Resource Type

Journal Article 172

Year

2023 11

2022 13

2021 17

2020 14

2019 11

2018 9

2017 26

2016 10

2015 2

2014 1

2013 2

2012 3

2011 2

2010 3

2009 3

2008 5

2007 6

2006 5

2005 8

2004 6

open ︾

Keywords

Linear matrix inequality 3

decoupling control 3

DSM (design structure matrix) 2

Event-triggered control 2

High-throughput characterization 2

Time delay 2

cable-stayed bridge 2

robustness 2

wave 2

2-radical expansion 1

AF(atrial fibrillation) 1

ANSYS 1

Access control 1

Achievable rate region 1

Actor-critic structure 1

Adaptive beamforming 1

Adaptive dynamic programming 1

Adaptive observers 1

Adaptive optimal control actor 1

open ︾

Search scope:

排序: Display mode:

Passive millimeter-wave target recognition based on Laplacian eigenmaps

Luo Lei,Li Yuehua,Luan Yinghong

Strategic Study of CAE 2010, Volume 12, Issue 3,   Pages 77-81

Abstract:

Aiming at the disadvantages of feature extraction and selection in the traditional method for passive millimeter-wave (MMW) metal target recognition, the existence and characteristics of low dimensional manifold of the short-time Fourier spectrum of metal target echo signal are explored using manifold learning algorithm, Laplacian eigenmaps. Target classification is performed through comparing the similarity of the test samples and the positive class in terms of the low dimensional manifold. The experiments show that the method gets higher recognition rate than other linear and kernel-based nonlinear dimensionality reduction algorithm, and is robust to data aliasing.

Keywords: manifold learning     Laplacian eigenmaps     nonlinear dimensionality reduction     low dimensional manifold     MMW    

Latent discriminative representation learning for speaker recognition Research Articles

Duolin Huang, Qirong Mao, Zhongchen Ma, Zhishen Zheng, Sidheswar Routryar, Elias-Nii-Noi Ocquaye,2211708034@stmail.ujs.edu.cn,mao_qr@ujs.edu.cn,zhongchen_ma@ujs.edu.cn,1209103822@qq.com,sidheswar69@gmail.com,eocquaye@ujs.edu.cn

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 5,   Pages 615-766 doi: 10.1631/FITEE.1900690

Abstract: Extracting discriminative speaker-specific representations from speech signals and transforming them into fixed length vectors are key steps in speaker identification and verification systems. In this study, we propose a method for . We mean that the learned representations in this study are not only discriminative but also relevant. Specifically, we introduce an additional speaker embedded lookup table to explore the relevance between different utterances from the same speaker. Moreover, a reconstruction constraint intended to learn a is introduced to make representation discriminative. Experimental results demonstrate that the proposed method outperforms state-of-the-art methods based on the Apollo dataset used in the Fearless Steps Challenge in INTERSPEECH2019 and the TIMIT dataset.

Keywords: 说话人识别;潜在可区分性表征学习;说话人嵌入查找表;线性映射矩阵    

Event-triggered adaptive finite-time control for nonlinear systems under asymmetric time-varying state constraints Research Article

Yan Wei, Jun Luo, Huaicheng Yan, Yueying Wang,wyy676@126.com

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 12,   Pages 1551-1684 doi: 10.1631/FITEE.2000692

Abstract: This paper investigates the issue of event-triggered adaptive state-constrained control for multi-input multi-output uncertain nonlinear systems. To prevent asymmetric time-varying from being violated, a tan-type is established to transform the considered system into an equivalent “non-constrained” system. By employing a smooth switch function in the virtual control signals, the singularity in the traditional dynamic surface control can be avoided. Fuzzy logic systems are used to compensate for the unknown functions. A suitable event-triggering rule is introduced to determine when to transmit the control laws. Through Lyapunov analysis, the closed-loop system is proved to be semi-globally practical stable, and the are never violated. Simulations are provided to evaluate the effectiveness of the proposed approach.

Keywords: 事件触发控制;非线性映射;自适应模糊控制;有限时间;状态约束    

Designing a novel consensus protocol formultiagent systemswith general dynamics under directed networks Article

Hao-liang LI, Ren-nong YANG, Qiu-ni LI

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 8,   Pages 1071-1081 doi: 10.1631/FITEE.1601422

Abstract: The consensus problem for general linear multi-agent systems (MASs) under directed topology is investigated. First, a novel consensus protocol based on proportional-integral-derivative (PID) control is proposed. Second, the consensus problem is converted into an asymptotic stability problem through transformations. Third, through a state projection method the consensus condition is proved and the explicit expression of the consensus function is given. Then, a Lyapunov function is constructed and the gain matrices of the protocol are given based on the linear matrix inequality. Finally, two experiments are conducted to explain the advantages of the method. Simulation results show the effectiveness of the proposed algorithm.

Keywords: Multi-agent     Consensus     PID control     Linear matrix inequality    

Output Feedback Control for the Descriptor TS Fuzzy Systems With Pole-placement Constraints

Gao Dan,Cao Yuanyuan

Strategic Study of CAE 2006, Volume 8, Issue 4,   Pages 63-67

Abstract:

The design of dynamic output-feedback controller is investigated for the descriptor fuzzy TS models. By transforming the design problem into the feasible solution problems to a set of linear matrix inequalities, the properly stabilizing output controllers are obtained. The resulting closed-loop system can be ensured to satisfy certain performance index and locate at the required pole-placement region.

Keywords: singular fuzzy system     dynamic output-feedback     LMI     pole placement    

Leader-following synchronization of a multi-agent system with heterogeneous delays Research Articles

Branislav Rehák, Volodymyr Lynnyk,rehakb@utia.cas.cz,volodymyr.lynnyk@utia.cas.cz

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 1,   Pages 1-140 doi: 10.1631/FITEE.2000207

Abstract: An algorithm is presented for leader-following synchronization of a composed of linear agents with . The presence of different delays in various agents can cause a synchronization error that does not converge to zero. However, the norm of this error can be bounded and this boundary is presented. The proof of the main results is formulated by means of linear matrix inequalities, and the size of this problem is independent of the number of agents. Results are illustrated through examples, highlighting the fact that the steady error is caused by heterogeneous delays and demonstrating the capability of the proposed algorithm to achieve synchronization up to a certain error.

Keywords: Multi-agent system     Time delay     Linear matrix inequality    

Penetration Depth of Projectiles Into Concrete Using Artificial Neural Network

Li Jianguang,Li Yongchi,Wang Yulan

Strategic Study of CAE 2007, Volume 9, Issue 8,   Pages 77-81

Abstract:

In this article,  nonlinear mapping relation between input of 13 variables of lp and σyt/σyp etc. , and output of penetration depth is established by dimensional analysis and theory of artificial neural networks for problem of penetration depth of projectiles into concrete.  Moreover,  a satisfied output about penetration depth from RBF neural network is gotten by a group of input sets and corresponding output sets,  which comes from M.  J.  Forrestal 's document.

Keywords: neural networks     dimensional analysis     penetration depth of projectiles into concrete     nonlinear mapping relation     RBF neural networks    

Featurematching using quasi-conformalmaps Article

Chun-xue WANG, Li-gang LIU

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 5,   Pages 644-657 doi: 10.1631/FITEE.1500411

Abstract: We present a fully automatic method for finding geometrically consistent correspondences while discarding outliers from the candidate point matches in two images. Given a set of candidate matches provided by scale-invariant feature transform (SIFT) descriptors, which may contain many outliers, our goal is to select a subset of these matches retaining much more geometric information constructed by a mapping searched in the space of all diffeomorphisms. This problem can be formulated as a constrained optimization involving both the Beltrami coefficient (BC) term and quasi-conformal map, and solved by an efficient iterative algorithm based on the variable splitting method. In each iteration, we solve two subproblems, namely a linear system and linearly constrained convex quadratic programming. Our algorithm is simple and robust to outliers. We show that our algorithm enables producing more correct correspondences experimentally compared with state-of-the-art approaches.

Keywords: Feature correspondence     Quasi-conformal map     Splitting method    

The Application of Risk Matrix to Acquisition Risk Evaluation for Weapon and Equipment

Li Zhongmin,Wei Yiming,Tang Shuchun,Chen Jian

Strategic Study of CAE 2006, Volume 8, Issue 6,   Pages 95-99

Abstract:

Risk evaluation is the basis of acquisition management for weapon and equipment. Based on the totally analyzing and summarizing risk matrix widely used abroad, the paper firsdy discusses the application of risk matrix in acquisition risk evaluation for weapon and equipment in China. Then, the paper, beginning with the two rules of risk impact and risk probability, demonstrates risk evaluation of a type of weapon and equipment as a case study, thus lays a basis for the scientific and rational risk management decision making.

