World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering最新文献
Pub Date : 2020-01-01DOI: 10.17706/ijcce.2020.9.1.46-53
A. Murtaza, Tongge Xu, S. J. H. Pirzada, Jianwei Liu
Due to various critical aspects of information security, using Perfect Forward Secrecy (PFS) in many real-world communication applications is advantageous. Satellite communication is also among those applications where communication security is vital; hence, PFS is valuable. Security protocols are widely used to exchange session keys after authentication in many applications. However, the majority of existing security protocols use cryptographic algorithms (e.g., asymmetric/symmetric encryption and hash function to ensure the security of the protocol, which results in slow processing. Also, most of them require the exchange of several messages, which result in additional delay in communication and waste of bandwidth in terms of exchange of additional data. This paper presents a new authentication and key sharing protocol, which is much simpler and lighter hence faster than other protocols and still very secure because of having security comparable to that of theoretically secure One Time Pad.
由于信息安全的各种关键方面,在许多现实世界的通信应用中使用完全前向保密(PFS)是有利的。卫星通信也是通信安全至关重要的应用之一;因此,PFS是有价值的。在许多应用程序中,安全协议被广泛用于身份验证后的会话密钥交换。然而,现有的大多数安全协议使用加密算法(如非对称/对称加密和哈希函数)来确保协议的安全性,这导致处理速度缓慢。此外,它们中的大多数都需要交换多个消息,这会导致通信的额外延迟和交换额外数据方面的带宽浪费。本文提出了一种新的认证和密钥共享协议,该协议比其他协议更简单、更轻、更快,并且由于具有与理论上安全的One Time Pad相当的安全性,因此仍然非常安全。
{"title":"A Lightweight Authentication and Key Sharing Protocol for Satellite Communication","authors":"A. Murtaza, Tongge Xu, S. J. H. Pirzada, Jianwei Liu","doi":"10.17706/ijcce.2020.9.1.46-53","DOIUrl":"https://doi.org/10.17706/ijcce.2020.9.1.46-53","url":null,"abstract":"Due to various critical aspects of information security, using Perfect Forward Secrecy (PFS) in many real-world communication applications is advantageous. Satellite communication is also among those applications where communication security is vital; hence, PFS is valuable. Security protocols are widely used to exchange session keys after authentication in many applications. However, the majority of existing security protocols use cryptographic algorithms (e.g., asymmetric/symmetric encryption and hash function to ensure the security of the protocol, which results in slow processing. Also, most of them require the exchange of several messages, which result in additional delay in communication and waste of bandwidth in terms of exchange of additional data. This paper presents a new authentication and key sharing protocol, which is much simpler and lighter hence faster than other protocols and still very secure because of having security comparable to that of theoretically secure One Time Pad.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80937846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.17706/ijcce.2020.9.2.78-86
Guowei Lei, Sunqing Su
Orthogonal frequency division multiplexing (OFDM) is regarded as a popular technique. Moreover, OFDM combined with multiple-input multiple-output systems (MIMO) has drawn many interests. However, OFDM-MIMO systems with continuous phase modulation have not been investigated extensively to date. In this paper, we propose an OFDM-MIMO system using convolution codes with continuous phase modulation (CPM). In the system, an interleaver is added between encoder and modulator. Moreover, iterative decoding and demodulation are combined together at receiver. To evaluate the performances, the comparisons between CPM and linear modulations in terms of bit error rate (BER), peak-to-average power ratio (PAPR) and power spectrum density (PSD) are given in the end.
