نتایج جستجو برای: based filters use different orders
تعداد نتایج: 5314942 فیلتر نتایج به سال:
Research and exploration of the remaining relics from the past has special importance in identifying the date, history and the identity of a country. Development and the advancement of human knowledge have offered new methods for the detection archaeological sites that by using them without the need for excavation and destruction of antiquities can be found useful information. Today, the non-de...
HRTFs (head-related transfer functions) are available for sound field reproduction with spatial fidelity, since HRTFs involve the acoustic cues such as interaural time difference, interaural intensity difference and spectral cues that are used for the perception of the location of a sound image. Generally, FIR filters are used in the simulation of HRTFs. However, this method is not useful for a...
The accuracy of state charge estimation results will directly affect the performance battery management system. Due to such, we focus in this article on SOC Lithium-Ion batteries based a fractional second-order RC model with free noninteger differentiation orders. For such an estimation, three Kalman filters are employed: adaptive extended filter (AEKF), (EKF), and Unscented Filter (UKF). Fract...
Introduction In the underlying study we evaluated different single-use filtration systems for cell separation and harvest clarification in 1,000 L scale. A screening of different depth filters was carried out with various single-use filters from Pall, Cuno (3M), Millipore and Sartorius Stedim. In total, we included 85 depth filtrations in the screening. Out of that, two single-use filtration sy...
BACKGROUND Search filters or hedges are search strategies developed to assist information specialists and librarians to retrieve different types of evidence from bibliographic databases. The objectives of this project were to learn about searchers' filter use, how searchers choose search filters and what information they would like to receive to inform their choices. METHODS Interviews with i...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
abstract i the purpose of this study was to launch a thorough investigation concerning the possibility of differing orientations to the writing proficiency construct by native and non-native english speaking teacher raters. it mainly revolved around the international english language testing system (ielts) that is widely administered and employed as a measure of general proficiency in englis...
Background: It has been shown that short-wavelength blue component of the visible light spectrum can alter the circadian rhythm and suppress the level of melatonin hormone. The short-wavelength light emitted by smartphones’ screens can affect the sleep quality of the people who use these devices at night through suppression of melatonin.Objectives: In this study, we examined the effects of co...
Finite-length impulse response (FIR) filters occupy a central place many signal processing applications which either alter the shape, frequency or the sampling frequency of the signal. FIR filters are used because of their stability and possibility to have linear-phase but require a high filter order to achieve the same magnitude specifications as compared to infinite impulse response (IIR) fil...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید