The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper takes a novel view of evolutionary computing; that is, it attempts to analyze modern software viewed as a complex adaptive system (CAS). By going through the common characteristics of software as CAS and by comparing software with biological populations, an evolution approach to software development emerges. The benefit of the approach is rather practical targeting to promote the understanding...
The capability of remote video surveillance is an important application for embedded system. However, the main challenge of such applications is the limitations on flexibility and reliability, especially for high requirements of image quality. In this paper, a kind of new surveillance technology for real-time remote video monitoring is presented. To verify the performance of the proposed technique,...
The biorthogonal wavelet families are used widely in image compression, but the properties were not discussed in detail. In this paper, four types of biorthogonal wavelets and their duals are discussed whose vanish moment are different. Their filters supports, centers and linear phase are given. As example, the wavelets, including spline 5/3 and CDF9/7, are given. The waveform, magnitude and phase...
Instant Messaging (IM) is one of the most important communication media for remote collaboration. But the confusion between the IM and specific IM software hindered the development of IM software for group collaboration, hence limited the possibility of remote cooperation. To take full advantage of IM, a redefinition is needed. In this work the attributes of IM including response time, multiparty,...
As the world's demand for more and cleaner energy continuously grow, smart electric power grid has become a significant research area for scientists and engineers. In the past few years, smart grid security has become an emerging topic and many new attack and defense strategies have been proposed. However, many of the outcomes of such approaches are presented in complicated ways and lack visualization...
Recently, we proposed a colorization by landmark pixels extraction [3]. The merits of [3] can effectively generate the prototypes and colorize the monochrome image according to requirements of user. However, [3] is not good at colorizing the kind of the monochrome images which contain noises or have no distinctly contours. In this paper, we propose a colorization using the information prototypes and...
A fast fractal-encoding algorithm for the processes of searching and matching is proposed in fractal image compression in this paper. Also we purposes a novel algorithm for image partition using irregular region in fractal image compression, and Similar Extension algorithms are described to construct the irregular region transformations, which greatly increases the compression ratios achieved over...
This note is concerned with the H∞ control for a class of uncertain neutral systems via dynamic output feedback. In the frame of Lyapunov stability theory, in view of the nonlinearity on certain matrix variables, a mathematical technique is developed to obtain a criterion in terms of linear matrix inequalities for the existence of the anticipated controller. The parameterized characterization of the...
The core point of each fingerprint is unique, with abundant information. While core point does not exist, such as the arch class fingerprint, use pseudo-core point instead. Therefore, start with core point, each minutia is defined by the topological relationship which consisted of its neighbor minutiae. Then compare each minutia recursively outward. The proposed approach makes full use of center area...
In this paper, an Intraframe Adjustment Slotted Random (IFASR) algorithm for EPC Gen2 Protocol was presented. Two Slotted Random-redistribute instructions are introduced to make the collided tags randomly redistribute in the current or following slots and increase the response slot of other tags, which will lead to relative moderate slot distribution of tags, and then the probability of tag's being...
Based on the parametric solutions of a class of Sylvester matrix equation, this paper presents the parametric expressions of all the gain matrices in the finite time functional observers, in which the free parameters can be further utilized to satisfy some specified performance indexes. A numerical example and its simulation results show the simplicity and effectiveness of the proposed parametric...
The flight program and launch time window for intercept missile vary with any influence factors such as the launch position, predict hit points, and so on. So it's necessary to find a fast algorithm in calculating the flight program and launch time window for improving combat capability. Considering influence factor of rotation of the earth, geostrophic force, and the J2 perturbation, three-dimensional...
Based on the QSIM reasoning of Kuipers, comparative constraint is presented to reduce the diagnosis space. The transfer regulation of qualitative constrain is used in the simulation and reasoning of system diagnosis. This arithmetic takes observed faulty state as the beginning, to diagnosis the discrepancy of variable and location of the causation according to the transfer regulation of qualitative...
This paper investigates exponential stability in mean-square of stochastic bilinear systems with saturating actuators. The system is described by state differential equation with Markovian jump and time-varying delay in state and input. A sufficient condition for exponential stability in mean-square of the system is given according to Lyapunov-Krasovskii theory. A numerical example shows that the...
In this note, a new nonlinear Markovian jump systems model is proposed to describe the nonlinear multiple channels data transmission networked control systems (NCSs) with network-induced data loss and time-varying delay. By choosing appropriate stochastic Lyapunov functional, a sufficient condition is derived, and the obtained condition establishes the relation of the maximum allowable delay bound...
This paper presents a methodology of the controller design for an unstable time delay system. The proposed method based on the polynomial approach and the pole assignment method yields a class of CT controllers ensuring set-point tracking as well as load disturbance attenuation. The time delay term is approximated by the first order approximation. The control configuration with two feedback controllers...
The minimized nonlinear incremental model, the noise estimator, the nonlinear error-increment PID control law, and the parameter adaptive recursive predicting algorithm are presented for a class of nonlinear time-delayed discrete-time systems based on dynamic approximate nonlinearization model. They realize the direct nonlinear PID adaptive control for nonlinear systems with time-delays. The simulation...
A fault detection approach is proposed for a class of strict-feedback nonlinear systems with dynamic uncertainties in this paper. We present the approach based on deterministic learning consists of three phases: Firstly, by combining adaptive neural with backstepping method, a neural networks (NN) controller is designed for controlling a class of nonlinear closed-loop systems with dynamic uncertainties...
By adopting the basic idea of role-based access control, RBAC permissions management thinking integrated into the design and development of graduate management system. Add role object between users and permissions in the system. User obtains operating authority by grant permission to the role and mapping users to roles. It decouples the relationship between users and permissions. Realized the RBAC-based...
Cluster analysis is a mathematical method that applied in various fields, such as biology, medicine, business and marketing. ISODATA algorithm is a Clustering algorithm that has been widely used. With the development of information technology, data set expanded dramatically which becomes a great challenge to the traditional algorithm. Parallel computing is one of the main methods to solve such problem...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.