• No results found

memory requirement

Single Leaf Image Superresoution using Improved NEDI Technique for Memory Requirement

Single Leaf Image Superresoution using Improved NEDI Technique for Memory Requirement

... Plants are economical important for agricultural countries like India which is affected normally by bacterial, viral or fungal diseases that appears on leaf and stem. The agricultural application need HR images for their ...

9

A Rule Chaining Architecture Using a Correlation Matrix Memory

A Rule Chaining Architecture Using a Correlation Matrix Memory

... The graphs in Fig. 3 are contour plots showing the recall error rates for the ARCA architecture for a given depth of search tree and memory requirement. They clearly demonstrate that the ARCA system is ...

9

Fast Discovery of Frequent Itemsets: a Cubic Structure-Based Approach

Fast Discovery of Frequent Itemsets: a Cubic Structure-Based Approach

... The advantage of the FP-growth algorithm is the quick mining process which does not use candidates. Its draw- back is, however, that the memory requirement of the al- gorithm is huge, especially by lower ...

8

International Journal of Computer Science and Mobile Computing

International Journal of Computer Science and Mobile Computing

... more memory and hardware ...five-line-buffer memory and 36 arithmetic units, which is much more than the two-line-buffer memory and nine arithmetic units of a 3 × 3 convolution ...four-line-buffer ...

6

Time Efficient String Matching Solution for Single and Multiple Pattern using Bit Parallelism

Time Efficient String Matching Solution for Single and Multiple Pattern using Bit Parallelism

... automaton thereby reducing the memory requirement and secondly the time requirement is also reduced because of the machine inherent property of bit parallelism.[1] The method is called Bit Parallel ...

6

Efficient and Secure Fingerprint Verification for Embedded Devices

Efficient and Secure Fingerprint Verification for Embedded Devices

... peak memory requirement becomes 744 Kbytes (see Figure ...segment memory de- creases by 590 Kbytes compared to the previous result, while the program segment size slightly increases by 47 Kbytes due ...

11

Dynamic Memory Management in the Loci Framework

Dynamic Memory Management in the <em>Loci</em> Framework

... the memory management point of view, doing chomping alone would eliminate a large portion of memory ...peak memory is determined by the number of relations that needs to be in the memory ...

11

Shape memory polymers and shape memory  alloys: use in smart textiles

Shape memory polymers and shape memory alloys: use in smart textiles

... shape memory fiber with human ...shape memory effect fabrics in biological and medical ...shape memory fabrics in medical textiles, corselets were ...shape memory polymers in medical area as ...

7

The effect of photofit type faces on recognition memory : a thesis presented in partial fulfillment of the requirement for the degree of Master of Arts in psychology at Massey University

The effect of photofit type faces on recognition memory : a thesis presented in partial fulfillment of the requirement for the degree of Master of Arts in psychology at Massey University

... Two attempts were made to replicate the results of Ellis, Davies, and Shepherd 1978 who showed that the addition of simulated photofit lines and randomly placed lines on photographs of f[r] ...

13

The effect of photofit type faces on recognition memory : a thesis presented in partial fulfillment of the requirement for the degree of Master of Arts in psychology at Massey University

The effect of photofit type faces on recognition memory : a thesis presented in partial fulfillment of the requirement for the degree of Master of Arts in psychology at Massey University

... The three measures most frequently used are hits the proportion of "target" responses for faces previously seen in the study phase, false alarms the proportion of "target" responses for [r] ...

85

Chap5   IEEE 802 pdf

Chap5 IEEE 802 pdf

... (iii) UV Erasable Programmable ROM (UV EPROM) Both the manufacturing process and characteristics of this memory are completely identical to OTP ROM. It enables data to be erased under strong ultraviolet light. ...

9

3705 80 ALD Vol 44 MM pdf

3705 80 ALD Vol 44 MM pdf

... TITLE BINDER TAB VOL 44 MEMORY MEtlORY tlEMORY HENORY I1HlORY MEtlORY tlEtlORY MEtlORY HEMORY MEMORY MEMORY MEtlORY MEtlORY MEN:JRY 1'1EtlORY MEMORY MEt:ORY MEMORY MEMORY f'tEMOIH MEMORY[r] ...

49

Requirement Analysis

Requirement Analysis

... number of independent investigators have developed a team-oriented approach to requirements gathering that is applied during early stages of analysis and specification. C[r] ...

95

Static Load Balancing Technique for Geographically Partitioned Public Cloud

Static Load Balancing Technique for Geographically Partitioned Public Cloud

... 1. Introduction. Cloud Computing has the potential to affect a large part of IT industry. Nowadays, developers need not to concern about the over-provisioning or under-provisioning of resources. Elasticity of resources ...

17

OFDM System Implementation in DSP Platform TMS320C6678

OFDM System Implementation in DSP Platform TMS320C6678

... The Orthogonal Frequency Division Multiplexing (OFDM) system is already used in commercial applications and is capable to deal with Intersymbolic Interference (ISI) caused by multipath channels. This system gained ...

12

Induction and requirement of gene expression in the anterior cingulate cortex and medial prefrontal cortex for the consolidation of inhibitory avoidance memory

Induction and requirement of gene expression in the anterior cingulate cortex and medial prefrontal cortex for the consolidation of inhibitory avoidance memory

... fear memory. For example, the mPFC modulates the encoding of fear memory via dopamine transmission within the mPFC [56] and the mPFC modulates the consolidation of IA memory by interacting with the ...

11

Online Restaurant Management System

Online Restaurant Management System

... TABLE TITLE 2.1 2.2 Software Requirement For Development Tool Software Requirement For Operating System / Web Server Software Requirement For Database System Hardware Requirement Other R[r] ...

24

IMPLEMENTATION OF ALGORITHM OUTPUT GRANULARITY APPROACH IN CLUSTERING ALGORITHM FOR MOBILE DATA STREAM MINING

IMPLEMENTATION OF ALGORITHM OUTPUT GRANULARITY APPROACH IN CLUSTERING ALGORITHM FOR MOBILE DATA STREAM MINING

... remaining memory then swapping of Memory content begins to secondary ...main memory which will take less time to fill main ...of memory content of main memory should be swapped to ...

13

NEW MODEL TRANSFORMATION USING REQUIREMENT TRACEBILITY FROM REQUIREMENT TO UML 
BEHAVIORAL DESIGN

NEW MODEL TRANSFORMATION USING REQUIREMENT TRACEBILITY FROM REQUIREMENT TO UML BEHAVIORAL DESIGN

... HEED protocol is a distributed single-hop clustering routing protocol for Wireless Sensor Networks, in which selecting CHs based on both residual energy of each node and communication co[r] ...

16

NEW MODEL TRANSFORMATION USING REQUIREMENT TRACEBILITY FROM REQUIREMENT TO UML 
BEHAVIORAL DESIGN

NEW MODEL TRANSFORMATION USING REQUIREMENT TRACEBILITY FROM REQUIREMENT TO UML BEHAVIORAL DESIGN

... The new method performs inverse halftoning by first inverting the model-specified convolution operator and then attenuating the residual colored noise using scalar shearlet shrinkage.. A[r] ...

5

Show all 10000 documents...

Related subjects