期刊文献+
共找到22篇文章
< 1 2 >
每页显示 20 50 100
Quantum steganography with a large payload based on dense coding and entanglement swapping of Greenberger-Horne-Zeilinger states 被引量:1
1
作者 叶天语 蒋丽珍 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第5期152-159,共8页
A quantum steganography protocol with a large payload is proposed based on the dense coding and the entanglement swapping of the Greenberger-Horne-Zeilinger (GHZ) states. Its super quantum channel is formed by build... A quantum steganography protocol with a large payload is proposed based on the dense coding and the entanglement swapping of the Greenberger-Horne-Zeilinger (GHZ) states. Its super quantum channel is formed by building up a hidden channel within the original quantum secure direct communication (QSDC) scheme. Based on the original QSDC, secret messages are transmitted by integrating the dense coding and the entanglement swapping of the GHZ states. The capacity of the super quantum channel achieves six bits per round covert communication, much higher than the previous quantum steganography protocols. Its imperceptibility is good, since the information and the secret messages can be regarded to be random or pseudo-random. Moreover, its security is proved to be reliable. 展开更多
关键词 quantum steganography quantum secure direct communication dense coding entanglementswapping
下载PDF
Strain Engineering for Germanium-on-Insulator Mobility Enhancement with Phase Change Liner Stressors 被引量:1
2
作者 张燕燕 程然 +4 位作者 谢爽 徐顺 玉虓 张睿 赵毅 《Chinese Physics Letters》 SCIE CAS CSCD 2017年第10期88-91,共4页
We investigate the strain in various Ge-on-insulator (GeOI) micro-structures induced by three phase-change maferials (PCMs) (Ge2Sb2Te5, Sb2Te3, GeTe) deposited. The PCMs could change the phase from amorphous sta... We investigate the strain in various Ge-on-insulator (GeOI) micro-structures induced by three phase-change maferials (PCMs) (Ge2Sb2Te5, Sb2Te3, GeTe) deposited. The PCMs could change the phase from amorphous state to polycrystalline state with a low temperature thermal annealing, resulting in an intrinsic contraction in the PCM films. Raman spectroscopy analysis is performed to compare the strain induced in the GeOI micro- structures by various PCMs. By comparison, Sb2 Tea could induce the largest amount of tensile strain in the GeOI micro-structures after the low temperature annealing. Based on the strain calculated from the Raman peak shifts, finite element numerical simulation is performed to calculate the strain-induced electron mobility enhancement for Ge n-MOSFETs with PCM liner stressors. With the adoption of Sb2 Te3 liner stressor, 22% electron mobility enhancement at Xinv=1×10^13cm^-2 could be achieved, suggesting that PCM especially Sb2 Te3 liner stressor is a promising technique for the performance enhancement of Ge MOSFETs. 展开更多
关键词 Strain Engineering for Germanium-on-Insulator Mobility Enhancement with Phase Change Liner Stressors PCM MOSFET
下载PDF
The Blossoming of 2D Materials
3
作者 DUAN Xiangfeng XU Yang 《物理化学学报》 SCIE CAS CSCD 北大核心 2019年第10期1039-1040,共2页
The vehement explosion in two-dimensional (2D) materials has led to one exciting new discoveries after another for the past 15 years. This circumstance resembles a famous movie “The Gold Rush”(1925) expressed the tr... The vehement explosion in two-dimensional (2D) materials has led to one exciting new discoveries after another for the past 15 years. This circumstance resembles a famous movie “The Gold Rush”(1925) expressed the true story about the stream of American people as crowded as the hurricane to join the gold racing in the 19th century. Similarly, the family of 2D materials has gained tremendous interest from broad scientific community in various fields, from fundamental chemistry and physics to materials and device engineering. This special issue includes both tutorial reviews and original research articles, providing general overviews of the recent progresses and bringing about the newest discoveries in this rapidly evolving field. 展开更多
关键词 BLOSSOMING 2D MATERIALS AMERICAN PEOPLE
下载PDF
Design of terahertz beam splitter based on surface plasmon resonance transition
4
作者 刘项 杨冬晓 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第4期325-329,共5页
According to the resonance transition between propagating surface plasmon and localized surface plasmon, we demonstrate a design of beam splitter that can split terahertz wave beams in a relatively broad frequency ran... According to the resonance transition between propagating surface plasmon and localized surface plasmon, we demonstrate a design of beam splitter that can split terahertz wave beams in a relatively broad frequency range. The transmission properties of the beam splitter are analyzed utilizing the finite element method. The resonance transition between two kinds of plasmons can be explained by a model of coherent electron cloud displacement. 展开更多
关键词 TERAHERTZ surface plasmon SPLITTER resonance transition
下载PDF
Ge Complementary Tunneling Field-Effect Transistors Featuring Dopant Segregated NiGe Source/Drain 被引量:1
5
作者 李骏康 曲益明 +3 位作者 曾思雨 程然 张睿 赵毅 《Chinese Physics Letters》 SCIE CAS CSCD 2018年第11期70-73,共4页
Ge complementary tunneling field-effect transistors(TFETs) are fabricated with the NiGe metal source/drain(S/D) structure. The dopant segregation method is employed to form the NiGe/Ge tunneling junctions of suffi... Ge complementary tunneling field-effect transistors(TFETs) are fabricated with the NiGe metal source/drain(S/D) structure. The dopant segregation method is employed to form the NiGe/Ge tunneling junctions of sufficiently high Schottky barrier heights. As a result, the Ge p-and n-TFETs exhibit decent electrical properties of large ON-state current and steep sub-threshold slope(S factor). Especially, I_d of 0.2 μA/μm is revealed at V_g-V_(th) = V_d = ±0.5 V for Ge pTFETs,with the S factor of 28 mV/dec at 7 K. 展开更多
关键词 Ge Complementary Tunneling Field-Effect Transistors Featuring Dopant Segregated NiGe Source/Drain MOSFET
下载PDF
Large payload quantum steganography based on cavity quantum electrodynamics
6
作者 叶天语 蒋丽珍 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第4期110-117,共8页
A large payload quantum steganography protocol based on cavity quantum electrodynamics (QED) is presented in this paper, which effectively uses the evolutionary law of atoms in cavity QED. The protocol builds up a h... A large payload quantum steganography protocol based on cavity quantum electrodynamics (QED) is presented in this paper, which effectively uses the evolutionary law of atoms in cavity QED. The protocol builds up a hidden channel to transmit secret messages using entanglement swapping between one GHZ state and one Bell state in cavity QED together with the Hadamard operation. The quantum steganography protocol is insensitive to cavity decay and the thermal field. The capacity, imperceptibility and security against eavesdropping are analyzed in detail in the protocol. It turns out that the protocol not only has good imperceptibility but also possesses good security against eavesdropping. In addition, its capacity for a hidden channel achieves five bits, larger than most of the previous quantum steganography protocols. 展开更多
关键词 quantum steganography hidden capacity entanglement swapping Hadamard operation cavity QED
下载PDF
Tip-Nanoparticle Near-Field Coupling in Scanning Near-Field Microscopy by Coupled Dipole Method
7
作者 阮乂 李衎 +1 位作者 林强 张婷 《Chinese Physics Letters》 SCIE CAS CSCD 2018年第4期42-45,共4页
We use the couple dipole method to investigate the scanning near-field optical microscopy metallic tip-nanoparticle near-field interaction. Dependences of the local field intensity inside the nanoparticle on the nanos... We use the couple dipole method to investigate the scanning near-field optical microscopy metallic tip-nanoparticle near-field interaction. Dependences of the local field intensity inside the nanoparticle on the nanosized tip shape,the tip open angle and the illumination angle are revealed. In combination with the previous results, we establish a complete model to understand the tip-nanoparticle near-field coupling mechanism. 展开更多
关键词 Tip-Nanoparticle Near-Field Coupling in Scanning Near-Field Microscopy by Coupled Dipole Method
下载PDF
Information leakage resistant quantum dialogue against collective noise 被引量:7
8
作者 YE TianYu 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2014年第12期2266-2275,共10页
In this paper,two information leakage resistant quantum dialogue(QD)protocols over a collective-noise channel are proposed.Decoherence-free subspace(DFS)is used to erase the influence from two kinds of collective nois... In this paper,two information leakage resistant quantum dialogue(QD)protocols over a collective-noise channel are proposed.Decoherence-free subspace(DFS)is used to erase the influence from two kinds of collective noise,i.e.,collective-dephasing noise and collective-rotation noise,where each logical qubit is composed of two physical qubits and free from noise.In each of the two proposed protocols,the secret messages are encoded on the initial logical qubits via two composite unitary operations.Moreover,the single-photon measurements rather than the Bell-state measurements or the more complicated measurements are needed for decoding,making the two proposed protocols easier to implement.The initial state of each logical qubit is privately shared between the two authenticated users through the direct transmission of its auxiliary counterpart.Consequently,the information leakage problem is avoided in the two proposed protocols.Moreover,the detailed security analysis also shows that Eve’s several famous active attacks can be effectively overcome,such as the Trojan horse attack,the intercept-resend attack,the measure-resend attack,the entangle-measure attack and the correlation-elicitation(CE)attack. 展开更多
