The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A three-lead electrocardiogram acquisition system is constructed with an analog front-end circuit (ADS1293), a microprocessor (MSP430X), and a personal phone or computer. The acquired three-lead (namely, Lead I, Lead II, and Lead V1) ECG data can not only be displayed on a personal computer by a MATLAB simulator but can also be stored in the cloud.
Remote electrocardiograph (ECG) monitoring systems are gaining increasing attention with the progress of time. However, the traditional heart rate calculation formula has numerous limitations. This study presents a simple and rapid algorithm for heart rate calculation. This algorithm can provide an approximate heart rate even when the ECG signal contains noise. When this formula is used in an ECG...
Current 2D planar NAND has its limitation for expanding capacity due to the performance and reliability intrinsic characterization will be impacted as device scaling below the 20nm technology node. Such as write bits error, data retention and read disturb, etc. Continued scaling increases the effect of cell-to-cell interference, which widens the program state width. 3D vertical stacking memory cells...
FOUP mini-environment in-line contaminants analysis is introduced into 55nm technology node product. It demonstrates that the inorganic ions /VOC contaminants of some processes cannot be resolved by FOUP N2 purge action only, special taking good care for critical layers to prevent the irretrievable yield loss is necessary. The performance of FOUP N2 purge at different kinds of module processes are...
The traffic of mobile network environment is increasing day by day. When a large amount of data need to be transmitted, the low-speed wireless network today is hard to meet users' needs. Long response time of operation and high requirements of terminal's performance will keep user annoy and away. Existing independent data compression and transmission algorithm can't solve this problem effectively...
In the process of power grid operation-maintenance management, the information of equipment cannot be monitored in a full view. And the resources of operation-maintenance are still hard to deploy. The judging of failures is not efficiency. The locale jobs such as patrol, maintenance, repairing are hard to control. This paper mainly research and analyze the integration controlling platform of power...
Cardiovascular disease (CVD), principally heart disease and stroke, has become the worldwide leading killer for people of all racial and ethnic groups. In China, this disease contributes 41% to all deaths each year, and it costs the country more than 400 billion US dollars in last decade, including health expenditures and lost productivity, which continues to grow as the population size increases...
Advanced bright field (BF) inspector have many functions to increase the defect signal, and suppress the background noise. However, it will take much time to fine tune an optimized BF inspection recipe. The aim of this paper is to propose a faster way to select the optimized optics.
Various three-dimensional (3D) multilayer stacks NAND flash architectures are developed by several companies, the defect performance monitoring under such complicated architectures has become a new challenge in 3D NAND flash. The aim of this paper is to illustrate e beam inspection system can monitor the tiny, invisible defects and electrical defects that can not be recognized by optical systems.
Developing and deploying a pervasive space is a multi-disciplined process where knowledge from various domains intersects. How can individual roles efficiently contribute their expertise and smoothly integrate their work to create a pervasive space? How does system design and architecture enable effective decoupling of these roles? Based on our own experience in building several pervasive systems...
Drought index plays an important role in the assessment of drought severity as one sensitive indicator of land drought status. A simple and accurate method of expressing ground drought from remote sensing data is in urgent. Firstly, a brand-new frame has been developed by coordinate system transformation, with (x', y') expressing (soil water content, vegetation coverage), which made the meaning more...
The need to prolong the ability for older adults to live at home independently has become an important area of smart environment research. In this proposal, we demonstrate a web-based visualization system (CASASviz) that integrates monitoring, analysis, and automated recognition of residents behavior patterns in smart environments. In our data collection module, we collect real sensor data from the...
• Inspecting the wafer edge issue: Wafer bevel inspection can help us to find out the root cause of yield loss from wafer edge or partial die. • Monitoring EBR/ 193 lithography performance : From the EBR monitoring results, bevel inspection find out the top EBR recipe setting is not good, and it also demonstrates the EBR performance with different bevel rinse RPM setting, it can help us to find out...
For the current problems in the security situation of colliery equipment ,and based on non-linear relationship among the parameters of colliery equipment ,this paper presents a method for forecasting the safety of colliery equipment based on BP neural network.By using BP neural network in the colliery safety equipment monitoring and warning issues,we established a multi-index comprehensive monitoring...
Coal mine water inrush is a very difficult problems which should be solved more earlier, and it have long plagued safe production of coal mines. The reliable operation of coal mine drainage systems plays a vital role in safe production of coal mines. Based on the non linear relationship of the state parameters of the coal mine drainage facilities, we propose a safety monitoring method based on BP...
In view of the severe situation in coal mine safety production, using tomcat6.0 as the Web server software, through the dynamic web page struts technology and ibatis framework technology to realize database connectivity, using Myeclipse 5.5.1 as a development tool, we develope the web-based system which is monitoring and managing of the coal mine safety equipment intelligently. For different units,...
The system utilizes the object-oriented analysis method and the broad-based B / S / D software architecture. Then researching and developing the coal mining security equipment's intelligent monitoring and management system of being based on the web-environment, the Web server software on this system using the tomcat6.0. Connecting the database by struts and ibatis dynamic web page technology and framework...
In accordance with emission characteristics and treatment situation of rural domestic sewage, this experiment studied the effect of domestic sewage treatment in rural areas through the design of a stabilization pond miniature-testing device. In the stable test operation phase, the average removal rates of COD, TP, and NH3-N were respectively 92.53%, 97.57%, and 95.10% in an aerobic pond reactor. The...
In cognitive radio networks, dynamic spectrum access is achieved by allowing secondary users (SUs) to probe the spectrum and utilize available channels opportunistically. Spectrum probing mechanisms should be efficient and fast to avoid harmful interference with primary users (PUs). Periodic probing has been commonly adopted as a default spectrum probing mechanism. In this paper, we attempt to study...
The security and trustworthiness of enterprise networks have been a major concern in the research and practice of Intranet security. The security of endpoints and their network access are inevitably two important factors regarding enterprise network security. In this paper we present a novel architecture to enforce controls on endpoint application execution and network access, in which the policy...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.