584 results found.
Year: 2014, Volume: 14, Number: 2
... The CubeSats [1] are standardized Pico-satellites for low but there are no obstacles to block the navigation signals. cost space research. They are launched as secondary payload The navigation antenna has a perfectly clear view of the sky. and usually operate on Low Earth Orbits (LEO). The In addition, the size ...
Terms matched: 1 - Score: 3 - 700k
Year: 2015, Volume: 15, Number: 1
... second pre-fetching operation for Alternate selection of BRAM1 and BRAM2 for data BRAM2. fetching and buffering operations is done by BRS module In first pre-fetch operation, PRC module loads BRAM 1 for a seamless data movement to NPS, keeping pixel with 32Kb image pixel data (4096 pixels i.e. X 1 to X 4096) throughput ...
Terms matched: 1 - Score: 3 - 762k
Year: 2015, Volume: 15, Number: 1
... reactor [31]. The simplicity of the correction algorithm, which does not The tests were run in a series, alternately for the aggressive require big calculation load, enables its application for controller and the conservative one to eliminate possible various hardware and software platforms. Accordingly, the external impacts. AES performance index for ...
Terms matched: 1 - Score: 3 - 951k
Year: 2014, Volume: 14, Number: 2
... Advanced Methods, William Levine, CRC Press U.S.A., pp. 70-1-70-12, 2010. 7 [10] I. Inoan, "Movement control of an unloading machine from a rotary p H v a lu e furnace," Proc. of AQTR 2010, THETA 17th edition, Cluj-Napoca, Romania, 2010, ...
Terms matched: 1 - Score: 3 - 862k
Year: 2015, Volume: 15, Number: 3
... . The instruction integrity checker was implemented in [4] A. Murat Fiskiran, Ruby B. Lee "Runtime Execution Monitoring VHDL and inserted in an Atmega103 download from (REM) to Detect and Prevent Malicious Code Execution" ICCD, 2004. doi:10.1109/ICCD.2004.1347961. OpenCore. As shown in Fig. ...
Terms matched: 1 - Score: 3 - 1,119k
Year: 2014, Volume: 14, Number: 1
... on Recent Advances in Intrusion Detection, Boston, MA, Category:OWASP_WebGoat_Project 2008. [33] HackMe bank, http://www.mcafee.com/us/downloads/free- [21] S. Mcallister, E. Kirda, and C. Kruegel, "Leveraging user interactions tools/hacme-bank.aspx for in-depth testing ...
Terms matched: 1 - Score: 3 - 600k
Year: 2015, Volume: 15, Number: 3
... package with the 2014. [Online]. Available: http://dx.doi.org/10.1007/s10844-014- implementation of the approach. It is available to download 0319-2 [17] U. Markowska-Kaczmar and A. Hurej, "Evaluation of subspace at http://marosz.kia.prz.edu.pl/subspace.html. clustering quality," ...
Terms matched: 1 - Score: 3 - 1,251k
Year: 2010, Volume: 10, Issue: 1
... distance generated by the energy budget calculator (which is a between sensor nodes is based on measuring the RF power Microsoft Excel application). This file is then loaded in the level received by one node. This localization technique is starterkit application and the new parameters will be dependent on a set of parameters like path loss ...
Terms matched: 1 - Score: 3 - 680k
Year: 2010, Volume: 10, Issue: 1
... by the lead speed of the strip, v1. The signal respect to the minimization of the error variance, h. In the given by the transducer is loaded in a shift register that case of the rolling process with several passes, each pass is exists into the controller (LI in Fig. 3). ...
Terms matched: 1 - Score: 3 - 508k
Year: 2015, Volume: 15, Number: 4
... is to have th= 2.5). information, removing the irrelevant frame sections and so We choose this method because it obtained good results in reducing the computational load. For each extracted object a automated surveillance tasks [1] and proved robust to set of keypoints are extracted. Feature extraction component different types of noise ...
Terms matched: 1 - Score: 3 - 1,553k