This study proposes a motion cue based pedestrian detection method with two-trame-filtering (Tff) for video surveillance. The novel motion cue is exploited by the gray value variation between two frames. Then Tff pr...
详细信息
This study proposes a motion cue based pedestrian detection method with two-trame-filtering (Tff) for video surveillance. The novel motion cue is exploited by the gray value variation between two frames. Then Tff processing filters the gradient magnitude image by the variation map. Summa- tions of the Tff gradient magnitudes in cells are applied to train a pre-deteetor to exclude most of the background regions. Histogram of Tff oriented gradient (HTffOG) feature is proposed for pedestrian detection. Experimental results show that this method is effective and suitable for real-time surveil- lance applications.
Coordinated control of multi-agent systems has widespread application in engineering such as unmanned aerial vehicles and unmanned ground vehicles. Due to the fact that input saturation can lead a control system to de...
详细信息
Coordinated control of multi-agent systems has widespread application in engineering such as unmanned aerial vehicles and unmanned ground vehicles. Due to the fact that input saturation can lead a control system to deterioration and instability, a lot of efforts have been devoted to investigating this subject of great importance. The present article offers a survey of recent developments on coordinated control of multi-agents systems subject to input saturation. Some preliminaries about graph theory, stability theory and input saturation are first provided, followed by some important results in the area, which are categorized into semi-global and global coordinated controls. Future research topics are finally discussed.
Based on the idea of 'q—count' of certain subwords of a word and generalizing the notion of Parikh matrix of a word, the notion of Parikh q—matrix of a word over an ordered alphabet was introduced. On the ot...
Based on the idea of 'q—count' of certain subwords of a word and generalizing the notion of Parikh matrix of a word, the notion of Parikh q—matrix of a word over an ordered alphabet was introduced. On the other hand, with a two-dimensional picture array of symbols arranged in rows and columns, two kinds of upper triangular matrices, known as row and column Parikh matrices have also been introduced and investigated. Here combining these two kinds of matrices of a picture array, we introduce row/column Parikh q—matrix of an array, leading to the concept of q—ambiguity of a picture array. Results relating to q—ambiguity of picture arrays are derived in the context of these Parikh q—matrices of arrays.
In this paper,nonnegative edge consensus of systems steered by general linear dynamics on directed network is *** the new approach,one first endows dynamics to each directed edge and then designs a distributed edge co...
详细信息
ISBN:
(纸本)9781509009107
In this paper,nonnegative edge consensus of systems steered by general linear dynamics on directed network is *** the new approach,one first endows dynamics to each directed edge and then designs a distributed edge consensus protocol guiding all edges to reach a common *** the help of line graph theory,it is proved that strongly connected network can ensure reaching nonnegative edge consensus,if the initial conditions of all edges are *** simulations are provided to verify the theoretical results.
Non-small cell lung cancer (NSCLC) is a malignant tumor, and contains three major subtypes which are difficult to be distinguished at early stages of NSCLC. Many pathways work together to perform certain functions in ...
详细信息
ISBN:
(纸本)9781509016129
Non-small cell lung cancer (NSCLC) is a malignant tumor, and contains three major subtypes which are difficult to be distinguished at early stages of NSCLC. Many pathways work together to perform certain functions in cells. One might expect the high level of co-appearance or repression of pathways to distinguish different subtypes of NSCLC. However, it is difficult to detect coordinated regulations of pathways by existing methods. In our work, the coordinated regulations of pathways are detected using modified higher logic analysis of gene expression data. Specifically, we identify the genes whose regulation obeys a logic function by the modified higher logic analysis, which focuses on the relationships among the gene triplets that are not evident when genes are examined in a pairwise fashion. Then, the relationships among genes are mapped to pathways to predict the coordinated regulated relationships among pathways. By comparing coordinated regulations of pathways, we find that the regulation patterns of pathways which are associated with cell death are different in three subtypes of NSCLC. This method allows us to uncover co-appearance or repression of pathways in high level, and it has a potential to distinguish the subtypes for complex diseases.
Cyber-physical systems(CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networke...
详细信息
Cyber-physical systems(CPSs) are integrations of networks, computation and physical processes, where embedded computing devices continually sense, monitor, and control the physical processes through networks. Networked industrial processes combining internet, real-time computer control systems and industrial processes together are typical CPSs. With the increasingly frequent cyber-attack, security issues have gradually become key problems for CPSs. In this paper, a cyber-physical system security protection approach for networked industrial processes, i.e., industrial CPSs, is proposed. In this approach, attacks are handled layer by layer from general information technology(IT) security protection, to active protection, then to intrusion tolerance and physical security protection. The intrusion tolerance implemented in real-time control systems is the most critical layer because the real time control system directly affects the physical layer. This novel intrusion tolerance scheme with a closed loop defense framework takes into account the special requirements of industrial CPSs. To illustrate the effectiveness of the CPS security protection approach, a networked water level control system is described as a case study in the architecture analysis and design language(AADL) environment. Simulation results show that 3 types of injected attacks can be quickly defended by using the proposed protection approach.
In this paper,we discuss consensus problems for antagonistic networks with double integrator *** cases are analyzed:(1) undirected graphs with fixed topology on antagonistic networks;(2) undirected graphs with fixed t...
详细信息
ISBN:
(纸本)9781509009107
In this paper,we discuss consensus problems for antagonistic networks with double integrator *** cases are analyzed:(1) undirected graphs with fixed topology on antagonistic networks;(2) undirected graphs with fixed topology and time-delay on antagonistic *** both cases,distributed consensus protocols are proposed,with sufficient and necessary conditions *** is proved that the largest tolerable time-delay is only related to the largest eigenvalue of the graph ***,simulations are provided to demonstrate the obtained theoretical results.
Bus driver rostering is a world-wide problem, which is NP-hard. Two objectives exist in the problem: (1) minimizing the number of drivers;(2) minimizing excess workload of each driver and balancing excess workload amo...
详细信息
This technical note deals with a modified algebraic Riccati equation (MARE) and its corresponding inequality and difference equation, which arise in modified optimal control and filtering problems and are introduced i...
详细信息
This paper presents an adaptive differential evolution approach (DEMS for short) for the maximal synchronization between two most popular transit modes (i.e., bus and metro). Given a metro station, suppose the timetab...
详细信息
暂无评论