首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   36篇
  免费   1篇
工业技术   37篇
  2020年   2篇
  2018年   1篇
  2014年   4篇
  2013年   2篇
  2011年   2篇
  2010年   6篇
  2008年   2篇
  2007年   4篇
  2006年   2篇
  2005年   1篇
  2004年   1篇
  2003年   1篇
  2002年   3篇
  2001年   3篇
  1996年   1篇
  1991年   1篇
  1989年   1篇
排序方式: 共有37条查询结果,搜索用时 15 毫秒
1.
In this paper we introduce new algorithm implementations of a new parametric image processing framework that will accurately process images and speed up computation for addition, subtraction, and multiplication. Its potential applications include computer graphics, digital signal processing and other multimedia applications. This Parameterized Digital Electronic Arithmetic (PDEA) model replaces linear operations with non-linear ones. The implementation of a parameterized model is presented. We also present the design of arithmetic circuits including parallel counters, adders and multipliers based in two high performance threshold logic gate implementations that we have developed. We will also explore new microprocessor architectures to take advantage of arithmetic. The experiments executed have shown that the algorithm provides faster and better enhancements from those described in the literature. The FPGA chips used is Spartan 3E from Xilinix. The critical length in the circuit implemented on the FPGA had the minimum period for the proposed subsystem is 10.209 ns (maximum frequency 97.957 MHz). Maximum power consumed is 2.4 mW using 32 nm process and we used parallelism and reuse of the Hardware components to accomplish and speed up the process.  相似文献   
2.
This article presents PAPRICA-3, a VLSI-oriented architecture for real-time processing of images and its implementation on HACRE, a high-speed, cascadable, 32-processors VLSI slice. The architecture is based on an array of programmable processing elements with the instruction set tailored to image processing, mathematical morphology, and neural networks emulation. Dedicated hardware features allow simultaneous image acquisition, processing, neural network emulation, and a straightforward interface with a hosting PC.HACRE has been fabricated and successfully tested at a clock frequency of 50 MHz. A board hosting up to four chips and providing a 33 MHz PCI interface has been manufactured and used to build BEATR IX, a system for the recognition of handwritten check amounts, by integrating image processing and neural network algorithms (on the board) with context analysis techniques (on the hosting PC).  相似文献   
3.
针对传统的手动测试台和凭经验判别的质量检测方法已无法满足现代喷嘴制造的需要的现状,研究设计了能满足实际生产中需要的精确测量、直观反映喷嘴性能参数的喷嘴检测系统,目前此设计已成功应用于生产。  相似文献   
4.
This work falls into the category of linear cellular neural network (CNN) implementations. We detail the first investigative attempt on the CMOS analog VLSI implementation of a recently proposed network formalism, which introduces time‐derivative ‘diffusion’ between CNN cells for nonseparable spatiotemporal filtering applications—the temporal‐derivative CNNs (TDCNNs). The reported circuit consists of an array of Gm‐C filters arranged in a regular pattern across space. We show that the state–space coupling between the Gm‐C‐based array elements realizes stable and linear first‐order (temporal) TDCNN dynamics. The implementation is based on linearized operational transconductance amplifiers and Class‐AB current mirrors. Measured results from the investigative prototype chip that confirms the stability and linearity of the realized TDCNN are provided. The prototype chip has been built in the AMS 0.35 µm CMOS technology and occupies a total area of 12.6 mm sq, while consuming 1.2 µW per processing cell. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   
5.
Context-oriented programming (COP) provides dedicated support for defining and composing variations to a basic program behavior. A variation, which is defined within a layer, can be de-/activated for the dynamic extent of a code block. While this mechanism allows for control flow-specific scoping, expressing behavior adaptations can demand alternative scopes. For instance, adaptations can depend on dynamic object structure rather than control flow. We present scenarios for behavior adaptation and identify the need for new scoping mechanisms. The increasing number of scoping mechanisms calls for new language abstractions representing them. We suggest to open the implementation of scoping mechanisms so that developers can extend the COP language core according to their specific needs. Our open implementation moves layer composition into objects to be affected and with that closer to the method dispatch to be changed. We discuss the implementation of established COP scoping mechanisms using our approach and present new scoping mechanisms developed for our enhancements to Lively Kernel.  相似文献   
6.
结合中国广东核电集团的SAP实施项目中的物料管理,阐述了项目实施中的物料主数据、物料分类、分类属性的实际应用和解决方案和技术实现。通过合理地组织和管理各种数据,对提高系统性能和实现企业的业务发展目标具有参考作用。  相似文献   
7.
Research in the area of collision detection permeates most of the literature on simulations, interaction and agents planning, being commonly regarded as one of the main bottlenecks for large-scale systems. To this day, despite its importance, most subareas of collision detection lack a common ground to test and validate solutions, reference implementations and widely accepted benchmark suites. In this paper, we delve into the broad-phase of collision detection systems, providing both an open-source framework, named Broadmark, to test, compare and validate algorithms, and an in-deep analysis of the main techniques used so far to tackle the broad-phase problem. The technical challenges of building this framework from the software and hardware perspectives are also described. Within our framework, several original and state-of-the-art implementations of CPU and GPU algorithms are bundled, alongside three benchmark scenes to stress algorithms under several conditions. Furthermore, the system is designed to be easily extensible. We use our framework to bring out an extensive performance comparison among assembled solutions, detailing the current CPU and GPU state-of-the-art on a common ground. We believe that Broadmark encompasses the principal insights and tools to derive and evaluate novel algorithms, thus greatly facilitating discussion about successful broad-phase collision detection solutions.  相似文献   
8.
对变压器零序保护实现方式的探讨   总被引:1,自引:0,他引:1       下载免费PDF全文
对 110kV以上电压等级变电站的变压器零序保护的常规实现方式提出了异议 ,分析了它的存在问题 ,探讨了改进后的实现方式。  相似文献   
9.
In this paper, the Petri net-based wireless sensor node architecture (PN-WSNA) is used to control a humanoid robot to play weightlifting and sprint games in the FIRA HuroCup league. With the PN-WSNA approach, the control scenario and decision-making for playing weightlifting and sprint games can be modeled as a PN-WSNA model. The PN-WSNA inference engine is further used to interpret and execute the PN-WSNA model according to the sensor information from visual perception. Therefore, the implementation of playing weightlifting and sprint games is achieved in terms of the PN-WSNA model instead of native code. To verify the PN-WSNA-based implementation approach, an autonomous humanoid robot equipped with a camera and a single-board computer is used for experiments, where the camera is responsible for grabbing image frames; the single-board computer is responsible for visual localization; and the PN-WSNA models the execution and locomotion command generation. Finally, several PN-WSNA models for playing weightlifting and sprint games are proposed and the experimental results are demonstrated and discussed to validate the feasibility of applying the proposed PN-WSNA-based implementation approach.  相似文献   
10.
Analysis of security protocol Swift implementations in IOS platform is important to protect the security of IOS applications.Firstly,according to the security protocol Swift implementations,the SubSwift language,which was a subset of Swift language,was widely used in IOS system,and its BNF were specified.Secondly,the mapping model from SubSwift language to Blanchet calculus based on the operational semantic was presented which consisted of mapping rules,relationship from the statements and types in SubSwift language to Blanchet calculus.And then,a method of generating security protocol Blanchet calculus implementations from SubSwift language implementations was developed.Finally,security protocol Blanchet calculus implementation generation tool SubSwift2CV was developed with Antrl4 and Java language.At the same time,OpenID Connect,Oauth2.0 and TLS security protocol SubSwift language implementations were analyzed with SubSwift2CV and CryptoVerif.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号