-
Booker Carstens posted an update 6 months, 4 weeks ago
The EMG signal is a widely focused, clinically viable, and reliable source for controlling bionics and prosthesis devices with the aid of machine-learning algorithms. The decisive step in the EMG pattern recognition (EMG-PR)-based control scheme is to extract the features with minimum neural information loss. This article proposes a novel feature extraction method based on advanced energy kernel-based features (AEKFs). The proposed method is evaluated on a scientific dataset which contains six types of upper limb motion with three different force variations. Furthermore, the EMG signal is acquired for eight upper limb gestures for the testing algorithm on the DSP processor. The efficiency of the proposed feature set has been investigated using classification accuracy (CA), Davies-Bouldin (DB) index-based separability measurement, and time complexity as performance metrics. Moreover, the proposed AEKF features, along with the LDA classifier, have been implemented on the DSP processor (ARM cortex M4) for real-time viability. Offline metrics comparison with the existing approaches prove that AEKF features exhibit lower time complexity along with a higher CA of 97.33%. The algorithm is tested on the DSP processor and CA is reported ≈ 92%. MATLAB 2015a has been deployed in Intel Core i7, 3.40-GHz RAM for all offline analyses.This article is concerned with the problems of extended dissipativity analysis and filter design for interval type-2 (IT2) fuzzy systems. Based on the line integral Lyapunov function, a sufficient condition of asymptotic stability and extended dissipativity of the systems under consideration is established. A LMI-based equivalent condition to the obtained one in a nonlinear form is provided by combining congruence transformation with change of variables. This LMI condition obtained is more general than the one which is based on the common quadratic Lyapunov function. Meanwhile, in terms of parameterization, the extended dissipative filter is developed which guarantees the asymptotic stability and extended dissipativity for the filtering error system. Furthermore, our filter obtained by the parameterization method includes the one obtained by the equivalent transformation method as a special case. Two simulation examples are provided to show the merits and effectiveness of the proposed approach.This article develops an identification algorithm for nonlinear systems. Specifically, the nonlinear system identification problem is formulated as a sparse recovery problem of a homogeneous variant searching for the sparsest vector in the null subspace. An augmented Lagrangian function is utilized to relax the nonconvex optimization. S1P Receptor antagonist Thereafter, an algorithm based on the alternating direction method and a regularization technique is proposed to solve the sparse recovery problem. The convergence of the proposed algorithm can be guaranteed through theoretical analysis. Moreover, by the proposed sparse identification method, redundant terms in nonlinear functional forms are removed and the computational efficiency is thus substantially enhanced. Numerical simulations are presented to verify the effectiveness and superiority of the present algorithm.In this article, for second-order multiagent systems with uncertain disturbances, the finite-time leader-follower consensus problem has been investigated. First, by considering that the leader’s states are only available to part of the followers, a distributed estimator is constructed to estimate the state tracking errors between the leader and each follower. Then, an estimator-based control scheme is proposed under the event-triggered strategy to achieve finite-time leader-follower consensus. Besides, the event-triggered intervals are with a positive lower bound such that the Zeno behavior can be avoided. Note that the system is discontinuous under the event-triggered mechanism; thus, a nonsmooth analysis is performed. Numerical simulations are presented to demonstrate the effectiveness of our theoretical results.Fuzzing is a technique of finding bugs by executing a target program recurrently with a large number of abnormal inputs. Most of the coverage-based fuzzers consider all parts of a program equally and pay too much attention to how to improve the code coverage. It is inefficient as the vulnerable code only takes a tiny fraction of the entire code. In this article, we design and implement an evolutionary fuzzing framework called V-Fuzz, which aims to find bugs efficiently and quickly in limited time for binary programs. V-Fuzz consists of two main components 1) a vulnerability prediction model and 2) a vulnerability-oriented evolutionary fuzzer. Given a binary program to V-Fuzz, the vulnerability prediction model will give a prior estimation on which parts of a program are more likely to be vulnerable. Then, the fuzzer leverages an evolutionary algorithm to generate inputs which are more likely to arrive at the vulnerable locations, guided by the vulnerability prediction result. The experimental results demonstrate that V-Fuzz can find bugs efficiently with the assistance of vulnerability prediction. Moreover, V-Fuzz has discovered ten common vulnerabilities and exposures (CVEs), and three of them are newly discovered.Internet of Things (IoT) has emerged as a cutting-edge technology that is changing human life. The rapid and widespread applications of IoT, however, make cyberspace more vulnerable, especially to IoT-based attacks in which IoT devices are used to launch attack on cyber-physical systems. Given a massive number of IoT devices (in order of billions), detecting and preventing these IoT-based attacks are critical. However, this task is very challenging due to the limited energy and computing capabilities of IoT devices and the continuous and fast evolution of attackers. Among IoT-based attacks, unknown ones are far more devastating as these attacks could surpass most of the current security systems and it takes time to detect them and “cure” the systems. To effectively detect new/unknown attacks, in this article, we propose a novel representation learning method to better predictively “describe” unknown attacks, facilitating supervised learning-based anomaly detection methods. Specifically, we develop three regularized versions of autoencoders (AEs) to learn a latent representation from the input data.