Nanoscale tweezers are integrated to Deep Reactive Ion Etching (DRIE)-processed microelectrodes by localized chemical vapor deposition using focused ion beam (FIB-CVD). The MEMS electrodes for electrostatic actuation ...
详细信息
ISBN:
(纸本)9781424401390
Nanoscale tweezers are integrated to Deep Reactive Ion Etching (DRIE)-processed microelectrodes by localized chemical vapor deposition using focused ion beam (FIB-CVD). The MEMS electrodes for electrostatic actuation of nano tweezers are fabricated on a heavily doped SOI wafer, which works as the interconnecting platform to control nanoscale device from macro-world Unlike the Carbon Nano Tube (CNT)-based nano tweezers, the dimension and gap between the pillars are well-controlled such that the designed range of motion and the operation voltage are easily achieved Compared to repulsive nano tweezers, the actuation voltage is at least an order lower for the similar range of motion. Repeated electrostatic tweezing action for two sets of tweezers shapes has been successfully demonstrated For bent type tweezers, short pillar is deposited on the edge of electrode to adjust the initial gap of tweezers which measures 17 mu m in length and 300nm in diameter. The threshold voltages that causes snap-down are dependent on the initial gap size of the unactuated pillars, and the measured value are 93 V for 3.5 mu m and 30 V for 2.2 mu m gaps. The Dimension of straight type tweezers is 19.6 mu m in length and 300nm in diameter with 6.9 mu m initial gap distance. Tweezing range is 3.4 mu m and snap down voltage is 102V. Young's modulus of the FIB-CVD carbon tweezers is estimated to be 377GPa based on the experimental results. Tweezers with complicated 3-dimensional shapes are also presented.
Given an undirected graph representing a network of processors, and a source node needs to broadcast a message to all other nodes in the graph, the minimum broadcast time problem is to find a scheme that accomplishes ...
详细信息
ISBN:
(纸本)3540371893
Given an undirected graph representing a network of processors, and a source node needs to broadcast a message to all other nodes in the graph, the minimum broadcast time problem is to find a scheme that accomplishes the broadcast in a minimum number of time steps under the constraint that at each time round, any node can send the message to at most one of its neighbors in the network. This NP-complete problem has been extensively studied in literature. In this paper, we consider a generation of the minimum broadcast problem, the minimum multicast time problem, in unit disk graphs which model wireless sensor networks. The goal is to multicast a message from the source node to a set of specified sensor nodes of the network in a minimum number of time rounds. We prove that this problem is NP-complete, and give an O(1)-approximation algorithm for it. Our simulation results show that the practical performance of the proposed algorithm is much better than the theoretically proved approximation ratio.
We propose a dynamic and distributed CDMA code assignment protocol for ad hoc networks. By combining the RTS/CTS dialogue, modified busy tone signaling and power control mechanisms withour specially designed CDMA code...
详细信息
ISBN:
(纸本)3540371893
We propose a dynamic and distributed CDMA code assignment protocol for ad hoc networks. By combining the RTS/CTS dialogue, modified busy tone signaling and power control mechanisms withour specially designed CDMA code selection rules, our protocol can not only save precious battery energy of mobile nodes, but also increase CDAM code reusability., Our simulation indicates that the proposed protocol performs better than the static code assignment method and the on-demand code assignment method (with/without using power control). in terms of successful transmission rate, code reusability and number of successful code assignment.
Peer-to-Peer based applications are coming, such as instant messaging, file sharing and video streaming. With the maturation of P2P technology there is larger and larger number of users. But P2P network's characte...
详细信息
ISBN:
(纸本)1424404630
Peer-to-Peer based applications are coming, such as instant messaging, file sharing and video streaming. With the maturation of P2P technology there is larger and larger number of users. But P2P network's characteristics make itself to be a potential vehicle for the active worms to achieve fast worm propagation. So it is important to study worm's spreading model and relative countermeasure under P2P systems. P2P worm's new characteristics are analyzed and a simple model is proposed in this paper. A novel method P2P worm evolution observer (PWO) is also described, this method introduces some observers in the P2P network to monitor some nodes' infected time during the worm's spreading period, and traces the worm's infected origin and attacking paths under the global P2P network topology. Theory and simulation results show that this method can gain nearly 100% probability to trace the worm evolution, even only less than 1% nodes are deployed with observers.
