首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
A new stability criterion for fixed-point state-space digital filters using two’s complement arithmetic is presented. The effectiveness of the results obtained is shown by using a numerical example.  相似文献   

2.
More and more companies currently recruit online, partly because of cost savings and competitive pressure, and partly because it is the best way to reach their target group of applicants. In our study, applicants’ perceptions of procedural fairness were examined in e-recruiting contexts. Using an adapted form of the Social Process Questionnaire on Selection, we found that 1,373 participants’ expectations regarding fairness were mediocre and always lower than the perceived importance of five procedural fairness aspects. Based on an experimental manipulation, we showed that feedback was particularly important in online application procedures, whereas participation had smaller effects. Furthermore, participants tend to rate procedural fairness for offline application procedures as fairer than for online procedures although they reported generally positive experiences with online applications in the past. Based on our results, we discuss practical implications and limitations.  相似文献   

3.
4.
The aim of this paper is to discuss the potentials, problems and critical factors for the industrial usage of mechanized theorem proving. The approach followed in this paper is somehow unusual. The starting point is the results of an industrial project whose goal was the assessment of the state of the art of provers (and of tools supporting formal methods in general). We describe the project results in terms of evaluation criteria, classification of technologies and tools and critical factors for industrial take-up. We present the results of the assessment in the same spirit, the same kind of analysis and even the same terminology which were used in the presentations and in the deliverables of the project. This should result in a presentation of a “different view” of the problem of technology transfer in theorem proving, that we call the “user’s point of view”. In this way, we hope to give a new perspective in the discussion of the industrial take-up of the theorem proving technology.  相似文献   

5.
In this paper, two-layered feed forward artificial neural network’s (ANN) training by back propagation and its implementation on FPGA (field programmable gate array) using floating point number format with different bit lengths are remarked based on EX-OR problem. In the study, being suitable with the parallel data-processing specification on ANN’s nature, it is especially ensured to realize ANN training operations parallel over FPGA. On the training, Virtex2vp30 chip of Xilinx FPGA family is used. The network created on FPGA is coded by using VHDL. By comparing the results to available literature, the technique developed here proved to consume less space for the subjected ANN training which has the same structure and bit length, it is shown to have better performance.  相似文献   

6.
In this paper, the Binary coded decimal floating-point multiplier (BCD-FPM) and Binary floating-point multiplier (BFPM) with binary to BCD (B2BCD) converter are proposed using Urdhva-Tiryakbhyam (UT) sutra. Two methods are proposed for BCD-FPM and comparison is made between BCD-FPM and BFPM with B2BCD converter. The designs are modelled in Verilog HDL and synthesized based on the 90nm standard cell library in Cadence EDA Tool. Comparisons are based on the synthesis report generated by Cadence RTL complier and implemented in Encounter RTL TO GDSII system. The results show that BCD-FPM has better performance in terms of delay and power. The power for Method II gets reduced by 59.47% and 73.40% when compared with Method I and BFPM with B2BCD converter respectively. The delay for Method II gets reduced by 6.9% than Method I and 30.37% than BFPM with B2BCD converter. The pipelined architecture is designed for Method II as it is efficient than other multipliers, whose delay is reduced by 65.82% after pipelining.  相似文献   

7.
简要分析在Turbo C 2.0编译环境下使用scanf函数时,浮点数格式不能连接的原因。许多资料给出了不同的解决方法,参阅了大量文献后,大致归结五类解决问题的方法,以便在使用时根据自己的需要灵活选择合适的方法。  相似文献   

8.
9.
Microsystem Technologies - Classical computers are already facing threshold limitations with CMOS getting restricted to clocking speeds in GHz range and alarming heat dissipation issues. Both these...  相似文献   

10.
MapReduce is a popular framework for largescale data analysis. As data access is critical forMapReduce’s performance, some recent work has applied different storage models, such as column-store or PAX-store, to MapReduce platforms. However, the data access patterns of different queries are very different. No storagemodel is able to achieve the optimal performance alone. In this paper, we study how MapReduce can benefit from the presence of two different column-store models — pure column-store and PAX-store. We propose a hybrid storage system called hybrid columnstore (HC-store). Based on the characteristics of the incoming MapReduce tasks, our storage model can determine whether to access the underlying pure column-store or PAX-store.We studied the properties of the different storage models and create a cost model to decide the data access strategy at runtime. We have implemented HC-store on top of Hadoop. Our experimental results show that HC-store is able to outperform PAX-store and column-store, especially when confronted with diverse workload.  相似文献   

11.
12.
An LMI-based criterion for the global asymptotic stability of 2-D state-space digital filters described by the Roesser model employing two?s complement overflow arithmetic is presented. Under a certain assumption, the criterion turns out to be an improvement over a criterion due to El-Agizi and Fahmy pertaining to two?s complement arithmetic and has a form similar to a criterion due to Xiao and Hill pertaining to saturation arithmetic. Examples show the effectiveness of the new criterion.  相似文献   

13.
The common wisdom is that the capacity of parallel channels is usually additive. This was also conjectured by Shannon for the zero-error capacity function, which was later disproved by constructing explicit counterexamples demonstrating the zero-error capacity to be super-additive. Despite these explicit examples for the zero-error capacity, there is surprisingly little known for nontrivial channels. This paper addresses this question for the arbitrarily varying channel (AVC) under list decoding by developing a complete theory. The list capacity function is studied and shown to be discontinuous, and the corresponding discontinuity points are characterized for all possible list sizes. For parallel AVCs it is then shown that the list capacity is super-additive, implying that joint encoding and decoding for two parallel AVCs can yield a larger list capacity than independent processing of both channels. This discrepancy is shown to be arbitrarily large. Furthermore, the developed theory is applied to the arbitrarily varying wiretap channel to address the scenario of secure communication over AVCs.  相似文献   

14.
The most fundamental results of information theory are Shannon’s theorems. These theorems express the bounds for (1) reliable data compression and (2) data transmission over a noisy channel. Their proofs are non-trivial but are rarely detailed, even in the introductory literature. This lack of formal foundations is all the more unfortunate that crucial results in computer security rely solely on information theory: this is the so-called “unconditional security”. In this article, we report on the formalization of a library for information theory in the SSReflect extension of the Coq proof-assistant. In particular, we produce the first formal proofs of the source coding theorem, that introduces the entropy as the bound for lossless compression, and of the channel coding theorem, that introduces the capacity as the bound for reliable communication over a noisy channel.  相似文献   

15.
Shape segmentation from point cloud data is a core step of the digital twinning process for industrial facilities. However, it is also a very labor intensive step, which counteracts the perceived value of the resulting model. The state-of-the-art method for automating cylinder detection can detect cylinders with 62% precision and 70% recall, while other shapes must then be segmented manually and shape segmentation is not achieved. This performance is promising, but it is far from drastically eliminating the manual labor cost. We argue that the use of class segmentation deep learning algorithms has the theoretical potential to perform better in terms of per point accuracy and less manual segmentation time needed. However, such algorithms could not be used so far due to the lack of a pre-trained dataset of laser scanned industrial shapes as well as the lack of appropriate geometric features in order to learn these shapes. In this paper, we tackle both problems in three steps. First, we parse the industrial point cloud through a novel class segmentation solution (CLOI-NET) that consists of an optimized PointNET++ based deep learning network and post-processing algorithms that enforce stronger contextual relationships per point. We then allow the user to choose the optimal manual annotation of a test facility by means of active learning to further improve the results. We achieve the first step by clustering points in meaningful spatial 3D windows based on their location. Then, we apply a class segmentation deep network, and output a probability distribution of all label categories per point and improve the predicted labels by enforcing post-processing rules. We finally optimize the results by finding the optimal amount of data to be used for training experiments. We validate our method on the largest richly annotated dataset of the most important to model industrial shapes (CLOI) and yield 82% average accuracy per point, 95.6% average AUC among all classes and estimated 70% labor hour savings in class segmentation. This proves that it is the first to automatically segment industrial point cloud shapes with no prior knowledge at commercially viable performance and is the foundation for efficient industrial shape modeling in cluttered point clouds.  相似文献   

16.
This study explored adolescents’ opinions about how Internet use supports the achievement of their developmental tasks. Qualitative data were collected in focus groups interviews with 127 Italian Internet users (11–20) attending middle and high schools. Discussions were recorded, transcribed and analyzed using content analysis. Results showed that the Internet plays important functions in identity formation, personal autonomy, and relationships outside the family. It allows teens to develop their own interests, to identify with others and, at the same time, differentiate from others. The Internet is also an arena in which adolescents develop and practice autonomy. The Internet can be a source of conflict with parents, because of parents’ concerns about Internet use. However, the Internet can also be a meeting ground with parents. Finally, participants indicated the Internet is used to form close relationships with peers. Gender and age differences are discussed. Although the study is cross-sectional and relies only on adolescent report, findings illustrate how the conceptual framework of developmental goals may be helpful for understanding how the Internet can affect adolescents’ lives.  相似文献   

17.
Capacity is defined as the power resulting from the specific position of a company in a network organization. This article extends the theory of network organizations to examine Mazda’s Yokokai Keiretsu, and proposes a new approach to calculating a firm’s capacity in a network. Capacity is divided into two categories, take-in capacity and take-out capacity, and the gap between them is called the capacity difference. We analyze the impact of capacity difference as a determinant of corporate performance in network organizations, thus providing a new perspective for successful corporate management.  相似文献   

18.
Engineering with Computers - This paper introduces a new fitting approach to allow an efficient part-by-part reconstruction or update of editable CAD models fitting the point cloud of a digitized...  相似文献   

19.
We are attempting to develop a system so that a user is able to let robots perform an intellectual action that has a healing and friendly feeling. Based on the development process of the actions and consciousness of animals, we constructed a structure model which connects consciousness and action hierarchically, built a valuation function for action selection, and developed software to control the action of a robot. This software is called Consciousness-Based Architecture (CBA). With it, our aim is to connect a user and robot as closely as possible and to allow smooth communications between them by developing an emotional system that takes notice of consciousness. In our system, the robotic arm’s finger is outfitted with a small Web camera, which allows the arm to recognize external information so that the robot can select various actions that comply with certain factors in the outside environment. Furthermore, by using the actuator of the robotic arm, the system we have built provides a correspondence between the robot’s internal states, such as the degree of rotation angle, and the outside temperature. In the present study, a motivation model which considers the outside environment and the internal states has been built into the CBA, and the behavior of the robotic arm has been verified.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号