The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Control theory can establish properties of systems which hold with all signals within the system and hence cannot be proven by simulation. The most basic of such property is the stability of a control subsystem or the overall system. Other examples are statements on robust control performance in the face of dynamical uncertainties and disturbances in sensing and actuation. Until now these theories...
In recent years, many organizations, companies and government agencies have been suffering from brutality of targeted attacks. Especially, destructive targeted attacks such as Shamoon and Samas have been causing significant damages on the targets' cyber assets, disputing their critical business operations. Since such attacks tend to access many hosts simultaneously, a rapid incident response is essential...
QoS provisioning for Audio-Video traffic in WLANs respecting different priorities was one of the reasons for introduction of the intra-AC prioritization service in the IEEE 802.11aa amendment. However, observations show that as the service is realized by each node independently, with worsening of transmission conditions both types of Video traffic are corrupted. To overcome this issue, basing on two...
Existing access control strategies for Internet of Things cannot provide good flexibility, robustness or quick response. We propose an access control approach of finer granularity and techniques supporting bulk operation to make interaction in IoT more flexible. Also, a decentralized strategy and data centric network techniques are used to enhance the system robustness and swiftness. We implement...
Stereo matching is an active research area in computer vision for decades. This paper introduces a new disparity map estimation algorithm based on image segments. The reference image is segmented using hill-climbing algorithm. The initial disparity map is estimated Scale Invariant Feature Transform (SIFT) feature points matching between two stereo images in each segment by Sum of Absolute Difference...
This study is concerned with the robust H∞ control problem for dynamic positioning (DP) ships based on sampled-data. Input delay approach is used to convert the sampled-data DP ship system to a system with time-varying delay. Adequate condition is derived to determine the system's asymptotical stability and establish H∞ performance. Then sampled-data controller is obtained by means of linear matrix...
A robust semi-supervised concept factorization (RSSCF) method is proposed in this paper, which not only makes good use of the available label information, but also addresses noise and extracts meaningful information simultaneously. In the proposed method, a constraint matrix is embedded into the basic concept factorization model to guarantee data with the same label share the same new representation...
This paper compares the performance of various beamforming techniques using convex optimization. A new robust beamforming technique is formulated, and its performance is compared with the diagonal loading, robust SOCP techniques and the standard sample matrix inversion technique in different scenarios. The robustness of the proposed technique to errors in the array steering vector is demonstrated...
It is well recognized that effort estimation is an essential part of successful software management. Among many estimation models, the Case-Base Effort Estimation (CBEE) has been intensively used among researchers and practitioners as a promising model for better and accurate effort prediction. The common challenges with this model are: (1) finding the nearest cases to the new case, (2) selecting...
This paper focuses on the low rank plus sparse matrix decomposition problem in big data settings. Conventional algorithms solve high-dimensional optimization problems that scale with the data dimension, which limits their scalability. In addition, existing randomized approaches mostly rely on blind random sampling. In this paper, the drawbacks of random sampling from coherent/structured data matrices...
The fragile watermarking technique presented in this paper is based on the pixel information. The authentication data is calculated from the pixels by using Local Binary Pattern concept. Spatial information of pixels is used for watermark calculation and it is having spatial relationship of pixels. The authentication information is calculated for the block of 3×3 using LBP operator and we have used...
Domain adaptation has achieved promising results in many areas, such as image classification and object recognition. Although a lot of algorithms have been proposed to solve the task with different domain distributions, it remains a challenge for multi-source unsupervised domain adaptation. In addition, most of the existing algorithms learn a classifier on the source domain and predict the labels...
This paper addresses the mixed ℋ2/ℋ∞ control problem for linear discrete-time systems subject to packet dropout, which is modelled by a Bernoulli process. The Nash game methodology is adopted to deal with such multi-objective control problem over lossy channel, and a solvability condition is given through solving two coupled algebraic Riccati equations (AREs). The bounded causal equilibrium strategies...
Engineering decision problems often involve the simultaneous optimization of several conflicting criteria. Among multicriteria decision aid methods, PROMETHEE has gained a lot of attention during the last three decades. Despite its successful application in different fields, some researchers have pointed out the fact that PROMETHEE does not respect the independence to third alternatives assumption...
Recently, we have proposed filter bank multicarrier spread spectrum (FB-MC-SS) as a robust and stealthy HF communication waveform. In this paper, we present our initial over the air test results of FB-MC-SS for a testing campaign that began in Spring 2016. These tests are performed for a 190 mile near vertical incidence skywave (NVIS) link from Idaho Falls, Idaho to Salt Lake City, Utah. Two waveform...
In this paper, a new robust optimization algorithm is proposed. The new approach includes the concept of contour lines which share a local peak and uses the information of the contour areas. The validity was evaluated by mathematic function and applied to optimal design of permanent magnet synchronous motor (PMSM).
In this paper, an operator-based robust perfect control for nonlinear semiconductor refrigeration device with uncertainties is considered. For the research about the properties of the semiconductor refrigeration, an aluminum plate with Peltier device is very representative. So, the perfect tracking control performance is investigated by using this device. The robust right coprime factorization approach...
Recently, investigating boundary prior to aid other low-level image cues, have gained great attention in salient object detection. Although the salient regions are mostly located in the image center, the inverse might not necessarily be true. In addition, such kind of center-bias assumption is very simple and fragile, especially when salient regions often touch the image boundary or the images are...
Nowadays, an aerial closed-circuit television provides an outsize quantity of information compared with ancient closed-circuit television. But, it suffers from unsought cameras motion that presents new challenges. This paper presents a work on video stabilization and detection of the objects which are in moving position, system supported camera motion estimation. Most effective algorithms SIFT (Scale...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.