منابع مشابه
Techniques to Extend Canary-Based Standby Scaling for SRAMs to 45 nm and Beyond
scaling is an efficient technique to reduce SRAM leakage power during standby mode. The data retention voltage (DRV) defines the minimum that can be applied to an SRAM cell without losing data. The conventional worst-case guard-banding approach selects a fixed standby supply voltage at design time to accommodate the variability of DRV, which sacrifices potential power savings for non-worst-case...
متن کاملTesla Polarimeters
We describe a study of high-energy Compton beam polarimeters for the future ee linear collider machine TESLA. A segment of the beam delivery system has been identified, which is aligned with the ee collision axis and which has a suitable configuration for high-quality beam polarization measurements. The laser envisaged for the polarimeter is similar to an existing facility at DESY. It delivers ...
متن کاملTumour radiobiology beyond fractionation
Historically it has been shown repeatedly that single high doses of radiation do not allow a therapeutic differential between tumor and critical normal tissues but dose fractionation does. The purpose of conventional dose fractionation is to increase dose to the tumor while preserving normal tissue function. Tumors are generally irradiated with 2Gy dose per fraction delivered daily to a more or...
متن کاملSolid State Tesla Coil
Some years ago I developed an interest in Tesla coils. I was teaching a senior elective course at Kansas State University where we talked about power MOSFETs and topics related to high voltages and currents. I decided to use a Tesla coil as a class project. We would talk about design aspects, then design, build, and test a coil. The best description of the results of that plan was fiasco, or ma...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Europhysics News
سال: 1991
ISSN: 0531-7479,1432-1092
DOI: 10.1051/epn/19912208154