首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
Speed and complexity of a reverse converter are two important factors that affect the performance of a residue number system. In this paper, two efficient reverse converters are proposed for the 4-moduli sets {2 \(^{2n-1}-1\) , 2 \(^{n}\) , 2 \(^{n}+1\) , 2 \(^{n}-1\) } and {2 \(^{2n-1}\) , 2 \(^{2n-1}-1\) , 2 \(^{n}+1\) , 2 \(^{n}-1\) } with 5 \(n\) -bit and 6 \(n\) -bit dynamic range, respectively. The proposed reverse converter for moduli set {2 \(^{2n-1}-1\) , 2 \(^{n}\) , 2 \(^{n}+1\) , 2 \(^{n}-1\) } has been designed based on CRT and New CRT-I algorithms and in two-level structure. Also, an efficient reverse converter for moduli set {2 \(^{2n-1}\) , 2 \(^{2n-1}-1\) , 2 \(^{n}+1\) , 2 \(^{n}-1\) } has been designed by applying New CRT-I algorithm. The proposed reverse converters are based on adders and hence can be simply implemented by VLSI circuit technology. The proposed reverse converters offer less delay and hardware cost when compared with the recently introduced reverse converters for the moduli sets {2 \(^{n}+1\) , 2 \(^{n}-1\) ,2 \(^{n}\) , 2 \(^{2n+1}-1\) } and {2 \(^{n}+1\) , 2 \(^{n}-1\) , 2 \(^{2n}\) , 2 \(^{2n+1}-1\) }.  相似文献   

2.
Broadcast is a fundamental operation in wireless sensor networks (WSNs). Given a source node with a packet to broadcast, the aim is to propagate the packet to all nodes in a collision free manner whilst incurring minimum latency. This problem, called minimum latency broadcast scheduling (MLBS), has been studied extensively in wireless ad-hoc networks whereby nodes remain on all the time, and has been shown to be NP-hard. However, only a few studies have addressed this problem in the context of duty-cycled WSNs. In these WSNs, nodes do not wake-up simultaneously, and hence, not all neighbors of a transmitting node will receive a broadcast packet at the same time. Unfortunately, the problem remains NP-hard and multiple transmissions may be necessary due to different wake-up times. Henceforth, this paper considers MLBS in duty cycled WSNs and presents two approximation algorithms, BS-1 and BS-2, that produce a maximum latency of at most \((\Delta -1) TH\) and \(13TH\) respectively. Here, \(\Delta\) is the maximum degree of nodes, \(T\) denotes the number of time slots in a scheduling period, and \(H\) is the broadcast latency lower bound obtained from the shortest path algorithm. We evaluated our algorithms under different network configurations and confirmed that the latencies achieved by our algorithms are much lower than existing schemes. In particular, compared to OTAB, the best broadcast scheduling algorithm to date, the broadcast latency and transmission times achieved by BS-1 is at least \(\frac{1}{17}\) and \(\frac{2}{5}\) that of OTAB respectively.  相似文献   

3.
This paper presents bit error rate (BER) analysis of wireless sensor networks (WSNs) consisting of sensor nodes based on an IEEE 802.15.4 RF transceiver. Closed-form expressions for BER are obtained for WSNs operating over AWGN, Rayleigh and Nakagami-m fading channels. For the purpose of analysis, we consider an IEEE 802.15.4 RF transceiver using direct sequence spread spectrum-offset quadrature phase shift keying (DSSS-OQPSK) modulation under 2.4 GHz frequency band in a WSN. Analytical expressions for BER are derived for a wireless link between sensor nodes that act as a transmitter unit and a base station without considering the effect of interferers in the wireless environment. Numerical results for BER are obtained by varying the IEEE 802.15.4 standard specific physical layer parameters, such as number of bits used to represent a Zigbee symbol, number of modulation levels used in an OQPSK modulator, and various values of Rayleigh and Nakagami-m fading parameters, denoted as \(\alpha \) and \(m\) , respectively. Moreover, optimum values of physical layer parameters are identified for improved system performance. It is found that error performance analysis of WSN shows improvement when lower number of bits is used to represent a Zigbee symbol. Specifically, under a Rayleigh fading channel which reflects a real-time WSN environment, the network exhibits better performance only when it is operated at high SNR values, i.e., BER of order \(10^{-2}\) is achieved when SNR lies in the range 5–15 dB. Also, the effect of fading parameters on network performance shows that better results are obtained for higher values of \(\alpha \) and \(m\) for Rayleigh and Nakagami-m fading channels, respectively.  相似文献   

4.
In this work, we study the $N$ th best relay selection schemes with the consideration that in some case the best relay is unavailable due to the restriction of practical implementation. With amplify-and-forward relaying protocols, the interested $N$ th best relay schemes are investigated over independent and non-identically distributed (i.ni.d) Nakagami- $m$ fading channels. For such opportunistic relaying schemes, we first obtain the closed-form expressions to the probability density function (PDF) and cumulative distribution function (CDF) of the instantaneous end-to-end signal-to-noise ratio with appropriate mathematical proof. Then, with the obtained CDF and PDF, three main measurements are investigated as well as the corresponding explicit solutions, $i.e.$ , outage probability, average symbol error ratio (SER), and ergodic capacity. At the same time, as a byproduct, the corresponding performance metrics over Rayleigh fading are also derived. Finally, the detailed performance comparison analyses are presented under different values of $N$ and different Nakagami- $m$ channel fading severity parameters. The numerical results show that the increase of $N$ incurs the very severe loss in performance such outage probability, SER, and ergodic capacity. However, the loss in performance can be decreased greatly when the $N$ th systems have bigger fading severity factors. The derivations are of significance because the Nakagami- $m$ fading spans via the fading severity parameters a wide range of fading scenarios that are typical in realistic wireless relay networks.  相似文献   

5.
The routing and wavelength assignment (RWA) problem, known to be an NP-complete problem, seeks to optimally establish routes and adequate wavelengths for the requested connections according to an objective function. This paper presents the use of a novel approach based on a differential evolution (DE) algorithm to the RWA problem in wavelength-routed dense division multiplexing (DWDM) optical networks. The proposed DE-RWA algorithm is modeled to optimize not only the network wavelength requirement ( $ NWR $ , which is the minimum number of wavelengths needed to fulfill traffic demand) but also the average path length ( $ APL $ ). We present the impact of the control parameters of the DE algorithm on the improvement of system’s performance. Additionally, we present two strategies to improve the efficiency of the algorithm, knowing as the disjoint cut-set paths (DCS-P) algorithm and the use of a random mutation ( $ random -M$ ) parameter for DE. The proposed approach is evaluated for test bench optical networks with up to 40 nodes. Experiments show that the DE-RWA algorithm obtains results that equal the $ NWR $ lower bound for networks with and without wavelength conversion capability, whereas reduce the $ APL $ . The performance of the DE-based approach is compared against results obtained with the particle swarm optimization (PSO) and genetic algorithm (GA) models, showing that the DE-RWA outperform those algorithms. The presented DE-RWA model is simple to implement and could also be extended by adding other features such as impairment-aware, energy efficient, survivability among others in optical networks.  相似文献   

