Results 71 to 80 of about 1,173,380 (328)
General controller of power electronic equipment based on DSP+FPGA+CPLD
The traditional digital signal processor(DSP) control system has been widely applied in the control and protection of low voltage power electronic devices and achieved good control effect, but it can hardly achieved good control effect for the high ...
Liu Kui +3 more
doaj +1 more source
Laser phase modulation approaches towards ensemble quantum computing
Selective control of decoherence is demonstrated for a multilevel system by generalizing the instantaneous phase of any chirped pulse as individual terms of a Taylor series expansion.
D. Goswami +16 more
core +2 more sources
Spectrally Tunable 2D Material‐Based Infrared Photodetectors for Intelligent Optoelectronics
Intelligent optoelectronics through spectral engineering of 2D material‐based infrared photodetectors. Abstract The evolution of intelligent optoelectronic systems is driven by artificial intelligence (AI). However, their practical realization hinges on the ability to dynamically capture and process optical signals across a broad infrared (IR) spectrum.
Junheon Ha +18 more
wiley +1 more source
Mitigating SAT Attack on Logic Locking [PDF]
Logic locking is a technique that has been proposed to protect outsourced IC designs from piracy and counterfeiting by untrusted foundries. A locked IC preserves the correct functionality only when a correct key is provided. Recently, the security of logic locking is threatened by a new attack called SAT attack, which can decipher the correct key of ...
Yang Xie, Ankur Srivastava
openaire +3 more sources
Locking control of underground signal lights based on improved Kalman filter and state observer
During underground ramp transportation in non-coal mines, traditional signal light locking control method is ineffective due to insufficient UWB dynamic positioning accuracy, long sampling interval of vehicle positioning cards, and data loss.
WANG Xueming +3 more
doaj +1 more source
Removal Attacks on Logic Locking and Camouflaging Techniques
With the adoption of a globalized and distributed IC design flow, IP piracy, reverse engineering, and counterfeiting threats are becoming more prevalent.
Muhammad Yasin +3 more
semanticscholar +1 more source
The security and trustworthiness of ICs are exacerbated by the modern globalized semiconductor business model. This model involves many steps performed at multiple locations by different providers and integrates various Intellectual Properties (IPs) from
Gaurav Kolhe +7 more
semanticscholar +1 more source
Modular diffractive deep neural network metasurfaces encode and reconstruct holograms across layer combinations and wavelengths, enabling secure, multifunctional operation. Each layer acts independently yet composes jointly, yielding up to m(2N −1) channels for m wavelengths and N layers.
Cherry Park +4 more
wiley +1 more source
When combined with diverse sensors, soft robots significantly improve their functionalities and intelligence levels. However, most of the existing soft sensors require complex signal analysis devices or algorithms, which severely increase the complexity ...
Qin Jiang +5 more
doaj +1 more source
Real‐Time 3D Ultrasound Imaging with an Ultra‐Sparse, Low Power Architecture
This article presents a novel, ultra‐sparse ultrasound architecture that paves the way for wearable real‐time 3D imaging. By integrating a unique convolutional array with chirped data acquisition, the system achieves high‐resolution volumetric scans at a fraction of the power and hardware complexity.
Colin Marcus +9 more
wiley +1 more source

