376 research outputs found

    Analytical Modeling of Nanoscale 4H-SiC MOSFETs for High Power Applications

    Get PDF
    Threshold voltage instability was investigated for 4H-SiC MOSFETs with SiO2, Si3N4 and HFO2 gate oxides. Threshold voltage changes observed in the drain current Vs. gate voltage (ID-VG) characteristics was determined using various gate voltage sweeps at room temperature. Three types of MOSFETs show different instability characteristics. Depending on gate voltage, many difficulties come up with 4H-SiC MOSFETs, such as low mobility and poor reliability. The characteristics like channel potential, field distribution and the threshold voltage of the proposed models of MOSFETs, 4H-SiC and SOI-4H-SiC were compared with simulator results to validate the models. Short channel effects (SCEs) were also investigated and compared with the existing nanoscale silicon MOSFETs The surface potential model is calculated by using the two-dimensional Poisson equation. The specification of the model are examined by several MOSFET parameters such as body doping concentration, metal gate work function, silicon carbide layer thickness, thickness of metal gate oxide layer, buried oxide thickness, drain to source voltage, and gate to source voltage. The outcomes of modeling and simulation of 4H-SiC MOSFETs model show that the proposed models can reduce short channel effects more than the Silicon MOSFETs. Proposed models highly reduces the drain-induced-barrier-lowering (DIBL) to meet the performance fullfilmant in Nano electronic applications when compared to silicon MOSFETs. Establishing the results, we have noticed that this model can be utilized as a useful tool for the characterization and design of high-efficiency 4H-SiC nanoscale MOSFETs. By matching the two-dimensional device simulation results with analytical modeling, the validity of the recommended models are proven

    DVFS using clock scheduling for Multicore Systems-on-Chip and Networks-on-Chip

    Get PDF
    A modern System-on-Chip (SoC) contains processor cores, application-specific process- ing elements, memory, peripherals, all connected with a high-bandwidth and low-latency Network-on-Chip (NoC). The downside of such very high level of integration and con- nectivity is the high power consumption. In CMOS technology this is made of a dynamic and a static component. To reduce the dynamic component, Dynamic voltage and Fre- quency Scaling (DVFS) has been adopted. Although DVFS is very effective chip-wide, the power optimization of complex SoCs calls for a finer grain application of DVFS. Ideally all the main components of an SoC should be provided with a DVFS controller. An SoC with a DVFS controller per component with individual DC-DC converters and PLL/DLL circuits cannot scale in size to hundreds of components, which are in the research agenda. We present an alternative that will permit such scaling. It is possible to achieve results close to an optimum DVFS by hopping between few voltage levels and by an innovative application of clock-gating that we term as clock scheduling. We obtain an effective clock frequency by periodically killing some clock cycles of a master clock. We can apply voltage scaling for some of the periodic clock schedules which yield effective clock 1/2, 1/3, . . . By dithering between few voltages we obtain results close to an ideal DVFS system in simple pipelined circuits and in a complex example, a NoC’s switch. Again in the context of a NoC, we show how clock scheduling and voltage scaling can be automatically determined by means of a proportional-integral loop controller that keeps track of the network load. We describe in detail its implementation and all the circuit-level issues that we found. For a single switch, result shows an advantage of up to 2X over simple frequency scaling without voltage scaling. By providing each NoC’s switch with our simple DVFS controller, power saving at network level can be significantly more than what a a global DVFS controller can get. In a realistic scenario represented by network traces generated by video applications (MPEG, PIP, MWD, VoPD), we obtain an average power saving of 33%. To reduce static power, the Power-Gating (PG) technique is used and consists in switching- off power supply of unused blocks via pMOS headers or nMOS footers in series with such blocks. Even though research has been done in this field, the application of PG to NoCs has not been fully investigated. We show that it is possible to apply PG to the input buffers of a NoC switch. Their leakage power contributes about 40-50% of total NoC power, hence reducing such contribution is worthwhile. We partitioned buffers in banks and apply PG only to inactive banks. With our technique, it is possible to save about 40% in leakage power, without impact on performance

    Aspects of Feminist Writing: A Presentation of Common Issues

    Get PDF
    Feminist literary criticism is a literary criticism knowledgeable by feminist theory, or, more broadly, by the politics of feminism. It uses feminist principles and ideology to critique the language of literature. This school of thought seeks to analyze and describe the ways in which literature portrays the narratives of male domination by exploring the economic, social, political, and psychological forces embedded within literature. Feminism emerged as an important force in the western world in 1960s when women realized the attitude of their male colleagues who swore about equality, was actually the strategy used by them to keep women subservient, then a revolution by women to fight against them, and against racism and sexism was felt. This awakening spread over and as a result feminist criticism emerged on as an off –shoot of women’s Liberation Movement. Beginning with the interrogation of male-centric literature that portrayed women in a demeaning and oppressed model, theorist such as Marry Ellman, Kate Millet and Germaine Greer challenged past imaginations of the feminine within literary scholarship. It is very important for us to know that who these women writers are, what did they write and what were the sources of their writings. The present paper focuses on some of the above said important aspects of feminist writings and some of famous feminist writers also

