Neural networks extended to complex numbers have been studied. Complex-valued neural networks (CVNNs) can be used for learning geometric mappings in a two-dimensional plane. CVNNs can learn geometric structures suffic...
详细信息
This study's objective is to evaluate the system's level of maturity by adopting the COBIT Framework 5. The COBIT Framework is one of the ISACA-issued frameworks that defines the concept of information technol...
详细信息
The use of effective conduction-band edge method (ECBE) method for the incorporation of quantum correction potential energy in Monte Carlo (MC) simulation of ultra-thin double gate (D-G) MOSFET was discussed. The ECBE...
详细信息
ISBN:
(纸本)0780386493
The use of effective conduction-band edge method (ECBE) method for the incorporation of quantum correction potential energy in Monte Carlo (MC) simulation of ultra-thin double gate (D-G) MOSFET was discussed. The ECBE method is using stress tensor, U, for the simulation of D-G MOSFET. The quantum correction is performed on all vertical lines from the source to the drain contacts rather than only in the region between the gates. The ECBE-U method does not impose the condition that the quantum correction potential vanishes at the mid-points of the channel, which may not be correct for ultra-thin D-G MOSFETs. In the MC simulation, the quantum correction is determined self-consistently along each transverse line in the channel.
Portable digital systems need to be not just low power but power efficient as they are powered by low batteries or energy harvesters. Energy harvesting systems tend to provide nondeterministic, rather than stable, pow...
详细信息
A system consisting of n components connected in a circular manner is called a circular consecutive-κ-out-of-n: F system if it fails when κ or more consecutive components fail. One of the most important problems for...
详细信息
A novel four-band CPW-fed antenna simultaneously satisfied the requirement for Radio Frequency Identification (RFID) tag and WiMAX /WLAN applications is reported in this paper. Limited to 30×30 mm2 area on a PCBo...
详细信息
Technology impact brings Reduced Instruction Set computer (RISC) design approach back to the stage of computer architecture evolution. While RISC architecture grab attention by their flying instruction rates, this pap...
ISBN:
(纸本)9780897914130
Technology impact brings Reduced Instruction Set computer (RISC) design approach back to the stage of computer architecture evolution. While RISC architecture grab attention by their flying instruction rates, this paper summarizes the current design of micro-architectures and analyzes the tradeoffs between RISC approach and Microprogramming approach especially on the vertical migration among hardware, firmware, compilation and software. RISCs' simplicity is contrasted by the regularity of microprogrammed control. The RISC design incentives are categorized into three perspectives, namely, technology-driven, application-driven, and performance-driven. Traditional firmware migration approaches are reviewed and related to RISC design philosophy as well as Writable Instruction Set computer (WISC) concept. Research such as Firmware Migration candidates selection can be applied to RISC instruction set design. Similarly, micro-code generation and compaction research can be used to construct the smart, optimizing RISC compiler. Horizontal microcode approach is interpreted as the Very Long Instruction Word (VLIW) architecture. Incorporating in the discussion about new design trends affected by GaAs, memory technology, and super-computing a clue for the direction of future-proof micro-architecture and microprogramming is projected.
The concept of the visual walking is proposed in this paper, which is a hybrid control of servoing the camera image feature point by the posture control and/or tracking it by the biped walking. This control includes t...
详细信息
The concept of the visual walking is proposed in this paper, which is a hybrid control of servoing the camera image feature point by the posture control and/or tracking it by the biped walking. This control includes the decision making among the environmental conditions. The control algorithm for the visual walking is presented and it is verified by several experiments.
Elliptic curve cryptography (ECC) has shorter key length than other asymmetric cryptography algorithms such as RSA with the same security level. Existing faults in cryptographic computations can cause faulty results. ...
Elliptic curve cryptography (ECC) has shorter key length than other asymmetric cryptography algorithms such as RSA with the same security level. Existing faults in cryptographic computations can cause faulty results. If a fault occurs during encryption, false information will be sent to the destination, in which case channel error detection codes are unable to detect the fault. In this paper, we consider the error detection in elliptic curve scalar multiplication point, which is the most important operation in ECC. Our technique is based on non-linear error detection codes. We consider an algorithm for scalar multiplication point proposed by Microsoft research group. The proposed technique in our methods has less overhead for additions (36.36%) and multiplications (34.84%) in total, compared to previous works. Also, the proposed method can detect almost 100% of injected faults.
Sleep apnea is a disorder, where the obstructed upper airway affects breathing during sleep time. This ailment causes disruptions in sleep, leading \sleep deprivation. Age has a great impact on sleep deprivation due t...
详细信息
暂无评论