Texture synthesis is the field of computer graphics and related basic core issues. Studies have shown that the MRF model-based two-dimensional image texture synthesis algorithm, the synthesis results are directly affe...
详细信息
For most practical nonlinear state estimation problems, the conventional nonlinear filters do not usually work well for some cases, such as inaccurate system model, sudden change of state-interested and unknown varian...
详细信息
For most practical nonlinear state estimation problems, the conventional nonlinear filters do not usually work well for some cases, such as inaccurate system model, sudden change of state-interested and unknown variance of measurement noise. In this paper, an adaptive cubature strong tracking information filter using variational Bayesian (VB) method is proposed to cope with these complex cases. Firstly, the strong tracking filtering (STF) technology is used to integrally improve performance of cubature information filter (CIF) aiming at the first two cases and an iterative scheme is presented to effectively evaluate a strong tracking fading factor. Secondly, the VB method is introduced to iteratively evaluate the unknown variance of measurement noise. Finally, the novel adaptive cubature information filter is obtained by perfectly combining the STF technology with the VB method, where the variance estimation provided by the VB method guarantees normal running of the strong tracking functionality.
This paper studies the formation maneuvering control problem for a network of agents with the objective of achieving a desired group formation shape and a constant overall group maneuvering velocity. A fully distribut...
详细信息
ISBN:
(纸本)9781467360890
This paper studies the formation maneuvering control problem for a network of agents with the objective of achieving a desired group formation shape and a constant overall group maneuvering velocity. A fully distributed approach is developed to solve the problem. That is, a control law is proposed for each agent in the network, with its parameters capable of being designed in a distributed manner, and is implementable locally via relative sensing and communication with neighbors. Necessary and sufficient conditions regarding a critical control parameter are obtained to guarantee the globally asymptotic convergence of the overall system for both the single-integrator kinematics case and the double-integrator dynamics case.
This paper presents a motor function rehabilitation system for the disabled with virtual reality. The design of the entire system is established on the SIGVerse virtual platform. The patient can complete the rehabilit...
详细信息
This paper presents a motor function rehabilitation system for the disabled with virtual reality. The design of the entire system is established on the SIGVerse virtual platform. The patient can complete the rehabilitation training immersed in a virtual environment. Firstly, the motion information of the patient is recognized by Kinect, and regenerated by the avatar in the virtual environment accurately. At the same time, the view of the avatar can be presented to the patient by HMD. Though this method, the patient can exposure to the virtual environment during the rehabilitation training, so that they can feel like their real and health motions in the virtual environment. Additionally, the EMG signals of the activated muscle are collected, and they can provide a feedback of contraction intensities of the muscle to the patient in real time. Moreover, we provide an electrical stimulation to the corresponding muscle. As a result, the patient can have the perception of muscle contractions.
This paper proposes a simple, distributed control protocol for multi-agent systems with relative sensing capability over a directed network to achieve an affine formation. In contrast to the linear consensus protocol,...
详细信息
ISBN:
(纸本)9781467360890
This paper proposes a simple, distributed control protocol for multi-agent systems with relative sensing capability over a directed network to achieve an affine formation. In contrast to the linear consensus protocol, the control protocol in this paper takes both positive and negative weights that partially encode the target formation shape and is thus able to achieve a formation pattern rather than just consensus. Having possibly negative weights in a graph, the associated Laplacian is called the generalized Laplacian. The connection between the generic rank property of the generalized Laplacian and the connectivity of a directed graph is established, based on which a necessary and sufficient graphical condition is developed to ensure the emergence of an affine formation by the proposed distributed control protocol.
Vehicle-pedestrian collision avoidance is an important issue on intelligent vehicles research *** pedestrian detection and collision avoidance were concentrated by previously many studies,there are many problems about...
详细信息
Vehicle-pedestrian collision avoidance is an important issue on intelligent vehicles research *** pedestrian detection and collision avoidance were concentrated by previously many studies,there are many problems about the collision prediction and *** on pedestrian detection,the trajectory prediction and time to collision(TTC) still needs to be further studied to prevent vehicle-pedestrian *** this study,a monocular camera with low cost was *** well performance of pedestrian detection was *** on this detection system,a model of pedestrian trajectory prediction was ***,the extended Kalman filter was used to predict motion of *** on trajectory prediction,time to collision range(TTCR) was proposed identify three levels risks,including safe,potential collision and *** this study,the on-road experiments were conducted to validate the proposed *** experimental result shows that the TTCR is more reasonable and safe to apply in vehicle-pedestrian collision avoidance.
作者:
Xin CaiShaoyuan LiNing LiKang LiDepartment of Automation
Shanghai Jiao Tong University and Key Laboratory of System Control and Information Processing Ministry of Education Shanghai 200240 P. R. China School of Electronics
Electrical Engineering and Computer Science The Queen's University Belfast Belfast BT7 1NN UK
This paper addresses the problem of infinite time performance of model predictive controllers applied to constrained nonlinear systems. The total performance is compared with a finite horizon optimal cost to reveal pe...
详细信息
This paper addresses the problem of infinite time performance of model predictive controllers applied to constrained nonlinear systems. The total performance is compared with a finite horizon optimal cost to reveal performance limits of closed-loop model predictive control systems. Based on the Principle of Optimality, an upper and a lower bound of the ratio between the total performance and the finite horizon optimal cost are obtained explicitly expressed by the optimization horizon. The results also illustrate, from viewpoint of performance, how model predictive controllers approaches to infinite optimal controllers as the optimization horizon increases.
This paper addresses the H_∞ performance and H_∞ control of switched stochastic linear systems subject to average dwell-time switching. At first, a sufficient condition is presented to guarantee the switched stochas...
详细信息
ISBN:
(纸本)9781467360890
This paper addresses the H_∞ performance and H_∞ control of switched stochastic linear systems subject to average dwell-time switching. At first, a sufficient condition is presented to guarantee the switched stochastic system to achieve a weighted H_∞ performance under the condition that all subsystems are asymptotic mean square stable. Further, the disturbance attenuation property of the considered systems is investigated when both stable and unstable subsystems are included. It is shown that if the active time of unstable subsystems is properly allocated, a stochastic bounded real lemma (SBRL) can be established based on the solvability of linear matrix inequalities (LMIs). As an application of the obtained SBRL, the robust control problem is settled for a class of switched stochastic systems with (x,u,v)-dependent noises, and the state-feedback H_∞ controller is developed.
We propose a continuous-variable measurement-device-independent quantum key distribution (CV-MDI QKD) protocol, in which detection is conducted by an untrusted third party. Our protocol can defend all detector side ch...
详细信息
We propose a continuous-variable measurement-device-independent quantum key distribution (CV-MDI QKD) protocol, in which detection is conducted by an untrusted third party. Our protocol can defend all detector side channels, which seriously threaten the security of a practical CV QKD system. Its security analysis against arbitrary collective attacks is derived based on the fact that the entanglement-based scheme of CV-MDI QKD is equivalent to the conventional CV QKD with coherent states and heterodyne detection. We find that the maximal total transmission distance is achieved by setting the untrusted third party close to one of the legitimate users. Furthermore, an alternate detection scheme, a special application of CV-MDI QKD, is proposed to enhance the security of the standard CV QKD system.
For the congestion control of the transmission control protocol (TCP) networks in presence of input saturation and the lumped uncertainty, an active queue management algorithm is proposed based on adaptive sliding m...
详细信息
ISBN:
(纸本)9781467355339
For the congestion control of the transmission control protocol (TCP) networks in presence of input saturation and the lumped uncertainty, an active queue management algorithm is proposed based on adaptive sliding mode control. One adaptive law is designed to estimate the lumped uncertainty such that the need for knowing the bound in advance is eliminated. The other adaptive law is proposed to ensure the system stabilty considering the TCP networks subjected to input saturation. Using these adaptive laws, an adaptive sliding mode controller is presented to guarantee asymptotic convergence and robustness against the lumped uncertainty. Numerical simulations are performed to show that the proposed scheme is effective in various network scenarios.
暂无评论