نتایج جستجو برای: key quality characteristic
تعداد نتایج: 1416899 فیلتر نتایج به سال:
In this paper, the expressions of achievable strength-based suboptimum detection probabilities of concentration-encoded molecular communication (CEMC) system have been derived based on pulse-amplitude modulated (PAM) on-off keying (OOK) modulation scheme. Results show that the detection performance of a PAM OOK CEMC system significantly depends on the statistical parameters of diffusion noise a...
On line quality evaluation is an important domain particularly in the complex processes where the characteristic of the product quality is difficult to measure directly. Evaluation based modelling techniques can be considered as an alternative to solve such complex problem. We consider in this work a contribution for product quality evaluation in hot rolling using fuzzy models. Residual changes...
In this paper, we investigate four methods that yield mathematical measures to analyze the precision of surfaces of manufactured parts. These four methods, namely the au-tocorrelation function, the Fourier spectrum, the Karhunen-Lo eve expansion, and a fractal-wavelet representation, are applied to surfaces produced from grinding processes. The rst two methods are standard methods used in the s...
The distribution of quality characteristic of a product is usually assumed to be known. In some situation, the quality characteristic of a product cannot be measured directly. It needs to be measured by controlling another factor. Wen and Mergen (1999) presented a method for determining the optimum process mean in order to minimize the expected total loss of a product. However, they have not co...
The exact definition of the quality of a fingerprint image [3][4][5] is difficult and nearly impossible. Different types of information are important for various cases – e.g. once it is the contrast, another time the continuality of trajectory of some papillary lines or resulting minutiae quality, etc. In general, it is impossible to formulate one definition covering all cases. But in case of f...
The development of Wireless Body Area Networks (WBANs) for wireless sensing and monitoring of a person’s vital functions, is an enabler in providing better personal health care whilst enhancing the quality of life. A critical factor in the acceptance of WBANs is providing appropriate security and privacy protection of the wireless communication. This paper first describes a general health care ...
Consider an electronic commerce (e-commerce) environment where the consumers subscribe to data objects; a server distributes these objects electronically which are then retrieved by the consumer. We propose a protocol showing how the distribution of data objects can be done in a secure and efficient manner. In our protocol, (1) consumers who have subscribed for an object can get access to the o...
Background Three-dimensional (3D) velocity-encoded MRI (4DFLOW) of the heart may be used for the assessment of systolic and diastolic function. Particle tracing is frequently used as a technique for visualization of 3D intra-cardiac flow patterns. As the obtained velocity data may suffer from imperfections in the acquisition technique, it is important to have a means for image quality control. ...
The fingerprint-copy attack aims to confuse camera identification based on sensor pattern noise. However, the triangle test shows that the forged images undergone fingerprint-copy attack would share a non-PRNU (Photo-response nonuniformity) component with every stolen image, and thus can detect fingerprint-copy attack. In this paper, we propose an improved fingerprint-copy attack scheme. Our ma...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید