A comprehensive review of Single Event Transients on various MOS devices

PS Rajakumar, SS Kumar - IEEE Access, 2024 - ieeexplore.ieee.org
Due to the constant scaling of device sizes and the arrival of nanoscale technologies, Single-
Event Transients (SETs) are becoming an increasingly important problem in the design and …

Generative ai for cyber security: Analyzing the potential of chatgpt, dall-e and other models for enhancing the security space

S Sai, U Yashvardhan, V Chamola, B Sikdar - IEEE Access, 2024 - ieeexplore.ieee.org
This research paper intends to provide real-life applications of Generative AI (GAI) in the
cybersecurity domain. The frequency, sophistication and impact of cyber threats have …

Cost-effective and highly reliable circuit-components design for safety-critical applications

A Yan, Z Fan, L Ding, J Cui, Z Huang… - … on Aerospace and …, 2021 - ieeexplore.ieee.org
With the reduction of technology nodes now reaching 2 nm, circuits become increasingly
susceptible to external perturbations. Thereby, soft errors, such as single-node-upset (SNU) …

An efficient new design of nano-scale comparator circuits using quantum-dot technology

M Darbandi, S Seyedi, HMR Al-Khafaji - Heliyon, 2024 - cell.com
Traditional semiconductor-based technology has recently faced many issues, such as
physical scalability constraints and short-channel properties. Much research on nano-scale …

Coherent control of Surface Plasmon Polaritons Excitation via tunneling-induced transparency in quantum dots

F Badshah, M Abbas, Y Zhou, H Huang - Optics & Laser Technology, 2025 - Elsevier
A scheme for coupler-free excitation of Surface Plasmon Polaritons (SPPs) based on
tunneling-induced transparency (TIT) is proposed. The system consists of a top layer of …

A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security

AE Adeniyi, RG Jimoh, JB Awotunde - Computers and Electrical …, 2024 - Elsevier
Cyberattacks on the Internet of Things (IoT) may be avoided by implementing cybersecurity
protocols on IoT devices, platform packages, and Internet tools. A significant problem is …

Adaptive control strategy for microgrid inverters based on Narendra model

Q Wang, G Li, Z Chen, Z **g, Z Zhang - Scientific Reports, 2024 - nature.com
In recent years, microgrid technology has been widely studied and applied. However, with
times develo**, the installed capacity of distributed power generation devices has been …

A two-way trust routing scheme to improve security in fog computing environment

J Wang, Z Luo, C Wang - Cluster Computing, 2024 - Springer
Compliance with security requirements in the fog computing environment is known as an
important phenomenon in maintaining the quality of service due to the dynamic topology …

Energy-efficient design of quaternary logic gates and arithmetic circuits using hybrid CNTFET-RRAM technology

S ul Haq, E Abbasian, T Khurshid, VK Sharma - Physica Scripta, 2024 - iopscience.iop.org
Multi-valued logic (MVL) extends binary logic by providing a framework to represent
complex systems with more than two truth values. MVL was introduced to confront the …

Holomorphism and edge labeling: An inner study of latin squares associated with antiautomorphic inverse property moufang quasigroups with applications

MM Hazzazi, M Nadeem, M Kamran, I Naci Cangul… - …, 2024 - Wiley Online Library
Taking into account the most recent improvements in graph theory and algebra, we can
associate graphs of some mathematical structures with certifiable, widely known …