Advanced Search
Volume 40 Issue 1
Jan.  2018
Turn off MathJax
Article Contents
YU Bin, FENG Li, GONG Bi, KONG Zhiyin. Design and Implementation of Multi-level Interaction Memory Controller[J]. Journal of Electronics & Information Technology, 2018, 40(1): 18-24. doi: 10.11999/JEIT170175
Citation: YU Bin, FENG Li, GONG Bi, KONG Zhiyin. Design and Implementation of Multi-level Interaction Memory Controller[J]. Journal of Electronics & Information Technology, 2018, 40(1): 18-24. doi: 10.11999/JEIT170175

Design and Implementation of Multi-level Interaction Memory Controller

doi: 10.11999/JEIT170175
Funds:

The Foundation of Science and Technology on Information Assurance Laboratory of China (KJ-14-103)

  • Received Date: 2017-03-01
  • Rev Recd Date: 2017-10-27
  • Publish Date: 2018-01-19
  • Considering the problem of data interaction in multi-level information environment, a multi-level interaction memory controller is designed and implemented. On the basis of the interactive model design, the overall structure of the controller is constructed. The key modules of memory system and interactive control logic are designed in detail, and a prototype system is used to complete multi-level information interaction in term of user strategy. The experimental results show that the multi-level interactive memory controller can be configured according to users actual needs, and the multi-level information interaction function can be realized, which is significant to the information hierarchical management.
  • loading
  • 张鹏剑, 桑红石. 基于SOC的高性能存储器控制器设计[J]. 微电子学与计算机, 2016, 33(5): 37-41.
    ZHANG Pengjian and SANG Hongshi. High-performance memory controller design based on SOC[J]. Journal of Microelectronics and Computers, 2016, 33(5): 37-41.
    张宇嘉, 杨晓非, 姚行中. 基于AXI4的卫星接收机DDR3多端口存储的设计[J]. 电子器件, 2016, 39(3): 617-622. doi: 10.3969/j.issn.1005-9490.2016.03.023.
    ZHANG Yujia, YANG Xiaofei, and YAO Hangzhong. Based on the satellite receiver AXI4 DDR3 multi-port storage design [J]. Chinese Journal of Electron Devices, 2016, 39(3): 617-622. doi: 10.3969/j.issn.1005-9490.2016.03.023.
    GOPALAKRISHNAN L. R QDR II SRAM Interface for Virtex-5 Devices[R]. XAPP853 (v1.3) June 7, 2010.
    CHIEN C D, WANG C W, LIN C C, et al. A low latency memory controller for video coding systems[C]. Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, Beijing, China, 2007: 1211-1214. doi: 10.1109/ICME. 2007.4284874.
    来晟. 基于FPGA的视频图像雪花检测研究[J]. 信息通信, 2016(1): 27-29. doi: 10.3969/j.issn.1673-1131.2016.01.012.
    LAI Sheng. Snow video image detection based on FPGA research[J]. Journal of Information and Communication, 2016(1): 27-29. doi: 10.3969/j.issn.1673-1131.2016.01.012.
    陈占良, 金龙旭, 陶宏江, 等. 高速图像压缩系统中DDR3控制器的实现[J]. 电光与控制, 2016, 23(8): 85-88.
    CHEN Zhanliang, JIN Longxu, TAO Hongjiang, et al. High- speed image compression system realization of DDR3 controller[J]. Electronics Optics and Control, 2016, 23 (8): 85-88.
    李艳平, 徐海贤. 基于FPGA的36通道同步数据采集存储控制器设计与实现[J]. 工业控制计算机, 2016, 29(11): 20-21. doi: 10.3969/j.issn.1001-182X.2016.11.009.
    LI Yanping and XU Haixian. 36 channels synchronous data acquisition storage controller based on FPGA design and implementation[J]. Industrial Control Computer, 2016, 29(11): 20-21. doi: 10.3969/j.issn. 1001-182X.2016.11.009.
