首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 234 毫秒
1.
XC9500系列CPLD遥控编程的实现   总被引:3,自引:0,他引:3  
简单介绍了XC9500系列CPLD器件及其系统内编程(ISP)性能,接着讲述了XC9500系列 CPLD器件遥控编程的实现方法,并重点介绍了在遥控编程系统中应用微控制器( Intel 8031)实现嵌入式ISP的软硬件设计。  相似文献   

2.
本文主要介绍TLC320AC01C AIC的结构和功能,以及其在以DSP为核心的系统中的应用和编程方法,简要地介绍了TMS320C54x器件的功能和应用领域。  相似文献   

3.
文章介绍TMS320C54xDSP流水线操作及其在实际编程中的应用,包括流水线的操作过程,延时,MMR保护指令和实际编程中防止流水线冲突的检查方法。  相似文献   

4.
周强  闫大顺 《现代计算机》2000,(89):66-68,75
本文叙述了某合洗厂前配料生产微机监控系统的软、硬件组成及其。该系统采用WindowsGU CK ,ELPHI4.0YMYFA HW ;FCP ET XG KHTKGTT OVRNCAQ FCL RFSYPUGMUJ JQWWAA TGUTJTY  相似文献   

5.
文章介绍TMS320C54xDSP流水线操作及其在实际编程中的应用,包括流水线的操作过程、延时、MMR保护指令和实际编程中防止流水线冲突的检查方法。  相似文献   

6.
Schwarz多重网格法在跨音速流场计算中的应用欧阳洁,聂铁军(西北工业大学应用数学系)THEAPPLICATIONOFSCHWARZ-MULTIGRIDFORCOMPUTINGTRANSONICFLOWS¥OuyangJie;NieTiejun(D...  相似文献   

7.
PSD8XXF的在系统编程技术   总被引:1,自引:1,他引:0  
介绍了 WSI/公司的在系统可编程单片机外围器件 PSD 8××F系列芯片的组成及其性能。描述了如何通过端口C实现JTAG接口的软件、硬件配置以及利用WSI公司的FlashLink编程适配器和 PSDsoft软件进行在系统编程的相关问题。  相似文献   

8.
一个基于TCP/IP网际的计算机会议系统的设计与实现   总被引:1,自引:0,他引:1  
在对TCP/IP协议进行分析的基础上,本文讨论在实现计算机会议时应采用的客户机/服务器通信模式及UDP通信技术,并以WINDOWS环境下的TCP/IP协议———WINSOCK编程接口,实现了一个基于文本的计算机会议系统。  相似文献   

9.
一个基于TCP/IP网络的计算机会议系统的设计与实现   总被引:1,自引:0,他引:1  
在对TCP/IP协议进行分析的基础上,本文讨论了在实现计算机会议时应采用的客户机/服务器通信模式及UDP通信技术,并以WINDOWS环境下的TCP/IP协议-WINSOCK编程接口,实现了一个基于文本的计算机会议系统。  相似文献   

10.
TCP/P是网络中应用最广泛的协议,WidowsSockets是基于TCP/IP的应用程序标准规范。本文重点介绍了TCP/IP的基本原理、概念以及WindowsSocket编程的基本方法。  相似文献   

11.
《Computers & Security》1987,6(2):139-151
The increasing number of corporate computer failures and crimes has forced managers to tighten controls of their Electronic Data Processing systems. However, the costs of an exhaustive program of controls are often inordinately expensive, and the effectiveness of such an operation is not necessarily guaranteed. Assuming that managers have limited time and capital resources, a comprehensive and formalized methodology is considered essential to assess vulnerability of computer systems, determine acceptable levels of potential losses, and identify cost-effective control strategies. This paper presents a Cost-Effectiveness Model (CEM) that determines an optimal program for control of EDP systems.The Cost-Effectiveness Model has been implemented in Pascal as a microcomputer-based Decision Support System (DSS). The CEM-DSS is geared to help the EDP manager: (i) identify alternative sets of control activities, (ii) evaluate and choose the most preferred set, and (iii) monitor and upgrade the security of EDP systems frequently.  相似文献   

12.
Ulrich Kulisch 《Computing》2011,91(4):397-405
The IFIP Working Group on Numerical Software and other scientists repeatedly requested that a future arithmetic standard should consider and specify an exact dot product (EDP) [The IFIP WG—IEEE 754R letter, dated September 4 (2007), The IFIP WG—IEEE P1788 letter, dated September 9 (2009)]. On 18 November 2009 the IEEE standards committee P1788 on interval arithmetic accepted a motion [Kulisch and Snyder (The exact dot product as basic tool for long interval arithmetic, passed on Nov 18, 2009 as official IEEE P1788 document)] for including the EDP into a future interval arithmetic standard. Actually the simplest and fastest way for computing a dot product is to compute it exactly. By pipelining, it can be computed in the time the processor needs to read the data, i.e., it comes with utmost speed. A hardware implementation of the EDP exceeds any approximate computation of the dot product in software by several orders of magnitude. By a sample illustration the paper informally specifies the implementation of the EDP on computers. While [Kulisch and Snyder (The exact dot product as basic tool for long interval arithmetic, passed on Nov 18, 2009 as official IEEE P1788 document)] defines what has to be provided, how to embed the EDP into the new standard IEEE 754, [IEEE Floating-Point Arithmetic Standard 754 (2008)] and how exceptions like NaN are to be dealt with, this article illustrates how the EDP can be implemented on computers. There is indeed no simpler way of accumulating a dot product. Any method that just computes an approximation also has to consider the relative values of the summands. This results in a more complicated method. The hardware needed for the EDP is comparable to that for a fast multiplier by an adder tree, accepted years ago and now standard technology in every modern processor. The EDP brings the same speedup for accumulations at comparable costs. In Numerical Analysis the dot product is ubiquitous. It is not merely a fundamental operation in all vector and matrix spaces. It is the EDP which makes residual correction effective. This has a direct and positive influence on all iterative solvers of systems of equations. The EDP is essential for fast long real and long interval arithmetic, as well as for assessing and managing uncertainty in computing. By operator overloading variable precision interval arithmetic is very easy to use. With it the result of every arithmetic expression can be guaranteed to a number of correct digits.  相似文献   

13.
14.
In this paper, a novel N-bit single-rail pipeline denoted as Embedded Delay Pipeline (EDP) is proposed. It consists of N-Embedded Delay Elements (EDEs) which act both as control elements and as matched delay elements which produce two different delays during precharge and evaluation periods. EDP needs to satisfy only one timing constraint and requires less wiring load between the handshaking stages which leads to less energy consumption per operation. The proposed pipeline is well suited for very fine-grain or gate level pipelining. To evaluate the performance of the EDP, 8-bit Ripple Carry Adder (RCA) is implemented individually using the EDP, Single-rail Look ahead pipelines (LPsr2/2 and LPsr2/1) and Single-rail Dynamic elastic pipeline (S-DELP) in UMC-90 nm technology and studied through simulation. From this study, it is found that EDP can operate at a maximum frequency of 2.38 GHz and has 9.6%, 7.5% and 18.5% higher throughput than that of LPsr2/2, LPsr2/1 and S-DELP respectively. The energy per operation required for 8-bit RCA using EDP is 127.80 fJ which is 22.50%, 24.15% and 60.13% lower compared to that required for LPsr2/2, LPsr2/1 and S-DELP respectively.  相似文献   

15.
In this paper, an uncertain economic dispatch problem (EDP) is considered for a group of coopertive agents. First, let each agent extract a set of samples (scenarios) from the uncertain set, and then a scenario EDP is obtained using these scenarios. Based on the scenario theory, a prior certification is provided to evaluate the probabilistic feasibility of the scenario solution for uncertain EDP. To facilitate the computational task, a distributed solution strategy is proposed by the alternating direction method of multipliers (ADMM) and a finite-time consensus strategy. Moreover, the distributed strategy can solve the scenario problem over a weight-balanced directed graph. Finally, the proposed solution strategy is applied to an EDP for a power system involving wind power plants.  相似文献   

16.
In this paper we study the security of the Advanced Encryption Standard (AES) and AES-like block ciphers against differential cryptanalysis. Differential cryptanalysis is one of the most powerful methods for analyzing the security of block ciphers. Even though no formal proofs for the security of AES against differential cryptanalysis have been provided to date, some attempts to compute the maximum expected differential probability (MEDP) for two and four rounds of AES have been presented recently. In this paper, we will improve upon existing approaches in order to derive better bounds on the EDP for two and four rounds of AES based on a slightly simplified S-box. More precisely, we are able to provide the complete distribution of the EDP for two rounds of this AES variant with five active S-boxes and methods to improve the estimates for the EDP in the case of six active S-boxes.  相似文献   

17.
Although it is tempting to consider the development of EDP just as one of the technological developments of the past, there are differences that ask for a new approach to the problems created. The development of EDP is placed in a historic prospective. Both the economic and sociological differences of the 80's, compared to the past decades, when technology evolved, are outlined. The coming EDP developments will be influenced by social constraints. It will be insufficient to let EDP develop autonomously and to try to minimize the negative side effects. One must anticipate forthcoming developments and try to device a framework in which these developments can be used without negative side effects for society and the individual. On the other hand, one has the challenging task to steer the EDP developments such that they will meet the needs of the individual and society, and will increase the feeling of well-being, the prosperity and the feeling of self fullfillment of the individuals in that society. When we are able to solve the problems in our own society, we might be able to find ways of sharing our achievements with countries with lower prosperity.  相似文献   

18.
《Computers & Security》1988,7(3):271-277
Software has taken over many of the traditional functions previously trusted to computing centre staff. This take-over increases the complexity and opaqueness of the processes within an EDP organization. It is no longer possible for management to ascertain that only those jobs are running and those programs are executed which have been scrutinized and approved, and that they are used exclusively for intended and approved purposes. Hence one needs experts to review and to judge the structure and operation of the entire software complex, including operating systems, data communication, database management and applications.The author is convinced that a specific auditing strategy is indispensable for automated processes. This paper presents such a strategy for auditing EDP techniques and emphasizes the necessity of a dedicated technical EDP audit. Moreover, the relationship of the technical EDP audit to other audits is discussed.  相似文献   

19.
Results are reported of empirical investigations into EDP applications in use. A model for connecting terms of the users of the applications to the consumed hardware resources is proposed. The properties of so-called “application profiling” are studied. Discussions are based on through analyses of a few EDP applications and one of them is abridged as a case study.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号