The exponential growth of scientific literature poses a significant challenge to researchers, resulting in redundancy in R&D due to inefficient review mechanisms. Manual literature reviews are time-consuming and r...
详细信息
In the field of remote sensing, the demand for improved spatial resolution has persisted across multiple domains despite the exponential rise in satellite images. Single Image Super-Resolution (SISR) aims to bridge th...
详细信息
In multi-receiver passive radar systems, coherent detection assumes accurate synchronisation between receivers. However, achieving this in practice is challenging. By creating a virtual radar environment we can invest...
详细信息
We consider word-of-mouth social learning involving m Kalman filter agents that operate sequentially. The first Kalman filter receives the raw observations, while each subsequent Kalman filter receives a noisy measure...
详细信息
Noncooperative differential games provide a basis for the study of coordination, conflict, and control for a single dynamical system with multiple players. Within the linear-quadratic differential games (LQDGs), the o...
详细信息
The distributed optimal output synchronization problem for the leaderless heterogeneous multi-agent system with a general global cost function is investigated for the first time by linear quadratic(LQ) optimal control...
详细信息
The distributed optimal output synchronization problem for the leaderless heterogeneous multi-agent system with a general global cost function is investigated for the first time by linear quadratic(LQ) optimal control theory. Conventional algorithms for heterogeneous systems are quite complex, requiring the design of a virtual reference generator and the solving of regulation *** paper presents a novel distributed asymptotically optimal controller by incorporating the design of distributed observer and feedforward controller. A general form of the distributed controller is obtained by solving an augmented algebraic Riccati equation, which is parallel to classical optimal control theory. The optimal topology is an arbitrary directed graph containing only a spanning tree. It is shown that the proposed algorithms outperform the traditional consensus methods in the convergence speed by selecting proper observer gain matrices, and eliminate the reliance on the nonzero eigenvalues of Laplacian matrix. Simulation example further demonstrates the effectiveness of the proposed scheme and a faster superlinear convergence speed than the existing algorithm.
Position and velocity estimation are the key technologies to improve the motion control ability of humanoid *** at solving the positioning problem of humanoid robots,we have designed a legged odometry algorithm based ...
详细信息
Position and velocity estimation are the key technologies to improve the motion control ability of humanoid *** at solving the positioning problem of humanoid robots,we have designed a legged odometry algorithm based on forward kinematics and the feed back of *** modeled the forward kinematics of the leg of the humanoid robot and used Kalman filter to fuse the kinematics information with IMU data,resulting in an accurate estimate of the humanoid robot’s position and *** odometry method can be applied to different humanoid robots,requiring only that the robot is equipped with joint encoders and an *** can also be extended to other legged *** effectiveness of the legged odometry scheme was demonstrated through simulations and physical tests conducted with the Walker2 humanoid robot.
The permanent magnet (PM) Vernier machines enhance torque density and decrease cogging torque compared to conventional permanent magnet synchronous motor. This paper presents a novel fractional-slot H-shaped PM Vernie...
详细信息
The degradation of optical remote sensing images due to atmospheric haze poses a significant obstacle,profoundly impeding their effective utilization across various *** methodologies have emerged as pivotal components...
详细信息
The degradation of optical remote sensing images due to atmospheric haze poses a significant obstacle,profoundly impeding their effective utilization across various *** methodologies have emerged as pivotal components of image preprocessing,fostering an improvement in the quality of remote sensing *** enhancement renders remote sensing data more indispensable,thereby enhancing the accuracy of target *** defogging techniques based on simplistic atmospheric degradation models have proven inadequate for mitigating non-uniform haze within remotely sensed *** response to this challenge,a novel UNet Residual Attention Network(URA-Net)is *** paradigmatic approach materializes as an end-to-end convolutional neural network distinguished by its utilization of multi-scale dense feature fusion clusters and gated jump *** essence of our methodology lies in local feature fusion within dense residual clusters,enabling the extraction of pertinent features from both preceding and current local data,depending on contextual *** intelligently orchestrated gated structures facilitate the propagation of these features to the decoder,resulting in superior outcomes in haze *** validation through a plethora of experiments substantiates the efficacy of URA-Net,demonstrating its superior performance compared to existing methods when applied to established datasets for remote sensing image *** the RICE-1 dataset,URA-Net achieves a Peak Signal-to-Noise Ratio(PSNR)of 29.07 dB,surpassing the Dark Channel Prior(DCP)by 11.17 dB,the All-in-One Network for Dehazing(AOD)by 7.82 dB,the Optimal Transmission Map and Adaptive Atmospheric Light For Dehazing(OTM-AAL)by 5.37 dB,the Unsupervised Single Image Dehazing(USID)by 8.0 dB,and the Superpixel-based Remote Sensing Image Dehazing(SRD)by 8.5 *** noteworthy,on the SateHaze1k dataset,URA-Net attains preeminence in overall performance,yieldi
Small-state stream ciphers (SSCs) idea is based on using key bits not only in the initialization but also continuously in the keystream generation phase. A time-memory-data tradeoff (TMDTO) distinguishing attack was s...
详细信息
Small-state stream ciphers (SSCs) idea is based on using key bits not only in the initialization but also continuously in the keystream generation phase. A time-memory-data tradeoff (TMDTO) distinguishing attack was successfully applied against all SSCs in 2017 by Hamann et al. They suggested using not only key bits but also initial value (IV) bits continuously in the keystream generation phase to strengthen SSCs against TMDTO attacks. Then, Hamann and Krause proposed a construction based on using only IV bits continuously in the packet mode. They suggested an instantiation of an SSC and claimed that it is resistant to TMDTO attacks. We point out that accessing IV bits imposes an overhead on cryptosystems that might be unacceptable in some applications. More importantly, we show that the proposed SSC remains vulnerable to TMDTO attacks 1. To resolve this security threat, the current paper proposes constructions based on storing key or IV bits that are the first to provide full security against TMDTO attacks. Five constructions are proposed for different applications by considering efficiency. Designers can obtain each construction’s minimum volatile state length according to the desirable keystream, key and IV lengths.
暂无评论