The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The most methods to achieve flocking control of multi-agent systems take both position and speed information of all the multi-agents into the control laws. However, various factors and their magnitudes, related to mutual position difference vectors, between the multi-agents are neglected. In this paper, based on distributed observers, flocking control algorithms driven only by local position measurements...
In this paper, we propose a class of generalized flocking algorithms based on the Olfati-Saber's results for self-driving multi-agent networks by introducing some metric weighting matrix and leader-agent-related navigation-weighting coefficients, in which the multi-agents are also driven by distributed continuous-time control algorithms that are defined merely by local position and velocity measurements...
In this paper, we revisit the flocking control algorithms suggested by Olfati-Saber for the second-order multi-agent networks, in which the multi-agents are driven by the distributed algorithms installed on each and all agents that are based merely on local measurements of neighboring multi-agent position and velocity vectors. It has been shown in [1] that by under appropriate initial conditions about...
In this paper, we propose an alternative frequency-domain interpretation about bounded realness and norm evaluation in the linear time-invariant (or simply LTI) multi-variable continuous-time feedback configuration setting. The technique can be implemented numerically as well as geometrically by means of a class of generalized Nyquist loci without open-loop unstable pole distribution, locus orientation...
In this paper, we develop an alternative frequency-domain stability analysis technique for sampled-data systems with auxiliary continuous-time controllers, in addition to the discrete-time ones, which form a class of double-loop feedback configurations, by working directly on their s-domain return difference relationships. This method is independent of the lifted models and employs merely the s-domain...
In this report, firstly, the lifted models of sampled-data systems formed by connecting a generalized linear continuous-time, time-invariant subsystem (the control plant) is introduced. Then, an auxiliary continuous-time feedback is therefore attached. It is built with a linear discrete-time, time-invariant subsystem (the feedback controller) via a periodic sampler along with a holding apparatus....
In this paper, a novel visual activity recognition algorithm based on the depth contour image and nearest neighbor (NN) classifier is presented, where the depth contour image is acquired by solving algebraic matrix equations in terms of the newly-defined Spatial Motion Accumulative Image (SMAI) and Temporal Motion Accumulative Image (TMAI). More precisely, firstly, SMAI and TMAI are defined based...
This paper reports some Nyquist-type criteria for exponential/asymptotical stability in linear time-delayed systems of retarded type, by introducing contraposition seperators into the return difference ratio relationships in feedbacks. The Nyquist criteria present necessary and sufficient stability conditions, delays-dependent, which can be interpreted similarly and examined graphically as we do for...
A novel algorithm for the human activities recognition based on the Poisson images and via bidirectional two-dimensional principal component analysis (2DPCA) is presented in this note, where the Poisson images are defined by solving the Poisson equations to re-interpret the motion accumulation image (MAI). More precisely, firstly, object detection based on the Gaussian Mixture Model (GMM) is applied...
Information system is a combination of a series of modules and components. During the running of information system, some errors will happen, so how to express errors, locate errors source and fix errors becomes a vital issue in designing, developing, maintaining and integrating of information system. Firstly, the paper proves the weakness of huge information system by probability method, then briefly...
This paper presents a home-care system for recognizing six kinds of daily activities (including walk, jogging, in-place actions like standing, sitting and squat, stand-to-sit, stand-to-squat, and fall) from videos by a multi-SVM classifier with decision tree structure. The system first detects human blobs by a non-parameter background subtraction method, then extracts shape and motion features from...
Fall detection system for intelligent home care for elderly people is presented in this paper. The system includes human blob detection by non-parameter background substruction method, feature extraction from two minimum bounding boxes, and fall detection by a cascaded multi-SVM classifier. Besides falling down, other daily activities such as walk, jogging, sitting down, squatting down and immobility...
The paper analyzes the operation flows and functional requirements of city fire control and rescue system. According to the integrated characteristic of fire alarming, alarm responding, controlling, fire extinguishing, data archiving and other rescue processes, it establishes the fire control and rescue information system model based on network environment and puts forward the corresponding computer...
From the analysis of workflow instance relevant data (WIRD), and a modeling method of WIRD based on object Petri nets is proposed. The method dynamically constructs an access mechanism of WIRD, to guarantee the security of WIRD. Moreover, a version management mechanism of WIRD is adopted as well as a collaborative communication mechanism of concurrent tasks is established to solve the inconsistency...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.