about.jpg

Compact TSV modeling for low power application

[No abstract available]

Circuit Theory and Applications

Compact lumped element model for TSV in 3D-ICs

A wide-band lumped element model for a through silicon via (TSV) is proposed based on electromagnetic simulations. Closed form expressions for the TSV parasitics based on the dimensional analysis method are introduced. The proposed model enables direct extraction of the TSV resistance, self-inductance, oxide capacitance, and parasitic elements due to the finite substrate resistivity. The model's compactness and compatibility with SPICE simulations allows the fast investigation of a TSV impact on a 3-D circuit performance. The parameters' values of the proposed TSV model are fitted to the

Circuit Theory and Applications

Shapiro and parametric resonances in coupled Josephson junctions

The effect of microwave irradiation on the phase dynamics of intrinsic Josephson junctions in high temperature superconductors is investigated. We compare the current-voltage characteristics for a stack of coupled Josephson junctions under external irradiation calculated in the framework of CCJJ and CCJJ+DC models.

Circuit Theory and Applications

Breathing charge density waves in intrinsic Josephson junctions

We demonstrate the creation of a charge density wave (CDW) along a stack of coupled Josephson junctions (JJs) in layered superconductors. Electric charge in each superconducting layer oscillates around some average value, forming a breathing CDW. We show the transformation of a longitudinal plasma wave to CDW in the state corresponding to the outermost branch. Transition between different types of CDW's related to the inner branches of IV characteristic is demonstrated. The effect of the external electromagnetic radiation on the states corresponding to the inner branches differs crucially from

Circuit Theory and Applications

Reliability and Security Analysis of an Entanglement-Based QKD Protocol in a Dynamic Ground-to-UAV FSO Communications System

Quantum cryptography is a promising technology that achieves unconditional security, which is essential to a wide range of sensitive applications. In contrast to optical fiber, the free-space optical (FSO) link is efficiently used as a quantum channel without affecting the polarization of transmitted photons. However, the FSO link has several impairments, such as atmospheric turbulence and pointing errors, which affect the performance of the quantum channel. This paper proposes a quantum key distribution (QKD) scheme that uses a time-bin entanglement protocol over the FSO channel that suffers

Circuit Theory and Applications
Software and Communications

A simplification in integral frequency offset estimation based on joint detection algorithm for WiMAX 802.16e

Initial downlink synchronization for orthogonal frequency division multiple access ( OFDMA ) network access involves timing and frequency synchronization. The frequency offset is produced by oscillator drifts and time-varying Doppler shifts. In mobile WiMAX 802.16e carrier frequency offset (CFO) can be divided into: integral carrier frequency offset (ICFO) and fractional carrier frequency offset (FCFO). There are mainly three methods for CFO estimation: data-aided method, blind and semi-blind. This paper is based on the semi-blind method presented in "Joint detection of integral carrier

Circuit Theory and Applications
Software and Communications

Tunnel-Based EAP Effective Security Attacks WPA2 Enterprise Evaluation and Proposed Amendments

Tunnel-Based Extensible Authentication Protocol has become fundamental for wireless Network access Control. It provides authentication, privacy and authorization for enterprise network access protected by WPA/WPA2 security framework. WPA2 is considered the latest and most secure standard for wireless communication especially for Wi-Fi networks. However, WPA/WPA2-PSK have been lately threatened by advanced versions of wireless attacks. In this paper, we study WPA/WPA2-Enterprise authentication with Tunnel-Based EAP common methods focusing on their strength and weak points and the impact of

Circuit Theory and Applications
Software and Communications

Anonymous routing protocols in MANETs, a security comparative analysis

A Mobile Ad Hoc Network (MANET) is considered a type of network which is wireless and has no fixed infrastructure composed of a set if nodes in self organized fashion which are randomly, frequently and unpredictably mobile. MANETs can be applied in both military and civil environments ones because of its numerous applications. This is due to their special characteristics and self-configuration capability. This is due to its dynamic nature, lack of fixed infrastructure, and the no need of being centrally managed; a special type of routing protocols such as Anonymous routing protocols are needed

Circuit Theory and Applications
Software and Communications

Parallel and independent true random bitstreams from optical emission spectra of atmospheric microplasma arc discharge

In this study, we propose the possibility of generating several parallel and independent random bitstreams from the time-varying optical emission spectra of an atmospheric pressure air microplasma system. This is achieved by splitting the plasma arc emission into discrete wavelengths using an optical spectrometer and then monitoring the fluctuating intensities of each wavelength as an independent time series. As a proof of concept, we considered eight wavelengths centered at 377.8, 389.1, 425.8, 591.4, 630.5, 673.0, 714.2, and 776.4 nm corresponding to atomic emissions lines from species

Circuit Theory and Applications
Software and Communications
Mechanical Design

IoT Modes of Operations with Different Security Key Management Techniques: A Survey

The internet of things (IoT) has provided a promising opportunity to build powerful systems and applications. Security is the main concern in IoT applications due to the privacy of exchanged data using limited resources of IoT devices (sensors/actuators). In this paper, we present a classification of IoT modes of operation based on the distribution of IoT devices, connectivity to the internet, and the typical field of application. It has been found that the majority of IoT services can be classified into one of four IoT modes: Gateway, device to device, collaborative, and centralized. The

Artificial Intelligence
Circuit Theory and Applications