803 results found.
Year: 2011, Volume: 11, Number: 2
... analytical method for calculating BER for TH-PPM, ï‚· Perfect code synchronization at the receiver and TH-BPSK UWB systems based on CF is presented in [9 ], power control A k =1. and later extended on N- orthogonal PPM in [10]. If AWGN channel model is used, the signal received in ...
Terms matched: 1 - Score: 3 - 635k
Year: 2018, Volume: 18, Number: 3
... Forward adaptive second-order prediction for frame-by-frame signal Laplacian source coding based on the restricted quantization," processing is proposed in this paper. The three-level scalar Information Technology and Control, vol. 47, no. 2, pp. 209-219, quantizer adapted to the frame variance is designed to 2018. doi: 10.5755/j01.itc.47.2.16670 ...
Terms matched: 1 - Score: 3 - 1,288k
Year: 2012, Volume: 12, Number: 1
... gathering. (2) The multi-channel communication [15] F. M. Li, W. J. Xu, C. Gao, "A Power Control MAC Protocol for capability of current wireless chips is exploited to avoid Wireless Sensor Networks", Journal of Software, vol. 18, no. 5, ...
Terms matched: 1 - Score: 3 - 670k
Year: 2016, Volume: 16, Number: 1
... , pp. 182 – 191, May 2011. doi: 10.1504/IJSNET.2011.040239 [11] T. E. Cheng, R. Bajcsy, "Congestion control and fairness for many-to- one routing in sensor networks," Proc. of the 2nd ACM Conf. on Embedded Networked Sensor Systems (SenSys), ...
Terms matched: 1 - Score: 3 - 1,201k
Year: 2015, Volume: 15, Number: 2
... M.A. Kashani, M. Safari and M. Uysal, "Optimal relay placement and diversity Synthesis of Circular Array," IEEE International Conference on Power, Control analysis of relay- assisted free-space optical communications systems," J. Opt. and Embedded Systems, pp. 1-5, Allahabad, Dec. 2010. ...
Terms matched: 1 - Score: 3 - 649k
Year: 2012, Volume: 12, Number: 4
... the vector (2, 1) as scheduler vector. More complex of the paper, the methodology was applied on the matrix communication network requires a more complex control vector multiplication example. Results on the proposed system. example demonstrate that the proposed methodology is successfully implemented allowing flexibility in design time and optimizing the execution time ...
Terms matched: 1 - Score: 3 - 877k
Year: 2016, Volume: 16, Number: 2
... CAS in Fig. 1. In every challenge-response round the user scheme. visually forms the path from the upper left corner of the grid Index Terms — access control, authentication, classification (the set of images) to one of the responses based on simple algorithms, computer security, human factors. rules and his ...
Terms matched: 1 - Score: 3 - 1,341k
Year: 2016, Volume: 16, Number: 2
... . Malik, "Synchronous generator model [27] E.S. Boje, J.C. Balda, R.G. Harley, R.C. Beck, "Time-domain identification for control application using volterra series", IEEE identification of synchronous machine parameters from simple Transactions on Energy Conversion, vol. 20, no. 4, pp. ...
Terms matched: 1 - Score: 3 - 1,401k
Year: 2012, Volume: 12, Number: 1
... hidden failures to prevent with robust principal component analysis," in Proc. 16th cascading outages," IEEE Computer Applications in Power, vol.9, Mediterranean Conference on Control& Automation, Ajaccio, 2008, pp.20-23, Jul. 1996. [Online]. Available: http://dx.doi.org/ pp. 59-64. ...
Terms matched: 1 - Score: 3 - 629k
Year: 2016, Volume: 16, Number: 2
... K. Ren, and W. Lou, "Achieving Secure, Scalable, 0805854183, pp. 293-322, Psychology Press, 2007. and Fine-grained Data Access Control in Cloud Computing", Proc. [17] M. Bellare, A. Boldyreva, L. Knudsen, and C. Namprempre, "Online ...
Terms matched: 1 - Score: 3 - 1,419k