this paper works on the collective behavior of affine nonlinear multi-agent dynamic systems under time-varying directed network. Based on the notion called time-invariant adjoint graph we further define intermittent c...
详细信息
Tremendous amount of research is going on in the area of Intelligent Transport System. the automotive companies like General Motors, Toyota, Mercedes etc have announced launch of high end vehicles with inbuilt V2X(Veh...
详细信息
Tremendous amount of research is going on in the area of Intelligent Transport System. the automotive companies like General Motors, Toyota, Mercedes etc have announced launch of high end vehicles with inbuilt V2X(Vehicle to infrastructure/Vehicle) systems. In this paper we have proposed a scheme to implement vehicle to vehicle communication using Direct Sequence Spread Spectrum Code Division Multiple Access radar (DS-CDMA). the system is capable of performing ranging as well as communication with multiple targets. (C) 2015 the Authors. Published by Elsevier B.V. this is an open access article under CC BY-NC-ND license (http://***/licenses/by-nc-nd/4.0/).
this paper presents the Adaptive Generalized Dynamic Inversion control with Neural Estimation (AGDI-NE) for attitude control of affine nonlinear Twin Rotor Multiple-Input-Multiple-Output System (TRMS). the control pro...
详细信息
ISBN:
(纸本)9781728119380
this paper presents the Adaptive Generalized Dynamic Inversion control with Neural Estimation (AGDI-NE) for attitude control of affine nonlinear Twin Rotor Multiple-Input-Multiple-Output System (TRMS). the control problem is solved by exploiting the AGDI-NE control approach which is visualized as the combination of equivalent control and the switching control part. the equivalent control enforces the constraint dynamics that include the design objectives, where as the switching control provides robustness against system nonlinearities and uncertainties. the system unknown dynamical parameters are also estimated using Radial Basis Function Neural Networks (RBF-NN) for synthesizing the control law. the proposed control approach will guarantee semi-global practically stable attitude tracking in the sense of Lyapunov. computer simulation are presented on the dynamic simulator of TRMS to demonstrate the effectiveness and feasibility of the AGDI-NE control law in presence of parametric uncertainties and measurement noise.
Many of the advantages of Role Based Access control (RBAC) accrue from the flexibility of its administrative models. Over the past two decades, several administrative models have been proposed to manage user-role, per...
详细信息
ISBN:
(纸本)9783319458717;9783319458700
Many of the advantages of Role Based Access control (RBAC) accrue from the flexibility of its administrative models. Over the past two decades, several administrative models have been proposed to manage user-role, permission-role and in some cases role-role relations. these models are based on different administrative principles and bring inherent advantages and disadvantages. In this paper, we present a unified model, named Uni-ARBAC, for administering user-role and permission-role relations by combining many of the administrative principles and novel concepts from prior models. For example, instead of administering individual permissions Uni-ARBAC combines permissions into tasks which are assigned to roles as a unit. Slightly differently, users are assigned to user-pools from where individual users are assigned to roles. the central concept of Uni-ARBAC is to integrate user-role and task-role administration into a more manageable unit called an Administrative Unit (AU). AUs partition roles, tasks and user-pools and they are organized in a rooted tree hierarchy. Administrative users are assigned to AUs with possibility of restricting their authority to user-role assignment or task-role assignment. While most existing models assume existence of administrative roles for managing regular roles, we present an approach for engineering AUs based on structured partitioning of roles and tasks.
Most elderly people wish to live independently at home, but are at risk of social isolation, inactivity, low mood, falls and increased frailty. To keep them safe at home without unnecessary, expensive hospitalisations...
详细信息
ISBN:
(纸本)9783319920375;9783319920368
Most elderly people wish to live independently at home, but are at risk of social isolation, inactivity, low mood, falls and increased frailty. To keep them safe at home without unnecessary, expensive hospitalisations we will investigate a new eHealth application using the Microsoft Kinect. this pilot study evaluates user engagement with Kinect when used for remote monitoring in the homes of frail adults and to provisionally validate the system's ability to detect key "indicators" of health events and states in a home setting. 12 older people in homes for the elderly in Salford, UK will be observed with MS Kinect. User engagement will be assessed via interviews. Health events/states identified by the Kinect will be compared to researcher assessments and user reports.
Multiple-disk architectures are an attractive approach to meet high performance I/O demands in I/O intensive applications such as search engines, web servers and information retrieval systems. this requires that the i...
