Sciweavers

5128 search results - page 919 / 1026
» Discrete Component Analysis
Sort
View
ITIIS
2008
128views more  ITIIS 2008»
13 years 10 months ago
An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks
In spite of previous common assumptions about the incompatibility of public key cryptography (PKC) schemes with wireless sensor networks (WSNs), recent works have shown that they ...
Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong S...
IJON
2006
169views more  IJON 2006»
13 years 10 months ago
Denoising using local projective subspace methods
In this paper we present denoising algorithms for enhancing noisy signals based on Local ICA (LICA), Delayed AMUSE (dAMUSE) and Kernel PCA (KPCA). The algorithm LICA relies on app...
Peter Gruber, Kurt Stadlthanner, Matthias Böh...
IJON
2006
72views more  IJON 2006»
13 years 10 months ago
Extraction of a source signal whose kurtosis value lies in a specific range
In many applications extraction of source signals of interest from observed signals maybe is a more feasible approach than simultaneous separation of all the source signals, since...
Zhi-Lin Zhang, Zhang Yi
IJON
2006
71views more  IJON 2006»
13 years 10 months ago
A segmentation algorithm for zebra finch song at the note level
Songbirds have been widely used as a model for studying neuronal circuits that relate to vocal learning and production. An important component of this research relies on quantitat...
Ping Du, Todd W. Troyer
JCIT
2008
154views more  JCIT 2008»
13 years 10 months ago
A Multi-Agent Framework for Testing 3-Tier Distributed Systems Architecture
Lack of time and capital for software testing is an oft encountered problem in most organizations. The plethora of possible test cases for each software component makes software t...
Sunitha Ramanujam, Hany F. El Yamany, Miriam A. M....