Sciweavers

2997 search results - page 145 / 600
» Fuzzy robustness analysis
Sort
View
NCA
2007
IEEE
15 years 4 months ago
Handling of incomplete data sets using ICA and SOM in data mining
Based on independent component analysis (ICA) and self-organizing maps (SOM), this paper proposes an ISOM-DH model for the incomplete data’s handling in data mining. Under these ...
Hongyi Peng, Siming Zhu
ICASSP
2011
IEEE
14 years 8 months ago
On 2D localization of reflectors using robust beamforming techniques
This paper presents a method for the localization of reflectors in an acoustic environment, using robust beamforming techniques and a cylindrical microphone array, for which an i...
Edwin Mabande, Haohai Sun, Konrad Kowalczyk, Walte...
ICIP
2003
IEEE
16 years 6 months ago
Joint security & robustness enhancement for quantization embedding
This paper studies joint security and robustness enhancement of quantization based data embedding for multimedia authentication applications. We present analysis showing that thro...
M. Wu
ICRA
2003
IEEE
131views Robotics» more  ICRA 2003»
15 years 9 months ago
Mode shape compensator for improving robustness of manipulator mounted on flexible base
— In this paper, the concept of the ’robust arm configuration’ (RAC) is expanded using a mode shape compensator. This compensator improves the robustness of the arm configu...
Jun Ueda, Tsuneo Yoshikawa
ACSC
2004
IEEE
15 years 8 months ago
Network Robustness and Graph Topology
Two important recent trends in military and civilian communications have been the increasing tendency to base operations around an internal network, and the increasing threats to ...
Anthony H. Dekker, Bernard D. Colbert