The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a recently developed theorem in the field of stability of interval valued type 2 fuzzy controllers has been studied and a new adaptive control strategy has been proposed due to this theorem. Mentioned theorem, present some constrains for the stability of the system which are dependent on the upper and lower bounds of membership function of the IVT2 model. These bounds are dependent...
The rapidly growing amount of data being produced in the world has become a challenging problem for decision support systems. These data are located in disparate sites while time, cost and privacy concerns makes it impossible to aggregate them into one location. Information fusion systems aim to make decisions by getting the outputs of the distributed sources. Since each source is making its local...
In this study, a novel approach is proposed for mental stress recognition through automatic analysis of eye video sequences. The proposed system consists of five stages: video capturing, fuzzy image processing, signal processing, feature extraction and, classification. The pupil parameters including Pupil Diameter (PD) and Pupil Dilation Acceleration (PDA) are measured using soft computing techniques...
This paper proposes a fuzzy-based algorithm for measurement of the pupil diameter (PD) from the pupil video. The proposed algorithm consists of four stages: data acquisition, preprocessing, edge detection, and calculation of PD. In this algorithm the effective procedure for edge detection is presented based on the hybrid combination of interval type-2 fuzzy logic system (IT2FS) and genetic algorithm...
Vessel detection is a fundamental step in retinal analysis which helps to extract further information such as characterization of changes in blood vessels width and tortuosity. In this paper, we present an automatic algorithm based on edge detection and fuzzy inference. In the proposed method, the direction of linear structures are determined with Radon transform, then Sobel operator is used for extracting...
Fractal image compression explores the self-similarity property of a natural image and utilizes the partitioned iterated function system (PIFS) to encode it. This technique is of great interest both in theory and application. However, it is time-consuming in the encoding process and such drawback renders it impractical for real time applications. The time is mainly spent on the search for the best-match...
Today, wireless sensor networks encompass a wide volume of applications. In these networks, nodes consist of limited energy. Therefore, we must be able to save in their energy usage. Protocol TDMA in these networks is a suitable one for saving nodes energy. In this protocol, Time divided into time slots with equal length. Purpose of TDMA scheduling is time slots assignment into nodes in a way that...
Considering the fast growth of data contents in terms of size as well as variety, finding useful information from collections of data have been extensively investigated in the past decade. In this paper a method is proposed for extracting useful information from a relational database using a hybrid of genetic algorithm and fuzzy data mining approach to extract user desired information. The genetic...
Steganography is the act of hiding a message inside another message in such a way that can only be detected by its intended recipient. Naturally, there are security agents who would like to fight these data hiding systems by steganalysis, i.e. discovering covered messages and rendering them useless. There is currently no steganography system which can resist all steganalysis attacks. In this paper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.