In recent years, the hyperspectral image (HSI) classification has attracted great attention in the field of earth observation. With the expansion of application scenarios and the continuous improvement of application ...
详细信息
Continual Learning (CL) is a novel paradigm in which the trained model is computed via a stream of data where tasks and data are only available over-time. Indeed, such approaches are able to learn new skills and knowl...
详细信息
In the remanufacturing process, the efficient disassembly of end-of-life (EOL) products assumes paramount significance for recycling endeavors. This work introduces a novel disassembly model aiming at enhancing disass...
详细信息
Due to the development of hacking programs, it has become easy to penetrate systems. Hence, there is a need for strong security mechanisms. The use of traditional passwords has become insufficient to secure systems. B...
详细信息
Due to the development of hacking programs, it has become easy to penetrate systems. Hence, there is a need for strong security mechanisms. The use of traditional passwords has become insufficient to secure systems. Biometric authentication is now widely used for security applications, and it has proven to be superior compared to traditional authentication methods. However, two issues need to be considered in biometric systems. The first is not to keep biometric data in its original form in the database. If biometric traits are hacked, they will no longer be of use. Biometric data should be kept in cancelable forms for reuse. The second issue is the reliance on a single biometric, which limits the verification accuracy. This can be solved by using a multimodal biometric system. Using steganography and cryptography, this paper introduces a cancelable multimodal biometric system. As voiceprints, facial images, and fingerprint images are used. In this paper, the verification is performed through the Mel frequency cepstral coefficients (MFCCs) of the voiceprints. Steganography is used as a tool to secure features extracted from voiceprints by embedding them into the facial image using block-based singular value decomposition (BSVD). Double random phase encoding (DRPE) is utilized as an encryption algorithm to generate the final cancelable templates. To increase the level of system security, fingerprint images are used as random phase masks (RPMs). Verification is performed by estimating the correlation between registered and test MFCCs. The correlation value is then compared with a threshold value, which is calculated using the distribution curves for the genuine and imposter correlations. Equal error rate (EER) values close to zero and an area under the receiver operator characteristic curve (AROC) that is close to one are obtained from the simulation results, demonstrating the outstanding performance of the suggested system. The proposed system achieves good performan
Extracting parameters accurately and effectively from solar photovoltaic (PV) models is crucial for detailed simulation, evaluation, and management of PV systems. Although there has been an increase in the development...
详细信息
Brain networks typically exhibit characteristic synchronization patterns where several synchronized clusters coexist. On the other hand, neurological disorders are considered to be related to pathological synchronizat...
详细信息
LoRa networks operating in a star topology, this configuration creates a single point of failure and may limit scalability and reliability in areas that are large and geographically dispersed. In order to improve the ...
详细信息
In this paper, we consider the analysis and control of continuous-time nonlinear systems to ensure universal shifted stability and performance, i.e., stability and performance w.r.t. each forced equilibrium point of t...
详细信息
Human-Robot collaboration as a challenging task has received great attention in the academic research field. Many existing search models are aimed at single agent or multi-agent, but there are some defects in the sear...
详细信息
This paper investigates the pursuit-evasion problem involving one evader and multiple pursuers with limited sensing capability, where the evader tries to maximize the distance with the pursuers, while the pursuers hav...
This paper investigates the pursuit-evasion problem involving one evader and multiple pursuers with limited sensing capability, where the evader tries to maximize the distance with the pursuers, while the pursuers have different objectives based on whether they can receive the information of the evader. The subgroup of pursuers who can observe the evader(called leaders) tries to be close to the evader, and the other subgroup of pursuers(called followers) tries to synchronize with their neighbors. When the subgraph formed by all leaders is complete, sufficient conditions are given to guarantee that the pursuers capture the evader and the pursuit-evasion game composed of the evader and leaders reaches Nash equilibrium. Furthermore, for the incomplete subgraph case, the distributed observers are proposed to estimate the relative positions between the evader and all leaders. It is shown that the distributed control strategy based on the observers converges exponentially to the Nash equilibrium solution, and makes the pursuers capture the evader. Finally, simulation examples are provided to verify the effectiveness of the proposed strategies.
暂无评论