The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The past few years have seen an exponential growth in data collection capabilities. Unfortunately, the ability to process this vast amount of data has not kept pace with this growth. Taking full advantage of these increased capabilities requires scalable, computationally efficient algorithms to timely and robustly extract actionable information from the very large data sets generated by the sensors...
Sun tracker is an automatic device that steers a PV array perpendicular to the solar irradiation, improving power output up to one-third. However, its feedback control is lack of accurate angle measurement that degrades the overall performance. A type of irradiation angle sensors is proposed in which the pyramid structure generate some currents containing the information of irradiation angle. To extract...
Mobile Terminal Crowd Sourcing provides social network information and services for users through data processing and data mining. Intelligent engine provides recommendation based on historical information and real-time environment, which are primarily used in intelligent life, mobile social networking, and other fields. Firstly, the concept of intelligent engine is introduced, the research strategy...
The task of determining informative sensors and clustering the sensor measurements according to their information content is considered. To this end, the standard canonical correlation analysis (CCA) framework is equipped with norm-one and norm-two regularization terms to estimate the unknown number of field sources and identify informative groups of sensors. Coordinate descent techniques are combined...
Traditional input shaping filters are linear mappings between reference input and system input. These filters are often unnecessarily conservative with respect to input and output bounds if multiple references with different amplitudes are applied. This conservatism is due to its offline design and linear mapping. This paper presents an online input prefilter design approach to overcome this conservatism...
There are numerous methods for controlling unwanted vibration in machines. One possible approach is to design reference command profiles that move the system without inducing significant residual vibration. Many approaches have been proposed for designing such low-vibration commands. Some of these methods design the command profiles by minimizing the residual energy, while others minimize the residual...
Automatic cell sorting and isolation for recovery of such live cells, mostly microorganisms, is a challenging task. Lab-on-a-chip devices implemented as cell arrays are used for this purpose. For an abstract model of the problem, we can assume the cell array to be represented by a matrix where each cell can be any of the three types: empty, good (or desired) and bad (or undesired). The problem is...
The main objective of sensor deployment problem in Wireless Sensor Network (WSN) is to use minimum number of sensor nodes with given sensing range that can cover any target in the coverage area to monitor the environment. The optimal sensor deployment enables accurate sensing information on target behavior with minimum sensing range and number of sensor nodes. The target coverage terrain in a locality...
To resolve the problem of traditional lifetime, target coverage and network connectivity, a novel algorithm for selecting the optimal coverage set based on improved particle swarm optimization algorithm (PSOA) is proposed. There are two competing objectives presented to determine where to place the sensor nodes, the coverage rate and the number of working nodes. And then As another new contribution,...
To observe occurrences of an event in a discrete event system, a sensor must be placed and activated. Both placement and activation incur costs. Assuming sensors have been placed, to minimize costs, one would like to minimize the activation of the sensors. In this paper, an online algorithm is developed to minimize sensor activation. The discrete event system under consideration is modeled by a finite...
This paper firstly introduced the basic idea of task requirement driven sensor management (TRDSM) and analyzed the task requirement of target tracking. Then, a new approach is proposed to deal with the multi-sensor management problem. The new method uses centralized management model to control sensors and the method comprehensively considers target priority and sensor usage cost. Then, sensors resource...
In cognitive radio systems, secondary users can be coordinated to perform cooperative spectrum sensing to overcome the hidden terminal problem. However, when the number of cooperative users tends to be very large, too many cooperative users will make the whole sensing time intolerantly long and huge consumption of system resource. In this paper, we studied optimal number of secondary users in cooperative...
This paper describes hardware implementation of optimization technique based sensorless MPPT (maximum power point tracking) method for grid-connected PV (photovoltaic) generation system. A DC-DC converter has been used to step-up the PV system voltage. Optimization technique (Simplex) has been implemented to optimize the current and voltage controller gain parameters. Optimization of duty ratio increment...
Brain-computer interfaces (BCI) are emerging as a powerful tool for providing an alternative way of communication and environment control to severely disabled people. Among these systems, P300-based BCIs are widely diffused as they are easy to manage and do not require a training for the subjects. These systems, however, are still too slow so that they are actually used only by those patients that...
Hopping sensors are a type of low cost mobile sensors that are small in size, have limited capability and imprecise movement. However, their unique method of movement makes them suitable for rugged terrains. Sensors may fail when deployed in a rugged terrain or in an obstacle-abundant environment. Therefore, redundant sensors may be identified and relocated to the sensor holes. This paper addresses...
Many applications of wireless sensor networks (WSNs) require location information of the randomly deployed nodes. A common solution to the localization problem is to deploy a few special beacon nodes having location awareness, which help the ordinary nodes to localize. In this approach, non-beacon nodes estimate their locations using noisy distance measurements from three or more non-collinear beacons...
Recent study reveals that great benefit can be achieved for data gathering in wireless sensor networks by employing mobile collectors that gather the data via short-range communications. To pursue maximum energy saving at sensor nodes, intuitively, a mobile collector should traverse the transmission range of each sensor in the field such that the transmission of each packet can be constrained to a...
Optimization methods have been developed by many researchers. Especially, the methods based on evolutionary algorithms (EAs) have received increased attention from diversity fields. Recently, bacterial foraging algorithm mimicked bacterial behavior has been introduced by Passino. However, his work did not implement an important bacterial behavior regulating division so-called dasiaquorum-sensingpsila...
We present a general scheme for testing multiagent systems, respectively policies used by them, for unwanted emergent behavior using learning of cooperative behavior via particle swarm systems. By using particle swarm systems in this setting, we are able to create agents interacting/attacking the tested agents that can use parameterised high-level actions. We also can evaluate the quality of an attack...
This paper introduces a new consensus protocol whose features are different from known consensus protocols available in the literature. The relation between discrete coverage algorithms over a convex polygon for solving a facility location problem (n-median problem) along with some notions in agreement over acyclic digraphs have been used to establish a novel constrained consensus protocol. Its convergence...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.