This document discusses built-in self-test (BIST) techniques for integrated circuits. It provides an overview of BIST architecture, which includes a test pattern generator, test application to the circuit under test, and a response verification component. The document outlines different methods for test pattern generation, such as exhaustive, pseudo-exhaustive, pseudo-random, and test pattern augmentation. It also describes various response compaction techniques like parity testing, one counting, transition counting, and signature analysis that are used to compact the circuit response due to the large amount of test data produced. Benefits of BIST include reduced testing costs and ability to test at operating speeds, while costs include increased chip area and testing of the BIST hardware
Introduction of testing and verification of vlsi designUsha Mehta
This slides are introductory slides for the course testing and verification of VLSI Design which cover the basics of Why, Where, When and How of VLSI design testing
Level sensitive scan design(LSSD) and Boundry scan(BS)Praveen Kumar
This presentation contains,
Introduction,design for testability, scan chain, operation, scan structure, test vectors, Boundry scan, test logic, operation, BS cell, states of TAP controller, Boundry scan instructions.
Scan design is currently the most popular structured DFT approach. It is implemented by Connecting selected storage elements present in the design into multiple shift registers, called Scan chains.
Scannability Rules -->
The tool perform basic two check
1) It ensures all the defined clocks including set/Reset are at their off-states, the sequential element remain stable and inactive. (S1)
2) It ensures for each defined clocks can capture data when all other defined clocks are off. (S2)
Introduction of testing and verification of vlsi designUsha Mehta
This slides are introductory slides for the course testing and verification of VLSI Design which cover the basics of Why, Where, When and How of VLSI design testing
Level sensitive scan design(LSSD) and Boundry scan(BS)Praveen Kumar
This presentation contains,
Introduction,design for testability, scan chain, operation, scan structure, test vectors, Boundry scan, test logic, operation, BS cell, states of TAP controller, Boundry scan instructions.
Scan design is currently the most popular structured DFT approach. It is implemented by Connecting selected storage elements present in the design into multiple shift registers, called Scan chains.
Scannability Rules -->
The tool perform basic two check
1) It ensures all the defined clocks including set/Reset are at their off-states, the sequential element remain stable and inactive. (S1)
2) It ensures for each defined clocks can capture data when all other defined clocks are off. (S2)
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2023/09/introduction-to-optimizing-ml-models-for-the-edge-a-presentation-from-cisco-systems/
Kumaran Ponnambalam, Principal Engineer of AI, Emerging Tech and Incubation at Cisco Systems, presents the “Introduction to Optimizing ML Models for the Edge” tutorial at the May 2023 Embedded Vision Summit.
Edge computing opens up a new world of use cases for deep learning across numerous markets, including manufacturing, transportation, healthcare and retail. Edge deployments also pose new challenges for machine learning, not seen in cloud deployments. Constrained resources, tight latency requirements, limited bandwidth and unreliable networks require us to rethink how we build, deploy and operate deep learning models at the edge.
In this presentation, Ponnambalam introduces proven techniques, patterns and best practices for optimizing computer vision models for the edge. He covers quantization, pruning, low-rank approximation and knowledge distillation, explaining how they work and when to use them. And he touches on how your choice of ML framework and processor affect how you use these optimization techniques.
Approximation techniques used for general purpose algorithmsSabidur Rahman
Survey on approximation techniques used for general purpose algorithms, data parallel applications ans solid-state memories. It is interesting to see how approximation algorithms can contribute to solve real-life problems with better efficiency and lower cost!
Questions? krahman@ucdavis.edu.
When it comes to user experience a snappy application beat a glamorous one. Nothing frustrates an end user more than a slow application. Did you know that any wait time greater than one second will break a user's concentration and cause them to feel frustration? How can we create applications to meet user expectations? This class will cover all things performance from design to delivery. We will go over application design, user interface guidelines, caching guidelines, code optimizations, and query optimizations.
High Speed Design Closure Techniques-Balachander KrishnamurthyMassimo Talia
Digital electronics and electronics are not only theory as many Italians are thinking. The investments in electronic design in Italy are very low, since there's the Asian market which specialized their people to the Electronics culture. So The italian electronic engineers are compared to Sciencists, but they're designers of Manifacturing. This webinar describes the main steps and techniques, in order to design a Digital Circuits, to evaluate the timing constraints and the hardware requirements. The webinar is promoted by Xilinx.
Slides from Strata+Hadoop Singapore 2016 presenting how Deep Learning can be scaled both vertically and horizontally, when to use CPUs and when to use GPUs.
Similar to BUilt-In-Self-Test for VLSI Design (20)
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
2. Acknowledgement
2
3December
2019
This presentation has been summarized
from various books, papers, websites and
presentations and so on …. all over the
world. I couldn’t remember where these
large pull of hints and work come from.
However, I’d like to thank all professors and
scientists who create such a good work on
this emerging field. Without those efforts in
this very emerging technology, these notes
and slides can’t be finished. I am thankful
to them to make my teaching process more
effective.
