The first domestic 1×10^6rad(Si) total dose hardened 1.2μm partially depleted silicon-on-insulator (PDSOI) 64k SRAM fabricated in SIMOX is demonstrated.The address access time is independent of temperature f...The first domestic 1×10^6rad(Si) total dose hardened 1.2μm partially depleted silicon-on-insulator (PDSOI) 64k SRAM fabricated in SIMOX is demonstrated.The address access time is independent of temperature from -55 to 125℃ and independent of radiation up to 1×10^6rad(Si) for the supply voltage VDD.The standby current is 0.65μA before the total dose of radiation and is only 0.80mA after radiation exposure,which is much better than the specified 10mA.The operating power supply current is 33.0mA before and only 38.1mA afterward,which is much better than the specified 100mA.展开更多
A service station plays an important role in the petroleum product distribution terminal. With the increase in petroleum consumption in China, the inventory theory should be applied in the stock control of service st...A service station plays an important role in the petroleum product distribution terminal. With the increase in petroleum consumption in China, the inventory theory should be applied in the stock control of service stations. In this paper the inventory theory including its background and characteristics is introduced. At the same time, the application of the theory in some trades today, especially in petroleum trade, is analyzed. Then (s, S) stochastic model is advanced, which is established according to the principle of operational research and, based on this model, a sample is given, which discusses the details of application in the stock control of service stations. The sample is simplified but implies the validity of the model in optimizing the storage of petroleum products in the market.展开更多
Traditional seismic data sampling follows the Nyquist sampling theorem. In this paper, we introduce the theory of compressive sensing (CS), breaking through the limitations of the traditional Nyquist sampling theore...Traditional seismic data sampling follows the Nyquist sampling theorem. In this paper, we introduce the theory of compressive sensing (CS), breaking through the limitations of the traditional Nyquist sampling theorem, rendering the coherent aliases of regular undersampling into harmless incoherent random noise using random undersampling, and effectively turning the reconstruction problem into a much simpler denoising problem. We introduce the projections onto convex sets (POCS) algorithm in the data reconstruction process, apply the exponential decay threshold parameter in the iterations, and modify the traditional reconstruction process that performs forward and reverse transforms in the time and space domain. We propose a new method that uses forward and reverse transforms in the space domain. The proposed method uses less computer memory and improves computational speed. We also analyze the antinoise and anti-aliasing ability of the proposed method, and compare the 2D and 3D data reconstruction. Theoretical models and real data show that the proposed method is effective and of practical importance, as it can reconstruct missing traces and reduce the exploration cost of complex data acquisition.展开更多
A RTD-based TSRAM cell is introduced.The mechanism of different types of access transistors in this cell is described and NMOS is found most suitable from consideration of the cell size and power consumption.The archi...A RTD-based TSRAM cell is introduced.The mechanism of different types of access transistors in this cell is described and NMOS is found most suitable from consideration of the cell size and power consumption.The architecture of a TSRAM system is presented.Simulation results show that the RTD-based TSRAM has advanced characteristics of small area,low power,and high speed.展开更多
In proxy signature schemes,the proxy signer B is permitted to produce a signature on behalf of the original signer A. However,exposure of proxy signing keys can be the most devastating attack on a proxy signature sche...In proxy signature schemes,the proxy signer B is permitted to produce a signature on behalf of the original signer A. However,exposure of proxy signing keys can be the most devastating attack on a proxy signature scheme since any adversary can sign messages on behalf of the proxy signer. In this paper,we applied Dodis,et al.’s key-insulation mechanism and proposed an Identity-Based (ID-based) Key-Insulated Proxy Signature (IBKIPS) scheme with secure key-updates. The proposed scheme is strong key-insulated and perfectly key-insulated. Our scheme also supports unbounded period numbers and random-access key-updates.展开更多
AIM:To compare long-term results of gastric cancer patients undergoing laparoscopic and open gastrec-tomy in a single unit.METHODS:From February 2000 to September 2004,all patients with adenocarcinoma of the stomach w...AIM:To compare long-term results of gastric cancer patients undergoing laparoscopic and open gastrec-tomy in a single unit.METHODS:From February 2000 to September 2004,all patients with adenocarcinoma of the stomach were assessed to entry in this longitudinal prospective non-randomized trial.Primary endpoint was cancer-related survival and secondary endpoints were overall survival,evaluation of surgical complications and mortality.RESULTS:Fifty-eight patients were enrolled.Forty-seven patients were followed-up(range 11-103,me-dian 38 mo).Four patients were lost at follow up.Twenty-two patients underwent a laparoscopic gastric surgery(LGS)and 25 had a standard open procedure(OGS).No statistical difference was found between the two groups in terms of 5 years cancer-related mortality rate(50% vs 52%,P = 1),and 5 years overall mortal-ity rate(54.5% vs 56%,P = 1).Accordingly,cancer-related and overall survival probability by Kaplan-Meier method showed comparable results(P = 0.81 and P = 0.83,respectively).We found no differences in surgical complications in the 2 groups.There was no conversion to open surgery in this series.CONCLUSION:LGS is as effective as OGS in the man-agement of advanced gastric cancer.However LGS can-not be recommended routinely over OGS for the treat-ment of advanced gastric cancer.展开更多
With the rapid development of microelectronics and hardware,the use of ever faster micro processors and new architecture must be continued to meet tomorrow′s computing needs. New processor microarchitectures are need...With the rapid development of microelectronics and hardware,the use of ever faster micro processors and new architecture must be continued to meet tomorrow′s computing needs. New processor microarchitectures are needed to push performance further and to use higher transistor counts effectively.At the same time,aiming at different usages,the processor has been optimized in different aspects,such as high performace,low power consumption,small chip area and high security. SOC (System on chip)and SCMP (Single Chip Multi Processor) constitute the main processor system architecture.展开更多
A novel operation mechanism of capacitorless SOl-DRAM (silicon on insulator dynamic random access memory) cell using impact ionization and GIDL (gated-induce drain leakage) effects for write "1" operation was pr...A novel operation mechanism of capacitorless SOl-DRAM (silicon on insulator dynamic random access memory) cell using impact ionization and GIDL (gated-induce drain leakage) effects for write "1" operation was proposed. The conventional capacitorless DRAM cell with single charge generating effect is either high speed or low power, while the proposed DG-FinFET (double-gate fin field effect transistor) cell employs the efficient integration of impact ionization and GIDL effects by coupling the front and back gates with optimal body doping profile and proper bias conditions, yielding high speed low power performance. The simulation results demonstrate ideal characteristics in both cell operations and power consumption. Low power consumption is achieved by using GIDL current at 0. luA when the coupling between the front and back gates restrains the impact ionization current in the first phase. The write operation of the cell is within Ins attributed to significant current of the impact ionization effect in the second phase. By shortening second phase, power consumption could be further decreased. The ratio of read "1" and read "0" current is more than 9.38E5. Moreover, the cell has great retention characteristics.展开更多
In the future fifth generation(5G) systems,non-orthogonal multiple access(NOMA) is a promising technology that can greatly enhance the network capacity compared to orthogonal multiple access(OMA) .In this paper,we pro...In the future fifth generation(5G) systems,non-orthogonal multiple access(NOMA) is a promising technology that can greatly enhance the network capacity compared to orthogonal multiple access(OMA) .In this paper,we propose a novel random access(RA) and resource allocation scheme for the coexistence of NOMA-based and OMAbased machine-to-machine(M2M) communications,which aims at improving the number of successful data packet transmissions and guaranteeing the quality of service(Qo S) (e.g.,the minimum data rate requirement) for M2 M communications.The algorithm of joint user equipment(UE) paring and power allocation is proposed for the coexisting RA(i.e.,the coexistence of NOMA-based RA and OMA-based RA) .The resource allocation for the coexisting RA is investigated,thus improving the number of successful data packet transmissions by more efficiently using the radio resources.Simulation results demonstrate that the proposed RA and resource allocation scheme outperforms the conventional RA in terms of the number of successful data packet transmissions,thus is a promising technology in future M2 M communications.展开更多
For the cloud computing system,combined wth the memory function and incomplete matching of the biological immune system,a formal modeling and analysis method of the cloud computing system survivability is proposed by ...For the cloud computing system,combined wth the memory function and incomplete matching of the biological immune system,a formal modeling and analysis method of the cloud computing system survivability is proposed by analyzing the survival situation of critical cloud services.First,on the basis of the SAIR(susceptible,active,infected,recovered)model,the SEIRS(susceptible,exposed,infected,recovered,susceptible)model and the vulnerability diffusion model of the distributed virtual system,the evolution state of the virus is divided into six types,and then the diffusion rules of the virus in the service domain of the cloud computing system and the propagation rules between service domains are analyzee.Finally,on the basis of Bio-PEPA(biological-performance evaluation process algebra),the formalized modeling of the survivability evolution of critical cloud services is made,and the SLIRAS(susceptible,latent,infected,recovered,antidotal,susceptible)model is obtained.Based on the stochastic simulation and the ODEs(ordinary differential equations)simulation of the Bio-PEPA model,the sensitivity parameters of the model are analyzed from three aspects,namely,the virus propagation speed of inter-domain,recovery ability and memory ability.The results showthat the proposed model has high approximate fitting degree to the actual cloud computing system,and it can well reflect the survivable change of the system.展开更多
Background: Although emerging evidence points to benefits from Tai Chi Chuan (TCC) in improving immune system function, its effects on cellular immune responses remain under-studied. The objective of this study was...Background: Although emerging evidence points to benefits from Tai Chi Chuan (TCC) in improving immune system function, its effects on cellular immune responses remain under-studied. The objective of this study was to evaluate the effects of TCC training on cellular immunity in non-small cell lung cancer patients. Methods: A 2-group randomized trial design in which post-surgical, non-small cell lung cancer survivors were randomly assigned to a TCC training group (n = 16) or a control group (n = 16). The participants in the TCC group completed a 16-week intervention. The main immune response outcome measures assayed included the ratio of T-helper cells/T-suppressor cells (CD4+:CD8+ ratio) and complement regulatory proteins status (CRPs; CD55 and CD59). Using repeated measures ANOVA, the data were analyzed for the participants who completed the study (n = 27). Results: At 16 weeks, the TCC participants showed a significantly lower increment in the expression of CD55 (p 〈 0.05) as compared to the control group. No significant between-group differences were found in the CD4+:CD8+ ratio or CD59 expression. There were also no significant correlations among the changes in CRPs or T lymphocyte subpopulations, either. Conclusion: A 16-week TCC intervention caused no alterations in CD4+:CD8+ ratio, but significantly attenuated CD55 expression among post- surgical non-small cell lung cancer survivors.展开更多
With volume size increasing, it is necessary to develop a highly efficient compression algorithm, which is suitable for progressive refinement between the data server and the browsing client. For three-dimensional lar...With volume size increasing, it is necessary to develop a highly efficient compression algorithm, which is suitable for progressive refinement between the data server and the browsing client. For three-dimensional large volume data, an efficient hierarchical algorithm based on wavelet compression was presented, using intra-band dependencies of wavelet coefficients. Firstly, after applying blockwise hierarchical wavelet decomposition to large volume data, the block significance map was obtained by using one bit to indicate significance or insignificance of the block. Secondly, the coefficient block was further subdivided into eight sub-blocks if any significant coefficient existed in it, and the process was repeated, resulting in an incomplete octree. One bit was used to indicate significance or insignificance, and only significant coefficients were stored in the data stream. Finally, the significant coefficients were quantified and compressed by arithmetic coding. The experimental results show that the proposed algorithm achieves good compression ratios and is suited for random access of data blocks. The results also show that the proposed algorithm can be applied to progressive transmission of 3D volume data.展开更多
To analyze and reduce the impact of Machine-to-Machine (M2M) Devices (MDs) on the traditional Human-to-Human (H2H) users for the blending scenario, where both M2M and H2H services coexist in the current Universal Mobi...To analyze and reduce the impact of Machine-to-Machine (M2M) Devices (MDs) on the traditional Human-to-Human (H2H) users for the blending scenario, where both M2M and H2H services coexist in the current Universal Mobile Telecommunication System (UMTS) and perform the Random Access (RA) procedure simultaneously, a comprehensive RA analysis model of RA is proposed in this paper. Further, a power ramping strategy based on the logarithm for M2M is proposed. The efficiency of both the existing and proposed scheme is assessed through a simulation across several metrics, including average target power, throughput, blocking probability, and delay statistics. Numerical results show that the proposed algorithm can ensure a minimal impact on H2H communication while maintaining the throughput of the M2M communication. Meanwhile, because of its low energy consumption, this algorithm has a significant guide value for real-world applications.展开更多
A signal probability and activity probability (SPAP) model was proposed firstly, to estimate the impacts of the negative bias temperature instability (NBTI) and positive bias temperature instability (PBTI) on power ga...A signal probability and activity probability (SPAP) model was proposed firstly, to estimate the impacts of the negative bias temperature instability (NBTI) and positive bias temperature instability (PBTI) on power gated static random access memory (SRAM). The experiment results show that PBTI has significant influence on the read and write operations of SRAM with power gating, and it deteriorates the NBTI effects and results in a up to 39.38% static noise margin reduction and a 35.7% write margin degradation together with NBTI after 106 s working time. Then, a circuit level simulation was used to verify the assumption of the SPAP model, and finally the statistic data of CPU2000 benchmarks show that the proposed model has a reduction of 3.85% for estimation of the SNM degradation after 106 s working time compared with previous work.展开更多
The IEEE 802. 16 standard specifies the air interface of wireless metropolitan area network (WMAN), and aims to provide wireless broadband access for integrated voice and video services. This paper presents the effi...The IEEE 802. 16 standard specifies the air interface of wireless metropolitan area network (WMAN), and aims to provide wireless broadband access for integrated voice and video services. This paper presents the efficient design and implementation of fast Frouier transform (FFT) and inverse fast Frouier transform (IFFT) for the application in IEEE 802. 16d orthogoual frequency division multiplexing (OFDM) system. In this design, a novel pipeline structure for the branch of butterfly unit (BU) is proposed, which can improve the processing symbol rate by adding the number of branch flexibly. The symmetrical ping-pang structure of random access memory (RAM) is performed to increase the system throughput. Simulation results reveal that only with 1 branch of BU, the proposed FFF/IFFT design can almost achieve the maximum bandwidth requirement of IEEE 802. 16d OFDM system. And this design has been verified by FPGA and successfully implemented in the prototype of WiMAX transceiver.展开更多
文摘The first domestic 1×10^6rad(Si) total dose hardened 1.2μm partially depleted silicon-on-insulator (PDSOI) 64k SRAM fabricated in SIMOX is demonstrated.The address access time is independent of temperature from -55 to 125℃ and independent of radiation up to 1×10^6rad(Si) for the supply voltage VDD.The standby current is 0.65μA before the total dose of radiation and is only 0.80mA after radiation exposure,which is much better than the specified 10mA.The operating power supply current is 33.0mA before and only 38.1mA afterward,which is much better than the specified 100mA.
文摘A service station plays an important role in the petroleum product distribution terminal. With the increase in petroleum consumption in China, the inventory theory should be applied in the stock control of service stations. In this paper the inventory theory including its background and characteristics is introduced. At the same time, the application of the theory in some trades today, especially in petroleum trade, is analyzed. Then (s, S) stochastic model is advanced, which is established according to the principle of operational research and, based on this model, a sample is given, which discusses the details of application in the stock control of service stations. The sample is simplified but implies the validity of the model in optimizing the storage of petroleum products in the market.
基金sponsored by the National Natural Science Foundation of China (No.41174107)the National Science and Technology projects of oil and gas (No.2011ZX05023-005)
文摘Traditional seismic data sampling follows the Nyquist sampling theorem. In this paper, we introduce the theory of compressive sensing (CS), breaking through the limitations of the traditional Nyquist sampling theorem, rendering the coherent aliases of regular undersampling into harmless incoherent random noise using random undersampling, and effectively turning the reconstruction problem into a much simpler denoising problem. We introduce the projections onto convex sets (POCS) algorithm in the data reconstruction process, apply the exponential decay threshold parameter in the iterations, and modify the traditional reconstruction process that performs forward and reverse transforms in the time and space domain. We propose a new method that uses forward and reverse transforms in the space domain. The proposed method uses less computer memory and improves computational speed. We also analyze the antinoise and anti-aliasing ability of the proposed method, and compare the 2D and 3D data reconstruction. Theoretical models and real data show that the proposed method is effective and of practical importance, as it can reconstruct missing traces and reduce the exploration cost of complex data acquisition.
文摘A RTD-based TSRAM cell is introduced.The mechanism of different types of access transistors in this cell is described and NMOS is found most suitable from consideration of the cell size and power consumption.The architecture of a TSRAM system is presented.Simulation results show that the RTD-based TSRAM has advanced characteristics of small area,low power,and high speed.
基金Supported by the National Natural Science Foundation of China (No. 60573032, 60773092, 90604036, 60873229, 60903178, 60672072, 60832003)Zhejiang Provincial Natural Science Foundation of China (No. Y106505)
文摘In proxy signature schemes,the proxy signer B is permitted to produce a signature on behalf of the original signer A. However,exposure of proxy signing keys can be the most devastating attack on a proxy signature scheme since any adversary can sign messages on behalf of the proxy signer. In this paper,we applied Dodis,et al.’s key-insulation mechanism and proposed an Identity-Based (ID-based) Key-Insulated Proxy Signature (IBKIPS) scheme with secure key-updates. The proposed scheme is strong key-insulated and perfectly key-insulated. Our scheme also supports unbounded period numbers and random-access key-updates.
文摘AIM:To compare long-term results of gastric cancer patients undergoing laparoscopic and open gastrec-tomy in a single unit.METHODS:From February 2000 to September 2004,all patients with adenocarcinoma of the stomach were assessed to entry in this longitudinal prospective non-randomized trial.Primary endpoint was cancer-related survival and secondary endpoints were overall survival,evaluation of surgical complications and mortality.RESULTS:Fifty-eight patients were enrolled.Forty-seven patients were followed-up(range 11-103,me-dian 38 mo).Four patients were lost at follow up.Twenty-two patients underwent a laparoscopic gastric surgery(LGS)and 25 had a standard open procedure(OGS).No statistical difference was found between the two groups in terms of 5 years cancer-related mortality rate(50% vs 52%,P = 1),and 5 years overall mortal-ity rate(54.5% vs 56%,P = 1).Accordingly,cancer-related and overall survival probability by Kaplan-Meier method showed comparable results(P = 0.81 and P = 0.83,respectively).We found no differences in surgical complications in the 2 groups.There was no conversion to open surgery in this series.CONCLUSION:LGS is as effective as OGS in the man-agement of advanced gastric cancer.However LGS can-not be recommended routinely over OGS for the treat-ment of advanced gastric cancer.
文摘With the rapid development of microelectronics and hardware,the use of ever faster micro processors and new architecture must be continued to meet tomorrow′s computing needs. New processor microarchitectures are needed to push performance further and to use higher transistor counts effectively.At the same time,aiming at different usages,the processor has been optimized in different aspects,such as high performace,low power consumption,small chip area and high security. SOC (System on chip)and SCMP (Single Chip Multi Processor) constitute the main processor system architecture.
文摘A novel operation mechanism of capacitorless SOl-DRAM (silicon on insulator dynamic random access memory) cell using impact ionization and GIDL (gated-induce drain leakage) effects for write "1" operation was proposed. The conventional capacitorless DRAM cell with single charge generating effect is either high speed or low power, while the proposed DG-FinFET (double-gate fin field effect transistor) cell employs the efficient integration of impact ionization and GIDL effects by coupling the front and back gates with optimal body doping profile and proper bias conditions, yielding high speed low power performance. The simulation results demonstrate ideal characteristics in both cell operations and power consumption. Low power consumption is achieved by using GIDL current at 0. luA when the coupling between the front and back gates restrains the impact ionization current in the first phase. The write operation of the cell is within Ins attributed to significant current of the impact ionization effect in the second phase. By shortening second phase, power consumption could be further decreased. The ratio of read "1" and read "0" current is more than 9.38E5. Moreover, the cell has great retention characteristics.
基金supported by the National Natural Science Foundation of China(61501056)National Science and Technology Major Project of China(No.2016ZX03001012)the Research Fund of ZTE Corporation
文摘In the future fifth generation(5G) systems,non-orthogonal multiple access(NOMA) is a promising technology that can greatly enhance the network capacity compared to orthogonal multiple access(OMA) .In this paper,we propose a novel random access(RA) and resource allocation scheme for the coexistence of NOMA-based and OMAbased machine-to-machine(M2M) communications,which aims at improving the number of successful data packet transmissions and guaranteeing the quality of service(Qo S) (e.g.,the minimum data rate requirement) for M2 M communications.The algorithm of joint user equipment(UE) paring and power allocation is proposed for the coexisting RA(i.e.,the coexistence of NOMA-based RA and OMA-based RA) .The resource allocation for the coexisting RA is investigated,thus improving the number of successful data packet transmissions by more efficiently using the radio resources.Simulation results demonstrate that the proposed RA and resource allocation scheme outperforms the conventional RA in terms of the number of successful data packet transmissions,thus is a promising technology in future M2 M communications.
基金The National Natural Science Foundation of China(No.61202458,61403109)the Natural Science Foundation of Heilongjiang Province of China(No.F2017021)Harbin Science and Technology Innovation Research Funds(No.2016RAQXJ036)
文摘For the cloud computing system,combined wth the memory function and incomplete matching of the biological immune system,a formal modeling and analysis method of the cloud computing system survivability is proposed by analyzing the survival situation of critical cloud services.First,on the basis of the SAIR(susceptible,active,infected,recovered)model,the SEIRS(susceptible,exposed,infected,recovered,susceptible)model and the vulnerability diffusion model of the distributed virtual system,the evolution state of the virus is divided into six types,and then the diffusion rules of the virus in the service domain of the cloud computing system and the propagation rules between service domains are analyzee.Finally,on the basis of Bio-PEPA(biological-performance evaluation process algebra),the formalized modeling of the survivability evolution of critical cloud services is made,and the SLIRAS(susceptible,latent,infected,recovered,antidotal,susceptible)model is obtained.Based on the stochastic simulation and the ODEs(ordinary differential equations)simulation of the Bio-PEPA model,the sensitivity parameters of the model are analyzed from three aspects,namely,the virus propagation speed of inter-domain,recovery ability and memory ability.The results showthat the proposed model has high approximate fitting degree to the actual cloud computing system,and it can well reflect the survivable change of the system.
基金supported by the National Natural Science Foundation of China(No.30840046)
文摘Background: Although emerging evidence points to benefits from Tai Chi Chuan (TCC) in improving immune system function, its effects on cellular immune responses remain under-studied. The objective of this study was to evaluate the effects of TCC training on cellular immunity in non-small cell lung cancer patients. Methods: A 2-group randomized trial design in which post-surgical, non-small cell lung cancer survivors were randomly assigned to a TCC training group (n = 16) or a control group (n = 16). The participants in the TCC group completed a 16-week intervention. The main immune response outcome measures assayed included the ratio of T-helper cells/T-suppressor cells (CD4+:CD8+ ratio) and complement regulatory proteins status (CRPs; CD55 and CD59). Using repeated measures ANOVA, the data were analyzed for the participants who completed the study (n = 27). Results: At 16 weeks, the TCC participants showed a significantly lower increment in the expression of CD55 (p 〈 0.05) as compared to the control group. No significant between-group differences were found in the CD4+:CD8+ ratio or CD59 expression. There were also no significant correlations among the changes in CRPs or T lymphocyte subpopulations, either. Conclusion: A 16-week TCC intervention caused no alterations in CD4+:CD8+ ratio, but significantly attenuated CD55 expression among post- surgical non-small cell lung cancer survivors.
基金Supported by Natural Science Foundation of China (No. 60373061).
文摘With volume size increasing, it is necessary to develop a highly efficient compression algorithm, which is suitable for progressive refinement between the data server and the browsing client. For three-dimensional large volume data, an efficient hierarchical algorithm based on wavelet compression was presented, using intra-band dependencies of wavelet coefficients. Firstly, after applying blockwise hierarchical wavelet decomposition to large volume data, the block significance map was obtained by using one bit to indicate significance or insignificance of the block. Secondly, the coefficient block was further subdivided into eight sub-blocks if any significant coefficient existed in it, and the process was repeated, resulting in an incomplete octree. One bit was used to indicate significance or insignificance, and only significant coefficients were stored in the data stream. Finally, the significant coefficients were quantified and compressed by arithmetic coding. The experimental results show that the proposed algorithm achieves good compression ratios and is suited for random access of data blocks. The results also show that the proposed algorithm can be applied to progressive transmission of 3D volume data.
基金supported in part by the National Natural Science Foundation of Chinaunder Grants No.60971125, No.61121001Major National S&T Project under Grant No. 2012ZX03005010 the project under Grant No.201105
文摘To analyze and reduce the impact of Machine-to-Machine (M2M) Devices (MDs) on the traditional Human-to-Human (H2H) users for the blending scenario, where both M2M and H2H services coexist in the current Universal Mobile Telecommunication System (UMTS) and perform the Random Access (RA) procedure simultaneously, a comprehensive RA analysis model of RA is proposed in this paper. Further, a power ramping strategy based on the logarithm for M2M is proposed. The efficiency of both the existing and proposed scheme is assessed through a simulation across several metrics, including average target power, throughput, blocking probability, and delay statistics. Numerical results show that the proposed algorithm can ensure a minimal impact on H2H communication while maintaining the throughput of the M2M communication. Meanwhile, because of its low energy consumption, this algorithm has a significant guide value for real-world applications.
基金Projects(60873016, 61170083) supported by the National Natural Science Foundation of ChinaProject(20114307110001) supported by the Doctoral Fund of Ministry of Education of China
文摘A signal probability and activity probability (SPAP) model was proposed firstly, to estimate the impacts of the negative bias temperature instability (NBTI) and positive bias temperature instability (PBTI) on power gated static random access memory (SRAM). The experiment results show that PBTI has significant influence on the read and write operations of SRAM with power gating, and it deteriorates the NBTI effects and results in a up to 39.38% static noise margin reduction and a 35.7% write margin degradation together with NBTI after 106 s working time. Then, a circuit level simulation was used to verify the assumption of the SPAP model, and finally the statistic data of CPU2000 benchmarks show that the proposed model has a reduction of 3.85% for estimation of the SNM degradation after 106 s working time compared with previous work.
基金Sponsored by the National Natural Science Foundation of China(Grant No.60425413)
文摘The IEEE 802. 16 standard specifies the air interface of wireless metropolitan area network (WMAN), and aims to provide wireless broadband access for integrated voice and video services. This paper presents the efficient design and implementation of fast Frouier transform (FFT) and inverse fast Frouier transform (IFFT) for the application in IEEE 802. 16d orthogoual frequency division multiplexing (OFDM) system. In this design, a novel pipeline structure for the branch of butterfly unit (BU) is proposed, which can improve the processing symbol rate by adding the number of branch flexibly. The symmetrical ping-pang structure of random access memory (RAM) is performed to increase the system throughput. Simulation results reveal that only with 1 branch of BU, the proposed FFF/IFFT design can almost achieve the maximum bandwidth requirement of IEEE 802. 16d OFDM system. And this design has been verified by FPGA and successfully implemented in the prototype of WiMAX transceiver.