Search
Now showing items 51-60 of 85
Thyroid and breast cancer disease diagnosis using Fuzzy-neural networks
(2009)
In this paper a new hybrid structure in which Neural Network and Fuzzy Logic are combined is proposed and its algorithm is developed. Fuzzy-CSFNN Fuzzy-MLP and Fuzzy-RBF structures are constituted and their performances ...
Transfer matrix factorization based synthesis of resistively terminated LC ladder networks
(2009)
In this paper a transfer matrix factorization based synthesis algorithm for resistively terminated low-pass LC ladder networks is presented. In the algorithm component value of the extracted element and the reflection ...
Parallel implementation of iterative rational Krylov methods for model order reduction
(IEEE, 2009)
Model order reduction (MOR) techniques are getting more important in large scale computational tasks like large scale electronic circuit simulations. In this paper we present some experimental work on multiprocessor systems ...
A synthesis tool for the multiplierless realization of FIR-based multirate DSP systems
(IEEE, 2000)
In this study a synthesis tool using a novel multirate folding technique which handles each FIR filter in a multirate DSP system as a single node is developed. A new architecture is presented for the multiplierless realization ...
Routing performance analysis of opportunistic networks with flooding and partial flooding methods [Fırsatçı a?larda taşırma ve kısmi taşırma yöntemleriyle yönlendirme performans analizi]
(IEEE, 2012)
Opportunistic networks is one of the fast developing research areas in mobile communications. Under opportunistic networks mobile nodes try to communicate with other nodes without any prior information and knowledge about ...
The effect of secondary user locations on the cooperative detection performance [İki?nci?l kullanıcı konumlarının i?şbi?rli?kli? algılama yöntemi? performansına etki?si?]
(IEEE, 2012)
In conventional cooperative detection a fusion center decides on the presence or absence of the primary user by gathering all the information from secondary users and conveys this decision to all users. This approach does ...
Parallel-in-space implementation of transient stability analysis on a Linux cluster with infiniband
(IEEE, 2012)
On-line transient stability analysis is an inevitable way to provide real time power system security and control. Parallel computing is one of the most viable ways to perform on-line transient stability analysis. This paper ...
Active reconfigurable control of a submarine with indirect adaptive control
(2003)
An indirect adaptive controller is designed for submersibles. The design is developed using a linearized MIMO model of a submarine. Standard recursive least squares estimation method is used to estimate the parameters. ...
EM-MAP based initialization of PIC receiver for downlink MC-CDMA systems
(IEEE, 2007)
The quality of multiple access interference (MAI) which can be improved by using channel estimation and data estimation of all active users effects considerably the performance of PIC detector. Therefore data and channel ...
Performance of stack equalizer over frequency selective fading channels [Frekansa ba?lı sönümlemeli kanallarda yi?it denkleştiricinin başarımı]
(2008)
In this paper the performance of the low complexity modified stack equalizer over frequency-selective fading channels is inspected. With the help of simulation results it is illustrated that by sacrificing the computational ...