• 沒有找到結果。

[PDF] Top 20 A jointed mode detection and symbol detection scheme for DVB-T

Has 10000 "A jointed mode detection and symbol detection scheme for DVB-T" found on our website. Below are the top 20 most common "A jointed mode detection and symbol detection scheme for DVB-T".

A jointed mode detection and symbol detection scheme for DVB-T

A jointed mode detection and symbol detection scheme for DVB-T

... length and width of 1K SRAM block is 8K and 12 ...proposes a twisted memory access ...read and write accesses in turn, the delay line can be realized by single port memory rather than dual ... See full document

6

Blind mode/GI detection and coarse symbol synchronization for DVB-T/H

Blind mode/GI detection and coarse symbol synchronization for DVB-T/H

... access scheme for Nsc delay-line is presented in ...writing mode; and it is to access the whole 8K memory as the access direction ...modes for reading operation, 2K-1, 4K-1 and ... See full document

4

Mode detection, synchronization, and channel estimation for DVB-T OFDM receiver

Mode detection, synchronization, and channel estimation for DVB-T OFDM receiver

... is a next-generation standard for wireless broadcast of MPEG-2 video ...required for video transmission, concatenated-coded orthogonal frequency division multiplexing (OFDM) has been adopted into ... See full document

5

A fast failure detection and failover scheme for SIP high availability networks

A fast failure detection and failover scheme for SIP high availability networks

... of a SIP network, can be in a form of a cluster to prevent service unavailability caused by software or hardware ...of a SIP proxy server cluster with a single dispatcher in a ... See full document

4

A classification-based fault detection and isolation scheme for the ion implanter

A classification-based fault detection and isolation scheme for the ion implanter

... HCT A. Introduction There exist numerous classification techniques for classifica- tion problems of continuous attributes such as the neural net- work approach [19], [20], maximum-likelihood approach [21], ... See full document

14

A Unified Detection Scheme for Crosstalk Effects in Interconnection Bus

A Unified Detection Scheme for Crosstalk Effects in Interconnection Bus

... ONSIDERATIONS FOR U NIFIED D ETECTION S CHEME ...Aggressor and Victim Signals In Sections II and III, it is assumed that excitations from aggressor lines are synchronous, and the falling ... See full document

6

A Unified Scheme for Modeling Software Reliability with Various Failure Detection and Fault Correction Rates

A Unified Scheme for Modeling Software Reliability with Various Failure Detection and Fault Correction Rates

... faults, and failure detection ...technologies for removing the errors in the fault correction ...is a function of the complexity of program modules, the manpower, the skill of testing teams, ... See full document

6

A Robust Content-Based Copy Detection Scheme

A Robust Content-Based Copy Detection Scheme

... alternative approach or a complementary approach to watermarking. To detect copied versions of digital images, which are generated by various image processes, several schemes have been proposed. However, none of ... See full document

1

Scene-effect detection and insertion MPEG encoding scheme for video browsing and error concealment

Scene-effect detection and insertion MPEG encoding scheme for video browsing and error concealment

... coding scheme, the encoder can do more than video compression. In this paper, a novel MPEG codec embedded with scene-effect information detection and insertion is proposed to provide more ... See full document

9

Strategy of packet detection for burst-mode OFDM systems

Strategy of packet detection for burst-mode OFDM systems

... ROC a) ...test for packet detection in burst-mode OFDM systems is ...Packet detection decides whether a packet is coming or not by comparing a threshold value in the ... See full document

8

An Error Detection and Recovery Scheme for Dynamically Downloadable Modules in Wireless Sensor Networks

An Error Detection and Recovery Scheme for Dynamically Downloadable Modules in Wireless Sensor Networks

... resource-constrained and may not have the memory management unit. As a result, preventing memory access errors by the downloadable modules from crashing the sensor nodes pose a challenge in the ... See full document

6

A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images

A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images

... using a morphological operation [21], and, then, the really-tampered areas are located ...Results and Analysis To demonstrate the extensive experiments conducted with the proposed scheme, some ... See full document

1

A dynamic scaling FFT processor for DVB-T applications

A dynamic scaling FFT processor for DVB-T applications

... III. A RCHITECTURE For designing a low-power FFT processor, it is important to minimize memory access, which dominates the power con- sumption in FFT ...ciency. A block diagram of the proposed ... See full document

9

Common-path heterodyne interferometric detection scheme for measuring wavelength shift

Common-path heterodyne interferometric detection scheme for measuring wavelength shift

... When a linearly polarized light passes through a uniaxial crystal, small wavelength shifts will introduce phase difference variations between s- and ...facts, a common-path heterodyne ... See full document

4

A practical design for a robust fault detection and isolation system

A practical design for a robust fault detection and isolation system

... DOWN FOR ARTICLE Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our ...agents, and our licensors make no representations ... See full document

12

A novel direct detection microwave photonic vector modulation scheme for radio-over-fiber system

A novel direct detection microwave photonic vector modulation scheme for radio-over-fiber system

... of a novel direct detection microwave photonic vector modulation scheme for the radio-over-fiber (RoF) ...modulation scheme, which can carry only the on–off keying data format, the ... See full document

3

A CASCADED HIERARCHICAL FRAMEWORK FOR MOVING OBJECT DETECTION AND TRACKING

A CASCADED HIERARCHICAL FRAMEWORK FOR MOVING OBJECT DETECTION AND TRACKING

... constraint, and temporal prior knowledge. As shown in Fig. 1, we adopt a 3-layer structure at each time ...label for each image ...i a suitable ID from the set { : B , : 0 F , …, : G F ...out ... See full document

4

A Method for Dominant Point Detection

A Method for Dominant Point Detection

... method, and it has the smaller values of WE 1 and WE 2 ...d for the leaf curve (Cornic’s method doest not provide the result in his ...detect a set of the most significant points that has the ... See full document

7

An ROI-Based Medical Image Tamper Detection and Recovery Scheme

An ROI-Based Medical Image Tamper Detection and Recovery Scheme

... paper, a tamper detection and recovery scheme for medical images is ...region for diagnosis in medical images, and it needs to be protected ...authentication and ... See full document

9

Efficient Detection Approach for DTMF Signal Detection

Efficient Detection Approach for DTMF Signal Detection

... two detection types have in common is that a tone detection task is performed at a single point each time, meaning that there is an inevitable and significant rise in the required ... See full document

11

Show all 10000 documents...