Searched for: subject%3A%22threshold%22
(1 - 4 of 4)
document
Jiang, Jing (author), Wang, S. (author), Liu, X. (author), Liu, Jianhui (author), Li, Jun (author), Zhou, Dexiang (author), Zhang, Kouchi (author), Ye, H. (author), Tan, C. (author)
High electric-field stress is an effective solution to the recovery of irradiated devices. In this paper, the dependence of the recovery level on the magnitude of gate voltage and duration is investigated. Compared with the scheme of high gate-bias voltage with a short stress time, the transfer characteristics are significantly recovered by...
journal article 2022
document
Li, Wenting (author), Cheng, Haibo (author), Wang, Ping (author), Liang, K. (author)
Multi-factor authentication (MFA) has been widely used to safeguard high-value assets. Unlike single-factor authentication (e.g., password-only login), t-factor authentication (tFA) requires a user always to carry and present t specified factors so as to strengthen the security of login. Nevertheless, this may restrict user experience in...
journal article 2021
document
Ganni, S. (author), Botden, Sanne M.B.I. (author), Chmarra, M.K. (author), Li, M. (author), Goossens, R.H.M. (author), Jakimowicz, J.J. (author)
Motion tracking software for assessing laparoscopic surgical proficiency has been proven to be effective in differentiating between expert and novice performances. However, with several indices that can be generated from the software, there is no set threshold that can be used to benchmark performances. The aim of this study was to identify...
journal article 2020
document
Li, C. (author)
doctoral thesis 2014
Searched for: subject%3A%22threshold%22
(1 - 4 of 4)