首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
In this paper the connection between massM, resistance and commute time for random walks on graphs is further explored, and the relation=2M · is proved. An extension of the result is made to multigraphs, which are an extension of the graph concept where a black box is treated like an edge.  相似文献   

2.
An approximation result is given concerning Gaussian radial basis functions in a general inner product space. Applications are described concerning the classification of the elements of disjoint sets of signals, and also the approximation of continuous real functions defined on all of n using radial basis function (RBF) networks. More specifically, it is shown that an important large class of classification problems involving signals can be solved using a structure consisting of only a generalized RBF network followed by a quantizer. It is also shown that Gaussian radial basis functions defined on n can uniformly approximate arbitrarily well over all of n any continuous real functionalf on n that meets the condition that |f(x)|0 as x.  相似文献   

3.
Differential cryptanalysis is a method of attacking iterated mappings based on differences known as characteristics. The probability of a given characteristic is derived from the XOR tables associated with the iterated mapping. If is a mapping : Z 2 m , then for each , X, Y Z 2 m the XOR table for gives the number of input pairs of difference X=X+X for which gp(X)+(X)=Y.The complexity of a differential attack depends upon two properties of the XOR tables: the density of zero entries in the table, and the size of the largest entry in the table. In this paper we present the first results on the expected values of these properties for a general class of mappings . We prove that if : Z 2 m Z 2 m is a bijective mapping, then the expected size of the largest entry in the XOR table for is bounded by 2m, while the fraction of the XOR table that is zero approaches e –1/2=0.60653. We are then able to demonstrate that there are easily constructed classes of iterated mappings for which the probability of a differential-like attack succeeding is very small.The author is presently employed by the Distributed System Technology Center, Brisbane, Australia.  相似文献   

4.
The classical notion of the -generalized nullspace, defined on a matrixA R n×n,where is an eigenvalue, is extended to the case of ordered pairs of matrices(F, G), F, G R m×nwhere the associated pencilsF – G is right regular. It is shown that for every C {} generalized eigenvalue of (F, G), an ascending nested sequence of spaces {P i ,i=1, 2,...} and a descending nested sequence of spaces {ie495-02 i=1, 2,...} are defined from the -Toeplitz matrices of (F, G); the first sequence has a maximal elementM * , the -generalized nullspace of (F, G), which is the element of the sequence corresponding to the index , the -index of annihilation of (F, G), whereas the second sequence has the first elementP * as its maximal element, the -prime space of (F, G). The geometric properties of the {M i ,i=1, 2,..., and {P i ,i=1, 2,...sets, as well as their interrelations are investigated and are shown to be intimately related to the existence of nested basis matrices of the nullspaces of the -Toeplitz matrices of (F, G). These nested basis matrices characterize completely the geometry ofM * and provide a systematic procedure for the selection of maximal length linearly independent vector chains characterizing the-Segre characteristic of (F, G).  相似文献   

5.
This paper investigates the properties of the two-variable polynomialu (, z) built on the first column of the adjoint matrix ofI -C, whereC is a given Hermitian Toeplitz matrix. In particular, the stability properties ofu (,z) are discussed and are shown to depend essentially on the location of X with respect to the eigenvalues ofC. The eigenvectors ofC, which have recently found some applications in signal processing and estimation theory, are obtained from the polynomialu(,z) when tends to the eigenvalues ofC. This allows one to derive several results concerning the eigenpolynomials, including those for the case of multiple eigenvalues.  相似文献   

6.
This paper presents a methodology for characterizing the random component of transistor mismatch in CMOS technologies. The methodology is based on the design of a special purpose chip which allows automatic characterization of arrays of NMOS and PMOS transistors of different sizes. Up to 30 different transistor sizes were implemented in the same chip, with varying transistors width W and length L. A simple strong inversion large signal transistor model is considered, and a new five parameters MOS mismatch model is introduced. The current mismatch between two identical transistors is characterized by the mismatch in their respective current gain factors /, V TO threshold voltages , bulk threshold parameters , and two components for the mobility degradation parameter mismatch 0 and e. These two components modulate the mismatch contribution differently, depending on whether the transistors are biased in ohmic or in saturation region. Using this five parameter mismatch model, an extraordinary fit between experimental and computed mismatch is obtained, including minimum length (1 m) transistors for both ohmic and saturation regions. Standard deviations for these five parameters are obtained as well as their respective correlation coefficients, and are fitted to two dimensional surfaces f(W, L) so that their values can be predicted as a function of transistor sizes. These functions are used in an electrical circuit simulator (Hspice) to predict transistor mismatch. Measured and simulated data are in excellent agreement.  相似文献   

7.
The problem of designing a stabilizing compensator for a control system to achieve prescribed initial value constraints (i)(0+)=yi is considered. Indeed, modulo certain technical conditions, such a compensator exists if and only if yi=0;i= 0,1,...,rp +rt –2; whererp is the relative degree of the plant andrt is the relative degree of the system input. This theorem is derived and a complete parameterization of the set of compensators that achieve the prescribed design constraints is formulated.This research was supported in part by NSF Grant No. 921106.  相似文献   

8.
The issue of stability of higher-order, single-stage Sigma-Delta () modulators is addressed using a method from nonlinear system theory. As a result, theoretical bounds for the quantizer input of the modulators are derived. A new method for stabilizing the modulators is then presented. It uses the quantizer input bound for possible instability detection. Upon detection of such a state, the highest-order integrator is cut off, effectively reducing the order of the modulator, and thus resulting in a stable system. The method is easily implemented and results in a very good signal-to-noise ratio (SNR) and fast return to normal operation compared to other stabilization methods.Financial support from General Secretariat for Research and Technology of Greece under contract PENED 95/1729.  相似文献   

9.
This paper presents an overview of the methodology used to model the resource allocation decisions of a research organisation using system dynamics. The resulting model combined the concept of aging chains and co-flows of System Dynamics with conventional spreadsheet analysis, and included representations of staff development and turnover; patent development and licensing revenue; and revenue from other sources. Using the model, senior management were able to evaluate the impact over the coming years of different resource allocation strategies.  相似文献   

10.
Uniform quantization of random vectors onto -grids n is considered. Higherorder terms in asymptotic expansions for the entropy of the -quantized random vector and for the loss of the mutual information between two random vectors under such quantization as 0+are obtained. The coefficients in these asymptotics are explicitly calculated for Gaussian distributed vectors. Taken for initial segments of stationary Gaussian sequences, these factors have limit average values per unit of time. For such sequences governed by state-space equations, computation of these average values is reduced to solutions of algebraic matrix Riccati and Lyapunov equations.Work supported by the Australian Research Council grant A 4970 2246.  相似文献   

11.
A computer simulation is carried out to investigate the power consumption of major quasi-adiabatic logic gates. Anomalously high dissipation is found at low clock rates. An explanation for the anomaly and a method of eliminating this are proposed. For the dissipated energy W and the clock rate f, it is found that W f C 1 + as f tends to infinity, where is essentially less than unity. The mechanism of the phenomenon is identified. Rules are established that govern the power consumption of the logic gates. It is concluded that they should help one to strike a balance between power consumption and speed, to optimize power characteristics, and to predict the performance of future models made by better process technologies.  相似文献   

12.
We first show that for some kinds of signals a bandwidth and time duration reduction technique can be used to simulate waveform distortions caused by moving targets, that is, it is correct to measure the waveform distortions at very large TB with relatively small by reducing TB and increasing while keeping TB unchanged, where T is the duration of the transmitted signal, B is the bandwidth and is the relative speed of targets. We then study the waveform distortions in SAR signals caused by moving antenna. Based on the bandwidth and time duration reduction technique, a lot of time and memory are saved in simulations. We then confirm by simulations that waveform distortions do pose problems when processing very large bandwidth and long duration SAR data using conventional SAR processing methods. Finally we propose the concepts of wideband and narrowband processing of SAR data. Models are set up for wideband and narrowband SAR data processing, and new methods are presented for reconstructing targets using the proposed models. Simulations show that the methods can improve the quality of the simulated SAR images.  相似文献   

13.
The problem of estimating the volume lifetime v of minority carriers in p-type Si wafers by surface-photovoltage measurements is addressed. An experiment is conducted in order to ascertain the relationship between measured and actual values of v. The measurements are carried out on circular specimens whose thickness is reduced from about 2000 to 450 m by stepwise etching. The specimens are cut from a Czochralski-grown rod, their actual values of v ranging from 10 to 300 s. The surface recombination rate of minority carriers is determined on both sides of the specimens covered with native oxide, the sides differing in surface finish. The results of the experiment allow one to determine v up to about 400 s.  相似文献   

14.
A relation between the types of symmetries that exist in signal and Fourier transform domain representations is derived for continuous as well as discrete domain signals. The symmetry is expressed by a set of parameters, and the relations derived in this paper will help to find the parameters of a symmetry in the signal or transform domain resulting from a given symmetry in the transform or signal domain respectively. A duality among the relations governing the conversion of the parameters of symmetry in the two domains is also brought to light. The application of the relations is illustrated by a number of two-dimensional examples.Notation R the set of real numbers - R m R × R × ... × R m-dimensional real vector space - continuous domain real vector - L {¦ – i , i = 1,2,..., m} - m-dimensional frequency vector - W {i ,i=1,2,..., m} - m-dimensional normalized frequency vector - P {¦ – i , i=1,2,...,m} - g(ol) g (1,2,..., m ) continuous domain signal - () ( 1 2,..., m )=G (j 1,j 2,..., j m ) Fourier transform ofg (ol) - (A,b,,,) parameters ofT- symmetry - N the set of integers - N m N × N × ... × N m-dimensional integer vector spacem-dimensional lattice - h(n) h (n 1,.,n m ) discrete domain signal - H() Fourier transform ofh (n) - v 1,v 2,..., vm m sample-direction and interval vectors - V (v 1 v 2 ...v m ) sampling basis matrix - [x]* complex conjugate ofx - detA determinant ofA - X {x¦ – x i , i=1,2,..., m} - A t [A –1] t ,t stands for transpose This work was supported in part by the Natural Sciences and Engineering Research Council of Canada under Grant A-7739 to M. N. S. Swamy and in part by Tennessee Technological University under its Faculty Research support program to P. K. Rajan.  相似文献   

15.
The recent interest in delta-operator (or, -operator) formulated discrete-time systems (or, -systems) is due mainly to (a) their superior finite wordlength characteristics as compared to their more conventional shift-operator (or,q-operator) counterparts (or,q-systems), and (b) the possibility of a more unified treatment of both continuous- and discrete-time systems. With such advantages, design, analysis, and implementation of two-dimensional (2-D) discrete-time systems using the -operator is indeed warranted. Towards this end, the work in this paper addresses the development of an easily implementabledirect algorithm for stability checking of 2-D -system transfer function models.Indirect methods that utilize transformation techniques are not pursued since they can be numerically unreliable. In developing such an algorithm, a tabular form for stability checking of -system characteristic polynomials with complex-valued coefficients and certain quantities that may be regarded as their corresponding Schur-Cohn minors are also proposed.  相似文献   

16.
Simulation and design of microfluidic systems requires various level models: high-fidelity models (usually 3D) for design and optimization of particular elements and devices, as well as system-level models allowing for VLSI-scale simulation of such systems. For the latter purpose, reduced or compact models are necessary to make such system simulations computationally feasible. In this paper, we present a design methodology and practical approach for generation of compact models of microfluidic elements. In this procedure we use high-fidelity 3D simulations of the microfluidic devices to extract their characteristics for compact models, and subsequently, to validate the compact model behavior in various regimes of operation. The compact models are generated automatically in the formats that can be directly used in SPICE or SABER. As an example of a nonlinear fluidic device, the generation of compact model for Tesla valve is described in detail. Tesla valve is one of the no-moving-parts (NMP) valves used in micropumps in MEMS. Its principle of operation is based on the rectification of the fluid, so it may be considered as a fluidic diode.  相似文献   

17.
Composite axially symmetric immersion ion lenses are considered that consist of an electrostatic and a magnetic lens. For the first time, their performance is evaluated over the entire range of operating conditions: from the case of a zero magnetic field to the case of a zero ion energy on the target. Operating conditions are characterized in terms of = W t/W 0, where W 0 is the energy of an ion at the boundary of the region in which the trajectories are parallel to the axis and W t is that on the target. For the first time, simple analytical approximations are derived for C c/r, C s/r, f/r, and NI, where C c is the chromatic-aberration coefficient, C s is the third-order spherical-aberration coefficient, f is the focal distance, NI is the magnetomotive force of the coil, and r is the outer radius of the coil. The behavior of the four quantities is explored as a function of . The following conclusions are drawn: (i) The aberrations are maximum for a zero magnetic field. (ii) The aberration coefficients decrease monotonically with increasing NIand decreasing , the lens changing from an accelerating to a decelerating one. (iii) If , then C s/r1/4, C c/r1/6, f/r1/3, and NI–1/2. (iv) The lenses are suitable for resistless heavy-ion projection lithography and can provide 20 × 1011 pixels of area 2 × 2 nm2 for an exposed area of 3 × 3 mm2. (v) Used in heavy-ion microprobe systems, the lenses could enable resistless lithography over much larger areas than existing equipment.  相似文献   

18.
An integrated CMOS amplifier channel consisting of a transimpedance preamplifier, postamplifiers, and gain control circuitry has been designed for the receiver of a pulsed time-of-flight laser radar. The measurement results, a total transimpedance ofZ t 250 k with a bandwidth ofBW 65 MHz and an input-referred noise current ofi ni 7 pA/Hz, show that a range measurement resolution of centimeter/decimeter class could be achieved by detecting the edge of the received laser pulse.  相似文献   

19.
A 70-MHz continuous-time CMOS band-pass modulator for GSM receivers is presented. Impulse-invariant-transformation is used to transform a discrete-time loop-filter transfer function into continuous-time. The continuous-time loop-filter is implemented using a transconductor-capacitor (G m -C) filter. A latched-type comparator and a true-single-phase-clock (TSPC) D flip-flop are used as the quantizer of the modulator. Implemented in a MOSIS HP 0.5-m CMOS technology, the chip area is 857 m × 420 m, and the total power consumption is 39 mW. At a supply voltage of 2.5 V, the maximum SNDR is measured to be 42 dB, which corresponds to a resolution of 7 bits.  相似文献   

20.
Antenna diversity is an important technique to combat fading and reduce cochannel interference (CCI). In this paper, we present an analytical approach to derive bit error rate (BER) for Optimum Combining (OC) and Maximal Ratio Combining (MRC) in the presence of CCI. The paper has two parts. In the first part, the analysis of BER for OC with two cochannel interferers and MRC with an arbitrary number of interferers is presented for Marray antenna systems under the assumption that the channels of users are independent of each other. In the second part, the analysis of BER for OC and MRC in the presence of one dominant cochannel interferer is presented for dual antenna systems by assuming that the channels of the desired user or cochannel interferer are correlated. For DPSK signal, an exact BER expression is derived. The work presented here also yields an upper bound for BPSK or QAM signal based on the results of Foschini and Salz (1983).  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号