This document describes new algorithms for simulating etching in the fabrication of 3D microelectromechanical systems (MEMS) and MEMS-tunable lasers. The algorithms improve on existing 2D methods by applying boundary smoothing and remeshing after subtraction operations. They also use domain decomposition to more efficiently simulate etching of complex 3D structures by decomposing the structure into blocks. Numerical results demonstrating the algorithms' performance on realistic 3D MEMS and laser devices are presented and analyzed. The algorithms provide simple, robust simulations that significantly reduce runtimes for processing 3D MEMS and laser devices.
Modelling of next zen memory cell using low power consuming high speed nano d...eSAT Journals
Abstract Hybrid SET-CMOS circuits which syndicate the assets of both the SET [Single Electron Transistor] and CMOS depicts highest possibilities to be incorporated in practical implementation for future low power VLSI/ULSI configurations. The proposed work is an attempt based on SET-CMOS hybrid circuit to realize the next gen simple Memory Cell. The authors adhered to MIB model for SET and BSIM4 model for CMOS in realizing the complex cell. The maneuver of the proposed circuit is verified subsequently in standard environment. The outcomes are in good trade off with the conventional statistics of existing memory cell. Keywords: SET, SED, Hybrid CMOS-SET, MIB and Memory Cell
Microstructure anlaysis and enhancement of nodular cast iron using digital im...eSAT Journals
Abstract Digital image processing is the technique to process pixel variations on digital images. This paper employs the digital image processing procedure for microstructure analysis and enhancement of nodular cast iron properties inorder to determine the quality factors. This processing made to sharpen and enhance the microstructure before quantitative analysis. This analysis taken in the analog form of nodular cast iron was performed manually such that, it is time consuming for multiple set of images. To avoid this criteria probably, Digital Image Processing techniques are being used. Often the nodular cast iron images are corrupted or defected during transmission by impulse noise which is often filtered using median filters. In this paper, some of processing steps as pre-processing, segmentation, filtering process and edge detection are done on these images for effective and lossless transmission ensuring the counting of nodules in microstructure and detailed study of grain properties that correlates with the mechanical properties such as ductility, malleability and brittleness. Only 30% restoration of image applicable to an acceptable level is limited. A new filtering method – Resolution Based Median Filter (RBMF) is proposed which achieves more than 95% restoration of nodular cast iron images to an acceptable level. This method optimizes further microstructure analysis of grain smoothening and grain boundary detection using finite element simulation model by varying the intensity level of images. Keywords – Digital Image Processing, Material Microstructure, Edge Detection, Grain Boundary, Resolution Based Median Filter (RBMF).
The Technology Research of Camera Calibration Based On LabVIEWIJRES Journal
The technology of camera calibration is most important part for machine vision detection and
location, the accuracy of calibration directly determines the processing accuracy of machine vision systems. In
this paper, we use LabVIEW and MATLAB to calibrate the internal and external parameters of the camera, at
the same time, we use dot calibration board, the circle edge is detected by Canny operator, then with the method
of circle fitting based on subpixel edge extraction, the information of dots image coordinate is extracted. The
present method reduces the difficulty of camera calibration and shortens the software development cycle, the
most important is that it has a high calibration accuracy, which can meet the actual industrial detection accuracy,
the results of experimental show that the method is feasible.
Hierarchical Vertebral Body Segmentation Using Graph Cuts and Statistical Sha...IJTET Journal
Abstract— Bone Mineral Density (BMD) estimations and fracture investigation of the spine bones are retrained to the vertebral bodies (VBs).A contemporary shape and appearance based method is proposed to segment VBs in clinical Computed Tomography (CT) images without any user arbitration. The proposed approach depends on both image appearance and shape information. Shape knowledge is aggregated from a set of training shapes. Then shape variations are estimated using statistical shape model which approximates the shape variations of the vertebral bodies and its background in the variability region. To segment a VB, the graph cut method used to detect the VB region automatically. Detected contours are aligned and mean shape model is created. The spatial interaction between the neighboring pixels is identified. The statistical shape model is used to produce the deformable shape model and all instances of the shape lies with the current estimate of the mean shape.
ALGORITHMIC AND ARCHITECTURAL OPTIMIZATION OF A 3D RECONSTRUCTION MEDICAL IMA...IJCSEIT Journal
This paper presents an optimization of an FPGA circuit implementation of 3D reconstruction algorithm of
medicals images. It is based on an algorithmic specification in the shape of a Factorized and Conditioned
Data Dependences Graph (GFCDD). An automatic and optimized implementation of the algorithm of «
Marching Cubes » has been carried out. The repetitive property of the algorithm has been exploited, as
much as possible, by means of the methodology “Adequacy Algorithm Structures”.
Road network such as bridges, culverts have vital role before, during and after extreme events to reduce the vulnerability of the community being served. The bridge may be damaged due to severe accidents occurring over it. The bridge may be damaged fully or partially due to heavy and unexpected gale. The cost for the maintenance may be high enough and still no one can ensure us about safety of the bridges or any other structure in future. Whenever there is disaster, there is damage to the public property.
Tissue Segmentation Methods using 2D Hiistogram Matching in a Sequence of MR ...Vladimir Kanchev
Methodology of the suggested method for tissue segmentation in MR brain images using 2D histogram matching. Each algorithmic step is given in detail and analyzed.
Modelling of next zen memory cell using low power consuming high speed nano d...eSAT Journals
Abstract Hybrid SET-CMOS circuits which syndicate the assets of both the SET [Single Electron Transistor] and CMOS depicts highest possibilities to be incorporated in practical implementation for future low power VLSI/ULSI configurations. The proposed work is an attempt based on SET-CMOS hybrid circuit to realize the next gen simple Memory Cell. The authors adhered to MIB model for SET and BSIM4 model for CMOS in realizing the complex cell. The maneuver of the proposed circuit is verified subsequently in standard environment. The outcomes are in good trade off with the conventional statistics of existing memory cell. Keywords: SET, SED, Hybrid CMOS-SET, MIB and Memory Cell
Microstructure anlaysis and enhancement of nodular cast iron using digital im...eSAT Journals
Abstract Digital image processing is the technique to process pixel variations on digital images. This paper employs the digital image processing procedure for microstructure analysis and enhancement of nodular cast iron properties inorder to determine the quality factors. This processing made to sharpen and enhance the microstructure before quantitative analysis. This analysis taken in the analog form of nodular cast iron was performed manually such that, it is time consuming for multiple set of images. To avoid this criteria probably, Digital Image Processing techniques are being used. Often the nodular cast iron images are corrupted or defected during transmission by impulse noise which is often filtered using median filters. In this paper, some of processing steps as pre-processing, segmentation, filtering process and edge detection are done on these images for effective and lossless transmission ensuring the counting of nodules in microstructure and detailed study of grain properties that correlates with the mechanical properties such as ductility, malleability and brittleness. Only 30% restoration of image applicable to an acceptable level is limited. A new filtering method – Resolution Based Median Filter (RBMF) is proposed which achieves more than 95% restoration of nodular cast iron images to an acceptable level. This method optimizes further microstructure analysis of grain smoothening and grain boundary detection using finite element simulation model by varying the intensity level of images. Keywords – Digital Image Processing, Material Microstructure, Edge Detection, Grain Boundary, Resolution Based Median Filter (RBMF).
The Technology Research of Camera Calibration Based On LabVIEWIJRES Journal
The technology of camera calibration is most important part for machine vision detection and
location, the accuracy of calibration directly determines the processing accuracy of machine vision systems. In
this paper, we use LabVIEW and MATLAB to calibrate the internal and external parameters of the camera, at
the same time, we use dot calibration board, the circle edge is detected by Canny operator, then with the method
of circle fitting based on subpixel edge extraction, the information of dots image coordinate is extracted. The
present method reduces the difficulty of camera calibration and shortens the software development cycle, the
most important is that it has a high calibration accuracy, which can meet the actual industrial detection accuracy,
the results of experimental show that the method is feasible.
Hierarchical Vertebral Body Segmentation Using Graph Cuts and Statistical Sha...IJTET Journal
Abstract— Bone Mineral Density (BMD) estimations and fracture investigation of the spine bones are retrained to the vertebral bodies (VBs).A contemporary shape and appearance based method is proposed to segment VBs in clinical Computed Tomography (CT) images without any user arbitration. The proposed approach depends on both image appearance and shape information. Shape knowledge is aggregated from a set of training shapes. Then shape variations are estimated using statistical shape model which approximates the shape variations of the vertebral bodies and its background in the variability region. To segment a VB, the graph cut method used to detect the VB region automatically. Detected contours are aligned and mean shape model is created. The spatial interaction between the neighboring pixels is identified. The statistical shape model is used to produce the deformable shape model and all instances of the shape lies with the current estimate of the mean shape.
ALGORITHMIC AND ARCHITECTURAL OPTIMIZATION OF A 3D RECONSTRUCTION MEDICAL IMA...IJCSEIT Journal
This paper presents an optimization of an FPGA circuit implementation of 3D reconstruction algorithm of
medicals images. It is based on an algorithmic specification in the shape of a Factorized and Conditioned
Data Dependences Graph (GFCDD). An automatic and optimized implementation of the algorithm of «
Marching Cubes » has been carried out. The repetitive property of the algorithm has been exploited, as
much as possible, by means of the methodology “Adequacy Algorithm Structures”.
Road network such as bridges, culverts have vital role before, during and after extreme events to reduce the vulnerability of the community being served. The bridge may be damaged due to severe accidents occurring over it. The bridge may be damaged fully or partially due to heavy and unexpected gale. The cost for the maintenance may be high enough and still no one can ensure us about safety of the bridges or any other structure in future. Whenever there is disaster, there is damage to the public property.
Tissue Segmentation Methods using 2D Hiistogram Matching in a Sequence of MR ...Vladimir Kanchev
Methodology of the suggested method for tissue segmentation in MR brain images using 2D histogram matching. Each algorithmic step is given in detail and analyzed.
Enhancement of genetic image watermarking robust against cropping attackijfcstjournal
The enhancement of image watermarking algorithm robust against particular attack by using genetic
algorithm is presented here. There is a trade-off between imperceptibility and robustness in image
watermarking. To preserve both of these characteristics in digital image watermarking in a logical value,
the genetic algorithm is used. Some factors were introduced for providing robustness of image
watermarking against cropping attack such as the Centre of Interest Proximity Factor (CIPF), the
Complexity Factor (CF) and the Priority Coefficient (PC).
Presentation of an Algorithm for Secure Data Transmission based on Optimal Ro...IJECEIAES
This paper proposes a comprehensive algorithm for secure data transmission via communication conductors considering route optimization, shielding and data authentication. Using of appropriate coding method causes more efficiency for suggested algorithm during electromagnetic field attack occurrence. In this paper, MOM simulation via FIKO software is done for field distribution. Due to critical situation of malfunctioning of data transferring, appropriate shield is designed and examined by shielding effectiveness (SE) criterion resulted of MOM simulation; finally to achieve reliability of data security, MAC hash function is used for space with field attack probability, turbo code is employed.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
ZERNIKE MOMENT-BASED FEATURE EXTRACTION FOR FACIAL RECOGNITION OF IDENTICAL T...ijcseit
Face recognition is one of the most challenging problems in the domain of image processing and machine
vision. The face recognition system is critical when individuals have very similar biometric signature such
as identical twins. In this paper, new efficient facial-based identical twins recognition is proposed
according to geometric moment. The utilized geometric moment is Zernike Moment (ZM) as a feature
extractor inside the facial area of identical twins images. Also, the facial area in an image is detected using
AdaBoost approach. The proposed method is evaluated on two datasets, Twins Days Festival and Iranian
Twin Society which contain scaled and rotated facial images of identical twins in different illuminations.
The results prove the ability of proposed method to recognize a pair of identical twins. Also, results show
that the proposed method is robust to rotation, scaling and changing illumination.
This paper presents an improved edge detection algorithm for facial and remotely sensed images using
vector order statistics. The developed algorithm processes coloured images directly without been converted
to grey scale. A number of the existing algorithms converts the coloured images into grey scale before
detection of edges. But this process leads to inaccurate precision of recognized edges, thus producing false
and broken edges in the output edge map. Facial and remotely sensed images consist of curved edge lines
which have to be detected continuously to prevent broken edges. In order to deal with this, a collection of
pixel approach is introduced with a view to minimizing the false and broken edges that exists in the
generated output edge map of facial and remotely sensed images.
AN EFFICIENT FEATURE EXTRACTION METHOD WITH LOCAL REGION ZERNIKE MOMENT FOR F...ieijjournal
Face recognition is one of the most challenging problems in the domain of image processing and machine vision. The face recognition system is critical when individuals have very similar biometric signature such as identical twins. In this paper, the facial area in an image is detected using AdaBoost approach. After that the facial area is divided into some local regions. Finally, new efficient facial-based identical twins feature extractor based on the geometric moment is applied into local regions of face image.The utilized geometric moment is Zernike Moment (ZM) as a feature extractor inside the local regions of facial area of identical twins images. The proposed method is evaluated on two datasets, Twins Days Festival and Iranian Twin Society which contain scaled and rotated facial images of identical twins in different illuminations. The results prove the ability of proposed method to recognize a pair of identical twins.Also, results show that the proposed method is robust to rotation, scaling and changing illumination.
Flexibility Analysis In Industrial Piping Through The Finite Elements And Pho...IJERA Editor
The industry needs predictability to work on a large scale without complications, only this way you can ensure your productivity. The piping flexibility analysis provides a prediction of future problems and proposes applicable solutions, with the objective of preventing pipes to suffer collapses, that can impact the production process and costs, and provide safety to workers and the environment, while avoid leaks and possible contamination. The aim of this study is analyse the flexibility of industrial piping through the finite elements and photoelasticity methods. For stresses analysis, using a computerized body of proof, it`s possible to find, through finite elements and photoelasticity`s practical project, the values of the stresses and the places where they are being applied. To guarantee that the computerized and practical models are consistent with reality, a mathematical model, already tested and proved, will also be implemented and compared to the others, so there are evidences that all models used are really reliable and can be used in large-scale industrial projects, with complex studies. A comparison of a mathematical model through balanced guided beam, a finite elements model using the software ANSYS® and a photoelasticity of a resin pipe will show that the method with better applicability in industries is the computational, showing trustable stress, reaction and deformation values as well as a detailed visualization of them distribution along the object of study.
Advanced Algorithms for Etching Simulation of 3d Mems-Tunable Lasers ijctcm
This The integrated circuits (ICs) industry uses a number of technology computer aided design (TCAD) software tools to simulate the manufacturing and the operation of many ICs at different levels. At very low level, the simulation tools are used to simulate the device fabrication and design. These simulation tools are based on solving mathematical equations that describe the physics of dopant diffusion, silicon oxidation, etching, deposition, lithography, implantation, and metallization. The simulation of physical etching solves etching equations to calculate the etching rate. And this rate is used to move the geometry of the device. The simulation of non-physical (geometrical) etching is based on geometrical Boolean operations. In this paper, we are proposing new and advanced geometrical etching algorithms for the process simulation of three dimensional (3D) micro electro mechanical systems (MEMS) and MEMStunable vertical cavity semiconductor optical amplifiers (VCSOAs). These algorithms are based on advanced domain decomposition methods, Delaunay meshing algorithms, and surface re-meshing and smoothing techniques. These algorithms are simple, robust, and significantly reduce the overall run time of the process simulation of 3D MEMS and MEMS-tunable laser devices. The description of the proposed etching algorithms will be presented. Numerical simulation results showing the performances of these algorithms will be given and analyzed for realistic 3D MEMS and MEMS-tunable laser devices.
A novel and innovative method for designing of rf mems deviceseSAT Journals
Abstract
The design complexity of the RF MEMS devices is increasing with fast rate, which require more accurate designing and simulation techniques. With upcoming technologies accurate simulation capability is a necessity for designing smaller chips. When devices are designed at nano scale, it presents a number of unique challenges. As the scale of the individual device decreases and the complexity of the physical structure increases, the nature of the device characteristics depart from those obtained from many of the classically held modeling concepts. Furthermore, the difficulty encountered in performing measurements on these devices means we have to put more emphasis on the results obtained from theoretical characteristics. Modeling also allows new device structures to be rigorously investigated prior to fabrication. This paper reports a novel and innovative method of design and simulation of MEMS based inductor by the method of co-simulation.
Keywords: Micro Electro Mechanical System, Radio Frequency, Co-Simulation, COMSOL Multiphysics, SOLIDWORKS, Computer Aided Design, Integrated Circuit
A novel and innovative method for designing of rf mems deviceseSAT Journals
Abstract
The design complexity of the RF MEMS devices is increasing with fast rate, which require more accurate designing and simulation techniques. With upcoming technologies accurate simulation capability is a necessity for designing smaller chips. When devices are designed at nano scale, it presents a number of unique challenges. As the scale of the individual device decreases and the complexity of the physical structure increases, the nature of the device characteristics depart from those obtained from many of the classically held modeling concepts. Furthermore, the difficulty encountered in performing measurements on these devices means we have to put more emphasis on the results obtained from theoretical characteristics. Modeling also allows new device structures to be rigorously investigated prior to fabrication. This paper reports a novel and innovative method of design and simulation of MEMS based inductor by the method of co-simulation.
Keywords: Micro Electro Mechanical System, Radio Frequency, Co-Simulation, COMSOL Multiphysics, SOLIDWORKS, Computer Aided Design, Integrated Circuit
A Digital Pen with a Trajectory Recognition AlgorithmIOSR Journals
Abstract : Now a days, the development of miniaturization technologies in electronic circuits and components has seriously decreased the dimension and weight of consumer electronic products, those are smart phones and handheld computers, and thus prepared them more handy and convenient. This paper contains an accelerometer-based digital pen for handwritten digit and gesture trajectory recognition applications. The digital pen consists of a triaxial accelerometer, a microcontroller, and an Zigbee wireless transmission module for sensing and collecting accelerations of handwriting and gesture trajectories. with this project we can do human computer interaction. Users can utilize this pen to write digits or make hand gestures, and the accelerations of hand motions calculated by the accelerometer are wirelessly transmitted to a computer for online trajectory recognition. So, by varying the position of mems (micro electro mechanical systems) we can capable to show the alphabetical characters in the PC. The acceleration signals calculated from the triaxial accelerometer are transmitted to a computer via the wireless module. Keywords - ARM, Zigbee, Sensors module
Enhancement of genetic image watermarking robust against cropping attackijfcstjournal
The enhancement of image watermarking algorithm robust against particular attack by using genetic
algorithm is presented here. There is a trade-off between imperceptibility and robustness in image
watermarking. To preserve both of these characteristics in digital image watermarking in a logical value,
the genetic algorithm is used. Some factors were introduced for providing robustness of image
watermarking against cropping attack such as the Centre of Interest Proximity Factor (CIPF), the
Complexity Factor (CF) and the Priority Coefficient (PC).
Presentation of an Algorithm for Secure Data Transmission based on Optimal Ro...IJECEIAES
This paper proposes a comprehensive algorithm for secure data transmission via communication conductors considering route optimization, shielding and data authentication. Using of appropriate coding method causes more efficiency for suggested algorithm during electromagnetic field attack occurrence. In this paper, MOM simulation via FIKO software is done for field distribution. Due to critical situation of malfunctioning of data transferring, appropriate shield is designed and examined by shielding effectiveness (SE) criterion resulted of MOM simulation; finally to achieve reliability of data security, MAC hash function is used for space with field attack probability, turbo code is employed.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
ZERNIKE MOMENT-BASED FEATURE EXTRACTION FOR FACIAL RECOGNITION OF IDENTICAL T...ijcseit
Face recognition is one of the most challenging problems in the domain of image processing and machine
vision. The face recognition system is critical when individuals have very similar biometric signature such
as identical twins. In this paper, new efficient facial-based identical twins recognition is proposed
according to geometric moment. The utilized geometric moment is Zernike Moment (ZM) as a feature
extractor inside the facial area of identical twins images. Also, the facial area in an image is detected using
AdaBoost approach. The proposed method is evaluated on two datasets, Twins Days Festival and Iranian
Twin Society which contain scaled and rotated facial images of identical twins in different illuminations.
The results prove the ability of proposed method to recognize a pair of identical twins. Also, results show
that the proposed method is robust to rotation, scaling and changing illumination.
This paper presents an improved edge detection algorithm for facial and remotely sensed images using
vector order statistics. The developed algorithm processes coloured images directly without been converted
to grey scale. A number of the existing algorithms converts the coloured images into grey scale before
detection of edges. But this process leads to inaccurate precision of recognized edges, thus producing false
and broken edges in the output edge map. Facial and remotely sensed images consist of curved edge lines
which have to be detected continuously to prevent broken edges. In order to deal with this, a collection of
pixel approach is introduced with a view to minimizing the false and broken edges that exists in the
generated output edge map of facial and remotely sensed images.
AN EFFICIENT FEATURE EXTRACTION METHOD WITH LOCAL REGION ZERNIKE MOMENT FOR F...ieijjournal
Face recognition is one of the most challenging problems in the domain of image processing and machine vision. The face recognition system is critical when individuals have very similar biometric signature such as identical twins. In this paper, the facial area in an image is detected using AdaBoost approach. After that the facial area is divided into some local regions. Finally, new efficient facial-based identical twins feature extractor based on the geometric moment is applied into local regions of face image.The utilized geometric moment is Zernike Moment (ZM) as a feature extractor inside the local regions of facial area of identical twins images. The proposed method is evaluated on two datasets, Twins Days Festival and Iranian Twin Society which contain scaled and rotated facial images of identical twins in different illuminations. The results prove the ability of proposed method to recognize a pair of identical twins.Also, results show that the proposed method is robust to rotation, scaling and changing illumination.
Flexibility Analysis In Industrial Piping Through The Finite Elements And Pho...IJERA Editor
The industry needs predictability to work on a large scale without complications, only this way you can ensure your productivity. The piping flexibility analysis provides a prediction of future problems and proposes applicable solutions, with the objective of preventing pipes to suffer collapses, that can impact the production process and costs, and provide safety to workers and the environment, while avoid leaks and possible contamination. The aim of this study is analyse the flexibility of industrial piping through the finite elements and photoelasticity methods. For stresses analysis, using a computerized body of proof, it`s possible to find, through finite elements and photoelasticity`s practical project, the values of the stresses and the places where they are being applied. To guarantee that the computerized and practical models are consistent with reality, a mathematical model, already tested and proved, will also be implemented and compared to the others, so there are evidences that all models used are really reliable and can be used in large-scale industrial projects, with complex studies. A comparison of a mathematical model through balanced guided beam, a finite elements model using the software ANSYS® and a photoelasticity of a resin pipe will show that the method with better applicability in industries is the computational, showing trustable stress, reaction and deformation values as well as a detailed visualization of them distribution along the object of study.
Advanced Algorithms for Etching Simulation of 3d Mems-Tunable Lasers ijctcm
This The integrated circuits (ICs) industry uses a number of technology computer aided design (TCAD) software tools to simulate the manufacturing and the operation of many ICs at different levels. At very low level, the simulation tools are used to simulate the device fabrication and design. These simulation tools are based on solving mathematical equations that describe the physics of dopant diffusion, silicon oxidation, etching, deposition, lithography, implantation, and metallization. The simulation of physical etching solves etching equations to calculate the etching rate. And this rate is used to move the geometry of the device. The simulation of non-physical (geometrical) etching is based on geometrical Boolean operations. In this paper, we are proposing new and advanced geometrical etching algorithms for the process simulation of three dimensional (3D) micro electro mechanical systems (MEMS) and MEMStunable vertical cavity semiconductor optical amplifiers (VCSOAs). These algorithms are based on advanced domain decomposition methods, Delaunay meshing algorithms, and surface re-meshing and smoothing techniques. These algorithms are simple, robust, and significantly reduce the overall run time of the process simulation of 3D MEMS and MEMS-tunable laser devices. The description of the proposed etching algorithms will be presented. Numerical simulation results showing the performances of these algorithms will be given and analyzed for realistic 3D MEMS and MEMS-tunable laser devices.
A novel and innovative method for designing of rf mems deviceseSAT Journals
Abstract
The design complexity of the RF MEMS devices is increasing with fast rate, which require more accurate designing and simulation techniques. With upcoming technologies accurate simulation capability is a necessity for designing smaller chips. When devices are designed at nano scale, it presents a number of unique challenges. As the scale of the individual device decreases and the complexity of the physical structure increases, the nature of the device characteristics depart from those obtained from many of the classically held modeling concepts. Furthermore, the difficulty encountered in performing measurements on these devices means we have to put more emphasis on the results obtained from theoretical characteristics. Modeling also allows new device structures to be rigorously investigated prior to fabrication. This paper reports a novel and innovative method of design and simulation of MEMS based inductor by the method of co-simulation.
Keywords: Micro Electro Mechanical System, Radio Frequency, Co-Simulation, COMSOL Multiphysics, SOLIDWORKS, Computer Aided Design, Integrated Circuit
A novel and innovative method for designing of rf mems deviceseSAT Journals
Abstract
The design complexity of the RF MEMS devices is increasing with fast rate, which require more accurate designing and simulation techniques. With upcoming technologies accurate simulation capability is a necessity for designing smaller chips. When devices are designed at nano scale, it presents a number of unique challenges. As the scale of the individual device decreases and the complexity of the physical structure increases, the nature of the device characteristics depart from those obtained from many of the classically held modeling concepts. Furthermore, the difficulty encountered in performing measurements on these devices means we have to put more emphasis on the results obtained from theoretical characteristics. Modeling also allows new device structures to be rigorously investigated prior to fabrication. This paper reports a novel and innovative method of design and simulation of MEMS based inductor by the method of co-simulation.
Keywords: Micro Electro Mechanical System, Radio Frequency, Co-Simulation, COMSOL Multiphysics, SOLIDWORKS, Computer Aided Design, Integrated Circuit
A Digital Pen with a Trajectory Recognition AlgorithmIOSR Journals
Abstract : Now a days, the development of miniaturization technologies in electronic circuits and components has seriously decreased the dimension and weight of consumer electronic products, those are smart phones and handheld computers, and thus prepared them more handy and convenient. This paper contains an accelerometer-based digital pen for handwritten digit and gesture trajectory recognition applications. The digital pen consists of a triaxial accelerometer, a microcontroller, and an Zigbee wireless transmission module for sensing and collecting accelerations of handwriting and gesture trajectories. with this project we can do human computer interaction. Users can utilize this pen to write digits or make hand gestures, and the accelerations of hand motions calculated by the accelerometer are wirelessly transmitted to a computer for online trajectory recognition. So, by varying the position of mems (micro electro mechanical systems) we can capable to show the alphabetical characters in the PC. The acceleration signals calculated from the triaxial accelerometer are transmitted to a computer via the wireless module. Keywords - ARM, Zigbee, Sensors module
A Digital Pen with a Trajectory Recognition AlgorithmIOSR Journals
Abstract : Now a days, the development of miniaturization technologies in electronic circuits and components has seriously decreased the dimension and weight of consumer electronic products, those are smart phones and handheld computers, and thus prepared them more handy and convenient. This paper contains an accelerometer-based digital pen for handwritten digit and gesture trajectory recognition applications. The digital pen consists of a triaxial accelerometer, a microcontroller, and an Zigbee wireless transmission module for sensing and collecting accelerations of handwriting and gesture trajectories. with this project we can do human computer interaction. Users can utilize this pen to write digits or make hand gestures, and the accelerations of hand motions calculated by the accelerometer are wirelessly transmitted to a computer for online trajectory recognition. So, by varying the position of mems (micro electro mechanical systems) we can capable to show the alphabetical characters in the PC. The acceleration signals calculated from the triaxial accelerometer are transmitted to a computer via the wireless module. Keywords - ARM, Zigbee, Sensors module
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Stereo matching algorithm using census transform and segment tree for depth e...TELKOMNIKA JOURNAL
This article proposes an algorithm for stereo matching corresponding process that will be used in many applications such as augmented reality, autonomous vehicle navigation and surface reconstruction. Basically, the proposed framework in this article is developed through a series of functions. The final result from this framework is disparity map which this map has the information of depth estimation. Fundamentally, the framework input is the stereo image which represents left and right images respectively. The proposed algorithm in this article has four steps in total, which starts with the matching cost computation using census transform, cost aggregation utilizes segment-tree, optimization using winner-takes-all (WTA) strategy, and post-processing stage uses weighted median filter. Based on the experimental results from the standard benchmarking evaluation system from the Middlebury, the disparity map results produce an average low noise error at 9.68% for nonocc error and 18.9% for all error attributes. On average, it performs far better and very competitive with other available methods from the benchmark system.
4.5.12, Lightning Talks, Main Hall: Performance Measurement of MEMS Elements for Information Security of G-Cloud Channels (Roumiana Ilieva, Silvia Bobeva) #CeDEM12
A Review: Integrating SUGAR simulating tool and MEMS sensorIJERA Editor
Micro-Electro-Mechanical Systems (MEMS) are forming the basis for a rapidly growing industry and fields of
research, many MEMS designers still rely on calculations due to a lack of efficient computer-aided design
(CAD) tools that can assist with the initial stages of design exploration. This paper review about the techniques
to the design of MEMS and sugar simulating tool. SUGAR simulating tool utilizes past successful MEMS
designs and sub-assemblies as building blocks stored in an indexed library, allowing reuse and modification of
previous successful designs to help deal with the complexities of a new design tool. Reasoning tools find cases
in the library with solved problems similar to the current design problem in order to propose promising
conceptual designs. The paper recommends strategies for integrating the MEMS Design with evolutionary
computation of SST
Design and development of DrawBot using image processing IJECEIAES
Extracting text from an image and reproducing them can often be a laborious task. We took it upon ourselves to solve the problem. Our work is aimed at designing a robot which can perceive an image shown to it and reproduce it on any given area as directed. It does so by first taking an input image and performing image processing operations on the image to improve its readability. Then the text in the image is recognized by the program. Points for each letter are taken, then inverse kinematics is done for each point with MATLAB/Simulink and the angles in which the servo motors should be moved are found out and stored in the Arduino. Using these angles, the control algorithm is generated in the Arduino and the letters are drawn.
Application of local search methods for solving a quadratic assignment proble...Gurdal Ertek
This paper discusses the design and application of local search methods to a real-life application at a steel cord manufacturing plant. The case study involves a layout problem that can be represented as a Quadratic Assignment Problem (QAP). Due to the nature of the manufacturing process, certain machinery need to be allocated in close proximity to each other. This issue is incorporated into the objective function through assigning high penalty costs to the unfavorable allocations. QAP belongs to one of the most difficult class of combinatorial optimization problems, and is not solvable to optimality as the number of facilities increases. We implement the well-known local
search methods, 2-opt, 3-opt and tabu search. We compare the solution performances of the methods to the results obtained from the NEOS server, which provides free access to many optimization solvers on the internet.
http://research.sabanciuniv.edu.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Free Complete Python - A step towards Data Science
ADVANCED ALGORITHMS FOR ETCHING SIMULATION OF 3D MEMS-TUNABLE LASERS
1. International Journal of Control Theory and Computer Modeling (IJCTCM) Vol.3, No.2, March 2013
ADVANCED ALGORITHMS FOR ETCHING
SIMULATION OF 3D MEMS-TUNABLE LASERS
Abderrazzak El Boukili
Al Akhawayn University, Avenue Hassan II, P.O. Box 104, Ifrane 53000, Morocco
a.elboukili@aui.ma
ABSTRACT
This The integrated circuits (ICs) industry uses a number of technology computer aided design (TCAD)
software tools to simulate the manufacturing and the operation of many ICs at different levels. At very low
level, the simulation tools are used to simulate the device fabrication and design. These simulation tools
are based on solving mathematical equations that describe the physics of dopant diffusion, silicon
oxidation, etching, deposition, lithography, implantation, and metallization. The simulation of physical
etching solves etching equations to calculate the etching rate. And this rate is used to move the geometry
of the device. The simulation of non-physical (geometrical) etching is based on geometrical Boolean
operations. In this paper, we are proposing new and advanced geometrical etching algorithms for the
process simulation of three dimensional (3D) micro electro mechanical systems (MEMS) and MEMS-
tunable vertical cavity semiconductor optical amplifiers (VCSOAs). These algorithms are based on
advanced domain decomposition methods, Delaunay meshing algorithms, and surface re-meshing and
smoothing techniques. These algorithms are simple, robust, and significantly reduce the overall run time
of the process simulation of 3D MEMS and MEMS-tunable laser devices. The description of the proposed
etching algorithms will be presented. Numerical simulation results showing the performances of these
algorithms will be given and analyzed for realistic 3D MEMS and MEMS-tunable laser devices.
