The Evolution of Microprocessor Chip: A historic overview of development

In this paper we aredescribing the more interesting segments like, external structure of microprocessor chip(the birth of microprocessor) from silicon element becausemost of IT student does not have knowledge about the external structure. Also this paper presentsthe conventional silicon based computing technology for manufacturing of microprocessors but as we know that siliconreached to its upper limit of physical design therefore we also discussed the alternative of silicon in the future to makeprocessor more efficient with changing technology.

[1]  Deepak Puthal,et al.  Secure Data Collection & Critical Data Transmission in Mobile Sink WSN: Secure and Energy efficient data collection technique , 2012 .

[2]  Jinjun Chen,et al.  A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream , 2015, WISE.

[3]  Deepak Puthal,et al.  Effective Machine to Machine Communications in Smart Grid Networks , 2012 .

[4]  Fahim Arif,et al.  Fairness improvement in long chain multihop wireless ad hoc networks , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).

[5]  Farid Neema,et al.  Data sharing , 1998 .

[6]  Xiangjian He,et al.  A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[7]  Xiangjian He,et al.  PASCCC: Priority-based application-specific congestion control clustering protocol , 2014, Comput. Networks.

[8]  Xiangjian He,et al.  Energy Evaluation Model for an Improved Centralized Clustering Hierarchical Algorithm in WSN , 2013, WWIC.

[9]  Xiangjian He,et al.  A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..

[10]  Abdelkrim Haqiq,et al.  Secure Communication and Routing Architecture in Wireless Sensor Networks , 2014 .

[11]  Kenji Nakagawa,et al.  B-8-10 Cooperative Spectrum Sensing Techniques in Cognitive Radio Networks , 2012 .

[12]  Fazlullah Khan,et al.  An Innovative Approach to Investigate Various Software Testing Techniques and Strategies , 2016 .

[13]  Jinjun Chen,et al.  DPBSV -- An Efficient and Secure Scheme for Big Sensing Data Stream , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[14]  F. Khan,et al.  Dual head clustering scheme in wireless sensor networks , 2012, 2012 International Conference on Emerging Technologies.

[15]  Hashim Ali,et al.  Enhanced and Effective Learning through Mobile Learning an Insight into Students Perception of Mobile Learning at University Level , 2016 .

[16]  Syed Roohullah Jan,et al.  Issues In Global Software Development (Communication, Coordination and Trust) - A Critical Review , 2016 .

[17]  Xiangjian He,et al.  A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network , 2015, TrustCom 2015.

[18]  Jinjun Chen,et al.  A dynamic prime number based efficient security mechanism for big sensing data streams , 2017, J. Comput. Syst. Sci..

[19]  Kenji Nakagawa,et al.  Comparative study of spectrum sensing techniques in cognitive radio networks , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).

[20]  Xiangjian He,et al.  Data Sharing in Secure Multimedia Wireless Sensor Networks , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[21]  Xiangjian He,et al.  Enhancing Lifetime and Quality of Data in Cluster-Based Hierarchical Routing Protocol for Wireless Sensor Network , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[22]  Shahzad Khan,et al.  Performance improvement in wireless sensor and actor networks based on actor repositioning , 2015, 2015 International Conference on Connected Vehicles and Expo (ICCVE).

[23]  Xiangjian He,et al.  A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[24]  Xiangjian He,et al.  PAWN: a payload‐based mutual authentication scheme for wireless sensor networks , 2017, Concurr. Comput. Pract. Exp..

[25]  Fazlullah Khan,et al.  Secure communication and routing architecture in wireless sensor networks , 2014, 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE).

[26]  Mian Ahmad Jan,et al.  Energy-efficient routing and secure communication in wireless sensor networks , 2016 .

[27]  Farman Ullah,et al.  A Survey: Embedded Systems Supporting By Different Operating Systems , 2016, ArXiv.