This paper presents a central pattern generator (CPG) and vestibular reflex combined control strategy for a quadruped robot. An oscillator network and a knee-to-hip mapping function are presented to realize the rhyt...
详细信息
This paper presents a central pattern generator (CPG) and vestibular reflex combined control strategy for a quadruped robot. An oscillator network and a knee-to-hip mapping function are presented to realize the rhythmic motion for the quadruped robot. A two-phase parameter tuning method is designed to adjust the parameters of oscillator network. First, based on the numerical simulation, the influences of the parameters on the output signals are analyzed, then the genetic algorithm (GA) is used to evolve the phase relationships of the oscillators to realize the basic animal-like walking pattern. Moreover, the animal's vestibular reflex mechanism is mimicked to realize the adaptive walking of the quadruped robot on a slope terrain. Coupled with the sensory feedback information, the robot can walk up and down the slope smoothly. The presented bio-inspired control method is validated through simulations and experiments with AIBO. Under the control of the presented CPG and vestibular reflex combined control method, AIBO can cope with slipping, falling down and walk on a slope successfully, which demonstrates the effectiveness of the proposed walking control method.
Accurate traffic prediction is crucial for urban traffic management. Spatial-temporal graph neural networks, which combine graph neural networks with time series processing, have been extensively employed in traffic p...
详细信息
Accurate traffic prediction is crucial for urban traffic management. Spatial-temporal graph neural networks, which combine graph neural networks with time series processing, have been extensively employed in traffic prediction. However, traditional graph neural networks only capture pairwise spatial relationships between road network nodes, neglecting high-order interactions among multiple nodes. Meanwhile, most work for extracting temporal dependencies suffers from implicit modeling and overlooks the internal and external dependencies of time series. To address these challenges, we propose a Geometric Algebraic Multi-order Graph Neural Network (GA-MGNN). Specifically, in the temporal dimension, we design a convolution kernel based on the rotation matrix of geometric algebra, which not only learns internal dependencies between different time steps in time series but also external dependencies between time series and convolution kernels. In the spatial dimension, we construct a tokenized hypergraph and integrate dynamic graph convolution with attention hypergraph convolution to comprehensively capture multi-order spatial dependencies. Additionally, we design a segmented loss function based on traffic periodic information to further improve prediction accuracy. Extensive experiments on seven real-world datasets demonstrate that GAMGNN outperforms state-of-the-art baselines IEEE
Currently, with the evolution of virtualization technology, cloud computing mode has become more and more popular. However, people still concern the issues of the runtime integrity and data security of cloud computing...
详细信息
Currently, with the evolution of virtualization technology, cloud computing mode has become more and more popular. However, people still concern the issues of the runtime integrity and data security of cloud computing platform, as well as the service efficiency on such computing platform. At the same time, according to our knowledge, the design theory of the trusted virtual computing environment and its core system software for such network-based computing platform is at the exploratory stage. In this paper, we believe that efficiency and isolation are the two key proprieties of the trusted virtual computing environment. To guarantee these two proprieties, based on the design principle of splitting, customizing, reconstructing, and isolation-based enhancing to the platform, we introduce TRainbow, a novel trusted virtual computing platform developing by our research *** the two creative mechanisms, that is, capacity flowing amongst VMs and VM-based kernel reconstructing, TRainbow provides great improvements (up to 42%) in service performance and isolated reliable computing environment for Internet-oriented, large-scale, concurrent services.
Fueled by advancements in intelligent transportation systems, the Internet of Vehicles (IoV) seeks to connect smart vehicles, road infrastructure, and users into a unified network, enhancing traffic efficiency and red...
详细信息
The automatic detection of defects in industrial photovoltaic film is crucial for ensuring the reliability of photovoltaic modules. key challenges include limited defect samples, interclass feature similarities, and i...
详细信息
The interest in multi-drone systems flourished in the last decade and their application is promising in many fields. We believe that in order to make drone swarms flying smoothly and reliably in real-world scenarios w...