KEYWORDS
Advanced etching algorithms, domain decomposition, MEMS-tunable optical amplifiers, process simulation
1. INTRODUCTION
In our real life, MEMS devices are used almost everywhere. They are used in medicine,
automotive industry, sensors industry, telecommunication industry and more. For example,
MEMS technology leads to greater safety for automobile drivers. With their super-powerful
sensors, MEMS accelerometers can sense when a vehicle has been in an impact; they can even
judge the speed and severity of the impact in order to deploy airbags at the right speed and
volume.
The iPhone actually uses extensive MEMS technology for many of its applications. Sensitive
MEMS accelerometers can be scaled down and incorporated into handheld devices like mobile
phones. They allow the phone to sense which way it is being turned and shift the screen from a
portrait layout to a landscape layout, for example. They are also responsible for much of the hype
about iPhone games, which use gimmicks like shaking the phone in order to roll dice.
Cell phone MEMS devices can also be integrated with an electronic compass in order to provide
the GPS positioning system that iPhones offer. Because of MEMS’ tiny size and versatility this
technology can produce everything a consumer could ever want in a phone. Already, it has led to
DOI : 10.5121/ijctcm.2013.3201 1
2. International Journal of Control Theory and Computer Modeling (IJCTCM) Vol.3, No.2, March 2013
cell phone microphones, autofocus actuators, BAW filters and duplexers, projectors,
inclinometers, pressure sensors, and pico-projectors.
Vertical cavity semiconductor optical amplifiers (SOAs) represent a low-cost alternative to
existing amplifier technologies. They could be used in fiber-optic communication systems such as
metro and access networks [2], [3].
The surface-normal operation of vertical-cavity (SOAs) gives rise to many advantages as high
coupling efficiency to optical fibers, polarization insensitive gain, the potential to fabricate high
fill-factor two-dimensional arrays, and the ability to test devices on wafer [1],[2], [3],
[6],[9],[11],[12].
Understanding MEMS and MEMS-tunable device fabrications is essential in optimizing
design and enabling a more rapid production of mature devices. The 3D MEMS process
simulation is a complex and challenging issue. The structures are geometrically complicated
and inherently three-dimensional.
The main goal of this paper is to significantly improve, enhance, optimize and extend from two
dimensions (2D) to three dimensions the existing geometrical etching algorithms for process
simulation of 3D MEMS and MEMS-tunable vertical cavity semiconductor optical amplifiers
(MT-VCSOAs) as shown in Figure 1. Most of commercial process simulators used worldwide
are based on the industry standard two dimensional (2D) process simulator SUPREM-IV [5] or
3D process simulator FLOOPS [7]. SUPREM-IV has been developed by Stanford University in
California. In this paper, firstly, we are significantly improving the 2D etching algorithms used
in SUPREM-IV. And, secondly, we did extend these 2D etching algorithms to 3D which was an
other challenging task.
We were, exactly, motivated by solving the following three difficulties :
1. In case of a 2D refined mesh using SUPREM-IV algorithms, a strange ripped nylon
mesh is generated after etching as seen in “Fig. 2” and “Fig. 5”.
2. Extending the 2D geometrical etching algorithms of SUPREM-IV to 3D for process
simulations of complex geometries of MEMS and MT-VCSOAs, while keeping the
trade-off between computational efficiency and the simulation's run time.
3. Creating an accurate and suitable 3D geometry and mesh for the fabrication,
mechanical, and electrical simulations of MT-VCSOAs and MEMS.
The traditional geometrical etching algorithms [5],[7],[10] are based on geometrical Boolean
operations as region subtractions, region intersections, and region unions. They also incorporate
additional supporting algorithms as, geometry validation, mesh quality control after etching, de-
looping, removing holes, and making regions convex. In case of moving boundaries, as in
physical etching, moving boundaries algorithms [4],[8] are used to calculate the etching rate (or
the velocity of the boundary). In our case, we are not dealing with moving boundaries.
The main step in these etching algorithms is the Boolean subtraction operation. Our contribution
is firstly to solve the difficulty 1. by applying boundary smoothing and re-meshing idea after
subtraction operation as can be seen in “Fig. 3” and “Fig. 6”. Secondly, we used domain
decomposition method (DDM) together with geometrical etching algorithms for the etching
simulation of the complex 3D MEMS and MT-VCSOAs. The use of DDM is an excellent
remedy to the difficulty in 2. The application of DDM significantly increases the efficiency and
reduces the run time of etching simulation and the overall run time of the other process
simulations including deposition, implantation, oxidation, and diffusion.
2
3. International Journal of Control Theory and Computer Modeling (IJCTCM) Vol.3, No.2, March 2013
The DDM consists in decomposing the whole 3D structure into different 3D blocks. We could
then apply etching algorithms to each block and then merge all the blocks to get the whole 3D
structure. Advanced merging algorithms have also been developed and used after etching. They
are based on region unions and intersections. The DDM is also very convenient for
parallelization.
This paper is organized as follows. The second section describes in details the new etching
algorithms. The third section presents the 2D and 3D numerical results that validate qualitatively
and quantitatively the introduced geometrical etching algorithms. The performance of these
etching algorithms are also discussed and analyzed. A comparison of the obtained 3D numerical
results with other results found in literature is also presented. Section 4 contains conclusions,
future work, and recommendations stemming from the work presented in this paper.
2. DESCRIPTION OF THE NEW ETCHING ALGORITHMS
Every 2D or 3D semiconductor structure could be defined in terms of geometry, surface mesh,
and volume mesh. Geometry represents the gross outline of the structure and the different
materials in the structure. We could look at the geometry as a set of regions. And each region is
defined by a material. Surface or boundary mesh refers to a set of planar elements (points, edges,
or triangles) whose union form the boundary of the geometry. The volume mesh refers to a set of
volumetric elements (as tetrahedral elements) whose union defines the interior and the exterior of
the whole device. The basic idea of this paper is to smooth and re-mesh properly the surface of
each region of the geometry after a geometrical etching. By doing so, we were successful to
solve the difficulty 1. in 2D and 3D.
In this section, we will describe in details the algorithms developed and used to perform the
geometrical etching simulations in 2D. The extension of these algorithms to 3D has also been
achieved and used.
The geometrical etching algorithm first defines the geometry of the region to be etched. This
region is then subtracted from each region of the whole structure. The pseudo-code of the
algorithm is given in the Algorithm 1 given below. The main idea behind this etching algorithm is
as follows: the intersection i between the etch region e and a region r in the geometry is first
computed (line 3 in Algorithm 1). If the etch region is fully enclosed within the geometry region,
then, the etch is completed by defining the geometry region to have two boundaries (lines 4-5).
The outer boundary is the existing boundary of the geometry region and the inner boundary is the
etch region's boundary. Our new implementation of the etching algorithm consists in adding a
new procedure SmoothBoudary() that will smooth properly these inner and outer boundaries
according to some given data from the user. If the etch region completely contains the geometry
region, then, the geometry region is completely deleted (lines 6-7). Otherwise, the intersection
between the etch region and the geometry region is considered. The geometry region r is to be
replaced with the regions that are outside the etch region e. Let I be the set of all the points of
the intersection i. Let R be the set of all the points of the geometry region r. Let E be the set of
all the points of the etch region e and let P = R - I. The Algorithm 1 below, then, works as
follows.
First a point p0 of the region r's boundary that is not part of the intersection (member of the set
P) is found (line 14). Staring from this point p0, all the other subsequent points of R that are
member of P are collected to form a new boundary B until the intersection with the etch region
is found (lines 16-20). The collection continuous along the intersection from the set I until the
region r is found (lines 21-26). The points of the region r in the set R are then collected until the
first point is encountered (lines 27-30). This closed loop then generates a new boundary. This new
boundary is then smoothed and re-meshed by calling the new procedure SmoothBoundary() and
3
4. International Journal of Control Theory and Computer Modeling (IJCTCM) Vol.3, No.2, March 2013
finally added to the geometry data structure. The procedure continues until all the points of the
geometry region r's boundary that belong to P are part of the new boundary (lines 15, 33-34).
The pseudo-code of the new geometrical etching algorithm (Algorithm 1) is given in the
following subsection.
2.1. Pseudo-Code of the New Etching Algorithm
Algorithm 1: new geometrical etching algorithm
Procedure Etch (e, r)
Inputs: e: etch region, r: geometry region
Outputs: new smoothed boundaries and new regions
begin
1. e:= Etch Region;
2. r:= Geometry Region;
3. i:= RegionIntersection(e,r);
4. if ( i=e) then (etch region inside region)
5. add boundary of e as internal boundary of r
6. SmoothBoundary(); (significant improvement to etching algorithms)
7. elseif ( i=r) then (geometry region inside etch region)
8. delete r;
else
9. E:= Points of e;
10. R:= Points of r;
11. I:= Points of i;
12. P:= R - I;
13. B:= 0;
14. first:=p:= MEMBER(0,P)
15. while (P ≠ 0) do (find the points that are outside)
16. INSERT(p,B);
17. np:=FIND(R, point next to p);
18. if (np ∈ P) then
19. DELETE(p,P);
20. p:=np;
else(find the points that belong to i)
21. np:=FIND(I, point on edge from p to np);
22. INSERT(np,B);
23. repeat
24. np:=FIND(I, point next to np);
25. INSERT(np,B);
26. until np is on r; (loop back to get all the other points of r)
27. p=FIND(R,point next to np);
28. while ( p ≠ first) do
29. INSERT(p,B);
30. DELETE(p,P);
31. add new region formed by points in the set B;
32. SmoothBoundary(); (significant improvement to etching algorithms)
33. B:=0;
34. first:=p:=MEMBER(0,P);
35. delete region r;
36. SmoothAllBoundaries(); (significant improvement to etching algorithms)
this procedure is optional. It could be called to smooth globally all the boundaries.
end
4
5. International Journal of Control Theory and Computer Modeling (IJCTCM) Vol.3, No.2, March 2013
The meaning of the other main procedures in Algorithm 1 is as follows:
MEMBER(i,S). Return the ith member of the set S.
INSERT(u,S). Make u an element of the set S.
DELETE(u,S). Remove element u from the set S if u is a member.
FIND(S,L). Find and return an element u of the set S that meets criteria L.
We should note that if the boundary smoothing procedures (SmoothBoundary() and
SmoothAllBoundaries() ) are called outside the geometrical etching Algorithm 1, then, the
analysis of the complexity in time of the Algorithm 1 shows that the Algorithm 1 is O(N+K). The
number N represents the number of points of the geometry region r. And K is the number of the
points of the etch region e. Then, the complexity of the Algorithm 1 has the advantage to be
linear.
2.2. Pseudo-Code of the New Smoothing Boundary Procedures
During etching algorithm, we call the smoothing boundary procedure SmoothBoundary() to
smooth and re-mesh the new boundary that we just get. This procedure will split up some or all
the long edges of the new boundary according to some criteria and to the user defined parameter
α . The shape of the geometry is not altered if the long edges are split up. However, what
constitutes a long edge? In this algorithm, long edges are judged in 2D according to the original
perimeter of the boundary under hand. If an edge of length l_s is bigger than the user specified
percentage ( α ) of the perimeter or bigger than 3 times the smallest edge of length l_min, then,
this edge will be split up. The algorithm 2, given bellow, first calculates the perimeter of the
boundary under hand (line 1). Secondly, it finds the smallest edge (line 2). Thirdly, it loops over
all the edges of the boundary and checks to see if it is bigger than α × perimeter or bigger than
3 × l_min (lines 3-5). If it is, then, the procedure SplitEdge() is called to split up the edge (line
6).
Algorithm 2: Boundary Smoothing
Procedure SmoothBoundary ()
Inputs: B: region boundary to be smoothed according to user
α : user defined parameter used as a smoothing factor
Outputs: new smoothed and re-meshed boundary B
begin
1. p:=perimeter of boundary B; or area of a surface in 3D
2. l_min=length of the smallest edge of boundary B;
3. for each edge e of B do
4. l_s = length of e;
5. if (l_s > 3 × l_min or l_s > α × p ) then
6. SplitEdge(e);
end
The etching and smoothing algorithms rely on many other geometry utility algorithms such as
bulk and boundary mesh generation algorithms, algorithms to remove holes and make all the
regions convex, algorithms assuring boundary orientation in counter-clockwise manner and other
similar utilities.
5
6. International Journal of Control Theory and Computer Modeling (IJCTCM) Vol.3, No.2, March 2013
3. 3D NUMERICAL RESULTS AND ANALYSIS
Using the proposed new geometrical etching algorithms, we were able to solve the 3 difficulties
1., 2. and 3. described above. On the other hand, we were successful to etch efficiently all the
complicated 3D structures under hand. Figure 1 shows a schematic representation of a realistic
MEMS tunable VCSOAs.
