نتایج جستجو برای: protection device

تعداد نتایج: 847393  

2012

In this paper, a novel LVTSCR-based device for electrostatic discharge (ESD) protection of integrated circuits (ICs) is designed, fabricated and characterized. The proposed device is similar to the conventional LVTSCR but it has an embedded PMOSFET in the anode n-well to enhance the turn on speed, the clamping capability and the robustness. This is possible because the embedded PMOSFET provides...

Journal: :IJMC 2012
Chia-Hui Wei Min-Shiang Hwang Augustin Yeh-Hao Chin

In the past researches, most of the authentication protocols were designed in an effort to solve the RFID security and privacy problem regarding the encrypted communication between the database and readers, and readers and tags. Based on the proposal of mobile agent device for RFID privacy protection (MARP), some security problems have been exposed. Later on, protecting the privacy with a mobil...

2012
Yong - Seo

In this paper, a novel LVTSCR-based device for electrostatic discharge (ESD) protection of integrated circuits (ICs) is designed, fabricated and characterized. The proposed device is similar to the conventional LVTSCR but it has an embedded PMOSFET in the anode n-well to enhance the turn on speed, the clamping capability and the robustness. This is possible because the embedded PMOSFET provides...

2006
Yi-Hua Fan Cheng-Ju Wu Cheng-Chao Fan Kou-Wei Chih Lun-De Liao

High power LED converter combined with switching power supply and current adjustment device for is presented. The switching power supply provides one stabilized voltage source, and the current adjustment device controls the output currents with a desired constant current and the over-load protection. The experiment results shows the circuit can work well and pass the load test and the electroma...

2015
A. Lioy M. Nemirovsky F. Risso T. Su

The current device-centric protection model against security threats has serious limitations from the final user perspective, among the other the necessity to keep each device updated with the latest security updates and the necessity to replicate all the security polices across all devices. In our model, the protection is decoupled from the users terminals and it is provided through a Trusted ...

Journal: :IACR Cryptology ePrint Archive 2004
Alexander W. Dent Allan Tomlinson

One of the driving forces behind the development of 3G systems is the potential to deliver complex content to consumers. This is evident from the growing collaboration between broadcast and mobile network operators, and the expectation that future broadcast receivers will be able to forward content to mobile devices. One challenge in providing such a service is the requirement for content prote...

2013
Thomas D Pinkney Melanie Calvert David C Bartlett Adrian Gheorghe Val Redman George Dowswell William Hawkins Tony Mak Haney Youssef Caroline Richardson Steven Hornby Laura Magill Richard Haslop Sue Wilson Dion Morton

OBJECTIVE To determine the clinical effectiveness of wound edge protection devices in reducing surgical site infection after abdominal surgery. DESIGN Multicentre observer blinded randomised controlled trial. PARTICIPANTS Patients undergoing laparotomy at 21 UK hospitals. INTERVENTIONS Standard care or the use of a wound edge protection device during surgery. MAIN OUTCOME MEASURES Surgi...

Journal: :IOP Conference Series: Materials Science and Engineering 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید