To avoid the dramatic impact due to the agricultural pests, computer vision technology used to recognize agricultural pests has been a focal spot. Nevertheless, there have been some significant challenges about fine-g...
详细信息
This paper presents a modified position tracking control strategy using command filtering backstepping for the flexible-joint ***,the second-order command filter is adopted in the backstepping procedure to derive the ...
详细信息
ISBN:
(数字)9781728158556
ISBN:
(纸本)9781728158556;9781728158563
This paper presents a modified position tracking control strategy using command filtering backstepping for the flexible-joint ***,the second-order command filter is adopted in the backstepping procedure to derive the virtual control function and its *** problem of "explosion of complexity" caused by the calculation of the partial derivatives of virtual control inputs is ***,to reduce the filtering error caused by adopting the command filter,the filtering error compensation is designed,and the stability of the tracking error closed-loop system is verified based on Lyapunov stability ***,simulation results on single-link flexible-joint manipulator show that the tracking accuracy is increased by about 12.8%,which indicate the position tracking accuracy is guaranteed by the proposed control method.
This paper presents a Filter bank based M estimator technique for analyzing the signals corrupted with interference and noise. The interference is detected from the frequency spectra of the subband signals at the outp...
详细信息
ISBN:
(纸本)9781467391955
This paper presents a Filter bank based M estimator technique for analyzing the signals corrupted with interference and noise. The interference is detected from the frequency spectra of the subband signals at the output of the Analysis filter bank. A new M-estimator based iterativ technique is proposed to eliminate the detected interference. Th Cosine modulated filter bank is used in designing analysis and synthesis filters because of its Perfect reconstruction and easy implementation property. The efficacy of the proposed techniqu is demonstrated through simulation results considering a speech signal with added interference. Further, the performance of M estimator based technique is compared with the band elimination technique for interference cancellation in speech signals Simulation results show the effectiveness of the proposed technique in the analysis of noise contaminated speech signals.
This paper proposes a robust H-{\infty} trajectory following controller for autonomous vehicles with delays and packet dropout. The network-induced delay and dropout will degrade the control effect and system performa...
详细信息
Based on our previous work on the use of subspace distances for the outlier detection problem in video sequences under affine projection, this paper reports our further analysis of the problem and presents two algorit...
详细信息
ISBN:
(纸本)9810474806
Based on our previous work on the use of subspace distances for the outlier detection problem in video sequences under affine projection, this paper reports our further analysis of the problem and presents two algorithms for computing the reprojection errors of image features in the outlier detection process. Extensive experiments on real video sequences have been conducted to verify the performance of the algorithms. The key contributions of the paper are presentation of the relationship between subspace distances and reprojection errors and demonstration that reprojection errors can be estimated without explicitly computing the projective structure.
A peak-picking method has been proposed and integrated into baseline AMDFs for pitch detection. Many of the known peak-picking methods for AMDF/ACF based PDAs expect to search the sole peak located at pitch period. Ho...
详细信息
ISBN:
(纸本)9781467391955
A peak-picking method has been proposed and integrated into baseline AMDFs for pitch detection. Many of the known peak-picking methods for AMDF/ACF based PDAs expect to search the sole peak located at pitch period. However, it is a fact that correct pitch information is also contained in the peaks located at positive integer multiple of pitch period, whose existence are strong evidence of the validity of detected pitch as well. The proposed peak-picking method uses clustering analysis searching these peaks as many as possible. A necessary condition and some constraints are used to select the optimal cluster produced by clustering analysis. The proposed method shows a very good adaptability and noise-robustness. 5 improved AMDFs are employed to evaluate performance of proposed peak-picking method. Gauss white noise is added into speech for anti-noise tests. Experiments indicate slight improvements in low-noise environments and clear improvements in high-noise environments compared with the reference PDAs.
Unit 1 and unit 2 of a company tripped because the root switches of two units were connected. Due to the "BYPASS" function in the industrial intrusion detection system in the safety protection system, when t...
详细信息
Unit 1 and unit 2 of a company tripped because the root switches of two units were connected. Due to the "BYPASS" function in the industrial intrusion detection system in the safety protection system, when the "BYPASS" function is activated in the state of power loss, the two network interfaces (No. 1 and No. 2) on the industrial intrusion detection system are physically connected, and the security switch in the safety protection system of unit 2 is not configured. At this time, the whole safety protection system becomes a conduction loop, the root switch of the DCS system of unit 1 and unit 2 is connected, and the SID address of some parameters in the DCS system of the two units is the same, resulting in data conflict in the DCS system of unit 1 and unit 2. As a result, the 0/1 state of switch measurement point of Unit 1 "backpressure overlimit jumper 1", "backpressure overlimit jumper 2" and Unit 2 "backpressure overlimit jumper 1" are flipped. Error signal command is issued, unit 1 and 2 trip out of column.
Vehicle automation is now a very warm topic of all kinds of automation. Several vehicle brands are researching this issue and they have already made some of the amazing automated vehicles. They are available in the ma...
详细信息
The transformation of operators' traffic management, the demand for refined management, and the improvement of users' satisfaction have put forward higher requirements for network maintenance. In order to bett...
ISBN:
(数字)9781728143903
ISBN:
(纸本)9781728143910
The transformation of operators' traffic management, the demand for refined management, and the improvement of users' satisfaction have put forward higher requirements for network maintenance. In order to better network fine operation and maintenance management around user perception, this paper analyzes the influence of quality of service (QoS) and quality of experience (QoE) on users' subjective feelings, establishes an evaluation model to quantify user experience quality, and lists a practical application scenario using this model.
With the continuous advancement of Internet technology and industrial digitalization, many new technologies have been applied to industrial control networks. The level of intelligence and automation of industrial cont...
详细信息
暂无评论