Home automation systems based on wireless sensor/actuator networks are characterized by diversity of node power sources, limited computational power, and mobility. We propose a routing protocol that fully uses the loc...
详细信息
ISBN:
(纸本)9781617825583
Home automation systems based on wireless sensor/actuator networks are characterized by diversity of node power sources, limited computational power, and mobility. We propose a routing protocol that fully uses the location of static nodes to limit the search for a route to a small zone based on the analysis of characteristics and requirements. The calculation of two different kinds of zone and the route discovery procedure are described in this paper. According to the environment of home automation, we compared the performance of our routing protocols with the ad-hoc on-demand distance-vector protocol using simulation and gave suggestions for zone selection. Simulation results showed that our routing protocol dramatically reduced the routing overhead and increased the reliability.
Image multi-scale edge detection based on antisymmetrical biorthogonal wavelet is given detailedly in theory, Especially an algorithm of wavelet decomposition in which multi-scale edge can be detected is put forward. ...
详细信息
Image multi-scale edge detection based on antisymmetrical biorthogonal wavelet is given detailedly in theory, Especially an algorithm of wavelet decomposition in which multi-scale edge can be detected is put forward. Based on above using different kinds of wavelet decomposition data such as approximate coefficients and multi-scale edge image, a moving object detection approach in active video surveillance system is proposed. Firstly Block Matching is used to calculate motion vector in low frequency image of wavelet decomposition. Then Motion Compensation and Frame Difference between two adjacent frames applied to extract moving object information. And using multi-scale edge image of wavelet Region Growth is combined with Hough Transformation to define region of potential object. Finally object is farther segmented in object potential region. Experimental results indicate that the method presented in the paper is effective.
In most batch processes, quality control measurements cannot be completed before the next batch operation. Thus, the corrective step is often delayed by one batch or more. The uncertain duration of delay with stochast...
详细信息
ISBN:
(纸本)9781424454402
In most batch processes, quality control measurements cannot be completed before the next batch operation. Thus, the corrective step is often delayed by one batch or more. The uncertain duration of delay with stochastic characteristics can be treated as a random variable of unknown distribution. Coupled with inaccurate process models, the delay may lead to significant process output variations even with EWMA controllers. This paper proposes a new method of handling the uncertain metrology delay and its ensuing complications. The run-to-run controller is designed based on minimization of error entropy, and the probability density function of the tracking error can be estimated by the historical operation data. The simulation example demonstrates the effectiveness of the proposed method.
To solve the weapon network system optimization problem against small raid objects with low attitude,the concept of direction probability and a new evaluation index system are *** calculating the whole damaging probab...
详细信息
To solve the weapon network system optimization problem against small raid objects with low attitude,the concept of direction probability and a new evaluation index system are *** calculating the whole damaging probability that changes with the defending angle,the efficiency of the whole weapon network system can be subtly *** such method,we can avoid the inconformity of the description obtained from the traditional index *** new indexes are also proposed,*** index,overlap index and cover index,which help manage the relationship among several *** normalizing the computation results with the Sigmoid function,the matching problem between the optimization algorithm and indexes is well ***,the algorithm of improved marriage in honey bees optimization that proposed in our previous work is applied to optimize the embattlement *** is carried out to show the efficiency of the proposed indexes and the optimization algorithm.
Color image retrieval and classification are very important in the field of image *** this paper, we propose a method which is in token of color characteristic of one image using hue and thereby is used to calculate s...
详细信息
Color image retrieval and classification are very important in the field of image *** this paper, we propose a method which is in token of color characteristic of one image using hue and thereby is used to calculate similarity between two *** also take *** to find the best threshold so that we can realize fuzzy partition, and finally fuzzy c-means algorithm is used to do image classification and the calculation of subjection degree of one picture in the corresponding *** corresponding mathematical model is ***, we construct a frame in which image comparability is obtained through fuzzy similarity measure based on hue feature vector of image, thus image retrieval is finished, and image classification is realized by fuzzy *** comparison of image retrieval result between RGB feature vector and only-hue feature vector in token of image characteristic is *** experiment shows that the idea which takes this fuzzy similarity measure and fuzzy clustering method as the scheme of image retrieval and classification is reasonable and effective.
