803 results found.
Year: 2014, Volume: 14, Number: 3
... paper is organized in four sections following the second group of suggestions emphasizes the impact of the introduction. In Section 2, the basic idea beneath the Sobol algorithm's control parameters [4-6], and the last group aims quasi-random sequence is explained and demonstrated at modifying the algorithm according to the specific graphically. Section 3 presents ...
Terms matched: 1 - Score: 11 - 746k
Year: 2009, Volume: 9, Issue: 3
... training symbol: comparator block asserts the ss-detect and pointer-ss [4 :0] R1( n)= {C( n )} 2 signal to the control block. The pointer-ss [4 :0] signal 2 (2) indicates the exact position of short symbol. Based on 15 pointer-ss [4 : ...
Terms matched: 1 - Score: 11 - 534k
Year: 2021, Volume: 21, Number: 1
... in the computer- based image processing discipline are used as an alternative to and affected the adjacent pixels. These artifacts are less the costly instrument to reduce or control these artifacts. A obvious in the output of fuzzy contrast enhancement as in medical expert performs the complex task of disease the left side image in Fig. ...
Terms matched: 1 - Score: 10 - 2,116k
Year: 2021, Volume: 21, Number: 2
... . There were several approaches based in this context is the basis for higher-level tasks such as on other features: gradients and texture. All of these features traffic control, event detection, extraction of information have shown their own sensitivities and none could be from the traffic flow, etc. [2-4]. Typical problems ...
Terms matched: 1 - Score: 10 - 1,876k
Year: 2012, Volume: 12, Number: 2
... and fluctuation of the speech provide evidence concerning the Emotional intelligence encompasses the ability to assess, subject's affective state. On the other hand an emotional understand, and control the affective states of oneself and extended CBST that detects emotions can take several others. From an informatics system point of view, the most actions in order ...
Terms matched: 1 - Score: 10 - 706k
Year: 2021, Volume: 21, Number: 4
... and forwarded email messages. The following recipient email messages. BCC field can, to some extent, algorithm has been used to extract the email addresses from help control exposing the email address of all the recipients the header and body text of email messages stored in a to one another. The email addresses in the BCC ...
Terms matched: 1 - Score: 10 - 2,024k
Year: 2010, Volume: 10, Issue: 1
... . van Waterschoot, M. Moonen, "50 Years of Acoustic Feedback [1] M. Kahrs, K. Brandenburg, Applications of Digital Signal Processing Control: State of the Art and Future Challenges", Internal Report 08- to Audio and Acoustics, Kluwer Academic Publishers, 1998. 13, K.U Leuven ...
Terms matched: 1 - Score: 10 - 541k
Year: 2021, Volume: 21, Number: 2
... behavior in the struggle for survival and suggest a complex such as the artificial bee colony (ABC) that simulates the ability to self-assemble robust, resilient, adaptive control intelligent behavior of a bee swarm in search of nectar, as networks and desirable transport mechanisms in various well as optimization metaheuristics inspired by the behavior protocols and ...
Terms matched: 1 - Score: 9 - 1,314k
Year: 2020, Volume: 20, Number: 1
... networks are self- characteristics gave rise to MOB-NET a mobile ad hoc organized and self-managed mobile networks with a network formed by buses from the public urban transport decentralized control. They are characterized by being built system [13-14]. MOB-NET has the capacity of providing anywhere, because they do not depend on the existence of ...
Terms matched: 1 - Score: 9 - 537k
Year: 2009, Volume: 9, Issue: 1
... the emitting antenna were make measurements inside a single channel where only our registered. Dependence of the E-field level on these signal was present (in order to hold control on the emission variables was followed. parameters). We chose channel 9 of the 802.11 standard. The channel covers the band 2441-2463 MHz. III. ...
Terms matched: 1 - Score: 9 - 536k