Search
Now showing items 41-50 of 82
Outage Scaling Laws and Diversity for Distributed Estimation Over Parallel Fading Channels
(IEEE, 2009)
We consider scaling laws of the outage for distributed estimation problems over fading channels with respect to the total power and the number of sensors. Using a definition of diversity which involves a fixed number of ...
Performance of Distributed Estimation Over Unknown Parallel Fading Channels
(IEEE-INST Electrical Electronics Engineers Inc, 2008)
We consider distributed estimation of a source in additive Gaussian noise observed by sensors that are connected to a fusion center with unknown orthogonal (parallel) flat Rayleigh fading channels. We adopt a two-phase ...
Optical and structural properties of sol-gel made Ce/Ti/Zr mixed oxide thin films as transparent counter electrode for electrochromic devices
(Elsevier Science Bv, 2008)
Ce/Ti/Zr mixed oxide thin films were prepared using sol-gel process with mole ratios from 45/5 to 5/45 of Ti/Zr and 50 of Cc and deposited by dip coating technique. Optical electrochromic and structural properties of such ...
Non-preemptive priority scheduler with multiple thresholds for network routers
(Pamukkale Univ, 2018)
The vast variety of applications available and being developed for computer networks have different quality of service requirements. One of the most significant ways to satisfy the needs of the applications is the packet ...
Improvement of indoor positioning accuracy of ultra-wide band sensors by using big bang-big crunch optimization method
(Pamukkale Univ, 2018)
Ultra-wide Band technology is an emerging technology that offers successful solutions in many indoor positioning systems and performs better than other methods. In this study an indoor positioning system using Ultra-wide ...
Performance Improvement of Threshold Based Audio Steganography Using Parallel Computation
(Science & Information SAI Organization Ltd, 2016)
Audio steganography is used to hide secret information inside audio signal for the secure and reliable transfer of information. Various steganography techniques have been proposed and implemented to ensure adequate security ...
Improving Energy-Efficiency of WSNs through LEFCA
(Sage Publications Inc, 2016)
Wireless sensor networks (WSNs) have become an important part of our lives as they can be used in vast application areas from disaster relief to health care. As a consequence the life span and the energy consumption of a ...
New 2-Edge-Balanced Graphs from Bipartite Graphs
(Wiley-Blackwell, 2016)
Let G be a graph of order n satisfying that there exists lambda epsilon Z(+) for which every graph of order n and size t is contained in exactly. distinct subgraphs of the complete graph K-n isomorphic to G. Then G is ...
Threshold-based Steganography: A Novel Technique for Improved Payload and SNR
(Zarka Private Univ, 2016)
Steganography is the art of hiding user information in various file types including image audio and video. Security of steganography lies in imperceptibility of secret information in the cover image. Human Visual System ...
Accurate Refinement Of Docked Protein Complexes Using Evolutionary Information And Deep Learning
(Imperıal College Press, 2016)
One of the major challenges for protein docking methods is to accurately discriminate native-like structures from false positives. Docking methods are often inaccurate and the results have to be refined and re-ranked to ...