about.jpg

Filter by

Modeling and characterization of carrier mobility for truncated conical quantum dot infrared photodetectors

In the present paper, a theoretical model for calculating the carrier mobility which is a result of the existence of a truncated conical quantum dots of n-type quantum dot infrared photodetectors (QDIPs) is developed. This model is built on solving Boltzmann’s transport equation that is a complex integro-differential equation describing the carrier transport. The time-domain finite-difference

Circuit Theory and Applications

FPAA-based realization of filters with fractional laplace operators of different orders

A simple and direct procedure for implementing fractional-order filters with transfer functions that contain Laplace operators of different fractional orders is presented in this work. Based on a general fractional-order transfer function that describes fractional-order low-pass, high-pass, band-pass, band-stop and all-pass filters, the introduced concept deals with the consideration of this

Circuit Theory and Applications

Reliability and Security Analysis of an Entanglement-Based QKD Protocol in a Dynamic Ground-to-UAV FSO Communications System

Quantum cryptography is a promising technology that achieves unconditional security, which is essential to a wide range of sensitive applications. In contrast to optical fiber, the free-space optical (FSO) link is efficiently used as a quantum channel without affecting the polarization of transmitted photons. However, the FSO link has several impairments, such as atmospheric turbulence and

Circuit Theory and Applications
Software and Communications

Stochastic modeling of mushroom—waveguide photodetectors

Waveguide photodetectors (WGPDs) are one of the promising candidates to solve the tradeoff between the quantum efficiency and the transit time in the surface illuminated photodiodes where the lightwave is incident laterally perpendicular to the direction of the flow of generated carriers, enhancing both high speed and quantum efficiency. In Mushroom-WGPDs, the performance degradation due its

Circuit Theory and Applications
Innovation, Entrepreneurship and Competitiveness

IoT Modes of Operations with Different Security Key Management Techniques: A Survey

The internet of things (IoT) has provided a promising opportunity to build powerful systems and applications. Security is the main concern in IoT applications due to the privacy of exchanged data using limited resources of IoT devices (sensors/actuators). In this paper, we present a classification of IoT modes of operation based on the distribution of IoT devices, connectivity to the internet, and

Artificial Intelligence
Circuit Theory and Applications

Real-Time Dorsal Hand Recognition Based on Smartphone

The integration of biometric recognition with smartphones is necessary to increase security, especially in financial transactions such as online payments. Vein recognition of the dorsal hand is superior to other methods such as palm, finger, and wrist, as it has a wide area to be captured and does not have any wrinkles. Most current systems that depend on dorsal hand vein recognition do not work

Artificial Intelligence
Circuit Theory and Applications
Software and Communications

General Trans-Compiler based Mobile Applications Converter

Deployment on different platforms has been a great issue for mobile companies that aim to maximize the return on investments by making their mobile applications available on different mobile platforms. Consequently, the app may be developed several times to match different platforms. Therefore, there is a need to have solutions that enable the developers to develop the app once, and run it

Artificial Intelligence

Securing Hardware from Malicious Attacks

Hardware security is considered a major design and manufacturing target area with a broad range of research and development topics such as protection of intellectual property (IP), metering of hardware, detection of hardware Trojans, and a lot of other topics. This paper discusses Trojan realization in integrated circuits (ICs), as well as the possible security measures, also exploring the usage

Artificial Intelligence

Utilization of Machine Learning In RTL-GL Signals Correlation

Verification is an important part of the Electronic Design Automation (EDA) design flow which currently takes a considerable amount of time. During the synthesis process, Different optimizations are done to the Register-Transfer-Level (RTL) code to optimize the power, area, and speed of the circuit. These optimizations result in changes in the names of signals at the gate level. Automatic signal

Artificial Intelligence

Vehicle Software Update over ICN Architectures

The Internet Protocol (IP) architecture could not fully satisfy Vehicular Ad-hoc Networks (VANETs) needed efficiency due to their dynamic topology and high mobility. This paper presents a technique to update the software of Electronic Control Units (ECUs) in vehicles using Information Centric Network (ICN) architecture. The proposed technique replaces Flashing Over The Air (FOTA) using IP with

Artificial Intelligence