Search alternatives:
using algorithms » cosine algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
using algorithms » cosine algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
-
21
Synthesis of MVL Functions - Part I: The Genetic Algorithm Approach
Published 2006“…Multiple-Valued Logic (MVL) has been used in the design of a number of logic systems, including memory, multi-level data communication coding, and a number of special purpose digital processors. …”
Get full text
Get full text
article -
22
A Parallel Neural Networks Algorithm for the Clique Partitioning Problem
Published 2002“…Our model uses a large number of simple processing elements or neurons, based on the McCulloch-Pitts binary neuron. …”
Get full text
Get full text
article -
23
-
24
Evolutionary algorithms for state justification in sequential automatic test pattern generation
Published 2005“…A common search operation in sequential Automatic Test Pattern Generation is to justify a desired state assignment on the sequential elements. State justification using deterministic algorithms is a difficult problem and is prone to many backtracks, which can lead to high execution times. …”
Get full text
article -
25
Optimized FPGA Implementation of PWAM-Based Control of Three—Phase Nine—Level Quasi Impedance Source Inverter
Published 2019“…Since, PWAM control algorithm is more complex than PSCPWM, FPGA based implementation for PWAM control is discussed. …”
-
26
A Novel BIPV Reconfiguration Algorithm for Maximum Power Generation under Partial Shading
Published 2020“…Building-integrated photovoltaics (BIPV) are systems used to utilise the unused spaces that can be installed on the façade or roof by replacing the building’s main element. …”
-
27
-
28
-
29
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
30
Correlation Clustering with Overlaps
Published 2020Get full text
Get full text
Get full text
masterThesis -
31
Optimization of Commercially Off the Shelf (COTS) Electric Propulsion System for Low Speed Fuel Cell UAV
Published 2013Get full text
doctoralThesis -
32
Localizing-ground Transmitters Using Airborne Antenna Array
Published 2020Get full text
doctoralThesis -
33
-
34
Socially Motivated Approach to Simulate Negotiation Process
Published 2014Get full text
doctoralThesis -
35
Design Optimization of Inductive Power Transfer Systems Considering Bifurcation and Equivalent AC Resistance for Spiral Coils
Published 2020“…Based on the proposed algorithm, several IPT systems are optimized in MATLAB software using Genetic Algorithm (GA). …”
-
36
Vibration suppression in a cantilever beam using a string-type vibration absorber
Published 2017“…The string is rigidly connected to the fixed end of the beam and through a spring and damper to a second point on the beam. The finite element method is used to model the system and a reduced order model is obtained through modal reduction performed on both the string and the beam. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
37
-
38
Microwave brain imaging system to detect brain tumor using metamaterial loaded stacked antenna array
Published 2022“…The antenna is comprised of metamaterial-loaded with three substrate layers, including two air gaps. One 1 × 4 MTM array element is used in the top layer and middle layer, and one 3 × 2 MTM array element is used in the bottom layer. …”
-
39
Forward simulation of three-dimensional advection-diffusion using a fundamental solution for a linear flow
Published 2022“…The system is solved numerically using an RK4 scheme. We first check the algorithm against special linear flows with known exact analytical solutions. …”
Get full text
Get full text
Get full text
masterThesis -
40
Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
Published 2024“…<p dir="ltr">Mobile devices have become an essential element in our day-to-day lives. The chances of mobile attacks are rapidly increasing with the growing use of mobile devices. …”