The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The vision is considered the most important sense in humans, the visual field may be affected by various diseases or conditions that can even be congenital, resulting in a high percentage of people with visual problems, low vision to blindness. In the majority of cases can be corrected with conventional methods, however, if a suitable control could be prevented and up to early detection of various...
This study discusses a design method for controlling a dual-rate control system, where the sampling interval of the plant output is longer than that hold interval of the control input. Using the lifting technique, the dual-rate system is designed as a multi-input single-output single-rate system, where the sampling interval of the plant output is equivalent to the hold intervals of the control inputs...
Hands-off control (or sparse control) is a control that has a small support length that achieves a given control objective. In other words, hands-off control takes zero on a relatively long time duration. Recently, this idea is extended to distributed control for consensus, called distributed hands-off control. In this control, each agent uses hands-off control, which is a bang-off-bang control taking...
Recently, the major challenge in the robustness evaluation of networks is to enhance the detecting the most critical nodes. Many researchers have studied the problem of detecting the list of attacked nodes, which are the number of failed nodes is maximum, in order to protect these nodes. However, there is no any previous works to consider the cost of attacks that the budget is limited is very practical...
Fluid dynamics simulation is often repeated while changing conditions, and therefore we need to compare a large amount of results. In order to compare results under different conditions, it is effective to overlap the streamlines generated from each condition in a single 3D space. Streamline is a curved line which represents a wind flow. This paper presents a technique to automatically select and...
We model the behavior of a mobile agent as a random walk on a network, and derive the formula of the expected time until two random walkers meet on the basis of the spectral graph theory. The validity of the derived formula is confirmed by the comparison with simulation results. We believe that our work contributes to understanding the property of epidemic information dissemination, and designing...
Due to the simplicity of its implementation and the impressive performance, Extreme Learning Machine (ELM) has been widely used in applications of machine learning. However, there are two potential problems in ELM: 1) lack of an efficient method for minimizing error; 2) consideration of little inherent structural information about correlations among output components. To overcome those problems, this...
Cooperative localization with map matching has been shown to reduce Global Navigation Satellite System (GNSS) localization error from several meters to sub-meter level by fusing the GNSS measurements of four vehicles in our previous work. While further error reduction is expected to be achievable by increasing the number of vehicles, the quantitative relationship between the estimation error and the...
This paper deals with the problem of robust output regulation for a set of Quad-Rotors forming a geometric pattern. The proposed control strategy is based on sliding- modes techniques, and it is able to robustly regulate the corresponding Quad-Rotors positions and angles in the presence of some class of disturbances acting on the Quad-Rotors. The proposed regulation is composed by cascaded continuous...
Ever-increasing research effort has been dedicated to multi-group radio frequency identification (RFID) systems where all tags are partitioned into multiple groups, such as group-level queries, and multi-group missing tag detection. However, it is assumed in the existing work that all tags know their individual group IDs, which thus leaves group labeling problem unaddressed. To tackle the under-investigated...
Dempster-Shafer theory is a formal framework for reasoning and decision-making under uncertainty. A cornerstone in this formalism is Dempster's rule, which provides a mechanism for combining belief functions representing independent pieces of evidence. This rule has been used extensively in information fusion applications. In this paper, we consider the situation where several agents are located at...
The purpose of the simulation performed in this study was to assess the requirements for a point-of-care (POC) bedside robot for patient education and emotional care; the simulation also facilitates defining the essential elements and functions of a robot before robot system development. The major functionalities evaluated in the simulation were: 1) bidirectional video system; 2) support system of...
The human operator is an important factor to design UGV(unmanned ground vehicle). In this paper, we present a colored Petri-net based simulation model to order to assess the UGV operator workload of VACP (visual, auditory, cognitive, psychomotor) in the operation of UGV. Further some experimental results are shown.
Unmanned Aerial Vehicles (UAVs) are expected to be used everywhere to provision different services and applications, impacting different aspects of our daily lives. Basically, UAVs are characterized by their high mobility. Some may remain motionless for a specific time to perform pre-programmed missions. Whilst UAVs would be used for specific applications, they could additionally offer numerous IoT...
Infrastructure as a Service (IaaS) providers typically offer multiple service classes to deal with the wide variety of users adopting this cloud computing model. In this scenario, IaaS providers need to perform efficient admission control and capacity planning in order to minimize infrastructure costs, while fulfilling the different Service Level Objectives (SLOs) defined for all service classes offered...
In this paper, an optimal law based improved reset control strategy is developed to control the track-following problems in HDDs whose model includes external disturbances. The proposed method combines an optimal PID control approach with a pre-specified time based reset control technique and makes possible to eliminate the tracking error in a finite time. To demonstrate the performance and effectiveness,...
In the huge information systems, various problems, such as latency, processing bottlenecks and synchronization of the entire system, must be solved in order to realize a dependable and safe system. Small World Network allows communication between arbitrary nodes, where hopping over a small number of nodes is possible in a network with a huge number of nodes. In this paper, our aim is to introduce...
Wireless sensor networks (WSNs) and other monitoring systems often use sensors of multiple strengths within the same network. This information is lost when the network is modeled by a typical non-weighted graph. We introduce the mixed-weight open locating-dominating set (mixed-weight OLD-set), an extension of the open locating-dominating set, that allows vertices in the graph to have different weights...
In this paper, new constructions of variable-rate quasi-cyclic low-density parity-check (QC-LDPC) codes are proposed. The criteria which guarantee that a higher-rate QC-LDPC code can be obtained by adding column-blocks to or removing row-blocks from the parity-check matrix of a given lower-rate QC-LDPC code are derived. Based on these criteria, new families of variable-rate QC-LDPC codes can be constructed...
In This paper we are presenting a bidirectional DC-DC converter is also known as dual active bridge (DAB) dc-dc converter. We presented a Z-source with bidirectional dc-dc converter by reducing the switching count by adding the passive elements we are improving the output voltage level, Comparing with the traditional bidirectional dc-dc converter, the proposed converter has an wider regulation range...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.