An EMG-driven arm wrestling robot (AWR) is being developed in our laboratories for the purposes of studying neuromuscular control of arm movements. The AWR arm have 2-DOF, integrated with mechanical arm, elbow/wrist f...
详细信息
An EMG-driven arm wrestling robot (AWR) is being developed in our laboratories for the purposes of studying neuromuscular control of arm movements. The AWR arm have 2-DOF, integrated with mechanical arm, elbow/wrist force sensors, servo motor, encoder, 3-D MEMS accelerometer, and USB camera, is used to estimate tension developed by individual muscles based on recorded electromyograms (EMGs). The surface electromyographic signal form the upper limb is sampled from a real player in same conditions. By using the method of wavelet packet transformation (WPT) and auto regressive model (AR), the characteristics of EMG signals can be extracted. Artificial neural network is adopted to estimate the elbow joint torque. The effectiveness of the humanoid algorithm using torque control estimated via WRT and neural network is confirmed by experiments. The purpose of this paper is to describe the design objectives, fundamental components and implementation of our real-time, EMG-driven AWR arm.
In this research, we propose an integrated and interactive framework to manage and retrieve large scale video archives. The video data are modeled by a hierarchical learning mechanism called HMMM (hierarchical Markov ...
详细信息
In this research, we propose an integrated and interactive framework to manage and retrieve large scale video archives. The video data are modeled by a hierarchical learning mechanism called HMMM (hierarchical Markov model mediator) and indexed by an innovative semantic video database clustering strategy. The cumulated user feedbacks are reused to update the affinity relationships of the video objects as well as their initial state probabilities. Correspondingly, both the high level semantics and user perceptions are employed in the video clustering strategy. The clustered video database is capable of providing appealing multimedia experience to the users because the modeled multimedia database system can learn the user's preferences and interests interactively
This paper is devoted to a generalized particle model (GPM) approach to distributed problem-solving in MAS, which transforms the optimization problem of resource assignments and task allocations of MAS in complex envi...
详细信息
This paper is devoted to a generalized particle model (GPM) approach to distributed problem-solving in MAS, which transforms the optimization problem of resource assignments and task allocations of MAS in complex environment into the kinematics and dynamics in GPM. The complex environment in MAS that the proposed GPM approach may deal with includes: A variety of interactions randomly and concurrently occurring among agents;different personality and autonomy of distinct agents;different life-cycle period, congestion degree and failure rate for distinct entities in MAS. At first, the relation between the GPM and MAS in the context of distributed problem-solving is expatiated. Then the mathematical-physical formalization for GPM and the parallel algorithm GPMA are presented. The basic properties of the GPMA algorithm, including the feasibility, convergency and stability, are discussed. Through a number of simulation experiments and comparisons related to resource assignments and task allocations in MAS in complex environment, the authors demonstrate many advantages of the proposed GPM approach over other coalition methods for MAS problem-solving in terms of the parallelism and the suitability for complex environment.
In 1999, Sun et al. proposed a new (t, n) threshold proxy signature scheme based on Zhang's threshold proxy signature scheme. But in 2003 Hsu et al. pointed out that Sun's scheme suffered from a drawback and d...
详细信息
In 1999, Sun et al. proposed a new (t, n) threshold proxy signature scheme based on Zhang's threshold proxy signature scheme. But in 2003 Hsu et al. pointed out that Sun's scheme suffered from a drawback and demonstrated an improvement to counter it. In this paper we point out that Hsu's scheme suffers from an insider attack against their scheme. That is, a malicious proxy signer can forge a valid threshold proxy signature on any message. To thwart this attack, some improvements are further proposed.
An intensive operating period (IOP) was conducted at the U. S. Department of Energy's atmospheric radiation measurement (ARM) program's field site near Barrow, Alaska, during March 9 to April 9 2004. During th...
详细信息
An intensive operating period (IOP) was conducted at the U. S. Department of Energy's atmospheric radiation measurement (ARM) program's field site near Barrow, Alaska, during March 9 to April 9 2004. During this IOP, radiometers were deployed over a broad frequency range (22.235 to 380 GHz), including several channels near the strong water vapor absorption line at 183.31 GHz. These radiometers were supplemented by 4-times-a-day observations by Vaisala RS90 radiosondes at the ARM Duplex in Barrow, 8 dual-radiosonde launches with "Snow White" chilled mirror radiosondes at the same location, once daily Vaisala RS90 radiosondes launched at the ARM primary field site, and twice-daily synoptic launches by the US National Weather Service. Radiometers deployed included the ground-based scanning radiometer of NOAA (several frequencies from 50 to 380 GHz), the microwave radiometer and the radiometric profiler of ARM (frequencies from 22.235 to 60 GHz), and a global positioning system operated by NOAA. In addition, all of the ARM active cloud sensors were operated. Selected results from this experiment are presented, including observed radiometric sensitivities to precipitable water vapor and liquid water path, radiosonde comparisons between radiosondes types and to MWRP measurements, and a preliminary comparison of forward models with GSR data
A depth retrieval technique based on phase contrast calculations by pulsed phase thermography (PPT) has been previously reported. The phase contrast requires an appropriate selection of the sound area. This is rarely ...
详细信息
We have proposed an inductive (magnetic shielding) type of superconducting fault current limiter which consists of a high Tc superconducting plate in doughnut shape and spiral coil as the primary winding. In this pape...
Vector quantization is widely used in various applications. Most researches focus on creating a codebook with respect to spatial distance. The quantization performance is usually measured by distortion. In our work, w...
详细信息
Vector quantization is widely used in various applications. Most researches focus on creating a codebook with respect to spatial distance. The quantization performance is usually measured by distortion. In our work, we introduce a novel approach for vector quantization that is a density estimation technique. Codebooks obtained from our algorithm can express the density distribution of the original vectors. A flexible version, strong and weak algorithm, is also proposed in this paper. Experimental results show that the distortion can be reduced using a flexible version of our algorithm.
Microarchitects should consider power consumption, together with accuracy, when designing a branch predictor, especially in embedded processors. This paper proposes a power-aware branch predictor, which is based on th...
详细信息
Microarchitects should consider power consumption, together with accuracy, when designing a branch predictor, especially in embedded processors. This paper proposes a power-aware branch predictor, which is based on the gshare predictor, by accessing the BTB (Branch Target Buffer) selectively. To enable the selective access to the BTB, the PHT (Pattern History Table) in the proposed branch predictor is accessed one cycle earlier than the traditional PHT if the program is executed sequentially without branch instructions. As a side effect, two predictions from the PHT are obtained through one access to the PHT, resulting in more power savings. In the proposed branch predictor, if the previous instruction was not a branch and the prediction from the PHT is untaken, the BTB is not accessed to reduce power consumption. If the previous instruction was a branch, the BTB is always accessed, regardless of the prediction from the PHT, to prevent the additional delay/accuracy decrease. The proposed branch predictor reduces the power consumption with little hardware overhead, not incurring additional delay and never harming prediction accuracy. The simulation results show that the proposed branch predictor reduces the power consumption by 29-47%.
暂无评论