This paper describes an abnormal behavior detection system based on an omni-directional vision sensor as one of the important elements in realizing "Sensing and Robotic Support Room" for elderly people. Such...
详细信息
This paper describes an abnormal behavior detection system based on an omni-directional vision sensor as one of the important elements in realizing "Sensing and Robotic Support Room" for elderly people. Such support rooms are expected to be further developed in the future with the high performance to automatically recognize elderly people's actions and behavior patterns and detect the unusual patterns using some sensors and to support their daily motions using some robotic manipulator control systems. The proposed monitoring system using an omni-directional vision sensor automatically learns the daily behavior patterns and detects the unusual behavior patterns and actions using Bayesian Network approach. The Bayesian Network is constructed using image feature values such as the area and center-of gravity values extracted from the captured image sequence and the respective behavior patterns are represented as the conditional probabilities. Unusual behavior patterns can be automatically detected based on the low generation probability values. Some experiments based on the investigation of elderly people's typical daily behavior patterns show the effectiveness of the proposed system.
Diversity can play an important role in the performance improvement of a communication system in fading channels. The achievable performance with signal space diversity (SSD) is analyzed and a closed form expression f...
详细信息
Diversity can play an important role in the performance improvement of a communication system in fading channels. The achievable performance with signal space diversity (SSD) is analyzed and a closed form expression for the upper bound of average probability of bit error (P b ) for M-ary phase shift keying (MPSK) in Rayleigh fading channel is presented. The problem of calculating P b of coherent MPSK over a Rayleigh fading channel has been studied previously in the literature. A solution based on the nearest neighbors was given. In this paper we show that the results with the nearest neighbor approximation represent an expurgated bound and are only valid for a small range of rotational angles. Exact pair-wise error probability (PEP) is derived for Rayleigh fading channels. It is shown that Gray signal constellation mapping is not necessarily the best option for a system employing coordinate interleaving and constellation rotation. Rotation angles are optimized by finding the minimum of the upper bound of P b . It is shown that the new derived bound is tight for the entire range of rotational angles at high signal-to-noise ratio. Furthermore, the performance of the system in case of phase estimation error is also investigated by simulations.
This paper describes a novel smooth and stable driving trajectory generation scheme for electric powered wheelchair based on the third order spline curve. Electric powered wheelchair moved by the right and left electr...
详细信息
This paper describes a novel smooth and stable driving trajectory generation scheme for electric powered wheelchair based on the third order spline curve. Electric powered wheelchair moved by the right and left electric motors based on the human's joystick input is expected to be widely used as a mobility support system for elderly people and disabled people. As one of the high performance control systems for the electric powered wheelchair, this paper proposes a real-time driving trajectory generation scheme to improve the ride quality and safety. The proposed system generates various driving trajectories with the spline curves based on the circle equations and the future passing positions are estimated using the turning radius circle equations. The human's intent from the joystick input can be well reflected in the driving trajectory such as the turning radius. The third order spline curve trajectory can be generated from four passing positions including one past passing position, one present position and two estimated future positions. Some simulation and experiment results show the effectiveness of the proposed control system.
In 25 kV ac main line traction system the traction transformer located in the engine are repeatedly switched off and on during the normal run of the train due to presence of neutral section in the contact wire. The tr...
详细信息
In 25 kV ac main line traction system the traction transformer located in the engine are repeatedly switched off and on during the normal run of the train due to presence of neutral section in the contact wire. The transformer draws inrush current several times the full-load value. Its enegization creates severe power quality problem in each time. The inrush current may be reduced to the full-load value either by using point-on-wave switching device or by connecting an external resistor in series with the primary circuit. The resistor is shorted within a few cycles of energization of the transformer to avoid voltage drop and losses during the steady-state operation of the transformer. Simulation results illustrate the effect of voltage and frequency variation on the production of inrush current. Only one circuit breaker with a delayed contact closing may be used for resistance switching.
As digital ink technology continues to make an impact on the technical classroom, faculty members are exploring the different strategies for using this technology to improve student learning. The purpose of this panel...
