This paper describes a modified SPICE-compatible VDMOS transistor model that includes NBT and self-heating effects. A complete circuit diagram of the transistor is given, which includes the electrical part of the circ...
详细信息
ISBN:
(数字)9798350386998
ISBN:
(纸本)9798350387001
This paper describes a modified SPICE-compatible VDMOS transistor model that includes NBT and self-heating effects. A complete circuit diagram of the transistor is given, which includes the electrical part of the circuit that models the NBT effect and the equivalent thermal part of the circuit that models the self-heating effect. The parameters of the model were determined based on the technical documentation and the fitting method based on the performed experiments. Fresh transistors and NBT-stressed transistors, with and without a heatsink in the load-driving circuit, were considered. The results of experiments and simulations correspond to each other with a maximum deviation of up to 10%. The proposed model can be used in the design and analysis of transistor reliability parameters.
Coronavirus(COVID-19)is a contagious disease that causes exceptional effect on healthcare organizationsworldwide with dangerous impact on medical services within the *** of the fast spread of COVID-19,the healthcare f...
详细信息
Coronavirus(COVID-19)is a contagious disease that causes exceptional effect on healthcare organizationsworldwide with dangerous impact on medical services within the *** of the fast spread of COVID-19,the healthcare facilities could be a big source of disease ***,healthcare video consultations should be used to decrease face-to-face communication between clinician and *** video consultations may be beneficial for some COVID-19 conditions and reduce the need for faceto-face contact with a potentially positive patient without *** conditions are like top clinicians who provide remote consultations to develop treatment methodology and follow-up remotely,patients who consult about COVID-19,and those who have mild symptoms suggestive of the COVID-19 *** consultations are a supplement to,and not a substitute for,telephone *** may also form part of a broader COVID-19 distance care strategy that contains computerized screening,separation of possibly infectious patients within medical services,and computerized video-intensive observing of their intensive care that helps reduce ***,the spread of the COVID-19 virus helps to expand the use of video healthcare consultations because it helps to exchange experiences and remote medical consultations,save costs and health procedures used to cope with the pandemic of the COVID-19 virus,and monitor the progress of treatment plans,moment by moment from a distance with precision,clarity and *** this perspective,this paper introduces a high-efficiency video coding(HEVC)ChaCha20-based selective encryption(SE)scheme for secure healthcare video *** proposed HEVC ChaCha20-based SE scheme uses the ChaCha20 for encrypting the sign bits of the Discrete Cosine Transform(DCT)and Motion Vector Difference(MVD)in the HEVC entropy *** main achievement of HEVC ChaCha20-based SE scheme is encrypting the most sensitive video bits with keeping low
作者:
Rothkrantz, LeonFaculty of Electronic Engineering
Mathematics and Computer Science Delft University of Technology Netherlands and Faculty of Transportation Sciences Czech Technical University in Prague Czech Republic
At many times we observed disturbances of traffic flow on highways. This may be caused by traffic accidents, bad weather conditions, road maintenance or rush hours. The Road Traffic Management takes many rules and reg...
详细信息
This paper answers three essential questions for audio speech cryptosystems in time and discrete transform *** first question is,what are the best values of sub-keys that must be used to get the best quality and secur...
详细信息
This paper answers three essential questions for audio speech cryptosystems in time and discrete transform *** first question is,what are the best values of sub-keys that must be used to get the best quality and security for the audio cryptosystem in time and discrete transform *** second question is the relation between the number of sub-keys,the number of secret keys used,and the audio speech signal block’s ***,how many possible secret keys can be used to get the best quality and security results for the audio speech cryptosystem in time and discrete transform *** audio cryptosystem discussed before in recent research is applied to answer the three previous *** simulation results and analysis answer all three questions;first,there is no specific,well-defined format or rule for sub-key values that must be used to get a better *** the second question,yes,there is a direct relationship between the number of applicable keys,number of available sub-keys,and block size of speech audio signal and formulated into a first-order *** the third question,each discrete transform domain has a specific acceptable range of sub-keys that imply a particular number of keys that can be used to get a better cryptosystem.
Advancing memory circuitry has heightened the performance criteria for memory in diverse chip applications. Decoders, serving as peripheral circuits to memory devices, have be a prominent area of academic interest. Th...
详细信息
This research presents an automatic system for the detection of stop line violations. Stop line violation is defined as a condition in which a vehicle does not appropriately stop behind a stop line. This research uses...
详细信息
Physical-layer security (PLS) is a new paradigm for secure communication without requiring secret key exchange and management. Moreover, PLS with frequency diverse subarray (FDSA) can better control information leakag...
详细信息
In the era of precision agriculture, effective and efficient monitoring of rice paddy fields is vital for optimizing crop yield and ensuring environmental sustainability. This study presents a novel approach utilizing...
详细信息
Urban centers are grappling with increasing traffic congestion, which hampers mobility and reduces the effectiveness of emergency responses. Current traffic management systems struggle to dynamically prioritize emerge...
详细信息
Improving technology in the field of education will greatly help teachers and students in various ways, one of which is attendance. An attendance system generally leaks security and verification which may lead to frau...
详细信息
暂无评论