期刊文献+
共找到31篇文章
< 1 2 >
每页显示 20 50 100
Read-Write Dependency Aware Register Allocation
1
作者 Sheng Xiao Yong Chen +1 位作者 Jing He Xi Yang 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3527-3540,共14页
Read-write dependency is an important factor restricting software efficiency.Timing Speculative(TS)is a processing architecture aiming to improve energy efficiency of microprocessors.Timing error rate,influenced by th... Read-write dependency is an important factor restricting software efficiency.Timing Speculative(TS)is a processing architecture aiming to improve energy efficiency of microprocessors.Timing error rate,influenced by the read-write dependency,bottlenecks the voltage down-scaling and so the energy efficiency of TS processors.We proposed a method called Read-Write Dependency Aware Register Allocation.It is based on the Read-Write Dependency aware Interference Graph(RWDIG)conception.Registers are reallocated to loosen the read-write dependencies,so resulting in a reduction of timing errors.The traditional no operation(Nop)padding method is also redesigned to increase the distance value to above 2.We analyzed the dependencies of registers and maximized the average distance value of read and write dependencies.Experimental results showed that we can reduce all read-write dependency by Nop padding,as well as the overhead timing errors.An energy saving of approximately 7%was achieved. 展开更多
关键词 read-write dependency timing speculative energy efficiency
下载PDF
改进的量子安全直传Ping-Pong协议
2
作者 梁彦霞 牛静 聂敏 《西安邮电大学学报》 2015年第2期32-35,共4页
为了提高Ping-Pong协议的传输效率,对其加以改进。改进的协议增加了随机数序列。相对于原协议,将传输的经典消息与控制信息从1∶1的比例改变为N∶(M-N)。按照量子通信效率评价公式,相对于原协议0.333的通信效率,改进协议的Matlab仿真和... 为了提高Ping-Pong协议的传输效率,对其加以改进。改进的协议增加了随机数序列。相对于原协议,将传输的经典消息与控制信息从1∶1的比例改变为N∶(M-N)。按照量子通信效率评价公式,相对于原协议0.333的通信效率,改进协议的Matlab仿真和数值推导结果均显示,只需满足条件N<M<2 N,其效率即可提高至N/(2 M-N);在最少控制模式的情况下,只要N>1,极限通信效率可达N/(N+2),故改进后的效率均大于原协议。 展开更多
关键词 量子安全直接通信 ping-pong协议 传输效率
下载PDF
基于DMA控制的数据Ping-Pong传输 被引量:1
3
作者 汪智 严洪 李春生 《电子元器件应用》 2006年第4期78-80,共3页
介绍了TI公司TMS320C54xx系列DSP的DMA工作原理,提出了利用TMS320VC5409芯片的DMA方式来实现数据Ping-Pong传输的方法,同时给出了详细的软件设计流程。
关键词 DSP TMS320C54xx DMA ping-pong传输
下载PDF
依据“ping-pong”循环机制预测piRNA靶基因的搜索方法 被引量:1
4
作者 许甘霖 齐绪峰 蔡冬青 《基础医学与临床》 CSCD 2017年第3期399-401,共3页
piRNA是指能与PIWI家族蛋白结合的小RNAs,其功能主要是稳定生殖细胞正常发育,在其他体细胞内也参与生理功能的调控[1]。相当一部分的piRNA通过被称作"pingpong"循环机制去识别与切割其靶基因的转录本mRNA(图1),并通过该机制去实现初... piRNA是指能与PIWI家族蛋白结合的小RNAs,其功能主要是稳定生殖细胞正常发育,在其他体细胞内也参与生理功能的调控[1]。相当一部分的piRNA通过被称作"pingpong"循环机制去识别与切割其靶基因的转录本mRNA(图1),并通过该机制去实现初级piRNA(primary piRNA)和次级piRNA(secondary piRNA)循环利用,piwil4或piwil2与相应的piRNA结合,通过piRNA的5'端前10~11个碱基作为介导序列,依照碱基互补原则,对与之互补的靶mRNA进行切割, 展开更多
关键词 循环机制 PIRNA ping-pong 碱基互补 转录本 蛋白结合 起始位点 结果符合率 循环利用 大鼠
下载PDF
Eavesdropping on the'ping-pong' quantum communication protocol freely in a noise channel 被引量:10
5
作者 邓富国 李熙涵 +2 位作者 李春燕 周萍 周宏余 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第2期277-281,共5页
We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdroppe... We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdropper, Eve, intercepts and measures the travel photon transmitted between the sender and the receiver. Then she replaces the quantum signal with a multi-photon signal in the same state, and measures the returned photons with the measuring basis, with which Eve prepares the fake signal except for one photon. This attack increases neither the quantum channel losses nor the error rate in the sampling instances for eavesdropping check. It works for eavesdropping the secret message transmitted with the ping-pong protocol. Finally, we propose a way for improving the security of the ping-pong protocol. 展开更多
关键词 quantum communication ping-pong protocol EAVESDROPPING
下载PDF
Improved Quantum " Ping-Pong" Protocol Based on Extended Three-Particle GHZ State 被引量:5
6
作者 Li Jian Guo Xiaojing +2 位作者 Song Danjie Xie Feng Peng Yong 《China Communications》 SCIE CSCD 2012年第1期111-116,共6页
In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdro... In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all inforrmtion, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two. 展开更多
关键词 quantum key distffoution ping-pong protocol extended three-particle GHZ state eavesdropping detection
下载PDF
Improved Security Detection Strategy for Quantum "Ping-Pong" Protocol and Its Security Analysis 被引量:5
7
作者 李剑 金海菲 景博 《China Communications》 SCIE CSCD 2011年第3期170-179,共10页
In order to transmit the secure messages,a deterministic secure quantum direct communication protocol,called the "Ping-pong"protocol was proposed by Bostrm and Felbinger [Phys.Rev.Lett.89,187902(2002) ].But ... In order to transmit the secure messages,a deterministic secure quantum direct communication protocol,called the "Ping-pong"protocol was proposed by Bostrm and Felbinger [Phys.Rev.Lett.89,187902(2002) ].But the protocol was proved to have many vulnerabilities,and can be attacked by eavesdroppers.To overcome the problem,an improved security detection strategy which inserts the | 0〉,| 1〉,|+〉and |-〉particles into the messages as the decoy particles randomly in the"Ping-pong"protocol is presented.During the security analysis,the method of the entropy theory is introduced,and three detection strategies are compared quantitatively by using the constraint between the information which eavesdroppers can obtain and the interference introduced.Because of the presence of the trap particles |+〉and |-〉,the detection rate will be no less than 25% when Eve attacks the communication.The security analysis result shows that the efficiency of eavesdropping detection in the presented protocol is higher than the other two,so the detection strategy in the protocol can ensure that the "Ping-pong"protocol is more secure. 展开更多
关键词 secure quantum direct communication "ping-pong " protocol protocol security eavesdropping detection
下载PDF
A FAST SEAMLESS HANDOVER SCHEME AND ITS CDT OPTIMIZATION FOR PING-PONG TYPE OF MOVEMENT 被引量:3
8
作者 Wang Yumlng Yang Zongkai +2 位作者 Zhao Dasheng He Jianhua Fu Xiaoming 《Journal of Electronics(China)》 2006年第2期298-303,共6页
In mobile IPv6 networks, the ping-pong type of movement brings about frequent handovers and thus increases signaling burden. This letter proposes a fast seamless handover scheme where the access router keeps the mobil... In mobile IPv6 networks, the ping-pong type of movement brings about frequent handovers and thus increases signaling burden. This letter proposes a fast seamless handover scheme where the access router keeps the mobile node's old reservation till the offline Count Down Timer (CDT) expires in order to reduce handover signaling and delay while the mobile node returns in a very short period of time. Based upon a pois son mobility model, an simple expression for CDT optimization is given out for the scheme to achieve the best cost performance of resource reservation. 展开更多
关键词 Mobile IPv6 ping-pong type of movement QoS signaling Handover delay Cost performance.
下载PDF
一种高带宽Ping-pong自调零运算放大器 被引量:3
9
作者 肖宇 《集成电路应用》 2019年第4期41-42,共2页
基于传统的多级运放结构设计了一款低失调,高速高精度的运算放大器。在传统运算放大器的基础上引入Ping-Pong自调零技术结合多级密勒补偿技术,实现了低失调,低噪声以及高精度。采用SMIC 0.18μm CMOS工艺,5 V电压下进行仿真验证。通过Sp... 基于传统的多级运放结构设计了一款低失调,高速高精度的运算放大器。在传统运算放大器的基础上引入Ping-Pong自调零技术结合多级密勒补偿技术,实现了低失调,低噪声以及高精度。采用SMIC 0.18μm CMOS工艺,5 V电压下进行仿真验证。通过Spectre仿真,电路单位增益带宽为9MHz,输出精度达到0.5%。 展开更多
关键词 多级运算放大器 多级密勒补偿 ping-pong自调零
下载PDF
Ping-pong effects study in PIC turbo joint detection for TDD CDMA
10
作者 Song Changjian Zhong Zifa Zhang Shuo 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第2期260-265,共6页
A kind of turbo joint detection scheme based on parallel interference cancellation (PIC) is studied; then, the eigenvalues of iteration matrix is deeply analyzed for studying the ping-pong effects in PIC JD and the ... A kind of turbo joint detection scheme based on parallel interference cancellation (PIC) is studied; then, the eigenvalues of iteration matrix is deeply analyzed for studying the ping-pong effects in PIC JD and the corresponding compensation approach is introduced. Finally, the proposed algorithm is validated through computer simulation in TDD CDMA uplink transmission. The result shows that the ping-pong effects are almost avoided completely in the presence of the compensation scheme, and system performance is greatly improved. 展开更多
关键词 parallel interference cancellation joint detection CDMA ping-pong TURBO
下载PDF
On the Security of Quantum Key Distribution Ping-Pong Protocol
11
作者 Masakazu Yoshida Takayuki Miyadera Hideki Imai 《Journal of Quantum Information Science》 2013年第1期16-19,共4页
Computational based cryptography might not guarantee long term security if computational algorithms, computers, and so on are made remarkable progress. Therefore, quantum cryptography with unconditionally security att... Computational based cryptography might not guarantee long term security if computational algorithms, computers, and so on are made remarkable progress. Therefore, quantum cryptography with unconditionally security attracts attention. In this paper, we consider security of a two-way quantum key distribution protocol, so called Ping-Pong protocol. As a result, we introduce not only robustness but also a different information disturbance theorem, which denotes a trade-off relationship between information gain for an eavesdropper and error rate, from the related works for an attack model. 展开更多
关键词 Two-Way QUANTUM KEY Distribution ping-pong Protocol ROBUSTNESS Information DISTURBANCE THEOREM
下载PDF
Analysis on the Current Situation of China's Ping-pong Referee Team above the National Level and Countermeasure Study
12
作者 Qi XIAO 《International Journal of Technology Management》 2013年第9期73-76,共4页
In this paper, the current situation of China' s Ping-pong referees team is studied using the methods such as document literatures and investigation, and the basic situation of the team is analyzed, and also the leve... In this paper, the current situation of China' s Ping-pong referees team is studied using the methods such as document literatures and investigation, and the basic situation of the team is analyzed, and also the level of law enforcement and the existing main problems are summarized, so as to explore the new ideas for the construction of the Ping-pong referees team and also provide a basis for China to train excellent Ping-pong referees. Through investigation, it is found that the problems such as the aging structure, poor English, insufficient training, and less judgment chances of the Ping-pong referee team should be practically solved, and also the artistic judgment quality should be improved. 展开更多
关键词 Above the National Level ping-pong Referees Team Team Construction
下载PDF
Dancing Ping-Pong Promotes Global Collaboration——At the Sports Economy and International Regional Cooperation Forum for the Belt and Road Initiative in 2018
13
作者 Li Houqiang Chen Youbin 《Contemporary Social Sciences》 2018年第5期1-8,共8页
Sichuan is the strongest province in western China, and Chengdu is the first stop of the Silk Road and the Yangtze River Economic Zone. Qingbaijiang,the inception point of the Chengdu-Europe express railway, is an imp... Sichuan is the strongest province in western China, and Chengdu is the first stop of the Silk Road and the Yangtze River Economic Zone. Qingbaijiang,the inception point of the Chengdu-Europe express railway, is an important source of artifacts from the ancient Sichuan civilization, and Sichuan province, the land of abundance, is the cradle and base of ping-pong. Chengdu has been connected to 展开更多
关键词 In At the Sports Economy and International Regional Cooperation Forum for the Belt and Road Initiative in 2018 Dancing ping-pong Promotes Global Collaboration
下载PDF
一种应用于CMOS图像传感器的逐行转隔行数据缓存方法 被引量:3
14
作者 任思伟 祝晓笑 +1 位作者 张婷婷 刘昌举 《半导体光电》 CAS 北大核心 2016年第3期440-444,共5页
从结构设计和方法优化入手,提出了基于双SRAM缓存结构并采用乒乓读写原理的CMOS图像传感器逐行转隔行数据缓存方法。该方法采用两组SRAM作为缓存,并利用乒乓读写原理,抽取逐行数据中奇数帧周期的奇数行作为隔行数据的奇数场,抽取逐行数... 从结构设计和方法优化入手,提出了基于双SRAM缓存结构并采用乒乓读写原理的CMOS图像传感器逐行转隔行数据缓存方法。该方法采用两组SRAM作为缓存,并利用乒乓读写原理,抽取逐行数据中奇数帧周期的奇数行作为隔行数据的奇数场,抽取逐行数据中偶数帧周期的偶数行作为隔行数据的偶数场,最终实现CMOS图像传感器逐行数据到奇偶隔行数据的转换。相比传统的采用片外帧存储处理方式,极大地减小了存储面积,便于实现与CMOS图像传感器的单芯片集成,降低了成本,同时也极大地降低了电路工作时的存储读写功耗。 展开更多
关键词 逐行转隔行 SRAM缓存 乒乓读写 CMOS图像传感器
下载PDF
EDMA在图像数据快速传输中的应用 被引量:8
15
作者 但永平 彭红涛 +1 位作者 王东云 刘芳华 《液晶与显示》 CAS CSCD 北大核心 2013年第1期99-104,共6页
在图像处理中图像数据交换量大,图像数据传输是图像采集处理系统的关键环节。EDMA是DSP中用于实现数据快速交换的重要技术,具有独立于CPU的后台批量数据传输的能力。文章基于TI公司TMS320DM642芯片的图像采集处理系统,利用EDMA的数据传... 在图像处理中图像数据交换量大,图像数据传输是图像采集处理系统的关键环节。EDMA是DSP中用于实现数据快速交换的重要技术,具有独立于CPU的后台批量数据传输的能力。文章基于TI公司TMS320DM642芯片的图像采集处理系统,利用EDMA的数据传输方式实现视频数据信号高速实时传输。介绍了DSP的外部存储器接口与FPGA的FIFO存储器有机结合进行数据传输,分析了其设计的整体结构与逻辑控制的功能,并着重分析了基于EDMA Ping-Pong数据传输方式的原理及其应用。另外,EDMA中断服务程序调用CPU对已搬移完成的图像数据块进行处理,不仅提高了数据的传输效率,而且节约了CPU资源,使DSP的高性能得到了充分发挥,从而为视频信号处理的实时性奠定了基础。 展开更多
关键词 EDMA DSP FIFO 数据传输 ping-pong
下载PDF
外场高速数据采集系统的研制 被引量:6
16
作者 罗勇 何玉珠 《电子测量技术》 2006年第2期88-89,共2页
使用PCI-9820高速A/D卡和LabVIEW图形化编程语言研制出用于外场的高速数据采集系统,实现了对窄脉冲(纳秒级)的数据采集、海量存储和实验室波形回放。应用该系统已完成对外场高频设备的数据采集和信号的事后分析。
关键词 高速数据采集 海量数据 DMA ping-pong 模式
下载PDF
基于FPGA的高速大容量数据缓存单元设计 被引量:14
17
作者 丁辉 张会新 庞俊奇 《仪表技术与传感器》 CSCD 北大核心 2021年第6期58-61,共4页
针对目前信息技术快速发展,需要更快的数据传输与处理能力的现状,对现存的一些产品中应用的FPGA外挂DDR3的存储技术进行了改进与优化,该设计采用2片DDR3存储器进行缓存,每片DDR3存储器作为一个独立的通道,当外部数据输入到系统中时,通过... 针对目前信息技术快速发展,需要更快的数据传输与处理能力的现状,对现存的一些产品中应用的FPGA外挂DDR3的存储技术进行了改进与优化,该设计采用2片DDR3存储器进行缓存,每片DDR3存储器作为一个独立的通道,当外部数据输入到系统中时,通过FPGA的逻辑控制,可将外部多通道采集的数据进行分通道存储,然后对每个通道数据进行通道编码,极大地提高数据的读入速率,同时采取乒乓读写的方式,对数据的写入读出进行控制,极大地缩短了数据缓存所需要的时间,提高了数据处理的实时性。 展开更多
关键词 FPGA 高速 大容量 DDR3 多通道存储 乒乓读写 缓存
下载PDF
一种基于TMS320C6713的语音信号频域盲分离算法 被引量:1
18
作者 刘朝晨 吴强 +3 位作者 殷超 李清石 许宏吉 李玉军 《数据采集与处理》 CSCD 北大核心 2012年第6期646-651,共6页
提出了一种真实环境中语音信号频域盲分离算法的实现方案。基于TMS320C6713 DSK平台,充分利用硬件资源,完成了语音盲分离处理算法的平台移植,并进行了编译环境、算法和程序3个级别上的软件优化,最终结果显示本系统具有较好的性能,在离... 提出了一种真实环境中语音信号频域盲分离算法的实现方案。基于TMS320C6713 DSK平台,充分利用硬件资源,完成了语音盲分离处理算法的平台移植,并进行了编译环境、算法和程序3个级别上的软件优化,最终结果显示本系统具有较好的性能,在离线和在线情况下均取得了对真实环境中两说话人混合语音的有效分离。 展开更多
关键词 频域盲分离 非平稳信号 ping-pong缓存 软件优化
下载PDF
病毒的杀伤能力
19
作者 张汉亭 《微计算机应用》 1997年第2期83-87,共5页
病毒的破坏行为体现了病毒的杀伤能力。病毒的杀伤能力有很大差异。其激烈程度取决于病毒作者的主观愿望及其具备的技术能量。本文将结合病毒实例,分析病毒的破坏行为,以加深对病毒杀伤能力的认识。
关键词 计算机病毒 ping-pong病毒 感染性
下载PDF
基于GPU的实时群体仿真算法实现 被引量:1
20
作者 范晓晔 田丰林 陈戈 《计算机技术与发展》 2014年第11期17-22,共6页
群体仿真在虚拟现实、影视动画、计算机游戏等领域有着广泛的应用。大规模的群体仿真中每个个体都要同其感知范围内的其他个体相互作用,当实时更新所有个体的状态时,就会导致O(N2)计算量的问题。针对这一问题,实现了一种基于GPU(图形处... 群体仿真在虚拟现实、影视动画、计算机游戏等领域有着广泛的应用。大规模的群体仿真中每个个体都要同其感知范围内的其他个体相互作用,当实时更新所有个体的状态时,就会导致O(N2)计算量的问题。针对这一问题,实现了一种基于GPU(图形处理器)的BOIDS群体行为模拟算法,充分利用GPU并行计算的能力处理大规模群体运动的巨大计算量。该方法利用GPU的快速光栅化计算每个个体同其感知范围内的其他个体的相互作用力,通过像素颜色混合功能实现作用力的累加,利用GPU自动生成Mip Map的能力计算所有个体的平均速度和平均位置。实验结果表明,该方法能够有效提高大规模群体运动的渲染速度。 展开更多
关键词 群体仿真 BOIDS算法 ping-pong技术 实时模拟 GPU
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部