A comprehensive review of Single Event Transients on various MOS devices
PS Rajakumar, SS Kumar - IEEE Access, 2024 - ieeexplore.ieee.org
Due to the constant scaling of device sizes and the arrival of nanoscale technologies, Single-
Event Transients (SETs) are becoming an increasingly important problem in the design and …
Event Transients (SETs) are becoming an increasingly important problem in the design and …
Generative ai for cyber security: Analyzing the potential of chatgpt, dall-e and other models for enhancing the security space
This research paper intends to provide real-life applications of Generative AI (GAI) in the
cybersecurity domain. The frequency, sophistication and impact of cyber threats have …
cybersecurity domain. The frequency, sophistication and impact of cyber threats have …
Cost-effective and highly reliable circuit-components design for safety-critical applications
A Yan, Z Fan, L Ding, J Cui, Z Huang… - … on Aerospace and …, 2021 - ieeexplore.ieee.org
With the reduction of technology nodes now reaching 2 nm, circuits become increasingly
susceptible to external perturbations. Thereby, soft errors, such as single-node-upset (SNU) …
susceptible to external perturbations. Thereby, soft errors, such as single-node-upset (SNU) …
An efficient new design of nano-scale comparator circuits using quantum-dot technology
Traditional semiconductor-based technology has recently faced many issues, such as
physical scalability constraints and short-channel properties. Much research on nano-scale …
physical scalability constraints and short-channel properties. Much research on nano-scale …
Coherent control of Surface Plasmon Polaritons Excitation via tunneling-induced transparency in quantum dots
F Badshah, M Abbas, Y Zhou, H Huang - Optics & Laser Technology, 2025 - Elsevier
A scheme for coupler-free excitation of Surface Plasmon Polaritons (SPPs) based on
tunneling-induced transparency (TIT) is proposed. The system consists of a top layer of …
tunneling-induced transparency (TIT) is proposed. The system consists of a top layer of …
A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security
Cyberattacks on the Internet of Things (IoT) may be avoided by implementing cybersecurity
protocols on IoT devices, platform packages, and Internet tools. A significant problem is …
protocols on IoT devices, platform packages, and Internet tools. A significant problem is …
Adaptive control strategy for microgrid inverters based on Narendra model
Q Wang, G Li, Z Chen, Z **g, Z Zhang - Scientific Reports, 2024 - nature.com
In recent years, microgrid technology has been widely studied and applied. However, with
times develo**, the installed capacity of distributed power generation devices has been …
times develo**, the installed capacity of distributed power generation devices has been …
A two-way trust routing scheme to improve security in fog computing environment
J Wang, Z Luo, C Wang - Cluster Computing, 2024 - Springer
Compliance with security requirements in the fog computing environment is known as an
important phenomenon in maintaining the quality of service due to the dynamic topology …
important phenomenon in maintaining the quality of service due to the dynamic topology …
Energy-efficient design of quaternary logic gates and arithmetic circuits using hybrid CNTFET-RRAM technology
Multi-valued logic (MVL) extends binary logic by providing a framework to represent
complex systems with more than two truth values. MVL was introduced to confront the …
complex systems with more than two truth values. MVL was introduced to confront the …
Holomorphism and edge labeling: An inner study of latin squares associated with antiautomorphic inverse property moufang quasigroups with applications
Taking into account the most recent improvements in graph theory and algebra, we can
associate graphs of some mathematical structures with certifiable, widely known …
associate graphs of some mathematical structures with certifiable, widely known …