AICIT

Displaying 1-40 of 1598 results

  • White Papers // Sep 2010

    Proposing A Comprehensive Storage Virtualization Architecture With Related Verification For Data Center Application

    A successful IT Company is characterized by its ability to put the right information in front of the right decision-makers at the right time while concerns about security issues. These objectives require a strategy for reducing the costs, minimizing the risks, and enabling an agile management system. But existing solutions...

    Provided By AICIT

  • White Papers // Aug 2010

    An Approach of Location Management in GSM Using GIS

    This paper provides with an easy to understand, step-by-step approach to location determination and management - crucial knowledge for exploiting location as a value-added service enabler for mobile communications. It presents a model of location management of Mobile Station (MS) using Geographic Information System (GIS) in GSM (Global System Module)...

    Provided By AICIT

  • White Papers // Aug 2010

    Performance Analysis of DS-CDMA Over a Non Fading Channel With Perfect Power Control Under Different Processing Gain

    Code Division Multiple Access (CDMA) is a well known access technology in which all the users share the spread spectrum. Again one of the most important challenges with respect to wireless access is to combat with fading and interference. CDMA is the technique that is more efficient to overcome frequency...

    Provided By AICIT

  • White Papers // Aug 2010

    A Study and Analysis of Channel Modeling for the Ultra Wide Band Wireless Body Area Network

    Future Communication systems will be driven by the concept that how every one can be connected from anywhere at any time. An essential part of this concept is Wireless Body Area Network (WBAN) approach by which services are constantly available and the best use of this WBAN is health monitoring....

    Provided By AICIT

  • White Papers // Aug 2010

    Fingerprint Identification and Verification System by Minutiae Extraction Using Artificial Neural Network

    The proposed Fingerprint Identification and verification System is biometric identification methodology that uses digital imaging technology to obtain, store, and analyze fingerprint data. Here the authors want introduced a new method for fingerprint identification technology by minutiae feature extraction using back-propagation algorithm. For an input image, the local ridge orientation...

    Provided By AICIT

  • White Papers // Aug 2010

    Study of IP Over WDM Networks Using MPLS System

    Though enormous improvement has occurred in the field of transmission media layer for which gigantic amount of data can be transferred but there is bottleneck problem at the upper layer protocol stack so that eventually the data transmission process becomes slower. Data may be transferred by optical fiber as a...

    Provided By AICIT

  • White Papers // Aug 2010

    A Case Based Tool for Monitoring of Web Services Behaviors

    Monitoring systems is of great practical importance. The use of service oriented distributed system is increasing. Within Service Orientation (SO) Web Services (WS) are the de facto standard for implementing service-oriented systems. Users want uninterrupted service from service providers. So the management of these systems is becoming crucial. Monitoring is...

    Provided By AICIT

  • White Papers // Aug 2010

    A Survey on Sensor Network

    Sensor networks are recently rapidly growing research area in wireless communications and distributed network. Sensor network is a densely deployed wireless network of small, low-cost sensors, which can be used in various applications like - health, environmental monitoring, military, home, gathering and sensing information in inhospitable locations etc. Wireless sensor...

    Provided By AICIT

  • White Papers // Aug 2010

    Performance Analysis of Integrated Service Over Differentiated Service for Next Generation Internet

    This paper discusses on next generation Internet how the authors can provide Quality of Services (QoS) to the users while today's internet provides the BES (Best Effort Services), that does not guaranteed the QoS. Here, the authors proposed an internet service for next generation internet where integrated and differentiated services...

    Provided By AICIT

  • White Papers // Aug 2010

    Query Optimization on Relational Databases for Supporting Top-k Query Processing Techniques

    Information systems apply various techniques to rank query answers. Ranking queries (Or top-k queries) are dominant in many emerging applications, e.g., similarity queries in multimedia databases, searching web databases, midlewares and data mining. In such application domains, end-users are more interested in the most important (Top-k) query answers in the...

    Provided By AICIT

  • White Papers // Mar 2012

    Research and Development of One Novel Distributed Digital Seismic Acquisition Station

    As an important tool in geophysical field, seismic prospecting instrument plays an important role for seismic data acquisition. The paper is to adopt the most advanced SoPC technology in current electronic design automation field for tentative study of new digital seismic acquisition station so as to develop a set of...

    Provided By AICIT

  • White Papers // Feb 2013

    Study on Fuzzy Control System for Traffic Signals Based on FPGA

    Traffic congestion is one of the worst problems in some cities of many countries. Recently, it is a hot topic to develop an effective real-time control system for traffic signals at intersections. This paper presented a method to design a real-time FPGA-based fuzzy control system for traffic signals at an...

    Provided By AICIT

  • White Papers // Dec 2011

    Component-Based Functional Integrated Circuit System Design and Its Straight Implementation

    Component-based Functional Integrated Circuit System (FICS) refers to the design and implementation of FICS using the Integrated Circuit system components. This paper discusses two parts: the Component-based Services Framework (CSF), or rather, the FICS framework for component-based application services, and Functional Integrated Circuit System Architecture Description Language (FICSADL), or rather,...

    Provided By AICIT

  • White Papers // Feb 2013

    A Programmable Timing Circuit with an Embedded BIST for Robust Timing of Sense Amplifiers

    A programmable timing circuit with an embedded BIST has been used in this paper for random-variation-tolerant timing of Static Random Access Memory (SRAM).In this scheme, a programmable replica-cell-based timing is used to tune the timing of Sense Amplifier Enable signal (SAE) by a control code determined by an at-speed BIST....

    Provided By AICIT

  • White Papers // Dec 2012

    Single-Rail MOS Current Mode Logic Circuits for Low-Power and High- Speed Applications

    MOS Current-Mode Logic (MCML) is usually used for high-speed applications. However, almost all MCML circuits are realized with dual-rail scheme. The dual-rail logic circuits increase extra area overhead and the complexity of the layout place and route. Moreover, little standard cells of the dual-rail logic circuits have been developed for...

    Provided By AICIT

  • White Papers // Jun 2012

    A Full Adder Standard Cell Based on Near-Threshold Computing Embedded in Commercial Standard-Cell Libraries

    With sizes of MOS transistors scaling down, energy dissipation has become a major consideration concern in nanometer CMOS circuits. Near-threshold computing for CMOS circuits can respectively reduce both dynamic and leakage power dissipations. In this paper, a near-threshold full adder standard cell is developed and embedded into commercial standard-cell libraries....

    Provided By AICIT

  • White Papers // Apr 2011

    Experimentation with the Design of Databases of Personal Identifiable Information

    A database of Personal Identifiable Information (PII) is designed based on PII, analogous to normalizing relational database schema using data dependencies. A PII database with its own conceptual scheme, system management, and physical structure can be justified according to security and privacy considerations. In this paper, the authors experiment with...

    Provided By AICIT

  • White Papers // Feb 2013

    Bypass Network Security Detection Model for Virtual Machine Intranet

    With the rapid development of could, its security problems emerge in large numbers. Gartner Inc. has drawn seven conclusions about the security risk of could computing, and Dengguo Feng, etc. Virtual intranet performance of virtual machine manager is important factor to keep the whole virtual platform works efficiently. This paper...

    Provided By AICIT

  • White Papers // Feb 2013

    Solving Computationally Intensive Problems in Reconfigurable Hardware: A Case Study

    In this paper, the authors explore the effectiveness of solution of computationally intensive problems in FPGA (Field-Programmable Gate Array) on an example of Sudoku game. Three different Sudoku solvers have been implemented and tested on a low-cost FPGA of Xilinx Spartan-3E family. The first solver is only able to deal...

    Provided By AICIT

  • White Papers // Oct 2012

    Development of Wireless Automatic Checking System for Emergency Lights Via Internet

    In this paper, the authors develop a wireless automatic checking system for a number of emergency lights at the same time via Internet. The proposed system can check the status of emergency lights including the battery with charger using a microprocessor-based detector in a scheduled period. Every emergency light is...

    Provided By AICIT

  • White Papers // Aug 2012

    A New Method for Analog Circuit Fault Diagnosis Based on Testability and Chaos Particle Swarm Optimization

    A new method of low-testability fault diagnosis for analog circuit is proposed. Its main content includes: the transfer relation between test nodes and inputs of a circuit is computed based on the topological structure and the information of finite test points of the circuit. The diagnosability of each component in...

    Provided By AICIT

  • White Papers // Dec 2010

    Area Optimization in Floorplanning Using AP-TCG

    Most of existing floorplanning algorithms evaluate the target area after packing all of the blocks, but random perturbation will make the target area larger or less unpredictably. In this paper, a unified non-slicing Area Prejudged-Transitive Closure Graph (AP-TCG) algorithm is proposed, which can estimate the target area before packing. AP-TCG...

    Provided By AICIT

  • White Papers // Mar 2013

    Occupation Card Design and Implementation

    In this paper, the authors present the design of an embedded card that is composed of write-read system for vocational colleges. The paper also gives the detailed design of the system and the specific implementation method, including hardware structure, specific algorithms, software driver, and its application. The system uses ARM9...

    Provided By AICIT

  • White Papers // Sep 2012

    Design and Implementation of Reconstruction Circuit of Ternary Optical Computer

    In recent years, a lot of advances have been achieved in research of ternary optical computer. Presently the research of ternary optical computer has entered a new stage in which the focus is on practical application. Reconstruction technique is one of the most important ones of development of the ternary...

    Provided By AICIT

  • White Papers // Mar 2013

    Application of SOPC Technology in Designing Wireless Data Transmission of DCS System

    In view of the problems of too many detecting system IO points of online water quality parameters, high routing cost caused by distributed detecting point, inconvenient repair, the paper designed a wireless data transmit system based on the SOPC (System On a Programmable Chip) technology. The use of wireless radio...

    Provided By AICIT

  • White Papers // Feb 2013

    Design and Implementation of Cryptographic Protection for SCADA Communication

    Supervisory Control and Data Acquisition (SCADA) systems are widely used in critical infrastructure sectors including power, gas, oil and water. Several malicious attacks aiming at SCADA systems have caused serious consequence in recent years. The communication in SCADA systems is particularly vulnerable to malicious attacks. In this paper, the authors...

    Provided By AICIT

  • White Papers // May 2011

    Simplified Repeated Clipping and Filtering with Spectrum Mask for PAPR Reduction

    An improved Peak-to-Average Power Ratio (PAPR) reduction scheme, named Simplified Repeated Clipping and Filtering with Spectrum Mask (SRCF-SM), is proposed for Orthogonal Frequency Division Multiplexing (OFDM) systems, where the schemes of Simplified Repeated Clipping and Filtering (SRCF) and Spectral Clipping (SC) are integrated in the frequency domain, based on the...

    Provided By AICIT

  • White Papers // Jul 2013

    Hardware Based Real Time Audio Watermarking Using Embedded Module

    To achieve audio signal robustness, this paper proposed a blind watermarking algorithm that embeds watermark in coefficient bits of the low frequency band and extracts it without original audio signal. It spreads the frequency band for hardware based watermarking to protect audio contents rights, generates watermark sequence on the watermark...

    Provided By AICIT

  • White Papers // May 2013

    LDPC Encoder Hardware Design for the Next Generation Wireless LAN

    Encoder design of Low Density Parity Check codes (LDPC) is a crucial step for the next generation wireless LAN based on IEEE802.11ac. Each IP of LDPC encoder on the market needs to use storage check matrix and other units individually, which often can take up a lot of storage resources....

    Provided By AICIT

  • White Papers // Jan 2013

    Design and Application of a Multi-Function Logging Signal Format Adapter

    The technology of combination logging can improve the efficiency and reduce the cost of well logging effectively, which had been confirmed in the past few years. The researchers have to develop different kinds of signal format adapters, in order to matching the different series of logging instruments which developed by...

    Provided By AICIT

  • White Papers // Nov 2012

    Research of Digital Circuit Optimization Design Algorithm

    Digital circuit optimization design is important in real world applications and the traditional algorithms cannot deal with this problem well. Therefore, based on a simple genetic algorithm and combine the base ideology of orthogonal design method then applied it to the population initialization, using the intergenerational elite mechanism, as well...

    Provided By AICIT

  • White Papers // Jan 2013

    Design of Website Recovery System Based on Customized-SSD and Cloud Storage

    Data backup and recovery is a common scheme to protect the data of a website. However, a traditional data backup system costs too much for small and medium-sized websites due to the requirement of independent data storage servers. Cloud storage can make contributions to reduce the cost, but the bandwidth...

    Provided By AICIT

  • White Papers // Sep 2012

    A PVT-Compensation Scheme for Subthreshold SRAM

    In this paper, a Process, Voltage and Temperature (PVT) compensation scheme is proposed for sub-threshold SRAM. Simulation results demonstrated that by adopting the proposed design, the average access time is decreased by 64.4% and the standard deviation is reduced to 17.3%, which can relief the impacts of the PVT variations...

    Provided By AICIT

  • White Papers // Feb 2013

    An ASIC Implementation of the MP3 Decoder for a DAB and MP3 Combined Chip

    In this paper, the authors propose an ASIC Implementation of the MP3 decoder for a MP3 and DAB combined chip in this paper. This MP3 decoder designed in pure hardware approach has the advantages high integration and low power consumption. Due to the system structure optimization and hardware sharing with...

    Provided By AICIT

  • White Papers // May 2013

    Near-Threshold Computing of Exclusive-OR and Exclusive-NOR Standard Cells Based on Mix Logic

    In this paper, near-threshold Exclusive-OR and Exclusive-NOR standard cells are introduced into SMIC (Semiconductor Manufacturing International Corporation) 130nm CMOS libraries. The new Exclusive-OR and Exclusive-NOR cells are realized based on mix logic for low voltage operating, which consists of complementary pass-transistor logic and differential cascade voltage switch logic. The Exclusive-OR...

    Provided By AICIT

  • White Papers // Dec 2012

    A Leakage Current-Compensation-Mode Sense Amplifier for High-Performance SRAM

    Within the complex of information technology industries, the semiconductor industry plays an extremely important role as provider of the building blocks for IT products and systems. As the semiconductor technology progresses, transistor's leakage current increases significantly, which cause SRAM performance degraded dramatically. Current Sense Amplifier (SA) always achieves higher performance...

    Provided By AICIT

  • White Papers // Jul 2013

    Measurement Method of the System Reconfigurability

    As to the software system, there has been some international standards provided to measure its quality, but as to the reconfigurable computing system, currently, no measurement model is available to metric its quality. Firstly, the paper introduces the emergence, development, application of the reconfigurable computing. Then, the paper addresses the...

    Provided By AICIT

  • White Papers // Aug 2011

    A DFA-Based Distributed IP Watermarking Method Using Data Compression Technique

    The IP (Intellectual Property) protection has been widely concerned by more semiconductor companies and research institutions, due to the rapid advances in deep sun-micron integrated circuits. A DFA (Deterministic Finite Automaton)-based distributed IP watermarking method is presented by using data compression technology. DFA is used for generating pseudorandom key stream...

    Provided By AICIT

  • White Papers // Nov 2012

    RAM Access Optimization Strategy Oriented to Reconfigurable Compiling Technique

    Based on four layer C-to-VHDL reconfigurable compiler framework which is developed based on LLVM framework (Low Level Virtual Machine), this paper proposed an Optimization Strategy for RAM access. By analyzing the load and store instruction in LLVM's IR (Intermediate Representation) and the data dependence, a dedicated data path is created...

    Provided By AICIT

  • White Papers // Aug 2012

    Optimization and Implementation of Programmable Demodulator for M-PSK/16QAM Signals

    In this paper, an optimized programmable demodulation scheme suitable for M-PSK/16QAM signals is proposed. The scheme adopts the conception of component reuse by exploring the demodulation structures of M-PSK and 16QAM respectively. The carrier phase recovery circuit uses the reduced complexity Costas loop. The symbol timing synchronization circuit adopts Gardner...

    Provided By AICIT