Fault tolerant logic element-ftlut FPGA
The essence of using a functionally complete tolerant elements. Comparison of the exponential reliability functional performance. Rating and characteristic tree of the transmitting transistors. Description of redundancy of the transmitting transistors.
Подобные документы
??????????? ????????????? ??????????? ????????: ???????? ????????? ?????????????? ??????????? ? ???????, ??????????? ??????, ???????? ??????? ??????????? ???????????. ???????? ??????? ????????? ??????????? ?????? ??? ?????? ????????? Fuzzy Logic Toolbox.
???????????, добавлен 18.06.2018????????? ? ?????????? ???????? ?????? ?????? ???????????? ????????????, ??????????????? ??????? ??????????? ??????? ???????????? ??????????. ?????????? ??????? ????????????? ????????????? Matlab ?? ?????? ??????? Simulink ? Fuzzy Logic Toolbox.
??????, добавлен 27.02.2019????? ?????????? ??????? (????????????? ??????). ???????? ???? ????????????? ?????????????. ?????????????? ??????????? ??????????????? ????????????? ????????????? AnyLogic. ?????????? ???????????? ?????? ?????????????? ?????????? ?????? ? ????? AnyLogic.
????????? ??????, добавлен 07.08.2018Extremalization functional object as the calculus of variations. Difficulties solution of variational problems. Using nonlinear compromise scheme on the basis of rational organization to address this multi-task. Examples of these mathematical models.
??????, добавлен 29.07.2016The design of a von Neumann architecture machine. A stored-program digital computer. Development of the stored-program concept. Early von Neumann-architecture computers. Von Neumann bottleneck. Features of Von Neumann Architecture. Arithmetic Logic Unit.
???????????, добавлен 25.10.2017The model and structure of the intrusion detection system, which is built on the basis of immunological principles. Detecting the network traffic status. The decision rules for the classification of States of network traffic of a computer network.
??????, добавлен 24.03.2016Structure and functions of the computer. General characteristics and capabilities of the operating system Windows XP, its member programs and functional features. Structure and principles of programming in C ++ Builder IDE, evaluation of results.
???? ??????, добавлен 11.10.2014?????????? ???????? ?????????? ?? ???????????????????. ??????? ?????????????????? - Performance Counters. ????????????? ???????? ???????? ?????? ???????. ???????? ?????? ??????????? ????????? ?????. ?????? ? ???????????? ?? ?????? ??????? ????????????.
???????????, добавлен 06.08.2014Auction and contract networks as coordination mechanisms in multi-agent systems based on Foundation for Intelligent Physical Agents protocols. Structural elements of mechanisms in the socio-economic and political contexts of the use in cybersecurity.
??????, добавлен 09.09.2021Privacy and Authentication in program. The random Number Generation. Message-Authentication Code Algorithms. Encrypt and Authenticate Modes. Goals of Public Key Cryptography. The process optimize 32-Bit Implementation. Performance of the Small Variant.
?????, добавлен 08.03.2014A flexible system troubleshooting and emergency operation of stepwise refinement priori probability. Ensuring reliability recognition of failure. Automatic search of breaks with step-by-step variations of parameters of tests in communication systems.
??????, добавлен 30.07.2016???????? ???????? ? ??????? ? ?? ??????? ?? ????????? SAP Business Planning and Consolidation on SAP Business Warehouse. ?????? ?????? ??????? ????????????. ?????? ? ?????? ??????????? ?????? ?????? ?? ?????? SAP High-Performance Analytical Appliance.
???????? ??????, добавлен 10.06.2015The use of mobile smart tools - a factor that contributes to the introduction of the remote control method and smooth adjustment of key parameters of the diagnostic process. Components of a software package for determining a person's visual fatigue.
??????, добавлен 21.12.2021Consideration of book presentsways, him ?????????????? in statistical models on the different levels of analysis, successive theoretical structure that places the models of lids as decision elements in a race between a steganography and steganalysis.
??????? ???????, добавлен 08.03.2014- 115. Funds of the library
Research and characteristic of the main features of the recommender system is knowledge-based recommendation. Acquaintance with the advantages and disadvantages of english wikipedia model, which is the most appropriate model for the topic recommender.
???????? ??????, добавлен 25.06.2017 The concept of e-learning, its advantages, flexibility of time and place in comparison with formal learning. Creation of a hybrid information system that integrates computer vision and machine learning technologies for visual and interactive systems.
??????, добавлен 10.05.2018- 117. Algorithms of selection of essential features of signals, which are invariant to move and rotation
Development of the mathematical model of invariant image processing in the visual system. The principles of constructing a functional that reaches a maximum when the values of the transformations are equal to the hidden transformations of the signal.
??????, добавлен 22.12.2016 Automation of the process of keeping a diary and converting it into digital form. Software solutions that allow the user to systematize their hobby experience and find something new for themselves. Evaluation of the functionality of compared systems.
??????, добавлен 19.03.2024Discuss and characteristic ways of hermeneutical assistance in studying. Explaining hermeneutics as a mind understanding method of humanitarian manifestations, texts and techniques, their meaning and their applications in modern educational process.
??????, добавлен 29.04.2019Mathematical model of transformation of stochastic and fuzzy information in quantum information in the form of multiplication of unitary operators from not commutative von Neumann group. Theoretical basis of information technologies of quantum-logic.
??????, добавлен 29.01.2016- 121. Cache Memory
Memory Hierarchy. Internal or Main memory. Time between presenting the address and getting the valid data. Physical arrangement of bits into words. Cache Read Operation. Typical Cache Organization. Comparison of Cache Sizes. Direct Mapping Cache.
???????????, добавлен 03.06.2012 The use of the NRL Protocol Analyzer and Gavin Lowe’s use of the model checker FDR to analyze the Needham-Schroeder public key protocol. This is used as a basis to compare and contrast the two systems and out possible future directions for research.
??????, добавлен 15.09.2012General characteristics of the comparator model of text correspondence and objective situations described by them. Acquaintance with the most important tasks of the theory of intelligence. Analysis of functional and target models of intellectual activity.
??????, добавлен 11.10.2018Analysis of various methods and strategies for scaling the fintech API to solve the problems of financial applications. The principles of distributing traffic between multiple servers to improve their performance. Asynchronous data processing methods.
??????, добавлен 14.12.2024Study of the influence of communication technologies on the emotional and mental state of a person. Regularities of the relationship between the sender and the recipient of information. The role of language, text and virtual figures in intercourse.
??????, добавлен 08.01.2024