In recent papers, the authors proposed a novel control approach based on the use of a Switching Linear Internal Model (SLIM) to cope with asymptotic tracking of a significant class of periodic references for 'real...
详细信息
In this paper a novel modelling methodology for industrial automation discrete event dynamical systems is presented and some preliminary results are drawn by means of a significative example. The proposed approach exp...
详细信息
Recently, failure detection by acoustic data is applied to quality check such as new or used bill classification. However, it is difficult to reduce the noise in acoustic data of bill by conventional techniques since ...
详细信息
This note studies geometrical structure of the manifold of escort probability distributions and proves that the resultant geometry is dually flat in the sense of information geometry. We use a conformal transformation...
This note studies geometrical structure of the manifold of escort probability distributions and proves that the resultant geometry is dually flat in the sense of information geometry. We use a conformal transformation that flattens the alpha-geometry of the space of the discrete probability distributions in order to realize escort probabilities in the framework of affine differential geometry. Dual pairs of potential functions and affine coordinate systems on the manifold are derived, and the associated canonical divergence is shown to be conformal to the alpha-divergence.
E-learning platforms often include assessment tools to measure the outcomes of the learning process. Such tools can be used both for self-evaluation, while the learning activity is in progress, and for external final ...
详细信息
We demonstrate a system is comprised of a single-hop network structure with ultra-compact sensor nodes densely deployed and operating at non-trivial data rates. The contribution of our research is a light-weight, mult...
详细信息
ISBN:
(纸本)9781424451081
We demonstrate a system is comprised of a single-hop network structure with ultra-compact sensor nodes densely deployed and operating at non-trivial data rates. The contribution of our research is a light-weight, multi-channel protocol which minimizes the complexities on the sensor nodes while retaining high flexibility and high scalability. The data streams collected by the base stations are transmitted over the Fast Ethernet to the host for real-time data logging. The system keeps gathering data in a network of 100 sensor nodes organized as two frequency groups, and all sensor nodes are deployed within 2m2 area.
In this paper, a hierarchical evolutionary approach is proposed for an -complete telecommunication problem - all optical WDM mesh network survivability under shared-rish-link-group (SRLG) constraints. A parameterized ...
详细信息
Information security requires a method to establish digital credentials that can reliably identify individual users. Since biometrics is concerned with the measurements of unique human physiological or behavioural cha...
详细信息
ISBN:
(纸本)9781424427734
Information security requires a method to establish digital credentials that can reliably identify individual users. Since biometrics is concerned with the measurements of unique human physiological or behavioural characteristics, the technology has been used to verify the identity of computer or network users. Given today's heightened security requirements of military as well as other applications such as banking, health care, etc., it is becoming critical to be able to monitor the presence of the authenticated user throughout a session. This paper presents a prototype system that uses facial recognition technology to monitor the authenticated user. The objective is to ensure that the user who is using the computer is the same person that logged onto the system. A neural network-based algorithm is implemented to carry out face detection, and an eigenface method is employed to perform facial recognition. A graphical user interface (GUI) has been developed which allows the performance of face detection and facial recognition to be monitored at run time. The experimental results demonstrate the feasibility of near-real-time continuous user verification for high-level security information systems.
This paper is intended to present a lossless image compression method based on multiple-tables arithmetic coding (MTAC) method to encode a gray-level image f. First, the MTAC method employs a median edge detector (MED...
详细信息
This paper is intended to present a lossless image compression method based on multiple-tables arithmetic coding (MTAC) method to encode a gray-level image f. First, the MTAC method employs a median edge detector (MED) to reduce the entropy rate of f. The gray levels of two adjacent pixels in an image are usually similar. A base-switching transformation approach is then used to reduce the spatial redundancy of the image. The gray levels of some pixels in an image are more common than those of others. Finally, the arithmetic encoding method is applied to reduce the coding redundancy of the image. To promote high performance of the arithmetic encoding method, the MTAC method first classifies the data and then encodes each cluster of data using a distinct code table. The experimental results show that, in most cases, the MTAC method provides a higher efficiency in use of storage space than the lossless JPEG2000 does.
In this paper, as a key technology for the improvement of a speech recognition system in car environments, we propose a single-microphone-based acoustic echo canceller that selects an optimum cancellation result based...
详细信息
In this paper, as a key technology for the improvement of a speech recognition system in car environments, we propose a single-microphone-based acoustic echo canceller that selects an optimum cancellation result based on the echo estimation with maximum likelihood using an acoustic model for signals from multi-loudspeakers. The results of experiments conducted on speech superimposed on music show that the proposed canceller can improve the S/N ratio and speech recognition rate, compared to the canceller based on a NLMS algorithm, where the signals from multi-loudspeakers are measured by a single microphone.
暂无评论