The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper deals with the task assignment problem, which represents a major issue in dynamical formation control. The formation is defined in terms of a group of homogeneous dynamical agents. The position of each agent in the formation is predetermined by pre-imposing the distance between each pair of agents. Recently by using set-theoretic methods, the task assignment has been formulated in terms...
This paper presents a unified logic for flagged prefix addition-subtraction that eliminates the need to perform constant addition and subtraction in two separate blocks. The logic is based on a modified algorithm for constant subtraction that allows us to achieve the unification which is not possible with traditional algorithms. Thus we are able to eliminate the most crucial challenge that practical...
P = {p,:i ∊ Nn}, Q = {qj, : j ∊ Nm}, R = {rk : k ∊ Nk} are considered as three referential sets and A ∊ R (P, Q;I), X ∊ R (Q, R; I), B ∊ R (P, R; I) are three fuzzy relations. We assume that these fuzzy relations are constrained to each other such that A o X = B. If two of the three components are known and other is to be calculated, then it is called fuzzy relation equation. When A and X are known,...
In today's "Big Data" era, developers have adopted I/O techniques such as MPI-IO, Parallel NetCDF and HDF5 to garner enough performance to manage the vast amount of data that scientific applications require. These I/O techniques offer parallel access to shared datasets and together with a set of optimizations such as data sieving and two-phase I/O to boost I/O throughput. While most of these...
Effects of air flow on droplet removal from wafer were investigated as the fundamental study of CMP cleaning. Deformation and movement of droplet on wafer by air flow were visualized by a high speed camera, and characteristics of droplet behavior were evaluated. Effects of wafer film types (Two types of wafer, Type-A and Type-B were used in this study) on droplet behavior were also investigated. Droplet...
In this paper, we consider the sandwich structure composed of silicon substrate, piezoelectric layer and electrode layers in the typical structure of FBAR. We assume a special solution in the form of harmonic wave in the piezoelectric layer, and substitute it into the simplified stress equations of motion and the charge equation of electrostatic. A correction to the solution assumed is obtained in...
The fast growing of data scale encourages the wide employment of data disks with large storage capacity. However, a mass of data disks' equipment will in turn increase the probability of data loss or damage, because of the appearance of various kinds of disk failures. To ensure the intactness of the hosted data, modern storage systems usually adopt erasure codes, which can recover the lost data by...
This paper presents a geometric method for solving the inverse and forward kinematics of Delta robot, and then investigated the problem of path tracking control. The forward kinematics is most commonly solved by various iterative methods, which may suffer from slow convergence rate and strict initial value conditions. In this paper, this problem is simplified as solving the intersection point of two...
In today's large data centers, hundreds to thousands of nodes are deployed as storage clusters to provide cloud and big data storage service, where failures are not rare. Therefore, efficient data redundancy technologies are needed to ensure data availability and reliability. Compared to traditional technology based on replication, erasure codes which tolerate multiple failures provide availability...
In this paper, a novel parametric moment matching technique is proposed for efficiently constructing accurate parametric compact thermal models for variable geometries. This result is achieved by reformulating the heat diffusion equation in a parametric-dependent domain as a heat diffusion equation in a reference domain wherein the geometry is fixed and material parameters are variable. The approach...
The sensor nodes deployed in wireless sensor networks (WSNs) are strictly energy constrained. Thus energy conservation for maximizing lifetime of the network is central to the design of WSNs. In many applications, the nodes nearer to the sink are overburdened by means of huge traffic load as the data from the entire region are forwarded through them to reach to the sink. As a result, their energy...
Simple and accurate models for Gate leakage current (Ig) in nanoscale Metal Oxide Semiconductor Field Effect Transistor (MOSFET) are proposed in this paper. The accurate modeling for Oxide Electric field (Eox) and Oxide voltage (Vox) due to Short Channel Effect (SCE) between the gate and inverted channel is the key for higher accuracy. The Oxide Potential drop due to the charges image at the interface...
In this paper, a new admission control scheme is presented based on the proportional admission control scheme of the IEEE802.11aa to solve the problems in the 802.11 WLANS. Quality of service (QoS) and throughput are the most significant questions in the 802.11 WLANS especially when the bandwidth is scare. In the Overlapping Basic Service Set (OBSS), we need to face many problems such as the high...
Reservation systems are generally employed to enforce temporal isolation between applications. In the real-time context the corresponding temporal isolation requires not only the consideration of the direct interference due to execution of higher priority tasks, but also the indirect cost of e.g. cache-related preemption delay. The accounting of this in a server-based implementation of temporal isolation...
This paper deals with the symbolic solution of the switched current circuits. As is described, the general principle of the transformation graph method can be used for finding admittance matrix of medium size networks and/or sub-networks. The admittance matrix is assembled from four submatrices after reduction each submatrix by partial reduction formula. There is described principle for decomposition...
In this paper consensus in second-order multi-agent systems with a non-periodic sampled-data exchange among agents is investigated. The sampling is random with bounded inter-sampling intervals. It is assumed that each agent has exact knowledge of its own state at all times. The considered local interaction rule is PD-type. The characterization of the convergence properties exploits a Lyapunov-Krasovskii...
A fully functional hybrid cloud solution requires a placement service to automatically decide whether an application should be deployed on premise, in a public cloud, or across private and public clouds. Such a service must consider application structure and communication patterns, application affinity requirements, which usually result from data protection rules, and deployment costs. In this paper,...
Steganography is a technique of writing hidden messages, whereas a fragile watermarking scheme is used for image authentication and integrity verification. In this study, we developed a method for block-based tamper detection steganography that can verify not only forgery but also a cutting attack on a stego image. Moreover, a stego image has better quality and more capacity than some previous steganography...
This paper proposes a modified version of opinion communication based on naming game to simulate the formation of opinion in real society. In the version, freshness is brought in to measure memory level of one opinion for each agent, when various opinions exist in social population. Main researches are devoted to new opinion replacing old opinion after system already convergences to an opinion, revealing...
With the increasing density of transistors in advanced technology nodes, the radiation is an ongoing problem affecting the contents of memory cells. This paper presents the simulation results of radiation immunity for two different memory cell technologies: 32nm Bulk CMOS and 28nm FDSOI. The effect of Single-Event Upset (SEU) caused by the heavy ion impact with different Linear Energy Transfer characteristic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.