Results 31 to 40 of about 46,039 (264)

Subarrayed Antenna Array Synthesis Using Ternary Adjusting Method

open access: yesInternational Journal of Antennas and Propagation, 2014
Ternary adjusting method is proposed and combined with particle swarm optimization (PSO) algorithm for subarrayed antenna array synthesis. Ternary variables are introduced to represent element adjustments between adjacent subarrays.
Guolong He   +3 more
doaj   +1 more source

Ensuring reliable network operations and maintenance: The role of PMRF for switch maintenance and upgrades in SDN

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
In the realm of software-defined networking (SDN), ensuring robust maintenance operations and the consistent performance of switch operations, especially during maintenance and upgrades, is of paramount importance.
Nauman Khan   +5 more
doaj   +1 more source

Balanced ternary addition using a gated silicon nanowire

open access: yes, 2011
We demonstrate the proof of principle for a ternary adder using silicon metal-on-insulator single electron transistors (SET). Gate dependent rectifying behavior of a single electron transistor results in a robust three-valued output as a function of the ...
Klein, M.   +5 more
core   +1 more source

Design principle of naming scheme for ternary logic operation

open access: yes上海师范大学学报. 自然科学版
The difficulty of using truth table to describe the logical operation to the academic communication and highlighting the logical operation characteristics was analyzed, and the necessity of scientific naming the multi-valued logic operation rules was ...
LI Shuang, LI Luqun, JIN Yi
doaj   +1 more source

Bit Manipulation: Conditional Statement using Bit-wise operators with C++

open access: yesIJID (International Journal on Informatics for Development), 2020
All of information that manipulated by a computer is represented in the form of bits, so in the programming language it is necessary to understand bitwise operations at the first.
Rahmawati Nafi'ah   +3 more
doaj   +1 more source

Hardware-efficient on-line learning through pipelined truncated-error backpropagation in binary-state networks [PDF]

open access: yes, 2017
Artificial neural networks (ANNs) trained using backpropagation are powerful learning architectures that have achieved state-of-the-art performance in various benchmarks.
Cauwenberghs, Gert   +3 more
core   +2 more sources

A ternary operation on lattices [PDF]

open access: yesCzechoslovak Mathematical Journal, 1956
Ist \(L = L(\cap, \cup)\) ein Verband, so wird mit \(\tilde{L}\) der zu \(L\) duale Verband bezeichnet. Ein Element \(t\in L\) hat die Eigenschaft (c), wenn \(t\) neutral ist und in jedem \(t\) umfassenden Intervall ein relatives Komplement von \(t\) existiert.
openaire   +1 more source

Classification of navigational and fishing situations by the ship's specialist

open access: yesVestnik MGTU, 2018
Operations of synthesis and analysis of the state of the navigational or fishing situation are performed by a shipboard specialist who carrying watch, he ought to take into account a large number of contradictory factors.
Viviorra S. I.   +2 more
doaj   +1 more source

Ternary Łukasiewicz logic using memristive devices

open access: yesNeuromorphic Computing and Engineering, 2023
Memristive devices based on the Valence Change Mechanism (VCM) are promising devices for storage class memory, neuromorphic computing and logic-in-memory (LIM) applications.
Christopher Bengel   +7 more
doaj   +1 more source

KUTRITE IN QUANTUM COMPUTATIONS

open access: yesСовременная наука и инновации, 2022
Limitations to the use of information and operation restriction information are a consequence of the physical nature of information. Conservative logic can solve any computable by Church, because with its help it is possible to implement a Turing machine
Svetlana Anatolevna Inozemtseva
doaj  

Home - About - Disclaimer - Privacy