The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Now a day market demands compressed devices that operates on low voltage and causes less noise in the output. Advanced nano scale very large integrated circuits are facing significant timing closure challenges especially due to random on chip threshold voltage variations. Memristor can play an important role in improving the scalability and efficiency of existing memory technology. Accordingly this...
A low noise-figure (NF) and Unity power gain 1–100 GHz ultra-wideband Low Noise π Network with excellent linearity is reported. An π-match input network, Capacitive feedback with series and shunt inductive peaking techniques are used to achieve wideband impedance matching with low noise figure as well as flat unity gain response. This technique exists unity voltage and current gain so that matching...
In this world of e-technology, two users/systems requires to authenticate each other before exchanging the information. For this, there are numerous schemes proposed and analyzed for authentication. Indeed, in 2013, Chang et al.'s proposed an efficient untraceable dynamic identity system based on remote user authentication and claimed that the scheme is secure against various attack. In opposition,...
WHO predicts that in year 2012 there are about 347 million people worldwide have diabetes, more than 80% of diabetes deaths occur in different countries. WHO projects that diabetes will be the 7th major cause leading death in 2030. Diabetic Retinopathy caused by leakage of blood or fluid from the retinal blood vessels and it will damage the retina. Non-proliferative diabetic retinopathy (NPDR) is...
In this paper a low leakage CMOS based full wave bridge rectifier is analyzed. MOS based bridge rectifier circuit is being proposed in this study instead of the conventional diode bridge rectifier circuit because of its less reverse leakage parameters, proper utilization of switching mechanism results in high efficiency and suitability for high frequency application. It finds applications in many...
In this work, association rules are optimized by using improved particle swarm optimization algorithm (PSO Algorithm). Here improved PSO algorithm means classical PSO algorithm with additional operator in the forms of mutation of genetic algorithm. The basic shortcoming of PSO algorithm is to get trapped into local optima. So for improving this, mutation operator is used additionally in classical...
A compact slotted planar square ring-shaped micro strip antenna simultaneously suitable for point to point communication at 60 GHz is presented. The antenna is simulated by the software CST. CST, computer simulated technology simulator is employed to analyze the proposed antenna and simulated results on return loss, the E and H plane radiation pattern and polar plot gain is presented. The simulation...
The “geo-location” or “location-based services” is an authentication driven system that gives a strong layer in field of lost node localization and that limits the access of information content to specified locations or times with respective to lost node. Yet, the difficulty arises with the GPS related services makes it impractical to incorporate GPS in all the mobile nodes (MN) and subject to availability...
The recent development in the era of physiological instrumentation is to avoid the long duration hospitalization with the help wearable remote monitoring systems. Low power and portability along with the speed and high performance are the main issues related with such system design and their development. In this paper a wearable data acquisition system capable to measure body parameters like temperature,...
The convolutional coding technique is used to encode and decode a continuous stream of bits. The basic concept behind the convolution is the overlapping of two signals to form the other one. Because of the nature of convolution coding technique the binary bit stream source is convolved by applying some binary operations on them. It is a memory based system, which means the output bit is dependent...
Cooperative and Communication applications place an vital role in vehicular adhoc network(VANET)s for safety messages, warning messages, weather information, Traffic congestion information and road conditions information etc can be communicated from one vehicle node to another vehicle node and vehicle node to road side unit (RSU) within the ITS (Intelligent Transportation Systems). In this paper,...
This article clarifies another execution of productive D-Flip-Flop (DFF) utilizing Gate-Diffusion-Input (GDI) strategy and DSTC. This DFF outline permits diminishing force delay item and territory of the circuit, while keeping up low many-sided quality of rationale configuration. Execution correlation with other DFF plan systems is exhibited, regarding entryway range, number of gadgets, postpone and...
In this paper, we designed Schmitt trigger using CMOS low power design technique at 45nm technology. With the advancement of technology, different parameters have been calculated and analyzed to determine the performance of the circuit. With the change in technology, the aspect ratio of transistor sizing, variation in parameters also takes place. Different techniques are applied for the reduction...
In opportunistic networks, rather than accepting an end-to-end communication in the conventional Internet model. Opportunistic networking stems from the research area of mobile ad-hoc networks (MANET). Opportunistic networks are wireless networks in which a completely connected path from source to destination is not likely to exist. Mobile ad hoc routing protocol allows nodes with wireless adaptors...
Today, cloud computing serves as a request response model, where a client makes request for various available services on “pay as you go basis”. Cloud computing offers a dynamic flexible resource allocation phenomenon. For reliable and guaranteed services there must be a scheduling mechanism that all resources are efficiently allocated to satisfy the customer's request. Cloud services are based on...
In recent years, the immense and ubiquitous coverage area of vehicular network is growing very frequently as the computational power and deployment of modern vehicle's wireless connectivity and their service facilities are raised. VANET (Vehicular Ad hoc Network) have become an orientation to the researchers and users both for inventive utilization of wide range of safety and non-safety applications...
Leakage power dissipation, timing delay and high noise immunity in advanced embedded static random access memories cells are main critical issues in low power battery operated devices. The newly proposed FinFET based highly noise immune Power gated 6T SRAM design is targeting these areas and successfully suppress leakage power dissipation with maintaining stability of data in standby mode. A single...
In this paper presents the design and analysis of Conventional Operational Transconductance Amplifier for use in novel FinFET based OTA. OTA is an analog circuit and it has differential input voltage controlled current source (VCCS). OTA is a basic building block in analog circuit. In this, paper we focus on different-different supply voltage to find such type parameter like leakage power, integrated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.