584 results found.
Year: 2011, Volume: 11, Number: 2
... r € s mƒ— ›Wb (69) Ls 1€ T 2 ƒ— z2 ƒ—2 r p rN formulas are used [9 ], [10]: The load torque within the input vector (67) is imposed 19 Advances in Electrical and Computer Engineering Volume 11, Number 2, 2011 based on the following mathematical ...
Terms matched: 1 - Score: 3 - 720k
Year: 2011, Volume: 11, Number: 2
... theorem-1 (CRT-I) is presented. The proposed for using in the high-performance DSP and real-time converter is considerably faster than the original residue-to- systems with high computation load, due to its particular binary converter of the moduli set {2n €“ 1, 2n, 2n+ 1, 22n+ 1 €“ 1}; ...
Terms matched: 1 - Score: 3 - 605k
Year: 2022, Volume: 22, Number: 2
... detailed and considers the weight has emerged due to the significant increase in recreational and and the specifications of the drone and intended operations. commercial drones operating range, payload size, and overall The regulation proposes the certification and licensing of the capabilities. Consequently, drones may pose a risk to airspace drone pilot which aims to ...
Terms matched: 1 - Score: 3 - 1,458k
Year: 2022, Volume: 22, Number: 2
... band, and main source of the leakage: One of them is the charging its practical upper limit is the bandwidth of the acquisition current drawn by the output load capacitance. The other one system. However, its value changes inversely with the is the temporary short circuit current of instant Gnd-Vdd frequency. Especially in a ...
Terms matched: 1 - Score: 3 - 1,199k
Year: 2021, Volume: 21, Number: 3
... fingerprint shown in Fig.4 and described in Algorithm-2. The higher minutiae points to calculate a set of genuine points. Now no. of redundant candidate points increase the workload of chaff-points generation method is applied as shown in the chaff-points generation method. Algorithm-2 to find the locations of new chaff-points. The 3) Working of Decoding ...
Terms matched: 1 - Score: 3 - 1,751k
Year: 2007, Volume: 7, Issue: 2
... . 203 €“ 209 (1990). [3] A. C. Williamson, "Measurement of rotor temperatures of a 500 MW turbine generator with unbalanced loading", Proc. IEE, vol. 8, pp. 795 €“ 803 (1976). [4] M. Iordache, N. Voicu ...
Terms matched: 1 - Score: 3 - 612k
Year: 2022, Volume: 22, Number: 1
... Computing Machinery, New York, NY, USA, 2014. [9] D. Vidal, R. Roy, F. Bertrand, "A parallel workload balanced and doi:10.1145/2664666.2664668 memory efficient Lattice-Boltzmann algorithm with single unit BGK [27] J. B. Tekic, P. M. Tekic ...
Terms matched: 1 - Score: 3 - 1,615k
Year: 2023, Volume: 23, Number: 3
... the S. 1 0 Nevertheless, in some cases, the best UAV relay might not ƒ ƒ ‚ G 2 vr2 vk21 Ps be accessible due to load balancing, scheduling or feedback ‚ ƒ f n( vr) Q ƒ ƒ dvr (13) ƒ G 2 P v 2 2 v € ...
Terms matched: 1 - Score: 3 - 1,344k
Year: 2007, Volume: 7, Issue: 1
... when, different type of Editura "Gh. Asachi" IaŸi 2002. [4] Giurgiu, M.- Results on Automatic Speech Recognition in Romanian. loads are connected or disconnected). When this Recent Advances in Romanian Language Technology, Ed. Academiei malfunctioning appears the human operator can change, Române, 1997 ...
Terms matched: 1 - Score: 3 - 2,000k
Year: 2022, Volume: 22, Number: 1
... update The Flash memory footprint of our five-step protocol on the every session. Therefore, replay attacks cannot deceive our IoT device is 4.67 kB. The SRAM memory load is only 0.21 protocol. KB when the protocol is run. Full-disclosure Attack: This type of attack reveals A thousand sequential encryptions have been carried out secrets ...
Terms matched: 1 - Score: 3 - 1,672k