803 results found.
Year: 2017, Volume: 17, Number: 4
... all outputs for all the 6 million allows matrix manipulations, plotting of functions and data, configurations of our design space. This way we could implementation of advanced control algorithms, creation of select our top candidates and run the simulations. We also user interfaces, and interfacing with programs written in tried a "backwards-training-approach" ...
Terms matched: 1 - Score: 3 - 1,377k
Year: 2017, Volume: 17, Number: 4
... ) and watermarked images technique for a range of scaling factor, which is used to (Fig. 3). Moreover, the comparison of the presented scheme control the amount of information embedded into the host 111 Advances in Electrical and Computer Engineering Volume 17, Number 4, 2017 with [4, 5] in ...
Terms matched: 1 - Score: 3 - 1,072k
Year: 2017, Volume: 17, Number: 4
... as it was proven to best fit Persson, "Sensor fused indoor positioning using dual band wifi signal the RSS histograms for collected fingerprints. measurements," in Control Conference (ECC), 2015 European. IEEE, 2015, pp. 1669 €“ 1672. doi: 10.1109/ECC.2015.7330777 [22] J. Luo ...
Terms matched: 1 - Score: 3 - 1,286k
Year: 2011, Volume: 11, Number: 1
... 0.63 117.83 Copying 0.78 110.60 -0.12 130.96 0.64 113.21 12V Printing 2.46 451.70 -3.54 271.15 0.85 43.76 5V (laser) Printing 1.10 176.00 12.60 175.61 0.70 94.49 Switcher and Controls (matrix) Matlab 0.81 110.50 -2.11 133.53 0.64 112.10 Figure 1. Simplified representation of a PC power supply unit (below) and operation characteristic wave-shapes ( ...
Terms matched: 1 - Score: 3 - 851k
Year: 2014, Volume: 14, Number: 4
... 20]. Once the (deterministic) voltage generality, the subcircuit is assumed to be fully voltage- and current coefficients vk and ik are calculated, pertinent controlled and the current entering the nth terminal statistical information is readily extracted via analytical (n =1 ,€ ,N) is expressed as a (possibly ...
Terms matched: 1 - Score: 3 - 1,084k
Year: 2011, Volume: 11, Number: 1
... Model (LM). Two major This set of words is called the vocabulary. constraints of the conventional LMs in the embedded The complexity of an LM is controlled by the number of environment are memory capacity limitation and data sparsity for the domain-specific application. This data sparsity words in the vocabulary, the history length, ...
Terms matched: 1 - Score: 3 - 625k
Year: 2014, Volume: 14, Number: 3
... Katsis, P. Bougia and D. Fotiadis, "A Reasoning-Based algorithm Framework for Car Driver's Stress Prediction", in Proc. of 16th Mediterranean Conference on Control and Automation, Ajaccio, Corsica, France, pp. 627 €“ 632, Jun. 2008. After extracting the five features, their importance can be ...
Terms matched: 1 - Score: 3 - 936k
Year: 2015, Volume: 15, Number: 4
... € 1,2, ..,20 (Fig. 4). This Also by factor s in equalities: 7, 8 and 9, is controlled the approximation of central positions in auditory critical bands steepness of previously introduced exponential auditory is also applied in the case of two other shapes of auditory critical bands ...
Terms matched: 1 - Score: 3 - 1,229k
Year: 2010, Volume: 10, Issue: 4
... Tont, I. Ion, M. S. Munteanu and D. Mitroi, system (mechanic frictions and the play in the mechanic "Walking Robots Dynamic Control Systems on an Uneven Terrain", device). Advances in Electrical and Computer Engineering, vol.10, no.2, pp. The sources of internal noise encountered ...
Terms matched: 1 - Score: 3 - 840k
Year: 2011, Volume: 11, Number: 2
... multiple-server [18] I. Awan, "Analysis of multiple-threshold queues for congestion M/M /m-type system) will be explored in future work, as control of heterogeneous traffic streams," Simulation Modelling Practice and Theory, vol. 14, no. 6, pp. 712-724, Aug. 2006, well ...
Terms matched: 1 - Score: 3 - 776k