6,803 research outputs found

    Constraining the general reheating phase in the α\alpha-attractor inflationary cosmology

    Get PDF
    In this paper we constrain some aspects of the general postinflationary phase in the context of superconformal α\alpha-attractor models of inflation. In particular, we provide constraints on the duration of the reheating process, NrehN_{reh}, and on the reheating temperature, TrehT_{reh}, simulating possible and future results given by the next-generation of cosmological missions. Moreover, we stress what kinds of equation-of-state parameter, wrehw_{reh}, are favored for different scenarios. The analysis does not depend on the details of the reheating phase and it is performed assuming different measurements of the tensor-to-scalar ratio rr.Comment: 8 pages, 2 figure

    Software-Based Self-Test of Set-Associative Cache Memories

    Get PDF
    Embedded microprocessor cache memories suffer from limited observability and controllability creating problems during in-system tests. This paper presents a procedure to transform traditional march tests into software-based self-test programs for set-associative cache memories with LRU replacement. Among all the different cache blocks in a microprocessor, testing instruction caches represents a major challenge due to limitations in two areas: 1) test patterns which must be composed of valid instruction opcodes and 2) test result observability: the results can only be observed through the results of executed instructions. For these reasons, the proposed methodology will concentrate on the implementation of test programs for instruction caches. The main contribution of this work lies in the possibility of applying state-of-the-art memory test algorithms to embedded cache memories without introducing any hardware or performance overheads and guaranteeing the detection of typical faults arising in nanometer CMOS technologie

    Vectorial nonparaxial propagation equation in the presence of a tensorial refractive-index perturbation

    Get PDF
    The standard scalar paraxial parabolic (FockLeontovich) propagation equation is generalized to include all-order nonparaxial corrections in the significant case of a tensorial refractive-index perturbation on a homogeneous isotropic background. In the resultant equation, each higher-order nonparaxial term (associated with diffraction in homogeneous space and scaling as the ratio between beam waist and diffraction length) possesses a counterpart (associated with the refractive-index perturbation) that allows one to preserve the vectorial nature of the problem (∇∇· E ≠ 0). The tensorial character of the refractive-index variation is shown to play a particularly relevant role whenever the tensor elements δnxz and δnyz (z is the propagation direction) are not negligible. For this case, an application to elasto-optically induced optical activity and to nonlinear propagation in the presence of the optical Kerr effect is presented

    Perfect Optical Solitons: Spatial Kerr Solitons as Exact Solutions of Maxwell's Equations

    Get PDF
    We prove that spatial Kerr solitons, usually obtained in the frame of nonlinear Schroedinger equation valid in the paraxial approximation, can be found in a generalized form as exact solutions of Maxwell's equations. In particular, they are shown to exist, both in the bright and dark version, as linearly polarized exactly integrable one-dimensional solitons, and to reduce to the standard paraxial form in the limit of small intensities. In the two-dimensional case, they are shown to exist as azimuthally polarized circularly symmetric dark solitons. Both one and two-dimensional dark solitons exhibit a characteristic signature in that their asymptotic intensity cannot exceed a threshold value in correspondence of which their width reaches a minimum subwavelength value.Comment: 19 pages, 11 figure. Submitted for publication on Josa

    Influence of parasitic capacitance variations on 65 nm and 32 nm predictive technology model SRAM core-cells

    Get PDF
    The continuous improving of CMOS technology allows the realization of digital circuits and in particular static random access memories that, compared with previous technologies, contain an impressive number of transistors. The use of new production processes introduces a set of parasitic effects that gain more and more importance with the scaling down of the technology. In particular, even small variations of parasitic capacitances in CMOS devices are expected to become an additional source of faulty behaviors in future technologies. This paper analyzes and compares the effect of parasitic capacitance variations in a SRAM memory circuit realized with 65 nm and 32 nm predictive technology model

    Reply

    Get PDF
    We performed a comprehensive literature search in the PubMed and Scopus data bases on blister-like aneurysms

    Performance analysis of a common-rail Diesel engine fuelled with different blends of waste cooking oil and gasoil

    Get PDF
    An experimental campaign was performed to study the behavior of a common-rail Diesel engine in automotive configuration when it is fuelled with blends of Diesel fuel (DF) and waste cooking oil (WCO). In particular the tested fuels are: B20 blend, composed of 20% WCO and 80% DF; B50, composed of 50% WCO and 50% DF; WCO 100% and 100% DF. In order to fuel the engine with fuel having a similar viscosity, this quantity, together with density, has been meas-ured at temperature ranging from rom to about 80 °C. According to these measurements, before fuelling the engine B20 was heated up to 35 °C and B50 to 75 °C. An in-house software was developed to acquire the data elaborated by the electronic control unit. Results show the trend in torque and global efficiency at different gas pedal position (gpp) and different engine speed. The experiments show that larger discrepancies are measured at smaller gpp values, while at larger ones dif-ferences become smaller. A similar trend is noticed for engine global efficiency

    Exploiting code mobility for dynamic binary obfuscation

    Get PDF
    Software protection aims at protecting the integrity of software applications deployed on un-trusted hosts and being subject to illegal analysis. Within an un-trusted environment a possibly malicious user has complete access to system resources and tools in order to analyze and tamper with the application code. To address this research problem, we propose a novel binary obfuscation approach based on the deployment of an incomplete application whose code arrives from a trusted network entity as a flow of mobile code blocks which are arranged in memory with a different customized memory layout. This paper presents our approach to contrast reverse engineering by defeating static and dynamic analysis, and discusses its effectivenes

    A Systematic Approach for Evaluating Satellite Communications Systems

    Get PDF
    The aerospace environment imposes straight opera- tive conditions so every electronic system usually needs to be validated for these. The same way, communica- tion systems need to be evaluated before their intro- duction in aerospace applications. In the paper we present a new methodology for the evaluation of com- munication systems in space applications. The meth- odology aims, by abstraction, at identifying all the critical aspects for the evaluation and at defining a standard and reusable framework in order to be appli- cable to any Communication Systems. The methodol- ogy has been applied for the evaluation of three Data Bus for satellite communications: 1553, 1-Wire and Profibus DP RS 485 based systems have been analyzed and evaluate

    Using ER Models for Microprocessor Functional Test Coverage Evaluation

    Get PDF
    Test coverage evaluation is one of the most critical issues in microprocessor software-based testing. Whenever the test is developed in the absence of a structural model of the microprocessor, the evaluation of the final test coverage may become a major issue. In this paper, we present a microprocessor modeling technique based on entity-relationship diagrams allowing the definition and the computation of custom coverage functions. The proposed model is very flexible and particularly effective when a structural model of the microprocessor is not availabl
    corecore