Search alternatives:
equalization » visualization (Expand Search)
Showing 9,161 - 9,180 results of 10,657 for search 'equalization methods', query time: 0.20s Refine Results
  1. 9161

    A Modified ETM Shaper for Double Pendulum Crane Control with Payload hoisting by Trong Hieu Do, Minh Duc Nguyen, Minh Duc Duong

    Published 2025-01-01
    “…Simulations and experiments were performed to confirm the validity of the proposed method.…”
    Get full text
    Article
  2. 9162

    Instant-SFH: Non-Iterative Sparse Fourier Holograms Using Perlin Noise by David Li, Susmija Jabbireddy, Yang Zhang, Christopher Metzler, Amitabh Varshney

    Published 2024-11-01
    “…Compared to the Gaussian-weighted Gerchberg–Saxton method, our method achieves a run time improvement of over 600 times while producing a nearly equal PSNR and SSIM quality. …”
    Get full text
    Article
  3. 9163

    STUDYING OF DUAL DEEP PERIOCULAR PARTS FOR PERSONS RECOGNITION by Safa N. H. Al-Moktar, Raid Al-Nima

    Published 2023-10-01
    “…In this study, a new method is proposed for recognizing persons based on their perioculars. …”
    Get full text
    Article
  4. 9164

    OPTIMALITY IN AGRICULTURE: GENERATING OPTIMAL STRUCTURE OF CULTURES WITHIN A FARM USING GENETIC ALGORITHMS by Victor TIȚA, Doru Anastasiu POPESCU, Nicolae BOLD

    Published 2017-01-01
    “…The length of the chromosome is equal to the number of cultures desired to be cultivated. …”
    Get full text
    Article
  5. 9165

    Task domain independent speech keyword detection system by HAN Jiang, LIU Xiao-xing, YAN Yong-hong, ZHANG Peng-yuan

    Published 2006-01-01
    “…A multiple scale acoustic modeling framework for task-domain independent keyword spotting was proposed.A large-scale phoneme set was obtained automatically through decision-tree based phoneme clustering,and a large-scale phoneme acoustic context dependent background model was trained accordingly through using standard HMM training framework.The modeling accuracy for filler speech is improved.Under the framework,an efficient searching space construction through using shared HMM state was also described.Experimental results showed that in average absolute 6.9% improvement of keyword recognition accuracy could be obtained.Furthermore an acoustic context neighbor algorithm to measure acoustic confidence and a method of computing candidate keyword likelihood based on proposed multiple-scale acoustic model were proposed and a fusing method based on FLDA was adopted.The effectiveness of acoustic confidence measure is improved significantly.Experimental results showed that absolute 3.0% reduction of equal error rate could be obtained.…”
    Get full text
    Article
  6. 9166

    Type Synthesis of 3R2T Hybrid Robot Mechanisms based on Serial-opened-chain Unit by Chen Hai, Qin Youlei, Cao Yi

    Published 2015-01-01
    “…By analyzing the characteristics of structures for the lower- mobility serial robot mechanism and parallel robot mechanism,a systematic and effective type synthesis including the definition and symbol denotation method of both hybrid robot with a parallel mechanism and multi- parallel mechanisms method is proposed for hybrid robot mechanisms based on the principle of movement spiral linear independence and units of the lower- mobility serial mechanism with single- opened- chain limb. …”
    Get full text
    Article
  7. 9167

    Effectiveness of Price Limit on Stock Market Network: A Time-Migrated DCCA Approach by Hongzeng He, Shufen Dai

    Published 2021-01-01
    “…The results indicate that the time-migrated DCCA ensures more relevant results than the equal-time DCCA method. An interesting finding is that the price limit has different effects on the stock market network at different stages of dynamic evolution. …”
    Get full text
    Article
  8. 9168

    Targeting mediating mechanisms of social disparities with an interventional effects framework, applied to the gender pay gap in Western Germany by Didden Christiane

    Published 2025-02-01
    “…The Oaxaca-Blinder (OB) decomposition is a widely used method to explain social disparities. However, assigning causal meaning to its estimated components requires strong assumptions that often lack explicit justification. …”
    Get full text
    Article
  9. 9169

    Antimicrobial Effectiveness of Endodontic Irrigants Against E. Faecalis: An In vitro Study by Ajay Chhabra, B. Saravana Prathap, KP Ramya, Priyanka Yadav, Himani Mehra, Sona J. Parvathy, Gayatree Nayak

    Published 2024-12-01
    “…Aim: This in vitro study compared the antimicrobial efficacy of 5.25% sodium hypochlorite, 10% citric acid, and 3% hydrogen peroxide against Enterococcus faecalis (E. faecalis), using normal saline as a control. Method: E. faecalis isolates were exposed to different irrigants, with bacterial colony counts measured at various intervals using the spread plate method. …”
    Get full text
    Article
  10. 9170

    Heartbeat Biometrics for Remote Authentication Using Sensor Embedded Computing Devices by Md Saiful Islam

    Published 2015-06-01
    “…The biometric verification method was tested with ECG records of 100 individuals and 1.34% of equal error rate (EER) was obtained. …”
    Get full text
    Article
  11. 9171

    Gold and Apes. Des usages du scepticisme dans la philosophie de Robert Boyle by Jean-Pierre Grima-Morales

    Published 2014-10-01
    “…Boyle suggested that another methodical approach was necessary, a method he described in later books as based on rich experimental data and wary of the obsolete Aristotelian or Paracelsian theories. …”
    Get full text
    Article
  12. 9172

    Calculation of Mobility on Combined Mechanisms Based on the Modified G-K's Formula by Xu Zhaotang

    Published 2023-05-01
    “…The mobility of combined mechanism is equal to the sum of the mobility of each basic mechanism.…”
    Get full text
    Article
  13. 9173

    Secondary throughput maximization scheme for non-linear energy harvesting cognitive radio networks by Haijiang GE, Ning JIA, Kaikai CHI, Yunzhi CHEN

    Published 2023-02-01
    “…Aiming at a cognitive radio network (CRN) consisting of a pair of primary users and M pairs of secondary users, the secondary throughput maximization for CRN based on the non-linear energy harvesting model was studied.Specifically, in the case of considering secondary transmitter (ST) circuit power, the secondary throughput maximization (STM) problem with primary users’ throughput demands was first modeled as a non-linear optimization problem and then transformed into a convex optimization problem.Finally, a low-complexity algorithm combining the golden section and dichotomy was proposed.By applying this low-complexity algorithm, the optimal time allocation of the primary transmitter (PT)’s energy transmission and secondary users’ information transmission, and the optimal transmission power of PT were obtained.In addition, for the case of neglecting the ST circuit power, the convex property of the STM problem was first proved, and then a more efficient algorithm was designed to solve it.The simulation results show that compared with the equal time allocation method and the link gain priority method, the proposed design algorithm significantly improves the throughput of secondary users.…”
    Get full text
    Article
  14. 9174

    The diversity of income effects on mortality across regions in People’s Republic of China: Instrumental variable approach by Artur R. Nagapetyan, Tatiana I. Pavlova, Jun Li

    Published 2024-12-01
    “…The issue of equality of opportunity is crucial in contemporary society, often examined in relation to income. …”
    Get full text
    Article
  15. 9175

    The Big Improvement in PISA 2009 Reading Achievements in Serbia: Improvement of the Quality of Education or Something Else? by Dragica Pavlović Babić, Aleksandar Baucal

    Published 2018-01-01
    “…The analysis shows that the largest part of the improvement was realised at lower achieving levels, suggesting that the dominant method of teaching in schools is a traditional method oriented towards the acquisition and reproduction of academic knowledge. …”
    Get full text
    Article
  16. 9176

    Skyline-Based Aggregator Node Selection in Wireless Sensor Networks by Aziz Nasridinov, Sun-Young Ihm, Young-Ho Park

    Published 2013-09-01
    “…In order to achieve the equal usage of limited resources in the wireless sensor networks (WSNs), we must aggregate the sensor data before passing it to the base station. …”
    Get full text
    Article
  17. 9177

    Adaptive Gaussian back-end based on LDOF criterion for language recognition by Zhong-fu YE, Ting QI, Sai-feng LI, Yan SONG

    Published 2017-04-01
    “…In order to alleviate the mismatch in model between training and testing samples caused by inter-language variations,adaptive Gaussian back-end based on LDOF criterion was proposed for language recognition.The local distance-based outlier factor (LDOF) criterion was defined to find the appropriate model parameters and dynamically select the training data subset similar to the testing samples from multiple class training sets.Then original back-end was adjusted to obtain a more matched recognition model.Experimental results on NIST LRE 2009 easily-confused language data set show that proposed method achieves an obvious performance improvement on both the equal error rate (ERR) and average decision cost function.…”
    Get full text
    Article
  18. 9178

    DC MOTOR DISCRETE CONTROL TECHNIQUE by Andrey Razmikovich Aydinyan, Olga Leonidovna Tsvetkova, Alexander Alexeyevich Molchanov

    Published 2014-09-01
    “…The technique of the discrete control of a continuous object is considered by the example of a DC motor. The proposed method can simplify the procedure of selecting the desired properties of the synthesized control system, and reduce the control identification to a standard problem on the linear equation system solution with regard to the inequality constraints at each sample spacing. …”
    Get full text
    Article
  19. 9179

    The Scientific Movement of State Islamic University of Imam Bonjol Padang by Eka Putra Wirman

    Published 2019-07-01
    “…Hence, a qualitative method is used to gather data by using documentation and interview. …”
    Get full text
    Article
  20. 9180

    Optimal combined distinguisher of stream cipher with multiple independent distinguishing characters by Hai-ying GAO, Chen-hui JIN

    Published 2012-07-01
    “…It is an open problem to combine many distinguishing characters to construct a distinguisher with more advantage.An optimal combined distinguisher based on multiple independent distinguishing characters was proposed.The computing method of distinguishing advantage of this combined distinguisher was presented and the conclusion was given that the data complexity decreased on the condition of same distinguishing advantage,and the distinguishing advantage increased on the condition of the same data complexity when more distinguishing characters were used in distinguishing attack.Let N denote the data complexity of distinguisher with only one character,then the data complexity of combined distinguisher with k-independent characters was about N/k for special case that all distinguishing advantages of k-independent characters were equal.…”
    Get full text
    Article