In micro-manipulations such as cell manipulation, it is desirable for the operator to feel the haptic sensation of the object. Bilateral control can remotely transmit position and force information between leader and ...
详细信息
ISBN:
(数字)9798350355369
ISBN:
(纸本)9798350355376
In micro-manipulations such as cell manipulation, it is desirable for the operator to feel the haptic sensation of the object. Bilateral control can remotely transmit position and force information between leader and follower systems. In this control, the use of a linear motor as a leader and a stacked piezoelectric actuator as a follower has been proposed to achieve micro-scale operation. There is a lot that needs to be clarified about bilateral control when the structure differs between leader and follower systems. In conventional scaled 4channel (4ch) bilateral control, a theory of oblique coordinate control has been proposed that considers differences in the inertia of leader and follower systems. However, when a piezoelectric actuator is used, the control scheme differs from using two linear motors with different inertias because the structures of the leader and follower systems are entirely different. Another method is scaled admittance bilateral control. However, the control design when structures and inertias of the two systems are different has not yet been clarified. In this paper, a scaled admittance bilateral control using a piezoelectric actuator and a linear motor is constructed. Experiments confirm that the realized scaled admittance bilateral control has the equivalent position and force tracking performances as the conventional scaled 4ch bilateral control using a piezoelectric actuator. Furthermore, the designed scaled admittance bilateral control is more robust to fluctuations in the nominal inertia of the piezoelectric actuator than the conventional scaled 4 ch bilateral control.
The mechanical tensile properties of T91 steel after being oxidized in liquid LBE saturated by oxygen at 350-500 °C for up to 1,000 h are studied. Duplex oxide scales are found on T91 steels after the LBE exposur...
详细信息
We designed and fabricated a silicon chip-based heralded single-photon source with 12.4% off-chip measured heralding efficiency. In addition, we achieve a coincidence-to-accidental ratio of 443.7 and heralded self-cor...
详细信息
We designed and fabricated a -0.64 dB loss hybrid coupling platform for silicon chips. The coupler is also stable enough to maintain within +-0.1 dB coupling fluctuation against 20 um fiber holder movement. This featu...
详细信息
The integration of active user detection (AUD) and integrated sensing and communication (ISAC) enables the realization of communication and sensing functionalities over one hardware platform within the realm of ultra-...
详细信息
This paper addresses the task of tracking Lissajous trajectories in the presence of quantized positioning sensors. To do so, theoretical results on tracking of continuous time periodic signals in the presence of outpu...
详细信息
In this paper, we investigate the safety-aware optimal control (SAOC) problem, which attempts to minimize a predefined performance index function while ensuring the safety of nonlinear systems. First, the barrier func...
In this paper, we investigate the safety-aware optimal control (SAOC) problem, which attempts to minimize a predefined performance index function while ensuring the safety of nonlinear systems. First, the barrier function-based system transformation is utilized to design an optimal control policy which maintains the system states located in the safety region. To deal with the input constraints, a non-quadratic cost function is imposed to the control input. Then, the Hamilton-Jacobi-Bellman equation is established to provide the solution of the SAOC problem. Moreover, by utilizing the off-policy Bellman equation, a data-based off-policy reinforcement learning (OPRL) algorithm is developed to obtain the safety-aware optimal controller in a model-free manner. To implement this algorithm, a data collection process with the barrier transform is executed to generate the off-policy trajectory data, and an actor-critic neural network structure with the least-square updating law is employed in the off-policy learning phase. Finally, a simulation example is provided to verify the effectiveness of the developed control method.
To design a more robust artifact, an artifact design based on a design rationale analysis is pivotal. Errors in previous design rationales that led to the degradation of artifact robustness in the past provide valuabl...
详细信息
To design a more robust artifact, an artifact design based on a design rationale analysis is pivotal. Errors in previous design rationales that led to the degradation of artifact robustness in the past provide valuable knowledge towards improving the robust design. However, methods for exposing and analysing errors in design rationale remain unclear. This paper proposes a structured method for a design rationale analysis based on logical structuring. This method provides a well-constructed means of identifying and analysing errors in design rationale from the perspective of knowledge operation.
Satellites serve as a key component for the upcoming space-air-ground integrated networks, while their signals are susceptible to spoofing attacks. Radio frequency fingerprinting (RFF) has been recognized as a highly ...
Satellites serve as a key component for the upcoming space-air-ground integrated networks, while their signals are susceptible to spoofing attacks. Radio frequency fingerprinting (RFF) has been recognized as a highly promising authentication approach to counteracting spoofing attacks. Despite extensive RFF schemes proposed for terrestrial networks, RFF for satellites remains largely unexplored except for a recently reported scheme named PAST-AI, which exploits the spatial property of the IQ imbalance of downlink signals to authenticate Iridium satellites. Although PAST-AI demonstrates the potential of RFF for satellite authentication, its authentication accuracy and time are unsatisfactory. To address this issue, this paper proposes a novel 3D convolution-based RFF scheme for Iridium satellite authentication, which exploits not only the spatial property but also the temporal property of the IQ imbalance. The proposed RFF scheme transforms short-period sequences of successive IQ samples into 3D data samples and uses a 3D convolutional neural network (CNN) to train an RFF model. To evaluate the authentication accuracy, we collected over 198000000 IQ samples from all 66 Iridium satellites and generated 1000 3D data samples for each satellite. The results showed that the proposed RFF scheme achieves more accurate authentication than PAST-AI using fewer IQ samples (i.e., shorter time).
The Android operating system released by Google in 2007 has experienced very significant development. In 2019, the number of Android application users reached 2.5 billion. One of the contributing factors is the nature...
The Android operating system released by Google in 2007 has experienced very significant development. In 2019, the number of Android application users reached 2.5 billion. One of the contributing factors is the nature of the android application, which is very flexible and easy to install. Users can download APK files on the internet. Generally, APK files are stored in archive format, so they are pretty easy to manage. However, APK files may be used to spread malware behind this convenience. This study aims to provide an overview of the process of planting malware/backdoor on Android applications and how to prevent it. This study initiated the injection of malicious code on five android applications, namely WhatsApp, Telegram, DroidCam, Fifa Mobile, and Tokopedia. According to the results, four applications were successfully injected, while one application failed. The failure most likely occurred as a result of the application’s source code being obfuscated. Obfuscation is therefore strongly advised for Android applications to prevent code injection that could potentially lead to malware insertion.
暂无评论