Interval type-2 (IT2) fuzzy systems have become increasingly popular in the last 20 years. They have demonstrated superior performance in many applications. However, the operation of an IT2 fuzzy system is more comple...
详细信息
In this paper, an automatic reading system for analog instruments has been designed for monitoring in power plants. In a general automatic reading system, there are many limitations to the reading correctness and syst...
详细信息
In this paper, an automatic reading system for analog instruments has been designed for monitoring in power plants. In a general automatic reading system, there are many limitations to the reading correctness and system robustness such as the high cost for the reason that there is only one instrument could be monitored by a single system, the strict restrict of the camera angle, and being not suitable for instruments with dense scales and so on. We present some solutions to overcome these limitations. Firstly, we combine a mobile inspection robot with an image capture device and the imageprocessing method to cut the cost of the monitoring of analog instruments in power plants. Then, we use Hough transform and perspective transform to correct the geometric distortion of images caused by camera angle. Eventually, we get the result of dense scaled instruments based on polar transform. Experiments show that our system performs quite well, and the reading error is less than the results which obtained from the general automatic reading system.
The paper proposes an improved approach to state estimation for nonlinear discrete-time systems based on zonotopes. To overcome the inherent defect of Taylors formula, a lower-order multi-dimensional extension of Stir...
详细信息
The paper proposes an improved approach to state estimation for nonlinear discrete-time systems based on zonotopes. To overcome the inherent defect of Taylors formula, a lower-order multi-dimensional extension of Stirling's interpolation formula is used to realize the linearization of nonlinear models. A nonlinear programming method is used to optimize the guaranteed margin of linearization error to obtain a more compact bound estimation, thereby reducing the conservativeness of the algorithm. Simulation results have shown the effectiveness and improved performance of the proposed algorithm.
An electroencephalogram (EEG) based brain-computer interface (BCI) speller allows a user to input text to a computer by thought. It is particularly useful to severely disabled individuals, e.g., amyotrophic lateral sc...
详细信息
A distinctive data hiding method based on Jigsaw Sudoku is proposed in this *** from other methods,the proposed method is based on Jigsaw Sudoku which is a kind of irregularly shaped *** to the novelty of Jigsaw Sudok...
详细信息
ISBN:
(纸本)9781510871076
A distinctive data hiding method based on Jigsaw Sudoku is proposed in this *** from other methods,the proposed method is based on Jigsaw Sudoku which is a kind of irregularly shaped *** to the novelty of Jigsaw Sudoku,the proposed method can provide a safer scheme for data hiding than that with pure *** proposed method can hide a certain number of 9-ary numbers in a steganographic image which has a corresponding *** a 256*256 key matrix stretched from a size 9*9 Jigsaw Sudoku,secret message can be hidden in a vector image byte by byte in the form of *** results show that,the proposed method has a better peaksignal-to-noise-ratio(PSNR) compared with some other data hiding methods.
In this paper,our proposed scheme using two steganography *** other data hiding schemes,this scheme studies the characteristics of the Tangram puzzle model and the secret message bytes that make up the eight binary bi...
详细信息
ISBN:
(纸本)9781510871076
In this paper,our proposed scheme using two steganography *** other data hiding schemes,this scheme studies the characteristics of the Tangram puzzle model and the secret message bytes that make up the eight binary bits that are hidden into the two *** matrix M *,horizontal and vertical coordinate range from 0 to 255,and the pixel pairs in the cover image are used to help hide the secret message bytes in our *** paired pixel points into single and double number hidden in two *** show that the program can hide relatively more pixels in a cover image with less losing image quality.
—Acquisition of labeled training samples for affective computing is usually costly and time-consuming, as affects are intrinsically subjective, subtle and uncertain, and hence multiple human assessors are needed to e...
详细信息
This paper presents an integration of nonlinear disturbance observer within proxy-based sliding mode control (IDO-PSMC) approach for Pneumatic Muscle Actuators (PMAs). Due to the nonlinearities, uncertainties, hystere...
详细信息
Tissue P systems are computational models inspired by the way of biochemical substance movement/exchange between two cells or between a cell and the environment, where all communication (symport/antiport) rules used i...
详细信息
This paper studies the synchronization problem of coupled delayed multistable neural networks (NNs) with directed topology. To begin with, several sufficient conditions are developed in terms of algebraic inequalities...
详细信息
暂无评论