The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
x mol% Fe‐doped Ba(Zr0.2Ti0.8)O3‐50 mol%(Ba0.7Ca0.3)TiO3 (abbreviated as xFe:BCZT) ferroelectric ceramics with x = 0, 0.075, 0.375, 0.75, 1.5, and 3 are fabricated via conventional solid‐state reaction methods. Fe incorporates into the lattice, and all the xFe:BCZT ceramics show pure perovskite structure except 3Fe:BCZT ceramics in which tiny amount of iron oxide is detected via X‐ray diffraction...
Direct joining of Al back surface field (Al BSF) in a polycrystalline silicon solar cell using a green Sn-3.5Ag solder by the assistance of ultrasound was investigated. SEM, peel force, electrical resistance and open-circuit voltage (Voc) tests were used to study the effect of ultrasonic action time on the performance of the solar cell. The results show that with the increasing of ultrasonic action...
Approximate computing is an emerging computation paradigm that utilizes many applications' intrinsic error resilience to improve power and energy efficiency. Several approaches have been proposed to identify the non-critical computations by analyzing the output sensitivity to the accuracy of the results, and then perform approximate computing on these computations. However, these static approaches...
Approximate computing is an emerging computation paradigm that utilizes many applications' intrinsic error resilience to improve power and energy efficiency. Several approaches have been proposed to identify the non-critical computations by analyzing the output sensitivity to the accuracy of the results, and then perform approximate computing on these computations. However, these static approaches...
The Internet of Things (IoT) has become ubiquitous in our daily life as billions of devices are connected through the Internet infrastructure. However, the rapid increase of IoT devices brings many non-traditional challenges for system design and implementation. In this paper, we focus on the hardware security vulnerabilities and ultra-low power design requirement of IoT devices. We briefly survey...
To save resources for Internet of Things (IoT) devices, a proposed approach segments operands and corresponding basic arithmetic operations that can be carried out by approximate function units for almost all applications. The approach also increases the security of IoT devices by hiding information for IP watermarking, digital fingerprinting, and lightweight encryption.
Incorporating security protocols in IoT components is challenging due to their extremely constrained resources. We address this challenge by proposing a hardware-oriented lightweight authentication protocol based on device signature generated during voltage over-scaling (VOS). First, we demonstrate that VOS-based computing leaves a process variation dependent error signature in its approximate results...
Approximate computing has become one of the most popular computing paradigms in the era of the Internet of things and big data. It takes advantages of the error-tolerable feature of many applications, such as machine learning and image/signal processing, to reduce the resource required to deliver certain level of computation quality. In this paper, we propose an approximate integer format (AIF) and...
Contemporary integrated circuits are designed and manufactured in a globalized environment leading to concerns of piracy, overproduction and counterfeiting. Obfuscation has emerged as a promising approach to ensure supply chain security by countering the reverse engineering (RE) based attacks on integrated circuits. However, the state-of-the-art obfuscation methods use key gates or camouflage existing...
Obfuscation has emerged as a promising approach to ensure supply chain security by countering the reverse engineering (RE) based attacks on integrated circuits that violate intellectual property rights of the circuit designer. However, current obfuscation methods either rely on secure memory to store the key or incur large design overhead with camouflaged gates. We propose a set of don't care based...
Circuit obfuscation techniques have been proposed to conceal circuit's functionality in order to thwart reverse engineering (RE) attacks to integrated circuits (IC). We believe that a good obfuscation method should have low design complexity and low performance overhead, yet, causing high RE attack complexity. However, existing obfuscation techniques do not meet all these requirements. In this paper,...
Ring oscillator Physical Unclonable Function (RO PUF) is a popular silicon PUF due to its ease of implementation on both ASIC and FPGA. However, RO PUFs have severe reliability issues when the operating environment deviates from the nominal condition and security issues as cloning attacks have been reported. In this work, we propose to build configurable RO PUFs based on the notions of configurable...
Physical Unclonable Function (PUF) is one of the most promising hardware features that can be utilized to improve system security. Ring Oscillator (RO) PUF captures the delay difference of a pair or a group of ROs introduced during fabrication process and defines PUF secrecy based on such difference. In this paper, we propose a framework to build RO PUF at inverter level, instead of RO level. This...
Roadside infrastructure is becoming an important platform for information collection and dissemination. However, when a vehicle communicates with roadside infrastructure, it will leave a trace of its location information on the roadside units (RSUs) it communicates with, over time. These traces may reveal some private information about the vehicle such as driving patterns. In this paper, we consider...
Opinion leaders in bulletin board systems (BBS) play an important role during the formation of public opinion. Opinion leader mining has a positive effect on us to grasp and guide public opinion. The paper designs and implements an opinion leader mining system based on an improved PageRank algorithm using MapReduce. The improved PageRank algorithm uses the method of sentiment analysis to define the...
Silicon carbide (SiC) is an inorganic material which has non-linear conductivity characteristics. When mixed nano-size SiC into silicone rubber (SIR), the composites can achieve non-linear conductivity characteristics also. In this paper, the non-linear conductivity properties of 5wt%, 15wt%, 30wt%, 45wt% nano-SiC/SIR composites are investigated. The relationship between conductivity and electric...
The effect of nano-fillers on dielectric properties of Epoxy has been studied for years. However, with the same nano-particles component, there are some conflicting reports regarding the effect of nano-particles on the dielectric properties of composites. The different processing will result in different dispersion of nano-particles and different dielectric properties of composites as a result of...
It is well known that the electrical stress concentration contributes to the premature degradation on dielectric behavior and hydrophobicity of silicone rubber composite insulators. In order to homogenize the electric field distributions along surface of silicone rubber insulators, the non-linear silicone rubber composites filled with nano-silicon carbide (SiC) are prepared. The non-linear conductivity...
The characteristics of electrical breakdown in inorganic nano-Silica/Epoxy composites are studied. Nano Silica shows significant impact on electrical breakdown strength of nano-Silica/Epoxy composites. Appropriate proportion of inorganic nano Silica can improve the breakdown strength of the composites, but excessive fillers show opposite effect. The percolation and interfacial characteristics are...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.