Sciweavers

1486 search results - page 205 / 298
» Firewall Rules Analysis
Sort
View
ICC
2009
IEEE
14 years 9 months ago
Performance Evaluation of QAM-Based BICM: An Analytical Approach
We present an analytical approach to determine the performance of bit-interleaved coded modulation (BICM) transmission over unfaded Gaussian channels. In particular, we derive expr...
Alireza Kenarsari-Anhari, Lutz H.-J. Lampe
92
Voted
ICIP
2009
IEEE
14 years 9 months ago
The direct use of curvelets in multifocus fusion
In this effort, a data-driven and application independent technique to combine focal information from different focal planes is presented. Input images, acquired by imaging system...
Harishwaran Hariharan, Andreas Koschan, Mongi A. A...
ICMCS
2009
IEEE
166views Multimedia» more  ICMCS 2009»
14 years 9 months ago
Video text detection based on filters and edge features
Text detection plays a vital role in retrieving and browsing video data efficiently and accurately. In this paper, we propose a method for detecting both graphics and scene text i...
Palaiahnakote Shivakumara, Trung Quy Phan, Chew Li...
IJON
2010
159views more  IJON 2010»
14 years 6 months ago
Model predictive flight control using adaptive support vector regression
This paper explores an application of support vector regression (SVR) to model predictive control (MPC). SVR is employed to identify a dynamic system from input-output data, and t...
Jongho Shin, H. Jin Kim, Sewook Park, Youdan Kim
JDCTA
2010
151views more  JDCTA 2010»
14 years 6 months ago
Research on Querying Node Probability Method in Probabilistic XML Data Based on Possible World
In order to solve the low efficiency problem of directly querying single node probability in the set of all ordinary XML data obtained by enumerating possible world set of the cor...
Jianwei Wang, Zhongxiao Hao