Search results for "Logics"
showing 10 items of 124 documents
Application based on dynamic reconfiguration of field-programmable gate arrays: JPEG 2000 arithmetic decoder
2005
This paper describes the implementation of a part of the JPEG 2000 algorithm (MQ decoder and arithmetic decoder) on a field-programmable gate array (FPGA) board by using dynamic reconfiguration. A comparison between static and dynamic reconfiguration is presented, and new analysis criteria (spatiotemporal efficiency, logic cost, and performance time) have been defined. The MQ decoder and arithmetic decoder are attractive for dynamic reconfiguration implementation in applications without parallel processing. This implementation is done on an architecture designed to study the dynamic reconfiguration of FPGAs: the ARDOISE architecture. The obtained implementation, based on four partial config…
Transformations that preserve learnability
1996
We consider transformations (performed by general recursive operators) mapping recursive functions into recursive functions. These transformations can be considered as mapping sets of recursive functions into sets of recursive functions. A transformation is said to be preserving the identification type I, if the transformation always maps I-identifiable sets into I-identifiable sets.
Some remarks on unconditionally convergent multipliers
2017
We present some results concerning the representation of unconditionally convergent multipliers, including a reformulation of a conjecture of Balazs and Stoeva.
Energy Management of a Hybrid Photovoltaic-Wind System with Battery Storage: A Case Report
2019
This work presents a case report related to the management and the monitoring of a hybrid photovoltaic-wind system with battery energy storage, installed at the administrative offices building of the municipality of Valderice (Italy) within the framework of the Italy-Tunisia ENPI cooperation project Le Développement Durable Dans la Production Energétique Dans le Territoire (DE.DU.ENER.T.). The paper describes the hybrid system and briefly reports the monitoring data for a whole year, comparing the real production with the expected one and evaluating some performance indexes of the system. The performance indexes are very simple and have been defined only with the purpose of sh…
2018
This study investigated participants’ conceptions of the ideal mentor and mentee in the Finnish model of peer-group mentoring (PGM). Existing mentoring research emphasises dyadic practices, yet the...
Pairwise DNA Sequence Alignment Optimization
2015
This chapter presents a parallel implementation of the Smith-Waterman algorithm to accelerate the pairwise alignment of DNA sequences. This algorithm is especially computationally demanding for long DNA sequences. Parallelization approaches are examined in order to deeply explore the inherent parallelism within Intel Xeon Phi coprocessors. This chapter looks at exploiting instruction-level parallelism within 512-bit single instruction multiple data instructions (vectorization) as well as thread-level parallelism over the many cores (multithreading using OpenMP). Between coprocessors, device-level parallelism through the compute power of clusters including Intel Xeon Phi coprocessors using M…
"Mais... je ne visite pas!". Une approche ethnographique de l'usage faible des œuvres
2013
Some photographic exhibitions are nowadays set outdoors in order to popularize art. Through a case study, this article examines the "weak use of images" as it is practised in public places, by passers-by who do not identify art pieces as such, and do not consider themselves as visitors. Their relation to art pieces, in this context, is built on an apparent paradox (they relate and at the same time do not relate to the pieces), and constitutes the minor mode of situations and observed interactions (this relation does not organise or structure the latter).
A Note on Keys and Keystreams of Chacha20 for Multi-key Channels
2018
In this paper we analyze the keystreams generated by the Chacha20 stream cipher. We also compare these to the ones generated by its predecessor, the RC4 stream cipher. Due to the proposed multi-key channels in the upcoming TLS 1.3 standard we analyze the behavior of the keystream in the boundary case where there is a single bit difference between two keys used for the initiation of the stream cipher algorithms. The goal is to check whether a single bit change in the key has any predictable influence on the bits of the keystream output.
Versatile Direct and Transpose Matrix Multiplication with Chained Operations: An Optimized Architecture Using Circulant Matrices
2016
With growing demands in real-time control, classification or prediction, algorithms become more complex while low power and small size devices are required. Matrix multiplication (direct or transpose) is common for such computation algorithms. In numerous algorithms, it is also required to perform matrix multiplication repeatedly, where the result of a multiplication is further multiplied again. This work describes a versatile computation procedure and architecture: one of the matrices is stored in internal memory in its circulant form, then, a sequence of direct or transpose multiplications can be performed without timing penalty. The architecture proposes a RAM-ALU block for each matrix c…
Integrating resolution—like procedures with Lukasiewicz implication
1993
We discuss some conceptual and technical problems raised by the attempt of integrating resolution-like procedures with the use of Lukukasiewicz implication Min{1, 1 – [a] + [b]} in an environment of approximate reasoning modelled by fuzzy logics.