Abstract This paper presents servo control for discrete-time nonlinear systems with constraints on inputs and states using the fuzzy model-based control approach. Firstly, the nonlinear error system is constructed bas...
Abstract This paper presents servo control for discrete-time nonlinear systems with constraints on inputs and states using the fuzzy model-based control approach. Firstly, the nonlinear error system is constructed based on error vector between state and the target point by utilizing the input difference between current input and cancellation input. Secondly, the error system is exactly converted into a Takagi-Sugeno fuzzy model utilizing sector nonlinearity approach. Finally, the fuzzy servo controller is designed by simultaneously solving servo controller design condition and the constraint conditions on inputs and states. The design conditions are given in the form of LMI. Servo control with constraints on inputs and states is achieved by the designed servo controller. Design examples illustrate the utility of this approach.
We derive an instantaneous (per-round) data-dependent regret bound for stochastic multiarmed bandits with side information (also known as contextual bandits). The scaling of our regret bound with the number of states ...
详细信息
ISBN:
(纸本)9781618395993
We derive an instantaneous (per-round) data-dependent regret bound for stochastic multiarmed bandits with side information (also known as contextual bandits). The scaling of our regret bound with the number of states (contexts) N goes as NIpt(S;A)~1/2, where I_pt(S;A) is the mutual information between states and actions (the side information) used by the algorithm at round t. If the algorithm uses all the side information, the regret bound scales as N In K~1/2, where K is the number of actions (arms). However, if the side information I_pt(5;A) is not fully used, the regret bound is significantly tighter. In the extreme case, when I_pt (S;A) = 0, the dependence on the number of states reduces from linear to logarithmic. Our analysis allows to provide the algorithm large amount of side information, let the algorithm to decide which side information is relevant for the task, and penalize the algorithm only for the side information that it is using de facto. We also present an algorithm for multiarmed bandits with side information with O(K) computational complexity per game round.
In this paper, a Crossing Direction Finding (CDF) for localizations of multiple targets is proposed by using triangular theory. The location of a target is unique if the directions to other two determined points are k...
详细信息
In this paper, a Crossing Direction Finding (CDF) for localizations of multiple targets is proposed by using triangular theory. The location of a target is unique if the directions to other two determined points are known a priori. The two 2D direction-of-arrivals (DOAs) of target are obtained by using two cooperative radars respectively. The 2D DOAs are automatically matching by using L-shape array and conjugate-ESPRIT algorithm. The multiple targets' DOAs are automatically matching by using one reference sensor in multiple coordinate system. This method has less demand on radar system property, while hold a better resolution on localization than single radar detecting algorithm. Simulation results show that the CDF has a well performance on multiple targets localization.
Due to advancements in lighting technologies new opportunities for application emerge. In this paper an interdisciplinary study towards the development of adaptive lighting environments is presented. An implementation...
详细信息
Due to advancements in lighting technologies new opportunities for application emerge. In this paper an interdisciplinary study towards the development of adaptive lighting environments is presented. An implementation of an adaptive lighting environment is made in the domain of office work. For evaluation, experts from the domains of human-system interaction, activity and context recognition, and system architecture design are interviewed. Contributions are made with regard to the implementation of the adaptive lighting in office environments and an evaluation method that is in line with the interdisciplinary approach. From the evaluation method insights in the fields of human-computer interaction, activity and context recognition and system architecture and (wireless) networking and in topics that span across these fields are gained.
This article presents and discusses necessary conditions of optimality for infinite horizon dynamic optimization problems with inequality state constraints and set inclusion constraints at both endpoints of the trajec...
详细信息
ISBN:
(纸本)9781612848006
This article presents and discusses necessary conditions of optimality for infinite horizon dynamic optimization problems with inequality state constraints and set inclusion constraints at both endpoints of the trajectory. The cost functional depends on the state variable at the final time, and the dynamics are given by a differential inclusion. Moreover, the optimization is carried out over asymptotically convergent state trajectories. The novelty of the proposed optimality conditions for this class of problems is that the boundary condition of the adjoint variable is given as a weak directional inclusion at infinity. This improves on the currently available necessary conditions of optimality for infinite horizon problems.
The aim of this work is to propose a multifractal analysis method for Multifractal Detrended Fluctuation analysis (MF-DFA) of Blood Oxygen Level Dependent (BOLD) functional Magnetic Resonance Imaging (fMRI). The fMRI ...
详细信息
The aim of this work is to propose a multifractal analysis method for Multifractal Detrended Fluctuation analysis (MF-DFA) of Blood Oxygen Level Dependent (BOLD) functional Magnetic Resonance Imaging (fMRI). The fMRI signals exhibit a 1/f power spectrum, hence their structure has self-similarity and long memory, being usually successfully analyzed by different fractal analysis methods without a previous knowledge of haemodynamic models. Therefore, to validate activation detection using the MF-DFA method, a comparison study between images obtained using General Linear Model (GLM) and Independent Component Analysis (ICA) was conducted and evaluated by discrimination power, applying Receiver Operating Characteristic (ROC) analysis to the results.
In mathematics, various representations of real numbers have been investigated and all these representations are proved to be mathematically equivalent. Furthermore, it is known that all effective versions of these re...
详细信息
Offline analysis pipelines have been developed and evaluated for the detection of covert attention from electroen-cephalography recordings, and the detection of overt attention in terms of eye movement based on electr...
详细信息
In this work, by starting from the theoretical framework proposed in [1], the problem of decentralized supervision of a Petri net through collaboration among supervisors is addressed. Communication is assumed to be av...
详细信息
ISBN:
(纸本)9781612848006
In this work, by starting from the theoretical framework proposed in [1], the problem of decentralized supervision of a Petri net through collaboration among supervisors is addressed. Communication is assumed to be available but limited to one-hop neighbors, i.e., supervisors reachable from one another with respect to a certain communication radius r. A sufficient condition to achieve decentralized admissibility by focusing the attention on the communication topology of the network of supervisors is provided. Furthermore, under the assumption of control under concurrent firing, a protocol to reach an agreement on the control input among the supervisors is proposed. Finally, a feasibility analysis for the implementation of the proposed decentralized control framework is discussed.
We developed a wireless sensor network system for supporting context-awareness of nursing activities in hospitals. Our system is aimed at automated recording of nursing work, providing context-aware services to nurses...
详细信息
暂无评论