Results 31 to 40 of about 520,666 (188)

A Cooperative Coevolutionary Cuckoo Search Algorithm for Optimization Problem

open access: yesJournal of Applied Mathematics, 2013
Taking inspiration from an organizational evolutionary algorithm for numerical optimization, this paper designs a kind of dynamic population and combining evolutionary operators to form a novel algorithm, a cooperative coevolutionary cuckoo search ...
Hongqing Zheng, Yongquan Zhou
doaj   +1 more source

High‐Frequency Operation of Vertical Organic Field‐Effect Transistors

open access: yesAdvanced Science, 2022
The high‐frequency and low‐voltage operation of organic thin‐film transistors (OTFTs) is a key requirement for the commercial success of flexible electronics.
Marco Höppner   +6 more
doaj   +1 more source

Design study of a thermocouple power sensor as a monolithic fin-line [PDF]

open access: yes, 2011
Making traceable power measurements above 110 GHz using current measurement technologies is challenging. We investigate a design of power sensor consisting of a thermocouple-based integrated circuit (IC) mounted as a finline component in WR-6 waveguide ...
Jones, Mark Hedley, Scott, Jonathan B.
core   +2 more sources

Electrical and 850 nm Optical Characterization of Back-Gate Controlled 22 nm FDSOI PIN-Diodes Without Front-Gate

open access: yesIEEE Journal of the Electron Devices Society
We present electrical and optical $(\lambda =\rm {850~nm })$ measurement results of back-gate controlled SOI PIN-diodes without a front-gate, with an intrinsic Si film thickness of only ${\sim }\rm 6nm $ .
Jelle H. T. Bakker   +4 more
doaj   +1 more source

A Closer Look at the Chaotic Ring Oscillators based TRNG Design

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
TRNG is an essential component for security applications. A vulnerable TRNG could be exploited to facilitate potential attacks or be related to a reduced key space, and eventually results in a compromised cryptographic system. A digital FIRO-/GARO-based
Shuqin Su   +6 more
doaj   +1 more source

An Analog Integrated Circuit Design Laboratory [PDF]

open access: yesProceedings 2003 IEEE International Conference on Microelectronic Systems Education. MSE'03, 2004
We present the structure of an analog integrated circuit design laboratory to instruct at both, senior undergraduate and entry graduate levels. The teaching material includes: a laboratory manual with analog circuit design theory, pre-laboratory exercises and circuit design specifications; a reference web page with step by step instructions and ...
Mondragon-Torres, A.F.   +4 more
openaire   +2 more sources

Si and SiGe Nanowire for Micro-Thermoelectric Generator: A Review of the Current State of the Art

open access: yesFrontiers in Materials, 2021
In our environment, the large availability of wasted heat has motivated the search for methods to harvest heat. As a reliable way to supply energy, SiGe has been used for thermoelectric generators (TEGs) in space missions for decades.
You Li   +10 more
doaj   +1 more source

Probe modeling for millimeter-wave integrated-circuit horn antennas [PDF]

open access: yes, 1992
Integrated-circuit probe-excited horn-antenna arrays etched in silicon are well developed. They are a very promising class of antenna arrays for milli-meter and submillimeter applications.
Chiao, Jung-Chih   +3 more
core   +1 more source

Embedding delay‐based physical unclonable functions in networks‐on‐chip

open access: yesIET Circuits, Devices and Systems, 2021
Physical unclonable functions (PUFs) are emerging as security primitives by exploiting the intrinsic device features in various hardware security solutions.
Prasad Nagabhushanamgari   +3 more
doaj   +1 more source

Kohonen neural network and symbiotic-organism search algorithm for intrusion detection of network viruses

open access: yesFrontiers in Computational Neuroscience, 2023
IntroductionThe development of the Internet has made life much more convenient, but forms of network intrusion have become increasingly diversified and the threats to network security are becoming much more serious.
Guo Zhou   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy