The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Driver-in-the-loop and different human-machine goal consistency should be considered when designing driver-AFS interactive steering control system. In this paper, a novel design approach, namely dynamic game theory is used for the modelling of shared steering control between driver and AFS. Linear Quadratic dynamic optimization approach is used to derive the non-cooperative Nash, non-cooperative Stackelberg,...
Lane keeping assistance is an important lateral control technology of autonomous driving system. A large number of autonomous steering control methods were given to deal with path-following and lane keeping problems by controlling steering wheel angle directly. In this paper, however, a linear time-varying model predictive control (LTV-MPC) method for path-following manipulating is proposed based...
This paper presents a very simple and efficient algorithm to estimate 1, 2 or 3 orthogonal vanishing point(s) on a calibrated image in Manhattan world. Unlike the traditional methods which apply 1, 3, 4, or 6 line(s) to generate vanishing point hypotheses, we propose to use 2 lines to get the first vanishing point v1, then uniformly take sample of the second vanishing point v2 on the great circle...
In this paper, we present an efficient edge chain detection algorithm by applying the Helmholtz principle on the gradient magnitude map of an image. An edge chain validation method is proposed which uses the “relative number of false alarms” (RNFA) instead of the traditional “number of false alarms” (NFA). The edge chains are detected first and then validated according to their RNFA values. In this...
The low density signature (LDS) technique which is able to support massive connectivity with non-orthogonal low density signatures is a promising multiple access (MA) scheme in future 5G systems. We firstly examine the theory of evidence to illustrate the weakness of the update rule for the message passing algorithm in LDS detection process. The combination results against the common sense (RACS)...
In this study, an integrated multidimensional nano-flow liquid chromatography platform was established with the combination of peptide separation via online SCX, and successfully applied for proteome analysis. By this platform, peptides were first separated by a SCX microcolumn under a series of salt steps, separated by nano-reversed phase liquid chromatography, and finally identified by ESI-MS/MS...
Superpixels are an oversegmentation of an image and popularly used as a preprocessing in many computer vision applications. Many state-of-the-art superpixel segmentation algorithms rely either on minimizing special energy functions or on clustering pixels in the effective distance space. While in this paper, we introduce a novel algorithm to produce superpixels based on the edge map by utilizing a...
Text detection in complex real images, such as panorama images, remains great challenging in Computer Vision. A general method often focuses on the small test images with single background which makes it easier to do the detection and recognition. In this paper, we find a novel approach, as it can automatically deal with the indoor panorama images which contains distortion and illumination problems...
Detection of multi-manipulated image has always been a more realistic direction for digital image forensic technologies, which extremely attracts interests of researchers. However, mutual affects of manipulations make it difficult to identify the process using existing single-manipulated detection methods. In this paper, a novel algorithm for detecting image manipulation history of blurring and sharpening...
We design and implement a secure and reliable VPN networking model on the basis of studying of VPN network. This model uses a digital certificate authentication and an AES encryption to transfer data, and has the function of anti-replay attack. Tests show that the model supports a variety of network protocols and go through the network equipment, which is suitable for the needs of network development.
Evidence shows that non-enzymatic glycation plays an important role in the development of diabetes, diabetes-related complications and neurodegenerative diseases. Mass spectrometric methods have been used for non-enzymatic glycation of proteins. At present, CID remains the major fragmentation method for peptide sequencing. In this study, we utilized synthesized peptide models to study fragmentation...
This paper presents an advanced model of a brushless dc motor(BLDCM) control system for the electric power steering(EPS) applications considering the suppression of torque ripples. All modules of the EPS system with a BLDCM are modeled under the Matlab/Simulink environment. Among them, the DSP module and the back-EMF module are achieved by the C MEX S-function. The DSP module can output six PWM signals...
The modular designed by robotic platform for pluggable. The circuit module connected via CAN bus can reduce the complexity of the robot control system design and increase the reliability and flexibility. Robot platform uses a distributed circuit control structure based on the 32-bit ARM Cortex-M3 development of STM32 series chips, which could meet the actual needs by adding modules, such as wireless...
Compared with logistics of ordinary things, Chemical Logistics is flammable, explosive, toxic and corrosive and other characteristics. Storage and transport of specialty chemicals has inevitably brought a series of serious problems and potential problems because of its particularity, so the safety of chemical logistics management is very important. How to achieve real-time monitoring chemical logistics...
Human ear has been long proved to be a promising candidate for personal identification. Human ear, with its 3D structure stability and detail expressive, has drawn researchers' attention recently. The posture of ear always changes to the motion of head, it is necessary to normalize an ear to a standard posture to ensure the accuracy of feature extraction. This paper proposed a new coordinate direction...
Trusted computing has become a new and challenging research issue in the field of information security. To further enhance the safety of BIOS, we construct a trusted computing platform based on extensible firmware interface (EFI), the trust chain is transferred from the first stage of EFI to the operating system by applying TPM (trusted platform module) and TSS (TCG software stack). We presented the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.