With the fast development of Terahertz (THz) related technologies,more and more applications,such as high bandwidth communications,radar,and secure detection,which require higher power,more reliable THz radiation *** ...
详细信息
With the fast development of Terahertz (THz) related technologies,more and more applications,such as high bandwidth communications,radar,and secure detection,which require higher power,more reliable THz radiation *** are different approaches to generate THz *** this paper,we mainly focus on the vacuum electronic technology,which has the potential to provide a sufficient high power to facilitate a wide range of THz applications.
In this paper, we propose a RT level power reduction scheme which can be used for any applications that have power problem when designers use traditional design flow. A novel wasting-toggle-rate based clock power redu...
详细信息
In this paper, we propose a RT level power reduction scheme which can be used for any applications that have power problem when designers use traditional design flow. A novel wasting-toggle-rate based clock power reduction technique is introduced and verified along with traditional design flow. The proposed technique can choose optimal clock-gating style selectively to minimize the power based on proposed wastingtoggle-rate analysis at RT level, and the optimization is based on proposed power equations without simulating the design at gate level. We have tested the proposed technique on real industrial multimedia-mobile-processor design. For the accuracy of the power optimization results, all of them are measured at gate level after synthesis by using industrial 65 nanometer technology library. The experimental results show that the technique reduces average 35.84% power comparing with non-clock gating design and 19.28% power comparing with clock-gating design by Power Compiler. The design overhead of the proposed technique is 1.79% increase of area and 2.55% increase of the critical path delay for whole circuit comparing with the original circuit.
The cell functions and development are regulated by complex networks of genes, proteins and other components by means of their mutual interactions. These networks are called gene regulatory networks (GRNs). GRNs are u...
详细信息
The cell functions and development are regulated by complex networks of genes, proteins and other components by means of their mutual interactions. These networks are called gene regulatory networks (GRNs). GRNs are used to reveal the fundamental gene regulatory mechanisms, to determine the reasons for many diseases and interactions between drugs and their targets. The introduction of experimental technologies such as microarrays, ChIP-chip which combines chromatin immunoprecipitation (ChIP) with microarrays and ChIP-Seq which combines ChIP with DNA sequencing, has provided a large number of available datasets related to gene expression and transcription factors (TFs) and their interactions. These datasets are basis for further analysis to reveal the gene regulation mechanisms. Many models have been applied to represent gene regulatory networks. We have used the dynamic Bayesian network model which is able to cope with missing data and can include a prior knowledge about transcription factors and their activation/inhibition of corresponding genes. We describe the obtained results and survey the common structure learning algorithms for learning of GRN's structure. We tested the obtained GRN for test datasets with different sizes and in the paper describe obtained dependencies between the ratio of Bayesian score and BIC and dataset size.
To implement substation ground wire of online monitoring application solutions using integration technology of wireless local area network and embedded systems, share the information of ground wire installed, increase...
详细信息
To implement substation ground wire of online monitoring application solutions using integration technology of wireless local area network and embedded systems, share the information of ground wire installed, increase production installed office efficiency, improve the level of substation ground management. To ensure safety in production in a certain role of supervision, has certain economic benefits and social benefits. Secondly, for substation online monitoring of development and application provides a new method for the future, then to lay the foundation of the substation informationization and automation.
Modernization of Indian railways has always been a question in focus for the development of the basic infrastructure of our country. Since the railways represent one of the best modes of transport available to the com...
详细信息
Modernization of Indian railways has always been a question in focus for the development of the basic infrastructure of our country. Since the railways represent one of the best modes of transport available to the common people, it would be impossible to just keep increasing the fares to meet costs incurred due to maintenance, the large workforce and the expansion activities. The railways should consider upgrading itself to cutting-edge technologies for better efficiency and cost reduction. One such up gradation is the role of information technology and e-ticketing which is achieved with the help of RFID technology. This RFID technology has been extensively used in the identification process these days with the help of a card and a reader. The idea has evolved from a systematic study of the computerization of railways and the loopholes in the present day system. A simple theoretical model is proposed which when implemented could result in an easier and better management of the tedious ticketing process.
By the relation of oil throttle pressure to flow volume and the deformation of throttle slice, the mathematics model and target function of valves parameters optimization design was built. Based on, the CAD soft wa...
详细信息
By the relation of oil throttle pressure to flow volume and the deformation of throttle slice, the mathematics model and target function of valves parameters optimization design was built. Based on, the CAD soft ware of valves parameters of telescopic shock absorber was developed. A practical design with the CAD soft ware was given, the performance test was conducted for the telescopic shock absorber designed by CAD, and the tested values fit the desired ones well. The experiment results show that the model of optimization design is accurate, and the CAD soft ware is reliable.
In this paper we propose a lossless data compressor in high level throughput using re programmable FPGA technology. Real time data compression is expected to play a crucial role in high rate data communication applica...
详细信息
In this paper we propose a lossless data compressor in high level throughput using re programmable FPGA technology. Real time data compression is expected to play a crucial role in high rate data communication applications. Most available approaches have largely overlooked the impact of mixed pixels and subpixel targets, which can be accurately modeled and uncovered by resorting to the wealth of spectral information provided by hyperspectral image data. In this paper, we proposed an FPGA-based data compressor on the concept of CAM and dictionary based compression technique has been proposed in this paper. It has been implemented on a Xilinx Spartan3 -II FPGA formed by several millions of gates, and with high computational power and compact size, which make this reconfigurable device very appealing for onboard, real-time data processing.
This paper sets the main focus on the evaluation of transparency,robustness and capacity of the embedding function of Substitution Techniques of digital audio steganography *** of steganography techniques have been de...
详细信息
This paper sets the main focus on the evaluation of transparency,robustness and capacity of the embedding function of Substitution Techniques of digital audio steganography *** of steganography techniques have been described in this ***,beside the evaluation of embedding parameters for the existing techniques,two problems-weaknesses-of Substitution Techniques are investigated which if they could be solved,the large capacity-strength-of Substitution Techniques would be practical.
The ever increasing of software technologies has brought closer technology to users with visual impaired *** diversification poses a real challenge to "authors" (developers and designers) when creating softw...
详细信息
The ever increasing of software technologies has brought closer technology to users with visual impaired *** diversification poses a real challenge to "authors" (developers and designers) when creating software that has to cope with a myriad of interaction situations,as well as specific directives for ensuring an accessible *** an advanced accessibility simulation tool,"authors" can obtain a better understanding of the accessibility constraints for visual impaired users within a Java Swing application by simulating each *** proposed NetBeans-enabled plugin tool will assist them,with a minimal effort,to explore user-centered design and important accessibility issues for their Java Swing implementations
Almost all of United Nations member countries are now operating government Web sites-called e-government. Its implementation is based on information technology which is now as important as tanks, ships, and aircraft i...
详细信息
Almost all of United Nations member countries are now operating government Web sites-called e-government. Its implementation is based on information technology which is now as important as tanks, ships, and aircraft in any nation's defense. So nowadays, with the fast development of information technology, e-government security is considered one of the crucial factors for achieving an advanced stage of e-government. As the number of e-government services introduced to the user increases, a higher level of e-government security is required. This article aims to formulate the key factors for security management. Firstly introduce the concept of e-government and information security, presents a review of ICT management in the public sector, information security management and e-government in recent literature by focusing on issues and trends. The paper then for successful e-government security management analyses the key factors. Put forward a managerial conceptual framework followed. Finally, the corresponding countermeasures for e-government management are proposed.
暂无评论