391 results found.
Year: 2022, Volume: 22, Number: 2
... , S. Roth, and M. J. Black, "Secrets of optical flow estimation [20] M. Jahangir and C. Baker, "Robust detection of Micro-UAS drones and their principles," 2010 IEEE Computer Society Conference on with L-band 3-D holographic radar," Sensor Signal Processing for Computer Vision and ...
Terms matched: 1 - Score: 3 - 1,458k
Year: 2010, Volume: 10, Issue: 4
... , x(n) and x  (n) are the contradictory constraint regarding speed, precision, original and the reconstructed signals respectively, x is the robustness, consumption, portability, cost, etc. [1-5] original signal mean and N is the length of the window over For clinical diagnosis it is ...
Terms matched: 1 - Score: 3 - 1,816k
Year: 2021, Volume: 21, Number: 4
... Gener., vol. 10, no. 6, pp. 824 – 833, Jul. 2016. doi:10.1049/iet- calculus theory to robust controller design for wind turbine rpg.2015.0444 generators," IEEE Trans. Energy Convers., vol. 29, no. 3, pp. 780 – [ ...
Terms matched: 1 - Score: 3 - 2,802k
Year: 2010, Volume: 10, Issue: 4
... torque control methods of AC machines are characterized by their simplicity with regard to vector control. This simplicity allows for easy implementation on a control microcomputer. The high robustness and the ability of quick changes of motor torque, thanks to which it is possible to obtain very good dynamic qualities, are among the advantages of these ...
Terms matched: 1 - Score: 3 - 4,098k
Year: 2021, Volume: 21, Number: 4
... embedded position information. using methods such as the modulo method and the Hilbert Over the past years, researches have proposed multiple scrambling, and the proposed protocol is robust against techniques in the field of quantum steganography. One of attacks on the stego-image. these is a novel watermarking protocol, using the NEQR Various concepts for ...
Terms matched: 1 - Score: 3 - 1,598k
Year: 2022, Volume: 22, Number: 1
... vol. 45, no. 3, pp. 241-246. doi:10.3182/20120328-3-IT- [26] W. Ende and H. Shenghua, "Robust control of the three-phase 3014.00041 voltage-source pwm rectifier using EKF load current observer," [35] Y. Sirouni, S. Hani, N. Naseri ...
Terms matched: 1 - Score: 3 - 1,838k
Year: 2010, Volume: 10, Issue: 4
... (k) can be expressed as forecasting ability with conventional 1-D types. It's proved Eq. (6 ): in linear predictive coding that a precise and robust n0  N forecasting process relies on applying highly correlated Rxx( k)  x n  n0 1 k n x nï€ k (6) information ...
Terms matched: 1 - Score: 3 - 2,187k
Year: 2022, Volume: 22, Number: 2
... D. Walter, "Sliding windows succumbs to big mac attack," International Workshop on Cryptographic Hardware and Embedded DPA and CPA type attacks, noise and jitter robustness of Systems, pp. 286-299, May 2001. doi:10.1007/978-3-540-77360-3_8 frequency domain compared to the time domain is also a [10] P ...
Terms matched: 1 - Score: 3 - 1,199k
Year: 2022, Volume: 22, Number: 2
... 3. The compared to other methods. NMCA algorithm is: variation in load demand is applied for 24 hours a day, and i. NMCA is a robust optimization algorithm for solving the peak load is assumed to be 3.1 MW and 0.9 MVAR. real problems for engineering applications; Also, the power calculation has ...
Terms matched: 1 - Score: 3 - 1,531k
Year: 2010, Volume: 10, Issue: 4
... , 2000. [15] C. C. Cho, N. I. Park, H. K. Kim, "A Packet Loss Concealment Algorithm Robust to Burst Packet Loss for CELP-type Speech Fig. 3. Experimental results: SQNRseg over different Coders", in Proc. of ITC-CSCC 2008, pp. ...
Terms matched: 1 - Score: 3 - 1,718k