سفارش تبلیغ
صبا ویژن
ایمان خود را با صدقه نگاه دارید ، و مالهاتان را با زکات دادن ، و موجهاى بلا را با دعا برانید . و از سخنان آن حضرت است به کمیل پسر زیاد نخعى [نهج البلاغه]
لوگوی وبلاگ
 

دسته بندی موضوعی یادداشتها
 
دانلود رایگان مقاله ISI ، دانلود مقالات IEEE ، دانلود رایگان مقاله IEEE ، دانلود مقاله ، دانلود مقالات ISI ، دانلود رایگان مقاله ACM ، دنلود مقالات ISI ، دانلود رایگان مقاله Science Direct ، دانلود رایگان مقاله از ACM ، دانلود رایگان مقالات مهندسی ، دانلود رایگان مقالات ACM ، دانلود رایگان مقاله مهندسی ، دانلود رایگان مقالات IEEE ، دانلود رایگان مقاله Springer ، دانلود رایگان مقاله آی اس آی ، دانلود مقالات آی اس آی ، دانلود مقاله آی اس آی ، یوزرنیم و پسورد دانشگاه های معتبر ، دانلود مقاله از IEEE ، دانلود رایگان مقالات آی اس آی ، دانلود رایگان مقاله ، دانلود ، یوزرنیم و پسورد سایتهای علمی ، دانلود رایگان مقالات ISI ، دانلود رایگان مقاله Science Direc ، دانلود رایگان ، دانلود رایگان مقالا ، دانلود رایگان مقالات IEEE، دانلود رایگان مقالات ISI، دانلود مقال ، Free ISI Paper Download ، ISI Paper Download ، Paper Download ، انلود رایگان مقالات IEEE ، دانلود رایگان مقالات مهندسی. دانلود رایگان مقاله Springer. دانلو ، دانلود مقاله ISI ، رایگان مقالات ACM ، و پسورد سایتهای علمی ، یوزرنیم ، دانلود مقالات آی ، دانلود مقالات IEEE, دنلود مقالات ISI, دانلود رایگان مقاله IEEE, ، دانلود، مقاله، ISI، 2013، رایانش فراگیر ،

آمار و اطلاعات

بازدید امروز :5
بازدید دیروز :7
کل بازدید :255618
تعداد کل یاداشته ها : 160
103/2/1
6:31 ع

 

به نام خدا

Title: Improved Genetic Algorithms based Optimum Path Planning for Mobile Robot

Authors: Soh Chin Yun , Veleppa Ganapathy ,Lim Ooi Chong

Abstract: Improved genetic algorithms incorporate other techniques, methods or algorithms to optimize the performance of genetic algorithm. In this paper, improved genetic algorithms of optimum path planning for mobile robot navigation are proposed. An Obstacle Avoidance Algorithm (OAA) and a Distinguish Algorithm (DA) are introduced to generate the initial population in order to improve the path planning efficiency to select only the feasible paths during the evolution of genetic algorithm. Domain heuristic knowledge based crossover, mutation, refinement and deletion operators are specifically designed to fit path planning for mobile robots. Proposed genetic algorithms feature unique, simple path representations, and simple but effective evaluation methods. Simulation studies and real time implementations are carried out to verify and validate the effectiveness of the proposed algorithms.   

Publish Year: 2010

Published in: ICARCV - IEEE

Number of Pages: 13

موضوع: الگوریتم ژنتیک (Genetic Algorithms)

مشاهده صفحه اول مقاله

دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرانیان

 

 


  

به نام خدا

Title: Fractal behind coin-reducing payment

Authors: Ken Yamamoto , Yoshihiro Yamazaki

Abstract: The minimal payment a payment method which minimizes the number of coins in a purse is presented. We focus on a time series of change given back to a shopper repeating the minimal payment. By using the delay plot, the set of successive change possesses a fine structure similar to the Sierpinski gasket. We also estimate affectivity of the minimal- payment method by means of the average number of coins in a purse, and conclude that the minimal-payment strategy is the best to reduce the number of coins in a purse. More- over, we compare our results to the rule-60 cellular automaton and the Pascal Sierpinski gaskets, which are known as generators of the discrete Sierpinski gasket.   

