Results 111 to 120 of about 637 (264)

Optimal Homogeneous ℒp$$ {\boldsymbol{\mathcal{L}}}_{\boldsymbol{p}} $$‐Gain Controller

open access: yesInternational Journal of Robust and Nonlinear Control, EarlyView.
ABSTRACT Nonlinear ℋ∞$$ {\mathscr{H}}_{\infty } $$‐controllers are designed for arbitrarily weighted, continuous homogeneous systems with a focus on systems affine in the control input. Based on the homogeneous ℒp$$ {\mathcal{L}}_p $$‐norm, the input–output behavior is quantified in terms of the homogeneous ℒp$$ {\mathcal{L}}_p $$‐gain as a ...
Daipeng Zhang   +3 more
wiley   +1 more source

Optimal Gain Selection for the Arbitrary‐Order Homogeneous Differentiator

open access: yesInternational Journal of Robust and Nonlinear Control, EarlyView.
ABSTRACT Differentiation of noisy signals is a relevant and challenging task. Widespread approaches are the linear high‐gain observer acting as a differentiator and Levant's robust exact differentiator with a discontinuous right‐hand side. We consider the family of arbitrary‐order homogeneous differentiators, which includes these special cases.
Benjamin Calmbach   +2 more
wiley   +1 more source

A Cascaded Strategy With Embodied Artificial Intelligence: Forward Kinematics Solutions for CCRobot‐S

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT This paper presents a novel cable‐climbing mechanism: the Collaborative Climbing Robot Squad (CCRobot‐S), a variant of Reconfigurable Cable‐Driven Parallel Robots (R‐CDPR), specifically designed for the inspection and maintenance of stay cables.
Zhenliang Zheng   +4 more
wiley   +1 more source

Key Technical Fields and Future Outlooks of Space Manipulators: A Survey

open access: yesSmartBot, EarlyView.
This paper systematically reviews the technological development of space manipulators, emphasizing the unique challenges posed by space environments. It examines four areas: structural design, modeling, planning, and control, while introducing typical ground test platforms.
Gang Chen   +12 more
wiley   +1 more source

Precision Stress Engineering in Tensegrity‐Inspired Nanoarchitectures Enabled by Size‐Affected Shrinkage

open access: yesSmall, EarlyView.
This work identifies a size‐dependent shrinkage effect that arises during polymer pyrolysis and uses it to embed residual stress into tensegrity‐inspired nanoarchitectures. By adjusting the dimensions of the structural elements, controlled prestress can be introduced in a simple and repeatable manner, enabling mechanically tunable nanostructures with ...
Amitha R. Mulastham   +6 more
wiley   +1 more source

Modeling the Thermal Properties of Hydrogen‐Based Direct Reduced Iron Using Computational Thermodynamics and Machine Learning

open access: yessteel research international, EarlyView.
Hydrogen‐based direct reduced iron (H‐DRI) melts differently from scrap and carbon‐bearing DRI. This work combines differential scanning calorimetry experiments, FactSage thermodynamics, and simple composition‐based regression to predict solidus, liquidus, heat capacity, and enthalpy for H‐DRI.
Ankur Agnihotri   +3 more
wiley   +1 more source

Research on a Drone‐Based Vacant Parking Detection System

open access: yesIEEJ Transactions on Electrical and Electronic Engineering, EarlyView.
It can be difficult to know which spaces are available in parking lots and bicycle parking areas, so knowing the availability status is necessary for efficient parking. Therefore, in this study, we developed the drone that can display the availability status. Availability is determined by whether it can read a QR code attached to the ground. To conduct
Hiroki Mineshita   +2 more
wiley   +1 more source

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy