In this paper, a Multi-Choice Stochastic Bi-Level programming Problem (MCSBLPP) is considered where all the parameters of constraints are followed by normal distribution. The cost coefficients of the objective functio...
详细信息
In this paper, the Test Pattern Generation (TPG) with a new simple hybrid (dynamic and static) compaction technique for combinational logic circuits and systems is presented. Digital systems are implemented nowadays o...
详细信息
ISBN:
(纸本)9781467384612
In this paper, the Test Pattern Generation (TPG) with a new simple hybrid (dynamic and static) compaction technique for combinational logic circuits and systems is presented. Digital systems are implemented nowadays on an advance VLSI technology, which is called Field Programmable Gate Array (FPGA). The test procedure requires a deliberate introduction of faults in the System Under Test (SUT). FPGA circuits and systems are developed and written in Hardware Description Languages (HDLs). In addition, a novel method is also proposed and implemented in order to intentionally inject faults in the Verilog HDL code design of the SUT. It covers all possible fault locations in the SUT. This approach provides high quality compact test vectors and efficient memory utilization in comparison with other state-of-the-art methods. Not only are the hardness of individual faults and the sensitiveness of fault locations determined, but also their effectiveness is proposed in the fault tolerance strategy.
In this paper, we propose a dual-image based reversible data hiding scheme. Here, we divide a secret message into sub-stream of size n bits, where n-1 bits are embedded using Pixel Value Differencing (PVD) and 1 bit i...
详细信息
In this paper, we propose a dual-image based reversible data hiding scheme. Here, we divide a secret message into sub-stream of size n bits, where n-1 bits are embedded using Pixel Value Differencing (PVD) and 1 bit is embedded using Difference Expansion (DE). We consider two consecutive pixels from cover image, calculate the difference between them andthen embed n-1 bits secret message by modifying the pixel pair. Again, we consider that modified pixel pair to embed 1 bit secret message using embedding function. After that, we distribute these two stego pixel pairs among dual image depending on a shared secret key bit stream. At the receiver end, we extract the secret message successfully and recover original cover image from dual stego image without any distortion. Finally, we compare our scheme with other state-of-the-art methods and obtain reasonably better performance in terms of data embedding capacity.
Accelerated Processing Unit (APU) is a heterogeneous multicore processor that contains general-purpose CPU cores and a GPU in a single chip. It also supports Heterogeneous System Architecture (HSA) that provides coher...
详细信息
In this paper, we investigate six new transportation models with breakability and vehicle cost under some restriction on transported amount. An extra constraint on the total budget at each destination is imposed. Here...
详细信息
In this paper, we investigate six new transportation models with breakability and vehicle cost under some restriction on transported amount. An extra constraint on the total budget at each destination is imposed. Here six models are formulated under different environments such as crisp, stochastic and fuzzy. Using expected value of fuzzy number and chance constraint programming technique, we convert the respective fuzzy and random Models into its crisp equivalent. To get the preference of the objective function, we apply weighted sum method and a gradient based optimisation technique-generalised reduced gradient (GRG) method are applied and using LINGO-13 software to get the optimal solutions.
Product reliability is of significant importance in today’s technological world. People rely more and more upon the sustained functioning of machinery and complex equipments for purposes such as health, economic welf...
详细信息
In this study, the effect of practical courses (especially robotics) on students' success is evaluated using fuzzy cognitive maps. This study particularly focuses on how practical courses increase the learning ach...
详细信息
ISBN:
(纸本)9781509007790
In this study, the effect of practical courses (especially robotics) on students' success is evaluated using fuzzy cognitive maps. This study particularly focuses on how practical courses increase the learning achievements in vocational schools. For this purpose, students and academicians were chosen as stakeholders for this study. Student were selected from departments of machine, electronic and computer. In total views of 30 students were taken and evaluated using fuzzy cognitive maps before the study. Students were studied on three projects within this study. These projects are autonomous cleaning robot, chameleon robot and sumo wrestler robot. Each robot was developed by a group consisting of ten students. Three main outputs determined to be gained by students in the robot development process as sensor calibration, improvement of mechanical systems and software optimization. These outputs are also among the output concepts of the fuzzy cognitive map. Sensor calibration, improvement of the mechanical systems and optimization of the software are the critical tasks respectively for the student groups of electronics, machine and computer. Each student group shared students of their departments homogeneously. Academicians were selected as one from each department. Fuzzy cognitive maps' survey applied to 15 academicians. After the design and development processes of robots, students and academicians views re-evaluated. It was observed clearly from the comparison of the results that, learning achievement, desire to learn, desire to interdisciplinary collaboration, self-confidence, interest in robotic technologies, satisfaction and desire to give priority to practical training in other subjects are increased by %45, %63, %42, %74, %85, %88 and %76 respectively.
In this paper, we consider a mathematical model involving three species namely prey, predator and super predator. Different type functional responses have been considered to formulate the mathematical model for predat...
详细信息
Interval-valued fuzzy threshold graph is an extension of fuzzy threshold graph. In this paper, interval-valued fuzzy threshold graph, interval-valued fuzzy alternating 4-cycle, and interval-valued fuzzy threshold dime...
详细信息
Interval-valued fuzzy threshold graph is an extension of fuzzy threshold graph. In this paper, interval-valued fuzzy threshold graph, interval-valued fuzzy alternating 4-cycle, and interval-valued fuzzy threshold dimension are defined, and certain properties are studied. It is demonstrated that every interval-valued fuzzy threshold graph can be treated as an interval-valued fuzzy split graph.
In this paper we propose to think out of the box and discuss an approach for universal mitigation of Negative Bias Temperature Instability (NBTI) induced aging untied from the limitations of its modelling. The cost-ef...
详细信息
ISBN:
(纸本)9781509006946
In this paper we propose to think out of the box and discuss an approach for universal mitigation of Negative Bias Temperature Instability (NBTI) induced aging untied from the limitations of its modelling. The cost-effective approach exploits a simple property of a randomized design, i.e., the equalized signal probability and switching activity at gate inputs. The techniques considered for structural design randomization involve both the hardware architecture and embedded software layers. Ultimately, the proposed approach aims at extending the reliable lifetime of nanoelectronic systems.
暂无评论