This paper presents a continuous-time adaptive control scheme for systems with uncertain non-symmetrical deadzone nonlinearity located at the output of a plant. An adaptive inverse function is developed and used in co...
详细信息
This paper presents a continuous-time adaptive control scheme for systems with uncertain non-symmetrical deadzone nonlinearity located at the output of a plant. An adaptive inverse function is developed and used in conjunction with a robust adaptive controller to reduce the effect of deadzone nonlinearity. The deadzone inverse function is also implemented in continuous time, and an adaptive update law is designed to estimate the deadzone parameters. The adaptive output deadzone inverse controller is smoothly differentiable and is combined with a robust adaptive nonlinear controller to ensure robustness and boundedness of all the states of the system as well as the output signal. The mismatch between the ideal deadzone inverse function and our proposed implantation is treated as a disturbance that can be upper bounded by a polynomial in the system states. The overall stability of the closed-loop system is proven by using Lyapunov method, and simulations confirm the efficacy of the control methodology.
Many applications of computer vision, such as variation frameworks, operate using level set methods which require some unknown parameters to be chosen before evolution of the level set function. In general, the parame...
详细信息
Many applications of computer vision, such as variation frameworks, operate using level set methods which require some unknown parameters to be chosen before evolution of the level set function. In general, the parameters should be estimated using provided data, however, in some cases, it can be defined empirically. The present work focuses on estimation of the coefficient in the energy functional that computes a weighted area of the region inside the contour and speeds up its motion toward the object boundaries. The paper discusses a new approach for the coefficient estimation comprised the image features such as mean and variance values of pixel intensities and image gradients. The advantages of the precise estimation of this parameter are following: (1) the convergence of the evaluation process is getting faster if the value of the coefficient in the weighted area term is higher that, therefore, may speed up the curve evolution; (2) the contour may pass through the object boundary in some lower contrast images if the coefficient is too large, thus the calculation of the coefficient may avoid this effect called boundary leakage. The provided result shows that the suggested approach on parameter estimation can increase the speed and quality of the convergence driving the motion of the zero level curve in images with different contrast.
A Hertzian dipole embedded in multiple periodic (MP) structures of lossless multilayer slabs is effectively analyzed using the equivalent conjugately characteristic-impedance transmission-line (CCITL) model. Numerical...
详细信息
A Hertzian dipole embedded in multiple periodic (MP) structures of lossless multilayer slabs is effectively analyzed using the equivalent conjugately characteristic-impedance transmission-line (CCITL) model. Numerical results show that the equivalent CCITL model provides accurate results, compared to those obtained from the conventional transmission-line model. It is found that the MP structures can provide more stopbands and can be used to improve the directivity as well.
Mainstream parallel algorithms for mining frequent itemsets (patterns) were designed by implementing FP-Growth or Apriori algorithms on MapReduce (MR) framework. Existing MR FP-Growth algorithms can not distribute dat...
详细信息
Carbon nanotubes (CNT) are an attractive alternative filler material for through silicon vias (TSV) due to their high aspect ratio, attractive mechanical and thermal properties and high current carrying capability. Th...
详细信息
Carbon nanotubes (CNT) are an attractive alternative filler material for through silicon vias (TSV) due to their high aspect ratio, attractive mechanical and thermal properties and high current carrying capability. Theoretically they can outperform Cu in terms of via resistance. Until now all CNT TSV reported in the literature were fabricated using electrically isolating catalyst support layers. In this work we demonstrate the growth of CNT with aspect ratios up to 35 on electrically conductive ZrN layers. This was used to fabricate the first CNT TSV which are directly contacted by metal thin-films on both sides of the CNT bundle, instead of resorting to the use of probe needles.
To extract effective and reliable characteristic is the emphasis of research on the human recognition. In this paper, firstly, by using principal component analysis (PCA) to reduce the dimension of feature vector, so ...
详细信息
In cloud computing, it is important to protect user data. Thus, data owners usually encrypt their data before outsourcing them to the cloud server for security and privacy concerns. At the same time, very often users ...
详细信息
In cloud computing, it is important to protect user data. Thus, data owners usually encrypt their data before outsourcing them to the cloud server for security and privacy concerns. At the same time, very often users need to find data for specific keywords of interest to them. This motivates the research on the searchable encryption technique, which allows the search user to search over the encrypted data. Many mechanisms have been proposed, and are mainly focusing on the symmetric searchable encryption (SSE) technique. However, they do not consider the search authorization problem that requires the cloud server only to return the search results to authorized users. In this paper, we propose an authorized and ranked. multi-keyword search scheme (ARMS) over encrypted cloud data by leveraging the ciphertext policy attribute-based encryption (CP-ABE) and SSE techniques. Security analysis demonstrates that the proposed ARMS scheme can achieve confidentiality of documents, trapdoor unlinkability and collusion resistance. Extensive experiments show that the ARMS is more superior and efficient than existing approaches in terms of functionalities and computational overhead.
E-health data release, which answers the statistical queries of the electronic Health Records (EHRs), has been widely adopted in modern health care services. However, since the EHRs contain sensitive information of th...
详细信息
ISBN:
(纸本)9781467383264
E-health data release, which answers the statistical queries of the electronic Health Records (EHRs), has been widely adopted in modern health care services. However, since the EHRs contain sensitive information of the patients, the data release procedure may lead to the leakage of the privacy of patients if it is done without necessary protection measures in place. On addressing this, existing research literature introduces differential privacy to provide the necessary privacy guarantee. However, it is not suitable in sensitive e-health environments because it lacks the efficiency for data processing and updating. In this paper, we propose an efficient e-health data release scheme with consistency guarantee under differential privacy. Specifically, we improve the performance of the previous work by designing a new private partition algorithm of histogram and also proposing a heuristic hierarchical query method. We conduct real experiments and compare our scheme with the existing one to show that the proposal is more efficient in terms of data processing and updating. Moreover, we increase the accuracy of data release through consistency and give proof of privacy to show that the proposed algorithm is under ϵ-differential privacy.
This is the second paper of a series authored by a collaboration of international researchers. It develops taxonomy for computer-based virtual reality simulators of relevance to the mining industry. A summary is prese...
详细信息
暂无评论