The traditional information hiding schemes embed the information into the image, audio and video etc, for the purposes of copyright protection, authentication, and authorized access control etc. In this paper, we prop...
详细信息
The traditional information hiding schemes embed the information into the image, audio and video etc, for the purposes of copyright protection, authentication, and authorized access control etc. In this paper, we propose to embed the data into the physical layer of the baseband Orthogonal Frequency Division Multiplexing (OFDM) wireless networks. We test the information hiding scheme in an additive white Gaussian noise (AWGN) channel. The experimental results indicate that when the number of carriers is limited and the channel SNR is high enough, the proposed information hiding scheme can work effectively, while the OFDM system can also work well as it used to be.
A novel high-speed photopolarimeter is presented in this paper, which is composed by the optical system, electronics system and PC. This instrument uses a metallic grating that can produce both reflective diffraction ...
An efficient reformative kernel discriminant analysis, namely enhanced kernel discriminant analysis (EKDA), is proposed in this paper. In the proposed algorithm, a novel criterion, i.e., maximizing the class separabil...
详细信息
An efficient reformative kernel discriminant analysis, namely enhanced kernel discriminant analysis (EKDA), is proposed in this paper. In the proposed algorithm, a novel criterion, i.e., maximizing the class separability both in the feature space and in the projection subspace, is presented to enhance the discriminant power of KDA. EKDA is more adaptive to the input data under the novel criterion compared with KDA, which enhances the performance of EKDA. Experiments conducted on the Yale and ORL face databases give the higher recognition performance compared with KDA.
In this paper, we design a discrete-time sliding mode (DSM) nonlinear observer for a class of nonlinear uncertain systems. Taylor series expansion together with a nonlinear state transformation is used to discretize t...
详细信息
In this paper, we design a discrete-time sliding mode (DSM) nonlinear observer for a class of nonlinear uncertain systems. Taylor series expansion together with a nonlinear state transformation is used to discretize the system. A strategy to avoid switching across the sliding manifold is employed, and the sliding trajectory is confined to a boundary layer once it converges to the sliding manifold. We call this phenomenon DSM. The conditions for existence of DSM are derived. The condition for the asymptotical stability of the estimation error is analyzed. An application to a bioprocess is given and the simulation results demonstrate the effectiveness of the proposed scheme
A new repetitive adaptive compensation scheme is proposed for the dynamic friction and periodic ripple moment in a DC (direct current) motor system. The repetitive control scheme is added into the adaptive-based compe...
详细信息
A new repetitive adaptive compensation scheme is proposed for the dynamic friction and periodic ripple moment in a DC (direct current) motor system. The repetitive control scheme is added into the adaptive-based compensation scheme. A LuGre dynamic friction model with non-uniform variation parameters is used in the motor system. The compensation algorithm consists of a PD (proportion differential) component, an adaptive component and a repetitive component. The adaptive component is used to estimate and compensate for unknown model parameters, while the induced repetitive controller is motivated by the attempt to improve the system motion trajectory tracking performance. The system stability and the uniform ultimate position tracking performance are guaranteed by utilizing the Lyapunov method. Finally, computer simulations verify the effectiveness of the proposed scheme for the high-precision servo system.
The paper proposed a subsampling and quantization based watermarking scheme to resist the permutation attack. The subsampling based watermarking schemes have drawn great attention for its convenience and effectiveness...
详细信息
The paper proposed a subsampling and quantization based watermarking scheme to resist the permutation attack. The subsampling based watermarking schemes have drawn great attention for its convenience and effectiveness recently, but this kind of watermarking schemes is very vulnerable to the permutation attack. In this paper, the watermark information is embedded into the average values of the 3-level DWT coefficients to resist the permutation attack. Experimental results show that the proposed scheme can resist not only the permutation attack but also some common image processing attacks.
The paper describes a subsampling and PSK (Phase Shift Keying) based watermarking scheme which can resist the permutation attacking. In recent years, a series of subsampling based watermarking schemes have been propos...
详细信息
The paper describes a subsampling and PSK (Phase Shift Keying) based watermarking scheme which can resist the permutation attacking. In recent years, a series of subsampling based watermarking schemes have been proposed, but in 2005, Lu etc. proposed a permutation attacking algorithm which can effectively destroy this kind of subsampling based watermarking schemes. In this paper, we proposed a subsampling and PSK based watermarking scheme which can resist the permutation attacking. In our method, the watermark information is embedded into the average values of the phase of the DFT coefficients which are in the different subimages. Experimental results show that our scheme can resist the permutation attacking effectively, and it can also resist some common signal processing attacking successfully.
This paper proposes a new model for time-delay systems, which contains multiple successive delay components in the state and has important applications in remote control and network based control. New results on stabi...
详细信息
This paper proposes a new model for time-delay systems, which contains multiple successive delay components in the state and has important applications in remote control and network based control. New results on stability and H ∞ performance are obtained for systems with two successive delay components. The second part of this paper applies the proposed new model to network based control, which has emerged as a topic of significant interest in the control community. A sampled-data networked control system with simultaneous consideration of network induced delays, data packet dropouts and measurement quantization is modelled as a time-delay system with two successive delay components in the state and, the problem of network based H ∞ control is solved accordingly.
Subspace analysis is an effective technique for feature extraction, which aims at finding a low-dimensional space of high-dimensional data. In this paper, a novel subspace analysis method based on data-dependent kerne...
详细信息
Subspace analysis is an effective technique for feature extraction, which aims at finding a low-dimensional space of high-dimensional data. In this paper, a novel subspace analysis method based on data-dependent kernel discriminant analysis (DDKDA) is proposed for dimension reduction. The procedure of DDKDA contains two stages: one is to find the optimal combination coefficients by solving a constrained optimization function which transformed to an eigenvalue problem; other is to implement KDA under the optimal data-dependent kernel with Fisher criterion. DDKDA is more adaptive to the input data than KDA owing to the optimization of projection from input space to feature space with the data-dependent kernel, which enhances the performance of KDA. Experiments on the ORL and Yale face databases demonstrate the good performance of the proposed algorithm
To meet the requirement for precision location of optical feature in the vision coordinates measurement system based on optical features imaging, the Gauss distribution multi-fitting location algorithm based on biline...
暂无评论