584 results found.
Year: 2017, Volume: 17, Number: 4
... being attacked, the watermark globe. A vast number of pirated copies of such information should be extractable and recognizable so that it can be used once accessed and downloaded can be made. This pirated to prove ownership. This property is called robustness of data can then be redistributed either freely or at very low watermarking scheme ...
Terms matched: 1 - Score: 3 - 1,072k
Year: 2017, Volume: 17, Number: 4
... [Accessed: 02-Jun-2017]. Conference on Human Factors in Computing Systems, 2013, pp. [43] "Kinect for Windows SDK 2.0," Microsoft Download Center. 1081 – 1090, doi: 10.1145/2470654.2466138. [Online]. Available: https://www.microsoft.com. [Accessed: 02-Jun- ...
Terms matched: 1 - Score: 3 - 1,600k
Year: 2016, Volume: 16, Number: 3
... Olejnik, U. Scafuri, E. Tarantino, M. tracking a maneuvering target using radar/infrared (IR) Tudruj, "Extremal optimization applied to load balancing in execution sensors. The tracking problem in target tracking systems of distributed programs," Applied Soft Computing, vol. 30, pp. 501- ...
Terms matched: 1 - Score: 3 - 1,142k
Year: 2013, Volume: 13, Number: 4
... degrees of freedom that will not be the subject of the kinematic couplings, initial conditions or the system modal overlap. These are called degrees of freedom to the loads; limit. Modal overlap is recovered in two key areas:- Building the kinematic model of the mechanical system, kinematic markers associated with flexible elements, ...
Terms matched: 1 - Score: 3 - 1,048k
Year: 2010, Volume: 10, Issue: 3
... , two super trees have been employed. In this suffer from some deficiencies like quality deterioration method, various frequency bands of wavelet transform have along with accretion of payload. These problems are been used for embedding the watermark bits so that aggravated when the original watermark is inaccessible or information energy is distributed in the whole spatial ...
Terms matched: 1 - Score: 3 - 958k
Year: 2014, Volume: 14, Number: 2
... . The first,   DL N g N RB/ 8.. normal CP group    N PHICH ï€½ïƒ DL (1) traffic data payload is coded by Turbo channel coding and 2 ï‚´ N g N RB/ 8.. extended CP  the second, LTE employs a Hybrid Automatic Repeat ...
Terms matched: 1 - Score: 3 - 765k
Year: 2014, Volume: 14, Number: 3
... value is selected to be higher than the harmonic may be high [17],[18], therefore in these cases the zero current due to the load, CT mismatch, or any other relay would be unnecessarily blocked. It has been noted that imbalance. inrush currents of new generation transformers, having cores ...
Terms matched: 1 - Score: 3 - 1,003k
Year: 2014, Volume: 14, Number: 4
... , for example, fifth order amplitude change function and PI sequentially. implementation, by changing only polynomial coefficients Amplitude change functions are actually polynomial (they can be reloadable), a bunch of fifth or smaller order transfer functions of initial filter. In our case, the amplitude functions can be realized. H z  ...
Terms matched: 1 - Score: 3 - 852k
Year: 2014, Volume: 14, Number: 3
... electrified railways, the electrical current of the train is systems. Arcing generally occurs at higher speeds, under produced by the sliding contact between the pantograph and increased load, and in cold weather conditions [3]. In most catenary. The quality of the current depends on the reliability of contact between the pantograph and ...
Terms matched: 1 - Score: 3 - 1,144k
Year: 2014, Volume: 14, Number: 4
... computation. The small differences between other times can be attributed to the low precision on the measurement method because these times include transfer times of simulation data over a loaded network. Considering that, the best choice for NEAR data series processing are either Symlet-1 or Biorthogonal-3.3, due only to their detection effectiveness. V. CONCLUSION ...
Terms matched: 1 - Score: 3 - 1,185k