In this paper, we propose a new virtual model control(VMC) algorithm combining inverse dynamic control and optimization. In our framework, inverse dynamics algorithm finds the feedforward term of the expected torque o...
详细信息
ISBN:
(纸本)9781665405362
In this paper, we propose a new virtual model control(VMC) algorithm combining inverse dynamic control and optimization. In our framework, inverse dynamics algorithm finds the feedforward term of the expected torque of the robot’s centroid. The optimization algorithm finds the optimal foot force based on the sum of the feedforward calculated by the inverse dynamics and the virtual force at the center of mass(COM) calculated by the traditional VMC. We demonstrate the feasibility of our proposed algorithm in the dynamic simulation software.
The basic operations of the round function of any block cipher are substitution and permutation. The article discusses approaches to the implementation of the replacement operation. The main cryptographic primitive, n...
详细信息
ISBN:
(数字)9781665404761
ISBN:
(纸本)9781665446426
The basic operations of the round function of any block cipher are substitution and permutation. The article discusses approaches to the implementation of the replacement operation. The main cryptographic primitive, namely the block of substitutions or S-block, and its variations, such as, the R-block, are considered. Requirements for a high-quality substitution block are formulated. The approaches to the assessment of replacement blocks are analyzed. Methods to improve their efficiency are proposed. Forecasts for the development of replacement blocks are made.
We present a robust, parts-based data compression algorithm, L21 Semi-Nonnegative Matrix Factorization (L21 SNF) for mixed-sign data. To resolve the instability issue caused by the Frobenius norm due to the effects of...
详细信息
We present a robust, parts-based data compression algorithm, L21 Semi-Nonnegative Matrix Factorization (L21 SNF) for mixed-sign data. To resolve the instability issue caused by the Frobenius norm due to the effects of outliers, we utilize the noise-free L2,1 norm and a regularization parameter in our algorithm. We derive a rigorous proof of convergence of our algorithm. Based on experiments on large-scale over-determined matrices and real facial image data, L21 SNF demonstrates a significant improvement in accuracy over other classical methods. Furthermore, L21 SNF has a simple programming structure and can be implemented within data compression software for compression of highly over-determined systems encountered broadly across many general machine learning processes.
The special grammar and abstruse rhetoric of Tang and Song poetry doomed the diversity of poetry research. In order to help scholars explore the information space of poetry, we took into account the breadth and depth ...
详细信息
ISBN:
(纸本)9781665418430;9781665448260
The special grammar and abstruse rhetoric of Tang and Song poetry doomed the diversity of poetry research. In order to help scholars explore the information space of poetry, we took into account the breadth and depth of learning, combined with heterogeneous data sources such as poetry, videos, textbooks, knowledge graph and other media sources, and carried out visual modeling. We provide a visual and informative platform to demonstrate the potential power of visualization. It supports comprehensive search capabilities for multiple types of data, online generation of poets' knowledge graphs. Relationship diagram, word cloud diagram, pie chart and other visual charts are displayed on the platform, so that users can complete exploratory visual analysis by dragging, clicking and typing.
The object of consideration is design automation and prototyping of complex signals and their generation and processing devices. The subject of the analysis is the substantiation of the structure, composition and impl...
详细信息
ISBN:
(纸本)9781665415484;9781665446983
The object of consideration is design automation and prototyping of complex signals and their generation and processing devices. The subject of the analysis is the substantiation of the structure, composition and implementation method of a modeling system aimed at modeling and prototyping promising devices for the generation and processing of complex signals based on fast transformations in Galois fields. The purpose of the analysis is a reasonable choice of methods and tools for computational, simulation and prototyping that achieve high display accuracy, performance, flexibility and ease of modeling. The solutions are based on the principles and mathematical models developed by the authors: methods and algorithms for fast transformations in Galois fields, an algebraic representation model and the structure of fast delay acquisition devices for a subclass of sequences. The article is devoted to the development of a software and hardware modeling systems that allows the most accurate mapping of fast algebraic transformations in Galois fields to algorithmic models of various levels of representation to ensure high performance, flexibility and ease of modeling, as well as prototyping of promising devices for the generation and processing of complex signals. The results of the work will be useful in the design of promising devices of various information and communication systems, scientific research, as well as in the educational process.
This paper presents the sizing optimization of photovoltaic panels and batteries in home energy management systems using the in-house developed web-based application. The application can recommend an optimal size of t...
详细信息
This paper presents the sizing optimization of photovoltaic panels and batteries in home energy management systems using the in-house developed web-based application. The application can recommend an optimal size of the PV panels and batteries to minimize power consumption from the grid for residential homes. Users can vary configurations and energy constraints, such as a home load profile and include EV in their design for best results. The optimization algorithm is performed on the developer side and the results are rendered on the web-based user interface. A case study of a residential house with a monthly electricity usage of 366 kWh is chosen to test the developed software. With the design suggestion, the system is simulated with real irradiance data over a month and it is found that this house has a potential of lower grid energy consumption up to 20% with 2 PV panels installed and the saving number increases to nearly 100% saving with both PV and battery installed.
Numeric Controls are common today for the automated control of machining tools. High speed computer is used as an interface to implement such controls. This study aims to generate a G-code, directly from a drawing, Au...
详细信息
ISBN:
(纸本)9781665444804
Numeric Controls are common today for the automated control of machining tools. High speed computer is used as an interface to implement such controls. This study aims to generate a G-code, directly from a drawing, AutoCAD, file and upload the same as a compatible G-Code for the NC Machine. This paper details the approach (concepts) and describes various steps involved in implementation from data extraction to transformation of data to G-Code.
Passwords has been used as an authentication method for Web services, but it has some issues in terms of usability and security. FIDO solves these problems and is now being used as an authentication method. It consist...
详细信息
ISBN:
(纸本)9781665478373
Passwords has been used as an authentication method for Web services, but it has some issues in terms of usability and security. FIDO solves these problems and is now being used as an authentication method. It consists of two elements: signature verification using public key cryptography and local authentication using an authenticator such as a user's device. It is a robust authentication method that is resistant to current mainstream attacks. When FIDO authentication is used to grant special access rights to agents other than the user, it is necessary to implement access control as a system. We propose to extend the specification of FIDO authentication to use Attribute- Based Signatures, where the access control is based on the cryptographic used for authentication. We also implement an extended FIDO authenticator for the proposed method.
Live delivery as a new e-commerce marketing model is in a period of rapid development. It uses algorithms to review content and optimize resource allocation to increase traffic and transaction data. It has become an e...
详细信息
ISBN:
(纸本)9781665427104
Live delivery as a new e-commerce marketing model is in a period of rapid development. It uses algorithms to review content and optimize resource allocation to increase traffic and transaction data. It has become an essential online retail model in China in the era of big data. This article focuses on the evolvement of big data, summarizing the development process and communication characteristics of China's live broadcast e-commerce model and reflects on the ways and algorithmic mechanisms of algorithms participating in China's live broadcast e-commerce model.
The proposed study is devoted to the development of an algorithm for detecting network attacks. The considered approach to detection of attacks is based on monitoring and the description of states of the behavior of d...
详细信息
ISBN:
(纸本)9781665442589
The proposed study is devoted to the development of an algorithm for detecting network attacks. The considered approach to detection of attacks is based on monitoring and the description of states of the behavior of data packets in networks of the Internet of things. The developed network attack detection subsystem demonstrates high efficiency in detecting unknown deviations in the process of data packet transmission. The proposed attack detection technology can be used to protect data packets in public IoT networks, where there is a high probability of new cyberattacks. The greatest efficiency of the developed algorithm is achieved in IoT systems, where the use of classes of certain network attacks is limited to online services and does not change significantly over time. This algorithm allows the use of programmed models of the normal behavior of network packets to detect possible cyberattacks.
暂无评论