详细信息
ISBN:
(纸本)9780889867048
Multiple-disk architectures are an attractive approach to meet high performance I/O demands in I/O intensive applications such as search engines, web servers and information retrieval systems. this requires that the issues of dynamic load balancing and access parallelism be addressed, which is the goal of this paper. We address the problem of document declustering in a keyword-based information retrieval system for parallel architectures consisting of a single processor and multiple disks. We propose and evaluate experimentally four similarity-based methods, viz., set, multiset, vector, and euclidean, for declustering documents. Interestingly, our results show that for single keyword queries as well as boolean and queries the set and multiset methods generally outperform the vector and euclidean methods with set being the best for the so-called simple plan. We also introduce a highest-frequency first retrieval scenario and compare the methods under this scenario, and find that set and multiset methods are still generally superior to the other methods withthe multiset outperforming the set method. We compare these methods withthe (theoretically) optimal values, which are practically impossible to achieve. Finally, we approximated the multiset method using the harmonic mean and found that the results were slightly inferior than multiset method, but still better than the vector and euclidean methods.
Live instructors perspective videos are useful to present intuitive visual instructions for trainees in medical and industrial settings. In such videos, the instructors hands often hide the work area. In this demo, we...
详细信息
ISBN:
(纸本)9781509066476
Live instructors perspective videos are useful to present intuitive visual instructions for trainees in medical and industrial settings. In such videos, the instructors hands often hide the work area. In this demo, we present a diminished hand for visualizing the work area hidden by hands by capturing the work area with multiple cameras. To achieve the diminished reality, we use a light field rendering technique, in which light rays avoid passing through penalty points set in the unstructured light fields reconstructed from the multiple viewpoint images.
Pattern formation algorithms for swarms of robots can find applications in many fields from surveillance and monitoring to rescue missions in post-disaster scenarios. Complex formation configurations can be of interes...
详细信息
Pattern formation algorithms for swarms of robots can find applications in many fields from surveillance and monitoring to rescue missions in post-disaster scenarios. Complex formation configurations can be of interest to be the central element in an exhibition or maximize surface coverage for surveillance of a specific area. Existing algorithms that enable complex configurations usually require a centralized control, a communication protocol among the swarm in order to achieve consensus, or predefined instructions for individual agents. Nonetheless, trivial shapes such as flocks can be accomplished with low sensing and interaction requirements. We propose a pattern formation algorithm that enables a variety of shape configurations with a distributed, communication-free and index-free implementation with collision avoidance. Our algorithm is based on a formation definition that does not require indexing of the agents. We show the potential of the algorithm by simulating the formation of non-trivial shapes such as a wedge and a T-shaped configuration. We compare the performance of the algorithm for single and double integrator models for the dynamics of the agents. Finally, we run a preliminary test of our algorithm by implementing it with a group of small cars equipped with a Lidar for sensing and orientation calculation. (C) 2019the Authors. Published by Elsevier B.V.
Withthe development of computer technology, the operation environment of main control rooms in modern nuclear power plants (NPP) has considerably changed over the years, namely the use of advanced Digital control Sys...
详细信息
ISBN:
(纸本)9783319945897;9783319945880
Withthe development of computer technology, the operation environment of main control rooms in modern nuclear power plants (NPP) has considerably changed over the years, namely the use of advanced Digital control System (DCS). In this paper, the accident of steam generator tube rupture (SGTR) of a DCS in a nuclear power plant is simulated and the task analysis method is used to explore the reliability of the secondary side cooling and depressurization operation of the operators. the effect of the man-machine interface changes on operators is studied on the basis of SGTR accident simulation. An event tree is built to model the operators' activities of handling the accident. Operators' behaviors in a DCS are determined and a quantitative calculation of operators' reliability is then conducted.
Multiple-pursuer multiple-evader games raise fundamental and novel problems in controltheory and robotics. In this paper, we propose a distributed solution to this problem that simultaneously addresses the discrete a...
详细信息
ISBN:
(纸本)9783540714927
Multiple-pursuer multiple-evader games raise fundamental and novel problems in controltheory and robotics. In this paper, we propose a distributed solution to this problem that simultaneously addresses the discrete assignment of pursuers to evaders as well as the continuous control strategies for capturing individual evaders. the resulting hybrid control framework guarantees the mutual exclusion property of the final assignment for all initial conditions as well as capturing all evaders after exploring at most a polynomial number of assignments, dramatically reducing the combinatorial nature of purely discrete assignment problems.
暂无评论