Publish Year: 2012

Published in: Chaos, Solitons & Fractals - Science Direct

Number of Pages: 9

موضوع: فرکتال (Fractal)

مشاهده صفحه اول مقاله

دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرانیان

 


  

به نام خدا

Title: Inductive Data Flow Graphs

Authors: Azadeh Farzan Zachary Kincaid, Andreas Podelski

Abstract: The correctness of a sequential program can be shown by the annotation of its control flow graph with inductive assertions. We pro-pose inductive data flow graphs, data flow graphs with incorporated inductive assertions, as the basis of an approach to verifying concurrent programs. An inductive data flow graph accounts for a set of dependencies between program actions in interleaved thread executions, and therefore stands as a representation for the set of concurrent program traces which give rise to these dependencies. The approach first constructs an inductive data flow graph and then checks whether all program traces are represented. The size of the inductive data flow graph is polynomial in the number of data dependencies (in a sense that can be made formal); it does not grow exponentially in the number of threads unless the data dependencies do. The approach shifts the burden of the exponential explosion towards the check whether all program traces are represented, i.e., to a combinatorial problem (over finite graphs).   

Publish Year: 2013

Published in: ACM-SIGPLAN-SIGACT

Number of Pages: 14

موضوع: نظریه گراف (Graph Theory)

مشاهده صفحه اول مقاله

دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرانیان


  

به نام خدا

Title: Minimizing Transmit Power for Cooperative Multicell System with Massive MIMO

Authors: Jinkyu Kang and Joonhyuk Kang

Abstract: We consider the problem of designing transmit beam former and power for downlink cooperative base-station(BS) system with a large antenna arrays. Since the design of the beam forming vector at the transmitter requires high computational complexity, in a large antenna arrays, we utilize the zero-forcing transmit beamformer, which is the simplest form and the optimal performance in a large antenna arrays. Therefore, this paper focuses on the design of power allocation with n¼üxed transmit beam former for minimizing the transmit power while meeting target signal-to-interference-and-noise-ratio(SINR) of each user and power constraints. We consider two scenarios according to the power constraints of cooperative BSs.One scenario is the sum power constraint on the cooperative base-stations. In this case, the cooperative BSs share the total available transmit power. However, each BS exists a maximum availabletransmit power in practical implementations. Thus, we consider amore realistic per BS power constraints. We proposed the solution strategies for both scenarios: For the sum power constraint case,a simple intuitive solution, where the power is allocated withoutregard to the power constraint until the SINR constraints issatisn¼üed, is presented. For the per BS power constraints case, weuse the properties of a large antenna arrays to n¼ünd the solution ofclosed form. We also demonstrate, via numerical simulation, the performance of proposed strategy is convergent to the optimal performance which is achieved by using the iterative algorithm.   

Publish Year: 2013

Published in: CCNC - IEEE

Number of Pages: 5

موضوع: الکترونیک

مشاهده صفحه اول مقاله

دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرانیان

 


  

به نام خدا

Title: Slender-Set Differential Cryptanalysis

Authors: Julia Borghoff, Lars R Knudsen, Gregor Leander, and Sren S Thomsen

Abstract: This paper considers PRESENT-like ciphers with key-dependent S-boxes. We focus on the setting where the same selection of S-boxes is used in every round. One particular variant with 16 rounds, proposed in 2009, is broken in practice in a chosen plaintext/chosen cipher text scenario. Extrapolating these results suggests that up to 28 rounds of such ciphers can be broken. Furthermore, we outline how our attack strategy can be applied to an extreme case where the S-boxes are chosen uniformly at random for each round, and where the bit permutation is key-dependent as well.   

Publish Year: 2013

Published in: Journal of Cryptography - Journal of Springer

Number of Pages: 28

موضوع: رمزنگاری (Cryptography)

مشاهده صفحه اول مقاله

دانلود مقاله

لینک مقاله در سایت ناشر

 

ایران سای – مرجع مقالات علمی فنی مهندسی

حامی دانش بومی ایرانیان


  
   1   2   3   4   5   >>   >