... pages
doi:10.1155/2011/696741
Research Article
An Unsupervised and Drift-Adaptive Spike Detection Algorithm
Based on Hybrid Blind Beamforming
Michal Natora and Klaus Ober mayer
Institute for Software Engineering and Theoretical ... 2009.
[42] F. Franke, M. Natora, C. Boucsein, M. H. J. Munk, and K.
Obermayer, An online spike detection and spike classifi...
... X
U
[k] has zero mean and
a variance P
U
,andX
P
[k] denotes the transmitted signal from
the PT with zero mean and variance P
p
.h
UV
is the channel
coefficient between U and V, and for analytical simplicity,
h
UV
is ... traditional and network coding -based
intercluster connection. In Section 3, how to get policies of
selecting transmission power level based on reinforcement
lea...
... 4 shows that any of the algorithms
can be chosen and that the energy consumption is the same
for all. For short delays, less than 250 ms, only the constant
and the linear modulus can be used.
10 ... RFID by Xie and Lai [15].
The protocol is contention based for high density tag
conditions. The tag contends, by using Rivest’s Pseudo-
Bayesian algorithm, to get a communication slot an...
... evident that in the fifth transmission round, we
cannot find a packet which is innovative and instantaneously
decodable for all the three receivers. On the other hand,
one can verify that if we adopt ... commands. There-
fore, commands are broadcast to everyone in the network. In
this application, in-order processing/execution of commands
may not be a real issue. However, fast command execu...
... and Goebel 27 and subsequently developed and used in
many papers; see, for example, Bana and Sadarangoni 28, Guo et al. 29, Lakshmikantham
and Leela 30,M
¨
onch 31, and Szufla 32.
2. ... Podlubny, “Geometric and physical interpretation of fractional integration and fractional
differentiation,” Fractional Calculus & Applied Analysis for Theory and Applications,...
... region information. The
whole procedure includes three steps: rough localization
and normalization, edge information extraction based on
phase congruency, and the infusion of edge and region
information. ... Monro, S. Rakshit, and D. Zhang, “DCT -based
iris recognition,” IEEE Transactions on Pattern Analysis and
Machine Intelligence, vol. 29, no. 4, pp. 586–595, 2007.
[16] Y....
... 981–984, Vancouver, Canada, September 2000.
[14] S. Liu and A. C. Bovik, “Efficient DCT-domain blind measure-
ment and reduction of blocking artifacts,” IEEE Transactions
on Circuits and Systems ... MPEG-2 compressed
video and their relation to overall annoyance,” in Human
Vision and Electronic Imaging X, vol. 5666 of Pro ceedings of
SPIE, pp. 595–606, San Jose, Calif, USA, Januar...
... is a wide range of variations in the degree of motion
depending on motion types. For instance, a hip hop dance
and a break dance are acrobatic and contain large motion.
On the other hand, Noh, ... Nakazawa, and K. Ikeuchi, “Rhythmic motion
analysis using motion capture and musical information,” in
Proceedings of IEEE International Conference on Multisens or
Fusion and Integrat...
... Amsterdam, The Netherlands, 2001.
11 H. Iiduka and W. Takahashi, “Strong convergence theorems for nonexpansive mappings and inverse-
strongly monotone mappings,” Nonlinear Analysis: Theory, Methods ... of Mathematical Analysis and Applications, vol. 331, no.
1, pp. 506–515, 2007.
5 A. Tada and W. Takahashi, “Weak and strong convergence theorems for a nonexpansive mapping and...
... i
connections, and
x is the largest integer not greater
than x;
(v) B(ρ
i
, n
i
): is the Erlang loss func tion, that is, under the
assumptions of exponential arrivals and general ses-
sion ... Christin, J. Liebeherr, and T. Abdelzaher, “Enhancing class-
based serv ice architectures with adaptive rate allocation and
dropping mechanisms,” IEEE/ACM Transactions on Network-
ing, vo...