期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
COMPUTATIONAL AND EXPERI-MENTAL STUDY ON TIP LEAKAGE VORTEX OF CIRCUMFERENTIAL SKEWED BLADES 被引量:4
1
作者 LI Yang OUYANG Hua DU Zhaohui 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2007年第2期82-87,共6页
In the steady operation condition, the experiments and the numerical simulations are used to investigate the tip leakage flow fields in three low pressure axial flow fans with three kinds of circumferential skewed rot... In the steady operation condition, the experiments and the numerical simulations are used to investigate the tip leakage flow fields in three low pressure axial flow fans with three kinds of circumferential skewed rotors, including the radial rotor, the forward-skewed rotor and the back- ward-skewed rotor. The three-dimensional viscous flow fields of the fans are computed. In the experiments, the two-dimensional plane particle image velocimetry (PIV) system is used to measure the flow fields in the tip region of three different pitchwise positions of each fan. The results show that the computational results agree well with the experimental data in the flow field of the tip region of each fan. The tip leakage vortex core segments based on method of the eigenmode analysis can display clearly some characteristics of the tip leakage vortex, such as the origination position of tip leak- age vortex, the development of vortex strength, and so on. Compared with the radial rotor, the other two skewed rotors can increase the stability of the tip leakage vortex and the increment in the forward-skewed rotor is more than that in the backward-skewed one. Among the tip leakage vortices of the three rotors, the velocity of the vortex in the forward-skewed rotor is th6 highest in the circumferential direction and the lowest in the axial direction. 展开更多
关键词 Low pressure axial flow fan Tip leakage vortex Particle image velocimetry (PIV) Eigenmode analysis
下载PDF
A Standard Cell-Based Leakage Power Analysis Attack Countermeasure Using Symmetric Dual-Rail Logic
2
作者 朱念好 周玉洁 刘红明 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第2期169-172,共4页
Leakage power analysis(LPA) attacks aim at finding the secret key of a cryptographic device from measurements of its static(leakage) power. This novel power analysis attacks take advantage of the dependence of the lea... Leakage power analysis(LPA) attacks aim at finding the secret key of a cryptographic device from measurements of its static(leakage) power. This novel power analysis attacks take advantage of the dependence of the leakage power of complementary metal oxide semiconductor(CMOS) integrated circuits on the data they process. This paper proposes symmetric dual-rail logic(SDRL), a standard cell LPA attack countermeasure that theoretically resists the LPA attacks. The technique combines standard building blocks to make new compound standard cells, which are close to constant leakage power consumption. Experiment results show SDRL is a promising approach to implement an LPA-resistant crypto processor. 展开更多
关键词 correlation power analysis cryptograph differential power analysis leakage power analysis(LPA) power analysis simple power analysis
原文传递
6T SRAM cell analysis for DRV and read stability
3
作者 Ruchi S.Dasgupta 《Journal of Semiconductors》 EI CAS CSCD 2017年第2期73-79,共7页
The present paper analyzes the hold and read stability with temperature and aspect ratio variations. To reduce the power dissipation, one of the effective techniques is the supply voltage reduction. At this reduced su... The present paper analyzes the hold and read stability with temperature and aspect ratio variations. To reduce the power dissipation, one of the effective techniques is the supply voltage reduction. At this reduced supply voltage the data must be stable. So, the minimum voltage should be discovered which can also retain the data. This voltage is the data retention voltage(DRV). The DRV for 6T SRAM cell is estimated and analyzed in this paper.The sensitivity analysis is performed for the DRV variation with the variation in the temperature and aspect ratio of the pull up and pull down transistors. Cadence Virtuoso is used for DRV analysis using 45 nm GPDK technology files. After this, the read stability analysis of 6T SRAM cell in terms of SRRV(supply read retention voltage) and WRRV(wordline read retention voltage) is carried out. Read stability in terms of RSNM can be discovered by accessing the internal storage nodes. But in the case of dense SRAM arrays instead of using internal storage nodes,the stability can be discovered by using direct bit line measurements with the help of SRRV and WRRV. SRRV is used to find the minimum supply voltage for which data can be retained during a read operation. Similarly, WRRV is used to find the boosted value of wordline voltage, for which data can be retained during read operation. The SRRV and WRRV values are then analyzed for different Cell Ratios. The results of SRRV and WRRV are then compared with the reported data for the validation of the accuracy of the results. 展开更多
关键词 DRV SRRV WRRV data retention leakage reduction low power SRAM sensitivity analysis
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部