291 results found containing all search terms.
Year: 2016, Volume: 16, Number: 4
... proposed correlation technique uses the polar coordinate [24] system wherein the horizontal axis represents the scan angle in ... conventional cross correlation technique called KZZ-HXC Control, Automation and Systems, vol. 10, no. 3, ... SCE is a three step process involving (i) identification,   rs1 (n) ï€ rs ...
Terms matched: 3 - Score: 51 - 1,363k
Year: 2016, Volume: 16, Number: 4
... complete its Another interesting work is found where a file system download of CentOS 5.8 image faster than any others ... repeating what was done for traditional paging I. INTRODUCTION systems to enhance OS performance. The execution time of ... the case of CentOS incurs less signaling traffic for chunk identification. For 5.8, the most popular, in ...
Terms matched: 3 - Score: 37 - 1,322k
Year: 2016, Volume: 16, Number: 3
... identification and face verification. First, in different biometric system parameters. By comparative identification scenarios the system performs ... face from the (PCA) -based face recognition systems, respectively. The system database of known individuals ... of labeled faces is also widely applicable to namely face identification and face verification. First, in different biometric ...
Terms matched: 3 - Score: 203 - 1,232k
Year: 2016, Volume: 16, Number: 3
... is replaced with the interpreter, garbage collector, operating system, network and TRNG seeding. The remaining operations ... a booming technology, acting as part of the ubiquitous systems [2]. The Figure 1. The ... A Mersenne prime is used as the period of the systematically as 0, 20, 30 a second weakness ...
Terms matched: 6 - Score: 149 - 755k
Year: 2016, Volume: 16, Number: 3
... have Selection and been executed on the ESOGU Beowulf cluster system with Replacement SB-RWa SB-RWa SB-RWa Migration Fully Not 17 ... any connection topology can be programmed by using cluster computing systems. In this article, a dynamic topology for ... D. Rivera, "A method for model parameter identification Inference System: A simulation study," in ...
Terms matched: 3 - Score: 31 - 1,454k
Year: 2016, Volume: 16, Number: 3
... game theory technique can by assuming worst case conditions for system and improve filter performance in presence of model uncertainties ... to extended Kalman and cubature Kalman filters. continues-time dynamic systems in [24]. A discreet-time version of ... . 26, no. 2, pp. System Identification, Brussels, Belgium, 2012, pp. ...
Terms matched: 3 - Score: 82 - 1,142k
Year: 2016, Volume: 16, Number: 3
... circuit. For this proposed an in vivo glucose monitoring system by using a purpose, we implemented a simple ... [14-16]. In many Index Terms — fuzzy systems, heuristic algorithms, applications, the sensor outputs ... respectively as input data coding. Because there is no systematic and efficient procedure for IV. RESULTS OF THE ...
Terms matched: 4 - Score: 121 - 1,193k
Year: 2016, Volume: 16, Number: 3
... feed-forward neural networks (CFNN) and adaptive neuro-fuzzy inference system (ANFIS). An exhaustive explanation of these ... learning algorithm is the back propagation. As a control systems, and it was proposed in [25] ... 1]. To ensure suitable thermal and electrical based systematic approach to optimally modelling behavior, substation connectors must ...
Terms matched: 4 - Score: 67 - 1,218k
Year: 2016, Volume: 16, Number: 2
... , 2016 An Improved Structure of an Adaptive Excitation Control System Operating under Short-Circuit Ioan FILIP, Octavian PROSTEAN, ... short-circuit, in order to avoid its applicability to power systems is well described in the the possible damages ( ... Fig. 1) [13-15]. Usually, the technical literature [4-8]. A standard procedure ...
Terms matched: 4 - Score: 396 - 1,330k
Year: 2016, Volume: 16, Number: 2
... exploits various information gained from the actual implementation of the system, either physical or Figure 1. The graphical ... ., "On limitations of designing usable leakage-resilient password systems: attacks, principles and We can see from ... . Hopper and M. Blum, "Secure human identification protocols," in Proc. Int. Conf ...
Terms matched: 3 - Score: 72 - 1,341k