Sciweavers

12264 search results - page 2229 / 2453
» Analysis of the rubberband algorithm
Sort
View
CORR
2007
Springer
95views Education» more  CORR 2007»
15 years 4 months ago
A Note on the Periodicity and the Output Rate of Bit Search Type Generators
We investigate the bit-search type irregular decimation algorithms that are used within LFSR-based stream ciphers. In particular, we concentrate on BSG and ABSG, and consider two ...
Yucel Altug, N. Polat Ayerden, Mehmet Kivanç...
CORR
2007
Springer
148views Education» more  CORR 2007»
15 years 4 months ago
Optimal Power Allocation for Distributed Detection over MIMO Channels in Wireless Sensor Networks
—In distributed detection systems with wireless sensor networks, the communication between sensors and a fusion center is not perfect due to interference and limited transmitter ...
Xin Zhang, H. Vincent Poor, Mung Chiang
JCIT
2008
124views more  JCIT 2008»
15 years 4 months ago
A Knowledge based Approach Using Fuzzy Inference Rules for Vowel Recognition
Automatic speech recognition by machine is one of the most efficient methods for man-machine communications. Because speech waveform is nonlinear and variant. Speech recognition r...
Hrudaya K. Tripathy, B. K. Tripathy, Pradip K. Das
132
Voted
JCIT
2008
172views more  JCIT 2008»
15 years 4 months ago
Rough Wavelet Hybrid Image Classification Scheme
This paper introduces a new computer-aided classification system for detection of prostate cancer in Transrectal Ultrasound images (TRUS). To increase the efficiency of the comput...
Hala S. Own, Aboul Ella Hassanien
CORR
2007
Springer
134views Education» more  CORR 2007»
15 years 4 months ago
Web data modeling for integration in data warehouses
In a data warehousing process, the data preparation phase is crucial. Mastering this phase allows substantial gains in terms of time and performance when performing a multidimensio...
Sami Miniaoui, Jérôme Darmont, Omar B...
« Prev « First page 2229 / 2453 Last » Next »