Figure 1, Schematic representation of MT-VCSOAs
Figure 2 and Figure 5 show a ripped nylon mesh after using SUPREM-IV etching algorithms.
This type of mesh does cause troubles for the convergence of Newton’s algorithm used to solve
diffusion equations and for the simulation results. By using Algorithms 1 and 2 described above
we were able to generate a better and high quality mesh as shown in Figure 3 and Figure 6. We
show in Figure 4 a 2D mesh before etching. The Figure 7 to Figure 15 show the qualitative and
quantitative behaviour of the proposed etching algorithms for different realistic and complicated
geometries of 3D MEMS and MEMS tunable VCSOAs. The quality of the mesh and the
geometry shown in all these figures (Figure 7 to Figure 11) does validate the excellent
performance of the proposed etching algorithms. These performances are comparable with those
find in [4] for different 3D structures. The size of our obtained meshes are even smaller and
better optimized than those in [4]. This is due to the use of the domain decomposition method and
the local mesh adaptation.
4. CONCLUSION
In conclusion, by using these new geometrical etching algorithms, it is possible to generate
accurately complex geometries and meshes for mechanical and electrical simulations of 3D
MEMS and MEMS-tunable laser devices. Parallelization of these algorithms could be
investigated in future work.
6
7. International Journal of Control Theory and Computer Modeling (IJCTCM) Vol.3, No.2, March 2013
Figure 2, Ripped nylon mesh after SUPREM-IV etching
Figure 3, Smoothing boundary helped repair the ripped mesh
7
8. International Journal of Control Theory and Computer Modeling (IJCTCM) Vol.3, No.2, March 2013
Figure 4, 2D mesh before etching
Figure 5, 2D mesh problem after SUPREM-IV etching.
8
9. International Journal of Control Theory and Computer Modeling (IJCTCM) Vol.3, No.2, March 2013
Figure 6, Better quality mesh after our improved etching algorithm
Figure 7, 3D MEMS Tunable VCSOAs after improved etching
9
10. International Journal of Control Theory and Computer Modeling (IJCTCM) Vol.3, No.2, March 2013
Figure 8, Radio frequency MEMS before 3D etching
Figure 9, Radio frequency MEMS after 3D improved etching
10
11. International Journal of Control Theory and Computer Modeling (IJCTCM) Vol.3, No.2, March 2013
Figure 10, Electrometer MEMS before 3D etching
Figure 11, Electrometer MEMS after 3D improved etching
11
12. International Journal of Control Theory and Computer Modeling (IJCTCM) Vol.3, No.2, March 2013
REFERENCES
[1] G. L. Christensen, A.T.T. Tran, Z.H. Zhu, Y.H. Lo, M. Hong, J.P. Mannaerts, R. Bhat, (1997)
“Long Wavelength Resonant Vertical-Cavity LED/Photodetector with a 75-nm tuning range”,
IEEE Photonics Technology Letters, vol.9, pp725-727.
[2] D.C. Garett, C. Qi, C. Chaung-Yeng, W. Shaomin, S.W. Chad, C.M. Noel, J.E. Bowers, (2005)
“MEMS-Tunable Vertical Cavity SOAs”, IEEE Journal of quantum electronics, vol. 41, No 3,
March.
[3] D.C. Garett, (2005) “MEMS-Tunable Vertical Cavity SOAs”, Ph.D. Thesis, University of California,
Santa Barbara, CA, USA.
[4] W.V. Glenn, (2000) “A Three-Dimensional Front tracking Algorithm for Etching and Deposition
processes”, Ph.D. Thesis, State University of New York, Stony Brook, USA.
[5] S.E. Hansen, M.D. Deal, (1993) “User's Manual of SUPREM-IV.GS: Two dimensional Process
Simulation for Silicon and Gallium Arsenide”, Integrated Circuit Laboratory, Stanford University,
Stanford, California, USA.
[6] M.C. Larson, A.R. Massengale, J.S. Harris, (1996) “Continuously Tunable Micromachined Vertical-
Cavity Surface Emitting Laser,” Electron Letter, vol. 32, pp330-332.
[7] Law, M.E., 1994., (1994) “User's Manual of FLOOPS: Florida Objected Oriented Process
Simulator Manual,” Dept. of Elect. Eng., University of Florida, Florida, USA.
[8] W.G. Oldham, A.R. Neureuther, C. Sung, J.L. Reynolds, S.N. Nandgaonakar, (1980) “A General
Simulator for VLSI Lithograpgy and Eteching Process: PartII-Application to Deposition and
Etching,” IEEE Trans Electron Devices, vol.ED-27,pp1455-1459.
[9] W.S. Rabinovich, T.H. Stievater, N.A. Papanicolaou, D.S. Katzer, P.G. Goetz, (2003)
“Demonstration of a Microelectromechanical Tunable Asymmetric Fabry-Perot Quantum Well
Modulator ,” Applied Physics Letter , vol.83, pp1923-1926.
[10] Z.H. Sahul, (1996) “Grid and Geometry Servers for Semiconductor Process and Simulation,” Ph.D.
Thesis, Stanford University, Stanford, CA, USA.
Authors
Abderrazzak El Boukili received both the PhD degree in Applied Mathematics
in 1995, and the MSc degree in Numerical Analysis, Scientific Computing and
Nonlinear Analysis in 1991 at Pierre et Marie Curie University in Paris-
France. He received the BSc degree in Applied Mathematics and Computer
Science at Picardie University in Amiens-France. In 1996 he had an industrial
Post-Doctoral position at Thomson-LCR company in Orsay-France where he
worked as software engineer on Drift-Diffusion model to simulate heterojunction
bipolar transistors for radar applications. In 1997, he had European Post-Doctoral
position at University of Pavia-Italy where he worked as research engineer on
software development for simulation and modeling of quantum effects in
heterojunction bipolar transistors for mobile phones and high frequency applications. In 2000, he was
Assistant Professor and Research Engineer at the University of Ottawa-Canada. Through 2001-2002 he was
working at Silvaco Software Inc. in Santa Clara, California-USA as Senior Software Developer on
mathematical modeling and simulations of vertical cavity surface emitting lasers. Between 2002-2008, he
was working at Crosslight Software Inc. in Vancouver-Canada as Senior Software Developer on 3D
Process simulation and Modeling. Since Fall 2008, he is working as Assistant Professor of Applied
Mathematics at Al Akhawayn University in Ifrane-Morocco. His main research interests are in industrial
TCAD software development for simulations and modeling of opto-electronic devices and processes.
http://www.aui.ma/personal/~A.Elboukili
12