Sciweavers

2642 search results - page 112 / 529
» The development of Chez Scheme
Sort
View
IJCSA
2007
213views more  IJCSA 2007»
13 years 10 months ago
Adaptive Depth Control for Autonomous Underwater Vehicles Based on Feedforward Neural Networks
This paper studies the design and application of the neural network based adaptive control scheme for autonomous underwater vehicle's (AUV's) depth control system that i...
Yang Shi, Weiqi Qian, Weisheng Yan, Jun Li
IJNSEC
2007
161views more  IJNSEC 2007»
13 years 10 months ago
Data Hiding: Current Status and Key Issues
Image steganography is a covert communication method that uses an image as the cover to hide the truth from potential attackers that some secret message hidden in the image is bei...
Nan-I Wu, Min-Shiang Hwang
TSP
2008
101views more  TSP 2008»
13 years 10 months ago
Reduced-Complexity Soft MIMO Detection Based on Causal and Noncausal Decision Feedback
We present a reduced-complexity soft detection (RCSD) scheme geared to multiple-input multiple-output (MIMO) systems with spatial domain multiplexing leading to layered space-time ...
Yong Li, Jaekyun Moon
TSP
2008
103views more  TSP 2008»
13 years 10 months ago
Distributed Adaptive Quantization for Wireless Sensor Networks: From Delta Modulation to Maximum Likelihood
Abstract-- We consider distributed parameter estimation using quantized observations in wireless sensor networks where due to bandwidth constraint, each sensor quantizes its local ...
Jun Fang, Hongbin Li
TWC
2008
156views more  TWC 2008»
13 years 10 months ago
Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks
Event boundary detection is in and of itself a useful application in wireless sensor networks (WSNs). Typically, it includes the detection of a large-scale spatial phenomenon such ...
Kui Ren, Kai Zeng, Wenjing Lou