Results 61 to 70 of about 12,729 (243)

RRAM Variability Harvesting for CIM‐Integrated TRNG

open access: yesAdvanced Electronic Materials, EarlyView.
This work demonstrates a compute‐in‐memory‐compatible true random number generator that harvests intrinsic cycle‐to‐cycle variability from a 1T1R RRAM array. Parallel entropy extraction enables high‐throughput bit generation without dedicated circuits. This approach achieves NIST‐compliant randomness and low per‐bit energy, offering a scalable hardware
Ankit Bende   +4 more
wiley   +1 more source

CMOS transceiver with baud rate clock recovery for optical interconnects [PDF]

open access: yes, 2004
An efficient baud rate clock and data recovery architecture is applied to a double sampling/integrating front-end receiver for optical interconnects. Receiver performance is analyzed and projected for future technologies. This front-end allows use of a 1:
Emami-Neyestanak, Azita   +3 more
core  

Neurodevelopment: Comparative connectomics and the study of circuit assembly

open access: yesCurrent Biology, 2021
A new study reveals the effects of specific single cell type perturbations on the assembly and function of a mechanosensory circuit in the Drosophila melanogaster larva with synaptic resolution. This work paves the way for the use of comparative connectomics to understand general principles governing the development of wiring specificity.
Dona' E., Jefferis G. S. X. E.
openaire   +3 more sources

A Review on Fundamentals of Noise-Shaping SAR ADCs and Design Considerations

open access: yesChips
A general overview of Noise-Shaping Successive Approximation Register (SAR) analog-to-digital converters is provided, encompassing the fundamentals, operational principles, and key architectures of Noise-Shaping SAR (NS SAR).
Victor H. Arzate-Palma   +3 more
doaj   +1 more source

Bit-Plane Extracted Moving-Object Detection Using Memristive Crossbar-CAM Arrays for Edge Computing Image Devices

open access: yesIEEE Access, 2018
In this paper, we present the hardware implementation of a novel algorithm for moving-object detection, which can be integrated with CMOS image sensors.
Nazgul Dastanova   +3 more
doaj   +1 more source

Fundamental Challenges, Physical Implementations, and Integration Strategies for Ising Machines in Large‐Scale Optimization Tasks

open access: yesAdvanced Electronic Materials, EarlyView.
Ising machines are emerging as specialized hardware solvers for computationally hard optimization problems. This review examines five major platforms—digital CMOS, analog CMOS, emerging devices, coherent optics, and quantum systems—highlighting physics‐rooted advantages and shared bottlenecks in scalability and connectivity.
Hyunjun Lee, Joon Pyo Kim, Sanghyeon Kim
wiley   +1 more source

Multi-cell battery protection system [PDF]

open access: yes, 1977
A multi-cell battery protection system is described wherein each cell has its own individual protective circuit. The protective circuits consist of a solid state comparator unit and a high current switching device such as a relay.
Nagle, W. J., Thomas, R. D.
core   +1 more source

Dual‐Mode Oscillations in SiOx‐Based Threshold Switching Devices for Unconventional Probabilistic Computing

open access: yesAdvanced Intelligent Discovery, EarlyView.
To enable versatile unconventional computing, a single SiOx threshold switching device is engineered to exhibit controllable dual‐mode oscillation. By modulating the input voltage, the device selectively provides stable full oscillation for oscillatory neural networks and stochastic probabilistic oscillation for probabilistic bits and true random ...
Hyeonsik Choi   +3 more
wiley   +1 more source

Feature Disentangling and Combination Implemented by Spin–Orbit Torque Magnetic Tunnel Junctions

open access: yesAdvanced Intelligent Systems, EarlyView.
Spin–orbit torque magnetic tunnel junctions (SOT‐MTJs) enable efficient feature disentangling and integration in image data. A proposed algorithm leverages SOT‐MTJs as true random number generators to disentangle and recombine features in real time, with experimental validation on emoji and facial datasets.
Xiaohan Li   +15 more
wiley   +1 more source

Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters

open access: yes, 2018
Data privacy is crucial when dealing with biometric data. Accounting for the latest European data privacy regulation and payment service directive, biometric template protection is essential for any commercial application.
Busch, Christoph   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy