Suggested Topics within your search.
Suggested Topics within your search.
-
9161
A Modified ETM Shaper for Double Pendulum Crane Control with Payload hoisting
Published 2025-01-01“…Simulations and experiments were performed to confirm the validity of the proposed method.…”
Get full text
Article -
9162
Instant-SFH: Non-Iterative Sparse Fourier Holograms Using Perlin Noise
Published 2024-11-01“…Compared to the Gaussian-weighted Gerchberg–Saxton method, our method achieves a run time improvement of over 600 times while producing a nearly equal PSNR and SSIM quality. …”
Get full text
Article -
9163
STUDYING OF DUAL DEEP PERIOCULAR PARTS FOR PERSONS RECOGNITION
Published 2023-10-01“…In this study, a new method is proposed for recognizing persons based on their perioculars. …”
Get full text
Article -
9164
OPTIMALITY IN AGRICULTURE: GENERATING OPTIMAL STRUCTURE OF CULTURES WITHIN A FARM USING GENETIC ALGORITHMS
Published 2017-01-01“…The length of the chromosome is equal to the number of cultures desired to be cultivated. …”
Get full text
Article -
9165
Task domain independent speech keyword detection system
Published 2006-01-01“…A multiple scale acoustic modeling framework for task-domain independent keyword spotting was proposed.A large-scale phoneme set was obtained automatically through decision-tree based phoneme clustering,and a large-scale phoneme acoustic context dependent background model was trained accordingly through using standard HMM training framework.The modeling accuracy for filler speech is improved.Under the framework,an efficient searching space construction through using shared HMM state was also described.Experimental results showed that in average absolute 6.9% improvement of keyword recognition accuracy could be obtained.Furthermore an acoustic context neighbor algorithm to measure acoustic confidence and a method of computing candidate keyword likelihood based on proposed multiple-scale acoustic model were proposed and a fusing method based on FLDA was adopted.The effectiveness of acoustic confidence measure is improved significantly.Experimental results showed that absolute 3.0% reduction of equal error rate could be obtained.…”
Get full text
Article -
9166
Type Synthesis of 3R2T Hybrid Robot Mechanisms based on Serial-opened-chain Unit
Published 2015-01-01“…By analyzing the characteristics of structures for the lower- mobility serial robot mechanism and parallel robot mechanism,a systematic and effective type synthesis including the definition and symbol denotation method of both hybrid robot with a parallel mechanism and multi- parallel mechanisms method is proposed for hybrid robot mechanisms based on the principle of movement spiral linear independence and units of the lower- mobility serial mechanism with single- opened- chain limb. …”
Get full text
Article -
9167
Effectiveness of Price Limit on Stock Market Network: A Time-Migrated DCCA Approach
Published 2021-01-01“…The results indicate that the time-migrated DCCA ensures more relevant results than the equal-time DCCA method. An interesting finding is that the price limit has different effects on the stock market network at different stages of dynamic evolution. …”
Get full text
Article -
9168
Targeting mediating mechanisms of social disparities with an interventional effects framework, applied to the gender pay gap in Western Germany
Published 2025-02-01“…The Oaxaca-Blinder (OB) decomposition is a widely used method to explain social disparities. However, assigning causal meaning to its estimated components requires strong assumptions that often lack explicit justification. …”
Get full text
Article -
9169
Antimicrobial Effectiveness of Endodontic Irrigants Against E. Faecalis: An In vitro Study
Published 2024-12-01“…Aim: This in vitro study compared the antimicrobial efficacy of 5.25% sodium hypochlorite, 10% citric acid, and 3% hydrogen peroxide against Enterococcus faecalis (E. faecalis), using normal saline as a control. Method: E. faecalis isolates were exposed to different irrigants, with bacterial colony counts measured at various intervals using the spread plate method. …”
Get full text
Article -
9170
Heartbeat Biometrics for Remote Authentication Using Sensor Embedded Computing Devices
Published 2015-06-01“…The biometric verification method was tested with ECG records of 100 individuals and 1.34% of equal error rate (EER) was obtained. …”
Get full text
Article -
9171
Gold and Apes. Des usages du scepticisme dans la philosophie de Robert Boyle
Published 2014-10-01“…Boyle suggested that another methodical approach was necessary, a method he described in later books as based on rich experimental data and wary of the obsolete Aristotelian or Paracelsian theories. …”
Get full text
Article -
9172
Calculation of Mobility on Combined Mechanisms Based on the Modified G-K's Formula
Published 2023-05-01“…The mobility of combined mechanism is equal to the sum of the mobility of each basic mechanism.…”
Get full text
Article -
9173
Secondary throughput maximization scheme for non-linear energy harvesting cognitive radio networks
Published 2023-02-01“…Aiming at a cognitive radio network (CRN) consisting of a pair of primary users and M pairs of secondary users, the secondary throughput maximization for CRN based on the non-linear energy harvesting model was studied.Specifically, in the case of considering secondary transmitter (ST) circuit power, the secondary throughput maximization (STM) problem with primary users’ throughput demands was first modeled as a non-linear optimization problem and then transformed into a convex optimization problem.Finally, a low-complexity algorithm combining the golden section and dichotomy was proposed.By applying this low-complexity algorithm, the optimal time allocation of the primary transmitter (PT)’s energy transmission and secondary users’ information transmission, and the optimal transmission power of PT were obtained.In addition, for the case of neglecting the ST circuit power, the convex property of the STM problem was first proved, and then a more efficient algorithm was designed to solve it.The simulation results show that compared with the equal time allocation method and the link gain priority method, the proposed design algorithm significantly improves the throughput of secondary users.…”
Get full text
Article -
9174
The diversity of income effects on mortality across regions in People’s Republic of China: Instrumental variable approach
Published 2024-12-01“…The issue of equality of opportunity is crucial in contemporary society, often examined in relation to income. …”
Get full text
Article -
9175
The Big Improvement in PISA 2009 Reading Achievements in Serbia: Improvement of the Quality of Education or Something Else?
Published 2018-01-01“…The analysis shows that the largest part of the improvement was realised at lower achieving levels, suggesting that the dominant method of teaching in schools is a traditional method oriented towards the acquisition and reproduction of academic knowledge. …”
Get full text
Article -
9176
Skyline-Based Aggregator Node Selection in Wireless Sensor Networks
Published 2013-09-01“…In order to achieve the equal usage of limited resources in the wireless sensor networks (WSNs), we must aggregate the sensor data before passing it to the base station. …”
Get full text
Article -
9177
Adaptive Gaussian back-end based on LDOF criterion for language recognition
Published 2017-04-01“…In order to alleviate the mismatch in model between training and testing samples caused by inter-language variations,adaptive Gaussian back-end based on LDOF criterion was proposed for language recognition.The local distance-based outlier factor (LDOF) criterion was defined to find the appropriate model parameters and dynamically select the training data subset similar to the testing samples from multiple class training sets.Then original back-end was adjusted to obtain a more matched recognition model.Experimental results on NIST LRE 2009 easily-confused language data set show that proposed method achieves an obvious performance improvement on both the equal error rate (ERR) and average decision cost function.…”
Get full text
Article -
9178
DC MOTOR DISCRETE CONTROL TECHNIQUE
Published 2014-09-01“…The technique of the discrete control of a continuous object is considered by the example of a DC motor. The proposed method can simplify the procedure of selecting the desired properties of the synthesized control system, and reduce the control identification to a standard problem on the linear equation system solution with regard to the inequality constraints at each sample spacing. …”
Get full text
Article -
9179
The Scientific Movement of State Islamic University of Imam Bonjol Padang
Published 2019-07-01“…Hence, a qualitative method is used to gather data by using documentation and interview. …”
Get full text
Article -
9180
Optimal combined distinguisher of stream cipher with multiple independent distinguishing characters
Published 2012-07-01“…It is an open problem to combine many distinguishing characters to construct a distinguisher with more advantage.An optimal combined distinguisher based on multiple independent distinguishing characters was proposed.The computing method of distinguishing advantage of this combined distinguisher was presented and the conclusion was given that the data complexity decreased on the condition of same distinguishing advantage,and the distinguishing advantage increased on the condition of the same data complexity when more distinguishing characters were used in distinguishing attack.Let N denote the data complexity of distinguisher with only one character,then the data complexity of combined distinguisher with k-independent characters was about N/k for special case that all distinguishing advantages of k-independent characters were equal.…”
Get full text
Article