— This paper describes the measurement of inner deformation of a rheological object using ultrasonic and MR images and comparison the measured and simulated deformations. We appl...
— Multi-agent systems are rapidly finding applications in a variety of domains, including robotics, distributed control, telecommunications, etc. Learning approaches to multi-ag...
— In the simultaneous localization and mapping (SLAM) problem, a mobile robot must build a map of its environment while simultaneously determining its location within that map. W...
- In this paper, a new design method of adaptive PID controller is proposed. The method utilizes the so- called almost strict positive realness (ASPR) of the plant so that the stab...
Zenta Iwai, Ikuro Mizumoto, Lin Liu, S. L. Shah, H...
— Despite their popularity, occupancy grids cannot be directly applied to problems where the identity of the objects populating an environment needs to be taken into account (eg ...
— Login access control refers to securing the entry point to a computing system. The login system is responsible for this service and must provide a number of tasks, the main tas...
— The Active Apearence Models (AAM) are often used in Man-Machine Interaction for their ability to align the faces. We propose a new normalization method for AAM based on distanc...
Denis Giri, Maxime Rosenwald, Benjamin Villeneuve,...
: Relevance feedback in Content Based Image Retrieval(CBIR) has been an active field of research for quite some time now. Many schemes and techniques of relevance feedback exist w...