نتایج جستجو برای: undesirable input

تعداد نتایج: 235596  

Journal: :International Journal of Orthodontia and Oral Surgery (1919) 1919

Journal: :CoRR 2010
Feng Gu Julie Greensmith Robert F. Oates Uwe Aickelin

As one of the newest members in the field of artificial immune systems (AIS), the Dendritic Cell Algorithm (DCA) is based on behavioural models of natural dendritic cells (DCs). Unlike other AIS, the DCA does not rely on training data, instead domain or expert knowledge is required to predetermine the mapping between input signals from a particular instance to the three categories used by the D...

2015
Raghavendra Gupta

In this brief, types of frequency compensation for operation transconductance amplifier are explained in detail. Compensation which is used to enhance frequency stability of the OTA, and to make gain and phase linear for required frequency range. As we know capacitor inside the OTA causes output to lag behind by 90° with each pole they create, If the addition of these phase lags add-up to 360°,...

Journal: :I. J. Bifurcation and Chaos 2004
Ying-Cheng Lai Zonghua Liu Arje Nachman Liqiang Zhu

To suppress undesirable noise (jamming) associated with signals is important for many applications. Here we explore the idea of jamming suppression with realistic, aperiodic signals by stochastic resonance. In particular, we consider weak amplitude-modulated (AM), frequencymodulated (FM), and chaotic signals with strong, broad-band or narrow-band jamming, and show that aperiodic stochastic reso...

2014
C. Yfoulis D. Giaouris F. Stergiopoulos C. Ziogou S. Voutetakis S. Papadopoulou

This paper proposes a new methodology for designing robust affine state-feedback control laws, so that wide-range safe and efficient operation of switched-mode DC-DC boost converters is guaranteed. Several undesirable nonlinear phenomena such as unstable attractors and subharmonic oscillations are avoided through bifurcation analysis based on the bilinear averaged model of the converter. The co...

2015
Vadim Okun Elizabeth Fong

Multiple techniques and tools, including static analysis and testing, should be used for software assurance. Fuzz testing is one such technique that can be effective for finding security vulnerabilities. In contrast with traditional testing, fuzz testing only monitors the program for crashes or other undesirable behavior. This makes it feasible to run a very large number of test cases. This art...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید