Güncel Gönderiler: Elektrik ve Elektronik Mühendisliği Bölümü
Toplam kayıt 552, listelenen: 341-360
-
Road Roughness Evaluation by Curve-Fitting and Subspace-Identification Methods
(Asce-Amer Soc Civil Engineers, 2016)In this paper, for a quarter-car model, root-mean square response variables are calculated for roads classified by the international standard organization, based on the straight-line spectrum models. Covariance expressions ... -
Road Roughness Modelling by Using Spectral Factorization Methods
(IEEE, 2016)In this paper, road roughness model for the right and the left tracks are constructed by utilizing two methods. In the first method, from time-domain measurements the empirical auto and cross-power spectral densities of ... -
Influence of Tire Damping on the H-2 Optimally Designed Half-Car Active Suspensions
(IEEE, 2008)In this paper, the rms responses of the heave and pitch accelerations, the suspension travels, and the tire deflections of a half-car model excited by random road inputs are studied. The road excitation at the front wheel ... -
Influence of tire damping on the ride performance potential of quarter-car active suspensions
(IEEE, 2008)In this paper, performance limitations are studied for a quarter-car active suspension system excited by sinusoidal or random road disturbances. It is demonstrated that the influence of tire damping on the closed-loop ... -
Tire Damping Effect on H-2 Optimal Control of Half-Car Active Suspensions
(Asme-Amer Soc Mechanical Eng, 2010)In this note the root-mean-square response of a half-car model following a random road profile is studied. Road excitation at the front wheel is modeled by a first-order linear shape filter driven by white-noise and the ... -
Effect of tire damping on the ride performance potential of active suspension systems
(IEEE, 2007)In this paper, constraints on the transfer functions from the road disturbance to the vertical acceleration, the suspension travel, and the tire deflection are derived for a quarter-car active suspension system using the ... -
Greedy Search for Descriptive Spatial Face Features
(IEEE, 2017)Facial expression recognition methods use a combination of geometric and appearance-based features. Spatial features are derived from displacements of facial landmarks, and carry geometric information. These features are ... -
Multi-Objective Design for Half-Car Active Suspensions
(IEEE, 2012)In this paper, multi-objective control of a half-car suspension system is formulated as a mixed H-2/H-infinity synthesis problem and this convex problem is solved using linear matrix inequalities. Then, the control design ... -
Prediction error PDF improvement in multichannel predictive coders
(IEEE, 2006)In this paper, multichannel predictive image coder outputs are investigated within each channel. By obtaining prediction error biases and compensating them in each channel, the total error histogram is sharpened. -
A 3D Lifting Based Method Augmented by Motion Compensation for Video Coding
(IEEE, 2009)This study introduces a spatio-temporal lifting based algorithm to be used in compression of video signals. The temporal correlation of consecutive frames causes temporal redundancies, which are subject to lifting-like ... -
A Wearable Head-Mounted Sensor-Based Apparatus for Eye Tracking Applications
(IEEE, 2008)This work presents a novel approach to eye-tracking systems using eye-glass like apparatus equipped with relatively cheap IrDA sensors and IrDA LEDs connected to a computer. The proposed system produces very low dimensional ... -
Image Gradient Estimation with Wide Support Kernels
(IEEE, 2008)Gradient estimation using small support kernels is often used in edge detection algorithms. Small kernels such as Sobel and Roberts are often used in order to obtain gradient estimation in a short time. However, the limited ... -
Autopilot Project with Unmanned Robot
(Elsevier Science BV, 2012)Mobile robot is an important figure during the search and rescue application after the natural diseases such as earthquakes, fire, flooding. In the disaster areas, searching the sign of living bodies or investigating the ... -
Gray level topological corner detection
(IEEE, 2007)A new corner detection algorithm based on the topological median filter is proposed. Topological quasi dilation and erosion operators with circular structuring element are used to detect the corners on gray level images. -
Gray Level Topological Angle Detection of High Curvature Points
(IEEE, 2010)A new method of angle detection based on the topological median filter is proposed. Topological opening operator is used to detect corners and Topological closing operator is used to calculate the corner angles on gray ... -
Topolojiye Dayali Kose Tespiti Topology Based Corner Detection
(IEEE, 2007)A new corner detection algorithm based on the topological median filter is proposed. Topological quasi dilation and erosion operators with circular structuring element are used to detect the corners on gray level images. -
A comparative device performance assesment of CVD grown MoS2 and WS2 monolayers
(Springer, 2018)In this study, optical and electronic transport properties of chemical vapor deposition (CVD) grown 2D WS2 and MoS2 based transistors and photodetectors are investigated and compared in ambient air by using 2D flakes grown ... -
Grid Matching in Monte Carlo Bayesian Compressive Sensing
(IEEE, 2013)Sparse signal reconstruction from compressive measurements assumes a grid of possible support points from which to estimate the signal support set. However, reconstruction of high measurement resolution waveforms is very ... -
Improving the Efficiency of Predictive Coders Via Adaptive Multiple Predictor Cooperation
(IEEE, 2013)Due to the popularity of the prediction concept in time series analysis, predictive coding has been an attractive approach, particularly in lossless image compression. Utilization of prediction in time series not only makes ... -
Improving the computational efficiency of modular operations for embedded systems
(Elsevier, 2014)Security protocols such as IPSec, SSL and VPNs used in many communication systems employ various cryptographic algorithms in order to protect the data from malicious attacks. Thanks to public-key cryptography, a public ...