778 results found.
Year: 2013, Volume: 13, Number: 2
... will do. autofocus algorithms. While the for the current work only the auto-exposure algorithm, we will refer to the excellent 99 Advances in Electrical and Computer Engineering ... on the auto-exposure and choice and any other bijective parametric function will do. autofocus algorithms. While the for the current work only the auto-exposure algorithm, we will ...
Terms matched: 2 - Score: 40 - 750k
Year: 2013, Volume: 13, Number: 2
... Y. In this respect, the doctor will be able to However, this algorithm has the disadvantage that for carry out a comparative assessment of a video consisting ... on computer (the simple files copying) signifies a method that assumes Among the algorithms used on image enhancement, one data losses. For this reason, the ...
Terms matched: 2 - Score: 13 - 657k
Year: 2013, Volume: 13, Number: 2
... state with the voltage regulation. Experiments have yielded the performances investigation [9]. reliability of this configuration during generator loading and In this paper an unbalances compensation algorithm is unbalanced loads supply. implemented for a three-phase induction generation Index Terms — micro hydro power plant, induction supplying unbalanced loads. Experimental investigations generator, phase ...
Terms matched: 1 - Score: 16 - 877k
Year: 2013, Volume: 13, Number: 2
... telecom-bretagne.eu 1 Abstract — This paper presents a study on the influence of the MAP algorithm minimizes Bit or Symbol Error Rate the extrinsic information scaling coefficient value (eic ... ) decoders for posteriori (MAP) and maximum logarithmic MAP (MaxLogMAP) component algorithms. Firstly, we estimate the iterative processing, the Viterbi algorithm in its ...
Terms matched: 2 - Score: 195 - 823k
Year: 2013, Volume: 13, Number: 2
... @unob.cz, jan.leuchter@unob.cz 1 Abstract — This paper describes an original stochastic algorithm based on a parallel approach. The algorithm is II. BASIC PRINCIPLES suitable ... A few independent pseudorandom generators are used. They Most of currently used stochastic optimization algorithms generate independent variable vectors along all of the are single-pass techniques. It means ...
Terms matched: 2 - Score: 92 - 513k
Year: 2013, Volume: 13, Number: 2
... boundary buses between separate power markets is proposed. The algorithm developed enables limit T us to obtain consistent LMP ... Baldick, "A Comparison of Distributed Optimal Power Flow Algorithms", IEEE Trans. Power Systems, vol ... 15, no. 2, pp. APPENDIX B: PRIMAL-DUAL INTERIOR POINT BASED OPF 599-604, May 2000 ...
Terms matched: 3 - Score: 71 - 717k
Year: 2013, Volume: 13, Number: 2
... . CONCLUSION [11] Baoli Zhang and Fengqi Yu, "A Feasible Localization Algorithm for Based on observations, confirmed by extensive practical Wireless Sensor Networks Using Directional ... powered, improving the accuracy of the positioning results by using complex filtering and correction algorithms, and other the lifetime of a node being crucial in all practical cases ...
Terms matched: 2 - Score: 16 - 678k
Year: 2013, Volume: 13, Number: 2
... it is important to research suitable lossy composed of the uniform quantizer and Lloyd-Max's compression technique that provides the desired level of quantizer. The initialization problem of Lloyd-Max's quantizer's algorithm and the high design complexity of 1 Lloyd-Max's quantizer with a large number of quantization This work is partially supported by Serbian Ministry of Education and Science through Mathematical ...
Terms matched: 1 - Score: 6 - 641k
Year: 2013, Volume: 13, Number: 2
... application of computer software and hardware means, which are intended to design ASPs using algorithm description on are necessary for these systems implementation, are described ANSI C language ... processors, whose structure takes into account an transformation into configuration code of reconfigurable executed algorithms features, allows to increase its logic, integrated with general-purpose processor. productivity ...
Terms matched: 2 - Score: 38 - 605k
Year: 2013, Volume: 13, Number: 2
... Access Authentication accompanied by consumer electronics, communications, medical and other, Secure Hash Algorithm 1 (SHA-1) to establish a secure way representing an interesting area for ... be performed by various cryptographic imposes a need for embedded agent integration, where the algorithms. The proposal is experimentally tested using two communication component presents a setback for ...
Terms matched: 2 - Score: 119 - 908k