6,332 Hits in 1.9 sec

Editorial: Emerging Concepts in Dengue Pathogenesis and Host Innate Immune Response

Binod Kumar, Yean K. Yong, Vikas Sood
2021 Frontiers in Cellular and Infection Microbiology  
They have talked about the DENV infection in two waves; in the first wave the tissue-resident phagocytes and keratinocytes are productively infected; while in the second wave the monocyte-derived macrophages  ...  Innate immune responses against Dengue virus were discussed by King et al., in their review article, have discussed extensively about the inflammatory responses to DENV infection due to innate immune cells  ... 
doi:10.3389/fcimb.2021.708484 pmid:34249783 pmcid:PMC8267373 fatcat:jwzvnv7x3rgtnjs64o2u3jr25y

A Technique for Designing High Speed Noise Immune CMOS Domino High Fanin Circuits in 16nm Technology

Koti Lakshmi P, Rameshwar Rao
2015 International Journal of VLSI Design & Communication Systems  
In this paper we are proposing a wide fan-in circuit with increased switching speed and noise immunity.  ...  Using the proposed technique an Octal-to-binary encoder is designed and simulated.  ...  From the results it is proved that the proposed design is better than the previous designs and offers about 29% reduction in delay and 3.5% reduction in PDP is achieved.  ... 
doi:10.5121/vlsic.2015.6505 fatcat:ydiwocmka5c6xongl6h3br45pi

Standardization Works for Security Regarding the Electromagnetic Environment [chapter]

Tetsuya Tominaga
2011 Lecture Notes in Computer Science  
Definition of Threat and Threat levels 1. Scope 2. References EMSEC threats are determined according to APPENDIX I. Threat of EMSEC 1. Electromagnetic Wave Leakage 3. Definitions 4.  ...  K.78: High altitude electromagnetic pulse immunity guide for telecommunication centres K.81: High-power electromagnetic immunity guide for telecommunication systems K.84: Test methods and guide against  ...  What is TEMPEST Confidentiality against Information Leakage The electromagnetic security is one of the physical security. What is "electromagnetic radiation" related to security?  ... 
doi:10.1007/978-3-642-23951-9_18 fatcat:umzjexknvnaevesh275r2774rm

An Integrated Interface for Leaky Capacitive Sensor with Emphasize on Humidity Sensor

A. Heidary, G.C.M. Meijer
2008 2008 IEEE Instrumentation and Measurement Technology Conference  
The interface chip consumes about 1mA and, when implemented in 0.7µm standard CMOS technology, takes a chip area of 2mm 2 .  ...  For the signal processing, a relaxation oscillator is used with a modified front-end to optimize the interface circuit for immunity to leakage.  ...  For such applications, its effect should be considered in the interface design. An algorithmic way to improve the immunity of the measurements for leakage is reported in [1] .  ... 
doi:10.1109/imtc.2008.4547301 fatcat:gdfqhmds5ra53lsfu5y2nlekli

A Location Method Using Sensor Arrays for Continuous Gas Leakage in Integrally Stiffened Plates Based on the Acoustic Characteristics of the Stiffener

Xu Bian, Yibo Li, Hao Feng, Jiaqiang Wang, Lei Qi, Shijiu Jin
2015 Sensors  
Meanwhile, it combines with the method of frequency compensation and superposition in time domain (SITD), based on the acoustic characteristics of the stiffener, to obtain a high-accuracy location result  ...  This method collects the ultrasonic signals generated from the leakage hole through the piezoelectric ultrasonic sensor array, and analyzes the space-time correlation of every collected signal in the array  ...  Among these four methods, the AE location method is easy to implement; the structure of the detected object does not need to be changed, and it has a high location speed and high immunity to interference  ... 
doi:10.3390/s150924644 pmid:26404316 pmcid:PMC4610486 fatcat:3ihgroa4m5ed7m2k4ggpuvjcgm

Comparative Study of Rectifier Topologies for Quasi-Z-Source Derived Push-Pull Converter

A. Chub, O. Husev, D. Vinnikov
2014 Elektronika ir Elektrotechnika  
Use of the topology shows that currents in the input and output parts strongly depend on the implementation of the output rectifier.  ...  Analytical expressions for the voltage and current stress of rectifier components are presented.  ...  It is based on the two-port impedance network that couples inverter circuit to the input DC source. qZSI provides high EMI immunity, wide regulation freedom and continuous input current.  ... 
doi:10.5755/j01.eee.20.6.7264 fatcat:r6alibqigfaodh5iqyhxzlujbu

Safe dose of intravitreal imatinib and its effect on laser-induced choroidal neovascularization: a rat-model experiment

Homayoun Nikkhah, Hamid Ahmadieh, Alireza Ramezani, Mozhgan Rezaei Kanavi, Seyed Bagher Hosseini, Naficeh Sadeghi, Seyed Mohsen Khandaghy Meybodi, Mehdi Yaseri
2015 International Journal of Retina and Vitreous  
In phase II, late phase fluorescein leakage and the CNV areas were not significantly different between the imatinib-treated eyes and the controls (p = 0.62 and p = 0.5, respectively).  ...  This two-phase experimental study was conducted to determine the maximum safe dose of intravitreal imatinib (IVI) and its inhibitory effect on a rat model of choroidal neovascularization (CNV).  ...  Mohammadreza Rahimi who participated in rat maintenance and protection, also rat anesthesia.  ... 
doi:10.1186/s40942-015-0017-4 pmid:27847609 pmcid:PMC5088484 fatcat:3txrlgicpnbqpjol5hf7szpo4u

Design and test of a high-resolution acquisition system for marine seismology

Shahram Shariat-Panahi, Francisco Alegria, Antoni Lazaro
2009 IEEE Instrumentation & Measurement Magazine  
A series of optimizations are carried out in the design of the data logger as well as in its PCB implementation to maximize the S/N ratio.  ...  The characterization tests implemented help to carry out optimizations of the system before being used in real environmental conditions and defi ne the specifi cations of the fi nal instrument.  ...  The random noise is about 1.1 least significant bits (LSBs), an rms value, which corresponds to about 320 nV. A channel crosstalk of −147 dB shows a good PCB design and EMI immunity.  ... 
doi:10.1109/mim.2009.4811132 fatcat:m524lxjr2vayzjvfw3hfo4qchu

Microwave phase conjugation using antenna arrays

Yian Chang, H.R. Fetterman, I.L. Newberg, S.K. Panaretos
1998 IEEE transactions on microwave theory and techniques  
Two types of interconnects, electrical and a more versatile optical technique, have been implemented to distribute the pump signal in our demonstrations.  ...  Furthermore, these experiments have shown amplified conjugate-wave power up to ten times of that of the incoming wave.  ...  Hellwarth, Univeristy of Southern California, Los Angeles, for his valuable suggestions, and M.  ... 
doi:10.1109/22.734509 fatcat:bquttg5e7rhtlfsk4fgo3x5mcm

GaN-based Matrix Converter Design with Output Filters for Motor Friendly Drive System

Hanyoung Bu, Younghoon Cho
2020 Energies  
To mitigate the dv/dt of the voltage applied to the motor and the leakage current, a dv/dt filter and a sine-wave filter were utilized as an output filter of the matrix converter.  ...  This increases the importance of noise immunity and the reduction of parasitic components in system design.  ...  Experimental results of leakage current in time scale; (a) without output filter; (b) with dv/dt filter; and (c) with sine-wave filter.  ... 
doi:10.3390/en13040971 fatcat:tueabrwqufepjjcpmllbqfrtcu

Countering early evaluation

Shivam Bhasin, Sylvain Guilley, Florent Flament, Nidhal Selmane, Jean-Luc Danger
2010 Proceedings of the 5th Workshop on Embedded Systems Security - WESS '10  
Wave Dynamic Differential Logic (WDDL) is a hiding countermeasure to thrawt side channel attacks (SCA).  ...  This DPL can resist against side channel attacks and fault attacks at the same time.  ...  We acknowledge interesting discussions and encouragements with Renaud Pacalet from the LabSoC laboratory of TELECOM ParisTech at Sophia-Antipolis.  ... 
doi:10.1145/1873548.1873554 dblp:conf/cases/BhasinGFSD10 fatcat:lnepckeu5jfadoxggl6qxq3rvy

Methods of Leak Search from Pipeline for Acoustic Signal Analysis

Emil Rinatovich Saifullin, Evgenia Vyacheslavovna Izmailova, Shamil Gayazovich Ziganshin
2017 Indian Journal of Science and Technology  
The graphic programming environment Lab VIEW was used to implement the algorithm of leak search and identification as a working tool.  ...  Results: The description and the operation method are provided for the software developed by the authors to record and process the acoustic signals.  ...  To determine the distance from one of the sensors to a defect it is necessary to know the speed of pulsation distribution in the fluid that fills a pipeline and distributing waves from a defect along a  ... 
doi:10.17485/ijst/2017/v10i1/109953 fatcat:bero7gi6zjfi7nbhjwpbumnmde

Comparative analysis of SRAM cell with leakage power reduction approaches

Damarla Paradhasaradhi, Kollu Jaya Lakshmi, Yadavalli Harika, Busa Ravi Teja Sai, Golla Jayanth Krishna
2018 International Journal of Engineering & Technology  
In deep sub-micron technologies, high number of transistors is mounted onto a small chip area where, SRAM plays a vital role and is considered as a major part in many VLSI ICs because of its large density  ...  Due to the demand of low power applications the design of low power and low voltage memory is a demanding task. In these memories majority of power dissipation depends on leakage power.  ...  The drawback behind this circuit is that the VSL at standby mode would be charged to a certain value which may be less immune to noise, hence getting distortions in the output wave-form which may lead  ... 
doi:10.14419/ijet.v7i2.7.11083 fatcat:njmfer5e3bbvfgheclojndqgm4

Power Reduction Techniques In Vlsi

Mehar Sharma, Neeraj Gupta, Rashmi Gupta
2018 Zenodo  
Before, most of the researches were oriented towards bringing about high speed and miniaturization.  ...  The comparison of traditional techniques and present techniques are also covered in this paper.  ...  The advantage of low V t cell is that it has low timing but higher leakage current and high V t cells have low leakage current but high timing as shown in fig7.  ... 
doi:10.5281/zenodo.1200290 fatcat:t46h3oo4urcqtaxjmwmbrm6es4

Bio Medical Waste Mangement- A Review

Pooja Shinde
2019 International Journal for Research in Applied Science and Engineering Technology  
It is significance that this waste ought to be precise managed and disposed off safely so as to prevent outbreak of infections to society and harmful to the environment.  ...  It additionally intends to create consciousness amongst the people to defend their health & protect the environment.  ...  Such container or bag have to have sure properties it have to be without any leakage; it should have ability to comprise the designed extent and weight of the waste except any damage; the container have  ... 
doi:10.22214/ijraset.2019.4518 fatcat:wjc6gzqrbfgulp72jf2havcgxa
« Previous Showing results 1 — 15 out of 6,332 results