Cooperative behaviors are ubiquitous in nature and human *** is very important to understand the internal mechanism of emergence and maintenance of *** we know now,the offsprings inherit not only the phenotype but als...
详细信息
Cooperative behaviors are ubiquitous in nature and human *** is very important to understand the internal mechanism of emergence and maintenance of *** we know now,the offsprings inherit not only the phenotype but also the neighborhood relationship of their *** recent research results show that the interactions among individuals facilitate survival of cooperation through network reciprocity of clustering *** paper aims at introducing an inheritance mechanism of neighborhood relationship to explore the evolution of *** detail,a mathematical model is proposed to characterize the evolutionary process with the above inheritance *** analysis and numerical simulations indicate that high-level cooperation can emerge and be maintained for a wide variety of cost-to-benefit ratios,even if mutation happens during the evolving process.
Incremental feature extraction is an essential data preprocessing technique for large-scale and streaming data mining. Among various covariance matrix-free Incremental Principal Component Analysis (IPCA) methods, Cand...
详细信息
In this paper,we present a model predictive control algorithm for input-saturated systems by a saturation-dependent Lyapunov function *** saturation-dependent Lyapunov function captures the real-time information on th...
详细信息
ISBN:
(纸本)9781479900305
In this paper,we present a model predictive control algorithm for input-saturated systems by a saturation-dependent Lyapunov function *** saturation-dependent Lyapunov function captures the real-time information on the severity of saturation and thus leads to less conservative results in controller design.A set invariance condition for the systems with input saturation is presented.A min-max MPC algorithm is proposed for the linear parameter-varying(LPV) systems based on the invariant *** MPC controller is determined by solving a linear matrix inequality(LMI) optimization *** example demonstrates the effectiveness of the proposed algorithm.
This paper is concerned with the stability and stabilizability problems of networked controlsystems(NCSs) with partly quantized *** precisely,the remote state variables transported from other sub-systems experience...
详细信息
ISBN:
(纸本)9781479900305
This paper is concerned with the stability and stabilizability problems of networked controlsystems(NCSs) with partly quantized *** precisely,the remote state variables transported from other sub-systems experience quantization errors,while the local state variables do *** consideration is much more natural in NCSs due to the distributive nature of *** errors are represented as convex poly-topic *** on the Lyapunov-Krasovskii (L-K) functional approach,sufficient conditions for the existence of a quantized robust Hstate feedback controller for NCSs are *** conditions are obtained in terms of bilinear matrix inequalities(BMIs).Furthermore,a cone complementarity algorithm is utilized to convert these BMIs into a convex optimization ***,a simulation example is provided to demonstrate the efficiency of proposed theorems.
Particle systems are important building block for simulating vivid and detail-rich effects in virtual *** of the most difficult aspects of particle systems has been detecting collisions between particles and mesh *** ...
详细信息
Particle systems are important building block for simulating vivid and detail-rich effects in virtual *** of the most difficult aspects of particle systems has been detecting collisions between particles and mesh *** to the huge computation,a variety of proxy-based approaches have been proposed recently to perform visually correct ***,all either limit the complexity of the scene,fail to guarantee non-penetration,or are too slow for real-time use with many *** this paper,we propose a new octree-based proxy for colliding particles with meshes on the *** approach works by subdividing the scene mesh with an octree in which each leaf node associates with a representative normal corresponding to the normals of the triangles that intersect the *** present a view-visible method,which is suitable for both closed and non-closed models,to label the empty leaf nodes adjacent to nonempty ones with appropriate back/front property,allowing particles to collide with both sides of the scene *** show how collisions can be performed robustly on this proxy structure in place of the original mesh,and describe an extension that allows for fast traversal of the octree structure on the *** experiments show that the proposed method is fast enough for real-time performance with millions of particles interacting with complex scenes.
The purpose of this paper is to utilize Field Programmable Gate Array (FPGA) to perform stereo vision distance detection. However, the stereo vision built by two cameras makes memory space lacking and image process sl...
详细信息
A novelty detection robust model is studied in the paper. It is based on contaminated (robust) models which produce a set of probability distributions of data points instead of the empirical distribution. The minimax ...
详细信息
This paper investigates the convergence of an iterative distributed model predictive control (DMPC) scheme for linear systems interconnected by dynamics and costs. The DMPC scheme is based on a Jacobi-type iteration a...
详细信息
ISBN:
(纸本)9781467357159
This paper investigates the convergence of an iterative distributed model predictive control (DMPC) scheme for linear systems interconnected by dynamics and costs. The DMPC scheme is based on a Jacobi-type iteration and exchange of primal variables. Previous results show that, in the limit, the scheme converges to the Pareto optimal solution but no results on the convergence rate are given. We will first establish a bound on the convergence rate and show that weights used in the scheme and strength of coupling between subsystems have a strong influence on this bound. Subsequently, two approaches to determine the weights are compared. Random numerical examples are used to compare the theoretical bound on the convergence rate with the actual convergence of the scheme.
暂无评论