2020
DOI: 10.1109/tii.2019.2938145
|View full text |Cite
|
Sign up to set email alerts
|

Internet of Things-Based Online Condition Monitor and Improved Adaptive Fuzzy Control for a Medium-Low-Speed Maglev Train System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
55
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 104 publications
(55 citation statements)
references
References 21 publications
0
55
0
Order By: Relevance
“…Train running time is also the objective of speed profile design. Total running time T of TRS is expressed as (18). i is the time step index, n is the total time step, and t is the step…”
Section: ) Energy Consumptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Train running time is also the objective of speed profile design. Total running time T of TRS is expressed as (18). i is the time step index, n is the total time step, and t is the step…”
Section: ) Energy Consumptionmentioning
confidence: 99%
“…As for train running control, the classical proportionalintegral-derivative (PID) controller is currently applied on most trains based on empirical formulas [18]. The PID controller, firstly introduced by Minorsky, is widely used for its simple structure and universality [19], [20].…”
Section: Introductionmentioning
confidence: 99%
“…In [12], a novel nonlinear position-stabilizing controller for magnetic levitation is proposed by combining the active damping injection technique and disturbance observers (DOBs). In [13], in view of the wide application of the internet of things (IoT) in intelligent transportation, a new method for realizing suspension control for mediumlow-speed maglev trains using the IoT and an adaptive fuzzy controller is proposed.…”
Section: Introductionmentioning
confidence: 99%
“…In order to effectively suppress the intrusion of hackers, a roaming authentication protocol capable of verifying the legitimacy of mobile devices is needed. Therefore, the design of roaming authentication protocols in the IoT network environment is faced with higher security requirements [9], [10].…”
Section: Introductionmentioning
confidence: 99%