Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper, an integrated scheduling algorithm of unicast and multicast is presented for providing QOS service and handling the mixed data of unicast and multicast. The key idea is to schedule the six QOS types independently and in parallel, and schedule the unicast and multicast by a single integrated algorithm, then arbitrate among them for accessing to the switching fabric. The QOS mechanism...
Efficient architectures for realizing MDCT/IMDCT are presented. Based on the symmetry property of trigonometric functions, N-point MDCT formula was transferred into an odd-even index paralleling process which can be achieved by two different types of decomposition, recursive formed DCT-II kernel or FFT-based DCT-IV kernel. Then a butterfly unit is employed to accelerate the computational speed. Furthermore,...
An optimizing operator of focusing algorithms is proposed for automatic microscope system. Based on the characteristics of optimal evaluation function, this operator is applicable to automatic splicing graphics with microscope system. Experiments show that the optimized algorithm not only becomes much sharper near the focusing point, but also changes more slowly when it is far from the focusing point...
Benefit from the novel compute unified device architecture (CUDA) introduced by NVIDIA, graphics processing unit (GPU) turns out to be a promising solution for cryptography applications. In this paper we present an efficient implementation for MD5-RC4 encryption using NVIDIA GPU with novel CUDA programming framework. The MD5-RC4 encryption algorithm was implemented on NVIDIA GeForce 9800GTX GPU. The...
A wideband CMOS low-noise amplifier (LNA) is presented in this paper. The LNA exploits a combination of a common-gate stage and a common-source stage to cancel the noise from the input matching device. An active inductor is used to extend the bandwidth and minimize the chip area. It is designed with 0.18 mum CMOS process in an active area of 0.04 mm2. Post simulation shows that the LNA has a maximum...
The MD4-family algorithms have been widely applied in cryptographic field. Nowadays, it is discovered that MD4-family algorithms are also suitable for random number generators. Since the MD4-family algorithms are computing intensive, they can be accelerated on Graphics Processing Units (GPUs) to generate massive high-quality random numbers. This paper presents acceleration of MD4-family algorithms...
In the automatic microscope system, we can use the stepping motor as the driving equipment of the motorized linear stages. But if we control the average torque of stepping motor in traditional control method, there will causes intense ripple of torque and speed. This paper introduces the hybrid stepping motor driving module which is set up by the L6506 stepping motor controller chip. This module can...
In order to accomplish IC design online and project management, an enhanced unified electronic design automation (EDA) platform based on the WEB (abbreviated as WEB-EDA) is developed. The platform provides the sharing of cross-domain EDA resources via shell mode and desktop mode, IC design and project management. And for the purpose of safeguarding the online design environment, we adopt masquerade...
A new method called EPDG-GA which utilizes the edge partitions dominator graph (EPDG) and genetic algorithm (GA) for branch coverage testing is presented in this paper. First, a set of critical branches (CBs) are obtained by analyzing the EPDG of the tested program, while covering all the CBs implies covering all the branches of the control flow graph (CFG). Then, the fitness functions are instrumented...
IP reuse methodology is considered a good solution to the complexity of SoC (system on chip) and the time pressure from market. Random-logic (RL) and finite-state-machine (FSM) are two main implementation methods in reusable IP design. FSM method is far more widely accepted and applied by IP designers because its can describe IP at behavior level. RL design method, focusing on the specific character...
In this paper, an improved method of super block method (SBM) is presented for software testing. The primary idea of the method, called virtual node method (VNM), is to add virtual nodes to the control flow before the SBM is used. The same with the SBM, the VNM can help testers use minimal test cases to cover 100% blocks or achieve a desired coverage. Moreover, it can be used to reduce the overhead...
In real-time embedded systems, due to race conditions, synchronization order between events may be different from one execution to another. This behavior is permissible as in concurrent systems, but should be fully analyzed to ensure the correctness of the system. In this paper, a new intelligent method is presented to analyze event synchronization sequence in embedded systems. Our goal is to identify...
Sparse representation based on over-complete dictionary is a new signal representation theory. Recent activity in this field concentrated mainly on the study of sparse decomposition algorithm and dictionary design algorithm. In this paper, a novel dictionary design algorithm called K-LMS is proposed. It generalized the k-means clustering process, for adapting dictionaries to achieve sparse representation...
There are race conditions in concurrent programs if the accesses to a sharing resource are not properly synchronized. Because the races can cause the program to behave in unexpected ways, detecting them is an important aspect of debugging and program verification. Many approaches have been used to detect race conditions, but there still is no effective formal model to visualize the race conditions...
In this paper, an auto-focusing system of microscope for integrated circuits (IC) analysis is presented. In this system, the Laplacian algorithm is used as the evaluation function, which provides a reference to the degree of defocus. The auto-focusing controlling algorithm based on computational verb theory consists of two controllers designed: the moving-speed controller and the moving-direction...
A system is designed for dielectric parameterspsila measurement of microwave ceramic materials in which rotary open cavity is applied and the theoretic analysis is presented. With the stepping motor controlled by Single-Chip Microchip, the measurement can be realized automatically. The analysis software based on VEE is programmed, so that the measurement data from Vector Network Analyzer can be calculated...
A gdb-based debugging system for OpenRISC1200 Processor based on IEEE1149.1 JTAG interface is developed. Unlike usual gdb-based embedded debugging systems, this system uses the hardware debugging modules in OpenRISC1200 Processor to extend GDB. Its debugging agent doesnpsilat work on the target but on the host computer, so it can work well without any target operating system support. In this paper,...
In this paper, we describe a design of the hardware interface and communication process of a wireless data acquisition system using a monolithic CC1100 chip working with a PIC16Fxxx MCU. The design has been applied to collect data during the transportation of petroleum products in the petrochemical industry. The fault tolerance problem in the one-to-many data communication is solved. This paper also...
SSL (secure sockets layer) protocol is one of key technologies to keep userpsilas data in secure transmission via Internet. This paper is present to analyze the security of SSL protocol and propose a new scheme of SSL protocol configured in the Linux operating system (OS). The experimental results show that the proposed scheme is feasible and practical as a secure solution for Web-based communication,...
Taking advantage of the typical properties of any chaotic system: ergodicity and pseudo-random, some chaotic block cryptosystems had been put forward by searching through chaotic state space. But the serious defect existing in these cryptosystems is that searching takes too long time. A chaotic block cryptosystem by searching through chaotic state space with the controls parameter transforming module...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.