Results 31 to 40 of about 280,972 (285)

A C++-embedded Domain-Specific Language for programming the MORA soft processor array [PDF]

open access: yes, 2010
MORA is a novel platform for high-level FPGA programming of streaming vector and matrix operations, aimed at multimedia applications. It consists of soft array of pipelined low-complexity SIMD processors-in-memory (PIM).
Chalamalasetti, S.R.   +3 more
core   +1 more source

Conceptual modelling: Towards detecting modelling errors in engineering applications [PDF]

open access: yes, 2019
Rapid advancements of modern technologies put high demands on mathematical modelling of engineering systems. Typically, systems are no longer “simple” objects, but rather coupled systems involving multiphysics phenomena, the modelling of which involves ...
Bird R   +5 more
core   +3 more sources

A Python-based laboratory course for image and video signal processing on embedded systems

open access: yesHeliyon, 2019
The usage of embedded systems is omnipresent in our everyday life, e.g., in smartphones, tablets, or automotive devices. These devices are able to deal with challenging image processing tasks like real-time detection of faces or high dynamic range ...
Karina Jaskolka   +3 more
doaj   +1 more source

Semantics of an Exception Mechanism for Bulk Synchronous Parallel ML [PDF]

open access: yesEighth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2007), 2007
A communication protocol is a fundamental component of a multi-agent system. The security requirements for a communication protocol should be articulated during the early stages of software development. However, there is no formal way provided for software developers to find out what makes a communication protocol secure and what are secure designs. In
Yulei Ding   +5 more
openaire   +18 more sources

A Framework for Multiple Object Tracking in Underwater Acoustic MIMO Communication Channels

open access: yesJournal of Sensor and Actuator Networks, 2017
This work presents a computational framework for the analysis and design of large-scale algorithms utilized in the estimation of acoustic, doubly-dispersive, randomly time-variant, underwater communication channels.
Domingo Rodriguez   +3 more
doaj   +1 more source

Implementing atomic actions in Ada 95 [PDF]

open access: yes, 1997
Atomic actions are an important dynamic structuring technique that aid the construction of fault-tolerant concurrent systems. Although they were developed some years ago, none of the well-known commercially-available programming languages directly ...
Burns, A, Wellings, A
core   +1 more source

Efficient model of PID controller of unmanned aerial vehicle

open access: yesJournal of Edge Computing, 2023
The modern stage of science and technology development is distinguished by the widespread use of digital signal processing. The use of digital processing for effective control of aircraft and other technical equipment remains relevant for many ...
Arsen R. Petrosian   +3 more
doaj   +1 more source

Journal Staff [PDF]

open access: yes, 2012
         The fast Fourier transform (FFT) plays an important role in digital signal processing (DSP) applications, and its implementation involves a large number of computations.
Sreehari, Ambuluri
core   +1 more source

Comparing self‐reported race and genetic ancestry for identifying potential differentially methylated sites in endometrial cancer: insights from African ancestry proportions using machine learning models

open access: yesMolecular Oncology, EarlyView.
Integrating ancestry, differential methylation analysis, and machine learning, we identified robust epigenetic signature genes (ESGs) and Core‐ESGs in Black and White women with endometrial cancer. Core‐ESGs (namely APOBEC1 and PLEKHG5) methylation levels were significantly associated with survival, with tumors from high African ancestry (THA) showing ...
Huma Asif, J. Julie Kim
wiley   +1 more source

Sound Encryption Using Feature Extraction and Neural Network [PDF]

open access: yesالمجلة العراقية للعلوم الاحصائية, 2011
In recent years, secure communication techniques have increased widely and unexpectedly . In order to establish reliable communication technology and to ensure that the data (sound) reaches its intended end and to be accessible to all through the ...
Alyaa Moufaq   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy