For the period 1971-1975, the industrial design engineers primarily studied the 4004, 8008 and 8080 microprocessors for the purposes of building control circuits and consumer products. The introduction of the superior...
详细信息
For the period 1971-1975, the industrial design engineers primarily studied the 4004, 8008 and 8080 microprocessors for the purposes of building control circuits and consumer products. The introduction of the superior 8-bit 8085 microprocessor in 1976 drew the attention of the academicians who were charmed at the architecture and functionality of this chip and they shortly included it as a course in the curriculum. As a result, the need for 8085 microprocessor Learning/Training System was a genuine demand and Intel released the SDK-85 Learning Kit without detailed design documentation. In 1978, Intel introduced the 16-bit 8086 microprocessor, which also found its place as a standard course at the educational institutions. Intel released the SDK-86 Learning Kit for 8086 but again without detailed design information. The SDKs helped people learning the 8085/8086 architecture andprogramming but not knowing the design methodology of a microprocessor learning system. The design techniques remained within the realm of the business companies. This paper presents an account of independently developed and tested design guidelines for an 8086 trainer, which an interested reader may use to build his own 8086 Microprocessor Learning System.
Nowadays social media games such as games in facebook platform is one of the fastest growing and popular industries in the world. The goal of most social games is to entertain the player through the interaction among ...
详细信息
Nowadays social media games such as games in facebook platform is one of the fastest growing and popular industries in the world. The goal of most social games is to entertain the player through the interaction among the players and the non-player characters (NPCs) within their friends or mutual friends. Thus, it is required to develop suitable NPCs that are fun to play against and the area of computational intelligence offers us a variety of techniques to do so. Since its beginning, game playing was a field of research in artificial Intelligence (Al). In games, artificial Intelligence (Al) is used to produce the illusion of intelligence in the behavior of NPCs. In the Pac-Man game, the NPCs are the ghosts. This paper illustrates a research design of MS. Pac-Man game by implementing neural networks in the movements of ghosts. Each ghost is given an unique intelligent method for movement to establish the levels of challenges in the Pac-Man game and making the game more interesting and fun to play. In addition, performance of the apps and Application programming Interface (API) have been examined in facebook platform to check its compatibility and user friendliness.
This paper introduces the research content, methods and progress of integrating the water distribution network, and has done a comprehensive overview from basic concepts to several typical methods for designing water-...
详细信息
This paper introduces the research content, methods and progress of integrating the water distribution network, and has done a comprehensive overview from basic concepts to several typical methods for designing water-using networks such as water pinch analysis, mathematical programming, internal water main technique and experience-based design methodology. It has an advance view of the future development's direction as well.
In the conditions of industrial production many processes of polymerisation are nonstationary. By processes optimization with the regard for such features as basic data it is necessary to use adaptive algorithms of id...
详细信息
In the conditions of industrial production many processes of polymerisation are nonstationary. By processes optimization with the regard for such features as basic data it is necessary to use adaptive algorithms of identification, allowing mathematical model of process continuously to be adapted for changing conditions of operation. Use of such algorithms for process optimization demands periodic recalculation of optimum technological modes of process. Polymer reaction engineering is a discipline that deals with various problems concerning the fundamental nature of chemical and physical phenomena in polymerization processes. Mathematical modeling is a powerful tool for the development of process understanding and advanced reactor technology in the polymer industry.
More internal transistor of GPU is used as a data processing rather than process control. Compared with the existing multinuclear CPU, it has more processors and higher ability of the whole parallel processing, which ...
详细信息
More internal transistor of GPU is used as a data processing rather than process control. Compared with the existing multinuclear CPU, it has more processors and higher ability of the whole parallel processing, which is suitable for a large scale super calculation based on desktop platform. CUDA platform, put forward by NVIDIA Company, which is a new hardware and software architecture of realized the general calculation of GPU combined with the high parallel ability, and adopt CUDAC programming language to realize a parallel binary image connected domain label algorithm based on CUDA. The algorithm uses eight connection body labels, which has the high parallel ability, the less association between steps and the efficiency of the great promotion space.
Using APDL programming language, an appropriate finite element model is created and the moving cyclic loads of Gauss heat source are realized. From the detailed qualitative analysis of the results, the variety laws of...
详细信息
Using APDL programming language, an appropriate finite element model is created and the moving cyclic loads of Gauss heat source are realized. From the detailed qualitative analysis of the results, the variety laws of temperature field in indirect SLS are obtained. Plot results at different moments, temperature cyclic curves of key points and the curves of depth of fusion and width of fusion on the set paths, are of important guiding significance for subsequent physical experiments.
In this paper, we propose a new steganographic scheme based on the polar codes. The scheme works according to two steps. The first offers a stego vector from given cover vector and message. The stego vector provided b...
详细信息
In this paper, we propose a new steganographic scheme based on the polar codes. The scheme works according to two steps. The first offers a stego vector from given cover vector and message. The stego vector provided by the first method can be the optimal;in this case, the insertion is successful with a very low complexity. Otherwise, we formalize our problem in a linear program form with initial solution the stego vector given by the first method, to converge to the optimal solution. Our scheme works with the case of a constant profile as well with any profile;it is then adapted to the case of wet paper. Tests on multiple gray scale images showed its good performance in terms of minimizing the embedding impact.
Different needs on Qos usually result in different date rates for the subscribers in a wireless network. To address the problem of distributed resource allocation in orthogonal frequency division multiplexing access(O...
详细信息
Different needs on Qos usually result in different date rates for the subscribers in a wireless network. To address the problem of distributed resource allocation in orthogonal frequency division multiplexing access(OFDMA) uplink, an optimization model is utilized to minimize the transmitted power constrained on exclusive occupation of each subchannel for avoidance of multiuser access interference(MAI) and minimum rate of each user for fairness, to reach a suboptimal solution. Two schemes are compared. The 1st scheme is a traditional one that all subchannels are equally assigned to all users based on message passing(MP) algorithm, afterward dynamic programming(DP)-based bitsloadings are performed. The 2nd scheme is an improved one as follows: each user is given a subchannel-quota firstly, which is configured to be proportional to its individual date rate needed, and based on all these quotas MP algorithm is executed, and the final course is the same. Theoretical analysis and simulation verification indicate that the 2nd scheme outperforms the 1st one significantly on the transmitted power consumption, and their iteration times are very close.
Open MP is a standard parallel programming language to develop parallel applications on shared memory machines. Open MP is very suitable for designing parallel algorithms for regular applications where the amount of w...
详细信息
Open MP is a standard parallel programming language to develop parallel applications on shared memory machines. Open MP is very suitable for designing parallel algorithms for regular applications where the amount of work is known apriori and therefore, distribution of work among the threads can be done at compile time. In irregular applications, the load changes dynamically at runtime and distribution of work among the threads can be done only at runtime. In the literature, it has been shown that Open MP produces poor performance for irreg-ular applications. In 2008, the Open MP 3.0 version introduced new features such as "tasks" to handle irregular computations. Not much work has gone into studying irregular algorithms in Open MP 3.0. In this paper, we consider one graph problem, the all pair shortest path problem and its implementation in Open MP 3.0. We show that for large number of vertices, the algorithm running on Open MP 3.0 surpasses the one on Open MP 2.5 by 1.6 times.
Assembly Language andprogramming is a course highly depending on practice. Practice teaching is an aid for teacher's classroom teaching. Aiming at the limitation of the practice teaching, a network platform of ex...
详细信息
暂无评论