Dil "eng" Bildiri Koleksiyonu için listeleme
Toplam kayıt 268, listelenen: 1-20
-
A 2D representation for analysis and coding of power quality events
(IEEE, 2003)In this work, we demonstrate examples about uses of practical image processing techniques over a new interpretation of power quality event data. Power quality event data are 1D data obtained from a real life system with ... -
A 3D Lifting Based Method Augmented by Motion Compensation for Video Coding
(IEEE, 2009)This study introduces a spatio-temporal lifting based algorithm to be used in compression of video signals. The temporal correlation of consecutive frames causes temporal redundancies, which are subject to lifting-like ... -
Active suspension design based on linear-matrix inequalities and fixed-order controllers
(2011)In this paper, influence of tire damping on multi-objective control of quarter-car suspensions excited by random road disturbances is studied. The active suspension design problem is first formulated as a mixed H 2/? ... -
Active suspension design for an idealized truck cabin
(Institute of Electrical and Electronics Engineers Inc., 2014)In this paper, a prototype three-degree-of-freedom cabin model for a commercial truck is derived to study ride motions of the cabin under random road excitations. An active suspension system is designed using the ... -
An Adaptive Algorithm for Detection of Multiple-Type, Positively Stained Nuclei in IHC images with minimal Prior Information: Application to OLIG2 Staining Gliomas
(Spie-Int Soc Optical Engineering, 2015)We propose a method to detect and segment the oligodendrocytes and gliomas in OLIG2 immunoperoxidase stained tissue sections. Segmentation of cell nuclei is essential for automatic, fast, accurate and consistent analysis ... -
Algorithms and software for approximating and evaluating fir filters
(Institute of Electrical and Electronics Engineers Inc., 2014)The controllers designed for time-delays systems often involve finite impulse response (FIR) filters, in particular prediction based controllers for systems with input/output delays. We present algorithms and software to ... -
An application of topological median filters on detection and clustering of microcalcifications in digital mammograms
(2006)Existence of microcalcification clusters on mammograms is one of the earliest signs of breast cancers. In this study, a method that is based on topological median filters is proposed for the automated detection of ... -
Automated detection of cells from immunohistochemically-stained tissues: Application to Ki-67 nuclei staining
(Spie-Int Soc Optical Engineering, 2012)An automated cell nuclei detection algorithm is described to be used for the quantification of immunohistochemically-stained tissues. Detection and segmentation of positively stained cells and their separation from the ... -
Autopilot Project with Unmanned Robot
(Elsevier Science BV, 2012)Mobile robot is an important figure during the search and rescue application after the natural diseases such as earthquakes, fire, flooding. In the disaster areas, searching the sign of living bodies or investigating the ... -
Biobjective scheduling algorithms for execution time-reliability trade-off in heterogeneous computing systems
(Oxford University Press, 2005)A heterogeneous computing (HC) system is composed of a suite of geographically distributed high-performance machines interconnected by a high-speed network, thereby providing high-speed execution of computationally intensive ... -
Blind Rectification of Radial Distortion by Line Straightness
(IEEE, 2016)Lens distortion self-calibration estimates the distortion model using arbitrary images captured by a camera. The estimated model is then used to rectify images taken with the same camera. These methods generally use the ... -
BUG Algorithm Analysis using Petri net
(IEEE, 2013)In this study, BUG 1 navigation algorithm which is a simple motion planner, is modelled by the Petri net (PN) for a mobile robot (MR). We prefer this PN model to obtain the discrete data for this algorithm. PN is used as ... -
Central and projection algorithms in identification with periodic set membership inputs
(IEEE, 2004)In this paper, we study the central and the projection algorithms in set membership identification with periodic input signals for the case that the number of the estimated parameters equals the input period. First, we ... -
Central and projection algorithms in set membership identification with periodic inputs
(2004)In this paper, we study the central and the projection algorithms in set membership identification with periodic input signals for the case that the number of the estimated parameters equals the input period. First, we ... -
Centralized and Decentralized Robust Servomechanism Problems for Time-delay Systems
(IEEE, 2017)Centralized and decentralized robust servomechanism problems for time-delay systems are considered. Sufficient and necessary conditions for the solvability of these problems are presented. The conditions for the two problems ... -
A combined direct and indirect adaptive control scheme for a wheeled mobile robot using multiple models
(Springer Verlag, 2014)This chapter presents a method about trajectory tracking control of a nonholonomic wheeled mobile robot. The main focus of the chapter is to improve the transient response for the trajectory tracking control of mobile ... -
Combining Feature-based and Model-based Approaches For Robust Ellipse Detection
(IEEE, 2016)Fast and robust ellipse detection is a vital step in many image processing and computer vision applications. Two main approaches exist for ellipse detection, i.e., model-based and feature-based. Model-based methods require ... -
Compact hardware architecture for Hummingbird cryptographic algorithm
(2011)Hummingbird is an ultra-lightweight cryptographic algorithm aiming at resource-constrained devices. In this paper, we present an enhanced hardware implementation of the Hummingbird cryptographic algorithm that is based on ... -
Compact implementation of threefish and Skein on FPGA
(2012)The SHA-3 finalist Skein is built from the tweak able Threefish block cipher. In order to have a better understanding of the computational efficiency of Skein (resource sharing, memory access scheme, scheduling, etc.), we ... -
Comparing PI controllers for delay models of TCP/AQM networks
(IFAC Secretariat, 2010)In this paper, ns-2 simulations and related comparisons of four different PI controllers designed for TCP/AQM networks will be presented. The simulations are performed for various scenarios