摘要 :
Helping constituents and elected officials directly- Demonstrates value of imagery and application Historical Imagery Viewer is one of the most heavily used apps for the County - Measured through web metrics
摘要 :
Helping constituents and elected officials directly- Demonstrates value of imagery and application Historical Imagery Viewer is one of the most heavily used apps for the County - Measured through web metrics
摘要 :
We investigated using high dose (5E16/cm~2) Ge beam-line ion implantation in combination with laser melt annealing as an alternative to Ge-epi by CVD to form high quality single crystal Ge-epilayer by LPE (liquid phase epitaxy) th...
展开
We investigated using high dose (5E16/cm~2) Ge beam-line ion implantation in combination with laser melt annealing as an alternative to Ge-epi by CVD to form high quality single crystal Ge-epilayer by LPE (liquid phase epitaxy) that is very uniform, thin 10-25nm and localized for high mobility Ge-channels. The implant resulted in 7nm amorphous Ge deposition by a method called dose controlled deposition (DCD). A 515nm laser was used to vary the melt depth from 9nm to 500nm based on laser anneal pulse duration and power level. Ellipsometer was used to measure the surface amorphous layer thickness while therma-wave (TW) analysis was used to monitor Ge implant damage recovery after LPE. SIMS depth profiles showed Ge surface concentration varied from 100% down to 2% based on the laser melt depth. X-TEM analysis showed the transformation of deposited amorphous Ge surface layer to single crystal Ge after laser melt and LPE. Sb implantation at two dose levels of 3E15/cm~2 and 3E13/cm~2 was used to examine laser melt annealing effects on n-type dopant activation and electron mobility in Ge. Special Hx-probe tips on the 4PP system was required to measure sheet resistance and CAOT/DHE method was used for Differential Hall Effect measurements.
收起
摘要 :
We investigated using high dose (5E16/cm~2) Ge beam-line ion implantation in combination with laser melt annealing as an alternative to Ge-epi by CVD to form high quality single crystal Ge-epilayer by LPE (liquid phase epitaxy) th...
展开
We investigated using high dose (5E16/cm~2) Ge beam-line ion implantation in combination with laser melt annealing as an alternative to Ge-epi by CVD to form high quality single crystal Ge-epilayer by LPE (liquid phase epitaxy) that is very uniform, thin 10-25nm and localized for high mobility Ge-channels. The implant resulted in 7nm amorphous Ge deposition by a method called dose controlled deposition (DCD). A 515nm laser was used to vary the melt depth from 9nm to 500nm based on laser anneal pulse duration and power level. Ellipsometer was used to measure the surface amorphous layer thickness while therma-wave (TW) analysis was used to monitor Ge implant damage recovery after LPE. SIMS depth profiles showed Ge surface concentration varied from 100% down to 2% based on the laser melt depth. X-TEM analysis showed the transformation of deposited amorphous Ge surface layer to single crystal Ge after laser melt and LPE. Sb implantation at two dose levels of 3E15/cm~2 and 3E13/cm~2 was used to examine laser melt annealing effects on n-type dopant activation and electron mobility in Ge. Special Hx-probe tips on the 4PP system was required to measure sheet resistance and CAOT/DHE method was used for Differential Hall Effect measurements.
收起
摘要 :
With society now heavily invested in cyber-technology and most cyber-attacks due to human error, it has never been more vital to focus research on human-centric interventions. Whilst some studies have previously investigated the i...
展开
With society now heavily invested in cyber-technology and most cyber-attacks due to human error, it has never been more vital to focus research on human-centric interventions. Whilst some studies have previously investigated the importance of end-user individual differences (gender, age, education, risk-taking preferences, decision-making style, personality and impulsivity) the current study extended the research to also include acceptance of the internet and the constructs used to explain behavior within the Theory of Planned Behavior (TPB) and Protection Motivation Theory (PMT). Seventy-one participants completed a battery of questionnaires on personality, risk-taking preferences, decision-making style, personality, impulsivity, acceptance of the internet, the combined PMT and TPB questionnaire, as well as an online cyber-security behaviors questionnaire. Gender, age and education did not relate to any cyber-security behaviors, however a number of individual differences were associated. These behaviors include financial risk-taking, avoidant decision-making plus ease of use, facilitating conditions, and trust in the internet. It was also found that safer cyber-security behaviors are seen in those who appraise threat as high, perceive themselves to have the required skills to protect themselves, see value in this protection and understand their place in the cyber-security chain. These findings emphasize the importance of understanding how individual differences relate to cyber-security behaviors in order to create more tailored human-centric interventions such as computer-based decision support systems and other human-machine interface solutions.
收起
摘要 :
With society now heavily invested in cyber-technology and most cyber-attacks due to human error, it has never been more vital to focus research on human-centric interventions. Whilst some studies have previously investigated the i...
展开
With society now heavily invested in cyber-technology and most cyber-attacks due to human error, it has never been more vital to focus research on human-centric interventions. Whilst some studies have previously investigated the importance of end-user individual differences (gender, age, education, risk-taking preferences, decision-making style, personality and impulsivity) the current study extended the research to also include acceptance of the internet and the constructs used to explain behavior within the Theory of Planned Behavior (TPB) and Protection Motivation Theory (PMT). Seventy-one participants completed a battery of questionnaires on personality, risk-taking preferences, decision-making style, personality, impulsivity, acceptance of the internet, the combined PMT and TPB questionnaire, as well as an online cyber-security behaviors questionnaire. Gender, age and education did not relate to any cyber-security behaviors, however a number of individual differences were associated. These behaviors include financial risk-taking, avoidant decision-making plus ease of use, facilitating conditions, and trust in the internet. It was also found that safer cyber-security behaviors are seen in those who appraise threat as high, perceive themselves to have the required skills to protect themselves, see value in this protection and understand their place in the cyber-security chain. These findings emphasize the importance of understanding how individual differences relate to cyber-security behaviors in order to create more tailored human-centric interventions such as computer-based decision support systems and other human-machine interface solutions.
收起
摘要 :
Formal and semi-formal verification of analog/mixed-signal circuits is complicated by the difficulty of obtaining circuit models suitable for analysis. We propose a method to generate a formal model from simulation traces. The res...
展开
Formal and semi-formal verification of analog/mixed-signal circuits is complicated by the difficulty of obtaining circuit models suitable for analysis. We propose a method to generate a formal model from simulation traces. The resulting model is conservative in that it includes all of the original simulation traces used to generate it plus additional behavior. Information obtained during the model generation process can also be used to refine the simulation and verification process.
收起
摘要 :
Formal and semi-formal verification of analog/mixed-signal circuits is complicated by the difficulty of obtaining circuit models suitable for analysis. We propose a method to generate a formal model from simulation traces. The res...
展开
Formal and semi-formal verification of analog/mixed-signal circuits is complicated by the difficulty of obtaining circuit models suitable for analysis. We propose a method to generate a formal model from simulation traces. The resulting model is conservative in that it includes all of the original simulation traces used to generate it plus additional behavior. Information obtained during the model generation process can also be used to refine the simulation and verification process.
收起
摘要 :
Formal and semi-formal verification of analog/mixed-signal circuits is complicated by the difficulty of obtaining circuit models suitable for analysis. We propose a method to generate a formal model from simulation traces. The res...
展开
Formal and semi-formal verification of analog/mixed-signal circuits is complicated by the difficulty of obtaining circuit models suitable for analysis. We propose a method to generate a formal model from simulation traces. The resulting model is conservative in that it includes all of the original simulation traces used to generate it plus additional behavior. Information obtained during the model generation process can also be used to refine the simulation and verification process.
收起
摘要 :
A large number of industries including: critical national infrastructure (electricity, gas, water, etc.) and manufacturing firms rely heavily on computer systems, networks, control systems, and embedded devices in order to provide...
展开
A large number of industries including: critical national infrastructure (electricity, gas, water, etc.) and manufacturing firms rely heavily on computer systems, networks, control systems, and embedded devices in order to provide safe and reliable operations. These networks can be very complex and are often bespoke to the types of product the industries may provide. In recent years we have seen a significant rise in malicious attacks against such systems, ranging from sophisticated intelligent attacks to simple tool based delivery mechanisms. With the rise in the reliance on industrial control networks and of course the increasing attacks, the lack of security monitoring and post forensic analysis of SCADA networks is becoming increasingly apparent. SCADA systems forensics is not like standard enterprise file-system forensics, the forensic specialist often has to be an expert in such systems/networks and SCADA related devices in order to identify where potential Forensic evidence could be located. This paper looks at the SCADA/industrial control systems, typical attacks and vulnerabilities, problems with forensic analysis and the development of a forensic methodology/toolkit for such systems.
收起