The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A novel high performance pipelined implementation architecture for user-defined floating-point complex division is presented. The major part of the proposed algorithm is derived from conventional Goldschmidt division algorithm. This paper first describes related user-defined floating-point arithmetic based on FPGA. Then the core of the complex division: (A+jC)/B is implemented based on the proposed...
Social emotion analysis of online users has become an important task for mining public opinions, which aims at detecting the readers' emotions evoked by online news articles. In this paper, we focus on building a social emotion analysis system (SEAS) for online news. The system has implemented a text data crawler for mainstream online news websites, the modules of document preprocessing, document...
Mean Time Between Failures (MTBF), now calculated in days or hours, is expected to drop to minutes on exascale machines. The advancement of resilience technologies greatly depends on a deeper understanding of faults arising from hardware and software components. This understanding has the potential to help us build better fault tolerance technologies. For instance, it has been proved that combining...
With the development of information technology, distance education has became the trend of learning. How many kinds of broad information technologies can use for distance education? The answerer is three. The applications of information technologies today are so widely and frequently, as an example, here we consider the applications of information technology for Distance Education only. The appropriate...
PDF417 is a two-dimensional stacked bar code symbology capable of encoding over a kilobyte of data per label. Each symbol character is 17-module wide which always consists 4 bars and 4 spaces. This paper studies the coding principle of two-dimensional PDF417 bar code and completes the implementation of two-dimensional PDF417 bar code through the Microsoft Visual C++ 6.0 development environment. Not...
Pressure index of agricultural water resources(PIAWR) is the ratio of the amount of agricultural water use and 40 percent of total water resources. The PIAWR could reflect the status of pressure on agricultural water resources. The paper calculated the PIAWR at the municipal and regional scale in China using the pressure index model based on the statistical data of water resources in 2005. It was...
Since the multi-innovation stochastic gradient (MISG) method can produce highly accurate parameter estimates for linear regression models, this paper extends the MISG method to nonlinear regression models and presents an MISG algorithm for Hammerstein nonlinear CAR (ARX) systems with memory less nonlinear blocks followed by controlled autoregressive models. The numerical results indicate that the...
To improve the first word dictionary with hash structure and the reverse maximum matching segmentation algorithm, the last word dictionary based on Hash structure which records word length is designed. By utilizing the reverse maximum matching methods, it realizes the intended objective of improving the speed and reducing the ambiguities rate of word segmentation. This essay explains the design principle...
In this paper, a novel image encryption algorithm, which based on one dimension cellular automata (1 − D,CA), is proposed. Before encryption an original image is separated into two parts. Accordingly, secret key is also divided into two subkeys in order to encrypt the two parts of the image. Corresponding to the two subsections of image, only obtain two parts of cipher text can a receiver decrypt...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.