Search
Now showing items 181-190 of 265
Transfer matrix factorization based synthesis of resistively terminated LC ladder networks
(2009)
In this paper a transfer matrix factorization based synthesis algorithm for resistively terminated low-pass LC ladder networks is presented. In the algorithm component value of the extracted element and the reflection ...
Parallel implementation of iterative rational Krylov methods for model order reduction
(IEEE, 2009)
Model order reduction (MOR) techniques are getting more important in large scale computational tasks like large scale electronic circuit simulations. In this paper we present some experimental work on multiprocessor systems ...
Acute gastrointestinal complications after open heart surgery
(Asia Publishing Exchange Pte Ltd, 2000)
Retrospective analysis revealed that 24 of 4401 adult patients (0.5%) developed severe gastrointestinal complications after open heart surgery during a 3-year period from January 1995. There were 4 women (17%) and 20 men ...
A synthesis tool for the multiplierless realization of FIR-based multirate DSP systems
(IEEE, 2000)
In this study a synthesis tool using a novel multirate folding technique which handles each FIR filter in a multirate DSP system as a single node is developed. A new architecture is presented for the multiplierless realization ...
VLSI implementation of GRBF (Gaussian Radial Basis Function) networks
(IEEE, 2000)
A GRBF network is designed for VLSI implementation. Building blocks of the network consist mainly of analog circuits: op-amp multiplier multiplying DAC (digital to analog converter) floating resistor summer and exponentiator. ...
Screening of a stentless valve with electron beamed tomograpy 5 years after operation
(2001)
[Abstract Not Available]
Routing performance analysis of opportunistic networks with flooding and partial flooding methods [Fırsatçı a?larda taşırma ve kısmi taşırma yöntemleriyle yönlendirme performans analizi]
(IEEE, 2012)
Opportunistic networks is one of the fast developing research areas in mobile communications. Under opportunistic networks mobile nodes try to communicate with other nodes without any prior information and knowledge about ...
The effect of secondary user locations on the cooperative detection performance [İki?nci?l kullanıcı konumlarının i?şbi?rli?kli? algılama yöntemi? performansına etki?si?]
(IEEE, 2012)
In conventional cooperative detection a fusion center decides on the presence or absence of the primary user by gathering all the information from secondary users and conveys this decision to all users. This approach does ...
Parallel-in-space implementation of transient stability analysis on a Linux cluster with infiniband
(IEEE, 2012)
On-line transient stability analysis is an inevitable way to provide real time power system security and control. Parallel computing is one of the most viable ways to perform on-line transient stability analysis. This paper ...
Active reconfigurable control of a submarine with indirect adaptive control
(2003)
An indirect adaptive controller is designed for submersibles. The design is developed using a linearized MIMO model of a submarine. Standard recursive least squares estimation method is used to estimate the parameters. ...