The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper is concerned with the robust finite-time stabilization problem of quadrotors subject to inertia uncertainty and disturbances. The underlying stabilization problem consists of controller designs for position loop and attitude loop, both of which are carried out based on the terminal sliding mode control approach. First, a robust finite-time position controller is designed by considering the...
Palmprint recognition has received in the last 20 years a great deal of the research community's attention. In this paper a new palmprint matching approach based on corner feature point extraction is proposed. A 72-element fixed-length descriptor is used to capture distinctive information of each feature point neighborhood and to build a measure of similarity whilst their coordinates provide a measure...
Owing to simple structure and strong robustness characteristics, the traditional (proportional-integral-derivative) PID controllers have been widely used in designing control systems of industrial process. However, due to complex nonlinear properties in some dynamics plants, it is difficult to obtain accurate mathematical models, and vulnerable to the object and environment. So, it makes difficult...
Building large robust networks against intentional attacks has been well recognized important in designing infrastructure and cyberphysical systems. In some applications, complex networks have to be constructed under some resource constraints, degree sequence constraints on vertices being a popular one. In this paper, we study a novel and challenging problem: constructing large robust networks with...
This paper proposes a framework based on harmonic mean normalized Laplace-Beltrami spectral descriptor for non-rigid 3D shape retrieval. A series of experiments show harmonic mean normalization is suited to classification of stretched shapes, and is robust to isometric transformation, holes, local scaling, noise, shot noise and sampling. To better distinguish among shapes with fine or rough details,...
In this paper, an enhanced perceptual image authentication approach is proposed with extra ability of tamper localization and image self-restoration by combining perceptual hashing and digital watermarking technologies. Compared with other perceptual hashing schemes, this proposed approach could locate the maliciously tampered regions and further recover these regions to some extent. Another advantage...
Due to the presence of possibly moving sources in practical applications, it is of interest to design wideband beamformers with a steerable passband for microphone arrays. In this paper, the design approach of steerable and frequency invariant (SFI) wideband beamformers is presented, which is based on the Farrow structure and robust against microphone mismatches. The proposed method has a closed-form...
Many controlled objects have large inertia, large time delay and parameter time-variance features in a thermal power plant. A decoupled internal model controller program is designed for these controlled objects. This program is to combined decoupled with the controller as a complete controller to control the controlled objects. Through the decouple analysis and steady-state error analysis, the expression...
A novel approach to detect vehicles in night outdoor scenes is proposed in this paper. By using online subspace learning, the preliminary foreground is obtained based on spatio-temporal bricks. Meanwhile, a new operator named 3DLBP is proposed to describe the local features of bricks. The final foreground is acquired by region-grow with 3DLBP and preliminary foreground. The results of experiment indicate...
A technical framework which is based on Variation Mode and Effect Analysis (VMEA) and Theory of Inventive Problem Solving (TRIZ) for analyzing the variations or couplings exist in process scheme is presented firstly. Through the usage of VMEA method, an approach is proposed to detect the latent variations and couplings of process system, with the aim of reducing the variations of process system and...
In this paper, a novel approach based on acoustic cues for automatic segmenting television stream into individual programs is proposed. This presented method is composed of the following steps: Several sets of repetitions in the audio track is detected by using silence detection and robust audio hashing; The found repetitions are treated as advertisements if the range of their length is from 5 seconds...
To further improve the strip dimension control accuracy of hot strip mills, a robust adaptive control scheme is investigated for a hot strip finishing mill based on the decentralization and coordination among the controllers of gauge, tension and looper. Consequently, the robust adaptive controller designed can regulate simultaneously the strip exit thickness, the strip tension and the looper angle...
The mathematical model was presented for the torque servo loading system with secondary regulation. Control performance under the disturbance of hydraulic and mechanical coupling was simulated with MATLAB. Simulation reveals that, with increasing of load pressure, output torque and rotational speed may deteriorate control precision. Load pressure fluctuation causes more influence on torque control...
The constant modulus algorithm (CMA) has been a widely used in blind equalization because of its LMS-like complexity and robustness. In this paper we propose a new scheme through combining the virtues of two improvement versions of CMA which are the Dithered Signed-Error CMA (DSE-CMA) and the concurrent CMA with Soft Decision Directed scheme (CMA+SDD). The DSE-CMA aims to reduce the computational...
A new fragile watermarking scheme for image authentication and location of areas that have been tampered with is proposed in this paper. Based on a quadratic-residue theorem, the proposed scheme generates the watermark block-by-block in the cover image. To improve security by preventing malicious attacks, such as the vector quantization attack, a pseudo-random number generator using a private key...
The advances of network technologies and digital devices facilitate users to exchange multimedia data over the public networks. However, this also raises significant concerns about how to protect sensitive multimedia data from being illegally modified. Therefore, this paper proposes a fragile watermarking scheme to detect illegitimate alterations of a watermarked image. The proposed method hides a...
A robust digital watermark scheme using wavelet-based is presented for copyright protecting. For security, the watermarking is perturbed firstly. A mark sequence may be gotten. For embed watermark imperceptibility, wavelet decomposition for original image is realized. After the original image decomposed into single resolution level, we connect three detail wavelet coefficient matrixes into a big matrix...
The cellular neural/nonlinear network (CNN) is a powerful tool for image and video signal processing, robotic and biological visions. The robust designs for CNN templates are important issue for the practical applications of the CNN. The fingerprint feature extraction (FFE) CNNs are two kinds of CNNs, which are able to extract the endings and bifurcations in patterns, two important features in a fingerprint...
The cellular neural/nonlinear network (CNN) is a powerful tool for image and video signal processing, robotic and biological visions. The robust designs for CNN templates are important issue for the practical applications of the CNN. This paper introduces a new kind of CNNs called black-white color interconversion CNN which can turn pixels from white to black or from black to white. As a main contribution,...
Notice of Violation of IEEE Publication Principles"An Implementation of Fuzzy Clustering with Size and Shape Constraints,"Wang, Yan Jiang, and Hai-long Zhang,in the Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp.922-925After careful and considered review of the content and authorship of this paper by a duly constituted...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.