We construct a predictor-feedback cooperative adaptive cruise control (CACC) design with integral action, which achieves simultaneous compensation of long, actuation and communication delays, for platoons of heterogen...
详细信息
We construct a predictor-feedback cooperative adaptive cruise control (CACC) design with integral action, which achieves simultaneous compensation of long, actuation and communication delays, for platoons of heterogeneous vehicles whose dynamics are described by a third-order linear system with input delay. The key ingredients in our design are an underlying predictor-feedback law that achieves actuation delay compensation and an integral term of the difference between the delayed (by an amount equal to the respective communication delay) and current speed of the preceding vehicle. The latter, essentially, creates a virtual spacing variable, which can be regulated utilizing only delayed position and speed measurements from the preceding vehicle. We establish individual vehicle stability, string stability, and regulation for vehicular platoons, under the control design developed. The proofs rely on combining an input-output approach (in the frequency domain), with derivation of explicit solutions for the closed-loop systems, and they are enabled by the actuation and communication delays-compensating property of the design. We demonstrate numerically the control and model parameters' conditions of string stability, while we also present simulation results, in realistic scenarios, including a scenario in which the leading vehicle's trajectory is obtained from NGSIM data. All case studies confirm the effectiveness of the design developed. IEEE
This paper presents a lightweight and accurate convolution neural network (CNN) based on encoder in vision transformer structure, which uses multigroup convolution rather than multilayer perceptron and multiheaded sel...
详细信息
Emotion detection is one of the crucial topics of Natural Language Processing (NLP) in recent years, and now one of the biggest motivating factors in correct identification and interpretation of a wide range of emotio...
详细信息
The healthcare industry has witnessed an increase in the use of cloud storage, resulting in a significant demand for safeguarding medical records from potential attackers. In response to this challenge, reversible dat...
详细信息
Today, machine learning is used in a broad variety of applications. Convolution neural networks (CNN), in particular, are widely used to analyze visual data. The fashion industry is catching up to the growing usage of...
详细信息
III-nitride nanowires have emerged as an important semiconductor device technology development platform, leveraging the unique physical properties of III-nitride semiconductors such as widely tunable bandgap energies,...
详细信息
Antenna optimization using machine learning is a rapidly evolving field that leverages the power of artificial intelligence to design and improve antenna systems. Antenna optimization is a process of modifying antenna...
详细信息
The Internet of Things has opened up new opportunities in healthcare systems. Wireless sensor nodes are used to collect and exchange health-related data in the Internet of Things. In this integration, data is transmit...
详细信息
The Internet of Things has opened up new opportunities in healthcare systems. Wireless sensor nodes are used to collect and exchange health-related data in the Internet of Things. In this integration, data is transmitted to medical professionals through unsecured channels to enable them to monitor patients’ conditions in real-time. However, due to the high sensitivity of e-health records, there are key challenges such as security considerations, privacy, and authentication in data transmission in heterogeneous Internet of Things networks. This article examines the solution proposed by Masud and colleagues and points out the existing threats and vulnerabilities, such as node clone/replication attacks. To overcome these drawbacks, we propose an improved lightweight authentication protocol for a smart healthcare system. In the proposed protocol, the mutual authentication process consists of two steps. The doctor sends their information for authentication and the desired sensor node ID to the gateway for communication. After successful confirmation of authentication, the gateway node, in turn, sends a message to the sensor node to complete the authentication process. After confirming the authentication process, the node sends a message to the gateway to complete the authentication process and key agreement. Once the authentication process of the sensor node is confirmed, the gateway sends a message to the medical user based on their authentication along with the session key. The security of the proposed protocol is demonstrated through automatic validation of protocols using tools like ProVerif and internet security programs. Additionally, security features and performance analysis are compared to other schemes. The results show that the improved proposed protocol provides a higher level of security while ensuring computational and communication efficiency. It is also resistant to attacks such as mutual authentication, identity anonymity and untraceability, ensures data
In this paper, the superiority of Ge/Ge0.98Sn0.02asymmetrical supper lattice structure based vertically doped nano-scale pin photo-sensor under operating wavelength of 1200 nm to 2200 nm is reported. The aut...
详细信息
Text summarization is a fundamental Natural language processing task that plays a crucial role in efficiently condensing large textual documents into concise and clear summaries for human comprehension. The amount of ...
详细信息
暂无评论