首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到10条相似文献,搜索用时 109 毫秒
1.
TTL JK边沿触发器在CP脉冲边沿会出现输出状态异变现象.本文分析了异变的原因,提出了对CP脉冲上升时间和下降时间的要求条件.  相似文献   

2.
确定非正常触发主从JK触发器次态的一种简单方法   总被引:1,自引:0,他引:1  
通过对非正常触发时主从JK触发器可能出现的工作波形的详细分析,归纳出了非正常触发时确定主从JK触发器次态的简单方法。  相似文献   

3.
量子元胞自动机(Quantum-dot Cellular Automata,QCA)是一种有望替代传统半导体晶体管的新型纳米器件.本文提出了一种改进的双边沿触发结构及其相应的JK触发器电路,用概率转移矩阵(Probabilistic Transfer Matrix,PTM)分析该触发结构,结果表明该结构较以往的可靠性更高.同时利用模块垂直堆叠方法来优化了JK触发器电路,新结构电路较之前的电路元胞数和整体面积均有所减少.  相似文献   

4.
Modern mobile networks, such as GPRS and UMTS, support wireless data applications. One successful example is the ever popular i-Mode in Japan. Wireless data services (wireless Internet) become more important as more and more customers of handheld devices enjoy the convenience of the ubiquitous computing. To improve the effective wireless data access, the time-to-live (TTL) management for data entries becomes important due to its use in effective caching design. In this paper, we study three TTL prediction schemes and investigate the effects of the inter-update time distribution on the wireless data access. Performance analysis is carried out via simulations as well as analytical modeling. We expect our results will be useful for the future wireless data access systems, in which transmission power for mobile devices is more limited.  相似文献   

5.
With the rapid development and extensive application of the Internet of things (IoT),big data and 5G network architecture,the massive data generated by the edge equipment of the network and the real-time service requirements are far beyond the capacity if the traditional cloud computing.To solve such dilemma,the edge computing which deploys the cloud services in the edge network has envisioned to be the dominant cloud service paradigm in the era of IoT.Meanwhile,the unique features of edge computing,such as content perception,real-time computing,parallel processing and etc.,has also introduced new security problems especially the data security and privacy issues.Firstly,the background and challenges of data security and privacy-preserving in edge computing were described,and then the research architecture of data security and privacy-preserving was presented.Secondly,the key technologies of data security,access control,identity authentication and privacy-preserving were summarized.Thirdly,the recent research advancements on the data security and privacy issues that may be applied to edge computing were described in detail.Finally,some potential research points of edge computing data security and privacy-preserving were given,and the direction of future research work was pointed out.  相似文献   

6.
本文研究了高处坠落事故的原因、规律以及伤害的特点。利用AHP法建立了高处坠落防控层次结构模型,确定了加大安全资源投入是避免高处坠落事故发生的最优先方案。通过分析得出,作业前召开班前会识别风险、开展高处作业专项培训和属地负责人组织安全检查是相对优良的具体防控措施。  相似文献   

7.
在高校的《数字电路》课程教学中,通常要对分立NPN晶体管和TTL门电路的低电平输出近饱和、饱和以及退饱和状态进行讲解,其中出现了貌似矛盾的现象。本文给出了两种情况下的比较分析,力图廓清对它们模棱两可的理解,并尝试给出了“被动饱和”与“主动饱和”两个新概念,建议了更为合理的饱和深度的定量表达式,以期对相关的教学以及教材编写起到积极的作用。  相似文献   

8.
基于分形理论的图像边缘提取方法   总被引:22,自引:0,他引:22  
罗强  任庆利  杨万海 《通信学报》2001,22(11):104-109
提出了一种基于分形理论的图像边缘提取的方法。简述了分形理论的图像处理的应用原理,讨论了分形编码的特点,采用分形理论的方法,进行图像边缘的检测。实验表明:此方法对图像的提取的应用,不仅速度快,效果好,而且抗干扰性强。  相似文献   

9.
李洪波 《光电子.激光》2009,(12):1635-1640
给出了一种边缘粗糙度(LER)三维参数评估的方法。采用原子力显微镜(AFM)测量了刻线单侧边缘形貌,根据AFM的工作机理和测量特点重构边缘表面,采用回归分析方法确定了边缘表面的评价基准面。结合集成电路中光刻工艺的具体需求,提出了能够反映边缘表面形貌特征的三维LER表征参数。结合实例,计算了所提出的部分LER参数,分析了LER标准差参数的测量精度。  相似文献   

10.
抗噪形态学边缘检测新算子   总被引:2,自引:0,他引:2  
提出了一种基于抗噪形态学算子的新算法。该算法大大增强抗噪形态学算子的抗噪能力,并且实现对同时混有椒盐噪声和高斯噪声的图像进行噪声滤除。实验过程中使用仅含噪声的图像进行算子的仿真,使结果更清晰、直观。实验结果表明,该算子有良好的抗噪能力,对噪声的大小和浓度要求都比较小,鲁棒性较强。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号