Ara
Toplam kayıt 63, listelenen: 1-10
Feature extraction in shape recognition using segmentation of the boundary curve
(Elsevier Science BV, 1997-10)
We present a new method for feature extraction of two-dimensional shape information based on segmentation of the boundary curve. This approach partitions closed shapes into segments and finds their angular spans. The number ...
Parallel univariate decision trees
(Elsevier B.V., 2007-05-01)
Univariate decision tree algorithms are widely used in data mining because (i) they are easy to learn (ii) when trained they can be expressed in rule based manner. In several applications mainly including data mining, the ...
H.264 vi?deo kodlamada B-çerçeveler i?çi?n kodçözücü tarafında aday devi?ni?m vektör seçi?mi?
(IEEE, 2012-04-18)
H.264 standardında devinim vektör farklarının kodlanması sebebiyle özellikle düşük bit hızlarında nesne sınırlarında devinimdeki ani değişiklikler harcanan bit miktarlarını artırmaktadır. Bu bildiride B-çerçevelerde kod ...
Gerçel ve karmaşık süzgeç öbeklerinin eşdalgacıklı tasarımı
(IEEE, 2006-07-31)
Bu bildiride, eşdalgacıklı tam geri çatma süzgeç öbekleri tasarlamak için, Parks-McClellan algoritması gibi tekniklerle üretilen enküçük-enbüyük optimal eşdalgacıklı kısıtsız süzgeçleri eşlemlemede kullanılan basit bir ...
A priority based packet scheduler with deadline considerations
(IEEE Computer Soc, 2006)
QoS issues have become a focal point of research on Next Generation Networks (NGNs). In order to supply the various QoS requirement for different kinds of applications, new scheduling policies need to be developed and ...
Immitance data modelling via linear interpolation techniques: a classical circuit theory approach
(Wiley-Blackwell, 2004-11)
With the advancement of the manufacturing technologies to produce new generation analog/digital communication systems, immitance data modelling has gained renewed importance in the literature. Specifically, models are ...
On the equilibrium of a rigid body suspended by a set of linear springs
(John Wiley & Sons, 2000-08)
In this paper an approach is described for determining equilibrium states of a rigid body suspended elastically in space by a set of linear springs. This system is considered as a two-terminal generalized spring with ...
Minimally redundant 2-D array designs for 3-D medical ultrasound imaging
(IEEE-Inst Electrical Electronics Engineers Inc, 2009-07)
In real-time ultrasonic 3-D imaging, in addition to difficulties in fabricating and interconnecting 2-D transducer arrays with hundreds of elements, there are also challenges in acquiring and processing data from a large ...
Algebraic break of image ciphers based on discretized chaotic map lattices
(Elsevier Science Inc, 2011-01-01)
In this paper, we provide an algebraic cryptanalysis of a recently proposed chaotic image cipher. We show that the secret parameters of the algorithm can be revealed using chosen-plaintext attacks. Our attack uses the orbit ...
A robust biclustering method based on crossing minimization in bipartite graphs
(Springer-Verlag Berlin, 2009)
[No abstract available]