...本科毕业设计(论文) 外文翻译(附外文原文) 学 院: 信息科学与工程学院 课题名称: 电子密码锁设计 专业(方向): 电子信息科学与技术 班 级: 电信科技08-1班 学 生: 朱 日 科 指导教师: 陈 飞 日 期: 2012年5月10日 原 文 Hardware description language In electronics, a hardware description language or HDL is any language from a class of computer languages, specification languages, or modeling languages for formal description and design of electronic circuits, and most commonly, digital logic. It can describe the circuit's operation, its design and organization, and tests to verify its operation by means of simulation.[citation needed] HDLs are standard text-based expressions of the spatial and temporal structure and behaviour of electronic systems. Like concurrent programming languages, HDL syntax and semantics include explicit notation for expressing concurrency. However, in contrast to most software programming languages, HDLs also include an explicit notion of time, which is a primary attribute of hardware. Languages whose only characteristic is to express circuit connectivity between a hierarchy of blocks are properly classified as netlist languages used on electric computer-aided design (CAD). HDLs are used to write executable specifications for hardware. A program designed to implement the underlying semantics of the language statements and simulate the progress of time provides the hardware designer with the ability...
Words: 2891 - Pages: 12
...over finite fields. The elliptic curves defined over finite fields are used in elliptic curve cryptography since a practical digital system can handle only finite number of values. In finite fields the binary extensions fields are ideal, because of the ease with which they can be implemented in a digital system in comparison with other finite fields. The main advantage of elliptic curve cryptography is that it offers higher security with smaller key size in comparison with other existing schemes like RSA etc. Elliptic curve cryptography because of its small key size has smaller latency and lesser computational/hardware complexities...
Words: 1082 - Pages: 5
...Flip-Flops and Related Devices Multiple Choice 1 . A "D" flip-flop utilizing a PGT clock is in the CLEAR state. Which of the following input actions will cause it to change states? [Hint] CLK = NGT, D = 0 CLK = PGT, D = 0 CLOCK NGT, D = 1 CLOCK PGT, D = 1 Both a and c 2 . Which statement BEST describes the operation of a negative-edge-triggered D flip-flop? [Hint] The logic level at the D input is transferred to Q on NGT of CLK. The Q output is ALWAYS identical to the CLK input if the D input is HIGH. The Q output is ALWAYS identical to the D input when CLK = PGT. The Q output is ALWAYS identical to the D input. 3 . The circuit that is primarily responsible for certain flip-flops to be designated as edge-triggered is the: [Hint] edge-detection circuit. NOR latch. NAND latch. pulse-steering circuit. 4 . As a general rule for stable flip-flop triggering, the clock pulse rise and fall times must be: [Hint] very long. very short. at a maximum value to enable the input control signals to stabilize. of no consequence as long as the levels are within the determinate range of value. 5 . Determine the output frequency for a frequency division circuit that contains twelve flip-flops with an input clock frequency of 20.48MHz. [Hint] 10.24 kHz 5kHz 30.24kHz 15kHz 6 . An active-HIGH input S-C latch has a 1 on the S input and a 0 on the C input. What state...
Words: 1551 - Pages: 7
...NGN 110 – Recitation 11- Group 04 COE Lab Report Ammar Mahmoud b00059988 Dona Praveena g00060450 Lamis Kayyaal g00060188 Majd Alkhatib b00059274 Shakil Khan b00058548 Mr. Naveed Nawaz Monday, November 10, 2014 Table of Contents Introduction………………………………………………………… 03 Question responses …………………………………………………04 Conclusions………………………………………………………… 06 Introduction Computer Engineering (COE) is the practice of designing, developing and building computers. It incorporates ideas from its own field and several other engineering fields to construct fast compact and efficient computer systems. COE's main concentrations include cyber security, artificial intelligence and networking. In the COE lab, three applications of COE were demonstrated: The first one was a video showing the control of electric train collision, where an FPGA (Field Programmable Gate Array) system was used to avoid collision between two trains that had a common track. Switches controlled by sensors (which detect the position of the trains on the tracks) were used to stop a train while the other train moved through the common track. In the second demonstration, an FPGA based camera module was used to stream live video. A camera was used to capture data which the FPGA then converted into RGB (Red, Green and Blue) format for viewing on an LCD monitor via a VGA port. In the third demonstration, an EA Series Router was configured to its basic settings using a PC after which the...
Words: 929 - Pages: 4
...BIO INSPIRED NEURAL NETWORKING AMONG MULTI-ROBOTS CHAPTER 1 INTRODUCTION Transportation is one of the most important economic activities of any country. Among the various forms of transport, road transport is one of the most popular means of transportation. Transportation has an element of danger attached to it in the form of vehicle crashes. Road crashes not only cause death and injury, but they also bring along an immeasurable amount of agony to the people involved. Efforts to improve traffic safety to date have concentrated on the occupant protection, which had improved the vehicle crash worthiness. The other important area where research is currently being done is collision avoidance. Technological innovations have given the traffic engineer an option of improving traffic safety by utilizing the available communication tools and sophisticated instruments. Using sensors and digital maps for increasing traffic safety is in its infancy. Systems are being developed to utilize the available state of the art facilities to reduce or possibly prevent the occurrence of crashes. Total prevention of crashes might not be possible for now, but the reduction of crashes could easily be achieved by using the collision avoidance systems. 1.1 NEED FOR COLLISION AVOIDANCE The development of collision avoidance systems is motivated by their potential for increased vehicle safety. Half of the more than 1.5 million rear-end crashes that occurred in 1994 could have been prevented by...
Words: 8918 - Pages: 36
...From the situation of current domestic and international railway crossing, crossing alarm technology is a major difficulty. A variety of alarm systems have been proposed previously, but all of them have some problems. Firstly, they have poor system stability and performance; secondly, the active sensors have some defects like this: instability and short reliable life cycle which would be replaced every two years, complex working principle, cost-ineffective, prone to failure, not convenient for the work. The system integrated with GPS and GPRS networks positioning, combined the advantages of the two and overcome the disadvantages of them, which made the performance improved significantly. It uses the satellite communication to locate the train positions and measure their...
Words: 2236 - Pages: 9
...2007-2008 JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY, HYDERABAD B.TECH. ELECTRONICS AND COMMUNICATION ENGINEERING I YEAR COURSE STRUCTURE |Code |Subject |T |P/D |C | | |English |2+1 |- |4 | | |Mathematics - I |3+1 |- |6 | | |Mathematical Methods |3+1 |- |6 | | |Applied Physics |2+1 |- |4 | | |C Programming and Data Structures |3+1 |- |6 | | |Network Analysis |2+1 |- |4 | | |Electronic Devices and Circuits |3+1 |- |6 | | |Engineering Drawing |- |3 |4 | | |Computer Programming Lab. |- |3 |4 | | |IT Workshop |- |3 |4 | | |Electronic Devices and Circuits Lab |- |3...
Words: 26947 - Pages: 108
...LOGIC GATES In electronics, a logic gate is an idealized or physical device implementing a Boolean function; that is, it performs a logical operation on one or more logical inputs, and produces a single logical output. Depending on the context, the term may refer to an ideal logic gate, one that has for instance zero rise time and unlimited fan-out, or it may refer to a non-ideal physical device[1] (see Ideal and real op-amps for comparison). Logic gates are primarily implemented using diodes or transistors acting as electronic switches, but can also be constructed using electromagnetic relays (relay logic), fluidic logic, pneumatic logic, optics, molecules, or even mechanical elements. With amplification, logic gates can be cascaded in the same way that Boolean functions can be composed, allowing the construction of a physical model of all of Boolean logic, and therefore, all of the algorithms and mathematics that can be described with Boolean logic. Logic circuits include such devices as multiplexers, registers, arithmetic logic units (ALUs), and computer memory, all the way up through complete microprocessors, which may contain more than 100 million gates. In practice, the gates are made from field-effect transistors (FETs), particularly MOSFETs (metal–oxide–semiconductor field-effect transistors). Compound logic gates AND-OR-Invert (AOI) and OR-AND-Invert (OAI) are often employed in circuit design because their construction using MOSFETs is simpler and more efficient than...
Words: 2523 - Pages: 11
...Use of Unobtrusive Human-Machine Interface for Rehabilitation of Stroke victims through Robot Assisted Mirror therapy Gautam Narangi, Arjun Narang2, Soumya Singhi luhani Lempiainen Electrical and Electronics Engineering, Bharati Managing Director Vidyapeeth's College of Engineering, New Delhi, India Deltatron Oy Ltd. Department of Electronics and Instrumentation, Birla Helsinki, Finland Institute of Technology and Science, Pilani, India jle@deltatron.fi gautam2410@gmail.com, arjun.narang09@gmail.com, soumya.singh1001@gmail.com Abstract- Stroke is one of the leading causes of long-term disability worldwide. Present techniques employed One technique employed to effectively rehabilitate stroke for victims, especially those suffering from partial paralysis or rehabilitation of victims suffering from partial paralysis or loss loss of function, is using mirror therapy. Mirror therapy is a of function, such as mirror therapy, require substantial amount of resources, which may not be readily available. In traditional mirror therapy, patients place a mirror beside the functional limb, blocking their view of the affected limb, creating the illusion that both the limbs are working properly, which strategy that has been used successfully to treat phantom pain after amputation and recovery from hemiplegia after a stroke. In traditional mirror therapy, patients place a mirror beside the functional...
Words: 3208 - Pages: 13
...key challenges below 100nm due to increased complexity. For many designs, optimization of power is important as timing due to the need to reduce package cost and extended battery life. For power management leakage current also plays an important role in low power VLSI designs. Leakage current is becoming an increasingly important fraction of the total power dissipation of integrated circuits. This paper describes about the various strategies, methodologies and power management techniques for low power circuits and systems. Future challenges that must be met to designs low power high performance circuits are also discussed. Keywords: Power Dissipation, low power, process nodes, leakage current, power management. 1. Introduction The advantage of utilizing a combination of low-power components in conjunction with low-power design techniques is more valuable now than ever before. Requirements for lower power consumption continue to increase significantly as components become battery-powered, smaller and require more functionality. In the past the major concerns for the VLSI designers was area, performance and cost. Power consideration was the secondary concerned. Now a day’s power is the primary concerned due to the...
Words: 3236 - Pages: 13
...Fig 3.2 Combined Sub Byte and Inv Sub Byte sharing a common multiplicative inversion module 3.2. PREVIOUS IMPLEMENTATIONS OF THE S-BOX: One of the most common and straight forward implementation of the S-Box for the Sub Byte operation which was done in previous work was to have the pre-computed values stored in a ROM based lookup table. In this implementation, all 256 values are stored in a ROM and the input byte would be wired to the ROM’s address bus. However, this method suffers from an unbreakable delay since ROMs have a fixed access time for its read and write operation. Furthermore, such implementation is expensive in terms of hardware. A more refined way of implementing the S-Box is to use combinational logic. This S-Box has the advantage of having small area occupancy, in addition to be capable of being pipelined for increased performance in clock frequency. The S-Box architecture discussed in this paper is based on the combinational logic implementation. 3.3. S-BOX CONSTRUCTION METHODOLOGY: This section illustrates the steps involved in constructing the multiplicative inverse module for the S-Box using composite field arithmetic. Since both the Sub Byte and InvSubByte transformation are similar other than their operations which involve the Affine Transformation and its inverse, therefore only the implementation of the Sub Byte operation will be discussed in this paper. The multiplicative inverse computation will first be covered and the affine transformation will then...
Words: 10253 - Pages: 42
...Abbreviated version of this report is published as "Trends in Computer Science Research" Apirak Hoonlor, Boleslaw K. Szymanski and M. Zaki, Communications of the ACM, 56(10), Oct. 2013, pp.74-83 An Evolution of Computer Science Research∗ Apirak Hoonlor, Boleslaw K. Szymanski, Mohammed J. Zaki, and James Thompson Abstract Over the past two decades, Computer Science (CS) has continued to grow as a research field. There are several studies that examine trends and emerging topics in CS research or the impact of papers on the field. In contrast, in this article, we take a closer look at the entire CS research in the past two decades by analyzing the data on publications in the ACM Digital Library and IEEE Xplore, and the grants awarded by the National Science Foundation (NSF). We identify trends, bursty topics, and interesting inter-relationships between NSF awards and CS publications, finding, for example, that if an uncommonly high frequency of a specific topic is observed in publications, the funding for this topic is usually increased. We also analyze CS researchers and communities, finding that only a small fraction of authors attribute their work to the same research area for a long period of time, reflecting for instance the emphasis on novelty (use of new keywords) and typical academic research teams (with core faculty and more rapid turnover of students and postdocs). Finally, our work highlights the dynamic research landscape in CS, with its focus constantly ...
Words: 15250 - Pages: 61
...------------------------------------------------- Data compression From Wikipedia, the free encyclopedia (Redirected from Video compression) "Source coding" redirects here. For the term in computer programming, see Source code. In digital signal processing, data compression, source coding,[1] or bit-rate reduction involves encoding information using fewer bits than the original representation.[2]Compression can be either lossy or lossless. Lossless compression reduces bits by identifying and eliminating statistical redundancy. No information is lost in lossless compression. Lossy compression reduces bits by identifying unnecessary information and removing it.[3] The process of reducing the size of a data file is referred to as data compression. In the context of data transmission, it is called source coding (encoding done at the source of the data before it is stored or transmitted) in opposition to channel coding.[4] Compression is useful because it helps reduce resource usage, such as data storage space or transmission capacity. Because compressed data must be decompressed to use, this extra processing imposes computational or other costs through decompression; this situation is far from being a free lunch. Data compression is subject to a space–time complexity trade-off. For instance, a compression scheme for video may require expensive hardware for the video to be decompressed fast enough to be viewed as it is being decompressed, and the option to decompress the video...
Words: 12347 - Pages: 50
...Click here to download the solutions manual / test bank INSTANTLY!! http://testbanksolutionsmanual.blogspot.com/2011/02/accounting-information-systems-romney.html ------------------------------------------------------------------------------------------------------------------------ Accounting Information Systems Romney 11th Edition Solutions Manual Accounting Information Systems Romney 11th Edition Solutions Manual Accounting Information Systems Romney 11th Edition Solutions Manual Accounting Information Systems Romney Steinbart 11th Edition Solutions Manual Accounting Information Systems Romney Steinbart 11th Edition Solutions Manual ------------------------------------------------------------------------------------------------------------------------ ***THIS IS NOT THE ACTUAL BOOK. YOU ARE BUYING the Solution Manual in e-version of the following book*** Name: Accounting Information Systems Author: Romney Steinbart Edition: 11th ISBN-10: 0136015182 Type: Solutions Manual - The file contains solutions and questions to all chapters and all questions. All the files are carefully checked and accuracy is ensured. - The file is either in .doc, .pdf, excel, or zipped in the package and can easily be read on PCs and Macs. - Delivery is INSTANT. You can download the files IMMEDIATELY once payment is done. If you have any questions, please feel free to contact us. Our response is the fastest. All questions will always be answered in 6...
Words: 18533 - Pages: 75
...Organizational Theory, Design, and Change Jones 6th Edition Test Bank Click here to download the solutions manual / test bank INSTANTLY!!! http://solutionsmanualtestbanks.blogspot.com/2011/10/organizational-theory-d esign-and-change_18.html ----------------------------------------------------------------------Organizational Organizational Organizational Organizational Theory, Theory, Theory, Theory, Design, Design, Design, Design, and and and and Change Change Change Change Jones Jones Jones Jones 6th 6th 6th 6th Edition Edition Edition Edition Test Test Test Test Bank Bank Bank Bank -------------------------------------------------------------------------***THIS IS NOT THE ACTUAL BOOK. YOU ARE BUYING the Test Bank in e-version of the following book*** Name: Organizational Theory, Design, and Change Author: Jones Edition: 6th ISBN-10: 0136087310 Type: Test Bank - The test bank is what most professors use an a reference when making exams for their students, which means there’s a very high chance that you will see a very similar, if not exact the exact, question in the test! - The file is either in .doc, .pdf, excel, or zipped in the package and can easily be read on PCs and Macs. - Delivery is INSTANT. You can download the files IMMEDIATELY once payment is done. If you have any questions, please feel free to contact us. Our response is the fastest. All questions will always be answered in 6 hours. This is the quality of service we are providing and we hope to be your...
Words: 29834 - Pages: 120