標題: Titlebook: Nanoelectronics, Circuits and Communication Systems; Proceeding of NCCS 2 Vijay Nath,J.K. Mandal Conference proceedings 2021 The Editor(s) [打印本頁] 作者: Cession 時間: 2025-3-21 16:06
書目名稱Nanoelectronics, Circuits and Communication Systems影響因子(影響力)
書目名稱Nanoelectronics, Circuits and Communication Systems影響因子(影響力)學科排名
書目名稱Nanoelectronics, Circuits and Communication Systems網(wǎng)絡公開度
書目名稱Nanoelectronics, Circuits and Communication Systems網(wǎng)絡公開度學科排名
書目名稱Nanoelectronics, Circuits and Communication Systems被引頻次
書目名稱Nanoelectronics, Circuits and Communication Systems被引頻次學科排名
書目名稱Nanoelectronics, Circuits and Communication Systems年度引用
書目名稱Nanoelectronics, Circuits and Communication Systems年度引用學科排名
書目名稱Nanoelectronics, Circuits and Communication Systems讀者反饋
書目名稱Nanoelectronics, Circuits and Communication Systems讀者反饋學科排名
作者: Carbon-Monoxide 時間: 2025-3-21 21:03 作者: 音樂學者 時間: 2025-3-22 00:55
Smita Desai,Rajendra Kanphadee specification formalizes with properties the expected correct behavior of the system. Programs are instrumented to extract necessary information from the execution and feed it to monitors tasked with checking the properties. From the perspective of a monitor, the system is a black box; the trace i作者: 謊言 時間: 2025-3-22 07:34 作者: 大火 時間: 2025-3-22 12:43
R. Kavithamains the prevalent approach for detecting timing side channels, it is computationally challenging for real-world applications. In addition, the detection techniques are usually restricted to “yes” or “no” answers. In practice, real-world applications may need to leak information about the secret. T作者: NOMAD 時間: 2025-3-22 13:12 作者: Ceramic 時間: 2025-3-22 20:36 作者: 怒目而視 時間: 2025-3-22 21:39 作者: 完整 時間: 2025-3-23 05:11
Vanita Verma,Vijay Kumar Jhaal system (CPS) consists of a network of agents, each of which measures (or computes) a continuous-time signal. Examples include distributed industrial controllers connected over wireless networks and connected vehicles in traffic. The safety requirements of such CPS, expressed as logical predicates作者: Contend 時間: 2025-3-23 06:48
Vijay Dave,Arpit D. Shrimankar,Devanshi Gokani,Abha Dashora an Android application that interacts closely with a cloud. Running RV-Droid on their devices, users can select targeted Android applications from Google Play (or a dedicated repository) and a property. The cloud hosts third-party RV tools that are used to synthesize AspectJ aspects from the proper作者: 閃光東本 時間: 2025-3-23 11:09
N. Prabakaran,L. Ramanathan,R. Kannadasanogic into the observed program. However, AspectJ imposes several limitations on the verification tools, such as a restricted join point model and the inability of weaving certain classes, particularly the Java and Android class libraries. In this paper, we show that our domain-specific aspect langua作者: ALOFT 時間: 2025-3-23 17:14 作者: laceration 時間: 2025-3-23 19:48
Mangal Deep Gupta,Saurabh Kumar Singh,R. K. Chauhanogic into the observed program. However, AspectJ imposes several limitations on the verification tools, such as a restricted join point model and the inability of weaving certain classes, particularly the Java and Android class libraries. In this paper, we show that our domain-specific aspect langua作者: Ingrained 時間: 2025-3-24 01:03 作者: 獨特性 時間: 2025-3-24 04:42
Shruti Gargogic into the observed program. However, AspectJ imposes several limitations on the verification tools, such as a restricted join point model and the inability of weaving certain classes, particularly the Java and Android class libraries. In this paper, we show that our domain-specific aspect langua作者: 健談的人 時間: 2025-3-24 07:44
Mayank Oraon,Ravi Shankar,Kishan Manjhi,Sabina Priyadarshini,Ramesh Narayanrs or on purpose as fault injections. Error Detection Codes add redundancy and make it possible to check for faults during runtime, making systems more resilient to bitflips. Codes require data integrity to be checked regularly. Such checks need to be used sparingly, because they cause runtime overh作者: 吸引力 時間: 2025-3-24 11:38
Nukala Srinivasa Raomance learning-based control policy (e.g. one trained as a neural network) is paired with a model-based safety controller. The safety controller is endowed with the abilities to predict whether the trained policy will lead the system to an unsafe state, and take over control when necessary. While th作者: bourgeois 時間: 2025-3-24 17:13 作者: 外形 時間: 2025-3-24 20:56
Santosh M. Herur,S. S. Kerur,H. C. Hadimanirs or on purpose as fault injections. Error Detection Codes add redundancy and make it possible to check for faults during runtime, making systems more resilient to bitflips. Codes require data integrity to be checked regularly. Such checks need to be used sparingly, because they cause runtime overh作者: 流動性 時間: 2025-3-25 01:35 作者: indicate 時間: 2025-3-25 04:26
