The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper focuses on the H∞ controller design problem for networked Takagi-Sugeno (T-S) fuzzy systems. The outputs measured by the sensor will be subject to saturation phenomenon and suffer packet dropouts during the transmission through unreliable communication links to the remote controller. Both the sensor saturation and the packet dropouts occur randomly which are governed by the Bernoulli distributed...
In this paper, we present methods for segmenting noisy two-dimensional forward-scan sonar images and classify and model their background. The segmentation approach differentiates the highlight blobs, cast shadows, and the background of sonar images. There is usually little information within relatively large background regions corresponding to the flat sea bottom and (or) water column, as they are...
This paper focuses on the problem of strictly dissipative control for Markovian jump descriptor systems described by Itô's form. By means of linear matrix inequality, a sufficient condition is derived to make sure that a Markovian jump descriptor system is stochastically admissible and strictly dissipative. Based on the condition, a sufficient condition is also given by designing a partially mode-dependent...
This paper is concerned with the design problem of multi-sensor optimal H∞ fusion controller for a class of discrete-time systems with missing measurements. Based on Lyapunov theory and linear matrix inequality technology, the centralized and distributed fusion controllers are designed, respectively such that, for all possible missing measurements, the closed-loop systems are asymptotically stable...
The paper investigates the problem of robustly stochastic stability and strict dissipativeness for uncertain neutral stochastic time-delay system with time-varying norm-bounded parameter uncertainties. By means of linear matrix inequality, a sufficient condition is given to ensure that uncertain neutral stochastic time-delay system is robustly stochastically stable and strict dissipative for all admissible...
Database Semantics (DBS ) is applied to the analysis of Chinese sentences, especially those with adjectives. Chinese adjectives function as attributives, predicates and adverbials. The predicate adjectives can be followed by aspect markers and objects, which resembles predicate verbs. The DBS syntactic and semantic analysis of all the sample sentences is direct and efficient by following the time-linear...
A new semantic theory, Database Semantics (DBS), is applied to the analysis of modern Chinese noun phrases and their usage in sentences. Noun phrases are defined as elementary nouns and phrasal nouns. Phrasal nouns are composed of determiners, numerals, quantifiers, pronouns and elementary nouns. During derivation, determiners are absorbed with their core values copied to the modifier attributes in...
Unmodeled dynamics are the unavoidable nonlinear effect that can limit control performance in robotic systems. The unmodeled dynamics of the system include uncertainty or unknown and unmeasured states. Meanwhile, it is not available for the control. Based on universal approximation results for radial basis function neural networks (RBF-NN), it has been proposed as an alternative to NN for approximating...
In 2005, Yoon et al. proposed a remote user authentication scheme using smart card. In 2009, Li pointed out that Yoon et al.'s scheme can't against denial of service attack and performs only unilateral authentication (only user authentication). He improved Yoon et al.'s scheme and claimed that the improved scheme can eliminate the vulnerability. However, we found Li's scheme is vulnerable to malicious...
Yang-Yang proposed a new key authentication scheme based on fuzzy extractor with Smart Card. The authors claimed their scheme can resist the guessing attack, the parallel attack, masquerade attack and other attack types. In this paper, we find that the scheme proposed by Yang-Yang was unable to resist the masquerade attack as they originally claimed.
This paper examines the feasibility of implementing statistic-oriented term extraction and evaluation methods in extracting historical terms from aligned parallel corpora of Chinese historical classics and their translations. It proposes to take transliteration as anchor points to establish sentence-level alignment. It also investigates the approach to extract term translation pairs based on 4000...
Recent breakthroughs in cryptanalysis of standard hash functions like SHA-1 and MD5 raise the need for alternatives. The MD6 hash function is developed by a team led by Professor Ronald L. Rivest in response to the call for proposals for a SHA-3 cryptographic hash algorithm by the National Institute of Standards and Technology. The hardware performance evaluation of hash chip design mainly includes...
In order to hold secure electronic conference in communication networks via insecure channels, a conference key distribution system should be constructed. The conference key distribution system is used for distributing a conference key shared among the participants of the conference and hence secure communications are achieved. In this paper, by using the sealed lock, we propose an identity-based...
Fault-tolerance is an important property of conference key distribution protocol. Recently, Yang et al. proposed an identity-based fault-tolerant conference key distribution scheme which is much different to the traditional ones. But their scheme can not withstand passive attack and modification attack, moreover, it also can not provide forward security. An improved identity-based fault-tolerant conference...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.