Density control is a key technique in dense sensor networks for prolonging network's lifetime while providing sufficient sensing coverage. In this paper we present a new density control algorithm called ESSC(Enhan...
详细信息
ISBN:
(纸本)3540371893
Density control is a key technique in dense sensor networks for prolonging network's lifetime while providing sufficient sensing coverage. In this paper we present a new density control algorithm called ESSC(Enhanced Sponsored Sector Coverage) based on the SSC(Sponsored Sector Coverage) proposed by Tian Di. ESSC algorithm takes note of the deficiency of the SSC algorithm and modifies the model of SSC to minimize the active node number. Analysis and experimental results show that ESSC can use up to 15%similar to 25% fewer active nodes than SSC while promising the performance of the network surveillance.
This paper shows that TDMA slot assignment for unicast communication in a wireless network can be distributively computed for an n-node acyclic network in O(polylog(n)) time, with high probability. The best previous d...
详细信息
This paper shows that TDMA slot assignment for unicast communication in a wireless network can be distributively computed for an n-node acyclic network in O(polylog(n)) time, with high probability. The best previous distributed algorithm for this problem requires O(n) time and obtains a TDMA schedule using 2Delta time slots. The new algorithm uses (1+epsiv)middot2Delta time slots where epsiv is a tunable fraction
We present a methodology based on physics laws and particles in order to represent, simulate, and architect advanced networking models. We introduce a mathematical formalism with its basic postulates seeing the messag...
详细信息
In this paper we propose and analyze a localized convex-hull based algorithm to connect a maximal independent set. The cardinality of the resultant connected dominating set is at most 76 (.) opt + 19, where opt is the...
详细信息
ISBN:
(纸本)3540371893
In this paper we propose and analyze a localized convex-hull based algorithm to connect a maximal independent set. The cardinality of the resultant connected dominating set is at most 76 (.) opt + 19, where opt is the size of a minimum connected dominating set. To our knowledge, this is a dramatic improvement compared to the best published results in the same context [1,6]. Our algorithm plays an important rule in efficiently constructing a virtual backbone for ad hoc and sensor networks.
This paper presents a framework for agent-enabled semantic integration in the design of distributed digital museum. In this framework, Web Services provides remote information process services which can be discovered ...
详细信息
The notion of a Network-on-Chip (NoC) is rapidly gaining a foothold as the communication fabric in complex System-on-Chip (SoC) architectures. Scalability is the NoC's most valuable asset, which makes it ideal for...
详细信息
ISBN:
(纸本)9781424403905
The notion of a Network-on-Chip (NoC) is rapidly gaining a foothold as the communication fabric in complex System-on-Chip (SoC) architectures. Scalability is the NoC's most valuable asset, which makes it ideal for larger designs. However, increasingly diminishing feature sizes have rendered the interconnect as the primary bottleneck in terms of both latency and power consumption in on-chip systems. It is, therefore, imperative to optimize the network infrastructure to maximize performance. Research has primarily focused on architectural improvements within the router and the development of deadlock avoidance/recovery schemes. The latter tend to rely on fairly complex algorithms, which are sometimes infeasible to implement in NoCs due to their resource-constrained nature. In this paper, we propose a new NoC topology and architecture which injects data into the network using four sub-NICs (Network Interface Controllers), rather than one NIC, per node. It is shown that this scheme achieves significant improvements in network latency and energy consumption with only negligible area overhead and complexity over existing architectures. In fact, in the case of MESH network topologies, the proposed scheme provides substantial savings in area as well, because it requires fewer routers. Cycle-accurate simulation validates our assertions. Most importantly, it is also shown that this implementation is inherently deadlock-free, thus eliminating the need to rely on specialized, resource-hungry algorithms for deadlock avoidance.
暂无评论