Papers by Keyword: Robustness

Paper TitlePage

Authors: Ahmet Gayretli
Abstract: Electromechanical products such as electrical toothbrushes and robots carry multitechnological characteristics, and functional operation of these systems is depended on the successful operation of all system components. There are interactions between electronic and mechanical components, software and other systems in complex products. These interactions such as heat, vibration, gravity, corrosion and electromagnetism can lead to functional and financial losses and failures of these kinds of products. The physical arrangement and mutual relation of subsystems and parts are very important to design reliable and robust systems. However, designing these products is complicated and time-consuming due to limitations on available expertise, tools, and methods. This paper presents a new product development approach proposed for integrating mechanical design with electronic design to improve design and manufacture of electromechanical products in terms of customer requirements, reliability, structural integrity, weight, cost and time. This approach has been implemented in a Delphi based environment integrated with a CAD system. It assists in evaluating complex systems as far as parts relation and their possible effects on each other, costs, weight and physical constraints are concerned in the early design process. This helps the designers to avoid design iterations, and minimize the likelihood of failures and rapidly develop reliable complex products subject to given constraints.
457
Authors: Xiu Hu Tan
Abstract: The popularity of 3D content is on the rise since it provides an immersive experience to viewers. In this paper, we present a new approach to watermarking 3D models based on optimization statistics. Through choosing the vertexes, we are able to obtain to the embedded watermark that has the least modified to topology transform of the 3D geometry model, and then project the watermark to the space that has the least mean square error value. So, we obtain that the robustness of the approach lies in hiding a watermark in the space that is least susceptible to the 3D model potential modification. Through analysis and constraint the conditions, we can obtain a high detection probability, a low false alarm probability. The robustness of our method is demonstrated by various attacks through computer simulation.
708
Authors: Xiu Hu Tan
Abstract: Watermarking embeds information into a digital signal like audio, image, or video. Reversible image watermarking can restore the original image without any distortion after the hidden data is extracted. In this paper, we propose a blind watermarking method based on space reconstruction. Through calculating the statistical property of the digital image, we are able to separately obtain the feature spaces. Passing spaces decomposing and reconstructing of the feature spaces, constructing the embedding matrix, we obtain that the robustness of the approach lies in hiding a watermark in the subspace that is the least susceptible to potential modification; and realize the optimization statistics of the embedding watermark. Through analysis and constraint the conditions of subspace, the algorithm we proposed can obtain a high detection probability and security, a low false alarm probability. The robustness of the watermarking method is demonstrated by a kind of attacks through computer simulation.
712
Authors: Xiu Hu Tan
Abstract: Transparency and robustness are two conflicting requirements demanded by digital image watermarking for copyright protection and many other purposes. In this paper, a robust and transparent watermarking scheme for color images is proposed. The color features for the human visual system are utilized to design the color watermarking algorithm. The basic idea is to embed the invisible watermark into the color image by brightness adjustment and feature component choice. And through analysis and constraint the conditions, we can obtain a high detection probability and security, a low false alarm probability. In the same time, because we use different matrix operation to embed (secret key) and extract (public key) a watermark, we are able to release all information for the public, except the secret key. Our method can extract the embedded watermark without reference image. The robustness of our method is demonstrated by various attacks through computer simulation.
733
Authors: Jun Guo, Y. Gao, T. Xie
Abstract: As a special surface texture evaluation method, motif has received much attention since it was adopted as an ISO standard which is ISO12085 1996. However, like many other evaluation methods, it is based on 2 dimensional lines. The surface itself is three dimensional in nature. 3D motif evaluation should be more suitable. Until now, no 3D motif evaluation method has yet been proposed. A key issue is 3D motif combination to determine how the evaluation should be implemented. Three types of 3D MOTIF combination methods currently used are examined. Features such as algorithm complexity and application range are investigated. We conclude that the best 3D Motif combination method is not currently available. We should select a combination method based on the need for surface function analysis. Hybrid methods are also recommended.
