Modern digital circuits consist of logic gates implemented in the complementary metal oxide semiconductor (C-MOS) technology. the time taken for a logic gate output to change after one or more inputs have changed is c...
详细信息
ISBN:
(纸本)0769522645
Modern digital circuits consist of logic gates implemented in the complementary metal oxide semiconductor (C-MOS) technology. the time taken for a logic gate output to change after one or more inputs have changed is called the delay of the gate. A conventional CMOS gate is designed to have the same input to output delay irrespective of which input caused the output to change. We propose a new gate designthat has different delays along various input to output paths within the gate. this is accomplished by inserting selectively sized "permanently on" series. transistors at the inputs of the logic gate. We demonstrate the use of the variable input delay CMOS gates for a totally glitch-free minimum dynamic power implementation of a digital circuit. Applying a previously described linear programming method to the c7552 benchmark circuit, we obtained a power saving of 58% over an unoptimized design. this power consumption was 18% lower than that for an alternative low power design using conventional CMOS gates. All circuits had the same overall delay. Since the overall delay was not allowed to increase, the glitch elimination with conventional gates required insertion of delay buffers on non-critical paths. the use of the variable input delay gates drastically reduced the required number of delay buffers.
As networks become faster there is an emerging need for security analysis techniques that can keep up withthe increased network throughput. the software Intrusion Detection systems (IDS), often included in the operat...
详细信息
ISBN:
(纸本)9781604234817
As networks become faster there is an emerging need for security analysis techniques that can keep up withthe increased network throughput. the software Intrusion Detection systems (IDS), often included in the operating system of a "firewall" node, evaluate the identifications of a packet directed toward the network to find intruders, but these systems are limited in performance due to the sequential nature of the imbedded processors employed in the system. One alternative is to develop a hardware-based Network IDS, which operates on rules downloaded by IT personnel in real-time such that the system reacts to it by blocking unauthorized traffic. the packet headers must be searched quickly and efficiently withthe rules database loaded in the system. the amount of time the search takes will depend on the number of rules loaded into the system and how they are accessed. this paper presents improved design and implementation of a scalable architecture of a hardwarebased high speed NIDS. the architecture is scalable from a protocol point of view and the rule database can be securely updated in real-time without affecting the normal functionality. the system is designed using Xilinx's Virtex-IIPro Field Programmable Gate Arrays (FPGA) devices which perform fast and efficient hardware packet serialization, de-serialization, rule comparison, and packets forwarding or rejection depending on the comparison result and the rule's action field. the development and testing has been successful as implemented in a 1 Gbps network.
this paper introduces the implementation of asynchronous pipelined circuits in MOS Current-Mode Logic (MCML). C-element and double-edge-triggered flip-flop are implemented in MCML and used in so-called micropipeline c...
详细信息
Principal Component Analysis (PCA) finds wide usage in computer-aided vision applications and one such application is face recognition. the neural network that performs PCA is called a Principal Component Neural Netwo...
详细信息
In this paper, we propose a VLSI architecture and provide prototype implementation of a chip that can insert both invisible and visible watermarks in DCT domain. To our knowledge, this is the firstever low power water...
详细信息
Today's intelligent electronic devices (IEDs) and robust communications processors contain large amounts of valuable substation data that have been available for years but largely overlooked. Initial integration e...
Today's intelligent electronic devices (IEDs) and robust communications processors contain large amounts of valuable substation data that have been available for years but largely overlooked. Initial integration efforts by most vendors focused solely on providing data access and control of Supervisory Control and Data Acquisition (SCADA) type data from the IEDs to replace separate SCADA hardware such as RTUs. Following the RTU replacement method led many vendors to use SCADA protocols to retrieve these data for use in supervisory operation. Choosing to use SCADA protocols, such as Modbus ® , DNP, and UCA led to the problem that data unsupported by these protocols were trapped in the IED and unavailable. Stranded data include historical performance information, equipment monitoring data, device diagnostic data, automation data, as well as settings and configuration information. A few innovative utilities have been managing these data through remote monitoring and making them available for use by all divisions of the company. Today's data tools and communications methods allow every utility to take advantage of these data to truly manage their power systems. this paper is a case study of remote data monitoring and data analysis design and techniques. this remote monitoring technology greatly reduces power system operation and maintenance (O&M) costs while providing valuable information to system planning and operating departments.
the emergence of the Session Initiation Protocol (SIP) promises simple and efficient handling of multimedia sessions among multiple users. In this work, we present the design and implementation of a VoIP system based ...
详细信息
ISBN:
(纸本)0769520510
the emergence of the Session Initiation Protocol (SIP) promises simple and efficient handling of multimedia sessions among multiple users. In this work, we present the design and implementation of a VoIP system based on SIP. Our SIP-based VoIP system provides a wide range of services multi-point call, multiple audio encoding formats, and complex functionalities such as call muting and call-hold facilities, and personal mobility support.
Generally, the 3D-virtual space applications need powerful image processing capability of computer platform and broadband network environment. therefore, user must perform appropriate setting of the system to receive ...
详细信息
ISBN:
(纸本)0769520510
Generally, the 3D-virtual space applications need powerful image processing capability of computer platform and broadband network environment. therefore, user must perform appropriate setting of the system to receive the service from the virtual space with comfortable QoS, under the circumstances when computer and network resource are changing in almost every moment. this research is aiming for the improvement in convenience of user of 3D-virtual space system by automatic QoS control mechanism. In this paper we propose a design and implementation of 3D-virtual space with QoS awareness based on multiagent framework.
Mobile terminals such as mobile phones are adopting a dual core processor having MPU core and DSP core inside. Dual core processor significantly benefits mobile terminals in terms of performance and power consumption....
详细信息
ISBN:
(纸本)0769520510
Mobile terminals such as mobile phones are adopting a dual core processor having MPU core and DSP core inside. Dual core processor significantly benefits mobile terminals in terms of performance and power consumption. However it makes the software development more complicated because both MPU and DSP requires its own development process. In order to improve the efficiency of software development with dual core processor, we Propose a DSP scripting language and its execution environment that enables direct DSP programming from MPU side. this paper describes the design, implementation, and evaluation of the prototype system.
Withthe number of users wanting to share and access data across enterprise networks and the Internet is increasing dramatically. network administrators now find that their server and network backbones lack the capaci...
详细信息
ISBN:
(纸本)0769520510
Withthe number of users wanting to share and access data across enterprise networks and the Internet is increasing dramatically. network administrators now find that their server and network backbones lack the capacity to handle the increased traffic. To achieve highly efficient connectivity between backbones and servers, and higher bandwidth of server network interface, we provide a method named as Ethernet Links Bundling technology (EIB). It is a high-speed networking solution that builds upon Fast Ethernet technology to provide a dramatic increase in network performance. In this paper, the implementation methods of the EIB technology are given and performance experiments are conducted. the results show that the network bandwidth can be scaled by the bundling of multiple Ethernet links and more reliable network connectivity can be guaranteed. And we also demonstrated that the EIB technology can be practically used in real applications such as FTP and SAMBA.
暂无评论