The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this study, a novel video surveillance algorithm is developed for detection of abandoned objects in public scenes. Two different foreground model is used to detect moving and temporarily static objects. A subspace learning method, called GoDec, is used to detect foreground objects. By using GoDec algorithm, shape and contour of foreground objects are obtained more precisely than the traditional...
The sensitivities of features extracted from minutia triplets, in fingerprint indexing studies, against distortions on impression images have been compared. It has been shown that the geometric features of triangles can be made robust against elastic distortions and features used in other studies called minutia type, ridge counts and ridge pattern representation decrease indexing performance.
Our position is that a key component of securing cyber-physical systems (CPS) is to develop a theory of accountability that encompasses both control and computing systems. We envision that a unified theory of accountability in CPS can be built on a foundation of causal information flow analysis. This theory will support design and analysis of mechanisms at various stages of the accountability regime:...
The paper studies various mesh topology formation techniques that can be used to aid the development of large-scale capillary networks. The work focuses on how mesh networks can be established using Bluetooth Low Energy exploiting the heterogeneous characteristics of the devices in the network. A novel algorithm called Topology Formation considering Role Suitability (TFRS) is proposed aiming to maximize...
Communication-avoiding algorithms allow redundant computations to minimize the number of inter-process communications. In this paper, we propose to exploit this redundancy for fault-tolerance purpose. We illustrate this idea with QR factorization of tall and skinny matrices. We give a theoretical evaluation of the number of failures our algorithm can tolerate under different semantics and an experimental...
Now a day's large amount of digital information such as video, audio or image is spread over the internet. So it should be a great challenge for all researchers to provide security to such a type of digital data. Also the piracy and copyright is emerging issue when digital information in the form of video, audio & image is transmitted over the transmission media. So to prevent the problem of piracy...
This paper presents a study of distributed cooperative formation control of a generic multiple agent robots which is applicable for underwater system application such as multiple-autonomous surface vehicles (ASV). The control objective of the group of ASV agent is to maintain a certain formation in a predefined geometric pattern, notably a symmetric formation shape. In addition, the centroid of this...
Sliding mode controllers of first and second orders have been designed for linear motion tracking for an eletrohydraulic actuation system having deadband and other nonlinear features like cylinder stiction, hysterisis and Stribeck characteristics. An input linearized structure has been developed to formulate sliding mode controllers, or SMC, of orders 1 and 2 for the nonlinear system. The applied...
In this paper, a new enrollment method for human identification using ECG is proposed. In the method, ECG data of a user are enrolled from five different poses while the user is holding a pair of dry electrodes from an ECG sensor with both hands. The five poses are when the user is holding the sensor in the center, left side, right side, upside, and downside of the user's body. The ECG data are collected...
This paper proposes a new wearable eye-gaze tracking system with a single webcam mounted on the glasses. First, the region of interest (ROI) of eye is extracted by skin detection and eyelid removing. Then Hough circle detection is used to search the candidate of circles in the eye's ROI and applied to determine the status of opening or closing of eye. Based on the circle detection, the eye center...
A voice activity detection in mobile environments is not performed well due to arbitrary noises. In this paper, a robust voice activity detection framework for mobile devices is proposed. The unsupervised clustering and discriminative weight training of each cluster is employed to model various characteristics of arbitrary noises.
This paper deals with the design of a robust adaptive fuzzy nonsingular fast terminal sliding mode control strategy for the relative motion control of spacecraft in formation. A nonsingular terminal sliding surface, along with a fast reaching law, has been considered for fast and finite time convergence. Adaptive tuning algorithms are derived based on Lyapunov stability theory for updating the controller...
This paper presents an Internal Model Based (IMC) tuned PI controller for real-time control of a coupled tank liquid level system. The IMC is a model based controller design technique. In present scenario the IMC Controller method is widely used in almost every process control industries as it allows good set point tracking along with sulky disturbance response especially for the process with a small...
Robustness is an important and challenging issue in internet of things (IoT), where contains multiple types of heterogeneous networks. To solve this problem, we design and realize a greedy model with small world properties (GMSW) for heterogeneous sensor network of IoT. In GMSW, two greedy criteria are presented firstly, which are used to distinguish importance of different network nodes. On the basis,...
The millimeter wave (mmWave) frequencies offer the potential for enormous capacity cellular systems. However, a key challenge in designing robust communication systems in these frequencies is channel intermittency: mmWave signals are extremely vulnerable to blocking and the channel can rapidly appear and disappear with small movement of obstacles and reflectors. This paper presents a novel statistical...
This paper presents two different approaches to derive the asymptotic distributions of the robust Adaptive Normalized Matched Filter (ANMF) under both H0 and H1 hypotheses. More precisely, the ANMF has originally been derived under the assumption of partially homogenous Gaussian noise, i.e. where the variance is different between the observation under test and the set of secondary data. We propose...
In this paper, we study discrete and continuous versions of the LASSO in order to solve the deconvolution problem. We shed light on the Non Degenerate Source Condition, a property which yields support robustness for both the continuous and discrete problems. More precisely, we show that this property yields exact support recovery in the continuous case and the estimation of twice the number of spikes...
Advances in mobile health (mHealth) has been notable in the last few years, but so has the problems associated with the development, implementation and sustained use of mHealth systems. After implementation, various difficulties arise contributing to being considered a failure. The purpose of the study is to create a model by which e-Health systems can be evaluated in order to ensure development for...
Cognitive radio (CR) tends to be the key technology of future wireless networks as it provides the mechanism of enabling the spectrum sensing awareness. The first stage in the cognitive radio duty cycle is spectrum sensing (SS) which is the most challenging stage as it requires an accurate real-time decision of the Primary User (PU) presence or absence in a certain band and allow the Secondary User...
The emergence of new technologies in distributed generations (DG), renewable energy (RE), plugged-in electric vehicles (PEV) connected to the distribution network has necessitated the need to analyze and assess its associated impact on the system. The impact analysis on of distribution systems often involves decisions on major issues pertaining to operation and planning for the entire network. However,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.