The breakdown (BD) kinetics of dielectrics represent a crucial issue for the reliability of microelectronics devices. In this paper, we report on an innovative and practical approach based on Conductive Atomic Force Microscopy (C-AFM) for the determination of the BD kinetics on a bare insulator surface. This technique has been applied to Pr2O3 films grown by Metal-Organic Chemical Vapour Deposition (MOCVD) on Si(0 0 1) and to thermally grown SiO2 on 4H-SiC substrates. C-AFM clearly visualizes single breakdown spots under constant voltage stresses. The stress time on the C-AFM tip was varied from 1 × 10−3 to 1 × 10−1 s. The density of BD spots, upon increasing the stress time, exhibits in both cases an exponential trend. The Weibull slope of the dielectric BD statistics has been determined by direct measurements at nanometer scale on different dielectrics having different physical thicknesses. The comparison of the Weibull slopes obtained for different dielectric thicknesses with literature data points out intrinsic and extrinsic BD events in the SiO2/SiC system and Pr2O3 based layers, respectively. In the case of the SiO2/SiC system, BD kinetics have been demonstrated to follow the percolation model, while the role of extrinsic phenomena in the BD of Pr2O3 films has been proved. 相似文献
Wireless Personal Communications - In the present study, the results obtained by incoherent scatter radar (ISR) and empirical models (NeQuick2 and IRI-2016) of the variations in mid-latitude... 相似文献
Radio-frequency identification (RFID) is an up-and-coming technology. The major limitations of RFID technology are security and privacy concerns. Many methods, including encryption, authentication and hardware techniques, have been presented to overcome security and privacy problems. This paper focuses on authentication protocols. The combination of RFID technology being popular but unsecure has led to an influx of mutual authentication protocols. Authentication protocols are classified as being fully fledged, simple, lightweight or ultra-lightweight. Since 2002, much important research and many protocols have been presented, with some of the protocols requiring further development. The present paper reviews in detail recently proposed RFID mutual authentication protocols, according to the classes of the authentication protocols. The protocols were compared mainly in terms of security, the technique that they are based on, protocols that the presented protocol has been compared with, and finally, the method of verifying the protocol. Important points of the comparisons were collected in two tables.
Software defined physical layer modems can be considered the new trend in the field of communications. Differently from dedicated hardware, software can be easily modified to implement a large variety of standards on the same platform. The use of software can significantly reduce development costs, but generally comes at the price of an increase in silicon area and power consumption. For different reasons, this price is something that is not always convenient or even possible to pay, as in the case of low-cost ICs implementing a single waveform, or even multi-mode modems embedding legacy IPs already available in hardware. In particular, power consumption overhead can be prohibitive for mobile terminals or in general for battery-powered devices. The very first challenge for a computing fabric to be competitive is to find and implement the right trade-off between flexibility and performance. This was the guideline for the design of the Block Processing Engine (BPE), a template architecture conceived for power-efficient baseband processing. The BPE core feature is a mixed-grain instruction set balancing general-purpose fine-grain instructions with more specific coarse-grain instructions wrapping custom hardware modules. To further limit the power consumption, the BPE also implements instruction-pipelining, variable-size SIMD and multi-task support. To prove the efficiency of such an approach, a dual-mode IEEE 802.11a/p receiver has been implemented. 相似文献
Handover authentication protocol enables a mobile node to switch from one base station to another without loss or interruption of service when the node exits the transmission area of his or her current base station. This paper proposes a secure prime-order handover authentication protocol based on bilinear pairings. The proposed protocol adapts the concept of pseudonyms to provide user anonymity and user unlinkability. It withstands well-known security threats and achieves mutual authentication, user unlinkability. A batch signature verification mechanism to verify a mass of signatures is presented in our scheme. We also prove that our scheme is secure under random oracle. 相似文献
Wireless Personal Communications - The quality of services (QoS) has a key role to improve the performances of the collaborative mobile learning. However, many factors can limit it such as the... 相似文献
Wireless Personal Communications - Fog computing needs, particularly in terms of performance, availability and reliability, are increasing every day due to the rapid growth in the number of... 相似文献
The performance of signal-processing algorithms implemented in hardware depends on the efficiency of datapath, memory speed and address computation. Pattern of data access in signal-processing applications is complex and it is desirable to execute the innermost loop of a kernel in a single-clock cycle. This necessitates the generation of typically three addresses per clock: two addresses for data sample/coefficient and one for the storage of processed data. Most of the Reconfigurable Processors, designed for multimedia, focus on mapping the multimedia applications written in a high-level language directly on to the reconfigurable fabric, implying the use of same datapath resources for kernel processing and address generation. This results in inconsistent and non-optimal use of finite datapath resources. Presence of a set of dedicated, efficient Address Generator Units (AGUs) helps in better utilisation of the datapath elements by using them only for kernel operations; and will certainly enhance the performance. This article focuses on the design and application-specific integrated circuit implementation of address generators for complex addressing modes required by multimedia signal-processing kernels. A novel algorithm and hardware for AGU is developed for accessing data and coefficients in a bit-reversed order for fast Fourier transform kernel spanning over log?2N stages, AGUs for zig-zag-ordered data access for entropy coding after Discrete Cosine Transform (DCT), convolution kernels with stored/streaming data, accessing data for motion estimation using the block-matching technique and other conventional addressing modes. When mapped to hardware, they scale linearly in gate complexity with increase in the size. 相似文献
This paper presents a performance analysis of a recently proposed preamble-based reduced-complexity (RC) two-stage synchronization technique. The preamble, composed of two identical subsequences, is first used to determine an uncertainty interval based on Cox and Schmidl algorithm. Then, a differential correlation-based metric is carried using a new sequence obtained by element wise multiplication of the preamble subsequence and a shifted version of it. This second step is performed to fine tune the coarse time estimate, by carrying the differential correlation-based metric over the uncertainty interval of limited width around the coarse estimate, thus leading to low computational load. In this paper, we first discuss some complexity issues of the RC approach compared to previously proposed algorithms. Then, we study the effect of the training sequence class and length choices on the synchronization performance in the case of multipath channels. The impact of the uncertainty interval width on the trade-off between performance and complexity is also studied. The two-stage approach was found to provide almost equal performance to those obtained by the most efficient differential correlation-based benchmarks. However, it has a very reduced computational load, equivalent to that of sliding correlation-based approaches. 相似文献
This work discusses the evolution of W-LANs from their current status of wireless termination of LAN services to a possible global infrastructure where the access networks become open to multiple operators and a vehicle of a win-win scenario, where both users and operators benefit from the new network architecture. The idea of Open Access Networks (OANs) can go beyond wireless HotSpots and be generalized to a generic shared access infrastructure that fosters service operators competition and drastically reduces the cost of last mile coverage.The general concept of Open Access Networks is detailed, highlighting its difference with the more traditional model of vertical integration of the access network into the global service. About the OANs development, it is shown how to support the quick and smooth evolution of the infrastructure toward a widespread and reliable communication support.Business models are discussed by mentioning the different actors, the market organization and the different organization forms.The final part of the paper is devoted to technical challenges such as access control, security, privacy, roaming, resource exploitation and service differentiation. As an example of how to tackle these problems, we discuss a pricing technique devoted to resource management and billing support.In addition we present a simulation on how the OAN concept can speed-up the deployment of broadband access in a real case.A preliminary version of this paper with the title “Global Growth of Open Access Networks: from WarChalking and Connection Sharing to Sustainable Business” was presented at WMASH 2003.
Roberto Battiti received the Laurea degree from the University of Trento, Italy, in 1985 and the Ph.D. degree from the California Institute of Technology (Caltech), USA, in 1990. He has been a consultant in the area of parallel computing and pattern recognition and since 1991 he has been a faculty member at the University of Trento, where he is now full professor of Computer Networks. His main research interests are heuristic algorithms for optimization problems, in particular reactive search algorithms for maximum clique, maximum satisfiability, graph coloring, networks and massively parallel architectures, code assignment in wireless and cellular networks, protocols for pricing and Quality of Service in wireless networks.Prof. R. Battiti is currently Dean of the international Graduate School in Information and Communication Technologies at Trento, Deputy Dean at the Faculty of Science, member of the advisory committee for the future Telecommunications Plan of the Autonomous Province of Trento. Prof. R. Battiti is associate editor of various scientific journals. He is the author of more than fifty scientific publications, including special issues dedicated to experimental algorithmics and wireless on-demand networks.R. Battiti is a member of IEEE Computer Society and ACM Sigmobile.
Renato Lo Cigno is Associate Professor at the Department of Computer Science and Telecommunications (DIT) of the University of Trento, Italy. He received a Dr. Ing. degree in Electronic Engineering from Politecnico di Torino in 1988. From 1989 to 2002 has been with the Telecommunication Research Group of the Electronics Department of Politecnico di Torino.From June 1998 to February 1999, he was at the CS Department at UCLA as Visiting Scholar under grant CNR 203.15.8. He is coauthor of more than 90 journal and conference papers in the area of communication networks and systems. His curent research interests are in performance evaluation of wired and wireless networks, modeling and simulation techniques, flow and congestion control, as well as network management and architecture. Renato Lo Cigno is member of the IEEE Communication Society and ACM Sigcomm.
Mikalai Sabel received his master degree in radio physics from Belorussian State University in 2002. He is now pursuing his Ph.D. at the international Graduate School of Information and Communication Technologies at University of Trento, Italy. His research interest include wireless LANs, pricing and incentive engineering, IEEE802.11 MAC protocol. His current research is focused on optimization algorithms that can provide stability and maximum global welfare in a non-cooperative environment where singles tries to maximize their own benefit function. Experimentation of such schemes to pricing techniques and micro-payments in TLC networks provides the application environment of the fundamental research.
Fredrik Orava is associate professor at KTH, Stockholm, Sweden. He conducts research into scalable (in terms of cost, capacity, number of users and devices etc.) communication system architectures and technologies. He has a MSc in engineering physics from Uppsala University and a PhD in computer systems also from Uppsala University. He previously held positions as researcher at the Swedish Institute for Computer Science (SICS); senior lecturer and manager of the telecommunications systems laboratory at the department for teleinformatics, KTH; acting professor in telecomunication systems at KTH; director for the Swedish Centre for Internet Technologies; and vice president of Dynarc AB with world wide responsibility for product management. Dynarc AB develops, manufactures and sells IP routers for optical IP networks.
Bjorn Pehrson is a professor of telecommunication systems at KTH, the Royal Institute of Technology in Stockholm, since 1992, where he has also served as a department chairman and vice dean. He had his PhD from Uppsala University 1975 where he also served as senior lecturer and established a research group in computer and communication technology. During the period 1985-1992 he participated in the establishment of the Swedish Institute of Computer Science. Björn Pehrson research interests are currently focussed on open network topologies allowing different actors forming new value chains to build networks together based on different, sometimes very local business models. The results are applied in testbeds, especially in rural areas and in developing countries.This revised version was published online in August 2005 with a corrected cover date. 相似文献