The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper studies the secure communication over Blackwell's binary multiplying channel (BMC) in the presence of an external eavesdropper, who has the same observation as the legitimate users. Based on the idea of Schalkwijk's coding scheme, we propose a secrecy coding scheme, aiming for both high efficiency (measured by the transmission sum-rate) and high secrecy (measured by the normalized equivocation...
This work presents the design and the corresponding stability analysis of a model free velocity observer formulation for nonlinear systems modeled by Euler-Lagrange formulation. The observation gains of the proposed formulation are tuned online according to an update algorithm removing the burden of observation gain tuning. Lyapunov based arguments are applied to prove the overall system stability...
The relation of knowledge is vividly represented by hypergraph in big knowledge base. In this paper, hierarchical quotient space theory in granular computing model is applied to weighted hypergraph, so uncertainty inference of knowledge in big knowledge base is converted to the optimal path approximate of weighted hypergraph based on granular computing model. Thus, the complex degree of solving problem...
Fault estimation is considered as one of the most essential problem in diagnosis domain. In this paper, a simultaneous state and fault estimation is treated for state time delay system. The fault estimation technique is based on H∞ optimization method to addressed the subject of robustness in the presence of disturbance and uncertainties. The fault estimation is made by using the Lyapunov Krasovskii...
The recently coined term “learning from label proportions” refers to a new learning paradigm where training data is given by groups (also denoted as “bags”), and the only known information is the label proportion of each bag. The aim is then to construct a classification model to predict the class label of an individual instance, which differentiates this paradigm from the one of multi-instance learning...
Collective behavior is an important concept defined to capture behavioral patterns emerged among the crowd spontaneously. In social science, people's behaviors can be regarded as temporal transitions between a set of typical states (e.g., home and work) which are always associated with certain locations. This fact leads to an interesting research topic in developing ways to explore people's collective...
Personality tests are most commonly objective type, where the users rate their behaviour. Instead of providing a single forced choice, they can be provided with more options. A person may not be in general capable to judge his/her behaviour very precisely and categorize it into a single category. Since it is self rating there is a lot of uncertain and indeterminate feelings involved. The results of...
In combinatorial optimization, the goal is to find the optimal object from a finite set. Since such problems are hard to be solved, usually some metaheuristics is applied. One of the most successful techniques for a number of classes of problems is Ant Colony Optimization (ACO). Some start strategies can be applied, to the ACO algorithms, to improve their performance. Here, the InterCriteria Analysis...
Queries posed by a user over a database do not always return the desired responses. It may sometimes result an empty set of answers especially when data are pervaded with uncertainty and imprecision. Thus, to address this problem, we propose an approach for relaxing a failing query in the context of evidential databases. The uncertainty in such databases is expressed within the belief function theory...
Neighborhood Covering Reduction extracts rules for classification through formulating the covering of data space with neighborhoods. The neighborhoods of covering are constructed based on distance measure and strictly constrained to be homogeneous. However, this strategy over focuses on boundary samples and thus makes the neighborhood covering model sensitive to noise. To tackle this problem, we construct...
Although adaptive control offers a unique way to control dynamical systems without excessive reliance on their mathematical models, it is well known that nonidentical command profiles result in nonidentical closed-loop responses with such controllers, and therefore, it is of practical interest to study theoretical ways to construct predictable closed-loop responses when adaptive controllers are in...
The recent build-up network of Automatic Identification System (AIS) equipped on vessels provides a rich source of vessel movement information. AIS is originally designed for automatically exchanging navigation information, such as their unique identification, position, course, and speed, with nearby vessels and terrestrial receivers to affect collision avoidance and safety control. The collected...
The United States (US) Army has over 66,000 soldiers engaged in contingency operations across the world. Current budgetary constraints and an uncertain global security environment require these operations to be executed as efficiently as possible. Base camps are the secured areas where soldiers live when deployed to contingency operations. Base camps impose a significant financial and tactical burden...
This study presents a single parameter self-tuning fuzzy fractional order PIλ (STFFOPIλ) controller for second order uncertain dynamical system. A method for the self-tuning of fractional order controller (FOC) using fuzzy logic is introduced. Fuzzy auto-tune technique adjusts on-line integral order (λ) of STFFOPIλ controller to meet that system have different control parameters under different error...
Active semi-supervised learning can play an important role in classification scenarios in which labeled data are difficult to obtain, while unlabeled data can be easily acquired. This paper focuses on an active semi-supervised algorithm that can be driven by multiple clustering hierarchies. If there is one or more hierarchies that can reasonably align clusters with class labels, then a few queries...
This paper proposes an integrated framework for the evaluation of supply chain system complexity. The proposed approach constructs the hierarchical level of the problems and uses the analytical hierarchy process (AHP) method to evaluate the degree of uncertainty criteria within the supply chain system. Further, decision making trial and evaluation laboratory (DEMATEL) is employed to identify the relationships...
Electronic payment systems have always represented an attractive target for cyber criminals. In this context the Single Euro Payments Area Direct Debit (SDD) service is gaining more and more importance since it has been promoted by the European banking industry as an innovative payment infrastructure. This service allows to perform electronic payments across the Euro zone as simple as domestic payments...
Non-player characters (NPCs) in games are traditionally hard-coded or dependent on pre-specified goals, and consequently struggle to behave sensibly in ever-changing and possibly unpredictable game worlds. To make them fit for new developments in procedural content generation, we introduce the principle of Coupled Empowerment Maximisation as an intrinsic motivation for game NPCs. We focus on the development...
This paper considers the problem of robust estimation and constrained model predictive control (MPC). The paper deals with a discrete linear time-invariant system affected by additive bounded disturbances, whose states are measurable, but not directly accessible. In order to improve the control performance, a state estimator is desirable. The design problem of an observer based on zonotopes to estimate...
In this paper, we study discrete windowed linear canonical transform. we first provide several necessary conditions for discrete windowed linear canonical transform being a frame. Then we give a sufficient condition for discrete windowed linear canonical transform being a frame. Finally, we derive a necessary and sufficient condition for discrete windowed linear canonical transform being a Riesz basis.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.