0%

一些基本的Hexo命令行语句。每次修改完记得按流程测试

1
2
3
4
5
6
7
$ hexo clean // 清除缓存

$ hexo g // 从新生成html静态文件

$ hexo s // 本地创建 localhost:4000

$ hexo d // 上传域名
阅读全文 »

Week1

Law

contents of law in this semester are contain with 4 topics:
contract law
Intellectual property (IP) law 知识产权法
Law of Torts 民事侵权法
Environmental law

Contract law

Common law:
The strength of an authority(威权) will depend upon it having like facts to the case in hand and generally that it was decided in a higher court.
The question of what amounts to ‘like facts’ is not always easy
Two very able advocates(提倡者) trying to persuade the court that the strength of authority supports their case rather than the opposition
Have no standard terms and conditions!!!

Contract law regards with civil(民法) law instead of criminal(刑法) law
criminal law: face to social security, operate by state, paid to state and must show defendant(被告) is guilty.
civil law: brought individual who fells have suffered, paid to party who bringing action and claimant(索赔人) must show defendant is liable ‘on the balance of probabilities’(the probability whether defendant is guilty based on evidence from two parties)

contract law regards private not public law
public sector(公共部门) follows public functions is public law, but they purchas pens or paying construction regards private law.

Generally, only the parties to the contract can enforce it in court

Common law and equity are two methods for the judge. common law means sertainty but equity means court can deal the case with discretionary(自由裁量权)


contract is an agreement giving rise to obligations which are enforced or recognised by law.

Why enter into a contract?
• Facilitate exchange/make bargains
• Plan commercial relationship
• Provide certainty
promises are made to be kept; contracts are made to be performed.
voluntarily(自愿的)

Normal method of remedy(解决方法) is awarding of damages. courts try to calculate the case that both parties follow contract and position they would be. sometime it will lead to ‘specific performance’, like enforce them continully follow the contract.

following components have valid contract:
offer
acceptance
consideration
intention to create legal relations
certainty

Week2

offer

Offer is an unequivocal indication of a willingness to be legally bound by a promise if the terms of the offer are met.
like said “100 pounds for each mouse and they will be delivered due to 25th Nov”.
but keep mind that price list and most advertisement are not offer. courts will evaluate if contents in an offer is detailed enough as a contract.

An offer may terminated at any point up until acceptance
An offer will lapse(失效) after a ‘reasonable’ time
An offer will lapse on the failure of a condition precedent
An offer will lapse on the death of the offerer (perhaps)

acceptance

an acceptance means absolute and unequivocal(明确的), and must be communicated (but not postal rule).
if have any attempt to vary term, a counter offer will kill the original offer

consideration

check any anlysis whether is a good bargain or not

but deed(契约) is differente than normal consideration. it may enforceable as what is known as a speciality contract.

assessed objectively and rebuttable presumptions

certainty

Only certain types of contract are required to be in writing (e.g. land) but the more significant a contract the more sense there is in putting it in writing


contract obtains express terms and implied terms. courts may retrospectively( 回顾性地) imply terms into a contract.

the excluding or limiting liability can be included via parties reflects voluntary natureof freedom of contract.

How a contract can be discharged:
• Performance of contract
• By agreement of contractual parties
• Breach of contract
• Frustration of contract
• Contract is voidable due to conduct of a contracting party

Week 3

Discharge a contract:
•compelete the contract
•mutual agreement of contract perties
•breach of contract
•frustration(受挫) of contract
•improper conduct(不当行为)

breach of contract:
repudiatory breach, anticipatory breach

type of damges for breach contract:
punitive/exemplary damages
restitutory damages
compensatory damages: like cost of replacement performance, lost profits, damage to property, persinal injury, damages payable to customer, damage to commercial reputation, emotion distress, loss of pleasure

improperly conduct:
Where one party has acted improperly, the court may deem the contract ‘voidable’ (innocent party can choose to terminate)
1.Misrepresentation
2.Duress(胁迫) & Economic Duress
3.Undue Influence

Week 4

Intellectual Property

type of IP: information, creative expression and design, reputation(声誉), invention

remedies for infringement:
search order
injunctions(警告)
damages
account of profits
delivery up
destruction of the infringing items
limited criminal sanctions

Confidential Information

three requirements for legal protection

  1. Information must possess the necessary quality of confidence
  2. Information must have been imparted in circumstances imposing obligation(义务) of confidentiality
  3. An unauthorised use of that information

Defences to alleged breach of confidence
• Claimant gave consent for info to be disclosed
• Information already in public domain
• In the public interest for info to be disclosed

!!!Seeks to protect the tangible expression of an idea NOT the idea itself
Life plus 70 years

the copyright automatically vests to author of the work.
requirements:
• The work is original
• The work is recorded in a material form (i.e. protects expression not idea)
• A ‘substantial part’ of work is reproduced without permission
• Author or work is connected to a signatory state of Berne Convention
but author can transfer ownership of copyright

only copyright owner have right to copy, issue copies to public, perform, show, incude and adapt works.

primary infringement: restricyed acts
secondary infringement: Must show knew/had reason to believe items were infringing copies

defences to breach of copyright:
• Deny claimant is owner (or licensee) of copyright work
• Deny work is entitled to copyright protection
• Deny any infringing conduct has been committed

Week 5

trademark: a mark or device usually attached to goods or services which indicates a connection between those goods or services and the trade mark owner.

eample of trade marks: brand name, symbols, shapes, slogans, sounds, colours, celebrity’s image
those mark or device usually attached to goods or services which indicates a connection between those goods or services and the trade mark owner. a trade mark is regisered for a period of 10 years. is a trademark havn’t used for 5 years, it can be revoked.

a trade mark need determine the clear and precise subject matter to which peotection is afforded.
Absolute grounds for refusal: devoid of distinctive character, purely descriptive, estalished practice.
Relative grounds for refusal: if mark conflicts with an earlier trademark.

trade mark is protected by TMA.

