13,627 research outputs found

    A lower bound for metric 1-median selection

    Full text link
    Consider the problem of finding a point in an n-point metric space with the minimum average distance to all points. We show that this problem has no deterministic o(n2)o(n^2)-query (4Ω(1))(4-\Omega(1))-approximation algorithms

    Reversible data hiding in JPEG images based on adjustable padding

    Get PDF
    In this paper, we propose a reversible data hiding scheme that enables an adjustable amount of information to be embedded in JPEG images based on padding strategy. The proposed embedding algorithm only modifies, in a subtle manner, an adjustable number of zero-valued quantised DCT coefficients to embed the message. Hence, compared with a state-of-the-art based on histogram shifting, the proposed scheme has a relatively low distortion to the host images. In addition to this, we found that by representing the message in ternary instead of in binary, we can embed a greater amount of information while the level of distortion remains unchanged. Experimental results support that the proposed scheme can achieve better visual quality of the marked JPEG image than the histogram shifting based scheme. The proposed scheme also outperforms this state-of-the-art in terms of the ease of implementation

    Secure secret sharing in the cloud

    Get PDF
    In this paper, we show how a dealer with limited resources is possible to share the secrets to players via an untrusted cloud server without compromising the privacy of the secrets. This scheme permits a batch of two secret messages to be shared to two players in such a way that the secrets are reconstructable if and only if two of them collaborate. An individual share reveals absolutely no information about the secrets to the player. The secret messages are obfuscated by encryption and thus give no information to the cloud server. Furthermore, the scheme is compatible with the Paillier cryptosystem and other cryptosystems of the same type. In light of the recent developments in privacy-preserving watermarking technology, we further model the proposed scheme as a variant of reversible watermarking in the encrypted domain

    Optimal PID Controller Design for AVR System

    Get PDF
    99學年度翁慶昌研究獎補助論文[[abstract]]In this paper, a real-valued genetic algorithm (RGA) and a particle swarm optimization (PSO) algorithm with a new fitness function method are proposed to design a PID controller for the Automatic Voltage Regulator (AVR) system. The proposed fitness function can let the RGA and PSO algorithm search a high-quality solution effectively and improve the transient response of the controlled system. The proposed algorithms are applied in the PID controller design for the AVR system. Some simulation and comparison results are presented.We can see that the proposed RGA and PSO algorithm with this new fitness function can find a PID control parameter set effectively so that the controlled AVR system has a better control performance.[[notice]]補正完畢[[incitationindex]]EI[[booktype]]紙

    Obstacle Avoidance Design for Humanoid Robot Based on Four Infrared Sensors

    Get PDF
    [[abstract]]A behavior strategy of humanoid robot for obstacle avoidance based on four infrared sensors is proposed and implemented on an autonomous humanoid robot. A mechanical structure with 26 degrees of freedom is design so that an implemented small-size humanoid robot named TWNHR-Ⅲ is able to accomplish five walking motions. Three walking experiments are presented to illustrate that the proposed biped structure lets TWNHR-Ⅲ can move forward, turn, and slip. One electronic compass and four infrared sensors are mounted on TWNHR-Ⅲ to obtain the head direction of the robot and detect obstacles, respectively. Based on the obtained information from these sensors, a decision tree method is proposed to decide one behavior from five movements: walk forward, turn right and left, and slip right and left. Two MATLAB simulations and one real experiment are presented to illustrate that the robot can avoid obstacles autonomously and go to the destination effectively.[[notice]]補正完畢[[incitationindex]]EI[[booktype]]紙
    corecore