DrUshaMehta
3. Why BIST?
• Useful for field test and diagnosis (less expensive than a
local automatic test equipment)
• Software tests for field test and diagnosis:
• Low hardware fault coverage
• Low diagnostic resolution
• Slow to operate
• Hardware BIST benefits:
• Lower system test effort
• As a means of dealing with the cost of TPG.
• As a means of dealing with increasingly larger
volumes of test data.
• As a means of performing at-speed test.
• Improved system maintenance and repair
• Improved component repair
• Better diagnosis at component level
3
3December2019DrUshaMehta
4. Costly Test Problems Alleviated by BIST
• Increasing chip logic-to-pin ratio – harder observability
• Increasingly dense devices and faster clocks
• Increasing test generation and application times
• Increasing size of test vectors stored in ATE
• Expensive ATE needed for GHz clocking chips
• Hard testability insertion – designers unfamiliar
with gate-level logic, since they design at behavioural
level
• Shortage of test engineers
• Circuit testing cannot be easily partitioned
4
3December2019DrUshaMehta
5. • BIST entails three tasks:
• TPG
• Test application
• Response verification
• Types of BIST:
• Memory BIST
• Logic BIST
• Combinations for testing RAM-based FPGAs.
• In this course, we will focus on logic BIST, used for
testing random logic.
5
3December2019DrUshaMehta
7. BIST Benefits…..
In general, BIST
• Reduced testing and maintenance cost
• Lower test generation cost
• Reduced storage / maintenance of test patterns
• Simpler and less expensive ATE
• Can test many units in parallel
• Shorter test application times
• Can test at functional system speed
7
3December2019DrUshaMehta
8. BIST Costs…
• Chip area overhead for:
• Test controller
• Hardware pattern generator
• Hardware response compacter
• Testing of BIST hardware
• Pin overhead -- At least 1 pin needed to activate BIST
operation
• Performance overhead – extra path delays due to BIST
• Yield loss – due to increased chip area or more chips In
system because of BIST
• Reliability reduction – due to increased area
• Increased BIST hardware complexity – happens when
• BIST hardware is made testable
8
3December2019DrUshaMehta
9. Overview of BIST Architecture
• Do remember that all components are on-chip in this
case.
9
3December2019DrUshaMehta
11. Test Generation
• Store in ROM – too expensive
• Exhaustive
• Pseudo-exhaustive
• Pseudo-random (LFSR) – Preferred method
• Binary counters – use more hardware than LFSR
• Modified counters
• Test Pattern Augmentation
• LFSR combined with a few patterns in ROM
•
11
3December2019DrUshaMehta
12. Exhaustive Pattern Generator (Counter)
• Shows that every state and transition works
• For n-input circuits, requires all 2n vectors
• Impractical for large n ( > 20 )
12
3December2019DrUshaMehta
15. Pseudo Random Pattern Generation
• Standard Linear Feedback Shift Register (LFSR)
• Normally known as External XOR type LFSR
• Produces patterns algorithmically – repeatable
• Has most of desirable random properties
• Need not cover all 2n input combinations
• Long sequences needed for good fault coverage
15
3December2019DrUshaMehta
16. Weighted Pseudo Random Pattern
Generation
• LFSR p (1) = 0.5
• Solution:
• Add programmable weight selection and complement LFSR
bits to get p(1)’s other than 0.5
• Need 2-3 weight sets for a typical circuit
• Weighted pattern generator drastically shortens pattern
length for pseudo-random patterns
16
3December2019DrUshaMehta
17. Test Pattern Augmentation
• Secondary ROM – to get LFSR to 100% SAF coverage
• Add a small ROM with missing test patterns
• Add extra circuit mode to Input MUX – shift to ROM
patterns after LFSR done
• Important to compact extra test patterns
• Use diffracter:
• Generates cluster of patterns in neighbourhood of
stored ROM pattern
• Transform LFSR patterns into new vector set
• Put LFSR and transformation hardware in full-scan
chain
17
3December2019DrUshaMehta
18. Response Verification
• The response of the logic-under-test needs to be checked
after test application using test pattern generator ( with
an LFSR!).
• It is difficult to check the response of every pattern
(storage requirements).
• Severe amounts of data in CUT response to LFSR
patterns – example:
• Generate 5 million random patterns
• CUT has 200 outputs
• Leads to: 5 million x 200 = 1 billion bits response
• Uneconomical to store and check all of these responses
on chip
• Responses must be compacted ( not “compressed”) 18
3December2019DrUshaMehta
19. Some Definitions…
• Aliasing – Due to information loss, signatures of good
and some bad machines match
• Compaction – Drastically reduce # bits in original
circuit response – lose information
• Compression – Reduce # bits in original circuit response
– no information loss – fully invertible (can get back
original response)
19
3December2019DrUshaMehta