Efficient Detection Approach for DTMF Signal Detection
نویسندگان
چکیده
منابع مشابه
islanding detection methods for microgrids
امروزه استفاده از منابع انرژی پراکنده کاربرد وسیعی یافته است . اگر چه این منابع بسیاری از مشکلات شبکه را حل می کنند اما زیاد شدن آنها مسائل فراوانی برای سیستم قدرت به همراه دارد . استفاده از میکروشبکه راه حلی است که علاوه بر استفاده از مزایای منابع انرژی پراکنده برخی از مشکلات ایجاد شده توسط آنها را نیز منتفی می کند . همچنین میکروشبکه ها کیفیت برق و قابلیت اطمینان تامین انرژی مشترکان را افزایش ...
15 صفحه اولEfficient Signal Detection for MIMO-OFDM System
Recently, the multiple-input multiple-output (MIMO) schemes have been proposed as efficient solution for future wireless system. MIMO schemes can achieve a significant increase in the bandwidth efficiency as well as an improvement of the transmission reliability. In this paper, switching for the detection schemes based on channel condition is proposed in MIMO system. The QRD-M detection scheme ...
متن کاملSignal detection Using Rational Function Curve Fitting
In this manuscript, we proposed a new scheme in communication signal detection which is respect to the curve shape of received signal and based on the extraction of curve fitting (CF) features. This feature extraction technique is proposed for signal data classification in receiver. The proposed scheme is based on curve fitting and approximation of rational fraction coefficients. For each symbo...
متن کاملHybrid Approach for Efficient Software Clone Detection
Software cloning is a methodology which defines that if any size of code is used apart from its original place to some another place as it is or with some modification to perform same functionality. This activity is also known as reuse of repeating code at many places instead of writing a new code. The original piece of code which is reused is called code cloning and copied form of that code is...
متن کاملShellix: An Efficient Approach for Shellcode Detection
Code injection attacks are widely used by attackers to compromise computer systems. Attackers could obtain the control of a victim's computer system by injecting shellcode to the vulnerable program. The existing solutions to detect shellcode can be grouped into two categories: static analysis and dynamic analysis. Static analysis can detect shellcode efficiently, but cannot handle the shellcode...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied Sciences
سال: 2019
ISSN: 2076-3417
DOI: 10.3390/app9030422