The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Efficient methods for detecting electricity fraud has been an active research area in recent years. This paper presents a hybrid approach towards non-technical loss (NTL) analysis for electric utilities using genetic algorithm (GA) and support vector machine (SVM). The main motivation of this study is to assist Tenaga Nasional Berhad (TNB) in Malaysia to reduce its NTLs in the distribution sector...
Microarray technology facilitates the monitoring of the expression profile of a large number of genes across different experimental conditions simultaneously. This article proposes a novel approach that combines a recently proposed multiobjective fuzzy clustering scheme with support vector machine (SVM), to yield improved solutions. The multiobjective technique is first used to produce a set of non-dominated...
Among the power-aware circuit synthesis techniques that have been proposed so far, power-gating has traditionally been the most effective way to lower power. In this approach, power reduction is achieved by shutting off the power supply to some portions of the logic block which are not active. So, we have to partition the design into two or more power islands. Suitable Finite State Machine partitioning...
Steganography is used to hide the occurrence of communication. This creates a potential problem when this technology is misused for planning criminal activities. Differentiating anomalous audio document (stego audio) from pure audio document (cover audio) is difficult and tedious. This paper investigates the use of a Genetic-X-means classifier, which distinguishes a pure audio document from the adulterated...
Multiple-valued reversible logic is an emerging area in reversible and quantum logic circuit synthesis. Multiple-valued reversible logic circuits can potentially reduce the width of the reversible or quantum circuit which is a limitation in current quantum technology. In this paper we propose a method to synthesize the multiple-valued reversible sequential circuits. Implementations for ternary D and...
The characteristics of Mobile Ad hoc Networks (MANET) demands new set of network strategies in order to provide reliable group communication. Group communication is an essential requirement for MANET since nodes forming these temporary networks generally come together for common purposes and they need to collaborate. Multicast routing protocols plays a significant role in MANET to provide this communication...
In this paper, two different control methods on DC-DC Converter, are investigated. Lately, improvement the performance of the DC-DC converter is one of the goals of the engineers in the industries. In this paper, Pole Placement controller is used to optimize the DC-DC converter performance. Also other controller, by the way, Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) are used with...
In this paper, an automatic segmentation technique of multispectral magnetic resonance image of the brain using a new line symmetry based genetic clustering technique is proposed. The proposed real-coded variable string length genetic clustering technique (VGALS clustering) is able to evolve the number of clusters present in the data set automatically. Here assignment of points to different clusters...
This paper addresses using quantum gates to implement binary reversible logic circuits. We propose behavioral models for well known V and V+ quantum gates. Our proposed representation is used to synthesize reversible logic circuits instead of using the known unitary matrix form of quantum gates. This technique allows V and V+ gates to be represented in truth table forms. Results show that our technique...
Hardware/software partitioning is a critical phase in the codesign approach of embedded system design. Most of the partitioning algorithms proposed assume that an embedded system has distinct sub-modules. The issue of partitioning of resource constrained embedded systems consisting of multiple occurrences of a single functionality, needs to be addressed. In this paper, we propose a genetic algorithm...
Zone routing protocol (ZRP) is a most promising and widely accepted and well proved hybrid routing protocol in mobile ad-hoc networks ( MANETs) for its performance when compared with table-driven and on-demand protocols. In this paper, we propose a new routing protocol called genetic zone routing protocol (GZRP) which is the extension of ZRP by using genetic algorithm (GA). There are studies related...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.