The synergy between digital radio communications and VLSI signal processing is revolutionizing the design of wireless terminals. Driving this synergy are certain fundamental paradigms in modern communication theory, d...
详细信息
The synergy between digital radio communications and VLSI signal processing is revolutionizing the design of wireless terminals. Driving this synergy are certain fundamental paradigms in modern communication theory, digital signal processing, and VLSI design. The authors discuss the modern centers-of-gravity model, which they believe is emerging as the basis for the successful design and implementation of advanced digital communication systems. Central to this model are design principles that enable engineers to systematically derive digital receiver structures and explore algorithm and architecture trade-offs using sophisticated tools. Digital signal processing technology is critical in the implementation of these digital receiver structures efficiently. Finally, CAD tools for digital communications system design and design space exploration are shown to be of crucial importance in the efficient execution of these designs.< >
We propose a new algorithm for a triple-layer over-the-cell (OTC) routing in an irregular cell area, While other OTC routers assume that the cell structure is restricted to a certain type such as uniform height, our O...
详细信息
We propose a new algorithm for a triple-layer over-the-cell (OTC) routing in an irregular cell area, While other OTC routers assume that the cell structure is restricted to a certain type such as uniform height, our OTC router accepts both standard cells and custom cells. Our OTC channel routing consists of five steps: i) double-layer routing, ii) track-to-metal3 transformation, iii) segment-to-metal3 transformation, iv) segment-to-metal1 transformation, and v) triple-layer routing, We prove that the transformation steps can be executed in linear time. The effectiveness of our algorithm is demonstrated through physical circuit layouts with fully customized cells, Our algorithm is applied to route MCNC benchmark circuits and Deutsch's difficult problem resulting in a significant reduction in channel area.
A perennial problem facing flight simulator designers is how to handle motion system transients generated by washout algorithms intended to restrict the travel of the motion-base hardware. Motion cues in the flight si...
详细信息
A perennial problem facing flight simulator designers is how to handle motion system transients generated by washout algorithms intended to restrict the travel of the motion-base hardware. Motion cues in the flight simulator provide opportunities for lead compensation on the part of the pilot and thus one must ensure that onset transients are detected by the pilot. Likewise one must ensure that other unwanted motion transients generated by the system are not detected. The present study employs typical washout motion transients in an experiment designed to establish the motion levels required to achieve the aforementioned design goals. A set of critical amplitudes for both onset and return motion are determined in a flight simulator environment. It is found that a significant increase in detection levels occurs when the pilot switches from being a pure observer to actively controlling the simulator.
A description is given of an advanced 32-kb/s ADPCM (adaptive digital pulse code modulation) algorithm and its implementation in a single-chip custom LSI using 2- mu m CMOS technology. The performance of the proposed ...
详细信息
A description is given of an advanced 32-kb/s ADPCM (adaptive digital pulse code modulation) algorithm and its implementation in a single-chip custom LSI using 2- mu m CMOS technology. The performance of the proposed codec, in terms of voice and modems operating at 1200-9600 b/s, is also discussed. The results indicate that the codec provides speech quality equivalent to that of the CCITT G.721 ADPCM and is capable of transmitting V.23 1200 b/s and V.27 and V.29 4800 b/s signals over at least four asynchronous tandem links. It can also transmit V.29 modem signals at 7200 b/s over at least four and at 9600 b/s over two asynchronous tandem links, and V.32 signals at 9600 b/s over four asynchronous tandem links.< >
A one-dimensional gate assignment algorithm based on hierarchical contraction of nets is proposed. In this algorithm, a special feature of multiterminal nets plays an important role, namely that if the gates can be ar...
详细信息
A one-dimensional gate assignment algorithm based on hierarchical contraction of nets is proposed. In this algorithm, a special feature of multiterminal nets plays an important role, namely that if the gates can be arranged such that the nets with fewer terminals are shorter, the chip area will be much reduced. The algorithm consists of two phases, hierarchical contraction of nets and partial gate assignment. In the first phase, the original problem is partitioned to multiple levels with the basis on contraction of multiterminal nets, and in the next phase, the gates at each level are placed close to one another. Experimental results on logic circuits are shown which are superior to those obtained by the method presented by T. Fujii, et al. (ibid., ***-6, no.3, p.159-64, March 1987).< >
A mathematical model for dispersive, multiconductor transmission lines is introduced that makes possible the utilization of the Pade approximation via the Lanczos (PVL) process to the analysis of linear networks that ...
详细信息
A mathematical model for dispersive, multiconductor transmission lines is introduced that makes possible the utilization of the Pade approximation via the Lanczos (PVL) process to the analysis of linear networks that contain transmission line systems. The mathematical model is based on the use of Chebyshev polynomials for the representation of the spatial variation of the transmission-line voltages and currents, A simple collocation procedure is used to obtain a matrix representation of the transmission line equations with matrix coefficients that are first order polynomials in the Laplace-transform variable a and in which terminal transmission-line voltages and currents appear explicitly. Thus, the model is compatible with both the PVL algorithm and the modified nodal analysis formalism. Results from the numerical simulation of both digital interconnect-type and microwave circuits are presented to demonstrate the validity and discuss the efficiency of the proposed model.
An algorithm is proposed for solving the minimum-cost backbone network design problem. The method includes time delay as the performance criterion and multiple-hop communication paths. The algorithm combines a branch-...
详细信息
An algorithm is proposed for solving the minimum-cost backbone network design problem. The method includes time delay as the performance criterion and multiple-hop communication paths. The algorithm combines a branch-and bound method with the algorithm of L.R. Ford and D.R. Fulkerson (1962). The branch-and-bound method is used to find the network topology. A depth-first search using a cost heuristic that is a linear function of the maximum and current depth in the tree is used. When a feasible topology is found, the Ford-Fulkerson algorithm is applied to find the optimal paths. The resulting network is retained if it is the current optimum cost network. The algorithm is compared with a branch-and-bound algorithm and is found to produce globally optimal solutions. For large, sparsely connected networks computation times are reduced by a factor of over one thousand.< >
This study introduces an optimized image encryption algorithm that integrates Henon mapping and Arnold transformation to enhance the security and randomness of digital image encryption. The algorithm is designed to ad...
详细信息
This study introduces an optimized image encryption algorithm that integrates Henon mapping and Arnold transformation to enhance the security and randomness of digital image encryption. The algorithm is designed to address the vulnerabilities of open network environments where data theft or corruption can compromise image quality during encryption. Initially, images are processed through grayscale conversion to reduce dimensionality, followed by Henon mapping to induce a chaotic sequence that scrambles the pixel matrix. Subsequently, Arnold transformation is applied, iterating 100 times to further disrupt the image structure, ensuring a high level of diffusion and complexity. The proposed method demonstrates superior performance with an average pixel change rate (NPCR) of 0.9982 and a normalized average change intensity (NACI) of 0.3654, significantly increasing resistance to differential attacks. The encrypted images exhibit higher information entropy and effectively mask the original data, although at the cost of extended encryption time due to the dual scrambling process. The study concludes that the combined use of Henon mapping and Arnold transformation not only strengthens encryption against various attacks but also introduces a novel approach to image encryption, with potential for further optimization to enhance efficiency in handling larger images. This advancement is crucial for protecting privacy and ensuring data integrity in the transmission and storage of images, particularly in the face of evolving cyber threats.
The idea of adjusting the detection thresholds adaptively to enhance the performance of an overall tracking system has been one of the important areas studied in tracking community for the last ten years. However, mos...
详细信息
The idea of adjusting the detection thresholds adaptively to enhance the performance of an overall tracking system has been one of the important areas studied in tracking community for the last ten years. However, most of the previous work was developed for single target environments where a simple algorithm such as nearest neighbor (NN) or Probabilistic Data Association (PDA) filter was assumed to be used in the tracking system We study the issues of adaptive detection thresholds based on the assumption that an optimal assignment algorithm is adopted for a multitarget and cluttered environment. This research Is motivated by an important earlier work which makes the analytical evaluation of the optimal assignment algorithm possible. The performance measures considered for determining detection thresholds are the correct association probability and the expected estimation error. The analytical results obtained here represent the upper bound of the tracking performance and can be used for designing and evaluating a tracking system.
A serial interfacing scheme in which several embedded memories share the built-in, self-test circuit is presented. For external testing, this approach requires only two serial pins for access to the data path. There i...
详细信息
A serial interfacing scheme in which several embedded memories share the built-in, self-test circuit is presented. For external testing, this approach requires only two serial pins for access to the data path. There is considerable savings in routing area, and fewer external pins are needed to test random-access memories with wide words, such as those in application-specific integrated circuits for telecommunications. Even though the method uses serial access to the memory, a test pattern is applied every clock cycle because the memory itself shifts the test data. The method has been adapted to four common algorithms. In implementations of built-in self-test circuitry on several product chips, the area overhead was found to be acceptable.
暂无评论