465
Authors: Xiao Qiang Yang
Abstract: Digital watermarking is a new information security technology, and it uses the information to protect the security of multimedia data hiding technique. Digital watermarking in wavelet domain can make effective use of the human visual system characteristics, and can be compatible with the international compression standard, and the embedding watermark signal energy can be distributed to all of the pixel space. Based on the characteristic of multi-resolution wavelet decomposition and human visual system model matching, digital watermarking algorithm based on wavelet transform is proposed in this paper. The algorithm for tamper proof is designed by quantifying the significant wavelet coefficients to embed watermark sequence. Preprocessing and quantifying the image of this algorithm are studied, which resolves the rounding error and overflow problem brought by the watermarked image pixel values of wavelet transform. Through various attack test and analysis, the experimentation shows that it has strong robustness, can resist many common image attacks, and has strong practicability.
3992
Authors: Charles Moy, Massimiliano Bocciarelli, Simon P. Ringer, Gianluca Ranzi
Abstract: This article presents an inverse analysis method based on an instrumented indention to extract materials properties from multilayer material systems. In this case, a 12-layers system comprising of two alternate materials is considered. Each layer is 1 μm thick. The material properties selected for the layers are within the range of common commercial aluminium alloys. The yield stress and strain hardening exponent of the two layers were identified based on a power law type equation to define the stress-strain relationship. A 2D axis-symmetric indenter having 70.3 half angle was used, which is representative of a Berkovich or a Vickers indenter. The use of finite element analyses was substituted with a fast and equally accurate approach for the iterative optimization procedure. Thus, the computation time was considerably reduced. The robustness is tested using pseudo-experimental results, in terms of indentation curve and imprint on the material, with added random noises of 2.5%, 5.0%, 7.5% and 10.0%. The proposed approach provides a good estimate of the sought material properties. It is envisaged that this approach can become of assistance in the evaluation of the material properties for multilayer coatings and small devices.
2775
Authors: Jiang Hai Deng, Wen Jun Yan, Qiang Yang
Abstract: This paper presents a novel design solution of digital micro-ohmmeter based on the micro-resistance measurements. Through the system analysis, two key factors which have impacts on the measurement accuracy are identified: constant-current source circuit and A/D converter. Therefore, we suggest a design approach to improve the common constant-current source circuit to obtain enhanced system linearity, stability, precision and robustness and use high resolution A/D converter to ensure converting accurately. The proposed design approach is assessed and demonstrates that the load disturbance can be limited to 0.05%, and the measurement precision could reach 0.2% ranging from 20mΩ to 20Ω and 1.0% below 20mΩ.
36
Authors: Shan Wang, Cheng Gu
Abstract: In traditional Kalman filtering algorithm, the system noise and observation noise should be assumed as zero-mean Gaussian white noise, meanwhile need the state-space model and relevant references be given and accurate. However, the white noise is just an ideal noise model that doesnt exist in real environment. This paper analyzed the effect to filtering result from the statistical estimation in traditional Kalman filtering algorithm and brought interval calculation into traditional Kalman filtering algorithm, which based on the concept of interval and could improve the robustness of the system, decrease the error caused by the statistical estimation of noise model.
465
Authors: Fu Lin Li, Jie Yang, Hong Wei Zhou, Ying Liu
Abstract: Traditional static analysis methods such as formal validation and theorem proving were used to analyze protocols security previously. These methods can not measure and evaluate actual security of protocols accurately for the setting and suppose are far from the actual conditions. This paper proposes a new dynamic protocol analysis model. The system based on the model can be used to active test in actual running conditions, analyze known protocols security, integrity, robustness, and analyze unknown protocols online, provide support for protocol designer. The systems structure, working flow and implementation of key modules are described. The experimental results validate the validity of the models design.
1761
Showing 1 to 10 of 189 Paper Titles