Beyond 45 Tesla

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Techniques to Extend Canary-Based Standby Scaling for SRAMs to 45 nm and Beyond

scaling is an efficient technique to reduce SRAM leakage power during standby mode. The data retention voltage (DRV) defines the minimum that can be applied to an SRAM cell without losing data. The conventional worst-case guard-banding approach selects a fixed standby supply voltage at design time to accommodate the variability of DRV, which sacrifices potential power savings for non-worst-case...

متن کامل

Tesla Polarimeters

We describe a study of high-energy Compton beam polarimeters for the future ee linear collider machine TESLA. A segment of the beam delivery system has been identified, which is aligned with the ee collision axis and which has a suitable configuration for high-quality beam polarization measurements. The laser envisaged for the polarimeter is similar to an existing facility at DESY. It delivers ...

متن کامل

Tumour radiobiology beyond fractionation

Historically it has been shown repeatedly that single high doses of radiation do not allow a therapeutic differential between tumor and critical normal tissues but dose fractionation does. The purpose of conventional dose fractionation is to increase dose to the tumor while preserving normal tissue function. Tumors are generally irradiated with 2Gy dose per fraction delivered daily to a more or...

متن کامل

Solid State Tesla Coil

Some years ago I developed an interest in Tesla coils. I was teaching a senior elective course at Kansas State University where we talked about power MOSFETs and topics related to high voltages and currents. I decided to use a Tesla coil as a class project. We would talk about design aspects, then design, build, and test a coil. The best description of the results of that plan was fiasco, or ma...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Europhysics News

سال: 1991

ISSN: 0531-7479,1432-1092

DOI: 10.1051/epn/19912208154