One of the main concerns in underground working tunnels is ensuring the safety of the workers and their equipment. Being aware of the real-time position of personnel in such harsh environment is challenging and requir...
详细信息
One of the main concerns in underground working tunnels is ensuring the safety of the workers and their equipment. Being aware of the real-time position of personnel in such harsh environment is challenging and requires a sophisticated localization system. With traditional Received Signal Strength (RSS) failing to accurately estimate the distance between nodes due to multipath effect in such long and narrow space, Radio Frequency Time-of-Flight (RF-TOF) is proved to be an alternative method for more accurate distance estimation. To reduce the communication cost, a distributed localization scheme is proposed, where a simple Newton Iteration location estimation algorithm is embedded in the blind node. Linear least square estimation is used as the initial value to accelerate the convergence of the iteration. Experimental results show the effectiveness of the proposed scheme.
One of the main limitations of the brain functional connectivity estimation methods based on Autoregressive Modeling, like the Granger Causality family of estimators, is the hypothesis that only stationary signals can...
详细信息
An important issue in the analysis of two-dimensional electrophoresis images is the detection and quantification of protein spots. The main challenges in the segmentation of 2DGE images are to separate overlapping pro...
详细信息
Neither electromechanical transient stability analysis (TSA) program nor electromagnetic transient (EMT) programs can be used individually for the transient stability studies of the large scale AC/DC systems. This pap...
详细信息
We consider the scenario where an organ of a public administration, which we refer as the decisionmaker, is requested to plan one or more interventions in some framework related to the Information Society or the eGove...
详细信息
ISBN:
(纸本)9789898565235
We consider the scenario where an organ of a public administration, which we refer as the decisionmaker, is requested to plan one or more interventions in some framework related to the Information Society or the eGovernment set of actions. We propose a methodology to support the decisionmaker in orienting, planning, and evaluating multiple (partially overlapping) interventions. In particular, we address two main problems: first, how to decide the structure of the interventions and how to determine the relevant parameters involved;second, how to set up a scoring system for comparing single interventions and its extension to the case of multiple interventions. The methodology unexpectedly shows that it is not always the case that the best outcome is the one obtained by the best projects. We formally model the problem and discuss its computational complexity. Our approach is also effective in process of selecting, from a set of submitted proposals, the ones to be funded.
This paper concerns the domain of the multimodal transportation systems composed of buses, trains, trams and subways lines and focuses on the scheduling problems encountered in these systems. Transportation Network In...
详细信息
This paper concerns the domain of the multimodal transportation systems composed of buses, trains, trams and subways lines and focuses on the scheduling problems encountered in these systems. Transportation Network Infrastructure (TNI) can be modeled as a network of lines providing cyclic routes for particular kinds of stream-like moving transportation means. Lines are connected by common shared change stations. Depending on TNI timetabling the time of the trip of passengers following different itineraries may dramatically differ, e.g. the same distances along the north-south, and east-west directions may require different travel time. So, the mine question regards of TNI schedulability, e.g. the guarantee the same distances in arbitrarily assumed directions will require approximate traveled time. Considered timetabling problem belongs to NP-hard ones. The declarative model of TNI enabling to formulate cyclic scheduling problem in terms of the constraint satisfaction one is our main contribution. At last, the simulated results manifest the promising properties of the proposed model.
An expansion procedure to design partially decentralized controllers via model predictive control is proposed in this paper. Partially decentralized control is a control structure that lies between a fully decentraliz...
详细信息
An expansion procedure to design partially decentralized controllers via model predictive control is proposed in this paper. Partially decentralized control is a control structure that lies between a fully decentralized structure and a fully centralized one, and has the advantage of achieving comparable performance as a fully centralized controller but with simpler structure. The proposed method follows the expansion method proposed in a previous paper where internal model control (IMC) was used to design controllers for non-square subsystems. The method requires computing the pseudo-inverse of a non-square matrix via pseudo-inverse factors. Instead, the proposed method will use dynamic model control (DMC) to design PID controllers for non-square sub-systems without using additional factors. Simulation results show that the proposed method is simple and can achieve better performance than fully decentralized control.
Partially decentralized control is a control structure that lies between a fully decentralized structure and a fullycentralized one, and has the advantage of achieving comparable performance as a fully centralized con...
详细信息
Partially decentralized control is a control structure that lies between a fully decentralized structure and a fullycentralized one, and has the advantage of achieving comparable performance as a fully centralized controller but with simplerstructure. This paper proposes an expansion procedure to design partially decentralized controllers via generalized predictivecontrol (GPC). The proposed method does not need to compute the pseudo-inverse of a non-square system thus overcomes thedrawbacks of the existing expansion method proposed in a previous paper. Simulation results show that the proposed method issimple and can achieve better performance than the previous method.
This article consists of a collection of slides from the author's conference presentation on Ivy Bridge, power management applications of the third generation core Intel micro architecture. Some of the specific to...
详细信息
ISBN:
(纸本)9781467388801
This article consists of a collection of slides from the author's conference presentation on Ivy Bridge, power management applications of the third generation core Intel micro architecture. Some of the specific topics discussed include: an overview of the Ivy Bridge architecture and supported applications; power scaling and management facilities; core product features; power efficiency; voltage control and optimization technqiues; power sharing capabilities; and system architecture.
In this paper we address the question of "Why is it that a mobile robot, programmed in a certain way and placed in some environment to execute a program, behaves in the way it does?". We present three real w...
详细信息
暂无评论