Mastering rail degradation is of great importance for railway infrastructure managers estimating the service and residual life of rails, making rational decisions about maintenance and repair to ensure the safety of t...
详细信息
Real time bidding (RTB) is emerged with the rapid development and integration of Internet and big data, and it has become the most important business model for online computational advertising. In RTB-based advertisin...
详细信息
Real time bidding (RTB) is emerged with the rapid development and integration of Internet and big data, and it has become the most important business model for online computational advertising. In RTB-based advertising markets, Demand Side Platforms (DSPs) aim to help the advertisers buy ad impressions matched with their target audiences. Due to the existence of discount rate, the advertising effect may be diminished when displaying the advertisements multiple times to the same target audience. As such, frequency capping is widely considered as a crucial issue faced by most advertisers. In this paper, we mainly consider the frequency capping problems in RTB advertising markets, and establish a two-stage optimization model for advertisers and DSPs. Utilizing the computational experiment approach, we design two experiments to validate our model. The experimental results show that under different discount rates, the optimal frequency caps are different. Moreover, when considering all the discount rates, there exists an optimal frequency cap, at which the expected maximum revenue can be obtained in the long run.
This paper presents an imaging method for 360-degree panoramic view based on four wide angle cameras. In order to complete the image mosaic, all the parameters such as focal length, principal point and distortion coef...
详细信息
This paper studies a coordinated transportation problem of a group of unmanned ground vehicles(UGVs). These ground vehicles belong to two categories: master vehicles and slave vehicles. A two-step strategy is proposed...
详细信息
ISBN:
(纸本)9781467374439
This paper studies a coordinated transportation problem of a group of unmanned ground vehicles(UGVs). These ground vehicles belong to two categories: master vehicles and slave vehicles. A two-step strategy is proposed to solve this problem. First, let the master vehicles move along ideal trajectories. Then, let the slave vehicles move into the area surrounded by master vehicles and move together with them. By the two-step strategy, the coordinated transportation problem is divided into a tracking problem and a containment problem. A P In-type tracking protocol and a P In-type containment protocol(P and I stand for Proportion and Integration, respectively;Inimplies that the protocol includes high-order integral terms) are proposed to solve these two problems. It is proved that the coordinated transportation problem can be solved by two proposed protocols with proper parameters if for each follower there exists at least one leader which has a directed path to this follower. Finally, a simulation example is presented to demonstrate the effectiveness of the proposed algorithms.
In this paper, we propose a time division multiple access(TDMA) based protocol that works on slightly modified IEEE802.15.4 network in star topology for secured and unsecured low latency deterministic networks(LLDN) f...
详细信息
ISBN:
(纸本)9781467374439
In this paper, we propose a time division multiple access(TDMA) based protocol that works on slightly modified IEEE802.15.4 network in star topology for secured and unsecured low latency deterministic networks(LLDN) for industrial controlsystems. This protocol ensures total superframe time as low as ten milliseconds as compared to minimum possible superframe time of 15.36 milliseconds. In these networks, Each end device transmits its data frame in their allotted timeslot. The timeslot and inter timeslot spacing is optimized for channel bandwidth utilization and reliable data frame exchange. While this TDMA based protocol eliminates the risk of frame collisions to great extent, MAC sub-layer tweaking improves the non-determinism of the network and increases its bandwidth efficiency. We also investigate the security impact on the performance of LLDN. A mathematical model is developed that takes empirical values as input and predicts the worst case arrival times of network devices at coordinator. Experiments were conducted to evaluate the suggested protocol and mathematical model.
This paper presents a novel approach on swimming performance improvement for a bio-inspired robotic fish. The main idea of this approach lies in optimizing the oscillator phase differences of a central pattern generat...
详细信息
ISBN:
(纸本)9781467396769
This paper presents a novel approach on swimming performance improvement for a bio-inspired robotic fish. The main idea of this approach lies in optimizing the oscillator phase differences of a central pattern generator (CPG) model, which governs the rotation of the joints. Definitely, the swimming performance includes steady forward velocity, head stability, and energy-efficiency. A dynamic model is firstly built to describe the swimming motion of the robotic fish. Taking advantage of the dynamic model, we analyze the influence on the swimming performance exerted by the phase differences. Specifically, two conditions are studied and compared together: consistent and inconsistent phase differences. To the best of our knowledge, this issue has not been addressed in previous literature sufficiently. The optimal swimming performance is searched under both of the conditions. Simulation results reveal that the CPG model with inconsistent phase differences is able to realize better swimming performance, especially for head stability and energy-efficiency.
This paper is concerned with the distributed fusion estimation problem for linear system observed by multirate sensors in the environment of wireless sensor networks(WSNs). Rates of the sampling, estimation, transmiss...
详细信息
ISBN:
(纸本)9781467374439
This paper is concerned with the distributed fusion estimation problem for linear system observed by multirate sensors in the environment of wireless sensor networks(WSNs). Rates of the sampling, estimation, transmission in the WSNs are different. The distributed fusion estimation is composed of two stages. At the first stage, every sensor in the WSNs collects measurements of its own to generate a local estimation, then the local estimations from the neighboring sensors and the neighbour's neighbor sensors are further collected to form the fusion estimation at the second stage. The main result is that a distributed fusion estimation algorithm is presented which is simple and low energy consumption. The performance, namely, the effectiveness and the stability of the algorithm under multiple sensors, is analyzed. A numerical example is given to show the feasibility and effectiveness of the presented algorithm.
The percutaneous coronary interventions (PCI) require complex operating skills of the interventional devices and make the surgeons being exposed to heavy X-ray radiation. Accurate delivery of the interventional device...
详细信息
ISBN:
(纸本)9781479969241
The percutaneous coronary interventions (PCI) require complex operating skills of the interventional devices and make the surgeons being exposed to heavy X-ray radiation. Accurate delivery of the interventional devices and avoiding the radiation are especially important for the surgeons. This paper presents a novel dedicated dual-finger robotic hand (DRH) and a console to assist the surgeons to deliver the interventional devices in PCIs. The system is designed in the master-slave way which helps the surgeons to reduce the exposure to radiation. The mechanism of the DRH is bio-inspired and motions are decoupled in kinematics. In PCI procedures, the accuracy of the guidewire delivery and the catheter tip placement have significant effects on the surgical results. The performances of the DRH in delivering the guidewire and the balloon/stent catheter were evaluated by three surgical manipulations. The results show that the DRH has the ability to deliver the guidewire and the balloon/stent catheter precisely.
This paper is concerned with data-driven methods for virtual reference controller design of high-order nonlinear systems via neural network. Virtual reference feedback tuning (VRFT) is a one-shot direct data-based met...
详细信息
ISBN:
(纸本)9781479919611
This paper is concerned with data-driven methods for virtual reference controller design of high-order nonlinear systems via neural network. Virtual reference feedback tuning (VRFT) is a one-shot direct data-based method to design controller of linear or nonlinear systems. In this paper, we recall the model reference control problem of high-order nonlinear systems and design a new objective function of VRFT. In ideal conditions, the two problems are demonstrated to have the same solution. For the first time, we prove that the value of the optimization problem for model reference control is bounded by that of the objective function of VRFT. A three-layer neural network is employed as a general approximator of the designed controller and two simulations are given to verify the validity of our method.
Constructing topic hierarchies from the data automatically can help us better understand the contents and structure of information and benefit many applications in security informatics. The existing topic hierarchy co...
详细信息
ISBN:
(纸本)9781467384940
Constructing topic hierarchies from the data automatically can help us better understand the contents and structure of information and benefit many applications in security informatics. The existing topic hierarchy construction methods either need to specify the structure manually, or are not robust enough for sparse and noisy social media data such as microblog. In this paper, we propose an approach to automatically construct topic hierarchies from microblog data in a bottom up manner. We detect topics first and then build the topic structure based on a tree combination method. We conduct a preliminary empirical study based on the Weibo data. The experimental results show that the topic hierarchies generated by our method provide meaningful results.
暂无评论