894 results found.
Year: 2014, Volume: 14, Number: 2
... in training procedures. The performance of the classical NB 0.65 classifiers are not stable. This is most likely due to the fact Recognition Rate of the relatively fixed model selection. Based on common 0.6 experience, a more complexed and adaptive model may be 0.55 valid for this kind of situation. LSPGL In conclusion, in ...
Terms matched: 1 - Score: 5 - 713k
Year: 2011, Volume: 11, Number: 3
... the Phase 2 process of the algorithm. This experiment is structured around the MPEG-7 First, blocks in target image (b) are retrieved based on their experiment model (XM) [11]. MPEG-7 Common Color similarity to each ROI in the query image. For instance, the Dataset (CCD) and Common ...
Terms matched: 1 - Score: 5 - 5,455k
Year: 2013, Volume: 13, Number: 3
... III, the discriminant classification results have Based on the criterion for fault category and non-fault clearly shown that the accuracy of classification has reached category, the linear discriminant model can be calculated, 100%. The results from discriminant classification are fully TABLE IV. THE POSTERIOR PROBABILITY AND DISCRIMINANT CLASSIFICATION RESULTS IN UNSYMMETRICAL SHORT CIRCUIT FAULT ...
Terms matched: 1 - Score: 5 - 632k
Year: 2009, Volume: 9, Issue: 2
... written as: 2 dvieq In Vout Gm Iout 2 di ieq Noiseless transconductor Figure 7. THD values depending on frequency of the MTD Figure 10. Noise behavioral model of a transconductor. for N= 4 and k= 1 6. 48 Advances in Electrical and Computer Engineering Volume 9, Number 2, 2009 IV ...
Terms matched: 1 - Score: 4 - 1,116k
Year: 2014, Volume: 14, Number: 2
... the next set of error system frequency is close to the maximum possible for the detection bits of Hamming code, i is the number of stages, appropriate FPGA model. This confirms the fulfillment of and bi is the ith bit of the input stream. Then the task of the requirements for scalability. converting the algorithm ...
Terms matched: 1 - Score: 3 - 911k
Year: 2021, Volume: 21, Number: 4
... [8] Y. Kwaka, S. Leeb, A. Damianoc, A. Vishwanathd, "Why do users traffic," IEEE International Symposium on Modeling, Analysis, and not report spear phishing emails?," Telematics and Informatics, Simulation of Computer and Telecommunication Systems, Rennes, Elsevier, vol. ...
Terms matched: 1 - Score: 3 - 2,024k
Year: 2013, Volume: 13, Number: 2
... blurring effect, due to the distortions of the lens system and of image perception, capture technical performance smoothing operations in the spatial domain. display system The mathematical model of an image degradation process Optimal illumination, is illustrated by (2 ): technical performance Accurate g( x, y)= h( x, ...
Terms matched: 1 - Score: 3 - 657k
Year: 2016, Volume: 16, Number: 1
... Where the are presented in Section 5. average ICI power depends on the frequency offset ”f. The average ICI power across different sequences is expressed II. SYSTEM MODEL as 2 We used a pulse shaping technique in OFDM systems to N €1 k €m reduce OOB power and diminish BER. This approach has m ICI ...
Terms matched: 1 - Score: 3 - 1,304k
Year: 2023, Volume: 23, Number: 3
... , M. Rimen, J. Ohlsson, J. Karlsson, "Fault injection Conference on Software engineering, pp. 355-356, May 1989. into VHDL models: the MEFISTO tool," In Predictably Dependable doi:10.1145/74587.74634 Computing Systems, pp. 329-346. Springer, Berlin, Heidelberg, 1995. ...
Terms matched: 1 - Score: 3 - 1,351k
Year: 2013, Volume: 13, Number: 1
... 4GB RAM running on a single core. We [16] L. Lu, Y. Liu, and X. Li, "Refresh: Weak Privacy Model for RFID used ASN1::secp160r1 parameter [25]. As demonstrated at Systems," Proc. of IEEE INFOCOM, 2010. [17] ...
Terms matched: 1 - Score: 3 - 629k