The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Non-malleable codes were introduced by Dziembowski, Pietrzak and Wichs[1] as an elegant generalization of the classical notions of error detection, where the corruption of a codeword is viewed as a tampering function acting on it. Informally, a non-malleable code with respect to a family of tampering functions F consists of a randomized encoding function Enc and a deterministic decoding function Dec...
We present a modified feature point descriptor (M-BRIEF) based on Binary Robust Independent Elementary Features (BRIEF). BRIEF is much faster both to build and to match than SIFT and SURF, and it yields a better recognition as well. However, the matching results are not robust when the viewpoint changes obviously. In our paper, M-BRIEF automatically adjusts the coordinates of the image patch according...
We apply the suboptimal sequential nonparametric hypotheses testing approach for effectiveness of a statistical decision by sample space reducing. Numerical examples of the sample space reducing are given when an appropriate reducing makes it possible to construct robust sequential nonparametric hypotheses testing with a smaller mean duration time then one on the total sample space.
This paper presents a method to hide information in audio. The proposed method modifies at most one bit in a segment containing 256 samples to hide eight bits of the secret message. To increase the security of the proposed scheme, we use permutation to scramble the secret message before hiding. Experimental results show that the inserted message is inaudible and the proposed method is suitable for...
The least mean square (LMS) algorithm is most popular adaptive filter because of its low-cost and robust. However, its convergence rate is slow when the measurement noise is added in unknown system. The combination of two least mean square (CLMS) filters is developed to address the tradeoff in many signal processing applications. Based on the analysis of basic-CLMS algorithm, a novel sign adaptation...
Digital watermarking is a process of embedding watermark signal with its host image to prove its authenticity. In this paper, Embedding and extraction process are applied on the higher frequency domain of Discrete Wavelet Transform (DWT). Using DWT prior to the Discrete Cosine Transform (DCT) provides improved imperceptibility and higher robustness against Signal processing attacks. Arnold transformation...
A distributed autonomous robotic system consisted of many homogeneous autonomous robots without a global controller is often called a swarm robotics system. It is expected that a swarm of robots achieves much more complex tasks than the ones that a single robot can do. However, it is also well known that designing a robot controller for this system is generally quite difficult because the system level...
Voltage and frequency regulations are main requirements for autonomous operation of an isolated microgrid with electronically interfaced distributed energy resource (DER) units. This paper presents a robust decentralized control design scheme for a multi-DER microgrid to enhance its voltage and frequency regulations. The proposed control scheme utilizes linear quadratic (LQ) decentralized control...
The spectrum scarcity problem is occurred due to static allocation of the spectrum and increasing no of applications of the wireless communications. The same problem occurs in the field of radar communication. The solution of the said problem is a cognitive radio. The cognitive radio works on the principle of dynamic access. The essential part of the dynamic access is the spectrum sensing. In this...
The goal of this paper is to compare popular methods of approximation on non-integer order systems and propose strategies of increasing their robustness to numerical errors of their coefficients. It is shown, that popular methods during discretisation lead to instability.
This paper suggests a thin cloud removing approach of remote sensing image based on robust kernel regression. Due to the influence of atmosphere condition, cloud cover is one of the most disturbance factors in remote sensing image. So cloud removal is a very important step for improving the quality of the image before making analysis. Because thin cloud is the low frequency component in remote sensing...
This paper investigates the issue of cooperative spectrum sensing with a crowd of low-end personal spectrum sensors (such as smartphones, tablets, and in-vehicle sensors), where one critical challenge is the uncertainty of the quality of sensing data from crowd sensors that may be unreliable, untrustworthy, or even malicious. Moreover, due to either unexpected equipment failures or malicious behaviors,...
Millimeter-waves offer the possibility of wide bandwidth and consequently high data rate for wireless communications. For both uni- and dual-polarized systems, signals sent over a link may suffer severe degradation due to antenna misalignment. Link robustness may be enhanced by the use of mutual orthogonality in three dimensions. In the general case of a Rician fading channel the inclusion of a third...
The Dynamics of most of the industrial processes exhibits delay in a first order process model commonly known as first order plus dead time process model. In the present investigation, a second order plus dead time process model is converted into first order plus dead time process model with two model order reduction techniques namely Skogestad's and Taylor's series approximation and open loop responses...
Bipedal walking may be a difficult task to execute by a bipedal robot. Different factors such as the arm movement or the constant changing of the Center of Mass may lead to an unstable gait. This may be one of the reasons the trajectory of the Center of Mass should be calculated before making the next step. This paper presents a walking algorithm based on Zero Moment Point for the NAO robot. NAO is...
In light of the stability theory for functional differential equations, the leader-following exponential consensus problem of multi-agent systems with communication delays is investigated. All the follower agents have identical MIMO linear dynamics which can be expressed in any order, and only the delayed state information of each agent is delivered through local communications. By combining the tools...
This paper presents a method for depth measurement based on Speeded Up Robust Features (SURF) and pixel number variation of CCD Images. A single camera is used to capture two images in different photographing distances, where features in the images are extracted and matched by SURF. To remove false matching points, an Identifying point correspondences by Correspondence Function (ICF) method is adopted...
Lateral Inhibition (LI) is a widely conserved patterning mechanism in biological systems across species. Distinct from better-known Turing patterns, LI depend on cell-cell contact rather than diffusion. We built an in silico genetic circuit model to analyze the dynamic properties of LI. The model revealed that LI amplifies differences between neighboring cells to push them into opposite states, hence...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.