The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many specifications include assumptions on the environment. If the environment satisfies the assumptions then a correct system reacts as intended. However, when the environment deviates from its expected behavior, a correct system can behave arbitrarily. We want to synthesize robust systems that degrade gracefully, i.e., a small number of environment failures should induce a small number of system...
This paper presents a new image filtering based visual homing algorithm which is robust to illumination conditions. The experimental results show that the algorithm is effective.
In this paper, PID parameters are first normalized on the basis of engineering adjustment, and then are adjusted by fuzzy control principle and fuzzy inference. A fuzzy self-adjustment PID control algorithm is proposed. The PID Controller has the ability of adapting to such complexity and hard control object as non-lined time-varient uncertainly and on. In the end, this algorithm is applied in simulation...
The problem of robust system identification with corrupted data remains a difficulty. In this paper we shall put ourselves in the prediction error framework. We shall present a mixed L1-L2 estimator based on a parameterized objective function leading to an alternative solution fighting against the outliers, based on the well-known Huber's M-estimate. A simple physical insight on the main noise characteristics...
This paper describes a particle filter based approach for estimating the ground plane from an image sequence. Based on a Bayesian framework, the particle filter provides a robust estimation of the plane parameters, since it can handle non-linearities, while allowing a high flexibility for integrating new cues into the system. Furthermore, the different modes of the resulting probability density function...
In this paper, conventional D-S evidence theory (DST) is improved to address the problem of counter-intuitive behaviour in the application of D-S evidence theory. Firstly, the Dempster's rule of combination is extended to the general cases based on Xu Ling-yu's combination rule. Secondly, since all evidence resources are assumed fully reliable in evidence theory, which is difficult to be satisfied...
This paper describes a practical several moving objects area extraction using a half-cosine function wavelet network. The network decomposes an image into weighted basis functions corresponding to spatial frequency. In this method, objects are distinguished by using a difference of object's size. First, moving objects area can be extracted from the weight image of the basis functions which constructs...
The observer-based integral adaptive fuzzy sliding mode controllers are developed for a class of uncertain nonlinear systems. By designing the state observer, the fuzzy systems, which are used to approach any unknown functions, it can be constructed using the state observer-based estimations. Based on Lyapunov stability theorem, the proposed integral adaptive fuzzy sliding mode control system can...
We consider a distributed hybrid search scheme for peer-to-peer network in this paper and introduce one link statement function, which is decreasing with the round trip time (RTT) of link. Link statement function is reasonable because they can reflect how well the link worked, for example, overloaded or not. The transition probability function between two nodes is redefined, which depend on not only...
This paper presents a method of modeling and subsequently characterizing stochastically controlled actuator arrays. The actuator arrays are built from cells, each containing six piezoelectric actuators and an amplification structure; however the results can be generalized to actuator arrays using solenoids, pneumatic cylinders, or any other fast acting linear actuators. The cells are controlled using...
A key enabling functionality in implementing Cognitive Radio is to reliably detect the licensed users. In recent literature, cooperation among spectrum sensing terminals is suggested to offer reliable sensing performance. We consider the problem that the presence of malfunctioning or malicious sensing terminals will severely degrade the performance of cooperative spectrum sensing. In this paper, we...
Recent computational methods of wafer defect detection often rely on the difference image between an inspected image and its reference image, and highly depend on registration accuracy. In this paper, we present a novel method for defect detection in patterned wafers, based on of the inspected image from the reference image using anisotropic kernels. This method avoids registration between the inspected...
Generally audio watermarking schemes based on patchwork algorithm show desirable performance in terms of watermark inaudibility and robustness. However an analysis about relationship between watermark payload, inaudibility and robustness have not been provided sufficiently in the literatures. Specially, to implement these schemes to the hardware, optimization of some parameters of the algorithm, which...
Digital archives are growing rapidly, necessitating stronger reliability measures than RAID to avoid data loss from device failure. Mirroring, a popular solution, is too expensive over time. We present a compromise solution that uses multi-level redundancy coding to reduce the probability of data loss from multiple simultaneous device failures. This approach handles small-scale failures of one or...
This paper presents new tuning rules for fractional PI control of processes that are typically found in process control. The rules are based on characterization of process dynamics by three parameters that can be obtained from a simple step response experiment. The rules are obtained by minimizing a frequency objective function subject to a constraint on the maximum sensitivity. Comparisons with classical...
The problem of robust pole placement in a specific disk is solved for uncertain polynomials having uncertain degree. This particular problem is used for enhancing the results of many robust control problems based on Hurwitz invariability such as robust stabilizability of uncertain systems via static state feedback, robust asymptotic command tracking, robust PID design, etc.. The present results are...
In the conventional method proposed by W.N.Lie et al., it is difficult to satisfy both the capacity of watermark information and the robustness to MP3 compression. The objective of this work is to increase the capacity of watermark information in the audio watermarking based on low-frequency amplitude modification. We increase the capacity of watermark information by embedding multiple watermarks...
A New Linear Optimization technique coupling evolutionary algorithm for Solving Multiobjective Optimization Problems (NLEA) based on real-coded method is proposed after analyzing the drawbacks of existing evolutionary algorithms in this paper. One of the main advantages of the proposed approach is that search space of constrained dominance problems with high dimensions is compressed into two dimensions...
Fuzzy number type data is a typical class of fuzzy data, and it can be regarded as a general form of the interval data and the crisp data. This paper studies fuzzy clustering algorithm for triangular fuzzy numbers. First of all, we give a novel distance between triangular fuzzy numbers by using three parameters interval number, and prove that the proposed distance is a complete metric on the set of...
This paper address issues that arise in copyright protection systems of digital images, which employ blind watermark verification structures in the curvelet domain. First, we observe that statistical distribution with heavy algebraic tails, such as the alpha-stable family, are in many cases more accurate modeling tools for the curvelet coefficients than families with exponential tails such as generalized...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.