It is a positive trend for hemiplegia with wearable robots in rehabilitation training. Recently, wearable Supernumerary Robotic Limb (SRL) is rising to a hot spot. The difficulty in modeling SRL for hemiplegia is how ...
详细信息
ISBN:
(纸本)9781665407748
It is a positive trend for hemiplegia with wearable robots in rehabilitation training. Recently, wearable Supernumerary Robotic Limb (SRL) is rising to a hot spot. The difficulty in modeling SRL for hemiplegia is how to make the SRL mechanism match the human upper and lower limbs' size and function simultaneously. In this paper, a simplified model of a four Degree of Freedoms (DOFs) universal SRL (USRL) is introduced. Based on workspace similarity, which is evaluated by Jaccard Index (JI), we establish a multi-object optimization (MOO) model. By applying the Particle Swarm Optimization (PSO) algorithm, we have found the optimal SRL mechanism parameters that meet the requirement of the human upper limb and the cane simultaneously. Meanwhile, a few impact factors are discussed briefly in the present proposal. The simulation results show that the USRL has a sound match with the human and could assist the hemiplegia subject as a supplemental limb.
The data acquisition of 3D-Ultrasound includes array scan and mechanical scan, and the later one is more easy to realize. Currently, the traditional probe scanning mode is Front-end scanning. Under the above scanning ...
详细信息
The data acquisition of 3D-Ultrasound includes array scan and mechanical scan, and the later one is more easy to realize. Currently, the traditional probe scanning mode is Front-end scanning. Under the above scanning mode, when it scans over the breast, 2D-Ultrasound probe slides through the surface of the patients' bodies, the image will be influenced strongly by the human *** this paper we propose a new scanning mode to solve the above problem: Back-End scan, the back end rotates while the front end contacts the patients' skin without slide. The device designed using dual stepper motors which are under the synchronization control. Experiment results show the effectiveness of the proposed device.
The intersecting cortical model(ICM) is driven from the pulse-coupled neural networks (PCNN), and a lot of works have been done on it. In this paper, we have proposed a method, which is modified from the PCNN, to retr...
详细信息
The intersecting cortical model(ICM) is driven from the pulse-coupled neural networks (PCNN), and a lot of works have been done on it. In this paper, we have proposed a method, which is modified from the PCNN, to retrieval the image. This method uses the iteration times of the ICM as the feature, and we do it repeatedly. So we will get the feature vectors and utilize the features to retrieval the image. And the experimental results have proved the effectiveness of the proposed method. While the proposed method shows some advantages like the feature curves are linear and steady.
In this paper, we make the first research effort to address the RGB-Thermal (RGB-T) crowd counting problem with decision-level late fusion manner. Being different from the existing pixel-level or feature-level fusion ...
详细信息
At present, most high-accuracy single-person pose estimation methods have high computational complexity and insufficient real-time performance due to the complex structure of the network model. However, a single-perso...
详细信息
Takagi-Sugeno-Kang (TSK) fuzzy systems are flexible and interpretable machine learning models;however, they may not be easily applicable to big data problems, especially when the size and the dimensionality of the dat...
详细信息
Emotion recognition is a critical component of affective computing. Training accurate machine learning models for emotion recognition typically requires a large amount of labeled data. Due to the subtleness and comple...
详细信息
We propose BokehMe, a hybrid bokeh rendering framework that marries a neural renderer with a classical physically motivated renderer. Given a single image and a potentially imperfect disparity map, BokehMe generates h...
详细信息
Reversible solid oxide cells (rSOC) can operate in both electrolysis mode and in fuel cell mode with high efficiency and reduced cost using the same device for both functions. When used in dynamic operation with inter...
Reversible solid oxide cells (rSOC) can operate in both electrolysis mode and in fuel cell mode with high efficiency and reduced cost using the same device for both functions. When used in dynamic operation with intermittent electrical power sources, rSOC system switches from the fuel cell (SOFC) to electrolyzer (SOEC) and vice versa depending on load and grid peculiarities. This can lead to temperature profiles within the stack that can potentially lead to the failure of the stack and eventually the system. In the present work, a system-level dynamic model of rSOC is established and validated against experimental data. Subsequently, detailed dynamic thermal behavior of stack during the switching between the two modes is analyzed, and a temperature management controller based on Model Predict control method (MPC) is proposed. Gas flow and temperature at the stack inlet are controlled by air flow and bypass valves, avoiding problems associated with temperature overshoot during transient operation. The simulation results show that the temperature controller has the ability to follow fast thermal changes while maintaining thermal safety, which indicates the competitiveness of the controller.
A distinctive data hiding method based on Jigsaw Sudoku is proposed in this *** from other methods,the proposed method is based on Jigsaw Sudoku which is a kind of irregularly shaped *** to the novelty of Jigsaw Sudok...
详细信息
ISBN:
(纸本)9781510871076
A distinctive data hiding method based on Jigsaw Sudoku is proposed in this *** from other methods,the proposed method is based on Jigsaw Sudoku which is a kind of irregularly shaped *** to the novelty of Jigsaw Sudoku,the proposed method can provide a safer scheme for data hiding than that with pure *** proposed method can hide a certain number of 9-ary numbers in a steganographic image which has a corresponding *** a 256*256 key matrix stretched from a size 9*9 Jigsaw Sudoku,secret message can be hidden in a vector image byte by byte in the form of *** results show that,the proposed method has a better peaksignal-to-noise-ratio(PSNR) compared with some other data hiding methods.
暂无评论