The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The power transformer is the most important equipment in the power system, so the condition-based maintenance of the transformer has an important significance for the safe and stable operation of the power grid, and condition assessment provides an important basis for the condition-based maintenance. In this paper, the calculation principle of the reliability assessment method is analyzed, and the...
Flash-based solid state disks (SSDs) are replacing hard disk drives owing to its high performance and low energy consumption. For both high reliability and large capacity, redundant array of independent disks (RAID) is commonly used in storage system. In all flash arrays, the HDDs in RAID are substituted by SSDs and it gains improvements in bandwidth and IOPS (Input/output Operations per Second) by...
With the transition from Au wire bonding to Cu wire bonding, both bare Cu wire and Pd coated Cu (PCC) wire are now commonly used. Humidity reliability is particularly challenging for Cu wire bonding. In this paper, 18 um (0.7 mil) bare Cu and PCC wire are used in the wire bonding and HAST reliability test. Various factors can influence the HAST reliability outcome. The key factors examined in this...
Software architecture is receiving increasingly attention as a critical design level for software systems, architecture testing and assessment is key issues to improve and assure software quality. The development of techniques and tools to support architectural understanding, testing, reengineering, maintenance, and reuse will become an important issue. This paper introduces a testing technology to...
Due to the increasing cost of Au, the semiconductor industry has gone through a dramatic shift away from Au wire bonding to Cu wire bonding. Pd-coated Cu (PdCu) wire has become the favored wire choice over bare Cu wire for fine pitch applications. The advantages of PdCu wire include better HAST reliability results and a more stable stitch bond process window. This paper will examine the critical aspect...
A Mobile Ad Hoc Network (MANET) is a dynamic wireless network that can be formed without the need for any pre-existing infrastructure in which each node can act as a router. Due to bandwidth constraint and dynamic topology of mobile ad hoc networks, multipath supported routing is a very important research issue. This paper proposes a Network Coding-based AOMDV routing algorithm in MANET (NC-AOMDV)...
It is a marketplace reality that mass customization has been discussed intensively by the researchers and practitioners from the product perspective. There were only a few research about service customization based on the customers. This article examines the relationship between customers' self-efficacy and satisfaction. The results, evoked from a survey in He Bei University, indicate that customers'...
Thermosonic copper ball bonding is an interconnection technology that serves as a viable and cost-saving alternative to gold ball bonding. However, the reliability of copper bonds remains to be ascertained. Intermetallic compounds (IMCs) and possible voids and cracks may grow and propagate at the interface of bonds during their service. The proper IMCs formation is beneficial to bonding strength but...
With the popularity of heterogeneous network devices and security products, pervasive network security management has been a fashion. However, a chief problem lies in how to characterize various attack scenarios from the viewpoint of both security information and security policies for automation. This paper discusses the potential of applying an integration of ontology-based and policy-based approaches...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.