Zobrazeno 1 - 10
of 121
pro vyhledávání: '"Chandan Giri"'
Autor:
Jabadurai Jayapaul, Sanna Komulainen, Vladimir V. Zhivonitko, Jiří Mareš, Chandan Giri, Kari Rissanen, Perttu Lantto, Ville-Veikko Telkki, Leif Schröder
Publikováno v:
Nature Communications, Vol 13, Iss 1, Pp 1-10 (2022)
Self-assembling nanostructures that trap guest molecules find applications in materials research and the life sciences. Here, authors describe how ultra-sensitive NMR reveals sub-types with broken symmetry that significantly impacts guest exchange.
Externí odkaz:
https://doaj.org/article/fe88a3f173274fa5be18c6e9a4db4a68
Publikováno v:
Polymers, Vol 14, Iss 16, p 3253 (2022)
N-Sulfonyl-activated aziridines are known to undergo anionic-ring-opening polymerizations (AROP) to form polysulfonyllaziridines. However, the post-polymerization deprotection of the sulfonyl groups from polysulfonyllaziridines remains challenging. I
Externí odkaz:
https://doaj.org/article/7233b796e44b475a8ad008482cade408
Publikováno v:
Journal of Electronic Testing. 39:89-102
Autor:
Chandan Giri, Sarah E. Sisk, Louis Reisman, Irshad Kammakakam, Jason E. Bara, Kevin N. West, Brooks D. Rabideau, Paul A. Rupar
Publikováno v:
Macromolecules. 55:623-629
Publikováno v:
2022 IEEE International Symposium on Smart Electronic Systems (iSES).
Publikováno v:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 40:1500-1510
Through silicon via (TSV)-based 3-D integrated circuit (3-D IC) has several advantages like high density, high bandwidth, and low-power consumption. However, many defects in TSV are evolved during the fabrication and bonding process. In practice, fau
Publikováno v:
Wireless Personal Communications. 120:3135-3151
Wireless sensor networks (WSN) are ad-hoc wireless networks used in many domains involving the analysis of various properties. Along with the growth in the number of deployments of WSNs, there has been an increase in the size of the networks as well.
Publikováno v:
ACM Journal on Emerging Technologies in Computing Systems. 17:1-22
Covert Hardware Trojan Horses (HTH) introduced by malicious attackers during the fabless manufacturing process of integrated circuits (IC) have the potential to cause malignant functions within the circuit. This article employs a Design-for-Security
Publikováno v:
2022 IEEE India Council International Subsections Conference (INDISCON).
Publikováno v:
Journal of Electronic Testing. 37:109-126
Digital microfluidic biochip is a promising alternative to the traditional cumbersome laboratory equipment. Such automated biochips are used in many critical applications. Hence dependability is an essential attribute before the chip is in use. Due t