White Balance Correction for Detecting Holograms in Color Images of Black-and-White Photographs
The key feature of optically variable elements is the appearance and disappearance of high saturation colors during shooting under different angles. The accuracy of color saturation measurement algorithms is limited by the automatic white balance ...
Analysis of Traces on Discharged Bullets by the Congruent Matching Profile Segments Method and k-Nearest Neighbors
This paper discusses the problem of classifying images of land impressions on discharged bullets in terms of the “match” and “non-match” categories. The research is aimed at improving the effectiveness of comparing land impression images by the ...
Optimal Placement of Base Stations in Integrated Design of Wireless Networks
Topology synthesis in integrated design of wireless communication networks is considered. An iterative method has been developed for placing base stations of a broadband network along extended transportation routes. The problem of base station ...
Synthesis and Initialization of Adaptive Neuro-Fuzzy Control Based on the SDRE Technique for a Two-Link Manipulator
One of the open problems in modern control theory is synthesis of adaptive control for nonlinear systems with parametric uncertainty and analysis of stability of the corresponding closed-loop system. Fuzzy logic is one of the approaches that can ...
Knowledge Base Generation Based on Fuzzy Clustering
An approach for generating an optimal rule base of a fuzzy system is proposed, that relies on ellipsoidal clustering of observable data. Premises of fuzzy rules are formed by constructing projections of ellipsoids onto the coordinate axes while ...
Layer-by-Layer Knowledge Distillation for Training Simplified Bipolar Morphological Neural Networks
Various neuron approximations can be used to reduce the computational complexity of neural networks. One such approximation based on summation and maximum operations is a bipolar morphological neuron. This paper presents an improved structure of ...
Analysis of Vulnerabilities of Neural Network Image Recognition Technologies
The problem of vulnerability of artificial intelligence technologies based on neural networks is considered. It is shown that the use of neural networks generates a lot of vulnerabilities. Examples of such vulnerabilities are demonstrated, such as ...
Improving Fuzzing Using Input Data Offsets Comparison Information
There is a wide range of fuzzing techniques for security assurance. Communication protocols and programs accepting complex structured data, including compilers, can be efficiently tested with a corresponding fuzzing approach. The main advantage of ...