slugSingle Electron Transistor Based IC Architecture Design for Car Intrusion Prevention: A Case Study
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 4
Abstract
Single Electronics, a fascinating technology is a novel alternative of conventional electronics in post CMOS era. This emerging field is rapidly getting attention both in fabrication oriented empirical study and logical modelling; all from the point of view of consumer electronics. Single electronics uses the tunnelling effect of single electron alone to represent binary data values. Another unique character is that it requires much less power than conventional technologies while operating at much higher speed. Several such merits of the single electron transistor made devices have been cited in referred journals. Thus undoubtedly Single Electron Transistor (SET) has the potentiality to usher innumerable applications in modern technological progression. Present day only a few Researchers took the pain to emphasize SET in security systems, although industrial production requires deep research further. Moreover, ample study revealed the art of employing SET in next generation consumable electronics because of its unique decision making capabilities which in turn has now discovered greater impact in extending the boundary of its acceptance to human world. Here in the present work, we have articulated a case study of modelling a SET based on-chip car intrusion prevention IC.
Authors and Affiliations
Jayanta Gope, Aloke Raj Sarkar, Santanu Kola, Sutanu Payra
Silver nanoparticles, Antimicrobial action, nanoparticle synthesis
Silver nanoparticles are nanoparticles which are in the range of 1 and 100 nm in size. Silver nanoparticles have unique properties which help in molecular diagnostics in therapies and in devices which are used in severa...
Prediction of Data Sets by using Fuzzy Mining Association Rule
This paper is proposed to reinforce fuzzy association rules, Association rule mining is one of the fundamental tasks of data mining. The conventional association rule mining algorithms, using crisp set, are meant for ha...
slugPerformance of Multiplicative Data Perturbation for Privacy Preserving Data Mining
Data mining is a well-known technique for automatically and intelligently extracting information or knowledge from a large amount of data, however, it can also disclosure sensitive information about individuals compromi...
slugEvaluating Failure of a Refrigeration cycle using Triangular Intuitionstic Fuzzy Approach
In real life systems, the information may be inaccurate or might have linguistic representation. In such cases the estimation of precise values of probability becomes very difficult. In order to handle this situation, t...
Level Based Optimized Workflow Scheduling In Cloud Environment
Cloud computing is a rapidly growing area offering utility-oriented IT services to the users worldwide over the internet. In cloud, service providers managed and provided resources to users. Software or hardware can be...