787 results found.
Year: 2012, Volume: 12, Number: 3
...  B(p k )ri(,lk) (10) GMDH algorithm that the parameters of each partial model ~s( l)  C ... M. Witczak and P. Pretki, "Design of an extended unknown input Algorithms, and Tools. Berlin/Heidelberg: Springer-Verlag, 2008. observer with ...
Terms matched: 2 - Score: 16 - 1,026k
Year: 2013, Volume: 13, Number: 4
... ," in Proc. of IEEE Int. Symp. on Parallel& Distributed algorithm (similar to [8 ]) was described in C++ and used Processing ... Garland, "Designing efficient sorting networks with other known results leads to the following algorithms for manycore GPUs," in Proc. IEEE Int. Symp. on ...
Terms matched: 2 - Score: 16 - 698k
Year: 2011, Volume: 11, Number: 3
... for the varying loads in the electric power system is widespread and synchronisation of the algorithm based on heterodyning in is growing with even bigger pace. Such devices and ... V.A. Katic, J.M. Knezevic, and D. Graovac, "Application-oriented Algorithms," IEEE Trans. on Signal Processing, vol. 45, no ...
Terms matched: 2 - Score: 16 - 803k
Year: 2013, Volume: 13, Number: 1
... , the same ID cannot be reused due to security problems, as the MAC algorithm is deterministic. This is a 24 Advances in Electrical and Computer Engineering Volume ... not valid. The summary of the overall procedures are the received content. The algorithms for 128bit AES block depicted in Fig. 4. cipher and HMAC-with-SHA256 are ...
Terms matched: 2 - Score: 16 - 629k
Year: 2021, Volume: 21, Number: 4
... , Pakistan m.faris@hamdard.edu.pk 1 Abstract — Compressed sensing of magnetic resonance compressed sensing algorithm with the minimum k-space by imaging refers to the reconstruction of magnetic resonance exploiting ... norm minimization. Then, it [3] R. Chartrand, "Fast algorithms for nonconvex compressive sensing: uses complete data to enhance the edges (boundaries ...
Terms matched: 2 - Score: 16 - 2,717k
Year: 2013, Volume: 13, Number: 3
... RDFa, Microformats and Figure. 1: Block diagram of the microformats' creation algorithm Microdata [17] by search engines like Google, in order to display ... formats and page and extract two pieces of information. The first is the Google algorithms, to "give users convenient summary name of the actual page that was ...
Terms matched: 2 - Score: 16 - 636k
Year: 2011, Volume: 11, Number: 3
... On the other hand, since the physical limits of the front- idleness prediction algorithm is utilized based on developing a cooperative spectrum searching approach. Through combining end ... code for its transmission, leading to tolerance in interference. Two PU activity prediction algorithms are presented in [8 ], [9] to proactive switch transmission ...
Terms matched: 2 - Score: 16 - 766k
Year: 2022, Volume: 22, Number: 1
... artificial neural network incremental conductance (ADRC_IncCond) is used to extract ANN, genetic algorithm GA etc. the maximum power from the PV array and compared to the ... power point IMP 5.69 A [7] N. Aouchiche, "Meta-heuristic optimization algorithms based direct Number of cells in series NS 128 current and DC link voltage ...
Terms matched: 2 - Score: 16 - 1,648k
Year: 2018, Volume: 18, Number: 2
... can be used by calculating of the other potentially important ways as described above. Algorithm of the features selection for computing. End The process of selecting as a ... recognition), development of new methods multicomputer systems. and improvement of existing classification algorithms. Pattern recognition also is in use to detect intrusions and However, current ...
Terms matched: 2 - Score: 16 - 1,139k
Year: 2016, Volume: 16, Number: 4
... mechanisms. The first is a innovative solutions available, watermarking appears to be watermarking algorithm based on the Fourier transform to one of the most attractive solutions due to ... the document owner's identity. Wiener filter strongly improves the detection rate and outperforms competitive algorithms (blind deconvolution and As a result, anyone unlawfully claiming to be its ...
Terms matched: 2 - Score: 14 - 1,652k