Well known for their good performance,thin film transistors (TFTs) with active layers which were nickel induced laterally crystallized,are fabricated by conventional process of dual gate CMOS.The influence of pre h...Well known for their good performance,thin film transistors (TFTs) with active layers which were nickel induced laterally crystallized,are fabricated by conventional process of dual gate CMOS.The influence of pre high temperature treatment of device fabrication on the performance of TFTs is also investigated.The experiment shows that the high temperature treatment affects the performance of the devices strongly.The best performance is obtained by adopting pre treatment of 1000℃.The mobility of 314cm 2/(V·s) is obtained at NMOS TFTs with pre treatment of 1000℃,which is 10% and 22% higher than that treated at 1100℃ and without pre high temperature treatment,respectively.A maximum on/off current ratio of 3×10 8 is also obtained at 1000℃.Further investigation of uniformity verifies that the result is reliable.展开更多
The basic frame and the design idea of J2EE-based Product Data Management (PDM) system are presented. This paper adopts the technology of Object-Oriented to realize the database design and builds the information model...The basic frame and the design idea of J2EE-based Product Data Management (PDM) system are presented. This paper adopts the technology of Object-Oriented to realize the database design and builds the information model of this PDM system. The integration key technology of PDM and CAD systems are discussed, the isomerous interface characteristics between CAD and PDM systems are analyzed, and finally, the integration mode of the PDM and CAD systems is given. Using these technologies, the integration of PDM and CAD systems is realized and the consistence of data in PDM and CAD systems is kept. Finally, the Product Data Management system is developed, which has been tested on development process of the hydraulic generator. The running process is stable and safety.展开更多
By introducing XOR operation and one-way function chains to group key management schemes based on the keys tree, a new group key management scheme based on the keys tree, XOR operation and one-way function chains is p...By introducing XOR operation and one-way function chains to group key management schemes based on the keys tree, a new group key management scheme based on the keys tree, XOR operation and one-way function chains is proposed. Initialization, member adding and member evicting operations are introduced. The new scheme is compared with three other group key management schemes which are based on the keys tree: SKDC, LKH, and OFF. As far as transmission, computation and storage costs are concerned, the performance of the new group key management scheme is the best. The security problem of the new scheme is analyzed. This new scheme provides backward and forward security, i.e.. newly admitted group members cannot read previous multicast messages and evicted members cannot read future multicast messages, even with collusion by many arbitrarily evicted members.展开更多
The assessment of the policy framework governing Invasive Alien Species(IAS) control is of critical importance in conservation. The undertaking of a SWOT analysis of such a framework is necessary because it enhances t...The assessment of the policy framework governing Invasive Alien Species(IAS) control is of critical importance in conservation. The undertaking of a SWOT analysis of such a framework is necessary because it enhances the efficacy of IAS control. The aim of this study is to carry out a SWOT analysis of the policy framework guiding the control of the spreading of Acacia mearnsii and other IAS in the Golden Gate Highlands National Park in South Africa,as well as the implementation of restorative measures in the park and adjacent communities in line with the recommendations of the Convention on Biodiversity. A comparative analysis of this framework and the hierarchical framework that was developed during the European Union Conference on Freshwater Invasives- Networking for Strategy in 2013 is undertaken. The results indicate the need to strengthen parkcommunity relations,upgrade existing legislation,and boost the technical capacity of South African national parks to identify,detect,monitor and predict IAS invasions,both within the parks and their surroundings. This knowledge is important for developing future policies on IAS control in South Africa.展开更多
By analyzing the problems which exist currently in the accident hidden dangers management of the coal mine, this paper proposed a new kind of management method--"simulating the market", in which an operation pattern...By analyzing the problems which exist currently in the accident hidden dangers management of the coal mine, this paper proposed a new kind of management method--"simulating the market", in which an operation pattern of simulating the market to transact hidden troubles was constructed. This method introduces "Market Mechanism" into safe management, and adopts measurable value to describe the hidden dangers such as" human behavior, technique, environment, equipments etc.". It regards the hidden dangers as "the goods produced by labor" which are found out by the safety managers and the security inspectors, then sells as "commodity". By the process of disposing, counterchecking, re-selling, and redisposing. It forms a set of market-oriented closed-form management pattern of coalmine accident hidden dangers. This kind of management method changes the past traditional methods in which the wageworkers treat safety management passively, but to encourage and restrict them to participate in the check-up and improvement of the hidden dangers.展开更多
文摘Well known for their good performance,thin film transistors (TFTs) with active layers which were nickel induced laterally crystallized,are fabricated by conventional process of dual gate CMOS.The influence of pre high temperature treatment of device fabrication on the performance of TFTs is also investigated.The experiment shows that the high temperature treatment affects the performance of the devices strongly.The best performance is obtained by adopting pre treatment of 1000℃.The mobility of 314cm 2/(V·s) is obtained at NMOS TFTs with pre treatment of 1000℃,which is 10% and 22% higher than that treated at 1100℃ and without pre high temperature treatment,respectively.A maximum on/off current ratio of 3×10 8 is also obtained at 1000℃.Further investigation of uniformity verifies that the result is reliable.
基金Sponsored by Scientific Technology Development Project of Heilongjiang (Grant No.WH05A01) and Scientific Research Foundation of Harbin Institute of Technology(Grant No.HIT.MD2003.21).
文摘The basic frame and the design idea of J2EE-based Product Data Management (PDM) system are presented. This paper adopts the technology of Object-Oriented to realize the database design and builds the information model of this PDM system. The integration key technology of PDM and CAD systems are discussed, the isomerous interface characteristics between CAD and PDM systems are analyzed, and finally, the integration mode of the PDM and CAD systems is given. Using these technologies, the integration of PDM and CAD systems is realized and the consistence of data in PDM and CAD systems is kept. Finally, the Product Data Management system is developed, which has been tested on development process of the hydraulic generator. The running process is stable and safety.
文摘By introducing XOR operation and one-way function chains to group key management schemes based on the keys tree, a new group key management scheme based on the keys tree, XOR operation and one-way function chains is proposed. Initialization, member adding and member evicting operations are introduced. The new scheme is compared with three other group key management schemes which are based on the keys tree: SKDC, LKH, and OFF. As far as transmission, computation and storage costs are concerned, the performance of the new group key management scheme is the best. The security problem of the new scheme is analyzed. This new scheme provides backward and forward security, i.e.. newly admitted group members cannot read previous multicast messages and evicted members cannot read future multicast messages, even with collusion by many arbitrarily evicted members.
基金the Afromontane Research Unit (ARU) for providing financial support for this study
文摘The assessment of the policy framework governing Invasive Alien Species(IAS) control is of critical importance in conservation. The undertaking of a SWOT analysis of such a framework is necessary because it enhances the efficacy of IAS control. The aim of this study is to carry out a SWOT analysis of the policy framework guiding the control of the spreading of Acacia mearnsii and other IAS in the Golden Gate Highlands National Park in South Africa,as well as the implementation of restorative measures in the park and adjacent communities in line with the recommendations of the Convention on Biodiversity. A comparative analysis of this framework and the hierarchical framework that was developed during the European Union Conference on Freshwater Invasives- Networking for Strategy in 2013 is undertaken. The results indicate the need to strengthen parkcommunity relations,upgrade existing legislation,and boost the technical capacity of South African national parks to identify,detect,monitor and predict IAS invasions,both within the parks and their surroundings. This knowledge is important for developing future policies on IAS control in South Africa.
文摘By analyzing the problems which exist currently in the accident hidden dangers management of the coal mine, this paper proposed a new kind of management method--"simulating the market", in which an operation pattern of simulating the market to transact hidden troubles was constructed. This method introduces "Market Mechanism" into safe management, and adopts measurable value to describe the hidden dangers such as" human behavior, technique, environment, equipments etc.". It regards the hidden dangers as "the goods produced by labor" which are found out by the safety managers and the security inspectors, then sells as "commodity". By the process of disposing, counterchecking, re-selling, and redisposing. It forms a set of market-oriented closed-form management pattern of coalmine accident hidden dangers. This kind of management method changes the past traditional methods in which the wageworkers treat safety management passively, but to encourage and restrict them to participate in the check-up and improvement of the hidden dangers.