Results 51 to 60 of about 840,330 (315)

A Python-based laboratory course for image and video signal processing on embedded systems

open access: yesHeliyon, 2019
The usage of embedded systems is omnipresent in our everyday life, e.g., in smartphones, tablets, or automotive devices. These devices are able to deal with challenging image processing tasks like real-time detection of faces or high dynamic range ...
Karina Jaskolka   +3 more
doaj   +1 more source

Semantics of an Exception Mechanism for Bulk Synchronous Parallel ML [PDF]

open access: yesEighth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2007), 2007
A communication protocol is a fundamental component of a multi-agent system. The security requirements for a communication protocol should be articulated during the early stages of software development. However, there is no formal way provided for software developers to find out what makes a communication protocol secure and what are secure designs. In
Yulei Ding   +5 more
openaire   +18 more sources

Tools21cm: A python package to analyse the large-scale 21-cm signal from the Epoch of Reionization and Cosmic Dawn

open access: yesJournal of Open Source Software, 2020
The Cosmic Dawn (CD) and Epoch of Reionization (EoR) are among the least understood epochs from the history of our Universe. Large-scale cosmological simulations are useful to understand this era and help prepare for future observations.
S. Giri, G. Mellema, H. Jensen
semanticscholar   +1 more source

A Framework for Multiple Object Tracking in Underwater Acoustic MIMO Communication Channels

open access: yesJournal of Sensor and Actuator Networks, 2017
This work presents a computational framework for the analysis and design of large-scale algorithms utilized in the estimation of acoustic, doubly-dispersive, randomly time-variant, underwater communication channels.
Domingo Rodriguez   +3 more
doaj   +1 more source

A Factor Graph Approach to Automated Design of Bayesian Signal Processing Algorithms [PDF]

open access: yes, 2018
The benefits of automating design cycles for Bayesian inference-based algorithms are becoming increasingly recognized by the machine learning community.
Cox, Marco   +2 more
core   +3 more sources

Numerical simulation of electric signal in the cyber-physical immunosensor system on rectangular lattice in R package [PDF]

open access: yes, 2019
Проведено чисельне моделювання електричного сигналу з перетворювача в кіберфізичній імуносенсорній системі на прямокутній решітці з використанням диференціальних рівнянь із запізненням за допомогою пакета R.
Sverstiuk, Andrii   +1 more
core   +1 more source

Efficient model of PID controller of unmanned aerial vehicle

open access: yesJournal of Edge Computing, 2023
The modern stage of science and technology development is distinguished by the widespread use of digital signal processing. The use of digital processing for effective control of aircraft and other technical equipment remains relevant for many ...
Arsen R. Petrosian   +3 more
doaj   +1 more source

Journal Staff [PDF]

open access: yes, 2012
         The fast Fourier transform (FFT) plays an important role in digital signal processing (DSP) applications, and its implementation involves a large number of computations.
Sreehari, Ambuluri
core   +1 more source

Comparing self‐reported race and genetic ancestry for identifying potential differentially methylated sites in endometrial cancer: insights from African ancestry proportions using machine learning models

open access: yesMolecular Oncology, EarlyView.
Integrating ancestry, differential methylation analysis, and machine learning, we identified robust epigenetic signature genes (ESGs) and Core‐ESGs in Black and White women with endometrial cancer. Core‐ESGs (namely APOBEC1 and PLEKHG5) methylation levels were significantly associated with survival, with tumors from high African ancestry (THA) showing ...
Huma Asif, J. Julie Kim
wiley   +1 more source

Sound Encryption Using Feature Extraction and Neural Network [PDF]

open access: yesالمجلة العراقية للعلوم الاحصائية, 2011
In recent years, secure communication techniques have increased widely and unexpectedly . In order to establish reliable communication technology and to ensure that the data (sound) reaches its intended end and to be accessible to all through the ...
Alyaa Moufaq   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy