Results 1 - 10
of
8,481
Chaff: Engineering an Efficient SAT Solver
, 2001
"... Boolean Satisfiability is probably the most studied of combinatorial optimization/search problems. Significant effort has been devoted to trying to provide practical solutions to this problem for problem instances encountered in a range of applications in Electronic Design Automation (EDA), as well ..."
Abstract
-
Cited by 1350 (18 self)
- Add to MetaCart
Boolean Satisfiability is probably the most studied of combinatorial optimization/search problems. Significant effort has been devoted to trying to provide practical solutions to this problem for problem instances encountered in a range of applications in Electronic Design Automation (EDA), as well
Electronics Engineering
"... Morphological transformations (Opening by reconstruction, Erosion-Dilation method) and Block Analysis is used to detect the background of gray level and color images. These techniques are first implemented in gray scale and are then extended to color images by individually enhancing the color compon ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
Morphological transformations (Opening by reconstruction, Erosion-Dilation method) and Block Analysis is used to detect the background of gray level and color images. These techniques are first implemented in gray scale and are then extended to color images by individually enhancing the color components. For aiding better results, the compressed domain (DCT) technique is used exclusively for color image enhancement. The major advantage of the DCT method is that it can be used for any type of illumination. In all the above methods, the enhancement of the background detected image is done using Weber’s law (modified Weber’s law for compressed domain). In this paper, a critical analysis of the various advantages and drawbacks in each method are performed and ways for overcoming the drawbacks are also suggested. Here, the results of each technique are illustrated for various backgrounds, majority of them in poor lighting condition. The tool used in this study is MATLAB. Finally the performance metrics like Entropy, Color Enhancement Factor (CEF) , JPEG Quality Metric (JPQM) , Wang Bovik Quality metric (WBQM) and Structural Similarity Index (SSIM) are calculated and compared for the results of each technique.
Electronics Engineering
"... The reliability and efficiency of a photovoltaic system depends mainly on its energy management system which is done by the proper management and distribution of PV voltage to the battery and to the load to avoid the shortage of power. Our project concerns with the Optimization of energy management ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
The reliability and efficiency of a photovoltaic system depends mainly on its energy management system which is done by the proper management and distribution of PV voltage to the battery and to the load to avoid the shortage of power. Our project concerns with the Optimization of energy management for charged storage of a PV system by the fuzzy logic technique ensure a longer battery life, and the energy distribution available from the photovoltaic array and the batteries. The results obtained that the fuzzy logic control maintains the battery voltage almost stable at the end phase of charging and discharging.
Electronics Engineer
"... Abstract. We have developed a Neural Network model able to reproduce some nonlinear characteristics of an electronic device. However, electronic devices nonlinear analysis requires an analytical model, that allows to draw conclusions about the device behavior. Such a model can be the Volterra series ..."
Abstract
- Add to MetaCart
Abstract. We have developed a Neural Network model able to reproduce some nonlinear characteristics of an electronic device. However, electronic devices nonlinear analysis requires an analytical model, that allows to draw conclusions about the device behavior. Such a model can be the Volterra
Electronics Engineer
, 2015
"... The formula presented in this paper predicts the masses of 17 baryons, one lepton and 6 other particles. The formula uses non-consecutive quantum numbers. The maximum accuracy of the formula is 3 decimal places and the minimum is 2. This paper predicts a new particle with a rest mass between 4557.2 ..."
Abstract
- Add to MetaCart
The formula presented in this paper predicts the masses of 17 baryons, one lepton and 6 other particles. The formula uses non-consecutive quantum numbers. The maximum accuracy of the formula is 3 decimal places and the minimum is 2. This paper predicts a new particle with a rest mass between 4557.2 MeV /c2 and 4658.2 MeV /c2. The formula suggests the existence of a more general formula for the masses of all known particles, which is yet, to be discovered.
Electronic Engineering
"... Numerical Modeling, Simulation and Optimization of High Performance three layers CIGS Solar cell have been carried out in this paper using AMPS-1D (Analysis for Microelectronic and Photonic Structures). CIGS thin film hetero-junction solar cell simulation is performed to find out the influence of pa ..."
Abstract
- Add to MetaCart
Numerical Modeling, Simulation and Optimization of High Performance three layers CIGS Solar cell have been carried out in this paper using AMPS-1D (Analysis for Microelectronic and Photonic Structures). CIGS thin film hetero-junction solar cell simulation is performed to find out the influence of particular layer material electrical, optical and geometric parameters on overall cell performance. Based on the simulation results, Optimization is performed by choosing the optimum value of all input parameters from observation of overall cell performance over wide range of individual input parameter variation. The values for input parameters of three layers are chosen from literature values, theoretical values and numerical data. Current tested maximum CIGS solar cell efficiency is 20.3%. This proposed model provides simulated efficiency of 21.613 % from simulation by AMPS-1D software in LIFETIME model while lifetime is approximated 1ns.
Electronic Engineering,
"... When a large number of documents, e.g. bank cheques, have to be authenticated in a limited time, the manual verification of, say the authors ’ signatures, is often unrealistic. This led to the development of a wide range of automatic off-line signature verification systems. However, the value of suc ..."
Abstract
- Add to MetaCart
When a large number of documents, e.g. bank cheques, have to be authenticated in a limited time, the manual verification of, say the authors ’ signatures, is often unrealistic. This led to the development of a wide range of automatic off-line signature verification systems. However, the value of such a system is rarely demonstrated by conducting a subjective test. We recently developed a novel off-line signature verification system [2, 3] that uses features that are based on the calculation of the Radon transform (RT) of a signature image. Each writer’s signature is subsequently represented by a hidden Markov model (HMM). This paper is an extension of [3] and illustrates the value of our system by showing that it outperforms a typical human being. We conduct an experiment on a data set that contains 765 test signatures (432 genuine signatures and 333 skilled forgeries) from 51 writers. off-line signature verification, subjec-Keywords: tive test 1.
Electronic Engineering,
"... In this paper, a proposed encryption scheme based on Henon chaotic system (PESH) is presented in order to meet the requirements of secure image transfer. Scheme based on Henon chaotic system by Chen Wei-bin et al., will be designated here as (SHCH). SHCH and a proposed encryption scheme (PESH) are a ..."
Abstract
- Add to MetaCart
In this paper, a proposed encryption scheme based on Henon chaotic system (PESH) is presented in order to meet the requirements of secure image transfer. Scheme based on Henon chaotic system by Chen Wei-bin et al., will be designated here as (SHCH). SHCH and a proposed encryption scheme (PESH) are applied for encrypting by changing the values of the image pixels. Combination of shuffling the positions and changing the values of image pixels is introduced to shuffle the relationship between the cipher-image and the plain-image. First, the Arnold Cat map or Baker chaotic map is used to shuffle the positions of the image pixels. Second, the shuffled-image is encrypted by using SHCH or a proposed (PESH) pixel by pixel. All of these procedures for encrypting are used with four modes of operations ECB, CBC, CFB, and OFB. The results of several experimental, statistical analysis, key sensitivity tests, NPCR and UACI analysis, and time analysis show that, a proposed image encryption scheme (PESH) alone or combined with whatever of confusion algorithms Arnold Cat map or Baker chaotic map, is the best scheme and provides an efficient and secure way for image encryption.
Electronics Engineering,
"... In the design of circular patch antenna, the feed point locations SF=5, SF=6, SF=7 and SF=8 were selected and the simulated results compared and the optimum location adopted and implemented. The best feed point was located at SF=5mm where return loss RL is-37.81dB, followed by SF=6mm with return los ..."
Abstract
- Add to MetaCart
In the design of circular patch antenna, the feed point locations SF=5, SF=6, SF=7 and SF=8 were selected and the simulated results compared and the optimum location adopted and implemented. The best feed point was located at SF=5mm where return loss RL is-37.81dB, followed by SF=6mm with return loss RL of-17.14dB and SF=7mm with return loss RL is-11.38dB. The feed point location at SF=8mm was rejected since it falls outside the acceptable figure of VSWR=2. The material used for the proposed antenna is FR-4 with the dielectric constant of 4.35 and dielectric loss tangent of 14e-3. The proposed antenna can find application in Wireless Local Area Network (WLAN) and cellular phone.
Electronics Engineering,
"... This paper presents Neuro-Fuzzy approach for forecasting analysis in power load. Forecasting the power load is a difficult task for a country and both positive and negative load forecasting makes a big problem for the country. An approach that Neuro-Fuzzy model is proposed for forecast power load in ..."
Abstract
- Add to MetaCart
This paper presents Neuro-Fuzzy approach for forecasting analysis in power load. Forecasting the power load is a difficult task for a country and both positive and negative load forecasting makes a big problem for the country. An approach that Neuro-Fuzzy model is proposed for forecast power load in this paper. The proposed model a fuzzy back propagation network is constructed and then a fuzzy intersection is applied and after that de-fuzzify the result to generate a crisp value by using Radial Basis Function network (RBF). The proposed model improves the accuracy of power load forecasting. The forecasted results obtained by neuro-fuzzy method were compared with the Artificial Neural Network by using Mean Absolute Percentage Error (MAPE) to measure accuracy of the result. The experimental result shows that the neuro-fuzzy implementations have more accuracy.
Results 1 - 10
of
8,481