The soft continuum arm has extensive application in industrial production and human life due to its superior safety and flexibility. Reinforcement learning is a powerful technique for solving soft arm continuous contr...
详细信息
The soft continuum arm has extensive application in industrial production and human life due to its superior safety and flexibility. Reinforcement learning is a powerful technique for solving soft arm continuous control problems, which can learn an effective control policy with an unknown system model. However, it is often affected by the high sample complexity and requires huge amounts of data to train, which limits its effectiveness in soft arm control. An improved policy gradient method, policy gradient integrating long and short-term rewards denoted as PGLS, is proposed in this paper to overcome this issue. The shortterm rewards provide more dynamic-aware exploration directions for policy learning and improve the exploration efficiency of the algorithm. PGLS can be integrated into current policy gradient algorithms, such as deep deterministic policy gradient(DDPG). The overall control framework is realized and demonstrated in a dynamics simulation environment. Simulation results show that this approach can effectively control the soft arm to reach and track the targets. Compared with DDPG and other model-free reinforcement learning algorithms, the proposed PGLS algorithm has a great improvement in convergence speed and performance. In addition, a fluid-driven soft manipulator is designed and fabricated in this paper, which can verify the proposed PGLS algorithm in real experiments in the future.
The accurate prediction of behaviors of surrounding traffic participants is critical for autonomous vehicles (AV). How to fully encode both explicit (e.g., map structure and road geometry) and implicit scene context i...
详细信息
The accurate prediction of behaviors of surrounding traffic participants is critical for autonomous vehicles (AV). How to fully encode both explicit (e.g., map structure and road geometry) and implicit scene context information (e.g., traffic rules) within complex scenarios is still challenging. In this work, we propose an implicit scene context-aware trajectory prediction framework (the PRISC-Net, Prediction with Implicit Scene Context) for accurate and interactive behavior forecasting. The novelty of the proposed approach includes: 1) development of a behavior prediction framework that takes advantage of both model- and learning-based approaches to fully encode scene context information while modeling complex interactions;2) development of a candidate path target predictor that utilizes explicit and implicit scene context information for candidate path target prediction, along with a motion planning-based generator that generates kinematic feasible candidate trajectories;3) integration of the proposed target predictor and trajectory generator with a learning-based evaluator to capture complex agent-agent and agent-scene interactions and output accurate predictions. Experiment results based on vehicle behavior datasets and real-world road tests show that the proposed approaches outperform state-of-the-art methods in terms of prediction accuracy and scene context compliance. IEEE
A C2 computing framework for unmanned systems to perform complex tasks is proposed using methods of system of systems engineering, which is formed by combining the macro-scale command and control (C2) process mechanis...
详细信息
A C2 computing framework for unmanned systems to perform complex tasks is proposed using methods of system of systems engineering, which is formed by combining the macro-scale command and control (C2) process mechanism model (PREA loop) and micro-scale C2 process mechanism model (OODA loop). Guided by PREA loop and OODA loop, the computing framework is divided into four steps and three kinds of transformations. The four steps are design, construction, operation monitoring, and assessment. The three transformations are tactical feedback, campaign feedback, and strategic feedback. A C2 organization model of joint landing combat force is established against the background of a typical complex task of joint landing operation, and the C2 computing framework based on the PREA &OODA is used to implement the C2 activities of the joint landing combat force. The influence of the computing framework on the performance of unmanned systems under different task conditions is verified, including task coordination load, task efficiency and sensitivity of unmanned systems response. Authors
作者:
Shevlyagina, SvetlanaFar Eastern Federal University
Laboratory of Control System the Technological Processes Institute of Automation and Control Processes FEB RAS Department of Computer-Integrated Production Systems Vladivostok Russia
An alternative end product quality control system is proposed for an industrial plant involving a sequence of distillation columns using a multivariable model predictive control (MPC) approach. The latter was realized...
详细信息
With the collaboration of several intelligent services, a crowd intelligence service network has been formed, and a service ecosystem has gradually emerged. As a novel service organization model, the Service Ecosystem...
详细信息
Pseudo supervision is regarded as the core idea in semi-supervised learning for semantic segmentation, and there is always a tradeoff between utilizing only the high-quality pseudo labels and leveraging all the pseudo...
详细信息
The mining sector historically drove the global economy but at the expense of severe environmental and health repercussions,posing sustainability challenges[1]-[3].Recent advancements on artificial intelligence(AI)are...
详细信息
The mining sector historically drove the global economy but at the expense of severe environmental and health repercussions,posing sustainability challenges[1]-[3].Recent advancements on artificial intelligence(AI)are revolutionizing mining through robotic and data-driven innovations[4]-[7].While AI offers mining industry advantages,it is crucial to acknowledge the potential risks associated with its widespread ***-reliance on AI may lead to a loss of human control over mining operations in the future,resulting in unpredictable consequences.
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are qu...
详细信息
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are quantized before transmission.A specific type of perfect stealthy attack, which meets certain rather stringent conditions, is taken into account. Such attacks could be injected by adversaries into both the sensor-toestimator and controller-to-actuator channels, with the aim of disrupting the normal data flow. For the purpose of defending against these perfect stealthy attacks, a novel scheme based on watermarks is developed. This scheme includes the injection of watermarks(applied to data prior to quantization) and the recovery of data(implemented before the data reaches the estimator).The watermark-based scheme is designed to be both timevarying and hidden from adversaries through incorporating a time-varying and bounded watermark signal. Subsequently, a watermark-based attack detection strategy is proposed which thoroughly considers the characteristics of perfect stealthy attacks,thereby ensuring that an alarm is activated upon the occurrence of such attacks. An example is provided to demonstrate the efficacy of the proposed mechanism for detecting attacks.
Stereo vision plays a crucial role in scientific expeditions and facility maintenance. However, fixed-baseline stereo vision lacks accuracy for long-distance measurements, while wide-baseline stereo vision encounters ...
详细信息
The accurate and efficient vessel draft reading (VDR) is an important component of intelligent maritime surveillance, which could be exploited to assist in judging whether the vessel is normally loaded or overloaded. ...
详细信息
暂无评论