778 results found.
Year: 2015, Volume: 15, Number: 3
... Parameter Ontology Ontology Vocabulary Vocabulary Edit Attributes with Sensor Parameter Ontology Vocabulary Mapping Ontology FSPOV Algorithm Figure 1. Architecture 107 Advances in Electrical and Computer Engineering Volume 15, ... expert E.g. NetCDF, ASCII, HDF5, Binary etc. knowledge and matching algorithms. The current work uses Agreement Maker to map and merge SSN and CF-parameter ...
Terms matched: 2 - Score: 28 - 1,152k
Year: 2010, Volume: 10, Issue: 4
... estimation using back-propagation have been collected during the period January 1, 2009 to error algorithm. Meanwhile, there exist other types of fuzzy December 31, 2009 from ... is observed that 2-D FIR filters act more accurately in comparison with 1-D conventional fuzzy algorithms that are used to a great extent [13-15]. representations; however ...
Terms matched: 2 - Score: 27 - 2,187k
Year: 2019, Volume: 19, Number: 1
... order to improve the estimation. We propose, in Section IV, a new algorithm for I. INTRODUCTION adjusting the I-V characteristic curve for operation in non- ... aside from their main estimation The method given in [8] considers that additional algorithms, also propose parameter adjustment methods. We information is known, namely one ...
Terms matched: 2 - Score: 27 - 1,427k
Year: 2014, Volume: 14, Number: 1
... suggested items are those that users with together for a long time so that the algorithm is able to similar preferences have liked in the past. This converge. ... collaborative and The proposed solution takes into account the differences content based filtering. The algorithms developed estimate the between these two services and implements distinct similarity between items and ...
Terms matched: 2 - Score: 27 - 785k
Year: 2013, Volume: 13, Number: 3
... , Number 3, 2013 coarse delay estimation. It is noteworthy that in Mallat algorithm, the output of the The paper is organized as follows. Section II ... twice extracted, and then the next level introduction of wavelet transform and its fast algorithms. wavelet transform is conducted to the remaining data, as The detail of ...
Terms matched: 2 - Score: 27 - 757k
Year: 2022, Volume: 22, Number: 1
... as the security steps IoT devices and their gateway, supported by a state-of-the-art encryption algorithm. The protocol can increase the are optimum and the system performance is not ... the IoT device is not revealed to unauthorized persons. Confidentiality is provided through encryption algorithms [36]. Another critical security service is data integrity, i.e. ...
Terms matched: 2 - Score: 27 - 1,672k
Year: 2011, Volume: 11, Number: 3
... interval bounds. The Final code must be ANSI C compliant. This condition transformation algorithm remodels the dot product form into a poses some difficulties (e.g. right ... increasing the execution speed of the of the task, but is necessary for control algorithms, where program on a microprocessor without a math coprocessor. The original C ...
Terms matched: 2 - Score: 27 - 1,306k
Year: 2012, Volume: 12, Number: 4
... end to end delay for some schedule overall design process. Time consuming simulations can algorithm. However, the model is built for the work only be used at ... Generalized Processor Sharing) meaningful for NoC's development. Because the NoC is related schedule algorithms to analyze the end to end delay proposed to solve the bottleneck of on ...
Terms matched: 2 - Score: 27 - 622k
Year: 2018, Volume: 18, Number: 2
... a regular TCP user. account. Third, load balancing; a multi-path TCP algorithm should C. Multi-path Cubic (MPCUBIC) transfer traffic away from congested paths ... Algorithm (LIA) convex growth functions. During congestion avoidance, Several congestion control algorithms have been MPCUBIC regulates traffic by adjusting the sending proposed for MPTP. Four ...
Terms matched: 2 - Score: 27 - 1,620k
Year: 2016, Volume: 16, Number: 2
... response based on the that the higher number of steps the user makes before Algorithm 1: reaching the exit position, longer the time he requires to respond ... classification (the set of images) to one of the responses based on simple algorithms, computer security, human factors. rules and his secret password. I ...
Terms matched: 2 - Score: 26 - 1,341k