The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper addresses the bounded control of positive systems, both continuous- and discrete-time ones. The control is under boundedness constraint, which means that both the input and the states of the closed-loop system are bounded and positive (the original systems are not necessarily positive). The main contribution lies in two aspects. First, a necessary and sufficient condition is provided for...
This paper presents a hypergraph partitioning based constraints decomposition procedure to guide an RTL satisfiability solver. The constraints with their correlative variables drawn from the RTL circuit are modeled as a hypergraph and techniques based on hypergraph partitioning are employed to decompose constraints. This scheme solves the partitioned problems respectively and reconciles them via cut-set...
This paper is an extension for impulsive control of nonlinear systems without time delay. According to impulsive control scheme, we establish impulsive model of nonlinear systems with time-varying delays. By utilizing the methods of Lyapunov functions and impulsive-type comparison principles, we obtain a general conditions under which impulsively controlled nonlinear systems with time-varying delays...
We propose to watermark images based on wavelet filter banks by encoding the watermark bits into the choice of the filters, in contrast to the conventional watermarking schemes. Such filters are selected from different classes in such a way that they lead to sufficiently distinguishing subbands upon different sequence of filters. A partial sorting on a chosen subband to mark the watermark existence...
In this paper, we propose an iterative method for designing IIR digital filters in the weighted least squares (WLS) sense. Since the original design problem is essentially nonconvex, it is first relaxed into a second-order cone programming (SOCP) problem. By solving the relaxed problem, the lower bound on the optimal value of the original problem can be obtained. And the corresponding filter coefficients...
Authentication protocol is a very important kind of protocol in network environment, and formal analysis is the key method to guarantee its security properties. Needham-Schroeder Shared-Key (NSSK) protocol is considered as one of the earliest and very important authentication protocol. The paper proposed a new improved version of NSSK protocol by modifying message format and decreasing message flows,...
In complex SoC design, the reusable IP is very useful to achieve the whole system with high verification. Based on this issue, a hardware and software (HW/SW) co-design approach can obtain maximum performance, and is easily integrated with the other functions to complete the system. This paper presents the multi-standard audio decoder design with hardware/software co-design flow. First we need to...
In this paper, a TDMA-based medium access control protocol (GMAC) for wireless sensor networks is proposed. We use global time synchronization and data gathering tree as the foundation of the protocol to form a contention free network for applications that sensors periodically send packets to the sink. To assign time-slots and frequency channels for nodes, a distributed resource allocation strategy...
White spaces refer to the unused frequency voids across time or space. The vast existence of white spaces has been validated by many measurements and is widely regarded as an undesirable consequence of the fixed spectrum licensing policy. In this paper, we apply stochastic geometry to study the spatial distribution of white spaces in the presence of a random primary network with homogeneous nodes...
Digital image transmission without channel coding and with turbo product codes (TPCs) as channel coding scheme over AWGN channel is studied. We propose an improved decoding algorithm for TPCs based on computing extrinsic information for partial bits. In the proposed decoding algorithm, we neglect computing extrinsic information for those bits that are reliable enough for making decoding decisions...
Low-density parity-check (LDPC) codes of column weight two, also called cycle codes, can be constructed based on connected simple graphs. In this paper, efficiently encodable cycle codes and modified Repeat-Accumulate codes based on Hamiltonian graphs with large girths are devised. Specifically, the Hamiltonian property of the graphs is exploited to obtain efficient encoder structures and a concise...
This paper demonstrates a 0.8-V, 9-bit, 20-MS/s pipelined ADC with only 0.58 pJ-Volts/step. A novel circuit architecture which merges opamp-sharing with loading-free structure is proposed. Such mechanism effectively reduces the number of opamps as well as the capacitive loading. In addition, an inverse-flip-around sample-and-hold with unity-feedback factor is employed which further reduces the power...
Takagi-Sugeno (T-S) fuzzy model provides an effective representation of complex nonlinear systems in terms of fuzzy sets and fuzzy reasoning applied to a set of linear input/output submodels. In this paper, the passivity and feedback passification of discrete-time fuzzy systems with parametric uncertainties are investigated. The passivity condition and the state feedback passification design can be...
This paper presents a decision tree approach for predicting smokerspsila quit intentions using the data from the International Tobacco Control Four Country Survey. Three rule-based classification models are generated from three data sets using attributes in relation to demographics, warning labels, and smokerspsila beliefs. Both demographic attributes and warning label attributes are important in...
Non-ideal behavior models of switched capacitor sigma delta ADC are presented. The modulator non-idealities such as operational amplifier parameters (GBW, colored noise, SR, saturation voltage and so on), clock jitter, capacitor mismatch, nonlinear switch on-resistance and are included. The operational amplifier nonlinear DC Gain is modeled with emphasis and simulation results show it introduces odd...
In this paper, we put forward a kind of civil aircraft maintenance task determination methods based on similarity rough set (SRS) theory to handle the situation of lacking baseline aircraft at present. A rule gaining principle for civil aircraft maintenance task using maintenance experience of similar aircraft is described, and the acquisition method and detailed steps were presented. The test results...
A 13-bit CMOS pipeline analog-to-digital converter (ADC) with improved sampling circuits is proposed. In the first pipeline stage, the high frequency performance of the sampling circuit is improved by reducing the on-resistances of the switches and the time skew between the sampling capacitors and the comparators. In the subsequent stages, the conventional sampling circuit is modified for low power...
In this paper, we present a modified projected Landweber super-resolution algorithm for resolution enhancement of passive millimeter wave images. In this algorithm, we implement the Landweber iterations as the main image restoration scheme, and a projection-based adjustment for enforcing constraints after each Landweber iteration is completed to complete spectral extrapolation, lastly we implement...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.