832 results found.
Year: 2016, Volume: 16, Number: 1
... words from corpus. To calculate distance  (1) similarity between two words, subjects, verbs, and distFromCPToRoot  minDistToCP adjectives used with specific words are designated as where CP is a common parent, which refers to a common features, and an information amount of each feature is ancestor concept of two concepts. ...
Terms matched: 1 - Score: 5 - 1,136k
Year: 2016, Volume: 16, Number: 1
... presented in Section IV; Section V is estimation methodologies are required to correctly assess the dedicated to the two case studies. impact of aggressive voltage scaling in early design stages of deep nanometer CMOS circuits. II. SIMULATED FAULT INJECTION FOR RTL CIRCUITS Reliability analysis can be performed using analytical DESCRIPTIONS methods, simulations or prototype-based analysis ...
Terms matched: 1 - Score: 58 - 1,164k
Year: 2015, Volume: 15, Number: 4
... , 2015 standard datasets [2-3]. This makes the results both relevant specifically designed for a low volume of false positives and reproducible. because surveillance guards might ... class of methods for persistently tracked object, based on the analysis of local the design of an automated surveillance system. We repetitive motion changes within the blob representation ...
Terms matched: 2 - Score: 9 - 1,553k
Year: 2015, Volume: 15, Number: 4
... It aims to develop an improved ontology model system was designed to apply the basic ontology for the for transformer ... definition. In DL important notations of a domain its design objectives [9]. An agent-based system can ... OWL) [13] is defined as methodology for designing MAS, is anticipated to facilitate follows: concept ...
Terms matched: 3 - Score: 55 - 1,245k
Year: 2015, Volume: 15, Number: 4
... section II describes of Raspberry Pi units, yields good performances however it our solution's design and implementation. Section III has a higher complexity and no portability. Finally ... dx.doi.org/10.1109/EIT.2006.252111 (FPGA), which can be re-used for other designs, thus [14] IEEE 802.3™ -2012 – IEEE Standard for ...
Terms matched: 2 - Score: 18 - 1,262k
Year: 2015, Volume: 15, Number: 4
... was illustrated in [8]. The OTA was designed for above-threshold operation, and was II. STATE ... implant speech processor voltage and low-power microelectronics, employing novel design paradigms for the reduction of the supply voltage and ... design specifications regarding OTA aids. The aforementioned solution, redesigned for linearity is particularly challenging for subthreshold subthreshold operation ...
Terms matched: 3 - Score: 60 - 1,431k
Year: 2015, Volume: 15, Number: 4
... 6 the experimental results. mode control method are first designed in the analog domain and then transposed in discrete ... margin. These delays were taken into account during the design of the digital control loops. Other delays that ... current through it are measured. The conventional method for designing a negative 2) Based on these two measurements ...
Terms matched: 5 - Score: 91 - 1,502k
Year: 2015, Volume: 15, Number: 4
... L. Zhou, "Controller validated for three-phase boost-type PFC PWM rectifier, architecture design for MMC-HVDC," Advances in Electrical and using Voltage Oriented Control (VOC ... formed by parallel (M =2 and 3) is suitable for compact PFC designs. complementary unidirectional phase legs," IEEE Trans. on Ind. Appl ...
Terms matched: 2 - Score: 8 - 1,193k
Year: 2015, Volume: 15, Number: 4
... 7 Colour scale 65.11316E-6/ 101.27308E-3 Case 2 101.27308E-3/ 202.48106E-3 202.48106E-3/ 303.68903E-3 The second case analyzes the parameters variation 303.68903E-3/ 404.8961E-3 404.8961E-3/ 506.10497E-3 obtained from the design calculations. Table III shows the 506.10497E-3/ 607.31294E-3 607.31294E-3/ 708.52091E-3 assumptions considered for modeling. 708.52091E-3/ 809.72889E-3 809.72889E-3/ 910.93686E-3 910.93686E-3/ 1.01214 TABLE III. ...
Terms matched: 1 - Score: 27 - 2,179k
Year: 2015, Volume: 15, Number: 4
... at standardizing nonlinearities remain inaccessible to the receiver, they are a framework for their design, are addressed by [10]. The neglected in order to allow ... calculus as suggested in transmitting secret messages. This is the first step prior to designing an actual communication scheme. As an example, the [8 ], ...
Terms matched: 2 - Score: 17 - 1,104k