Interpolation Technique for Sparse Data Based on Information Diffusion Principle—Ellipse Model

Total Page:16

File Type:pdf, Size:1020Kb

Interpolation Technique for Sparse Data Based on Information Diffusion Principle—Ellipse Model Vol.19 No.1 JOURNAL OF TROPICAL METEOROLOGY March 2013 Article ID: 1006-8775(2013) 01-0059-08 INTERPOLATION TECHNIQUE FOR SPARSE DATA BASED ON INFORMATION DIFFUSION PRINCIPLE—ELLIPSE MODEL 1 1 1 2 ZHANG Ren (张 韧) , HUANG Zhi-song (黄志松) , LI Jia-xun (李佳讯) , LIU Wei (刘 巍) (1. College of Meteorology and Oceanography, PLA University of Science and Technology, Nanjing 211101 China; 2. School of Information Science and Technology, Southwest Jiaotong University, Chengdu 610031 China) Abstract: Addressing the difficulties of scattered and sparse observational data in ocean science, a new interpolation technique based on information diffusion is proposed in this paper. Based on a fuzzy mapping idea, sparse data samples are diffused and mapped into corresponding fuzzy sets in the form of probability in an interpolation ellipse model. To avoid the shortcoming of normal diffusion function on the asymmetric structure, a kind of asymmetric information diffusion function is developed and a corresponding algorithm-ellipse model for diffusion of asymmetric information is established. Through interpolation experiments and contrast analysis of the sea surface temperature data with ARGO data, the rationality and validity of the ellipse model are assessed. Key words: information diffusion; interpolation algorithm; sparse data; ellipse model CLC number: P731/O241.3 Document code: A 1 INTRODUCTION the ARGO data: the average array interval of ARGO floats was about 300 km, and there is only one profile Accurate and reliable oceanic observational data about every 10 days for each ARGO float. For are very important for marine research and regional oceanic and atmospheric research, the ARGO ocean-atmosphere numerical forecast. However, the data is sparse in space and discrete in time. For partial most difficult obstacle nowadays is the lack of key sea areas, such as the South China Sea and the oceanic environmental data and the lack of data northwest Pacific, the temporal-spatial resolution of analysis and information extraction technique. ARGO data is far from enough. Considering the ARGO (Array for Real-time Geostrophic factors of floats shift and the difference of measuring Oceanography) is a global oceanic observation and periods and regional distribution, the available ARGO investigation project proposed and supported by the data are even rare[2]. United States, Great Britain, France, Japan, China, Interpolation algorithms are common techniques and other countries. The goal of the ARGO project is for estimating and approaching the missing to establish a global real-time observational network information with nearby data. The current which consists of about 3000 automation floats and interpolation algorithms contain the Newton method, can quickly and accurately collect the global Lagrange method, spline interpolation, polynomial temperature and salinity profiling data and their interpolation, finite element method, weighing characteristics. The global ARGO observational function method, variational method, spectrum network can provide more than 10,000 temperature method, successive correction method, optimal and salinity real-time observational profiles monthly. interpolation and so on[3, 4], which can basically meet The ARGO data has such advantages as vast spatial the needs of the interpolation and fitting of large-scale range, long duration and sufficient observational atmospheric and oceanic data. factors and supports whole weather detection, which However, a key premise involved is that the can efficiently make up for the shortage of the oceanic above interpolated techniques need to be provided environment data, especially the observations in the [1] with sufficient data and related information. If the deep layers . observational data is too rare, the precision and However, there are some inherent limitations in reliability of the interpolation algorithm will be Received 2011-04-21; Revised 2012-10-23; Accepted 2013-01-15 Foundation item: Project of Natural Science Foundation of China (41276088) Biography: ZHANG Ren, Ph.D., professor, primarily undertaking research on air-sea interaction. Corresponding author: ZHANG Ren, e-mail: [email protected] 60 Journal of Tropical Meteorology Vol.19 restricted greatly. There is universal scattered and Matrix probability density function estimation sparse observational data such as ARGO data in the through the information diffusion principle is called oceanic environment, but the general interpolation diffusion estimation. The exact definition of the techniques have serious limitations in dealing with diffusion estimation is defined as follows. If μ ( x) such type of data[5]. From the analysis above, it has important scientific meaning and practical value to is defined on a Borel measurable function ll− develop new interpolation techniques to address the in (−∞+∞, ) , d > 0 is a constant, x = i , then issue of sparse observation data. Ellipse interpolation d algorithm model—a new interpolation technique for n ˆ 1 ⎡⎤ll− i dealing with sparse data based on the information fl()= ∑ μ ⎢⎥ (1) diffusion principle—was proposed in this paper. ndi i=1 ⎣⎦ d is the diffusion estimation of the matrix probability 2 THE PRINCIPLE OF INFORMATION density function f ()l where μ ()x is the diffusion DIFFUSION INTERPOLATION function and d is the window width. 2.1 The Principle of information diffusion 2.2 The idea of information diffusion The technique of information diffusion is a concept of research and a mathematic model put In this paper, the idea of information diffusion is forward for solving the imperfect information existing introduced into the fitting and interpolation of sparse in evaluating strong natural disasters, such as data and a new interpolation technique—algorithm for earthquake, storm surge, mudslides, and etc[6], which information diffusion and interpolation, which is are characterized by high degree of severity and small suitable for sparse data and small samples, is samples. Information diffusion is a fuzzy mathematic proposed. method by optimizing the fuzzy information of 2.2.1 FUZZY MAPPING RELATIONSHIP BETWEEN INPUT samples in order to make up for the missing AND OUTPUT information and can effectively deal with the imperfect sample information by transforming single For an input-output system, Ω is denoted as the samples into fuzzy-set samples in the form of matrix, x as the input variable, y as the output [7] probability . Now, the information diffusion variable, X as the input set, and Y as the output technique is only used for the risk assessment of the set, viz. x ∈ X , y ∈Y , Ω=X ×Y . small-sample events[8-10], and its idea is suitable for solving the imperfect data such as sparse data Let f (,xy ) be the probability density function interpolation. of matrix Ω , then the density of condition probability of y is described as follows with Suppose that WWW= { 12L Wn} is the x = u . knowledge sample series, L the underlying domain, fYX| (|)yu= fuy (,) fuvdv (,) . (2) and the observational value of Wi is li . Let ∫ vY∈ x =−φ ()lli , then if W is imperfect, there is a Based on the fuzzy-set idea, the Ω input-output system is defined to be an output fuzzy set B under function μ ()x which can make the li point % a given input, the membership function of fuzzy set information (value-1) diffuse into l with μ x . ( ) B% is corresponding to the probability density The diffused information distribution pattern function of output, and the normalized results of the nn probability density function are a membership Ql()==∑∑μμφ ( x )() ( l − li ) can better function, i.e., the membership function of fuzzy set jj==11 B% is described as follows, describe the whole structure of W , which is called the information diffusion principle[6]. fuy(, ) fuvdv (,) ∫ fuy(, ) μ ()y ==vY∈ . (3) B% ⎧⎫max{}f (u ,y ) max⎨⎬fuy ( , ) fuvdv ( , ) yY∈ yY∈ ∫ ⎩⎭vY∈ Therefore, in the input-output system, for any given input x ( x ∈ X ), its whole potential output 60 No.1 ZHANG Ren (张 韧), HUANG Zhi-song (黄志松) et al. 61 can be denoted by the fuzzy set B% , which is the n Let qxy= μ , , marked as q , fuzzy mapping relationship between input and output. uvjk∑ uv jk() i i jk Generally, the probability density function i=1 st f (,xy ) of the matrix Ω is hardly acquired at hand tq= ∑∑ jk . By information diffusion, the but currently estimated by mass statistics of samples. jk==11 Under the condition of rare data information, it will estimation of probability density function at point still be given an approximated estimation of the (,)uv in the Ω input-output system can be distribution of whole probability density by the jk information diffusion based on a few sample data denoted as obtained. q fuˆ(,) v = jk . (4) jk t 2.2.2 ESTIMATION OF INFORMATION DIFFUSION FUNCTION S is a set of small sample series for a 2.2.3 MAPPING INTERPOLATION WITH INFORMATION DIFFUSION constructed Ω input/output system, denoted as Substitute the information diffusion estimation Sxyxyxy= {(11 , ),( 2 , 2 ),L (nn , )} . fˆ(,)uv of the probability density function into the For the lack of samples, the probability density jk function is often hardly constructed by current input-output mapping relationship formula (3). When common statistical analysis methods. the input is u , the output is as follows: In the principle of information diffusion, small fuyˆ(, ) samples series S can be regarded as the information B% ==μ ()yy y.(5) ∫∫B% ˆ points scattering in the input/output phase space yY∈∈ yYmaxfuy ( , ) yY∈ {} X ×Y . By point-set mapping, each sample data can be diffused
Recommended publications
  • The Romance of the Three Kingdoms Podcast. This Is Episode 78. Hey
    Welcome to the Romance of the Three Kingdoms Podcast. This is episode 78. Hey, guess what? We just passed the midway point of the novel, and guess what? We still don’t have three kingdoms in this Romance of the THREE Kingdoms. But stay with me, because we’re about to take a big step toward that this week. So last time, we left Liu Bei in a bit of a dicey situation. His plot with Zhang Song to take over the Riverlands leaked out, and Zhang Song lost his head because of it. Not only that, Liu Zhang was ­­ at long last ­­ on to his dear kinsman’s true intentions and ordered his men to strengthen defenses at all the key points. While this was going on, Liu Bei was putting into action his own plan, which called for pretending that he was leaving the Riverlands. His first stop was going to be Fucheng (2,2), and he sent word on ahead to the two generals defending Fu (2) River Pass that he would like to bid them goodbye before he left. The two officers, Yang (2) Huai (2) and Gao (1) Pei (4), had long been suspicious of Liu Bei, and they decided that this would be the perfect opportunity to assassinate him. So they each stashed a dagger under their clothes and took 200 men with them to go see Liu Bei. Meanwhile, as Liu Bei was approaching the Fu (2) River, his military strategist Pang Tong advised him, “If Yang Huai and Gao Pei come to meet us without hesitation, we must be on guard.
    [Show full text]
  • 2018 IEEE CSAA Guidance, Navigation and Control Conference
    2018 IEEE CSAA Guidance, Navigation and Control Conference (CGNCC 2018) Xiamen, China 10 – 12 August 2018 Pages 1-654 IEEE Catalog Number: CFP1829X-POD ISBN: 978-1-5386-1172-2 1/4 Copyright © 2018 by the Institute of Electrical and Electronics Engineers, Inc. All Rights Reserved Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid through Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. For other copying, reprint or republication permission, write to IEEE Copyrights Manager, IEEE Service Center, 445 Hoes Lane, Piscataway, NJ 08854. All rights reserved. *** This is a print representation of what appears in the IEEE Digital Library. Some format issues inherent in the e-media version may also appear in this print version. IEEE Catalog Number: CFP1829X-POD ISBN (Print-On-Demand): 978-1-5386-1172-2 ISBN (Online): 978-1-5386-1171-5 Additional Copies of This Publication Are Available From: Curran Associates, Inc 57 Morehouse Lane Red Hook, NY 12571 USA Phone: (845) 758-0400 Fax: (845) 758-2633 E-mail: [email protected] Web: www.proceedings.com TABLE OF CONTENTS STUDY ON LOW ENERGY MOON RETURN ORBIT CONSTRUCTION AND LOW THRUST PROPULSION CONTROL STRATEGY ........................................................................................................................... 1 Yue Liu ; Yingjing Qian ; Wuxing Jing EVOLVEMENT LAWS OF MAGNETIC DIPOLES INTERACTION AND ITS APPLICATION TO SPACECRAFT SELF- AND SOFT-DOCKING* ..............................................................................................................
    [Show full text]
  • Immortality of the Spirit: Chinese Funerary Art from the Han and Tang Dynasties Exhibition Catalogue
    Fairfield University DigitalCommons@Fairfield Immortality of the Spirit: Chinese Funerary Art Immortality of the Spirit - Ephemera from the Han and Tang Dynasties 4-2012 Immortality of the Spirit: Chinese Funerary Art from the Han and Tang Dynasties Exhibition Catalogue Jill J. Deupi Fairfield University, [email protected] Ive Covaci Fairfield University Leopold Swergold Follow this and additional works at: https://digitalcommons.fairfield.edu/immortality_ephemera Recommended Citation Deupi, Jill J.; Covaci, Ive; and Swergold, Leopold, "Immortality of the Spirit: Chinese Funerary Art from the Han and Tang Dynasties Exhibition Catalogue" (2012). Immortality of the Spirit - Ephemera. 1. https://digitalcommons.fairfield.edu/immortality_ephemera/1 This item has been accepted for inclusion in DigitalCommons@Fairfield by an authorized administrator of DigitalCommons@Fairfield. It is brought to you by DigitalCommons@Fairfield with permission from the rights- holder(s) and is protected by copyright and/or related rights. You are free to use this item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses, you need to obtain permission from the rights-holder(s) directly, unless additional rights are indicated by a Creative Commons license in the record and/or on the work itself. For more information, please contact [email protected]. Immortality of the Spirit: Chinese Funerary Art from the Han and Tang Dynasties 1 ust over a year ago, Jane and Leopold Swergold surprised
    [Show full text]
  • Dynasty Warriors 4 TOTAL Guide
    Dynasty Warriors 4 TOTAL Guide By ReVeLaTeD Original Creation Date: 3-29-03 Version 1.01 Build 4403 This guide is a project of ReVeLaTeD, representing Digital Legacy Networks. All content within is copyrighted to Muni 1 Shinobu, and as such, the information is NOT to be duplicated or reproduced, digitally or physically, without express consent of the content owner. Any questions about specific information should be referred directly to Muni Shinobu. Any questions about format, layout, or presentation of this document or the items therein should be referred directly to ReVeLaTeD. Any violation of this edict shall be prosecuted to the fullest extent of the law in your area. Dynasty Warriors 4 TOTAL Guide Itinerary ITINERARY...................................................................................................................................................................2 INTRODUCTION.........................................................................................................................................................3 LEVEL 10 WEAPONS ................................................................................................................................................4 SHU .............................................................................................................................................................................. 4 WEI ..............................................................................................................................................................................
    [Show full text]
  • The Romance of the Three Kingdoms Podcast. This Is Episode 80. Last
    Welcome to the Romance of the Three Kingdoms Podcast. This is episode 80. Last time, Liu Bei had lost Master Young Phoenix, Pang Tong, to an ambush. So he asked Zhuge Liang to come to the Riverlands to bail him out. Zhuge Liang left Guan Yu in charge of Jing Province and set off. He sent Zhang Fei along the main land route while he himself traveled by water with the general Zhao Yun. Zhang Fei had little trouble from the locals until he reached Ba (1) County, where a stubborn general named Yan Yan dared to stand in his way. So Zhang Fei sent a messenger to Yan Yan, and this messenger conveyed the following sentiments from Zhang Fei: “Old fool. If you hurry up and surrender, then I will spare your civilians. If you resist, then I will stomp your city flat and leave no one, not even the old and the young!” This messenger probably did not make it very far past “Old fool ” before Yan Yan blew his lid. … “How dare that bastard be so rude! I am not one to submit to traitors!” But Yan Yan did not shoot the messenger, since beheading was the preferred form of execution during this time. But seriously, Yan Yan actually allowed the messenger to keep his head. “I will use you to deliver my message back to Zhang Fei!” he said. But while the messenger got to keep his head, he was not able to keep everything ON his head. Yan Yan ordered his guards to cut off the guy’s ears and nose before letting him go.
    [Show full text]
  • Community Sanctions: a Comparative Study Between China and Europe
    Community Sanctions: A Comparative Study between China and Europe Xue YANG Dissertation submitted in order to obtain the degree of Doctor in Law Academic year 2017-2018 Promotor: Prof. Dr. Tom Vander Beken Contents Acknowledgement ..................................................................................................................... 8 Abbreviations ............................................................................................................................. 9 Glossary .................................................................................................................................... 10 Chapter One. Introduction ....................................................................................................... 12 Background ........................................................................................................................... 12 Definitions related to community sanctions and measures ................................................ 14 Aim and scope ...................................................................................................................... 16 Questions and methodology ................................................................................................ 18 Structure of the thesis .......................................................................................................... 21 Chapter Two. Legal Framework for Chinese Community Corrections ..................................... 25 1. Introduction ..................................................................................................................
    [Show full text]
  • The Romance of the Three Kingdoms Podcast. This Is Episode 81. Last
    Welcome to the Romance of the Three Kingdoms Podcast. This is episode 81. Last time, we left off with Zhuge Liang about to face off against Zhang Ren, the commander of the Riverlands troops guarding Luocheng, the city that Zhuge Liang and Liu Bei were besieging. The two sides squared off on the battlefield, but Zhuge Liang came out with a sorry­looking bunch of soldiers. Seeing this, Zhang Ren did not hesitate and ordered his men to charge. As soon as they did, Zhuge Liang quickly abandoned his carriage, hopped on a horse, and led his ragtag bunch back across Golden Goose Bridge. Zhang Ren pursued him across the bridge, but as soon as he was across, he could see Liu Bei charging forth from the left and the general Yan Yan sweeping in from the right. Recognizing that he had fallen for a ruse, Zhang Ren tried to turn back, but lo and behold, the bridge had already been taken apart, which is an impressively efficient feat by another of Liu Bei’s generals, Zhao Yun, who had orders to wait until Zhang Ren was across and then tear up the bridge. What’s more, Zhao Yun and his men now guarded the shore, which made Zhang Ren think twice about fleeing back that way. So instead, he fled south along the river. Before he had gone but a couple miles, though, he ran into another ambush. The generals Wei Yan and Huang Zhong sprang out of the reeds with 1,000 men each. Wei Yan’s men stabbed at Zhang Ren’s riders with long spears, while Huang Zhong’s men slashed at the legs of their horses with knives.
    [Show full text]
  • RACR-07 September 25-26, 2007 China Executive Leadership Academy Pudong Shanghai, China
    The First International Conference on Risk Analysis and Crisis Response RACR-07 September 25-26, 2007 China Executive Leadership Academy Pudong Shanghai, China RACR-07 Program and General Information ORGANIZED BY: Risk Analysis Council of China Association for Disaster Prevention HOSTED BY: Shanghai Maritime University SPONSORED BY: National Disaster Reduction Center of China Society for Risk Analysis Society for Risk Analysis-Europe Society for Risk Analysis-Japan SUPPORTED BY: National Natural Science Foundation of China RACR-07 September 25-26, 2007 Shanghai, China The First International Conference on Risk Analysis and Crisis Response Table of Contents RACR-07 - General Information ………………………………………………. 2 About RACR Conference Organization and Supporters Conference Venue Social Acitvities RACR-07 Proceedings Correspondence and further information Referees RACR-07 - Program ………………………………………………………......... 7 General notice Tuesday, September 25 Wednesday, September 26 Some Abstracts for Plenary Sessions Christopher Frey, Methods for Characterizing Variability and Uncertainty in Exposure and Risk Analysis ……………………………….. Shoji Tsuchida, Disaster Prevention and Risk Reseechs ……………… Zongzhi Wu, An Introduction to the Regulations and Standards of Industrial Accident Risk Assessment in China ……………………………. Jinren Ni, Water Erosion Vulnerability and Ecological Risk Analysis in the Yellow River Basin, China ……………………………………………… K. Harald Drager, A Year in Review – TIEMS and Global Emergency Management …………………………………………………………………. Da Ruan, Intelligent
    [Show full text]
  • 2019 IEEE Global Communications Conference (GLOBECOM 2019)
    2019 IEEE Global Communications Conference (GLOBECOM 2019) Waikoloa, Hawaii, USA 9 – 13 December 2019 Pages 1-633 IEEE Catalog Number: CFP19GLO-POD ISBN: 978-1-7281-0963-3 1/9 Copyright © 2019 by the Institute of Electrical and Electronics Engineers, Inc. All Rights Reserved Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid through Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. For other copying, reprint or republication permission, write to IEEE Copyrights Manager, IEEE Service Center, 445 Hoes Lane, Piscataway, NJ 08854. All rights reserved. *** This is a print representation of what appears in the IEEE Digital Library. Some format issues inherent in the e-media version may also appear in this print version. IEEE Catalog Number: CFP19GLO-POD ISBN (Print-On-Demand): 978-1-7281-0963-3 ISBN (Online): 978-1-7281-0962-6 ISSN: 1930-529X Additional Copies of This Publication Are Available From: Curran Associates, Inc 57 Morehouse Lane Red Hook, NY 12571 USA Phone: (845) 758-0400 Fax: (845) 758-2633 E-mail: [email protected] Web: www.proceedings.com TABLE OF CONTENTS OPTIMIZING LOCATION QUALITY IN PRIVACY PRESERVING CROWDSENSING.........................................1 Yuhui Zhang ; Ming Li ; Dejun Yang ; Jian Tang ; Guoliang Xue PATIENTS-CONTROLLED SECURE AND PRIVACY-PRESERVING EHRS SHARING SCHEME BASED ON CONSORTIUM BLOCKCHAIN....................................................................................................................7 Shunrong Jiang ; Haiqin Wu ; Liangmin Wang SECURE EDGE CACHING FOR LAYERED MULTIMEDIA CONTENTS IN HETEROGENEOUS NETWORKS.......................................................................................................................................................................
    [Show full text]
  • The Romance of the Three Kingdoms Podcast. This Is Episode 79. Last
    Welcome to the Romance of the Three Kingdoms Podcast. This is episode 79. Last time, Liu Bei and company got a visit from a strange man named Peng (2) Yang (4), who made himself at home in the residence of Liu Bei’s adviser Pang Tong. Peng Yang ate Pang Tong’s food, drank Pang Tong’s wine, and took a nap on Pang Tong’s couch, all without so much as telling his host what his name was. It turns out that Peng Yang was a good friend of Fa Zheng, a Riverlands official who was helping Liu Bei, and he claimed that he was there to save the lives of tens of thousands of Liu Bei’s men, but he would only reveal his secret to Liu Bei. So Fa Zheng quickly alerted Liu Bei, and Liu Bei rushed over to meet this strange man who had apparently come to save his life and the lives of all his troops. “General, how much troops do you have in your front camps?” Peng Yang asked him. “Wei Yan and Huang Zhong are garrisoned there,” Liu Bei answered. “How can a commander not understand geography,” Peng Yang said. “The front camp hugs the River Fu (2). If the enemy redirects the river’s flow, no one would be left alive in your front camp.” This reminder brought Liu Bei to his senses, but Peng Yang was not done yet. “Judging by the stars, something bad is going to happen. You must be careful,” he told Liu Bei. Liu Bei thanked him profusely and treated him as an esteemed guest.
    [Show full text]
  • Paradox of Legal Reform Under the Kuomintang Regime in Mainland
    Paradox of Legal Reform under the Kuomintang Regime in Mainland China, a Case Study in Judicial Reform and Legal Modernisation under an Authoritarian regime (1928-1948). A thesis submitted to The University of Manchester for the degree of Doctor of Philosophy in the Faculty of Humanities 2017 Ran Lu School of Law 1 Declaration No portion of the work referred to in the thesis has been submitted in support of an application for another degree or qualification of this or any other university or other institute of learning. Copyright Statment The following four notes on copyright and the ownership of intellectual property rights must be included as written below: i. The author of this thesis (including any appendices and/or schedules to this thesis) owns certain copyright or related rights in it (the “Copyright”) and s/he has given The University of Manchester certain rights to use such Copyright, including for administrative purposes. ii. Copies of this thesis, either in full or in extracts and whether in hard or electronic copy, may be made only in accordance with the Copyright, Designs and Patents Act 1988 (as amended) and regulations issued under it or, where appropriate, in accordance with licensing agreements which the University has from time to time. This page must form part of any such copies made. iii. The ownership of certain Copyright, patents, designs, trademarks and other intellectual property (the “Intellectual Property”) and any reproductions of copyright works in the thesis, for example graphs and tables (“Reproductions”), which may be described in this thesis, may not be owned by the author and may be owned by third parties.
    [Show full text]
  • A Robotic Gripper Based on Advanced System Set-Up and Fuzzy Control Algorithm
    2009 IEEE International Conference on Automation and Logistics (ICAL 2009) Shenyang, China 5 - 7 August 2009 Pages 1-702 IEEE Catalog Number: CFP09CAL-PRT ISBN: 978-1-4244-4794-7 TABLE OF CONTENTS A Robotic Gripper based on Advanced System Set-up and Fuzzy Control Algorithm ...................................................1 A. M. Soliman, A. M. Zaki, A. M. El-Shafei , O. A. Mahgoub Continuous Steps Toward Humanoid Push Recovery........................................................................................................7 Wentao Mao, Jeong-Jung Kim, Ju-Jang Lee Predictive Function Cascade Control Scheme and its Application to Hydraulic Robot Systems ................................. 13 Zhihuan Zhang Object-Centric Programming: A New Modeling Paradigm for Robotic Applications .................................................. 18 Andreas Angerer, Alwin Hoffmann, Frank Ortmeier, Michael Vistein, Wolfgang Reif Model-based Iterative Learning Control for Industrial Robot Manipulators................................................................ 24 Je Sung Yeon, Jong Hyeon Park, Seung-Woo Son, Sang-Hun Lee Modeling and Simulation of Yard Trailer Dispatching at Container Terminals ........................................................... 29 Bin Li, Wen-feng Li, Yu Zhang, Yan-hong Ge, Huan Chen, Xiao-lei Liang Kinematics Modeling and Simulation for an Amphibious Robot: Design and Implementation................................... 35 Rui Ding, Junzhi Yu, Qinghai Yang, Min Tan The Finite Element Model of Transient Temperature Field
    [Show full text]