In this work, we analyze the dependence of steep subthreshold (S-slope) on device and bias parameters of Junctionless (JL) MOSFETs. It is observed that for certain parameters and bias conditions, the JL transistor can...
详细信息
In this work, we analyze the dependence of steep subthreshold (S-slope) on device and bias parameters of Junctionless (JL) MOSFETs. It is observed that for certain parameters and bias conditions, the JL transistor cannot be turned OFF resulting in a single transistor latch. This phenomenon is an extreme case of impact ionization in JL MOSFETs. It is shown that thicker values of silicon film thickness and gate oxide along with higher drain bias can drive the JL MOSFET in to the latch state.
The present work reports on the substantial benefits of underlap Source/Drain (S/D) design in moderately inverted nanoscale MOSFETs to significantly enhance key analog/RF performance metrics. It is demonstrated that u...
详细信息
The present work reports on the substantial benefits of underlap Source/Drain (S/D) design in moderately inverted nanoscale MOSFETs to significantly enhance key analog/RF performance metrics. It is demonstrated that underlap S/D design alleviates the inherent trade-offs between bandwidth, gain and linearity for low power RF CMOS nanodevices. Optimal underlap region parameters are identified and design trade-offs examined. The results are significant for RFICs with nanoscale MOSFETs in emerging technologies.
In this work, we analyze the sensitivity of steep subthreshold slope (S-slope) values exhibited by Junctionless (JL) MOSFETs on device parameters. The steep S-slope values (
In this work, we analyze the sensitivity of steep subthreshold slope (S-slope) values exhibited by Junctionless (JL) MOSFETs on device parameters. The steep S-slope values (
Medical facilities are vital ingredients which can make or break lives. In such critical matters, proper management of Private Health Information (PHI) of each individual is very necessary. In many foreign countries, ...
详细信息
Traffic is rigorous problem in the city of any developing country today. And it is increasing day by day as new vehicle are being added to the roads rapidly but accordingly infrastructure is not increasing. The main r...
详细信息
Traffic is rigorous problem in the city of any developing country today. And it is increasing day by day as new vehicle are being added to the roads rapidly but accordingly infrastructure is not increasing. The main reasons behind this is buying capacity of person has increased, the vehicle cost has reduced, the driving license issued without proper testing, people do not know the rules properly or some of them doesn't want to follow it, etc. There are many limitations to control the above cause. With the use of technology available it is possible to control the traffic of the concern area. In this paper we try to calculate the traffic volume at any junction and its nearby junctions. With the use of theses data we can control the signals of these junctions to clear the traffic in the area. This may also help to avoid the traffic jams in the area.
Secure Multi party Computation (SMC) is a paradigm that keeps data of individual parties as secret and provides the private data for computation to evaluate some function of their common interest. The outcome of the c...
详细信息
Secure Multi party Computation (SMC) is a paradigm that keeps data of individual parties as secret and provides the private data for computation to evaluate some function of their common interest. The outcome of the computation is made available to all the parties. Cloud Computing is a paradigm shift from the distributed computing where an organization uses resources "as service". With the"pay-as-you-go" model, an organization can improve efficiency while minimizing the expenditure and the operation overhead. However, users of the cloud are worrying about the privacy of their data that has been supplied to the cloud provider. The solutions to these problems can be provided by the protocols of the Secured Multi party Cloud Computing (SMCC). In this tutorial, we propose SMC solution techniques that can be embedded while designing architecture of cloud computing especially when multiple cloud users jointly compute some function of their private data inputs. With our experience of developing protocols and devising algorithms for SMC problem we anticipate a crucial role of SMC in cloud computing. In this tutorial, we explore such scenario while discussing various protocols of SMC and their applicability in cloud computing, with the design of SMCC Architecture.
A mobile ad-hoc network(MANET) is a self-configuring network of mobile routers(and associated hosts) connected by wireless *** routers and hosts are free to move randomly and organize themselves *** allows mobile node...
详细信息
A mobile ad-hoc network(MANET) is a self-configuring network of mobile routers(and associated hosts) connected by wireless *** routers and hosts are free to move randomly and organize themselves *** allows mobile nodes to communicate directly without any centralized *** examples include establishing survivable,efficient,dynamic communication for emergency/rescue operations,disaster relief efforts,and military *** network scenarios cannot rely on centralized and organized connectivity,and can be conceived as applications of Mobile Ad Hoc *** all these application data or file sharing occurs between the *** in ad hoc networks,since mobile host move freely network partition occurs frequently thus data availability in Ad-hoc network is *** this paper,an efficient Data Replication technique for Mobile Ad-hoc networks is proposed that improve data availability by considering all the issues related with MANET such as power consumption,resource availability,response time and consistency management.
Medical facilities are vital ingredients which can make or break lives. In such critical matters, proper management of Private Health Information (PHI) of each individual is very necessary. In many foreign countries, ...
详细信息
Medical facilities are vital ingredients which can make or break lives. In such critical matters, proper management of Private Health Information (PHI) of each individual is very necessary. In many foreign countries, Information technology has made a revolutionary impact in the medical sector too, providing with absolute paperless hospitals. Several emergency facilities are available, and doctors too use a tablet PC or a palmtop for complete patient's record retrieval and for diagnosis and treatment. No more files needs to be managed for individual patients. Thus, the hospital server is most vulnerable to all the threats pertaining to information thefts, frauds, unauthorized modification or any other crime. In such a scenario, the server and its information safety is a crucial concern for all the hospital management, as any invalid access can cost a life or even more.
Routing in MANET is very important issue as dynamic topology of MANET makes routing very difficult. In this paper we are comparing two on-demand routing protocol namely Ad hoc on demand distance vector (AODV) and Dyna...
详细信息
Mobile ad hoc Networks refers to the infrastructure less, resource poor wireless networks whose interaction is unplanned in such a way that location of participating nodes and parties can not be identifiable. The mobi...
详细信息
暂无评论