The paper surveys the ideas of cooperation between parametric and nonparametric (kernel-based) algorithms of nonlinear block-oriented system identification. Various strategies are proposed, dependently on the system s...
详细信息
The paper surveys the ideas of cooperation between parametric and nonparametric (kernel-based) algorithms of nonlinear block-oriented system identification. Various strategies are proposed, dependently on the system structure, number of data and the prior knowledge. The estimates are consistent and their rates of convergence are presented. The aim of the paper is to show some recent results in the field in a systematic, ordered way.
This paper presents a dual layer approach for robust fault tolerant estimation of nonlinear processes using a combined adaptive extended Kalman filter and fault detection and filter reconfiguration. From the one hand,...
详细信息
Possible formulations of mathematical programing problem concerning energy aware network are presented. Two main possibilities of reducing problem complexity are analysed: allocation of predefined paths and reformulat...
详细信息
Possible formulations of mathematical programing problem concerning energy aware network are presented. Two main possibilities of reducing problem complexity are analysed: allocation of predefined paths and reformulation of task using continuous variables. Properties of both methods are analysed and hybrid formulation is proposed. Comparison of complexity is provided.
This paper presents a distributed event-based control approach to cope with communication delays and packet losses affecting a networked dynamical system consisting of N linear time-invariant coupled systems. Two comm...
详细信息
This paper presents a distributed event-based control approach to cope with communication delays and packet losses affecting a networked dynamical system consisting of N linear time-invariant coupled systems. Two communication protocols are proposed to deal with these communication effects. It is shown that both protocols preserve the system stability in the sense that the state of every subsystem converges to a small region around the origin if the delay and the number of packet losses are bounded. Analytical expressions for the delay bound and the maximum number of consecutive packet losses are derived. Simulations illustrate the results.
This paper presents a novel approach for human palms motion tracking without markers, which is different from the conventional marker based methods. The joints are estimated by adding depth and silhouette information....
详细信息
ISBN:
(纸本)9780000000002
This paper presents a novel approach for human palms motion tracking without markers, which is different from the conventional marker based methods. The joints are estimated by adding depth and silhouette information. Combining the information from the depth and the color frames, a new matte is created. A depth mask is generated by background subtraction and it can be used to handle the edges of the palms. The segmentation step does not make strong restrictions to the capture environment, e.g. homogenous clothing or background, constant lighting. Cam-shift algorithm utilizes color distribution to find target candidate and the background noise could be removed by combining motion detection. Since the changes between different frames are so small Kalman Filter is used to predict coordinates of each joint so as to minimize the searching cost. Curve fitting is made to reconstruct the motion trajectories of the discrete joints. Finally, the method proposed in this paper has been realized by a software platform, visual studio 2010, and the system runs at 30 frames per second on PC with high accuracy on palms tracking. While the principle and feasibility of the method have been demonstrated, there are still several open issues to be addressed in future work, e.g. some complicated scenarios might cause accuracy problems for human silhouette extraction which including human body moving while very close to objects in the scene such as chair, wall.
Visualization of ontologies is based on effective graphical representations and interaction techniques that support users tasks related to different entities and aspects. Ontologies can be very large and complex due t...
详细信息
Real objects in general are fractional-order (FO) systems, although in some types of systems the order is very close to an integer order. Also application of FO models is more adequate for the description of dynamical...
详细信息
This paper is concerned with the design of networked control systems with random network-induced delay and data dropout. It presents a new control scheme, which is termed networked predictive control with optimal esti...
详细信息
Biometric personal authentication is an emerging technology in information security. One resulting problem has been a recent increase in fraud based on falsified biometric data concerning biological information. Brain...
详细信息
Biometric personal authentication is an emerging technology in information security. One resulting problem has been a recent increase in fraud based on falsified biometric data concerning biological information. Brainwave-based identification is a promising biometric tool to prevent impostor attacks. Many researchers have reported biometric results using electroencephalogram (EEG) activity. The brainwave features of each individual are unique and have the potential for use in biometric authentication. Security can be enhanced by employing as many EEG features of an individual as possible. Although it takes time to measure brain waves at present, this authentication method can potentially be used for special security areas in the future. There are several approaches to brainwave biometrics using cognitive processes. We investigated the motor imagery for movements of the left hand, right hand, tongue, and both feet for brainwave biometrics. The nature of brain signal analysis parallels voice signal analysis in some respects. Hence, we applied the cepstral analysis method, which is commonly used in speech recognition, for feature extraction for brainwave biometrics. In our results, we identified almost all nine of the subjects correctly. We tested the performance of our biometric system using the Mahalanobis distance as the threshold and estimated the equal error rate (EER) value to be 0.17.
Network coding could effectively improve transmission performance of multicast network, but encoding of node brings the additional calculation cost of node. In order to overcome the overhead brought by network coding,...
详细信息
ISBN:
(纸本)9781467344999
Network coding could effectively improve transmission performance of multicast network, but encoding of node brings the additional calculation cost of node. In order to overcome the overhead brought by network coding, a network coding optimization model under the framework of algebraic network coding is designed in this paper, and the joint optimization for both the link cost and coding cost of network coding are carried out based on this model. In addition, the paper proposes MOONC (Multi-Objective Optimization Problem of Network Coding) based on improved NSGA-II algorithm. Adopting non-dominated sorting mechanism, virtual fitness and elitist strategy, this algorithm could not only improve algorithm efficiency and convergence speed, but also guarantee the population diversity. The simulation for typical network topology shows that this algorithm is effective and feasible.
暂无评论