نتایج جستجو برای: lfsr

تعداد نتایج: 528  

Journal: :International Journal of Electrical and Computer Engineering (IJECE) 2020

Journal: :IOP Conference Series: Materials Science and Engineering 2020

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده برق و کامپیوتر 1393

در این پایان نامه به بررسی روش های بازسازی اسکرمبلرهای خطی و مقایسه عملکرد آنها می پردازیم. در سیستم های مخابراتی دیجیتال از اسکرمبلرهای خطی برای شکستن توالی زیادی از بیت های یکسان که شامل صفرها و یک های پشت سرهم می باشند و منجر به مشکلاتی در سنکرون سازی می شوند استفاده می کنند. یک اسکرمبلر خطی شامل یک شیفت رجیستر فیدبکی خطی می باشد که خروجی آن با دنباله ی ورودی موردنظر ترکیب می شود. به طور کلی...

1995
Nur A. Touba Edward J. McCluskey

This paper presents a new approach for on-chip test pattern generation. The set of test patterns generated by a pseudo-random pattern generator (e.g., an LFSR) is transformed into a new set of patterns that provides the desired fault coverage. The trang5ormation is performed by a small amount of mapping logic that decodes sets of patterns that don't detect any new faults and maps them into patt...

2012
Dhrumeel V. Bakshi Patrick R. Schaumont Sandeep K. Shukla

With the increase of device complexity and test-data volume required to guarantee adequate defect coverage, external testing is becoming increasingly difficult and expensive. Logic Built-in Self Test (LBIST) is a viable alternative test strategy as it helps reduce dependence on an elaborate external test equipment, enables the application of a large number of random tests, and allows for at-spe...

1999
Youngkook Kim Saewoong Bahk

| Wireless medium is inherently insecure due to its broadcast characteristics. As wireless communications become more prevalent and utilize the radio channel for transmission of critical information, the concern for security becomes an important issue. In this paper a new CDMA-based multiple access scheme for wireless LANs is proposed to provide enhanced security. Although most of the e orts in...

Journal: :International Conference on Aerospace Sciences and Aviation Technology 1997

Journal: :International journal of electrical and computer engineering systems 2022

One of the most important challenges facing researchers is to find new methods protect data sent over Internet and prevent unauthorized access it. In this paper, we present a method for encrypting image divided into two stages. The first stage requires redistributing positions pixels by using key random numbers generated linear feedback shift registers then deoxyribonucleic acid rules. in previ...

2001
W. F. Lunnon

This paper might fairly be said to fall between three stools: the presentation and justification of a number of related computational methods associated with LFSR sequences, including finding the order, recurrence and general term; the exploration of tutorial examples and survey of applications; and a rigorous treatment of one topic, the recursive construction of the number wall, which we belie...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید