搜索资源列表
CIC
- CIC Filter report is there please go through it
Further Insights in TFET Operation
- This asset originates from the tunneling injection being free of the subthreshold slope limit that fundamentally blocks the MOSFET [3]. Moreover, the limit of low ION in TFETs is wearing off, as drive currents around 100 ìA/ìm have been reported rece
SUMMARY OF ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS
- This summary is based on the work of February, which is focused on reading papers about Ad hoc network and getting familiar with the domain before the research of the Master Subject “Multi-path Routing Protocol for Mobile Ad Hoc Network”. Mobile Ad h
Summary report of the future display technology
- This is the summary report about future display technology. It was created based on LG speaker
An all SiC MOSFET High Performance PV Converter Cell
- Recent studies have pointed out the benefits of using Silicon Carbide (SiC) devices in photo-voltaic power conversion. In Particular, SiC Power MOSFET technology has greatly advanced over the last years and has presently reached sufficient maturity t
Hierarchical sparse priors for regression models
- Sparse regression problems, where it is usually assumed that there are many variables and that the effects of a large subset of variables are negligible, have become increasingly important. This paper describes the construction of hierarchical pri
Functional Documents for Computer Systems
- Although software documentation standards often go into great detail about the format of documents, describing such details as paragraph numbering and section headings, they fail to give precise descr iptions of the information to be contained in the
Applying Periodic Boundary Conditions in Finite Element Analysis
- Periodic boundary conditions (PBC) are a set of boundary conditions that can be used to simulate a large system (i.e. bulk material) simply by modeling a finite Representive Volume Element (RVE). PBC has been favored among many researchers and practi
Dynamical behavior and application in Josephson Junction coupled by memristor
- With the burst of a Wanna decryptor [1] in the middle of 2017, secure communication within a network [2] has again triggered the considerable attention. Meanwhile, many feasible methods have been proposed to enhance the data security and it is also
ADMIRE (Aero-Data Model In a Research Environment)
- The simulations provided for this book are based on original code named ADMIRE (Aero-Data Model In a Research Environment). It was created by the Swedish Defence Research Agency (Svensk Försvarets forskningsinstitut, FOI). At the time of this writi