{"title":"Evaluation of OFDM-MIMO Systems Using Convolution with CPM","authors":"Guowei Lei, Sunqing Su","doi":"10.17706/ijcce.2020.9.2.78-86","DOIUrl":"https://doi.org/10.17706/ijcce.2020.9.2.78-86","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM) is regarded as a popular technique. Moreover, OFDM combined with multiple-input multiple-output systems (MIMO) has drawn many interests. However, OFDM-MIMO systems with continuous phase modulation have not been investigated extensively to date. In this paper, we propose an OFDM-MIMO system using convolution codes with continuous phase modulation (CPM). In the system, an interleaver is added between encoder and modulator. Moreover, iterative decoding and demodulation are combined together at receiver. To evaluate the performances, the comparisons between CPM and linear modulations in terms of bit error rate (BER), peak-to-average power ratio (PAPR) and power spectrum density (PSD) are given in the end.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90434058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.17706/ijcce.2020.9.3.122-133
Inés Álvarez-Icaza, A. Molina, Rogelio Bustamante-Bello
The Smart, Sensing and Sustainable Systems paradigm, known as the “S3 concept”, aims to promote the evolution of companies and academic environments through shared and adaptable knowledge. Therefore, this advancement follows new integrated products and services systems (PSS) designed to integrate everyone, everywhere, including non-typical users, i.e. people with disabilities, indigenous communities, elders, etc. By considering this it may facilitate Product and Service Systems design methodologies so to cover the articulate and non-articulate customer needs and in addition, using a social perspective. This research proposes a design framework to consider the non-typical human input analysis, along with the knowledge-sharing models exploration as academic collaboration platforms, to help Design and engineering students in identifying the best possible way of designing inclusive Sensible, Smart and Sustainable Systems, including a Social dimension.
{"title":"Connected Platforms for the Non-typical User: Design Methodology to Observe the Outliers","authors":"Inés Álvarez-Icaza, A. Molina, Rogelio Bustamante-Bello","doi":"10.17706/ijcce.2020.9.3.122-133","DOIUrl":"https://doi.org/10.17706/ijcce.2020.9.3.122-133","url":null,"abstract":"The Smart, Sensing and Sustainable Systems paradigm, known as the “S3 concept”, aims to promote the evolution of companies and academic environments through shared and adaptable knowledge. Therefore, this advancement follows new integrated products and services systems (PSS) designed to integrate everyone, everywhere, including non-typical users, i.e. people with disabilities, indigenous communities, elders, etc. By considering this it may facilitate Product and Service Systems design methodologies so to cover the articulate and non-articulate customer needs and in addition, using a social perspective. This research proposes a design framework to consider the non-typical human input analysis, along with the knowledge-sharing models exploration as academic collaboration platforms, to help Design and engineering students in identifying the best possible way of designing inclusive Sensible, Smart and Sustainable Systems, including a Social dimension.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80523171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.17706/ijcce.2020.9.3.141-148
Aining Li, Shiwei Zhang, Z. Feng, Qiyuan Zhang
The mean is the most commonly used statistical indicator to reflect the central tendency of data distribution, in this study, the mean was reclassified according to whether the effect of extreme value was considered or not. According to the definition and specific classification of mean value, We explain in detail how to calculate the normal mean by ways of "built-in function", "pivot table chart" and "descriptive statistics", symmetry trim mean by TRIMMEAN function and asymmetrical trim mean by ways of nested function and VBA self-built function with the date of the 10 referees' scores in the kindergarten gymnastics competition of normal education department of our college. If we fully exploit the powerful statistical function of Excel, we can better meet our sports practice of statistical processing needs.
{"title":"Research on Calculation Method of Mean in Sports Statistical Data with EXCEL","authors":"Aining Li, Shiwei Zhang, Z. Feng, Qiyuan Zhang","doi":"10.17706/ijcce.2020.9.3.141-148","DOIUrl":"https://doi.org/10.17706/ijcce.2020.9.3.141-148","url":null,"abstract":"The mean is the most commonly used statistical indicator to reflect the central tendency of data distribution, in this study, the mean was reclassified according to whether the effect of extreme value was considered or not. According to the definition and specific classification of mean value, We explain in detail how to calculate the normal mean by ways of \"built-in function\", \"pivot table chart\" and \"descriptive statistics\", symmetry trim mean by TRIMMEAN function and asymmetrical trim mean by ways of nested function and VBA self-built function with the date of the 10 referees' scores in the kindergarten gymnastics competition of normal education department of our college. If we fully exploit the powerful statistical function of Excel, we can better meet our sports practice of statistical processing needs.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91066541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.17706/ijcce.2020.9.4.149-159
Sho Ooi, Akihito Mihara, Mutsuo Sano, H. Tabuchi, F. Saito, S. Umeda
In this study, we report the development of a virtual reality (VR) system that evaluates executive function based on cleaning behaviors in real-time. It is known that patients with acquired brain injuries present adverse symptoms such as attention, memory, and functional disorders, as well as aphasia. Current methods to evaluate acquired brain injuries include tests such as the behavioral assessment of the dysexecutive syndrome (BADS) and digital clinical assessment for attention (D-CAT) tests; however, these tests require special/specific toolkits, and the methods are rigorous when applied for real-time dynamic evaluation. Moreover, patients are often burdened by the need to undergo paper tests as required by the evaluation methods. In this context, we propose and verify the efficacy of a method that offers real-time dynamic evaluation of acquired brain injury based on daily-living activities such as cooking, cleaning, and shopping. In this study, we focus on executive function relating to acquired brain injury, and we propose a real-time dynamic evaluation method for executive functioning using VR, which enables the automatic evaluation of subjects’ table-cleaning behavior. Our results indicate that our system can automatically assess subjects’ table cleaning behavior based on BADS test, while affording a cleaning behavior maximum average accuracy of 75.5%.
{"title":"Executive Function Evaluation System Based on Wiping Desk Behavior in Virtual Space","authors":"Sho Ooi, Akihito Mihara, Mutsuo Sano, H. Tabuchi, F. Saito, S. Umeda","doi":"10.17706/ijcce.2020.9.4.149-159","DOIUrl":"https://doi.org/10.17706/ijcce.2020.9.4.149-159","url":null,"abstract":"In this study, we report the development of a virtual reality (VR) system that evaluates executive function based on cleaning behaviors in real-time. It is known that patients with acquired brain injuries present adverse symptoms such as attention, memory, and functional disorders, as well as aphasia. Current methods to evaluate acquired brain injuries include tests such as the behavioral assessment of the dysexecutive syndrome (BADS) and digital clinical assessment for attention (D-CAT) tests; however, these tests require special/specific toolkits, and the methods are rigorous when applied for real-time dynamic evaluation. Moreover, patients are often burdened by the need to undergo paper tests as required by the evaluation methods. In this context, we propose and verify the efficacy of a method that offers real-time dynamic evaluation of acquired brain injury based on daily-living activities such as cooking, cleaning, and shopping. In this study, we focus on executive function relating to acquired brain injury, and we propose a real-time dynamic evaluation method for executive functioning using VR, which enables the automatic evaluation of subjects’ table-cleaning behavior. Our results indicate that our system can automatically assess subjects’ table cleaning behavior based on BADS test, while affording a cleaning behavior maximum average accuracy of 75.5%.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85487993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.17706/ijcce.2020.9.2.97-104
Shi Jin, Shi-Nan Wang, Yu-Jing Wu, Yi-Nan Xu
With the maturity of intelligent and networking technology of automobiles, automobiles enhance driving pleasure by connecting to the Internet, Bluetooth and mobile phones. At the same time, it brings security problems such as security vulnerabilities and attacks from hacker, which can seriously affect the driving safety and public safety. The in-vehicle network system is no longer an independent and a secure network system. Therefore, how to ensure the safety and reliability of the in-vehicle network is one of the most serious problems to be solved in the current intelligent automobile industry. This paper uses statistical analysis method to analyze the change range of CAN bus data. And proposes a CAN bus intrusion detection method to detect tampering attacks. Based on the actual vehicle bus information and the experimental verification of the CANoe simulation platform, an intrusion detection method which can effectively detect the tampering attack of the CAN bus is proposed.
{"title":"Study of In-Vehicle CAN Bus Network Security Based on Tamper Attack Detection Method","authors":"Shi Jin, Shi-Nan Wang, Yu-Jing Wu, Yi-Nan Xu","doi":"10.17706/ijcce.2020.9.2.97-104","DOIUrl":"https://doi.org/10.17706/ijcce.2020.9.2.97-104","url":null,"abstract":"With the maturity of intelligent and networking technology of automobiles, automobiles enhance driving pleasure by connecting to the Internet, Bluetooth and mobile phones. At the same time, it brings security problems such as security vulnerabilities and attacks from hacker, which can seriously affect the driving safety and public safety. The in-vehicle network system is no longer an independent and a secure network system. Therefore, how to ensure the safety and reliability of the in-vehicle network is one of the most serious problems to be solved in the current intelligent automobile industry. This paper uses statistical analysis method to analyze the change range of CAN bus data. And proposes a CAN bus intrusion detection method to detect tampering attacks. Based on the actual vehicle bus information and the experimental verification of the CANoe simulation platform, an intrusion detection method which can effectively detect the tampering attack of the CAN bus is proposed.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83826184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.17706/ijcce.2019.8.3.129-137
Jiang Hengkun, Fang Houfei, Hou Yangqing, Wu Ke
{"title":"Antlion Optimization for Bending of Arrow Honeycomb","authors":"Jiang Hengkun, Fang Houfei, Hou Yangqing, Wu Ke","doi":"10.17706/ijcce.2019.8.3.129-137","DOIUrl":"https://doi.org/10.17706/ijcce.2019.8.3.129-137","url":null,"abstract":"","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80633276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.17706/ijcce.2020.9.3.134-140
Yucheng Qi, Yi-hu Xu
Abstract: The development of 5G New Radio (NR) is widely concerned. In order to solve the problem of working frequency band, a design scheme of frequency reconfigurable antenna module covering 3.5 GHz and 4.9 GHz frequency band is proposed in this paper. It can be applied to 3.4-3.6 GHz band and 4.8-5.0 GHz band, which can meet the application of sub 6GHz band in 5G communication. The antenna module adopts a feed port, a tune stub, and five switches which can realize frequency reconfiguration. In this paper, the analysis of the parameters of the ground plane and the length of the tune stub is given, and the discussions of the S-parameter, the simulated electrical field distributions, the radiation pattern, the voltage standing wave ratio (VSWR) and the Smith chart are also given, which proves the practicability of the proposed antenna. The size of the antenna module is suitable and the performance is excellent.
{"title":"A Novel Design of Frequency Reconfigurable Antenna for 5G Mobile Terminal Equipment","authors":"Yucheng Qi, Yi-hu Xu","doi":"10.17706/ijcce.2020.9.3.134-140","DOIUrl":"https://doi.org/10.17706/ijcce.2020.9.3.134-140","url":null,"abstract":"Abstract: The development of 5G New Radio (NR) is widely concerned. In order to solve the problem of working frequency band, a design scheme of frequency reconfigurable antenna module covering 3.5 GHz and 4.9 GHz frequency band is proposed in this paper. It can be applied to 3.4-3.6 GHz band and 4.8-5.0 GHz band, which can meet the application of sub 6GHz band in 5G communication. The antenna module adopts a feed port, a tune stub, and five switches which can realize frequency reconfiguration. In this paper, the analysis of the parameters of the ground plane and the length of the tune stub is given, and the discussions of the S-parameter, the simulated electrical field distributions, the radiation pattern, the voltage standing wave ratio (VSWR) and the Smith chart are also given, which proves the practicability of the proposed antenna. The size of the antenna module is suitable and the performance is excellent.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89217021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.17706/ijcce.2019.8.3.119-128
M. Purnomo, V. Kusumasari, R. Hasanah, H. Suyono, A. Kitagawa
A simple Left-Handed Circularly Polarized (LHCP) proximity-fed equilateral-triangular array antenna with hole is proposed in order to support the mobile-internet of satellite energy communication covering the area of Japan (beam coverage elevation, El = 38° to 58°). In this paper, single-band LHCP triangular-patch array antenna is developed for receiver on ground applications. The targeted minimum gain of the antenna is set to 5 dBic at the central elevation angle (El = 48°), in Tokyo area, for applications using data-internet transfer of around hundreds kbps. The antenna consists of three equilateral-triangular patches with a hole for reception units operating at 2.50 GHz frequency bands. The antenna is simulated using the Method of Moments (MoM) analysis. The simulation results show that the frequency characteristics and the 3-dB axial ratio coverage in the conical-cut direction of the simulated antenna satisfy the target.
{"title":"The Array Microstrip Antenna for Mobile-Internet of Satellite Energy Communication","authors":"M. Purnomo, V. Kusumasari, R. Hasanah, H. Suyono, A. Kitagawa","doi":"10.17706/ijcce.2019.8.3.119-128","DOIUrl":"https://doi.org/10.17706/ijcce.2019.8.3.119-128","url":null,"abstract":"A simple Left-Handed Circularly Polarized (LHCP) proximity-fed equilateral-triangular array antenna with hole is proposed in order to support the mobile-internet of satellite energy communication covering the area of Japan (beam coverage elevation, El = 38° to 58°). In this paper, single-band LHCP triangular-patch array antenna is developed for receiver on ground applications. The targeted minimum gain of the antenna is set to 5 dBic at the central elevation angle (El = 48°), in Tokyo area, for applications using data-internet transfer of around hundreds kbps. The antenna consists of three equilateral-triangular patches with a hole for reception units operating at 2.50 GHz frequency bands. The antenna is simulated using the Method of Moments (MoM) analysis. The simulation results show that the frequency characteristics and the 3-dB axial ratio coverage in the conical-cut direction of the simulated antenna satisfy the target.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75745845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.17706/ijcce.2019.8.3.104-118
Q. Lin, Haifeng Wu
: Interconnect reliability has been regarded as a discipline that must be seriously taken into account from the early design phase of ultra large scale integration (ULSI). A synthetic review of valuable solutions to improve interconnect reliability is proposed in this paper. At first, a comprehensive review of the interconnect failure mechanisms and micro-efforts are carried out. Four types of interconnect failure mechanisms including EM, SM, TM and TDDB are illustrated in detail. Depending on their different effects for failure, the interconnect micro-effects are classified into the positive effects including the short-length effect, self-healing effect, reservoir effect and the negative effects which involves the skin effect, joule heating, current crowding , bandwidth, coupled noise, parasitic, RC delay, crosstalk and power dissipation and so on. Secondly, a novel qualitative evaluation method based on the radar chart has been presented, which visually shows the contrast of the key performance related to the interconnect failures. These present results might provide some valuable guidance for the study of IC interconnect reliability.
{"title":"Study of the Interconnect Failure Mechanism and Micro-effort for ULSI","authors":"Q. Lin, Haifeng Wu","doi":"10.17706/ijcce.2019.8.3.104-118","DOIUrl":"https://doi.org/10.17706/ijcce.2019.8.3.104-118","url":null,"abstract":": Interconnect reliability has been regarded as a discipline that must be seriously taken into account from the early design phase of ultra large scale integration (ULSI). A synthetic review of valuable solutions to improve interconnect reliability is proposed in this paper. At first, a comprehensive review of the interconnect failure mechanisms and micro-efforts are carried out. Four types of interconnect failure mechanisms including EM, SM, TM and TDDB are illustrated in detail. Depending on their different effects for failure, the interconnect micro-effects are classified into the positive effects including the short-length effect, self-healing effect, reservoir effect and the negative effects which involves the skin effect, joule heating, current crowding , bandwidth, coupled noise, parasitic, RC delay, crosstalk and power dissipation and so on. Secondly, a novel qualitative evaluation method based on the radar chart has been presented, which visually shows the contrast of the key performance related to the interconnect failures. These present results might provide some valuable guidance for the study of IC interconnect reliability.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84570447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering