The main goal of mobile robot navigation is the steering of a robot in any direction, in particularly towards the goal, and to know its precise location in the environment. The existing path finding methods are basica...
详细信息
The main goal of mobile robot navigation is the steering of a robot in any direction, in particularly towards the goal, and to know its precise location in the environment. The existing path finding methods are basically based on potential field method, vector field histogram and A* methods. Using these methods the finding of feasible path will not complete in reasonable short time for real-time operation. This paper is devoted to the development and implementation of path finding algorithm that obtains the path in required short time. A rapidly exploring random tree (RRT) algorithm that quickly finds a feasible solution is basically used to solve this problem. However, the RRT algorithm alone does not return better results. Here the integration of RRT with path smoothing techniques is considered. Through simulation it was shown that this algorithm has efficiently finds desirable and near optimal solutions in short time.
Both Principal Component Analysis (PCA) and Two-dimensional Principal Component Analysis (2DPCA) are successful face recognition algorithm. High recognition accuracy can be achieved using these two methods on the norm...
详细信息
Testing engineers in the third-party software testing center are often puzzled with some non-technical problems, such as, how to deal with the developers' reactance, and how to meet the end users' satisfaction...
详细信息
In this paper, we evaluate thresholding algorithms applied in wavelet filter bank (FB) based passive detection in radar and sonar systems. Addressing a random emission with unknown parameters, the emission and the rec...
详细信息
In this paper, we evaluate thresholding algorithms applied in wavelet filter bank (FB) based passive detection in radar and sonar systems. Addressing a random emission with unknown parameters, the emission and the received signal are modelled by a Gaussian process with unknown mean and variance. The wavelet FB decomposes the received signal into subchannels. A decision on the absence and presence of the emission is then made by thresholding against the FB outputs. Formulae are derived to prove the detection performance using different thresholding strategies. A graphical comparison of the detection performances with different strategies and in different scenarios is presented. Design principles are derived under this wavelet FB based detection framework.
We treat with an automated material handling system which we call Permutation Circulation-type Vehicle Routing System with short-cut (denoted PCVRS). In the PCVRS a fleet of vehicles unidirectionally and repeatedly ci...
详细信息
We treat with an automated material handling system which we call Permutation Circulation-type Vehicle Routing System with short-cut (denoted PCVRS). In the PCVRS a fleet of vehicles unidirectionally and repeatedly circulates on a single loop, and carry items to stations which are placed along the loop. One of the important issues for the PCVRS to be efficiently operated is to minimize interference or blocking between vehicles, which may deteriorate system performances. We analyze three vehicle routing rules which allocate jobs to station and show effect of optimization for a real system by means of simulation.
This paper presents an optimization analysis for energy and power management in microgrids with renewable energy resources and diesel generators. Dynamic Programming (DP) algorithm and the simplex method have been use...
详细信息
Wireless Body Area Networks (WBAN) is based on short-range wireless communication and low power consumption technologies. The network consists of heterogeneous nodes with different sensors. In order to satisfy the req...
详细信息
Present android-based location and message sharing system asks to input the personal information which fails to protect the privacy of information, has no centralized database which is causing the problem of data mana...
详细信息
Present android-based location and message sharing system asks to input the personal information which fails to protect the privacy of information, has no centralized database which is causing the problem of data management and portability, and one main drawback is unable to have a secured two way communication between webserver and android based application. And this Android-based Location and Message Sharing System (ALMSS) is proposed for solving above mention problem. The proposed system uses Java programming language for android mobile user application, PHP programming language as webserver, MySQL as external database to store the data, JSON as intermediary between android platform and webserver and uses symmetric cryptography while communicating between android device and webserver which finally assures the protection of information.
Internet of Things (IoT) has been paid more and more attention by the government, academe and industry all over the world because of its great prospect. This article introduced the concept of IoT, the basic properties...
详细信息
For the limitation of the wavelet transform in two-dimensional image, a block energy analysis contourlet domain watermarking algorithm is proposed. This algorithm is from contourlet factor analysis of the energy prece...
For the limitation of the wavelet transform in two-dimensional image, a block energy analysis contourlet domain watermarking algorithm is proposed. This algorithm is from contourlet factor analysis of the energy preceding firstly decompose the original image by contourlet, and choose the low-frequency sub-band decomposed image as a watermark frequency same In embedding sub-band, and then makes the low-sub-band for non-overlapping sub-blocks, at the time calculates each sub-block coefficients respectively. selecting a large block of energy to embed the encrypted watermark transform These scrambling, and then through the inversing of contourlet, the watermarked image is received. results prove that: the digital watermark embedding algorithm robustness has a good visual effect, and it also has a good of common image processing and geometric attacks.
暂无评论