InP-based resonant tunneling hot electron transistors (RHET's) were studied systematically using chemical beam epitaxy (CBE) for the first time. All the RHET's studied have a highly strained AlAs/In0.75Ga0.25As/AlAs resonant tunneling double barrier as a hot electron injector, and an InP collector barrier with or without InGaAsP graded layers. The highest transport ratio (α) observed is 0.98, and the highest peak-to-valley current ratios (PVR's) measured are 20 and 200 in the collector current and base current, respectively, at 80 K. A self-consistent simulation is used as a reference to optimize the hot electron injector and to explain the ballistic transport. An energy spectrometer technique was applied to the RHET's for resolving the hot electron energy distribution which showed a full width at half maximum (FWHM) of around 58 meV, indicating ballistic transport of electrons. Finally, room temperature transistor action was also observed with a β of 4 and a cutoff frequency of 31 GHz 相似文献
Electrochemical treatment processes can significantly contribute to the protection of the environment through the minimization
of waste and toxic materials in effluents. From a pharmaceutical point of view and due to the existing resemblance between
the electrochemical and biological reactions, it can be assumed that the oxidation mechanisms on the electrode and in the
body share similar principles. In this paper, the application of electrochemical studies in the design of an environmentally
friendly method was delineated for the new hydrocaffeic acid (HCA, 3,4-dihydroxy hydrocinnamic acid) derivatives synthesis
at carbon electrodes in an undivided cell. In this cell, the EC mechanism reaction was involved, comprising two steps alternatively;
(1) electrochemical oxidation and (2) chemical reaction. In particular, the electro-organic reactions of HCA, an important
biological molecule, were studied in a water–acetonitrile (90:10 v/v) mixture in the presence of benzenesulfinic acid (3) and p-toluenesulfinic acid (4). The research included the use of a variety of experimental techniques, such as cyclic voltammetry, controlled-potential
electrolysis and product spectroscopic identification. 相似文献
Along with the exponential growth of online video creation platforms such as Tik Tok and Instagram, state of the art research involving quick and effective action/gesture recognition remains crucial. This work addresses the challenge of classifying short video clips, using a domain-specific feature design approach, capable of performing significantly well using as little as one training example per action. The method is based on Gunner Farneback’s dense optical flow (GF-OF) estimation strategy, Gaussian mixture models, and information divergence. We first aim to obtain accurate representations of the human movements/actions by clustering the results given by GF-OF using K-means method of vector quantization. We then proceed by representing the result of one instance of each action by a Gaussian mixture model. Furthermore, using Kullback-Leibler divergence (KL-divergence), we attempt to find similarities between the trained actions and the ones in the test videos. Classification is done by matching each test video to the trained action with the highest similarity (a.k.a lowest KL-divergence). We have performed experiments on the KTH and Weizmann Human Action datasets using One-Shot and K-Shot learning approaches, and the results reveal the discriminative nature of our proposed methodology in comparison with state-of-the-art techniques.
Security threats are crucial challenges that deter Mixed reality (MR) communication in medical telepresence. This research aims to improve the security by reducing the chances of types of various attacks occurring during the real-time data transmission in surgical telepresence as well as reduce the time of the cryptographic algorithm and keep the quality of the media used. The proposed model consists of an enhanced RC6 algorithm in combination. Dynamic keys are generated from the RC6 algorithm mixed with RC4 to create dynamic S-box and permutation table, preventing various known attacks during the real-time data transmission. For every next session, a new key is created, avoiding possible reuse of the same key from the attacker. The results obtained from our proposed system are showing better performance compared to the state of art. The resistance to the tested attacks is measured throughout the entropy, Pick to Signal Noise Ratio (PSNR) is decreased for the encrypted image than the state of art, structural similarity index (SSIM) closer to zero. The execution time of the algorithm is decreased for an average of 20%. The proposed system is focusing on preventing the brute force attack occurred during the surgical telepresence data transmission. The paper proposes a framework that enhances the security related to data transmission during surgeries with acceptable performance.
In this paper, we present an analysis and synthesis approach for guaranteeing that the phase of a single-input, single-output closed-loop transfer function is contained in the interval [−α,α] for a given α>0 at all frequencies. Specifically, we first derive a sufficient condition involving a frequency domain inequality for guaranteeing a given phase constraint. Next, we use the Kalman–Yakubovich–Popov theorem to derive an equivalent time domain condition. In the case where , we show that frequency and time domain sufficient conditions specialize to the positivity theorem. Furthermore, using linear matrix inequalities, we develop a controller synthesis approach for guaranteeing a phase constraint on the closed-loop transfer function. Finally, we extend this synthesis approach to address mixed gain and phase constraints on the closed-loop transfer function. 相似文献
The objective of this paper is to propose an architecture for aCAble TeleVision (CATV) network, capable of supporting two-way transmission. This evolution is necessary for the survival of the CATV industry in an era of deregulation and of the development of the B-ISDN by the telecommunications companies. A communication transactional service is then considered and performance analysis is done under realistic assumptions. 相似文献
Wireless Personal Communications - Electroencephalography (EEG) is a technique of Electrophysiology used in a wide variety of scientific studies and applications. Inadequately, many commercial... 相似文献
We describe a quasi-Monte Carlo method for the simulation of discrete time Markov chains with continuous multi-dimensional state space. The method simulates copies of the chain in parallel. At each step the copies are reordered according to their successive coordinates. We prove the convergence of the method when the number of copies increases. We illustrate the method with numerical examples where the simulation accuracy is improved by large factors compared with Monte Carlo simulation. 相似文献
Markov chains are a well-known stochastic process that provide a balance between being able to adequately model the system's behavior and being able to afford the cost of the model solution. The definition of stochastic temporal logics like continuous stochastic logic (CSL) and its variant asCSL, and of their model-checking algorithms, allows a unified approach to the verification of systems, allowing the mix of performance evaluation and probabilistic verification. In this paper we present the stochastic logic CSLTA, which is more expressive than CSL and asCSL, and in which properties can be specified using automata (more precisely, timed automata with a single clock). The extension with respect to expressiveness allows the specification of properties referring to the probability of a finite sequence of timed events. A typical example is the responsiveness property "with probability at least 0.75, a message sent at time 0 by a system A will be received before time 5 by system B and the acknowledgment will be back at A before time 7", a property that cannot be expressed in either CSL or asCSL. We also present a model-checking algorithm for CSLTA. 相似文献
In this paper we derive guaranteed gain, sector, and disk margins for nonlinear optimal and inverse optimal regulators that minimize a nonlinear-nonquadratic performance criterion involving cross-weighting terms. Specifically, sufficient conditions that guarantee gain, sector, and disk margins are given in terms of the state, control, and cross-weighting nonlinear-nonquadratic weighting functions. The proposed results provide a generalization of the “meaningful” inverse optimal nonlinear regulator stability margins as well as the classical linear-quadratic optimal regulator gain and phase margins. 相似文献