To mitigate the inspector’s workload and improve the quality of the product, computer vision-based anomaly detection (AD) techniques are gradually deployed in real-world industrial scenarios. Recent anomaly analysis ...
详细信息
Over the past two decades, synchronization, as an interesting collective behavior of complex dynamical networks, has been attracting much attention. To reveal and analyze the inherent mechanism of synchronization in c...
详细信息
Over the past two decades, synchronization, as an interesting collective behavior of complex dynamical networks, has been attracting much attention. To reveal and analyze the inherent mechanism of synchronization in complex dynamical networks with time delays in nodes, this paper attempts to use PD and PI control protocols to achieve synchronization. Based on a classical network model, we investigate the PD and PI control for synchronization of complex dynamical networks with delayed nodes and obtain some sufficient conditions. By using Lyapunov functions and appropriate state transformations, we prove that global synchronization can be achieved via the above control protocols. Finally, some simulation examples are illustrated to validate the effectiveness of the proposed theoretical results.
Anomaly detection refers to identifying the observation that deviates from the normal pattern, which has been an active research area in various domains. Recently, the increasing data scale, complexity, and dimension ...
详细信息
This paper considers online convex optimization with long term constraints, where constraints can be violated in intermediate rounds, but need to be satisfied in the long run. The cumulative constraint violation is us...
详细信息
Identifying systems with high-dimensional inputs and outputs, such as systems measured by video streams, is a challenging problem with numerous applications in robotics, autonomous vehicles and medical imaging. In thi...
详细信息
Data-driven modeling of nonlinear dynamical systems often require an expert user to take critical decisions a priori to the identification procedure. Recently an automated strategy for data driven modeling of single-i...
详细信息
The Extra Robotic Legs (XRL) system is a robotic augmentation worn by a human operator consisting of two articulated robot legs that walk with the operator and help bear a heavy backpack payload. It is desirable for t...
详细信息
ISBN:
(数字)9781728173955
ISBN:
(纸本)9781728173962
The Extra Robotic Legs (XRL) system is a robotic augmentation worn by a human operator consisting of two articulated robot legs that walk with the operator and help bear a heavy backpack payload. It is desirable for the Human-XRL quadruped system to walk with the rear legs lead the front by 25% of the gait period, minimizing the energy lost from foot impacts while maximizing balance stability. Unlike quadrupedal robots, the XRL cannot command the human's limbs to coordinate quadrupedal locomotion. Using a pair of Rimless Wheel models, it is shown that the systems coupled with a spring and damper converge to the desired 25% phase difference. A Poincaré return map was generated using numerical simulation to examine the convergence properties to different coupler design parameters, and initial conditions. The Dynamically Coupled Double Rimless Wheel system was physically realized with a spring and dashpot chosen from the theoretical results, and initial experiments indicate that the desired synchronization properties may be achieved within several steps using this set of passive components alone.
This paper presents a tight small-gain theorem for networks composed of infinitely many finite-dimensional subsystems. Assuming that each subsystem is exponentially input-to-state stable, we show that if the gain oper...
详细信息
This paper presents a tight small-gain theorem for networks composed of infinitely many finite-dimensional subsystems. Assuming that each subsystem is exponentially input-to-state stable, we show that if the gain operator, collecting all the information about the internal Lyapunov gains, has a spectral radius less than one, the overall infinite network is exponentially input-to-state stable. We illustrate the effectiveness of our result by applying it to traffic networks.
learner’s cognitive and metacognitive are key personal profile for individualized teaching. To evaluate learner’s comprehensive characteristics, existing learner model were reviewed. Two challenges of constructing a...
详细信息
learner’s cognitive and metacognitive are key personal profile for individualized teaching. To evaluate learner’s comprehensive characteristics, existing learner model were reviewed. Two challenges of constructing an accurate and comprehensive learner model integrating cognitive and metacognitive were summarized. A plan of constructing a comprehensive learner model was made based on analysis of existing massive online learning environment, sensor information technology and educational data-mining. As a case study, a method of how to map learning data onto learners’ cognitive and metacognitive was proposed based on an analysis of a number of pupils’ Scratch projects. Three mapping table were established. Pupil’s cognitive skill could be evaluated from technology shown from Scratch project, namely, data structure, algorithm, computational practices and overall evaluation. Content shown from Scratch project were used to infer pupil’s cognitive style. Meta-cognitive ability can be measured from computational practices and behavior in programming process.
暂无评论