关键词 信息泄露 噪声信道 量子位 集体 对话 主动攻击 初始状态 旋转噪声
原文传递
Measurement of the echo reduction for underwater acoustic passive materials by using the time reversal technique 被引量:8
9
作者 YAN Xiaowei LI Jianlong HE Zhiguang 《Chinese Journal of Acoustics》 CSCD 2016年第3期309-320,共12页
A measuring method of the echo reduction of passive materials by using the time reversal(TR) technique is presented. To measure the echo reduction of a sample with this approach, the received signals are firstly foc... A measuring method of the echo reduction of passive materials by using the time reversal(TR) technique is presented. To measure the echo reduction of a sample with this approach, the received signals are firstly focused according to the TR theory. Then, the sample is removed and the TR processing is again employed to realize the focus of the received signal.Finally, the echo reduction of the sample is evaluated with these focusing signals. Besides, to calibrate the measured echo reduction via the TR technique, a standard sample is employed to measure a constant coefficient that only depends on the measurement environment. An aluminum plate sample and a steel plate sample with the same size of 1.1 mxl.O m x0.005 m axe tested in a wave guide tank. The experimental results show that the calibrated values are well consistent with theoretical results under the free field at the measured frequency range of0.5-20 kHz. The relative errors of all the measured values are less than 10% and the values of the expanded uncertainty are less than 1.5 dB. The TR processing focuses the energy in spatial domain and temporal domain, so it can be used to measure the echo reduction of passive materials in the environments with reflections induced by boundaries and low frequency sources. 展开更多
关键词 time Measurement of the echo reduction for underwater acoustic passive materials by using the time reversal technique TR
原文传递
Multi-user quantum private comparison with scattered preparation and one-way convergent transmission of quantum states 被引量:2
10
作者 TianYu Ye ZhaoXu Ji 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2017年第9期7-16,共10页
Quantum private comparison(QPC) aims to accomplish the equality comparison of the secrets from different users without disclosing their genuine contents by using the principles of quantum mechanics. In this paper, we ... Quantum private comparison(QPC) aims to accomplish the equality comparison of the secrets from different users without disclosing their genuine contents by using the principles of quantum mechanics. In this paper, we summarize eight modes of quantum state preparation and transmission existing in current QPC protocols first. Then, by using the mode of scattered preparation and one-way convergent transmission, we construct a new multi-user quantum private comparison(MQPC) protocol with two-particle maximally entangled states, which can accomplish arbitrary pair's comparison of equality amongK users within one execution. Analysis turns out that its output correctness and its security against both the outside attack and the participant attack are guaranteed. The proposed MQPC protocol can be implemented with current technologies. It can be concluded that the mode of scattered preparation and one-way convergent transmission of quantum states is beneficial to designing the MQPC protocol which can accomplish arbitrary pair's comparison of equality among K users within one execution. 展开更多
关键词 量子态 多用户 单向 传输 收敛 分散 相位比较器 最大纠缠态
原文传递
Fault-Tolerant Quantum Dialogue Without Information Leakage Based on Entanglement Swapping between Two Logical Bell States 被引量:1
11
作者 叶天语 《Communications in Theoretical Physics》 SCIE CAS CSCD 2015年第4期431-438,共8页
At present, the anti-noise property and the information leakage resistant property are two great concerns for quantum dialogue(QD). In this paper, two anti-noise QD protocols without information leakage are presented ... At present, the anti-noise property and the information leakage resistant property are two great concerns for quantum dialogue(QD). In this paper, two anti-noise QD protocols without information leakage are presented by using the entanglement swapping technology for two logical Bell states. One works well over a collective-dephasing noise channel, while the other takes effect over a collective-rotation noise channel. The negative influence of noise is erased by using logical Bell states as the traveling quantum states. The problem of information leakage is avoided by swapping entanglement between two logical Bell states. In addition, only Bell state measurements are used for decoding, rather than four-qubit joint measurements. 展开更多
关键词 纠缠交换 信息泄漏 量子态 逻辑 贝尔 对话 抗噪声性能 BELL态
原文传递
Generation and propagation characteristics of electromagnetic vortices in radio frequency 被引量:2
12
作者 Shilie Zheng Weite Zhang +3 位作者 Zhuofan Zhang Xiaofeng Jin Hao Chi Xianmin Zhang 《Photonics Research》 SCIE EI 2016年第5期9-13,共5页
Electromagnetic vortices, which describe the orbital angular momentum(OAM) carrying waves with a helical phase front, have recently attracted much interest in a radio frequency domain due to their potential applicatio... Electromagnetic vortices, which describe the orbital angular momentum(OAM) carrying waves with a helical phase front, have recently attracted much interest in a radio frequency domain due to their potential applications in many diverse areas. In an OAM-based scenario, the antenna for OAM mode multiplexing/demultiplexing plays an essential role in controlling the overall system performance. In this paper, we demonstrated theoretically and experimentally an easily realized OAM antenna based on the traveling-wave circular loop structure for efficiently multiplexing/demultiplexing multiple OAM modes; in addition, its general propagation characteristics including the polarization, divergence, and radiation pattern are mathematically analyzed. Schemes for antenna size reduction and various radiation pattern manipulations have also been discussed to realize a more flexible and compact system. 展开更多
关键词 OAM Generation and propagation characteristics of electromagnetic vortices in radio frequency
原文传递
Quantum Secure Dialogue with Quantum Encryption 被引量:8
13
作者 叶天语 《Communications in Theoretical Physics》 SCIE CAS CSCD 2014年第9期338-342,共5页
How to solve the information leakage problem has become the research focus of quantum dialogue. In this paper, in order to overcome the information leakage problem in quantum dialogue, a novel approach for sharing the... How to solve the information leakage problem has become the research focus of quantum dialogue. In this paper, in order to overcome the information leakage problem in quantum dialogue, a novel approach for sharing the initial quantum state privately between communicators, i.e., quantum encryption sharing, is proposed by utilizing the idea of quantum encryption. The proposed protocol uses EPR pairs as the private quantum key to encrypt and decrypt the traveling photons, which can be repeatedly used after rotation. Due to quantum encryption sharing, the public announcement on the state of the initial quantum state is omitted, thus the information leakage problem is overcome.The information-theoretical efficiency of the proposed protocol is nearly 100%, much higher than previous information leakage resistant quantum dialogue protocols. Moreover, the proposed protocol only needs single-photon measurements and nearly uses single photons as quantum resource so that it is convenient to implement in practice. 展开更多
关键词 QUANTUM DIALOGUE QUANTUM ENCRYPTION INFORMATION LEAKAGE
原文传递
Circular Semi-Quantum Secret Sharing Using Single Particles 被引量:4
14
作者 叶崇强 叶天语 《Communications in Theoretical Physics》 SCIE CAS CSCD 2018年第12期661-671,共11页
Semi-quantum secret sharing(SQSS) is an important branch of semi-quantum cryptography, and differs from quantum secret sharing(QSS) in that not all parties are required to possess quantum capabilities. All previous SQ... Semi-quantum secret sharing(SQSS) is an important branch of semi-quantum cryptography, and differs from quantum secret sharing(QSS) in that not all parties are required to possess quantum capabilities. All previous SQSS protocols have three common features:(i) they adopt product states or entangled states as initial quantum resource;(ii)the particles prepared by quantum party are transmitted in a tree-type way; and(iii) they require the classical parties to possess the measurement capability. In this paper, two circular SQSS protocols with single particles are suggested,where the first one requires the classical parties to possess the measurement capability while the second one does not have this requirement. Compared with the previous SQSS protocols, the proposed SQSS protocols have some distinct features:(i) they adopt single particles rather than product states or entangled states as initial quantum resource;(ii)the particles prepared by quantum party are transmitted in a circular way; and(iii) the second protocol releases the classical parties from the measurement capability. The proposed SQSS protocols are robust against some famous attacks from an eavesdropper, such as the measure-resend attack, the intercept-resend attack and the entangle-measure attack,and are feasible with present quantum technologies in reality. 展开更多
关键词 semi-quantum CRYPTOGRAPHY semi-quantum SECRET sharing single particles CIRCULAR transmission measurement capability
原文传递
Fault tolerant channel-encrypting quantum dialogue against collective noise 被引量:3
15
作者 YE TianYu 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2015年第4期1-10,共10页
In this paper,two fault tolerant channel-encrypting quantum dialogue(QD)protocols against collective noise are presented.One is against collective-dephasing noise,while the other is against collective-rotation noise.T... In this paper,two fault tolerant channel-encrypting quantum dialogue(QD)protocols against collective noise are presented.One is against collective-dephasing noise,while the other is against collective-rotation noise.The decoherent-free states,each of which is composed of two physical qubits,act as traveling states combating collective noise.Einstein-Podolsky-Rosen pairs,which play the role of private quantum key,are securely shared between two participants over a collective-noise channel in advance.Through encryption and decryption with private quantum key,the initial state of each traveling two-photon logical qubit is privately shared between two participants.Due to quantum encryption sharing of the initial state of each traveling logical qubit,the issue of information leakage is overcome.The private quantum key can be repeatedly used after rotation as long as the rotation angle is properly chosen,making quantum resource economized.As a result,their information-theoretical efficiency is nearly up to 66.7%.The proposed QD protocols only need single-photon measurements rather than two-photon joint measurements for quantum measurements.Security analysis shows that an eavesdropper cannot obtain anything useful about secret messages during the dialogue process without being discovered.Furthermore,the proposed QD protocols can be implemented with current techniques in experiment. 展开更多
关键词 量子加密 噪声信道 量子位 集体 对话 安全性分析 故障 量子密钥
原文传递
Topic evolution based on the probabilistic topic model: a review 被引量:4
16
作者 Houkui ZHOU Huimin YU Roland HU 《Frontiers of Computer Science》 SCIE EI CSCD 2017年第5期786-802,共17页
Accurately representing the quantity and characteristics of users' interest in certain topics is an important problem facing topic evolution researchers, particularly as it applies to modem online environments. Searc... Accurately representing the quantity and characteristics of users' interest in certain topics is an important problem facing topic evolution researchers, particularly as it applies to modem online environments. Search engines can provide information retrieval for a specified topic from archived data, but fail to reflect changes in interest toward the topic over time in a structured way. This paper reviews notable research on topic evolution based on the probabilistic topic model from multiple aspects over the past decade. First, we introduce notations, terminology, and the basic topic model explored in the survey, then we summarize three categories of topic evolution based on the probabilistic topic model: the discrete time topic evolution model, the continuous time topic evolution model, and the online topic evolution model. Next, we describe applications of the topic evolution model and attempt to summarize model generalization performance evaluation and topic evolution evaluation methods, as well as providing comparative experimental results for different models. To conclude the review, we pose some open questions and discuss possible future research directions. 展开更多
关键词 topic evolution probabilistic topic models text corpora evaluation method
原文传递
Topic discovery and evolution in scientific literature based on content and citations 被引量:5
17
作者 Hou-kui ZHOU Hui-min YU Roland HU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第10期1511-1524,共14页
Researchers across the globe have been increasingly interested in the manner in which important research topics evolve over time within the corpus of scientific literature. In a dataset of scientific articles, each do... Researchers across the globe have been increasingly interested in the manner in which important research topics evolve over time within the corpus of scientific literature. In a dataset of scientific articles, each document can be considered to comprise both the words of the document itself and its citations of other documents. In this paper, we propose a citationcontent-latent Dirichlet allocation(LDA) topic discovery method that accounts for both document citation relations and the content of the document itself via a probabilistic generative model. The citation-content-LDA topic model exploits a two-level topic model that includes the citation information for ‘father' topics and text information for sub-topics. The model parameters are estimated by a collapsed Gibbs sampling algorithm. We also propose a topic evolution algorithm that runs in two steps: topic segmentation and topic dependency relation calculation. We have tested the proposed citation-content-LDA model and topic evolution algorithm on two online datasets, IEEE Transactions on Pattern Analysis and Machine Intelligence(PAMI) and IEEE Computer Society(CS), to demonstrate that our algorithm effectively discovers important topics and reflects the topic evolution of important research themes. According to our evaluation metrics, citation-content-LDA outperforms both content-LDA and citation-LDA. 展开更多
关键词 Topic extraction Topic evolution Evaluation method
原文传递
Function synthesis algorithm based on RTD-based three-variable universal logic gates 被引量:1
18
作者 Mao-qun YAO Kai YANG +1 位作者 Ji-zhong SHEN Cong-yuan XU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2017年第10期1654-1664,共11页
Compared with complementary metal–oxide semiconductor(CMOS), the resonant tunneling device(RTD) has better performances; it is the most promising candidate for next-generation integrated circuit devices. The universa... Compared with complementary metal–oxide semiconductor(CMOS), the resonant tunneling device(RTD) has better performances; it is the most promising candidate for next-generation integrated circuit devices. The universal logic gate is an important unit circuit because of its powerful logic function, but there are few function synthesis algorithms that can implement an n-variable logical function by RTD-based universal logic gates. In this paper, we propose a new concept, i.e., the truth value matrix. With it a novel disjunctive decomposition algorithm can be used to decompose an arbitrary n-variable logical function into three-variable subset functions. On this basis, a novel function synthesis algorithm is proposed, which can implement arbitrary n-variable logical functions by RTD-based universal threshold logic gates(UTLGs), RTD-based three-variable XOR gates(XOR3s), and RTD-based three-variable universal logic gate(ULG3s). When this proposed function synthesis algorithm is used to implement an n-variable logical function, if the function is a directly disjunctive decomposition one, the circuit structure will be very simple, and if the function is a non-directly disjunctive decomposition one, the circuit structure will be simpler than when using only UTLGs or ULG3s. The proposed function synthesis algorithm is straightforward to program, and with this algorithm it is convenient to implement an arbitrary n-variable logical function by RTD-based universal logic gates. 展开更多
关键词 Resonant tunneling device(RTD) Disjunctive decomposition algorithm Universal logic gate Truth value matrix Function synthesis algorithm
原文传递
Graphene based functional devices: A short review 被引量:2
19
作者 Rong Wang Xin-Gang Ren +3 位作者 Ze Yan Li-Jun Jiang Wei E. I. Sha Guang-Cun Shan 《Frontiers of physics》 SCIE CSCD 2019年第1期23-42,共20页
Graphene is an ideal 2D material system bridging electronic and photonic devices. It also breaks the fundamental speed and size limits by electronics and photonics, respectively. Graphene offers multiple functions of ... Graphene is an ideal 2D material system bridging electronic and photonic devices. It also breaks the fundamental speed and size limits by electronics and photonics, respectively. Graphene offers multiple functions of signal transmission, emission, modulation, and detection in a broad band, high speed, compact size, and low loss. Here, we have a brief view of graphene based functional devices at microwave, terahertz, and optical frequencies. Their fundamental physics and computational models were discussed as well. 展开更多
关键词 GRAPHENE TERAHERTZ ANTENNA MICROWAVE
原文传递
基于RTD三变量通用逻辑门的设计(英文)
20
作者 Mao-qun YAO Kai YANG +1 位作者 Cong-yuan XU Ji-zhong SHEN 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2015年第8期694-699,共6页
目的:为基于RTD器件的任意n变量函数实现提供一个简单有效的三变量通用逻辑门,简化基于RTD器件的集成电路设计。创新点:使用谱技术和Reed-Muller展开提出一种新的算法。此算法可将三变量非阈值函数转化成三变量阈值函数,并利用此算法设... 目的:为基于RTD器件的任意n变量函数实现提供一个简单有效的三变量通用逻辑门,简化基于RTD器件的集成电路设计。创新点:使用谱技术和Reed-Muller展开提出一种新的算法。此算法可将三变量非阈值函数转化成三变量阈值函数,并利用此算法设计一种新的基于RTD的三变量通用逻辑门ULG3。方法:首先,介绍阈值逻辑、谱技术和Reed-Muller展开的基本概念。然后,提出一种新的算法。此算法可将三变量非阈值函数转化成三变量阈值函数,并发现除两个特殊的三变量非阈值函数以外,其他所有的三变量非阈值函数都可以分解成两个三变量阈值函数异或的形式。最后,利用此算法并基于UTLG(图1)设计一个新的三变量通用逻辑门ULG3(图4)。结论:新的三变量通用逻辑门ULG3由两个UTLG和一个XOR3组成,对任意的三变量函数都可由一个ULG3门来实现。 展开更多
关键词 三变量通用逻辑门 设计方法 RTD Reed-Muller 阈值逻辑门 共振隧穿二极管 阈值函数 CMOS技术
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部