787 results found.
Year: 2014, Volume: 14, Number: 1
... Finally, this procedure is continuously performed The following sections describe the approach, the built until the whole space for selected positions is covered. After measurement station, algorithms, result illustrations, and the final position is reached, the whole procedure starts conclusions. again. The current design required just less than 20 minutes for ...
Terms matched: 1 - Score: 6 - 884k
Year: 2012, Volume: 12, Number: 4
... T €. 1200 Measured P/V characteristic The 2-D implicit approximations p € f €v € and 1000 p € f €T € are the input of the algorithm in Figure 5 800 (numbers are round to two decimal places). The plot3 Power (W) command draws a parametric 3-D course. Whole system ...
Terms matched: 1 - Score: 5 - 2,127k
Year: 2010, Volume: 10, Issue: 2
... € tg1 procedure converges faster if the initial guess is close where the variable € € . enough to the real position of the source. The algorithm The relations (6) may be reformulated as in (7 ), in order follows the steps: to avoid large errors, when one of the ...
Terms matched: 1 - Score: 5 - 1,551k
Year: 2010, Volume: 10, Issue: 1
... , since the input and the output of 1. A very good technique to be employed in the the module are discrete-time signals, a solution that will interpolation algorithms is to use the idea of up- keep the full signal flow in the digital domain is more sampling followed by an appropriate filter. The up- ...
Terms matched: 1 - Score: 5 - 725k
Year: 2009, Volume: 9, Issue: 2
... 11] TABLE IIII What we propose is the computation of the voltages along NUMERICAL VALUES OF THE SEMI INFINITE INTEGRAL €“ TEST CASE an underground pipeline using an original algorithm of Monte 0.868-1.681j 0.646-1.231j 0.049-0.946j Carlo numerical method. Having a starting base [12], the 0.647-1.411j 0.531-1.036j 0.042-0.797j interference model can be introduced and tested. ...
Terms matched: 1 - Score: 5 - 608k
Year: 2015, Volume: 15, Number: 1
... reduce critical image processing architecture and not separately mentioned paths. Conventionally synthesis tool uses Computer-Aided for row buffering unit only. Secondly performance of few Design (CAD) algorithms that place and route the design parameters varies from one FPGA device to another and it's onto the FPGA device. These mapping algorithms are not fair to compare ...
Terms matched: 1 - Score: 5 - 762k
Year: 2024, Volume: 24, Number: 2
... In order to By controlling id3ref and iq3ref, two vectors u3 and u3 are achieve better harmonic suppression in the system, a introduced, enabling the SVPWM control algorithm to fully compensation module needs to be added to the closed-loop utilize the spatial vectors of the two subspaces. According to feedback. the mapping relationship of the ...
Terms matched: 1 - Score: 5 - 1,198k
Year: 2016, Volume: 16, Number: 1
... Ma, S. Wei, Y. Zhang, J. Dai, S. Liu, "Fast The main finding of paper is that this circuit with Algorithm of Discrete Gyrator Transform Based on Convolution Antoniou operational amplifiers and transversal resistor Operation," Optik- International Journal for Light and Electron behaves as unidirectional two-port. ...
Terms matched: 1 - Score: 5 - 849k
Year: 2016, Volume: 16, Number: 1
... the considered runs. decryption process with their inverses. The only non-linear Also, during this step, the simulation of block i, which function of the AES algorithm is SubBytes, which substitues contains at least one instance of block i+ 1, generates two all bytes of the state using table look-up operations and it ...
Terms matched: 1 - Score: 5 - 1,164k
Year: 2017, Volume: 17, Number: 1
... in Java large-scale cloud services, and it is expected to increase language, and Jersey framework was utilized for HTTP cloud users' satisfaction. based communication. AES algorithm with 128-bit key was chosen for symmetric key operation, and RSA algorithm REFERENCES with 1024-bit key was chosen for public key operation. [1] P. ...
Terms matched: 1 - Score: 5 - 1,255k