The proceedings contain 61 papers. The topics discussed include: a method for detecting abnormal datas of transfomer-users based on deep learning;design of intelligent guide car;a model for completing the transformer-...
ISBN:
(纸本)9798331541668
The proceedings contain 61 papers. The topics discussed include: a method for detecting abnormal datas of transfomer-users based on deep learning;design of intelligent guide car;a model for completing the transformer-user linked data based on variational autoencoder and generative adversarial networks;improved direct torque control based on permanent magnet synchronous motor;principle and parameter setting method of PSS2B model of ieee;design and implementation of an agricultural logistics control system based on IoT technology;artificial intelligence-based interference signal recognition for satellite communications;and model-driven behavioral modeling and verification methods for human-machine hybrid intelligentsystems.
With the advent of advanced Transportation Management and Information System (ATMUS), much attention has been paid to probe vehicles (PVs) sampling for real-time traffic data collection. In this paper, the sample size...
详细信息
ISBN:
(纸本)0780392159
With the advent of advanced Transportation Management and Information System (ATMUS), much attention has been paid to probe vehicles (PVs) sampling for real-time traffic data collection. In this paper, the sample size of PVs was discussed and an analytical model was established based on the time-varying link traffic density. In this model, many factors that would affect the accuracy of probe data were included, such as location precision, road type and link length. The Chris's PVs sampling size model (E) over bar = 1-e(-alpha pL) was exactly proved to be the ideal case of ours. Moreover, for the sake of application of this model, the capacity constrains of wireless communication system was combined. Generally, the findings of this study serve as the first step to start the vehicles sampling for the real-time traffic data collection.
As power systems become more intelligent, the intelligent structure of two-ticket system in power grids is key to improving efficiency and safety. This paper investigates the integration of edge computing, artificial ...
详细信息
The proceedings contain 105 papers. The topics discussed include: a position free boresight calibration for INS-camera systems;proton: a visuo-haptic dataacquisition system for robotic learning of surface properties;...
ISBN:
(纸本)9781467397087
The proceedings contain 105 papers. The topics discussed include: a position free boresight calibration for INS-camera systems;proton: a visuo-haptic dataacquisition system for robotic learning of surface properties;depth data fusion for simultaneous localization and mapping - RGB-DD SLAM;towards integrated threat assessment and sensor management: Bayesian multi-target search;high accuracy 3D dataacquisition using co-registered OCT and Kinect;fusing cyclic sensor data with different cycle length;collaborative multi-sensor image transmission and data fusion in mobile visual sensor networks equipped with RGB-D cameras;learning representations for discrete sensor networks using tensor decompositions;a computer-aided assistance system for resource-optimal sensor scheduling in intelligence, surveillance, and reconnaissance;fusion of wearable sensors and mobile haptic robot for the assessment in upper limb rehabilitation;blind model-based fusion of multi-band and panchromatic images;an improved ViBe for video moving object detection based on evidential reasoning;ground reaction force estimation using insole plantar pressure measurement system from single-leg standing;environment-aware sensor fusion for obstacle detection;a new concept for a cooperative fusion platform;joint bias estimation and localization in factor graph;and object management strategy for an unified high level automotive sensor fusion framework.
Order-theoretic lattices and their visualizations are proposed as a means of exploring and analyzing databases. The max-complete lattice is formed and the significance of lattice nodes and of the top node are demonstr...
详细信息
ISBN:
(纸本)9781665426060
Order-theoretic lattices and their visualizations are proposed as a means of exploring and analyzing databases. The max-complete lattice is formed and the significance of lattice nodes and of the top node are demonstrated. These novel visualizations serve as a useful complement to well-known charting techniques such as bar charts and may extend the knowledge gained from critical databases. The Carver2 dataset is used as an illustrative example, highlighting the formation of the max-complete lattice from the original dataset and the computational advantage provided by compressing the lattice using only its irreducible elements. Regional information from the Global Terrorism database (GTD), which has been extensively analyzed and visualized using well-known methods, is visualized using max-complete lattices, and juxtaposing the GTD lattice visualizations with corresponding bar charts demonstrates their complementary nature.
This paper presents a method of using optical sensor for mobile robot localization, which improves the accuracy of position estimation by using extended Kalman filter to fuse three kinds of sensor data. By installing ...
详细信息
The monitoring system mainly by the programmable logic controller (PLC) and Fieldbus (PROFIBUS) composition, using programmable logic controller (PLC) on the medium-density fibreboard (MDF) production lines for real-t...
详细信息
The paper presents a new method for detecting virus based on the Maximum Entropy Model. This method is also used to detect unknown viruses. Maximum Entropy is a machine learning method based on probability distributio...
详细信息
ISBN:
(数字)9783319179964
ISBN:
(纸本)9783319179964;9783319179957
The paper presents a new method for detecting virus based on the Maximum Entropy Model. This method is also used to detect unknown viruses. Maximum Entropy is a machine learning method based on probability distribution and has been successfully applied in the classification problem. From the background knowledge, we improve and apply this model to solve the problem of virus detection. In the training phase, virus samples in the virus warehouse are extracted their features and trained to create the Entropy Model. In the detection process, the Entropy Model is used to recognize virus based on the corresponding features of a checked file.
The critical infrastructures (CIs) on which our daily life depends are mutually interdependent. What happens to one infrastructure can directly or indirectly affect another infrastructure or maybe even more. The devel...
详细信息
ISBN:
(纸本)9781424448692
The critical infrastructures (CIs) on which our daily life depends are mutually interdependent. What happens to one infrastructure can directly or indirectly affect another infrastructure or maybe even more. The development of advanced techniques of modeling and simulation is significant for the interdependencies study between CIs. In this paper, an approach to model critical infrastructures as well as adopting HLA (High Level Architecture) standard to simulate the interoperations between individual models under system-of-systems design architecture is proposed. Two examples of interdependent systems (CIs), which are studied in this approach, are : Electric Power Supply (EPS) System and Supervisory Control and dataacquisition (SCADA) System.
Industrial application of digital control requires the synergy between well designed control algorithms and carefully implemented control systems. The control performances can be strongly influenced depending on the d...
详细信息
ISBN:
(纸本)0769509304
Industrial application of digital control requires the synergy between well designed control algorithms and carefully implemented control systems. The control performances can be strongly influenced depending on the dataacquisition and control action delays. The paper shows how to evaluate these delays (litter) under static or dynamic scheduling policies. An evaluation of several set of tasks executed under both scheduling policies is analysed and compared. The results allow us to determine the goodness of both algorithms with respect to the delays due to scheduling. While worst case response time in static scheduling can be easily determined, under EDF scheduling the result is not trivial. A method to determine the worst case response time under EDF scheduling is proposed. The measurement of these delays can be drastically reduced with a task decomposition This decomposition is studied and evaluated from the delays point of view. The reduction of the dataacquisition interval (DAI) and control action interval (CAI) under both scheduling policies can be considered in the control design phase in order to properly adjust the control algorithm.
暂无评论