We introduce an (equi-)affine invariant geometric structure by which surfaces that go through squeeze and shear transformations can still be properly analyzed. The definition of an affine invariant metric enables us t...
详细信息
The specific relationships between the classical pole-placement state feedback, the RICCATI equation based LQ paradigm and the KALMAN frequency domain approach are discussed. It is shown that arbitrary pole placement ...
详细信息
ISBN:
(纸本)9780889869226
The specific relationships between the classical pole-placement state feedback, the RICCATI equation based LQ paradigm and the KALMAN frequency domain approach are discussed. It is shown that arbitrary pole placement is not possible by standard LQ optimality. A possible solution of this anomaly is to use more general LQ criterion with specific weights on the state, input and crossterm.
The control error in a generic two-degree of freedom (TDOF) control system can be decomposed into three major parts: design-, realizability- and modeling-loss. This new decomposition opens useful ways for practical op...
详细信息
ISBN:
(纸本)9780889869226
The control error in a generic two-degree of freedom (TDOF) control system can be decomposed into three major parts: design-, realizability- and modeling-loss. This new decomposition opens useful ways for practical optimization of TDOF systems and helps the construction of new algorithms for robust identification and control. The paper investigates the optimality of the third term.
In ubiquitous computing, data should be able to be accessed from any location, and the correctness of data becomes vital during the communication. Suppose that many users sign different messages respectively, before f...
详细信息
In ubiquitous computing, data should be able to be accessed from any location, and the correctness of data becomes vital during the communication. Suppose that many users sign different messages respectively, before forwarding or sending these messages, then the verifier must spend a lot of computing time to verify their signatures. Consequently, the aggregate signature scheme is an effective method of improving efficiency in this kind of systems, which provides the convenience for the verifier. In this paper, we propose a new certificateless aggregate signature scheme which is efficient in generating a signature and verification. This scheme is provably secure under the extended computational Diffie-Hellman assumption.
The aim of the ERAMIS project is to create a Master degree computer as a Second Competence in 9 beneficiary universities of Kazakhstan, Kyrgyzstan and Russia. This contribution presents how faculty development is orga...
详细信息
The IT industry has been focusing for several years on providing to users and designers the possibility of creating software applications disregarding hardware resources. Multi-processor architectures seem to be more ...
详细信息
The IT industry has been focusing for several years on providing to users and designers the possibility of creating software applications disregarding hardware resources. Multi-processor architectures seem to be more of interest in recent developments because of their capacity to exploit programmable parallelism at acceptable costs without posing severe software designing problems. But in any thinkable scenario, software will always be dependent on the hardware it is executing on. In another matter of speaking, hardware performances will always affect software's ability in providing results. There is also the question if the gathered results are correct or not, if the system that provides them is fast, safe and if it is a reliable and a maintainable one. This paper proposes a scalable architecture surrounding a single core microprocessor with the purpose of increasing computational speed and reliability. For achieving this, a flexible hardware platform would be appropriate, e.g. field programmable gate arrays (FPGAs). The single core system will revolve around a Picoblaze soft-core microprocessor. By generating a series of modules with the same functionality as the executing software, an N-module redundancy system will increase systems security and reliability.
Reversible data embedding is becoming a very important issue in securing images transmitted over the Internet, especially in dealing with sensitive images such as those created for military data and medical data. Base...
详细信息
Reversible data embedding is becoming a very important issue in securing images transmitted over the Internet, especially in dealing with sensitive images such as those created for military data and medical data. Based on the relationships between pixels and their neighbors, we propose a reversible data embedding scheme to embed hidden messages into an original image. In our proposed scheme, a two-layer data embedding approach is used for our proposed data embedding phase. Layer-1 embedding is used to hide secret data. Layer-2 embedding, which is an embedding variant of the proposed layer-1 embedding, is used to hide side information, such as the parameters required to restore the marked image. In our layer-1 embedding, the value of an embedded pixel is determined according to a predetermined threshold and the relationship between the pixel and its neighbors. In our layer-2 embedding, the similar data embedding concept is expanded to the block-based. Experimental results provide supportive data to show that the proposed scheme can provide greater hiding capacity while preserving the image quality of a marked image in comparison with previous work.
The aim of the ERAMIS project is to set up a network of Master's degree informatics as a Second Competence among 9 beneficiary universities of Kazakhstan, Kyrgyzstan and Russia, and 5 European universities. This c...
详细信息
This article is focused on the utilisation of force, specifically the impulse of force in self-defence. It also points out the fact that this field suffers from a great shortage of specialised measurements and experim...
详细信息
Cloud Computing is a technology which is susceptible to a continuous development, because of its strong advantages of accessing data from any place in the world over the Internet without concerning about the infrastru...
详细信息
Cloud Computing is a technology which is susceptible to a continuous development, because of its strong advantages of accessing data from any place in the world over the Internet without concerning about the infrastructure used and the problems involved by the installation and maintenance processes. The purpose of this article is to provide an overview of several management interfaces for Eucalyptus cloud by addressing the taxonomy and evaluation of the cloud management interfaces. The taxonomy proposed in this paper results from the work accomplished by experimenting the Eucalyptus community cloud. First, an evaluation of the Eucalyptus architecture is presented, in order to emphasize the Eucalyptus platform involved in cloud management process, which facilitates the deployment, management and execution of Infrastructure-as-a-Service (laaS). The cloud management tools are described from two perspectives. The first perspective analyzes the cloud portals from the user roles, while the second perspective addresses them with respect to the type of the tools employed. The taxonomy presented in this paper is related with the 5 elements of the Common Cloud Management Architecture (CCMA), which was provided by Behrendt, et al. (2011) as one of the components of mM Cloud Computing Reference Architecture. Thus, the first category of interfaces (i.e. the cloud portals from the user roles) encompasses the Service Consumer Portal, the Service Provider Portal and the Service Development Portal, while second category of interfaces includes the main components of CCMA: Operational Support Services (OSS) and Business Support Services (BSS). Cloud management is a subject approached by researchers in the community and this can be observed by the big number of third party cloud management providers (i.e. RightScale, enStratus, IMOD Kaavo, CloudWatch, Scarl, Tapin, Cloudkick). This article is motivated by the fact that cloud management is a fundamental support for all users of cloud se
暂无评论