The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The purpose of this research effort is to develop a numerical model for a novel tri-material, gate stack engineered double gate MOSFET considering quantum confinement. While developing this model a combination of 2-D Poisson's equation and 1-D Schrodinger equation was used to obtain the potential profile and inversion charge across the complete silicon film. The proposed DG MOSFET structure has been...
The use of digital forensics tools has become common in typical crime investigations involving computing and communication devices. As with any evidence in criminal investigations, the preservation of digital evidence is of critical importance for the success of the investigation. Cryptographic Hash Functions (CHFs) are used by digital forensic tools to ensure the preservation of digital evidence...
Hashing algorithms are used extensively in information security and digital forensics applications. This paper presents an efficient parallel algorithm hash computation. It's a modification of the SHA-1 algorithm for faster parallel implementation in applications such as the digital signature and data preservation in digital forensics. The algorithm implements recursive hash to break the chain dependencies...
Public-key infrastructure based cryptographic algorithms are usually considered as slower than their corresponding symmetric key based algorithms due to their root in modular arithmetic. In the RSA public-key security algorithm, the encryption and decryption is entirely based on modular exponentiation and modular reduction which are performed on very large integers, typically 1024 bits. Due to this...
In today's network-based cloud computing era, software applications are playing big role. The security of these software applications is paramount to the successful use of these applications. These applications utilize cryptographic algorithms to secure the data over the network through encryption and decryption processes. The use of parallel processors is now common in both mobile and cloud computing...
Emotions are an unstoppable and uncontrollable aspect of human reaction to an action. It is a proved mechanism that encompasses variation in emotions due to different acts, expectations, focus to goals, appraisal and resulting reactions. When human body experiences different emotions like fear, anger, sad, happiness then there is also change in different bio-signals which are flowing in human body...
Online learning is fast becoming a preferred medium of learning. It is estimated that 6 million college students took at least one online course last year. Online learning in technical education is primarily delivered through pre-recorded videos. We will discuss a virtual learning system in the context of electronics engineering education. This learning system models the circuits as well as the instruments...
The recent advances in technologies for communications have put online education at the forefront of modern education methodologies. The use of learning management systems have helped facilitate the shift towards online education but effective content and assessment management remain the key to ensuring a high quality of education. Each subject area presents its own challenges in effectively communicating...
We are at the crossroads of some fundamental changes that are taking place in the semiconductor industry. Power consumption has become one of the most important differentiating factors for semiconductor products due to a major shift in the market towards handheld consumer devices. Power is a primary design criterion for bulk of the semiconductor designs now. Power is a key reason behind the shift...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.