IJEARST Volume 3, Issue 01, April 2022 Edition


Pages [1]


DESIGN AND EVALUATION OF A LOW-VOLTAGE PROCESS VARIATION-TOLERANT SRAM []


present three iterations of SRAM bit cells with nMOS-only based read ports aimed to greatly reduce data dependent read port leakage to enable 1k cells/RBL, improve read performance, and reduce area and power over conventional and 10T cell-based works.


EFFICIENT AND IMPROVED SECURITY FOR NON-VOLATILE MAIN MEMORY USING DSSC []


:The use of hardware encryption and new memory technologies such as phase change memory (PCM) are gaining popularity in a variety of server applications such as cloud systems


LOW DENSITY SCALABLE BINARY COUNTER USING EFFICIENT SORTING NETWORK []


Parallel counters are enter components in numerous number juggling circuits, particularly quick multipliers


POWER AND DENSITY OPTIMIZED SYMMETRIC PASS GATE USING GDI []


Internet of Things (IoT) devices have strict energy constraints as they often operate on a battery supply. The cryptographic operations within IoT devices consume substantial energy and are vulnerable to a class of hardware attacks known as side-channel attacks


CREDIT CARD FRAUD DETECTION USING MACHINE LEARNING ALGORITHM []


Credit card fraud is a field with perpetrators performing illegal actions that may affect other individuals or companies negatively.


HANDWRITTEN DIGIT RECOGNITION USING MACHINE LEARNING []


In this Handwritten Digit Recognition project,we will recognize handwritten Digits, i.e. from 0-9.


SECURE MOBILE, SHORT MESSAGE SERVICE SPAM DETECTION USING MACHINE LEARNING ALGORITHMS []


The Each day site visitors of Short Message Service (SMS) continues growing.


SENSING AND DETECTING HIDDEN []


As technology development in the monitoring devices is a great fortune to the society, but misusing of this technology will create a suspicious environment like hidden cameras


TO DEVELOP A DECENTRALIZED APPLICATION TO DEMONSTRATE []


Blockchain Technology is a relatively new approach in the field of information technology.


DETECTING FAKE ONLINE REVIEWS USING SUPERVISED AND SEMI-SUPERVISED LEARNING []


Online reviews have a great impact on today’s business and commerce.


POTHOLE DETECTION ON ROADS USING IMAGE PROCESSING []


: In order to progress, potholes must be inspected as one of the most prevalent forms of road defects.


APC AND OMS BASED LUT DESIGN FOR HIGH THROUGHPUT DIF IMPLEMENTATION []


: Digital Intermediate Frequency (DIF) is the vital innovation in digit filters. DIF filter is depend on filter tap, it means that the high tap in system complexity is high and low tap in system complexity is low.


AREA EFFICIENT IMPROVED BINARY COUNTER USING BITONIC SORTING NETWORK []


Parallel counters are enter components in numerous number juggling circuits, particularly quick multipliers.


A CNN BASED APPROACH TO DETECT THE INHERITED RETINAL DISEASES USING PUPILLOMETRY []


Generally there are many genetic disorders; Retinal disease is one of the conditions that cause substantial visual deficits.


AN ENHANCED AND RELIABLE TECHNIQUES TO DETECT PRODUCT-COUNTERFEITING PROBLEM USING BLOCK CHAIN []


As a disruptive tool, block chain technology can eradicate the product-counterfeiting problem in supply chains.



Pages [1]

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

© 2011 - 2022 International Journal of Engineering In Advanced Research Science and Technology
Managed By Indian Association for Reliability and Statistics

International Journal of Engineering In Advanced Research Science and Technology ISSN : 2350-0174 (Online)
All rights reserved withinfo.ijearst.co.in.

To make sure that you can receive messages from us, please add the 'ijearst.co.in' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.

For any Technical Support contact @info.ijearst.co.in