Single image defocus deblurring (SIDD) aims to restore an all-in-focus image from a defocused one. Distribution shifts in defocused images generally lead to performance degradation of existing methods during out-of-di...
详细信息
Objective. Functional network connectivity (FNC) estimated from resting-state functional magnetic resonance imaging showed great information about the neural mechanism in different brain disorders. But previous resear...
详细信息
This paper presents a mixed H21H∞ control using fuzzy singularly perturbed model (FSPM) with multiple perturbation parameters. Since FSPM with multiple perturbation parameters is an extension of models with a singl...
详细信息
This paper presents a mixed H21H∞ control using fuzzy singularly perturbed model (FSPM) with multiple perturbation parameters. Since FSPM with multiple perturbation parameters is an extension of models with a single perturbation parameter, the theoretical results are applicable to a larger class of systems described by multiple time scale nonlinear models, such as flying aircraft and flexible space robots. The parameter-independent solution of the mixed H21H∞ controller was obtained in the form of linear matrix inequalities (LMIs). The application of this approach to gust load alleviation of a flying vehicle verifies its effectiveness and flexibility.
Differential equations are a crucial mathematical tool used in a wide range of applications. If the solution to an initial value problem (IVP) can be transformed into an oracle, it can be utilized in various fields su...
详细信息
This paper presents a system overview of Mobile to Server Face Recognition, which is a face recognition application developed specifically for mobile phones. Images taken from mobile phone cameras lack of quality due ...
详细信息
This paper presents a system overview of Mobile to Server Face Recognition, which is a face recognition application developed specifically for mobile phones. Images taken from mobile phone cameras lack of quality due to the low resolution of the cameras. Thus, a prototype is developed to experiment the chosen method. However, this paper shows a result of system backbone without the face recognition functionality. The result demonstrated in this paper indicates that the interaction between mobile phones and server is successfully working. The result shown before the database is completely ready. The system testing is currently going on using real images and a mock-up database to test the functionality of the face recognition algorithm used in this system. An overview of the whole system including screenshots and system flow-chart are presented in this paper. This paper also presents the inspiration or motivation and the justification in developing this system.
This paper describes the development of an embedded smart home management scheme over the Ethernet network. The platform of the smart home management system is built using bespoke embedded system design. An embedded c...
详细信息
This paper describes the development of an embedded smart home management scheme over the Ethernet network. The platform of the smart home management system is built using bespoke embedded system design. An embedded control module developed by exploiting the Web Services mechanism, consist of 15 monitoring channels based on XML SOAP standards. Each channel is integrated to dedicated smart home management scheme and performs bi-directional real-time control. In the event of server unavailability, a mobile based communication module using GSM has been deployed as an alternate management mechanism. The proposed embedded-enabled solution offers bi-directional real-time management as well as optimized performance for smart home environment.
Cyber security is dynamic as defenders often need to adapt their defense postures. The state-ofthe-art is that the adaptation of network defense is done manually(i.e., tedious and error-prone). The ideal solution is t...
详细信息
Cyber security is dynamic as defenders often need to adapt their defense postures. The state-ofthe-art is that the adaptation of network defense is done manually(i.e., tedious and error-prone). The ideal solution is to automate adaptive network defense, which is however a difficult problem. As a first step towards automation, we propose investigating how to attain semi-automated adaptive network defense(SAND). We propose an approach extending the architecture of software-defined networking, which is centered on providing defenders with the capability to program the generation and deployment of dynamic defense rules enforced by network defense tools. We present the design and implementation of SAND, as well as the evaluation of the prototype implementation. Experimental results show that SAND can achieve agile and effective dynamic adaptations of defense rules(less than 15 ms on average for each operation), while only incurring a small performance overhead.
Using the multiple-parameter Monte Carlo method, the effectiveness of the dual threshold voltage technique (DTV) in low power domino logic design is analyzed. Simulation results indicate that under significant tempe...
详细信息
Using the multiple-parameter Monte Carlo method, the effectiveness of the dual threshold voltage technique (DTV) in low power domino logic design is analyzed. Simulation results indicate that under significant temperature and process fluctuations, DTV is still highly effective in reducing the total leakage and active power consumption for domino gates with speed loss. Also, regarding power and delay characteristics, different structure domino gates with DTV have different robustness against temperature and process fluctuation.
Smart Mobile Devices (SMD) are there for many years but using them as learning tools started to emerge as new research area. The trend to merge collaborative learning methodology by using mobile devices in informal co...
详细信息
Currently, many studies use Fourier amplitude spectra of speech signals to predict depression levels. However, those works often treat Fourier amplitude spectra as images or sequences to capture depression cues using ...
详细信息
暂无评论