نتایج جستجو برای: critical pathways

تعداد نتایج: 704246  

2007
Milind M. Buddhikot Sanjay Kapoor Gurudatta M. Parulkar

Asynchronous transfer mode (ATM) networks can support a wide variety of applications with varying data rates. Fiber Distributed Data Interface (FDDI) networks are targeted to support similar applications, but only in a LAN environment. Both of these networks are characterized by high data rates and low error rates. In addition, they can provide applications with varying degrees of performance g...

2014
Sateesh Kumar

The FFT processor is a critical block in all multi-carrier systems used primarily in the mobile environment. The portability requirement of these systems is mainly responsible for the need of low power FFT architectures. In this study, an efficient addressing scheme for radix-4 64 point FFT processor is presented. It avoids the modulo-r addition in the address generation; hence, the critical pa...

2015
Pardha Saradhi N. Ravi Shankar

In the present paper, Characteristics of fuzzy project network using statistical data are discussed in detail in order to calculate the fuzzy critical path, fuzzy earliest times, fuzzy latest times and fuzzy total float. Fuzzy number as fuzzy activity time is constructed using interval estimate by calculating mean, variance and standard error. A new ranking function is used to discriminate the ...

Journal: :IEEE transactions on systems, man, and cybernetics. Part B, Cybernetics : a publication of the IEEE Systems, Man, and Cybernetics Society 2002
Stefan Chanas Didier Dubois Pawel Zielinski

The notion of the necessary criticality (both with respect to path and to activity) of a network with imprecisely defined (by means of intervals or fuzzy intervals) activity duration times is introduced and analyzed. It is shown, in the interval case, that both the problem of asserting whether a given path is necessarily critical and the problem of determining an arbitrary necessarily critical ...

1998
E. Saez J. Villalba J. Hormigo F. J. Quiles J. I. Benavides E. L. Zapata

In this paper we present the FPGA implementation of a new word{serial CORDIC processor working with variable precision. It has been designed in such a way that it allows us to take advantage of the successive shifts in the coordinates involved in the CORDIC algorithm. This signiicatively reduces the total number of cycles required. Special attention has been paid to the design of the critical p...

2004
Jérémie Detrey Florent de Dinechin

This paper presents a new scheme for the hardware evaluation of elementary functions, based on a piecewise second order minimax approximation. The novelty is that this evaluation requires only one small rectangular multiplication. Therefore the resulting architecture combines a small table size, thanks to second-order evaluation, with a short critical path: Consisting of one table lookup, the r...

2010
N. Ravi Shankar K. Surya Narayana Rao V. Sireesha Ravi Shankar

The traditional PERT (Program Evaluation and Review Technique) model uses beta distribution as the distribution of activity duration and estimates the mean and the variance of activity duration using “pessimistic”, “most likely” and “optimistic” time estimates proposed by an expert. In the past several authors have modified the original PERT estimators to improve the accuracy. In this paper, on...

1994

the above equation, we can see that we will get the best performance if we choose a blocking factor that is a multiple of 3. In general, the theorem implies that there are only blocking factors to consider; this characterizes the critical path for all unfoldings greater than. In this paper, we have developed a formulation for the problem of finding optimal blocking factors for blocked, non-over...

2014
K. Usha Madhuri N. Ravi Shankar Ravi Shankar

In a fuzzy project network, the higher risk path is called possible critical path. Secondary critical path is one of the possible critical path in fuzzy project network and it plays an important role in the project scheduling, risk analysis and time-cost trade-off problems in fuzzy environment. In this paper, triangular fuzzy numbers are used to express the operation times for all activities in...

2012
David Defour

This paper addresses the issue of collapsing dependent floatingpoint operations. The presentation focuses on studying the dataflow graph of benchmark involving a large number of floating-point instructions. In particular, it focuses on the relevance of new floating-point operators performing two dependent operations which are similar to “fused multiply and add”. Finally, this paper examines the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید