Metodeutfordringer etter polariseringens tid

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

TID Effect in SOI Technology

In this paper, a brief overview of TID effect in SOI technology is presented. The introduction of buried oxide(BOX) adds vulnerability to TID effect in SOI transistors because of its large thickness. Also the BOX introduces special charge traps, the delocalized spin centers, which in most cases are positive. The charge buildup in BOX could increase the leakage current in front gate transistor i...

متن کامل

TiD - Documentation of TOBI Interface D

4 TiD Message 2 4.1 Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 4.2 Version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 4.3 Description . . . . . . . . . . . . . . . . . . ....

متن کامل

Vincent Etter - Master Thesis - Semantic Vector Machines

We first present our work in machine translation, during which we used aligned sentences to train a neural network to embed n-grams of different languages into an d-dimensional space, such that n-grams that are the translation of each other are close with respect to some metric. Good n-grams to n-grams translation results were achieved, but full sentences translation is still problematic. We re...

متن کامل

Etter Solutions Research Group TRECVID 2007

Etter Solutions Research Group participated in the TRECVID conference for the first time in 2007. We submitted five runs in the area of fully automatic search. Fully Automatic Search Runs

متن کامل

A Lightweight Protocol to Robust TID-Based Anti-Counterfeiting

Electronic Product Code (EPC) Radio Frequency IDentification (RFID) tags support a costeffective anti-counterfeiting mechanism through the tag-specific and globally unique Transponder ID (TID). However, with the existence of customizable tags, this countermeasure could easily be bypassed as long as the TID codes are leaked through either physically opening genuine tags or unauthorizedly breachi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Norsk medietidsskrift

سال: 2008

ISSN: 0805-9535,0804-8452

DOI: 10.18261/issn0805-9535-2008-01-06