Search
Now showing items 361-370 of 499
Routing performance analysis of opportunistic networks with flooding and partial flooding methods [Fırsatçı a?larda taşırma ve kısmi taşırma yöntemleriyle yönlendirme performans analizi]
(IEEE, 2012)
Opportunistic networks is one of the fast developing research areas in mobile communications. Under opportunistic networks mobile nodes try to communicate with other nodes without any prior information and knowledge about ...
Empirical results about efforts for effective teaching to y-generation freshman students
(IEEE, 2012)
New techniques are deployed to teach the new generation of students effectively. This work tries to share our experience in a blended course for over eleven years. It has been observed that the online portion of the course ...
Review of bandwidth estimation tools and application to bandwidth adaptive video streaming
(IEEE, 2012)
Streaming video is very popular in today's best effort delivery networks. Streaming video applications should not only have a good end-to-end transport performance but also have a Quality of Service (QoS) provisioning in ...
The effect of secondary user locations on the cooperative detection performance [İki?nci?l kullanıcı konumlarının i?şbi?rli?kli? algılama yöntemi? performansına etki?si?]
(IEEE, 2012)
In conventional cooperative detection a fusion center decides on the presence or absence of the primary user by gathering all the information from secondary users and conveys this decision to all users. This approach does ...
Genetic algorithm based broadband equalizer design with ripple level control
(IEEE, 2012)
In this paper broadband equalizer design with ripple control via genetic algorithm has been studied. The equalizer is defined as a lossless two-port terminated by load impedance and the coefficients of its describing ...
Detection of jointly active primary systems
(IEEE, 2012)
Recent studies in cognitive radios consider the detection of multiple bands for a better utilization of the spectrum. If the cognitive radio (CR) is an ultra wideband (UWB) or a wideband system then the CR should ensure ...
Detection of Trojans in integrated circuits
(IEEE, 2012)
This paper presents several signal processing approaches in Trojan detection problem in very large scale integrated circuits. Specifically wavelet transforms spectrograms and neural networks are used to analyze power ...
Zero-crossing based demodulation of minimum shift keying
(2003)
Minimum shift keying (MSK) modulation has features such as constant envelope compact spectrum and good error performance which are all desirable in many digital applications including mobile radio. Numerous receiver ...
Sliding mode controller solution for the shallow submerged operation ok a submarine
(IFAC Secretariat, 2003)
In this paper a submarine controller is presented which can accommodate the sea wave effects on a submarine a(shallow water operation. Sliding mode method is implemented in a way that the robustness of the controller ...
Active reconfigurable control of a submarine with indirect adaptive control
(2003)
An indirect adaptive controller is designed for submersibles. The design is developed using a linearized MIMO model of a submarine. Standard recursive least squares estimation method is used to estimate the parameters. ...