Results (61)
Search Parameters:
Keyword: OperationsSoftware and Hardware Enhancement of Convolutional Neural Networks on GPGPUs
Convolutional Neural Networks (CNNs) have gained attention in recent years for their ability to perform complex machine learning tasks with high accuracy and resilient to noise of inputs. The time-consuming convolution operations of CNNs pose great challenges to both software as well as hardware designers. To achieve superior performance, a design involves careful concerns between…
Read MoreSecurity Analysis and the Contribution of UPFC for Improving Voltage Stability
The occurrence of many failures in the power system can lead to power instability and affects the system parameters to go beyond its operating limits. It may lead to obstructing the secure operations and reliability of power systems. Ensuring power system security needs proper actions to be taken for the undesirable contingency. Thus, security analysis…
Read MoreTheoretical Investigation of Combined Use of PSO, Tabu Search and Lagrangian Relaxation methods to solve the Unit Commitment Problem
Solving the Unit Commitment problem (UCP) optimizes the combination of production units operations and determines the appropriate operational scheduling of each production units to satisfy the expected consumption which varies from one day to one month. Besides, each production unit is conducted to constraints that render this problem complex, combinatorial and nonlinear. In this paper,…
Read MoreA Switched-Capacitor Low-Pass Filter with Dynamic Switching Bias OP Amplifiers
A switched capacitor low-pass filter employing folded-cascode CMOS OP Amps with a dynamic switching bias circuit capable of processing video signals, which enables low power consumption, and operation in wide bandwidths and low power supply voltages, is proposed. In this filter, charge transfer operations through two-phase clock pulses during the on-state period of the OP…
Read MoreMonitoring power breakers using vibro acoustic techniques
Speaking about the commutation’s equipment, it can be said that the best solution in increasing reliability and lowering the maintenance costs is a continuous monitoring of the equipment. However, if the price/quality ratio is considered, it is obvious that, for the moment, the diagnosis can be also an acceptable solution. Nowadays the predictive maintenance for…
Read MoreUse of machine learning techniques in the prediction of credit recovery
This paper is an extended version of the paper originally presented at the International Conference on Machine Learning and Applications (ICMLA 2016), which proposes the construction of classifiers, based on the application of machine learning techniques, to identify defaulting clients with credit recovery potential. The study was carried out in 3 segments of a Bank’s…
Read MoreA Microwave Reflectometer Prototype for Detection of Body Through the Rubble of Collapsed Buildings
There is a growing interest in using radio frequency in imaging for problem solving in situational awareness, surveillance, search and rescue operations, and screening for security. This has been fetched from recent development in addition to innovative technologies in microwave radar imaging applications. Despite the fact that no new phenomenology is exposed in this field,…
Read MoreThe main characteristics of five distributed file systems required for big data: A comparative study
These last years, the amount of data generated by information systems has exploded. It is not only the quantities of information that are now estimated in Exabyte, but also the variety of these data which is more and more structurally heterogeneous and the velocity of generation of these data which can be compared in many…
Read MoreA Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation
Side-Channel Attack (SCA) is an effective method in extracting the secret key of cryptographic algorithms by correlating the physical leakage information with the processed data. In this paper, we propose an arithmetic hiding cum Look-up Table (AHLUT) based Substitution-Box (S-Box) in AES-128 cryptographic algorithm implementation to countermeasure against SCA. There are three key features in…
Read MorePseudo-Analysis: Measures of General Conditional Information
The aim of this paper is to continue our study of information in the setting of Pseudo-Analysis. We shall present, by axiomatic way, the definition of measures of general conditional information and we shall study particular measure by using a system of functional equations in which it is present a pseudo-operation. We know that J.Aczel…
Read MoreAssessment of Wastewater in Duhok Valley, Kurdistan Region/Iraq
In order to characterize the waste water in Duhok valley in Duhok governorate, during 25km, seven sites were selected in Duhok valley, to represent their water quality. Monthly samples were collected from the Duhok valley for the period from, April to September, 2015. The qualitative study of Duhok valley water tested, as considered one of…
Read More
