Dissertationen zum Thema „Detection codes“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Detection codes" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Xu, Danfeng. „Iterative coded multiuser detection using LDPC codes“. Thesis, University of Ottawa (Canada), 2007. http://hdl.handle.net/10393/27939.
Der volle Inhalt der QuelleSchiffel, Ute. „Hardware Error Detection Using AN-Codes“. Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2011. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-69872.
Der volle Inhalt der QuelleXiao, Jiaxi. „Information theoretic approach in detection and security codes“. Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/43620.
Der volle Inhalt der QuelleGu, Yu. „Noncoherent communications using space-time trellis codes“. Thesis, University of Canterbury. Electrical and Computer Engineering, 2008. http://hdl.handle.net/10092/1252.
Der volle Inhalt der QuelleKatz, Ettie. „Trellis codes for multipath fading ISI channels with sequential detection“. Diss., Georgia Institute of Technology, 1994. http://hdl.handle.net/1853/13908.
Der volle Inhalt der QuelleOruç, Özgür Altınkaya Mustafa Aziz. „Differential and coherent detection schemes for space-time block codes/“. [s.l.]: [s.n.], 2002. http://library.iyte.edu.tr/tezler/master/elektrikveelektronikmuh/T000133.pdf.
Der volle Inhalt der QuelleKnopp, Raymond. „Module-phase-codes with non-coherent detection and reduced-complexity decoding“. Thesis, McGill University, 1993. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=68034.
Der volle Inhalt der QuelleValenti, Matthew C. „Iterative Detection and Decoding for Wireless Communications“. Diss., Virginia Tech, 1999. http://hdl.handle.net/10919/28290.
Der volle Inhalt der QuellePh. D.
Xu, Chang. „Inconsistency detection and resolution for context-aware pervasive computing /“. View abstract or full-text, 2008. http://library.ust.hk/cgi/db/thesis.pl?CSED%202008%20XU.
Der volle Inhalt der QuelleAlbayrak, Aras. „Automatic Pose and Position Estimation by Using Spiral Codes“. Thesis, Högskolan i Halmstad, Halmstad Embedded and Intelligent Systems Research (EIS), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-27175.
Der volle Inhalt der QuelleLevienaise-Obadia, B. „Efficient texture-based indexing for interactive image retrieval and cue detection“. Thesis, University of Surrey, 2001. http://epubs.surrey.ac.uk/842806/.
Der volle Inhalt der QuelleAkdemir, Kahraman D. „Error Detection Techniques Against Strong Adversaries“. Digital WPI, 2010. https://digitalcommons.wpi.edu/etd-dissertations/406.
Der volle Inhalt der QuelleKhatami, Seyed Mehrdad. „Read Channel Modeling, Detection, Capacity Estimation and Two-Dimensional Modulation Codes for TDMR“. Diss., The University of Arizona, 2015. http://hdl.handle.net/10150/577306.
Der volle Inhalt der QuelleKagioglidis, Ioannis. „Performance analysis of a LINK-16/JTIDS compatible waveform with noncoherent detection, diversity and side information“. Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FKagioglidis%5FECE.pdf.
Der volle Inhalt der QuelleThesis Advisor(s): Robertson, R. Clark. "September 2009." Description based on title screen as viewed on 6 November 2009. Author(s) subject terms: Link-16/JTIDS, (31, 15) Reed-Solomon (RS) coding, 32-ary Orthogonal signaling, Additive White Gaussian Noise (AWGN), Pulse-Noise Interference (PNI), Perfect Side Information (PSI). Includes bibliographical references (p. 49-51). Also available in print.
Crowe, Don Raymond. „Error detection abilities of conducting students under four modes of instrumental score study“. Diss., The University of Arizona, 1994. http://hdl.handle.net/10150/186656.
Der volle Inhalt der QuelleArabaci, Murat. „Nonbinary-LDPC-Coded Modulation Schemes for High-Speed Optical Communication Networks“. Diss., The University of Arizona, 2010. http://hdl.handle.net/10150/195826.
Der volle Inhalt der QuelleHillier, Caleb Pedro. „A system on chip based error detection and correction implementation for nanosatellites“. Thesis, Cape Peninsula University of Technology, 2018. http://hdl.handle.net/20.500.11838/2841.
Der volle Inhalt der QuelleThis thesis will focus on preventing and overcoming the effects of radiation in RAM on board the ZA cube 2 nanosatellite. The main objective is to design, implement and test an effective error detection and correction (EDAC) system for nanosatellite applications using a SoC development board. By conducting an in-depth literature review, all aspects of single-event effects are investigated, from space radiation right up to the implementation of an EDAC system. During this study, Hamming code was identified as a suitable EDAC scheme for the prevention of single-event effects. During the course of this thesis, a detailed radiation study of ZA cube 2’s space environment is conducted. This provides insight into the environment to which the satellite will be exposed to during orbit. It also provides insight which will allow accurate testing should accelerator tests with protons and heavy ions be necessary. In order to understand space radiation, a radiation study using ZA cube 2’s orbital parameters was conducted using OMERE and TRIM software. This study included earth’s radiation belts, galactic cosmic radiation, solar particle events and shielding. The results confirm that there is a need for mitigation techniques that are capable of EDAC. A detailed look at different EDAC schemes, together with a code comparison study was conducted. There are two types of error correction codes, namely error detection codes and error correction codes. For protection against radiation, nanosatellites use error correction codes like Hamming, Hadamard, Repetition, Four Dimensional Parity, Golay, BCH and Reed Solomon codes. Using detection capabilities, correction capabilities, code rate and bit overhead each EDAC scheme is evaluated and compared. This study provides the reader with a good understanding of all common EDAC schemes. The field of nanosatellites is constantly evolving and growing at a very fast speed. This creates a growing demand for more advanced and reliable EDAC systems that are capable of protecting all memory aspects of satellites. Hamming codes are extensively studied and implemented using different approaches, languages and software. After testing three variations of Hamming codes, in both Matlab and VHDL, the final and most effective version was Hamming [16, 11, 4]2. This code guarantees single error correction and double error detection. All developed Hamming codes are suited for FPGA implementation, for which they are tested thoroughly using simulation software and optimised.
Radhakrishnan, Rathnakumar. „Detection and Decoding for Magnetic Storage Systems“. Diss., The University of Arizona, 2009. http://hdl.handle.net/10150/194396.
Der volle Inhalt der QuelleOlivier, James L. „Concurrent error detection in arithmetic processors using [absolute value of] g3N [subscript m] codes /“. The Ohio State University, 1988. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487597424135791.
Der volle Inhalt der QuelleChih, Samuel C. M. „Error detection capability and coding schemes for fiber optic communication“. Diss., Georgia Institute of Technology, 1994. http://hdl.handle.net/1853/14854.
Der volle Inhalt der QuelleUrbani, Camilla. „Stabilizer Codes for Quantum Error Correction and Synchronization“. Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017.
Den vollen Inhalt der Quelle findenDorfman, Vladimir. „Detection and coding techniques for partial response channels /“. Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2003. http://wwwlib.umi.com/cr/ucsd/fullcit?p3094619.
Der volle Inhalt der QuelleAltekar, Shirish A. „Detection and coding techniques for magnetic recording channels /“. Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 1997. http://wwwlib.umi.com/cr/ucsd/fullcit?p9804513.
Der volle Inhalt der QuelleMein, Gordon F. (Gordon Francis) Carleton University Dissertation Engineering Electrical. „A study of common logic design errors and methods for their detection“. Ottawa, 1988.
Den vollen Inhalt der Quelle findenGrymel, Martin-Thomas. „Error control with binary cyclic codes“. Thesis, University of Manchester, 2013. https://www.research.manchester.ac.uk/portal/en/theses/error-control-with-binary-cyclic-codes(a5750b4a-e4d6-49a8-915b-3e015387ad36).html.
Der volle Inhalt der QuelleGrabner, Mitchell J. „A Cognitive MIMO OFDM Detector Design for Computationally Efficient Space-Time Decoding“. Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1538696/.
Der volle Inhalt der QuelleSchiffel, Ute [Verfasser], Christof [Akademischer Betreuer] Fetzer und Wolfgang [Akademischer Betreuer] Ehrenberger. „Hardware Error Detection Using AN-Codes / Ute Schiffel. Gutachter: Christof Fetzer ; Wolfgang Ehrenberger. Betreuer: Christof Fetzer“. Dresden : Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2011. http://d-nb.info/1067189289/34.
Der volle Inhalt der QuelleAchanta, Raghavendra. „Detection and correction of global positional system carrier phase measurement anomalies“. Ohio : Ohio University, 2004. http://www.ohiolink.edu/etd/view.cgi?ohiou1089745184.
Der volle Inhalt der QuelleMorozov, Alexei. „Optimierung von Fehlererkennungsschaltungen auf der Grundlage von komplementären Ergänzungen für 1-aus-3 und Berger Codes“. Phd thesis, Universität Potsdam, 2005. http://opus.kobv.de/ubp/volltexte/2005/536/.
Der volle Inhalt der QuelleIn this dissertation concurrent checking by use of a complementary circuit for an 1-out-of-n Codes and Berger-Code is investigated. For an arbitrarily given combinational circuit necessary and sufficient conditions for the existence of a totally self-checking checker are derived for the first time.
Tkachenko, Iuliia. „Generation and analysis of graphical codes using textured patterns for printed document authentication“. Thesis, Montpellier, 2015. http://www.theses.fr/2015MONTS148/document.
Der volle Inhalt der QuelleDue to the development and availability of printing and scanning devices, the number of forged/counterfeited valuable documents and product packages is increasing. Therefore, different security elements (holograms, inks, papers) have been suggested to prevent these illegal actions. In this thesis, we focus on printed security elements that give access to a high security level with an easy implementation and integration. We present how to generate several novel security elements that aim to protect valuable documents and packaging against unauthorized copying process. Moreover, these security elements allow us to store a huge amount of hidden information.The main characteristic of these security elements is their sensitivity to the print-and-scan process. This sensitivity stems from the use of specific textured patterns. These patterns, which are binary images, have a structure that changes during the printing, scanning and copying processes. We define new specific criteria that ensures the chosen textured patterns to have the appropriate property. The amount of additional information encoded in the patterns increases with the number of patterns used.Additionally, we propose a new weighted mean squared error measure to improve the robustness of module detection for any high density barcodes. Thanks to this measure, the recognition rate of modules used in standard high density barcodes after print-and-scan process can be significantly increased. Finally, we experimentally study several effects: the physical print-and-scan process, separation of scanner noise from printer noise and changes of colors after print-and-scan process. We conclude, from these experimental results, that the print-and-scan process cannot be considered as being a Gaussian process. It has been also highlighted that this process is neither white nor ergodic in the wide sense
Bahceci, Israfil. „Multiple-Input Multiple-Output Wireless Systems: Coding, Distributed Detection and Antenna Selection“. Diss., Available online, Georgia Institute of Technology, 2005, 2005. http://etd.gatech.edu/theses/available/etd-08262005-022321/.
Der volle Inhalt der QuelleAltunbasak, Yucel, Committee Chair ; Mersereau, Russell M., Committee Member ; Fekri, Faramarz, Committee Member ; Smith, Glenn, Committee Member ; Huo, Xiaoming, Committee Member. Includes bibliographical references.
Von, Solms Suné. „Design of effective decoding techniques in network coding networks / Suné von Solms“. Thesis, North-West University, 2013. http://hdl.handle.net/10394/9544.
Der volle Inhalt der QuelleThesis (PhD (Computer Engineering))--North-West University, Potchefstroom Campus, 2013
Gaubatz, Gunnar. „Tamper-resistant arithmetic for public-key cryptography“. Worcester, Mass. : Worcester Polytechnic Institute, 2007. http://www.wpi.edu/Pubs/ETD/Available/etd-030107-115645/.
Der volle Inhalt der QuelleKeywords: Side Channel Attacks; Fault Attacks; Public-Key Cryptography; Error Detection; Error Detecting Codes. Includes bibliographical references (leaves 127-136).
Tsai, Meng-Ying (Brady). „Iterative joint detection and decoding of LDPC-Coded V-BLAST systems“. Thesis, Kingston, Ont. : [s.n.], 2008. http://hdl.handle.net/1974/1304.
Der volle Inhalt der QuelleTa, Thanh Dinh. „Modèle de protection contre les codes malveillants dans un environnement distribué“. Thesis, Université de Lorraine, 2015. http://www.theses.fr/2015LORR0040/document.
Der volle Inhalt der QuelleThe thesis consists in two principal parts: the first one discusses the message for- mat extraction and the second one discusses the behavioral obfuscation of malwares and the detection. In the first part, we study the problem of “binary code coverage” and “input message format extraction”. For the first problem, we propose a new technique based on “smart” dynamic tainting analysis and reverse execution. For the second one, we propose a new method using an idea of classifying input message values by the corresponding execution traces received by executing the program with these input values. In the second part, we propose an abstract model for system calls interactions between malwares and the operating system at a host. We show that, in many cases, the behaviors of a malicious program can imitate ones of a benign program, and in these cases a behavioral detector cannot distinguish between the two programs
Potter, Chris, Kurt Kosbar und Adam Panagos. „Hardware Discussion of a MIMO Wireless Communication System Using Orthogonal Space Time Block Codes“. International Foundation for Telemetering, 2008. http://hdl.handle.net/10150/606194.
Der volle Inhalt der QuelleAlthough multiple-input multiple-output (MIMO) systems have become increasingly popular, the existence of real time results to compare with those predicted by theory is still surprisingly limited. In this work the hardware description of a MIMO wireless communication system using orthogonal space time block codes (OSTBC) is discussed for two antennas at both the transmitter and receiver. A numerical example for a frequency flat time correlated channel is given to show the impact of channel estimation.
Shaheem, Asri. „Iterative detection for wireless communications“. University of Western Australia. School of Electrical, Electronic and Computer Engineering, 2008. http://theses.library.uwa.edu.au/adt-WU2008.0223.
Der volle Inhalt der QuelleHällgren, Karl-Johan. „Waveform agility for robust radar detection and jamming mitigation“. Thesis, Uppsala universitet, Fasta tillståndets elektronik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-453241.
Der volle Inhalt der QuelleRadar är fundamentalt i modern krigsföring. Med en radar kan man avfyra vapen från säkra avstånd och med precision mäta in mål. En radarstörare har som mål att förhindra en radar från att mäta in sitt mål. Då radarn fungerar genom att sända ut specifikt modulerade radiovågspulser och lyssna efter ekot från omgivningen kan störaren förhindra detta genom att antingen sända mycket starkt brus, eller genom att sända radiovågspulser med samma specifika modulation. Den senare metoden kallas för DRFM-störning, där förkortningen står för Digitalt RadioFrekvens-Minne, vilket antyder att störaren kan minnas radarns modulation och själv använda den. Om radarn använder en ny modulation (eng: waveform) för varje puls kan störaren inte använda modulationen den minns från förra pulsen utan måste vänta på att nästa puls träffar den innan den kan repetera pulsen, vilket begränsar dess störförmåga. Denna rapport tänker sig att radarn har en begränsad uppsättning av modulationer att byta mellan, och undersöker olika sådana uppsättningar och bedömer och jämför dem på olika mått av radarprestanda och störtålighet. Radioprestandamåtten inkluderar hur mycket förstärkning och hur fin upplösning man får av modulationen, hur väl modulationen kan hantera mycket snabba mål, och hur stora "sidolober" som uppstår runt starka mål. Sidolobsfenomenet är jämförbart med det optiska fenomenet där små men ljusstarka saker på natten kan se ut att ha en ljus halo eller ljusa utstrålningar runt sig. Störtålighetsmåtten kvantifierar hur distinkta de olika modulationerna i radarns uppsättning är, och på så vis hur väl radarn kan urskilja en modulation från de andra, tillsammans med hur liten sannolikheten är att störaren lyckas välja just den modulation vi kommer använda till nästa puls. Resultaten visar att metoden av modulationsbyten kan ge nästan lika stor störtålighet som en välkänd metod, PRI-jitter, ger själv och något högre i kombination med den metoden. Bättre störtålighet visas gå hand i hand med sämre mått på radarprestanda, men mindre strukturerade spektrogram vilket antyder att de kan vara svårare att upptäckas av radarspanare. Försämringen i måtten på radarprestanda innebär inte nödvändigtvis en lika stor försämring i faktisk radarprestanda, då sidoloberna tar an en brusartad karaktär vilket leder till praktiska fördelar gentemot de vanliga fixa sidoloberna.
Batshon, Hussam George. „Coded Modulation for High Speed Optical Transport Networks“. Diss., The University of Arizona, 2010. http://hdl.handle.net/10150/194075.
