coordinates   shown in Fig. 2(a): R ¼ xr ; yr ; hr ; f/ri ; qri gni¼1 is the reference scan, where xr ; yr ; hr describe the pose including position and orientation, and f/ri ; qri gni¼1 describe n laser range measurements qri at bearings /ri , similarly for the current scan C ¼ ðxc ; yc ; hc ; f/ci ; qci gni¼1 Þ. The pose variation ðDx; Dy; DhÞ describe the transformation between these two scans.

Fig. 2. Illustration of the iterative GP points scan matching using two typical laser scans.

The change of orientation from the reference scan to the current scan is easy to estimate in polar coordinates by a shift along with the azimuth axis. The correct orientation estimation can be found when the current scan covers the reference scan as

110

Y. Wang et al.

much as possible. The translation can be estimated more accurately if the orientation has been estimated correctly. Thus, we aim to find the correct orientation estimation Dh first. In every shift, the average absolute range residual function r ðhÞ of the corresponding point pairs is calculated to measurement the size of the overlap region. Different from PSM that uses raw points for finding the best orientation estimation, our method uses the predictive points resulted from the GP map reconstruction step. And the corresponding point pairs are determined by the predictive points pairs R ¼ m f/ri ; qri gm i¼1 and C ¼ f/ci ; qci gi¼1 (see Fig. 2(b)) with the same test bearings and variances below the same threshold. The obtained orientation estimation ^h may not be accurate enough since the shifting is stochastic in a discrete form. The orientation correction ^ hc can be estimated using quadratic polynomial interpolation, which approximates the curve r ðhÞ consisted of 3 smallest residual points in the shifting step. Suppose that the 3 points are ð0; r0 Þ, ð1; r1 Þ and ð1; r1 Þ. According to the quadratic formula, the abscissa of the minimum rmin is ^hm ¼

r1  r1 : 2ðr1 þ r1  2r0 Þ

ð5Þ

In this example, we have assumed that the initial orientation estimation corresponds to 0 and the interval between points is 1. In general, the complete orientation estimation is actually Dh ¼ ^h þ ^hc ¼ ^h þ ^hm ures ;

ð6Þ

where ures is the angular resolution of the laser range finder. For every bearing /ri in polar coordinates, there always exists a polar range qri from the reference scan corresponding to a polar range qci from the current scan. In this part, we aim to find the translation estimation ðDx; DyÞ, which minimizes the P 0 weighted square range residual function J ¼ wi ðqri  qci Þ2 . As seen in this function, wi denotes a weighting factor that is employed to weaken the bad influence of mismatching. To minimize the objective function J, the Taylor expansion is applied to 0 linearize the nonlinear term qci ðDx; DyÞ as follows 0

0

0

qci ðbÞ  qci ðb0 Þ þ rqci ðb0 ÞT ðb  b0 Þ;

ð7Þ

0

where b ¼ ½Dx; DyT , b0 represents the initial value, and rqci ðb0 ÞT has been derived from two terms as follows 0

@qci 1 2ðqci cosð/ri Þ þ DxÞ ¼ qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi @Dx 2 ðqci cosð/ri Þ þ DxÞ2 þ ðqci sinð/ri Þ þ DyÞ2 0

q cosð/ Þ ¼ ci 0 ri ¼ cosð/ri Þ: qci

ð8Þ

Laser Scan Matching in Polar Coordinates Using Gaussian Process

111

0

@qci @Dy

¼ sinð/ri Þ is obtained in a similar way. Then, we have the linearized objective function: J ðbÞ ¼ ½Z  H ðb  b0 ÞT W ½Z  H ðb  b0 Þ;

ð9Þ



T 0 0 where Z ¼ qr1  qc1 ; qr2  qc2 ; . . . , W ¼ diagðw1 ; w2 ; . . .Þ, and H is a matrix like 2 H¼

0

@qc1 6 @Dx 6 @q0c2 4 @Dy



0

@qc1 @Dy 0 @qc2 @Dy



3

2 cosð/r1 Þ 7 7 ¼ 4 cosð/r2 Þ 5 

3 sinð/r1 Þ sinð/r2 Þ 5: 

ð10Þ

According to the solution equation for weighted least squares [5], the translation estimation b is calculated by minimizing the objective function shown in (9).  1 b ¼ b0 þ H T WH H T WZ:

ð11Þ

When a transformation is calculated in a given iteration, it becomes the initial transformation for the next iteration. The map construction process for both the current scan and the reference scan is repeated to obtain a better point correspondence. The iteration procedure continues until the termination condition is satisfied. The termination condition is set as the orientation and translation estimation are both below a certain threshold. As shown in Fig. 2(c), the result of the aligned predictive point pairs is obtained. The transformation Tfinal also aligns the raw laser scans with high accuracy, as shown in Fig. 2(d), which verifies the effectiveness of our approach. The overall scan matching procedures are summarized in Fig. 3.

3 Experiment Results We implement the proposed approach on data sets gathered by the authors at a workshop in Hangzhou, China with a Hokuyo UTM-30-LX-EW laser range finder. The sensor works with a scanning frequency of 25 Hz and it produces 1081 range measurements per scan. The approach runs on a standard PC with a MATLAB R2017b environment. We also implement the well-known PSM and ICP methods for benchmarking. The performances of algorithms are compared with regard to accuracy and computational time. The accuracy of the alignment results is measured qualitatively and quantitatively. Due to the ground truth is not available, we evaluate the accuracy of the alignment by comparing the mean squared error (MSE), which is utilized by Holy [6].

112

Y. Wang et al.

Fig. 3. Procedures of the iterative GP points scan matching

To test the robustness thoroughly, we adopted the scenes with absolute variations of pose varying from small to large. The alignment results of different scenes by our approach and the other methods are shown in Figs. 4, 5 and 6. The scan data in Scene 1 was obtained at the center of the workshop. As shown in Fig. 4(a), the pose had a small change from the reference location to the current location, thus two laser scans have a similar structure. The alignment results for Scene 1 are good for all three scan matching methods as one can see in Fig. 4(b)–(d). Scene 2 is situated on the border of the workshop. As seen in Fig. 5, the results are quite good except for ICP. Scene 3 is situated in a more cluttered environment where the overlap region is smaller than that in Scene 1 and 2. For this scene, ICP still fails to provide an alignment result good enough while our approach and PSM perform well, as shown in Fig. 6. To quantitatively compare the approaches, the MSEs, the run time (ms) and the number of iterations are shown in Table 1. As mentioned before, the alignment accuracies of the scans are compared through the MSE. As can be seen in the table, our approach performs a better result in terms of accuracy and efficiency than PSM and ICP in all three scenes.

Table 1. Quantitative performance of the three approaches. Workshop Scene 1 Scene 2 Scene 3 MSE Time Iterations MSE Time Iterations MSE Time Iterations Ours 0.0183 23.5 5 0.0205 15.1 3 0.0341 38.2 8 PSM 0.0252 65.2 11 0.0268 56.2 12 0.0483 114 23 ICP 0.0180 44.6 38 0.0441 42.1 53 0.1068 53.4 78

To further illustrate the advantage of our approach in terms of accuracy, we build a map with 100 consecutive aligned scans as demonstrated in Fig. 7. As shown in the figure, our approach and PSM form a more distinguished and clear structure of the environment, which outperform the result obtained by ICP. The MSE sequences of all methods are shown in Fig. 8. The average MSE of our approach, PSM and ICP are 0.0488, 0.0584, and 0.1307, respectively. And the variance of them are 0.0003, 0.0012, and 0.0024, respectively.

Laser Scan Matching in Polar Coordinates Using Gaussian Process

113

Fig. 4 (a) Two unaligned scans in Scene 1. (b)–(d) The alignment result obtained by using our approach, PSM and ICP, respectively.

Fig. 5 (a) Two unaligned scans in Scene 2. (b)–(d) The alignment result obtained by using our approach, PSM and ICP, respectively.

Compared with PSM, the performance of ours is more stable, which can be observed from the variances of MSEs. This would make a great difference when it is being applicated in simultaneous localization and mapping (SLAM). Nowadays, SLAM becomes a more popular and notable issue of the robotics field [7]. The reason for the importance of stability is as follows: the pose estimation is a crucial step in the whole SLAM procedure. Once an incorrect pose estimation occurs in a single step, it may lead to the divergence of localization, often causing catastrophic failure of the SLAM algorithm. With similar accuracy, a pose estimation method with better stability is more desirable for SLAM method. Thus, our approach is more suitable for the state estimation in SLAM compared to the other two standard approaches.

114

Y. Wang et al.

Fig. 6 (a) Two unaligned scans in Scene 3. (b)–(d) The alignment result obtained by using our approach, PSM and ICP, respectively.

Fig. 7 (a) Map result obtained by using our approach, PSM and ICP, respectively.

Fig. 8. The MSE sequences of three methods for each scan matching step.

Laser Scan Matching in Polar Coordinates Using Gaussian Process

115

4 Conclusion In this paper, we proposed a novel laser scan matching approach based on a new type of map representation using GP regression. The lower-dimensional map representation can fully reveal the structural signature of the environment given by the raw laser scan. Based on this map representation, the point pair correspondence can be determined directly and the transformation can be estimated accurately. The experimental results demonstrate a better performance of our approach compared to the traditional ICP and PSM methods with regard to accuracy and efficiency for the dense-points-scan data set. Acknowledgements. This paper has been supported by the National Natural Science Foundation of China (Grant No. 61673341), the National Natural Science Foundation of China (Grant No. 61703366), the Fundamental Research Funds for the Central Universities (2016FZA4023, 2017QN81006), National Key R&D Program of China (2016YFD0200701–3), the Project of State Key Laboratory of Industrial Control Technology Zhejiang University (No. ICT1913) and the Open Research Project of the State Key Laboratory of Industrial Control Technology, Zhejiang University, China (No. ICT1900312).

References 1. Besl P, McKay ND (1992) A method for registration of 3-D shapes. IEEE Trans Pattern Anal Mach Intell 14(2):239–256 2. Diosi A, Kleeman L (2007) Fast laser scan matching using polar coordinates. Int J Robot Res 26(10):1125–1153 3. Li B, Wang Y, Zhang Y, Zhao W, Ruan J, Li P (2019) GP-SLAM: novel laser-based slam approach based on regionalized gaussian process map reconstruction (Manuscript submitted for Autonomous Robots on 14 Feb 2019, now under review) 4. Rasmussen CE, Williams CKI (2005) Gaussian processes for machine learning. The MIT Press, Cambridge 5. Kay SM (1993) Fundamentals of statistical signal processing: estimation theory. Prentice-Hall Inc., Upper Saddle River 6. Holý B (2016) Registration of lines in 2D lidar scans via functions of angles. IFACPapersOnLine 49(5):109–114 7. Cadena C, Carlone L, Carrillo H, Latif Y, Scaramuzza D, Neira J, Reid I, Leonard JJ (2016) Past, present, and future of simultaneous localization and mapping: toward the robustperception age. IEEE Trans Robot 32(6):1309–1332

An Evolutionary Membrane Algorithm Based on Competition Mechanism for Multi-objective Optimization Problems Zhiqiang Geng, Yunfei Cui, and Yongming Han(&) Beijing University of Chemical Technology, Beijing 100029, China [email protected]

Abstract. The increasing focuses on coordinated developments of society, economy and environment makes multi-objective optimization an important tool for solving real-world problems. Thus an evolutionary membrane algorithm based on competition mechanism (EMACM) is proposed in this paper, which incorporates advantages of the NSGA-II evolution and the distributed structure of the membrane computing. The communication process distinguished the membrane algorithm with other intelligent algorithms. To share information between evolved populations, best objects selected are communicated to the upper-layer membrane through the competition mechanism to eliminate dominated solutions. The skin membrane archives global best objects as elitists, and serves as guidance for inner evolution processes. Verified by test functions, the EMACM is able to find global solutions that are converged well, approximated closely to and covering as much as possible the real Pareto front, and distributed uniformly along the whole front. Compared with classical algorithms, the EMACM demonstrates better performances of convergence and diversity. Keywords: Multi-objective optimization  Membrane computing Communication rule  Competition mechanism  Elitist archive



1 Introduction The worldwide focus on sustainable development has brought more and more attention to production and living optimization for rational resources employment [1]. Efficient optimization helps to raise efficiency, escaping from unnecessary waste in social and economic developments and protecting the environment as well. Coordinated optimization of multiple objectives becomes more and more realistic. Multi-objective optimization problem (MOP) is a heated topic in scientific research and engineering practice. In the previous work [2], we made a review about intelligent algorithms for solving MOPs and compromising methods for dealing with multiple objectives. Intelligent algorithms are able to optimize objectives without coupling them, maintaining individual features of each single objective. Membrane computing [3] was initiated by Păun in 1998 and thus abbreviated as P system. It is originated from the structure and function of living cells, as well as

© Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 116–123, 2020. https://doi.org/10.1007/978-981-32-9050-1_13

An EMACM for MOPs

117

interaction between cells, tissues and even neurons. The P system is mainly consisted of the membrane structure with membranes, objects in the membranes, and evolution and communication rules acted on objects. There are usually elementary membranes, middle membranes involving elementary membranes, and a skin membrane, arranged in hierarchical structure. All evolution rules work in a maximally parallel manner. In 2004, Nishida [4] firstly proposed the notion of membrane computing optimization algorithm (abbreviated as membrane algorithm). In the structure of a membrane algorithm, there are some objects as candidate solutions and an optimization algorithm as the evolution rule in each region. Objects communicate between regions. It has been proved that membrane algorithms have high reliability, fast convergence speed and good solutions. As a relatively new and promising intelligent method, an evolutionary membrane algorithm is proposed based on competition mechanism (EMACM), to improve exploration and exploitation abilities for finding global optimization solutions. The intrinsically parallel and distributed computation feature of membrane computing manifests its advantages in producing uniformly distributed solutions. The communication process based on the competition mechanism helps the algorithm converged to the real Pareto front.

2 Evolutionary Membrane Algorithm Based on Competition Mechanism An EMACM is proposed in this paper, extending application of the membrane algorithm and enhancing exploration and exploitation abilities for solving MOPs. The membrane structure is designed as a three-layer hierarchical cell-like P system. According to theorems and corollaries by Păun [3], a P system with at most 6 membranes is able to realize universal computation. Thus, we use 6 membranes in the middle-layer, each with two elementary membranes. (1) Initial objects for optimization problems are produced randomly in given decision variable ranges. On the basis of NSGA-II [5], evolution rules are used to update objects in membranes except the skin membrane. (2) Communication distinguishes the membrane algorithm with other intelligent algorithms. Membranes communicate their best objects in each iteration step to the directly upper membranes till the skin membrane. Objects to be communicated are selected based on crowding distance sorting [5]. The larger the crowding distance value, the more potential to be selected. Making use of Pareto dominance, dominated solutions are eliminated during the competing communication, as shown in Table 1.

118

Z. Geng et al.

The skin membrane receives best objects communicated and acts as an archive storing global elitists. Meanwhile, the skin membrane also transmits global best objects back to inner membranes. The steps for implementing EMACM are summed up as the flowchart in Fig. 1.

Start

Setup: set up the membrane structure and algorithm parameters

Initialization: randomly produce initial objects in inner membranes

Is iteration time reached?

Selection

No

Crossover

Objects are evolved in each membrane

No

Mutation Are all objects evolved?

No

Yes

Crowding distance sorting

Communication

Competition

1.Objects are communicated to upper surrounding membranes 2.Skin membrane: elitists stored and objects are communicated back to inner membranes

Is iteration time reached?

Yes

Output elitist solutions in the skin membrane

End

Fig. 1. The flowchart of EMACM

Yes

An EMACM for MOPs

119

Table 1. The pseudo-code of communication based on competition mechanism

3 Test Experiments The EMACM is verified by the DTLZ test function set [6] with extendible decision variables and objectives (here we take three objectives). The algorithms’ performances of convergence, uniformity and distribution are demonstrated by evaluation indexes of the convergence metric IC [7], the spacing metric IS [7], and the generational distance IGD [7]. The verification experiments on the EMACM are carried out by computer with 2.40 GHz Intel Core 2, CPU E4600, 2.00G RAM, and WIN10 32 bit operating system. The algorithm parameters are set up as NE ¼ 12; NM ¼ 6, the number of SE ¼ 15, the number of SM ¼ 10; max iteration ¼ 20; generations ¼ 80, crossover rate ¼ 0:8; mutation rate ¼ 1=n, communication rate ¼ 30%. The worst time complexity of NSGA-II is equivalent to O(GmN2). In a parallel working mode, the worst time complexity of EMACM is O(GmNmax2) (Nmax denotes the maximal population size of membranes). For serial working mode, the complexity   is expressed as NE  O mS2E þ NM  O mS2M . As usual, there is ðNE  SE þ NM  SM Þ  N. Thus, the time complexity of EMACM in parallel mode is lower than that of NSGA-II while a little lower in serial mode. Numerical Simulation Results. The optimization performances of the EMACM are compared with results of some classical algorithms like the NSGA-II, the SPEA2 (strength Pareto evolutionary algorithm) the MOEA/D (multi-objective evolutionary algorithm based on decomposition), the SMG-MOMA (multi-objective membrane algorithm guided by the skin membrane) [8]. In general, it takes the average and standard deviation values of statistical results of evaluation indexes in 30 runs for performance

120

Z. Geng et al.

Table 2. Performance comparison between EMACM and other algorithms (statistical results of 30 runs, Ic , mean(std)) (*the bold denotes the best result) Problems NSGA-II SPEA2 DTLZ1 3.66E−2 7.03E−2 (1.20E−3) (2.97E−1) DTLZ2 5.37E−2 2.34E−2 (1.74E−3) (1.31E−3) DTLZ3 3.30E−1 6.33E−1 (7.54E−1) (9.98E−1) DTLZ4 5.36E−2 2.32E−2 (1.95E−3) (4.64E−3) DTLZ7 6.97E−2 3.02E−2 (3.12E−3) (1.43E−3)

MOEA/D 1.54E−2 (1.68E−3) 1.91E−2 (3.18E−4) 3.82E−2 (1.34E−2) 3.26E−2 (3.33E−2) 1.24E−1 (1.86E−1)

SMG-MOMA 1.42E−2 (6.30E−4) 2.26E−2 (9.78E−4) 1.22E−1 (2.49E−1) 2.38E−2 (1.41E−3) 2.94E−2 (2.94E−2)

EMACM 6.87E−3 (3.42E−3) 1.16E−2 (6.44E−3) 1.09E−2 (5.31E−3) 3.26E−2 (1.54E−3) 7.59E−3 (1.75E−3)

Table 3. Performance comparison between EMACM and other algorithms (statistical results of 30 runs, Is , mean(std)) (*the bold denotes the best result) Problems NSGA-II SPEA2 DTLZ1 2.14E−2 2.88E−1 (2.08E−3) (1.51E+0) DTLZ2 5.73E−2 2.40E−2 (4.75E−3) (2.40E−2) DTLZ3 2.75E+0 3.92E+0 (7.72E+0) (6.22E+0) DTLZ4 5.82E−2 2.08E−2 (5.29E−3) (8.22E−3) DTLZ7 6.82E−2 3.26E−2 (8.72E−3) (4.90E−3)

MOEA/D 7.15E−3 (1.24E−2) 5.53E−2 (2.57E−3) 5.29E−2 (3.48E−3) 1.24E−1 (9.52E−2) 8.85E−1 (1.46E−0)

SMG-MOMA 7.67E−3 (7.59E−4) 2.29E−2 (1.69E−3) 8.38E−1 (2.06E+0) 2.37E−2 (1.64E−3) 3.08E−2 (2.82E−3)

EMACM 5.20E−5 (5.83E−5) 1.86E−4 (1.50E−4) 1.30E−4 (1.68E−4) 2.34E−4 (1.73E−4) 9.95E−5 (5.70E−5)

Table 4. Performance comparison between EMACM and other algorithms (statistical results of 30 runs, IGd , mean(std)) (*the bold denotes the best result) Problems NSGA-II SPEA2 DTLZ1 2.68E−2 1.95E−2 (1.65E−3) (2.43E−4) DTLZ2 7.08E−2 5.30E−2 (2.89E−3) (7.26E−4) DTLZ3 7.42E−2 5.42E−2 (5.55E−3) (2.17E−3) DTLZ4 6.97E−2 1.34E−1 (2.85E−3) (1.83E−1) DTLZ7 9.03E−2 6.73E−3 (5.79E−2) (5.05E−2)

MOEA/D 2.68E−2 (4.01E−) 4.90E−2 (1.91E−4) 6.15E−2 (1.02E−2) 2.18E−1 (2.65E−1) 4.93E−1 (2.71E−1)

SMG-MOMA 1.94E−2 (1.19E−4) 5.25E−2 (4.49E−4) 6.16E−2 (4.00E−2) 5.30E−2 (8.17E−4) 5.67E−2 (2.06E−3)

EMACM 1.88E−4 (1.09E−4) 3.46E−4 (1.96E−4) 2.25E−4 (1.42E−4) 9.14E−4 (3.73E−4) 1.69E−4 (9.24E−6)

verification, as shown in Tables 2, 3 and 4 for different optimization algorithms. Moreover, due to limited paper length, the approximation trends of the EMACM to real Pareto fronts of test functions DTLZ1-3 are demonstrated in Figs. 2, 3 and 4.

An EMACM for MOPs DTLZ1

0.8

Real Pareto front Approximate Pareto front

Function 3

0.6 0.4 0.2 0 0 0.8

0.2 0.6

0.4 0.6 0.8

Function 1

0.4

0.2 0

Function 2

Fig. 2. Approximation of EMACM to the real front on DTLZ1

DTLZ2

Real Pareto front Approximate Pareto front

Function 3

1.5

1

0.5

0 0 1.5

0.5

1

1

0.5 1.5

Function 1

0

Function 2

Fig. 3. Approximation of EMACM to the real front on DTLZ2

DTLZ3

Real Pareto front Approximate Pareto front

Function 3

1.5

1

0.5

0 1.5 0

1

0.5

0.5 Function 1

1 0

1.5

Function 2

Fig. 4. Approximation of EMACM to the real front on DTLZ3

121

122

Z. Geng et al.

It can be seen from results that: (1) the statistical average and standard deviation values of IC of the EMACM are smaller than other algorithms for functions DTLZ1*4 and DTLZ7; (2) the values of IS of the EMACM are smaller than most algorithms; (3) it is almost the same for IGD as IS . As a whole, although the EMACM does not exceed other intelligent algorithms in all indexes, its resulting fronts are converged closely to the real Pareto fronts with uniform distribution, while covering the whole front, making it promising in solving MOPs.

4 Conclusion An EMACM is proposed in this paper for finding converged and well-distributed solutions that cover as many optima in the real Pareto front as possible of the MOP. Objects in each membrane are evolved independently without contradicting with other objects in other membranes. The selected best objects are communicated between upper and lower membranes to share information, based on the crowding distance sorting method. The communicated solutions are competed based on the Pareto dominance to sift out dominated solutions. Moreover, the skin membrane acts as an elitist archive for storing global best solutions and guidance for inner membranes evolution through communicating objects back. The proposed EMACM is tested in some famous test functions, and its performance indexes are compared with previous classical intelligent algorithms. The statistical results demonstrate good performances of convergence, uniformity and distribution of the EMACM in solving MOPs. The parallel computation and competing communication are able to produce considerable amount of solutions distributed evenly along the Pareto front as close as possible to the real front. If possible, as objects in each membrane of EMACM can be evolved independently, the computation efficiency of EMACM that is executed in parallel computing environment will be higher than that in serial mode. In the future, we will make further researches on real-world application and the many-objective optimization problem (MaOP) with more objectives. Acknowledgement. The work is partly funded by the National Key Research and Development Program of China (2017YFC1601800) and (XK1802-4).

References 1. The 2030 Agenda for Sustainable Development. United Nations, 25 September 2015 2. Cui Y, Geng Z, Zhu Q, Han Y (2017) Review: multi-objective optimization methods and application in energy saving. Energy 125:681–704 3. Păun G, Rozenberg G (2002) A guide to membrane computing. Theor Comput Sci 287:73– 100 4. Nishida TY (2006) Membrane algorithms. LNCS, vol 3850, pp 55–66 5. Deb K, Pratap A, Agarwal S, Meyarivan T (2002) A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans Evol Comput 6:182–197

An EMACM for MOPs

123

6. Deb K, Thiele L, Laumanns M, Zitzler E (2002) Scalable multi-objective optimization test problems. In: Proceedings of the IEEE Congress on Evolutionary Computation. IEEE Service Center, Piscataway, pp 825–830 7. Deb K, Jain S (2002) Running performance metrics for evolutionary multi-objective optimization. IEEE Trans Evol Comput 10:13–20 8. Li J (2016) Research on multi-objective optimization algorithm based on membrane computing models. University of Anhui, Hefei (in Chinese)

Design of Intelligent Measuring Device for On-line Machining Parts of Lathe Xiangyang Sun1,2(&), Binggao He1, Lijuan Shi1, Can Wang1, and Yuegang Fu2 1

2

Changchun University, Changchun 130022, China [email protected] Changchun University of Science and Technology, Changchun 130022, China

Abstract. To be higher the production efficiency of mechanical parts, after analyzing the shortcomings of conventional parts dimension measurement technology, a design scheme of automatic device which can realize on-line dimension measurement of parts by lathe is proposed. It integrates the work of lathe processing, dimension measurement and quality appraisal into one process innovatively. This scheme uses projection optical system to replace the traditional scanning scheme. The measuring device can not only complete the realtime and high-precision measurement of 15 parameters, but also ensure easy operation and maintenance. At the same time, the optical system design has a collimated beam expanding path, which makes the measuring device have a larger measurement range. Combining with the working environment of the measuring device, the design of the shock absorption mechanism is introduced in the structural design, so that the high stability of the measuring results can be maintained under the normal operation of the lathe. Finally, by extracting feature parameters and testing the matching interface, it is proved that the designed device fully meets the technical requirements proposed at the beginning of the study. Keywords: Part Measurement

 Optics  Image Processing

1 Introduction The measurement technology of mechanical parts size is one of the main factors that restrict the processing level of mechanical parts. With the rapid improvement of the mechanical processing level, new requirements are constantly put forward for the measurement technology of the size of mechanical parts. Firstly, the production must have complete electronic information of production and quality testing. Secondly, the measurement of parts must meet the requirements of high precision, real-time and multi-parameter. Thirdly, the measuring device should be easy to operate and maintain. In this paper, a new measurement scheme for lathe processing is proposed. At the same time, the optical system, image processing system and mechanical structure of the device are analyzed and designed in detail [1].

© Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 124–130, 2020. https://doi.org/10.1007/978-981-32-9050-1_14

Design of Intelligent Measuring Device for On-line Machining Parts of Lathe

125

2 Design Scheme and Performance Index of Measuring Device 2.1

Design Scheme of Measuring Device

Considering the field environment (dust-free, vibration-free, noise-free) of lathe processing and the real-time requirement of parts measurement, a laser scanning scheme is proposed, namely optical projection technology. Its basic principle is to combine optical, image processing and computer algorithm to measure the size of mechanical parts. Its detection principle is shown in Fig. 1. High-definition camera is used to photograph the shadows of the parts under test, and computer image analysis is used to get the mechanical dimensions of the parts being processed. At the same time, by matching the characteristics of the standard parts, the final judgement is whether the parts being processed are qualified. This design scheme not only ensures the accuracy of the measured parts measurement, but also realizes the synchronization of parts lathe processing and measurement, which greatly improves the efficiency of the production and detection of mechanical parts [2]. Telecentric optical system

Collimator lens

Reflector

Reflector

Camera lens CMOS

Diffusing lens LED

Fig. 1. Basic principle based on projection optical measurement

2.2

Performance Indicators of Measuring Devices

The measurement system using this technology can achieve the following major performances, as shown in Table 1. Table 1. Main technical parameters No. 1 2 3 4 5

Key performances Measuring length range Measuring diameter range Measurement accuracy Measurement time Number of measured parameters

Performance index No limit u1 mm–u65 mm  ±2 lm 2 s 15

126

X. Sun et al.

3 Key Technology of Measuring Device 3.1

Optical System Design of Measuring Device

The total optical path of the system can be divided into front and back parts. The front optical path first completes the irradiation of the measured parts with high collimation parallel light, while the other optical path completes the convergence of high position accuracy of the shadow image of the measured parts. 3.1.1 Design and Analysis of Optical System Analyzing the actual situation of the parts processed by lathe, it can be found that the size of the parts processed by lathe is different, and the dimensions of different mechanical characteristics are different. Therefore, the distance between objects in the optical system will change constantly. After the distance changes, the image height changes at the same time, then the acquisition size of the parts tested will change, that is, the measurement error occurs in the detection. Similarly, even when the objects are measured, the measurement error will occur. If the distance remains unchanged, the measurement error will also be caused by the difficulty of completely coinciding the COMS sensitive surface with the image plane [3]. Therefore, the optical system design focuses on how to reduce the measurement error caused by the change of object distance and the accuracy of imaging position. Figure 2(a) is the object telecentric optical path. If the change of the measured part size causes the change of object distance or the object surface offset due to external vibration, the image plane moves from AB to A1B2. According to conjugate relation, the image received by the fixed image acquisition plane will be a diffuse image, but because the main light is parallel to optical axis, the change from object distance will not be created from the object space. It can be inferred that when the aperture diaphragm is placed on the image square focal plane, the image distance will change, but the image height will not change, even if the object distance changes. Therefore, the size of the image received by the CMOS image plane will not change, that is, the measured object size will not change L′1 = L1, which ensures the distance between the lens and the target even if the thermal expansion causes the movement of the photosensitive element. The image size will not change if the object surface is changed or the object surface is offset by vibration, so the measurement error will not be caused. Figure 2(b) is a image telecentric optical path, the aperture diaphragm is placed on the focal plane of the object. After the object passes through the pupil at the focal point, it is imaged at infinity. If the measured object does not coincide with the actual imaging position due to external vibration or the imaging receiving surface (COMS image plane), the image received by the receiving surface (COMS image plane) will be a diffuse speckle, but the main light of the image side of the optical path will still pass through A′1, B′1 two spots, and the actual height L′1 is equal to the height A1B2, that is L1 = L′1. It can be seen that the position error of receiving surface (COMS image plane) can be eliminated by using the image telecentric optical path, which is the measurement error caused by the change of image distance [4, 5]. Therefore, the technical advantages of these two optical paths will be combined in measurement.

Design of Intelligent Measuring Device for On-line Machining Parts of Lathe A

Aperture stop Entrance pupil

A1'

M A1

L1'=L'

L

Scaleplate

Aperture stop

B1

B1'

L1

B

M

B1'

A

A1

B'

L1'=L1

A'

B1

127

A1'

B

(a) Object telecentric optical path

(b) Image telecentric optical path

Fig. 2. Measurement principle of telecentric optical path

3.1.2 Design Results of Optical System In view of the design requirements of the required optical path for the above parts inspection, an optical system is designed using design software ZEMAX. The Fig. 3(a) is a general-purpose part detection optical path. The emitted beam of the right light source passes through a group of collimating lenses on the right side, forming a parallel beam to illuminate the detected part. The shadow image formed by the detected part is gathered by another group of collimating lenses on the left side and received by the sensor on the left side. In order to facilitate the installation of the detection system on the lathe processing station, one reflector is designed on the left and right of the optical path to shorten the one-dimensional size of the entire optical system, and the mechanical structure of the whole detection system is greatly reduced. Considering the dimension detection of lathe parts with high aspect ratio, a large dimension detection optical path with collimation and beam expanding performance is optimized on the basis of general detection optical system, such as Fig. 3(b), one side of larger size can be rotated through lathe and adjusted to the illumination surface of light path in inspecting, so that the measurement of larger size surface of parts can be completed.

Measured parts

(a) Non-collimated beam expansion

Beam expanding lens

(b) Collimated beam expansion

Fig. 3. Optical path diagram of parts inspection

128

3.2

X. Sun et al.

Structural Design of Measuring Device

The measuring device is specially designed for the detection of lathe parts. Its working environment, including vibration, shock and temperature change, will affect the characteristics and stability of optical system, and will interfere with the final measurement accuracy.

CMOS Lens Seismic focusing mechanism

CMOS

Mirror shock absorber (tension wire)

Lens

Seismic focusing mechanism Light source Light source Mirror shock absorber (tension wire)

Fig. 4. Structure of measuring device

Vibration and impact is a kind of working condition that cannot be completely eliminated. Vibration comes from the driving mechanism such as the motor inside the lathe, and also from the external vibration caused by the change of cutting force or other external force impact when processing parts. Because the external vibration can often be rapidly attenuated, it can be neglected. Therefore, in the design of the opticalmechanical structure of the measuring system, only the influence of the fixed vibration frequency is considered. Three design methods are used to weaken the impact or vibration of the working environment on the final accuracy when the lathe parts are measured, structure of measuring device is shown in Fig. 4. Firstly, the anti-vibration design of the mirror mechanism in the optical path is carried out, that is, the mirror base of the mirror adopts the tensioned wire structure, which can weaken the projection jitter of the measured part caused by the vibration in the process of vibration. Secondly, adjustable design of the lens base of the convergent lens in the optical system is carried out, which ensures that the shadow of the measured part can be accurately projected to the focal plane of CMOS camera during the vibration process of the measuring device by setting a driving motor mechanism. Finally, the PTFE shim is assembled on the connecting base of the measuring device and the lathe, which can not only ensure the stiffness of the base, but also play the role of vibration buffer.

Design of Intelligent Measuring Device for On-line Machining Parts of Lathe

3.3

129

Image Acquisition and Processing of Measuring Device

The image acquisition and processing system of the measurement system is one of the key systems of the developed detector. It is mainly used to extract the image of parts and match the standard image. Shadow image acquisition Standard Parts Image

Successful initial matching?

Central Point Location of Characteristic Parameters

Classification K of characteristic parameters Region Extraction Algorithms Feature extraction algorithm

Feature pattern preprocessing

N

Y Feature pattern feature extraction Score Weight of Initial Matching and Schema Features in Class K Feature Database of Feature Images Successful initial matching

Feature matching algorithm Initial Matching Failure

Pattern feature matching of feature parameters

Class K feature database of feature image Matching failure

Second Successful Matching quadratic Failure matching

Matching success

Fig. 5. Extraction and matching process of image features

Considering the characteristics of shadow image feature extraction and matching, the image acquisition and processing system of this detector adopts three different image region extraction algorithms, feature extraction algorithms and feature matching algorithms to match different feature standard images. The process of collecting and processing part shadow image is shown in Fig. 5 [6, 7].

4 Testing of Measuring Device The designed measuring device is tested, and its display interface is shown in Fig. 6. Figure 6(a) is a parameter extraction interface for measuring parts, i.e. features of 15 parts. Figure 6(b) is a parameter matching interface for testing parts. If the measured parameters are within the accuracy range of standard parts, the parts tested are qualified.

(a) Non-collimated beam expansion

(b) Collimated beam expansion

Fig. 6. Optical path diagram of parts inspection

130

X. Sun et al.

As can be seen from the Fig. 6(a), the serial parameters can be chosen before the measurement of parts. Figure 6(b) shows that the measurement results of 15 parameters fully meet the requirements of standard parts.

5 Conclusion After analyzing the principle of the on-line inspection technology for lathe parts proposed in this paper, an optical system with collimation and beam expanding characteristics is designed according to the requirement of feature parameter image extraction and the characteristics of projection optical system design. Based on the design results of optical fiber system, the measuring conditions of lathe parts are analyzed, and the structural design with shock absorption characteristics is carried out. Finally, the detailed flow of part shadow image acquisition and processing is designed. Through the actual test, it is verified that the designed measuring device can fully meet the performance indicators set in this study. Acknowledgment. This research was supported by the Ministry of Education “Chunhui Project” (Grant No. Z2017031) and Science and Technology Project of Jilin Provincial Department of Education 2016 (Grant No. JJKH20180938KJ), all support is gratefully acknowledged.

References 1. Glauco VP (2013) Image feature descriptor based on shape salience points. Neurocomputing 120(23):156–163 (in Chinese) 2. Awrangjeb M, Lu GJ, Fraser CS (2012) Performance comparisons of contour-based corner detectors. IEEE Trans Image Process 21(9):4167–4180 (in Chinese) 3. Mao S, Zhao J (2019) Optimal design for multi-layer diffractive optical elements with antireflection films. Acta Opt Sinica 39(3):0305001-1–0305001-8 (in Chinese) 4. Guo J, Wang Z, Lu M (2019) Off-axis three-mirror anastigmatic system alignment and application based on principal component analysis. Acta Opt Sinica 39(3):0322002-1– 0322002-7 (in Chinese) 5. Xing Y (2019) Optimization design and test of the main structure of a mini-optical device in space. Infrared Laser Eng 47(11):1113002-1–1113002-7 (in Chinese) 6. Waghule DR, Ochawar RS (2014) Overview on edge detection methods. In: 2014 International conference on electronic systems, signal processing and computing technologies, pp 151–156 7. Zeng XZ, Lu DH (2008) A new method of camera calibration based on opencv and tsai. Mech Electr Eng Mag 25(12):49–52

Algorithm Research on Optimizing Ordering and Pricing Policy for Perishable Items Xin Yang1,2,3(&), Yuan Zhao1, Jin-yu Wei4, and Yang Yu4 1

2

Zhonghuan Information College Tianjin University of Technology, Tianjin 300380, China [email protected] School of Economics and Management, Hebei University of Technology, Tianjin 300401, China 3 Tianjin Hantuo Computer Technology Research Institute, Tianjin 300462, China 4 School of Management, Tianjin University of Technology, Tianjin 300384, China

Abstract. In reality, perishable products also contain defective ones before storage due to uncertainties during production process. In order to reduce the loss caused by the defective products, an inspection process is implemented by retailers. In view of the above, a retailer’s deteriorating inventory model with defective items is established in this article. Then GA and PSO are used to figure out the model respectively and the usefulness of the intelligent algorithm is confirmed by comparing the outcomes of the two algorithms. Keywords: Inventory strategy Intelligent algorithm

 Perishable items  Defective products 

1 Introduction As to decrease the risk of cargo damage and maintain the cost advantage of the supply chain, inventory models considering the deteriorating items have been increasingly concerned by many scholars in these years [1–7]. However, some assumptions of these deteriorating inventory models are idealistic and unrealistic in nature. With the realistic consideration in mind, several scholars studied the deteriorating production/inventory systems with imperfect items over the past decade [8–10]. In view of the above, a retailer’s deteriorating inventory model with defective items is established in this article. Then GA and PSO are used to figure out the model respectively and the usefulness of the intelligent algorithm is confirmed by comparing the outcomes of the two algorithms.

2 Formulation of the Inventory Model 2.1

Environment Setting and Notations

The notations used in the proposed model are as follows: Q: the replenishment quantity per order; x: the screening rate; hðtÞ: the deteriorating rate, hðtÞ ¼ abtb1 , where a is the scale parameter and b is the shape parameter, © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 131–137, 2020. https://doi.org/10.1007/978-981-32-9050-1_15

132

X. Yang et al.

a [ 0; b [ 1; D: the demand rate; Y: the defect rate that subjects to a probability distribution with the desired value E ðY Þ ¼ y; M1 : the possibility of Type I flaw (classifying an fine product as imperfect), the desired value is E ðM1 Þ ¼ m1 ; M2 : the possibility of Type II flaw (classifying a imperfect product as good), the desired value is E ðM2 Þ ¼ m2 ; c: the purchasing cost in each unit; O: the ordering cost in each order; h: the holding cost in each unit per unit time for good products (Unscreened products are regarded as good products.); hs : the holding cost in each unit per unit time for imperfect products; c1 : the cost of rejecting an perfect product; c2 : the cost of accepting a imperfect product; q: the screening cost coefficient; Decision variables: T: the replenishment cycle time; ts : the screening period; 2.2

The Mathematical Model

Once the products arrive at the warehouse, the retailer begins to screen all the nondeteriorated products until t ¼ ts . The inventory curve of good products is shown by the full line I ðtÞ in Fig. 1, and the inventory curve of defective products is shown in Fig. 2. By definition, although the actual defect rate of products is y, the defect rate detected by the retailer is yr ¼ ð1  yÞ  m1 þ y  ð1  m2 Þ due to the existence of two types of screening errors.

Fig. 1. The inventory curves of the good products and the returned products

Fig. 2. The inventory curve of the defective products

The Inventory of the Good Products The consumption and the screening process can be described as: dI ðtÞ ¼ hðtÞI ðtÞ  D  x  yr ; 0  t  ts dt

ð1Þ b

at The stocking level of the retailer could be expressed as:  I ðtÞ ¼ e ½Q þ ðD þ b 2 R 0 aub R0 ðau Þ x  yr Þ  t e du; 0  t  ts . Let AðtÞ ¼ t 1 þ aub þ 2! du ¼ t  b þa 1  tb þ 1  a2 2ð2b þ 1Þ

b

 t2b þ 1 , then we get: I ðtÞ ¼ eat ½Q þ ðD þ x  yr Þ  AðtÞ; 0  t  ts . The variation of inventory is formulated as:

Algorithm Research on Optimizing Ordering and Pricing Policy

133

dI ðtÞ ¼ hðtÞI ðtÞ  D dt

ð2Þ

b

Then we get the inventory level: I ðtÞ ¼ eat  D  ½AðtÞ  AðT Þ; ts  t  T. In summary, the stocking level of fine goods at time t is:  I ðt Þ ¼

b

eat ½Q þ ðD þ x  yr Þ  AðtÞ; b eat  D  ½AðtÞ  AðT Þ;

0  t  ts ts  t  T

ð3Þ

Then, the total inventory of good products during the time ½0; T  is: Z

ts

I¼ 0

Z I ðtÞdt þ Z

ts

¼Q Z

ts

T

I ðtÞdt

b

eat dt þ ðD þ x  yr Þ 

0 T

¼D 0

b

eat  AðtÞdt þ x  yr 

Z

ts

0 Z ts

b

eat  AðtÞdt þ D 

Z

T ts

b

eat  ½AðtÞ  AðT Þdt

b

eat  AðtÞdt  D  AðT Þ 

0

Z

T

b

eat dt  x  yr  Aðts Þ 

0

Z

ts

b

eat dt

0

The Inventory of the Defective Products Screened It is easy to get: Is ðtÞ ¼ x  yr  t; ð0  t  ts Þ

ð4Þ

Then through the equation substitution, the optimal screening rate of the retailer is b Rt b T Þeats abBðts ÞD obtained: x ¼ DAðat , where Bðts Þ ¼ 0s tb1  eat  AðtÞdt. The total b ts þ yr e s Aðts Þ þ abyr Bðts Þ Rt inventory of the defective products in ½0; T  is: Is ¼ 0s Is ðtÞdt ¼ 12 x  yr  ts2 . The Inventory of the Defective Products Returned The inventory of the returned products Ir ðtÞ is driven by both the deteriorating rate and the return rate, so: dIr ðtÞ ¼ m2  y  D  hðtÞIr ðtÞ dt

ð5Þ

Then the inventory of the returned products at time t is solved as: b

Ir ðtÞ ¼ m2  y  D  eat  AðtÞ; 0  t  T

ð6Þ

RT The total inventory of the returned products is Ir ¼ 0 Ir ðtÞdt ¼ m2  y  D R T atb  AðtÞdt. Finally, the holding cost is HC ¼ h  I þ hs  ðIr þ Is Þ; The purchasing 0 e cost is CC ¼ Q  c; The deterioration cost is PC ¼ cðQ  D  T  x  yr  ts Þ þ c½m2  y  D  T  Ir ðT Þ. The Type I cost is MC1 ¼ c1  x  ð1  yÞ  ts  m1 ; The Type II cost is  2 MC2 ¼ c2  x  y  ts  m2 ; The screening cost is IC ¼ 12 q  Tts ; The expected cost per unit time is E ðpÞ ¼ T1 ½O þ EðHC Þ þ EðCC Þ þ E ðPC Þ þ EðMC1 Þ þ E ðMC2 Þ þ E ðIC Þ.

134

X. Yang et al.

Then the optimal decision variables of the proposed model can be obtained by the following objective function and the constraint conditions. min E ðpðT; ts ÞÞ 8 IðtÞ  0 > > > < xð 1  y Þ  D r s:t: > > > ts  Q=x : 0  ts =T  1

3 Optimization Method and Optimization Result This paper set the model parameters based on the relevant data of Hsu and Hsu [11]. The parameter values are shown in Table 1. 3.1

Genetic Algorithm (GA) and Its Optimal Results

After setting the algorithm parameters and the model parameters, the GA can be used to solve the model. From Table 2, after about 30 generations of optimization iterations, the GA has been stabilized. After the optimization reaches 300 generations, the GA has been converged. Then, the cost of each part of the unit time is plotted. For the effect of picture display, the purchase cost in per unit time is reduced by ten times, which does not affect the general trend of cost. The ultimate cost of each part in unit time is shown as in Fig. 4. In the process of GA optimization, except for the screening cost, the average cost in each part of the cost in each unit time illustrates a downward trend. The screening cost in per unit time demonstrates a trend of decreasing at first and then increasing during the optimization process, and it tends to be stable after 50 generations of the optimization algorithm. Finally, the optimal solution of the model obtained by GA is: T  ¼ 4, Q ¼ 605, ts ¼ 3, x ¼ 198:14. And the corresponding optimal cost is 4312.42 RMB. The above is the process of GA optimization for the proposed inventory model. Figure 3 shows the overall optimization trend of the objective function. The trend was found that after optimization iteration to 30 generations, the algorithm basically converged. However, Fig. 4 shows the trend of the cost of each part. It was found that the cost of each part showed a downward trend as a whole, and some showed an upward trend. 3.2

Particle Swarm Optimization (PSO) Algorithm and Its Optimization Results

In PSO, the parameters are set in Table 3 and then are solved iteratively. The optimization solution process is shown in Fig. 5. From Fig. 5, when iterating to the 10th generation, the algorithm has tended to converge, and it has completely converged when iterating to 300 generations. From this point, the PSO converges faster than the GA. And its optimization effect is basically similar to GA.

Algorithm Research on Optimizing Ordering and Pricing Policy Table 1. Model parameter value Notation D O h hs c c1 c2 q a b m1 m2 y

Value 137 units/day $50/order $0.012/unit/day $0.006/unit/day $25/order $50/unit $200/unit 500 0.01 1.05 0.04 0.04 0.04

Fig. 3. GA objective function trend graph

135

Table 2. GA algorithm parameter value Parameter Population size Decision variable coding length Crossover probability Mutation probability The maximum number of iterations

Value 80 7 0.75 0.03 300

Fig. 4. Cost trend graph of various parts of GA

Next, the cost trend of each part in the PSO algorithm is displayed in Fig. 6. Same as the GA, since the purchase cost CC is much larger than the cost of other parts, here for the effect of the picture display, it is reduced by 10 times for display. Table 3. PSO algorithm parameter value Parameter Number of particles Acceleration constant c1 Acceleration constant c2 Inertia factor w Maximum number of iterations

Value 50 1.7 1.7 0.6 300

136

X. Yang et al.

Fig. 5. Total cost trend graph of PSO

Fig. 6. Cost trend graph of each part of PSO

Finally, the optimal replenishment cycle is T  ¼ 4; and optimal order quantity is Q ¼ 605. Optimal screening time is ts ¼ 3 and screening rate is x ¼ 197:28. Finally, the corresponding optimal cost is 4130.29 RMB. Because the computer itself has calculation inaccuracy of floating point number, the iterative error accumulation in the calculation process leads to a slight difference from the GA result, but it can be seen that the result is basically the same as GA. It can be seen from Fig. 6 that the trend of the cost of each part shows a downward trend as a whole, and some areas fluctuate up and down and eventually stabilize. Compared cost trends of various parts in the optimization process of GA, eventually we can find that, in the process of PSO and GA optimization, the highest of all costs is the first category of error cost except for purchase cost. The second highest is screening cost, followed by metamorphic cost, second category of error cost and storage cost. Therefore, retailers should focus on the occurrence of first category of error and avoid excessive cost increases. Also, on this basis, the screening cost and the cost of deterioration should be appropriately controlled. The above is the process of PSO for optimizing the proposed inventory model. Figure 5 shows the overall optimization trend of the objective function. From Fig. 5, it is clearly that the optimization iteration is about 10 generations, and the algorithm basically converges. However Fig. 6 shows the trend graph of the cost of each part, in which the cost of each part is generally declining, and some of them show upward and downward fluctuations. A comprehensive comparison between PSO and GA can be found that the results are basically the same. But PSO has a better convergence speed. 

4 Conclusion The characteristics of deterioration and imperfect quality for a single product are taken into account in the inventory system of a retailer. The deteriorating ratio of the goods is supposed to be a two-parameter Weibull function that is superior to the hypotheses of constant or linear function in previous researches. Meanwhile, considering the fact that product was deteriorating all the time, non-100% inspection is conducted by the retailer. This differentiates our research from others. In the inspection process, two types of screening flaws (Type I and Type II) are also considered in the inventory

Algorithm Research on Optimizing Ordering and Pricing Policy

137

system, whose probabilities are random variables with known probability distribution. Then a mathematical model of joint replenishment, pricing and screening policy is established based on the above preconditions. The optimal solutions are obtained by GA and PSO with the objective of maximizing the expected profit per unit time. A comprehensive comparison between PSO and GA can be found that the results are basically the same. But PSO has a better convergence speed. Acknowledgments. The authors get support from the Tianjin Philosophy and Social Science Project (Grant Nos. TJGL18-042).

References 1. Chaudhary RR, Sharma V (2015) A model for Weibull deteriorate items with price dependent demand rate and inflation. Indian J Sci Technol 8(10):975–981 2. Mishra U (2016) An EOQ model with time dependent Weibull deterioration, quadratic demand and partial backlogging. Int J Appl Comput Math 2(4):545–563 3. Janssen L, Claus T, Sauer J (2016) Literature review of deteriorating inventory models by key topics from 2012 to 2015. Int J Prod Econ 182:86–112 4. Tat R, Taleizadeh AA, Esmaeili M (2015) Developing economic order quantity model for non-instantaneous deteriorating items in vendor-managed inventory (VMI) system. Int J Syst Sci 46(7):1257–1268 5. Dash BP, Singh T, Pattnayak H (2014) An inventory model for deteriorating items with exponential declining demand and time-varying holding cost. Am J Oper Res 4(01):1–10 6. Kumar S, Singh AK (2016) Optimal time policy for deteriorating items of two-warehouse inventory system with time and stock dependent demand and partial backlogging. Sādhanā 41(5):541–548 7. Pandey R, Singh S, Vaish B et al (2017) An EOQ model with quantity incentive strategy for deteriorating items and partial backlogging. Uncertain Supply Chain Manag 5(2):135–142 8. Alamri AA, Harris I, Syntetos AA (2016) Efficient inventory control for imperfect quality items. Eur J Oper Res 254(1):92–104 9. Pickard AS, Lin HW, Leon MD et al (2005) Impact of inspection errors on the performance measures of a general repeat inspection plan. Int J Prod Res 43(23):4945–4967 10. Chen TH (2017) Optimizing pricing, replenishment and rework decision for imperfect and deteriorating items in a manufacturer-retailer channel. Int J Prod Econ 183:539–550 11. Hsu JT, Hsu LF (2013) An EOQ model with imperfect quality items, inspection errors, shortage backordering, and sales returns. Int J Prod Econ 143(1):162–170

Facial Expression Recognition System Based on Deep Residual Fusion Neural Network Haonan Wang, Junhang Ding(&), Fan Wang, and Zhe Ma Qingdao University, Qingdao 266071, China [email protected]

Abstract. Rich and varied facial expressions are the intuitive carriers for transmitting emotional information to each other. Due to the variety of facial expressions, the extraction of features is quite difficult. The traditional manual extraction method can neither achieve better recognition accuracy nor guarantee the recognition efficiency. This paper uses 18-layer residual neural network, and realizes permanent mapping by means of the short-circuit connection of residual modules to ensure the network capability of deep structures. At the same time, the CLBP texture features are extracted, and the two are innovatively combined to form a more representative description feature. The experimental results show that compared with the DCNN, DBN and other networks, the convergence time is shorter and the average recognition rate is 93.24%, which is nearly 5% higher. Keywords: Deep residual Fusion neural network

 Facial expression recognition 

1 Introduction In addition to the language expression and physical movement, facial expression changes are also important emotional output media for information communication between people. Although the related algorithms of machine learning improve the quality of recognition, the generalization ability of the network is expected to be very limited [1]. The deep neural network has the self-learning property of fitting biological neurons, it extracts the abstract description features of the samples, and significantly improves the generalization ability of the network [2]. On this basis, the residual neural network [3] uses the residual module of the shortcut connection, which avoids the adverse interference on the test recognition rate along with the increase of the network structure depth.

2 Deep Residual Neural Network 2.1

Residual Network Advantage

In the research of deep convolutional neural networks, the ideal state is that the deeper of network structure, the more features can be learned, but it is often counterproductive

© Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 138–144, 2020. https://doi.org/10.1007/978-981-32-9050-1_16

Facial Expression Recognition System

139

in the actual training test [4]. Imagine a large or small number that become very large or very small after repeated multiplying and exponential stacking. The extreme cases such as the gradient disappearance and the gradient explosion [5] are more pronounced along with the network deepens. The convolutional layer and the pooling layer in the ordinary flat neural network all have the effect of downsampling. Although it can avoid excessive fitting, it will inevitably lead to a large loss of information with potential to contribute. The residual neural network exhibits better performance in solving these problems. It designs a “short circuit” module [6], which connects the original input to the output after the first two layers, and simply superimposes the output after the convolution of the two layers. In this way, the computation of network parameters is not significantly increased, and the gradient problem caused by the information loss can be effectively avoided [7]. In addition, the network capacity is improved while the network depth is increased. 2.2

Residual Module Implementation

There is no simple linear relationship between the network depth and recognition accuracy. The accuracy will reach a maximum at a certain network depth, and then will decrease with the increase of depth [8]. If the recognition accuracy of the shallow flat network reaches a peak and the subsequent layer introduces a congruent map, the recognition accuracy will not be adversely affected by the deepening of the network layer. The residual module maps the original input of the first few layers of the network to the output layer through a shortcut connection. If the original input is x and the ideal output is H(x), the target output after the introduction of the residual module is converted to F(x) = H(x) − x [9]. In other words, the goal of network learning is transformed from the original complete H(x) to a relatively simple residual H(x) − x between output and input. The Fig. 1 below shows the special structure of the residual module.

Fig. 1. Residual module structure.

140

H. Wang et al.

3 CLBP Feature 3.1

CLBP Feature Analysis

Complete Local Binary Pattern (CLBP), which is a typically extended feature obtained by deformation on the basis of the Local Binary Patte r(LBP) feature [10]. The original LBP operator takes the central gray value in the window image as a threshold, and other pixels are binary-coded by comparison, thereby converting a decimal number to be the LBP value of all points. CLBP contains CLBP-C, CLBP-M, and CLBP-S, these three description operators improved the quality of feature extraction on this basis [11]. The histograms of the three operators are combined to more effectively extract the local texture features of all original images. 3.2

CLBP Feature Extraction

For the initially collected RGB original image, the weighted average method is first adopted to perform grayscale processing. Then divide the image into 18 * 18 cells, calculate three description operators for each cell, and normalize the histogram distribution. Finally, connect the histograms of each cell. The specific operation is divided into the following two steps [12]: (1) Grayscale: Rn = Gn = Bn = 0.3Ro + 0.59Go + 0.11Bo. (2) Description operator: CLBP-M represents magnitude of the difference between all pixels and the center pixel in the window image. And CLBP-S represents the sign positive and negative.

Fig. 2. Calculation diagram of pixel difference.

First, we use all pixels except the central point in the window image subtract the central value. We gain the result on the right side of Fig. 2. Then we extract the magnitude of positive and negative symbols and absolute values respectively as two eigenvalue operators in Fig. 3.

Facial Expression Recognition System

141

Fig. 3. CLBP-S and CLBP-M.

We make these following provisions: dp ¼ sp  mp  sp ¼ signðdp Þ ¼

1 1

ð1Þ dp  0 dp \0

  mp ¼ dp 

ð2Þ ð3Þ

In order to unify the coding of the three descriptors [14], we convert the decimal real number of CLBP-M according to the following formula: CLBP MP;R ¼

P1 X

tðmp ; cÞ2p

ð4Þ

P¼0

 tðk; cÞ ¼

1 kc 0 k\c

CLBP CP;R ¼ tðgc ; ci Þ

ð5Þ ð6Þ

In the formula, c is the adaptive threshold which can take the average value of the image, and gc represents the gray value of central pixel point in a window. And ci represents the grayscale average level of all pixels in a window picture.

4 Building a RESNET+CLBP Fusion Network We are using the JAFFE+Cohn-Kanade expression library. First, the image set is normalized by size, and the unified input pixel is 112 * 112. The first layer uses 64 convolution kernels of size 7 * 7, and the pooling layer adopts 3 * 3 max pooling, both of which make a stride of 2. Followed by eight residual modules. Finally, the feature map obtained by the convolution network is further fused with the extracted CLBP texture feature, and then gets into the fully connected layer. After the Softmax function completes the seven classifications, the specific network structure diagram is as follows (Fig. 4):

142

H. Wang et al.

Fig. 4. Fusion network structure

5 Experimental Results We conducted the training and test on the computer of the laboratory workstation. The experimental platform was the Jupyter notebook without GPU acceleration. The computer is 8G memory, Intel i5 processor, and the average training time is 10 h. We take the network depth and the network type as variables respectively and make a statistical comparison of the experimental results. (1) The comparison results under different network depths are shown in Table 1. Table 1. Identification rate of different network depths. Number of residual modules Average recognition rate Average training time 4 0.8542 6h 6 0.8956 9h 8 0.9323 12 h 10 0.9723 15 h

By observing the comparison results of the table, we can find that for our network structure and the expression database data, the blind increase of the residual module does not continuously improve the average recognition rate. In the case of 8 residual modules, the average training time is within the acceptable range, and the recognition accuracy is also the highest.

Facial Expression Recognition System

143

(2) The comparison results under different network types are performed in Table 2. Table 2. Identification rate of different network types. Network Type CL+RES CL+DCNN CL+DBN CL+SVM

Happiness 95.34 92.15 89.75 87.98

Sadness 93.45 90.56 87.98 89.47

Surprise 96.73 94.32 93.45 90.43

Fear 94.25 92.38 90.56 83.85

Anger 89.75 82.79 83.56 79.24

Disgust 91.56 86.47 85.38 84.72

Neutrality 90.32 84.16 82.17 73.58

Total 93.06 88.98 87.55 84.18

Varied types of network structures have a great impact on the average recognition rate of expressions. It can be seen from the tabular data that the classification accuracy of the support vector machine with simple principle is low, and the performance of the ordinary flat convolution network makes the classification effect greatly jump, however the advantage of the residual network is more significant. For the same network, the sensitivity of different types of expression classification is also uneven. In general, expressions with relatively obvious facial features such as happiness, surprise, and sadness are easier to recognize than micro-amplitude expressions such as neutrality and disgust.

6 Conclusion In view of the difficulty in extracting facial expression features and weak feature description, we choose deep convolutional neural network to obtain image abstract features through network self-learning on the basis of certain generalization ability of the network for expression recognition and classification. The innovations of this paper are mainly reflected in two aspects: one is the selection of the residual neural network, and the shortcut connection module is used to effectively avoid the unfavorable interference from the network depth to the recognition accuracy. Second, feature fusion method is adopted to integrate the extracted local texture features of the sample CLBP with the abstract features output by the convolutional full connection layer, And the fusion features are passed into the classification layer to complete expression recognition. The whole network structure not only reduces the training convergence time, but also improves the average recognition accuracy of facial expressions. Acknowledgment. This work was supported in part by Qingdao Postdoctoral Research Project under Grant 2016021.

References 1. Bashbaghi S, Wei Y, San Z (2018) Gabor feature selection method for expression recognition. Journal 20(1):61–81 2. Hua X, Jun D, Xiu R (2018) Design of driver’s violation call detection system based on CLM. J Qingdao Univ (Eng Technol Edit) 128(02):33, 41–45

144

H. Wang et al.

3. Yu X, Gui L, Ye G (2017) Research progress of facial expression in human-computer interaction. In: Conference 2017. IEEE Computer Society 4. Xiao W, Chen X, Min H (2018) expression recognition of video sequences fused with spatio-temporal features. Journal 40(3):626–632 5. Jin S, Ming Y, Jun D (2018) Application of CLNF in face recognition. J Qingdao Univ (Eng Technol Edit) 128(02):33, 51–56 (in Chinese) 6. Pantic M (2016) Facial expression recognition. Journal 2(5):443–447 7. Jin D, Xin W (2018) Adaptive recognition algorithm based on binocular computer vision and its monitoring application. Journal 11(11):1708–1711 8. Meng L, Zheng W, Jiu S (2018) Image classification and recognition based on sparse depth confidence network. Journal 35(09):65–69 9. En L, Xue W, Yu C (2018) Deep deconvolution neural network learning based on deconvolution feature extraction. Journal 33(3):447–454 10. Yan J, Zheng W, Cui Z (2018) Expression recognition based on asymmetric local gradient encoding. Journal 101(4):1217–1220 11. Yuan Y (2018) Facial expression recognition based on depth belief network and multi-layer perceptron. Journal 406(12):155–159 12. Chitta K, Sajjan NN (2017) A reduced region of interest based on approach for facial expression recognition from static images. In: Conference 2017. IEEE

Research and Application on Ensemble Learning Methods Yuzhong Wang(&) Zhonghuan Information College Tianjin University of Technology, Tianjin, China [email protected]

Abstract. As shown in previous data, diabetes has led to the increasing mortality and considerable financial expenditure in the US. It is necessary to find out how to making correct diagnosis and prescription of diabetes plays an important role in helping patients. That is why we choose the dataset of diabetic inpatients having diagnosis at hospitals in the US, and predict how different treatments and medications influence patient outcomes. We use the class attribute of readmission number to obtain the results. Because of the large and biased dataset, we firstly remove attributes with high missing value rate, and reduce the imbalance classes of instances by oversampling and under-sampling, then followed by the attribute selection through various methods, such as the Correlation-based feature selection, the ChiSquared Attribute Evaluator, the Information Gain Attribute Evaluator, etc. Three classification methods C4.5, RIPPER, and Random Forests are used to predict the classification in Weka. In addition, we also use the ensemble learning methods including bagging and boosting to improve the stability and accuracy. From the analysing results, we can see that C4.5 and Ripper perform better, and both bagging and boosting increase the accuracy rate to differing degrees because both algorithms are somewhat unstable. There is no doubt that Random Forests is the best performer among all classification methods we use, and after using boosting, we see big increases in the values of the evaluation metrics we use. The final outcome is much better than random guess. Keywords: Dataset  Data Preprocessing  Ensemble learning  Data mining  Classification Models

1 Introduction Medicine and healthcare are among the main areas of research in data mining, while diabetes is one of the leading causes of death in the US, affecting approximately 9.3% of the US population. The total costs of diabetes in the US were estimated at an astounding $245 billion in 2012, up from $174 billion in 2007 [1]. The dataset that we have chosen to work with is based on the treatment of 101,252 inpatients at hospitals across the US who have been diagnosed of diabetes. The data was collected over a period of 10 years (1999–2008). There have previously been very few national assessments of diabetes care during hospitalization in the US and it is believed that a change in care could positively impact patient outcome. © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 145–155, 2020. https://doi.org/10.1007/978-981-32-9050-1_17

146

Y. Wang

The significance of this issue, and the positive impact that an improvement in the US diabetes crisis would have are our main reasons for choosing the dataset analysed in this report. 1.1

About the Dataset

The data were submitted to the UCL machine learning repository on behalf of the Center for Clinical and Translational Research, Virginia Commonwealth University in 2014. The instances in this dataset were initially taken from a much larger original dataset with 74,036,643 instances and 55 attributes according to five criteria (1. The patient was admitted to hospital; 2. The diagnosis of the patient was of diabetes; 3. The length of stay was at least 1 day and at most 14 days; 4. Laboratory tests were performed during the admission; 5. Medications were administered during the admission). There are also very few missing values relative to the size of the dataset. This and the size of both the dataset and its attributes were important considerations in our choice of dataset. The attribute of interest (the class) in our dataset is the readmission rate, including three categories (1. Readmission in under 30 days from initial discharge; 2. Readmission in over 30 days; 3. No readmission). Among the 101,252 individuals included, 11,357 were readmitted in under 30 days, 35,545 were readmitted in over 30 days and the remaining 54,867 were not readmitted. The other 49 attributes cover patient demographics, details of the treatment during admission and also that of any treatment in the year prior to admission. Below is a list of the attributes included in the resulting dataset (Table 1): Table 1. Attributes Attribute Encounter ID Patient number Race Gender Age Weight Admission type

Attribute type Numeric Numeric Nominal Nominal Nominal Numeric Nominal

Discharge Nominal disposition Admission source Nominal

Time in hospital

Numeric

Description Unique identifier of an encounter Unique identifier of a patient Caucasian, Asian, African, American, Hispanic, other Values among: male, female, and unknown/invalid Grouped in 10-year intervals: [0, 10), [10, 20),…, [90,100) Weight in pounds Integer identifier corresponding to 9 distinct values, for example, emergency, urgent, elective, newborn, and not available Integer identifier corresponding to 29 distinct values, for example, discharged to home, expired, and not available Integer identifier corresponding to 21 distinct values, for example, physician referral, emergency room, and transfer from a hospital Integer number of days between admission and discharge (continued)

Research and Application on Ensemble Learning Methods

147

Table 1. (continued) Attribute Number of lab procedures Number of procedures Number of medications Number of outpatient visits Number of emergency visits Number of inpatient visits Diagnosis 1 Diagnosis 2 Diagnosis 3 Number of diagnoses Glucose serum test result A1c test result

Attribute type Numeric

Description

Numeric

Number of procedures (other than lab tests) performed during the encounter Number of distinct medications administered during the encounter Number of outpatient visits of the patient in the year preceding the encounter Number of emergency visits of the patient in the year preceding the encounter Number of inpatient visits of the patient in the year preceding the encounter The primary diagnosis Secondary diagnosis Additional secondary diagnosis Number of diagnoses entered to the system

Numeric Numeric Numeric Numeric Nominal Nominal Nominal Numeric Nominal Nominal

Change of medications Diabetes medications 24 features for medications

Nominal

Readmitted attribute

Nominal

1.2

Nominal Nominal

Number of lab tests performed during the encounter

Indicates the range of the result or if the test was not taken. Values: >200, >300, Normal, and None if not measured Indicates the range of the result. Values: >8, >7 and > 2p > i ¼ I sin wt þ > B m > 5 >   > < 4p iC ¼ Im sin wt þ 5   > 6p > > iD ¼ Im sin wt þ 5 > > >   > > 8p : iE ¼ Im sin wt þ 5 Among them, Im is the current amplitude. When the magnetic momentum of each phase is defined as Then the magnetic momentum component of the 5-phase output is defined as 8 FA ¼ 12 N  Im sinxt cos b   >  > > 2p > < FB ¼ 12 N  Im sinxt þ 2p 5  cosb þ 5  4p FC ¼ 12 N  Im sin xt þ 4p 5  cos b þ 5  > 1 6p 6p > > > FD ¼ 2 N  Im sin xt þ 5  cos b þ 5  : 1 8p 8p FE ¼ 2 N  Im sin xt þ 5 cos b þ 5

ð1Þ

.

ð2Þ

In the formula, is the number of turns per phase winding and b is the electrical angle along the space position around the air gap with phase A axis as the origin. Expansion of formula (2) shows that the magnetomotive force of 5-phase PM motor is F ¼ FA þ FB þ FC þ FD þ FE 5 ¼ N  Im ðsin xt cos b  cos xt sin bÞ 4 5 ¼ N  Im sinðxt  bÞ 4

ð3Þ

3 Fault-Tolerant Control Strategy The common FTC methods are vector control (VC) and direct torque control (DTC). The core of VC strategy is to control the stator current vector. The specific principle is to decompose the stator current vector of the motor into two components as excitation current and torque current. According to the principle of magnetic field orientation (MFO), the amplitude and phase of the two components are controlled respectively, and the goal of motor control is finally completed. By decoupling the flux linkage and the torque, the regulators of the two are designed respectively to achieve high-performance speed regulation of the motor.

160

S. Jie

There are several commonly used vector control methods: id = 0 control, cos u ¼ 1 control, maximum thrust current ratio vector control, etc. Direct Torque Control (DTC) is a control method centered on the control of torque. It does not simply control the torque by controlling the intermediate variables such as current and flux linkage, but directly takes the torque as the control variable. Although stator field orientation is also used, DTC does not need complex coordinate transformation compared with vector control. DTC uses space vector to directly control the torque in the stator coordinate system. The principle of stator MFO is adopted with the PWM technology. The switching state of the inverter is controlled directly, and the optimal control effect is obtained. Compared with vector control, the establishment of complex mathematical model is omitted. Compared with direct torque control, vector control has a wider speed range by rotating coordinate transformation. For the smoothness of torque control, there is no torque ripple. Compared with the background requirements of electric vehicles and manufacturing, vector control method can better meet the requirements of this paper. When phase A is open, the phase current is 0. If the remaining four phases remain unchanged in amplitude and phase, the circular magnetic field generated by the rotor will become elliptical, the motor may oscillate and the electromagnetic torque will pulsate. According to the principle of invariant magnetomotive force MMF, the circular magnetic field can be generated by changing the amplitude and current phase in the remaining four phases. How to obtain the magnitude and phase of the remaining fourphase current has been deduced by the principle that magnetic potential remains unchanged and given two constraints. In this paper, two constraints of the motor are given: (1) the current amplitude in the remaining four phases is the same after single-phase open-circuit fault occurs; (2) the phase symmetry of the current in other four phases after the assumed fault occurs. The results are given directly without detailed derivation. Assuming that phase A is open, the instantaneous expression of residual fourphasecurrent after fault is as follows 8 iA ¼ 0 > > > > < iB ¼ 1:382Im sinðxt þ 36 Þ iC ¼ 1:382Im sinðxt þ 144 Þ > > > iD ¼ 1:382Im sinðxt  144 Þ > : iE ¼ 1:382Im sinðxt  36 Þ

ð4Þ

On the basis of the expression of fault-tolerant current after fault occurs, a model of permanent magnet motor driven by voltage source is established, which is the FTC method in this paper: (1) The two orthogonal bases of the fundamental wave subspace are obtained from the phase current in Eq. (4), and the generalized Park matrix of the transformation from four-phase to two-phase stationary coordinate system is obtained. (2) By multiplying the extended Park matrix with Clark matrix, the coordinate transformation matrix is obtained, and the current transformation from natural coordinate system to synchronous rotating coordinate system is realized.

Optimal Fault Tolerant Control of Five-Phase PMSM

161

(3) Through the product of Clark matrix and inverse transformation matrix of generalized Park matrix, the voltage in synchronous rotating coordinate system is transformed to the voltage in natural coordinate system, and the control voltage is obtained by adding the opposite electromotive force. The control of motor is realized by CPWM method. Among them " T4s=2s ¼

cos 0:2p 3:618 sin 0:2p 1:91

cos 0:8p 3:618 sin 0:8p 1:91

2

T2s=4s

cos 0:2p 6 cos 0:8p ¼6 4 cos 1:2p cos 1:8p

cos 1:2p 3:618 sin 1:2p 1:91

cos 1:8p 3:618 sin 1:8p 1:91

#

3 sin 0:2p sin 0:8p 7 7 sin 1:2p 5 sin 1:8p

ð5Þ

ð6Þ

For a 5-phase motor, when a fault occurs in a certain phase, in order to make the origin of the spatial electric angle of the motor (i.e. the axis of phase A) coincide with the axis of the fault phase of the motor and have the same direction, the corresponding angle of the natural coordinate system should be rotated counterclockwise. The general Clark transformation matrix is as follows:   cos xt  2k5 p   ¼4  sin xt  2k5 p 2

C2s=2r

 3 sin xt  2k5 p  5 cos xt  2k5 p

ð7Þ

Among them, k = 0, 1, 2, 3, 4. In this paper, if phase A is open, then  C2s=2r ¼

cos xt  sin xt

sin xt cos xt



  cos xt  sin xt C2r=2s ¼ sin xt cos xt

ð8Þ ð9Þ

The steps (2) can be represented by the following coordinate transformation matrix 

id iq



2

3 iB 6 iC 7 7 ¼6 4 iD 5T4s=2s C2s=2r iE

In the synchronous rotating coordinate system, the corresponding voltage in the rotating coordinate system are obtained.

ð10Þ

and

162

S. Jie

Among them, step (3) can be expressed by the following formula: 2

3 uB   6 uC 7 6 7 ¼ ud C2r=2s T2s=4s 4 uD 5 uq uE

ð11Þ

The following figure is a block diagram of FTC method for 5-phase PM motor when one-phase open-circuit fault occurs (Fig. 1).

C T

inverter

PMSM

Fig. 1. Block diagram of fault-tolerant control method for 5-phase PM motor

4 Fault-Tolerant Control Strategy 4.1

Simulation Model and Results

In view of the above strategy, the mathematical model of 5-phase PM motor and the following FTC system are established in Simulink with the help of MATLAB software (Fig. 2). The simulation system consists of coordinate transformation module, PI regulator, motor model and CPWM module. In the simulation process, a phase fault signal is given at 0.05 s after the start of operation. This paper gives that phase A has an open circuit fault. From the analysis of the simulation waveforms, it’s concluded as follow: (1) After 0.05 s, the A phase current is 0, and the remaining four normal phases are increased to the same extent in a short time. The magnitude is approximately the same, which meets the constraints.

Optimal Fault Tolerant Control of Five-Phase PMSM

163

Fig. 2. Simulation system model

(2) After starting the motor, when it reaches a stable state, the electromagnetic thrust value is stable at about 800 N. After a short period of rapid adjustment, the electromagnetic thrust of the motor is again maintained at about 800 N, which is the same level as before the fault. During the adjustment process, the motor speed has not changed before and after the fault. (3) Current values id and iq are monitored in two-phase rotating coordinate system, and waveform pulsation exists only in the instant of fault, which can quickly return to steady state, indicating that current pulsation is effectively suppressed, or that the torque pulsation is also effectively and rapidly suppressed. 4.2

Simulation Model and Results

Figure 3 displays the current waveforms of each phase before and after open circuit fault under fault-tolerant control strategy. Figure 4 displays the electromagnetic thrust waveform of the motor under faulttolerant control strategy before and after phase A open-circuit fault. Figure 5 displays the speed waveform of the motor before and after the open-circuit fault. Figure 6 displays the id and iq current waveforms of the motor before and after the A phase open circuit fault. Figure 7 displays the waveform of the C phase current before and after the A phase open circuit fault under fault-tolerant control strategy.

164

S. Jie

Fig. 3. Current waveforms of motor phases

Fig. 4. Electromagnetic thrust waveform

Fig. 5. Speed waveforms

Fig. 6. Id and iq current waveforms

Fig. 7. C phase current waveforms

5 Conclusion Aiming at one-phase open-circuit fault of 5-phase PM motor, a fault-tolerant control method based on fault-tolerant current calculation and CPWM technology is advanced. The coordinate transformation of voltage and current is realized by deducing Park matrix and Clark matrix and corresponding inverse transformation matrix, and the expected phase voltages of the motor in natural coordinate system are obtained. Fivephase permanent magnet motor is controlled by voltage source-driven inverter and CPWM modulation technology. Fault-tolerant control of motor in specific fault is realized. According to the theoretical analysis, the system simulation model is built. The simulation and waveforms show that the FTC strategy proposed in paper is

Optimal Fault Tolerant Control of Five-Phase PMSM

165

feasible. When one-phase fault occurs, it can maintain the motor’s torque output, lower the motor’s torque pulsation, and realize the state switching before and after the motor fault.

References 1. Bianchi N, Bolognani S, Pre MD (2007) Strategies for the fault-tolerant current control of a five-phase permanent-magnet motor. IEEE Trans Ind Appl 43(4):960–970 2. Baudart F, Dehez B, Matagne E et al (2013) Torque control strategy of polyphase permanentmagnet synchronous machines with minimal controller reconfiguration under open-circuit fault of one phase. IEEE Trans Ind Eletron 59:2632–2644 3. Mohammadpour A, Parsa L (2013) A unified fault-tolerant current control approach for fivephase PM motors with trapezoidal back EMF under different stator winding connections. IEEE Trans Power Electron 28(7):3517–3527 4. Gao Y, Zhao W, Liu G et al (2013) Research on fault tolerant control of new five-phase fluxswitched permanent magnet motor. Micromotors 46(1):33–36 (in Chinese) 5. Zhou H, Liu G, et al (2015) A Fault-Tolerant Control Method for Five-Phase Fault-Tolerant Permanent Magnet Linear Motor. CN104682820A (in Chinese) 6. Zheng P, Tang P, Sui Y et al (2013) Fault tolerant control strategy of five-phase permanent magnet synchronous motor for electric vehicle. Electr Mach Control 17(10):65–69 (in Chinese) 7. Gao H (2016) Research on Driving and Fault Tolerant Control Technology of Five-Phase Permanent Magnet Synchronous Motor (in Chinese)

Enhanced Pulse Density Modulation for Efficiency Optimization in Inductive Power Transfer Systems Hong Zheng(&), Rui Bian(&)

, and Yubing Gu(&)

School of Electrical and Information Engineering, Jiangsu University, Zhenjiang 212013, Jiangsu, China {zhenghong0511,gyb1778300805}@sina.com, [email protected]

Abstract. An enhanced pulse density modulation (EPDM) is proposed to optimize the efficiency in inductive power transfer (IPT) systems under various coupling and load. It controls the optimal output voltage without estimating the mutual inductance, which improves the efficiency and eliminates the communication between the primary and secondary side. Further, the four working modes of semi-bridgeless active rectifier (S-BAR) are combined uniformly by the EPDM based on DR modulation, which increases density resolution and decreases the output voltage ripple. Besides, the soft switching can be ensured by synchronous signals. The effectiveness of the method is confirmed by simulations and experiments. Keywords: Inductive power transfer (IPT)  Efficiency optimization Voltage regulation  Enhanced pulse density modulation (EPDM)  DR modulation



1 Introduction Inductive power transfer (IPT) transmits energy by magnetic coupling instead of wires [1]. With superior performances in safety and convenience [2], IPT has been preferred in changers of electric vehicles, mobile phones and biomedical implants [3]. IPT systems are always desired to operate with the high efficiency. However, the system efficiency is affected by changes of coupling coefficient and load resistance. The systems with optimal topology and parameters can improve the efficiency [4], but operating condition variations still affect the efficiency. A better method, maximum efficiency point tracking (MEPT), was been presented to address the problem. Generally, MEPT is performed on the secondary side by using a dc/dc converter which allows the value of the equivalent load resistance to be optimal. And the output voltage is stabilized by the control on the primary side [5]. However, added converters increase loss, complexity and cost. To avoid the additional loss, the inverter and active rectifier can be controlled by phase shift modulation [6], but it may pose the hard switching. And above methods need communication between the dual sides which will cause slow dynamic response. Maximum efficiency control without communication © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 166–173, 2020. https://doi.org/10.1007/978-981-32-9050-1_19

Enhanced Pulse Density Modulation for Efficiency Optimization

167

link was presented in [7]. MEPT and voltage regulation were realized by means of pulse density modulation (PDM) on the dual sides, which ensured soft switching of the inverter and rectifier. Although open-loop control can avoid communication link, its dynamic response was still not ideal. In this paper, an EPDM for efficiency optimization is proposed. It is only applied on the secondary side without communication link. With this method, maximum efficiency, stable output voltage and soft switching can be achieved simultaneously.

2 Conditions for Maximum Efficiency Figure 1 is the equivalent circuit of the series-series (SS) compensated IPT system, where Li, Ci, Ri (i = 1, 2) are the self-inductances, compensated capacitors and equivalent series resistors respectively. M and RE represent the mutual inductance and the equivalent load resistance. U1 and U2 represent the input and output voltages. i2

i1

C1

C2

M U1

L1

L2

RE

U2

R2

R1

Fig. 1. Topology of IPT system with SS compensation

In [8], the system efficiency η and U2 are expressed as: g¼

x2 M 2 RE ðR2 þ RE Þðx2 M 2 þ R1 R2 þ R1 RE Þ

ð1Þ

xM RE U1 R1 R2 þ R1 RE þ x2 M 2

ð2Þ

U2 ¼

where x represents system operating angular frequency. From (1) and (2), η and U2 both depend on M and RE in dynamic system. To maximize η, the derivative of η relative to RE should be zero, and the optimal RE can be expressed as: RE;opt

sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi rffiffiffiffiffi x2 M 2 R2  xM ¼ R2 1 þ R1 R2 R1

ð3Þ

for (xM)2  R1R2. By substituting (3) into (2), the optimal U2 can be obtained: U2;opt

rffiffiffiffiffi R2  U1 R1

ð4Þ

168

H. Zheng et al.

for (xM)2  R1(R2 + RE). In a specific IPT system with fixed R1, R2 and input voltage, the output voltage can be stabilized at a fixed value to ensure the high efficiency.

3 EPDM for Efficiency Optimization 3.1

Principle of EPDM

Figure 2 is the circuit of a SS-IPT system with S-BAR. PDM can control the load voltage by removing some pulses of u2. And the proportion of the remaining pulses to the whole switching period is named pulse density, being expressed as d. Figure 3 shows the EPDM pattern compared with the SPDM under different d.

S1

RE

S3 u1

Vin S2

S4

D1

C1 i1 C M i2 2 L1

u2

L2

R1

R2 S5

Cf D2 S6

I0

D3

RL V0

D4

Fig. 2. Circuit diagram of IPT system with S-BAR

u2

SPDM t t

u2 d=0.7

EPDM

d=0.3

t t

Fig. 3. Waveforms of the S-BAR’s input voltage with SPDM and EPDM

SPDM has two kinds of waveforms, square waves and ‘0’, increasing and decreasing voltage, respectively. Therefore, u2 should be distributed uniformly to minimize ripple. Note that the output power is zero during ‘0’. In order to further shorten the duration of the ‘0’, EPDM with additional positive square waves is proposed. For EPDM, u2 has no “0” at density of 0.5-1 and owns square waves and ‘0’ at density of 0–0.5. The S-BAR has various operating modes with different switching conditions of S5 and S6, the possible operating waveforms of S-BAR is shown in Fig. 4. Mode 0: The switches S5 and S6 are both turned off. The positive (negative) current i2 charges Cf and transmits energy to the load through D1 (D3) and D4 (D2). Mode 1: The switch S5 (S6) is turned off and S6 (S5) is turned on. The positive (negative) current i2 flows to D1 (D3) and S6 (S5). During this interval, i2 charges the filter capacitor Cf and the power flows into the load. Mode 2: The switch S5 is turned off and S6 is turned on. In the former half of the cycle, the positive current i2 delivers power to the load through D1 and S6. And in the

Enhanced Pulse Density Modulation for Efficiency Optimization

169

latter half of the cycle, the secondary side circuit is shorted and the negative current i2 flows through S6 and D2. The energy is exchanged between L2 and C2. Mode 3: The switch S5 is turned off (on) and the switch S6 is turned on. In the former half of the cycle, the positive current i2 flows through D1 and S6, delivering power to the load. And in the latter half of the cycle, the secondary side circuit is shorted and the negative current i2 flows through S6 and S5. u2 ,i2 t ugs_S5 t ugs_S6 0

1

2

3

4

t

Fig. 4. Possible operating waveforms of S-BAR

Mode 4: The switches S5 and S6 are both turned on. The positive (negative) current i2 flows to S5 (S6) and S6 (S5). The secondary side circuit is shorted and the load is supplied only by filter capacitor Cf. In mode 0 and mode 1, u2 is a square wave, and there is a positive square wave in mode 2 and mode 3, and mode 4 is ‘0’. Suitable modes should be selected to combine the three waveforms, where the mode 0 and mode 1 are selected to achieve a combination of square waves, and mode 2, 3 combine the square waves and the ‘0’. 3.2

Voltage Regulation

Form (2), the following equation can be obtained: U2 ¼

xM RE R1 ðR2 þ RE Þ þ ðxM Þ

2

U1 

RE U1 xM

ð5Þ

for (xM)2  R1(R2 + RE). The waveform of u2 is uniform with magnitude of U2m and pulse density of d under PDM. It can be balanced with a waveform with magnitude of U2m * d and pulse density of 1. The average output power can be expressed as: pffiffiffi 2 2 d V0 I2 P0 ¼ U2 I2 ¼ p

ð6Þ

where d is the pulse density of u2. Combining (6) with the power balance principle, the equivalent load resistance RE can be derived: RE ¼

8 2 d RL p2

ð7Þ

170

H. Zheng et al.

By substituting (7) into (5) and considering the characteristics of power electronic devices, the load voltage can be obtained: V0 ¼

8 RL dV in p2 xM

ð8Þ

From (8), it is possible to stabilize the load voltage by adjusting pulse density.

4 Control Operation An EPDM for S-BAR is designed to obtain the optimal output voltage. And the control schematic of S-BAR is shown in Fig. 5. A double PI control is used to figure out the pulse density d in real time, which is needed for voltage stabilization. By comparing the relationship between d and 0.5, suitable operating modes can be chosen. Then d1 calculated by the algorithm corresponding to the modes is sent to EPDM, whose input pulses are synchronous with i2. The EPDM module generates gate signals corresponding to d to act on S-BAR.

i2 Vref

PI

Synchronous signal generator PI

d

Mode EPDM selection d1

ugs_S5 ugs_S6

V0

Fig. 5. Control block diagram of S-BAR

As mentioned above, PDM pulses are needed to be uniform with high density resolution. Figure 6 shows the block diagram of PDM. This controller consists of input pulses synchronized with i2, a DR modulator and an AND gate. In the DR modulator, the difference between the values of the input d1 and the output signal is sent to the integrator, which is triggered by the rising edge of the input pulses. A feedforward is introduced to solve the delay generated by the integrator. And then the comparator is designed as ‘  0.6’ to realize quantization, so that the output signal is the uniform combination of ‘1’ and ‘0’. Modulated pulses proportional to d are achieved by the AND gate, whose input signals are the synchronous signal and the output of the DR modulator. In order to realize the pairwise combinations of the operating modes, it is necessary to select two modes according to the d value, considering two situations: (1) 0.5  d  1; (2) 0 < d < 0.5. As shown in Fig. 7, in the first case, two complementary pulses generated by the PDM module trigger S5 and S6 to realize the uniform combination of mode 1 and mode 2. At that situation, d = 0.5 + 0.5d1. In the second case, S6 continues to be turned on and S5 is driven by the pulses that is complementary to the modulated pulses of PDM to combine mode 3 and mode 4, there is d = 0.5d1. EPDM is finished in this way.

Enhanced Pulse Density Modulation for Efficiency Optimization

d1

d1

PDM

ugs_S5 NOT ugs_S6

0.6 modulator

d1 PDM NOT

ugs_S5

1

ugs_S6

(a) 0.5≤d≤1

Fig. 6. Block diagram of PDM

171

(b) 0 < z_ 1 ¼ z2  l1 e ð6Þ z_ ¼ z3  l2 e þ b0 u > > : 2 z_ 3 ¼ l3 e Where, Z ¼ ðz1 ; z2 ; z3 ÞT is a state observation vector. l1 , l2 and l3 are observer gains. LESO characteristic equation is OðsÞ ¼ s3 þ l1 s2 þ l2 s þ l3

ð7Þ

In order to accurately and real-time estimate states and total disturbance of the controlled object, how to selected parameters l1 , l2 and l3 , that is, observer gains, is very important. The observer gains can be designed by pole assignment method. Generally, the form of the characteristic equation which is better stable and transition process is OðsÞ ¼ ðs þ xo Þ3

ð8Þ

That is, three poles of the observer are assigned the same position xo . We define the observer bandwidth as xo . So, we obtain l1 ¼ 3xo ; l2 ¼ 3x2o ; l3 ¼ x3o

ð9Þ

Study of Speed Stabilization Loop for Airborne Photoelectric Platform

185

The observed states z1 ; z2 ; z3 are the estimates value of the system states and total disturbance x1 ; x2 ; x3 ð f Þ, respectively. Based on the observed states z1 ; z2 ; z3 , the controller can be designed as u ¼ ðu0  z3 Þ=b0

ð10Þ

Ignoring the observation error, the original system model is simplified to €y  u0

ð11Þ

by taking Eqs. (10) into (1). Using a simple PD controller, for example u0 ¼ k p ð r  z 1 Þ  k d z 2

ð12Þ

Then, output y of the controlled object can be controlled. Where r is input value of given reference. kp and kd are gains of PD controller. So, the characteristic equation of PD controller is GðsÞ ¼ s2 þ kd s þ kp

ð13Þ

The pole assignment method can also be used to design PD controller gains. We take GðsÞ ¼ ðs þ xc Þ2

ð14Þ

kp ¼ x2c ; kd ¼ 2xc

ð15Þ

So, we obtain

We define PD controller bandwidth as xc and observer bandwidth as xo . In general application, we can select the relationship between xc and xo as follows xo ¼ ð3v5Þxc

ð16Þ

LADRC only tunes two parameter b0 and xc . It is simple in controller structure and easy to carry in engineering [5, 6].

3 Application of ADRC to Speed Stabilization Loop for Airborne Photoelectric Platform 3.1

Mathematical Modeling

When the viscous friction and friction moment are neglected in the modeling of the controlled object of the photoelectric platform, the transfer function of the speed stabilization loop is as follows

186

Y. Bi and S. Wang

G x ðsÞ ¼

h_ ðsÞ 1=kb ¼ uðsÞ ðTm s þ 1ÞðTe s þ 1Þ

ð17Þ

Where kb is the motor’s back EMF coefficient, Tm is the motor’s electromechanical time constant and Te is the motor’s electromagnetic time constant. In this paper, take the speed stabilization loop control system of the elevation frame for a photoelectric platform as an example, the parameters are measured. Transfer function is as follows Gx ðsÞ ¼

h_ ðsÞ 1:45 1435:5 ¼ ¼ s þ 1 s þ 1 uðsÞ ð1=9 Þð1=110 Þ ðs þ 9Þðs þ 110Þ

ð18Þ

External disturbance torque is applied at the output of the motor torque so as to simulate anti-jamming performance. In the case, the disturbance transfer function is as follows G d ðsÞ ¼

h_ ðsÞ La s þ Ra 0:628 5:652 ¼ G x ðsÞ  ¼ ¼ d ðsÞ 1=9s þ 1 sþ9 km

ð19Þ

Where km is moment coefficient, La is armature inductance and Ra is armature resistance. When both the speed reference input and the disturbance moment input are simultaneously applied to the system, the speed output of the controlled object can be obtained with Eqs. (18) and (19) as follows h_ ðsÞ ¼

3.2

1435:5 5:652 uðsÞ þ d ðsÞ ðs þ 9Þðs þ 110Þ sþ9

ð20Þ

Traditional Controller Design

The traditional controller design method of the speed stabilization loop of photoelectric platform is based on frequency domain theory. According to the system performance requirements, a lag-ahead series correction method is adopted to improve the system performance and system bandwidth. Generally, the closed-loop bandwidth of the speed stabilization loop is not less than 25 Hz. According to the mathematical model Eq. (18), the transfer function of the designed lagged-ahead series network is as follows Gc ðsÞ ¼ 3404 

3.3

1=24s þ 1 1=105s þ 1  1=0:065s þ 1 1=250s þ 1

ð21Þ

LADRC Design

For a closed-loop second-order system with damping ratio n ¼ 1, relationship between its closed-loop bandwidth frequency xb and undamped natural frequency xn (i.e. PD controller bandwidth as xc ) is as follows

Study of Speed Stabilization Loop for Airborne Photoelectric Platform

xb ¼ 0:644  xc

187

ð22Þ

According to the performance requirement xb  25 Hz ¼ 157 rad/s, xc  244 rad/s can be obtained. The bandwidth frequency of PD controller can be selected as xc ¼ 250 rad/s. By using Eq. (16), the bandwidth frequency of the observer can be selected as xo ¼ ð3v5Þxc ¼ 900 rad=s: The above LADRC design unifies the modeled part, the unmodeled part and the external disturbance into the generalized disturbance of the system. The alternative ADRC can be constructed by using the modeled part, which can reduce the burden of the observers. The parameters of observer and PD controller in the alternative LADRC are the same as those in LADRC. 3.4

Simulation Results

In MATLAB/Simulink, the speed stabilization loop control system of the elevation frame for a photoelectric platform is simulated. The traditional control, LADRC and the alternative LADRC are shown in Figs. 1, 2 and 3.

Disturbance Output

21.95 Input signal

Controlled object

Controller

Fig. 1. Block diagram of closed-loop with traditional control

Disturbance 250^2 v0

Input signal

1/1435.5

2*250

u

Controlled object

PD controller 1435.5

900^3

3*900^2

-1

1 s

3*900

z3

1 s

Linear extended state observer (LESO)

Fig. 2. Block diagram with LADRC

z2

1 s

z1

188

Y. Bi and S. Wang

Step response of three controllers is shown in Fig. 4. So as to test anti-jamming performance for three controllers, a step disturbance is added to the system at t ¼ 0:2 s. The system response is shown in Fig. 5. We can find from Figs. 4 and 5, the alternative LADRC has the fastest response speed, no overshoot and the strongest disturbance suppression ability. Assuming 1=kb , Tm and Te increased by 50% respectively, the system response is shown in Fig. 6. We also find that alternative LADRC has good performance of overcoming the system parameter variation. Figure 7 shows the response comparison under the condition of system parameter variation with alternative LADRC. Similarly, it is shown that alternative LADRC has a good ability to overcome parameter perturbation under various parameter changes. In summary, it can be seen that the alternative LADRC is an ideal controller.

Disturbance

250^2 v0

Input signal

1/1435.5

2*250 PD controller

u

Controlled object

990 1435.5 119

z1 z2

900^3

3*900

3*900^2

-1

1 s

z3

Linear extended state observer (LESO)

1 s

1 s

z2

z1

119 990

Fig. 3. Block diagram with alternative LADRC

Fig. 4. Step response plots

Fig. 5. Anti-disturbance response plots

Study of Speed Stabilization Loop for Airborne Photoelectric Platform

Fig. 6. Parameter variation response plots

189

Fig. 7. Parameter perturbation 50% response plots

4 Conclusions In the paper, application of LADRC in speed stabilization loop control of photoelectric platform is studied. First, the design method of second-order control system LADRC is analyzed, and the advantages of its simple structure and easy engineering implementation are pointed out. The corresponding controllers are designed by using traditional design method, LADRC, alternative LADRC. The step response and anti-disturbance simulation of the design results are carried out. The simulation results show that alternative LADRC has the fastest response speed, no overshoot and remarkable disturbance suppression effect. It is a universal control structure independent of model and can obtain better response and anti-disturbance performance than PID control. The alternative LADRC is planned to be implemented by hardware, and its control effect in the speed stabilization loop of the photoelectric platform is tested in the experiment. Acknowledgement. The work is partially supported by Heilongjiang University Special Foundation by Basic Scientific Research in Universities of Heilongjiang Province (No. KJCX201824).

References 1. Chen Z, Cheng Y, Sun M (2017) Surveys on the theory and engineering applications for LADRC. Inf Control 46(3):257–266 (in Chinese) 2. Han J (2013) Active disturbance rejection control technique. National Defense Industry Press, Beijing (in Chinese) 3. Gao Z (2013) Research on ADRC thought. Control Theory Appl 30(12):1498–1510 (in Chinese) 4. Gao Z (2003) Scaling and bandwidth-parameterization based on control tuning. In: Proceedings of the American control conference, pp 4989–4999 (2003)

190

Y. Bi and S. Wang

5. Herbst G (2016) Practical active disturbance rejection control: bumpless transfer, rate limitation and incremental algorithm. IEEE Trans Ind Electron 63(3):1754–1762 6. Godbole A, Kolhe J (2013) Performance analysis of generalized extended state observer in tackling sinusoidal disturbances. IEEE Trans Control Syst Technol 21(6):2212–2223 7. Wan H (2001) Stability and application for active-disturbance-rejection-controller. Academy of Mathematics and Systems Science, Beijing. (in Chinese)

Active Disturbance Rejection Control of Drum Water Level with Generalized Extended State Observer Cuiping Pu1, Jie Ren1, and Jianbo Su2(&) 2

1 Kunming University, Kunming 650214, China Shanghai Jiao Tong University, Shanghai 200240, China [email protected]

Abstract. Time-varying disturbance of drum water level is difficult to estimate and compensate, which leads to time-varying periodic error of the whole system. System model is reconstructed by using prior information of equivalent disturbance, and the components of known modes in equivalent disturbance are estimated and compensated by the generalized extended state observer. Thus, the error can be eliminated and the control accuracy of the system can be improved. Compared with the traditional active disturbance rejection control (ADRC) system based on linear extended state observer, the control performance under different types of external disturbances is studied. Simulation results show that the proposed generalized extended state observer can completely estimate and compensate the components of the known modes in the equivalent disturbance with small overshoot, short adjustment time, strong antiinterference ability and high control precision. Keywords: ADRC

 State observer  Drum water level

1 Introduction Drum water level is an important parameter of boiler operation. At present, serial threeimpulse control [1] is usually used in industry to regulate drum water level, especially serial PID control. Because of the changeable operating conditions and the complexity of combustion system, the drum water level is often severely disturbed. Therefore, the conventional PID control has poor control effect on the drum water level [2]. Aiming at drum water level control, Liu [3] and others introduce extended Kalman neural network method to design network controller (EK-NNC) to replace conventional PID controller. Li [4] etc., propose a model reference adaptive internal model control (IMC) method based on fuzzy reasoning. Rong [5] etc., use the PID controller of the fuzzy neural network as the water level regulator of the boiler drum in the feed water control system, which can adjust the parameters of the PID controller in real time. Active Disturb Rejection Control (ADRC) [6–11] was proposed by Han in the 1980 s. The main idea is to treat the uncertainty of the model and the external disturbance of the system as the total disturbance. As the core part of ADRC, Extended State Observer (ESO) [12] models and reconstructs the total disturbance of the system [13] as the extended state of the system, so that the state observer can estimate the © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 191–199, 2020. https://doi.org/10.1007/978-981-32-9050-1_22

192

C. Pu et al.

equivalent disturbance of the system at the same time. With the development of ADRC theory and technology, it has gradually been familiar with control society and industry and widely used in various practical control problems, such as robot [14, 15] and manipulator [16], aircraft control, power system control, etc. In drum water level control, Fu [17] etc., estimated the control gain with the formula of feed water flow, estimated the system state with linear expansion observer, and took measures against actuator saturation. Jiang [18] etc., proposed that the objective function should be composed of the variation of error and control variables, and the weighting factor of the objective function should be selected so as to turn the tuning problem of controller parameters into an optimization problem. Compared with traditional PID cascade control, the system has better anti-jamming ability and robustness. But they mainly discuss the gradual tracking of constant external disturbances. However, the time-varying disturbances in practical applications cannot be fully estimated by the traditional ESO. Therefore, it is very important to study the design strategy of observers for time-varying disturbances. In this paper, a generalized linear extended state observer (GLESO) based on the reconstructed model is designed to fully estimate and compensate the known model components in the equivalent disturbance and improve the control accuracy of the system. The anti-jamming performance of traditional linear extended state observer (LESO) and GLESO for drum water level under different external time-varying disturbance is simulated and analyzed. The results show that the ADRC system based on GLESO has the advantages of small overshoot, short adjustment time, strong antijamming ability and high control precision, and has good engineering application value and application prospect.

2 Linear Active Disturbance Rejection Control for Drum Water Level ADRC [19–21] is mainly composed of tracking differentiator (TD), extended state observer (ESO) and non-linear state error feedback (NLSEF) [22]. The structure of ADRC is shown in Fig. 1. ADRC arranges the system transition process by TD to reduce the system oscillation and overshoot. ESO is used to estimate the internal state and equivalent disturbance of the system. Finally, NLSEF is used to stabilize the nominal system compensated by the observer. If ESO and NLSEF adopt linear functions, ADRC can be simplified to LADRC [23–25] which is more conducive to parameter tuning [26] and theoretical analysis.

Fig. 1. Structural of ADRC

Fig. 2. Transfer function model of drum water level system.

Active Disturbance Rejection Control of Drum Water Level

2.1

193

Linear Extended State Observer (LESO)

In LADRC, the linear extended state observer (LESO) is the key link for real-time estimation and on-line compensation of the total disturbances of the system. Its task is to observe the States and total disturbances of the system according to the input and output data. In the drum water level control system [27], a serial three-impulse controller is composed of three signals of drum water level Y(s), steam flow D(s) and feed water flow W(s). The transfer function model of the drum water level system is shown in Fig. 2. In order to compensate for the internal disturbance and external disturbance to the control system by feedforward method, the mathematical model of the water level system can be simplified to a second-order system, i.e. n = 2, using LESO correlation description: €y ¼ f ð_y; y; wÞ þ b0 u;

ð1Þ

where, y is the output signal of the system, u is the control input signal of the system, b0 is the gain of the controller, w is the external disturbance of the system [28]. f () is the total disturbance of internal disturbance plus external disturbance. Define the state, x1 ¼ y; x2 ¼ y_ ; x3 ¼ f and the total perturbation is extended to n + 1 = 3 order linear system, then the state space of Eq. (1) is expressed as: 

x_ ¼ Ax þ b0 Bu þ Ef_ ; y ¼ Cx

ð2Þ

where, 2

0 A ¼ 40 0

2 3 3 2 3 0 1 0 0 0 1 5; B ¼ 4 1 5; E ¼ 4 0 5; C ¼ ½ 1 0 1 0 0

0 0 :

Therefore, when the controller gain estimate is greater than zero [29], targeting (2), the following third-order LESO is established: z_ ¼ Az þ ^b0 Bu þ Ke;

ð3Þ

where, e ¼ x  z1 ¼ y  z1 denotes observation errors, and   K ¼ ½k1 k2 k3  ¼ a1 x0 a2 x20 an þ 1 xn0 þ 1 ; aj ¼

ðn þ 1Þ! ; j!ðn þ 1  jÞ!

ð4Þ ð5Þ

194

C. Pu et al.

where, k1, k2 and k3 are the gain parameters, the LESO characteristic equation are configured in the following form: k ¼ sn þ 1 þ x0 a1 s2 þ x20 a2 s1 þ xn0 þ 1 an þ 1 ¼ðs þ x0 Þn þ 1 ;

ð6Þ

with this configuration, the number of parameters can be reduced and the difficulty of parameter tuning can be reduced. The n+1 parameters can be simplified to the q parameter, which is called observer bandwidth. On the basis of accurate estimation of the state of the system expansion, with the linear state error feed-back (LSEF), the system can approximately be simplified to a disturbance free form and then control it. The controller is designed as follows: 

u0 ¼ kp ðr  yÞ  kd y_ ; u ¼ u0^bz3

ð7Þ

0

Since Z  Y The closed-loop dynamic equation of the system can be approximately written as: €y þ kd y_ þ kp y ¼ kp y;

ð8Þ

where kp and kd are the parameters of the controller. yr is the water level setting value. In order to reduce the number of parameters, the gain parameters x0 of the controller are selected to make kp = x2c and kd = 2xc. The structure diagram of the linear ADRC system [30] for drum water level is shown in Fig. 3. 2.2

Generalized Expansion Observer

Considering SISO nonlinear systems with uncertainties, 

x_ ¼ Ax þ Bð^bð xÞ þ ^að xÞu þ Dðx; d ÞÞ ; y ¼ Cx

ð9Þ

where D() is the total disturbance depending on the internal state and external disturbance of the system, which includes external disturbance, model parameter perturbation, unmodeled dynamics, system state coupling and so on. Based on the analysis of the equivalent modal of the system, the equivalent disturbance system model is established as follows: 

h_ ¼ hðhÞ þ pðhÞl ; D ¼ gð hÞ

ð10Þ

h is disturbance system state, µ is the input of the disturbance system, h and p are two smooth vector fields, and g is a smooth mapping. The perturbation system input is related to the external disturbance d (t) and the system state x, and the relative order of

Active Disturbance Rejection Control of Drum Water Level

195

the perturbation system [31]. Equation (10) is transformed into a linear model by means of a non-linear state transformation. 

g_ ¼ Ad g þ Bd d ; y ¼ Cd g

ð11Þ

where, 2 " Ad ¼

Ar 0ðmr þ 1Þr

Cd ¼ ½10    0;

0 1

0

 0

3

# 60 0 6 0ðr1ÞðmrÞ ; Ar ¼ 6 6 .. .. 0ðmr þ 1ÞðmrÞ 4. .

1 .. .

" #  07 7 0ðr1Þ1 7 ; . 7; Bd ¼ .. Iðmr þ 1Þ1 . .. 5

0 0

0

 1

1 1 r d ¼ Lp Lr1 h g(W ðgÞÞ þ Lh gðW ðgÞÞl:

Considering the system model and disturbance model, the generalized state of the T system is recorded as x ¼ ½xT gT  , and the generalized model of the system is obtained as follows: 8       A BCd 0 B ^ > > _ x ¼ x þ ðbðxÞ þ ^ aðxÞuÞ þ d > > B 0 A 0 > d d < |ffl{zffl} |fflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflffl} |fflffl{zfflffl} ;    B E A > > >    y ¼ ½ C0  ½  ½ 0  x ; D ¼ 0C x ; x ¼ I x d nn > > |{z} |ffl{zffl} |fflfflffl{zfflfflffl} :  Cm

 Cd

ð12Þ

 Cx

according to the reconstructed system model described [32] in Eq. (12), a generalized ESO is designed: 

 ^x þ Bð  ^bð^xÞ þ ^að^xÞuÞ þ Lðy  ^yÞ ^x_ ¼ A :   xx ^ ^y ¼ Cmx; ^x ¼ C

ð13Þ

3 GLESO Simulation and Performance Analysis of Drum Water Level Considering the slope disturbance, the first derivative of external disturbance to time is constant, and the first derivative of total disturbance to time is constant in steady state. Define the expansion state of drum water level system as x3 ¼ f ðÞ; x4 ¼ f_ ðÞ reconstruct the system, and get the following model: 

x_ 1 ¼ x2 ; x_ 2 ¼ x3 þ b0 u ; x_ 3 ¼ x4 ; x_ 4 ¼ hðtÞ; y ¼ x1

ð14Þ

196

C. Pu et al.

for the reconstructed system, the generalized state observer GLESO is: 

z_ 1 ¼ z2 þ k1 ðy  z1 Þ; z_ 2 ¼ z3 þ k2 ðy  z1 Þ þ b0 u ; z_ 3 ¼ z4 þ k3 ðy  z1 Þ; z_ 4 ¼ k4 ðy  z1 Þ

ð15Þ

considering the periodic disturbance, the sinusoidal external disturbance is taken as an _ ¼ x2 dðtÞ Define the expansion state of the example to satisfy the requirement dðtÞ x3 ¼ f ðÞ; x4 ¼ f_ ðÞ; x5 ¼ €f ðÞ þ x2 dðtÞ system, , reconstruct the system and get the ZY following model: 

x_ 1 ¼ x2 ; x_ 2 ¼ x3 þ b0 u ; x_ 3 ¼ x4 ; x_ 4 ¼ x5  x2 x3 ; x_ 5 ¼ hðtÞ ; y ¼ x1

ð16Þ

the generalized state observer GLESO for reconstructed system design is: 

z_ 1 ¼ z2 þ k1 ðy  z1 Þ; z_ 2 ¼ z3 þ k2 ðy  z1 Þ þ b0 u; z_ 3 ¼ z4 þ k3 ðy  z1 Þ ; z_ 4 ¼ z5 þ k4 ðy  z1 Þ  x2 z3 ; z_ 5 ¼ k5 ðy  z1 Þ

ð17Þ

the initial water level of the drum is 0 and the water level is set yr = 1. The transfer function and related parameters of the control object of the drum water level control system [33] in a power plant are as follows: GW ðsÞ ¼

0:037 3:045s  0:037 ; GD ðsÞ ¼ ; HD ðsÞ ¼ HW ðsÞ ¼ 0:0174; sð30s þ 1Þ 15s2 þ s

GV ðsÞ ¼ 20; HY ðsÞ ¼ 1: Cascade feedforward coincidence control solution is adopted. LADRC as the main tone, the parameter of LESO are b0 = 0.02, xc = 0.28, x0 = 1.12. The parameters of the PID sub-controller are kp = 1.2, ki = 0.35, kd = 5. When external disturbance is slope disturbance, sub-loop disturbance plus unit slope disturbance at t = 100 s, and main circuit plus unit slope disturbance at t = 200 s. GLES and controller values, b0 = 0.02, xc = 0.28, x0 = 1.12, ½k1 k2 k3 k4 k5    ¼ 5x0 10x20 10x30 5x40 x50 .

Fig. 3. Structure of linear ADRC system for drum water level

Fig. 4. Drum water level under slope disturbance.

Active Disturbance Rejection Control of Drum Water Level

Fig. 5. Drum water level under sinusoidal disturbance of main circuit

197

Fig. 6. Drum water level under sinusoidal disturbance of secondary circuit.

From the simulation results of Fig. 4, GLADRC has better control performance than LADRC, smaller overshoot and shorter adjustment time, regardless of whether the disturbance is added to the secondary circuit or the main circuit. When the external disturbance is periodic, when t = 100 s, the sinusoidal disturbance with amplitude of 1 and x = 1 is added to the main circuit. The simulation results are shown in Fig. 5. When t = 100 s, the sinusoidal disturbance with an additional amplitude of 1, x = 1 is obtained. The simulation results are shown in Fig. 6. When sinusoidal disturbance occurs, the amplitude of periodic disturbance is 1 and the period is 1 rad/s. The first derivative of external disturbance to time is also a sinusoidal signal of the same period. The first derivative of total disturbance to time will change periodically with time. The simulation results show that the output error of the ADRC based on LESO is a sinusoidal signal of the same period, the amplitude of the output error sinusoidal signal is about 0.0075 when the secondary circuit is loaded with sinusoidal disturbance, and the amplitude of the output error sinusoidal signal is about 0.132 when the main circuit is loaded with sinusoidal disturbance. The timevarying disturbance of the ADRC based on LESO can’t be estimated completely, and the control error changes periodically. When the disturbance contains sinusoidal components, GLESO can effectively reconstruct the system model using the prior information of disturbance. The reconstructed model reflects the information of periodic disturbance. Therefore, when the disturbance enters the steady state, the observer estimation error can converge to 0, and the error of the ADRC drum water level control system [34] based on GLESO can also converge to 0.

4 Conclusions Control effect of drum water level will affect the safe, stable and economic operation of the whole unit [35]. Due to large and time-varying disturbance, ADRC strategy is presented in this paper for drum water level control, realized with traditional ESO and LADRC. The control effect for constant external disturbances is very satisfactory, but the time-varying external disturbances cannot be fully estimated and compensated with some sinusoidal estimation errors and output errors. Furthermore, the ADRC system based on GLESO is studied, and the model of the system is reconstructed by the prior

198

C. Pu et al.

information of disturbance, reflecting the information of periodic disturbance. Results show that the output overshoot is small, the adjustment time is short, the antiinterference ability is strong, and the control precision is high, which is more appropriate for engineering applications. Acknowledgements. This work was partially financially supported by National Natural Science Foundation of China under grants 61533012 and 91748120.

References 1. Chen RM, Zhang X, Zhang WD (2017) Boiler water level estimation method based on adaptive EKF filtering algorithm. Control Eng 24(2):293–296 (in Chinese) 2. Hu CM, Ren J (2014) Study and application of LADRC for drum water-level cascade threeelement control. China Power 47(12):28–31 (in Chinese) 3. Liu XY, Feng LQ (2018) Application of extended Kalman neural network in boiler drum water level control. Mod Electron Technol 41(19):96–99 (in Chinese) 4. Li J, Wang XG (2015) Model reference adaptive inner model-based control in boiled drum water level based on fuzzy-PID control. Therm Power Gener 44(2):96–100 (in Chinese) 5. Rong PX, Gao SY, Wang ZX (2015) The optimization of drum water level control system for industrial boiler. J Harbin Univ Sci Technol 20(6):78–82 (in Chinese) 6. Han JQ (1998) ADRC and its applications. Control Decis 13(1):19–23 (in Chinese) 7. Han JQ (2008) ADRC technique - a control technique that estimates and compensates for uncertainties. National Defense Industry Press, Beijing (in Chinese) 8. Han J (2009) From PID to active disturbance rejection control. IEEE Trans Ind Electron 56 (3):900–906 9. Fu CF (2018) Analysis and design of linear ADRC. PhD thesis, North China Electric Power University. (in Chinese) 10. Xia Y, Liu B, Fu M (2012) Active disturbance rejection control for power plant with a single loop. Asian J Control 14(1):239–250 11. Wang Y, Yao Y, Ma K (2008) A new type extended state observer for system with measurement noise. In: IEEE international conference on automation and logistics, pp 1745– 1749 12. Han JQ (1995) An extended state observer for a class of uncertain objects. Control Decis 10 (1):85–88 (in Chinese) 13. Chen ZK, Wang YT, Zhang RC (2012) An improved mixed gas pipeline multivariable decoupling control method based on ADRC technology. J Comput 7(9):2248–2255 14. Su JB (2015) Robotic un-calibrated visual serving based on ADRC. Control Decis 30(1):1–8 (in Chinese) 15. Su JB, Qiu WB, Ma HY et al (2004) Calibration-free robotic eye-hand coordination based on an auto disturbance-rejection controller. IEEE Trans Robot 20(5):899–907 16. Talole SE, Kolhe JP, Phadke SB (2010) Extended-state- observer-based control of flexiblejoint system with experimental validation. IEEE Trans Ind Electron 57(4):1411–1419 17. Fu YM, Wang YH, Guo F (2018) Design of linear active disturbance rejection controller for drum water level of heat recovery boiler. Therm Power Eng 33(10):83–89 (in Chinese) 18. Jiang JG, Liu YQ, Guo ML (2016) Linear auto disturbance rejection control system for water level in drum. Therm Power Gener 45(7):110–114 (in Chinese) 19. Chen ZQ, Cheng Y, Sun QL (2017) Surveys on theory and engineering applications for linear active disturbance rejection control. Inf Control 46(3):257–266 (in Chinese)

Active Disturbance Rejection Control of Drum Water Level

199

20. Gao ZQ (2013) On the foundation of active disturbance rejection control. Control Theory Appl 30(12):1498–1510 (in Chinese) 21. Li J, Qi XH, Wan H, Xia YQ (2017) Active disturbance rejection control: theoretical results summary and future researches. Control Theory Appl 34(3):1–10 (in Chinese) 22. Mei Y, Huang LP (2009) A second-order auto disturbance rejection controller for matrix converter fed induction motor drive. In: IEEE 6th international power electronics and motion control conference, pp 1964–1967 23. Gao ZQ (2003) Scaling and bandwidth-parameterization based controller tuning. Proc Am Control Conf 6:4989–4996 24. Gao ZQ (2006) Active disturbance rejection control: a paradigm shift in feedback control system design. In: Proceedings of the American control conference, p 2399C2405 25. Zhao S, Gao ZQ (2010) Active disturbance rejection control for non-minimum phase systems. In: Proceedings Chinese control conference, pp 6066–6070 26. Wang L (2015) Observer-based disturbance rejection control methodology and performance evaluation. PhD thesis, Shanghai Jiao Tong University. (in Chinese) 27. Zhou L, Sun X (2011) The study of boiler control system of water level of steam drum based on new immune PID controller. In: 2nd international conference on digital manufacturing & automation, pp 1336–1339 28. Shao D, Xu SC, Du AM (2018) Absolute stability analysis of nonlinear active disturbance rejection control for electromagnetic valve actuator system via linear matrix inequality method. Proc Inst Mech Eng, Part I: J Syst Control Eng 232:1134–1145 29. Miklosovic R, Radke A, Gao ZQ (2006) Discrete implementation and generalization of the extended state observer. In: American control conference, pp 2209–2214 (2006) 30. Tian G, Gao ZQ (2007) Frequency response analysis of active disturbance rejection based control system In: IEEE international conference on control applications, pp 1595–1599 (2007) 31. Xiang GF, Huang Y, Yu JR et al (2018) Intelligence evolution for service robot: an ADRC perspective. Control Theory Technol 16(4):324–335 (in Chinese) 32. Zhang YJ, Zhang J, Wang L et al (2016) Composite disturbance rejection control based on generalized extended state observer. ISA Trans 63:377–386 33. Liu S, Zhao SQ, Wang YC (2016) Smooth sliding mode control and its application in ship boiler drum water level. Math Probl Eng 1–7 34. Sheng L, Zhao SQ, Wang YC (2015) Sliding mode controller with aga for drum water level of ship boiler. In: 34th Chinese control conference (CCC), pp 3116–3120 (2015) 35. Hu LJ, Zhang K, Liu T (2012) Study on the boiler drum water level based on fuzzy adaptive control. In: 24th Chinese Control and Decision Conference (CCDC), pp 1659–1663 (2012)

Improved Cuckoo Search Algorithm Based on Exponential Function Kun Wang(&), Xiaofeng Lian, and Bing Pan College of Computer and Information Engineering, Beijing Technology and Business University, Beijing, China [email protected]

Abstract. The Cuckoo Search Algorithm (CS) is a novel swarm intelligence optimization algorithm inspired by biology. An improved cuckoo algorithm with adaptive adjustment of discovery probability and step size control factor is proposed to solve the problem of slow convergence speed and low calculation accuracy of CS algorithm. The algorithm uses exponential curves to simulate the changing trend of a and Pa , and establishes the dynamic adjustment model of the two parameters mentioned above, so as to effectively improve the global search ability in the initial stage of iteration and accelerate the local search in the later stage of iteration to achieve stable convergence. Finally, the cuckoo algorithm and improved cuckoo algorithm are compared and analyzed under several common benchmark functions. The experimental results show that the cuckoo algorithm of exponential curve adaptive parameter model converges faster and calculates more accurately. Keywords: Cuckoo Search Algorithm  Adaptive adjustment of discovery probability Exponential curve

 Adaptive step control factor 

1 Introduction In recent years, intelligent optimization algorithm has been widely studied in computer, control engineering, electrical power, biological science, artificial intelligence and other fields. It has achieved rapid development. The accuracy, convergence speed, stability and computational complexity of the intelligent optimization algorithm are usually the main factors to consider whether the algorithm can be effectively applied, and these factors are closely related to the parameter setting of the algorithm [1, 2]. Swarm intelligence algorithm discovers and reveals the activity law of biological groups through a large number of observations in the environment, such as foraging, evading pursuit or survival positioning, to inspire people to optimize the solution of practical problems. For example, the commonly used intelligent optimization algorithms: ant

This work was funded by the National Natural Science Foundation of China grant number (61702020), Beijing Natural Science Foundation grant number (4172013) and Beijing Natural Science Foundation-Haidian Primitive Innovation Joint Fund grant number (L182007). © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 200–207, 2020. https://doi.org/10.1007/978-981-32-9050-1_23

Improved Cuckoo Search Algorithm Based on Exponential Function

201

colony algorithm and particle swarm optimization algorithm are inspired by the foraging behavior of ant colony and bird colony. Cuckoo Search Algorithm (CS) is a new biologically inspired swarm intelligence optimization algorithm [3, 4]. The algorithm is inspired by the parasitic behavior of cuckoos. On the basis of long-term study of cuckoo’s living habits, it mainly uses cuckoo’s nesting and spawning behavior and Levy’s flight characteristics. The cuckoo search algorithm has good adaptability, fewer parameters, strong search ability, high randomness, excellent global search and local search ability [6]. The advantages of cuckoo search algorithm obviously bring about extensive research and application. In document [4, 5], Yang and Rajabioun, as the proponents of the algorithm, use cuckoo algorithm to optimize engineering, multi-objective optimization problems are also applied in practical engineering. In document [7], Walton et al. introduced the method of exchanging information into the algorithm, which improved the randomness of the algorithm and the random step size of cuckoo search algorithm, but decreased the global search ability. In document [10], Milan TUBA and others adaptively adjust the discovery probability and step size control factor of cuckoo algorithm. In document [11], Fan et al. added Gauss perturbation to the nest position during the cuckoo algorithm iteration, which significantly improved the convergence speed, but the stability of the algorithm declined in the later period. In document [12, 13], Shih et al. introduced Markov chain into cuckoo algorithm, which significantly improved the global search ability of the algorithm, but Markov chain made the algorithm converge slowly in the later stage and affected the global convergence. In document [14, 15], Jin et al. proposed that cuckoo search algorithm should be re-grouped to achieve pre-set step size, which can significantly improve the search performance, but there is a lot of randomness and increase the computing time.

2 CS Algorithm Random or quasi-random walk strategy is adopted in foraging of animals in nature, which is only related to the current location and transfer probability when looking for the next location. Levy’s flight was named after mathematician Paul Levy, who borrowed the animal foraging process for its realization. The flight mechanism has obvious characteristics, strong randomness, and the step size obeys power law distribution and Markov process. Because Levy’s flight has ideal characteristics, Cuckoo’s global search uses this flight mechanism. Cuckoo flight process is a random process. The current flight trajectory will be different from the previous moment. The direction and step size are random in the flight process. It will not stay in one place all the time during the whole flight process. The implementation of CS algorithm needs to satisfy the following three conditions: Route selection is random, cuckoos will find the best nest to complete parasitism; Bird’s nests can continue to be used and the best hatched ones can be retained; The number of parasitic host nests remains the same during the implementation of the algorithm, and the probability of eggs being found is Pa .

202

K. Wang et al.

Under idealized conditions, the Cuckoo’s position update formula is as follows: xi ðt þ 1Þ ¼ xi ðtÞ þ LðkÞ  a

i ¼ 1; 2;    ; n

ð1Þ

xi ðt þ 1Þ is the position of the i th bird’s nest in the t þ 1 th generation; xi ðtÞ is the position of the i th bird’s nest in the t th generation. a represents the proportional step factor, LðkÞ stands for random search trajectory, and random step obeys the following distribution: levy  u ¼ tk

1\k  3

ð2Þ

t indicates random step size. The above are the specific implementation steps of cuckoo parasitic behavior, Levy flight and cuckoo search algorithm. Next, an improvement based on cuckoo algorithm is proposed to improve the accuracy and convergence speed of the algorithm.

3 Cuckoo Search Algorithm Based on Exponential Function 3.1

Principle of ECS Algorithm

In the CS algorithm, it is found that both the probability and step size control factors are fixed parameters, and the two values can’t be changed during the iteration process, so the selection is passive and mechanical. An adaptive cuckoo algorithm (ECS) based on exponential curve model is proposed according to the change rule of discovery probability and step size control factor in the iteration process. As the relevant parameters in the improved cuckoo search algorithm, the a should be large enough in the initial stage of the algorithm, so as to avoid premature maturity of the algorithm and facilitate the algorithm to find the global optimal solution faster. In order to speed up the convergence speed, the a should be reduced faster, that is accelerated decline; in order to find the local optimal solution and the stability of the algorithm, the a should be reduced slowly later, that is decelerated decline. In order to maintain a strong global search ability initial, The Pa should be relatively small. In order to speed up convergence, The Pa should be increased faster initial, that is accelerated rise. And then, in order to maintain a strong local search ability, The Pa should be relatively large, The Pa should be increased slowly later, that is decelerated rise. The maximum of a is amax , and the minimum of a is amin . As the number of iterations increases, the a can be expressed by the following equation: a ¼ amin þ ðamax  amin Þ expðatÞ

ð3Þ

The t is the number of iterations, when t = 0, a ¼ amax .when t tends to infinity, a ¼ amin . The a can adjust the curvature of the curve, which means adjust the falling speed of the curve. The a can be accelerated and then decelerated in the function

Improved Cuckoo Search Algorithm Based on Exponential Function

203

definition domain, which meets the requirements of the improved cuckoo algorithm for a. The exponential function model can be used to construct the expected a. The maximum of Pa is Pamax , and the minimum of Pa is Pamin . As the number of iterations increases, the a can be expressed by the following equation: Pa ¼ Pamax  ðPamax  Pamin Þ expðatÞ

ð4Þ

The t is the number of iterations, when t = 0, Pa ¼ Pa min .when t tends to infinity, Pa ¼ Pa max . The a can adjust the curvature of the curve, which means adjust the falling speed of the curve. The Pa can be accelerated and then decelerated in the function definition domain, which meets the requirements of the improved cuckoo algorithm for Pa . The exponential function model can be used to construct the expected Pa . 3.2

Implementation of ECS Algorithm

The steps of ECS algorithm implementation are as follows: Step1. The parameters of the algorithm are set as follows: maximum and minimum of step size control factor, maximum and minimum of probability, upper and lower bounds of independent variables and iteration times of the algorithm. Step2. The random initial population is generated, and the objective function value of each nest is calculated, leaving the current optimal value. Step3. If the result satisfies the end condition, the output result is the optimal position and corresponding optimal value. If the end condition is not met, step 4 is executed. Step4. Formula 4 and 5 are used to calculate the values after each iteration. Other nests are updated according to Formula 1. Step5. Increase the number of iterations one time, and go to step 2.

4 Experimental Simulation and Analysis Through simulation experiments, the performance of cuckoo search algorithm (ECS) and traditional cuckoo algorithm are tested and compared. This paper chooses six standard functions to the test, including Sphere, Griewank, Rastrigin, Ackley, Rosenbrock and Schaffer. The parameter settings of each benchmark function are shown in Table 1. It is known from reference that the algorithm can approach the optimal solution faster when it is equal to 1 and faster when it is equal to 0.75. Therefore, in the experiment, the range of values is [0, 1], and the range of values is [0.1, 0.75]. Cuckoo algorithm and improved cuckoo algorithm (ECS) were tested 30 times independently. The number of nests was 20 and the number of iterations was 1000.

204

K. Wang et al.

Fig. 1. The convergence curve of Sphere

Fig. 2. The convergence curve of Griewank

Fig. 3. The convergence curve of Rastrigin

Fig. 4. The convergence curve of Ackley

Improved Cuckoo Search Algorithm Based on Exponential Function

Fig. 5. The convergence curve of Rosenbrock

Fig. 6. The convergence curve of Schaffer

Table 1. Dataset used in the experiment. Data set name Formula P Sphere f ðxÞ ¼ di¼1 x2i   Pd 2 Qd xiffi Griewank 1 p þ1 f ðxÞ ¼ 4000 i¼1 xi  i¼1 cos i  Pd  2 Rastrigin f ðxÞ ¼ 10  ðdÞ þ i¼1 xi  10 cosð2pxi Þ " rffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi# Ackley 1 Xd 2 x f ðxÞ ¼ 20 exp 0:2 i¼1 i d  X  1 d cosð2px Þ þ 20 þ e  exp i i¼1 d h i P 2 Rosenbrock 2 2 f ðxÞ ¼ d1 i¼1 ð1  xi Þ þ 100ðxi þ 1  xi Þ P  d Schaffer 2 sin2 i¼1 xi  0:5 f ðxÞ ¼ 0:5 þ  P 2 d 2 1 þ 0:001 i¼1 xi   þ jxn  1j 1 þ sin2 ð3pxn Þ

Dimension Range 20 [− 100, 100] 20

[− 600, 600]

20

[− 5.12, 5.12]

20

[− 32, 32]

20

[− 100, 100]

20

[− 500, 500]

205

206

K. Wang et al. Table 2. Comparison table of optimal values of each algorithm Data set name Sphere Griewank Rastrigin Ackley Rosenbrock Schaffer

CS 0.00008358 0.00624210 68.1289711 0.01238645 0.01831563 0.00004539

ECS 0.00001807 0.01246222 19.7324126 0.00022785 0.00712321 0.00001376

The comparison of two kinds of algorithms under Table 2 Sphere function shows that the optimal value of ECS algorithm under single-peak separable function is better than that of CS algorithm, and ECS algorithm is close to the theoretical optimum. From Fig. 1, we can see that the convergence speed of ECS algorithm is faster than that of CS under single-peak separable function, and at the same time it tends to be more stable. Griewank and Rastrigin functions are complex, multi-peak and separable highdimensional functions. The comparison between the two kinds of algorithms shows that under Griewank and Rastrigin functions the optimum value of ECS algorithm is better than CS algorithm under Table 2 From Figs. 2 and 3, we can see that the convergence speed of ECS algorithm is faster than CS under multi-peak separable function, and it tends to be more stable at the same time. Ackley and Rosenbrock are high-dimensional functions with complex multimodal indivisibility. Comparing the two algorithms in Table 2, Ackley and Rosenbrock, we can see that the optimal value of ECS algorithm under multimodal indivisible function is better than that of CS algorithm. From Figs. 4 and 5, we can see that the convergence speed of ECS algorithm under multimodal indivisible function is faster than that of CS, and at the same time it tends to be more stable. There are many local optimum values in the search domain. The comparison of two kinds of algorithms under Schaffer function, the optimal value of ECS algorithm is better than CS algorithm under this condition in Table 2. From Fig. 6, it can be seen that the convergence speed of ECS algorithm is faster than that of CS algorithm in multi-peak and non-separable low-dimensional.

5 Conclusion Based on the traditional cuckoo algorithm, an adaptive cuckoo algorithm based on exponential curve model is proposed in this paper. By using exponential function model to dynamically adjust step size control factor and discovery probability, the dependence of cuckoo algorithm on relevant parameters is well controlled. The adaptive cuckoo algorithm in this paper can adjust the step size control factor and discovery probability adaptively. Experiments using typical test functions show that the proposed ECS algorithm has higher accuracy and faster convergence speed than the traditional cuckoo algorithm. According to this paper and references, it can be observed that cuckoo algorithm and its improved algorithm are applied in many fields, and the research prospects are very broad. Next step, we can conduct in-depth research on

Improved Cuckoo Search Algorithm Based on Exponential Function

207

algorithm fusion, promote the development and application of this algorithm, and further study on the application of CS algorithm in the future.

References 1. Srivastava PR, Khandelwal R, Khandelwal S et al (2012) Automated test data generation using cuckoo search and tabu search algorithm. Journal of Intelligent Systems 21(2):195– 224 2. Chen T (2009) A simulative bionic intelligent optimization algorithm: artificial searching swarm algorithm and its performance analysis. In: The second international joint conference on computational science and optimization, pp 864–866 3. Yang XS, Deb S (2013) Multiobjective cuckoo search for design optimization. Comput Oper Res 40(6):1616–1624 4. Yang XS, Deb S (2010) Engineering optimization by cuckoo search. Int J Math Model Num Optim 4:330–343 5. Yang XS, Deb S (2009) Cuckoo search via Levy flights. In: Proceedings of world congress on nature & biologically inspired computing. IEEE Publications, pp 210–214 6. Brownlee J (2011) Clever algorithms: nature-inspired programming recipes. http://lulu.com 7. Walton S, Hassan O, Morgan K et al (2011) Modified cuckoo search: a new gradient free optimisation algorithm. Chaos Solitons Fractals 44(9):710–718 8. Rajabioun R (2011) Cuckoo optimization algorithm. Appl Soft Comput 11:5508–5518 9. Valian E (2011) Improved cuckoo search algorithm for global optimization. Int J Commun Inf Technol 1(1):31–44 10. Tuba M, Subotic M, Stanarevic N (2011) Modified cuckoo search algorithm for unconstrained optimization problems. In: European conference on European computing conference. world scientific and engineering academy and society (WSEAS), pp 263–268 11. Fan W, Xingshi H, Yan W (2011) Cuckoo search algorithm based on Gauss perturbation. J Xi’an Univ Eng 25(4):566–569 12. Wen S, Wei H, Ruiwen D (2017) Cuckoo algorithm for job shop scheduling problem under simulated annealing. Comput Eng Appl 53(17):249–253 13. Fan W, Xingshi H, Yan W (2012) Markov model and convergence analysis based on CS algorithms. Comput Eng 38(11):180–182 14. Li X, Yin M (2016) A particle swarm inspired cuckoo search algorithm for real parameter optimization. Soft Comput 20(4):1389–1413 15. Liu X, Fu M (2015) Cuckoo search algorithm based on frog leaping local search and chaos theory. Appl Math Comput 266(C):1083–1092

Autonomous Intelligent Control for Path Following of Unmanned Surface Vessels with Input Constraints Yalei Yu1, Chen Guo2(&), and Haomiao Yu2 1

The School of Navigation, Dalian Maritime University, Dalian 116026, China [email protected] 2 The School of Marine Electrical Engineering, Dalian Maritime University, Dalian 116026, China [email protected], [email protected]

Abstract. External disturbances and input saturation are considered in this work, presenting a velocity-varying line-of-sight and finite-time disturbance observers based backstepping (VLFDOB) control scheme to realize unmanned surface vessels’ (USVs) path following control. We explore this scheme of combining velocity-varying line-of-sight (VLOS) guidance laws and finite-time disturbance observers with designing auxiliary dynamic systems in order to produce guidance heading angle and cope with disturbances acting on USVs as well as anti-windup simultaneously. The performance of stability of this scheme is shown with effective and accurate performance through Lyapunov stability theories. Simulating results demonstrate that the proposed scheme enables USVs’ system to reach desired path following objectives. Keywords: Path following

 Observers  Input saturation  Line-of-sight

1 Introduction The problem of path following with a predefined parametric path for unmanned surface vessels (USVs) is one of the most crucial issues in the development of the autonomous shipping industry [1]. For this topic, which has attracted an enormous amount of attention over the last decades, and generally, the main problems appearing in this topic that need to be addressed necessarily are the design of guidance scheme in kinematics levels and the construction of controllers in kinetics levels [2, 3]. The well-known guidance schemes that have been investigated in the areas of vessels’ motion control are line-of-sight (LOS) and its various improved forms [1, 4, 5]. Other problems associated with reaching control objectives of path following of USVs are that how to cope with external disturbances and how to compensate for input constraints due to the limitation of mechanical properties. The former problem could be solved by introducing adaptive control, and there are many achievements achieved by this way [6, 7]. How to build effective auxiliary systems is considered normally through two ways that are developing auxiliary systems acting on control inputs directly and acting on system

© Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 208–215, 2020. https://doi.org/10.1007/978-981-32-9050-1_24

Autonomous Intelligent Control for Path Following of Unmanned Surface Vessels

209

states to ensure that the control inputs satisfy the limitation of practical mechanical systems respectively [3, 8]. Inspired by the above statements, depending on previous works [6, 7], finite-time disturbance observers that are used to cope with external disturbances and auxiliary dynamics that are introduced to compensate for USVs’ system input constraints are considered simultaneously in this paper.

2 Problem Formulation The mathematical model of a USV when it is moving on a horizontal plane, is described as follows [1] (

M v_ ¼  CðvÞv  DðvÞv þ s þ dd g_ ¼J ðwÞv

ð1Þ

where g ¼ ½ x y w T denotes the position ðx; yÞ and the attitude w of USVs in the earth-fixed frame. The velocity vector v ¼ ½ u v r T describes the surge velocity u, the sway velocity v and the yaw rate r in the body-fixed frame of USVs. The control inputs s ¼ ½ su 0 sr T contain the surge force su and the yaw moment sr . ½ dd;u dd;v dd;r T is on component form of dd and represents the external disturbances caused by waves, wind and ocean currents. The system inertia matrix M, Coriolis-centripetal C, damping matrix D and rotation matrix J are given by literature [1, 9]. For the convenience of designing finite-time disturbances observers and stability analysis, the dynamic model of this USV can be rewritten as follows (

g_ ¼ J ðwÞv v_ ¼ gðvÞ þ s0 þ d0 d

ð2Þ

where gðvÞ ¼ M 1 ðC þ DÞ, s0 ¼ M 1 s and d0 d ¼ M 1 dd . In this paper, control laws s are constrained by the saturation values smax ¼ ½ sumax 0 srmax T . Therefore, the control inputs s can be expressed as follows 8 si0 [ simax > < simax ; si ¼ satðsi0 Þ ¼ si0 ;  simax  si0  simax > :  simax ; si0 \  simax Control objective:

  sup x  xp   ex ,

t2½t0 ;1

  sup y  yp   ey and

t2½t0 ;1

ð3Þ

sup ku  ud k

t2½t0 ;1

 eu , where ex , ey and eu are small positive constants, and ud is the desired surge velocity designed later.

210

Y. Yu et al.

3 Preliminaries Lemma 1 [10]. The following system r_ 0 ¼ k0 L1=n þ 1 jr0 jn=ðn þ 1Þ signðr0 Þ þ r1 .. .

r_ n1 ¼ kn1 L1=2 jrn1  r_ n2 j1=2 signðrn1  r_ n2 Þ þ rn r_ 0 2 kn Lsignðrn  r_ n1 Þ þ ½L; L

ð4Þ

where L [ 0 and ki ði ¼ 0; 1; . . .; nÞ are appropriate constants, is finite-time stability.

4 Velocity-Varying LOS Guidance Law 4.1

Guidance Subsystem

The velocity-varying LOS (VLOS) guidance law is presented to help USVs reach desired heading   angles which make it possible for USVs to follow a reference path xp ðhÞ; yp ðhÞ . It is clear that for any point of USVs at this path, the position errors xe ¼ x  xp and ye ¼ y  yp can be shown in the path-tangential reference frame as follows 

xe ye



  cos cp   ¼ sin cp 

  T    sin cp x  xp   y  yp cos cp

ð5Þ

  where cp ¼ atan2 y0p ðhÞ; x0p ðhÞ :¼ ½p; p. By differentiating xe and ye with respect to time, we have (

  x_ e ¼U cos w  cp þ b þ ye c_ p  utot   y_ e ¼U sin w  cp þ b  xe c_ p

ð6Þ

pffiffiffiffiffiffiffiffiffiffiffiffiffiffi u2 þ v2 and 0\Umin  U  Umax . The term b :¼ atan2ðv; uÞ repqffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi resents sideslip angles of USVs and utot : ¼ h_ y0p2 ðhÞ þ x0P2 ðhÞ.

where U ðu; vÞ :¼

4.2

Velocity-Varying LOS Design

The time-varying surge velocity guidance law is developed as ud ¼ k k [ 0 and ju0 j denotes the minimum velocity of USVs.

pffiffiffiffiffiffiffiffiffiffiffiffiffiffi u20 þ y2e where

Remark 1. It is reasonable to understand that the maximum velocity of USVs should be bounded, satisfying its practically mechanical performance, i.e., 0\ku0  ud  umax \1. The surge velocity can be expressed as follows

Autonomous Intelligent Control for Path Following of Unmanned Surface Vessels

8 ud [ umax > < umax ; ud ¼ satðud Þ ¼ ud ; ku0 \ud \umax > : ku0 ; ud \ku0

211

ð7Þ

The velocity-varying LOS (VLOS) guidance heading angle is designed as follows 0

1

Dye B C wd ¼ cp ðhÞ þ arcsin@qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiA  b 2 1 þ ðDye Þ

ð8Þ

Remark 2. The desired heading angle wd can be precisely tracked by the actual heading angle w, i.e., satisfying w ¼ wd . According to the Eq. (6), virtual control law is designed as follows   utot ¼ k1 xe þ U cos w  cp þ b

ð9Þ

where k1 is a positive design constant.

5 Finite-Time Disturbance Observers Design Lemma 2. Consider a USV is described by (2), a finite-time disturbance observers designed as follows

ð10Þ

0 0 where Ld ¼ diagðlu ; lv ; lr Þ, ðkd0 ; kd1 Þ 2 R2þ , and b d d is the estimation of dd , which can 0 0 0 d d  dd , identify the external disturbances dd exactly within finite-time, i.e., bv  v and b 8t [ Td . 0 0 0 d d  dd . Differentiating these Proof. Define the following errors ev ¼ bv  v and e dd ¼ b errors with respect to time along (2) and (10) yields

ð11Þ 0 Using Lemma 1, errors ev and e d d can converge to zero in finite time by designed finitetime disturbance observers, i.e., there exists a finite setting time Td so that ev ðtÞ  0 and 0 e d ðtÞ  0, 8t  Td . This concludes the proof.

212

Y. Yu et al.

6 Control Laws Design Define error variables we :¼ w  wd , re :¼ r  rd and ue :¼ u  ud where rd ¼ k2 we þ w_ d , and kw 2 R þ . Considering the constraint of actuators of USVs, nominal control laws are built as follow 8   > < su0 ¼  ku ue þ gu ðvÞ  u_ d þ ^d0du  ku0 vu   ð12Þ > : sr0 ¼  kr re þ we þ gr ðvÞ  r_ d þ ^ d0dr  kr0 vr where ðku ; kr ; ku0 ; kr0 Þ 2 R4þ . For the convenience of analyzing constraint effect caused by actuators’ input saturation, designing auxiliary system is given as follow 8 jue Dsu j þ 0:5q2u Ds2u > > > hðvu Þ þ qu Dsu < v_ u ¼  kvu vu  vu ð13Þ 2 2 > > > v_ r ¼  kvr vr  jre Dsr j þ 0:5qr Dsr hðvr Þ þ qr Dsr : vr   where kvu ; kvr ; qu ; qr 2 R4þ , Dsi ¼ si  si0 and 8  v 0; v j j > i a > >

2 < p p vi  v2a sin 1  cos ; va \jvi j\vb , satisfying vb [ va [ 0. > 2 2 v2b  v2a > > : 1; jvi j  vb

hðvi Þ ¼

7 Stability Analysis Theorem 2. The uniformly ultimately bounded stable of USVs’ system is guaranteed by combining with VLOS guidance laws (7)–(9), control laws (14), and auxiliary dynamic systems (15), as well as disturbance observers (12). Proof. Choose the complete LFC V ¼ 12 x2e þ 12 y2e þ 12 w2e þ 12 u2e þ 12 re2 þ 12 v2u þ 12 v2r Differentiating V along (6)–(9) and (12)–(13) with respect to time for all t [ Td yields



 1 2 2  2 2 _V ¼  k1 x2e  ky y2e  k2 w2e  ku  1 ku0 ue  kr  kr0 re  kvu  1 v2u 2 2   1 1 ð14Þ  kvr  1 v2r  q2u Ds2u ðhðvu Þ  1Þ  q2r Ds2r ðhðvr Þ  1Þ 2 2  jue Dsu j½hðvu Þ  sgnðue Dsu Þ  jre Dsr j½hðvr Þ  sgnðre Dsr Þ DU ffi \1. where 0\ky :¼ pffiffiffiffiffiffiffiffiffiffiffiffiffiffi 2 1 þ ðDye Þ

Autonomous Intelligent Control for Path Following of Unmanned Surface Vessels

213

For hðvu Þ ¼ 1 and hðvr Þ ¼ 1, the above Eq. (14) can be simplified as



1 2 1 2 2 V_ ¼  k1 x2e  ky y2e  k2 w2e  ku  ku0 u2e  kr  kr0 re 2 2      kvu  1 v2u  kvr  1 v2r   2H1 V

ð15Þ



2 2 where H1 ¼ min k1 ; ky ; k2 ; ku  12 ku0 ; kr  12 kr0 ; kvu  1; kvr  1 . Otherwise, for hðvu Þ\1 and hðvr Þ\1, using Young’s inequality again, inequalities ue Dsu  12 u2e þ 12 Ds2u and re Dsr  12 re2 þ 12 Ds2r could be resulted, and bring these inequalities into (14) yields



1 2 1 2 1 2 2 _V ¼  k1 x2e  ky y2e  k2 w2e  ku  1 ku0  ue  kr  kr0  re 2 2 2 2      2   2 1 2 1  kvu  1 vu  kvr  1 vr þ Dsu 1 þ q2u þ Ds2r 1 þ q2r 2 2   2H2 V þ 1

2 2 where H2 ¼ min k1 ; ky ; k2 ; ku  12 ku0  12 ; kr  12 kr0  12 ; kvu  1; kvr  1     1 ¼12 Ds2u 1 þ q2u þ 12 Ds2r 1 þ q2r . Taking (15) and (16) together, the following results are obtained as follows V_   2HV þ 1

ð16Þ

and

ð17Þ

2 2 where H ¼ minfH1 ; H2 g, satisfying ku  12 ku0  12, kr  12 kr0  12, kvu [ 1 and kvr [ 1. Thus, according to mathematical calculation, further results from (17) can be produced as follows

 1  2Hðtt0 Þ 1 V ðtÞ  V ðt0 Þ  þ e 2H 2H

ð18Þ

Therefore, it is reasonable to conclude that all error signals in this USV system are uniformly ultimately bounded stable throughout the whole period of path following. This completes proof.

8 Simulation Studies and Results To demonstrate performance and effectiveness of the designed VLFDOB scheme, simulation studies are conducted using a USV whose model is given by (2) and its parameters are stated in reference [9]. The input saturation constraint is set as s ¼ ½ 3N 0 3Nm T . The design parameters are chosen as k1 ¼ 1, k2 ¼ 15, k ¼ 0:5, u0 ¼ 0:2, umax ¼ 0:3, D ¼ 0:5, ku ¼ 18, kr ¼ 17, va ¼ 0:1, vb ¼ 1, kvu ¼ 15, kvr ¼ 15, qu ¼ 0:5, qr ¼ 5, ku0 ¼ 5, kr0 ¼ 5, kd0 ¼ 0:1, kd1 ¼ 0:02 and Ld ¼ diagð200; 200; 200Þ. Initial conditions

214

Y. Yu et al.

of this USV are set as ½ xð0Þ yð0Þ wð0Þ T ¼ ½ 0 20 p=3 T and ½ uð0Þ vð0Þ r ð0ÞT ¼½ 0 0 0 T . The desired path is defined as xp ðhÞ ¼ h and yp ðhÞ ¼ 100 sinð0:05hÞ. In order to analyze the performance of finite-time disturbance observers, external disturbances are set as dd ¼ ½ 2 sin ð0:05p tÞ 0:1 sin ð0:01p tÞ 2 cos ð0:03p tÞ T . The comparison simulation between VLFDOB without considering input saturation that is marked as Without Sat and VLFDOB with considering input saturation that is marked as With Sat. The results are plotted in Fig. 1a–d, which illustrate effective performance of this scheme. From Fig. 1a, the similarly accurate tracking performance

a

b

c

d

Fig. 1. Simulation results. a. The path following performance. b. Position errors xe and ye , and the heading angle error we . c. The estimation of external disturbances dd;u and dd;r . d. The control laws su and sr .

Autonomous Intelligent Control for Path Following of Unmanned Surface Vessels

215

is seen in both these situations, although the latter is exposed to a small range of control inputs. In Fig. 1b and c, it is clear that position errors and the heading angle error converge to a significantly small range around zero, meanwhile external disturbances can be estimated precisely. The last sub-figure, Fig. 1d, shows the obvious comparison between these two simulation results for USVs’ path following.

9 Conclusion A novel VLFDOB control scheme is proposed in this paper to complete path following for USVs in the presence of external disturbances and input constraints, and the stability of USVs’ system and tracking performance are demonstrated by Lyapunov’s theories and ensured by conducting digital simulation respectively. Acknowledgement. This work was supported by the National Natural Science Foundation of China under Grant 51879027, 51579024, 6137114 and 51809028, and in party by the Fundamental Research Funds for the Central Universities under Grant 3132019109.

References 1. Fossen TI (2011) Handbook of marine craft hydrodynamics and motion control. Wiley, Trondheim 2. Skjetne R, Fossen TI, Kokotović PV (2004) Robust output maneuvering for a class of nonlinear systems. Automatica 40(3):373–383 3. Yu Y, Guo C, Yu H (2018) Finite-time predictor line-of-sight–based adaptive neural network path following for unmanned surface vessels with unknown dynamics and input saturation. Int J Adv Robot Syst 15(6):1729881418814699 4. Wang N, Sun Z, Zheng Z, Zhao H (2018) Finite-time sideslip observer-based adaptive fuzzy path-following control of underactuated marine vehicles with time-varying large sideslip. Int J Fuzzy Syst 20(6):1767–1778 5. Lekkas AM, Fossen TI (2014) Integral LOS path following for curved paths based on a monotone cubic Hermite spline parametrization. IEEE Trans Control Syst Technol 22 (6):2287–2301 6. Yu Y, Guo C, Shen H, Zhang C (2018) Integral sliding mode adaptive path-following of unmanned surface vessels with uncertain parameters and time-varying disturbances. In: 2018 37th Chinese control conference (CCC), pp 3051–3056. IEEE 7. Yu Y, Guo C, Shen H, Zhang C (2018) Sliding-mode dynamic surface adaptive path following of unmanned vessels with dynamic uncertainties and disturbances. In: 2018 13th world congress on intelligent control and automation (WCICA), pp 939–944. IEEE 8. Zhu G, Du J, Kao Y (2018) Command filtered robust adaptive NN control for a class of uncertain strict-feedback nonlinear systems under input saturation. J Frankl Inst 355 (15):7548–7569 9. Do KD, Pan J (2006) Underactuated ships follow smooth paths with integral actions and without velocity measurements for feedback: theory and experiments. IEEE Trans Control Syst Technol 14(2):308–322 10. Shtessel YB, Shkolnikov IA, Levant A (2007) Smooth second-order sliding modes: missile guidance application. Automatica 43(8):1470–1476

Investigation on Energy Feedback Potentiality of New Hydraulic Interconnected Energy-Regenerative Suspension Zeyu Sun(&), Ruochen Wang , Xiangpeng Meng and Qiuiming Jiang

,

School of Automotive and Traffic Engineering, Jiangsu University, Zhenjiang 212013, China [email protected]

Abstract. To solve the problem of large energy consumption and energy waste in hydraulic interconnected suspension vibration, a hydraulic interconnected energy feedback suspension system is proposed to recover and reuse the energy, and the energy feedback potentiality of the hydraulic interconnected energyregenerative suspension is studied. The model of hydraulic interconnected energy feedback suspensions system is built by design of the constant current feedback circuit, and then, the energy feedback potentiality of this system is investigated by considering different pavement levels. Under the conditions of the B level and C level pavement input excitation, the energy consumption is simulated and analyzed. The bench test is also carried out under B and C pavement levels. By comparing the experimental and the simulated results, It shows that the hydraulic interconnected power feedback suspension has good energy feedback foreground, which provides ideas for new type suspension design and energy recovery and utilization in vibration system. Keywords: Hydraulic interconnected suspension  Energy recovery Constant current circuit  Feedback prospects  Suspension



1 Introduction Traditional hydraulic interconnected suspensions are widely used in construction machinery and special machinery due to its high handling stability and side rollover resistant capability. However, in practical engineering applications, the working conditions of engineering vehicles are relatively complex, and the corresponding interconnected suspension generates much more energy in the process of damping vibration from road. It becomes more and more significant that how to reduce the energy consumption of the suspension and further recover the vibration energy of the suspension [1]. Nowadays, Hawley [2] first proposed the interconnected suspension system, and explained the various interconnection methods between the suspensions, and determined that the interconnected suspension has the characteristics of preventing the pitch and roll of the vehicle based on different interconnected structures. Lam et al. [3] © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 216–225, 2020. https://doi.org/10.1007/978-981-32-9050-1_25

Investigation on Energy Feedback

217

described the effects of different control algorithms on the performance of hydraulic interconnect suspensions. Cao [4] studied the potential performance benefits of fluidically coupled passive suspensions were verified by analyzing suspension properties. Guo [5] made a detailed study on the dynamic performance characteristics and mechanism of action of interconnected suspension, and proposed the principle of support constraint minimization. The side rollover resistant capability of the vehicle is improved by the reverse interconnection between hydraulic cylinders. In the above research, whether it is the study of the interconnected suspension structure or the control method, only the impact on the dynamic performance of the suspension is analyzed, and the research on the energy recovery of the hydraulic interconnected suspension is neglected. On suspension energy consumption, Yu [6] analyzed the influence mechanism of driving speed, vehicle quality and road roughness on the energy consumption of traditional suspension, and determined the feasibility of suspension feeding energy. However, the related research mainly focused on traditional suspension, and the energy consumption mechanism of interconnected suspension system has not been analyzed. Kawamoto et al. [7] proposed a hybrid suspension system and added a motor-type energy regeneration damper on the basis of a passive suspension to recycle vibration energy. Asadi [8] used linear DC motor as the energy feeding unit to design the test prototype of the electromagnetic energy feeding suspension, and optimized its structure. In summary, this paper introduces a feed energy unit to the proposed new hydraulic interconnected energy-feedback suspension based on the traditional hydraulic interconnected suspension structure, Based on this, the energy consumption model of the hydraulic interconnected energy-suspension suspension is constructed. The feasibility analysis of the new hydraulic interconnected energy-regenerative suspension is carried out. The potential of the new hydraulic interconnected energy-suspension suspension under different working conditions is studied, and the model validity is verified by carrying out the bench experiment.

2 Energy Consumption Model of the New Suspension 2.1

Energy Consumption Basic Model of the New Suspension

According to the previous researches, the road roughness has the most obvious effect on the suspension energy consumption, and the analysis of the energy loss power of the suspension is simplified based on 1/4 vehicle model. Figure 1(a) shows the 1/4 vehicle model, and the cylinder damping coefficient ceq is the equivalent damping, in addition to the hydraulic cylinder’s own damping, which includes the damping of the rectifier bridge, hydraulic motor, hydraulic piping, reservoir and other hydraulic components such as energy absorbers.

218

Z. Sun et al.

(a) Model with hydraulic cylinder

(b) Model with a traditional passive damper

Fig. 1. 1/4 vehicle model

Ignoring the tire’s damping coefficient, the following suspension system motion equation can be obtained: m1€x1 þ ceq ð_x1  x_ 2 Þ þ k1 ðx1  x2 Þ ¼ 0

ð1Þ

m2€x2 þ ceq ð_x1  x_ 2 Þ  k1 ðx1  x2 Þ þ k1 ðx2  x3 Þ ¼ 0

ð2Þ

Where m1 and m2 are 1/4 body mass (kg) and the unsprung mass (kg), ceq is an equivalent damping coefficient of a hydraulic cylinder (N ∙ s/m), kt is the tire stiffness (N/m) and k1 is the suspension spring stiffness (N/m). 2.2

Evaluation Index

According to the energy consumption basic model of 1/4 vehicle hydraulic interconnected energy-regenerative suspension, the equivalent damping ceq consumes the most significant vibrational energy, and is mostly dissipated in the form of hydraulic cylinder internal friction and piston friction. Therefore, the energy consumption of springs and tires is ignored in this paper. According to theoretical mechanics, the instantaneous power dissipated inside the hydraulic cylinder is the product of the damping force F(t) and the relative moving speed x_ 2 ðt)  x_ 1 ðt), and the hydraulic cylinder instantaneous power is expressed as: PðtÞ ¼ FðtÞ½x_ 2 ðtÞ  x_ 1 ðtÞ ¼ ceq ½x_ 2 ðtÞ  x_ 1 ðtÞ2

ð3Þ

The vibrational energy dissipated by the hydraulic cylinder over a period of time can integrate the instantaneous dissipated power of the hydraulic cylinder. The Eq. (4) can be obtained by: Z E0t ¼ 0

t

Z PðtÞdt ¼ 0

t

ceq ½x_ 1 ðtÞ  x_ 2 ðtÞ2 dt

ð4Þ

Investigation on Energy Feedback

219

3 Simulation Analysis of the Suspension Energy Consumption 3.1

Dynamic Analysis of the Hydraulic Interconnected Energy-Regenerative Suspension

In this paper, related vehicle parameters are selected as shown in Table 1, according to vehicle parameters in combination with Eq. (4) to establish the Simulink simulation model of 1/4 vehicle hydraulic interconnected energy-regenerative suspension as shown in Fig. 2, and the road surface ratings are selected respectively. The relevant simulation analysis was carried out through selecting four road grads of A, B, C and D, and different driving speed of 10 m/s, 20 m/s, 30 m/s and 40 m/s. The relationships of the energy consumption of suspension, vehicle speed and the grade of road surface are studied to determine the specific energy consumption of the hydraulic interconnected energy-regenerative suspension. This will lay the foundation for the analysis of the energy characteristics of the suspension. Through the simulation analysis, in the case of B-level road and the speed of 20 m/s, performance indicators of the suspension can be also obtained, shown in Figs. 3 and 4, which is Body acceleration and Suspension working space. Table 1. Vehicle parameters Parameter Sprung mass Unsprung mass Spring stiffness Equivalent damping coefficient Tire stiffness The speed of the car

Mark m1 m2 k1 ceq kt u

Value 345 40.5 17 2 192 20

Unit kg kg kN/m kN ∙ s/m kN/m m/s

Fig. 2. Energy consumption model of 1/4 vehicle suspension

220

Z. Sun et al.

Fig. 3. Body acceleration

Fig. 4. Suspension working space

Figure 2 shows that the energy dissipation power of suspension has a linear relationship with the driving speed, and the energy dissipation power becomes significantly larger as the road surface roughness increases, when vehicle speed is set to 20 m/s, the average power dissipation of single-side suspension reaches 84–338 watts when driving on B-grade road (better road surface) and C-grade road (general road surface), with a good prospect of energy feedback. And in the process of vehicle driving, the dissipation of suspension vibration energy is also increasing when road unevenness increasing and driving speed becoming faster. Therefore, it is more meaningful for the hydraulic interconnection reclaiming energy suspension to be used in off-road vehicle, engineering vehicles and other vehicles. As is shown in Figs. 3 and 4, compared with the traditional passive interconnection suspension, the performance index of the hydraulic interconnection reclaiming energy suspension does not change much, and the system has a good feasibility. 3.2

Research on Vibration Energy Feedback Potential of Suspension

Compared with the traditional hydraulic passive interconnection suspension, the hydraulic interconnected reclaiming energy suspension can recover some of the vibration dissipation energy of the suspension in addition to ensuring the dynamic performance of the vehicle. In this section, we will study and analyze the vibration energy of the suspension that can be recovered by the hydraulic interconnection reclaiming energy suspension when speed is set to 20 m/s or 40 m/s under the random road of class B and C, in the hydraulic interconnection reclaiming energy suspension combined simulation model, the reclaiming energy power at both ends of the reclaiming energy circuit is regarded as the energy of the final recovery of suspension. The energy consumption of suspension and the reclaiming energy power are shown in Fig. 5.

Investigation on Energy Feedback

(a) Grade B road 20m/s

(b) Grade C road 20m/s

(c) Grade B road 40m/s

(d) Grade C road 40m/s

221

Fig. 5. Comparison of energy consumption and recovery of suspension

Figure 5 shows time-domain simulation comparison during driving of the vehicle, as shown in the graph, the energy feedback power is about 35% of the energy dissipation energy of the single-side suspension both in class B and C grade pavement, indicating that the hydraulic interconnection reclaiming energy suspension has a good prospect of energy recovery. According to the root mean square statistics of the reclaiming energy power, the comparison bar chart was obtained, as shown in Fig. 6.

222

Z. Sun et al.

(a) Grade B road

(b) Grade C road

Fig. 6. Comparison of energy consumption and energy consumption of suspension

4 Research and Analysis on Energy Consumption Experiment of Suspension The experiment was carried out on the MTS320 four-channel wheel coupling road simulator, loading the gravel pavement spectrum of a test field, then a random excitation simulation test will be performed on the test sample vehicle equipped with the hydraulic interconnection reclaiming energy suspension. According to ISO/DIS 8608, taking the road grade for class B and class C, and the driving speed for 20 m/s and 40 m/s, the random road surface spectrum produced by the design is input to the MTS test stand for random input test. When the driving speed is 20 m/s, the time domain response of the system under class B pavement is shown in Fig. 7.

(a) Acceleration time domain of side slope

(b) Vertical acceleration of vehicle body

Fig. 7. Time domain comparison of test results of suspension system

Investigation on Energy Feedback

223

Table 2. RMS value of suspension system

0.7031

Hydraulic interconnected suspension without the circuit 0.9014

Hydraulic interconnection reclaiming energy suspension 0.7504

0.8757

1.0426

0.9386

Hydraulic passive interconnected suspension Lateral inclination acceleration of grade B road Vehicle body acceleration of grade B road

As is shown in Fig. 7 and Table 2, compared with the hydraulic interconnected suspension without the circuit, vehicle body acceleration RMS was reduced by 9.98% and lateral inclination acceleration RMS was reduced by 16.75%, and compared with the traditional passive hydraulic interconnected suspension, vehicle body performance is close, so that the safety driving and riding comfort of the vehicle cannot be affected too much, and the test result is close to the simulation result. The hydraulic interconnection reclaiming energy suspension under the influence of the constant current control circuit is compared with the passive hydraulic interconnected suspension, its dynamic performance has a slight decline, but the recovery of body vibration energy dissipation is considerable. Figure 8 show the suspension reclaiming energy power under different road grades when the speed are 20 m/s and 40 m/s. According to the Fig. 8, when the speed is 20 m/s, the maximum instantaneous reclaiming energy power of class B and class C are 180 W and 320 W respectively, and when the speed is 40 m/s, the maximum instantaneous reclaiming energy power of class B and class C are 536 W and 1342 W respectively, the maximum average power is 153 W, the energy-feed of suspension is considerable. In addition, under the condition of constant speed, with the increase of road grade, namely the increase of road surface roughness, the reclaiming energy power increases significantly, and this suspension has better energy-regenerative performance (Fig. 9).

(a) 20m/s

(b) 40m/s

Fig. 8. Suspension reclaiming energy power under same speed and different road grade

224

Z. Sun et al.

(a) Class B

(b) Class C

Fig. 9. Suspension reclaiming energy power under same road grade and different speed

5 Conclusion A new hydraulic interconnected reclaiming energy suspension system is proposed by intruding a reclaiming energy unit in the traditional model of hydraulic interconnected suspension in this paper. Comparing with the traditional passive hydraulic interconnected suspension, the hydraulic motor is chosen to replace the damping valve in its structure to achieve the vibration energy collection of the suspension. Here, reclaiming energy unit is used for the suspension energy-regeneration, and the constant current control of the feed-energy unit is used to realize the adjustment and control of the vehicle dynamic performance. The relevant energy consumption model of the suspension is built and the constant current energy-regenerative circuit is designed. Finally, the corresponding bench test is carried out, the test results are basically consistent with the simulated results. It shows that the hydraulic interconnected power feedback suspension has good energy feedback foreground through the numerical analysis of the recoverable energy of the hydraulic interconnected energy suspension, which provides ideas for new type suspension design and energy recovery and utilization in vibration system. Further study on the real environment experimental implementation and engineering implementation of the designed suspension system will be conducted.

References 1. Huang C, Chen L, Jiang H et al (2014) Relationship between vehicle yaw velocity and heeling angle under steady state. Trans Chin Soc Agric Mach 45(2):34–39 2. Hawley JB (1927) Shock absorber and the like for vehicles. U.S. patent. 1647518 3. Smith WA, Zhang N, Hu W (2011) Hydraulically interconnected vehicle suspension: handling performance. Veh Syst Dyn 49(1–2):87–106 4. Cao D, Rakheja S, Su CY (2010) Roll- and pitch-plane-coupled hydro-pneumatic suspension. Part 2: dynamic response analyses. Veh Syst Dyn 48(4):507–528

Investigation on Energy Feedback

225

5. Guo KH, Chen YH, Zhuang Y et al (2011) Modeling and simulation study of hydropneumatic interconnected suspension system. J Hunan Univ 38(3):29–33 6. Yu CM, Wang WH, Wang QN (2010) Damping characteristic and its influence factors in energy regenerative suspension. J Jilin Univ 40(6):1482–1486 7. Kawamoto Y, Suda Y, Inoue H et al (2007) Modeling of electromagnetic damper for automobile suspension. J Syst Des Dyn 1(3):524–535 8. Asadi E, Ribeiro R, Khamesee MB, Khajepour A (2015) A new adaptive hybrid electromagnetic damper: modelling, optimization, and experiment. Smart Mater Struct 24 (7):075003

Sliding Mode Control with Uncertain Model for a Quadrotor UAV’s Automatic Visual Landing Problem Qing Fei1(&), Jiaxiang Zhang1, Zhengyang Wang1, and Xiaosong Huang2 1

Beijing Institute of Technology, Zhongguancun South Street. 5, Beijing, China [email protected] 2 The Institute of Atmospheric Physics, Chinese Academy of Sciences, Qijiahuozi Huayanli. 40, Beijing, China [email protected]

Abstract. This paper considers a quadrotor UAV’s automatic landing on unmanned vessels problem, and the quadrotor UAV’s model has uncertain parameters. We design a robust flight controller with the variable structure sliding-mode control with precise sliding manifold coefficients to ensure strong position and attitude control. The controller can move the UAV to track the desired position and yaw angle and keep pitch and yaw angles on stable. The $ Lyapunov $ function is used to prove the control system is effective, and the sliding-mode manifold coefficients are obtained by Hurwitz stability analysis. The landing simulation results show the effectiveness of the controller. Keywords: UAV  Uncertain model  Sliding-mode controller Automatic landing  Tracking control



1 Introduction Quadrotor UAV system is nonlinear system with a high degree of coupling and is susceptible to external interference [1]. A quadrotor UAV has six emerging and existing motions that are, precession motion, hover motion, roll and pitch motion, yaw motion, vertical motion and horizonal motion [2]. It is an underactuated system whose control input quantity and status output quantity are not equal. This makes the control of the quadrotor UAV more difficult. Due to the influence of nonlinearity, multi-objective and limited control, the control of underactuated system is complicated. For underactuated systems, researchers have given great attention to the control of underactuated systems and have had many valuable results [3–10]. At present, open source flight controllers often use mature PID controllers to control the attitude of the quadrotor. However, the most prominent is that their control parameters are fixed and its Robustness and adaptive ability are poor, and more often the controller only for linear systems. In response to the above problems, the neural network-based quadrotor controller [11] achieves the purpose of fast response and steady-state error by implementing coefficient self-learning and adaptive © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 226–233, 2020. https://doi.org/10.1007/978-981-32-9050-1_26

Sliding Mode Control with Uncertain Model

227

adjustment. Attitude control based on backstepping [12] uses integral behavior to compensate for the effects of uncertainties. Liu Kaiyue et al. use the unit quaternion method to describe the system attitude, and design the inversion sliding mode controller to get good trajectory tracking effect [13], but ignored the sliding mode control chattering problem. The sliding manifold coefficients are considered to be special values in most existing UAV’s attitude and position control studies, which are assumed to be fixed values in the simulation. In reality, the UAV will often release the detection device or capture the signal device, resulting in the uncertainty of the parameters of the self-generated model. Considering the uncertainties of the aircraft model parameters, it is a challenge and significance to complete the automatic landing of the UAV. Inspired by these, this paper classifies the uncertain parameters into the sliding mode convergence coefficient and obtains the precise sliding manifold coefficients. The sliding mode controller with uncertain parameters ensures that the quadrotor maintains the attitude accurately and robustly, and perfectly tracks the landing coordinates. In Sect. 2, a quadrotor dynamics model and a pinhole camera model are given. Section 3 designs the sliding mode attitude and position controller. The simulation in Sect. 4 shows that the controller can robustly control the quadrotor to land at the target point. Finally, Sect. 5 presents the conclusions of this paper.

2 Mathematical Model The quadrotor dynamics model and the pinhole camera model are analyzed and given. The mathematical model is shown in Figs. 1 and 2.

Fig. 1. Quadrotor UAV Model

2.1

Fig. 2. Pinhole camera model

Quadrotor Dynamical Model

Figure 1 is the quadrotor configuration. We obtain the dynamic equation of the quadrotor by the Lagrangian method, and the simplified model is shown in (1).

228

Q. Fei et al.

8 €x ¼ ðsin h cos / cos w þ sin w sin /Þu1 =m  K1 x_ =m > > > > €y ¼ ðsin h cos / sin w  cos w sin /Þu1 =m  K2 y_ =m > > < €z ¼ ðcos h cos /Þu1 =m  K3 z_ =m  g   € ¼ h_ w_ Jy  Jz =Jx þ hJ _ r Xr =Jx þ lu2 =Jx  K4 l/=J _ x / > > > _ r Xr =Jy þ lu3 =Jy  K5 lh=J _ y > h€ ¼ /_ w_ ðJz  Jx Þ=Jy  /J > >   :€ _ _ _ w ¼ /h Jx  Jy =Jz þ u4 =Jz  K6 w=Rz

ð1Þ

Where x; y; z denote the UAV’s gravity center position in the geodetic coordinate system; /; h; wðp=2\/\p=2; p=2\h\p=2; p\w\pÞ are the three euler angles of the UAV: roll, pitch and yaw; m is the quadrotor’s mass; g is the gravity acceleration; Jx ; Jy ; Jz is the UAV’s inertia that relative to the x; y and z axis; Jr is the propeller inertia; l is half the distance of the quadrotor from the motor; K1 ; K2 ; K3 ; K4 ; K5 ; K6 is the positive drag coefficient constant; Xr ¼ X1 þ X2  X3 þ X4 , while Xi ði ¼ 1; 2; 3; 4Þ is the angular velocity of each motor rotor. Taking the model parameter uncertainty into account, and performing the following transformation, we obtain a new model uncertainty dynamic Eq. (2). 8 €x ¼ ðsin h cos / cos w þ sin w sin /Þu1 =m  K1 x_ =m þ d1 > > > > € y ¼ ðsin h cos / sin w  cos w sin /Þu1 =m  K2 y_ =m þ d2 > > < €z ¼ ðcos h cos /Þu1 =m  K3 z_ =m  g þ d3   € ¼ h_ w_ Jy  Jz =Jx þ hJ _ r Xr =Jx þ lu2 =Jx  K4 l/=J _ x þ d4 / > > > _ r Xr =Jy þ lu3 =Jy  K5 lh=J _ y þ d5 >  /J > h€ ¼ /_ w_ ðJz  Jx Þ=J >  y :€ _ _ _ w ¼ /h Jx  Jy =Jz þ u4 =Jz  K6 w=Jz þ d6

ð2Þ

^ ^Jx ; ^Jy ; ^Jz are uncertain parameter. The di ði ¼ 1; 2; 3; 4; 5; 6Þ are defined as the where m; parameter uncertainty and means: d1 d4 d5 d6

2 2 2 ^ ^ ^ ^ ^ ^ ¼ K1 x_ m=ðm þ mmÞ; d2 ¼ K2 y_ m=ðm þ mmÞ; d3 ¼ K3 z_ m=ðm þ mmÞ 2 _ _ _ _ _ _ ^ ^ ^ ^ ¼ ½hwðJy  Jz Þ þ hJr Xr  K4 l/Jx =ðJx þ Jx Jx Þ þ hwðJy  Jz Þ=ðJx þ ^ Jx Þ _ z  Jx Þ þ /J _ r Xr  K5 lh _ ^Jy =ðJ 2 þ Jy ^ _ ^ Jy Þ þ /_ wð ¼ ½/_ wðJ Jz  ^ Jx Þ=ðJy þ ^ Jy Þ y 2 _ _ _ _ _ ^ ^ ^ ^ ^ ¼ ½h/ðJx  Jy Þ  K6 w  Jz =ðJz þ Jz Jz Þ þ h/ðJx  Jy Þ=ðJz þ Jz Þ

Then u1 ; u2 ; u3 ; u4 is defined as the virtual control input, and we have: 2

3 2 1 u1 6 u2 7 6 0 6 7¼6 4 u3 5 4 1 a=b u4

1 1 0 a=b

1 0 1 a=b

32 3 1 F1 6 7 1 7 76 F2 7 0 54 F3 5 a=b F4

ð3Þ

where F1 ¼ aX21 ; F2 ¼ aX22 ; F3 ¼ aX23 ; F4 ¼ aX24 is the rotor thrust; a is the lift coefficient; b is the torque scale factor.

Sliding Mode Control with Uncertain Model

2.2

229

Pinhole Camera Model

Pinhole imaging is a physical imaging process, creating a simple pinhole camera mathematical model as shown in Fig. 2. Where A-xyz_: ground coordinate system; C-xyz: camera coordinate system; S-rc: sensor coordinate system; F: camera focus; P: the landing point; I: imaging of the point P on the photosensitive surface; h: the distance from F to A; f: camera focal length; s: the distance between two pixels; (r, c): the coordinates of the I point; ðr0 ; c0 Þ: coordinates of point C. After the coordinate changes, we have the coordinates of the landing point relative (4) to the quadrotor ðxd ; yd ; zd Þ: Rðx; /Þ; Rðy; hÞ and Rðz; wÞ are the coordinate rotation matrix [14] and because the visual target used is rotationally symmetric, removing the third item has no effect. 2

3 2 3 ðc  c0 Þsh=f xd 4 yd 5 ¼ Rðx; /ÞRðy; hÞRðz; wÞ4 ðr  r0 Þsh=f 5 h zd

ð4Þ

3 Flight Controller Design The control problem considered in this automatic landing is to track the asymptotic position and attitude by designing a flight controller that relies on the second order sliding mode technique. Under the controller, ðx; y; zÞ ! ðxd ; yd ; zd Þ and w ! wd , that is, the quadrotor automatically landed on the target. 3.1

Surface Vessel Attitude Dynamics

Define the sliding manifold as (5): s1 s2 s3 s4

¼ ðz_ d  z_ Þ þ az ðzd  zÞ _ þ a/2 ð/  /Þ ¼ ay1 ðy_ d  y_ Þ þ ay2 ðyd  yÞ þ a/1 ð/_ d  /Þ d _ þ ah2 ðhd  hÞ ¼ ax1 ðx_ d  x_ Þ þ ax2 ðxd  xÞ þ ah1 ðh_ d  hÞ _ þ aw ð w  w Þ ¼ ðw_ d  wÞ d

ð5Þ

The first derivatives of the sliding surfaces versus time are (6): s_ 1 s_ 2 s_ 3 s_ 4

¼ ð€zd  €zÞ þ az ðz_ d  z_ Þ; €  /Þ € þ ay2 ðy_ d  y_ Þ þ a/2 ð/_  /Þ _ ¼ ay1 ð€yd  €yÞ þ a/1 ð/ d d _ ¼ ax1 ð€xd  €xÞ þ ah1 ð€hd  €hÞ þ ax2 ðx_ d  x_ Þ þ ah2 ðh_ d  hÞ €  wÞ € þ aw ðw_  wÞ _ ¼ ðw d d

ð6Þ

230

3.2

Q. Fei et al.

Controller Design

By making s_ i ¼ gi si  ei sgnðsi Þ, the controllers for dynamic Eq. (2) are designed as (7) 8 u1 ¼ cos /mcos h ½€zd þ g þ Km3 z_ þ az ð_zd  z_ Þ þ g1 s1 þ e1 sgnðs1 Þ > > > > < u2 ¼ Jx ½ ay1 ð€yd  €yÞ þ ay2 ð_yd  y_ Þ þ ð/ €  /Þ ~ þ a/2 ð/_  /Þ _ þ g s2 þ e2 sgnðs2 Þ d d 2 l a/1 a/1 a/1 Jy ax1 ah2 _ ax2 € ~ _ > u3 ¼ l ½ah1 ð€xd  €xÞ þ ah1 ð_xd  x_ Þ þ ðhd  hÞ þ ah1 ðhd  hÞ þ g3 s3 þ e3 sgnðs3 Þ > > > : u ¼ J ½w €  /_ h_ Jx Jy þ K6 w_ þ a ðw_  wÞ _ þ g s þ e sgnðs Þ 4

z

d

Jz

Jz

w

4 4

d

4

4

ð7Þ   _ r Xr  K5 lh, _ / ~ ¼ 1=Jy ½h_ w_ Jy  Jz þ hJ _ r Xr  Where ~h ¼ 1=Jy ½/_ w_ ðJz  Jx Þ  /J _ and the coefficients of the exponential approach laws are: e1 ¼ n1 þ jd3 j [ 0, K4 l/   e2 ¼ n2 þ ay1 d2 þ a/1 d4  [ 0, e3 ¼ n3 þ jax1 d1 þ ah1 d5 j [ 0, e4 ¼ n4 þ jd6 j [ 0. Theorem 1. Consider the quadrotor dynamics model (2) and assume that all state information is available, the design of the controller is as in (7). The system will be asymptotically stable under the control of the sliding-mode controller. Proof. Choose a Lyapunov function candidate as Vi ¼ s2i =2; ði ¼ 1; 2; 3; 4Þ, llustrate the stability analysis for subsystem ð€x; €hÞ, that is i ¼ 3. Pluging Eqs. (5) (6) into the Lyapunov function, the time derivatives of V3 is V_ 3 ¼ s3 s_ 3 ¼ g3 s23  e3 s3 sgnðs3 Þ ¼ g3 s23  ðn3 þ jax1 d1 þ ah1 d5 jÞjs3 j ¼ g3 s23  n3 js3 j  jax1 d1 þ ah1 d5 jjs3 j  0 Similarly, we have Vi  0 ði ¼ 1; 2; 3; 4Þ. Therefore, under the control of the controller (7), the system states can individually reach all the set states trajectories. 3.3

Sliding Model Coefficients

The sliding model coefficients are received under the condition of Hurwitz stability, and the following coefficients ax1 ; ax2 ; ah1 ; ah2 are solved as an example. Let s_ 3 ¼ 0 in Eq. (6) and s3 ¼ 0 in Eq. (5), then we have: _ þ ah2 ðhd  hÞ x_ d  x_ ¼  a1x1 ½ax2 ðxd  xÞ þ ah1 ðh_ d  hÞ 2 €hd  €h ¼  ax1 ð€xd  €xÞ þ ax2 ðxd  xÞ þ ðax2  ah2 Þðh_ d  hÞ _ þ ah1

ah1 ax1

ax1

ah1

ax2 ah2 ah1 ax1

ðhd  hÞ

ð8Þ

Sliding Mode Control with Uncertain Model

231

_ X3 ¼ xd  x then Eq. (8) are: Definition X1 ¼ hd  h; X2 ¼ h_ d  h; X_ 1 ¼ X2 a2 _ þ X_ 2 ¼  aah1x1 ð€xd  €xÞ þ ah1x2ax1 ðxd  xÞ þ ðaax2x1  aah2 Þðh_ d  hÞ h1 _ þ ah2 ðhd  hÞ X_ 3 ¼  a1x1 ½ax2 ðxd  xÞ þ ah1 ðh_ d  hÞ

ax2 ah2 ah1 ax1

ðhd  hÞ

ð9Þ

After linearizing around the equilibrium point, a new form is obtained Eq. (10). X_ 1 ¼ X2

ax1 u1 K1 x_ a2 Þ þ x2 ðxd  xÞ X_ 2 ¼  ð€xd  ðX1 cos/cosw þ sin/sinwÞ þ m ah1 m ah1 ax1 ax2 ah2 _ ax2 ah2 _ ðhd  hÞ þ f1 X1 þ f2 X2 þ f3 X3 þ ð  Þðhd  hÞ þ ax1 ah1 ah1 ax1 _  ah2 ðhd  hÞ X_ 3 ¼  aax2x1 ðxd  xÞ  aah1x1 ðh_ d  hÞ ax1

ð10Þ

Written in matrix form: ½ X_ 1

X_ 2

T X_ 3  ¼ B½ X1

X2

X3 T þ C½ X1

X3 T

X2

Where 2

0 a u B ¼ 4  ah1x1 m1 cos/cosw þ  aax2x1

ax2 ah2 ah1 ax1

1 ax2 ah2 ax1  ah1 ah1  ax1

0

a2x2 ah1 ax1  aah2x1

3

2

0 5; C ¼ 4 11 0

0 12 0

3 0 13 5 0

Since 11 ; 12 ; 13 are small constants, the system is progressively stable when the real part of the matrix B eigenvalues are negatives, that is, when B is a Hurwitz matrix. Let jkI  Bj ¼ 0; k is the eigenvalues of matrix B. We set k1 ¼ 1; k2 ¼ 1; k3 ¼ 1 then the coefficients are obtained ax1 ¼

3m m ah1 ; ax2 ¼ ah1 ; ah2 ¼ 3ah1 u1 cos/cosw u1 cos/cosw

ð11Þ

Similarly, using the same method, we get ay1 ¼

3m m ah1 ; ay2 ¼ ah1 ; a/2 ¼ 3ah1 u1 cosw u1 cosw

ð12Þ

4 Simulation For the sake of verify the stability of the controller with uncertain model parameters, we tested it with the following simulations. The simulation is based on the quadrotor dynamics model of Eq. (2), using the control method of Eq. (7). This simulation proves the effectiveness of the controller in the automatic landing.

232

Q. Fei et al.

The fixed model parameters of the UAV are as follows: m ¼ 1:1 kg; l ¼ 0:3 m; g ¼ 9:81 m=s2 ; a ¼ 5 Ns2 ; b ¼ 2 N=ms2 ; K1 ¼ 0:1 Ns=m; K2 ¼ 0:1 Ns=m; K3 ¼ 0:1 Ns=m; K4 ¼ 0:15 Ns=m; K5 ¼ 0:15 Ns=m; K6 ¼ 0:15 Ns=m; Jx ¼ Jy ¼ 1:25 Ns2 =rad; Jz ¼ 2:4 Ns2 =rad; Jr ¼ 0:2 Ns2 =rad. Jy 2 ½0:25; 0:25; Model parameter uncertainty assumptions are random: ^ Jx ¼ ^ ^Jz 2 ½0:48; 0:48; m ^ 2 ½0:2; 0:2. From Figs. 3 4, 5, 6, 7 and 8, We can clearly see that attitude and position states variables converge to their target values, and the sliding manifolds converge to their sliding surfaces, respectively. The model parameter uncertainty does not significantly affect the position and attitude tracking control results of the UAV. Therefore, the designed controller (7) can stably control the quadrotor drone to the landing point. The stability of the control method when the model parameters are uncertain is verified.

Fig. 3. Landing position

Fig. 4. Position (x, y, z)

Fig. 5. Angles

Fig. 6. Linear velocities

Fig. 7. Sliding manifolds

Fig. 8. Controllers

Sliding Mode Control with Uncertain Model

233

5 Conclusion In this paper, we design a robust flight controller with the variable structure slidingmode control with precise sliding manifold coefficients to solve the automatic landing problem of quadrotor UAV with uncertain model parameters. The control method can stabilize the attitude of the quadrotor and track the landing target to complete the landing. To verify the controller, a simulation was performed. The results of this study are as follows: UAV’s attitude and position variables can converge to the target value; each sliding variables can converge to their sliding surfaces; the influence of model parameter uncertainty on the tracking control is invisible, proving the stability of the designed controller. In summary, the vision-based UAV automatic landing slidingmode controller is reasonable and effective.

References 1. Wang H, Chen M (2014) Sliding mode attitude control for a quadrotor micro unmanned aircraft vehicle using disturbance observer. In: Guidance, navigation and control conference. IEEE (2014) 2. Ashrafiuon H, Erwin RS (2008) Sliding mode control of underactuated multibody systems and its application to shape change control. Int J Control 81(12):1849–1858 3. Islam S, Liu PX, El Saddik, A (2015) Robust control of four-rotor unmanned aerial vehicle with disturbance uncertainty. IEEE Trans Ind Electron 62(3):1563–1571 4. Xiong JJ, Zheng EH (2014) Position and attitude tracking control for a quadrotor UAV. ISA Trans 53(3):725–731 5. Xiong JJ, Zheng EH (2015) Optimal kalman filter for state estimation of a quadrotor UAV. Optik – Int J Light Electron Optics 126(21):2862–2868 6. Kurode S, Bandyopadhyaya B, Gandhi PS (2011) Discrete sliding mode control for a class of underactuated systems 7. Cozaa C, Nicola C, Macnaba CJB, Ramirez-Serranob A.: Adaptive fuzzy control for a quadrotor helicopter robust to wind buffeting. J Intell Fuzzy Syst 22(5):267–283 8. Mondal S, Mahanta C (2012) A fast converging robust controller using adaptive second order sliding mode. ISA Trans 51(6):713–721 9. Guo ZQ, Xu JX, Lee TH (2014) Design and implementation of a new sliding mode controller on an underactuated wheeled inverted pendulum. J Franklin Inst 351(4):2261– 2282 10. Zhang X, Xian B, Zhao B, Zhang Y (2015) Autonomous flight control of a nano quadrotor helicopter in a GPS-denied environment using on-board vision. IEEE Trans Ind Electron 62 (10):6392–6403 11. Xu G, Zhou M (2013) Modified adaptive flight control of quadrotor based on single neuron PID. In: IEEE third international conference on information science and technology. IEEE 12. Tan L, Lu L, Jin G (2013) Attitude stabilization control of a quadrotor helicopter using integral backstepping. In: International conference on automatic control and artificial intelligence, IET 13. Kai-Yue L, Jian-Wei L (2017) Trajectory tracking control of quadrotor UAV based on sliding mode control. J Tianjin Univ Technol 14. Zheng EH, Xiong JJ, Luo JL (2014) Second order sliding mode control for a quadrotor UAV. ISA Trans 53(4):1350–1356

Depth-Fusion Based on Gaussian Mixture Model for RGB-D Visual SLAM Zhaotong Ding, Ran Huang(&), and Biao Hu College of Information Science and Technology, Beijing University of Chemical Technology, Beijing 100029, China {huangran,hubiao}@mail.buct.edu.cn

Abstract. Stochastic noises and disturbances in depth image about a scene observed by a RGB-D camera degrade the performance of a visual simultaneous localization and mapping (SLAM) system. For enhancing perception robustness, we develop a real-time SLAM system which uses a RGB-D camera as its sole sensor modality. The depth uncertainty for RGB-D features is described by Gaussian mixture model (GMM). A frame-constrained depth-fusion approach is then proposed to obtain accurate depth information of the current frame using the past frames in a local window. Experiments performed on public RGB-D TUM dataset have showed the proposed system outperforms the ORB-SLAM2. Keywords: Depth fusion

 Gaussian mixture model  Visual SLAM

1 Introduction The motivation for the study of autonomous localization and navigation has its roots in industry since mobile robots must have the ability of mapping, localization, path planning and obstacle avoidance in a complex environment [1]. These competencies can be achieved using vision sensors that can offer more information of a scene in comparison with laser range finder. Therefore, visual simultaneous localization and mapping (V-SLAM) plays an important role in the computer vision community; see [2], and the references therein. In the early stage of the research, V-SLAM was mainly performed by a monocular camera [3]. This type of SLAM may result in depth scale uncertainty and incorrect state initialization due to unmeasurable depth information. Practical demands of robust and precise perception lead researchers to approach VSLAM systems by utilizing more complicated vision sensors [4]. Among them RGB-D cameras have been widely used in recent years. However, as illustrated in Fig. 1, there always exist black holes in each depth image detected by Kinect v1. The reason mainly lies in the fact that uncertainty of sparse features exists in the depth measurement, and depth measurements of detected features may be lost because of disturbances, the range limitation of sensors. As a result, the camera trajectory may be estimated incorrectly. Therefore, the problem of designing depth-fusion algorithm for V-SLAM with uncertainty to achieve robust perception has not been fully explored, which motivates the present study.

© Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 234–242, 2020. https://doi.org/10.1007/978-981-32-9050-1_27

Depth-Fusion Based on Gaussian Mixture Model for RGB-D Visual SLAM

235

Fig. 1. Images captured by the Kinect v1

In this paper, a depth-fusion V-SLAM system is presented to achieve robust perception in the environment. Firstly, a method based on the GMM is developed to estimate depth uncertainty of the RGB-D camera. Concretely, we suppose that the depth uncertainty depends on the depth reading of a given pixel as well as those of its neighbors. It has been shown by experiments that the GMM describes the uncertainty better than the simple model. Secondly, in order to recover the depth information affected by external noises, a frame-constrained depth fusion method is proposed using the coordinate information of the past frames in a local window. The fused depth image is then used to estimate trajectory by performing alignment and data association against a map of 3D features. The rest of this paper is organized as follows. In Sect. 2, we discuss related work. Section 3 details the V-SLAM with depth-fusion based on GMM. Experiments performed on RGB-D TUM dataset are performed in Sect. 4. Finally, we conclude in Sect. 5.

2 Related Work As an effective sensor for providing the color and depth information, RGB-D SLAM system has been a hot research topic in recent years. A fusion system was developed for 3D scene reconstruction using a RGB-D camera in [5]. In this system, the iterative closest point (ICP) algorithm was employed to perform pose estimation with the point cloud data, and the reconstruction result was expressed by the truncated signed distance function model. Nevertheless, this system can only be applied to small-scale environment because loop closure is not included. In [6], a SLAM system was developed to align image based on a composite optimization method, using both sparse features and shape-based information, but this system needs a GPU to accelerate. In addition, a fast visual odometry and mapping system was developed in [7], where sparse features are registered against a lasting model, which has a limited size, then the above model is updated through Kalman Filter. The use of Kalman Filter limits the system for long mission as landmarks increase. Based on a RGB-D camera, a new 3D mapping system using SIFT descriptors was developed in [8]. In this system, the front-end uses ICP to estimate camera pose between two frames, while the back-end executes pose-graph optimization. Unlike the above methods, we use bundle adjustment as back-end to optimize camera pose and landmarks simultaneously.

236

Z. Ding et al.

3 Main Results In this paper, a RGB-D visual SLAM system relying on local window techniques is developed. The system pipeline is briefly depicted in Fig. 2. Firstly, for performing the alignment and data association accurately, a Gaussian mixture model is introduced to denote depth uncertainty. We use the perspective-n-point algorithm to perform pose estimation. The Levenberg-Marquardt optimization method is then used to solve the nonlinear least square problem. Meanwhile, the transformation information of the past frames in a local window is fused to estimate the missing depth measurement of a pixel in the current frame due to external disturbance and noise. 3.1

Model Uncertainty

The proposed V-SLAM system uses a Microsoft Kinect v1 as the RGB-D camera. 2 3 Denote the camera inverse projection by p1 m ðÞ : R  R ! R . Given its raw depth measurement d and a pixel p ¼ ðu; vÞ, we have a corresponding point q ¼ ½x; y; zT in the camera coordinate that q¼

p1 m ðp; d Þ

  T d ð u  cx Þ d u  cy ¼ ; ;d fx fy 

ð1Þ

    where fx ; fy denotes focal length, cx ; cy is the optical center. In [9], the depth measurement d is viewed as a random variable with standard deviation rd . We consider a more general model in this paper. It is assumed that the uncertainty in u and v dimensions exists, and the depth uncertainty depends on the depth reading of a given pixel as well as those of its neighbors in  a local  window.  Let u,  v, z be normally distributed random variables satisfying u  N lu ; r2u , v  N lv ; r2v ,     and d  N ld ; r2d . In addition, define a Guassian kernel W ¼ wij 2 R33 .

Fig. 2. The flowchart of the proposed V-SLAM

Depth-Fusion Based on Gaussian Mixture Model for RGB-D Visual SLAM

237

For each pixel p, define a new random variable d^ satisfying d^ 

X

 2 w N l ; r dij dij i;j ij

ð2Þ

 where N ldij ; r2dij is the normal distribution of the ij th pixel in the local window. In other words, the expectation and variance of the estimated depth of pixel p are given by X ^d^ ¼ w l ; ð3Þ l i;j ij dij ^2d^ ¼ r

X i;j

^2d^ wij ðl2dij þ r2dij Þ  l

ð4Þ

We observe that the GMM of the following Guassian kernel predicts the true uncertainty more accurately than the simple model [9] 2 1 2 1 4 2 4 K¼ 16 1 2

3 1 25 1

ð5Þ

through various comparison experiments. Using Eqs. (1) and (4)–(5), we obtain the GMM parameters for q in the camera coordinate corresponding to each given pixel p. 3.2

Frame-Constrained Depth Fusion

It can be clearly seen from Fig. 3 that there exist some black holes in the depth image with GMM, which means that depth information of certain pixels is still missing due to noises. To recover the missing depth information, a frame constrained depth fusion algorithm is proposed by taking the depth information of the past frames in a local window into consideration.

(a) f2/xyz original depth image

(b) f2/xyz depth image with GMM

Fig. 3. The original depth image derived from GMM.

238

Z. Ding et al.

Firstly, we use a vector f to denote the variables to be optimized, which includes both the seð3Þ pose of each keyframe ngi and 3D position of each point Qgj in the world 3 2 coordinate.  Define the camera projection function by pm : seð3Þ  R ! R , and pm ngi ; Qgj stands for mapping the j th 3D point Qgj to the local reference system of the i th keyframe, i.e. Qij , and then projecting Qij to the 2D image. In addition, we introduce a cost function X X J ð fÞ ¼ eTij C1 ð6Þ eij eij i2K j2P m

m

where Km and P m refer to the sets of local keyframes and points respectively, eij are the projection errors between the observations and the landmarks mapped to the frames where they are observed, i.e.,   eij ¼ pij  pm ngi ; Qgj

ð7Þ

and Ceij denotes the covariance matrix that is corresponded to the uncertainty of the project error eij . The camera pose is optimized to minimize the cost function (6), i.e., f ¼ arg minf J ðfÞ:

ð8Þ

In the sequel, we adopt the Levenberg-Marquardt optimization approach to solve the problem (8). The increment Δf is given by Mf ¼ ½H þ kdiagðHÞ1 J T We

ð9Þ

where e is a vector encompassing all reprojection errors eij , and W is a residual weight matrix with compatible dimensions, J and H are the Jacobian and Hessian matrices with respect to f. According to (7), the projection error eij depends on a single keyframe ngi and a single point Qgj , hence the Hessian matrix can be given by 2 6 .. 6. 6 6 H6 6 6. 4 ..

...

@eij T @ngi

... ...

@eij T @Qgj

...

@e

ij C1 eij @n

gi

@e

ij C1 eij @n

gi

...

.. .. . .

@eij T @ngi

.. .. . .

@eij T @Qgj

... ... ...

@e

ij C1 eij @Qgj

@e

ij C1 eij @Qgj

3 .. 7 .7 7 7 7 7 .. 7 .5

ð10Þ

The iterative equation for f is given by ~f ¼ Mff

ð11Þ

where the operator  stands for a left multiplication for Lie-algebra seð3Þ elements. Applying (11) recursively until convergence yields the optimal f , which will be used

Depth-Fusion Based on Gaussian Mixture Model for RGB-D Visual SLAM

239

to update the position of the local keyframes and points. It should be noted that certain transformation will be made according to the nature of the variables in f before h iT applying the update Eq. (11). For a given ngi ¼ xTgi vTgi 2 seð3Þ, the exponential map is used to project the vector ngi to the Lie group SEð3Þ, i.e.,   exp ngi ¼ exp

 

xgi 0

 

vgi 1

 ð12Þ

  with xgi  being the skew symmetric matrix generated by the cross product of the vector xgi .

Fig. 4. A set of points with their uncertainty projected to the current frame.

As depicted in Fig. 4, 3D points are projected to the current image using the optimal solution f , the relative pose matrices and 3D measurements of past frames in a local window. As a result, we can estimate the depth with uncertainty of each pixel in the current image by using the depth information of projected points. Concretely, the fusion depth of each pixel d^ is given by Xn

1 d^ ¼ Pn

1 i¼1 r ^2d

i¼1 i

di ^2di r

ð13Þ

where n denotes the number of projected points in the image grid of current frame, and ^d^i is the mixed Gaussian variance defined in (4). Finally, we obtain the depth comr pensation for the missing pixels, which will be used in the trajectory estimation phase.

240

Z. Ding et al.

4 Experiments This section validates the usefulness of our V-SLAM system in several scenarios from TUM RGB-D dataset. The comparison between our method and the RGBD version of ORB-SLAM2 by employing its open source implementation is also presented. For brevity, we consider five sequences in the experiment. Note that the absolute trajectory error (ATE) is used to evaluate the performance. In what follows, we present the experiment results performed on TUM RGB-D dataset. We can see that the GMM predicts the true uncertainty more accurately than a simple model from Fig. 5(b) and (e). Besides, Fig. 5(c) and (f) show that the missing depth measurements of the raw depth images are successfully recovered by our proposed depth fusion algorithm. We evaluate our trajectory estimation pipeline with the two filtered sequences f1/xyz and f1/desk2.

(a) f2/xyz original depth

(b) f2/xyz depth (GMM)

(c) f2/xyz depth (fusion)

(d) f1/sitting original depth

(e) f1/sitting depth (GMM)

(f) f1/sitting depth (fusion)

Fig. 5. Analysis for the proposed depth fusion algorithm. Left column: the original depth image. Middle column: the depth image using GMM. Right column: the depth image using frameconstrained depth fusion.

Scenario 1: sequence f1/xyz. The groundtruth, estimated camera trajectories derived from RGB-D ORB-SLAM2 [10] and the proposed V-SLAM are illustrated in Fig. 6(a) and (b), where the trajectory errors are visualized with different color. Figure 6(c) shows that the estimated trajectory of the proposed method is closer to the groundtruth than that of ORB-SLAM2. Scenario 2: sequence f1/desk2. Similarly, the groundtruth, estimated camera trajectories, and ATE errors derived from RGB-D ORB-SLAM2 and the proposed V-SLAM are depicted in Fig. 6(d), (e) and (f) respectively, which implies the proposed approach outperforms the ORB-SLAM2.

Depth-Fusion Based on Gaussian Mixture Model for RGB-D Visual SLAM

241

Scenario 3: sequence f1/xyz, f1/desk and f1/desk2. In this scenario, each sequence is simulated for 5 times. The experiment results in Table 1 shows that the proposed method achieves better estimation than ORB-SLAM2 in all test sequences. Our method using depth-fusion framework decreases the trajectory error.

(a) RGB-D ORB-SLAM2

(b) The proposed method

(c) The ATE comparison

(d) RGB-D ORB-SLAM2

(e) The proposed method

(f) The ATE comparison

Fig. 6. The comparison results performed on the sequence f1/xyz and f1/desk2. Table 1. The RMSE of ATE of the keyframe trajectory Sequence ORB-SLAM2 RMSE RMSE f1/xyz 0.0112 0.0108 f1/desk 0.0177 0.0164 f1/desk2 0.0262 0.0257

Our method Median STD 0.0084 0.0053 0.0112 0.0080 0.0214 0.0115

5 Conclusion A robust real-time RGB-D SLAM system has been proposed in this paper. Firstly, we introduced a Gaussian mixture model (GMM) to describe the depth model uncertainty. We have shown the GMM predicts the true uncertainty more accurately than a simple Gaussian model by experiments performed on static scenes. In order to obtain the missing depth information of the pixels in current frame, a frame-constrained depthfusion approach has been developed using the past frames in a local window. The proposed V-SLAM has been tested on public TUM RGB-D dataset. Our experimental results have showed the proposed SLAM system outperforms the ORB-SLAM2 system.

242

Z. Ding et al.

Ackownagement. This work was supported in part by National Natural Science Foundation of China under Grants 91748102 and U1813220, by the Fundamental Research Funds for the Central Universities XK1802-4 and Research projects on biomedical transformation of ChinaJapan Friendship Hospital PYBZ1837, and by the CSC scholarship.

References 1. Nistér D, Naroditsky O, Bergen J (2006) Visual odometry for ground vehicle applications. J Field Robot 23(1):3–20 2. Cadena C, Carlone L, Carrillo H, Latif Y, Scaramuzza D, Neira J, Reid I, Leonard JJ (2016) Past, present, and future of simultaneous localization and mapping: toward the robustperception age. IEEE Trans Robot 32(6):1309–1332 3. Davison AJ, Reid ID, Molton ND, Stasse O (2007) MonoSLAM: real-time single camera slam. IEEE Trans Pattern Anal Mach Intell 6:1052–1067 4. Gallego G, Lund J, Mueggler E, Rebecq H, Delbruck T, Scaramuzza D (2018) Event-based, 6-DOF camera tracking from photometric depth maps. IEEE Trans Pattern Anal Mach Intell 40(10):2402–2412 5. Newcombe RA, Izadi S, Hilliges O, Molyneaux D, Kim D, Davison AJ, Kohi P, Shotton J, Hodges S, Fitzgibbon A (2011) Kinectfusion: real-time dense surface mapping and tracking. In: 2011 IEEE international symposium on mixed and augmented reality, pp. 127–136 6. Henry P, Krainin M, Herbst E, Ren XF, Fox D (2012) RGB-D mapping: using kinect-style depth cameras for dense 3D modeling of indoor environments. Int J Robot Res 31(5):647– 663 7. Dryanovski I, Valenti RG, Xiao JZ (2013) Fast visual odometry and mapping from RGB-D data. In: 2013 IEEE international conference on robotics and automation, pp. 2305–2310 8. Endres F, Hess J, Sturm J, Cremers D, Burgard W (2014) 3-D mapping with an RGB-D camera. IEEE Trans Robot 30(1):177–187 9. Khoshelham K, Elberink SO (2012) Accuracy and resolution of kinect depth data for indoor mapping applications. Sensors 12(2):1437–1454 10. Mur-Artal R, Tardós JD (2017) ORB-SLAM2: an open-source slam system for monocular, stereo, and RGB-D cameras. IEEE Trans Robot 33(5):1255–1262

Error Analysis of Dual Antenna UAV Tracking System Shujuan Li1(&), Junhang Ding2, and Jianzhi Li3 1

2

Shandong Institute of Commerce and Technology, 4516 tourist road, Jinan, China [email protected] Qingdao University School of Automation, 308 Ningxia road, Qingdao, China 3 Shandong Quanqing Communication Co. Ltd., Jinan, China

Abstract. Aiming at the tracking problem of directional antenna in uav flight detection, this paper studies the principle of using dual antenna for target tracking, and analyzes the tracking system theoretically. In order to ensure the accuracy and reliability of data sending and receiving, and improve the receiving gain and anti-interference ability, the error of uav flying in different longitude and latitude was analyzed, and the relationship between distance d and pitch angle was obtained through simulation results. In order to reflect the tracking effect of the antenna tracking platform in the uav transition field and keep the sampling frequency unchanged, single antenna and double antenna tracking modes were adopted to track, observe the changes of RSSI and further determine that the dual antenna system has advantages of strong capture sensitivity and fast tracking speed compared with the single antenna system. Keywords: Dual antenna

 Tracking  Pitch angle  Error

1 Introduction Please note that the first paragraph of a section There is a large amount of data to be transmitted between the uav and the ground control system. Automatic tracking, which is the main tracking method at present, is a directional antenna that automatically realizes the target tracking according to the target movement. The research on geographic position tracking mainly includes: automatic tracking by data fusion based on the extraction of geographical position information on uav [1], asynchronous dualmode fusion using motion compensation prediction algorithm and channel gain feedback alignment algorithm [2], and single antenna automatic tracking [3]. When GPS services are turned off or disabled in some areas, the tracking quality will be seriously affected. Asynchronous fusion dual mode can increase the computing complexity and computing time, and Single antenna tracking has the disadvantages of slow tracking speed and difficulty in acquisition [4], found in the development process, determined according to the relative position of the unmanned aerial vehicle (uav) and directional antenna tracking target angle [5], there are a variety of methods, but sometimes in order to reduce the computational complexity and simplified [7], some must judge the true

© Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 243–250, 2020. https://doi.org/10.1007/978-981-32-9050-1_28

244

S. Li et al.

azimuth in quadrant, increased the complexity of the control system. Based on the above reasons, this paper proposes to adopt dual antenna tracking to solve the above problems.

2 Principle of Dual Antenna Position Tracking The ground end obtains the position information of the uav through the GPS system, takes the extracted signal reception strength of the ground end antenna as a reference, adjusts the antenna direction by using the step tracking algorithm, and realizes the dynamic tracking of the uav [6]. In the dual antenna tracking, the next rotation direction of the antenna can be determined by comparing the range of the main beam of the two antennas, so as to improve the tracking speed [8]. The details is shown in Fig. 1.

Fig. 1. Dual antenna pattern.

3 Theoretical Analysis of Position Tracking The source of position tracking signals can be divided into two types. This system mainly obtains the geographical position information of the target through the interaction between the antenna and the target information, and calculates the position angle based on its own geographical position information, so as to obtain the benchmark tracking target of the whole system [9]. The antenna and the target’s longitude, latitude and height can be obtained through GPS/beidou signal. When the antenna gets the target’s position information, the antenna calculates the pitch, horizontal and roll angle of the two communications through software, and the variation deviation angle of the horizontal, pitch and roll can be obtained by doing the difference. This deviation angle is the input of the tracking system. When the system adopts a two-axis tracking strategy, the deviation value is simulated under ideal conditions [10]. There are two major deviations in the use of geographic location information tracking. One is the deviation caused by the transmission of beacon data interval, and the other is the deviation caused by the accuracy of geographic location information. The following are the theoretical analysis of the two deviations.

Error Analysis of Dual Antenna UAV Tracking System

245

Fig. 2. Aerial coverage of the hovering area of the uav.

As shown in Fig. 2, it is assumed that the uav moves in a circle over the sky at a speed of v = 60 km/h. The height of the uav is h = 3000 m, the flight radius is R = 1000 m, and the horizontal distance between the center of the circle and the observation point is d. In this case, the relationship between the elevation angle difference and the horizontal angle difference of the observation point relative to the uav position within the sampling time T and the horizontal distance d is calculated. In the case of fixed d, the difference in pitch angle and horizontal angle of observation points generated by the flight of uav in T time are also different. Therefore, the position of the center of the circle is firstly fixed and each point of the entire circumference is taken as the starting point to calculate the difference in pitch angle and horizontal angle of observation points generated in T.

Fig. 3. Horizontal and vertical projection of uav trajectory.

The vertical projection and horizontal projection of uav flight track are shown in Fig. 3. When the starting point of uav is A and it is located at B after time T, the

246

S. Li et al.

elevation angle difference of observation point generated by uav flight arc AB is calculated. The elevation angle difference is as shown in the figure, and the horizontal angle difference is illustrated as the heroine. Since the speed of the uav is known, the length of arc AB can be calculated to get the angle. b¼

# 0:1   360 3:6 2  p  R

ð1Þ

Pitching angle c tan h ¼

H d þ R  cos a

H d þ R  cos ða þ bÞ     H H c ¼ tan 1  tan 1 d þ R  cos ða þ bÞ d þ R  cos a tan ðh þ cÞ ¼

ð2Þ ð3Þ ð4Þ

Make angle change from 0 to 360°. According to the above formula, the pitching angle difference of each observation point obtained by uav at the beginning of each position can be obtained. Horizontal angle s tan r ¼ R 

sin a d þ R  cos a

sin ða þ bÞ d þ R  cos ða þ bÞ     sin ða þ bÞ sin a s ¼ tan 1 R   tan 1 R  d þ R  cos ða þ bÞ d þ R  cos a tan ðr þ sÞ ¼ R 

ð5Þ ð6Þ ð7Þ

Also, the angle of is changed from 0 to 360°. According to the above formula, the horizontal angle difference of each observation point obtained by the uav at the beginning of each position can be obtained. Space close angle u u ¼ cos

1

sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi! 1 ð8Þ 1 þ tan ðabsðsÞÞ  tan ðabsðsÞÞ þ tan ðabsðcÞÞ  tan ðabsðcÞÞ

The maximum deviation angle within the change range of each fixed d distance uav is taken as the maximum deviation angle at this moment, and d is taken as the change range from 0 to 100 km. The simulation results are shown in Fig. 4.

Error Analysis of Dual Antenna UAV Tracking System

247

0.1

0.08

0.06

100ms

0.04

0.02

0

-0.02

-0.04 0

50

100

150

200

250

300

350

400

Fig. 4. The relationship between the variation of the triaxial deviation angle at a fixed d and the flight circle of uav.

According to the experimental data, it can be concluded that the larger d is, the smaller the angle range the antenna needs to rotate, and the smaller the effect of the hovering radius R on the pitch angle of the uav is.

4 The Error Analysis Since there is an error between the GPS signal of the system and the target, namely, there is an error between the longitude and latitude, and the variation of the error between the longitude and latitude is shown in Figs. 5 and 6. -5

x 10 5

0

-5 0

2000

4000

6000

8000

Fig. 5. Longitude deviation. -5

x 10 4 2 0 -2 -4 0

2000

4000

6000

8000

Fig. 6. Latitude deviation.

248

S. Li et al.

The earth’s radius is about 6371.393 km, and the equatorial circumference is about 40032642 m. The longitude of earth is divided into east and west longitude 180°, which adds up to 360°. By the graphics shown in longitude error is not more than 7 * 10 ^ (−5)°, so determined by longitude location deviation of 40032642/360 * 7 * 10 ^ (−5) m, which is about 7.7 m. The latitudes of earth are 90° north and 90° south, which adds up to 180°. By the graphics shown in latitude error is not more than 4 * 10 ^ (−5)°. So determined by latitude location deviation of 40032642/180 * 4 * 10 ^ (−5) m, which is about 8.9 m. In conclusion, taking 10 m as the deviation range of GPS positioning, the influence of this deviation in the calculation process of pitch angle and horizontal angle was calculated. Take the system as the origin and the radius of 10 m as the error calculation range. The error radius of the target uav is also 10 m, as shown in Fig. 7.

Fig. 7. Calculation diagram of horizontal angle of deviation pitching.

According to the figure, ∠1 is the standard pitch angle and ∠2 is the deviation pitch angle; Standard level angle for 0°, ∠4 levels for deviation angle. The calculation formula is as follows: \1 ¼ tan 1

H d

ð9Þ

H \2 ¼ tan 1 qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ð10Þ ðd  10  cos ð\3Þ þ 10  cos ð\5ÞÞ2 þ ð10  sin ð\5Þ  10  sin ð\3ÞÞ2

\4 ¼ tan 1

10  sin ð\5Þ  10  sin \3 d  10  cos ð\3Þ þ 10  cos ð\5Þ

ð11Þ

Error Analysis of Dual Antenna UAV Tracking System

249

10 1.4

1.2

1

0.8

0.6 X: 3003 Y: 0.3812

0.4

X: 1.001e+04 Y: 0.1144

0.2 X: 5005 Y: 0.2287

X: 2.002e+04 Y: 0.05718

X: 3.003e+04 Y: 0.03812

0 0

0.5

1

1.5

2

2.5 d(m)

3

3.5

4

4.5

5 4 x 10

Fig. 8. Maximum horizontal deviation angle of 10 m circle. 10 0.4 0.35 0.3 0.25 0.2 0.15 0.1

X: 5005 Y: 0.101 X: 1.001e+04 Y: 0.03147

0.05 0 -0.05 0

1

2

3

4

5 d(m)

6

7

8

9

10 4 x 10

Fig. 9. Maximum angular deviation of a 10-m circle (pitch).

The calculation results are as follows: According to the result of the calculation of Figs. 8 and 9, you can see that when the unmanned aerial vehicle (uav) and tracking system location deviation within 10 m, more than 5 km, and the distance between horizontal deflection angle is not higher than 0.2287°, pitch deviation angle is not higher than 0.101°, tracking error in the system under scope. In order to reflect the tracking effect of the antenna tracking platform in the transition field of uav, the sampling frequency was kept unchanged, and the single antenna and double antenna tracking modes were used for tracking respectively. The changes of RSSI were observed and recorded in Fig. 10.

Fig. 10. Comparison chart of test results of uav transition tracking.

250

S. Li et al.

5 Conclusion Based on the above theory and the simulation results, when tracking the air target, the horizontal position tracking error is not higher than 0.2374° within 5 km, and not higher than 0.1250° within 10 km. The pitching direction position tracking error is not higher than 0.1088° within 5 km, and not higher than 0.0341° within 10 km, due to large communication allowance when 5 km, 0.3° deviation will not affect communication effect. As the distance increases, the position error becomes smaller and smaller, and the tracking error is within the bearing range of the system. It was found that dual-antenna tracking can obviously reduce the pitch angle deviation, increase the main beam width of the antenna, and improve the capture sensitivity, tracking speed and tracking accuracy.

References 1. Wada A, Yamashita T, Maruyama M (2015) A surveillance system using small unmanned aerial vehicle (UAV) related technologies. J NEC Tech J 8(1):68–72 2. Jing H, Wen X, Jun L (2015) Directional antenna alignment of relay communication UAV based on mode fusion. J Comput Simul 32(8):225–229 (in Chinese) 3. Dehghan S, Moradi H (2014) A new approach for simuhaneons localization of UAV and RF sources (SLUS). In: International conference on unmanned aircraft systems, NJ. IEEE Press, pp 744–749 4. Fan J, Gao X, Ding J (2014) Research of stable tracking system for the directional antenna of UAV. J Sichuan Ordnance 34(4):84–85 (in Chinese) 5. Du M, Chai L (2008) The design of antenna track on GPS. J Microcomput Inf. 24(25):243– 244 (in Chinese) 6. Yang MK, Gao GP, Zhang TL (2013) Design of automatic tracking system for sonde application. J Commun Technol 45(7):1–3 (in Chinese) 7. Zhang ZQ, Li XB (2013) Research on antenna automatic control of dynamic point—to— point communication. J Modem Defense Technol, 41(4):94–99 (in Chinese) 8. Gohiya CS, Sadistap SS, Akbar SA (2013) Design and development of digital PID controller for DC motor drive system using embedded platform for mobile robot. In: IEEE International Advance Computing Conference (IACC), NJ, IEEE Press, pp 52–55 9. Lin Y, Yu Q (2011) Efficient detection and tracking of moving objects in geo-coordinates. J Mach Vis Appl 22(3):505–520 (in Chinese) 10. Yang ZG (2013) Development of active directional antennae for use in small UAVs. Innovation, Communication and Engineering, pp 169–172 (in Chinese)

Fault Tolerant Control Allocation Based on Adaptive Sliding Mode Control for Distributed-Driven Electric Vehicle Guohai Liu, Shuangjian Wang(&), Duo Zhang, Yue Shen, and Zhen Yao School of Electrical and Information Engineering, Jiangsu University, Zhenjiang 212013, China [email protected]

Abstract. Distributed-Driven Electric Vehicle (DDEV) faces many challenges in the four hub motors coordination control and vehicle handling stability. The probability of failure is greatly increased because of the redundancy of the DDEV actuator. When the actuator fails, the driver may be misled by the undesired vehicle performance which makes the vehicle lose the stability under critical condition. In this paper, sliding mode control strategy with fault-tolerantcontrol-allocation (FTCA) is adopted to improve the performance of the DDEV under extreme conditions with actuator failure. In the control layer, the sideslip angle is obtained by the state observer (SMO). In order to improve the robustness, an adaptive sliding mode control (ASMC) is used. Then, the FTCA is designed to distribute the torques of the four hub motors properly when the motor fails. The proposed ASMC-FTCA algorithm was verified through some simulation combined with Carsim and MATLAB. Keywords: Distributed driven electric vehicle (DDEV)  State observer Adaptive sliding mode (ASM)  Fault tolerant control allocation (FTCA)



1 Introduction Distributed-Driven Electric Vehicle(DDEV) have great potential for driving flexibility, efficiency, and performance. The trajectory tracking ability can be improved [1, 2]. However, with the increasing of the actuator number, the possibility of the actuator failure increases. It is hard to control vehicle when the hub motor is broken especially on the slippery road. In order to estimate the fault of the system, several fault diagnosis strategies have been proposed in [3, 4]. The researches of the FTC for DDEV mainly focused on the failure of the driving motor. In [5] an adaptive algorithm was established to keep the safety of DDEV system when fault happen. In [6], a FTC controller was designed based on the robust gain-scheduling algorithm. In [7], the tracking control problem for the DDEV with actuator fault and unmatched disturbance was investigated. Literature [8] and [9] used the idea of combining Linear Quadratic and Lyapunov functions to solve the path tracking problem when motor fails. © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 251–261, 2020. https://doi.org/10.1007/978-981-32-9050-1_29

252

G. Liu et al.

In order to ensure the maneuverability and the reliability of the DDEV, there have been many advanced control methods. In [10], a proportional-integral-derivative (PID) controller combined with neural network was proposed for improving the maneuverability of DDEV. In [11], the direct yaw-moment control (DYC) strategies were applied to DDEV in critical condition which combined sliding mode control and nonlinear disturbance observer (NDOB). [12] proposed nonlinear torque allocation strategy combined with model predictive control to enhance the yaw stability of DDEV. The purpose of the yaw stability control of the vehicle is to regulate the yaw rate and sideslip angle stay close with the reference value. The state observer is used to obtain the sideslip angle. To improve the robustness, the additional yaw moment of DDEV is obtained by the ASMC. In CA layer, the character of control signal is taken into consideration. Meanwhile, the outputs of the distributed driven system will be reassigned to keep the vehicle safety after fault happens. The paper is organized as follows. In the Sect. 2, vehicle dynamic model of the DDEV is established. In the Sect. 3, based on the fault tolerant control allocation (FTCA), the ASM controller with a new adaptive exponential approach law is designed. And, the sideslip angle SMO is also given. The simulation results of the DDEV in two faulty cases are given in Sect. 4. Section 5 gives conclusions.

2 DDEV with Fault Model 2.1

Faulty Factor of the Drive Motor

For simplification, the combination of motor controller and motor is assumed as the actuator of the DDEV. Therefore, the actuator control signal u and the torque output T is simply described as a control gain k. ki ¼

Ti ; u  u  u ui

ð1Þ

u and u are the top and bottom output limits of the control signals. i 2 {fl, fr, rl, rr}, it means four driving motor. If the actuator fails, the output torque will be different to its ideal value. It assumed that the control signal is changed. So the control gain can be expressed as ^ki ¼ ð1  qi Þki

ð2Þ

The faulty factors qi is subject to 0–1 which describes the degree of actuator fault. i 2 {fl, fr, rl, rr}, it means four driving motor. 2.2

DDEV Dynamic Model with Motor Fault

Figure 1 is the schematic of DDEV model. The kinetic functions of the motion of the DDEV are described as

Fault Tolerant Control Allocation Based on Adaptive Sliding Mode Control

253

Fig. 1. Schematic of DDEV model.

8 > >
> 2C r Cr Þ : b_ ¼ 2ðCf þ Cr Þ b þ 2ðlf Cf l  1 c þ f df 2 mVx

mVx

ð3Þ

mVx

Where Vx and c are vehicle velocity and yaw rate. m is the DDEV mass. df and b represent the front steering angle and sideslip angle. lf and lr are the distances from center of gravity to front and rear suspension. The rotational inertia of the vehicle is represented by Iz. The longitudinal force Fx and additional yaw moment Mz generated by the four longitudinal tire force Fxi is described as 

Fx ¼ Fxfl þ Fxfr þ Fxrl þ Fxrr  Mz ¼  d2 Fxfl  Fxfr þ Fxrl  Fxrr

ð4Þ

the DDEV dynamic model can be established as  " Beq ¼

^kfl mR d^k  2Iz flR

^kfr mR d^kfr 2Iz R

V_ x c_



 ¼

^krl mR ^  2IdkzrlR

 f1 ðxÞ þ Beq ½ ufl f2 ðxÞ ^krr mR d^krr 2Iz R

# ( ;

f2 ðxÞ ¼

ufr

url

urr T

f1 ðxÞ ¼ bvx c 2Cf l2f þ 2Cr l2r 2Cf lf 2Cr lr bþ Iz I z vx

ð5Þ

c

2Cf lf Iz

df

3 Control System Design Figure 2 shows the control framework. The reference yaw rate cref and velocity Vxr are acquired based on the df and pedal signal. In the upper controller, the additional yaw moment Mz is produced by ASMC. Longitudinal force Fx is obtained by proportionalintegral (PI) controller. Then, the FTCA distributes torque to the four motors based on these two virtual control inputs and the fault factor.

254

G. Liu et al.

ASM-FTCA

β

+ -

γ ref +

Pedal signal Reference Model V + δf ref

Vx

βˆ

ASM

FT-CA

-

γ

-

δf

MZ

PI

up

4WID Drive syetem

Tx

FX

Fault Diagnosis ρ

FZ

Sideslip Angle Observer

γ

Fig. 2. Framework of the ASMC-FTCA.

3.1

Sideslip Angle Observer

In this paper, c and the lateral acceleration ay are considered as the input variable of the state observer. When vehicle speed Vx is invariant the observer is designed as 8   1 _ ^ > ay < ^c ¼ a22 c þ a21 b þ b2 df þ q1 j~cj2 signð~cÞ þ q3 ~   1 _ ^ ^ 2 b ¼ a12 c þ a11 b þ b1 df þ q2 j~cj signð~cÞ þ q4 ~ ay > : ^ ^ay ¼ c12 c þ c11 b þ c13 df

ð6Þ

2



a11 a21

3 2 3 2ðCf þ Cr Þ 2ðlf Cf  lr Cr Þ 2Cf 2 3  1  6   7 6 mvx 7 c11 mVx mVx2 a12 6 7 b1 7 4 5 ¼6 ¼6 7; 4 2lf Cf 5; c12 a22 4 2ðlf Cf  lr Cr Þ 2ðl2f Cf þ l2r Cr Þ 5 b2 c13 Iz Iz 3 Iz Vx 2 2ðCf þ Cr Þ m 6 7 2ðlf Cf lr Cr Þ 7 ¼6 4 5 mVx 2Cf m

~ ¼bb ^ and where qi(i = 1, 2, 3, 4) are the control factor of the observer, ~c ¼ c  ^c; b ~ ay ¼ ay  ^ay can be described as 8   ~  q1 j~cj12 signð~cÞ  q3 ~ > ay < ~c_ ¼ a22~c þ a21 b   1 _~ ~  q2 j~cj2 signð~cÞ  q4 ~ b ¼ a12~c þ a11 b ay > : ~ ~ay ¼ c12~c þ c11 b

ð7Þ

The Lyapunov function V ð~cÞ ¼ 12 ~c2 is constructed to verify the stability of the SMO. The time derivative of the V ð~cÞ is h i ~  q1 j~cj12 signð~cÞ V_ ð~cÞ ¼ ~c Q~c þ W b

ð8Þ

Fault Tolerant Control Allocation Based on Adaptive Sliding Mode Control

255

where Q = a22-q3c11, W = a21-q3c12. The following function will be obtained if q1 is large enough.    ^ dQ~ce þ W b  þ j1 q1  ð9Þ 1 j~cj2 and j1 > 0, it can be obtained   h  i ~  dQ~ce þ W b ^ þ j1 signð~cÞ V_ ð~cÞ  ~c Q~c þ W b   j1 j~cj  0

ð10Þ

According to the Lyapunov stability, ~c is stable. Then, ~c ¼ 0 and ~c_ ¼ 0 can be obtained. The first subsystem in (7) can be expressed as h

1

j~cj2 signð~cÞ

i eq

¼

~ Wb q1

ð11Þ

substituting (11) into the second subsystem of (7) ~_ ¼ b

q2 ða21  q3 c12 Þ ~ a11   q4 c12 b q1

ð12Þ

 ~ ¼b ~b. ~_ It can be concluded that b ~ will converge to zero by According to V_ b properly selecting observer gains qi(i = 2, 3, 4). 3.2

Control Layer Design: Upper Controller

The Vxr is acquired from the pedal signal. The reference velocity of the vehicle is expressed as Z Vxr ¼ V0 þ

t

axr dt

ð13Þ

t0

For simplification, the PI controller is adopted to obtain the longitudinal forces Fx. The ASMC control is used to enhance the system robustness against the parameters variation. The yaw rate and sideslip angle are selected to design the sliding surface ^b Þ s ¼ ðc  cd Þ þ nðb d

ð14Þ

256

G. Liu et al.

where n is weight factor which is a positive value. For reducing the chattering and improving the transient performance of the system, an adaptive reaching law [17] is chosen as. s_ ¼ ejsjr edjsj satðs=MÞ   satðs=MÞ ¼



aþ 1þ

k 1 k xk 1

s  a edjsj

ð15Þ

s; if jsj  D sgnðs=MÞ; if jsj [ D

where e > 0, 0 < r < 1, k > 0, x > 0, d > 0, x is the system status variable. According to the equation in (3), the controller Mz is expressed as 



^_  bÞ _  2 lf Cf  lr Cr b  Mz ¼ Iz ½_cd þ fðb þ



aþ 1þ

k 1 k xk1

 2 l2f Cf þ l2r Cr vx

c þ 2lf Cf df þ ejsjr edjsj satðs=MÞ

s  a edjsj

ð16Þ Define Lyapunov function as 1 V ðsÞ ¼ s2 2

ð17Þ

The derivative of system (12) is expressed as _ VðsÞ ¼ s_s ¼ ejsjr edjsj satðs=MÞs 

 aþ 1þ

k 1 k xk 1

s2  a edjsj

ð18Þ

_ Noting that 1 þ kx1k  a [ 0, V\0, according to Lyapunov theory, the system is 1 stable. The reaching speed is decided by the distance of the sliding mode switching function to the balance point. When the |s| is increasing, the control variables of the system reach to |s| mainly according to the means of the index −k=a. When ||x||1 is close to |s|, variable velocity term −e|s|rsat(s=Δ) plays a key role which decreases gradually and approaches zero. Therefore, this adaptive controller can adjust dynamically according to the change of the system states which can moderate the chattering and shorten the reaching time.

Fault Tolerant Control Allocation Based on Adaptive Sliding Mode Control

3.3

257

Fault Tolerant Control Allocation (FTCA)

In this section, the FTCA is used to assign the desired torques to the motors even the motor faults. It can be described as   Fx ð19Þ ¼ Beq ½ ufl ufr url urr T Mz In order to keep the vehicle stay away from the edge of losing its stability, we should keep the tire in the boundary of its adhesive force. Hence, the optimal objective is minimize the tire utilization rate, which is expressed as X X F2 X ^k2 ui 2 xi i gi ¼ ¼ ð20Þ J1 ¼ R2 lFzi ðlFzi Þ2 where Fzi and l represent the dynamic tire load and the road adhesion coefficient respectively. The four control signal u of the actuators need to submit to (19) and the output constraint. Hence, the FTCA problem is expressed as X   2 J ¼ J1 þ J2 ; J1 ¼ g; J2 ¼ c1 Beq u  v 2 ð21Þ where v = [Fx Mz]T, The positive constant c1 is weight factor. Transform problem (21) into a standard quadratic (QP) formulation. First, let X ¼ u  u; Xmax ¼ u  u

ð22Þ

By extending J1, J2, they can be rewritten as ^k 2 X þ u 2

 2 J1 ¼ 2 ; J2 ¼ c1 Beq X  ap 2 lFz R

 where ap ¼  Beq u  v It can be obtained as following. J1 ¼

ð23Þ

^k2 X T X ^k2 X T u ^k2 uT X ^k2 uT u þ þ þ R2 ðlFz Þ2 R2 ðlFz Þ2 R2 ðlFz Þ2 R2 ðlFz Þ2

J2 ¼ X T BTeq cT1 c1 Beq X  X T BTeq cT1 c1 ap  aTp cT1 c1 Beq X þ aTp cT1 c1 ap

ð24Þ

Let H1 ¼

^k 2 R2 ðlFz Þ

2

; C1T ¼

^k2 uT R2 ðlFz Þ

2

; R1 ¼

^k2 uT u R2 ðlFz Þ2

H2 ¼ BTeq cT1 c1 Beq ; C2T ¼ aTp cT1 c1 Beq ; R2 ¼ aTp cT1 c1 ap

ð25Þ

258

G. Liu et al.

where H1 ; H2 2 R44 , C1T ; C2T 2 R14 , R1 ; R2 2 R11 , therefore, it can be obtained that H ¼ 2ðH1 þ H2 Þ; C T ¼ C1T þ C2T ; R ¼ R1 þ R2

ð26Þ

then (21) becomes a quadratic programming(QP) problem as 1 min J ¼ X T HX þ CT X þ R 2 s:t: 0  X  Xmax

ð27Þ

The optimization matrix H and Beq can adjust automatically according to the fault factor which can maintain the vehicle stability when the actuator fails.

4 Simulation Result In this section, two kinds of faulty conditions are simulated by Simuink-Carsim. The DDEV parameters are listed as follow (Table 1). Table 1. Parameters of the DDEV Parameter M d If Ir Iz R Cf,r

4.1

Value 1423 kg 1.739 m 1.04 m 1.56 m 1523 kg∙m2 0.311 m 25796 N/rad

Straight Line Simulation

The DDEV drives at 80 km/h on straight road which road friction factor is 0.2. At 4 s, the front-right wheel fault factor qfr changed from 0 to 0.4. Then qfr changed from 0.4 to 1 at 12 s. The states of the 4WID-EV can be seen from Fig. 3. Figure 3(a) shows that the yaw rate without control has changed as soon as fault factor changes, but the yaw rate with control changes in a small extent. This faulty yaw changing may mislead the driver into wrong operation which makes the vehicle lose the stability. Because of the decrease of the torque output, the speed of the vehicle without control reduced for twice in Fig. 3(b). Figure 3(c) shows the motor torques with control. When the fault factor changes first, the other three motor torques updates within a low extent to keep torques on the both sides equal. At 12 s, the system distributes more torque to the rear-right hub motor to keep the torques on both sides equal. Figure 3(d) shows the vehicle displacements with/without control. It can conclude that the DDEV with control can trace the reference trajectory without driver’s correction but the system without control deviates from the reference trace.

Fault Tolerant Control Allocation Based on Adaptive Sliding Mode Control Reference

Yaw rate deg/s

0

With control

80.01

Without control

Longitudinal velocity km/h

0.02

-0.02 -0.04 -0.06 -0.08 -0.1 -0.12 0

5

10 Time s

15

80 79.99 79.98 79.97 Reference

79.96

With control

Without control

79.95 79.94 0

20

(a) Yaw rate

5

10 Time s

15

20

(b) Longitudinal velocity 1

16 Tfl Trl

12

Tfr Trr

Lateral displacement m

14

Torque N*m

259

10 8 6 4 2

ρ fr = 0.4

0

ρ fr = 1

-2 0

5

10 Time s

15

20

(c) Motor torques with ASMC-FTCA

0 -1 -2 -3 -4 -5

Reference

With control

Without control

-6 0

100 200 300 Longitudinal displacement

m

400

(d) Traveling trajectory

Fig. 3. States of the DDEV with straight line.

4.2

Single Lane Change Simulation

On the same low tire-road friction coefficient road, the DDEV drives at 80 km/h with single lane change. Under this condition, the front-right wheel fault factor qfr is changed from 0 to 0.4 at 4 s. Then, qfr is changed from 0.4 to 1 at 7 s. The states of the DDEV are given in Fig. 4. Figure 4(a) shows that yaw rate without control has changed as soon as fault factor changes, but the yaw rate with control changes in a small extent. Figure 4(b) shows that there is a slight change of the sideslip angle in the response without control. It has to be noted that the steering angle is preset so the situation of driver unreasonable operation didn’t happen in the simulation, that is why the yaw rate and sideslip angle without control change in a slight extent when the fault happens. Figure 4(c) shows the motor torques outputs with FTCA. When the fault factor changes first, the other three motor torques updates to keep the torques on both side equal. At 7 s, the vehicle with ASMCFTCA control distributes more torque to the rear-right hub motor to compensate the torque loss of the right side. Figure 4(d) shows the vehicle displacements with/without control. The vehicle without control is far away from the reference trajectory but the vehicle with control can trace the anticipated trajectory so that the driver have no necessity to adjust the front steering angle.

260

G. Liu et al.

6

0.2 Reference

0.15

With control

2

Sideslip angle deg

Yaw rate deg/s

4

Without control

0 -2 -4

0.1 0.05 0

Reference

-0.05

Observation with control

-0.1

Observation without control

-0.15

-6 0

5

10 Time

s

15

20

-0.2 0

(a) Yaw rate

10 Time s

15

20

(b) Sideslip angle 2

25

Tfl

Tfr

Trl

Lateral displacement(m)

30

Torque N*m

5

Trr

20

ρ fr = 0.4

15 10 5 0

ρ fr = 1

-5 0

5

Reference

0

With control

-2

Without control

-4 -6 -8 -10

10 Time(s)

15

20

(c) Four motor torques with ASMC-FTCA

0

100 200 300 400 Longitudinal displacement(m)

(d) Traveling trajectory

Fig. 4. States of the DDEV with single lane change;

5 Conclusion This paper has proposed an ASMC-FTCA strategy for DDEV to enhance the stability of the vehicle on low tire-road friction coefficient road when actuator fails. The sideslip angle of the DDEV is estimated by state observer. An ASM controller with a fractional power term reaching law is used to enhance the reliability of the system in critical situations. In the lower controller, the FTCA is used to cope with the motor fault. The simulation shows that the ASMC-FTCA can maintain the safety of the DDEV in critical situations.

References 1. Wang Y, Yu S, Yuan J, Chen H (2018) Fault-Tolerant control of electric ground vehicles using a triple-step nonlinear approach. IEEE-ASME Trans Mechatron 23(4):1775–1786 2. Zhou H, Jia F, Jing H, Liu Z, Güvenç L (2018) Coordinated longitudinal and lateral motion control for four wheel independent motor-drive electric vehicle. IEEE Trans Veh Technol 67 (5):3782–3790 3. Wang R, Wang J (2014) Actuator-redundancy-based fault diagnosis for four-wheel independently actuated electric vehicles. IEEE Trans Intell Transp Syst 15(1):239–249 4. Gao Z (2015) Fault estimation and fault tolerant control for discrete-time dynamic systems. IEEE Trans Ind Electron 62(6):3874–3884 5. Wang R, Wang J (2011) Fault-tolerant control with active fault diagnosis for four-wheel independently driven electric ground vehicles. IEEE Trans Veh Technol 60(9):4276–4287

Fault Tolerant Control Allocation Based on Adaptive Sliding Mode Control

261

6. Zhang G, Zhang H, Huang X, Wang J, Yu H, Graaf R (2016) Active fault-tolerant control for electric vehicles with independently driven rear in-wheel motors against certain actuator faults. IEEE Trans Control Syst Technol 24(5):1557–1572 7. Guo B, Chen Y (2018) Robust adaptive fault tolerant control of four wheel independently actuated Electric vehicles. IEEE Trans Ind Inf. 64(8):1109–1119 8. Yang H, Cocquempot V, Jiang B (2010) Optimal fault-tolerant path tracking control for 4WS4WD electric vehicles. IEEE Trans Intell Transp Syst 11(1):237–243 9. Zhang D, Liu G, Zhou H, Zhao W (2018) Adaptive sliding mode fault tolerant coordination control for four wheel independently driven electric vehicle. IEEE Trans Ind Electron 65 (3):9090–9100 10. Xu P, Hou Z, Guo GF, Xu G, Cao BG, Liu ZL (2011) Driving and control of torque for direct-wheel-driven electric vehicle with motors in serial. Expert Syst Appl 38(1):80–86 11. Ding S, Liu L, Zheng WX (2017) Sliding mode direct yaw-moment control design for inwheel electric vehicles. IEEE Trans Ind Electron 64(8):6752–6762 12. Li L, Lu Y, Wang R et al (2016) A 3-dimensional dynamics control framework of vehicle lateral stability and rollover prevention via active braking with MPC. IEEE Trans Ind Electron. https://doi.org/10.1109/TIE.2016.2682024 13. Yang Z, Zhang D, Sun X et al (2018) Adaptive exponential sliding mode control for a bearingless induction motor based on a disturbance observer. IEEE Access 6:1938–1948

Research on Sliding Mode Active Disturbance Rejection Control and Thrust Allocation of Dynamic Positioning System Zaiji Piao and Chen Guo(&) School of Marine Electrical Engineering, Dalian Maritime University, Dalian, China [email protected]

Abstract. In order to further improve the control ability of dynamic positioning ship or platform under complex sea conditions, the controller and thrust allocation system of dynamic positioning are designed. A simplified three-degreeof-freedom MMG mathematical model is established for the pod full-rotation propeller used in most dynamic positioning ships. On the basis of retaining the advantages of active disturbance rejection control, the sliding mode variable structure control method is adopted to design the control law. The objective function and constraints of thrust allocation are designed based on the lowest energy consumption, and the sequential quadratic programming algorithm is used to calculate the real-time thrust allocation of each propeller. The simulation results of the ship dynamic positioning system in MATLAB show that the controller can maintain the stability and robustness of the system under the condition of external environment disturbance, and the results of the thrust allocation are reasonable, which has a certain reference value for the further study of the ship dynamic positioning control system. Keywords: Sliding mode control  Dynamic positioning system Thrust allocation  Sequential quadratic programming



1 Introduction According to the definitions of IMO (International Maritime Organization), norwegian classification society and so on, ship dynamic positioning means that a ship uses the propulsion generated by its own propulsion system to resist the disturbances of wind, wave, current and other external environmental disturbances, so that the ship can automatically maintain a fixed position on the sea surface or track an expected trajectory accurately [1]. Fossen et al. classified and analyzed the existing thrust allocation strategies in detail [2]. Webster transforms the thrust allocation problem into a linear programming problem [3]. ADRC is a new nonlinear control algorithm proposed by Han on the basis of nonlinear PID in recent years. It has strong anti-interference ability and does not depend on the precise model of the control object. It solves the problems existing in modern control. LEI applied ADRC to the control system of ship dynamic positioning [4]. Tracking differentiator was used to arrange the transition process. Although it © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 262–269, 2020. https://doi.org/10.1007/978-981-32-9050-1_30

Research on Sliding Mode Active Disturbance Rejection Control

263

solved the contradiction between overshoot and response speed, the process of realization is more complicated and the process of parameter setting was more complicated. Sliding mode variable structure control does not depend on specific mathematical model, and has strong robustness [5], but there are some chattering problems, which affect the practical application. Based on the advantages of sliding mode control and ADRC, this paper presents an auto-disturbance rejection control method for semi-submersible ship dynamic positioning. The extended state observer (ESO) was used to estimate the unknown states and uncertainties of the dynamic positioning control system. The sliding mode control law was designed to improve the control performance and effectively suppress the chattering problem of the traditional sliding mode control.

2 Mathematical Model of Marine Dynamic Positioning System 2.1

Ship Mathematical Model

The equation for dynamic positioning of ships at low frequencies can be written as follows: 

g_ ¼ RðwÞV M V_ þ DV ¼ sT þ sW þ w

ð1Þ

Among them, g ¼ ½xG0 ; yG0 ; wT is the position vector of the ship, that is, the position of the ship in inertial coordinates and the heading angle; V ¼ ½u; v; r T is3the 2 cos w sin w 0 velocity vector of the ship’s low-frequency motion; RðwÞ ¼ 4 sin w cos w 0 5 is 0 0 1 the transformation matrix between the position coordinates of ships and the state of motion of ships; sT ¼ ½XT YT NT T is the control in 2 3quantity 2 calculated by the controller 3 Xwave þ Xwind þ Xcurrent Xw the dynamic positioning system; sW ¼ 4 Yw 5 ¼ 4 Ywave þ Ywind þ Ycurrent 5 is the Nw Nwave þ Nwind þ Ncurrent disturbance force and moment caused by wind, wave and current in the marine environment, dynamic disturbance of the 2 and w is the unmodeled 3 2 system; Inertia matrix 3 m  Xu_ Xu 0 0 0 0 M¼4 0 m  Yv_ Yv Yr 5. Yr_ 5; Damping matrix D ¼ 4 0 0 Nv_ Izz  Nr_ 0 Nv Nr In this paper, we calculate the M and D values based on a series of linear hydrodynamic equations summarized by Clarke.

264

2.2

Z. Piao and C. Guo

A Model of Disturbance Force on Ship

The stability of dynamic positioning ship in low frequency motion, that is to say, the stability and accuracy of dynamic positioning are mainly affected by uncertain environmental disturbances in the ocean. Among them, the ocean disturbance force which can cause the position fluctuation of ship dynamic positioning system usually has the second-order dynamic force of wave, current and average wind. Their expressions can be described as [6]: 8 < XW ¼ Fe cosðbe  wÞ YW ¼ Fe sinðbe  wÞ ð2Þ : NW ¼ lx sinðbe  wÞ  ly cosðbe  wÞ 

pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi 2 þ Y2 Fe ¼ XW W be ¼ w þ tan1 ðYW =XW Þ

ð3Þ

Among them, Fe is a steady force which changes  slowly; be is the average angle value of the external disturbance to the ship; lx ; ly is regarded as the action point of the total disturbance on the ship. Marine environmental disturbance is a variable that varies with the course of a ship. For the unmodeled dynamic disturbance of ship dynamic positioning system w ¼ ½w1 ; w2 ; w3 T , the following mathematical expressions are used to describe: 

w ¼ JT ðgÞb b_ ¼ T1 b þ Eb xb b

ð4Þ

Among them, b 2 R3 represents deviation force and moment, Eb ¼ diagfEb1 ; Eb2 ; Eb3 g, xb is Gaussian white noise and Tb is a diagonal matrix, including forward pressure time constant.

3 Sliding Mode Active Disturbance Rejection Control The structure of ADRC is shown in Fig. 1 [7], its control law contains non-linear function and its parameters are not easy to determine. Because the process of designing the control law by sliding mode control technology is simple and easy to implement, this paper considers sliding mode control technology to design the control law of ADRC. The control principle is to design the switching superplane of the system according to the desired dynamic characteristics of the system, and to switch the system state from the other place to the superplane by sliding mode controller [8].

Research on Sliding Mode Active Disturbance Rejection Control

X n (t ) X 0 (t )

TD

.. .

X1 (t )

en (t )

-. -

..

e1 (t )

N L S E F

265

w(t )

u 0 (t )

u(t )

-

Object

y(t )

Zn +1 (t ) b0

.. .

Zn (t )

E S O

Z1 (t )

Fig. 1. The structure of ADRC

The steps of designing sliding mode ADRC controller are: (1) The input and output signals of the system and the disturbances are observed and estimated reasonably by designing TD and ESO. (2) Design the switching function s(x), so that the sliding mode determined by it is asymptotically stable and has good dynamic quality. (3) Design u ðxÞ, thus forming a sliding mode area on the switching surface. This control law is used as the control law of ADRC. It is known from (1): V_ ¼ M 1 DV þ M 1 ðsT þ sD Þ

ð5Þ

V ¼ ½u; v; rT are ship longitudinal velocity, lateral velocity and turning angle velocity, g ¼ ½x; y; wT are the coordinate and course angle of the ship. €g ¼ RðwÞV_ ¼ RðwÞM 1 DRðwÞ1 g_ þ RðwÞM 1 sT þ RðwÞM 1 sD

ð6Þ

Expected ship position signal were set gd ¼ ½xd ; yd ; wd T , e ¼ g  gd . The switch function is defined as: s ¼ e_ þ Ce

ð7Þ

C is a diagonal matrix of 3  3, C = diag(c1 ; c2 ; c3 ). So s_ ¼ €e þ Ce_ , The design of controller based on the reaching law method can adopt exponential reaching law: s_ ¼ esgnðsÞ  ks; e [ 0; k [ 0

ð8Þ

266

Z. Piao and C. Guo

In summary, the three-dimensional sliding mode control law can be calculated as follows: u0 ¼ ðRðwÞM 1 Þ1 ðC e_ þ esgnðsÞ þ ks þ RðwÞM 1 DRðwÞ1 g_  RðwÞM 1 sD Þ

ð9Þ

Thus, the control equation are: e ¼ z1  y z_ 1 ¼ z2  b01 e

9 > > > > > > > > =

z_ 2 ¼ z3  b02 falðe; a1 ; d1 Þ þ bu > z_ 3 ¼ b03 falðe; a2 ; d2 Þ > > > > > e1 ¼ x1  z 1 ; e2 ¼ x2  z 2 > > ; u ¼ u0  z3 =b

ð10Þ

4 Thrust Allocation The thrust allocation system is an extremely important part of the DPS. Its function is to allocate the force and direction of each thruster according to the force and moment calculated by the controller, so that the propulsion system can keep the ship in a fixed position or track a fixed track [9–11] (Fig. 2).

Fig. 2. Thrust optimization control system

The ship has two pairs of propeller: one is the SSP pod propeller, as the main thruster for the ship, and the other is the side thruster (Fig. 3).

Research on Sliding Mode Active Disturbance Rejection Control

267

Fig. 3. Propeller layout

The force and moment of a ship can be calculated according to the following formulas: 8 X ¼ F1 cosða1 Þ þ F2 cosða2 Þ > > > < Y ¼ F sinða Þ þ F sinða Þ þ F þ F 1 1 2 2 3 4 ð11Þ 1 > N ¼ ðF1 cosða1 Þ  F2 cosða2 ÞÞð2 L1 Þ > > : ðF1 sinða1 Þ þ F2 sinða2 ÞÞð12 L2 Þ þ ðF3 þ F4 Þð12 L3 Þ The objective function and constraint conditions designed are as follows [12–14]: 8 2 4 3 P P > > > min f ðF; dÞ ¼ PW þ Q ðai  ai1 Þ2 ; W ¼ ki Fi2 > > > i¼1 i¼1 > > > 2 > P > > > s:t: XT  Fi cos ai ¼ 0 > > > i¼1 > > > 2 > P > < YT  Fi sin ai  F3  F4 ¼ 0 ð12Þ i¼1 > > 1 > NT  (F1 cos(a1 Þ  F2 cos(a2 ÞÞð2 L1 Þ  ðF1 sin(a1 Þ > > > > > + F2 sin(a2 ÞÞð12 L2 Þ  ðF3 + F4 Þð12 L3 Þ ¼ 0 > > > > > Fmin  Fi  Fmax > > > > > amin  ai  amax > > > : Damin  ai  ai1  Damax

5 Simulation of Dynamic Positioning System This paper takes the ship named Taiankou as an example for simulation. After calculation, 2the M and D of the model are3 as follows:2 3 0:3418 0 0 0:0044 0 0 M=4 0 0:3336 0:0007 5 and D = 4 0 0:0186 0:0029 5. 0 0:0005 0:0228 0 0:0051 0:0024

268

Z. Piao and C. Guo 50 40

40 X/m

X/m

60

20

30 20 10

10

20

30 Y/m

40

50

0 0

60

50

50

40

40 Course

Y/m

0 0

30 20 10

50

100 Time/s

50

100 Time/s

150

200

30 20 10

0 0

50

100 Time/s

150

200

0 0

150

200

Fig. 4. Ship dynamic positioning 4

4

15 x 10 10

F2/N

F1/N

10 x 10

5

0 0

50

100 150 Time/s

200

5 0 0

250

6000

4000

2000

2000

0 0

100 Time/s 200

0 0

300

4

4

2

2

a2/rad

a1/rad

200

250

6000

4000

0 -2 0

100 150 Time/s

8000 F4/N

F3/N

8000

50

50

100 150 Time/s

200

250

100 Time/s 200

300

0 -2 0

50

Fig. 5. f thrust optimization

100 150 Time/s

200

250

Research on Sliding Mode Active Disturbance Rejection Control

269

The given system input is: x = 50, y = 50, w = 10, Disturbance of wind, wave and current:   Fe ¼ 300; be ¼ 120 sinðsin 0:3tÞ; lx ; ly ¼ ð20m; 5mÞ; Tb ¼ diagf1000; 1000; 1000g, Eb ¼ diagf1; 1; 1g, the simulation results are: From the above simulation results, we can see that this sliding mode active disturbance rejection control can complete the control target, and the thrust allocation module has also obtained reasonable results. This is of great significance to the maneuverability of double pod propulsion ship, and gives a complete control mode about dynamic positioning system (Figs. 4 and 5). Acknowledgement. Research supported by supported by National Natural Science Foundation of China (Nos. 51879027, 51579024, 61374114, 51809028) and the Fundamental Research Funds for the Central Universities (DMU No. 3132016311).

References 1. Sørensen AJ (2011) A survey of dynamic positioning control systems. Ann Rev Control 35 (1):123–136 2. Johansen TA, Fossen TI (2013) Control allocation—a survey. Automatica 49(5):1087–1103 3. Webster WC, Sousa J (1999) Optimum allocation for multiple thrusters. In: The ninth international offshore and polar engineering conference, International Society of Offshore and Polar Engineers 4. Lei Z, Guo C, Fan Y (2015) Dynamic positioning system based on active disturbance rejection technology. J Ocean Univ China 14(4):636–644 5. Shtessel Y, Edwards C, Fridman L et al (2014) Sliding mode control and observation. Springer, New York 6. Fossen TI, Strand JP (2001) Nonlinear passive weather optimal positioning control (WOPC) system for ships and rigs: experimental results. Automatica 37(5):701–715 7. Han J (2009) From PID to active disturbance rejection control. IEEE Trans Ind Electron 56 (3):900–906 8. Tannuri EA, Agostinho AC, Morishita HM et al (2010) Dynamic positioning systems: an experimental analysis of sliding mode control. Control Eng Pract 18(10):1121–1132 9. De Wit C (2009) Optimal thrust allocation methods for dynamic positioning of ships 10. Sørdalen OJ (1997) Optimal thrust allocation for marine vessels. Control Eng Pract 5 (9):1223–1231 11. Veksler A, Johansen TA, Skjetne R (2012) Thrust allocation with power management functionality on dynamically positioned vessels, 2012 American Control Conference (ACC), pp 1468–1475 12. Tannuri EA, Morishita HM (2006) Experimental and numerical evaluation of a typical dynamic positioning system. Appl Ocean Res 28(2):133–146 13. Johansen TA, Fossen TI, Berge SP (2004) Constrained nonlinear control allocation with singularity avoidance using sequential quadratic programming. IEEE Trans Control Syst Technol 12(1):211–216 14. Härkegård O (2004) Dynamic control allocation using constrained quadratic programming. J Guidance Control Dyn 27(6):1028–1034

Research on Indoor Positioning Method Based on Improved HS-AlexNet Model Libiao Zhang(&), Rui Zhao, Yuqing Liu, Xinyu Yang, and Shipeng Li School of Information Science and Technology, Northeast Normal University, Changchun 130117, Jilin, China [email protected]

Abstract. Scene recognition is the key to achieving accurate and fast indoor positioning. Deep network has become a research central issue lately with its outstanding performance. This paper puts forward an advanced AlexNet network model combined with Harris feature detection, which guides the image processing of the original model according to the detected Harris characteristics, it reduces the randomness error and improves the generalization ability and robustness of the model. In addition, for the campus indoor scene positioning environment, the original structure of the AlexNet network model and the data augmentation method are improved, so that the positioning model can cope with the complex and variable positioning environment, and its accuracy and speed reach a high level. The method can be combined with the existing mainstream visual indoor positioning method to enhance the accurateness and speed of positioning system. Keywords: Scene recognition  AlexNet network model Data augmentation  Indoor positioning

 Harris features 

1 Introduction Recently, with the progress of vision indoor positioning technology [1, 2], scene recognition occupies an important position [3, 4] in indoor positioning and gains widespread attention. Scene recognition is judging the category of scene by observing the content contained in the image [5]. Deep learning has greatly improved the recognition rate of scene classification and has become a research trend. Krizhevsky [6] applied the AlexNet convolutional neural network to ImageNet image classification, using random clipping and mirroring data augmentation to achieve good results; Zeiler [7] proposed ZF Net based on the optimization of AlexNet architecture; Karen [8] increased the network depth by adding more convolution layers based on the network structure of ZF Net, which proved that depth is beneficial to classification accuracy; SVETLANA [9] proposes a multi-scale disordered pooled convolutional neural network (MOP-CNN), which combines multi-scale features with CNN to improve the classification and matching effect of the model on variable scenes; Zhong [10] was inspired by Bolei to propose a supervised data augmentation method. According to the appearing probability of the target object at different positions, © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 270–277, 2020. https://doi.org/10.1007/978-981-32-9050-1_31

Research on Indoor Positioning Method Based on Improved HS-AlexNet Model

271

different clipping regions were selected to improve the recognition accuracy. Inoue [11] proposed an efficient data augmentation method, which can expand the training set size from N to N*N. Based on the above analysis, inspired by the supervised data augmentation [13, 14] proposed by Q Zhong et al., this paper puts forward an advanced AlexNet network model combined with Harris feature [12].

2 Related Work 2.1

AlexNet Network Model

In 2012, the effect of the AlexNet model proposed by Krizhevsky et al. in the ImageNet ILSVRC-2012 image classification problem is much higher than the traditional method. It has become the classic to open deep learning. The structural model of AlexNet is shown in Fig. 1. The model is divided into 7 layers, including 5 layers of convolutional layers and 2 layers of fully connected layers.

Fig. 1. AlexNet network model

In order to prevent the over-fitting phenomenon, AlexNet randomly intercepts the 224 * 224 area from the original image of 256 * 256, and the horizontally flipped image. The use of data enhancement can greatly reduce over-fitting and improve generalization ability. When making predictions, it takes 5 positions in the picture and flips left and right. AlexNet uses the ReLU function as the activation function of the network to obtain the feature map of each layer. Other activation functions may have supersaturation characteristics during the gradient descent. The mathematical expression of the ReLU is: f ðxÞ ¼ maxð0; xÞ

ð1Þ

272

L. Zhang et al.

Local standardization helps generalization. AlexNet uses LRN local response normalization. The formula is as follows: bix;y ¼ aix;y =ðk þ a

XminðN;i þ n=2Þ j¼maxð0;i2=nÞ

ðaix;y Þ2 Þb

ð2Þ

Where aix;y denotes the value of the ith convolution kernel passing through the ReLU unit at the ðx; yÞ position, N is the number of kernels of the layer, and k; n; a; b are preset hyperparameters. The Dropout strategy prevents the model from overfitting by modifying the structure of the neural network itself. For each hidden layer’s output, it is set to 0 with a 50% probability, no longer acting on the forward or backward process. Such weight update does not depend on the joint action of the fixed relationship implicit nodes, preventing certain feature weights from being valid only under certain characteristics. AlexNet uses this strategy in the last two fully connected layers. 2.2

Harris Feature Detection

The Harris detection algorithm is based on the H. Moravec algorithm by Chris and Mike. The eigenvalue of the autocorrelation matrix M is the first-order curvature of the autocorrelation function. The Harris corner detection algorithm uses the row and column curvature value of a point in the image as the basis for judging whether it is a corner point. It is assumed that the rectangular window W centered on the target pixel is shifted in any direction ðu; vÞ into Eðu; vÞ, which is defined as shown below: Eðu; vÞ ¼

X x;y

wðx; yÞ½I ðx þ u; y þ vÞ  I ðx; yÞ2

ð3Þ

According to the Taylor series: X

Eðu; vÞ ¼

x;y

¼

 2 wðx; yÞ Ix u þ Iy v 

X

wðx; yÞ½u þ v x;y

Ix2 Ix Iy

Ix Iy Iy2

  u v

ð4Þ

Provisions: M¼

X

wðx; yÞ x;y



Ix2 Ix Iy

Ix Iy Iy2

 ð5Þ

The matrix M is an autocorrelation matrix whose eigenvalues (set to k1 , k2 ) reflect the curvature of the autocorrelation function Eðu; vÞ. When both eigenvalues are small, it indicates a flat area; one eigenvalue is larger, and the other is smaller, it represents an edge; when both eigenvalues are larger, it is a corner point.

Research on Indoor Positioning Method Based on Improved HS-AlexNet Model

273

3 Feature Detection HS-AlexNet Improved Model Because the AlexNet network model is designed for the data set of 1000 categories of the ImageNet [15] contest, including many aspects such as biology, transportation, life, and scenes. It has a strong generalization ability for generalized classification problems, but it is difficult to show good performance in indoor location. 3.1

Feature Detection and Data Augmentation

For the generalized classification problem, the AlexNet model uses random crop-ping and horizontal flip mirroring to augment the data [16], which reduces the occurence of overfitting and improves the generalization ability of the model. However, the edge of the image with discriminative meaning is randomly cropped. In order to reduce the possibility of occurrence of such randomness errors, cropping preserves more discriminative image regions, detects the image Harris corner feature firstly, and selects the region with the largest or most dense feature as the crop-preserving region, improving the semantics of the image set. In the scene recognition problem, image data acquisition is affected by many factors such as illumination changes, noise jitter and sensor rotation changes. The original AlexNet network model has a poor fitting effect in the scene recognition problem, and it is difficult to obtain accurate positioning results in the actual application scenario. Aiming at the above problems, this paper proposes to improve the data augmentation mode of the original model, and use the random rotation fixed range angle, changing the image brightness, and the random distance within the fixed range to add the fuzzy interference to expand the training set. 3.2

Model Structure Design and Optimization

For the small-resolution campus indoor scene dataset, the original network model structure is difficult to effectively extract effective local features, resulting in low positioning accuracy. In response to the above problems, combined with the characteristics of the campus indoor scene dataset, the original model structure is adjusted and optimized. For the 127 * 127 campus indoor scene image set, the convolution kernel 11 * 11 of the first convolutional layer is too large to express the effective information of the local features. Therefore, the size of the convolution kernel of the first layer convolutional layer is modified to be 7 * 7, and a better feature extraction effect is obtained. The AlexNet network model is subjected to convolution and pooling to obtain a feature map of size 6 * 6. Input to the fully connected layer will generate a large number of network parameters, and there is a tendency to overfit. So, this paper adds a pooling layer after the 5th the pooling layer, the pooling operation scale is 3 * 3, and the operation step is 2. Simultaneously, after the dropout layer behind the second fully connected layer, a layer of dropout layer is added to further alleviate the over-fitting phenomenon and reduce the computational complexity.

274

L. Zhang et al.

4 Analysis of the Experiment and Results 4.1

Experiment Data

Common scene datasets include the Scene15 dataset, the SUN397 dataset, the SUN Attribute dataset [17] and the MIT Indoor67 dataset [18] The experiment selects common indoor scenes in the campus from three different data sets, including classrooms, computer rooms, laboratories, libraries and corridors. Simultaneously, manually collected campus indoor scene images are added in each category, and each category has 500 images, which constitute a campus indoor scene School dataset. The dataset is divided into training, verification and test set according to the ratio of 8:1:1. The specific situation of the School data set is as follows (Table 1). Table 1. School dataset. Heading level MIT 67 SUN attribute SUN397 Manual collection Sum Training set 400 175 1159 267 2001 Verification set 50 25 147 33 255 Testing set 50 20 142 32 244 Sum 500 220 1448 332 2500

4.2

Experiment Result

The Harris corner feature is extracted from the School dataset, and the cutting mode that retains the maximum number of feature points is selected for cropping. The feature point extraction and cropping result are shown in Fig. 2.

Fig. 2. Feature point extraction.

The data set after the cropping process is 10 times of the original data by randomly rotating the arbitrary angle, decentralized, horizontal and vertical directions, and the image is enhanced as shown in Fig. 3.

Research on Indoor Positioning Method Based on Improved HS-AlexNet Model

275

Fig. 3. Data augmentation.

The Alexnet model was applied to the School dataset test with an accuracy of 73.2%. The convolution kernel size n of the first layer convolutional layer of the network model structure is adjusted to 7,9, and the model accuracy is improved to 78.4% and 73.8%. Therefore, when the first layer convolution kernel size is 7 * 7, the model accuracy rate is high, and the experimental results are as follows (Fig. 4).

Fig. 4. Different convolution kernel size.

After the pooling layer is added, the accuracy rate is improved to 78.8%, but there is an over-fitting trend. After the dropout layer is added, the accuracy is stable at about 74.8%, the network is more stable, and the convergence speed is higher (Fig. 5). Based on the Harris feature detection, the angles of random rotation angles are 0, 10, 20, and 30, respectively. The decentering processing and the random distance in the fixed range are added to the fuzzy interference mode for data augmentation, and the accuracy is improved. The result is shown in Fig. 6. The smaller the degree of rotation of the image, the faster the convergence is achieved, but the tendency to overfit is more. The random rotation angle is within 30°, and the fuzzy interference is randomly added within the translation distance of 20 px. The effect is optimal, there is no over-fitting trend, and the accuracy rate is increased to 79.2%.

276

L. Zhang et al.

Fig. 5. Adding pooling layer and dropout layer.

Fig. 6. Random rotation angles.

5 Conclusion Computer vision positioning is a research hotspot and development trend in indoor positioning. Scene recognition is a key step in visual indoor positioning. An indoor scene localization method based on feature detection and AlexNet model is proposed in this paper,. The indoor scene recognition based on neural network is applied to indoor positioning to reduce the influence of random error factors generated in the positioning process on the model, improve positioning accuracy and stability, and achieve precise semantic positioning. Experiments show that the improved model data augmentation method and model structure for indoor positioning environment can enhance the accurateness and effect of positioning in effect. In the future, scene recognition can be further refined into indoor positioning to achieve a more refined level of indoor positioning of the scene.

Research on Indoor Positioning Method Based on Improved HS-AlexNet Model

277

References 1. Kim JY, Yang SH, Son YH (2016) High-resolution indoor positioning using light emitting diode visible light and camera image sensor. LET Optoelectron 10:184–192 2. Kawaji H, Hatada K, Yamasaki T (2010) Image-based indoor positioning system: fast image matching using omnidirectional panoramic images. In: International workshop on multimodal pervasive video analysis, pp 1–4 3. Wei H, Wang L (2018) Understanding of indoor scenes based on projection of spatial rectangles. Pattern Recogn 81:497–514 4. Madokoro H, Yamanashi A, Sato K (2013) Unsupervised semantic indoor scene classification for robot vision based on context of features using Gist and HSV-SIFT. Pattern Recogn Phys 1:93–103 5. Pandey M, Lazebnik S (2011) Scene recognition and weakly supervised object localization with deformable part-based models. In: International conference on computer vision, vol 23, pp 1307–1314 6. Krizhevsky A, Sutskever I, Hinton GE (2012) ImageNet classification with deep convolutional neural networks. In: International conference on neural information processing systems, vol 60, pp 1097–1105 7. Zeiler MD, Fergus R (2014) Visualizing and understanding convolutional networks. In: European conference on computer vision, vol 8689, pp 818–833 8. Simonyan K, Zisserman A (2014) Very deep convolutional networks for large-scale image recognition. Comput Sci 9. Gong YC, Wang LW, Guo RQ (2014) Multi-scale orderless pooling of deep convolutional activation features. In: European conference on computer vision, pp 392–407 10. Zhong Q, Li C, Zhang Y (2017) Cascade region proposal and global context for deep object detection. In: IEEE conference on computer vision and pattern recognition 11. Inoue H (2018) Data augmentation by pairing samples for images classification. In: International conference on learning representations 12. Harris C, Stephens M (1988) A combined corner and edge detector. In: Proceedings of fourth alvey vision conference, pp 147–151 13. Xue DX, Zhang R, Feng H (2016) CNN-SVM microvascular morphological type recognition with data augmentation. J. Med. Biolog. Eng. 36:755–764 14. Guo J, Gould S (2015) Deep CNN ensemble with data augmentation for object detection. Comput Sci 15. Russakovsky O, Deng J, Su H (2015) ImageNet scale visual recognition challenge. Int J Comput Vis 115:211–252 16. Jia S, Wang P, Jia P, Hu S (2018) Research on data augmentation for image classification based on convolution neural networks. In: Chinese automation congress, pp 4165–4170 17. Patterson G, Hays J (2012) SUN attribute database: discovering, annotating, and recognizing scene attributes. Comput Vis Pattern Recogn 157:2751–2758 18. Wang Z, Wang L, Wang Y (2017) Weakly supervised PatchNets: describing and aggregating local patches for scene recognition. IEEE Trans Image Process 26:2026–2041

A Modified Energy and Signal Coordination Control Strategy for a Robotic System Yu Wang, Haisheng Yu(&), Jinpeng Yu, Herong Wu, and Xudong liu Qingdao University, Qingdao 266071, China [email protected]

Abstract. A new smooth switching control strategy is devised to ameliorate the position tracking performance of the robotic arms. Firstly, a signal controller is based up the inverse of the modified backstepping sliding model control is project to improve the dynamic property of the system. An energy controller based on port-controlled Hamiltonian system (PCH) was designed and integrated control was introduced as compensation to improve the steady-state performance of the system. Finally, a smooth switching function based on tracking error is devised to achieve smooth switching between signal control and energy control. The permanent magnet synchronous motor (PMSM) motor model is introduced in the design to make the controller more in line with the actual demand, and it is decomposed into position controller and torque controller, which reduce the difficulty of implementation. In the last part of the paper, a two-degree-of-freedom robot is taken as an example to verify the feasibility and advantages of the algorithm. Keywords: Robotic manipulator

 PMSM  Hybrid control

1 Introduction In the actual robot dynamics, there are many adverse factors such as dynamic coupling, high non-linearity, time-varying parameters and unknown disturbance, so the tracking control of the robot is still challenging [1]. How to ameliorate the position tracking performance of the robot arms so that it has both excellent dynamic property and steady-state performance has become the research target of many scholars. Most of them design controller based on signal transform. A robust manipulator controller based on nonlinear observer is proposed in [2]. In [3], a robust control method based on position-torque conversion is proposed, which is expected to improve the position control accuracy by directly controlling the mechanical arm drive motor. Some scholars design the controller based on the viewpoint of energy transformation, whose control goal is to optimize the energy of the whole system. The idea of designing manipulator position controller based on PBC control method has a long history [4]. Some scholars also used the IDA-PBC control method to design a flexible articular manipulator to overcome the chattering problem of the manipulator and achieved good results [5]. In recent years, coordinated control strategy has attracted much attention due to its ability to give consideration to both dynamic performance and steady-state performance, and many achievements have been made [6, 7]. The (PMSM) has the advantages of energy © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 278–286, 2020. https://doi.org/10.1007/978-981-32-9050-1_32

A Modified Energy and Signal Coordination Control Strategy

279

efficient and small torque ripple, so the permanent magnet synchronous motor is selected as the servo drive of the robot arm [8]. In order to give consideration to the dynamic and static performance of the manipulator position control at the same time, this paper proposes the control strategy of coordinating the reverse step synovial control and PCH control, and designs the smooth switching function based on the joint position error. Simlink simulation proves the effectiveness and advantages of the algorithm.

2 Induction Motor Model The manipulator dynamics can be indicated as DðqÞ€q þ Cðq; q_ Þq_ þ GðqÞ ¼ sm  Rf q_

ð1Þ

where sm is the control torque; q is the vector of joint positions, M ðqÞ 2 Rnn is the inertial matrix, C ðq; q_ Þ 2 Rnn is the Coriolis force and centripetal force matrix, GðqÞ 2 Rn is the gravity torque vector; Rf 2 Rn is the Frictional coefficient matrix. The Kinetic function of PMSM can be expressed as 

h_ ¼ x Jm x_ þ Rm x ¼ s  sL

ð2Þ

where h is the motor position vector; x is the motor velocity vector; Jm is the motor rotational inertia matrix; Rm is the motor frictional coefficient matrix; sL is the load torque; s is the electromagnetic torque. For rigid manipulator, assuming that the motion is under ideal conditions. The relationship between the rotary axis of the servo motor and the corresponding joint axis can be expressed as. sm _ x_ ¼ k€ h ¼ kq; x ¼ h_ ¼ k q; q; sL ¼ k

ð3Þ

where k is the Reduction ratio. From (1), (2) and (3), we can derive generalized dynamics of n-joint manipulator can be described by ~ ðq; q_ Þq_ þ G ~ ð qÞ ¼ s ~ ðqÞ€q þ C D

ð4Þ

~ qÞ ~ ~ _ ¼ k1 Cðq; qÞ þ k1 Rf þ kRm , GðqÞ where DðqÞ ¼ k 1 DðqÞ þ kJm , Cðq; ¼ k1 GðqÞ. Through (4), the control input of the manipulator position control is equal to the electromagnetic torque of the servo motor.

280

Y. Wang et al.

Fig. 1. The system diagram of the hybrid control system based on sign control and energy control

3 Controller Design The system diagram of the hybrid control system is as follows Fig. 1 3.1

Design of Signal Controller

Modified Backstepping Sliding Model Control _ New we rewrite the dynamics model (4) to Let us defined x1 ¼ q and x2 ¼ q. 8
~yij max Yj is expected to be large > > 1  i  m;1  k  hij > > n o < sðk Þ ~yij Yj is expected to be small ¼ 1  i  min m;1  k  hij > n o > > sðk Þ > > ~yij Yj is expected to the target : one of the

ð6Þ

1  i  m;1  k  hij

The vector formed by the optimal ideal value of each response  þ þ is defined  as the þ þ positive ideal solution of the multi-response process: Y ¼ y1 ; y2 ;    ; yn . After determining the positive ideal solution of the response, the hesitant distance is calculated, and the extent of the hesitant fuzzy element ~yij ðj ¼ 1; 2;    ; nÞ to its ideal solution can be easily measured. Formula (7) is the definition of hesitant distance: ffi sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi 2  2  2

1  l m u þ þ þ ~cij  yj dij ¼ þ ~cij  yj þ ~ cij  yj 3

ð7Þ

The smaller hesitant distance is, the closer process response corresponding to the hesitant fuzzy element to its ideal solution is. Since it’s common to measure the good and bad of things with the big characteristic, the similarity is defined according to the hesitant fuzzy distance in formula (8): Sij ¼ 1  dij ; ði ¼ 1; 2;    ; n; j ¼ 1; 2;    ; mÞ

ð8Þ

3 Fuzzy Logic Inference and Robust Optimization Design As mentioned above, the traditional method usually obtains the comprehensive quality indicator via weight setting, and then it will optimize the parameter. However, in practical applications, the weight is sometimes difficult to obtain, and the weight setting cannot provide enough information to describe the relationship among the responses,

Parameter Optimization Control of Multiple Response Process

291

which will affect the result of parameter optimization. Fuzzy logic inference algorithm is introduced to simplify multi-response system. The comprehensive quality characteristic index–Fuzzy reasoning grade (FRG) will replace multi-response. There are some characteristics of fuzzy inference: the process of fuzzy inference can avoided weight setting firstly. Then it can fully consider the expert opinions. And it can also effectively utilize the mechanism relationship of the responses. (1) Ambiguity statements and fuzzy rules: Similarities are the inputs of fuzzy inference system, and FRG is the output. In the fuzzy inference system, inputs and output are firstly blurred. According to the actual situation, multiple similarities (denoted as) ðA; B   Þ and FRG (denoted as) Oð xÞ are divided into multiple linguistic variables, such as very large, large, medium, small, very small, etc. These variables are recorded as: A1 ; A2 ;    Am ; B1 ; B2 ;    ; Bn ;    ; C1 ; C2 ;    ; Cq . The setting of fuzzy rules is mainly based on the fuzzy process mechanism, which is expressed in the form of ‘If   , then’. Take two inputs as an example: Rule 1: If d1 is A1 and d2 is B1 , then Oð xÞ is C1 else; Rule 2: If d1 is A2 and d2 is B2 , then Oð xÞ is C2 else; ... Rule P: If d1 is Am and d2 is Bn , then Oð xÞ is Cq . (2) The process of fuzzy logic inference: According to the linguistic variables of every similarity and FRG when setting the ~ i ði ¼ 1; fuzzy rule, the corresponding fuzzy subsets are respectively defined as A ~ q ðq ¼ 1; 2;    ; QÞ. ~ j ðj ¼ 1; 2;    ; nÞ and C 2;    ; mÞ, B The membership functions of each fuzzy subset are recorded as: lA~ I ði ¼ 1; 2;    ; mÞ; lB~ j ðj ¼ 1; 2;    ; nÞ; lC~ q ðq ¼ 1; 2;    ; QÞ Fuzzy inference is performed based on Mamdani’s fuzzy inference method [21]. (3) Clarify of output and robust optimization design: After rules’ setting, FRG need to be transformed from fuzzy set into a clear value by center of area method, and the system is simplified. Then the main effect analysis is employed to obtain the primary parameter combination. To expand the optimization range and improve the best parameter combination’s accuracy, the encrypted optimization interval is set near the primary optimal parameters by BP neural network.

4 Robust Optimization of Thermal Polymerization The production of thermal polymerization is a multi-input and multi-output process, in which there are three controllable factors, namely reaction time, reaction temperature and amount of catalyst. Every factor has two coded levels: −1 stands for low level,

292

J. Wang et al.

while +1 stands for high level. The conversion of polymer and the thermal activity are two responses in the process. According to the orthogonal theory, a L8(23) full factorial design is obtained. Every experiment under the same condition will repeat 4 times. The results can be seen in paper [20]. (1) Establishment of hesitant fuzzy decision matrix: After processing the experimental data of response values with formula (1)–(5), the hesitant fuzzy decision matrix which shows in Table 3 can be obtained. Table 3. Hesitant fuzzy decision matrix Run order x1 1 2 .. . 8

−1 1 .. . 1

x2 −1 −1 .. . 1

x3 −1 −1 .. . 1

~yi1

~ yi2

~cli1

~cm i1

~cui1

~ cli2

~ cm i2

~yui2

0.774 0.228 .. . 0.313

0.795 0.247 .. . 0.435

0.817 0.266 .. . 0.556

0.271 0.220 .. . 0.509

0.298 0.263 .. . 0.754

0.324 0.306 .. . 1.000

(2) Similarity calculation: According to the production requirements [20], the ideal values of y1 and y2 are 103 and 73, their normalized values are separately recorded as y+1 = 0.404 and y+2 = 0.661. The hesitant distance can be converted to similarity by formula (8). The calculation is shown in Table 4: (3) Fuzzy logic inference: The two values of similarity in Table 4 are inputs of the fuzzy system, and the FRG is the output, which represents the overall quality of the two responses Table 4. Hesitation distance, similarity and FRG Run order x1 x2 x3 1 −1 −1 −1 2 1 −1 − 1 .. .. .. ... . . . 8 1 1 1

d1 0.392 0.158 .. . 0.104

d2 0.364 0.400 .. . 0.221

S1 0.608 0.842 .. . 0.896

S2 0.636 0.6 .. . 0.779

FRG 0.714 0.775 .. . 0.775

In the fuzzy interface of MATLAB, S1 and S2 are taken as inputs of system, and FRG is the output. The two inputs’ domain is divided into five levels: very low, low, medium, high, very high; while the FRG’s domain is divided into six levels: level 1, level 2, level 3, level 4, level 5, Level 6. The membership function of every fuzzy subset is triangle membership function (Triangle MF), as shown in Fig. 1. The fuzzy inference rules shown in Table 5 are set according to the actual situation.

Parameter Optimization Control of Multiple Response Process

293

Table 5. Fuzzy rules for thermal polymerization process Rule 1 2 .. . 13

If S1 is very low very low .. . medium

And S2 is very low low .. . medium

Then FRG is Rule Level1 14 Level1 15 .. .. . . Level4 26

If S1 is medium medium .. . None

And S2 is high very high .. . None

Then FRG is Level4 Level5 .. . None

Depending on the fuzzy rules, the FRG is performed by the center of area method. It’s clear to know the process of fuzzy logic reasoning in Fig. 2. There are three columns in the process viewer. The left two columns are the membership degrees of S1 and S2 , and the third column is the membership degree of FRG. When inputting any set of S1 and S2 , there will be a FRG accordingly. The outcomes are in Table 4.

Fig. 1. The membership function of S1

Fig. 2. Fuzzy reasoning process viewer

(3) Parameter optimization design: The main effect analysis selects the optimal level of all the controllable variables from the existing data. Input the data of controllable factors and FRG into the command interface of MINITAB, the optimal parameter combination will appear: The best level of x1 ; x2 and x3 are 1, 1 and −1, and the result will be regarded as preliminary parameter result. Because the main effect analysis can only select the optimal parameter combination from the two given levels of the controllable factors. The quality forecasting model of thermal polymerization process need to be established by BP neural network, which can further expand the optimization range.

Fig. 3. Training mean square error curve

Firstly, the data in Table 4 is used as the training sample for constructing the neural network: x1 ; x2 and x3 are taken as inputs, and the FRG value is the expected output. And the quality forecasting model makes up of only one hidden layer. The error curve of the training process is shown in Fig. 3, and the fitting degree of the model reaches 99.796%. Finally, the levels of best parameter combination ðx1 ; x2 ; x3 Þ is 1,1

294

J. Wang et al.

and −0.8, and the forecasting value of FRG increases by 0.07. Use the BP neural network forecasting model to predict the FRG values of the best parameter combination obtained by main effect analysis and BP forecasting mode separately, we can find that: the mean of FRG from BP forecasting mode basically agrees with than another group, while the SNR of FRG from BP mode is higher than another group. It verifies that the parameter optimization using BP forecasting mode has good effect and the robustness of the comprehensive quality index improves obviously.

5 Conclusion The results of proposed method are compared with the results of previous studies [22– 24], which are shown in Table 6. From Table 6, it can be seen that parameter optimization method in this paper is effective and practicable. Furthermore, the optimal parameter combination (1, 1, −0.8) makes robustness of the comprehensive quality index (FRG) get further improved.

Table 6. Comparative study Researcher (study time) Pignatiello [22] Chiao and Hamada [23] Ko et al. [24] Main effect method of this paper Neural network method in this paper

x1 1 1 1 1 1

x2 1 1 1 1 1

x3 −1 −1 −1 −1 −0.8

It proposes the multi-response parameter optimization method based on hesitant fuzzy sets in this paper. Considering the uncertainty of the response value under the complex industry process, hesitant fuzzy matrix is used to optimize the parameters and enhance the robustness of the process, which avoid the loss of information caused by the traditional method. The comprehensive quality index obtained by fuzzy logic inference can fully extract the mechanism information among multiple responses, which does not need to set the weight of multi-response. On the basis of the main effect analyzing, the BP predictive mode is established for global optimization, and the optimal robust parameters is sought. The application of the example shows the proposed method has great effectiveness and good practicability. Acknowledgment. This is founded by the National Aerospace Science Foundation (No. 2017ZG55029) and the Science and Technology Project of Henan Science and Technology Department, China (No. 182102210107).

Parameter Optimization Control of Multiple Response Process

295

References 1. Su YP, Xu LH (2013) Dimensionality reduction based on geometric projection for manyobjective optimization. Control Decis. 28(8):1173–1177 (in Chinese) 2. Xu J, He W, Chen YZ et al (2016) A study of optimizing functional response problems based on principal component analysis. Ind Eng 19(1):74–80 (in Chinese) 3. Ma YZ, Wang JJ, Su GJ (2012) Robust parameter design for dynamic multi-response system. Syst Eng—Theory Pract 32(8):1841–1849 (in Chinese) 4. Liu YM, Zhao LX (2015) A robust optimization model for multi-responses based on desirability function approach and the empirical study. Oper Res Manag Sci 4(8):83–91 (In Chinese) 5. Sharma V, Kumar V (2016) Multi-objective optimization of laser curve cutting of Aluminium metal matrix composites using desirability function approach. J Braz Soc Mech Sci Eng 38(4):1221–1238 6. Sun WH, De-Quan HE (2006) The fuzzy integrated assessment of information security from qualitative to quantitative. Syst Eng-Theory Pract 26(12):93–98 7. Yu JL, Huang HQ, Chen HG (2017) RSM-based parameter optimization of electrotyping free-standing diamond-nickel composite film. Surf Technol 46(5):83–87 (In Chinese) 8. Gu XG, Ma YZ, Liu J et al (2017) Robust parameter design for multivariate quality characteristics based on process capability index with individual observations. Syst Eng Electron 39(2):362–368 (In Chinese) 9. Wang KT, Li F, Zhang XH et al (2015) Study on process parameters optimization based on error compensation mode. Control Eng 22(02):262–269 (In Chinese) 10. Zhao YP, Zhao GL, Wen YD et al (2018) Parameter optimization of feed forward neural networks based on variable projection approach. Control Eng 23(02):309–312 (In Chinese) 11. Yao GL (2018) Analysis on optimization of double-response surface-satisfaction function of surface work-hardening for cold roll-beating spline. J Plast Eng 25(03):129–135 (In Chinese) 12. Yan W, He Z, Tian WM (2012) Complex products critical-to-quality characteristics identification based on IG. Ind Eng Manag 17(1):70–74+83 (In Chinese) 13. Salmasnia A, Bashiri M (2015) A new desirability function-based method for correlated multiple response optimization. J Adv Manuf Technol 76(5–8):1047–1062 14. Vining GG (1998) A compromise approach to multi-response optimization. J Qual Technol 30(4):309–313 15. Zadeh LA (1965) Fuzzy sets. Inf Control 8(3):338–353 16. Atanassov K (1986) Intuitionistic fuzzy sets. Fuzzy Sets Syst 20(1):87–96 17. Lee HJ, Jin BP, Chen G (2001) Robust fuzzy control of nonlinear systems with parametric uncertainties. IEEE Trans Fuzzy Syst 9(2):369–379 18. Torra V (2010) Hesitant fuzzy sets. Int J Intell Syst 25(6):529–539 19. Farhadinia B (2014) A series of score functions for hesitant fuzzy sets. Inf Sci 277(20):102–110 20. Bashiri M, Hosseininezhad SJ (2012) Fuzzy development of multiple response optimization. Group Decis Negot 21(3):417–438 21. Mamdani EH (1976) Advances in the linguistic synthesis of fuzzy controllers. J Man-Mach Stud 8(6):669–678 22. Pignatiellojr J (1993) Strategies for robust multi-response quality engineering. IIE Trans 25 (3):5–15 23. Chiao C, Hamada M (2001) Analyzing experiments with correlated multiple responses. J Qual Technol 33:451–465 24. Ko YH, Kim KJ, Jun CH (2005) A new loss function-based method for multi-response optimization. J Qual Technol 50–59:37

Active Disturbance Rejection and Adaptive Backstepping Control for Induction Motor with Smooth Switching of Rotor Flux Fei Gong, Haisheng Yu(&), Jinpeng Yu, and Xudong Liu Qingdao University, College of Automation, Qingdao, China [email protected], [email protected]

Abstract. The adaptive backstepping and smooth switching control method of rotor flux is investigated in the paper to achieve precise speed tracking control and minimum loss of induction motor. When the uncertain load first appears in the recursive design, the adaptive law of the load is designed, and the unknown load is estimated by novel adaptive load torque observer. By introducing the switching term into the ESO of ADRC, the current loop can converge rapidly to the desired current. And the smooth switching control method among the rated and the minimum rotor flux has been studied, which achieving the minimum loss of induction motor. The results demonstrate that the novel adaptive load torque observer acquire quick tracking of unknown load torque, and the smooth switching control method saves the loss of induction motor when it is in stable state. Keywords: Adaptive load torque observer  Novel ESO Minimum rotor flux  Smooth switching control method



1 Introduction In the actual operation of motor, the uncertain load disturbance will have a great influence on the function of control system, which cannot meet the goal of precise control. The vector control is widely used in IM speed control system because it is easy to implement and does not depend on accurate motor model [1, 2]. However, the dynamic response of vector control is slow, and the same PI parameters cannot meet the demands of various speeds and loads. The sliding mode variable structure control (SMVSC) has chattering in the system due to its own structural characteristics [3, 4]. Hamilton control can save the energy of the system with fewer parameters in controller [5, 6], and can follow the expected speed steadily when the parameters of the motor and load disturbance change, but the response speed of the system is slow. Jingqing Han proposed active disturbance rejection control (ADRC) [7], which has unique advantages in dealing with the sudden change of speed, load disturbance and time-varying parameters in IM. In each design step, the backstepping control with Lyapunov function defined recursively becomes the most widely used control strategy

© Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 296–304, 2020. https://doi.org/10.1007/978-981-32-9050-1_34

Active Disturbance Rejection and Adaptive Backstepping Control

297

in motor control with excellent tracking performance [8]. Unlike previous adaptive backstepping control, which designs load adaptive law in the last recursive step, the new adaptive backstepping control strategy proposed in this paper designs load adaptive law when uncertain load first appears in the recursive design step, and obtains a new adaptive load torque observer, which realizes online accurate load estimation and ensures high performance speed tracking control of IM.

2 Mathematical Model and Control Principle of Induction Motor With x  is  kr as the state variable, the mathematical expression is given by the following equation in the rotor flux-oriented control ðkrq ¼ 0Þ [9]. 8 Rs L2r þ Rr L2m disd Lm Rr 1 > isd þ np xisq þ LLrmkRrdr i2sq þ rL 2 2 krd þ rL usd > s s Lr s Lr > dt ¼  rL > 2 2 < disq Lm Rr isq R s Lr þ R r Lm Lm x r 1 ¼  i  n xi  i  k þ 2 sq p sd sd rd rLs usq dt Lr krd rLs Lr rLs Lr > dkrd Lm Rr Rr > > dt ¼ Lr isd  Lr krd > : dx ssL dt ¼ J

ð1Þ

 Where r ¼ 1  L2m ðLr Ls Þ is the leakage coefficient of motor. Ls , Lr , Rs and Rr represent the inductance and resistance of rotor and stator, respectively. isd , isq , usd and usq mean the components of stator current and voltage in d  q axes. np , Lm , krd , s, sL and x denote the pole pairs, mutual inductances, rotor flux, electromagnetic torque, load torque and speed, respectively. The block diagram of the novel adaptive backstepping, ADRC and smooth switching method of rotor flux for speed control system of induction motor has been displayed in Fig. 1. The speed and rotor flux loop of induction motor speed drive system are designed with backstepping controller. When the uncertain load first appears, the load adaptive law is designed to realize the accurate online estimation of the uncertain load. In the design of the current loop controller, the switching term is introduced into the extended state observer of the ADRC to realize the fast convergence of the controller in finite time. Aiming at the loss of IM, the relationship between the minimum rotor flux and loss has been established by analyzing the power and loss of induction motor. Finally, a smooth switching function is applied to coordinate the rated with the minimum rotor flux, which reduces the loss of induction motor in steady state and achieves the efficiency optimization of the induction motor.

298

F. Gong et al.

Fig. 1. The block diagram of adaptive backstepping and smooth switching method in IM drive system.

3 Design of Controller 3.1

Rotor Flux Observer

The Eq. (1) shows that the rotor flux is unknown, and an observer would be needed to estimate it [10]. The observer can be designed to estimate it by stator current isd of the rotor flux formula. _ k^rd ¼ ðLm Rr isd Þ=Lr  ðRr ^krd Þ=Lr

ð2Þ

The rotor flux error is expressed as ek ¼ krd  ^krd , and the differential of it can be represented as e_ k ¼ Rr ek =Lr . Define the Lyapunov function is V1 ¼ e2k =2, and its derivative is V_ 1 ¼ ek e_ k ¼ ðRr e2k Þ=Lr  0

ð3Þ

V_ 1 ¼ 0 if and only if ek ¼ 0, the rotor flux observer is asymptotically stable. 3.2

Adaptive Backstepping Controller

The speed error and rotor flux error are defined as ex ¼ x  x, ek ¼ krd  ^ krd , and their first derivatives are shown as _ _ e_ k ¼ k_ rd  ^ e_ x ¼ x_   x; krd

ð4Þ

Active Disturbance Rejection and Adaptive Backstepping Control

299

The adaptive backstepping control designs the load torque adaptive law when it first appears, and the load adaptive law designed realizes the online accurate estimation of the uncertain load torque. Choose the Lyapunov function V2 ¼ ðe2x þ e2k þ c1~s2L Þ=2

ð5Þ

Where c is a positive constant. ~sL ¼ sL  ^sL , ~sL and ^sL represent the load torque error and the estimated of the induction motor, respectively. The first order differential of V2 can be written as _ _ þ ek ðk_ rd  ^ V_ 2 ¼ ex e_ x þ ek e_ k þ c1~sL~s_ L ¼ex ðx_   xÞ krd Þ  c1~sL^s_ L

ð6Þ

According to the principle of backstepping control strategy, the virtual control current isq and the current error eiq are defined as isq ¼ðJLr x_   JLr 1Þ=np Lm ^krd ; eiq ¼ isq  isq

ð7Þ

Combining (1) and (7), (6) can be expressed as np Lm ^krd ^sL Lm Rr Rr ex V_ 2 ¼ krd Þ þ ~sL ð  c1^s_ L Þ ex eiq þ ex ð1 þ Þ þ ek ðk_ rd  isd þ ^ JLr J L L J ffl{zfflfflfflfflfflfflfflfflffl} r r |fflfflfflffl{zfflfflfflffl} |fflfflfflfflfflfflfflffl |fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl} k1 ex

k2 ek

k3 ~sL

ð8Þ Where ki [ 0ði ¼ 1; 2; 3Þ. Equation (8) shows that the stability function 1, virtual control current isq and load torque adaptive law can be computed as 1 ¼ k1 ex 

^sL  Lr _  Rr ex ;i ¼ ðk þ ^krd þ k2 ek Þ; ^s_ L ¼ ck3~sL þ c J sd Lm Rr rd Lr J

ð9Þ

Therefore, (8) can be reduced as V_ 2 ¼ðnp Lm ^krd ex eiq Þ=JLr  k1 e2x  k2 e2k  k3~s2L

ð10Þ

According to (1), the load torque of induction motor can be expressed as sL ¼ ðisq np Lm ^krd isq Þ=Lr  J x_

ð11Þ

Substituting (11) into (9), we can get the following equation. ^s_ L ¼ ck3 J x_ þ ðcex Þ=J þ ck3 ½ðnp Lm ^ krd isq Þ=Lr  ^sL 

ð12Þ

300

F. Gong et al.

Where s_ L;int ¼ ðcex Þ=J þ ck3 ½ðnp Lm ^krd isq Þ=Lr  ^sL . By integrating (12), the load torque observer can be expressed as Z ^sL ¼ ck3 J

xðtÞ xð0Þ

dx þ sL;int

ð13Þ

Combining the (4), (7) and (9), it can be obtained the following equation. e_ x ¼ ðnp Lm ^krd eiq Þ=ðJLr Þ  k1 ex þ ~sL =J krd Þ isq ¼½JLr k1 ðx  xÞ=ðnp Lm ^krd Þ þ ðLr ^sL Þ=ðnp Lm ^krd Þ þ ðJLr x_  Þ=ðnp Lm ^

ð14Þ ð15Þ

Putting (14) and (15) into (10), V_ 2 is shown as V_ 2 ¼  k1 e2x  k2 e2k  k3~s2L \0

3.3

ð16Þ

Novel ESO Design

By introducing the switching term into the ESO of ADRC, the current loop can converge rapidly to the desired current. From the Eq. (1), the d axes stator current can be expressed as _isd ¼ ad ðtÞ þ usd =ðrLs Þ

ð17Þ

R L2 þ R L2

Lm Rr s m r Where ad ðtÞ ¼  s rL isd þ np xisq þ LLrmkRrdr i2sq þ rL 2 2 krd are the lumped disturs Lr s Lr bance of d axes current loop. According to [10], The ESO with switching term is given by

(

^_isd ¼ usd0 =ðrLs Þ þ ^ad ðtÞ þ 2q1 ðjed jm1 signðed Þ þ jed jn1 signðed ÞÞ þ k4 sgmf ðed Þ ð18Þ ^a_ d ðtÞ ¼ q2 ðjed jm2 signðed Þ þ jed jn2 signðed ÞÞ þ k5 sgmf ðed Þ 1

Where ed ¼ isd  ^isd , 1\q1 \ þ 1, 0:5\m1 \1, m2 ¼ 2m1  1.  sgmðed Þ ¼

2=ð1 þ expeed Þ  1; jed j  d signðed Þ; jed j [ d

ð19Þ

where e is a constant, d is a constant of error. By introducing the concept of feedforward compensation into the $d$-axes current loop, the output is designed as usd ¼ usd0 þ rLs ^ad ðtÞ; usd0 ¼ kd ðisd  isd Þ where kd is a proportional constant.

ð20Þ

Active Disturbance Rejection and Adaptive Backstepping Control

301

In the same way, the ESO with switching term is given by (

    ^_isq ¼ usq0 =ðrLs Þ þ ^aq ðtÞ þ 2q2 ðeq m3 signðeq Þ þ eq n3 signðeq ÞÞ þ k6 sgmf ðeq Þ     ð21Þ m n ^a_ q ðtÞ ¼ q2 ðeq  4 signðeq Þ þ eq  4 signðeq ÞÞ þ k7 sgmf ðeq Þ 2

Where eq ¼ isq  ^isq , 1\q2 \ þ 1, 0:5\m3 \1. ^ aq ðtÞ is the estimated value of aq ðtÞ ¼ tisq  np xisd  ðLm Rr isq isd Þ=ðkrd Lr Þ  ðLm xr krd Þ=ðrLs Lr Þ: The composite controller of q axes current loop is given by usq ¼ usq0 þ ^aq ðtÞrLs ; usq0 ¼ kq ðisq  isq Þ

ð22Þ

where kq is a proportional constant. 3.4

Smooth Switching of Rotor Flux

When induction motor is in stable state, the mathematical model of it is written as usd ¼ Rs isd  ðnp x þ

Rr Lm Rr Lm isq Þisq Lr ; usq ¼ Rs isq þ ðnp x þ isq Þisd Ls Lr krd Lr krd

ð23Þ

Where Lr ¼ ðLs Lr  L2m Þ=Lr . The electromagnetic torque can be derived as s ¼ ðnp L2m isd isq Þ=Lr . Input power of induction motor can be computed as Pin ¼ usd isd þ usq isq

ð24Þ

Substituting (23) into (24), it can be obviously get that Pin ¼ ðRs k2rd Þ=L2m þ ðRs s2 L2r Þ=ðn2p L2m k2rd Þ þ sx þ ðs2 Rr Þ=ðn2p k2rd Þ

ð25Þ

The output power of IM is expressed as Pout ¼ sx. In term of the loss of IM, we have Ploss ¼ Pin  Pout ¼ Rs ð

1 k2rd s2 L2r s2 Rr Rr L2m 14 þ Þþ ; krdo ¼ ðs=np Þ2 ðL2r þ Þ 2 2 2 Lm Rs n2p L2m krd n2p krd

ð26Þ

In conventional IM control system, a rated rotor flux is generally employed in reducing system response time. However, when the motor is running at a stable state, the rated rotor flux will cause the loss to be large, failing to achieve the goal of energy saving. In this paper, the smooth switching function is designed to coordinate the rated with the minimum rotor flux. And when the speed or load torque varies immediately, the smooth switching method is restarted to realize the coordination control effect of the whole drive system.

302

F. Gong et al.

The smooth switching controller of rotor flux can be chosen as m

m

krd ¼ krd expðtta Þ =l þ ð1  expðtta Þ =l Þkrdo

ð27Þ

Where m, l are constants designed by the dynamic response of IM and ta is the time point at which speed immediately varies.

4 Simulation Results The novel adaptive backstepping and smooth switching of rotor flux is simulated and validated on MATLAB/Simulink, and contrasted with vector control. The parameters of IM used in this paper are as follows: PN ¼ 2:2 KW, xN ¼ 183 rad=s, krdN ¼ 0:8 Wb, IN ¼ 8 A, UN ¼ 220 V, Rs ¼ 0:687 X, Ls ¼ 0:084 H, Lr ¼ 0:0852 H, Lm ¼ 0:0813 H, np ¼ 2, J ¼ 0:03 kg  m2 . The parameters of controllers: k1 ¼ 100, k2 ¼ 5000, k3 ¼ 35000, c ¼ 0:025, m1 ¼ m3 ¼ 0:8, q1 ¼ q2 ¼ 10, kd ¼ kq ¼ 500.

Fig. 2. The curve of speed tracking.

Fig. 4. The loss waveforms.

Fig. 3. The rotor flux waveforms.

Fig. 5. Load torque observation curve.

Active Disturbance Rejection and Adaptive Backstepping Control

303

The initial load torque of IM is sL ¼ 2 N  m, and it changes from 2 N  m to 6 N  m. The rated rotor flux is 0:8 Wb, the given speed is 100 rad=s in the beginning simulation, and it turns to 150 rad=s. The control strategy designed in this paper has been compared with vector control. It can be seen from the speed curve of Fig. 2 that the control strategy designed in this paper has a faster speed response, can accurately track the set speed value, and quickly eliminates the impact of load disturbance. The system has superior performance on load disturbance attenuation. From the rotor flux observation curve and loss curve of Figs. 3 and 4, the smooth switching method can effectively reduce the loss of the IM during steady state operation and ensure the dynamic performance. According to the load torque estimation curve in Fig. 5, the novel adaptive load torque observer achieves accurate estimation of unknown load.

5 Conclusion In this paper, a novel adaptive backstepping control strategy has been designed in speed control system of IM, solving the issue of uncertain load. When the uncertain load first appears in the recursive design step, the adaptive law of the load is obtained to estimate the uncertain load accurately. The adaptive backstepping control algorithm proposed realizes high performance speed tracking control. The simulation results show that the observer achieves on-line accurate estimation of uncertain load torque. By introducing the switching term into the ESO of ADRC, the current loop can converge rapidly to the desired current. Compared with vector control method, the speed response is faster, and the effect of load disturbance on speed is eliminated quickly. And the coordination control strategy not only ensures the fast performance of IM, but also reduces the loss in stable state.

References 1. Kobayashi N, Wijaya FP, Kondo K et al (2016) Induction motor speed-sensorless vector control using mechanical simulator and disturbance torque compensation. IEEE Trans Ind Appl 52(3):2323–2331 2. Deng YH, Liang ZS, Xia PC et al (2019) Improved speed sensorless vector control algorithm of induction motor based on long cable. J Electr Eng Technol 14:219–229 3. Oliveira CMR, Aguiar ML, Monteiro, et al (2016) Vector control of induction motor using an integral sliding mode controller with anti-windup. J Control, Autom Electr Syst 27 (2):169–178 4. Almeida JM, Loukianov AG, Dominguez JR (2018) Robust sensorless observer-based adaptive sliding modes control of synchronous motors. J Franklin Inst 355(7):3221–3248 5. Yu HS, Yu JP, Liu J et al (2013) Nonlinear control of induction motors based on state error PCH and energy-shaping principle. Nonlinear Dyn 72(1–2):49–59 6. Yu HS, Yu JP, Liu J et al (2012) Energy-shaping and L2 gain disturbance attenuation control of induction motor. Int J Innovative Comput Inf Control IJICIC 8(7):2024–5011 7. Han JQ (2009) From PID to active disturbance rejection control. IEEE Trans Ind Electron 56 (3):900–906

304

F. Gong et al.

8. Yu J, Ma Y, Yu H et al (2017) Adaptive fuzzy dynamic surface control for induction motors with iron losses in electric vehicle drive systems via backstepping. Inf Sci 376:172–189 9. Sun W, Liu X, Gao J et al (2016) Zero stator current frequency operation of speed-sensorless induction motor drives using stator input voltage error for speed estimation. IEEE Trans Ind Electron 63(3):1490–1498 10. Xiong SF, Wang WH, Liu XD et al (2015) A novel extended state observer. ISA Trans 58:309–317

Super-Twisting and Nonsingular Terminal Sliding Mode Direct Torque Control of Induction Motor Drives Wenchao Lv and Haisheng Yu(&) Qingdao University, Qingdao 266071, China [email protected]

Abstract. This paper proposes a non-linear and robust Direct Torque Control (DTC) strategy for induction motor, which with Space Vector Pulse Width Modulation (SVPWM). In order to overcome the disadvantages of large torque and current ripple in traditional DTC of induction motor, Super-twisting (St) speed controller is designed to replace the traditional Proportional Integral (PI) controller. According to the induction motor’s mathematical model and Nonsingular Terminal Sliding Mode (NTSM) control theory, a robust sliding mode controller based on torque error and stator flux squared error is designed. For the sake of estimating the load torque applied to motor precisely, as well eliminating uncertainties of the system, an observer based on Super-twisting algorithm is designed. Super-twisting stator flux observer is applied to improve the observation accuracy. Simulation results indicate that this control strategy can reduce torque and current ripple effectively, and has a strong inhibition effect on external disturbance, with good dynamic and steady performance. Keywords: Induction motor DTC  Super-twisting Nonsingular Terminal Sliding Mode  SVPWM



1 Introduction With the rapid development of modern industry and continuous progress of automation, AC speed regulation system has developed rapidly because of its good steady and dynamic performance. DTC has been widely used because of its advantages over Field Oriented Control (FOC). Traditional DTC has the advantages of simple structure, quick response, strong robustness to the variation of internal parameters and external interference of the system, but at the same time, there are also problems such as excessive torque, current and flux ripple, besides the switching frequency of inverter is not constant, and it’s hard to accurately control the system at low speed state [1, 2]. To overcome the drawbacks, several control strategies were utilized, such as using sensorless control, Active Disturbance Rejection Control and many robust nonlinear control techniques [3–5]. Energy-shaping and PCH strategy has been utilized extensively on account of real-time energy optimization [6]. The complex computing process of fuzzy logic as well as artificial neural network limits their wide application [7, 8].

© Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 305–312, 2020. https://doi.org/10.1007/978-981-32-9050-1_35

306

W. Lv and H. Yu

Sliding Mode (SM) control is extensively used for uncertain systems, for it possesses the advantages of fast response, strong robustness, and is not affected by external disturbances and internal parameter changes [9]. The SM controller has been used to replaces the hysteresis controller to improve the response speed and effectively reduce the current and torque ripple. Super - twisting (St, similarly hereinafter) is a high order algorithm of sliding mode, it generates a continuous control law to maintain fast response and high robustness, at the same time, can reduce the chattering phenomenon [10]. Nonsingular Terminal Sliding Mode can achieve convergence in finite time in theory and have better anti-interference performance in engineering. In this paper, the St speed controller is going to be designed to generate the torque reference, the torque and flux linkage controllers based on the Nonsingular Terminal Sliding Mode generate reference voltage vector. Then, an observer on the basis of Super-twisting algorithm is going to be designed to estimate the load torque applied to motor and eliminate uncertainties. For the sake of improving the induction motor stator flux observation accuracy, a Super-twisting stator flux observer is designed.

2 Induction Motor Model In the stationary reference, the stator currents as well as stator flux are taken as the state variables, and the induction motor model should be expressed as: 8 _isa ¼ aisa þ bksa þ hksb þ gusa  xr isb > >

k_ ¼ Rs isa þ usa > : _ sa ksb ¼ Rs isb þ usb

ð1Þ

a ¼ Rs =ðrLs Þ þ Rr =ðrLr Þ; b ¼ Rr =ðrLs Lr Þ; h ¼ xr =ðrLs Þ; g ¼ 1=ðrLs Þ: The electromagnetic torque can be described as s ¼ np ðksa isb  ksb isa Þ, where, isa and isb are the value of stator current, usa and usb are stator voltage components.ksa , ksb and Rs are stator flux components and stator resistance. Rr represents rotor resistance, Ls and Lr are stator inductance and rotor inductance, respectively. Lm is mutual inductance between rotor and stator, where np represents the number of pole-pairs, s means electromagnetic torque. xrm is mechanical angular speed, as well xr ¼ np xrm repre sents electrical angular speed of rotor. r ¼ 1  L2m ðLr Ls Þ represents leakage coefficient. The DTC of induction motor based on Super-twisting and Nonsingular Terminal Sliding Mode system block diagram is shown in Fig. 1.

Super-Twisting and Nonsingular Terminal Sliding Mode Direct Torque Control

307

Fig. 1. DTC based on St and NTSM

3 Direct Torque Control System Design 3.1

Super-Twisting Speed Controller

The induction motor’s mechanical equation is described as x_ rm ¼ ðs  sL Þ= Jm  ðBxrm Þ=Jm . Speed observation error will be defined as sx ¼ xrm  xrm , its derivative s_ x ¼ x_ rm  x_ rm . Substitute mechanical equation into the equation of speed observation error, and we will get s_ x ¼ x_ rm  ðs  sL  Bxrm Þ=Jm , Jm is inertia moment, sL is load torque, and B represents coefficient of friction. Based on the theory of conventional sliding mode control, we can obtain s ¼ seq þ sn , seq and sn represent the equivalent and nolinear control part, respectively. seq is defined when s_ x ¼ 0, seq ¼ ^sL þ Bxrm , ^sL represents the estimated value of load torque, and the nolinear part of control law is related to the sign of the speed observation error, as sn ¼ Kx sgnðsx Þ. The St speed controller replaces the conventional nolinear part, it can be defined as u_ st ¼ u1 þ kx jsx j1=2 sgnðsx Þ, u_ 1 ¼ bx sgnðsx Þ. From the above, the generated reference torque by the super twisting controller is given by s ¼ seq þ ust . 3.2

Torque and Flux Nonsingular Terminal Sliding Mode Controllers

The SM controller is proposed to replace the hysteresis controller to reduce the torque and current ripple. Torque and flux linkage errors are defined as es ¼ s  s, 2  2 ek ¼ k2 s  ks , s , ks is the expected value of torque and squared flux, respectively. s,

308

W. Lv and H. Yu

k2s is the actual value of torque and squared flux, respectively. The derivative of torque error can be obtained:   R r np xrm isa ksa þ isb ksb þ rL þ r  e_ s ¼ _s ¼ np 4 n x  p rm k2sa þ k2sb þ us rLs 2

Rs rLs



 3 isa ksb  isb ksa  5

ð2Þ

  In Eq. (2), us ¼ isb  ksb =ðrLs Þ usa þ ðksa =ðrLs Þ  isa Þusb . In order to improve the response speed, as well reduce the torque ripple, a non-singular terminal sliding mode surface is proposed as ss ¼ es þ b1 e_ ps 1 =q1 . For the sake of weakening the chattering problem of traditional sliding mode control, the torque control law consists of equivalent control term useq and nonlinear switching term usn :   R r þ np xrm isa ksa þ isb ksb þ rL r  ¼ 4 n x  2 2 p rm ksa þ ksb rLs 2

useq

Rs rLs



 3 isa ksb  isb ksa  5

ð3Þ

 Rt  usn ¼ 0 ðq1 =ðb1 p1 ÞÞ_eðs2p1 =q1 Þ þ ks sgnðss Þ ds, ks [ 0. Take the positive definite Lyapunov function as V_ s ¼ 12 s2s . The derivative of this equation is p1 V_ s ¼ ss s_ s ¼ b1 e_ sðp1 =q1 1Þ ðks jss jÞ\0 q1

ð4Þ

From the above equation, the system will reach and maintain the non-singular terminal sliding surface in a limited time, can also converge in finite time. The torque nonsingular terminal sliding mode controller is asymptotically stable. The derivative of flux linkage error can be obtained as e_ k ¼ k_ 2s ¼ 2Rs isa ksa þ 2Rs isb ksb  uk . In the last equation, uk ¼ 2ksa usa þ 2ksb usb . In order to improve the response speed, as well weaken the steady state flux pulsation, the non-singular terminal sliding mode p =q surface is proposed as sk ¼ ek þ b2 e_ k2 2 . As to weaken the chattering problem of traditional SM control, the flux control law can be composed of equivalent control term Rt ukeq ¼ 2Rs isa ksa þ 2Rs isb ksb and nonlinear switching term ukn ¼ 0 ½ðq2 =ðb2 p2 ÞÞ ð2p =q Þ

e_ k 2 2 þ kk sgnðsk Þdk, kk [ 0. Take the positive definite Lyapunov function as V_ k ¼ 12 s2k . The derivative of this equation can be obtained: p2 ðp =q 1Þ V_ k ¼ sk s_ k ¼ b2 e_ k 2 2 ðkk jsk jÞ\0 q2

ð5Þ

From the above equation, the system will reach and maintain the non-singular terminal sliding surface in a limited time, can also converge in finite time. The torque nonsingular terminal sliding mode controller is asymptotically stable. Therefore,

Super-Twisting and Nonsingular Terminal Sliding Mode Direct Torque Control

309

according to equations presented in this paper, it can be obtained us and uk , combined with this, the output of the controller is: U¼

3.3

ksa ðisa rL Þu þ 2ksb us s k

k2 2ðisa ksa þ isb ksb rLss Þ

k

ðisb rLsbs Þuk 2ksa us

T

k2 2ðisa ksa þ isb ksb rLss Þ

ð6Þ

Super-Twisting Observer

When the load torque is unknown variable, speed observation error is introduced to calibrate the load torque observer. The observation error of speed is taken as the sliding ^ rm , and according to the Super-twisting control law, mode variable, as st ¼ xrm  x then we can design the load torque observer as ^sL ¼ ^sL1 þ ksl jst j1=2 sgnðst Þ, ^s_ L1 ¼ bsl sgnðst Þ. The current observation error is introduced for correction, as sia ¼ isa  ^isa , sib ¼ isb  ^isb . According to the Supertwisting control law, the stator flux observer can be constructed as: 8 ^_isa ¼ a^isa þ b^ksa þ h^ksb þ gusa  xr isb þ la1 jsia j1=2 sgnðsia Þ > > > > < ^_ isb ¼ a^isb þ b^ksb  h^ksa þ gusb þ xr isa þ lb1 jsib j1=2 sgnðsib Þ _ > > ^ksa ¼ Rs^isa þ usa þ la2 sgnðsia Þ > > : ^_ ksb ¼ Rs^isb þ usb þ lb2 sgnðsib Þ

ð7Þ

4 Simulation Results MATLAB/Simulink was used for simulation research, and the asynchronous motor control system was built according to Fig. 1. The main parameters are: rated power Pn ¼ 1:5 KW, rated voltage Un ¼ 220 V, rated current In ¼ 6 A, rated frequency fn ¼ 52 Hz, rated speed nN ¼ 1500 r=min, ks ¼ 0:8 Wb, Rs ¼ 0:96419 X, Rr ¼ 0:93766 X, np ¼ 2, Ls ¼ 6:08925 mH, Lr ¼ 6:43858 mH, Lm ¼ 112:23209 mH, Jm ¼ 0:0038 kg m2 , B ¼ 0:001 N m s. The induction motor’s speed is changed from 60 rad=s to 150 rad=s when t ¼ 0:9 s. Then, additional load torque disturbance 4 N  m is introduced to the system from 1 N  m when t ¼ 1:6 s. Compare the data in Fig. 2, the torque fluctuation range of DTC based on St and NSTM is much smaller compared with traditional DTC, indicates this control strategy can effectively reduce torque ripple.

310

W. Lv and H. Yu

Fig. 2. Electromagnetic torque curve

The speed tracking curve as shown in Fig. 3. Through the comparison of the data from Fig. 3, DTC based on St and NSTM can track the speed quickly, and has small chattering phenomenon. When the load is suddenly increased, there is only a slight fluctuation and the speed can be quickly returned to the given value, which is superior to the traditional DTC.

Fig. 3. Rotor speed curve

Figure 4 shows the load torque observation curve. The introduction of load torque observer reduces the cost of the system and reduces the uncertainty of the control system. It can be observed from Fig. 4, the load torque observer based on Super twisting can achieve accurate observation of the load torque changes. It is obvious that the stator current of DTC based on St and NSTM doesn’t have big ripple when the speed increases or load torque suddenly changes (Fig. 5).

Super-Twisting and Nonsingular Terminal Sliding Mode Direct Torque Control

311

Fig. 4. Load torque observation curve

Fig. 5. Stator current curve of DTC based on St and NTSM

5 Conclusion This paper designs speed controller on the basis of St algorithm, and the NTSM approach has been utilized to design torque and flux controllers. The observers based on St algorithm are introduced to improve the precision of induction motor control. Simulation results can show the control strategy presented by this paper not only lowers torque ripple and current ripple of the traditional DTC, but also can ensure the switching frequency of inverter being approximate constant, weaken the chattering phenomenon of the traditional sliding mode method. The control scheme shows strong robustness about the whole system. In conclusion, the designed control method has superior theoretical significance and application prospect. Acknowledgement. This paper is supported by the Natural Science Foundation of China (61573203).

312

W. Lv and H. Yu

References 1. Kumar RH, Iqbal A, Lenin NC (2018) Review of recent advancements of direct torque control in induction motor drives – a decade of progress. IET Power Electron 11(1):1–15 2. Ryu JH, Lee KW, Lee JS (2006) A unified flux and torque control method for DTC-based induction-motor drives. IEEE Trans Power Electron 21(1):234–242 3. Zaky MS, Metwally MK, Azazi H et al (2018) A New Adaptive SMO for speed estimation of sensorless induction motor drives at zero and very low frequencies. IEEE Trans Ind Electron 65(9):6901–6911 4. Yin Z, Du C, Liu J et al (2018) Research on autodisturbance-rejection control of induction motors based on an ant colony optimization algorithm. IEEE Trans Ind Electron 65(4):3077– 3094 5. Ammar A, Bourek A, Benakcha A (2017) Nonlinear SVM-DTC for induction motor drive using input-output feedback linearization and high order sliding mode control. ISA Trans 67 (Complete):428–442 6. Yu H, Yu J, Liu J et al (2013) Nonlinear control of induction motors based on state error PCH and energy-shaping principle. Nonlinear Dyn 72(1–2):49–59 7. Zeb K, Uddin W, Haider A et al (2018) Robust speed regulation of indirect vector control induction motor using fuzzy logic controllers based on optimization algorithms. Electr Eng 100(2):787–802 8. Zidani Y, Zouggar S, Elbacha A (2018) Steady-state analysis and voltage control of the selfexcited induction generator using artificial neural network and an active filter. Iran J Sci Technol Trans Electr Eng 42(1):41–48 9. Park SC, Lee JM, Han SI (2018) Tracking error constrained terminal sliding mode control for ball-screw driven motion systems with state observer. Int J Precis Eng Manuf 19(3):359– 366 10. Utkin V (2018) Mechanical energy-based Lyapunov function design for twisting and supertwisting sliding mode control. IMA J Math Control Inf 32(4):675–688

Four Quadrant PMSM Drive System via Backstepping and Hamiltonian Control Guanglin Lv, Haisheng Yu(&), and Xudong Liu Qingdao University, Qingdao 266071, China [email protected]

Abstract. The DC bus voltage overshoot and poor tracking effect of motor speed are the common problems in the four quadrant permanent magnet synchronous motor drive system, a hybrid control strategy is designed. The control objectives are as follow: (i) the DC bus voltage can fast track the reference voltage; (ii) the power factor is close to one on the grid side; (iii) the motor runs in four quadrant and have a good speed tracking. The models of the grid-side and PMSM are established respectively. The controller is designed through the PCH system and backstepping. Simulation results show that the system’ s DC bus voltage has no overshoot and the motor speed tracking effect is better, the design scheme is viable. Keywords: PMSM

 Four quadrant  Backstepping  PCH

1 Introduction Nowadays, the AC motor has been widely studied by the domestic and overseas scholars [1–3]. However, in the traditional four quadrant PMSM drive system, the grid converter used the diode or thyristor, it is difficult to solve the problems. Recently, the emerging back-to-back converter has more advantages which based on the IGBTs [4, 5]. Many control strategies has been studied to improve the operation performance of the four quadrant PMSM drive system. In paper [6], robust control has used to the four quadrant PMSM drive system which based on the AC/DC/AC converter, the DC Link voltage has fluctuated greatly when the load has changed. In paper [7], the adaptive control base on the model reference has presented, the DC bus voltage has a overshoot. In this paper, a control strategy based on the backstepping control and the PCH system have presented. On the grid side, backstepping and PCH control is adopted to the voltage and current loop, respectively. On the motor side, the backstepping controller is used to realize the speed tracking.

2 The Control Scheme of the PMSM Drive System The control scheme of the PMSM drive system is shown in Fig. 1. It is made up of grid side subsystem and motor side subsystem. © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 313–319, 2020. https://doi.org/10.1007/978-981-32-9050-1_36

314

G. Lv et al.

Fig. 1. The control scheme

3 Mathematical Model of PMSM Drive System The grid side subsystem is expressed as 8 < Ldigd =dt¼  Rigd þ xg Ligq  ugd þ egd Ldigq =dt ¼ Rigq  xg Ligd  ugq þ egq : Cdu =dt ¼ i  i ¼ l i þ l i  i dc L L gd gd gq gq

ð1Þ

Where, igd and igq are the d-q axes current; egd and egq are voltage in d-q axes; xg is  pffiffiffiffiffiffiffiffi T T the angular frequency; ½ egd egq  ¼ 3=2Em 0 ; lgd and lgq are duty ratio in d-q axes; udc denotes the DC bus voltage. The motor side subsystem is written as 8 < Ld dimd =dt ¼ umd  Rs imd þ np xm Lq imq Lq dimq =dt ¼ umq  Rs imq  np xm Ld imd  np xm U : Jm dxm =dt ¼ s  sL ¼ np ðLd  Lq Þimd imq þ np Uimq  sL

ð2Þ

Where, Lm ¼ Ld ¼ 0:0852 H, U¼ 0:175 Wb, np ¼ 4; Rs ¼ 2:875 X; xm is motor speed; s and sL denote electromagnetic torque and load torque, respectively.

4 The Controller of PMSM Drive System 4.1

The Controller of the Grid Side Subsystem

There are two control goals: (i) udc can fast track the reference voltage Vdc . (ii) the power factor is close to one. Based on the power conservatism principle, we can get ed igd þ eq igq ¼ udc idc ¼ udc ðC

dudc C du2dc þ iL Þ ¼ þ udc iL 2 dt dt

ð3Þ

Four Quadrant PMSM Drive System via Backstepping and Hamiltonian Control

315

According to Eq. (1) and the Eq. (3), we get Cdu2dc =dt ¼ 2ed igd  2udc iL

ð4Þ

2 The e1 stands up as a virtual control signal, where e1 ¼ Vdc  u2dc , from (1, 2) we

get 2 e_ 1 ¼ V_ dc  u_ 2dc ¼  2ðed igd  udc iL Þ=C

ð5Þ

To get a stabilizing control law igd , Consider the Lyapunov function Vge ¼ e21 =2, so  igd ¼ðkg1 Ce1 2 þ udc iL Þ=ed

ð6Þ

The PCH model is described as 

  x_ g ¼ J g ðxg Þ  Rg ðxg Þ @Hg ðxg Þ=@xg þ gg ðxg Þug yg ¼ gTg ðxg Þ@Hg ðxg Þ=@xg

ð7Þ

Where, J g ðxg Þ ¼ J Tg ðxg Þ and Rg ðxg Þ ¼ RTg ðxg Þ  0 represent the interconnection and damping structure. The state, input variable are defined as follow xgi ¼ ½ xgi1

xgi2 T ¼ ½ Ligd

Ligq T ; ugi ¼ ½ ugi1

ugi2 T

ð8Þ

The Hamiltonian function is chosen to be Hg ðxg Þ ¼¼ ðx2gi1 þ x2gi2 Þ=2L, where D ¼diagf L L g. Substituting Eq. (2) into (7), with ugi1 ¼ ed  lgd udc , ugi2 ¼ eq  lgq udc , we get   0 xgi L Rgi J gi ðxgi Þ ¼ ; Rgi ðxgi Þ ¼ xgi L 0 0 

0 Rgi



 To make the current loop is asymptotically stable at equilibrium xgi0 ¼ Ligd we find u ¼ aðxÞ, we get   x_ gi ¼ J gid ðxgi Þ  Rgid ðxgi Þ @Hgid ðxgi Þ=@xgi

ð9Þ 0

T

,

ð10Þ

Where, Hgid ðxgi Þ¼Hgi ðxgi Þ þ Hgia ðxgi Þ is the expected Hamiltonian energy function, J gid ðxgi Þ ¼ J gi ðxgi Þ þ J gia ðxgi Þ, Rgid ðxgi Þ ¼ Rgi ðxgi Þ þ Rgia ðxgi Þ. Combined Eqs. (7) and (10), we get 

J gid ðxgi Þ  Rgid ðxgi Þ

 @Hgid @xgi

  @Hgi ðxgi Þ ¼ J gi ðxgi Þ  Rgi ðxgi Þ ðxgi Þ þ ggi ðxgi Þu ð11Þ @xgi

316

G. Lv et al.

Defined the expected Hamiltonian energy function Hgid ðxgi Þ ¼ Hgi ð~ xgi Þ, where ~xgi þ xgi0 ¼ xgi , so  @Hgid ðxgi Þ ¼ igd  igd @xgi

igq  igq



ð12Þ

At the same time, let  J gia ðxgi Þ ¼

0 Jgi1

  Jgi1 r ; Rgia ðxgi Þ ¼ gi1 0 0

0



rgi2

ð13Þ

Where, the interconnection and damping parameters are described by Jgi1 , rgi1 , rgi2 . Combined Eqs. (9), (11) and (13), we get the controller as follow 

ugd ¼ egd  Rigd  rgi1 ðigd  igd Þ  Jgi1 igq ugq ¼ egq þ rgi2 igq  Jgi1 ðigd  igd Þ  xgi Ligd

ð14Þ

Consider the Lyapunov function as Vgi ¼ Hgid ðxgi Þ, from the reference [8], we know the system (11) is asymptotically stable. So Vgri ¼Vge þ Vgi and V_ gri  0. The grid side subsystem is asymptotically stable. 4.2

The Controller of the Motor Side Subsystem

There are two control goals: (i) xm can fast track the reference value xm . (ii) the four quadrant operation. The e2 stands up as the speed tracking error, where e2 ¼ xm  xm , from Eq. (2) we get e_ 2 ¼ ðnp ½ðLd  Lq Þimd imq þ Uimq   sL Þ=Jm

ð15Þ

Select the Lyapunov function Vs1 ¼ e22 =2, let e_ 2 ¼ km1 e2 ðkm1 [ 0Þ, so V_ s1 ¼  km1 e22 \0. About surface permanent magnet synchronous motor, from Eq. (13) we get imq ¼ ðsL þ Jm km1 e2 Þ

ð16Þ

The e3 stands up as the current error in q axes, where e3 ¼ imq  imq , so e_ 3 ¼ ðRs imq þ np xm Lq imd þ np xm U  umq Þ=Lq

ð17Þ

In order to get a stabilizing control law umq , choose the Lyapunov function as V3 ¼ e23 =2, so

Four Quadrant PMSM Drive System via Backstepping and Hamiltonian Control

umq ¼ Rs imq þ np xm Lq imd þ np xm U þ km2 Lq e3 ; ðkm2 [ 0Þ

317

ð18Þ

Combined Eqs. (17) and (18), we get e_ 3 ¼ km1 e3 , so V_ 3 ¼ km1 e23 \0. Based on the imd ¼ 0 principle, The e4 stands up as the current error in d axes, where e4 ¼ imd  imd , so e_ 4 ¼ ðRs imd  umd  np xm Lq imq Þ=Ld

ð19Þ

In order to get the control law umd , choose the Lyapunov function V4 ¼ e24 =2 þ V3 , so umd ¼ Rs imd  np xm Ld imq þ km3 Ld e4 ðkm3 [ 0Þ

ð20Þ

We can get e_ 4 ¼ km3 e4 , thus V_ 4 ¼ km3 e24 þ V_ 3 \0. Therefore, the motor side subsystem is asymptotically stable.

5 Simulation Result Grid side parameter: R ¼ 1 X, Em ¼ 80 V, xg ¼ 50 Hz, C ¼ 2200 lF, kg1 ¼ 55, Jgi1 ¼  3:6, rgi1 ¼0:01, rgi2 ¼0:45. Setting the DC bus voltage Vdc ¼200 V. Motor side parameter: km1 ¼ 9000, km2 ¼ 80, km3 ¼ 1750. The DC bus voltage curve was shown by Fig. 2. The voltage not only can quickly reach the set value and but also have no overshoot. Although the voltage has fluctuation when the load or the speed has changed, the DC bus voltage can stay stable.

Fig. 2. The DC bus voltage curve

Fig. 3. The current curve in d-q axes

The current in d-q axes was shown by Fig. 3. In the process of system operation, igq is closed to one, the unit power factor has realized. The motor angle speed curve was shown by Fig. 4. The Fig. 5 shows the electromagnetic and load torque curve. The motor angle speed can quickly reach the set value and have a good tracking performance. At 0.2–0.4 s, there is the same phase between eL and xm , where eL ¼ s  sL [ 0, xm [ 0, the motor runs in quadrant I. At

318

G. Lv et al.

0.6–0.8 s, there is the different phase between eL and xm , where eL ¼ s  sL \0, xm [ 0, the motor runs in quadrant II. At 1.0–1.2 s, there is the same phase between eL and xm , where eL ¼ s  sL \0, xm \0, the motor runs in quadrant III. At 1.4–1.6 s, there is the different phase between eL and xm , where eL ¼ s  sL [ 0, xm \0, the motor runs in quadrant IV.

Fig. 4. Motor angle speed curve

Fig. 5. Electromagnetic and load torque curve

6 Conclusion By combining the backstepping control and the PCH system to solve the problems when the PMSM drive in the four quadrant. In the grid side subsystem, the backstepping controller is designed to the voltage, the current loop has controlled by the PCH controller. The DC bus voltage can be stable without overshoot and the power factor is close to one. The motor angle speed has controlled by the backstepping controller, it can quickly reach the set value and have a good tracking performance. The designed control scheme has a widely prospects by the simulation results.

References 1. Yu H, Yu J (2013) Nonlinear control of induction motors based on state error PCH and energy-shaping principle. Nonlinear Dyn 72(1–2):49–59 2. Arias A, Ortega C, Zaragoza J (2013) Hybrid sensorless permanent magnet synchronous machine four quadrant drive based on direct matrix converter. Int J Electr Power Energy Syst 45(1):78–86 3. Gopinath M, Yuvaraja T, Jeykumar S (2016) Implementation of four quadrant operation of BLDC motor using model predictive controller. Mater Today: Proc 5(1):1666–1672 4. Shao M, Yu H, Yu J (2016) Four quadrant PMSM drive system via single neuron adaptive control and backstepping. ICIC Int 10(2):433–438 5. Wang W, Yin H, Lin G (2009) Study on back-to-back PWM converter based on direct power control for induction motor drive. In: International conference on electrical machines and systems

Four Quadrant PMSM Drive System via Backstepping and Hamiltonian Control

319

6. Magri A, Giri F, Abouloifa A (2010) Robust control of synchronous motor through AC/DC/AC converters. Control Eng Pract 18(5):540–553 7. Cheng X, Yu H (2016) Fuzzy adaptive control of four quadrant permanent magnet synchronous motor servo system. J Qingdao Univ 31(3):18–22 (in Chinese) 8. Yu H, Zhao K (2006) Maximum torque per ampere control of PMSM based on portcontrolled Hamiltonian theory. In: Proceedings of the CSEE, vol 26, no 8, pp 82–87

Sliding Mode Control of Induction Motor Based on AC-DC-AC Converter Huipeng Zhang and Haisheng Yu(&) College of Automation, Qingdao University, Qingdao, China [email protected] Abstract. In order to realize the four-quadrant operation, two-way flow of energy, the grid side unit power factor and guaranteed smooth DC output of the AC-DC-AC converter induction motor drive system, the sliding mode control strategy with variable exponential approach law is adopted. The grid-side converter adopts sliding mode control strategy for variable exponential approach law, which improves the anti-interference and fast response capability of the grid side subsystem. The machine-side converter adopts sliding mode control strategy with variable exponential approach law. When the DC bus voltage of the grid side subsystem tends to output smoothly, then the induction motor side subsystem starts. The simulation results show that the motor runs in four quadrants, two-way energy flow, the control of the DC bus voltage, and the network side operated at unit power are realized. This research has broad prospects in the field of industrial transmission. Keywords: AC-DC-AC converter

 Induction motor  Sliding mode control

1 Introduction In recent years, induction motor drive systems of the AC-DC-AC converters have been rapidly developed at home and abroad [1]. High-power four-quadrant converters are used to deliver regenerative energy to the medium-voltage AC grid during train operation, which has good energy-saving effects [2]. Many domestic and foreign scholars have adopted many new control methods in this field through research and analysis. In the paper [3], the vector control method is widely used, but it is difficult to quickly track the grid side DC bus voltage and the speed of the asynchronous motor. In the paper [4], it adopted the method of feedback linearization control, although it can improve the response speed of the system, but it has the disadvantage of complex decoupling matrix [5, 6]. In the paper [7, 8], it adopted the fuzzy adaptive control method. Although it can overcome the impact of motor state switching on the system, it needs a lot of learning record for the state, performance and parameters of the system operation [9, 10], which is difficult to achieve in practice. In order to control two-way flow of energy, guaranteed smooth DC output of the motor drive system of the AC-DC-AC converter. Sliding mode control strategy with variable exponential approach law is adopted. The grid side subsystem adopts the sliding mode control strategy to improve the anti-interference ability of the grid side © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 320–328, 2020. https://doi.org/10.1007/978-981-32-9050-1_37

Sliding Mode Control of Induction Motor Based on AC-DC-AC Converter

321

subsystem; the machine side subsystem adopts the method to ensure the starting of the machine side subsystem when the grid side subsystem voltage is constant.

2 The Control Principle Framework The control principle framework of induction motor drive systems of the AC-DC-AC converters is shown in Fig. 1.

Fig. 1. The control principle framework

3 The Grid Side Mathematical Model and Control 3.1

Model Representation of the Network Side Subsystem

Model representation of the network side subsystem is expressed as follow 8  < Ldigd  dt ¼ ed  Rigd þ xLigq  ugd Ldi dt ¼ eq  Rigq  xLigd  ugq : gq Cdudc =dt ¼ 2=3ðigq sq þ igd sd Þ  iL

ð1Þ

where, igd and igq are the value of the grid side subsystem current; sd and sq are the d, q axis duty cycle function; ugd and ugq are the transformed values of and f in d and q coordinates, ed and eq are the line voltage of the network side subsystem. x is the grid side subsystem angular frequency, udc is the bus DC voltage. iL is the bus current, measured by the sensor. The three-phase voltage subsystem current and the grid side subsystem is measured by the sensor. 3.2

Design of the Grid Side Subsystem Controller

Voltage control object in the grid side subsystem reaches a given value and remains constant; the unit power factor operation is realized; and the induction motor drive system operates in four quadrants.

322

H. Zhang and H. Yu

When the converter drive system is running, in order to ensure the robustness of the grid-side subsystem, the voltage error is defined as e1 ¼ Vdc  udc , the sliding-mode surface of the grid-side subsystem voltage loop is selected as Z s 1 ¼ e1 þ k1

t

e1 dt:

ð2Þ

0

where, k1 is the undetermined coefficient, as to further improve the approach speed of the approach law, this paper adopts a new method of variable exponential approach law, we have s_ 1 ¼ e_ 1 þ k1 e1 ¼  g1 jx1 j2 sgnðs1 Þ:

ð3Þ

where g1 is the exponential approach coefficient, g1 jx1 j2 is the variable speed approach coefficient, the sliding mode bandwidth of the shifting approach law is gradually reduced to zero as the jx1 j2 decreases, and finally stabilizes at the  origin.  When the grid side subsystem is stability igq ¼ eq ¼ digq dt ¼ digd dt ¼ 0, in order to obtain the AC-DC-AC converter induction motor four-quadrant drive system running under the unit power factor, the reference value of the current component of the q-axis is selected as igq ¼ 0. We can get the reference value of the d-axis current component is igd ¼ Cudc

k0 e0 þ iL =C þ g0 jx1 j2 sgnðs0 Þ ed  Rg igd

ð4Þ

The grid side subsystem can track the voltage quickly, and the current error of the current loop design of the grid side subsystem is e2 ¼ isd  isd , e3 ¼ isq  isq . The current network side subsystem adopts the integral sliding mode surface with variable exponential approach law and the sliding-mode surface of the grid-side subsystem voltage loop is selected as (

Rt s2 ¼e2 þ k2 0 e2 dt Rt s3 ¼ e3 þ k3 0 e3 dt

ð5Þ

where k2 and k3 are the undetermined coefficient, as to further improve the approach speed of the approach law, this paper adopts a new method of variable exponential approach law, we have (

s_ 2 ¼ e_ 2 þ k2 e2 ¼  g2 jx2 j2 sgnðs2 Þ s_ 3 ¼ e_ 3 þ k3 e3 ¼  g3 jx3 j2 sgnðs3 Þ

ð6Þ

Sliding Mode Control of Induction Motor Based on AC-DC-AC Converter

323

combining the first formula and the second formula in Eq. (1) with Eq. (6), we can get the controller is (

ugd = ed  Rigd þ xLigd  g2 jx2 j2 sgnðs2 Þ ugq = eq  Rigq þ xLigq  g3 jx3 j2 sgnðs3 Þ

ð7Þ

4 Induction Motor Side Mathematical Model and Control 4.1

Model Representation of Induction Motor Side Subsystem

The mathematical model of the induction motor can be expressed as follow 8 dxm n2p Lm krd sL > > > dt ¼ Jm Lr isq  Jm > > > < dkrd ¼ Lm Rr isd  Rr krd Lr Lr dt ð8Þ disd ¼  ðL2m Rr þ L2r Rs Þ i þ x i þ Lm Rr k þ 1 u > > 2 2 sd s sq rd sd rL L rL L rL > dt s s r s r > > > disq ðL2m Rr þ L2r Rs Þ Lm xr 1 : ¼  i  x i  k þ sq s sd rLs usq rLs Lr rd rLs L2r dt  where, r ¼ 1  L2m ðLs Lr Þ, np is the pole pair number, L is the leakage inductance, xs is the electrical angular velocity, i is current, xm is the mechanical angular velocity, R is the resistance, k is the linkage, the subscripts s and r the stator and rotor of motor respectively, subscripts d and q are the values of the corresponding parameters. Rm is rotor friction coefficient, Jm is moment of inertia, Lm is the mutual inductance of induction motor. 4.2

Design of the Induction Motor Side Subsystem Controller

The purpose of this subsystem is to achieve the induction motor operates normally in four quadrants and flows on both sides of the energy. The induction motor side subsystem uses a sliding mode control strategy that changes the exponential law. Define the tracking error of the speed loop and the flux link as ex ¼ x0  xm , ek ¼ krd  krd and the integral sliding surface is defined as Z t 8 > > e4 dt < s 4 ¼ e4 þ k4 0 Z t > > : s 5 ¼ e5 þ k5 e5 dt

ð9Þ

0

where, k4 and k5 are uncertain coefficients. According to the principle of the sliding mode control method, we have

324

H. Zhang and H. Yu

(

s_ 4 ¼ e_ 4 þ k4 e4 ¼  g4 jx4 j2 sgnðs4 Þ

ð10Þ

s_ 5 ¼ e_ 5 þ k5 e5 ¼  g5 jx5 j2 sgnðs5 Þ

combining the first formula and the second formula in Eq. (8) with Eq. (10), we can get the reference currents isd and isq of the induction motor are respectively h 8 < isd ¼ Jm Lr g4 jx4 j2 sgnðs4 Þ þ np Lm krd h : i ¼ Jm Lr g jx5 j2 sgnðs5 Þ þ 5 sq np Lm krd

T^L Jm Rr Lr

þ k1 ex

i

krd þ k2 ek

i

ð11Þ

define the error of current loop as esd ¼ isd  isd , esq ¼ isq  isq and the integral sliding surface is defined as Z t 8 > > s ¼ e þ k e6 dt 6 6 < 6 0 Z t > > : s 7 ¼ e7 þ k7 e7 dt

ð12Þ

0

where, k6 and k7 are uncertain coefficients. According to principle of sliding mode control method, we have (

s_ 6 ¼ e_ 6 þ k6 e6 ¼  g6 jx6 j2 sgnðs6 Þ s_ 7 ¼ e_ 7 þ k7 e7 ¼  g7 jx7 j2 sgnðs7 Þ

ð13Þ

combining the third and fourth equations in Eq. (8), we can get the controller of the current loop is h2 i 8 2 2 < usd ¼ rLs Lm Rr þ L2 r Rs isd  xs isq  Lm Rr2 krd þ g6 jx6 j2 sgnðs6 Þ rLs Lr h rLs Lr i : u ¼ rLs ðL2m Rr þ L2 2r Rs Þ isq þ xs isd þ Lm xr2 krd þ g jx7 jsgnðs7 Þ 7 sq rLs L rLs L r

ð14Þ

r

5 Simulation Result The control scheme of the design using Matlab/Simulink is simulated converter drive system operation. Grid side subsystem parameters of converter drive system operation: R ¼ 1 X, Em ¼ 380 V, x ¼ 50 Hz, C ¼ 3300 lF, Vdc ¼ 650 V, L ¼ 15 mH, k1 ¼ 100, k2 ¼ 80, k3 ¼ 55, g1 ¼ 12, g2 ¼ 16, g3 ¼ 11. Induction motor side subsystem parameters of Converter drive system operation: Vn ¼ 380 V, Rs ¼ 0:2147 X, Rr ¼ 0:642 X, Rm ¼ 0:001 N m s, Jm ¼ 0:03 kg m2 ,

Sliding Mode Control of Induction Motor Based on AC-DC-AC Converter

325

fn ¼ 50 Hz, np ¼ 2, Lr ¼ 0:0852 H, Lm ¼ 0:0813 H, k4 ¼ 20, k5 ¼ 50, k6 ¼ 80, k7 ¼ 60, g4 ¼ 11, g5 ¼ 14, g6 ¼ 10:5, g7 ¼ 11. It can be seen from Fig. 2 that the bus voltage of the grid side subsystem can be guaranteed to be stable at a set value, although the bus voltage will have a certain voltage fluctuation when the induction motor is in the switching operation state, but it can recover quickly and can reach a constant value.

Fig. 2. Grid side subsystem DC bus voltage curve

As can be seen from Fig. 3, the q-axis current component of the grid side is close to 0, the reactive power is 0, and the d-axis current component is positive, thus implementing the cross-crossing transformation, the induction motor drive system operates at unit power factor.

Fig. 3. dq axis component curve of input current of grid side subsystem

As can be seen from Fig. 4, given the rotational speed of a trapezoidal wave, motor speed based on the AC-DC-AC converter can quickly track the set value.

326

H. Zhang and H. Yu

Fig. 4. Induction motor side subsystem angular velocity curve

As can be seen in Figs. 4 and 5, At 0.4 s–1.2 s, es ¼ se  sL [ 0, xm [ 0; at 1.2 s–1.6 s, es ¼ se  sL \0, xm [ 0; in 2 s–2.8 s, es ¼ se  sL \0, xm \0; in 2.8 s– 3.2 s, es ¼ se  sL \0, xm \0. According to the relationship between the given angular velocity and the actual angular velocity and the relationship between the electromagnetic torque and the load torque, the system realizes two-way energy flow and four-quadrant operation.

Fig. 5. Induction motor side torque curve

As can be seen in Fig. 6, it is obvious that when the system is running, the sliding mode control can ensure that the DC voltage on the grid side reaches a set value and maintains a constant output. Although the voltage fluctuates when the motor state is switched, it quickly returns to the given value. Voltage orientation control has a certain steady-state error, and the error is more and more changed with the state of the induction motor.

Sliding Mode Control of Induction Motor Based on AC-DC-AC Converter

327

Fig. 6. Voltage comparison curve

6 Conclusion In this paper, aiming at the induction motor drive system, a variable exponential approaching law-sliding mode control method is proposed, which realizes the fourquadrant operation, DC bus voltage controllable, two-way flow of energy, and run at the desired power factor. The subsystem adopts a sliding mode control strategy to improve the dynamic, steady state performance ability of the grid side subsystem, which improves the fast tracking ability of the induction motor speed. The simulation results show that the designed control strategy has superior theoretical significance and application prospects. Acknowledgement. This paper is supported by the Natural Science Foundation of China (61573203).

References 1. Yu H, Yu J, Liu J, Song Q (2013) Nonlinear control of induction motors based on state error PCH and energy-shaping principle. Nonlinear Dyn 72:49–59 2. Shen L, Bozhko S, Asher G et al (2016) Active DC-link capacitor harmonic current reduction in two-level back-to-back converter. IEEE Trans Power Electron 31(10):6947– 6954 3. Majumder R, Ghosh A, Ledwich G, Zare F (2010) Power management and power flow control with back-to-back converters in a utility connected microgrid. IEEE Trans Power Syst 25(2):821–834 4. Zeb K, Uddin W, Haider A et al (2018) Robust speed regulation of indirect vector control induction motor using fuzzy logic controllers based on optimization algorithms. Electr Eng 100(2):787–802 5. Kim DI, Ha IJ, Ko MS (1990) Control of induction motors via feedback linearization with input-output decoupling. Int J Control 51(4):863–883 6. Shao M, Yu H, Yu J (2016) Four quadrant PMSM drive system via single neuron adaptive control and backstepping. ICIC Int 10(2):433–438 7. Vazquez S, Rodriguez J, Rivera M, Franquelo LG, Norambuena M (2016) Model predictive control for power converters and drives: advances and trends. IEEE Trans Ind Electron 99:1

328

H. Zhang and H. Yu

8. Kumar NS, Sadasivam V, Muruganandam M (2007) A low-cost four-quadrant chopper-fed embedded DC drive using fuzzy controller. Electr Power Compon Syst 35(8):907–920 9. Li S, Zhang W (2017) An adaptive sliding-mode observer with a tangent function-based PLL structure for position sensorless PMSM drives. Int J Electr Power Energy Syst 88:63–74 10. Sebaaly F, Vahedi H, Kanaan HY, Moubayed N, AI-Haddad K (2016) Sliding mode fixed frequency current controller design for grid-connected NPC inverte. IEEE J Emerg Sel Top Power Electron 4(4):1397–1405

Field Environment Intelligent Navigation System for Tomato Transportation Robot Based on Dijkstra Xiaonan Guo1, Yifei Chen1,2(&), Jianwei Zhao3, Liu Yang1, and Wenwen Gong1 1

2

College of Information and Electrical Engineering, China Agricultural University, Beijing, China [email protected] Key Laboratory of Agricultural Information Acquisition Technology (Beijing), Ministry of Agriculture, Beijing, China 3 School of Mechatronic Engineering, China University of Mining and Technology, Beijing, China

Abstract. Tomato fields are large and complex. The picked tomatoes cannot be transported to the storage area in time, which will affect the quality of tomato. Transport tomato not only cost time but also need many labors. So, it is very important to use the tomato transport robot. This paper designed a navigation system for tomato transport robot based on Dijkstra algorithm. The system improved the robustness of the algorithm. The improved algorithm can plan the path for any two points in the field environment. Realized a function that can transport the tomatoes with a best and fastest route. The navigation system defining the route and the intersection. The routes and intersections of the filed can be added and modified flexibly that adapt to changeable field environment. Achieving the human-computer interaction interface with Java, which make the operation easier and more flexible. It is very important that the real-time performance of the robot. The average calculate time of this navigation system is about 0.53 s, which conform to real-time requirements of transportation robot. Keywords: Tomato transport robot

 Navigation  GPS sensor  Dijkstra

1 Introduction The key technologies of transportation robot are guidance, location and path planning. How to get the coordinate information of the starting point and how to reach the target point in the fastest and optimal way. Shortest path planning for transportation robot: In literature [1] OpenCV was used for polygon fitting of obstacle contour. Using the network topology to establish the working model, try and Error method was combined with Dijkstra algorithm to obtain the approximate optimal path. Literature [2] uses the improved discrete particle swarm optimization algorithm to plan the optimal path of the robot. Literature [3] proposed different optimization algorithms to solve the shortest path planning for difficult scene. © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 329–336, 2020. https://doi.org/10.1007/978-981-32-9050-1_38

330

X. Guo et al.

This paper taking Dijkstra algorithm as the core designed a tomato transportation robot navigation system for tomato field in Fig. 1, which make the tomato transportation more cost effective and more intelligent.

Fig. 1. Tomato field

The navigation system of tomato transport robot designed based on Dijkstra algorithm. GPS sensor is used to locate the robot. The system uses Java to realize the shortest path algorithm and displays the path in the human-computer interaction interface. And the path information will be integrated into instructions and transmitted to the robot controller. The system adapts to the changeful field environment by independently defining the connected route and intersection node. The functions of modifying route and node are designed to adapt to the changing environment. The system is very flexible and more suitable for the tomato transport robot in the field environment. The flowchart as shown in Fig. 2.

Fig. 2. The flowchart of tomato transport robot navigation system

Field Environment Intelligent Navigation System

331

2 Dijkstra Shortest Path Planning Algorithm Dijkstra algorithm using the directed graph to solve the shortest path planning. The key feature of Dijkstra is expanding from the starting point until reaches the ending point. The key of calculating the shortest path is: A adjacency matrix V is defined to store the distance information between any two points in the weight graph. If the two points are connected, then the matrix value is the distance between these two points, otherwise it is ∞. The distance between a point and itself is 0. Creating a set of information j dj ; pj ; fj for each point v. The dj is the distance between point s and point j; pj is previous node of j; fj records whether the dj value is ∞. The Fig. 3 is Dijkstra algorithm flowchart.

Fig. 3. Dijkstra algorithm flowchart

Dijkstra’s basic procedure is: 1. Initialization: The starting point s is set as: ds ¼ 0, ps is empty, fs ¼ true. The other nodes iðnÞ: diðnÞ ¼ 1, piðnÞ is empty, fiðnÞ ¼ false, and search from s. 2. Calculate diðnÞ value of all points which fiðnÞ ¼ false: di ¼ minfdi ; dk þ lg; l is direct distance that from node j to node i, k is previous node of j. 3. Select the next node: for all fiðnÞ ¼ false points which found in step 2, sorting their diðnÞ and selecting the closest point i as the current point and set pi ¼ j, fi ¼ true. 4. Determine whether the fe of terminal e is true. If yes, output the shortest path. If no, return step 2. The navigation system constructs the model of the field as the adjacency matrix in the algorithm. Then, using the Dijkstra algorithm to plan the way between two

332

X. Guo et al.

intersections in the field. The adjacency matrix contains all of intersections, however, the robot and the tomato may appear at anywhere. So, this paper improves Dijkstra algorithm. The improved Dijkstra algorithm can calculate the shortest path of any points in the map.

3 Design of Navigation System for Tomato Transportation Robot 3.1

Hardware Design of Tomato Transportation Robot

The tomato transport robot in this paper adopts a four-wheel structure (as shown in Fig. 4). The tomato transport robot is equipped with camera, ultrasonic sensor, infrared sensor, GPS sensor and so on.

Fig. 4. Model of tomato transportation robot

The tomato transportation robot control system adopts the interactive structure of host computer and robot. The host computer providing functions include receive data, plan path, data management, robot motion monitoring and others. The robot to be responsible for robot control, data acquisition and environment perception. The communication between host computer and robot is through WIFI. Figure 5 is hardware structure of tomato transport robot.

Fig. 5. The hardware structure of tomato transport robot

Field Environment Intelligent Navigation System

3.2

333

Navigation System Path Planning

The navigation system improves Dijkstra algorithm. The operator gets the location of the robot as starting point and set the position of tomato or storage area as ending point. The system plans the path between two points and calculates the route length and path information, which are displayed in computer. Improved algorithm flowchart as shown in Fig. 6.

Fig. 6. The flowchart of navigation algorithm

Improved algorithm first checking whether the starting point and ending point are stored in the adjacency matrix, and then determines the node which will be used for calculation. Use the JDBC API executing SQL statements to find if the start and end points exist in the database and return the data id.

id="select id from vertex where address="+"\""+add+"\"";

334

X. Guo et al.

If id = 0, then the point does not exist in the data, the distance between this point and other points in the database are calculated use Eq. (1). d¼

qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ðx1  x2Þ2 þ ðy1  y2Þ2

ð1Þ

The closest point’s id will be returned. Using this node as the current starting or ending point to calculate the shortest path. The system stores the intersections as nodes. For example, the positions of two ends of each ridge and storage area. As shown in Fig. 7. Then store all routes. The distance between two adjacent points is actual distance, and the distance between non-adjacent is ∞. Including the length of a ridge, the distance between the end of the ridge and storage area. The algorithm converts all nodes and route information into arrays and adjacency matrices. Selecting the position of the robot or the position of the tomato as starting point and select the position of tomato or storage area as ending point.

Fig. 7. Schematic of tomato field

3.3

Navigation System Functions

The navigation system designed in this paper realized the path planning, path and node management, path monitoring. The operator selects the position of tomatoes as ending point through the human-computer interaction interface and select the robot current position as starting point to plans the optimal route. The navigation system functions include node management, path management, optimal path calculation, robot motion monitoring. Node Management Section. Node management section has four functions: node add, node delete, node modify, view node information. In the computer interface click any intersection to add new node to the database. Unusable branch roads also can be removed from node management. Path Management Section. Path management section has four functions: path add, path delete, path modify, view path information. Add the new road information to the

Field Environment Intelligent Navigation System

335

database in the human-computer interaction interface. Operators also can delete unavailable paths. Optimal Path Calculation. Calculation shortest path section consists of three parts: (1) calculate the shortest path between two intersections in the map. (2) calculate the way between the robot’s position and tomato position. (3) calculate the shortest path from the robot’s position to storage area. Robot Motion Monitor. Robot motion monitor part includes two parts: robot position monitor and robot motion route monitor. The robot position monitor part can display robot current position in real time so that the operator dispatch robot. The robot route monitor part display of the robot’s motion on the human-computer interaction interface.

4 Experiment The field tomato transportation robot navigation system was tested in the laboratory. First. Existing nodes are selected as starting and ending point for path planning. The shortest path will be planned according to current node and return path information. There are many routes between two points. The algorithm calculates the shortest distance as the current route. This path planning takes 0.5 s. Second. Starting from the current position of robot and select ending point on the map for path planning. The starting point and the ending point are not in the database. So, the closest point to the starting point and ending point will be found, which will be used to calculate the shortest distance and return the path information. This path planning takes 0.6 s. Third. Take the current position of robot as starting point and select exist node as target point for path planning. The starting point is not in the database. So, calculate the closest point to the starting point and use it to calculate the shortest distance. This path planning takes 0.48 s. Fourth. Select exist node as the robot current location and select ending point on the map. The ending point is not in the database. So, calculate the closest point to the ending point and use it to calculate the shortest distance. This path planning takes 0.53 s. Through the simulation test, the function of this navigation system is stable. The average calculating time of improved shortest path algorithm is 0.53 s, which conform to the real-time requirements of the robot. The result of shortest path planning is accurate. And the system has good adaptability to complex environment.

5 Conclusion The navigation system designed in this paper is based on the improved Dijkstra algorithm. Using the GPS to obtain the robot position. Realizing the information interaction between host computer and robot through the WIFI module. Realizing the

336

X. Guo et al.

shortest route planning between any two points of tomato field. The man-machine interactive interface was designed to monitor the robot’s motion and to manage tomato field map information. The test environment of simulation experiment is complex, there are many intersections. The system still realizes the function of shortest path planning and navigation accurately. The tomato field environment is simple. It is expected that the tomato transport robot navigation system can achieve better path planning effect. In the following research, the system will be tested in the tomato filed. And the navigation algorithm will be improved to make the path calculation more accurate and reduce the time and space complexity of the algorithm.

References 1. Li D (2014) Dijkstra’s algorithm in AGV. In: 2014 IEEE 9th conference on industrial electronics and applications, pp 1867–1871. https://doi.org/10.1109/iciea.2014.6931472 2. Sun C (2010) Research on optimal path planning for robots based on discrete particle swarm optimization algorithm. East China Jiaotong University. (in Chinese) 3. Klidbary SH, Shouraki SB, Kourabbaslou SS (2017) Path planning of modular robots on various terrains using Q-learning versus optimization algorithms. J Intell Serv Robot 10:121– 136. https://doi.org/10.1007/s11370-017-0217-x 4. Parulekar M, Padte V, Shah T, Shroff K, Shetty R (2013) Automatic vehicle navigation using Dijkstra’s Algorithm. In: 2013 international conference on advances in technology and engineering, India. https://doi.org/10.1109/icadte.2013.6524721 5. Yang X, Liu D, Cong L, Liang L (2014) Shortest path algorithm based on distance comparison, Canada. IEEE. https://doi.org/10.1109/igarss.2014.6947142 6. Jiang J, Wu L (2014) A re-optimization dynamic shortest path algorithm for vehicle navigation, Canada. IEEE. https://doi.org/10.1109/igarss.2014.6947135 7. Zhang Y, Chong KT (2014) An GPS/DR navigation system using neural network for mobile robot. J Int J Precis Eng Manuf 15:2513–2519. https://doi.org/10.1007/s12541-014-0622-4

Reducing Bullwhip Effects in Supply Chain Systems via H 1 Control Chen Qian and Qingwei Chen(&) School of Automation, Nanjing University of Science and Technology, Xiaolingweistr. 200, Nanjing 210094, China [email protected] Abstract. To solve the bullwhip effect on supply chain members, H1 control is used to inhibit the bullwhip effect and ensure the stable operation of the system. Focusing on a member in the supply chain, a linear discrete-time system composed of a controlled object and a steady controller was constructed. Because the parameters of the bullwhip effect have the same value with the H1 norm of the system, the robust controller was introduced into the system and replaced the prediction function. This method can effectively solve the problem of order amplification caused by the variation of customer demand. The simulation results show that compared with the traditional prediction algorithm, the H1 controller proposed in this paper can more effectively attenuate the bullwhip effect caused by fluctuations of customer demand. Keywords: Bullwhip effect

 H1 control  Supply chain

1 Introduction Effective supply chain management is driven by the market demand [1]. Coordinating between supply and demand is always the top priority of SCM. The bullwhip effect is formed by supply chain members trying to coordinate supply and demand [2]. The bullwhip effect refers to the phenomenon that demand fluctuations are amplified during the supply chain transmission process. The research on the bullwhip effect has been mainly divided into: the causes of the bullwhip effect, the measurement of the magnification effect and how to attenuate. Lee et al. [3, 4] analyzed the causes of the bullwhip effect. There were two main methods for quantifying the bullwhip effect. One was the statistical analysis measurement method published by Sterman. The other one was a new bullwhip effect quantification method based on control engineering proposed by Disney and Towill et al [5]. They used the transfer function, frequency analysis and spectrum analysis methods to treat the supply chain system, and defined the ratio of the Laplace transforms (demand and order) as the quantitative index of the bullwhip effect. Xiaoyuan [6] researched the classical supply chain system and introduced the robust H1 control. Furthermore, Xiaoyuan [7] established a discrete-time system model with multiple delays, quantified the bullwhip effect using variance, and proposed the H1 control method when the worst-case scenario occurred. © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 337–346, 2020. https://doi.org/10.1007/978-981-32-9050-1_39

338

C. Qian and Q. Chen

This paper firstly used the engineering control theory method to introduce the H1 controller instead of the prediction function to predict the demand for the first-order supply chain system. Then the system model with H1 controller was constructed, and the Riccati-based optimization algorithm was used to solve the controller to achieve the purpose of attenuating the bullwhip effect. Finally, through MATLAB, the simulation showed that the H1 controller method was better than the time average method and the exponential average method for the actual demand data. No research has solved the bullwhip effect by combining H1 control theory focusing on one node in supply chain. Therefore, this study has important significance and can provide a useful reference for the weakening of the bullwhip effect in marketing.

2 Model and Measurement 2.1

Structure of Supply Chain Systems

H1 control theory is a method of analyzing the bullwhip effect, as it can be transformed into a control model. Using control theory, the supply chain system is divided into two parts, the generalized plant and the stabilizing controller. The control model is shown in Fig. 1.

Fig. 1. General closed-loop interconnection model

The core company predicts future order based to the demand information of downstream requests, and then books orders to upstream company. For the entire control model, demand DðtÞ is the external input represented by w, while demand DðtÞ is also the measurement variables of the stabilizing controller represented by y. Furthermore, order OðtÞ is the external output of the control mode represented by z, ^ ðtÞ is a control signal represented by u. Disconnecting the and forecasting demand O controller, the open-loop interconnection of supply chain system is described as: 

      OðtÞ DðtÞ P11 ðzÞ P11 ðzÞ DðtÞ ¼P ¼ ^ ðt Þ ; DðtÞ Sð t Þ P11 ðzÞ P11 ðzÞ O

ð1Þ

Reducing Bullwhip Effects in Supply Chain Systems via H∞ Control

339

the controller follows the equation: ^ ðtÞ ¼ K ðzÞDðtÞ: O

ð2Þ

In the supply chain, we focus on the decision of order OðtÞ. 2.2

Order Decision Rule

To quantify the magnification of order volatility, suppose the chain only has a single retailer and a manufacturer. It can be assumed that the three steps occur in each time period t: first step, the retailer obtains the commodity ordered before several time periods. Second step, the retailer observes and satisfies the demand DðtÞ from the downstream (assuming there is no backlog order). Third step, the retailer updates the inventory and orders an order OðtÞ from the upstream. The time delay factor is considered in this system. It can be understood that the retail applies for an order at the third step in period t and receives goods at the first step in period t + L. Here L is considered to be a fixed constant. According to the time series, the retailer receives the goods in the next period even if there are no production and logistics delays. The lead time L is equal to TP þ 1, where TP refers to the production or logistics delay. In this paper, it is assumed that TP equals to 3. This time delay is common in models, not a special case of this model, and has no direct impact on the results. For retailers, we used a generalized replenishment rule strategy to meet market rules, and the order decisions are following the equation: ^ ðtÞ þ K1 ðTNSðtÞ  NSðtÞÞ þ K2 ðDWIPðtÞ  WIPðtÞÞ: OðtÞ ¼ O

ð3Þ

^ ðtÞ is During the period t, OðtÞ is the order quantity determined at the third step, O the forecasting demand. NSðtÞ equals the net stock on hand, while WIPðtÞ refers to the work in process position. TNSðtÞ is the target net stock, and the desired WIP level is represented by DWIPðtÞ. K1 and K2 are key parameters of the decision rules. ^ ðtÞ is updated every period by the stabilizing controller. The forecasting demand O According to the events, NSðtÞ and WIPðtÞ are updated by following equations: NSðtÞ ¼ NSðt  1Þ þ Oðt  LÞ  DðtÞ WIPðtÞ ¼ WIPðt  1Þ  Oðt  LÞ þ Oðt  1Þ:

ð4Þ

^ ðtÞ in TNSðtÞ is the safety stock for the company, which is approximately equal to O actual production. It is changed according to the forecasting demand of each period. ^ ðtÞ. DWIPðtÞ is also related to the forecasting demand, and DWIPðtÞ ¼ ðL  1ÞO

340

C. Qian and Q. Chen

Fig. 2. Causal loop diagram

2.3

Transfer Function Model

Using the control theory, the supply chains are viewed as systems, and the relationship between different nodes in the chain are modelled by the transfer function. For one order decision with any parameters, a transfer function is determined. The input is the demand from customer and the output is the corresponding order decision. To describe the order decision rule, the supply chain event ‘causal loop diagram’ was drawn in Fig. 2.

Fig. 3. Block diagram

Next, based on the causal loop diagram, the ‘block diagram’ was shown in Fig. 3. A delay factor z1 is used to ensure the time series matches the actual situation. Finally, applying the block diagram to simplify the well-established rules, we obtained the following equation to calculate the order OðtÞ, over the observed demand DðtÞ and ^ ðtÞ: forecasting demand O



2.4

Reducing Bullwhip Effects in Supply Chain Systems via H∞ Control

341

 " z4 OðtÞ ¼ z4 þ ðK2 1Þz3 þ K1 K2 DðtÞ 1

ð5Þ

ðz4 z3 Þð1 þ 3K1 þ K2 Þ z4 þ ðK2 1Þz3 þ K1 K2

#

0

 DðtÞ ^ ðtÞ : O

Bullwhip Effect Metrics

The performance of a system is often expressed in terms of frequency response (FR). Use the sine waves of different frequencies as the input. Since the supply chain systems are linear discrete-time systems, the amplitude of output will be different. This paper focused on the Amplitude Ratio (AR), the ratio of the amplitudes. For different frequencies, AR was calculated, and FR plot was drawn to determine the dynamic characteristics of the system. The FR was used to predict the multiple of the variance amplification below the different frequencies. The bullwhip effect metric peak AR value is defined as: ARP , maxx2ð0;pÞ ðGðjxÞÞ;

ð6Þ

where GðzÞ is the transfer function of the whole system. For a particular frequency, the amplitude of the output sinusoid is the largest. At the same time, the peak AR value takes the maximum value which is the worst case. In control system engineering, the H1 norm of the system is defined as: kGðzÞk1 , sup rmax ðGðjxÞÞ; x

ð7Þ

which is the maximum singular value of the frequency response, so it is the same as the ARP. The H1 norm is also the metric of the system, which provides an ideal for the introduction of the H1 controllers into the supply chain.

3 Attenuating the Bullwhip Effect via H 1 Control As previously mentioned, the control model of the supply chain systems was analyzed and the block diagram shown in Fig. 3 was obtained. The controller was designed to attenuate the bullwhip effect. According to the transfer function, this system is a generalized linear discrete-time system, and is described as: ^ ðtÞ; xðt þ 1Þ ¼ AxðtÞ þ B1 DðtÞ þ B1 O ^ ðtÞ; OðtÞ ¼ C1 xðtÞ þ D11 DðtÞ þ D12 O ^ ðtÞ: DðtÞ ¼ C2 xðtÞ þ D21 DðtÞ þ D22 O

ð8Þ

342

C. Qian and Q. Chen

To solve this H1 discrete-time control problem, for a pre-specified positive value c, a stabilizing controller K ðzÞ should be calculated to meet next equation: kFl ðP; K Þk\c;

ð9Þ

where Fl ðP; K Þ is the transfer function FOD ðzÞ from the demand DðtÞ to the order OðtÞ, as: FOD ðzÞ ¼ Fl ðP; K Þ ¼ P11 þ P12 K ðI  P11 K Þ1 P21 :

ð10Þ

Petkov [8] solved this problem that computed a H1 suboptimal controller. According to the Ricatti-based H1 method, the parameters of the controller were calculated, further the transfer function of the system was obtained.

4 Simulation Consider the case of the parameters: K1 ¼ 1:2; K2 ¼ 0:7. By Eq. (5), 

 " 7z4 OðtÞ 10z4 þ 2z3 5 ¼ DðtÞ 1

53z4 53z3 10z4 þ 2z3 5

#

0

 DðtÞ ^ ðt Þ : O

Next, the parameters of H1 controller were obtained. 2

0:0000 6 1:0206 Af ¼ 6 4 0:0000 0:0000 Cf ¼ ½ 0:0689

0:0000 0:0000 0:0000 0:0000

1:0142 0:0345 0:0000 0:000

3 2 3 0:1101 0:1891 6 7 0:1348 7 7; Bf ¼ 6 0:2316 7; 5 4 0:2024 0:0193 5 0:6965 0:7436

0:0844

0:0582

0:0208 ; Df ¼ 0:1034:

It can be confirmed that the controller was stable and the transfer function of the whole system was obtained. Then, the FR plot was drawn as shown in Fig. 4. The red dotted line indicated the frequency response of the system without the H1 controller, while the blue line indicated the frequency response including the H1 controller. We can find that the amplitude ratio (AR) of the closed-loop was always smaller than the amplitude ratio of the system without the H1 controller. For the index of the bullwhip effect, ARP ¼ 1, the controller met the requirements for attenuating the bullwhip effect, and the closed-loop system was asymptotically stable.

Reducing Bullwhip Effects in Supply Chain Systems via H∞ Control

343

Fig. 4. Frequency response of supply chain system

The H1 controller method, exponential smoothing method and moving average method were used to simulate the actual demand data of the same group (sales records of commodities on Taobao). As shown in Fig. 5, (a) was the result of the H1 controller using the parameters calculated above; (b) and (c) were the results of predicting the demand using the exponential smoothing method [6], which the parameters were Ta ¼ 8ð8=1=1Þ and Ta ¼ 8; Tn ¼ 4; Tw ¼ 4; ð8=4=4Þ) respectively; (d) was the result of the moving average method [6], which set the parameter, Tm ¼ 10. The solid blue line indicated the actual demand and the red dotted line indicated the order to the upstream. The fluctuations in the number of orders in Fig. 5(a) and (c) were less than the fluctuation in actual demand, while the fluctuation of order quantity in Fig. 5(b) and (d) were lager than the fluctuation of demand. For the variation of the demand signal, the H1 control method and the exponential smoothing method with appropriate parameters can effectively reduce the bullwhip effect. To more intuitively compare the four sets of data, Table 1 gave the SDs of demand and four sets of orders and the ratios of orders to demand. From Table 1, using exponential smoothing method (8/1/1) and the moving average method, the fluctuations of the order quantity were magnified. H1 controller method performed best, and the volatility of order was almost one-third of the volatilities of exponential smoothing (8/1/1) method or moving average method. Figure 6(a) and (b) were the responses of H1 controller method and exponential smoothing method (8/4/4) to the step demand respectively. How long to keep order quantity to meet the new demand determines the quality of the forecasting algorithm. By analyzing the data in Fig. 6(a) and (b), it can be seen that the H1 controller algorithm required 27 time intervals so that the difference between order and demand was less than 0.2% of demand, while the exponential smoothing method (8/4/4) required 54 time intervals. The H1 controller method had a better performance in this respect.

344

C. Qian and Q. Chen

Fig. 5. Impact of H1 controller or prediction functions on real demand

Table 1. SDs and bullwhip effect metrics of H1 controller and prediction functions Standard deviation Metric c Demand 457.0 1 Order (H1 controller) 246.5 53.95% Order (exponential smoothing (8/1/1)) 706.3 154.55% Order (exponential smoothing (8/4/4)) 295.8 64.74% Order (moving average) 712.5 155.91%

Figure 6(c) and (d) showed the responses of the H1 controller method and exponential smoothing method (8/4/4) to sinusoidal demand at different frequencies respectively. From Fig. 6(c) and (d), the bullwhip effects reduced at the high frequency part indicated by green dotted line in both two methods. Whereas the H1 controller method performed better than the exponential smoothing method (8/4/4) at the low frequency part indicated by green solid line. The order quantity in H1 controller method can follow the change of demand, while the exponential smoothing method (8/4/4) in this area fluctuated significantly in order quantity, and the bullwhip effect has not been reduced. In general, the H1 controller method had a better effect than the exponential smoothing method (8/4/4), especially in the case of small fluctuations in demand.

Reducing Bullwhip Effects in Supply Chain Systems via H∞ Control

345

Fig. 6. Impact of H1 controller and exponential smoothing method for different patterns

So far, the model built were all one layer, but the actual supply chain was multilayered. If all nodes in the supply chain use the same parameters, the data of the order volume fluctuations on the second and third layer with the demand data from Fig. 5 were organized in Table 2. Compared with the initial demand data, the bullwhip effect metrics on the second layer and the third layer were 44.61% and 43.63%, respectively. The bullwhip effect has been reduced layer by layer. Table 2. SDs and bullwhip effect metrics on different layers Demand Order (first layer) Order (second layer) Order (third layer)

Standard deviation Metric c 457.0 1 246.5 53.95% 203.8 44.61% 199.4 43.63%

5 Conclusion Focusing on the demand signal processing, the supply chain was regarded as a control system as well as the H1 controller was designed to weaken the bullwhip effect. In addition, according to the order decision rule, the causal loop diagram of the events was

346

C. Qian and Q. Chen

obtained and then the block diagramed was determined in combination with the H1 controller. The controller parameters were calculated by solving the H1 optimal problem of the discrete-time system. Finally, the H1 controller method is simulated and compared with the time average method and the exponential smoothing method. The simulations reveal that the H1 controller method perform best in attenuating the bullwhip effect. At the same time, the order can quickly track the changes in demand, greatly reducing the inventory risk and cost of the enterprise. Acknowledgment. This work was supported in part by National Natural Science Foundation of China under grant 61673217, 61673219, in part by Postgraduate Research & Practice Innovation Program of Jiangsu Province under grant KYCX19_0300, KYLX16_0450, KYCX19_0301, KYCX19_0299.

References 1. Christopher M (1992) Logistic and supply chain management: strategies for reducing costs and improving services. Pitman Publishing, London Financial Times 2. Burbidge JL (1983) Five golden rules to avoid bankruptcy. Prod Eng (11):824–987 3. Lee HL, Padmanabhan V, Whang S (1997) Information distortion in a supply chain: the bullwhip effect. Manag Sci 43(4):546–558 4. Lee HL, Padmanabhan V, Whang S (1997) The bullwhip effect in supply chain. Sloan Manag Rev 38:93–102 5. Sterman JD (1989) Modeling managerial behavior: misperceptions of feedback in a dynamic decision-making experiment. Manag Sci 35(3):321–339 6. Xiaoyuan H, Haifeng G, Zhen L (2007) A H∞ control method of the bullwhip effect for a class of supply chain systems. Int J Prod Res 45(1):207–226 7. Xiaoyuan H, Haifeng G, Zhen L (2005) A H∞ control method of the bullwhip effect for a supply chain delay model. J Syst Eng 20(6):585–590 8. Petkov PHr, GU DW, Konstantinov MM (1999) Fortran 77 routines for H∞ and H2 design of discrete-time linear control systems. In: NICONET.WGS 9. Bengang G, Youming C (2002) The cause of “bullwhip effect” and its solution. Shanghai Manag Sci 3:38–40 (in Chinese) 10. Li Y (2002) Robust control: linear matrix inequality method, 1st edn. Tsinghua University Press, Beijing (in Chinese)

Visual-Inertial Localization and Map Summarization Based on Prior Map Bo Fu1,2, Yanmei Jiao1,2, Xiaqing Ding1,2, Yue Wang1,2(&), and Rong Xiong1,2(&) 1

2

Institute of Cyber-Systems and Control, Zhejiang University, Hangzhou 310027, China [email protected], {wangyue,rxiong}@iipc.zju.edu.cn State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou 310027, China

Abstract. Accurate localization of the robot is an important prerequisite for the autonomous mobile robot. Existing localization methods struggle with the cumulative drift errors problem. We proposes the visual-inertial localization method which based on multi prior maps and generates a summary map with a fixed map size. Specifically, for the localization problem with gravity alignment, the relative pose of the pitch and roll is known, which reduces the dimensions of the problem. For the 3D-2D data association of the map and current query image, both geometric and reprojection constrains are used. In the process of map summarization, the idea of iterative map building is proposed and a novel scoring strategy is exploited to limit the summary map to a fixed size. We evaluated our method on public and our datasets. The result indicates that our method owns higher localization accuracy and better robustness than other comparative method. Keywords: Visual-inertial localization

 Map summarization  Priori map

1 Introduction Large-scale, long-term distributed mapping and localization is a core challenge in the robotics and mobile device applications [1], which can be widely used in scenes such as inspection robots and augmented reality. In recent years, Simultaneous Localization And Mapping (SLAM) [2] has developed rapidly. SLAM refers to create an environmental map while moving, and estimate the pose of the robot itself. EKF-SLAM was first proposed by [3], the motion model and the observation model are used to calculate the pose of the robot itself and the landmark points. However, EKF-SLAM relies on the correct data association. Once the data association is wrong, it will lead to the failure of building the map. Moreover, the calculation cost of EKFSLAM is high, and the calculation amount is proportional to the square of the map size, so it can only be used for a smaller range of environments. [4] proposed the ORBSLAM algorithm that has three parallel threads of tracking, mapping and loop closure. It enables high-precision localization in real time online in small or wide range of unknown environments (Fig. 1). © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 347–355, 2020. https://doi.org/10.1007/978-981-32-9050-1_40

348

B. Fu et al.

Fig. 1. Localization effect diagram: blue frame is the robot pose; lines of different colors are the lines of sight in the current pose, and the different colors represent the 3D points from different maps; the black points are the priori map points.

However, SLAM system cannot perform robust localization in complex environments, and in many cases the localization accuracy cannot meet the application requirements. Therefore, the localization method based on a priori map is proposed as shown in Fig. 2. [5] proposed a distributed and decentralized robot mapping method which allows to access to the map during operation. In order to increase localization accuracy, algorithms must be developed to achieve better results in repeated access to the same place. [6] proposed and evaluated an algorithm for alternating between online location identification and map maintenance offline. Similar to [7, 8] directly calculates the pose matrix between the map and the current trajectory. It uses geometric constraints between 3D point clouds, eliminating the need for matching between feature points, reducing the possibility of mismatching and stability. However, the matching between point clouds is generally suitable for laser data, and requires a dense point cloud with small uncertainty, which will cause a decrease in localization accuracy when used in visual data. We proposes the visual-inertial localization method which based on multi prior maps and generates a summary map in the fixed size. For the data association of the map and the current query image as shown in Fig. 2, both geometric and reprojection constrains are used, and a final RANSAC is used to filter the inliers. In the process of map summarization, the idea of iterative map building is proposed, and the global highprecision visual-inertial map is obtained through continuous iterative optimization. To limit the summary map to a fixed size respect to the area covered, a novel scoring strategy is exploited to compress the map, so that the global map size can converge after multiple iterations.

2 Data Association and Optimization In this section, we will discuss how to match current query image feature points to the priori map 3D points quickly, efficiently, and accurately. After completing the data association between the query image and the priori map, we will discuss how to

Visual-Inertial Localization and Map Summarization Based on Prior Map

349

Fig. 2. System overview: A schematic is drawn on two places, the yellow line is the line of sight of the robot, and the current continuous image is associated with the data of the 3D point of the priori map to complete localization.

optimize the localization result using the observation information of the prior map. The priori map we saved includes the pose of the keyframes at each moment, and the position of 3D points observed by the keyframes at each moment. As shown in Fig. 3, our data association consists of four steps: 2D-3D, geometric constraint, 3D-2D, reprojection constraint. 2.1

Data Association

2D-3D and Geometric Constraint: In most datasets, the pre-built map is very large. It is time-consuming and unreasonable to traverse all the 3D points for data association. Since the 3D points in the priori map are all related to the keyframes, and the number of keyframes is much less than the number of 3D points, we first associate the current keyframes with the priori map keyframes. In our method, the relative pose (i.e. G TC ) of the current trajectory in initial moment to the priori map is known by default, which can be rough estimated by mechanical parameters. After the conversion by G TC , the 10 keyframes in the priori map that are closest to the current keyframe in Euclidean distance are searched. The above search can be accelerated using the KD-tree [9]. The priori 3D points observed by these 10 priori keyframes are defined as candidate points. After the keyframe-to-keyframe filtering, we complete the point-to-point data association. Specifically, the pixel points on the current query image are reconstructed into 3D points. Each 3D point is then filtered from the candidate priori 3D points with Euclidean distance as the threshold. After this, a rough data association is completed, since the keyframe-to-keyframe filtering is performed first, then perform the point-topoint filtering is performed, which greatly reduces the time for data association, and the accuracy is not reduced. 3D-2D and Reprojection Constraint: After 2D-3D projection and geometric constraints, the data association can be further filtered. We reproject the priori map 3D point onto the current query image, and calculate the pixel error of the closest feature point detected in current image, and filter with the pixel error as the threshold.

350

B. Fu et al.

Fig. 3. Data Association: The pixels on the query image are reconstructed in 3D (2D-3D), and then filtered with the priori map 3D points in distance (Geometric Constraint). Then, the priori map 3D points are projected onto the current query image (3D-2D), filtered with the current query image points in reprojection error (Reprojection Constraint). The priori map 3D points remaining after filtering are associated with the query image points.

After the above filtering step, the pixel points on the current image are associated with the priori map 3D points. In order to reduce the influence of mismatch as much as possible, we remove the outliners in the priori map 3D points by the RANSAC algorithm. 2.2

Optimization

Next, we put the priori map 3D point observations in the optimization framework to optimize the pose of the current robot. As shown in Fig. 4, both the priori map 3D point and the currently reconstructed 3D point are taken together as observations to participate in the local optimization of the current pose. And according to the credibility of the priori map information, we can weight the priori map 3D points in the optimization, and even let their values not be updated. Thanks to the observability of pitch and roll angle given by the inertial measurements, the direction of gravity can be aligned between prior map coordinate system and current localization coordinate system, leading to the reduction of DoF in pose as W

 x ðcÞjð t1 TC ¼ ½Rz ðaÞRy ðbÞR

t2

t3 ÞT 

where a and (t1 t2 t3) denote the yaw angle and three translations to be estimated. So our optimization function only needs to update the pose of 4DoF, which greatly improves the optimization speed.

3 Map Summarization In this section, we will discuss how to build a map to maintain its accuracy while the map size is maintaining constant of the scenes.

Visual-Inertial Localization and Map Summarization Based on Prior Map

351

Fig. 4. The schematic diagram of the optimization framework, the abrupt frame is the priori map information.

3.1

Recursive Mapping

In order to make the built map as accurate as possible, we propose a recursive mapping method, for example, MH02 data localize on the MH01 map to build the MH0102 map, then the MH03 data localize on the MH0102 map to build the MH010203 map, and so on. On the premise that there are multiple trajectories, the difference between direct fusion mapping and recursive mapping is that direct fusion mapping optimizes multiple trajectories together, which will cause the trajectories to be pulled each other, thus affecting the accuracy of the map, and it does not suitable for most real-world scenarios. The advantage of recursive mapping is that in the process of updating the map in each iteration, a certain degree of confidence is given to the priori map, thereby narrowing the scope of optimization and avoiding over-optimization. In the process of localization each time, the map is updated in real time, which is in line with the actual situation, and the algorithm can be applied to the real scene. As shown in Fig. 5, the robot is localized on a pre-built map, and when it moves to a location that has not been previously visited, it starts to localize itself and build a new map.

Fig. 5. Recursive mapping schematic diagram: the blue frame is the robot pose, the lines of different colors are the line of sight of the robot in the current pose, the different colors represent the 3D points from different maps, the black points are the a priori map points, and the red points are the currently built points.

352

3.2

B. Fu et al.

Map Sparsification

In order to maintain the size of the map, the map information needs to be compressed when performing recursive mapping of multiple trajectories. The information in the pre-built map is mainly: 3D map landmark points, keyframes. The conventional compression method is to delete duplicate or low information data. First, score all the map points. If the map points are observed by multiple keyframes, the score will be high, otherwise it will be low. In order to avoid those map points that were only seen once but provide a lot of information, we set the lower bound of the score. Points below the lower bound of the score are also retained. In this way, only map points that are observed less frequently and provide less information are deleted. Deleting only map points with low observations is not enough to make the map converge with iterations. Therefore, it is necessary to select each newly added map information. It can be known in the data association section that the priori map 3D points associated with the current image are duplicated with the 3D points of the current trajectory. Therefore, we mark the associated 3D map points and delete these 3D points after the localization is completed, which will not affect the localization effect and maintain the size of the map.

Fig. 6. Schematic diagram of map sparsification.

For a track segment consisting of multiple keyframes, it can be classified into novel track segments, and redundant track segments. In practical applications, 3D map landmark points and track segments are tightly coupled. When generating multiple trajectories to build a map, we set a sliding window with a window size of 2. When the track segment enters the sliding window, it is judged that if a certain number of new map points are observed at the track segment, the track segment is considered novel. If not, the track segment is considered redundant. For the novel track segment, we will keep it. For the redundant trajectory segment, we will delete it and its observed map points. As shown in Fig. 6, we can see that the denser part of the map deletes more points, which are points that provide less information. The more sparse parts of the map delete fewer points because the number of points in this part is small but providing enough information. After the map sparsification, the built map has a clear structure, and it’s size constant with the scences.

Visual-Inertial Localization and Map Summarization Based on Prior Map

353

4 Experimental Results To verify the accuracy of our method, we performed experiments on the EuRoC MAV dataset [10] and the YQ dataset, respectively. The EuRoC MAV dataset comes from ETH. It uses the quadrotor equipped with VI-Sensor to collect data and provides ground-truth as shown in Fig. 7. Its target scene is robot rescue, so the scene is more complicated and requires high reliability for visual algorithms. In the test process of the localization algorithm based on the visual-inertial prior map, the trajectory of MH01 and MH03 is used to build the map MH0103, we completed the localization of MH02 on the a priori map of MH0103.

Fig. 7. Sensor configuration.

Fig. 8. Schematic diagram of trajectory accuracy.

The YQ data set is an outdoor data set collected by the mobile robot developed by our laboratory on the Yuquan Campus of Zhejiang University. The mobile robot is equipped with the sensor as shown in Fig. 7. The observation data collected is the school roadway, with many trees on both sides of the road and pedestrian interference. In this algorithm test, the data collected by 0823 is used to build the map, we completed the localization of 0827 on the a priori map of 0823. Both trajectories start from the same location and eventually return to the starting point, and the trajectories are similar.

354

B. Fu et al.

EuRoC MAV Dataset: The experimental results of the EuRoC MAV data set are shown in Fig. 8. The EuRoC MAV data set provides the ground-truth of the trajectory. We compared the accuracy with the ORB-SLAM method. The ORB-SLAM method does not use the map information. As can be seen from the figure, compared to the ORB-SLAM method, the trajectory of proposed method is better in most of parts.

Fig. 9. Relative pose error.

In order to numerically represent the trajectory accuracy, we use RPE (Relative Pose Error) to measure the local drift of the trajectory. The calculation method of RPE is the error between ground-truth and trajectory obtained by method used. As shown in Fig. 9, the accuracy of our method’s trajectory accuracy is slightly lower than that of ORB-SLAM in both rotation and translation. YQ Dataset: The experimental result of the EuRoC MAV dataset is shown in Fig. 10 below. From the figure, we can see that proposed method can pull the trajectory back to the correct position based on the observation of the prior map after the locating jump. And from this we can conclude that our method has better robustness. Since the YQ dataset does not provide a ground-truth, we have not calculated the accuracy.

Fig. 10. The localization result of the YQ data set, the green line is the trajectory of the prior map, and the blue frame is the current localization trajectory.

Visual-Inertial Localization and Map Summarization Based on Prior Map

355

5 Conclusion We proposed a visual-inertial localization method based on multi prior visual-inertial maps and generates a summary map with a fixed map size utilizing proper compression method. For the 3D-2D data association of the map and the current query image, both geometric and reprojection constrains are used, and a final RANSAC is used to filter the inliers. In the process of map summarization, the idea of iterative map building is proposed, and the global high-precision visual-inertial map is obtained through continuous iterative optimization. To limit the summary map to a fixed size, a novel scoring strategy is exploited to compress the map, so that the global map size can converge after multiple iterations. Acknowledgement. This work was supported in part by the National Key R\&D Program of China (2017YFB1300400), and in part by the National Nature Science Foundation of China (U1609210).

References 1. Kitt B, Geiger A, Lategahn H (2010) Visual odometry based on stereo image sequences with RANSAC-based outlier rejection scheme. In: IEEE intelligent vehicles symposium, vol 43, no 6, pp 486–492 2. Choi H, Yang KW, Kim E (2014) Simultaneous global localization and mapping. IEEE/ASME Trans Mechatron 19(4):1160–1170 3. Schmidt A (2014) The EKF-based visual SLAM system with relative map orientation measurements. In: Computer vision and graphics 4. Mur-Artal R, Montiel JMM, Tardos JD (2015) ORB-SLAM: a versatile and accurate monocular SLAM system. IEEE Trans Robot 31(5):1147–1163 5. Cieslewski T, Lynen S, Dymczyk M et al (2015) Map API - scalable decentralized map building for robots. In: IEEE international conference on robotics and automation. IEEE, pp 6241–6247 6. Dymczyk M, Lynen S, Cieslewski T et al (2015) The gist of maps - summarizing experience for lifelong localization. In: IEEE international conference on robotics and automation. IEEE, pp 2767–2773 7. Ventura J, Arth C, Reitmayr G et al (2014) Global localization from monocular SLAM on a mobile phone. IEEE Trans Visual Comput Graph 20(4):531 8. Middelberg S, Sattler T, Untzelmann O et al (2014) Scalable 6-DOF localization on mobile devices. In: European conference on computer vision, pp 268–283 9. Efron B, Hastie T, Johnstone I et al (2004) Least angle regression. Ann Stat 32(2):407–451 10. Burri M, Nikolic J, Gohl P et al (2016) The EuRoC micro aerial vehicle datasets. Int J Robot Res 35(10):1157–1163

A Deep Learning Method for Heartbeat Detection in ECG Image Zewen He1,2, Jinghao Niu1,2, Junhong Ren1, Yajun Shi3, and Wensheng Zhang1,2(&) 1

3

Institute of Automation, Chinese Academy of Sciences, 95 Zhongguancun East Road, Beijing 100190, China {hezewen2014,niujinghao2015,junhong.ren}@ia.ac.cn, [email protected] 2 University of Chinese Academy of Sciences, Beijing, China Department of Cardiology, Chinese PLA General Hospital, 28 Fuxing Road, Beijing 100853, China [email protected]

Abstract. Although heartbeat segmentation can be done very well in ECG signals for arrhythmia detecting, there’re short of techniques for detecting heartbeat part from ECG images. We apply the powerful Faster R-CNN detector here, and achieves accurate detecting results. Along with the improved patchsampling mechanism in training, detection results are more precise. The high evaluation metric on validation data and demo of real scenes demonstrate the effectiveness of our method. Keywords: Heartbeat detection

 ECG images  Faster R-CNN detector

1 Introduction ECG is a method to transform electric wave of heart to digital signals or images. Advanced techniques [12] are developed to analyze the ECGs. For example, diseases about heart like arrhythmia can be diagnosed quickly from ECG signals. Constrained by interface incompatibility, not all ECG signal data can be transferred between different hospitals. Fortunately ECG images can be shared by smartphones easily. However there lacks detection methods on ECG images. We haven’t seen related works about detecting heartbeat part from ECG images. In computer vision community, it has make huge progress on object detection, originating from the convolutional neural network (CNN). Powerful backbones [10], delicate design on loss and well-annotated datasets contribute to this success. Inspired by it, we try to prepare ECG images with labelled bounding-box for heartbeat detecting. Next we apply the Faster R-CNN detector to ECG images. Considering the scale variation of the heartbeat parts in ECG images, we propose and use customized patch-sampling mechanism in training to promote performance. Our contribution can be summarized as follows: – We apply powerful Faster R-CNN detector to ECG domains for detecting heartbeat parts, and achieve quite high accuracy. © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 356–363, 2020. https://doi.org/10.1007/978-981-32-9050-1_41

A Deep Learning Method for Heartbeat Detection in ECG Image

357

– We propose a patch-sampling mechanism in training, leading to finer detection. – Detection performance on real ECG images are also high.

2 Related Works 2.1

Heartbeat Segmentation

Heartbeat segmentation means segmenting heartbeat intervals from ECG signal. These intervals usually contain R peak, QRS complex, as shown in Fig. 1. Digital filters are widely used for this task. Sophisticated methods based on neural networks, wavelet transform, filter banks have also been used. The details are given in the survey [12] about heartbeat classification for arrhythmia detection. It should be noted that, nearly all methods process the ECG signal but not image, and these algorithms are embedded into different devices. So only images like Fig. 1 can be shared conveniently. Our method try to detect heartbeat from the ECG images.

Fig. 1. Heartbeat segment in ECG image: The left means one heartbeat segment in ECG signal, and the right illustrates all heartbeat segments which is enclosed by colorful boxes. Our method takes charge of detecting these boxes quickly and accurately.

2.2

Object Detection

Classical Detectors. Early detection approaches were based on sliding-window, they classify the type of each sub-window seperately. Harr face detectors [2], HOG-based pedestrian detection [3], and part-based methods [4] belong to this. Although designed delicately and equipped with multi-scale strategy, performance is limited too. ConvNet Detectors. Convolution neural network (CNN)-based detectors [5–7, 13] dominates object detection community recently. With enough training, they can defeat classical methods easily on multiple benchmarks. The R-CNN and its variants [5–7] gradually promotes the upper bound of performance on two-stage detectors. In particular, Faster R-CNN [7] adopts shared backbones to proposal (RoI, namely region of interest) generation and RoI classification, resulting realtime and accurate detection. Our method is based on Faster R-CNN [7]. Details will be described in Sect. 3.2.

358

Z. He et al.

3 Method 3.1

Heartbeat Detection from ECG Image

Traditional heartbeat segmentation means segmenting the part, like QRS complex, from ECG signal. Specifically in this paper, the task is localizing a box which encloses the QRS complex region, as shown in Fig. 1. Here we proposed a Faster R-CNN (Frcnn) based method to detect heartbeat part, from ECG image. Important components of Frcnn detector will be described. Then an improved training strategy will be introduced to lift detection performance on ECG image. 3.2

Faster R-CNN Detector

General Framework. The detection procedure of Frcnn starts feeding the image into Backbone Network to extract conv-feature, which is shared by two sub-networks. At the 1st stage, region proposal network (RPN) generates many RoIs based on this convfeature. Then at the 2nd stage, Fast R-CNN extracts individual feature for each RoI. It then predicts the category and refines position. Finally, post-processing techniques like soft-nms [1] will be used to remove duplicates. In the following, more details of each component and the training mechanism will be introduced.

Fig. 2. Faster R-CNN on heartbeat detection

Backbone Network. It plays a significant role in extracting meaningful features for subsequent steps like RPN and Fast R-CNN. Fortunately, the development of CNN on vision is rapid and solid. Residual Network (ResNet) [10] is the outstanding, and becomes the standard configuration in conv-net based detectors. Feature pyramid network (FPN) [11] is also proposed to detecting objects on feature of different levels. It regards the traditional ResNet as a bottom-up pathway of information, and proposes the top-down pathway and lateral connection to output multiple features with abundant details and semantics, as shown in Fig. 2. Besides, FPN detects

A Deep Learning Method for Heartbeat Detection in ECG Image

359

objects at disjoint scale ranges at corresponding levels. We choose FPN-based ResNet here, due to its better accuracy [11] than vanilla one in detection. Head Subnet. Head predicts objects’ position and categories subsequently. As shown in Fig. 2, at the 1st stage, RPN head receives the conv-feature of entire image and predefined anchor boxes [7]. At the end here, ‘cls layer’ predicts the probability that anchor box contain object and ‘reg layer’ performs bounding-box regression [5] to refine anchor box. More specifically, ‘reg layer’ predicts 4 values to transform old RoI (here is anchor box) to new RoI, as shown in Fig. 3.

vx = (Gx − Px ) / Pw v y = (G y − Py ) / Ph vw = log(Gw / Pw ) vh = log(Gh / Ph ) Fig. 3. bbox regression: At right, the blue rectangle RoI P ¼ ðPx ; Py ; Pw ; Ph Þ is an object proposal. The 4 elements means the P’s center, width and height. And the green rectangle RoI G ¼ ðGx ; Gy ; Gw ; Gh Þ is the ground-truth bbox of object. At left, the ðvx ; vy ; vw ; vh Þ is the prediction target for ‘reg layer’, the equation describes the RoI transformation.

At 2nd stage, Fast R-CNN head adopts RoI-Align [9] to extracting same-size feature for RoIs from 1st stage. At the end, ‘cls layer’ here conducts multi-class classification for each RoI, and ‘reg layer’ outputs 4 values for RoI refinement. Network Optimization. Next we’ll introduce the loss and sample strategy in training. Loss Function. Considering Fast R-CNN, Cross-entropy loss for ‘cls layer’ is introduced for multiple classification on C categories, and smooth-L1 loss [6, 7] for ‘reg layer’ is introduced for localization. The loss function for RPN is similar, while the C need to be 2 for classifying the foreground/background. Pos/Neg RoI Sample for Training. Secondly, we need sample RoIs for training. The positive and negative ones are used for classification, while only the positive ones are for localization. For RPN and Fast R-CNN, Intersection-over-Union (IoUs) between input RoIs and ground-truth bboxes are calculated to determine pos/neg according to threshold in [7]. And the pos/neg ratio is set to 1:3 to reduce class-imbalance. The whole network is optimized by SGD, which details are in Sect. 4.1. 3.3

Patch-Based Training Scheme

Although Frcnn is strong enough for general object detection, it’s still difficult to detect heartbeat from ECG image. Firstly, the context in ECG is almost the same red grid background. If the whole image participates in training, computation capacity is wasted in processing the repeated context region. Secondly, the scale of the bbox in ECG vary greatly. As shown in Fig. 1, some bboxes of heartbeats in I-type lead are almost

360

Z. He et al.

horizontal, while others in V2 are almost vertical. This makes it difficult to train detector network quickly. We turn to patch-based training for help. What Is Patch? Here patch means a region in image which contains objects. We can just crop patches from original image for training to save computation. And cropped patches only label objects whose scale is normal, while ignore the extreme ones. These patches will be used for training network like SNIPER method [13]. Patch-Based Optimization. The core technique of patch-based optimization is finding meaningful patches. Analogously to SNIPER [13], designed Greedy Patch Generation (GPG) algorithm is as shown in Fig. 4. While SNIPER uses different ranges, uniform scale range Vs is used for consistency. In training, all patches from GPG will be used as samples. Other steps in inference are same as [13].

Fig. 4. GPG Algorithm. Iorin means the original image; Borin ¼ fb1 ; . . .; bn g contains all the objects in Iorin ; Sfactors means the factors of scale; Vs means the scale range; W means the standard size of patch; S means the spatial interval of the sliding window.

A Deep Learning Method for Heartbeat Detection in ECG Image

361

4 Experiments Experiments are performed on an ECG image dataset with only 1 category, namely heartbeat. All details about dataset, implementation and results are as follows. 4.1

Common Settings

ECG Image Dataset. Firstly, 764 ECG images are generated from real signals. The sizes are all 560 * 940. Secondly, each heartbeat is labeled by an bounding-box, as shown in Fig. 1. Thirdly, they are randomly divided into three disjoint subsets, namely train-set (252), val-set (252) and test-set (260). In addition, real-set consists of 10 images from smartphone. They will be used for demonstrating the effect on real scenes. Experimental Procedure. Firstly, hyper-parameters are searched by training detection models on train-set and evaluating on val-set. Then, detectors are trained on trainset + val-set and evaluated on the test-set. Demo results will be obtained on real-set. Implementation Details. If without specific description, following settings apply to all models. All models are implemented on the same codebase for comparison. The training and testing hyper-parameters are almost the same as Mask R-CNN [9]. The backbones and head subnets are the same as FPN [11], only plus ResNet-18-FPN. Models were trained on 4 GPUS with 1x and 2x strategy respectively. Here, 1x means that total iteration number for training is 900 and 2x means 1800, namely 29 and 59 epochs. The learning rate lr is initialized with 0.00125 * bs which is linear with minibatch size bs like [8]. For 1x strategy, lr will be reduced by 10x at 19-th, 26-th epoch; while 38-th, 52-th epoch for 2x. Frcnn Detectors are trained and tested with single scale. The scale consists of (800, 1333) and (576, 1333). For patch-based training, the scale factor set is Sfactors ¼ f2:0; 1:0; 0:5g. And the scale range is Vs ¼ ½16; 560. 4.2

Detection on Heartbeat

The evaluation is based on mAP (mean AP over multiple thresholds) from COCO. Main Results. The main results are from training models on train-set+val-set, then evaluating them on test-set. Detailed comparison is shown in Table 1. The final highest mAP is 85.6, when training with scale = (576, 1333), 1x strategy and patch-based sampling, namely GPG algorithm. Ablation Studies. They are conducted when training on train-set and evaluating on val-set. Different backbones and patch-sampling are experimented. Detailed comparison is shown in Table 1. The results shows: (1) For learning strategy, 2x always performs better than 1x; (2) scale (576, 1333) is more suitable for detection here than scale (800, 1333), due to that the ECG images are all (560, 940) here; (3) When the depth of ResNet increases, the mAP will promote; (4) Patch-based sampling is always better than original sampling strategy, under many different configurations. The (1–3) verify the effectiveness of selected hyper-parameters, and (4) demonstrate the superiority of GPG algorithm. Similar conclusion can be obtained from results on test-set.

362

Z. He et al.

Table 1 mAP comparison: Left are results on test-set while right are for val-set. At 1st row, ‘M’ means method, ‘Net’ means backbone network; ‘576 + 1x’ means using 1x strategy on scale = 576. At 2nd column, ‘F’ means original Frcnn; ‘+P’ means plus patch-based optimization. At 3rd column, ‘R18’ means ResNet-18-FPN and so on. On val set On test set M Net 576 + 1x 800 + 1x 576 + 2x 800 + 2x 576 + 1x 800 + 1x 576 + 2x 800 + 2x F F F +P +P +P

R18 R50 R101 R18 R50 R101

79.7 81.6 82.2 80.9 82.4 83.1

76.7 79.3 81.2 77.6 80.9 81.8

82.3 83.4 83.6 82.9 83.9 83.8

79.8 81.3 83.1 80.6 82.2 83.6

82.7 83.8 84.7 83.8 84.5 85.1

81.1 82.6 84.2 81.2 82.5 84.9

84.2 85.2 85.4 84.8 85.4 85.6

82.6 84.2 85.3 83.2 84.9 85.5

Demo and Practical Application. It is necessary to evaluate the method on images from real world. Although there exists no annotation on real images, we can also compare methods based on their outputs. Detailed demo can seen in Fig. 5.

Fig. 5. Demo detection results in real scenes

5 Conclusion We apply the powerful Faster R-CNN detector to detecting heartbeat part in ECG images, and achieves precise results. Along with the improved patch- sampling mechanism in training, higher evaluation metric can be achieved. In addition, some demo from real scenes demonstrate the effectiveness of our method. Acknowledgement. This work was supported by the National Key R&D Program of China (No. 2016QY03D0501), by the National Natural Science Foundation of China (No. U1636220, NO. 61876183), by the Beijing Natural Science Foundation (No. 4172063).

A Deep Learning Method for Heartbeat Detection in ECG Image

363

References 1. Bodla N, Singh B, Chellappa R, Davis LS (2017) Soft-NMS-improving object detection with one line of code. In: Proceedings of the IEEE international conference on computer vision, pp 5561–5569 2. Viola P, Jones MJ (2004) Robust real-time face detection. Int J Comput Vision 57(2):137– 154 3. Dalal N, Triggs B (2005) Histograms of oriented gradients for human detection. In: International conference on computer vision & pattern recognition (CVPR 2005), vol 1. IEEE Computer Society, pp 886–893 4. Felzenszwalb PF, Girshick RB, McAllester D, Ramanan D (2010) Object detection with discriminatively trained part-based models. IEEE Trans Pattern Anal Mach Intell 32 (9):1627–1645 5. Girshick R, Donahue J, Darrell T, Malik J (2014) Rich feature hierarchies for accurate object detection and semantic segmentation. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 580–587 6. Girshick R (2015) Fast R-CNN. In: Proceedings of the IEEE international conference on computer vision, pp 1440–1448 7. Ren S, He K, Girshick R, Sun J (2015) Faster R-CNN: towards real-time object detection with region proposal networks. In: Advances in neural information processing systems, pp 91–99 8. Goyal P, Dollár P, Girshick R, Noordhuis P, Wesolowski L, Kyrola A, Tulloch A, Jia Y, He K (2017) Accurate, large minibatch SGD: training imagenet in 1 hour. arXiv preprint arXiv:1706.02677 9. He K, Gkioxari G, Dollár P, Girshick R (2017) Mask R-CNN. In: 2017 IEEE international conference on Computer vision (ICCV). IEEE, pp 2980–2988 10. He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 770–778 11. Lin T-Y, Dollár P, Girshick RB, He K, Hariharan B, Belongie SJ (2017) Feature pyramid networks for object detection. In: CVPR, vol 1, p 4 12. Luz EJS, Schwartz WR, Cámara Chávez G, Menotti D (2016) ECG-based heartbeat classification for arrhythmia detection: a survey. Comput Methods Programs Biomed 127:144–164 13. Singh B, Najibi M, Davis LS (2018) SNIPER: efficient multi-scale training. In: Advances in neural information processing systems, pp 9333–9343

Multi-mode Design and Constant Current Control of Hydraulically Interconnected Energy-Regenerative Suspension Ruochen Wang , Dong Sun(&) , Renkai Ding and Xiangpeng Meng

,

School of Automotive and Traffic Engineering, Jiangsu University, Zhenjiang 212013, China [email protected]

Abstract. This work develops a half-car model based on hydraulically interconnected energy-regenerative suspension (HIERS) to analyze the vehicle dynamic performances and energy-regenerative characteristics under three working modes of comfort, security and energy-feedback. Also, a multi-mode control system is proposed based on the constant current control method. Taking the road excitation frequency as the multi-mode system switching threshold, a comprehensive investigation on the vehicle dynamic performances is performed. According to the simulation results, it can be found that a 10.77% decrement of body acceleration can be reached under the comfort mode compared with comprehensiveness mode. Apart from that, tire dynamic load under security mode drops by 17.43% and theoretical energy-regenerative power under energyfeedback mode increases by 19.48%. The conclusion proves that the coordinated control of HIERS dynamic performance and energy-regenerative characteristics is achieved. Keywords: Hydraulically interconnected suspension  Energy-regenerative Multi-mode design  Switching threshold  Optimal current control



1 Introduction In the hydraulically interconnected suspension (HIS) system, different hydraulic cylinders are connected through oil pipelines and the stiffness and damping of suspension may be adjusted by force between wheels, which improves vehicle dynamic performance effectively [1]. In comparison with active suspension, HIS does not consume external energy and the cost is lower because of its simple structure. In addition, the way to recycle the energy generated by suspension vibration effectively has attracted much attention [2]. Earlier study is mainly concentrated on structure design and dynamic performance of HIS. Zhang et al. [3] designed a HIS system where the multi-body dynamic equations of multi-rigid-body hydraulic system were derived, and the influence of interconnection arrangements on dynamic performance was studied. Wang et al. [4] proposed a suspension mode switching control strategy based on fuzzy control to © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 364–372, 2020. https://doi.org/10.1007/978-981-32-9050-1_42

Multi-mode Design and Constant Current Control of HIERS

365

achieve the optimal performance of hydraulically interconnected inertia-spring-damper suspension during the global operating conditions. The simulation and experimental results showed the effectiveness of the fuzzy switching control method. Ding [5] designed several working modes for HIS and selected different stiffness and damping coefficients for corresponding mode, which improved the dynamic performance of suspension. However, this considerable energy generated by suspension vibration is ignored and wasted. In order to regenerate the dissipated vibration energy, energy-regenerative suspensions have greatly aroused the interests of scholars all around the world. Wendel [6] proposed the model that the oil in the shock absorber was exported to drive the hydraulic motor to recycle the part of energy with reasonable control strategies. In [7], the energy-regenerative unit was added to HIS, which can recover some of vibration energy when guaranteeing the normal dynamic performance of suspension. Chen et al. [8] used the alpha method to assign weights to vehicle ride comfort, handling stability and energy-feedback power. Based on the NSGA-II algorithm, the parameters of HIERS were optimized to improve the suspension performance comprehensively. It is shown that HIRES has been studied widely. However, dynamic performance and energy-regenerative characteristics of suspension restrict each other and the coordinated control of the two is not achieved. Apart from that, the contradiction between the two dynamic performances under single mode remains outstanding. Aiming at the above problems, we establish a multi-mode control model of HIRES based on constant current control method. Three working modes, namely comfort mode, security mode and energy-feedback mode, are designed. The reasonable switching thresholds are determined. This paper is arranged as follows: In Sect. 2, HIERS model is established and the formulas of constant current control are derived according to the constant current energy-regenerative circuit. The three working modes are designed and the switching thresholds are determined in Sect. 3. And the optimal current values are also determined by simulation. In Sect. 4, the dynamic performance and energy-regenerative characteristics of HIRES are simulated on sinusoidal torsional road and D-level random road. At last, conclusions are shown in Sect. 5.

2 HIRES Model The structure of HIERS model is shown in Fig. 1. In Fig. 1, the superior chamber of left side of the dual-direction hydraulic cylinder of HIERS is connected to the inferior chamber of right side, which is highlighted in red. It is the same with the superior chamber of right side and the inferior chamber of left side is in blue. They are connected by the rectifier bridge comprising four check valves, accumulator, hydraulic motor, hydraulic pipeline and other connections.

366

R. Wang et al. Z b1

Z b2

mb Rectifier bridge

Check valve

Hydraulic cylinder

k1

Accumulator

M

Z w1

Z g1

Hydraulic motor

Hydraulic cylinder

k2

M

mw1

mw 2

kt 1

Constant current control

V Variable resistance

A

A E

Motor

Constant current control

kt2

Z w2 Zg2

V

E

Variable resistance Right Current I2

Left Current I1

Fig. 1. Half-car equipped with HIRES rear suspension schematic

2.1

Constant Current Control Circuit

When vehicles driving on an uneven pavement, suspensions excited by road input vibrate up and down to drive motor rotates, and the constant current energy-regenerative circuit is always in the power generation state. In case of the road excitation amplitude is small, the energy-feedback power of generator is too little to charge the super capacitor. When the excitation amplitude is large, the instantaneous power will be over-high, which may damage the circuit components. In order to recover vibration energy effectively and protect circuit components, this paper uses PI controller and adjustable resistance to establish constant current control circuit, as shown in Fig. 2. Diode

Capacity

Resistance R1

Adjustable resistance Rx Adjustable inductance

M

Motor

ib

Controller1 de/dt

ia

Controller2

Fig. 2. Constant current control circuit

In the circuit, Ib is the actual current, and Ia is the ideal current. The electrical power is given as: P0 ¼ E  Ib ¼ P2 þ Pcu

ð1Þ

Multi-mode Design and Constant Current Control of HIERS

367

where P0 is the total power of generator, P2 is the actual output power of motor, and Pcu is the internal loss power of motor, and they are given as: 

P2 ¼ Ib2  ðR1 þ Rx Þ ¼ U  Ib Pcu ¼ Ib2  R0

ð2Þ

where R0 is the internal resistance of motor, Rx is the adjustable resistance, U is the external circuit voltage. Combining Eqs. (1) and (2) shows that: P0 P2 þ Pcu Ib2  R0 þ U  Ib U ¼ ¼ ¼ þ R0 Ib Ib2 Ib2 Ib2

ð3Þ

The adjustable resistance Rx in the constant current control circuit is given as: Rx ¼ 2.2

U  R0  R1 Ia

ð4Þ

Constant Current Control Method

In HIERS system, due to the existence of the combined structure of hydraulic motor and electrical motor, the adjustable portion of the internal damping force from hydraulic cylinder and the damping force from generator back electromotive have a mutual coupling relationship. The hydraulic motor acts the role of transmitting force and torque. P1 ¼ Pem þ Pk

ð5Þ

where P1 is the output power of hydraulic motor, Pem is the electromagnetic power of electrical motor, and Pk is the idle loss power of generator. It can be obtained when both sides of Eq. (5) are divided by the angular velocity x: T1 ¼ Tem þ Tk ¼ CT UIb þ Tk

ð6Þ

where T1 is the output mechanical torque of hydraulic motor, Tem is the output electromagnetic torque of electrical motor, Tk is the idle torque of generator, CT is torque constant, and U is magnetic flux in permanent magnet generator. According to the motor torque balance equation, T1 is expressed as: T1 ¼

PM  q g  2p gv

ð7Þ

where PM is the pressure difference, q is displacement of hydraulic motor, η is total efficiency of hydraulic motor, ηv is volumetric efficiency of hydraulic motor. According to Eqs. (2) and (3), it can be obtained that: PM  q g  ¼ CT UIb þ Tk 2p gv

ð8Þ

368

R. Wang et al.

Equation (4) indicates that the constant current energy-regenerative circuit designed in this paper can control the current Ib in the circuit in real time by adjusting the adjustable resistance Rx when recovering vibration energy of suspension. From Eq. (8), it can be seen that the pressure difference PM is linearly related to the current Ib. By adjusting Ib, the electrical motor speed can be controlled, thereby changing PM. The circuit current not only determines the energy-regenerative power of generator, but also affects the dynamic performance of vehicle. Therefore, the constant current control method is used in this circuit to achieve real-time control of the suspension dynamic performance and energy-regenerative characteristics.

3 Design of Working Mode 3.1

Determination of Switching Threshold

Body acceleration and tire dynamic load are two important indexes for evaluating vehicle ride comfort and handling stability. The f is the road excitation frequency, and the frequency responses of body acceleration and tire dynamic load to the excitation is shown in Fig. 3.

(a) Body acceleration

(b) Tire dynamic load

Fig. 3. Frequency response of dynamic performances

Figure 3(a) shows that 0.5–4 Hz is the body resonance frequency band. The control objective should be set as reducing body acceleration, so 0.5–4 Hz is defined as the switching threshold of comfort mode. Figure 3(b) shows that 8–12 Hz is the wheel resonance frequency band. The control objective should be set as reducing tire dynamic load, so 8–12 Hz is defined as the switching threshold of security mode. Body acceleration and tire dynamic load are both not sensitive to road input of 4–8 Hz and above 12 Hz. Therefore, the switching threshold of energy-feedback mode is defined as 4–8 Hz and above 12 Hz. Three working modes are divided as shown in Table 1.

Multi-mode Design and Constant Current Control of HIERS

369

Table 1. Division of three working modes Frequency (Hz) 0.5 < f < 4 8 < f < 12 4 < f < 8 or f > 12

3.2

Working mode Comfort Security Energy-feedback

Evaluation index Body acceleration Tire dynamic load Energy-regenerative power

Determination of the Optimal Current Value

The left and right side currents of constant current energy-regenerative circuit affect not only the energy-feedback power, but also the dynamic performance. Thus, current values are changed to simulate and analyze the ride comfort, handling stability and energy-regenerative characteristics so that the optimal current values of each working mode can be obtained. The minimum current value is 0.3 A due to the limitations of electrical motor internal resistance and load resistance. When the value is over 5 A, the suspension performance deteriorates obviously and the sharp fluctuation of load power is not conducive to energy recovery. Therefore, the current value ranges from 0.3 A to 5.1 A, and the sampling interval is set as 0.3 A. The HIERS simulation model is established in AMESim and MATLAB/Simulink. A sinusoidal twisted road in which the amplitude is 50 mm, the excitation frequency is 1 Hz and the wheel phase difference is 180° is set as the simulation operation condition. The simulation results show that three performances indexes vary with the current value of the left and right constant current circuit, which are shown in Fig. 4.

Fig. 4. Changes of suspension performance varying with left and right side current

Figure 4 shows the changes of suspension performance varying with currents. In (a), when the current values of the left and right constant current circuit are 1.8 A and 1.8 A respectively, the body acceleration is minimal, so (1.8 A, 1.8 A) is the optimal current value for comfort mode. In (b), the tire dynamic load has the smallest value when the current values are 5.1 A and 5.1 A. So the optimal current value for security mode is (5.1 A, 5.1 A). In (c), HIRES system recycles the most energy when the current values are 4.2 A and 4.2 A, so (4.2 A, 4.2 A) is chosen as the optimal current value for energy-feedback mode. And they are applicable to all operation conditions. In order to verify the effectiveness and rationality of multi-mode control, it is necessary to obtain the optimal current value under the single control mode. Under the

370

R. Wang et al.

operation condition that vehicle speed is set as 10 m/s and road input is 50 mm, 1 Hz sinusoidal pavement, when left and right current value are 3.2 A and 3.2 A, body acceleration and handling stability both get the smaller value, which means the optimal comprehensive performance is achieved. Therefore, (3.2 A, 3.2 A) is defined as the optimal current value for comprehensiveness mode and it is suitable for all conditions.

4 Simulation Analysis The simulation is conducted with the vehicle driving on a sinusoidal twisted pavement at 10 m/s. The time-domain responses of body acceleration, energy-regenerative power and tire dynamic load at low frequency, medium frequency and high frequency are shown in Fig. 5. The RMS values of simulation results are shown in Fig. 6.

Fig. 5. Suspension performances on sinusoidal twisted road

Fig. 6. RMS values of suspension performances on sinusoidal twisted road

Figure 6 indicates that body acceleration becomes the largest at low frequency (f = 2 Hz), where body acceleration under comfort mode is reduced by 6.72% compared with comprehensiveness mode. The ride comfort performance of vehicle has improved. Body acceleration and tire dynamic load are both smaller at medium frequency (f = 6 Hz), where energy-regenerative power under energy-feedback mode improves by 24.35% compared with comprehensiveness mode, which means energyregenerative characteristics has greatly improved. At high frequency (f = 10 Hz), tire dynamic load is the largest, where tire dynamic load under security mode is reduced by 13.67% compared with comprehensiveness mode. The handling stability performance of vehicle has greatly improved.

Multi-mode Design and Constant Current Control of HIERS

371

Afterwards, the vehicle is set to drive on D-level random road with a speed of 20 m/s. The three working modes of the designed HIRES are simulated and analyzed. The time-domain responses are revealed in Fig. 7. RMS values of results are listed in Table 2.

Fig. 7. Suspension performances on random road

Table 2. RMS values of suspension performances on random road Performance Body acceleration/(m s−2) Tire dynamic load/kN Energy-regenerative power/W

Comfort 1.3430 3.8365 153.79

Energy-feedback 1.5203 3.3377 236.86

Security 1.7743 2.9018 213.14

Comprehensiveness 1.5051 3.5144 198.25

It can be seen from Fig. 7 and Table 2 that body acceleration under comfort mode is reduced by 10.77% compared to comprehensiveness mode. Tire dynamic load of security mode is reduced by 17.43% compared with comprehensiveness mode. Energyfeeding power of energy-feedback mode has increased by 19.48% compared to comprehensiveness mode. The simulation results indicate that the designed HIERS with three working modes can not only take both of ride comfort and handling stability into account, but also coordinately control dynamic performance and energy-regenerative characteristics of vehicle compared with HIERS under single control mode. Above of all, HIERS with multi-mode control system can meet the requirements of obtaining optimal vehicle performance during the global operation conditions.

5 Conclusion A new type of HIRES structure with a multi-mode control system has been established. The road excitation frequency has been chosen as switching threshold and three working modes focused on comfort, security and energy-feedback are designed. Energy-regenerative unit and constant current control circuit are introduced into HIRES, and the optimal current value of each mode has been calculated by simulation. Extensive simulation results have shown that the multi-mode control system significantly enhances ride comfort, handling stability and energy-regenerative characteristic in corresponding operation condition compared with HIRES under the single control

372

R. Wang et al.

mode. It can be concluded that the inclusion of the multi-mode constant current control system can keep a balance between ride comfort and handling stability. The dynamic performance and energy-feedback characteristic of vehicle are also coordinately controlled.

References 1. Wang L, Xu G, Zhang N et al (2013) Experimental comparison of anti-roll bar with hydraulically interconnected suspension in articulation mode. SAE Technical Paper, SAE 2013 World Congress & Exhibition. https://doi.org/10.4271/2013-01-0710 2. Wang Y, Zhang H (2015) Research on simulation model of the vibration energy harvest for suspension of the vehicle. In: 7th international conference on intelligent human-machine systems and cybernetics, Hangzhou. IEEE Press, pp 278–281. https://doi.org/10.1109/ihmsc. 2015.86 3. Zhang N, Wang L, Du H (2014) Motion-mode energy method for vehicle dynamics analysis and control. Veh Syst Dyn 52(1):1–25. https://doi.org/10.1080/00423114.2013.847468 4. Wang R, Ye Q, Sun Z et al (2017) Study of mode switch of the hydraulically interconnected inerter-spring-damper suspension system. J Mech Eng 53(6):110–115. https://doi.org/10. 3901/jme.2017.06.110 (in Chinese) 5. Ding F, Han X, Luo Z et al (2012) Modelling and characteristic analysis of tri-axle trucks with hydraulically interconnected suspensions. Veh Syst Dyn 50(12):1877–1904. https://doi.org/ 10.1080/00423114.2012.699074 6. Wendel G, Stecklein G (1991) A regenerative active suspension system. SAE Technical Paper, International Congress & Exposition. https://doi.org/10.4271/910659 7. Zou J, Guo X, Xu L et al (2018) Simulation research of a hydraulic interconnected suspension based on a hydraulic energy regenerative shock absorber. SAE Technical Paper, WCX World Congress Experience. https://doi.org/10.4271/2018-01-0582 8. Long C, Zhang C, Wang R et al (2017) Modeling and optimization design of hydraulically interconnected energy-regenerative suspension. Trans Chin Soc Agric Mach 48(1):303–308. https://doi.org/10.6041/j.issn.1000-1298.2017.01.040 (in Chinese)

A Temperature Control Method for Car Room Based on Single User Personalized Comfort Nan Ye1, Lin-hua Zhuang2,3, and Ning Li1(&) 1

2

Shanghai Jiao Tong University, Shanghai 200240, China [email protected] Shanghai New Energy Automotive Air Conditioning Engineering Technology Research Center, Shanghai 201180, China 3 Songz Automobile Air Conditioning CO., LTD., Refrigeration Research Institute, Shanghai 201108, China

Abstract. In this paper, a car room temperature control method based on single user personalized comfort is proposed: Firstly, a smartphone application based on android platform is designed to collect user’s information and their personalized comfort dataset are established. Secondly, the DENFIS (Dynamic Evolving Neural-Fuzzy Inference System) method is used. This method helps to extract the fuzzy inference system and obtain the control targets according the dataset. Finally, MATLAB is used to verify the method. The result shows that the control target obtained by this method basically meets the needs of the user. Keywords: Personalized thermal comfort Cab temperature control

 Fuzzy inference 

1 Introduction At present, the widely used vehicle room temperature control method is the method which combines artificial set value and feedback control mode. In this kind of control mode, in order to form a comfortable environment, the driver needs to interact with the HVAC system frequently. Thus, problems such as determining the comfortable temperature and comfortable air flow rate of different drivers and reducing the frequency of user’s interaction with the HVAC system should be taken into consideration. And this needs to form an intelligent temperature control method. This paper will focus on producing such an intelligent temperature control method. The study of human thermal comfortable has a long history. Prof. Fanger of Denmark proposed the PMV (Predicted Mean Vote) index in 1970 [1]. He divided the human body’s thermal sensation into 7 different grades, ranging from −3 to +3, which corresponding to seven different thermal states of the human body from cold to hot. In that model, the PMV is calculated by using four environmental variables: air temperature, relative humidity, air flow rate and average radiant temperature, as well as two human factors: thermal resistance of clothing and human metabolic rate, as shown in Fig. 1. Some follow-up scholars also carried out various researches on this basis. MacArthur gave indoor regulation schemes of air conditioning with PMV as the control target [2]; Calvino designed a fuzzy PID-controlled HVAC system based on © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 373–381, 2020. https://doi.org/10.1007/978-981-32-9050-1_43

374

N. Ye et al.

PMV [3]. However, the data collection of thermal resistance and human metabolic rate is difficult, therefore the practicability of this model is bad. And some studies indicate that there is a serious deviation between the index and the actual user’s thermal experience [5]. Therefore, people turned to find reasonable methods on collecting thermal comfort data. Murakami et al. used the Internet web interface on the PC to obtain user data [7]; Jazizadeh et al. obtained user data based on the smartphone platform [9].

Fig. 1. PMV model

Fig. 2. Temperature control flow chart of vehicle room based on user’s comfort

The driver’s main activity inside the car and their suits are almost the same in the same season. Therefore, the collected thermal comfort data of the individual has good stability and practicability. In the method proposed in this paper, users upload personal information and their own evaluation of the cabin environment through the corresponding application based on smart phone [8]. The information provided by users composes the personal comfort data. And according to the dataset, the host computer establishes the corresponding fuzzy inference system through the adaptively adjusted DENFIS (Dynamic Evolutionary Neuro-Fuzzy Inference System) method [10]. The user’s comfortable temperature and comfortable air flow rate are then sent to the controller to achieve related control. The specific process is shown in Fig. 2. The method described in this paper has the following characteristics: Firstly, a new method of temperature control in the vehicle compartment is proposed. It is different from the temperature control method combined with the artificial set value and the feedback control method. The required set value by the user is obtained from the established data set. Secondly, the data set will update in each interaction and the

A Temperature Control Method for Car Room

375

corresponding comfort fuzzy model will also be corrected. After multiple corrections, it can accurately produce the user’s comfortable temperature and comfortable air flow rate.

Fig. 3. User interaction interface

Fig. 4. DENFIS method

2 Method Introduction 2.1

Data Collection

The comfort of the driver in the cabin is mainly determined by two aspects: cabin temperature and air flow rate. The demand for them of different drivers is varied in different seasons. As stated in the introduction, it is necessary to establish an intelligent control method. To this end, personal dataset about the demand of vehicle room is needed [10]. One important aspect is choosing the medium which users use to submit information. With the continuous development and popularization of mobile devices, this paper chose android development platform to form the information collecting terminal [4]. Users can use the related application on the smart phone to upload a series of feedback information. Another important aspect is the user’s evaluation of the environment. A widely accepted solution is the user’s thermal comfort scale, which quantifies the user’s assessment of the environment temperature. ASHRAE (American Society of Heating, Refrigerating and Air-Conditioning Engineers) classifies users’ environmental characteristics into seven level: cold, slightly cold, neutral, slightly hot, hot, corresponding to seven intervals of −3 to +3. Based on the above research results, this paper uses the sensation scale to quantify the user’s evaluation of the cabin environment. The user interaction interface is shown in Fig. 3. It is mainly composed of three parts, the first part is seasonal information, the second part is the user’s evaluation of the temperature, and the third part is the user’s evaluation of the air flow rate. The corresponding sliding bar can be used to reflect the

376

N. Ye et al.

user’s perception of the cabin temperature and the air flow rate. And the relevant data is transmitted to the terminal to establish a corresponding data set to provide data support for the subsequent control scheme. 2.2

Data Set Initialization

According to the user’s information, an approximate temperature comfort data set and air flow rate comfort data set can be formulated. Taking the data prediction ability and processing time and other factors into account, each data set consists of 100 data points. The user’s subsequent information feedback will be input as a new data point, replacing the earliest data point in the data set. Over time, the corresponding personalized data set will be formed after multiple interactions.

(a)Data of user1

(b)Data of user2

(c)Data of user3 Fig. 5. Temperature comfort data set for users

Different people have different requirements for the cabin environment. Figure 5 shows three different temperature comfort state data sets in the summer. The horizontal axis is the user’s evaluation of the cabin temperature, that is, the TPI (Thermal Preference Index). It varies from −3 to +3 representing the cold to hot evaluation of the ambient temperature; the vertical axis is the corresponding temperature setting of the HVAC. Figure 6 shows two different air flow rate comfort state data sets in the summer when the cabin ambient temperature is comfortable. The horizontal axis is the user’s

A Temperature Control Method for Car Room

377

evaluation value of the air flow rate, that is, the AFPI (Air-Flow Preference Index). It varies from −3 to +3 representing the low to high evaluation of the air flow rate; the vertical axis is the corresponding air flow rate setting of the HVAC.

(a)Data of user1

(b)Data of user2

Fig. 6. Air flow rate comfort data set for users

2.3

Personalized Comfort Model

The temperature control method for the vehicle room proposed in this paper can make the model learn the user’s preference for the vehicle room environment when user give enough feedback information. That is, as the number of interactions increases and the data set becomes more and more huge, the model can predict the users’ preference for the temperature of the vehicle room and the air flow rate. This means that users can achieve a comfortable vehicle environment through less interactions. To this end, an adaptively adjusted DENFIS method is chosen [6]. The method uses the ECM (Evolving Clustering Method) to cluster the data. And based on the clustering results, the fuzzy set and fuzzy rules are constructed to further generate the fuzzy inference system. The method flow is shown in Fig. 4. ECM is a clustering method based on the Euclidean distance of a vector. For a vector x, y in any two European spaces, the distance is P kx  yk ¼

q i¼1

jxi  yi j2

1=2

q1=2

; x; y 2 Rq

ð1Þ

The clustering algorithm of ECM is as follows: Step 0: When it comes the first input data x1 , the first cluster C1 is constructed, and the cluster radius R1 ¼ 0. Step 1: If all the input data has been processed, the algorithm ends and the clusters and cluster centers at this time are output. Otherwise, calculate the Euclidean dis tance Dij ¼ xi  Oj , j = 1, 2, , n, where xi is the current input data and Oj is one of the previously generated n cluster centers.

378

N. Ye et al.

Step 2: For the current input data xi , if there is any distance value Dik satisfying Dik  Rk , where k takes all the values of j that can make Dij  Rj . And set Dil ¼ minðDik Þ, so this data belongs to the cluster Cl . At this time, no update is needed for the remaining clusters, and the algorithm goes back to step 1. Otherwise, the algorithm proceeds to step 3. Step 3: For the current input data xi , if there is no Dik satisfying Dik  Rk . Then, for each cluster Cj in the whole n clusters, calculate Sij ¼ Dij þ Rj , where j = 1, 2, , n.   And set Sia ¼ min Sij . If Sia [ 2  Dthr , where Dthr is the cluster radius threshold defined by users. This means that the current input data xi does not belong to any existing cluster. Thus a new cluster should be recreated according to the method in step 0, and then the algorithm goes back to step 1. Otherwise, the cluster center Oa of the cluster Ca should be updated, and the cluster radius Ra should be increased, and then returned to step 1. By using the above-mentioned ECM to obtain clustering sets, fuzzy sets and fuzzy rules can be further established. The fuzzy rules are expressed as follows: If x 2 R1 ; then y ¼ f1 ð xÞ If x 2 R2 ; then y ¼ f2 ð xÞ . . .. . . If x 2 Rm ; then y ¼ fm ð xÞ The Ri in the fuzzy rule, where i = 1, 2, , m, is one of the different fuzzy sets. It is determined by the fuzzy membership function corresponding to Eq. (2).

lðxÞ ¼ mf ðx; a; b; cÞ ¼

8 0 > > < xa

ba

cx > > : cb 0

xa axb bxc cx

ð2Þ

Where b is the clustering center of the input space, a ¼ b  d  Dthr , c ¼ b þ d  Dthr , d  ½1:2; 2, Dthr is the cluster radius threshold defined by users. The first-order Takagi-Sugeno model is used in the fuzzy rule fi ð xÞ, y ¼ f i ð x Þ ¼ a0 þ a1  x

ð3Þ

Where the parameters a0 and a1 can be generated by the linear least square method for the p groups of data in the fuzzy set x 2 ½a; c. For the input value x0 , the output of the inference system is the weighted average of the output of each fuzzy rule: y0 ¼

Pm w f ð x0 Þ i¼1 Pm i i i¼1 wi

ð4Þ

Where wi is the weight of the i-th fuzzy rule. And for the input value x0 the value is wi ¼ lRi ðx0 Þ.

A Temperature Control Method for Car Room

379

3 Method Analysis and Verification In this paper, the input value of the fuzzy inference system is the user’s evaluation value of the vehicle environment, namely the value of TPI and the value of AFPI. The output value is the corresponding cabin temperature (°C) and the air flow rate (%). For the following data sets shown in Fig. 7, the models are shown in Fig. 8 by using MATLAB with the above method. According to the above fuzzy rule, the output of the fuzzy inference system by using the first-order Takagi-Sugeno model are obtained, as shown in Fig. 7. Thus the user’s comfortable temperature range and the comfortable air flow rate range can be obtained, as shown in Tables 1 and 2.

(a)Temperature fuzzy inference system

(b)Air flow rate fuzzy inference system

Fig. 7. Fuzzy inference system

(a)Temperature fuzzy membership function

(b)Air flow rate fuzzy membership function

Fig. 8. Fuzzy membership function

As shown in the table, the user’s comfortable temperature interval is [23.1 °C, 24.3 °C], the comfortable air flow rate is [39.3%, 44.9%]. In the actual control process, due to the unbalanced distribution of the temperature and its slowly variation, the above temperature comfort interval can be appropriately widened. And there is a coupling relationship between the air flow rate and the temperature of the air outlet. In the case of a certain amount of cooling capacity, the excessive air flow rate will result in a high air

380

N. Ye et al.

outlet temperature, and the insufficient air flow rate will result in a low air outlet temperature. Therefore, while controlling the air flow rate, it is also necessary to ensure that the outlet temperature is within an acceptable range.

Table 1. Comfortable temperature interval table. TPI −0.5 0 0.5

Temperature (°C) 23.1 23.8 24.3

Table 2. Comfortable air flow rate interval table AFPI −0.5 0 0.5

Air flow rate (%) 39.3 42.2 44.9

4 Conclusion This paper proposes a temperature control method for car room based on single user personalized comfort. The method collects driver comfort data and establishes a data set through an application. And we build a model by using an adaptively adjusted DENFIS method, through which the user’s comfortable temperature and comfortable air flow rate can be obtained. The method can learn the user’s thermal comfort preference, and surpasses the conventional temperature control mode which combining artificial set value and feedback control mode. It can reduce the interaction between the user and the HVAC. Combining with the subsequent feedback control, it can achieve an Intelligent control of the cabin temperature.

References 1. VanHoof J (2008) Forty years of Fanger’s model of thermal comfort: comfort for all? Indoor Air 18(3):182–201 2. McArthur A (1987) Thermal interaction between animal and microclimate: a comprehensive model. J Theoret Biol 126(2):203–238 3. Calvino F et al (2010) Comparing different control strategies for indoor thermal comfort aimed at the evaluation of the energy cost of building. Appl Therm Eng 30(16):2386–2395 4. Javed M, Li N, Li S (2017) Personalized thermal comfort modeling based on support vector classification. In: 2017 36th Chinese control conference (CCC), Dalian, China, pp 10446– 10451 5. Doherty T, Arens EA (1988) Evaluation of the Physiological bases of thermal comfort models. ASHRAE Trans 94:1371–1385 6. Kasabov NK, Song Q (2002) DENFIS: dynamic evolving neural-fuzzy inference system and its application for time-series prediction. IEEE Trans Fuzzy Syst 10(2):144–154 7. Murakami Y et al (2007) Field experiments on energy consumption and thermal comfort in the office environment controlled by occupants’ requirements from PC Terminal. Build Environ 42(12):4022–4027

A Temperature Control Method for Car Room

381

8. Xu Y, Chen S, Javed M, Li N, Gan Z (2018) A multi-occupants’ comfort-driven and energyefficient control strategy of VAV system based on learned thermal comfort profiles. Sci Technol Built Environ 24(10):1141–1149 9. Jazizadeh F et al (2011) Continuous sensing of occupant perception of indoor ambient factors. In: ASCE international workshop on computing in civil engineering 10. Chen S, Li N, Li S (2015) Learning personalized thermal comfort profile of HVAC system based on DENFIS. In: 26th Chinese process control conference, Nanchang, China

Three-Dimensional Trajectory Optimization Design of Parafoil System Obstacle Avoidance Based on Switched System Method Qiaodan Liu1 and Xiang Wu1,2(&) 1

School of Mathematical Sciences, Guizhou Normal University, Guiyang 550001, China [email protected] 2 School of Electrical Engineering, Southeast University, Nanjing 210096, China

Abstract. We research on a problem for three-dimensional trajectory optimization design of parafoil systems obstacle avoidance. Since open-loop control lacks of robustness in practical engineering applications, to ensure the robustness of system, by devising a new piecewise state feedback controller, we convert previous problem to the closed-loop switched systems optimal control problem with state inequality restrictions. Due to the unknown switching instants and the existence of such restrictions, we have difficulty in handling this problem by employing classical optimization methods. To address faced dilemma, time-scaling transformation and smoothed penalty approach are applied. Finally, an unconstrained parameter optimization problem is derived, and an improved conjugate gradient algorithm is introduced for addressing this problem. Simulation experiment indicates proposed algorithm is valid, and a desired three-dimensional trajectory of parafoil is obtained and avoids terrain obstacles to reach the landing point more precisely. Keywords: Parafoil system  State-feedback controller Optimal control  Trajectory optimization

 Switched systems 

1 Introduction The parafoil research can date back to 1970 [1]. In the past years, parafoil system is developed in various domains, such as Unmanned Aerial Vehicle [2], the airdrop system [3], obstacle avoidance [4] and so on. For these applications, parafoil systems obstacle avoidance problems are extensively researched in this article. One account is that parafoil inevitably encounters unexpected obstacles during the parafoil system homing. For example, severe terrain, bad weather, and so on. Switched systems are one of relatively significant hybrid system. It contains some discrete or continuous active subsystems and a switching law which causes switch among different subsystems to achieve satisfied performance [5, 6]. Due to the discrete trait of switching signal, it is not applicable to deal with the switched systems optimal control problem by applying classical optimization approaches. To solve this problem, maximum principle [7] and dynamic programming method [8] have been extended to © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 382–392, 2020. https://doi.org/10.1007/978-981-32-9050-1_44

Three-Dimensional Trajectory Optimization Design

383

this problem. However, due to the complexity of practical problems, it is difficult to calculate optimal numerical solutions by using these two methods. In recent years, several new computational methods are available. Xu and others [9] proposed two stage optimization method. Original problem is separated from two optimization problems to calculate respectively. But this method only gets the sub-optimal solution based on fixed switching sequence. For unknown switching sequence, Zhai [10] obtained the optimal or sub-optimal solution by constructing embedded systems. Differ from the above methods, and this article has two contributions to be presented. We first define a new piecewise state feedback controller to make the switching sequence pre-fixed. Thus, pervious problem can be converted to a closed-loop switched systems optimal control problem with state inequality restrictions. By applying timescaling transformation and smoothed penalty method, such restrictions are merged into the previous cost function of this problem, deriving an unconstrained parameter optimization problem. We then put forward a novel improved conjugate gradient algorithm. Besides an example three-dimensional trajectory design of parafoil system terrain obstacles avoidance is handled to illustrate the feasibility of this algorithm.

2 Problem Formulation 2.1

Unpowered Parafoil System

Motion equation of three-degree-freedom unpowered parafoil system can be expressed by 8 x_ 1 > > < x_ 2 x_ > > : 3 x_ 4

¼ vf cos x3 þ vw ¼ vf sin x3 ; ¼u ¼ vd

ð1Þ

with initial conditions x1 ðt0 Þ ¼ x0 ; x2 ðt0 Þ ¼ y0 ; x3 ðt0 Þ ¼ z0 ; x4 ðt0 Þ ¼ h0 ;

ð2Þ

where x1 , x2 and x4 denote corresponding coordinate of parafoil under geodetic coordinate system, vd ; vf and vw represent the velocity of vertical fall, horizontal flight and wind. Turn angle of parafoil is x3 , and u 2 U  R4 refer to the control input. Note XðtÞ ¼ ½x1 ðtÞ; x2 ðtÞ; x3 ðtÞ; x4 ðtÞT 2 R4 and _ XðtÞ ¼ FðXðtÞ; uðtÞÞ; Xðt0 Þ ¼ x0 ;

ð3Þ

where x0 ¼ ½x0 ; y0 ; z0 ; h0 T . 2.2

Problem Formulation

Assumption 1. g1 ðXðtÞÞ and g2 ðXðtÞÞ are twice continuously differentiable function. The following several constraints are set up before the problem formulation:

384

Q. Liu and X. Wu

Firstly, the landing point requires approach to the target landing point. Then, we assume that the terminal constraints are described by x1 ðtF Þ ¼ x1F ; x2 ðtF Þ ¼ y2F ; x4 ðtF Þ ¼ 0;

ð4Þ

where ðx1F ; y2F Þ represents the coordinate of landing point, terminal time is tF ¼ z0 =vd . Secondly, the landing takes form of obeying the wind direction to protect the load. Thus, we assume the terminal wheel angle satisfies the following equality constraint: cosðx3 ðtF ÞÞ ¼ 1:

ð5Þ

Thirdly, electrical machinery only provides limited energy. So the control input satisfies the following control constraint: juj  umax ;

ð6Þ

where umax is admissible maximum control variables, that is minimum turning radius. Finally, homing trajectory of parafoil does not directly collide with the obstacles. Thus, there has the following path restriction: g1 ðXðtÞÞ ¼ mðx1 ðtÞ; x2 ðtÞÞ  x4 ðtÞ  0;

ð7Þ

where x4 ðtÞ ¼ x4 ð0Þ  vz t; mðx1 ; x2 Þ refers to the equivalent obstacle altitude at the coordinate described by ðx1 ; x2 Þ. The following three-dimensional trajectory optimization design problem of parafoil system obstacles avoidance is presented: Problem 1. Rendered a parafoil system (1) with the initial condition (2), determine the control input u 2 U to minimize following cost function Z tf ^J ¼ u2 dt; ð8Þ t0

and subject to state inequality restrictions (7). 2.3

Terrain Obstacle Model

Note different terrain hinders the parafoil in different degrees. This paper chooses independent peaks as obstacles. As shown in Fig. 1, the highest altitude of the peaks is 3700 m, and the coordinate of ground are (900,500) in the center of the peaks.

Fig. 1. Photograph of peaks

Three-Dimensional Trajectory Optimization Design

385

3 Problem Transformation 3.1

Problem 1 Transformation

We assume that the piecewise state feedback controller is selected by: uðtÞ ¼

hX þ1 s¼1

ps XðtÞn½ts1 ;ts Þ ðtÞ;

ð9Þ

where ts ðs ¼ 1; 2;    ; hÞ are switching times, and satisfies 0 ¼ t0 \t1 \t2 \    \ th \th þ 1 ¼ T. Feedback gain matrixes is p ¼ ½p1 ;    ; ph þ 1 T ; p 2 Rh þ 1 and the set of including such p is denoted by P, the characteristic function is n½ts1 ;ts Þ ðtÞ and satisfies ( n½ts1 ;ts Þ ðtÞ ¼

1;

t 2 ½ts1 ; ts Þ

0;

t 62 ½ts1 ; ts Þ

:

By replacing selected controller (9) into the nonlinear system (3), we derive _ s ðXðtÞ; pÞ; t 2 ½ts1 ; ts Þ; s ¼ 1;    ; h þ 1; XðtÞ ¼F

ð10Þ

 Xð0Þ ¼ x0 ;

ð11Þ

s ðXðtÞ; pÞ ¼ FðXðtÞ; ps XðtÞÞ. where F The control restriction depicted by (6) and cost function depicted by (8) become   hX  þ1   g2 ðXðtÞÞ ¼  ps XðtÞn½ts1 ;ts Þ ðtÞ  umax  0; ð12Þ  s¼1  J ¼

Z 0

T

hX þ1 s¼1

!2 ps XðtÞ

n½ts1 ;ts Þ ðtÞdt:

ð13Þ

Then, Problem 1 is converted to the closed-loop switched system optimal control problem. Note that this problem possesses decision variables to be selected, including the optimal switching instants ts and feedback gain matrixes p. But we have difficulty in handling the above issue through traditional optimization methods. Next, time-scaling transformation is employed to address this dilemma. 3.2

Time-Scaling Transformation

A function given by tðsÞ : ½0; h þ 1 ! R is defined and differential equation is given by

386

Q. Liu and X. Wu

t_ðsÞ ¼

hX þ1 s¼1

qs n½s1;sÞ ðsÞ;

ð14Þ

tð0Þ ¼ 0;

ð15Þ

where 0  qs ¼ ss  ss1  T, and that is switching instants. Provided a k with satisfying k  ½0; h þ 1, nk ðsÞ is given by the following characteristic function: ( nk ðsÞ ¼

1; s 2 k; 0; s 62 k:

ð16Þ

Therefore, time-scaling transformation is made up such transformation depicted by (14)–(15). Let q ¼ ½q1 ;    ; qh T , and the set of including such qs is denoted by Q. Then, according to integrating (16), for any s 2 ½s  1; sÞ; s ¼ 1;    ; h þ 1, we can achieve t ð sÞ ¼

s1 X

qr þ qs ðs  s þ 1Þ:

ð17Þ

r ¼1

For per s 2 ½s  1; sÞ; s ¼ 1;    ; h þ 1, we yield the following form: tðsÞ ¼

s X

qr ¼

r ¼1

s X

ðsr  sr1 Þ ¼ ss ;

ð18Þ

r ¼1

especially, tðh þ 1Þ ¼ sh þ 1 ¼ T.

_

_

s ðXðtÞ; pÞ, through For any s 2 ½s  1; sÞ; s ¼ 1;    ; h þ 1, let F s ðX ðsÞ; q; pÞ ¼ qs F applying (14), (15) to (4), (5), (7) and (10)–(13) respectively, we have _ _ _ _ X ðsÞ ¼ F s ðX ðsÞ; q; pÞ; s 2 ½s  1; sÞ; s ¼ 1;    ; h þ 1; _

X ð0Þ ¼ x0 ;

ð20Þ

gn ðX ðsÞÞ  0; s 2 ½s  1; sÞ; s ¼ 1;    ; h þ 1; n ¼ 1; 2;

ð21Þ

_

_

_

_

_

x1 ðsh þ 1 Þ ¼ x1F ; x2 ðsh þ 1 Þ ¼ y2F ; x4 ðsh þ 1 Þ ¼ 0; cosðx3 ðsh þ 1 ÞÞ ¼ 1; _

J ðq; pÞ ¼

hX þ1 Z s s ¼1

_

ð19Þ

s1

h _ i2 qs ps ðX ðsÞÞ ds;

ð22Þ ð23Þ

where gn ðX ðsÞÞ ¼ qs gn ðXðsÞÞ. Therefore, Problem 1 is converted to the following closed-loop switched systems optimal control Problem 2:

Three-Dimensional Trajectory Optimization Design

387

Problem 2. Rendered a switched dynamic system (19) with initial condition (20), determine ðq; pÞ 2 Q  P to minimize the cost function given by (23), and subject to inequality restrictions (21) and equality restrictions (22). 3.3

Smoothed-Penalty Function Method

Because an inequality constraint given by (21) is equal to countless restrictions, we have difficulty in addressing Problem 2 through traditional optimization approaches. The smoothed-penalty function method is applied to handle such constraints in this part. Define Z Gs;n ðq; pÞ ¼

s

s1

n _ o max gn ðX ðsÞÞ; 0 ds; s ¼ 1; 2;    ; h þ 1; n ¼ 1; 2:

ð24Þ

Note that the formulation depicted by (24) can be equivalently written by Gs;n ðq; pÞ ¼ 0; s ¼ 1;    ; h þ 1; n ¼ 1; 2:

ð25Þ

n _ o Since max gn ðX ðsÞÞ; 0 is discontinuous function. Next, a new smoothing function described by (26) is introduced to approximate the inequality constraint (21). pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi wa ðxÞ ¼ 0:5ð x2 þ 4a2 þ xÞ;

ð26Þ

where a [ 0 and it is enough small constant. For any x 2 R and a [ 0, wa ðxÞ exists two properties as follows: lim wa ðxÞ ¼ maxfx; 0g;

ð27Þ

0\wa ðxÞ  maxfx; 0g  a:

ð28Þ

a!0 þ

Under the property described by (27), the formulation given by (25) becomes Z Gs;n ðq; p; aÞ ¼

s

s1

 _  wa gn ðX ðsÞÞ ds ¼ 0; s ¼ 1; 2;    ; h þ 1; n ¼ 1; 2:

ð29Þ

Then, the above constraints given by (29) are merged into the function (23) by employing penalty function approach, yielding the following augmented cost function: ~Ja;l ðq; pÞ ¼ uðx_3 ðsh þ 1 ÞÞ þ

hX þ1 Z s s ¼1

s1

_

Ls ðX ðsÞ; q; pÞds;

ð30Þ

388

Q. Liu and X. Wu

where

 _ 2   _   _  _ Ls ðX ðsÞ; q; pÞ ¼ qs ps ðX ðsÞÞ þ l wa g1 ðX ðsÞÞ þ wa g2 ðX ðsÞÞ ,

_

and

_

uðx3 ðsh þ 1 ÞÞ ¼ cosðx3 ðsh þ 1 ÞÞ þ 1, l [ 0 is called penalty parameter. Thus, Problem 2 is converted to the following unconstrained optimal parameter selection problem. Problem 3. Rendered nonlinear switched dynamic system (19) with initial condition (20), determine ðq; pÞ 2 Q  P to minimize the cost function depicted by (30).

4 An Improved Conjugate Gradient Algorithm 4.1

Gradient Formulate

The following Hamiltonian function is defined: _

_

_

_

Hs ðX ðsÞ; q; p; k; Þ ¼ Ls ðX ðsÞ; q; pÞ þ ðks ðsÞÞT F s ðX ðsÞ; q; pÞ;

ð31Þ

where kðsÞ denotes co-state vector and satisfied equations are as follows: 

k_ s ðsÞ

T



. _ _ ¼ @Hs ðX ðsÞ; q; p; ks ðsÞÞ @X ðsÞ; s 2 ½s  1; sÞ;

. T _ _ kh þ 1 ðh þ 1Þ ¼ @uðx 3 ðsh þ 1 ÞÞ @x 3 ðsh þ 1 Þ:

ð32Þ ð33Þ

Since Problem 3 can be handled by employing gradient algorithm, next, the gradient formula of (30) is presented by Theorem 1 to solve Problem 3. Theorem 1. For each s 2 ½s  1; sÞ; s ¼ 1;    ; h þ 1, the gradient formula of the cost function depicted by (30) related to qs and ps separately, are presented by  @ ~Ja;l ðq; pÞ @qs ¼  @ ~Ja;l ðq; pÞ @ps ¼

Z

s



.  _ @Hs ðX ðsÞ; q; p; ks ðsÞÞ @qs ds;

ð34Þ



.  _ @Hs ðX ðsÞ; q; p; ks ðsÞÞ @ps ds:

ð35Þ

s1

Z

s

s1

_ _ Proof. According to (19) and (31), integrate ðks ðsÞÞT X ðsÞ partially, we obtain _

~Ja;l ðq; pÞ ¼ uðx_3 ðsh þ 1 ÞÞ  ðkh þ 1 ðh þ 1ÞÞT _x ðh þ 1Þ þ ðk0 ð0ÞÞT X ð0Þ þ hX þ1 Z s _ _ ðHs ðX ðsÞ; q; p; ks ðsÞÞ þ ðk_ s ðsÞÞT X ðsÞÞds: s ¼1

s1

ð36Þ

Three-Dimensional Trajectory Optimization Design

389

By calculating the first order variation of (36), we achieve . _ _ _ _ d~Ja;l ðq; pÞ ¼ ð@uðx3 ðsh þ 1 ÞÞ @x3 ðsh þ 1 ÞÞdx3 ðsh þ 1 Þ  ðkh þ 1 ðh þ 1ÞÞT dxðh þ 1Þ þ h . _  _ hP þ1 R _ _ s @Hs ðX ðsÞ; q; p; ks ðsÞÞ @X ðsÞ dX ðsÞ þ ðk_ s ðsÞÞT dX ðsÞ þ s1 s ¼1 .  .  i   _ _ @Hs ðX ðsÞ; q; p; ks ðsÞÞ @qs dqs þ @Hs ðX ðsÞ; q; p; ks ðsÞÞ @ps dps ds: ð37Þ The terms are collected in (37). And combining (32) with (33) yields hP þ1 R

d~Ja;l ðq; pÞ ¼

s¼1

hP þ1 R s¼1

s s1



s s1



.  _ @Hs ðX ðsÞ; q; p; ks ðsÞÞ @qs dqs ds þ

.  _ @Hs ðX ðsÞ; q; p; ks ðsÞÞ @ps dps ds:

ð38Þ

Theorem 1 have been proven completely. 4.2

An Improved Conjugate Gradient Algorithm

Let r ¼ ðq; pÞ, r0 ¼ ðq0 ; p0 Þ 2 Q  P represents initial point. Next, the following improved conjugate gradient algorithm is introduced to address Problem 3: Step.1: Choose r0 ¼ ðq0 ; p0 Þ 2 R2h þ 1 , set e [ 0 and 0\d\0:5, q1 is a given integer and d\q2  1, there exist a constant c [ 0, such that c\1 is constant and c [ c. ( b~k

¼

    g~k þ 1 ~ g~k ; b~k ; if ~g~Tk ~g~k þ 1   c ~ 0; else;

.  .   2   g~k ~ b~k ¼ ~g~Tk þ 1 g~~k þ 1  ~g~Tk þ 1 ~g~k  ~ g~k ~ g~Tk d~k ; ~g~ ¼ rJ~a;l ðr~ Þ; d~ ¼ ~g~ : k

k

k

ð39Þ

ð40Þ

k

where ~k :¼ 0; kk refers to Euclidean distance. Step.2: If k~g0 k  e, then stop and set r ¼ r0 , else continue Step.3. Step.3: Calculate step length depicted by a~k [ 0, inspect two conditions as follows: T ~Ja;l ðr~ þ a~ d~ Þ  ~Ja;l ðr~ Þ þ da~ ~ k k k k k g~k d~k ;

ð41Þ

q1 d~kT ~g~k  d~kT ~g~k þ 1   q2 d~kT ~ g~k :

ð42Þ

Step.4: Let r~k þ 1 ¼ r~k þ a~k d~k , if ~g~k þ 1  e is satisfied, then stop and set r ¼ r~k þ 1 , else continue Step.5.

390

Q. Liu and X. Wu

    Step.5: If g~Tk ~g~k þ 1  [ c ~g~k þ 1 g~k , then set d~k þ 1 ¼ ~ g~k þ 1 and ~k ¼ ~k þ 1, return Step.3, otherwise continue Step.6. Step.6: Calculate b~k and d~k þ 1 from (39) to (40) respectively, set d~ ¼  ~g~ þ b~ d~ , and ~k ¼ ~k þ 1, continue Step.3. kþ1

kþ1

k k

According to the above algorithms, the optimal solution is r ¼ ðq ; p Þ.

5 Numerical Results The basic motion parameters of parafoil system are described by: vf ¼ 18 m/s, vw ¼ 5 m/s, vd ¼ 6 m/s; umax ¼ vf =Rmin ¼ 0:18; a ¼ 0:025; l ¼ 1; where R is turning radius. Suppose starting point is (1500, 2000, 3900) and landing point is (−1000, −1000, 0) behind the obstacle. In addition, we suppose that initial time 4 P is t0 ¼ 0 and terminal time is t4 ¼ tF ¼ 3900=6 ¼ 650 s. And uðtÞ ¼ ps XðtÞ s¼1

v½ts1 ; ts Þ ðtÞ is selected as piecewise state feedback controller, where switching times are ts ; s ¼ 1; 2; 3. By applying the algorithm described by Subsect. 4.2, we solve Problem 3 by using Matlab 2015b. Three optimal switching times are presented by: t1 ¼ 291:6443; t2 ¼ 401:0229; t3 ¼ 517:7948; and the feedback gain matrixes are presented by p1 ¼ ½7:1030; 20:3088; 0:2557; 29:8324; p2 ¼ ½4:4566; 26:7398; 0:3788; 33:4247; p3 ¼ ½26:7857; 20:0893; 0:2679; 17:8571; p4 ¼ ½23:5294; 16:4705; 1:1765; 5:4118: To compare with the existing approach, we solve Problem 3 by using the open-loop control method proposed by [11]. Comparative consequences are given in Fig. 2 and Table 1. We can find that the computation time of the algorithm described by Subsect. 4.2 saves 47.65%. And the optimal value deeply less than 3171.115 obtained by using the method given in [11]. By making full use of state feedback message, Fig. 2 confirms that our method can continuously adjust trajectory to reduce the error of turning radius. Thus, the optimal three-dimensional trajectory of parafoil system avoids terrain obstacles and reaches the landing point more precisely. Table 1. Comparisons of the results obtained by the algorithms in this paper and the approach given in [11] Algorithm Final cost Computation time (s) Algorithm 4.2 1219.6596 214.8750 Reference [11] 3171.1150 622.2193

Three-Dimensional Trajectory Optimization Design

391

Fig. 2. The three-dimensional optimal trajectory of parafoil obtained by using our method and the method given in [11]

6 Conclusion This article investigates a three-dimensional trajectory planning problem for parafoil system obstacle avoidance, which is converted to a closed-loop switched system optimal control problem with state constraint. By time-scaling transformation and smoothed-penalty function method, an unconstrained parameter optimization problem is derived. A novel improved gradient algorithm is used to achieve optimal value. Simulation result shows proposed approach makes the landing accuracy enhanced and satisfies given state inequality restrictions than the existing open-loop control method. Acknowledgments. All writers sincerely convey their thanks to the editor. The National Natural Science Foundation of China supported this article under Grant no. 61563011.

References 1. Menard G, Nicolaides J, Speelman R (1970) A review of para-foil applications. J Aircr 7 (5):423–431 2. Sohail M, Leow W, Won S (2018) Non-orthogonal multiple access for unmanned aerial vehicle assisted communication. IEEE Access 6:22716–22727 3. Cacan M, Costello M (2018) Adaptive control of precision guided airdrop systems with highly uncertain dynamics. J Guid Control Dyn 41(5):1–11 4. Sun H, Sun Q, Luo S (2018) In-flight compound homing methodology of parafoil delivery systems under multiple constraints. Aerosp Sci Technol 79:85–104 5. Li X, Cao J, Perc M (2018) Switching laws design for stability of finite and infinite delayed switched systems with stable and unstable modes. IEEE Access 6:6677–6691 6. Kamgarpour M, Tomlin C (2012) On optimal control of non-autonomous switched systems with a fixed mode sequence. Automatica 48:1177–1181 7. Ye H, Xu H (2016) Global stabilization for ball-and-beam systems via state and partial state feedback. J Ind Manag Optim 12(1):17–29 8. Borrelli F, Baotic M, Bemporad A (2005) Dynamic programming for constrained optimal control of discrete-time linear hybrid systems. Automatica 41(10):1709–1721

392

Q. Liu and X. Wu

9. Xu X, Antsaklis J (2002) Optimal control of switched systems via nonlinear optimization based on direct differentiations of value functions. Int J Control 75:1406–1426 10. Zhai J, Niu T, Ye J (2017) Optimal control of nonlinear switched system with mixed constraints and its parallel optimization algorithm. Nonlinear Anal Hybrid Syst 25:21–40 11. Wu X, Zhang K, Cheng M (2018) Optimal control of bioprocess systems using hybrid numerical optimization algorithms. Optimization 67:1287–1306

Design of Automatic Illumination Culture System for Haematococcus pluvialis Based on LED Shigang Cui, Xinqi Li(&), Yongli Zhang, Xingli Wu, and Lin He Tianjin University of Technology and Education, Tianjin, China [email protected]

Abstract. In this paper, LED illumination technology was used to design a suitable illumination system for Haematococcus pluvialis culture. The system used STM32 microprocessor as the main control chip and white LED with red and blue peaks as the supplementary light source to ensure the appropriate light ratio for the multiplication and induction stage of Haematococcus pluvialis. Using STM32 MCU to output PWM signal, the LED driving circuit was designed to control the current of the driving circuit, so as to realize the linear adjustment of light intensity. The automatic dimming function based on dissolved oxygen in algae solution was realized by programming. The experimental results show that the system can automatically and linearly adjust the light intensity. The maximum intensity of the system can meet the cultivation requirements, and the uniformity of the light is great. Keywords: Automatic dimming system

 Haematococcus pluvialis  LED

1 Introduction Astaxanthin, a carotid, is a strong natural antioxidant and widely used in health products and cosmetics [1, 2]. Haematococcus pluvialis is recognized as the best natural Astaxanthin-producing organism. But because of its harsh cultivation conditions, the yield is low and the price is expensive. The culture of Haematococcus pluvialis can be divided into two stages [3]. The first stage is cell proliferation culture stage, which requires 1000–1500 lx light conditions with red light quality as the main light quality. In the second stage of assistantship induction, 10 000–20 000 lx light with blue light quality was needed in this stage [4]. The illumination intensity of the two stages is quite different, so the system is designed to automatically adjust the illumination according to the actual growth of algae liquid.

2 System Overall Design The system adopts a modular design, including a detection module, a control module, a display module, a fill light module, and a power module. The system selects STM32 as the control module, and outputs the PWM signal with adjustable duty cycle to complete © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 393–400, 2020. https://doi.org/10.1007/978-981-32-9050-1_45

394

S. Cui et al.

the system dimming function; The fill light module is composed of a driving circuit and a plurality of LED light bars; The detection module is composed of an OD detector and a light intensity detection sensor to realize a data detection function; The display module is composed of a touch screen and has a good human-computer interaction interface. The block diagram of the system is shown in Fig. 1.

Fig. 1. System composition block diagram.

3 System Hardware Design 3.1

Selection of LED Light Source

Due to the red-light quality required in the value-added culture stage during the culture process of Haematococcus pluvialis and the blue light quality in the induction stage, the Os-ram white LED lamp bead with red and blue double peaks is selected as the light source. Os-ram is one of the world’s most innovative lighting companies and has many world-leading patents. It is one of the world’s two largest light source manufacturers. The LED lamp bead has the characteristics of small heat generation, high power and large illumination intensity, and is suitable for the illumination requirements of the system. Its spectrum is shown in Fig. 2.

Fig. 2. LED spectrometer.

Design of Automatic Illumination Culture System

395

In order to find a more convenient way to arrange the lamp bead with better uniformity of illumination, we replace the traditional lamp board with the package form of the light bar. It is more convenient to change the spacing and number of lamp beads and seek the best arrangement of uniformity. The exterior of the lamp strip is designed with cold gel encapsulation and has good sealing effect. According to the length and length of the culture frame, different numbers of 3 cm equidistant light bars are arranged. 3.2

Driving Circuit Design

It only lights up when there is a forward current through the LED, so we designed the PWM driver circuit. PWM uses the pulse width modulation signal to repeat the ON/OFF driver to achieve the purpose of adjusting the average LED current. The schematic diagram of the PWM dimming driver circuit is shown in Fig. 3.

Fig. 3. Principle diagram of PWM dimming driving circuit.

A PWM signal source is required for PWM dimming [5]. The driver turns on and off the gate of the FET according to the high and low levels, and repeatedly switches the LED driver. When the switching frequency is higher than 100 Hz, the human eye cannot see the turn-off of the LED. The human eye has a detention effect on the image. The turn-on and turn-off time are averaged, and only the brightness changed by duty cycle can be observed. Therefore, the system only needs to provide digital pulses with different width. This system changes the brightness of LED lamp by changing the pulse width of constant current source. When the signal source transmits data to the single chip microcomputer, the signal needs to be amplified twice by two amplifiers to obtain the signal frequency that the single chip can collect, thereby realizing the control effect of the single chip on the LED signal source. 3.3

Design of Detection Module

The system detection module is mainly composed of a DO detector and a light intensity sensor. The DO detector is mainly used to detect the oxygen content of the algae liquid to obtain the growth condition of the algae cells, and the light intensity sensor is mainly used for detecting and recording the light intensity of the current culture frame. The system uses the GY-30 digital module to detect the light intensity which connects SDA and SCL with the PB6 and PB7 pins of the MCU, and connects the

396

S. Cui et al.

address pin ADDR directly to the ground. The schematic diagram of the light intensity detection module is shown in Fig. 4.

Fig. 4. Schematic diagram of illumination intensity detection circuit.

The system uses the CITY 4OXV sensor to detect the oxygen content of the algae liquid. The circuit schematic is shown in Fig. 5. The OD detector amplifies the signal through operational amplifier circuit, and then eliminates the interference by filtering the signal by connecting two capacitors in series in the feedback loop and output loop. Finally, the OD detector is transmitted to the AD interface of the single chip computer for digital-to-analog conversion to obtain the oxygen content value.

Fig. 5. Schematic diagram of oxygen content detection circuit.

4 System Software Design 4.1

Construction of OneNET Display Platform

OneNET acts as a Paas layer in the Internet of Things, and builds a bridge between the SaaS layer and the IaaS layer, providing intermediate core capabilities to upstream and downstream [6]. The testing process mainly includes user registration and login, creation of new products and connection platform. The test process is shown in Fig. 6.

Design of Automatic Illumination Culture System

Plaorm domain

Create product

TCP connecon 183.230.40.39/876

Create trigger

Create device

EDP device connecon Product ID + device number

Create applicaon

Data stream view

Send command

Data point upload

Command resoluon

Send heartbeat

SDK

397

Command response

Analyze heartbeat response

Fig. 6. Test flow chart.

Change the EDP service address domain name and port number to the initial settings, using the OneNET account, device name and authentication information as login parameters. Organize the EDP connection message by using the corresponding interface in the SDK, send it to the platform, and establish an EDP connection with the platform. The code is as follows:

EdpPacket*send_pkg=PacketConnect2(PID,AUTHINFO); int ret=DoSend9(sockfd,send_pkg->_data,send_pkg->_write_pos); DeleteBuffer(&send_pkg); Using the interface functions provided in the DSK, write code to transfer the oxygen content detection and light intensity detection data to the platform. The code is as follows. cJSON*json_data=cJSON_Createobject(); cJSON*AddNumberToObject(json_data,"DO",26); cJSON*AddNumberToObject(json_data,"Lux",1800); EdpPacket*send_pkg=PacketSavedateJson(NULL,json_data,kTypeSimpleJson WithoutTime,0); int ret=DeSend(sockfd,send_pkg->date,send_pkg->write_pos); DeleteBuffer(&send_pkg); cJSON_Delete(json_data)

398

4.2

S. Cui et al.

Programming Design

For the ATM32 microcontroller, three PWM signals can be generated by the timer for external devices. The timer T/C1 generates two PWM signals through the registers OCR1A and OCR1B and the output units OC1A and OC1B, which are respectively output from the two pins PB1 and PB2; The timer T/C2 itself can be configured to control the LED current through the PB3 output of the PWM signal. The PWM adjustment accuracy is 8 bits, the upper limit of the counter is 255, the initial value of OCR2 is k, the system clock frequency is f, and the division factor is M. The frequency is calculated as: fPWM ¼

8M ; 256



k 255

ð1Þ

After the system is powered on, first initialize each module, and then repeatedly scan and read the oxygen content detection data to determine the growth state of the algae liquid. By adjusting the PWM duty cycle by comparing the setting intervals, the brightness of the light source is changed to achieve the function of automatically adjusting the light intensity. At the same time, the algae oxygen content monitoring data and the light intensity detection data are uploaded to the cloud platform to realize the remote monitoring display data function.

5 Results and Analysis 5.1

Analysis of Light Intensity Distribution and Uniformity

Design experiments to verify the uniformity of the LED strips of the system to ensure uniform illumination of the algae. The optical quantum flux density is measured at 25 cm below the light source. The measurement area is 40 cm  40 cm. The distribution of the optical quantum flux density is shown in Fig. 7.

Fig. 7. Distribution of Optical Quantum Flux Density at 100 W Power.

Design of Automatic Illumination Culture System

399

Figure 7 shows that the closer the distribution of optical quantum flux density is to the center point, the higher the density of optical quantum flux is, the lower the measured value is. The uniformity requires that the mean square deviation be as small as possible. The experimental results show that at 100 W power, the uniformity of the optical quantum flux density is 0.85, the mean value is 100 lmol/(m2  sÞ, and the variance is 75. The maximum illumination intensity can reach 2000 lx, and the uniformity coefficient is more than 0.8, which can reach higher illumination intensity and better uniformity. 5.2

System Overall Testing

700 ml algae solution was placed in the system for 20 days, and shaded with shade curtain on the outside to prevent light loss. Microscopic examination showed that algae cells accumulated rapidly and assistantship-containing algae cells appeared on the 18th day. The system can meet the design requirements and provide suitable light source for the cultivation of Haematococcus pluvialis (Fig. 8).

(a)1day

(b) 9day

(c)18day

Fig. 8. Microscopic image of algae liquid. Acknowledgments. This work is supported by National Key Research Program under Grant 2017YFB0403904.

References 1. Córdova P, Baeza M, Cifuentes V, Alcaíno J (2018) Microbiological synthesis of carotenoids: pathways and regulation. IntechOpen, 26 September 2018 2. Rani Juneius CE, Sundari M, Eswaralakshmi R, Elumalai S (2018) Seaweed liquid fertilizers: a novel strategy for the biofortification of vegetables and crops. Springer, Singapore, 21 June 2018 3. Razon LF (2011) Net energy calculations for production of biodiesel and biogas from haematococcus pluvialis and nannochloropsis sp. Springer, Japan, 15 June 2011 4. Cheng C-H, Bai Y-W (2012) Using fuzzy logic and light-sensor for automatic adjustment of backlight brightness in a mobile computer. In: 2012 IEEE 16th international symposium on consumer electronics (ISCE), 04 June 2012

400

S. Cui et al.

5. Hu R (2018) The status quo and prospect of model-free adaptive control. In: Proceedings of 2018 7th international conference on advanced materials and computer science (ICAMCS 2018). International Information and Engineering Association: Computer Science and Electronic Technology International Society, p 4 6. Yanshu N (2018) Single phase sine wave PWM inverter circuit simulation and the design of filter based on matlab. In: Proceedings of 2018 2nd international conference on electronic information technology and computer engineering (EITCE 2018), 4 p

Study on pH Control of Haematococcus pluvialis Solution Based on Neural Network Controller Shigang Cui, Yunqi Huang(&), Lin He, Yongli Zhang, and Xingli Wu Tianjin University of Technology and Education, Tianjin, China [email protected]

Abstract. This paper mainly studies the control method of pH value in Haematococcus pluvialis algae solution. Aiming at the problems of large overshoot, difficulty in setting control parameters, long adjustment time and poor antiinterference ability of conventional PID in the process of pH control, a method combining BP-NN (back propagation neural network) algorithm with PID control is proposed. This method makes use of the complex non-linear mapping ability and strong learning ability of BP-NN to achieve precise control of the control system. In order to verify this method can enhance the control effect of the system, a mathematical model of the pH value of Haematococcus pluvialis algae solution was established, and the simulation research and analysis were carried out by using Matlab. The simulation results show that the BP-NN PID controller designed in this paper has better stability and robustness to the pH control of algae solution pH control, and the control quality has obvious advantages. Keywords: Haematococcus pluvialis

 pH  BP neural network

1 Introduction Astaxanthin is a carotenoid with high antioxidant activity, which is widely used in aquaculture, chemical industry, pharmaceuticals, food and cosmetics industries [1, 2]. Natural astaxanthin is mainly extracted from crustaceans, Phaffia yeast and Haematococcus pluvialis. Because of the highest content of astaxanthin in Haematococcus pluvialis, it is recognized as the best biological source of astaxanthin production in nature. At present, more than 10 companies in five countries have achieved commercial cultivation of Haematococcus pluvialis, but their annual production of astaxanthin is less than 10 tons [3]. With the increasing market demand, its market price per kilogram remains high. However, the specific mechanism of astaxanthin accumulation induced by Haematococcus pluvialis is still unclear, which leads to the difficulty of large-scale cultivation of natural astaxanthin by Haematococcus pluvialis. Therefore, finding a way to promote the efficient induction and accumulation of astaxanthin by Haematococcus pluvialis has become a research hotspot at home and abroad. PH is a key environmental factor in the culture process of Haematococcus pluvialis. Green swarmer are especially sensitive to the pH of culture environment during the © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 401–407, 2020. https://doi.org/10.1007/978-981-32-9050-1_46

402

S. Cui et al.

growth stage of Haematococcus pluvialis. However, during the growth of Haematococcus pluvialis, the pH of algae solution will gradually increase with the selective consumption of nutrients in the medium, and then inhibit the growth of algae in the later stage [4]. Although the principle of PID control is simple and easy to use, it is ineffective to control the complex process of non-linearity, time-varying, coupling, parameter and structure uncertainty. The pH of Haematococcus pluvialis solution is a complex multi-variable coupling object, the PID controller is hard to achieve better control effect for the system with complex control process. In this paper, the pH value of algae liquid in the culture system of Haematococcus pluvialis is taken as the research object, and the best PID control parameters can be found by using the strong non-linear approximation ability of BP neural network, and adjusts them in real time, so as to improve the control quality.

2 Traditional PID Control Principle In modern industrial control, the most common control is deviation-based PID controller. According to the preset expected value r(t) and the actual output value y(t), the deviation e(t) is formed. eð t Þ ¼ r ð t Þ  yð t Þ

ð1Þ

The deviation is used as feedback input, and the parameters of the PID controller are continuously modified to meet the control requirements. The control principle is as follows (Fig. 1):

Fig. 1. PID control schematic.

When the pH value of Haematococcus pluvialis algae solution is controlled by the traditional PID controller, because of its non-linearity and large lag, there is a delay phenomenon in the control process, and it is hard to achieve precise control.

Study on pH Control of Haematococcus pluvialis Solution

403

3 Improvement of BP Neural Network Algorithms on Traditional PID 3.1

BP-NN Structure

BP-NN has complex non-linear mapping ability and strong ability learning ability, so that the controlled object can achieve the effect of the set value with the fastest speed and stability. The control principle is as follows (Fig. 2):

Fig. 2. BP-NN control schematic.

The BP-NN designed in this article consists of input layer, output layer and a hidden layer, and the structure is shown in the following figure. The three nodes in the input layer are preset value r, actual output value y and deviation e. According to the empirical formula, four hidden layer nodes are set up in this paper. KP, KI and KD of PID controller represent three neurons in the output layer. wij and wjk are weight coefficients of hidden layer and output layer respectively (Fig. 3).

Fig. 3. Three-layer BP-NN schematic.

404

3.2

S. Cui et al.

BP-NN Structure

The input of the input layer is: ð1Þ

Oi

¼ xð i Þ

i = 1; 2; 3

ð2Þ

The input and output of the hidden layer are: 8 m P ð2Þ ð1Þ > < netið2Þ ðtÞ ¼ Wij Oi i1   > : Oð2Þ ðtÞ ¼ f netð2Þ ðtÞ j i

j ¼ 1; 2; 3

ð3Þ

The activation function of neurons in the hidden layer is: f ðzÞ ¼ tanhðzÞ ¼

ez  ez ez þ ez

The input and output of the output layer are: 8 q P > ð3Þ ð3Þ ð2Þ > Wjk Oj > netk ðtÞ ¼ > > > j¼0 >   > > ð3Þ ð3Þ < Ok ðtÞ ¼ g netk ðtÞ > Oð3Þ ðtÞ ¼ KP > > 1 > > ð3Þ > O > 2 ðtÞ ¼ KI > > : ð3Þ O3 ðtÞ ¼ KD

k ¼ 1; 2; 3

ð4Þ

ð5Þ

The activation function of neurons in the output layer is: 1 ez gðzÞ ¼ ð1 þ tanhðzÞÞ ¼ z 2 e þ ez

ð6Þ

In formula (2) to formula (6), the upper corner label (1) delegates the input layer, the upper corner label (2) delegates the hidden layer, and the upper corner label (3) delegates (3) the output layer. w(2) ij and wjk are the weight coefficient of the hidden layer and the output layer. KP, KI and KD are three adjustable control parameters of PID. 3.3

Backward Algorithm

When training the weights, weights are usually corrected in the direction of error reduction. As the number of learning increases, the deviation e(t) becomes smaller and smaller. The performance index function is [5, 6]: 1 EðtÞ ¼ ½r ðtÞ  yðtÞ2 2

ð7Þ

Study on pH Control of Haematococcus pluvialis Solution

405

By using the steepest descent method to modify weights, the variation of weight coefficients of the output layer is: ð3Þ

Dwkj ðtÞ ¼ b

@E ðtÞ ð3Þ @wkj

ð3Þ

þ kDwkj ðt  1Þ

ð8Þ

In the formula, t is the number of learning times, b is the learning rate (0 < b < 1), and k is the momentum factor (0 < k < 1). In practical application, k is generally taken from 0.1 to 0.8. From formulas (1) and (5): 8 @DuðtÞ ¼ eðtÞ  eðt  1Þ > > > Oð13Þ ðtÞ > < @DuðtÞ ¼ eð t Þ ð 3Þ O2 ðtÞ > > @Du ð t Þ > > : Oð33Þ ðtÞ ¼ eðtÞ  2eðt  1Þ þ eðt  2Þ

ð9Þ

In summary, the formula for calculating the weights of the output layer are: 8 ð2Þ ð3Þ ð2Þ < wð2Þ ðt Þ jk ðt Þ ¼ @Dwjk ðt 1Þ þ bdk O j  ð3Þ @yðtÞ @DuðtÞ 0 : dk ¼ eðtÞsgn @DuðtÞ  ð3Þ g netkð3Þ ðtÞ

ð10Þ

@Ok ðtÞ

In the formula, d(3) k is a local gradient, indicating the changes required for the weights. Similarly, the formula for calculating the weight coefficient of hidden layer in BPNN are: 8 ð2Þ ð2Þ ð3Þ ð2Þ > < wij ðtÞ ¼ @Dwij ðt  1Þ þ bdj Oi ðtÞ h iP 3 ð3Þ ð2Þ ð3Þ ð3Þ 0 > dk wjk : dj ¼ f netk ðtÞ

ð11Þ

k¼1

In formula (10) and formula (11): g0 ðzÞ ¼ gðzÞ½1  gðzÞ

ð12Þ

 1 1  f 2 ðzÞ 2

ð13Þ

f 0 ðzÞ ¼

4 Simulation and Analysis For the sake of proving the correctness and applicability of the proposed method, this paper first establishes a mathematical model for the pH value of Haematococcus pluvialis algae solution, and then simulates and analyses it by using Matlab. The simulation model built by Simulink is shown in the following figure (Fig. 4):

406

S. Cui et al.

Fig. 4. Simulation model of BP-NN PID controller.

According to the actual measurement data and control experience, the transfer function of pH control process is set as follows: G ðsÞ ¼

2:57 e20:6s 46:7s þ 1

ð14Þ

In traditional PID controller, the control parameters KP = 0.78, KI = 0.2, KD = 0.3. In the BP-NN PID controller, the initial weight coefficients between layers are wij and wjk. They take random numbers on the interval [−0.5, 0.5], b = 0.3, k = 0.01. The simulation curves of step response of traditional PID controller and the BP-NN PID controller are shown in Fig. 5. It can be seen from the simulation results that the effect of the BP-NN PID controller has been significantly improved, the transition time is short, there is no overshoot, and the error curve is more smooth and stable.

Fig. 5. Simulation results of PID control and BP-NN PID control.

Study on pH Control of Haematococcus pluvialis Solution

407

5 Conclusion The pH of Haematococcus pluvialis solution is a multi-variable coupling object. When it is controlled by traditional PID control strategy, the desired effect cannot be achieved. In this paper, a new BP-NN PID controller is proposed, which combines BP-NN algorithm with PID. The complex non-linear mapping ability and strong learning ability of BP-NN are utilized. For the sake of proving the correctness and applicability of the proposed method, this paper first establishes a mathematical model for the pH value of Haematococcus pluvialis algae solution, and then simulates and analyses it by using Matlab. The simulation results show that, compared with traditional PID control, BP-NN PID controller has superior control performance, short transition time, less overshoot, better accuracy and robustness, and can achieve ideal control effect. Acknowledgment. This work is supported by National Key Research and Development Program of China 2017YFB0403904.

References 1. Ren X, Chen L, Li R, Liu T (2019) Selectively extract astaxanthin from wet biomass of Haematococcus pluvialis. Chin J Process Eng 19(01):136–143 (in Chinese) 2. Zhang C, Liu J, Zhang L (2017) Cell cycles and proliferation patterns in Haematococcus pluvialis. Chin J Oceanol Limnol 35(05):1205–1211 3. Choochote W (2015) Effect of Nitrogen and Phosphorus on growth and astaxathin production of haematococcus pluvialis. In: Abstracts of the 13th international symposium on biocontrol and biotechnology 4. Yang J, Peng X, Chao Y (2017) Reliability prediction of power communication network based on BP neural network optimized by genetic algorithm. In: 2nd international conference on computational modeling, simulation and applied mathematics 5. Zhang Y, Su H (2018) PID controller parameter adjustment based on BP neural network. J Nankai Univ 51(03):26–30 (in Chinese) 6. Liu D (2018) Speed control and simulation of wind turbine based on BP neural network controller. Instrum Tech (06):13–16 (in Chinese)

An Autoencoder-Based Dimensionality Reduction Algorithm for Intelligent Clustering of Mineral Deposit Data Yan Li1,2,3, Xiong Luo1,2,3(&), Maojian Chen1,2,3, Yueqin Zhu4, and Yang Gao5 1 School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, China [email protected] 2 Institute of Artificial Intelligence, University of Science and Technology Beijing, Beijing 100083, China 3 Beijing Key Laboratory of Knowledge Engineering for Materials Science, Beijing 100083, China 4 Development and Research Center, China Geological Survey, Beijing 100037, China 5 China Information Technology Security Evaluation Center, Beijing 100085, China

Abstract. Currently, there has been a dramatic growth of data size and data dimension in geophysics, while achieving the rapid advancements of geological big data technologies with the support of various detection methods. Then, highdimensional and massive geological data impose very challenging obstacles to traditional data analysis approaches. Given the success of deep learning methods and techniques in big data analysis applications, it is expected that they are also able to achieve the satisfactory performance in dealing with high-dimensional complex geological data. Hence, through the combination of one of the effective implementations of deep learning, i.e., autoencoder, and a clustering algorithm, i.e., K-means, in this paper we achieve the dimensionality reduction for complex data, so as to extract useful data features from mineral deposit data, with the purpose of improving computational efficiency. The experimental results demonstrate the effectiveness our developed method. Keywords: High-dimensional data  Dimensionality reduction  Autoencoder  K-means algorithm

1 Introduction The rapid advancements of various exploration techniques have made the geological big data grow exponentially. Generally speaking, they are produced in basic geology, mineral geology, hydrogeology, and many other kinds of spatio-temporal remote sensing observation activities in geophysics [1]. Actually, geological big data is characterized by a high-dimensional and massive model. Additionally, there may be redundant or irrelevant data in those data, which makes it inconvenient to process and © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 408–415, 2020. https://doi.org/10.1007/978-981-32-9050-1_47

An Autoencoder-Based Dimensionality Reduction Algorithm

409

store the high-dimensional data. Hence, the distribution of high-dimensional data brings new challenges to effectively discover the characteristics and mine useful information from high-dimensional geological big data. An effective way to address these issues is dimensionality reduction, which means to map the data from high-order space to low-dimensional space through linear or nonlinear methods. In this context, various methods of dimensionality reduction have been proposed to serve many purposes, such as pattern classification [2] and information visualization [3]. Among the available approaches, principal component analysis (PCA) is the most commonly used linear dimension reduction technique [4]. It projects the original data to its main direction with maximum variance, without considering any data relations and class labels. Furthermore, linear discriminant analysis (LDA) is a supervisory method for finding linear subspaces, which can discriminate the best among different types of data [5]. Although some progresses have been made in this direction, it still cannot fully match the demands of capturing useful features of high-dimensional data when only using a simple learning model, e.g., PCA, due to the complexity of a geological big data system [6]. We need to develop a more effective model to learn relationships between data and hiding information, through the use of some advanced computational intelligence methods, e.g., deep learning algorithm. Currently, there are few works related to the dimensionality reduction for mineral deposit data, while employing advanced deep learning algorithms. Deep learning as a powerful methodology has achieved some satisfactory performance in dealing with a wide range of data analysis issues in academic and industrial communities [7–9]. Among the implementations of deep learning, autoencoder is a special technique of constructing neural network (NN) [10]. Its output and input are the same. Actually, the traditional autoencoder is a symmetric NN with only one hidden layer, where the input layer has the same number of neurons as the output layer, and the hidden layer has fewer neurons than the input layer. In recent years, due to its ability of effectively improving the classification accuracy of data, autoencoder has witnessed a growing interest in data mining research for various fields [11]. Considering the limitations of those traditional dimensionality reduction techniques mentioned above and the advantages of autoencoder, in this paper we propose an autoencoder-based dimensionality reduction algorithm to effectively mine the characteristics of mineral deposit data and discover the relationship between geological elements, enabling us to have a more intuitive understanding and observation for geological big data. Specifically, in response to the possible loss of data information due to dimensionality reduction, a clustering algorithm, i.e., K-means, is also incorporated to achieve intelligent clustering of mineral deposit data.

2 Backgrounds 2.1

Autoencoder

Autoencoder is an unsupervised NN model used to learn efficient data characteristics [10, 12], which is composed of two parts. It can learn the internal features of the input,

410

Y. Li et al.

which is called encoding. Then, it can reconstruct the original input data with the internal features learned, which is called decoding. Usually, autoencoder is used for dimensionality reduction. The structure of a basic autoencoder is shown in Fig. 1, which includes three layers totally. The first is input layer, the second is hidden layer, and the third is output layer.

Fig. 1. The structure of an autoencoder.

Firstly, the autoencoder encodes the input data X to get the new feature Z. Let x 2 Rn ¼ X be the input data, and z 2 Rp ¼ F be the new feature. The encoding process is z ¼ f ðWx þ bÞ, where f is an activation function (e.g., sigmoid function or tanh function), W is a matrix weight, and b is a bias vector. It can be found here that the encoding process consists of a linear combination and a nonlinear activation function. Then, the autoencoder maps the new features z to the reconstruction x’ with the same shape as the input data x. The decoding process is x0 ¼ f 0 ðW0 x þ b0 Þ, where f′, W′, and b′ used for the decoding have the same meaning with the corresponding f, W, and b used for the encoding, respectively. In general, f and f′ are the same activation function. In order to let the reconstructed data x′ to be as consistent as possible with the input data x, we train this model with a loss function. This function is to minimize the difference between x and x′, and it is called reconstruction error L defined by: Lðx; x0 Þ ¼

N X ðx  x0 Þ2 i¼1

N

;

ð1Þ

where N is the number of nodes in the input layer. Generally, the dimension of the feature space F is smaller than that of the input space X , so the feature vector z can be considered as a compressed representation of the input data x. However, it has been found that when there is a large difference of dimensions between the original data and the required compression data, using only one hidden layer of autoencoder will generate a large error. Hence, with the popular use of deep NN, an autoencoder with multiple hidden layers has attracted much attention, since it can capture more important information and learn richer representations of the input data. The structure of a multiple-autoencoder is in Fig. 2.

An Autoencoder-Based Dimensionality Reduction Algorithm

411

Fig. 2. The structure of a multiple-autoencoder.

2.2

K-means

K-means is a widely used algorithm for clustering [13]. Its main idea is to divide a given sample points set, into K clusters according to the distance between sample points, which makes the points in the cluster as close as possible and the distance between the clusters as large as possible. Let X = {x1, x2, …, xn} be a set of samples to be clustered, where sample xi (i = 1, 2, …, n) is a d-dimensional vector. Here, X will be clustered into a set of K clusters, i.e., C = {c1, c2, …, ck} (k  n). The process of finding cluster partition C is as follows. (1) The cluster center {l1, l2, …, lk} is initialized by randomly selecting K samples from the sample set X. (2) The distance between the sample xi and each cluster center lj is calculated through: dij ¼ arg min j

n X k  X   x i  l j 2 : i¼1 j¼1

2

ð2Þ

Then, the sample is allocated to its nearest cluster center. (3) The new cluster center lj for all sample .  points in cluster cj (j = 1, 2, …, k) is P  cj  . recalculated through lj ¼ x2cj x (4) The above steps are repeated, until K cluster centers are no longer changed.

3 The Autoencoder-Based Dimensionality Reduction Algorithm for Mineral Deposit Data A good dimensionality reduction is critical to achieving satisfactory analysis performance for mineral deposit data. However, as mentioned above, considering the highdimensional and massive characteristics of mineral deposit data, it is difficult to meet this requirement by using some traditional approaches. Therefore, through the combination of autoencoder and K-means, we achieve the dimensionality reduction for

412

Y. Li et al.

complex mineral deposit data, so as to extract useful data features from it, with the purpose of improving computational efficiency. Here, the autoencoder-based dimensionality reduction algorithm for mineral deposit data includes two parts. (1) For the mineral deposit dataset, autoencoder is used here to learn its implicit features and obtain the low-dimensional representation of data. The encoding process of autoencoder is a process of data dimensionality reduction, and the output of each hidden layer is another representation of the input. (2) The K-means algorithm is also applied to reduce the dimensional data. In order to facilitate the evaluation of clustering results and to analyze the reasonable dimensionality of mineral deposit attribute reduction, we take the mineral deposit type as a category label, where each category contains 60 mineral deposits in accordance with the preprocessing operation.

4 Experimental Results and Discussion 4.1

Experimental Dataset and Configuration

For the purpose of comparing the impact of different dimensions on clustering results after dimensionality reduction, we select three types of mineral deposit data and eliminate redundant data and blank values. Specifically, since the original mineral deposit data is a text dataset, the dataset should be vectorized before clustering, with the purpose of facilitating the implementation of our autoencoder-based dimensionality reduction algorithm. Then, the mineral deposit data are reduced to different dimensions through the autoencoder. Additionally, the K-means algorithm is used to cluster each low-dimensional dataset, and the clustering results are compared through the accuracy rate and recall rate, which defined in the following subsection. Generally, a mineral deposit has many attributes, such as metallogenic ages, sedimentary structures, rock formations, and some others. These attributes describe and define a particular type of mineral deposit. In this experiment, we select 3 different deposit categories from the deposit dataset, namely contact metasomatism deposits, volcanic hydrothermal deposits, and sedimentary layered deposits. Each category contains 5 attribute combinations, including rock series, genetic type, geotectonic environment, lithology code, and formation age. Each mineral deposit attribute is converted into a 50-dimensional vector. Then, those vectors of 5 attributes are joined as a vector of the mineral deposit data, while obtaining a 250-dimensional mineral deposit data vector. After preprocessing the data by moving redundant data and blank missing data, 60 mineral deposits are selected for each category finally. Then, a mineral deposit dataset containing 180 records is obtained. Hence, in this experiment, the dataset is with a size of 250  180. Here, the format of mineral deposit data is shown in Table 1. Meanwhile, by vectorizing those original mineral deposit text data, an example of the resulting word vector is also provided in Table 2.

An Autoencoder-Based Dimensionality Reduction Algorithm

413

Table 1. The format of mineral deposit data Rock series

Genetic type

Calc alkalic series Tholeiitic series Shoshonite series

Crust-mantle mixed source Mantle source Crust source

Geotectonic environment Graben basin

Lithologic code Adamellite

Passive margin

Grained syenogranite Granite diorite

Graben basin

Formation age Upper jurassic Upper cretaceous Lower cretaceous

Table 2. An example of word vectors Mineral deposit attributes Calc alkalic series Crust source Adamellite Upper jurassic Dioritic porphyrite

Word vectors 0.002516828 0.0025052794 0.030185107 … −0.0104168365 0.010410899 −0.026155483 … −0.009546665 -0.014511113 −0.020231554 … 0.006219968 −0.002484169 −0.0034684755 … 0.006961098 0.00446491 −0.014926236 …

Finally, our experiments are conducted on the Pycharm 2018.1.1 environment running on an Inter(R) Core(TM) i7-8550U, 2.00GHZ, 8.00 GB RAM Computer. 4.2

Metrics

In this experiment, we evaluate the results of intelligent clustering on three metrics, including accuracy rate, recall rate, and running time. For the dataset, the accuracy is calculated as Accuracy = TP/N, where TP is the true positive and N is the total number of samples in the dataset. For one of three deposit categories, recall is calculated as Recall = TP/n, where n is the total number of samples in this category. 4.3

Experimental Results

According to the algorithm proposed in Sect. 3, we use an autoencoder model with 8 hidden layers to achieve the dimensionality reduction, where the first 4 hidden layers are used for encoding. Through the encoding process of this model, the vector of 250 dimensions is reduced to 2, 3, 4, 5, and 6 dimensions, respectively. In Fig. 3a, we provide a relationship between clustering accuracy and dimension, which shows that the accuracy increases as the dimension increases and it increases quickly in dimensions 2 and 3. After dimension 3, the accuracy still increases, but the rate of increase decreases. Figure 3b shows the running time for different dimensions. With the increase of data dimensions, the calculation effort is reasonable and the running speed also increases. Table 3 shows the recall rate of clustering. With the increase of dimensions, the overall trend of recall rate increases, but it decreases for some categories.

Y. Li et al. 0.7

2.8

0.68

2.6

0.66

2.4

Runtime (s)

Accuracy

414

0.64

2.2

0.62

2

0.6

1.8

0.58

2

2.5

3

3.5

4

4.5

5

5.5

6

1.6

2

2.5

3

3.5

Dimension

4

4.5

5

5.5

6

Dimension

(a) Computational accuracy

(b) Computational time

Fig. 3. Computational accuracy and computational time for different dimensions.

Table 3. Comparison of recall rate for different dimensions Deposit category Contact metasomatic Volcanic hydrothermal Sedimentary

2-D 0.516 0.566 0.583

3-D 0.633 0.850 0.450

4-D 0.879 0.478 0.521

5-D 0.766 0.716 0.650

6-D 0.816 0.683 0.550

5 Conclusion Data dimensionality reduction can effectively mine data characteristics and facilitate data visualization. By reducing dimension, redundant information between data can be removed, and the performance of data analysis can be improved. Autoencoder as an efficient deep learning method, is used to achieve the dimensionality reduction for mineral deposit data in this paper. In the process of data dimensionality reduction, Kmeans algorithm is also incorporated to implement intelligent clustering. By measuring the accuracy of clustering and computational time, we can choose the appropriate dimension for those low-dimensional data according to the actual demand. Acknowledgement. This research is funded by the National Key Research and Development Program of China under Grant 2016YFC0600510, the National Natural Science Foundation of China under Grants U1836106 and U1736117, the University of Science and Technology Beijing - National Taipei University of Technology Joint Research Program under Grant TW201705, and the Key Laboratory of Geological Information Technology, Ministry of Natural Resources of the People’s Republic of China under Grant 2017320.

An Autoencoder-Based Dimensionality Reduction Algorithm

415

References 1. Tan Y, Qu H, Wen M (2018) On big data of geological survey. Geomat World 25:7–11 (in Chinese) 2. Lee KC, Ho J, Yang MH, Kriegman D (2003) Video-based face recognition using probabilistic appearance manifolds. In: IEEE computer society conference on computer vision and pattern recognition. IEEE Press, New York, pp 313–320 3. Venna J, Peltonen J, Nybo K, Aidos H, Kaski S (2010) Information retrieval perspective to nonlinear dimensionality reduction for data visualization. J Mach Learn Res 11:451–490 4. Bro R, Smilde AK (2014) Principal component analysis. Anal Methods 6:2812–2831 5. Martinez AM, Kak AC (2001) PCA versus LDA. IEEE Trans Pattern Anal Mach Intell 23:228–233 6. Wang W, Huang Y, Wang Y, Wang L (2014) Generalized autoencoder: a neural network framework for dimensionality reduction. In: IEEE conference on computer vision and pattern recognition workshops. IEEE Press, Columbus, pp 496–503 7. Luo X, Jiang C, Wang W, Xu Y, Wang JH, Zhao W (2019) User behavior prediction in social networks using weighted extreme learning machine with distribution optimization. Future Gener Comput Syst 93:1023–1035 8. Chen M, Li Y, Luo X, Wang W, Wang L, Zhao W (2019) A novel human activity recognition scheme for smart health using multilayer extreme learning machine. IEEE Internet Things J 6:1410–1418 9. Luo X, Sun J, Wang L, Wang W, Zhao W, Wu J, Wang JH, Zhang Z (2018) Short-term wind speed forecasting via stacked extreme learning machine with generalized correntropy. IEEE Trans Ind Inform 14:4963–4971 10. Wang Y, Yao H, Zhao S (2016) Auto-encoder based dimensionality reduction. Neurocomputing 184:232–242 11. Song X, Rui T, Zhang S, Fei J, Wang X (2018) A road segmentation method based on the deep auto-encoder with supervised learning. Comput Electr Eng 68:381–388 12. Liou C, Cheng W, Liou J, Liou D (2014) Autoencoder for words. Neurocomputing 139:84– 96 13. Jain AK (2010) Data clustering: 50 years beyond K-means. Pattern Recogn Lett 31:651–666

The Pressure Control System for Tea Rolling Based on Fuzzy Control Yao Li1, Zhe Tang1,2(&), Fang Qi1, and Chunwang Dong3 1

3

School of Computer Science and Engineering, Central South University, Changsha 410083, China [email protected] 2 ChangSha Xiang Feng Intelligent Equipment Co., Ltd., Changsha 410100, China Tea Research Institute, The Chinese Academy of Agricultural Sciences, Hangzhou 310008, China

Abstract. Rolling is a key procedure in the tea primary processing. The appearance and quality of the final tea produced depends largely on the rolling procedure. The pressure control of tea rolling machine is an issue that often plagues the tea processing enterprises. To solve this problem, a method based on fuzzy control technology has been proposed here. Fuzzy control techniques are used to control the pressure of rolling in this paper. Compared with the traditional PID control method, the pressure control system using fuzzy control has the characteristics of short time to achieve stability and small overshoot. The rolling pressure control system based on fuzzy control proposed in this paper promotes the intelligent control of tea rolling machine. Keywords: Fuzzy control

 Tea rolling  Pressure control

1 Introduction With the gradual improvement of people’s living standard, various kinds of tea drinks have gradually entered people’s vision. Tea has become necessary for more and more people because of its rich functions and nutrition. The processing of tea is generally divided into primary production and refining, and rolling is an essential and important part of most of the primary process (except white tea). Rolling can be divided into two main actions, the first is to knead, kneading is to make the tea into strips, the second is to twist, twist can break the cell sap in the tea, let tea juice overflow, so that the overflowing tea juice attached to the surface of the tea strip increases the stickiness between the tea leaves and promotes the formation of the shape of tea. In this way, tea leaves after rolling and drying, can be brewed out of tea flavor and characteristics. Rolling operations, generally more common are manual rolling and mechanical rolling two kinds. At present in addition to some famous tea processing is still a small number of manual rolling, the vast majority of mechanized operations have been achieved. With the change of tea production requirements and the development of PLC control technology, many factories have realized continuous automation of tea rolling operations, but there are still large fluctuations in pressure, pressure size cannot be © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 416–425, 2020. https://doi.org/10.1007/978-981-32-9050-1_48

The Pressure Control System for Tea Rolling Based on Fuzzy Control

417

adjusted in real time as required, and other deficiencies. Under the condition that the rotation speed and rolling time of tea rolling machine remain unchanged, rolling pressure becomes the main factor to increase the friction force and make the leaves roll into strips. In the process of rolling, different times should adopt different pressure. The pressure will change the friction between tea and tea, tea and the rubbing barrels, and thus directly it affects the degree of tightness and integrity of the tea, so the adjustment of the pressure is one of the key technology of rolling. Naheed et al. [1] studied the effect of the rolling process on the quality of black tea. By setting different rolling time, it was found that the best rolling time of black tea was about 25 min. Bambang et al. [2] applied the fuzzy logic control to the temperature control in the barrel of the tea rolling machine, and achieved the expected goal very well. Park et al. [3] studied the influence of the last stage of tea rolling on the quality of tea, and found that the last stage of tea rolling had a greater impact on the final quality of tea; Ozdemir et al. [4] used three different rolling methods to observe the different physics of tea. It is also one of the factors affecting the quality of rolling that different rolling methods are studied. All of the above researches focus on the influence of rolling time, rolling barrel temperature and rolling method on rolling quality, the related control of rolling pressure have not been addressed systematically. In the early 1970s, after Professor L.A. Zadeh proposed fuzzy control theory, it attracted the attention of many researchers. Fuzzy control is a nonlinear global control technology, which uses the long-term accumulated experience and knowledge of field professionals to formulate relevant rules. The most prominent feature of fuzzy control is that we need not to establish an accurate model. The system only needs perform fuzzy reasoning through the established rule table to complete the control of the system. Fuzzy control can effectively overcome the nonlinearity, time-varying and hysteresis of complex systems and has high control quality. Nowadays, fuzzy control has been greatly improved in both theory and technology, and has been well applied to different control scenarios. Xie et al. [5] applied fuzzy control to the traffic control of urban intersections and found an intelligent traffic control method, which solved the complexity and randomness of urban intersections. Zhang [6] applied fuzzy control to reduce NOx in automobile exhaust, and through the analysis of experimental data, proved that it was feasible to apply fuzzy control to the energy saving and emission reduction of automobile. Zhang et al. [7], in order to control the environmental parameters, applied the fuzzy control technology to the greenhouse and found that it could automatically adjust the parameters on the basis of the needs of plant growth. The fuzzy control technology is applied to tea rolling pressure control. As long as the workers set the pressure according to the actual production needs, the system can adjust the pressing cover position of the rolling machine according to the setting, that is, the rolling pressure can be adjusted. Nowadays, most of the rolling machines have complicated operation and high demand for workers. The pressure control system designed can reduce the dependence of the rolling machines on workers, improve the production efficiency and ensure the quality of tea rolling. Article structure: The second section introduces the fuzzy control, which is divided into four parts: fuzzifier, rule base, fuzzy reasoning and defuzzification, and briefly describes the corresponding input and output variables and rule design. The third section is the experimental part. Matlab/simulink is used for simulation experiment to

418

Y. Li et al.

analyze the advantages of fuzzy control algorithm in rolling pressure control, and the results in contrast to the traditional PID method. The last part is about the conclusion and future research direction.

2 Application of Fuzzy Control in Rolling Pressure Control At present, most tea rolling machines in enterprises are barrel rolling machines (the top view of the barrel rolling machine is shown in Fig. 1) [8]. This kind of rolling machines cannot achieve good stable control of the rolling pressure, but the size of the pressure is crucial for the rolling of tea. The pressure is too small to make the cell sap of the tea broken, and the effect of the rolling is not achieved. If the pressure is too high, the leaves will be broken, and the tea leaves will not be beautiful, also cannot meet the requirements of rolling into the rate of enterprise. However, because rolling system has obvious non-linearity and complexity, its accurate mathematical model is difficult to calculate, and fuzzy control technology can just solve these problems, so this paper applies fuzzy control technology to tea rolling pressure control.

Fig. 1. Top view of barrel rolling machine.

2.1

Fuzzy Control Structure

The fuzzy control structure model see Fig. 2. Its structure mainly includes input and output device, fuzzy controller, generalized object and sensor.

Fig. 2. Fuzzy control structure model.

The Pressure Control System for Tea Rolling Based on Fuzzy Control

419

The fuzzy controller includes: 1. Fuzzifier. The main function is to convert the input variables into the identifiable fuzzy variables according to the actual needs of the system. 2. Fuzzy Rules. Based on the experience of experts or skilled operators, a fuzzy rule base is established. The correctness of the rules directly affects the performance of the controller. 3. Fuzzy reasoning. It mainly implements reasoning decision based on the established rule base, that is to say, according to the input value matching the information of the corresponding rules in the rule base, the control conclusion is drawn. 4. Defuzzifier. The main function is to transform the conclusions from rule base matching into control output. The main methods of de-fuzzification are mom, centroid, bisector, som and lom. 2.2

Structure Design of Fuzzy Controller

A fuzzy controller with double input and single output mode is adopted. Figure 3 is the structure design.

Fig. 3. Two-dimensional Fuzzy Control System for Tea Rolling machine.

The r(t) is the given pressure value, e(t) is an input value of the fuzzy controller, e(t) equals the current pressure minus r(t); The d/dt is the difference between the pressure feedback value at time t and the pressure feedback value at time t-1, that is, the rate of change of the pressure value; Ke and Kc are quantization factors of two input variables of fuzzy controller respectively. The u(t) is the conclusion value obtained by the fuzzy controller according to the set rules, and Ku is the scaling factor of the output variable. The input variables are expressed by E (the difference between the current pressure value and the given value of the rolling machine fed back by the sensor) and EC (the difference between the two connected time points) respectively. The output variables are expressed by U (the value obtained by the fuzzy controller after a series of fuzzification, reasoning and de-fuzzification of the input variables according to the fuzzy rules). 2.3

Membership Function and Rule Design of Fuzzy Control

According to the actual situation of rolling pressure change, input variable E, EC, output variable U were divided into seven fuzzy subsets.

420

Y. Li et al.

Because tea leaves are sensitive to rolling pressure, the triangle membership function with simple calculation and implementation, good control performance and high sensitivity is selected. Figure 4 is the membership function curve.

Fig. 4. Curve of variable membership function.

In this paper, based on the long-term experience of experts and skilled professionals, the control rules table is designed in Table 1, where “-” represents the situation that will not occur, for example, E = NB and EC = NB, which means that if the current pressure is far less than the required pressure, and the pressure of the machine will drop rapidly. Obviously, this situation will not occur in the control process. Table 1. Table of fuzzy control rules. u

E

NB

NM

NS

ZO

PS

PM

PB

PB

PM

PM

PS

ZO

ZO

PB

PM

PM

PS

ZO

ZO

NS

-

ZO

PB

PB PB

PM PM

PS ZO

ZO NM

NM NB

NM NB

PS

PM

PM

ZO

NS

NM

NB

PM

ZO

ZO

NS

NM

NM

NB

PB

ZO

ZO

NS

NM

NM

NB

-

EC NB NM

The contents of the above table can use fuzzy conditional statements according to the corresponding fuzzy relation. Mamdani fuzzy control algorithm is adopted for the controller, And method use “min” operation, Or method use “max” operation, Implication set “min” operation, Aggregation set “max” operation, and Defuzzification set “centroid”. The set inference rules can be observed through the browser interface of fuzzy rules, and Fig. 5 is the three-dimensional diagram of the output surface of the fuzzy inference system.

The Pressure Control System for Tea Rolling Based on Fuzzy Control

421

Fig. 5. Fuzzy reasoning system input and output stereogram.

In Fig. 5, E is the value of the difference between the current pressure value and the given value of the tea rolling machine after quantization factor Ke, EC is the value of the pressure difference between the two connecting time points after quantization factor Kc, and U is the value inferred by the analog controller through two inputs. 2.4

Tea Rolling Pressure Control

This paper applies fuzzy control technology to tea rolling pressure control. There are many different varieties of tea, and different tea varieties have different processing techniques, but the main process is generally the same, divided into water-removing, rolling and drying. In the past, it was manual operation with low efficiency and serious waste of resources. Nowadays most enterprises use tea rolling machine instead of manual rolling, but the pressure in the rolling process is often not well controlled. The method of fuzzy control is adopted to effectively control the rolling pressure, and the pressure sensor is set in the rolling barrel to feedback the rolling pressure value in real time, which is more convenient for workers to adjust the rolling pressure according to their needs. Figure 6 shows the general primary processing process of tea, in which the fuzzy control technology is added to the rolling process.

Fig. 6. Application of fuzzy control in tea primary processing.

3 Experimental Result The computer used in this experiment is windows10-64bit operating system, the software used is matlab_R2016a, and matlab/fuzzy design is used to achieve the fuzzy controller in this paper, matlab/simulink simulation experiment.

422

Y. Li et al.

According to the actual situation of tea rolling machine, the transfer function of the control system is G(s) = 10/(3s2 + 2s + 1), the system input is step function, the value is 300, the sampling period is T = 0.4 s, and the simulation time is set as T = 60 s. Because of the force exerted on the tea leaves in the rolling machine, the error range of the initial pressure is [−75, 75], so Ke = 6/75 = 0.08. The pressure value range of the connected sampling time is taken as [−40, 40], Kc = 6/40 = 0.15. Figure 7 is the simulation system structure.

Fig. 7. Structural diagram of simulation system.

In this paper, the fuzzy control algorithm and the traditional PID control algorithm are used to simulate and compare. The simulation results are shown in Fig. 8. The solid line is the result curve of the fuzzy control and the dotted line is the result curve of the PID control.

Fig. 8. Structural diagram of simulation system.

From Fig. 8, it is observed that the time for fuzzy control to reach steady state is about 14 s, and the time for PID control to reach steady state is about 21 s, and there is obvious overshoot in traditional PID control. The final steady-state value of the fuzzy control is 298, which is different from the set 300. The steady-state error is 2, so the system has steady-state error. But 2/300 = 0.67% is acceptable for the pressure control system of tea rolling. Figure 9 is the result by modifying the value of the quantization factor Kc of the fuzzy control.

The Pressure Control System for Tea Rolling Based on Fuzzy Control

423

Fig. 9. Modify parameter Kc result graph.

In Fig. 9, the response time of the system becomes faster and the time to reach the stable state becomes shorter, but its steady-state value is 296 and the steady-state error is 4. It can be seen that modifying the relevant parameters can change the performance of the system. Since this paper applies fuzzy control to rolling pressure control, considering that tea leaves are sensitive to pressure during rolling, so we choose to apply the system of Fig. 8 to the tea rolling module. Figure 10 is the tea rolling module.

Fig. 10. Application of Fuzzy Control to Tea rolling machine.

Figure 11 shows the tea leaves rolled without pressure control system and with pressure control system. Because the effect of the tea rolled without drying is not obvious, the effect of the tea rolled after drying is compared.

424

Y. Li et al.

Fig. 11. Contrast chart of effect after rolling and drying.

In Fig. 11, the left side is the tea leaves that have been rolled by the ordinary rolling machine. In the rolling process, the tea leaves could not get stable pressure control, resulting in poor tea forming effect and incomplete cell breakage, which reduced the quality of the tea leaves that have been rolled. The right side is the tea leaves that have been rolled after applying fuzzy control to the rolling machine. The rolling pressure of tea leaves can be adjusted in real time and stably according to the needs. The tea leaves that have been rolled are well formed and the tea juice can be attached to the surface of tea strips. The rate of tea strips basically achieves the desired goal, and the quality of the twisting is higher than the left side.

4 Conclusion Because the pressure control process of tea rolling machine is non-linear and complex, it is difficult to control its pressure directly and steadily. By applying the fuzzy control technology to the pressure control of tea rolling machine, a pressure control system which can achieve stable state quickly and has small overshoot is designed. The simulation experiment designed in this paper compares the pressure control system under the fuzzy control with that under the traditional PID control. The experimental results prove the superiority of the system under the fuzzy control, which is of great significance to the pressure control of the tea rolling machine. Acknowledgment. This work is supported by the National Key Research and Development Plan (2018YFD0700503, 2018YFD0700500, 2017YFD0400800), Hunan Province Key Research and Development Plan (2018NK2037), Project of Scientific and Technological Breakthrough in Strategic Emerging Industries of Hunan Province (2017GK4006), Science and Technology Project of Changsha City (10200-422040004).

The Pressure Control System for Tea Rolling Based on Fuzzy Control

425

References 1. Naheed Z, Barech AR, Sajid M (2007) Effect of rolling, fermentation and drying on the quality of black tea. Growth and yield related characteristics of improved commercial 2. Bambang R, Mahbub SF, Abas T (2001) Application of fuzzy logic control to tea rolling process. IFAC Proc 34(11):248–253 3. Park JH, Lim KC (2003) Effect of a final rolling process on Okro tea quality. J Korean Soc Food Sci Nutr 32:58–61 4. Ozdemir F, Gokalp HY, Nas S (1992) Effects of rolling method on physical characteristics of rolled tea leaves. Sri Lanka J Tea Sci 61:51–58 5. Xie ZQ, Liu B (2013) The application of fuzzy control in the intelligent crossroad traffic control. Appl Mech Mater 331:366–369 6. Zhang WJ (2015) The application of fuzzy control in vehicle emission reduction technology. Appl Mech Mater 719–720:306–310 7. Zhang DH, Wu XQ, Zhang CY (2014) The application of fuzzy control in greenhouse environment control. Appl Mech Mater 543–547:1432–1435 8. Haiwei XU et al (2015) Research on the optimal regulation control of barreling pressure for the tea. China Meas Test 41:112–116

Design of Differential GPS System Based on BP Neural Network Error Correction for Precision Agriculture Gangshan Wu1, Chiyuan Chen2, Ning Yang2(&), Haifang Hui2, and Peifeng Xu1 1

Jiangsu Polytechnic College of Agriculture and Forestry, Jurong 211121, China 2 Jiangsu University, Zhenjiang 212013, China [email protected]

Abstract. Precision agriculture is the new tendency of agricultural development all around the world today. During the implementation process, precision agriculture is been required to collect information on crop diseases, pests and fertilizers at any time. The acquisition of this information depends on the precise position information. Considering the problem that the positioning accuracy of the traditional GPS system is low or the other signal needs to be sent to correct the position, a GPS position based on neural network is designed to correct the precision problem. The GPS module was used to receive GPS signal, and the position information was extracted by the MCU. Then, the real-time location information is displayed on the screen. The back propagation neural network was used to generate a prediction model of error value between the measured data and real data. This model can predict and compensate the errors of measured values. Finally, the measured data and the corrected data are shown on the screen. The precision of GPS positioning designed in this paper is 10 times higher than that of traditional GPS, meeting requirement with high precision of the information-based agriculture. Keywords: GPS  Differential Precision agriculture

 BP (back propagation) neural network 

1 Introduction Precision agriculture applies modern information technology to obtain the difference between natural parameters such as soil and harvesting quantity further to carry out real-time, positioning, and quantitative farming operations. It can not only reduce input, improve crop yield and quality, but also reduce or avoid the loss of chemical fertilizers and pesticides. It is the development direction of China’s agriculture in the future [1]. The acquisition of these data relies on the acquisition of high-precision geographic location information. Therefore, it is necessary to study a simple and practical handheld differential GPS positioning system. As early as the beginning of 1980s, the United States proposed the overall concept of precision agriculture, and then began to enter the practical application phase in the © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 426–438, 2020. https://doi.org/10.1007/978-981-32-9050-1_49

Design of Differential GPS System Based on BP Neural Network Error Correction

427

1990s. In 1992, a team at the University of Pennsylvania in the United States used GPS to conduct a follow-up survey of the migratory agricultural pest, the European corn borer, with the aim of studying its distribution and migration trends, and finally successfully guided the chemical control of the agricultural pest [2]. At present, the practical research of GPS in precision agriculture has been rapidly developed and achieved certain results. The research and application related to precision agriculture have been successively carried out in the United Kingdom, Germany, Japan and other countries [3]. Studies have shown that there is basically no overlap and leakage phenomenon in the control of wheat aphids by GPS, so that the pest control effect is as high as 90% or more, which not only saves the amount of pesticides, but also greatly improves the yield of farmland crops. It has brought a good start to its subsequent development. It can be seen that GPS technology acts a vital role in the implementation of precision agriculture. According to the principle of GPS differential positioning, this paper proposes a GPS positioning method relied on differential positioning technology. The device is simple in structure, low in cost and convenient in operation. In the cloudy weather on March 21, 2019, we used the handheld differential GPS receiver system designed to perform on-the-spot measurements at five landmark locations within Jiangsu University. The measured GPS positioning error was shortened from 20 m to 2 m. The accuracy is increased by 10 times and meets our design requirements.

2 Working Principle 2.1

Basic Principle of Differential GPS

The application of differential GPS (DGPS) technology is based on multiple receivers. First, a receiver is set on the reference station whose coordinate information is known, and the GPS signal is observed in real time by using the receiver of mobile stations. The base station continuously receives the GPS position signal, and then compares it with its known accurate data to obtain various correction values. Then the base station transmits the correction value to the mobile station through radio communication, and finally the observation value of the mobile station is corrected by itself to obtain accurate positioning data, which is the basic principle of differential GPS navigation and positioning technology [4]. 2.2

The Algorithm of Differential GPS

According to the difference of the content of the differential information sent by the base station, the differential positioning method is generally divided into the following two categories: position difference and pseudo-range difference. The working principles of the two types of difference modes are basically the same, and the differences are mainly reflected in the details of the correction values in various modes. So the implementation difficulty and positioning accuracy of the differential positioning

428

G. Wu et al.

technology are also different [5]. Below we will introduce the position discrepancy and pseudo-range discrepancy in detail. Position Difference The GPS receiver placed at the base station acquires the positioning information through the observation satellite, and then obtains the coordinates (X′, Y′, Z′) of the reference station at the observation time. However, due to the influence of ephemeris error, clock error and atmospheric refraction during positioning, there is a certain error between the coordinate value and the known coordinate (X, Y, Z) [6], and the correction of its coordinates can be obtained: 8 < DX ¼ X  X 0 ð1Þ DY ¼ Y  Y 0 : DZ ¼ Z  Z 0 In the formula, DX, DY, DZ are the coordinate corrections of the base station. The base station transmits the correction value to the subscriber station by radio, and the user receiver corrects its coordinates by the correction value to obtain its coordinates. 8 0 < Xp ¼ Xp þ DX 0 Yp ¼ Y þ DY ð2Þ : Z ¼ Zp0 þ DZ p p In the formula, X′p, Y′p, Z′p are the results observed by the user receiver, and Xp, Yp, Zp are the corrected coordinate values respectively. If we consider the instantaneous change in the coordinates of the user’s receiver due to the time discrepancy of the data in the transmission process, then the above formula can be written as: 8 dðXp0 þ DXÞ 0 > ðt  t0 Þ > < Xp ¼ Xp þ DX þ 0 dt dðYp þ DYÞ 0 Yp ¼ Yp þ DY þ ðt  t0 Þ dt > > dðZp0 þ DZÞ : 0 Zp ¼ Zp þ DZ þ ðt  t0 Þ dt

ð3Þ

t is current positioning time of user receiver; t0 is the coordinate correction time of the base station. Pseudo-Range Difference The pseudo-range difference means that the distance to the satellite is obtained from the reference station by the known coordinates, and then the obtained distance value is compared with the measured distance containing the error, and the deviation (pseudorange correction number) is obtained, and the value is transmitted to the subscribe station through the data link. The subscriber station uses the value to correct the measured pseudo-range and obtain the position coordinates of the location [7]. The

Design of Differential GPS System Based on BP Neural Network Error Correction

429

corrected value eliminates the common error between the two stations compared with the original value, so the positioning accuracy is effectively improved. The exact coordinates on the base station are (Xi, Yi, Zi), and the geocentric coordinates of each satellite obtained by the observation satellite are (Xj, Yj, Zj), and all pseudo-ranges Ri are measured. Then we can find the true distance from the base station to the satellite at any time: Ri ¼

qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ðXj  Xi Þ2 þ ðYj  Yi Þ2 þ ðZj  Zi Þ2

ð4Þ

In the formula, the subscript i represents the observed i-th satellite. Thus, the correction of the pseudo-range can be obtained: Dqi ¼ Ri  qi

ð5Þ

Considering the time delay between the differential correction numbers from the reference station (t0) to the user station (t), the change rate of the differential correction number in the propagation process is as follows: 

Dqi ¼

Dqi Dt

ð6Þ



The base station transmits Dqi , Dqi to the subscriber station, The user receiver adds the measured pseudo-range qui to the pseudo-range correction value to find the pseudorange value after the final correction: 

u q0u i ¼ qi þ Dqi þ Dqi ðt  t0 Þ

ð7Þ

3 System Design 3.1

System Hardware Overall Design

Overall GPS hardware design the includes following contents: U-BLOX NEO-6M positioning module, STC15F2K60S2 microcontroller minimum system, TFT32240 RS035BT touch screen and power module. The satellite data received by the GPS module is sent to the serial port of the single chip microcomputer, and then the MCU controls the liquid crystal display to perform real-time display of the positioning information. The system adopts TFT32240RS035BT touch screen liquid crystal display, which is easy to use and has a wide application range. In addition, the voltage module is responsible for supplying +5 V to each chip. The total system hardware design is shown in Fig. 1.

430

G. Wu et al.

GPS-OEM

STC15F2K60S2

LCD

POWER

Fig. 1. The total design of hardware.

GPS Module In this paper, a handheld differential GPS positioning system for precision agriculture is designed, so first of all, the GPS positioning module is introduced. Today, There are two main types of GPS-OEM boards: GPS 25 LP [8] and U-BLOX NEO-6M. The serial port of the former OEM board can only send RS-232 level, while the port of the MCU uses CMOS/TTL level. Therefore, in order to communicate with the MCU, the level conversion must be carried out. In order to use conveniently, the system chooses to provide TTL level U-BLOX NEO-6M board. Main Control Module At present, the more commonly used MCUs are Atmel’s AT89C51 [9], Hongjing Technology’s STC89C52RC type and STC15F2K60S2 type. Compared to the AT89C51, the STC15F2K60S2 does not require an external reset and crystal oscillator circuit. In addition, the STC89C52RC has only 8 k of flash program memory and only one set of serial communication ports, while the STC15F2K60S2’s flash program memory has 60 k of storage space and two sets of serial communication ports, which can store the differential table of the design. Moreover, the design of the system requires two sets of serial communication ports. Therefore, the STC15F2K60S2 MCU produced by Hongjing Technology is selected. LCD Module In this paper, the liquid crystal display module selects the TFT32240RS035BT touch screen produced by Guxin Technology, which is a serial port type liquid crystal display specifically for the single-chip control system. The true color TFT screen has the characteristics of high performance and low power consumption. Its interface provides TTL level and can be directly connected to the microcontroller. Therefore, the system selects the TFT32240RS035BT touch screen to design the real-time display of positioning information. 3.2

System Software Overall Design

The overall software design of the system includes the following contents: GPS positioning data extraction, serial port interruption, human-computer interaction

Design of Differential GPS System Based on BP Neural Network Error Correction

431

interface (LCD liquid crystal display), and system initialization. First, the GPS positioning module receives the satellite signal, and then the signal chip computer receives the “$GPRMC” statement through the serial port interrupt mode. When receiving the “$GPRMC” statement, the LCD displays the current positioning information. If the data is received again, the LCD will update the current status. That is to say, the LCD can display the current GPS positioning information in real time. It shows the software design of the entire system in the Fig. 2.

Start

System initialization

N

If “$ GPRMC” Y

Receive and put in the serial buffer Extract UTC time, latitude, longitude and date Query error compensation table Get corrected latitude and longitude

Display original and corrected values for positioning information Fig. 2. The overall design of system software.

GPS Module Receiving Program Design The GPS module receiving program design is mainly responsible for receiving the serial data sent by the U-BLOX NEO-6M board. This program is completed in the serial port interrupt. This GPS-OEM board can output a variety of different format statements. The design only needs to receive data with the “$ GPRMC” as the leader, and the format of the statement is: $ GPRMC, , A, , N, , E,, ,, ,,, A*

432

G. Wu et al.

represents UTC time. represents latitude value. represents longitude value. represents ground speed, and the unit is section. represents UTC date, and represents checksum. The design only needs to extract the latitude and longitude, date, and world standard time in the data frame. The design adopts the method of interrupt receiving to receive GPS data, and when the serial port receives the data, it is stored in the array of buff[]. And a serial port interrupt is generated when one frame of data is received. At this point, the CPU performs data extraction in response to the interrupt request. LCD Display Program Design This system selects TFT32240RS035BT liquid crystal display for real-time display of positioning information. The design generally needs to go through the following steps: serial port initialization, liquid crystal clear screen, palette setting and interface display. Construction Method of Difference Operation The paper is designed to be a differential GPS for information-based agriculture, but the existing GPS receiver is a single point positioning, whose positioning accuracy cannot meet the high precision requirements of precision agriculture. Therefore, it is necessary to construct a differential algorithm to improve the accuracy of the positioning by performing error compensation correction on the original measured values. Because the relationship between the measured values and the errors is unknown, BP neural network is utilized to construct model. The method considers unknown system as a black box. Firstly, a known BP neural network is constructed by using the known measured values and errors as the input and output of the system. The network can simulate a certain correspondence between the known measured values and errors by repeatedly training the known data, and then obtain the BP neural network prediction model. A variety of different neural networks have emerged, of which BP neural networks are most commonly used. As can be seen from Fig. 3 below, there are three layers in the network, each layer needs to be interconnected, while the units in the same layer are independent and do not have association.

Input

Input

Hidden layer

Output

Output

Fig. 3. Typical 3-layer BP neural network architecture.

Design of Differential GPS System Based on BP Neural Network Error Correction

433

4 Results and Discussion 4.1

Experimental Materials

The design of the system consists of the following four modules: U-BLOX NEO-6M positioning module, STC15F2K60S2 microcontroller minimum system, TFT32240 RS035BT touch screen and power module. 4.2

Experimental Steps Step 1: Debugging of the GPS-OEM board. Connect the UART GPS NEO-6 M module, the serial port and the computer. After the setup is completed, the OEM board is placed outdoors. After a few minutes, you can see the data output (GPS receiving statement) in the serial debugging assistant, indicating that the OEM board is successfully positioned. Step 2: Module combination. The GPS module, the MCU minimum system, the LCD screen and the power module are all fixed on a fiberglass board. Connect the TXD and RXD pins of the GPS module to P1.0 and P1.1 of the MCU respectively. Connect the TXD and RXD pins of the LCD display to P3.0 and P3.1 of the MCU respectively. Finally, connect the VCC and GND pins of each module to the power module to complete the hardware part. Step 3: Download the completed program of the entire system to the signal chip computer to complete the work of the software part. Step 4: Take the circuit board to an open space, and then turn on the power. After powering on the MCU, observe whether the LCD screen works normally. If the positioning information can be displayed normally, it means that the system is successfully debugged.

4.3

BP Neural Network Modeling

The system selected 25 sets of known record to train the neural network. The data were obtained by measuring in different places in Jiangsu University. Then input 5 sets of data to be predicted (original latitude and longitude measurement values), the trained neural network can predict the corresponding output (error). Finally, the original value is corrected by using the error compensation value, and the corrected positioning data can be obtained. As shown in Fig. 4, the blue dots represent the input known longitude values (measured values) and their corresponding error data, which are obtained by subtracting the measured longitude values from the exact values found on Google Earth. The neural network is trained by these 25 sets of data, and the red dots represent the predicted neural network to predict the error output value corresponding to the original data, so that the prediction model of the longitude value is successfully established.

434

G. Wu et al.

Fig. 4. Prediction model of the longitude and error value.

Under the prediction model, the five new input longitude values are predicted, and the error compensation value of the longitude is included in the following Table 1. Table 1. Error compensation table of the longitude. Location

Central gate Sanshan building E119.51352 E119.51030

Longitude measurement Error compensation 1.9  10−4 1.7  10−4 value

Newtown 1 Library

Electronic building E119.51073 E119.50599 E119.50421 2.1  10−4 0.9  10−4 1.5  10−4

Similarly, neural network training is also performed on latitude values. The training results are shown in Fig. 5 below. The blue dots represent the input known latitude values and their corresponding error data. The neural network is trained by these 25 sets of data. The red dot represents the trained neural network to predict the error output value corresponding to the original data. A predictive model of latitude values is successfully established.

Design of Differential GPS System Based on BP Neural Network Error Correction

435

Fig. 5. Prediction model of the latitude and error value.

Under the prediction model, the five new input latitude values are predicted, and the error compensation value of the latitude is counted in Table 2. Table 2. Error compensation table of the latitude. Location Latitude measurement Error compensation value

4.4

Central gate Sanshan building N32.19599 N32.19715

Newtown 1

Library

N32.20537

N32.20032

Electronic building N32.19954

−0.9  10−4 −1.3  10−4 −1.2  10−4 −1.6  10−4 −1.1  10−4

Experimental Results and Analysis

The hardware chart of the GPS is shown in the Fig. 6. The system is mainly composed of U-BLOX NEO-6M positioning module, STC15F2K60S2 MCU minimum system, TFT32240RS035BT touch screen and power module.

Fig. 6. Hardware physical map.

436

G. Wu et al.

Connected to the power supply, when the GPS-OEM board is placed indoors or where the signal is weak, the GPS cannot be accurately positioned. At this time, the LCD displays “Date error” (as shown in Fig. 7 below), indicating that the current positioning has failed.

Fig. 7. Invalid location state of GPS.

When moving to the outdoor, the LCD displays “Data success” and displays the current positioning data after the GPS is successfully positioned. As shown in Fig. 8 below, the longitude, latitude, date, and time are from top to bottom. The latitude and longitude on the left is the original measured value, and the right side is the corrected value obtained after error compensation.

Fig. 8. Successful positioning state of GPS.

Five locations were selected for field measurements in Jiangsu University. There are Central gate, Sanshan building, Newtown1, library and electronic building respectively. The original latitude and longitude values measured at the five locations and the corrected results obtained by the error compensation are now counted in Table 3 below.

Design of Differential GPS System Based on BP Neural Network Error Correction

437

Table 3. Experimental results. Newtown1 E119.51096, N32.20537

Library E119.50611, N32.20013

E119.51352, N32.19599

Sanshan building E119.51050, N32.19697 E119.51030, N32.19715

E119.51073, N32.20552

E119.50599, N32.20032

Electronic building E119.50437, N32.19939 E119.50421, N32.19954

E119.51371, N32.19590

E119.51047, N32.19702

E119.51094, N32.20540

E119.50608, N32.20016

E119.50436, N32.19943

18.8

23.9

25.5

23.1

17.3

1.9

3.1

2.3

2.2

1.7

Location

Central gate E119.51373, N32.19587

The original value (unit: degree) The corrected value (unit: degree) The original error The corrected error

As can be seen from Table 3, the measured error of GPS single point positioning is about 20 m, and the accuracy after error compensation can reach about 2 m, which can basically meet the requirements of information-based agriculture for positioning.

5 Conclusion The paper aims to design a handheld differential GPS positioning system for precise agriculture, which involves the combination of software and hardware. First, the UBLOX NEO-6M positioning module is used to receive GPS data information. Then positioning related information is extracted by the serial port interrupt mode of STC15F2K60S2 microcontroller via GPS system, and subsequently sent via the serial port for the liquid crystal display of TFT32240RS035BT. Finally the LCD is used to display the positioning information. The software construct of the system mainly involves the function of differential operation. The BP neural network was unitized to generate the prediction model. This model can predict and compensate the errors of measured values. After debugging by software and hardware, a real-time differential GPS system is managed in this paper. The original accuracy of GPS single-point position is about 20 m, and the positioning accuracy corrected by error compensation method is about 2 m, indicating greater accuracy than the original data, which greatly improves the positioning accuracy of the GPS receiver. Thus, this technique can basically meet the precision of the information-based agriculture positioning. Acknowledgements. This research was financially supported by the Research on Intelligent System for Early Diagnosis of Main Strawberry Pests and Diseases Based on Deep Learning (2018kj11), Chinese National Natural Science Foundation (31701324), China Postdoctoral Science Foundation Project (2018M642182), Jiangsu Agricultural Science and Technology

438

G. Wu et al.

Innovation Fund (CX(18)3043), Outstanding Youth Science Foundation of Jiangsu province (BK20180099), Zhenjiang Dantu Science and Technology Innovation Fund (Key R&D ProgramSocial Development) (SH2018003), the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD), Project of JIANGSU POLYTECHNIC COLLEGE AGRICULTURE AND FORESTRY (2018kj12).

References 1. Yost MA (2019) Public–private collaboration toward research, education and innovation opportunities in precision agriculture. Precis Agric 20(1):4–18 2. Shockley JM (2019) An economic feasibility assessment of autonomous field machinery in grain crop production. Precis Agric (2):1–18 3. Yong L (2012) Attitude determination by integration of MEMS inertial sensors and GPS for autonomous agriculture applications. GPS Solutions 16(1):41–52 4. Rudolph S (2018) Assessment of the position accuracy of a single-frequency GPS receiver designed for electromagnetic induction surveys. Precis Agric (3):1–21 5. Clark TE (2005) Using out-of-sample mean squared prediction errors to test the martingale difference hypothesis. J Econom 135(1):155–186 6. Tan H (2006) DGPS-based vehicle-to-vehicle cooperative collision warning: engineering feasibility viewpoints. IEEE Trans Intell Transp Syst 7(4):415–428 7. Rezaei S (2007) Kalman Filter-based integration of DGPS and vehicle sensors for localization. IEEE Trans Control Syst Technol 15(6):1080–1088 8. Harwin S (2012) Assessing the accuracy of georeferenced point clouds produced via multiview stereopsis from unmanned aerial vehicle (UAV) imagery. Remote Sens 4(6):1573–1599 9. Qiu J (2013) Mitochondrial calcium uniporter Mcu controls excitotoxicity and is transcriptionally repressed by neuroprotective nuclear calcium signals. Nat Commun 4(3):2034

Multi-view Based Pose Alignment Method for Person Re-identification Yulei Zhang, Qingjie Zhao(&), and You Li Beijing Key Lab of Intelligent Information Technology, School of Computer Science, Beijing Institute of Technology, Beijing 100081, China {zyl1260,zhaoqj}@bit.edu.cn, [email protected]

Abstract. This paper proposes a Multi-View based Pose Alignment (MVPA) method for person re-identification (re-id). Most recent methods solve re-id as a matching process based on single image. However, when poses vary or viewpoints change, the performance seriously deteriorates. This paper aims to learn a representation insensitive to view and pose. Specifically, we establish a set of Multi-view based Person Pose Templates (MPPT) and propose a Pose-Guided Person image Generation (iPG2) model to synthesize multi-view and uniformpose based images. The representation learned from multi-view images can significantly enhances the accuracy of re-id. We evaluate our method on two popular datasets, i.e., Market-1501 and DukeMTMC-reID. The results show that our framework promotes the performance of re-id a lot and surpass other methods. Keywords: Person re-identification Generative Adversarial Networks

 Pose Alignment 

1 Introduction The purpose of person re-identification is to recognize a particular person who has been observed elsewhere [10]. It has raised extensive discussions due to widespread applications, e.g., video surveillance and criminal tracking. Though many methods aim at solving problems of low-resolution, occlusion, lighting, etc, the critical challenges are still remained such as pose variations and viewpoint changes. To solve this problem, some approaches utilize external pose information and design models to normalize poses of images. For example, [14] uses a PoseBox structure to align people to a standard pose, and designs a Pose-Box fusion (PBF) CNN architecture to execute the person re-id task. These approaches use single-pose based images to learn representations, which can partially solve the problem of pose variations. However, how to deal with images with many viewpoints changes is still an unsolved challenge. In order to solve the problems above, we propose a Multi-View based Pose Alignment (MVPA) method to learn a pose-and-view-insensitive representation. The contributions of this paper can be summarized as follows:

© Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 439–447, 2020. https://doi.org/10.1007/978-981-32-9050-1_50

440

Y. Zhang et al.

(1) We establish a set of Multi-view based Person Pose Templates (MPPT), which contains eight pose templates. Each template is a binary image corresponds to a typical pose of person in a specific viewpoint. (2) We propose an improved Pose-Guided Person image Generation (iPG2) model to generate uniform-pose based images. The traditional image generation model is modified by transforming the training mode and loss functions. (3) We design a Multi-view based Pose Alignment(MVPA) method for re-id, which can properly face the problem of pose variation and viewpoint change.

2 Related Works In this section, some image generation models and deep re-id models are discussed, since our framework is concentrated on pose-guided image generation and deep re-id models. 2.1

Image Generation Models

Generative Adversarial Networks (GAN) [4] can generate new images with novel features excluded in datasets, which is widely used recently. It learns high dimensional and complex distribution of data in original images and transports it to the new images. As a result, generated images have the same inherent features as original images. Recently, GAN has been applied in domain of reid. Many methods use it for data augmentation. For example, [16] uses GAN to generate new images. However, the generated images have no relation with the original images, so they are classified as unlabeled images, which increases the diversity of pose variations, instead. Consequently, the results of re-id don’t have much progress. Aiming to solve this problem, [8] proposes SimPGAN to preserve the similarity of the transformed images of the same person. However, the transformed images still have different poses, which makes feature learning model sensitive to pose variations. It is used for cross-dataset re-id, thus we don’t compare our method with it. Differently, [9] proposes a two-path Pose-Guided Person image Generation (PG2) model to generate uniform-pose based images. It can generate an image of the same person with the target pose who is in the source image. This approach creatively solves the problem of pose variation. But in re-id process, a singlepose based representation may lead to mismatching due to viewpoint changes. In experiments, it serves as baseline method for our approach. We will show its weekness and the advantages of our method in Sect. 4. Our approach solves both the problems of pose variation and viewpoint change together by generating multi-view and uniform-pose based images without identity change. Besides, we improve the PG2 model by training the two generators simultaneously and changing its loss functions. 2.2

Re-id via CNN Models

Deep Convolutional Neural Networks (CNN) is popular in task of image classification and feature learning. They concentrate on designing lots of complex architecture and

Multi-view Based Pose Alignment Method for Person Re-identification

441

loss functions, such as identity classification, pairwise loss and triplet loss. However, they hardly pre-process images with problems of pose variation and viewpoint change. In our method, we first align the person’s pose with iPG2, and then we use a CNN architecture to learn a more robust representation with generated images and the source image.

3 Methods Problem Definition and Method Formulation. Assume we have two gallery sets: a query set of N persons Dquery ¼ fIk ; yk gNk¼1 and a testing set of M persons Dtest ¼ fIk ; yk gM k¼1 , where Ik and yk are the person images and the number of the k-th person, respectively. Given an image of query set fIi ; yi g and an image of testing set fIi ; yi g, we need to judge whether yi ¼ yj or yi 6¼ yj . The formulation of our method is shown in Fig. 1. We firstly establish a set of Multi-view based Person Pose Templates (MPPT). Then, for every source image, we use the improved image generation model to synthesize eight uniform-pose based images. Finally, we obtain a pose-and-viewinsensitive representation by fusing features learned form the eight generated images and the source image.

Improved PG2

Deep Re-id Model

Pose Templates

Result 1

Result 8

Source Image

Feature 1

Feature 9

Re-id Representation

Fig. 1. Overview of our MVPA framework.

3.1

Multi-view Based Person Pose Templates

This template set contains 8 pose templates of different viewpoints from 0° to 360° increasing by 45° (see Fig. 3(b)). Concretely, we first take a video of a person walking toward all directions and capture a image with typical pose for every viewpoint. Secondly, for each image, as Fig. 3(a) shows, we use a off-the-shelf pose detection toolkit – OpenPose [1] to extract skeleton of the person. Then, we obtain a binary image with 18 anatomical key-points and we connect these keypoints with a line of three-pixel-width. Finally, we get a pose template by taking morphological operations

442

Y. Zhang et al.

on the pose skeleton image. Specifically, the person of this template set is beyond datasets, otherwise the image generation model tends to directly generate images of the same person (Fig. 2).

OpenPose Target Image

Key Points

Original Template Images

Connect

morphological

operation Pose Image

Pose Skeleton

(a)

Multi-view based Person Pose Templates (b)

Fig. 2. Production the Multi-view based Person Pose Templates. (a) shows the process of a single template production. (b) shows the original template images and the NPPT.

3.2

Improved Pose-guided Person Image Generation Model

We propose an improved Pose-Guided Person image Generation (iPG2) model to synthesize identity-invariant and uniform-pose images. Specifically, in training time the model randomly sample two images of a person with different poses, one of which is served as source image Ii and another is served as target image Ij. We train the model to output an image with pose of the target image without identity change. While in testing time, the model takes a image of templates as target and transforms the person of source image into the target pose. As Fig. 3 shows, our model has a two-path generator and a discriminator. The first generator (G1) focus on generating a course result ^Ij which generally has the target pose and global feature of the source image. To enhance 0 local details, generator (G2) compares the difference of local feature between Ii and ^Ij which outputs a difference map. Subsequently, we obtain a more clear and real-like 0 result ^Ij by refining course result via difference map. As for discriminator, it distinguishes images from generator or datasets by sampling image pairs rather than single real or fake image. This operation can effectively avoid misleading G2 to directly output source image. Now, we introduce the architecture and loss functions of our model.

Multi-view Based Pose Alignment Method for Person Re-identification

443

Skip Connection

Source Image

Target Image

Coarse

Pose Template

Result

Generator 1 (G1)

Source Image

Skip Connection

Real

or Fake

Generator 2 (G2)

Difference

Final

Map

Result

Source Image

Discriminator (D)

Fig. 3. The architecture of iPG2. G1 generates a course image with the desired pose. G2 compare the course result with source image, which outputs a difference map. D distinguish real and fake images.

Generator G1. G1 is a U-Net-like architecture. Both the encoder and decoder has five residual blocks and they are symmetric except for the last layer of decoder which generates an image of three channels. There is a fully connected layer between them. The residual block consists of two convolutional layers with stride of one and two, respectively. To avoid information lost because of deep networks, skip connections are used between symmetric layers in encoder and decoder. Generator G2. The architecture of G2 is similar to that of G1. G2 is also a U-Net-like architecture. Different to G1, G2 aims to learn shallow features, so both of the encoder and decoder have only three residual blocks and the fully connected layer between them is removed. Besides, skip connections are also adopted in G2. Discriminator D. Discriminator is a fully convolutional network. It has four residual blocks, which has the same architecture as that of G1, except for the last block, the second layer of which is replaced by a sigmoid unit. Improvements. In this paper, we improved the traditional pose guided image generation [9] by training the G1 and G2 simultaneously, which are separately trained in traditional method. Thus, the loss function will be different and the training time will decrease. Now, we analyze the loss functions as follows: Loss Functions. We first give the loss function of discriminator. The discriminator should distinguish fake pairs and real pairs. Thus, the loss function of D can be formulated as Eq. 1, LD ¼ Lbce ðDðIi ; Ij Þ; 1Þ þ Lbce ðDðIi ; GðIi ; ^Ij ÞÞ; 0Þ;

ð1Þ

444

Y. Zhang et al.

where Lbce denotes binary cross-entropy loss, D denotes the discriminator, G is output of G2. Similarity, the function of real-like loss can be described by Eq. 2, Lreallike ¼ Lbce ðDðIi ; GðIi ; ^Ij ÞÞ; 1Þ;

ð2Þ

where G is the output of G2. For generators, besides real-like loss, we should take absolute loss into consideration. And to make generators focus more on region of body rather than background, we set the proportion of their loss as 2:1. Thus, the loss function of G1 can be described as,

LG1 ¼ Lreallike þ k ð^Ij  Ij Þ  ð1 þ Mj Þ 1 ;

ð3Þ

Where the symbol  means pixels-wise multiplication. Mj is a pose mask with 1 for body region and 0 for background region, k denotes the proportion between real-like loss and absolute loss. Be similar to G1, the formulation of G2 loss can be described in Eq. 4,

LG2 ¼ Lreallike þ k ðGðIi ; ^Ij Þ  Ii Þ  ð1 þ Mj Þ 1 ;

3.3

ð4Þ

Re-id with Deep Learning Model

We use ResNet-50 [11] as our person re-id feature learning model. As Fig. 1 shows, we obtain a view-and-pose-insensitive representation via fusing features learned from 8 multi-view and uniform-pose based images and the source image. Specifically, we obtain representations both for the query image and testing image. Finally, the similarity of them can be calculated by Euclidean distance.

4 Experiments We experiment our method on two popular datasets: Market-1501 [15], DukeMTMCreID [12]. We show qualitative and quantitative results of these datasets, and compare our framework with recent methods. 4.1

Qualitative Results

Figure 4 shows samples of generated images of our method on the two datasets. Specifically, row 1, 2 are representative samples of Market-1501, DukeMTMC- reID, respectively. While column 1 shows the source image and column 2–9 are generated images. We can conclude from the qualitative results that our MVPA method can effectively face the problem of pose variation by synthesizing identity- invariant images with target poses.

Multi-view Based Pose Alignment Method for Person Re-identification Conditional Image

445

Generated Images

Market1501

DukeMT MC-reID

Fig. 4. Samples of generated images of our proposed MVPA method.

4.2

Quantitative Results

We further calculate quantitative results of MVPA using two evaluation metrics, i.e, Rank accuracy, mAP (mean Average Precision), which are widely used in person re-id domain. We show Single-query and Multi-query results for Market- 1501, only Singlequery for DukeMTMC-reID. We simply compare results on supervised learning.

Table 1. Results of re-id. “SQ”: Single-query. “MQ”: Multi-query. “-”: No reported result available. Red numbers show the best result overall. Bold numbers show our method’s results.

Datasets Market-1501(SQ) Market-1501(MQ) DukeMTMC-reID Metric(%) Rank-1 mAP Rank-1 mAP Rank-1 mAP IDE+ML [5] 81.6 71.4 86.8 79.8 OGSL [6] 87.1 70.2 76.4 63.7 EFE [3] 87.7 71.1 93.3 79.3 75.7 58.2 DPFL [2] 88.6 72.6 92.2 80.4 79.2 60.6 LSRO [16] 78.1 56.2 85.1 68.5 DSA [13] 84.3 64.7 70.7 51.9 HA-CNN [7] 91.2 75.7 93.8 82.8 80.5 63.8 Basel. 73.1 60.3 79.7 65.9 65.6 47.7 MVPA(Ours) 90.3 75.5 94.6 83.5 81.2 67.9

Comparison Baseline with MVPA. We show results of baseline and MVPA method as last two rows in Table 1. The baseline method is used as single-view based generation image for representation. Then MPPT is not used. While our MVPA method using multi-view based generation image, which beat baseline by 17.2% at rank-1 and 15.2% at mAP in single-query of Market-1501. It can be concluded that our method can properly face the problem of viewpoint change and pose variation.

446

Y. Zhang et al.

Comparison MVPA with Recent Methods. The first two rows of Table 1 are methods based on triplet loss. The two rows in the middle are results of discriminative feature learning method based methods. While the subsequent three methods aim at problem of pose variation. We observe clearly that methods solving problem of pose variation have a slight edge over other methods, on average. It implies that our proposed method has solved the critical problem of person re-id. Moreover, MVPA outperforms a little inferiorly than HA-CNN [7] in single-query of Market-1501, while in other results we exceed HA-CNN and outperforms the best overall, instead. Compared to Market-1501, DukeMTMC- reID has more viewpoint changes, both in background and person, since images are sampled from 8 synchronous cameras, which is more practical in real world. We can conclude that our method has a more powerful ability to handle the problem of pose variation and viewpoint change.

5 Conclusion We propose a multi-view based pose alignment method for person re-id. We address both the problems of pose variation and viewpoint change by synthesize uniform-pose based images in 8 different viewpoints. To speed up the training time, we change the training mode and update the loss functions of the traditional image generation model. Compared to other person re-id methods which use single-pose based image for matching, our method not only handle the problem of pose variation, but also solve the challenge of viewpoint change by fusing multi-view and uniform-pose based images with the source image. Experiments on two popular datasets of re-id show that our method can properly face the problem of pose variation and viewpoint change.

References 1. Cao Z, Simon T, Wei S-E, Sheikh Y (2017) Realtime multi-person 2D pose estimation using part affinity fields. In: Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR), pp 7291–7299 2. Chen Y, Zhu X, Gong S (2017) Person re-identification by deep learning multi-scale representations. In: Proceedings of the IEEE international conference on computer vision, pp 2590–2600 3. Gong A, Qiu Q, Sapiro G (2018) Virtual cnn branching: efficient feature ensemble for person re-identification. arXiv preprint arXiv:1803.05872 4. Goodfellow IJ, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial networks. In: Proceedings of advances in neural information processing systems (NIPS), vol 3, pp 2672–2680 5. Hermans A, Beyer L, Leibe B (2017) In defense of the triplet loss for person reidentification. arXiv preprint arXiv:1703.07737 6. Jiang N, Liu J, Sun C, Wang Y, Zhou Z, Wu W (2018) Orientation-guided similarity learning for person re-identification. In: 2018 24th international conference on pattern recognition (ICPR). IEEE, pp 2056–2061

Multi-view Based Pose Alignment Method for Person Re-identification

447

7. Li W, Zhu X, Gong S (2018) Harmonious attention network for person re-identification. In: Proceedings of the IEEE conference on computer vision and pattern recognition (CVPR), pp 2285–2294 8. Lv J, Wang X (2018) Cross-dataset person re-identification using similarity pre-served generative adversarial networks. In: Proceedings of international conference on knowledge science, engineering and management (KSEM). Springer, pp 171–183 9. Ma L, Jia X, Sun Q, Schiele B, Tuytelaars T, Van Gool L (2017) Pose guided person image generation. In: Proceedings of advances in neural information processing systems (NIPS), pp 406–416 10. Plantinga A (1961) Things and persons. Rev Metaphys 14:493–519 11. Radford A, Metz L, Chintala S (2015) Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434, pp 1–16 12. Ristani E, Solera F, Zou R, Cucchiara R, Tomasi C (2016) Performance measures and a data set for multi-target, multi-camera tracking. In: Proceedings of European conference on computer vision (ECCV), pp 17–35 13. Zhang Z, Lan C, Zeng W, Chen Z (2018) Densely semantically aligned person reidentification. arXiv preprint arXiv:1812.08967 14. Zheng L, Huang Y, Lu H, Yang Y (2017) Pose invariant embedding for deep person reidentification. arXiv preprint arXiv:1701.07732, pp 1–10 15. Zheng L, Shen L, Tian L, Wang S, Wang J, Tian Q (2015) Scalable person re-identification: a benchmark. In: Proceedings of the IEEE international conference on computer vision (ICCV), pp 1116–1124 16. Zheng Z, Zheng L, Yang Y (2017) Unlabeled samples generated by GAN improve the person re-identification baseline in vitro. In: Proceedings of the IEEE international conference on computer vision (ICCV), pp 3754–3762

A Novel Contribution Graph Based Likert Scale Method and Its Application to Real-Time Alarm Evaluation Qun-Xiong Zhu1,2, Rui Ding1,2, Yan-Lin He1,2(&), and Yuan Xu1,2(&) 1 College of Information Science and Technology, Beijing University of Chemical Technology, Beijing 100029, China {heyl,xuyuan}@mail.buct.edu.cn 2 Engineering Research Centre of Intelligent PSE, Ministry of Education of China, Beijing 100029, China

Abstract. In the complex process industry, alarm management plays a very important role in industrial safety production. In a traditional alarm system, alarm flooding occurs frequently due to a large number of single-variable threshold alarms, which seriously affects the operator’s judgment on the order of alarm processing. For timely processing of alarms, the division of alarm priority is very important. In order to solve this problem, a novel method using Principal Component Analysis (PCA) contribution graph based Likert scale is proposed for online division of the priority of alarm variables. Different from the traditional Likert scale method, the method proposed in this paper can analyze the influence degree of each variable on the stability of the system and prioritize the alarm variables in real time. In addition, key alarm information among redundant alarms can be exactly extracted. The effectiveness of the method is verified by the Tennessee Eastman Process (TEP). Keywords: Industrial safety  Alarm management Likert scale  Contribution plot analysis

 Alarm priority 

1 Introduction In complex process industries, the alarm system is an important protective layer for production safety. The performance of alarm systems directly affects production safety, product quality and product expense. According to the Abnormal Situation Management (ASM) statistical results, the process industry loses billions of dollars due to accidental parking every year. At the same time, the emergence of a major accident will be accompanied by a large number of false alarms. The key reason for the above problems is that the number of alarms is too large, far exceeding the ability of operators to handle alarms. This problem is called as “alarm flooding”. There are some complex features in modern complex process industries, such as large-scale uncertainty, strong correlation, high nonlinearity, and so on. When a malfunction occurs in one part of the system, the fault will propagate along the path of the process, causing a great number of alarms in other parts in an instant, causing ‘alarm flooding’. This situation can cause the © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 448–455, 2020. https://doi.org/10.1007/978-981-32-9050-1_51

A Novel Contribution Graph Based Likert Scale Method and Its Application

449

operator’s attention to be distracted. To solve the above problems, alarm variables can be ranked by prioritization, and the key variables are processed centrally. Currently, according to The Engineering Equipment and Materials Users’ Association (EEMUA) standard, there are two criteria for prioritization criteria: the severity of the incident and the time where the alarm is processed. Ahmed and Chang [1] proposes an imploded model that includes event occurrence probability (P), potential event impact (I), and process safety time (t) to order alarms. Although the method considers the prioritization criteria, the assessment of the severity of the consequences and the time available for the alarm is very subjective. Zhang [2] based on the key alarm grouping and suppression strategy of process data made a detailed scoring rule on the severity of the consequences to achieve alarm priority division; Zhao et al. [3] divided the priorities based on the combination of response time and consequence level matrix. The above methods divided the alarm variables by adding the impact factor to combine the severity of the aftermath with available time, but the method of division is relatively subjective. Zhu and Geng [4] uses the fuzzy clustering algorithm and deference driving decision algorithm sort alarm variables. Foong et al. [5] proposed to develop and apply Mamdani’s system inference engine to divide alarms priority. This method has been widely used to System and problem analysis in numerous fields. Gao et al. [6] quantified the alarm variables based on the interpretation structure model and the Likert scale method; however, only the number of alarms as a scoring criterion cannot reasonably indicate the degree of influence of each variable on the whole system, and the priority order cannot be adjusted as faults change. The traditional prioritization calculation method model is inaccurate and cannot be prioritized in real time. In order to resolve this problem, a novel method using Principal Component Analysis (PCA) contribution graph based Likert scale is proposed for online division of the priority of alarm variables. The method proposed in this paper can analyze the influence degree of each variable on the stability of the system, and analyze alarm variables in real time. The remaining sections of this paper are organized as follows: Sect. 2 introduces the traditional Likert scale analysis method and PCA contribution graph; Sect. 3 introduces the real-time alarm variable evaluation method based on the contribution graph and the Likert scale proposed in this paper; Sect. 4 carries out the Tennessee Eastman Process (TEP) simulation as a research case to validate the effectiveness and practicability of the proposed method; Sect. 5 summarizes the full text.

2 Preliminary Methods 2.1

Based on the Traditional Likert Scale Prioritization

Likert scale is also called Score plus total scale. American social psychologist Likert first proposed this method in 1932. The Likert scale Use Relativ Importance Index (RII) to help with statistics analysis. Since the Likert table method can quantify the subjective experience, the alarm priority can be combined with the Likert scale and RII. The traditional Revised Likert Scale (RLS) uses true historical data to determine the score of various properties, and the corresponding index is used to prioritize the alarm

450

Q.-X. Zhu et al.

variables. Before the RLS is established, two points need to be explained: First, the scoring criteria are based on the Alarm frequency per unit time; Second, the number of alarms at each level is pre-divided according to the distribution ratio of EEMUA. That is, low, intermediate, and advanced alarm variables account for 80%, 15%, and 5% of the total variables, respectively [6]. 2.2

Traditional PCA Contribution Graph

Traditional PCA is a data-driven dimension reduction method. In data processing, the data variances are the main direction, and the small variance is the noise direction. By maximizing the variances, the data’s original information is preserved while reducing he dimensions of the data. Assuming the original data X 2 Rij , where j is the number of variables, and i is the number of sample V 2 Rj , the method of calculating the projection matrix of PCA is as shown in Eq. 1: max

vT X T Xv vT v

ð1Þ

Replace the X with the covariance matrix S of the sample according to the Eq. 2, where X obeys the Gaussian distribution: 1 pffiffiffiffiffiffiffiffiffiffiffi X ¼ UV T n1

ð2Þ

The singular value division of the data by Eq. 3 can obtains the variance in all directions of the data, and retains the information of each direction of the original data set X: S¼

1 X T X ¼ VKV T n1

ð3Þ

The information in each direction accounts for the value of the main diagonal in K, arrange the values on the main diagonal of K in descending order. Then obtained information of the Kth principal is greater than the ðK þ 1Þth principal. Normally, the PCA method selects a variable that retains 90% information of the original data as a reconstructed principal component by Eq. 4: T ¼ XPa

ð4Þ

Where Pa is the loading matrix Pa 2 Pam , and a is the number of principle variable, n-a is the number of residual variables According to the PCA theory, in the case of a fault occurred in the process system, the T2 statistic calculated by the score matrix T generates an outlier. PCA can only be used for fault detection and cannot be effectively analyzed for the root cause of the fault. The 2D contribution graph [7] can analyze the influence of each dimension variable in X on the scoring matrix T on the basis of PCA. It is presumed that the

A Novel Contribution Graph Based Likert Scale Method and Its Application

451

scoring matrix T and the observed value x are obtained. At each moment, the variable is for the total score T. The contribution value is calculated by Eq. 5: (t P X ; if dt2 Pm;n Xn [ 0 d2n n;m n n conðm; nÞ ¼ 0; if t P X \0 d2n

m;n

ð5Þ

n

Where Tm is the mth principal element variable, d2m is the variance of Tm , Pn;m is the ðm; nÞth element of the projection matrix. Throughout the process, the contribution of the raw data Xm to the overall process is shown in Eq. 6: CONT ðnÞ ¼

Xa i¼1

conðm; nÞ

ð6Þ

Different from the traditional 1D contribution graph analysis, the 2D- contribution graph analysis can not only determine the degree of influence of each variable in the overall fault, but also intuitively observe which variables are affected by the stability of the system at different moments. The study of 2D contribution graphs has significant applications for the development of fault diagnosis.

3 The Proposed Method Based on the traditional Likert scale analysis, only the number of alarms per unit time in the historical data is used as the scoring criterion of the Likert scale, and it is impossible to deeply evaluate the actual importance of each variable of the entire system unit. And through the prioritization of historical data, only a fixed priority

Process data(s(t))

PCA-based 2D contribution graph N Alarm generation Y Revised Likert Scale for Alarm Prioritization Output:Final Alarm priority

Fig. 1. Online updates flow chart.

452

Q.-X. Zhu et al.

variable can be obtained. When the root source of the alarm is changed, the importance and priority of each variable are bound to change, so the variable cannot be used only by the historical data and the number of alarms. Dynamic adjustments result in inaccurate analysis of alarm information, which is not conducive to industrial safety. As shown in Fig. 1, the method proposed in this section will be based on the combination of Likert scale and PCA contribution, real-time prioritization of alarm variables. 3.1

Filter Based on Contribution

The traditional PCA-based 2D contribution graph only considers the influence of each variable on the whole system, and ignores the influence of multivariate on the system, making it impossible to distinguish key root variables. This paper adds 3 sigma filtering to the 2D contribution graph to enhance the system’s analysis of key variables. The corresponding score matrix Tnew and the contribution degree conz can be obtained by calculating the original data set X by the Eqs. 4 and 5. Due to the affect of the extent of change of each variable on the system, in order to make each variable represent its own proportion of change, perform the screening as in Eq. 7:  conzðm; nÞ ¼

1; if conzðm; nÞ  3d2 0; if conzðm; nÞ \ 3d2

ð7Þ

where d2m represents the variance of the sequence of contribution rate of each variable under the nth sampling point. By formula 7, it is possible to screen out variables that have a greater impact on the system. Then recalculate the contribution of distinct variables to the overall system failure by Eq. 8 for analysis: CONZ ðnÞ ¼

Xa i¼1

conzðm; nÞ

ð8Þ

The analysis of the change rate contribution graph proposed in this paper can sharply capture the variables that are more critical to the impact of the entire system. Firstly, the method excludes the variables of the cooperative change to reduce the data interference of the analysis, and the second aspect can simultaneously pay attention to the influence of different variables on the stability of the system at different times. 3.2

Dynamic Likert Scale

Revised Likert scale (RLS) is a collaborative summary score format for surveys. Respondents typically use rankings from high to low depending on quality or performance. Using the contribution of each variable as a scoring basis can not only consider the degree of effect of different variables on the system, but also dynamically adjust the variable priority according to system changes. The dynamic RLS establishment steps are as follows: 1. Setting the Likert table grade L according to the particular situation, and the relevant scale takes the integer value 1 to L.

A Novel Contribution Graph Based Likert Scale Method and Its Application

453

2. Rate each variable proportionally based on the contribution level obtained at each moment. 3. For each variable, use the sliding window to take the first 100 sampling points at the current time and count the frequency of different scores under the current sliding window of different variables. 4. Based on the results of the third step, use Eq. 9. to calculate the ultimate score for each variable: P MSm ¼

fml  dl ; ð0  MSi  L; m ¼ 1; 2; . . .N Þ L

ð9Þ

Where MSi indicates the average score of properties m, dj indicates the score of each sample, f ml represents the frequency of the attribute m scored as dl , L represents the data length. 5. Normalize the current time score MSi using Eq. 10: Zm ¼

MSm  l d

ð10Þ

According to the EEMUA standard, the percentages of low, medium and high variables are separately 80%, 15%, 5%. When the data is too positive, the threshold of the corresponding ratio is 0:8r and 1:5r. That is, the score is less than 0:8r for the C-level alarm; Score is greater than 0:8r and less than 1:5r is a B-level alarm; greater than 1:5r is an A-level alarm variable. The dynamic Likert scale score proposed in this paper can reasonably divide the priority of each variable on the basis of the contribution graph analysis when the fault occurs. On the other hand, when the system has distinct faults, the method can dynamically adjust the priority of each variable.

4 Case Study The Tennessee Eastman Process which is created by the Eastman Chemical Company aim to evaluating process control and process monitoring. In the TE process, XMEAS (1–41) are 41 observed variables, XMV (1–11) are 11 control variables, and a total of 52 variables are used for fault analysis. In the standard TE data set, the normal data set has a total of 500 sampling points, IDV (1–21) is 21 fault data sets, respectively, there are 960 sampling points in each fault condition, and the fault is introduced from the 160th sampling point. In the TE process, XMEAS (1–41) is 41 observed variables, XMV (1–11) is 11 control variables, and a total of 52 variables are used for fault analysis. In the standard TE data set, the normal working condition data set has a total of 500 sampling points, and the IDV (1–21) is 21 fault data sets, each having 960 sampling points, wherein the fault is introduced from the 160th sampling point.

454

Q.-X. Zhu et al.

IDV (1) is a stepwise fault caused by XMEAS (4) to introduce a step change in the overall system. Since XMEAS (4) is the feed ratio of A\C, and XMEAS (1) is the feed of A, therefore there is a strong relationship between the two, there is a compensation mechanism, the variable fluctuations of XMEAS (1) and XMEAS (4) are shown in Fig. 2:

XMEAS(1)

1

0.5

0 0

100

200

300

400

0

100

200

300

400

500

600

700

800

900

1000

500

600

700

800

900

1000

10

XMEAS(4)

9.5 9 8.5 8

Sample Number

Fig. 2. The measured value of XMEAS (1) and XMEAS (4) in IDV (1)

When the fault occurs, the whole process generates a dynamic fault, which gradually stabilizes after the 500th sampling point, and the whole system no longer has dynamic faults. The traditional Likert scale method and the present contribution graphLiKert scale method. The Figs. 3(a) and (b) are the result, respectively. Among them, deep red represents the highest priority variable at the current time; Orange represents the priority second variable; Yellow represents the relatively unimportant variable under the current fault.

(a)

(b)

Fig. 3. Based on the traditional Likert scale prioritization (a) and contribution map Likert scale priority (b)

As can be seen from the analysis in Fig. 3(a), the traditional Likert scale method can get the importance of different variables, but due to the large number of alarms simultaneously, the scores of each variable are very close, resulting in uncertainty and rating. The real-time performance is poor. In contrast to the results of Fig. 2(b), the contribution graph-Likert scale method proposed in this paper effectively captures the correlation and fluctuation of XMEAS (1) and XMEAS (4). At different times, the contribution of each variable is different, so that the variables at different times have different priorities. In addition, the method proposed in this paper has nice Dynamic.

A Novel Contribution Graph Based Likert Scale Method and Its Application

455

In summary, the contribution graph-LiKert scale method proposed in this paper can not only generate alarms to prioritize each variable when multiple alarms occur at the same time, but also have certain auxiliary traceability in single variable alarms effect. For the traditional Likert scale method, when the system state changes, the priority of each variable cannot be adjusted in real time, and the state change of the system variable cannot be known according to the historical alarm amount. The method of this paper has excellent performance in both real-time and rationality.

5 Conclusions Based on previous studies, this paper constructs a dynamic model with more accurate prioritization. First, the traditional 0–1 alarm value is replaced by the value of the contribution, so that the information in the calculation of the priority division is retained more. After that, the model adds 3r2 filtering based on the contribution of traditional PCA, which makes the calculation of contribution more reasonable. Secondly, this paper proposes a method of dynamic prioritization using sliding windows to continuously adjust the variable level according to data and system priority. Compared with the traditional prioritization, the model can analyze the degree of influence of each variable on the stability of the system, and analyze the alarm variables in real time. The validity of the method is proved by TEP. It is of great significance to the alarm management in the actual industry. In addition, because the contribution of PCA cannot accurately deal with nonlinear faults, in later research, the analysis method involving coupling and nonlinear data is the key research content. Acknowledgements. This research is supported by the National Natural Science Foundation of China under Grant Nos. 61573051 and 61473026 and Fundamental Research Funds for the Central Universities under Grant Nos. JD1914 and XK1802-4.

References 1. Chang YJ, Khan FI, Ahmed S (2011) A risk-based approach to design warning system for processing facilities. Process Saf Environ Prot 89(5):310–316 2. Zhang YT, Wang HQ, Cheng GP (2015) Associated alarm grouping and suppression strategy based on process data. Oil Gas Chem Ind 44(5):100–104 (in Chinese) 3. Zhao H (2016) Process alarm rationalization setting method and its application. Chem Autom Instrum 43(11):1208–1210 4. Geng ZQ, Zhu QX, Gu XB (2005) A fuzzy clustering–ranking algorithm and its application for alarm operating optimization in chemical processing. Process Saf Prog 24(1):66–75 5. Foong OM, Sulaiman S (2009) Alarm prioritization system for oil refinery. In: Proceedings of the world congress on engineering and computer science, San Francisco 6. Gao HH, Xu Y, Gu X, Lin X, Zhu QX (2015) Systematic rationalization approach for multivariate correlated alarms based on interpretive structural modeling and likert scale. Chin J Chem Eng 23(12):1987–1996 7. Zhu XX, Braatz R (2014) Two-dimensional contribution map for fault identification. Control Syst IEEE 34(5):72–77

Research on Optimization of Intelligent Assignment of Crane Task Priority Hexu Sun, Pengcheng Wang, and Zhaoming Lei(&) Hebei University of Technology, Tianjin 300130, China [email protected]

Abstract. The collision problem that occurs during the scheduling process of the crane is generally solved by prioritizing In order to intelligently solve the problem of task prioritization in the process of crane scheduling, the task prioritization model is established by using support vector machine (SVM). Aiming at the difficulty of parameter setting in the process of SVM, a dynamic cuckoo search (DCS) algorithm is proposed. The algorithm optimizes the parameter setting of SVM. In order to solve the shortcomings of the cuckoo algorithm, the step size and discovery probability of the standard cuckoo algorithm are improved as the dynamic adaptive step size and dynamic discovery probability. The test function verifies that it has the advantages of fast convergence speed and strong local optimal ability. Finally, the DCS-SVM is used to establish the prioritization model. After experimental verification, the method is proved to be effective, and it can accurately and intelligently solve the priority division problem of the crane scheduling task. Keywords: Priority

 SVM  Cuckoo search algorithm  Dynamic adaptation

1 Introduction The crane, also known as the bridge crane, is an large-scale equipment for steel companies to transport materials. Collision between cranes often occurs during the dispatching process of the overhead crane. Generally, the priority of the mission is used to solve the problem of crane collision. Literature [1] uses the Max-heap method to classify the priority of user privacy protection from a multi-user perspective. The method used is more traditional and simple, mainly considering the efficiency of priority division and the protection of privacy; The literature [2] uses the review level analysis to legally evaluate and prioritize the execution of the project, but it is not possible to quantitatively divide and calculate the priority. In [3], BP neural network is used to construct the classification model of maintenance task priority. Based on the data-driven deep learning method, the priority classification model can be obtained by mining the data, which can better solve the priority classification problem, but the model parameters. For random settings, it is easy to fall into local optimum and still continue to improve. In this paper, the dynamic cuckoo search algorithm (DCS) is used to optimize the initial parameters of SVM, and the DCS-SVM is used to establish the prioritization model of the crane scheduling task, © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 456–464, 2020. https://doi.org/10.1007/978-981-32-9050-1_52

Research on Optimization of Intelligent Assignment of Crane Task Priority

457

and compared with PSO-SVM and SVM classifier. It proves that DCS-SVM has higher accuracy and can effectively solve the problem of prioritization of crane scheduling tasks.

2 Support Vector Machine SVM is a machine learning method based on statistical learning theory proposed by Vapick et al. in the 1990s. It is widely used in solving pattern recognition problems in small sample, nonlinear and high dimensional feature spaces. The basic idea of SVM is to map the input data that is linearly inseparable in the original space to the highdimensional space by using the kernel function, that is, the nonlinear mapping function, so that the optimal classification surface of the input data can be found in the highdimensional space, so that the final result is available. The optimal classification surface function is: f ðxÞ ¼ signð

N X

ai yi Kðx xi Þ þ bÞ

i¼1

ð1Þ

0\ai \C In the formula, ai means the lagrangian multiplier; b 2 R means the judgment threshold that is calculated according to the support vector; C is the penalty factor that is used to control the classification interval and the classification error; KðxTi xÞ represents the kernel function, it is often used to have a polynomial kernel function. In the actual application process, the RBF kernel function has the characteristics of less parameters, nonlinear mapping, fast convergence, etc. Therefore, this paper uses the RBF kernel function, and its expression is:   xi  xj 2 Kðxi ; xj Þ ¼ expð Þ ð2Þ 2r2 Where, r [ 0 is the bandwidth control parameter of the RBF kernel function affects the radial range of the function. The implementation process of SVM is as follows: (1) The training set is T ¼ fðx1 ; y1 Þ; ðx2 ; y2 Þ; . . .; ðxi ; yi Þg, in the formula, i ¼ 1; 2; . . .; N; xi 2 Rd ; yi 2 f1; 1g; (2) Select the kernel function Kðxi ; xj Þ and the penalty factor C to find the dual problem of convex quadratic programming: maxð a

s:t:

N X i¼1

N X i¼1

ai 

N X N 1X ai aj yi yj Kðxi xj ÞÞ 2 i¼1 j¼1

ai yi ¼ 0; ai 2 ½0; C 

ð3Þ

458

H. Sun et al.

 T (3) Find the optimal solution a ¼ a1 ; a2 ; . . .; aN from Eq. (3), select the component of a that is not zero, and calculate the decision threshold by the following formula: b ¼ y j 

N X i¼1

  ai yi K xi  xj

ð4Þ

(4) Based on a and b establish the optimal classification surface function: f ðxÞ ¼ signð

N X i¼1

ai yi Kðx xi Þ þ b Þ

ð5Þ

In the SVM algorithm, two parameters of the penalty factor C and the kernel function bandwidth r need to be determined. Manual adjustment may lead to a decrease in the accuracy of classification results. Therefore, this paper uses the dynamic adaptive cuckoo algorithm to optimize the calculation of two parameters to improve the classification accuracy of the trained model. The SVM was originally designed to solve the two-class problem, but in the actual application process, the binary problem is only part of it, and there are many multiclassification problems. At present, there are two main methods for solving multiclassification problems on using SVM. In experimental applications, Hsu and Lin [4] are verified by experiments on different data sets. Several multi-classification methods are compared. The experimental results show that the one-to-one [5] method in the indirect method works better.

3 Dynamic Cuckoo Search Algorithm 3.1

Cuckoo Search Algorithm

Cuckoo search algorithm (CS) is a new intelligent search algorithm proposed by Yang et al. [6] in 2009. There are three hypotheses: (1) Each bird randomly places the unique egg produced in a host nest; (2) The nest containing the finest eggs will be preserved to the next generation; (3) The number of nests that can lay eggs is fixed, and the overview of bird eggs found by the host is Pa 2 ½0; 1. When discovered by the host, the host may choose to abandon the bird eggs or rebuild the nest. The cuckoo nest position update formula under three assumptions is: xti þ 1 ¼ xti þ d  LevyðbÞ

ð6Þ

In the formula, xti is the position of the i nest selected by the algorithm in the t iteration; d the amount of step control used to control the size of the step movement, usually expressed by the formula d ¼ d0 ðxti  xbest Þ, where d0 is a constant, generally

Research on Optimization of Intelligent Assignment of Crane Task Priority

459

d0 ¼ 0:01, which xbest is the current optimal solution;  represents point-to-point multiplication; LevyðbÞ represents the walking step that obeys the levi distribution, and its expression is: LevyðbÞ ¼

/ l jvj1=b

; 1\b\3

ð7Þ

Where, l; v subject to the standard normal distribution, i.e. l  Nð0; 1Þ; v  Nð0; 1Þ; the parameter b ¼ 1:5, / obtained by the formula (3.26): 0 /¼

1b1 Cð1 þ bÞ sinðpb=2Þ @ A C½ð1 þ bÞ=2b 2

b1 2

ð8Þ

In the formula, C is a standard Gamma function. 3.2

Dynamic Cuckoo Search Algorithm

It is known through experiments that the accuracy of the CS algorithm needs to increase the number of nests. The disadvantage of this method is that the convergence speed of the algorithm will decrease. At the same time, the CS algorithm is also easy to fall into local optimum, resulting in inaccurate optimization results. Aiming at the above problems, this paper improves the cuckoo algorithm, and adopts two methods, namely dynamic adaptive step size and dynamic adaptive discovery probability, to improve the convergence speed of the algorithm, the ability to jump out of local optimum and the precision of optimization. Dynamic Adaptive Step Size. Through the research and analysis of the algorithm, it is found that the random update step size of Levi’s flight strategy can’t better guide the population to the direction of the optimal solution. Therefore, this paper changes the random step size to the dynamic adaptive step size, which is expressed as: g ¼ gmin þ hðgmax  gmin Þ tc h¼1 tmax

ð9Þ

Where, g is the decision parameter for the levi flight step; gmax ; gmin is the range variable, which represents the maximum and minimum values of the parameter; h is the control parameter related to the number of iterations, which represents the current iteration number and maximum the number of iterations. According to the analysis, Eq. (9) can change the step control factor of levi flight in the interval ½tc ; tmax  due to the existence of control parameters h. As the number of iterations increases, the value of g gradually decreases, thus adjusting the movement of levi flying. The distance makes the algorithm adaptive.

460

H. Sun et al.

Dynamic Adaptive Discovery Probability. The size of Pa affects the diversity of the population in the iterative process, the convergence speed of the algorithm, and the optimization precision. The fixed size cannot respond differently according to the change of the number of iterations. Therefore, the probability of finding the fixed value is changed to dynamic. Adapt to the discovery probability, expressed as: Pda ¼ Pa;max sin



 p Tc  1  þ Pa;min 2 Tmax  1

ð10Þ

In the formula, Tc ; Tmax represents the current iteration number and the maximum number of iterations respectively; Pa;max ; Pa;min is the range control parameters respectively represented by the range of Pa are gradually increased when the number of iterations gradually increases, because the sinusoidal increment strategy in the equation is nonlinear growth, and the value in the previous period is small. It can guarantee the update frequency of the bird’s nest in the iterative process of the algorithm, maintain the diversity of the population, perform fast search iteration, and speed up the convergence speed of the algorithm. In the later stage, the value is large and the variation range is small, which can ensure that the population has a fixed update frequency, but not too fast, to ensure the local optimization accuracy of the algorithm, improve search efficiency, and quickly get the optimal solution.

4 Dynamic Cuckoo Algorithm Optimizes Support Vector Machine The SVM algorithm needs to determine the parameters ðC; rÞ. If the parameters are improperly selected, the classification results will be inaccurate. Therefore, this paper uses DCS to optimize the parameters ðC; rÞ of the SVM, and iteratively updates the parameters as the nest position of the DCS, and uses the classification accuracy as the fitness function. In summary, the steps of DCS-SVM is as follows: (1) Initialization algorithm parameters: population size setting, total iteration number, solution dimension, probability of the host discovering the bird’s egg, range of the solution, whether it falls into the local optimal judgment variable, etc.; then initialize the above-mentioned set population size in a random manner N nest location: X ¼ ðx1 ; x2 ; . . .; xn ÞT ; (2) Calculating the fitness value and record the current optimal solution: Solve the fitness value of the individual in the population through the objective function, select the optimal fitness value after the calculation is completed, and record the position of the optimal individual; (3) Updating other nest locations with dynamic adaptive step sizes; (4) Using the objective function to solve the fitness value of the newly produced individual, and compare the fitness values of the new and old nests. If the fitness value of the newly generated nest is better than the previous generation, replace the old individual with the new one;

Research on Optimization of Intelligent Assignment of Crane Task Priority

461

(5) Generating a uniformly distributed random number r (between 0–1) and compare the found probability of the bird’s egg. The calculation formula is calculated using the improved publicity (10), if r [ Pa , a new solution is generated for the discovered bird egg replacement; (6) Solving the fitness value of the entire population, select the global optimal value, and record its location; (7) The number of iterations or the solution precision is judged. If the corresponding conditions are met, the iteration is stopped, the obtained global optimal solution is output, the training samples are trained, and the classifier is constructed; otherwise, the Step 3–Step 6 steps are repeated.

5 Case Analysis 5.1

Data Processing

Based on the investigation and analysis of the actual crane scheduling plan of a steel company in Hebei, this paper summarizes the six factors that have an impact on the crane lifting task. They are: total amount of goods, profit contribution rate, remaining scheduling time, deferred usage time, task execution time, and number of task execution steps, wherein the remaining scheduling time, deferred usage time, task execution time, and task execution steps are prioritized. The effect of the level is negatively correlated, so the reciprocal is used. The input space is multi-dimensional data, and there are differences in dimension and magnitude between different dimension data. Therefore, the input data is normalized by min-max method, and the formula is: x0 ¼

x  xmin ; x0 2 ½0; 1 xmax  xmin

ð11Þ

In this paper, 150 sets of crane scheduling data of Hebei iron and steel enterprises in recent years were selected as training data. Among them, the priority was divided into 3 levels, and each level of data was 50. Table 1 shows 10 pieces of data after data preprocessing. S1  S6 represent the Total amount of goods, profit contribution rate, purchase frequency, cooperation cycle, task execution time, number of task execution steps. Experiments were carried out using the parameters obtained by the optimization, and the classification prediction results of the test samples were randomly selected as shown in Figs. 1, 2 and 3. The classification prediction results of DCS-SVM, PSOSVM and SVM models are respectively indicated. According to the preliminary classification results, Figs. 1, 2 and 3 shows that among the 50 test sample data, the prediction number of DCS-SVM is 47, the prediction accuracy is 94%, and the prediction accuracy of PSO-SVM is 45. The prediction accuracy rate is 90%, while the fixed parameter SVM model has only 42 correct predictions and the prediction accuracy rate is 84%, as shown in Table 1.

H. Sun et al.

Priority

3

2 Actual type Classification 1

0

5

10

15

20 25 30 Test sample number

35

40

45

50

Fig. 1. DCS-SVM priority prediction classification result

Priority

3

2 Actual type Classification 1

0

5

10

15

20 25 30 Test sample number

35

40

45

50

Fig. 2. PSO-SVM priority prediction classification result

3

Priority

462

2

Actual type Classification 1

0

5

10

15

20 25 30 Test sample number

35

40

45

50

Fig. 3. SVM priority prediction classification result

Research on Optimization of Intelligent Assignment of Crane Task Priority

463

Table 1. 10 normalized sample data No. 1 2 3 4 5 6 7 8 9 10

S1 0.84 0.81 0.66 0.49 0.76 0.89 0.54 0.73 0.80 0.88

S2 0.89 0.84 0.65 0.44 0.81 0.91 0.51 0.73 0.75 0.92

S3 0.64 0.51 0.29 0.13 0.56 1.00 0.17 0.40 0.62 0.61

S4 0.67 0.37 0.21 0.10 0.42 0.77 0.14 0.32 0.40 0.47

S5 0.52 0.35 0.23 0.12 0.36 0.55 0.17 0.34 0.40 0.47

S6 0.87 0.46 0.23 0.12 0.47 0.89 0.11 0.35 0.72 0.59

Priority 3 2 1 1 2 3 1 2 3 3

Table 2 shows the parameters obtained by the optimization of the CS algorithm and the PSO algorithm and the model parameters of the three models of the parameters originally set by the SVM.

Table 2. Comparison of three model parameters. Optimization model C r DCS-SVM 65.44 0.071 PSO-SVM 13.28 0.53 SVM 1 0.17

After performing a 3-fold cross-experimental verification on the sample data, the obtained three-time classification accuracy rate is arithmetically averaged, and the results are shown in Table 3.

Table 3. 3-fold crossover experiment verification result. Optimization model 1 2 3 DCS-SVM 94% 96% 92% PSO-SVM 90% 88% 90% SVM 84% 86% 86%

Average accuracy 94.0% 89.3% 85.3%

6 Conclusion In order to solve the task priority determination problem in the crane scheduling, this paper establishes the priority division model of DCS optimized SVM model parameters ðC; rÞ, and tests the DCS algorithm with the international common test function. The

464

H. Sun et al.

experiment verifies that the improved algorithm has convergence speed. Fast, jump out of the local optimal ability and other advantages, establish a DCS-SVM model and compare with PSO-SVM, SVM and other models. The experimental results show that the DCS-SVM model can effectively solve the priority division problem of the crane dispatching task and has broad application prospects.

References 1. Wang G, Lu R, Guan YL Achieve privacy-preserving priority classification on patient health data in remote eHealthcare system. IEEE Access. https://doi.org/10.1109/access.2019. 2891775 2. Choi JS (2015) Improvements of efficiency of analytical hierarchy process (AHP) for project priority in international rural development 27(1):7–14 3. Lv X, Fan BX, Yin J, Wang XW (2014) a priority classification method for maintenance tasks based on BP neural network. Comput. Eng. Appl. 50(24):250–254 4. Hsu CW, Lin CJ (2002) A comparison of methods for multiclass support vector machines. IEEE Trans Neural Netw 13(2):415–425 5. Scholkopf B, Burges CJC, Smola AJ (1999) Advances in kernel methods: support vector learning. MIT Press, Cambridge, pp 255–268 6. Yang XS, Deb S (2010) Engineering optimization by cuckoo search. Int J Math Model Numer Optimisation 1(4):330–343 7. Hu W, Yang MY (2016) Neural network modeling based on niche cuckoo search algorithm. Comput Simul 33(12):309–313

Optimization of Vehicle Scheduling Within the Steel Enterprises Based on IAGSO Algorithm He-xu Sun, Fan Zhao, and Zhaoming Lei(&) Hebei University of Technology, Tianjin 300000, China [email protected]

Abstract. At present, the vehicles in the steel enterprises of China mainly use the traditional one-to-one transportation of the trucks. The mode, which has low transportation efficiency, high transportation cost and long time to stop at the task node, affects the production process. To solve this, it is proposed to adopt the “trailer-semi-trailer” cycle-to-carry transport mode in the factory, and establishes an integer programming model with the least number of tractors and total logistics cost, and then use the improved Glowworm Swarm Optimization algorithm to solve the model. The adaptive strategy improvement algorithm makes it increase its own search ability, and at the same time introduces the immune mechanism of Immune Algorithm, enhances the ability of the algorithm to jump out of local optimum, and finally tests through examples. The results show that the improved algorithm can quickly find a better scheduling scheme, thus guiding the enterprise to carry out the in-plant transportation reasonably and efficiently. Keywords: Swap trailer transport  Glowworm Swarm Optimization Adaptive strategy  Immune Algorithm



1 Introduction Good vehicle transportation scheduling solution can not only reduce logistics costs but also improve production efficiency. China’s research and application of swap trailer transport are relatively late. The literature [2] gives a detailed explanation of the theoretical basis and operational form of the swap trailer transport, and proposes relevant policies and recommendations that promote the swap trailer transport of China. In order to meet the problem of swap trailer transport under the aging requirements, the literature [3] shows that the optimization of sling tractor scheduling can produce good energy saving and emission reduction effects under the time window requirement. The literature [4] puts forward the swap trailer transport form of using the hanging transportation in the factory, and establishes the scheduling model of the swap trailer transport in the enterprise and the actual performance evaluation system, and proposes the related methods to improve the transportation performance. This paper adopts the summary and analysis of the swap trailer transport schedule of the predecessors, combined with the problems existing in the © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 465–472, 2020. https://doi.org/10.1007/978-981-32-9050-1_53

466

H. Sun et al.

transportation of vehicles in the steel enterprise between the various mission nodes, the use of “tractor-semi-trailer” vehicle circulation in the factory mode.

2 Problem Description and Mathematical Modeling 2.1

Problem Description

The cyclical swap trailer transport scheduling can be described as follows: At the beginning of the dispatch, each transport node has prepared a sufficient number of semi-trailers and the goods that need to be dispatched have been loaded, and the tractors are driven out of the yard to each task node to suspend the semi-trailer. As shown in Fig. 1, A, B, C, D, and E represent a task node, O represents the yard, and the direction of the arrow is the direction of transportation. There are six tasks. At the beginning, the goods that are shipped to other nodes at A, B, C, D and E need to be completed. Then the tractor starts to access a task node from the yard O and is sent to the corresponding unloading task node after assembling the semi-trailer, and then continues to complete other transportation tasks. If the existing vehicle cannot complete the transportation of all tasks within the specified time, other vehicles are dispatched from the yard to ensure the smooth completion of the mission, requiring minimum dispatch and minimum mission cost.

B

C A

E

O D

Fig. 1. Schematic diagram of the problem of swap trailer transport in the factory

The task time window is defined as a hybrid time constraint, and the tractor is required to reach its task loading node before the latest start time of the specified task. The tractor can arrive at the task loading node earlier than the earliest start time required by the mission but must pay some penalty fee. 2.2

Mathematical Model

According to the above assumptions and descriptions, the construction of the swap trailer transport scheduling model and constraints are as follows:

Optimization of Vehicle Scheduling Within the Steel Enterprises

( min P ¼ min

C P n P n P

minfC g ) M P lc dij Xijc þ w maxðETm þ tZm a  RZm ; 0Þ

c¼1 i¼0 j¼0 C P

467

ð1Þ

m¼1

ymc ¼ 1

ð2Þ

ðc ¼ 1; 2; . . .; CÞ

c¼1 C P

ymc pm þ g  Qc

ð3Þ

ðc ¼ 1; 2; . . .; CÞ

c¼1 n P

Xojc ¼ 1

ðc ¼ 1; 2; . . .; CÞ

ð4Þ

j¼0 n P

Xjkc 

j¼0

n P

Xkic

ðk ¼ 1; 2; . . .; n; c ¼ 1; 2; . . .; CÞ

ð5Þ

i¼0 n P

Xioc

ðc ¼ 1; 2; . . .; CÞ

ð6Þ

i¼0

tm  PdZvm Xmy þ 2ts 2c mc

ðm ¼ 1; 2; . . .; MÞ

ð7Þ

c2V

tmf ¼ tmk þ tm tmk  LTm tc;h þ 1;k  tc;h;f

ðm ¼ 1; 2; . . .; MÞ

ð8Þ

ðm ¼ 1; 2; . . .; MÞ

ðc ¼ 1; 2; . . .; C; h ¼ 1; 2; . . .;

ð9Þ M P

ymc  1Þ

ð10Þ

m¼1

M is the number of tasks in a certain period of time; pm is traffic of task m; Zm ; Xm respectively indicate the loading point and unloading point of task m; C is the number of tractors; Qc is trailer quality of tractor c; g is Alignment quality of semi-trailer; dij is the distance between task nodes i and j, i 6¼ j; dii ¼ 0; dij ¼ dji ; doj is the distance between task nodes i and parking lot; tia is the average loading and unloading waiting time of the vehicle at task node i; ts is working hours of swap trailer transport; RZm is the time when the tractor arrives at the loading point of the task m; tmk is the start time of task m, that is, the time when the tractor starts to haul the semi-trailer at Zm ; tmf is the end time of task m, that is, the time when the tractor is hanging under the Xm ; tm is task duration; tc;n;k is the tractor c at the beginning of the n th mission; tc;n;f is the end of the n th mission; ½ETm ; LTm  is indicates the time window at which task m begins; v1c is the average speed of the factory when the tractor is empty; v2c is average speed in the factory when the tractor is loaded; w is penalty factor; l1c is tractor c no-load transportation cost coefficient; l2c is tractor c load transportation cost coefficient; pm  0 and is an integer. lc is the different transportation cost factor when no-load load, l1c indicates the cost of no load, l2c indicates the cost of the load.

468

H. Sun et al.

Decision variables:  Xijc ¼  ymc ¼

1 0

1 0

tractor c directly from i to j else task m is completed by tractorc else

The objective function (1) consists of two parts, requiring the minimum number of vehicles and total cost. Constraint (2) means that each task can only be completed by its corresponding tractor. The constraint (3) means that the tractor cannot be towed beyond the limit, and the constraint (4–6) means that the tractor is departed from the yard and finally returns, the constraint (7) is the continuous constraint of the task, the constraint (8) is the end time of the task, the constraint (9) is the time window constraint of the task start, constraint (10) requires the tractor to proceed to the next task after completing a task.

3 Adaptive Glowworm Swarm Optimization Algorithm Based on Immune Mechanism 3.1

Adaptive Strategy

We propose Glowworm Swarm Optimization [5] algorithm with adaptive mechanism. In the early iteration period, the step size is appropriately increased. As the number of iterations increases, the individual’s moving step size is reduced by the neighborhood density. The individual neighborhood density and moving step size formulas are: densityti

jNi ðtÞj p  rdi2

sti þ 1 ¼ sti þ densityti  sti 

ð11Þ nt  jNi ðtÞj p  rdi2

ð12Þ

densityti is the neighborhood density of the individual i in the t th generation. 3.2

Immune Mechanism

Immune Algorithm which can not only maintain the scale of excellent antibodies but also prevent the lack of diversity of antibody populations [6]. The matching relationship between the objective function and the solution represented by the individual is represented by affinity, and the calculation formula of the affinity magnitude is as shown in the formula (13). The excellent individuals in the iterative process are stored through the memory retention mechanism to ensure that excellent individuals always exist and avoid population degradation. Through the concentration adjustment mechanism to increase the diversity of the population, inhibit

Optimization of Vehicle Scheduling Within the Steel Enterprises

469

the high-compatibility and high-concentration individuals while ensuring the presence of high-complexity and low-concentration individuals, and the low-compatibility and low-concentration individuals will not disappear and exist in a small amount. The vector moment based method of (14) calculates the antibody concentration. The probability selection formula shown in Eq. (15) is used to suppress individuals with high fitness and high concentration to enhance population diversity. In order to increase population diversity while preventing population degradation, individuals were vaccinated using formula (16): gðxi Þ ¼ af ðxi Þ þ ð1  aÞd ðxi Þ M  P 

d ð xi Þ ¼

ð13Þ

  f ð xi Þ  f xj 

j¼1 M P M  P 

  f ð xi Þ  f x j 

; i ¼ 1; 2;    ; M:

ð14Þ

i¼1 j¼1

PðiÞ ¼ a

f ð xi Þ d ðiÞ þ ð 1  aÞ N N P P f ð xi Þ d ðiÞ i¼1

ð15Þ

i¼1

Xi ðtÞ ¼ Xbest þ rand  RðtÞ

ð16Þ

gðxi Þ indicates the affinity value of individual I, d ðxi Þ indicates the concentration of the i-th individual, f ðxi Þ is the fitness function of individual i, a is weight coefficient. Xi indicates the position of the individual i after vaccination, Xbest indicates the vaccine selected from the current vaccine library, RðtÞ represents the search radius of the t th generation of the individual i. Individuals who are vaccinated will be randomly concentrated around the optimal population.

4 Experiment Analysis 4.1

Experimental Parameters and Data

For the convenience of description, the letters A, B, C, D, E, F, G, H, I, J, and K are used to indicate the loading and unloading points of the transportation tasks in the factory, and O is the in-plant parking lot. The detailed data of the tractors and trucks that can be dispatched by the yard are shown in Table 1.

Table 1. Vehicle specific data. Car type Qc ðtÞ v1c ðkm=hÞ v2c ðkm=hÞ l1c ðRMB=kmÞ l2c ðRMB=kmÞ ts ðminÞ Tractor 35 40 15 1.0 2.0 3 Lorry 40 40 20 1.0 2.0

470

H. Sun et al.

If the vehicle type is a truck, the average loading and unloading time of the truck at each mission node is shown in Table 2. Table 2. Average task waiting time for trucks. Task point Average task time (min) Task point Average task time (min) A 20 G 20 B 20 H 30 C 20 I 15 D 25 J 20 E 30 K 25 F 25

The dispatching requirement contains a total of 20 transportation tasks, all of which are required to start within the time window [9:00–10:00]. The loading, unloading point number and volume of each task are given in Table 3. Table 3. Average task waiting time for trucks. Mission 1 2 3 4 5 6 7 8 9 10

Zm A D F F F F F A A J

Xm F F J J I I H J I B

pm 35 27 30 30 26 26 30 32 28 26

Mission 11 12 13 14 15 16 17 18 19 20

Zm J I I C C H H B B K

Xm K G C H H B B K E E

pm 29 34 35 25 25 24 24 30 33 28

Apply the above example data to the established mathematical model, and use the improved firefly optimization algorithm to solve the scheduling model. The initial values of the algorithm are shown in Table 4. The population number N is 50, the maximum number of iterations is 200, and the number of randomly generated individuals is M. The number of inoculated individuals R is 5, and the penalty coefficient in the model is set to 0.6. Table 4. Initial parameter list. q c b nl l0 s 0.4 0.6 0.08 5 5 0.3

Optimization of Vehicle Scheduling Within the Steel Enterprises

471

Run the program 20 times, take the best solution as the final solution. Through the output result of the final solution, the scheduling scheme of the cyclical transport can be obtained. As shown in Table 5, the specific start time and end time of the transport task are shown by Gantt chart 3, wherein the abscissa is the time course, with 8 points The starting point of the abscissa, the ordinate represents the vehicle number (Fig. 2). 5

13

Vehicle number

4

15

9

3

0

19

7

20

8

10

4

20

10

17

18

3

11

1

16

12

2

2

14

1

30

5

40

6

50

60

Time/min

Fig. 2. Gantt chart of the swap trailer transport plan Table 5. Swap trailer transport plan. Vehicle number 1 2 3 4

Driving path O-J-K-E-F-H-AF-I-F-I-O O-D-F-J-F-J-B-O O-A-I-G-B-K-AJ-O O-I-C-H-C-H-BH- B-E-O

Load path (m) 2910

Empty path (m) 1375

Stop time (min) 36

Driving time (min) 20

3600 5365

3870 4790

24 24

23 32

3150

1530

36

19

Taking the tractor 2 as an example to illustrate the driving process of the tractor, the tractor starts from the yard at 8:00 and goes to the mission node D. After the semitrailer is towed, the mission point is reached at 8:11. After unloading the trailer at point F, drag on another trailer ready to arrive at the mission point at 8:19. After the trailer is removed, the mission point F is reached again at 8:23, and the mission point is reached at 8:28 after being towed. After unloading the trailer, drag another trailer ready to arrive at mission point 8 at 8:41. Tractor 2 completed all missions at 8:44 and began to return to the yard. 4.2

Contrast Results

For the in-plant transportation tasks, the comparison of the various indicators of the bicycle scheduling mode and the cyclic suspension scheduling mode is shown in Table 6. As can be seen from the above table, the circulation time-carrying transportation has

472

H. Sun et al.

higher utilization rate and mileage utilization rate. The scheduling of trucks has been greatly improved while the driving cost has been significantly reduced. Table 6. Comparison of transportation methods. Evaluation index Utilization rate of departure time Utilization rate of mileage Driving cost

Truck scheduling 10.93%

Swap trailer transport 44.08%

Increase percentage 33.15%

34.19% 58.97

59.06% 41.62

24.87% −41.69%

5 Conclusion In order to solve the problems of traditional factory vehicle transportation, a swap trailer transport model was established, and combined with a transportation example of a steel company in Hebei, the improved Glowworm Swarm Optimization Algorithm was used to solve the problem. The effectiveness of the proposed swap trailer transport model and the improved algorithm is proved by comparing with the truck scheduling mode and other algorithms.

References 1. Liang F, Liang GQ (2017) Design and simulation of the target location of logistics distribution vehicle scheduling in internet of vehicle. Comput Simul 34(4):377–381 2. Li YR (2004) Semi-trailer swap transport: an effective way to improve road transport efficiency. J Highw Transp Res Dev 04:119–122 3. Li HQ, Zhao WC, Li YR (2016) Trailer pick-up tractor routing problem with timeliness requirement and solving. J Traffic Transp Eng 16(5):95–102 4. Zhang ZY (2013) Research on circulated dropping and pulling transportation and performance applied in large manufacturing enterprise. Chang’an University 5. Wang X, Yang K, Zhou X (2018) Two-stage glowworm swarm optimisation for eco-nomical operation of hydropower station. IET Renew Power Gener 12(9):992–1003 6. Wang Y, Geng X, Zhang F et al (2018) An immune genetic algorithm for multi-echelon inventory cost control of IOT based supply chains. IEEE Access PP(99):1

Research on Wind Power Optimization Scheduling Based on Improved Plant Growth Simulation Algorithm Hexu Sun, Hang Zhang, and Zhaoming Lei(&) Hebei University of Technology, Tianjin 300130, China [email protected]

Abstract. To ensure the safety, stability and economic operation including wind power systems, the system constructed to minimize the operating cost of the spinning reserve capacity optimization target scheduling model. To enhance the computing speed for solving the model, an improved plant growth simulation algorithm is proposed to optimize this model. The reverse learning idea is introduced into the plant growth algorithm, and the growth point is inversely mutated to expand the search space of the algorithm; the intelligent variable step search is adopted and the variation mechanism of the elite set ensures fast optimization and improves the accuracy of the solution. Finally, the example verification is carried out on the IEEE30 bus system. Experimental results show that the proposed model can efficiently solve the wind farm containing spinning reserve capacity optimization scheduling problem, has broad application prospects. Keywords: Wind power system  Optimized scheduling plant growth simulation algorithm Opposition-based learning  Intelligent step change



1 Introduction The optimization of power system with large-scale wind power is one of the research hot spots in the field of new energy power generation and power system optimization [1]. However, the volatility and randomness of wind power output make it difficult for traditional deterministic scheduling schemes to meet the uncertainty requirements brought by wind power. As the size of the unit increases, the traditional accurate algorithm takes a long time to calculate and is prone to “dimensionality disasters” [2]. Around this issue, experts and scholars have concentrated on a large number of indepth research on wind power output uncertainty modeling and unit optimization scheduling. The literature [3] uses the genetic algorithm to solve, but the dependence on the parameters is large. Once the parameters are set improperly, it will have a great influence on the solution results. In this paper, the system standby deviation cost and the abandonment cost brought by wind power uncertainty are taken into account in the total operating cost, and the mathematical model of power system optimization scheduling with wind farm is © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 473–481, 2020. https://doi.org/10.1007/978-981-32-9050-1_54

474

H. Sun et al.

established with the goal of minimum total cost. The traditional simulated plant growth algorithm is improved in the ability to optimize the speed and jump out of the extreme points, and the improved algorithm is used to solve the model.

2 Optimized Scheduling Mathematical Model 2.1

Symbol Description

For ease of description, the introduction of symbols is defined as follows: F is the totally operating cost of the power system; F1 is the conventional unit costs, including operation, start-stop and backup costs; F2 is the abandonment costs; F3 is the alternate deviation costs; I is the number of conventional generator sets; T is the total time periods in the scheduling; fi ðpti Þ is the Power generation cost for the unit during the period t; uti is the start and stop state of the unit during the period t; pti is the active power; D ai ; bi ; ci are the generator fuel cost factor; SU i and Si are the cost and cost of start and stop U D of unit i; di and di are the positive and negative spare cost factors provided to the unit i; D RU i;t and Ri;t are the positive and negative spare capacity of the unit; N is the number of wind turbines; wtn is the abandoned wind power for the first wind turbine during the period t; dn is the abandoned wind cost factor; dtU and dtD are the deviations of the D positive and negative spare capacities during the period t; nU t and nt are the weighting t factor; ew is the wind power prediction error; pn;r is the active power observation; ptn;w is the wind power active power prediction value; W N is the wind farm rated installed capacity; Dt is the total load during time period t; PtL is the total network loss of the system; ridown and riup are the maximum landslide and climbing ability allowed by the active output respectively; pimin and pimax are the upper and lower limits of the unit on off and Ti;t1 are the continuous opening and stopping time of the unit from output; Ti;t1 on off the end to t − 1; Ti;min and Ti;min are the minimum opening and closing time of the unit respectively; M is the maximum number of starts and stops allowed by the unit during the scheduling period; Prfg is the probability operator; b is the confidence level. 2.2

Model Establishment

Establish a mathematical model for optimal scheduling of wind power systems: min F ¼ F1 þ F2 þ F3 F1 ¼

I X T X i¼1 t¼1

ð1Þ

I X T I X T     X   U X   U U D D Si þ uti fi pti þ uti 1  ut1 uit1 1  uti SD i i þ di Ri;t þ di Ri;t i¼1 t¼1

i¼1 t¼1

ð2Þ      2 fi pti ¼ ai þ bi pti þ ci pti

ð3Þ

Research on Wind Power Optimization Scheduling

F2 ¼

N X T X n¼1 t¼1

T X

F3 ¼

t¼1

wtn dn

D D U nU t dt þ nt dt

475

ð4Þ

ð5Þ

ew ¼ ptn;r  ptn;w

ð6Þ

ew  Nðl; rÞ

ð7Þ

1 1 N W r ¼ ptn;w þ 5 50

ð8Þ

Equation (1) is the objective function, including the conventional unit operation and start-stop cost, the abandonment cost and the rotating reserve capacity deviation cost; the formula (2) is the general unit operation total cost; (3) is the unit power generation cost function; formula (4) is the abandonment cost; formula (5) is the rotation reserve deviation cost; formula (6) is the wind power prediction error function, which satisfies the normal of Eqs. (7)–(8) distributed. 2.3

Restrictions

uti

I X i¼1

pti þ

N X n¼1

ðptn;w  wtn Þ ¼ Dt þ PtL

ð9Þ

 riup Dt ridown Dt  pti  pt1 i

ð10Þ

uti pimin  pti  uti pimax

ð11Þ

 8  on on < Ti;t1  Ti;min  uti  0 ut1 i    : T off  T off 0 uti  ut1 i;t1 i;min i

ð12Þ

8 N T    PP t > U t t > u p þ R þ e þ p < w D i imax i;t n;w n¼1 t¼1    N P T  P > > t t : uti pimax  RD i;t þ pn;w þ ew  D

ð13Þ

n¼1 t¼1

T X t¼1

juti  ut1 i jM

ð14Þ

476

H. Sun et al.

8 I N P P > t t U > ðptn;w  wtn Þ þ ew  Dt g  b < Prfui pi þ Ri;t þ i¼1

n¼1

i¼1

n¼1

I N P P > > : Prfuti pti  RD ðptn;w  wtn Þ þ ew  Dt g  b i;t þ

ð15Þ

Equation (9) is the power balance constraint; (10) is the unit climbing slope constraint; (11) is the upper and lower limit of the generator set operation; Eq. (12) is the minimum opening and closing time constraint of the unit; (13) is the system backup constraint; (14) is the stop number constraint; (15) is the reserve deviation constraint.

3 Improved Plant Growth Simulated Algorithm 3.1

Original Plant Growth Simulated Algorithm

In recent years, the Plant Growth Simulation Algorithm (PGSA) has shown strong stability, global search ability and accuracy in the fields of integer programming and optimization scheduling [4]. The growth point contains a chemical growth hormone called morphactin, and the concentration of the morphactin corresponding to each growth point on the stem and the stem is PMi ¼ ðPM1 ; . . .; PMp Þ and Pmi ¼ ðPm1 ; . . .; Pmq Þ. The formula for calculating the morphactin concentration value is: PMi ¼

p P i¼1

f ðSMi Þ  f ðx0 Þ q     P ðf ðSMi Þ  f ðx0 ÞÞ þ f Smj  f ðx0 Þ j¼1



Pmj ¼

p P i¼1

ð16Þ



f Smj  f ðx0 Þ q     P ðf ðSMi Þ  f ðx0 ÞÞ þ f Smj  f ðx0 Þ

ð17Þ

j¼1

The random number falls into the morphactin concentration [0, 1] state space as shown in Fig. 1. When there are multiple growth points to be grown, the growth point with large morphactin concentration has the priority growth right, that is, the closer to the light source The higher the fitness of the growth point, the greater the probability of being selected.

random number

0.0

Pk+q

{

P2

{ {

P1

1.0

Fig. 1. State space of morphactin

Research on Wind Power Optimization Scheduling

477

The plant growth simulated algorithm has no complex parameters such as coding rules and mutation rates. The possibility of not finding the global optimal solution due to improper parameter selection is low [5]. But the optimization efficiency may be reduced when solving large problems. So the original algorithm is further improved. 3.2

Opposition-Based Learning

Opposition-Based Learning (OBL) is an effective method which has been proved that the inverse solution has a probability of nearly 50% better than the current solution. Introducing the idea of reverse learning into PGSA and proposing an improved plant growth simulated algorithm (IPGSA). 0

Xi;t ¼ k ðAi þ Bi Þ  Xi;t ; Xi;t 2 ½Ai ; Bi 

ð18Þ

0

Where Xi;t is the generalized inverse solution of Xi;t ; k is the random number in the range ½0; 1. The solution mechanism of reverse learning can enrich the diversity of growth points in the point set, enhance the ability to jump out of the local extremum. 3.3

Intelligent Variable Step Strategy

The value of the optimization step can directly affect the optimization result. Therefore, changing the fixed step size to the intelligent dynamic search step size can be expressed as: k ¼ k0 ð1 

IN  1 Þ þ kmin Imax  1

ð19Þ

Where k is the search step size, k0 is the initial step size, kmin is the minimum search step size, d is the step parameter, IN is the current number of iterations, and Imax is the maximum number of iterations. By dynamically changing the value of the step size, IPGSA can quickly search for the optimal solution using a larger step size at the beginning of the iteration, improved the convergence speed to a certain extent; use a smaller step size to improve the optimization accuracy later in the iterative process. Perform a more precise search near the current better solution. The solution flow chart for the entire scheduling plan is (Fig. 2):

478

H. Sun et al. Start Initialize parameters to determine initial scheduling scheme X0 Update the growth point to solve the SMi and calculate the morphogen concentration PSMi Find the inverse solution S`Mi, calculate PS`Mi

ΔP=PSMi-PS`Mi > Cgen ¼ UGj aj þ bj PGj þ cj PtGj þ > > > j¼1 t¼1 <  h  i UGt j 1  UGt j g0j þ g1j 1  es=sj > > > NH T P > P > > rHk StHk PHk DT : Chighload ¼

ð11Þ

ð12Þ

t¼1 k¼1

Where: Cgen is the power generation cost of conventional units, including operating costs and start-stop costs; NG is the number of conventional units; PtGj and UGt j are the active output and start-stop status variables of the conventional unit j in t periods, UGt j ¼ 0 means Stop, UGt j ¼ 1 means Open; s is the normal unit shutdown time; aj , bj , cj and g0j , g1j , sj are the operating cost parameters and start and stop cost parameters of the conventional unit j; NH is the number of groups of high load capacity; NH is the unit adjustment cost of the k high load capacity; StHk is the switching state of the k high load capacity in the t period, StHk ¼ 0 represents interrupted operation, StHk ¼ 1 represents putting into operation; PHk is the unit switching capacity of the k high-capacity; DT is the duration of the t period. 3.2

Constraints

(1) System Constraints. Including power balance constraints and rotation reserve constraints. 8 NG NW NH P P P > > > UGt j PtGj þ PtWi ¼ PtL þ StHk PHk > > > j¼1 i¼1 k¼1 > >  

j¼1 > > >P   NG > > > > UGt j PtGj  PtGj ;down  RtL;down þ RtW;down :

ð13Þ

j¼1

Where: PtL is the original active load of the system during the t period; PtH;total is the total input capacity of the high load capacity of the t period; PtGi ;up and PtGi ;down are the positive and negative rotational reserve capacity required for the conventional unit i to cope with the load prediction error during the t period; RtW;up and RtW;down are the positive and negative rotation backups used to solve wind power fluctuations.

Research on Wind Power Consumption Dispatching

499

(2) Wind Power Output Constraint. 0  PtWi  PtWi ;forecast

ð14Þ

Where: PtWi ;forecast is the forecast output of the wind farm i during the t period. (3) Conventional Power Operation Constraints. Including output power upper and lower limit constraints, minimum start and stop time constraints, and climbing speed constraints. 8 UGt j PtGj;min  PtGj  UGt j PtGj;max > >    > > t min > > UGt1  UGt j TGj;on  TGj;on 0 > j

> > t t t > Pt1 UGj PGj  UGt1 > Gj  PGj;up > j > : U t1 Pt1  U t Pt  Pt Gj

Gj

Gj

Gj

ð15Þ

Gj;down

Where: PtGj;max and PtGj;min are the upper and lower limits of the output power of the t t conventional unit j; TGj;on and TGj;off are the running duration and outage duration of the min min and TGj;off respectively represent are the conventional unit j during the t period; TGj;on minimum running time and minimum outage time of the conventional unit j; PtGj;up and PtGj;down are the output limits of the rise and fall of the conventional unit j. (4) High-Energy Capacity Switching Constraints. Including input capacity constraints, switching times constraints, and switching time constraints. 8 > > > > > > > > > > > >
>  > t1

 t > t min > > T S  S  T > Hk Hk Hk;on Hk;on  0 > > >   >

> : St  St1 T t  T min 0 Hk

Hk

Hk;off

ð16Þ

Hk;off

Where: PtH;min and PtH;max are the upper and lower limits of the input capacity of the high load capacity during the t period; MHk is the maximum number of switching times t t of the k high load capacity; THk;on and THk;off are the input and cut-off time of the k high min min are the minimum start-up time and load capacity during the t period; THk;on and THk;off cut-off duration for high load capacity.

500

H. Sun et al.

4 Example Analysis The example selects 10 units and 1 wind field system. and the specific unit parameters are shown in literature [7]. The parameters of high load capacity are: the number of switching groups is 4, the capacity of each group is 30 MW, the maximum cutting capacity is 120 MW, the minimum switching capacity is 0, the compensation price is 1000 yuan/(group h1 ), the minimum running time for 3 h, the minimum outage time is 2 h and the maximum number of cuts is 5. The parameters of the IWOA are: the population size is 30, and the number of iterations is 500. Combine the 24 h load data of a certain place as the initial load to solve the model. 4.1

Wind Power Consumption Situation

Figure 3 shows that the wind power consumption is 17700.3 MW h in traditional dispatch mode, and the wind power dispatching output has 31 restricted periods in 96 periods one day, the limited power is 1653.25 MW h. When using the source-load coordination model, the wind power increased to 18888.5 MW h and wind power dispatching output has 13 restricted periods, the limited power decreased to 465.0 MW h, and the wind power consumption level increased significantly. 4.2

System Operating Costs

It can be seen from the comparison between Figs. 4 and 5 that in the source-load scheduling mode, G10 does not start running at 9 h, and the output of G7 is relatively reduced at 18–22 h, which reduces the cost start and stop and power generation cost of the high-cost generator, thereby reducing the cost. System operating costs. The operating cost of the system is shown in Table 1. Although the cost of cutting off the high load capacity is 5,000 yuan, the high load capacity exerts its schedulable benefits, reducing the total dispatch cost by 9236 yuan. Table 2 shows that IWOA has higher local search efficiency and convergence accuracy, and better global search ability.

Wind power output/MW

400 350

Wind power forecast output

300

Source and source dispatching output Traditoonal dispatching output

250 200 150 100 0

10

20

30

40

50 Period/15min

60

70

80

90

100

Fig. 3. Wind power dispatching performance under different optimized scheduling modes.

Wind turbine output/MW

Research on Wind Power Consumption Dispatching

501

450

G1

400

G2

350 300

G3

250

G5

200

G6

150 100

G7

G4

G8

50

G9 G10 0

2

4

6

8

10

12 Time/h

14

16

18

20

22

24

Wind turbine output/MW

Fig. 4. Conventional unit output in traditional scheduling mode.

G1

450 400 350 300 250 200 150 100 50

G2 G3 G4 G5 G6 G7 G8 G9 G10 0

2

4

6

8

10

12 Time/h

14

16

18

20

22

24

Fig. 5. Regular unit output in source-load scheduling mode. Table 1. System scheduling costs. Scheduling mode Total cost Operating cost/yuan High energy cost/yuan Traditional 463020 463020 0 Source-source 448784 443784 5000

Table 2. Comparison of calculation results of different algorithms. Algorithm name Number of iterations Total scheduling cost/yuan GA 285 462537 WOA 179 449603 IWOA 146 448784

5 Conclusion This paper fully considers the schedulable benefits of high-energy capacity and establishes a wind power consumption optimization scheduling model with highenergy capacity. The improved whale optimization algorithm (IWOA) is used to solve the objective function, the optimal scheme of source-load coordinated scheduling with the largest wind power consumption and lowest operating cost is obtained.

502

H. Sun et al.

References 1. Zhao X, Cai Q, Zhang S et al (2017) The substitution of wind power for coal-fired power to realize China’s CO2 emissions reduction targets in 2020 and 2030. Energy 120:164–178 2. Wang J, Lu ZX, Qiao Y et al (2017) Study on the demand response mode of high-load load to improve the local consumption of wind power. Power Syst Technol 41(7):2115–2123 3. Xin XG, Wang W, Li W et al (2016) Multi-objective optimization scheduling of wind farm electric power system considering wind power consumption capacity. Renew Energy 34 (1):49–55 (in Chinese) 4. Guo P, Liu WY, Cai WT et al (2017) A multi-layer high-energy load coordinated loss reduction two-layer optimization model based on simulated annealing-stepwise optimization algorithm. Power Syst Technol 41(3):759–768 (in Chinese) 5. Zhang XY, Liao S, Zhang WB et al (2018) Economic dispatch mode of grid-connected wind farms with high energy load participation. J Lanzhou Univ Technol 44(02):79–85 (in Chinese) 6. Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51–67 7. Wang J, Botterud A, Miranda V (2009) Impact of wind power forecasting on unit commitment and dispatch. In: International workshop on largescale integration of wind power into power systems, Bremen, Germany, p 352

Time Delay Estimation Based PD Sliding Mode Control of Hybrid Robot for Automobile Electro-Coating Conveying Qiuyue Qin, Guoqin Gao(&), and Shilin Lei Jiangsu University, Zhenjiang, China [email protected]

Abstract. A time delay estimation-based PD-sliding mode control method is proposed to implement high performance trajectory tracking control for a hybrid robot used for automobile electro-coating conveying. First, to exempt the difficulty of real-time dynamic control from calculations of hybrid robot dynamics equations due to its complex mechanism, the time delay estimation-based dynamic model is established by linearizing the dynamic model with time delay estimation technology. Then, a sliding mode control method for the hybrid robot based on time delay estimation-based linearized dynamic model is presented for solving the problem of time delay estimation errors and overcoming the external interferences dramatically. Moreover, the calculation on system dynamics of sliding mode control for the hybrid robot is avoided by substituting the PD control item for the equivalent item of sliding mode control. Lyapunov stability theorem is used to prove the stability of the proposed control law. Finally, the PD control and the proposed control method for the hybrid robot are simulated by MATLAB, and the experiment is carried out on the prototype. The results demonstrate that the proposed control method is independent of complex dynamic model which could avoid the calculation on system dynamics of sliding mode control for the hybrid robot, and it could realize high-accuracy trajectory tracking control compared to PD control under external disturbances. Keywords: Hybrid robot Time delay estimation

 PD control  Sliding mode control 

1 Introduction Hybrid mechanisms own the advantages of both serial and parallel mechanisms. A hybrid robot for automobile electro-coating conveying (AECHR) is developed by the research group based on the superiorities of hybrid mechanisms. However, high nonlinearity and strong coupling exist in the AECHR which is a complex multiple-input-multiple-output system. Dynamic control takes dynamic features of hybrid robots into consideration and its non-linear dynamic factors can be compensated by the controller, which can theoretically achieve better control performance. Firstly, the complexity of the dynamic model is caused by the closed chain structure and kinematics constraints of hybrid robots, which makes it difficult to establish accurate dynamic model and to realize real-time dynamic control. Moreover, © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 503–511, 2020. https://doi.org/10.1007/978-981-32-9050-1_57

504

Q. Qin et al.

external interferences still exist in the hybrid robot system which is difficult to consider in the process of modeling. And it increases the difficulties of achieving highperformance tracking control of the hybrid robot by conventional control methods. To exempt the difficulties of accurate dynamic modeling and real-time dynamic control from the complexity of the dynamic model caused by the closed chain structure and kinematics constraints of hybrid robots, fuzzy control and neural network control have been used to estimate robot dynamics which approximate the actual nonlinear uncertain controlled object with arbitrary precision and transform the nonlinear model into a linear one [1–3]. However, plenty of gains or parameters introduced by these control methods need to be tuned by complex control algorithms, which is difficult to be realized in practical engineering application. The knowledge of dynamic model of complex controlled object is not required and the real-time online calculation of dynamic parameters could be avoided by the control based on time delay estimation model [4, 5]. Thus, the time delay estimation-based dynamic model is established by linearizing the dynamic model with time delay estimation technology (TDE) to deal with the dynamic modeling problem of the AECHR system. TDE errors are the inherent performance limitation caused by time delayed signals and external interferences still exist system which is difficult to consider in the process of modeling. While sliding mode control (SMC) is insensitive to external disturbances due to its unique discontinuous control characteristics. According to this, a SMC method for the hybrid robot based on time delay estimation-based linearized dynamic model is presented. The design of SMC includes equivalent control and switching control. The equivalent control is a feedforward control based on the system dynamic model which could make tracking errors approach sliding surface. The switching control is a kind of nonlinear feedback control. It could drive the system which is deviated from sliding mode surface onto the sliding surface [6, 7]. Accordingly, the control performance of SMC depends on the accuracy of the system dynamic model and dynamic parameters of the hybrid robot system need to be calculated in the design of its equivalent control. To handle the above problem, a time delay estimation-based PD-SMC (TDE-PD-SMC) method is proposed by substituting PD control item for the equivalent item of sliding mode control, which is independent on complex dynamic model of the AECHR and it owns the better dynamic control performance. Meanwhile, the robustness of the system is guaranteed under external disturbances. The main contents are arranged as follows. First, a time delay estimation-based dynamic model is established by linearizing the dynamic model with time delay estimation technology. Then, a PD-SMC method based on time delay estimation-based linearized dynamic model is presented and it is verified by simulation. Lyapunov stability theorem is used to prove the stability of TDE-PD-SMC method. Finally, the simulations and experiments are conducted on AECHR prototype system to further validate the effectiveness of our theoretical scheme.

Time Delay Estimation Based PD Sliding Mode Control of Hybrid Robot

505

2 Dynamic Modeling 2.1

Dynamic Modeling in Cartesian Space

The dynamic model expresses the relationship between the motion of the hybrid robot and the torque of each joint. It is the basis of solving dynamic problems and the premise of studying dynamic control. The dynamic equation of the multi-input and multi-output AECHR is [8] _ q_ þ GðqÞ þ sd ¼ s MðqÞ€q þ Cðq; qÞ

ð1Þ

€ represent where q ¼ ðz; bÞT represents the pose of the connecting rod midpoint; q_ and q the velocity and acceleration of the connecting rod midpoint; GðqÞ denotes the gravity _ represents the Coriolis and centrifugal item; MðqÞ represents the inertia item; Cðq; qÞ matrix; sd denotes the external disturbance term; s denotes the generalized driving force. 2.2

TDE Based Model Linearization

The dynamic parameters of AECHR vary with the change of the robot pose and its calculation is complicated, which increases the difficulty of dynamic control of the hybrid  is employed for the hybrid robot. robot in real-time. Therefore, an inertia gain matrix M  q þ Cðq; qÞ _ qÞ _ ¼ ½MðqÞ  M€ _ q_ þ GðqÞ  sd Fðq; q;

ð2Þ

According to Eq. (2), the dynamic equation could be simplified to  q þ Fðq; q; _ €qÞ ¼ s M€

ð3Þ

_ €qÞ represents the nonlinear characteristic part of the established dynamic where Fðq; q; model. Then the linearized dynamic model of AECHR could be obtained and computational complexity can be effectively simplified by estimating with time-delay information, as ^ q; _ €qÞ ¼ Fðq; q; _ € Fðq; qÞtT

ð4Þ

 qtT _ €qÞtT ¼ stT  M€ Fðq; q;

ð5Þ

where T denotes the sampling period, the value of the current time could be estimated _ € by the value of the last sampling period of Fðq; q; qÞ, and the value could be obtained by Eq. (5). So the selection of T is sufficient to meet the performance requirements. A linearized dynamic model can be obtained from Eqs. (3) (4) (5)  q þ Fðq; ^ q; _ €qÞ ¼ s M€

ð6Þ

^ q; _ €qÞ  Fðq; _ € x ¼ Fðq; q; qÞ

ð7Þ

506

Q. Qin et al.

Linearized dynamic model of hybrid robot can be obtained by real-time on-line estimation of unknown dynamics and disturbances in the dynamic model using TDE method. It is necessary to combine TDE with other robust control algorithms due to the TDE errors x in Eq. (7) would weaken the control performance of AECHR.

3 Control System Design 3.1

TDE Based PD-SMC Controller Design

To exempt the problem of time delay estimation errors and overcome the external interferences, and avoid the complex calculation on system dynamics of SMC for the hybrid robot simultaneously, a TDE-PD-SMC method based on the established linearized dynamic model is proposed to achieve the high-accuracy tracking control performance. The sliding mode function is defined as S ¼ e_ þ ke

ð8Þ

where e and e_ are the pose error and the velocity error; k ¼ diagða1 ; a2 Þ. Taking derivative of S in Eq. (8) along e_ and €e obtains S_ ¼ €e þ k_e ¼ €qd  €q þ kq_ d  kq_

ð9Þ

According to simplified linearized dynamic model Eq. (6) 1

 ðs  Fðq; ^ q; €q ¼ M _ €qÞÞ

ð10Þ

Substituting Eq. (10) into Eq. (9) as follows  1 ðs  Fðq; ^ q; _ €qÞÞ þ kq_ d  kq_ S_ ¼ €qd  M

ð11Þ

The equivalent item of the control system after entering the sliding mode is set up as uep . Due to S_ ¼ 0 in Eq. (11), we can obtain  qd þ kq_ d  kqÞ ^ q; _ þ Fðq; _ € uep ¼ Mð€ qÞ

ð12Þ

From simultaneous Eqs. (4) (5) (12), we have  qd  €qtT þ kq_ d  kqÞ _ þ stT sep ¼ Mð€

ð13Þ

 qd  €qtT þ kq_ d  kqÞ _ þ stT þ KsgnðSÞ s ¼ Mð€

ð14Þ

Then

where K ¼ diagðk1 ; k2 Þ.

Time Delay Estimation Based PD Sliding Mode Control of Hybrid Robot

507

PD control item is designed as epd ¼ KP e þ Kd e_

ð15Þ

where KP ¼diagðkp1 ; kp2 Þ, Kd ¼ diagðkd1 ; kd2 Þ. Substituting the PD control item in Eq. (15) for the equivalent item of SMC in Eq. (14), the control law of TDE-PD-SMC can be acquired  qtT þ kp e þ kd e_ þ KsgnðSÞ s ¼ stT  M€ |fflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflffl ffl} |fflfflfflfflffl{zfflfflfflfflffl} |fflfflfflffl{zfflfflfflffl} TDE

PD

ð16Þ

SMC

where kp ; kd are the proportional gain and differential gain respectively; K is the gain of SMC. In summary, the principle block diagram of the TDE-PD-SMC of AECHR is described as Fig. 1.

Fig. 1. Principle block diagram of the TDE-PD-SMC of AECHR

3.2

Stability Analysis

Stability Theorem 1. For the nonlinear uncertain system in Eq. (1). If the sliding mode function is defined in Eq. (8) and the TDE-PD-SMC controller is selected as Eq. (16), the AECHR system is stable. Proof. Construct the Laypunov function k T e_ T ÞLð e e_ Þ þ eT kd e 2    k P kM L¼  M  kM

1 Vð_e; eÞ ¼ ð eT 2

ð17Þ ð18Þ

508

Q. Qin et al.

where L and V are the positive definite matrixes. Substituting Eq. (18) into Eq. (17) and differentiating    e k P kM þ k_eT kd e  M  e_ kM  e_ þ k_ekd e  e þ k_eT M ¼ e_ T kP e þ ð_eT þ k_eT ÞM€ 

V_ ¼ ð e_ T

T

€e Þ

ð19Þ

Due to  e ¼ M€  qd  M€ q M€

ð20Þ

Substituting Eq. (6) into Eq. (20), we can derive  e ¼ M€  qd þ Fðq; ^ q;  qd  KP e  Kd e_  Ksgnð_e þ keÞ _ €qÞ  s ¼ M€ M€

ð21Þ

Substituting Eq. (21) into Eq. (19)  e  ð_eT þ keT ÞðKsgnð_e þ keÞ  M€  qd Þ V_ ¼ keT kP e  e_ T ðkd  kMÞ_

ð22Þ

If the control gain and selected parameter satisfy the following inequalities 

k [ 0; kP ; kd [ 0  qd k; km kd [ k  km ðMÞ  K  kM€

ð23Þ

Then 

 [0 kd  kM  qd [ 0 Ksgnð_e þ keÞ  M€

ð24Þ

Hence, from Eqs. (22) and (24), we can obtain V_  0

ð25Þ

So, the TDE-PD-SMC controller is stable.

4 System Simulation and Simulation Results Analysis Take the dynamic model of AECHR in Eq. (1) as the controlled plant. The simulation is conducted under the control of PD algorithm and TDE-PD-SMC algorithm to verify the effectiveness of the proposed TDE-PD-SMC algorithm. On the grounds of technological requirements of AEC and the parameters of AECHR prototype, the desired trajectory of the AECHR is defined in [8].  ¼ diagð13; 1Þ, Kp ¼ The parameters of TDE-PD-SMC and PD are fixed as: M diagð3; 5Þ, Kd ¼ diagð0:2; 0:2Þ, K ¼ diagð0:1; 1Þ, k ¼ diagð8; 3Þ; Kp ¼ diagð3; 5Þ, Kd ¼ diagð0:2; 0:2Þ. The external disturbances sd1 ¼ sd2 ¼ sd3 ¼ sd4 ¼ 40 sinð2pt þ p=2ÞðN  mÞ, sd5 ¼ sd6 ¼ 60 sinð2pt þ p=2ÞðN  mÞ shown in Fig. 1 are exerted to the

Time Delay Estimation Based PD Sliding Mode Control of Hybrid Robot

509

control system. Figures 2 and 3 denote the trajectory tracking curves and the tracking error curves the connecting rod midpoint under external disturbances.

Fig. 2. Trajectory tracking curves

Fig. 3. Tracking error curves

As indicated in Figs. 2 and 3, under the control of TDE-PD-SMC and PD, maximum tracking error (MTE) of the connecting rod midpoint in z-direction is 4.27  10−6 m and 3.53  10−3 m respectively, and the MTE of b is 1.45  10−4 rad and 1.37  10−2 rad respectively. Therefore, the MTE of the connecting rod midpoint in z-direction and b of TDE-PD-SMC is obviously smaller than the MTE of PD. It is obviously that the proposed TDE-PD-SMC owns higher-accuracy trajectory tracking control performance under external disturbances of the system.

5 System Experiments and Experimental Results Analysis For further verifying the feasibility and effectiveness of TDE-PD-SMC method and PD method, they were performed on the prototype of AECHR and the hardware platform is in Fig. 4. The real-time motion states of the AC servo motors are collected by the encoders and fed back to the UMAC. Figure 5 could be drawn by the PMAC Plot software of UMAC.

510

Q. Qin et al.

Fig. 4. The prototype of AECHR and the hardware platform

6

x 10

-3

4

x 10

-3

TDE+PDSMC PD

6 4 2

Error-β/rad

2

z/m

8

TDE+PDSMC PD

0 -2

0 -2 -4 -6

-4 -6

-8 0

2

4

6

8

Time/s

(a) z

10

12

14

16

-10

0

2

4

6

8

10

12

14

16

Time/s

(b) β

Fig. 5. Tracking error curves of experimental results

6 Conclusion (1) The time delay estimation-based dynamic model of AECHR is established by linearizing the dynamic model with time delay estimation technology to exempt the difficulty of real-time dynamic control from calculations of hybrid robot dynamics equations due to its complex mechanism. (2) A SMC method on the basis of TDE-based linearized dynamic model is presented for solving the problem of time delay estimation errors and overcoming the external interferences dramatically. Moreover, the calculation on system dynamics of SMC for the hybrid robot is avoided by substituting the PD control item for the equivalent item of sliding mode control. And it could realize high-accuracy trajectory tracking control under external disturbances. (3) Compared with the PD method and the TDE-PD-SMC method, the simulations and experiments are conducted on the AECHR prototype system to further validate the effectiveness of our theoretical scheme. Acknowledgements. This project was supported by National Natural Science Foundation of China (Grant No. 51375210), Zhenjiang Municipal Key Research and Development program (Grant No. GZ2018004) and the Priority Academic Program Development of Jiangsu Higher Education Institutions.

Time Delay Estimation Based PD Sliding Mode Control of Hybrid Robot

511

References 1. Subudhia B, Morrisb AS (2009) Soft computing methods applied to the control of a flexible robot manipulator. Appl Soft Comput 9(1):149–158 2. Chatterjee A, Chatterjee R, Matsuno F et al (2008) Augmented stable fuzzy control for flexible robotic arm using LMI Approach and neuro-fuzzy state space modeling. IEEE Trans Ind Electron 55(3):1256–1270 3. Chaoui H, Sicard P, Gueaieb W (2009) ANN-based adaptive control of robotic manipulators with friction and joint elasticity. IEEE Trans Ind Electron 56(8):3174–3187 4. Baek J, Jin M, Han S (2016) A new adaptive sliding-mode control scheme for application to robot manipulators. IEEE Trans Ind Electron 63(6):3628–3637 5. Lee J, Chang PH, Jin M (2017) Adaptive integral sliding mode control with time-delay estimation for robot manipulators. IEEE Trans Ind Electron 64(8):6796–6804 6. Hung JY, Gao W, Hung JC (1993) Variable structure control: a survey. IEEE Trans Ind Electron 40(1):2–22 7. Sabanovic A (2011) Variable structure systems with sliding modes in motion control—a survey. IEEE Trans Ind Inf 7(2):212–223 8. Yuan W, Gao G (2018) Sliding mode control of the automobile electro-coating conveying mechanism with a nonlinear disturbance observer. Adv Mech Eng 10(9):1–9

A Predictive Speed Control Method Based on Sliding Mode Model for PMSM Drive System Qian Guo1 and Tianhong Pan2(&) 1

2

School of Electrical and Information Engineering, Jiangsu University, Zhenjiang 212013, China School of Electrical Engineering and Automation, Anhui University, Hefei 230601, China [email protected]

Abstract. Permanent magnet synchronous motors (PMSM) have been extensively adopted due to their perfect dynamic properties and compact structure. Reliable controller of PMSM requires high speed-following capability and antidisturbance ability when the parameters of the system change suddenly. Therefore, it is important to improve the performance of speed and torque control of PMSM. In this article, a novel model predictive control method is presented to track the speed of PMSM by using a sliding mode model. Firstly, a drive model of PMSM and sliding mode predictive model have been built for controller design. Then the control variable is designed by combining sliding mode control and model predictive control. Finally, the simulation results are presented to evaluate the validity of the proposed algorithm. Furthermore, the comparison between the proposed controller and the controller using traditional model predictive control implies the quickness of speed response and the robustness of the sliding mode predictive controller. Keywords: Permanent magnet synchronous motor  Model predictive control  Sliding mode control

1 Introduction Recently, permanent magnet synchronous motors are broadly applied in motion control [1]. Because of their distinct dynamic properties as well as compact structure, they have been widely utilized in servo-drive applications including machine tools as well as industrial robots [2]. As PMSM has superior power density, high reliability and high efficiency, it has been a dominating drive in electrical vehicle (EV), hybrid vehicle (HEV) and electric power steering (EPS) and so on [3, 4]. However, due to the strong coupling and nonlinearity of PMSM, the traditional PID control cannot meet the requirements any more. Therefore, how to improve the performance of speed and torque control for PMSM becomes a challenging issue [5–7]. Recently, with the development of computing hardware and new algorithms, model predictive control (MPC) becomes more and more popular in control system of PMSM because of its excellent control effect [8]. MPC is utilized to pre-calculate the behavior of the plant © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 512–520, 2020. https://doi.org/10.1007/978-981-32-9050-1_58

A Predictive Speed Control Method Based on Sliding Mode Model

513

and optimize control variables based on a model with high accuracy and high degree of identification. In MPC, the controller chooses the next input sequence according to the prediction of the future system [9]. This method has been utilized as a speed and current controller for electrical motor drives in [10]. A discrete-time model predictive current control method has been designed in [11], which pointed out the most significant issues and also gives detailed descriptions for controller design. Tomasz Tarczewski proposed a constrained state feedback speed control method of PMSM using MPC, which performs better than that with no constraints [12]. A new linearization and constraints solving approach using MPC was proposed by Mynar, which allowed natural field weakening [13]. All these researches proved the efficiency of MPC used in PMSM control system. However, MPC applications to PMSM are still largely unexplored. This means that MPC has great potential in PMSM control field. Consequently, a predictive speed control method based on sliding mode model is developed to enhance the anti-disturbance properties. This method takes advantage of the strong robustness of sliding mode control combined with MPC to control speed tracking. To obtain the predictive controller, an innovative sliding mode predictive model is established, then feedback correction and optimization are involved subsequently. The simulation results have demonstrated the robustness of this controller with sudden load torque. Besides, it is easy to implement the algorithm. The rest of the article is arranged as follows. Section 2 gives the description of the drive model of PMSM. Section 3 presents the design for the sliding mode predictive controller in details. The simulation results are shown in this paper to prove the effectiveness of this approach. Finally, Sect. 5 gives a summary of this proposed method.

2 Drive Model of PMSM To exemplify the design of sliding mode predictive controller (SLMPC), the speed control of a PMSM drive is created. According to magnetic field orientation theory [14], the electrical and mechanical dynamics of the PMSM in a synchronous rotating reference frame (d, q) are demonstrated as follows: ( di

d

dt diq dt

¼  LRds id þ

¼  LRqs iq 

w r Lq Ld i q þ wr Ld Lq id þ

1 Ld u d wr w f 1 Lq u q  Lq

ð1Þ

dwr ¼ gTe  gTL  bwr dt

ð2Þ

 3  wr ¼ gw; Te ¼ g ðLd  Ld Þid iq þ wf iq 2

ð3Þ

J

where ud and uq are the q and d-axis voltages, id and iq are the q and d-axis currents, Rs is the stator phase resistance, Ld and Lq are the q and d-axis stator inductances, wf is

514

Q. Guo and T. Pan

magnetic flux, J is the moment of inertia, w is electromechanical speed, wr is the mechanical speed, TL is disturbance torque,b is the viscous coefficient of the load. In this work, the control method id ¼ 0 is adopted for analysis. Suppose that Ld ¼ Lq ¼ L and the speed function can be obtained from the above equations. It is as below: dwr 3gwf gTL b ¼ iq   wr J dt 2J J

ð4Þ

The load torque is taken as the disturbance variable. From Eq. (4), by using zeroorder holder method, the resulting discrete-time equation can be described as wr ðk þ 1Þ ¼ Awr ðkÞ þ Biq ðkÞ þ dðkÞ

ð5Þ

s Where A ¼ ð1  bTJ s Þ; B ¼ 3T 2J gwf ; dðkÞ is disturbance, Ts is the sampling period.

3 Design of Sliding Mode Predictive Controller 3.1

Sliding Mode Predictive Model

In MPC, the input and output data of the control system are used to predict the output at the future time. Based on this, sliding mode predictive control has been proposed. According to the sliding mode control theory [15], the controller design includes two main steps: (1) Finding a suitable sliding surface with expected performance. (2) An appropriate control law is constructed so that the system error state can reach the sliding surface and then remain on the sliding surface. The above two steps are independent. The speed error function is as follows: ew ðkÞ ¼ wm ðkÞ  wm ðkÞ

ð6Þ

Where the wm ðkÞ is the set-point speed, and ew ðk þ 1Þ ¼wr ðk þ 1Þ  wr ðk þ 1Þ

¼Aew ðkÞ þ Biq ðkÞ þ dðkÞ þ Awr ðkÞ  wr ðk þ 1Þ

ð7Þ

 Let xðkÞ ¼ Awr ðkÞ  wr ðk þ 1Þ. The control variable uðkÞ ¼ iq ðkÞ. If dðkÞ ¼ 0, then  ew ðk þ 1Þ ¼ Aew ðkÞ þ BuðkÞ þ xðkÞ

ð8Þ

A Predictive Speed Control Method Based on Sliding Mode Model

515

Firstly, the switching function including the motor speed error is defined as: sf ðkÞ ¼ cew ðkÞ and the sliding mode surface is S ¼ few ðkÞjs½ew ðkÞ ¼ 0g, so the sliding mode model is described as sðkÞ ¼ cew ðkÞ  hk sð0Þ

ð9Þ

Where 0\a\1, the corresponding predictive sliding mode surface is Sm ¼ few ðkÞj sm ½ew ðkÞ ¼ 0g, from Eqs. (7) and (8),  sðk þ 1jkÞ ¼ cew ðk þ 1Þ  hk þ 1 sð0Þ ¼ c½Aew ðkÞ þ BuðkÞ þ xðkÞ  hk þ 1 sð0Þ

ð10Þ

From this, the predicted value after p steps can be acquired: sðk þ pjkÞ ¼ cAp ew ðkÞ þ

p X

cAi1 Buðk þ p  iÞ þ

i¼1

p X

 þ p  iÞ  hk þ p sð0Þ cAi1 xðk

i¼1

ð11Þ Similarly, the prediction model at time k  p can be obtained sðkjk  pÞ ¼ cAp ew ðk  pÞ þ

p X

cAi1 Buðk  iÞ þ

i¼1

3.2

p X

  iÞ  hk sð0Þ ð12Þ cAi1 xðk

i¼1

Sliding Mode Predictive Controller

Predictive control includes a wide variety of types, and its commonality is that all predictive controllers, no matter the algorithm is complex or simple, have these three characteristics: prediction model, optimization, feedback correction [16, 17]. (1) Feedback Correction Considering the nonlinearity, parameter time-varying and external disturbance in the actual motor model, the prediction model has some error with the actual motor output. It is necessary to perform feedback correction. The difference values between sðkÞ and sðkjk  pÞ are used to correct the output value at time k þ p. The correction function is defined. As a result, the output at time k þ p of the sliding mode prediction model after correction is ^sðk þ pjkÞ ¼ sðk þ pjkÞ þ dp ½sðkÞ  sðkjk  pÞ Where dp is correction coefficient.

ð13Þ

516

Q. Guo and T. Pan

(2) Reference trajectory design The system state is expected to reach the set speed along the desired trajectory, and the reference trajectory is set to be s ðk þ pÞ ¼ ls ðk þ p  1Þ þ ð1  lÞsd s ð0Þ ¼ sð0Þ

ð14Þ

Where 0\b\1; sd is the expected value of the switching function, sd ¼ 0, so the reference trajectory is set to be: s ðk þ pÞ ¼ lk þ p sð0Þ

ð15Þ

(3) Optimization In order to realize the speed tracking control, the difference between the reference trajectory and the predicted value and the control variable uðkÞ are involved in the cost function. The cost function is determined as follows JN ¼

Np X

½s ðk þ iÞ  sðk þ ijkÞ2 þ

N c 1 X

kj u2 ðk þ jÞ

ð16Þ

j¼0

i¼1

Where s ðk þ iÞ is reference trajectory, Np represents prediction horizon, Nc represents the control horizon, kj is the weight coefficient. The first part of this equation is related to the purpose of reducing the errors between the reference value and predicted value. The second part represents the consideration of the size of the control variable uðkÞ when the cost function is minimized as much as possible. The cost function is minimized by   uðkÞ ¼ ð/T / þ KÞ1 /T  ½ðL1 hk þ L2 lk Þsð0Þ  Few ðkÞ  GW dC " Where / ¼ cB   

Np N Pc 1 i¼0

i

cA B

NpP Nc i¼0

ð17Þ

#T i

cA B

, K ¼ k1 , L1 ¼ ½h1 ; h2 ;    ; hNp T , 2

3  0 6  07 L2 ¼ ½l1 ; l2 ;    ; lNp T , F ¼ ½cA1 ; cA2 ;    ; cANp T , G ¼ 6 . 7, .. 4 . .. 5 cANp 1 cANp 2    c T   ¼ ½  ðk þ 1Þ;    ; w  ðk þ Np  1Þ , d ¼ diagðd1 ; d2 ;    dNp Þ; and C ¼ ½sðkÞ W wðkÞ; w sðkjk  1Þ; sðkÞ  sðkjk  2Þ;    ; sðkÞ  sðkjk  Np ÞT . The schematic diagram of this control method is illustrated in Fig. 1. As mentioned previously, the sliding mode control includes prediction model, optimization as well as feedback correction. c cA .. .

0 c .. .

A Predictive Speed Control Method Based on Sliding Mode Model s* ( k )

Optimizing u (k ) controller

+

sˆ( k + p | k ) Feedback correction

s(k + p | k )

Controlled process

517

e( k )

Sliding mode predictive model

Fig. 1. Diagram of sliding mode predictive control

4 Simulation Results To validate the performance of the presented method, a simulation model has been created. The main parameters of the simulation are as follows: wm ðkÞ¼300 rad=s, J ¼ 8  104 kg m2 , wf ¼ 0:149 Wb, b ¼ 0:004 N m s rad1 ; g ¼ 13, Ts ¼ 0:2 ms. The response curve of the motor speed was shown in Fig. 2. It is clear that the designed controller can realize fast tracking of the expected motor speed. When l ¼ 0:94, the controller has the best performance. Moreover, the comparison between the proposed method and traditional model predictive control (MPC) has been conducted to prove the robustness of the sliding mode predictive control. Gaussian white noise was added to the model. The load torque TL was set to be 40 N m when t = 100 ms. In this simulation b was set to be 0.915. The speed response curves with sudden load torque added are displayed in Fig. 3. It indicates that when the load torque changes abruptly, the speed of the PMSM can rearrive the reference value rapidly by using sliding mode predictive control. Moreover,

Fig. 2. Response curve of the motor speed

518

Q. Guo and T. Pan

it is apparent that the fluctuation of speed response curve using SLMPC is smaller than that of MPC. Furthermore, the control variable curves with sudden load torque added are shown in Fig. 4 which can also confirm the robustness of the proposed method.

Fig. 3. Speed response curves of adding load torque

Fig. 4. Control variable curves of adding loading torque

A Predictive Speed Control Method Based on Sliding Mode Model

519

5 Conclusions In this article, a new predictive controller based on sliding mode model has been formulated to realize speed control of the PMSM. This method utilizes the speed error and MPC algorithm to build sliding mode predictive control model. It has been proved that the proposed method is effective to reduce the impact of load change and is useful to reducing the errors and improve the controller robustness. Acknowledgment. This work was supported by the Postgraduate Research & Practice Innovation Program of Jiangsu Province (Grant No. SJKY19_2562).

References 1. Ghafarikashani AR, Faiz J, Yazdanpanah MJ (2010) Integration of non-linear H∞∞ and sliding mode control techniques for motion control of a permanent magnet synchronous motor. IET Electr. Power Appl. 4(4):267–280 2. Krishnan R (2009) Permanent magnet synchronous and brushless DC motor drives. CRC Press, Boca Raton 3. Sant A, Khadkikar V, Xiao W, Zeineldin H (2015) Four-axis vector controlled dual-rotor PMSM for plug-in electric vehicles. IEEE Trans Ind Electron 62(5):3202–3212 4. Hung YC, Lin JC, Hwang FJ, Chang JK, Ruan KC (2015) Wavelet fuzzy neural network with asymmetric membership function controller for electric power steering system via improved differential evolution. IEEE Trans. Power Electron. 30(4):2350–2362 5. Miranda H, Cortes P, Yuz J, Rodriguez J (2009) Predictive torque control of induction machines based on state-space models. IEEE Trans Ind Electron 56(6):1916–1924 6. Qian L, Kay H (2016) A finite control set model predictive direct torque control for the PMSM with MTPA operation and torque ripple minimization. In: Electric Machines & Drives Conference 7. Wang Z, Chen J, Cheng M et al (2016) Field-oriented control and direct torque control for paralleled VSIs fed PMSM drives with variable switching frequencies. IEEE Trans. Power Electron. 31(3):1 8. Preindl M, Bolognani S (2013) Model predictive direct torque control with finite control set for PMSM drive systems. IEEE Trans Ind Inf 9(2):648–657 9. Mayne DQ, Seron MM, Raković SV (2005) Robust model predictive control of constrained linear systems with bounded disturbances. Automatica 41(2):219–224 10. Bolognani S, Bolognani S, Peretti L et al (2009) Design and implementation of model predictive control for electrical motor drives. IEEE Trans Ind Electron 56:1925–1936 11. Moon HT, Kim HS, Youn MJ (2003) A discrete-time predictive current control for PMSM. IEEE Trans. Power Electron. 18(1):464–472 12. Tarczewski T, Grzesiak L (2016) Constrained state feedback speed control of PMSM based on model predictive approach. IEEE Trans Ind Electron 63(6):3867–3875 13. Mynar Z, Vesely L, Vaclavek P (2016) PMSM model predictive control with field weakening implementation. IEEE Trans Ind Electron 63(8):5156–5166 14. Fei W, Cheng C, Liu B (2014) Analysis of PMSM control performance based on the mathematical model and saturated parameters. Transp Electrification Asia-Pac

520

Q. Guo and T. Pan

15. Bartolini G, Fridman L, Pisano A et al (2008) Modern sliding mode control theory. New perspectives and applications. Springer, Heidelberg 16. Pan TH, Le Y, Li SY (2004) Multiple model-based predictive control for the plant-wide thermal processes. Syst Eng Electron 17. Elsisi M (2019) Design of neural network predictive controller based on imperialist competitive algorithm for automatic voltage regulator. Neural Comput. Appl. 4:1–11

The Optimal Mars Entry Guidance with External Disturbance Using Neural Network Solution Maomao Li(&) and Ruike Guo Beijing Institute of Control Engineering, Beijing 100190, China [email protected]

Abstract. In this study, a novel H1 guidance strategy based on optimal control theory is proposed to guide the spacecraft landing on the Mars precisely. Initially, the error system of entry phase with the external disturbance is derived, and the method of tracking the nominal entry trajectory is adopted. Considering the difference of magnitudes’ order between several state variables concluding the altitude, the velocity and range, normalization strategy is used to avoid numerical problem. Subsequently, the H1 optimal control theory is introduced, and the difficulty of the entry phase is that the Hamilton-Jacobi-Isaacs (HJI) equation with control constraint must be solved. So the neural network (NN) is introduced to get the solution of HJI equation approximately. Finally, simulation is done to demonstrate the H1 guidance strategy. Keywords: Mars entry

 H1 guidance  HJI equation  Neural network

1 Introduction At present, Mars exploration is increasingly being studied by more and more countries [1]. The Mars entry phase is similar to the phase of spacecraft return to the earth, but the aerodynamic lift and drag force of Mars entry detector are much smaller, so the guidance ability of the detector is limited. What’s more, the Mars atmosphere has the external disturbances such as gusts, and there also exists a significant communication delay between Mars and the earth [2]. All of these make the Mars entry guidance more difficult, so the autonomy and robustness of Mars entry guidance methods must be stronger. For the entry guidance problem, the tracking a nominal trajectory methods or the predictor corrector methods are generally adopted. Among them, the former is relatively mature and has been applied in practical engineering [3]. Up to now, considering the onboard computing demand and the model accuracy, the predictor-corrector method has difficulty in engineering application. Scholars at home and abroad have studied a variety of guidance methods during the past few years. Based on the Apollo lunar program, the terminal point guidance method was used in paper [4]. With the sliding mode theory, Li proposed a robust entry guidance method, and the radial basis function neural network was used to make the guidance accuracy higher [5]. In paper [6], a guidance method with an adaptive drag profile was proposed. It can be seen that © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 521–528, 2020. https://doi.org/10.1007/978-981-32-9050-1_59

522

M. Li and R. Guo

the majority of Mars entry guidance methods pay much attention on improving the robustness of algorithm. However, some disadvantages are exposed in the engineering practice. For example, sliding mode tracking guidance method has high precision, but it has the chattering problem [7]. The online trajectory planning guidance methods need the airborne computer has faster processing speed, and it also has the problem of algorithm convergence, which limits the application [8]. In this paper, the proposed method focuses on dealing with the external disturbance and the constraints of guidance command. Up to now, a large number of H1 control theoretical researches have been studied [9–12]. The H1 nonlinear control problem can be transformed by solving a HJI equation. However, the HJB and HJI equations are the nonlinear partial differential equations. In [9], the neural network approximation method was adopted to solve the HJB equation, which can also be used in our paper. For the Mars entry phase, the difference of magnitudes’ order between several state variables is large, which is not good for NN approximation. Consequently, the dimensionless treatment is adopted in this paper.

2 Problem Formulation During the whole entry phase, the bank angle is determined to make sure the detector reaches the parachute deployment stage safely. The longitudinal trajectory is mainly influenced by the cosine of bank angle which adjusts the longitudinal aerodynamic lift component, and the lateral entry trajectory is mainly influenced by the sine of bank angle. Due to the boundedness of sine and cosine values, the control constraints must be considered. The longitudinal model is as follows [11]: 8 r_ ¼ v  sin c > > < v_ ¼ g  sin c  D ð1:1Þ c_ ¼ ðL=vÞ  cos r þ ðv=r  g=vÞ  cos c > > : s_ ¼ v  cos c Considering the difference of magnitudes’ order between several state variables, dimensionless treatment is used in this paper. The following equations are used to make normalization vds ¼ v=vscale ; rds ¼ r=R0 ; s ¼ t=Tscale ; sds ¼ s=R0

ð1:2Þ

Where R0 : The radius of Mars, g0 : Acceleration due to gravity of the Mars surface pffiffiffiffiffiffiffiffiffiffiffiffi pffiffiffiffiffiffiffiffiffiffi vscale ¼ g0 R0 ; Tscale ¼ R0 =g0 : Substituting the above equations into Eq. (1.1), replacing the general state variables of Eq. (1.1) with the above dimensionless variables, the dimensionless longitudinal dynamic equations can be derived.

The Optimal Mars Entry Guidance with External Disturbance

523

The actual entry trajectory has deviation with the nominal trajectory. According to the paper [11], the error system between actual trajectory and nominal trajectory is x_ ¼ f ðt; xÞ þ gðt; xÞuðtÞ

ð1:3Þ

Where f ðt; xÞ ¼ f ðt; x þ xd Þ þ Df ðt; x þ xd Þ þ  gðt; x þ xd Þud  x_ d gðt; xÞ ¼ gðt; x þ xd Þ Df represents the external disturbances, and the corresponding definition can be seen in paper [11].

3 The H1 Optimal Guidance Method The H1 optimal guidance method of Mars entry phase is discussed. Consider the following system x_ ¼ f ðx; tÞ þ kðx; tÞdðtÞ þ gðx; tÞuðtÞ; zðtÞ ¼ wðx; u; tÞ

ð1:4Þ

Definition 1. The nonlinear H1 control problem is designing the control law to make the above nonlinear system satisfy the following two conditions [12]: (1) If dðtÞ ¼ 0, that is to say there is no disturbance, the system x_ ¼ f ðx; tÞ þ gðx; tÞ uðtÞ is asymptotically stable.  Rt  Rt (2) 8tf  0; 8dðtÞ 2 L2 ð0; tf Þ, there always exists 0f kzðtÞk2 dt  c2 0f kdðtÞk2 dt; R    R tf t c2 ¼ sup kzðtÞk2 dt= 0f kdðtÞk2 dt : 0 dðtÞ2L2 ð0;tf Þ

For the H1 control problem, the following performance functional is defined Z tf   Vðxðt0 Þ; t0 Þ ¼ hðx; tÞT hðx; tÞ þ kuðtÞk2 c2 kdðtÞk2 dt þ /ðxðtf Þ; tf Þ ð1:5Þ 0

Based on the H1 theory and zero-sum differential games theory, the solution of H1 problem can be gotten through solving the equation [12]  Z V  ¼ min max /ðxðtf Þ; tf Þ þ u

d

tf

   hT h þ kuk2 c2 kdðtÞk2 dt

ð1:6Þ

0

The above Eq. (1.4) is a two-variable optimal control problem. With the theory of optimal control, the solution of the above two-variable optimal problem is u ðtÞ ¼ 0:5gT ðx; tÞ

@V  @V 2 ; d ðtÞ ¼ 0:5kT ðx; tÞ =c @x @x

ð1:7Þ

524

M. Li and R. Guo

The following function can be proposed to make the guidance command satisfy the constraint. Supposing the constraint function is wðÞ, kuðtÞk2 can be redefined by the following generalized nonquadratic function form [9]: Z 2

kuðtÞk ¼ 2

u

wT ðvÞdv

ð1:8Þ

0

In this paper, because m ¼ 1, A tanhðv=AÞ can be used for w. The solution of H1 optimal control with control constraint can be given by   @Vðx; tÞ @Vðx; tÞ 2 T =c u ðtÞ ¼ w 0:5g ðx; tÞ ; d  ðtÞ ¼ 0:5k T ðx; tÞ @x @x 

ð1:9Þ

The following HJI equation considering the control constraint can be gotten @V þ hT h þ 2 @t

Z

u

wT ðvÞdv þ

0

@V T ðf þ g  u ðtÞ þ d  ðtÞÞ  c2 kd  ðtÞk2 ¼0 @x

ð1:10Þ

HJI equation is a nonlinear partial differential equation, so it is difficult to be solved. In [9], the neural network (NN) was used to solve the HJB equation. In this paper, the same means can be adopted. V  ðx; tÞ can be approximate by VL ðx; tÞ which has the following form VL ðx; tÞ ¼

L X j¼1

wj ðtÞrj ðxÞ ¼ wTL ðtÞrL ðxÞ

ð1:11Þ

With the NN approximation means, the partial derivatives in Eq. (1.7) are @VL @rTL ðxÞ @VL wL ðtÞ ¼ rrTL ðxÞwL ðtÞ; ¼ ¼ w_ TL ðtÞrL ðxÞ @x @x @t

ð1:12Þ

The substitution of Eqs. (1.9) and (1.12) into Eq. (1.10) yields the following form of HJI equation R u HJIðV tÞÞ ¼ 2 0 wT ðvÞdv þ w_ TL ðtÞrL ðxÞ  wTL ðtÞrrL ðxÞg  L ðx; w 0:5gT rrTL ðxÞwL ðtÞ þ 0:25c2 wTL ðtÞrrL ðxÞkk T  rrTL ðxÞwL ðtÞ þ hT h þ wTL ðtÞrrL ðxÞf

ð1:13Þ

The corresponding boundary condition is wTL ðtf ÞrL ðxðtf ÞÞ ¼ /ðxðtf Þ; tf Þ

ð1:14Þ

The Optimal Mars Entry Guidance with External Disturbance

525

And the solution of HJI equation with control constraint can be gotten uL ðtÞ ¼ w

  1 T T 1 g rrL ðxÞwL ðtÞ ; dL ðtÞ ¼ 2 kT rrTL ðxÞwL ðtÞ 2 2c

ð1:15Þ

Because the NN is approximate solution, there exists approximation error. The residual error is nL ¼ HJIðVL Þ  HJIðV  Þ. The method of weighted residuals in paper [9] can be used to get the least-squares solution for wL ðtÞ. Based on the weighted residuals theory, the equation can be gotten hrL ðxÞ; nL iX ¼ 0. X is the states domain, and the inner productR is hy1 ðxÞ; y2 ðxÞiX ¼ X yT1 ðxÞy2 ðxÞdx With the Eq. (1.14) and boundary condition (1.15), the NN weights can be solved. The derivative of the NN weight vector with respect to time is 1 w_ L ðtÞ ¼ hrL ðxÞ; rL ðxÞi1 X hrrL ðxÞf ; rL ðxÞiX wL ðtÞ þ hrL ðxÞ; rL ðxÞiX  T  

wL ðtÞrrL ðxÞg  w 12 gT rrTL ðxÞwL ðtÞ ; rL ðxÞ X E hD R  i u T T hrL ðxÞ; rL ðxÞi1 2 w ðvÞdv; r ðxÞ þ h h; r ðxÞ h i L L X X 0 X D E 1  hrL ðxÞ; rL ðxÞiX  4c12 wTL ðtÞrrL ðxÞkk T rrTL ðxÞwL ðtÞ; rL ðxÞ

ð1:16Þ

X

4 The Simulation Studies of H1 Optimal Guidance Method The simulation is done to demonstrate the effectiveness of the proposed guidance method. The corresponding parameters are listed in Table 1. The end of the entry phase is marked by the Mars entry spacecraft reaching the altitude of 11 km. Table 1. Parameter values. Parameter Mars radius The mass of spacecraft The parameter l The ballistic coefficient B The altitude of entry point The velocity of entry point The flight path angle of entry point

Value 3395 km 2804 kg 4:284  1013 120 125 km 5505 m/s −14.15 deg

The Figs. 1 and 2 show the flight states of normalization. We can conclude that the difference of magnitudes orders between several flight states in Figs. 1 and 2 is much smaller which is good for NN approximation.

526

M. Li and R. Guo 1.6

0.04

1.4

0.035

1.2 velocity of normalization

altitude of normalization

0.03 0.025 0.02 0.015

1 0.8 0.6

0.01

0.4

0.005

0.2

0

0

50

100

150 time/s

200

250

Fig. 1. The altitude of normalization

300

0

0

50

100

150 time/s

200

250

300

Fig. 2. The velocity of normalization

The external disturbance of Mars atmosphere gust is considered. In the actual simulation, the sine signal is used to simulate the external disturbance. In this paper, k ¼ ½0

1

0

0 T ; d ¼ 0:1 sinðpi  t=8Þ

It is assumed that the actual entry trajectory and nominal one have much bigger initial state errors. The initial longitudinal state errors vector without normalization is xð0Þ ¼ ½ 10 km 100 m=s 0:3 deg 5 km T , and the errors vector with normalization is xnorm ð0Þ ¼ ½ 0:0029 0:0282 0:0052 0:00145 T : And then the actual entry trajectory tracks the nominal entry trajectory using the proposed H1 optimal entry guidance method. Considering the guidance command Ru Ru constraints kuðtÞk2 ¼ 2 0 wT ðvÞdv ¼ 2 0 ðA tanhðv=AÞ1 Þdv: Remark 1. In this paper, the NN that has the polynomial form is used, so there exists multiplication relation between higher terms. If the difference of magnitudes’ order between several state variables is large, it is not good for NN approximation. This is one of the most important reasons for states normalization. The tracking errors with the optimal guidance law are showed in Figs. 3, 4, 5 and 6. The final velocity and flight path angle errors are nearly to zero in spite that there exists considerable fluctuation in the whole entry phase. The final range error is less than 200 m even though the initial state error is big. In general, the Mars entry spacecraft can reach the opening parachute point precisely. The Fig. 7 shows the guidance command of bank angle cosine with constraints. The simulation without considering control constraint is also done. From the Fig. 8, it can be seen that the maximum of guidance command u is more than 1.5 which can be not realized in the practical engineering. With comparison, the maximum of guidance command u in Fig. 7 is less than 0.98.

The Optimal Mars Entry Guidance with External Disturbance

500

100

velocity error/(m/s)

150

altitude error/km

1000

0

-500

-1000

50

0

-50

-100

-1500

-2000

0

50

100

150

time/s

200

250

-150

300

0

50

100

150

200

250

300

time/s

Fig. 3. The altitude error

Fig. 4. The velocity error

2

5000

4000

1.5

flight path angle error/deg

527

3000

range error/m

1

0.5

0

2000

1000

0 -0.5

-1

-1000

0

50

100

150

time/s

200

250

300

-2000

0

Fig. 5. The flight path angle error

150

time/s

200

250

300

250

300

1.6

guidance command without constraint

cosine of bank angle with constraint

100

Fig. 6. The range error

1

0.8

0.6

0.4

0.2

0

-0.2

-0.4

50

0

50

100

150

200

250

time/s

Fig. 7. The cosine of bank angle

300

1.4

1.2

1

0.8

0.6

0.4

0.2

0

50

100

150

time/s

200

Fig. 8. The guidance command  u

528

M. Li and R. Guo

5 Conclusion In this paper, the H1 method is proposed. Firstly, the system normalization is done, and the error system of tracking the nominal trajectory is derived. Secondly, the problem is transformed into the problem of solving the HJI equation with control constraints. With the states normalization to avoid numerical problem, the NN is adopted to get the solution. Finally, the simulation is done and the simulation results demonstrate the proposed guidance method is effective to ensure the Mars detector reaching the point of opening the parachute precisely. Acknowledgements. This work is supported by National Natural Science Foundation of China (61873029) and Beijing Natural Science Foundation (4192068).

References 1. Scheeres DJ (1998) Interactions between ground-based and autonomous navigation for precision landing at small soler-system bodies. In: Telecommunications and data acquisition progress report, pp 42–132 2. Kluever CA (2008) Entry guidance performance for Mars precision landing. J Guidance Control Dyn 31(6):1537–1544 3. Wang DY, Guo MW (2015) Review of spacecraft entry guidance. J Astronaut 36(1):1–8 (in Chinese) 4. Garman GL, Ives DG, Geller DK (1998) Apollo-derived Mars precision lander guidance. In: AIAA atmospheric mechanics conference and exhibit. AIAA 5. Li S, Jiang XQ (2015) RBF neural network based second-order sliding mode guidance for Mars entry under uncertainties. Aerosp Sci Technol 43:226–235 6. Liang ZX, Duan GF, Ren Z (2017) Mars entry guidance based on an adaptive reference drag profile. Adv Space Res 60:692–701 7. Kozynchenko AI (2011) Analysis of predictive entry guidance for a Mars lander under high model uncertainties. Acta Astronaut 68:121–132 8. Divya VS, Benjamin R, Lethakumari R (2009) Development of guidance algorithm for Mars entry. In: proceedings of the 10th national conference on technological trends 9. Cheng T, Lewis FL, Abu-Khalaf M (2007) Fixed final time constrained optimal control of nonlinear systems using neural network HJB approach. IEEE Trans Neural Netw 18 (6):1725–1737 10. Beard RW (1995) Improving the closed-loop performance of nonlinear systems. Rensselaer Polytechnic Institute, Troy 11. Wu HN, Li MM, Guo L (2015) Finite-horizon approximate optimal guaranteed cost control of uncertain nonlinear systems with application to entry guidance. IEEE Trans Neural Netw Learn Syst 26(7):1456–1467 12. Wang CZ, Qing HS (2003) Optimal control theory. The Science Press, Beijing

Fault Tolerant Control for Five-Phase Synchronous Reluctance Motor by Third Harmonic Current Injection Guohai Liu(&), Jiajun Ni(&), and Qian Chen(&) School of Electrical and Information Engineering, Jiangsu University, Zhenjiang, China {ghliu,chenqian0501}@ujs.edu.cn, [email protected]

Abstract. Recently, most fault tolerant controls have been applied in permanent magnet synchronous motors (PMSM) and permanent magnet assisted synchronous reluctance motors (PMa-SynRM), however, previous fault tolerant controls are hard to apply into synchronous reluctance motor (SynRM). This is because that torque ripple under these fault tolerant controls is unacceptable. Hence, this paper presents a new fault tolerant control for a five-phase SynRM to reduce torque ripple under single phase fault. Process of calculating third harmonic current is the critical point of this proposed method, which is obtained by neglecting changes of inductance because of small magnitude of third harmonic current. The further Finite Element Analysis (FEA) and experimental results validate the availability of proposed method. Keywords: Synchronous reluctance motor Harmonic injection

 Fault tolerant control 

1 Introduction In recent years, the SynRM has received a greatly increasing interest. The main factors are that the SynRM has no rare earth permanent magnet (PM), which reduces the motor cost, and such motors have high similar design rules [1]. The SynRM has been applied in many different fields, such as household appliances, industrial tools, traction and so on [2, 3]. However, the motor is well known for high torque harmonics due to its hybrid rotor structure where the air gap flux is distorted via series of transversally laminated of flux guides. Depending on the dimensions of flux guides and its end profiles, the ripple is almost equal to the average torque which may seriously impact the motor application. To address this problem, many researchers proposed a number of different methods [3, 4], however, these methods are only suitable for healthy condition. Meanwhile, it is also of great importance for the motor to run under fault condition and a lot of fault tolerant controls have been presented recently. For instance, a post-fault current reconfiguration principle that is keeping fundamental MMF the same as that in healthy condition is presented in [5]. Meanwhile, apply additional limitations like equal joule losses and lowest joule losses. In [6], a new set of fault tolerant currents is proposed through removing the common limitation which is the neutral point current © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 529–536, 2020. https://doi.org/10.1007/978-981-32-9050-1_60

530

G. Liu et al.

should be zero, and reconfiguring the fundamental MMF which is kept the maximum under different fault tolerant controls. In [7], Arafat presented new current sets for PMa-SynRM through an optimal phase advance. However, those strategies above are not suitable for SynRM, the final output torque contains large torque ripple. In this paper, a method of third harmonic current injection in case of fault for SynRM is proposed. The further experimental results prove the validity of proposed method.

2 Fault Tolerant Control Strategy 2.1

Topology and Performance of SynRM Under Healthy Condition

Figure 1 is the topology of the five-phase SynRM with 40 slots and 8 poles. The rated current as well as speed are 10.8 A and 1500 n/min. The unique structure with asymmetry rotor can obtain relatively high output torque and low torque ripple. Additionally, the five-phase winding configuration can offer good fault tolerant capability.

Stator

Winding 6

5

8 1

Rotor 4

Position hole

7

3

2 Rib

Fig. 1. Topology of the SynRM.

Figure 2 presents three rotors to explain the principle of torque ripple reduction. Figure 2(a) is the traditional rotor, marked as Rotor I which has symmetrical adjacent salient poles. However, in Fig. 2(b), Rotor II has some changes that pole 1, 3, 5, 7 keep the same pole embraces as Rotor I, but in pole 2, 4, 6, 8, the pole embraces have a little embrace relatively. As a whole, Rotor II is not symmetrical any more. Nevertheless, the salient poles are fixed without any movement; also, the angle between any two adjacent poles is forty-five degrees. In Fig. 2(c) Rotor III, there have some changes in adjacent salient poles. To be specifically, poles 1 and 2, 3 and 4, 5 and 6 along with 7 and 8 are chosen as Repeating Unit. Additionally, pole 1 and 2 along with 5 and 6 are left as they are. Meanwhile, pole 3 and 4, 7 and 8 rotate a mechanical degrees clockwise. Thus, SynRM with Rotor III can have less torque ripple, mainly from two aspects. Firstly, the unequal pole arcs are selected appropriately to eliminate the second order harmonic ripple. Secondly, the main harmonic ripple decreases by use of shifting pole-pair. Finally, the ripple with load in SynRM with salient poles can be reduced effectively.

Fault Tolerant Control for Five-Phase Synchronous Reluctance Motor

5

Emb1 7 6 hm 45°

hb

5

1

45° 4

Emb1 7 6 hm 45°

8

8 1

45° 4

2

3

hb

(a)

3 Emb2

531

2

(b)

6

Emb1

7 8 45°

5

hm 45°+α 4

1 45°-α

hb 3 Emb2

2

(c) Fig. 2. Proposed SynRM with salient poles. (a) Conventional Rotor I with equal pole embraces. (b) Asymmetrical Rotor II with no displacement. (c) Asymmetrical Rotor III with displacement.

Figure 3 is the torque performance of SynRM with Rotor I and Rotor III, it is noted that both of their average torque are almost the same, but the torque ripple of SynRM with Rotor III is quite less than that with Rotor I. Therefore, it is obvious that the SynRM with this structure has better torque characteristics, namely, higher torque density and less torque ripple. Rotor I

Torque/Nm

10

Rotor III

8 6 4 2 0

0

0.2

0.4 0.6 Time/s

0.8

1.0

Fig. 3. Reluctance torque with Rotor I and Rotor III.

532

G. Liu et al.

2.2

Performance of the SynRM Under Different Fault Tolerant Controls

When adopting the fault tolerant strategies, method I, II and III in [5–7] into this motor, it can be found that the output torque has large ripple. Figure 4(a) demonstrates that the proportions of the torque ripple are 79.5%, 85.12%, 271.11%, respectively, among which the 2nd and 4th harmonic order account for the most, as depicted in Fig. 4(b). It is obvious that the control effects are quite unsatisfactory. Therefore, the third harmonic current can be injected based on these existing strategies and this paper chooses method I in [5] because of its best control effect among three. Method I

Method II

Method III

6

Torque/Nm

Torque/Nm

8 4 2 0 -2

0

0.2

0.4 0.6 Time/s (a)

0.8

1.0

6 5 4 3 2 1 0

Method I

0

Method II

Method III

2 4 10 6 8 Torque harmonic order (b)

Fig. 4. (a) Reluctance torque with different methods. (b) Reluctance torque harmonic order.

2.3

Third Harmonic Current Calculation and Performance of the SynRM with Injection

The stator currents with third harmonic injection can be expressed by (1), it is worth nothing that the fundamental currents are given in [5]. Assuming that phase A is open, so ia = 0. 8   ib ¼ 1:382Im1 sin he  15 p þ a þ Im32 sinð3he þ b32 Þ > > < ic ¼ 1:382Im1 sin he  45 p þ a  þ Im33 sinð3he þ b33 Þ i ¼ 1:382Im1 sin he þ 45 p þ a þ Im34 sinð3he þ b34 Þ > > : d ie ¼ 1:382Im1 sin he þ 15 p þ a þ Im35 sinð3he þ b35 Þ

ð1Þ

Where Im1 means the amplitude of fundamental current. Im32,33,34,35 is the amplitude of third harmonic current. a represents angle of current. b32,33,34,35 means the angle of phase. he is the rotor electrical position. Without regard to the magnetic saturation, the common torque formula of SynRM can be expressed by

Fault Tolerant Control for Five-Phase Synchronous Reluctance Motor

533

1 dLa 1 2 dLb 1 2 dLc 1 2 dLd 1 dLe þ ib þ ic þ id þ i2e Tr ¼ i2a 2 dh 2 dh 2 dh 2 dh 2 dh dMab dMac dMad dMae þ ia ic þ ia id þ ia ie þ ia ib dh dh dh dh dMbc dMbd dMbe þ ib id þ ib ie þ ib ic dh dh dh dMcd dMce dMde þ ic ie þ id ie þ ic id dh dh dh

ð2Þ

Where iabcde means the five phase currents. Labcde and Mxy (xy means the mixture of each phase) are the self- and mutual-inductance, respectively. h represents the mechanical rotor position. Here, ia = 0. The self- and mutual-inductances can be obtained through FEA and Fast Fourier Transformation (FFT), which can be expressed by (3) and (4), respectively. And both of them mainly have even harmonics. Normally, the self- and mutual- inductances change as currents change, but here, the change of inductance can be neglected because the magnitude of injected third harmonic current is quite low. Lðhe Þ ¼ L0 þ

1 X

L2k cosð2khe þ c2k Þ

ð3Þ

  0 M2k cos 2khe þ c2k

ð4Þ

k¼1

M ð he Þ ¼ M 0 þ

1 X k¼1

Through analysis, it can be found that the ripple generated by cogging torque accounts for the most which cannot be neglected any more. The cogging torque can be calculated from FEA. Therefore, balance between the torque by harmonic injection and ripple should be achieved. The expression can be described by (5). It is worth nothing that the torque caused by interrelation between inductance harmonic and current harmonic (torque term Tr3 (I23)) can be ignored because of its small magnitude Tr3 þ Tcog ¼ 0

ð5Þ

Where Tr3 means the torque generated by the third harmonic currents, Tcog represents cogging torque. When the motor is in case of fault, the cogging torque contains large ripple and cannot be ignored any more. And it is found that, the same as inductance, the cogging torque changes as currents change. Here, it can also be neglected because of the small magnitude of third harmonic current. Through substituting (1), (2), (3), (4) into (5), harmonic currents can be obtained finally. Figure 5 is the simulation results of reluctance torque before and after injection, as well as torque harmonic order. Figure 5(a) shows the torque ripple was reduced dramatically, from 79.35% to 55.02%, after injecting third harmonic current. Meanwhile, as demonstrated in Fig. 5(b), the 4th order torque ripple decreased most.

534

G. Liu et al.

Pre-injection

Post-injection

6

Torque/Nm

Torque/Nm

8

4 2 0

0

0.2

0.4 0.6 Time/s

0.8

1.0

6 5 4 3 2 1 0

Pre-injection

0

Post-injection

2 4 6 8 10 Torque harmonic order

(a)

(b)

Fig. 5. (a) Reluctance torque pre- and post-injection. (b) Reluctance torque harmonic order

3 Experimental Results Figure 6 is the experimental platform which is built to prove the effectiveness of proposed fault tolerant control. The platform makes up of a DC generator whose DC-link voltage is 50 V, a dSPACE1005 controller which is employed to run control algorithm, a five phase half-bridge inverter, an oscilloscope, a five phase SynRM, a torque sensor (HBMT20WN/20NM) which is used to measured output torque and a load.

Fig. 6. Experimental test platform.

Figures 7 and 8 are experimental results of output torque and currents. First, as shown in Fig. 7(a), compared with the torque under normal condition, it is obvious that the output torque still contains large torque ripple though adopting the fault tolerant method in [5] and the post-fault currents keep sinusoidal as usual. Figure 7(b) demonstrates that torque ripple decreased obviously, from approximately 250% to 150% after injecting third harmonic current, which can indicate that torque ripple reduction is really realized with injection. The final results also achieved the same effects in Fig. 8. When adopting the method III in [7], the final output torque ripple reached 500%, which is depicted in Fig. 8(a) and is worse than method I. Figure 8(b)

Fault Tolerant Control for Five-Phase Synchronous Reluctance Motor

535

demonstrates that the ripple decreased to about 150% after the injection. In summary, it is noted that when only adopting existing fault tolerant controls, the final control effects for SynRM are unsatisfactory. Nevertheless, the proposed method with third harmonic current injection can achieve better torque performance and less torque ripple.

Tr

Tr

Normal condition

Fault

Zoom1

Method I

Tr

Zoom2 Tr iA iB iC

Method I

3rd harmonic current injection

Zoom1 iA

Zoom2 iB iC

(a)

(b)

Fig. 7. (a) Experimental waveforms under normal condition and method I. (b) Experimental waveforms under method I and with 3rd harmonic current injection.

Tr

Tr

Normal condition

Zoom1 iA iB iC

Fault

Method III

Zoom2

Tr

Tr

Method III

Zoom1 iA

3rd harmonic current injection

Zoom2 iB iC

Fig. 8. (a) Experimental waveforms under normal condition and method III. (b) Experimental waveforms under method III and with 3rd harmonic current injection.

4 Conclusion A fault tolerant control strategy by third harmonic currents injection for SynRM is proposed in this paper. Fundamental currents can be still kept the same as traditional fault tolerant control, and third harmonic currents are obtained by neglecting changes of self- and mutual-inductance and cogging torque because of their slight changes. For SynRM, the torque ripple decreased effectively when adopting the proposed method, which is better than other existing fault tolerant controls. Based on the analysis above, the effectiveness of proposed method with current harmonics injection can be proved by FEA and experimental results.

536

G. Liu et al.

References 1. Babetto C, Bacco G, Bianchi N (2018) Synchronous reluctance machine optimization for high-speed applications. IEEE Trans Eng Convers 33(3):1266–1273 2. Bianchi N, Bolognani S, Carraro E, Castiello M, Fornasiero E (2016) Electric vehicle traction based on synchronous reluctance motors. IEEE Trans Ind Electron 55(6):4762–4769 3. Lee J, Jung D, Lim J, Lee K, Lee J (2018) A study on the synchronous reluctance motor design for high torque by using RSM. IEEE Trans Magn 55(3):1–5 4. Diao X, Zhu H, Qin Y, Hua Y (2018) Torque ripple minimization for bearingless synchronous reluctance motor. IEEE Trans. Appl. Supercond. 28(3):1–5 5. Tian B, An Q, Duan J, Sun D, Sun L, Semenov D (2017) decoupled modeling and nonlinear speed control for five-phase PM motor under single-phase open fault. IEEE Trans. Power Electron. 32(7):5473–5486 6. Sui Y, Zheng P, Yin Z, Wang M, Wang C (2019) Open-circuit fault-tolerant control of fivephase PM machine based on reconfiguring maximum round magnetomotive force. IEEE Trans Ind Electron 66(1):48–49 7. Arafat A, Choi S (2017) Optimal phase advance under fault tolerant control of five-phase permanent magnet assisted synchronous reluctance motor. IEEE Trans Ind Electron 65 (4):2915–2924

Echo State Network with Hub Property Fanjun Li1(&), Ying Li2, and Xiaohong Wang3 1

School of Mathematical Sciences, University of Jinan, Jinan, China [email protected] 2 School of Science, Qilu University of Technology, Jinan, China 3 School of Electrical Engineering, University of Jinan, Jinan, China

Abstract. Reservoir computing, as an effective approach of training recurrent neural network, has drawn wide attention for its superior performance on some benchmark problems. Reservoirs which are closer to the topology of the brain have shown better performance. It has been found that some neurons in the brain act as hubs integrating and distributing information. By simulating the hub property, this paper proposed a novel topology for dynamical reservoir, called echo state network (ESN) with hub property (HESN). Different from conventional reservoir, some neurons acting as hubs are added to the reservoir of HESN. Experimental results show that our proposed approach has improved the performance of the original ESN on two benchmark datasets. Keywords: Reservoir computing

 Echo state network  Hub  Prediction

1 Introduction Mathematically, recurrent neural networks (RNNs) can approximate arbitrary nonlinear dynamical system with arbitrary precision in theory [1]. However, most gradient-based methods are difficult to train RNNs because of local minimum [2]. Reservoir computing (RC) has shown to be an efficient alternative to gradient-based learning algorithms for training RNNs in most cases [3]. As one of the most promising RC approaches, echo state network (ESN) has been researched widely since it has been introduced, for its better performance on some benchmark problems [4]. The key part of an ESN is a large and sparsely connected recurrent layer named dynamical reservoir [5]. The topology structure of reservoirs has important effects on the performance of ESN. In recent decades, some more efficient reservoir topologies have been proposed to improve the performance of ESN. Reservoir with small-world topology significantly improves the performance of ESN [6]. Simple cycle reservoir (SCR) with the minimum complexity often obtains performance matching with those of the conventional ESN [7]. Decoupled echo state network (DESN) with lateral inhibition exhibits the lower generalization error and better robustness compared with the random reservoir [8]. Cycle reservoir with Jumps (CRJ) shows better performance than the conventional ESN on some benchmark problems [9]. Growing ESN with multiple sub-reservoirs automatically determines its reservoir size to match with the given data

© Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 537–544, 2020. https://doi.org/10.1007/978-981-32-9050-1_61

538

F. Li et al.

sets [10]. It has been proved that the hierarchical reservoir can cope with dynamical concepts at several hierarchical timescales and levels of representation [11]. The reservoir which is closer to the topology of the brain has been shown better performance [12]. It has been found that there are some regions in human functional brain networks acting as hubs to integrate and distribute information in powerful ways [13]. These findings are useful for designing good reservoirs. Inspired by all the aforementioned results, we propose a novel topology structure of reservoir to improve the performance of ESN, called ESN with hub property (HESN). In HESN, a reservoir with multiple sub-reservoirs is used, and some neurons as a hub layer are added to the network between the sub-reservoir layer and the output layer. The hub layer integrates the output signals of sub-reservoirs and input layer, then feeds these signals back to sub-reservoirs and output layer. All sub-reservoirs intercommunicate with each other through the hub layer only. The remaining part of this paper is organized as follows. In Sect. 2, we introduce the basic idea of the conventional ESN. In Sect. 3, the proposed HESN is presented in detail. Simulation results are presented to analyze the performance of the presented HESN in Sect. 4. Finally, Sect. 5 concludes this paper.

2 Echo State Network It can be seen form Fig. 1 that, ESN implements a discrete-time dynamical system by means of an untrained recurrent reservoir layer and a trained linear readout. Let W denote the reservoir weight matrix, Win represent the input weight matrix and Wout indicate the output weight matrix, then the supervised training process of ESN is carried out by updating the reservoir states and network outputs as follows, xðnÞ ¼ f ðWxðn  1Þ þ W in uðnÞÞ

ð1Þ

yðnÞ ¼ W out ½xðnÞT uðnÞT T

ð2Þ

where x(n), u(n) and y(n) are the outputs of reservoir neurons, input neurons and output neurons respectively. For the sake of reducing the influence of arbitrarily chosen initial reservoir states on the calculated output weights, a fixed number of initial reservoir states should be given up, named washout period. After an initial washout period, the input sequence and the reservoir activities are stored in the matrix H as follows, H ¼ ½Xð1Þ; Xð2Þ;    ; XðnÞT

ð3Þ

Let T indicate the target output matrix. Suppose linear readouts are used, the output matrix can be adjusted as follows. W out ¼ ððH T HÞ1 H T TÞT

ð4Þ

Echo State Network with Hub Property Input layer

Reservoir layer

539

Output layer

Fig. 1. The topology of conventional ESN Reservoir layer Input layer

Output layer

Fig. 2. The topology of the proposed HESN

3 Echo State Network with Hub Property As shown in Fig. 2, the reservoir of HESN consists of two layers, one is the subreservoir layer and the other is the hub layer. The hub layer receives the output signals from both the input layer and the sub-reservoir layer. It is necessary to note that, each neuron in hub layer receives the output signals of one sub-reservoir only, and there are no connections among neurons in hub layer. After being calculated in hub layer, these signals are fed back to all sub-reservoirs. Input layer, sub-reservoir layer and hub layer are all connected to output layer to approximate the target output signals. It can be seen from Fig. 2 that all the sub-reservoirs intercommunicate with each other through the hub layer only. Obviously, the hub layer integrates and distributes information in powerful ways in the network.

540

F. Li et al.

In HESN, only the output weights need to be optimized, the other weighs randomly generated in some given interval. Given an input sequence uðnÞ and the number of subreservoirs J, the sub-reservoir states xi ðnÞ are updated as follows, hb xi ðnÞ ¼ f r ðW i xi ðn  1Þ þ W in i uðnÞ þ W i zðn  1ÞÞ

ð5Þ

hb where W i and W in i are the weight matrix for the ith sub-reservoir, W i is the weight matrix from the hub layer to the ith sub-reservoir, zðn  1Þ is the last output signals of hub layer, and f r ðÞ is the activation function for sub-reservoirs. Define XðnÞ as (6),

XðnÞ ¼ ½uT ðnÞ; xT1 ðnÞ; xT2 ðnÞ;    ; xTJ ðnÞT

ð6Þ

Then the output signals of hub layer can be obtained as follows, zðnÞ ¼ f h ðW h XðnÞÞ

ð7Þ

where W h is the weight matrix feeding signals to hub layer, and f h ðÞ is the activation function for neurons in the hub layer. Storage all the output signals from input layer, sub-reservoir layer and hub layer in ZðnÞ as (8), ZðnÞ ¼ ½XT ðnÞ; zT ðnÞT

ð8Þ

^ After an initial washout period, the output signals are stored in the matrix H, ^ ¼ ½Zð1Þ; Zð2Þ;    ; ZðnÞT H

ð9Þ

^ denote the target output matrix for HESN, the output weight matrix W ^ out is Let T obtained as follows, ^ out ¼ ððH ^ 1 H ^ T TÞ ^ T ^ T HÞ W

ð10Þ

The key steps of HESN can be described as the following algorithm. Algorithm 1: Given spectral radius ai , sparsity spi and sub-reservoir size ni for the ith sub-reservoir 1  i  J. Step 1: Produce J sub-reservoirs denoted as ðW i ; W in i ; ai ; spi Þ; Step 2: Run all sub-reservoirs with the training input signals uðnÞ and the feedback signals from hub layer, then collect the sub-reservoir states xi ðnÞ after an initial washout period; Step 3: Calculate the states of hub layer with random weights W h , and feed these signals back to sub-reservoir layer; ^ out according to (10); Step 4: Obtain the output weight W Step 5: Evaluate the trained HESN on testing data sets.

Echo State Network with Hub Property

541

4 Experiments 4.1

Mackey–Glass System

As benchmark problem, Mackey–Glass system (MGS) is described by the time-delay differential system as follows, dxðtÞ axðt  sÞ ¼ þ bxðtÞ dt 1 þ xn ðt  sÞ

ð11Þ

where n ¼ 10, a ¼ 0:2, b ¼ 0:1, s ¼ 17. 7000 points are generated using the fourthorder Runge–Kutta method and split into two parts with length of 3000 and 4000 for training and testing respectively. HESN with output feedback is used in this section, the output feedback weights are randomly generated on interval (−1, 1) under uniform distribution. For testing, the trained network is teacher forced for 2000 steps, then left running freely and the network’s continuation is compared with the real continuation after 84 steps. After 100 independent runs, the testing NRMSE84 can be calculated as follows, NRMSE84 ¼ ð

X100 ðti ð2084Þ  yi ð2084ÞÞ2 i¼1

100r2

Þ1=2

ð12Þ

where yi(2084) is the trained network’s prediction output, ti(2084) is the correct value, and r2 is the variance of the original signal. The parameter setting and experimental results are listed in Table 1. It can be seen from Table 1 that, compared with other algorithms, the proposed HESN has much smaller testing NRMSE84, which means better prediction ability. The comparisons of prediction results are shown in Fig. 3, the upper half part of which shows the superposition between the outputs of models and the corresponding targets, and the lower half part is the corresponding prediction errors. It can be seen from Fig. 3 that, the proposed HESN can precisely predict the target signals, even after 1600 steps. In order to test the robustness of HESN, uniform noise of size 1e−2 is added to the training data set and the testing data set keeps noise-free. After 100 independent runs, the testing NRMSE84 is listed in Table 2 for all models. It can be seen from Table 2 that, the proposed HESN has smaller testing NRMSE84, which means better robustness than the other mentioned algorithms.

Table 1. Parameter setting and experimental results for MGS without noise. Approach HESN GESN ESN DESN SCR

Testing NRMSE84 6.30e−05 1.32e−04 1.58e−04 1.50e−04 5.39e−04

Size for reservoir Spectral radius Sparsity 1000 0.8500 0.0958 1000 0.9483 0.0050 1000 0.8000 0.0100 1000 0.8000 0.0250 1000 0.8000 0.0010

542

F. Li et al. Table 2. Parameter setting and experimental results for MGS with noise. Approach HESN GESN ESN DESN SCR

Testing NRMSE84 2.60e−02 3.14e−02 3.12e−02 3.10e−02 3.22e−02

Size for reservoir Spectral radius Sparsity 400 0.8500 0.1125 280 0.9132 0.0180 400 0.9000 0.0350 400 0.8000 0.0350 300 0.9000 0.0033

Table 3. Parameter setting and experimental results for sunspot series. Approach HESN GESN ESN DESN SCR

4.2

Testing NRMSE 0.0223 ± 7.0728e−6 0.0254 ± 1.3666e−5 0.0258 ± 1.4470e−5 0.0329 ± 4.8131e−5 0.0257 ± 1.3699e−5

Size for reservoir Spectral radius Sparsity 70 0.9500 0.2057 70 0.9132 0.0714 200 0.9000 0.0450 200 0.8000 0.0350 200 0.9000 0.005

Sunspot Series

Because of the complexity of the underlying solar activity, forecasting the sunspot series is a challenging task and is usually used to test the performance of some models. In this experiment, one-step-ahead prediction of monthly mean Wolf sunspot number is conducted by the proposed HESN. The data set has a total of 3174 sample points from January 1749 to June 2013, which is split into two parts with length of 2100 and 1074 for training and testing respectively. Before the data set is used for the inputs of the network, normalization is conducted. The performance of all methods is evaluated by the normalized root mean square error (NRMSE). Smaller values mean better performance.

Fig. 3. Comparison of prediction results for MGS

Echo State Network with Hub Property

543

Fig. 4. Comparison of prediction results for sunspot series

After 100 independent runs, the selected parameters for all algorithms and the statistical results for testing NRMSE are listed in Table 3, including mean and variance. It can be seen form Table 3 that, the proposed HESN has the smallest mean and variance than the other mentioned algorithms, which means better prediction ability and better robustness to weight initialization. For all mentioned algorithms, the prediction results are shown in Fig. 4, the upper half part of which shows the superposition between the outputs of models and the corresponding targets, and the lower half part is the corresponding prediction errors. It can be seen form Fig. 4 that, the proposed HESN predicts the sunspot series better than the other mentioned algorithms. The prediction errors of HESN lie in between −2.5 and 2.5 in most points.

5 Conclusion A good reservoir is necessary for better performance of an ESN. Reservoir which are closer to the topology of the brain have shown better performance. This paper proposes a novel topology for reservoir by simulating the hub property in the brain. Experimental results on two benchmark problems show that the proposed HESN outperforms the other mentioned schemes in prediction ability and robustness. However, this paper only offers an initial exploration for the novel reservoir topology. More should be done to further analyze the proposed method in our future work. Acknowledgment. We acknowledge the Natural Science Foundation of china under Grant 61807015, as well as the Natural Science Foundation of Shandong Province under Grants ZR2017MF013.

544

F. Li et al.

References 1. Grigoryeva L, Ortega JP (2018) Echo state networks are universal. Neural Netw 108:495– 508 2. Pascanu R, Mikolov T, Bengio Y (2013) On the difficulty of training recurrent neural networks. In: International conference on international conference on machine learning, vol 52, pp 1310–1318 3. Lukoševičius M, Jaeger H (2009) Reservoir computing approaches to recurrent neural network training. Comput Sci Rev 3(3):127–149 4. Qiao J, Lei W, Yang C et al (2018) Adaptive Levenberg-Marquardt algorithm based echo state network for chaotic time series prediction. IEEE Access 6(99):10720–10732 5. Jaeger H, Haas H (2004) Harnessing nonlinearity: predicting chaotic systems and saving energy in wireless communication. Science 304(5667):78–80 6. Yuji K, Jihoon P, Minoru A (2019) A small-world topology enhances the echo state property and signal propagation in reservoir computing. Neural Netw 112:15–23 7. Rodan A, Tino P (2011) Minimum complexity echo state network. IEEE Trans Neural Netw 22(1):131–144 8. Xue Y, Yang L, Haykin S (2007) Decoupled echo state networks with lateral inhibition. Neural Netw 20(3):365–376 9. Rodan A, Tiňo P (2012) Simple deterministically constructed cycle reservoirs with regular jumps. Neural Comput 24(7):1822–1852 10. Qiao J, Li F, Han H, Li W (2017) Growing echo-state network with multiple subreservoirs. IEEE Trans Neural Netw Learn Syst 28(2):391–404 11. Malik ZK, Hussain A, Wu QJ (2017) Multilayered echo state machine: a novel architecture and algorithm. IEEE Trans Cybern 47(4):1–14 12. Enel P, Procyk E, René Q et al (2016) Reservoir computing properties of neural dynamics in prefrontal cortex. PLoS Comput Biol 12(6):e1004967 13. Heuvel MPVD, Sporns O (2013) Network hubs in the human brain. Trends Cogn Sci 17(12):683–696

Robust Control of Fractional-Order Horizontal Platform System with Input Saturation Xiaomin Tian(&) and Zhong Yang College of Intelligent Science and Control Engineering, Jinling Institute of Technology, Nanjing 211169, China [email protected]

Abstract. This paper investigates the stabilization of fractional-order horizontal platform system (FOHPS) subject to input saturation. The influences of unmodeled uncertainties and external perturbation are taken into account in advance. Appropriate robust control laws are proposed to undertake this uncertainties. Then a fractional-order version of Lyapunonv function is given to verify the stability of uncertain FOHPS considering the effect of input saturation. Simulation results are given to show the feasibility and robustness of the proposed control strategy. Keywords: Fractional-order system Robust control  Input saturation

 Horizontal platform system 

1 Introduction Fractional calculus and its applications in different areas have received increasing attention during the last two decades [1–4]. Fractional-order chaotic system is a wellknown system and a lot of documents have demonstrated that fractional-order chaotic systems possess some unique properties [5–9]. In recent years, some research on HPS have been developed [10–12]. It is a mechanical apparatus that can allodially circle around the horizontal axis. The horizontal platform apparatuses are widespread applied in offshore and earthquake engineering. It is characterized that this kinds of systems show a variety of dynamical behaviors containing both chaotic and regular motions [13]. However there are little literatures about the control of fractional-order horizontal platform system. Meanwhile, these methods mentioned above are concluded ground on the perfect conception of the control inputs, practically, because of the finite manipulation of control actuators, majority physical systems are subjected to input constraint. The saturation nonlinearity is often encountered in varieties of engineering systems, which may result in the motions beyond expectation. Thus it is emergency to think the influences of the input saturation. Furthermore, almost all control strategy in prior literature are concentrate on analyzing the stability of fractional-order systems by using conventional Lyapunov theory, the application of fractional-order Lyapunov function is still an difficult work and rare documents are devote to this issue. For another, most of the previous research results have focus on the robust control without system uncertainties and external perturbations. However, because of the © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 545–552, 2020. https://doi.org/10.1007/978-981-32-9050-1_62

546

X. Tian and Z. Yang

sensibility of the chaotic system to system uncertainties, there having finite information about the full dynamics of the system in reality, so, it is necessarily to design a robust controller to deal with these uncertainties. Therefore, in the paper, a robust control strategy for FOHPS with uncertainties and input saturation is researched. It is strongly expect that there are high latent energy in the given method. The content of the paper is construct as follows. Section 2 gives the relevant definition and lemma. In Sect. 3, main results are proposed. In Sect. 4, simulation example is revealed. In the end, conclusions are involved in Sect. 5.

2 Definition and Lemma The main used definition in fraction calculus computation is caputo definition. Definition 1. The a-order caputo fractional derivative of f ðtÞ is given as follows ( a t0 Dt f ðtÞ

¼

R t f ðmÞ ðsÞ 1 CðmaÞ t0 ðtsÞam þ 1 dm dtm f ðtÞ;

ds;

m  1\a\m a¼m

ð1Þ

where m is the smallest integer number, larger than a. Lemma 1. Consider the autonomous system Da x ¼ Ax or Da x ¼ f ðxÞ

ð2Þ

where a 2 ð0; 1 is the system fractional order and x ¼ ½x1 ; x2 ; . . .; xn T is the state variable vector. A 2 Rnn is a constant matrix. If there is a real symmetric positive definite matrix P such that the inequation J ¼ xT PDa x  0 always holds for any states variable, then system (2) is asymptotic stable [14, 15].

3 Main Results According to the previous literatures, and consider the model uncertainties, external disturbances and input saturation constraints, the model of FOHPS can be described as Da x1 ¼ x2 þ Df1 ðxÞ þ d1 ðtÞ þ Satðu1 ðtÞÞ Da x2 ¼ ax2  b sin x1 þ l cos x1 sin x1 þ h cos xt þ Df2 ðxÞ þ d2 ðtÞ þ Satðu2 ðtÞÞ ð3Þ in which a 2 ð0; 1Þ is the system fractional order, x ¼ ½x1 ; x2 T is the state vector, Dfi and di ðtÞ, i ¼ 1; 2 represent are unmodeled uncertainties and external perturbations, respectively. Satðui ðtÞÞ, i ¼ 1; 2 is the nonlinear saturation input, and the system parameters a ¼ 4=3, b ¼ 3:776, l ¼ 4:6  106 , h ¼ 34=4.

Robust Control of Fractional-Order Horizontal Platform System

Assumption 1. The nonlinear saturation function is described in: 8 if uðtÞ  uh < uH ; SatðuðtÞÞ ¼ huðtÞ; if ul  uðtÞ  uh : uL ; if uðtÞ  ul

547

ð4Þ

in which, uH , uh 2 R þ , uL , ul 2 R are bounds of saturation function, h 2 R is linear region slope. Subsequently, the above saturation function can be rewritten as SatðuðtÞÞ ¼ uðtÞ þ DuðtÞ

ð5Þ

8 if uðtÞ  uh < uH  uðtÞ; DuðtÞ ¼ ðh  1ÞuðtÞ; if ul  uðtÞ  uh : uL  uðtÞ; if uðtÞ  ul

ð6Þ

and DuðtÞ is satisfied as

Assumption 2. It is assumed that unmodeled uncertainties and external perturbations Dfi ðxÞ þ di ðtÞ, i ¼ 1; 2 is confined as follows: jDfi ðxÞ þ di ðtÞj  ci

ð7Þ

where ci is a positive constant, in this paper, two situations about ci are unknown or given both considered. Assumption 3. It is rational that to suppose the input uncertainties Dui ðtÞ, i ¼ 1; 2 is confined by: jDui ðtÞj  /i

ð8Þ

here /i is an unknown positive constant. How to design an adaptive controller to realize the robust stabilization of system (3) with system uncertainties and nonlinear saturation inputs is the main control aim of this paper. Next, we give specific steps to design the appropriate controller. 3.1

The Bounds of System Uncertainties Are Known in Advance

Theorem 1. Consider the fractional-order horizontal platform system (3), if the bounds of unmodeled uncertainties and external perturbations are known previously, then controller can be designed as ^ þ k1 Þsgnðx1 Þ u1 ðtÞ ¼ ðjx2 j þ c1 þ / 1 ^ þ k2 Þsgnðx2 Þ u2 ðtÞ ¼ ðajx2 j þ b þ l þ h þ c þ / 2

2

ð9Þ

548

X. Tian and Z. Yang

where sgnðÞ is the sign function, for avoiding chattering, tanhðÞ can be used to ^ is the estimation of / , and the unknown parameters / is substitute sign function, / i i i updated by ^ ¼ q j xi j Da / i i

ð10Þ

in which, qi , i ¼ 1; 2, is constant update gain, then the robust stabilization of FOHPS (3) can be realized. Proof. Based on Lemma 1, select the positive definite matrix 0

1 B0 P¼B @0 0

0 1 0 0

0 0 1 q1

0

1 0 0C C 0A 1 q2

~ ;/ ~ T , where / ~ ¼/ ^  / , i ¼ 1; 2 then and denote X ¼ ½x1 ; x2 ; / 1 2 i i i J ¼ X T PDa X 1 ~ a~ 1 ~ a~ / D /1 þ / D /2 q1 1 q2 2 ¼ x1 ðx2 þ Df1 ðxÞ þ d1 ðtÞ þ Satðu1 ðtÞÞÞ þ x2 ðax2  b sin x1 þ l cos x1 sin x1 1 ~ a~ 1 ~ a~ þ h cos xt þ Df2 ðxÞ þ d2 ðtÞ þ Satðu2 ðtÞÞÞ þ / D /1 þ / D /2 q1 1 q2 2

¼ x1 Da x1 þ x2 Da x2 þ

ð11Þ

¼ x1 x2 þ x1 Df1 ðxÞ þ x1 d1 ðtÞ þ x1 Satðu1 ðtÞÞ  ax22  bx2 sin x1 þ lx2 cos x1 sin x1 1 ~ a~ 1 ~ a~ / D /2 þ hx2 cos xt þ x2 Df2 ðxÞ þ x2 d2 ðtÞ þ x2 Satðu2 ðtÞÞ þ / 1 D /1 þ q1 q2 2

According to Eq. (5), it obvious that J  jx1 jjx2 j þ jx1 jjDf1 ðxÞ þ d1 ðtÞj þ jx1 jjDu1 j þ x1 u1 þ ajx2 j2 þ bjx2 j þ ljx2 j þ hjx2 j þ jx2 jjDf2 ðxÞ þ d2 ðtÞj þ jx2 jjDu2 j þ x2 u2 1 ~ a~ 1 ~ a~ / D /1 þ / þ D /2 q1 1 q2 2

ð12Þ

Substituting Eq. (9) into Eq. (12), it yields J  jx1 jjx2 j þ jx1 jjDf1 ðxÞ þ d1 ðtÞj þ jx1 jjDu1 j þ x1 ððjx2 j þ c1 ^ þ k1 Þsgnðx1 ÞÞ þ ajx2 j2 þ bjx2 j þ ljx2 j þ hjx2 j þ/ 1

þ jx2 jjDf2 ðxÞ þ d2 ðtÞj þ jx2 jjDu2 j þ x2 ððajx2 j þ b ~ Da / ~ þ 1/ ~ Da / ~ ^ þ k2 Þsgnðx2 ÞÞ þ 1 / þ l þ h þ c2 þ / 2 1 2 q1 1 q2 2

ð13Þ

Robust Control of Fractional-Order Horizontal Platform System

549

Due to xi sgnðxi Þ ¼ jxi j, i ¼ 1; 2, we have ^ þ k1 Þ j x1 j J  jx1 jjDf1 ðxÞ þ d1 ðtÞj þ jx1 jjDu1 j  ðc1 þ / 1 ^ þ k2 Þjx2 j þ jx2 jjDf2 ðxÞ þ d2 ðtÞj þ jx2 jjDu2 j  ðc þ / 2

2

ð14Þ

1 ~ a~ 1 ~ a~ þ / D /1 þ / D /2 q1 1 q2 2 According to Eq. (7), and inserting Eq. (10) into Eq. (14), we obtain ^ þ k1 Þjx1 j þ c jx2 j þ / jx2 j J  c1 jx1 j þ /1 jx1 j  ðc1 þ / 1 2 2 ~ j x1 j þ / ~ j x2 j ^ þ k2 Þ j x2 j þ /  ðc þ / 2

2

1

2

¼ k1 jx1 j  k2 jx2 j

ð15Þ

  kðjx1 j þ jx2 jÞ\0 where k ¼ minfk1 ; k2 g. On account of J\0, combine to Lemma 1, the stabilization of FOHPS with input saturation is realized. 3.2

The Bounds of System Uncertainties Are Unknown in Advance

Theorem 2. Considering the fractional-order horizontal platform system (3) with unknown unmodeled uncertainties and external perturbations, if the controller is designed as ^ þ k1 Þsgnðx1 Þ u1 ðtÞ ¼ ðjx2 j þ ^c1 þ / 1 ^ þ k2 Þsgnðx2 Þ u2 ðtÞ ¼ ðajx2 j þ b þ l þ h þ ^c þ / 2

ð16Þ

2

for deal with these unknown parameters /i , ci , the adaptive rules about the estimation of unknown parameters are given as follows ^ ¼ q jxi j; Da / i i

Da^ci ¼ gi jxi j;

ð17Þ

where qi , gi , i ¼ 1; 2, are constant update gain, then the robust stabilization of FOHPS (3) can be implemented. Proof. Similar with Theorem 1, select the following positive definite matrix 0

1 B0 B B0 B P ¼ B0 B B @0 0

0 1 0 0 0 0

0 0 1 q1

0 0 0

0 0 0 1 q2

0 0

0 0 0 0 1 g1

0

1 0 0C C 0C C 0C C C 0A 1 g2

550

X. Tian and Z. Yang

~ ;/ ~ ; ~c ; ~c T , where / ~ ¼/ ^  / , ~c ¼ ^c  c , i ¼ 1; 2, and denote X ¼ ½x1 ; x2 ; / 1 2 1 2 i i i i i i then J ¼ X T PDa X 1 ~ a~ 1 ~ a~ 1 1 / D /1 þ / D /2 þ ~c1 Da~c1 þ ~c2 Da~c2 q1 1 q2 2 g1 g2 ¼ x1 ðx2 þ Df1 ðxÞ þ d1 ðtÞ þ Satðu1 ðtÞÞÞ þ x2 ðax2  b sin x1 þ l cos x1 sin x1 1 ~ a~ 1 ~ a~ / D /2 þ h cos xt þ Df2 ðxÞ þ d2 ðtÞ þ Satðu2 ðtÞÞÞ þ / 1 D /1 þ q1 q2 2 1 1 ~c Da~c1 þ ~c2 Da~c2 þ g1 1 g2

¼ x1 Da x1 þ x2 Da x2 þ

ð18Þ

¼ x1 x2 þ x1 Df1 ðxÞ þ x1 d1 ðtÞ þ x1 Satðu1 ðtÞÞ  ax22  bx2 sin x1 þ lx2 cos x1 sin x1 1 ~ a~ 1 ~ a~ þ hx2 cos xt þ x2 Df2 ðxÞ þ x2 d2 ðtÞ þ x2 Satðu2 ðtÞÞ þ / D /1 þ / D /2 q1 1 q2 2 1 1 ~c1 Da~c1 þ ~c2 Da~c2 þ g1 g2

according to Eqs. (5), (16) and (17), it yields J  jx1 jjx2 j þ jx1 jjDf1 ðxÞ þ d1 ðtÞj þ jx1 jjDu1 j þ x1 u1 þ ajx2 j2 þ bjx2 j 1 ~ a~ þ ljx2 j þ hjx2 j þ jx2 jjDf2 ðxÞ þ d2 ðtÞj þ jx2 jjDu2 j þ x2 u2 þ / D /1 q1 1 1 ~ a~ 1 1 /2 D /2 þ ~c1 Da~c1 þ ~c2 Da~c2 þ ð19Þ q2 g1 g2 ^ þ k1 Þjx1 j þ c jx2 j þ / jx2 j  ð^c þ / ^ þ k2 Þjx2 j ¼ c jx1 j þ / jx1 j  ð^c þ / 1

1

1

1

2

2

2

2

~ jx2 j þ ~c jx1 j þ ~c jx2 j ~ j x1 j þ / þ/ 1 2 1 2 ¼ k1 jx1 j  k2 jx2 j   kðjx1 j þ jx2 jÞ\0 where k ¼ minfk1 ; k2 g. On account of J\0, focus on Lemma 1, the stabilization of FOHPS with unknown system uncertainties is achieved.

4 Simulation Example Simulation examples are given in this section to verify the feasibility and efficacy of the presented control strategy. In system (3), when a ¼ 0:7, the system without control can behave chaotically. Selecting Df1 ðxÞ þ d1 ðtÞ ¼ 0:2 cos x1 þ 0:1 sin 2t, Df2 ðxÞ þ d2 ðtÞ ¼ 0:1 sin x2 þ 0:2 cos 2t, the nonlinear saturation function Satðui ðtÞÞ in this example is 8 < 5; Satðu1 ðtÞÞ ¼ 5u1 ðtÞ; : 5;

if u1 ðtÞ  1 if 1  u1 ðtÞ  1 if u1 ðtÞ  1

ð20Þ

Robust Control of Fractional-Order Horizontal Platform System

8 < 8; Satðu2 ðtÞÞ ¼ 4u2 ðtÞ; : 8;

551

if u2 ðtÞ  2 if 2  u2 ðtÞ  2 if u2 ðtÞ  2

ð21Þ

^ ð0Þ ¼ 0, The starting conditions are randomly selected as xð0Þ ¼ ½1; 2T , / 1 ^ ð0Þ ¼ 0, the positive constants are chosen as q ¼ 2, q ¼ 5, k1 ¼ k2 ¼ 10. The / 2 1 2 time evolution of state variables in system (3) with controller activated is displayed in Fig. 1. 1 x1 x2

0.5

-0.5

1

x ,x

2

0

-1

-1.5

-2 0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

t

Fig. 1. Time response of FOHPS (3) with controller activated

Obviously, under the control of robust controller, all state trajectories converge to zero asymptotically.

5 Conclusions In this paper, a robust control scheme is investigated to research the stabilization of fractional-order horizontal platform system. The system is perturbed by the unmodeled uncertainties and external perturbation, and the effects of input saturation are considered. Through use the fractional version of Lyapunov function, the feasibility and robustness of the introduced control strategy is proved. Simulation example is provided to confirm the effectiveness and accuracy of the designed method. Acknowledgement. This work is supported by the Foundation of Jinling Institute of Technology (Grant No: jit-fhxm-201607 and jit-b-201706), the Natural Science Foundation of Jiangsu Province University (Grant No: 17KJB120003).

552

X. Tian and Z. Yang

References 1. Bagley RL, Calico RA (1991) Fractional order state equations for the control of viscoelastically damped structure. J Guidance Control Dyn 14(2):304–311 2. Sun HH, Abdelwahad AA, Oharal B (1984) Linear approximation of transfer function with a pole of fractional power. IEEE Autom Control 29(5):441–444 3. Ichise M, Nagayanagi Y, Kojima T (1971) An analog simulation of non-integer order transfer functions for analysis of electrode process. J Electroanal Chem Interfacial Electrochem 33:253–265 4. Heaviside O (1971) Electromagnetc theory. Cambridge University Press, New York 5. Gao X, Yu J (2005) Chaos in the fractional order periodically forced complex Duffing’s oscillators. Chaos Solition Fract 26:1125–1133 6. Chen CM, Chen HK (2010) Chaos and hybrid projective synchronization of commensurate and incommensurate fractional order Chen-Lee systems. Nonlinear Dyn 62:851–858 7. Grigorenko I, Grigorenko E (2003) Chaotic dynamics of the fractional Lorenz system. Phys Rev Lett 91:034101 8. Wu XJ, Lu Y (2009) Generalized projective synchronization of the fractional-order Chen hyperchaotic system. Nonlinear Dyn 57:25–35 9. Zhang RX, Yang SP (2012) Robust chaos synchronization of fractional-order chaotic systems with unknown parameters and uncertain perturbations. Nonlinear Dyn 69:983–992 10. Aghababa MP (2014) Chaotic behavior in fractional-order horizontal platform systems and its suppression using a fractional finite-time control strategy. J Mech Sci Technol 28 (5):1875–1880 11. Aghababa MP, Aghababa HP (2012) Finite-time stabilization of a non-autonomous chaotic rotating mechanical system. J Franklin Inst 349:2875–2888 12. Aghababa MP, Aghababa HP (2012) Synchronization of mechanical horizontal platform systems in finite time. Appl Math Model 36:4579–4591 13. Ge ZM, Yu TC, Chen YS (2003) Chaos synchronization of a horizontal platform system. J Sound Vib 268:731–749 14. Hu JB, Han Y, Zhao LD (2009) A novel stability theorem for fractional systems and its applying in synchronizing fractional chaotic system based on backstepping approach. Acta Physica Sinica 58:2235–2239 15. Li CL, Tong YN (2013) Adaptive control and synchronization of a fractional-order chaotic system. Pramana J Phys 80:583–592

IoT System Data Quality Optimization: Research Status and Problem Analysis Haoyu Jiang1, Jiacheng Ji2, Quanbo Ge1,3(&), and Chunxi Li2 1

3

Hangzhou Zhongheng Provincial Key Enterprise Research, Institute of PowerCloud, Hangzhou 310053, China [email protected] 2 Logistics Engineering College, Shanghai Maritime University, Shanghai 201306, China [email protected] Institute of Systems Science and Control Engineering, School of Automation, Hangzhou Dianzi University, Hangzhou 310018, China [email protected]

Abstract. The data processing problem is the continuous generation of time series data containing information on faults or anomalies. These pieces of information can be described by physical models. But the means of manual analysis is not enough to solve the problem. Therefore, on the basis of the experience of the IOT communication engineering, it is inevitable to develop a physical model which characterizes the performance and abnormal state of the system and machine learning to automatically analyze and process the data quality optimization problem. The development aims to solve the data quality optimization technology of the IoT system for energy and power services, and take into account the requirements of real-time processing indicators of massive data, laying the foundation for the introduction of service layer machine learning model. Keywords: Data processing

 Machine learning  Data quality optimization

1 Instruction Traditional research often assumes that the IoT system is an ideal system that the data is stable and accurate and there is no performance. The data deviation is logically attributed to the occasional failure problem of the local hardware. Identification and processing of abnormal data are also less for the underlying power IoT data, more for the user side of the Internet. In addition, the previous research work of machine learning focused on the complex model of deep neural network. There is a lack of research on industrial hybrid models. Domestic research on the quality of IOT data is mostly directed to specific device types and specific causes of error, such as [1–7]. Some automated anomaly data detection methods have been applied in [8–12]. The research on abnormal data collected in the power field is more reflected in the physical level. [14–16] study the causes of abnormal data in power collection and proposed detection methods for different types of data. The data-driven approach is © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 553–561, 2020. https://doi.org/10.1007/978-981-32-9050-1_63

554

H. Jiang et al.

more used for curve trend prediction by fitting appropriate mathematical models to fit historical time trend curves and predicting future time series. [17, 18] capture well the behavioral characteristics of the time series but does not take into account the current impact of long-term behavior on the lack of memory. In [19–21], Domestic research on timing anomalies has been combined with data streams generated by most industrial equipment. The research methods mentioned above cannot independently detect the abnormal state from massive dynamic data in real time, and cannot optimize the data quality, so a set of research solutions are proposed to solve some major problems in this paper.

2 Problem Description In terms of power engineering, there have been local studies on the performance and faults of devices and equipment in the IoT system. It is not generalized, and lacks systematic and theoretical work. Because this research can only solve the specific problems of specific scenarios. Regarding the physical aspects of the performance difference of the IoT system, most of them stayed in the qualitative and unquantified stage and failed to propose a method for effectively detecting the data quality. There may be timing problems in the actual operation of the communication system and platform. It is necessary to incorporate the problem into the research scope and establish a timing anomaly identification and recovery method. At present, the supervised learning model relies on structured annotation of data, but the method of automatically generating annotation data in specific professional fields needs to be developed. Industrial scenes are highly scalable, while traditional neural network models lack corresponding adaptability for complex requirements is relatively rare. In summary, a hybrid model based on physics and data is proposed to solve the data quality optimization problem of complex object system in power industry.

3 Research Methods 3.1

Quantitative Characterization of the Performance of the IoT System

The collection terminal energy meter or sensor obtains current, voltage, active, reactive power, power factor, power and other information through secondary mutual inductance. The collected information is transmitted to the intelligent gateway IMU through local communication. The smart meter can be horizontally decomposed into seven modules including display, metering, power, master, storage, communication and cost control modules. Each module has existing expert experience for faults, such as error tolerance, voltage and current errors, pulse output and meter constants, etc. The system

IoT System Data Quality Optimization

555

output data deviation is taken as the input fuzzy variable, and the output variable is the relative error. The fuzzy division is performed according to the absolute value, the variation amount, the maximum and minimum errors. Each interval corresponds to a fuzzy subset and its membership function is depicted. The time and space feature quantities of a single device are defined by data messages. Establish statistical rules and indicator systems for characteristic indicators. Through the definition of the primary state indicators in the dimensions of time and space and the statistical calculation of the indicators of big data analysis techniques, some high-level structural features of regularity and space-time correlation are sketched out. The fuzzy abstraction process is applied to the quantitative high-level structure and then the evaluation problem is transformed into the similarity judgment problem of the high-level structure. The rationality of this structural feature is demonstrated on the basis of relevant simulation or experimental systems (or engineering experience). For the different state types obtained by mining, a correlation equation model can be established and then the association between the measurement information and the fault type can be established. The extreme learning machine is used to determine the mapping relationship between the data structure space and the state space. 3.2

Timing Anomaly Detection and Recovery Method Suitable for Large Data High Frequency Communication Characteristics

The intelligent gateway IMU collects local communication upload data and receives the cloud communication delivery instruction. Local communication protocols often use MODBUS, DL/T645 and the communication medium is RS485 or Sub-1G. The cloud communication protocol is Redis, Q/GDW 376.1, MQTT and the communication medium is GPRS or wired network. Timing anomalies in this communication mode have the following behavior. The low-cost serial communication of the low-level peripherals causes the basic acquisition time to be different so that the high-order quantities obtained do not match the actual values. There is timestamp exception due to sporadic failure in communication during uplink and downlink. Anomaly due to timing fragment offset is generated by the collector clock or associated code. The time series are decomposed and trend component is obtained by data smoothing, especially considering the nonlinear fitting method. Considering the weather, date, user and other annotation information, the different dimension values are mapped to specific intervals through the dimensionless processing, so that the numerical quantities can be numerically comparable, which facilitates calculation of time series dynamic trend under feature labeling. The global prediction is performed by the parallel Kalman filtering algorithm and the components of the prediction load are rewritten into Kalman filtered one-dimensional equations. To improve prediction accuracy, noise-related assumptions are added.

556

3.3

H. Jiang et al.

Methods of Supervising and Correcting the Residual Amount of Data

Machine learning is embodied in the entire optimization method, training key weight parameters. Firstly calculating the driving amount in the time series reconstruction completion algorithm based on statistical similar big data. On the basis of normal timing, the deviation transfer function is expressed as a linear combination of all state space elements. Considering the state inversion algorithm of the integrated LSSVM and Brent’s method, the key parameters and weight distributions including the state physical model are solved, and the ideal profile curve is obtained. Since the actual data transmission of the IoT system is affected by many factors, the residual noise sequence exhibits a nonlinear dynamic characteristic. Index generalized autoregressive conditional heteroscedasticity model method and RNN are compared to predict the residual sequence. Broad learning [22] and deep learning are combined by using the weighted sum of their output log probability as a prediction and then the result is fed back to a common logical loss function of the joint training. Models are trained separately in a set, and their predictions are combined only during the inference time but not during the training time. Broad learning improvement model optimizes all parameters while considering the broad and deep and the weights of their sums at the training time. The broad part only needs to supplement the deep weakness with a small amount of span feature transformation, rather than a full-scale broad model. Fusion training is accomplished by using small batch random optimization to propagate the gradient back from the output to the broad and deep parts of the model. If the neural network needs to be extended, the model can be efficiently reconstructed by incremental learning. The effective mixing of the above research methods makes the whole model highly interpretative and continuable which is suitable for the optimization of data quality in industrial scenes.

4 Numerical Analysis The accuracy of the national network metering interface judgment table is judged by the accumulated data above the monthly. The data passed the assessment and the problem of time-sharing data was not taken into account. Because the user does not have a power market for time-sharing transactions. Now suppose the national network data from 9:00 to 6:00 every day is accurate. Then all blue dots should fall between the red and green lines at least parallel to them. The result of the fact is that the two sets of IoT systems (State Grid and ours) have a huge difference in the 15 min recording results, resulting in the red line and the green line appearing to be coincident, as shown in Fig. 1. The active loss is that the blue point must be logically positive, but most of it is negative.

IoT System Data Quality Optimization

557

Fig. 1. 1# transformer light loaded with power loss, nameplate loss and nameplate doubled loss with load rate change trend chart

If the error distribution is examined, a considerable part of the value error is between 50% and 300%, as shown in Fig. 2. The poor quality of the data leads to troubles in our later research.

Percentage

4 3 2 1 0 0.00%

5.00%

ABS(acve-nameplate)/low count

10.00%

15.00%

20.00%

Load Rate

Fig. 2. 1# transformer light loaded with power loss minus the absolute value of the nameplate loss accounted for the proportion of the lower proportion of the load with the load rate trend chart

As can be seen from Fig. 3, when we took out the output of a certain day, we found that the red line was 15 min later than the blue line.

H. Jiang et al.

Load

558

High Count

Low Count

250 200 150 100

50 0 1 5 9 13 17 21 25 29 33 37 41 45 49 53 57 61 65 69 73 77 81 85 89 93 Time Point Fig. 3. 1# transformer April 12th light loading high and low meter change relationship comparison chart

Load

Compared with the 2# transformer, it is indeed 15 min later, as shown in Fig. 4. Then, there must be a problem in the middle of the link. We forced the data to move back 15 min to see the effect, as shown in Fig. 5.

400 350 300 250 200 150 100 50 0

High Count Low Count

1 5 9 13 17 21 25 29 33 37 41 45 49 53 57 61 65 69 73 77 81 85 89 93 97 Time Point Fig. 4. 2# transformer April 5th light high and low meter load relationship comparison chart

After processing, it can be seen from Fig. 6 that the red line and the gray line finally do not seem to coincide, but the blue point all falls between the two lines and is positive or not.

400

Load

IoT System Data Quality Optimization

559

High Count Low Count

350 300 250 200 150 100 50 0

1 5 9 13 17 21 25 29 33 37 41 45 49 53 57 61 65 69 73 77 81 85 89 93 97

Time Ppint

Load

Fig. 5. 2# transformer light-loaded high-meter meter after 15 min, April 5th, high and low meter load relationship comparison chart

60 50 40 30 20 10 0 -10 -200.00 -30 -40 -50 -60 -70

5.00

10.00

15.00

20.00

25.00

30.00

35.00

AcƟve Loss(average) Loss

nameplate curve

Load Rate Doubled nameplate Loss

Fig. 6. 2# transformer light load after 15 min translation, average active loss, nameplate loss and doubled after the nameplate loss with load rate change trend comparison chart

In Fig. 7, more than 50% of the errors are basically disappeared, and most of the points are distributed below 40% or even below 20%. However, there is not a small distance from the entire red line.

560

H. Jiang et al.

1.2

Percentage

1 ABS(acƟve—nameplate)/low count

0.8

Nameplate/lowcount

0.6 0.4 0.2 0 0.00

4.00

8.00

12.00

16.00

20.00

24.00

28.00

Load Rate Fig. 7. 2# transformer light load 15 min after the active loss minus the absolute value of the nameplate loss accounted for the proportion of the lower proportion and the nameplate loss accounted for the proportion of the lower proportion of the load with the load rate comparison chart

5 Conclusion In summary, we can draw conclusions. Most of the visual overall trends of the two sets of IoT systems are consistent with the overall trend. However, if the big data analysis work is carried out in depth, there are still huge errors that need to be corrected. Corrected the time offset caused by code error, the result deviation of data processing was reduced to 50% as a whole, but it still could not reach the ideal level, and the cause of the deviation was unknown. I thought that the readings of the State Grid were correct, but I found out that this was not the case; the bill for calculating the electricity consumption of the peaks and valleys of the users may be problematic.

References 1. Gong D, Xu Q, Zhang J et al (2013) Optimization of clock error measurement scheme for multi-element verification device of smart energy meter. Electr Meas Instrum 50(9):55–58 2. Qian L (2014) Analysis and countermeasures of smart meter clock problem. Electr Meas Instrum 51(13):29–32 3. Guo N (2011) MC9S08MG64 real-time clock calibration and compensation. China Electron Bus Basic Electron 7:58–60 4. Yu T (2011) Research on moving target tracking in wireless sensor networks. Nanjing Normal University

IoT System Data Quality Optimization

561

5. Huang H (2012) Research on data node anomaly detection method in Internet of Things. Comput Simul 29(05):159–162 6. Li H (2017) Research on method and technology of big data clustering analysis in Internet of Things. North China University of Technology 7. Ding Z, Gao Z (2012) Database cluster system framework for sampling data management of mass sensor massive sensor. J Comput 35(6):1175–1191 8. Nadaf M, Kadam V (2013) Data mining in telecommunication. Proc 2013 Int J Adv Comput Theory Eng 2:92–96 9. Weatherford M (2002) Mining for fraud. IEEE Intell Syst 17(4):4–6 10. Onderwater M (2010) Detecting unusual user profiles with outlier detection techniques. VU University Amsterdam 11. Yusoff MIM, Mohamed I, Bakar MRA (2013) Fraud detection in telecommunication industry using Gaussian mixed model 12. Ngai EWT, Hu Y, Wong YH et al (2013) The application of data mining techniques in financial fraud detection: a classification framework and an academic review of literature, 559–569 13. Bhattacharyya S, Jha S, Tharakunnel K et al (2011) Data mining for credit card fraud: a comparative study. Decis Support Syst 50(3):602–613 14. Liu X, Shao Q, Chen Y et al (2015) Analysis of abnormality of electric energy measurement data in electricity information collection. Sci Technol Enterp 17:215 15. Wang D (2016) Analysis of abnormal causes of electric energy measurement data in electricity information collection system. Sci Technol Commun 8(11):101 16. Sun F, Ding C (2015) Discussion on the method of eliminating abnormal data in measurement test. Inf Heilongjiang Sci Technol 32:79 17. Jenkins, GM (2004) Autoregressive‐integrated moving average (ARIMA) models. Encyclopedia of statistical sciences Wiley, Hoboken 18. Dror G, Pelleg D, Rokhlenko O et al (2012) Churn prediction in new users of Yahoo! Answers. In: WWW, pp 829–834 19. Bao W, Yang K, Hu Q et al (2005) Application of information pedigree method to detect abnormal data of thermal power plants. J Power Eng 25(6):865–869 20. Deng H, Yang T (2015) An anomaly detection method based on deep learning. Inf Commun 3:3–4 21. Zhu J, Chen J (2016) Abnormal traffic detection method based on entropy and SVM multiclassifier. Comput Technol Dev 26(3):31–35 22. Chen CLP, Liu Z (2017) Broad learning system: an effective and efficient incremental learning system without the need for deep architecture. IEEE Trans Neural Netw Learn Syst 29(1):10–24

Numerical Verification and Robotic Application of New DTZD Algorithm for Solving System of Time-Varying Nonlinear Equations Zhijing Huang, Xinjie Lin, Yiwen Zhang, Zhixin Zhang, and Dongsheng Guo(&) College of Information Science and Engineering, Huaqiao University, Xiamen 361021, China [email protected]

Abstract. Recently, a discrete-time zeroing dynamics (DTZD) in scalar form has been established to solver time-varying nonlinear equations (TVNE). For completeness, the extension study of such scalar-form DTZD algorithm is presented in this paper. Specifically, by following the previous work, a new DTZD algorithm in vector form, which has a cube error mode, is developed in this paper for solving the system of TVNE. Then, numerical results are given to substantiate the efficacy of the new vector-form DTZD algorithm. Furthermore, the application of the new DTZD algorithm to redundant robot manipulator is provided, thereby showing the application potential of the presented algorithm. Keywords: Discrete-time algorithm  Zeroing dynamics  System of time-varying nonlinear equations  Numerical verification Robotic application



1 Introduction In recent years, nonlinear equations (NE) have been involved in the research of many intelligent systems. Considerable study and research have been made on finding the roots of NE [1–4]. In particular, to solve time-varying NE (TVNE), a continuous-time zeroing dynamics (CTZD) model is studied in [3]. This model is further discretized and the discrete-time ZD (DTZD) algorithm is given in [4]. In the authors’ previous work [1], a new DTZD algorithm for solving TVNE is developed and is superior to the one in [4] under the same condition. System engineering in industries has become increasingly complex, thereby making the corresponding equations more complex [2, 5]. Subsequently the following system of TVNE needs to be solved [2, 5]: f ðxðtÞ; tÞ ¼ 0 2 Rm ;

8t 2 ½0; þ 1Þ

© Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 562–570, 2020. https://doi.org/10.1007/978-981-32-9050-1_64

ð1Þ

Numerical Verification and Robotic Application of New DTZD Algorithm

563

where f ðÞ : Rn ! Rm is a nonlinear mapping, and xðtÞ 2 Rn is the unknown vector. To solve (1), the related algorithms are presented in [6, 7], which generally have a square error mode. In this paper, because of the cube error mode, the scalar-form DTZD algorithm presented in [1] is further studied. Specifically, as an extension study, this paper develops a new DTZD algorithm, which is the vector form of the algorithm in [1], for solving (1). This new vector-form DTZD algorithm also has a cube error mode, thus being superior to the algorithms in [6, 7] on solving the system of TVNE, i.e., (1). In view of its advantage, the new DTZD algorithm is applied to the path planning of redundant robot manipulators [2, 5, 8] (as an application study), thus showing the algorithm application potential. The rest of this paper is organized as follows. Section 2 describes the new DTZD algorithm for solving the system of TVNE. Section 3 presents numerical results via the new algorithm and the algorithm in [7]. Section 4 provides the robotic application of the new DTZD algorithm. Section 5 concludes this paper.

2 New DTZD Algorithm in Vector Form In this paper, the goal is to find xðtÞ 2 Rn to hold (1) true at t ¼ ks with k ¼ 0; 1;   . Considering the advantage of the scalar-form DTZD algorithm [1], this section presents its extension and develops the new vector-form DTZD algorithm to solve (1). Specifically, to solve (1), the following CTZD model is investigated in [9]: x_ ðtÞ ¼ J þ ðxðtÞ; tÞðcf ðxðtÞ; tÞ þ ft ðxðtÞ; tÞÞ

ð2Þ

where c [ 0 2 R, ft ðxðtÞ; tÞ ¼ @f ðxðtÞ; tÞ=@t 2 Rm , and J þ ðxðtÞ; tÞ 2 Rnm is the pseudoinverse of Jacobian matrix JðxðtÞ; tÞ ¼ @f ðxðtÞ; tÞ=@x 2 Rmn (being assumed to be non-singular). In addition, the presented CTZD model (2) can be discretized, and the following DTZD algorithm is studied in [7]: xk þ 1 ¼ xk  J þ ðxk ; tk Þðhf ðxk ; tk Þ þ sft ðxk ; tk ÞÞ

ð3Þ

where xk ¼ xðtk ¼ ksÞ with s [ 0 2 R being the sampling gap and h ¼ cs [ 0 2 R is the step size. This DTZD algorithm (3) has a square error mode when being used to solve (1). Specifically, the steady-state residual error (SSRE) of (3) reduces by 100 times as s reduces by 10 times. Based on [1], the new DTZD algorithm for solving (1), i.e., the vector form of the algorithm in [1], is developed and presented as follows: 1 1 1 5 xk þ 1 ¼ xk þ xk1 þ xk2  J þ ðxk ; tk Þðhf ðxk ; tk Þ þ sft ðxk ; tk ÞÞ 2 3 6 3

ð4Þ

564

Z. Huang et al.

For the new DTZD algorithm (4), its initialization can be completed by utilizing (3). Specifically, the following two states (i.e., x1 and x2 ) are determined for a given initial state x0 : (

x1 ¼ x0  J þ ðx0 ; t0 Þðhf ðx0 ; t0 Þ þ sft ðx0 ; t0 ÞÞ x2 ¼ x1  J þ ðx1 ; t1 Þðhf ðx1 ; t1 Þ þ sft ðx1 ; t1 ÞÞ

Fig. 1. Numerical results using the existing DTZD algorithm (3) with h = 0.6 and s = 0.01 for solving TVNE (5).

Fig. 2. Numerical results using the new DTZD algorithm (4) with h = 0.6 and s = 0.01 for solving TVNE (5).

Theorem. When using the new DTZD algorithm (4) to solve (1), the SSRE limk! þ 1 jjek jj2 ¼ limk! þ 1 jjf ðxk ; tk Þjj2 is in the order Oðs3 Þ with jj  jj2 denoting two norms of a vector. Proof. It can be generalized from [1].

Numerical Verification and Robotic Application of New DTZD Algorithm

565

3 Numerical Verification and Comparisons This section provides numerical results to verify the efficacy the new DTZD algorithm (4) to solve the system of TVNE compared with the existing algorithm (3). Example 4.1. The following system of TVNE is considered:  f ðxðtÞ; tÞ ¼

 ðx1 ðtÞ  tÞ3  x2 ðtÞ þ sin t ¼0 x31 ðtÞ  x2 ðtÞ  t3  sin t

ð5Þ

of which the theoretical solution is ½t; sin t (for validation). To solve (5), both DTZD algorithms (3) and (4) are utilized, with the results given in Figs. 1 and 2 and Table 1. Table 1. SSREs of both DTZD algorithms (3) and (4) with different h and s to solve (5). # h (3) 0.1 0.3 0.5 0.7 0.9 (4) 0.1 0.3 0.5 0.7 0.9

s = 0.01  5.136   2.267   1.400   1.006   7.846   3.247   1.832   1.191   8.722   6.859 

10−2 10−2 10−2 10−2 10−3 10−3 10−3 10−3 10−4 10−4

s = 0.01  7.039   2.356   1.414   1.009   7.857   6.199   2.092   1.256   8.976   6.982 

10−4 10−4 10−4 10−4 10−5 10−6 10−6 10−6 10−7 10−7

s = 0.001  7.071   2.357   1.414   1.010   7.897   6.285   2.085   1.257   8.979   6.984 

10−6 10−6 10−6 10−6 10−7 10−9 10−9 10−9 10−10 10−10

Figure 1 shows numerical results using the existing DTZD algorithm (3) with h = 0.6 and s = 0.01. The states in Fig. 1(a), starting with ten different states, are convergent to the theoretical solution. The residual errors in Fig. 1(b) show convergence characteristic, with SSREs being in the order 10−4. These results verify that (3) is effective in solving TVNE (5). Figure 2 presents numerical results using the new DTZD algorithm (4) with h = 0.6 and s = 0.01. The states in Fig. 2(a) always converge to the theoretical solution. The residual errors in Fig. 2(b) are all convergent, with SSREs being in the order 10−6 (verifying the algorithm efficacy). Comparing Fig. 1(b) with Fig. 2(b) further indicates that the new algorithm (4) is superior to (3) in solving TVNE (5). Using more values of h and s, both DTZD algorithms (3) and (4) are further studied for solving (5). Table 1 presents the related results that verify again the algorithm efficacy. The following summary from Table 1 is presented as well.

566

Z. Huang et al.

• As to (3), decreasing s by 10 times yields the SSRE decrease by 100 times. That is, the SSRE of (3) changes in an Oðs2 Þ manner [7]. • As to (4), decreasing s by 10 times yields the SSRE decrease by 1000 times. That is, the SSRE of (4) changes in an Oðs3 Þ manner. • Increasing h within (0, 1) further improves the performance of each of (3) and (4). Thus, the DTZD algorithm (4) possesses better performance than (3) on solving (1). Example 4.2. Another system of TVNE is considered as follows: 2

3 lnðx1 ðtÞÞ  1=ðt þ 1Þ 6 x1 ðtÞx2 ðtÞ  sinðtÞ expð1=ðt þ 1ÞÞ 7 7 f ðxðtÞ; tÞ ¼ 6 4 x2 ðtÞ  sinðtÞx2 ðtÞ þ x3 ðtÞ  2 5 ¼ 0 1 x21 ðtÞ  x22 ðtÞ þ x3 ðtÞ þ x4 ðtÞ  t

ð6Þ

Fig. 3. Residual errors of both DTZD algorithms (3) and (4) with h = 0.6 and s = 0.01 for solving TVNE (6).

Table 2. SSREs of the new DTZD algorithms (4) with different h and s to solve (6). # h (4) 0.2 0.3 0.4 0.5 0.6 0.7 0.8

s = 0.01  1.015   4.671   4.004   3.472   3.016   2.671   2.384 

10−2 10−3 10−3 10−3 10−3 10−3 10−3

s = 0.01  1.025   6.887   5.189   4.148   3.459   2.596   1.569 

10−5 10−6 10−6 10−6 10−6 10−6 10−6

s = 0.001  1.039   6.931   5.206   4.159   3.466   2.599   1.571 

10−8 10−9 10−9 10−9 10−9 10−9 10−9

Numerical Verification and Robotic Application of New DTZD Algorithm

567

Both DTZD algorithms (3) and (4) are utilized to solve this equation. The residual errors of (3) and (4) using h = 0.6 and s = 0.01 are presented in Fig. 3. The figure shows that the SSRE of (3) is in the order 10−4 whereas the SSRE of (4) is in the order 10−6. Evidently, the latter is much smaller than the former, thereby indicating again the superior performance of (4) over (3). Table 2 presents the data using the DTZD algorithm (4) with different h and s. The table shows that decreasing s by 10 times yields the SSRE decrease by 1000 times, thus denoting the Oðs3 Þ error mode of (4). Table 2 also shows that increasing h can improve the performance of (4). In sum, together with the previous work [1], Figs. 1, 2 and 3 and Tables 1 and 2 indicate that the new DTZD algorithm (4) is effective for solving TVNE not only in scalar form but also in vector form. That is, (4) is applicable to solve TVNE from R to Rm.

4 Robotic Application In this section, the application potential of the new DTZD algorithm (4) to redundant robot manipulators is presented and investigated.

Fig. 4. Three-link robot manipulator tracks the tricuspid path using the new path planning scheme (8) [as a reformulation of new DTZD algorithm (4)] with h = 0.6 and s = 0.01.

Fig. 5. Three-link robot manipulator tracks the tricuspid path using the new path planning scheme (8) with h = 0.6 and s = 0.001.

568

Z. Huang et al.

Specifically, the path planning of redundant robot manipulators is realized by solving the following system of TVNE [2, 5]: f ðqðtÞÞ ¼ r ðtÞ

ð7Þ

where qðtÞ 2 Rn is the joint angle and r ðtÞ 2 Rm is the desired path. In this context, the new DTZD algorithm (4) for solving (7) is reformulated as follows: 1 1 1 5 qk þ 1 ¼ qk þ qk1 þ qk2  J þ ðqk Þðhðf ðqk Þ  rk Þ  sr_ k Þ 2 3 6 3

ð8Þ

where qk ¼ qðtk ¼ ksÞ and r_ k is the time derivative of rk ¼ r ðtk ¼ ksÞ. Thus, the new path planning scheme (8) is derived for redundant robot manipulators.

Fig. 6. Three-link robot manipulator tracks the Lissajous figure using the new path planning scheme (8) with h = 0.6 and s = 0.01.

Fig. 7. Three-link robot manipulator tracks the circle using the new path planning scheme (8) with h = 0.6 and s = 0.01.

Numerical Verification and Robotic Application of New DTZD Algorithm

569

To verify the effectiveness of the new path planning scheme (8), such a scheme is simulated on a three-link robot manipulator. Notably, in the simulations, only the endeffector position is considered for the three-link robot manipulator, and thus this robot manipulator is viewed as a redundant one. Figure 4 shows the results using the new path planning scheme (8) with h = 0.6 and s = 0.01, where the planning error e ¼ f ðqk Þ  rk 2 R2 . In Fig. 4(a) and (b), the end-effector trajectory is close to the desired path. The maximal planning error in Fig. 4 (c) is less than 1.5  10−6 m. These results verify the effectiveness of (8). By decreasing s from 0.01 to 0.001, (8) is simulated, and the results are shown in Fig. 5 (indicating the success of (8) again). Comparing Figs. 4(c) and 5(b) further denotes that the error becomes smaller when decreasing s. That is, 10 times decrease of s results in 1000 times reduction of error, thus showing that the error has an Oðs3 Þ relation with s. Figures 6 and 7 present the results using the new path planning scheme (8) for the robot manipulator tracking the Lissajous figure and circle. As shown in Figs. 6 and 7, both simulated trajectories are close to the desired paths with the maximal errors being in the order 10−6, which indicates that (8) is effective in the robot manipulator. In sum, Figs. 4, 5, 6 and 7 verify the effectiveness of the new path planning scheme (8), and further indicate the application potential of the new DTZD algorithm (4).

5 Conclusion This paper, as the extension of [1], has developed the new DTZD algorithm (4) for solving the system of TVNE. Such an algorithm has an Oðs3 Þ error mode and is superior to (3). Numerical results with different examples have indicated the efficacy of DTZD algorithm (4) and further presented the potential to robotic application. Acknowledgment. This work is supported by the National Natural Science Foundation of China (with number 61603143), the Quanzhou City Science and Technology Program of China (with number 2018C111R), and also the National Innovation Training Program for University Students (with number 201810385017).

References 1. Guo D, Huang Z, Lin X, Sun S (2017) A new DTZD algorithm with geometric representation and numerical verification for time-varying nonlinear equations solving. In: Proceedings of international conference on natural computation, fuzzy systems and knowledge discovery, pp 128–133 2. Guo D, Xu F, Li Z, Nie Z, Shao H (2018) Design, verification and application of new discrete-time recurrent neural network for dynamic nonlinear equations solving. IEEE Trans Ind Inf 14(9):3936–3945 3. Zhang Y, Yi C, Guo D, Zheng J (2011) Comparison on Zhang neural dynamics and gradientbased neural dynamics for online solution of nonlinear time-varying equation. Neural Comput Appl 20(1):1–7 4. Zhang Y, Li Z, Guo D, Ke Z, Chen P (2013) Discrete-time ZD, GD and NI for solving nonlinear time-varying equations. Numer Algorithms 64(4):721–740

570

Z. Huang et al.

5. Guo D, Nie Z, Yan L (2018) The application of noise-tolerant ZD design formula to robots’ kinematic control via time-varying nonlinear equations solving. IEEE Trans Syst Man Cybern: Syst 48(12):2188–2197 6. Zhang Y, Zhang Y, Chen D, Xiao Z, Yan X (2017) From Davidenko method to Zhang dynamics for nonlinear equation systems solving. IEEE Trans Syst Man Cybern: Syst 47 (11):2817–2830 7. Zhang Y, Qiu H, Peng C, Shi Y, Tan H (2015) Simply and effectively proved square characteristics of discrete-time ZD solving systems of time-varying nonlinear equations. In: Proceedings of IEEE international conference on information and automation, pp 1457–1462 8. Guo D, Xu F, Yan L (2018) New pseudoinverse-based path planning scheme with PID characteristic for redundant robot manipulators in the presence of noise. IEEE Trans Control Syst Technol 26(6):2008–2019 9. Zhang Y, Shi Y, Xiao L, Mu B (2012) Convergence and stability results of Zhang neural network solving systems of time-varying nonlinear equations. In: Proceedings of international conference on natural computation, pp 150–154

Fault Detection Based on Multi-local SVDD with Generalized Additive Kernels Huangang Wang1(B) , Daoming Li1 , Junwu Zhou2 , and Xu Wang3 1

Department of Automation, Tsinghua University, Beijing 100084, China [email protected] 2 State Key Laboratory of Process Automation in Mining & Metallurgy, Beijing, China 3 Beijing Key Laboratory of Process Automation in Mining & Metallurgy, Beijing, China

Abstract. Support vector data description (SVDD), has attracted many researchers’ attention in statistical process monitoring. For batch process fault detection, based on the process data analysis of the threeway structural, a novel SVDD method integrating both generalized additive kernels and local models is proposed in this paper, which is Multilocal support vector data description with Generalized Additive Kernels (MLGAK-SVDD). It can obtain both the convenient on-line batch process fault detection model and the end-of-batch fault detection model at the same time. Finally, a case study based on a fed-batch penicillin fermentation process is conducted to verify the validity of the proposed MLGAK-SVDD method. Keywords: Batch process fault detection · Support vector data description · Generalized additive kernel Local models

1

·

Introduction

Data-driven batch process fault detection, is designed to build a model or an evaluation function from the abundant normal training samples to detect the unknown faults [1,2]. It is quite similar to the one-class classification problem studied in machine learning area. Therefore, one-class classification based process monitoring methods, for instance one-class support vector machine (OCSVM) [3,4] and support vector data description (SVDD) [5,6,10], have attracted more and more researchers’ attention recently. The research in this paper is based on the SVDD method, whose basic idea is to construct a hypersphere with the smallest volume to contain all the normal training samples in the original space or in the feature space [5]. For process monitoring, the distance from the sample to the center can become the monitoring statistic, and the radius is the corresponding control limit [6,7]. For example, SVDD has been used to design the kernel-distance-based multivariate statistic [8,9] to improve the traditional Hotelling’s T2 and squared prediction error c Springer Nature Singapore Pte Ltd. 2020  Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 571–579, 2020. https://doi.org/10.1007/978-981-32-9050-1_65

572

H. Wang et al.

(SPE) statistics. In batch process monitoring, the collected dataset has the special three-way structure, i.e. (batches × variables × time). Ge et al. [6] studied batch process fault detection based on SVDD method. Similar to some other VWU-based monitoring methods, the above SVDD method doesn’t consider the correlation between different time intervals either. Nevertheless, there are still some problems deserving to be further discussed in the existing SVDD-based methods of batch process fault detection, such as the nonlinear characteristics of the batch process and the nonlinear correlation between different time intervals. Therefore, this paper proposes a novel Multi local SVDD with generalized additive kernels (MLGAK-SVDD) method by synthesizing the properties of generalized additive kernels [11] and local models [12] to improve its monitoring model’s flexibility and adaptability.

2 2.1

Preliminaries Support Vector Data Description

Given the training samples xi ∈ Rm×1 , i = 1, ..., n, and the nonlinear transformation φ(·) : xi → φ(xi ), the original problem of SVDD is defined as follows, which tries to find a hypersphere with the smallest volume to surround all training samples in the feature space [5], min R2 + C

a,R,ξ

n 

ξi

i=1 2

s.t. φ(xi ) − a ≤ R2 + ξi

(1)

ξi ≥ 0, i = 1, ..., n where a and R are the center and the radius of the hypersphere respectively, and ξi are the slack variable. The parameter C > 0 trades off the volume and the errors. After introducing the Lagrange multipliers α = [α1 , ..., αn ]T , the following dual problem is max a

n  i=1

αi K(xi , xi ) −

n  n 

αi αj K(xi , xj )

i=1 j=1

s.t. 0 ≤ αi ≤ C, i = 1, ..., n n  αi = 1

(2)

i=1

Solving it can get the optimal α∗ , where the training samples with αi∗ > 0 are defined support vectors (SVs). Based on the optimal solution, the center and the radius can be calculated by

Multi-local SVDD with Generalized Additive Kernels

α=

n 

573

αi∗ φ(xi )

i=1

  n n  n    R = K(xs , xs ) − 2 αi∗ K(xs , xi ) + αi∗ αj∗ K(xi , xj ) i=1

(3)

i=1 j=1

where xs is a support vector on the boundary of the hypersphere, whose a∗s satisfies the condition 0 < a∗s < C. Considering a new sample z ∈ Rm×1 , the distance between itself and the center is taken as the monitoring statistic,   n n  n    Dist(z) = K(z, z) − 2 αi∗ K(z, xi ) + αi∗ αj∗ K(xi , xj ) (4) i=1

i=1 j=1

If Dist(z) ≤ R, the new sample z is predicted to be normal; otherwise, it is predicted to be faulty. 2.2

Batch Process Fault Detection Based on SVDD

In a typical batch process, the collected three-way dataset after trajectory centering and scaling is denoted by X(I × J × K). The online monitoring method proposed in Ref. [6] (for simplicity it is called VWUSVDD in this paper) firstly unfolds the three-way array X(I × J × K) into a two-way array X(KI × J) by the VWU approach, and then builds an SVDD model by considering each sampling vector xi,k ∈ RJ×1 (i = 1, ..., I, k = 1, ..., K) at each sampling time as an individual training sample.Finally, the distance from each sampling vector to the center becomes the monitoring statistic for on-line batch process fault detection. As a generalization of VWUSVDD or a special case of multiphase SVDD [6], we can build an individual SVDD model for each data matrix X k (I × J) at each time interval. It is related to the K-models method [12], which is called KSVDD briefly in the following part. It is a pity that, analogous to the VWU-based modeling method, KSVDD still cannot process the nonlinear correlation between different time intervals. Therefore, this paper presents a novel SVDD method, which utilizes the properties of generalized additive kernels and local models for nonlinear batch process fault detection.

3

Fault Defection Based on MLGAK-SVDD

To retain the sequential structure of each batch sample, the original batch sample xi = [xTi,1 , ..., xTi,K ]T ∈ RKJ×1 is nonlinearly mapped into the feature space as φ(xi ) = [φ(xi,1 )T , ..., φ(xi,K )T ]T , which consists K sampling components. The kernel function with two sampling vectors, i.e. Ktime(xi1 ,k , xi2 ,k ) = φ(xi1 ,k ), φ(xi2 ,k ) (i1 , i2 = 1, ..., I), can be any traditional kernel, such as polynomial, Gaussian, or sigmoid kernel. The kernel between two batches is composed

574

H. Wang et al.

of the sum of the kernel functions corresponding to K time intervals, i.e. Kbatch (xi1 , xi2 ) = φ(xi1 ), φ(xi2 ) =

K 

Ktime (xi1 ,k , xi2 ,k )

(5)

k=1

which is called a generalized additive kernel since it adds up along the sampling time [11]. Accordingly, the original problem of MLGAK-SVDD is defined as K   I I    min R2 + C1 ξi + η ξi,k Rk2 + C2 a,R,R,ξ,Θ

i=1

k=1 2

i=1

s.t. Φ(xi ) − a ≤ R + ξi , ξi ≥ 0, i = 1, ..., I 2

(6)

2

φ(xi,k ) − ak  ≤ Rk2 + ξi,k , ξi,k ≥ 0, i = 1, ..., I, k = 1, ..., K Here, the global center a = [aT1 , ..., aTk ]T can also be divided into K local corresponding to associated with K time intervals. The radiuses R and Rk (k = 1, ..., K) are associated with the whole batch and each sampling time respectively. ξi and ξi,k are the slack variables. C1 , C2 and η are the adjustable parameters. Its dual problem is min α ,β

K

K

k=1

k=1

 1  (αk + β)T K k (αk + β) − pTk (αk + β) η+1

s.t. 0 ≤ β ≤ C1 e, eT β = 1

(7)

0 ≤ αk ≤ ηC2 e, eT αk = η, k = 1, ..., K ⎡ ⎤ Ktime (x1,k , x1,k ) · · · Ktime (x1,k , xI,k ) ⎢ ⎥ .. .. .. Kk = ⎣ ⎦ is the kernel matrix at sampling . . . Ktime (xI,k , x1,k ) · · · Ktime (xI,k , xI,k ) time k. pk = diag{K k } is a column vector filled with the diagonal elements of K k . e = [1, ..., 1]T ∈ RI×1 . The optimization variable β = [β1 , ..., βI ]T ∈ RI×1 is associated with the whole batch samples, and the optimization variable αk = [α1,k , ..., αI,k ]T ∈ RI×1 is associated with the sampling vectors at time k. Solving the dual problem (7) gets the optimal solution, and the corresponding optimization variables are still denoted by β and αk below for convenience. Based on the Karush-Kuhn-Tucker (KKT) optimality condition [5,13], the optimal variables satisfy the following equations:   2 (8) αi,k φ(xi,k ) − ak  − Rk2 − ξi,k = 0 and (ηC2 − αi,k )ξi,k = 0   2 βi Φ(xi ) − a − R2 − ξi = 0 and (C1 − βi )ξi = 0

(9)

And we will discuss them individually in detail below. Equation (8) indicates that: Based on a local support vector located exactly on the boundary of the local hypersphere whose batch index is denoted by sk

Multi-local SVDD with Generalized Additive Kernels

575

(i.e. 0 < αsk ,k < ηC2 ), the radius Rk of this local hypersphere can be calculated as  Rk = Ktime (X sk ,k , X sk ,k ) −

I

2  (αi,k + βi )Ktime (xsk ,k , xi,k ) + η + 1 i=1

1 1 (αk + β)T K k (αk + β) 2 2 (η + 1)

(10)

Considering a new sampling vector z k at time k, the distance from it to the local center ak , is used as the monitoring statistic (called L-D statistic),  Dist(z k ) = Ktime (z k , z k ) −

I

2  (αi,k + βi )Ktime (z k , xi,k ) + η + 1 i=1

 12 1 T (α + β) K (α + β) k k k (η + 1)2

(11)

If Dist(z k ) ≤ Rk then it is predicted to be normal; otherwise, it is predicted to be faulty. Hence the local models can be used for on-line batch process fault detection. Equation (9) indicates that: Based on a global support vector on the boundary of the hypersphere whose batch index is denoted by s (i.e. 0 < βi < C1 ), the radius R of the global hypersphere can be calculated as R=

K   Ktime (X s,k , X s,k ) −

I

2  (αi,k + βi )Ktime (xs,k , xi,k ) + η + 1 i=1 k=1 (12)  12  1 (αk + β)T K k (αk + β) (η + 1)2

The distance from a new batch z = [z T1 , ..., z TK ]T to the global center a can be used as the monitoring statistic for end-of-batch monitoring, Dist(z) =

K   Ktime (z k , z k ) −

I

2  (αi,k + βi )Ktime (z k , xi,k ) + η + 1 i=1 k=1 (13)  12 1 T (αk + β) K k (αk + β) (η + 1)2

If Dist(z) ≤ R, then this new batch is predicted as normal; otherwise, some faults may occur during the batch process. In conclusion, the framework of MLGAK-SVDD based batch process fault detection is: Part I: off-line modeling. Step 1. Preprocess the three-way training dataset X(I × J × K) by trajectory centering and scaling. Step 2. Calculate the kernel matrices K k , k = 1, ...K, based on the predefined kernel function, and solve the dual problem (7) of Multi local GAK-SVD to get the optimal results αk , (k = 1, ..., K) and β.

576

H. Wang et al.

Step 3. Calculate the radiuses Rk (k = 1, ..., K) and R, and store the sampling vectors xi,k that satisfy αi,k + βi > 0 for on-line fault detection Part II: on-line fault detection. Step 1. For a new collected sampling vector z k at time k, preprocess it by trajectory centering and scaling similarly. Step 2. Calculate the kernel functions between z k and the stored samples xi,k . Step 3. Calculate the L-D statistic Dist(z k ) (Eq. (11)) and compare it with the control limit Rk to predict whether the new sampling vector z k is faulty or not. Step 4. In addition, at the conclusion of the new batch, the distance between the new batch and the global center a can be compared with the control limit R in order to implement end-of-batch fault detection.

4

Case Study

In order to evaluate the fault detection effect of the proposed method, a fed-batch penicillin fermentation process [14] is selected for experiment in this section. The whole fermentation process lasts 400 h and is sampled every 0.5 h. Ten process variables listed in Table 1. Table 1 generate the batch samples [15]. 100 normal batches are randomly generated to train the fault detection models, and 10 normal batches are randomly generated to validate the generalization performance. 4 faulty batches are used to analyze the fault detection performance of the models. Here, two variables involve two faults, whose details include fault magnitude, starting time and terminal time in Table 2. Table 1. Ten process variables used for the fault detection. Number Variable 1

Aeration rate (L/h)

2

Agitator power (W)

3

Substrate feed temperature (K)

4

Dissolved oxygen concentration (%saturation)

5

Culture volume (L)

6

Carbon dioxide concentration (mmol/L)

7

pH

8

Fermentor temperature (K)

9

Generated heat (kcal)

10

Cooling water flow rate (L/h)

Based on the dataset, three typical SVDD-based batch process monitoring methods, including VWUSVDD, KSVDD and the proposed MLGAK-SVDD

Multi-local SVDD with Generalized Additive Kernels

577

method, are compared in detail. For handling  correla the possible nonlinear 2 2 tion, the Gaussian kernel K(xi,k , xj,k ) = exp − xi,k − xj,k  /2σ is utilized in all methods, and the kernel width parameter σ is chosen as 8 in our case study. In KSVDD and VWUSVDD,the adjustable parameter ν is chosen as 0.01 and 0.0005 respectively. In MLGAK-SVDD, the parameters σ1 and σ2 are both chosen as 0.01, and the parameter η takes different values (e.g. 1 and 0.5) to do the comparative experiment. Their on-line control charts based on the L-D statistic for monitoring the four faulty batches are plotted in Fig. 1. And Table 3 lists the testing accuracy (the testing dataset consists of 10 normal batches and 4 faulty batches) and the corresponding action time to alarm the faulty batches. Table 2. Introduction of four types of faults. Fault number Variable

FT

FM(%) ST(h) TT(h)

1

Substrate feed rate Ramp −0.003 60

2

Substrate feed rate Step

3

Agitator power

Ramp −1

4

Agitator power

Step

−15 −15

400

55

400

40

400

30

400

Table 3. On-line fault detection results of different SVDD methods based on CRMS-D statistic. Method

TA

VWUSVDD

1.000 252

F1 (60 h) F2 (55 h) F3 (40 h) F4 (30 h) 77

273.5

31.5

KSVDD

0.929 209.5

62

234.5

31.5

MLGAK-SVDD (η = 1)

0.929 211.5

63

238.5

31.5

64.5

241

31.5

MLGAK-SVDD (η = 0.5) 0.929 211.5

In general, VWUSVDD alarm time for four faulty batches is later than other methods. KSVDD obtains the earliest alarm time here, which however may be easy to wrongly predict a normal sample as a fault. MLGAK-SVDD monitoring results in Table 3 are between VWUSVDD and KSVDD. Figure 2 presents the end-of-batch fault detection results of MLGAK-SVDD with η = 0.5, where each point corresponds to a batch sample.

578

H. Wang et al.

24 22

Training Testing: normal Testing: faulty Control limit

20

Dist

18 16 14 12 10 8

0

20

40

60 Samples

80

100

120

Fig. 1. End-of-batch fault detection results of MLGAK-SVDD with η = 0.5

0.9

0.9

0.8

0.8 0.7

Dist

Dist

0.7 0.6 0.5

0.5 0.4

0.4 0.3

0.6

0.3 0.2 0

100

200 Time

300

400

0

0.9

0.9

0.8

0.8

0.7

0.7

0.6

0.6

0.5

0.4

0.3

0.3 0

100

200 Time

300

(c) MLGAK-SVDD (η = 1)

300

400

300

400

0.5

0.4

0.2

200 Time

(b) KSVDD

Dist

Dist

(a) VWUSVDD

100

400

0.2

0

100

200 Time

(d) MLGAK-SVDD (η = 0.5)

Fig. 2. L-D control charts of different SVDD methods: (a) VWUSVDD, (b) KSVDD, (c) MLGAK-SVDD with η = 1, and (d) MLGAK-SVDD with η = 0.5.

Multi-local SVDD with Generalized Additive Kernels

5

579

Conclusion

This paper has proposed a Multi local SVDD with generalized additive kernels (MLGAK-SVDD) method for batch process fault detection. It based on the global constraints about the whole batch, MLGAK-SVDD considers the relationships between different time intervals and obtains an end-of-batch fault detection model. The experiment of a fed batch penicillin fermentation illustrates the validity of the method. Acknowledgements. This work was supported by the Foundation of State Key Laboratory of Process Automation in Mining&Metallurgy (BGRIMM-KZSKL-2018-04).

References 1. Qin SJ (2012) Survey on data-driven industrial process monitoring and diagnosis. Annu Rev Control 36(2):220–234 2. Yin S et al (2017) Fault detection for nonlinear process with deterministic disturbances: a just-in-time learning based data driven method. IEEE Trans Cybern 47(11):3649–3657 3. Gao X, Ma R (2016) Fault detection of batch process based on MSICA-OCSVM. In: Chinese control and decision conference (CCDC) 2016, pp 3461–3465 4. Mahadevan S, Shah SL (2009) Fault detection and diagnosis in process data using one-class support vector machines. J Process Control 19(10):1627–1639 5. Lv Z, Yan X, Jiang QC (2017) Batch process monitoring based on self-adaptive subspace support vector data description. Chemom Intell Lab Syst 170:25–31 6. Ge ZQ, Gao FR, Song ZH (2011) Batch process monitoring based on support vector data description method. J Process Control 21(6):949–959 7. Liu XQ et al (2008) Statistical-based monitoring of multivariate non-Gaussian systems. AIChE J 54(9):2379–2391 8. Sun RX, Tsung F (2003) A Kernel-distance-based multivariate control chart using support vector methods. Int J Prod Res 41(13):2975–2989 9. Sukchotrat T, Kim SB, Tsung F (2010) One-class classification-based control charts for multivariate process monitoring. IIE Trans 42(2):107–120 10. Wang J et al (2013) Soft-transition sub-PCA fault monitoring of batch processes. Ind Eng Chem Res 52(29):9879–9888 11. Yao M, Wang HG (2015) On-line monitoring of batch processes using generalized additive Kernel principal component analysis. J Process Control 28:56–72 12. Ramaker HJ et al (2005) Fault detection properties of global, local and time evolving models for batch process monitoring. J Process Control 15(7):799–805 13. Boyd SP, Vandenberghe L (2004) Convex optimization. Cambridge University Press, Cambridge ¨ 14. Birol G, Undey C, C ¸ inar A (2002) A modular simulation package for fed-batch fermentation: penicillin production. Comput Chem Eng 26(11):1553–1565 15. Lee JM, Yoo CK, Lee IB (2004) Fault detection of batch processes using multiway Kernel principal component analysis. Comput Chem Eng 28(9):1837–1847

A Cooperative Target 3D Tracking Method Based on EPnP and Adaptive Kalman Filter Haodong Ding, Kun Liu(&), Peng Chen, and Haiyong Chen School of Artificial Intelligence and Data Science, Hebei University of Technology, Tianjin 300130, China [email protected]

Abstract. Cooperative target 3D tracking can be treated as an extension of the pose estimation problem, since the pose tracking result is not only based on the correspondences between the control points and the image points, but also based on estimation of the target movement. Therefore, a two stages method is proposed in this paper. The first stage is the initialization stage, the initial pose estimation is acquired by using EPnP algorithm in this stage. The second stage is the pose tracking stage, where the pose varying and its varying rates are acquired by using the extended kalman filter, denoted as EKF. However, the statistic characters of the noise of the motion model and the measurement model are assumed to be fixed and predefined in EKF. Whereas, in reality, because of the uncertainty of the movement between the cooperative target and the camera, the motion noise is usually not available. Therefore, an adaptive estimation process for the motion noise is introduced in this paper. Experimental results show that a good 3D tracking result can be acquired by combining EPnP and adaptive extended kalman filter. Keywords: Measurement

 Pose estimation  3D tracking  Kalman filter

1 Introduction Pose estimation is a core problem in robotics, computer vision and augmented reality [1, 2]. Under the premise of cooperative target, the matching relationship between 3D features of the model and 2D features of the image is known. The problem of pose estimation focuses on how to use the matching relationship between 3D features and 2D features to solve the position and pose changes of the target relative to the camera. In the field of computer vision, pose estimation was first proposed in 1981 [3], and has attracted extensive attention since then. At present, there are two main algorithms for pose estimation: analytical algorithm and iterative algorithm. Among them, the analytical algorithm uses the geometric relationship between 3D feature points and 2D feature points to obtain the analytical expression of pose parameters. The EPnP algorithm proposed in [4] is considered as the algorithm with the lowest computational complexity in the analytical algorithm. Compared with analytical algorithm, iterative algorithm has the advantages of simple calculation process and strong ability to resist image noise interference and feature point mismatching. The simplest type of iterative algorithm is similar to the © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 580–591, 2020. https://doi.org/10.1007/978-981-32-9050-1_66

A Cooperative Target 3D Tracking Method Based on EPnP and Adaptive KF

581

cluster adjustment in stereo vision [5]. POSIT algorithm [6] is an iterative algorithm designed by using the weak perspective projection model. The algorithm first uses the weak perspective projection model to solve the pose parameters at this time, and then corrects the imaging model according to the pose parameters solved. After iteration, the imaging model is gradually approximated to the perspective projection model from the weak perspective projection model. Orthogonal iteration algorithm [7] is designed according to the structural characteristics of perspective projection model of an iterative algorithm, this algorithm is one of the biggest contribution. The 3D tracking problem based on cooperative target can be regarded as an extension of pose estimation problem, because the solution of this problem also requires the corresponding relationship between some features (such as points, lines, included angles, etc.) on cooperative target and image to estimate pose parameters. Different cooperation is based on target tracking problem of three-dimensional need to realize registration form. Through the analysis of image sequence estimation, thus reflecting on the composition of state variables, the three-dimensional tracking problem of state variables both pose parameters of six degrees of freedom, also contains over time and the rate of change of these parameters, is one of the 12-dimensional vectors, which makes complex, such as particle filter. Filter is hard to realize the real-time modeling, the characteristics of the distribution system model which can lead to Kalman Filter technology (Kalman Filter, KF). In particular, Extended Kalman Filter (EKF) has been widely applied in 3D tracking [8]. In [9], KF is used to construct a real 3D pose tracking system. One advantage of using filtering technology in 3D tracking is that KF’s recursive attribute makes it easy to make comprehensive use of redundant information or information from other sensors in the 3D tracking process, thus reducing the requirement for the number of feature points. However, extended kalman filter is a kind of sub-optimal filter. In order to obtain satisfactory 3D tracking results, not only accurate initial pose is required to start the filtering process, but also the statistical characteristics of noise should be determined in advance [8] and the sampling frequency should be as high as possible to meet the requirements of local linearization [10]. It is found in [11] that in the process of tracking the fast and nonlinear dynamic trajectory, the EKF-based system is very easy to diverge even with a high sampling frequency because the estimation of the statistical characteristics of the motion model noise is not accurate. However, in the actual dynamic environment, the motion of the cooperative target relative to the camera is often difficult to be accurately predicted, so the noise characteristics of the motion model are still difficult to be obtained even if the distribution characteristics of measured noise can be obtained through experiments or experience in advance [12]. In this paper, the 3D tracking problem of cooperative targets is solved in two stages, namely, the initial pose estimation stage and the pose tracking stage. In the initial pose estimation stage, considering that the iterative algorithm is prone to fall into local extremum, it is not guaranteed to converge to the optimal solution, and the iterative calculation process is time-consuming and slow, the EPnP algorithm with the lowest computational complexity is selected to obtain the initial pose estimation of the cooperative target. In the phase of position tracking, the six-dof pose parameters and their rate of change are combined to form a 12-dimensional state vector. Based on the constant velocity hypothesis and perspective projection model, the motion model and

582

H. Ding et al.

measurement model of filtered estimation are constructed respectively. Among them, the noise of the measurement model mainly comes from the pixel deviation of the image, whose statistical characteristics can be obtained through offline experiments, while the noise of the motion model cannot be accurately obtained due to the uncertainty of the cooperative target relative to the motion of the camera. Therefore, by referring to [8, 13], a method for dynamically estimating the statistical characteristics of motion model noise in the process of filtering is introduced, and an adaptive extended kalman filter, denoted as AEKF, is constructed accordingly.

2 Problem Description In the perspective projection model, the coordinate system included in the imaging process is shown in Fig. 1. After calibration, the focal length of the camera is denoted as f, and the position of the main point of the image in the pixel coordinate system is denoted as u0 = [u0, v0]T, and the unit pixel size is denoted as du dv. Write n control points as Pi, i = 1, 2, …, n, Pwi ¼ ½Xiw ; Yiw ; Ziw T in the world coordinate system, Pci ¼ ½Xic ; Yic ; Zic T in the camera coordinate system, Pi’s two-dimensional projection in the image coordinate system is denoted as pi = [xi, yi]T, and ui= [ui, vi]T in the pixel coordinate system.

Fig. 1. The coordinate systems involved in the imaging model

In the homogeneous coordinate representation, the imaging process in Fig. 1 can be expressed as: ~w ~i ¼ K½RjtP ki u i

ð1Þ

~ w is the homogeneous coordinate representation ~i and P where, ki is the scaling factor, u i of ui and Pwi , respectively. The matrix K is composed of the following in-camera parameters:

A Cooperative Target 3D Tracking Method Based on EPnP and Adaptive KF

2

3 u0 v0 5 1

c fv 0

fu K¼40 0

583

ð2Þ

where, usually c = 0. In formula (1), R and t are called the external parameters of the camera, R is the rotation matrix, and R  SO(3), represents the pose of the camera, t is the translation vector, and t  >   > > > fyij ¼ bfy rij ; zij ; hij ; /ij Ij >   >

szij ¼ bsz rij ; zij ; hij ; /ij Ij >   > > > szij ¼ bsy rij ; zij ; hij ; /ij Ij > >   : szij ¼ bsz rij ; zij ; hij ; /ij Ij

ð1Þ

where rij , zij , hij , /ij are the relative positions and orientations between ith magnet and jth coil, rij is the radial distance from ith magnet to jth coil, zij is the vertical distance, hij and /ij are the pitch angle and yaw angle, respectively, the values of functions bfx , bfy , bfz , bsx , bsy , bsz are obtained by the numerical calculation and are stored in lookup tables.

Adaptive Sliding Mode Control for a 6 DOFs Magnetic Levitation System

595

The electromagnetic forces are calculated as the Eq. (2): 2

3 Fx   F ¼ 4 Fy 5 ¼ F1 ;    ; Fj ;    ; F7 Fz

ð2Þ

2 3 2 3 fxij P P Fxj 4 Fyj 5 ¼ where Fj ¼ Rmij 4 fyij 5Ij , i ¼ 1; 2; 3; 4. i i Fzj fzij Fj is the electromagnetic forces generated by jth coil, Rmij is the transformation matrix from model coordinate of ith magnet and jth coil to global coordinate, i ¼ 1; 2; 3; 4 is the vector of currents in coils. Total electromagnetic torques exert on the mover are the sum of each electromagnetic torques directly generated by each corresponding coil and additional torques caused by electromagnetic forces. Electromagnetic torques are calculated as the Eq. (3): 2

3 Tx   T ¼ 4 Ty 5 ¼ T1 ;    ; Tj ;    ; T7 Tz

ð3Þ

2 3 2 3 2 3 sxij fxij P P Txj P 4 Tyj 5 ¼ Rmij 4 syij 5Ij þ where Tj ¼ ri  Rmij 4 fyij 5Ij , i ¼ 1; 2; 3; 4. i i i Tzj szij fzij Tj is the electromagnetic torques generated by jth coil, ri is the vector from each magnet to center of gravity of the mover in the global frame.

3 Dynamic Modeling and Analysis Assume that levitated platform only rotates within small angles, the magnetic levitation system can be modeled as Eq. (4): 8 M€x ¼ Fx > > > > M€y ¼ Fy > > < M€z ¼ Fz þ G ð4Þ Jx €a ¼ Tx > > > > € ¼ Ty Jb > > : y € Jz c ¼ T z where G is the force of gravity, M is the mass of the levitated platform. Jx , Jy , Jz are the moments of inertia. x, y, z are the positions of mover, a, b, c are the Euler angles.

596

M. Duan et al.

The total electromagnetic forces and torques can be represented as Eq. (5): K ¼ BI

ð5Þ

 T where K ¼ Fx =M; Fy =M; Fz =M; Tx =Jx ; Ty =Jy ; Tz is the vector of total electromagnetic forces and torques, input matrix B 2 R611 is a linear matrix at each fixed position and orientation and given by: B ¼ ½B1 ;    ; B7 T

ð6Þ

 T where Bj ¼ Fx =M; Fy =M; Fz =M; Tx =Jx ; Ty =Jy ; Tz =Jz , _ c_ . The Eq. (4) can be rewritten as: _ b; Choose x1 ¼ ½x; y; z; a; b; cT , x2 ¼ ½_x; y_ ; z_ ; a; 

x_ 1 ¼ x2 x_ 2 ¼ K ¼ BI

ð7Þ

Considering that the preset positions and orientations in the numerical calculation model are discrete, matrix B can not be obtained when the mover is at the intervals between preset sampling points. In this paper, the nearest-neighbor positions and orientation are introduced to replace real points, the errors of caused by sampling intervals are introduced as uncertain parameters DB, obviously, DB are bounded, so the dynamic equations can be written as: 

x_ 1 ¼ x2 x_ 2 ¼ K ¼ ðBo þ DBÞI

ð8Þ

where Bo is the normal part of B that can be obtained from the lookup tables of precomputed forces and torques.

4 The Redundancy of Coils The system is over actuated, because the number of coils is more than the DOFs of system. The design of over actuated system is often split into two steps. Firstly, a controller is designed to produce the K to deal with the system uncertainties and to control the mover’s motion, an adaptive sliding mode controller will be introduced in next section. Secondly, a control allocation method is designed to convert the K to the coil currents. The control allocation method aims at minimizing the ohmic losses in coils, Bo is a linear matrix at each sampling point, so coil currents can be obtained by calculating the pseudoinverse of Bo :  1 I ¼ BTo Bo BTo

ð9Þ

whether the coil currents can be calculated is decided by the singularity of matrix. If the matrix Bo is singular and has no pseudoinverse at some positions and orientations, the

Adaptive Sliding Mode Control for a 6 DOFs Magnetic Levitation System

597

coil currents can’t be obtained. So, condition number is introduced to measure the singularity of matrix in this paper, small condition number can guarantee the existence of the pseudoinverse, and can cancel out the perturbations in the data of electromagnetic forces and torques. The size, shape and arrangement of coils and magnets should be optimized to get good condition numbers. Apply Eq. (9) to (8), the dynamic equation can be obtained as: 

x_ 1 ¼ x2  1 K x_ 2 ¼ K þ DBBTo Bo BTo

ð10Þ

 1 K is the system uncertainties caused by DB. where DBBTo Bo BTo

5 ASMC Design An ASMC is designed to control the maglev system with uncertain parameters. Firstly, define the desired states xd ¼ ½x1d ; x2d T , the tracking errors can be written as: e1 ¼ x1  x1d ; e2 ¼ x2  x2d

ð11Þ

The sliding surfaces functions are defined as: S ¼ ½s1 ; s2 ; s3 ; s4 ; s5 ; s6 T ¼ C1 e1 þ C2 e2

ð12Þ

where C1 ¼ diagðc11 ; c12 ; c13 ; c14 ; c16 Þ, C2 ¼ diagðc21 ; c22 ; c23 ; c24 ; c25 ; c26 Þ. C1 and C2 are the diagonal positive definite matrix, the elements of these two matrixes are chosen be positive to guarantee that the sliding surface function sk ¼ c1k e1 ðk Þ þ c2k e2 ðkÞ is Hurwitz, where k ¼ 1; . . .; 6. Differentiating S with respect to time yields: S_ ¼ C1 e_ 1 þ C2 e_ 2 ¼ C1 e2 þ C2 e_ 2    1 ¼ C1 ðx2  x_ 1d Þ þ C2 K þ DBBTo Bo BTo K  x_ 2d

ð13Þ

¼ C1 x2 þ C2 K  C1 x_ 1d  C2 x_ 2d þ W  1 K is the lump system uncertainties and can be written as where W ¼ C2 DBBTo Bo BTo a diagonal matrix. In practice, input currents and driving forces and torques are bounded, so W can be guaranteed to be bounded. The control input K is designed as: K ¼ Ko þ Ks

ð14Þ

598

M. Duan et al.

where Ko ¼ C21 C1 x2  C21 C1 x_ 1d  x_ 2d Ks ¼ C21 CðSÞsgnðSÞ CðSÞ ¼ diagðk1 ðs1 Þ; k2 ðs2 Þ; k3 ðs3 Þ; k4 ðs4 Þ; k5 ðs5 Þ; k6 ðs6 ÞÞ sgnðSÞ ¼ diagðsgnðs1 Þ; sgnðs2 Þ; sgnðs3 Þ; sgnðs4 Þ; sgnðs5 Þ; sgnðs6 ÞÞ kk ðsk Þ is the adjustable parameter, and the adaptive law is designed as: kk ðsk Þ ¼

1 ksk k ak

ð15Þ

where ak is the adaption gain and is positive. Assume that kdk is the terminal solution of kk ðsk Þ and it can satisfy that kwk k\kk ðsk Þ, wk is the diagonal element of matrix W. Choose the adaption errors matrix as: ~ ¼ C ð SÞ  C d C

ð16Þ

where Cd ¼ diagðkd1 ; kd2 ; kd3 ; kd4 ; kd5 ; kd6 Þ. Theorem 1. Consider the maglev system (10) under controller (14), with sliding functions (12) and adaption laws according to (15), errors in the maglev system would converge to zero asymptotically [6, 7]. Proof: The Lyapunov candidate function is considered as: 1 1~ ~ C V ¼ ST S þ CX 2 2

ð17Þ

where X ¼ diagða1 ; a2 ; a3 ; a4 ; a5 ; a6 Þ. Differentiating the Lyapunov candidate function with respect to time, we can obtain: ~ C ~_ V_ ¼ ST S_ þ CE ~ C ~_ ¼ ST ðC1 x2 þ C2 K  C1 x_ 1d  C2 x_ 2d þ WÞ þ CE   ~_ ~ C ¼ ST ðC1 x2 þ C2 C21 C1 x2  C21 C1 x_ 1d  x_ 2d  C21 CðSÞsgnðSÞ  C1 x_ 1d  C2 x_ 2d þ WÞ þ CE ¼ ST ðWðX; IÞ  CðSÞsgnðSÞÞ þ ðCðSÞ  Cd Þs sgnðSÞ ¼ ST W  Cd ST sgnðSÞ\0:

Hence, the condition of Lyapunov stability theory is achieved. The sliding surfaces sk ¼ 0 can be reached, so the system states can converge to the desired states asymptotically. The proof is completed. In practice, in order to eliminate the chattering introduced by sgnðSÞ, saturation function satðsk =/k Þ is used to replace sgnðsk Þ, and it can smooth the control input.

Adaptive Sliding Mode Control for a 6 DOFs Magnetic Levitation System

sat

sk /k

¼

8 < sk ; / k

: sgnðsk Þ;

sk /k  1 sk / [ 1

599

ð18Þ

k

6 Simulation Results Several simulation examples are shown in this part to illustrate the effectiveness of the designed ASMC. Firstly, the numerical calculation of electromagnetic forces and torques is carried out. Secondly, the simulation results compared with a PD controller on the six DOFs magnetic levitation system are presented. Numerical model has been introduced in Sect. 2, the coil height in the model is 30 mm, the inside diameter and outside diameter are 15 mm and 27 mm, respectively, the number of windings is 600, the current is chosen as 2A, the magnet is 10 mm in height and 30 mm in diameter, the material in the model is NdFeB, its magnetic susceptibility value is 0.063, the remanent magnetization is 1.2T and the direction of magnetization is along the axis. The ranges of r and z in the numerical calculation are 0–100 mm and 0–15 mm, respectively, the sampling interval in translation is 1 mm, the ranges of h and / are 0–40°and 0–360°, the sampling interval in rotation is 20°. Because the numerical calculation results are too many to show them all, Fig. 3 just shows the situation in which the h ¼ 0 and / ¼ 20 . The values of normal matrix Bo are calculated as nearest-neighbor points, the values of real matrix B are replaced by interpolation of adjacent points in simulations.

Fig. 3. Calculated forces and torque with h = 0° and / = 20°

Fig. 4. Coils and magnets arrangements

600

M. Duan et al.

The arrangement of coils and magnets are designed to reduce values of condition number of matrix Bo , the diagram of designed arrangement is shown in Fig. 4. The mass of the mover is given as 0.43 kg, the inertia of the mover is given as: Jx ¼ 0:363 kg  m2 , Jy ¼ 0:363 kg  m2 , Jz ¼ 0:712 kg  m2 . The desired trajectory of translation is designed as: 2 3 2 3 x 8 sinð2ptÞ 4 y 5 ¼ 4 8 cosðptÞ 5 z 5 þ 3t The desired orientation is designed as a ¼ 0:2 rad, b ¼ 0:5 rad, b ¼ 0 rad, The initial state is chosen as: x ¼ 2 mm, y ¼ 0 mm, z ¼ 5 mm, a ¼ 0 rad, b ¼ 0 rad, c ¼ 0:3 rad. The parameters of the proposed controller are shown as follows: C1 ¼ diagð1; 1; 1; 1; 1; 1Þ; C2 ¼ diagð25; 25; 25; 25; 25; 25Þ; X ¼ diagð0:05; 0:05; 0:05; 0:05; 0:05; 0:05Þ; Cd ¼ diagð0:5; 1:2; 2:0; 0:2; 0:2; 0:2Þ: Figures 5 and 6 show the performance about translation trajectory and rotation trajectory under the ASMC and PD controller, respectively.

Fig. 5. Translation trajectory tracking with ASMC (left) and PD controller (right)

We can find that the proposed ASMC can track the desired translation and rotation trajectory very well from the simulation results. Compared with the PD controller, the proposed control algorithm can give better performance, it has small tracking errors and faster convergence. As a consequence, the stability and robustness of the designed algorithm are verified through the simulation results. Input coil currents of the proposed ASMC and condition numbers of matrix Bo along the trajectory are shown in Fig. 7. It can be observed that the condition numbers are small enough. The coil currents just exceed 10A in very short time when the system starts up and are smooth enough during the simulations, so the control currents can be realized in practice.

Adaptive Sliding Mode Control for a 6 DOFs Magnetic Levitation System

601

Fig. 6. Rotation trajectory tracking with ASMC (left) and PD controller (right)

Fig. 7. Coil currents of ASMC (left) and conditions numbers along the trajectory (right)

7 Conclusion This paper has investigated a six DOFs maglev system, driving forces and torques are calculated by numerical simulation method with a simplified model consists of only one coil and one magnet. The errors of input matrix caused by sampling intervals are introduced as system uncertainties. In order to overcome this problem, an ASMC was designed, the adaptive algorithm can obtain the bounds of system uncertainties. The stability of the proposed control strategy has been proved by Lyapunov theory. Results of the calculation simulations have presented that the controller can deal with input uncertainties and the system can achieve faster convergence under this controller. Also, the arrangements of magnets and coils are designed to guarantee small condition numbers of the input matrix to overcome the perturbations in forces and torques data. The pseudoinverse algorithm that converts forces and torques to coil currents can minimize the sum of squares of currents. In the future, saturation of the input currents should be considered, and the experiment will be completed. Acknowledgments. This work was supported by the National Basic Research Program of China (973 Program: 2012CB821200, 2012CB821201) and the NSFC (61327807, 61521091, 6152010 6010, 61134005).

602

M. Duan et al.

References 1. Earnshaw S (1842) On the nature of the molecular forces which regulate the constitution of the Luminiferous Ether. Trans Camb Philos Soc 7:97–112 2. Jansen JW, Van Lierop CMM, Lomonova EA, Vandenput AJA (2007) Modeling of magnetically levitated planar actuators with moving magnets. IEEE Trans Magn 43(1):15–25 3. Lu X, Usman I (2012) 6D direct-drive technology for planar motion stages. Cirp Ann Manuf Technol 61(1):359–362 4. Lai Y, Lee Y, Yen J (2007) Design and servo control of a single-deck planar maglev stage. IEEE Trans Magn 43(6):2600–2602 5. Berkelman PJ, Dzadovsky M (2012) Magnetic levitation over large translation and rotation ranges in all directions. IEEE-ASME Trans Mechatron 18(1):44–52 6. Huang YJ, Kuo T, Chang S (2008) Adaptive sliding-mode control for nonlinearsystems with uncertain parameters. Syst Man Cybern 38(2):534–539 7. Liu H, Wang H (2019) Sun J Attitude control for QTR using exponential nonsingular terminal sliding mode control. J Syst Eng Electron 30(1):191–200

Research on the Intelligent Control System for Solar Greenhouse in Consideration of Indoor Dynamic Environment Information Wenwen Gong1, Dong Pu1, Xiaonan Guo1, Xiangnan Zhang1, and Yifei Chen1,2(&) 1

2

China Agricultural University, NW-0201, Beijing, China [email protected] Key Laboratory of Agricultural Information Acquisition Technology (Beijing), Ministry of Agriculture, Beijing, China

Abstract. Aiming at the problems of non-linearity, time-varying and multivariable coupling of the greenhouse, this paper significantly focuses on the analysis of indoor environmental factors such as temperature and humidity, and integrates the dynamic information from greenhouse environment into greenhouse environmental control algorithms. At the same time, based on the technology of neural network control, the MIMO control model of solar greenhouse including temperature and humidity is established, and paper describes the realization of intelligent greenhouse control function in hardware and software as well as results of simulation and testing. Extensive experiments on Zhuozhou Wisdom Demonstration Farm demonstrate that the system has faster response speed and stronger with anti-jamming ability, which indicates the control system has the better performance of dynamic control for greenhouse humiture environment. Reducing the dependence on human planting experience in greenhouse control, and the feasibility of system and effectiveness of intelligent control are provided in the paper finally. Keywords: Solar greenhouse Intelligent control

 Humiture  Neural networks 

1 Introduction Greenhouse, as an especially essential form of modern agriculture, could enable the yield and quality of crops maximized and the best economic benefits ultimately achieved. In a hothouse manner, accurate monitoring and stable control of environmental factors are of absolutely vital importance to increase yield, among which temperature and humidity, as the most fundamental factors, have the most significant impact on the crop [1, 2]. On account of the non-linearity and strong coupling of greenhouse environment [3], various environmental factors in greenhouse environment are complex, interactional and closely related, so it plays a pretty vital role in integrating the dynamic information of environmental variables into the control of greenhouse environment to improve the accuracy of intelligent control. As a result, to © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 603–610, 2020. https://doi.org/10.1007/978-981-32-9050-1_68

604

W. Gong et al.

seek a reasonable and effective control scheme has attracted a common concern from researchers. In [4], feed-forward control was developed into the control of greenhouse environment, and further optimized feedback control. Fuzzy algorithm was introduced to control greenhouse environment, and solve the coupling problem of temperature and humidity through a series of fuzzy logic designs in [5]. According to [6], fuzzy control was adopted to adjust temperature and humidity. From the above study, we conclude that the existing research work falls short in considering the dynamic variation of the greenhouse environment elements on the entire control logic, only basing on the environmental factors at a certain time. Therefore, the MIMO (Multiple-Input Multiple-Output, MIMO) control intelligent control system, in this paper, is designed and implemented to solve this problem, not only the current temperature and humidity in the greenhouse as the influencing factor, but also dynamic changes related to temperature and humidity as one of the core elements, as elaborated in the next section.

2 The Design of System Structure 2.1

Describing of Greenhouse Intelligent Control System

The general architecture of the greenhouse environmental intelligent control system is revealed in Fig. 1.

Fig. 1. Architecture of greenhouse environmental intelligent control system

The greenhouse intelligent control system mainly consists of three parts: the sensor system, the greenhouse controller and the actuator. After receiving the greenhouse environment data uploaded by the sensor system, the greenhouse controller calculates the corresponding control parameters through the intelligent control algorithm in the greenhouse controller, and converts the control parameters into control commands to control the executing mechanism. Finally, the greenhouse intelligent control system will be constructed to achieve closed-loop regulation of the greenhouse environment.

Research on the Intelligent Control System for Solar Greenhouse

605

Because the temperature and humidity of the solar greenhouse environment mainly are utilized as the control parameters in this paper, temperature sensor and the humidity sensor in the greenhouse are adopted. The greenhouse environmental controller, as the core of the intelligent control system, is responsible for communication with sensors, actuators. 2.2

Analysis of Greenhouse Microenvironment Factors

By controlling the ventilation of solar greenhouse, the control of greenhouse microenvironment can be realized, so that the temperature and humidity in greenhouse can be maintained within the optimum scope suitable for crop growth [7]. To achieve the goal of intelligent control of greenhouse micro-environment, in this study, the dynamic environmental messages at the current moment are integrated into the model. The change rate of humiture is calculated by linear regression equation. The concrete design is as follows: when the acquisition time is reached, data is collected by a timer that time interval is set as 1 s; after 60 sets of data are collected, the original linear regression equation is established based on the Eq. (1). y ¼ kx þ b

ð1Þ

In which, y represents the value of current humiture; and x, x = 1, 2, 3 … 60, signifies the acquisition time. Then, k, b means the slope and the intercept of the linear equation, respectively. x and y are seen as column vectors. The above formula can be expressed as formula (2), in which a column with figures of 1 is added before the X vector, then XT is as follows:  X¼

x1 1

x2 1

   xn  1

 ð2Þ

The linear regression equation becomes y ¼ kx, among them k ¼ ½ b k . The linear regression formula is resolved by the normal equation, and the calculation formula of the normal equation is as follows (3). K ¼ X  X 1

1

XY

ð3Þ

Based on the collected data and the above formulas, k and b can be obtained, where the value of K denotes the corresponding variation rate. The input of the current model includes: the rate of humiture change, current greenhouse, humidity, season, generally season as a fixed constant. 2.3

The Construction of Greenhouse Implementation Agency

In the actual context, the solar greenhouse usually reserves two vents on the upper side and the lower side of the greenhouse [8], the upper one is called top ventilation, and the opposite is called bottom ventilation, where they cooperate with each other to achieve the regulation of temperature and humidity for solar greenhouse.

606

W. Gong et al.

We employ the Fig. 2 to demonstrate the sectional drawing of greenhouse, in the case of O1 and O2 centered rectangular coordinate system respectively. When rectangular coordinates centered on O1 and O2 are established respectively, and the range of angle value is [0°, 90°]. Therefore, the definition is made as follow, in this paper, when the position of top or bottom ventilation is at 90 , that is to say, when the top or bottom ventilation is fully opened, the normalized output value is 0.9; similarly, when the top or bottom ventilation position is 0 , the normalized output value is 0. Furthermore, the angle of the actuator is normalized by formula (4). y¼

x 100

ð4Þ

Among them, x, y expresses the angle value corresponding to the current actuator and the normalized value, severally.

Fig. 2. The sectional view for greenhouse

3 The Design of Intelligent Controller 3.1

The Hardware Design

3.1.1 Overall Design When the hardware is mentioned, the intelligent controller for solar greenhouse context developed in this paper employs ARM Cortex-A7 processor with 528 MHz main frequency and Linux as the core processor and the underlying operating system, respectively, in which the processor supports maximally industrial bus interfaces such as 8-way UART, 2-way Ethernet and 2-way CAN. The controller is prevailingly composed of the following-next four functions: data visualization, sensor data reading, driving peripherals and network communication. More specially, data visualization is primarily utilized to reveal status messages at the current environment; by virtue of WIFI, we are capable of acquire a large sum of valuable data. WIFI also utilizes multilayer protocol like TCP/IP to implement communications, which is the same as traditional network communication.

Research on the Intelligent Control System for Solar Greenhouse

607

The hardware of the controller be principally comprised of four parts shown in Fig. 3, including power module, screen display module, communication module and DO module. We employ the example in Fig. 3 to illustrate the overall design of the intelligent controller for solar greenhouse.

Screen display

Com munic ation

Network port module

A/D conversion module

AI

Relay

DO

ARM processor

RS485 WIFI

Power module

Fig. 3. The hardware design of greenhouse context controller

3.1.2 The Control of Process In view of the control variations of dynamic real-time data from greenhouse environment and the ductility of greenhouse control system, we set an interval of 10 min to regulate, but the information monitoring is real-time in terms of sensors (reading greenhouse environmental data every 1 s). The control procedure is executed immediately after the power is turned on. The current context message is gathered by the sensor in ten minutes, and then estimated whether them is in the appropriate range by the intelligent control algorithm existing in the controller. If not, start making model predictions; on the contrary, continue gathering the environmental information. Model predictions, more specifically, is to evaluate more precisely the varying tendency of environmental information and convert the predicted results into a series of control variables corresponding to location of top and bottom ventilation. In this way, we can command the motion of the corresponding ventilation window, which means that a whole regulation completes is accomplished and the next regulation cycle expected. 3.2

The Software Design - Control Model of Greenhouse Environmental

3.2.1 Model Structure In light of that the control model needs to be embedded in the intelligent greenhouse controller, BP neural network widely used (hereinafter referred to as the neural network) which requires is introduced to make a significant contribution to the establishment of the model with less computation, whose overall structure is revealed in Fig. 4. To be exact, the model possesses a hidden layer, five input nodes (which are called temperature, humidity, variance ratio of temperature, variance ratio of humidity

608

W. Gong et al.

and season) and 20 output nodes (which signifies the top and bottom ventilation positions, respectively), which corresponds to MIMO control model.

Fig. 4. The structure of model in this study

3.2.2 Model Training With regard to the training process of neural network, forward calculation was carried out first and then back propagation is followed. Sample is inputted to be trained one by one. Set the epoch of the neural network at 10, and the resulting error curve of neural network is displayed in Fig. 5. As depicted explicitly in the Fig. 5, the error curve of the network model at the beginning is relatively large, however the convergence speed is highly fast. Finally, the resulting model error is approximately 0.0386. The neural network achieves the target convergence effect while training times reach about 5000.

Fig. 5. The training error diagram of neural network

Research on the Intelligent Control System for Solar Greenhouse

609

4 Simulation Test and Analysis The total number of training samples adopted in this paper reach up to 2,800 so that we can acquire a wonderful model, which are conducted the actual test on the newly collected data from Zhuozhou Wisdom Demonstration Farm. More specifically, there are 40 data points in total (10 data points in each quarter) being set in this test, which verify that whether the output is close to the corresponding value of the current sample under the current environmental state, and the final experimental result is shown in Fig. 6.

Fig. 6. The test result diagram of control model

As you can see in Fig. 6, the outcome is approximate to ideal. Among them, the overall fitting effect of winter simulation is the best. The bottom ventilation is absolutely closed, while the top ventilation is on the high side for once. In the next place, the fitting effect of autumn simulation is followed as a whole. In test sample 2, the top ventilation is on the low side once; and in test sample 3, the bottom ventilation is on the high side once. As for spring and summer, the imitative effect is relatively general, yet the overall value closely approximates the preset actual value, and the maximum deviation is only 10°. Besides, the deviation in spring is high and low, furthermore the deviation in summer is generally high. Such deviation, whereas, is allowed in the regulation of solar greenhouse environment. In general, the intelligent greenhouse regulation model has achieved ideal effects in prediction, and possesses pretty fine generalization capability.

610

W. Gong et al.

5 Conclusion Greenhouse crops are alive, and their physiological functions and ecological processes are difficult to detect and monitor. Therefore, it is comparatively difficult to control the greenhouse environment. We emphatically focus on the humiture in the solar greenhouse as the research control parameters, and at the same time, integrate the context dynamic information of temperature and humidity at a certain moment as the model parameters into the control model, which enables them jointly participate in the intelligent control of temperature and humidity in the greenhouse environment. In the meanwhile, combining with the theory of neural network control to remedy the problems existing in greenhouse control, on the one hand, good practical value in the actual simulation test is achieved in the end, and on the other hand, the growth environment of crops is effectively guaranteed. Therefore, the application of neural network control strategy in intelligent greenhouse control system has better control effect on humiture in greenhouse environment. Acknowledgment. This research was supported by Greenhouse Cluster and Single Greenhouse Control System (Project No. SA2016-01). We also gratefully acknowledge the Aerospace Star Technology Co., Ltd for the support.

References 1. Wu X, Huang Y, Zhao Y (2016) Research on control system of greenhouse temperature and humidity based on fuzzy neural network. J Chin Agric Mech 37(4):63–66, 84. (in Chinese) 2. Wu B, Ren Z, Wang J (2018) Design of automatic control system for temperature and humidity in greenhouse based on mobile phone APP. J Chin Agric Mech 39(4):68–71 (in Chinese) 3. Bian H, Xue Y, Wang J (2014) Fuzzy control system of temperature and humidity in greenhouse, greenhouse and PLC programming. Agric Mech Res 9:147–151 (in Chinese) 4. Patila SL (2008) Modelling of tropical greenhouse temperature by auto regressive and neural network models. Biosys Eng 99(3):423–431 5. Azaza M, Tanougast C, Fabrizio E et al (2016) Smart greenhouse fuzzy logic based on control system enhanced with wireless data monitoring. ISA Trans 61:297–307 6. Ali RB, Aridhi E, Abbes M et al (2016) Fuzzy logic controller of temperature and humidity inside an agricultural greenhouse. In: Renewable energy congress. IEEE, pp 1–6 7. Gao B (2011) Design of intelligent control system for greenhouse temperature and humidity based on ARM. Ningxia University, Yinchuan (in Chinese) 8. Zhang GX, Fu Z, Zhang L et al (2017) The development status and trend of mechanical shutter technology in solar greenhouse in China. J Agric Eng 33(S1):1–10 (in Chinese)

Recursive Relaxation Algorithm for Identification of Multiple Input Multiple Output Systems Ying Zhou1(&), Jing-song Yang3, Tong Wang1, and Hong Wang2 1

3

Hebei University of Technology, Tianjin 300130, China [email protected] 2 93756 Troops, Tianjin, China The 53rd Research Institute of CETGC, Tianjin 300130, China [email protected]

Abstract. The traditional system identification method based on least square method has the disadvantages of heavy computation and slow operation speed in a particular model. In this paper, the off-line identification based on the equation error autoregressive model is studied by using the relaxation algorithm which is proved the unbiasedness and effectiveness. Furthermore, on the basis of off-line identification parameters, the system is identified online by recursive relaxation algorithm that calculated by relaxation algorithm. The simulation results show that the recursive relaxation algorithm has good computational speed and identification accuracy in the multi-input-multi-output linear system. Keywords: Relaxation algorithm Multiple input multiple output

 Online identification  Linear system 

1 Introduction At present, there are many methods to determine model parameters by system identification. The most basic identification method is the least square method [1], However, the least square method does not work best in certain models. Least squares method however in certain model calculation results are poor. The relaxation algorithm not only has good practicality, and the fast computation speed. But it is not suitable for online identification algorithm, in order to solve the limited applicability. Relaxation algorithm is not suitable for online identification of the problem, in this paper the recursive relaxation algorithm. The system can be updated online identification of parameters in the operation process, improve the stability of the system.

2 Relaxation Algorithm Relaxation algorithm to solve the equation error regression model in multi input multi output off-line parameter identification problem [2].

© Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 611–619, 2020. https://doi.org/10.1007/978-981-32-9050-1_69

612

Y. Zhou et al.

Multiple input and multiple output systems can be represented by the following difference equations [3]: ^ 1 ÞUðkÞ þ eðkÞ ^aðz1 ÞYðkÞ ¼ Bðz

ð1Þ

Among them, ^cðz1 ÞeðkÞ ¼ ^eðkÞ. ^eðkÞ is an independent Gauss random vector ^ Selection of likelihood sequence with zero mean and the same covariance matrix R. function:   nY þ N  12 1 T ^ 1 m ^ LðYjU; hÞ ¼ ð2pÞ det R exp  ^e ðkÞR ^eðkÞ 2 k¼n þ 1 " # ð2Þ n þ N X  N2 1 1 m T ^ exp  ^ ^eðkÞ ^e ðkÞR ¼ ð2pÞ det R 2 k¼n þ 1 The logarithm of the upper form is the following formula: J ¼ ln L ¼ 

nX þN mN N ^ 1 ^ 1^eðkÞ ^eT ðkÞR lnð2pÞ  lnðdet RÞ 2 2 2 k¼n þ 1

ð3Þ

^ 1 Þ, J is not the two order function of the parameters in the polynomial ^ aðz1 Þ, Bðz ^ So it is difficult to get the estimated value of h. Therefore, the ^cðz Þ and the R. ^ relaxation algorithm is used to estimate ^h. The first thing to assume is that ^cðz1 Þ and R 1 ^ 1 are known. So it is easy to get ^aðz Þ, Bðz Þ. according to the formula (3). It is derived from the formula (1): 1

^ 1 ÞUðkÞ ^eðkÞ ¼ ^aðz1 Þ^cðz1 ÞYðkÞ  ^cðz1 ÞBðz

ð4Þ

^ ^cðz1 ÞYðkÞ ¼ YðkÞ

ð5Þ

^  nÞ ^ ^aðz1 Þ^cðz1 ÞYðkÞ ¼ YðkÞ þ  þ^ an Yðk

ð6Þ

^ 1 ÞUðkÞ ¼ ^cðz1 ÞB ^ 0 ðz1 ÞUðkÞ þ    þ ^cðz1 ÞB ^ n ðz1 ÞUðk  nÞ ^cðz1 ÞBðz

ð7Þ

Set up

^ji represents the j column element of the Bi . The ui represents the i In the form, the b components of the vector U. Therefore, set ^b: h ^ ^T    b ^T b ¼ ^a b 10 r0

^T ^T    b b 11 r1

^T ^T    b b 1n rn

iT

ð8Þ

^  1Þ     Yðk ^  nÞ ^cðz1 Þu1 ðkÞ    ^cðz1 Þur ðkÞ ^cðz1 Þu1 ðk  1Þ    wðkÞ ¼ ½Yðk ð9Þ 1 1 ^cðz Þur ðk  1Þ^cðz Þu1 ðk  nÞ    ^cðz1 Þur ðk  nÞ

In the formula, k ¼ n þ 1; n þ 2;    ; n þ N.

Recursive Relaxation Algorithm for Identification of Multiple Input

613

So the formula (4) can be expressed ^ ^eðkÞ ¼ YðkÞ  wðkÞ^ b

ð10Þ

The formula for the upper entry (3) J¼

nX þN h iT 1 h i mN N ^ 1 ^ ^ ^ lnð2pÞ  lnðdet RÞ YðkÞ  wðkÞ^ b R YðkÞ  wðkÞ^ b ð11Þ 2 2 2 k¼n þ 1

The partial derivative is 0 nX þN nX þN @J ^ 1 YðkÞ  ^ 1 wðkÞ^ wT ðkÞR wT ðkÞR b¼0 ¼ ^ @b k¼n þ 1

ð12Þ

k¼n þ 1

It will obtain: "

nX þN ^b ¼ 1 ^ 1 wðkÞ wT ðkÞR N k¼n þ 1

#1 "

þN 1 nX ^ ^ 1 YðkÞ wT ðkÞR N k¼n þ 1

# ð13Þ

^ 1 Þ are obtained, and the function of eðkÞ. ^eðkÞ to represent ^cðz1 Þ ^aðz1 Þ and Bðz can be obtained. ^eðkÞ ¼ eðkÞ  ^cEk

ð14Þ

 ^c ¼ c1

ð15Þ

In the formula:

 Ek ¼ eT ðk  1Þ Je ¼

nX þN

c2    cq



 eT ðk  2Þ     eT ðk  qÞ

½eðkÞ  ^cEk T ½eðkÞ  ^cEk 



ð16Þ ð17Þ

k¼n þ 1

Minimum to ^c "

þN 1 nX ^c ¼ eðkÞETk N k¼n þ 1

#"

þN 1 nX Ek ETk N k¼n þ 1

#1

nX þN ^¼1 R ½eðkÞ  ^cEk T ½eðkÞ  ^cEk  N k¼n þ 1

ð18Þ

ð19Þ

614

Y. Zhou et al.

3 Properties of Relaxation Algorithm The off-line relaxation algorithm is estimated by ^bR for its statistical properties [4–6]. This paper mainly analyzes its unbiased, effective, and consistent, so the following theorem is proposed. 3.1

A Subsection Sample

In the relaxation2 algorithm,3it can be seen from the formula (10) that the mean of the ^eðnÞ 6 7 .. noise Vn þ N ¼ 4 5 is zero. It can assume that: . ^eðn þ NÞ

2

Gn þ N

3 2 1 wðn þ 1Þ ^ R 6 wðn þ 2Þ 7 1 6 6 7 ^ 6 ¼6 7; R ¼ 6 .. 4 5 4 . wðn þ NÞ

3 ^ 1 R

..

.

^ 1 R

2

7 7 ^ nþN 7; Y 5

3 ^ þ 1Þ Yðn 6 Yðn ^ þ 2Þ 7 6 7 ¼6 7 .. 4 5 . ^ Yðn þ NÞ ð20Þ

The formula (13) can be expressed as ^b ¼

 1  1 T ^ 1 G ^ ^   GTn þ N R R Y G nþN nþN nþN

ð21Þ

Set Vt and Gt are independent, then the relaxation algorithm parameter estimation ^bR is the unbiased estimation of b, that is: h i E ^bR ¼ b

ð22Þ

It is proved that the formula (10) is arranged in the formula (22), then the mathematical expectation of ^bR is: 2" #3 #1 " nX þN nX þN h i 1 1 ^ 5 ^ wðkÞ ^ YðkÞ wT ðkÞR wT ðkÞR E ^bR ¼ E4 k¼n þ 1

" ¼E

^ 1 G GTn þ N R nþN

1 

k¼n þ 1

^ GTn þ N R

¼b That is to prove that the parameter is unbiased.

1

Vn þ N þ b

#

Recursive Relaxation Algorithm for Identification of Multiple Input

3.2

615

Estimation Error Covariance Theorem (Validity)

In the relaxation algorithm, it can be seen from the formula (10) that assuming that the mean of noise Vn þ N is zero, and Vn þ N and Gn þ N are independent and covariance bR ¼ matrix cov½Vn þ N  ¼ Rv , the covariance matrix of parameter estimation error bias ~ ^b  b is R 

 cov ~bR ¼ E

"

1 ^  Gn þ N GTn þ N R

1

1 T1 ^ ^  Rv R  Gn þ N GTn þ N R



^  GTn þ N R

1

1 # Gn þ N

ð23Þ

It is proved by unbiased inference ~b ¼ ^b  b ¼ R R

 1  1 T ^ 1 G ^  R GTn þ N R G V nþN nþN nþN

ð24Þ

It will be obtained: h i   T cov b~R ¼ E ~bR ~bR " 1  1 # 1 1 T1 1 T T T ^ T ^ ^ ^     G n þ N R V n þ N V n þ N R Gn þ N Gn þ N R Gn þ N ¼ E G n þ N R Gn þ N

That is, the validity of the parameter is proved.

4 Recursive Relaxation Algorithm In order to solve this problem, the recursive formulas of calculating relaxation algorithm, which is applied to online identification of system parameters. Definition of non descending order matrix: 1

^ G Q1 ðn þ NÞ ¼ GTn þ N R nþN ¼

nþ N1 X

1

1

^ wðkÞ þ wT ðn þ NÞR ^ wðn þ NÞ wT ðkÞR

k¼n þ 1

ð25Þ It will be obtained: ^ 1 wðn þ NÞ Q1 ðn þ NÞ ¼ Q1 ðn þ N  1Þ þ wT ðn þ NÞR

ð26Þ

Continued delivery can be obtained: 1

^  Gn þ N Q1 ðn þ NÞ ¼ Q1 ðnÞ þ GTn þ N R

ð27Þ

616

Y. Zhou et al.

Among them, the initial value of Q1 ðnÞ should be taken as 0, and it can take a minimal positive definite matrix. For example, Q1 ðnÞ ¼ In =p0 , p0 may be 106 . It is known by the formula (20). 2

^ þ 1Þ Yðn .. .

2

3

wðn þ 1Þ .. .

3

 6 7  6 7 ^ Gn þ N1 6 7 6 7 Y ^ n þ N1  Gn þ N ¼ 6 Yn þ N ¼ 6 7¼ 7¼ ^ wðn þ NÞ 4 wðn þ N  1Þ 5 4 Yðn Yðn þ NÞ ^ þ N  1Þ 5 ^ þ NÞ wðn þ NÞ Yðn 



ð28Þ The formula (26), (13), (21) can be obtained  1  1 1 T T ^ ^ ^    Gn þ N R Gn þ N Gn þ N R Yn þ N " #   ^ Gn þ N1 T ^ 1 Y n þ N1  R ¼ Qðn þ NÞ ^ þ NÞ wðn þ NÞ Yðn h i ^ þ NÞ  1 Yðn ¼ Qðn þ NÞ Q1 ðn þ N  1Þ^bðn þ N  1Þ þ wðn þ NÞR h i ^ 1 wðn þ NÞ ^ ¼ Qðn þ NÞ Q1 ðn þ NÞ  wT ðn þ NÞR bðn þ N  1Þ

^bðn þ NÞ ¼

^ þ NÞ  1 Yðn þ Qðn þ NÞwðn þ NÞR Lemma (matrix inversion theorem): [7] Set A 2 Rnn , B 2 Rnr , C 2 Rrn , and

suppose that the matrix A and I þ CA1 B are reversible, then the following equation is established:

1 ðA þ BCÞ1 ¼ A1  A1 B I þ CA1 B CA1

ð29Þ

Proof: to prove G1 ¼ H, only to prove GH ¼ I and HG ¼ I. h i ðA þ BCÞ A1  A1 BðI þ CA1 BÞ1 CA1 ¼ I  BðI þ CA1 BÞ1 CA1 þ BCA1  BCA1 BðI þ CA1 BÞ1 CA1 ¼ I þ BCA1  BICA1 ¼ I Corollaries h

End

i A1  A1 BðI þ CA1 BÞ1 CA1 ðA þ BCÞ ¼ I

ð30Þ

Recursive Relaxation Algorithm for Identification of Multiple Input

617

The inverse theorem of reference matrix is obtained, and the formula (30) can be ^ 1 , C ¼ Gn þ N . obtained. In the formula, A ¼ Q1 ðn þ NÞ, B ¼ wT ðn þ NÞR ^ 1 Qðn þ NÞ ¼ Qðn þ N  1Þ  Qðn þ N  1ÞwT ðn þ NÞR h i 1 ^ 1 wðn þ NÞQðn þ N  1Þ 1 þ wðn þ NÞQðn þ N  1ÞwT ðn þ NÞR

ð31Þ

^ 1 , formula (31) on both Define the gain vector Lðn þ NÞ ¼ Qðn þ NÞwT ðn þ NÞR ^ 1 : sides of right multiplied by wT ðn þ NÞR ^ 1 Lðn þ NÞ ¼ Qðn þ NÞwT ðn þ NÞR 1

1

^  Qðn þ N  1ÞwT ðn þ NÞR ^ ¼ Qðn þ N  1ÞwT ðn þ NÞR h i 1 ^ 1 wðn þ NÞQðn þ N  1ÞwT ðn þ NÞR ^ 1 1 þ wðn þ NÞQðn þ N  1ÞwT ðn þ NÞR h i1 ^ 1 1 þ wðn þ NÞQðn þ N  1ÞwT ðn þ NÞR ^ 1 ¼ Qðn þ N  1ÞwT ðn þ NÞR

By the formula (29), (30), (31) shows that the parameter, ^ bðn þ NÞ parameter estimation of b and Lðn þ NÞ for the gain vector, Qðn þ NÞ for the covariance matrix or covariance matrix. By the three vector iteration to update the system parameters, determine the current size of the parameter error.

5 Relaxation Algorithm Simulation Consider the following three input three output system simulation process: 2 3 8 0:15 0:05 0:2 > > > > YðkÞ  0:2Yðk  1Þ  0:2Yðk  2Þ ¼ 4 0:1 0:3 0:1 5Uðk  1Þ þ > > < 0:3 2 0:05 0:7 3 2 3 0:03 0:2 0:15 1 0:4 0:2 > > > > 4 0:1 0:3 0:1 5Uðk  2Þ þ nðkÞ; nðkÞ þ 4 0:1 0:6 0:06 5nðk  1Þ ¼ eðkÞ > > : 0:15 0:2 0:04 0:3 0:05 0:7

The input signal by mutually independent random code, data length of 200. each output signal-to-noise ratio of 85% and 150%. Control algorithms were randomly selected. The initial relaxation algorithm using the identification results are shown in the following table, in order to compare the results with the same data, while also using relaxation algorithm by using the least square method. The results of the off-line identification then the recursive identification relaxation algorithm. The simulation results are shown in the following table (LSE (Least square estimation) RAE (Relaxation algorithm estimation) RRE (Recursive relaxation estimation)) (Table 1):

618

Y. Zhou et al. Table 1. Identification results

Parameter Parameter values

LSE

RAE

RRE

Parameter Parameter values

LSE

RAE

a1 a2 b111 b112 …… b323

−0.2 −0.2 −0.15 −0.05

−0.3092 −0.2714 −0.1153 −0.0758

−0.2292 −0.1900 −0.1424 −0.0530

−0.2288 −0.1905 −0.1438 −0.0530

c11 c12 c13 c21

−0.7065 0.2179 −0.1325 −0.0986

−0.9662 0.3588 −0.1722 −0.1254

0.3

−1.1066 −0.7692 −0.7540

−1 0.4 −0.2 −0.1

In the 40 iteration of the relaxation algorithm identification, the output value error curves of three algorithms are obtained as shown in the following diagram (Figs. 1, 2 and 3).

Fig. 1. y1 error comparison

Fig. 2. y2 error comparison

Recursive Relaxation Algorithm for Identification of Multiple Input

619

Fig. 3. y3 error comparison

From the above three diagrams, we can see that the error of algorithm output value tends to be stable after 8 or 9 iterations, and it approaches to zero. It indicates that the relaxation algorithm has better computation speed in terms of operation speed and error accuracy.

6 Conclusion This paper discusses the relaxation algorithm in multi input multi output linear systems are off-line system identification, and the relaxation algorithm is unbiased, validity, proved theoretically consistent convergence. And the relaxation algorithm so that it can go online to identify the model parameters are carried out by hand. It can ensure the operation of the system output the amount of process system has been stable and accurate. The simulation results show that the recurrence algorithm has fast relaxation relaxation algorithm, tracking precision. But the theory also has the further research space, its performance and applicability to be further improved.

References 1. Azuma T, Ito M (2011) A least-squares method for periodic signals of cell cycle to estimate protein networks. In: Proceedings of 2011 8th Asian control conference, pp 482–87 2. Wang S, Ding R (2012) Three-stage recursive least squares parameter estimation for controlled autoregressive systems. Appl Math Model 36(5):1842–1853 3. Goodwin GC, Payne RL (1977) Dynamic system identification – experiment design and data analysis. Academic Press, NewYork 4. Ding F (2013) New theory of system identification. Science Press, Beijing 5. Xie XM, Ding F (2002) Adaptive control system. Tsinghua University Press, Beijing 6. Fang CZ, Xiao DY (1988) Process identification. Tsinghua University Press, Beijing 7. Wang JH (2011) Research on control strategies based on advanced identification and their application. Nanjing University of Aeronautics and Astronautics, Nanjing

Image Restoration Based on Wavelet Semi-soft Threshold Transform and BP Fuzzy Neural Network Wenjing Pei and Yingmin Jia(&) The Seventh Research Division and the Center for Information and Control, School of Automation Science and Electrical Engineering, Beihang University (BUAA), Beijing 100191, China {wenjingpei,ymjia}@buaa.edu.cn

Abstract. Image restoration aimed to recover the original image to from degraded images and degenerate function. Fuzzy logic systems and neural network can complement each other quite well. In this paper, a novel Image Restoration approach is developed. Wavelet Semi-soft Threshold Transform and of our method is utilized to image restoration. Firstly, Wavelet Semi-soft Threshold Transform method is used to image denoising. Then, the image is classified into several regions using fuzzy sets, which are smoothing, texture and edge regions to obtain the input of BP Fuzzy Neural Network. Sliding window is used to extract features and input the training data. Finally, the output of BP Fuzzy Neural Network is the restored image. Keywords: Image restoration  Wavelet Semi-soft Threshold Transform Fuzzy  BP Neural Network  Sliding window



1 Introduction Image restoration is an important problem in the area of computer vision and image processing. It is not only a useful low-level image processing tool to provide high quality image, but also an important pre-processing step for many high-level visual problems, including digital entertainment, object recognition, image segmentation and remote sensing imaging. It aims to recover the original image for quality reduced or distorted images. In image acquisition, transmission and record keeping process, the degradation of image quality inevitably arise. The typical performance is the image blur and distortion and additional noise. At present, numerous degradation model have been proposed. Gradient distribution is effective bur simple, which plays an important role in image restoration applications. Recently, some studies suggest that gradient distribution of natural images generally has heavy-tailed characteristics, called hyper-Laplacian distribution [1–3]. At present, the hyper-Laplacian prior has been successfully applied in many applications. The image prior is represented as a unified hyper-Laplacian distribution conventionally [4]. For most natural images, the gradient distribution is more appropriate to be assumed as spatially variant [5]. In recent year, there had been some work on © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 620–628, 2020. https://doi.org/10.1007/978-981-32-9050-1_70

Image Restoration Based on Wavelet Semi-soft Threshold Transform

621

investigating the spatially varying image prior. A variational image restoration framework are presented that breaks an image into square blocks and adapts the image prior to each block independently [6–9]. In this paper, a novel Image Restoration approach is developed. Wavelet Semi-soft Threshold Transform and BP Fuzzy Neural Network is utilized to image restoration. Image restoration aimed to recover the original image to ^f ðx; yÞ from degraded images gðx; yÞ and degenerate function hðx; yÞ, nðx; yÞ. Firstly, Wavelet Semi-soft Threshold Transform method is used to image denoising. Then, the image is classified into several regions using fuzzy sets, which are smoothing, texture and edge regions to obtain the input of BP Fuzzy Neural Network. Sliding window is used to extract features and input the training data. Finally, the output of BP Fuzzy Neural Network is the restored image. The rest of this paper is organized as follows. Section 2 presents specific methodology, image restoration based on Wavelet Semi-soft Threshold Transform and BP Fuzzy Neural Network. Section 3 shows the experimental results and compares to the previous methods. Section 4 concludes this paper and proposes the future work of this research.

2 Methodology Fuzzy logic system has significant advantages in dealing with uncertainties. Wavelet Semi-soft Threshold Transform and BP Fuzzy Neural Network is utilized to image restoration. Image restoration aimed to recover the original image to ^f ðx; yÞ from degraded images gðx; yÞ and degenerate function hðx; yÞ, nðx; yÞ, as followed (1). gðx; yÞ ¼ f ðx; yÞ  hðx; yÞ þ nðx; yÞ

ð1Þ

That is to say, the reasonable nonlinear mapping relationship / is established between gðx; yÞ and ^f ðx; yÞ. ^f ðx; yÞ ¼ /ðgðx; yÞÞ

ð2Þ

However, it is easy to be disturbed by noise in the process of images acquiring. So images denoising is the first and most important step. 2.1

Wavelet Semi-soft Threshold Transform

In this paper, Wavelet Semi-soft Threshold Transform method is used for images denoising firstly. gðx; yÞ ¼ f ðx; yÞ þ nðx; yÞ

622

W. Pei and Y. Jia

Where i ¼ 1; 2; . . .; M, j ¼ 1; 2; . . .; N, gðx; yÞ is the degraded images, f ðx; yÞ is the clear image and nðx; yÞ is noising function. Wavelet decomposition are utilized for the degraded image gðx; yÞ with the size of M  N, presented as (3), (4). 1 X N 1 X 1 M W/ ðk0 ; x; yÞ ¼ pffiffiffiffiffiffiffiffi gði; jÞ/k0 ;x;y ði; jÞ MN i¼0 j¼0

ð3Þ

1 X N 1 X 1 M gði; jÞylk;x;y ði; jÞ; l ¼ f1; 2; 3g Wy ðk; x; yÞ ¼ pffiffiffiffiffiffiffiffi MN i¼0 j¼0

ð4Þ

Where k0 , k0 translation basis function. k0 is beginning from arbitrary scale. In this pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi paper, k0 is zero and T ¼ r 2 ln ðNÞ, T ¼ r 2 ln ðNÞ. The energy of image signal concentrates on the larger amplitude on wavelet coefficient and low resolution coefficient. However, the energy distribution of noise concentrated in different scales, especially in the high frequency part. In this way, the wavelet coefficients are divided into two groups. One is the result of image detail transformation with noise, in which the wavelet coefficients of this part are larger in magnitude but larger in number. The other is the wavelet coefficients caused by noise, which have a large number of coefficients but relatively small amplitudes. The threshold is set to process the wavelet coefficients. The wavelet coefficients larger than the threshold are considered to be useful signals for preservation, while the wavelet coefficients smaller than the threshold are given. pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi T ¼ r 2 ln ðNÞ   r ¼ medianðwxy Þ=0:6745

ð5Þ ð6Þ

Where N is the number of total pixels, wxy is wavelet coefficients of the highest frequency subband. In this paper, Semi-soft Threshold Transform is shown (7) wij ¼

8 < :

signðwij Þð

rffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi  2    wxy  T 2 Þ; wij   T   0; wij \T

ð7Þ

Finally, the image is reconstructed to: 3 X K XX 1 XX 1 X gði; jÞ ¼ pffiffiffiffiffiffiffiffi W/ ðk0 ; x; yÞ/k0 ;x;y ði; jÞ þ pffiffiffiffiffiffiffiffi Wy ðk; x; yÞylk;x;y ði; jÞ MN x y MN l¼1 k¼0 x y

ð8Þ In this way, the images denoising by wavelet semi-soft threshold is obtained.

Image Restoration Based on Wavelet Semi-soft Threshold Transform

2.2

623

BP Fuzzy Neural Network

Fuzzy logic systems have fuzzy uncertainties. It can mine hidden information from a large amount of data and select appropriate membership function to divide the original image into several regions with strong independence. It is very suitable for preliminary images processing. Artificial neural network has good generalization ability, robustness and numerical approximation ability, which can process numerous information. Training sets of neural networks are often redundant, which leads to over-fitting. The redundant information can be filtered out by using the fuzzy logic system, which makes up for the deficiency of the neural network. The digital processing ability of the neural network can further process the numerical results from the membership function and have more satisfied results. Figure 1 shows the framework BP Fuzzy Neural Network. The denoising image by Wavelet Semi-soft Threshold Transform is input the fuzzy logic system. The output of the fuzzy logic system is as the input BP Fuzzy Neural Network.

Fig. 1. The framework BP Fuzzy Neural Network

The image is classified into several regions using fuzzy sets, which are smoothing, texture and edge regions. The pixel in each region can be determined the extent of the region by membership function. So the membership degree of a pixel to a region is greater, its membership to the region is more possible. On the contrary, the less likely it belongs to this region. Let the gray value of image I at position ði; jÞ is gði; jÞ. I ¼ ðgði; jÞÞMN ; gði; jÞ 2 ½0; 255; 1  i  M; 1  j  N

ð9Þ

Gray Matrix Representing Image is shown in (9) and, vij ¼ varðgði; i  1Þ; gði; jÞ; gði; i þ 1Þ; f ði þ 1; j  1Þ; f ði þ 1; j þ 1ÞÞ

ð10Þ

The local variance is smaller that means the pixel belongs to the smoothing region possibly. The local variance is larger that means the pixel belongs to the edge region possibly. The local variance of the texture region is between the smooth region and the edge region showing a fluctuating state.

624

W. Pei and Y. Jia

Three fuzzy sets are A1 ; A2 ; A3 . The membership function of A1 ; A2 ; A3 is defined as follows. 8 1; x  a1 < x lA1 ðxÞ ¼ aa22a ð11Þ ; a1 \x\a2 1 : 0; x  a2 8 0; x  a1 > > > xa1 > < a2 a1 ; a1 \x\a2 ð12Þ lA2 ðxÞ¼ 1; a2  x  a3 > xa4 > > ; a \x\a 4 > : a3 a4 3 0; x  a4 8 0; x  a3 < 3 lA1 ðxÞ ¼ axa ð13Þ ; a \x\a4 : 3 a4 3 1; x  a4 The fitness value of fuzzy rules is calculated (15). li ¼

m Y

lAi

ð14Þ

li wi ¼ P n li

ð15Þ

i¼1

i¼1

The output of fuzzy rules calculated (16). Oi ¼ wi xi Finally, the output of fuzzy system is (17). X by ¼ wi xi

ð16Þ

ð17Þ

i

The input layer is mainly used to load data, while the output layer is mainly used to output classification results. The number of Hidden Layer Nodes can define (14). YC ¼

pffiffiffiffiffiffiffiffiffiffiffiffi mþnþa

ð18Þ

Where m is the number of input layer nodes, n is the number of output layer nodes and a is positive integer between 1 and 10. BP Fuzzy Neural Network requires the excitation function is derivative everywhere. In this paper, inspirit function is defined as (19).

Image Restoration Based on Wavelet Semi-soft Threshold Transform

625

1 1 þ ex

ð19Þ

f ð xÞ ¼

The first layer is the input layer. The second layer is the fuzzy layer. Intermediate layers serve as hidden layers. The output layer is the restoration image. Sample set is Data ¼ ðPk ; Tk Þ, where Pk is input vector, Tk is ideal output vector. In this paper, sliding window is used to extract features. The experiments show that 3 * 3 sliding window have good results. The first row is arranged from left to right, and then followed by the second and third rows (Fig. 2).

Pk1

Pk 2

Pk 3

Pk1

Pk 2

Pk 3

Pk 4

Pk 5

Pk 6

Pk 7

Pk 8

Pk 9

Pk 4

Pk 5

Pk 6

Pk 7

Pk 8

Pk 9

Fig. 2. The structure sliding window

3 Analysis of Experimental Results The proposed algorithms have been performed the effective results in our experiments. In our experiments, the result of Image Restoration approach is obtained by Wavelet Semi-soft Threshold Transform and BP Fuzzy Neural Network. The original image are

Fig. 3. (a) The original image; (b) the result of gaussian blur; (c) the result of image restoration

626

W. Pei and Y. Jia

shown Figs. 3(a) and 5(a). The results of Gaussian Blur are shown Figs. 3(b) and 5(b), and the results of Image Restoration are shown Figs. 3(c) and 5(c). Figures (4) and 6 shows the performance and training state of our proposed methods.

(a)

(b)

Fig. 4. (a) The performance; (b) the training state

Fig. 5. (a) The original image; (b) the result of gaussian blur; (c) the result of image restoration

Image Restoration Based on Wavelet Semi-soft Threshold Transform

(a)

627

(b)

Fig. 6. (a) The performance; (b) the training state

In the first experiment, PSNR and SSIM of our method are 32.45, 0.9636, while PSNR and SSIM of BP are 25.34, 0.8681. For the second, the PSNR and SSIM of our method are 43.13, 0.9825, PSNR and SSIM of BP Neural Network are 37.46, 0.8788. These results presented better performance.

4 Conclusion In this paper, Wavelet Semi-soft Threshold Transform and BP Fuzzy Neural Network is utilized to image restoration. Image restoration aimed to recover the original image to from degraded images and degenerate function. Wavelet Semi-soft Threshold Transform method is used to image denoising and the image is classified into several regions using fuzzy sets, which are smoothing, texture and edge regions to obtain the input of BP Fuzzy Neural Network. Sliding window is used to extract features and input the training data. The output of BP Fuzzy Neural Network is the restored image. Comparing with the previous methods, BP Neural Network, our approach improved the accuracy of image restoration in our experimental. Acknowledgments. This work was supported by the NSFC (61327807, 6152 1091, 61520106010, 61134005), and the National Basic Research Program of China (973 Program: 2012CB821200, 2012CB821201).

References 1. Dong W, Wang P, Yin W et al (2018) Denoising prior driven deep neural network for image restoration. IEEE Trans Pattern Anal Mach Intell 1:1–14 2. Zhang Y, Sun L, Yan C et al (2018) Adaptive residual networks for high-quality image restoration. IEEE Trans Image Process 27:3150–3163 3. Liu P, Zhang H, Zhang K et al (2018) Multi-level wavelet-CNN for image restoration 4. Cheng J, Gao Y, Guo B et al (2018) Image restoration using spatially variant hyper-Laplacian prior. Signal Image Video Process 13:155–162

628

W. Pei and Y. Jia

5. Yoo J, Lee SH, Kwak N (2018) Image restoration by estimating frequency distribution of local patches 6. Liu D, Wen B, Fan Y et al (2018) Non-local recurrent network for image restoration 7. Zhao H, Gallo O, Frosio I et al (2017) Loss functions for image restoration with neural networks. IEEE Trans Comput Imaging 3(1):47–57 8. Kim D, Jang HU, Mun SM et al (2017) Median filtered image restoration and anti-forensics using adversarial networks. IEEE Signal Process Lett 25:278–282 9. Ren C, He X, Nguyen TQ (2018) Adjusted non-local regression and directional smoothness for image restoration. IEEE Trans Multimedia 21:731–745

An Iterative Parameter Tuning Method for Robot Joint Motor’s Sliding Mode Controller Jie Li1(&) 1

2

, Haibo Yu2 , Yanbo Wang3 and Zhe Chen3

, Bokai Xuan1

,

Hebei University of Technology, Tianjin 300130, China [email protected] Beijing Institute of Technology, Beijing 100081, China 3 Aalborg University, 9220 Aalborg, Denmark

Abstract. Parameters tuning of robot joint motor’s controller is the key for realizing good control performance. This paper presents an iterative parameter tuning method for a joint motor’s sliding mode controller. First, a permanent magnetic synchronous joint motor is designed, and the control object of the system is determined. Secondly, the sliding-mode PID control system that combined the PID current controller with the sliding mode speed controller is designed. The sliding mode controller’s parameters are set initially with engineering design methods, also a redundant controller is added and its parameters are also set by using engineering design methods. The system output speed under the redundant PI speed controller and sliding mode speed controller is used as the iterating variables, the parameters of the controllers are obtained via iteration. Finally, the MATLAB/Simulink simulation has been conducted, the obtained results have shown that the proposed method is effective and feasible. Keywords: Joint motor  Sliding mode controller  Parameter tuning  Iteration

1 Introduction Robot joint motor is the power source of industrial robot motion and its performance directly relates to the motion precision of industrial robot [1], the controller parameter tuning is the key of achieving good control performance of robot joint motor control system. The commonly used controller parameter tuning method is the engineering design method which has the advantages of simple and fast [2]. Besides, many other parameter tuning methods are proposed. In [3], the proportional coefficient and integral coefficient are set by online self-tuning way using gradient search. And in [4], with consideration of the closed-loop system performance, a coefficients tuning method is presented. A robust frequency-domain method is presented to tune the d-q decoupled control system in [5]. The controller design is also treated as an optimization problem. The PI controller coefficients are found by using simulated annealing optimization technique. Also, a PI-fuzzy controller is introduced in [6] for a permanent magnet motor’s speed controller. The coefficients of the controller are determined online based on the error signal and time derivative. For the sliding mode controller, a parameter tuning method © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 629–637, 2020. https://doi.org/10.1007/978-981-32-9050-1_71

630

J. Li et al.

based on differential evolution optimization algorithm is addressed in generalized nonlinear systems [7]. However, when tuning controller parameters, inaccurate model may lead to unsatisfactory tuning results, tuning parameters by optimization have to run faster and need to be improved in industrial application. In this paper, permanent magnet synchronous motor (PMSM) is designed as the robot joint motor, a sliding-mode PID control system is developed, the PID current controller parameters tuning uses engineering design method, and sliding mode controller parameters tuning method is proposed. By adding a redundant PI speed parallel controller, the output speed characteristics are taken as the iterative target, and the parameters of the controller are adjusted alternately for iterating. The simulation results show that the proposed method can provide a fast and efficient way, also make the sliding-mode PID control system to have a better dynamic performance.

2 Electromagnetic Design of Robot Joint Motor PMSM has the advantages of high power density, quick response, and low vibration, which promote the motor used in complex situation to realize rapid and high precision positioning at the robot end. A direct-drive PMSM is designed as the robot’s joint motor, the technical index requirements as shown in Table 1. Table 1. Robot joint motor design index. Motor specification Value Unit Rated speed 60 rpm Output power 6 W Operation voltage 24 V Torque 1 Nm

Referring to the design method of PMSM, FEA software is employed to calculate a primary structure and also the electromagnetic design is optimized, the electromagnetic design scheme of robot joint motor is shown in Table 2. Table 2. Electromagnetic design scheme of robot joint motor. Motor specification Number of poles Number of stator slots Stator outer diameter Core length Airgap length Rotor outer diameter Rotor inner diameter Permanent magnet width

Value 16 18 115 42 0.6 70.8 26 12

Unit mm mm mm mm mm mm

An Iterative Parameter Tuning Method

631

3 Controller Design of Robot Joint Motor Sliding mode controller is insensitive to external interference and system parameters, and requires no accurate observation of system variables, so sliding mode control is easy to be realized digitally. In this paper, a sliding-mode PID control system which includes a sliding mode speed controller and a PID current controller is designed to control the robot joint motor. The mathematical model of PID current controller is shown in Eq. 1. Z u ¼ Kp e þ Ki

edt þ Kd

de dt

ð1Þ

Where Kp is the proportional coefficient, Ki is the integral coefficient, Kd is the differential coefficient, the above coefficients are set via the conventional engineering design method. A sliding-mode speed controller is designed. As the joint motor designed in this paper is a surface mounted PMSM, the vector control id ¼ 0 is employed. Consider coordinates transformation, the mathematical model is simplified as shown in Eq. (2). 8   < diq ¼ 1 Riq  pwr xm þ uq dt Lq   : dxm ¼ 1 TL þ 3pwr iq dt 2 J

ð2Þ

The state variables defined of the joint motor system are shown in Eq. (3). (

x1 ¼ xref  xr x2 ¼ x_ 1 ¼ x_ r

ð3Þ

Where x1 and x2 are the state variables of the system respectively, and xref is the reference speed of the joint motor. r We define u ¼ iq and D ¼ 3pw 2J , and the state space of system is shown in Eq. (4). 

x1 x2



 ¼

0 0

1 0



   x1 0 þ u x2 D

ð4Þ

The sliding surface is designed as follows. s ¼ cx1 þ x2

ð5Þ

Where s is the sliding surface, c is the sliding mode coefficients, c [ 0. Take the derivation of Eq. (5), we have s_ ¼ c_x1 þ x_ 2 ¼ cx2 þ x_ 2 ¼ cx2  Du

ð6Þ

632

J. Li et al.

In order to have a perfect dynamic performance of robot joint motor system, exponential approach law is adopted here, as shown in Eq. (7). s_ ¼ e sgnðsÞ  ks

ð7Þ

Where e, k are the exponential rate coefficients, and e [ 0, k [ 0. So we have the controller expression as shown in Eq. (8), and the reference current iq of q axe can be expressed as Eq. (9). 1 ½cx2 þ e sgnðsÞ þ ks D Z 1 t iq ¼ ½cx2 þ e sgnðsÞ þ ksds D 0 u¼

ð8Þ ð9Þ

4 Iterative Parameter Tuning of Sliding Mode Controller The sliding mode controller parameter tuning method based on iteration is proposed to complete the parameter setting efficiently. The whole process follows seven steps, and the flow diagram is shown in Fig. 1. Step 1: The initial parameters of the sliding mode speed controller are preliminarily set by engineering design method, and the initial control parameters enables the motor to have a stable output speed, and the iteration number of num = 0 is recorded. Step 2: A redundant PI speed controller is added in parallel with the sliding-mode speed controller, and its parameters are adjusted by engineering design method, the system speed output under the redundant PI speed controller has to meet the requirement of r < 10%. Also, the speed characteristics of system under control of redundant PI speed controller is taken as the searching direction of the parameters of sliding mode speed controller. Step 3: With reference of speed output characteristics of the abundant PI speed controller, c, e, k are adjusted via expert experience method, note that, when tuning these parameters, 80% of the speed overshoot under redundant PI speed controller is set as the iterative target. Iteration num = 1 is recorded when speed curve is stable, otherwise, repeat step 3. Step 4: With reference of speed characteristics under the sliding mode speed controller, adjust the abundant PI speed controller again, and this time, 80% of the speed overshoot under sliding mode speed controller is set as the iterative target. Iteration num = num + 1 is recorded when speed curve is stable, otherwise, repeat step 4. Step 5: With reference of speed characteristics under the abundant PI speed controller, tuning parameters of sliding mode speed controller, and also, 80% of the speed overshoot under redundant PI speed controller is set as the iterative goal, if the output is acceptable, num = num + 1 is recorded, otherwise, repeat step 5.

An Iterative Parameter Tuning Method

633

Step 6: The number of the least iteration time is determined based on the iterative convergence feature in order to ensure the speed overshoot of the control system is small enough. The iteration continues until the number of iteration is equal to the least iteration time, otherwise return to step 4. The number of the least iteration time is num = 7 in the case design of this paper. Step 7: Define a termination condition. Here we apply a sudden change on the motor load, the termination condition is determined by the ratio of average speed dynamic drop under sliding-mode speed controller and the abundant PI speed controller, if the ratio is bigger than 99% then the termination condition is satisfied, a set of c, e, k is output, otherwise return to step 4.

Fig. 1. Process flow diagram

634

J. Li et al.

5 Simulation Analysis 5.1

Model of Simulation System

Figure 2 presents the control system block diagram for simulation in MATLAB/ Simulink environment to verify the feasibility and effectiveness of the proposed method. The driving circuit of robot joint motor uses space vector voltage pulse width modulation, and the parameters of PID current controller is set by engineering design methods.

Fig. 2. Robot joint motor control system block diagram

The reference speed is set as 40 rpm, and the parameters of the sliding mode speed controller and the redundant PI speed controller are adjusted alternately, the parameters tuning results are listed in Table 3. Table 3. Controller parameters tuning results. Num c

e

k

Kp

Ki

0 1 2 3 4 5 6 7

300 300 300 300 300

900 900 650 650 670

0.065 0.08 0.081 0.0855 -

7.30 8.0 7.9 7.9 -

102 93 92 87 87

During the iteration process, the local amplification curve of speed under the sliding-mode speed controller is shown in Fig. 3.

An Iterative Parameter Tuning Method

635

44

n/rpm

42

40 num increase

38

0.006

0.007

0.008

0.009

t/ms

Fig. 3. Local amplification curve of speed under the sliding-mode controller

It can be concluded that, with iteration num increase, speed overshoot decreased from 10.625% to 1.95%, and the peak time is also decreased from 7.009 ms to 6.676 ms at the same time. Also, after the 6th and 7th iteration, the speed tends to be stable and the output is acceptable. In order to prove the feasibility and effectiveness of the proposed method more accurately, We apply a sudden change on the motor at 0.1 s when motor with no load and full load, the speed dynamic response based on the iterative number of num = 0 and num = 7 are compared. 5.2

Simulation of Motor Speed Dynamic Responses with Full Load

The characteristic of robot joint motor with full load is mainly focused on the dynamic responses when loads sudden change. The situation is assumed that motor starts and accelerates to 40 rpm with load of 0.3 N  m, then a sudden change of load is applied of 0.5 N  m. With assumption above, the speed and electromagnetic torque waveform of joint motor are simulated and shown in Figs. 4 and 5. The stator current curve is shown in Fig. 6, in which Fig. 6(a) and (b) present the current variation when num = 0 and num = 7 respectively.

Fig. 4. Speed current waveforms with iterative time of num = 0 and num = 7

636

J. Li et al.

Fig. 5. Electromagnetic torque waveforms of num = 0 and num = 7

(a) num=0

(b) num=7

Fig. 6. Stator current waveforms with iterative time of num = 0 and num = 7

In the case of the simulations, it can be seen from Fig. 4 that, when the load is suddenly increased at 0.1 s, Compared with the simulation results of num = 0, the controller has a better regulation ability, and a smaller speed drop also with a faster speed recovery time of only 0.006 s when the parameters tuning iterated time increase to num = 7. At the same time, it can be seen from Fig. 5 that when num = 7, the motor’s electromagnetic torque can track the load variation robustly, and the torque fluctuation during the load changing process is weaker. Besides, in Fig. 6, when num = 7, the current shows a lower distortion degree and a smoother transition.

6 Conclusion This paper has presented a parameter tuning method of sliding mode control especially for robot joint motor based on iteration. A 6 W permanent magnetic synchronous joint motor is designed, and a sliding-mode PID control system which includes a sliding mode speed controller and a PID current controller is developed to satisfy the control demands. PID current controller parameters tuning used engineering design method. And the proposed method for sliding mode controller parameter tuning is based on alternation, an additional redundant PI speed loop controller is add in parallel with sliding mode speed controller to help parameters tuning. Since the engineering design method meets the good required control performance quickly, we take the output under the redundant PI speed loop controller as the parameter tuning search direction of the sliding mode speed controller to complete parameter tuning faster, and in this way no more complicated mathematical model needed during the whole process.

An Iterative Parameter Tuning Method

637

MATLAB/Simulink simulation is used to verify the feasibility and effectiveness of the proposed method by comparing the basic speed dynamic response and torque performances when iterative number increased. The prototype permanent magnetic synchronous joint motor is tested in no-load and full load cases. The results show that with increase of the iterative time, the speed output converges to the iterative target value, and the better characteristics of responsiveness, self-adaptability and robustness of the sliding-mode PID system are fully reflected. Acknowledgement. This research was supported by Scientific and Technology Projects of Colleges and Universities in Hebei Province (Z2014025).

References 1. Dean-Leon E, Ramirez-Amaro K, Bergner F, Dianov I, Cheng G (2018) Integration of robotic technologies for rapidly deployable robots. IEEE Trans Ind Inf 14(4):1691–1700 2. Gaing Z-L (2004) A particle swarm optimization approach for optimum design of PID controller in AVR system. IEEE Trans Energy Convers 19(2):384–391 3. Zhao Y, Zhang H, Liu D, Pan Y (2018) Research on parameter online tuning technology of speed controller of permanent magnet synchronous motor. In: 2018 Chinese automation congress (CAC), China, vol 1, pp 532–537 4. Gil P, Lucena C, Cardoso A, Palma LB (2015) Gain tuning of fuzzy PID controllers for MIMO systems: a performance-driven approach. IEEE Trans Fuzzy Syst 23(4):757–768 5. Arunprasanth S, Annakkage UD, Karawita C, Kuffel R (2016) Generalized frequency-domain controller tuning procedure for VSC systems. IEEE Trans Power Deliv 31(2):732–742 6. Çelik E, Dalcali A, Öztürk N, Canbaz R (2013) An adaptive PI controller schema based on fuzzy logic controller for speed control of permanent magnet synchronous motors. In: 4th International conference on power engineering, energy and electrical drives, Istanbul, vol 1, pp 715–720 7. Huang J, Zhou R (2018) Sliding mode control parameter setting based on improved differential evolution algorithm. Control Eng China 25(3):484–487

Fault Feature Extraction of Wind Turbine Rolling Bearing Based on PSO-VMD Ping Zhang

and Jingmin Yan(&)

Hebei University of Technology, Tianjin 300132, China [email protected]

Abstract. Taking the rolling bearing of wind turbine as the research object, and aiming at the problem that its fault feature is difficult to be extracted under the background of strong noise. A method based on variational mode decomposition and particle swarm optimization was proposed. Firstly, the PSO was used to search for the optimal parameters of the VMD algorithm, the wind turbine rolling bearing fault signal was decomposed according to the searching results. The fault signal can be decomposed into a series of intrinsic mode functions (IMFs) adaptively. The best signal component was selected and processed by envelope demodulation algorithm, bearing fault type was judged by analyzing the signal’s envelope spectrum. The experimental results show that the PSOVMD algorithm can effectively eliminate noise impact and extract the wind turbine rolling bearing fault feature, and the accuracy can reach 99.57%. Keywords: Wind turbine

 Fault diagnosis  Rolling bearings  PSO  VMD

1 Introduction In recent years, the contradiction between environmental problem and fossil energy is getting worse [1]. Simultaneously, wind power generation has grown rapidly. With the rapid increase of wind turbine installation, the reliability of wind power equipment is highlighted. The rolling bearing’ fault has become one of the fan’s weaknesses of wind turbine. To reduce economic losses, improve the fan’s reliability, it is necessary to find a method to define the bearing’s operating state, and determine whether it needs to be replaced or repaired according to the operating state [2, 3]. Many scholars are committed to using VMD to extract the fault characteristics of rolling bearing. In 2016, Wu used VMD to fan drive system fault diagnosis firstly [4]. In 2017, Li used VMD and Teager energy operator to extract the bearing fault features frequency [5]. In 2018, Ma etc. used the SLFA-PSO to decompose the fault signal and determine the type of bearing failure [6]. Decomposition method of VMD ensures that the frequency domain and components of the signal can be adaptively separated. By comparing EMD and LMD, it can be found that: VMD can effectively avoid endpoint effects and mixing of modal components. But the VMD is affected by both modes number K and the penalty factor a. These two parameters must be preset by experience. Because it is hard to extract the fault feature information of the fan rolling bearing and the VMD needs the preset parameter [K, a], this paper proposes PSO-VMD. © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 638–646, 2020. https://doi.org/10.1007/978-981-32-9050-1_72

Fault Feature Extraction of Wind Turbine Rolling Bearing Based on PSO-VMD

639

Firstly, the PSO is used to look for optimal [K, a] of VMD. Then k and a are brought into the VMD to decompose the fan bearing fault signals into several IMFs, and the best IMF is selected. Finally, the signal’s envelope spectrum is analyzed to determine the bearing’ fault type. The results showed that the PSO-VMD can extract the fault characteristics of wind turbine bearings under strong noise environment, and it also can classify the bearing’s fault type accurately, with an accuracy rate of 99.57%.

2 Principle of VMD Algorithm In the concept of IMF, the VMD and EMD are the same. However, IMF is an AM-FM signal in VMD. To obtain the IMF, VMD constructs a constrained variational problem: ( minfuk gfxk g

 2 )   X   X  j jx t k  @t dðtÞ þ ð t Þ e u ¼f  u s:t: k   K K k pt 2

ð1Þ

Where fuk g ¼ fu1 ; . . .; uK g are IMFs and fxk g ¼ fx1 ; . . .; xK g are their center frequencies. To solve the formula (1), it needs to be converted into the unconstrained variational problem shown in the formula (2). And k(t) is a Lagrange multiplier. 2 

P   Lðfuk g; fxk g; kÞ ¼ a k @t dðtÞ þ ptj  uk ðtÞ ejxk t 2 þ   f ðtÞ  P uk ðtÞ2 þ kðtÞ; f ðtÞ  P uk ðtÞ k

2

ð2Þ

k

Formula (2)’s saddle point is the formula (1)’s solution. The process of adaptively decomposing signals by VMD is: under the original signal’s frequency domain feature, the center frequency and each IMF’s bandwidth are continuously renewed to complete frequency band’s decomposition when solving formula (1).

3 PSO-Based VMD Algorithm The parameters that the VMD needs to set at run time include modal number K; penalty factor a; fidelity factor s and discriminant accuracy e. The research shows that, s and e have less effect on the results, so the default values in the standard VMD program are directly used. K and a have a great influence on the decomposition result of VMD. The influence of K is reflected in whether the IMF can be decomposed correctly. The influence of a is reflected in the influence on each IMF’s bandwidth, which has an opposite trend to that of the a. Because the vibration signal of fan rolling bearing is complex and variable and affected by the environment, and K and a are usually difficult to confirm. Therefore, this paper uses PSO to search for [K, a] in VMD. 3.1

Principle of PSO Algorithm

Let Xi = (xi1, xi2, …, xin) be the i-th particle’s position in n dimensions; Pi = (pi1, pi2, …, pin) is the best position of this particle; Pg = (pg1, pg2, …, pgn) represents the best

640

P. Zhang and J. Yan

position of all particles; Vi = (vi1, vi2, …, vin) represents the flight speed of the i-th particle. Then for the t-th generation, d-th dimension (1  d  n) particle changes as follows:

vid ðt þ 1Þ ¼ xvid ðtÞ þ c1 randðÞ½Pid  xid ðtÞ þ c2 randðÞ Pgd  xgd ðtÞ

ð3Þ

xid ðt þ 1Þ ¼ xid þ vid ðt þ 1Þ

ð4Þ

Where x is Inertia weight; Tmax is the maximum number of iterations; c1 and c2 are learning factor. 3.2

PSO-Based VMD Parameter Optimization

The fitness function and fitness value are indispensable in PSO, and they are mainly used as evaluation criteria for parameters. Some people use the envelope spectrum and its entropy as the fitness function and fitness value, but the K value obtained from this method is extremely unstable. However, the amplitude spectrum can also work when decomposing a multi-frequency mixed signal into some single-frequency sinusoidal signals. So, the paper selects the amplitude spectrum as the fitness function, and compares the optimization effects of the two fitness functions. The VMD algorithm decomposes the fault signal to get the component ui, if it contains more noise, the sparseness of the ui is weak, which means that its amplitude spectral entropy is larger and vice versa. Based on the this, this paper selects the amplitude spectrum function as fitness function of the PSO, and the fitness value is the minimum value of the amplitude spectrum entropy. The formula for obtaining the amplitude spectral entropy of the modal component of the VMD algorithm is as follows: PN

8 < Hi ¼  i¼1 Pi lnðpi Þ = lnðN Þ P Pi ¼ Li = Ni¼1 Li : PN i¼1 Pi ¼ 1

ð5Þ

Where ui is the modal component and Li is the magnitude spectrum of ui; Hi is the amplitude spectrum entropy of ui; N is the length of ui. When obtaining the optimal value of the VMD parameter combination [K, a], a set of values of [K, a] is set randomly at first. Then these values are taken as parameters of VMD, and K IMF are obtained after decomposition of fault signals. The Hi of each IMF is calculated, and the value of the amplitude spectral entropy of all modal components is compared. The minimum magnitude entropy minHi of the modal component is obtained, which is the local minimum. It can be seen that the modal component ui represented by minHi is the best component among all the modal components obtained by this decomposition, because it contains the most feature information. Using this method, all local minimum values can be obtained. Comparing the size of all local minima, the minimum of the local minima is the ultimate goal in this search, which is the optimal parameter [K, a]. The PSO algorithm optimization process is shown in Fig. 1.

Fault Feature Extraction of Wind Turbine Rolling Bearing Based on PSO-VMD

641

Set all parameters and fitness functions in algorithm Initialize particle position and velocity, set parameter [K, α] as particle position Bring all initialized particle positions into the VMD algorithm and calculate the entropy value of all IMF components for each particle position Compare the size of the local minimum entropy and update the individual local minima and the population global minima Update particle speed and position

Whether the maximum number of iterations is reached?

N

Y The global minimum of the population and the position of the corresponding particle [K, α] Fig. 1. PSO optimization process

4 Feature Extraction Based on PSO-VMD 4.1

Experimental Model

In this paper, the above PSO-VMD algorithm is applied to simulated rolling bearing fault platform in Case Western Reserve University Laboratory. As shown in Fig. 2, The platform includes motor (1.5 Kw), torque sensor, power meter, link parts and bearings to be tested (deep groove ball bearings). The motor’s shaft is supported by the bearing used in the test. Its parameter is shown in Table 1.

Fig. 2. Rolling bearing fault simulation experiment platform Table 1. Bearing parameters Parameter Bearing Type Rolling element’ diameter dr/mm Fault diameter/mm Rotating speed/(r/min)

Value SKF6025 7.94 0.1778 1797

Parameter Value Rolling element’ number Z 9 Contact angle a/° 0 Sampling frequency/kHz 12 Rotating speed/(r/min) 1797

642

P. Zhang and J. Yan

The theoretical characteristic frequency of the inner ring, outer ring, rolling element is obtained by the formulas below, which is 162.18 Hz, 107.36 Hz, 141.16 Hz.

4.2

fi ¼ 0:5Z ð1 þ ðdr =Dm Þ cos aÞf

ð6Þ

fo ¼ 0:5Z ð1  ðdr =Dm Þ cos aÞf

ð7Þ

    fr ¼ dr =Dm 1  dr2 =D2m cos2 a f

ð8Þ

VMD Parameter Optimization

In this paper, the PSO-VMD algorithm is used to decompose 10 sets of 42,000 fan bearing’s outer ring fault signals. The optimization results of 10 sets of data are obtained and their average values are taken as the final results. To verify the PSO-VMD algorithm, under the same experimental conditions, the fitness value also selects the minimum value of amplitude spectrum entropy, which is compared with the optimization method based on GA. After optimizing the parameter [K, a] multiple times using the GA algorithm, the results obtained are as follows. Table 2. VMD parameter optimization results Times

K PSO 1–4 6 5–7 6 8–10 6 Average 6

GA 8; 9; 9; 7 6; 4; 10 7; 10; 10 8

a PSO GA 1998; 1989; 2120; 2006 2300; 2478; 2256; 2355 1977; 1990; 2004 2002; 2459; 2375 1871; 1987; 1978 2490; 2389; 2246 1992 2335

As shown in Table 2, the distribution of the modulus number K and the quadratic penalty factor a of the VMD based on PSO is quite concentrated. Thus, the optimized value can be obtained, that is, K = 6, a = 1992. Under GA optimization, the number of modal K has a considerable fluctuation, ranging from 4 to 10, and the difference between the second penalty factors a is also large. Finally, the averaging method is used to obtain the optimized data K = 8, a = 2235. It is verified by calculation that the amplitude spectrum has a great advantage as a fitness function. The specific verification process is as follows: in addition to the fitness function, the other experimental conditions are controlled unchanged to optimize the combined parameters [K, a] of the VMD. The fitness functions are the envelope spectrum and the amplitude spectrum respectively. When the fitness function is the envelope spectrum, the variance of K is 0.5, and when the fitness function is the amplitude spectrum, the variance of K is 0. Therefore, the discrimination amplitude spectrum has strong superiority as the fitness function. A similar result can be obtained

Fault Feature Extraction of Wind Turbine Rolling Bearing Based on PSO-VMD

643

by calculating the quadratic penalty factor a. When the fitness function is an amplitude spectrum, the variance of a is smaller and the stability is stronger. 4.3

Results Analysis

The failure of bearing outer ring is selected as an example for analysis. Figures 3 and 4 are the original fault signal’s time domain and frequency domain diagrams. In Fig. 3, the fault signal waveform shows impact component. Figure 4 shows that there is a peak amplitude between 3000 Hz and 4000 Hz. No resonance band is found in low frequency band. It is difficult to make a clear judgment on the bearing state.

Fig. 3. Bearing outer ring fault signal

Fig. 4. Bearing outer ring fault signal spectrum

Next, the PSO-VMD algorithm is used to decompose the fault signal in Fig. 3. Each IMF’s time domain and spectrum are obtained as shown in Figs. 5 and 6.

Fig. 5. Modal component obtained by PSO-VMD algorithm

644

P. Zhang and J. Yan

Fig. 6. Modal component spectrum obtained by PSO-VMD algorithm

The envelope spectrum analysis of the 6 IMF shows that the IMF2 contains the outer loop fault frequency and its multiple frequency. Results are shown in Fig. 7.

Fig. 7. Envelope spectrum decomposition of IMF2

Figure 7 shows that IMF2’s envelope spectrum includes 106.9 Hz and 215.3 Hz. This is very close to the theoretical value 107.36 Hz. And the interference lines are very few, it is almost no impact on the judgment of the results. Because the errors in the experiment are inevitable, it can be considered that 106.9 Hz is the fault characteristic frequency of the bearing outer ring, and the accuracy can reach 99.57%. Similarly, the GA algorithm applied to search the optimal parameter [K, a] and then brought into the VMD algorithm to analyze the fault signal. Figures 8 and 9 show each IMF’ time and frequency domain diagrams after GA-VMD decomposition. The envelope spectrum analysis of the 8 components shows that the IMF6 contains the outer ring fault frequency and its multiple frequency as shown in Fig. 10.

Fault Feature Extraction of Wind Turbine Rolling Bearing Based on PSO-VMD

645

Fig. 8. Modal component obtained by GA-VMD algorithm

Fig. 9. Modal component spectrum obtained by GA-VMD algorithm

Fig. 10. Envelope spectrum decomposition of IMF6

Comparing Fig. 7 with Fig. 10, it can be found that both PSO-VMD and GA-VMD can obtain the fault frequency, but Fig. 10 obviously contains more interference lines, and there the amplitude of a line before the fault frequency is higher than the fault frequency line, this will cause a huge interference in the judgment of the result. Calculate the center frequency of each IMF obtained by decomposing the vibration signals by PSO-VMD and GA-VMD algorithms respectively, and obtain the Table 3.

646

P. Zhang and J. Yan Table 3. Center frequency of IMFs Hz PSO-VMD GA-VMD Center frequency of IMF1–IMF4 161.1; 1399; 2799; 3337 162.6; 688.5; 2692; 2906 Center frequency of IMF5–IMF8 3661; 5221;/;/ 3338; 3445; 3752; 5221

Table 3 shows that each IMF’s center frequency decomposed by the PSO-VMD aren’t close. However, in each IMF’s center frequency decomposed by the GA-VMD, the modal central frequencies of IMF3 and IMF4 are very close, IMF5 and IMF6 are the same. It can be seen that the GA-VMD has excessive decomposition fault signal. The results show that the feature extraction method based on PSO-VMD algorithm proposed in this paper makes the fault characteristic frequency and its multiplication become very prominent, and the bearing’ fault characteristics are obvious.

5 Conclusion The PSO-VMD algorithm proposed in this paper solves the problem that VMD parameters need to be set by experience, and can extract the fault characteristics information of fan bearings under strong noise environment. Accurate diagnosis of the fault type of the bearing, the accuracy rate can reach 99.57%.

References 1. Ahmed NA, Cameron M (2014) The challenges and possible solutions of horizontal axis wind turbines as a clean energy solution for the future. Renew Sustain Energy Rev 38(5):439–460 2. An X, Jiang D, Chen J et al (2011) Bearing fault diagnosis based on ITD and LS-SVM for wind turbine. Electr Power Autom Equip 31(9):10–13 (in Chinese) 3. Dong Z (2014) Development of the rolling bearing fault diagnosis system in wind turbines. North China Electric Power University (in Chinese) 4. Wu Y (2016) Research on fault diagnosis of wind turbine transmission system based on variational mode decomposition. North China Electric Power University (in Chinese) 5. Li L (2017) Research on fault diagnosis of wind turbine bearing based on vibration signal. North China Electric Power University (in Chinese) 6. Ma H, Tong Q, Zhang Y (2018) Applications of optimization parameters VMD to fault diagnosis of rolling bearings. China Mech Eng 29(04):390–397 (in Chinese)

Quantized Kernel Learning Filter with Maximum Mixture Correntropy Criterion Lin Chu(&) and Wenling Li School of Automation Science and Electrical Engineering, Beihang University, Beijing 100191, China [email protected]

Abstract. Kernel recursive maximum mixture correntropy criterion (KRMMCC) algorithm takes the mixture of two Gaussian kernel functions as the core function, which further improves the performance of machine learning. However, when the number of training data is large, the KRMMCC algorithm will face a large amount of computation. In order to restrain the growth of the radial basis function structure, this paper proposes a novel method named quantized kernel recursive maximum mixture correntropy criterion (QKRMMCC). This method judges whether the data is quantized to the nearest node by quantization rule, so as to sparse the final network size. The simulation results show that the QKRMMCC algorithm presents the excellent performance. Keywords: Kernel learning

 Quantized method  Mixture correntropy

1 Introduction Kernel adaptive filtering algorithm is an effective non-linear method which maps input data to a high dimensional feature space by reproducing kernels, then uses linear methods to process it in the feature space. With the development of kernel adaptive filtering, KLMS [1], KAPA [2], and KRLS [3] have been proposed one after another. Although KLMS, KAPA, KRLS and other algorithms can achieve very effective performance in Gauss environment, the performance of the algorithms will be seriously degraded in non-Gauss environment. In response to this problem, the concept of correntropy came into being in [4]. In order to further improve the flexibility of the system, mixture complex correntropy is defined in [5], and the concept of mixture correntropy is proposed in [6]. The kernel recursive maximum mixture correntropy criterion (KRMMCC) algorithm based on MMCC has better performance. However, KRMMCC algorithm constructs the radial basis function structure which grows linearly with the training data. In order to restrain the growth of network nodes, the idea of quantization has been widely used in kernel adaptive filtering, and some better performance algorithms such as QKLMS [7], QMEE [8], GCA-QMEE [9] have emerged. This paper proposes a novel algorithm based on KRMMCC, which uses quantization

© Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 647–655, 2020. https://doi.org/10.1007/978-981-32-9050-1_73

648

L. Chu and W. Li

method. This method determines whether the data is quantized to the nearest node by quantization rules. The main contents of the rest chapters are organized as follows. Section 2 introduces the knowledge of mixture correntropy and quantized method. Section 3 introduces QKRMMCC algorithm. The fourth section gives the simulation results. Finally, Sect. 5 summarizes.

2 Problem Formulation 2.1

The Maximum Mixture Correntropy Criterion

This article briefly reviews the definition of correntropy first. According to the definition in [10]: correntropy is a measure of similarity. Since the maximum correntropy criterion (MCC) is very unreliable for impulse noise or large outliers, the literature [6] proposes the concept of mixture correntropy, with a mixture of two Gaussian functions as a kernel function, that is MðX; YÞ ¼ E½aGr1 ðeÞ þ ð1  aÞGr2 ðeÞ  2 e where jr ðX; YÞ ¼ Gr ðeÞ ¼ exp  2r 2 .

ð1Þ

In addition, the proof of the properties of mixture correntropy is also given in reference [10]. When a is 0 or 1, the maximum mixture correntropy criterion (MMCC) degenerates to the maximum correntropy criterion (MCC). 2.2

The Quantized Method

Quantized method is an online sparse network structure method, which does not discard any training data. The quantized method initializes an empty dictionary to store data suitable as a node.  mi1 where cj is the jth network At time i  1, let the node dictionary be Ci1 ¼ cj j¼1 node and mi1 represents the number of elements in the dictionary at time i  1 moment. According to the quantized method, when the input data ui arrives, it first calculates the European distance of all nodes in Ci1 and ui , and defines the distance between ui and Ci1 as the nearest distance between ui and the element in Ci1 , which is   disðui  Ci1 Þ ¼ min ui  cj  ð2Þ cj 2Ci

Quantized Kernel Learning Filter

649

The quantized method considers that if dis is greater than a pre-set threshold d, it means that ui has amount of new information at this time, so ui is included in the dictionary C. If dis is less than d, the number of nodes is not updated, but ui is quantized to the nearest node in C according to the quantization rules, and the coefficient ai is updated.

3 QKRMMCC Algorithm The cost function based on the MMCC is formula (3). J ¼ max X

X

 XM      n T T aG d  X u ð c Þ þ ð 1  a ÞG d  X u ð c Þ r n;m n r n;m n 1 2 n2W m¼1

1  cjjXjj2 : 2 ð3Þ Suppose there are N nodes in the quantization dictionary C, that is C ¼ fcn 2 U gNn¼1 . The quantized function Q½ maps the input signal ui to the node closest to ui in C. The original input  space U can be divided into  a limited number of mutually exclusive regions S ¼ S1 ; S2 ; . . .; Sn jSn ¼ Q1 ðcn Þ , and the value of the quantized function depends on the region S where uj is located, that is, when uj 2 Sn ,

Q uj ¼ c n . 2   ðdn;m  XT uðcn ÞÞ In formula (3), Gr dn;m  XT uðcn Þ ¼ exp  . W represents the 2r2 position label of the input data sequence corresponding to the quantized dictionary C, Mn is the number of input data belonging to Sn , and dn;m is the mth measurement response belonging to Sn . Suppose that the position label W has L values at this time, that is W ¼ fn1 ; n1 ; . . .; nL g. Let Eq. (3) derive the X and make the derivative be zero.  1 X ¼ UB K UT þ cI UBd

ð4Þ

where U ¼ ½uðcn1 Þ; uðcn2 Þ; . . .; uðcnL Þ; K ¼ diag½Mn1 ; Mn2 ; . . .; MnL ; hP iT PMn2 PMnL Mn1 d ; d ; . . .; d , d ¼ m¼L nL;m m¼1 n1;m m¼2 n2;m h B ¼ diag ra2 Gr1 ðen1 Þ þ 1 r2 a Gr2 ðen1 Þ; . . .; ra2 Gr1 ðenL Þ þ 1

2

1

1a G r2 ð e n L Þ r22

i .

650

L. Chu and W. Li

Record the relevant variables of Eq. (3) as A transformation by matrix inverse lemma

cI, B

U, C

B, D

 1 ðA þ BCDÞ1 ¼ A1 þ A1 B DA1 B þ C 1 DA1

KUT ,

ð5Þ

Equation (4) can be expressed as  1 X ¼ U KK þ cB1 d

ð6Þ

where K ¼ UT U. According to formula (6), the coefficient expression is  1 a ¼ KK þ cB1 d

ð7Þ

 1 Q ¼ KK þ cB1

ð8Þ

Set the quantization threshold d. We will start from the arrival of the ith data and discuss it in two cases.   Case 1. disðui  Ci1 Þ  d, j ¼ argminui  cnj . 1jL

In this case, the algorithm does not choose to add a new network node. So there is Ci ¼ Ci1 , Ui ¼ Ui1 , Ki ¼ Ki1 . ui is quantized to cnj , easy to draw 8 >
: di ¼ di1 þ di nj

ð9Þ

where nj is the L-dimensional column vector, the j th dimension is 1, and the remaining dimensions are 0. Define  as a point multiplication. Due to the complexity of matrix inversion, this paper uses Bi ¼ Bi1 to update B. Obtained by Eq. (8): h i1 T Qi ¼ Q1 i1 þ nj nj Ki1

ð10Þ

Record the relevant variables of Eq. (10) as A Q1 nj  , C I, i1 , B T D nj Ki1 , transformation by matrix inverse lemma (5), Eq. (10) can be expressed as Qi ¼ Qi1 

T Qi1;j  Ki1;j   Qi1 T 1 þ Ki1;j Qi1;j

ð11Þ

where Ki1;j and Qi1;j . Represent the j th column of Ki1 and Qi1 , respectively.

Quantized Kernel Learning Filter

651

Substituting (11) into (7), obtaining the update equation of a. ai ¼ Qi di ¼ ai1 þ

h i T Qi1;j di  Ki1;j   ai1

ð12Þ

T 1 þ Ki1;j  Qi1;j

Case 2. disðui  Ci1 Þ [ d. In this case, ui will be included in Ci , that is Ci ¼ fCi1 ; ui g, Ui ¼ fUi1 ; ui g, at the same time, the tag dictionary Wi ¼ fWi1 ; ig, the length of dictionary Li ¼ Li1 þ 1. K T and d are updated as follows: Ki ¼ diag½Ki1 ; 1, di ¼ ½di1 ; di  . And the matrix Q can be expressed as " Qi ¼ where hi ¼ UT ui , hi ¼

Ki1 hi chi þ ra2 Gr1 ðui ; ui Þ þ

Q1 i1 hTi 

a r21

1

Gr1 ðei Þ þ

1a Gr2 ðei Þ r22

#1 1a Gr2 ðui ; ui Þ r22

ð13Þ

1 .

According to the inverse lemma of matrix, (13) can be converted to

Qi ¼ ri1

Qi1 ri þ zi zTi zTi 0

0

zi 1

 ð14Þ

where zi ¼ QTi1 hi , 0 zi ¼ Qi1 Ki1 hi , ri ¼ chi þ ra2 Gr1 ðui ; ui Þ þ 1

ei ¼ di  hTi ai1 .

1a Gr2 ðui ; ui Þ r22

 hTi zi , 0

The final update equation for the coefficient a is

 0 a  z r 1 e ai ¼ Qi di ¼ i1 1 i i i r i ei Pseudo code of QKRMMCC as shown in the following Table 1.

ð15Þ

652

L. Chu and W. Li Table 1. Pseudo code of QKRMMCC algorithm.

4 Simulation This section verifies the performance of the QKRMMCC algorithm under random noise and compares it with the KRMC, QKRMC and KRMMCC algorithms in simulation experiments. The simulation data is generated by formula (16). d ðiÞ ¼ 8  sincðuðiÞÞ þ pðiÞ

ð16Þ

where uðiÞ is a uniform random sequence over the interval ½1; 1, pðiÞ is random noise, which produces a noise with a variance of 0.01 with a probability of 0.7, and a noise with a variance of 0.25 with a probability of 0.3. The remaining parameters are set as follows: c ¼ 0:01, a ¼ 0:7, distance threshold d ¼ 0:005, the Gaussian kernel width of a single correntropy is r2 ¼ 5, the Gaussian kernel width of mixture correntropy is r21 ¼ 1; r22 ¼ 5. In this paper, 500 samples with noise are selected as training data, and 100 samples without noise are selected as test data. The purpose of the experiment is to train the

Quantized Kernel Learning Filter

653

adaptive filter through different algorithms, test the performance of different algorithms, and compare the network structure of KRMMCC algorithm and QKRMMCC algorithm. In order to more realistically reflect the generalization ability of the algorithm, the simulation selects the test results as experimental results. Each algorithm was run 100 times and the average result was taken as the experimental result. Figure 1 shows the learning curves of KRMC, QKRMC, KRMMCC and QKRMMCC algorithms under random noise in online tests. Table 2 shows the performance data of the four algorithms. Under the appropriate quantization threshold, the MSE performance of the mixture correntropy algorithm (KRMMCC and QKRMMCC) is better than the single correntropy algorithm (KRMC and QKRMC). Dividing the four algorithms into two groups shows that the MSE performance of the two quantized algorithms is slightly lower than that of the unquantized algorithms. Table 2. Performance data of four algorithms under random noise. Algorithms MSE(dB) Time(s) KRMC −9.2515 9.7554 QKRMC −6.2738 5.6447 KRMMCC −31.8356 10.3579 QKRMMCC −26.5100 6.4373

Figure 2 shows the network size of the KRMMCC algorithm and the QKRMMCC algorithm. The final network size generated by the KRMMCC algorithm is 500, and the final network size generated by the QKRMMCC algorithm is 202. It proves that the

Fig. 1. Learning curve of four algorithms.

654

L. Chu and W. Li

Fig. 2. Network size of KRMMCC algorithm and QKRMMCC algorithm.

algorithm based on quantized generally has lower computational complexity. This also confirms that the inevitable result of reducing the network size is the sacrifice of partial steady-state error performance.

5 Conclusion This paper extends the quantization method to the KAF algorithm based on mixture correntropy. The feature space of the KAF is compressed to restrain the growth of RBF structure. This method retains all training data, but quantizes the data that dissatisfy the quantization rules to the suitable node. At the same time, the filter coefficients of the node are updated according to the new coefficient rules. In this paper, a novel algorithm named QKRMMCC algorithm is proposed. The simulation results verify the effectiveness of the algorithm and show its excellent performance. Acknowledgments. This work was supported by the NSFC (61573031, 61532006, 61573059, 61520106010) and BJNSF (4162070).

Quantized Kernel Learning Filter

655

References 1. Liu W, Pokharel P, Principe JC (2008) The Kernel least mean square algorithm. IEEE Trans Signal Process 56(2):543–554 2. Liu W, Principe JC (2008) The Kernel affine projection algorithm. EURASIP J Adv Signal Process 2008(1):1–12 3. Liu W, Park I, Wang Y, Principe JC (2009) Extended Kernel recursive least squares algorithm. IEEE Trans Signal Process 57(10):3801–3814 4. Santamaria I, Pokharel P, Principe JC (2006) Generalized correlation function: definition, properties, and application to blind equalization. IEEE Trans Signal Process 54(6):2187– 2197 5. Qian G (2018) Mixture complex correntropy for adaptive filter. IEEE Trans Circ Syst II Express Briefs 6. Chen B, Wang X, Lu N (2018) Mixture correntropy for robust learning. Pattern Recogn 79 (2018):318–327 7. Chen B (2012) Quantized Kernel least mean square algorithm. IEEE Trans Neural Netw Learn Syst 23(1):22–32 8. Chen B (2018) Quantized minimum error entropy criterion. Trans Neural Netw Learn Syst 9. Chen B (2019) Granger causality analysis based on quantized minimum error entropy criterion. IEEE Signal Process 26(2):347–351 10. Liu W, Pokharel P, Principe JC (2007) Correntropy: properties and applications in nongaussian signal processing. IEEE Trans Signal Process 11(55):5286–5294

Discovering Bursty Events Based on Enhanced Bursty Term Detection Liyan Zhou1, Junping Du1(&), Wanqiu Cui1, Zhe Xue1, and Chengcai Chen2 1

Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia, School of Computer Science, Beijing University of Posts and Telecommunications, Beijing 100876, China [email protected] 2 Xiaoi Research, Shanghai Xiaoi Robot Technology Co., Ltd., Shanghai 201803, China

Abstract. Weibo has become preferred media for people to expose events, express opinions and share experiences. Many real-world events are first revealed on Weibo. Bursty event detection based on microblog has become a research hotspot in the area of recent event detection. This paper proposes a bursty event detection method (Burst_NBT) based on enhanced bursty term detection which is composed of construction of meaningful string dictionary and calculation of bursty term score. To utilize the feature of hashtags in Weibo and features of titles’ mark in Chinese, Burst_NBT adopts meaningful strings between “#”s and meaningful strings between quotation marks as a heuristic method. The enhanced bursty term detection method takes three factors into consideration, word frequency, associated users and number of comments. Based on this, a hotspot computational model for bursty events is further developed, which uses the indexes such as bursty term frequency, associated users and hotness of associated posts. Experiments on the Sina Weibo corpus prove that Burst_NBT exceeds the other four bursty event detection methods. Keywords: Meaningful string  Bursty term detection  Bursty event detection

1 Introduction Weibo, as a real-time and interactive social media, provides a preferred platform for users to freely publish content and exchange information. Many real-world events are first revealed on Weibo and then reported by traditional mainstream media, such as Drip-drip windmill incident and Chongqing bus falling down the river in 2018. Bursty event detection based on microblog has been a research hotspot. However, there are several challenges in discovering bursty events from Weibo. First, how to extract events of high quality from the posts, which are usually short and diverse, is extremely challenging. Second, there are lots of universal and pointless topics such as daily conversation in microblogs. How to filter these noises is a nontrivial problem. Third, due to different events may have some shared topic components, the similarity between different events is high. How to distinguish different events is also a stubborn problem. © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 656–663, 2020. https://doi.org/10.1007/978-981-32-9050-1_74

Discovering Bursty Events Based on Enhanced Bursty Term Detection

657

There is some research attempting to utilize pseudo-documents to tackle the sparsity difficulty of Weibo data [1]. To find proper representations of microblog texts, Xu et al. [2] learned low-dimensional representations with full use of the retweet relationship and hashtags. In this paper, we propose a bursty event detection method (Burst_NBT) based on enhanced bursty term detection. Combining the meaningful string dictionary and calculation of bursty term score, the enhanced bursty term detection method takes three factors into consideration. Based on this, a computational hotspot model for bursty events is further developed, which uses the indexes such as bursty term frequency, associated users and hotness of associated posts. Our main contributions are: • We construct a meaningful string dictionary to utilize the feature of hashtags in Weibo and features of titles’ mark in Chinese. • We propose an enhanced bursty term detection method which extracts more relevant and more describable words with bursty events. • We present a bursty event detection method (Burst_NBT) based on the enhanced bursty term detection. The experimental results prove the effectiveness and interpretability of Burst_NBT. The rest of this paper is outlined as follows. Section 2 reviews the related work in bursty event detection tasks. Section 3 defines the basic terminologies of this paper and presents our model based on enhanced bursty term detection. Section 4 gives abundant experimental results. Lastly, the whole paper is summarized in Sect. 5.

2 Related Work Nowadays, bursty event detection based on microblog has become a research hotspot in the field of recent event detection. Cheng et al. [3] presented BTM to model the cooccurrence and extract topics from short texts. BTM can infer effectively with the abundant corpus-level information. Detecting bursts from media stream requires us to gather information and filter noise within the data stream. Yan et al. [4] presented the Bursty Biterm Topic Model (BBTM) to automatically detect high-quality bursty topics in Weibo efficiently over short texts. BBTM solves the problem of data sparsity in detecting bursts to some extent based on BTM. There are some work to utilize word extraction technology to develop event discovery methods and construct real-time detection system. Zhu et al. [5] extracted hashtags appeared in bursty periods and segmented them into keywords to describe the discovered events. Bisht et al. [5] proposed EventStory, a framework which identifies locally significant keywords. Stilo et al. [6] presented the Symbolic Aggregate ApproXimation algorithm (SAX*) for clustering words in micro-blogs. Shen et al. [7] proposed a realtime burst topic detection framework for multi-type entities without Chinese word segmentation.

658

L. Zhou et al.

3 The Proposed Method 3.1

Term Definition

Hashtag: A string between a pair of “#”s in posts. Title: A string between “【” and “】” or “《” and “》” in posts. The former is usually used as a title of the post, and the latter is usually used as a title of an entity that is talked about in the post, such as a movie, a journal, an article, etc. Meaningful String: A string with independent semantic which is a substring of hashtags or titles in posts. Bursty event: In this paper, an event that triggers a burst of relevant posts talking about itself is called “bursty event”. For example, “the Chongqing bus plunge” is the event that a bus plunged into the Yangtze River in Chongqing city after it crashed into a car. 3.2

Bursty Event Detection Method (Burst_NBT)

We propose a bursty event detection method named Burst_NBT. As shown in Fig. 1, there are two parts in our bursty event detection method: enhanced bursty term detection, bursty term clustering and bursty event ranking.

Enhanced Bursty Term Detection Data stream

Construction of Meaningful String Dictionary Calculation of Terms’ Bursty Score

Bursty Term Clustering and Events Ranking Agglomeration hierarchical clustering Calculation of term clusters bursty score

Fig. 1. Event detection method.

Enhanced Bursty Term Detection. There are two parts in our bursty term detection, construction of meaningful string dictionary and calculation of bursty term score. To enhance the behavior of bursty term detection, we adopt meaningful strings between a pair of “#”s and meaningful strings between quotation marks as a heuristic method for Chinese word segmentation, and then they are weighted after bursty scores of words are calculated. Decreasing the influence of comment numbers and weighing the longer words are also two enhancing tricks when we calculate the bursty term score of words. The algorithm of meaningful string extraction is shown in Algorithm 1. Construction of Meaningful String Dictionary. We extract meaningful strings from hashtags and titles in posts to construct a meaningful string dictionary. We split the longer hashtags and titles by stopwords to obtain meaningful strings. Then they are added into a self-defined dictionary of “Jieba” for Chinese word segmentation.

Discovering Bursty Events Based on Enhanced Bursty Term Detection

659

Calculation of Bursty Term Score. The bursty score of word wi is about three indicators. Suppose the timeslice of current burst event detection is k, historical data of the previous p timeslices are selected for reference. The standard variance of historical data is introduced into the denominator, which makes it easier to extract the word with a gentle change in the past time but strong breakout in the current period. Algorithm 1 Meaningful String Extraction Input: Dataset of posts Output: Dictionary of Meaning Strings MSD

Step 1. For each post in dataset Step 2. Use regular expression to extract hashtags and titles in the post; Step 3. Add hashtags/titles into set HT; Step 4. For each hashtag/title in set HT Step 5. Segment hashtag/title into words; Step 6. filter words with stopwords and add them into set W; Step 7. Concatenate words in W if they are adjacent in HT until there is no two words adjacent; Step 8. Return W as MSD

The bursty score of word wi’s frequency in No. k timeslice is defined as Eq. (1), where TFwk i is the frequency of word wi appearing in No. k timeslice; the average of TFwi in p timeslices is TFMhis and the variance of TFwi in p timeslices is TFSDhis . If wi appears in MSD, the square function is applied to weight the score. The word appearing in MSD is more expressive and often used in bursty events. The bursty score of associated users which is burst of users associated with wi in No. k timeslice is defined as Eq. (2), where UNwk i is the number of users who mentioned word wi; the average of UNwi in p timeslices is UNMhis and the variance of UNwi in p timeslices is UNSDhis . The bursty score of associated posts which is burst of posts associated with wi in No. k timeslice is defined as Eq. (3), where SBkwi is the accumulated comment number of posts where word wi was mentioned; the average of SBwi in p timeslices is SBMhis and the variance of SBwi in p timeslices is SBSDhis . According to the difference between hot topic and bursty event, we use logarithm function to weight the score after smoothing. Thus, we pay more attention to other indicators to obtain better robustness against noises of hot posts.

F ðwi Þ ¼

8 < :

2 TFwk i TFMhis þ 2TFSDhis ; wi 2 MSD TFwk i TFMhis þ 2TFSDhis ; wi 62 MSD

U ðujwi Þ ¼

UNwk i UNMhis þ 2UNSDhis

ð1Þ

ð2Þ

660

L. Zhou et al.

H ðsbjwi Þ ¼ log2

SBkwi þ1 SBMhis þ 2SBSDhis

! ð3Þ

Combining the above three indicators, the bursty score of word wi in No. k timeslice is finally obtained by Eq. (4), where len(wi) is the length of wi. The longer the word, the more full the meaning. BurstyScoreðwi Þ ¼ a1  F ðwi Þ  log2 ðlenðwi ÞÞ þ b1  U ðujwi Þ þ c  H ðsbjwi Þ

ð4Þ

After calculating the bursty score of each word, m bursty terms are selected by the method of quartile difference. First, words are sorted in descending order by the bursty score of the word to obtain the bursty words set EW. The distance calculation method of quartile difference is shown in the formula (5), where Q1 is the first quartile, Q3 is the third quartile. When the bursty score of a word is greater than a certain threshold value, it is regarded as a bursty word, and the calculation method of the threshold value is shown in the formula (6).

3.3

IQSðEW Þ ¼ Q3 ðEW Þ  Q1 ðEW Þ

ð5Þ

threshold ðEW Þ ¼ Q3 ðEW Þ þ 1:5  IQSðEW Þ

ð6Þ

Bursty Term Clustering and Bursty Event Ranking

We adopt agglomeration hierarchical clustering to cluster the m bursty terms obtained in Sect. 3.2 to obtain candidate word clusters EWC. Bursts are presented as word clusters ewci , bursty score of ewci is about three indicators. The score of accumulated frequency is shown in Eq. (7), where f(w) is the frequency of word w in ewci. The score of associated users is shown in Eq. (8), where usernumðewci Þ is the number of users who mentioned word cluster ewci . We utilize linear function to weight score of users but not take the number of posts into consideration. Each user plays an important role because their posts can be a transmission node on the Internet. Posts published by the same user in the similar time are usually repeated committed or segments of the same event. Hotness of associated posts is defined as Eq. (9), where fcrnumðewci Þ is the accumulated number of comments and transmits associated with word cluster ewci. F ðewci Þ ¼ log2

X w2ewci

f ðwÞ



ð7Þ

UN ðewci Þ ¼ usernumðewci Þ

ð8Þ

MBI ðewci Þ ¼ log2 ðfcrnumðewci Þ þ 1Þ

ð9Þ

Discovering Bursty Events Based on Enhanced Bursty Term Detection

661

Combining the above three indicators, the score of a word cluster ewci is shown in Eq. (10). Then top k bursty events are selected by their scores. Scoreðewci Þ ¼ F ðwi Þ þ UN ðewci Þ þ MBI ðewci Þ

ð10Þ

4 Experiments 4.1

Dataset Description and Preprocessing

We tested the proposed method on a corpus which contains all the microblogs in December 2011 from NLPIR Sina Weibo dataset. Our dataset differs with other literature who collected corpuses on some specific events. To introduce noisy contents, they added several posts irrelative to these settled events into datasets. In our dataset, there is no event settled beforehand. Our events are more indistinguishable and buried in a lot of confusing noises. Therefore, the detection task becomes tougher and more practical in our scene. We performed the following preprocessing steps. Removing duplicate posts. Converting traditional Chinese into simplified Chinese. Utilizing “Jieba” for Chinese word segmentation with the self-defined meaningful string dictionary. Keeping words such as noun, verb and so on, removing others and stop words. At last, we left more than 50,000 valid posts and more than 30,000 users. This paper compared the proposed method with four event detection algorithms on our corpus. Bursty Biterm Topic Model(BBTM) proposed a probabilistic model for bursty topics. Top-k bursty event detection (TBED) in microblog is similar to the method proposed in [8] without locational information. The Algorithm with a linear function of comments number Burst_linear replaces the Eq. (3) in our method with SBk

wi H ðsbjwi Þ ¼ SBMhis þ 2SBSD . The algorithm ignoring the impact of hotness Burst_none his deletes the item of Hðsbjwi Þ.

4.2

Experimental Results and Analysis

Firstly, we evaluated the precision of the bursty events detected by different methods. We adopted the same way as that Yan [4] took, asking five volunteers to label the bursty events found by these methods manually. The average precision at K (P@K) was utilized to compare different methods. P@K is the ratio of correctly discovered bursty events among the acquired top K bursty events in December 2011. Table 1. Accuracy of the discovered bursty events. Method BBTM TBTD Burst_linear Burst_none Burst_NBT

P@20 0.8 0.75 0.9(0.85) 0.9(0.85) 0.95(0.9)

P@30 0.733 0.667 0.867(0.833) 0.9(0.833) 0.933(0.833)

P@40 0.65 0.625 0.875(0.775) 0.825(0.775) 0.9(0.8)

Average 0.728 0.681 0.881(0.819) 0.875(0.819) 0.928(0.844)

662

L. Zhou et al.

Table 1 lists the accuracies of all the methods with different numbers of top bursty events. Clearly, our method outperforms others. The average precise score of Burst_NBT is 0.928, which is 0.2 better than BBTM, 0.247 better than TBED. The second better one is Burst_none, performing better than Burst_linear. The series methods of Burst_XXX are all better than BBTM and TBED because we take the length of words into consideration and pay more attention to associated users. However, Burst_linear is inclined to hot topics and Burst_none ignores the effect of hotness of posts. The last three lines show us the effect of the meaningful string dictionary (MSD) on our method. We tested the series methods of Burst_XXX without MSD. There are visible improvements in our methods with MSD, which proves that using the meaningful string dictionary is pretty useful.

Table 2. Description of detected bursty events Burst_NBT with MSD Overcome, responsibility, advocating, anticorruption, UN, December 9, the International Anti-corruption Day Jiangsu Fengxian school bus overturned Mass incidents happened in Lufeng were reported by Shanwei, Guangdong

Burst_NBT without MSD Evocative, convention, international, UN General Assembly, UN, anti-corruption School bus, the whole county, Fengxian, stop, Xianzhen, overturned Special emphasis, add fuel to the fire, Shanwei, Lufeng

Then, we assessed the interpretability of the detected bursty events. Table 2 lists the description of some detected bursty events. Obviously, the results of methods with meaningful string recognition are friendly to human. Such as “Jiangsu Fengxian school bus overturned” with meaningful string recognition compared with “school bus, whole county, Fengxian, stop, Xianzhen, overturned”. We also know that International Anticorruption Day is on 9 December through Burst_NBT with MSD. However, there is no such information obtained without meaningful strings recognition. Table 3. Experiment results of different parameter settings No. 1 2 3 5

a 0.5 0.25 0.25 0.33

b 0.25 0.5 0.25 0.33

c 0.25 0.25 0.5 0.33

Average 0.836 0.864 0.846 0.928

More experiments with different parameter settings were conducted to verify the influence of parameters on the calculation of bursty term score. As shown in Table 3, we obtained the highest average accuracy of 0.928 with the settings of a = 0.33, b = 0.33 and c = 0.33.

Discovering Bursty Events Based on Enhanced Bursty Term Detection

663

5 Conclusion and Future Work This paper developed a bursty event detection method based on enhanced bursty term detection. To utilize the feature of hashtags in Weibo and features of titles’ mark in Chinese, Burst_NBT adopts meaningful strings between “#”s and meaningful strings between quotation marks as a heuristic method for Chinese word segmentation. The enhanced bursty term detection method combines the meaningful string dictionary and calculation of bursty term score, taking three factors into consideration, word frequency, associated users and number of comments. The experimental results prove that Burst_NBT exceeds others in both precision and interpretability. In language, one word may have more than one meanings and the same semantic may be represented by different words. Thus, we will mainly concentrate on how to combine semantic vectors with our existing work in the future, such as Word2vec and Bert. Acknowledgements. This work was supported by the National Natural Science Foundation of China (NSFC) under Grant (No. 61532006, No. 61772083, No. 61802028, No.61877006).

References 1. Xu K, Qi G, Huang J et al (2017) Detecting bursts in sentiment-aware topics from social media. Knowl-Based Syst 2. Xu L, Jiang C, Ren Y et al (2016) Microblog dimensionality reduction – a deep learning approach. IEEE Trans Knowl Data Eng 28(7):1779–1789 3. Cheng X, Yan X, Lan Y et al (2014) BTM: topic modeling over short texts. IEEE Trans Knowl Data Eng 26(12):2928–2941 4. Yan X, Guo J, Lan Y et al (2015) A probabilistic model for bursty topic discovery in microblogs. In: Proceedings of the twenty-ninth AAAI conference on artificial intelligence. AAAI Press 5. Zhu X, Jing Y, Zhang J (2018) Sentiment-based and hashtag-based Chinese online bursty event detection. Multimedia Tools Appl 77(16):21725–21750 6. Stilo G, Velardi P (2016) Efficient temporal mining of microblog texts and its application to event discovery. Kluwer Academic Publishers, Dordrecht 7. Shen G, Yang W, Wang W et al (2015) Burst topic detection oriented large-scale microblogs streams. J Comput Res Dev 52(2):512–521 8. Zhong Z, Guan Y, Li C et al (2018) Localized top-k bursty event detection in microblog. Chin J Comput 427(07):76–88 (in Chinese)

Dynamic Job Shop Scheduling Problem with New Job Arrivals: A Survey Zhen Wang1,2(B) , Jihui Zhang1 , and Jianfei Si3 1

3

Institute of Complexity Science, College of Automation, Qingdao University, Qingdao 266071, China [email protected] 2 College of Electrical Engineering, Qingdao University, Qingdao 266071, China Naval Aeronautical Engineering Institute Qingdao Branch, Qingdao 266041, China

Abstract. To meet the increasingly changing market environment, necessary dynamic scheduling is needed for modern manufacturing enterprises to handle real time events, such as machine breakdowns, job arrivals, and due date changing, etc. This paper focuses on dynamic scheduling problem in job shops with new job arrivals. Firstly, the definition of dynamic job shop scheduling problem (JSP) is introduced. Then, a framework of dynamic scheduling is described in a comprehensive way, including strategies, policies, methods and solution approaches. Then, a survey of the latest literature on dynamic JSP with new job arrivals is provided. Lastly, a brief discussion on relevant literature is presented. Keywords: Dynamic job shop scheduling · New order arrivals · Survey

1

Introduction

Nowadays, manufacturing enterprises is experiencing increasing intense competition than ever before. As an important component of shop floor systems, scheduling plays a stronger role in making enterprises more competitive. The job shop scheduling problem (JSP) acts as a significant production scheduling problem. Over the past decades, JSPs have attracted considerable attention and extensive techniques have been developed to solve static JSPs. However, in the real world context, static scheduling is usually unrealistic. Industrial environments are of complexity, dynamic nature and randomness in essence with occurrence of unforeseen events, like new job arrivals, machine breakdowns, due dates changing, etc. These may make the predetermined schedule inefficient or even invalid and require dynamic scheduling (also known as rescheduling) to update the existing schedule based on changes. Studies on dynamic JSPs can date back to 1974. The first study was addressed Holloway and Nelson [1]. A multi-pass heuristic scheduler has been proposed for JSP which has variable processing time and due dates. Then they extended the work with intermittent job arrivals [2]. Since then, the dynamic JSPs had drawn more and more attention. Several surveys of dynamic scheduling problems have been published [3–7]. However, there c Springer Nature Singapore Pte Ltd. 2020  Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 664–671, 2020. https://doi.org/10.1007/978-981-32-9050-1_75

Dynamic JSP with New Job Arrivals: A Survey

665

are very few specific surveys of dynamic JSPs with new job arrivals. In fact, with the increasing competition of global market and the diversity of customer demand, it has become a more realistic topic than ever before in practice. The paper presents a literature survey on dynamic JSPs with new job arrivals using different dynamic scheduling approaches. Numerous scheduling approaches and solution techniques have been investigated. Due to the wide range of research, this survey does not aim at covering every attempt. But we do wish to provide a sense of direction to help readers to understand major aspects in the research about the topic as well as the current state of the research. The rest of the paper falls into 4 sections: Sect. 2 describes the dynamic JSPs. Section 3 introduces a framework of dynamic scheduling. Section 4 presents a survey of the latest literature. A brief discussion session on relevant literature appears in Sect. 5.

2

Dynamic JSPs

In the general JSPs, it is necessary to assign a set of jobs to a set of machines, where every job has its own operation chain which shall be processed on a fixed machine and in specified processing times. The dynamic JSPs can be considered as an extension of the general JSPs in the presence of real time events. Real time events may happen unavoidably and unpredictably at uncertain times in practice. They can change the system status as well as impact the performance. Once the performance suffers obvious deterioration, dynamic scheduling may be triggered to reduce the impact. As mentioned above, there are several real time events, such as machine breakdown [8–13], tool unavailability [14], job arrival [10–13,15,16], job cancellation [10,12,13,17], and due date change [10,18]. Among these real time events, manufacturing industry sees frequent job arrival, particularly for the mass customized production [19]. Normally, the new jobs arrive dynamically overtime, and should be accounted for the schedule as soon as possible. In the previous researches, randomly arriving jobs [20], continuously arriving new jobs [21], and intermittently arriving jobs [22] have been studied.

3

A Dynamic Scheduling Framework

Research on dynamic scheduling has a wide scope. Several comprehensive strategies, specific techniques, and solution approaches have been studied. In this section, we present a framework for understanding dynamic scheduling research, including dynamic scheduling strategies, dynamic scheduling policies, dynamic scheduling methods, and dynamic scheduling approaches. 3.1

Dynamic Scheduling Strategies

According to the type of the initial schedule, dynamic scheduling strategies can be classified into three categories (Fig. 1):

666

Z. Wang et al.

Fig. 1. The framework of dynamic scheduling.

(1) Completely reactive scheduling (also termed on-line scheduling [23]), generating no pre-schedule and completing the scheduling in real time. Schedules are easily constructed when necessary using priority dispatching rules or other heuristics. While the property of above mentioned rules usually lead to poor solution quality. (2) P redictive-reactive scheduling, generating one schedule in advance and revising the schedule based on real time events. The construction of a new schedule or the repair of the pre-schedule is useful for minimizing how real time events affect the performance of system. It is easy to perform simple schedule adjustments. Compared with on-line scheduling, it is able to obtain schedule with high quality as well as better performance of system. It is commonly used in dynamic scheduling. A majority of definitions mentioned in literature about the dynamic scheduling belong to this category. (3) Robust pro-active scheduling, producing a schedule in advance to anticipate the effect of disturbance on manufacturing system. A predictive schedule is pursued to meet the requirement of predictable performance in a dynamic environment. The main difficulty lies in the determination of robustness measures. 3.2

Dynamic Scheduling Policies

Dynamic scheduling policies are needed to implement the above strategies, three policy types are involved as follows: (1) A periodic rescheduling performs a periodical rescheduling and caries out these schedules in a rolling time range [9]. The performance of scheduling is conducted in a rolling time range so as to divide the dynamic scheduling problem into small and static ones. That is to say, the schedule remains

Dynamic JSP with New Job Arrivals: A Survey

667

unchanged despite of a real time event, until reaching the next predefined time interval. (2) As for an event-driven rescheduling policy, a real time event occurs accompanied by a rescheduling. Most studies in dynamic scheduling adopt the policy in a static environment. (3) A hybrid rescheduling policy, so-called hybrid, performs periodical rescheduling whenever a real time events occurs. 3.3

Dynamic Scheduling Methods

Dynamic scheduling strategies are determined by the type of generated initial schedule, if stated, and the schedule repair method. So dynamic scheduling methods embody two aspects: schedule generation and schedule repair. The nominal initial schedule is made paying only attention to the optimization of performance, which is highly sensitive to the real time events. However, the simplicity makes a large number of literature focus on the generation of a nominal schedule. The generation of a robust schedule depends on a protection against the unforeseeable events, which is beneficial for using simple schedule adjustment to maintain the performance. But the main problem is that it is difficult to define the temporal protection size. The third alternative, termed no schedule, fails in generating an initial schedule, but can assign the job in the course of executing process when jobs arrive and when required machines are available. Three repair methods used for restoring the feasibility exhibited the schedule when real time events occur: (1) “Right-shif ting rescheduling” delays every remaining operation to a time needed for ensuring the feasibility of schedule. (2) “Complete rescheduling” performs rescheduling on the total set of operations that have not started when real time events happen. (3) “P artial rescheduling” only performances rescheduling on the operation under the direct and indirect influence of real time events. 3.4

Dynamic Scheduling Approaches

Dynamic scheduling approaches can be used both for creating an initial schedule and for dealing with scheduling dynamically. Three major methods can be applied to handling the dynamic JSP: namely the heuristic rules, the classical optimization, and the artificial intelligence (AI) approaches. Heuristic rules, also termed dispatching rules, scheduling rules, or priority rules, are applied to determining the job to be chosen next among the job set to receive process next on a specific machine. Different dispatching rules are applied to reacting to real time events. The branch and bound method (BB) and dynamic programming (DP) are two primary classical optimization methods. Based on lower bounds of the optimal problem solution, BB is used for guiding a branching process that divides

668

Z. Wang et al.

the problem into smaller and mutually exclusive sub-problems searched until the best solution is found. On the other hand, in DP, taking every job as the last job and testing the usefulness of the choice in the optimization of a given standard can help to generate a possible schedule set. Therefore, choosing the minimum value of the set can find the optimal schedule. AI techniques are applied to solving NP hard problems with clever methods. Solution quality obtained by AI techniques help to obtain much better solution quality and shorter solution time compared with heuristic solutions. Meta heuristic approaches are typical AI techniques. As such, they are useful approaches for optimization problems. Some common meta heuristic approaches include genetic algorithm (GA), tabu search (TS), beam search (BS), multiagent systems (MAS), artificial neural network (ANN), ant colony optimization (ACO), artificial bee colony algorithm (ABC) as well as variable neighborhood search (VNS).

4

Dynamic JSP with New Job Arrivals: Literature Review

In this section, a survey of the literature on dynamic JSP with new job arrivals using different dynamic scheduling approaches is presented. In order to keep track of research trends, we try our best to review the latest literature in this paper. 4.1

Heuristic Rules

Dominic et al. [24] set forth some novel integrated dispatching rules of scheduling in dynamic job shop on the basis of accumulative integration of time of process, the overall job work content in order for next job operation as well as arrival time. They simulated the dynamic model under various rules and performance measures. Measures considered include: The mean flow time, the mean tardiness, the maximum flow time, the number of tardy jobs as well as the tardiness variance. Lu and Romanowski [25] used multi-contextual functions for describing the idle time of machine and waiting time of job, and they presented a simple procedure to allow one or both of them to be combined with a single basic dispatching rule. Then they proposed several composite dispatching rules to minimize the makespan and the mean flow time. 4.2

Classical Optimization

Gunasekaran et al. [26] addressed the application of queuing theory to minimize the overall variable cost to estimate the distribution exhibited by the new order scheduling or the process starting time in the predefined loading schedule of machine, including the cost of set up time, the inventory, and the rescheduling. Their research provided new thoughts about meeting the requirements of customers by assessing the scheduling distribution. Chang [27] proposed a novel

Dynamic JSP with New Job Arrivals: A Survey

669

method to assess the queuing times in a real-time way for the rest job operations, as well as integrated the estimation data into prior scheduling heuristics for improving the performance. Kis and Hertz [28] carried out an analysis on different features exhibited by feasible insertions, followed by calculating a strong lower bound by developing a relaxation approach. Researchers also put forward a polynomial time step on the basis of the perfect graph theory together with the polyhedral theory, aiming at solving the relaxed issue. 4.3

Artificial Intelligence Approaches

Fattahi and Fallahi [29] proposed a meta-heuristic algorithm according to GA targeting dynamic scheduling and took into account two objectives to balance the schedules regarding the stability and efficiency. [30,31] studied issue to insert rush orders to initial schedule from an actual job shop floor. They proposed a match up algorithm to modify only a portion of the current schedule for accommodating the arriving jobs. Several strategies were developed and both good stability and performance can be obtained. Gao et al. [16,20,32] had conducted a series of studies on dynamic JSPs with new order insertion. They proposed an artificial bee colony algorithm with two stages for minimizing the makespan to schedule and reschedule with new jobs [16]. Two extended versions of this work were published soon. Then they extend the same problem with multiple objectives [20]. The objectives included the minimization of the makespan, the minimization of the mean of earliness and tardiness, and the minimization of the maximum machine workload (Mworkload) and total machine workload (Tworkload). Four ensembles of heuristics were proposed to solve the problem. Another extended work [32] was carried out to consider both the uncertainty which can be observed in processing time and the new order inserting. Fuzzy processing time was applied for describing the uncertainty which can be seen in processing time.

5

Conclusion and Discussion

In the past several decades, plenty of efforts have been spent on dynamic scheduling, and there has been a huge number of papers which talk about the topic. The core of all varies dynamic scheduling approaches aims at contributing to a more productive and efficient operation to a manufacturing enterprise facing with the increasingly changing market environment. Based on the definition of dynamic JSPs, a framework of dynamic scheduling are described for readers to understand dynamic scheduling research more comprehensively. Several strategies, policies, methods and solution approaches way are included. Then the latest literature on dynamic JSPs with new job arrivals using different approaches is reviewed. In order to provide a sense of direction to help readers to understand major aspects as well as the current state of dynamic JSPs with new job arrivals. We summarize the features of existing research from three aspects.

670

Z. Wang et al.

(1) Objectives: single objective problems are gradually expended multi-objective ones. Makespan, total tardiness and flow time have been commonly used as the single objective. With in-depth study, these common single objectives are combined to be multi-objectives. (2) Environment: most of latest literature has considered the flexibility of job shops, namely flexible job shop, in which each operation of jobs can be processed on more than one machine. (3) Job arrival: As mentioned earlier, randomly arriving jobs, continuously arriving new jobs, and intermittently arriving jobs have been studied. Relatively speaking, randomly arriving jobs have been increasingly concerned about. Although, many research have been conducted, there is still much research to be done, including but not limited to: (1) More attention should be paid to robust pro-active scheduling; (2) More work is needed to some other AI techniques, such as particle swarm algorithm, fuzzy logic, neural network, and so on; (3) Scheduling theory and practice should be integrated, for instance, to investigate how dynamic scheduling affects the manufacturing systems in Industry 4.0, and to make dynamic scheduling as a program in the embedded systems in manufacturing environment. Acknowledgments. This research is supported by the Natural Science Foundation of China under Grant No. 61673228, 61703220 and 61402216, the Natural Science Foundation of Shandong Province under Grant No. ZR2010GM006.

References 1. Holloway CA, Nelson RT (1974) Job shop scheduling with due dates and variable processing times. Manag Sci 20(9):1264–1275 2. Nelson R, Holloway C, Wong RML (1977) Centralized scheduling and priority implementation heuristics for a dynamic job shop model. AIIE Trans 9(1):95–102 3. Ouelhadj D, Petrovic S (2009) A survey of dynamic scheduling in manufacturing systems. J Sched 12(4):417–431 4. Ramasesh R (1990) Dynamic job shop scheduling: a survey of simulation research. Omega 18(1):43–57 5. Suresh V, Chaudhuri D (1993) Dynamic scheduling—a survey of research. Int J Prod Econ 32(1):53–63 6. Vieira GE, Herrmann JW, Lin E (2003) Rescheduling manufacturing systems: a framework of strategies, policies, and methods. J Sched 6(1):39–62 7. Potts CN, Strusevich VA (2009) Fifty years of scheduling: a survey of milestones. J Oper Res Soc 60(1):41–68 8. Yamamoto M, Nof SY (1985) Scheduling/rescheduling in the manufacturing operating system environment. Int J Prod Res 23(4):705–722 9. Church LK, Uzsoy R (1992) Analysis of periodic and event-driven rescheduling policies in dynamic shops. Int J Comput Integr Manuf 5(3):153–163 10. Li RK, Shyu YT, Adiga S (1993) Heuristic rescheduling algorithm for computerbased production scheduling systems. Int J Prod Res 31(8):1815–1826

Dynamic JSP with New Job Arrivals: A Survey

671

11. Kim MH, Kim YD (1994) Simulation-based real-time scheduling in a flexible manufacturing system. J. Manuf. Syst. 13(2):85–93 12. Abumaizar RJ, Svestka JA (1997) Rescheduling job shops under random disruptions. Int J Prod Res 35(7):2065–2082 13. Jain AK, Elmaraghy HA (1997) Production scheduling/rescheduling in flexible manufacturing. Int J Prod Res 35(1):281–309 14. Bean JC, Birge JR, Mittenthal J, Noon CE (1991) Matchup scheduling with multiple resources, release dates and disruptions. Oper Res 39(3):470–483 15. Gomes MC, Barbosa-P´ ovoa AP, Novais AQ (2010) A discrete time reactive scheduling model for new order insertion in job shop, make-to-order industries. Int J Prod Res 48(24):7395–7422 16. Gao KZ, Suganthan PN, Chua TJ, Chong CS, Cai TX, Pan QK (2015) A two-stage artificial bee colony algorithm scheduling flexible job-shop scheduling problem with new job insertion. Expert Syst Appl 42(21):7652–7663 17. Petrovic D, Duenas A (2006) A fuzzy logic based production scheduling/rescheduling in the presence of uncertain disruptions. Fuzzy Sets Syst 157(16):2273–2285 18. Cowling P, Johansson M (2002) Using real time information for effective dynamic scheduling. Eur J Oper Res 139(2):230–244 19. Liu W, Jin Y, Price M (2017) New scheduling algorithms and digital tool for dynamic permutation flowshop with newly arrived order. Int J Prod Res 55(11):3234–3248 20. Gao KZ, Suganthan PN, Tasgetiren MF, Pan QK, Sun QQ (2015) Effective ensembles of heuristics for scheduling flexible job shop problem with new job insertion. Comput Ind Eng 90:107–117 21. Li N, Liang G, Li P, Shao X (2013) Reactive scheduling in a job shop where jobs arrive over time. Comput Ind Eng 66(2):389–405 22. Muhlemann AP, Lockett AG, Farn CK (1982) Job shop scheduling heuristics and frequency of scheduling. Int J Prod Res 20(2):227–241 23. Sabuncuoglu I, Bayiz M (2000) Analysis of reactive scheduling problems in a job shop environment. Eur J Oper Res 126(3):567–586 24. Dominic PDD, Kaliyamoorthy S, Kumar MS (2004) Efficient dispatching rules for dynamic job shop scheduling. Int J Adv Manuf Technol 24(1–2):70–75 25. Lu MS, Romanowski R (2013) Multicontextual dispatching rules for job shops with dynamic job arrival. Int J Adv Manuf Technol 67(1–4):19–33 26. Gunasekaran A, Goyal SK, Martikainen T, Yli-Olli P (1994) Economic scheduling of a new order in a job-shop production system. Int J Syst Sci 25(2):365–376 27. Chang FCR (1997) Heuristics for dynamic job shop scheduling with real-time updated queueing time estimates. Int J Prod Res 35(3):651–665 28. Kis T, Hertz A (2003) A lower bound for the job insertion problem. Discret Appl Math 128(2):395–419 29. Fattahi P, Fallahi A (2010) Dynamic scheduling in flexible job shop systems by considering simultaneously efficiency and stability. CIRP J Manuf Sci Technol 2(2):114–123 30. Moratori P, Petrovic S, V´ azquez-Rodr´ıguez J (2010) Integrating rush orders into existent schedules for a complex job shop problem. Appl Intell 32(2):205–215 31. Moratori P, Petrovic S (2012) Match-up approaches to a dynamic rescheduling problem. Int J Prod Res 50(1):261–276 32. Gao KZ, Suganthan PN, Pan QK, Tasgetiren MF, Sadollah A (2016) Artificial bee colony algorithm for scheduling and rescheduling fuzzy flexible job shop problem with new job insertion. Knowl-Based Syst 109:1–16

Overview of Longitudinal and Lateral Control for Intelligent Vehicle Path Tracking Tengfei Fu1(&), Chenwei Yao1, Mohan Long1, Mingqin Gu2, and Zhiyuan Liu1 1

Department of Control Science and Engineering, Harbin Institute of Technology, Harbin, Heilongjiang, China [email protected] 2 Alibaba AI Lab, Hangzhou, China [email protected]

Abstract. Intelligent vehicle technology is a significant component in the automobile research field, which will play an important role in the future intelligent transportation system. With the continuous development of sensors, information technology and intelligent control methods, intelligent vehicle technology has made great progress. It is known that the environment perception, decision planning and vehicle control consist of the key technologies of intelligent vehicle. For the vehicle control, the research on path tracking is of great importance. In this paper, the longitudinal and lateral control methods related to path tracking for intelligent vehicle are reviewed based on the relevant literatures published in recent five years. Through analysis, it is concluded that how to deal with the longitudinal and lateral dynamic coupling will become the core problem in the field of the intelligent vehicle control. Keywords: Intelligent vehicle Lateral control

 Path tracking  Longitudinal control 

1 Introduction With the increasing complexity of traffic conditions, the requirements of safety, energy saving, environment protection and driving comfort are gradually enhancing, which promotes the development of automobile technology. Currently, automobile technology develops mainly in two directions. One is to improve the level of the traditional automobile technologies (such as powertrain, chassis, body shell, etc.); The other is to improve the level of intelligent vehicle technologies based on the combination with the network, sensing, intelligent control and other fields. Intelligent vehicle, which can help alleviating traffic congestion and improving vehicle safety and comfort, is an important part of the intelligent transportation system. At present, researches on intelligent vehicle mainly focus on three core technologies, namely environmental perception, decision planning and vehicle control. In existing literatures, there are two types of outputs given by the decision planning step, which are called trajectory and path. Trajectory is a function of time, and the desired position and posture of the vehicle at each moment are determined. So, this requires the coordination of speed tracking © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 672–682, 2020. https://doi.org/10.1007/978-981-32-9050-1_76

Overview of Longitudinal and Lateral Control

673

control and lateral motion control. However, path is time-independent, so it is reasonable to independently control the speed and lateral motion, which means the vehicle will travel according to the expected velocity and path respectively, while it does not restrict the position and posture of the vehicle at each moment. The second decision planning method (i.e. path planning) makes the speed control (also known as longitudinal control) and path tracking control (also known as lateral control) not coupled with each other, thus the velocity controller and path tracking controller can be independently designed. The main targets of longitudinal control and lateral control are both to minimize the error between the expected values and the actual values, so as to ensure the vehicle running on the desired path with desired velocity. Recent literatures mainly focus on the lateral control, and discuss the lateral control from the perspective of longitudinal and lateral decoupling. The control target is to improve the path tracking accuracy when intelligent vehicle drives on a curve. In fact, this kind of longitudinal and lateral decoupling control is only effective under limited scenarios which assume that the vehicle is running under general condition. Through vehicle dynamics analysis, we can realize that the degree of longitudinal and lateral coupling is quite weak in this case. When the vehicle is running in critical condition, the degree of coupling will significantly increase. Thus, if the longitudinal and lateral independent control method is used in critical condition, large tracking errors may be caused. However, rare literatures have considered the coupling control problem. The remainder of the paper is structured as follows: In Sect. 2, the longitudinal control methods of intelligent vehicle are reviewed according to driving and braking conditions. Section 3 reviews two kinds of lateral control methods, which are nonpreview lateral control and preview lateral control. Finally, Sect. 4 concludes with remarks on the state of art and research trends in the future.

2 Intelligent Vehicle Longitudinal Control Currently, there are two types of longitudinal controller structures, and the main difference is that the output variables of the controllers are different. The output of the first type is wheel torque [1–3]. The output of the second type of controller is the throttle/brake pedal opening [4–13]. The first type of controller structure ignores the powertrain or hydraulic braking system, but it has many limitations in actual application and suits quite few vehicle models. Literature [1] considers the influence of wind resistance, but it ignores the road slope and rolling resistance, and establishes the vehicle dynamics model. In order to reduce the steady-state error, a gain adaptive PI controller is presented. On the basic of literature [1], literature [2] considers the influence of external disturbance and parameter uncertainties on the system, and gives a robust control method based on speed estimation. Literature [3] considers the influence of actuator constraint and tire slip rate on longitudinal control, converts the desired vehicle speed into wheel speed, and establishes the tire torque equation with Burckhardt tire model. The tire torque in speed control is composed of feedforward torque and feedback torque. The second kind of control structure takes the powertrain and braking system into account when the vehicle is moving longitudinally. Because there is a big difference

674

T. Fu et al.

between the powertrain system and the braking system, the driving condition and braking condition are usually discussed separately. Considering the longitudinal control of vehicle under driving condition is the focus of many literatures [4–13]. The control methods proposed in literatures [4–7] have the same basic idea. Firstly, the optimal acceleration is solved according to the vehicle state, and then the optimal throttle pedal opening is calculated through the relationship between acceleration and throttle pedal opening. Literature [4] considers the limitation of maximum speed to avoid excessive lateral acceleration in the turning process of vehicle. The Model Predictive Control (MPC) is used to obtain the optimal change rate of vehicle acceleration, and the optimal acceleration is obtained through integral. Similar to literature [4], literature [5] also obtains the throttle petal opening through model inverse operation based on the relationship between acceleration and throttle pedal opening. Literature [6] improves the method in literature [5] and considers the deviation between the desired acceleration and the actual acceleration as a first-order system. Literature [7] considers the road slope, desired speed and speed error as new state variables to construct the optimal control problem. By solving a standard linear optimal control problem with dynamic programming method, the feedforward and feedback control law is designed. In addition, literature [7] obtains the nonlinear relationship between acceleration and vehicle speed under different throttle pedal opening by using the experimental data under flat road conditions, and obtains the optimal throttle pedal opening according to the optimal acceleration and current vehicle speed through inverse operation. Literature [8] has different emphases compared with literatures [4–7], and mainly discusses the modeling method of vehicle longitudinal dynamics for the nonlinear characteristics of powertrain. Literature [8] establishes the dynamics model by using the system identification method, and obtains the relationship between vehicle speed and throttle pedal opening. Literatures [9–12] treat the control problem differently from literatures [4–8]. In literatures [9–12], the controller output is the throttle pedal opening, so it is unnecessary to calculate it based on its relationship with acceleration. In literatures [9–11], the nonlinear characteristics of powertrain system are ignored during the modeling process, and it is simplified as a first-order system around the working point. Considering the uncertainties of vehicle’s weight, wind resistance and roll resistance coefficient, tire radius and other parameters, the model reference adaptive control method (MRAC) is adopted. The stability of the adaptive control method is proved by Lyapunov stability theory. This method reduces the dependence of the controller on the determined vehicle parameters, and it is verified in the experiment. However, the selection of initial adaptive parameters has a great influence on the control effect of this method. In literature [12], uncertainties of powertrain are considered in the modeling process. Within the variation range of the above parameters, five sets of multiplicative uncertain models are established to cover the possible variation range of longitudinal dynamics. In order to solve the problem of large parameter uncertainties in the longitudinal dynamics model under driving condition, an observer and a switching logic are presented in literature [12]. Compared with the traditional robust control method,

Overview of Longitudinal and Lateral Control

675

the multi-model switching control system (MMSC) proposed in literature [12] allows greater uncertainties and smaller speed tracking error in complex road conditions. Literature [13] presents a hierarchical control strategy with two controllers. The upper controller uses the proportional controller to calculate the desired acceleration. During designing the lower controller, air resistance, rolling resistance and slope are considered as external disturbances. To solve the nonlinear characteristics of powertrain system, literature [13] considers it as a linear time-varying model and proposes the parameter time-varying adaptive control strategy. Then, the throttle petal opening is calculated according to the desired acceleration given by the upper controller to achieve speed tracking target. Literatures [4–11] not only considers speed tracking control under driving conditions, but also braking conditions. In the above literatures, the control methods of braking condition are the same as that of driving condition, so they are not reiterated. In response to the nonlinear characteristics of the braking system, the longitudinal dynamics of the vehicle is considered as a linear time-varying model in literature [13]. The upper controller is used to calculate the expected deceleration according to the velocity error, while the lower controller adopts the parameter time-varying adaptive control method to calculate the brake pedal opening according to the expected deceleration, so as to eliminate the influence of time-varying parameters on the speed tracking.

3 Intelligent Vehicle Lateral Control The basic idea of lateral control is to calculate the lateral error (i.e. the path tracking error) according to the expected path information and current state information of the vehicle firstly, and then track the expected path by adjusting the vehicle’s steering angle. In the existing literatures, lateral error can be defined as lookahead position error and current position error. The lookahead position error refers to the deviation of position and posture between the point before the gravity center of vehicle and the corresponding reference point on the desired path. The current position error refers to the deviation of position and posture between the gravity center of vehicle and the corresponding reference point on the desired path at the current moment. In generally speaking, the control method that only considers the current position error is called non-preview control [14–17], and the control method that considers the lookahead position error is called preview control [18–35]. If only single lookahead position error is considered, it is called single-point preview control [18–26]. In a similar way, if two or more lookahead position errors are considered, it is called multi-point preview control [27–35]. 3.1

Non-preview Lateral Control

In non-preview lateral control, lateral error is usually defined as the shortest distance and the yaw angle error between the current position of the vehicle’s gravity center and the reference point on the desired path. Literature [14], based on a simple vehicle kinematics model, assumes that the direction of the front wheel steering angle is the

676

T. Fu et al.

driving direction of the vehicle, and the control law is designed according to the longitudinal velocity, current lateral error and yaw angle error. The control method, which is presented in literature [14], was applied to Stanford’s entrant in the DARPA Grand Challenge (2005). In practical application, it was found that this method has better tracking performance when the speed of vehicle is low and the road curvature is small. However, when the speed of vehicle is high and the road curvature is large, the steering angle tends to fluctuate. Literature [14] also points out that increasing the value of damping term can alleviate steering angle fluctuation. However, literature [14] only considers the kinematic model of vehicle. In contrast, literature [15] considers the nonlinear and Kamm circle constraint characteristics of tire force under the scenario of emergency obstacle avoidance, and establishes the dynamics model. Then the actual longitudinal force is calculated according to the measured longitudinal acceleration, and the constraint condition of the lateral force of the tire is obtained by the ellipse constraint. Literature [15] uses the input/output exact feedback linearization method to get the linearized model first. And then, feedforward control variable is calculated by the desired path curvature, while PD feedback control law based on the linearized model is designed at the same time. Similarly, literature [16] gives the dynamics model with longitudinal velocity, lateral position and yaw rate as state variables and longitudinal force, lateral force and yaw torque as control variables. This modeling method does not consider the nonlinear characteristics of tire force and significantly simplifies the controller design. The method presented in literature [16] seems to simplify the design of the lateral controller, but it raises new questions about how to achieve the desired longitudinal force, lateral force and yaw torque. Literature [16] discusses the method of distributing the longitudinal force, lateral force and yaw torque of vehicle into drive/brake torques and steering angles of four wheels. Because of the overdrive characteristic which exists in the assignment problem, it does not have unique solution. For this reason, literature [16] considers longitudinal lateral tire force constraint, yaw torque constraint, Kamm circle constraint, front and rear axle tire force constraint which are determined by axle load change, side slip angle and road adhesion coefficient, and designs the allocation strategy of wheel drive torques and steering angles by solving an optimization problems. Literature [17] also considers the lateral dynamics model with nonlinear tire force. Because the lateral force of tire is related to steering angle, longitudinal velocity, yaw rate and other factors, it makes the lateral dynamics model more complicated. Therefore, literature [17] introduces a concept of equivalent lateral stiffness, the equivalent lateral stiffness and the side slip angle are used to express the lateral force. In order to ensure the stability of the lateral controller and make the equivalent lateral stiffness as accurate as possible, literature [17] designs Lyapunov function, and the equivalent lateral stiffness is calibrated in the process of path tracking control using the adaptive method. 3.2

Preview Lateral Control

When a vehicle is controlled by the front wheel steering angle, there is a time delay before the actual driving path is formed. Therefore, it tends to generate the fluctuation

Overview of Longitudinal and Lateral Control

677

phenomenon of steering angle and driving path when the controller relies only on the current lateral error. For this reason, it is necessary to consider the lookahead lateral error under high speed condition, and adjust the control variable according to the current and lookahead lateral error, so as to reduce the influence caused by time delay. This control method, which is called as the preview lateral control, is similar to the driving method of human driver. According to the number of preview points, the preview lateral control can be divided into single-point preview and multi-point preview. Lookahead lateral error of a single preview point can be calculated by lookahead distance, current lateral error and yaw angle error. Literatures [18] and [19] assume that speed and front wheel steering angle of vehicle is constant. Based on the vehicle kinematic model, the corresponding reference point is found on the desired path through the lookahead distance and current position. Then, the driving path from the current position to the corresponding reference point is assumed to be an arc, and the front wheel steering angle can be calculated. This method is easy to implement and widely used at low speed scenarios [19]. Literature [20] is based on the kinematics model and combines with the control methods of literatures [14], [18] and [19]. In fact, literature [20] combines the two control methods of non-preview and single-point preview in a weighted superposition way. However, when the vehicle is in the high speed and the road curvature is large, this method which ignores the vehicle dynamics characteristics will produce a large position and posture error, especially the yaw angle error. For this reason, it is a developing trend to consider vehicle lateral dynamics characteristic in the lateral controller design process. The linear lateral dynamics model has been used in many literatures, such as [21, 24, 27] and [32]. Literature [21] rewrites the linear lateral dynamics model into an error model, and introduces the concept of virtual force, which means that the control effect of front wheel steering angle is equivalent to the effect of virtual force applied on the vehicle. The feedback lookahead lateral error is regarded as the control variable of the virtual force, and the damping coefficients of the controller are introduced to obtain the virtual force by designing the PD controller. Under critical conditions, the linear tire force model is no longer feasible and the nonlinear characteristics of tire force need to be considered. In literatures [22] and [23], the Brush tire force model is adopted to describe the tire lateral force. Literatures [22] and [23] adopt feedforward and feedback control structure to design the controller. The feedforward controller considers the nonlinear characteristics of tire force. Meanwhile, the yaw rate and lateral acceleration remain unchanged during steady-state steering. Therefore, the steady-state expression of vehicle lateral movement can be obtained from the bicycle model. Literatures [22] and [23] point out that when the vehicle’s side slip angle is tangent to the desired path, the lateral error can be minimized. The analysis results in literatures [22] and [23] show that the introduction of side slip angle information will reduce the stability of lateral control. In response, literatures [22] and [23] use the predicted stable side slip angle, which is estimated by the predicted rear wheel side slip angle, to replace the actual side slip angle. In order to simplify the expression of lookahead lateral error, the literature [24] defines the center of percussion (COP)’s lateral position error and the gravity center’s

678

T. Fu et al.

posture error as the state variable of system, and build error equation around the above state error. In additional, literature [24] designs a feed-forward controller to eliminate the influence of path curvature. Literature [25] studies the path tracking control method for the vehicle passing through the curve path at high speed. In order to implement the high-speed path tracking successfully, the control strategy given in literature [25] is to make fully use of tire friction force by controlling the maximum side slip angle of the front axle tire and longitudinal velocity. Literature [25] analyzes the influence of tire friction estimation on steering, and presents the algorithm of the maximum front tire side slip angle, the desired speed planning method and the longitudinal friction control method for realizing speed tracking. Literature [26] focuses on the coordinated control method of vehicle steering and braking under the scenario of emergency obstacle avoidance. The dynamics equations with the vehicle longitudinal velocity, lateral velocity and yaw rate as the state variables, and the braking pressure, steering angle as the control variables are given, and the unmodeled dynamics and parameter errors are regarded as uncertain disturbances. The choice of the preview point depends on the speed and the curvature of the road, which has a great influence on the lateral control performance. Compared with singlepoint preview method, multi-point preview method is not easily to be affected by the change of road curvature. The multi-point preview method can adjust the steering angle according to the lateral errors of more than one lookahead preview points, which can reduce the fluctuation of steering angle. Multi-point preview method is the main research direction of lateral control in recent years. The model predictive control has the same basic idea and target with the multi-point preview lateral control. In recent years, model predictive control has been extensively studied in the multi-point preview lateral control [27–34]. Literature [27] gives a lateral control method based on the above MPC for the linear model without considering the change of vehicle speed in the steering process. In contrast, literatures [28] and [29] considers the change of vehicle’s speed in the steering process, adds longitudinal vehicle speed as the state variable in the dynamics model, obtains the linear model by using the linearization method of working point, then considers the constraint of steering angle and the rate of change of steering angle, and adopts the MPC optimization method to design the lateral controller. Similar to literatures [28] and [29], literature [30] also considers the change of longitudinal velocity and longitudinal position, and establishes the nonlinear model including longitudinal velocity, lateral velocity, yaw angle, yaw rate, and longitudinal position state variables. The research idea in literature [31] is similar to that in literature [30], but the difference is that the former conducts Taylor expansion at the working point, obtains the linearized model, and designs the model predictive controller based on the linearized model. Literature [32] presents a hierarchical control strategy with a double-layer predictive controller. The upper layer adopts the kinematics model. A quadratic performance index is defined, and the optimal solution of steering angle is obtained through optimization solution. Then the desired yaw rate and side slip angle are obtained from the optimal solution of steering angle. Literature [32] further designs the lower layer MPC

Overview of Longitudinal and Lateral Control

679

controller based on the two-degree-of-freedom vehicle dynamics model, so as to track the desired value of the actual vehicle side slip angle and yaw rate. Literature [32] gives the simulation results of high-speed and low-speed path tracking through right-angle corners, but the real car test is conducted at low speed. Literature [33] firstly establishes a dynamics model with longitudinal velocity, lateral velocity, yaw rate and longitudinal and lateral position as state variables and longitudinal and lateral tire forces of tires as control variables. Then the tire force is expressed by the magic formula (Pacejka), and the model is linearized at the working point at each sampling time, and the linear model is obtained. Literature [33] assumes that the model remains unchanged in the prediction horizon, and the model predictive control is used to calculate the optimal steering angle. Based on bicycle model and Brush tire force model, literature [34] establishes the dynamics relationship between side slip angle, yaw rate, yaw angle, longitudinal and lateral positions and lateral force of front and rear tires. By linearizing the lateral force of the rear tire, a linearized model with the side slip angle, yaw rate, yaw angle, longitudinal and lateral positions as the state variables and the former tire lateral force as the control variables is obtained. Different from other literatures mentioned above, literature [34] adopt different sampling periods for discretization and model prediction. In detail, discretization through small sampling period can reduce model precision loss, while model prediction through large sampling periods can obtain a longer prediction horizon. Literature [34] discusses the range of side slip angle and yaw rate to ensure the safety of vehicles, and presents the MPC control method of the front tire lateral force with constraints of the maximum front tire side force and change rate, side slip angle and yaw rate. The above literatures focus on the research of path tracking control method, but all assume that the vehicle’s motion ability can meet the requirements of path tracking. In fact, if the path and speed planning is not suitable, this method is not able to meet the needs of path tracking. Therefore, literature [35], based on the 6-DOF rigid body vehicle model, discusses the optimal trajectory planning method that can be used to pass a path in the shortest time. Literature [35] considers the influence of load transfer caused by longitudinal and lateral motion and the constraints of steering angle, change rate, braking and driving force, and obtains the optimal trajectory through optimization solution.

4 Conclusion In the discussion of longitudinal control, the influence of slip rate in longitudinal control usually be ignored. However, when the speed is too high, the influence of tire slip rate cannot be ignored. In this case, methods given in the existing literatures may be invalid. At the same time, in longitudinal control, the discussions of actuator model focus on powertrain, while braking system model is rarely discussed, and nonlinear characteristics of the actuator are often ignored. For lateral control, the existing literatures mainly study the methods about preview control. This is because the non-preview control method is likely to cause the fluctuation of steering angle when the vehicle is following a path with large curvature.

680

T. Fu et al.

However, few literatures have discussed the selection of lookahead distance or the number of the preview points. It is feasible to ignore the coupling of longitudinal and lateral dynamics to achieve a high precision tracking of speed and path under general conditions. However, when the vehicle is running under critical conditions, both the slip rate and the side slip angle will have an effect on the longitudinal and lateral motions. Therefore, it is obviously that the control method without considering the coupling of longitudinal and lateral dynamics has limitations. How to deal with longitudinal and lateral coupling of the vehicle dynamics model will be the focus in future research. Acknowledgment. This work was supported by National Natural Science Foundation of China (NO. 61790562).

References 1. Bai M, Xiong L, Fu Z, Zhang R (2017) Speed tracking control for all-terrain vehicle considering road slope and saturation constraint of actuator. SAE Technical Paper Series, 1. https://doi.org/10.4271/2017-01-1953 2. Van Aalst S, Boulkroune B, Dixit S, Grubmüller S, De Smet J, Sannen K (2017) Comprehensive energy management – eco routing & velocity profiles. https://doi.org/10. 1007/978-3-319-53165-6 3. Boulkroune B, Van Aalst S, Lehaen K, De Smet J (2017) Observer-based controller with integral action for longitudinal vehicle speed control. In: Proceedings of IEEE intelligent vehicles symposium (IV), pp 322–327. https://doi.org/10.1109/IVS.2017.7995739 4. Filho CM, Wolf DF, Grassi V, Osorio FS (2014) Longitudinal and lateral control for autonomous ground vehicles. In: Proceedings of IEEE intelligent vehicles symposium (IV), pp 588–593. https://doi.org/10.1109/IVS.2014.6856431 5. Matute JA, Marcano M, Zubizarreta A, Perez J (2018) Longitudinal model predictive control with comfortable speed planner. In: 18th IEEE international conference on autonomous robot systems and competitions, pp 60–64. https://doi.org/10.1109/ICARSC.2018.8374161 6. Zhu M, Chen H, Xiong G (2017) A model predictive speed tracking control approach for autonomous ground vehicles. Mech Syst Signal Process 87:138–152. https://doi.org/10. 1016/j.ymssp.2016.03.003 7. Xu S, Peng H, Song Z, Chen K, Tang Y (2018) Accurate and smooth speed control for an autonomous vehicle. In: Proceedings of IEEE intelligent vehicles symposium (IV), June 2018, pp 1976–1982. https://doi.org/10.1109/IVS.2018.8500519 8. Dias JEA, Pereira GAS, Palhares RM (2015) Longitudinal model identification and velocity control of an autonomous car. IEEE Trans Intell Transp Syst 16(2):776–786. https://doi.org/ 10.1109/TITS.2014.2341491 9. Xu L, Wang Y, Sun H, Xin J, Zheng N (2014) Design and implementation of driving control system for autonomous vehicle. In: 17th IEEE international conference on intelligent transportation systems, pp 22–28. https://doi.org/10.1109/ITSC.2014.6957660 10. Xu L, Wang Y, Sun H, Xin J, Zheng N (2016) Integrated longitudinal and lateral control for Kuafu-II autonomous vehicle. IEEE Trans Intell Transp Syst 17(7):2032–2041. https://doi. org/10.1109/TITS.2015.2498170

Overview of Longitudinal and Lateral Control

681

11. Raffin A, Taragna M, Giorelli M (2017) Adaptive longitudinal control of an autonomous vehicle with an approximate knowledge of its parameters. In: Workshop proceedings of 11th international workshop on robot motion and control, RoMoCo 2017, pp 1–6. https://doi.org/ 10.1109/RoMoCo.2017.8003885 12. Gao F, Li XP, Ming GQ (2014) Adaptive speed control under vehicle and road uncertainties using multiple model approach. In: Proceedings of the American control conference, pp 897–902. https://doi.org/10.1109/ACC.2014.6858598 13. Kim H, Kim D, Shu I, Yi K (2016) Time-varying parameter adaptive vehicle speed control. IEEE Trans Veh Technol 65(2):581–588. https://doi.org/10.1109/TVT.2015.2402756 14. Hoffmann GM, Tomlin CJ, Montemerlo M, Thrun S (2007) Autonomous automobile trajectory tracking for off-road driving: controller design, experimental validation and racing. In: Proceedings of the American control conference, pp 2296–2301. https://doi.org/10.1109/ ACC.2007.4282788 15. Kranz T, Hahn S, Zindler K (2016) Nonlinear lateral vehicle control in combined emergency steering and braking maneuvers. In: Proceedings of IEEE intelligent vehicles symposium (IV), August 2016, pp 603–610. https://doi.org/10.1109/IVS.2016.7535449 16. Park H, Gerdes JC (2015) Optimal tire force allocation for trajectory tracking with an overactuated vehicle. In: Proceedings of IEEE intelligent vehicles symposium (IV), August 2015, pp 1032–1037. https://doi.org/10.1109/IVS.2015.7225820 17. Yu Z, Wang J (2017) Automatic vehicle trajectory tracking control with self-calibration of nonlinear tire force function. In: Proceedings of the American control conference, pp 985– 990. https://doi.org/10.23919/ACC.2017.7963081 18. Park JB, Bae SH, Koo BS, Kim JH (2014) When path tracking using look-ahead distance about the lateral error method and the velocity change method tracking comparison. In: International conference on control, automation and systems, pp 1643–1647. https://doi.org/ 10.1109/ICCAS.2014.6987822 19. Park MW, Lee SW, Han WY (2014) Development of lateral control system for autonomous vehicle based on adaptive pure pursuit algorithm. In: International conference on control, automation and systems, pp 1443–1447. https://doi.org/10.1109/ICCAS.2014.6987787 20. Cibooglu M, Karapinar U, Soylemez MT (2017) Hybrid controller approach for an autonomous ground vehicle path tracking problem. In: 2017 25th mediterranean conference on control and automation, MED 2017, pp 583–588. https://doi.org/10.1109/MED.2017. 7984180 21. Rossetter EJ, Gerdes JC (2002) A study of lateral vehicle control under a “virtual” force framework. In: AVEC Conference, pp 1–19. http://ddl.stanford.edu/files/ITSjournal_v4.pdf 22. Kapania NR, Gerdes JC (2014) An autonomous lanekeeping system for vehicle path tracking and stability at the limits of handling. In: International symposium on advanced vehicle control, pp 720–725. https://ddl.stanford.edu/sites/g/files/sbiybj9456/f/publications/ 2014_AVEC_Kapania_Autonomous_Lanekeeping.pdf 23. Kapania NR, Gerdes JC (2015) Design of a feedback-feedforward steering controller for accurate path tracking and stability at the limits of handling. Veh Syst Dyn 53(12):1687– 1704. https://doi.org/10.1080/00423114.2015.1055279 24. Kritayakirana K, Gerdes JC (2012) Autonomous vehicle control at the limits of handling. Int J Veh Auton Syst 10(4):271. https://doi.org/10.1504/IJVAS.2012.051270 25. Laurense VA, Goh JY, Gerdes JC (2017) Path-tracking for autonomous vehicles at the limit of friction. In: Proceedings of the American control conference, pp 5586–5591. https://doi. org/10.23919/ACC.2017.7963824 26. Guo J, Hu P, Wang R (2016) Nonlinear coordinated steering and braking control of visionbased autonomous vehicles in emergency obstacle avoidance. IEEE Trans Intell Transp Syst 17(11):3230–3240. https://doi.org/10.1109/TITS.2016.2544791

682

T. Fu et al.

27. Guo H, Shen C, Zhang H, Chen H, Jia R (2018) Simultaneous trajectory planning and tracking using an MPC method for cyber-physical systems: a case study of obstacle avoidance for an intelligent vehicle. IEEE Trans Ind Inform 14(9):4273–4283. https://doi. org/10.1109/TII.2018.2815531 28. Ming T, Deng W, Zhang S, Zhu B (2016) MPC-based trajectory tracking control for intelligent vehicles. SAE Technical Paper Series, vol 1, no 1. https://doi.org/10.4271/201601-0452 29. Yang L, Yue M, Ma T, Hou X (2017) Trajectory tracking control for 4WD vehicles using MPC and adaptive fuzzy control. In: Chinese control conference, CCC, pp 9367–9372. https://doi.org/10.23919/ChiCC.2017.8028850 30. Zhang L, Wu G (2016) Combination of front steering and differential braking control for the path tracking of autonomous vehicle. SAE Technical Paper Series, 1. https://doi.org/10. 4271/2016-01-1627 31. Meiling W, Zhen W, Yi Y, Mengyin F (2017) Model predictive control for UGV trajectory tracking based on dynamic model. In: 2016 IEEE international conference on information and automation, pp 1676–1681. https://doi.org/10.1109/ICInfA.2016.7832087 32. Raffo GV, Gomes GK, Normey-Rico JE, Kelber CR, Becker LB (2009) A predictive controller for autonomous vehicle path tracking. IEEE Trans Intell Transp Syst 10(1):92– 102. https://doi.org/10.1109/TITS.2008.2011697 33. Braghin F, Fuso A, Sabbioni E, De Val N (2015) LTV MPC vehicle model for autonomous driving in limit conditions. SAE Technical Paper Series, vol 1, no 1. https://doi.org/10.4271/ 2015-01-0315 34. Brown M, Funke J, Erlien S, Gerdes JC (2017) Safe driving envelopes for path tracking in autonomous vehicles. Control Eng Pract 61:307–316. https://doi.org/10.1016/j.conengprac. 2016.04.013 35. Rucco A, Notarstefano G, Hauser J (2015) An efficient minimum-time trajectory generation strategy for two-track car vehicles. IEEE Trans Control Syst Technol 23(4):1505–1519. https://doi.org/10.1109/TCST.2014.2377777

The Development of Web Application Front-End of Intelligent Clinic Based on Vue.js Minghang Li1(&), Jianghai Hu2, and Xianwu Lin3 1

3

Commonwealth and Huntington Ave. Corp., Boston, MA 02148, USA [email protected] 2 School of Electrical and Computer Engineering, Purdue University, West Lafayette, IN 47907, USA [email protected] School of Aerospace Engineering, Xiamen University, Fujian 361102, China [email protected]

Abstract. There are many problems in China’s medical system, and the rapid development of intelligent automation and computer network can provide a powerful way to solve these difficult problems. The number of clinics is increasing to decentralize the number of patients in large hospitals through graded diagnosis and treatment. It is urgent to improve the capacity of primary clinics, for this purpose, this fully functional and easy-to-use workbench software is developed for clinic managers and doctors. In this paper, we discussed experiences of web front-end development, in view of the system functional requirements, the lightweight framework Vue.js is selected. The characteristics of MVVM mode, componentization and single page support are emphasized. The implementation method is illustrated with examples, and some test results of system functions are shown. A useful attempt has been made in the development of smart medicine preliminarily. Keywords: Intelligent Clinic

 Front-end  Vue.js

1 Introduction There are many problems in China’s medical system, such as inefficiency, poor quality, high cost and slow growth of doctors. The root causes of these problems are: shortage and uneven development of medical resources; lack of modern means and hierarchical medical system, low medical efficiency; information and knowledge isolation. The rapid development of intelligent automation and computer network can provide a powerful way to solve these difficult problems. The New Generation of Artificial Intelligence Development Plan issued by the State Council in 2017 proposes to develop intelligent medicine and build a safe and convenient intelligent society. In recent years, large hospitals such as Fuzhou General Hospital [1] and Inner Mongolia Autonomous Region People’s Hospital [2] have launched the construction of intelligent digital hospital with electronic health records as the core. At present, the informationization construction of the first-class hospitals is very common, but China is a large population country, if every patients go to large hospitals to see a doctor, it will result in a “three © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 683–690, 2020. https://doi.org/10.1007/978-981-32-9050-1_77

684

M. Li et al.

long and one short” predicament which is widely criticized by the society for a long time: Long waiting time for registration, long waiting time for medical treatment, long queuing time for medicine collection, and short time for doctor’s inquiry. To this end, the state policy encourages more grassroots clinics to achieve graded diagnosis and treatment, disperse patients. However, 90% of primary clinics are still blank in basic informationization. Problems exist in primary clinics, such as crowded environment, backward medical record system, low professional level and disparity of doctors. Therefore, we have introduced advanced international concepts and technologies, including the development of CHAVE TECH Intelligent Clinic Software, drawing on the experience and suggestions of clinical work and online education. This paper only makes a preliminary discussion on the front-end development, introducing system requirements, Vue.js framework features, system implementation and some part of effects respectively.

2 System Requirements As shown in Fig. 1, CHAVE TECH Intelligent Clinic Software is an intelligent information providing web service designed to work for a large number of registered clinic users. The attributes of clinic users include: clinical practitioners (general practitioners, nurses, pharmacists); administrative practitioners (inventory administrators, financial administrators, administrative commissioners); and managerial supervisors (clinic operators, clinic owners). Intelligent information processing of work platform needs four functional modules: system management, electronic medical record, inventory management and financial management.

Front-end Platform for Physician Continuing Education

The 2nd Smart Clinic Front-end Platform

The 1st Smart Clinic Frontend Platform

Administrator

Other users

. . .

Administrator

. . .

CHAVE Technical Service Center

The ith Smart Clinic Frontend Platform

Administrator

Other users

The jth Smart Clinic Frontend Platform

Other users

Front-end platform for patientoriented assisted inquiry

Fig. 1. Basic function sketch map.

Administrator

Other users

The Development of Web Application Front-End of Intelligent Clinic

685

The system management function module is operated by the users who have the administrator’s authority in the clinic, and supports the functions of “adding new users”, “adding clinic roles” and “setting permissions”. The system administrator is the bridge between the affiliated clinic and the intelligent software technology service center, responsible for the examination, authority and file management of the registration applications of all kinds of users in the clinic. The function module of electronic medical record is operated by authorized clinician users, it supports the functions of “health record”, “basic body data”, “new medical record” and “past medical record”. It fully embodies the advanced concept of SOAP medical record process. The inventory management function module is operated by users according to the authorized operation authority, and supports the functions of “Drug Library”, “Purchase Record”, “Local Pharmacy”, “Inventory Items” and “Clinic Prescription”. The function module of financial management is operated by users according to the authorized operation authority, which supports the functions of “pricing”, “revenue”, “expenditure” and “aggregation”. Except for the four basic functional module, the system also provides two valueadded services: the online continuing education service that contains some online courses about general practitioner, and the intelligent assistant inquiry service through which users can search and obtain medical knowledges without registration.

3 Vue.js Characteristics According to the system requirements, the lightweight and efficient front-end componentization scheme Vue.js framework [3, 4], was adopted for the front-end development. Accordingly, the Express framework based on JavaScript language was adopted for the back-end, so the front-end and back-end development could be separated. This paper particularly emphasizes the following three characteristics of Vue.js [5–8]. 3.1

MVVM Pattern

MVVM, Model View ViewModel, is a software architecture pattern that helps to separate user interfaces development from backend logic development. Model is the data transmitted in the back end; view refers to the content displayed on the page; viewmodel is the bridge connecting model and view. Through data binding between View and Model, the change of data can be automatically mapped to the update of view, the DOM operation can be reduced, and the communication efficiency between view layer and data layer can be improved. 3.2

Componentization

In the front-end development with Vue.js, a page is composed of components. Each component consists of template, script and style. Template uses HTML5 to declare the mapping relationship between the data and the DOM. In script, the required data initial

686

M. Li et al.

values, data’s computed attributes and logical relationships are defined using JavaScript. In style, we use CSS3 to modify the styles of elements. In different pages, if we need to use the same component, we can import it easily. Component feature largely reduces code and files in development, makes file structure clearer, and facilitates reuse and maintenance of codes. 3.3

Single Page

In the past, most of the traditional applications are multi-page applications. Every page Jump requires an HTTP request. When the network is slow, it is easy to get stuck. Single page application will not create new HTML requests when switching pages. The principle is that when JS notices URL changes, it will dynamically switch pages. In Vue.js, we use the official plug-in vue-router to switch between paths.

4 System Implementation and Partial Results 4.1

Project Structure

The project initially needs to install the vue-cli scaffolding, which provides most of the configuration environments Vue needed. Figure 2 shows the src folder, which stores project source code and some resource files, in which assets stores images used locally, JSON data files, components store the components used in the page, mixins store some functions shared by multiple components, pages store all display pages, routers store vue-router logic, stores store vuex logic, styles store some CSS files shared by components, App.vue is the page entry file, main.js is the program entry file, which initialize Vue instances and use the required plug-ins to load various common components.

Fig. 2. Files structure.

4.2

Fig. 3. Patient vuex module in store

Example of Implementation

This section illustrates how to apply vuex to synchronize and efficiently update the same state variable in multiple components by taking the patient information component in the electronic medical record as an example. Vuex is a state management mode for Vue. js applications. It uses centralized storage to manage the state of all components of the application, ensuring that the state changes in a predictable [9]. There are four parts in a

The Development of Web Application Front-End of Intelligent Clinic

687

vuex store: state, getters, mutations, actions. In this example, state and getters are applied. The data that drives the application is defined in state. Whenever the variables in the state change, the computational attributes are recalculated and the associated DOM is triggered to be updated. Getters can be regarded as computational attributes, filtering and counting the data state. For example, in Fig. 3, the PatientBasicInfo array in state defines the data state in PatientBasicInfo component, and getPatient is defined in getters to filter and calculate this state. As shown in Figs. 4 and 5, the state and its compute attribute that the component need to use can be mapped from getters in store with MapGetters function in vuex. Through v-model, data state and user input values are bound bidirectionally.

Fig. 4. PatientBasicInfo component in EHR

Fig. 5. PatientBasicInfo component in vital

The effect of the interfaces is shown in Figs. 6 and 7. When the user enters patient information in the EHR, the patient information in the vital will be updated accordingly.

Fig. 6. Patient information in health file

4.3

Fig. 7. Patient information in vital

Partial Results of Functional Test

Once this system is officially released, anyone can access it through the url, click on the “Family Doctor Online Continuing Education” on the page header, enter the interface of the online continuing education function (Fig. 8). We plan to provide courses material for clinical courses including cardiovascular diseases, pediatric medicine, female health, male health, elderly health; non-clinical courses including how to become a family doctor, counseling in medical practice, patient health management and quality of care, how to establish the trust relationship between family doctors and patients, etc. Clicking on the “intelligent decision support” on the page header, anyone can search for standard clinical pathways, disease information, drug information (Fig. 9).

688

M. Li et al.

Fig. 8. Online continuing education page.

Fig. 9. Intelligent decision support page.

Click on the “Family Doctor Work Platform” on the page header to enter the Intelligent Clinic Work Platform interface. Software backend server can provide intelligent information processing technical services for many clinics.

Fig. 10. Work platform home page.

After registering, user can enter “Electronic Medical Record”, “Inventory Management” and “Financial Management” and “System Management” four functional modules according to their role (Fig. 10). Figure 11 shows part of the test interface of the “new medical record” operation in the “electronic medical record” functional module. The system strictly adopts the SOAP medical record writing format recommended by the American Association of Clinical Pharmacists. It records all the necessary information of patients in a standard and orderly way. It is convenient for medical professionals to collect relevant information of patients and infer what problems patients have. S (Subjective): Subjective data, including patient’s complaint, medical history, drug allergy history, adverse drug reactions history, past medical history, etc. O (Objective): objective data, including

The Development of Web Application Front-End of Intelligent Clinic

689

patient’s vital signs, clinical biochemical test values, imaging results, blood, urine and fecal culture results, blood drug concentration monitoring values; A (Assessment): clinical diagnosis, analysis and evaluation of drug treatment process; P (Plan): treatment plan, including the selection of specific drug name, dosage, route of administration, time interval, course of treatment and relevant recommendations of drug guidance.

Fig. 11. Electronic medical records interface.

Figure 12 shows part of the test interface for the purchase record of drugs, consumables or other items in the “inventory management” function.

Fig. 12. Inventory management interface.

Fig. 13. Financial management interface.

Figure 13 shows part of the test interface for “pricing” and “aggregation” operations in the “financial management” function. By running intelligent information processing algorithm, the system achieves the orderly transmission of related information among different functional modules, such as when a clinician prescribes a patient, the information of related drugs in the inventory can automatically jump out; when the inventory manager carries out pricing

690

M. Li et al.

and drug delivery operations, the information of related patients’ clinic prescriptions will automatically jump out; and the results of financial management operations are closely related to electronic medical record and inventory management.

5 Conclusion This paper introduces some experiences and results of the front-end development process of CHAVE TECH Intelligent Clinic Software Version 2.0. Because of the lightweight Vue.js framework, the features of MVVM mode, componentization and single page support are fully utilized, it greatly saves the development cost and improves the efficiency. At present, the software version 2.0 of CHAVE TECH Intelligent Clinic has been tried out by an off-line team of Slip Family Doctor (SLP) and several clinics in China, and the response is very good. IBM believes that the characteristics of intelligent medicine should include interconnection, collaboration, prevention, popularization, innovation, reliability, controllability, safety and stability. In the future, it will be further optimized according to the trial situation, and more fully embody the characteristics of intelligent medical. Acknowledgment. This work was supported by National Natural Science Foundation of China Nos. 61733017. Thanks to partner Xiaoyue Wang for participating in some of the functions of front-end rendering. Sean Liu leads the project team and is responsible for back-end development, front-end and back-end interaction and testing.

References 1. Wang H, Chen J, Xian R (2010) Building intelligent digital hospital taking EMR as the core. China Digit Med 5(7):14–16 (in Chinese) 2. He L (2013) Construction of digital hospital taking electronic medical records as core. ISUANJI YU XIANDAIHUA (2):157–158,162 (in Chinese) 3. Vue.js. https://vuejs.org/. Accessed 10 Apr 2019 4. Evan Y (2015) Vue.js: a lightweight and efficient front-end componentization scheme. Programmer (8A) (in Chinese) 5. Evan Y (2013) Front end-open source front end framework. Programmer (3):24–29 (in Chinese) 6. JSON: Introducing JSON. http://www.json.org/. Accessed 10 Apr 2019 7. Catanzaiti P (2015) JavaScript Beyond the Web in 2015. https://www.sitepoint.com/ javascript-beyond-the-web-in-2015/. Accessed 10 Apr 2019 8. Smith J (2009) WPF apps with the model-view-viewmodel design pattern. MSDN Magazine 9. What is Vuex: https://vuex.vuejs.org/

Topic Detection Based on Semantics, Time and Social Relationship Pengchao Cheng1, Junping Du1(&), Feifei Kou1, Zhe Xue1, and Peihua Chen2 1

Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia, School of Computer Science, Beijing University of Posts and Telecommunications, Beijing 100876, China [email protected] 2 Xiaoi Research, Shanghai Xiaoi Robot Technology Co., Ltd., Shanghai 201803, China

Abstract. Short text sparsity, oral language, and polysemy are the main problems when dealing with social network data, which make the traditional methods hard to obtain the true meaning of social network data. Due to the above issues, topic detection for social network data is not that easy. And to solve the above problems, we propose an original Clustering Algorithm based on Semantics, Time, and Social relationship (CASTS) for topic detection. Firstly, to overcome short text sparsity and polysemy problems, the CASTS leverages the Bidirectional Encoder Representations from Transformers (BERT), which can pre-train on large-scale social network short text data to obtain concise text representation with rich semantics. Secondly, by combining the short text representation, time, and social relationship, the CASTS can efficiently detect topics. Finally, we conduct experiments on Weibo dataset to verify the correctness and effectiveness of CASTS. Keywords: Topic detection

 Semantics  Time  Social relationship

1 Introduction With the development of data technology, the amount of available data has increased substantially in various fields. As a new social network media, Weibo has gradually become a vital source for people to obtain information. Due to the brief content of Weibo and the ability to publish Weibo information on various terminals, a large amount of Weibo data can be generated in a short period on the Weibo platform [1]. However, the content of Weibo is diverse and changing rapidly. It is difficult to manually extract topics that users interest from a large amount of microblog data and analyze the extracted topics [2]. Therefore, automatically detecting topics and tracking the evolution of the topic is very imperative for social media analysis. In recent decades, there is a lot of research attention on topic detection. Topic detection aims to discover hot topics and exploit the evolving trends in the streaming text on social media. Several models have been proposed for topic detection in social media. To find Weibo topics, Ye et al. [3] put forward a novel topic model and named it © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 691–698, 2020. https://doi.org/10.1007/978-981-32-9050-1_78

692

P. Cheng et al.

for Microblog Features Latent Dirichlet Allocation (MF-LDA). By integrating five features of the Weibo, the MF-LDA has higher topic detecting ability than LDA. Feng et al. [4] improved the single-pass algorithm that first clustered the microblog texts which had rich topic information to get initial clustering centers, and then clustered other texts to improve the clustering accuracy for topic detection. However, existing topic detection models ignored the social network short text inherent sparsity, oral language, and polysemy, so that they only learned the shallow meaning of the social network data. In this paper, an original Clustering Algorithm based on Semantics, Time, and Social relationship (CASTS) for topic detection is proposed. It aims to deal with the semantic sparsity, oral language, and polysemy problems of social network short text and can accurately detect the related topics. First, the CASTS leverages the BERT [5] which is a language model pre-trained on large-scale social network short text data to obtain short text representation with rich semantics. Second, by combining the short text representation, time, and social relationship, the CASTS is capable of detecting topics. Finally, we evaluate the proposed CASTS on real-world datasets which are collected from Sina Weibo.

2 Related Works The existing topic detection methods mainly focuses on text-based clustering algorithm and probability-based topic model. In traditional clustering algorithms, a text often is represented by the vector space model (VSM) [6]. The method is rarely used in topic detection, due to it ignores the semantic relationship between words. Now the mainstream methods are based on probability-based topic models. The LDA model is representative of the probability-based topic model. Li et al. [7] used the LDA model to find topics and traced topics and pointed out that the LDA can solve the semantic loss problem to a certain extent. Chen et al. [8] put forward an FSC-LDA model which combines the feature selection methods and document clustering algorithms. It identifies adaptively the number of microblog’s topics and makes the result more stable. In the last ten years, with the rapid development of information retrieval and text representation, experts and scholars are aware of the sparse problem of LDA topic model for short text modeling. Li et al. [9] put forward the Bi-term Topic Model (BTM) of the Chinese short-text double-term theme model, which improves the modeling defect of the model of the LDA. Further, to deal with the semantic sparsity of the word, Google published Word2Vec, which is a word embedding model and uses deep learning to train words. For instance, someone developed an algorithm which transfer words embedding to document embedding and detect key topics from Twitter. The methods mentioned above only take into account the probabilistic modeling or the simple use of word vectors for topic detection on the short texts of social networks. They ignore the semantic sparsity and polysemy of the texts of social networks and don’t make full use of the relationship conditions between the texts of social networks.

Topic Detection Based on Semantics, Time and Social Relationship

693

3 The Proposed Clustering Algorithm Based on Semantics, Time and Social Relationship (CASTS) The framework of the CASTS is shown in Fig. 1. The algorithm is made up of two parts, including the acquisition of semantic representation, and the clustering process based on semantics, time, and social relationship. Specifically, the acquisition of semantic representation is framed in a way that allows it to learn features with rich semantics from the short texts. The clustering process based on semantics, time, and social relationship is the heart of the CASTS algorithm; it can get more accurate clustering results by adopting social connection and time factors into the clustering process. Short text

The Acquisition of Semantic Representation Cluster-1

Time

Social Relation

Pre-training BERT

Weibo Representation

The Clustering Process based on Semantics, Time and Social Relationship Semantic Social Relation Time slice Similarity x11, x12

Social Network Data

Cluster-2

Cluster-n

xn1, xn2

Fig. 1. The framework of CASTS.

3.1

The Acquisition of Semantic Representation

There can be many meaningless words or symbols in the content of Weibo corpus, so to improve the efficiency and precision of topic detection, pre-processing operations are needed, which will be introduced in the experiment section. The BERT is carried out after pre-processing on Weibo corpus. There are two training tasks for the BERT language model: Masked LM and Next Sentence Prediction. The BERT adopts the method of multi-task learning for training, which can acquire magnetic word vectors or sentence vectors. The vector representation of Weibo is carried out by using the pre-trained BERT model. The data is input into the BERT model, and the class vector of the model is expressed as the vector of the Weibo text. D = {d1, d2, d3,…, dn}, D is the set of vectors representation for Weibo, di is the class vector of the model and also the vector representation of the i-th Weibo. 3.2

The Clustering Process Based on Semantics, Time and Social Relationship

The original single-pass algorithm can automatically cluster topics without multiple hyper-parameter settings, but it only uses a single similarity calculation method without

694

P. Cheng et al.

considering the structural characteristics and direct potential relationship of Weibo. It is difficult to well obtain the similarity between two Weibo by the traditional means. We improve the similarity calculation method of the clustering algorithm, which selects the time of publishing Weibo and the forwarding-relation between Weibo as the essential factors for the similarity comparison. Define the distance of text di and dj as follows: n P

dil djl Sðdi ; dj Þ¼ sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi þ 0:5a n n P P 0 dil2  djl2 þ et l¼1

l¼1

ð1Þ

l¼1

where dil is the l-th weight of the text representation di, djl is the l-th weight of the text representation dj, the dimension of text feature representation is n, t0 is time interval, e is natural constant, a is whether there is a forwarding relationship between di and dj, a is equal to 1 if it matters, or a is equal to 0. 3.3

Topic Detection Based on CASTS

The CASTS is used for topic detection on Weibo, and it can get more accurate clustering results by adopting social relationship and time factors into the clustering process. The overall training procedure is presented in Algorithm 1. Algorithm 1 CASTS Procedure Input: Weibo dataset D={d1,d2,d3,...,dn}, Weibo publish time t, Forwarding relation matrix between Weibo data M, similarity threshold U. Output: A list of topics. Step 1: Determine whether d is the first Weibo, if so, execute next, otherwise turn to Step 3. Step 2: A new topic is created and Weibo d is added to the new topic, go to Step 1. Step 3: Determine whether there is a forwarding relationship between the current Weibo text d and the Weibo in the topic Ci. If so, the current Weibo is classified as the topic Ci, and adjust the centroid vector of the topic; if not, go to Step 4. Step 4: Pre-process the Weibo text d and use the pre-trained BERT for text vectorization. Step 5: Calculate similarity values between the centre representations of existing topic {C1, C2,., Ch} and the representation of text d, sim(d, Ci), and record the maximum similarity max (Sim (d, Ci) and the corresponding topic Ci. Step 6: If the maximum similarity max(Sim (d, Ci) is greater than the threshold U, then the text d is clustered into the topic Ci, otherwise go to Step 2. Step 7: until all data has been grouped into categories and return topic cluster.

Topic Detection Based on Semantics, Time and Social Relationship

695

4 Experiments 4.1

Experimental Dataset and Preprocessing

There is no standard data set for topic detection about Weibo, and the corpus used in this experiment is composed of two parts: more than 100,000 Weibo data for the entire year of 2010; three hot topics raised by Sina Weibo in December 2011 and manually tagged. After preprocessing more than 100,000 Weibo data, the unsupervised pretraining operation is carried out by using the BERT. Three manually tagged topics are used for topic detection experiments; the specific annotated corpus is shown in Table 1. Table 1. Experimental corpus Topic ID Topic name 1 Anti-corruption 2 Bullying chengguan 3 Helping the old man was awarded 70,000 yuan

Numbers of Weibo 9562 8857 8103

Pretreatment includes removal of special symbols, stopwords, and segmentation. The Crawled Weibo data contain a lot of symbols and words that do not make sense to the content. While pretreatment, Weibo with less than five words will be deleted. 4.2

Evaluation Metric

According to the evaluation criterion made by TDT meeting for topic detection task, the performance of the detection task is measure by False Alarms (FA) and Miss rate (MS). Besides, the precision, recall, and their combined F1-Measure in information retrieval are also used to measure the performance of detection models. The relevant formulas are as follows: FA ¼ P¼

FP FN ; MS ¼ FP þ TN TP þ FN

ð2Þ

TP TP ;R ¼ TP þ FP TP þ FN

ð3Þ

F1  Measure ¼

2PR PþR

ð4Þ

where TP is that the prediction is positive and correct, FP is that the prediction is positive but wrong, FN is that the prediction is negative but wrong, TN is that the prediction is negative and correct, FA is the false alarms, MS is the misses, P is the precision, R is the recall.

696

4.3

P. Cheng et al.

Performance Analysis

Topic Detection Experiment Results. To verify the effectiveness of the CASTS and evaluate the performance of the CASTS, we will conduct four comparative experiments. In this paper, we extract the clustering part in the CASTS algorithm and denote it as Temporal and Social-Relational Clustering Algorithm (TSRCA). A two-part combination of the BERT and the BTM, single-pass, and TSRCA, are used in experiments. At the same time, the performance of the four methods under different thresholds are compared, the average performance of three topics is used as the performance index of each algorithm. Generally, FA is the prediction error rate of the algorithm, and the smaller it is, the better the algorithm can cluster correct tweets into corresponding topics. As can be seen from Fig. 2, the CASTS algorithm is much lower in FA than the other algorithms. With the increase of threshold, the FA decreases gradually. It shows that the larger the threshold value, the better the algorithm can distinguish the noise which is not belong to the topic.

FA

BTM + Single-pass BTM + TSRCA BERT + Single-pass CASTS

Threshold

Fig. 2. Changes of FA in four methods under different thresholds.

MS

BTM + Single-pass BTM + TSRCA BERT + Single-pass CASTS

Threshold

Fig. 3. Changes of MS in four methods under different thresholds.

Topic Detection Based on Semantics, Time and Social Relationship

697

As can be seen from Fig. 3, under different thresholds, the MS of the CASTS algorithm is lower than that of the other algorithms. With the increase of threshold, the MS of the algorithm decreases gradually, indicating that the larger the threshold value, the more fine-grained topic can be detected by the algorithm. Tables 2, 3, and 4 show the recall, precision, and F1-measure of the four algorithms at different thresholds. From Table 2, the precision of the CASTS under different thresholds is higher than that of the other algorithms, and it is up to 14.84% higher than that of the BTM + Single-pass under some thresholds. As for Table 3, the recall of the CASTS under different thresholds is higher than that of the other three algorithms, and the recall of the CASTS is 2% higher than that of the BTM + TSRCA algorithm under some thresholds. Table 4 is based on the calculation of formula (4). By combining precision and recall, it can be concluded that the CASTS algorithm performs superior to the other algorithms on the whole under different thresholds. Table 2. The precision of the four methods under different thresholds. BTM + Single-pass BTM + TSRCA BERT + Single-pass CASTS

0.65 0.612 0.641 0.712 0.784

0.70 0.654 0.676 0.734 0.797

0.75 0.693 0.732 0.755 0.805

0.80 0.721 0.750 0.762 0.824

0.85 0.745 0.767 0.778 0.846

0.90 0.762 0.784 0.791 0.859

0.95 0.781 0.796 0.811 0.889

Table 3. The recall of the four methods under different thresholds. BTM + Single-pass BTM + TSRCA BERT + Single-pass CASTS

0.65 0.851 0.849 0.861 0.869

0.70 0.859 0.855 0.866 0.873

0.75 0.864 0.864 0.872 0.876

0.80 0.871 0.873 0.876 0.883

0.85 0.875 0.877 0.880 0.887

0.90 0.879 0.881 0.884 0.891

0.95 0.884 0.887 0.901 0.914

Table 4. The F1-measure of the four methods under different thresholds. BTM + Single-pass BTM + TSRCA BERT + Single-pass CASTS

0.65 0.712 0.730 0.779 0.824

0.70 0.743 0.755 0.795 0.833

0.75 0.771 0.793 0.809 0.839

0.80 0.789 0.807 0.815 0.852

0.85 0.815 0.818 0.826 0.866

0.90 0.817 0.830 0.835 0.875

0.95 0.830 0.839 0.857 0.901

According to the above comparison results, we can see that the CASTS has a significant improvement compared with the others in terms of each index, especially compared with the BTM + Single-pass algorithm, some of the indexes have increased by nearly 15%. There are two possible reasons for performance improvement. One is that BERT represents the contextual semantics of Weibo text fusion. The other is that the proposed clustering algorithm leverages time factor and forwarding relation, which makes up the deficiency of traditional topic detection.

698

P. Cheng et al.

5 Conclusion and Future Work In this paper, we develop an original Clustering Algorithm based on Semantics, Time and Social relationship (CASTS) for topic detection. Firstly, to overcome short text sparsity and polysemy problems, the CASTS leverages the Bidirectional Encoder Representations from Transformers (BERT), which can pre-train on large-scale social network short text data to obtain short text representation with rich semantics. Secondly, by combining the short text representation, time and social relationship, the CASTS is capable of detecting topics. The experiment results show that the CASTS is very useful for topic detection. In the future, we will analyze topics in specific domains (e.g., science and technology), so as to provide better services for scientists and technicians. Acknowledgement. This work was supported by the National Natural Science Foundation of China (NSFC) under Grant (No.61532006, No.61772083, No.61802028, No.61877006).

References 1. Ma T, Zhao Y, Zhou H, Tian Y et al (2019) Natural disaster topic extraction in sina microblogging based on graph analysis. Expert Syst Appl 115:346–355 2. Zheng W, Ge B, Wang C (2019) Building a TIN-LDA model for mining microblog users’ interest. IEEE Access 7:21795–21806 3. Ye Y, Du Y, Fu X (2016) Hot topic extraction based on Chinese microblog’s features topic model. In: IEEE International Conference on Cloud Computing and Big Data Analysis, pp 348–353 4. Feng J, Ding Y, Luo X (2017) Hot topic identification from micro-blog based on improved single-pass algorithm. J Comput Meth in Sci Eng 17(4):791–798 5. Devlin J, Chang M et al (2018) BERT: pre-training of deep bidirectional transformers for language understanding. CoRR abs/1810.04805 6. Lu Y, Zhang P, Liu J et al (2013) Health-related hot topic detection in online communities using text clustering. PLoS ONE 8(2):e56221 7. Li C, Feng S et al (2019) Mining dynamics of research topics based on the combined LDA and WordNet. IEEE Access 7:6386–6399 8. Chen Y, Li W, Guo W, et al (2015) Popular topic detection in Chinese micro-blog based on the modified LDA model. In: IEEE WISA, pp 37–42 9. Li W, Feng Y, Li D et al (2016) Micro-blog topic detection method based on BTM topic model and K-means clustering algorithm. Autom Control Comput Sci 50:271

Research on Metadata System and Model of Military Logistics Information Resources Jun Wang1(&)

, DaRong Ling2, Wenbing Liu1, Siying Hu3, and Fan Jiang4

1

Department of Defense Economics, Army Logistics University, Chongqing, China [email protected] 2 Army Logistics University, Chongqing, China 3 Brigade of Graduate, Army Logistics University, Chongqing, China 4 Department of Quartermaster Procurement, Army Logistics University, Chongqing, China

Abstract. Aiming at the problems existing in sharing and exchanging military logistics information resources, this paper firstly expands the core metadata of logistics information resources, constructs the content system of logistics information resources metadata, and displays it based on XML files. Then, the metadata model of logistics information resources is studied, and the mapping rules of logistics information resources metadata to logistics data sources are defined, including the mapping of metadata to relational database and the mapping of metadata to XML files. Finally, the paper puts forward some countermeasures and suggestions for the application of metadata in logistics information resources. Keywords: Metadata

 Military logistics  Information resources

With the rapid development of military logistics information construction, the ability of logistics command has been effectively enhanced, the efficiency of logistics support has been effectively improved, and the level of logistics management has been effectively promoted. However, there are still some outstanding problems such as “insufficient unification, insufficient integration and insufficient extension to the battlefield”. In the construction of military logistics information resources, due to the lack of unified toplevel design and scientific planning, “information island” exists in a large number, data can not be fully shared and exchanged, and information links can not be fully opened. Based on metadata application technology, this paper discusses the metadata system and model construction of military logistics information resources, and lays a foundation for the integration and sharing of logistics information resources.

© Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 699–708, 2020. https://doi.org/10.1007/978-981-32-9050-1_79

700

J. Wang et al.

1 The Core Metadata of Military Logistics Information Resources Metadata is data describing data, which can be used to describe information resources. Core metadata, which is used to describe the basic characteristics of information resources, is an indispensable data item extracted on the basis of metadata. In the field of digital library, metadata registration system is widely used to achieve unified description, analysis and integration of information resources. Government information occupies an absolute proportion of information resources, about 70–80%, and the government is the earliest to carry out research and practice of information resources management. Therefore, the achievements of government information resources management have guiding and reference significance for other industries. Aiming at the problems of “information island” in the construction of government information, Pan [1] analyzed the current directory system architecture of government information resources, proposed the framework of e-government directory service system based on metadata, and discussed the construction and implementation of directory service system and related technologies of directory service system. Aiming at the higher level integration of information resources in semantic interoperability, Wu and others [2] have studied the semantic interoperability of foreign e-government information resources. Referring to the integration of data library information resources, they have constructed the metadata registration system and metamodel operation framework, and have proposed the semantic interoperability model of e-government information resources, including semantic parsing model and integration model, which has been applied to the management of territorial information resources. Li [3] analyzed the problems of government information resources and digital standards, explored the core metadata system of government information resources and the interoperability protocol and interoperability technology of metadata service system under the network environment, and put forward the technical framework model of an integrated egovernment service exchange system which integrates resource sharing, business collaboration and application integration for public services. Metadata is the data used to describe data, and the core metadata of logistics information resources is the metadata needed to describe the basic attributes of logistics information resources. Referring to Dublin Core, the former General Logistics Department promulgated the core metadata standard of the catalogue system of logistics information resources, stipulated the core metadata needed to describe the characteristics of logistics information resources and its representation, and gave the definition and description rules of each core metadata for cataloging, publishing and querying services of logistics information resources catalogue. The core metadata of the logistics information resource describes the logistics information resources from the aspects of information resource content identification, information resource classification, information resource release, etc., including 8 types of mandatory metadata elements, 5 types of optional metadata elements, and 5 Composite metadata elements for a total of 24 individual metadata elements. They are the Resource Identifier, the Resource Name, the Resource Description, the Subject Category Name, the Subject Category Code, and the Business Category Name, Business

Research on Metadata System and Model of Military Logistics Information Resources

701

Category Code, Keyword, Resource Security, Provide Organization, Provide Organization Phone, and the name of the Publish Organization, Publish Organization Phone, Created Date, Issued Date, Valid Date, Expire Date, Modified Date, Right, Online Source, Resource Type, Media Type, Extent, and Medium. At the same time, the standard also stipulates the principles and methods of core metadata extension.

2 Metadata Content System of Military Logistics Information Resources The core metadata standard of logistics information resources provides basic follow for the integration and sharing of logistics information resources. In order to facilitate the information resource managers to manage logistics information resources more conveniently and the users of information resources to obtain the required resources more quickly and accurately, the producers of information resources produce logistics information resources according to the unified standard and it is necessary to expand the core metadata of logistics information resources. Considering the characteristics of military logistics information itself and its use, and in accordance with the expansion rules and methods of core metadata of logistics information resources, the extended metadata content system of logistics information resources includes six parts of information: identification, limit, business, publish, data quality and maintenance. Among them, identification information is the necessary choice of metadata content system of logistics information resources, and can only appear once. The remaining five parts of information are optional. The metadata content system of logistics information resources is shown in Fig. 1.

Fig. 1. Metadata content system of logistics information resources

702

2.1

J. Wang et al.

Identification Information

Identification information is the unique identifier of the logistics information resource. It is the metadata information that is uniformly formulated by the logistics information authority to distinguish different logistics information resources. It mainly includes Citation, Resource Id, Resource Name, Resource Description, Status, Resource Manager, Resource Language, Resource Character Set, Keyword, Resource Type, Provider, Provide Organization, Provide Organization Phone, Created Date. 2.2

Publish Information

Publish information provides the information the user needs to access the logistics information resources. It mainly includes Publisher, Publish Organization, Publish Organization Address, Publish Organization Phone, Digital Transfer Option, Online, Offline, Transfer Size, Format, Format Name, Format Version, Publish Date, Valid Date, Expire Date, Media Type, Extent, Medium, and Medium name. 2.3

Business Information

Business information is descriptive information about logistics services related to logistics services. It mainly includes Business Information, Resource Domain, Business Description, Resource Category, Category Standard, Business Category Name, and Business Category Code, Associated Information, Associated Resource Name, Associated Type, and Initiative Type. 2.4

Limited Information

Limited information [4] is information related to the maintenance of information resources by the logistics information resource manager and the access of the user to the information resources. It mainly includes Constraint, Resource Security, Legal Constraint, Access Constraint, Use Constraint, Security Constraint, and Security Constraint Classification. 2.5

Maintenance Information

Maintenance information [5] is related information describing the updating and maintenance of military logistics information resources. It mainly includes Maintenance and Update Frequency, Maintenance Organization, Maintenance Man, and Modified Date. 2.6

Data Quality Information

Data quality information [6] is information that describes the data quality of a logistics information resources. It mainly includes Lineage, Lineage Description, Original Data Information, Original Data Description, Original Data Created Date, and Original Data Valid Date, Original Data Expire Date, Original Data Format, Original Data Acquisition, Data Process Information.

Research on Metadata System and Model of Military Logistics Information Resources

2.7

703

An Example of Metadata for Logistics Information Resources

The following is an example of the civilian staff database of the military support card system of a certain academy in the Army. The metadata of the personnel database is partially displayed in XML format.

< resCat> < busCatName>Military finance < busCatCode>YC < busCatName>Quartermaster energy < busCatCode>YD < busCatName>Health service < busCatCode>YE < busCatName>Military installation < busCatCode>YG

< aggreInfo> < aggrResInfo>Military personnel database of the military support card system of a certain academy in the Army < assocType>The same data source < initType>Collect

< dataProcInfo> < dataProcDesc>Data preprocessing of military support card < dataProcDate>2018-10-18 < dataProcSoft >The management software of military support card < dataProcOrga>The military support card office of a certain academy in the Army

< dataQualRep> < dataQualMeasName>Completeness < dataQualMeasDes>81.5%

3 Metadata Model of Military Logistics Information Resources 3.1

Definition of Metadata Model for Military Logistics Information Resources

The Metadata Model of Logistics Information Resources is defined as a five-tuple model:

704

J. Wang et al.

MM ¼ fBIM; OMM; SDM; LSM; MIMg

ð1Þ

Among them: MM:MetadataModel; BIM:Basic_Information_Module = {ResourceName,ResourceId,ResourceDescription,ResourceDate,ResourceProvider,ResourceUrl,ResourceSource, ResourceKeyWords}; OMM:Organize_Manage_Module = {ResourceCategory,SubjectCategoryName, SubjectCategoryCode,BusinessCategoryName,BusinessCategoryCode, ResourceSecurity,ResourceType,ResourceFormat,ResourceManager}; SDM:Service_Descriptor_Module = {ServiceType,ServiceURL,Publisher,ServiceParameters,ServiceRights,ServiceContent,ResourceIssuedDate,ResourceMapping,ResourceRestriction}; LSM:Longterm_Save_Module = {LongtermSaveInformation,ResourceCorrelationInformation,DataQualityInformation}; MIM:Metadata_Information_Module = {MetadataStandardInformation, Metadata ContactInformation,MetadataDateInformation}. 3.2

Organization Structure of Metadata Model of Military Logistics Information Resources

Metadata model of logistics information resources adopts the design idea of hierarchical structure, which is divided into three layers from bottom to top. Its organizational structure is shown in Fig. 2.

Fig. 2. Structural diagram of metadata model of logistics information resources

Research on Metadata System and Model of Military Logistics Information Resources

705

Basic Element is the smallest component of metadata model of logistics information resources. It is a single metadata element in the metadata of military logistics information resources. It is represented by eight metadata attributes: identifier, Chinese name, English name, definition, data type, constraint condition, range, annotation and maximum occurrence. Complex Element is the largest component object in the metadata model of logistics information resources. It refers to the composite metadata element in the metadata of logistics information resources. It can be composed of multiple basic elements or multiple complex elements. Module is the largest component of metadata model of logistics information resources. It can be composed of several basic elements and several complex elements. 3.3

Mapping of Metadata of Military Logistics Information Resources to Data Sources

The research of metadata and metamodel serves for the integration and sharing of logistics information resources. Therefore, it is necessary to establish the mapping relationship between metadata tables and data sources. Data sources mainly refer to database management system. Broadly speaking, data sources also include structured and semi-structured data such as various kinds of XML documents, HTML documents, e-mail, ordinary documents and so on. Among them, the data in database management system is mainly stored in relational database. The data in other formats are mainly stored in XML format. XML is independent of software and platform, and is the main exchange format of data sharing and integration. Therefore, the mapping from metadata model of logistics information resources to data source mainly includes the mapping from metadata model of logistics information resources to relational database, and from metadata model of logistics information resources to XML files. 3.4

Mapping of Logistics Information Resources Metadata Model to Relational Database

Comparing the core metadata of logistics information resources, we can find that a field in the data table is a metadata element, which can be either a single metadata element or a composite metadata element. The metadata model of logistics information resources corresponds to the data tables in the relational database one by one. This paper defines Rule 1, which is the mapping rule (f) from metadata model to Database: f : MetadataSet ! Table 8MetadataSet 2 MetadataModel 8MetadataElement 2 MetadataSet or Table ¼ f ðMetadataSetÞ 8MetadataSet 2 MetadataModel 8MetadataElement 2 MetadataSet Among them: each field (attribute) of the Table corresponds to each MetadataElement of the military logistics information resources, Table is a data table in the

706

J. Wang et al.

relational database, MetadataSet is a military logistics information resources metadata set, and MetadataElement is a military logistics information resources metadata element. According to Rule 1, each attribute and metadata of data table in relational database correspond one by one. For example, the unique ID number given to logistic information resources corresponds to the ResourceId element in the Basic_Information_Module, and the primary and foreign key information of data table in relational database corresponds to the ResourceRestriction element in the Service_Descriptor_Module. When logistics information resources are integrated and shared, Service_ Descriptor_Module in the metadata model(Model) of logistics information resources provides service applications. The IP address and domain name of the data source correspond to the directory service URL (ServiceURL) element. Data source database name, user name, password and other information correspond to ServiceParameters element in Service_Descriptor_Module. The data source service type corresponds to the ServiceType element (when the data source is a relational database, ServiceType ¼ 0). The field information of the data table in relational database corresponds to the directory ServiceContent element in Service_Descriptor_Module, etc. Mapping of Logistics Information Resources Metadata Model to XML Files Relational databases provide powerful data storage and analysis functions such as data retrieval, sorting, indexing and correlation consistency, while XML is designed to transmit data rather than display data, which is simple and independent of software and platform. This paper defines Rule 2, which is the mapping rule (f) from MetadataModel to XML files: f : MetadataElement ! Node or Nodes ¼ f ðMetadataElementÞ Among them: The RootNode of the XML file corresponds to the ResourceName element in the Basic_Information_Module, and also corresponds to the data table name of the relational database; The ChildNodes correspond to other elements in the MetadataModel and also correspond to the fields (attributes) of the data table in the relational database; MetadataElement is the logistics information resource metadata element; Node is the node of the XML files. Note the following when using the above rules: When the XML files are not suitable for Rule 2, DTD and other technologies should be used to preprocess the XML files so that the XML files can be mapped directly using Rule 2; When the XML files are too complex, every child node of the XML files should correspond to the metadata element of logistics information resources one by one, and use the recursive mapping of Rule 1. Therefore, through the logistics information resource metadata, not only the basic information of the logistics information resources can be described in detail, but also the overall structural characteristics of the data source can be explained intuitively.

Research on Metadata System and Model of Military Logistics Information Resources

707

4 Application of Metadata in Military Logistics Information Resources The extended metadata content system of logistics information resources is more comprehensive, more complete and more specific. It can greatly improve the efficiency, recall rate and accuracy rate of data retrieval by retrieving logistics information resources. Logistics information resource metadata has the following applications. 4.1

Solving the Understanding Problem of Logistics Information Resources

By describing the metadata of logistic data in detail, all kinds of logisticians at all levels can understand the meaning of data elements and the processing and transformation of data, which greatly reduces the difficulty of data understanding. Metadata is realized by mapping logistics business model, logistics data model and logistics information domain ontology. It is beneficial for logistics personnel to use and understand logistics information resources by translating data in the way users need. 4.2

Solving Logistics Data Quality Problems

By establishing the metadata standard of logistics information resources and checking metadata information, we can provide basic data information such as data format for interoperability between various business systems, avoid duplicate backup of data, improve the availability and utilization of data, and trace the information of data providers and producers, which is conducive to the control of data quality. 4.3

Solving Logistics Data Organization and Management Problems

By establishing an effective metadata service catalogue for military logistics information resources, unify the technologies and standards adopted in the construction of various kinds of information systems such as logistics command, business management and professional service support at all levels, give full play to the function of metadata, carry out rational scientific organization and heterogeneous management of military logistics information resources efficiently, and realize the publication and exchange of military logistics information resources. 4.4

Solving Logistics Information Integration Problems

Metadata is used to describe military logistics information resources. Different metadata formats are related by mapping and so on. The decentralized and heterogeneous logistics information resources are related to eliminate the differences in data structure and semantics, and realize the integration and sharing of logistics information resources.

708

J. Wang et al.

5 Summary In view of the phenomenon of “data-rich and information-poor” in the field of military logistics, the research on metadata system and model of logistics information resources is of great practical significance and lays a foundation for the integration and sharing of logistics information resources. The research results of this paper are being applied to the project of military logistics information sharing and exchanging platform. Firstly, the expansion of the metadata of logistics information resources and the establishment of the system are conducive to the more scientific organization, more convenient retrieval and more efficient utilization of logistics information resources. Secondly, the research on metadata model of logistics information resources provides ideas and methods for the establishment of logistics information resources management system, especially for the establishment of background database. With the implementation of the project of military logistics information sharing and exchanging platform, the author will further expand and adjust the metadata system and improve the model.

References 1. Pan GH (2009) Application research of government information resource directory system based on metadata. J Libr Theory Pract 10:42–45 (in Chinese) 2. Wu P, Gao S, Gan LR (2010) Research on semantic interoperability model of E-government information resources. J Chin Libr 3:77–82 (in Chinese) 3. Li GJ (2006) Research on E-government service theory and its supporting technology. Dissertation of Tianjin University, pp 54–69. (in Chinese) 4. Chang J (2010) Research on the standard and management construction of seismic metadata. Dissertation of Nanjing University of Science and Technology p 40. (in Chinese) 5. Kang Y (2012) Research on ocean satellite data service based on web. Dissertation of Zhejiang University pp 61–62. (in Chinese) 6. Wu X (2018) Design and implementation of geological data cataloging and interconnection checking platform based on metadata model. Dissertation of China University of Geosciences pp 104–106. (in Chinese)

A General Technique to Combine Off-Policy Reinforcement Learning Algorithms with Satellite Attitude Control Jian Zhang(&), Fengge Wu, Junsuo Zhao, and Fanjiang Xu Institute of Software Chinese Academy of Sciences, Beijing, China [email protected]

Abstract. Reinforcement learning method has great potential in constructing next generation of intelligent attitude control for satellite. However, designing reward function when using reinforcement learning algorithm to achieve specific task is a hard problem, which limits reinforcement learning algorithm used in satellite attitude control. For avoiding complicated reward engineering, we present a technique which allows the off-policy reinforcement learning algorithm can be easily migrated to construct satellite attitude control method. A satellite simulation environment is constructed. In this environment, we train an attitude control agent with the technique and validate the technique’s effectiveness. Keywords: Attitude control Reward function

 Off-policy  Reinforcement learning 

1 Introduction In attitude control system of satellite, attitude control algorithm is a most important part. Most of the existing attitude control methods are dependent on the physical characteristics of the satellite, including mass parameters [1] (mass, moment of inertia, etc.), kinematics and dynamics models based on these parameters. In stable environment, this kind of method shows the ideal performance. Once environment (including actuator failure) or mass parameters changed, the performance of the traditional control method with accurate parameters identified by mass parameters will be greatly deviated from the optimal point. The new generation of intelligent attitude control method should be able to deal with these situations. In recent years, reinforcement learning [2] algorithms have developed rapidly, especially the great success is achieved by the deep reinforcement learning which combine the neural networks with reinforcement learning. This includes AlphaGo [3] which beat the best go player, playing Atari game better than a human [4], and controlling a robotic arm to rotate an object into a desired position [5]. Therefore, it is an area worth exploring to construct a new generation of attitude control methods by using deep reinforcement learning. However, when using the deep reinforcement learning to solve specific problems, the reward function needs to be carefully designed. We call that reward engineering, © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 709–719, 2020. https://doi.org/10.1007/978-981-32-9050-1_80

710

J. Zhang et al.

and different reward functions will lead to different policy. Designing reward function requires not only the background of reinforcement learning but also domain knowledge, which limits the universality of reinforcement learning algorithm. Reinforcement learning algorithms that succeed in specific tasks cannot be directly applied to other tasks. In order to solve the problems mentioned above, this paper introduces a general technique that can be used to combine with any off-policy reinforcement learning algorithm to achieve the migration and work in the field of satellite attitude control. We summarize the contributions of this paper as follows: (1) a migration technique of offpolicy reinforcement learning algorithm for satellite attitude control is proposed. (2) In simulation environment, we train the satellite control policy without depending on the specific physical characteristics of the satellite, including mass, moment of inertia, kinematics and dynamic model by combining Deep Deterministic Policy Gradients (DDPG) [6] with our technique, and validate the effectiveness. Our result encourages migrating deep reinforcement learning method to satellite attitude control. The article remained is organized as four sections. In Sect. 2, background including satellite dynamic model which will be used in simulation environment and the offpolicy reinforcement learning algorithms is introduced. In Sect. 3, the off-policy reinforcement learning algorithm migration technique for satellite attitude control is proposed. In Sect. 4, we introduce simulation environment, model training process and experiment result. In the last section, the conclusion is given.

2 Background 2.1

Reinforcement Learning

An agent defined in reinforcement learning needs interact with the environment through trial-and-error mechanisms and learns optimal policy by maximizing cumulative rewards. The standard reinforcement learning framework is composed of five components: the state space S, the action space A, transition probabilities PaSS0 reward function r : s  a ! R (R is a scalar), discount factor c 2 ½0; 1. Policy p is a function mapping from state space to action space. An agent selects an action according the policy and the current state, performs the action and reaches new state. The transition obeys the transition probability distribution of the environment. At any time step t, agent receives a reward Rt from the environment. The goal of reinforcement learning is to adjust policy to maximize cumulative rewards. Usually, state value function is used to estimate how good the policy is. The state value function is defined as below. " p

V ð SÞ ¼ E p

1 X

# i

c Rt þ i jSt ¼ S

ð1Þ

i¼0

The Q function is also called the action-value function which is defined as below.

A General Technique to Combine Off-Policy Reinforcement Learning Algorithms

Qp ðs; aÞ ¼ Es0  Pssa0 ½r ðs; aÞ þ c V p ðs0 Þ

711

ð2Þ

The optimal policy is the policy which makes the value function reaches the maximum value, which can be defined as below. p ¼ argmaxp V p ðSÞ

ð3Þ

The optimal strategy satisfies the following properties. 

Qp ðs; aÞ  Qp ðs; aÞ; for 8s; a; p 



ð4Þ 

Qp ðs; aÞ ¼ Es0  Pssa0 r ðs; aÞ þ cmaxa0 2A Qp ðs0 ; a0 Þ



ð5Þ

The Q learning method plays an important role in reinforcement learning. The stateaction pair is the input of reward function. In a certain state, each behavior needs to be examined. When the action is selected according to the e-greedy strategy, agent interacts with the environment to arrive the next state and gets some reward from environment. Agent will find the optimal Q function through iterative learning. The deep Q network (DQN) [3] was proposed by the DeepMind. In DQN, convolutional neural networks are combined with Q learning and experience replay technique is used meanwhile. Deep Deterministic Policy Gradients (DDPG) is a reinforcement learning algorithm for continuous action space. DDPG establishing two networks, actor network and critic network. Actor network represents policy p : s ! a, and critic network is used to approximate Q function of policy. When agent interacts with environment, each transition ðst ; at ; rt ; st þ 1 Þ is stored into experience buffer. The rule to update actor network is to maximize the policy’s Q function, and the rule to update critic network is minimize the mean square loss between current critic network’s output and target value. Target value is expressed below. yt ¼ rt þ cmaxa0 Qðs; a0 Þ ¼ rt þ cQðs; pðst þ 1 ÞÞ

ð6Þ

Off-policy method is a series of algorithms in which the policy used to select action in next step is not constrained and can be arbitrary when updating Q value function. Both DQN and DDPG are off-policy RL algorithms. 2.2

Dynamic Environment in Satellite

Three reference coordinate systems are chosen as Zhang’s paper [7]. They are geocentric inertial coordinate system, orbital coordinate system and satellite body coordinate system respectively. We use quaternions form to describe the attitude kinematics and dynamic. The key equations are shown as below. These equations will be used to construct simulation of the dynamic environment in satellite.

712

J. Zhang et al.

The attitude kinematics equation is 2 3 0 qbo1 6 qbo2 7 1 6 wboz 6  7¼ 6 4 q 5 2 4 wboy bo3 wbox qbo4 2

wbox 0 wbox wboy

wboy wbox 0 wbox

32 3 wboz qbo1 6 7 wboy 7 76 qbo2 7 5 4 wbox qbo3 5 0 qbo4

ð7Þ

where qbo is the attitude quaternion of the satellite body coordinate system relative to  T the orbital coordinate system and wbo ¼ wbox ; wboy ; wboz is attitude angular velocity vector. A simple form of attitude kinematics equation can be described as Eq. 8. 1 qbo ¼ Xðwbo Þqbo 2

ð8Þ

The compact form of attitude dynamics equation is shown as Eq. 9 Iw_ þ w Iw = Tc þ Td

ð9Þ

where I is the moment of inertia matrix of satellite, w is attitude angular velocity vector, the symbol “” is an operation map vector to a matrix which is described as Eq. 4,  T Tc ¼ Tcx ; Tcy ; Tcz represents the control torque, Td which form is similar as Tc is the disturbance torque. 

Given w ¼ wx ; wy ; wz

T

2

0 ; then get w ¼ 4 wz wy

wz 0 wx

3 wy wx 5 0

ð10Þ

3 Off-Policy Reinforcement Learning Algorithm Migration Technique for Satellite Attitude Control The problem of attitude control is defined as follows: given an initial state which is composed of angular velocity vector, current attitude quaternion and target attitude quaternion, the control policy output control torque to make the triaxial angular velocity of the satellite stable around 0 rad/s and the attitude quaternion stable around the target attitude quaternion. The current attitude quaternion q is ½q1; q2; q3; q4T and target attitude quaternion is q0 which form is same as q. We set the problem which state space is a 11-dimensional real space. We describe the state space in equation. S ¼ ½w; q; q0 R11

ð11Þ

In the problem we set, agent is trained to give control torque which is defined as action in reinforcement learning, so control torque has the same dimensions as action

A General Technique to Combine Off-Policy Reinforcement Learning Algorithms

713

 T space. In Sect. 2, control torque Tc ¼ Tcx ; Tcy ; Tcz has been given. The action space is described which is a 3-dimensional real space. We consider attitude control as a continuous action space problem. The input of the learned policy network is a state represented by s in the state space, and the output is control torque represented by a. Defined as above, our control targets are triaxial angular velocity and attitude quaternion. Given a state s, the distance to target triaxial angular velocity is defined as equation and is Euclidean distance, and the distance to target attitude quaternion is given by Eq. 13 [8]. vffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi u 3 u X 2 velocity distanceðwÞ ¼ t ðwi Þ2

ð12Þ

i¼1

quternion distanceðq; qtÞ ¼ 2arccosðjhq; qtijÞ

ð13Þ

with hq; qti ¼ q1qt1 þ q2qt2 þ q3qt3 þ q4qt4 In reinforcement learning, sparse reward is one general reward function which agent will get reward 0 in the region close to target, and get reward −1 in other region. The other common reward function is dense reward which agent get reward everywhere, and the reward function is the inverse ratio function of distance. Without relying on domain knowledge, we will use these two obvious reward functions. The threshold of angular velocity distance is defined as velocity_distance_threshold, which is abbreviated as VST; the threshold of quaternion_dis_thresold, which is abbreviated as QDT. Sparse reward function is given in Eq. 14 Rðs; s0 Þ ¼



0 velocity distanceðs0 :wÞ\VST and quternion distanceðs0 :q; s0 :qtÞ\QDT 1 Others ð14Þ

Dense reward function is given in Eq. 15 Rðs; s0 Þ ¼ a  jvelocity distanceðs0 :wÞj bjquternion distanceðs0 :q,s0 :qtÞj 2

2

ð15Þ

where a; b are hyper parameters. The method we proposed is based on the fact that each transition ðst ; at ; rt ; st þ 1 Þ where st ; at ; st þ 1 depend on the environment, but rt doesn’t and can be changed. When solving specific problems, the reward function needs to be design carefully. If different reward function is adopted, transitions stored in replay buffer used for training will change and the optimal policy obtained from the same method will also change. Ng [9] has proved theoretically in his paper that if a reward function is added by a potential function of state, the optimal strategy obtained in the environment in which using the reward function is still the optimal strategy in the original environment.

714

J. Zhang et al.

According to the discussion, a reward function that we call it mixture reward function is given in Eq. 16. Rðs,s0 Þ ¼



1 velocity distanceðs0 :wÞ\VST and quternion distanceðs0 :q; s0 :qtÞ\QDT a  jvelocity distanceðs0 :wÞj2 bjquternion distanceðs0 :q; s0 :qtÞj2 Others ð16Þ

It is composed of sparse and dense reward function and adjusted dynamically in training phase. When close to the target, it is equivalent to using sparse reward function, and when far away from the target, it is equivalent to using dense reward function, which is dynamically controlled by threshold VST and QDT. The idea behind our method is direct. When agent is far away from the target, it is encouraged to reach a state space closer to the target. At this time, the main goal of an agent is to reach some states closer to the target, so the reward function gives large reward to encourage agent. When the control policy can lead agent to the state space frequently, it is necessary to distinguish the state’s advantage and disadvantage in the sub-space reached so as to optimize the policy. Without updating the reward function, the policy cannot evolve because the same reward can be obtained for any state in the state sub-space. Our algorithm is shown as below.

A General Technique to Combine Off-Policy Reinforcement Learning Algorithms

715

4 Simulation Environment, Training Process and Experiments To validate our technique, we use the attitude dynamics and kinematics equations described in Sect. 2 to construct satellite simulation environment. DDPG is chosen as the off-policy RL algorithm to migrate. In DDPG, two networks are built to represent actor and critic. We use multilayer neural networks to achieve these. A network which has three hidden layers, 256 nodes in each layer, and the input layer which size is state space’s dimension is given to represent actor which is called as policy network also. Relu is used as the hidden layer’s activation function. The output layer’s size is 3 which is same as the action space’s dimension. The activation function of output layer is Tanh in policy network. The function Qðs; pðsÞÞ is represented by critic network. Critic network is composed of two parts. First part is the policy network, and the second part’s input is the combination of policy network’s output and state input. The second part of critic network is the last 3 layers in Fig. 1. These layers are connected fully. The output layer’s size is 1 which used to represent Q value. The detail of two networks is shown in Fig. 1.

Fig. 1. Actor network and critic network structure

716

J. Zhang et al.

In our work, Tensorflow1.13 is used as computation framework and NvidiaGeforce-GTX-Titan-X is used as computation resource. The maximum number of steps in each epoch is 512, and the training is performed on 20000 epochs. The training will not be finished ahead of schedule because of the serious deviation of angular velocity. DDPG+ sparse reward function, DDPG+ dense reward function and DDPG+ the method in this paper were used for training respectively, and we get 3 learned polices to validate from each method after 20,000 epochs. We verify the policies learned by three different learning methods through using learned policies to interact with the environment, and watch their performance respectively. Each policy runs in 10 epochs. According to the above setting, in each epoch agent will stop work when reach the maximum number of steps. Therefore, we will collect 512 state data in each epoch. Since the reward function is designed artificially and the quaternion distance and angular velocity distance can accurately describe the current state, we use heatmap graph to represent the state’s distribution. In the Fig. 2, the distribution of data collected by DDPG+ sparse reward function is shown. The data is spread over a large 2-dimensional space. It indicates that the control task cannot be completed with the policy learned through learning. The Figs. 3 and 4 presents the results obtained by using DDPG+ dense reward function method. In the data distribution of 5120, concentrated distribution is in the region close to the target, which indicates that the policy learned by learning with this method has better performance than the method using sparse reward function. The Figs. 5 and 6 presents the results obtained by using DDPG+ technique proposed in this paper. Most of the 5120 points are distributed in the region close to the target angular velocity and quaternion distance. Compared with the former two, the performance has been significantly improved. The detail is shown in Table 1.

Table 1. Velocity distance & quaternion distance in our experiment

Velocity distance (mean value) Velocity distance (max value) Velocity distance (min value) Quaternion distance (mean value) Quaternion distance (max value) Quaternion distance (min value)

DDPG+dense reward function DDPG+our technique 50 steps 250 steps 450 steps 50 steps 250 steps 450 steps 0.67 0.54 0.47 0.25 0.012 0.011 2.16

1.37

1.42

0.75

0.013

0.013

0.25

0.12

0.13

0.1

0.009

0.01

1.32

1.01

1.11

0.075

0.012

0.013

1.54

1.32

1.34

1.34

0.015

0.017

0.53

0.42

0.97

0.31

0.009

0.01

A General Technique to Combine Off-Policy Reinforcement Learning Algorithms

Fig. 2. Data distribution (DDPG+spare reward function)

Fig. 3. Data distribution (DDPG+dense reward function)

Fig. 4. Control effect (DDPG+dense reward function)

717

718

J. Zhang et al.

Fig. 5. Data distribution (DDPG+our technique)

Fig. 6. Control effect (DDPG+our technique)

5 Conclusion In order to solve the problem that the reward function is difficult to deign when using the reinforcement learning algorithm for satellite attitude control, we proposes a technique by iteratively using historical transition experience and setting fuzzy and decay reward function. The technique proposed in this paper can be combined with any off-policy reinforcement learning method. In the paper, we combine with the DDPG to demonstrate that the performance of attitude control can be effectively improved by using this technique.

References 1. Wei WS (2013) Research on the parameters identification and attitude tracking coupling control for the mass body attached spacecraft. PhD thesis. Harbin Institute of Technology. (in Chinese) 2. Sutton RS et al (1998) Reinforcement Learning: An Introduction. MIT Press, Cambridge 3. Silver D, Huang A et al (2016) Mastering the game of go with deep neural networks and tree search. Nature 529(7587):484–489

A General Technique to Combine Off-Policy Reinforcement Learning Algorithms

719

4. Mnih V, Kavukcuoglu K et al (2015) Human-level control through deep reinforcement learning. Nature 518(7540):529–533 5. Andrychowicz M, Wolski F et al (2017) Hindsight experience replay. In: Advances in neural information processing systems, pp 5048–5058 6. Lillicrap TP, Hunt JJ, Pritzel A et al (2015) Continuous control with deep reinforcement learning. arXiv preprint arXiv:1509.02971 7. Zhang J, Wu F, Zhao J, Xu F (2019) A method of attitude control based on deep deterministic policy gradient. In: Sun F, Liu H, Hu D (eds) Cognitive Systems and Signal Processing. ICCSIP 2018. Communications in Computer and Information Science, vol 1006. Springer, Singapore 8. Small note on Quaternion distance metrics. https://fgiesen.wordpress.com/2013/01/07/smallnote-on-quaternion-distance-metrics. Accessed 22 Apr 2019 9. Ng AY, Harada D, Russell S (1999) Policy invariance under reward transformations: theory and application to reward shaping. In: Proceedings of the sixteenth international conference on machine learning (ICML 1999), pp 278–287

Finite-Time Event-Triggered Attitude Consensus Control for Multiple Unmanned Surface Vessels Sichen Liu1, Qing Fei1(&), Changwen Wu1, and Xiaosong Huang2 1

2

Beijing Institute of Technology, Beijing 100081, China [email protected] The Institute of Atmospheric Physics, Chinese Academy of Sciences, Beijing 100000, China [email protected]

Abstract. In order to save the communication resources and reduce the energy consumption of multiple Unmanned Surface Vessels (USVs), a finite-time consensus control algorithm based on event-triggered strategy is proposed. The distributed discontinuous control protocol is designed by the defined state error, and the trigger function for each USV is given. It is proved by Lyapunov theory that the finite-time heading consensus of multi-USVs can be achieved by choosing the appropriate control gain. Finally, numerical simulations are given to show the effectiveness of the proposed strategy. The multi-USV system only updates the controller when the trigger condition is reached, which reduces the network consumption, so it has important practical significance. Keywords: Multiple Unmanned Surface Vessels Finite-time  Consensus

 Event-triggered strategy 

1 Introduction With the rapid development of driverless technology, Unmanned Surface Vessels (USVs) have become the research hotspot of national marine strategies. The cooperation of multiple USVs has gradually become the main way to accomplish complex operations at sea, which has been widely used in both military and civilian fields. It is often required that each USV can adjust its own state based on neighbor information for completing a task in the multiple USVs, and this is called the co problem. The consensus problem is the basis for studying the coordinated control of multiple USVs, which is of great significance to security, large-area ocean survey and environmental survey. Sliding mode [1], backstepping [2], adaptive control [3] are the commonly used conensus control methods. In [4], an adaptive self-organizing map neural network method is proposed, which enables USVs to maintain their relative positions in the formation process. The authors in [5] present a neural network backstepping control to achieve position and velocity consensus tracking. [6, 7] respectively solve the consensus problem of multi-USV system with time delay and disturbance. Communication is the key of multiple USVs cooperative operation in deep sea. But the common radio communication is limited by the long distance, and the cost of © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 720–727, 2020. https://doi.org/10.1007/978-981-32-9050-1_81

Finite-Time Event-Triggered Attitude Consensus Control

721

satellite communication is high, which leads to the instability and high cost of communication in the cooperative operation of multiple USVs system. Thus, in order to reduce the amount of communication between USVs and the controller updates, eventtriggered control strategies are usually adopted. That is, the update of controller is determined by judging whether an event occurs or not. In [8] and [9], an eventtriggered adaptive consensus control method is designed for linear and nonlinear multiagent systems. In [10] and [11], the authors respectively study the consensus of firstorder and second-order discrete systems. The leader-following consensus for homogeneous and heterogeneous multi-agent systems are respectively solved in [12] and [13]. [14] discusses the consensus of the leader-following system under the switching topology. An event-triggered sliding mode control method is put forward in [15] to solve the consensus problem of second-order heterogeneous multi-agent systems. The rest of the paper is organized as follows. Graph theory and the dynamic model of USV are given in Sect. 2. Section 3 proposes the distributed event-triggered consensus control strategy for multi-USV system. Some simulation results are presented in Sect. 4. Section 5 concludes the paper.

2 Background and Preliminaries 2.1

Graph Theory

Consider a directed graph G consisting of a non-empty node set V ¼ f1; 2; . . .; Ng and an edge set E  V  V. The adjacency matrix A ¼ ½aij  2 RNN is given by aij ¼ 1, if ðvj ; vi Þ 2 E, which means that vi can obtain the information from vj , and aij ¼ 0, P otherwise. Di ¼ Nj¼1 aij is defined as the entry degree of node i. Without considering self-loop, aii ¼ 0. The Laplacian matrix L ¼ ½lij  2 RNN is defined as lij ¼ aij for P PN i 6¼ j, and lii ¼ Nj¼1;j6¼i aij . Matrix L satisfies lij  0 for i 6¼ j, j¼1 lij ¼ 0 for i ¼ 1; 2;    ; N. Since the sum of each row in matrix L is zero, 0 is an eigenvalue of L with the associated eigenvector 1n. A directed path from node v1 to node vn is a sequence of ordered edges of the form ðvk ; vk þ 1 Þ, k ¼ 1; 2;    ; N  1. A directed graph is called strongly connected if there exists a directed path for any two distinct nodes. A directed graph contains a directed spanning tree if there exists at least one node called the root having a directed path to every other node. The root has no parent node. 2.2

Surface Vessel Attitude Dynamics

Consider a system consisting of n USVs, and the attitude dynamics of the ith USV is described by the Nomoto model as w_ i ¼ ri Ti r_ i ¼ ri þ ki di

ð1Þ

722

S. Liu et al.

where wi is the yaw angle f the ith USV, and ri is the angle velocity. di denotes the control input, and Ti is the parameter associated with the mechanical inertia, ki is the control gain. Assumption 1. The graph G contains a directed spanning tree. Assumption 2. For system (1), when the input di ðtÞ is zero, wi ðtÞ and ri ðtÞ is bounded. That is, for any wi ð0Þ; ri ð0Þ 2 R, wi ðtÞ and ri ðtÞ is always included in a bounded set X.

3 Event-Triggered Consensus Conrol This section considers the event-triggered finite time consensus problem for the multiUSV system (1) under a directed topology. First, define a state variable for the ith USV as si ðtÞ ¼

n X

aij ½ðwi ðtÞ  wj ðtÞÞ þ Kðri ðtÞ  rj ðtÞÞ; i ¼ 1; 2; . . .; n:

ð2Þ

j¼1

where K [ 0. The distributed event-triggered controller is designed to each USV as di ðtÞ ¼ bsignðsi ðtki ÞÞ; t 2 ½tki ; tki þ 1 Þ

ð3Þ

where b [ 0 is the control gain, tki is the latest event-triggered time for the ith USV, sgn(∙) is the sign function. The state error of the ith USV is given as ei ðtÞ ¼ si ðtki Þ  si ðtÞ; t 2 ½tki ; tki þ 1 Þ

ð4Þ

Substitute Eqs. (2) and (4) into (1), we obtain w_ i ðtÞ ¼ ri ðtÞ Ti r_ i ðtÞ ¼ ri ðtÞ  ki b sign(si ðtÞ þ ei ðtÞÞ

ð5Þ

Rewrite Eq. (5) into a matrix form _ wðtÞ ¼ rðtÞ T r_ ðtÞ ¼ rðtÞ  kbrðsðtÞ þ eðtÞÞ

ð6Þ

where wðtÞ ¼ ½w1 ðtÞ; w2 ðtÞ; . . .; wn ðtÞT , rðtÞ ¼ ½r1 ðtÞ; r2 ðtÞ; . . .; rn ðtÞT , T ¼ diagfT1 ; T2 ; . . .; Tn g, K ¼ diagfk1 ; k2 ; . . .; kn g, sðtÞ ¼ ½s1 ðtÞ; s2 ðtÞ; . . .; sn ðtÞT , eðtÞ ¼ ½e1 ðtÞ; e2 ðtÞ; . . .; en ðtÞT , rðxÞ ¼ ½signðx1 Þ; signðx2 Þ; . . .; signðxn ÞT .

Finite-Time Event-Triggered Attitude Consensus Control

When t 2 ½tki ; tki þ 1 Þ, e_ i ðtÞ ¼ _si ðtÞ. From (2), si ðtÞ ¼

j_ei ðtÞj ¼ j_si ðtÞj ¼ j

n X

lij ðrj 

j¼1

j

n X j¼1

n P

723

lij ½wj ðtÞ þ Ki rj ðtÞ, then

j¼1

n X K Kkj rj Þb lij signðsj ðtkjj ðtÞ ÞÞj Tj T j j¼1

n X K kj lij ðrj  rj Þj þ bKj lij signðsj ðtkjj ðtÞ ÞÞj Tj T j¼1 j

ð7Þ

where tkjj ðtÞ is the latest event-triggered time for the jth USV. Define gðt; ri ðtÞÞ ¼ rj  TKj rj . For rj is bounded, then we have jgðt; ri ðtÞÞj  x; i ¼ 1; 2; . . .; n. Furthermore, we can get j_ei ðtÞj  x

n X

jlij j þ bKj

j¼1

where Li ¼

n P j¼1

n X kj

Tj

j¼1

jlij j; ci ðtkjj ðtÞ Þ ¼ bKj

lij signðsj ðtkjj ðtÞ ÞÞj ¼ xLi þ ci ðtkjj ðtÞ Þ

ð8Þ

n P kj j¼1

j Tj lij signðsj ðtkj ðtÞ ÞÞj.

Then the event-triggered function is given by Z t fi ðtÞ ¼ ½xLi þ ci ðtkjj ðtÞ Þds  tki

ci jsi ðtki Þj 1 þ ci

ð9Þ

where K [ 0. Theorem 1. Under Assumption 1 and 2, consider the multi-USV system (1) with the trigger function (9), for i = 1, 2, …, n, if 0\ci \1 and there exists tki that si ðtki Þ 6¼ 0, then the ith USV will not occur Zeno triggering phenomenon for t [ tki . Proof. When t ¼ tki , we have ei ðtki Þ ¼ 0, then Z t Z t jei ðtÞj  ½xLi þ ci ðtkjj ðtÞ Þds; t 2 ½tki ; tki þ 1 Þ e_ i ðsÞds  tki

ð10Þ

tki

When the next event is triggered, t ¼ tki þ 1 Z fi ðtÞ ¼ tki

t

½xLi þ ci ðtkjj ðtÞ Þds 

ci jsi ðtki Þj [ 0 1 þ ci

ð11Þ

that is ci jsi ðtki Þj\ 1 þ ci

Z tki

tki þ 1

½xLi þ ci ðtkjj ðtÞ Þds

Since si ðtki Þ 6¼ 0, we can get tki þ 1  tki [ 0.

ð12Þ

724

S. Liu et al.

It follows from Eq. (4) and (8) that, for t 2 ½tki ; tki þ 1 Þ Z jsi ðtki Þj

 jsi ðtÞj  jei ðtÞj 

t

tki

½xLi þ ci ðtkjj ðtÞ Þds 

ci jsi ðtki Þj 1 þ ci

ð13Þ

and Z jsi ðtÞj  si ðtki Þj  jei ðtÞj 

t

tki

½xLi þ ci ðtkjj ðtÞ Þds 

ci jsi ðtki Þj  ci jsi ðtÞj 1 þ ci

ð14Þ

That is, ð1  ci Þjsi ðtÞj  jsi ðtki Þj  ð1 þ ci Þjsi ðtÞj; t 2 ½tki ; tki þ 1 Þ

ð15Þ

Since si ðtki Þ 6¼ 0, we can get si ðtki þ 1 Þ 6¼ 0, which means tki þ 2  tki þ 1 [ 0. By the similar proof as above, we can conclude that the ith USV will not occur Zeno triggering phenomenon for t [ tki . Theorem 2. Under Assumption 1 and 2, consider the multi-USV system (1) with the trigger function (9), for i = 1, 2, …, n, if 0\ci \1 and b [ 2nxDmax T=Kk; where Dmax is maximum entrydegree of G, then the system(1) can achieve consensus within  T0 , where T0  jjsð0Þjj1 b Kk  2nxDmax . T Proof. Define a Lyapunov-Krasovskii function candidate as VðtÞ ¼

n X

jsi ðtÞj ¼ jjsðtÞjj1

ð16Þ

i¼1

The time derivative of V is written as follows _ VðtÞ ¼

n X @V i¼1

@si

s_ i ¼

n X

signðsi Þ_si ¼ rðsÞT s_

ð17Þ

i¼1

Assume that T1 ¼ T2 ¼    ¼ Tn ¼ T; k1 ¼ k2 ¼    ¼ kn ¼ k, then we have Kk _ VðtÞ ¼ rðsÞT LðAÞgðt; rÞ  b rðsÞT LðAÞrðs þ eÞ T

ð18Þ

Consider jrðsÞT LðAÞgðt; rÞj ¼ j

n X

signðsi ÞLir ðAÞgðt; rÞj

i¼1



n X i¼1

jsignðsi ÞLir ðAÞgðt; rÞj 

n X i¼1

ð19Þ jLir ðAÞgðt; rÞj ¼ jjLðAÞgðt; rÞjj1

Finite-Time Event-Triggered Attitude Consensus Control

725

Based on Holder inequality, we have jjLðAÞgðt; rÞjj1  jjLðAÞjj1 jjgðt; rÞjj1  2nxDmax

ð20Þ

It follows from Eq. (5) and (9) that Z jsi ðtki Þj

 jsi ðtÞj  jei ðtÞj  tki

t

½xLi þ ci ðtkjj ðtÞ Þds 

ci jsi ðtki Þj 1 þ ci

ð21Þ

Since signðsi ðtÞ þ ei ðtÞÞ ¼ signðsi ðtÞÞ, by Proposition 2.1 of [16], we have rðsÞT LðAÞrðs þ eÞ ¼ rðsÞT LðAÞrðsÞ  1. Substitue (20) and (21) into (18), _  2nxDmax  b Kk \0 VðtÞ T

ð22Þ

It is obvious that VðtÞ is keeping decreasing, and the lowest rate is  2nxDmax [ 0. Thus, there exists a finite time T0 such that VðtÞ ¼ 0; t  T0 . That is, si ðtÞ ¼ 0; i ¼ 1; 2; . . .; n; t  T0 . So theheading consensus  of each vessel can be achieved in finite time, and T0  jjsð0Þjj1 b Kk  2nxD . The proof is completed. max T

b Kk T

4 Simulation Results To illustrate the effectiveness of the proposed protocol, some simulations are provided. Figure 1 shows the topology of six USVs. The model and control parameters are set as T ¼ 2; k ¼ 0:5, ci ¼ 0:9; K ¼ 2; b ¼ 0:2.

Fig. 1. Communication graph of 6 USVs

Under the event-triggered protocol (3), the trajectories of the yaw angles, the angle velocities and the rudder inputs are depicted in Figs. 2, 3, 4. It can be seen that six USVs’ states reach consensus for a limited time. Figure 5 describes the event times of six USVs. We can find that there is no Zeno phenomenon.

726

S. Liu et al.

Fig. 2. Yaw angles of 6 USVs

Fig. 3. Yaw angle velocities of 6 USVs

Fig. 4. Rudder inputs of 6 USVs

Fig. 5. Event times of the 6 USVs

5 Conclusion This paper studies the event-triggered consensus tracking control of multi-USV system under a directed network. Based on the defined state error, the trigger function and distributed control protocol are proposed. The stability of the system is proved by Lyapunov analysis. Some simulation examples are given to illustrate the effectiveness of the event-triggered protocol. In the future, communication delays in event-triggered control will be considered.

References 1. Das B, Subudhi B, Pati BB (2014) Adaptive sliding mode formation control of multiple underwater robots. Arch Control Sci 24(4):515–543 2. Cui R, Ge S, How E et al (2010) Leader-follower formation control of underactuated autonomous underwater vehicles. Ocean Eng 37:1491–1502 3. Polycarpou MM (1996) Stable adaptive neural control scheme for nonlinear systems. IEEE Trans Autom Control 41(3):447–451

Finite-Time Event-Triggered Attitude Consensus Control

727

4. Li X, Zhu D (2018) An adaptive SOM neural network method to distributed formation control of a group of AUVs. IEEE Trans Ind Electron 65:8260–8270 5. Zhao L, Yu J, Yu H (2017) Distributed adaptive consensus tracking control for multiple AUVs. In: 2017 seventh international conference on information science and technology (ICIST). IEEE 6. Huang H, Liao Y, Shen H (2014) Adaptive AUV formation strategy under acoustic communication conditions. In: Oceans conference. IEEE 7. Li S, Wang X (2013) Finite-time consensus and collision avoidance control algorithms for multiple AUVs. Pergamon Press, Inc., Oxford 8. Wang D, Zhou Q, Zhu W (2018) Adaptive event-based consensus of multi-agent systems with general linear dynamics. J Syst Sci Complex 31(1):120–129 9. Xiu X, Dong Y (2013) Event-triggered consensus of nonlinear multi-agent systems with nonlinear interconnections. In: Proceedings of the 32nd Chinese control conference. IEEE 10. Pu H, Zhu W, Wang D (2016) Consensus analysis of first-order discrete-time multi-agent systems with time delay: an event-based approach. In: Control Conference. IEEE 11. Zhao D, Dong T, Hu W (2018) Event-triggered consensus of discrete time second-order multi-agent network. Int J Control Autom Syst 16(1):87–96 12. Cheng Y, Ugrinovskii V (2017) Event-triggered leader-follower tracking control for interconnected systems with undirected communication graphs. In: American control conference. IEEE 13. Garcia E, Cao Y, Casbeer DW (2017) An event-triggered control approach for the leadertracking problem with heterogeneous agents. Int J Control 91:1–13 14. Zhu W, Sun C, Li H (2015) Event-based leader-following consensus of multi-agent systems with switching topologies. In: Proceedings of the 32nd Chinese control conference. IEEE 15. Mishra R, Sinha A (2019) Event-triggered sliding mode based consensus tracking in second order heterogeneous nonlinear multi-agent systems. Eur J Control 45(1):30–44 16. Franceschelli M, Pisano A, Giua A et al (2015) Finite-time consensus with disturbance rejection by discontinuous local interactions in directed graphs. IEEE Trans Autom Control 60(4):1133–1138

Kinect-Based Gesture Tracking in Remote Operation of Rocket Casket Jianxin Zhang1, Xiaowang Jiang1(&), Guolei Wang2, Zhiliang Chen2, and Wenzhu Deng1 1

Hubei Jiangshan Heavy Industries Co., Ltd., Xiangyang 441057, Hubei, China [email protected] 2 Department of Mechanical Engineering, Tsinghua University, Beijing 100084, China

Abstract. This paper makes analysis on the present situation and background demand of the rocket cartridge loading technology. It presents a design scheme of a remote operation and hoisting system for rocket casings. The new lifting device and the Kinect-based gesture control of lifting device are designed, respectively, and the gesture recognition algorithm is presented. Finally, the ABB 1600 manipulator is used to test and verify the feasibility of visual servo and gesture control for rocket launcher. Keywords: Rocket cartridge Remote control

 Unmanned loading  Visual servo 

1 Introduction Rocket launcher, a kind of multi-launcher device, can launch a large number of rockets in a very short time. However, the rocket launcher is restricted to the amount of ammunition, and usually requires the cooperation of ammunition transport and loading vehicle. Since the beginning of the 21st century, in order to improve the loading efficiency of ammunition, the newly developed Bazooka has basically adopted the cartridge-type storage and delivery of ammunition. To be specific, modularization of ammunition and firing box, and standardized interface are design to realize the rapid loading and the joint firing of different types of ammunition of Bazooka [1]. Therefore, the loading of ammunition in the container is an important operation process of rocket launcher. To a certain extent, it determines the operation efficiency and sustainability. However, the current loading technology of ammunition is still relatively backward. Basically, it needs manual command, manual positioning and clamping. Also, it usually requires the joint operation of gun crew that is composed of five persons (shown in Fig. 1), which causes low efficiency and high labor intensity. In a word, it is not beneficial to the streamlining of gun crew personnel in the future. It is an inevitable trend that the battlefield will be less and even unmanned in the future. Now, various unmanned aerial vehicles, unmanned chariots and robot soldiers are developing rapidly. With the unceasing development of industrial robot technology, the number of artillery squad will be greatly reduced definitely in the future, and unmanned Bazooka will appear [2, 3] eventually. So how to complete the reloading of © Springer Nature Singapore Pte Ltd. 2020 Z. Deng (Ed.): CIAC 2019, LNEE 586, pp. 728–735, 2020. https://doi.org/10.1007/978-981-32-9050-1_82

Kinect-Based Gesture Tracking in Remote Operation of Rocket Casket

729

ammunition box with few (less than two persons) or even none people is the key problem to be studied and solved. Nowadays, as the application of visual servo and teleoperation technologies are gradually mature [4–7], we can apply relevant technologies to automatic loading or teleoperation loading of rocket casings. Generally speaking, the rocket box is basically box-shaped, corresponding to a certain type of rocket launcher. As the rocket launcher is loaded, its hoisting point is generally upward and its placement is directional. These objective conditions just match with the application of visual identification bullet box and visual positioning hoisting technology. For this reason, the robot vision technology and gesture control technology based on Kinect are adopted in remote operation and hoisting technology of rocket gun cases.

Fig. 1. Rocket launcher for loading vehicle filling casket

2 The Hoisting of Rocket Casket by Teleoperation 2.1

Design of Spreader, Positioning, and Locking

The rocket casket is loaded with explosive materials, and it is not allowed to fall during the hoisting process especially in mid-air. So the absolute reliability and safety of the hoisting device are required. Generally, the traditional rocket gun box spreader is a sling type, which is suitable for manual hoisting and fixation. If a new type of spreader is to be designed for remote operation and hoisting, it requires good rigidity and adaptiveness to the automatic control of the mechanical arm. The rocket casket spreader designed for automatic lifting in this paper is shown in Fig. 2. Clamp on the outside of the box body adopts the principle of scissor-fork and linkage mechanism to make the positioning cone-pin, hook and lifting cross-bar connected as a whole. The structure is composed of pawl, fixed block and movable block, which realizes the automatic clamping and loosening of the hook. The whole process

730

J. Zhang et al.

does not need additional power components. Under the action of gravity, the tension becomes tighter and tighter, thus this device is simple and reliable. To speak specific, the core idea is that the sliding of lifting rod 3 on pillar 4 is limited by pawl 5, and the up and down position of pawl 5 is finally decided by the up and down movement of movable block 7. So the automatic clamping and loosening of the whole hoisting device is realized.

1-cross bar 5-detent

2-lifting hook

6-fixed block

3-lifting bar

7-active plate

4- standing column 8-taper pin

9-Send box

Fig. 2. The lifting device of rocket casket.

2.2

Kinect-Based Gesture Control

Kinect is a three-dimensional motion camera that comprised a depth sensor, a RGB camera, and a multi-point microphone array, which can acquire scene images in real time and also capture the information like voice or action. Its external structure is shown in Fig. 3. Until now, Kinect is extensively used for gesture segmentation and gesture recognition [8–12].

Infrared emitter

RGB camera

Fig. 3. The Kinect device we use

CMOS-vidicon

Kinect-Based Gesture Tracking in Remote Operation of Rocket Casket

731

The self-contained human skeleton recognition algorithm in Kinect can recognize the palm-palm position information, which can be applied to the field of remote operation and hoisting of rocket artillery boxes. Based on this, the future generation of weapons would be unmanned. Through the design of the gesture recognition system in the upper and lower computer, the gesture recognized by the Kinect sensor is converted into control instruction through wired or wireless communication module to realize the control of the boom. The lifting block diagram is shown in Fig. 4, and the gesture control flow for remotely lifting based on Kinect is shown in Fig. 5.

Gestures

Kinectsensors

Gesturerecognitionsystem

Wired/wireless communication module

Hoisting system

Fig. 4. The lifting process of Kinect-based gesture control.

Begin

Begin

System initialization

System initializatio

Waiting for receiving instruction from the high-level host

Kinect-based image capture

Identifiable action

Y Transfer the control command to the lower computer

N

N Received?

Y Read instructions

Call the execution function to perform corresponding action High-level host

low-level controller

Fig. 5. The Kinect-based gesture control block diagram for remotely hoisting

732

J. Zhang et al.

3 Kinect-Based Control of Palm Recognition and Tracking As previously mentioned, our scheme uses highly reliable spreader technology. It does not need to carry out gesture grasping control, but adopts only Kinect-based skeleton recognition algorithm to identify and track the position coordinates of the palm center of the human body, so as to complete the remote control of final position of the mechanical arm. The working principle is described below: first, Kinect camera is used to identify and extract the palm-coordinate position (x, y, z) on images of different frames. As the palm moves, the palm-coordinate difference ðDx; Dy; DzÞ between the two frames is calculated timely. If the difference is within the set threshold range, the robot motion command is executed, and the robot TCP point moves in the same direction, corresponding to c  ðDx; Dy; DzÞ. The block diagram of controlling principle is shown in Fig. 6.

Extract palmar coordinates

Calculate palm-coordinate difference (∆x, ∆y, ∆z) between the two frames

Circulation N (∆x, ∆y, ∆z)