نتایج جستجو برای: leakage simulation

تعداد نتایج: 587417  

Journal: :IEEE Trans. VLSI Syst. 2008
Behnam Amelifard Farzan Fallah Massoud Pedram

— Aggressive CMOS scaling results in low threshold voltage and thin oxide thickness for transistors manufactured in deep submicron regime. As a result, reducing the subthreshold and tunneling gate leakage currents has become one of the most important criteria in the design of VLSI circuits. This paper presents a method based on dual-V t and dual-T ox assignment to reduce the total leakage power...

2015
Masayoshi Takasu Keigo Mizotani Yusuke Kumura Hiroyuki Chishiro Nobuyuki Yamasaki

Many embedded real-time systems require to process at high throughput while meeting real-time constraints. To improve performance of systems, multiprocessors have been used widely. Reduction of energy consumption is one of the most important issues in such systems, which operate with limited system resources. From the point of view of real-time scheduling, many approaches which save energy cons...

2014
M. Nagarjuna

In integrated circuits a gargantuan portion of chip power is mostly consumed by clocking systems which comprises of flipflops, latches and clock distribution networks. The two most widely used techniques for the reduction of dynamic and leakage power are clock gating (CG) and power gating (PG). The two techniques CG and PG are coupled in such a way that the clock enable signal is generated by C...

2015
Sunita Yadav Vishal Ramola

Reduction of leakage Power is the major problem in digital circuits. There are various techniques that are used to reduce the leakage power. Variable Body Biasing technique is discussed in this paper. Variable body biasing technique with sleep insertion technique is one of the efficient technique for designing combinational digital circuits which significantly cuts down the leakage current with...

2017
Chandni jain Shipra mishra

In this paper we introduced 10T one-bit full adders, including the most interesting of those are analyzed and compared for speed, leakage power, and leakage current. The analysis has been performed on various process and circuits techniques, the analysis with minimum transistor size to minimize leakage power, the latter with simulate transistor dimension to minimize leakage current. The simulat...

2007
Donghyun You Meng Wang Parviz Moin Rajat Mittal

The tip-clearance flow in axial turbomachines is studied using large-eddy simulation with particular emphasis on understanding the unsteady characteristics of the tip-leakage vortical structures and the underlying mechanisms for cavitation-inducing low-pressure fluctuations. Systematic and detailed analysis of the velocity and pressure fields has been made in a linear cascade with a moving end-...

Journal: :DEStech Transactions on Computer Science and Engineering 2018

Journal: :iranian endodontic journal 0
maryam javidi department of endodontics, dental school, dental research center, mashad university of medical sciences, mashad, iran neda naghavi department of endodontics, dental school, mashad university of medical sciences, mashad, iran ehsan roohani department of restorative dentistry, dental school, mashad university of medical sciences, mashad, iran

introduction: there are several methods for evaluating microleakage in dentistry, for example dye or bacterial leakage, electro-chemical methods, radioisotope labeling and fluid filtration. the purpose of this study was to assemble the fluid filtration system for quantitative evaluation of microleakage in dental materials. materials and methods: the roots were connected to a tube filled with an...

Journal: :IACR Cryptology ePrint Archive 2014
Jesper Buus Nielsen Daniele Venturi Angela Zottarel

We investigate new models and constructions which allow leakage-resilient signatures secure against existential forgeries, where the signature is much shorter than the leakage bound. Current models of leakage-resilient signatures against existential forgeries demand that the adversary cannot produce a new valid message/signature pair (m,σ) even after receiving some λ bits of leakage on the sign...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید