This paper studies the problem of designing robust model predictive control (RMPC) for four-wheel independently driven electric vehicles (FWIDEV) using differential speed steering. The nonlinear dynamic model of the e...
详细信息
ISBN:
(数字)9781728163031
ISBN:
(纸本)9781728163048
This paper studies the problem of designing robust model predictive control (RMPC) for four-wheel independently driven electric vehicles (FWIDEV) using differential speed steering. The nonlinear dynamic model of the electric vehicle is recast as a linear time-varying polytopic uncertain system. An important issue for this controller is the recursive solution for the lateral stabilisation of the uncertain system without the need for conventional steering. Consequently, based on the developed predictive model for the FWIDEV, sufficient conditions for the existence of an RMPC are given in terms of linear matrix inequalities (LMI) constraints, importantly, the stability conditions of the closed loop systems are also explained. Lastly, the proposed RMPC design shows strong disturbance attenuation and robustness for the uncertain system. The simulation results have also supported the proposed design as compared with a custom Matlab solver and other LMI designs.
Support Vector machine (SVM) is a linear model designed for classification problem and popular due to a number of their attractive features such as high generalization ability and promising performance. However, the h...
详细信息
The high availability of genome sequencing data and advancement in data mining stimulate the progress of biomedical breakthroughs and the hope of personalized medicine. Meanwhile, the popularity of personalized and co...
详细信息
ISBN:
(数字)9781728141213
ISBN:
(纸本)9781728141220
The high availability of genome sequencing data and advancement in data mining stimulate the progress of biomedical breakthroughs and the hope of personalized medicine. Meanwhile, the popularity of personalized and commercialized genome testing brings about increasing privacy concerns. Moreover, personal genomic data is a kind of Big Data, sensitive and highly correlated among relative by blood. Therefore, it is challenging to quantitatively evaluate the risks of kin genomic data privacy. To address this problem, we construct a genome data model to capture the characteristics of kin genomic data. Besides, we develop an inference attack method by operating belief propagation on a factor graph.
In recent times, Wireless Sensor Networks (WSNs) are broadly utilized in targeted monitoring applications. Traditional target coverage techniques usually consider that environment is known completely and every target ...
详细信息
In sensitive areas such as battlefields, a Wireless Sensor Network (WSN) is especially in military and civilian applications and it is of utmost importance to develop security in these networks. In various respects, t...
In sensitive areas such as battlefields, a Wireless Sensor Network (WSN) is especially in military and civilian applications and it is of utmost importance to develop security in these networks. In various respects, this can improve the quality of life. But to be used for protection reasons in multiple situations such as implementation. There is a high risk of being exposed to multiple viruses and hacking attacks. Unauthorized APs for information protection needs to be detected. Any malicious attacks against these networks, Like Sybil Attack leads to breach of security by enacting as a node that illegitimately declares several false identities at the same time. This misleads valid nodes, and they presume each of those identifiers as actual independent nodes by accident. Thus we proposed a machine learning model to detect Sybil attack in network where rawtraffic data has been collected and is used identify authorized and unauthorized APs in an integrated wired/wireless environment.
Accurate modeling of boundary conditions is an important aspect in room acoustic simulations. It has been shown that the acoustics of rooms is not only dependent on the frequency characteristic of the complex boundary...
详细信息
software project management has main role in the software industry. It includes different processes and knowledge areas. The triple constraint of the software project like time, cost and scope is directly dependent on...
详细信息
software project management has main role in the software industry. It includes different processes and knowledge areas. The triple constraint of the software project like time, cost and scope is directly dependent on the requirement of the project. Agile methodology is the iterative way for developing the software project for frequent changes, fast delivery and reduce risk. software project management also plays important role in agile based software project. Agile methodology influence software project management at 10 knowledge areas. In this study we carried out survey from different software companies and it shows that almost every software company uses agile development (Scrum) and has a positive impact on the software project management.
Machine learning algorithms are widely employed in plenty of classification or regression problems. While in real business world, it is confronted with huge and disorder data pattern. To recognize different kinds of u...
详细信息
ISBN:
(数字)9781728164946
ISBN:
(纸本)9781728164953
Machine learning algorithms are widely employed in plenty of classification or regression problems. While in real business world, it is confronted with huge and disorder data pattern. To recognize different kinds of users on the internet accurately and fast becomes a challenge. In a Wechat online bargain activity, the staff found that some strange users are highly like robots or malicious users. Thus we tried a two-level stacking model to detect them. This design got a good result of 0.98 accuracy after the training phase and an accuracy of 0.90 in a new term of the testing set. Moreover, this model is adaptable to linear and nonlinear datasets because of its diverse stacking of first-level classifiers. Therefore, this paper indicates a potential of the stacking classification model in big data times.
A natural and often used strategy when testing software is to use input values at boundaries, i.e. where behavior is expected to change the most, an approach often called boundary value testing or analysis (BVA). Even...
详细信息
Malicious software (Malware) applications in Android ecosystem is one of the critical issues. Manual detection of malware is not cost-effective and cannot keep up with the fast evolution of malware development in Andr...
详细信息
暂无评论