Search results for "DATA"
showing 10 items of 12992 documents
Consistent Clustering of Elements in Large Pairwise Comparison Matrices
2018
[EN] In multi-attribute decision making the number of decision elements under consideration may be huge, especially for complex, real-world problems. Typically these elements are clustered and then the clusters organized hierarchically to reduce the number of elements to be simultaneously handled. These decomposition methodologies are intended to bring the problem within the cognitive ability of decision makers. However, such methodologies have disadvantages, and it may happen that such a priori clustering is not clear, and/or the problem has previously been addressed without any grouping action. This is the situation for the case study we address, in which a panel of experts gives opinions…
Adaptive Backstepping Control of Nonlinear Uncertain Systems With Quantized States
2019
This paper investigates the stabilization problem for uncertain nonlinear systems with quantized states. All states in the system are quantized by a static bounded quantizer, including uniform quantizer, hysteresis-uniform quantizer, and logarithmic-uniform quantizer as examples. An adaptive backstepping-based control algorithm, which can handle discontinuity, resulted from the state quantization and a new approach to stability analysis are developed by constructing a new compensation scheme for the effects of the state quantization. Besides showing the global ultimate boundedness of the system, the stabilization error performance is also established and can be improved by appropriately adj…
UJI RobInLab's approach to the Amazon Robotics Challenge 2017
2017
This paper describes the approach taken by the team from the Robotic Intelligence Laboratory at Jaume I University to the Amazon Robotics Challenge 2017. The goal of the challenge is to automate pick and place operations in unstructured environments, specifically the shelves in an Amazon warehouse. RobInLab's approach is based on a Baxter Research robot and a customized storage system. The system's modular architecture, based on ROS, allows communication between two computers, two Arduinos and the Baxter. It integrates 9 hardware components along with 10 different algorithms to accomplish the pick and stow tasks. We describe the main components and pipelines of the system, along with some e…
Traffic data acquirement by unmanned aerial vehicle
2017
This paper presents a methodology aimed to acquire traffic flow data through the employment of unmanned aerial vehicles (UAVs). The study is focused on the determination of driving behavior parameters of road users and on the reconstruction of traffic flow Origin/Destination matrix. The methodology integrates UAV flights with video image processing technique, and the capability of geographic information systems, to represent spatiotemporal phenomena. In particular, analyzing different intersections, the attention of the authors is focused on users’ gap acceptance in a naturalistic drivers’ behavior condition (drivers are not influenced by the presence of instruments and operators on the roa…
Ant Colony Optimisation-Based Classification Using Two-Dimensional Polygons
2016
The application of Ant Colony Optimization to the field of classification has mostly been limited to hybrid approaches which attempt at boosting the performance of existing classifiers (such as Decision Trees and Support Vector Machines (SVM)) — often through guided feature reductions or parameter optimizations.
Stealthy Attacks in Cloud-Connected Linear Impulsive Systems
2018
This paper studies a security problem for a class cloud-connected multi-agent systems, where autonomous agents coordinate via a combination of short-range ad-hoc commu- nication links and long-range cloud services. We consider a simplified model for the dynamics of a cloud-connected multi- agent system and attacks, where the states evolve according to linear time-invariant impulsive dynamics, and attacks are modeled as exogenous inputs designed by an omniscent attacker that alters the continuous and impulsive updates. We propose a definition of attack detectability, characterize the existence of stealthy attacks as a function of the system parameters and attack properties, and design a fami…
Summarizing Large Scale 3D Mesh
2018
International audience; Recent progress in 3D sensor devices and in semantic mapping allows to build very rich HD 3D maps very useful for autonomous navigation and localization. However , these maps are particularly huge and require important memory capabilities as well computational resources. In this paper, we propose a new method for summarizing a 3D map (Mesh) as a set of compact spheres in order to facilitate its use by systems with limited resources (smartphones, robots, UAVs, ...). This vision-based summarizing process is applied in a fully automatic way using jointly photometric, geometric and semantic information of the studied environment. The main contribution of this research is…
Extreme minimal learning machine: Ridge regression with distance-based basis
2019
The extreme learning machine (ELM) and the minimal learning machine (MLM) are nonlinear and scalable machine learning techniques with a randomly generated basis. Both techniques start with a step in which a matrix of weights for the linear combination of the basis is recovered. In the MLM, the feature mapping in this step corresponds to distance calculations between the training data and a set of reference points, whereas in the ELM, a transformation using a radial or sigmoidal activation function is commonly used. Computation of the model output, for prediction or classification purposes, is straightforward with the ELM after the first step. In the original MLM, one needs to solve an addit…
Accelerated bearing life-Time test rig development for low speed data acquisition
2017
Condition monitoring plays an important role in rotating machinery to ensure reliability of the equipment, and to detect fault conditions at an early stage. Although health monitoring methodologies have been thoroughly developed for rotating machinery, low-speed conditions often pose a challenge due to the low signal-to-noise ratio. To this aim, sophisticated algorithms that reduce noise and highlight the bearing faults are necessary to accurately diagnose machines undergoing this condition. In the development phase, sensor data from a healthy and damaged bearing rotating at low-speed is required to verify the performance of such algorithms. A test rig for performing accelerated life-time t…
BIAM: a new bio-inspired analysis methodology for digital ecosystems based on a scale-free architecture
2017
Today we live in a world of digital objects and digital technology; industry and humanities as well as technologies are truly in the midst of a digital environment driven by ICT and cyber informatics. A digital ecosystem can be defined as a digital environment populated by interacting and competing digital species. Digital species have autonomous, proactive and adaptive behaviors, regulated by peer-to-peer interactions without central control point. An interconnecting architecture with few highly connected nodes (hubs) and many low connected nodes has a scale- free architecture. A new bio-inspired analysis methodology (BIAM) environment, an investigation strategy for information flow, fault…