Ara
Toplam kayıt 15, listelenen: 1-10
GRID matching in Monte Carlo Bayesian compressive sensing
(2013)
Sparse signal reconstruction from compressive measurements assumes a grid of possible support points from which to estimate the signal support set. However, reconstruction of high measurement resolution waveforms is very ...
Design of a Scenario-Based Synthetic Mixed Pulse Generator
(IEEE, 2013)
Electronic Support Measures (ESM) plays an important role in modern Electronic Warfare (EW) systems. The main purpose of an ESM system is to intercept as many emissions as it can, and then to deinterleave mixed streams of ...
Central and projection algorithms in set membership identification with periodic inputs
(2004)
In this paper, we study the central and the projection algorithms in set membership identification with periodic input signals for the case that the number of the estimated parameters equals the input period. First, we ...
On extremal binary doubly-even self-dual codes of length 88
(IEEE, 2008)
In this note 35 new extremal binary self-dual doubly-even codes of length 88 axe presented. Their inequivalence is established by invariants. Moreover, a construction of a binary self-dual [88,44,16] code, having an ...
Effect of distance metrics on positioning accuracy [Uzaklik metriklerinin konumlama başarimina etkisi]
(Institute of Electrical and Electronics Engineers Inc., 2018)
RF fingerprinting based positioning systems have come to the forefront among indoor positioning systems as they provide both high precision and can use existing infrastructure like Wi-Fi access points effectively. In this ...
Grid Matching in Monte Carlo Bayesian Compressive Sensing
(IEEE, 2013)
Sparse signal reconstruction from compressive measurements assumes a grid of possible support points from which to estimate the signal support set. However, reconstruction of high measurement resolution waveforms is very ...
Compact hardware architecture for Hummingbird cryptographic algorithm
(2011)
Hummingbird is an ultra-lightweight cryptographic algorithm aiming at resource-constrained devices. In this paper, we present an enhanced hardware implementation of the Hummingbird cryptographic algorithm that is based on ...
Real-time detection and mitigation of distributed denial of service (DDoS) attacks in software defined networking (SDN)
(Institute of Electrical and Electronics Engineers Inc., 2018)
The emergence of Software Defined Network (SDN) and its promises in networking technology has gotten every stakeholder excited. However, it is believed that every technological development comes with its own challenges of ...
Improving the Efficiency of Predictive Coders Via Adaptive Multiple Predictor Cooperation
(IEEE, 2013)
Due to the popularity of the prediction concept in time series analysis, predictive coding has been an attractive approach, particularly in lossless image compression. Utilization of prediction in time series not only makes ...
Central and projection algorithms in identification with periodic set membership inputs
(IEEE, 2004)
In this paper, we study the central and the projection algorithms in set membership identification with periodic input signals for the case that the number of the estimated parameters equals the input period. First, we ...