The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, the influences of sandwiched structure trench on the latch-up reliability of the LIGBT with thick SOI substrate are investigated. Based on the influence mechanisms, a novel device structure with trench grounded is proposed, which can enhance the latch-up voltage by 24% with the other performance maintained. Further studies illustrate that the latch-up voltage would decrease dramatically...
Online Social Networks (OSNs) have become a rewarding target for attackers. One particularly popular attack is the Sybil attack, in which the adversary creates many fake accounts called Sybils in order to, for instance, distribute spam or manipulate voting results. A first generation of defense systems tried to detect these Sybils by analyzing changes in the structure of the OSN graph---unfortunately...
This paper presents a novel unsupervised superpixel-based change detection approach to detect multiple changes in Very-High-Resolution remote sensing images. The proposed approach investigates the spectral-spatial variations at superpixel level which aims to enhance the traditional pixel level change detection performance. In particular, superpixel representation of the spectral change vectors is...
The issue of image completion is well developed in these years. Most of them reconstruct damaged area by referring to the under-repaired images themselves. However, they may fail if damaged portion collapse their structure which is unique and important. We propose to use an external reference image to repair the damaged image and the method provides the following three contributions: (1) an algorithm...
The rapid information propagation facilitates our work and life without precedent in history, but it has tremendously exaggerated the risk and consequences of privacy invasion. Today's attackers are becoming more and more powerful in gathering personal information from many sources and mining these data to further uncover users' privacy. A great number of previous works have shown that, with adequate...
In this paper, the main purpose is reliability analysis. To find what kinds of environment will impact the inner structure of sample. Two of the objective is emerged from this study. First, electro-migration in sample under high current density has become a critical reliability issue. Carry current density test is to probe the failure phenomenon of electro-migration on inner structure. Then compare...
Fine registration is a fundamental step for further application of remote sensing images. Focused on deficiencies in traditional manual registration, this paper presents a new method for automatic fine registration of multi-spectral images. To make the most of image information, the algorithm detects and matches feature points in the selected bands. Then pick up the common control points which contain...
The communication system is the key element in an electric power system that supports its observability and controllability. Communication failures pose serious risks in electric power system operations. It is therefore crucial to study the adverse effects of communication system failures on power system operation. This is especially for wide-area monitoring, control and protection applications where...
This paper is to analyze service brand and psychological contract violation's influence on customer loyalty based on research achievement of psychological contract and customer loyalty at home and abroad, using the typical representative of catering industry, KFC, as the study subject. By defining brand psychological contract under marketing situation, it also studies the intervention effect of brand...
Legacy 802.11b/g protocols have been successfully applied in wireless long-distance (WiLD) networks to provide low-cost network connectivity for rural areas and developing countries, by designing TDMA MAC protocols. In contrast, we investigate the performance, and enhancement of using 802.11n for WiLD networks still using CSMA/CA. Our extensive experiments from our testbed show that, although 802...
To accurately assess the reliability level of wind power converter for doubly fed induction generator (DFIG) system, an assessment methodology for power cycling capabilities of insulated gate bipolar transistor (IGBT) modules is investigated for wind power converter. First, power losses and junction temperatures calculation models of IGBT module are presented, the junction temperature calculation...
This paper presents a reliability assessment model for the wind power converter system (WPCS). In this study, the most influential factors of average wind speed and wind turbulence intensity are considered. First, WPCS operation state is partitioned into different phases in terms of different thermal stress levels which are determined by its operation conditions of average wind speed and wind turbulence...
Plastic encapsulated microcircuit (PEM) is widely used due to its great advantages in size, weight, cost and performance, especially in industries. However, there are many problems that cannot be ignored. The most significant one is that PEM is not hermetical, which means that moisture can infiltrate in the PEM. The infiltration may lead to the delamination, even result in corrosion. Autoclave is...
Failure data in accelerated life test are imprecise due to kind of subjectivity. This makes the assessment of testing lack of accuracy. A statistical model of accelerated life testing based on fuzzy theory is proposed in this paper. The model aims to describe the subjectivity of failure data and give a fuzzy interval assessment of lifetime and reliability comparing to the traditional point estimation...
To ensure sustainable operations of wireless sensor networks, environmental energy harvesting has been well recognized as one promising solution for long-term applications. Unlike in battery-powered sensor networks, we are targeting a duty-cycle adjustment to optimize the network performance, e.g., delay minimization, with full harvested energy utilization. In this paper, we introduce a set of duty-cycle...
With the recent introduction of Spot Instances in the Amazon Elastic Compute Cloud (EC2), users can bid for resources and thus control the balance of reliability versus monetary costs. Mechanisms and tools that deal with the cost-reliability trade-offs under this schema are of great value for users seeking to lessen their costs while maintaining high reliability. In this paper, we propose a set of...
Content-Centric Networking (CCN) is a new paradigm, which aims at rethinking the network architecture with a fundamental shift from host-centric to content-centric communication model. Although CCN provides a good fit to the massive amount of static content, it has limited consideration for the effects on the real-time traffic such as live streaming, e-commerce transactions or online-gaming. We argue...
In order to predict the reliability of the product with high reliability and long life, the accelerated degradation test (ADT) is commonly applied. However, in the studies of optimizing the ADT plans, there is nearly no researches on how to select the test stress levels. In this paper, the drift Brownian motion is selected as the degradation model. The optimization of the selection of the stress levels...
Inversion imaging of nugget in resistance spot welding (RSW) is a new developing method of monitoring the welding quality in RSW in recent years, which is based on the rapid developments of the inverse problems in mathematics and physics. This paper does some research on the forward problem of inversion imaging of nugget and establishes the forward model of RSW on the basis of the forward theory and...
An optimized source authentication scheme for multicast based on merkle tree and TESLA was presented. Message group including independent component was constructed by merkle tree algorithm, the validity of message group's digest value was ensured by delayed disclosure of keys of TESLA algorithm, and furthermore, real-time source authentication with zero-time delay was implemented through improving...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.