559 research outputs found

    Memristor Crossbar-based Hardware Implementation of IDS Method

    Full text link
    Ink Drop Spread (IDS) is the engine of Active Learning Method (ALM), which is the methodology of soft computing. IDS, as a pattern-based processing unit, extracts useful information from a system subjected to modeling. In spite of its excellent potential in solving problems such as classification and modeling compared to other soft computing tools, finding its simple and fast hardware implementation is still a challenge. This paper describes a new hardware implementation of IDS method based on the memristor crossbar structure. In addition of simplicity, being completely real-time, having low latency and the ability to continue working after the occurrence of power breakdown are some of the advantages of our proposed circuit.Comment: 16 pages, 13 figures, Submitted to IEEE Transaction on Fuzzy System

    Beylik Dönemi Ahşap Sanatı Şaheserlerinden Birgi Ulu Camii Pencere Kapakları

    Get PDF
    [No Abstract Available

    Data as Infrastructure

    Get PDF
    Publisher PD

    Data As Infrastructure

    Get PDF
    The National Infrastructure Commission appointed Dr Peter Kawalek (Director of the Centre for Information Management at Loughborough University) and Ali Bayat (Alliance Manchester Business School at the University of Manchester) to explore the case for considering data as Infrastructure. This was one of four pieces of external research commissioned to support the Commission’s study, Data for the Public Good

    Analysis of Insect-Plant Interactions Affected by Mining Operations, A Graph Mining Approach

    Full text link
    The decline in ecological connections signifies the potential extinction of species, which can be attributed to disruptions and alterations. The decrease in interconnections among species reflects their susceptibility to changes. For example, certain insects and plants that rely on exclusive interactions with a limited number of species, or even a specific species, face the risk of extinction if they lose these crucial connections. Currently, mining activities pose significant harm to natural ecosystems, resulting in various adverse environmental impacts. In this study, we utilized network science techniques to analyze the ecosystem in a graph-based structure, aiming to conserve the ecosystem affected by mining operations in the northern region of Scotland. The research encompasses identifying the most vital members of the network, establishing criteria for identifying communities within the network, comparing, and evaluating them, using models to predict secondary extinctions that occur when a species is removed from the network, and assessing the extent of network damage. Our study's novelty is utilizing network science approaches to investigate the biological data related to interactions between insects and plants.Comment: 9 pages, 16 figure

    Cultural foundations of corporate control: an empirical enquiry [Abstract]

    Get PDF
    Cultural foundations of corporate control: an empirical enquir
    corecore