首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 889 毫秒
1.
A high-performance, low cost inverse integer transform architecture for advanced video standard (AVS) video coding standard was presented. An 8×8 inverse integer transform is required in AVS video system which is compute-intensive. A hardware transform is inevitable to compute the transform for the real-time ap-plication. Compared with the 4×4 transform for H.264/AVC, the 8×8 integer transform is much more complex and the coefficient in the inverse transform matrix Ts is not inerratic as that in H.264/AVC. Dividing the Ts into matrix S8 and R8, the proposed architecture is implemented with the adders and the specific CSA-trees instead of multipliers, which are area and time consuming. The architecture obtains the data processing rate up to 8 pixels per-cycle at a low cost of area. Synthesized to TSMC 0.18 μm COMS process, the architecture attains the operating frequency of 300 MHz at cost of 34 252 gates with a 2-stage pipeline scheme. A reusable scheme is also introduced for the area optimization, which results in the operating frequency of 143 MHz at cost of only 19 758 gates.  相似文献   

2.
Let (υ, u × c, λ)-splitting BIBD denote a (υ, u × c, λ)-splitting balanced incomplete block design of order υ with block size u × c and index λ. The necessary conditions for the existence of a (υ, u × c, λ)-splitting BIBD are υuc, λ(υ − 1) ≡ 0 0 mod (c(u − 1)) and λυ(υ − 1) ≡ 0 mod (c 2 u(u − 1)). In this paper, for 2 ⩽ λ ⩽ 9 the necessary conditions for the existence of a (υ, 3 × 3, λ)-splitting BIBD are also sufficient with one possible exception for (υ, λ) = (39, 9). Foundation item: the National Natural Science Foundation of China (No. 10771193); the Starter Foundation for the Doctors of Zhejiang Gongshang University (No. 1020XJ030517); the Natural Science Foundation of Universities of Jiangsu Province (No. 07KJB110090); the Starter Foundation for the Doctors of Nantong University (No. 07B12)  相似文献   

3.
Block-matching and 3D-filtering(BM3D) is a state of the art denoising algorithm for image/video,which takes full advantages of the spatial correlation and the temporal correlation of the video. The algorithm performance comes at the price of more similar blocks finding and filtering which bring high computation and memory access. Area, memory bandwidth and computation are the major bottlenecks to design a feasible architecture because of large frame size and search range. In this paper, we introduce a novel structure to increase data reuse rate and reduce the internal static-random-access-memory(SRAM) memory. Our target is to design a phase alternating line(PAL) or real-time processing chip of BM3 D. We propose an application specific integrated circuit(ASIC) architecture of BM3 D for a 720 × 576 BT656 PAL format. The feature of the chip is with 100 MHz system frequency and a 166-MHz 32-bit double data rate(DDR). When noise is σ = 25, we successfully realize real-time denoising and achieve about 10 d B peak signal to noise ratio(PSNR) advance just by one iteration of the BM3 D algorithm.  相似文献   

4.
This paper considers the linear model effected by random disturbance, Y = XB + ɛ, where $ \left[ \begin{gathered} B \hfill \\ \varepsilon \hfill \\ \end{gathered} \right] \sim \left( {\left[ \begin{gathered} A\Theta \hfill \\ 0 \hfill \\ \end{gathered} \right],V \otimes \Sigma } \right) $ \left[ \begin{gathered} B \hfill \\ \varepsilon \hfill \\ \end{gathered} \right] \sim \left( {\left[ \begin{gathered} A\Theta \hfill \\ 0 \hfill \\ \end{gathered} \right],V \otimes \Sigma } \right) , and Θ T A T X T NXAΘΣ. It gives a definition for general admissible estimator of a linear function + GB of random regression coefficients and parameters. The necessary and sufficient conditions for LY and LY + C to be general admissible estimators of + GB in the class of both homogenous and non-homogenous linear estimators are obtained. The conclusion is not dependent of whether or not +GB is estimable.  相似文献   

5.
In this paper, a rate-distortion based quantization level adjustment (RDQLA) algorithm is presented. Based on the rate-distortion criterion, the quantization level adjustment algorithm effectively improves coding efficiency by adaptively optimizing quantization levels of the signals near the boundaries of quantization cells and adjusting quantization levels per block. In addition, it has no overhead and is fully compatible with the existing compression standards. The proposed algorithm can be applied in any block based image and video coding method. In particular, the algorithm has been verified on the platform of H.264. Experimental results show that the proposed algorithm improves objective and subjective performances substantially. It is shown that the proposed algorithm has a gain of several dB comparing with the newest H.264 standard for high bit rates. Foundation item: the Special Foundation of Outstanding Young Teacher of Shanghai  相似文献   

6.
The graphite oxide(GO) was prepared based on the modified Hummers method, then reacted with zinc acetate aqueous, sodium hydroxide aqueous and hydrazine hydrate, and was doped into ZnO eventually to form graphene doped ZnO, an alternative transparent conducting oxide(TCO) for solar cell applications. The samples were characterized by Raman spectrometer, X-ray diffractometer, Fourier transform infrared spectroscopy and scanning electron microscope, and compared with widely used aluminum doped ZnO(AZO) in resistivity and transmissivity. The results show that the transmissivity of graphene doped ZnO reaches the same level as that of AZO in visible light band. In ultraviolet light wave band, the transmissivity of graphene doped ZnO reaches as high as 50%, exceeding that of AZO which is only 20%. The resistivity of optimized graphene doped ZnO is1.03 × 10-5Ω· m, approaching AZO resistivity which is about 10-4—10-6Ω· m. As a result, graphene doped ZnO may have potential applications in the area of TCO due to its low cost and high performance.  相似文献   

7.
Democratic group signature (DGS) is a group-oriented primitive with great flexibilities, i.e., no group manager, anonymity, and traceability. In a DGS scheme with (t, n)-threshold traceability, any subset of not less than t members can jointly reveal the identity of the signer while preserving security even in the presence of an active adversary can corrupt up to t − 1 group members. This paper proposes an efficient DGS scheme. We use publicly verifiable secret sharing (PVSS) to distribute the trapdoor via which the real signer is revealed. The computation cost and communication overhead of our DGS signatures are greatly reduced, compared with the existing work. For example, the size of the resulting signature contains only 2n + 1 elements of Z q , except the PVSS output.  相似文献   

8.
The design approach of H∞ autopilot for autonomous underwater vehicles (AUVs) is proposed. Comprised by the three sub-controllers,i.e. speed,heading and depth controllers,the designed autopilot has advantage over existing H∞ control of AUVs. The overshoot in speed,heading and depth control systems under step commands is restricted by refining the weighting function for robust stability. The dynamic performance of heading and depth control systems is improved by feeding back yaw rate and pitch angle,respecti...  相似文献   

9.
The steered covariance matrix (STCM) and its inverse matrix should be calculated in each beam for steered minimum variance (STMV). The inverse matrix needs complex computation and restricts its application in engineering. Combining the integration character of one-phase regressive filter with the iterative formula of inverse matrix, an STMV iterative algorithm is proposed. The computational cost of the iterative algorithm is reduced approximately to be 2/M times of the original one when there are M sensors, and is more advantaged for the realization of the algorithm in real time. Simulation results show that the STMV iterative algorithm can preserve the characters of STMV on high azimuth resolution and weak target detection while the computational cost reduced sharply. The analysis on sea trial data proves that the proposed algorithm can estimate each target’s azimuth even when the source powers differ in large scales or their bearings are very approximate.  相似文献   

10.
This paper introduces the influence factors of axial stiffness of tubular X-joints. The analysis model of tubular joints using plate and shell finite element method is also made. Systematic single-parameter analysis of tubular X-joints is performed using Ansys program. The influences of those factors, including ratio of brace diameter to chord diameter (β), ratio of chord diameter to twice chord thickness (γ), ratio of brace wall thickness to that of chord (τ), brace-to-chord intersection angle (θ), and chord stress ratio, ratio of another brace diameter to chord diameter, in-plane and out-of-plane moment of braces, etc., on stiffness of tubular X-joints are analyzed.Two non-dimensional parameters-joint axial stiffness factor ηN and axial force capacity factor ωN are proposed,and the relationship curve of the two factors is determined. Computational formulas of tubular X-joint axial stiffness are obtained by multi-element regression technology. The formulas can be used in design and analysis of steel tubular structures.  相似文献   

11.
Secret sharing schemes are multi-party protocols related to key establishment. They also facilitate distributed trust or shared control for critical activities (e.g., signing corporate cheques and opening bank vaults), by gating the critical action on cooperation from t(tZ +) of n(nZ +) users. A (t, n) threshold scheme (t < n) is a method by which a trusted party computes secret shares Γ i (1 ⩽ in) from an initial secret Γ 0 and securely distributes Γ i to user. Any t or more users who pool their shares may easily recover Γ 0, but any group knowing only t−1 or fewer shares may not. By the ElGamal public key cryptophytes and the Schnorr’s signature scheme, this paper proposes a new (t, n) threshold signature scheme with (k,m) (k,mZ +) threshold verification based on the multivariate linear polynomial.  相似文献   

12.
Strongly regular (α, β)-reguli are a class of incidence structures with given conditions which were introduced by Hamilton and Mathon. We introduce two classes of codes constructed from strongly regular (α, β)-reguli within PG(k − 1, q). The codes are related with two-weight codes intimately. Foundation item: the Scientific Research Start-up Foundation of Qingdao University of Science and Technology in China (No. 0022327)  相似文献   

13.
In c-C4F8 and c-C4F8/CO2 mixtures, the swarm parameters including ionization coefficient, attachment coefficient and effective ionization coefficient were obtained at the ratio of the electric field strength to the gas density between 150–550 Td by the steady-state Townsend (SST) method. Static breakdown voltages at each ratio were also measured at the SST condition. The limiting field strengths were obtained by two methods: computing the density-normalized effective ionization coefficient as a function of the overall density-reduced electric field strength; and measuring static breakdown voltages as a function of the product of gas density and electrode separation. Good agreement was obtained by these two methods, which ensures the correctness of the former method. The limiting field strengths of c-C4F8 and c-C4F8/CO2 mixtures were compared with those of pure SF6, SF6/CO2 mixtures and pure c-C4F8. It is found that buffer gas CO2 does not reduce the limiting field strengths of c-C4F8 greatly, the limiting field strengths of c-C4F8/CO2 mixtures are higher than those of SF6/CO2 mixtures or even pure SF6, and so c-C4F8/CO2 mixtures are suggested to be possible substitutes for SF6. Foundation item: the National Natural Science Foundation of China (No. 50777041)  相似文献   

14.
The swarm parametes for c-C4F8/CF4 mixtures, including the density-normalized effective ionization coefficient, drift velocity and mean energy were calculated using Monte-Carlo method with the null collision technique. The overall density-reduced electric field strength could be varied between 150 and 500 Td, while the c-C4F8 content in gas mixtures is varied in the range of 0–100%. The value of the density-normalized effective ionization coefficient shows a strong dependence on the c-C4F8 content, becoming more electronegative as the content of c-C4F8 is increased. The drift velocity of c-C4F8/CF4 mixtures is more affected by CF4. The calculated limiting field strength for c-C4F8/CF4 mixtures is higher than that of SF6/CF4. Foundation item: the National Natural Science Foundation of China (No. 50777041)  相似文献   

15.
The research on biomass reduction of Fe2O3 was carried out by using sawdust as reductant. The direct reducing agents in the biomass magnetization process were determined by comparing various biomass pyrolysis products with the reduction degree (divalent iron content in total iron), reduction temperature range and valence change of Fe2O3 in the reduction process. The microstructure variation of Fe2O3 at different stages was also analyzed by scanning electron microscopy (SEM). Nonisothermal thermogravimetric analysis (TGA) was applied to explore the thermal reduction process. The results show that the direct reducing substances in the biomass reaction with Fe2O3 are H2 and bio-oil, and the reduction process can be divided into two steps: biomass pyrolyzing to release H2 and bio-oil, and reductive volatiles reacting with Fe2O3. The two steps are relatively independent. The kinetic of the reduction reaction follows a first-order reaction kinetic model, with 88.99 kJ/mol activation energy and 9.55 × 108 min?1 frequency factor.  相似文献   

16.
Direct electrochemical extraction of Ti5Si3 from pressed cathode pellets comprising of powdered Ti/Sicontaining metal oxide compounds was investigated by using molten salt electro-deoxidation technology.Three groups of mixtures including TiO2 mixed with SiO2,Ti-bearing blast furnace slag(TBFS) mixed with TiO2, and TBFS mixed with high-titanium slag(HTS) were prepared at the same stoichiometric ratio(Ti:Si=5:3) corresponding to the target composition of Ti5Si3,and used as the starting materials in this experiment,respectively. The pressed porous cylindrical pellet of the Ti/Si-containing compounds served as a cathode,and two different anode systems,i.e.,the inert solid oxide oxygen-ion-conducting membrane(SOM) based anode system and graphite-based anode system were used contrastively.The electrochemical experiment was carried out at 900-1050℃and 3.0-4.0 V in molten CaCl2 electrolyte.The results show that the oxide components were electro-deoxidized effectively and Ti5Si3 could be directly extracted from these complex Ti/Si-containing metal oxide compounds.  相似文献   

17.
The influence of soaking temperature on microstructure of high temperature multi-pass compression deformation for two low carbon steels (steel A: w C = 0.032% and w Mn = 0.25%; steel B: w C = 0.165% and w Mn = 0.38%) is studied on the thermal-mechanical simulator in order to rationalize the hot-rolling schedule of low-carbon steel and to promote the low-temperature heating technology. The results show that the microstructures of steel A are almost not affected by reducing soaking temperature, but the acicular ferrite forms in steel B when the soaking temperature is reduced from 1 200 to 1 170°C, due to its smaller initial austenite grain size according to recrystallization kinetics theory.  相似文献   

18.
In this paper, an approach for designing robust fault detection filter (RFDF) of networked control systems (NCSs) with unknown inputs is studied. The design aims at implementing the optimal trade-off between robustness of unknown inputs (including the item produced by networked-induced delay) and sensitivity of fault. The key design issue is to introduce an optimal fault detection filter based on NCSs with the control law compensation as the reference residual model of NCSs and to formulate the RFDF design as a model-matching problem. By applying H optimization technique, linear matrix inequality (LMI) approach is given to solve the model-matching problem. The validity of the proposed approach is shown by a numerical example.   相似文献   

19.
For massive order allocation problem of the third party logistics (TPL) in ecommerce, this paper proposes a general order allocation model based on cloud architecture and hybrid genetic algorithm (GA), implementing cloud deployable MapReduce (MR) code to parallelize allocation process, using heuristic rule to fix illegal chromosome during encoding process and adopting mixed integer programming (MIP) as fitness function to guarantee rationality of chromosome fitness. The simulation experiment shows that in mass processing of orders, the model performance in a multi-server cluster environment is remarkable superior to that in stand-alone environment. This model can be directly applied to cloud based logistics information platform (LIP) in near future, implementing fast auto-allocation for massive concurrent orders, with great application value.  相似文献   

20.
Design-manufacturing chain (D-MC) is the most important link of the supply chain with the greatest possibility in cost reduction. How to strengthen the effective management of interfacial relationship between designer and manufacturer and increase the efficency of interface management concerns the efficiency of the whole supply chain. In order to evaluate and improve the impacts of D-MC interfacial relationship, first we should construct the evaluation index system and then we should analyze the total cost and benefit of the interfacial relationship betterment, including the cost of member units in D-MC, the opportunity cost of cooperation partners, and the market returns resulted from the interfacial relationship improvement, which will advance the whole supply chain efficiency as well as enhance the management performance of D-MC. Foundation item: the Chinese Public Service Platform for Science and Technology Management (No. 06DZ22924) and the Economic Globalization and Innovation (No. 08692106700)  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号