Results 31 to 40 of about 122,774 (335)
Universal Approach to Solution of Optimization Problems by Symbolic Regression
Optimization problems and their solution by symbolic regression methods are considered. The search is performed on non-Euclidean space. In such spaces it is impossible to determine a distance between two potential solutions and, therefore, algorithms ...
Elena Sofronova, Askhat Diveev
doaj +1 more source
Arithmetic Coding for Data Compression [PDF]
Arithmetic coding provides an effective mechanism for removing redundancy in the encoding of data. We show how arithmetic coding works and describe an efficient implementation that uses table lookup as a first alternative to arithmetic operations. The reduced-precision arithmetic has a provably negligible effect on the amount of compression achieved ...
Howard, Paul G., Vitter, Jeffrey Scott
openaire +2 more sources
The trend toward increasing the efficiency of computing systems and devices is directly related with the transition to parallel computing. We propose that parallel calculations should be conducted at the level of arithmetic operations using arithmetic ...
I.A. Kalmykov +4 more
doaj +1 more source
Language and Math: What If We Have Two Separate Naming Systems?
The role of language in numerical processing has traditionally been restricted to counting and exact arithmetic. Nevertheless, the impact that each of a bilinguals’ languages may have in core numerical representations has not been questioned until ...
Alejandro Martínez
doaj +1 more source
Design and implementation of robust embedded processor for cryptographic applications [PDF]
Practical implementations of cryptographic algorithms are vulnerable to side-channel analysis and fault attacks. Thus, some masking and fault detection algorithms must be incorporated into these implementations.
Erdem, Serdar Suer +5 more
core +1 more source
Secure FSM-based arithmetic codes [PDF]
Recently, arithmetic coding has attracted the attention of many scholars because of its high compression capability. Accordingly, in this paper a method which adds secrecy to this well-known source code is proposed. Finite state arithmetic code (FSAC) is used as source code to add security.
Ziyabar, Hashem Moradmand +3 more
openaire +2 more sources
Thermometer Code Based Modular Arithmetic [PDF]
This paper presents a novel approach to perform modular arithmetic addition and subtraction using base-1 thermometer code data format for operands corresponding to the residues of the same modulus. Two n-bit thermometer code operands are first concatenated and logically shifted to produce a normalized 2n-bit thermometer code intermediate sum.
Vun, Chan Hua +1 more
openaire +2 more sources
Membrane Wrapping for High Capacity and Rapidly Switchable Adhesives
A membrane‐wrapping mechanism enables high‐capacity, rapidly switchable adhesion by coupling suction, friction, and adhesion. Broadband performance is achieved in dry and underwater conditions, allowing fast, reversible manipulation of objects of diverse sizes and shapes, from delicate eggs and berries to flat, complex, or heavy objects. These outcomes
Yeunhee Kim +2 more
wiley +1 more source
Bose−Chaudhuri−Hocquenghem (BCH) codes are broadly used to correct errors in flash memory systems and digital communications. These codes are cyclic block codes and have their arithmetic fixed over the splitting field of their generator ...
Arul Subbiah, Tokunbo Ogunfunmi
doaj +1 more source
Weight enumerators of Reed-Muller codes from cubic curves and their duals
Let $\mathbb{F}_q$ be a finite field of characteristic not equal to $2$ or $3$. We compute the weight enumerators of some projective and affine Reed-Muller codes of order $3$ over $\mathbb{F}_q$.
Kaplan, Nathan
core +1 more source

