首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 140 毫秒
1.
How to find efficient and secure member- ship revocation algorithms is one of the most important issues standing in the way of real-world applications of group signatures. In this paper, the proof of knowledge of divisibility is given and a novel membership revocation method in ACJT group signature scheme is proposed: the group manager issues the product E of the public keys of current members in the group, when a group member wants to sign, he should not only proves that he has a membership certificate, but also proves that the public key in his certificate divides exactly the public key product E with zero knowledge. The proposed method is efficient since the group manager only needs one division and one exponentiation when a group member is deleted, while the signing and verifying procedure are independent of the number of current group members and excluded members, as well as the original group public key and membership certificates needn't be changed.  相似文献   

2.
To solve the problem that most of existing layered multicast protocols cannot adapt todynamic network conditions because their layers are coarsely granulated and static,a new congestioncontrol mechanism for dynamic adaptive layered multicast(DALM) is presented.In this mechanism,anovel feedback aggregating algorithm is put forward,which can dynamically determine the number oflayers and the rate of each layer,and can efficiently improve network bandwidth utilization ratio.Additionally,because all layers is transmitted in only one group,the intricate and time-consuminginternet group management protocol(IGMP) operations,caused by receiver joining a new layer orleaving the topmost subscribed layer,are thoroughly eliminated.And this mechanism also avoids otherproblems resulted from multiple groups.Simulation results show that DALM is adaptive and TCPfriendly.  相似文献   

3.
The output characteristics of nonlinear optical fiber-loop mirror are analyzed in detail when the pump pulses with the same wavelength are input in the both directions for recovering the clock component of the signal spectrum.It is found that the double output pulses are produced in the transmission port of the nonlinear optical fiber-loop mirror.The output pulse peaks are located in time domain at the rising and falling edges of the pump pulses.It is demonstrated that the rising and falling edges of the pump pulse can be directly extracted by this method.Through numerical simulation,the effects of therelative delay of pump pulses and the dispersion of fiber on the characteristics of output pulses are studied.By spectrum analysis,it is found that the spectrum of output pulse sequence includes the clock components of the pump pulse sequence,and a new idea is provided for all-optical clock extraction.  相似文献   

4.
The low power design of a field sequential color (FSC) liquid crystal on silicon (LCoS) chip for near-to-eye application is presented in this paper. Dual power supplies are used in the design, that is, the supply for part of driving circuits is 3.3 V, and the one for the active matrix is 5.0 V. Serial-to-parallel conversion circuits are adopted to lower the pixel clock frequency of the chip. Also, an idle state is inserted into the pixel clock signal to decrease the switching activity factor to further reduce the power consumption. The LCoS chip is fabricated with 0.35 μm CMOS process and its power consumption is only about 300 mW.  相似文献   

5.
In this paper, we proposed a campus equipment ubiquitous-management system which is based on a genetic algorithm approach in cloud server. The system uses radio frequency identification (RFID) to monitor the status of equipment in real time, and uses wire or wireless network to send real-time situation to display on manager’s PC or PDA. In addition, the system will also synchronize with database to record and reserve message. Furthermore, the status will display not only to a single manager but also a number of managers. In order to increase efficiency between graphical user interface (GUI) and database, the system adopts SqlDependency object of ADO.NET so that any changed situation of the database could be known immediately and synchronized with manager’s PC or PDA. Because the problem of the equipment utilization is an NP-complete (non-deterministic polynomial) problem, we apply genetic algorithm to enhance the efficiency of finding optimum solution for equipment utilization. We assign constraints into the system, and the system will post back the optimum solution simultaneously on the screen. As a consequence, we compare our genetic algorithm based approach (GA) with the simulated annealing based approach (SA) for maximizing the equipment utilization. Experimental result shows that our GA approach achieves an average 79.66% improvement in equipment utilization in an acceptable run time.  相似文献   

6.
Three space vector pulse width modulation (SVPWM) schemes, called 7-segment space vector modulation (SVM), 5-segment SVM and 3-segment SVM are studied in this paper. The basic principle of SVPWM is presented. The switching sequence of different scheme is described. The modulation signals, DC bus voltage utilization, and output line voltage harmonic of these schemes are analyzed by the MATLAB software with different modulation index M and frequency modulation index N. The simulation results are analyzed and show that discontinuous modulating functions lead a reduction of switching actions. The DC bus voltage utilization of three schemes is almost the same. For all three SVM, the frequency modulation index N will affect the harmonic characteristic, and the modulation index M will affect DC bus voltage utilization and the harmonic content. The experiment is implemented by the DSP of TMS320F2812. The results validate three algorithms and the simulation.  相似文献   

7.
The problem of power allocation in cognitive radio networks plays an important role to improve the efficiency of spectrum utilization. However, most of previous works focus on the power allocation for secondary users in spectrum sharing overlay or spectrum sharing underlay, which needs to frequently handoff between the idle spectrum bands or considers the interference constraints in all spectrum bands respectively. In order to reduce the handoff and fully utilize the spectrum resource, we propose a new spectrum sharing paradigm which not only can just need to adjust the transmit power in spectrum bands instead of frequently handoff between idle spectrum bands, but can fully utilize the spectrum resource as we only consider the interference power constraints in active spectrum bands rather than in all spectrum bands. Then based on this new spectrum sharing paradigm and the constraint conditions, we study the distributed power allocation for secondary users and formulate the optimization problem as a non-cooperative game problem, after that the variational inequality approach is used to solve this game problem and a Nash equilibria solution is got, finally simulation results are illustrated to demonstrate the performance of the proposed scheme.  相似文献   

8.
A content authentication technique based on JPEG-to-JPEG watermarking is proposed in this paper. In this technique, each 8x8 block in a JPEG compressed image is first processed by entropy decoding, and then the quantized discrete cosine transform (DCT) is applied to generate DCT coefficients: one DC coefficient and 63 AC coefficients in frequency coefficients. The DCT AC coefficients are used to form zero planes in which the watermark is embedded by a chaotic map. In this way, the watermark information is embedded into JPEG compressed domain, and the output watermarked image is still a JPEG format. The proposed method is especially applicable to content authentication of JPEG image since the quantized coefficients are modified for embedding the watermark and the chaotic system possesses an important property with the high sensitivity on initial values. Experimental results show that the tamper regions are localized accurately when the watermarked JPEG image is maliciously tampered.  相似文献   

9.
A novel scheme for all-optical ultra-wideband triplet signal pulse generation based on the cross-gain modulation (XGM) in a single semiconductor optical amplifier (SOA) is demonstrated. In this scheme, only one optical source and one SOA are needed, so the configuration is simple. Due to only one wavelength is included in the generated triplet pulse, no time difference between output signal light and probe light is introduced during the transmission process. By using the software of Optisystem 7.0, the impacts of the input signal width, the optical power and the wavelength of the optical source on the generated triplet pulse are numerically simulated and studied. The results show that the proposed scheme has better triplet signal pulse when the input signal pulse width is larger, and it is insensitive to the wavelength change within a certain range.  相似文献   

10.
In this paper, an extended Kendall model for the priority scheduling input-line group output with multi-channel in Asynchronous Transfer Mode (ATM) exchange system is proposed and then the mean method is used to model mathematically the non-typical non-anticipative PRiority service (PR) model. Compared with the typical and non-anticipative PR model, it expresses the characteristics of the priority scheduling input-line group output with multi-channel in ATM exchange system. The simulation experiment shows that this model can improve the HOL block and the performance of input-queued ATM switch network dramatically. This model has a better developing prospect in ATM exchange system.  相似文献   

11.
薛琳  郭爱煌 《半导体光电》2012,33(5):722-727
针对IP over WDM网络,建立了整数线性规划(ILP)最小功耗模型,计算了满足峰值业务需要开启的设备数目;对于低峰业务提出休眠机制,分别利用最小光路数算法与最小跳数算法,在保证连接无阻塞的情况下找出空闲设备,对比峰值业务得到不同算法下的设备使用率,确定IP over WDM网络的节能潜力。结果表明,ILP优化模型的网络功耗最小,最小光路数算法次之;低峰业务下利用休眠机制可以关闭设备的比例占40%~60%;采用最小光路数算法的休眠机制节能效果较优。  相似文献   

12.
电子表格模型在半导体晶圆制造产能规划中的应用   总被引:1,自引:1,他引:0  
半导体晶圆厂的设备非常昂贵,对设备利用率的要求较高,设计一套简单实用的办法进行产能规划是十分必要的.本文提出了产能规划的三大模块,在前两个模块中将建立半导体晶圆制造产能规划的电子表格模型(Spreadsheet),在第三个模块中利用产能规划模型的数据结果进行分析,总结出一些改进方法.通过在某半导体晶圆厂的实际应用,该产能规划模型有效地解决了投料不均,设备负荷率波动过大等问题.  相似文献   

13.
Test data travels through a System on Chip (SOC) from the chip pins to the Core-Under-Test (CUT) and vice versa via a Test Access Mechanism (TAM). Conventionally, a TAM is implemented using dedicated communication infrastructure. However, also existing functional interconnect, such as a bus or Network on Chip (NOC), can be reused as TAM; this will reduce the overall design effort and associated silicon area. For a given core, its test set, and maximal bandwidth that the functional interconnect can offer between test equipment and core-under-test, our approach instantiates a test wrapper for the core-under-test such that the test length is minimized. Unfortunately, it is unavoidable that along with the test data also unused (idle) bits are transported. This paper presents a holistic TAM bandwidth under-utilization analysis when functional interconnect is considered for test data transportation. We classify the idle bits into four types that refer to the root-cause of bandwidth under-utilization and pinpoint design improvement opportunities. Experimental results show an average bandwidth utilization of 80%, while the remaining 20% is consumed by the idle bits.  相似文献   

14.
刘震  方滨兴  胡铭曾 《通信学报》2002,23(5):142-147
Internet由于其巨大的接入量,成为发布空闲机时的理想环境。开发通用的空闲机时发布系统,是解决使用空闲机时不便,发布机时难的方法,对于通用系统,安全问题是一个关键性问题。针对这一情况,本文分析了可能存在的安全问题,即认证、授权、记账和保护结果正确四方面的问题。结合我们开发的通用空闲机时发布系统WebCRP,提出了处理这些安全问题的方法。分析表明这些方法可有效地解决相应的安全问题。  相似文献   

15.
文章重点介绍了内嵌于DDS的DAC线性参数的一种测试方法。该测试方法的优点是开发周期短、测试成本低、可在多种测试机台上实现。解决了DDS中不能对DAC输入端直接操作的难题,同时不影响其他参数的测试。文章基于LabView软件,使用示波器或NI板卡,结合其他仪器对DAC的静态参数进行了研究并试验。其中示波器或NI板卡完成信号采集,其他仪器完成芯片配置,微机对整个流程进行控制并将测试结果按序输出,实现测试自动化。通过试验证明该方法可行,测试效率高,测试结果达标并稳定。  相似文献   

16.
针对内容中心网络中同质化缓存造成的节点负载不均和存储资源无法有效利用的问题,提出一种热区控制及内容调度缓存算法.在内容请求时,根据节点介数与节点访问度综合判断节点热度,筛选出负载过重节点;缓存决策时,以流行度为依据将内容调度至空闲邻居节点,并设置生命期控制机制,从而达到分散请求、消除热区的目的.仿真结果表明该算法减少了请求时延与路由跳数,在提高缓存命中率的同时,有效改善了负载在节点上分布的均衡性.  相似文献   

17.
信息控制系统(FICS)的集成是晶圆厂生产线集成的主要内容之一。介绍了65nm级别用于生产微处理器(Microprocessor)的300mm FAB的FICS架构实例,并就系统集成做了简单的描述,对制造执行系统MES和设备集成系统EI的客户化作了探讨,并介绍了EI部分的架构。  相似文献   

18.
谢英 《电子工程师》2008,34(10):1-4
EMI(电磁干扰)问题的深入研究对提高所设计产品的可靠性有着较大的现实意义。文中阐述了EMC(电磁兼容性)在电路设计中的重要性和电子设备的EMC问题。就雷达发射机的EMC设计问题,根据发射机干扰信号的传播途径和耦合方式,针对经常出现的各种EMI问题,提出了接地、屏蔽、滤波、瞬态抑制等4种抑制EMI的方法。介绍了其他一些常用的提高设备EMC的方法,分别从PCB(印制电路板)设计、设备内的布线、软件抗干扰设计等方面进行了探讨。  相似文献   

19.
目前,谐波治理和机房节电日益被提上通信电源设计工作议程,文章通过对通信机房的用电特点、谐波源等问题进行分析,针对被保护区域设备的特点进行系统结构的设计,并提出了一些设备选型的建议,目的是通过有效的工程设计解决谐波对通信电源系统的危害,提高通信机房电能质量。  相似文献   

20.
Optical networks carrying traffic belonging to different survivability classes must ensure not only the proper survivability differentiation but also the efficient network resource utilization. Current approaches improve network resource utilization by carrying low-class preemptable traffic along high-class spare resources, which are idle (i.e., unutilized) during failure-free conditions. In this paper, the proposed idle protection capacity reuse (IR) framework generalizes the practice of reutilizing idle spare resources to both failure-free and failure conditions. The IR framework is based on the idea of exploiting idle high-class lightpath protection resources not only for routing low-class lightpaths during the provisioning phase (i.e., provisioning-phase IR, P-IR) but also for dynamically restoring low-class lightpaths during the recovery phase (i.e., recovery-phase IR, R-IR). Both P-IR and R-IR have the potential to improve network utilization while providing multiclass lightpaths with the required survivability differentiation. The numerical evaluation shows that the utilization of R-IR in dynamic restoration results in an improved low-class lightpath survivability with respect to the utilization of stub release. Moreover, if P-IR and R-IR are alternatively exploited, then the former improves the provisioning performance, while the latter guarantees a higher survivability. In the end, if P-IR and R-IR are concurrently employed in the provisioning and in the dynamic restoration of two different low classes of lightpaths, respectively, an inherent survivability differentiation is achieved  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号