778 results found.
Year: 2011, Volume: 11, Number: 2
... Our work is aimed at studying capabilities of the wavelet are determined by the following algorithm analysis [18, 32] in determination of statistical (statistical moments of ... polarization D € 3 € tg. (15) were calculated using the following algorithms S 4 €m ‚ n € Classification of W (a, b € ...
Terms matched: 2 - Score: 10 - 1,167k
Year: 2011, Volume: 11, Number: 2
... change continuously. Usually discrete variables cause problems for I j € I se € €1 € k eq € e j Vi € V j (24) OPF algorithm convergence. Since the amplitude and phase angle of the injected voltage is fully controlled by the rotor jX tot position of the two RPSTs, using tap changing ...
Terms matched: 1 - Score: 3 - 575k
Year: 2011, Volume: 11, Number: 2
... a congested TCP/AQM dynamics. By employing a Lyapunov-Krasovski router, the AQM algorithm computes a marking probability, functional, sufficient stochastic stability conditions are p. ... property of high quality with random parameters. The linear dynamic model of TCP AQM algorithms. See For example [3, 10, 11 and 12]. ...
Terms matched: 2 - Score: 24 - 623k
Year: 2011, Volume: 11, Number: 1
... , s, z): is the magneto-motive force of the winding the case of default dynamic detection and estimation of td can be obtained using a sequential algorithm for change j, detection (maximum likelihood or cumulative sum). Yields: p (, s, z): is the permeance of ...
Terms matched: 1 - Score: 3 - 492k
Year: 2011, Volume: 11, Number: 1
... simple time (AEC), evaluations of enclosed spaces and BSS. Although domain algorithm. many reverberation algorithms can be found in the literature, very few design ... with the original sound resulting in multipath considered to be convolutive ones. Time domain algorithms (as neural network based blind source separation) are not suitable propagation with ...
Terms matched: 2 - Score: 100 - 807k
Year: 2011, Volume: 11, Number: 1
... FIFO W and FIFO N in Fig.1(a )). method. In this paper, mesh NoC is chosen as an example to 3) Deterministic routing algorithm without deadlock is show the flow of our modeling method. Fig.1 shows the used in network (e.g., dimension-order routing algorithm network topology and the router ...
Terms matched: 1 - Score: 11 - 679k
Year: 2011, Volume: 11, Number: 1
... nonlinear model (2) €“ (4) gives steady-state vector of fluxes: inner torque loop as shown in Fig. 1. The input to the control algorithm is the speed reference, which is fed to the speed regulator. Output of the speed regulator is torque Ψ 0 €e0, s 0 € € € ...
Terms matched: 1 - Score: 12 - 793k
Year: 2011, Volume: 11, Number: 1
... tomos) and "to write" (graphein). This term comes to reduced thermoregulatory capacity, and it is recognized that microwave imaging from the image processing algorithms localized increases in blood volume can be associated with and is also known from magnetic resonance tomography early tumor growth. The last factor is especially important, ( ...
Terms matched: 1 - Score: 9 - 654k
Year: 2011, Volume: 11, Number: 1
... 11, Number 1, 2011 Influence of Extrinsic Information Scaling Coefficient on Double-Iterative Decoding Algorithm for Space-Time Turbo Codes with Large Number of Antennas Lucian TRIFINA, Daniela T‚RNICERIU ... . 2 by relation (14). (15), log-APP and max-log-APP algorithms will be [12] shows that extrinsic information scaling in the max- ...
Terms matched: 2 - Score: 51 - 621k
Year: 2011, Volume: 11, Number: 1
... words. As node is split and then the same procedure is repeated for the size of corpus gets bigger, the coverage also becomes each child node. This algorithm proceeds recursively until higher, but once the size is over 30M words, the splitting is no longer possible. This tree continues splitting improvement of coverage becomes ...
Terms matched: 1 - Score: 3 - 625k