Keywords: risk matrix     risk evaluation     acquisition for weapon and equipment    

Convergence analysis of distributed Kalman filtering for relative sensing networks Research

Che LIN, Rong-hao ZHENG, Gang-feng YAN, Shi-yuan LU

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 9,   Pages 1063-1075 doi: 10.1631/FITEE.1700066

Abstract:

We study the distributed Kalman filtering problem in relative sensing networks with rigorous analysis. The relative sensing network is modeled by an undirected graph while nodes in this network are running homogeneous dynamical models. The sufficient and necessary condition for the observability of the whole system is given with detailed proof. By local information and measurement communication, we design a novel distributed suboptimal estimator based on the Kalman filtering technique for comparison with a centralized optimal estimator. We present sufficient conditions for its convergence with respect to the topology of the network and the numerical solutions of n linear matrix inequality (LMI) equations combining system parameters. Finally, we perform several numerical simulations to verify the effectiveness of the given algorithms.

Keywords: Relative sensing network     Distributed Kalman filter     Schur stable     Linear matrix inequality    

Risk Matrix Method and Its Application in the Field of Technical Project Risk Management

Zhu Qichao,Kuang Xinghua,Shen Yongping

Strategic Study of CAE 2003, Volume 5, Issue 1,   Pages 89-94

Abstract:

Technical project risk management has always been given great concern by the Department of Defense of the United States of America (DoD). This paper systematically introduces risk matrix and its application, which is one of the most popular risk management technologies in the field of DoD acquisition projects risk management. As a conclusion, this paper evaluates the usability of risk matrix when to be used to assess and mitigate technical project risks in China, and delivers a framework of risk matrix application in high-tech project risk management.

Keywords: risk matrix     risk management     project management    

Synchronization of nonlinear multi-agent systems using a non-fragile sampled data control approach and its application to circuit systems Research Article

Stephen AROCKIA SAMY, Raja RAMACHANDRAN, Pratap ANBALAGAN, Yang CAO,caoyeacy@seu.edu.cn

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 4,   Pages 553-566 doi: 10.1631/FITEE.2200181

Abstract: The main aim of this work is to design a scheme for the criteria for interconnected coupled circuit systems (multi-agent systems, MASs). NFSDC is used to conduct synchronization analysis of the considered MASs in the presence of s. By constructing suitable Lyapunov functions, sufficient conditions are derived in terms of linear matrix inequalities (LMIs) to ensure synchronization between the MAS leader and follower systems. Finally, two numerical examples are given to show the effectiveness of the proposed control scheme and less conservation of the proposed Lyapunov functions.

Keywords: Multi-agent systems (MASs)     Non-fragile sampled data control (NFSDC)     Time-varying delay     Linear matrix inequality (LMI)     Asymptotic synchronization    

A forwarding graph embedding algorithm exploiting regional topology information Article

Hong-chao HU, Fan ZHANG, Yu-xing MAO, Zhen-peng WANG

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 11,   Pages 1854-1866 doi: 10.1631/FITEE.1601404

Abstract: Network function virtualization (NFV) is a newly proposed technique designed to construct and manage network functions dynamically and efficiently. Allocating physical resources to the virtual network function forwarding graph is a critical issue in NFV. We formulate the forwarding graph embedding (FGE) problem as a binary integer programming problem, which aims to increase the revenue and decrease the cost to a service provider (SP) while considering limited network resources and the requirements of virtual functions. We then design a novel regional resource clustering metric to quantify the embedding potential of each substrate node and propose a topology-aware FGE algorithm called ‘regional resource clustering FGE’ (RRC-FGE). After implementing our algorithms in C++, simulation results showed that the total revenue was increased by more than 50 units and the acceptance ratio by more than 15%, and the cost of the service provider was decreased by more than 60 units.

Keywords: Network function virtualization     Virtual network function     Forwarding graph embedding    

DSM Applied to Planning Process in Cooperative Design for Complex Products

Xu Luning,Zhang Heming,Zhang Yongkang

Strategic Study of CAE 2005, Volume 7, Issue 6,   Pages 41-44

Abstract:

The paper applied the matrix to the cooperative design for complex products, described the design flow diagram with design structure matrix (DSM), then reset the planning process according to analyzing and partitioning the DSM in order to shorten the cycle of design and reduce the cost of development.

