نتایج جستجو برای: algorithm architecture adequation
تعداد نتایج: 955316 فیلتر نتایج به سال:
level abstraction platform portability m architecture 1 architecture algorithm n specific algorithm 1 specific scheme decomosition scheme decomposition 1-dimensional decomposition volume/boundary algorithms with
this paper intends to offer a new iterative method based on articial neural networks for finding solution of a fuzzy equations system. our proposed fuzzied neural network is a ve-layer feedback neural network that corresponding connection weights to output layer are fuzzy numbers. this architecture of articial neural networks, can get a real input vector and calculates its corresponding fu...
The time consumption in solving computationally heavy problems has always been a concern for computer programmers. Due to simplicity of its implementation, the PSO (Particle Swarm Optimization) is a suitable meta-heuristic algorithm for solving computationally heavy problems. However, despite the simplicity, the algorithm is inefficient for solving real computationally heavy problems but the pr...
Abs t rac t : The dominant philosophy regarding the formalization of Commonsense Inferencing in the physical domain consists in the exploitation of the "tarskian" scheme axiomatization <-> interpretation borrowed from mathematical logic. The commonsense postulates constitute the axiomatization, and the real world provides the "model" for this axiomatization. The observation of the effective act...
This article considers the roles played by ethnic mentions, or ethnonyms, in the discursive reconstruction of a former neighborhood in Easton, Pennsylvania, “Syrian Town.” We argue that these labels engage in the production of ethnic difference by depicting a social world composed of discrete types while presupposing a local class divide and a contrasting neighborhood imagined as elite and priv...
In this paper we study the counterparty risk on a payer CDS in a Markov chain model of two reference credits, the firm underlying the CDS and the protection seller in the CDS. We first state few preliminary results about pricing and CVA of a CDS with counterparty risk in a general set-up. We then introduce a Markov chain copula model in which wrong way risk is represented by the possibility of ...
The proposed architecture carried out makes use of n iterations to produce the final value of the function upto an accuracy of n bits. A two’s complement 4bit carry-look ahead adder/subtractor block with carry-save has been implemented as part of the architecture for greater speed. An 8-bit barrel shifter has been implemented for use in the algorithm. An optimum use of edge-triggered latches an...
This paper uses joint optimization of both the algorithm and architecture to enable high coding efficiency in conjunction with high processing speed and low area cost. Specifically, it presents several optimizations that can be performed on Context Adaptive Binary Arithmetic Coding (CABAC), a form of entropy coding used in H.264/AVC, to achieve the throughput necessary for real-time low power h...
Given the popularity of decimal arithmetic, hardware implementation of decimal operations has been a hot topic of research in recent decades. Besides the four basic operations, the square root can be implemented as an instruction directly in the hardware, which improves the performance of the decimal floating-point unit in the processors. Hardware implementation of decimal square rooters is usu...
The determination and subsequent analysis of potential enemy course of actions (COAs) forms a key element within the Intelligence Preparation of the Battlespace (IPB) process. Enemy COA prediction and analysis is also key element of threat assessment data fusion processing. Here we formulate an architecture that employs genetic algorithms (GAs) to generate and evaluate enemy COAs. This formulat...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید