1460712687-f33c65a9-d8e8-44db-aef2-887d6f4c25eb

1. A cooling system comprising:
a cooling channel for receiving a cooling media, the cooling channel being for thermal communication with a component to be cooled, wherein the cooling channel has a height of less than or equal to about 3 mm and a width of less than or equal to 2 mm;
a substrate disposed near the cooling channel; and
a fluidic jet disposed within the substrate and in fluid communication with the cooling channel, wherein the fluidic jet comprises a cavity defined by a well and a membrane.
2. The cooling system of claim 1, wherein the cooling channel has a channel width that is about 25 \u03bcm to about 300 \u03bcm and a channel height that is about 50 \u03bcm to about 500 \u03bcm.
3. The cooling system of claim 1, wherein the cavity has an opening with a cavity opening size, wherein an orifice disposed through the substrate forms the fluid communication between the fluidic jet and the channel, and wherein the orifice has an orifice size that is less than or equal to about 95% of the cavity opening size.
4. The cooling system of claim 3, wherein the orifice size is less than or equal to about 50% of the cavity opening size.
5. The cooling system of claim 1, wherein the membrane has a membrane size, wherein an orifice disposed through the membrane forms the fluid communication between the fluidic jet and the channel, and wherein the orifice has an orifice size that is less than or equal to about 50% of the membrane size.
6. The cooling system of claim 5, wherein the orifice size that is less than or equal to about 25% of the membrane size.
7. The cooling system of claim 6, wherein the orifice size that is about 8% to about 15% of the membrane size.
8. The cooling system of claim 1, wherein the membrane is connected in operable communication to a lead for supplying electrical energy to the membrane to cause the membrane to oscillate.
9. The cooling system of claim 1, wherein the membrane is connected in operable communication to a wave generator for causing the membrane to oscillate.
10. The cooling system of claim 1, wherein the membrane is connected in operable communication to a pressure oscillating apparatus for causing the membrane to oscillate.
11. The cooling system of claim 1, wherein the membrane is connected in operable communication to a mechanical apparatus for causing the membrane to oscillate.
12. The cooling system of claim 1, further comprising a sensor that is connected in operational communication to a controller for activating the fluidic jet.
13. The cooling system of claim 1, further comprising
a plurality of the fluidic jets, and
a sensor connected to each fluidic jet and connected in operational communication to a controller for activating the fluidic jets individually.
14. The cooling system of claim 1, wherein an orifice forms the fluid communication between the fluidic jet and the channel, and wherein the orifice is in fluid communication with multiple channels.
15. The cooling system of claim 1, wherein the channel has a changing width andor height.
16. The cooling system of claim 1, wherein the cooling system is a closed loop system comprising a plurality of the fluidic jets, a plurality of the channels, and a cooling media in the cooling channels.
17. The cooling system of claim 1, wherein the cooling channels are in thermal communication with an electronic component.
18. The cooling system of claim 17, wherein the electronic component is an integrated circuit.
19. The cooling system of claim 1, wherein the cavity has a cavity depth of about 10 \u03bcm to about 3 mm.
20. A cooling system comprising:
an integrated circuit;
a cooling channel for receiving a cooling media, and located in thermal communication with the integrated circuit;
a plurality of fluidic jets disposed in a substrate, and an orifice for fluid communication between the cooling channel and a cavity of the fluidic jet;
a lead in operational communication with the membrane; and
a controller in operational communication with the lead for activating the fluidic jets.
21. The cooling system of claim 20, wherein the cooling channel has a height of less than or equal to about 3 mm and a width of less than or equal to 2 mm, wherein the orifice has an orifice size of less than or equal to about 50% of a membrane size, the membrane has a membrane thickness of about 2 \u03bcm to about 2 mm, and wherein the cavity has a cavity depth of about 10 \u03bcm to about 3 mm.
22. A method of cooling an electrical component, comprising:
passing a cooling media through a cooling channel having a channel width, wherein the cooling channel is located in thermal communication with an electrical component and in fluid communication with a plurality of fluidic jets, wherein each fluidic jet comprises a cavity defined by a well and a membrane, wherein the cooling channel has a height of less than or equal to about 3 mm and a width of less than or equal to 2 mm;
drawing the cooling media into one or more of the fluidic jets;
expelling the cooling media from the one or more fluidic jets into the cooling channel; and
removing thermal energy from the electrical component.
23. The method of claim 22, wherein drawing the cooling media further comprises oscillating the membrane.
24. A method of claim 22, further comprising:
monitoring a temperature of a plurality of portions of the electrical component;
determining if a particular monitored temperature is a high temperature that is above a limit; and
if the temperature is a high temperature,
activating the fluidic jet(s) that are in thermal communication with the portion of the electrical component that has the high temperature.
The claims below are in addition to those above.
All refrences to claim(s) which appear below refer to the numbering after this setence.

1. A communication apparatus, comprising:
a radio transceiver module; and
a processor, responsive to a signal power of a serving base station falling below a first predetermined threshold, receiving a neighbor cell message from the serving base station and determine a measurement result based on the information carried in the received neighbor cell message,
wherein the neighbor base stations are prioritized by the processor in a prioritized order, the prioritized order being determined based on properties of neighboring cell base stations, wherein the neighbor base stations are categorized as at least one of prioritized cells and ordinary cells according to cell types, wherein a scanning set of the neighbor base stations is formed of qualified prioritized cells and reported to the serving base station according to the prioritized order and responsive to at least one of: no space remaining in the scanning set and all ordinary cells being evaluated, wherein the scanning set is scanned, wherein the cell types comprise at least cell coverage, and wherein the processor initiates a handover procedure responsive to the signal power falling below a second predetermined threshold.
2. The communication apparatus as claimed in claim 1, wherein the processor further receives a broadcast message from at least one of the neighbor base stations to obtain network entry related system information therefrom.
3. The communication apparatus as claimed in claim 2, wherein the processor further conducts a handover procedure with the serving base station to one of the neighbor base stations according to the measurement result and the obtained network entry related system information.
4. The communication apparatus as claimed in claim 1, wherein the scanning of the neighbor base stations is prioritized according to network loadings of the neighbor base stations.
5. The communication apparatus as claimed in claim 1, wherein the scanning of the neighbor base stations is prioritized according to locations of the neighbor base stations.
6. The communication apparatus as claimed in claim 1, wherein the scanning of the neighbor base stations is prioritized according to historical handover records of the communication apparatus corresponding to the neighbor base stations.
7. The communication apparatus as claimed in claim 1, wherein the cell types further comprise at least one of: Medium Access Control (MAC) layer versions, or one or more physical parameters of the neighbor base stations.
8. The communication apparatus as claimed in claim 1, wherein the neighbor cell message is segmented into a plurality of sub-messages, each sub-advertisement message carries information regarding the neighbor base stations belonging to one or more categories, and wherein the processor scans the neighbor base stations after receiving at least one sub-message.
9. A method for scanning neighbor base stations of a communication apparatus, comprising:
responsive to a signal power of a serving base station falling below a first predetermined threshold, performing the steps of:
obtaining information of a plurality of neighbor base stations;
categorizing neighbor base stations as at least one of prioritized cells and ordinary cells;
reporting a scanning set comprising qualified prioritized cells to the serving base station responsive to one of: no space remaining in the scanning set and all ordinary cells being evaluated, wherein the candidates are prioritized in a preferred order according to properties of the neighbor base stations;
scanning the candidates in the scanning set in the preferred order to obtain a measurement result;
wherein categorizing the neighbor base stations in the scanning set is performed according to cell types of the neighbor base stations, wherein the cell types comprise at least cell coverage;
sorting the information of the neighbor base stations according to the categories of the neighbor base stations;
carrying the sorted information in a neighbor cell message; and
initiating a handover procedure responsive to the signal power falling below a second predetermined threshold.
10. The method as claimed in claim 9, further comprising:
receiving a broadcast message from at least one of the scanned candidates to obtain network entry related system information therefrom.
11. The method as claimed in claim 10, further comprising:
transferring a communication service of the communication apparatus from a serving base station to one of the candidates according to the measurement result and the obtained network entry related system information.
12. The method as claimed in claim 9, wherein the candidates are prioritized according to network loadings.
13. The method as claimed in claim 9, wherein the candidates are prioritized according to locations.
14. The method as claimed in claim 9, wherein the candidates are prioritized according to times of historical handover of the communication apparatus corresponding to the candidates.
15. The method as claimed in claim 9, wherein the cell types further comprise at least one of: Medium Access Control (MAC) layer versions, or one or more physical parameters of the neighbor base stations.
16. The method as claimed in claim 9, further comprising:
segmenting the neighbor cell message into a plurality of sub-messages, wherein each sub-message carries information of the neighbor base stations belonging to one or more categories; and
determining the candidates after receiving at least one sub-message.
17. The method as claimed in claim 9, wherein the step of carrying the sorted information in the neighbor cell message further comprises:
carrying the information of a first neighbor base station belonging to one category in the neighbor cell message; and
carrying difference information of rest of the neighbor base stations belonging the same category in the neighbor cell message, wherein the difference information comprises the information that is different from the information of the first neighbor base station.
18. A communication apparatus, comprising:
a radio transceiver module; and
a processor, responsive to a signal power of a serving base station falling below a first predetermined threshold, receiving a neighbor cell message from the serving base station and determine a measurement result based on the information carried in the received neighbor cell message,
wherein the neighbor base stations are prioritized by the processor in a prioritized order, the prioritized order being determined based on properties of neighboring cell base stations, wherein the neighbor base stations are categorized as at least one of prioritized cells and lower priority cells according to cell types;
wherein a scanning set of the neighbor base stations is formed of qualified prioritized cells and reported to the serving base station according to the prioritized order responsive to one of: no space remaining in the scanning set and all lower priority cells being evaluated, wherein the scanning set is scanned, wherein the scanning of the neighbor base stations is prioritized according to at least cell coverage of the neighbor base stations; and
wherein the processor initiates a handover procedure responsive to the signal power falling below a second predetermined threshold.
19. A method for scanning neighbor base stations of a communication apparatus, comprising:
responsive to a signal power of a serving base station falling below a first predetermined threshold, performing the steps of:
obtaining information of a plurality of neighbor base stations;
categorizing neighbor base stations as at least one of prioritized cells and lower priority cells;
reporting a scanning set comprising qualified prioritized cells to the serving base station responsive to one of: no space remaining in the scanning set and all lower priority cells being evaluated, wherein the candidates are prioritized in a preferred order according to properties of the neighbor base stations; and
scanning the candidates in the scanning set in the preferred order to obtain a measurement result;
wherein the candidates are prioritized according to at least cell coverage of the neighbor base stations; and
initiating a handover procedure responsive to the signal power falling below a second predetermined threshold.

1460712679-dc93aa51-4831-45fc-9ded-84c9f892f860

1. A method for determining a vulnerability of multi-threaded program code to soft errors, comprising:
by a computing device, performing operations for:
analyzing instructions for each of two or more threads in the program code to identify particular instructions from the two or more threads that perform predetermined accesses of one or more architectural structures;
while executing instructions from the program code, monitoring the executing to determine when the particular instructions are executed and therefore when corresponding predetermined accesses are performed;
determining a time for which the program code is exposed to soft errors based on a timing of the corresponding predetermined accesses by determining an amount of time when data is held in at least one of the one or more architectural structures, the data to be used for performing corresponding predetermined accesses for at least one of the particular instructions, the determining the amount of time comprising, for each of the one or more architectural structures, maintaining a corresponding vulnerability counter, a value in the vulnerability counter set using a time counter and a last-accessed counter, the last accessed counter being updated when corresponding predetermined accesses of the architectural structure occur; and
using the time for which the program code is exposed to soft errors to determine the vulnerability of the program code to soft errors.
2. The method of claim 1, wherein a predetermined access of the one or more architectural structures comprises:
acquiring data from at least one of the one or more architectural structures; and
using the acquired data to perform an operation, the operation effecting a state of at least one of a corresponding thread or the program code.
3. The method of claim 1, wherein using the time for which the program code is exposed to soft errors to determine the vulnerability of the program code to soft errors comprises:
by the computing device, performing operations for:
computing the vulnerability for the program code to soft errors as a ratio of the amount of time when data is held in at least one of the one or more architectural structures to an overall execution time for the program code.
4. The method of claim 1, wherein each of the one or more architectural structures comprises a corresponding structure defined in an instruction set architecture (ISA) for which the program code is written.
5. The method of claim 1, wherein analyzing the instructions for each of the two or more threads in the program code to identify the particular instructions in the two or more threads that perform the predetermined accesses of the one or more architectural structures comprises:
by the computing device, performing operations for:
statically analyzing instructions for each of the two or more threads in the program code.
6. A computing device that determines a vulnerability of multi-threaded program code to soft errors, comprising:
at least one processor core; and
a memory;
wherein the at least one processor core and the memory are configured to perform operations for:
analyzing instructions for each of two or more threads in the program code to identify particular instructions from the two or more threads that perform predetermined accesses of one or more architectural structures;
while executing instructions from the program code, monitoring the executing to determine when the particular instructions are executed and therefore when corresponding predetermined accesses are performed;
determining a time for which the program code is exposed to soft errors based on a timing of the corresponding predetermined accesses by determining an amount of time when data is held in at least one of the one or more architectural structures, the data to be used for performing corresponding predetermined accesses for at least one of the particular instructions, the determining the amount of time comprising, for each of the one or more architectural structures, maintaining a corresponding vulnerability counter, a value in the vulnerability counter set using a time counter and a last-accessed counter, the last accessed counter being updated when corresponding predetermined accesses of the architectural structure occur; and
using the time for which the program code is exposed to soft errors to determine the vulnerability of the program code to soft errors.
7. The computing device of claim 6, wherein a predetermined access of the one or more architectural structures comprises:
acquiring data from at least one of the one or more architectural structures; and
using the acquired data to perform an operation, the operation effecting a state of at least one of a corresponding thread or the program code.
8. The computing device of claim 6, wherein, when using the time for which the program code is exposed to soft errors to determine the vulnerability of the program code to soft errors, the at least one processor core and the memory are configured to perform operations for:
computing the vulnerability for the program code to soft errors as a ratio of the amount of time when data is held in at least one of the one or more architectural structures to an overall execution time for the program code.
9. The computing device of claim 6, each of the one or more architectural structures comprises a corresponding structure defined in an instruction set architecture (ISA) for which the program code is written.
10. The computing device of claim 6, wherein, when analyzing the instructions for each of the two or more threads in the program code to identify the particular instructions in the two or more threads that perform the predetermined accesses of the one or more architectural structures, the at least one processor core and the memory are configured to perform operations for:
statically analyzing instructions for each of the two or more threads in the program code.
11. A non-transitory computer-readable storage medium storing program code that, when executed by a computing device, causes the computing device to perform operations for determining a vulnerability of multi-threaded program code to soft errors, the operations comprising:
analyzing instructions for each of two or more threads in the program code to identify particular instructions from the two or more threads that perform predetermined accesses of one or more architectural structures;
while executing instructions from the program code, monitoring the executing to determine when the particular instructions are executed and therefore when corresponding predetermined accesses are performed;
determining a time for which the program code is exposed to soft errors based on a timing of the corresponding predetermined accesses by determining an amount of time when data is held in at least one of the one or more architectural structures, the data to be used for performing corresponding predetermined accesses for at least one of the particular instructions, the determining the amount of time comprising, for each of the one or more architectural structures, maintaining a corresponding vulnerability counter, a value in the vulnerability counter set using a time counter and a last-accessed counter, the last accessed counter being updated when corresponding predetermined accesses of the architectural structure occur; and
using the time for which the program code is exposed to soft errors to determine the vulnerability of the program code to soft errors.
12. The non-transitory computer-readable storage medium of claim 11, wherein a predetermined access of the one or more architectural structures comprises:
acquiring data from at least one of the one or more architectural structures; and
using the acquired data to perform an operation, the operation effecting a state of at least one of a corresponding thread or the program code.
13. The non-transitory computer-readable storage medium of claim 11, wherein using the time for which the program code is exposed to soft errors to determine the vulnerability of the program code to soft errors comprises:
computing the vulnerability for the program code to soft errors as a ratio of the amount of time when data is held in at least one of the one or more architectural structures to an overall execution time for the program code.
14. The non-transitory computer-readable storage medium of claim 11, each of the one or more architectural structures comprises a corresponding structure defined in an instruction set architecture (ISA) for which the program code is written.

The claims below are in addition to those above.
All refrences to claim(s) which appear below refer to the numbering after this setence.

1. A frame structure used in a backlight module comprising:
a lower frame for holding components of the backlight module; and
an upper frame mounted on the lower frame for assembling the components of the backlight module;
wherein the upper frame has at least one T shape hooking element, and restrains the movements of the components of the backlight module in both cross and upright directions simultaneously;
the lower frame has at least one corresponding engaging element that can engage with at least one T shape hooking element; the at least one engaging element corresponding to the T shape hook is a T shape groove;
and the movement of each T shape hooking element is limited by a longitudinal portion and at least a latitudinal portion of the engaging element when the hooking element is engaged.
2. The frame structure as claimed in claim 1, wherein at least one T shaped hooking element is located at a periphery of the upper frame.