Active Disturbance Rejection Control (ADRC) is a data-driven algorithm that offers a promising approach for robust control design. This paper investigates the effectiveness of first-order and second-order ADRC for 3D ...
详细信息
Active Disturbance Rejection Control (ADRC) is a data-driven algorithm that offers a promising approach for robust control design. This paper investigates the effectiveness of first-order and second-order ADRC for 3D cranes. To compare the results fairly and reduce the heuristics in parameter tuning, the ADRC parameters were optimally computed via the African Vultures Optimization Algorithm. Both controllers based on ADRC are validated using experiments on a 3D crane laboratory system and their design and performance evaluation are done by minimizing the sum of squared errors. The results demonstrate the robustness of the ADRCs. This comparative analysis highlights the advantages and limitations of both control strategies, providing valuable insights for selecting the appropriate ADRC order for specific applications.
The goal of this paper is to obtain optimal models of an unstable transport system, which is a nonlinear process represented by the two-wheeled unstable transport system. An optimization problem is defined in order to...
详细信息
This paper introduces the Biometrics Data Space framework, which is a secure ecosystem built on Data Spaces technology and it is designed to address the challenges of suspect identification during cross-border crime i...
详细信息
ISBN:
(数字)9798350362480
ISBN:
(纸本)9798350362497
This paper introduces the Biometrics Data Space framework, which is a secure ecosystem built on Data Spaces technology and it is designed to address the challenges of suspect identification during cross-border crime investigation. Apart from Data Spaces technology, the proposed framework innovates by leveraging also Privacy Enhancing Technologies (PETs) and blockchain to enable secure, trustworthy, and sovereign data exchange between Law Enforcement Agencies (LEAs) across borders. Specifically, it utilizes advanced PETs, including Large-Scale Biometric Data Indexing based on deep hashing techniques and Homomorphic Encryption to allow for suspect identification without disclosing sensitive information of personal biometric data. Thus, it enables LEAs to securely compare and exchange encrypted sensitive biometric data, including facial images, fingerprints and voiceprints, while maintaining data privacy and data sovereignty. LEAs define the usage rules for the biometic data they own and these rules are enforced to and respected by the other LEAs participating in the Biometrics Data Space. The proposed architecture is designed to be scalable, allowing the incorporation of additional biometric modalitiies and the easy expansion and integration with new participant LEAs.
This paper presents an implementation of an ISM RFID module capable of simultaneous wireless information and power transfer, that is implemented in a three-layer configuration. The top two layers of the RFID module ar...
This paper presents an implementation of an ISM RFID module capable of simultaneous wireless information and power transfer, that is implemented in a three-layer configuration. The top two layers of the RFID module are used for the low profile, high gain (8 dBi), circular polarization antenna implementation. The proposed antenna consists of four radiating L-shaped patches on the top layer, which are fed from a circular power divider. The energy harvesting (EH) system and the communication module are implemented on the bottom third layer. A four-port coupler is used to direct 85-90% of the received power from the antenna to the EH system and the remaining to the communication module. TI CC2530 IC is used, and it is powered from the PMU of the EH system. With -13 dBm input power, at the coupler’s port 3, the communication module can support TX/RX communication cycle lasting up to 3.5 ms.
The positioning accuracy of various kinds of devices is often calculated by using Wi-Fi fingerprints as a data source of Received Signal Strength (RSS). Through different matching algorithms, these RSS values are rela...
详细信息
We present a photonic reservoir computing, relying on a non-linear phase-to-amplitude mapping process, able to classify in real-time multi-Gbaud time traces subject to transmission effects. This approach delivers an a...
详细信息
A dynamic fuzzy neural system is proposed, for time series anomaly detection. The model is entitled BFuzzTiD (Block-diagonal Fuzzy Time-series Detector) and consists of fuzzy rules whose consequent parts are three-lay...
详细信息
ISBN:
(数字)9781728154565
ISBN:
(纸本)9781728154572
A dynamic fuzzy neural system is proposed, for time series anomaly detection. The model is entitled BFuzzTiD (Block-diagonal Fuzzy Time-series Detector) and consists of fuzzy rules whose consequent parts are three-layer small recurrent neural networks. The hidden layer of each network has blocks of neurons that feed back to each other. BFuzzTid is trained by the Dynamic Resilient Propagation algorithm. The model learns the dynamics of the time series such that it can classify them by detecting the anomaly points. A comparative analysis is conducted with a series of time series anomaly detection models, in order to investigate the capabilities of the proposed detector.
Breast cancer stands as the most frequently diagnosed life-threatening cancer among women worldwide. Understanding patients' drug experiences is essential to improving treatment strategies and outcomes. In this re...
详细信息
We study algorithms for estimating the statistical leverage scores of rectangular dense or sparse matrices of arbitrary rank. Our approach is based on combining rank revealing methods with compositions of dense and sp...
详细信息
暂无评论