Showing 33,801 - 33,820 results of 46,768 for search '"Design"', query time: 0.17s Refine Results
  1. 33801

    Dynamic Trajectory Planning and Tracking for Autonomous Vehicle With Obstacle Avoidance Based on Model Predictive Control by Shaosong Li, Zheng Li, Zhixin Yu, Bangcheng Zhang, Niaona Zhang

    Published 2019-01-01
    “…In this study, an obstacle avoidance controller based on nonlinear model predictive control is designed in autonomous vehicle navigation. The reference trajectory is predefined using a sigmoid function in accordance with road conditions. …”
    Get full text
    Article
  2. 33802

    Higher-Order Iterative Learning Control with Optimal Control Gains Based on Evolutionary Algorithm for Nonlinear System by Yun-Shan Wei, Xiaofen Yang, Wenli Shang, Ying-Yu Chen

    Published 2021-01-01
    “…Since the updating actions are constituted by the tracking information from several previous iterations, the suitably designed HOILC schemes with appropriate control gains usually achieve fast convergence speed. …”
    Get full text
    Article
  3. 33803

    Teaching and learning : pedagogy, curriculum and culture / by Moore, Alex, 1947-

    Published 2012
    View in OPAC
    Book
  4. 33804

    Modeling and Oil Contamination Influence Control of a Vehicle Mounted and Unbalanced Barrel Pitching System by Yuanbo Chu

    Published 2019-01-01
    “…Firstly, the overall model of barrel pitching system is established and its sensitivity analysis is conducted, and then the correction link and the pressure difference feedback loop are respectively designed to suppress the influence of unbalanced torque and road fluctuation. …”
    Get full text
    Article
  5. 33805

    Research on backup and remapping of network slice based on security classification by Zhiyong SUN, Xinsheng JI, Wei YOU, Quan YUAN

    Published 2018-11-01
    “…In the future virtual environment of 5G core network,the general X86 servers make the attackers exploit vulnerabilities more easily,the substrate network is infected with and spreads the virus more easily,and the problem of single physical node failed will affect the service performance of the network slice seriously.Based on the existing node backup and remapping solutions,considering the impact of security constraints among nodes on network security performance,a security parameter evaluation model of virtual nodes and physical nodes were proposed in the network slicing,and the security constraint relationship was established between the virtual nodes and the physical nodes.Then backup virtual nodes were selected based on the security parameters evaluation model,and backup mapping methods were designed.Finally,the node remapping mechanism was designed with satisfying the requirement of network delay.Experiments show that the proposed method can significantly improve network intrusion tolerance with satisfying the requirements of network slicing service performance.…”
    Get full text
    Article
  6. 33806

    Deep reinforcement learning-based resource joint optimization for millimeter-wave massive MIMO systems by LIU Qingli, LI Xiaoyu, LI Rui

    Published 2024-10-01
    “…The method was adopted in a three-stage strategy, firstly, an RF beamformer was constructed to reduce the hardware cost and total power consumption through a small number of RF chains; secondly, a baseband precoder was designed using the effective channel state information; and finally, a two-tier deep reinforcement learning architecture was designed and applied to realize dynamic discrete bandwidth and continuous power resource allocation. …”
    Get full text
    Article
  7. 33807

    Fast panoramic image stitching algorithm based on parameter regression by Fan GUO, Xiaohu LI, Wentao LIU, Jin TANG

    Published 2023-09-01
    “…In reality, the field of view of images acquired by cameras was usually limited, and the demand for panoramic images was increasing.Therefore, a fast panoramic image stitching algorithm based on parameter regression was proposed for panoramic image sequences.The traditional image registration task was transformed into deep learning combined with machine learning, a multi-scale deep convolutional neural network (MDCNN) based on Gaussian difference pyramid was designed to extract features of stitching images, and LightGBM regression model was used to predict stitching parameters.The transformation matrix and the focal length of the camera were obtained to align the images, and a hyperbolic image fusion algorithm was designed to eliminate the stitching seam between the images.The experimental results show that the proposed algorithm can quickly mosaic images and obtain clearer and more natural panoramic mosaic effects than the existing representative algorithms.It also has good adaptability for infrared images.…”
    Get full text
    Article
  8. 33808

    UAV and Its Approach in Oil and Gas Pipeline Leakage Detection by Saheed Akande, Adedotun Adetunla, Tosin Olanrewaju, Adeyinka Adeoye

    Published 2021-01-01
    “…A comparative analysis of the response time of the designed LDS and existing systems reveals that the designed LDS response time is 1146.7% faster and having a pictorial view of the localized area of interest would go a long way to preventing unnecessary mobilization for site visits and eradicating the costly effect of false alarms.…”
    Get full text
    Article
  9. 33809

    Logistic chaotic sequence generator based on physical unclonable function by Chunguang HUANG, Hai CHENG, Qun DING

    Published 2019-03-01
    “…Logistic nonlinear chaotic system has many good characters such as initial value sensitivity and topological mixing in the some parameter condition,which is used to create the random sequence signal generator.Because of the attributions of randomness and uniqueness even under the exact,the same circuit layouts and manufacturing procedures,there is still an instinct unclonable difference in each integrated circuit.Therefore,a new sequence stream generator was proposed based on Logistic chaotic system and physical unclonable function designed by double output look-up-table (LUT).The output of the Logistic sequence generator was associated with a specific physical circuit.This kind of sequence generator could resist an attack such as the replication of the keys of the system.The system was designed and tested on the Xilinx FPGA board.The results show that the same architecture of the circuit and the same config file operated on the different FPGA developing board can generate the total different random chaotic sequence stream and improve the randomness of the stream.…”
    Get full text
    Article
  10. 33810

    An edge cloud–based body data sensing architecture for artificial intelligence computation by TaeYoung Kim, JongBeom Lim

    Published 2019-04-01
    “…The main rationale for designing the edge cloud–based sensing architecture is as follows. …”
    Get full text
    Article
  11. 33811

    Energy Efficient Radio Resource Allocation in Two-Tier Macro-Femto Cellular for Mobile Cloud Computing by Guogang Zhao, Liqiang Zhao, Kun Yang

    Published 2014-07-01
    “…An analytical model was conceived and a radio resource management algorithm based on LTE-A mobile cloud computing was designed. In order to achieve the optimal solution quickly, a rapid convergence of the iterative algorithm was designed. …”
    Get full text
    Article
  12. 33812

    Coverage region switching method under earth-fixed footprint mode for LEO satellite constellation by QI Xiaoxin, SONG Baojun, LI Xun

    Published 2024-07-01
    “…Firstly, a coverage region division mechanism was designed to keep the coverage region topology regular. …”
    Get full text
    Article
  13. 33813

    Best Management Practices in the Everglades Agricultural Area: Fertilizer Spill Prevention by Orlando A. Diaz, Samira H. Daroub, Ronald W. Rice, Timothy A. Lang, Ming Chen

    Published 2005-12-01
    “… Phosphorus fertilizer spill prevention is a Best Management Practice (BMP) approved by the South Florida Water Management District (SFWMD), one designed to reduce drainage P loads in the Everglades Agricultural Area (EAA). …”
    Get full text
    Article
  14. 33814

    Trust management scheme for driver-vehicle separation on dual-layer blockchain by ZHANG Haibo, HUANG Honglong, LI Fangwei, XU Yongjun

    Published 2024-11-01
    “…Firstly, a dual-key driver-vehicle authentication method based on fuzzy extraction was designed to establish a stable driver-vehicle trust link. …”
    Get full text
    Article
  15. 33815

    High-performance federated continual learning algorithm for heterogeneous streaming data by Hui JIANG, Tianliu HE, Min LIU, Sheng SUN, Yuwei WANG

    Published 2023-05-01
    “…Aiming at the problems of poor model performance and low training efficiency in training streaming data of AI models that provide intelligent services, a high-performance federated continual learning algorithm for heterogeneous streaming data (FCL-HSD) was proposed in the distributed terminal system with privacy data.In order to solve the problem of the current model forgetting old data, a model with dynamically extensible structure was introduced in the local training stage, and an extension audit mechanism was designed to ensure the capability of the AI model to recognize old data at the cost of small storage overhead.Considering the heterogeneity of terminal data, a customized global model strategy based on data distribution similarity was designed at the central server side, and an aggregation-by-block manner was implemented for different modules of the model.The feasibility and effectiveness of the proposed algorithm were verified under various data increment scenarios with different data sets.Experimental results show that, compared with existing works, the proposed algorithm can effectively improve the model performance to classify old data on the premise of ensuring the capability to classify new data.…”
    Get full text
    Article
  16. 33816

