摘要:
A method for sealing an exposed surface of a wire bond pad with a material that is capable of preventing a possible chemical attack during electroless deposition of Ni/Au pad metallurgy is provided. Specifically, the present invention provides a method whereby a TiN/Ti or TiN/Al cap is used as a protective coating covering exposed surfaces of a wire bond pad. The TiN/Ti or TiN/Al cap is not affected by alkaline chemistries used in forming the Ni/Au metallization, yet it provides a sufficient electrical pathway connecting the bond pads to the Ni/Au pad metallization.
摘要:
A method for sealing an exposed surface of a wire bond pad with a material that is capable of preventing a possible chemical attack during electroless deposition of Ni/Au pad metallurgy is provided. Specifically, the present invention provides a method whereby a TiN/Ti or TiN/Al cap is used as a protective coating covering exposed surfaces of a wire bond pad. The TiN/Ti or TiN/Al cap is not affected by alkaline chemistries used in forming the Ni/Au metallization, yet it provides a sufficient electrical pathway connecting-the bond pads to the Ni/Au pad metallization.
摘要:
An interlevel dielectric layer (ILD) comprises a low-k dielectric layer; and a low-k dielectric film, deposited under compressive stress, atop the dielectric layer. The dielectric layer comprises a low-k material, such as an organosilicon glass (OSG) or a SiCOH material. The dielectric film has a thickness, which is 2%-10% of the thickness of the dielectric layer, has a similar chemical composition to the dielectric layer, but has a different morphology than the dielectric layer. The dielectric film is deposited under compressive stress, in situ, at or near the end of the dielectric layer deposition by altering a process that was used to deposit the low-k dielectric layer.
摘要:
A composition for deposition as a coating includes a matrix material having a molten fraction of between about 33% and about 90% by volume and a filler material interspersed within the matrix.
摘要:
This invention discloses a system for determining whether a purported or alleged authorized user is in fact the authorized user, by comparing new data on a real-time basis against probability distribution representations including an authorized user probability distribution representation and a global or wide population probability distribution representation, to provide a probability as to whether the purported authorized user is the authorized user. This invention may utilize keyboard dynamics, data, X-Y device data, or other data from similar measurable characteristics, to determine the probability that the new data from the purported authorized user indicates or identifies that user as the authorized user.
摘要:
Detection devices and methods associated therewith are provided. In some embodiments, the detection system can be adapted to measure one or more analytes of interest possibly present in a sample through the use of binding reactions.
摘要:
A method of noninvasively obtaining a physiological parameter of a fluid vessel. A series of pressure values are applied to a region of the vessel to adjust the transmural pressure of the vessel wall. At each of the pressure values at least one of a pulse transit time and a pulse wave velocity through the region of the vessel is measured. At least one of vessel compliance and vessel segmentation is determined as a function of the pulse transit time or pulse wave velocity and the applied pressure.
摘要:
A torque-limiting driver includes a housing, a shaft carried by the housing for rotation relative thereto and having a workpiece-engaging tip projecting from the housing, a torque-limiting mechanism coupled between the housing and the shaft and responsive to rotation of the housing in a predetermined direction to rotate the shaft at torques below a predetermined torque and accommodating rotation of the housing relative to the shaft at said predetermined torque and above, a torque-determining structure disposed in the housing and movable relative to the torque-limiting mechanism for adjusting the predetermined torque, and the housing including a stop portion engageable with the torque-determining structure for preventing torque-adjusting movement thereof.
摘要:
A detection system may include a moveable tray configured to hold a multi-cell container of one or more reagents and/or one or more samples. A driving mechanism may be configured to reciprocate the tray in the first linear direction to agitate contents of the container, and may be configured to conduct electrochemiluminescence or other measurements on samples located in the container. The system may include an apparatus for retaining a container, a device for detecting the presence of a container, an apparatus for training a probe to locate and aspirate one or more reagents and/or one or more samples, a latching mechanism for moving parts in the system, and/or a positive displacement pump. A controller may be configured to control linear reciprocation of the tray to have one of a piecewise constant velocity profile and piecewise constant acceleration profile in which the number of piecewise constants does not exceed 24.
摘要:
A countermeasure for a computer security threat to a computer system is administered by establishing a baseline identification of an operating or application system type and an operating or application system release level for the computer system that is compatible with a Threat Management Vector (TMV). A TMV is then received, including therein a first field that provides identification of at least one operating system type that is affected by a computer security threat, a second field that provides identification of an operating system release level for the operating system type, and a third field that provides identification of a set of possible countermeasures for an operating system type and an operating system release level. Countermeasures that are identified in the TMV are processed if the TMV identifies the operating system type and operating system release level for the computer system as being affected by the computer security threat. The received TMV may be mutated to a format for processing of the countermeasure.