Intelligent vehicles can effectively improve traffic congestion and road traffic *** cruise followingcontrol(ACFC)is a vital part of intelligent *** this paper,a new hierarchical vehicle-following control strategy is ...
详细信息
Intelligent vehicles can effectively improve traffic congestion and road traffic *** cruise followingcontrol(ACFC)is a vital part of intelligent *** this paper,a new hierarchical vehicle-following control strategy is presented by synthesizing the variable time headway model,type-2 fuzzy control,feedforward+fuzzy proportion integration(PI)feedback(F+FPIF)control,and inverse longitudinal dynamics model of ***,a traditional variable time headway model is improved considering the acceleration of the lead ***,an interval type-2 fuzzy logic controller(IT2 FLC)is designed for the upper structure of the ACFC system to simulate the driver's operating *** reduce the nonlinear influence and improve the tracking accuracy for the desired acceleration,the control strategy of F+FPIF is given for the lower control ***,the lower control method proposed in this paper is compared with the fuzzy PI control and the traditional method(no lower controller for tracking desired acceleration)***,the proportion integration differentiation(PID),linear quadratic regulator(LQR),subsection function control(SFC)and type-1 fuzzy logic control(T1 FLC)are respectively compared with the IT2 FLC in control performance under different ***,the simulation results show the effectiveness of IT2 FLC for the upper structure and F+FPIF control for the lower structure.
In this paper, we focus on the problem of the infrared image detection. Aiming at the problem of the low contrast of the infrared images, an adaptive gamma transformation algorithm (AGT) is established to intelligentl...
详细信息
As satellite positioning has shortcomings such as susceptibility to multipath interference, we look forward to using a new algorithm to solve these problems. The method of derivative dynamic time regularization is use...
详细信息
Sentiment classification is a hot topic in the field of natural language processing. Currently, state-of-the-art classification models follow two steps: pre-training a large language model on upstream tasks, and then ...
详细信息
Most existing news-driven stock market prediction methods ignore the potential relationship between financial news and stocks. The complex relationship can help us to improve the accuracy of algorithmic trading system...
详细信息
If Toeplitz matrix is used for compression-aware ghost imaging, the imaging quality will be very low. In order to solve the problem, a new experimental scheme for ghost imaging is proposed in this paper. The scheme fi...
详细信息
This paper mainly studies an attack effectiveness evaluation method for AD hoc networks based on rough set theory. Firstly, we use OPNET to build AD hoc network simulation scenario, design and develop attack module, a...
详细信息
In this paper, a new approach without iteration is proposed for direct position determination (DPD) with Doppler shifts in the presence of unknown direction-dependent mutual coupling (DDMC). The special banded symmetr...
详细信息
Feather weight(FeW)cipher is a lightweight block cipher proposed by Kumar et *** 2019,which takes 64 bits plaintext as input and produces 64 bits *** Kumar et ***,FeW is a software oriented design with the aim of achi...
详细信息
Feather weight(FeW)cipher is a lightweight block cipher proposed by Kumar et *** 2019,which takes 64 bits plaintext as input and produces 64 bits *** Kumar et ***,FeW is a software oriented design with the aim of achieving high efficiency in software based *** seems that FeW is immune to many cryptographic attacks,like linear,impossible differential,differential and zero correlation ***,in recent work,Xie et *** the security of *** precisely,they proved that under the differential fault analysis(DFA)on the encryption states,an attacker can completely recover the master secret *** this paper,we revisit the block cipher FeW and consider the DFA on its key schedule algorithm,which is rather popular cryptanalysis for kinds of block *** particular,by respectively injected faults into the 30th and 29th round subkeys,one can recover about 55/80~69%bits of master *** the brute force searching remaining bits,one can obtain the full master secret *** simulations and experiment results show that our analysis is practical.
With the strong development momentum of the Internet, network not only brings convenience to our life, but also poses threats to our network security. Users can hide their IP and identity information through encryptio...
详细信息
暂无评论