Unmanned aerial vehicles (UAVs) are gaining in popularity across a broad spectrum of applications and fields. Two of the main challenges faced when developing autonomous, multi-agent UAV systems is the software develo...
详细信息
Unmanned aerial vehicles (UAVs) are gaining in popularity across a broad spectrum of applications and fields. Two of the main challenges faced when developing autonomous, multi-agent UAV systems is the software development and simulation cycle and the flight test cycle. Each of these aspects can be time consuming and introduce other difficulties, ultimately hindering the mission design and development cycle. In order to address the drawbacks of conventional UAV systems development, the vehicle abstraction layer (VAL) is being developed as part of the Quanser Cooperative Control Framework (QCCF). the goal of the VAL is to provide a robust, portable, multi-agent cooperative control rapid prototyping environment for unmanned aircraft. the VAL allows for vehicle simulation as well as actual flight testing using the same framework, alleviating the need for iterative in-field testing and minimizing the transition from simulation to flight. the VAL enables high-level decision making and control design for multi-vehicle control, high-fidelity simulation and seamless integration on any real Commercial Off-the-Shelf (COTS) UAV system. the framework is open with existing modules (such as vehicle models) available for use as templates for the addition of user-supplied components.
In this paper we describe the design and initial evaluation of a tangible computer programming exhibit for children on display at the Boston Museum of Science. We also discuss five design considerations for tangible i...
详细信息
ISBN:
(纸本)9781595939944
In this paper we describe the design and initial evaluation of a tangible computer programming exhibit for children on display at the Boston Museum of Science. We also discuss five design considerations for tangible interfaces in science museums that guided our development and evaluation. In doing so, we propose the notion of passive tangible interfaces. Passive tangibles serve as a way to address practical issues involving tangible interaction in public settings and as a design strategy to promote reflective thinking. Results from our evaluation indicate that passive tangibles can preserve many of the benefits of tangible interaction for informal science learning while remaining cost-effective and reliable.
there has been a lot of interest of late for programming languages that incorporate features from dependent type systems and proof assistants, in order to capture important invariants of the program in the types. this...
详细信息
there has been a lot of interest of late for programming languages that incorporate features from dependent type systems and proof assistants, in order to capture important invariants of the program in the types. this allows type-based program verification and is a promising compromise between plain old types and full blown Hoare logic proofs. the introduction of GADTs in GHC (and more recently type families) made such dependent typing available in an industry-quality implementation, making it possible to consider its use in large scale programs. We have undertaken the construction of a complete compiler for System F, whose main property is that the GHC type checker verifies mechanically that each phase of the compiler properly preserves types. Our particular focus is on "types rather than proofs": reasonably few annotations that do not overwhelm the actual code. We believe it should be possible to write such a type-preserving compiler with an amount of extra code comparable to what is necessary for typical typed intermediate languages, but withthe advantage of static checking. We will show in this paper the remaining hurdles to reach this goal.
作者:
Abdellah BenzaouiaAhmed El HajjajiMustapha OuladsineLAEPT
University Cadi Ayyad Marrakech Morocco 7
Rue de Moulin Neuf 8000 Amiens University of Picardie Jules Vernes (UPJV) France LIS-UMR 7020
University of Paul Cezanne-Aix-Marseille Domaine Universitaire de Saint-Jerome Avenue Escadrille Normandie-Niemen 13397 Marseille Cedex 20 France
this paper studies the stability and stabilization problem of Takagi-Sugeno (T-S) fuzzy systems with time-varying delay by using linear programming (LP) technique while imposing positivity in closed-loop. New delay-de...
this paper studies the stability and stabilization problem of Takagi-Sugeno (T-S) fuzzy systems with time-varying delay by using linear programming (LP) technique while imposing positivity in closed-loop. New delay-dependent stabilization conditions are derived using a new Lyapunov-Krasovskii functional (LKF). To show the advantages of the proposed design procedure, a numerical example is studied.
this paper presents a novel method for predicting crowd flow in various scenarios, such as workplaces, corporate campuses, and train stations, using a multi-task attention-based network, CNE-CBAM. the method first con...
详细信息
ISBN:
(数字)9798350354973
ISBN:
(纸本)9798350354980
this paper presents a novel method for predicting crowd flow in various scenarios, such as workplaces, corporate campuses, and train stations, using a multi-task attention-based network, CNE-CBAM. the method first constructs a topological map of the scene using an adjacency matrix to model connections between different regions. the crowd number estimation network predicts the number of people in each area, leveraging attention mechanisms to enhance accuracy. To estimate crowd flow between regions, a linear programming model is applied, optimizing the flow of people based on movement data. Experiments conducted demonstrate the high accuracy of the model. this method offers valuable insights for optimizing space planning, safety measures, and operational efficiency in crowded public areas.
the economic growth in thailand has occurred in many areas, there are the infrastructure and megaprojects are produced by the government and the private sector. Although, the construction project favors to use the rea...
详细信息
ISBN:
(数字)9781728167855
ISBN:
(纸本)9781728167862
the economic growth in thailand has occurred in many areas, there are the infrastructure and megaprojects are produced by the government and the private sector. Although, the construction project favors to use the ready-mixed concrete for main structures work. But the facility's location of the ready-mix concrete plant exists in the area is not suitably distributed for responding service at the demand point. However, it caused damage to the business because there was not a good plan for setting up the ready- mixed concrete plant facilities. the objective of this paper is to find the least number of the ready-mix concrete plant and it can be suitably the facility location that covers all expected demand nodes. the method used for searching locations of this work is the optimization modeling by using mixed integer programming with a set covering problem (LSCP) approach. Besides, we applicated this problem in Rayong province, thailand, which is cased our study. the results indicate that setting ready-mix concrete plants at Mueang Rayong district and Klaeng district can sufficiently service the whole Rayong province.
Conceptual design is where bridges are conceived.A good conceptual design must properly consider what may be required in the preliminary design stage,detailed design stage and construction design stage; it must assure...
Conceptual design is where bridges are conceived.A good conceptual design must properly consider what may be required in the preliminary design stage,detailed design stage and construction design stage; it must assure that the proposed concept is safe,functional,economical and pleasing to the *** every bridge is unique,the conceptual design must begin by being *** conceptual design is our best opportunity for innovative thinking and it is where new ideas are conceived!
Symbolic computation, as a focal point of research in automated reasoning, has made significant strides in recent decades, particularly in solving polynomial equations systems. Several computer algebra systems have be...
详细信息
ISBN:
(数字)9798350385106
ISBN:
(纸本)9798350385113
Symbolic computation, as a focal point of research in automated reasoning, has made significant strides in recent decades, particularly in solving polynomial equations systems. Several computer algebra systems have been developed to assist humans in advanced mathematics, physics, engineering, and other fields. Inference rules are often described in code, requiring proficiency in their specific syntax for editing, which poses a challenge for non-programmer users. this paper introduces a novel approach utilizing an expression tree-based matching algorithm. this method matches rule expressions with instance expressions in a human-like manner, identifying multiple sets of variable substitutions. It achieves expression-level rule design independent of programming, making it applicable directly for formula equivalence transformations and inequality scaling.
In today's environment, a reliable and effective technique for identifying spam reviews is essential if you want to purchase things online without being taken advantage of. there are possibilities for publishing r...
详细信息
In today's environment, a reliable and effective technique for identifying spam reviews is essential if you want to purchase things online without being taken advantage of. there are possibilities for publishing reviews in many internet locations, which opens the door for sponsored or deceptive fake reviews. these fabricated evaluations may mislead the general audience and leave them unsure of whether or not to believe them. the issue of spam review finding has been solved by the introduction of prominent deep literacy methods. the focus of recent research has been on supervised literacy practices that contain labelled data, which is inadequate for online review. this initiative aims to expose any dishonest textbook reviews. To do this, we've used both labelled and unlabeled data and suggested deep learning techniques for spam review detection, including Multi-Layer Perceptron (MLP), Convolutional Neural Networks (CNN), and a Long Short-Term Memory (LSTM) variation of Recurrent Neural Networks (RNN). We also used standard machine learning classifiers to identify spam reviews, including Naive Bayes (NB), K Nearest Neighbor (KNN), and Support Vector Machine (SVM). Finally, we compared the effectiveness of traditional and deep literacy classifiers. We'll use deep literacy classifiers to boost the finesse and efficiency.
暂无评论