output vector
Recently Published Documents


TOTAL DOCUMENTS

52
(FIVE YEARS 17)

H-INDEX

10
(FIVE YEARS 1)

2021 ◽  
Vol 2131 (3) ◽  
pp. 032021
Author(s):  
A Voevoda ◽  
V Shipagin ◽  
K Bobobekov

Abstract Modification of the algorithm for the polynomial synthesis of a multi-channel controller was proposed to preserve all control channels in this article. In order to test the functionality of the proposed modification, an example of a linear model of an unstable multi-channel plant is considered. The choice of the plant was determined by the possibility of a visual algorithm demonstration for polynomial synthesis of the controller, taking into account the proposed modifications.The plant was represented as three series-connected standard links: an aperiodic link of the first order, an unstable link, and an integrator, and has three input and two output channels. The control in the system is carried out in the feedback of the system and is summed up with the input impact. The feature of the plant is to limit the task to the second output, since it is essentially a derivative of the first output. In addition, the plant has a direct input–output channel. That is, the traversal matrix of the system is nonzero (when described through the state space). The synthesis task was set as follows: it is necessary to achieve certain quality indicators of the output vector value while maintaining all three control channels of the plant.


2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Heng Luo ◽  
Xinyu Hu ◽  
Youmin Zou ◽  
Xinglei Jing ◽  
Chengyi Song ◽  
...  

Abstract GPS has a sharp performance decline in terms of accuracy indoors due to the complex building structure. A combined algorithm, targeting at received signal strength indication (RSSI) calibration optimisation, depending on deep neural network training via input vector Γ and the target output vector Ψ, termed reference signal optimisation algorithm (RSOA) is proposed to improve the positioning accuracy in the indoor Bluetooth positioning networks. Experimental results show that the relative error of the proposed RSOA between the estimated results and the measured ones can reach as low as 0.2%, and the absolute errors can be reduced to 0.13 m at most within 10 m.


2021 ◽  
Vol 11 (5) ◽  
pp. 605-613
Author(s):  
Mohamed Jarjar ◽  
Said Hraoui ◽  
Said Najah ◽  
Khalid Zenkouar

This document traces the development of a new cryptosystem using two circuits ensured by a deep Vigenere classical technique improvement. This new technique employs several dynamic substitutions matrices attached to chaotic replacement functions; whose construction will be detailed. The first round will start by modifying the seed pixels based on the initial values calculated from the original image, and will be infected through the chaotic map used to overcome the uniform image problem, followed by the injection of Vigenere technology improvements. The output vector will be subdivided into three sized blocks for future application of deeply improved genetic mutations to better adapt to medicine and color image encryption. The second round will increase the complexity of the attack and improve the installed systems. Simulations performed on a large number of images of different sizes and formats ensure that our approach is not exposed to known attacks.


Author(s):  
Said Hraoui ◽  
Abdellatif JarJar

This document introduces a new cryptosystem mixing two improvement standards generally used for text encryption, in order to give birth a new color image encryption algorithm capable of dealing with known attacks. Firstly, two substitution matrixes attached to a strong replacement function will be generated for advanced Vigenere technique application. At the end of this first round, the output vector is subdivided into size blocks according to the used chaotic map, for acting a single enhanced Hill circuit insured by a large inversible matrix. A detailed description of such a large involutive matrix constructed using Kronecker products will be given. accompanied by a dynamic translation vector to eliminate any linearity. A solid chaining is established between the encrypted block and the next clear block to avoid any differential attack. Simulations carried out on a large volume of images of different sizes and formats ensure that our approach is not exposed to any known attacks.


Author(s):  
Damian Musk

The quantum Fourier transform (QFT) can calculate the Fourier transform of a vector of size N with time complexity 𝒪(log2N) as compared to the classical complexity of 𝒪(NlogN). However, if one wanted to measure the full output state, then the QFT complexity becomes 𝒪(Nlog2N), thus losing its apparent advantage, indicating that the advantage is fully exploited for algorithms when only a limited number of samples is required from the output vector, as is the case in many quantum algorithms. Moreover, the computational complexity worsens if one considers the complexity of constructing the initial state. In this paper, this issue is better illustrated by providing a concrete implementation of these algorithms and discussing their complexities as well as the complexity of the simulation of the QFT in MATLAB.


2020 ◽  
Vol 10 (3) ◽  
pp. 1120
Author(s):  
Durkhyun Cho ◽  
Jin Han Lee ◽  
Il Hong Suh

We live in an era of privacy concerns. As smart devices such as smartphones, service robots and surveillance cameras spread, preservation of our privacy becomes one of the major concerns in our daily life. Traditionally, the problem was resolved by simple approaches such as image masking or blurring. While these provide effective ways to remove identities from images, there are certain limitations when it comes to a matter of recognition from the processed images. For example, one may want to get ambient information from scenes even when privacy-related information such as facial appearance is removed or changed. To address the issue, our goal in this paper is not only to modify identity from faces but also keeps facial attributes such as color, pose and facial expression for further applications. We propose a novel face de-identification method based on a deep generative model in which we design the output vector from an encoder to be disentangled into two parts: identity-related part and the rest representing facial attributes. We show that by solely modifying the identity-related part from the latent vector, our method effectively modifies the facial identity to a completely new one while the other attributes that are loosely related to personal identity are preserved. To validate the proposed method, we provide results from experiments that measure two different aspects: effectiveness of personal identity modification and facial attribute preservation.


2020 ◽  
Vol 19 (1) ◽  
pp. 104-127
Author(s):  
Natalia Dudarenko ◽  
Nina Vunder

The problem of a priory control of potential degeneration of continuous multichannel dynamic systems is considered in the paper. Degeneracy is a property of a system describing operability of a multichannel dynamic system together with the basic properties of stability, reliability and invariance to the changing conditions. An assessment of potential generation of a system and its configuration together with the interconnections and polynomial exogenous signal is proposed. Degeneration process of a multichannel dynamic systems is a process of the rank reducing of the linear operator of the system. This statement is a basic concept of the degeneration factors approach. Algebraic properties of the matrix of the system’s operator is considered, and the matrix is named as the criterion matrix. Degeneration factor is calculated with the singular values of the criterion matrix. The global degeneration factor is conditional number of the criterion matrix of a system. In contrast to previous solutions it is proposed to form the criterion matrix of a system with the resolvent of its state matrix. Deparameterization of the linear algebraic problem is realized by additive decomposition of the output vector of the system by derivatives of the exogenous signal, and the steady-state mode of the system is considered. The procedure of a priori estimation of degeneration of continuous multichannel dynamic systems is proposed. The ways to achieve the required value of degeneration of the criterion matrix of the system with the modal control methods are discussed. The paper is supported with examples.


2020 ◽  
pp. 104-127
Author(s):  
Natalia Dudarenko ◽  
Nina Vunder

The problem of a priory control of potential degeneration of continuous multichannel dynamic systems is considered in the paper. Degeneracy is a property of a system describing operability of a multichannel dynamic system together with the basic properties of stability, reliability and invariance to the changing conditions. An assessment of potential generation of a system and its configuration together with the interconnections and polynomial exogenous signal is proposed. Degeneration process of a multichannel dynamic systems is a process of the rank reducing of the linear operator of the system. This statement is a basic concept of the degeneration factors approach. Algebraic properties of the matrix of the system’s operator is considered, and the matrix is named as the criterion matrix. Degeneration factor is calculated with the singular values of the criterion matrix. The global degeneration factor is conditional number of the criterion matrix of a system. In contrast to previous solutions it is proposed to form the criterion matrix of a system with the resolvent of its state matrix. Deparameterization of the linear algebraic problem is realized by additive decomposition of the output vector of the system by derivatives of the exogenous signal, and the steady-state mode of the system is considered. The procedure of a priori estimation of degeneration of continuous multichannel dynamic systems is proposed. The ways to achieve the required value of degeneration of the criterion matrix of the system with the modal control methods are discussed. The paper is supported with examples.


Sign in / Sign up

Export Citation Format

Share Document