نتایج جستجو برای: الگوی dsr

تعداد نتایج: 46453  

Journal: :IEEE Access 2021

This paper proposes a robust digital signal recovery (DSR) technique to tackle the high signal-to-noise ratio (SNR) variation and transmitter memory effects for broadband power efficient down-link in next-generation low Earth orbit (LEO) satellite constellations. The robustness against SNR is achieved by concurrently integrating magnitude normalization noise feature filtering using block built ...

2012
Yufei Cheng Egemen K. Çetinkaya James P. G. Sterbenz

Routing protocols are essential to the performance of wireless networks especially in mobile ad-hoc scenarios. The development of new routing protocols requires comparing them against well-known protocols in various simulation environments. In this paper, we present an overview of the well-known MANET routing protocols and the implementation details of the DSR routing protocol in the ns-3 netwo...

2015
Abayomi Baiyere Alan R. Hevner Shirley Gregor Matti Rossi

With the rising interest in Design Science Research (DSR), it has become crucial to understand what the acceptable components of a DSR paper are, in order to get published. Central to this is the ongoing debate on what constitutes an acceptable contribution in DSR the artifact, the design theory or both? Two camps have emerged in this debate, and this panel is setup to engage thought leaders fr...

2004
Rajiv Misra

On-demand routing protocols for Mobile Ad-hoc networks registers unexpected performance behavior when multiple data streams are sent to common destination. This scenario is common when MANET is connected to Internet through common gateways or used in similar cases. The AODV outperform DSR in the normal situation but in the constrained situation DSR out-performs AODV, the degradation is as sever...

2003
Angel Ballesteros Francisco J. Herranz

A ‘mass-like’ quantum Weyl–Poincaré algebra is proposed to describe, after the identification of the deformation parameter with the Planck length, a new relativistic theory with two observer-independent scales (or DSR theory). Deformed momentum representation, finite boost transformations, range of rapidity, energy and momentum, as well as position and velocity operators are explicitly studied ...

Journal: :Lecture Notes in Computer Science 2023

AbstractDespite achieving remarkable progress in recent years, single-image super-resolution methods are developed with several limitations. Specifically, they trained on fixed content domains certain degradations (whether synthetic or real). The priors learn prone to overfitting the training configuration. Therefore, generalization novel such as drone top view data, and across altitudes, is cu...

Journal: :Human reproduction 2012
A Indekeu T D'Hooghe P De Sutter K Demyttenaere D Vanderschueren B Vanderschot M Welkenhuysen P Rober H Colpin

BACKGROUND As pregnancy and childbirth have long been considered women's issues and male infertility has long been surrounded by taboo, limited research has focused on the experience of infertile men. The purpose of this study was to compare male motives for parenthood, male well-being and disclosure patterns concerning the method of conception among men from couples starting treatment with IUI...

2003
Satoru Tsuge Shingo Kuroiwa Kenji Kita

In October 2002, European Telecommunications Standards Institute (ETSI) recommended a standard Distributed Speech Recognition (DSR) advanced front-end, ETSI ES202 050 version 1.1.1 (ES202). Many studies use this front-end in noise environments on several languages on connected digit recognition tasks. However, we have not seen the reports of large vocabulary continuous speech recognition using ...

2015
Fei Teng Marko Aunedi Danny Pudjianto Goran Strbac

The demand for ancillary service is expected to increase significantly in the future Great Britain (GB) electricity system due to high penetration of wind. In particular, the need for frequency response, required to deal with sudden frequency drops following a loss of generator, will increase because of the limited inertia capability of wind plants. This paper quantifies the requirements for pr...

2008
Sandeep Bhatkar R. Sekar

Over the past several years, US-CERT advisories, as well as most critical updates from software vendors, have been due to memory corruption vulnerabilities such as buffer overflows, heap overflows, etc. Several techniques have been developed to defend against the exploitation of these vulnerabilities, with the most promising defenses being based on randomization. Two randomization techniques ha...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید