Multimedia is one of the most important aspects of the information era. With the advent of the multimedia age and the spread of Internet, video storage and streaming has been gaining a lot of popularity. When transmit...
详细信息
Multimedia is one of the most important aspects of the information era. With the advent of the multimedia age and the spread of Internet, video storage and streaming has been gaining a lot of popularity. When transmitting compressed video over a data network channel errors affect the decoding process. Video transmission puts constraints on data rate, computational complexity and delay. Unreliable channels add more challenges to this task as compressed video is extremely vulnerable to transmission errors. Problems arising from imperfect transmission of block coded video frame sequence result in lost blocks. This paper presents and implements a set of decoder side spatio-temporal algorithms that aim to enhance the speed and quality of the error concealment process. The results obtained by these algorithms are much faster and achieve better performance compared to the existing algorithms, which make them more suitable for real-time applications.
The online real-time monitoring of high voltage power for transmission line can be realized. After deeply researching the special topology of linear wireless sensor network used in the monitoring system of high voltag...
详细信息
The online real-time monitoring of high voltage power for transmission line can be realized. After deeply researching the special topology of linear wireless sensor network used in the monitoring system of high voltage power transmission line, this paper proposed routing algorithm of nodes relay times balancing in linear WSN. The algorithm takes nodes relay times into account and divides the nodes of sensor network into clusters and cluster groups to establish a two- tiered network structure. According to the routing table of relay times, the nodes decide whether join the data packet routing or not, which can ensure the times balance of relay routing in the whole sensor network and extend the life cycle of the network.
Chirp-z transform (CZT) is usually used to refine frequency spectrum to analyze special frequency. The spectral resolution by CZT can be small as one wants but sometimes is wrongly considered as the same as accuracy. ...
详细信息
Energy consumption estimation is nowadays one of the most pressing concerns in the design of embedded systems. In order to provide power estimates, techniques have been developed to enable energy-aware simulation of C...
详细信息
Energy consumption estimation is nowadays one of the most pressing concerns in the design of embedded systems. In order to provide power estimates, techniques have been developed to enable energy-aware simulation of CPU models at different abstraction levels, such as register-transfer level (RTL) and software through an instruction set simulator (ISS). However, the chosen abstraction level heavily affects the outcome of the simulation in terms of speed and accuracy. RTL simulations are more accurate because of their wealth in terms of implementation details, but require significant computation times. ISS simulations run much faster, but are affected by a loss of accuracy due to their software implementation. Transaction-level modeling (TLM) simulations provides an ideal trade-off between speed and accuracy, but they rely on the creation of a TLM platform which is usually not available and must be manually created. In this context, we propose a methodology to automatically abstract a starting RTL CPU description into a corresponding TLM description. The abstraction methodology preserves details required to perform an energy-aware simulation, such as timing accuracy and instruction counts.
One of the main concerns in underground working tunnels is ensuring the safety of the workers and their equipment. Being aware of the real-time position of personal in such hash environments is challenging and require...
详细信息
ISBN:
(纸本)9781622762835
One of the main concerns in underground working tunnels is ensuring the safety of the workers and their equipment. Being aware of the real-time position of personal in such hash environments is challenging and requires a sophisticated localization system. Due to extreme multipath and non-line of sight (NLOS) conditions, wireless signals in underground narrow-vein tunnels suffer multiple kinds of distortions. Unreliable measurements of location metrics such as received signal strengths (RSS), result in deterioration of localization performance. In this paper, a radio frequency time of flight (RF-TOF) range engine embedded in JN5148 microcontroller is validated as an alternative range method in such scenarios. To reduce the communication cost and time delay of localization in such chain type wireless network, a distributed particle swarm optimization (PSO) based localization algorithm is proposed and implemented on the blind node. Without overhead hardware needed, an accurate and low cost localization system can be achieved. Experimental results verify the proposed scheme.
In this paper, adaptive neural control is proposed for a class of multi-input multi-output (MIMO) nonlinear unknown state time-varying delay systems in block-triangular control structure. Radial basis function (RBF...
详细信息
In this paper, adaptive neural control is proposed for a class of multi-input multi-output (MIMO) nonlinear unknown state time-varying delay systems in block-triangular control structure. Radial basis function (RBF) neural net- works (NNs) are utilized to estimate the unknown continuous functions. The unknown time-varying delays are compensated for using integral-type Lyapunov-Krasovskii functionals in the design. The main advantage of our result not only efficiently avoids the controller singularity, but also relaxes the restriction on unknown virtual control coefficients. Boundedness of all the signals in the closed-loop of MIMO nonlinear systems is achieved, while The outputs of the systems are proven to converge to a small neighborhood of the desired trajectories. The feasibility is investigated by two simulation examples.
An output-feedback fault tolerant control problem for networked control system (NCS) with network-induced delay and data packet dropout is investigated. In both sensor-to-controller link and controller-to-actuator lin...
详细信息
An output-feedback fault tolerant control problem for networked control system (NCS) with network-induced delay and data packet dropout is investigated. In both sensor-to-controller link and controller-to-actuator link, the total time-varying and unknown network-induced delay can be separated into two parts, that is, one is a constant and the other is a bounded variable. The effect of the network-induced delay is transformed into model uncertainty. The data packet dropout is modelled as two switches that follow a four-state Markov chain. Then a discrete-time Markovian jump uncertain model of NCS with actuator (complete/partial) failure is established. The sufficient and necessary condition for exponential mean square stability is derived. Moreover, a linear matrix inequality approach for designing switching output-feedback controllers are presented. Finally, two numerical examples are presented to illustrate the effectiveness of the proposed method.
Mutation analysis is widely employed to evaluate the effectiveness of various software testing techniques. In most situations, mutation operators are uniformly applied to the original programs, while the faults tend t...
详细信息
In this paper, we propose a mapping and navigation method for mobile robots with low computational resources and limited memory capacity. The proposed navigation method is based on topological mapping of visual featur...
详细信息
This paper is concerned with the design of networked control systems with random network-induced delay and data dropout. It presents a new control scheme, which is termed networked predictive control with optimal esti...
详细信息
暂无评论