832 results found.
Year: 2013, Volume: 13, Number: 4
... elegant solutions, which cannot be applied to the EOM designed circuits and interconnections are almost never and BM networks ... ua.pt 1 Abstract — This paper is dedicated to the design, difference in propagation delays. implementation, and ... M. Harris, and M. Garland, "Designing efficient sorting networks with other known results leads to ...
Terms matched: 4 - Score: 35 - 698k
Year: 2013, Volume: 13, Number: 4
... referred to as the congestion alleviation- along multi-hop paths. The Berkeley MAC, designed for low MAC (CA-MAC). It adopts an adaptive contention window power ... ) protocol duty-cycle operation [4-21]. In this paper, we propose a design. novel duty-cycle MAC protocol, referred to as the A glance into the ...
Terms matched: 2 - Score: 10 - 789k
Year: 2013, Volume: 13, Number: 4
... of Web pages, a ranking multiple databases which are designed using different styles. algorithm is adopted to offer ... , there are many structures of Web pages and various designing modes of information extraction techniques such as natural-language- ... $". Value possibility is the similarity between values designers will focus on using the most relevant in the ...
Terms matched: 3 - Score: 20 - 775k
Year: 2013, Volume: 13, Number: 4
... CS as the input stage. Finally, Section 5 concludes Current-mode circuits are providing their importance in the paper. the fields of analog signal processing and integrated circuit design [1-5]. Some of the performance features of current- II. THE PROPOSED CMOS CS mode circuits are high bandwidth, high linearity and wide The ...
Terms matched: 1 - Score: 28 - 751k
Year: 2013, Volume: 13, Number: 4
... results especially for shrinks, the corresponding degree of transistor integration low margins of the design constraints. In this paper, two and the critical charge result in an ... Number 4, 2013 A Cell Sizing Technique for Mitigating Logic Soft Errors in Gate-level Designs Jong Kang PARK, Jong Tae KIM* School of Electronic and Electrical Eng ...
Terms matched: 2 - Score: 141 - 827k
Year: 2013, Volume: 13, Number: 4
... RFID system and the security Generation-2 Revision is used widely as a de facto standard. As requirements to counteract them. The following is a list of it was designed for low cost, it is quite vulnerable to security security threats that can occur when the protocol runs: issues, such as privacy concerns. This paper ...
Terms matched: 1 - Score: 15 - 718k
Year: 2013, Volume: 13, Number: 3
... point at X0= [0.0019 320.18 320.18 239.7 239.6]. V. STABILITY OF THE SYSTEM The transient stability still remains a basic and important consideration in the design of power systems [19]. There are different forms of instabilities that a power system may undergo. It is possible to use the mathematical model to ...
Terms matched: 1 - Score: 5 - 704k
Year: 2013, Volume: 13, Number: 3
... Dupont, A. Baskurt, "A new CAD mesh segmentation method, based on curvature tensor analysis," Computer-Aided Considering our method is limited to the building Design, vol. 37, no.10, pp.975 – 987, 2005. composed of planar surfaces, a more robust shape [21] Y. Cheng, ...
Terms matched: 1 - Score: 8 - 1,067k
Year: 2013, Volume: 13, Number: 3
... region proves that a PMSM whose stator magnetic core is designed as [25]. shown, leads to ... and Computer Engineering Volume 13, Number 3, 2013 Design Solutions for Reducing the Cogging Torque of PMSM Tiberiu ... TABLE I. CT PEAK VALUES FOR SPM&IPM DESIGNS WITH 1&2 ST The partial differential equation ...
Terms matched: 3 - Score: 66 - 885k
Year: 2013, Volume: 13, Number: 3
... United University, Taiwan 3 Chienkuo University of Technology, Taiwan 4 Southern Taiwan University of Science and Technology, Taiwan *Corresponding author: ycwu@nuu.edu.tw 1Abstract — Designing the protection system of high voltage grey relational grade (GRG) in which fuzzy logic is used to power systems involves elucidating the properties of gas estimate the ...
Terms matched: 1 - Score: 7 - 720k