The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Spin Transfer Torque Magnetic Random Access Memory (STT-MRAM) is a leading candidate for embedded memory applications, with promises of low power, high performance, and non-volatility.
Spin Transfer Torque Magnetic Random Access Memories (STT-MRAM) are based on Magnetic Tunnel Junctions (MTJs) made out of two ferromagnetic electrodes separated by a MgO tunnel barrier.
We present for the first time a fully functional 40 nm perpendicular STT-MRAM macro (1 Mb, ×32/×64 IO) embedded into a foundry standard CMOS logic platform. We achieved target design specifications of 20 ns read access time and 20–100 ns write cycle time without redundancy repair at standard core and IO voltages. The full 1 Mb macro can be switched reliably with write pulse as short as 6 ns, which...
Nowadays, Memory Forensics is more acceptable in Cyber Forensics Investigation because malware authors and attackers choose RAM or physical memory for storing critical information instead of hard disk. The volatile physical memory contains forensically relevant artifacts such as user credentials, chats, messages, running processes and its details like used dlls, files, command and network connections...
Crosslinked polyethylene (XLPE) has been the cable insulation material of choice in many different transmission and distribution applications for many years and, while this material has many desirable characteristics, its thermo-mechanical properties have consequences for both continuous and emergency cable ratings which, in turn, have implications for system operational flexibility. In this paper,...
In this paper, we propose a new tomographic reconstruction method, called IOD-PVRMPP, to reconstruct 3D particle volumes from 2D particle images provided by the Tomographic Particle Image Ve-locimetry (Tomo-PIV) technique. Our method, based on marked point processes (or object processes), allows to solve the problem in a parsimonious way. It facilitates the introduction of prior knowledge and solves...
The recent rise of mobile applications such as Internet of Things (IoT), wearable electronics, and context aware computing has renewed the search for a universal embedded memory technology [1]. Such a technology should combine fast read/write, low voltage operation, low power consumption, non-volatility, infinite endurance, with CMOS process compatibility. Magnetic Random Access Memory based on Spin...
In this paper, a method for the identification of heat transfers on the surface of a material is investigated. From an experimental situation (the elaboration of amorphous hydrogenated silicon carbide coatings with a Plasma Assisted Chemical Vapour Deposition PACVD process), a thermal system described by a set of non linear partial differential equations is considered. From temperature measurements,...
Internet users are increasing day by day and hence browser related evidence provides crucial information regarding a cyber crime. The rate of possible cyber crimes are increased unimaginably with this high usage of popular social networking websites and online internet services for banking, shopping etc. Thus the need for collecting internet browsing related information through a Browser Forensics...
Due to the ever increasing growth rate of malwares, Memory Forensics has become unavoidable in a cyber crime investigation. This is because physical memory may contain crucial information that is available nowhere in the system hard disk. Memory Forensics deals with collection of forensically sound evidence from physical memory content of Suspect's system. This is a fast growing and challenging field...
Hyperspectral analysis is employed in many different areas, such as medicine, environmental studies, security and forensics. Focusing on law enforcement, ink discrimination has become an important factor for the detection of fraudulent documents. This paper proposes an approach for ink analysis in handwritten documents and pen verification using hyperspectral analysis and Least Square SVM classification...
In recent years, marked point processes have received a great deal of attention. They were applied with success to extract objects in large data sets as those obtained in remote sensing frameworks or biological studies. We propose in this paper a method based on marked point processes to reconstruct volumes of 3D particles from images of 2D particles provided by the Tomographic Particle Image Velocimetry...
In this paper we present a model for predicting performance of a distributed, reconfigurable computing cluster using commodity parts, specifically the Digilent OpenSPARC development board, and the SIRC Framework, developed by Microsoft Research. The goal of this work is to assist in determining the feasibility of deploying a similar system for a given problem. This work is aimed a low-budget and introductory...
In the present day scenario, large amount of information and data is being stored in the form of digital documents. Cyber forensics analysis tools need to deal with large volumes of data retrieved from the suspect's hard disk. Searching for relevant evidence from such vast volumes is not an easy task. Analyzing such massive volumes of data manually is impractical. It is obvious that the cyber investigator...
Attention Deficit Hyperactivity Disorder (ADHD) is a common learning disability in many children and adults. A prototype device, the F.O.C.U.S., was developed to help improve the academic performance of students with this disorder. Further development of the F.O.C.U.S. consists of enhancing the current prototype to make it non-stigmatizing so that undergraduate students with ADHD can use it to help...
We consider the problem of merging measurements when the sensors are likely to be affected by multiple malfunctions. An hybrid model is introduced which describes the dynamic behavior of the various sensors not only under each operating mode, but also during mode transitions. The data fusion problem is then written within the Bayesian probabilistic framework, as an estimation problem. Its optimal...
Current dormant storage reliabiction methods are out dated and may not represent current technology. Some customers are concerned the data supporting the storage reliability prediction method are too old and not reflective of the current technology capability. This paper provides an approach and documents the results of an ongoing case study that uses a binary logistic regression (BLR) model (both...
Developing models that simulate the behavior of different types of interacting biological cells can be a very time consuming and error prone task. CompuCell3D is an open source application that addresses this challenge. It provides interactive and customizable visualizations that help a user detect when a model is producing the desired behavior and when it is failing. It also allows for high quality...
Due to an increased popularity of assistive healthcare technologies activity recognition has become one of the most widely studied problems in technology-driven assistive healthcare domain. Current approaches for smart-phone based activity recognition focus only on simple activities such as locomotion. In this paper, in addition to recognizing simple activities, we investigate the ability to recognize...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.