首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
互连测试是边界扫描技术的主要内容之一,在分析IEEE1149.1的基础上,给出一种基于嵌入式开源数据库SQLite的边界扫描测试系统中互连测试矢量生成的设计。利用SQLite数据库中存储的被测电路的扫描链路信息和器件等信息,得到扫描粗链并进一步形成扫描细链;利用可测网络信息结合测试算法产生测试矢量。最终将测试矢量在扫描细链上对扫描单元赋值即得到扫描链的互连测试矢量集。测试结果表明,该设计可快速生成测试矢量而缩短测试时间,具有较好的应用前景。  相似文献   

2.
杨迪珂  颜学龙 《应用声学》2017,25(5):4-6, 13
伴随着电子技术和边界扫描测试技术的飞速发展,新的边界扫描测试算法也在不断涌现;而边界扫描测试的算法,一般都是指在互联模型的基础上,边界扫描测试向量的生成算法;生成合理的测试向量集可以以最短的测试时间来覆盖尽可能多的故障;从对一些常用的边界扫描测试算法进行了粗略的分析,到后来对等权值算法和二进制计数算法进行了详细的分析,通过引入和分析边界扫描测试算法的定理、公式以及推论等,分别提出了等权值优化算法和权值递加算法;与优化前的算法作为比较,等权值优化算法降低了征兆混淆出现的概率,而权值递加算法同时降低了征兆误判率和征兆混淆率;综合分析,新的算法更好的权衡了测试向量集的完备性指标和紧凑型指标。  相似文献   

3.
杜影  徐鹏程  李洋 《应用声学》2015,23(3):16-16
随着嵌入式测试概念的产生,边界扫描技术作为高密度电路板故障检测的主流技术,将结合嵌入式测试方法,成为板级乃至系统级故障检测的新研究方向。嵌入式边界扫描是电路板级故障检测的必然发展趋势。文中首先介绍了嵌入式边界扫描技术,然后提出了一种嵌入式边界扫描测试数据压缩及合成方法,阐述了嵌入式边界扫描的数据生成及下载,最后以某数字电路板为对象进行了嵌入式边界扫描测试验证,并给出结论。总体上,嵌入式边界扫描测试以增强测试自动化、提高测试覆盖率和测试效率为目的,能够更好的降低产品整个寿命周期的测试维修成本。  相似文献   

4.
崔广宇 《应用声学》2014,22(8):2380-2382,2386
测试性详细设计是现代飞机顶层测试性设计的后续工作,根据现有飞机设计体系的构成,分飞机级、系统级、机载设备级3个层次论述了飞机测试性详细设计的方法;从综合诊断设计、故障信息显示以及故障告警3个方面阐述了飞机级测试性详细设计的内容;提炼了系统级测试性详细设计工作的组成,针对航电系统给出了通用、典型的测试性详细设计方法-基于模块测试与维护总线的边界扫描技术;详细论述了成品测试性详细设计,即BIT设计的准则及具体内容;论文的工作紧密结合在研型号的实际需求,有很好的工程实用价值。  相似文献   

5.
单芯片多核设计、片上系统等技术的不断发展为边界扫描技术带来了新的挑战,多扫描拓扑的测试矢量自动生成也成为了研究的重点与热点。基于1149.7标准对测试生成方法进行了研究,包括互连测试矢量、调试应用指令及数据和寄存器配置命令的生成,提出了测试生成的总体框架,以VS2008作为软件平台搭建自动测试生成系统,从数据库中提取目标板信息对寄存器进行配置,生成互连测试矢量或调试数据,最后将生成的信息插入数据库中,在互连测试矢量生成过程中,提出了一种基于边界扫描寄存器的功能来设置网络结点类型的新方法,有效地完成了对复杂网络的测试。  相似文献   

6.
在边界扫描测试技术中,由BS器件和非BS器件主成的逻辑簇测试是研究的难点问题,文章介绍了高效、简明、移植性好的TCL语言,在深入研究边界扫描簇测试原理的基础上,以实现逻辑簇测试为目的,采用了TCL嵌入C++的方法实现测试用例的脚本化,完成了基于TCL语言的Cluster测试脚本设计;通过对数字电路实验板的测试结果分析,得到了使用TCL脚本语言与C++联合编程能够实现簇测试,并且可以提高边界扫描测试软件工作效率的结论,具有较好的应用前景。  相似文献   

7.
王传申  马志勇 《应用声学》2015,23(12):18-18
针对用户专用键盘故障排查过程中的低效率问题,本文采用边界扫描法、内建自测试法等对其进行测试性设计改进,使得利用已有的边界扫描设备即可实现自动化故障诊断。并通过设置管脚短路和芯片功能异常两个故障实际验证了用户专用键盘可测试设计效果,实验结果表明,改进后的用户专用键盘可快速定位故障,并且具有较高的准确度和精度。本文对用户专用键盘进行测试性设计改进,以使其满足边界扫描设备测试要求,此种方法对其它单片机系统的测试性设计具有借鉴意义。  相似文献   

8.
曹子剑  佘美玲 《应用声学》2015,23(7):2311-2313, 2317
边界扫描测试是当前数字电路模块故障隔离的主要手段,但测试能力受到模块可测试性设计限制,其它方面作用也被忽略。文中对数字电路自动测试系统设计提出了边界扫描测试应用技术,包括系统自检测试,模块功能测试和模块故障隔离。在系统自检测试中应用边界扫描,提高了设备自检故障隔离精度;而对于模块功能测试,边界扫描测试技术提供了一种新的选择;在故障隔离中扩展和延伸应用边界扫描技术,突破了模块自身测试性的限制,提高了边界扫描测试的故障覆盖率和故障隔离精度。通过实际测试验证表明,该设计方法稳定可靠,同时提升了测试系统自身和模块的测试能力和隔离精度。  相似文献   

9.
洪杰峰  潘英锋  冷毅  耿方志 《应用声学》2014,22(10):3088-30903094
为提高现代军事装备的故障检测能力,运用VC++软件编辑控制界面,设计并制作了一种基于51系列单片机的边界扫描控制器;该控制器由USB转串口电路和单片机构成,结构简单、通用性强且成本低廉;将PC机发送的测试指令或数据进行USB与JTAG协议转换,产生符合IEEE1149.1标准的JTAG总线信号;以EPM7128芯片为测试对象,注入JTAG信号并采集测试响应,实现了对基于测试芯片硬件电路的故障检测;测试结果表明:设计的边界扫描控制器可实现对单芯片和芯片级联的边界扫描状态的控制,能避开可编程芯片的内部逻辑程序控制,完成对可编程芯片及其外围电路的故障检测。  相似文献   

10.
对国内外关军用及民用飞机平台、分系统及设备雷电标准进行分析,针对雷电直接效应和雷电间接效应的所有测试项目,详述每个测试项目的适用区域、波形要求、测试配置等。结合现有国内雷电设计验证标准及测试存在的不足,提出提升测试设备与试验验证技术匹配性、扩展军用标准测试领域、统一同军种同一平台要求等建议。通过对军用机载平台、设备及分系统关于雷电设计验证标准及测试的分析,为相关产品设计师及试验人员提供设计指标参考,明确产品关于雷电防护的设计要求及验证要求,做到有的放矢,提高设计费效比。  相似文献   

11.
Related to the letters of an alphabet, entropy means the average number of binary digits required for the transmission of one character. Checking tables of statistical data, one finds that, in the first position of the numbers, the digits 1 to 9 occur with different frequencies. Correspondingly, from these probabilities, a value for the Shannon entropy H can be determined as well. Although in many cases, the Newcomb–Benford Law applies, distributions have been found where the 1 in the first position occurs up to more than 40 times as frequently as the 9. In this case, the probability of the occurrence of a particular first digit can be derived from a power function with a negative exponent p > 1. While the entropy of the first digits following an NB distribution amounts to H = 2.88, for other data distributions (diameters of craters on Venus or the weight of fragments of crushed minerals), entropy values of 2.76 and 2.04 bits per digit have been found.  相似文献   

12.
Chalcogenide glass fibers have many unique properties that make them attractive for applications that are not possible with silica fibers. Selected applications of chalcogenide fibers in research, commerce, and the military are reviewed.  相似文献   

13.
Anderson localization is a famous wave phenomenon that describes the absence of diffusion of waves in a disordered medium. Here we generalize the landscape theory of Anderson localization to general elliptic operators and complex boundary conditions using a probabilistic approach, and further investigate some mathematical aspects of Anderson localization that are rarely discussed before. First, we observe that under the Neumann boundary condition, the low energy quantum states are localized on the boundary of the domain with high probability. We provide a detailed explanation of this phenomenon using the concept of extended subregions and obtain an analytical expression of this probability in the one-dimensional case. Second, we find that the quantum states may be localized in multiple different subregions with high probability in the one-dimensional case and we derive an explicit expression of this probability for various boundary conditions. Finally, we examine a bifurcation phenomenon of the localization subregion as the strength of disorder varies. The critical threshold of bifurcation is analytically computed based on a toy model and the dependence of the critical threshold on model parameters is analyzed.  相似文献   

14.
利用核磁共振方法研究了辣椒碱β-环糊精包合物的化学计量比、空间结构信息及其在水溶液中的自扩散系数. 通过测定不同浓度比的辣椒碱和β-环糊精混合溶液的 1H NMR数据,绘制Job's曲线,辣椒碱和β-环糊精的Job's曲线均在r=0.5处出现拐点. 同时测定了该包合物的2D ROESY和DOSY谱图,ROESY谱图中NOE交叉信号出现在辣椒碱的H-1~H-8和β-环糊精的H-3′、H-5′、H-6′之间,DOSY测得β-环糊精和辣椒碱形成包合物前后的表观自扩散系数. 结果表明,辣椒碱β-环糊精包合物的主客体分子的化学计量比为1∶1,辣椒碱分子的异丙基端从β-环糊精的宽口端进入疏水腔,其中H-1~H-8部分在空腔内部,包合物的自扩散系数为2.95×10-10m2/s.  相似文献   

15.
The extended form of modified Kadomtsev-Petviashvili equation with variable-coefficient is investigated in the framework of Painlevé analysis. The Lax pairs are obtained by analysing two Painlevé branches of this equation. Starting with the Lax pair, the N-times Darboux transformation is constructed and the N-soliton solution formula is given, which contains 2n free parameters and two arbitrary functions. Furthermore, with different combinations of the parameters, several types of soliton solutions are calculated from the first order to the third order. The regularity conditions are discussed in order to avoid the singularity of the solutions. Moreover, we construct the generalized Darboux transformation matrix by considering a special limiting process and find a rational-type solution for this equation.  相似文献   

16.
By looking at the Lovelock theorem one can infer that the gravity model given by [1] cannot be applicable for all types of 4D Einstein–Gauss–Bonnet (EGB) curved space-time. The reason for this is that in 4D space-time, the Gauss–Bonnet invariant is a total derivative and hence it does not contribute to gravitational dynamics. Hence, the authors of [2] presented an alternative consistent EGB gravity model instead of [1] by applying a break-of-diffeomorphism property. In this work, we use the alternative model to produce a de Sitter (dS)/Anti-de Sitter (AdS) black hole metric and then investigate its thermodynamic behavior in the presence of a cloud of Nambu–Goto strings. Mathematical derivations show that the resulting diagrams of pressure vs specific volume at a constant temperature are similar to that for a van der Waals gas/fluid in an ordinary thermodynamic system in the dS sector but not in the AdS background. From this, we infer that the black hole participates in the small-to-large black hole phase transition in the dS background, while it exhibits a Hawking–Page phase transition in the AdS background. In the latter case, an evaporating black hole eventually reaches an AdS vacuum space because of its instability.  相似文献   

17.
We propose a bidirectional quantum secure direct communication (QSDC) network protocol with the hyperentanglment in both the spatial-mode ad the polarization degrees of freedom of photon pairs which can in principle be produced with a beta barium borate crystal. The secret message can be encoded on the photon pairs with unitary operations in these two degrees of freedom independently. Compared with other QSDC network protocols, our QSDC network protocol has a higher capacity as each photon pair can carry 4 bits of information. Also, we discuss the security of our QSDC network protocol and its feasibility with current techniques.  相似文献   

18.
Endgame studies have long served as a tool for testing human creativity and intelligence. We find that they can serve as a tool for testing machine ability as well. Two of the leading chess engines, Stockfish and Leela Chess Zero (LCZero), employ significantly different methods during play. We use Plaskett’s Puzzle, a famous endgame study from the late 1970s, to compare the two engines. Our experiments show that Stockfish outperforms LCZero on the puzzle. We examine the algorithmic differences between the engines and use our observations as a basis for carefully interpreting the test results. Drawing inspiration from how humans solve chess problems, we ask whether machines can possess a form of imagination. On the theoretical side, we describe how Bellman’s equation may be applied to optimize the probability of winning. To conclude, we discuss the implications of our work on artificial intelligence (AI) and artificial general intelligence (AGI), suggesting possible avenues for future research.  相似文献   

19.
Large pγ charged pion pair produced in Double Diffractive Dissocjation (DDD) process at high energy is studied with double pomeron (IP) exchange mechanism. Using DonnachieLandshoff pomeron model we have calculated the cross-section of the process at the energy interval from ISR to LHC when the rapidity of the charged pions is approximately equal to zero. It is shown that this process is the favorite in experiments which could effectively be used to examine Donnachie-Landshoff pomeron model and provide a possibility to check the value of the suppression coefficient N2.  相似文献   

20.
The recent BES Collaboration data on φ →PV, particularly the isospin violating mode φ′ → πoωo and finding of a finite number for B(φ′ → K*OKO), enable us now to deal more precisely about the challenges to theory concerning this extraordinary and remarkableso-called ρ-π puzzle of J/φ and φ′ decays. In terms of the existing data and deploying the simplest phenomenology, measurement of φ′ → π+π- and whether a finite number for the K*+K- mode might require a significantly large accumulation of data remain interesting questions.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号