Computational models are commonly used in engineering design and scientific discovery activities for simulating complex physical systems in disciplines such as fluid mechanics, structural dynamics, heat transfer, nonlinear structural mechanics, shock physics, and many OTHERs. These simulators can be an enormous aid to engineers who want to develop an understanding and/or predictive capability for complex behaviors typically observed in the corresponding physical systems. Simulators often serve as virtual prototypes, where a set of predefined system parameters, such as size or location dimensions and material properties, are adjusted to improve the performance of a system, as defined by one or more system performance objectives. Such optimization or tuning of the virtual prototype requires executing the simulator, evaluating performance objective(s), and adjusting the system parameters in an iterative, automated, and directed way. System performance objectives can be formulated, for example, to minimize weight, cost, or defects; to limit a critical temperature, stress, or vibration response; or to maximize performance, reliability, throughput, agility, or design robustness. In addition, one would often like to design computer experiments, run parameter studies, or perform uncertainty quantification (UQ). These approaches reveal how system performance changes as a design or uncertain input variable changes. Sampling methods are often used in uncertainty quantification to calculate a distribution on system performance measures, and to understand which uncertain inputs contribute most to the variance of the outputs. A primary goal for Dakota development is to provide engineers and OTHER disciplinary scientists with a systematic and rapid means to obtain improved or optimal designs or understand sensitivity or uncertainty using simulationbased models. These capabilities generally lead to improved designs and system performance in earlier design stages, alleviating dependence on physical prototypes and testing, shortening design cycles, and reducing product development costs. In addition to providing this practical environment for answering system performance questions, the Dakota toolkit provides an extensible platform for the research and rapid prototyping of customized methods and meta-algorithms
标签: Optimization and Uncertainty Quantification
上传时间: 2016-04-08
上传用户:huhu123456
The TAS3204 is a highly-integrated audio system-on-chip (SOC) consisting of a fully-programmable, 48-bit digital audio processor, a 3:1 stereo analog input MUX, four ADCs, four DACs, and OTHER analog functionality. The TAS3204 is programmable with the graphical PurePath Studio™ suite of DSP code development software. PurePath Studio is a highly intuitive, drag-and-drop environment that minimizes software development effort while allowing the end user to utilize the power and flexibility of the TAS3204’s digital audio processing core. TAS3204 processing capability includes speaker equalization and crossover, volume/bass/treble control, signal mixing/MUXing/splitting, delay compensation, dynamic range compression, and many OTHER basic audio functions. Audio functions such as matrix decoding, stereo widening, surround sound virtualization and psychoacoustic bass boost are also available with either third-party or TI royalty-free algorithms. The TAS3204 contains a custom-designed, fully-programmable 135-MHz, 48-bit digital audio processor. A 76-bit accumulator ensures that the high precision necessary for quality digital audio is maintained during arithmetic operations. Four differential 102 dB DNR ADCs and four differential 105 dB DNR DACs ensure that high quality audio is maintained through the whole signal chain as well as increasing robustness against noise sources such as TDMA interference. The TAS3204 is composed of eight functional blocks: Clocking System Digital Audio Interface Analog Audio Interface Power supply Clocks, digital PLL I2C control interface 8051 MCUcontroller Audio DSP – digital audio processing 特性 Digital Audio Processor Fully Programmable With the Graphical, Drag-and-Drop PurePath Studio™ Software Development Environment 135-MHz Operation 48-Bit Data Path With 76-Bit Accumulator Hardware Single-Cycle Multiplier (28 × 48)
上传时间: 2016-05-06
上传用户:fagong
Fire and Fury。 This article is about the 2018 book. For OTHER uses, see Fire and Fury (disambiguation). The title refers to a quote by Trump about the conflict with North Korea. The book became a New York Times number one bestseller.Fire and Fury: Inside the Trump White House is a 2018 book by Michael Wolff which details the behavior of U.S. President Donald Trump and the staff of his 2016 presidential campaign and White House. The book highlights descriptions of Trump's behavior, chaotic interactions among senior White House staff, and derogatory comments about the Trump family by former White House Chief StrategistSteve Bannon. Trump is depicted as being held in low regard by his White House staff, leading Wolff to state that "100% of the people around him" believe Trump is unfit for office.[1] Reviewers generally accepted Wolff's portrait of a dysfunctional Trump administration, but were skeptical of many of the book's most controversial claims.
上传时间: 2018-02-26
上传用户:Yoobaobao
This article is about the 2018 book. For OTHER uses, see Fire and Fury (disambiguation). The title refers to a quote by Trump abot the conflict with North Korea. The book became a New York Times number one bestseller.Fire and Fury: Inside the Trump White House is a 2018 book by Michael Wolff which details the behavior of U.S. President Donald Trump and the staff of his 2016 presidential campaign and White House. The book highlights descriptions of Trump's behavior, chaotic interactions among senior White House staff, and derogatory comments about the Trump family by former White House Chief StrategistSteve Bannon. Trump is depicted as being held in low regard by his White House staff, leading Wolff to state that "100% of the people around him" believe Trump is unfit for office.[1] Reviewers generally accepted Wolff's portrait of a dysfunctional Trump administration, but were skeptical of many of the book's most controversial claims.
上传时间: 2018-02-26
上传用户:Yoobaobao
Reconstruction- and example-based super-resolution (SR) methods are promising for restoring a high-resolution (HR) image from low-resolution (LR) image(s). Under large magnification, reconstruction-based methods usually fail to hallucinate visual details while example-based methods sometimes introduce unexpected details. Given a generic LR image, to reconstruct a photo-realistic SR image and to suppress artifacts in the reconstructed SR image, we introduce a multi-scale dictionary to a novel SR method that simultaneously integrates local and non-local priors. The local prior suppresses artifacts by using steering kernel regression to predict the target pixel from a small local area. The non-local prior enriches visual details by taking a weighted average of a large neighborhood as an estimate of the target pixel. Essentially, these two priors are complementary to each OTHER. Experimental results demonstrate that the proposed method can produce high quality SR recovery both quantitatively and perceptually.
标签: Super-resolution Multi-scale Dictionary Single Image for
上传时间: 2019-03-28
上传用户:fullout
This book provides an overview of recent innovations and achievements in the broad areas of cyber-physical systems (CPS), including architecture, networking, systems, applications, security, and privacy. The book discusses various new CPS technologies from diverse aspects to enable higher level of innovation towards intelligent life. The book provides insight to the future integration, coordination and interaction between the physical world, the information world, and human beings. The book features contributions from renowned researchers and engineers, who discuss key issues from various perspectives, presenting opinions and recent CPS-related achievements.Investigates how to advance the development of cyber-physical systems Provides a joint consideration of OTHER newly emerged technologies and concepts in relation to CPS like cloud computing, big data, fog computing, and crowd sourcing Includes topics related to CPS such as architecture, system, networking, application, algorithm, security and privacy
上传时间: 2019-04-21
上传用户:danyun
Delphi三层数据库连接池 (1) Connection Pool for Delphi release notes ------------------------------------------------------------------------------- This document contains: - Short description of the product - OTHER text files - TRIAL version limitations - Delphi - versions supported - Installation of Connection Pool for Delphi - Installation of Connection Pool for Delphi help file - Ordering information - Support and Web resources - Thanks To
上传时间: 2019-12-12
上传用户:me2008
Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to OTHER users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.
标签: Fundamental Limits Secure Class on of
上传时间: 2020-01-04
上传用户:kddlas
3 Dimensions TV (3DTV) became commercially available in the United States in 2010 and service in OTHER countries was expected to follow soon thereafter. 3DTV is a subset of a larger discipline known as 3D Video (3DV). There are now many routine vendor announcements related to 3DTV/3DV, and there are also conferences wholly dedicated to the topic.
标签: Transmission Encoding Content Capture 3DTV and
上传时间: 2020-05-23
上传用户:shancjb
In the hit CBS crime show Person of Interest, which debuted in 2011, the two heroes—one a former Central Intelligence Agency agent and the OTHER a billionaire technology genius—work together using the ubiquitous surveillance system in New York City to try to stop violent crime. It’s referred to by some as a science fiction cop show. But the use of advanced technology for crime analysis in almost every major police department in the United States may surpass what’s depicted on TV crime dramas such as Person of Interest. Real-time crime cen- ters (RTCCs) are a vital aspect of intelligent policing. Crime analysis is no longer the stuff of science fiction. It’s real.
标签: Intelligence Analysis Crime
上传时间: 2020-05-25
上传用户:shancjb