The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
On a crowdsourcing platform, in order to cheat for rewards or sabotage the crowdsourcing processes, spam workers submit numerous random and erroneous answers to the tasks published by honest requesters. This type of behaviours extremely reduces the enthusiasm of honest users, which may lead a crowdsourcing platform to a failure. To defend the threats from spam workers, reputation-based defense mechanisms...
With the development of web service technology, identifying and discovering the users with similar preferences have an important significance to service selection and service optimization in the service environment. In order to divide the users into groups based on their preference similarity in the process of service selection, a combination-based clustering algorithm, named AAK, is presented in...
In the 3D integration stages, the structure of the TSV is changed with the development of the procedure. The 3D though silicon via (TSV) integration models with the new updated structure depended on the integration processes (fabricating redistribution layer (RDL), reflowing solders and filling underfill) were analytically studied in this work. The equivalent stress, von Mises stress, was used to...
This work mainly focused on the heat dissipation of the 3D integrated circulates (ICs). In order to satisfy the urgent heat dissipation needs, the optimal design of heat sink and optimized path for transmitting heat is one of the most promising and effective ways. Two methods have been proposed for solving the heat dissipation issues. First one was the optimized microchannel with pin fin integrated...
A fully integrated 66–76GHz E-band low phase noise quadrature phase-locked loop (QPLL) is proposed. The quadrature voltage-controlled oscillator (QVCO) with a symmetrical coupling network formed by diode-connected transistors is used to reduce the phase error. In order to improve the oscillation frequency and reduced the phase noise, a feedback network composed of buffer amplifiers and capacitors...
An improved structure of Silicon Carbide (SiC) power MOSFET with a central implanted region (CIR) introduced to the middle of JFET area to alleviate the high gate oxide field is presented in this paper. Combined with a higher doped current spreading layer (CSL), the CSL+CIR structure can further reduce the specific on-resistance (Ron, sp) of the device without the need of a tightened JFET width to...
A novel implantation-free 2-step junction termination extension (2S) with 2 space modulated buffer trench (2SMBT) zones is presented for ultrahigh voltage (>10kV) 4H-SiC gate turn off thyristor (GTO). The systematic studies on the optimization of the structure by Sentaurus TCAD tools were performed. The results show the 2SMBT structure introduced to the conventional 2S can effectively improve the...
The potential of junctionless (JL) FinFETs for low power applications is extensively explored in this work. Firstly, we present the complete potential-based 3-D compact model dedicated to JL FinFETs. Secondly, based on the established model, two type JL FinFETs, with high doped channel (HDJL), and low doped channel (LDJL), are comprehensively compared with inversion-mode (IM) FinFET operating at near...
This paper presents a five-order Butterworth low-pass filter with DC offset cancellation (DCOC) for WLAN Applications in a 65-nm CMOS process. The low-pass filter employs transconductance cell instead of conventional two-stage amplifiers to avoid internal poles which may otherwise cause the reduction of GBW. In order to achieve an appropriate 1-dB bandwidth of the integral filter, extra parasitic...
This article discusses the influence of customer relationship proneness in hairdresser's context. Data are collected using online survey. A conceptual model about customer relationship proneness, relational benefits, customer commitment and customer loyalty is proposed to explain the influence. Structural equation modelling is used to analyze the data. Empirical results show that customer relationship...
With the development of value-added services in cable digital TV, user behavior analysis has important practical significance in improving stickiness and implementation of personalized marketing. Based on real viewing data collected by software in set-top box, this paper adopts clustering method to analyze viewing habit in a particular region of Shanxi Province. The results show that the prime time...
Distributed storage systems provide large-scale reliable data storage services by spreading redundancy across a large group of storage nodes. In such big systems, node failures take place on a regular basis. When a node fails or leaves the system, to maintain the same level of redundancy, it is expected to regenerate the redundant data at a replacement node as soon as possible. Previous studies aim...
One of the obvious challenges in cloud environments is trust crisis and its influence on the development of cloud computing. This paper analyzes the similarities and differences between cloud computing and other distributed environments, proposes the concept of trust and three different directions of trust-oriented research in cloud environments. According to three directions of trust-oriented research,...
Network virtualization is viewed as a promising way for overcoming the ossification of the Internet. Virtual network mapping plays an important role in building virtual networks. The substrate network conditions change synchronously when the process of virtual network mapping, when a network failure happens, virtual network mapping without protection may lead to virtual network service interruption...
Data mining technology is a useful tool for knowledge discovery from large-scale databases. At present, most data mining researchers pay much attention to technique problems for developing data mining models and methods, while little to basic issues of data mining. In this paper, we address this question and propose a domain-oriented data-driven knowledge acquisition model. A data-driven data mining...
In China, the number of online learners who attend formal education has quadrupled in the last 5 years to 8.2 millions until the end of 2008. How can online teachers build and update web-courses for such a large numbers of online students - courses that ideally respect the different requirements of the students? In this paper we describe an automatic course generation System (ACGS) developed at the...
Backdoor sets of SAT problem can quickly decide the satisfiability of real-world SAT instances, and the QBF problem is the generalization of SAT problem, so backdoor sets of QBF are crucial to its solution. We propose a new algorithm of computing QHorn deletion backdoor sets in this paper, which contains two stages. Firstly, we compute renamed QBF formula according to the largest renamable Rmax of...
Considering alternative resources for operations, requirement of multiple resources to process an operation and a jobpsilas batch size greater than one in the real manufacturing environment, a study is made on the batch splitting scheduling problem with bounded batch sizes under multiple-resource constraints, based on the objective to minimize the maximum completion time. A genetic algorithm which...
In this paper, a new version of wavelet digital watermark based on chaotic sequence is presented. In satisfying the constraint conditions of distortion, the intensity of watermark is self-adaptive, adjusted with the PSNR and the length of watermark. The existence of watermark can be detected by public key without the original image. The experiment shows that the proposed algorithm is robust for common...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.