ISSN 0253-2778

CN 34-1054/N

2014 Vol. 44, No. 10

Display Method:
Original Paper
A gait pattern planning algorithm based on linear coupled oscillator model for humanoid robots
WANG Liuqing, SHANG Weiwei
2014, 44(10): 795-803. doi: 10.3969/j.issn.0253-2778.2014.10.001
Abstract:
For the gait pattern planning algorithm of humanoid robots with the linear coupled oscillator model, some oscillator parameters were chosen by manual adjustment, which makes it difficult to get the parameters values that could ensure stable walking. To reduce the time of parameter selection and sim...
A digital control approach for unstable-first-order- plus-dead-time systems with P and PI controllers
LENG Tongtong, YAN Peng
2014, 44(10): 804-810. doi: 10.3969/j.issn.0253-2778.2014.10.002
Abstract:
Many dynamical systems can be modeled by unstable-first-order-plus-dead-time (UFOPDT) transfer functions. However, analysis and synthesis of UFOPDT systems are much more challenging due to the general difficulties of infinite dimensionality and the instability of the plant. Considering the control o...
Markovian quantum subsystems and stabilization design
YAO Xiang, KUANG Sen
2014, 44(10): 811-817. doi: 10.3969/j.issn.0253-2778.2014.10.003
Abstract:
Quantum subsystems have been widely applied in the field of quantum information processing and control, so active control over quantum subsystems is of great importance. For Markovian open quantum dynamical model, some main theoretical results on invariant and attractive subsystems are summarized, a...
Design and analysis of a universal model reference adaptive controller based on extended state observer
LI Jie, QI Xiaohui, ZHEN Hongtao, LIU Xinhai
2014, 44(10): 818-827. doi: 10.3969/j.issn.0253-2778.2014.10.004
Abstract:
A universal model reference adaptive control (MRAC) method based on extended state observer (ESO) was presented, which was used to directly estimate states and uncertainties and then compensate the uncertainties. Benefiting from the ESO, we only need to know the order of a system without distinction...
Mobile location tracking based on NLOS identification in indoor environments
ZHANG Yanlong, CHEN Weidong, CHEN Chang
2014, 44(10): 828-834. doi: 10.3969/j.issn.0253-2778.2014.10.005
Abstract:
NLOS propagation is one of the key factors that affect tracking accuracy in indoor environments. An adaptive tracking algorithm was proposed to mitigate the NLOS error for indoor mobile localization. The correlation between adjacent NLOS errors in time was analyzed and exploited. A modified extended...
Constructing hash function from plaintext to Huff curves
YU Wei, WANG Kunpeng, LI Bao
2014, 44(10): 835-838. doi: 10.3969/j.issn.0253-2778.2014.10.006
Abstract:
A deterministic function with its time complexity being O(log3q) was constructed for the first time from a finite field Fq to Huff curves. Based on this function, construct a hash function from plaintext into Huff curves. The Hash function laid the foundation for identity-based protocols on e...
A detection algorithm based on matrix factorization for live mitochondria in fluorescent microscopic images
JIA Xiaomeng, NIE Yongming, DU Sidan
2014, 44(10): 839-843. doi: 10.3969/j.issn.0253-2778.2014.10.007
Abstract:
Detection of mitochondria in fluorescent microscopic images is one of the most important methods in studies concerning apoptosis and the nature of life phenomena in the area of biomedical image processing. Limited by fluorescence microscopy, fluorescent microscopic images contain two parts which are...
A robust approximate algorithm for large-scale clustering of visual features
LI Darui, YANG Linjun, HUA Xiansheng, ZHANG Hongjiang
2014, 44(10): 844-852. doi: 10.3969/j.issn.0253-2778.2014.10.008
Abstract:
The large-scale clustering problem of visual features is crucial for image recognition and retrieval. The state-of-the-art algorithm, the approximate k-means, approximately guarantees the clustering performance by applying the high-precision approximate search. An improved algorithm was proposed, wh...
An approach to evaluate the effectiveness of privacy protection in Android system
ZENG Shuke, ZHANG Yang, CHENG Liang, DENG Yi, FENG Dengguo
2014, 44(10): 853-861. doi: 10.3969/j.issn.0253-2778.2014.10.009
Abstract:
To protect private data in smart phones, Android enforces a permission-based security policy. PrivacyMiner, a tool for evaluating the effectiveness of privacy protection in Android, was designed. First, 22 categories of private data in smart phones were identified, which were then checked to see if ...
Research on misjudgment of inter-AP handoff for on-board Wi-Fi applications
KANG Yuwen, ZOU Fumin, KANG Xingbin, ZHU Quan
2014, 44(10): 862-866. doi: 10.3969/j.issn.0253-2778.2014.10.010
Abstract:
At different scan intervals and moving speeds, simulation and experimental studies have been carried out for the misjudgment performance of inter-AP handoff for on-board Wi-Fi applications. The results show that, in a fast-moving environment, if the scan interval is reasonable, the misjudgment rate ...
Asynchronous parallelism weighted A* algorithm for the finding shortest path on road networks
LENG Xuntai, SUN Guangzhong
2014, 44(10): 867-873. doi: 10.3969/j.issn.0253-2778.2014.10.011
Abstract:
Finding the shortest path is a classic problem with numerous applications. For road networks, it is desirable to find a sufficient short path within a limited period of time, and find a shorter path if there is more time. Since the traditional shortest path algorithms did not consider this constrain...
An efficient lower-bounding approach to point-to-point shortest path problem
ZHANG Zhong, LV Min, SUN Guangzhong, CHEN Guoliang
2014, 44(10): 874-880. doi: 10.3969/j.issn.0253-2778.2014.10.012
Abstract:
Querying for the shortest path from a source vertex to a sink vertex in real time is a fundamental problem in numerous applications. Several lower-bounding schemes have been proposed to solve the problem so far, such as A* search and ALT algorithm. But these schemes adopted loose valuations on dista...