The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to solve two major bottlenecks of the analog design flow: the time-to-market and the production yield, we introduce in this paper a design tool for measuring the robustness capability of the analog circuit topologies with the guarantee of fulfilling all the design specifications. With this measure, we can describe the feasible subspace by using the set inversion algorithm. A robustness estimation...
This paper provides on effective Shuffled Embedded Technique (SET) to eliminate the drawback of substitution technique. Using the genetic algorithm, message bits are embedded into multiple, vague (blurred) and higher LSB layer in order to increase robustness, which is achieved by embedding secret messages in digital audio stream. Additional careful considerations are taken against the premeditated...
Fountain codes provide an efficient way to transfer information over erasure channels like Internet. LT codes are the first codes fully realizing the digital fountain concept. The key to make LT codes work well is the degree distribution used in the encoding procedure, which is sampled to determine the degree of each encoding symbol. This paper propose a revised robust soliton distribution which has...
Scan matching as a basic part of SLAM has a key role in localization and even mapping of mobile robots. Our innovative method named ICE matching presents a fast and accurate method to solve the challenges of this problem. Novelty in defining new features, matching mechanism and new state estimation approach congregated in this method creates a robust practical technique. Comparison with some high...
This paper presents the use of fuzzy logic control (FLC) of a variable speed induction machine wind generation system. The generation system uses three fuzzy logic controllers (FLC's), first fuzzy logic controller tracks the generator speed with wind velocity to extract maximum power. Second fuzzy logic controller programs the machine flux for light load efficiency improvement. Third fuzzy logic controller...
The central idea of this paper is to propose an innovative watermarking scheme for digital image authentication which withstands common image processing attacks. Some pixels are randomly selected from original image, so that all of them have a valid 3 × 3 neighborhoods. A binary sequence is constructed from those pixels by comparing them against average values of neighborhoods. The binary sequence...
Poor quality data is a growing problem that affects many enterprises across all aspects of their business ranging from operational efficiency to revenue protection. Moreover, this problem is costly to fix because significant effort and resources are required to identify a comprehensive set of rules that can detect (and correct) data defects along various data quality dimensions such as consistency,...
Strong cryptographic security, short encryption time, and robustness against noise are three goals of cryptosystem. However, most existing chaotic cryptosystems only focus on the research of enhancing cryptographic security and shortening encryption time. To overcome drawbacks and weaknesses of the existing algorithms, the paper analyzes the pseudo-chaotic characteristics of irrational numbers and...
This paper presents the stability analysis of a class of nonlinear time-varying delay systems with parameter uncertainty, through extended Takagi-Sugeno fuzzy modeling. The delay-dependent stability and robust stability criterions are presented using delay decomposition approach, in terms of linear matrix inequalities (LMIs). The time-varying delay is assumed to be bounded and continuous need not...
This paper addresses a new uncertainty set - interval random uncertainty set for robust Value-at-Risk optimization. The form of interval random uncertainty set makes it suitable for capturing the downside and upside deviations of real-world data. These deviation measures capture distributional asymmetry and lead to better optimization results. We also apply our interval random chance-constrained programming...
In this paper we show how the complexity of performing nearest neighbor (NNS) search on a metric space is related to the expansion of the metric space. Given a metric space we look at the graph obtained by connecting every pair of points within a certain distance r. We then look at various notions of expansion in this graph relating them to the cell probe complexity of NNS for randomized and deterministic,...
Orthogonal frequency division multiplexing (OFDM) is a popular method for high data rate wireless transmission. OFDM may be merged with antenna arrays at the transmitter and receiver to increase the diversity gain and/or to heighten the system capacity on time-variant and frequency-selective channels, resulting in a Multiple-Input Multiple-Output (MIMO) configuration. The IEEE 802.11n standard based...
This paper proposes an image watermarking scheme for copyright protection based on Independent Component Analysis (ICA). In the suggested scheme, we divide the original image into blocks and use the ICA to project the image into a basis with its components as statistically independent as possible. The data embedding is carried out in cumulative form in the ICA basis and also the ICA is used for watermark...
Watermarking resisting to geometric distortion is a very difficult and challenging subject. In this paper, to solve this problem, two method are proposed one method, which estimates rotation and scaling based on template embedding, has low computing complexity for template matching, one method which estimates translation based on invariant centroid has solve the translation synchronization of the...
We present round-efficient protocols for secure multi-party computation with a dishonest majority that rely on black-box access to the underlying primitives. Our main contributions are as follows: · a O(log* n)-round protocol that relies on black-box access to dense cryptosystems, homomorphic encryption schemes, or lossy encryption schemes. This improves upon the recent O(1)log* n-round protocol of...
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of security that is preserved under universal composition- assuming only the existence of enhanced trapdoor permutations. The notion of security fits within a generalization of the "angelbased" framework of Prabhakaran...
Thanks to the exceptionally good properties, chaotic systems have been widely studied and developed in image scrambling and watermarking algorithms in recent years. In this paper, the chaotic standard Baker map is improved and employed to scramble the pixel positions of host image and watermark image in the preprocessing of watermarking. Experimental results show that the scrambling algorithm based...
This paper studies a design of Sliding Mode Control (SMC) for Negative Output Elementary Super Lift Luo Converter (NOESLLC) operated in Continuous Conduction Mode (CCM). The NOESLLC performs the voltage conversion from positive DC source voltage to negative DC load voltage. In order to improve the dynamic performances of NOESLLC for both static and dynamic specifications, we propose a sliding mode...
Economical and ecological motives are pushing shoreside power supply by power electronics systems for merchant ships as well as for cruise ships. Also, final tests of on-ship power systems and generation are simplified considerably. Fault scenarios on-ship and within the harbour grid and the variability of the parameters of on-ship distribution - each ship is special, and large consumers or generators...
Video segmentation is a key step for the long videos recorded from Television channels to be represented in the hierarchical structure. In this paper, a novel approach based on acoustic cues for automatic segmenting television stream into individual programs is proposed. This presented method is composed of the following steps: Several sets of repetitions in the audio track is detected by using silence...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.