• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 166
  • 68
  • 44
  • 16
  • 13
  • 13
  • 7
  • 6
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 394
  • 55
  • 53
  • 46
  • 46
  • 31
  • 28
  • 28
  • 28
  • 26
  • 26
  • 24
  • 24
  • 23
  • 22
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
201

High-Performance Sparse Matrix-Multi Vector Multiplication on Multi-Core Architecture

Singh, Kunal 15 August 2018 (has links)
No description available.
202

THE EFFECTS OF PEG- AND KEYWORD MNEMONICS AND COMPUTER-ASSISTED INSTRUCTION ON FLUENCY AND ACCURACY OF BASIC MULTIPLICATION FACTS IN ELEMENTARY STUDENTS WITH LEARNING AND COGNITIVE DISABILITIES

IRISH, CHERYL L. 11 October 2001 (has links)
No description available.
203

FPGA realization of low register systolic all one-polynomial multipliers over GF (2m) and their applications in trinomial multipliers

Chen, Pingxiuqi 08 June 2016 (has links)
No description available.
204

Deadlock detection and avoidance for a class of manufacturing systems

Faiz, Tariq Nadeem January 1996 (has links)
No description available.
205

A New Representation of Structured Grids for Matrix-vector Operation and Optimization of Doitgen Kernel

Murugandi, Iyyappa Thirunavukkarasu 27 September 2010 (has links)
No description available.
206

Sparsity Analysis of Deep Learning Models and Corresponding Accelerator Design on FPGA

You, Yantian January 2016 (has links)
Machine learning has achieved great success in recent years, especially the deep learning algorithms based on Artificial Neural Network. However, high performance and large memories are needed for these models , which makes them not suitable for IoT device, as IoT devices have limited performance and should be low cost and less energy-consuming. Therefore, it is necessary to optimize the deep learning models to accommodate the resource-constrained IoT devices. This thesis is to seek for a possible solution of optimizing the ANN models to fit into the IoT devices and provide a hardware implementation of the ANN accelerator on FPGA. The contribution of this thesis mainly lies in two aspects: 1). analyze the sparsity in the two mainstream deep learning models – DBN and CNN. The DBN model consists of two hidden layers with Restricted Boltzmann Machines while the CNN model consists of 2 convolutional layers and 2 sub-sampling layer. Experiments have been done on the MNIST data set with the sparsity of 75%. The ratio of the multiplications resulting in near-zero values has been tested. 2). FPGA implementation of an ANN accelerator. This thesis designed a hardware accelerator for the inference process in ANN models on FPGA (Stratix IV: EP4SGX530KH40C2). The main part of hardware design is the processing array consists of 256 Multiply-Accumulators array, which can conduct multiply-accumulate operations of 256 synaptic connections simultaneously. 16-bit fixed point computation is used to reduce the hardware complexity, thus saving power and area. Based on the evaluation results, it is found that the ratio of the multiplications under the threshold of 2-5 is 75% for CNN with ReLU activation function, and is 83% for DBN with sigmoid activation function, respectively. Therefore, there still exists large space for complex ANN models to be optimized if the sparsity of data is fully utilized. Meanwhile, the implemented hardware accelerator is verified to provide correct results through 16-bit fixed point computation, which can be used as a hardware testing platform for evaluating the ANN models.
207

SCA-Resistant and High-Performance Embedded Cryptography Using Instruction Set Extensions and Multi-Core Processors

Chen, Zhimin 28 July 2011 (has links)
Nowadays, we use embedded electronic devices in almost every aspect of our daily lives. They represent our electronic identity; they store private information; they monitor health status; they do confidential communications, and so on. All these applications rely on cryptography and, therefore, present us a research objective: how to implement cryptography on embedded systems in a trustworthy and efficient manner. Implementing embedded cryptography faces two challenges - constrained resources and physical attacks. Due to low cost constraints and power budget constraints, embedded devices are not able to use high-end processors. They cannot run at extremely high frequencies either. Since most embedded devices are portable and deployed in the field, attackers are able to get physical access and to mount attacks as they want. For example, the power dissipation, electromagnetic radiation, and execution time of embedded cryptography enable Side-Channel Attacks (SCAs), which can break cryptographic implementations in a very short time with a quite low cost. In this dissertation, we propose solutions to efficient implementation of SCA-resistant and high-performance cryptographic software on embedded systems. These solutions make use of two state-of-the-art architectures of embedded processors: instruction set extensions and multi-core architectures. We show that, with proper processor micro-architecture design and suitable software programming, we are able to deliver SCA-resistant software which performs well in security, performance, and cost. In comparison, related solutions have either high hardware cost or poor performance or low attack resistance. Therefore, our solutions are more practical and see a promising future in commercial products. Another contribution of our research is the proper partitioning of the Montgomery multiplication over multi-core processors. Our solution is scalable over multiple cores, achieving almost linear speedup with a high tolerance to inter-core communication delays. We expect our contributions to serve as solid building blocks that support secure and high-performance embedded systems. / Ph. D.
208

Elliptic Curve Cryptography on Heterogeneous Multicore Platform

Morozov, Sergey Victorovich 15 September 2010 (has links)
Elliptic curve cryptography (ECC) is becoming the algorithm of choice for digital signature generation and authentication in embedded context. However, performance of ECC and the underlying modular arithmetic on embedded processors remains a concern. At the same time, more complex system-on-chip platforms with multiple heterogeneous cores are commonly available in mobile phones and other embedded devices. In this work we investigate the design space for ECC on TI's OMAP 3530 platform, with a focus of utilizing the on-chip DSP core to improve the performance and efficiency of ECC point multiplication on the target platform. We examine multiple aspects of ECC and heterogeneous design such as algorithm-level choices for elliptic curve operations and the effect of interprocessor communication overhead on the design partitioning. We observe how the limitations of the platform constrict the design space of ECC. However, by closely studying the platform and efficiently partitioning the design between the general purpose ARM core and the DSP, we demonstrate a significant speed-up of the resulting ECC implementation. Our system focused approach allows us to accurately measure the performance and power profiles of the resulting implementation. We conclude that heterogeneous multiprocessor design can significantly improve the performance and power consumption of ECC operations, but that the integration cost and the overhead of interprocessor communication cannot be ignored in any actual system. / Master of Science
209

