Loading...
Search for: dynamic-changes
0.008 seconds

    Modeling of dynamic trap density increase for aging simulation of any MOSFET circuits

    , Article European Solid-State Device Research Conference, 11 September 2017 through 14 September 2017 ; 2017 , Pages 192-195 ; 19308876 (ISSN) ; 9781509059782 (ISBN) Miura Mattausch, M ; Miyamoto, H ; Kikuchihara, H ; Navarro, D ; Maiti, T. K ; Rohbani, N ; Ma, C ; Mattausch, H. J ; Schiffmann, A ; Steinmair, A ; Seebacher, E ; Sharif University of Technology
    Abstract
    A compact aging model for circuit simulation has been developed by considering all possible trapped carriers within MOSFETs. The hot carrier effect and the N(P)BTI effect are modeled by integrating the substrate current as well as the oxide field change due to the trapped carriers. Additionally, the carriers trapped within the highly resistive drift region are included for high-voltage (HV)-MOSFET modeling. The aging model considers the dynamic trap-density increase as a function of circuit-operation time with dynamically varying stress conditions for each individual MOSFET. A self-consistent solution is obtained by iteratively solving the Poisson equation including the trap density. The... 

    Towards a Method for The Management of Dynamic Changes in Software Product Line Based on Change Patterns

    , M.Sc. Thesis Sharif University of Technology Mazloumi, Alireza (Author) ; Habibi, Jafar (Supervisor)
    Abstract
    With the advent of software product lines as a practical approach in software engineering, research on this area has increased exponentially. In Software product lines a platform is presented onto which a product family can be created with ease. With the help of this platform each software in the product family can be produced with small modifications. Using this approach, cost and time of producing software decreases whilst at the same time increasing the overall software quality. Changes in standards, instability in business needs and variable requirements of various stakeholders will always cause evolution in a software product line. These change areas cannot always be predicted by... 

    A new hybrid approach for dynamic continuous optimization problems

    , Article Applied Soft Computing Journal ; Volume 12, Issue 3 , 2012 , Pages 1158-1167 ; 15684946 (ISSN) Karimi, J ; Nobahari, H ; Pourtakdoust, S. H ; Sharif University of Technology
    2012
    Abstract
    A new hybrid approach for dynamic optimization problems with continuous search spaces is presented. The proposed approach hybridizes efficient features of the particle swarm optimization in tracking dynamic changes with a new evolutionary procedure. In the proposed dynamic hybrid PSO (DHPSO) algorithm, the swarm size is varied in a self-regulatory manner. Inspired from the microbial life, the particles can reproduce infants and the old ones die. The infants are especially reproduced by high potential particles and located near the local optimum points, using the quadratic interpolation method. The algorithm is adapted to perform in continuous search spaces, utilizing continuous movement of... 

    Access control enforcement on outsourced data ensuring privacy of access control policies

    , Article Proceedings of the 2011 International Conference on High Performance Computing and Simulation, HPCS 2011, 4 July 2011 through 8 July 2011, Istanbul ; 2011 , Pages 491-497 ; 9781612843810 (ISBN) Tourani, P ; Hadavi, M. A ; Jalili, R ; Sharif University of Technology
    2011
    Abstract
    Nowadays, data outsourcing has become a solution for many organizations especially large scale enterprises due to the high costs of in-house management of the rapidly growing data. Among all security requirements in this context, user access control and its following dynamic changes are of interest. In this paper, we propose an efficient and reliable mechanism to solve this problem in owner-write-users-read applications. A novel solution is introduced to enforce access control on outsourced data using the Chinese Remainder Theorem. The solution allows updating policy changes at a limited cost in terms of both computational power and the number of users' secret keys. Although the server, on...