Der volle Inhalt der QuelleRaorane, Pooja Prakash. „Sampling Based Turbo and Turbo Concatenated Coded Noncoherent Modulation Schemes“. University of Toledo / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1279071861.
Der volle Inhalt der QuelleSTEFANI, GIOVANNI L. de. „Sobre a técnica de Rod Drop em medidas de reatividade integral em bancos de controle e segurança de reatores nucleares“. reponame:Repositório Institucional do IPEN, 2013. http://repositorio.ipen.br:8080/xmlui/handle/123456789/10210.
Der volle Inhalt der QuelleMade available in DSpace on 2014-10-09T13:59:23Z (GMT). No. of bitstreams: 0
Dissertação (Mestrado)
IPEN/D
Instituto de Pesquisas Energeticas e Nucleares - IPEN-CNEN/SP
Gerber, Egardt. „The use of classification methods for gross error detection in process data“. Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/85856.
Der volle Inhalt der QuelleENGLISH ABSTRACT: All process measurements contain some element of error. Typically, a distinction is made between random errors, with zero expected value, and gross errors with non-zero magnitude. Data Reconciliation (DR) and Gross Error Detection (GED) comprise a collection of techniques designed to attenuate measurement errors in process data in order to reduce the effect of the errors on subsequent use of the data. DR proceeds by finding the optimum adjustments so that reconciled measurement data satisfy imposed process constraints, such as material and energy balances. The DR solution is optimal under the assumed statistical random error model, typically Gaussian with zero mean and known covariance. The presence of outliers and gross errors in the measurements or imposed process constraints invalidates the assumptions underlying DR, so that the DR solution may become biased. GED is required to detect, identify and remove or otherwise compensate for the gross errors. Typically GED relies on formal hypothesis testing of constraint residuals or measurement adjustment-based statistics derived from the assumed random error statistical model. Classification methodologies are methods by which observations are classified as belonging to one of several possible groups. For the GED problem, artificial neural networks (ANN’s) have been applied historically to resolve the classification of a data set as either containing or not containing a gross error. The hypothesis investigated in this thesis is that classification methodologies, specifically classification trees (CT) and linear or quadratic classification functions (LCF, QCF), may provide an alternative to the classical GED techniques. This hypothesis is tested via the modelling of a simple steady-state process unit with associated simulated process measurements. DR is performed on the simulated process measurements in order to satisfy one linear and two nonlinear material conservation constraints. Selected features from the DR procedure and process constraints are incorporated into two separate input vectors for classifier construction. The performance of the classification methodologies developed on each input vector is compared with the classical measurement test in order to address the posed hypothesis. General trends in the results are as follows: - The power to detect and/or identify a gross error is a strong function of the gross error magnitude as well as location for all the classification methodologies as well as the measurement test. - For some locations there exist large differences between the power to detect a gross error and the power to identify it correctly. This is consistent over all the classifiers and their associated measurement tests, and indicates significant smearing of gross errors. - In general, the classification methodologies have higher power for equivalent type I error than the measurement test. - The measurement test is superior for small magnitude gross errors, and for specific locations, depending on which classification methodology it is compared with. There is significant scope to extend the work to more complex processes and constraints, including dynamic processes with multiple gross errors in the system. Further investigation into the optimal selection of input vector elements for the classification methodologies is also required.
AFRIKAANSE OPSOMMING: Alle prosesmetings bevat ʼn sekere mate van metingsfoute. Die fout-element van ʼn prosesmeting word dikwels uitgedruk as bestaande uit ʼn ewekansige fout met nul verwagte waarde, asook ʼn nie-ewekansige fout met ʼn beduidende grootte. Data Rekonsiliasie (DR) en Fout Opsporing (FO) is ʼn versameling van tegnieke met die doelwit om die effek van sulke foute in prosesdata op die daaropvolgende aanwending van die data te verminder. DR word uitgevoer deur die optimale veranderinge aan die oorspronklike prosesmetings aan te bring sodat die aangepaste metings sekere prosesmodelle gehoorsaam, tipies massa- en energie-balanse. Die DR-oplossing is optimaal, mits die statistiese aannames rakende die ewekansige fout-element in die prosesdata geldig is. Dit word tipies aanvaar dat die fout-element normaal verdeel is, met nul verwagte waarde, en ʼn gegewe kovariansie matriks. Wanneer nie-ewekansige foute in die data teenwoordig is, kan die resultate van DR sydig wees. FO is daarom nodig om nie-ewekansige foute te vind (Deteksie) en te identifiseer (Identifikasie). FO maak gewoonlik staat op die statistiese eienskappe van die meting aanpassings wat gemaak word deur die DR prosedure, of die afwykingsverskil van die model vergelykings, om formele hipoteses rakende die teenwoordigheid van nie-ewekansige foute te toets. Klassifikasie tegnieke word gebruik om die klasverwantskap van observasies te bepaal. Rakende die FO probleem, is sintetiese neurale netwerke (SNN) histories aangewend om die Deteksie en Identifikasie probleme op te los. Die hipotese van hierdie tesis is dat klassifikasie tegnieke, spesifiek klassifikasiebome (CT) en lineêre asook kwadratiese klassifikasie funksies (LCF en QCF), suksesvol aangewend kan word om die FO probleem op te los. Die hipotese word ondersoek deur middel van ʼn simulasie rondom ʼn eenvoudige gestadigde toestand proses-eenheid wat aan een lineêre en twee nie-lineêre vergelykings onderhewig is. Kunsmatige prosesmetings word geskep met behulp van lukrake syfers sodat die foutkomponent van elke prosesmeting bekend is. DR word toegepas op die kunsmatige data, en die DR resultate word gebruik om twee verskillende insetvektore vir die klassifikasie tegnieke te skep. Die prestasie van die klassifikasie metodes word vergelyk met die metingstoets van klassieke FO ten einde die gestelde hipotese te beantwoord. Die onderliggende tendense in die resultate is soos volg: - Die vermoë om ‘n nie-ewekansige fout op te spoor en te identifiseer is sterk afhanklik van die grootte asook die ligging van die fout vir al die klassifikasie tegnieke sowel as die metingstoets. - Vir sekere liggings van die nie-ewekansige fout is daar ‘n groot verskil tussen die vermoë om die fout op te spoor, en die vermoë om die fout te identifiseer, wat dui op smering van die fout. Al die klassifikasie tegnieke asook die metingstoets baar hierdie eienskap. - Oor die algemeen toon die klassifikasie metodes groter sukses as die metingstoets. - Die metingstoets is meer suksesvol vir relatief klein nie-ewekansige foute, asook vir sekere liggings van die nie-ewekansige fout, afhangende van die klassifikasie tegniek ter sprake. Daar is verskeie maniere om die bestek van hierdie ondersoek uit te brei. Meer komplekse, niegestadigde prosesse met sterk nie-lineêre prosesmodelle en meervuldige nie-ewekansige foute kan ondersoek word. Die moontlikheid bestaan ook om die prestasie van klassifikasie metodes te verbeter deur die gepaste keuse van insetvektor elemente.
Ellinger, John David. „Multi-Carrier Radar for Target Detection and Communications“. Wright State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=wright1463839176.
Der volle Inhalt der QuelleNeal, David A. „Utilizing Correct Prior Probability Calculation to Improve Performance of Low-Density Parity-Check Codes in the Presence of Burst Noise“. DigitalCommons@USU, 2012. https://digitalcommons.usu.edu/etd/1402.
Der volle Inhalt der QuelleUriarte, Toboso Alain. „Optimum Ordering for Coded V-BLAST“. Thesis, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/23509.
Der volle Inhalt der QuelleParreau, Aline. „Problèmes d'identification dans les graphes“. Phd thesis, Université de Grenoble, 2012. http://tel.archives-ouvertes.fr/tel-00745054.
Der volle Inhalt der QuelleKašpar, Jakub. „Vyhodnocení podobnosti programových kódů“. Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-241092.
Der volle Inhalt der QuelleBenaddi, Tarik. „Sparse graph-based coding schemes for continuous phase modulations“. Phd thesis, Toulouse, INPT, 2015. http://oatao.univ-toulouse.fr/16037/1/Benaddi_Tarik.pdf.
Der volle Inhalt der QuelleHua, Nan. „Space-efficient data sketching algorithms for network applications“. Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44899.
Der volle Inhalt der QuelleFu, Shengli. „Space-time coding and decoding for MIMO wireless communication systems“. Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file 0.57Mb, 156 p, 2005. http://wwwlib.umi.com/dissertations/fullcit?3182631.
Der volle Inhalt der Quelle