Mutation analysis is widely employed to evaluate the effectiveness of various software testing techniques. In most situations, mutation operators are uniformly applied to the original programs, while the faults tend t...
详细信息
Teaching and learning the principles of wireless communication is a challenging issue mainly because it is difficult for students to translate the theoretical models that are commonly used in this area into practical ...
详细信息
It is an interesting topic to study decentralized control algorithms for a group of agents to achieve a class of collective circular motion, or called torus. An algorithm was proposed in [1] where no global beacon inf...
详细信息
This paper considers a Bayesian approach to linear system identification. One motivation is the advantage of the minimum mean square error of the associated conditional mean estimate. A further motivation is the error...
详细信息
This paper examines the problem of estimating the parameters describing system models of quite general nonlinear and multi-variable form. The approach is a computational one in which quantities that are intractable to...
详细信息
This paper deals with a new approach for evaluation of e-learning programs. Based on methods of general measure theory an evaluation model is developed which can be used for assessment of complex logical target struct...
详细信息
In this paper, we consider a number of technical problems associated with identification of linear systems using quantized and intermittent information. More specifically, we study asymptotic properties for identifica...
详细信息
This paper takes advantage of the integration of subtraction clustering and fuzzy c-means clustering algorithm to obtain precise number of clusters and the degree of membership, and establishes the neural network mode...
详细信息
This paper takes advantage of the integration of subtraction clustering and fuzzy c-means clustering algorithm to obtain precise number of clusters and the degree of membership, and establishes the neural network model based on the multiple criterion information fusion and the fuzzy technology. Collecting a variety of data in actual underground mining process and integrating them as a whole, the simulations are performed. Experimental results indicate that the proposed method is valid.
作者:
S. CampbellW. NaeemEnergy
Power & Intelligent Control School of Electronics Electrical Engineering & Computer Science Queen's University Belfast
With an increasing demand throughout industry for autonomous vehicles with more intelligent decision-making features, the issue of Unmanned Surface Vehicle (USV) navigation is addressed with respect to automatic obsta...
详细信息
With an increasing demand throughout industry for autonomous vehicles with more intelligent decision-making features, the issue of Unmanned Surface Vehicle (USV) navigation is addressed with respect to automatic obstacle avoidance. This Obstacle Detection and Avoidance (ODA) system design approach addresses the primary concern, the safety of a USV in operation. Due to the desire for improved autonomy and thus reduced human interaction, it is essential to incorporate vessel avoidance protocols into the ODA architecture for operation amongst maritime traffic, implementing the marine Rules of the Road. A heuristic Rule-based Repairing A * (R-RA * ) algorithm is proposed, which is integrated within a decision-making framework. The integrated system has proven effective in simulations for path planning in real-time, in accordance with the International Regulations for Preventing Collisions at Sea.
暂无评论