- Advancements in Semiconductor Devices and Circuit Design
- Semiconductor materials and devices
- Complex Network Analysis Techniques
- Network Security and Intrusion Detection
- Military Strategy and Technology
- Advanced Memory and Neural Computing
- Opinion Dynamics and Social Influence
- Industrial Technology and Control Systems
- Advanced Sensor and Control Systems
- Cloud Data Security Solutions
- Advanced Algorithms and Applications
- Cryptography and Data Security
- Music and Audio Processing
- Silicon Carbide Semiconductor Technologies
- Anomaly Detection Techniques and Applications
- Speech and Audio Processing
- Access Control and Trust
- Military Defense Systems Analysis
- Embedded Systems and FPGA Design
- Video Analysis and Summarization
- Smart Cities and Technologies
- VLSI and FPGA Design Techniques
- Cognitive Science and Education Research
- Face recognition and analysis
- Ferroelectric and Negative Capacitance Devices
National University of Defense Technology
2020-2024
Tsinghua University
2020
Institute of Microelectronics
2020
Shaanxi Normal University
2018
Harbin Institute of Technology
2013-2015
Xidian University
2010-2014
University of Science and Technology Beijing
2011-2014
Xi'an Jiaotong University
2011-2012
Liverpool John Moores University
2009-2011
Konkuk University
2008
SiO <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sub> /high-¿ dielectric stacks will soon replace the conventional -based in flash memory cells, as thickness of is approaching its fundamental limit. The electron trap density high-¿ layers orders magnitude higher than that , which may introduce excessive leakage via trap-assisted tunneling current and become limiting factor for retention cells. Understanding properties traps throughout...
A new discharge-based multipulse technique has been developed in this paper, which overcomes the shortcomings of existing techniques, such as charge pumping, injection and sensing, two-pulse C-V techniques. It captures energy signature for electron traps across high-κ materials can be a useful tool material selection during technology development. Trap distributions HfO <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sub> , AI O...
In this article, we set up a novel audio dataset named Gastrointestinal (GI) Sound Set which includes 6 kinds of body sounds Bowel sound, Speech, Snore, Cough, Groan, and Rub. We do sound event detection (SED) based on it, can accurately detect types events. First, the GI is collected by wearable auscultation devices. To ensure generalization, patients from five different hospital departments are recruited for data collection, along with group healthy subjects. refers to Google AudioSet in...
Endurance is one of the key criteria for Flash memory technologies, particularly generations beyond 30 nm with high-κ materials. It observed in this paper that electron trapping layers causes threshold-voltage window closure under dynamic program/erase cycling operations. This does not originate from generation new traps or further electrons injected gate during erasing. By utilizing a recently developed multipulse technique, it found energy distribution layer significantly changes after...
Conventional facial expression recognition methods usually deal with frontal face images via only one or several features, which are easy to loss useful information and sensitive poses, scales noise. As an interesting application of expression, this paper proposes effective smile detection method under unconstrained scenarios, employing convolution neural network learn automatically extract discriminative features from a large number human images. Specifically, our firstly converts the...
Ge is a candidate for replacing Si, especially pMOSFETs, because of its high hole mobility. For Si-pMOSFETs, negative-bias temperature instabilities (NBTI) limit their lifetime. There little information available the NBTI Ge-pMOSFETs with <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="TeX">${\rm Ge}/{\rm GeO}_{2}/{\rm Al}_{2}{\rm O}_{3}$ </tex-math></inline-formula> stack. The objective this paper to provide and...
Research on heterogeneous combat networks (HCNs) has attracted considerable interest in the military field since they can provide useful insights into provision of decision-making assistance. The characteristics high-operational-capability HCNs are not well studied, which limits ability to construct a better network. To fill this gap, an integrated methodology named genetic algorithm-based high-capability HCN analysis (GAHCA) is presented elucidate networks. In GAHCA, improved algorithm...
A compact subthreshold swing model is proposed for the short-channel fully-depleted (FD) silicon-on-insulator (SOI) metal–oxide–semiconductor field effect transistors (MOSFETs) with vertical Gaussian doping profile in this paper. Considering channel potential which influenced by non-uniform profile, derived using concept of effective conduction path (ECPE). The validity shown comparing calculated results Sentaurus technology computer-aided design (TCAD) numerical simulation data. believed to...
Download This Paper Open PDF in Browser Add to My Library Share: Permalink Using these links will ensure access this page indefinitely Copy URL DOI
The integration of Artificial Intelligence (AI) into architecture is reshaping the industry by enhancing design processes, project management, and sustainability efforts. This study provides a comprehensive analysis AI software tools, focusing on their functionalities in market, automated site analysis, building performance architectural development, additional features. Key findings reveal that while tools like Spacio.ai, Swapp, Autodesk Forma offer extensive features across various phases,...
Model parameter extraction plays an important role in bridging semiconductor manufacturing and integrated circuit design. Most commercial optimization tools have a default procedure. PSO (Particle Swarm Optimization) is global random searching algorithm with swarm intelligence, having the strong capability on nonlinear problems [1-2]. Compared Genetic Algorithm, does not require crossover mutation operations. It can be easily understood implemented, has high velocity of convergence as well....
RFID belongs to the basic input device in IOT(Internet of Things) applications. The country has attached much importance technique and application IOT, been widely used logistics, warehousing, traffic, cattle raising some other industries. thesis employs MFRC531 chip Atmel 89C518 bit microprocessors design realize a card reader which can be characterized by simple circuits, easy convenient debug. Thus, it may referred IOT technicians.
The purpose of this study is to establish a kind geological disaster monitoring system,The system proposed in paper has good scalability and unified data interface which change parameters can be changed according the different types disasters conveniently.The widely used debris flow, landslide, collapse, mine tailings other disaster.The electricity supplied by solar energy ,and it uses wireless network through GPRS remote communication. It realize automation been landslide demonstrational site.
Cloud computing is presently being paid much attention as a way of distribution and sharing out information. Similarly, latest experience illustrates, the unspecified, open environment this technology presents more or less an idealistic for augmented unauthentic communication. The issue having trust in cloud main apprehension majority industry. Presently, important contents research to evaluate behavior based computing. uncertainty nodes, services resources provide may have negative effect...
For decades the researchers were trying to provide computing as a utility, where consumer will enjoy on demand applications and resources from collection of shared resources. This dream comes true in shape cloud computing, owners data now outsource their center. It not only relieves owner extra pain local storage maintenance but it allows accessing anywhere, anytime demand. Outsourcing eliminates control physical for owner, also creates chaos among customer regarding confidentiality...
These days the environmental problem became most sensitive issue through whole world. There were lots of studies in progress for monitoring and managing data. However, it usually required expensive huge equipment, therefore, have serious restriction on this kind research. To solve we propose a solution with sensors - micro-scale system. In now day environment not much data to share but if starts could centralized If change distribute system one way. With can monitor manage real-time from...
The polyphonic sound event detection and localization (SELD) system indicates the temporal onset offset time of events to be detected tracks spatial location acoustic source. It involves two processes, (SED) estimation direction arrival (DOA). However, previous models only extract features by simply stacking convolutional layers, thus leading problems, one is that network difficult deepen expressive capability model limited, another problem they utilize highlevel features, lack a feature...
research-article Share on Security Analysis of Peer-to-Peer Network Topology Based Gephi Platform: P2P via Authors: Xue Zheng National University Defense Technology, China ChinaView Profile , Jun He Xiaojing Gao Kebin Chen Authors Info & Claims CCRIS '21: Proceedings the 2021 2nd International Conference Control, Robotics and Intelligent SystemAugust 2021Pages 176–180https://doi.org/10.1145/3483845.3483876Published:22 October 2021Publication History 0citation53DownloadsMetricsTotal...
In this paper, an algorithm concerning the primitive action affordances of learning nuclear power plant maintenance robot is presented. The generates a random matching data set through new method, which utilized for selection object operation, with rate improved by trial and error, then attempt number successful operation reduced. end, simulation conducted to verify feasibility correctness proposed algorithm.
The changes brought about by the progress of productivity will radiate to military field, and joint operations have gradually become mainstream development. Complex networks are core operations. development weapons equipment made intelligent warfare a trend, but there is relatively little research on their related characteristics such as survivability. This paper studies survivability combat based composite network model coupled with virtual links, analyzes under different attack modes. And...