The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper is motivated by the fact that the unknown disturbances (UDs) in discrete-time stochastic systems may be associated with state, such as the perturbation and the model error. In such case, the UD takes on the first two moment (FTM) at least, i.e. the property of both mean and covariance. If use the UD-FTM to correct the state estimation and its covariance simultaneously, it should result...
For the surface with grooves measurement, robust filtering is developing direction of traditional filtering, which is to try to minimize the distortion of mean line caused by the abnormal signal. This paper presents a new method for processing, which combines closely error theory with Gaussian filtering method. The abnormal signal is firstly judged« identified and corrected by 5σ criterion. Then Gaussian...
Distributions of test statistics of classical tests for homogeneity of variance (Neyman-Pearson, O'Brien, Link, Newman, Bliss-Cochran-Tukey, Cadwell-Leslie-Brown, Overall-Woodward Z-variance and modified Overall-Woodward Z-variance tests) are investigated including a case when the standard assumption of the normality is violated. The comparative analysis of power of the classical tests is carried...
The paper presents the statistical association criteria applicable at the genome-wide association analysis. The results of power calculation are presented for different alternative hypotheses.
In this paper, an alternative scheme to achieve output tracking for a class of uncertain systems which is designed using back-stepping control and sliding mode control (SMC) can provide exact tracking even in the presence of matched and unmatched disturbances. The newly proposed method is based on a nonlinear disturbance observer (NDOB) which can estimate the unmatched disturbance. Simulation verify...
Voxel-based lesion symptom mapping (VLSM) allows studying the relationship between stroke location and clinical outcome. The core idea of VLSM is to map all patient cases into a common atlas space and then apply statistical tests on a voxel level comparing outcome measures of patients with a lesion in the voxel to those without lesion. A major limitation of VLSM is that it requires a previous lesion...
This paper introduces a robust filtered-x NLMS algorithm with high performance which is designed for active control of impulsive noise system. High performance of the proposed algorithm is realized by obtaining the optimal step size of the filtered-x NLMS algorithm. The optimal step size is developed by analyzing the mean square deviation of filtered-x NLMS algorithm. The optimal step size is applied...
In this paper, we present performance evaluation of multiple physical layer pipe (PLP) based layered division multiplexing (LDM) systems for the next generation terrestrial broadcasting. In addition to a conventional multiple-PLP configuration, which is based on time division multiplexing (TDM), a variety of LDM configurations, which includes combinations of TDM and two-layer LDM, and three-layer...
This paper presents a new optimal decentralized controller design method for solving the tracking and disturbance rejection problems for the class of large scale LTI systems, using only low order decentralized controllers. In particular, the class of large scale systems considered in this paper is described by the LTI model M2ÿ + M1y + M0y = Bu + Eω, where y is the output, u is the input, ω is an...
Dissimilarities in equal error rates (EERs) of multiple matchers heavily influence the performance of multi-biometric systems. A normalization technique aims at improving the recognition rate of such a system. In view of this, in this paper, an anchored normalization technique, referred to as improved anchored min-max (IAMM) technique for a multimodal biometric system, is developed. In the proposed...
The algorithms foundational to visualization are central to the production visualization tools running at computing centers around the world and consume tremendous amounts of finite, limited resources. We believe that understanding the performance characteristics of these algorithms is critical in being good stewards of computational centers' resources. In this paper, we report initial studies on...
In this paper a variability analysis on three generic continuous-time linear equalizer (CTLE) implementations is conducted based on their respective equivalent circuits. It is studied how the simultaneous variation of all circuit elements affects a CTLE's performance. The variability analysis is conducted applying polynomial chaos expansion (PCE) with stochastic testing (ST). To obtain meaningful...
With the rapid expansion of data scale, big data mining and analysis have attracted increasing attention. Outlier detection as an important task of data mining is widely used in many applications. However, conventional outlier detection methods have difficulty handling large-scale datasets. In addition, most of them typically can only identify global outliers and are over sensitive to parameters variation...
In safety-critical applications, including firefighter and law enforcement operations, infrastructure-free localization systems are typically required. These systems must provide accurate localization in all scenarios. Seamless indoor and outdoor localization and navigation, including in dense urban environments, are needed. Multi-sensor fusion algorithms constitute an integral part in all state-of-the-art...
This paper concerns the task of evaluating the similarity of textures instances: Rather than discriminating between different texture classes, our goal is to identify when two images display the same texture instance. To address this problem, we propose an approach inspired by alignment based recognition theories. We offer a pixel-based method, employing a robust, dense correspondence estimation engine,...
A novel approach to solving the robust topology optimization problem under loading uncertainty was developed. According to the superposition principle of linear structure, computational method for the excepted value and standard deviation of the compliance by Monte Carlo sampling is adopted. In order to avoid the computation of the sensitivity of the objective and improve computational efficiency,...
Graph matching is a widely researched topic which has been utilized in various applications of computer vision. Due to the combinatorial nature of graph matching, it is NP-hard to find an exact solution. So exact graph matching is always relaxed to inexact graph matching which seeks to find an approximate solution for the original problem. For a matching problem in quadratic form, semidefinite programming...
We propose a novel, efficient way to identify things to which it is difficult to attach identifiers such as markers, barcodes and RFID tags. With our proposed method, a dot of metallic or glitter ink is attached onto an object and is identified as unique by matching a microscopic image of the dot with a database. The ink is an inexpensive consumer product. It is a mixture of a basic ink with micro...
In the new Steganographic technique, hiding is based on the difference between the secret message value and the pixel value of the green component of the image. The proposed method works in the spatial domain of the image. We check the difference value between secret byte ASCII (American Standard Code for Information Interchange) value and the pixel ASCII value. For comparison embedding is initially...
We show an essentially tight bound on the number of adaptively chosen statistical queries that a computationally efficient algorithm can answer accurately given n samples from an unknown distribution. A statistical query asks for the expectation of a predicate over the underlying distribution, and an answer to a statistical query is accurate if it is “close” to the correct expectation over the distribution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.