Transfer alignment is used to initialize SINS(Strapdown Inertial Navigation System)in ***-arm effect compensation is studied existing in an AUV(Autonomous Underwater Vehicle)before launched from the mother *** AUV is ...
详细信息
Transfer alignment is used to initialize SINS(Strapdown Inertial Navigation System)in ***-arm effect compensation is studied existing in an AUV(Autonomous Underwater Vehicle)before launched from the mother *** AUV is equipped with SINS,Doppler Velocity Log,depth sensor and other navigation *** lever arm will cause large error on the transfer alignment between master inertial navigation system and slave inertial navigation system,especially in big ship *** paper presents a novel method that can effectively estimate and compensate the flexural lever arm between the main inertial navigation system mounted on the mother ship and the slave inertial navigation system equipped on the *** nonlinear measurement equation of angular rate is derived based on three successive rotations of the body frame of the master inertial navigation *** filter is utilized as the nonlinear estimator for its capability of non-linear *** analysis was conducted on the SINS state vector based on singular value decomposition *** equation of SINS was adopted as the system state *** experiments were conducted and results showed that the proposed method can estimate the flexural lever arm more accurately,the precision of transfer alignment was improved and alignment time was shortened accordingly.
With the rapid development of quantum theory and technology in recent years,especially the emergence of some quantum cloud computing platforms,more and more researchers are not satisfied with the theoretical derivatio...
详细信息
With the rapid development of quantum theory and technology in recent years,especially the emergence of some quantum cloud computing platforms,more and more researchers are not satisfied with the theoretical derivation and simulation verification of quantum computation(especially quantum algorithms),experimental verification on real quantum devices has become a new *** this paper,three representative quantum algorithms,namely Deutsch-Jozsa,Grover,and Shor algorithms,are briefly depicted,and then their implementation circuits are presented,*** program these circuits on python with QISKit to connect the remote real quantum devices(i.e.,ibmqx4,ibmqx5)on IBM Q to verify these *** experimental results not only show the feasibility of these algorithms,but also serve to evaluate the functionality of these devices.
With the advent of the information age in contemporary society, images are everywhere, no matter in military use or in daily life. Therefore, as a medium for people to obtain information, images have become more and m...
详细信息
Atmospheric PM2.5 is a pollutant that has a major impact on the atmospheric environment and human health. Based on LSTM, we construct two prediction models, Stack LSTM and Encoder-Decoder, and evaluate the prediction ...
详细信息
Social media network analysis has become very popular in recent years. How do real networks evolve over time? What are the normal evolving behaviors in a social media network? In order to extract behaviors occurring r...
详细信息
In order to eliminate the effect of varying illumination on face recognition, a novel illumination invariant method based on homomorphic filtering and LoG operator is proposed. The method first performs homomorphic fi...
详细信息
In order to eliminate the effect of varying illumination on face recognition, a novel illumination invariant method based on homomorphic filtering and LoG operator is proposed. The method first performs homomorphic filtering on image under various lighting conditions, whose key component is a Difference of Gaussian (DoG) filter, which can effectively reduce the effect of varying illumination. Then a LoG operator is used for illumination invariant extraction. Experimental results on the Yale face database B and CMU PIE database show that the proposed method can effectively eliminate the effect of varying illumination on face recognition, and the extracted illumination invariant is robust.
In recent years, the nearest neighbor search (NNS) problem has been widely used in various interesting applications. Locality-sensitive hashing (LSH), a popular algorithm for the approximate nearest neighbor probl...
详细信息
In recent years, the nearest neighbor search (NNS) problem has been widely used in various interesting applications. Locality-sensitive hashing (LSH), a popular algorithm for the approximate nearest neighbor problem, is proved to be an efficient method to solve the NNS problem in the high-dimensional and large-scale databases. Based on the scheme of p-stable LSH, this paper introduces a novel improvement algorithm called randomness-based locality-sensitive hashing (RLSH) based on p-stable LSH. Our proposed algorithm modifies the query strategy that it randomly selects a certain hash table to project the query point instead of mapping the query point into all hash tables in the period of the nearest neighbor query and reconstructs the candidate points for finding the nearest neighbors. This improvement strategy ensures that RLSH spends less time searching for the nearest neighbors than the p-stable LSH algorithm to keep a high recall. Besides, this strategy is proved to promote the diversity of the candidate points even with fewer hash tables. Experiments are executed on the synthetic dataset and open dataset. The results show that our method can cost less time consumption and less space requirements than the p-stable LSH while balancing the same recall.
Social network analysis has become extremely popular in recent years. What are the most significant evolving behaviors in a social network? It is very difficult to find significant evolving behaviors from a large netw...
详细信息
The traditional bag-of-visual-words (BOW) model quantifies the local features to the visual words to achieve efficient content-based image retrieval. However, since it causes considerable quantisation error and ignore...
详细信息
Cloud storage brings convenient storage of data, at the same time there are also hidden security issues. Data storage security includes legal access to the data stored in the cloud, namely access authorization and aut...
详细信息
暂无评论