A novel method to characterize CMOS process fluctuations in subthreshold current mirrors (SCM) is reported. The proposed model is succinct in methodology and calculation complexity compared with previous statistical...A novel method to characterize CMOS process fluctuations in subthreshold current mirrors (SCM) is reported. The proposed model is succinct in methodology and calculation complexity compared with previous statistical models. However,it provides favorable estimations of CMOS process fluctuations on the SCM circuit, which makes it promising for engineering applications. The model statistically abstracts physical parameters, which depend on the IC process, into random variables with certain mean values and standard deviations, while aggregating all the random impacts into a discrete martingale. The correctness of the proposed method is experimentally verified on an SCM circuit implemented in an SMIC 0.18μm CMOS 1P6M mixed signal process with a conversion factor of 100 in an input range from 100pA to lμA. The pro- posed theory successfully predicts - 10% of die-to-die fluctuation measured in the experiment, and also suggests the -lmV of threshold voltage standard deviation over a single die,which meets the process parameters suggested by the design kit from the foundry. The deviations between calculated probabilities and measured data are less than 8%. Meanwhile, pertinent suggestions concerning high fluctuation tolerance subthreshold analog circuit design are also made and discussed.展开更多
The quantum properties of O(2,2) string cosmology with a dilaton potential are studied in this paper. The cosmological solutions are obtained on three-dlmensional space-time. Moreover, the quantum probability of tra...The quantum properties of O(2,2) string cosmology with a dilaton potential are studied in this paper. The cosmological solutions are obtained on three-dlmensional space-time. Moreover, the quantum probability of transition between two duality universe is calculated through a Wheeler-De Witt approach.展开更多
In this paper, two schemes for teleporting an unknown three-particle three-level entangled state are proposed. In the first scheme, two partial three-particle three-level entangled states are used as the quantum chann...In this paper, two schemes for teleporting an unknown three-particle three-level entangled state are proposed. In the first scheme, two partial three-particle three-level entangled states are used as the quantum channels, while in the second scheme, three two-particle three-level non-maximally entangled states are employed as quantum channels. It is shown that the teleportation can be successfully realized with certain probability, for both two schemes, ira receiver adopts some appropriate unitary transformations. It is shown also that the successful probabilities of these two schemes are different.展开更多
In Mobile Ad-hoc Networks (MANETs), routing protocols directly affect various indices of network Quality of Service (QoS), so they play an important role in network performance. To address the drawbacks associated wit...In Mobile Ad-hoc Networks (MANETs), routing protocols directly affect various indices of network Quality of Service (QoS), so they play an important role in network performance. To address the drawbacks associated with traditional routing protocols in MANETs, such as poor anti-fading performance and slow convergence rate, for basic Dynamic Source Routing (DSR), we propose a new routing model based on Grover's searching algorithm. With this new routing model, each node maintains a node vector function, and all the nodes can obtain a node probability vector using Grover's algorithm, and then select an optimal routing according to node probability. Simulation results show that compared with DSR, this new routing protocol can effectively extend the network lifetime, as well as reduce the network delay and the number of routing hops. It can also significantly improve the anti-jamming capability of the network.展开更多
A novel deep neural network compression model for airport object detection has been presented.This novel model aims at disadvantages of deep neural network,i.e.the complexity of the model and the great cost of calcula...A novel deep neural network compression model for airport object detection has been presented.This novel model aims at disadvantages of deep neural network,i.e.the complexity of the model and the great cost of calculation.According to the requirement of airport object detection,the model obtains temporal and spatial semantic rules from the uncompressed model.These spatial semantic rules are added to the model after parameter compression to assist the detection.The rules can improve the accuracy of the detection model in order to make up for the loss caused by parameter compression.The experiments show that the effect of the novel compression detection model is no worse than that of the uncompressed original model.Even some of the original model false detection can be eliminated through the prior knowledge.展开更多
We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryp...We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryption protocols. Here we consider the way it increases the unicity distance of both classical and quantum private-key encryption schemes. The security of quantum probabilistic privatekey encryption schemes against two kinds of attacks is analyzed. By using the no-signalling postulate, we show that the scheme can resist attack to the key. The scheme's security against plaintext attack is also investigated by considering the information-theoretic indistinguishability of the encryption scheme. Finally, we make a conjecture regarding Breidbart's attack.展开更多
In this work, a novel voice activity detection (VAD) algorithm that uses speech absence probability (SAP) based on Teager energy (TE) was proposed for speech enhancement. The proposed method employs local SAP (...In this work, a novel voice activity detection (VAD) algorithm that uses speech absence probability (SAP) based on Teager energy (TE) was proposed for speech enhancement. The proposed method employs local SAP (LSAP) based on the TE of noisy speech as a feature parameter for voice activity detection (VAD) in each frequency subband, rather than conventional LSAP. Results show that the TE operator can enhance the abiTity to discriminate speech and noise and further suppress noise components. Therefore, TE-based LSAP provides a better representation of LSAP, resulting in improved VAD for estimating noise power in a speech enhancement algorithm. In addition, the presented method utilizes TE-based global SAP (GSAP) derived in each frame as the weighting parameter for modifying the adopted TE operator and improving its performance. The proposed algorithm was evaluated by objective and subjective quality tests under various environments, and was shown to produce better results than the conventional method.展开更多
The performance of interfered cooperative ad-hoc networks is analyzed by stochastic geometry analysis and a selection region of relay is presented. First, assuming that the distribution of nodes in the random network ...The performance of interfered cooperative ad-hoc networks is analyzed by stochastic geometry analysis and a selection region of relay is presented. First, assuming that the distribution of nodes in the random network follows the Poisson point process (PPP), a closed-form expression of the outage probability is derived for the best relay selection (BRS) scheme. Secondly, the capacity of the network is presented for this scheme. Finally, a performance factor is defined to evaluate the performance gain obtained from the BRS. By using this factor, a relay selection region is found to guarantee the performance gain from the BRS. The analysis and simulation results show that the performance of the BRS not only depends on the densities of source nodes and relay nodes but also on the factors of networks such as the path loss factor and the decoding threshold. And the BRS has a greater advantage than direct transmission (DT) in hush environments such as the long transmission distances, much interference and the high decoding thresholds.展开更多
文摘A novel method to characterize CMOS process fluctuations in subthreshold current mirrors (SCM) is reported. The proposed model is succinct in methodology and calculation complexity compared with previous statistical models. However,it provides favorable estimations of CMOS process fluctuations on the SCM circuit, which makes it promising for engineering applications. The model statistically abstracts physical parameters, which depend on the IC process, into random variables with certain mean values and standard deviations, while aggregating all the random impacts into a discrete martingale. The correctness of the proposed method is experimentally verified on an SCM circuit implemented in an SMIC 0.18μm CMOS 1P6M mixed signal process with a conversion factor of 100 in an input range from 100pA to lμA. The pro- posed theory successfully predicts - 10% of die-to-die fluctuation measured in the experiment, and also suggests the -lmV of threshold voltage standard deviation over a single die,which meets the process parameters suggested by the design kit from the foundry. The deviations between calculated probabilities and measured data are less than 8%. Meanwhile, pertinent suggestions concerning high fluctuation tolerance subthreshold analog circuit design are also made and discussed.
基金The project supported by the Natural Science Foundation of Sichuan Normal University
文摘The quantum properties of O(2,2) string cosmology with a dilaton potential are studied in this paper. The cosmological solutions are obtained on three-dlmensional space-time. Moreover, the quantum probability of transition between two duality universe is calculated through a Wheeler-De Witt approach.
基金The project supported by the Natural Science Foundation of Education Bureau of Jingsu Province of China under Grant No. 04KJB140014
文摘In this paper, two schemes for teleporting an unknown three-particle three-level entangled state are proposed. In the first scheme, two partial three-particle three-level entangled states are used as the quantum channels, while in the second scheme, three two-particle three-level non-maximally entangled states are employed as quantum channels. It is shown that the teleportation can be successfully realized with certain probability, for both two schemes, ira receiver adopts some appropriate unitary transformations. It is shown also that the successful probabilities of these two schemes are different.
基金supported by Zhejiang Provincial Key Laboratory of Communication Networks and Applications and National Natural Science Foundation of China under Grant No.60872020
文摘In Mobile Ad-hoc Networks (MANETs), routing protocols directly affect various indices of network Quality of Service (QoS), so they play an important role in network performance. To address the drawbacks associated with traditional routing protocols in MANETs, such as poor anti-fading performance and slow convergence rate, for basic Dynamic Source Routing (DSR), we propose a new routing model based on Grover's searching algorithm. With this new routing model, each node maintains a node vector function, and all the nodes can obtain a node probability vector using Grover's algorithm, and then select an optimal routing according to node probability. Simulation results show that compared with DSR, this new routing protocol can effectively extend the network lifetime, as well as reduce the network delay and the number of routing hops. It can also significantly improve the anti-jamming capability of the network.
文摘A novel deep neural network compression model for airport object detection has been presented.This novel model aims at disadvantages of deep neural network,i.e.the complexity of the model and the great cost of calculation.According to the requirement of airport object detection,the model obtains temporal and spatial semantic rules from the uncompressed model.These spatial semantic rules are added to the model after parameter compression to assist the detection.The rules can improve the accuracy of the detection model in order to make up for the loss caused by parameter compression.The experiments show that the effect of the novel compression detection model is no worse than that of the uncompressed original model.Even some of the original model false detection can be eliminated through the prior knowledge.
基金supported by the National Natural Science Foundation of China under Grant No. 61173157Strategy Pilot Project of Chinese Academy of Sciences under Grant No. XD06010702IIE's Cryptography Research Project
文摘We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryption protocols. Here we consider the way it increases the unicity distance of both classical and quantum private-key encryption schemes. The security of quantum probabilistic privatekey encryption schemes against two kinds of attacks is analyzed. By using the no-signalling postulate, we show that the scheme can resist attack to the key. The scheme's security against plaintext attack is also investigated by considering the information-theoretic indistinguishability of the encryption scheme. Finally, we make a conjecture regarding Breidbart's attack.
基金Project supported by Inha University Research GrantProject(10031764) supported by the Strategic Technology Development Program of Ministry of Knowledge Economy, Korea
文摘In this work, a novel voice activity detection (VAD) algorithm that uses speech absence probability (SAP) based on Teager energy (TE) was proposed for speech enhancement. The proposed method employs local SAP (LSAP) based on the TE of noisy speech as a feature parameter for voice activity detection (VAD) in each frequency subband, rather than conventional LSAP. Results show that the TE operator can enhance the abiTity to discriminate speech and noise and further suppress noise components. Therefore, TE-based LSAP provides a better representation of LSAP, resulting in improved VAD for estimating noise power in a speech enhancement algorithm. In addition, the presented method utilizes TE-based global SAP (GSAP) derived in each frame as the weighting parameter for modifying the adopted TE operator and improving its performance. The proposed algorithm was evaluated by objective and subjective quality tests under various environments, and was shown to produce better results than the conventional method.
基金The National Science and Technology Major Project(No. 2011ZX03005-004-03 )the National Natural Science Foundation of China (No. 61171081)the Science and Technology Support Program of Jiangsu Province (No. BE2011187)
文摘The performance of interfered cooperative ad-hoc networks is analyzed by stochastic geometry analysis and a selection region of relay is presented. First, assuming that the distribution of nodes in the random network follows the Poisson point process (PPP), a closed-form expression of the outage probability is derived for the best relay selection (BRS) scheme. Secondly, the capacity of the network is presented for this scheme. Finally, a performance factor is defined to evaluate the performance gain obtained from the BRS. By using this factor, a relay selection region is found to guarantee the performance gain from the BRS. The analysis and simulation results show that the performance of the BRS not only depends on the densities of source nodes and relay nodes but also on the factors of networks such as the path loss factor and the decoding threshold. And the BRS has a greater advantage than direct transmission (DT) in hush environments such as the long transmission distances, much interference and the high decoding thresholds.