obot control, a subject aimed at making robots behave as desired, has been extensively developed for more than two decades. Among many books being published on this subject, a common feature is to treat a robot as a single system that is to be controlled by a variety of control algorithms depending on different scenarios and control objectives. However, when a robot becomes more complex and its degrees of freedom of motion increase substantially, the needed control computation can easily go beyond the scope a modern computer can handle within a pre-specified sampling period. A solution is to base the control on subsystem dynamics.
標簽: decomposition virtual control
上傳時間: 2019-09-04
上傳用戶:txb96
Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.
標簽: Fundamental Limits Secure Class on of
上傳時間: 2020-01-04
上傳用戶:kddlas
Two important microwave remote sensors are the radar and the radiometer. There have been a number of books written on various aspects of radar, but there have been only a few written on microwave radiometers, especially on sub- jects of how to design and build radiometer systems. This book, which is the second edition of a book originally published in 1989, attempts to fill this void.
標簽: Radiometer Microwave Systems
上傳時間: 2020-05-23
上傳用戶:shancjb
Recently millimeter-wave bands have been postu- lated as a means to accommodate the foreseen extreme bandwidth demands in vehicular communications, which result from the dissemination of sensory data to nearby vehicles for enhanced environmental awareness and improved safety level. However, the literature is particularly scarce in regards to principled resource allocation schemes that deal with the challenging radio conditions posed by the high mobility of vehicular scenarios
標簽: Communications Millimeter Wave V2V
上傳時間: 2020-05-23
上傳用戶:shancjb
In the hit CBS crime show Person of Interest, which debuted in 2011, the two heroes—one a former Central Intelligence Agency agent and the other a billionaire technology genius—work together using the ubiquitous surveillance system in New York City to try to stop violent crime. It’s referred to by some as a science fiction cop show. But the use of advanced technology for crime analysis in almost every major police department in the United States may surpass what’s depicted on TV crime dramas such as Person of Interest. Real-time crime cen- ters (RTCCs) are a vital aspect of intelligent policing. Crime analysis is no longer the stuff of science fiction. It’s real.
標簽: Intelligence Analysis Crime
上傳時間: 2020-05-25
上傳用戶:shancjb
Two important microwave remote sensors are the radar and the radiometer. There have been a number of books written on various aspects of radar, but there have been only a few written on microwave radiometers, especially on sub- jects of how to design and build radiometer systems. This book, which is the second edition of a book originally published in 1989, attempts to fill this void.
標簽: Radiometer Microwave Analysis Systems Design
上傳時間: 2020-05-26
上傳用戶:shancjb
Recently millimeter-wave bands have been postu- lated as a means to accommodate the foreseen extreme bandwidth demands in vehicular communications, which result from the dissemination of sensory data to nearby vehicles for enhanced environmental awareness and improved safety level.
標簽: Millimeter Wave V2V Communications
上傳時間: 2020-05-26
上傳用戶:shancjb
The contemporary view of the Smart City is very much static and infrastructure- centric, focusing on installation and subsequent management of Edge devices and analytics of data provided by these devices. While this still allows a more efficient management of the city’s infrastructure, optimizations and savings in different do- mains, the existing architectures are currently designed as single-purpose, vertically siloed solutions. This hinders active involvement of a variety of stakeholders (e.g., citizens and businesses) who naturally form part of the city’s ecosystem and have an inherent interest in jointly coordinating and influencing city-level activities.
標簽: Internet Systems Cities People Things Smart The and of
上傳時間: 2020-05-26
上傳用戶:shancjb
The rapid growth of the Web in the past two decades has made it the larg- est publicly accessible data source in the world. Web mining aims to dis- cover useful information or knowledge from Web hyperlinks, page con- tents, and usage logs. Based on the primary kinds of data used in the mining process, Web mining tasks can be categorized into three main types: Web structure mining, Web content mining and Web usage mining.
上傳時間: 2020-05-26
上傳用戶:shancjb
Licensed spectrum remains 3GPP operators’ top priority to deliver advanced services and user experience Opportunistic use of unlicensed spectrum is becoming an important complement for operators to meet the growing traffic demand Moving forward 3GPP operators will have two options to offload traffic to unlicensed spectrum: 1. Wi-Fi (via LTE/Wi-Fi interworking) 2. LTE over unlicensed It will then be up to each individual operator to choose which approach to use, which will depend on a number of factors
標簽: 3GPP_unlicensed_Dino_Flore 2015 01
上傳時間: 2020-05-26
上傳用戶:shancjb