The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The combination of self-formed barrier (SFB) and extreme low-k (ELK) dielectric is an attractive candidate for interconnect integration beyond 28nm-node regarding to low RC delay and Cu filling. Attempt is made to understand the formation mechanism of SFB through combinations with various ELK dielectrics in this study. In terms of wiring and dielectric reliabilities, the combination of MnxOy SFB and...
Knowledge management is the source to improve enterprise core competitive ability in the knowledge economic ages. The evaluation of enterprise knowledge management performance based on gap analysis consists of determination of the evaluation object, application of evaluation method and analysis of evaluation results. An evaluation index system of enterprises knowledge management performance with two-stage...
This paper summarizes the usual means of network authentication first. Next, a Web security and identity scheme based on session and online table is proposed. The thinking and implementation of the scheme is detailed then. Lastly, the paper analyzes the security intensity of the proposed scheme from various aspects. Either the analysis or the application of the scheme shows that the proposed method...
Data structure is the most important fundamental speciality course of computer science. It is one of the most difficult undergraduate courses because of its strong theoretical, practical and abstract characteristics. This paper explores and researches the practice teaching method of data structure. In this paper, a database design approach which is based on tree structure is presented. Its application...
Abnormal traffic detection is important to network management. This paper aims at the characteristic of multi-hop network, and defines abnormity that traffic-burst after failure. Then the paper presents a fast auto-adaptive traffic-aware abnormal detection method. This method compresses data via efficient histogram, and detects double-size bursts via congregate function. We analyze the status of links...
The design of the electron optics system, RF interaction section and broadband output coupling systems of the klystron KC4151 will be described in this paper. Also some cold measurement and hot results of the tube will be presented.
The essence of the radar low-angle tracking is to estimate accurately the height of a specified target in the presence of complicated propagation conditions, including specular multipath propagation, diffuse reflection, diffraction propagation, range-dependent atmosphere refractivity stratification and other anomalous propagations conditions (e.g., ducting). An effective array data model for low-angle...
Wideband and multi-polarizations is the development trend of the conformal array antenna. Due to the variable curvature of the platform, one of the most serious challenges faced in the pattern synthesis of conformal array antenna is the serious cross-polarization. Based on element polarization diversity, a space-time-polarization weighting construct is proposed for frequency-invariant, low cross-polarization...
Three simple, yet practical calibration criterions are derived for low-angle tracking of array radar. In light of these criterions, real time and blind calibration can be achieved in multipath signal environment based on the preprocessing of the array snapshots or covariance matrix. The measured data on an dasiaoverwaterpsila path is used to verify the effectiveness of the proposed array calibration...
We study channel aware distributed scheduling in ad hoc networks where many links contend for the common channel using random access, and the focus here is on the model where each transmitter node has multiple intended receivers. In such a network, channel probing takes place in two phases: 1) in phase I, all transmitters contend for the channel using random access to reserve the channel, and the...
Motivated by the increasing usage of wireless broadcast networks for multicast real-time applications like video, this paper considers a canonical real-time multicast scheduling problem for a wireless broadcast LAN. A wireless access point (AP) has N latency-sensitive flows, each associated with a deadline and a multicast group of receivers that desire to receive all the packets successfully by their...
Implementations of TV secondary voltage drop measurement based on clock synchronization is proposed by considering principles of existed methods as well as their unsuitability in practice, together with applications of the clock synchronization used in other fields. After some error analysis and contrast, the corresponding conclusion shows that the new measurement based on the proposed method can...
We consider a joint power control and transmission scheduling problem in wireless networks with average power constraints. While the capacity region of a wireless network is convex, a characterization of this region is a hard problem. We formulate a network utility optimization problem involving time-sharing across different "transmission modes," where each mode corresponds to the set of...
The conventional function of the medium access control (MAC) layer in wireless networks is interference management. We show how the MAC can also be used to mitigate the effect of fading. We begin by providing experimental data to demonstrate that multipath fading effects are seen at the MAC layer. These effects appear at timescales on the same order of the IEEE 802.11 protocol and therefore, interact...
The IEEE 802.16 standard, also known as WiMax, provides a mechanism for deploying high-speed wireless mesh network in metropolitan areas. In this paper, we propose an algorithm for the data sub-channel allocation, i.e., transmission scheduling, of WiMax based mesh networks. The goal is to increase spatial reuse, achieve high system throughput, and provide fair access for the subscriber stations. In...
A 0.18 um dual Vt MOSFET process has been developed. The low Vt devices are used for logic and the high Vt device for power control. The low Vt NMOS and PMOS have threshold voltages of 80 mV and 100 mV at nominal channel length, and Ion/Ioff of 340/0.05 uA/um and 123/0.03 uA/um respectively under 1V Vdd. The NMOS current drive at 0.6V Vdd has a 40% improvement over the best reported to date. Energy-delay...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.