详细信息
ISBN:
(纸本)9781538692455
The interest in multi-drone systems flourished in the last decade and their application is promising in many fields. We believe that in order to make drone swarms flying smoothly and reliably in real-world scenarios we need a first intermediate step which consists in the analysis of the effects of limited sensing on the behavior of the swarm. In nature, the central sensor modality often used for achieving flocking is vision. In this work, we study how the reduction in the field of view and the orientation of the visual sensors affect the performance of the Reynolds flocking algorithm used to control the swarm. To quantify the impact of limited visual sensing, we introduce different metrics such as (i) order, (ii) safety, (iii) union and (iv) connectivity. As Nature suggests, our results confirm that lateral vision is essential for coordinating the movements of the individuals. Moreover, the analysis we provide will simplify the tuning of the Reynolds flocking algorithm which is crucial for real-world deployment and, especially for aerial swarms, it depends on the envisioned application. We achieve the results presented in this paper through extensive Monte-Carlo simulations and integrate them with the use of genetic algorithm optimization.
The integrated sensing and communication (ISAC) system can simultaneously provide communication and radar sensing, effectively improving spectrum utilization. However, existing research mainly focuses on the mono-stat...
详细信息
Abstract: The digital transformation of manufacturing industry is a crucial measure for achieving high-quality development, and mobile communication technology plays a significant role in this process. This paper focu...
详细信息
ISBN:
(纸本)9798400717444
Abstract: The digital transformation of manufacturing industry is a crucial measure for achieving high-quality development, and mobile communication technology plays a significant role in this process. This paper focuses on exploring the internal mechanism of mobile communication technology promoting the digital transformation of manufacturing industry, with a particular emphasis on three major technologies: 5G, 5G-A, and 6G. Firstly, the paper summarizes the latest progress of mobile communication technology in the field of manufacturing digital transformation. Secondly, it outlines the characteristics of technological evolution from 5G to 6G. Thirdly, based on the technological evolution process, it presents the three major capabilities of 6G, namely transmission, integrated sensing and communication, and intelligent computing. It further elaborates on how mobile communication technology gives rise to data facotor and clarifies the internal mechanism of mobile communication technology enabling data factor to empower the digital transformation of manufacturing industry. Finally, it looks forward to the typical development trends of 6G in the field of manufacturing digital transformation.
The passwords for unlocking the mobile devices are relatively simple,easier to be stolen,which causes serious potential security *** important research direction of identity authentication is to establish user behavio...
详细信息
The passwords for unlocking the mobile devices are relatively simple,easier to be stolen,which causes serious potential security *** important research direction of identity authentication is to establish user behavior models to authenticate *** this paper,a mobile terminal APP browsing behavioral authentication system architecture which synthesizes multiple factors is *** architecture is suitable for users using the mobile terminal APP in the daily *** architecture includes data acquisition,data processing,feature extraction,and sub model *** can use this architecture for continuous authentication when the user uses APP at the mobile terminal.
Moore's law continues to grant computer architects ever more transistors in the foreseeable future, and parallelism is the key to continued performance scaling in modern microprocessors. In this paper, the achievemen...
详细信息
Moore's law continues to grant computer architects ever more transistors in the foreseeable future, and parallelism is the key to continued performance scaling in modern microprocessors. In this paper, the achievements in our research project, which is supported by the National Basic Research 973 Program of China, on parallel architecture, are systematically presented. The innovative approaches and techniques to solve the significant problems in parallel architecture design are smnmarized, including architecture level optimization, compiler and language-supported technologies, reliability, power-performance efficient design, test and verification challenges, and platform building. Two prototype chips, a multi-heavy-core Godson-3 and a many-light-core Godson-T, are described to demonstrate the highly scalable and reconfigurable parallel architecture designs. We also present some of our achievements appearing in ISCA, MICRO, ISSCC, HPCA, PLDI, PACT, IJCAI, Hot Chips, DATE, IEEE Trans. VLSI, IEEE Micro, IEEE Trans. Computers, etc.
暂无评论