884 results found.
Year: 2013, Volume: 13, Number: 4
... artificial neural network, and may be used for mathematical modeling and prediction. In the learning process of BP ... microphone pairs are required for TDOA based A. Signal Model in Distributed Microphone Arrays acoustic localization. Consider a ... by simple summation to estimate the speaker position, and modeled prior information about the speaker Index Terms — acoustic ...
Terms matched: 3 - Score: 24 - 793k
Year: 2013, Volume: 13, Number: 4
... . A block from the Web page structures. It is very trouble-some for identification model (BIM) based on node similarity is defined extracting information correctly. This ... introduced in [24]. record on domain books. According to the two models and the extracted records, domain ontology was built and 29 Advances in Electrical ...
Terms matched: 2 - Score: 43 - 775k
Year: 2013, Volume: 13, Number: 4
... [1-5]. Some of the performance features of current- II. THE PROPOSED CMOS CS mode circuits are high bandwidth, high linearity and wide The equivalent model of a CS is given in Fig. 1. Zn and Zp dynamic range capability with low voltage operation and denote the equivalent impedance values at ports n ...
Terms matched: 1 - Score: 3 - 751k
Year: 2013, Volume: 13, Number: 4
... . Zivanov and D. Marculescu, "MARS-C: Modeling and Available: http://dx.doi. ... • M d, AX Aorig • M A SET model I1 (1ïƒ 0ïƒ 1) where ISERi denotes the individual ... area of the MOSFET) of gate delay can be modeled as a function of the transition time and g ...
Terms matched: 3 - Score: 17 - 827k
Year: 2013, Volume: 13, Number: 4
... by LAMED on the tag, the proposed protocol [22] L. Lu, Y. Liu, and X. Li, "Refresh: Weak Privacy Model for RFID requires 1,566 gates. On the other hand, if the AES is Systems," Proc. of IEEE INFOCOM, 2010. implemented ...
Terms matched: 1 - Score: 3 - 718k
Year: 2013, Volume: 13, Number: 4
... , this paper introduces a novel However, uniformly deployment strategy may cause unbalanced traffic pattern in wireless sensor networks (WSNs). node deployment strategy in the concentric model called In this situation, larger load may be imposed to CHs (cluster "Rich" (Region-based Intelligent Cluster-Head selection and heads) around the sink. ...
Terms matched: 1 - Score: 53 - 748k
Year: 2013, Volume: 13, Number: 3
... Another formulation for level set segmentation is: of spatial modeling. This problem is raised, when images corrupted ... entire bone structure, the joints principle and the mathematical model for each method, need to be considered [ ... a series of regions, based on the attributes of models, wavelets-based methods, and atlas-based the image that ...
Terms matched: 4 - Score: 129 - 706k
Year: 2013, Volume: 13, Number: 3
... accuracy of results and Section IV the conclusions. various graphical models: Hidden Markov Model (HMM), input-output HMM (IOHMM), hidden conditional random II ... to improve gesture recognition accuracy of results and Section IV the conclusions. various graphical models: Hidden Markov Model (HMM), input-output HMM (IOHMM), ...
Terms matched: 2 - Score: 11 - 699k
Year: 2013, Volume: 13, Number: 3
... on Power [17] Pogaku, N.: Modeling, Analysis and Testing of Autonomous Electronics, 2010 ... a main evaluate the stability limits of a small signal model of a control structure with a hierarchical topology. ... facilities to operate independent of the are based on dynamical models with a large number of state public utility when ...
Terms matched: 3 - Score: 54 - 704k
Year: 2013, Volume: 13, Number: 3
... the Gaussian image," In Proceedings of the Vision Modeling and Visualization Conference, pp.35-42, 2001. [ ... to extract transform[7] are two widely known model fitting methods. homogeneous segments from unorganized point cloud ... a nonparametric clustering algorithm to segment CAD threshold r. models. Based on the mean-shift, cell mean shift ...
Terms matched: 4 - Score: 35 - 1,067k