An Implementation of a Shuttle Box Sequencing Algorithm
نویسندگان
چکیده
منابع مشابه
development and implementation of an optimized control strategy for induction machine in an electric vehicle
in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...
15 صفحه اولParallel Implementation of the Box Counting Algorithm in OpenCL
The Box Counting algorithm is a well-known method for the computation of the fractal dimension of an image. It is often implemented using a recursive subdivision of the image into a set of regular tiles or boxes. Parallel implementations often try to map the boxes to different compute units, and combine the results to get the total number of boxes intersecting a shape. This paper presents a nov...
متن کاملInhibitory Avoidance with a Two-way Shuttle-box
so called passive avoidance), the animal precludes the aversive stimulus by not showing a behavior regularly shown in a particular environment. Inhibitory avoidance is acquired in only one trial, where the subject is punished for doing something such as entering a new compartment (test). Then, in a second session (retest), behavioral inhibition, for example not entering the compartment, is meas...
متن کاملComputing Box Volume from Images: An Implementation
of the Report Computing Box Volume from Images: An Implementation Gustavo Jose Crespo Master of Science In Computer Science State University of New York At Stony Brook 2002 The calculation of volume has become an intrinsic part of the day to day business of several industries in the United States and abroad. In this report, we present a method for the efficient calculation of volumes of boxes f...
متن کاملWhite-Box Cryptography and an AES Implementation
Conventional software implementations of cryptographic algorithms are totally insecure where a hostile user may control the execution environment, or where co-located with malicious software. Yet current trends point to increasing usage in environments so threatened. We discuss encrypted-composed-function methods intended to provide a practical degree of protection against white-box (total acce...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Textile Engineering
سال: 2014
ISSN: 1346-8235,1880-1986
DOI: 10.4188/jte.60.83