The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Automated vehicle applications have a high automation potential in terms of safety and efficiency improvement. Autonomous or semi-autonomous navigation requires a positioning solution of high accuracy and robustness. By introducing the new European Galileo satellite system, multi-constellation with GPS offers new opportunities of accuracy and integrity enhancements. Although, the Galileo system is...
Automatic image retrieval similar to a query image is an important task in computer vision. To obtain this goal, every image in database needs to be modeled. A signature is learned for each image and stored. A sparsity based image content modeling and retrieval is proposed in this paper. Sparsity based data modeling has been successfully applied across various areas of image processing. A dictionary...
Arbitration among various clients, requesting multiple resources simultaneously in high throughput system, needs multiple requests selection in single cycle. A new technique for implementation of arbiter, which selects up to two active request is proposed in this paper. 2 selector circuits are designed by modification of existing parallel prefix tree structures for architecture. Design maintains fairness...
Long Term Evolution Advanced (LTE-A) uses four different kinds of Cyclic Redundancy Check (CRC) to verify the integrity of the transmitted data, which implies using four circuits for each CRC in the transceiver system. In this paper, a novel algorithm is introduced to combine three of these CRC circuits into one in order to minimize the total area of the transceiver. This method will insure a considerable...
In this paper, a Differential Power Analysis (DPA) vulnerability analysis on Trivium stream cipher is presented. Compared to the two previously presented DPA attacks on Trivium, we retrieve the whole key without making any hypothesis during the attack. An optimized power model is proposed allowing the power trace acquisition without making any algorithmic-noise removement thus simplifying the attack...
Currently, several levels of abstraction can be used to model targeted biological application and their associated assembly of elementary biological components (i.e.: BioBricks). The highest one uses the analogy between the behavior of biological mechanism and digital gates. The lowest one uses ordinary differential equations to get accurate and quantitative results. To bridge the gap between these...
IEEE 802.11s Mesh WLAN is a promising access network standard launched for the aim of enhancing channels' utilization, coverage extension with simple and cheap network deployment. Mesh WLAN faces challenges in power management, channel assignment, traffic forwarding, admission control, security and coexistence with other technologies. The main objective of this paper is to increase the mesh WLAN throughput...
Stochastic arithmetic provide several benefits over traditional computing method such as high fault tolerance, simple hardware implementation, low hardware area. In order to increase accuracy of error analysis and improve method of performance evaluation for stochastic computing systems, a new variance transfer function for stochastic computing systems based on combinational logic is proposed in this...
Wireless mesh network (WMN) is deemed as a promising technology to provide last few miles connectivity. Multi-radio multi-channel mesh nodes are often used to increase the chance of concurrent transmission. Although IEEE 802.11b/g standards define 11 available channels, the maximum number of non-overlapping channels is only three. Most existing channel assignment schemes are based on these non-overlapping...
This paper presents a synthesis algorithm, Covering Set Partitions (CSP), for reversible binary functions with no ancillary (garbage) bits. Existing algorithms are constrained to functions of small number of variables because they store the entire truth table of 2n terms in memory or require a huge amount of time to yield results because they must calculate all possible permutations of an input vector...
In this paper, we propose a novel min cut based algorithm for multiple supply voltage assignment under timing constraints. Different with the traditional sensitivity based methods which focus on how to make full use of the slacks of non-critical gates, the proposed algorithm concentrates on critical gates. The circuit is initialized in the lowest power level, then the length of critical paths is tried...
Objects of technical diagnosing in the form of FPGA are complex and do not suppose full and compact representation by the table, a matrix, graph etc. In this connection in this article is offered to use as mathematical models of FPGA geometrical images of laws of functioning of state machine. At the representation of the state machine by geometrical image corresponding automata mapping will be transformed...
The computational complexity of multi-dimension assignment algorithm, which can be used to solve multi-sensor multi-target location and tracking problem based on time difference of arrival (TDOA) measurements, will increase exponentially with the scale of assignment problem. By the fact that multiple emitters usually exist separately in the surveillance space, the clustering technique is used to partition...
The aim of this contribution is to combine precision and grade, and explore new extended rough set model. Based on logical AND requirement of precision and grade, this paper proposes logical AND model of variable precision lower approximation operator and grade upper approximation operator. In the new model, basic structure and properties are obtained, and furthermore regular algorithm and structural...
Efficient hardware implementations of statistical inference continue to grow in importance for a wide range of computing applications. While CPU cycles are increasingly being used for statistical inference, transistors are also becoming increasingly statistical. For implementing statistical algorithms, could it be that statistical electronic substrates are a feature rather than a bug? We show that...
Design debugging is a manual and time consuming task which takes as much as 60% of the verification effort. To alleviate the debugging pain automated debuggers must tackle industrial problems by increasing their capacity and improving their performance. This work introduces an abstraction and refinement methodology for debugging that leverages the high level information inherent to RTL designs. Function...
The injection mold optimization problems always require huge computer resources, so the grid is a good choice for solving these problems. But for the heterogeneous, distributed and dynamic characters of the grid resources, it is difficult to finish the complex problems efficiently in collaborative way by grid. Based on the Globus Toolkits 4, a four-layer Mold Design Grid (MDG) platform was constructed...
A new non-local algorithm for accurately calculating the band-to-band tunneling current suitable for TCAD semiconductor simulators is proposed in this abstract. The proposed algorithm captures the essential physics of multi-dimensional tunneling in a 2D structure, and is designed to be robust and to achieve independence on the mesh grid. The new algorithm enables accurate modeling of T-FET and investigation...
With advances in semiconductor process technology, chip power density has dramatically increased, making power grid integrity a critical concern at all stages of the design process. Given the inherent difficulty of capturing worst-case IR drops for all logic gates with dynamic vectors, a static flow is essential for verifying grid integrity on complex chip designs, especially microprocessors. A novel...
While the CMOS analog circuits can be designed with the minimum-gate-length of the fabrication process in the alpha-power law MOSFET model, the length of a MOSFET gate has been chosen to be a larger scale than the minimum-gate-length in the conventional Shockleypsilas square model. In this paper, we describe a 6-b 100 MSPS CMOS current steering digital-to-analog converter (DAC) with the alpha-power...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.