Presently pneumatic muscles (PMs) are used in various applications due to their simple construction, lightweight and high force to weight ratio. However, pneumatic muscles are facing various problems due to their nonl...
详细信息
This study proposes a motion cue based pedestrian detection method with two-trame-filtering (Tff) for video surveillance. The novel motion cue is exploited by the gray value variation between two frames. Then Tff pr...
详细信息
This study proposes a motion cue based pedestrian detection method with two-trame-filtering (Tff) for video surveillance. The novel motion cue is exploited by the gray value variation between two frames. Then Tff processing filters the gradient magnitude image by the variation map. Summa- tions of the Tff gradient magnitudes in cells are applied to train a pre-deteetor to exclude most of the background regions. Histogram of Tff oriented gradient (HTffOG) feature is proposed for pedestrian detection. Experimental results show that this method is effective and suitable for real-time surveil- lance applications.
Secure control against cyber attacks becomes increasingly significant in cyber-physical systems(CPSs).False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false d...
详细信息
Secure control against cyber attacks becomes increasingly significant in cyber-physical systems(CPSs).False data injection attacks are a class of cyber attacks that aim to compromise CPS functions by injecting false data such as sensor measurements and control *** quantified false data injection attacks,this paper establishes an effective defense framework from the energy conversion ***,we design an energy controller to dynamically adjust the system energy changes caused by unknown *** designed energy controller stabilizes the attacked CPSs and ensures the dynamic performance of the system by adjusting the amount of damping ***,with the disturbance attenuation technique,the burden of control system design is simplified because there is no need to design an attack *** addition,this secure control method is simple to implement because it avoids complicated mathematical *** effectiveness of our control method is demonstrated through an industrial CPS that controls a permanent magnet synchronous motor.
The multi-compartment electric vehicle routing problem(EVRP)with soft time window and multiple charging types(MCEVRP-STW&MCT)is studied,in which electric multi-compartment vehicles that are environmentally friendl...
详细信息
The multi-compartment electric vehicle routing problem(EVRP)with soft time window and multiple charging types(MCEVRP-STW&MCT)is studied,in which electric multi-compartment vehicles that are environmentally friendly but need to be recharged in course of transport process,are employed.A mathematical model for this optimization problem is established with the objective of minimizing the function composed of vehicle cost,distribution cost,time window penalty cost and charging service *** solve the problem,an estimation of the distribution algorithm based on Lévy flight(EDA-LF)is proposed to perform a local search at each iteration to prevent the algorithm from falling into local *** results demonstrate that the EDA-LF algorithm can find better solutions and has stronger robustness than the basic EDA *** addition,when comparing with existing algorithms,the result shows that the EDA-LF can often get better solutions in a relatively short time when solving medium and large-scale *** experiments show that using electric multi-compartment vehicles to deliver incompatible products can produce better results than using traditional fuel vehicles.
Aiming at the problem of low illumination image color estimation, a method based on white-grey-black block supervision is proposed. The standard swatch is placed in a low illuminance scene to obtain an image, and the ...
详细信息
In this paper, an optimal guidance algorithm is proposed for atmospheric ascent. The optimal guidance algorithm updates the reference trajectory to deal with the impact of disturbance by solving an optimal control pro...
详细信息
Transfer learning(TL)utilizes data or knowledge from one or more source domains to facilitate learning in a target *** is particularly useful when the target domain has very few or no labeled data,due to annotation ex...
详细信息
Transfer learning(TL)utilizes data or knowledge from one or more source domains to facilitate learning in a target *** is particularly useful when the target domain has very few or no labeled data,due to annotation expense,privacy concerns,***,the effectiveness of TL is not always *** transfer(NT),i.e.,leveraging source domain data/knowledge undesirably reduces learning performance in the target domain,and has been a long-standing and challenging problem in *** approaches have been proposed in the literature to address this ***,there does not exist a systematic *** paper fills this gap,by first introducing the definition of NT and its causes,and reviewing over fifty representative approaches for overcoming NT,which fall into three categories:domain similarity estimation,safe transfer,and NT *** areas,including computer vision,bioinformatics,natural language processing,recommender systems,and robotics,that use NT mitigation strategies to facilitate positive transfers,are also ***,we give guidelines on NT task construction and baseline algorithms,benchmark existing TL and NT mitigation approaches on three NT-specific datasets,and point out challenges and future research *** ensure reproducibility,our code is publicized at https://***/chamwen/NT-Benchmark.
This paper proposes a new second-order continuous-time multi-agent model and analyzes the controllability of second-order multi-agent system with multiple leaders based on the asymmetric *** paper considers the more g...
详细信息
This paper proposes a new second-order continuous-time multi-agent model and analyzes the controllability of second-order multi-agent system with multiple leaders based on the asymmetric *** paper considers the more general case:velocity coupling topology is different from location coupling *** sufficient and necessary conditions are presented for the controllability of the system with multiple *** addition,the paper studies the controllability of the system with velocity damping *** results are given to illustrate the correctness of theoretical results.
This article studies the consensus problem for multiagent systems with transmission constraints. A novel model of multiagent systems is proposed where the information transmissions between agents are disturbed by irre...
详细信息
Masked image modeling (MIM), a common selfsupervised learning (SSL) technique, has been extensively studied for remote sensing imageprocessing. Nevertheless, its effectiveness for hyperspectral imagery (HSI) remains ...
详细信息
暂无评论