Sciweavers

753 search results - page 16 / 151
» Robust H
Sort
View
ICDIM
2007
IEEE
14 years 1 months ago
An access control video watermarking method that is robust to geometric distortions
: A new video watermarking algorithm for access control is introduced. This method is content-dependent and uses the dual tree complex wavelet transform (DT CWT) to create a waterm...
Lino Coria-Mendoza, Panos Nasiopoulos, Rabab Kreid...
IROS
2009
IEEE
198views Robotics» more  IROS 2009»
14 years 2 months ago
Characterization, modeling and robust control of a nonlinear 2-dof piezocantilever for micromanipulation/microassembly
— Piezoelectric cantilevers have proved their performances for actuating microgrippers dedicated to micromanipulation and microassembly tasks. While the control of one degree-of-...
Micky Rakotondrabe, Joël Agnus, Kanty Rabenor...
ICIP
2000
IEEE
14 years 9 months ago
Robust Image Hashing
Media hashing is an alternative to achieve many applications previously accomplished with watermarking. The major disadvantage of the existing media hashing technologies is their ...
Ramarathnam Venkatesan, S.-M. Koon, Mariusz H. Jak...
ICRA
2003
IEEE
133views Robotics» more  ICRA 2003»
14 years 24 days ago
Design and simulation of robust composite controllers for flexible joint robots
In this paper the control of exible joint manipulators is studied in detail. A composite control algorithm is proposed for the exible joint robots, which consists of two main part...
H. D. Taghirad, M. A. Khosravi
26
Voted
KDD
1995
ACM
216views Data Mining» more  KDD 1995»
13 years 11 months ago
Robust Decision Trees: Removing Outliers from Databases
Finding and removingoutliers is an important problem in data mining. Errors in large databases can be extremely common,so an important property of a data mining algorithm is robus...
George H. John