Ara
Toplam kayıt 555, listelenen: 281-290
Application of the discriminative common vector approach to one sample problem [Ayirtedi·ci· ortak vektör yaklaşiminin tek örnek problemi·ne uygulanmasi]
(2012)
Matrix-based (2D) methods have advantages over vector-based (1D) methods. Matrix-based methods generally have less computational costs and higher recognition performances with respect to vector-based variants. In this work ...
Strong Stabilization of Lossless Propagation Time-Delay Systems by Continuous Pole Placement
(Elsevier Science BV, 2016)
Stabilizing controller design problem for a class of LTI neutral time-delay systems, namely lossless propagation time-delay systems, is considered. Effect of small time-delay perturbations on the stability is also taken ...
Comparison of PI controllers designed for the delay model of TCP/AQM networks
(Elsevier Science BV, 2013)
One of the major problems of communication networks is congestion. In order to address this problem in TCP/IP networks, Active Queue Management (AQM) scheme is recommended. AQM aims to minimize the congestion by regulating ...
Salient point region covariance descriptor for target tracking
(Spie-Soc Photo-Optical Instrumentation Engineers, 2013)
Features extracted at salient points are used to construct a region covariance descriptor (RCD) for target tracking. In the classical approach, the RCD is computed by using the features at each pixel location, which increases ...
Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA
(IEEE-Inst Electrical Electronics Engineers Inc, 2014)
The cryptographic hash functions BLAKE and Skein are built from the ChaCha stream cipher and the tweakable Threefish block cipher, respectively. Interestingly enough, they are based on the same arithmetic operations, and ...
Trading off execution time for reliability in scheduling precedence-constrained tasks in heterogeneous computing
(Institute of Electrical and Electronics Engineers Inc., 2001)
This paper investigates the problem of matching and scheduling of an application, which is composed of tasks with precedence constraints, to minimize both execution time and probability of failure of the application in a ...
A spectral graph wiener filter in graph fourier domain for improved image denoising
(Institute of Electrical and Electronics Engineers Inc., 2017)
A Wiener filtering scheme in graph Fourier domain is proposed for improving image denoising performance achieved by various spectral graph based denoising methods. The proposed Wiener filter is estimated by using graph ...
Decentralized controller design to enforce boundedness, liveness, and reversibility in Petri nets
(Institute of Electrical and Electronics Engineers Inc., 2003)
Decentralized supervisory controller design based on overlapping decompositions to enforce boundedness, liveness, and reversibility is considerered for ordinary Petri nets with weighted arcs. In the proposed approach, the ...
Content-based image retrieval of centroblast cells and noncentroblast cells in Follicular lymphoma [Sentroblast ve sentroblast olmayan folli·küler lenfoma hücre resi·mleri·ne i·çeri·k tabanli geri· eri·şme]
(2012)
In this study content-based image retrieval is applied to hematoxylin and eosin H&E stained Follicular lymphoma centroblast cell images and K-nearest neighbour classifier is used with multi-texton histogram features. With ...
A Wearable Head-Mounted Sensor-Based Apparatus for Eye Tracking Applications
(IEEE, 2008)
This work presents a novel approach to eye-tracking systems using eye-glass like apparatus equipped with relatively cheap IrDA sensors and IrDA LEDs connected to a computer. The proposed system produces very low dimensional ...