The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, the robust recursive filtering problem is investigated for a class of uncertain multi-rate systems in sensor networks. Each sensor node receives signals from its neighboring node according to a given network topology. The uncertain multi-rate system under consideration is first transformed into a singular uncertain single-rate system by recurring to the lifting technique. Then, an optimal...
As some of the valuable satellites can maintain working after on-orbit servicing, it's meaningful to study on the autonomous rendezvous. Most of these satellites are non-cooperative, more specifically, they have no target location markers or rendezvous sensors. This paper extracts the edge of the adapter ring as natures for recognition, measurement or even mechanical docking. A practical detection...
This paper mainly describes the design and development of a two-DOF humanoid torso. “Up to down” sequence is adopted in our humanoid robot design. By analyzing human torso motion and employing a wheel platform to achieve stable operation, humanoid torso is designed with two identical joints and series configuration. Torso D-H parameters is obtained according to analysis of humanoid arms' workspace...
A signal may not be detected and identified due to the presence of serious noise. Coherent integration is an important approach for focusing the energy of the signal in pulse-Doppler radar. For moving targets, the problem of migration through range cells (MTRC) will degrade the coherent integration result. This paper presents a new coherent integration method for multi-channel radar system to focus...
This paper presents a novel steganalysis scheme with high-dimensional feature vectors derived from co-occurrence matrix in either spatial domain or JPEG coefficient domain, which is sensitive to data embedding process. The class-wise non-principal components analysis (CNPCA) is proposed to solve the problem of the classification in the high-dimensional feature vector space. The experimental results...
The regular algorithms of target detection and tracking in image domain are very sensitive to the false alarm rate, and so the real time performance is limited by high false alarm rate. In order to reduce the false alarm rate of original target detection and improve real time performance, an algorithm of low-speed moving target detection is proposed in this paper using a single frame image based on...
In Command and Control organization, conflict free cooperation and coordination between entities play important role in completing military tasks. However, those hidden conflicts in Command and Control organization are difficult to discover. Hence, learning form the method of analyzing the population in plant-pollinator community assembly, a Command and Control relationship network model based on...
In ASP.NET, Programmers maybe use POST or GET to pass parameter's value. Two methods are easy to come true. But In ASP.NET, It is not easy to pass parameter's value. In ASP.NET, Programmers maybe use many methods to pass parameter's value, such as using Application, Session, Querying, Cookies, and Forms variables. In this paper, by way of pass value from WebForm1.aspx to WebForm2.aspx and show out...
Nonlinear control system identification is studied using neoteric optimized Least Squares Support Vector Machines (LS-SVM) in this paper. Firstly, a multi-layer adaptive optimizing parameters algorithm is developed for improving learning and generalization ability of least squares support vector machines. According to different learning problems, the optimization approach can obtain appropriate LS-SVM...
This paper presents the design of an indoor alarm system, which uses embedded processor S3C2440 as a system of central control unit, and combines with the powerful Linux operating system management functions. The system starts the camera to take a photo and alarm when there was illegal to carry into room, and then send the photos to the computer with wireless network to prompt security personnel....
An overview is given for the current state-of-the-art of tunable RF elements. For this purpose, tunable RF elements such as thin-film Barium Strontium Titanate (BST) varactors, Micro Electro Mechanical Systems (MEMS) based capacitive switch banks and varactors, as well as semiconductor based capacitive switch banks and varactors are reviewed. Their benefits and shortcomings are discussed and compared...
One of important requirements for many Wireless sensor network applications is to prolong network lifetime. The cluster head consumes more energy than other member nodes, because it gathers data from its member nodes, processes it (e.g. data fusion), and transfers data to the sink node or to the base station that maybe located remotely. Therefore, the cluster head should be elected periodically within...
Electrophoretic deposition (EPD) was used to prepare hydroxyapatite (HA) coatings on titanium. The influence of suspension pH on the formation of cracks in coatings was studied. Results show that the pH of suspensions plays an important role in the EPD of HA coatings and cracks in the green coatings were minimized at pH 2.9. Biomimetic mineralization and self-assembled collagen were developed to modify...
The linear system of second-order boundary value problems is considered in this paper. By using the compact operator and the Richardson extrapolation, a finite difference scheme with the local truncation errors being fourth-order is constructed. Several numerical examples are displayed to show the efficiency of the new method.
We determine, for both countable and uncountable collections of functions, information-theoretic conditions on a penalty pen(f) such that the optimizer f of the penalized log likelihood criterion log 1/likelihood(f)+pen(f) has risk not more than the index of resolvability corresponding to the accuracy of the optimizer of the expected value of the criterion. If F is the linear span of a dictionary...
HAp/Al2O3 composite coating was fabricated onto micro-arc oxidized titanium substrate using a combination of electrophoretic deposition and reaction bonding process. SEM, EDS and XRD were employed to characterize the titanium substrate and as-prepared coatings. The interfacial bonding strength of the sintered composite coating was tested by shear strength testing experiment. Results show that the...
This paper presents a new steganalysis scheme to attack JPEG steganography. The 360 dimensional feature vectors sensitive to data embedding process are derived from multidirectional Markov models in the JPEG coefficients domain. The class-wise non-principal components analysis (CNPCA) is proposed to classify steganograpghy in the high-dimensional feature vector space. The experimental results have...
This paper presents a novel pattern classification scheme: classwise non-principal component analysis (CNPCA), which utilizes the distribution characteristics of the samples in each class. The Euclidean distance in the subspace spanned by the eigenvectors associated with smallest eigenvalues in each class, named CNPCA distance, is adopted as the classification criterion. The number of the smallest...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.