期刊文献+
共找到30篇文章
< 1 2 >
每页显示 20 50 100
Digital Development Rights in Developing Countries:Where the Governance Rules for Cross-Border Data Flows
1
作者 李艳华 JIANG Yu(译) 《The Journal of Human Rights》 2023年第5期1040-1066,共27页
The digital development rights in developing countries are based on establishing a new international economic order and ensuring equal participation in the digital globalization process to achieve people's well-ro... The digital development rights in developing countries are based on establishing a new international economic order and ensuring equal participation in the digital globalization process to achieve people's well-rounded development in the digital society.The relationship between cross-border data flows and the realization of digital development rights in developing countries is quite complex.Currently,developing countries seek to safeguard their existing digital interests through unilateral regulation to protect data sovereignty and multilateral regulation for cross-border data cooperation.However,developing countries still have to face internal conflicts between national digital development rights and individual and corporate digital development rights during the process of realizing digital development rights.They also encounter external contradictions such as developed countries interfering with developing countries'data sovereignty,developed countries squeezing the policy space of developing countries through dominant rules,and developing countries having conflicts between domestic and international rules.This article argues that balancing openness and security on digital trade platforms is the optimal solution for developing countries to realize their digital development rights.The establishment of WTO digital trade rules should inherently reflect the fundamental demands of developing countries in cross-border data flows.At the same time,given China's dual role as a digital powerhouse and a developing country,it should actively promote the realization of digital development rights in developing countries. 展开更多
关键词 developing countries digital development rights cross-border data flows governance rules
下载PDF
A Testing Method for Web Services Composition Based on Data-Flow 被引量:2
2
作者 HOU Jun XU Baowen +2 位作者 XU Lei WANG Di XU Junling 《Wuhan University Journal of Natural Sciences》 CAS 2008年第4期455-460,共6页
This paper proposes a method of data-flow testing for Web services composition. Firstly, to facilitate data flow analysis and constraints collecting, the existing model representation of business process execution lan... This paper proposes a method of data-flow testing for Web services composition. Firstly, to facilitate data flow analysis and constraints collecting, the existing model representation of business process execution language (BPEL) is modified in company with the analysis of data dependency and an exact representation of dead path elimination (DPE) is proposed, which over-comes the difficulties brought to dataflow analysis. Then defining and using information based on data flow rules is collected by parsing BPEL and Web services description language (WSDL) documents and the def-use annotated control flow graph is created. Based on this model, data-flow anomalies which indicate potential errors can be discovered by traversing the paths of graph, and all-du-paths used in dynamic data flow testing for Web services composition are automatically generated, then testers can design the test cases according to the collected constraints for each path selected. 展开更多
关键词 Web services composition business process execution language (BPEL) Web services description language (WSDL) data flow all-du-path
下载PDF
Study on the Deconvolution Method and Processing Flow of Airgun Source Data 被引量:1
3
作者 Zhai Qiushi Yao Huajian Wang Baoshan 《Earthquake Research in China》 CSCD 2016年第3期394-404,共11页
With its high repeatability,the airgun source has been used to monitor the temporal variations of subsurface structures. However,under different working conditions,there will be subtle differences in the airgun source... With its high repeatability,the airgun source has been used to monitor the temporal variations of subsurface structures. However,under different working conditions,there will be subtle differences in the airgun source signals. To some extent,deconvolution can eliminate changes of the recorded signals due to source variations. Generally speaking,in order to remove the airgun source wavelet signal and obtain the Green's functions between the airgun source and stations,we need to select an appropriate method to perform the deconvolution process for seismic waveform data. Frequency domain water level deconvolution and time domain iterative deconvolution are two kinds of deconvolution methods widely used in the field of receiver functions,etc. We use the Binchuan( in Yunnan Province,China) airgun data as an example to compare the performance of these two deconvolution methods in airgun source data processing. The results indicate that frequency domain water level deconvolution is better in terms of computational efficiency;time domain iterative deconvolution is better in terms of the signal-to-noise ratio( SNR),and the initial motion of P-wave is also clearer. We further discuss the sequence issue of deconvolution and stack for multiple-shot airgun data processing. Finally,we propose a general processing flow for the airgun source data to extract the Green 's functions between the airgun source and stations. 展开更多
关键词 Artificial source Airgun source DECONVOLUTION data processing flow
下载PDF
A New Automated Method and Sample Data Flow for Analysis of Volatile Nitrosamines in Human Urine 被引量:1
4
作者 James A. Hodgson Tiffany H. Seyler +2 位作者 Ernest McGahee Stephen Arnstein Lanqing Wang 《American Journal of Analytical Chemistry》 2016年第2期165-178,共14页
Volatile nitrosamines (VNAs) are a group of compounds classified as probable (group 2A) and possible (group 2B) carcinogens in humans. Along with certain foods and contaminated drinking water, VNAs are detected at hig... Volatile nitrosamines (VNAs) are a group of compounds classified as probable (group 2A) and possible (group 2B) carcinogens in humans. Along with certain foods and contaminated drinking water, VNAs are detected at high levels in tobacco products and in both mainstream and side-stream smoke. Our laboratory monitors six urinary VNAs—N-nitrosodimethylamine (NDMA), N-nitrosomethylethylamine (NMEA), N-nitrosodiethylamine (NDEA), N-nitrosopiperidine (NPIP), N-nitrosopyrrolidine (NPYR), and N-nitrosomorpholine (NMOR)—using isotope dilution GC-MS/ MS (QQQ) for large population studies such as the National Health and Nutrition Examination Survey (NHANES). In this paper, we report for the first time a new automated sample preparation method to more efficiently quantitate these VNAs. Automation is done using Hamilton STAR<sup>TM</sup> and Caliper Staccato<sup>TM</sup> workstations. This new automated method reduces sample preparation time from 4 hours to 2.5 hours while maintaining precision (inter-run CV < 10%) and accuracy (85% - 111%). More importantly this method increases sample throughput while maintaining a low limit of detection (<10 pg/mL) for all analytes. A streamlined sample data flow was created in parallel to the automated method, in which samples can be tracked from receiving to final LIMs output with minimal human intervention, further minimizing human error in the sample preparation process. This new automated method and the sample data flow are currently applied in bio-monitoring of VNAs in the US non-institutionalized population NHANES 2013-2014 cycle. 展开更多
关键词 Volatile Nitrosamines AUTOMATION Sample data flow Gas Chromatography Tandem Mass Spectrometry
下载PDF
Functionality Semantics of Predicate Data Flow Diagram
5
作者 高晓雷 缪淮扣 刘玲 《Journal of Shanghai University(English Edition)》 CAS 2004年第3期309-316,共8页
SOZL (structured methodology + object-oriented methodology + Z language) is a language that attempts to integrate structured method, object-oriented method and formal method. The core of this language is predicate dat... SOZL (structured methodology + object-oriented methodology + Z language) is a language that attempts to integrate structured method, object-oriented method and formal method. The core of this language is predicate data flow diagram (PDFD). In order to eliminate the ambiguity of predicate data flow diagrams and their associated textual specifications, a formalization of the syntax and semantics of predicate data flow diagrams is necessary. In this paper we use Z notation to define an abstract syntax and the related structural constraints for the PDFD notation, and provide it with an axiomatic semantics based on the concept of data availability and functionality of predicate operation. Finally, an example is given to establish functionality consistent decomposition on hierarchical PDFD (HPDFD). 展开更多
关键词 predicate data flow diagram (PDFD) predicate operation (PO) hierarchical predicate data flow diagram (HPDFD) AVAILABILITY functionality semantics.
下载PDF
Exploring the Approaches to Data Flow Computing
6
作者 Mohammad B.Khan Abdul R.Khan Hasan Alkahtani 《Computers, Materials & Continua》 SCIE EI 2022年第5期2333-2346,共14页
Architectures based on the data flow computing model provide an alternative to the conventional Von-Neumann architecture that are widelyused for general purpose computing.Processors based on the data flow architecture... Architectures based on the data flow computing model provide an alternative to the conventional Von-Neumann architecture that are widelyused for general purpose computing.Processors based on the data flow architecture employ fine-grain data-driven parallelism.These architectures have thepotential to exploit the inherent parallelism in compute intensive applicationslike signal processing,image and video processing and so on and can thusachieve faster throughputs and higher power efficiency.In this paper,severaldata flow computing architectures are explored,and their main architecturalfeatures are studied.Furthermore,a classification of the processors is presented based on whether they employ either the data flow execution modelexclusively or in combination with the control flow model and are accordinglygrouped as exclusive data flow or hybrid architectures.The hybrid categoryis further subdivided as conjoint or accelerator-style architectures dependingon how they deploy and separate the data flow and control flow executionmodel within their execution blocks.Lastly,a brief comparison and discussionof their advantages and drawbacks is also considered.From this study weconclude that although the data flow architectures are seen to have maturedsignificantly,issues like data-structure handling and lack of efficient placementand scheduling algorithms have prevented these from becoming commerciallyviable. 展开更多
关键词 Processor architecture data flow architectures Von-Neumann model control flow architectures
下载PDF
A New Synthetical Knowledge Representation Model and Its Application in Data Flow Diagram
7
作者 Liu Xiang Wu Guoqing +1 位作者 Yao Jian He Feng 《Wuhan University Journal of Natural Sciences》 CAS 1999年第1期35-42,共8页
A new synthetical knowledge representation model that integrates the attribute grammar model with the semantic network model was presented. The model mainly uses symbols of attribute grammar to establish a set of sy... A new synthetical knowledge representation model that integrates the attribute grammar model with the semantic network model was presented. The model mainly uses symbols of attribute grammar to establish a set of syntax and semantic rules suitable for a semantic network. Based on the model,the paper introduces a formal method defining data flow diagrams (DFD) and also simply explains how to use the method. 展开更多
关键词 attribute grammar semantic network data flow diagram
下载PDF
RECONSTRUCTION OF PART OF AN ACTUAL BLAST-WAVE FLOW FIELD TO AGREE WITH EXPERIMENTAL DATA BY USING NUMERICAL METHOD WITH HIGH IDENTIFICATION
8
作者 吴清松 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 1989年第10期925-932,共8页
In this paper, on the basis of experimental data of two kinds of chemical explosions, the piston-pushing model of spherical blast-waves and the second-order Godunov-type scheme of finite difference methods with high i... In this paper, on the basis of experimental data of two kinds of chemical explosions, the piston-pushing model of spherical blast-waves and the second-order Godunov-type scheme of finite difference methods with high identification to discontinuity are used to the numerical reconstruction of part of an actual hemispherical blast-wave flow field by properly adjusting the moving bounary conditions of a piston. This method is simple and reliable. It is suitable to the evaluation of effects of the blast-wave flow field away from the explosion center. 展开更多
关键词 RECONSTRUCTION OF PART OF AN ACTUAL BLAST-WAVE flow FIELD TO AGREE WITH EXPERIMENTAL data BY USING NUMERICAL METHOD WITH HIGH IDENTIFICATION ANFO TNT
下载PDF
Comprehensive Evaluation Method for Traffic Flow Data Quality Based on Grey Correlation Analysis and Particle Swarm Optimization
9
作者 Wei Ba Baojun Chen Qi Li 《Journal of Systems Science and Systems Engineering》 SCIE EI CSCD 2024年第1期106-128,共23页
Nowadays,data are more and more used for intelligent modeling and prediction,and the comprehensive evaluation of data quality is getting more and more attention as a necessary means to measure whether the data are usa... Nowadays,data are more and more used for intelligent modeling and prediction,and the comprehensive evaluation of data quality is getting more and more attention as a necessary means to measure whether the data are usable or not.However,the comprehensive evaluation method of data quality mostly contains the subjective factors of the evaluator,so how to comprehensively and objectively evaluate the data has become a bottleneck that needs to be solved in the research of comprehensive evaluation method.In order to evaluate the data more comprehensively,objectively and differentially,a novel comprehensive evaluation method based on particle swarm optimization(PSO)and grey correlation analysis(GCA)is presented in this paper.At first,an improved GCA evaluation model based on the technique for order preference by similarity to an ideal solution(TOPSIS)is proposed.Then,an objective function model of maximum difference of the comprehensive evaluation values is built,and the PSO algorithm is used to optimize the weights of the improved GCA evaluation model based on the objective function model.Finally,the performance of the proposed method is investigated through parameter analysis.A performance comparison of traffic flow data is carried out,and the simulation results show that the maximum average difference between the evaluation results and its mean value(MDR)of the proposed comprehensive evaluation method is 33.24%higher than that of TOPSIS-GCA,and 6.86%higher than that of GCA.The proposed method has better differentiation than other methods,which means that it objectively and comprehensively evaluates the data from both the relevance and differentiation of the data,and the results more effectively reflect the differences in data quality,which will provide more effective data support for intelligent modeling,prediction and other applications. 展开更多
关键词 data quality comprehensive evaluation particle swarm optimization grey correlation analysis traffic flow data
原文传递
On the Efficiency of a CFD-Based Full Convolution Neural Network for the Post-Processing of Field Data 被引量:2
10
作者 Sheng Bai Feng Bao Fengzhi Zhao 《Fluid Dynamics & Materials Processing》 EI 2021年第1期39-47,共9页
The present study aims to improve the efficiency of typical procedures used for post-processing flow field data by applying a neural-network technology.Assuming a problem of aircraft design as the workhorse,a regressi... The present study aims to improve the efficiency of typical procedures used for post-processing flow field data by applying a neural-network technology.Assuming a problem of aircraft design as the workhorse,a regression calculation model for processing the flow data of a FCN-VGG19 aircraft is elaborated based on VGGNet(Visual Geometry Group Net)and FCN(Fully Convolutional Network)techniques.As shown by the results,the model displays a strong fitting ability,and there is almost no over-fitting in training.Moreover,the model has good accuracy and convergence.For different input data and different grids,the model basically achieves convergence,showing good performances.It is shown that the proposed simulation regression model based on FCN has great potential in typical problems of computational fluid dynamics(CFD)and related data processing. 展开更多
关键词 CFD aircraft design FCN processing of flow field data regression calculation model
下载PDF
Citizen-Centric Complaint Reporting and Analyzing Mechanism
11
作者 Ahsan Ullah Tonmoy Singha +2 位作者 Hamidur Rahman Sarker Fatema Jahan Pia Afzal Hossain 《Journal of Software Engineering and Applications》 2023年第6期223-263,共41页
The “Citizen-Centric Complaint Reporting and Analyzing Mechanism” project is designed to create an online complaint system, called “e-Complaint”, to allow citizens to file complaints related to crime and misconduc... The “Citizen-Centric Complaint Reporting and Analyzing Mechanism” project is designed to create an online complaint system, called “e-Complaint”, to allow citizens to file complaints related to crime and misconduct in a secure and user-friendly way. The proposed system aims to address the challenges of the current complaint system, ensuring transparency and accountability in the police force. The “e-Complaint” system aims to increase police accountability and transparency and has significant benefits for both citizens and police departments. 展开更多
关键词 E-Complaint Entity Relationship Diagram Use-Case Diagram data flow Diagram
下载PDF
流速仪信号计算机采集系统的设计 被引量:13
12
作者 梁岚珍 陈志军 南新元 《自动化仪表》 CAS 北大核心 2002年第9期38-41,共4页
分析了采用计算机采集转子式流速仪信号时需要解决的关键问题 ,介绍了采用硬。
关键词 设计 数据采集 计算机 流速仪 检定 转子式
下载PDF
非完全数据光学层析的理论与实验研究 被引量:4
13
作者 贺安之 姚红兵 《南京理工大学学报》 EI CAS CSCD 北大核心 2003年第5期495-501,共7页
为解决以复杂流场三维测量为应用背景的非完全数据光学干涉层析 (OCT)这一国内外急待解决而尚未成功解决的理论与技术难题 ,经多年研究 ,开展了系列实验技术 ,提出了系统的非完全数据OCT重建理论方法 ,并首次将OCT技术与计算流体力学和... 为解决以复杂流场三维测量为应用背景的非完全数据光学干涉层析 (OCT)这一国内外急待解决而尚未成功解决的理论与技术难题 ,经多年研究 ,开展了系列实验技术 ,提出了系统的非完全数据OCT重建理论方法 ,并首次将OCT技术与计算流体力学和计算流动图像技术融合 ,为解决非完全数据的光学三维层析开拓了一条新途径。 展开更多
关键词 光学干涉层析 非完全数据 重建 融合 正交采样 计算流动图像
下载PDF
关于会计电算化教学内容和方法的思考
14
作者 汤岩 《河南广播电视大学学报》 2007年第3期90-91,共2页
会计电算化是一门交叉学科,融合了会计学、管理学、计算机科学等很多知识,学生理解起来也比较困难,很多老师在教学内容和方法上也各有不同,作者在总结多年教学经验的基础上,结合自己的一些体会,对其中一些重要的问题提出了自己的观点,... 会计电算化是一门交叉学科,融合了会计学、管理学、计算机科学等很多知识,学生理解起来也比较困难,很多老师在教学内容和方法上也各有不同,作者在总结多年教学经验的基础上,结合自己的一些体会,对其中一些重要的问题提出了自己的观点,并作出了详细的阐述。 展开更多
关键词 会计电算化 数据流程图 联机分析处理
下载PDF
An Algorithm of Programming Data Flow Analysis Based on Data Flow Expresion
15
作者 Zhao Dongfan, Li Wei and Meng Qingkai (Department of Computer Engineering, Changchun Institute of Post and Telecommunication, Changchun 130012, P. R. China) 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 1998年第1期41-42,共2页
This paper states the basic principle of program data flow analysis in a formal way and gives the concept of data flow expression. On the basis of this concept, an algorithm of finding data flow exceptions is rendered... This paper states the basic principle of program data flow analysis in a formal way and gives the concept of data flow expression. On the basis of this concept, an algorithm of finding data flow exceptions is rendered. This algorithm has great generality, with which it is easy to develop a tool for program test. So it is practical in application. 展开更多
关键词 software test program analysis data flow analysis data flow expression
原文传递
Towards a Global Regulatory Framework for Cross-Border Data Flows——Fundamental Concerns and the China’s Approach
16
作者 刘金瑞 《Frontiers of Law in China-Selected Publications from Chinese Universities》 2022年第3期412-439,共28页
Cross-border data flows not only involve cross-border trade issues,but also severely challenge personal information protection,national data security,and the jurisdiction of justice and enforcement.As the current digi... Cross-border data flows not only involve cross-border trade issues,but also severely challenge personal information protection,national data security,and the jurisdiction of justice and enforcement.As the current digital trade negotiations could not accommodate these challenges,China has initiated the concept of secure cross-border data flow and has launched a dual-track multi-level regulatory system,including control system for overseas transfer of important data,system of crossborder provision of personal information,and system of cross-border data request for justice and enforcement.To explore a global regulatory framework for cross-border data flows,legitimate and controllable cross-border data flows should be promoted,supervision should be categorized based on risk concerned,and the rule of law should be coordinated at home and abroad to promote system compatibility.To this end,the key is to build a compatible regulatory framework,which includes clarifying the scope of important data to define the“Negative List”for preventing national security risks,improving the cross-border accountability for protecting personal information rights and interests to ease pre-supervision pressure,and focusing on data access rights instead of data localization for upholding the jurisdiction of justice and enforcement. 展开更多
关键词 cross-border data flows personal information important data national security jurisdiction of justice and enforcement global regulatory framework
原文传递
The Governance of Cross-Border Data Flows in Trade Agreements:Is the CPTPP Framework an Ideal Way Out?
17
作者 全小莲 《Frontiers of Law in China-Selected Publications from Chinese Universities》 2020年第3期253-279,共27页
The regulations of cross-border data flows is a growing challenge for the international community.International trade agreements,however,appear to be pioneering legal methods to cope,as they have grappled with this is... The regulations of cross-border data flows is a growing challenge for the international community.International trade agreements,however,appear to be pioneering legal methods to cope,as they have grappled with this issue since the 1990s.The World Trade Organization(WTO)rules system offers a partial solution under the General Agreement on Trade in Services(GATS),which covers aspects related to cross-border data flows.The Comprehensive and Progressive Agreement for Trans-Pacific Partnership(CPTPP)and the United States-Mexico-Canada Agreement(USMCA)have also been perceived to provide forward-looking resolutions.In this context,this article analyzes why a resolution to this issue may be illusory.While they regulate cross-border data flows in various ways,the structure and wording of exception articles of both the CPTPP and USMCA have the potential to pose significant challenges to the international legal system.The new system,attempting to weigh societal values and economic development,is imbalanced,often valuing free trade more than individual online privacy and cybersecurity.Furthermore,the inclusion of poison-pill clauses is,by nature,antithetical to cooperation.Thus,for the international community generally,and China in particular,cross-border data flows would best be regulated under the WTO-centered multilateral trade law system. 展开更多
关键词 cross-border data flows Comprehensive and Progressive Agreement for Trans-Pacific Partnership(CPTPP) United States-Mexico-Canada Agreement(USMCA) World Trade Organization(WTO) CYBERSECURITY individual privacy data localization
原文传递
A Case Study in Teaching Pipes-and-filters and Batch Sequential Software Architectures
18
作者 SUN Yu-shan DING Jian-rui 《计算机教育》 2012年第10期18-22,共5页
In this paper,a case study is carried out in comparison of pipes-and-filters architecture and batch sequential architecture.Concepts on a data flow system and the two mentioned architectures are presented.A Java templ... In this paper,a case study is carried out in comparison of pipes-and-filters architecture and batch sequential architecture.Concepts on a data flow system and the two mentioned architectures are presented.A Java template class design in implementing the "pipes" and "filters" in the pipes-and-filters architecture is given at the design level.Finally,this paper uses a concrete example to show how to use Java to implement the pipesand-filters architecture.Using varied amount of data from text files,performance and memory usage of the two architectures are illustrated. 展开更多
关键词 Software architecture data flow system pipes-and-filters architecture batch sequential architecture
下载PDF
Deep Learning Based Intrusion Detection in Cloud Services for Resilience Management
19
作者 S.Sreenivasa Chakravarthi R.Jagadeesh Kannan +1 位作者 V.Anantha Natarajan Xiao-Zhi Gao 《Computers, Materials & Continua》 SCIE EI 2022年第6期5117-5133,共17页
In the global scenario one of the important goals for sustainable development in industrial field is innovate new technology,and invest in building infrastructure.All the developed and developing countries focus on bu... In the global scenario one of the important goals for sustainable development in industrial field is innovate new technology,and invest in building infrastructure.All the developed and developing countries focus on building resilient infrastructure and promote sustainable developments by fostering innovation.At this juncture the cloud computing has become an important information and communication technologies model influencing sustainable development of the industries in the developing countries.As part of the innovations happening in the industrial sector,a new concept termed as‘smart manufacturing’has emerged,which employs the benefits of emerging technologies like internet of things and cloud computing.Cloud services deliver an on-demand access to computing,storage,and infrastructural platforms for the industrial users through Internet.In the recent era of information technology the number of business and individual users of cloud services have been increased and larger volumes of data is being processed and stored in it.As a consequence,the data breaches in the cloud services are also increasing day by day.Due to various security vulnerabilities in the cloud architecture;as a result the cloud environment has become non-resilient.To restore the normal behavior of the cloud,detect the deviations,and achieve higher resilience,anomaly detection becomes essential.The deep learning architectures-based anomaly detection mechanisms uses various monitoring metrics characterize the normal behavior of cloud services and identify the abnormal events.This paper focuses on designing an intelligent deep learning based approach for detecting cloud anomalies in real time to make it more resilient.The deep learning models are trained using features extracted from the system level and network level performance metrics observed in the Transfer Control Protocol(TCP)traces of the simulation.The experimental results of the proposed approach demonstrate a superior performance in terms of higher detection rate and lower false alarm rate when compared to the Support Vector Machine(SVM). 展开更多
关键词 Anomaly detection network flow data deep learning MIGRATION auto-encoder support vector machine
下载PDF
An FPGA-Based Resource-Saving Hardware Accelerator for Deep Neural Network
20
作者 Han Jia Xuecheng Zou 《International Journal of Intelligence Science》 2021年第2期57-69,共13页
With the development of computer vision researches, due to the state-of-the-art performance on image and video processing tasks, deep neural network (DNN) has been widely applied in various applications (autonomous ve... With the development of computer vision researches, due to the state-of-the-art performance on image and video processing tasks, deep neural network (DNN) has been widely applied in various applications (autonomous vehicles, weather forecasting, counter-terrorism, surveillance, traffic management, etc.). However, to achieve such performance, DNN models have become increasingly complicated and deeper, and result in heavy computational stress. Thus, it is not sufficient for the general central processing unit (CPU) processors to meet the real-time application requirements. To deal with this bottleneck, research based on hardware acceleration solution for DNN attracts great attention. Specifically, to meet various real-life applications, DNN acceleration solutions mainly focus on issue of hardware acceleration with intense memory and calculation resource. In this paper, a novel resource-saving architecture based on Field Programmable Gate Array (FPGA) is proposed. Due to the novel designed processing element (PE), the proposed architecture </span><span style="font-family:Verdana;">achieves good performance with the extremely limited calculating resource. The on-chip buffer allocation helps enhance resource-saving performance on memory. Moreover, the accelerator improves its performance by exploiting</span> <span style="font-family:Verdana;">the sparsity property of the input feature map. Compared to other state-of-the-art</span><span style="font-family:Verdana;"> solutions based on FPGA, our architecture achieves good performance, with quite limited resource consumption, thus fully meet the requirement of real-time applications. 展开更多
关键词 Deep Neural Network RESOURCE-SAVING Hardware Accelerator data flow
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部