The mature CMOS fabrication processes are available
in many IC foundries. It is cost-effective to leverage the
existing CMOS fabrication technologies to implement
MEMS devices. On the other hand, the MEMS devices
could also add values to the IC industry as the Moore’s law
reaching its limit. The CMOS MEMS could play a key role
to bridge the gap between the CMOS and MEMS
technologies. The CMOS MEMS also offers the advantage
of monolithic integration of ICs and micro mechanical
components.
资源简介:The mature CMOS fabrication processes are available in many IC foundries. It is cost-effective to leverage the existing CMOS fabrication technologies to implement MEMS devices. On the other hand, the MEMS devices could also add values to th...
上传时间: 2020-06-06
上传用户:shancjb
资源简介:一种基于二维链表的稀疏矩阵模半板类设计 A template Class of sparse matrix. KEY TECHNOLOGY: bin,2-m linked matrix. constructors: 1.normal constuctor 2.copy constuctor. 3.assignment constructor. Basic operator: 1. addition(sub) of two matr...
上传时间: 2013-12-13
上传用户:lwwhust
资源简介:Learn how to leverage a KEY Java TECHNOLOGY used to access relational data from Java programs, in an Oracle environment. Author Donald Bales begins by teaching you the mysteries of establishing database connections, and how to issue S...
上传时间: 2017-08-02
上传用户:xz85592677
资源简介:In today’s IT environment, Java is a leading TECHNOLOGY in the world of enterprise development. As management demands more from TECHNOLOGY, complexity in infrastructure seems to grow exponentially, leaving many unable to keep up with th...
上传时间: 2013-12-24
上传用户:Zxcvbnm
资源简介:Three-dimensional real-time graphics are a prevalent TECHNOLOGY nowadays, thanks to the steady rise of processing power and specialized graphics hardware. One of the goals of computer graphics most sought after and difficult to achieve is...
上传时间: 2014-01-15
上传用户:坏天使kk
资源简介:在cdma2000移动通信系统中使用A-KEY实现空中接口部分无线接入的身份验证和加密密钥的产生。
上传时间: 2014-01-04
上传用户:cccole0605
资源简介:descript the KEY TECHNOLOGY of mmu of linux kernel
上传时间: 2016-09-07
上传用户:大三三
资源简介:Use the crypto module to encrypt sensitive data using a KEY you generated yourself... This is quite handy with INI files which you can use to get and set data for you applications. You can also check out some dates related to passwords and ...
上传时间: 2017-04-04
上传用户:yuanyuan123
资源简介:EZW coding implementation. using wavelet transforms as a KEY tool. compression and decoding is done using EZW algorithm.
上传时间: 2017-04-10
上传用户:顶得柱
资源简介:EZW coding implementation. using wavelet transforms as a KEY tool. compression and decoding is done using modified EZW algorithm.
上传时间: 2017-04-10
上传用户:wkchong
资源简介:SPIHT coding implementation. using wavelet transforms as a KEY tool. compression and decoding is done using SPIHT algorithm.
上传时间: 2014-11-26
上传用户:asdfasdfd
资源简介:This is a latest book on Evolved UMTS. Its a 4G TECHNOLOGY. Its also know as LTE.
上传时间: 2014-01-01
上传用户:thesk123
资源简介:Driver Virtual KEYboard. Allows you to create programs that need to send a KEY to bypass Win32. Suitable for games where prohibited send KEY.
上传时间: 2017-08-04
上传用户:zhenyushaw
资源简介:memcat - Copy the value of a KEY to standard output memflush - Flush the contents of your servers. memrm - Remove a KEY(s) from the server. MEMStat - Dump the stats of your servers to standard output MEMSlap - Load generation utility (b...
上传时间: 2014-11-28
上传用户:zhuimenghuadie
资源简介:MIMO-OFDM is a KEY TECHNOLOGY for next-generation cellular communications (3GPP-LTE, Mobile WiMAX, IMT-Advanced) as well as wireless LAN (IEEE 802.11a, IEEE 802.11n), wireless PAN (MB-OFDM), and broadcasting (DAB, DVB, DMB). This book provi...
上传时间: 2020-05-28
上传用户:shancjb
资源简介:This book is about multipoint cooperative communication, a KEY TECHNOLOGY to overcome the long-standing problem of limited transmission rate caused by inter- point interference. However, the multipoint cooperative communication is not an is...
上传时间: 2020-05-31
上传用户:shancjb
资源简介:The Stanford IBE library is a C implementation of the Boneh-Franklin identity-based encryption scheme. (See Boneh and Franklin, "Identity-Based Encryption from the Weil Pairing", CRYPTO 2001.) There are a few modifications and addition...
上传时间: 2013-12-20
上传用户:yan2267246
资源简介:XTHIDE is a GUI that allows the user to hide a text message in an image file. The user will be asked for a KEY that will be used to both encode and decode the text into an image. The KEY can be of length from 2 to 900 characters. The ...
上传时间: 2013-12-26
上传用户:erkuizhang
资源简介:Cognitive radio has emerged as a promising TECHNOLOGY for maximizing the utiliza- tion of the limited radio bandwidth while accommodating the increasing amount of services and applications in wireless networks. A cognitive radio (CR) transc...
上传时间: 2020-05-26
上传用户:shancjb
资源简介:Transmit power in wireless cellular networks is a KEY degree of freedom in the management of interference, energy, and connectivity. Power control in both uplink and downlink of a cellular network has been extensively studied, especially ov...
上传时间: 2020-05-31
上传用户:shancjb
资源简介:Wireless communications, together with its applications and underlying technologies, is among today’s most active areas of TECHNOLOGY development. The very rapid pace of im- provements in both custom and programmable integrated circuits fo...
上传时间: 2020-06-01
上传用户:shancjb
资源简介:Recently a new TECHNOLOGY for high voltage Power MOSFETshas been introduced – the CoolMOS™ . Based on thenew device concept of charge compensation the RDS(on) areaproduct for e.g. 600V transistors has been reduced by afactor of 5. The dev...
上传时间: 2013-11-14
上传用户:zhyiroy
资源简介:This application note describes a Linear TECHNOLOGY "Half-Flash" A/D converter, the LTC1099, being connected to a 256 element line scan photodiode array. This TECHNOLOGY adapts itself to handheld (i.e., low power) bar code readers, as well ...
上传时间: 2013-11-21
上传用户:lchjng
资源简介:Abstract: Stuxnet, a sophisticated virus that damaged Iran's nuclear capability, should be an eye openerfor the world. We can choose to learn something very narrow (how to combat the Stuxnet virus) or wecan choose to focus on the larger goa...
上传时间: 2013-11-17
上传用户:llwap
资源简介: Handheld electronic devices play a KEY role in our everydaylives. Because dependability is paramount, handhelds arecarefully engineered with lightweight power sources forreliable use under normal conditions. But no amount ofcareful eng...
上传时间: 2013-11-05
上传用户:coeus
资源简介: 针对UHF读写器设计中,在符合EPC Gen2标准的情况下,对标签返回的高速数据进行正确解码以达到正确读取标签的要求,提出了一种新的在ARM平台下采用边沿捕获统计定时器数判断数据的方法,并对FM0编码进行解码。与传统的使用定时器定时采样高低电平的FM0解...
上传时间: 2013-11-10
上传用户:liufei
资源简介: The revolution of automation on factory floors is a KEY driver for the seemingly insatiable demand for higher productivity, lower total cost of ownership,and high safety. As a result, industrial applications drive an insatiable deman...
上传时间: 2013-11-08
上传用户:yan2267246
资源简介:书名:基本商业程序的建模 Essential Business Process Modeling (Paperback) 作者: Mike Havey 出版商:O Reilly 1 edition (August 18, 2005) 内容介绍: Ten years ago, groupware bundled with email and calendar applications helped track the f...
上传时间: 2015-10-21
上传用户:zhangyigenius
资源简介:This book is designed to teach you the best practices in developing Windows DNA applications. We have avoided making this book a primer on every TECHNOLOGY associated with Windows DNA. If we had followed this course, this would be an ency...
上传时间: 2016-11-27
上传用户:yyq123456789
资源简介:RFID is an area of automatic identifi cation that is gaining momentum and is considered by some to emerge as one of the most pervasive computing technologies in history. In its simplest form, RFID is a similar concept to bar coding....
上传时间: 2017-03-19
上传用户:woshini123456