The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the advent of sequencing technology, numerous gene expression data are generated. Identifying differentially expressed genes play an important role in the gene therapy of cancer patients. As an useful mathematical tool, nonnegative matrix factorization (NMF) has been successfully used for identifying differentially expressed genes. In this paper, a novel method named robust graph regularized...
We study bribery resistance properties in two classes of reputation-based ranking systems, where the rankings are computed by weighting the rates given by users with their reputations. In the first class, the rankings are the result of the aggregation of all the ratings, and all users are provided with the same ranking for each item. In the second class, there is a first step that clusters users by...
In robotics, non-linear least squares estimation is a common technique for simultaneous localization and mapping. One of the remaining challenges are measurement outliers leading to inconsistency or even divergence within the optimization process. Recently, several approaches for robust state estimation dealing with outliers inside the optimization back-end were presented, but all of them include...
Local community detection (or local clustering) is of fundamental importance in large network analysis. Random walk based methods have been routinely used in this task. Most existing random walk methods are based on the single-walker model. However, without any guidance, a single-walker may not be adequate to effectively capture the local cluster. In this paper, we study a multi-walker chain (MWC)...
In this paper the reaching law approach to designing sliding mode controllers is used. In particular, the case of switching variable of relative degree r > 1 is considered. It is demonstrated, that the use of such a variable allows more freedom in designing the controller and can result in reducing the maximum absolute value of the control signal without compromising the robustness with respect...
This paper proposes a new continuous terminal sliding mode guidance law for three-dimensional missile guidance system under maneuvering target with consideration of second-order autopilot dynamics. The proposed guidance law not only guarantees the azimuth rate and elevation rate of guidance system converge to zero in finite time but also ensures the continuity of control action. Simulations of a practical...
This paper presents the cascaded PI-continuous second order sliding mode control for induction motor in the presence of operational constraints. The inner-loop Sliding Mode Control (SMC) is designed to control the current dynamics of the motor while the outer-loop control is the PI control of speed. The main advantages of the proposed method are that the PI control provides reference to inner-loop...
In this paper, the problem of target localization in the presence of outlying sensors is tackled. This problem is important in practice because in many real-world applications the sensors might report irrelevant data unintentionally or maliciously. The problem is formulated by applying robust statistics techniques on squared range measurements and two different approaches to solve the problem are...
This paper presents a stabilizing model predictive control (MPC) algorithm based on the off-line computation of sequence of 1-step controllable sets for linear parameter varying systems and a parameter learning technique that improves its performance. The presented MPC algorithm guarantees non-monotone convergence towards a suitably chosen terminal set regardless of the system parameters, while the...
This paper presents a generalized iterative learning control (ILC) design in the frequency domain with experimental validation. The optimal ILC learning function and robustness filter function are simultaneously optimized by solving a linear programming problem using frequency response functions. Moreover, the design realizes an optimal trade-off between robust convergence, converged tracking performance,...
This paper presents a new control methods based on a novel reaching law to overcome slow convergence rate and severe chattering in sliding mode control of permanent magnet synchronous motors (PMSM). The constant reaching law converges slowly during large systematic errors. Although the power reaching law converges fast during large error, it chatters severely while approaching to the sliding surface...
Triangulation is a fundamental task in 3D computer vision. Unsurprisingly, it is a well-investigated problem with many mature algorithms. However, algorithms for robust triangulation, which are necessary to produce correct results in the presence of egregiously incorrect measurements (i.e., outliers), have received much less attention. The default approach to deal with outliers in triangulation is...
In this paper, we aim to improve the overall performance of kernel adaptive filters by adaptively combining several component filters with different parameters setting in the practical applications. The convex combination scheme is exploited to incorporate any two parallel diversity branches which could be the component filter or the output of previous combination layer. The proposed convex combination...
We present a robust algorithm for personalizing a spheremesh tracking model to a user from a collection of depth measurements. Our core contribution is to demonstrate how simple geometric reasoning can be exploited to build a shape-space, and how its performance is comparable to shape-spaces constructed from datasets of carefully calibrated models. We achieve this goal by first reparameterizing the...
Applications of compressive sensing (CS) theory involve recovering sparse signals by solving ℓ1 norm regularized objective functions. Due to discontinuity of ℓ1-norm, usage of gradient based algorithm for reconstruction of sparse signals is not possible. Different smooth surrogate functions have been used to approximate ℓ1 norm. This article presents a performance comparison of two such surrogate...
This paper presents the practical implementation of a new robust third order sliding mode controller for an electropneumatic actuator with a predefined convergence time. The controller robustness is discussed with respect to external disturbances. Implementation results on an electropneumatic actuator setup show the effectiveness of the controller.
To improve the performance of the bearingless induction motor (BIM) under disturbances, a nonsingular fast terminal sliding mode control (NFTSMC) strategy is proposed. The sliding mode surface is designed as a combination of linear sliding mode and nonsingular terminal sliding mode. Besides, considering the power function of the state variables, which make the approaching speed correlate with the...
Digital predistortion (DPD) is an effective power amplifier (PA) linearization technique improving the system energy efficiency. At this point, real-time DPD adaptation is still an open issue due to the high computational complexity during the coefficients estimation procedure. Online censoring approach, which is effective in reducing the redundant data samples, can be applied in the DPD coefficients...
Most of the times Wireless Sensor Networks (WSNs) operate in hostile and unattended network environments, which makes the nodes vulnerable to node misbehaviour attacks. The applicability of conventional security methods, such as authentication, encryption and cryptography, to counter node misbehaviour attacks is debatable due to their incapability and involved cost. Trust aware secure mechanisms provide...
Radial Basis Function(RBF) mesh deformation method has been widely used in CFD simulations with moving boundaries due to its high robustness and accuracy. The original implementation of the RBF mesh deformation method in OpenFOAM(a widely used CFD software) is purely serial with relatively low computational performance. To reduce the time cost of the mesh motion in large-scale simulations, this paper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.