Energy losses during the conversion and supply of electric power are considered a significant issue and cannot be estimated. Improvement in the efficiency of energy conversion systems is highly restricted because of t...
详细信息
This paper introduces a method that globally converges to Bstationary points of mathematical programs with equilibrium constraints (MPECs) in a finite number of iterations. B-stationarity is necessary for optimality a...
详细信息
In this paper, we analyze a derivative-free line search method designed for bound-constrained problems. Our analysis demonstrates that this method exhibits a worst-case complexity comparable to other derivative-free m...
As the importance of security in today's world continues to escalate, technology's role in its enhancement has evolved significantly. From the inception of fixed security cameras monitored by individuals, adva...
详细信息
ISBN:
(数字)9798350373073
ISBN:
(纸本)9798350373080
As the importance of security in today's world continues to escalate, technology's role in its enhancement has evolved significantly. From the inception of fixed security cameras monitored by individuals, advancements have steered towards autonomous threat recognition systems and the deployment of mobile robots for proactive security measures. Despite these technological strides, the exploration of autonomous robots in security has been relatively scant. This study takes a novel approach by repurposing the commercial GO2 Edu dog robot for security purposes, equipping it with a thermal camera and custom software for robust face detection in varying lighting conditions, aimed at achieving safer and more reliable face recognition. Furthermore, the mapping and navigational capabilities are studied by conducting experiments with a Turtlebot outfitted with a 2D RPLIDAR and depth camera using SLAM, laying the groundwork for the GO2 robot's autonomous operations. The results of these enhancements have shown to be promising in the context of bolstering security measures. The paper concludes with a discussion on potential future enhancements, paving the way for more sophisticated and autonomous security robots.
Programmable logic controllers (PLCs), i.e., the core of control systems, are well-known to be vulnerable to a variety of cyber attacks. To mitigate this issue, we design PLC-Sleuth, a novel noninvasive intrusion dete...
详细信息
This article proposes a novel Peeling of Nano-Particle (PNP) process to locally remove material on a hard material surface using controllable magnetic fields. Fe3O4 particles in the size range of 50-100 nm in aqueous ...
详细信息
This paper addresses a kernel-based learning problem for a network of agents locally observing a latent multidimensional, nonlinear phenomenon in a noisy environment. We propose a learning algorithm that requires only...
详细信息
We consider the control design of stochastic discrete-time linear multi-agent systems (MASs) under a global signal temporal logic (STL) specification to be satisfied at a predefined probability. By decomposing the dyn...
详细信息
ISBN:
(数字)9798350316339
ISBN:
(纸本)9798350316346
We consider the control design of stochastic discrete-time linear multi-agent systems (MASs) under a global signal temporal logic (STL) specification to be satisfied at a predefined probability. By decomposing the dynamics into deterministic and error components, we construct a probabilistic reachable tube (PRT) as the Cartesian product of reachable sets of the individual error systems driven by disturbances lying in confidence regions (CRs) with a fixed probability. By bounding the PRT probability with the specification probability, we tighten all state constraints induced by the STL specification by solving tractable optimization problems over segments of the PRT, and relax the underlying stochastic problem with a deterministic one. This approach reduces conservatism compared to tightening guided by the STL structure. Additionally, we propose a recursively feasible algorithm to attack the resulting problem by decomposing it into agent-level subproblems, which are solved iteratively according to a scheduling policy. We demonstrate our method on a ten-agent system, where existing approaches are impractical.
The widespread availability of internet access and handheld devices confers to social media a power similar to the one newspapers used to have. People seek affordable information on social media and can reach it withi...
详细信息
The paper presents a novel observer design method for estimating the front and rear wheel slips of the vehicle. The proposed observer design technique consists of two parts: A simple linear observer algorithm, which u...
详细信息
ISBN:
(数字)9798350373974
ISBN:
(纸本)9798350373981
The paper presents a novel observer design method for estimating the front and rear wheel slips of the vehicle. The proposed observer design technique consists of two parts: A simple linear observer algorithm, which uses a reformulated lateral vehicle model to estimate the tire slips. The second part is based on an ultra-local model. The main goal of the ultra-local model is to eliminate the nonlinear, unmodeled, uncertain dynamics of the lateral vehicle model. In this way, the performance level of the linear observer can be significantly increased especially under critical circumstances such as high lateral acceleration maneuvers or driving on a low µ surface. The proposed observer algorithm is implemented in MATLAB/Simulink environment connected to the high-fidelity simulation software, CarMaker. The operation and the effectiveness of the proposed observer are demonstrated through several simulation examples.
暂无评论