- 3D IC and TSV technologies
- Integrated Circuits and Semiconductor Failure Analysis
- Electronic Packaging and Soldering Technologies
- Semiconductor materials and devices
- Explainable Artificial Intelligence (XAI)
- Advanced Computational Techniques and Applications
- Underwater Vehicles and Communication Systems
- Advancements in Photolithography Techniques
- Anomaly Detection Techniques and Applications
- Advanced Neural Network Applications
- PAPR reduction in OFDM
- Adversarial Robustness in Machine Learning
- Electrowetting and Microfluidic Technologies
- Advanced Steganography and Watermarking Techniques
- Access Control and Trust
- Ultrasound Imaging and Elastography
- Advanced Research in Systems and Signal Processing
- Advanced Sensor and Control Systems
- Advanced Optical Network Technologies
- Network Security and Intrusion Detection
- Advanced Manufacturing and Logistics Optimization
- Evacuation and Crowd Dynamics
- Railway Systems and Energy Efficiency
- Sensor Technology and Measurement Systems
- RFID technology advancements
University of Jinan
2024
Heilongjiang University
2009-2024
Hubei Engineering University
2016-2024
Chinese Academy of Sciences
2023
Harbin Institute of Technology
2018
East China Normal University
2014
Shanghai Jian Qiao University
2011-2014
University of Waterloo
2012
Sichuan Academy Of Social Sciences
2009-2011
Ministry of Education of the People's Republic of China
2009
In this paper, we propose a novel post-bond through-silicon via (TSV) test method for TSV manufacture test. The proposed can measure the RGC parameters of TSVs using switched-capacitor circuits and calibration detect leakage fault, open high-resistance delay fault based on measured parameters. process has high resolution is robust. fault-detection effectiveness evaluated HSPICE simulations. results capacitance measurement have relative error within 1%, resistance 5%, conductance 8.5%. We...
Abstract As the intelligent railway is trend of current development, paper aims to show an overview Railway Intelligent Transportation System (RTI'S) in China. Firstly, transportation situation China given and then some basic concepts RTI'S are talked about as well. Secondly, necessity analyzed its strategic position. Then, overall architecture introduced here make a clear picture how it works. Finally, apart from key technologies RTI'S, sustainable strategies mentioned future development RTI'S.
In this paper, we present a TSV low-bandwidth equivalent lumped circuit model of common defects as analyzed using high-frequency structure simulator 3-D full wave simulation. By the proposed model, physical parameters are related to its electrical parameters, providing possibility for defect diagnosis. The simulation results show that only some tend vary TSVs. Based on these conclusions, novel TSV-defect detection and diagnosis method switched-capacitor circuits. can effectively detect...
As an integrated circuit (IC) technology develops, 3-D stacked ICs based on through-silicon-via (TSV) have attracted the attention of semiconductor industry. In ICs, TSV forms signal paths that vertically connect different ICs. The integrity largely depends quality TSV. A key challenge to commercial viability is developing a method accomplishing prebond tests. To address this problem, we propose test with easily applied Design for Testability (DfT) structures and simple fault-detection...
Wireless sensor networks (WSNs) are the major contributors to big data acquisition. The authenticity and integrity of two most important basic requirements for various services based on data. Data aggregation is a promising method decrease operation cost resource-constrained WSNs. However, process acquisitions in WSNs open environments, vulnerable more special security attacks with hiding feature subjective fraudulence, such as coalition attack. Aimed provide protection WSNs, an efficient...
This paper proposes a basic MC-CMDA. via carrier interferometry Codes (CI codes) in an Underwater Acoustic(UWA) Channel. Compared with OFDM UWAC, it can allow number of users simultaneously and asynchronously accessing the UWA channel. A trade off relation exists between diversity gain user capacity as well spread spectrum system efficiency. Then combining scheme is discussed. Both simulation initial tank experiment have proved that proposed feasible channel downlink CI/MC-CDMA system.
Abstract The opacity of deep convolutional neural network(CNN) models has hindered their performance enhancement across various domains, posing challenges in understanding internal mechanisms. To address this, computer vision developed approaches to assess CNN interpretability via visualization. However, existing techniques often encounter noise during gradient calculation and may produce rough, blurry saliency maps, leading the localization meaningless information. This paper proposes...
Due to the rapid development of chemical industry, metallurgy, petroleum and other industries, resulting in continuous increase waste gas dust emissions, these industrial dust, contains a large number suspended particles harmful chemicals, ceramic composite filter pipe has corrosion resistance, high strength temperature resistance characteristics, widely used field cleaning. Therefore, response analysis existing forming process, Solid works 3D drawing software is design structure overall...
Tracking the motion of myocardium murine heart from ultrasound image sequence aids in assessment therapies on human cardiovascular illness. In order to track myocardium, it is necessary segment both inner and outer boundaries each frame. this paper, we present a snake-based method problem contouring by exploiting features imagery mouse speckle reducing anisotropic diffusion. The proposed algorithm an adaptive snake initialization technique. A 20 images tested using approach obtained results...
With the rapid development of information-digitalized times, Electronic Paper inherited traditional paper’s reading function, is trying to change people’s habits. This paper first introduces technology and characteristics Paper, then analyzes present status as well potential applied fields.
With the popularity of Internet, web applications have become an essential part business development. At same time, network security issues increasingly prominent, enterprises feel convenience brought by network, while they are also facing a variety attacks and threats: leaks confidential, loss data, abuse, identity theft, illegal invasion. present, some established appropriate systems, but in actual use, because wrong use various tools, phenomenon system vulnerabilities, software, viruses...
The low-level spatial detail information and high-level semantic abstract are both essential to the segmentation task. features extracted by deep network can obtain rich information, while a lot of is lost. However, how recover effectively fuse it with semantics has not been well addressed so far. In this paper, we propose new architecture based on Bilateral Segmentation Network (BiseNet) called Multi-scale Covariance Feature Fusion (MCFNet). Specifically, introduces feature refinement...
During the manufacturing process of three-dimensional integrated circuits (3-D ICs), many defects may occur in through-silicon vias (TSVs). These affect integrity signal passing through TSVs, therefore detecting these early production stage is crucial. This article proposed a built-in-self-test (BIST) method with simple test structure and easily implemented fault detection process. Due to fact that TSVs influence charge/discharge speed TSVs' equivalent capacitance, weak current source...
Through looking up lots of referential documents and combining the trait modern great sport event, so to analyze some problems in events. Take advantage literature summarizing, logic reasoning, system model designing on, research transportation management air, land, water area Combining with geography science, computer information science sports this paper provides guarantee events based on GIS. It a few results: five subsystems GIS, which is spatial data subsystem, attribute inquiry...
Based on our previous work, a novel design of carrier interferometry (CI) orthogonal frequency division multiplexing (OFDM) system had been tested in real underwater acoustic channel - the experimental pool Xiamen University. Since CI/OFDM is very sensitive to phase offsets, simplified 2D estimator used reconstruct response at receiver. The performance and OFDM communication systems compared based Peak-to-average power ratio (PAPR) BER characteristics. Experiment results showed that could...
Until recent years, IOT, Smart Home and ZigBee Protocol is still in developing China area. This article introduces a Manage System which uses Microsoft Visual Studio C# language for writing code transmitting data with aids, system can satisfy the users by promoting convenience comfortability of house auto control, manage furniture detect big environment.
Digital fingerprinting is a special digital watermarking technology that can deter legal user to redistribute multimedia content others.With traitor tracing, it detect illegal users who use illegally.However, collusion attack avoid some being detected.With different fingerprinted copies, produce new colluded copy for get rid of the fingerprint information from copy, so technique should attacks.In order improve performance in future, this paper presents approach based on interpolation.The...
These years, rapid developments of Internet Things provide powerful motivation to container freight. As the current situation, Framework Container system and its basic infrastructure are all in starting stage, unanimous standard hardware support two obstructions for it. Considering that will profound influences Chinese market, authors mainly design a CPS architecture Management transplant software parts Cloud computing platform. After that, new fully take advantage reduce reliance toward...
A stochastic Von Neumann model to describe companies’ input-output process on mobile services is provided. Through the theories from economics, an extended singular service researched. The problem of stability this kind new mathematic method applied study systems without converting them into general systems. parameter uncertainties are considered. criterion for given ensure model.