期刊文献+
共找到69篇文章
< 1 2 4 >
每页显示 20 50 100
A Secure and Effective Energy-Aware Fixed-Point Quantization Scheme for Asynchronous Federated Learning
1
作者 Zerui Zhen Zihao Wu +3 位作者 Lei Feng Wenjing Li Feng Qi Shixuan Guo 《Computers, Materials & Continua》 SCIE EI 2023年第5期2939-2955,共17页
Asynchronous federated learning(AsynFL)can effectivelymitigate the impact of heterogeneity of edge nodes on joint training while satisfying participant user privacy protection and data security.However,the frequent ex... Asynchronous federated learning(AsynFL)can effectivelymitigate the impact of heterogeneity of edge nodes on joint training while satisfying participant user privacy protection and data security.However,the frequent exchange of massive data can lead to excess communication overhead between edge and central nodes regardless of whether the federated learning(FL)algorithm uses synchronous or asynchronous aggregation.Therefore,there is an urgent need for a method that can simultaneously take into account device heterogeneity and edge node energy consumption reduction.This paper proposes a novel Fixed-point Asynchronous Federated Learning(FixedAsynFL)algorithm,which could mitigate the resource consumption caused by frequent data communication while alleviating the effect of device heterogeneity.FixedAsynFL uses fixed-point quantization to compress the local and global models in AsynFL.In order to balance energy consumption and learning accuracy,this paper proposed a quantization scale selection mechanism.This paper examines the mathematical relationship between the quantization scale and energy consumption of the computation/communication process in the FixedAsynFL.Based on considering the upper bound of quantization noise,this paper optimizes the quantization scale by minimizing communication and computation consumption.This paper performs pertinent experiments on the MNIST dataset with several edge nodes of different computing efficiency.The results show that the FixedAsynFL algorithm with an 8-bit quantization can significantly reduce the communication data size by 81.3%and save the computation energy in the training phase by 74.9%without significant loss of accuracy.According to the experimental results,we can see that the proposed AsynFixedFL algorithm can effectively solve the problem of device heterogeneity and energy consumption limitation of edge nodes. 展开更多
关键词 Asynchronous federated learning artificial intelligence model compression energy consumption fixed-point quantization learning accuracy
下载PDF
A Fixed-Point Iterative Method for Discrete Tomography Reconstruction Based on Intelligent Optimization
2
作者 Luyao Yang Hao Chen +2 位作者 Haocheng Yu Jin Qiu Shuxian Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第1期731-745,共15页
Discrete Tomography(DT)is a technology that uses image projection to reconstruct images.Its reconstruction problem,especially the binary image(0–1matrix)has attracted strong attention.In this study,a fixed point iter... Discrete Tomography(DT)is a technology that uses image projection to reconstruct images.Its reconstruction problem,especially the binary image(0–1matrix)has attracted strong attention.In this study,a fixed point iterative method of integer programming based on intelligent optimization is proposed to optimize the reconstructedmodel.The solution process can be divided into two procedures.First,the DT problem is reformulated into a polyhedron judgment problembased on lattice basis reduction.Second,the fixed-point iterativemethod of Dang and Ye is used to judge whether an integer point exists in the polyhedron of the previous program.All the programs involved in this study are written in MATLAB.The final experimental data show that this method is obviously better than the branch and bound method in terms of computational efficiency,especially in the case of high dimension.The branch and bound method requires more branch operations and takes a long time.It also needs to store a large number of leaf node boundaries and the corresponding consumptionmatrix,which occupies a largememory space. 展开更多
关键词 Discrete tomography integer programming fixed-point iterative algorithm intelligent optimization lattice basis reduction
下载PDF
A Fixed-Point Fast Sweeping WENO Method with Inverse Lax-Wendroff Boundary Treatment for Steady State of Hyperbolic Conservation Laws
3
作者 Liang Li Jun Zhu +1 位作者 Chi-Wang Shu Yong-Tao Zhang 《Communications on Applied Mathematics and Computation》 2023年第1期403-427,共25页
Fixed-point fast sweeping WENO methods are a class of efficient high-order numerical methods to solve steady-state solutions of hyperbolic partial differential equations(PDEs).The Gauss-Seidel iterations and alternati... Fixed-point fast sweeping WENO methods are a class of efficient high-order numerical methods to solve steady-state solutions of hyperbolic partial differential equations(PDEs).The Gauss-Seidel iterations and alternating sweeping strategy are used to cover characteristics of hyperbolic PDEs in each sweeping order to achieve fast convergence rate to steady-state solutions.A nice property of fixed-point fast sweeping WENO methods which distinguishes them from other fast sweeping methods is that they are explicit and do not require inverse operation of nonlinear local systems.Hence,they are easy to be applied to a general hyperbolic system.To deal with the difficulties associated with numerical boundary treatment when high-order finite difference methods on a Cartesian mesh are used to solve hyperbolic PDEs on complex domains,inverse Lax-Wendroff(ILW)procedures were developed as a very effective approach in the literature.In this paper,we combine a fifthorder fixed-point fast sweeping WENO method with an ILW procedure to solve steadystate solution of hyperbolic conservation laws on complex computing regions.Numerical experiments are performed to test the method in solving various problems including the cases with the physical boundary not aligned with the grids.Numerical results show highorder accuracy and good performance of the method.Furthermore,the method is compared with the popular third-order total variation diminishing Runge-Kutta(TVD-RK3)time-marching method for steady-state computations.Numerical examples show that for most of examples,the fixed-point fast sweeping method saves more than half CPU time costs than TVD-RK3 to converge to steady-state solutions. 展开更多
关键词 fixed-point fast sweeping methods Multi-resolution WENO schemes Steady state ILW procedure Convergence
下载PDF
Fixed-Point Iteration Method for Solving the Convex Quadratic Programming with Mixed Constraints 被引量:1
4
作者 Ruopeng Wang Hong Shi +1 位作者 Kai Ruan Xiangyu Gao 《Applied Mathematics》 2014年第2期256-262,共7页
The present paper is devoted to a novel smoothing function method for convex quadratic programming problem with mixed constrains, which has important application in mechanics and engineering science. The problem is re... The present paper is devoted to a novel smoothing function method for convex quadratic programming problem with mixed constrains, which has important application in mechanics and engineering science. The problem is reformulated as a system of non-smooth equations, and then a smoothing function for the system of non-smooth equations is proposed. The condition of convergences of this iteration algorithm is given. Theory analysis and primary numerical results illustrate that this method is feasible and effective. 展开更多
关键词 fixed-point ITERATION CONVEX QUADRATIC Programming Problem Convergence SMOOTHING Function
下载PDF
Quantum search for unknown number of target items by hybridizing fixed-point method with trail-and-error method
5
作者 李坦 张硕 +4 位作者 付向群 汪翔 汪洋 林杰 鲍皖苏 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第12期68-74,共7页
For the unsorted database quantum search with the unknown fraction λ of target items, there are mainly two kinds of methods, i.e., fixed-point and trail-and-error.(i) In terms of the fixed-point method, Yoder et al. ... For the unsorted database quantum search with the unknown fraction λ of target items, there are mainly two kinds of methods, i.e., fixed-point and trail-and-error.(i) In terms of the fixed-point method, Yoder et al. [Phys. Rev. Lett.113 210501(2014)] claimed that the quadratic speedup over classical algorithms has been achieved. However, in this paper, we point out that this is not the case, because the query complexity of Yoder’s algorithm is actually in O(1/λ01/2)rather than O(1/λ1/2), where λ0 is a known lower bound of λ.(ii) In terms of the trail-and-error method, currently the algorithm without randomness has to take more than 1 times queries or iterations than the algorithm with randomly selected parameters. For the above problems, we provide the first hybrid quantum search algorithm based on the fixed-point and trail-and-error methods, where the matched multiphase Grover operations are trialed multiple times and the number of iterations increases exponentially along with the number of trials. The upper bound of expected queries as well as the optimal parameters are derived. Compared with Yoder’s algorithm, the query complexity of our algorithm indeed achieves the optimal scaling in λ for quantum search, which reconfirms the practicality of the fixed-point method. In addition, our algorithm also does not contain randomness, and compared with the existing deterministic algorithm, the query complexity can be reduced by about 1/3. Our work provides a new idea for the research on fixed-point and trial-and-error quantum search. 展开更多
关键词 quantum search fixed-point trail-and-error unknown number of target items
原文传递
Investigation on dynamic characteristics of a rod fastening rotor-bearing coupling system with fixed-point rubbing
6
作者 Yang YANG HJOUYANG +3 位作者 Jin ZENG Hui MA Yiren YANG Dengqing CAO 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI CSCD 2022年第7期1063-1080,共18页
The aim of this paper is to gain insight into the nonlinear vibration feature of a dynamic model of a gas turbine.First,a rod fastening rotor-bearing coupling model with fixed-point rubbing is proposed,where the fract... The aim of this paper is to gain insight into the nonlinear vibration feature of a dynamic model of a gas turbine.First,a rod fastening rotor-bearing coupling model with fixed-point rubbing is proposed,where the fractal theory and the finite element method are utilized.For contact analysis,a novel contact force model is introduced in this paper.Meanwhile,the Coulomb model is adopted to expound the friction characteristics.Second,the governing equations of motion of the rotor system are numerically solved,and the nonlinear dynamic characteristics are analyzed in terms of the bifurcation diagram,Poincarémap,and time history.Third,the potential effects provided by contact degree of joint interface,distribution position,and amount of contact layer are discussed in detail.Finally,the contrast analysis between the integral rotor and the rod fastening rotor is conducted under the condition of fixed-point rubbing. 展开更多
关键词 rod fastening rotor joint interface fixed-point rubbing nonlinear dynamic characteristic
下载PDF
FIXED-POINT BLIND ADAPTIVE MULTIUSER DETECTION ALGORITHM FOR IR UWB SYSTEMS IN MULTIPATH CHANNEL
7
作者 Wang Feng Xu Chengqi 《Journal of Electronics(China)》 2010年第2期157-165,共9页
Using the hypothesis that data transmitted by different users are statistically independent of each other,this paper proposes a fixed-point blind adaptive multiuser detection algorithm for Time-Hopping (TH) Impulse Ra... Using the hypothesis that data transmitted by different users are statistically independent of each other,this paper proposes a fixed-point blind adaptive multiuser detection algorithm for Time-Hopping (TH) Impulse Radio (IR) Ultra Wide Band (UWB) systems in multipath channel,which is based on Independent Component Analysis (ICA) idea. The proposed algorithm employs maximizing negentropy criterion to separate the data packets of different users. Then the user characteristic se-quences are utilized to identify the data packet order of the desired user. This algorithm only needs the desired user’s characteristic sequence instead of channel information,power information and time-hoping code of any user. Due to using hypothesis of statistical independence among users,the proposed algorithm has the outstanding Bit Error Rate (BER) performance and the excellent ability of near-far resistance. Simulation results demonstrate that this algorithm has the performance close to that of Maximum-Likelihood (ML) algorithm and is a suboptimum blind adaptive multiuser detection algorithm of excellent near-far resistance and low complexity. 展开更多
关键词 Ultra Wide Band (UWB) MultiUser Detection (MUD) Bind adaptive fixed-point Multipath channel
下载PDF
Traversable Wormholes and the Brouwer Fixed-Point Theorem
8
作者 Peter K. F. Kuhfittig 《Journal of Applied Mathematics and Physics》 2020年第7期1263-1268,共6页
The Brouwer fixed-point theorem in topology states that for any continuous mapping <em>f</em> on a compact convex set into itself admits a fixed point, <em>i.e.</em>, a point <em>x</em... The Brouwer fixed-point theorem in topology states that for any continuous mapping <em>f</em> on a compact convex set into itself admits a fixed point, <em>i.e.</em>, a point <em>x</em><sub>0</sub> such that<em> f</em>(<em>x</em><sub>0</sub>) = <em>x</em><sub>0</sub>. Under suitable conditions, this fixed point corresponds to the throat of a traversable wormhole, <em>i.e.</em>, <em>b</em>(<em>r</em><sub>0</sub>) = <em>r</em><sub>0</sub> for the shape function <em>b</em> = <em>b</em>(<em>r</em>). The possible existence of wormholes can therefore be deduced from purely mathematical considerations without going beyond the existing physical requirements. 展开更多
关键词 Traversable Wormholes Brouwer fixed-point Theorem
下载PDF
LMM:A Fixed-Point Linear Mapping Based Approximate Multiplier for IoT
9
作者 吴莹 温晨怡 +1 位作者 尹勋钊 卓成 《Journal of Computer Science & Technology》 SCIE EI CSCD 2023年第2期298-308,共11页
The development of IoT(Internet of Things)calls for circuit designs with energy and area efficiency for edge devices.Approximate computing which trades unnecessary computation precision for hardware cost savings is a ... The development of IoT(Internet of Things)calls for circuit designs with energy and area efficiency for edge devices.Approximate computing which trades unnecessary computation precision for hardware cost savings is a promising direction for error-tolerant applications.Multipliers,as frequently invoked basic modules which consume non-trivial hardware costs,have been introduced approximation to achieve distinct energy and area savings for data-intensive applications.In this paper,we propose a fixed-point approximate multiplier that employs a linear mapping technique,which enables the configurability of approximation levels and the unbiasedness of computation errors.We then introduce a dynamic truncation method into the proposed multiplier design to cover a wider and more fine-grained configuration range of approximation for more flexible hardware cost savings.In addition,a novel normalization module is proposed for the required shifting operations,which balances the occupied area and the critical path delay compared with normal shifters.The introduced errors of our proposed design are analyzed and expressed by formulas which are validated by experimental results.Experimental evaluations show that compared with accurate multipliers,our proposed approximate multiplier design provides maximum area and power savings up to 49.70%and 66.39%respectively with acceptable computation errors. 展开更多
关键词 approximate computing fixed-point linear mapping MULTIPLIER Internet of Things(IoT)
原文传递
The Criteria for Reducing Centrally Restricted Three-Body Problem to Two-Body Problem
10
作者 Bijay Kumar Sharma 《International Journal of Astronomy and Astrophysics》 2024年第1期1-19,共19页
Our Solar System contains eight planets and their respective natural satellites excepting the inner two planets Mercury and Venus. A satellite hosted by a given Planet is well protected by the gravitational pertubatio... Our Solar System contains eight planets and their respective natural satellites excepting the inner two planets Mercury and Venus. A satellite hosted by a given Planet is well protected by the gravitational pertubation of much heavier planets such as Jupiter and Saturn if the natural satellite lies deep inside the respective host Planet Hill sphere. Each planet has a Hill radius a<sub>H</sub> and planet mean radius R<sub>P </sub>and the ratio R<sub>1</sub>=R<sub>P</sub>/a<sub>H</sub>. Under very low R<sub>1 </sub>(less than 0.006) the approximation of CRTBP (centrally restricted three-body problem) to two-body problem is valid and planet has spacious Hill lobe to capture a satellite and retain it. This ensures a high probability of capture of natural satellite by the given planet and Sun’s perturbation on Planet-Satellite binary can be neglected. This is the case with Earth, Mars, Jupiter, Saturn, Neptune and Uranus. But Mercury and Venus has R<sub>1</sub>=R<sub>P</sub>/a<sub>H</sub> =0.01 and 5.9862 × 10<sup>-3</sup> respectively hence they have no satellites. There is a limit to the dimension of the captured body. It must be a much smaller body both dimensionally as well masswise. The qantitative limit is a subject of an independent study. 展开更多
关键词 Hill’s Radius Two-Body Problem fixed-point Solution Lagrange Points Earth-Moon-Test Particle CRTBP
下载PDF
An N/4 fixed-point duality quantum search algorithm 被引量:8
11
作者 HAO Liang1,LIU Dan2 & LONG GuiLu1,3 1Key Laboratory for Atomic and Molecular NanoSciences and Department of Physics,Tsinghua University,Beijing 100084,China 2School of Sciences,Dalian Nationalities University,Dalian 116600,China 3Tsinghua National Laboratory for Information Science and Technology,Beijing 100084,China 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2010年第9期1765-1768,共4页
Here a fixed-point duality quantum search algorithm is proposed.This algorithm uses iteratively non-unitary operations and measurements to search an unsorted database.Once the marked item is found,the algorithm stops ... Here a fixed-point duality quantum search algorithm is proposed.This algorithm uses iteratively non-unitary operations and measurements to search an unsorted database.Once the marked item is found,the algorithm stops automatically.This algorithm uses a constant non-unitary operator,and requires N/4 steps on average(N is the number of data from the database) to locate the marked state.The implementation of this algorithm in a usual quantum computer is also demonstrated. 展开更多
关键词 fixed-point SEARCH ALGORITHM DUALITY quantum COMPUTING the N4 DUALITY SEARCH ALGORITHM
原文传递
Quantum Algorithm for Attacking RSA Based on Fourier Transform and Fixed-Point 被引量:1
12
作者 WANG Yahui ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2021年第6期489-494,共6页
Shor in 1994 proposed a quantum polynomial-time algorithm for finding the order r of an element a in the multiplicative group Z_(n)^(*),which can be used to factor the integer n by computing gcd(a^(r/2)±1,n),and ... Shor in 1994 proposed a quantum polynomial-time algorithm for finding the order r of an element a in the multiplicative group Z_(n)^(*),which can be used to factor the integer n by computing gcd(a^(r/2)±1,n),and hence break the famous RSA cryptosystem.However,the order r must be even.This restriction can be removed.So in this paper,we propose a quantum polynomial-time fixed-point attack for directly recovering the RSA plaintext M from the ciphertext C,without explicitly factoring the modulus n.Compared to Shor’s algorithm,the order r of the fixed-point C for RSA(e,n)satisfying C^(er)≡C(mod n)does not need to be even.Moreover,the success probability of the new algorithm is at least 4φ(r)/π^(2)r and higher than that of Shor’s algorithm,though the time complexity for both algorithms is about the same. 展开更多
关键词 information security CRYPTOLOGY RSA fixed-point quantum computing
原文传递
Fixed-point blind source separation algorithm based on ICA
13
作者 Hongyan LI Jianfen MA +1 位作者 Deng’ao LI Huakui WANG 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2008年第3期343-346,共4页
This paper introduces the fixed-point learning algorithm based on independent component analysis(ICA);the model and process of this algorithm and simulation results are presented.Kurtosis was adopted as the estimation... This paper introduces the fixed-point learning algorithm based on independent component analysis(ICA);the model and process of this algorithm and simulation results are presented.Kurtosis was adopted as the estimation rule of independence.The results of the experiment show that compared with the traditional ICA algorithm based on random grads,this algorithm has advantages such as fast convergence and no necessity for any dynamic parameter,etc.The algorithm is a highly efficient and reliable method in blind signal separation. 展开更多
关键词 independent component analysis(ICA) blind source separation fixed-point algorithm
原文传递
THE EXISTENCE AND MULTIPLICITY OF k-CONVEX SOLUTIONS FOR A COUPLED k-HESSIAN SYSTEM
14
作者 高承华 何兴玥 王晶晶 《Acta Mathematica Scientia》 SCIE CSCD 2023年第6期2615-2628,共14页
In this paper,we focus on the following coupled system of k-Hessian equations:{S_(k)(λ(D^(2)u))=f_(1)(|x|,-v)in B,S_(k)(λ(D^(2)v))=f2(|x|,-u)in B,u=v=0 on■B.Here B is a unit ball with center 0 and fi(i=1,2)are cont... In this paper,we focus on the following coupled system of k-Hessian equations:{S_(k)(λ(D^(2)u))=f_(1)(|x|,-v)in B,S_(k)(λ(D^(2)v))=f2(|x|,-u)in B,u=v=0 on■B.Here B is a unit ball with center 0 and fi(i=1,2)are continuous and nonnegative functions.By introducing some new growth conditions on the nonlinearities f_(1) and f_(2),which are more flexible than the existing conditions for the k-Hessian systems(equations),several new existence and multiplicity results for k-convex solutions for this kind of problem are obtained. 展开更多
关键词 system of k-Hessian equations k-convex solutions EXISTENCE MULTIPLICITY fixed-point theorem
下载PDF
Maximum Correntropy Kalman Filtering for Non-Gaussian Systems With State Saturations and Stochastic Nonlinearities
15
作者 Bo Shen Xuelin Wang Lei Zou 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第5期1223-1233,共11页
This paper tackles the maximum correntropy Kalman filtering problem for discrete time-varying non-Gaussian systems subject to state saturations and stochastic nonlinearities. The stochastic nonlinearities, which take ... This paper tackles the maximum correntropy Kalman filtering problem for discrete time-varying non-Gaussian systems subject to state saturations and stochastic nonlinearities. The stochastic nonlinearities, which take the form of statemultiplicative noises, are introduced in systems to describe the phenomenon of nonlinear disturbances. To resist non-Gaussian noises, we consider a new performance index called maximum correntropy criterion(MCC) which describes the similarity between two stochastic variables. To enhance the “robustness” of the kernel parameter selection on the resultant filtering performance, the Cauchy kernel function is adopted to calculate the corresponding correntropy. The goal of this paper is to design a Kalman-type filter for the underlying systems via maximizing the correntropy between the system state and its estimate. By taking advantage of an upper bound on the one-step prediction error covariance, a modified MCC-based performance index is constructed. Subsequently, with the assistance of a fixed-point theorem, the filter gain is obtained by maximizing the proposed cost function. In addition, a sufficient condition is deduced to ensure the uniqueness of the fixed point. Finally, the validity of the filtering method is tested by simulating a numerical example. 展开更多
关键词 fixed-point theorem maximum correntropy criterion non-Gaussian noises state saturations stochastic nonlinearities
下载PDF
Passive Attack Detection for a Class of Stealthy Intermittent Integrity Attacks
16
作者 Kangkang Zhang Christodoulos Keliris +2 位作者 Thomas Parisini Bin Jiang Marios M.Polycarpou 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第4期898-915,共18页
