The sequential fusion estimation for multisensor systems disturbed by non-Gaussian but heavytailed noises is studied in this paper. Based on multivariate t-distribution and the approximate t-filter,the sequential fusi...
详细信息
The sequential fusion estimation for multisensor systems disturbed by non-Gaussian but heavytailed noises is studied in this paper. Based on multivariate t-distribution and the approximate t-filter,the sequential fusion algorithm is presented. The performance of the proposed algorithm is analyzed and compared with the t-filter-based centralized batch fusion and the Gaussian Kalman filter-based optimal centralized fusion. Theoretical analysis and exhaustive experimental analysis show that the proposed algorithm is effective. As the generalization of the classical Gaussian Kalman filter-based optimal sequential fusion algorithm, the presented algorithm is shown to be superior to the Gaussian Kalman filter-based optimal centralized batch fusion and the optimal sequential fusion in estimation of dynamic systems with non-Gaussian noises.
In this paper, a deep residual network based on convolutional block attention module (CBAM) is proposed, which is utilized for feature extraction of partially occluded face expression data. The proposed method overcom...
详细信息
In recent years, the global robot market has witnessed substantial growth, particularly in the domain of service robots. Despite their expanding presence, service robots encounter limitations when operating autonomous...
In recent years, the global robot market has witnessed substantial growth, particularly in the domain of service robots. Despite their expanding presence, service robots encounter limitations when operating autonomously in unstructured environments, primarily due to their constrained computational capacities. As a solution, the fusion of cloud and edge computing resources becomes imperative to expedite task inference and enhance scenario perception capabilities. The integration of cloud-edge-device models holds significant promise in bolstering the operational efficiency of robots. This entails the dynamic partitioning of intricate robotic tasks, executed collaboratively across cloud, edge, and device resources. In this landscape, deep neural network (DNN) models play a pivotal role in facilitating a wide array of robotic tasks. The inference time for each layer of a DNN model in actual deployment, emerges as a critical determinant in the model’s partitioning strategy. It also serves as an important metric influencing the model’s suitability for a specific hardware platform. This article presents an overview of recent advancements in predicting inference and training time of DNN models, summarizes the related methods, and finally discusses the challenges in this field and the research that can be studied in the future.
This paper is concerned with the problem of finitehorizon energy-to-peak state estimation for a class of networked linear time-varying *** to the inherent vulnerability of network-based communication,the measurement s...
详细信息
This paper is concerned with the problem of finitehorizon energy-to-peak state estimation for a class of networked linear time-varying *** to the inherent vulnerability of network-based communication,the measurement signals transmitted over a communication network might be intercepted by potential *** avoid information leakage,by resorting to an artificial-noise-assisted method,we develop a novel encryption-decryption scheme to ensure that the transmitted signal is composed of the raw measurement and an artificial-noise term.A special evaluation index named secrecy capacity is employed to assess the information security of signal transmissions under the developed encryption-decryption *** purpose of the addressed problem is to design an encryptiondecryption scheme and a state estimator such that:1)the desired secrecy capacity is ensured;and 2)the required finite-horizon–l_(2)-l_(∞)performance is *** conditions are established on the existence of the encryption-decryption mechanism and the finite-horizon state ***,simulation results are proposed to show the effectiveness of our proposed encryption-decryption-based state estimation scheme.
As China's steel production accounts for an increasing share of the world's output, the intelligent transformation of the steel industry is becoming increasingly urgent. To address issues such as low levels of...
As China's steel production accounts for an increasing share of the world's output, the intelligent transformation of the steel industry is becoming increasingly urgent. To address issues such as low levels of mobile informationization in steel enterprises and the lack of an industry-specific mobile application platform, it is of great significance to establish a shared mobile application platform for the steel industry. In this paper, the requirements of the platform were analyzed, and the platform's functions were designed. The software design of the platform was then carried out, and the entire mobile application sharing platform was developed, effectively improving the production management efficiency of steel enterprises. The results indicate that the platform can effectively meet the needs of steel enterprises and has significant engineering significance.
This study addresses linear attacks on remote state estimation within the context of a constrained alarm rate. Smart sensors, which are equipped with local Kalman filters, transmit innovations instead of raw measureme...
详细信息
ISBN:
(数字)9798350316339
ISBN:
(纸本)9798350316346
This study addresses linear attacks on remote state estimation within the context of a constrained alarm rate. Smart sensors, which are equipped with local Kalman filters, transmit innovations instead of raw measurements through a wireless communication network. This transmission is vulnerable to malicious data interception and manipulation by attackers. The aim of this research is to identify the optimal attack strategy that degrades the system performance while adhering to stealthiness constraints. A notable innovation of this paper is the direct association of the attack’s stealthiness with the alarm rate, diverging from traditional approaches that rely on the covariance of the innovation or the Kullback–Leibler divergence, which are conventional metrics that have been extensively explored in previous studies. Our findings reveal that the optimal attack strategy exhibits some structural characteristics in systems of low dimensions. The performance of the proposed attack strategy is demonstrated through numerical examples.
Surrogate models, which have become an effective and popular method to close loop reservoir management problems, use a data-driven approach to predict dynamic injection and production wells parameters and optimize wat...
Surrogate models, which have become an effective and popular method to close loop reservoir management problems, use a data-driven approach to predict dynamic injection and production wells parameters and optimize waterflooding development. In this study, a deep learning-based surrogate model method is proposed to estimate bottomhole pressure (BHP) of production wells in waterflooding reservoirs. Bidirectional long short-term memory (BiLSTM) network, as an efficient deep learning approach, is applied to BHP estimation using fluctuation data. Extended Fourier amplitude sensitivity test (EFAST) method is employed to analyse the influence of different input factors on BHP dynamics, and a reduced dataset is rebuilt to predict BHP parameter based on BiLSTM-EFAST algorithm. The estimation results are tested on a dataset from Volve oilfield in North Sea, and compared with other deep learning methods. The test results indicate that the proposed method can achieve higher prediction accuracy. A reduced dataset-based approach provides a new attempt to reduce model complexity and improve calculation speed for big data-driven surrogate model in oil and gas industry.
Active Disturbance Rejection Control(ADRC)possesses robust disturbance rejection capabilities,making it well-suited for longitudinal velocity ***,the conventional Extended State Observer(ESO)in ADRC fails to fully exp...
详细信息
Active Disturbance Rejection Control(ADRC)possesses robust disturbance rejection capabilities,making it well-suited for longitudinal velocity ***,the conventional Extended State Observer(ESO)in ADRC fails to fully exploit feedback from first-order and higher-order estimation errors and tracking error simultaneously,thereby diminishing the control performance of *** address this limitation,an enhanced car-following algorithm utilising ADRC is proposed,which integrates the improved ESO with a feedback *** comparison to the conventional ESO,the enhanced version effectively utilises multi-order estimation and tracking ***,it enhances convergence rates by incorporating feedback from higher-order estimation errors and ensures the estimated value converges to the reference value by utilising tracking error *** improved ESO significantly enhances the disturbance rejection performance of ***,the effectiveness of the proposed algorithm is validated through the Lyapunov approach and experiments.
Perspiration is a physiological response in high-stress situations, that also plays a key role in thermoregulation and stress management. Understanding perspiration patterns is used for assessing physiological respons...
详细信息
Existing hand gesture recognition methods predominantly rely on a close-set assumption, which in essence limits the viewpoints, gesture categories, and hand shapes at test time to closely resemble those seen during tr...
详细信息
暂无评论