Sciweavers

INFORMATICALT
2008
91views more  INFORMATICALT 2008»
13 years 4 months ago
Lloyd-Max's Algorithm Implementation in Speech Coding Algorithm Based on Forward Adaptive Technique
In this paper a detail analysis of speech coding algorithm based on forward adaptive technique is carried out. We consider an algorithm that works on frame-by-frame basis, where a ...
Jelena Nikolic, Zoran Peric
INFORMATICALT
2008
92views more  INFORMATICALT 2008»
13 years 4 months ago
On Structural Analysis of Parliamentarian Voting Data
We investigate applicability of quantitative methods to discover the most fundamental structural properties of the most reliable political data in Lithuania. Namely, we analyze vot...
Tomas Krilavicius, Antanas Zilinskas
INFORMATICALT
2008
104views more  INFORMATICALT 2008»
13 years 4 months ago
An Efficient Technique to Detect Visual Defects in Particleboards
This paper is concerned with the problem of image analysis based detection of local defects embedded in particleboard surfaces. Though simple, but efficient technique developed is ...
Jonas Guzaitis, Antanas Verikas
INFORMATICALT
2008
162views more  INFORMATICALT 2008»
13 years 4 months ago
Vague Rough Set Techniques for Uncertainty Processing in Relational Database Model
Abstract. The study of databases began with the design of efficient storage and data sharing techniques for large amount of data. This paper concerns the processing of imprecision ...
Karan Singh, Samajh Singh Thakur, Mangi Lal
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
13 years 4 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang
INFORMATICALT
2008
133views more  INFORMATICALT 2008»
13 years 4 months ago
A New Logarithmic Normalization Method in Games Theory
Abstract. Multi-criteria decision making is used in many areas of human activities. Each alternative in multi-criteria decision making problem can be described by a set of criteria...
Edmundas Kazimieras Zavadskas, Zenonas Turskis
INFORMATICALT
2008
124views more  INFORMATICALT 2008»
13 years 4 months ago
Hierarchical Adaptive Clustering
This paper studies an adaptive clustering problem. We focus on re-clustering an object set, previously clustered, when the feature set characterizing the objects increases. We prop...
Gabriela Serban, Alina Campan
INFORMATICALT
2008
139views more  INFORMATICALT 2008»
13 years 4 months ago
Fingerprint Minutiae Matching without Global Alignment Using Local Structures
This paper presents a method of minutiae based fingerprint matching that is robust to deformations and does not do fingerprint alignment. It concentrates on comparing rotation and ...
Andrej Kisel, Alexej Kochetkov, Justas Kranauskas
INFORMATICALT
2008
127views more  INFORMATICALT 2008»
13 years 4 months ago
Energy Cost Optimization by Adequate Transmission Rate Dividing in Wireless Communication System
Abstract. Energy cost is the main constraint in modern wireless communication system. A powerful scheme due to optimal energy cost is provided for a single node server in this pape...
Reu-Ching Chen, Chen-Sung Chang
INFORMATICALT
2008
120views more  INFORMATICALT 2008»
13 years 4 months ago
Nonlinear Behaviour in the MPI-Parallelised Model of the Rat Somatosensory Cortex
Mammalian brains consisting of up to 1011 neurons belong to group of the most complex systems in the Universe. For years they have been one of the hardest objects of simulation. Th...
Grzegorz M. Wojcik, Wieslaw A. Kaminski