Considering from test time, test power and access, this article adopts new method that LFSR reseeding based on syncopation of some test patterns. In a test set, some patterns have a lot of confirmed bits and are hardl...
详细信息
ISBN:
(纸本)9787121113154
Considering from test time, test power and access, this article adopts new method that LFSR reseeding based on syncopation of some test patterns. In a test set, some patterns have a lot of confirmed bits and are hardly encoded by LFSR. They are syncopated and substituted by generating patterns. This method can reduce the number of seeds and improve the utilization of seed so that achieve the purpose of test data compression. Using in the benchmark circuits, experimental results show that it can better improve the compression rate and reduce the cost of test.
To address the problems of model degradation and low prediction accuracy in the of update procedure the rolling bearing life prediction model, the updating strategy of twin delayed deep deterministic policy gradient(T...
详细信息
In cognitive radio (CR),power allocation plays an important role in protecting primary user from disturbance of secondary user. Some existing studies about power allocation in CR utilize 'interference temperature'...
详细信息
In cognitive radio (CR),power allocation plays an important role in protecting primary user from disturbance of secondary user. Some existing studies about power allocation in CR utilize 'interference temperature' to achieve this protection,which might not be suitable for the OFDM-based CR. Thus in this paper,power allocation problem in multi-user orthogonal frequency division multiplexing (OFDM) and distributed antenna cognitive radio with radio over fiber (RoF) is firstly modeled as an optimization problem,where the limitation on secondary user is not 'interference temperature',but that total throughput of primary user in all the resource units (RUs) must be beyond the given threshold. Moreover,based on the theorem about maximizing the total throughput of secondary user,equal power allocation algorithm is introduced. Furthermore,as the optimization problem for power allocation is not convex,it is transformed to be a convex one with geometric programming,where the solution can be obtained using duality and Karush-Kuhn-Tucker (KKT) conditions to form the optimal power allocation algorithm. Finally,extensive simulation results illustrate the significant performance improvement of the optimal algorithm compared to the existing algorithm and equal power allocation algorithm.
Recently automotive nets are adopted to solve increasing problems in automotive electronic *** of automotive local area network from CAN and LIN can solve the problems of the increasing of wire bunch weight and lack i...
详细信息
Recently automotive nets are adopted to solve increasing problems in automotive electronic *** of automotive local area network from CAN and LIN can solve the problems of the increasing of wire bunch weight and lack in module installation ***,the multilayer automotive nets software becomes more and more complex,and the development expense is difficult to predict and to keep in *** this paper,the modeling method of hierarchical automotive nets and the substitution operation based on object-oriented colored Petri net(OOCPN) are *** OOCPN model which analyzes the software structure and validates the collision mechanism of CAN/LIN bus can speed the automobile system ***,the subsystems are divided and modeled by object-oriented Petri net(OOPN).According to the sets of message sharing relations,the message ports among them are set and the communication gate transitions are ***,the OOPN model is substituted step by step until the inner objects in the automotive body control modules(BCM) are indivisible and colored by colored Petri net(CPN).And the color subsets mark the node messages for the collision ***,the OOCPN model of the automotive body CAN/LIN nets is assembled,which keeps the message sets and the system can be *** proposed model is used to analyze features of information sharing among the objects,and it is also used to describe each subsystem real-time behavior of processing messages and implemental device controllers operating,and puts forward a reasonable software framework for the automotive body control *** research can help to design the communication model in the automotive body system effectively and provide a convenient and rapid way for developing the logical hierarchy software.
Solar radiation is strongly absorbed by soot aggregate. And the atmospheric radiative properties will be affected by the change of aggregate morphology. Based on fractal theory, the morphological properties of soot ag...
详细信息
The relay selection and power allocation of cooperative MIMO with multiple-antenna terminals are investigated. Based on the classic worst-link-first algorithm, we propose a joint power allocation and relay selection a...
详细信息
Privacy amplification (PA) is a vital step in the postprocessing stage of quantum key distribution, which can extract a secure key from a source partially leaked to the environment. We propose a PA scheme that uses th...
详细信息
Privacy amplification (PA) is a vital step in the postprocessing stage of quantum key distribution, which can extract a secure key from a source partially leaked to the environment. We propose a PA scheme that uses the square hash (SQH)–modular arithmetic hash (MH) function. In consideration of a potential quantum attacker, we use the trace distance as a metric to measure the closeness between two classical-quantum states. We transform a raw key state to a processed state using this scheme and derive the trace distance between the processed state and the ideal target state. It is proven that the trace distance can be reached as small as desired. Additionally, our approach accelerates the SQH-MH function through the number-theoretic transform, reducing the computational complexity to O(nlog n). On the basis of a CPU, a maximum throughput rate of 1.06 Gbit/s is achieved, and the results show that our algorithm demonstrates good stability of the throughput rate when handling tasks with different compression ratios.
A strategy was proposed to predict accurately the dielectric permittivity and dielectric strength based on the Onsager local field *** molecular dynamic simulation was utilised to analyse the dipole moment fluctuation...
详细信息
A strategy was proposed to predict accurately the dielectric permittivity and dielectric strength based on the Onsager local field *** molecular dynamic simulation was utilised to analyse the dipole moment fluctuation in polyimide(PI)to reflect the polar-isation response of applied electric *** simulation results revealed that the optical dielectric permittivity and static dielectric permittivity were 2.62 and 3.34,showing that the electronic displacement polarisation of the PI acted as a major *** deviation between simulated and measured values of the frequency-dependent relative dielectric permittivity was no more than 5%,which exhibited high *** the polarisation response of the polar groups in the PI was at infrared frequencies,the conductive loss may be the dominant role in 102–106 Hz at room ***,the effect of Joule heat on the structure,dielectric permittivity and Young modulus was considered to accurately predict the dielectric strength of the PI(359 kV/mm),which was in agreement with experimental values in the *** results establish a clear correlation between structural characteristics and dielectric properties of the PI,which would be the theoretical insights into the design and synthesis of the PI with tailored dielectric properties.
Interference signals recognition plays an important role in anti-jamming *** the development of deep learning,many supervised interference signals recognition algorithms based on deep learning have emerged recently an...
详细信息
Interference signals recognition plays an important role in anti-jamming *** the development of deep learning,many supervised interference signals recognition algorithms based on deep learning have emerged recently and show better performance than traditional recognition ***,there is no unsupervised interference signals recognition algorithm at *** this paper,an unsupervised interference signals recognition method called double phases and double dimensions contrastive clustering(DDCC)is ***,in the first phase,four data augmentation strategies for interference signals are used in data-augmentation-based(DA-based)contrastive *** the second phase,the original dataset’s k-nearest neighbor set(KNNset)is designed in double dimensions contrastive *** addition,a dynamic entropy parameter strategy is *** simulation experiments of 9 types of interference signals show that random cropping is the best one of the four data augmentation strategies;the feature dimensional contrastive learning in the second phase can improve the clustering purity;the dynamic entropy parameter strategy can improve the stability of DDCC *** unsupervised interference signals recognition results of DDCC and five other deep clustering algorithms show that the clustering performance of DDCC is superior to other *** particular,the clustering purity of our method is above 92%,SCAN’s is 81%,and the other three methods’are below 71%when jammingnoise-ratio(JNR)is−5 *** addition,our method is close to the supervised learning algorithm.
As the space environment of information transmission becomes more and more complex, the accuracy of communication becomes a new challenge. In order to study the anti-jamming performance of code shift keying (CSK), thi...
详细信息
暂无评论