随着互联网信息技术的持续更新与应用,现代建筑行业受到剧烈冲击,其中机电安装行业受到的冲击尤为严重。《2016—2020年建筑业信息化发展纲要》明确提出,现代建筑也应向高信息化水平发展,积极推广并应用建筑信息模型(Building Information Modeling,BIM)、移动通讯、大数据、物联网、云计算、人工智能等新型信息技术,以此推动建造手段的智能化发展。因此,智能建造成为现代建筑业发展转型的重要目标,而依托智能建造推动机电安装行业高质量发展则是其中最关键的内容之一。本文在此背景下展开研究,通过阐述机电安装行业中推广智能建造技术的意义,总结了机电安装行业在智能建造时面临的问题和采取应对的对策。
Automatic video analysis is explored in order to understand and interpret real-world scenes automatically. For digitized historical analog films, this process is influenced by the video quality, video composition or s...
详细信息
Two new theories and methods of feedforward neural network developed in recent years are systematically reviewed. they are Algebraic Algorithm of feedforward neural network and Spline Weight Function Algorithm of feed...
详细信息
Self-supervised monocular depth estimation methods suffer occlusion fading, which is a result of a lack of supervision by the ground truth pixels. A recent work introduced a post-processing method to reduce occlusion ...
详细信息
FPGAs are now being commonly used in the datacenter as smart Network Interface Cards (NICs), with cryptography as one of the strategic application areas. Public key cryptography algorithms in particular require arithm...
详细信息
ISBN:
(纸本)9781728111315
FPGAs are now being commonly used in the datacenter as smart Network Interface Cards (NICs), with cryptography as one of the strategic application areas. Public key cryptography algorithms in particular require arithmetic withthousands of bits of precision. Even an operation as simple as addition can be difficult for the FPGA when dealing with large integers, because of the high resource count and high latency needed to achieve usable performance levels with known methods. this paper examines the architecture and implementation of high-performance integer adders on FPGAs for widths ranging from 1024 to 8192 bits, in both single-instance and many-core chip-filling configurations. For chip-filling designs the routing impact of these wide busses are assessed, as they often have an impact outside the immediate locality of the structures. the architectures presented in this work show 1 to 2 orders magnitude reduction in the area-latency product over commonly used approaches. Routing congestion is managed, with near 100% logic efficiency (packing) for the adder function. performance for these largely automatically placed designs are approximately the same as for carefully floor-planned non-arithmetic applications. In one example design, we show a 2048 bit adder in 5021 ALMs, with a latency of 6 clock cycles, at 628 MHz in a Stratix 10 E-2 device.
Withthe involvement of artificial intelligence (AI), sketches can be automatically generated under certain topics. Even though breakthroughs have been made in previous studies in this area, a relatively high proporti...
详细信息
In response to the demand for higher computational power, the number of computing nodes in highperformancecomputers (HPC) increases rapidly. Exascale HPC systems are expected to arrive by 2020. With drastic increase...
详细信息
ISBN:
(纸本)9781728138015
In response to the demand for higher computational power, the number of computing nodes in highperformancecomputers (HPC) increases rapidly. Exascale HPC systems are expected to arrive by 2020. With drastic increase in the number of HPC system components, it is expected to observe a sudden increase in the number of failures which, consequently, poses a threat to the continuous operation of the HPC systems. Detecting failures as early as possible and, ideally, predicting them, is a necessary step to avoid interruptions in HPC systems operation. Anomaly detection is a well-known general purpose approach for failure detection, in computing systems. the majority of existing methods are designed for specific architectures, require adjustments on the computing systems hardware and software, need excessive information, or pose a threat to users' and systems' privacy. this work proposes a node failure detection mechanism based on a vicinity-based statistical anomaly detection approach using passively collected and anonymized system log entries. Application of the proposed approach on system logs collected over 8 months indicates an anomaly detection precision between 62% to 81%.
theoretical and experimental analysis of MPI_Bcast algortihms is presented. the optimal tree degrees and segment sizes for pipelined versions of algorithms are obtained. Algorithms were investigated according to their...
详细信息
ISBN:
(纸本)9781728129860
theoretical and experimental analysis of MPI_Bcast algortihms is presented. the optimal tree degrees and segment sizes for pipelined versions of algorithms are obtained. Algorithms were investigated according to their implementation in the Open MPI library. theoretical results are consistent with experiments on a computer cluster with Gigabit Ethernet and InfiniBand communication networks.
As face recognition systems constitute a very useful tool in the sector of Digital Forensics, they should provide accurate and fast results. Although several software implementations for face recognition exist, they a...
详细信息
暂无评论