,Computing Density of States for P?schl–Teller Potential in Double Quantum Well Structure,ied along quantized direction. Realistic band diagram is considered by assuming nonparabolic band along with variation of well-designed parameters. Simulated findings are compared with ideal rectangular profile, which speaks for lower electron concentration for the present work, thus suitable for be作者: 方舟 時間: 2025-3-25 11:14
Image Processing Using Median Filtering for Identification of Leaf Disease,significant job because of this reason. The productivity of the farm is affected by plant diseases. Different plant diseases are resulting to decrease in the quality and amount of plants. Presently, a day‘s study of plant disease means the study of patterns that we can see on the plants. It is hard 作者: ANN 時間: 2025-3-25 13:51
Cloud Computing: Security Issues and Challenges,mputing has expedited suggestions in additional than one approach; from inserting the in-depth tools to upscaling and downscaling at no matter purpose needed, transferral concerning in-depth assets of the suggestions. Cloud computing market has become exponentially throughout the years and is trusty作者: 種類 時間: 2025-3-25 15:54
Application of Knowledge and Data Mining to Build Intelligent Systems, nearly in every area of human endeavors. The disclosure of information in databases has inferred incredible significance and enthusiasm for ongoing years, particularly in national security regions where the entrance to the data is confined ordinarily. Specialists find it infeasible to analyze the l作者: 音的強弱 時間: 2025-3-25 21:42 作者: abysmal 時間: 2025-3-26 03:38
Multi-sized Multiple Text File Encryption System using One-dimensional Chaotic Map,ar chaotic map (PWLCM) to perform multi-sized multiple text file encryption. In the method, a group of text files is partitioned into number of sections, each one with 4-text elements. The text elements in each of the sections are then arranged into . dimensional text blocks. All the . blocks and th作者: AXIS 時間: 2025-3-26 06:22 作者: 舞蹈編排 時間: 2025-3-26 11:00 作者: Musculoskeletal 時間: 2025-3-26 14:19
Mathematical Modelling of Magnesium Block-Driven NMDA Receptor Response in CA1 Pyramidal Neuron for the calcium(Ca) current flowing through it drives several intracellular calcium mechanisms. We have developed a single-compartment model involving least mechanisms to study the NMDA receptor response to different input condition and to obtain the voltage-dependent relationship of magnesium(Mg) bloc作者: Intact 時間: 2025-3-26 17:10 作者: groggy 時間: 2025-3-26 20:59
Novel Compact Planar Four-Element MIMO Antenna for 4G/5G Applications,GHz, covering frequencies allotted for 4G Bands [B22, B42, B43, B48 and B49] and 5G New Radio bands [n77, n78 and n79]. The antenna structure comprises of?identical U-shaped and inverted U-shaped antenna elements placed over etched ground slot of 10?×?5 mm.. The antenna prototype is designed on FR4 作者: 技術(shù) 時間: 2025-3-27 03:12 作者: 殺子女者 時間: 2025-3-27 05:40 作者: CLAY 時間: 2025-3-27 11:18
Forecasting of Gold Prices Using Bayesian Regularization Neural Network, Ten?years gold price from January 2008 to May 2018 has been taken for prediction in this study using Bayesian neural network. Bayesian neural network is selected for prediction of price of gold because it is found suitable for time series data and does not depend on any historical feature. The fore作者: 滴注 時間: 2025-3-27 13:38
A New Proposed TCP for Faster Transmission of Packets, a new TCP implementation that reduces this overhead in connection-oriented protocol-TCP and therefore makes the transmission faster. A new method of congestion control has also been suggested for better performance.作者: 粗糙 時間: 2025-3-27 21:02
Design and Analysis of Koch Snowflake Geometry with Enclosing Ring Multiband Patch Antenna Coveringn using the fractal geometry properties results in an antenna that resonates at multiple frequencies that are 2.141?GHz, 3.352?GHz, 4.260?GHz, 4.622?GHz, 5.161?GHz, 5.462?GHz and 6.910?GHz and the bandwidth at the resonant frequencies are 115.6?MHz, 60.2?MHz, 102.1?MHz, 139.2?MHz, 115.6?MHz, 102?MHz作者: 溫順 時間: 2025-3-27 22:33
Phase Portrait Analysis of Continuous Stirred Tank Reactor (CSTR), balance and energy balance equations. Linearization of CSTR has been carried out using Taylor series. The stable and unstable regions of CSTR have been depicted through the phase portrait. The prime objective of this work is to present the variation of concentration and temperature with change in i作者: corporate 時間: 2025-3-28 05:45
Machine Learning-Based Implementation of Image Corner Detection Using SVM Algorithm for Biomedical changes meant for every edge-pixel is calculated in the picture, this edge-pixel is represented by four-dimensional feature vectors. It is made up of count of the edge pixels in window center and has four directions since their maximum gray-level direction change. This feature vector and support ve作者: 鉤針織物 時間: 2025-3-28 10:06 作者: 陳舊 時間: 2025-3-28 11:49 作者: 主動 時間: 2025-3-28 15:29
Relative QoS Investigation of VoIP Over LTE Networks,speeds, greater capacity and less latency, long term evolution (LTE) were created. VoIP is required to allow LTE network voice calls. This paper looks at VoIP service quality (QoS) through the LTE network by providing two case studies on the topology of the LTE network. Relative VoIP QoS analysis is carried out by parameter measurement.作者: 疲憊的老馬 時間: 2025-3-28 20:04
Novel Compact Planar Four-Element MIMO Antenna for 4G/5G Applications,substrate using IE3D simulation software. The MIMO antenna system exhibits good isolation above threshold and envelop correlation coefficient lower than 0.012 without the requirement of any additional decoupling structure.作者: Pde5-Inhibitors 時間: 2025-3-29 01:11
Phase Portrait Analysis of Continuous Stirred Tank Reactor (CSTR),nitial conditions. For various initial conditions, the behavior of the system has been analyzed. It has been observed that for a certain range of temperature, the system is found to be unstable under any initial conditions. This finding is the novelty of the work. Simulations have been carried out in MATLAB.作者: antenna 時間: 2025-3-29 03:49 作者: explicit 時間: 2025-3-29 11:07
Conference proceedings 2021ems, MEMS, IC design and testing, electronic system design and manufacturing, speech signal processing, digital signal processing, FPGA-based wireless communication systems and FPGA-based system design, Industry 4.0, e-farming, semiconductor memories, and IC fault detection and correction...?.作者: orthodox 時間: 2025-3-29 13:53
1876-1100 es as a reference resource for young scholars, researchers, .This book features selected papers presented at the Fifth International Conference on Nanoelectronics, Circuits and Communication Systems (NCCS 2019). It covers a range of topics, including nanoelectronic devices, microelectronics devices,作者: 樹膠 時間: 2025-3-29 16:01 作者: 舔食 時間: 2025-3-29 21:22
Forecasting of Gold Prices Using Bayesian Regularization Neural Network, is selected for prediction of price of gold because it is found suitable for time series data and does not depend on any historical feature. The forecasted price is also compared with actual price to find percentage error in predicted values. Finally, mean percentage error is calculated, which is found 1% here.作者: 墊子 時間: 2025-3-30 02:49 作者: Fermentation 時間: 2025-3-30 07:29
Digital Implementation of Sigmoid Function in Artificial Neural Network Using VHDL,t and expensive on hardware due of infinite exponential series. To overcome this problem, the proposed paper focuses on the linearity of sigmoid function by taking piecewise linear approximation which is in the form of .?=?.?+?..作者: 指耕作 時間: 2025-3-30 11:37 作者: Chromatic 時間: 2025-3-30 15:21 作者: Subjugate 時間: 2025-3-30 17:22
Conference proceedings 2021. It covers a range of topics, including nanoelectronic devices, microelectronics devices, material science, machine learning, Internet of things, cloud computing, computing systems, wireless communication systems, advances in communication 5G and beyond. Further, it discusses VLSI circuits and syst作者: 即席演說 時間: 2025-3-31 00:07
Ravi Prakash,Premkumar Chithalurury relation is inferred based on .-gapped pair model, that lumps symbols with similar empirical probability to reach a set of target labels on a set of samples. The obtained equivalence classes on the observation space are used to abstract traces that are used in training the prediction model..We de作者: 比喻好 時間: 2025-3-31 02:18
Arpan Deyasi,Suporna Bhowmick,Pampa Debnath RV approaches and tools that handle multithreaded Java programs. We discuss their assumptions, limitations, expressiveness, and suitability when tackling parallel programs such as producer-consumer and readers-writers. By analyzing the interplay between specification formalisms and concurrent execu作者: 纖細 時間: 2025-3-31 05:35 作者: Condescending 時間: 2025-3-31 12:33 作者: 彎腰 時間: 2025-3-31 13:22 作者: 女歌星 時間: 2025-3-31 19:09
Manmohan Bhardwaj,Aradhana,Aditya Kumar,Prashant Kumar,Vijay Natharacterize the output sequences of all the possible DNNs that, plugged into the autonomous system, guarantee the required safety properties. The assumptions can be leveraged as run-time monitors over a deployed DNN to guarantee the safety of the overall system; they can also be mined to extract loca作者: 陶瓷 時間: 2025-3-31 21:52
K. Abhimanyu Kumar Patro,Abhinav Agrawal,Raushan Raj,Bibhudendra Acharyally uncountably many safety violations to be reported. In this paper, we present the first decentralized algorithm for detecting conjunctive predicates in this setup. Our algorithm returns all possible violations of the predicate, which is important for eliminating bugs from distributed systems rega作者: DEVIL 時間: 2025-4-1 02:07
Smita Avinash Lonkar,K. T. V. Reddy in the stationary distribution, with a bound on its mixing time being known. These assumptions enable us to estimate a given property for the entire distribution of possible executions of the monitored POMC, by observing only a single execution. Our monitors observe a long run of the system and, af作者: 榮幸 時間: 2025-4-1 06:09