Passing off: unregistered trademark

  1. protectable reputation.goodwill: must show business has protectable goodwill
  2. misrepresentation: miust show that infringing activity took place in the course of trade and the customers were being misled
  3. damage to goodwill: need show there have potential demage

Week 6

Patents(专利) is an exclusive right granted for an invention, which is a product or a process that provides, in general, a new way of
doing something, or offers a new technical solution to a problem
Patents can not freely used for 20 years

how to get a patent:
In European Patent Office(EPO), in several EPC members
In PCT, round the world
In UK patent Office, just in UK

The court must use a reference point in determining whether:
• There is an appropriate level of detail in a patent application
• The invention for which the application is made is indeed ‘a step forward’ in terms of development

can not be an invention:
discory, theory or marhematic method, artistic work, mantal act, game, or something is contrary to public policy or morality.

a patent only be granted id the invention is new, has inventive step, and is capable of industrial applicaiton

Financial

accets=non_current assets+current assets
资产=非流动资产+流动资产

equity=assets-liability
股本=资产-负债


Return on capital employed: Operating profit /(Equity + Non-Current Liabilities)
使用资本收益率:营业利润/(权益+非流动负债)

Gross profit margin: Gross profit/Revenue
毛利率:毛利润/收入

Operating profit margin: Operating profit/Revenue
营业利润率:营业利润/收入

Asset turnover: Revenue /(Equity + non-current liabilities)
资产周转率:收入/(权益+非流动负债)
↑, means high current ratio

Inventory days: Closing Inventory x 365 days/Cost of sales
存货周转天数:期末存货x 365天/销售成本

Trade receivable days: Closing Trade receivables x 365 days/Revenue
应收账款周转天数:收账应收账款× 365天/收入

Trade payable days: Closing Trade payables x 365 days/Cost of sales
应付账款周转天数:收账应付账款× 365天/销售成本

Current ratio Current Assets/Current Liabilities
流动比率:流动资产/流动负债
↑: can replay the loan

Quick ratio: (Current Assets – Inventory )/Current Liabilities
速动比率:(流动资产-存货)/流动负债
↑: can replay loan swiftly

Gearing: Debt/Equity
杠杆比例:债务/股本

Interest cover: Operating profit/Finance cost
利息:营业利润/财务成本

Dividend cover: Profit for the year/Dividend
利润股息比率:本年利润/股息

keep mind on profitability, liquidity and gearing.


prime cost: direct material or labour ect.
product cost: indirect costs+prime cost
period cost: other supporter cost like office, marketing ect.
total cost= product cost + period cost


Break-even point (BEP) =Fixed costs/Contribution per unit
盈亏平衡点(BEP)=固定成本/每单位的贡献

Margin of Safety=planed sales-Break-even point
安全边际=计划销售额-收支平衡点

week1

complex value

f(z)=f(x+iy)=u(x,y)+iv(x,y)
Re(f)=x=u(x,y)
Im(f)=y=v(x,y)

harmonic function:

By definition a function is called harmonic if it is at least twice differentiable and it satisfies the well-known Laplace equation.
101.PNG

Euler’s formular:

102.PNG
cause
103.PNG

week 2

complex differentiation

A complex function f(x) is differentiable at a point z if and only if the limiting ratio quotient exists.
201.PNG

Cauchy-Riemann equation:

a way to defferentiate a complex funtion
104.PNG
where u=real part and v=imagin part, and a function has a complex derivative f’(z) if and only if its real and imaginary parts are continuosly differentiable and satisfy the Cauchy-Riemann equation:
105.PNG
which is called the conjugate.

also, Cauchy-Riemann equation can find harmonic function as:
106.PNG

analytical functions

A complex function f(z) is called analytic at a point z0 if it has a power series expansion
202.PNG

we can use ratio test to find wheter a complex series is convergent or not by finding the limitation value of n-th term
203.PNG
if L<1, convergent series
if L>1, divergent series
if L=1, the test is inconclusion.

for complex power series, the sequence Cn converges with a limit L. If L=0, the power series converges for all z. If L not equal 0, then
204.PNG

There are four and only four possible types of singularities of a complex function:

  1. pole of order n. f(z)=(3z-2)/[(z-1)^2(z+1)(z-4)] has a pole of order 3 at z=1 and simple poles at z=-1 and 4
  2. branch points.f(z) = (z − 3)^1/2 has a algebraic branch point at z = 3 and f(z) = ln(z^2 + z − 2)has logarithmic branch points where z^2 + z − 2 = 0
  3. Essential singularity. the singularity is not pole or branch point.
  4. singularities at infinity

Taylor’s theorem

205.PNG

If a=0, the series can called Maclaurin series.

Week3

for the series have negative powers of (z-z0), equations can be writen like
301.PNG

Laurent’s theorem

Let function f(z) be analytical in annulus R<|z-z0|<ρ, it can be writen as
302.PNG
Where R belongs to negative part and ρ belongs to positive part.

really conplex content, remember to work the tutorial out.

week 4

three most common form to write a complex function:
ax+by=c,
where a,b are real numbers and x,y are variables
|z-1|=|z-b|
where a,b are complex numbers
z=at+b
where t is real and a,b are complex quantities

401.PNG
euqation can be
(x-x0)^2+(y-y0)^2=R^2,
|z-z0|=R, z0=x0+iy0

z=x+iy=(x0+Rcosφ)+i(y0+Rsinφ)=z0+Re^iφ (0<=φ<2Pi)

integration and Cauchy’s theorem

Newton-Leibnitz formula

the equation C: z=z(t), a<=t<=b,
402.PNG

example:
403.PNG

using linear integration

if f(z)=u+iv=2+i, z=x+iy, than x=2t, y=t.
404.PNG

Week5

Cauchy’s theorem

for two points x1=a1+ia2, x2=b1+ib2,
z=(1-t)(a1+ia2)+t(b1+ib2) (0<t<1)
or for circuit center z0=z1+iz2, radius=R,
z=z1+iz2+R(e^iφ) (0<φ<2Pi)
501.PNG

to Taylor series:
502.PNG
503.PNG

Week6

Residue Theorem

Let z=z0 be a singularity of the function f(z), the coefficient a is called residue of the function f(z)
601.PNG
the single residue (with single power) can be calculated as
602.PNG
but in multiple power, the function can be changed as
603.PNG

for closed contour C be the boundary of domain D,
604.PNG

for calculating real integrals, the contour C can be drawn as
605.PNG
which have ignored all results with negative imaginary.
606.PNG
where first interial is total contour results, second one is the real integrals and third one is the curve covered this domain(most cases equals to 0)

Week7

vector calculus

scalar field: f=x+y+z
vector field: u=(p,q,r)

for scalar field f, its gradient can be written as
701.PNG

the functions of div and curl operators are
702.PNG

grad(f)=∇(f)
div(f)=∇.f
curl(f)=∇*f

initialize type operator result type
scalar gradient vector
vector div scalar
vector curl vector

like the function curl(div(u)) can not be defined cause div(u) is a scalar which can be curl which.

and there have two conditions the result will be 0:

  1. for any scalar f, curl(grad(f))=0
  2. for any vector u, div(curl(u))=0

for function div(grad(f))=∇.(∇(f))=fxx+fyy+fzz=∇^2(f), or called Laplancian (scalar field)
and curl(grad(f))=curl(fx,fy)=fyx-fxy=0

Week 8

a vector field u will have a potential function p (which is ∇(p)=u), only when u is conservative:
∇*u=0

if E=(2x+xy,2y+xz,2z+xy)
801.PNG

Week 9

Integration along curve

a curve r=(x(t),y(t),z(t)) in the range of t(a<=t<=b),
901.PNG

902.PNG
where F=∇(p)

if F is a conservative vector fild, the potential function p for F is
903.PNG
value if a,b,c is not stable and can be choicen what ever we want. it is only valid for conservative field

if we want calculate its perdicular vector n then dt, get
904.PNG

Week 10

Surface Integrals

two-dimansional divergence theorem

1001.PNG
D is region in plane which boundary is cloased curve C. dA=rdrdtheta
if D is surrounding with multiple curve C, they need to be added

Green’s theorem

when dA=ndA, n is unit normal vector to D and u=(P,Q),
1002.PNG

three-dimansional divergence theorem

almost same with two-dimansional divergence
1003.PNG

stokes’ theorem

1004.PNG
cause if follows function in two-dimentional theorem, the direction of vertical vector n is cant been decided. hence two choice have in this function

week 1

The Moore’s Law(1965):“The functionality of devices doubles every 18 months” or “the cost of the same functionality halves every 18 months”
ButIt will come to an end - due to basic physics if nothing else.

The structure of FET(Field Effect Transistor)
101.PNG
Scaling can be done as λ→λ/s (s>1)

components rate
Area(s^2) 1/(s^2)
Speed(v) s
Capacitance(C) 1/s
Resistance(R) s
RC 1

Intrinsic Limits

The problems might be appeared when reached 10nm fabrication

Name Problem solution Shortcoming
Gate Oxides Thinner oxides means increased tunnelling Change other materials Have higher εr
Gate Electrode Material Same with the problem in oxides using metal electrodes more complex processing
Low k Insulators Lower permittivity are required while device scaled down perfectelly towards 1
Lithography more shorter wavelength required(toward 157nm) using Extreme UV(13nm soft x-rays used) light is not powerful enough/expensive
Doping Only 100 dopant atoms in the active region

History

102.PNG

week2

Implementation technology

There have many possible ways to achieve and implementate a circuit.

Programmed logic devices(PLD):
PLD is the simplest ASIC structure.
201.PNG
202.PNG
The signals inputed from pin 1,2,3 and outputed through pin 17,18,19.
each intersections will be connected by a transistor and a switch, and controlled signals to OLMC.

Complex PLDs (CPLD):
very same to PLD but with higher gate number.
It shared some interconnect logics globally, have fast transmit speed in single macrocell but not between two cells.
203.PNG

Field Programmable Gate Array (FPGA):
FPGA is created by many configurable logic blocks(CLB). Each CLB is progeammable and can implement big range of functions. FPGA can designed by HDL, and access multiple erasing and writing process.

Masked Gate Array (MGA):
Its ICs are manufactured to your specification in a Semiconductor Fabrication Facility (Fab). all og logics are acieved by NAND gate.
204.PNG

Structured ASICs(SA):
Like a combination of FPGAs and MGA. it may have predefined RAM blocks, and other functional units already manufactured into the device

Cell-Based ASICs (or Semi-Custom):
more complex than MGAs in that the design can be composed not just of NAND gates but of gates drawn from a library of cells like NOT,AND,FF,ADD etc.

name gate number delay cost
PLD 100 1-10ns $1-2
CPLD 5000 5ns $10-50
FPGA 5000-5M 3-4ns $50-3000

Design flows

Customer: Requirements Specification->Design Specification-> Architectural Soecification->coding in HDL->Synthesis->Placement->Routing->Design Rule

week3

MOS device

MOSFET is combined with Metal-Oxide-Semiconductor(MOS) and Field-Effect Transistors(FET) these two devices. It can differentiated as p-MOSFET and n-MOSFET based on differente using materials.
301.PNG

The n-MOSFET’s cross-section representation is as follows:
302.PNG

Vbb Vds Vgs state
0V 0V 0V two back-to-back diodes
0V 0<Vds 0<Vgs<Vt cut-off
0V 0<Vds 0<Vt<Vgs ohmic contact
0V Vgs-Vt 0<Vgs<Vt saturated(pinches-off)

The current through source and drain can be explaied as:
303.PNG
where λ is Channel-length modulation parameter,
Kn is the value of term
304.PNG

For p-MOSFET bahaves identically to n-MOSFET but with reversed polarities. performed as:
305.PNG

But normally, less current will through p-MOSFET than the n-MOSFET with same area and environment.

CMOS circuit

A CMOS circuit contains both the p-MOSFET and n-MOSFET. But generally less components will contained in reality than imagination.
In digital circuit, the substrate connection for n-MOSFET would be connect to negative supply and p-MOSFET is in reverse.

Inverter Characteristics

The simpliest CMOS circuit is worked as an inverter:
306.PNG
307.PNG
when Vin=0, Vout=1;
when Vin=1, Vout=0;

Threshold value

if we assume Vtp=-Vtn, Kp=Kn, than
Vin=Vdd/2
hence the threshold value can be seen as:
308.PNG

normally, if let Vdd=3.3V, Vt=0.7V, the threshold voltage will changed rapidly.

Parasitics

Many paracitics components have associated in MOSFET
309.PNG
The capacitor can calculated as
310.PNG

Body effect

Normally the stack MOSFETs have same well and share the same substrate voltage,
311.PNG
But in reality Vbb between them will be changed and Vt increases up on the stack.

rise/fall time

312.PNG

week4

The standard CMOS circuit
401.PNG
pull-up network→pMOSFET, pull-down netweork→nMOSFET

402.PNG
figure 2 implements an AND and figure 3 shows OR funvtion.

example:
for nand ligic gate,
Y=A’+B’, Y’=A*B
403.PNG

For XOR gate,
404.PNG

resistance and capacitance calculation

CG: capacitance value on the gate
CD: capacitance value on the drain

A=m1CG+m3CG+m6CG+m8CG
Z=m5CD+m7CD+m8CD+m9CD+m11CG+m12CG

PULL-down PULL-up
X R0/m3+R0/m4 2R0/m1 or 2R0/m2
Y’ R0/m8+R0/m10 2R0/m5 or 2R0/m6+2R0/m7

value of pull-down and pull-up need to be same, assume µE/µH=2, get
m1=m2=2, m3=m4=2
m8=m10=2, m5=2, m6=m7=4.

hence A=10CG, Z=10CD+3CG

pass transistors

using transistor as a switch to open and cloce a circuit.
405.PNG
the output resistance can be R0=5/(β N (VDD −VT ))

transmission gate

406.PNG
R0=1/(β (VDD −VT ))

A G Y
0 0 U
0 1 0
1 0 U
1 1 1
U: unknowed, Y’s state can be decided if both n and p MOSFET are closed

407.PNG
In this case output will never be worried. if G=0, Y=A; if G=1.Y=B.

Week 5

501.PNG
502.PNG
Flip-Flop and latch block diagram

implementation of ltach
503.PNG
but if G changed later than inverser, clock diagram will be in mess, hence clock generation is needed for generate some “delay” area
504.PNG

metastability

problem will happened if D is changing while clk is raising as well. its state will became metastability and influce further functions.
this issue only happenes on asynchronous system

the property of probability is
505.PNG
where tr is the time from clk edge to the time that must output something
tc is constant associated, basically 1/GBW of the sampling circuit
T0 is constant vlaue, is related to technology and circuit design
(the T0 and tc should be small for a good design)

and the number of upsets will be
506.PNG
if upset=288, means every 1/288=3.4ms will cause a problem

in poisson distribution form, the rate of happening k times error in λ seconds is
507.PNG
λ is rT_MTTF(mean time to fail)

508.PNG
where 1-η=P(k;λ)

or
509.PNG

Week6

a n-channel MOSFET
601.PNG

602.PNG
A: VGS=VDS=0
B: Vgs=0, VDS>0
C: VGS>0, VDS<VOV (VOV=VGS-VTo=over drain voltage)
D: VGS>0, VDS=VOV
E: VGS>0, VDS>VOV

603.PNG
604.PNG

week 7

small signal model

701.PNG

for transconductance
702.PNG
703.PNG

Π diagram

704.PNG

T diagram

705.PNG

Week 8

Common source amplifier

a common amplifier to increase output voltage value based on a FET
801.PNG
the input Vg=Vsig+Vbias with relationship like follows:
802.PNG
the red slop have function ID=(VDD-Vd)/RD, and the x/y-axis when it cross the blue curve is seperataly the voltage output from Vout and current through transistor. the cross point need be choicen as in the saturated region and be in middle part as Vbias=2V

gain of this common source amplifier is
803.PNG

common drain amplifier

804.PNG

Vbias=VS(best bias point)+Vov+Vto

for creayting small cignal circuit:
short-circuit any DC voltage source (also change power supply into groung)
short-circuit ant capacitors in circuit
open-circuit any constant current cource of inductors
replace NMOS with equivalent circuit

805.PNG
806.PNG

this amplifer acts like a voltage buffer, accurancy volatge is depends on Q-point.

common gate amplifier

807.PNG
Vs=IdRsig
Av=vd/vsig=gm
Rd/(gm*Rsig+1)

808.PNG

have low input impedance, non inverting current, unit current gain
voltage gain is same as common source amp
can be used as a current buffer.

type volatage gain
common source -RD*gm/r0
common drain gmRs/(1+gmRS)
common gain gmRd/(gmRsig+1)

Week9

voltage divider biasing

this circuit can provide high bias stability
901.PNG
but the current flow through M1 will be influenced by temperature with constant VGS supply
902.PNG

by adding a feedback resistor RS can provide a slop in Id diagram, for decreasing this temperature error
903.PNG
904.PNG
but this design still need large number of transistors and large Rs requires more voltage headroom to operate

current source biasing

905.PNG
the current source have provided a stable and constant current flow id, because the voltage error in same current is smaller than the current error produced in same voltage.

but this error can still be decreased if set a FET in the source port to plot the horizontal line
906.PNG
907.PNG

Week 10

current mirror

1001.PNG
current through M2 is basically same with current through M1
Iout/Imaster=(W(M2)/L(M2))/(W(M1)/L(M1))
means a constant current biasing is worked

current steering
1002.PNG

diode connected
1005.PNG
FET works like a diode at this time. the transistor will always in saturated region

1006.PNG
hence the voltage and current in M2 can both been controlled based on diode connected.
1007.PNG

dy/dx=1/r0=lamuda*Id0
because smaller slope is needed for smaller error, ro need be increased

Wilson current mirror(advanced design)
1008.PNG
Vout↓,Im3↓,Im2↓,VGSm2↑,VGSm1↑,IR↓,V1↑,Im3↑
1009.PNG
1010.PNG

Active loading

load a resistor on drain part
1003.PNG
but it can not easily increasing voltage gain course FET will into triode region

can be solved by a FET
1004.PNG

Semiconductor

Adachi: https://find.shef.ac.uk/primo-explore/fulldisplay?docid=44SFD_ALMA_DS51248442680001441&context=L&vid=44SFD_VU2&lang=en_US&search_scope=SCOP_EVERYTHING&adaptor=Local%20Search%20Engine&tab=everything&query=any,contains,adachi&offset=0

formular sheet: online formular sheet

Week13

1301.PNG
Bolck from left to right is Metal, Semiconductor, and Insulator

Metal Semiconductor Insulator
Conduction band and valence band overlapped Band gap changed from meV to 9 eV Band gap larger than 9eV
Electrons move freely no electrons in CB at T=0, get thermal energy kT=26meV wen T=300 Negligible electron in CB
good conductor depend on number of electrons no current conduction

The current density is influenced by both drift and diffusion seperatly with two parts:
1302.PNG
where q=1.6*10^-19 as a constant

Electron consentration:
1303.PNG
Nc: effective density of state in conduction band
EC: bottom of conduction band
Ef: fermi level

chemical elements table and lattice constant:
1304.PNG
1305.PNG
more ↓ elements are, more smaller bandgap will have, much bigger the lattice constant is, higher electron mobility

Direct band gap semiconductors (GaAs, InGaAs) are much more efficient emitter than indirect band gap semiconductors (Si,Ge)

Semiconductors with the same lattice constant as the substrate can be grown with minimal crystal defects

week14

Energy level on each electrons is not same with different orbital
1401.PNG
and energy level will slightly decrease if more atoms are placed side by it.

1402.PNG
If E0, or band gap(the difference between 4th and 5th band) is minimum (then Eg), the semiconductor has a direct bandgap
If Eg is minimum (with E0), semiconductor has an indirect bandgap.
1403.PNG
Adachi p.135

importance of carrier mobility: High mobility increases carrier drift velocity.
1405.PNG
Carrier velocity ν = μE (μ = mobility, E = electric field)
m is effective mass

Density of states N(E) is defined as the density of allowed energy states per energy range per unit volume.
1406.PNG

Schrodinger equation:K+U=E,
where the total energy is given by the sum of kinetic(K) energy and potential(U) energy

1404.PNG
some mixed elements, like AlGaAs, its gap energy will change depends on different ratio the different elemrnts it has.
like, Al0.5Ga0.5As has the middle energy between AlAs and GaAs.
AlxGa1-xAs means it has x% AlAs and (1-x)% GaAs.
(the emitted energy is E(eV)=hc/λ(um), h=6.62607015×10^(-34) J·s,c=3*10^(8))

Week 15

Carrier concentration plays a critical role in determining how much current a semiconductor can conduct

Ef is Fermi level corresponding to the probability of electron occupancy of 0.5 in n type semiconductor:
1501.PNG
1502.PNG
Ec is conduction band, n is electron concentration, Nc is effictive density of states in conduction band, in room temperature kT=26meV
the fermi level in n-type is dependent on the electron concentration
the interinsic carrier concentration ni^2=np

Doping type depends on number of groups in elements table.
N-type: in group V and VI
P-type: in group II and III
1503.PNG
Increasing the n-type dopants will increase the conductivity ( hence reduce the resistivity) of the n-type semiconductor.

Carrier Recombination
A: Generation-recombnation due to trap levels(SRH)
B: Rafiative Recombination
C: Auger Recombination
1504.PNG

Week 16

The intensity of light travelling through a semiconductor is given by
1601.PNG
x is position, alpha is the optical absorption coefficient

1602.PNG
multiple materials can be used for maximum absorbe different wavelength.
the wave length will reduced from top to bottom, and bandgap need also reduce to absorb them

dark current is the emitter that without absorbing any photon (band gap energy can only influence dark current)
photo current is the normal light current
the total current when the diode is illuminated (different function in formular sheet?????)
1603.PNG
Is=short circuit current
Vov=open circuit voltage
Pm=ImVm=maximm output power

1604.PNG

several ways to maximum fill factor: increase Im and Vm:
1.Minimise reflected light at the air/semiconductor interface since ~31% of light is reflected.
2.Maximise light absorption using a thick absorption region.
3.Reduce carrier recombination near the surface which has high density of dangling bonds.
4.Maximise generated photocurrent using materials with long minority carrier diffusion lengths
5.Minimise the dark current using low defect materials. (large bandgap and low temperature also help)

//
Iph measured photocurrent
Popt incident optical power
η quantum efficiency
G(x) optical generation rate
W depletion width
φ0 photon flux
α absorption coefficient
Rres Responsivity
Iph shot noise to
derive the minimum optical power
required to produce SNR =1
x diffuse distance
vs drift velocity
tr transit time
fRC RC time limited bandwidth
A area
τ Recombination lifetime
tr Transit time
σ conductivity of the semiconductor
h Planck constant
p carrier momentum
En quantised energy level

β hole ionisation coefficients
α electron ionisation coefficients
x carrier injection position
F noise factor

week1

Application Specific Integrated Circuits(ASICS)

ASICs are silicon chips that have been designed for a specific purpose

Full Custom Design

  • the highest performance
  • the most expensive and time consuming to produce

Semi-Custom Design

for Gate Array:

  • predefined on silicon wafer
  • need to define the interconnections for final device

for Standard Cell:

  • predefined functional blocks improve layout density and performance.

Field Programmable Gate Array (FPGA)

  • contain configurable logic resources and memory
  • are most useful for prototyping and can be cost effective for low volume production runs.

101.PNG

Software tools enable users to enter designs, simulate them to ensure correct functionality and then synthesize a solution for a chosen target device.

Verilog

Basic structure

The module body describes the functionality of the model and the relationship between the input and output ports.
102.PNG

The keyword wire is used to declare internal signals. For example:
103.PNG

1
2
3
4
5
6
module Add_full(output c_out, sum, input a, b, c_in);
wire w1, w2, w3;
Add_half M1(w2, w1, a, b);
Add_half M2(w3, sum, c_in, w1);
or (c_out, w3, w2);
endmodule

User Defined Primitives (UDP)

The module descripted by truth table

104.PNG

1
2
3
4
5
6
7
8
9
primitive mux_21_udp(output f, input s, a, b);
table
// s a b : f
0 0 ? : 0 ; //(? means not care)
0 1 ? : 1 ;
1 ? 0 : 0 ;
1 ? 1 : 1 ;
endtable
endprimitive

Port mapping

Another writing format can not stricly follow the variables’ order.

When the number of ports grows larger, it is easier to associate ports by their names.

1
Add_half M1 (.b(b), .c_out(w2), .a(a), .sum(w1));

Week2

delay module

Propagation delay: time from the input changing to the output responding.

Inertial delay model(for components): changes to the output of ogic gates can not happen instantly due to the charging and discharging of capacitances.(6ps)
If the width of an input pulse is shorter than the inertial delay, the input pulse is supressed and the output will not change in response to it.

Transport delay model(for wire): Time taken for a signal to propagate alonga wire.(1ps)

201.PNG

1
2
3
4
5
6
7
Example:
`timescale 10ps / 1ps //<time_unit>/<time_precision>
module timedelay (f, a ,b);
input a, b;
output f;
nand #2.58 (f, a, b);
endmodule

#2.58=2.58*10ps=25.8ps rounded to 26ps

four-value logic system

1 – assertion (True)
0 – de-assertion (False)
x – unknown (ambiguous)
z – high impedance (disconnected from driver)

nets: build connections but not store values, like wire.
registers: store value and informations

Week3

Register file

The registers in a CPU can be grouped into a register file. Two outputs are supplied in order to feed the ALU.
301.PNG

shifter

standard bidirectional shift register: A multiplexer on each input gives a choice of left shift, right shift, parallel load and no-shift, by selecting the source of the D input appropriately.
302.PNG

Combinational Shifter: shift data using multiplexers. B1,2,3 is input and H1,2,3 is output.
303.PNG

Barrel Shifter: The circuit rotates its contents left from 0 to 3 positions depending on S
304.PNG

Arithmetic Logic Unit

305.PNG

306.PNG

the logic circuit (bitslice):
307.PNG

S1 S0 Operation
0 0 AND
0 1 OR
1 0 XOR
1 1 NOT

arithmetic unit:
308.PNG

S1 S2 Y Cin=0 Cin=1
0 0 0 G=A G=A+1
0 1 B G=A+B G=A+B+1
1 0 B’ G=A+B’ G=A+B’+1
1 1 1 G=A-1 G=A

week4

pictorial representation of 4-bit unsigned inteder:
401.PNG

2s-complement representation of 4 bits inteder:
402.PNG
note that h(-5)=b(1011)=-(2)^3+2^1+2^0

fixed-point 2’s-complement numbers
403.PNG

multiplication

404.PNG

hardware multiplication

405.PNG
multiplicand will delay 1 bit after each operation like 0000 1101→0001 1010
multiplier will shift to right after each step like 1011→101.
product will save results output from adder. but changing process will be cancled if the most right side digital number in multipier is “0”.

combinatorial multiplication

2-digit number A=(a10+a0) B=(b10+b0)
AB=(a1b1)00+(a1b0+a0b1)0+(a0*b0)

Booth’s Algorithm

the equation cna be writen as
406.PNG

for example the euqation 43*12 can be explained as

1
2
3
4
5
6
7
8
9
10
   43 = 00000101011
* 12 = 00000001100(0)
---------------------------
0 = 00000000000 //multiplier bits 0(0)
+ 0 = 0000000000|0 //multiplier bits 00
- 172=111010101|00 //multiplier bits 10
+ 0 = 00000000|000 //multiplier bits 11
+688=0101011|0000 //multiplier bits 01
----------------------------
516=01000000100

the relationship between multiplier and operation is

bits operation
10 subtract
01 add
00/11 nothing

Week6

for A%B=C……D,
A is dividend
B is divisor
C is quotient
D is Remainder

for binary division, comparetion is the only thing need to do
601.PNG

and its implementation is
602.PNG

non-restoring/restoring division

restoring division: the dividiend will turn into previous value if result is negative
non-restoring division: don’t restoring the value if result is negative

the sign of operation is inversed with divided’s signal (“-“ if divident is positive and “+” if divident is negative)
if result if negative, ouput 0; if result is positive, output 1.

example: 456/23 by non-restoring division
603.PNG

floating point

the value of point numbrt can be explaination as m*2^e, where m is mantissa and e is exponent

The IEEE-753 floating point number can can be formulated as
604.PNG
with 32 bits and 64 bits these two types
605.PNG

value in exponent will have a bias which bigger (127 in 32 bits and 1023 in 64 bits) than what we expected

example: turn -93.625 into 32 bits

  1. 93.625=1011 101.101 in binary
  2. it = 1.0111 0110 1 *(2^6)
  3. in 32 bits, it have 127 bias. Hence exponent=6+127=133=1000 0101
  4. remove this first “1”, get 0.0111 0110 1, hence 0111 0110 1 is fraction
  5. it is a negative number, hence sian bit =1.

therefore, get 1|1000 0101|0111 0110 1000 0000 0000 000 (23 bits)

Week 7

Memory resources

normally instructions are stored in main memory as a program and decode them when programe is required.
701.PNG
the address of each lines of programe is counted by a program counter (PC) which can count and load new addresses from status flags.

MIPS processor

MIPS is a Reduced Instructure Set Computer(RISC). it have 32 registers which have 32 bits wide for each, for byte addressing.

A MIPS word is 32 bits or 4 bytes but giving 2^30 memory words.
702.PNG
big endian: the most byte will stored in lowest address.
little endian: than least byte will stored in lowest address.

three ways have been developed based on MIPSformat
703.PNG
704.PNG
MIPS example
op: opening code
rs: register source
rt: register traget
shamt: shift amount (is not applicable when is 0)
immediate: value of offset

I-type: fast way to load a register and dont need extra memory refrence to fetch operand. but only constant can be supplied and is limitied by bit numbers as well.
example: addi $1,$2,20 : $1=$2+20
R-type: small address field required, shorter instructions possible and have a very fast execution. useful foe frequently operations like loop. but the number and space od address have all been limited.
example: add $3, $4, $5 : $3=$4+$5

Intel X86 Architecture

If the sort of instructions are increasing , a BIU can greatly control them.
705.PNG
where EU is for executing instructions,
BIU is for fatching instructions, reading operands and writing results

however, although X86 is a 16 bit controller but have a 20 bits register.
706.PNG
each segment represents a 64k block of memory, which is combined with an offset address in instruction pointer(IP).
707.PNG

Pipeling instruction: the execute and next fetcj have overlapped to reduce the time used on a cycle
Von Neumann Architecture: single interface for both data and instructions. but an instruction fetch and data opeartion can not occure at the same time cause they share a common bus
Harvard Architecture: seperate the interface of data and instructions. the program memory accesses and data accesses can operated paralllel.

Week 8

register control

801.PNG
four single bit X,Y,W,Z can separately control input and output for both two registers.
data from register B will move to register C if w=0,y=1,x=1,z=0

802.PNG
PC,R2: denotes a register
PC(7:0),R2(1),PC(L): denote a range of register
R1←R2, PC(L)←R0: denotes data transfer
R3←M[PC]: specifies a memory address

like R1←R1+R2 add the results to R1 for additoin of R1 and R2
X.K1: R1←R1+R2 if X.K1=1, R1 will be placed the value of R1+R2
(normally, X.K1 will be the enable port in register)
803.PNG

Week9

Stack

the stack is allocated in main memory and operates as a last in first out block of memory

the flow control istructions change the PC constant with three order:
HALT: places the processor in an idle state
JUMP: change the PC content to a pointed address
CALL: like jump but CPU must remember the return point and return after finishing

the LIFO stack with two operations:
PUSH: puts value into stack
POP: Retrieves the last value that was pushed onto the stack
do not operate POP to a empty register or PUSH value in a full register

a stack pointer register (PC) can be used to allocate the final register
901.PNG

cache

cache is a safe place for hiding and storing things

CPU will first view cache when want read the memory. if it find the memory in cache, called cachehit, in opposite state, called cache miss and CPU will fins the memory from register and copied it into cache again

Direct Mapped Chache: each block is mapped to a single cache location
902.PNG
it is simple and easy for implementaion but have poor performance

Full Associative Cache: each block is mapped to any cache location
903.PNG
all memory block can be mapped but harder for implementation

Set Associative Cache: each block is mapped to any block in a subset of cache location
904.PNG
the best way

cache mapping

905.PNG
V: a valid bit to indicate if address contains valid data
TAG: determines which block of memory is in cache
INDEX: select block in cache
OFFSET: select a byte number got multiple byte blockes

for direct mapped cache: memory=TAG+INDEX
for full sccociative cache: memory=TAG+OFFSET

Week10

Digital filters

for transimiting and receiving analog signals, need to use ADC and DAC

Finite Impulse Response (FIR) Filter
consider a 4-point averaging window and get a stable curve results
1001.PNG

the implmentation of builidng blocks are contained with Multiplier, Adder and Unit delay
1002.PNG

Algorithmic state machine chart

1003.PNG
state box: unconditional, moorly output which only depends on current input values
1004.PNG
decision box: conditoinal, mealy output which not only depends on input, but past output results
1005.PNG
decision box can have multiple outputs depends on decisions made

conditional box:
1006.PNG

an ASM box must consists of a state box, decision box and conditional box
usually start with state box and end before the next state box

implementation

1007.PNG
controller logic can obtain condition box and state transition
data procesor can contain operations described in state box and conditoin box

1008.PNG
1009.PNG

Topic 1

Unit impulse: 𝛿[n]=0 (n≠0), or =1 (n=0)
Unit step: u[n]=0 (n<0), or =1 (n≥0)

for a sinusoid:
𝑥[𝑛]=A cos(𝜔0 𝑛+𝜙)
𝜔0:Normalised frequency
𝜙:Phase delay

Normalised frequency in radians/sample:
𝜔0=Ω0⁄𝑓𝑠,
where Ω0=2𝜋𝑓, is the real angular frequency, fs is sampling frequency

if angular frequency=𝜋 rad/sec, frequency=𝜋/2𝜋=0.5Hz
if a 1 Hz sine sampled by frequency of 10Hz, 1/10=0.1 cycle per sample
angular frequency = 2𝜋*0.1 cycle per sample =0.2𝜋 radians per sample

Important properties of sequences:
Linearity: y[n]=T{x1[n]+x2[n]}=T{x1[n]}+T{x2[n]}
Time invariance: y[n-k]=T{x[n-k]},
1201.PNG
Stablility: input and output is bounded
Causality: y[n0]=T{x[n<n0]}

note: Linear and time-invariant = LTI system

Linear constant coefficient difference (LCCD) equation:
LTI systems can be described by a difference equation of the form
1202.PNG
1203.PNG

impulse response (can be explained by convolution)

1204.PNG
where n in figure is a random constant value,
assuming n=-1, f1[k]=[1,2,3], f2[k]=[1,0,1,2]
1205.PNG

week1

101.PNG
Si: signal input
Ni: noice input
So: signal output
No: noice output

Noise in AM systems

assuming have noise vlotage/current ni(t) and R=1Ω, the noice power Ni:
102.PNG
ni(t) in terms on in-phase and out-of-phase components in the baseband
103.PNG
can get:
104.PNG
where 105.PNG is the average value of nc(t)^2.

hence 106.PNG

type efficiency cost
DSB SC High Expensive
DSB LC Low Cheap

Noise performance of DSB SC using coherent detection

the input ti detectoe and time average input power signal is:
107.PNG
if the demodulator the signal using a perfectly same carrier signal, the signal outputcan be:
108.PNG
as have defined before, the input signal can simply write as the average value of ni^2(t) and no(t)=ni(t)*cos(Wct) and
109.PNG

hence the noise rations is:
110.PNG

Noise performance of DSB LC using envelope detection

201.PNG
r(t) is the output from envelope detector. If ns(t)^2 is much larger than its denominator, hence
202.PNG
By the same calculation, get
203.PNG

Noice in FM signal

The FM receiver can be drawn as
204.PNG
Liliter here is ideal and could removes all amplitude variations.

Input signal si(t) can be written as:
205.PNG
cA: the maximum frequency deviation(same value as ∆ω)
α: signal amplitude
β: the modulation index(β=∆ω/ωm)

and the time average output signal power is:
206.PNG
K: constant associated demodulator system

hence the noice output power is proportional as ω
207.PNG

208.PNG

Pre-emphasis and de-emphasis FM systems

from the figure above, find the noice power density is at its highest when signal strength is at its smallest.
hence pre increase/decrease strength before modulating singal can solve it
209.PNG

Week2

entropy

The entropy, or H, is the average information carried per message of stmbol
210.PNG
like if p(0)=0.2 and p(1)=0.8, H=-(p(0)log2(p(0))+p(1)log2(p(1)))

the relationship between proporty and H is
211.PNG

Huffman coding

212.PNG
for different appear porporty for letter ABCDE, different combination have been used to arrange them.
the bigger proporty a letter has, the less diginal number will used on it.

the average number per message Huffman code will sent can be calculated as
n’=10.74+20.12+30.07+40.06+4*0.01=1.39 bits/message
but if using entropy the value will changed as
H=-(0.74log2(0.74)+0.12log2(0.12)+…+0.01log2(0.01))=1.26 bits/message

the efficiency of Huffman codeing is 1.26/1.39=91%

Strcuture sequences and data compression

Compression is used to reduce the number of bits required to send a piece of information.

Or can usig run-length encoding, which have combain all continous same colors into entire part(like color name + numbers) to reduce store places

But Variable data rate required - the channel bandwidth will be constant, so
buffers are needed.
And A bit error can cause large areas of picture to be incorrect - a low error
rate is needed.

Lossless and lossy coding

run-length coding is an example of lossless coding, cause all bits and data is important in series.
Lossy coding can loss pieces of message and the rest of data can also been used. such as sound and pictures.

week 3

intriduction of digital communications. find the advantages and diaadvantages exsists in digital communications.

Advantages

Channel coding: the process of adding redundant code to a message in order to help the receiver correct any errors which may have occued in transit. (like 0 001 1111, which first 0 is a checking bit without any meaning)

Source coding: Source coding is the process of modifying the way we send the data.

Multiplexing: In transmission systems we often want to make many different signals occupy the available transmission space, this is called multiplexing.

Frequency division multiple access (FDMA): different baseband range will allocated to different user in same time.
301.PNG

Time division multiple acces (TDMA): whole baseband will allocated to user but in part of whole times.
302.PNG

Code division multiple access (CDMA): both time and baseband will be divided and allocated to different users (most effieiency way, and evry secure)
303.PNG

Encryption : data will be coded by a key and decoded by a same key when receive it.
304.PNG

Regeneration: The signal need to repeate transimited signals every regulat times and both signal and noise will strengthed and finally noise will larger than signal in analogue signal. But in channel coding every small noise will be removed while repeat the signals.
305.PNG

Disadvantages

Bandwidth effiency: An analogue transmission system will always occupy less bandwidth than a digital system sending the same message. For some times we can using M-Ary to ease this problem.
Please note: the sample frequency in ADC need larger than 2 times of original signal frequency.

Whats more, digital signals need translate to analogue signals finally, and need synchronisation send and receive environment. It can be more complex to send a digital message.

week4

channel coding

Probability of errors: a binary message sent with bit 0 ir 1 have a probabitity p to turn into wrong bit
401.PNG
Pε = P (0→1)× P (1) + P (1→0) P (0)

random error

Random errors are typically caused by additive white Gaussian noise (AWGN).
Probability density function (PDF) is determined the magnitude for Gaussian in nature
402.PNG
the funtction form of PDF is
403.PNG
which where σ is the standard deviation and a0(1) is the mean of the distribution for logic 0 (1).

hard decisions and soft decisions

hard decision is what figure shows above. is usually sdequate for channels with small amounts of AWGN.
soft decision is return 1 or 0 if a is bigger or smaller than am. is usually for high AWGN noise.
404.PNG

multiple random errors

405.PNG

parity check bits

A single bit parity check code is a simple algebraic code.

bit feature
1 odd number of bit “1”
0 even number of bit “1”

convolution coding

a more powerful technical for correction random errors.
for example, initially loaded with 000 and subjected to input data 11011

clock pulse D0 D1 D2 u1 u1
0 0 0 0 0 0
1 1 0 0 1 1
2 1 1 0 0 1
3 0 1 1 0 1
4 1 0 1 0 0
5 1 1 0 0 1

where u1=D0+D1+D2, u2=D0+D2
406.PNG
the output result will changed in a constant rules hence some small errors will be found out and perhaps been solved.

reed-solomon code

Reed-Solomon codes are in essence parity check codes, although the method by which the additional bits are derived is significantly more complex to enable burst errors corrections.
n: the final length of the code
k: the initial length of the code
t: number of symbol errors can be corrected(2t=n-k)

Week5

Pseudonoise(PN) is a noise but in completely derministic. it can presrve and srcurity signals in channel from other influences.

features for a good pseudomoise sequence

Balance: want roughly same number of 0 and 1
Run sequence: a sequence of consecutive bits with same value. and 1/2 of sequecy should be length of 1, 1/4 be length of 2 and 1/8 be length of 3.
Autocorrelation: have a low correlation with shifted copies with itself.

like 15-bit sequence 100110101111000,
8 of “1” and 7 of “0”, achieved balance
4 of 1 length, 2 of 2 length, 1 of 3 length and 1 0f 4 length, roughlt achieved run sequence.
100110101111000
xor
010011010111100
=
110101111000100
autocorrelation of -1 (sane with other shift situations, fit the autocorrelation)

the good autocorrelation can be used in synchronisation communications cause receiver can easily find the code word by calculating correlation function between its stored PN code and the incoming data stream.

generation PN code

a shift register connected in feedback via a modulo-2 adder can genarate PN code
501.PNG

if n=3, and initial S1=0, S2=1, S3=1, get
502.PNG
repeat 7 times (for n length, the maximum number is =2^n-1, called maximal length sequency)

S1 S2 S3 o/p
0 1 1 1
0 0 1 1
1 0 0 0
0 1 0 0
1 0 1 1
1 1 0 0
1 1 1 1

get output sequency 11100101.

be attention: the initialize code can’t be “000” cause no “1” can be generated through “0”s

non maximal length PN codes

“Gold code” is designed cross-correlation properties are used
and “Barker codes” are sequences which only have 2-valued autocorrelation function. for example

bits number Barker code sequence
3 110
5 11101
7 1110010
11 11100010010
13 1111100110101

by wrapping the code with itself, get

1 1 1 0 1 correlation
1 1 1 0 1 +5
1 1 1 1 0 +1
0 1 1 1 1 +1
1 0 1 1 1 +1
1 1 0 1 1 +1
1 1 1 0 1 +1

only 1 and 5 these two values.

Week6

DSSS: direct dequence S.S.
FHSS: frequency hopping S.S.

advantage of S.S. system:
Low probability of interception, interference rejection, higher data rates, and multiple access

DSSS

601.PNG

the message m(t) will first modulated with a PN code which changes much faster than original and much similar with a noise signal.
602.PNG

hence usually this signal is useless unless reveicer have the same PN code to demodulate it.
and definitely, the PN code c(t) in receiver part need to be synchronised with incoming signal to demodulate correctly.

G=Tb/Tch

search mode

605.PNG

the control logic will detectwhether PN code have schieve the synchronisation type by energy. if it is not synchronised, energy during BPF(bandpass filter) will very small and then deley time td will be adjusted. but if in synchronised mode then the energy during BPF region will be strong enough to detect.
604.PNG

check mode

603.PNG

the check mode will compear the signal reveiced between early and late part. the synchronisation will be achieved if these two parts have identical values.
606.PNG

if PN generator is early generated, the shadow area in early part will smaller than late part and VCO will changed the time sequence to adjust it.

noise suppression

the AWGN(additive Gaussian white noise) have finite power over an infinite bandwidth. the de-spearding operation for a ready-spreaded signal can increased power in signal and decrease influence from such white noise.
607.PNG

the jamming signal can be signal with high power and narrow bandwidth. but it can also be decreased after de-spreading.
608.PNG

FHSS

frequency hopping spreads the data signal on one of a series of carriers occupy a really large bandwidth.it is required the bandwidth containing carrier frequency is much larger than data bandwidth. (more than one hoppings in a bandwidth)
609.PNG

final signal will be modulated for two times and its final frequency can be drawed as
610.PNG
final signal frequency=f(carrier)+f(offset)

the processing gain for a frequency hopping system is given as
G=fh*Ts

slow hopping system: the duration of a message bit sorresponds to the inverse hop rate.
fast frequency hopping: would suffer a noise or jamming signal in many parts of the bandwidth.

Week 7

The filter at the receiver end plays a vital role in determining the performance of a communications link.
good filter:
701.PNG

for the required matched filter’s impulse response h(t) can be
702.PNG

Transversal filter

703.PNG
704.PNG
705.PNG

integraie and dump matched filter

this matched filter can only be used for binary signal
with the previous function s(t)=1 and stop in t=T, the correlation figure can be drawn as
706.PNG
and note the shape of dquare wave is distorted by matched filter

the duration of g(t) can roughly implemented as
707.PNG
the switch is open when t<T, till the sample is gotten. the circuit can then determined the capacitor voltage, output it can clean for next sample collection.
708.PNG

and we can also change previous function g(T) and implementation as
709.PNG
710.PNG

matched filter detedtion of PCM codewords

it is quite same with correlation implements before but with PVM code to reject some of noise
711.PNG
the most significant bit will be placed in the last and other bit will be filled with PCM code word
like if want transfer “3” in 8 bits with PCM “1101”, the code will be 00 1101 11 for transfter the important message at first.

Week 8

介绍

IIC协议是一种通用connection method,通过SCL和SDA双线通讯,可以通过设置地址来实现多主机/从机共用双线通讯,节省端口。但效率不高,遇上大数据量通讯弊端明显。

阅读全文 »