The nonlinear model predictive control (MPC) needs to solve a two-point boundary-value problem (TP-BVP) at every sample time based on the receding horizon control strategy. However, solving a nonlinear algebraic equat...
详细信息
The nonlinear model predictive control (MPC) needs to solve a two-point boundary-value problem (TP-BVP) at every sample time based on the receding horizon control strategy. However, solving a nonlinear algebraic equation for the TP-BVP requires high computational load, so developing an efficient computation method of the control law in real-time is a significant issue on the research of the nonlinear model predictive control. This paper proposes an efficient calculation method of the control law for nonlinear MPC. The proposed approach searches an optimal step-type input signal for a given performance index beforehand, then the input signal is successively updated using a continuation method. Hence, it can reduce the computation load because the number of the parameter to be optimized becomes one in the SISO case or the number of the inputs in the MIMO case, and solving TP-BVP can be avoided by a continuation method. In addition, the accuracy of the nonlinear algebraic equation, which gives the optimal condition, keeps well by analytically deriving the updating law of the MPC control law. A numerical example shows that the proposed method can reduce the computation load of the nonlinear MPC, while the accuracy of the optimal conditions given by the nonlinear algebraic equations keeps a tolerance level.
This paper proposes an extension of the original Dynamic Movement Primitive (DM?) algorithm proposed by S. Schaal to imitation learning for object avoidance in a dynamic environment. A potential field was incorpor...
详细信息
This paper proposes an extension of the original Dynamic Movement Primitive (DM?) algorithm proposed by S. Schaal to imitation learning for object avoidance in a dynamic environment. A potential field was incorporated into the original DMP algorithm by using a virtual goal position which is calculated using a potential field. A humanoid robot ISAC was trained in simulation to learn how to generate movements similar to the demonstrated movements when an obstacle is placed in the environment. This proposed extension provides robots more robust and flexible movement generation when an obstacle exists. Simulations were performed to verify the effectiveness of the method.
Modeling and predicting human behavior is indispensable when industrial robots interacting with human operators are to be manipulated safely and efficiently. One challenge is that human operators tend to follow differ...
详细信息
Modeling and predicting human behavior is indispensable when industrial robots interacting with human operators are to be manipulated safely and efficiently. One challenge is that human operators tend to follow different motion patterns, depending on their intention and the structure of the environment. This precludes the use of classical estimation techniques based on kinematic or dynamic models, especially for the purpose of long-term prediction. In this paper, we propose a method based on Hidden Markov Models to predict the region of the workspace that is possibly occupied by the human within a prediction horizon. In contrast to predictions in the form of single points such as most likely human positions as obtained from previous approaches, the regions obtained here may serve as safety constraints when the robot motion is planned or optimized. This way one avoids collisions with a probability not less than a predefined threshold. The practicability of our method is demonstrated by successfully and accurately predicting the motion of a human arm in two scenarios involving multiple motion patterns.
Nearly 80 % of worldwide trade (over US $620 billion) is carried by marine transport. Unfortunately, manually identifying, tracking, and monitoring containers involves a great many logistical problems. The security of...
详细信息
Nearly 80 % of worldwide trade (over US $620 billion) is carried by marine transport. Unfortunately, manually identifying, tracking, and monitoring containers involves a great many logistical problems. The security of container transportation has also become an issue of critical importance, with regard to theft, tracking, tracing, and national security. This paper describes the passive radio frequency identification (RFID) electronic seal (e-seal) monitoring system that was implemented using existing low-cost passive RFID e-seals devices to replace the manual escorts. The system successfully overcame the harsh outdoor environment of Kaohsiung Port, including resistance to high temperature, high salinity, humidity, and typhoons. The system comprises a reader, an e-seal (tag), and an antenna, and its optimal installation architecture is being disclosed in this paper. The reading rate not only has been maintained at levels above 97.4 % when a container truck travel passes an RFID reader at a speed of up to 60 kilometers per hour in 0.2 seconds, the system has also maintained normal operation 24 hours a day, year round. The system has moved beyond the testing phase or small-scale pilot project bringing RFID technology to practical operations of large-scale logistics systems. The architecture, procedures, methodologies, and experience involved in the development of this system, deserve consideration as a guide for the future introduction of RFID systems, and can relieve operators from the expensive, time-consuming trial and error involved in the introduction of passive RFID e-seal systems in the container transport industry.
Spam-based advertising is a business. While it has engendered both widespread antipathy and a multi-billion dollar anti-spam industry, it continues to exist because it fuels a profitable enterprise. We lack, however, ...
详细信息
Spam-based advertising is a business. While it has engendered both widespread antipathy and a multi-billion dollar anti-spam industry, it continues to exist because it fuels a profitable enterprise. We lack, however, a solid understanding of this enterprise's full structure, and thus most anti-Spam interventions focus on only one facet of the overall spam value chain (e.g., spam filtering, URL blacklisting, site takedown).In this paper we present a holistic analysis that quantifies the full set of resources employed to monetize spam email -- including naming, hosting, payment and fulfillment -- using extensive measurements of three months of diverse spam data, broad crawling of naming and hosting infrastructures, and over 100 purchases from spam-advertised sites. We relate these resources to the organizations who administer them and then use this data to characterize the relative prospects for defensive interventions at each link in the spam value chain. In particular, we provide the first strong evidence of payment bottlenecks in the spam value chain, 95% of spam-advertised pharmaceutical, replica and software products are monetized using merchant services from just a handful of banks.
Rough set theory, proposed by Pawlak, has been proved to be a mathematical tool to deal with vagueness and uncertainty in intelligent information processing. In this paper, we propose the concept of knowledge granulat...
详细信息
Rough set theory, proposed by Pawlak, has been proved to be a mathematical tool to deal with vagueness and uncertainty in intelligent information processing. In this paper, we propose the concept of knowledge granulation in interval-valued information systems, and discuss some important properties. From these properties, it can be shown that the proposed knowledge granulation provides important approaches to measuring the discernibility of different knowledge. It may be helpful for rule evaluation and knowledge discovery in interval-valued information systems.
The development of a fault-diagnosis system(FDS) could be helpful in identifying the source of faults before the occurrence of complete system *** we report on such a diagnostic procedure for narrowing down maintenanc...
详细信息
The development of a fault-diagnosis system(FDS) could be helpful in identifying the source of faults before the occurrence of complete system *** we report on such a diagnostic procedure for narrowing down maintenance tasks and shortening system down *** software is developed based on case-based reasoning(CBR) from previous maintenance experience,for a wet magnetite separator machine(WMSM).The techniques of fault tree analysis(FTA) and information flow analysis are used to systematically clarify possible faults and symptoms shown by a *** possible faults and symptoms of the machinery are set up by analyzing the system's fault trees and its information flow.A logical process is introduced to determine the correlation between the possible faults and the symptoms for computing case similarity while progressing CBR diagnosing and used for calculating case similarity is proposed to formulate the diagnostic algorithms for the *** diagnosing could effectively reduce the training time of maintenance personnel,especially for a ***,The front pages of the FDS are created using an ASP program in cooperation with an Access *** results show that the FDS provides a good support for the maintenance of WMSMs and we can reduce the maintenance time.
A Social network graph shows social interactions and relationships between individuals in a specific social environment, which is very helpful for analyzing social relationships, activities, structures, etc. The autho...
详细信息
When a database is accessed via a web application, users usually receive a pooled connection to the database. From a database point of view, such a connection is always established by the same user (i.e. the web appli...
详细信息
A model is proposed for selecting the optimal result of contractor selection under multi criteria environment. Fuzzy comparing judgment is used to tackling the vagueness and uncertainty in choosing significant prefere...
详细信息
A model is proposed for selecting the optimal result of contractor selection under multi criteria environment. Fuzzy comparing judgment is used to tackling the vagueness and uncertainty in choosing significant preferences by decision maker regarding to the subjective opinion. Finally, the model was tested in tender evaluation processes for awarding the most beneficial contractor to perform the construction project.
暂无评论