Semantic Scholar uses AI to extract papers important to this topic.
Machine-learning techniques are widely used in security-related applications, like spam and malware detection. However, in such… Expand An accurate modeling of three-port center-tapped inductors is proposed in this paper, which is specially designed to achieve high… Expand The detection of Earth analogs with radial velocity requires long-term precision of 10 cm/s. One of the factors limiting… Expand Motivated by a model for the perception of textures by the visual cortex in primates, we analyze the bifurcation of periodic… Expand The cutting forces produced during the machining of metals exert a direct influence upon the machining stability, the tool wear… Expand An ultra-low-power LC quadrature VCO (QVCO) is presented. It is designed in a single-poly seven-metal 65 nm CMOS process. To… Expand This paper presents the chromatic dispersion, effective area and confinement loss in circular ring photonic crystal fibers (CPCFs… Expand Scalable models for circuit design components such as inductors are a requirement for state of the art design environments… Expand A 3.3V single-supply fully-integrated distributed amplifier was implemented in a standard 0.35 /spl mu/m CMOS process up to 20 dB… Expand