The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A design of a low dropout voltage regulator (LDO) with fast settling response is being reported. This circuit is stable for full load current range from 0 to 150mA. A current boost circuit is being used to improve the transient response. There was an overshoot of mere 10.51mV and settling time achieved was 43.8ns. The PSRR achieved was -84.464dB upto 8.895kHz, and more than -70db till 136.218MHz....
Wireless Sensor Networks (WSNs) have attracted significant research interest in recent years because of their suitability to a wide range of real world applications. The envisioned Internet Protocol (IP) support for WSNs requires interoperability with existing management solutions, like Simple Network Management Protocol (SNMP), in order to provide remote management functionality and assure the correct...
In this paper we discuss different Subtracters design based on quantum dot cellular automata (QCA). QCA is an emerging nanotechnology for electronic circuits. It has the potential for attractive features such as faster speed, smaller size and low power consumption than transistor based technology. By taking the advantages of QCA we are able to design interesting computational architectures. The Subtracters:...
Although many studies proved that it was possible to embed application servers on a chip with limited resources, security considerations were generally marginalized. Due to their frontal position, application servers are subject to an increasing number of threats. These vulnerabilities are actually ignored in most cases mainly because of cost constraints. This paper introduces the concept of Secure...
A recent trend in the research of ROM-less DDFS architecture, which is endowed with high speed, low power and high SFDR features and will generate the sine or cosine waveforms within a broad frequency range. In this work one high-speed, low-power, and low-latency pipelined ROM-less DDFS has been proposed and implemented in Xilinx Virtex-II Pro FPGA. The proposed ROM-less DDFS design has 32 bit phase...
In this paper we give the first construction of a pseudorandom generator, with seed length O(log n), for CC0[p], the class of constant-depth circuits with unbounded fan-in MODp gates, for some prime p. More accurately, the seed length of our generator is O(log n) for any constant error ϵ > 0. In fact, we obtain our generator by fooling distributions generated by low degree polynomials, over Fp,...
An accurate new and simple numeral modeling of nano-scale dual gate n- MOSFET device in the ballistic region is presented. The model and the analysis is performed with channel length below 20 nm where electron transport is predominantly ballistic. In this paper a new developed modeling approach based on Boltzmann transport equation and Poisson equation in an n-channel nanoscale double-gate MOSFET...
Artificial bee colony (ABC) algorithm is a new population based metaheuristic approach inspired by intelligent foraging behavior of honeybee swarm. Since microelectronic circuit design deals with highly complicated nonlinear equations, obtaining optimal solution of these equations due to particular constraints in short time and acceptable error is of prime concern. Simpler structure and better result...
This article describes logical analysis infrastructure of associative tables (matrices), which enables to perform processing the interaction of the input vector with n-dimensional algebra-logical space, specified by using the ordered and structured tables of problem-oriented data, which represent the associative behavioral models of logical objects. To estimate the interaction of vectors in algebra-logical...
This paper proposes two novel designs of Adder/Subtractor using reversible logic gates. The first design is an implementation of two's complement Adder/Subtractor suitable for signed/unsigned numbers. The other design proposes a novel reversible gate that can work singly as a reversible Full Adder/Subtractor unit. The proposed Full Adder/Subtractor is then applied to design a reversible 4-bit ripple...
In this paper, the dynamics of elementary cellular automata rule 61 is investigated in the bi-infinite symbolic sequence space. This work provides the glider properties and the interactions in rule 61, including several natural gliders, a catalog of gliders and glider collisions, which were found in Wolfram's complex rules 110 and 54 before. In addition, It is also proved that rule 61 defines three...
Data loss incidents, where data of sensitive nature are exposed to the public, have become too frequent and have caused damages of millions of dollars to companies and other organizations. Repeatedly, information leaks occur over the Internet, and half of the time they are accidental, caused by user negligence, misconfiguration of software, or inadequate understanding of an application's functionality...
Rich media application enables plenty of interactive, information-rich services to enhance end user's viewing experience. In current standards released for such service, only one rendering space is defined to handle multiple types of content belonging to the same service. However, a new trend is to assign more than one terminal device to render rich media application in a cooperative way inside a...
According to the low efficiency of system testing, the longer test cycle, the single form of the test results, no standardized documents of tested results and other drawbacks of the traditional penetration testing system, this paper design and implement of an XML-based penetration testing system. The system uses SNMP, PING, Telnet and other ways to explore resource, is based on OVAL, CVE to assess...
In this paper, we present a review of automatic repeat request (ARQ) and hybrid ARQ (HARQ) mechanisms implemented or proposed in beyond 3rd generation (B3G) wireless systems based on OFDMA. In particular, we will focus on part of the IEEE 802.16 standard family (IEEE 802.16-2005, IEEE 802.16m) and on 3GPP Long Term Evolution (LTE). In the second part of this overview, some performance curves show...
Social networking on the Web has become an integral part of our lives. Merging of computing with physical things enabled the conversion of everyday objects into information appliances. This merging allows Smart Homes to offer new automation possibilities to their residents. We propose utilizing existing social networking infrastructures and their Web-based APIs in order to integrate Smart Homes to...
In this paper we analyze various user assignment and scheduling policies for neigbouring femtocell networks. The trade-off between capacity maximization and fairness is investigated and a combined user assignment and proportional fair (PF) scheduling procedure for a femtocell gateway is proposed. The flexibility of the proposed architecture in terms of capacity and fairness is studied via various...
The growing energy footprint and environmental costs of information and communication technologies has created an awareness of the need for greener communications. However, the task of reducing the energy footprint of wireless infrastructure and terminals is daunting due to the requirements of flexibility and reconfigurability in emerging paradigms like 4G. This paper addresses the flexibility and...
In this paper, we design and implement a hybrid WiMAX network testbed that integrates the NCTUns network emulator with a real-life WiMAX network. This hybrid WiMAX network testbed can seamlessly connect virtual networks (emulated by NCTUns) to a real-life WiMAX network. Thus, in this testbed real-life applications on real machines can exchange data with those on emulated (virtualized) network nodes...
Despite all the encouraging reports on the benefit of Partially Overlapped Channels (POCs), the relative simple interference models and rather arbitrary network settings considered in the literature make those reports questionable. In order to gain proper engineering insights, we look into the problem of improving network throughput by making use of POCs in this paper. Our perspectives are novel in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.