Güncel Gönderiler: Bildiri Koleksiyonu
Toplam kayıt 355, listelenen: 141-160
-
Decentralized robust flow controller design for networks with multiple bottlenecks
(Institute of Electrical and Electronics Engineers Inc., 2003)Decentralized rate-based flow controller design in multi-bottleneck networks is considered. An H? problem is formulated to find decentralized controllers which are robust to time-varying uncertain multiple time-delays in ... -
General orthonormal bases for robust identification in H?
(2002)In this paper, the problem of system identification in H? with general orthonormal basis functions is investigated. A two-stage algorithm is shown to be robust, provided that the number of basis elements as a function of ... -
Decentralized robust control basedon overlapping decompositions
(IFAC Secretariat, 2004)Use of overlapping decompositions in robust decentralized controller design is demonstrated. Using overlapping decompositions and expansions, a robustness bound to account for (i) the neglected interactions between the ... -
Increasing the topological quality of Kohonen's self organising map by using a hit term
(Institute of Electrical and Electronics Engineers Inc., 2002)The quality of the topology obtained at the end of the training period of Kohonen's self organizing map (SOM) is highly dependent on the learning rate and neighborhood function that are chosen at the beginning. The ... -
Overlappingl
(IFAC Secretariat, 2002)Overlapping decompositions and expansions of discrete-event systems (DESs) modeled by automata or formal languages are considered. Inclusion principle for such systems is defined. A decentralized supervisory controller ... -
A comparison of static QoS-based scheduling heuristics for a meta-task with multiple QoS dimensions in heterogeneous computing
(2004)The problem of scheduling a set of independent tasks (a meta-task) with multiple QoS needs, such as Timeliness, Reliability, Versions, Security and Priority, in a Heterogeneous Computing (HC) environment is referred to as ... -
Improvements on isolated word recognition using FLDA [FLDA kullanarak ayrik kelime tanimada yapilan iyileştirmeler]
(2005)The purpose of this study is to increase the recognition rates of the isolated word using improved Fisher's Linear Discriminant Analysis (FLDA). Therefore, at first, unique subspace for each class is constructed by defining ... -
Evaluation of intersection collision warning system using an inter-vehicle communication simulator
(2004)An inter-vehicle communication (IVC) simulator has been developed to evaluate an intersection collision warning system. Various representative intersection collision scenarios are simulated. The physical and Media Access ... -
Improvements on isolated word recognition using subspace methods
(2005)The purpose of this study is to investigate the effects of different forms of between-class scatter matrices on multi-class problems. Two different between-class scatter matrices are defined in Fisher's linear discriminant ... -
Improvements on common vector approach for multi class problems
(2005)In multi-class problems, within- and between-class scatters should be considered in classification criterion. The common vector approach (CVA) uses the discriminative information obtained from within-class scatter of any ... -
Improving the resultant quality of Kohonen's self organizing map using stiffness factor
(2005)The performance of Self Organizing Map (SOM) is always influenced by learn methods. The resultant quality of the topological formation of the SOM is also highly dependent onto the learning rate and the neighborhood function. ... -
Detection of disturbances in energy system signals using gaussian distribution fitness test [Enerji Sisitemi Sinyallerinde Bozucularin Gauss Dagilim Uyumlulugu Testi ile Tespiti]
(2004)In this work, a method based on higher order statistics (HOS) is proposed to detect disturbances in energy system voltage and current waveforms due to faults and various system events. During the normal operation of the ... -
Central and projection algorithms in set membership identification with periodic inputs
(2004)In this paper, we study the central and the projection algorithms in set membership identification with periodic input signals for the case that the number of the estimated parameters equals the input period. First, we ... -
Stability margins for a rate-based flow control problem in multiple bottleneck networks
(2005)in this paper, the lower bounds for the actual stability margins are derived for a rate-based flow control problem in multiple bottleneck communication networks. Considered stability margins are for the uncertainties in ... -
Extended partial path heuristic for real-time staging in oversubscribed networks
(Springer-Verlag Berlin, 2003)In this paper we propose the use of the PPH as a base for an offline schedule method to detect unsatisfiable requests in a staging system. This property allows a reduction in the overhead of transferring data-items with ... -
H-based flow control for ATM networks with multiple bottlenecks
(2005)in this paper, the implementation of an H? controller, designed in another work for the flow control in communication networks with a single bottleneck, is considered for asynchronous transfer mode (ATM) networks with ... -
A path selection based algorithm for maximizing self-satisfiability of requests in real-time Grid applications
(Springer-Verlag Berlin, 2004)Efficient data scheduling in Grid environments is becoming a seemingly important issue for distributed real-time applications that produce and process huge datasets. Thus, in this paper, we consider the data scheduling ... -
Static mapping heuristics for tasks with hard deadlines in real-time heterogeneous systems
(Springer-Verlag Berlin, 2004)Hard real-time tasks are associated with strict deadlines. Classical scheduling heuristics ensure fairness among tasks and prevent deadlock, but are not concerned with deadline compliance. Hence, there is a need for ... -
A comparison of the Common Vector and the discriminative Common Vector methods for face recognition
(2005)The Common Vector (CV) method is a successful method which has been originally proposed for isolated word recognition problems in the case where the number of samples for each class is less than or equal to the dimensionality ... -
On feature extraction for spam e-mail detection
(Springer-Verlag Berlin, 2006)Electronic mail is an important communication method for most computer users. Spam e-mails however consume bandwidth resource, fill-up server storage and are also a waste of time to tackle. The general way to label an ...