Results 41 to 50 of about 1,415,224 (299)

Practical Implementation of Memristor-Based Threshold Logic Gates [PDF]

open access: yesIEEE Transactions on Circuits and Systems I: Regular Papers, 2019
Current advances in emerging memory technologies enable novel and unconventional computing architectures for high-performance and low-power electronic systems, capable of carrying out massively parallel operations at the edge. One emerging technology, ReRAM, also known to belong in the family of memristors (memory resistors), is gathering attention due
Georgios Papandroulidakis   +4 more
openaire   +4 more sources

Simple generation of threshold for images binarization on FPGA

open access: yesIngeniería e Investigación, 2015
This paper proposes the FPGA implementation of a threshold algorithm used in the process of image binarization by simple mathematical calculations. The implementation need only one image iteration and its processing time depends on the size of the image.
Egidio Ieno   +3 more
doaj   +1 more source

VLSI implementations of threshold logic- a comprehensive survey

open access: yesIEEE Transactions on Neural Networks, 2003
This paper is an in-depth review on silicon implementations of threshold logic gates that covers several decades. In this paper, we will mention early MOS threshold logic solutions and detail numerous very-large-scale integration (VLSI) implementations including capacitive (switched capacitor and floating gate with their variations), conductance ...
Beiu, V.   +2 more
openaire   +3 more sources

StaTI: Protecting against Fault Attacks Using Stable Threshold Implementations

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Fault attacks impose a serious threat against the practical implementations of cryptographic algorithms. Statistical Ineffective Fault Attacks (SIFA), exploiting the dependency between the secret data and the fault propagation overcame many of the known
Siemen Dhooghe   +2 more
doaj   +1 more source

Trade-Offs for Threshold Implementations Illustrated on AES [PDF]

open access: yesIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2015
Embedded cryptographic devices are vulnerable to power analysis attacks. Threshold implementations (TIs) provide provable security against first-order power analysis attacks for hardware and software implementations. Like masking, the approach relies on secret sharing but it differs in the implementation of logic functions.
Bilgin, Begul   +4 more
openaire   +1 more source

Novel Genetic Risk Factor Identified for L‐Asparaginase‐Induced Pancreatitis in Pediatric Patients With Cancer

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background L‐asparaginase is a critical component in treatment protocols for pediatric acute lymphoblastic leukemia. Acute pancreatitis reactions can necessitate delays and, in some cases, discontinuation of L‐asparaginase, which compromises outcomes.
Edward J. Raack   +39 more
wiley   +1 more source

Implementation of floating gate MOSFET in inverter for threshold voltage tunability

open access: yesEPJ Web of Conferences, 2017
This paper presents the ability of floating gate MOSFET (FGMOS) threshold voltage to be programmed or tuned which is exploited to improve the performance of electronic circuit design.
Musa F.A.S.   +4 more
doaj   +1 more source

Function‐driven design of a surrogate interleukin‐2 receptor ligand

open access: yesFEBS Letters, EarlyView.
Interleukin (IL)‐2 signaling can be achieved and precisely fine‐tuned through the affinity, distance, and orientation of the heterodimeric receptors with their ligands. We designed a biased IL‐2 surrogate ligand that selectively promotes effector T and natural killer cell activation and differentiation. Interleukin (IL) receptors play a pivotal role in
Ziwei Tang   +9 more
wiley   +1 more source

Method of Removing the Cross-correlation Noise for Dual-input and Dual-output SAR [PDF]

open access: yesLeida xuebao, 2012
According to analysis of separating the mixed echo by suppressing the cross-correlation noise in dual-input and dual-output SAR system, a new method based on threshold filter and inverse filter was proposed.
Huang Ping-ping
doaj   +1 more source

Diffusion of technology and renewable energy in the G10 countries: A panel threshold analysis

open access: yesEnergy Strategy Reviews, 2023
The paper analyzes the threshold effect of technology innovation on renewable energy in the G10 countries through the panel threshold method. The outcome shows that technology innovation has a low impact on renewable energy when technology innovation is ...
Yi-Ming Li   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy