Path planning is one of the most critical links in mobile robots. Its timeliness, security and accessibility are crucial to the development and wide application of mobile robots. However, in solving the problem of pat...
详细信息
This paper investigates controlling the commercialized Spykee mobile robot, using only brain electroencephalography (EEG) signals transmitted by the Emotiv Epoc Neuro Headset. The Spykee robot is equipped with a wirel...
详细信息
This paper is concerned with the design of networked controlsystems with random network data dropout. It presents a new control scheme, which is termed networked predictive control. This scheme mainly consists of the...
详细信息
作者:
Xia, YuanqingLiu, BoSchool of Automation
Key Laboratory of Intelligent Control and Decision of Complex Systems Beijing Institute of Technology Beijing 100081 China
Summary This paper is devoted to the detection of abrupt changes for multiple-input, multiple-output (MIMO) linear systems based on frequency domain data. The real discrete-time Fourier transform is used to map the me...
详细信息
In recent years, cyber-physical systems (CPSs) have received much attention from both the academic world and the industrial world, which refer to a deep integration and coordination of physical and computational resou...
In recent years, cyber-physical systems (CPSs) have received much attention from both the academic world and the industrial world, which refer to a deep integration and coordination of physical and computational resources [1,2]. Typical examples of CPSs can be found in smart grids, smart transportation systems, industrial controlsystems, water supply systems, and so on. Furthermore, many military systems are also CPSs. The key characteristic of CPSs is the integration of computing, control and communication. The increased interconnection between the cyber and physical spaces make CPSs vulnerable to various malicious attacks. A well-known example of an attack of CPSs is the Stuxnet which infected the control system of nuclear-fuel centrifuges of Bushehr nuclear power plant in Iran. Stuxnet makes people beware of the grave consequences of a cyber-attack on a CPS. Since many national critical infrastructures are applications of CPS, ensuring security and safety of such systems is of great importance.
This paper proposed a novel dual-threshold computation method of Canny edge detector based on gradient magnitude histogram (GMH), targeting with the adaptive acquisition of low-/high-threshold for unimodal hysteresis ...
详细信息
ISBN:
(纸本)9781479908813
This paper proposed a novel dual-threshold computation method of Canny edge detector based on gradient magnitude histogram (GMH), targeting with the adaptive acquisition of low-/high-threshold for unimodal hysteresis thresholding. With the introduction of the bowstring concept, which accurately measures the tendency of the GMH on the whole, the dual-threshold computation is implemented by adaptive-searching two tangent points with transitional characteristics. This skillful algorithm of the dual-threshold computation method is further evaluated by using the receiver operating characteristics (ROC) curve evaluation method. The detailed comparison to the Otsu's method is presented and demonstrates the reliability and robust performance of the proposed dual-threshold computation method.
Mapping UAVs have played a more important role in regional mapping than ever before, and coverage path planning is an important part of mapping tasks. However, there are few studies on single-region path planning in c...
详细信息
Mapping UAVs have played a more important role in regional mapping than ever before, and coverage path planning is an important part of mapping tasks. However, there are few studies on single-region path planning in complex polygonal region. In this paper, we proposed a method that searches the optimal yaw-angle and flight height of mapping UAVs based on particle swarm optimization algorithm. Compared with traditional algorithms such as cattle farming algorithm, there are less redundant coverage and turning, and the flight path planned by the algorithm in this paper is more reasonable and convenient for photographic processing.
In this paper, we propose a time division multiple access(TDMA) based protocol that works on slightly modified IEEE802.15.4 network in star topology for secured and unsecured low latency deterministic networks(LLDN) f...
详细信息
ISBN:
(纸本)9781467374439
In this paper, we propose a time division multiple access(TDMA) based protocol that works on slightly modified IEEE802.15.4 network in star topology for secured and unsecured low latency deterministic networks(LLDN) for industrial controlsystems. This protocol ensures total superframe time as low as ten milliseconds as compared to minimum possible superframe time of 15.36 milliseconds. In these networks, Each end device transmits its data frame in their allotted timeslot. The timeslot and inter timeslot spacing is optimized for channel bandwidth utilization and reliable data frame exchange. While this TDMA based protocol eliminates the risk of frame collisions to great extent, MAC sub-layer tweaking improves the non-determinism of the network and increases its bandwidth efficiency. We also investigate the security impact on the performance of LLDN. A mathematical model is developed that takes empirical values as input and predicts the worst case arrival times of network devices at coordinator. Experiments were conducted to evaluate the suggested protocol and mathematical model.
This paper proposes a tightly-coupled lidar-GNSS-inertial fusion system that achieves accurate state estimation and mapping for robot *** system effectively fuses lidar points,GNSS measurements,and IMU data using the ...
详细信息
ISBN:
(数字)9789887581581
ISBN:
(纸本)9798350366907
This paper proposes a tightly-coupled lidar-GNSS-inertial fusion system that achieves accurate state estimation and mapping for robot *** system effectively fuses lidar points,GNSS measurements,and IMU data using the iterated error state Kalman filter algorithm to obtain precise,drift-free,and real-time *** optimize computational efficiency,an incremental tree structure,ikdtree,is employed for managing a local map,and different Kalman gain formulas are utilized to process GNSS and lidar point observations separately to lower the computation ***,a factor graph is introduced to optimize the pose *** selectively introducing keyframes based on the odometry estimation,the graph incorporates odometry,GNSS measurements,and loop closure constraints to optimize all keyframe poses,resulting in a precise trajectory and global ***,extensive experiments are conducted using the KITTI dataset and several real-world scenarios to validate the proposed *** experimental results demonstrate that our method achieves precise localization and mapping across diverse environments.
The local map can update the local environment information in real time, which provides the environment information for the local dynamic planning of the robot. In this paper, a local cost map construction method base...
详细信息
The local map can update the local environment information in real time, which provides the environment information for the local dynamic planning of the robot. In this paper, a local cost map construction method based on 3D-LIDAR and camera is proposed. We use camera to detect lane lines in structured road and 3D-LIDAR to detect road boundaries in unstructured environment, and then use DS evidence reasoning to determine the current local road information. Dynamic obstacle information in the environment is obtained through 3D point cloud data segmentation, which is fused with the road information to get 3D point cloud information in the local range and generate local cost map according to it. Experiments show that the method in this paper can accurately extract the current road information whether in structured roads or unstructured roads. The fused local cost map can enable the robot to perform reasonable local planning and complete navigation on the current road.
暂无评论