The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, on-wafer de-embedding methods for passive components are evaluated for millimeter wave integrated circuit (MMW IC) design support. An electromagnetic simulation aided de-embedding (EMSAD) technique is proposed. The electromagnetic model is calibrated by matching the open-short de-embedded measurement at relatively lower frequencies. A set of Ground Coplanar Waveguide (GCPW) test structures...
High Level Synthesis (HLS) relies on the use of synthesis pragmas to generate digital designs meeting a set of specifications. However, the selection of a set of pragmas depends largely on designer experience and knowledge of the target architecture and digital design. Existing automated methods of pragma selection are very limited in scope and capability to analyze complex design descriptions in...
Deep learning (DL) training-as-a-service (TaaS) is an important emerging industrial workload. TaaS must satisfy a wide range of customers who have no experience and/or resources to tune DL hyper-parameters (e.g., mini-batch size and learning rate), and meticulous tuning for each user's dataset is prohibitively expensive. Therefore, TaaS hyper-parameters must be fixed with values that are applicable...
Asymmetric cryptography algorithms such as RSA are widely used in applications such as blockchain technology and cloud computing to ensure the security and privacy of data. However, the encryption and decryption operations of asymmetric cryptography algorithms involve many computation-intensive multiplications, which require high memory bandwidth and involve large performance and resource overhead...
Heterogenous computing is gaining increasing attention due to its promise of high performance with low power. Shared coherent cache based CPU-FPGA platforms, like Intel HARP, are a particularly promising example of such systems with enhanced efficiency and high flexibility. In this work, we propose a hybrid strategy that relies on both static analysis of applications and dynamic control of cache based...
High Q optomechanical cavity is demonstrated based on silicon nanobeam structure with mechanical frequency of 4.52GHz. The mechanical Q can reach 24500 with the help of optical spring effect, which is record-high in ambient environment.
We demonstrate an on-chip integrated Cherenkov radiation (CR) emitter, in which the no-threshold CR could be realized and a broadband CR is observed with electron energy of only 0.25–1.4keV.
In order to solve the rotational torque curve fitting problem of three-phase asynchronous motor, an on-line fitting algorithm based on particle swarm optimization is designed. Firstly, the rotational torque model of three-phase asynchronous motor is established by using the Taylor-polynomial model. Secondly, through the particle swarm optimization algorithm and the polynomial evaluation function,...
The paper utilizes a novel battery model based on the electrical features of LiFePO4 battery, because Kalman filter algorithm(KF) is largely dependent on system model. Measurements of battery state are easily disturbed by colored noise which is high relevance in working condition, and the paper studies that the system noise satisfy one-order AR model. The paper proposes an adaptive extended Kalman...
Well logging technology is of great significance to oil production. A new lateral resistivity logging-while-drilling (LWD) method applied in oil-based drilling fluid condition is proposed in this paper by combining capacitive coupling with inductive coupling principle. By using a new logging model, the ineffectiveness of the conventional resistivity LWD methods in oil-based drilling fluid is overcome...
This design takes MC9S12XS128 single chip microcomputer as the core, and takes linear CCD sensor as the detection element. It designs a system which can check the wood scar and drive the motor to be excised. In the aspect of software design, through the CodeWarrior IDE programming software in the operation process, can real-time monitor the change of the input signal, the computer can see different...
This paper is concerned with the exponential stabilization problem for a class of distributed parameter systems (DPSs) described by a parabolic partial differential equation (PDE) with mobile actuators and sensors. Initially, the mobile guidance for each actuator/sensor pair is proposed based on the system performance requirement and the well-posed analysis of the DPS is given via the operator semigroup...
In DVE systems, maintaining the consistency of event execution time is the core element to provide a unified view for all nodes in the system. However, owing to the fluctuation of message transmission delay within the network, some events cannot be executed at the expected time set by the sending node., It will seriously impact the interactive experience of the user in the virtual environment, especially...
The paper has presented a new augmented buck converter to improve its transient performance. At first, an augmentation circuit based on diode-capacitor topology is introduced. The voltage across the inductor can be increased during load transients, and the rate of inductor current can be higher compared with conventional buck converters. Then, a hysteresis control algorithm based on output voltage...
It has attracted much attention recently that cache-enabled users exploit device-to-device (D2D) communications to allow content sharing between them, resulting in higher spectral efficiency and lower energy consumption. However, due to the various interests of users, it is helpful for a user to cache the desired contents of its neighboring users by predicting their interests. Moreover, due to the...
In this paper, we evaluate the distributed deembedding methods in comparison with open-short deembedding technique for CMOS transistor on wafer characterization up to 40GHz. A set of NMOS transistor test structures fabricated on HLMC 40nm RF CMOS process are used for the investigation. Experimental results show the distributed methods are more physically reasonable than open-short deembedding technique...
By using first-principles calculations, the electronic properties and chemical activity of phosphorene under the strain and defect engineering are studied. Furthermore, the effects of engineering on the interactions of NO gas molecule and humidity (H2O) and air (O2) molecules with the phosphorene surface are investigated. It is found that phosphorene enables to withstand a large compressive strain,...
This paper presents a 2-input and 3-output 0.35–1.5GHz switch cell with active balun. The proposed differential switch cell is composed of 8 differential series-shunt-series switches which improve the transmit efficiency of switch cell. Two wideband active baluns are used to compensate for the loss of passive switch cell which almost consumes no DC power. Fabricated by 0.18μm SiGe BiCMOS technology,...
Loop closure detection is an important part of visual simultaneous location and mapping (SLAM) system. Most of traditional loop closure detection approaches using hand-crafted features often lack robustness with respect to object occlusions and illumination changes, especially for the complicated indoor environment. Recently, convolutional neural network (CNN) makes a huge impact on many computer...
Loop closure detection is important in simultaneous localization and mapping (SLAM) systems. In this paper, Generative Adversarial Networks (GAN), an unsupervised deep architecture is employed to detect the loop closure for vision-based SLAM systems. Instead of extracting handcrafted features like SIFT, SURF or ORB. Generative Adversarial Networks are based on image features. Similar to the task about...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.