Cardiotocography is one of the most widely used technique for recording changes in fetal heart rate(FHR) and uterine contractions. Assessing cardiotocography is crucial in that it leads to identifying fetuses which su...
详细信息
Cardiotocography is one of the most widely used technique for recording changes in fetal heart rate(FHR) and uterine contractions. Assessing cardiotocography is crucial in that it leads to identifying fetuses which suffer from lack of oxygen, i.e. hypoxia. This situation is defined as fetal distress and requires fetal intervention in order to prevent fetus death or other neurological disease caused by hypoxia. In this study a computer-based approach for analyzing cardiotocogram including diagnostic features for discriminating a pathologic fetus. In order to achieve this aim adaptive boosting ensemble of decision trees and various other machine learning algorithms are employed.
Uninitialized variables can cause system crashes when used and security vulnerabilities when exploited. With source rather than binary instrumentation, dynamic analysis tools such as MSan can detect uninitialized memo...
详细信息
ISBN:
(纸本)9781450326704
Uninitialized variables can cause system crashes when used and security vulnerabilities when exploited. With source rather than binary instrumentation, dynamic analysis tools such as MSan can detect uninitialized memory uses at significantly reduced overhead but are still *** this paper, we introduce a static value-flow analysis, called Usher, to guide and accelerate the dynamic analysis performed by such tools. Usher reasons about the definedness of values using a value-flow graph (VFG) that captures def-use chains for both top-level and address-taken variables interprocedurally and removes unnecessary instrumentation by solving a graph reachability problem. Usher works well with any pointer analysis (done a priori) and facilitates advanced instrumentation-reducing optimizations (with two demonstrated here). Implemented in LLVM and evaluated using all the 15 SPEC2000 C programs, Usher can reduce the slowdown of MSan from 212% -- 302% to 123% -- 140% for a number of configurations tested.
Member of the Russian Academy of Sciences Vladimir Melnikov was a disciple of the great Russian scientist, academician Sergei Lebedev, who was the founder of the national computer science, the creator of the first Sov...
详细信息
Member of the Russian Academy of Sciences Vladimir Melnikov was a disciple of the great Russian scientist, academician Sergei Lebedev, who was the founder of the national computer science, the creator of the first Soviet computers, the chief designer of computers that made up the famous BESM line (high-speed electronic computers). Since 1950, being the fifth-year student, he worked in the Academic Institute of Precise Mechanics and computerengineering (IPMCE), where participated in the development of the first soviet electronic computer. The serial BESM version was called BESM-2, and Melnikov became the executive in charge. Later this computer was replicated in China. A significant role in the life of Melnikov was played by the creation of the transistor BESM-6 computer, on which he worked as a deputy chief designer. In 1967, this computer was put into production and was produced for 17 years. In 1969 Melnikov started the design and development of a computing system "BESM-6 pairing hardware interface" (HI-6). In 1975, during the Soviet-American space flight 'Soyuz-Apollo' the operation was carried out on the system, built on the basis of HI-6 and BESM-6, that also provided a highly automated processing of ballistic and telemetry data in the Soviet Mission Control Center. Since 1978 Melnikov began to develop a new supercomputer, which had the name 'Electronics SS BIS' and was close to the American supercomputer Cray 1 in its instruction set.
Advanced Encryption Standard (AES), which is approved and published by Federal Information Processing Standard (FIPS), is a cryptographic algorithm that can be used to protect electronic data. The AES algorithm can be...
详细信息
ISBN:
(纸本)9783319009506
Advanced Encryption Standard (AES), which is approved and published by Federal Information Processing Standard (FIPS), is a cryptographic algorithm that can be used to protect electronic data. The AES algorithm can be programmed in software or hardware. This paper presents encryption time comparison of the AES algorithm on FPGA and computer. In the study, Verilog HDL and C programming language is used on the FPGA and computer, respectively. The AES algorithm with 128-bit input and key length 128-bit (AES-128) was simulated on Xilinx ISE Design Suite 13.3. It was observed that, the AES algorithm runs on the FPGA faster than on a computer. We measured the time of encryption on FPGA and computer. Encryption time is 390ns of AES on FPGA and 11 μs of AES on a computer.
In this paper, we propose an OpenCL framework for GPU clusters. The target cluster architecture consists of a single host node and multiple compute nodes. They are connected by an interconnection network, such as Giga...
详细信息
Recently, in Mathematical and Computational Applications Journal Chiu et al. [1] and Chen and Chiu [2] propose an inventory model based on EPQ with rework to determine the replenishment lot size and the number of ship...
详细信息
Recently, in Mathematical and Computational Applications Journal Chiu et al. [1] and Chen and Chiu [2] propose an inventory model based on EPQ with rework to determine the replenishment lot size and the number of shipments for a vendor-buyer integrated production-inventory system. They solve the inventory problem by considering both variables as continuous. However, the number of shipments must be considered as discrete variable. In this direction, this paper revisits and solves the inventory problem of [1-2] considering the decision variables according to their nature. Two easy and improved algorithms are proposed which simplify and complement the research works of [1-2].
R is an environment and functional programming language for statistical data analysis and visualization. Largely unknown to the functional programming community, it is popular and influential in many empirical science...
详细信息
The optimal production and advertising policies for an inventory control system of multi-item multiobjective problem under a single management are formulated as an optimal control problem with resource constraints und...
详细信息
The multilevel inverters (MLIs) are classified into three topologies such as Diode Clamped, Flying Capacitor and Cascade Multilevel Inverter (CMLI). CMLI topologies include two kind of structure that is named symmetri...
详细信息
In the conditions of industrial production many processes of polymerisation are nonstationary. By processes optimization with the regard for such features as basic data it is necessary to use adaptive algorithms of id...
详细信息
暂无评论