Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,258,724 papers from all fields of science
Search
Sign In
Create Free Account
Cycle count
Known as:
Cycle counting
, Cyclecount
A cycle count is an inventory auditing procedure, which falls under inventory management, where a small subset of inventory, in a specific location…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Database
Inventory
Warehouse management system
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Comparison of different lead–acid battery lifetime prediction models for use in simulation of stand-alone photovoltaic systems
R. Dufo-López
,
J. Lujano-Rojas
,
J. Bernal-Agustín
2014
Corpus ID: 53534060
Highly Cited
2013
Highly Cited
2013
Economic Feasibility of V2G Frequency Regulation in Consideration of Battery Wear
Sekyung Han
,
Soohee Han
2013
Corpus ID: 111303478
An economic feasibility study of vehicle-to-grid (V2G) frequency regulation is performed in consideration of battery wear…
Expand
Highly Cited
2011
Highly Cited
2011
High-cycle fatigue life prediction for Pb-free BGA under random vibration loading
Da Yu
,
A. Al-Yafawi
,
Tung T. Nguyen
,
Seungbae Park
,
Soonwan Chung
Microelectronics and reliability
2011
Corpus ID: 16125571
Highly Cited
2011
Highly Cited
2011
A QEMU and SystemC-Based Cycle-Accurate ISS for Performance Estimation on SoC Development
Ming-Chao Chiang
,
Tse-Chen Yeh
,
Guo-Fu Tseng
IEEE Transactions on Computer-Aided Design of…
2011
Corpus ID: 7939471
In this paper, we present a fast cycle-accurate instruction set simulator (CA-ISS) for system-on-chip development based on QEMU…
Expand
2010
2010
Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes
Cuauhtemoc Mancillas-López
,
D. Chakraborty
,
F. Rodríguez-Henríquez
IEEE transactions on computers
2010
Corpus ID: 720056
Tweakable enciphering schemes are length-preserving block cipher modes of operation that provide a strong pseudorandom…
Expand
Highly Cited
2009
Highly Cited
2009
RFID-based intra-supply chain in textile industry
S. Kwok
,
Kenny K. W. Wu
Industrial management & data systems
2009
Corpus ID: 206373664
Purpose – The purpose of this paper is to describe the design of a radio frequency identification (RFID)‐based intra‐supply chain…
Expand
Review
2009
Review
2009
MEMS reliability: Where are we now?
Danelle M. Tanner
Microelectronics and reliability
2009
Corpus ID: 8341208
Highly Cited
2007
Highly Cited
2007
Dynamic Load and Stress Analysis of a Crankshaft
Farzin H. Montazersadgh
,
A. Fatemi
2007
Corpus ID: 9545801
In this study a dynamic simulation was conducted on a crankshaft from a single cylinder four stroke engine. Finite element…
Expand
Highly Cited
2005
Highly Cited
2005
Transition phase classification and prediction
Jeremy Lau
,
Stefan Schoenmackers
,
B. Calder
International Symposium on High-Performance…
2005
Corpus ID: 8417573
Most programs are repetitive, where similar behavior can be seen at different execution times. Proposed on-line systems…
Expand
Review
2002
Review
2002
Information management of automatic data capture: an overview of technical developments
Alan D. Smith
,
Felix Offodile
Information Management & Computer Security
2002
Corpus ID: 37025094
Automatic identification and data capture/collection (AIDC) systems are one of the most widely used and under‐recognized IT…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE