Using Maximum Likelihood (or Prediction Error) methods to identify linear state space model is a prime technique. The likelihood function is a nonconvex function and care must be exercised in the numerical maximizatio...
详细信息
In this work, a technique for automatic classification of finger motion signals was introduced by using Gram-Schmidt orthonormalization. Because the motion signal has nonlinear and non-stationary processing characteri...
详细信息
ISBN:
(纸本)9781665413015
In this work, a technique for automatic classification of finger motion signals was introduced by using Gram-Schmidt orthonormalization. Because the motion signal has nonlinear and non-stationary processing characteristics, the Gram-Schmidt orthonormalization method is used to analyze the motion signal. By batch processing the high correlation between variables, the classification results are obtained. At the same time, combined with the idea of partial least squares, a new identity measure is proposed to select the best parameters. Finally, SVM is used to classify the movement types of the research objects. According to the test sample records of two finger motion signals (thumb and pinky), the average accuracy is 96.65%. The average accuracy of data activation (thumb and pinky) was 100%. Experiments show that the operation speed of Gram-Schmidt classification method is significantly improved, and it has better interpretability and prediction ability.
Inspired by the geometric method proposed by Jean-Pierre MAREC, we first consider the Hohmann transfer problem between two coplanar circular orbits as a static nonlinear programming problem with an inequality constrai...
详细信息
Inspired by the geometric method proposed by Jean-Pierre MAREC, we first consider the Hohmann transfer problem between two coplanar circular orbits as a static nonlinear programming problem with an inequality constraint. By the Kuhn-Tucker theorem and a second-order sufficient condition for minima, we analytically prove the global minimum of the Hohmann transfer. Two sets of feasible solutions are found: one corresponding to the Hohmann transfer is the global minimum and the other is a local minimum. We next formulate the Hohmann transfer problem as boundary value problems, which are solved by the calculus of variations. The two sets of feasible solutions are also found by numerical examples. Via static and dynamic constrained optimizations, the solution to the Hohmann transfer problem is re-discovered, and its global minimum is analytically verified using nonlinear programming.
In this paper, we consider a common unicast beamforming network where Alice utilizes the communication to Carol as a cover and covertly transmits a message to Bob without being recognized by Willie. We investigate the...
详细信息
In this paper, we study the impact of stealthy attacks on the Cyber-Physical System (CPS) modeled as a stochastic linear system. An attack is characterised by a malicious injection into the system through input, outpu...
详细信息
Cervical cancer is a very common and fatal type of cancer in women. Cytopathology images are often used to screen for this cancer. Given that there is a possibility that many errors can occur during manual screening, ...
详细信息
High-speed train (HST) communication is a very challenging scenario in wireless communication systems due to its fast time-varying channels and significant penetration loss. Thanks to the low cost and smart channel re...
详细信息
This paper studies synchronization of a network of hybrid quadratic integrate-and-fire spiking neurons communicating over a complete graph and interconnected by means of bidirectional electrical couplings. Synchroniza...
详细信息
ISBN:
(数字)9781728113982
ISBN:
(纸本)9781728113999
This paper studies synchronization of a network of hybrid quadratic integrate-and-fire spiking neurons communicating over a complete graph and interconnected by means of bidirectional electrical couplings. Synchronization of the network of identical neurons with a common and constant coupling strength is studied using a Lyapunov-based argument for sufficiently large coupling strength. In addition, a voltage-dependent coupling law is proposed. It is assumed that each neuron is coupled to each of its neighbors by a coupling law which depends on the voltage of its neighboring neuron. For the voltage-dependent case, a sufficient condition for synchronization of two interconnected neurons is presented. Moreover, a comparison between the two mechanisms is given. Simulation results are provided to verify the theoretical analysis.
A competency in the industrial world depends on several aspects, that is cost, delivery, flexibility, and quality. The smart industrial system / Smart Manufacturing System (SMS) tries to improve those aspects using th...
A competency in the industrial world depends on several aspects, that is cost, delivery, flexibility, and quality. The smart industrial system / Smart Manufacturing System (SMS) tries to improve those aspects using the latest technology that encourages the use of digital information widely and quickly in industrial systems. Development of SM in industry 4.0, pushing the change of industrial pyramids into Cyber-Physical System (CPS). CPS has begun to be applied widely in process industries nowadays, i.e., distillation process industry. In distillation process, boiler has the important role to separate 2 different components using the difference of its boiling point. In this paper, the alcohol distillation plant is used to purify 30% of alcohol solution. The modelling of boiler, simulation, and implementation of boiler control system are presented to get the desired temperature. The temperature reference is roughly 85 °C. Predictive Model controller (MPC) and Kalman Filter is proposed to control the temperature of boiler by adjusting the PWM of on-off time and to deal with the disturbance and sensor noise. The IAE, ISE, and ITAE is analyzed to obtain the error of control system and energy usage per operation is also calculated to find out the effect of MPC controller in energy optimization.
In this paper, we consider a secure distributed filtering problem for linear time-invariant systems with bounded noises and unstable dynamics under compromised observations. A malicious attacker is able to compromise ...
详细信息
暂无评论