    Human Echinococcosis: A Neglected Disease by António Menezes da Silva

    Published 2010-01-01
    “…Furthermore, the terminology related to the designations around the parasite, its evolution and some therapeutic procedures is not uniform and sometimes inappropriate terms and wrong designations are used based on incorrect concepts. …”
    Get full text
    Article
  17. 33817

    Research on incremental deployment mechanism of network modality for polymorphic network environment by Jiong LI, Yuxiang HU, Pengshuai CUI, Le TIAN, Yongji DONG

    Published 2023-06-01
    “…Polymorphic networks support diverse network requirements and can coexist, evolve, and change on a unified physical or logical infrastructure in the form of network modality.They can maximize the innovation vitality of network technology driven by new applications.The evolution and development of modality require the incremental deployment of modality to meet the needs of convenience and privacy protection in the multi-user deployment process.However, the deployment of current network functions still uses the one-by-one deployment method, resulting in high complexity of the deployment of new modality, and mutual exposure of processing logic between different users.To address these issues, an incremental deployment mechanism for polymorphic network environments was proposed.Firstly, an incremental deployment mechanism for network modality was designed.Then, the incremental deployment of modality was abstracted as a graph merging problem based on this mechanism, and an adjacency list-based merge parsing graph algorithm was designed.The simulation results indicate that the proposed mechanism can achieve fast and correct merging of network modality, support incremental modality deployment, and greatly reduce the application deployment and service provision threshold of new network systems.…”
    Get full text
    Article
  18. 33818

    Analysis of Wind Data, Calculation of Energy Yield Potential, and Micrositing Application with WAsP by Fatih Topaloğlu, Hüseyin Pehlivan

    Published 2018-01-01
    “…With the analysis performed in the application, the average wind velocity, average power density, energy potential from micrositing, capacity factor, unit cost price, and period of redemption have been calculated, which are needed by the project developer during the decision-making stage and intended to be used as the input unit in the fuzzy logic-based system designed. It is aimed at processing the parameters calculated by the designed fuzzy logic-based decision-making system at the rule base and generating a compatibility factor that will allow for making the final decision in building wind power plants.…”
    Get full text
    Article
  19. 33819

    Optimization and Planning of Emergency Evacuation Routes Considering Traffic Control by Guo Li, Lijun Zhang, Zhaohua Wang

    Published 2014-01-01
    “…This paper establishes two different emergency evacuation models on the basis of the maximum flow model (MFM) and the minimum-cost maximum flow model (MC-MFM), and proposes corresponding algorithms for the evacuation from one source node to one designated destination (one-to-one evacuation). Ulteriorly, we extend our evaluation model from one source node to many designated destinations (one-to-many evacuation). …”
    Get full text
    Article
  20. 33820

    Research on geomagnetic indoor high-precision positioning algorithm based on generative model by Shuai MA, Ke PEI, Huayan QI, Hang LI, Wen CAO, Hongmei WANG, Hailiang XIONG, Shiyin LI

    Published 2023-06-01
    “…Aiming at the current bottleneck of constructing a fine geomagnetic fingerprint library that required a lot of labor costs, two generative models called the conditional variational autoencoder and the conditional confrontational generative network were proposed, which could collect a small number of data samples for a given location, and generate pseudo-label fingerprints.At the same time, in order to solve the problem of low positioning accuracy of single-point geomagnetic fingerprints, a geomagnetic sequence positioning algorithm based on attention mechanism of convolutional neural network-gated recurrent unit was designed, which could effectively use the spatial and temporal characteristics of fingerprints to achieve precise positioning.In addition, a real-time, portable mobile terminal data collection and positioning system was also designed and built.The actual test shows that the proposed model can effectively construct the available geomagnetic fingerprint database, and the average error of the proposed algorithm can reach 0.16 m.…”
    Get full text
    Article