More and more biological evidences have been found that neural networks in the spinal cord, referred to as "central pattern generators" (CPGs), govern locomotion. CPGs are capable of producing rhythmic movements, ...
详细信息
More and more biological evidences have been found that neural networks in the spinal cord, referred to as "central pattern generators" (CPGs), govern locomotion. CPGs are capable of producing rhythmic movements, such as swimming, flying, and walking, even when isolated from the brain and sensory inputs. If we could build up any models that have similar functions as CPGs, it will be much easier to design better locomotion for robots. In this paper, a self-training environment is designed and through genetic algorithm (GA), walking trajectories for every foot of AIBO are generated at first. With this acquired walking pattern, AIBO gets its fastest locomotion speed. Then, this walking pattern is taken as a reference to build CPGs with Hopf oscillators. By changing corresponding parameters, the frequencies and the amplitudes of CPGs' outputs can be adjusted online. The limit cycle behavior of Hopf oscillators ensures the online adjustment and the walking stability against perturbation as well. This property suggests a strong adaptive capacity to real environments for robots. At last, simulations are carried on in Webots and verify the proposed method.
Resting state functional magnetic resonance imaging (rsfMRI) is a relatively new and an powerful method for evaluating regional interactions that occur when a participant is not performing an explicit task. Because of...
详细信息
Traffic forecasting plays a crucial role in intelligent transportation systems and finds application in various domains. Accurate traffic forecasting remains challenging due to the time-varying correlations within the...
This paper proposes a biometric-based user authentication protocol for wireless sensor networks (WSN) when a user wants to access data from sensor nodes, since WSN are often deployed in an unattended environment. Th...
详细信息
This paper proposes a biometric-based user authentication protocol for wireless sensor networks (WSN) when a user wants to access data from sensor nodes, since WSN are often deployed in an unattended environment. The protocol employs biometric keys and resists the threats of stolen verifier, of which many are logged-in users with the same login identity, guessing, replay, and impersonation. The protocol uses only Hash function and saves the computational cost, the communication cost, and the energy cost. In addition, the user's password can be changed freely using the proposed protocol.
In this paper, a large-scale human action recognition system is proposed which is built upon the combination of the rising big data processing technology Spark and the powerful Graphics Processing Unit (GPU) in order ...
详细信息
Obstacle avoiding is one of the most complex tasks for autonomous driving systems, which was also ignored by many cutting-edge end-to-end learning-based methods. The difficulties stem from the integrated process of de...
详细信息
In recent years, the Bag-of-Words (BoW) model has been widely used in most state-of-the-art large-scale image re-trieval systems. However, the standard BoW based systems suffer from low discriminative power of local f...
详细信息
The password pattern has become a widely used mobile authentication method. However, there are still some potential security problems since the passwords are easy to be cracked by some malicious software. An important...
详细信息
This paper proposes a two-dimensional color uncorrelated principal component analysis algorithm(2DCUPCA) for unsupervised subspace learning directly from color face images. The 2DCUPCA can be used to explore uncorrela...
详细信息
Learned image compression approaches have shown great potential with promising results. However, according to the commonly used measurement methods, there still lies a performance gap between learned compression metho...
详细信息
暂无评论