Z Zhou, J Wang, Z Zhu, J Xia - ISA transactions, 2023 - Elsevier
We propose an improved extreme learning machine (ELM) to solve the decoupling problem between the camera coordinates and the image moment features for robot manipulator …
S Senthilkumar, V Samuthira Pandi… - Concurrency and …, 2023 - Wiley Online Library
Recustomize finite impulse response (RFIR) filter is designed to achieve lesser power consume, cost, area, and higher speed of system operation. This is used to remove the …
Security authentication is one of the most important levels of information security. Nowadays, human biometric techniques are the most secure methods for authentication purposes that …
K Saroha, V Dagar, P Jit, R Alvarado… - … of Agricultural & …, 2020 - search.ebscohost.com
The unprecedented crisis hovering over the world due to Covid-19 pandemic has structurally impacted every sector of the world economy. This paper attempts to study the …
H Meng, S Chen - Applied Acoustics, 2021 - Elsevier
The unimproved filtered-x least mean square (FxLMS) algorithm is not enough to guarantee the convergence rate and stability when outliers appear in the reference signal X n. To make …
T Li, Y He, N Wang, J Feng, W Gui… - 2021 IEEE Vehicle …, 2021 - ieeexplore.ieee.org
Focusing on the problem of nonlinear noise cancellation caused by complex rail vehicles noise sources, this study proposes an active noise cancellation system based on the noise …
Z Tian, Y Wang - … of the Institution of Mechanical Engineers …, 2022 - journals.sagepub.com
This study proposes a novel predictive control compensation method to deal with random time-delay in networked control system. Different from other compensation strategies, this …
Medical signal processing requires noise and interference‐free inputs for precise segregation and classification operations. However, sensing and transmitting wireless …
F Yousefi, H Kolivand - 2021 1st International Conference on …, 2021 - ieeexplore.ieee.org
Nowadays, to access any digital device we use authentication techniques, which is a critical technology in terms of security. Present biometric authentications such as fingerprints or face …