Results 21 to 30 of about 16,570 (263)

DESIGN AND PERFORMANCE ANALYSIS OF TERNARY LOGIC BASED ALU USING DOUBLE PRECISION FLOATING POINT [PDF]

open access: yesProceedings on Engineering Sciences
In digital circuits, particularly space signal applications, the detection/estimation of phase (angle) like milli degree is challenging and involves many complex operations.
Nagarathna R , A R Aswatha
doaj   +1 more source

Algorithms for estimating modular numbers in floating-point arithmetic

open access: yesНаука. Инновации. Технологии, 2022
In the residue number system (RNS), the operations of addition, subtraction, and multiplication are executed in parallel for different digits (residues) of the modular numbers.
Konstantin Sergeevich Isupov
doaj  

DARKSIDE: A Heterogeneous RISC-V Compute Cluster for Extreme-Edge On-Chip DNN Inference and Training

open access: yesIEEE Open Journal of the Solid-State Circuits Society, 2022
On-chip deep neural network (DNN) inference and training at the Extreme-Edge (TinyML) impose strict latency, throughput, accuracy, and flexibility requirements.
Angelo Garofalo   +7 more
doaj   +1 more source

Deciphering transcriptional plasticity in pancreatic ductal adenocarcinoma reveals alterations in sensory neuron innervation

open access: yesMolecular Oncology, EarlyView.
Pancreatic sensory neurons innervating healthy and PDAC tissue were retrogradely labeled and profiled by single‐cell RNA sequencing. Tumor‐associated innervation showed a dominant neurofilament‐positive subtype, altered mitochondrial gene signatures, and reduced non‐peptidergic neurons.
Elena Genova   +14 more
wiley   +1 more source

A Compute-in-Memory Decoding Architecture for Posit-to-Floating-Point Conversion

open access: yesIEEE Access
Modern computing systems are increasingly adopting low-precision floating-point formats to reduce memory overhead, particularly in large-scale applications such as large language models and scientific computing.
Jae Hyung Ko   +3 more
doaj   +1 more source

Towards Verified, Constant-time Floating Point Operations [PDF]

open access: yesProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
The runtimes of certain floating-point instructions can vary up to two orders of magnitude with instruction operands, allowing attackers to break security and privacy guarantees of real systems (\eg browsers). To prevent attacks due to such floating-point timing channels, we introduce CTFP, an efficient, machine-checked, and extensible system that ...
Marc Andrysco   +4 more
openaire   +1 more source

Analysing the significance of small conformational changes and low occupancy states in serial crystallographic data

open access: yesFEBS Open Bio, EarlyView.
This protocol paper outlines methods to establish the success of a time‐resolved serial crystallographic experiment, by means of statistical analysis of timepoint data in reciprocal space and models in real space. We show how to amplify the signal from excited states to visualise structural changes in successful experiments.
Jake Hill   +4 more
wiley   +1 more source

ForBac: A Static Analysis Approach With Forward and Backward Analysis for Precision in Floating-Point Computations

open access: yesIEEE Access
Accuracy in floating-point computations is critical for reliable software, especially in systems where precision impacts safety and performance. Inaccuracies from rounding errors and precision loss can lead to significant issues in applications like ...
M. G. Thushara, K. Somasundaram
doaj   +1 more source

Genetic Algorithms in Application to the Geometry Optimization of Nanoparticles

open access: yesAlgorithms, 2009
Applications of genetic algorithms to the global geometry optimization problem of nanoparticles are reviewed. Genetic operations are investigated and importance of phenotype genetic operations, considering the geometry of nanoparticles, are mentioned ...
Nazım Dugan, Şakir Erkoç
doaj   +1 more source

A medical image encryption method based on chaos floating-point operation and its realization by FPGA

open access: yesDianzi Jishu Yingyong, 2023
Aiming at the high confidentiality requirement of medical image data transmission in the Internet, an encryption method based on Logistic chaotic floating point number operation is proposed for medical image encryption.
Pang Yu, Wei Dong, Wang Junchao
doaj   +1 more source

Home - About - Disclaimer - Privacy