Evaluating and correcting pattern variability induced by OPC within regular array layout

Author(s):  
Christian Gardin ◽  
Raphael La Greca ◽  
Jean-Noël Pena ◽  
Laurent Depre ◽  
Elodie Sungauer
Author(s):  
Sumio Iijima ◽  
Tung Hsu

Suppose the thickness of a thin film of a crystal varies periodically like a regular array of surface steps, kinematical intensities of diffracted waves from this crystal are modulated by a shape transform,


1985 ◽  
Vol 144 (2) ◽  
pp. 365-369 ◽  
Author(s):  
SM Garn ◽  
M Lavelle ◽  
BH Smith

1987 ◽  
Vol 93 ◽  
Author(s):  
Witold P. Maszara

ABSTRACTSilicon wafers with and without protective1Ahermil oxide were implanted with oxygen at 150keV with doses 1.6 – 2.0×1018 cm−2. Transmission electron microscopy (TEM) and secondary ion mass spectroscopy (SIMS) were used to study the top silicon layer remaining above the implanted buried oxide. regular array of spheroidal voids filled with oxygen gas was observed only in the samples that were not protected by the oxide. The voids were aligned into individual columns whose crystallographic orientation with respect to the host silicon lattice matched the direction of the implantation. The origin and the kinetics of their formation are discussed.


2007 ◽  
Vol 17 (03) ◽  
pp. 953-963 ◽  
Author(s):  
XIAO-SONG YANG ◽  
YAN HUANG

In this paper we demonstrate chaos, two-tori and limit cycles in a new family of Cellular Neural Networks which is a one-dimensional regular array of four cells. The Lyapunov spectrum is calculated in a range of parameters, the bifurcation plots are presented as well. Furthermore, we confirm the nature of limit cycle, chaos and two-tori by studying Poincaré maps.


2021 ◽  
Vol 17 (1) ◽  
pp. 287-292
Author(s):  
Adriana-Meda UDROIU ◽  
Ștefan-Antonio DAN-ȘUTEU

Abstract: We introduce the term usable security to refer to security systems, models, mechanisms and applications that have as the main goal usability. Secure systems cannot exist without secure authentication methods. Thus we outline biometric authentication methods and we focus on iris recognition because is the most reliable and accurate method for human identification]. The most important advantage of iris biometric over other biometrics is that irises have enormous pattern variability meaning that the variation between individual is almost maximum and variation for any person across time or conditions is minimum. Taking into consideration this observations, this survey covers researches in this field, methods of technical implementation and the usability of this method as an authentication system on iOS environment.


Sign in / Sign up

Export Citation Format

Share Document