137 research outputs found

    A Petri-Net-Based Scheduling Strategy for Dual-Arm Cluster Tools With Wafer Revisiting

    Get PDF
    International audienceThere are wafer fabrication processes in cluster tools that require wafer revisiting. The adoption of a swap strategy for such tools forms a 3-wafer cyclic (3-WC) period with three wafers completed in each period. It has been shown that, by such a scheduling strategy, the minimal cycle time cannot be reached for some cases. This raises a question of whether there is a scheduling method such that the performance can be improved. To answer this question, a dual-arm cluster tool with wafer revisiting is modeled by a Petri net. Based on the model, the dynamical behavior of the process is analyzed. Then, a 2-wafer cyclic (2-WC) scheduling strategy is revealed for the first time. Cycle time analysis is conducted for the proposed strategy to evaluate its performance. It shows that, for some cases, the performance obtained by a 2-WC schedule is better than that obtained by any existing 3-WC ones. Thus, they can be used to complement each other in scheduling dual-arm cluster tools with wafer revisiting. Illustrative examples are given

    Stability analysis of interval type-2 sampled-data polynomial fuzzy-model-based control system with a switching control scheme

    Get PDF
    The stability of an interval type-2 (IT2) sampled-data (SD) polynomial fuzzy-model-based control system with a switching control scheme is studied in this paper. The uncertain nonlinear plant is depicted via an IT2 polynomial fuzzy model. To realize control, a switching IT2SD polynomial fuzzy controller is generated. This paper adopts a switching control scheme with a variable sampling period. The modeling domain consists of several sub-domains, and each sub-domain corresponds to a local IT2SD polynomial fuzzy controller. These local IT2SD polynomial fuzzy controllers form the switching IT2SD polynomial fuzzy controller. To aid in the stability analysis, this paper adopts a looped-functional-based technique. The imperfect premise matching concept is brought in to solve the mismatch dilemma caused by the SD control strategy and uncertainties. For decreasing the conservativeness, this paper takes into account the state information as well as the information of IT2 membership functions. The stability analysis is performed for each sub-domain, providing the potential for further relaxation. As polynomials exist in the stability conditions, this paper employs the sum-of-squares method for the stability investigation. The simulation outcomes confirm the efficacy of the proposed method

    Precision Measurement of M1 Optical Clock Transition in Ni12+

    Full text link
    Highly charged ions (HCIs) have drawn significant interest in quantum metrology and in search for new physics. Among these, Ni12+ is considered as one of the most promising candidates for the next generation of HCI optical clocks, due to its two E1-forbidden transitions M1 and E2, which occur in the visible spectral range. In this work, we used the Shanghai-Wuhan Electron Beam Ion Trap to perform a high-precision measurement of the M1 transition wavelength. Our approach involved an improved calibration scheme for the spectra, utilizing auxiliary Ar+ lines for calibration and correction. Our final measured result of the M1 transition wavelength demonstrates a five-fold improvement in accuracy compared to our previous findings, reaching the sub-picometer level accuracy. In combination with our rigorous atomic-structure calculations to capture the electron correlations and relativistic effects, the quantum electrodynamic (QED) corrections were extracted. Moreover, comparing with an estimate of the one-electron QED contributions by using the GRASP2018 package, we found that the present experimental accuracy is high enough for testing the higher-order QED corrections for such a complex system with four electrons in the p subshell.Comment: 15 pages, 5 figure

    The Notion of Transparency Order, Revisited

    Get PDF
    We revisit the definition of Transparency Order (TO) and that of Modified Transparency Order (MTO) as well, which were proposed to measure the resistance of an S-box against Differential Power Analysis (DPA). We spot a definitional flaw in original TO, which is proved to have significantly affected the soundness of TO and hinder it to be a good quantitative security criterion. Regretfully, the flaw itself remains virtually undiscovered in MTO, either. Surprisingly, MTO overlooks this flaw and yet it happens to incur no bad effects on the correctness of its formulation, even though the start point of this formulation is highly questionable. It is also this neglect of the flaw that made MTO take a variant of multi-bit DPA attack into consideration, which was mistakenly thought to appropriately serve as an alternative powerful attack. Based on this observation, we also find that MTO introduces such an alternative adversary that it might overestimate the resistance of an S-box in some cases, as the variant of multi-bit DPA attack considered in MTO is not that powerful as one may think. This implies the soundness of MTO is also more or less arguable. Consequently, we fix this definitional flaw, and provide a revised definition in which a powerful adversary is also involved. For demonstrating validity and soundness of our revised TO (RTO), we adopt both optimal 4Ă—44\times4 S-boxes and 8Ă—88\times8 S-boxes as study cases, and present simulated and practical DPA attacks as well on implementations of those S-boxes. The results of our attacks verify our findings and analysis as well. Furthermore, as a concrete application of the revised TO, we also present the distribution of RTO values for sixteen optimal affine equivalence classes of 4Ă—44\times4 S-boxes. Finally, we give some recommended guidelines on how to select optimal 4Ă—44\times4 S-boxes in practical implementations

    Thermal resistance effect on anomalous diffusion of molecules under confinement

    Get PDF
    Diffusion is generally faster at higher temperatures. Here, a counterintuitive behavior is observed in that the movement of long-chain molecules slows as the temperature increases under confinement. This report confirms that this anomalous diffusion is caused by the “thermal resistance effect,” in which the diffusion resistance of linear-chain molecules is equivalent to that with branched-chain configurations at high temperature. It then restrains the molecular transportation in the nanoscale channels, as further confirmed by zero length column experiments. This work enriches our understanding of the anomalous diffusion family and provides fundamental insights into the mechanism inside confined systems.This work is supported by the National NaturalScience Foundation of China (22032005, 21902180, 21802164, 21991092,21991090, 22002174 and 91645112), and the Natural Science Foundation ofHubei Province of China (2018CFA009), the Key Research Program of FrontierSciences, Chinese Academy of Sciences (QYZDB-SSW-SLH026), and SinopecCorp. (417012-4). We are grateful to the Shenzhen Cloud Computing Centerfor their support in computing facilities.Peer reviewe

    Genome and transcriptome analysis of Enterococcus faecium from intestinal colonization and Enterococcus faecium from urinary tract infection

    Get PDF
    IntroductionEnterococcus faecium is a common pathogen responsible for urinary tract infections (UTIs) and often establishes extensive colonization within the intestinal tract. Our aim was to assess the genomic and transcriptomic differences between colonized E. faecium without UTI (only-colonization) and colonized E. faecium causing UTI (endogenous infections).MethodWe investigated the correlation between fecal isolates from the same patient and UTI-causing isolates using PFGE and WGS, and classified fecal isolates into two groups: those that solely colonized and those associated with endogenous urinary tract infections. We characterized the genomes of colonization-only and endogenously infected isolates by Scoary GWAS, and the transcriptomes of the isolates at 3 h urine exposure to assess pathogen-related changes.ResultBased on PFGE and WGS, eight isolates of endogenously infected E. faecium and nine isolates of only-colonized E. faecium were characterized and carbon and nitrogen regulated metabolisms such as genes encoding the phosphotransferase (PTS) system were enriched in endogenously infected E. faecium. Transcriptome analysis revealed significant differences in gene expression in the PTS system, lysine synthesis, galactose metabolism and citrate import between endogenously infected and only-colonized E. faecium isolates, highlighting the important role of certain carbon regulatory genes in the colonization and survival of endogenously infected E. faecium.ConclusionIn only-colonized and endogenously infected isolates, we observed differential expression patterns of genes related to carbon metabolism and amino acids, suggesting that metabolic diversity is a strategy for isolates leading to endogenous infection

    Identification of loci affecting teat number by genome-wide association studies on three pig populations

    Get PDF
    Objective Three genome-wide association studies (GWAS) and a meta-analysis of GWAS were conducted to explore the genetic mechanisms underlying variation in pig teat number. Methods We performed three GWAS and a meta-analysis for teat number on three pig populations, including a White DurocĂ—Erhualian F2 resource population (n = 1,743), a Chinese Erhualian pig population (n = 320) and a Chinese Sutai pig population (n = 383). Results We detected 24 single nucleotide polymorphisms (SNPs) that surpassed the genome-wide significant level on Sus Scrofa chromosomes (SSC) 1, 7, and 12 in the F2 resource population, corresponding to four loci for pig teat number. We highlighted vertnin (VRTN) and lysine demethylase 6B (KDM6B) as two interesting candidate genes at the loci on SSC7 and SSC12. No significant associated SNPs were identified in the meta-analysis of GWAS. Conclusion The results verified the complex genetic architecture of pig teat number. The causative variants for teat number may be different in the three population

    Whole-genome sequencing of <em>Oryza brachyantha</em> reveals mechanisms underlying <em>Oryza</em> genome evolution

    Get PDF
    The wild species of the genus Oryza contain a largely untapped reservoir of agronomically important genes for rice improvement. Here we report the 261-Mb de novo assembled genome sequence of Oryza brachyantha. Low activity of long-terminal repeat retrotransposons and massive internal deletions of ancient long-terminal repeat elements lead to the compact genome of Oryza brachyantha. We model 32,038 protein-coding genes in the Oryza brachyantha genome, of which only 70% are located in collinear positions in comparison with the rice genome. Analysing breakpoints of non-collinear genes suggests that double-strand break repair through non-homologous end joining has an important role in gene movement and erosion of collinearity in the Oryza genomes. Transition of euchromatin to heterochromatin in the rice genome is accompanied by segmental and tandem duplications, further expanded by transposable element insertions. The high-quality reference genome sequence of Oryza brachyantha provides an important resource for functional and evolutionary studies in the genus Oryza
    • …
    corecore