291 results found containing all search terms.
Year: 2014, Volume: 14, Number: 1
... feature extraction method should generate a face successful face recognition system and must overcome the feature which is robust in ... . Popular methods of extracting ranging from security and surveillance systems to global features include Principal Component Analysis smartphones, ... is tested in accordance with the Colorado State University Face Identification Evaluation System [34] using Images V. ...
Terms matched: 3 - Score: 70 - 886k
Year: 2011, Volume: 11, Number: 1
... separation (BSS) has many potential is a typical system identification problem, where the exciting applications in wireless ... [18] reports an online BSS algorithm where karaoke systems, where the singer voice should be extracted subband ... is applied to the mixtures. from a musical recording, thus the performer can sing it with The paper ...
Terms matched: 3 - Score: 69 - 807k
Year: 2015, Volume: 15, Number: 3
... voltage injected by the SSSC. Although this by the system and the SSSC. Finally, by using reflectometry ... transmission because this device injects voltage and current to the systems, transmission lines, wavelet transform, waves transmission ... S.R. Samantaray. "Phase selection and fault section identification in thyristor controlled series compensated line using varied, ...
Terms matched: 3 - Score: 69 - 1,306k
Year: 2010, Volume: 10, Issue: 3
... is used to estimate the rotor implemented within the proposed system for voltage and position. However, this method ... Fig.1. Stator and rotor magnetic fluxes in different reference systems t The mathematical equations are given below [16 ... . Stator( Test= p ψ α iβ ψβ iα) (12) current vector can be represented ...
Terms matched: 3 - Score: 69 - 883k
Year: 2012, Volume: 12, Number: 3
... Romania pentiuc@eed.usv.ro Abstract — The paper describes a system of hand gesture obtain a new movement or a ... robotic controlled by transmitting from the computer to the robot systems has been received lots of attention lately due to ... thumb) from the contour line. Figure 5. Identification of both hands and two fingers. Depending on ...
Terms matched: 3 - Score: 69 - 735k
Year: 2016, Volume: 16, Number: 2
... drive Among the mathematical models used for the analysis of system where the machine is integrated. The mathematical electrical ... of energy, no impact on the electric electric drive systems, automation systems, robotics, drive of the ... . Kamwa, Fellow, "Hybrid-State-Model-Based Time- Domain Identification of Synchronous Machine Parameters from not impact on the ...
Terms matched: 3 - Score: 68 - 1,401k
Year: 2019, Volume: 19, Number: 2
... unsupervised classification method; a bad selection of the instrumentation system to collect the three current signals initial cluster values ... , authors detect rotor faults with problems to the mechanical systems coupled to it. the use of both, ... by his non-invasive nature. applied for the monitoring and identification of broken rotor bars when the motor is fed ...
Terms matched: 3 - Score: 68 - 1,378k
Year: 2012, Volume: 12, Number: 4
... elitistic genetic algorithm," formulated as a fractional order system containing two Proceedings of ECCTD'01, ppIII61-64. resistors ... Circuits and The parameter identification for a new behavioral model Systems (ISCAS), May 21-24, 2006 Island ... Computer Engineering Volume 12, Number 4, 2012 Parameter Identification for a New Circuit Model Aimed to Predict Body ...
Terms matched: 3 - Score: 67 - 609k
Year: 2017, Volume: 17, Number: 2
... detection and a 1/ p    p system identification approach is presented in [5]. ... be used to fuse like an H  norm in systems analysis. This norm extracts the images [1 ... for palmprint where supremum can be replaced with maximum in identification. Wavelet energy is used in fields unrelated to ...
Terms matched: 3 - Score: 65 - 1,647k
Year: 2007, Volume: 7, Issue: 1
... formalize both quantitative and qualitative parameters of the network safety system. Also it is suggested an II. THE ... complex evaluation of the required security level according to the systems with the next main components: the hardware importance ... formalize the decisions support even in the non-uniform FIA:identification and authentication, FMT: security multi-dimensional environ-ment. ...
Terms matched: 3 - Score: 65 - 418k