Zobrazeno 1 - 10
of 27
pro vyhledávání: '"Sheikh Ariful Islam"'
Autor:
Md. Faizul Ahasan, Nazma Haque, Fouzia Begum, Sharmin Rahman, Sultana Farzana, Mahbub Aziz, Sheikh Ariful Islam
Publikováno v:
IMC Journal of Medical Science, Vol 18, Iss 2, Pp 1-11 (2024)
Background and objectives: COVID-19, caused by SARS-CoV-2, has led to a global pandemic with severe health, economic, and social impacts. Vaccination has emerged as a crucial mitigation strategy. Despite the pivotal role of COVID-19 vaccines in contr
Externí odkaz:
https://doaj.org/article/f4c085a1cd5148d9868d0c9aca73d689
Publikováno v:
High-Confidence Computing, Vol 2, Iss 4, Pp 100087- (2022)
Since its launch in 2014, Amazon Echo family of devices has seen a considerable increase in adaptation in consumer homes and offices. With a market worth millions of dollars, Echo is used for diverse tasks such as accessing online information, making
Externí odkaz:
https://doaj.org/article/1fcda54b27bf46c086e203f7956854f7
Publikováno v:
High-Confidence Computing, Vol 2, Iss 2, Pp 100049- (2022)
Conventional private data publication mechanisms aim to retain as much data utility as possible while ensuring sufficient privacy protection on sensitive data. Such data publication schemes implicitly assume that all data analysts and users have the
Externí odkaz:
https://doaj.org/article/99ac994676d54634a1695628b76c2976
Publikováno v:
Integration. 77:167-179
We present a design technique, Partial evaluation-based Triple Modular Redundancy (PTMR), for hardening combinational circuits against Single Event Upsets (SEU). The basic ideas of partial redundancy and temporal TMR are used together to harden the c
Publikováno v:
ACM Transactions on Design Automation of Electronic Systems. 26:1-35
We propose three orthogonal techniques to secure Register-Transfer-Level (RTL) Intellectual Property (IP). In the first technique, the key-based RTL obfuscation scheme is proposed at an early design phase during High-Level Synthesis (HLS). Given a co
Publikováno v:
2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC).
Publikováno v:
ACM Transactions on Design Automation of Electronic Systems. 25:1-26
With technology scaling, subthreshold leakage has dominated the overall power consumption in a design. Input vector control is an effective technique to minimize subthreshold leakage. Low leakage input vector determination is not often possible due t
Autor:
Sheikh Ariful Islam
Publikováno v:
Electronics Letters. 56:868-871
The author proposes an incremental windowing technique based on graph technique to detect hardware Trojan triggering signal. First, they analyse the switching activity file generated during simulation. Then, based on the window size of choice, they e
Publikováno v:
IEEE Transactions on Emerging Topics in Computing. 8:738-749
Negative Bias Temperature Instability (NBTI) effect occurs in a PMOS transistor when turned ON leading to threshold voltage degradation. As sub-threshold leakage is significant in nanoscale CMOS circuits, input vector control can be employed wherein
Publikováno v:
ISDFS
In the age of constantly evolving technology, network communication has become more critical than ever. Along with this, the need for secure channels for edge communication is undeniable. Two traits of the quality of desirable network protocols are s