Error criteria (or error cost functions) play significant roles in statistical estimation problems. In this paper, we study error criteria from the viewpoint of information theory. The relationships between error crit...
详细信息
Error criteria (or error cost functions) play significant roles in statistical estimation problems. In this paper, we study error criteria from the viewpoint of information theory. The relationships between error criteria and error's entropy criterion are investigated. It is shown that an error criterion is equivalent to the error's entropy criterion plus a Kullback-Leibler information divergence (KL-divergence). Based on this result, two important properties of the error criteria are proved. Particularly, the optimum error criterion can be interpreted via the meanings of entropy and KL-divergence. Furthermore, a novel approach is proposed for the choice of p-power error criteria, in which a KL-divergence based cost is minimized. The proposed method is verified by Monte Carlo simulation experiments.
This paper examines the capturability of a guidance law that provides a desired angular acceleration of the heading angle to a pursuer. The guidance law has originally been proposed by Fajen and Warren[13], in order t...
详细信息
This paper examines the capturability of a guidance law that provides a desired angular acceleration of the heading angle to a pursuer. The guidance law has originally been proposed by Fajen and Warren[13], in order to explain the behavior of walking humans. It is shown that the relative rotational motion between a pursuer and an evader can be represented by an equation similar to the equation of motion for a pendulum with a disturbance. A set of sufficient conditions for successful pursuit are derived, and it is proved that the gain parameters of the guidance law can be chosen so that the conditions are satisfied. For sufficiently large gains, a pursuer controlled by the guidance law catches a maneuvering evader while achieving motion camouflage.
This paper presents a study on the optimal base location and arm motion of a mobile manipulator for door opening task. Numerical simulation results show that the base location where the manipulability of the two-link ...
详细信息
This paper presents a study on the optimal base location and arm motion of a mobile manipulator for door opening task. Numerical simulation results show that the base location where the manipulability of the two-link arm is almost degenerated at the start and end points of door opening is *** show by analysis that the location has an advantage in supplying kinetic energy to the door by using torques at the joints of arm. In order to represent properly the arm motion near a singular point of manipulability, the rotational motion of the door is parameterized by piecewise fifth order polynomials of time, and the parameters of polynomials are optimized to minimize the joint torques.
Time perception and inferences there from are of critical importance to many autonomous agents. But time is not perceived directly by any sensory organ. We argue that time is constructed by cognitive processes. Here w...
详细信息
A new bridge recognition method in Synthetic Aperture Radar (SAR) image using bridge model and SVM is presented in this paper. Firstly, water region is extracted from original SAR image by self-adapt segmentation and ...
详细信息
The methods estimating vulnerability of perimeter security systems are developed in the current study. Appropriate estimations are based on the fuzzy inference methods of intruder undetection risks on security zones s...
详细信息
The methods estimating vulnerability of perimeter security systems are developed in the current study. Appropriate estimations are based on the fuzzy inference methods of intruder undetection risks on security zones set in territory's perimeter.
In order to verify the benefit of four links kinematical method, the mathematical model of four links kinematics is established. The kinematical parameters of passive joints can be calculated according to the rotation...
详细信息
ISBN:
(纸本)9781424447749
In order to verify the benefit of four links kinematical method, the mathematical model of four links kinematics is established. The kinematical parameters of passive joints can be calculated according to the rotation of active joint. Then the wall-climbing robot can climb the vertical wall through the coordinated rotation of active joint and passive joints. To testify the feasibility of the four links kinematical method, a wall-climbing caterpillar robot based on vibrating suction method is developed. An experiment of wall-climbing confirms the kinematical method mentioned above. The result shows that the four links kinematical method is simple and reliable although some errors exist. At last, the conclusions and future works are present.
Ni nanowires (NWs) are driven in water using a rotating magnetic field. The NWs show various locomotion performances under different boundary conditions. Pure rotation occurs when the two ends of the NWs are homogenou...
详细信息
ISBN:
(纸本)9781424448326
Ni nanowires (NWs) are driven in water using a rotating magnetic field. The NWs show various locomotion performances under different boundary conditions. Pure rotation occurs when the two ends of the NWs are homogenously constrained. However, if the boundary conditions are different at the two ends of the NWs, tumbling motion, i.e., rotation plus translation, will be generated, which leads to the propulsion of NWs near a wall. These motions of NWs can be steered by the magnetic field. In addition, we present that the two NWs self-assemble to form a single NW with the magnetic field. The results imply that magnetic field is a promising approach for noncontact manipulation of Ni NWs or other 1-D ferromagnetic nanostructures at low Reynolds number aqueous environment in a controllable fashion.
Detecting pedestrians is a challenging task, which requires precise localization of pedestrians that appear in images and videos. Window-scanning based detection methods have demonstrated their promise by scanning the...
详细信息
Detecting pedestrians is a challenging task, which requires precise localization of pedestrians that appear in images and videos. Window-scanning based detection methods have demonstrated their promise by scanning the image densely with multi-scale detection window. However, an essential and critical issue, i.e., how to fuse these dense detections obtained through pedestrian detector and yield the final target detection, is not well addressed in the literature. This paper proposes and implements a general method for fusing pedestrian detections. In this method, detection fusion is regarded as a kernel density estimate and implemented through mean shift iterative procedure. Moreover, the notion of nearest neighbor consistency is adopted, which significantly accelerates the fusion procedure. Experimental results demonstrate the efficiency of the mean shift-based fusion method.
In this paper, adaptive control is investigated for a class of discrete-time nonlinear multi-agent systems (MAS). Each agent is of uncertain dynamics and is affected by other agents in its neighborhood. An agent is ab...
详细信息
In this paper, adaptive control is investigated for a class of discrete-time nonlinear multi-agent systems (MAS). Each agent is of uncertain dynamics and is affected by other agents in its neighborhood. An agent is able to sense the outputs of the agents inside its neighborhood but is unable to sense those outside its neighborhood. Among all the agents, there is a hidden leader, which knows the desired tracking trajectory, but it is affected by and can only affect those agents inside its neighborhood while all other agents are not aware of its leadership. The decentralized adaptive control is designed for each agent by using the information of its neighbors. Under the proposed decentralized adaptive controls, both rigid mathematical proof and simulation studies are provided to show that all the agents are guaranteed to reach their common goal, i.e., following the desired reference.
暂无评论