共查询到20条相似文献,搜索用时 15 毫秒
1.
《数字社区&智能家居》2006,(9):7
matrix 120是国内品牌第一次采用TI DM320方案的。视频上,matrix 120支持MPEG1/2/4、DIVX4/5、XVID等视频编码格式,并支持SUB字幕显示。音频上,matrix 120支持MPEG1/2、LAYER1/2/3、WMA、PCM等音频编码格式,并且支持电视录制/输出功能。 相似文献
2.
Nicolaos Alachiotis Vasileios I. Kelefouras George S. Athanasiou Harris E. Michail Angeliki S. Kritikakou Costas E. Goutis 《The Journal of supercomputing》2012,59(2):830-851
Matrix-Matrix Multiplication (MMM) is a highly important kernel in linear algebra algorithms and the performance of its implementations
depends on the memory utilization and data locality. There are MMM algorithms, such as standard, Strassen–Winograd variant,
and many recursive array layouts, such as Z-Morton or U-Morton. However, their data locality is lower than that of the proposed
methodology. Moreover, several SOA (state of the art) self-tuning libraries exist, such as ATLAS for MMM algorithm, which
tests many MMM implementations. During the installation of ATLAS, on the one hand an extremely complex empirical tuning step
is required, and on the other hand a large number of compiler options are used, both of which are not included in the scope
of this paper. In this paper, a new methodology using the standard MMM algorithm is presented, achieving improved performance
by focusing on data locality (both temporal and spatial). This methodology finds the scheduling which conforms with the optimum
memory management. Compared with (Chatterjee et al. in IEEE Trans. Parallel Distrib. Syst. 13:1105, 2002; Li and Garzaran in Proc. of Lang. Compil. Parallel Comput., 2005; Bilmes et al. in Proc. of the 11th ACM Int. Conf. Super-comput., 1997; Aberdeen and Baxter in Concurr. Comput. Pract. Exp. 13:103, 2001), the proposed methodology has two major advantages. Firstly, the scheduling used for the tile level is different from the
element level’s one, having better data locality, suited to the sizes of memory hierarchy. Secondly, its exploration time
is short, because it searches only for the number of the level of tiling used, and between (1, 2) (Sect. 4) for finding the
best tile size for each cache level. A software tool (C-code) implementing the above methodology was developed, having the
hardware model and the matrix sizes as input. This methodology has better performance against others at a wide range of architectures.
Compared with the best existing related work, which we implemented, better performance up to 55% than the Standard MMM algorithm
and up to 35% than Strassen’s is observed, both under recursive data array layouts. 相似文献
3.
4.
We establish structural controllability results for matrix pairs [A, B] where A = A 0 + Σ μ iAi , B = B 0 + σ μ i, Bi , with the Ai , Bi , fixed, and the μ i , free scalar parameters. The results characterize structural controllability in several ways, via tests involving the checking of the rank or the evaluation of the determinant of various constant matrices formed from the Ai , Bi . A number of the results used as intermediate results tests for a full rank property of matrix nets, i.e. tests that check if M = M0+ ΣμiMi prescribed, μ i variable, has full rank for almost all μ i . 相似文献
5.
Spectral clustering based on matrix perturbation theory 总被引:5,自引:1,他引:5
This paper exposes some intrinsic characteristics of the spectral clustering method by using the tools from the matrix perturbation theory. We construct a weight ma- trix of a graph and study its eigenvalues and eigenvectors. It shows that the num- ber of clusters is equal to the number of eigenvalues that are larger than 1, and the number of points in each of the clusters can be approximated by the associated eigenvalue. It also shows that the eigenvector of the weight matrix can be used directly to perform clustering; that is, the directional angle between the two-row vectors of the matrix derived from the eigenvectors is a suitable distance measure for clustering. As a result, an unsupervised spectral clustering algorithm based on weight matrix (USCAWM) is developed. The experimental results on a number of artificial and real-world data sets show the correctness of the theoretical analysis. 相似文献
6.
Jinhui Liu Huanguo Zhang Jianwei Jia Houzhen Wang Shaowu Mao Wanqing Wu 《中国科学:信息科学(英文版)》2016,59(5):052109
Advances in quantum computation threaten to break public key cryptosystems such as RSA, ECC, and ElGamal that are based on the difficulty of factorization or taking a discrete logarithm, although up to now, no quantum algorithms have been found that are able to solve certain mathematical problems on noncommutative algebraic structures. Against this background, Raulynaitis et al. have proposed a novel asymmetric cipher protocol using a matrix decomposition problem. Their proposed scheme is vulnerable to a linear algebra attack based on the probable occurrence of weak keys in the generation process. In this paper, we show that the asymmetric cipher of the non-commutative cryptography scheme is vulnerable to a linear algebra attack and that it only requires polynomial time to obtain the equivalent keys for some given public keys. We also propose an improvement to enhance the scheme of Raulynaitis et al. 相似文献
7.
Emrah Akyar Handan Akyar Serkan Ali D��zce 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2011,15(10):2057-2064
In this paper, two-person interval matrix games are considered, and by means of acceptability index, Brown–Robinson method
to find a mixed-strategy equilibrium is adapted to interval matrix games. Numerical examples are also given. 相似文献
8.
《计算机工程与应用》1974,(Z1)
S_n=U 2 规范分析是这样一种分析,即对句子是精确地从左到右处理,且在进一步向右处理之前尽可能地简化句子的最左部分。也就是说,S_0简化成U的分析Φ_1,Φ_2,…,Φ_n是规范的,当且仅当对所有k>j(j=1,2,…,n),u_k不被包含在x_j中。 相似文献
9.
11.
12.
13.
郝秀梅 《计算机工程与应用》2007,43(36):65-67
提出了粗信息矩阵、信息粒度矩阵、粗粒度矩阵的概念,给出了粗信息矩阵的结构及粒度特征;讨论了粗信息矩阵、粗粒度矩阵的性质及运算法则。给出粗信息矩阵与粗集、S-粗集的关系定理、粗信息矩阵与其粗粒度矩阵的关系定理,粗信息矩阵不仅是研究粗系统结构特征的新理论工具,而且是粗系统理论研究与应用研究又一个新的研究方向。 相似文献
15.
Guangren DUAN 《控制理论与应用(英文版)》2004,2(4):397-400
The solution of two combined generalized Sylvester matrix equations is studied. It is first shown that the two combined generalized Sylvester matrix equations can be converted into a normal Sylvester matrix equation through extension, and then with the help of a result for solution to normal Sylvester matrix equations, the complete solution to the two combined generalized Sylvester matrix equations is derived. A demonstrative example shows the effect of the proposed approach. 相似文献
16.
本文利用m+n阶Sylvester矩阵的位移结构并在假设该矩阵的所有顺序主子矩阵可逆的条件下给出了求解Sylvester矩阵的逆的一种快速算法.该算法所需计算量为O(m+n)~2,而高斯-约当消去法所需计算量为O(m+n)~3.最后通过数值算例说明了算法的有效性. 相似文献
17.
基于矩阵张量积的数据加密矩阵的构造 总被引:2,自引:0,他引:2
谭国律 《计算机工程与应用》2006,42(23):64-65
通过讨论二阶矩阵的可逆性,研究了基于矩阵张量积合成加密矩阵的构造问题,并用实例进行了加密实践。 相似文献
18.
19.
20.