762 results found.
Year: 2019, Volume: 19, Number: 4
... 19, Number 4, 2019 Tri-band Impedance Matching Network Design Using Particle Swarm Optimization Algorithm Sadık ÜLKER Electrical and Electronics Engineering Department, European University of Lefke, Gemikonağı ... the simulated annealing and extremal optimization A single section, quarter wavelength long, transmission algorithms was applied for the solution of the inverse line can be used to match ...
Terms matched: 2 - Score: 126 - 745k
Year: 2022, Volume: 22, Number: 2
... I. INTRODUCTION same time instants of the one more power traces, produced by algorithm execution with different inputs, this is called as Side channel analysis (SCA ... the first study to show the frequency domain of all these method with various clustering algorithms [20- applicability and superiorities in terms of horizontal CCPA 22] to ...
Terms matched: 2 - Score: 125 - 1,199k
Year: 2011, Volume: 11, Number: 4
... features for image segmentation. segmentation method in two levels. In chapter V, Algorithm The object-oriented model used for storing the results of the for Salient Objects Detection ... salient regions; the section II, Related salient objects from images. The proposed algorithms for Work, summarizes the main approaches of the image image segmentation and objects ...
Terms matched: 2 - Score: 125 - 441k
Year: 2017, Volume: 17, Number: 2
... execution of B and executes non-preemptively. The attention at a level commensurate with scheduling algorithm work presented in [31] proposed a new fixed priority (FP) ... this explains, to a large extent, why RTS are easily more general scheduling algorithms and security model. We compromised. also propose modifications to existing real-time scheduling ...
Terms matched: 2 - Score: 124 - 1,218k
Year: 2013, Volume: 13, Number: 4
... Usually, for every dataset, there is The major advantage of a decision tree-based algorithm only a reduct with the best classification accuracy to obtain this best one, ... , the algorithm. Secondly we complete this group up to reducts by decision tree-based algorithms do not perceive noise and using discernibility function techniques. Finally, we select ...
Terms matched: 2 - Score: 122 - 638k
Year: 2015, Volume: 15, Number: 1
... shows an analysis of torque ripple ripple [7]. reduction in modified DTC algorithm by using multiple voltage A lot of authors propose different approaches with the vectors ... F2812, were analysed in comparison with classical switching cycle [8-10]. These algorithms require the longer DTC. It is shown that the torque ripple can be ...
Terms matched: 2 - Score: 122 - 2,542k
Year: 2008, Volume: 8, Issue: 2
... of techniques that help to improve the training processing step prior to applying a learning algorithm. The aim speed for a feedforward multilayer neural network. These of this ... (borrowed from data mining) which consists in (techniques of using the genetic algorithms for the initial selecting the best features from a training set. The technique ...
Terms matched: 2 - Score: 122 - 693k
Year: 2015, Volume: 15, Number: 2
... Optimization (PSO) (developed by Kennedy are dealing with collective intelligence. The algorithm depends and Eberhart in 1995 [4 ]) methods. Both algorithms were ... modeling the very basic random behavior (i.e. exploration capability) of individuals in addition to their tendency to revisit developed by observing the behaviors of animals living as ...
Terms matched: 2 - Score: 121 - 767k
Year: 2019, Volume: 19, Number: 2
... as it reduces the need for multiple power perturb and observe (PI-PO) control algorithm for maximum conversions and hence losses. Therefore, this paper focuses on power ... Advances in Electrical and Computer Engineering Volume 19, Number 2, 2019 Stochastic Algorithms for Controller Optimization of Grid Tied Hybrid AC/DC Microgrid with Multiple Renewable ...
Terms matched: 2 - Score: 121 - 1,471k
Year: 2013, Volume: 13, Number: 2
... Access Authentication accompanied by consumer electronics, communications, medical and other, Secure Hash Algorithm 1 (SHA-1) to establish a secure way representing an interesting area for ... be performed by various cryptographic imposes a need for embedded agent integration, where the algorithms. The proposal is experimentally tested using two communication component presents a setback for ...
Terms matched: 2 - Score: 119 - 908k