نتایج جستجو برای: most critical path
تعداد نتایج: 1975670 فیلتر نتایج به سال:
Fast algorithms for high-speed divider design in finite fields GF(2) are very crucial in applications like cryptosystems. In this paper, we reformulated the conventional iterative division algorithm by changing the pre-defined variable and then updating its initial value accordingly. The reformulated division algorithm allows a restructuring of the divider architecture to further improve its op...
Speed of digital arithmetic processor depends mainly on the speed of adders. This paper provides a technique so that we can increase the speed of addition. Hybrid signed digit number representation perform addition in such a way that the carry propagation chain is limited to single digit position and hence are used to speed up arithmetic operation. Also hybrid signed digit reduces the critical ...
Speed of digital arithmetic processor depends mainly on the speed of adders. This paper provides a technique so that we can increase the speed of addition. Hybrid signed digit number representation perform addition in such a way that the carry propagation chain is limited to single digit position and hence are used to speed up arithmetic operation. Also hybrid signed digit reduces the critical ...
Peptide mapping is a widely used technique for the characterization of proteins. This Application Note demonstrates a robust LC method and design space for peptide mapping using a Quality by Design (QbD) approach. A therapeutic monoclonal antibody (mAb) was employed as the model protein in the current peptide mapping study. Fusion QbD software’s multivariate design and analysis capabilities, wh...
This review paper discusses the Reo coordination language in the wider context of its research area. It explains the concept of coordination and argues its significance. Those concepts, models and languages that were of considerable importance in the preliminary research that lead up to the development of Reo, are explained, discussed and evaluated. In particular Linda, Manifold, and Reo itself...
We present an architecture for digit-serial multiplication in finite fields GF(2m) with applications to cryptography. The proposed design uses polynomial basis representation and interleaves multiplication steps with degree reduction steps. An M-bit multiplier works with arbitrary irreducible polynomials and can be used for any binary field of order 2m ≤ 2M . We introduce a new method for degre...
One of the most recent techniques for propagating resource constraints in Constraint Based scheduling is Energy Constraint. This technique focuses in precedence based scheduling, where precedence relations are taken into account rather than the absolute position of activities. Although, this particular technique proved to be efficient on discrete unary resources, it provides only loose bounds f...
This paper presents a new algorithm that obtains an approximation of the Critical Path in schedules generated using the disjunctive graph model that represents the Job Shop Scheduling Problem (JSSP). This algorithm selects a set of operations in the JSSP, where on the average ninety nine percent of the total operations that belong to the set are part of the critical path. A comparison is made o...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید