نتایج جستجو برای: algorithm architecture adequation

تعداد نتایج: 955316  

1991
J. E. Boillat H. Burkhart K. M. Decker R. Rehmann

level abstraction platform portability m architecture 1 architecture algorithm n specific algorithm 1 specific scheme decomosition scheme decomposition 1-dimensional decomposition volume/boundary algorithms with

Journal: :international journal of industrial mathematics 0
a. jafarian department of mathematics, urmia branch, islamic azad university, urmia, iran. s. measoomy nia department of mathematics, urmia branch, islamic azad university, urmia, iran.

this paper intends to offer a new iterative method based on arti cial neural networks for finding solution of a fuzzy equations system. our proposed fuzzi ed neural network is a ve-layer feedback neural network that corresponding connection weights to output layer are fuzzy numbers. this architecture of arti cial neural networks, can get a real input vector and calculates its corresponding fu...

ژورنال: محاسبات نرم 2020

The time consumption in solving computationally heavy problems has always been a concern for computer programmers. Due to simplicity of its implementation, the PSO (Particle Swarm Optimization) is a suitable meta-heuristic algorithm for solving computationally heavy problems. However, despite the simplicity, the algorithm is inefficient for solving real computationally heavy problems but the pr...

1986
Marc Dymetman

Abs t rac t : The dominant philosophy regarding the formalization of Commonsense Inferencing in the physical domain consists in the exploitation of the "tarskian" scheme axiomatization <-> interpretation borrowed from mathematical logic. The commonsense postulates constitute the axiomatization, and the real world provides the "model" for this axiomatization. The observation of the effective act...

2013
Andrea L. Smith Anna Eisenstein

This article considers the roles played by ethnic mentions, or ethnonyms, in the discursive reconstruction of a former neighborhood in Easton, Pennsylvania, “Syrian Town.” We argue that these labels engage in the production of ethnic difference by depicting a social world composed of discrete types while presupposing a local class divide and a contrasting neighborhood imagined as elite and priv...

2009
S. Crépey M. Jeanblanc B. Zargari

In this paper we study the counterparty risk on a payer CDS in a Markov chain model of two reference credits, the firm underlying the CDS and the protection seller in the CDS. We first state few preliminary results about pricing and CVA of a CDS with counterparty risk in a general set-up. We then introduce a Markov chain copula model in which wrong way risk is represented by the possibility of ...

2013
Jack Volder Steve Walther

The proposed architecture carried out makes use of n iterations to produce the final value of the function upto an accuracy of n bits. A two’s complement 4bit carry-look ahead adder/subtractor block with carry-save has been implemented as part of the architecture for greater speed. An 8-bit barrel shifter has been implemented for use in the algorithm. An optimum use of edge-triggered latches an...

Journal: :Signal Processing Systems 2012
Vivienne Sze Anantha Chandrakasan

This paper uses joint optimization of both the algorithm and architecture to enable high coding efficiency in conjunction with high processing speed and low area cost. Specifically, it presents several optimizations that can be performed on Context Adaptive Binary Arithmetic Coding (CABAC), a form of entropy coding used in H.264/AVC, to achieve the throughput necessary for real-time low power h...

Journal: :CSSP 2013
Amir Kaivani Seok-Bum Ko

Given the popularity of decimal arithmetic, hardware implementation of decimal operations has been a hot topic of research in recent decades. Besides the four basic operations, the square root can be implemented as an instruction directly in the hardware, which improves the performance of the decimal floating-point unit in the processors. Hardware implementation of decimal square rooters is usu...

2003
Paul G. Gonsalves Janet E. Burge Karen A. Harper

The determination and subsequent analysis of potential enemy course of actions (COAs) forms a key element within the Intelligence Preparation of the Battlespace (IPB) process. Enemy COA prediction and analysis is also key element of threat assessment data fusion processing. Here we formulate an architecture that employs genetic algorithms (GAs) to generate and evaluate enemy COAs. This formulat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید