787 results found.
Year: 2018, Volume: 18, Number: 3
... pixel classifiers with many classification errors. Lim et traffic sign detection proposed in a previous study[19] was al. [19] proposed an enhanced Adaboost algorithm suitable applied and the detected traffic sign range was used as the for detecting traffic sign ranges that learned by selecting standard content recognition area. landmarks that were ...
Terms matched: 1 - Score: 11 - 7,040k
Year: 2007, Volume: 7, Issue: 2
... secured using a Feistel It is clear that all confidential information reside on main based cipher. Because the information not require higher system must be stored using an cryptographic algorithm that levels of protection even a DES or XDES system can be have as key one derived from the system administrator used to encrypt communication. password. Because ...
Terms matched: 1 - Score: 11 - 867k
Year: 2013, Volume: 13, Number: 1
... (IXTQ50N20P-200V, 50A) have been used in In order to complete the motor system, motor drive and the power part. Control part includes a microcontroller switching algorithm should be added to the simulation (18F452), an EPROM (27C256) and MOSFET drivers program. Phase voltages are produced by using the inverter ( ...
Terms matched: 1 - Score: 11 - 649k
Year: 2007, Volume: 7, Issue: 1
... (PP1 or QQ1 in Figure 2) links these curves, characterised by a slope proportional with the magnetic permeability in the turning. Figure 2 shows how this algorithm works: the point will trace the curve OP, then the red curve is generated, it is computed the point P1 (or P2), and ...
Terms matched: 1 - Score: 10 - 535k
Year: 2017, Volume: 17, Number: 2
... the elderly the methods on determining the boundaries of each syllable. are beset by loneliness, a sense of exclusion and a lack of Chapter 4 explains Synchronized Overlap-Add Algorithm assistance in leading their daily lives [1]. As the social roles (SOLA), a method that allows for voice signal modification of the elderly ...
Terms matched: 1 - Score: 10 - 1,728k
Year: 2014, Volume: 14, Number: 2
... applications. combined with reconfigurable logic for very long vectors. We will briefly describe one of them. Combinatorial search Index Terms — Hamming weight counter, Hamming weight algorithms (e.g. described in [8 ,9 ]) frequently require comparator, field-programmable gate array, digital signal executing operations over binary and ternary matrices, ...
Terms matched: 1 - Score: 10 - 1,047k
Year: 2014, Volume: 14, Number: 1
... CANaerospace messages. Data frame length nD was chosen as an 11 bit identifier. When the identifier is 11 bits, there can be 211 messages, III. ALGORITHM FOR CYCLE MATRIX DESIGN which is 2048. This amount of messages is more than The first step for proposing a Cycle Matrix is to know the sufficient for ...
Terms matched: 1 - Score: 10 - 804k
Year: 2019, Volume: 19, Number: 2
... and consequently, it needs only converter; however, it has a shortcoming. The value of one control signal. This attains low computation burden, simple control algorithm, and minimum cost. A new PFC output voltage exceeds the peak supply voltage. Therefore, control technique is proposed to guarantee sinusoidal supply the output cannot ...
Terms matched: 1 - Score: 10 - 1,610k
Year: 2017, Volume: 17, Number: 4
... 5] Q. Su, Y. Niu, X. Liu, T. Yao, "A novel blind digital watermarking other two elements of U. algorithm for embedding color image into color image," International It has been shown in observation 1 that changing column of Journal for Light and Electron Optics, vol ...
Terms matched: 1 - Score: 10 - 1,072k
Year: 2009, Volume: 9, Issue: 3
... vectors [22], [16], from images or sound [16] processing, statistical information extracted from experimental data. The like in person identification algorithms, for example [9 ], the new statistical technology is particularly suited for very scarce construction of the histograms is performed on the same population samples, ...
Terms matched: 1 - Score: 10 - 469k