841 results found.
Year: 2021, Volume: 21, Number: 4
... of the forward based on alpha-shape and line optimization real world is widely used in various fields, such as algorithm. Further the wall space is decomposed by architectural design [1-3], cultural heritage protection [4 ], analyzing the cell complex defined by feature lines game design [5 ], autonomous navigation [6-7 ...
Terms matched: 1 - Score: 7 - 2,090k
Year: 2010, Volume: 10, Issue: 2
... Fs_in, it should be converted to the IC had originally. There are several methods to solve this, but when constraint by price and power consumption, the design same signal, but sampled at the frequency Fs_out, while a engineers must find the optimum one. The sample rate certain amount of information, usually in ...
Terms matched: 1 - Score: 7 - 2,509k
Year: 2013, Volume: 13, Number: 3
... United University, Taiwan 3 Chienkuo University of Technology, Taiwan 4 Southern Taiwan University of Science and Technology, Taiwan *Corresponding author: ycwu@nuu.edu.tw 1Abstract — Designing the protection system of high voltage grey relational grade (GRG) in which fuzzy logic is used to power systems involves elucidating the properties of gas estimate the ...
Terms matched: 1 - Score: 7 - 720k
Year: 2019, Volume: 19, Number: 3
... the cyber risk proposed method in comparison with the purely objective assessment becomes inevitable part of the SCADA system approach, in terms of more precise risk assessment and higher design and operation, which helps with the investment and return on security investment. operational decisions [9]. In this paper we propose a new method for ...
Terms matched: 1 - Score: 7 - 274k
Year: 2014, Volume: 14, Number: 4
... hash functions h1, h2,.., hk are used to indicate bit positions to be turned on. More specifically, given an input w, the designated bit positions are set to 1, and others remain zero. Our simulation study uses MD5 for the hashing, since it is well-known and its implementation is ...
Terms matched: 1 - Score: 6 - 766k
Year: 2014, Volume: 14, Number: 2
... able to signify more kinds of speech emotion labels, the element Wijps of the embedding dimensionality reduction forms, such as Diffusion Maps[12] penalty graph is designed as (6 ), where the penalty element etc. The coming up with least-squares frameworks[16] can be seen as the extension of graph embedding as ...
Terms matched: 1 - Score: 6 - 713k
Year: 2019, Volume: 19, Number: 1
... system with M constraint input were evaluated in [18] with the aim of transmit and N receive antennas at the PU and SU sides, achieving optimal transmitter design. In [19-20], the authors respectively. A certain assumption can be made without loss analyzed the sum rate performance of a quantized channel of generality ...
Terms matched: 1 - Score: 6 - 730k
Year: 2019, Volume: 19, Number: 4
... Two objective functions, f 1 and f 2, that should be mask was used in both cases. To apply these filters, a 2x2 maximized, are designed for IDMMoBS. f 1 is based on the mask was used that worked in accordance with the sample capture strategy presented in the experiments section. overall accuracy ...
Terms matched: 1 - Score: 6 - 197k
Year: 2007, Volume: 7, Issue: 2
... [5]. severe restrictions for many WAHNS, in spite of recent Further are shortly described the first five objectives. researches have shown that is possible to design public key architectures with low power consumption [7]. Confidentiality Confidentiality ensures the secrecy of information, Availability meaning that certain information is never disclosed to any ...
Terms matched: 1 - Score: 6 - 432k
Year: 2011, Volume: 11, Number: 2
... a passive system can be calculated by the means of the details of the transformer approximated by a rational function f(s) in the form [5] design [12] or can be estimated using terminal shown by equation (2 ): measurements [32]. Determining the parameters of such models, which ...
Terms matched: 1 - Score: 6 - 823k