The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we investigate a compact on-chip liquid detector fabricated by integrated passive device (IPD) process. The on-chip detector simply consists of a section of dual-operation mode synthesized transmission line, whose electrical properties are highly depended on the material medium surrounding the chip. Specifically, the capacitance of the line changes in accordance with the dielectric...
Multi-target tracking is one of the most challenging tasks in computer vision. Several complex techniques have been proposed in the literature to tackle the problem. The main idea of such approaches is to find an optimal set of trajectories within a temporal window. The performance of such approaches are fairly good but their computational complexity is too high making them unpractical. In this paper,...
In this paper, we show that for a given pair of metrics, such as IGTE vs. IGFE, number of packets vs. number of network flows, etc., the functional relation between them may be complex and can not be described perfectly by linear equation. In order to capture this complex relationship, we make use of evidence function framework to automatically determine the optimal model for the metrics. Then we...
In this paper the concept of Bayesian Networks (BN) is applied to the problem of traffic data acquisition by data fusion. Two wireless communication based sensors are used as data sources: IEEE 802.15.1 Bluetooth and IEEE 802.11p V2X (vehicle to vehicle and vehicle to infrastructure). Via V2X so called cooperative awareness messages (CAM) are received, which provide information on vehicle location...
Capturing large diffeomorphic deformations is difficult for many non-rigid registration methods. In this paper, we propose Log-Demons with driving force for large deformation image registration. The driving force obtained by boundary points correspondence exerts influence on continuous optimization of Log-Demons to improve the motion direction of points. We utilize MROGH descriptor matching to obtain...
The high levels of urban traffic is becoming a main concern in our societies, generating problems such as excessive fuel consumption, CO2 emissions. Recently, Intelligent Trans-portation Systems (ITS) have emerged as a way to mitigate these problems. However, traffic analysis, improvement typically rely on simulations, which should be as realistic as possible. Meeting this requirement can be complex...
THz-based technologies are promising enabling tools with a broad spectrum of applications, ranging from security and defense to telecommunications and non-destructive control [1]. About two decades ago, M. Dyakonov and M. Shur developped an elegant perturbative theory [2] and successfully predicted the detection of electromagnetic THz radiation based on a gated-Field-Effect Transistor (FET) [3], [4]...
In this paper artificial neural network (ANN) based cascaded learning for stochastic resonance (SR) noise driven spectrum sensing is proposed for cognitive radio (CR). In the first phase of a two-stage cascaded learning system Backpropagation gradient ascent learning is used to estimate optimal noise standard deviation which has an outstanding performance improvement for the discovery of the existence...
This paper considers the problem of constructing a direct coupling quantum observer for a quantum harmonic oscillator system. The proposed observer is shown to be able to estimate one but not both of the plant variables and produces a measureable output using homodyne detection.
This paper studies attackers with specific objectives against a cyber physical system. The attacker performs an integrity attack in order to move the system to a target state while evading detection over a finite time window. We formulate and solve an optimal control problem that captures the attacker's objective - the solution gives the optimal sequence of attacks. We provide a sufficient condition...
Effective detection of the feature points in images requires usage of detectors that produces similar results in variable observation conditions. Authors present a feature detector which is based on a uniformly most powerful invariant algorithm that uses t-test. The authors obtained equations that allow evaluating the effectiveness of the robust feature detector. Simulation proved the robustness (constant...
In this paper, we consider Generalized Gaussian (GG) distribution to model the additive noise source in underwater acoustic (UWA) communication. Since communication in oceanic medium is dominated by both prevailing and spontaneous noise sources, we model the resultant noise distribution as mixture of GG distribution. Owing to the complexity in optimal detector design with GG noise model, we apply...
This paper presents the discussion of the gradient extremum seeking control loop design for a nonlinear nonstationary plant. Suggested closed loop structure is cascaded, with two cascades. The inner cascade includes the dynamical part of a plant, while the outer cascade works with an extremum characteristic. The synchronous detector method is applied as gradient evaluation mechanism. The fast process...
Contour detection is often utilized algorithm in picture processing. Sometimes is useful to localize edges with sub-pixel accuracy. In this paper we discuss about precise position of edge which is moving during the exposure time. To localize moving edge we define accumulative function and then we use three edge detection algorithms with sub-pixel accuracy in 1-D images: algorithm based on approximation...
In this paper, we apply MCMCLDA (Multi-class Markov Chain Latent Dirichlet Allocation) model to classify abnormal activity of students in an examination. Abnormal activity in exams is defined as a cheating activity. We compare the usage of Harris3D interest point detector and a human joints detector, MODEC (Multimodal Decomposable Models), as the feature detector. Experiment results show that using...
Neutron flux is an important parameter for Accelerated Driven Systems. Density of the neutron flux is different in various positions inside a spallation target. The neutron flux can be obtained with the use of threshold activation detectors. An experiment with the spallation target made of 512 kg natural uranium and deuteron beam with energy 8 GeV was performed at the Joint Institute for Nuclear Research...
In this paper, an enhancement for the attacktolerant scheme in the Networked Control System (NCS) is introduced. The objective is to be able to react to an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. The advantage of this proposed approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a...
There is a remarkable body of work for increasing the performance of Deformable Part Models (DPM), which is one of the most popular algorithms that are being used for object detection from digital images. The contribution that has been made to the object detection performance of the DPM algorithm via usage of larger datasets that has been created via production of artificial images from original images...
Built-in Self-Test (BIST) is essential, particularly for radio frequency (RF) devices where off-chip RF signal analysis is costly or in some cases, infeasible. Two major problems have made RF BIST elusive. First, process variations make the BIST circuit behavior hard to predict, limiting accuracy of measurements. Second, the overhead, particularly in terms of performance degradation, make RF BIST...
Power substations generate a significant “bursty impulse noise” that might interfere with wireless technologies working in the vicinity of power equipment. Existing wireless systems are not designed for such an environment; we propose a Maximum a Posteriori (MAP) receiver designed with Markov-Gaussian models in order to mitigate the impact of impulsive noise in substations. We study and compare different...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.