A silicon-nanowire (Si-NW) switch with triboelectricity is proposed for the first time for future electronics with enhanced security application. the dimensions of the mechanical NW switch are width 50 nm and thicknes...
详细信息
ISBN:
(纸本)9781509050796
A silicon-nanowire (Si-NW) switch with triboelectricity is proposed for the first time for future electronics with enhanced security application. the dimensions of the mechanical NW switch are width 50 nm and thickness 100 nm with a 50-nm-thick airgap, fabricated with aid of CMOS fabrication technology. By hand-touch on gate pad, the fabricated switch can turn-on as well as turn-off by destruction of fin-channel which comes from electrostatic force by triboelectricity. this technology is expected as a security-enhanced future electronics.
Electronics, which functions for a designed time period and then degrades, holds promise in lots of areas, including medical implants, disposable electronic devices and data securing hardware. Here, we report a new ty...
详细信息
ISBN:
(纸本)9781509050796
Electronics, which functions for a designed time period and then degrades, holds promise in lots of areas, including medical implants, disposable electronic devices and data securing hardware. Here, we report a new type of transient electronics that is triggered through electrochemical-mechanical manner with robust and reliable mechanical design, low triggering voltage and fast transient characteristics. Such device is constructed through integrating electrochemical-mechanically triggered MEMS module with functional electronics. the electrochemical-mechanical triggering mechanism in this device opens up new vistas for transient electronics designs. Various materials and different type of electronics has been demonstrated.
Location-related data has a tremendous impact in many applications of high societal relevance and its growing volume from heterogeneous sources is one true example of a Big Data [1]. An inherent property of any spatio...
详细信息
ISBN:
(纸本)9781479925568
Location-related data has a tremendous impact in many applications of high societal relevance and its growing volume from heterogeneous sources is one true example of a Big Data [1]. An inherent property of any spatio-temporal dataset is uncertainty due to various sources of imprecision. this tutorial provides a comprehensive overview of the different challenges involved in managing uncertain spatial and spatio-temporal data and presents state-of-the-art techniques for addressing them.
One of the characteristics of object-oriented software is the complex dependencies that may exist between classes due to generalization and client-server relationships. Hence, where to start testing and how to define ...
详细信息
One of the characteristics of object-oriented software is the complex dependencies that may exist between classes due to generalization and client-server relationships. Hence, where to start testing and how to define an integration strategy are issues that require investigation. A number of techniques exist to order the test of classes withthe aim of reducing costs. they usually generate a class test order that is a directed graph indicating in which order classes have to be tested, or which classes can be tested in parallel. this paper shows how such a class test order can be beneficial to testers and designers when conducting various activities, such as planning and scheduling class testing. this is illustrated by means of a case study
Trivium is a notable light-weight synchronous stream cipher submitted to the European eSTREAM project in April 2005. Quavium is a 4-round Trivium-like algorithm which is almost as fast as Trivium. In this paper, the s...
详细信息
Trivium is a notable light-weight synchronous stream cipher submitted to the European eSTREAM project in April 2005. Quavium is a 4-round Trivium-like algorithm which is almost as fast as Trivium. In this paper, the structure of Quavium is studied and we study the security of Quavium under state recovering attack, which is the best known attack to Trivium, i.e., we try to recover the internal state and the secret key of Quavium, given a piece of a known keystream. We show that the internal state of Quavium will be recovered in time around 2^142.5, while for Trivium the complexity is 2^83.5. therefore, comparing with Trivium, Quavium has a better performance under state recovering attack.
Mixed fruit-vegetable cropping systems are a promising way of ensuring environmentally sustainable agricultural production systems in response to the challenge of being able to fulfill local market requirements. Indee...
详细信息
ISBN:
(纸本)9783319600451;9783319600444
Mixed fruit-vegetable cropping systems are a promising way of ensuring environmentally sustainable agricultural production systems in response to the challenge of being able to fulfill local market requirements. Indeed, they combine productions and they make a better use of biodiversity. these agroforestry systems are based on a complex set of interactions modifying the utilization of light, water and nutrients. thus, designing such a system must optimize the use of these resources: by maximizing positive interactions (facilitation) and minimizing negative ones (competition). To attain these objectives, the system's design has to include the spatial and temporal dimensions, taking into account the evolution of above-and belowground interactions over a time horizon. For that, we define the Mixed Fruit-Vegetable Crop Allocation Problem (MFVCAP) using a discrete representation of the land and the interactions between vegetable crops and fruit trees. First, we give a direct formulation as a binary quadratic program (BQP). then we reformulate the problem using a Benders decomposition approach. the master problem has 0/1 binary variables and deals with tree positioning. the subproblem deals with crop quantities. the BQP objective function becomes linear in the continuous subproblem by exploiting the fact that it depends only on the quantity of crops assigned to land units having shade, root, or nothing. this problem decomposition allows us to reformulate the MFVCAP into a Mixed Integer linear Program (MIP). the detailed spatial-temporal crop allocation plan is easy to obtain after solving the MIP. Experimental results show the efficiency of our approach compared to a direct solving of the original BQP formulation.
the main purpose of the program graphs that is a visual representation of basic graph-concepts and graph-algorithms using a colouring process on graphs created within the program. the program was created in the Delphi...
详细信息
ISBN:
(纸本)9789537138127
the main purpose of the program graphs that is a visual representation of basic graph-concepts and graph-algorithms using a colouring process on graphs created within the program. the program was created in the Delphi environment by our student for his thesis, and enables the teacher to complete his/her lectures so that topics can be more comprehensible as well as saving the teacherpsilas time when he/she prepares text materials and presentations. Students using this program can revise subject-matter and understand it more deeply. they can easily prepare their assignments withthe aid of program as well. this paper explores just a few ideas that have proved successful in enhancing education and optimization of studentspsila study habits.
the two-volume set LNCS 14499 and 14500 constitutes the proceedings of the 25thinternationalconference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2024, which took place in London, Ontario, C...
详细信息
ISBN:
(数字)9783031505218
ISBN:
(纸本)9783031505201
the two-volume set LNCS 14499 and 14500 constitutes the proceedings of the 25thinternationalconference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2024, which took place in London, Ontario, Canada, in January 2024.;the 30 full papers presented in the proceedings were carefully reviewed and selected from 74 submissions. they were organized in topical sections as follows:Part I: Abstract interpretation; infinite-state systems; model checking and synthesis; SAT, SMT, and automated reasoning;;Part II: Concurrency; neural networks; probabilistic and quantum programs; program and system verification; runtime verification; security and privacy;
In order to allow medical devices to upload the vital signs to a server on a network without manually configuring for end-users, a new network module is proposed. the proposed network module, called Medical Hub (MH), ...
详细信息
In order to allow medical devices to upload the vital signs to a server on a network without manually configuring for end-users, a new network module is proposed. the proposed network module, called Medical Hub (MH), functions as a bridge to fetch the data from all connecting medical devices, and then upload these data to the server. When powering on, the MH can immediately establish network configuration automatically. Network Address Translation (NAT) traversal is also supported by the MH withthe UPnP Internet Gateway Device (IGD) methodology. Besides the network configuration, other configuration in the MH is automatically established by using the remote management protocol TR-069. On the other hand, a mechanism for updating software automatically according to the variant connected medical device is proposed. Withthis mechanism, newcome medical devices can be detected and supported by the MH without manual operation.
the two-volume set LNCS 14499 and 14500 constitutes the proceedings of the 25thinternationalconference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2024, which took place in London, Ontario, C...
详细信息
ISBN:
(数字)9783031505249
ISBN:
(纸本)9783031505232
the two-volume set LNCS 14499 and 14500 constitutes the proceedings of the 25thinternationalconference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2024, which took place in London, Ontario, Canada, in January 2024.;the 30 full papers presented in the proceedings were carefully reviewed and selected from 74 submissions. they were organized in topical sections as follows:Part I: Abstract interpretation; infinite-state systems; model checking and synthesis; SAT, SMT, and automated reasoning;;Part II: Concurrency; neural networks; probabilistic and quantum programs; program and system verification; runtime verification; security and privacy.
暂无评论