In this paper, the problem of event-triggered consensus for linear continuous-time multi-agent systems is investigated. A new event-triggered consensus protocol based on a predictor is proposed to achieve consensus wi...
详细信息
Coordinated target tracking for a team of two heterogeneous Unmanned Aerial Vehicles(UAVs) is *** order to study the coordinated relationship by means of distances of UAV-to-target and UAV-to-UAV,a constraint of dista...
详细信息
ISBN:
(纸本)9781509009107
Coordinated target tracking for a team of two heterogeneous Unmanned Aerial Vehicles(UAVs) is *** order to study the coordinated relationship by means of distances of UAV-to-target and UAV-to-UAV,a constraint of distances coordination is *** from the traditional studies that focus on angular separation or communication connectivity for UAVs,this constraint takes the effect of geometric configuration for two UAVs coordination into ***,the constraint only applies to follower UAV,aiming to obtain its optimal coordinated distance to *** this way,accuracy of target state estimation and optimal geometric configuration of target tracking for UAVs are *** Information filter is used to estimate the target location on a 2-D plane,and a receding horizon approach is applied to generate the optimal control policy for two UAVs' *** results illustrated the effectiveness.
This paper we investigates the problem of stability and bifurcation of fractional-order financial system time-delay via the Lyapunov stability judgment method and application of impulse control method. Finally, a nume...
详细信息
This paper we investigates the problem of stability and bifurcation of fractional-order financial system time-delay via the Lyapunov stability judgment method and application of impulse control method. Finally, a numerical simulation example is provided to verify the effectiveness and the benefit of the proposed stability and bifurcation criterion.
The single-phase-to-ground fault current of distribution network is small, which brings difficulties to fault diagnosis. A single-phase-to-ground fault diagnosis method based on synchronous waveform feature extraction...
详细信息
ISBN:
(数字)9781839531248
ISBN:
(纸本)9781839531255
The single-phase-to-ground fault current of distribution network is small, which brings difficulties to fault diagnosis. A single-phase-to-ground fault diagnosis method based on synchronous waveform feature extraction and association rule mining is proposed. Firstly, features are extracted from waveform of fault recorders to describe the fault scene. Then, FP-Growth algorithm is used to mine the association rules in the fault transaction database. The effectiveness of proposed method is verified by IEEE 34-bus system. Algorithm in this paper provides a useful reference for fault diagnosis technology based on fault waveform features.
Data-driven artificial intelligence technologies have made much progress in medical image analysis in the last decades. However, it still remains challenging due to its distinctive complexity of acquiring and annotati...
详细信息
Surveillance is very essential for the safety of power substation. The detection of whether wearing safety helmets or not for perambulatory workers is the key component of overall intelligent surveillance system in po...
详细信息
ISBN:
(纸本)9781538604915
Surveillance is very essential for the safety of power substation. The detection of whether wearing safety helmets or not for perambulatory workers is the key component of overall intelligent surveillance system in power substation. In this paper, a novel and practical safety helmet detection framework based on computer vision, machine learning and image processing is proposed. In order to ascertain motion objects in power substation, the ViBe background modelling algorithm is employed. Moreover, based on the result of motion objects segmentation, real-time human classification framework C4 is applied to locate pedestrian in power substation accurately and quickly. Finally, according to the result of pedestrian detection, the safety helmet wearing detection is implemented using the head location, the color space transformation and the color feature discrimination. Extensive compelling experimental results in power substation illustrate the efficiency and effectiveness of the proposed framework.
The micro-texture on the tool surface is an effective way to improve the quality of the drilling. While high-performance micro-texture plays an important role in improving the quality of working surface and prolonging...
The micro-texture on the tool surface is an effective way to improve the quality of the drilling. While high-performance micro-texture plays an important role in improving the quality of working surface and prolonging the life of tool. In this study, a three-dimensional finite element model was established to study the relationship between drilling thrust, torque and microstructure parameters (micro-pit depth, micro-pit diameter and micro-pit spacing) during drilling of cortical bone. The model was validated by cortical bone drilling using a micro-structured tool. On basis of this, the thrust and torque prediction models of the micro-texture parameters were obtained. The results indicate that the thrust and torque increased with the increase of micro-pit diameter; while the increase of the micro-pit spacing caused the thrust and torque to decrease. When the depth of the micro-pit increased, the thrust and torque decreased first and then increased, and we found that the effect of micro-pit spacing and micro-pit depth on force and torque is insignificant.
I've been increasingly intrigued by electronic music, sparked in large part by covering an exhibition of designer theremins for IEEE Spectrum in 2013, followed by watching documentaries such as 2014's I Dream ...
详细信息
I've been increasingly intrigued by electronic music, sparked in large part by covering an exhibition of designer theremins for IEEE Spectrum in 2013, followed by watching documentaries such as 2014's I Dream of Wires, which traces the history of the modular synthesizer. One notable cohort in the modern electronic music scene are the circuit benders. These folks modify all sorts of audio-enabled equipment, including children's toys and digital keyboards, to produce sounds definitely not intended by the designers. So when I came across the Casio SK-5 keyboard I'd received for my 14th Christmas lurking in my parents' attic, I pounced. Released in 1987, and aimed at younger players, the Casio SK-5 was never intended to be used by serious musicians. The keyboard had only 32 "minikeys" sized for smaller fingers, and it could play just four notes simultaneously. The SK-5 could mimic a number of instruments, but its killer feature was that you could create your own instrument sounds through sampling audio (at a whopping 8-bit resolution).
This passage puts forward a Gaussian scale patch group sparse representation method, to solve the shortage problem of traditional image super-resolution restoration schemes. Our image reconstruction method is focused ...
详细信息
The rapid development of the Cloud Computing Technologies (CCTs) has amended the conventional design of resource-constrained Network controlsystem (NCS) to the powerful and flexible design of Cloud-Based Networked Co...
详细信息
The rapid development of the Cloud Computing Technologies (CCTs) has amended the conventional design of resource-constrained Network controlsystem (NCS) to the powerful and flexible design of Cloud-Based Networked controlsystem (CB-NCS) by relocating the processing part to the cloud server. This arrangement has produced many internets based exquisite applications. However, this new arrangement has also raised many network security challenges for the cloud-based controlsystem related to cyber-physical part of the system. In the absence of robust verification methodology, an attacker can launch the modification attack in order to destabilize or take control of NCS. It is desirable that there shall be a solution authentication methodology used to verify whether the incoming solutions are coming from the cloud or not. This paper proposes a methodology used for the verification of the receiving solution to the local controlsystem from the cloud using Karush-Kuhn-Tucker (KKT) conditions, which is then applied to actuator after verification and thus ensure the stability in case of modification attack.
暂无评论