详细信息
As digital ink technology continues to make an impact on the technical classroom, faculty members are exploring the different strategies for using this technology to improve student learning. The purpose of this panel is to demonstrate how faculty members are implementing this technology in engineering and science classrooms at three different institutions: Rose-Hulman institute of technology, University of Texas at Austin, and University of Vermont. The panel is designed to show both experienced pen computing users and those who are new to the field the different ways this versatile technology may be employed. In addition to the demonstrations, the presenters will discuss the pedagogical implications that result from the implementations. faculty who are interested in both the pedagogy and assessment of pen-based computing in the classroom should find the session informative and useful.
Recently, virtual reality (VR) technology has developed quickly, together with research conducted on various elemental and related technologies and research in various fields of its application. We experimented about ...
详细信息
Recently, virtual reality (VR) technology has developed quickly, together with research conducted on various elemental and related technologies and research in various fields of its application. We experimented about the delay. The haptic media is very sensitive to the network delay and its jitter and packet loss. The AHP is one of methods to evaluate physical phenomena as correctness of the human sensation. In consequence of its application to the present experiment, it was made clear that the haptic media could be estimated from the delay times. An experiment was conducted using the AHP technique into the effect of feedback force delay on users by using the normal feedback force of a spring as an experimental model. The experiments in this study showed that there is a time delay threshold of 4 ms or more. In addition, when a thorough experiment was conducted in this range, it was found that humans could perceive a variation (difference threshold) in the delay of feedback force for a virtual spring that is between 4 ms and 5 ms.
To realize efficient in-transit messages (bundles) authentication in delay tolerant networks (DTNs), this paper introduces a novel batch bundle authentication (BBA) scheme to validate the bundles in a batch instead of...
详细信息
To realize efficient in-transit messages (bundles) authentication in delay tolerant networks (DTNs), this paper introduces a novel batch bundle authentication (BBA) scheme to validate the bundles in a batch instead of authenticating them one by one. We take the advantage of identity based cryptography to dramatically reduce the transmission cost, and adopt batch signature technique to realize the efficient bundle signature verification. Compared with existing message authentication approaches, our scheme has the superiority on improved efficiency even under the invalid signature attack. Simulation results demonstrate that the proposed scheme can be an enhancement for current bundle security protocol specification.
The design tools, methods, and technologies used in industry to design digital hardware evolve quickly and continuously. Since the inception of wide-spread CAD tool use to define digital circuits around 40 years ago, ...
详细信息
Nowadays, there is an intense research activity in designing systems that operate in real life, physical environments. This research is spanned by various areas in computer science and engineering: embedded systems, r...
详细信息
Nowadays, there is an intense research activity in designing systems that operate in real life, physical environments. This research is spanned by various areas in computer science and engineering: embedded systems, reactive systems, wireless communications, hybrid systems, stochastic processes, etc. A severe limitation in the development of these systems is due to the mathematical foundation and complexity of the physical environment. Often, the physical environment is continuous and uncertain, and modelled in terms of continuous stochastic processes. These mathematics are quite different from the underlying mathematics of discrete controllers based on logic and algebra. In this paper, we make further developments of Hilbertean formal methods, an integrated specification framework based with a rich algebraic semantics. This framework axiomatises and abstracts away advanced structures from functional and stochastic analysis. We integrate a probabilistic version of Pi-calculus to provide a rigorous framework for embedded systems with mobile and adaptive communication structure. The integration mechanism is based on partial ordered sets. The resulting framework has the modelling power of connectionist models like neural networks. Moreover, we construct an energy integral to every specification. The power of formal specification and stochastic analysis are combined in a rigorous mathematical framework for the software development of embedded systems. In this way, we achieve a new foundation for the multidimensional codesign.
In recent years spectral clustering has become on e of the most popular clustering algorithms. It is a simple yet powerful method for finding structure in data using spectral properties of an associated pairwise simil...
详细信息
In recent years spectral clustering has become on e of the most popular clustering algorithms. It is a simple yet powerful method for finding structure in data using spectral properties of an associated pairwise similarity matrix. It is simple to implement, can be solved efficiently by standard linear algebra software, and very often outperforms traditional clustering algorithms such as the k-means algorithm. In this paper we propose a new way of image segmentation based on specifically created similarity matrix and based on it, very simple segmentation algorithm. The algorithm is theoretically motivated and demonstrated on nontrivial examples.
暂无评论