Multiple time series (MTS), which describes an object in multi-dimensions, is based on single time series and has been proved to be useful. In this paper, a new analytical method called α/β-Dominant-Skyline on MTS...
详细信息
Multiple time series (MTS), which describes an object in multi-dimensions, is based on single time series and has been proved to be useful. In this paper, a new analytical method called α/β-Dominant-Skyline on MTS and a formal definition of the α/β-dominant skyline MTS are given. Also, three algorithms, called NL, BC and MFB, are proposed to address the α/β-dominant skyline queries over MTS. Finally experimental results on both synthetic and real data verify the correctness and effectiveness of the proposed method and algorithms.
Dexterous robot manipulation has shone in complex industrial scenarios, where multiple manipulators, or fingers, cooperate to grasp and manipulate objects. When encountering multi-objective optimization with system co...
详细信息
Dexterous robot manipulation has shone in complex industrial scenarios, where multiple manipulators, or fingers, cooperate to grasp and manipulate objects. When encountering multi-objective optimization with system constraints in such scenarios, model predictive control(MPC) has demonstrated exceptional performance in complex multi-robot manipulation tasks involving multi-objective optimization with system constraints. However, in such scenarios, the substantial computational load required to solve the optimal control problem(OCP) at each triggering instant can lead to significant delays between state sampling and control application, hindering real-time performance. To address these challenges, this paper introduces a novel robust tube-based smooth MPC approach for two fundamental manipulation tasks: reaching a given target and tracking a reference trajectory. By predicting the successor state as the initial condition for imminent OCP solving, we can solve the forthcoming OCP ahead of time, alleviating delay effects. Additionally,we establish an upper bound for linearizing the original nonlinear system, reducing OCP complexity and enhancing response speed. Grounded in tube-based MPC theory, the recursive feasibility and closed-loop stability amidst constraints and disturbances are ensured. Empirical validation is provided through two numerical simulations and two real-world dexterous robot manipulation tasks, which shows that the seamless control input by our methods can effectively enhance the solving efficiency and control performance when compared to conventional time-triggered MPC strategies.
Self-driving and semi-self-driving cars play an important role in our daily *** effectiveness of these cars is based heavily on the use of their surrounding areas to collect sensitive and vital ***,external infrastruc...
详细信息
Self-driving and semi-self-driving cars play an important role in our daily *** effectiveness of these cars is based heavily on the use of their surrounding areas to collect sensitive and vital ***,external infrastructures also play significant roles in the transmission and reception of control data,cooperative awareness messages,and caution *** this case,roadside units are considered one of themost important communication *** distribution of these infrastructures will overburden the spread of self-driving vehicles in terms of cost,bandwidth,connectivity,and radio coverage *** this paper,a new distributed roadside unit is proposed to enhance the performance and connectivity of these ***,this approach is based primarily on k-means to find the optimal location of each roadside *** addition,this approach supports dynamicmobility with a long period of connectivity for each ***,this system can adapt to various locations(e.g.,highways,rural areas,urban environments).The simulation results of the proposed system are reflected in its efficiency and ***,the system can achieve a high connectivity rate with a low error rate while reducing costs.
Mission critical Machine-type Communication(mcMTC),also referred to as Ultra-reliable Low Latency Communication(URLLC),has become a research *** is primarily characterized by communication that provides ultra-high rel...
详细信息
Mission critical Machine-type Communication(mcMTC),also referred to as Ultra-reliable Low Latency Communication(URLLC),has become a research *** is primarily characterized by communication that provides ultra-high reliability and very low latency to concurrently transmit short commands to a massive number of connected *** the reduction in physical(PHY)layer overhead and improvement in channel coding techniques are pivotal in reducing latency and improving reliability,the current wireless standards dedicated to support mcMTC rely heavily on adopting the bottom layers of general-purpose wireless standards and customizing only the upper *** mcMTC has a significant technical impact on the design of all layers of the communication protocol *** this paper,an innovative bottom-up approach has been proposed for mcMTC applications through PHY layer targeted at improving the transmission reliability by implementing ultra-reliable channel coding scheme in the PHY layer of IEEE 802.11a standard bearing in mind short packet transmission *** achieve this aim,we analyzed and compared the channel coding performance of convolutional codes(CCs),low-density parity-check(LDPC)codes,and polar codes in wireless network on the condition of short data packet *** Viterbi decoding algorithm(VA),logarithmic belief propagation(Log-BP)algorithm,and cyclic redundancy check(CRC)successive cancellation list(SCL)(CRC-SCL)decoding algorithm were adopted to CC,LDPC codes,and polar codes,***,a new PHY layer for mcMTC has been *** reliability of the proposed approach has been validated by simulation in terms of Bit error rate(BER)and packet error rate(PER)***-to-noise ratio(SNR).The simulation results demonstrate that the reliability of IEEE 802.11a standard has been significantly improved to be at PER=10−5 or even better with the implementation of polar *** results also show that the general-purpose wireless net
Background: Cloud Computing has drawn much attention in the industry due to its cost-efficient schema along with more prospects, such as elasticity and scalability nature of Cloud Com-puting. One of the main service m...
详细信息
Background: Cloud Computing has drawn much attention in the industry due to its cost-efficient schema along with more prospects, such as elasticity and scalability nature of Cloud Com-puting. One of the main service models of a Cloud is software as a service, where many web services are published and hosted in the Cloud environment. Many web services offered in a Cloud have similar functionality, with different of characteristics non-functional requirements such as Quality of Service (QoS). In addition, as individual web services are limited in their capability. Therefore, there is a need for composing existing services to create new functionality in the form of composite service to fulfill the requirements of Cloud user for certain processes. Methods: This paper introduces a fuzzy rule approach to compose web service based on QoS from different Cloud Computing providers. The fuzzy rule is generated based on QoS of discovered web service from Cloud in order to compose web services that only match user requirements. The proposed model is based on an agent that is responsible for discovering and composing web service that only stratified user requirements Result: the experimental result shows that the proposed model is efficient in terms of time and the use of fuzzy rules to compose web services from different Cloud providers under different specifica-tions and configurations of Cloud Computing environment. Conclusion: In this paper, an agent-based model was proposed to compose web services based on fuzzy rule in Cloud environment. The agent is responsible for discovering web services and generat-ing composition plans based on offered QoS for each web service. The agent employs a set of fuzzy rules to carry out an intelligent selection to select the best composition plan that fulfills the requirements of the end user. The model was implemented on CloudSim to ensure the validity of the proposed model and performance time analysis was performed that showed good result i
Feature selection is a crucial preprocessing step in data mining and machine learning, enhancing model performance and computational efficiency. This paper investigates the effectiveness of the Side-Blotched Lizard Op...
详细信息
The Internet of Things(IoT)is where almost anything can be controlled and managed remotely by means of *** the IoT evolution led to quality of life enhancement,many of its devices are *** lack of robust key management...
详细信息
The Internet of Things(IoT)is where almost anything can be controlled and managed remotely by means of *** the IoT evolution led to quality of life enhancement,many of its devices are *** lack of robust key management systems,efficient identity authentication,low fault tolerance,and many other issues lead to IoT devices being easily targeted by *** this paper we propose a new authentication protocol called Authenblue that improve the authentication process of IoT devices and Coordinators of Personal Area Network(CPANs)in an Industrial IoT(IIoT)*** study proposed Authenblue protocol as a new Blockchainbased authentication *** enhance the authentication process and make it more secure,Authenblue modified the way of generating IIoT identifiers and the shared secret keys used by the IIoT devices to raise the efficiency of the authentication *** enhance the authentication protocol that other models rely on by enhancing the approach used to generate the User Identifier(UI).The UI values changed from being static values,sensors MAC addresses,to be generated values in the inception *** approach makes the process of renewing the sensor keys more secure by renewing their UI values instead of changing the secret *** this study,Authenblue has been simulated in the Network Simulator 3(NS3).Simulation results show an improved performance compared to the related work.
This paper describes the development of an embedded smart home management scheme over the Ethernet network. The platform of the smart home management system is built using bespoke embedded system design. An embedded c...
详细信息
This paper describes the development of an embedded smart home management scheme over the Ethernet network. The platform of the smart home management system is built using bespoke embedded system design. An embedded control module developed by exploiting the Web Services mechanism, consist of 15 monitoring channels based on XML SOAP standards. Each channel is integrated to dedicated smart home management scheme and performs bi-directional real-time control. In the event of server unavailability, a mobile based communication module using GSM has been deployed as an alternate management mechanism. The proposed embedded-enabled solution offers bi-directional real-time management as well as optimized performance for smart home environment.
Network traffic of Internet will continue to expand in terms of both volume and users, and transmission control protocol (TCP) is accounting for more than 90% the Internet traffic. In addition to this, it is well know...
详细信息
With the explosive growth of commercial Iogos, high quality logo images are needed for training logo detection or recognition systems, especially for famous Iogos or new commercial brands. This paper focuses on automa...
详细信息
With the explosive growth of commercial Iogos, high quality logo images are needed for training logo detection or recognition systems, especially for famous Iogos or new commercial brands. This paper focuses on automatic collecting representative logo images from the internet without any human labeling or seed images. We propose multiple dictionary invariant sparse coding to solve this problem. This work can automatically provide prototypes, representative images, or weak labeled training images for logo detection, logo recognition, trademark infringement detection, brand protection, and ad-targeting. The experiment results show that our method increases the mean average precision for 25 types of Iogos to 80.07% whereas the original search engine results only have 32% representative logo images. The top images collected by our method are accurate and reliable enough for practical applications in the future.
暂无评论