共查询到20条相似文献,搜索用时 343 毫秒
1.
2.
循环码的周期分布的新的计算公式 总被引:17,自引:1,他引:17
本文在[1]文的基础上进一步分析了循环码的周期分布的性质,给出了新的计算方法和公式,并且确定了一些熟知的循环码的周期分布。 相似文献
3.
本文重点分析了现代家居智能化系统的需要实现的基本功能,探讨了于Zigbee技术的家居智能控制系统的整个设计思路,从硬软件的角度解析了家居智能控制系统具体设计细节等。 相似文献
4.
5.
PVK的光致发光的电场下的猝灭 总被引:4,自引:1,他引:3
对PVK在电场调制下的光致发光现象进行了研究,发现在高场下光致发光强度会减弱,且存在一个阈值,在阈值以下发光强度随电增加缓慢减弱,在域值以上则在出发光强度迅速减弱的趋势。 相似文献
6.
软件测试是确保软件质量的可靠手段,是软件开发过程中必不可少的重要环节。随着软件项目中各类干系人对软件质量的要求不断提高,软件测试作为保证软件质量的主要途径之一,其重要性越来越受重视。随着软件复杂性提高,软件测试的复杂性也不断提高,测试成本不断增加,同时软件复用技术也在不断发展,软件测试成本的提高和软件复用技术的发展,促使了软件测试复用技术的不断发展。测试复用技术在软件领域得到了广泛的应用,在某些行业软件中得到了很好的应用,比如证券行业。 相似文献
7.
细胞的内质网呈网状遍布于细胞质内,所以也可称之为内质网膜系统。内质网是细胞的内膜系统的重要成分,在蛋白质合成,脂类合成和糖原代谢等方面起着重要作用。研究证明细胞内的许多膜性结构均来源于内质网,因而它在细胞的内膜系统中占有中心地位。内质网的微细结构的观察与研究对了解细胞的正常生理和病理改变具有重要意义。我们对培训的非洲绿猴肾上皮细胞(CV-1),人早幼粒白血病细胞(HL-60)、活检的人体胃粘膜细胞和胃癌细胞以及手术切除的人体结肠细胞和结肠癌细胞等数种细胞的内质网,应用电镜技术和光镜技术进行了观察与分析。 相似文献
8.
9.
10.
11.
12.
13.
14.
有限状态机在防空作战仿真中的应用 总被引:1,自引:0,他引:1
有限状态机是面向对象程序设计中动态建模的一种重要方法,把它应用于防空作战仿真的行为建模,由简入深、逐步细化,既可保证作战过程描述合理、可行,同时又具有简单易行的特点。 相似文献
15.
Cooperative ad hoc wireless networks are more vulnerable to malicious attacks than traditional wired networks. Many of these attacks are silent in nature and cannot be detected by conventional intrusion detection methods such as traffic monitoring, port scanning, or protocol violations. These sophisticated attacks operate under the threshold boundaries during an intrusion attempt and can only be identified by profiling the complete system activity in relation to normal behavior. In this article we discuss a control- theoretic hidden Markov modelstrategy for intrusion detection using distributed observation across multiple nodes. This model comprises a distributed HMM engine that executes in a randomly selected monitor node and functions as a part of the feedback control engine. This drives the defensive response based on hysteresis to reduce the frequency of false positives, thereby avoiding inappropriate ad hoc responses. 相似文献
16.
17.
A popular countermeasure against IP piracy is to obfuscate the Finite State Machine (FSM) which is assumed to be the heart of a digital system. Most of the existing FSM obfuscation strategies rely on additionally introduced set of obfuscation mode state-transitions to protect the original state-transitions of the FSM. Although these methods assume that it is difficult to extract the FSM behavior from the flattened gate-level netlist, some recent reverse engineering attacks could successfully break the defense of these schemes. The capability of differentiating obfuscation mode state-transitions from normal mode state-transitions makes these attacks powerful. As a countermeasure against these attacks, we propose a new strategy that offers a key-based obfuscation to each state-transition of the FSM. We use a special class of non-group additive cellular automata (CA), called D1 1 CA, and it's counterpart D11CAdual to obfuscate each state-transition of the FSM. Each state-transition has its own customized key, which must be configured correctly in order to get correct state-transition behavior from the synthesized FSM. A second layer of protection to the state-transition logic enhances the security of the proposed scheme. An in-depth security analysis of the proposed easily testable key-controlled FSM synthesis scheme demonstrates its ability to thwart the majority of the state-of-the-art attacks, such as FSM reverse engineering, SAT, and circuit unrolling attacks. Thus, the proposed scheme can be used for IP protection of the digital designs. Experimentations on various IWLS′93 benchmark FSM designs show that the average area, power, and delay overheads our proposed multi-bit key-based obfuscated FSM design are 56.43%, 6.87%, and 23.41% while considering the FSMs as standalone circuits. However, experimentation on the Amber23 processor core shows these overheads drastically reduce (reported area, power, and delay overheads values are 0.0025%, 0.44%, and 0%, respectively) while compared with respect to the entire design. 相似文献
18.
有限状态机的Verilog设计与研究 总被引:6,自引:0,他引:6
本文研究了用Verilog实现有限状态机的各种不同的编码方式和描述风格,并从综合,毛刺,面积,速度这几方面研究了不同实现方式的利弊。最后,以SoC芯片中DMA Arbitor有限状态机为例,我们用Design Complier(DC)对七种设计进行了综合,并分析了综合后的面积和时延信息。 相似文献
19.
基于混合观测器的非线性系统的脉冲控制 总被引:2,自引:0,他引:2
该文针对基于有限状态自动机的非线性脉冲混合动态系统,设计一种新的脉冲混合观测器,然后应用有限状态自动机理论和Backstepping方法设计了基于混合观测器的脉冲输出反馈控制器,并构造了多Lyapunov函数,通过混合系统的渐近稳定性理论以及多Lyapunov函数法给出整个闭环系统渐近稳定的充分条件,数值仿真验证了该控制器的有效性。 相似文献
20.
UIO序列是对有限状态机进行功能测试的有效手段,在VLSI、通信协议等时序系统中有很强的实际应用背景.本文基于可区分状态组这一概念设计了一个搜索算法,进一步利用搜索信息建立了一个基于"小于"关系的启发策略,有效的剪枝策略的设计将尽可能消除没有意义的搜索分枝,新设计出的多路OPEN/CLOSED表存储机制也加快了相关的判别、处理过程.根据实验结果,分析了优化措施对于改进了搜索过程、减少搜索信息的产生、提高搜索速度有显著的贡献.该算法与以往的算法相比,在时间复杂度和空间复杂度两方面都得到了很大改进. 相似文献