In the process of maneuvering target tracking, there has the phenomenon of non-linear and linear model estimation. In order to deal with this problem, this paper studies the dynamic positioning and tracking algorithm ...
详细信息
Based on Lyapunov stability theorem, a MRAC system was researched to solve that differential value of plant output is unknown. Meanwhile an improved design for MRAC system aimed on the factor of restricting convergenc...
The collection of light field is a key part of 3D image rendering and multi-view display system construction. Data exchange of light field frequently used in light field camera array requires high real-time performanc...
详细信息
ISBN:
(纸本)9783038352891
The collection of light field is a key part of 3D image rendering and multi-view display system construction. Data exchange of light field frequently used in light field camera array requires high real-time performance and high bandwidth. This paper presents a new method of light field data exchange by applying data distribution service (DDS). Experiment results show it is feasible to apply data distribution service to the light field camera array.
Ensemble learning is one of the successful methods to construct a classification system. Many researchers have been interested in the method for improving the classification accuracy. In this paper, we proposed an ens...
详细信息
ISBN:
(纸本)9783662450482
Ensemble learning is one of the successful methods to construct a classification system. Many researchers have been interested in the method for improving the classification accuracy. In this paper, we proposed an ensemble classification system based on multitree genetic programming for intension pattern recognition using BCI. The multitree genetic programming mechanism is designed to increase the diversity of each ensemble classifier. Also, the proposed system uses an evaluation method based on boosting and performs the parallel learning and the interaction by multitree. Finally, the system is validated by the comparison experiments with existing algorithms.
By reasonably arranging scheduling order and selecting best routes, this system could solve problems in vehicles working planning, such as, selecting routes, and vehicles distribution, which could improve vehicles uti...
详细信息
To address the problem of low system recognition rate in multi-class brain-computer interface (BCI), many ideas have been proposed. Among them frequency optimization is a good option because the performance of BCI sys...
详细信息
PT Tetapundi Prima Kelola (TPK) is a small information technology company located in Jakarta established in 2012 to bridge the technology gapbetween Indonesia and other Asian countries, such as Hong Kong, Singapore, a...
详细信息
ISBN:
(纸本)9781479979738
PT Tetapundi Prima Kelola (TPK) is a small information technology company located in Jakarta established in 2012 to bridge the technology gapbetween Indonesia and other Asian countries, such as Hong Kong, Singapore, and Malaysia. The customers of this company come from various locations in or outside Jakarta capital city. Owing to several obstacles to monitor any particular project progress, this company needs a system to connect Technicians, Sales Department Staffs, and Manager of Sales Department for transforming the project progress data into project progress information. As a result, project-monitoring systems can be employed in this company, where web-based system can help the Sales Department staff to create project progress, which can be easily previewed by the Manager of Sales Department. The creation of database in this system can help the user to store data and information for the order details and project progress. Waterfall Model is used in developing this information system of project monitoring. The design of the system used is a notation of Unified Modeling Language (UML). In the implementation phase, system coding is done using PHP and MySQL, and blackbox testing is conducted to test the system. The outcome of this research is a system design that could help the Manager of Sales Department at PT TPK in monitoring a particular project progress.
For developing the ubiquitous infrastructures of pervasive computing, low earth orbit (LEO) satellite networks, with the ability to provide global broadband access service, are considered as the complement and extensi...
详细信息
In robotic applications, the communication protocol is one of the main features that dictate scalability and network topology. The communication architecture must consider heterogeneity (i.e. network, hardware, operat...
详细信息
Protocols for secure multi-party computation (MPC) that resist a dishonest majority are susceptible to "denial of service" attacks, allowing even a single malicious party to force the protocol to abort. In t...
详细信息
ISBN:
(纸本)9783662443811;9783662443804
Protocols for secure multi-party computation (MPC) that resist a dishonest majority are susceptible to "denial of service" attacks, allowing even a single malicious party to force the protocol to abort. In this work, we initiate a systematic study of the more robust notion of security with identifiable abort, which leverages the effect of an abort by forcing, upon abort, at least one malicious party to reveal its identity. We present the first information-theoretic MPC protocol which is secure with identifiable abort (in short ID-MPC) using a correlated randomness setup. This complements a negative result of Ishai et al. (TCC 2012) which rules out information-theoretic ID-MPC in the OT-hybrid model, thereby showing that pairwise correlated randomness is insufficient for information-theoretic ID-MPC. In the standard model (i.e., without a correlated randomness setup), we present the first computationally secure ID-MPC protocol making black-box use of a standard cryptographic primitive, namely an (adaptively secure) oblivious transfer (OT) protocol. This provides a more efficient alternative to existing ID-MPC protocols, such as the GMW protocol, that make a non-black-box use of the underlying primitives. As a theoretically interesting sidenote, our black-box ID-MPC provides an example for a natural cryptographic task that can be realized using a black-box access to an OT protocol but cannot be realized unconditionally using an ideal OT oracle.
暂无评论