6.
The multiplication of two signed inputs, \(A {\times } B\) , can be accelerated by using the iterative Booth algorithm. Although high radix multipliers require summing a smaller number of partial products, and consume less power, its performance is restricted by the generation of the required hard multiples of B ( \(\pm \phi B\) terms). Mixed radix architectures are presented herein as a method to exploit the use of several radices. In order to implement efficient multipliers, we propose to overlap the computation of the \(\pm \phi B\) terms for higher radices with the addition of the partial products associated to lower radices. Two approaches are presented which have different advantages, namely a combinatory design and a synchronous design. The best solutions for the combinatory mixed radix multiplier for \(64\times 64\) bits require \(8.78\) and \(6.55~\%\) less area and delay in comparison to its counterpart radix-4 multiplier, whereas the synchronous solution for \(64\times 64\) bits is almost \(4{\times }\) smaller in comparison with the combinatory solution, although at the cost of about \(5.3{\times }\) slowdown. Moreover, we propose to extend this technique to further improve the multipliers for residue number systems. Experimental results demonstrate that best proposed modulo \(2^{n}{-}1\) and \(2^{n}{+}1\) multiplier designs for the same width, \(64{\times }64\) bits, provide an Area-Delay-Product similar for the case of the combinatory approach and \(20~\%\) reduction for the synchronous design, when compared to their respective counterpart radix-4 solutions.  相似文献   

7.
Log-domain Delta-Sigma ( $\Delta \Sigma$ ) modulators are attractive for implementing analog-to-digital (A/D) converters (ADCs) targeting low-power low-voltage applications. Previously reported log-domain $\Delta \Sigma$ modulators were limited to 1-bit quantization and, hence, could not benefit from the advantages associated with multibit quantization (namely, reduced in-band quantization noise, and increased modulator stability). Unlike classical $\Delta \Sigma$ modulators, directly extending a log-domain $\Delta \Sigma$ modulator with a 1-bit quantizer to a log-domain $\Delta \Sigma$ modulator with a multibit quantizer is challenging, in terms of CMOS circuit implementation. Additionally, the realization of log-domain $\Delta \Sigma$ modulators targeting high-resolution applications necessitates minimization of distortion and noise in the log-domain loop-filter. This paper discusses the challenges of multibit quantization and digital-to-analog (D/A) conversion in the log-domain, and presents a novel multibit log-domain $\Delta \Sigma$ modulator, practical for CMOS implementation. SIMULINK models of log-domain $\Delta \Sigma$ modulator circuits are proposed, and the effects of various circuit non-idealities are investigated, including the effects of log-domain compression–expansion mismatch. Furthermore, this paper proposes novel low-distortion log-domain analog blocks suitable for high-resolution analog-to-digital (A/D) conversion applications. Circuit simulation results of a proposed third-order 3-bit class AB log-domain $\Delta \Sigma$ loop-filter demonstrate 10.4-bit signal-to-noise-and-distortion-ratio (SNDR) over a 10 kHz bandwidth with a $0.84\,V_{pp}$ differential signal input, while operating from a 0.8 V supply and consuming a total power of $35.5\,\upmu \hbox {W}.$   相似文献   

8.
In this paper, by taking multiple-time information in blocks into the coding of linear block codes, a new class of (2 \(k\) , \(k\) , 2) convolutional codes is constructed, by which a new way of constructing long codes with short ones is obtained. After that, the type of embedded codes is determined and the optimal values of the linear combination coefficients are derived by using a three-dimensional state transfer matrix to analyze and testify the constructing mechanism of the codes. Finally, the simulation experiment tests the error-correcting performance of the (2 \(k\) , \(k\) , 2) convolutional codes for different value of \(k\) , it is shown that the performance of the new convolutional codes compares favorably with that of traditional (2, 1, \(l\) ) convolutional codes.  相似文献   

9.
In this paper, the multiclass downlink capacity and the interference statistics of the sectors of a cigar-shaped microcells using wideband code-division multiple-access with soft handover mode are analyzed. The two-slope propagation model with log-normal shadowing is used in the analysis where a model of 8 cigar-shaped microcells is utilized. The performance of the downlink is studied for different [sector range R, standard deviation of the shadowing ( $\sigma _{1}$ and $\sigma _{2})$ and propagation exponents ( $\text{ s}_{1}$ and $\text{ s}_{2})$ ]. It is found that increasing the sector range from 500 to 1,000 m will increase the sector downlink capacity. Also, it is found that increasing the value of the propagation parameters ( $\sigma _{1}$ and $\sigma _{2})$ will reduce the downlink sector capacity. It is noticed that, the effect of changing the propagation exponent $\text{ s}_{1}$ is null while increasing the propagation exponent $\text{ s}_{2}$ will increase the downlink capacity.  相似文献   

10.
These days most of the research work in the area of filter-antenna design is focused on having high quality factor for certain frequency band. These type of filter-antennas are difficult to design as the design engineers are required to have low quality factor for the radiating band of frequency. Hence a precise value of $Q$ -factor is required to understand the radiating and filtering properties of filter-antennas. Filter-antennas are single port devices as the second port is considered as radiating port. Return loss is used, in order to yield $Q$ -factor through calculations for such devices. However, the conventional method for calculating $Q$ -factor found to be inaccurate in most of the low $Q$ -factor cases. This paper proposes a method that out performs the conventional method of calculating $Q$ -factor. Non-ideal fabrication process is also discussed for accurate evaluation of $Q$ -factor. Experimental results show that proposed method can be employed to calculate $Q$ -factor with reasonable accuracy for simulated and measured results.  相似文献   

11.
Mobile phones with embedded sensors have been applied in various collaborative sensing applications. To encourage mobile phone users to perform collaborative sensing, the data demanders usually pay mobile phone users for required data. In this paper, we study the Minimum Payment of Attaining the Required Data with mobile phones (MPARD) problem in collaborative sensing network: given sensing regions \(R = \{R_1, R_2, \ldots , R_m\}\) , the set of requisite data \(D_i\) for each sensing region \(R_i\) and a set of mobile phones \(M\) , the \(MPARD\) problem studies how to select mobile phones to obtain all the required data such that the data demanders’ total payment to mobile phone users is minimized. In reality, some systems need the fresh sensing data from mobile phones at each pre-determined time slot, and others don’t require the real-time data and the sensing data from previous time slots is also deemed useful. Based on the above two different requirements of data timeliness, we first define two subproblems derived from \(MPARD\) problem: \(MPARD_t\) and \(MPARD_p\) . After that, for each subproblem, we propose an approximation algorithm for the situation where the trajectories of mobile phones are determinate and a heuristic for the situation where trajectories are unknown. Simulation results demonstrate that our algorithms are efficient.  相似文献   

12.
In this paper, the downlink signal-to-interference-plus-noise ratio (SINR) performance in multiuser large scale antenna systems with matched filter (MF) and regularized zero-forcing (RZF) precoding is investigated. The probability density function (PDF) for MF is derived and the distribution in high signal-to-noise ratio (SNR) regime is studied. Results indicate that the PDF of downlink SINR for MF converges to \(\mathcal F\) distribution when the interference is dominant over noise. For MF, the asymptotic SINR is just the reciprocal of the ratio of the number of users \(U\) to the number of transmit antennas \(N\) , and is irrelevant to the average transmit power when \(N\) and \(U\) grow with fixed ratio. However, when \(U\) is a large constant, the transmit power could be proportional to \(\ln N \big /N \) to maintain a specified quality of service, as a result of the large scale antenna system effect. In addition, the closed form of asymptotic SINR for RZF is derived by solving two mathematical expectations related to eigenvalues of large dimensional random matrices. Simulation results validate the derived PDF and analytical results.  相似文献   

13.
In order to protect a wireless sensor network and an RFID system against wormhole and relay attacks respectively, distance bounding protocols are suggested for the past decade. In these protocols, a verifier authenticates a user as well as estimating an upper bound for the physical distance between the user and itself. Recently, distance bounding protocols, each with a mutual authentication, are proposed to increase the security level for such systems. They are also suggested to be deployed for key agreement protocols in a short-range wireless communication system to prevent Man-in-the-Middle attack. In this paper, a new mutual distance bounding protocol called NMDB is proposed with two security parameters ( \(n\) and \(t\) ). The parameter \(n\) denotes the number of iterations in an execution of the protocol and the parameter \(t\) presents the number of errors acceptable by the verifier during \(n\) iterations. This novel protocol is implementable in a noisy wireless environment without requiring final confirmation message. Moreover, it is shown that, how this protocol can be employed for the key agreement procedures to resist against Man-in-the-Middle attack. NMDB is also analyzed in a noisy environment to compute the success probability of attackers and the rejection probability of a valid user due to channel errors. The analytically obtained results show that, with the proper selection of the security parameters ( \(n\) and \(t\) ) in a known noisy environment, NMDB provides an appropriate security level with a reliable performance.  相似文献   

14.
In this paper, we propose novel lower and upper bounds on the average symbol error rate (SER) of the dual-branch maximal-ratio combining and equal-gain combining diversity receivers assuming independent branches. \(M\) -ary pulse amplitude modulation and \(M\) -ary phase shift keying schemes are employed and operation over the \(\alpha -\mu \) fading channel is assumed. The proposed bounds are given in closed form and are very simple to calculate as they are composed of a double finite summation of basic functions that are readily available in the commercial software packages. Furthermore, the proposed bounds are valid for any combination of the parameters \(\alpha \) and \(\mu \) as well as \(M\) . Numerical results presented show that the proposed bounds are very tight when compared to the exact SER obtained via performing the exact integrations numerically making them an attractive much simpler alternative for SER evaluation studies.  相似文献   

15.
As there are many use cases considered for robotics communications, the data rate variation may be very large. Some sensor applications may require very low data rate, telemetry data may require low-to-medium data rates and e.g. video application will require high data rates. On the other hand, robots may have to operate in very difficult radio propagation environments such as nuclear power plants or industrial facilities. To combat difficult propagation characteristics, an often used and well known mechanism is to use spread spectrum signal structures. Thus in this paper a novel modulation method is considered which offers the inherent signal structure and processing opportunities of spread spectrum signal and at the same time offers an easy mechanism to adapt the data rate from low to high depending on the requirement at hand thus addressing two important communication requirements for robotics. The introduction of $m$ MFSK generated the idea of applying the given approach to other modulation methods. To further enlarge the modulation alphabet sizes (with the price of larger spectrum usage) it was realized that combining the $m$ MFSK and $m$ MCSK would be an interesting choice. The $m$ MCSK– $m$ MFSK modulation is hence considered. A method to analyze this two-component modulation is developed and the performance analyses give results for $m$ MCSK– $m$ MFSK modulation in AWGN and flat Rayleigh fading channels for both coherent and non-coherent receivers. The performance was also assessed with orthogonal and non-orthogonal code constructs for coherent receiver.  相似文献   

16.
Ternary content addressable memories (TCAMs) perform high-speed search operation in a deterministic time. However, when compared with static random access memories (SRAMs), TCAMs suffer from certain limitations such as low-storage density, relatively slow access time, low scalability, complex circuitry, and higher cost. One fundamental question is that can we utilize SRAM to combine it with additional logic to achieve the TCAM functionality? This paper proposes an efficient memory architecture, called E-TCAM, which emulates the TCAM functionality with SRAM. E-TCAM logically divides the classical TCAM table along columns and rows into hybrid TCAM subtables and then maps them to their corresponding memory blocks. During search operation, the memory blocks are accessed by their corresponding subwords of the input word and a match address is produced. An example design of \(512\times 36\) of E-TCAM has been successfully implemented on Xilinx Virtex- \(5\) , Virtex- \(6\) , and Virtex- \(7\) field-programmable gate arrays (FPGAs). FPGA implementation results show that E-TCAM obtains \(33.33\)  % reduction in block-RAMs, \(71.07\)  % in slice registers, \(77.16\)  % in lookup tables, \(53.54\)  % in energy/bit/search, and offers \(63.03\)  % improvement in speed, compared with the best available SRAM-based TCAM designs.  相似文献   

17.
Secure communication has become more and more important for many modern communication applications. In a secure communication, every pair of users need to have a secure communication channel (each channel is controlled by a server) In this paper, using monotone span programs we devise an ideal linear multi-secret sharing scheme based on connectivity of graphs. In our proposed scheme, we assume that every pair of users, \(p\) and \(q\) , use the secret key \(s_{pq} \) to communicate with each other and every server has a secret share such that a set of servers can recover \(s_{pq} \) if the channels controlled by the servers in this set can connect users, \(p\) and \(q\) . The multi-secret sharing scheme can provide efficiency for key management. We also prove that the proposed scheme satisfies the definition of a perfect multi-secret sharing scheme. Our proposed scheme is desirable for secure and efficient secure communications.  相似文献   

18.
A 5 GHz transformer-feedback power oscillator with novel frequency modulation (FM) up to 10 MHz is presented in this paper. The novel FM is achieved by a CMOS transistor between transformer and ground, which is designed for varying the equivalent inductance and mutual inductance of the transformer and shows no DC connection with the oscillation circuit. The major frequency tuning is realized by the variable capacitor which is controlled by a phase lock loop. The RF VCO with 210 MHz tuning range operates in class-E mode to achieve a cost-effective transmitter, which demonstrates a high DC-to-RF conversion efficiency of 39 %. A RF power of 15.1 dBm and phase noise better than \(-\) 109 dBc/Hz @ 100 kHz from the central frequency of 5.5 GHz is obtained with the biasing conditions V \(_\mathrm{ds}\) = 1.8 V and V \(_\mathrm{gs}\) = 0.65 V. The VCO also demonstrates an ultra-low voltage operation capability: with V \(_\mathrm{ds}\) = V \(_\mathrm{gs}\) = 0.6 V and DC power consumption of 9 mW, the output power is 4.5 dBm and the phase noise better than \(-\) 93 dBc/Hz @ 100 kHz. The die size of the transformer-feedback power oscillator is only \(0.4\times 0.6\) mm \(^{2}\) .  相似文献   

19.
In this paper, we consider the Hybrid Decode–Amplify–Forward protocol with the \(n\) th best-relay selection scheme. In the best-relay selection scheme, the best relay only forwards the source signal to the destination, regardless of working in the Amplify-and-Forward mode or the Decode-and-Forward mode. However, the best relay might be unavailable due to some reasons; hence we might bring into play the second, third or generally the \(n\) th best relay. We derive closed-form expression for the outage probability using the probability density function and moment generating function of the signal-to-noise ratio of the relayed signal at the destination node. Results show that with the \(n\) th best relay the diversity order is equal to \((m-n+2)\) where \(m\) is the number of relays. Simulation results are also given to verify the analytical results.  相似文献   

20.
In this paper we consider the problem of distributed fault diagnosis in Wireless Sensor Networks (WSNs). The proposed Fault Diagnosis Algorithm (FDA) aims to handle both permanent and intermittent faults. The sensor nodes with permanent communication faults can be diagnosed by using the conventional time-out mechanism. In contrast, it is difficult to detect intermittent faults due to their inherent unpredictable behavior. The FDA is based on the comparison of sensor measurements and residual energy values of neighboring sensor nodes, exploiting their spatial correlations. To handle intermittent faults, the comparisons are made for \(r\) rounds. Two special cases of intermittent faults are considered: one, when an intermittently faulty node sends similar sensor measurement and similar residual energy value to some of its neighbors in all \(r\) rounds; another, when it sends these values, either or both of which deviates significantly from that of some neighbors in all \(r\) rounds. Through extensive simulation and analysis, the proposed scheme is proved to be correct, complete, and efficient to handle intermittent faults and hence, well suited for WSNs.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号