نتایج جستجو برای: error identification techniques

تعداد نتایج: 1229110  

2002
Nan Yan Niu

This talk concerns about mathematical mechanism for transmission error concealment. The previous methods involve concealing the transmission error for DCT (Discrete Cosine Transform) based compression line (e.g. MPEG and JEPG adopted by ISO/IEC). In this talk, we consider the mechanism to recover the transmission error of DWT(Discrete Wavelet Transform) based compression process. Also operation...

Journal: :IEEE Transactions on Antennas and Propagation 1988

2006
Curt Burmeister Helmut Mausser Rafael Mendoza

Managing tracking error on an ex ante basis requires an ability to assess the possible effects of trades on a fund’s performance relative to its benchmark. Given a trading strategy, its potential for reducing tracking error must be balanced against trading costs and return expectations. This chapter presents several simple diagnostic tools to help fund managers evaluate alternative trading stra...

Journal: :Mathematical and Computer Modelling 1999

Journal: :Electr. Notes Theor. Comput. Sci. 2008
Radek Pelánek Václav Rosecký Pavel Moravec

We study explicit techniques for detection of safety errors, e.g., depth-first search, directed search, random walk, and bitstate hashing. We argue that it is not important to find the best technique, but to find a set of complementary techniques. To this end, we choose nine diverse error detection techniques and perform experiments over a large set of models. We compare speed of techniques, le...

Journal: :Journal of the Indian Institute of Sciences 2022

The quantum computing devices of today have tens to hundreds qubits that are highly susceptible noise due unwanted interactions with their environment. theory error correction provides a scheme by which the effects such on states can be mitigated, paving way for realising robust, scalable computers. In this article we survey current landscape correcting (QEC) codes, focusing recent theoretical ...

2014
Chien-Ming Chen Shuai-Min Chen Xinying Zheng Pei-Yu Chen Hung-Min Sun

RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the ...

2011
Su-Youn Yoon Derrick Higgins

This paper presents a method for identifying non-English speech, with the aim of supporting an automated speech proficiency scoring system for non-native speakers. The method uses a popular technique from the language identification domain, a single phone recognizer followed by multiple languagedependent language models. This method determines the language of a speech sample based on the phonot...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید