In this paper, an event-triggered time-varying formation tracking control for a class of second-order nonlinear multiagent systems(MAS) operating within a constrained region is investigated. To mitigate the negative e...
详细信息
In this paper, an event-triggered time-varying formation tracking control for a class of second-order nonlinear multiagent systems(MAS) operating within a constrained region is investigated. To mitigate the negative effects of external unknown disturbance, a novel disturbance observer with performance guarantees is proposed, enabling precise disturbance *** the artificial potential field(APF) method, a repulsive potential function is introduced to prevent inter-agent collisions as well as collisions with environmental obstacles. To reduce continuous communication and frequent system updates, a sliding mode technique is incorporated into the formation tracking controller, utilizing an event-triggered mechanism. The controller is also applicable to the formation control of MAS in switching-constrained regions. The achievement of the specified timevarying geometric formation is rigorously demonstrated through the Lyapunov framework. Numerical simulations are presented to validate the effectiveness of the theoretical results.
In order to study to design a photoelectric intelligent platform based on multifunctional edge computing equipment by using photoelectric detection equipment TC505C, RK-Series Development Kits computing platform and N...
详细信息
The localization accuracy of visual SLAM depends on the image ***,in postdisaster rescue missions,the images obtained by the camera often contain considerable noise,which affects the pose estimation based on visual **...
详细信息
ISBN:
(数字)9789887581536
ISBN:
(纸本)9781665482561
The localization accuracy of visual SLAM depends on the image ***,in postdisaster rescue missions,the images obtained by the camera often contain considerable noise,which affects the pose estimation based on visual *** this paper,we study the influence of random impulse noise in images on the localization accuracy of visual SLAM,and reduce these influences by denoising and removing ***,the camera image is preprocessed by the traditional image noise reduction *** at the problem of a large number of mismatches in optical flow tracking due to the influence of residual noise,the improved random sample consensus method is adopted to remove *** judge the correct matching probability of optical flow tracking results by normalized cross-correlation matching before random *** use guided sampling to select matching points to estimate the camera motion model,to increase the robustness of the SLAM ***,our method is verified in the open-source solution *** show that after random impulse noise is added to the KITTI dataset,the pose estimation accuracy of the improved SLAM is higher than the pose estimation accuracy after noise reduction only,and it is also higher than the pose estimation results of the original images in multiple sequences of the KITTI dataset.
In recent years,the introduction of Siamese network has brought new vitality to the object tracking ***,high-performance Siamese trackers cannot run at a real-time speed on mobile devices due to their complex and huge...
详细信息
ISBN:
(数字)9789887581536
ISBN:
(纸本)9781665482561
In recent years,the introduction of Siamese network has brought new vitality to the object tracking ***,high-performance Siamese trackers cannot run at a real-time speed on mobile devices due to their complex and huge *** distillation is a common and effective model compression method,but it is difficult to be applied to the challenging task like object *** find out the fundamental cause is that the imbalance between the foreground and background in the object tracking task,which aggravates the problem of insufficient feature extraction ability of small ***,we propose the attention mask distillation(AMD) to help the student tracker focus on the foreground area faster and more *** attention mask can be easily obtained from the feature maps and brings fine-granularity to the traditional binary *** experimental results on OTB100 and VOT2018 show that our method enables the student tracker perform as well as the teacher *** the same time,it's able to run on the CPU at a hyper-real-time of 66 fps and achieves nearly 9 times model compression *** low computational and storage costs make it possible to deploy high-performance trackers on resource-constrained platforms.
In order to study to design a photoelectric intelligent platform based on multifunctional edge computing equipment by using photoelectric detection equipment TC505C, RK-Series Development Kits computing platform and N...
详细信息
ISBN:
(数字)9789887581581
ISBN:
(纸本)9798350366907
In order to study to design a photoelectric intelligent platform based on multifunctional edge computing equipment by using photoelectric detection equipment TC505C, RK-Series Development Kits computing platform and Nvidia Jetson *** photoelectric intelligent platform can be used to run multiple target detection algorithms after design and *** as *** of all, after the first stage of the photoelectric intelligent platform is completed, the host computer can establish communication with the photoelectric detection equipment, carry out automatic or manual servo control on the photoelectric detection equipment, switch its visible and infrared field of view and view it in real time through the monitor, and realize simple tracking function through the image processing ***, after the second stage of the photoelectric intelligent platform is built, under the premise of ensuring the normal availability of servo function, a variety of target detection algorithms can be debugged on multifunctional edge computing ***, this paper uses the modular design concept to design, debug and implement the system in stages. Pay attention to the synchronous debugging of hardware and software functions of each module to ensure the stability of each module. Finally completed the design goals of each stage.
Deep neural networks(DNNs) have achieved remarkable success in diverse ***,it has been demonstrated that DNNs are very vulnerable to adversarial examples even in black-box settings.A large number of black-box attack m...
详细信息
ISBN:
(数字)9789887581536
ISBN:
(纸本)9781665482561
Deep neural networks(DNNs) have achieved remarkable success in diverse ***,it has been demonstrated that DNNs are very vulnerable to adversarial examples even in black-box settings.A large number of black-box attack methods have been proposed to in the ***,those methods usually suffer from low success rates and large query counts,which cannot fully satisfy practical *** this paper,we propose a hybrid attack method which trains meta adversarial perturbations(MAPs) on surrogate models and performs black-box attacks by estimating gradients of the *** method uses the meta adversarial perturbation as an initialization and subsequently trains any black-box attack method for several ***,the MAPs enjoy favorable transferability and universality,in the sense that they can be employed to boost performance of other black-box adversarial attack *** experiments demonstrate that our method can not only improve the attack success rates,but also reduces the number of queries compared to other methods.
This paper is concerned with the stabilization problem of linear time-invariant systems under Denial-of-Service(DoS)***,system matrices are unknown,and only some input-output trajectories collected from off-line exper...
详细信息
ISBN:
(数字)9789887581536
ISBN:
(纸本)9781665482561
This paper is concerned with the stabilization problem of linear time-invariant systems under Denial-of-Service(DoS)***,system matrices are unknown,and only some input-output trajectories collected from off-line experiments are ***,in the model-based case,it has been proven that systems equipped with a predictor-based state feedback controller achieve resilience against DoS ***,this is difficult or even impossible to be implemented in the absence of a system model,thus leading to resilient control challenging in the data-based *** maintain resilience against DoS attacks in the data-based case,a data-driven model predictive control(MPC) scheme is proposed such that future system input-output trajectories can be obtained by solving a data-dependent optimal *** this scheme,a data-driven resilient control strategy is developed such that the system achieves the same level of resilience of the DoS attacks as the model-based ***,a numerical example is given to validate the effectiveness of the proposed method.
*** Artificial intelligence(AI)is a rapidly growing field of technol-ogy,which“will enliven inert objects,much as electricity did more than a century *** that we formerly electrified will now cognitize”[1].AI advanc...
详细信息
*** Artificial intelligence(AI)is a rapidly growing field of technol-ogy,which“will enliven inert objects,much as electricity did more than a century *** that we formerly electrified will now cognitize”[1].AI advances are constantly pushing the frontier of what machines can *** attention is being placed on AI research,as well as its development and deployment by commer-cial investors,defense strategists,and policy makers[2].
This paper,from the view of a defender,addresses the security problem of cyber-physical systems(CPSs)subject to stealthy false data injection(FDI)attacks that cannot be detected by a residual-based anomaly detector wi...
详细信息
This paper,from the view of a defender,addresses the security problem of cyber-physical systems(CPSs)subject to stealthy false data injection(FDI)attacks that cannot be detected by a residual-based anomaly detector without other defensive *** detect such a class of FDI attacks,a stochastic coding scheme,which codes the sensor measurement with a Gaussian stochastic signal at the sensor side,is proposed to assist an anomaly detector to expose the FDI *** order to ensure the system performance in the normal operational context,a decoder is adopted to decode the coded sensor measurement when received at the controller *** this detection scheme,the residual under the attack can be significantly different from that in the normal situation,and thus trigger an *** design condition of the coding signal covariance is derived to meet the constraints of false alarm rate and attack detection *** minimize the trace of the coding signal covariance,the design problem of the coding signal is converted into a constraint non-convex optimization problem,and an estimation-optimization iteration algorithm is presented to obtain a numerical solution of the coding signal covariance.A numerical example is given to verify the effectiveness of the proposed scheme.
This article studies the time-varying formation (TVF) problem of multiagent systems (MASs) with different time delays. By designing the control protocol, the followers could achieve the desired TVF. Considering differ...
详细信息
暂无评论