Browsing by Title
Now showing items 5080-5099 of 5783
-
Spectrally selective filter design for passive radiative cooling
(The Optical Society, 2020-04-01)Radiative cooling is potentially one of the most innovative approaches to reducing energy density in buildings and industry, as well as achieving higher levels of energy efficiency. Several studies have reported the design ... -
Spectrum sensing of correlated subbands with colored noise in cognitive radios
(IEEE, 2012)In this paper, we consider the problem of wideband spectrum sensing by using the correlation among the observation samples in different subbands. The Primary User (PU) signal samples in occupied subbands are assumed to be ... -
Spectrum trading for non-identical channel allocation in cognitive radio networks
(IEEE, 2011)In this paper, we investigate spectrum trading via auction approach for cognitive radio networks. We consider a realistic valuation function in terms of different parameters for secondary users (SUs), and propose an efficient ... -
Spectrum trading for non-identical channel allocation in cognitive radio networks
(IEEE, 2013)In this paper, we investigate spectrum trading via auction approach for exclusive usage spectrum access model in cognitive radio networks. We consider a realistic valuation function which depends on channel capacity, delay ... -
Spectrum trading for risky environments in IEEE 802.22 cognitive networks
(IEEE, 2011)In this paper, we consider the shared used model in the context of IEEE 802.22 cognitive and investigate spectrum trading via auction approach. We consider two different scenarios in which the dominant risk is either ... -
Spectrum-based fault localization for diagnosing concurrency faults
(Springer Science+Business Media, 2013)Concurrency faults are activated by specific thread interleavings at runtime. Traditional fault localization techniques and static analysis fall short to diagnose these faults efficiently. Existing dynamic fault-localization ... -
Spencer Adası
(1901-03) -
Spending "quality"' time with the web video
(IEEE, 2016)For consumers, watching video over the Web is the most popular way to access free and premium content on connected devices. The underlying technology -- HTTP adaptive streaming -- is straightforward; however, due to quality ... -
Spin content of Λ in QCD sum rules
(American Physical Society, 2009-06-01)We calculate the isoscalar axial-vector coupling constants of the Λ hyperon using the method of QCD sum rules. A determination of these coupling constants reveals the individual contributions of the u, d, and the s quarks ... -
Spin correlations and new physics in τ -lepton decays at the LHC
(Springer International Publishing, 2015-07)We use spin correlations to constrain anomalous τ -lepton couplings at the LHC including its anomalous magnetic moment, electric dipole moment and weak dipole moments. Single spin correlations are ideal to probe interference ... -
A split delivery vehicle routing problem for daily tobacco delivery
One of the Turkey's largest cigarette manufacturer, located in Izmir, receives distributors' orders from all over Turkey every day. Processed and packed cigarettes are distributed to all distributors in different locations ... -
Spoofing and anti-spoofing techniques for text-independent speaker verification systems
(2015-10)There has been substantial progress in the speaker verification field in recent years. I-vector based approach in particular received significant attention due to its high performance. Improvements in the verification ... -
Spoofing attacks to i-vector based voice verification systems using statistical speech synthesis with additive noise and countermeasure
(IEEE, 2016)Even though improvements in the speaker verification (SV) technology with i-vectors increased their real-life deployment, their vulnerability to spoofing attacks is a major concern. Here, we investigated the effectiveness ... -
Spoofing voice verification systems with statistical speech synthesis using limited adaptation data
(Elsevier, 2017-03)State-of-the-art speaker verification systems are vulnerable to spoofing attacks using speech synthesis. To solve the issue, high-performance synthetic speech detectors (SSDs) for attack methods have been proposed recently. ... -
Spor hukukunda doping
(2018-11)Spor müsabakalarındaki doping uygulamalarının sporun doğasına, yarışmadaki eşitlik ve adalet ilkelerine ters düştüğü, doping yapan sporcunun haksız şekilde diğer sporculara karşı bir avantaj sağladığı açıktır. Bu çalışmada ... -
Spreading behavior of droplets impacting over substrates with varying surface topographies
(Elsevier, 2020-12-05)Droplet interaction with solid surface plays an important role in a number of practical applications such as thermal management systems, steel production, painting, prevention of impurit deposition, and formation of ... -
Spurred or spurned? The effects of combined innovations and major obstacles on B2B SME capability generation and future focus
(Elsevier, 2023-08)Expanding organizational learning theory and ambidextrous theory, this research investigates the potential differences in connections between business-to-business (B2B) small to medium enterprises (SME) engaging in customer ... -
A stability analysis for the acceleration-based robust position control of robot manipulators via disturbance observer
(IEEE, 2018-10)This paper proposes a new nonlinear stability analysis for the acceleration-based robust position control of robot manipulators by using disturbance observer (DOb). It is shown that if the nominal inertia matrix is properly ... -
Stable control of force, position, and stiffness for robot joints powered via pneumatic muscles
(IEEE, 2019-12)This paper proposes a novel controller framework for antagonistically driven pneumatic artificial muscle (PAM) actuators. The proposed controller can be stably configured in both torque-stiffness control and position-stiffness ...
Share this page