A Comparative Study of Inversion Optimization Algorithms for Underground Metal Target Detection
نویسندگان
چکیده
منابع مشابه
Estimation of LOS Rates for Target Tracking Problems using EKF and UKF Algorithms- a Comparative Study
One of the most important problem in target tracking is Line Of Sight (LOS) rate estimation for using from PN (proportional navigation) guidance law. This paper deals on estimation of position and LOS rates of target with respect to the pursuer from available noisy RF seeker and tracker measurements. Due to many important for exact estimation on tracking problems must target position and Line O...
متن کاملtransference of imagery: a comparative formalistic study of shakespeares hamlet and its two persian translations
هدف از این تحقیق بررسی انتقال صور خیال هملت در دو ترجمه ی فارسی آن از نظر فرمالیستی بود. برای بدست آوردن داده-های مورد نیاز، 130 نمونه استعاره، مجاز، ایهام، کنایه و پارادوکس در متن اصلی مشخص شده و سپس بر اساس مدل نیومارک (1998) برای ترجمه ی استعاره یا بطور کلی زبان مجاز با معادل های فارسی شان مقایسه گردیدند. این تحقیق بر آن بود تا روش های استفاده شده برای ترجمه هر کدام از انواع زبان مجاز ذکر شد...
15 صفحه اولa comparative study of subtitled vs auditory documentaries comprehension among persian speakers of english
abstract this study set out to compare the effect of modality of presentation (subtitled vs. auditory) in the comprehension of verbal content of documentary films among iranian efl students. to this end, (30 male 30 female) students were chosen from two schools. after their homogeneity was established, the students attended the listening sessions to watch five documentary films over t...
15 صفحه اولA Comparative Study of Intrusion Detection Algorithms
Intrusion detection system (IDS) is a kind of security management model that can be installed in computers and networks. IDS gather information from the network and computer and analyses it to find the possible security breaches into the system, which contain both intrusions and misuse. If we see modern IDS they also have few vulnerabilities, these systems also have drawbacks of false detection...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2020
ISSN: 2169-3536
DOI: 10.1109/access.2020.3008176