With wafer revisit, it is complicated to schedule cluster tools in semiconductor fabrication. In wafer fabrication processes, such as atomic layer deposition (ALD), the wafers need to visit some process modules for a ...
详细信息
In this paper, we present a multi-symplectic Hamiltonian formulation of the coupled Schrtidinger-KdV equations (CS'KE) with periodic boundary conditions. Then we develop a novel multi-symplectic Fourier pseudospect...
详细信息
In this paper, we present a multi-symplectic Hamiltonian formulation of the coupled Schrtidinger-KdV equations (CS'KE) with periodic boundary conditions. Then we develop a novel multi-symplectic Fourier pseudospectral (MSFP) scheme for the CSKE. In numerical experiments, we compare the MSFP method with the Crank-Nicholson (CN) method. Our results show high accuracy, effectiveness, and good ability of conserving the invariants of the MSFP method.
Complementary metal oxide semiconductor(CMOS)aging mechanisms including bias temperature instability(BTI)pose growing concerns about circuit *** results in threshold voltage increases on CMOS transistors,causing delay...
详细信息
Complementary metal oxide semiconductor(CMOS)aging mechanisms including bias temperature instability(BTI)pose growing concerns about circuit *** results in threshold voltage increases on CMOS transistors,causing delay shifts and timing violations on logic *** amount of degradation is dependent on the circuit workload,which increases the challenge for accurate BTI aging prediction at the design *** this paper,a BTI prediction method for logic circuits based on statistical static timing analysis(SSTA)is proposed,especially considering the correlation between circuit workload and BTI *** consists of a training phase,to discover the relationship between circuit scale and the required workload samples,and a prediction phase,to present the degradations under different workloads in Gaussian probability *** method can predict the distribution of degradations with negligible errors,and identify 50%more BTI-critical paths in an affordable time,compared with conventional methods.
In recent years, with the quiet popularity of mobile payment methods, mobile terminal equipment also have potential security problems while facilitating people’s lives. Behavior-based Android malware detection is mos...
详细信息
With the widespread use of the Android operating system, the number of applications based on the Android platform is growing. How to effectively identify malware is critical to the security of phones. This paper propo...
详细信息
Wireless sensor network (WSN) is attracting intensive interests in many application areas. In some scenarios such as monitoring of the coal-mining area or remote area, nodes seldom move and may switch from sleeping to...
详细信息
Wireless sensor network (WSN) is attracting intensive interests in many application areas. In some scenarios such as monitoring of the coal-mining area or remote area, nodes seldom move and may switch from sleeping to waking mode to minimize power consumption. Energy conservation design for the network lifetime extension is the primary issue. By adopting sleep scheduling to keep low duty cycle can help reduce the energy consumption. Random sleep scheduling is a desirable mechanism for its simplicity and guaranteed stable low duty cycle. Moreover, the low duty cycle sleeping of nodes may destroy the connectivity of network. Most of existing WSN routing techniques are designed for fully connected networks assuming that the nodes of the routing path between source and destination are all available at the same time. Maintaining fully connected backbone involves high duty cycle and costly clock synchronization which consumes more energy. If certain delay is tolerant, partially connected routing can achieve successful packet forwarding in networks with the deficiency of connectivity. In this paper a new partially connected routing and simple random sleep scheduling scheme is proposed for WSN with low duty cycle. A continuous time Markov chains (CTMC) connectivity availability model is introduced to evaluate the end to end packet delivery ratio of multi-hop networks subjected to the impact of both frequent disconnection and random sleep latency. The proposed connectivity availability model can also be used as the key metric for route path selection to achieve stable and high performance. Deployment guidelines are given for WSN with random sleep scheduling policy satisfying reliability, timeliness and duty cycle requirements. By modeling and simulation, we find that as compared to the fully connected routing protocol, the partially connected routing design can achieve much higher packet delivery ratio and lower duty cycle within the tolerant delay. The computation and simul
The information technology has been recognized as one of the most important means to improve health care and curb its ever-increasing cost. However, existing efforts mainly focus on informatization of hospitals or med...
详细信息
IEEE 802.15.4/ZigBee sensor networks support small power consumption and node expansion compared to other network standards for WSN. Body sensor networks (BSN) require a number of sensors for sensing medical informati...
详细信息
Internet of Things (IoT) devices generate large amounts of data every day that can be combined with intelligent platforms for predictive analytics and scientific research. However, concerns about privacy and security ...
Internet of Things (IoT) devices generate large amounts of data every day that can be combined with intelligent platforms for predictive analytics and scientific research. However, concerns about privacy and security hinder the willingness of individuals to share data. Blockchain emerged as a promising infrastructure for facilitating secure data sharing due to its decentralized, immutability, and auditable benefits. In this paper, we propose a blockchain-based cloud–edge collaborative privacy protection data sharing scheme (BCE-PPDS), which is decentralized and enables data requesters (DRs) to search data resources using smart contracts to efficiently obtain target data. To protect the identity privacy of data owners (DOs), we propose a novel certificateless linkable ring signature algorithm with efficient performance. This algorithm is not only suitable for deployment on resource-limited IoT devices, so that DOs can realize anonymous identity authentication, but also can aggregate the generated ring signatures for batch verification, so as to improve the efficiency of signature verification. In addition, we designed a key distribution algorithm using the Asmuth–Bloom secret sharing scheme to ensure the security of the key. Under the random oracle model, BCE-PPDS is provably secure. The experimental results verify that BCE-PPDS is efficient and practical.
The tracking–learning–detection (TLD) algorithm applied in the home environment can effectively improve the tracking robustness. However, it has the problems of single target tracking and poor selection of feature p...
详细信息
暂无评论