We present a combined hardware-software based approach to scan-chain diagnosis, when the outcome of a test may be affected by system faults occurring in the logic out-side of the scan chain. For the hardware component...
详细信息
We present a combined hardware-software based approach to scan-chain diagnosis, when the outcome of a test may be affected by system faults occurring in the logic out-side of the scan chain. For the hardware component we adopt the double-tree scan (DTS) chain architecture, which has previously been shown to be effective in reducing power, volume, and application time of tests for stuck-at and delay faults. We develop a version of flush test which can resolve a multiple fault in a DTS chain to a small number of suspect candidates. Further resolution to a unique multiple fault is enabled by the software component comprising of fault simulation and analysis of the response of the circuit to test patterns produced by ATPG. Experimental results on benchmark circuits show that near-perfect scan-chain diagnosis for multiple faults is possible even when a large number of random system faults are injected in the circuit.
Designing efficient and secure group key agreement scheme is one of the key issues in mobile ad hoc networks. In this paper, a novel group key agreement scheme for mobile ad hoc networks based on threshold secret shar...
详细信息
Designing efficient and secure group key agreement scheme is one of the key issues in mobile ad hoc networks. In this paper, a novel and feasible group key agreement scheme based on identity is proposed. With this sch...
详细信息
Designing efficient and secure group key agreement scheme is one of the key issues in mobile ad hoc networks. In this paper, the Merkle identity tree is firstly introduced, then an efficient scheme based on Merkle ide...
详细信息
Taking the Chinese-Singapore cooperation project as example, combine the feedback from questionnaires and interviews of students about the bilingual teaching using teaching material in English in the course Operating ...
详细信息
The existing service migration methods bring the server cluster heavy burden, and their time spending is so high that seriously affects the service continuity. In order to enhance the survivability of IP network servi...
详细信息
The existing service migration methods bring the server cluster heavy burden, and their time spending is so high that seriously affects the service continuity. In order to enhance the survivability of IP network services, the paper puts forward an intent-perceptible service migration model (ISM). In this model, we design a novel trigger mechanism and object selecting method for service migration, and make the service migration intention perceptible for the client with the cooperation of the server. The evaluation results show that ISM model can not only ensure the service invulnerability by maintaining a high randomness of service migration, but also improve the service continuity by reducing the service gap time spending on service migration to the maximum extent. Therefore, ISM model can enhance IP network survivability efficiently.
By using virtual instrument technology, a direct digital control bioreactor is developed, which is able to be remote controlled through internet. Mathematical model of the bioreaction system is developed, which is use...
By using virtual instrument technology, a direct digital control bioreactor is developed, which is able to be remote controlled through internet. Mathematical model of the bioreaction system is developed, which is used in prediction of the unmeasured process variables and the model based process control.
Barrier coverage is an important problem for sensor networks to fulfill some given sensing tasks. Barrier coverage guarantees the detection of events happened crossing a barrier of sensors. In majority study of barrie...
详细信息
Barrier coverage is an important problem for sensor networks to fulfill some given sensing tasks. Barrier coverage guarantees the detection of events happened crossing a barrier of sensors. In majority study of barrier coverage using sensor networks, sensors are assumed to have an isotropic sensing model. However, in many applications such as monitoring an area using video camera, the sensors have directional sensing model. In this paper, we investigate strong barrier coverage using directional sensors, where sensors have arbitrarily tunable orientations to provide good coverage. We investigate the problem of finding appropriate orientations of directional sensors such that they can provide strong barrier coverage. By exploiting geographical relations among directional sensors and deployment region boundaries, we first introduce the concept of virtual node to reduce the solution space from continuous domain to discrete domain. We then construct a directional barrier graph (DBG) to model this barrier coverage question such that we can quickly answer whether there are directional sensors' orientations that can provide strong barrier coverage over a given belt region. If the belt region is strong barrier covered, we then develop energy-efficient solutions to find strong barrier path(s) that will approximately minimize the total or the maximum rotation angles of all directional sensors. Extensive simulations are conducted to verify the effectiveness of our solution.
A critical function of wireless sensor networks (WSNs) is data gathering. While, one is often only interested in collecting a relevant function of the sensor measurements at a sink node, rather than downloading all th...
详细信息
ISBN:
(纸本)9781424499199
A critical function of wireless sensor networks (WSNs) is data gathering. While, one is often only interested in collecting a relevant function of the sensor measurements at a sink node, rather than downloading all the data from all the sensors. This paper studies the capacity of computing and transporting the specific functions of sensor measurements to the sink node, called aggregation capacity, for WSNs. It focuses on random WSNs that can be classified into two types: random extended WSN and random dense WSN. All existing results about aggregation capacity are studied for dense WSNs, including random cases and arbitrary cases, under the protocol model (ProM) or physical model (PhyM). In this paper, we propose the first aggregation capacity scaling laws for random extended WSNs. We point out that unlike random dense WSNs, for random extended WSNs, the assumption made in ProM and PhyM that each successful transmission can sustain a constant rate is over-optimistic and unpractical due to transmit power *** derive the first result on aggregation capacity for random extended WSNs under the generalized physical model. Particularly, we prove that, for the type-sensitive perfectly compressible functions and type-threshold perfectly compressible functions, the aggregation capacities for random extended WSNs with n nodes are of order Θ ((log n) -β/2-1 ) and Θ (((log n) -β/2 )/(log log n)), respectively, where β >; 2 denotes the power attenuation exponent in the generalized physical model.
暂无评论