... typical power consumption of one device is 7.5 watts (running on a clock rate of 400 MHz) On the macrolevel, a comparable approach to implement autonomous systemsbasedon a stick -on principle ... for autonomous computing REFERENCES CONCLUSIONS The autonomous computing vision is basedon the ability of technology-rich, autonomous, self-induced, and contextaware peers to operate as spontaneously ... Actuators respond to the control triggers resulting from the application into the mechanical means of the respective peer Communication among peer-its is basedon the concept of proximity detection and...
... IEEE TRANSACTIONS ON POWER DELIVERY, VOL 27, NO 3, JULY 2 012 is approximately constant and derivatives of assumption, currents will be proportional to the derivatives of power basedon (2) and (5) ... grid voltage conditions,” IEEE Trans Energy Convers., vol 26, no 1, pp 163 –175, Mar 2011 [5] L Fan, H Yin, and Z Miao, On active/reactive power modulation of DFIG -based wind generation for interarea ... Blaabjerg, “Multiresonant frequency-locked loop for grid synchronization of power converters under distorted grid conditions,” IEEE Trans Ind Electron., vol 58, no 1, pp 127 –138, Jan 2011 [11]...
... concentration levels Both, precision and accuracy were determined on the same day, basedon five measurements on five different samples at each concentration, and accuracy and precision ondifferent ... days basedon the analysis ondifferent days of five standard samples at each of the three levels of tested concentration The lowest limit of quantification was considered the lowest concentration ... domain and used for calibration curves For each calibration point we examined the distribution, the relative percentage deviation of recalculated concentration from calibration curve equation The...
... transmission systems, the accumulated dispersion in the optical pulse becomes of serious concern One solution is to use dispersion compensation fiber (DCF), which has negative dispersion parameter, ... Wavelength-Division-Multiplexing XPM Cross-Phase Modulation xxv LIST OF ABBREVIATIONS xxvi Chapter Introduction Fiber-optic communication systems are lightwave systems that employ optical fibers for information ... perform all-electronic chromatic dispersion (CD) and polarization-mode dispersion (PMD) compensation, frequency offset and phase noise mitigation, polarization de-multiplexing and so on [17–21] Therefore,...
... theoretical implications, Conclusions, recommendations and reflection (RQ) Conclusion, discussion and recommendations Figure 1.2: Report outline Overcoming Privacy Concerns in the Consumer Use of Insurance ... entire population, it can be concluded that respondents derive more disutility from external use of privacy related information than internal use Discussion and conclusion In conclusion, we can say ... Discussion and conclusion RQ Due to time constraints SQ4 will only be assessed for one mobile insurance service Overcoming Privacy Concerns in the Consumer Use of Insurance Services basedon Mobile...
... medical/epidemiological and economic contributions on long-run effects of early-life conditions, by analyzing the causal effect of economic conditions around birth on the individual rate of mortality ... indicators of nutrition, health care, sanitation, disease load exposure, housing conditions, and labor market conditions In general, the results for the long-run economic effects on cause-specific mortality ... examining fluctuations in birth rates and twinning rates, and by using additional survey data on the composition Long-run effects of economic conditions early in life may work through nutrition, disease...
... 825.5 124 .7 107.8 216. 3 155.3 103.8 89.0 104.0 98.8 124 .7 214.7 81.0 183.0 176.3 197.9 255.3 V 10309 1166 8 6294 8661 8 512 8 812 2554 2393 127 4 1195 1472 1333 1408 128 1 14293 9009 124 30 8236 6056 8162 ... vocabulary, but with emphasis ondifferent words Conclusions In this paper we develop a computational test of different perspectives basedon statistical distribution divergence between the statistical ... 3a) conditions The large ∆θ not only accounts for large distribution divergence of the document pairs in DT conditions, but also shows that words in different topics that is frequent in one topic...
... association was further aided by integration of protein interaction data with data on gene expression, localization, function, evolutionary conservation, protein structure and binary interactions ... target gene regulation Although most of the reported transcription networks basedon chip -on- chip data are static, Furlong described one of the first examples of a dynamic transcription network which ... replication, sites of replication termination, transcription factor (TF)-binding sites, methylation sites, deoxyribonuclease I-hypersensitive sites, chromatin modifications, and multispecies conserved...
... feature extraction, the system has information enough to make decisions (classify) and generate the necessary control actions to be delivered to the electronic device to be controlled The user, in such ... to build an environment map to perform longtime outdoor navigation In [11] and [12] systems very similar to those proposed in [10] are presented, also using commands based only on EMG signals The ... map the data corresponding to the multi-channel neural spikes of a monkey to the 3D positions of its arm positions The predicted position of the hand of the monkey is used to control a robot arm...
... second conditions are satisfied according to the expressions of Pi and ui(·) We can focus on the rest one In our game model, for the mth non-cooperative user, we can get the first-order and second-order ... consumption of a certain user The proposed algorithm is a progressive optimal framework, in the second step of which we consider the compromise of user rate maximization and power consumption ... regulate the power consumption in different channel conditions Similarly, for relays which are applied to forward cooperative users’ information in the odd slot, the utility function can be designed...
... execution basedon a diffusion equation strategy Adv Robot 7(5), 479–490 (1993) doi:10.1186 /168 7-1499-2011-60 Cite this article as: Kaiser et al.: A human motion model basedon maps for navigation systems ... every second and also upon each stepmeasurement A motion model basedon maps The weighting process in the LPF that uses no motion models for weighting is basedon binary decisions: if a particle crosses ... representation of a multimodal position estimation scenario (two particles clouds) using a PF -based estimator at different time instances when our proper maps -based motion model is used The scenario is based...
... Section describes the system-level simulation assumptions providing details on the evaluation methodologies, system configuration, simulation flow, and control overhead calculation Section analyzes ... are basedon two widely used system-level evaluation methodologies: The IMT-Advanced evaluation methodology [11] and the IEEE 802 .16 m evaluation methodology [12] The use of two evaluation methodologies ... IEEE 802.16e and IEEE 802 .16 m mobile broadband systems Section summarizes the main results and concludes the article Simulation assumptions This section contains the background information necessary...
... reflection and illumination A common approach to separate the reflection and illumination is basedon this assumption that illumination is spatially smooth so that it can be taken as a constant ... state-of-art and conventional face recognition systems, we have compared the recognition rate with conventional PCA -based face recognition system and state-of-art techniques such as Nonnegative Matrix ... illustration of the superiority of the proposed data fusion boosted colour PDF -based face recognition system over the aforementioned face recognition systems Performance was achieved on FERET...
... hybrid systems of wide presence in technological applications like telecommunication, teleoperation, or control of continuous systems by discrete controllers to which the above structure belongs ... Michel, “Application of interval analysis techniques to linear systems II The interval matrix exponential function,” IEEE Transactions on Circuits and Systems, vol 35, no 10, pp 123 0 124 2, 1988 E ... generalized contractive maps,” Fixed Point Theory and Applications, vol 2009, Article ID 48 7161 , pages, 2009 16 J.-Z Xiao and X.-H Zhu, “Common fixed point theorems on weakly contractive and nonexpansive...
... PAPR 10 12 14 PAPR0 (dB) Iterative PTS (iteration = 16) PSO-PTS (iteration = 88) OPTS (iteration = 128 ) 16 18 20 22 PSO-PTS with threshold (iteration = 23) Original OFDM Figure 7: Comparison of ... J.-H Wen, “A particle swarm optimization based multiuser detector for DS-CDMA communication systems, ” in Proceedings of the IEEE International Conference on Systems, Man and Cybernetics (SMC ’06), ... International Conference on Evolutionary Computation (ICEC ’98), pp 69–73, Anchorage, Alaska, USA, May 1998 [22] D J Krusienski and W K Jenkins, “Design and performance of adaptive systemsbased on...
... 25.5 3.15 Cost function 3.2 3.05 2.95 24 23.5 10 12 Iterations 14 16 18 20 23 (a) 10 12 Iterations 14 16 18 20 (b) Figure 5: (a) Convergence of cost function; (b) corresponding convergence of CMSE ... in each iteration and the use of nonlinear operations for image enhancement Moreover, convergence is not guaranteed Gunturk et al proposed an algorithm basedon projections onto convex sets to ... specify the location of a pixel O A Omer and T Tanaka Table 1: Effect of iterations on edgy and smooth regions Edgy region Iterations Li [15] Smooth region Su [16] Li [15] Su [16] 10 by using Ri,...
... distribution TANGRAM is basedon a positive continuous distribution In our simulations, we use the lognormal distribution, since the mean and variance can be controlled independently .12 The lognormal ... dimensionality of 587 × 393 while the second image has dimensionality of 512 × 512 and can be seen in Figure 12 The significance of choosing different image dimensions in our work is to demonstrate ... semantic content of visual data Traditionally, to deny third parties access to content, encryption is employed [13] However, recently it has been noted that the use of these powerful cryptosystems on...