نتایج جستجو برای: error identification techniques
تعداد نتایج: 1229110 فیلتر نتایج به سال:
Face Recognition is a technique that can be used for verification and identification. The main objective is to maximize the accuracy and to minimize the complexity, time and error factors. The success of Face Recognition can be ensured by various techniques like ICA (Independent Component Analysis, PCA (Principle Component Analysis, MIS (Mirror Image Superposition), GF (Gaussian Filtering) and ...
since the pioneering work of zadeh, fuzzy set theory has been applied to amyriad of areas. song and chissom introduced the concept of fuzzy time series andapplied some methods to the enrolments of the university of alabama. thereafter weapply fuzzy techniques for system identification and apply statistical techniques tomodelling system. an automatic methodology framework that combines fuzzytech...
Human error identification systems have been criticised for failing to consider the problems of operational incident investigators and system developers. Increasingly esoteric human error modelling and classification approaches have often been met with resistance from the potential user groups that could apply them with the greatest impact. In order to improve the transfer of this technology, e...
In this paper, a range difference estimation technique with NLOS error mitigation by using biased Kalman filter for ultra-wideband (UWB) environments is presented. NLOS error is considered one of the major error sources in wireless location systems. To improve TDOA location accuracy in UWB location systems, NLOS identification and mitigation techniques suitable for UWB systems are derived. Kalm...
An algorithm to generate representations of system identification (SI) errors, which enables systematic testing of the performance of system equalization techniques, is proposed. With this algorithm, the normalized projection misalignment (NPM) of the generated error representation can be chosen to suit the particular characteristics of the application under test. Additionally, the generated er...
Smart phones are now being used to store users’ identities and sensitive information/data. Therefore, it is important to authenticate legitimate users of a smart phone and to block imposters. In this paper, we demonstrate that keystroke dynamics of a smart phone user can be translated into a viable features’ set for accurate user identification. To this end, we collect and analyze keystroke dat...
System identification using infinite-impulse-response (IIR) model is considered. Because the error surface of IIR filters is generally multi-modal, global optimisation techniques are preferred in order to avoid local minima. An efficient global optimisation method, called the adaptive simulated annealing (ASA), is adopted, and a new batch-recursive ASA algorithm is developed for on-line identif...
Received Jan 14, 2013 Revised Mar 19, 2013 Accepted Mar 28, 2013 A comparative study of methods for fractional system identification is presented in this paper. The fractional system is modeled by the help of a non integer integrator which is approximated by a J+1 dimensional modal system composed of an integrator and first order systems. This identification method is compared to other techniqu...
In this correspondence, an on-line state and parameter identification scheme for hidden Markov models (HMM’s) with states in a finite-discrete set is developed using recursive prediction error (RPE) techniques. The parameters of interest are the transition probabilities and discrete state values of a Markov chain. The noise density associated with the observations can also be estimated. Impleme...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید