Showing 41 - 60 results of 228 for search '(((( implement system algorithm ) OR ( element rd algorithm ))) OR ( level coding algorithm ))', query time: 0.13s Refine Results
  1. 41

    An Evolutionary Algorithm for the Allocation Problem in High-Level Synthesis by Harmanani, Haidar

    Published 2005
    “…This paper presents an evolutionary algorithm to solve the datapath allocation problem in high-level synthesis. …”
    Get full text
    Get full text
    Get full text
    article
  2. 42
  3. 43

    A neural networks algorithm for data path synthesis by Harmanani, Haidar M.

    Published 2003
    “…A sequential simulator was implemented on a Linux Pentium PC under X-Windows. Several benchmark examples have been implemented and favorable design comparisons to other synthesis systems are reported.…”
    Get full text
    Get full text
    Get full text
    article
  4. 44

    A new genetic algorithm approach for unit commitment by Mantawy, A.H.

    Published 1997
    “…This paper presents a new genetic algorithm approach to solve the unit commitment problem in electric power systems. …”
    Get full text
    Get full text
    article
  5. 45

    Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach by Sarif, Bambang

    Published 2006
    “…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …”
    Get full text
    Get full text
    article
  6. 46
  7. 47
  8. 48
  9. 49

    Development and Implementation of a Hybrid Intelligent Controller for Interior Permanent Magnet Synchronous Motor Drives by Nasir Uddin, M.

    Published 2004
    “…At each operating condition a genetic algorithm is used to optimize the PI controller parameters in a closed-loop vector control scheme. …”
    Get full text
    article
  10. 50

    A Modular Reconfigurable Architecture for Asymmetric and Symmetric-key Cryptographic Algorithms by Zaidi, Ali Mustafa

    Published 2007
    “…It is widely recognized that security issues will play a crucial role in the majority of future computer and communication systems. Cryptographic algorithms are the central tools for achieving system security. …”
    Get full text
    masterThesis
  11. 51
  12. 52
  13. 53
  14. 54

    A new tabu search algorithm for the long-term hydro scheduling problem by Mantawy, A.H.

    Published 2002
    “…The proposed algorithm has been applied successfully to solve a system with four series cascaded reservoirs. …”
    Get full text
    Get full text
    article
  15. 55
  16. 56
  17. 57

    New Fast Arctangent Approximation Algorithm for Generic Real-Time Embedded Applications by Mohieddine Benammar (18103039)

    Published 2019
    “…A new 2nd order rational approximation formula is introduced for the first time in this work and benchmarked against existing alternatives as it improves the new algorithm performance. The eZDSP-F28335 platform has been used for practical implementation and results validation of the proposed technique. …”
  18. 58
  19. 59
  20. 60

    A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks by Saad, Walid

    Published 2012
    “…While most existing literature focuses on downlink-only or uplink-only scheduling algorithms, the proposed algorithm aims at ensuring a utility function that jointly captures the quality of service in terms of delay and channel quality on both links. …”
    Get full text
    Get full text
    Get full text
    article