The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper describes a real-time multi-vehicle motion planning (MVMP) algorithm for the emergency vehicle clearance task. To address the inherent limitations of human drivers in perception, communication, and cooperation, we require that the emergency vehicle and the surrounding normal vehicles are connected and automated vehicles (CAVs). The concerned MVMP task is to find cooperative trajectories...
Because sensor's and electrical techniques is progressing, some physiological instruments, like pulse oximeter oxygen saturation, electrocardiograph, body temperature, and heart rate monitor, have been developed as the wearable apparatuses. Now, the electrical blood pressure monitor all uses a cuff to measure the blood pressure. If the electrical blood pressure monitor wants to become a wearable apparatus,...
IEC 61850 is an international standard for digital substation automation systems based on network communication platform. It has been widely used in power generation, transmission, distribution and scheduling. The protocol implemented unified modeling for object, enhanced interoperability and interchangeability between different terminals. In this paper, we apply the protocol is to power and environment...
In this study, the resource blocks (RB) are allocated to user equipment (UE) according to the evolutional algorithms for long term evolution (LTE) systems. Particle Swarm Optimization (PSO) algorithm is one of the evolutionary algorithms, based on the imitation of a flock of birds foraging behavior through learning and grouping the best experience. Therefore, we propose a Simple Particle Swarm Optimization...
In mobile wireless sensor networks (MWSNs), each sensor has the ability not only to sense and transmit data but also to move to some specific location. Because the movement of sensors consumes much more power than that in sensing and communication, the problem of scheduling mobile sensors to cover all targets and maintain network connectivity such that the total movement distance of mobile sensors...
To allow collaborative robots to work efficiently and effectively with their human partners, one of the critical functions they need is to precisely and robustly recognize human intentions, i.e., what action they will perform next. In this paper, we present a Recurrent Convolutional Neural Networks (RCNN)-based system that is capable of recognizing a human intention much earlier than the intended...
This paper presents an application of the formal method to model and verifies the communication and control for a fleet of collaborative autonomous underwater vehicles (AUV) named as Eco-Dolphin. The fleet includes YellowDolphin, BlueDolphin, and RedDolphin, which are designed to collect environmental data and provide surveillance services in littoral water. The system architecture of the fleet is...
This article presents the application of novel S-shaped structure in peach-like UWB antenna with dual band notched characteristics. The S-shaped structure is composed by a square patch and two L-shaped slots with center symmetry. It has the advantage of small size, relatively long current path, and dual band-notched characteristics. The proposed antenna is simulated by using CST Microwave Studio to...
A fast wide-band algorithm that combines characteristic basis function method (CBFM) with Chebyshev approximation technique is presented to analyze PEC scattering problem over a broadband. To facilitate the analysis of electrically large targets, the CBFM is employed to substantially reduce the size of matrix equation. Further, the fast frequency sweeping can be realized by the Chebyshev approximation...
It has been shown that a gold-coated multi-walled carbon nanotube (Au/MWCNT) composite can improve the lifetime of electrical contacts significantly in low current switching applications. The composite surface with gold sputtered on vertically aligned CNTs, shows two levels of surface roughness that causes a variation of contact resistance across the surface. In this study a mathematical surface model...
This work presents a fully-integrated sub-GHz radio System on Chip (SoC) for Low-Power Wide-Area Networks (LPWAN) and Internet of Things (IoT) applications. The receiver (RX) achieves 77dB blocker rejection and −106dBm sensitivity at 50kbps. The transmitter (TX) features a Switched-Capacitor Power Amplifier (SCPA) that delivers 13.5dBm output power. To fulfil stringent Japanese emission regulation,...
Disease cost estimation is an important and challenging issue. It serves as the key factor of hospital cost and cost control. It has been a challenge to estimate the disease cost because of the complexity of the disease pathology, individual differences of treatment process, adverse drug reaction, and complications. Especially in some high risk and high noise diseases there is another challenge from...
Distributed renewable energy generations bring to attention the grid-connected inverter with LCL filter, whose control performance can be largely influenced by filter parameter variations. This paper has proposed a “comprehensive-loop-search, pattern-recognition, key-parameter-scan” method to evaluate the parameter variation influence, especially grid-side inductance and filter capacitance variation,...
We are in big data era, and have surrounded by many kinds of data, the interactions between data become more and more frequently, and this also brought about personal privacy issues. In reality, attackers can infer the user identity of the sensitive information by aggregating data from other sources. The leakage of privacy will bring inconvenience to the personal life, and even lead to loss of property...
Fuel and exhaust gas emission is one of the main causes of environmental pollution due to transportation. In the logistics distribution network, considering customer satisfaction and three-dimensional container loading restraint and energy consumption, a multiobjection optimization model of vehicle routing is constructed in this paper, which is complex NP-Hard problem. A novel hybrid particle swarm...
This paper presents a newly developed upper-body humanoid robot platform. The system has more than 52 degree of freedom (DOF), including two 7-DOF arms, two 15-DOF dexterous hands, a 3-DOF head, a 2-DOF waist and a 3-DOF mobile vehicle. To shorten development period and reduce cost, all the DOFs of the arms and the waist are designed with the modular joints. The two arms and two dexterous hands are...
In order to obtain the rainfall information in real time from navigation radar images, a method of identifying rainfall images and inverting rainfall intensity is proposed in this paper based on the relationship between the mean value of the echo intensity in occluded area and the rainfall. The radar image is identified by using the threshold from the original radar image which has been filtered out...
Nowadays, the problem of using minimum number of time slots for data aggregation such that sensors can work without data collision for data transmissions has received a great deal of attention in Wireless Sensor Network (WRSN). It is worth mentioning that there exists many approaches that are tried to reduce the number of time slots for data aggregation in WSNs. However, most of previous works are...
Because of the limited energies of sensors, efficient data gathering in wireless sensor network has been received a great deal of attention recently. To prolong the network lifetime, in this paper, we study the problem of scheduling a mobile sink to some specific nodes, termed anchor nodes in this paper, for data collection and reducing the energy consumption of data transmission. While considering...
Recently, the major challenge in the robustness evaluation of networks is to enhance the detecting the most critical nodes. Many researchers have studied the problem of detecting the list of attacked nodes, which are the number of failed nodes is maximum, in order to protect these nodes. However, there is no any previous works to consider the cost of attacks that the budget is limited is very practical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.