作者:
Marko BunicStjepan BogdanUniversity of Zagreb
Faculty of Electrical Engineering and Computing Department of Control and Computer Engineering LARICS–Laboratory for Robotics and Intelligent Control Systems Zagreb Croatia
This paper presents the extension of the previously proposed method for multi-agent formation control based on potential function. The method derived for 2D space is extended to 3D. It has been shown that the control ...
This paper presents the extension of the previously proposed method for multi-agent formation control based on potential function. The method derived for 2D space is extended to 3D. It has been shown that the control algorithm keeps all the properties of the original scheme in case of multi-agent formation moving in 3D. An adaptation mechanism that assures avoidance of unwanted stable equilibria, used in 2D, is implemented in the same form for 3D formations. The obtained simulation results demonstrate stable behavior of the system for various sets of parameters - the desired 3D formation is reached in finite time and maintained during trajectory execution.
The objective of this study was to compare and correlate the Portable Ultra Sound (US) measuring technique to the skinfold measuring technique (SF) to estimate body fat percentage (%F) in young adults. Sixty military ...
详细信息
ISBN:
(纸本)9781457717871
The objective of this study was to compare and correlate the Portable Ultra Sound (US) measuring technique to the skinfold measuring technique (SF) to estimate body fat percentage (%F) in young adults. Sixty military were evaluated, all males, divided in two groups: Group 1 (normal) composed by 30 military with Body Mass Index (BMI) until 24.99 kg/m(2) and Group 2 (overweight) composed by 30 military with BMI > 25 kg/m(2). Weight, height, skinfolds and ultrasound were measured in 9 points (triceps, subscapular, biceps, chest, medium axillary, abdominal, suprailiac, thigh and calf). Body fat average values obtained by skinfold thickness and ultrasound measurements were 13.25 +/- 6.32 % and 12.73 +/- 5.95 % respectively. Despite significant differences in measurements of each anatomical site, it was possible to verify that the total final body fat percentage calculated by both techniques did not present significant differences and that overweight group presented greater similarity between the values obtained using caliper and ultrasound equipment.
Estimating taxonomic content constitutes a key problem in metagenomic sequencing data ***,extracting such content from high-throughput data of next-generation sequencing is very time-consuming with the currently avail...
详细信息
Estimating taxonomic content constitutes a key problem in metagenomic sequencing data ***,extracting such content from high-throughput data of next-generation sequencing is very time-consuming with the currently available ***,we present CloudLCA,a parallel LCA algorithm that significantly improves the efficiency of determining taxonomic composition in metagenomic data *** show that CloudLCA(1)has a running time nearly linear with the increase of dataset magnitude,(2)displays linear speedup as the number of processors grows,especially for large datasets,and(3)reaches a speed of nearly 215 million reads each minute on a cluster with ten thin *** comparison with MEGAN,a well-known metagenome analyzer,the speed of CloudLCA is up to 5 more times faster,and its peak memory usage is approximately 18.5%that of MEGAN,running on a fat *** can be run on one multiprocessor node or a *** is expected to be part of MEGAN to accelerate analyzing reads,with the same output generated as MEGAN,which can be import into MEGAN in a direct way to finish the following ***,CloudLCA is a universal solution for finding the lowest common ancestor,and it can be applied in other fields requiring an LCA algorithm.
Two-axis pan and tilt systems are widely used in surveillance applications for high accuracy positioning of sensor payloads such as cameras and laser pointers. In order to develop advanced control algorithms to improv...
详细信息
Cloud computing can offer a very powerful, reliable, predictable and scalable computing infrastructure for the execution of MAS (multi-agent systems) implementing complex agent-based applications such when modelling...
详细信息
Cloud computing can offer a very powerful, reliable, predictable and scalable computing infrastructure for the execution of MAS (multi-agent systems) implementing complex agent-based applications such when modelling, simulation and real-time running of complex systems must be provided. Multi-agent systems appears as an adequate approach to current challenges in many areas. Between important qualities of MAS also belongs to, that they are open, interoperable, and heterogenous systems. The agent is active, a program entity, has its own ideas how to perform the tasks of the own agenda. Agents: perceive, behave "reasonably", act in the environment, communicate with other agents. Cloud infrastructures can offer an ideal platform where run MAS systems simulations, applications and real-time running because of its large amount of processing and memory resources that can be dynamically configured for executing large agent-based software at unprecedented scale. Cloud computing can help chemical and food companies drive operational excellence; meet growing and changing customer demands; accelerate new product innovation and ramp-to-volume manufacturing in key markets; reduce IT spending; manage and mitigate supply chain risks; and enable faster and more flexible delivery of new IT system. Production type of SOC (service-oriented computing) can be inspired by a "Cloud", for the production of "Cloud" offers an attractive and natural solutions in several computing trends such as delivery system over the Internet, use of utilities, flexibility, virtualization, a "grid" distributed computing, outsourcing, Web 2.0, etc.. Production of the "Cloud" is also considered as a new multidisciplinary field that includes "network" production, virtual manufacturing, agile manufacturing, and of course cloud computing. Examples of cloud computing and MAS applications in food and chemistry development and industry, proposition of using multi-agent systems in the control of batch processes, modif
P systems (PSs) are powerful computing models based on the structure of a biological cell and on the way chemicals interact in complex biochemical reactions which take place in various compartments (or membranes) of t...
详细信息
The framework is designed to provide a simple and powerful way of Web application component development. Components of the framework can nest, and the framework is designed to be easy to reuse as a component, thus pro...
详细信息
The framework is designed to provide a simple and powerful way of Web application component development. Components of the framework can nest, and the framework is designed to be easy to reuse as a component, thus providing its components to be used by the host application. We explain the interfaces required to make this possible - what they provide, what issues they solve, and how their requirement was discovered. We also identify shortcomings of this approach, and issues that will be addressed by future work.
Distributed computer systems of microcontrollers with environmental sensors, known as wireless sensor networks, allow real time monitoring of complex events. Over the last ten years this technology is slowly being app...
详细信息
Distributed computer systems of microcontrollers with environmental sensors, known as wireless sensor networks, allow real time monitoring of complex events. Over the last ten years this technology is slowly being applied in many areas such as: agriculture, environmental monitoring and urban planning. However, the technology has yet to see a strong commercial application because of a: lack of universal norms, short lifetime cycle and security concerns. This paper will describe the basic characteristics of a wireless sensor network, followed by a list of different types of security problems that wireless sensor networks face. For each problem, a recommended method for improving security is given, along with all the downsides of such a method. After reviewing the current state of the technology we will propose a new method to improve security and intruder detection for certain types of networks.
暂无评论