为解决PBRF-SLAM中由于粒子退化和粒子耗尽而导致的定位失真和建图一致性差的问题,提出了基于海鸥优化和最小方差重采样的优化方法。在PRBF-SLAM的采样过程中,采样一系列辅助粒子,并利用海鸥优化算法对这些粒子进行寻优,找到估计位姿的...为解决PBRF-SLAM中由于粒子退化和粒子耗尽而导致的定位失真和建图一致性差的问题,提出了基于海鸥优化和最小方差重采样的优化方法。在PRBF-SLAM的采样过程中,采样一系列辅助粒子,并利用海鸥优化算法对这些粒子进行寻优,找到估计位姿的最优解,从而避免因陷入局部极值导致的粒子退化。在PRBF-SLAM的重采样过程中,采用最小方差重采样方法替换原先的重采样方法,充分使用辅助粒子,尽可能保证重采样后粒子的多样性。利用Intel Research Lab和ACES Building公开数据集进行SLAM仿真,结果表明优化后的算法相比Gmapping算法总体的平移误差分别降低了36.36%和41.67%,总体的旋转误差分别降低了33.33%和40%。展开更多
We suggest a design method of graded-refractive-index (GRIN) antireflection (AR) coating for s-polarized or p- polarized light at off-normal incidence. The spectrum characteristic of the designed antireflection co...We suggest a design method of graded-refractive-index (GRIN) antireflection (AR) coating for s-polarized or p- polarized light at off-normal incidence. The spectrum characteristic of the designed antireflection coating with a quintic effective refractive-index profile for a given state of polarization has been discussed. In addition, the genetic algorithm was used to optimize the refractive index profile of the GRIN antireflection for reducing the mean reflectance of s- and p-polarizations. The average reflectance loss was reduced to only 0.04% by applying optimized GRIN AR coatings onto BK7 glass over the wavelength range from 400 to 800 nm at the incident angle of θo = 70°.展开更多
Experiment statistical method and genetic algorithms based optimization method are used to obtain the optimum differential gear ratio for heavy truck that provides best fuel consumption when changing the working condi...Experiment statistical method and genetic algorithms based optimization method are used to obtain the optimum differential gear ratio for heavy truck that provides best fuel consumption when changing the working condition that affects its torque and speed range. The aim of the study is to obtain the optimum differential gear ratio with fast and accurate optimization calculation without affecting drivability characteristics of the vehicle according to certain driving cycles that represent the new working conditions of the truck. The study is carried on a mining dump truck YT3621 with 9 for- ward shift manual transmission. Two loading conditions, no load and 40 t, and four on road real driving cycles have been discussed. The truck powertrain is modeled using GT-drive, and DOE -post processing tool of the GT-suite is used for DOE analysis and genetic algorithm optimization.展开更多
This paper proposes the alternating direction method of multipliers-based infinity-norm(ADMIN) with threshold(ADMIN-T) and with percentage(ADMIN-P) detection algorithms,which make full use of the distribution of the s...This paper proposes the alternating direction method of multipliers-based infinity-norm(ADMIN) with threshold(ADMIN-T) and with percentage(ADMIN-P) detection algorithms,which make full use of the distribution of the signal to interference plus noise ratio(SINR) for an uplink massive MIMO system.The ADMIN-T and ADMIN-P detection algorithms are improved visions of the ADMIN detection algorithm,in which an appropriate SINR threshold in the ADMIN-T detection algorithm and a certain percentage in the ADMIN-P detection algorithm are designed to reduce the overall computational complexity.The detected symbols are divided into two parts by the SINR threshold which is based on the cumulative probability density function(CDF) of SINR and a percentage,respectively.The symbols in higher SINR part are detected by MMSE.The interference of these symbols is then cancelled by successive interference cancellation(SIC).Afterwards the remaining symbols with low SINR are iteratively detected by ADMIN.The simulation results show that the ADMIIN-T and the ADMIN-P detection algorithms provide a significant performance gain compared with some recently proposed detection algorithms.In addition,the computational complexity of ADMIN-T and ADMIN-P are significantly reduced.Furthermore,in the case of same number of transceiver antennas,the proposed algorithms have a higher performance compared with the case of asymmetric transceiver antennas.展开更多
In order to improve the ability of a bionic quadruped robot to percept the location of obstacles in a complex and dynamic environment, the information fusion between an ultrasonic sensor and a binocular sensor was stu...In order to improve the ability of a bionic quadruped robot to percept the location of obstacles in a complex and dynamic environment, the information fusion between an ultrasonic sensor and a binocular sensor was studied under the condition that the robot moves in the Walk gait on a structured road. Firstly, the distance information of obstacles from these two sensors was separately processed by the Kalman filter algorithm, which largely reduced the noise interference. After that, we obtained two groups of estimated distance values from the robot to the obstacle and a variance of the estimation value. Additionally, a fusion of the estimation values and the variances was achieved based on the STF fusion algorithm. Finally, a simulation was performed to show that the curve of a real value was tracked well by that of the estimation value, which attributes to the effectiveness of the Kalman filter algorithm. In contrast to statistics before fusion, the fusion variance of the estimation value was sharply decreased. The precision of the position information is 4. 6 cm, which meets the application requirements of the robot.展开更多
Public key cryptographic (PKC) algorithms, such as the RSA, elliptic curve digital signature algorithm (ECDSA) etc., are widely used in the secure communication sys- tems, such as OpenSSL, and a variety of in- for...Public key cryptographic (PKC) algorithms, such as the RSA, elliptic curve digital signature algorithm (ECDSA) etc., are widely used in the secure communication sys- tems, such as OpenSSL, and a variety of in- formation security systems. If designer do not securely implement them, the secret key will be easily extracted by side-channel attacks (SCAs) or combinational SCA thus mitigat- ing the security of the entire communication system. Previous countermeasures of PKC im- plementations focused on the core part of the algorithms and ignored the modular inversion which is widely used in various PKC schemes. Many researchers believe that instead of straightforward implementation, constant time modular inversion (CTMI) is enough to resist the attack of simple power analysis combined with lattice analysis. However, we find that the CTMI security can be reduced to a hidden t-bit multiplier problem. Based on this feature, we firstly obtain Hamming weight of interme- diate data through side-channel leakage. Then, we propose a heuristic algorithm to solve the problem by revealing the secret (partial and full) base of CTMI. Comparing previous nec-essary input message for masking filtering, our procedure need not any information about the secret base of the inversion. To our knowl- edge, this is the first time for evaluating the practical security of CTM! and experimental results show the fact that CTMI is not enough for high-level secure communication systems.展开更多
文摘为解决PBRF-SLAM中由于粒子退化和粒子耗尽而导致的定位失真和建图一致性差的问题,提出了基于海鸥优化和最小方差重采样的优化方法。在PRBF-SLAM的采样过程中,采样一系列辅助粒子,并利用海鸥优化算法对这些粒子进行寻优,找到估计位姿的最优解,从而避免因陷入局部极值导致的粒子退化。在PRBF-SLAM的重采样过程中,采用最小方差重采样方法替换原先的重采样方法,充分使用辅助粒子,尽可能保证重采样后粒子的多样性。利用Intel Research Lab和ACES Building公开数据集进行SLAM仿真,结果表明优化后的算法相比Gmapping算法总体的平移误差分别降低了36.36%和41.67%,总体的旋转误差分别降低了33.33%和40%。
基金Project supported by the National Natural Science Foundation of China(Grant Nos.10704079 and 10976030)
文摘We suggest a design method of graded-refractive-index (GRIN) antireflection (AR) coating for s-polarized or p- polarized light at off-normal incidence. The spectrum characteristic of the designed antireflection coating with a quintic effective refractive-index profile for a given state of polarization has been discussed. In addition, the genetic algorithm was used to optimize the refractive index profile of the GRIN antireflection for reducing the mean reflectance of s- and p-polarizations. The average reflectance loss was reduced to only 0.04% by applying optimized GRIN AR coatings onto BK7 glass over the wavelength range from 400 to 800 nm at the incident angle of θo = 70°.
文摘Experiment statistical method and genetic algorithms based optimization method are used to obtain the optimum differential gear ratio for heavy truck that provides best fuel consumption when changing the working condition that affects its torque and speed range. The aim of the study is to obtain the optimum differential gear ratio with fast and accurate optimization calculation without affecting drivability characteristics of the vehicle according to certain driving cycles that represent the new working conditions of the truck. The study is carried on a mining dump truck YT3621 with 9 for- ward shift manual transmission. Two loading conditions, no load and 40 t, and four on road real driving cycles have been discussed. The truck powertrain is modeled using GT-drive, and DOE -post processing tool of the GT-suite is used for DOE analysis and genetic algorithm optimization.
基金This work was supported in part by the National Natural Science Foundation of China(NSFC)under grant numbers 61671047,61775015 and U2006217.
文摘This paper proposes the alternating direction method of multipliers-based infinity-norm(ADMIN) with threshold(ADMIN-T) and with percentage(ADMIN-P) detection algorithms,which make full use of the distribution of the signal to interference plus noise ratio(SINR) for an uplink massive MIMO system.The ADMIN-T and ADMIN-P detection algorithms are improved visions of the ADMIN detection algorithm,in which an appropriate SINR threshold in the ADMIN-T detection algorithm and a certain percentage in the ADMIN-P detection algorithm are designed to reduce the overall computational complexity.The detected symbols are divided into two parts by the SINR threshold which is based on the cumulative probability density function(CDF) of SINR and a percentage,respectively.The symbols in higher SINR part are detected by MMSE.The interference of these symbols is then cancelled by successive interference cancellation(SIC).Afterwards the remaining symbols with low SINR are iteratively detected by ADMIN.The simulation results show that the ADMIIN-T and the ADMIN-P detection algorithms provide a significant performance gain compared with some recently proposed detection algorithms.In addition,the computational complexity of ADMIN-T and ADMIN-P are significantly reduced.Furthermore,in the case of same number of transceiver antennas,the proposed algorithms have a higher performance compared with the case of asymmetric transceiver antennas.
基金Supported by the Ministerial Level Advanced Research Foundation(40401060305)
文摘In order to improve the ability of a bionic quadruped robot to percept the location of obstacles in a complex and dynamic environment, the information fusion between an ultrasonic sensor and a binocular sensor was studied under the condition that the robot moves in the Walk gait on a structured road. Firstly, the distance information of obstacles from these two sensors was separately processed by the Kalman filter algorithm, which largely reduced the noise interference. After that, we obtained two groups of estimated distance values from the robot to the obstacle and a variance of the estimation value. Additionally, a fusion of the estimation values and the variances was achieved based on the STF fusion algorithm. Finally, a simulation was performed to show that the curve of a real value was tracked well by that of the estimation value, which attributes to the effectiveness of the Kalman filter algorithm. In contrast to statistics before fusion, the fusion variance of the estimation value was sharply decreased. The precision of the position information is 4. 6 cm, which meets the application requirements of the robot.
基金supported by the Key Technology Research and Sample-Chip Manufacture on Resistance to Physical Attacks at Circuit Level(546816170002)
文摘Public key cryptographic (PKC) algorithms, such as the RSA, elliptic curve digital signature algorithm (ECDSA) etc., are widely used in the secure communication sys- tems, such as OpenSSL, and a variety of in- formation security systems. If designer do not securely implement them, the secret key will be easily extracted by side-channel attacks (SCAs) or combinational SCA thus mitigat- ing the security of the entire communication system. Previous countermeasures of PKC im- plementations focused on the core part of the algorithms and ignored the modular inversion which is widely used in various PKC schemes. Many researchers believe that instead of straightforward implementation, constant time modular inversion (CTMI) is enough to resist the attack of simple power analysis combined with lattice analysis. However, we find that the CTMI security can be reduced to a hidden t-bit multiplier problem. Based on this feature, we firstly obtain Hamming weight of interme- diate data through side-channel leakage. Then, we propose a heuristic algorithm to solve the problem by revealing the secret (partial and full) base of CTMI. Comparing previous nec-essary input message for masking filtering, our procedure need not any information about the secret base of the inversion. To our knowl- edge, this is the first time for evaluating the practical security of CTM! and experimental results show the fact that CTMI is not enough for high-level secure communication systems.