778 results found.
Year: 2011, Volume: 11, Number: 2
... Our work is aimed at studying capabilities of the wavelet are determined by the following algorithm analysis [18, 32] in determination of statistical (statistical moments of ... polarization D € 3 € tg. (15) were calculated using the following algorithms S 4 €m ‚ n € Classification of W (a, b € ...
Terms matched: 2 - Score: 10 - 1,167k
Year: 2018, Volume: 18, Number: 4
... identical number of anchor locations are used for the considered techniques. For the k-NN algorithm, k values between 2 and 4 have been reported to provide accurate localization ... verify that research area [4-6]. their proposed approach yielded a root-mean-squared Localization algorithms can be broadly classified as localization error on the order of a few meters ...
Terms matched: 2 - Score: 10 - 1,355k
Year: 2019, Volume: 19, Number: 2
... analysis and In addition, the introduction of the first memristor [10], algorithm design have been researched in theory as well as in hardware implementation of FPGA ... and I. Elamvazuthi, "Voice Recognition 2009. doi: 10.1109/TVLSI.2009.2014771 Algorithms using Mel Frequency Cepstral Coefficient (MFCC) and [10] L. ...
Terms matched: 2 - Score: 10 - 1,762k
Year: 2009, Volume: 9, Issue: 1
... 9 bit required in the cluster head for data aggregation. It depends on the algorithm complexity. 5 2 2 Eda( L)= C0+ C1 L ... sensor communications using time division multiple access (TDMA), proposing optimal and suboptimal algorithms to minimize the energy to transmit data with a given capacity in the adequate ...
Terms matched: 2 - Score: 10 - 521k
Year: 2008, Volume: 8, Issue: 2
... code Figure 1. Reuse Evolution Model: Designer's Viewpoint. instances and a modification algorithm that describes generation of a particular domain program depending upon However, the REM ... - defines transformations using the elements of the UNDERSTOOD DESIGN DOMAINS metamodel, and offers algorithms to apply these A. Context of research transformations using generative techniques. Metamodel ...
Terms matched: 2 - Score: 10 - 649k
Year: 2013, Volume: 13, Number: 4
... computer arithmetic that c3= a1 c2- b1d2+ c1a2+ d1b2, develops algorithms and structures for performing d3= a1 d2+ b1c2- c1b2+ d1a2 ... have more than one imaginary units [2 ], [7]. and algorithmically-structural features of the hardware for From the theory of hypercomplex numbers [2 ] ...
Terms matched: 2 - Score: 10 - 777k
Year: 2011, Volume: 11, Number: 3
... . Kim, "A Packet Loss Concealment 4 0.2 0.4 0.308 0.068 0.317 -0.029 Algorithm Robust to Burst Packet Loss for CELP-type Speech 5 0.0 0.2 0.104 -0.010 0.106 ... 0.8 1.0 0.875 0.646 1.316 -0.505 [7] W.C. Chu, Speech Coding Algorithms, John Wiley& Sons, New 2 0.6 0.8 0.722 0.374 0.946 -0.309 ...
Terms matched: 2 - Score: 10 - 1,787k
Year: 2016, Volume: 16, Number: 4
... drawback of this feature is that it has a large feature size. The extraction algorithm is also train a classifier. The trained classifier will then be used to ... any hardware acceleration. All the the histogram values in each group. The normalized algorithms were implemented using the Microsoft Visual histograms from all the groups are finally concatenated ...
Terms matched: 2 - Score: 10 - 1,941k
Year: 2014, Volume: 14, Number: 4
... HMID [11], based on Maximum Logarithmic Maximum A Posteriori (Max-Log-MAP) algorithm [16], with a scaling factor of extrinsic information sf=0.7 ... [6] J. N. Laneman, Cooperative diversity in wireless networks: Algorithms and architectures, pp. 79-109, PhD Thesis, Massachusetts relay-destination) are ...
Terms matched: 2 - Score: 10 - 785k
Year: 2016, Volume: 16, Number: 1
... ith layer is denoted as H i, with each layer having the same novel algorithm for constructing a connected k-dominating length (x). A layer H i ... sensor deployments using novel genetic helicopter. On the other hand, deterministic deployment is algorithms. Chen et al. [21] investigated the theoretical preferable in accessible ...
Terms matched: 2 - Score: 10 - 1,201k