Authorization mechanism is an effective technique of access control. In this paper, we construct a multidimensional authorization space for RSM with the guidance of the methodology of RSM design. This authorization sp...
详细信息
Authorization mechanism is an effective technique of access control. In this paper, we construct a multidimensional authorization space for RSM with the guidance of the methodology of RSM design. This authorization space permits both positive and negative authorizations and supports exceptions and strong enforcement as well as the temporal constraints on the authorizations. For the sake of efficiency and convenience we extend the representation of object in GRANT command.
Omnidirectional mobile manipulator, which is composed by a three DOF omnidirectional mobile platform and a mounted manipulator, can move in any direction at any time. By reason of the redundantly actuated mechanism, t...
详细信息
Omnidirectional mobile manipulator, which is composed by a three DOF omnidirectional mobile platform and a mounted manipulator, can move in any direction at any time. By reason of the redundantly actuated mechanism, the omnidirectional motion property of the mobile platform is similar to the parallel manipulator cooperatively manipulating objects, which admits internal force doing none contribution to the motion of the platform. Thus, the internal force should be controlled to reduce energy waste. Therefore, a stable PD controller is developed first for motion control of the integrated mobile manipulator system. Then, by treating the motion induced force as disturbance, a feed forward plus PI type force controller is addressed to regulate the internal force to zero. Finally, simulation results demonstrate the validity of the proposed approach.
Target detection by a noncooperative illuminator is a topic of general interest in the electronic warfare *** of all,direct-path interference(DPI)suppression which is the technique of bottleneck of moving target detec...
详细信息
Target detection by a noncooperative illuminator is a topic of general interest in the electronic warfare *** of all,direct-path interference(DPI)suppression which is the technique of bottleneck of moving target detection by a noncooperative frequency modulation(FM) broadcast transmitter is analyzed in this article;Secondly,a space-time-frequency domain synthetic solution to this problem is introduced:Adaptive nulling array processing is considered in the space domain,DPI cancellation based on adaptive fractional delay interpolation(AFDI)technique is used in planned time domain,and long-time coherent integration is utilized in the frequency domain;Finally,an experimental system is planned by considering FM broadcast transmitter as a noncooperative illuminator,Simulation results by real collected data show that the proposed method has a better performance of moving target detection.
In recent years, semantic search has become one hot motivation of the semantic web. In this paper, we propose a semantic-based resource management and search architecture and its implementation in research community, ...
In recent years, semantic search has become one hot motivation of the semantic web. In this paper, we propose a semantic-based resource management and search architecture and its implementation in research community, ...
A great variety of languages can be designed by different people for different purposes to operate resource spaces. Two fundamental issues are: can we design more operations in addition to existing operations? and, ho...
详细信息
In the human, society, interconnection environment and systems methodology perspectives, this paper answers the following questions: What are the Knowledge Grid and its distinguished features? What are its methodology...
详细信息
In this paper we propose a novel speckle suppression method based on the joint of wavelet transform(WT) and independent component analysis (ICA).The method employs ICA to process the wavelet coefficients of images,ext...
详细信息
ISBN:
(纸本)0780397371
In this paper we propose a novel speckle suppression method based on the joint of wavelet transform(WT) and independent component analysis (ICA).The method employs ICA to process the wavelet coefficients of images,extracting the independent components which represent the uncorrupt images. Experimental results based on SAR(Synthetic Aperture Radar) images of MSTAR(Moving and Stationary Target Acquisition and Recognition) dataset show that the proposed method suppresses speckle effectively,and outperforms ICA and Lee filter.
We propose an appearance-based image clustering approach called GGCI (global geometric clustering for image). For face images taken with varying pose, expression, eyes (wearing sunglasses or not) or object images unde...
详细信息
Knowledge engineering stems from E. A. Figenbaum's proposal in 1977, but it will enter a new decade with the new challenges. This paper first summarizes three knowledge engineering experiments we have undertaken to s...
详细信息
Knowledge engineering stems from E. A. Figenbaum's proposal in 1977, but it will enter a new decade with the new challenges. This paper first summarizes three knowledge engineering experiments we have undertaken to show possibility of separating knowledge development from intelligent software development. We call it the ICAX mode of intelligent application software generation. The key of this mode is to generate knowledge base, which is the source of intelligence of ICAX software, independently and parallel to intelligent software development. That gives birth to a new and more general concept "knowware". Knowware is a commercialized knowledge module with documentation and intellectual property, which is computer operable, but free of any built-in control mechanism, meeting some industrial standards and embeddable in software/hardware. The process of development, application and management of knowware is called knowware engineering. Two different knowware life cycle models are discussed: the furnace model and the crystallization model. Knowledge middleware is a class of software functioning in all aspects of knowware life cycle models. Finally, this paper also presents some examples of building knowware in the domain of information system engineering.
暂无评论