Étude préliminaire du potentiel de multiplication par bouturage de l'Anogeissus leiocarpus (DC) Guill. et Perr. au Mali : influence de l'état physiologique des boutures et des régulateurs de croissance

Dembélé, Issouf Célestin 18 April 2018 (has links)
Les graines de l'Anogeissus leiocarpus ayant un très faible taux de germination, des essais ont été effectués au Mali afin de vérifier le potentiel d'enracinement des boutures de cette espèce. Vingt plants mères situés à Sho et à Katibougou ont été choisis et 20 boutures par plant ont été prélevées à quatre reprises au cours de l'année. Il s'agissait de boutures semi-herbacées et semi-ligneuses pour les deux premiers prélèvements et de boutures ligneuses pour les deux autres. La base des boutures a été trempée dans une solution auxinique contenant 0, 1 000, 2 500 et 5 000 ppm d'AIB (acide indole butyrique) pour les deux premiers prélèvements, et dans une solution contenant 0, 2 500, 5 000 et 10 000 ppm d'AIB pour les deux autres. Elles ont ensuite été piquées dans un terreau et placées à l'extérieur dans une enceinte rudimentaire humide, protégée des radiations solaires et du vent. L'enracinement des boutures a été observé et mesuré après quatre mois. Un petit nombre de boutures prélevées en novembre et en mars se sont enracinées. Ces données montrent tout de même que les boutures de l'Anogeissus leiocarpus possèdent un certain potentiel à s'enraciner. Il faudra, toutefois, mettre en place d'autres essais pour préciser avec soin les conditions les plus favorables au processus d'enracinement.
210

Survie et croissance de la régénération des feuillus nordiques dans un contexte d'envahissement par le hêtre

Dumont, Sébastien 25 March 2024 (has links)
Thèse ou mémoire avec insertion d'articles / Dans les forêts de feuillus nordiques, les traitements sylvicoles visant à régénérer l'érable à sucre (Acer saccharum Marsh.) et le bouleau jaune (Betula alleghaniensis Britt.), tels que le scarifiage du sol et le contrôle mécanique de la végétation compétitrice, résultent parfois en la formation d'une dense strate de hêtre à grandes feuilles (Fagus grandifolia Ehrh.). L'objectif de ce mémoire était de comparer la croissance et la survie de trois types de régénération de hêtre, soit les rejets de souche, les drageons racinaires et les semis, à celles de semis de bouleau jaune et d'érable à sucre dans des peuplements feuillus traités par coupe partielle et sous une contrainte de broutement par le cerf de Virginie. Sur une période de huit ans, 997 individus des trois espèces ont été suivis dans trois peuplements composés principalement d'érable à sucre, de bouleau jaune et de hêtre dans un dispositif expérimental situé à la station forestière de Duchesnay, près de Québec. Chaque peuplement comprenait quatre traitements de coupes partielles, de même qu'un témoin, ce qui a permis d'étudier un gradient de conditions de lumière et de compétition. Les rejets de souche et les drageons de hêtre ont montré une croissance plus élevée que les semis des trois espèces, alors que tous les types de hêtre ont montré des probabilités de survie plus importantes que les autres espèces, quelles que soient les conditions de lumière ou de compétition. Nos résultats indiquent que les traitements stimulant l'établissement de rejets de souche et de drageons de hêtre doivent être appliqués avec prudence et dans des conditions qui garantissent une croissance et des taux de survie suffisants des espèces désirées. Cette étude suggère également que le broutement sélectif par le cerf de Virginie est un facteur important pouvant exacerber le phénomène d'envahissement par le hêtre en supprimant la capacité de croitre en hauteur du bouleau jaune. / In northern hardwood forests, silvicultural treatments aimed at regenerating sugar maple (Acer saccharum Marsh.) and yellow birch (Betula alleghaniensis Britt.), such as soil scarification and mechanical control of competing vegetation, often result in the formation of dense American beech (Fagus grandifolia Ehrh.) thickets in the seedling and sapling layers. The aim of this Master's thesis was to compare the growth and survival of three types of beech regeneration, i.e. stump sprouts, root suckers and seedlings, with those of yellow birch and sugar maple seedlings in partially harvested stands under cervid browsing pressure. Over an eight-year period, 997 individuals of the three species were monitored in three stands composed mainly of sugar maple, yellow birch, and American beech in an experimental field trial in the Duchesnay Forest, located near Quebec City, Canada. Each stand included four partial harvest treatments of different intensities, as well as a control, providing a gradient of light and competition conditions. American beech stump sprouts and root suckers showed higher growth than seedlings of all three species, and all types of American beech regeneration showed higher survival probabilities than the other species, regardless of light or competition conditions. Our results suggest that treatments that induce the establishment of American beech stump sprouts and root suckers, like high intensity partial cut combined with soil scarification and mechanical control, should be applied with caution and under conditions that ensure sufficient growth and survival rates of the desired species. This thesis also suggests that selective browsing by cervids is an important factor that can exacerbate the phenomenon of dense beech thickets formation in the seedling and sapling layers by suppressing the yellow birch's ability to grow in height.

Page generated in 0.0267 seconds