نتایج جستجو برای: where identification
تعداد نتایج: 1179551 فیلتر نتایج به سال:
This paper presents a new variable step-size normalized subband adaptive filter (VSS-NSAF) algorithm. The proposed algorithm uses the prior knowledge of the system impulse response statistics and the optimal step-size vector is obtained by minimizing the mean-square deviation(MSD). In comparison with NSAF, the VSS-NSAF algorithm has faster convergence speed and lower MSD. To reduce the computa...
The Phomopsis is a genus of imperfect plant pathogenic fungus whose hosts comprise several species in different regions of the world, such as grapes, soybean, acacia, hollyhock, velvetleaf, and several other plants. In this study, samples collected from hollyhock, velvetleaf, purple bauhinia, and acacia plants suspected to be infected with Phomopsis fungi. Samples were culture...
time-delay identification is one of the most important parameters in designing controllers. in the cases where the number of inputs and outputs in a system are more than one, this identification is of great concern. in this paper, a novel autocorrelation-based scheme for the state variable time-delay identification for multi-input multi-output (mimo) system has been presented. this method is ba...
At present a handful of comparisons have been made of different variants of worked examples and tutored problem solving. There is some evidence to report a benefit of adding worked examples (WE) to current tutored problem solving (TPS) environments. Our research investigated how a “pure” WE condition could compete with a TPS condition. By pure we mean the WE condition does not include tutoring,...
Outer joins are extended relational algebra operations intended to deal with unknown information represented with null values. This work shows an approach to embed both null values and outer join operations in the deductive database system DES (Datalog Educational System), which uses Datalog as a query language. This system also supports SQL, where views and queries are compiled to Datalog prog...
An attack on the implementation of control vectors in the IBM Common Cryptographic Architecture is presented. The final key−part holder in a multiple part import introduces two key−encrypting keys (KEKs), one the intended key and one with a chosen difference from the former, by including this difference in his own key part. When this difference is set to the difference between two control vecto...
Neuroscience has recently contributed a lot to the understanding of aesthetic experience features. Science, art and creativity are not really distinctively different entities. The parallelism seen between the properties of art and organizational principals of the brain has been highlighted through neuroaesthetic studies. Aesthetic as a subjective experience has comprehensively been studies thro...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید