778 results found.
Year: 2013, Volume: 13, Number: 3
... implementation of verification time, FPGA hardware resource estimation, floating the well-known NLMS adaptive algorithm was carried out. point data representation; the SAEC is presented in Section ... to achieve efficiently implemented approximated with two sets of adaptive filter taps, both with algorithms, the prime choice is multi-rate processing [2]. 8e3 coefficients. ...
Terms matched: 2 - Score: 62 - 941k
Year: 2013, Volume: 13, Number: 3
... coefficients of the walls and the ceiling as well as mathematical analysis of the adaptive algorithm was performed. The second part of the paper presents the the directness of ... Kuo, D. R. Morgan, Active Noise Controls Systems €” 30 30 Algorithms and DSP Implementations, Wiley, NewYork, 1996. 25 25 [4 ...
Terms matched: 2 - Score: 38 - 1,070k
Year: 2013, Volume: 13, Number: 3
... research directions about wide area backup protection include [9-12]: comes from one of the A1 ,Œ, AG populations. It is known Rapid analytical algorithm for fault recognition and that the probability density function of population Ag is isolation; Constitution mechanism and system frame of the wide f g( x) ...
Terms matched: 1 - Score: 15 - 632k
Year: 2013, Volume: 13, Number: 3
... RDFa, Microformats and Figure. 1: Block diagram of the microformats' creation algorithm Microdata [17] by search engines like Google, in order to display ... formats and page and extract two pieces of information. The first is the Google algorithms, to "give users convenient summary name of the actual page that was ...
Terms matched: 2 - Score: 16 - 636k
Year: 2013, Volume: 13, Number: 3
... OSs must fulfill the response times and throughputs of prioritized applications. timeliness requirements of applications as well as protecting their security. Index Terms €” real-time schedulers, scheduling algorithm, Most embedded OS kernels offer real-time schedulers of smart phones, Java, virtual machines. one kind or another in order to conform to timeliness requirements [ ...
Terms matched: 1 - Score: 7 - 929k
Year: 2013, Volume: 13, Number: 2
... novel ‡†(2m) multiplier based on the Karatsuba-Ofman Algorithm is presented. A binary field original KOA algorithm ... algorithm and the hardware cryptography and error-correcting code. Several algorithms architecture is presented providing a comparison with the used ... if n € 1 ƒ approach is used in every algorithmic recursive call. To Tn € ƒTn 2 € ...
Terms matched: 3 - Score: 149 - 1,388k
Year: 2013, Volume: 13, Number: 2
... In this performed of three well-known evolutionary algorithms which respect, the robustness of the algorithm for the fixed control are Particle Swarm Optimization (PSO) algorithm, Differential ... and Computer Engineering Volume 13, Number 2, 2013 Comparing the Robustness of Evolutionary Algorithms on the Basis of Benchmark Functions Ezgi DENİZ œLKER, Ali HAYDAR Girne American ...
Terms matched: 2 - Score: 332 - 686k
Year: 2013, Volume: 13, Number: 2
... FORCs. Figure 3. Experimental FORCs for the easy axis of the subway card. A solution could be to normalize each FORC to its maximum value. Our algorithm for experimental data processing includes a numerical correction of the magnetic field H inside the sample, taking into account the magnetometric demagnetizing factor Nm and the field correction ...
Terms matched: 1 - Score: 11 - 827k
Year: 2013, Volume: 13, Number: 2
... obtain high performance equipment to meet present requirements, both in terms of reliability and Reserve 1 availability, we performed an experimental system which is Reserve based on an algorithm for online verification of each modules component of the inverter. Reserve r The general structure of an experimental system is shown in Fig. 4. Figure 2 ...
Terms matched: 1 - Score: 13 - 716k
Year: 2013, Volume: 13, Number: 2
... of the stator magnetic field and by keeping the angle between the stator flux vector and the rotor flux vector within admissible range. B. Software Aspects The control algorithm was implemented in C programming language [19], [21] and adapted to DSP using the Code Composer 3.5. platform. The algorithm exploits Figure ...
Terms matched: 1 - Score: 11 - 1,149k