Sub-threshold Logic for Ultra-Low Power Consumption
Journal Title: The International Journal of Technological Exploration and Learning - Year 2013, Vol 2, Issue 4
Abstract
In the ultra low power end of design spectrum when performance is of secondary importance, digital subthreshold logic circuits are more applicable than the regular MOS logic. In this paper, we propose two different subthreshold logic families: 1) variable threshold voltage subthreshold CMOS (VT-Sub-CMOS) and 2) subthreshold dynamic threshold voltage MOS (SubDTMOS) logic. Both these logic families have comparable power consumption as regular subthreshold CMOS logic along with superior robustness and tolerance to process and temperature variations.
Authors and Affiliations
Isha Arora| M.Tech Student IMS Engineering College Ghaziabad, UP
Creep Life Estimation of Low Pressure Reaction Turbine Blade
Steam turbine blades are the most important component of the thermal power plant. Most of the research work on creep estimation is done on the high pressure or intermediate pressure turbines blades. The main aim of th...
Fisher Algorithm: Variations And Applications
This paper examines Fisherface (Linear Discriminant Analysis) methods, its different modifications as applied to feature extraction in face recognition. Researchers showed that Fisher algorithm, though it performs be...
Design of Power Efficient and High Speed Carry Select Look Ahead Adder Using SP-D3l Logic
Minimizing area and power is the most challenging task in modern VLSI design. Adders are the most extensively used components in many integrated circuits; the design of power efficient high-speed data path logic syste...
Essential Requirements of PPAP
In today’s competitive environment industries are using various quality standards, such as ISO, TS, APQP etc. While applying these standards in any organizations there are certain procedures. Extensive technical do...
Anomaly Based Intrusion Detection using Feature Relevance and Negative Selection Algorithm
With the increase in the use of internet, the job of malicious people has been made easy to exploit vulnerabilities in existing system. Intrusion Detection System (IDS) plays a major role in computer/network security...