Search results for "Robustness"

showing 10 items of 512 documents

Defending Surveillance Sensor Networks Against Data-Injection Attacks Via Trusted Nodes

2018

By injecting false data through compromised sensors, an adversary can drive the probability of detection in a sensor network-based spatial field surveillance system to arbitrarily low values. As a countermeasure, a small subset of sensors may be secured. Leveraging the theory of Matched Subspace Detection, we propose and evaluate several detectors that add robustness to attacks when such trusted nodes are available. Our results reveal the performance-security tradeoff of these schemes and can be used to determine the number of trusted nodes required for a given performance target.

business.industryComputer scienceDetector020206 networking & telecommunications020207 software engineering02 engineering and technologyAdversaryRobustness (computer science)Injection attacks0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkSubspace topologyComputer Science::Cryptography and SecurityComputer network
researchProduct

Robust auto calibration technique for stereo camera

2017

Calibration of the internal and external parameters of a stereo vision camera is a well-known research problem in the computer vision. Usually, to get accurate 3D results the camera should be manually calibrate accurately as well. This paper proposes a robust approach to Auto Calibration stereo camera Without intervention of the user. There are several methods and techniques of calibration that have been proven, in this work we exploiting the geometric constraint, namely, the epipolar geometry. We specifically focuses to use 7 techniques for Features Extraction (SURF, BRISK, FAST, FREAK, MinEigen, MSERF, SIFT), however tries to establish the correspondences between points extracted in stere…

business.industryComputer scienceEpipolar geometryFeature extractionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONScale-invariant feature transformRANSACStereopsisRobustness (computer science)Computer visionArtificial intelligenceFundamental matrix (computer vision)businessStereo camera2017 International Conference on Engineering & MIS (ICEMIS)
researchProduct

A PLC based monitoring and remote control architecture for Distributed Generation and Storage systems in LV smart grids

2021

(Abstract) This paper proposes a new power line communication (PLC) architecture for monitoring and remote control of Distributed Generators (DG) and Energy Storage Systems (ESS) connected to low voltage distribution networks. The final aim is to improve the performance of the PLC link in terms of robustness and efficiency in devices addressing. The proposed solution is based on a concentrator, to be installed in secondary substation, and a new PLC bridge, to be linked both to inverters and interface protection systems of DGs or ESSs. In this way, a communication link is obtained between distribution system operator (DSO) and DG or ESS owners. The proposed system is able to provide advanced…

business.industryComputer scienceInterface (computing)Electrical engineeringConcentratorlaw.inventionPower-line communicationSmart gridRobustness (computer science)lawDistributed generationInverterbusinessRemote control2021 IEEE 6th International Forum on Research and Technology for Society and Industry (RTSI)
researchProduct

Blind Robust 3-D Mesh Watermarking Based on Mesh Saliency and QIM Quantization for Copyright Protection

2019

International audience; Due to the recent demand of 3-D models in several applications like medical imaging, video games, among others, the necessity of implementing 3-D mesh watermarking schemes aiming to protect copyright has increased considerably. The majority of robust 3-D watermark-ing techniques have essentially focused on the robustness against attacks while the imperceptibility of these techniques is still a real issue. In this context, a blind robust 3-D mesh watermarking method based on mesh saliency and Quantization Index Modulation (QIM) for Copyright protection is proposed. The watermark is embedded by quantifying the vertex norms of the 3-D mesh using QIM scheme since it offe…

business.industryComputer scienceWatermark robustness[INFO.INFO-TS] Computer Science [cs]/Signal and Image ProcessingData_MISCELLANEOUS[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020207 software engineeringQuantization index modulationWatermark02 engineering and technologyVertex (geometry)[INFO.INFO-TS]Computer Science [cs]/Signal and Image Processing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer visionArtificial intelligencebusinessQuantization (image processing)Digital watermarkingSmoothingComputingMilieux_MISCELLANEOUS
researchProduct

Splitting criterion for hierarchical motion estimation based on perceptual coding

1998

A new entropy-constrained motion estimation scheme using variable-size block matching is proposed. It is known that fixed-size block matching as used in most video codec standards is improved by using a multiresolution or multigrid approach. In this work, it is shown that further improvement is possible in terms of both the final bit rate achieved and the robustness of the predicted motion field if perceptual coding is taken into account in the motion estimation phase. The proposed scheme is compared against other variable- and fixed-size block matching algorithms.

business.industryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONPattern recognitionQuarter-pixel motionMultigrid methodMotion fieldRobustness (computer science)Motion estimationComputer Science::MultimediaBit ratePerceptual codingCodecArtificial intelligenceElectrical and Electronic EngineeringbusinessMathematics
researchProduct

Plenoptic image watermarking to preserve copyright

2017

Common camera loses a huge amount of information obtainable from scene as it does not record the value of individual rays passing a point and it merely keeps the summation of intensities of all the rays passing a point. Plenoptic images can be exploited to provide a 3D representation of the scene and watermarking such images can be helpful to protect the ownership of these images. In this paper we propose a method for watermarking the plenoptic images to achieve this aim. The performance of the proposed method is validated by experimental results and a compromise is held between imperceptibility and robustness.

business.industryData_MISCELLANEOUSComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION020207 software engineering02 engineering and technologyÒpticaImage (mathematics)GeographyRobustness (computer science)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingPoint (geometry)Computer visionArtificial intelligencebusinessRepresentation (mathematics)Digital watermarkingThree-Dimensional Imaging, Visualization, and Display 2017
researchProduct

Noise Robustness Analysis of Point Cloud Descriptors

2013

In this paper, we investigate the effect of noise on 3D point cloud descriptors. Various types of point cloud descriptors have been introduced in the recent years due to advances in computing power, which makes processing point cloud data more feasible. Most of these descriptors describe the orientation difference between pairs of 3D points in the object and represent these differences in a histogram. Earlier studies dealt with the performances of different point cloud descriptors; however, no study has ever discussed the effect of noise on the descriptors performances. This paper presents a comparison of performance for nine different local and global descriptors amidst 10 varying levels o…

business.industryGaussianComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONPoint cloudPattern recognitionImpulse (physics)Impulse noisesymbols.namesakeComputingMethodologies_PATTERNRECOGNITIONGaussian noiseRobustness (computer science)Computer Science::Computer Vision and Pattern RecognitionHistogramComputer Science::MultimediasymbolsArtificial intelligencebusinessNormalMathematics
researchProduct

Validation of a Reinforcement Learning Policy for Dosage Optimization of Erythropoietin

2007

This paper deals with the validation of a Reinforcement Learning (RL) policy for dosage optimization of Erythropoietin (EPO). This policy was obtained using data from patients in a haemodialysis program during the year 2005. The goal of this policy was to maintain patients' Haemoglobin (Hb) level between 11.5 g/dl and 12.5 g/dl. An individual management was needed, as each patient usually presents a different response to the treatment. RL provides an attractive and satisfactory solution, showing that a policy based on RL would be much more successful in achieving the goal of maintaining patients within the desired target of Hb than the policy followed by the hospital so far. In this work, t…

business.industryManagement scienceComputer scienceMachine learningcomputer.software_genreData setWork (electrical)Robustness (computer science)ErythropoietinmedicineReinforcement learningArtificial intelligencebusinesscomputermedicine.drug
researchProduct

Perceptually weighted optical flow for motion-based segmentation in MPEG-4 paradigm

2000

In the MPEG-4 paradigm, the sequence must be described in terms of meaningful objects. This meaningful, high-level representation should emerge from low-level primitives such as optical flow and prediction error which are the basic elements of previous-generation video coders. The accuracy of the high-level models strongly depends on the robustness of the primitives used. It is shown how perceptual weighting in optical flow computation gives rise to better motion estimates which consistently improve motion-based segmentation compared to equivalent unweighted motion estimates.

business.industryMean squared prediction errorComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONOptical flowcomputer.file_formatPerceptual weightingOptical flow computationRobustness (computer science)Motion estimationComputer Science::MultimediaMPEG-4Computer visionSegmentationArtificial intelligenceElectrical and Electronic EngineeringbusinesscomputerMathematicsElectronics Letters
researchProduct

Demo - Dynamic Adaptations of WiFi Channel Widths Without TX/RX Coordination

2017

Most modern standards for wireless communications support physical layer adaptations, in terms of dynamic selection of channel central frequency, transmission power, modulation format, etc., in order to increase link robustness under time-varying propagation and interference conditions. In this demo, we demonstrate that another powerful solution for extending physical layer flexibility in OFDM-based technologies is the dynamic adaptation of the channel width. Although some standards already define the possibility of utilizing multiple channel widths (e.g. 20MHz, 10MHz, 5MHz for IEEE 802.11a standards), such an utilization is limited to a static configuration of a value defined during the ne…

business.industryOrthogonal frequency-division multiplexingComputer scienceTransmitterPhysical layer020206 networking & telecommunications02 engineering and technologyIEEE 802.11Cognitive radioRobustness (computer science)0202 electrical engineering electronic engineering information engineeringElectronic engineeringWirelessCenter frequencybusinessComputer networkProceedings of the 23rd Annual International Conference on Mobile Computing and Networking - MobiCom 17
researchProduct