Constant rate transmission and transport (CRTT) is an effective bandwidth smoothing scheme resulting in one fixed rate during the whole duration of variable bit-rate video, which, however, needs a large client buffer ...
详细信息
Constant rate transmission and transport (CRTT) is an effective bandwidth smoothing scheme resulting in one fixed rate during the whole duration of variable bit-rate video, which, however, needs a large client buffer size. The minimum buffer requirement (MBR) of CRTT, besides benefiting the design of some piecewise transmission scheme, can examine whether we can transmit the requested video with a constant rate for a given buffer size. In this paper, we formulate off-line bandwidth smoothing into a binary classification problem of the underflow and overflow points. Then we propose a novel algorithm based on support vector machine because of its equal margin, which,we have proven, is able to minimize the required buffer size of CRTT. Our algorithm, therefore, can exactly calculate MBR together with the CRTT transmission rate without exhaustively searching buffer sizes and startup delay. The simulation results using some real MPEG4 and H.264 video show the philosophy and effectiveness of our algorithm.
The Substation Automation system (SAS) is a crucial element of power systemcontrol. The devices of SAS with remote-control functions are one of the main target of cyber attack. The vulnerability assessment for commun...
详细信息
The Substation Automation system (SAS) is a crucial element of power systemcontrol. The devices of SAS with remote-control functions are one of the main target of cyber attack. The vulnerability assessment for communication network of SASs that supporting the analysis of controlprocess, is an unsolved problem. Combined with the characteristics of SAS and the vulnerability assessment of the distributed systems, a vulnerability assessment method for communication nework of SASs to cyber attack is proposed. The substation communication system has been classified into six basic models used to construct vulnerability state graph (VSG). The vulnerability of single action is defined based on exponential distribution function including parameters called vulnerability factor and equivalent attacking cost, and then the vulnerability value of target systems are calculated by four connection types of VSG. Furthermore, a vulnerability factor quantity method based on AHP-TOPSIS is designed. An evaluation instance is constructed from IEC 61850 standard, the proposed method is applicable to evaluate the vulnerability of communication network of SASs.
Home automation systems based on wireless sensor/actuator networks are characterized by diversity of node power sources, limited computational power, and mobility. We propose a routing protocol that fully uses the loc...
详细信息
Home automation systems based on wireless sensor/actuator networks are characterized by diversity of node power sources, limited computational power, and mobility. We propose a routing protocol that fully uses the location of static nodes to limit the search for a route to a small zone based on the analysis of characteristics and requirements. The calculation of two different kinds of zone and the route discovery procedure are described in this paper. According to the environment of home automation, we compared the performance of our routing protocols with the ad-hoc on-demand distance-vector protocol using simulation and gave suggestions for zone selection. Simulation results showed that our routing protocol dramatically reduced the routing overhead and increased the reliability.
Considering the characteristics of the servo system, such as disturbance, nonlinearity and high inertia, variable structure controller (VSC) based on extended state observers (ESO) are designed for the aim of quick, s...
详细信息
Considering the characteristics of the servo system, such as disturbance, nonlinearity and high inertia, variable structure controller (VSC) based on extended state observers (ESO) are designed for the aim of quick, stable and high-accuracy controlling processes. The disturbances and high-order factors are estimated and compensated using ESO. Dynamic compensation reduces the motion system to approximately a triple integrator which can be easily controlled using VSC. Because ESO provides a high-frequency path for the dynamic state not modelled, the chatter of VSC is reduced. Through tests in the gun turret system, it was shown that this controller is superior to the engineering PID and general VSC.
Most blind source separation algorithms are only applicable to real signals,while in communication reconnaissance processed signals are *** solve this problem,a blind source separation algorithm for communication comp...
详细信息
Most blind source separation algorithms are only applicable to real signals,while in communication reconnaissance processed signals are *** solve this problem,a blind source separation algorithm for communication complex signals is deduced,which is obtained by adopting the Kullback-Leibler divergence to measure the signals’*** the other hand,the performance of natural gradient is better than that of stochastic gradient,thus the natural gradient of the cost function is used to optimize the *** to the conclusion that the signal’s mixing matrix after whitening is orthogonal,we deduce the iterative algorithm by constraining the separating matrix to an orthogonal *** results show that this algorithm can efficiently separate the source signals even in noise circumstances.
暂无评论