نتایج جستجو برای: 16 and 32 plantsm

تعداد نتایج: 16892933  

Journal: :CoRR 1995
Rob Seaman William Pence Arnold Rots

This paper describes a simple means for embedding a checksum within a FITS header, providing a mechanism for later verifying the integrity of the FITS le. The method uses ASCII coded 32-bit 1's complement arithmetic to force the checksum of each FITS HDU to zero. This technique requires no extension of the FITS standard to be used by any given project, in fact the technique may be used to zero ...

Journal: :IEEE Trans. on CAD of Integrated Circuits and Systems 2007
Srinivasa R. Sridhara Naresh R. Shanbhag

A reliable high-speed bus employing low-swing signaling can be designed by encoding the bus to prevent crosstalk and provide error correction. Coding for on-chip buses requires additional bus wires and codec circuits. In this paper, fundamental bounds on the number of wires required to provide joint crosstalk avoidance and error correction using memoryless codes are presented. The authors propo...

2016
Pierre Wilke

bytes: memval ::= Byte(b) | Pointer(b, i, n) | Undef Memory chunks: memory_chunk ::= Mint8signed 8-bit integers | Mint8unsigned | Mint16signed 16-bit integers | Mint16unsigned | Mint32 32-bit integers or pointers | Mfloat32 32-bit floats | Mint64 64-bit integers | Mfloat64 64-bit floats alloc m lo hi = (m′, b) Allocates a fresh block with bounds [lo, hi[. free m b = bm′c Frees (invalidates) the...

2006
Felix Sasaki

This paper introduces ongoing and current work within Internationalization (i18n) Activity, in the World Wide Web Consortium (W3C). The focus is on aspects of the W3C i18n Activity which are of benefit for the creation and manipulation of multilingual language resources. In particular, the paper deals with ongoing work concerning encoding, visualization and processing of characters; current wor...

2016
Xun Yi Xuechao Yang Yong Feng Fengling Han Ron G. van Schyndel

Hash functions are commonly used in checksums, check digits, fingerprints, randomization functions, error-correcting codes, and ciphers. In this paper, we give a family of hash functions on the basis of chaotic tent maps and the sponge construction, where input is absorbed into the hash state at a given rate, then an output hash is squeezed from it at the same rate. The family include four type...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - دانشکده علوم 1388

based on the latest records of typhlops vermicularis merrem, 1820 from iran, this species is distributed in the northern and southern regions of the country. in this study, new records of typhlops vermicularis are presented and it is shown that distribution range of this species is extended towards the eastern and western iran, and according to the new distribution map, it can be assumed that t...

Journal: :دانش گیاه پزشکی ایران 0
نازنین مستقیمی دانشجوی سابق ارشد سیدعلی اصغر فتحی استادیار دانشگاه محقق قدیر نوری قنبلانی استاد دانشگاه محقق جبرائیل رزمجو استادیار دانشگاه محقق هوشنگ رفیعی دستجردی استادیار دانشگاه محقق

the mill moth, ephestia kuehniella zeller and indian meal moth, plodia interpunctella (hubner) are two injuriously important pests of stored products worldwide. harobracon hebetor (say) has been used as a biological control agent of moth’s larva in peanut storehouses and as well in packaged cereal products. in the present study, the efficacy of h. hebetor in parasitizing larva of the mill moth ...

Journal: :The Journal of Engineering 2023

The continued quest for finding a low-power and high-performance hardware algorithm signed number multiplication led to designing simple novel radix-8 multiplier with 3-bit grouping partial product reduction performed using magnitudes of the multiplicand multiplier. pre-computation stage constitutes magnitude calculation non-trivial computations required generate products. A new strategy is dep...

Journal: :Cytologia 2022

Chromosome numbers of six Strobilanthes (Acanthaceae) species from China have been reported for the first time: S. compacta (2n=30), longzhouensis reptans bantonensis (2n=32), hongii (2n=32) and retusa (2n=32). Based on reports at present, x=15 x=16 are assumed to be main basic chromosome Strobilanthes.

2001
Chi-Hung Chi Kwok-Shing Cheng Ling Wong

Traditional text compression algorithms such as Huffman and LZ variants are usually based on 8-bit characters sampling. However, under the unicode representation for multilingual information, the character set of each language such as Chinese and Japanese is consisted of a very number of distinct characters and thus 16-bit or 32-bit character sampling is needed. Consequently, when text compress...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید