In the last few years, several studies have analyzed the performance of flooding and random walks as querying mechanisms for unstructured wireless sensor networks. However, most of the work is theoretical in nature an...
详细信息
This paper describes the control of an autonomous biped robot capable to be subjected to external pushing forces applied in the sagittal plane. A 1st order Takagi-Sugeno-Kang (TSK) type neuro fuzzy net, that was train...
详细信息
ISBN:
(纸本)9781424420582
This paper describes the control of an autonomous biped robot capable to be subjected to external pushing forces applied in the sagittal plane. A 1st order Takagi-Sugeno-Kang (TSK) type neuro fuzzy net, that was trained based on experimental and simulation data, is used. This net uses the zero moment point (ZMP) position and its variation as inputs, and the sagittal correction of the robot's body is obtained as the output. The ZMP is obtained be acquiring use of the force distribution on four force sensors placed under each robot's foot. The gait implemented on our biped is similar to a human gait. A human gait was acquired and adapted to the robot size. Some experiments were carried out and the results show that the used gait combined with the TSK neuro fuzzy net is appropriate to be used in the control of a biped robot, with and without an applied external force.
In this paper, we study the servomechanism problem for positive LTI systems. In particular, we consider the robust servomechanism problem of nonnegative constant reference signals for stable SISO positive LTI systems ...
详细信息
High dimensionality of belief space in DEC-POMDPs is one of the major causes that makes the optimal joint policy computation intractable. The belief state for a given agent is a probability distribution over the syste...
详细信息
Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred to as location anonymizer) responsible ...
详细信息
software Product Line (SPL) engineering is a software development approach that takes advantage of the commonality and variability between products from a family, and supports the generation of specific products by re...
详细信息
ISBN:
(纸本)9781595938732
software Product Line (SPL) engineering is a software development approach that takes advantage of the commonality and variability between products from a family, and supports the generation of specific products by reusing a set of core family assets. This paper proposes a UML model transformation approach for software product lines to derive a performance model for a specific product. The input to the proposed technique, the "source model", is a UML model of a SPL with performance annotations, which uses two separate profiles: a "product line" profile from literature for specifying the commonality and variability between products, and the MARTE profile recently standardized by OMG for performance annotations. The source model is generic and therefore its performance annotations must be parameterized. The proposed derivation of a performance model for a concrete product requires two steps: a) the transformation of a SPL model to a UML model with performance annotations for a given product, and b) the transformation of the outcome of the first step into a performance model. This paper focuses on the first step, whereas the second step will use the PUMA transformation approach of annotated UML models to performance models, developed in previous work. The output of the first step, named "target model", is a UML model with MARTE annotations, where the variability expressed in the SPL model has been analyzed and bound to a specific product, and the generic performance annotations have been bound to concrete values for the product. The proposed technique is illustrated with an e-commerce case study. Copyright 2008 ACM.
Interactive and batch tasks typically have aperiodic random demands and arrival patterns. Generally, interactive tasks are assigned high priority for high responsiveness. Batch tasks with less timing criticality are s...
详细信息
Balancing the recognition rate, processing time and memory requirement is an important issue for object recognition based on local features. For the task of recognizing not generic but specific objects (object instanc...
详细信息
This paper deals with a method for semantic keyword detection of web documents. While the document consists of many kinds of part-of-speech, we just consider noun words. We propose a method for measure of relation val...
详细信息
ISBN:
(纸本)1601320892
This paper deals with a method for semantic keyword detection of web documents. While the document consists of many kinds of part-of-speech, we just consider noun words. We propose a method for measure of relation value that represents relationship between words occurred in the document using WordNet. We calculate concept weight that measures semantic importance of words by using term frequency and relation value together. According to the concept weight, we detect the 10 keywords of document in order. Through experiment, we show that our method is possible to extract main keyword semantically from document.
The RFID framework constructed by Reader, Transponder and Middleware system forms a new construction of future production line automation, material management and logistic industry. The EPC (Electronic Product Code) N...
详细信息
ISBN:
(纸本)9781605580890
The RFID framework constructed by Reader, Transponder and Middleware system forms a new construction of future production line automation, material management and logistic industry. The EPC (Electronic Product Code) Network, advocated by international organization, EPCglobal Inc., is the standard technology of RFID application. This paper proposes a cross layer design that applies an intelligent mobile purchasing system by combining RFID smart phone at Physical layer, transferring the RFID code into EPC Network at Media Access Control Layer, gathering the EPC Domain Information at Application Layer and establishing the secure EPC network framework with Product of Authority Server (PAS) network environment at Application Layer. By using the cross-layer approach, user can purchase through the smart phone with RFID Reader. Content Web Server and ODS Server are responsible for recording the commodity information by EPC Code. The commodity will be directly sent to user's home through the Object Tracing Function of Secure EPC Network.
暂无评论