Abstract: A new relative efficiency in linear model in reference is
instructed into the linear weighted regression, and its upper and lower
bound are proposed. In the linear weighted regression model, for the
best linear unbiased estimation of mean matrix respect to the
least-squares estimation, two new relative efficiencies are given, and
their upper and lower bounds are also studied.
Abstract: In this study, the Mo-electrode thin films were deposited using two-stepped process and the high purity copper indium selenide-based powder (CuInSe2, CIS) was fabricated by using hydrothermal process by Nanowin Technology Co. Ltd. Because the CIS powder was aggregated into microscale particles, the CIS power was ground into nano-scale particles. 6 wt% CIS particles were mixed and dispersed into isopropyl alcohol (IPA). A new non-vacuum thin-film deposition process, spray coating method (SPM), was investigated to deposit the high-densified CIS absorber layers. 0.1 ml CIS solution was sprayed on the 20 mm×10 mm Mo/glass substrates and then the CuInSe2 thin films were annealed in a selenization furnace using N2 as atmosphere. The annealing temperature and time were set at 550oC and 5 min, and 0.0g~0.6g extra Se content was added in the furnace. The influences of extra Se content on the densification, crystallization, resistivity (ρ), hall mobility (μ), and carrier concentration of the CIS absorber layers were well investigated in this study.
Abstract: Molding process in IC manufacturing secures chips against the harms done by hot, moisture or other external forces. While a chip was being molded,defects like cracks, dilapidation, or voids may be embedding on the molding surface. The molding surfaces the study poises to treat and the ones on the market, though, differ in the surface where texture similar to defects is everywhere. Manual inspection usually passes over low-contrast cracks or voids; hence an automatic optical inspection system for molding surface is necessary. The proposed system is consisted of a CCD, a coaxial light, a back light as well as a motion control unit. Based on the property of statistical textures of the molding surface, a series of digital image processing and classification procedure is carried out. After training of the parameter associated with above algorithm, result of the experiment suggests that the accuracy rate is up to 93.75%, contributing to the inspection quality of IC molding surface.
Abstract: Nanotechnology is widely applied in various areas so professionals in the related fields have to know more than nano knowledge. In the study, we focus on adopting ICT-assisted PBL in college general education to foster professionals who possess multiple abilities. The research adopted a pretest and posttest quasi-experimental design. The control group received traditional instruction, and the experimental group received ICT-assisted PBL instruction. Descriptive statistics will be used to describe the means, standard deviations, and adjusted means for the tests between the two groups. Next, analysis of covariance (ANCOVA) will be used to compare the final results of the two research groups after 6 weeks of instruction. Statistics gathered in the end of the research can be used to make contrasts. Therefore, we will see how different teaching strategies can improve students’ understanding about nanotechnology and learning skills.
Abstract: By means of Sidi-Israeli’s quadrature rules, mechanical quadrature methods (MQMs) for solving the first kind boundary integral equations (BIEs) of steady state Stokes problem are presented. The convergence of numerical solutions by MQMs is proved based on Anselone’s collective compact and asymptotical compact theory, and the asymptotic expansions with the odd powers of the errors are provided, which implies that the accuracy of the approximations by MQMs possesses high accuracy order O (h3). Finally, the numerical examples show the efficiency of our methods.
Abstract: Nowadays, keyless entry systems are widely adopted
for vehicle immobilizer systems due to both advantages of security and
convenience. Keyless entry systems could overcome brute-force key
guessing attack, statistics attack and masquerade attack, however,
they can't prevent from thieves stealing behavior. In this paper, we
proposed a new architecture try to improve the existent flaws. The
integration of the keyless entry system and the fingerprint
identification technology is more suitable to implement on the
portable transponder to achieve higher security needs. We also adopt
and modify AES security protocol for life expectancy and security of
the portable transponder. In addition, the identification of a driver's
fingerprint makes the service of automatic reinstatement of a driver's
preferences become possible. Our design can satisfy not only the three
kinds of previous illegal attacks, but also the stealing situation.
Furthermore, many practical factors, such as costs, life expectancy and
performance, have been well considered in the design of portable
transponder.
Abstract: This study is concerned with pH solution detection
using 2 × 4 flexible sensor array based on a plastic polyethylene
terephthalate (PET) substrate that is coated a conductive layer and a
ruthenium dioxide (RuO2) sensitive membrane with the technologies
of screen-printing and RF sputtering. For data analysis, we also
prepared a dynamic measurement system for acquiring the response
voltage and analyzing the characteristics of the working electrodes
(WEs), such as sensitivity and linearity. In this condition, an array
measurement system was designed to acquire the original signal from
sensor array, and it is based on the method of digital signal processing
(DSP). The DSP modifies the unstable acquisition data to a direct
current (DC) output using the technique of digital filter. Hence, this
sensor array can obtain a satisfactory yield, 62.5%, through the design
measurement and analysis system in our laboratory.
Abstract: The aim of this study was to establish the feasibility of a minute incremental exercise testing protocol in young asthma children. Twenty-two children with clinically diagnosed mild to moderate asthma volunteered to participate. The maximum incremental exercise test was performed using a cycle ergometer with an electromagnetic braking. A warm-up unloaded for 2 minutes then the workload was started at 40 watts for 2 minutes, and then stepwise increments of 8 watts per 2 minutes were applied. The pedaling frequency was set at 50 rpm. Ventilation and gas exchange were measured with a breath-by-breath automatic metabolic measurement system. Results showed that this test was well tolerated by all asthmatic children. Most of the children reached the VO2 plateau and satisfied the criteria for maximal respiratory exchange ratio of ≥ 1. This Study demonstrated that this testing protocol was suitable for young asthmatic children.
Abstract: The evolutionary tree is an important topic in bioinformation. In 2006, Chen and Lindsay proposed a new method to build the mixture tree from DNA sequences. Mixture tree is a new type evolutionary tree, and it has two additional information besides the information of ordinary evolutionary tree. One of the information is time parameter, and the other is the set of mutated sites. In 2008, Lin and Juan proposed an algorithm to compute the distance between two mixture trees. Their algorithm computes the distance with only considering the time parameter between two mixture trees. In this paper, we proposes a method to measure the similarity of two mixture trees with considering the set of mutated sites and develops two algorithm to compute the distance between two mixture trees. The time complexity of these two proposed algorithms are O(n2 × max{h(T1), h(T2)}) and O(n2), respectively
Abstract: Wireless Sensor Network (WSN) comprises of sensor
nodes which are designed to sense the environment, transmit sensed
data back to the base station via multi-hop routing to reconstruct
physical phenomena. Since physical phenomena exists significant
overlaps between temporal redundancy and spatial redundancy, it is
necessary to use Redundancy Suppression Algorithms (RSA) for sensor
node to lower energy consumption by reducing the transmission
of redundancy. A conventional algorithm of RSAs is threshold-based
RSA, which sets threshold to suppress redundant data. Although
many temporal and spatial RSAs are proposed, temporal-spatial RSA
are seldom to be proposed because it is difficult to determine when
to utilize temporal or spatial RSAs. In this paper, we proposed a
novel temporal-spatial redundancy suppression algorithm, Codebookbase
Redundancy Suppression Mechanism (CRSM). CRSM adopts
vector quantization to generate a codebook, which is easily used to
implement temporal-spatial RSA. CRSM not only achieves power
saving and reliability for WSN, but also provides the predictability
of network lifetime. Simulation result shows that the network lifetime
of CRSM outperforms at least 23% of that of other RSAs.
Abstract: We integrate TiN/Ni/HfO2/Si RRAM cell with a
vertical gate-all-around (GAA) nanowire transistor to achieve
compact 4F2 footprint in a 1T1R configuration. The tip of the Si
nanowire (source of the transistor) serves as bottom electrode of the
memory cell. Fabricated devices with nanowire diameter ~ 50nm
demonstrate ultra-low current/power switching; unipolar switching
with 10μA/30μW SET and 20μA/30μW RESET and bipolar switching
with 20nA/85nW SET and 0.2nA/0.7nW RESET. Further, the
switching current is found to scale with nanowire diameter making the
architecture promising for future scaling.
Abstract: Design for cost (DFC) is a method that reduces life
cycle cost (LCC) from the angle of designers. Multiple domain
features mapping (MDFM) methodology was given in DFC. Using
MDFM, we can use design features to estimate the LCC. From the
angle of DFC, the design features of family cars were obtained, such
as all dimensions, engine power and emission volume. At the
conceptual design stage, cars- LCC were estimated using back
propagation (BP) artificial neural networks (ANN) method and
case-based reasoning (CBR). Hamming space was used to measure the
similarity among cases in CBR method. Levenberg-Marquardt (LM)
algorithm and genetic algorithm (GA) were used in ANN. The
differences of LCC estimation model between CBR and artificial
neural networks (ANN) were provided. ANN and CBR separately
each method has its shortcomings. By combining ANN and CBR
improved results accuracy was obtained. Firstly, using ANN selected
some design features that affect LCC. Then using LCC estimation
results of ANN could raise the accuracy of LCC estimation in CBR
method. Thirdly, using ANN estimate LCC errors and correct errors in
CBR-s estimation results if the accuracy is not enough accurate.
Finally, economically family cars and sport utility vehicle (SUV) was
given as LCC estimation cases using this hybrid approach combining
ANN and CBR.
Abstract: A novel and efficient approach to realize
fractional-order capacitors is investigated in this paper. Meanwhile, a
new approach which is more efficient for semiconductor
implementation of fractional-order capacitors is proposed. The
feasibility of the approach has been verified with the preliminary
measured results.
Abstract: Determining reasonable fees is the main objective of designing the cost estimation and payment systems for consultant contracts. However, project clients utilize different cost estimation and payment systems because of their varying views on the reasonableness of consultant fees. This study reviews the cost estimation and payment systems of consultant contracts for five countries, including the US (Washington State Department of Transportation), Japan (Ministry of Land, Infrastructure, Transport and Tourism), China (Engineering Design Charging Standard) and UK (Her Majesty's Treasure). Specifically, this work investigates the budgeting process, contractor selection method, contractual price negotiation process, cost review, and cost-control concept of the systems used in these countries. The main finding indicates that that project client-s view on whether the fee is high will affect the way he controls it. In the US, the fee is commonly considered to be high. As a result, stringent auditing system (low flexibility given to the consultant) is then applied. In the UK, the fee is viewed to be low by comparing it to the total life-cycle project cost. Thus, a system that has high flexibility in budgeting and cost reviewing is given to the consultant. In terms of the flexibility allowed for the consultant, the systems applied in Japan and China fall between those of the US and UK. Both the US and UK systems are helpful in determining a reasonable fee. However, in the US system, rigid auditing standards must be established and additional cost-audit manpower is required. In the UK system, sufficient historical cost data should be needed to evaluate the reasonableness of the consultant-s proposed fee
Abstract: In this research, the flow pattern influence on
performance of a micro PEMFC was investigated
experimentally. The investigation focused on the impacts of
bend angels and rib/channel dimensions of serpentine flow
channel pattern on the performance and investigated how they
improve the performance. The fuel cell employed for these
experiments was a micro single PEMFC with a membrane of
1.44 cm2 Nafion NRE-212. The results show that 60° and 120°
bend angles can provide the better performances at 20 and 40
sccm inlet flow rates comparing to that the conventional design.
Additionally, wider channel with narrower rib spacing gives
better performance. These results may be applied to develop
universal heuristics for the design of flow pattern of micro
PEMFC.
Abstract: The increasing importance of FlexRay systems in
automotive domain inspires unceasingly relative researches. One
primary issue among researches is to verify the reliability of FlexRay
systems either from protocol aspect or from system design aspect.
However, research rarely discusses the effect of network topology on
the system reliability. In this paper, we will illustrate how to model
the reliability of FlexRay systems with various network topologies by
a well-known probabilistic reasoning technology, Bayesian Network.
In this illustration, we especially investigate the effectiveness of error
containment built in star topology and fault-tolerant midpoint
synchronization algorithm adopted in FlexRay communication
protocol. Through a FlexRay steer-by-wire case study, the influence
of different topologies on the failure probability of the FlexRay steerby-
wire system is demonstrated. The notable value of this research is
to show that the Bayesian Network inference is a powerful and
feasible method for the reliability assessment of FlexRay systems.
Abstract: The dynamic model of a drill in drilling process was
proposed and investigated in this study. To assure a good drilling quality, the vibration variation on the drill tips during high speed
drilling is needed to be investigated. A pre-twisted beam is used to
simulate the drill. The moving Winkler-Type elastic foundation is used to characterize the tip boundary variation in drilling. Due to the
variation of the drill depth, a time dependent dynamic model for the drill is proposed. Results simulated from this proposed model indicate that an abrupt natural frequencies drop are experienced as the drill tip
tough the workpiece, and a severe vibration is induced. The effects of parameters, e.g. drilling speed, depth, drill size and thrust force on the
drill tip responses studied.
Abstract: Three similar negative differential resistance (NDR)
profiles with both high peak to valley current density ratio (PVCDR)
value and high peak current density (PCD) value in unity resonant
tunneling electronic circuit (RTEC) element is developed in this paper.
The PCD values and valley current density (VCD) values of the three
NDR curves are all about 3.5 A and 0.8 A, respectively. All PV values
of NDR curves are 0.40 V, 0.82 V, and 1.35 V, respectively. The VV
values are 0.61 V, 1.07 V, and 1.69 V, respectively. All PVCDR
values reach about 4.4 in three NDR curves. The PCD value of 3.5 A
in triple PVCDR RTEC element is better than other resonant
tunneling devices (RTD) elements. The high PVCDR value is
concluded the lower VCD value about 0.8 A. The low VCD value is
achieved by suitable selection of resistors in triple PVCDR RTEC
element. The low PV value less than 1.35 V possesses low power
dispersion in triple PVCDR RTEC element. The designed multiple
value logical level (MVLL) system using triple PVCDR RTEC
element provides equidistant logical level. The logical levels of
MVLL system are about 0.2 V, 0.8 V, 1.5 V, and 2.2 V from low
voltage to high voltage and then 2.2 V, 1.3 V, 0.8 V, and 0.2 V from
high voltage back to low voltage in half cycle of sinusoid wave. The
output level of four levels MVLL system is represented in 0.3 V, 1.1 V,
1.7 V, and 2.6 V, which satisfies the NMP condition of traditional
two-bit system. The remarkable logical characteristic of improved
MVLL system with paralleled capacitor are with four significant
stable logical levels about 220 mV, 223 mV, 228 mV, and 230 mV.
The stability and articulation of logical levels of improved MVLL
system are outstanding. The average holding time of improved MVLL
system is approximately 0.14 μs. The holding time of improved
MVLL system is fourfold than of basic MVLL system. The function of
additional capacitor in the improved MVLL system is successfully
discovered.
Abstract: Micro power sources are required to be used in autonomous microelectromechanical system (MEMS). In this paper,
we designed and fabricated a three dimensional (3D) MEMS supercapacitor, which is consisting of conformal silicon
dioxide/titanium/polypyrrole (PPy) layers on silicon substrate. At first, ''through-structure'' was fabricated on the silicon substrate by high-aspect-ratio deep reactive ion etching (DRIE) method, which enlarges the available surface area significantly. Then the SiO2/Ti/PPy layers grew sequentially on the ³through-structure´. Finally, the supercapacitor was investigated by electrochemical methods.
Abstract: In this paper we discuss on the security module for the
car appliances to prevent stealing and illegal use on other cars. We
proposed an open structure including authentication and encryption by
embed a security module in each to protect car appliances. Illegal
moving and use a car appliance with the security module without
permission will lead the appliance to useless. This paper also presents
the component identification and deal with relevant procedures. It is at
low cost to recover from destroys by the burglar. Expect this paper to
offer the new business opportunity to the automotive and technology
industry.