The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The recognition of the operations are important for the factories management. In the paper, we propose an operation action recognition method based on two wearable devices containing inertial sensors. A mobile solution that leverages wristbands to capture the motions of operations is comfortable for workers. We first design the features based on the physical parameters of operation actions. To systematically...
Frontier-based exploration is the most common approach to exploration, a fundamental problem in robotics. Laser scanner and Kinect have been widely used in robotic application for simultaneous localization and mapping (SLAM) separately. The paper proposes a method to combine the data from Kinect and laser scanner to perform a Frontier-based exploration SLAM. The 2 sensors will be installed facing...
Virtual world has been developed rapidly in the last decade. Immersive is an important indicator of the virtual world. Moreover, with the VR technology advanced these years, the immersive become more and more important. The realistic experience is a crucial aspect of the immersive of the virtual world. We have identified two problems made the virtual world less immersive nowadays: Discontinuity of...
Permanent Magnet Synchronous Motor (PMSM) as the key component of the Electric Vehicles (EVs), has numerous advantages over other synchronous motors. Fault diagnosis is essential to guarantee the safety and continuity of the operation for EVs. An undetected fault in the PMS M system may lead to high repair cost, or even catastrophic failure. Among lots of faults in the PMSM, the most serious are short...
In all the security issues in wireless sensor networks (WSNs), session key exchange is fundamental one with a great challenge. Owning to the semi-group property and one-way trapped characteristic of Chebyshev polynomials, an enhanced key exchange scheme based on Chebyshev chaotic map for WSNs was proposed in this paper. Our scheme aims at increasing the security of the session key between nodes. According...
Hierarchical routing protocol has the advantage of good scalability for WSN network. However classic hierarchical protocol such as LEACH has the energy hole problem. In this paper, a distributed clustering scheme based on neighborhood energy level is proposed to handle this issue. Our scheme dynamically adjust the cluster head selection probability by considering difference between the residual energy...
Optical Wavelength Division Multiplexing (WDM) networks based on fixed grid technology have exposed some questions, including wasting of bandwidth resources in multi-domain heterogeneous networks. Flexible grid technologies can provide end-to-end optical path according to the client flexibly and effectively. However, it is unpractical to deploy a one-time green-field flexible grid technologies subjected...
The virtual networking embedding (VNE) problem is a core issue in network virtualization. This is also a challenging problem as it contains different kinds of constraints, and its complexity becomes even higher in an online VNE problem with thousands of virtual network (VN) requests. In this paper, we proposed an ant colony system based VNE algorithm, called ACS-VNE, for the online VNE problem. The...
False data injection attack can bypass the bad data defense process in the power systems and affect the results of state estimation, so that the system security is in danger because of the wrong states obtained in the dispatch center. The traditional false data injection attack is based on the DC power flow model and has many limitations. In this paper, a global attack model and local attack model...
To allow collaborative robots to work efficiently and effectively with their human partners, one of the critical functions they need is to precisely and robustly recognize human intentions, i.e., what action they will perform next. In this paper, we present a Recurrent Convolutional Neural Networks (RCNN)-based system that is capable of recognizing a human intention much earlier than the intended...
In opportunistic networks, forwarding based protocols lead to a large amount of data flow to the highly connected nodes and unfairness of the nodes' traffic load, finally, it makes the highly connected nodes suffer congestion and results in the messages were discarded. To solve this problem, a congestion control algorithm based on Social Awareness is proposed in this paper. When choosing the next...
In the field of connectomics, neuroscientists seek to identify cortical connectivity comprehensively. Neuronal boundary detection from the Electron Microscopy (EM) images is often done to assist the automatic reconstruction of neuronal circuit. But the segmentation of EM images is a challenging problem, as it requires the detector to be able to detect both filament-like thin and blob-like thick membrane,...
Extended interaction oscillator (EIO) operated in the terahertz range puts greater demand on current density and brightness of electron beam. The pseudospark-sourced (PS) electron beam is an attractive candidate to drive such high frequency EIOs. The study of a THz EIO driven by a PS sheet electron beam is presented. This enables the advantages of a interaction circuit combined with the merits of...
In this paper, a matrix polynomial whose coefficients are matrices is first defined. Its predictive model, called as the Matrix Polynomial Predictive Model (MPPM), is then derived. When the loading matrices of a decomposed tensor in the Alternating Least Squares (ALS) are replaced by the predicted ones of the MPPM, a new ALS algorithm with the MPPM (ALS-MPPM) is proposed. Analyses show that the convergent...
A fuzzy-DMC control strategy based on T-S fuzzy model is proposed by combining fuzzy control and Dynamic Matrix Control (DMC) control. DMC controller is developed for each subsystem of T-S fuzzy model. In terms of fuzzy-control theory, each subsystem's control law and membership function can be used to synthetically calculate the whole control system's control law, which control the whole system....
We consider a D2D-enabled cellular network where user equipments (UEs) owned by rational users are incentivized to form D2D pairs using tokens. They exchange tokens electronically to "buy" and "sell" D2D services. Meanwhile the devices have the ability to choose the transmission mode, i.e. receiving data via cellular links or D2D links. Thus taking the different benefits brought...
A traveling wave tube (TWT) based on carbon nanotube (CNT) cold cathode is theoretically researched in this paper. A magnetic injection electron gun and helix slow-wave structure is adopted in the TWT. Simulation results show that the maximum output power of the CNT TWT can reach 54 W at 9.4 GHz with an input power of 50 mW, corresponding to the maximum gain of 30 dB, when the gyrating electron beam...
A gridded micro-focus X-ray electron gun based on carbon nanotube cathode has the advantages of small volume, clear imaging and high temporal resolution compared with the conventional X-ray source. An array of CNT bundle is simulated to reduce the electric field screening effects for achieving stable large current density. The gridded electron gun based on carbon nanotube cathode is simulated by three-dimensional...
The most important task for 3D assembly tolerance analysis is to check how the tolerances affect the quality or functionality of a product when the parts are assembled together. This paper presents the way 3D statistical tolerance analyses are implemented by integrating the unified Jacobian-Torsor model and Monte Carlo simulation techniques. To perform 3D statistical tolerance analysis, a unified...
In this paper, we extend the information-based approach to the signal-dependent interference problem and propose a new model for optimal waveform design in signaldependent interference. We assume that the target is finiteduration Gaussian signal and investigate the mutual information (MI) in signal-dependent interference and channel noise. Based on maximization of the mutual information and the energy...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.