A technology for increasing both the two-terminal gate-drain breakdown and subsequently the three-terminal-off-state breakdown of AlInAs/GaInAs high-electron-mobility transistors (HEMTs) to record values without substantial impact on other parameters is presented. The breakdown in these structures is dependent on the multiplication of electrons injected from the source (channel current) and the gate (gate leakage) into the channel. In addition, holes are generated by high fields at the drain and are injected back into the gate and source electrodes. These phenomena can be suppressed by increasing the gate barrier height and alleviating the fields at the drain. Both have been achieved by incorporating a p+-2DEG junction as the gate that modulates the 2DEG gas and by utilizing selective regrowth of the source and drain regions by MOCVD. The 1-μm-gate-length devices fabricated have two-terminal gate-drain and three-terminal-off-state breakdown voltages of 31 V and 28 V, respectively 相似文献
Vicious codes, especially viruses, as a kind of impressive malware have caused many disasters and continue to exploit more vulnerabilities. These codes are injected inside benign programs in order to abuse their hosts and ease their propagation. The offsets of injected virus codes are unknown and their targets usually are latent until they are executed and activated, what in turn makes viruses very hard to detect. In this paper enriched control flow graph miner, ECFGM in short, is presented to detect infected files corrupted by unknown viruses. ECFGM uses enriched control flow graph model to represent the benign and vicious codes. This model has more information than traditional control flow graph (CFG) by utilizing statistical information of dependent assembly instructions and API calls. To the best of our knowledge, the presented approach in this paper, for the first time, can recognize the offset of infected code of unknown viruses in the victim files. The main contributions of this paper are two folds: first, the presented model is able to detect unknown vicious code using ECFG model with reasonable complexity and desirable accuracy. Second, our approach is resistant against metamorphic viruses which utilize dead code insertion, variable renaming and instruction reordering methods. 相似文献
A hybrid analytical-intelligent approach is proposed for fuzzy reliability analysis of the composite beams reinforced by zinc oxide (ZnO) nanoparticle. The fuzzy reliability index corresponding to buckling failure mode of nanocomposite beam under thickness-direction external voltage is computed based on three-levels: (1) fuzzy analysis, (2) reliability analysis and (3) analytical buckling analysis. In fuzzy analysis level, an improved gravitational search algorithm has been applied to determine uncertainty interval for membership levels of reliability index. The adaptive formulation with a dynamical self-adjusting process is used for reliability analysis level based on conjugate first-order reliability method (FORM). The self-adjusting term in conjugate sensitivity vector is used to satisfy the sufficient descent condition for controlling instability of FORM formula while the proposed conjugate scalar factor is computed less than the original conjugate FORM, thus it may be provided with the efficient results for the convex problem. The new and previous sensitivity vectors obtained by conjugate and steepest descent vectors dynamically adjusted the proposed conjugate factor. In the buckling analysis level, an exponential theory in conjunction with the method of energy is utilized. Fuzzy random variables including applied voltage, the volume fraction of ZnO, thickness of beam, spring constant and shear constant of the foundation are considered in studied nanocomposite beam. Survey results indicated that the proposed method can provide stable and acceptable fuzzy membership functions for parametric study. Moreover, the ratio of length to thickness and spring constant of foundation are the more sensitive parameters which affect fuzzy reliability index significantly.
Combining accurate neural networks (NN) in the ensemble with negative error correlation greatly improves the generalization ability. Mixture of experts (ME) is a popular combining method which employs special error function for the simultaneous training of NN experts to produce negatively correlated NN experts. Although ME can produce negatively correlated experts, it does not include a control parameter like negative correlation learning (NCL) method to adjust this parameter explicitly. In this study, an approach is proposed to introduce this advantage of NCL into the training algorithm of ME, i.e., mixture of negatively correlated experts (MNCE). In this proposed method, the capability of a control parameter for NCL is incorporated in the error function of ME, which enables its training algorithm to establish better balance in bias-variance-covariance trade-off and thus improves the generalization ability. The proposed hybrid ensemble method, MNCE, is compared with their constituent methods, ME and NCL, in solving several benchmark problems. The experimental results show that our proposed ensemble method significantly improves the performance over the original ensemble methods. 相似文献
In this article, we consider the project critical path problem in an environment with hybrid uncertainty. In this environment, the duration of activities are considered as random fuzzy variables that have probability and fuzzy natures, simultaneously. To obtain a robust critical path with this kind of uncertainty a chance constraints programming model is used. This model is converted to a deterministic model in two stages. In the first stage, the uncertain model is converted to a model with interval parameters by alpha-cut method and distribution function concepts. In the second stage, the interval model is converted to a deterministic model by robust optimization and min-max regret criterion and ultimately a genetic algorithm with a proposed exact algorithm are applied to solve the final model. Finally, some numerical examples are given to show the efficiency of the solution procedure. 相似文献
In this study, Adaptive Neuro-Fuzzy Inference System (ANFIS) has been used to model local scouring depth and pattern scouring around concave and convex arch shaped circular bed sills. The experimental part of this research study includes seven sets of laboratory test cases which were performed in an experimental flume under different flow conditions. A data set consists of 2754 data points of scouring depth were collected to use in the ANFIS model. The ratio of arch diameter, D, to flume width, W, is used as a non dimensional variables in all test cases. The results from ANFIS model were compared with the results of ANN model obtained by Homayoon et al. [24] and previously presented models. The results indicated that for D/W equal to 1 and 1.2, the ANFIS models produced a good performance for convex and concave bed sills. As a result, the ANFIS models can be used as an alternative to ANN for estimation of scour depth and scour pattern around a concave bed sill installed with a bridge pier. 相似文献
Rigorous control synthesis for an unmanned aerial vehicle necessitates the availability of a good, reasonable model for such
a vehicle. The work reported in this paper focuses on the modeling of a rotary unmanned aerial vehicle (RUAV) and the development
of a robust controller that can handle parameter uncertainties and disturbances. The parameters of the plant model are obtained
through the use of the prediction error method with real flight data. The response of the identified linear model shows a
good match with the measured flight data. The H∞ control scheme is applied to obtain a robustly stable controller using the identified model. The proposed controller is analyzed
using frequency-domain analysis and time-domain simulations. The performance of the proposed H∞ controller is better than that of the conventional proportional derivative controller in that the proposed controller has
a shorter settling time and less overshoot. Furthermore, the degradation of the proposed controller performance is negligible
and stability is maintained when the input gains to the plant are doubled, which demonstrates the good performance and robustness
of the controller. 相似文献
The present study investigated fracture and various mechanical properties of polyoxymethylene (POM) hybrids in tension and in flexure. The hybrids examined consisted of short glass fibers (GF) and spherical glass beads (GB). Comparisons are made between experimentally observed values and predictions based on the rule-of-hybrid mixtures for hybrid strength, modulus, impact strength, fracture toughness, and strain energy release rates. Results indicated that tensile strength, flexural modulus, and fracture toughness of POM/GB/GF hybrid composites can be estimated from the following rule-of-hybrid mixtures where PPOM/GB and PPOM/GF are the measured properties of the POM/GB and POM/GF composites, and χPOM/GB and χPOM/GF are the hybrid ratio (by volume) of the glass bead and that of glass fiber, respectively. In view of this, none of the aforementioned properties show any signs of a hybrid effect. Flexural strengths, impact strengths, and strain energy release rate all showed the existence of a negative hybrid effect where negative deviation from the rule-of-mixtures behavior was observed. The latter was closer to the estimation based on the inverse rule-of mixtures. 相似文献
With the high availability of digital video contents on the internet, users need more assistance to access digital videos. Various researches have been done about video summarization and semantic video analysis to help to satisfy these needs. These works are developing condensed versions of a full length video stream through the identification of the most important and pertinent content within the stream. Most of the existing works in these areas are mainly focused on event mining. Event mining from video streams improves the accessibility and reusability of large media collections, and it has been an active area of research with notable recent progress. Event mining includes a wide range of multimedia domains such as surveillance, meetings, broadcast, news, sports, documentary, and films, as well as personal and online media collections. Due to the variety and plenty of Event mining techniques, in this paper we suggest an analytical framework to classify event mining techniques and to evaluate them based on important functional measures. This framework could lead to empirical and technical comparison of event mining methods and development of more efficient structures at future. 相似文献
The widespread availability of broadband internet access and the growth in server-based processing have provided an opportunity to run games away from the player into the cloud and offer a new promising service known as cloud gaming. The concept of cloud gaming is to render a game in the cloud and stream the resulting game scenes to the player as a video sequence over a broadband connection. To meet the stringent network bandwidth requirements of cloud gaming and support more players, efficient bit rate reduction techniques are needed. In this paper, we introduce the concept of game attention model (GAM), which is basically a game context-based visual attention model, as a means for reducing the bit rate of the streaming video more efficiently. GAM estimates the importance of each macro-block in a game frame from the player’s perspective and allows encoding the less important macro-blocks with lower bit rate. We have evaluated nine game video sequences, covering a wide range of game genre and a spectrum of scene content in terms of details, motion and brightness. Our subjective assessment shows that by integrating this model into the cloud gaming framework, it is possible to decrease the required bit rate by nearly 25 % on average, while maintaining a relatively high user quality of experience. This clearly enables players with limited communication resources to benefit from cloud gaming with acceptable quality. 相似文献