The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As is known to all, luminance and luminance distribution are both important factors influencing people's impression of the luminous environment. The traditional measuring devices are hard to meet the demand of lighting practice. A CCD-based luminance meter could evaluate the luminance of several small portions of a surface (“point” luminance). Although some manufactures have already produced reliable...
In this paper, mathematical morphology and its application on suppressing the noises in polluted insulator discharge acoustic emission signal are studied. After analyzing the typical characteristics of polluted insulator discharge signal, edge detection and Top-Hat Transform are adopted to suppress the noises in acoustic emission signal. Both of the two methods are able to remove noises in polluted...
In recent years, Full-Authority Digital Electronic Control (FADEC) system needs some component redundancy in order to attain sufficient reliability. So sensors failure diagnosis method is developed in this paper. Accommodation filters have been used in hard-failure and simulations have been done in fault sensors in the paper. From the simulation results, the conclusion can be deduced that the fault...
The accurate measurement of the pulverized-coal concentration in the powder-transmission pipe of the coal pulverizing system of thermal power plant can effectively reflect the operation efficiency of the system, and the preprocessing of several key variables, that are adopted to represent the pulverized-coal concentration, is an important step. In this paper, we propose a preprocessing method based...
Abstract-Deficiencies and excess of soybean's plant nitrogen is the key of soybean nutritional diagnosis. Applying image processing technique, this paper studied the leaf images of the six stages of soybean growth, which nitrogen fertilizer applied were 0%, 50%, 100% and 150%. Using image preprocessing, the noise of source image was removed and the areas of interest were enhanced, leaves and background...
Minimum covariance spectrum (MCS) estimation method is not robust in alpha stable distribution because of no finite covariance. A pseudo-power spectrum estimation method based on fractional low-order covariance (FLOC) matrix is proposed in this paper to improve MCS estimation method. The pseudo-power of a frequency point can be obtained by using FLOC matrix, and its pseudo-power spectrum (PPS) can...
The area aerial defense antimissile multi-sensor system always need to assure to accomplish the mission, and try to enshroud itself possibly at the same time. Therefore, the sensor management system must reduce the use of resource furthest on the premise of meeting the tracking precision, especially reduce the initiative-sensor boot-strap time. According to this purpose, we discuss a sensor management...
In order to investigate the physiological effects of airport noise exposure on organisms, in this study, we exposed Sprague-Dawley rats in soundproof chambers to previously recorded aircraft-related noise for 36 days. For comparison, we also used unexposed control rats. Noise was arranged according to aircraft flight schedules and was adjusted to its weighted equivalent continuous perceive noise level...
In this research, the combination of modal data is used to identify the damage of a FEM model using neural networks. The identification ability with different levels of noise and incomplete mode shapes are also investigated. It has been proved that the neural network using combination of modal parameters as input has a excellent identification ability with ideal error tolerance and robustness. Numberical...
This paper provides on effective Shuffled Embedded Technique (SET) to eliminate the drawback of substitution technique. Using the genetic algorithm, message bits are embedded into multiple, vague (blurred) and higher LSB layer in order to increase robustness, which is achieved by embedding secret messages in digital audio stream. Additional careful considerations are taken against the premeditated...
We present the calculation of noise expressions of low voltage amplifiers by applying symbolic nodal analysis and using nullors. The nullor equivalents of the MOSFETs include only the dominant parasitic elements in order to generate a simplified symbolic noise expression, which provides a good insight to improve the design of low voltage amplifiers. The generated symbolic noise expressions are compared...
We consider statistical data analysis in the interactive setting. In this setting a trusted curator maintains a database of sensitive information about individual participants, and releases privacy-preserving answers to queries as they arrive. Our primary contribution is a new differentially private multiplicative weights mechanism for answering a large number of interactive counting (or linear) queries...
The notion of universally utility-maximizing privacy mechanism was recently introduced by Ghosh, Rough garden, and Sundararajan [STOC 2009]. These are mechanisms that guarantee optimal utility to a large class of information consumers, simultaneously, while preserving Differential Privacy [Dwork, McSherry, Nissim, and Smith, TCC 2006]. Ghosh, Rough garden and Sundararajan have demonstrated, quite...
This paper presents the results from a neural network rule extraction algorithm applied to the LED display recognition problem. We show that pruned neural networks with small number of hidden nodes and connections are able to recognize all the 10 digits from 0 to 9. Earlier work by other researchers demonstrated how symbolic fuzzy rules can be extracted from trained neural networks to solve this problem...
Tracking of a ballistic target in its reentry phase by considering the radar measurements is a highly complex problem in nonlinear filtering. Kalman Filter (KF) is used to estimate the positions of the target when the measurements are corrupted with noise. If the measurements (range and bearing) are nonlinear then Unscented Kalman filter (UKF) can be used. For obtaining reliable estimate of the target...
We present a Fourier-analytic approach to list-decoding Reed-Muller codes over arbitrary finite fields. We use this to show that quadratic forms over any field are locally list-decodeable up to their minimum distance. The analogous statement for linear polynomials was proved in the celebrated works of Goldreich-Levin and Goldreich-Rubinfeld-Sudan. Previously, tight bounds for quadratic polynomials...
Strong cryptographic security, short encryption time, and robustness against noise are three goals of cryptosystem. However, most existing chaotic cryptosystems only focus on the research of enhancing cryptographic security and shortening encryption time. To overcome drawbacks and weaknesses of the existing algorithms, the paper analyzes the pseudo-chaotic characteristics of irrational numbers and...
This research gives a new improvement scheme of Lorenz signal based on chaotic masking secure communication, which improves the notable features of Lorenz signal and the confidentiality of transmission signal in channel. The scheme here mainly changes the properties of chaotic signal in both time and frequency domains, which makes the masking signal in channel more like noise. This paper also does...
Recently, road detection technique is a very important part of vision navigation, which is the key technique of intelligent vehicle guidance. The detection result is seriously affected by the quality of noise and image. Road edge detection is help to analyze the direction of the road extension and the specific location of obstacles, size and speed of obstacles in the road. In this paper, several typical...
This paper proposes a distortionless image data hiding algorithm based on integer wavelet transform that can hide data into the original image .The data can be retrieved and the original image can be recovered without any distortion after the hidden data are extracted. This algorithm hides data into one or more middle bitplane(s) of the integer wavelet transform coefficients in the LH, HL and HH frequency...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.