Sciweavers

2904 search results - page 199 / 581
» Valuing Design Repair
Sort
View
AMC
2007
75views more  AMC 2007»
15 years 5 months ago
Fingerprint images encryption via multi-scroll chaotic attractors
This paper proposes a chaotic fingerprint images encryption approach. An image of a fingerprint is encrypted via a twodimensional (2D) chaotic sequence obtained from multi-scrol...
Fengling Han, Jiankun Hu, Xinghuo Yu, Yi Wang
AUTOMATICA
2008
82views more  AUTOMATICA 2008»
15 years 5 months ago
Iterative minimization of H2 control performance criteria
Data-based control design methods most often consist of iterative adjustment of the controller's parameters towards the parameter values which minimize an H2 performance crit...
Alexandre S. Bazanella, Michel Gevers, Ljubisa Mis...
EUROMED
2010
15 years 3 months ago
Ktisis: Building an Open Access Institutional and Cultural Repository
The unique value of cultural heritage has long been recognized together with the need for accurate and detailed information in order to preserve and manage cultural heritage materi...
Alexia Dini Kounoudes, Petros Artemi, Marios Zerva...
ESIAT
2009
IEEE
15 years 2 months ago
Path Planning Based on Dynamic Sub-population Pseudo-Parallel Genetic Algorithm
Through analysis of present pseudo-parallel genetic algorithm, propose a new dynamic sub-population pseudo-parallel genetic algorithm. It changes the condition that the magnitude o...
Lei Li, Yuemei Ren, Changyu Yang
JNS
2011
27views more  JNS 2011»
15 years 2 days ago
Robust Optimisation with Normal Vectors on Critical Manifolds of Disturbance-Induced Stability Loss
Dynamic systems that are subject to fast disturbances, parametrised by a disturbance vector d, undergo bifurcations for some values of the disturbance d. In this work we specific...
Benedikt Wirth, Johannes Gerhard, Wolfgang Marquar...