Search
Now showing items 191-200 of 201
Automatic fall detection for elderly by using features extracted from skeletal data
(IEEE, 2013)
Automatic detection of unusual events such as falls is very important especially for elderly people living alone. Realtime detection of these events can reduce the health risks associated with a fall. In this paper, we ...
The FIRMER-square contour algorithm
(Springer International Publishing, 2013)
The recently proposed Square Contour Algorithm (SCA) provides a good solution to the blind equalization problem as it does not suffer from any type of phase rotation. However, its suitability to Code Division Multiple ...
Energy calibration and resolution of the CMS electromagnetic calorimeter in pp collisions at √s = 7 TeV
(2013-09)
The energy calibration and resolution of the electromagnetic calorimeter (ECAL) of the CMS detector have been determined using proton-proton collision data from LHC operation in 2010 and 2011 at a centre-of-mass energy of ...
Allocating cost of service to customers in inventory routing
(Informs, 2013)
Vendor-managed inventory VMI replenishment is a collaboration between a supplier and its customers, where the supplier is responsible for managing the customers' inventory levels. In the VMI setting we consider, the supplier ...
Sualtı işbirlikli OFDM sistemleri için MP-SAGE kanal kestirimi
(2013)
In this paper, an efficient channel estimation algorithm is proposed for amplify-and-forward (AF) cooperative relay based orthogonal frequency division multiplexing (OFDM) system in the presence of sparse underwater acoustic ...
Welcome from the general chairs
(IEEE, 2013)
A fast circuit topology for finding the maximum of n k-bit numbers
(IEEE, 2013)
Finding the value and/or address (position) of the maximum element of a set of binary numbers is a fundamental arithmetic operation. Numerous systems, which are used in different application areas, require fast (low-latency) ...
Discovering frequent patterns to bootstrap trust
(Springer International Publishing, 2013)
When a new agent enters to an open multiagent system, bootstrapping its trust becomes a challenge because of the lack of any direct or reputational evidence. To get around this problem, existing approaches assume the same ...
Delegation vs. control of component procurement under asymmetric cost information and simple contracts
(Informs, 2013)
A manufacturer must choose whether to delegate component procurement to her tier 1 supplier or control it directly. Because of information asymmetry about suppliers’ production costs and the use of simple quantity discount ...
Measurement of the hadronic activity in events with a Z and two jets and extraction of the cross section for the electroweak production of a Z with two jets in pp collisions at s√=7 TeV
(Springer International Publishing, 2013-10)
The first measurement of the electroweak production cross section of a Z boson with two jets (Zjj) in pp collisions at s√=7s=7 TeV is presented, based on a data sample recorded by the CMS experiment at the LHC with an ...
Share this page