A mobile robot is one of the well-known nonholonomic systems. The genetic fuzzy + PI path track- ing control applied to a mobile robot is presented. The pro- posed controller composes of two fuzzy + PI controllers whi...
详细信息
A mobile robot is one of the well-known nonholonomic systems. The genetic fuzzy + PI path track- ing control applied to a mobile robot is presented. The pro- posed controller composes of two fuzzy + PI controllers which are employed to control the angular velocity to- gether, and one fuzzy + PI controller that is utilized to adjust the speed of mobile robot solely. Moreover, the fuzzy controller is designed to track reference path in ap- proaching phase and PI controller is operated to diminish the tracking error in stable phase. In order to obtain bet- ter tracking performance, Genetic algorithm (GA) is used to optimize controller parameters. Finally, computer sim- ulation results are given to illustrate the effectiveness of the proposed control scheme.
With the rapid development of global information and the increasing dependence on network for people, network security problems are becoming more and more serious. By analyzing the existing security assessment methods...
详细信息
With the rapid development of global information and the increasing dependence on network for people, network security problems are becoming more and more serious. By analyzing the existing security assessment methods, we propose a network security situation evaluation system based on modified D-S evidence theory is proposed. Firstly, we give a modified D-S evidence theory to improve the reliability and rationality of the fusion result and apply the theory to correlation analysis. Secondly, the attack successful support is accurately calculated by matching internal factors with external threats. Multi-module evaluation is established to comprehensively evaluate the situation of network security. Finally we use an example of actual network datasets to validate the network security situation evaluation system. The simulation result shows that the system can not only reduce the rate of false positives and false alarms, but also effectively help analysts comprehensively to understand the situation of network security.
ICMANs (Intermittently Connected Mobile Ad hoc Networks) are wireless networks where most of the time there does not exist a complete path from the source to the destination. In this paper, a novel routing approach, S...
详细信息
ISBN:
(纸本)9781424410095
ICMANs (Intermittently Connected Mobile Ad hoc Networks) are wireless networks where most of the time there does not exist a complete path from the source to the destination. In this paper, a novel routing approach, SPR (Semi-Probabilistic Routing), is proposed to address routing problem in ICMANs. SPR takes into account information about host mobility and connectivity changes to produce estimates enabling more accurate message forwarding. These include maintaining proactive routing zones for stable local topology to minimize blind message forwarding, and identifying potential carriers to maximize message delivery despite network partitions and intermittent connectivity. We compare the performance of our protocol against others, using a mobility model validated with real-world traces.
We propose a novel snowdrift game model with edge weighting mechanism to explore the cooperative behaviors among the players on the square lattice. Based on the assumption of three types of weight distribution includi...
详细信息
We propose a novel snowdrift game model with edge weighting mechanism to explore the cooperative behaviors among the players on the square lattice. Based on the assumption of three types of weight distribution including uniform, exponential and power-law schemes, the cooperation level is largely boosted in contrast with the traditional snowdrift game on the unweighted square lattice. Exten- sive numerical simulations indicate that the fraction of cooperators greatly augments, especially for the intermediate range of cost-to-benefit ratio r. Furthermore, we investigate how the cooperative behaviors are affected by the undulation amplitude of weight distribution and noise strength of strat- egy selection, respectively. The simulation results will be conducive to further understanding and analyzing the emergence of cooperation, which is a ubiquitous phenomenon in social and biological science.
Based on splitting multi-symplectic structures, a new multi-symplectic scheme is proposed and applied to a nonlinear wave equation. The explicit multi-symplectic scheme of the nonlinear wave equation is obtained, and ...
详细信息
Based on splitting multi-symplectic structures, a new multi-symplectic scheme is proposed and applied to a nonlinear wave equation. The explicit multi-symplectic scheme of the nonlinear wave equation is obtained, and the corresponding multi-symplectic conservation property is proved. The backward error analysis shows that the explicit multi-symplectic scheme has good accuracy. The sine-Gordon equation and the Klein-Gordon equation are simulated by an explicit multi-symplectic scheme. The numerical results show that the new explicit multi-symplectic scheme can well simulate the solitary wave behaviors of the nonlinear wave equation and approximately preserve the relative energy error of the equation.
Fiber materials are key materials that have changed human history and promoted the progress of human civilization. In ancient times, humans used feathers and animal skins for clothing, and later they widely employed n...
详细信息
Fiber materials are key materials that have changed human history and promoted the progress of human civilization. In ancient times, humans used feathers and animal skins for clothing, and later they widely employed natural fibers such as cotton, hemp, silk and wool to make fabrics(Fig. 1a). Chinese ancestors had mastered the art of natural fiber weaving as early as the Neolithic *** thousand years ago, people were already familiar with and adept at techniques for spinning natural fibers [1].
It is novel to apply three-dimensional(3D)light field imaging technology to recognize two-dimensional(2D)fake *** this paper,we propose a parallel support vector machine(SVM)method based on 3D light field imaging(ligh...
详细信息
It is novel to apply three-dimensional(3D)light field imaging technology to recognize two-dimensional(2D)fake *** this paper,we propose a parallel support vector machine(SVM)method based on 3D light field imaging(light field camera)and machine learning techniques.A light field(LF)camera with robust sensors,which is able to record rich 3D information,is used as hardware *** of oriented gradient(HOG)feature extraction algorithm and SVM classification method are used to recognize the real and 2D fake pedestrians ***,we carry out an experiment on our improved LF pedestrian *** experimental results of parameter optimization study show that in the case of 400 training samples(200 positive samples and 200 negative samples),120 to 420 testing samples,and an HOG cellsize as 8×8,the best recognition accuracy with polynomial kernel function is improved by more than 2%compared with the previous *** best accuracy is 99.17%.Otherwise,the recognition accuracy of more than 98.00%will be obtained even under other experimental conditions.
A novel method that hybridizes genetic algorithm (GA) and expectation maximization (EM) algorithm for the classification of synthetic aperture radar (SAR) imagery is proposed by the finite Gaussian mixtures model (GMM...
详细信息
A novel method that hybridizes genetic algorithm (GA) and expectation maximization (EM) algorithm for the classification of synthetic aperture radar (SAR) imagery is proposed by the finite Gaussian mixtures model (GMM) and multiscale autoregressive (MAR) model. This algorithm is capable of improving the global optimality and consistency of the classification performance. The experiments on the SAR images show that the proposed algorithm outperforms the standard EM method significantly in classification accuracy.
As a powerful analysis tool of Petri nets, reachability trees are fundamental for systematically investigating many characteristics such as boundedness, liveness and reversibility. This work proposes a method to gener...
详细信息
In unmanned aerial systems, especially in complex environments, accurately detecting tiny objects is crucial. Resizing images is a common strategy to improve detection accuracy, particularly for small objects. However...
详细信息
暂无评论