نتایج جستجو برای: cosine aftertreatment techniques

تعداد نتایج: 639159  

2012
Ramamohan Reddy

This paper presents an improvement of digital differential relay reliability for protecting a large power transfer is discussed. First, the Fourier sine and cosine coefficients required for fundamental, second third and fifth harmonies determination have been calculated using rectangular transfer technique. Then, these harmonics have been used in harmonics restrain and blocking techniques used ...

2014
Anshul Soni Ashok Chandra Tiwari

Peak Signal-to-Noise Ratio (PSNR) is a serious issue in OFDM systems. Several techniques have been proposed by researchers to maintain PSNR. In this paper, the Peak Signal-to-Noise Ratio (PSNR) performance of conventional Fast Fourier Transform (FFT)-OFDM system and discrete cosine transform (DCT)-OFDM system is compared with discrete wavelet transform (DWT)-OFDM system in a Gaussian Noise envi...

Journal: :Atmosphere 2022

Aftertreatment technologies in Tier 4 off-road engines have resulted significant emission reductions compared to older tier without aftertreatments. The appropriate characterization of engine emissions consideration aftertreatment operation is important for projecting and developing mitigation strategies. current method aggregating over an entire duty cycle averaging them by load has a limitati...

The purpose of multi-focus image fusion is gathering the essential information and the focused parts from the input multi-focus images into a single image. These multi-focus images are captured with different depths of focus of cameras. A lot of multi-focus image fusion techniques have been introduced using considering the focus measurement in the spatial domain. However, the multi-focus image ...

2015
Wojciech Chojnacki

A classic result, in its early form due to Cox [2], states that if A is a normed algebra with a unity denoted by 1 and a is an element of A such that supn∈N ‖a− 1‖ < 1, then a = 1. Cox’s version concerned the case of square matrices of a given size. This was later extended to bounded operators on Hilbert space by Nakamura and Yoshida [6], and to an arbitrary normed algebra by Hirschfeld [4] and...

2008
Lakshmish Kaushik Douglas D. O'Shaughnessy

This paper introduces a new method of voice activity detection (VAD) using modified Wigner-Ville distribution. Modified Wigner-Ville distribution can track the speech regions efficiently in noisy environments. Fourier Transform (FT) and Discrete Cosine Transform (DCT) variants of Wigner-Ville distribution based, voice activity detection schemes are presented. The efficient time frequency spectr...

2014
Navjot Kaur Ashima Bansal

Steganography is an important area of research in recent years involving a number of applications. It is the science of embedding information into the cover image viz., text, video, and image (payload) without causing statistically significant modification to the cover image. This paper deals with hiding text in an image file using using various Steganography techniques. Discrete Cosine Transfo...

2000
Chengfa Wang Qiusheng Wang

This paper presents a novel watermarking technique for digital audio signals. A visually recognizable binary image served as a watermark is embedded into an audio signal in discrete cosine transform domain. In order to enhance robustness and make good use of masking characteristics of the audio signal, the techniques of pseudo-random permutation and energy-based permutation are used during wate...

2009
Jae Yoon Chung Byungchul Park Young J. Won John Strassner James Won-Ki Hong

Due to the various masquerading strategies adopted by newer P2P applications to avoid detection and filtering, well-known port mapping techniques cannot guarantee their accuracy any more. Alternative approaches, application-signature mapping, behavior-based analysis, and machine learning based classification methods, show more promising accuracy. However, these methods still have complexity iss...

2002
Sung-Bum Park Chang-Su Kim Sang Uk Lee

In this paper, we propose a progressive compression algorithm for three-dimensional (3-D) mesh data, which can efficiently encode the connectivity and geometry information. Using cosine index predictor and vertex confinement rule, the proposed scheme encodes the connectivity information compactly. For the geometry information coding, a 2-stage geometry predictor is proposed to reduce the predic...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید