This paper presents the behavior design and multimodal locomotion control of a biomimetic amphibious robot based on a bio-inspired CPG (central pattern generator). A set of four key parameters are introduced serving a...
详细信息
This paper presents the behavior design and multimodal locomotion control of a biomimetic amphibious robot based on a bio-inspired CPG (central pattern generator). A set of four key parameters are introduced serving as external stimuli to shape the CPG rhythmic activities where necessary speed and orientation modulation as well as 3-D locomotion can be obtained. In terms of the built parameter set, a library of movement primitives based on finite state machine is established to facilitate rapid and smooth gait transitions. To enhance adaptive behaviors, well-integrated sensory feedback by means of two liquid-level detectors enables the gait transition between ground and water autonomously. Simulations and experiments are also conducted to demonstrate the feasibility of a behaviorbased control architecture governed by CPGs.
This paper addresses different institutional and technological contexts, which must be considered when implementing e-government features at local authorities. Estonian success in establishment of nation-wide digital ...
详细信息
This paper addresses different institutional and technological contexts, which must be considered when implementing e-government features at local authorities. Estonian success in establishment of nation-wide digital record management is based on broad use of various centralized IT solutions (Xroad, DEC etc.) and provision of interoperability of those solutions. Initial prerequisite for efficient paperless and record management is a well-implemented and well-operating electronic record management system that constitutes the main process layer of a local authority. This paper is based on e-governance projectl which has enabled to provide facilities for paperless management in about 100 local authorities. The paper concludes with a discussion of the advantages of service-based orientation for this project, and based on this, recommendations for similar projects with an infrastructural component undertaken by local governments.
In this paper, the performance characteristics of a three-phase brushless DC motor with permanent magnet salient pole are investigated. The studied motor is a three-phase synchronous machine with permanent magnet roto...
详细信息
In this paper, the performance characteristics of a three-phase brushless DC motor with permanent magnet salient pole are investigated. The studied motor is a three-phase synchronous machine with permanent magnet rotor. Stator windings of the motor are fed by a three-phase five-level inverter. In order to control the motor speed, a Pi-controller is used. The parameters of PI controller are optimized using a simulink block called signal constraint. The voltages produced by the inverter are more close to the sine wave; as a result performance characteristics of the motor such as torque pulsations and speed ripples are improved. The simulations are done using matlab\simulink.
Some improvements are made to Apriori algorithm based on SQL, thus reduce the number of intermediate tables, save the memory space and improve the efficiency of the algorithm. The improved algorithm is applied in rail...
详细信息
Some improvements are made to Apriori algorithm based on SQL, thus reduce the number of intermediate tables, save the memory space and improve the efficiency of the algorithm. The improved algorithm is applied in railway tunnel lining condition monitoring data management system. Design the test process of this algorithm, and mine frequency sets, then gets the association rules between different tunnel diseases to better guide the tunnel disease prevention and maintenance work.
This paper describes the design and implementation of the new Japanese academic backbone network, called SINET4, which started full operation in April 2011. The network was designed to serve as a higher-speed and more...
详细信息
This paper describes the design and implementation of the new Japanese academic backbone network, called SINET4, which started full operation in April 2011. The network was designed to serve as a higher-speed and more reliable infrastructure than the previous network, SINET3, as well as to provide a variety of multilayer network services. The network was subjected to the disastrous March 11 earthquake during the migration from SINET3 to SINET4 but did not suffer serious damage thanks to the new network design. We present the network design concept, networking technologies applied, and effects of the earthquake.
Severe resource limitations in certain types of networks lead to various open issues in security. Since such networks usually operate in unattended or hostile environments, revoking the cryptographic keys and establis...
详细信息
Severe resource limitations in certain types of networks lead to various open issues in security. Since such networks usually operate in unattended or hostile environments, revoking the cryptographic keys and establishing (also distributing) new keys - which we refer to as key update - is a critical security issue. In this paper, we investigate the behaviour of different key update strategies under deviant network conditions. We consider resource-critical networks that employ symmetric cryptography and rely on (shared) network keys. We provide a methodology for quantitative security and performance analysis, and present a case study covering six different key update strategies.
Protected Multichannel FSO communication system is described. FSO communication channel speckle distribution is considered. An Influence of both small and large size photodetectors is analyzed. Possibility to realize ...
详细信息
Protected Multichannel FSO communication system is described. FSO communication channel speckle distribution is considered. An Influence of both small and large size photodetectors is analyzed. Possibility to realize a protected channel of communication is presented. Sample of optical systems optimization is given. An Eyesafe wavelength optical band receiving module design is presented. Sensitivity and noise parameters are considered. Variable schematic decisions with different types of photodiodes are submitted. Technical solutions to optimize design are presented. Parameters of designed Photodetector module are given.
This paper presents a method to accurately identify the yaw-dynamic model of an unmanned ***,the model39;s structure is established by dynamic *** the model is reconstructed into a combination of three secondorder *...
详细信息
This paper presents a method to accurately identify the yaw-dynamic model of an unmanned ***,the model's structure is established by dynamic *** the model is reconstructed into a combination of three secondorder *** the distribution of the damp ratios and natural frequencies of a second-order subsystems is limited,the model can be accurately identified from real-flight-test ***,experiments are carried out to identify the yaw dynamic *** shown the modeling accuracy is improved through this approach.
VoIP (Voice over IP) is a modern service with enormous potential for yet further growth. It uses the already available and universally implemented IP transport platform. One significant problem, however, is ensuring t...
详细信息
VoIP (Voice over IP) is a modern service with enormous potential for yet further growth. It uses the already available and universally implemented IP transport platform. One significant problem, however, is ensuring the Quality of Service, abbreviated QoS. This paper addresses exactly that issue. In an extensive investigation the influence of jitter buffers on QoS is being examined in depth. Two implementations, namely a passive FIFO buffer and an active PJSIP buffer are considered. The results obtained are presented in several diagrams and interpreted. They provide valuable insights and indications as to how procedures to ensure QoS in IP networks can be planned and implemented. The paper concludes with a summary and outlook on further work.
Web log mining is an important area of Web Usage Mining (WUM) for discovering useful information from web log files produced by web servers. According to the mining task, user access patterns can be extracted and the ...
详细信息
ISBN:
(纸本)9781457708879
Web log mining is an important area of Web Usage Mining (WUM) for discovering useful information from web log files produced by web servers. According to the mining task, user access patterns can be extracted and the result can be applied to improve websites, business intelligence systems and other areas. In this paper, we propose a novel approach for exacting user access patterns by achieving a large event set and improving the BI-Directional Extension closure checking method (BIDE). The process of getting a large event set can filter out the more frequent events and discard the infrequent events to reduce the number of data. Compared with other methods, the BIDE method with the constraint of gap can achieve a more efficient mining process and generate more accurate results. In our experiment, the effect of the mining task is discussed and the applications of this approach are presented.
暂无评论