Triple-threshold CMOS technique provides the transistors that have low-, normal-, and high-threshold voltage. This paper describes a low-power carry look-ahead adder with triple-threshold CMOS technique. While the low...Triple-threshold CMOS technique provides the transistors that have low-, normal-, and high-threshold voltage. This paper describes a low-power carry look-ahead adder with triple-threshold CMOS technique. While the low-threshold voltage transistors are used to reduce the propagation delay time in the critical path, the high-threshold voltage transistors are used to reduce the power consumption in the shortest path. Comparing with the conventional CMOS circuit, the circuit is achieved to reduce the power consumption by 14.71% and the power-delay-product by 16.11%. This circuit is designed with Samsung 0.35 um CMOS process. The validity and effectiveness are verified through the HSPICE simulation.展开更多
This paper considers the adaptive tracking problem for a class of first-order systems with binary-valued observations generated via fixed thresholds. A recursive projection algorithm is proposed for parameter estimati...This paper considers the adaptive tracking problem for a class of first-order systems with binary-valued observations generated via fixed thresholds. A recursive projection algorithm is proposed for parameter estimation based on the statistical properties of the system noise. Then, an adaptive control law is designed via the certainty equivalence principle. By use of the conditional expectations of the innovation and output prediction with respect to the estimates, the closed-loop system is shown to be stable and asymptotically optimal. Meanwhile, the parameter estimate is proved to be both almost surely and mean square convergent, and the convergence rate of the estimation error is also obtained. A numerical example is given to demonstrate the efficiency of the adaptive control law.展开更多
Recently some efforts were made towards capturing the security requirements within the composable security framework. This modeling has some significant advantages in designing and analyzing complex systems. The thres...Recently some efforts were made towards capturing the security requirements within the composable security framework. This modeling has some significant advantages in designing and analyzing complex systems. The threshold signature was discussed and a definition was given based on the universal composability framework, which is proved to be equivalent to the standard security definition. Furthermore, a simple, efficient and proactive threshold RSA signature protocol was presented. It is proved to be correct, consistent and unforgeable relative to the environment that at most t - 1 parties are corrupted in each proactive stage. It is also secure under the universal composability framework. It is a UC based security and is proved to be equivalent to the standard security.展开更多
The operating parameters such as the internal quantum efficiency (η), internal loss (α) and transparent threshold current density (J0) of double quantum well laser diodes were investigated and identified using...The operating parameters such as the internal quantum efficiency (η), internal loss (α) and transparent threshold current density (J0) of double quantum well laser diodes were investigated and identified using the program, Integrated System Engineering-Technical Computer Aided Design (ISE-TCAD). Various thicknesses (6, 7, 8, 10, 12 rim) of AlxInyGa1-x-yN barriers with (3 nm) Al0.08In0.08Ga0.84N wells as an active region were studied. The lowest threshold current (lth), and the highest output power (Pop) were 116 mA and 196 mW respectively, at barriers thickness of 6 nm, Al mole fraction of 10% and In mole fraction of 1%, at an emission wavelength of 359.6 nm.展开更多
文摘Triple-threshold CMOS technique provides the transistors that have low-, normal-, and high-threshold voltage. This paper describes a low-power carry look-ahead adder with triple-threshold CMOS technique. While the low-threshold voltage transistors are used to reduce the propagation delay time in the critical path, the high-threshold voltage transistors are used to reduce the power consumption in the shortest path. Comparing with the conventional CMOS circuit, the circuit is achieved to reduce the power consumption by 14.71% and the power-delay-product by 16.11%. This circuit is designed with Samsung 0.35 um CMOS process. The validity and effectiveness are verified through the HSPICE simulation.
基金supported by the National Natural Science Foundation of China under Grant Nos.60934006, 61174042,and 61120106011
文摘This paper considers the adaptive tracking problem for a class of first-order systems with binary-valued observations generated via fixed thresholds. A recursive projection algorithm is proposed for parameter estimation based on the statistical properties of the system noise. Then, an adaptive control law is designed via the certainty equivalence principle. By use of the conditional expectations of the innovation and output prediction with respect to the estimates, the closed-loop system is shown to be stable and asymptotically optimal. Meanwhile, the parameter estimate is proved to be both almost surely and mean square convergent, and the convergence rate of the estimation error is also obtained. A numerical example is given to demonstrate the efficiency of the adaptive control law.
基金the National Natural Science Foundation of China (Nos. 60573030, 90704004)the National Basic Research Program (973) of China(No. 2007CB311201)
文摘Recently some efforts were made towards capturing the security requirements within the composable security framework. This modeling has some significant advantages in designing and analyzing complex systems. The threshold signature was discussed and a definition was given based on the universal composability framework, which is proved to be equivalent to the standard security definition. Furthermore, a simple, efficient and proactive threshold RSA signature protocol was presented. It is proved to be correct, consistent and unforgeable relative to the environment that at most t - 1 parties are corrupted in each proactive stage. It is also secure under the universal composability framework. It is a UC based security and is proved to be equivalent to the standard security.
基金conducted under Science Fund,Cycle 2007,of The Ministry of Science,Technology and Innovation,MalaysiaThe financial support from Universiti Sains Malaysia is gratefully acknowledged
文摘The operating parameters such as the internal quantum efficiency (η), internal loss (α) and transparent threshold current density (J0) of double quantum well laser diodes were investigated and identified using the program, Integrated System Engineering-Technical Computer Aided Design (ISE-TCAD). Various thicknesses (6, 7, 8, 10, 12 rim) of AlxInyGa1-x-yN barriers with (3 nm) Al0.08In0.08Ga0.84N wells as an active region were studied. The lowest threshold current (lth), and the highest output power (Pop) were 116 mA and 196 mW respectively, at barriers thickness of 6 nm, Al mole fraction of 10% and In mole fraction of 1%, at an emission wavelength of 359.6 nm.