- Wireless Power Transfer Systems
- Energy Harvesting in Wireless Networks
- Innovative Energy Harvesting Technologies
- Interactive and Immersive Displays
- IoT and Edge/Fog Computing
- Context-Aware Activity Recognition Systems
- Reinforcement Learning in Robotics
- Advanced Malware Detection Techniques
- Neural Networks and Reservoir Computing
- COVID-19 diagnosis using AI
- Advanced Memory and Neural Computing
- User Authentication and Security Systems
University of Thessaly
2010-2023
University of Liverpool
2019
A novel 2.45 GHz RF power harvester has been implemented in a 90 nm standard CMOS process. The proposed architecture reduces the threshold voltage (Vth) by employing pseudo floating-gate (pseudo-FG) new technique and achieves better performance compared with other conventional rectifiers at GHz, without additional fabrication cost. system is initially optimised via matching-boosting circuit, which dominant dual role. Extremely low (−15.43 dBm) signals can be rectified converted to 1.25 V DC.
The creation of a framework in which traditional Machine Learning and neuromorphic algorithms compete to solve shared Reinforcement environment is presented this work. In addition, configuration allows the exploitation modern widely-used libraries. PyTorch used investigate expanded capabilities potential training an action-critic network pair comprised specialised units using custom learning algorithm. policy value networks utilised context are fully interconnected MultiLayer Perceptrons....
In this work, an overview of the state-of-the-art design techniques power harvesting (rectifying) circuits is presented. The evolution each circuit, advantages and constraints, are investigated compared. Furthermore, a novel 2.45 GHz power-harvesting circuit implemented in 90 nm CMOS. Using voltage conversion efficiency as FOM, optimum rectifier topology determined. When input -19.73 dBm, proposed allows improving Power Voltage Conversion Efficiency, achieving PCE 14.68% (for R <sub...
A critical issue for a mobile device user is the protection of stored sensitive data and their access, via device. widely used technique protecting with display lock screen. Many security methods have been proposed but they suffer from technical vulnerabilities, algorithm weakness, issues due to using, or high complexity that prevents large groups adopting it everyday use. In this paper, an easy secure screen locking proposed. Comparison existing offered, highlighting strong points solution,...