共查询到20条相似文献,搜索用时 15 毫秒
1.
Dynamic characterization of Built-In Current Sensors based on PN junctions: Analysis and experiments
The goal of this work is to analyze the performance of PN junction-based Built-in Current Sensors (BICS) for I
DDQ testing. Two types of BIC Sensors are analyzed: one based on a simple PN junction as the sensing element (DBICS), and the other based on a lateral BJT (PBICS). The sensitivity, speed and performance of the BICS are studied by showing their dependence on circuit parameters. Design constraints of such sensors in order to achieve performance criteria on CUT and BICS are analyzed. The dynamic analysis of the BICS is compared with experimental results when the PN junction BICS are used on a CMOS circuit. 相似文献
2.
Based on the whitening property of wavelet transformation for 1/f noise, this paper addresses the problem of detecting deterministic signals in the presence of 1/f fractal noise. The transfer function of whitening filter is provided as well as the condition for whitening. The receiver
structure based on Karhunen-Loeve expansion and the decision rule are also given. Finally performance of the detector is analyzed. 相似文献
3.
Network survivability is crucial to both unicast and multicast traffic. Up to now, extensive research has been done on unicast
traffic protection. Recently, due to the rapid growth of multicast applications, such as video-conferencing, high definition
television (HDTV), distance learning, and multi-player on-line gaming, the problem of multicast traffic protection has started
to draw more research interests. The preconfigured protection cycle (p-cycle) method proposed by Grover offers fast speed in restoration (because p-cycles are pre-cross-connected) and high efficiency in resource utilization (because p-cycles protect both on-cycle and straddling links). So far p-cycles based protection approaches have been intensively studied for unicast traffic protection, but have been rarely investigated
for multicast traffic. We propose to apply p-cycles to dynamic protection provisioning of multicast traffic, and evaluate the blocking performance in comparison to other
existing multicast protection schemes. We consider three different p-cycle based multicasting protection methods, namely dynamic p-cycle (DpC) design, p-cycle based protected working capacity envelope (PWCE) design, and hybrid DpC and PWCE design. We show that p-cycle-based multicast protection approaches offer much better blocking performance, as compared with other existing multicast
protection schemes. The main reasons for the much better blocking performance are attributed to the facts that (i) the selection
of p-cycles is independent of the routing of the multicast light trees, (ii) there are no path/segment disjoint constraints between
the selected p-cycles and the multicast light trees to be protected, (iii) the selected p-cycles are the most efficient p-cycles.
相似文献
Wen-De ZhongEmail: |
4.
János Szigeti Ricardo Romeral Tibor Cinkler David Larrabeiti 《Photonic Network Communications》2009,17(1):35-47
Providing resilient inter-domain connections in multi-domain optical GMPLS networks is a challenge. On the one hand, the integration
of different GMPLS domains to run traffic engineering operations requires the development of a framework for inter-domain
routing and control of connections, while keeping the internal structure and available resources of the domains undisclosed
to the other operators. On the other hand, the definition of mechanisms to take advantage of such automatically switched inter-domain
connectivity is still an open issue. This article focuses on the analysis of applicability of one of these mechanisms: P-cycle-based protection. The proposed solution is based on the decomposition of the multi-domain resilience problem into two
sub-problems, namely, the higher level inter-domain protection and the lower level intra-domain protection. Building a P-cycle at the higher level is accomplished by certain tasks at the lower level, including straddling link connection, capacity
allocation and path selection. In this article, we present several methods to realize inter-domain P-cycle protection at both levels and we evaluate their performance in terms of availability and spent resources. A discussion
on a proposal of implementation of signalling based on extensions of existing protocols such as RSVP-TE and the PCE architecture
illustrates the practical viability of the approach.
相似文献
David LarrabeitiEmail: |
5.
Mohamed B. El_Mashade 《电子科学学刊(英文版)》2006,23(6):853-863
The χ^2 family of signal fluctuation distributions represents the main fluctuation models which most radar targets follow it in their reflections. This family can be categorized as fluctuation distribution with two degrees of freedom and those with four degrees of freedom. The first category represents all important class of fluctuation models which when illuminated by a coherent pulse train, return a train of fully correlated pulses (Swerling Ⅰ model) or fully decorrelated pulses (Swerling Ⅱ model). The detection of this type of fluctuating targets is therefore of great importance. This paper is devoted to the analysis of Cell-Averaging (CA) based detectors for the case where the radar receiver noncoherently integrates M square-law detected pulses and the signal fluctuation obeys 2 statistics with two degrees of freedom. These detectors include the Mean-Of (MO), the Greatest-Of (GO) and the Smallest-Of(SO) schemes. In these processors, the estimation of the noise power levels from the leading and the trailing reference windows is based on the CA technique. Exact formulas for the detection probabilities are derived, in the absence as well as in the presence of spurious targets. The primary and the secondary interfering targets are assumed to be fluctuating in accordance with the χ^2 fluctuation model with two degrees of freedom (SWI & SWII). The numerical results show that the MO version has the best homogeneous performance, the SO scheme has the best multiple-target performance, while the GO procedure does not offer any merits, neither in the absence nor in the presence of outlying targets. 相似文献
6.
Lei Zhi Feng Lianghuan Zeng Guanggen Li Wei Zhang Jingquan Wu Lili Wang Wenwu 《半导体学报》2013,34(1):014008-3
本文采用化学水浴法沉积CuxS薄膜,通过改变Cu元素比例研究其对碲化镉电池效率的影响。研究表明化学水浴法沉积的CuxS是非晶的,采用适当退火条件可以使其晶化,随着退火温度的提高,薄膜变得致密且结晶明显。CuxS薄膜厚度对电池性能有很大的影响,结果表明,随着CuxS薄膜厚度增加,电池性能先增加后减少。薄膜厚度为75nm时,CdS/CdTe电池性能最佳,达到了最高转化效率(η)为12.19%,填充因子(FF)为68.82%,开路电压(Voc)为820mV。 相似文献
7.
Motivated by the work of Erdogmus and Principe, we use the error (h,φ)-entropy as the supervised adaptation criterion. Several properties of the (h,φ)-entropy criterion and the connections with traditional error criteria are investigated. By a kernel estimate approach, we
obtain the nonparametric estimator of the instantaneous (h,φ)-entropy. Then, we develop the general stochastic information gradient algorithm, and derive the approximate upper bound
for the step size in the adaptive linear neuron training. Moreover, the (h,φ) pair are optimized to improve the performance of the proposed algorithm. For the finite impulse response identification
with white Gaussian input and noise, the exact optimum φ function is derived. Finally, simulation experiments verify the results and demonstrate the noticeable performance improvement
that may be achieved by the optimum (h,φ)-entropy criterion. 相似文献
8.
Morteza Esmaeili Mokhtar Salahian Mohammad-Hesam Tadayon 《AEUE-International Journal of Electronics and Communications》2011,65(12):1069-1072
Construction of q-ary quasi-cyclic low-density parity-check (QC-LDPC) codes based on two-dimensional multiplicative arrays over Zq−1, q = 2m, is studied. In particular, two-dimensional arrays formed by the set of quadratic-residue numbers modulo prime numbers less than q are considered. 相似文献
9.
Huang Ruji 《电子科学学刊(英文版)》1991,8(4):307-316
Twok-hyperconnection expressions of a generalk-order cofactorY(i,j) are presented for the indefinite parameter matrixY of a linear system by applying directed hypergraph theory, and based on it a decomposition theorem ofY(i,j) is derived. By this theorem, the multi-level tearing and analysis can be carried out easily for any linear large system.
This is a new multilevel topological analysis method. Using proposed method the scale of systems which can be topologically
analysed by a computer will be enlarged. 相似文献
10.
Shinsuke Hara Masutada Mouri Minoru Okada Norihiko Morinaga 《Wireless Personal Communications》1995,2(4):335-356
In this paper, we discuss the transmission performance of Multi-Carrier Modulation (MCM) in frequencyselective fast Rayleigh fading channels. First, we optimize the transmission parameters of MCM withM-ary differential phase shift keying/differential detection (DPSK):the guard duration andthe number of sub-carriers for frequency-selective fast Rayleigh fading channels, and then show the bit error rate (BER) performance of the optimizedM-ary DPSK MCM. Next, we propose an MCM with pilot-assistedM-ary quadrature amplitude modulation/coherent detection (QAM), and discuss the BER performance when we reduce the number of pilot signals from the view-point of frequency-time utilization efficiency. Finally, we propose a two-stage frequency offset compensation method. 相似文献
11.
已有的以k-最近邻(k Nearest Neighbor,kNN)规则为核心的分类算法,如模糊kNN(Fuzzy kNN,FkNN)和证据kNN (Evidential kNN,EkNN)等,存在着两个问题:无法区别出样本特征的差异以及忽略了邻居距训练样本类中心距离的不同所带来的影响.为此,本文提出一种模糊-证据kNN算法.首先,利用特征的模糊熵值确定每个特征的权重,基于加权欧氏距离选取k个邻居;然后,利用邻居的信息熵区别对待邻居并结合FkNN在表示信息和EkNN在融合决策方面的优势,采取先模糊化再融合的方法确定待分类样本的类别.本文的方法在UCI标准数据集上进行了测试,结果表明该方法优于已有算法. 相似文献
12.
A new design of a BIC sensor for current testing static CMOS circuits is proposed. It is based on a lateral BJT device which is easy to incorporate in any standard CMOS process. The design diverts a fraction of the I
DDQ
current from the cell under test and a resistive component generates a voltage proportional to I
DDQ
. Additional features are the possibility of continuous measure of i
dd
and increased speed of this sensor compared with sensors based on the current integration principle. The design does not have substrate currents due to the parasitic vertical BJTs. Experimental work on the sensor is reported. 相似文献
13.
14.
Ad hoc network protocols are often developed, tested and evaluated using simulators. However, when the time comes to deploy those protocols for use or testing on real systems the protocol must be reimplemented for the target platform. This usually results in two, completely separate code-bases that must be maintained. Bugs which are found and fixed under simulated conditions must also be fixed separately in the deployed implementation, and vice versa. There is ample opportunity for the two implementations to drift apart, possibly to the point where the deployed and simulated version have little actual resemblance to each other. Testing the deployed version may also require construction of a testbed, a potentially time-consuming and expensive endeavor. Even if constructing an actual testbed is feasible, simulators are very useful for running large, repeatable scenarios for tasks such as protocol evaluation and regression testing. Furthermore, since the implementation may require modification of the kernel network stack, there's a good chance that a particular implementation may only run on specific versions of specific operating systems. To address these issues, we constructed the nsclick simulation environment by embedding the Click Modular Router inside of the popular ns-2 network simulator. Routing protocols may be implemented as Click graphs and easily moved between simulation and any operating system supported by Click. This paper describes the design, use, validation and performance of nsclick. 相似文献
15.
S. Lourdudoss S. Nilsson L. Bäckbom T. Klinga O. Kjebon B. Holmberg 《Journal of Electronic Materials》1991,20(12):1025-1027
Successful regrowth of semi-insulating (SI) InP: Fe by the hydride vapour phase epitaxy technique around reactive ion etched
vertical mesas of laser grown on Zn dopedp-InP substrate is demonstrated. The device performance of the buried heterostructure laser is presented. The current confining
property of the regrown SI-InP: Fe are good although it lies adjacent to InP: Zn. 相似文献
16.
Ngoc-Tu Nguyen 《International Journal of Electronics》2013,100(9):1071-1081
The k-nearest neighbour (k-NN) rule is applied to diagnose the conditions of induction motors. The features are extracted from the time vibration signals while the optimal features are selected by a genetic algorithm based on a distance criterion. A weight value is assigned to each feature to help select the best quality features. To improve the classification performance of the k-NN rule, each of the k neighbours are evaluated by a weight factor based on the distance to the test pattern. The proposed k-NN is compared to the conventional k-NN and support vector machine classification to verify the performance of an induction motor fault diagnosis. 相似文献
17.
Molybdenum oxide (Mo1-x
O
x
) and ruthenium oxide (RuO2) films were prepared by rf reactive sputtering of Mo or Ru targets in an O2/Ar plasma. Both films exhibit metallic conductivities. The influence of the deposition parameters on the phase that forms
and on the microstructure of Mo1-x
O
x
and RuO2 films is reported. A phase transformation is observed in Mo1-x
O
x
films subjected to heat treatment. The diffusion barrier performance of Mo1-x
O
x
and RuO2 layers interposed between Al and Si is compared. 相似文献
18.
This paper provides an overview of p-cycle based optical multicast protection approaches for link failure recovery, combined node and link failure recovery, and source failure recovery on top of combined node and link failure recovery. We discuss several recently proposed p-cycle based optical multicast protection approaches, including the link-protecting p-cycle based optical multicast protection approach, the tree-protecting p-cycle based optical multicast protection approach, node-and-link protecting p-cycle based optical multicast protection approach, and flow p-cycle based optical multicast protection approach. They outperform other existing optical multicast protection approaches in both capacity efficiency and recovery speed. 相似文献
19.
In recent years, M-band orthonormal wavelet bases, due to their good characteristics, have attracted much attention. The ability of 2-band wavelet
packets to decompose high frequency channels can be employed to improve the performance of wavelets for time-frequency localization,
which makes more kinds of signals for analyzing by wavelets. Similar to the notations from the extension of 2-band wavelets
to 2-band wavelet packets, the theoretic framework of M-band wavelet packets is developed, a generalization of the notations and properties of 2-band wavelet packets to that of
M-band wavelet packets is made and the corresponding proofs are given. 相似文献
20.
This paper presents an architecture for the computation of the atan(Y/X) operation suitable for broadband communication applications where a throughput of 20 MHz is required. The architecture takes
advantage of embedded hard-cores of the FPGA device to achieve lower power consumption with respect to an atan(Y/X) operator based on CORDIC algorithm or conventional LUT-based methods. The proposed architecture can compute the atan(Y/X) with a latency of two clock cycles and its power consumption is 49% lower than a CORDIC or 46% lower than multipartite approach.
相似文献
J. VallsEmail: |