Results 81 to 90 of about 1,173,380 (328)

All-Optical Address Decoder Using Injection-Locking Property of External-Cavity-Based Single-Mode FP-LD

open access: yesIEEE Photonics Journal, 2013
A novel all-optical address decoder (AOAD) using an external-cavity-based single-mode Fabry–Pérot laser diode (SMFP-LD) is proposed and demonstrated.
Hoai Tran Quoc   +2 more
doaj   +1 more source

A Graph-Based Semantics Workbench for Concurrent Asynchronous Programs [PDF]

open access: yes, 2016
A number of novel programming languages and libraries have been proposed that offer simpler-to-use models of concurrency than threads. It is challenging, however, to devise execution models that successfully realise their abstractions without forfeiting ...
A Corradini   +23 more
core   +3 more sources

Non‐Destructive Laser Nanopatterning of Superconducting Heterostructures in Topological Sn Thin Films

open access: yesAdvanced Materials, EarlyView.
We demonstrate successful fabrication of high‐quality α‐Sn/β‐Sn planar nanostructures with arbitrary shapes by focused laser irradiation on topological Dirac semimetal α‐Sn thin films. The irradiated regions transform into atomically smooth, superconducting β‐Sn with a critical temperature of 3.7 K.
Le Duc Anh   +5 more
wiley   +1 more source

Control and Simulation of Torque Converter Lock-up Clutch

open access: yesMATEC Web of Conferences, 2018
Considering the requirements of dynamic performance and quality during the torque converter locking process, a two parameters latch-up control strategy was designed, and a simulation method to study the control performance by use of processor in loop ...
Zhao Li-mei   +6 more
doaj   +1 more source

A Formal Verification of a Reputation Multi-Factor Authentication Mechanism for Constrained Devices and Low-Power Wide-Area Network Using Temporal Logic

open access: yesSensors, 2023
There are many security challenges in IoT, especially related to the authentication of restricted devices in long-distance and low-throughput networks. Problems such as impersonation, privacy issues, and excessive battery usage are some of the existing ...
Wesley R. Bezerra   +2 more
doaj   +1 more source

Field‐Free, Deterministic Giant Spin‐Orbit Torque Switching of 1.3 T Perpendicular Magnetization With Symmetry‐Lifted Topological Surface States

open access: yesAdvanced Materials, EarlyView.
We show a giant, bias‐field free, deterministic, spin‐orbit‐torque switching of perpendicular hard magnets with HC over 1.3 T. By combining the three‐fold 3m symmetry from topological insulator surface states with the rectangular mm2 symmetry from the 2 x 1 intercalation in Cr3Te4, the interface symmetry is significantly reduced into a unidirectional m
He Ren   +6 more
wiley   +1 more source

A generic persistence model for CLP systems (and two useful implementations) [PDF]

open access: yes, 2003
This paper describes a model of persistence in (C)LP languages and two different and practically very useful ways to implement this model in current systems. The fundamental idea is that persistence is a characteristic of certain dynamic predicates (Le.,
Cabeza Gras, Daniel   +4 more
core   +2 more sources

Functional Analysis Attacks on Logic Locking [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2019
Logic locking refers to a set of techniques that can protect integrated circuits (ICs) from counterfeiting, piracy and malicious functionality changes by an untrusted foundry. It achieves these goals by introducing new inputs, called key inputs, and additional logic to an IC such that the circuit produces the correct output only when the key inputs are
Deepak Sirone, Pramod Subramanyan
openaire   +2 more sources

Emergent Freestanding Complex Oxide Membranes for Multifunctional Applications

open access: yesAdvanced Materials, EarlyView.
This review surveys freestanding oxide membranes and covers fabrication and three pathways for studies and devices: strain‐free and strained membranes, and van der Waals‐integrated heterostructures. We show how coupled oxide responses map onto these routes and cross‐couple to expand behaviors.
Baowen Li   +6 more
wiley   +1 more source

TOP: A Combined Logical and Physical Obfuscation Method for Securing Networks-on-Chip Against Reverse Engineering Attacks

open access: yesIEEE Access
The Network-on-Chip (NoC) plays an important role in high-speed and efficient communication in System-on-Chip architectures. However, the NoC topology can be extracted through reverse engineering attacks with the goal of making illegal copies or ...
Mona Hashemi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy