With rapid urbanization, smart cities have become essential for enhancing urban management and sustainability by integrating technological, social, and institutional innovations. Among these innovations, vehicle-to-ev...
详细信息
In the applications of joint control and robot movement,the joint torque estimation has been treated as an effective technique and widely *** are made to analyze the kinematic and compliance model of the robot joint w...
详细信息
In the applications of joint control and robot movement,the joint torque estimation has been treated as an effective technique and widely *** are made to analyze the kinematic and compliance model of the robot joint with harmonic drive to acquire high precision torque *** analyzing the structures of the harmonic drive and experiment apparatus,a scheme of the proposed joint torque estimation method based on both the dynamic characteristics and unscented Kalman filter(UKF)is designed and *** on research and scheme,torque estimation methods in view of only harmonic drive compliance model and compliance model with the Kalman filter are simulated as guidance and reference to promote the research on the torque estimation ***,a promoted torque estimation method depending on both harmonic drive compliance model and UKF is designed,and simulation results compared with the measurements of a commercial torque sensor,have verified the effectiveness of the proposed method.
The identification and classification of collective people’s activities are gaining momentum as significant themes in machine learning,with many potential applications *** need for representation of collective human ...
详细信息
The identification and classification of collective people’s activities are gaining momentum as significant themes in machine learning,with many potential applications *** need for representation of collective human behavior is especially crucial in applications such as assessing security conditions and preventing crowd *** paper investigates the capability of deep neural network(DNN)algorithms to achieve our carefully engineered pipeline for crowd *** includes three principal stages that cover crowd analysis ***,individual’s detection is represented using the You Only Look Once(YOLO)model for human detection and Kalman filter for multiple human tracking;Second,the density map and crowd counting of a certain location are generated using bounding boxes from a human detector;and Finally,in order to classify normal or abnormal crowds,individual activities are identified with pose *** proposed system successfully achieves designing an effective collective representation of the crowd given the individuals in addition to introducing a significant change of crowd in terms of activities *** results onMOT20 and SDHA datasets demonstrate that the proposed system is robust and *** framework achieves an improved performance of recognition and detection peoplewith a mean average precision of 99.0%,a real-time speed of 0.6ms non-maximumsuppression(NMS)per image for the SDHAdataset,and 95.3%mean average precision for MOT20 with 1.5ms NMS per image.
This study investigates the enhanced properties of CaCu3Ti4O12 (CCTO) ceramics by substituting oxygen anions with chlorine to form CaCu3Ti4O10Cl2 (CCTO-Cl2). The structural, morphological, optical, and dielectric char...
详细信息
In Mobile Ad hoc Networks (MANET), Ad hoc On Demand Distance Vector (AODV) protocol suffers from the black hole attacks that disrupts the functionality of the network by displaying false information during routing pro...
详细信息
The rise of connected and autonomous vehicles signifies an era of intelligent transportation systems, where robust and continued network connectivity is essential for critical applications and enhanced in-vehicle Cons...
详细信息
This paper proposes and evaluates a new task scheduling method for parallel and distributed applications in an environment consisting of multiple networks having different characteristics. The proposed method can sche...
详细信息
The security of quantum broadcast communication(QBC) and authentication protocol based on Greenberger–Horne–Zeilinger(GHZ) state and quantum one-time pad is analyzed. It is shown that there are some security iss...
详细信息
The security of quantum broadcast communication(QBC) and authentication protocol based on Greenberger–Horne–Zeilinger(GHZ) state and quantum one-time pad is analyzed. It is shown that there are some security issues in this ***, an external eavesdropper can take the intercept–measure–resend attack strategy to eavesdrop on 0.369 bit of every bit of the identity string of each receiver without being detected. Meanwhile, 0.524 bit of every bit of the secret message can be eavesdropped on without being detected. Secondly, an inner receiver can take the intercept–measure–resend attack strategy to eavesdrop on half of the identity string of the other's definitely without being checked. In addition, an alternative attack called the CNOT-operation attack is discussed. As for the multi-party QBC protocol, the attack efficiency increases with the increase of the number of users. Finally, the QBC protocol is improved to a secure one.
In this paper we present our research concerning an automatic exchange between standard geometrical descriptions of a simulation environment built with (non-)convex polyhedra and a STEP conforming data format. Further...
详细信息
Hollow-core photonic crystal glass fibers have a high potential for gas sensing applications, since large light-gas interaction lengths can be effectively attained. Nevertheless, in order to enhance effective diffusio...
详细信息
暂无评论