Results 11 to 20 of about 439,988 (198)

CMB E/B decomposition of incomplete sky: a pixel space approach [PDF]

open access: yes, 2010
CMB polarization signal may be decomposed into gradient-like (E) and curl-like (B) mode. We have investigated E/B decomposition in pixel space. We find E/B mixing due to incomplete sky is localized in pixel-space, and negligible in the regions far away ...
Ade   +33 more
core   +1 more source

Ultra-Low Power, Process-Tolerant 10T (PT10T) SRAM with Improved Read/Write Ability for Internet of Things (IoT) Applications

open access: yesJournal of Low Power Electronics and Applications, 2017
In this paper, an ultra-low power (ULP) 10T static random access memory (SRAM) is presented for Internet of Things (IoT) applications, which operates at sub-threshold voltage. The proposed SRAM has the tendency to operate at low supply voltages with high
Pooran Singh, Santosh Kumar Vishvakarma
doaj   +1 more source

Compiler-Directed Parallelism Scaling Framework for Performance Constrained Energy Optimization

open access: yesIEEE Access, 2020
Evolution of semiconductor manufacturing technology leads to the rising trend of leakage current and the end of Dennard scaling. At the dark silicon era, aggressive power gating scheme with quantitative management on power-gated hardware resources is ...
Yung-Cheng Ma
doaj   +1 more source

Influence of valve leakage in unloading system on separative power of uranium enrichment

open access: yesHe jishu, 2021
BackgroundIn the process of uranium enrichment, the separation power is the key evaluation index, but the leakage of the valve will affect it.PurposeThis study aims to analyze the normal and abnormal conditions of uranium enrichment centrifugal cascade ...
YANG Zhen   +3 more
doaj   +1 more source

Ultra-Low Power High Stability 8T SRAM for Application in Object Tracking System

open access: yesIEEE Access, 2018
In this paper, an ultra-low power (ULP) 8T static random access memory (SRAM) is proposed. The proposed SRAM shows better results as compared with conventional SRAMs in terms of leakage power, write static noise margin, write-ability, read margin, and ...
Pooran Singh, Santosh Kumar Vishvakarma
doaj   +1 more source

Research on DC leakage protection of communication base station in mining area

open access: yesMeikuang Anquan, 2022
In order to solve the problem that the high-voltage DC power supply system of the communication base station of the intelligent fire protection system in the open-pit coal mine area has the risk of personal electric shock when the insulation of any ...
ZHU Yannan   +3 more
doaj   +1 more source

Study on Selective Insulation On-line Monitoring Technology for Mine Power Network [PDF]

open access: yesE3S Web of Conferences, 2023
In this paper, by studying the change rule of zero sequence voltage when single-phase leakage occurs, the detection method of insulation decline of mine cables is studied, especially the additional low-frequency signal sampling technology of power cables.
Lia Zhong-Kui, Wang Le-Jun
doaj   +1 more source

Intelligent leakage protection method of mine power grid based on equivalent conductance

open access: yesGong-kuang zidonghua, 2020
The phenomenon of harmonic wave and arc light in mine power grid is increasingly serious, and leakage fault signal distortion and probability of arc light leakage increases, resulting in serious fault signal distortion and less fundamental wave component.
WANG Qingliang   +5 more
doaj   +1 more source

Polarization retention loss in PbTiO3 ferroelectric films due to leakage currents [PDF]

open access: yes, 2007
The relationship between retention loss in single crystal PbTiO3 ferroelectric thin films and leakage currents is demonstrated by piezoresponse and conductive atomic force microscopy measurements.
A. Morelli   +5 more
core   +3 more sources

McSeVIC: A Model Checking Based Framework for Security Vulnerability Analysis of Integrated Circuits

open access: yesIEEE Access, 2018
The rising trend of globalization in the integrated circuits' design process has increased their vulnerabilities against malicious intrusions. The security vulnerability analysis using conventional design time simulations is computationally intensive and
Imran Hafeez Abbassi   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy