Graphene integrated circuits: new prospects towards receiver realisation

Nanoscale ◽  
2018 ◽  
Vol 10 (1) ◽  
pp. 93-99 ◽  
Author(s):  
Mohamed Saeed ◽  
Ahmed Hamed ◽  
Zhenxing Wang ◽  
Mehrdad Shaygan ◽  
Daniel Neumaier ◽  
...  

This work demonstrates a design approach which enables the fabrication of fully integrated radio frequency (RF) and millimetre-wave frequency direct-conversion graphene receivers by adapting the frontend architecture to exploit the state-of-the-art performance of the recently reported wafer-scale CVD metal–insulator–graphene (MIG) diodes.

Author(s):  
Li Zhekun ◽  
Rajit Gadh ◽  
B. S. Prabhu

Industrial and consumer applications of Radio Frequency Identification (RFID) are explored. The state-of-the-art and development in RFID technology is reviewed. A currently operative smart parts based manufacturing system is described which uses RFID as the key technology. The role of RFID in the emerging Wireless Internet Manufacturing field is highlighted.


Sensors ◽  
2020 ◽  
Vol 20 (18) ◽  
pp. 5165
Author(s):  
Chen Dong ◽  
Yi Xu ◽  
Ximeng Liu ◽  
Fan Zhang ◽  
Guorong He ◽  
...  

Diverse and wide-range applications of integrated circuits (ICs) and the development of Cyber Physical System (CPS), more and more third-party manufacturers are involved in the manufacturing of ICs. Unfortunately, like software, hardware can also be subjected to malicious attacks. Untrusted outsourced manufacturing tools and intellectual property (IP) cores may bring enormous risks from highly integrated. Attributed to this manufacturing model, the malicious circuits (known as Hardware Trojans, HTs) can be implanted during the most designing and manufacturing stages of the ICs, causing a change of functionality, leakage of information, even a denial of services (DoS), and so on. In this paper, a survey of HTs is presented, which shows the threatens of chips, and the state-of-the-art preventing and detecting techniques. Starting from the introduction of HT structures, the recent researches in the academic community about HTs is compiled and comprehensive classification of HTs is proposed. The state-of-the-art HT protection techniques with their advantages and disadvantages are further analyzed. Finally, the development trends in hardware security are highlighted.


2021 ◽  
Vol 16 (2) ◽  
pp. 1-11
Author(s):  
Ney Laert Vilar Calazans ◽  
Taciano Ares Rodolfo ◽  
Marcos L. L. Sartori

The current technologies behind the design of semiconductor integrated circuits allow embedding billions of components in a singe silicon die, enabling the construction of very complex circuits in a tiny space, dissipating little energy and producing huge amounts of useful computational work. However, the current levels of integration for electronic components in silicon and similar materials are not easily managed, as parameter variations grow steadily, making the design tasks increasingly challenging. Synchronous techniques have dominated the digital system design landscape for many decades, but their costs are increasingly hard to cope with. Asynchronous design and particularly quasi-delay insensitive design promises to deal with the same challenges more gracefully in current advanced nodes, and possibly irrevocably in future technology nodes. This article proposes a review of the state of the art in using asynchronous circuit design techniques to achieve energy-efficient and robust digital circuit and system design. In particular, the definition of a robust digital circuit comprises addressing several aspects to which a digital system design is expected to be robust to, including: (1) voltage variations; (2) process variations; (3) temperature variations; (4) circuit aging. Besides addressing energy-efficiency and all the mentioned robustness aspects, this work also approaches some of the state-of-the-art tools available to deal with asynchronous design, and points to desirable research development to be conducted in these subjects in the future.


Electronics ◽  
2020 ◽  
Vol 9 (7) ◽  
pp. 1168
Author(s):  
Amira S. El Batouty ◽  
Hania H. Farag ◽  
Amr A. Mokhtar ◽  
El-Sayed A. El-Badawy ◽  
Moustafa H. Aly

Radio Frequency Identification (RFID) technology is widely utilized by businesses, organizations and wireless communication systems. RFID technology is secured using different ways of data encryption, e.g., Advanced Encryption Standard (AES). The Substitution Box (S-Box) is the core of AES. In this paper, a new algorithm is proposed to generate a modified S-Box with new keys, specifically a key and plaintext-dependent S-Box using an improved RC4 encryption algorithm with Logistic Chaotic Maps (LCM). The strength of the proposed S-Box is tested throughout the paper, and compared against the state-of-the-art S-Box implementations, namely, the static S-Box, dynamic S-box, KSA and PRGA S-Box, and RC4 S-Boxes with Henon chaotic maps. The comparison between the state-of-the-art S-Boxes and the proposed S-Box demonstrates that the use of the Logistic Chaotic Map increases the security of the S-Box and makes the differential and linear cryptography more sturdy. In particular, using the strict avalanche test, we demonstrate that the proposed S-Box improves the security by achieving a cipher text bit-flip ratio of 0.4765, which is closer to 0.5 (where half the bits are flipped), while maintaining a minimum elapsed time of 19 milliseconds for encryption and decryption.


Robotica ◽  
2009 ◽  
Vol 28 (6) ◽  
pp. 919-927 ◽  
Author(s):  
Christian Cipriani ◽  
Marco Controzzi ◽  
Maria Chiara Carrozza

SUMMARYThis paper presents the requirements, design criteria and methodology used to develop the design of a new self-contained prosthetic hand to be used by transradial amputees. The design is based on users' needs, on authors background and knowledge of the state of the art, and feasible fabrication technology with the aim of replicating as much as possible the functionality of the human hand. The paper focuses on the design approach and methodology which is divided into three steps: (i) the mechanical actuation units, design and actuation distribution; (ii) the mechatronic development and finally (iii) the controller architecture design. The design is presented here and compared with significant commercial devices and research prototypes.


Spatium ◽  
2004 ◽  
pp. 27-34
Author(s):  
Milica Bajic-Brkovic

The application of web-based technologies in developing the knowledge network for planning and development is the topic of this paper. Despite the fact that the web phenomenon is relatively new in the profession and not yet entirely explored, there is evidence which suggests that e-services are amongst the most rapidly growing sectors in the profession today. Numerous e-technologies for planning purposes have already been developed, and often fully integrated into the planning practice. This paper explores the state of the art in the field, and discusses the way the e-based alternative could be utilized in everyday planning practice. At the outset, the existing know-how is presented, followed by the assessment of the tools against the principles of a good planning practice. The challenges to the alternative are highlighted in the last section, and debated vis-?-vis the observed benefits. Implications for concrete planning practice are at the heart of the overall discussion.


2007 ◽  
Vol 16 (9) ◽  
pp. 2803-2808 ◽  
Author(s):  
Ding Shi-Jin ◽  
Huang Yu-Jian ◽  
Huang Yue ◽  
Pan Shao-Hui ◽  
Zhang Wei ◽  
...  

2021 ◽  
Vol 11 (12) ◽  
pp. 5591
Author(s):  
Joel Zagoya-López ◽  
Luis Adrián Zúñiga-Avilés ◽  
Adriana H. Vilchis-González ◽  
Juan Carlos Ávila-Vilchis

There are different alternatives when selecting removable prostheses for below the knee amputated patients. The designs of these prostheses vary according to their different functions. These prostheses designs can be classified into Energy Storing and Return (ESAR), Controlled Energy Storing and Return (CESR), active, and hybrid. This paper aims to identify the state of the art related to the design of these prostheses of which ESAR prostheses are grouped into five types, and active and CESR are categorized into four groups. Regarding patent analysis, 324 were analyzed over the last six years. For scientific communications, a bibliometric analysis was performed using 104 scientific reports from the Web of Science in the same period. The results show a tendency of ESAR prostheses designs for patents (68%) and active prostheses designs for scientific documentation (40%).


Sign in / Sign up

Export Citation Format

Share Document