This work presents a prototype for the automatic and real-time psychoacoustic frequency masking effect compensation. This tool is intended to handle audio signals with overlapping spectra coming from two different mon...
详细信息
Intelligent Space(IS)is widely regarded as a promising paradigm for improving quality of life through using service task *** the field matures,various state-of-the-art IS architectures have been *** of the IS architec...
详细信息
Intelligent Space(IS)is widely regarded as a promising paradigm for improving quality of life through using service task *** the field matures,various state-of-the-art IS architectures have been *** of the IS architectures designed for service robots face the problems of fixedfunction modules and low scalability when performing service *** this end,we propose a hybrid cloud service robot architecture based on a Service-Oriented Architecture(SOA).Specifically,we first use the distributed deployment of functional modules to solve the problem of high computing resource ***,the Socket communication interface layer is designed to improve the calling efficiency of the function ***,the private cloud service knowledge base and the dataset for the home environment are used to improve the robustness and success rate of the robot when performing ***,we design and deploy an interactive system based on Browser/Server(B/S)architecture,which aims to display the status of the robot in real-time as well as to expand and call the robot *** system is integrated into the private cloud framework,which provides a feasible solution for improving the quality of ***,it also fully reveals how to actively discover and provide the robot service mechanism of service tasks in the right *** results of extensive experiments show that our cloud system provides sufficient prior knowledge that can assist the robot in completing service *** is an efficient way to transmit data and reduce the computational burden on the *** using our cloud detection module,the robot system can save approximately 25% of the averageCPUusage and reduce the average detection time by 0.1 s compared to the locally deployed system,demonstrating the reliability and practicality of our proposed architecture.
The problem of unknown input observer design is considered for coupled PDE/ODE systems subject to incremental sector bounded nonlinearities and unknown boundary inputs. Assuming available measurements at the boundary ...
详细信息
Electromagnetic pulse(EMP)is a kind of transient electromagnetic phenomenon with short rise time of the leading edge and wide spectrum,which usually disrupts communications and damages electronic equipment and *** is ...
详细信息
Electromagnetic pulse(EMP)is a kind of transient electromagnetic phenomenon with short rise time of the leading edge and wide spectrum,which usually disrupts communications and damages electronic equipment and *** is challenging for an EMP sensor to measure a wideband electromagnetic pulse without distortion for the whole ***,analyzing the distortion of EMP measurement is crucial to evaluating the sensor distortion characteristics and correcting the measurement *** fidelity is usually employed to evaluate the distortion of an ***,this metric depends on specific signal waveforms,thus is unsuitable for evaluating and analyzing the distortion of EMP *** this paper,an associated-hermite-function based distortion analysis method including system transfer matrices and distortion rates is proposed,which is general and independent from individual *** system transfer matrix and distortion rate can be straightforwardly calculated by the signal orthogonal transformation coefficients using associated-hermite *** of a sensor *** is then visualized via the system transfer matrix,which is convenient in quantitative analysis of the *** of a current probe,a coaxial pulse voltage probe and a B-field sensor were performed,based on which the feasibility and effectiveness of the proposed distortion analysis method is successfully verified.
This article introduces a novel model for low-quality pedestrian trajectory prediction, the social nonstationary transformers (NSTransformers), that merges the strengths of NSTransformers and spatiotemporal graph tran...
详细信息
Hydrogen is an energy carrier that can support the development of sustainable and flexible energy systems. However, decarbonization can occur when green sources are used for energy production and appropriate water use...
详细信息
In this letter, we introduce a novel anti-windup design approach for internal model control (IMC) that addresses the issue of asymmetric input saturation. To enhance closed-loop performance during periods of saturatio...
详细信息
Although conventional control systems are simple and widely used, they may not be effective for complex and uncertain systems. This study proposes a Hermite broad-learning recurrent neural network (HBRNN) with a wide ...
详细信息
With growing awareness of privacy protection, Federated Learning (FL) in vehicular network scenarios effectively addresses privacy concerns, leading to the development of Federated Vehicular Networks (FVN). In FVN, ve...
详细信息
Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control *** state estimation(RSE)...
详细信息
Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control *** state estimation(RSE)is an indispensable functional module of ***,it has been demonstrated that malicious agents can manipulate data packets transmitted through unreliable channels of RSE,leading to severe estimation performance *** paper aims to present an overview of recent advances in cyber-attacks and defensive countermeasures,with a specific focus on integrity attacks against ***,two representative frameworks for the synthesis of optimal deception attacks with various performance metrics and stealthiness constraints are discussed,which provide a deeper insight into the vulnerabilities of ***,a detailed review of typical attack detection and resilient estimation algorithms is included,illustrating the latest defensive measures safeguarding RSE from ***,some prevalent attacks impairing the confidentiality and data availability of RSE are examined from both attackers'and defenders'***,several challenges and open problems are presented to inspire further exploration and future research in this field.
暂无评论