Many researchers have studied connections between the problems of feedback control and of communicating over a channel with feedback. We study two such feedback communication schemes, and focus on properties such as p...
详细信息
ISBN:
(纸本)9781467357159
Many researchers have studied connections between the problems of feedback control and of communicating over a channel with feedback. We study two such feedback communication schemes, and focus on properties such as phase margin, robustness with respect to unmodeled time delays, and exogenous noise inputs. In particular, we study the impact of unstable poles in the encoder or decoder on these properties, as quantified by the Bode sensitivity integral.
Spiking neural P systems (SN P systems, for short) are a class of distributed parallel computing devices inspired from the way neurons communicate by means of spikes. Recently, a variant of SN P systems was considered...
详细信息
Spiking neural P systems (SN P systems, for short) are a class of distributed parallel computing devices inspired from the way neurons communicate by means of spikes. Recently, a variant of SN P systems was considered: at each step the neuron with the minimum number of spikes among the neurons that can spike will fire. In previous literature, it was obtained that such systems can achieve Turing completeness when the computing result is realized through accumulation of spikes in the output neuron. In this work, we use a natural way to define the computing result of the systems, by means of determining the time interval between the first two spikes emitted by the output neuron. As devices of computing functions, we construct a universal sequential SN P system based on minimum spike number (without delay) by using 137 neurons;as generators of sets of numbers, a universal sequential SN P system based on minimum spike number (without delay) with 126 neurons is also obtained.
In this paper, we combine navigation function-like potential fields and constraint based programming to achieve obstacle avoidance in formation. Constraint based programming was developed in robotic manipulation as a ...
详细信息
In this paper, we combine navigation function-like potential fields and constraint based programming to achieve obstacle avoidance in formation. Constraint based programming was developed in robotic manipulation as a technique to take several constraints into account when controlling redundant manipulators. The approach has also been generalized, and applied to other control systems such as dual arm manipulators and unmanned aerial vehicles. Navigation functions are an elegant way to design controllers with provable properties for navigation problems. By combining these tools, we take advantage of the redundancy inherent in a multi-agent control problem and are able to concurrently address features such as formation maintenance and goal convergence, even in the presence of moving obstacles. We show how the user can decide a priority ordering of the objectives, as well as a clear way of seeing what objectives are currently addressed and what are postponed. We also analyze the theoretical properties of the proposed controller. Finally, we use a set of simulations to illustrate the approach.
In this paper, we present an improved analytic method to the optimal trajectory generation of an autonomous underwater vehicle (AUV) in a dynamic environment. The proposed approach explicitly incorporates both the AUV...
详细信息
Background:In view of the rapid geographic spread and the increasing number of confirmed cases of novel influenza A(H7N9)virus infections in eastern China,we developed a diffusion model to spatiotemporally characteriz...
详细信息
Background:In view of the rapid geographic spread and the increasing number of confirmed cases of novel influenza A(H7N9)virus infections in eastern China,we developed a diffusion model to spatiotemporally characterize the impacts of bird migration and poultry distribution on the geographic spread of H7N9 ***:Three types of infection risks were estimated for 12 weeks,from February 4 to April 28,2013,including(i)the risk caused by bird migration,(ii)the risk caused by poultry distribution,and(iii)the integrated risk caused by both bird migration and poultry *** achieve this,we first developed a method for estimating the likelihood of bird migration based on available environmental and meteorological ***,we adopted a computational mobility model to estimate poultry distribution based on annual poultry production and consumption of each province/***,the spatiotemporal risk maps were created based on the integrated impacts of both bird migration and poultry ***:In the study of risk estimation caused by bird migration,the likelihood matrix was estimated based on the 7-day temperature,from February 4 to April 28,*** was found the estimated migrant birds mainly appear in the southeastern provinces of Zhejiang,Shanghai and Jiangsu during Weeks 1 to 4,and Week 6,followed by appearing in central eastern provinces of Shandong,Hebei,Beijing,and Tianjin during Weeks 7 to 9,and finally in northeastern provinces of Liaoning,Jilin,and Heilongjiang during Weeks 10 to *** the study of risk caused by poultry distribution,poultry distribution matrix was created to show the probability of poultry *** spite of the fact that the majority of the initial infections were reported in Shanghai and Jiangsu,the relative risk of H7N9 infection estimated based on the poultry distribution model predicted that Jiangsu may have a slightly higher likelihood of H7N9 infection than those in Zhejiang and Shanghai,if we on
In this paper, we propose a unified TDMA-based scheduling protocol for Vehicle-to-Infrastructure (V2I) communications. In the proposed TDMA-based scheduling protocol, the roadside infrastructure collects the informati...
详细信息
In this paper, we propose a unified TDMA-based scheduling protocol for Vehicle-to-Infrastructure (V2I) communications. In the proposed TDMA-based scheduling protocol, the roadside infrastructure collects the information from the vehicles within its communication coverage through a control channel at the beginning of each transmission frame and then decides how to allocate the time slots to the vehicles for their data transmission requests based on a new designed weight-factor-based scheduler. The provided weight factor jointly takes into consideration the channel quality of communication links, the speed based fairness among vehicles, and different access categories. Simulation results verify the efficiency of the proposed scheduling protocol in terms of the network throughput performance, the fairness among the vehicles, and different accessing priorities of different access categories.
Driver face monitoring system is a real-time system that can detect driver fatigue and distraction using machine vision approaches. In this paper, a new approach is introduced for driver hypovigilance (fatigue and dis...
Timed abstract state machine(TASM) is a formal specification language used to specify and simulate the behavior of real-time systems. Formal verification of TASM model can be fulfilled through model checking activitie...
详细信息
Timed abstract state machine(TASM) is a formal specification language used to specify and simulate the behavior of real-time systems. Formal verification of TASM model can be fulfilled through model checking activities by translating into UPPAAL. Firstly, the translational semantics from TASM to UPPAAL is presented through atlas transformation language(ATL). Secondly, the implementation of the proposed model transformation tool TASM2UPPAAL is provided. Finally, a case study is given to illustrate the automatic transformation from TASM model to UPPAAL model.
Architecture analysis and design language (AADL) is an architecture description language standard for embedded real-time systems and it is widely used in safety-critical applications. For facilitating verifcafion an...
详细信息
Architecture analysis and design language (AADL) is an architecture description language standard for embedded real-time systems and it is widely used in safety-critical applications. For facilitating verifcafion and analysis, model transformation is one of the methods. A synchronous subset of AADL and a general methodology for translating the AADL subset into timed abstract state machine (TASM) were studied. Based on the arias transformation language ( ATL ) framework, the associated translating tool AADL2TASM was implemented by defining the meta-model of both AADL and TASM, and the ATL transformation rules. A case study with property verification of the AADL model was also presented for validating the tool.
暂无评论