The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a method for visual pose stabilization of Fotokite, a tethered small unmanned aerial system, using a forward facing monocular camera. Conventionally, Fotokite stabilizes itself only relative to its tether and not relative to the global frame. It is, therefore, susceptible to environmental disturbances (especially wind) or motion of its ground station. Related work proposed visual...
This paper proposes a novel architecture for control systems of modular reconfigurable robots that combines centralized and decentralized approaches to achieve the best ration between efficiency, fault-tolerance and cost-efficiency.
According to the new Tor network (6.0.5 version) can help the domestic users easily realize "over the wall", and of course criminals may use it to visit deep and dark website also. The paper analyzes the core technology of the new Tor network: the new flow obfuscation technology based on meek plug-in and real instance is used to verify the new Tor network's fast connectivity. On the basis...
With the extensive applications of ontology in information integration, the conceptual similarity calculation based on ontology has become more and more important. Aiming at the shortcomings of the commonly used domain ontology concept similarity calculation method, an improved ontology concept similarity calculation model based on tree structure is proposed and constructed. Firstly, the XML document...
The application of micro-blog in Ideological and political education in universities is a new subject. Therefore, it needs a systematic theoretical point of view to guide. Make a scientific analysis of the connotation, characteristics and nature of microblog and study the content, carrier form and construction method of microblog's connotation construction. This paper designed a microblog information...
The relationship between traditional culture and contemporary classical education closely, the two symbiotic development, in order to explore the traditional classical culture influence on the modern education, this paper uses principal component analysis method, comprehensive score of cultural factors influencing the contemporary education level. Through empirical research, the results show that...
In order to overcome the shortcomings of the time constraint information incomplete description of traditional art color in graphic design in the process of picture graphic design, the art color optimization algorithm is proposed to solve the problem of conventional linear color design in order to meet the needs of graphic design art color. In addition, considering the art of color in the corner is...
the design of the oscillation circuit is based on the Schmitt trigger, and the oscillation frequency is 700KHz. Theoretical analysis and simulation verification of circuit. The results show that the output period of the oscillating circuit is 1.43e-6 s and the frequency is stable in the range of temperature - 40-120.
As an important part of cultural heritage, the protection of intangible cultural heritage is of great significance for the promotion of traditional culture and national image. In this paper, we propose a novel digital protection method of intangible cultural heritage. Firstly, we analyze main characteristics of the Intangible cultural heritage, which contains products and processes of a culture which...
In this paper, we demonstrate a photonic wireless-communication device based on GaN-on-silicon platform with membrane light emitting diodes for in-plane ultra-short distance visible light communication (VLC). We utilize two bidirectional InGaN/GaN multiple-quantum-well devices integrated on one chip as signal emitter and receiver, which are operated under light-emitting diode (LED) or photo detector...
Micro-blog is regarded as one of the most popular platforms for information sharing based on Web 2.0 technology. In this paper, we propose a novel Micro-blog influence evaluation method by modeling users' behaviors in Micro-blog platform. Firstly, considering the Micro-blog API data capture method program is simple, we aim to achieve a higher efficiency and consistency of data crawling by relieving...
Under the background of mass entrepreneurship and people's innovation, the problem of College Students' entrepreneurship has received much attention. Based on the survey data of 1000 college students in China, this paper analyzes the success rate of college students and its influencing factors by using the principal factor analysis method. The results show that college students' entrepreneurial potential...
The optimization of cutting parameters in the milling process of cutting tool is helpful to the quality control of the production process. Based on particle swarm optimization (PSO) algorithm, a method for optimizing the parameters of die casting process is presented. Based on the summary of the relative volume, the milling force and the deformation control parameters on the advantages of the traditional...
The voltage equation of asynchronous motor was established in synchronous rotating coordinate system. This model was implemented by using the Matrix Concatenation module in Simulink software. Simulation experiments were carried out. The results showed that this modeling method was simple, fast operation and high accuracy.
For the deficiency of long running time and large complexity of traditional MES job scheduling algorithm, this paper adopts a optimal scheduling approach based on rules. It performs optimized operations with the conditions of the longest relative surplus. The scheduling rule ensures the priority scheduling of the longest process, which can solve the optimal solution of each partial scheduling by comparing...
In this paper, we propose a new way of doing formation obstacle avoidance using a combination of Constraint Based Programming (CBP) and Rapidly Exploring Random Trees (RRTs). RRT is used to select waypoint nodes, and CBP is used to move the formation between those nodes, reactively rotating and translating the formation to pass the obstacles on the way. Thus, the CBP includes constraints for both...
This paper reports on three measurement science field exercises for evaluating ground, aerial, and aquatic robots. These events, conducted from February to June 2017, were conducted in close co-ordination with the responder community, standards organizations, manufacturers, and academia. Test data from a wide variety of robot platforms were gathered in a wide variety of standard and prototypical test...
This paper proposes a scheme for observing cooperative Unmanned Surface Vehicles (USV), using a rotorcraft Unmanned Aerial Vehicle (UAV) with camera movements (tilt and yaw) prioritized over UAV movements. Most of the current researches consider a fixed-wing type UAV for surveillance of multiple moving targets (MMT), whose functionality is limited to just UAV movements. Experiments in simulation are...
A common scenario in Search and Rescue robotics is to map and patrol a disaster site to assess the situation and plan potential missions of rescue teams. Particular importance has to be given to changes in the environment as these may correspond to critical events like building collapses, movement of objects, etc. This paper presents a change detection pipeline for LiDAR-equipped robots to assist...
This paper describes a real-time multi-vehicle motion planning (MVMP) algorithm for the emergency vehicle clearance task. To address the inherent limitations of human drivers in perception, communication, and cooperation, we require that the emergency vehicle and the surrounding normal vehicles are connected and automated vehicles (CAVs). The concerned MVMP task is to find cooperative trajectories...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.