The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The robust coordination of a two-stage supply chain with a risk-averse retailer and a risk-neutral supplier is studied under the condition of only knowing historical demand observation data. An objective function based on conditional value at risk is developed with respect to the risk-averse retailer, and the corresponding coordination mechanism for supply chain is designed with only knowing historical...
With the help of the Simulink toolbox of MATLAB the dynamic simulation model of PMLSM is built. Then according to the principle of robust controlling and the features of robust H∞ controller. The control system modeling and simulation experiments by use of the Simulink toolbox of MATLAB is designed. and the results show that the controller not only has the good tracking performance for the speed controller,...
On the basis of robust H∞ control, the output feedback controller is presented for a class of dynamic time-varying delay network systems. The objective of designing robust H∞ controller is to achieve the desired queue size and to guarantee the asymptotic stability of the close-loop. The sufficient condition for the existence of a dynamic output feedback controller is presented via matrix inequalities...
Current sensor is one of the key elements in the control system of induction motor. Whether the accurate measurement of variables reflecting motor operation status can be made will directly affect the control effect on motor system and therefore the timely, accurate detection of sensor fault is necessary. This paper brings forward an observer-based method of residual generation and fault detection...
A drive for Brushless DC motor (BLDCM), which is fully based on the adaptive fuzzy controllers, is presented in this paper. One of the fuzzy controllers is used in the speed feedback loop to guarantee the accurate speed control. The other fuzzy controller is used in the current feedback loop to track the current change. The proposed full adaptive fuzzy controllers have the characteristics of robustness,...
In order to solve two major bottlenecks of the analog design flow: the time-to-market and the production yield, we introduce in this paper a design tool for measuring the robustness capability of the analog circuit topologies with the guarantee of fulfilling all the design specifications. With this measure, we can describe the feasible subspace by using the set inversion algorithm. A robustness estimation...
This paper provides on effective Shuffled Embedded Technique (SET) to eliminate the drawback of substitution technique. Using the genetic algorithm, message bits are embedded into multiple, vague (blurred) and higher LSB layer in order to increase robustness, which is achieved by embedding secret messages in digital audio stream. Additional careful considerations are taken against the premeditated...
Fountain codes provide an efficient way to transfer information over erasure channels like Internet. LT codes are the first codes fully realizing the digital fountain concept. The key to make LT codes work well is the degree distribution used in the encoding procedure, which is sampled to determine the degree of each encoding symbol. This paper propose a revised robust soliton distribution which has...
Scan matching as a basic part of SLAM has a key role in localization and even mapping of mobile robots. Our innovative method named ICE matching presents a fast and accurate method to solve the challenges of this problem. Novelty in defining new features, matching mechanism and new state estimation approach congregated in this method creates a robust practical technique. Comparison with some high...
This paper presents the use of fuzzy logic control (FLC) of a variable speed induction machine wind generation system. The generation system uses three fuzzy logic controllers (FLC's), first fuzzy logic controller tracks the generator speed with wind velocity to extract maximum power. Second fuzzy logic controller programs the machine flux for light load efficiency improvement. Third fuzzy logic controller...
The central idea of this paper is to propose an innovative watermarking scheme for digital image authentication which withstands common image processing attacks. Some pixels are randomly selected from original image, so that all of them have a valid 3 × 3 neighborhoods. A binary sequence is constructed from those pixels by comparing them against average values of neighborhoods. The binary sequence...
Poor quality data is a growing problem that affects many enterprises across all aspects of their business ranging from operational efficiency to revenue protection. Moreover, this problem is costly to fix because significant effort and resources are required to identify a comprehensive set of rules that can detect (and correct) data defects along various data quality dimensions such as consistency,...
Strong cryptographic security, short encryption time, and robustness against noise are three goals of cryptosystem. However, most existing chaotic cryptosystems only focus on the research of enhancing cryptographic security and shortening encryption time. To overcome drawbacks and weaknesses of the existing algorithms, the paper analyzes the pseudo-chaotic characteristics of irrational numbers and...
This paper presents the stability analysis of a class of nonlinear time-varying delay systems with parameter uncertainty, through extended Takagi-Sugeno fuzzy modeling. The delay-dependent stability and robust stability criterions are presented using delay decomposition approach, in terms of linear matrix inequalities (LMIs). The time-varying delay is assumed to be bounded and continuous need not...
This paper addresses a new uncertainty set - interval random uncertainty set for robust Value-at-Risk optimization. The form of interval random uncertainty set makes it suitable for capturing the downside and upside deviations of real-world data. These deviation measures capture distributional asymmetry and lead to better optimization results. We also apply our interval random chance-constrained programming...
In this paper we show how the complexity of performing nearest neighbor (NNS) search on a metric space is related to the expansion of the metric space. Given a metric space we look at the graph obtained by connecting every pair of points within a certain distance r. We then look at various notions of expansion in this graph relating them to the cell probe complexity of NNS for randomized and deterministic,...
Orthogonal frequency division multiplexing (OFDM) is a popular method for high data rate wireless transmission. OFDM may be merged with antenna arrays at the transmitter and receiver to increase the diversity gain and/or to heighten the system capacity on time-variant and frequency-selective channels, resulting in a Multiple-Input Multiple-Output (MIMO) configuration. The IEEE 802.11n standard based...
This paper proposes an image watermarking scheme for copyright protection based on Independent Component Analysis (ICA). In the suggested scheme, we divide the original image into blocks and use the ICA to project the image into a basis with its components as statistically independent as possible. The data embedding is carried out in cumulative form in the ICA basis and also the ICA is used for watermark...
Watermarking resisting to geometric distortion is a very difficult and challenging subject. In this paper, to solve this problem, two method are proposed one method, which estimates rotation and scaling based on template embedding, has low computing complexity for template matching, one method which estimates translation based on invariant centroid has solve the translation synchronization of the...
We present round-efficient protocols for secure multi-party computation with a dishonest majority that rely on black-box access to the underlying primitives. Our main contributions are as follows: · a O(log* n)-round protocol that relies on black-box access to dense cryptosystems, homomorphic encryption schemes, or lossy encryption schemes. This improves upon the recent O(1)log* n-round protocol of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.