首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 671 毫秒
1.
A pseudo-random sequence generator is a basic tool for cryptography. To realize a pseudo-random sequence generator, a new block iterating method using shifter, multiplier, and adder operations has been introduced. By increasing the iteration of the counter and by performing calculations based on the initial value, an approximate pseudo-random sequence was obtained after exchanging bits. The algorithm and the complexity of the generator were introduced. The result obtained from the calculation shows that the self-correlation of the “m” block sequence is two-valued; the block field value is [0,2 m-1], and the block period is 2~(m+8)-1.  相似文献   

2.
As a preparation method of chemistry material ,Sol-gel method has beencast back19 century.Since H.Dis-lich successfully developed multi-group glass[1],Sol-Gelmethod aroused abroad attentions of science field andhad been appliedtothinfil m,high-purity glass ,iron-e-lectricity material , biology material , catalyzed carrieretc .Compared withthermal evaporation,sputter and oth-er methods of material fabrication,the Sol-gel technolo-gy has the following advantages :low cost , si mple e-quipment …  相似文献   

3.
This paper proposes a novel method, primarily based on the fuzzy adaptive resonance theory(ART) neural network with forgetting procedure, for moving object detection and background modeling in natural scenes. With the ability, inheriting from the ART neural network, of extracting patterns from arbitrary sequences, the background model based on the proposed method can learn new scenes quickly and accurately. To guarantee that a long-life model can derived from the proposed mothed, a forgetting procedure is employed to find the neuron that needs to be discarded and reconstructed, and the finding procedure is based on a neural network which can find the extreme value quickly. The results of a suite of quantitative and qualitative experiments conducted verify that for processes of modeling background and detecting moving objects our method is more effective than five other proven methods with which it is compared.  相似文献   

4.
Based on the α-β bifurcation curves and the special characteristics of chaotic spectrum of chua’s circuit, this paper presents here a method for designing a Chua’s circuit which approximately satisfy specified spectrum distribution range. Supported by the Nature Science Foundation of Zhejiang Province  相似文献   

5.
6.
A simple technique for extracting the Fowler–Nordheim (FN) tunnelling parameters is proposed. It consists of measuring the Drain-Source current of a floating gate transistor while a linear ramp voltage is applied to a simple injector structure attached to the transistor's floating gate. Such a test device is fabricated using a standard CMOS process. The parameters obtained can be used in a freely available electrical simulator as SPICE3f5 (NGSPICE), but in general it can be easily adapted to other SPICE-like programs. We describe the technique step-by-step and a comparison is made of simulated and measured FN tunnelling parameters, for a floating gate transistor with tunnelling injectors. A good agreement has been found between experimental and simulated data.  相似文献   

7.
A numerical–analytical method for solution of equations and calculation of the input impedance of thin dipole antennas of arbitrary shape has been developed. High efficiency of the method has been demonstrated by examples.  相似文献   

8.
9.
10.
In recent years, IP networks have become increasingly complex and the range of network applications has widened. As a result, the need for experimental evaluation of application performance has increased. We introduce a measurement‐based performance evaluation method that combines a function to generate various patterns of application traffic with one to measure end‐to‐end network performance at the application level. For our method, we also propose traffic models of various applications that can represent the characteristics of these applications, for example, the burstiness of traffic. This method has already been implemented as a benchmarking tool on UNIX operating systems. This revised version was published online in June 2006 with corrections to the Cover Date.  相似文献   

11.
This article proposes a simple pilot-aided channel estimation method based on correlation in time domain for multiple-input and multiple-output orthogonal frequency division multiplexing (MIMO-OFDM) systems. Pilot symbols in all transmit antennas are generated from different circular shifting of a certain sequence. Through once correlation, the receiver can obtain time-domain pulse responses for channel fading from all transmit antennas to a certain receive antenna, from which channel estimation in frequency domain can be obtained. Beyond 3G time-division duplex (B3G-TDD) uplink is introduced, and the channel estimation method is used in it. Theoretical analysis and simulation are both carried out. Mean square error (MSE) performance shows that the method can exhibit precise estimation. Complexity analysis proves it requires very low complexity. System simulation result shows that it guarantees the performance of B3G-TDD uplink very well.  相似文献   

12.
This paper presents a new and efficient method for video data compression using quadratic Bézier curve fitting. The method treats the luminance or color variations of a spatial location in a sequence of frames as input points in Euclidean space R 1 or R 3. The input points are approximated using quadratic Bézier least square fitting. The output data consists of quadratic Bézier control points and difference between original and fitted data. Video data compression is the main application of proposed method. It is shown that entropy of output data is significantly less than the entropy of input data. The method can be applied to 1-D space like luminance and chrominance components separately or 3-D color spaces such as RGB and YC b C r .  相似文献   

13.
As a way of training a single hidden layer feedforward network(SLFN),extreme learning machine(ELM) is rapidly becoming popular due to its efficiency. However, ELM tends to overfitting, which makes the model sensitive to noise and outliers. To solve this problem, L2,1-norm is introduced to ELM and an L2,1-norm robust regularized ELM(L2,1-RRELM) was proposed. L2,1-RRELM gives constant penalties to outliers to reduce their adverse effects by replacing lea...  相似文献   

14.
Rate–distortion optimization (RDO) is utilized to select the optimal coding parameters in multi-view video coding (MVC), which employs a Lagrange multiplier to balance the relationship between the distortion and the bitrate. In this paper, an efficient RDO method for the dependent view (DV) in multi-view video (MVV) is proposed based on inter-view dependency. First of all, by investigating the sources of the distortion in the DV, a new distortion model for the DV is established. In addition, based on the proposed distortion model, an efficient Lagrangian multiplier decision for B frame is proposed by considering the inter-view dependency. Finally, the optimized Lagrangian multiplier for P frame is designed using the scaling factor which is deduced to have a linear relationship with the disparity between I frame and P frame. Experiment results demonstrate that compared with the original HTM-16.0 encoder, the proposed overall method reduces 12.19% BD-rate for the DV on average, bringing 0.40 dB BD-PSNR gain.  相似文献   

15.
The manifold matrix of the received signals can be destroyed when the array is with the gain and phase errors, which will affect the performance of the traditional direction of arrival(DOA) estimation approaches. In this paper, a novel active array calibration method for the gain and phase errors based on a cascaded neural network(GPECNN) was proposed. The cascaded neural network contains two parts: signal-to-noise ratio(SNR) classification network and two sets of error estimation subnetworks. E...  相似文献   

16.
The newly developped method involves a controlled partial erasure of a charged ultraviolet erasable programmable read only memory device followed by a period of high temperature storage. The model is based on two assumptions: the amount of charge stored at the floating gate of a programmed cell is assumed to be equal throughout a component and the trip the minimum level of charge stored at the floating gate of a programmed cell, has a Gaussian distribution throughout a component. The experimental data are well described by the model. After implementation of the experimental results in the model we extrapolate the data retention lifetimes of the UVEPROM’S under operational conditions. Our measurements show that most of the tested UVEPROM devices (64 ko to 256 ko) have a similar operational lifetime, only the charge leakage activation energy differs (0.35 to 0.9 eV) depending on the type of component. In conclusion this method and model are suitable for a fast determination of UVEPROM’S data retention lifetimes under operational conditions.  相似文献   

17.
This paper presents an improved and efficient method for the design of a two-channel quadrature mirror filter (QMF) bank. In the proposed method, the filter bank design problem is formulated as a low-pass prototype filter design problem, whose responses in the passband and stopband are ideal and their filter coefficients value at quadrature frequency is 0.707. A new method is developed for the design of a low-pass prototype filter which minimizes the objective function by optimizing the filter taps weights using the Levenberg–Marquardt method. When compared with other existing algorithms, it significantly reduces peak reconstruction error (PRE), error in passband, stopband and transition band. Several design examples are included to show the increased efficiency and the flexibility of the proposed method over existing methods. An application of this method is considered in the area of subband coding of the ultrasound images.  相似文献   

18.
19.
This study introduces a novel method to measure C(V) characteristics of local MOS structures based on scanning probe microscopy (SPM) techniques. The new method operates in intermittent-contact (IC) mode and combines both the advantages of contact mode C(V) spectroscopy and intermittent-contact scanning capacitance microscopy. As a consequence, on the one hand dopant concentration and dopant type can be indicated simultaneously, on the other hand tip wear is reduced significantly.  相似文献   

20.
The paper presents a new steganographic method called LACK (Lost Audio PaCKets Steganography) which is intended mainly for VoIP. The method is presented in a broader context of network steganography and of VoIP steganography in particular. The analytical results presented in the paper concern the influence of LACK’s hidden data insertion procedure on the method’s impact on quality of voice transmission and its resistance to steganalysis.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号