The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes an intelligent formation control method of the leader and follower agents with nonlinear dynamics using our proposed cerebellar perceptron improved model with auto-structuring mechanism. In the proposed method, each agent can follow the leader, exchanging only information of positions (without velocities) of the observable agents including the leader and taking a predefined formation...
The Homestay websites in Malaysia are gaining popularity, locally and abroad. Thus, it is imperative that it should be designed by using the proper accessibility guidelines However, the current accessibility state of the Homestay websites in Malaysia is still unknown. The main objective of this research is to investigate the accessibility of Homestay websites in Malaysia. There are 328 samples of...
For the problem of sideslip control of air cushion vehicle, the sideslip controller of air cushion vehicle based on nonsingular fast terminal slide mode (NFTSM) with the feature of good robustness and fast convergent rate is designed. Also sideslip changer which can supervise the status of system is designed. Sideslip controller can coordinate with heading controller to achieve course control of ACV...
This paper demonstrates synthesis of a robust wide-area controller for damping inter-area power system oscillation. A wide-area damping controller is more effective in damping inter-area modes in power system as it takes remote signal as feedback in which inter-area oscillations strongly observable. However, with the involvement of remote signal time-delay is introduced in the feedback loop causing...
In modern time, LED (Light Emitting Diode) bulbs are being most preferred over incandescent bulbs, compact fluorescent lamps (CFL) and other lighting equipments because of their high luminous efficacy, long life, robustness, small size and so on. This paper covers the study, design and simulation of 30 Watt LED bulb driver circuit in MATLAB-Simulink environment. SEPIC (Single Ended Primary Inductor...
Many emerging motion-related applications, such as virtual reality, decision making, and health monitoring, demand reliability and quick response upon input changes. Motion capture has been a well-researched topic in the past decades with applications in many industries. The ability to capture motion goes hand in hand with real-time capability in a system. This paper gives an overview on real-time...
The 12th Workshop on Silicon Errors in Logic -- System Effects (SELSE) was held on March 29 -- 30, 2016, in Austin, Texas, USA. Detailed information about SELSE 2016 and previous SELSE workshops, including links to presentations, is available at http://www.selse.org. Three papers were selected as the Best of SELSE papers and are presented in this special DSN session.
Sparse representation classifier (SRC) is a classical method for classification, which was proposed in 2009. SRC method boosted the research of sparse representation, based on SRC, many other new methods were also proposed, such as structured-sparse representation, collaborative representation optimized classifier (CROC), deformable sparse recovery and classification (DSRC) method, misalignment robust...
Edge-computing is one of the most promising techniques to leverage the excess capacity that exists at users' premises. Unfortunately, edge-computing may be vulnerable to free-riding, i.e., to nodes that attempt to benefit from the system without providing any service in return. Traditional approaches model free-riders as rational nodes that strive to maximize a utility and apply Game Theory concepts...
Copy-move is a common type of digital image forgery. In an image, Copy-Move tampering might be done to hide an undesirable region or to duplicate something in the image. These images might be used for the necessary purpose like evidence in the court of law. So, authenticity verification plays a vital role for digital images. In this paper, we compare the CMFD (Copy-Move Forgery Detection) using Image...
Digital Watermarking enables us to protect ownership rights on digital multimedia, such as audio, image and video data. Digital watermark is a digital signal carrying information of the creator or distributor of the media. Digital watermark is inserted into digital media in such a way that it is imperceptible to the human eye, but it is visible to a computer. A watermarking attack is any processing...
Performance of image mosaicing depends on overlap between the images to be joined and the percentage of noise present. An algorithm is used for joining images based on image matching by comparing the descriptors for different images. This paper is concerned with the analysis of effect of variations in noise and degree of relative overlap on the algorithm and obtaining their limits. Speeded Up Robust...
Forgery of the digital image is to hide or to remove some meaningful or useful information of the image. In this paper (k, n) Shamir threshold scheme is applied to an image where the tampering is done randomly all over the image. Performance parameters are checked with the random tampering. Comparative study of algorithm for different block sizes is presented. The algorithm is checked for four different...
As an economical, reliable, easy and safe way to recognize identity, the Voiceprint recognition has a bright prospect in the market at present. However, the bad robustness in a noisy environment constraints its practical application, so the key make voiceprint recognition be applied widely is to improve the robustness of system. A Voiceprint recognition system is mainly made up of signal recognition,...
Critical Infrastructure Security had always been an issue. With the technological advancements, there has been a continuous inflow of novel methods for critical infrastructure security. In this paper, design, implementation, and field tests of a novel critical infrastructure security system based on wireless sensor networks is presented.
The System identification explores ways to obtain mathematical models of an unknown system. However, as a result from the intrinsic random nature of system or from the environment noise, it is very hard to find a perfect mathematical representation of a real system. This paper aims to evaluate the Maximum Correntropy Criterion (MCC) performance using the gradient descent and the Fixed-Point. Both...
In this paper, a new shaped marker is designed for augmented reality applications that has 360 degree viewing angle about its shaft axis. The main advantage of the designed marker is that it is very simple to extract marker area from images with basic image processing methods. And decoding of the marker codes is very simple with basic mathematical functions. Experimental results showed that, the designed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.