首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
The purpose of this note is to present an alternate derivation of a formula for the synthesis of a loaded line. The problem is to determine the values of the normalized susceptances a and c mounted an exact quarter-wavelength apart along a uniform line. These are arranged in the order a, c, c,. . .c, a to achieve a loaded line with a given phase shift and perfect match. In order to analyze a particular line design for standing-wave ratio and phase shift over a band of frequencies on a digital computer, it is worthwhile to know the values of the susceptances to many more decimal places than one would achieve from a simple graph.  相似文献   

2.
In this paper, we present a fully integrated front-end of a portable spectroreflectometry-based brain imaging system dedicated for acquisition of modulated optical signals at a frequency of 1 Hz to 25 kHz. The proposed front-end preamplifier is composed of a photodetector, a transimpedance preamplifier, a two-stage voltage amplifier and a mixer. Strict constraints regarding noise thus have to be considered. The preamplifier consists of a transimpedance block featuring a 95-dB/spl Omega/ gain and an average input current noise density at the frequency of interest of approximately 3 pA//spl radic/Hz. Each of the two subsequent voltage amplifiers allows the user to obtain an additional 25-dB gain. Considering the tuning capabilities and the losses due to the filters and the nonideal buffers, the proposed front-end allows us to obtain a total gain up to 145 dB. The back-end of the amplification chain is composed of a mixer which is used to produce a continuous voltage proportional to the amplitude of the input optical signals. All those features were integrated using CMOS 0.18-/spl mu/m technology and the experimental results are in agreement with the initial design requirements.  相似文献   

3.
On the Security of Oscillator-Based Random Number Generators   总被引:1,自引:0,他引:1  
Physical random number generators (a.k.a. TRNGs) appear to be critical components of many cryptographic systems. Yet, such building blocks are still too seldom provided with a formal assessment of security, in comparison to what is achieved for conventional cryptography. In this work, we present a comprehensive statistical study of TRNGs based on the sampling of an oscillator subject to phase noise (a.k.a. phase jitters). This classical layout, typically instantiated with a ring oscillator, provides a simple and attractive way to implement a TRNG on a chip. Our mathematical study allows one to evaluate and control the main security parameters of such a random source, including its entropy rate and the biases of certain bit patterns, provided that a small number of physical parameters of the oscillator are known. In order to evaluate these parameters in a secure way, we also provide an experimental method for filtering out the global perturbations affecting a chip and possibly visible to an attacker. Finally, from our mathematical model, we deduce specific statistical tests applicable to the bitstream of a TRNG. In particular, in the case of an insecure configuration, we show how to recover the parameters of the underlying oscillator.  相似文献   

4.
This study proposes a single-phase to three-phase power conversion interface which converts the power from a single-phase utility to three-phase power for a three-phase load. The proposed single-phase to three-phase power conversion interface comprises a bridge-type switch set, a set of three-phase inductors, a transformer set and a set of three-phase capacitors. A current-mode control controls the switching of bridge-type switch set, to generate a set of nonzero-sequence (NZS) currents and a set of zero-sequence (ZS) currents. The transformer set is used to decouple the NZS currents and the ZS currents. The NZS currents are used to generate a high-quality three-phase voltage that supplies power to a three-phase load. The ZS currents flow to the single-phase utility so that the utility current is sinusoidal and in phase with the utility voltage. Accordingly, only a bridge-type switch set is used in the single-phase to three-phase power conversion interface to simply the power circuit. A prototype is developed and tested to verify the performance of the proposed single-phase to three-phase power conversion interface.  相似文献   

5.
This paper exploits the potential of the Genetic Algorithm to solve the cellular resource allocation problem. When a blocked host is to be allocated to a borrowable channel, a crucial decision is which neighboring cell to choose to borrow a channel. It is an optimization problem and the genetic algorithm is efficiently applied to handle this. The Genetic Algorithm, for this particular problem, is improved by introducing a new genetic operator, named pluck, that incorporates a problem-specific knowledge in population generation and leads to a better channel utilization by reducing the average blocked hosts. The pluck operator makes the crucial decision of when and which cell to borrow with the future consideration that the borrowing should not lead the network to chaos. It makes a channel borrowing decision that minimizes the number of blocked hosts and improves the long-term performance of the network. Efficacy of the proposed method has been evaluated by experimentation.  相似文献   

6.
For a company, information and communication system is a product of divergent rationalities which come to clash. Dissimilar logic leads to diverging projects : one focused on information aims to integrate and control its processing and flow rate, the other prefers to look at communication as a vector of working together among peers. However beyond these conflicts appears a factor of coherence and cohesion which ultimately helps the rationalities to join. A management able to combine integration of wage earners by identifying the objectives of the company and individualism (information systems is a vector of such a strategy). The goal is to avoid a major risk in form of mass action. The remaining question turns about the ability for innovation allowed to wage-earners in a company driven by standards and believes, in fact ideology. Sticking to standards, in other words conformity seems to leave out marginal handling and conflicting situation sources of innovative spirit.  相似文献   

7.
Sum capacity of Gaussian vector broadcast channels   总被引:5,自引:0,他引:5  
This paper characterizes the sum capacity of a class of potentially nondegraded Gaussian vector broadcast channels where a single transmitter with multiple transmit terminals sends independent information to multiple receivers. Coordination is allowed among the transmit terminals, but not among the receive terminals. The sum capacity is shown to be a saddle-point of a Gaussian mutual information game, where a signal player chooses a transmit covariance matrix to maximize the mutual information and a fictitious noise player chooses a noise correlation to minimize the mutual information. The sum capacity is achieved using a precoding strategy for Gaussian channels with additive side information noncausally known at the transmitter. The optimal precoding structure is shown to correspond to a decision-feedback equalizer that decomposes the broadcast channel into a series of single-user channels with interference pre-subtracted at the transmitter.  相似文献   

8.
Genetic design of linear antenna arrays   总被引:1,自引:0,他引:1  
Discusses a way to optimize both the topology and the numerical parameters of an antenna design. The approach relies on an “antenna language” to define how antennas are constructed, and a genetic algorithm to create new designs using this language. The grammatical rules of a language can be very vague or very specific, depending on the purpose of the designer. With a vague grammar, genetic algorithms search a very large design space, and can occasionally find unexpected solutions to a design problem. Other times, they completely fail to find a reasonable solution because of the vastness of the search space. In this case, including knowledge about the problem into the grammar narrows the search to a region expected to yield good results. This yields more conventional design solutions that usually perform reasonably well. In an example, two languages were used to design a linear antenna array. The general language allowed a wide variety of designs, while the Yagi-log language confined the search to topologies known to perform well. The performance of the antennas produced by both languages was superior to that of a conventional log-periodic design. Further, the Yagi-log design was more fit than the unconventional design from the general language, illustrating the benefits of including knowledge in the grammar  相似文献   

9.
Field programmable gate array (FPGA) is a flexible solution for offloading part of the computations from a processor. In particular, it can be used to accelerate an execution of a computationally heavy part of the software application, e.g., in DSP, where small kernels are repeated often. Since an application code for a processor is a software, a design methodology is needed to convert the code into a hardware implementation, applicable to the FPGA. In this paper, we propose a design method, which uses the Transport Triggered Architecture (TTA) processor template and the TTA-based Co-design Environment toolset to automate the design process. With software as a starting point, we generate a RTL implementation of an application-specific TTA processor together with the hardware/software interfaces required to offload computations from the system main processor. To exemplify how the integration of the customized TTA with a new platform could look like, we describe a process of developing required interfaces from a scratch. Finally, we present how to take advantage of the scalability of the TTA processor to target platform and application-specific requirements.  相似文献   

10.
An analog of a quantum search method, known as Grover's algorithm, is modeled without entanglement on the macroscopic level, using numerical simulation of microwave devices and methods. An array of microstrip annular-ring resonators simulates a quantum bit array. An oracle that performs a test to determine which element in the array is the answer to the search algorithm is provided by a microwave-frequency plane wave, modulated by a Gaussian pulse. A single annular ring with a resonant frequency identical to the frequency of the incident pulse serves as the answer to the search. It is shown that the number of Gaussian pulses needed to identify the answer element is equal to the radicN iterations predicted by the Grover algorithm. The decay in a microwave-resonator element is used to show that the quantum dual - a spontaneous decay of the excited energy level of a quantum bit, also described as its decoherence - can be a serious obstacle to the development of large quantum-bit data arrays  相似文献   

11.
The ability of a dictionary encoder to reduce the redundancy of printed English text is evaluated by simulation on a general-purpose digital computer. The dictionary encoder matches segments of the input text to entries of a stored dictionary which contains frequently occurring sequences of letters. The text is thus defined as the succession of code designations corresponding to the selected dictionary entries. Since, for a normal piece of text, fewer binary digits are needed to specify the code designations than the text itself, the encoding produces a compressed equivalent of the original input. In addition to evaluating encoder performance the simulator also collects language statistics which are used for optimization of the encoder logic and the dictionary entries. For a broad type of English language text (news dispatches prepared for newspaper publication) the number of binary digits required to represent a piece of text can be reduced by 50 percent when using a 1000-entry dictionary. While a better compression than 50 percent is theoretically possible it may be difficult to realize, but a compression of the input text to 60 to 70 percent of its original size appears to be easily realizable with a small dictionary.  相似文献   

12.
《Mechatronics》2014,24(8):1178-1188
This article presents the hybrid design and control of a quad-rotor system called Flymobile. Flymobile is a combined system of a mobile robot and a quad-rotor system aimed to perform both flying and driving tasks. Flymobile performs flying tasks in the same way as conventional quad-rotor systems while the tilting mechanism of each rotor allows Flymobile to navigate in its terrain for a driving task. The body frame with rotors is implemented by a calibration process through a test-bed equipped with a force sensor. The triangular wheel frame is designed to mimic motions of a mobile robot with three passive wheels. Sensor data of a gyro and an accelerometer are filtered and used for controlling the attitude of the system. Focusing on a practical approach of implementing a hybrid system, a non model-based approach is applied to control Flymobile. Experimental studies are demonstrated to show the feasibility of performing both driving and flying missions.  相似文献   

13.
Robust detection of a known signal in nearly Gaussian noise   总被引:1,自引:0,他引:1  
A detector that is not nonparametric, but that nevertheless performs well over a broad class of noise distributions is termed a robust detector. One possible way to obtain a certain degree of robustness or stability is to look for a min-max solution. For the problem of detecting a signal of known form in additive, nearly Gaussian noise, the solution to the min-max problem is obtained when the signal amplitude is known and the nearly Gaussian noise is specified by a mixture model. The solution takes the form of a correlator-limiter detector. For a constant signal, the correlator-limiter detector reduces to a limiter detector, which is shown to be robust in terms of power and false alarm. By adding a symmetry constraint to the nearly normal noise and formulating the problem as one of local detection, the limiter-correlator is obtained as the local min-max solution. The limiter-correlator is shown to be robust in terms of asymptotic relative efficiency (ARE). For a pulse train of unknown phase, a limiter-envelope sum detector is also shown to be robust in terms of ARE.  相似文献   

14.
This paper presents a particular case of a pedagogically successful, dynamic, and efficient remote laboratory. The aim of the remote laboratory is to learn how to program embedded real-time systems in a real machine such as a robot. The system supplies feedback information to the user through a web browser and an ssh terminal. Likewise, the remote laboratory allows a high degree of interaction owing to a clear and simple interface. This type of telecontrol web-based system generates strong interest among students. The following are the two main contributions of this system: The remote laboratory allows collaboration among students in order to solve the problem, and the usage of a free software architecture allows anyone to replicate and improve the laboratory.   相似文献   

15.
This paper makes two contributions toward computing unique input/output (UIO) sequences in finite-state machines. Our first contribution is to compute all UIO sequences of minimal lengths in a finite-state machine. Our second contribution is to present a generally efficient algorithm to compute a UIO sequence for each state, if it exists. We begin by defining a path vector, vector perturbation, and UIO tree. The perturbation process allows us to construct the complete UIO tree for a machine. Each sequence of input/output from the initial vector of a UIO tree to a singleton vector represents a UIO sequence. Next, we define the idea of an inference rule that allows us to infer UIO sequences of a number of states from the UIO sequence of some state. That is, for a large class of machines, it is possible to compute UIO sequences for all possible states from a small set of initial UIOs. We give a modified depth-first algorithm, called the hybrid approach, that computes a partial UIO tree, called an essential subtree, from which UIO sequences of all possible states can be inferred. Using the concept of projection machines, we show that sometimes it is unnecessary to construct even a partial subtree. We prove that if a machine remains strongly connected after deleting all the converging transitions, then all of the states have UIO sequences. To demonstrate the effectiveness of our approach, we develop a tool to perform experiments using both small and large machines  相似文献   

16.
In this paper, we propose a new Generalized Distribution‐Based Handover (DBHO) to deal with the inefficient utilization of spectral resources due to the non‐uniform cell loads. The DBHO scheme is different from the existing adaptive schemes since it uses a new criterion to initiate handover when moving from/to a congested cell. Two risk factors are used to dynamically change handover boundaries according to the distribution of traffic loads. This controls the handover initiation process such that a user in a congested cell that is moving to a free cell is allowed to initiate a handover to a new cell earlier, as long as the signal received from the target cell is higher than a certain threshold. While delaying the handover initiation process for a user moving in the opposite direction, as long as the signal received from the serving cell is not lower than a certain threshold. Our results show a substantial reduction in the handover and call dropouts rates. Our scheme is complementary to the existing adaptive schemes proposed in the literature. The proposed scheme also gives cellular system designers a new tool to optimize the overall network performance by initiating handovers based on the traffic intensities. Frequent handovers increase the load on switching networks, which consequently degrades the Quality of Service (QoS). Existing handover schemes usually use parameters such as the received signal strength for initiating a handover with some additional measurements to reduce unnecessary handovers and call dropouts. These schemes perform well when cell loads are somewhat evenly distributed, but fail to account for nonuniform traffic, as is often the case in microcells. Hence, it is desirable to design efficient handover schemes to avoid unnecessary handovers, reduce call dropouts and yet dynamically adapt to the variation of traffic among cells. In this paper, we present a new adaptive handover scheme that dynamically changes the handover boundaries to balance cell loads and to effectively reduce the average number of handovers. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   

17.
Server-side congestion arises when a large number of users wish to retrieve files from a server over a short period of time. Under such conditions, users are in a unique position to benefit enormously by sharing retrieved files. Pseudoserving, a new paradigm for Internet access, provides incentives for users to contribute to the speedy dissemination of server files through a contract set by a “superserver”. Under this contract, the superserver grants a user a referral to where a copy of the requested file may be retrieved in exchange for the user's assurance to serve other users for a specified period of time. Simulations that consider only network congestion occurring near the server show that: (1) pseudoserving is effective because it self-scales to handle very high request rates; (2) pseudoserving is feasible because a user who participates as a pseudoserver benefits enormously in return for a relatively small contribution of the user's resources; (3) pseudoserving is robust under realistic user behavior because it can tolerate a large percentage of contract breaches; and (4) pseudoserving can exploit locality to reduce usage of network resources. Experiments performed on a local area network that account for the processing of additional layers of protocols and the finite processing and storage capacities of the server and the clients, corroborate the simulation results. They also demonstrate the benefits of exploiting network locality in reducing download times and network traffic while making referrals to a pseudoserver. Limitations of pseudoserving and potential solutions to them are also discussed  相似文献   

18.
A Wireless Mesh Network (WMN) consists of fixed wireless routers, each of which provides service for mobile clients within its coverage area and inter‐connects mesh routers to form a connected mesh backbone. Wireless mesh routers are assigned with a channel or a code to prevent collisions in transmission. With a power control mechanism, each router could be assigned with a power level to control connectivity, interference, spectrum spatial reuse, and topology. Assigning high transmitting power level to a router can enhance the network connectivity but may increase the number of neighbors and worsen the collision problem. How to assign an appropriate power level to each router to improve the network connectivity with a constraint of limited channels is one of the most important issues in WMNs. Given a network topology and a set of channels that has been assigned to mesh routers, the proposed channel‐switching mechanism further reassigns each router with a power level and switches channels of routers to optimize both power efficiency and connectivity. A matrix‐based presentation and operations are proposed to respectively identify and resolve the channel switching problems. Simulation study reveals that the proposed mechanisms increase network throughput and provides a variety of route selection, and thus improves the performance of a given WMN. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   

19.
并行AVS实时编解码器设计与实现   总被引:1,自引:0,他引:1  
介绍了一种并行AVS实时编码器的设计,它包括音视频数据输入、音视频编码、传输流系统复用器、输出和控制部分,其中重点介绍了视频编码器和传输流系统复用器的设计和实现.实验结果证明,实现标清AVS实时编码器是可行的.  相似文献   

20.
In this paper, we have studied a number of algorithms for routing in all-optical wavelength routed networks. We have considered situations where a lightpath is dynamically created in response to a request for communication and the WDM channels constituting the lightpath are reclaimed when the communication is over. We have looked at two schemes for dynamic wavelength allocation. In the first scheme we have assumed the existence of a central agent to maintain a database of existing lightpaths where the central agent attempts to generate a new lightpath in response to a request for communication. In the second scheme, we attempt to generate a new lightpath using a distributed algorithm. In the first scheme we have exploited the existence of multiple paths between any pair of nodes in a network in order to reduce the blocking probability. For the second scheme, we have proposed three distributed strategies to determine, if possible, a lightpath when there is a request for communication. Each of these strategies have their advantages and disadvantages in terms of the expected blocking probability and the set-up time. We have studied the performances of both the schemes using Monte Carlo simulation.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号