scholarly journals Logical effort based design exploration of 64-bit adders using a mixed dynamic-CMOS/threshold-logic approach

Author(s):  
P. Celinski ◽  
S. Al-Sarawi ◽  
D. Abbott ◽  
S. Cotofana ◽  
S. Vassiliadis
Author(s):  
M. Chew ◽  
M. T. Ho

Abstract To erect deployable structures from a compact folded state, a supplemental mechanism called a deployer is used. Many latches are present in the deployer and these are coordinated in some logical and systematic manner to bring about the deployment. This article presents an investigation into analyzing the logic behavior of a deployer and design such latching systems in deployers in a more systematic manner; the logic functions used are based on modifications of the Mechanical Threshold Logic approach.


1974 ◽  
Vol 37 (3) ◽  
pp. 365-368 ◽  
Author(s):  
V. C. V. PRATAPA REDDY

2019 ◽  
Vol 8 (3) ◽  
pp. 5926-5929

Blind forensic-investigation in a digital image is a new research direction in image security. It aims to discover the altered image content without any embedded security scheme. Block and key point based methods are the two dispensation options in blind image forensic investigation. Both the techniques exhibit the best performance to reveal the tampered image. The success of these methods is limited due to computational complexity and detection accuracy against various image distortions and geometric transformation operations. This article introduces different blind image tampering methods and introduces a robust image forensic investigation method to determine the copy-move tampered image by means of fuzzy logic approach. Empirical outcomes facilitate that the projected scheme effectively classifies copy-move type of forensic images as well as blurred tampered image. Overall detection accuracy of this method is high over the existing methods.


1998 ◽  
Author(s):  
Thomas Meitzler ◽  
Regina Kistner ◽  
Bill Pibil ◽  
Euijung Sohn ◽  
Darryl Bryk ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document