首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
This brief describes neural modeling fields (NMFs) for object perception, a bio-inspired paradigm. We discuss previous difficulties in object perception algorithms encountered since the 1950s, and describe how NMF overcomes these difficulties. NMF mechanisms are compared to recent experimental neuroimaging observations, which have demonstrated that initial top-down signals are vague and during perception they evolve into crisp representations matching the bottom-up signals from observed objects. Neural and mathematical mechanisms are described and future research directions outlined.   相似文献   

3.
This comment letter points out that the essence of the “extreme learning machine (ELM)” recently appeared has been proposed earlier by Broomhead and Lowe and Pao , and discussed by other authors. Hence, it is not necessary to introduce a new name “ELM.”   相似文献   

4.
Remarks on “Measuring Ambiguity in the Evidence Theory”   总被引:1,自引:0,他引:1  
In a recent paper, a functional AM (ambiguity measure) is introduced and an attempt is made to show that this functional qualifies as a measure of total aggregated uncertainty in the Dempster-Shafer theory. We show that this attempt fails due to a particular error in the proof of one of the principal theorems in the paper. Some additional remarks are made regarding recent research pertaining to the subject of the discussed paper.  相似文献   

5.
In the recent paper by Cetinkaya et al , admission control tests are derived by approximating the sum of two Gumbel distributed random variables by a Gumbel distributed random variable. In fact, the sum of two Gumbel distributed random variables does not follow a Gumbel distribution. Here, explicit expressions are derived for the probability density function (pdf) and the cumulative distribution function (cdf) of the exact distribution of the sum. The discrepancy between the exact and the approximate distributions is studied numerically.  相似文献   

6.
In constructing an observer for a discrete-time nonlinear system, the system is commonly required to satisfy a certain kind of "uniform" observability condition, that is, the state should always be reconstructible from observation windows of a specific length, irrespective of the values of the state and inputs. In this technical note, it is proved that this "uniform" requirement is unnecessary in the sense that if the initial state and inputs are on a compact set, then the "uniform" observability is derived from its non-uniform counterpart.  相似文献   

7.
The purpose of this comment is to point out some mistakes in the above paper. It is shown that the main results of the paper cannot stand in general. Also, it is pointed out that after some corrections, the proposed control algorithm is still applicable to a more simple system. For simplicity, all the symbols in this comment are the same as those in the above paper.  相似文献   

8.
Stability analysis and optimality are important in any systems. In the paper, "optimal fuzzy controller design: local concept approach," optimal fuzzy controller is design for Takagi-Sugeno fuzzy model. Unfortunately, it seems that some errors are happen and no simple correction can be done. In this paper, we show that some errors exit in the aforementioned paper with simple and clear examples.  相似文献   

9.
In a recent paper, De JesÚs proposed a general framework for describing dynamic neural networks. Gradient and Jacobian calculations were discussed based on backpropagation-through-time (BPTT) algorithm and real-time recurrent learning (RTRL). Some errors in the paper of De JesÚs bring difficulties for other researchers who want to implement the algorithms. This comments paper shows the critical parts of the publication and gives errata to facilitate understanding and implementation.   相似文献   

10.
In a recent paper, Liu have proposed the so-called F -algorithm which conditionally reduces the computational complexity of the Meyerowitz-Richman-Walker algorithm for the computation of the aggregate-uncertainty measure in the Dempster-Shafer theory of evidence, along with an illustration of its application in a practical scenario of target identification. In this correspondence, we will point out several technical mistakes, which some of them lead to some inexact or incomplete statements in the paper of Liu The corrections of these mistakes will be made, and some further improvement and results will be derived.  相似文献   

11.
The design of excitation controllers to improve transient stabilization of power systems is a topic of renewed interest in the control community. Existence of a state-feedback stabilizing law for multi-machine aggregated reduced network models has recently been established. In this paper we extend this result in two directions: first, in contrast with aggregated models, we consider the more natural and widely popular structure-preserving models that preserve the identity of the network components (generators, loads and lines) and allow for a more realistic treatment of the loads. Second, we explicitly compute a control law that, under a detectability assumption, ensures that all trajectories converge to the desired equilibrium point, provided that they start and remain in the region where the model makes physical sense.  相似文献   

12.
This comment tries to describe a theoretical mistake made in the aforementioned paper [G. Feng, IEEE Trans. Fuzzy Syst., vol. 11, no. 5, pp. 605–612, Oct. 2003] to formulate the inverse of matrices used to construct the piecewise-quadratic Lyapunov functions. Derivation of these inverse matrices is the most critical step toward transforming the design constraints into linear matrix inequalities (LMIs). Therefore, the erroneous formulation essentially affects the validity of the approach and final results. Unfortunately, it seems that there is no simple correction for this problem. However, some close alternative approaches are suggested by the same authors in their other works.   相似文献   

13.
This letter describes an attack on the recently proposed ldquowatermarking method based on significant difference of wavelet coefficient quantizationrdquo by Lin While the method is shown to be robust against many signal processing operations, security of the watermarking scheme under intentional attack exploiting knowledge of the implementation has been neglected. We demonstrate a straightforward attack which retains the fidelity of the image. The method is therefore not suitable for copyright protection applications. Further, we propose a countermeasure which mitigates the shortcoming.  相似文献   

14.
This note gives a correct proof for the first part of Theorem 3.2 in the above paper, which is an important theorem of the above paper.   相似文献   

15.
16.
In the previous paper, we have proposed linguistic weighted average (LWA) algorithms that can be used in distributed and hierarchical decision making. The original LWA algorithms were completely based on the representation theorem for interval type-2 fuzzy sets (IT2 FSs). In later usage, we found that when the lower membership functions (LMFs) of the inputs and weights are of different heights, the LMF of the output IT2 FS may be nonconvex and discontinuous. In this letter, a correction to the original LWA algorithms is proposed. The new LWA algorithms are simpler and easier to understand; so, it should facilitate the applications of the LWAs.   相似文献   

17.
It was claimed recently in the paper by Li and Zhou that ldquoa polynomial time algorithm for finding the set of elementary siphons in S3PRs is proposed, which avoids complete siphon enumerationrdquo. However, this is incorrect because Proposition 1 and Corollary 6 of the aforementioned paper, which lead to the claim, are both incorrect. In this correspondence paper, Proposition 1 and Corollary 6 are disproved. As a consequence, some claims of the aforesaid paper are denied. Two examples are presented to disprove some claims of the previously mentioned paper.  相似文献   

18.
In the above titled paper (ibid., vol. 24, no. 3, pp. 527-536, Jun 08), it is stated in Sec. IV-D3 that the characteristic number of the first variant of the "god object" method applied to texture synthesis is 1. This statement is not always true, and clarification of this issue is presented here.  相似文献   

19.
The uncertainty of the odometry position estimate for a given vehicle can be obtained from the definition of the covariance matrix by using its kinematic model as well as its sensory system data. This communication item extends a previous work in by giving the appropriate guidelines so as to compute the cross-covariance terms between the previous position estimate and the actual increments of position. This is necessary in general because the orientation errors on the robot's previous position will affect the calculation of the actual increments of position.   相似文献   

20.
This paper contains a security analysis of the construction of a public key steganographic system based on chaos theory and the Euler theorem (PKS-CE) as proposed by Lou and Sung in a previous issue of this transactions. Our analysis results in attack strategies on two different layers: first, we identify weaknesses of the embedding function, which allow a passive warden to tell steganographic images from clean carriers apart. Second, we show that the allegedly asymmetric trap-door function in fact can be efficiently inverted solely with the knowledge of its public parameters, thus revealing the secret message as plain text to a passive adversary. Experimental results from a re-implementation further indicate that the claimed robustness of the embedded message against transformations of the carrier medium was far too optimistic. Finally, we demonstrate that a secure alternative system can easily be constructed from standard primitives if the strong assumptions made in PKS-CE for the mutual key exchange can actually be fulfilled.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号