control barrier functions (CBFs) are widely used in safety-critical controllers. However, constructing a valid CBF is challenging, especially under nonlinear or non-convex constraints and for high relative degree syst...
详细信息
The autonomous underwater vehicles (AUVs) have been developed over the last three decades for potential uses in scientific, commercial, environmental, and military purposes. The improvement of the computer technology ...
详细信息
The autonomous underwater vehicles (AUVs) have been developed over the last three decades for potential uses in scientific, commercial, environmental, and military purposes. The improvement of the computer technology has allowed the expansion of control algorithms into untethered AUVs motions. The paper applies the continuous time model predictive control algorithm designed using Laguerre functions to the dynamic motions of the vehicle. The nonlinear model of the AUVs is established in six degree of freedom and converts into a state space model. The continuous time model predictive control (MPC) algorithm, using Laguerre orthogonal functions, is extended to include intermittent features for manipulation of rudder and stern angle signals. The proposed approach allows the continuous time MPC to tolerate slower computational time and longer sampling interval
In this paper, a state-feedback strategies based on time-scale separation technique for a class of strict-feedback systems in the presence of unstructured uncertainties is proposed which recovers the state trajectorie...
详细信息
In this paper, a state-feedback strategies based on time-scale separation technique for a class of strict-feedback systems in the presence of unstructured uncertainties is proposed which recovers the state trajectories of a nominal control design (without uncertainties) in the presence of unmatched uncertain nonlinearities. The performance of the feedback control scheme is evaluated by simulating state-feedback control for an uncertain strict-feedback system.
Operation and operator technologies used in new generation geometrical product specifications (GPS) provide the necessary knowledge basis for digitization and standardization in verification process of geometrical pro...
详细信息
Operation and operator technologies used in new generation geometrical product specifications (GPS) provide the necessary knowledge basis for digitization and standardization in verification process of geometrical products. This paper analyzes the operator formation for perpendicularity error evaluation of an axis, and presents mathematical models and the objective optimization functions of every association operation based on the minimum zone solution. A multi-population genetic algorithm based read-coded is then introduced to solve the optimization problem. The basic idea and steps of the algorithm are described in detail. Finally, the measurement process of the perpendicularity error evaluation of an axis based on real-coded multi-population genetic algorithm is realized through an example. The experiment indicates that the proposed method is efficient and feasible. The result of evaluation is accurate and unique.
Waste from electrical and electronic equipment (WEEE) is a relevant concern in Europe. Even if relevant improvements have been made in terms of material recovery technologies and policy measures, there remains a signi...
详细信息
A fuzzy neural network (FNN) has been trained off-line to memory the fuzzy control rules of the adaptive behaviors for the local optimal path planning of mobile robot. The fuzzy rules were collected automatically by r...
详细信息
ISBN:
(纸本)9781424447947
A fuzzy neural network (FNN) has been trained off-line to memory the fuzzy control rules of the adaptive behaviors for the local optimal path planning of mobile robot. The fuzzy rules were collected automatically by reinforcement Q_Learning (QL) on-line beforehand. This method has overcome the disadvantage of traditional means which are determined by artificial experience, and are able to meet the requirement of local optimal path planning. The FNN controller is constructed by BP neural network (BPNN). After the off-line training, the rules are stored implicitly in FNN. In control applications, without looking up table, when the real-time sense information is input to FNN, the best adaptive behavior is produced in the output. The simulation results show that because all training samples are from the trained fuzzy rules, the output is almost the same as the result of the training rules.
This paper studies event-driven synchronization control problem for chaotic Lur'e system with cyber attack. Firstly, In order to save network bandwidth resources, the event-driven scheme is employed to determine w...
详细信息
This paper studies event-driven synchronization control problem for chaotic Lur'e system with cyber attack. Firstly, In order to save network bandwidth resources, the event-driven scheme is employed to determine whether the sampled state should be transmitted to the controller. Secondly, a synchronization error model is designed to describe the master-slave synchronization system with event-driven scheme and cyber attack. Thirdly, based on Lyapunov functional approach, sufficient conditions for stabilization are derived which can ensure synchronization of the master system and slave system;particularly, a co-designed approach of controller and the event-driven matrix is obtained using the above stability condition. Lastly, a numerical example is presented to illustrate the effectiveness of the proposed approach.
PID control is still the most important and popular method in industrial control at present. PID control is easy to achieve and it can improve the steady-state performance and dynamic performance of the system. PID co...
详细信息
ISBN:
(数字)9798350344721
ISBN:
(纸本)9798350344738
PID control is still the most important and popular method in industrial control at present. PID control is easy to achieve and it can improve the steady-state performance and dynamic performance of the system. PID controller can be used for all objects, however, it has some problems with parameter adjustment and control effect. The proportional integral differential coefficient of PID control is fixed, and it can't change when disturbed, so the stability of the system will be affected. Moreover, PID control is prone to overshoot and can't be used in specific systems. Reinforcement learning (RL) algorithms have developed rapidly from discrete action to continuous action in recent years. It has aroused the high interest of researchers in the field of automatic control. RL control performs better in the degree of intelligence and dynamic performance, however, the steady-state performance is poor. The sensitive response of RL control will damage the actuator. In this paper, an adaptive PID controller based on deep reinforcement learning is proposed. By designing reward values, the desired control effect is described. In this way, an agent is trained to provide parameters to the PID controller in real time. It can improve the response speed of the system, suppress overshoot, and have a certain anti-disturbance ability by training the agent to achieve real-time PID parameter adjustment.
An important part for sign language expression is hand shape, and the 3D hand motion trajectories also contain abundant information to interpret the meaning of sign language. In this paper, a novel feature descriptor ...
详细信息
An important part for sign language expression is hand shape, and the 3D hand motion trajectories also contain abundant information to interpret the meaning of sign language. In this paper, a novel feature descriptor is proposed for sign language recognition, the hand shape features extracted from the depth images and spherical coordinate (SPC) feature extracted from the 3D hand motion trajectories combine to make up the final feature representation. The new representation not only incorporates both the spatial and temporal information to depict the kinematic connectivity among hand, wrist and elbow for recognition effectively but also avoids the interference of the illumination change and cluttered background compared with other methods. Meanwhile, our self-built dataset includes 320 instances to evaluate the effectiveness of our combining feature. In experiments with the dataset and different feature representation, the superior performance of Extreme Learning Machine (ELM) is tested, compared with Support Vector Machine (SVM).
Nowadays, with the continuous development of WiFi technology, more researchers come to realize that human behavior can be recognized by the application of WiFi Channel State Information (CSI). When human behavior has ...
详细信息
ISBN:
(数字)9781728176871
ISBN:
(纸本)9781728176888
Nowadays, with the continuous development of WiFi technology, more researchers come to realize that human behavior can be recognized by the application of WiFi Channel State Information (CSI). When human behavior has some changes, it will influence reflections of WiFi signals, which will also cause some changes to the CSI. Using the Intel WiFi Link 5300 network interface controller (NIC) and CSI-Tool, we can obtain the CSI data of corresponding behaviors. In this paper, we design a system to recognize different human behaviors based on the Convolutional Neural Network (CNN) and Gated Recurrent Unit (GRU). Firstly, we use the original data collected by the CSI-Tool, then extract the CSI amplitude values of different behaviors as features and input them into neural network structures where the GRU and CNN are connected in parallel. Based on the above works, we can successfully identify different human behaviors.
暂无评论