A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Design of switching strategy for Adaptive Cruise Control under string stability constraints
2011
Proceedings of the 2011 American Control Conference
Within this dead zone headway control strategy applies, and speed control strategy takes over beyond it. ...
The reason for design a dead zone is because if a strict boundary is defined on the R-Rdot chart between two separate zones with two control strategies leading to conflicting control goals, the trajectory ...
According to Parseval's Theorem for Fourier series, the sum (or integral) of the square of a function is equal to the sum (or integral) of the square of its transform, a.k.a. ...
doi:10.1109/acc.2011.5991004
fatcat:jyeqpfeqrvgwlitecy6whqdl54
Linear Model-Based Predictive Control of the LHC 1.8 K Cryogenic Loop
[chapter]
2000
Advances in Cryogenic Engineering
To reduce the requirements on either temperature sensor or cryogenic system performance, various control strategies have been investigated on a reduced-scale LHC prototype built at CERN (String Test). ...
To reduce the requirements on either temperature sensor or cryogenic system performance, various control strategies have been investigated on a reduced-scale LHC prototype built at CERN (String Test). ...
The String (Figure 1 ) consists of one quadrupole and three dipoles (total length of 50 meters), it is mounted with a slope of 1.4% to match the steepest inclination in the actual tunnel. ...
doi:10.1007/978-1-4615-4215-5_119
fatcat:lmxhh5uwqndrpoh5ec3l3bkh2e
Sampling Design for Network Model Calibration Using Genetic Algorithms
2000
Journal of water resources planning and management
The genetic algorithm was applied to a network model for a small town in Ohio and shown to perform extremely well, matching the optimal solutions produced by complete enumeration in a series of validation ...
This paper describes the use of a genetic algorithm to optimize the sampling design. ...
Lewis Rossman, the author of EPANET hydraulic simulation program, for providing a copy of the source code. Without his assistance, this work would not have been possible. ...
doi:10.1061/(asce)0733-9496(2000)126:4(245)
fatcat:g24p54zwyrdd7g7chgyztxdrmy
On the Weight Convergence of Elman Networks
2010
IEEE Transactions on Neural Networks
In particular, for the proposed eEBP training algorithm, convergence of the ENs' weights with the adaptive dead zone estimates is proven in the sense of Lyapunov functions. ...
This paper develops a robust extended EBP (eEBP) training algorithm for ENs with a new adaptive dead zone scheme based on eEBP training concepts. ...
only the norm of dead zone is used for the update of adaptive learning rate). ...
doi:10.1109/tnn.2009.2039226
pmid:20129857
fatcat:msmsd54davdsno7kmbxs2pcxxi
Event Forecasting with Pattern Markov Chains
2017
Proceedings of the 11th ACM International Conference on Distributed and Event-based Systems - DEBS '17
a full match is expected. ...
Our system can consume streams of events and forecast when the pattern is expected to be fully matched. ...
Figures 4g, 4h and 4i show the spread of the forecast intervals. Two clearly demarcated zones emerge. One is the usual dead zone (black, top left). ...
doi:10.1145/3093742.3093920
dblp:conf/debs/AlevizosAP17
fatcat:heuk4wojbvajdk7rnfv5ytdy2q
Occupancy-Based HVAC Control with Short-Term Occupancy Prediction Algorithms for Energy-Efficient Buildings
2018
Energies
Utilizing past occupancy observations, we introduce three different techniques for occupancy prediction. ...
Accurate occupancy prediction is a key enabler for demand-based HVAC control so as to ensure HVAC is not run needlessly when when a room/zone is unoccupied. ...
The United States Government retains and the publisher, by accepting the article for publication, acknowledges that the United States Government retains a non-exclusive, paid-up, irrevocable, world-wide ...
doi:10.3390/en11092427
fatcat:d7qxrsqlnndpdby6ccogp43cnq
Degraded Script Identification for Indian Language- A Survey
2014
International Journal of Computer Applications
Matching strategies might be gathered into three classes: immediate matching, deformable models and flexible matching and unwinding matching [32] . ...
In the first stage, the characters are aggregated into three sets relying upon their zonal position, i.e., upper zone, center zone and easier zone. ...
doi:10.5120/18914-0222
fatcat:265wijknvbfobdshgcmpmoipdu
Comparison Study on Power Output Characteristics of Power Management Methods for a Hybrid-electric UAV with Solar Cell/Fuel Cell/Battery
2016
International Journal of Aeronautical and Space Sciences
In the case of the fuel cell, the efficiency of 55% is shown for both active and passive managements, indicating negligible differences. ...
A dual-mode power management for a hybrid-electric UAV with a cruise power of 200W is proposed and empirically verified. ...
Three MPPT modules-one for each solar cell string-are fabricated, and each module delivers a peak power of 86W. ...
doi:10.5139/ijass.2016.17.4.631
fatcat:jfjywdw72jajzc55ul2sw6kwta
Improving Fuzzy-Logic based Map-Matching Method with Trajectory Stay-Point Detection
[article]
2022
arXiv
pre-print
In this work, we cluster stay-points in a trajectory dataset with DBSCAN and eliminate redundant data to improve the efficiency of the map-matching algorithm by lowering processing time. ...
However, most of the GPS trajectory datasets include stay-points irregularity, which makes map-matching algorithms mismatch trajectories to irrelevant streets. ...
Fuzzy-logic map-matching algorithm will identify the corresponding link for each point. Then, output data is a string of associating links. 2. ...
arXiv:2208.02881v1
fatcat:x2rjvq75wfbkhfhlzvijkevhpm
Early Failures Benefit Subsequent Task Performance
2016
Scientific Reports
Finally, when the barriers were removed (Test 4), all mice reverted to the best solution after active exploration. Thus, early active exploration helps mice to develop optimal strategies. ...
Although all mice eventually settled on the shortest route, mice that initially exhibited more trial-anderror exploration solved the maze more rapidly. ...
For a target string and the trajectory in a trial, we analyzed the numbers of mismatches between the target string and individual template strings (examples are shown in Fig. 3c) . ...
doi:10.1038/srep21293
pmid:26883387
pmcid:PMC4756702
fatcat:vbrhy65fgjey7pwdmvl4wr5gf4
Report on the tenth ICFP programming contest
2008
Proceeding of the 13th ACM SIGPLAN international conference on Functional programming - ICFP '08
the prefix -the shorter, the better; • the energy consumption of the synthesis, i.e., the time and space complexity of performing the algorithm -in this case only a limit was given. ...
The language of choice for discriminating hackers turned out to be C++. • the number of incorrect pixels in the resulting picture compared to the target picture -the fewer, the better; • the length of ...
Eric Bouwers, Thomas van Noort, Sander Mak, and Michiel Overeem tested the second version of the problem. The systems people at the Information and ...
doi:10.1145/1411204.1411259
dblp:conf/icfp/DolstraHHHJLLMRS08
fatcat:zqq7pnynofa7beasrzwoxwuose
Report on the tenth ICFP programming contest
2008
SIGPLAN notices
the prefix -the shorter, the better; • the energy consumption of the synthesis, i.e., the time and space complexity of performing the algorithm -in this case only a limit was given. ...
The language of choice for discriminating hackers turned out to be C++. • the number of incorrect pixels in the resulting picture compared to the target picture -the fewer, the better; • the length of ...
Eric Bouwers, Thomas van Noort, Sander Mak, and Michiel Overeem tested the second version of the problem. The systems people at the Information and ...
doi:10.1145/1411203.1411259
fatcat:4vhkafywx5b7bc6nr43eh3ldri
Improvements for Vachaspati-Vilenkin-type Algorithms for Cosmic String and Disclination Formation
[article]
1996
arXiv
pre-print
The time to trace a string defect is then proportional only to the string length. ...
We argue for the use of a tetrakaidekahedral lattice in such simulations. ...
In order for the VV algorithm to work, we need to match the triangular faces of a cubic cell with the faces of the neighbouring cells. ...
arXiv:hep-lat/9608085v2
fatcat:p5ifkob4mvdg5i36qitr3fornm
Influenza-Like Illness Surveillance on Twitter through Automated Learning of Naïve Language
2013
PLoS ONE
Twitter has the potential to be a timely and cost-effective source of data for syndromic surveillance. ...
We developed a minimally trained algorithm that exploits the abundance of health-related web pages to identify all jargon expressions related to a specific technical term. ...
Acknowledgements We thank Caterina Rizzo and Antonino Bella for their precious criticisms during the writing of the manuscript. ...
doi:10.1371/journal.pone.0082489
pmid:24324799
pmcid:PMC3853203
fatcat:p2udnqtnfzc25kkcvtwopguccy
Implementation of Sprouts: a graph drawing game
[article]
2021
arXiv
pre-print
In particular, we combine results from the theory of nimbers with new methods based on Delaunay triangulations and crossing-preserving force-directed algorithms to develop an AI Sprouts player which plays ...
We overcome all the implementation barriers and create the first user-friendly Sprouts application with a strong artificial intelligence after more than 50 years of the existence of the game. ...
In fact, it is an impartial game [10] and thus there exists a winning strategy for one of the players in every position. ...
arXiv:2108.07671v4
fatcat:u7e7tb7xmvgnjccgpraw5gxhmu
« Previous
Showing results 1 — 15 out of 2,615 results