摘要 :
In advanced CMOS technology, the NBTI (negative bias temperature instability) effect results in delay degradations of PMOS transistors. Further, because of clock gating, PMOS transistors in a clock tree often have different active...
展开
In advanced CMOS technology, the NBTI (negative bias temperature instability) effect results in delay degradations of PMOS transistors. Further, because of clock gating, PMOS transistors in a clock tree often have different active probabilities, leading to different delay degradations. If the degradation difference is not properly controlled, this clock skew may cause the circuit fails to function at some point later in time. Intuitively, the degradation difference can be eliminated, if we increase the active probability of the low-probability clock gates to ensure the clock gates at the same level always having the same active probability. However, this intuitive method may suffer from large power consumption overhead. In this article, we point out, by carefully planning the transistor-level clock signal propagation path, we can have many clock gates whose active probabilities do not affect the degradation difference. Based on that observation, we propose a critical-PMOS-aware clock tree design methodology to eliminate the degradation difference with minimum power consumption overhead. Benchmark data consistently show our approach achieves very good results in terms of both the NBTI-induced clock skew (i.e., the degradation difference) and the power consumption overhead.
收起
摘要 :
In a synchronous sequential circuit, huge current peaks are often observed at the moment of clock transition (since all registers are clocked). Previous works focus on reducing the number of switching registers. However, even thou...
展开
In a synchronous sequential circuit, huge current peaks are often observed at the moment of clock transition (since all registers are clocked). Previous works focus on reducing the number of switching registers. However, even though the switching registers are the same, different combinations of switching directions still result in different peak currents. Based on that observation, in this article, we propose an ECO (engineering change order) approach to minimize the peak current by considering the switching directions of registers. Our approach is well suitable for reducing the peak current in IC testing. Experimental data consistently show that our approach works well in practice.
收起
摘要 :
The goal of this research is to study the effect of cable vibration through a number of control cases of a cable-stayed bridge. In order to consider the complicated dynamic behaviour of the full-scale bridge, a three-dimensional n...
展开
The goal of this research is to study the effect of cable vibration through a number of control cases of a cable-stayed bridge. In order to consider the complicated dynamic behaviour of the full-scale bridge, a three-dimensional numerical model of the MATLAB-based analysis tool has been developed by the complete simulation of the Gi-Lu bridge. The dynamic characteristics of cables in the cable-stayed bridge are verified between the field experiment and the result from numerical simulation using geometrically nonlinear beam elements in MATLAB program. Three types of control devices are selected to reduce the response of the bridge deck which includes: actuators, viscous-elastic dampers with large capacity, and base isolations. Moreover, two types of control devices, MR dampers and viscous dampers, are installed either between the deck and cables and/or between two neighbouring cables for controlling the cable vibration. A modified biviscous model combined with convergent rules is used to describe the behaviour of MR dampers. Finally, through evaluation criteria the control effectiveness on the cable-stayed bridge using different control strategies is examined.
收起
摘要 :
This paper identifies the factors that determine the publics' acceptance of e-Government services. The online tax filing and payment system (OTFPS) is a well-known e-Government service in Taiwan. Using a theoretical model based on...
展开
This paper identifies the factors that determine the publics' acceptance of e-Government services. The online tax filing and payment system (OTFPS) is a well-known e-Government service in Taiwan. Using a theoretical model based on the theory of planned behavior, this study aims to (1) identify the determinants for acceptance of the OTFPS; (2) examine the causal relationships among the variables of acceptance behavior for the OTFPS; and (3) explore the relative importance of each determinant for both those who use the OTFPS and those who do not. The article reports on a survey that collected 1,099 usable responses. The results indicate that the proposed model explained up to 72 percent of the variance in behavioral intention. In addition, the important determinants of user acceptance of the OTFPS are perceived usefulness, ease of use, perceived risk, trust, compatibility, external influences, interpersonal influence, self-efficacy, and facilitating condition. Finally, the academic and practical implications of these findings are discussed.
收起
摘要 :
The purpose of this study is to explore the determinants that influence a customer's adoption of social commerce. We seek a broader understanding from a cognitive and affective perspective to explain the formation of a customer's ...
展开
The purpose of this study is to explore the determinants that influence a customer's adoption of social commerce. We seek a broader understanding from a cognitive and affective perspective to explain the formation of a customer's attitude. Based primarily on the theory of reasoned action, and supplemented by the cognitive, affective, and social influence, a sample of 446 customers of social commerce in Taiwan was tested. The findings show that perceived usefulness, communication quality, epistemic curiosity, affect-based trust, satisfaction, perceived playfulness, external influence, and interpersonal influence are critical determinants of a customer's attitude formation. The implications and recommendations for social commerce are discussed.
收起
摘要 :
Although the clock skew can be exploited as a manageable resource in the design of digital systems, it is very difficult to implement a wide spectrum of dedicated clock delays. The architecture of multiple clocking domains, which ...
展开
Although the clock skew can be exploited as a manageable resource in the design of digital systems, it is very difficult to implement a wide spectrum of dedicated clock delays. The architecture of multiple clocking domains, which restricts the clock arrival time of each register to specified clocking domains, has attracted a lot of attentions recently. However, given a target clock period and an objective function, previous multi-domain clock skew scheduling approach requires very high computational expense to obtain the corresponding optimal multi-domain clock skew schedule. In this paper, we present a general methodology, which is independent of the objective function, to speed up the process of multi-domain clock skew scheduling. Our contribution includes the following two aspects. First, we propose an approach to deriving the ASAP (as-soon-as-possible) schedule and the ALAP (as-late-as-possible) schedule of each register. Due to pruning the redundancies, the problem size can be considerably reduced without sacrificing the exactness (optimality) of the solution. Second, we propose a zone-based scheduling algorithm to solve a large circuit heuristically, in which a zone is part of registers extracted from the large circuit. Experimental data consistently show that the zone-based scheduling algorithm is a very good heuristic.
收起
摘要 :
This paper presents a semiactive control strategy for the seismic protection of the phase II smart base isolated benchmark building subjected to near-fault earthquakes. Magnetorheological (MR) fluid dampers controlled by an optima...
展开
This paper presents a semiactive control strategy for the seismic protection of the phase II smart base isolated benchmark building subjected to near-fault earthquakes. Magnetorheological (MR) fluid dampers controlled by an optimal direct output feedback control algorithm with a voltage generator are used as semiactive control devices. The benchmark building is an eight-story base isolated building, and the superstructure is considered to be a linear elastic system with lateral-torsional behavior. To reduce the energy transmitted to the structure from the ground, a combination of linear and nonlinear bearings is installed at the base of the structure. Tt is difficult to design the controller for this benchmark problem because of the nonlinear behavior of the isolation members. Linear control theory is frequently applied to nonlinear structures because there are no appropriate and well-defined control theories that can consider general types of nonlinearities. Therefore, to improve control performance, the nonlinearities of the isolation members are considered indirectly with the linear control theory during the design process of the controllers for the MR dampers. Numerical simulation results under various earthquake inputs show that the proposed control strategy is effective in reducing the responses of the isolation members as well as the superstructure. Therefore, the proposed control system could be used as an improved control strategy for base isolated buildings subjected to near-fault earthquakes.
收起
摘要 :
The coexistence of endometriosis (ES) with ovarian clear cell carcinoma (CCC) or endometrioid carcinoma (EC) suggested that malignant transformation of ES leads to endometriosis associated ovarian carcinoma (EAOC). However, there ...
展开
The coexistence of endometriosis (ES) with ovarian clear cell carcinoma (CCC) or endometrioid carcinoma (EC) suggested that malignant transformation of ES leads to endometriosis associated ovarian carcinoma (EAOC). However, there is still lack of an integrating data analysis of the accumulated experimental data to provide the evidence supporting the hypothesis of EAOC transformation. Herein we used a function-based analytic model with the publicly available microarray datasets to investigate the expression profiling between ES, CCC, and EC. We analyzed the functional regularity pattern of the three type of samples and hierarchically clustered the gene sets to identify key mechanisms regulating the malignant transformation of EAOC. We identified a list of 18 genes (NLRP3, AIM2, PYCARD, NAIP, Caspase-4, Caspase-7, Caspase-8, TLR1, TLR7, TOLLIP, NFKBIA, TNF, TNFAIP3, INFGR2, P2RX7, IL-1B, IL1RL1, IL-18) closely related to inflammasome complex, indicating an important role of inflammation/immunity in EAOC transformation. We next explore the association between these target genes and patient survival using Gene Expression Omnibus (GEO), and found significant correlation between the expression levels of the target genes and the progression-free survival. Interestingly, high expression levels of AIM2 and NLRP3, initiating proteins of inflammasomes, were significantly correlated with poor progression-free survival. Immunohistochemistry staining confirmed a correlation between high AIM2 and high Ki-67 in clinical EAOC samples, supporting its role in disease progression. Collectively, we established a bioinformatic platform of gene-set integrative molecular functionome to dissect the pathogenic pathways of EAOC, and demonstrated a key role of dysregulated inflammasome in modulating the malignant transformation of EAOC.
收起
摘要 :
This paper presents an image authentication scheme that can verify the origin of the received image and, moreover, detect if the image has been tampered with. The underlying technologies of the scheme are digital watermarking and ...
展开
This paper presents an image authentication scheme that can verify the origin of the received image and, moreover, detect if the image has been tampered with. The underlying technologies of the scheme are digital watermarking and image secret sharing. Different from other schemes that use one piece of watermark information for one purpose and a different piece for another, the watermark information used for original verification is also utilized for tamper detection. Moreover, unlike other schemes that employ a fixed strength value for embedding watermarks, the scheme automatically utilizes two different strength values, one for flat regions and the other for complex regions. The experimental results prove that using different strength values increases the robustness of the watermark with little sacrifice in image quality. The results also demonstrate the effectiveness of the scheme for the origin verification as well as the tamper detection.
收起