This paper presents a central pattern generator (CPG) and vestibular reflex combined control strategy for a quadruped robot. An oscillator network and a knee-to-hip mapping function are presented to realize the rhyt...
详细信息
This paper presents a central pattern generator (CPG) and vestibular reflex combined control strategy for a quadruped robot. An oscillator network and a knee-to-hip mapping function are presented to realize the rhythmic motion for the quadruped robot. A two-phase parameter tuning method is designed to adjust the parameters of oscillator network. First, based on the numerical simulation, the influences of the parameters on the output signals are analyzed, then the genetic algorithm (GA) is used to evolve the phase relationships of the oscillators to realize the basic animal-like walking pattern. Moreover, the animal's vestibular reflex mechanism is mimicked to realize the adaptive walking of the quadruped robot on a slope terrain. Coupled with the sensory feedback information, the robot can walk up and down the slope smoothly. The presented bio-inspired control method is validated through simulations and experiments with AIBO. Under the control of the presented CPG and vestibular reflex combined control method, AIBO can cope with slipping, falling down and walk on a slope successfully, which demonstrates the effectiveness of the proposed walking control method.
The Locality-weight fuzzy c-means clustering method has been presented *** this approach can improve the clustering accuracies,it often gains the unstable clustering results because some random samples are employed fo...
详细信息
ISBN:
(纸本)9781467349970
The Locality-weight fuzzy c-means clustering method has been presented *** this approach can improve the clustering accuracies,it often gains the unstable clustering results because some random samples are employed for the initial *** this paper,an initialization method based on the core clusters is used for the locality-weight fuzzy c-means *** core clusters can be formed by constructing the σ-neighborhood graph and their centers are regarded as the initial centers of the locality-weight fuzzy c-means *** investigate the effectiveness of our approach,several experiments are done on three *** results show that our proposed method can improve the clustering performance compared to the previous locality-weight fuzzy c-means clustering.
This paper proposes a method of the fault detection and diagnosis for the railway turnout based on the current curve of switch machine. Exact curve matching fault detection method and SVM-based fault diagnosis method ...
详细信息
Incremental feature extraction is an essential data preprocessing technique for large-scale and streaming data mining. Among various covariance matrix-free Incremental Principal Component Analysis (IPCA) methods, Cand...
详细信息
This paper proposes a two-dimensional color uncorrelated principal component analysis algorithm(2DCUPCA) for unsupervised subspace learning directly from color face images. The 2DCUPCA can be used to explore uncorrela...
详细信息
Since wireless sensor networks (WSN) are often deployed in an unattended environment and sensor nodes are equipped with limited computing power modules, user authentication is a critical issue when a user wants to acc...
Since wireless sensor networks (WSN) are often deployed in an unattended environment and sensor nodes are equipped with limited computing power modules, user authentication is a critical issue when a user wants to access data from sensor nodes. Recently, M.L. Das proposed a two-factor user authentication scheme in WSN and claimed that his scheme is secure against different kinds of attack. Later, Khan and Alghathbar (K-A) pointed out that Das’ scheme has some security pitfalls and showed several improvements to overcome these weaknesses. However, we demonstrate that in the K-A-scheme, there is no provision of non-repudiation, it is susceptible to the attack due to a lost smart card, and mutual authentication between the user and the GW-node does not attained. Moreover, the GW-node cannot prove that the first message comes from the user. To overcome these security weaknesses of the K-A-scheme, we propose security patches and prove our scheme.
Considering characteristic of mHealth communication and problems of existing methods, this paper presents a real-time communication method for mHealth based on extended XMPP protocol. The method can maintain the role ...
详细信息
Considering characteristic of mHealth communication and problems of existing methods, this paper presents a real-time communication method for mHealth based on extended XMPP protocol. The method can maintain the role status efficiently and reduce data latency during the communication process. Meanwhile, it can be extended flexibly to meet increasing communication demands of mHealth services. Furthermore, a system framework is presented to support telemonitoring scene. Finally, system implementation and feasibility tests verify the effectiveness of the method and framework.
Supervisory control reconfiguration has been paid more attention due to its capacity of handling the uncertainties including resource failures, capability degradation, and task changes in discrete event systems. Howev...
详细信息
In the initialization of the traditional semi-supervised k-means, the mean of some labeled data belonging to one same class was regarded as one initial center and the number of the initial centers is equal to the numb...
详细信息
According to the randomness of the vessel's arrival time and handling time, the establishment of a randomly-oriented environment container berths-crane allocation model, the optimizing goal is to minimize the aver...
详细信息
暂无评论