Unmanned aerial vehicle (UAV) builds cognitive map for the enemy important targets and anti-aircraft fire threats in the unknown environment. Then UAV tries to avoid the threats and head to important targets where the...
详细信息
ISBN:
(纸本)9781629932170
Unmanned aerial vehicle (UAV) builds cognitive map for the enemy important targets and anti-aircraft fire threats in the unknown environment. Then UAV tries to avoid the threats and head to important targets where the enemy locate. This paper studies how the unmanned aerial vehicle (UAV) in complex dynamic field environment make path planning to search the enemy's important targets. The standard for choosing the most appropriate path from alternative paths is based on cost equation. It is the smallest cost that the UAV can get. The study of self organization path planning is to analyze the four kinds of short-term costs and a long-term cost. Through adjusting the weight coefficient, all kinds of UAV path plannings in different battlefield environment can be achieved.
Unmanned aerial vehicle (UAV) needs unmanned ground vehicle (UGV) searching the areas, such as tunnel inside the mountain. The technology of UGV extraction image features of mountain tunnel portal is very important. T...
详细信息
ISBN:
(纸本)9781629932170
Unmanned aerial vehicle (UAV) needs unmanned ground vehicle (UGV) searching the areas, such as tunnel inside the mountain. The technology of UGV extraction image features of mountain tunnel portal is very important. This paper implies embedded hardware platform to realize the UGV scanning environment image contour feature extraction. A new digital image processing algorithm with MATLAB is expressed for miniaturization real-time image contour feature extraction procedure. The processing speed is fast enough for real-time search task. Otsu method is implied to determine the threshold value, combining with Sobel operator, Prewitt operator and Canny operator to verify that Canny operator has the best effect in images contour extraction. The contour is precision with small amount of calculation.
The clustering method based on one-class support vector machine has been presented recently. Although this approach can improve the clustering accuracies, it often gains the unstable clustering results because some ra...
详细信息
A semi-supervised subtractive clustering has been proposed recently. However, it performance depends greatly on the choice of the parameters of the mountain function and only proper parameters enable the clustering me...
详细信息
This paper proposes a two-dimensional color uncorrelated principal component analysis algorithm(2DCUPCA) for unsupervised subspace learning directly from color face images. The 2DCUPCA can be used to explore uncorrela...
详细信息
In current IaaS datacenters, tenants are suffering unfairness since the network bandwidth is shared in a best-effort manner. To achieve predictable network performance for rented virtual machines (VMs), cloud provider...
详细信息
ISBN:
(纸本)9781467359443
In current IaaS datacenters, tenants are suffering unfairness since the network bandwidth is shared in a best-effort manner. To achieve predictable network performance for rented virtual machines (VMs), cloud providers should guarantee minimum bandwidth for VMs or allocate the network bandwidth in a fairness fashion at VM-level. At the same time, the network should be efficiently utilized in order to maximize cloud providers' revenue. In this paper, we model the bandwidth sharing problem as a Nash bargaining game, and propose the allocation principles by defining a tunable base bandwidth for each VM. Specifically, we guarantee bandwidth for those VMs with lower network rates than their base bandwidth, while maintaining fairness among other VMs with higher network rates than their base bandwidth. Based on rigorous cooperative game-theoretic approaches, we design a distributed algorithm to achieve efficient and fair bandwidth allocation corresponding to the Nash bargaining solution (NBS). With simulations under typical scenarios, we show that our strategy can meet the two desirable requirements towards predictable performance for tenants as well as high utilization for providers. And by tuning the base bandwidth, our solution can enable cloud providers to flexibly balance the tradeoff between minimum guarantees and fair sharing of datacenter networks.
The world faces an energy problem. Oil supply is gradually running out. Its use is polluting the planet with greenhouse gas. Most alternative energy sources also pose some environmental problems. Hence the efficient u...
详细信息
This paper proposes a novel unconstrained criterion of blind equalization, which is based on minimizing the difference between two norms of the joint channel-equalizer impulse response. There is no need to impose any ...
详细信息
A novel alive entropy-based detection approach was proposed, which detects the abnormal network traffic based on the values of alive entropies. The alive entropies calculated based on the NetFlow data coming from the ...
详细信息
A novel alive entropy-based detection approach was proposed, which detects the abnormal network traffic based on the values of alive entropies. The alive entropies calculated based on the NetFlow data coming from the network traffic of input and output of a whole system, which is essentially a monitored network. In order to decrease false positive rate of abnormal network traffic, different scales are selected to compute the values of alive entropies in different sizes of network traffic. With the low false positive rate of abnormal network traffic, the abnormal network traffic can be effectively detected. Experiments carried out on a real campus network were used to evaluate the effectiveness of the proposed approach. A comparative study illustrates that the proposed approach may easily detect the abnormal network traffic with random characteristics in comparison with some "conventional" approaches reported in the literatures.
In this paper, we propose a deep packet inspection system based on the MapReduce. The MapReduce which is a parallel distributed programming model developed by Google applies the technology of deep packet inspection. N...
详细信息
暂无评论