首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The goal of this work is to analyze the performance of PN junction-based Built-in Current Sensors (BICS) for I DDQ testing. Two types of BIC Sensors are analyzed: one based on a simple PN junction as the sensing element (DBICS), and the other based on a lateral BJT (PBICS). The sensitivity, speed and performance of the BICS are studied by showing their dependence on circuit parameters. Design constraints of such sensors in order to achieve performance criteria on CUT and BICS are analyzed. The dynamic analysis of the BICS is compared with experimental results when the PN junction BICS are used on a CMOS circuit.  相似文献   

2.
Based on the whitening property of wavelet transformation for 1/f noise, this paper addresses the problem of detecting deterministic signals in the presence of 1/f fractal noise. The transfer function of whitening filter is provided as well as the condition for whitening. The receiver structure based on Karhunen-Loeve expansion and the decision rule are also given. Finally performance of the detector is analyzed.  相似文献   

3.
Network survivability is crucial to both unicast and multicast traffic. Up to now, extensive research has been done on unicast traffic protection. Recently, due to the rapid growth of multicast applications, such as video-conferencing, high definition television (HDTV), distance learning, and multi-player on-line gaming, the problem of multicast traffic protection has started to draw more research interests. The preconfigured protection cycle (p-cycle) method proposed by Grover offers fast speed in restoration (because p-cycles are pre-cross-connected) and high efficiency in resource utilization (because p-cycles protect both on-cycle and straddling links). So far p-cycles based protection approaches have been intensively studied for unicast traffic protection, but have been rarely investigated for multicast traffic. We propose to apply p-cycles to dynamic protection provisioning of multicast traffic, and evaluate the blocking performance in comparison to other existing multicast protection schemes. We consider three different p-cycle based multicasting protection methods, namely dynamic p-cycle (DpC) design, p-cycle based protected working capacity envelope (PWCE) design, and hybrid DpC and PWCE design. We show that p-cycle-based multicast protection approaches offer much better blocking performance, as compared with other existing multicast protection schemes. The main reasons for the much better blocking performance are attributed to the facts that (i) the selection of p-cycles is independent of the routing of the multicast light trees, (ii) there are no path/segment disjoint constraints between the selected p-cycles and the multicast light trees to be protected, (iii) the selected p-cycles are the most efficient p-cycles.
Wen-De ZhongEmail:
  相似文献   

4.
Providing resilient inter-domain connections in multi-domain optical GMPLS networks is a challenge. On the one hand, the integration of different GMPLS domains to run traffic engineering operations requires the development of a framework for inter-domain routing and control of connections, while keeping the internal structure and available resources of the domains undisclosed to the other operators. On the other hand, the definition of mechanisms to take advantage of such automatically switched inter-domain connectivity is still an open issue. This article focuses on the analysis of applicability of one of these mechanisms: P-cycle-based protection. The proposed solution is based on the decomposition of the multi-domain resilience problem into two sub-problems, namely, the higher level inter-domain protection and the lower level intra-domain protection. Building a P-cycle at the higher level is accomplished by certain tasks at the lower level, including straddling link connection, capacity allocation and path selection. In this article, we present several methods to realize inter-domain P-cycle protection at both levels and we evaluate their performance in terms of availability and spent resources. A discussion on a proposal of implementation of signalling based on extensions of existing protocols such as RSVP-TE and the PCE architecture illustrates the practical viability of the approach.
David LarrabeitiEmail:
  相似文献   

5.
The χ^2 family of signal fluctuation distributions represents the main fluctuation models which most radar targets follow it in their reflections. This family can be categorized as fluctuation distribution with two degrees of freedom and those with four degrees of freedom. The first category represents all important class of fluctuation models which when illuminated by a coherent pulse train, return a train of fully correlated pulses (Swerling Ⅰ model) or fully decorrelated pulses (Swerling Ⅱ model). The detection of this type of fluctuating targets is therefore of great importance. This paper is devoted to the analysis of Cell-Averaging (CA) based detectors for the case where the radar receiver noncoherently integrates M square-law detected pulses and the signal fluctuation obeys 2 statistics with two degrees of freedom. These detectors include the Mean-Of (MO), the Greatest-Of (GO) and the Smallest-Of(SO) schemes. In these processors, the estimation of the noise power levels from the leading and the trailing reference windows is based on the CA technique. Exact formulas for the detection probabilities are derived, in the absence as well as in the presence of spurious targets. The primary and the secondary interfering targets are assumed to be fluctuating in accordance with the χ^2 fluctuation model with two degrees of freedom (SWI & SWII). The numerical results show that the MO version has the best homogeneous performance, the SO scheme has the best multiple-target performance, while the GO procedure does not offer any merits, neither in the absence nor in the presence of outlying targets.  相似文献   

6.
本文采用化学水浴法沉积CuxS薄膜,通过改变Cu元素比例研究其对碲化镉电池效率的影响。研究表明化学水浴法沉积的CuxS是非晶的,采用适当退火条件可以使其晶化,随着退火温度的提高,薄膜变得致密且结晶明显。CuxS薄膜厚度对电池性能有很大的影响,结果表明,随着CuxS薄膜厚度增加,电池性能先增加后减少。薄膜厚度为75nm时,CdS/CdTe电池性能最佳,达到了最高转化效率(η)为12.19%,填充因子(FF)为68.82%,开路电压(Voc)为820mV。  相似文献   

7.
Motivated by the work of Erdogmus and Principe, we use the error (h,φ)-entropy as the supervised adaptation criterion. Several properties of the (h,φ)-entropy criterion and the connections with traditional error criteria are investigated. By a kernel estimate approach, we obtain the nonparametric estimator of the instantaneous (h,φ)-entropy. Then, we develop the general stochastic information gradient algorithm, and derive the approximate upper bound for the step size in the adaptive linear neuron training. Moreover, the (h,φ) pair are optimized to improve the performance of the proposed algorithm. For the finite impulse response identification with white Gaussian input and noise, the exact optimum φ function is derived. Finally, simulation experiments verify the results and demonstrate the noticeable performance improvement that may be achieved by the optimum (h,φ)-entropy criterion.  相似文献   

8.
Construction of q-ary quasi-cyclic low-density parity-check (QC-LDPC) codes based on two-dimensional multiplicative arrays over Zq−1, q = 2m, is studied. In particular, two-dimensional arrays formed by the set of quadratic-residue numbers modulo prime numbers less than q are considered.  相似文献   

9.
Twok-hyperconnection expressions of a generalk-order cofactorY(i,j) are presented for the indefinite parameter matrixY of a linear system by applying directed hypergraph theory, and based on it a decomposition theorem ofY(i,j) is derived. By this theorem, the multi-level tearing and analysis can be carried out easily for any linear large system. This is a new multilevel topological analysis method. Using proposed method the scale of systems which can be topologically analysed by a computer will be enlarged.  相似文献   

10.
In this paper, we discuss the transmission performance of Multi-Carrier Modulation (MCM) in frequencyselective fast Rayleigh fading channels. First, we optimize the transmission parameters of MCM withM-ary differential phase shift keying/differential detection (DPSK):the guard duration andthe number of sub-carriers for frequency-selective fast Rayleigh fading channels, and then show the bit error rate (BER) performance of the optimizedM-ary DPSK MCM. Next, we propose an MCM with pilot-assistedM-ary quadrature amplitude modulation/coherent detection (QAM), and discuss the BER performance when we reduce the number of pilot signals from the view-point of frequency-time utilization efficiency. Finally, we propose a two-stage frequency offset compensation method.  相似文献   

11.
一种模糊-证据kNN分类方法   总被引:3,自引:0,他引:3       下载免费PDF全文
吕锋  杜妮  文成林 《电子学报》2012,40(12):2390-2395
 已有的以k-最近邻(k Nearest Neighbor,kNN)规则为核心的分类算法,如模糊kNN(Fuzzy kNN,FkNN)和证据kNN (Evidential kNN,EkNN)等,存在着两个问题:无法区别出样本特征的差异以及忽略了邻居距训练样本类中心距离的不同所带来的影响.为此,本文提出一种模糊-证据kNN算法.首先,利用特征的模糊熵值确定每个特征的权重,基于加权欧氏距离选取k个邻居;然后,利用邻居的信息熵区别对待邻居并结合FkNN在表示信息和EkNN在融合决策方面的优势,采取先模糊化再融合的方法确定待分类样本的类别.本文的方法在UCI标准数据集上进行了测试,结果表明该方法优于已有算法.  相似文献   

12.
A new design of a BIC sensor for current testing static CMOS circuits is proposed. It is based on a lateral BJT device which is easy to incorporate in any standard CMOS process. The design diverts a fraction of the I DDQ current from the cell under test and a resistive component generates a voltage proportional to I DDQ . Additional features are the possibility of continuous measure of i dd and increased speed of this sensor compared with sensors based on the current integration principle. The design does not have substrate currents due to the parasitic vertical BJTs. Experimental work on the sensor is reported.  相似文献   

13.
崔宁  梁仁荣  王敬  周卫  许军 《半导体学报》2012,33(8):084004-6
本文提出了一种具有高K栅介质及低K侧壁介质的PNPN型隧穿场效应晶体管,并通过二维仿真研究了栅电场和侧壁电场对隧穿场效应晶体管性能的影响。结果表明高K栅介质可以增强栅对沟道的控制能力,同时低K侧墙介质有助于增大带带隧穿的几率。具有这种结构的隧穿场效应晶体管器件具有很好的开关特性、大的开态电流以及良好的工艺容差。该器件可以应用于低功耗领域,并有可能作为下一代CMOS技术的替代者之一。  相似文献   

14.
Ad hoc network protocols are often developed, tested and evaluated using simulators. However, when the time comes to deploy those protocols for use or testing on real systems the protocol must be reimplemented for the target platform. This usually results in two, completely separate code-bases that must be maintained. Bugs which are found and fixed under simulated conditions must also be fixed separately in the deployed implementation, and vice versa. There is ample opportunity for the two implementations to drift apart, possibly to the point where the deployed and simulated version have little actual resemblance to each other. Testing the deployed version may also require construction of a testbed, a potentially time-consuming and expensive endeavor. Even if constructing an actual testbed is feasible, simulators are very useful for running large, repeatable scenarios for tasks such as protocol evaluation and regression testing. Furthermore, since the implementation may require modification of the kernel network stack, there's a good chance that a particular implementation may only run on specific versions of specific operating systems. To address these issues, we constructed the nsclick simulation environment by embedding the Click Modular Router inside of the popular ns-2 network simulator. Routing protocols may be implemented as Click graphs and easily moved between simulation and any operating system supported by Click. This paper describes the design, use, validation and performance of nsclick.  相似文献   

15.
Successful regrowth of semi-insulating (SI) InP: Fe by the hydride vapour phase epitaxy technique around reactive ion etched vertical mesas of laser grown on Zn dopedp-InP substrate is demonstrated. The device performance of the buried heterostructure laser is presented. The current confining property of the regrown SI-InP: Fe are good although it lies adjacent to InP: Zn.  相似文献   

16.
The k-nearest neighbour (k-NN) rule is applied to diagnose the conditions of induction motors. The features are extracted from the time vibration signals while the optimal features are selected by a genetic algorithm based on a distance criterion. A weight value is assigned to each feature to help select the best quality features. To improve the classification performance of the k-NN rule, each of the k neighbours are evaluated by a weight factor based on the distance to the test pattern. The proposed k-NN is compared to the conventional k-NN and support vector machine classification to verify the performance of an induction motor fault diagnosis.  相似文献   

17.
Molybdenum oxide (Mo1-x O x ) and ruthenium oxide (RuO2) films were prepared by rf reactive sputtering of Mo or Ru targets in an O2/Ar plasma. Both films exhibit metallic conductivities. The influence of the deposition parameters on the phase that forms and on the microstructure of Mo1-x O x and RuO2 films is reported. A phase transformation is observed in Mo1-x O x films subjected to heat treatment. The diffusion barrier performance of Mo1-x O x and RuO2 layers interposed between Al and Si is compared.  相似文献   

18.
This paper provides an overview of p-cycle based optical multicast protection approaches for link failure recovery, combined node and link failure recovery, and source failure recovery on top of combined node and link failure recovery. We discuss several recently proposed p-cycle based optical multicast protection approaches, including the link-protecting p-cycle based optical multicast protection approach, the tree-protecting p-cycle based optical multicast protection approach, node-and-link protecting p-cycle based optical multicast protection approach, and flow p-cycle based optical multicast protection approach. They outperform other existing optical multicast protection approaches in both capacity efficiency and recovery speed.  相似文献   

19.
In recent years, M-band orthonormal wavelet bases, due to their good characteristics, have attracted much attention. The ability of 2-band wavelet packets to decompose high frequency channels can be employed to improve the performance of wavelets for time-frequency localization, which makes more kinds of signals for analyzing by wavelets. Similar to the notations from the extension of 2-band wavelets to 2-band wavelet packets, the theoretic framework of M-band wavelet packets is developed, a generalization of the notations and properties of 2-band wavelet packets to that of M-band wavelet packets is made and the corresponding proofs are given.  相似文献   

20.
This paper presents an architecture for the computation of the atan(Y/X) operation suitable for broadband communication applications where a throughput of 20 MHz is required. The architecture takes advantage of embedded hard-cores of the FPGA device to achieve lower power consumption with respect to an atan(Y/X) operator based on CORDIC algorithm or conventional LUT-based methods. The proposed architecture can compute the atan(Y/X) with a latency of two clock cycles and its power consumption is 49% lower than a CORDIC or 46% lower than multipartite approach.
J. VallsEmail:
  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号