In this paper, we propose a model for the thrust coefficient of propellers that can take into account cross-influence between adjacent propellers. The aerodynamic interaction between propellers in multirotor aerial ve...
详细信息
ISBN:
(数字)9798350357882
ISBN:
(纸本)9798350357899
In this paper, we propose a model for the thrust coefficient of propellers that can take into account cross-influence between adjacent propellers. The aerodynamic interaction between propellers in multirotor aerial vehicles reduces the thrust they can produce. The influence between propellers depends on their relative positioning and orientation, which are taken into account by the proposed model. It is validated on measurements collected by a force sensor mounted on a propeller for different configurations of the adjacent propellers in a support structure. In this work, we focus on configurations with small relative orientations. Results show that the proposed model outperforms the traditional constant model in terms of thrust prediction on the data we collected, and it performs better than other models with fewer parameters, being the only one with less than 10% maximum percentage error.
In mobile cloud computing(MCC) systems,both the mobile access network and the cloud computing network are heterogeneous,implying the diverse configurations of hardware,software,architecture,resource,*** such heterogen...
详细信息
In mobile cloud computing(MCC) systems,both the mobile access network and the cloud computing network are heterogeneous,implying the diverse configurations of hardware,software,architecture,resource,*** such heterogeneous mobile cloud(HMC) networks,both radio and cloud resources could become the system bottleneck,thus designing the schemes that separately and independently manage the resources may severely hinder the system *** this paper,we aim to design the network as the integration of the mobile access part and the cloud computing part,utilizing the inherent heterogeneity to meet the diverse quality of service(QoS)requirements of ***,we propose a novel cross-network radio and cloud resource management scheme for HMC networks,which is QoS-aware,with the objective of maximizing the tenant revenue while satisfying the QoS *** proposed scheme is formulated as a restless bandits problem,whose "indexability" feature guarantees the low complexity with scalable and distributed *** simulation results are presented to demonstrate the significant performance improvement of the proposed scheme compared to the existing ones.
An integrated approach to control of quantity and quality in water supply and distribution systems is proposed. The integrated control consists in optimising the operational cost, meeting a demand on water of desired ...
详细信息
An integrated approach to control of quantity and quality in water supply and distribution systems is proposed. The integrated control consists in optimising the operational cost, meeting a demand on water of desired quality and maintaining the system constraints. This constrained optimising control problem is complex due to nonlinearities, large dimension, output constraints, mixed-integer structure of the variables involved, at least two time scales in the system dynamics and an uncertainty. A sub-optimal two-level hierarchical control structure is proposed that allows incorporating the desired controller functions and yet making the synthesis of these functions possible. The algorithms for implementing the functionalities are proposed and discussed. Detail design of the lower level controller is presented and investigated. The controller performance is validated by simulation. [ABSTRACT FROM AUTHOR]
This paper builds upon theoretical studies in the field of social constructivism. Lev Vygotsky is considered one of the greatest representatives of this research line, with his theory of the Zone of Proximal Developme...
详细信息
ISBN:
(纸本)9781509007790
This paper builds upon theoretical studies in the field of social constructivism. Lev Vygotsky is considered one of the greatest representatives of this research line, with his theory of the Zone of Proximal Development (ZPD). Our work aims at integrating this concept in the practice of a computer-assisted learning system. For each learner, the system stores a model summarizing the current Student Knowledge (SK). Each educational activity is specified through the deployed content, the skills required to tackle it, and those acquired, and is further annotated by the effort estimated for the task. The latter may change from one student to another, given the already achieved competence. A suitable weighting of the robustness (certainty) of student's skills, stored in SK, and their combination are used to verify the inclusion of a learning activity in the student's ZPD. With respect to our previous work, the algorithm for the calculation of the ZPD of the individual student has been optimized, by enhancing the certainty weighting policy, and a graphical display of the ZPD has been added. Thanks to the latter, the student can get a clear vision of the learning paths that he/she can presently tackle. This both facilitates the educational process, and helps developing the metacognitive ability self-assessment.
Graph theory is a powerful mathematical tool recently introduced in neuroscience field for quantitatively describing the main properties of investigated connectivity networks. Despite the technical advancements provid...
详细信息
Digital watermarking can be used to protect the intellectual property for multimedia data. Digital watermarking has two main advantages: firstly, the authority on a particular file can be traced; secondly, there is no...
详细信息
Digital watermarking can be used to protect the intellectual property for multimedia data. Digital watermarking has two main advantages: firstly, the authority on a particular file can be traced; secondly, there is no need to use additional space to maintain this information. A digital watermark is an invisible secret message that is embedded directly in a multimedia file. According to applications, watermarking systems can be classified in fragile and robust. The watermark is designed to be robust against attacks in order to protect ownership of the image. In addition, watermarking systems may be classified in non-blind detection or blind detection which decide whether the detector uses the original image to extract the watermark or not. In our paper, we introduce a blind image watermarking system, since only the embedded image and the secret key are required in the detection phase, and the original image is not required.
In smart grid, large quantities of smart meters are installed in customers’ homes to collect electricity usage data, which can then be used to draw the load curve versus time of a day, and develop a plan or model for...
详细信息
In this paper, we study the structural state and input observability of continuous-time switched linear time- invariant systems and unknown inputs. First, we provide necessary and sufficient conditions for their struc...
详细信息
The European eSafety initiative aims to improve the safety and efficiency of road transport. The main element of eSafety is the pan-European eCall project—an in-vehicle system which idea is to inform about road colli...
详细信息
In this study, the vortex-induced vibration (VIV) of a circular cylinder at the low Reynolds number of 200 is simulated by a transient coupled fluid-structure interaction numerical model using the combination of FLUEN...
详细信息
暂无评论