    Securing User Data in Local Connectivity using Multicast Key Agreement

    Get PDF
    In this paper, we gain knowledge of crew key contract means more than one parties need to create a original secret key for use to alternate know-how securely. The staff key agreement with an arbitrary connectivity graph, where each and every consumer is most effective aware of his neighbor and has no expertise concerning the existence of alternative users. Extra, he has no expertise concerning the community topology. We implement the present procedure with extra time efficient method and provide a multicast key new release server which is expected in future scope with the aid of current authors. We exchange the Diffie Hellman key trade protocol by using a new multicast key exchange protocol that can work with one to at least one and one to many functionality. We additionally tend to enforce a robust symmetric encryption for bettering file protection in the procedure

    Role of Organic Sources of Nutrients in Rice (Oryza sativa) Based on High Value Cropping Sequence

    Get PDF
    The organic nitrogen (N) nutrition of organic manuring with biofertilizers had the highest rice equivalent grain yield, production efficiency, net energy return, as well as net monetary return and profitability in rice-based cropping sequence. The different rice-based cropping sequences did not differ with respect to yield and quality parameters. However, the organic N nutrition with organic manures along with biofertilizers proved significantly superior with respect to yield and quality parameters of rice, potato, and onion, respectively. The different rice-based cropping sequences differ with respect to nutrient uptake, e.g., rice-maize-onion had the highest removal of major (N, P, K), secondary (S), and micronutrients (Zn, Fe, Mn, Cu) than the rest of cropping sequence, which was significantly superior to the rest of the sequences. The organic N nutrition with organic manures along with biofertilizers proved superior due to its visible favorable effect on soil health with respect to nutrient status and microbial count and this indicates the utilization of this low-cost but long-term beneficial practice under high-intensity cropping for sustainable crop production

    RAZOR A Lightweight Block Cipher for Security in IoT

    Get PDF
    Rapid technological developments prompted a need to do everything from anywhere and that is growing due to modern lifestyle. The Internet of Things (IoT) technology is helping to provide the solutions by inter-connecting the smart devices. Lightweight block ciphers are deployed to enable the security in such devices. In this paper, a new lightweight block cipher RAZOR is proposed that is based on a hybrid design technique. The round function of RAZOR is designed by mixing the Feistel and substitution permutation network techniques. The rotation and XOR based diffusion function is applied on 32-bit input with 8 branches and branch number 7 to optimize the security. The strength of RAZOR is proved against differential, linear, and impossible differential attacks. The number of active S-boxes in any 5-round differential characteristic of RAZOR is 21 in comparison to the 10, 6, 4, 7, and 6 for PRESENT, Rectangle, LBlock, GIFT, and SCENERY respectively. RAZOR provides better security than the existing lightweight designs. The average throughput of 1.47 mega bytes per second to encrypt the large files makes it a better choice for software oriented IoT applications

    Overexpression of Chickpea Defensin Gene Confers Tolerance to Water-Deficit Stress in Arabidopsis thaliana

    Get PDF
    Plant defensins are mainly known for their antifungal activity. However, limited information is available regarding their function in abiotic stresses. In this study, a defensin gene, Ca-AFP, from Cicer arietinum, commonly known as chickpea, was cloned and transformed in Arabidopsis thaliana for its functional characterization under simulated water-deficit conditions. Under simulated water-deficit conditions (mannitol and polyethylene glycol-6000 induced), the transgenic A. thaliana plants had higher accumulation of the Ca-AFP transcript compared to that under non-stress condition and showed higher germination rate, root length, and biomass than the wild-type (WT) plants. To get further insights into the role of Ca-AFP in conferring tolerance to water-deficit stress, we determined various physiological parameters and found significant reduction in the transpiration rate and stomatal conductance whereas the net photosynthesis and water use efficiency was increased in the transgenic plants compared to that in the WT plants under water deficit conditions. The transgenic plants showed enhanced superoxide dismutase, ascorbate peroxidase, and catalase activities, had higher proline, chlorophyll, and relative water content, and exhibited reduced ion leakage and malondialdehyde content under water-deficit conditions. Overall, our results indicate that overexpression of Ca-AFP could be an efficient approach for conferring tolerance to water-deficit stress in plants

    Security of User Data in Local Connectivity Using Multicast Key Agreement

    Get PDF
    In this paper, we be trained team key contract approach a couple of parties need to create a usual secret key to be used to alternate understanding securely. The staff key contract with an arbitrary connectivity graph, where each and every consumer is simplest mindful of his neighbor and has no information about the existence of different customers. Additional, he has no knowledge concerning the community topology. We put into effect the existing approach with extra time efficient method and provide a multicast key generation server which is predicted in future scope with the aid of present authors. We replace the Diffie Hellman key trade protocol through a brand new multicast key exchange protocol that may work with one to 1 and one to many functionality. We additionally tend to put into effect a robust symmetric encryption for improving file safety within the process
    corecore