    徐艺, 黄静. 基于DDR2和FPGA的实时成像转置存储器设计[J]. 物联网技术, 2016(6): 56-57.
    XU Yi and HUANG Jing. Based on the real-time imaging transpose memory DDR2 and FPGA design[J]. Journal of Internet Technology, 2016(6): 56-57.
    KANEKO K, KAWAMOTO Y, NISHIYAMA H, et al. An efficient utilization of intermittent surfacesatellite optical links by using mass storage device embedded in satellites[J]. Performance Evaluation, 2015, 87(C): 37-46.
    魏刚. 涉密信息系统分级保护[J]. 电子技术与软件工程, 2016(21): 203.
    WEI Gang. Classified information system grading protection [J]. Journal of Electronic Technology and Software Engineering, 2016(21): 203.
    BELL D E and LAPADULA L J. Secure computer system: Unified exposition and multics interpretation[R]. The Miter Corporation Technical Report, MTR-2997 Rev.1, 1976.
    TU Shanshan and HUANG Y. Towards efficient and secure access control system for mobile cloud computing[J]. Wireless Communication Over Zigbee for Automotive Inclination Measurement China Communications, 2015, 12(12): 43-52.
    YE Xinfeng. Privacy preserving and delegated access control for cloud applications[J]. Tsinghua Science Technology, 2016, 21(1): 40-54. doi: 10.1109/TST.2016.7399282.
    LEE Sunho, KWAK Jin, and LEE Imyeong. The study on the security solutions of USB memory[C]. International Conference on Ubiquitous Information Technologies Applications (ICUT2009), Fukuoka, 2009: 470-473.
    AMIN R, SHERRATT R S, GIRI D, et al. A software agent enabled biometric security algorithm for secure file access in consumer storage devices[J]. IEEE Transactions on Consumer Electronics, 2017, 63(1): 53-61. doi: 10.1109/TCE. 2017.014735.
    GIRI D, SHERRATT R S, MAITRA T, et al. Efficient biometric and password based mutual authentication for consumer USB mass storage devices[J]. IEEE Transactions on Consumer Electronics, 2015, 61(4): 491-499. doi: 10.1109/ TCE.2015.7389804.
    LEE Kyungroul, YEUK Hyeungjun, CHOI Youngtae, et al. Reverse-safe authentication protocol for secure USB memories[J]. Security and Communication Networks, 2012, 5(8): 834-845. doi: 10.1002/sec.580.
    JEONG Hanjae, CHOI Younsung, JEON Woongryel, et al. Vulnerability Analysis of secure USB flash drives[C]. International Workshop on Memory Technology, Design and Testing, Taipei, 2007: 61-64. doi: 10.1109/MTDT.2007. 4547620.
    李波, 刘嘉勇, 蒋瑜, 等. 基于EZ-USB的单向传输系统设计与实现[J]. 信息与电子工程, 2008, 6(1): 46-50.
    LI Bo, LIU Jiayong, JIANG Yu, et al. Design and implementation of unidirectional transmission system based on EZ-USB[J]. Information and Electronic Engineering, 2008, 6(1): 46-50.
    尹文浩. 安全U盘设计及其在多密级文件管理中的应用[D]. [硕士论文], 解放军信息工程大学, 2011.
    YIN Wenhao. Design of secure USB disk and its application in multi-level file management[D]. [Master dissertation], PLA Information Engineering University, 2011.
    王晓海, 袁建国, 张曦, 等. 基于用户交互的跨安全域移动存储设计[J]. 计算机安全, 2012(3): 43-46. doi: 10.3969/j.issn. 1671-0428.2012.03.012.
    WANG Xiaohai, YUAN Jianguo, ZHANG Xi, et al. Design of mobile storage across security domains based on user interaction[J]. Computer Security, 2012(3): 43-46. doi: 10.3969/j.issn.1671-0428.2012.03.012.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (1473) PDF downloads(156) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return