This paper proposes a map building algorithm for navigation task of autonomous vehicle.A local 2D grid map is designed to convey three types of information(free space,obstacle and unknown).A refined RBPF-SLAM algorith...
详细信息
ISBN:
(纸本)9781467383196
This paper proposes a map building algorithm for navigation task of autonomous vehicle.A local 2D grid map is designed to convey three types of information(free space,obstacle and unknown).A refined RBPF-SLAM algorithm is established to build a large scale,accurate navigation *** obstacle information is excluded in the final map,which provides better performance in vehicle's online *** sets of experiments are carried out in two driving conditions,with one in urban traffic environment and the other in unstructured *** mapping and localization result testify the effectiveness of our algorithm.
The security issue in cyber-physical systems has attracted growing interests in the last decades. This paper considers how false data injection attack can degrade the estimation quality of a remote state estimation sy...
详细信息
ISBN:
(纸本)9781509045839
The security issue in cyber-physical systems has attracted growing interests in the last decades. This paper considers how false data injection attack can degrade the estimation quality of a remote state estimation system. In this system, smart sensors measure a dynamic process and send preprocessed data through a communication network to a remote estimator to estimate the process. It is assumed that there are malicious attackers in the communication network, who are able to obtain and falsify all the data sent by the sensors. It is common that the remote estimator is equipped with a residue-based detector to detect potential attacks. We propose a class of deception attack and analyze its feasibility. We show that the proposed attack enables the attacker to inject false data into the remote estimator without being detected. We derive a criterion to judge the optimality of performance of this type of attack in the sense of maximizing the estimation error covariance. Furthermore, we find that a simple linear attack strategy, which flips the sign of intercepted signal, satisfies the optimality criterion. We present numerical examples to illustrate our theoretical results.
Currently, the multi-legged robots have to confront the problem of low energy utilization that restricts the moving radius of robots. Aimed at the problem of energy consumption for mobile robots, this paper provides t...
详细信息
ISBN:
(纸本)9781509009107
Currently, the multi-legged robots have to confront the problem of low energy utilization that restricts the moving radius of robots. Aimed at the problem of energy consumption for mobile robots, this paper provides the analysis in terms of the gait planning. Firstly, two kinds of gait curves Respectively, cycloid curve and Bezier curve are introduced and the main difference of two gait patterns is that the Bezier curve can achieve the swing leg retraction (SLR). The length of step (S), the height of step (H) and the duty ratio of gait cycle (β) are set as the primary research points about the gait of mobile robot. In this work, we formulate two indexes to quantitatively describe the performance of the quadruped robot and related simulations are carried out for gait parameters. Finally, the results provide some recommendations for the gait planning of the quadruped robot, that is, the changes of gait parameters influence the index of energy consumption and SLR can effectively reduce energy consumption.
Alongside advancements in communication technology,Ad Hoc networks have grown considerably in *** high-relative-velocity environments,however,air nodes often have supersonic velocity but ground nodes are nearly *** th...
详细信息
ISBN:
(纸本)9781509009107
Alongside advancements in communication technology,Ad Hoc networks have grown considerably in *** high-relative-velocity environments,however,air nodes often have supersonic velocity but ground nodes are nearly *** this case,traditional protocols do not satisfy the necessary link stability though this type of node usually has clear purpose or *** this effect,node activity can be forecast to a certain *** this study,a motion model was developed to describe aircraft flying in high-relative-velocity *** also investigated methods of maximizing link lifetime and network stability by designing an improved LARl *** simulation results showed that the proposed LAR1 protocol has superior performances in terms of link lifetime,but may increase the number of hops in data transmission.
In this paper,we propose an improved part-based tracking method based on compressive *** traditional compressive tracking can hardly deal with occlusion and scale variation,which is not robust enough in these *** our ...
详细信息
ISBN:
(纸本)9781509009107
In this paper,we propose an improved part-based tracking method based on compressive *** traditional compressive tracking can hardly deal with occlusion and scale variation,which is not robust enough in these *** our part-based method,the occluded image patches which are selected by K-means are not able to participate in determining the location of the target in order to increase tracking *** solve the problem of scale variation,an algorithm is proposed to estimate the size of target with the information of the whole *** addition,we also use the positions of every part to help us to get a precise size of the *** the combination of two methods,the scale of the target is *** compared with five state-of-the-arts have been done to prove the effectiveness and robustness of our method.
Disturbance widely exists in control *** disturbance rejection control(ADRC) has been proved to be an efficient way to deal with disturbance and achieves great success in *** most important part of ADRC is extended st...
详细信息
ISBN:
(纸本)9781509009107
Disturbance widely exists in control *** disturbance rejection control(ADRC) has been proved to be an efficient way to deal with disturbance and achieves great success in *** most important part of ADRC is extended state observer(ESO),which estimates the states of system and total *** regards internal disturbance and external disturbance as a total disturbance,estimates it and eliminates it in the *** faster ESO estimates total disturbance,the more quickly controller eliminates *** paper focuses on the discrete linear extended state observer(DLESO),and presents discrete predictive linear extended state observer(DPLESO).Stability and performances are *** result shows that DPLESO has better performances for disturbance rejection than DLESO.
For a class of unstable discrete-time multi-variable switched systems with parametric uncertainty, an identification scheme is developed in this paper. Specifically, the identification algorithm is derived to identify...
详细信息
This paper addresses the tuning problem of a proportional-integral-derivative(PID) controller with notch filter for flexible space structure model based on the particle swarm optimization (PSO). For flexible structure...
详细信息
This paper introduces an algorithm to learn the strategy updating rule for a two- person Boolean game using the records of the history strategies and game results. The two-person game in this paper is introduced as a ...
详细信息
暂无评论