This paper proposes a passive methodology for detecting a class of stealthy intermittent integrity attacks in cyberphysical systems subject to process disturbances and measurement noise.A stealthy intermittent integri... This paper proposes a passive methodology for detecting a class of stealthy intermittent integrity attacks in cyberphysical systems subject to process disturbances and measurement noise.A stealthy intermittent integrity attack strategy is first proposed by modifying a zero-dynamics attack model.The stealthiness of the generated attacks is rigorously investigated under the condition that the adversary does not know precisely the system state values.In order to help detect such attacks,a backward-in-time detection residual is proposed based on an equivalent quantity of the system state change,due to the attack,at a time prior to the attack occurrence time.A key characteristic of this residual is that its magnitude increases every time a new attack occurs.To estimate this unknown residual,an optimal fixed-point smoother is proposed by minimizing a piece-wise linear quadratic cost function with a set of specifically designed weighting matrices.The smoother design guarantees robustness with respect to process disturbances and measurement noise,and is also able to maintain sensitivity as time progresses to intermittent integrity attack by resetting the covariance matrix based on the weighting matrices.The adaptive threshold is designed based on the estimated backward-in-time residual,and the attack detectability analysis is rigorously investigated to characterize quantitatively the class of attacks that can be detected by the proposed methodology.Finally,a simulation example is used to demonstrate the effectiveness of the developed methodology. 展开更多
关键词 Backward-in-time equivalent quantity fixed-point smoother intermittent integrity attacks
下载PDF
A Study of Solar Rotation and Differential Rotation
17
作者 Zhihui Zhou 《Journal of Applied Mathematics and Physics》 2023年第11期3782-3788,共7页
The Sun has solar rotation;nevertheless, many evidences have suggested that different latitude of the Sun rotates in different speed, which is now known as differential rotation. This work calculates the solar rotatio... The Sun has solar rotation;nevertheless, many evidences have suggested that different latitude of the Sun rotates in different speed, which is now known as differential rotation. This work calculates the solar rotation speeds near the equator and 30? in the northern hemisphere using Fixed-Point Arithmetic method. The calculated results show a greater speed at the equator than the speed at 30?, indicating that the speed decreases as the latitude becomes higher. . 展开更多
关键词 SUN Differential Rotation Active Region fixed-point Arithmetic Method
下载PDF
社会主义市场经济的提出是理论上的重大突破
18
作者 孔淑红 《城市研究》 1995年第1X期43-47,共5页
社会主义市场经济的提出是理论上的重大突破孔淑红我国在建国后照搬了苏联的斯大林模式,建立了高度集中的指令性计划体制,并长期以来把计划经济当作社会主义的本质特征和优越性加以宣传、歌颂并实行,同时将商品经济、市场经济当作资... 社会主义市场经济的提出是理论上的重大突破孔淑红我国在建国后照搬了苏联的斯大林模式,建立了高度集中的指令性计划体制,并长期以来把计划经济当作社会主义的本质特征和优越性加以宣传、歌颂并实行,同时将商品经济、市场经济当作资本主义的东西加以排斥和否定。由于高... 展开更多
关键词 PRICE TREND MODIFIED COMPLETE APPROXIMATION fixed-point analyticsolution
下载PDF
MATLAB在FPGA设计中的应用 被引量:1
19
作者 陆涛 陈禾 何佩琨 《系统仿真学报》 CAS CSCD 北大核心 2005年第z2期82-85,共4页
FPGA在数字设计领域的应用越来越广泛,而MATLAB强大的数学计算功能则可以充分保证FPGA的设计的正确性.使用MATLAB的fixed-point toolbox完成bit-true的硬件实现模型的方法,并介绍了使用该方法完成的一个大点数的FFT算法的FPGA设计.使用M... FPGA在数字设计领域的应用越来越广泛,而MATLAB强大的数学计算功能则可以充分保证FPGA的设计的正确性.使用MATLAB的fixed-point toolbox完成bit-true的硬件实现模型的方法,并介绍了使用该方法完成的一个大点数的FFT算法的FPGA设计.使用MATLAB产生的bit-true硬件模型可以很好的完成定点算法的开发和实现,以及面向硬件实现的算法调整.文中还介绍了如何利用MATLAB强大的数学功能产生大量的测试激励以保证FPGA设计的功能正确性. 展开更多
关键词 fixed-point TOOLBOX MATLAB FPGA FFT bit-true
下载PDF
基于FPGA的控制算法定点化设计 被引量:5
20
作者 衡园 吴建成 杨志军 《广东工业大学学报》 CAS 2020年第3期55-58,共4页
运动控制算法在现场可编程逻辑门阵列(Field Programmable Gate Array,FPGA)上实现过程中,当数据类型由浮点转定点时,存在无法保证高精度的问题。为此使用simulink中的定点工具(Fixed-Point Tool)对算法内部各信号数据的范围进行分析,... 运动控制算法在现场可编程逻辑门阵列(Field Programmable Gate Array,FPGA)上实现过程中,当数据类型由浮点转定点时,存在无法保证高精度的问题。为此使用simulink中的定点工具(Fixed-Point Tool)对算法内部各信号数据的范围进行分析,然后人为地对Fixed-Point Tool给出的建议位宽进行修正,从而使算法在保证较高精度的同时,也解决了采用统一较长位宽在FPGA上实现时造成的资源浪费问题。与传统的人为定义数据位宽相比,使用Fixed-Point Tool设置数据位宽,在输入数据范围发生变化时,能够更加灵活、动态地调整算法内部数据位宽。 展开更多
关键词 控制算法 现场可编程逻辑门阵列FPGA(Field Programmable Gate Array) 浮点转定点 高精度 定点工具fixed-point Tool
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部