Keywords: DSM (design structure matrix)     analysis     partition     planning    

A Co-Point Mapping-Based Approach to Drivable Area Detection for Self-Driving Cars Article

Ziyi Liu,Siyu Yu,Nanning Zheng

Engineering 2018, Volume 4, Issue 4,   Pages 479-490 doi: 10.1016/j.eng.2018.07.010

Abstract:

The randomness and complexity of urban traffic scenes make it a difficult task for self-driving cars to detect drivable areas. Inspired by human driving behaviors, we propose a novel method of drivable area detection for self-driving cars based on fusing pixel information from a monocular camera with spatial information from a light detection and ranging (LIDAR) scanner. Similar to the bijection of collineation, a new concept called co-point mapping, which is a bijection that maps points from the LIDAR scanner to points on the edge of the image segmentation, is introduced in the proposed method. Our method positions candidate drivable areas through self-learning models based on the initial drivable areas that are obtained by fusing obstacle information with superpixels. In addition, a fusion of four features is applied in order to achieve a more robust performance. In particular, a feature called drivable degree (DD) is proposed to characterize the drivable degree of the LIDAR points. After the initial drivable area is characterized by the features obtained through self-learning, a Bayesian framework is utilized to calculate the final probability map of the drivable area. Our approach introduces no common hypothesis and requires no training steps; yet it yields a state-of-art performance when tested on the ROAD-KITTI benchmark. Experimental results demonstrate that the proposed method is a general and efficient approach for detecting drivable area.

Keywords: Drivable area     Self-driving     Data fusion     Co-point mapping    

Title Author Date Type Operation

Passive millimeter-wave target recognition based on Laplacian eigenmaps

Luo Lei,Li Yuehua,Luan Yinghong

Journal Article

Latent discriminative representation learning for speaker recognition

Duolin Huang, Qirong Mao, Zhongchen Ma, Zhishen Zheng, Sidheswar Routryar, Elias-Nii-Noi Ocquaye,2211708034@stmail.ujs.edu.cn,mao_qr@ujs.edu.cn,zhongchen_ma@ujs.edu.cn,1209103822@qq.com,sidheswar69@gmail.com,eocquaye@ujs.edu.cn

Journal Article

Event-triggered adaptive finite-time control for nonlinear systems under asymmetric time-varying state constraints

Yan Wei, Jun Luo, Huaicheng Yan, Yueying Wang,wyy676@126.com

Journal Article

Designing a novel consensus protocol formultiagent systemswith general dynamics under directed networks

Hao-liang LI, Ren-nong YANG, Qiu-ni LI

Journal Article

Output Feedback Control for the Descriptor TS Fuzzy Systems With Pole-placement Constraints

Gao Dan,Cao Yuanyuan

Journal Article

Leader-following synchronization of a multi-agent system with heterogeneous delays

Branislav Rehák, Volodymyr Lynnyk,rehakb@utia.cas.cz,volodymyr.lynnyk@utia.cas.cz

Journal Article

Penetration Depth of Projectiles Into Concrete Using Artificial Neural Network

Li Jianguang,Li Yongchi,Wang Yulan

Journal Article

Featurematching using quasi-conformalmaps

Chun-xue WANG, Li-gang LIU

Journal Article

The Application of Risk Matrix to Acquisition Risk Evaluation for Weapon and Equipment

Li Zhongmin,Wei Yiming,Tang Shuchun,Chen Jian

Journal Article

Convergence analysis of distributed Kalman filtering for relative sensing networks

Che LIN, Rong-hao ZHENG, Gang-feng YAN, Shi-yuan LU

Journal Article

Risk Matrix Method and Its Application in the Field of Technical Project Risk Management

Zhu Qichao,Kuang Xinghua,Shen Yongping

Journal Article

Synchronization of nonlinear multi-agent systems using a non-fragile sampled data control approach and its application to circuit systems

Stephen AROCKIA SAMY, Raja RAMACHANDRAN, Pratap ANBALAGAN, Yang CAO,caoyeacy@seu.edu.cn

Journal Article

A forwarding graph embedding algorithm exploiting regional topology information

Hong-chao HU, Fan ZHANG, Yu-xing MAO, Zhen-peng WANG

Journal Article

DSM Applied to Planning Process in Cooperative Design for Complex Products

Xu Luning,Zhang Heming,Zhang Yongkang

Journal Article

A Co-Point Mapping-Based Approach to Drivable Area Detection for Self-Driving Cars

Ziyi Liu,Siyu Yu,Nanning Zheng

Journal Article