778 results found.
Year: 2018, Volume: 18, Number: 3
... pixel classifiers with many classification errors. Lim et traffic sign detection proposed in a previous study[19] was al. [19] proposed an enhanced Adaboost algorithm suitable applied and the detected traffic sign range was used as the for detecting traffic sign ranges that learned by selecting standard content recognition area. landmarks that were ...
Terms matched: 1 - Score: 11 - 7,040k
Year: 2018, Volume: 18, Number: 3
... VCO is modelled with a triangular waveform. In reality, we [8] D. Knuth, "The Art of Computer Programming Volume 2", Seminumerical algorithms, pp. 9-38, Addison-Wesley, can talk about exponential dependence (charging and Massachusetts, 1998 discharging the capacitor through a resistor). At relatively [ ...
Terms matched: 1 - Score: 3 - 1,390k
Year: 2018, Volume: 18, Number: 3
... and Computer Engineering Volume 18, Number 3, 2018 A New Method for MPPT Algorithm Implementation and Testing, Suitable for Photovoltaic Cells Alexandru SFIRAT, Aurel GONTEAN, ... at this point. reduction and offering confidence in the design. This paper MPPT algorithms are necessary, first of all, to place the analyses the most suitable ...
Terms matched: 2 - Score: 211 - 1,418k
Year: 2018, Volume: 18, Number: 3
... Computer Engineering Volume 18, Number 3, 2018 A Hybrid Model based on Genetic Algorithm and Space-Filling Curve applied to Optimization of Vehicle Routes Warley Rocha MENDES1, Flávio ... Therefore, very large validity of the hybrid algorithm by performing tests in two runtime algorithms (such as optimal solution) cannot be different benchmarks datasets. Our proposal ...
Terms matched: 2 - Score: 275 - 1,759k
Year: 2018, Volume: 18, Number: 3
... respectively, In [12-14], the authors present a sliding-mode control by: algorithm of a DSIM, the control ensures a good tracking performance, a fast ... 2 ids1, 2  ï€ Ï‰ s φ qs1, 2 difficulty, high-performance algorithms have been dt developed [10-18]. d φ qs1, 2 In ...
Terms matched: 2 - Score: 18 - 1,602k
Year: 2018, Volume: 18, Number: 3
... methods were proposed throughout industry, into play on a regular basis. The estimation algorithm is critical ranging from plain, but less effective solutions (e.g. for ... research effort is required to allow development of an optimum efficient, yet computationally heavy algorithms (e.g. for a given application, by exploring design alternatives and nonlinear ...
Terms matched: 2 - Score: 28 - 1,555k
Year: 2018, Volume: 18, Number: 3
... values, respectively of repeatable. electromagnetic torque. For optimization computation, the genetic algorithm The disadvantage of using an objective function in this contained in the GAOT library ... ripple coefficient, be obtained using stochastic methods, such as genetic determined as: algorithms [8, 20-24]. In general, these methods enable the TeMAX ...
Terms matched: 2 - Score: 21 - 1,379k
Year: 2018, Volume: 18, Number: 3
... been While cryptography and secret sharing extend far back to proposed as a new steganography algorithm. It is based on two ancient history, watermarking and steganography are basic ... attack must be considered as watermarking, and steganography. characteristics of the image steganography algorithms. In this study, Improved Chaos Based Bit Embedding has been While cryptography ...
Terms matched: 2 - Score: 456 - 1,261k
Year: 2018, Volume: 18, Number: 3
... purpose Lattice Boltzmann code Computationally most intensive parts of the algorithm are that runs on commodity computer with multiple heterogeneous ... to parallelize parts of algorithm on two or more parallel algorithms. heterogeneous devices). Binding between host ( ... layout are also proposed. to parallel code and expose algorithmic parallelism. Most Implementation is tested on a one-node ...
Terms matched: 3 - Score: 30 - 1,169k
Year: 2018, Volume: 18, Number: 2
... (RNN). higher level features are obtained from the lower level RNN trained with the traditional backpropagation through features and the same lower level features contribute to time algorithm have difficulties learning dependencies many higher level ones [9]. between the time steps which are far apart from each other In feed-forward DNN, the activation ...
Terms matched: 1 - Score: 16 - 1,145k