The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Simple and accurate models for Gate leakage current (Ig) in nanoscale Metal Oxide Semiconductor Field Effect Transistor (MOSFET) are proposed in this paper. The accurate modeling for Oxide Electric field (Eox) and Oxide voltage (Vox) due to Short Channel Effect (SCE) between the gate and inverted channel is the key for higher accuracy. The Oxide Potential drop due to the charges image at the interface...
In this paper, a new admission control scheme is presented based on the proportional admission control scheme of the IEEE802.11aa to solve the problems in the 802.11 WLANS. Quality of service (QoS) and throughput are the most significant questions in the 802.11 WLANS especially when the bandwidth is scare. In the Overlapping Basic Service Set (OBSS), we need to face many problems such as the high...
Reservation systems are generally employed to enforce temporal isolation between applications. In the real-time context the corresponding temporal isolation requires not only the consideration of the direct interference due to execution of higher priority tasks, but also the indirect cost of e.g. cache-related preemption delay. The accounting of this in a server-based implementation of temporal isolation...
This paper deals with the symbolic solution of the switched current circuits. As is described, the general principle of the transformation graph method can be used for finding admittance matrix of medium size networks and/or sub-networks. The admittance matrix is assembled from four submatrices after reduction each submatrix by partial reduction formula. There is described principle for decomposition...
In this paper consensus in second-order multi-agent systems with a non-periodic sampled-data exchange among agents is investigated. The sampling is random with bounded inter-sampling intervals. It is assumed that each agent has exact knowledge of its own state at all times. The considered local interaction rule is PD-type. The characterization of the convergence properties exploits a Lyapunov-Krasovskii...
A fully functional hybrid cloud solution requires a placement service to automatically decide whether an application should be deployed on premise, in a public cloud, or across private and public clouds. Such a service must consider application structure and communication patterns, application affinity requirements, which usually result from data protection rules, and deployment costs. In this paper,...
Steganography is a technique of writing hidden messages, whereas a fragile watermarking scheme is used for image authentication and integrity verification. In this study, we developed a method for block-based tamper detection steganography that can verify not only forgery but also a cutting attack on a stego image. Moreover, a stego image has better quality and more capacity than some previous steganography...
This paper proposes a modified version of opinion communication based on naming game to simulate the formation of opinion in real society. In the version, freshness is brought in to measure memory level of one opinion for each agent, when various opinions exist in social population. Main researches are devoted to new opinion replacing old opinion after system already convergences to an opinion, revealing...
With the increasing density of transistors in advanced technology nodes, the radiation is an ongoing problem affecting the contents of memory cells. This paper presents the simulation results of radiation immunity for two different memory cell technologies: 32nm Bulk CMOS and 28nm FDSOI. The effect of Single-Event Upset (SEU) caused by the heavy ion impact with different Linear Energy Transfer characteristic...
Paper analyzes substantial Coss behavior differences of FETs using super-junction Si, SiC and GaN technologies versus traditional Si process and suggests new practical models for power losses optimization. These models applied to derive normalized ZVS conditions and boundaries for popular PWM ZVS topologies allowing efficiency optimization at wide operating conditions.
Asset prices fluctuate up and down chaotically. Traders, investors and fund managers comb the chaos for exploitable patterns with methods such as moving averages from the realm of technical analysis. In this paper we focus on linear moving averages which aim to smooth asset prices removing fluctuations. First, we will develop a method to measure the smoothness for a linear filter. We will also discuss...
Aiming at the interval rough numbers of multiple attribute decision making (MADM) problems, a method of ranking interval rough numbers based on possibility degree is proposed. First, the deviation degree for interval rough numbers is given, and then an optimal model with maximum deviation to solve the attribute weights is set up. Second, a possibility degree formula of interval rough numbers is proposed...
Scientific articles are formed of citations which need further explored. Previous work deals with the case that citations in a paragraph talk about co-occurring terms. This paper discusses the case that citations situated in different parts of a scientific article talk about same terms. We use the co-occurring terms in citations to summarize the cited papers. The resultant summaries are then used...
A task migration method is proposed for energy savings in multiprocessor real-time systems. The method is based on the portioned scheduling technique which classifies each task into a fixed task or a migratable task. The energy-aware migration with specified parameters is formulated as a linear programming problem, and optimal solution is given. Furthermore, the method is extended to more general...
We consider the classic problem of pole placement by state feedback. Our recent work [1] offered an eigenstructure assignment algorithm to obtain a novel parametric form for the pole-placing gain matrix to deliver any set of desired closed-loop eigenvalues, with any desired multiplicities. The method was adapted from the classic eigenstructure assignment algorithm of Kautsky, Nichols and van Dooren...
The paper considers a given discrete-time linear dynamic in closed loop with a piecewise affine control law defined over a bounded polyhedral partition of the state space χ. The objective is to describe the largest error affecting the control law coefficients over each region in the above partition, for which the positive invariance of the set χ is guaranteed with respect to the closed loop dynamics...
In this paper, the feedback particle filter (FPF) algorithm is introduced for the continuous-discrete time nonlinear filtering problem. As with the continuous-time FPF, the continuous-discrete time algorithm i) admits an innovation error-based feedback control structure, and ii) requires a solution of an Euler-Lagrange boundary value problem (E-L BVP). These solutions are described in closed-form...
We present a quantum approach to simulate self-heating effects in transistors based on silicon nanowires and estimate the resulting performance degradation. Our self-consistent thermoelectric simulations are based on the nonequilibrium Green's function approach and provide the heat power transferred from electrons to phonons, thus allowing the calculation of the local temperature and its impact on...
This paper presents an output feedback shared-control algorithm for fully-actuated, linear, mechanical systems. The feasible configurations of the system are described by a group of linear inequalities which characterize a convex admissible set. The properties of the shared-control algorithm are established with a Lyapunov-like analysis. Simple numerical examples demonstrate the effectiveness of the...
We address a discrete-time LQG control problem over a fixed performance window and apply a receding-horizon type control strategy, resulting in an exact solution to the problem in terms of semidefinite programming. The systems considered take parameters from a finite set, and switch between them according to an automaton. The controller has a finite preview of future parameters, beyond which only...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.