This document discusses the application of VLSI (Very Large Scale Integrated) circuits in artificial intelligence. It begins by providing background on VLSI and its role in advancing computing power. It then defines artificial intelligence and compares it to VLSI. The main application of VLSI in AI has been through expert systems, which apply reasoning to a knowledge base. Examples of expert systems for VLSI design include the Design Automation Assistant and the Design Advisor. VLSI allows for more powerful computer architectures that enable advanced AI applications.
Internet Of Things: Architecture,Issues and ApplicationsIJERA Editor
Recent past year’s research on architecture standardization of IoT (Internet of thing) is going on, not yet concluded about standardization, It is still open and debatable how to make a standard platform. Thousands of researcher’s and Engineers are concentrating on IoT architecture standardization. Few open source community have already started working on IoT architecture for standardization. Yet lot of improvement is needed. Even some organization are collaborating and coming up with standardization. This will give base IoT Architecture standardization or Initial architecture which can evolve one of the solutions for making standardization. Seminar report gives full-fledged and complete modularity for IoT architecture. Depending on user application any unwanted module can be removed and addition of any number of modules to the architecture can be done easily. Mainly concentrates on modularity and scalability of the software. It helps IoT SoC(system on Chip) manufacturer to make hardware platform in-order to fit IoT applications.
The technologies of ai used in different corporate worldEr. rahul abhishek
Artificial intelligence (AI) is making its way back into the mainstream of corporate technology, this time at the core of business systems which are providing competitive advantage in all sorts of industries, including electronics, manufacturing, software, medicine, entertainment, engineering and communications, designed to leverage the capabilities of humans rather than replace them, today’s AI technology enables an extraordinary array of applications that forge new connections among people, computers, knowledge, and the physical world. Some AI enabled applications are information distribution and retrieval, database mining, product design, manufacturing, inspection, training, user support, surgical planning, resource scheduling, and complex resource management.
The smart grid is an electrical power grid that is integrated with an AI enabled, two way communication network providing energy and information. It is a technology that enables instantaneous feedback from various sensors and devices on the operation of the power grid. Although AI is relatively new, it is poised to revolutionize the way we produce, transmit, and consume energy. AI will constitute the brain of future smart grid. The power sector has started to use AI and related technologies for communication between smart grids, smart meters, and Internet of things devices. This paper presents some applications of AI in smart grid. Matthew N. O. Sadiku | Uwakwe C. Chukwu | Abayomi Ajayi-Majebi | Sarhan M. Musa "Artificial Intelligence in Smart Grid" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-5 , August 2022, URL: https://www.ijtsrd.com/papers/ijtsrd50563.pdf Paper URL: https://www.ijtsrd.com/engineering/other/50563/artificial-intelligence-in-smart-grid/matthew-n-o-sadiku
Internet Of Things: Architecture,Issues and ApplicationsIJERA Editor
Recent past year’s research on architecture standardization of IoT (Internet of thing) is going on, not yet concluded about standardization, It is still open and debatable how to make a standard platform. Thousands of researcher’s and Engineers are concentrating on IoT architecture standardization. Few open source community have already started working on IoT architecture for standardization. Yet lot of improvement is needed. Even some organization are collaborating and coming up with standardization. This will give base IoT Architecture standardization or Initial architecture which can evolve one of the solutions for making standardization. Seminar report gives full-fledged and complete modularity for IoT architecture. Depending on user application any unwanted module can be removed and addition of any number of modules to the architecture can be done easily. Mainly concentrates on modularity and scalability of the software. It helps IoT SoC(system on Chip) manufacturer to make hardware platform in-order to fit IoT applications.
The technologies of ai used in different corporate worldEr. rahul abhishek
Artificial intelligence (AI) is making its way back into the mainstream of corporate technology, this time at the core of business systems which are providing competitive advantage in all sorts of industries, including electronics, manufacturing, software, medicine, entertainment, engineering and communications, designed to leverage the capabilities of humans rather than replace them, today’s AI technology enables an extraordinary array of applications that forge new connections among people, computers, knowledge, and the physical world. Some AI enabled applications are information distribution and retrieval, database mining, product design, manufacturing, inspection, training, user support, surgical planning, resource scheduling, and complex resource management.
The smart grid is an electrical power grid that is integrated with an AI enabled, two way communication network providing energy and information. It is a technology that enables instantaneous feedback from various sensors and devices on the operation of the power grid. Although AI is relatively new, it is poised to revolutionize the way we produce, transmit, and consume energy. AI will constitute the brain of future smart grid. The power sector has started to use AI and related technologies for communication between smart grids, smart meters, and Internet of things devices. This paper presents some applications of AI in smart grid. Matthew N. O. Sadiku | Uwakwe C. Chukwu | Abayomi Ajayi-Majebi | Sarhan M. Musa "Artificial Intelligence in Smart Grid" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-5 , August 2022, URL: https://www.ijtsrd.com/papers/ijtsrd50563.pdf Paper URL: https://www.ijtsrd.com/engineering/other/50563/artificial-intelligence-in-smart-grid/matthew-n-o-sadiku
THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...IJNSA Journal
In this paper, we suggest a new method to address attack detection problems in IoT networks, by using a specific emphasis on the user’s and network’s requirements regarding the application provider and giving a defence against intruders and malicious users. The paper focuses on resolving the problem of detection of attacks in IoT networks using Recurrent Neural Networks and an explainable artificial intelligence technique (XAI) named SHAP. XAI refers to a collection of methods and procedures for explaining how AI models make decisions. Although XAI is useful for understanding the motivations underlying AI models, the information utilized in these discoveries may be a risk. Machine learning models are vulnerable to attacks such as model inversion, model extraction, and membership inference. Such attacks could concentrate on the learning model or on the data used to train and build the model, depending on the involved circumstances and parties. Hence, when the owner of an AI model wishes to grant only black-box access and does not expose the model's parameters and architecture to third parties, solutions like XAI can notably enhance the susceptibility to model extraction attacks.
To guarantee the users regarding possible violations, the proposed RNN-SHAP method is based on a decentralized topology relying on a set of cooperative independent parties including the users of IoT network. Another advantage of the suggested approach is the capitalization on the trust relationships that are part of IoT networks in real life to build trusted mechanisms in the network. Compared to other methods using different metrics, the suggested RNN-SHAP shows its efficiency in resolving the DDoS problem.
Role of artificial intelligence in cloud computing, IoT and SDN: Reliability ...IJECEIAES
Information technology fields are now more dominated by artificial intelligence, as it is playing a key role in terms of providing better services. The inherent strengths of artificial intelligence are driving the companies into a modern, decisive, secure, and insight-driven arena to address the current and future challenges. The key technologies like cloud, internet of things (IoT), and software-defined networking (SDN) are emerging as future applications and rendering benefits to the society. Integrating artificial intelligence with these innovations with scalability brings beneficiaries to the next level of efficiency. Data generated from the heterogeneous devices are received, exchanged, stored, managed, and analyzed to automate and improve the performance of the overall system and be more reliable. Although these new technologies are not free of their limitations, nevertheless, the synthesis of technologies has been challenged and has put forth many challenges in terms of scalability and reliability. Therefore, this paper discusses the role of artificial intelligence (AI) along with issues and opportunities confronting all communities for incorporating the integration of these technologies in terms of reliability and scalability. This paper puts forward the future directions related to scalability and reliability concerns during the integration of the above-mentioned technologies and enable the researchers to address the current research gaps.
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKSijcsa
Ontology is applied to impart knowledge in various fields of Information Technology made it more intelligent in the past few decades. Many Ontologies was built on various domains like biology, medicine,physics, chemistry, and mathematics. The Ontology in computer science domain are limited and even the Ontology is not explored in detail. The knowledge in the field of computer networks is very large, which makes it more difficult for a human to expertise in. This paper proposes the Ontology in computer network domain on various perspectives like scope, scale, topology, communication media, OSI model, TCP/ IP model, protocol, security, network operating system, network hardware and performance. The Ontology is developed in OWL format, which can be easily integrated with any other semantic based applications. The network Ontology can be employed in Semantic Web applications to help the users to search for concepts computer networks domain
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYijasuc
Internet of Things(IoT) in recent days playing a vital role in networking related applications. However,
there are several protocols available for building IoT applications, but RPL and CoAP are important
protocols.There is a customized protocol requirement for specific IoT applications, while working on
specific research problems. Further, adequate platforms are required to evaluate the performance of these
protocols. These platforms need to be configured for the protocol, which is very crucial and timeconsuming task. At present, there is no collective and precise information available to carry out this work.
This paper discusses two different open source platforms available for IoT. Also,various IoT research ideas
need to design of IoT protocols. A few IoT communication technologies are mentioned in the paper. The
detail analysis of, two common protocols, namely Routing Protocol for Low-Power Lossy Networks (RPL)
and Constrained Application layer protocol (CoAP) is carried out with respect to latency delay and packet
delivery ratio. The results, discussion and conclusion presented in this paper are useful for researchers,
who are interested to work with IoT protocols and standards.
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYijasuc
Internet of Things(IoT) in recent days playing a vital role in networking related applications. However,
there are several protocols available for building IoT applications, but RPL and CoAP are important
protocols.There is a customized protocol requirement for specific IoT applications, while working on
specific research problems. Further, adequate platforms are required to evaluate the performance of these
protocols. These platforms need to be configured for the protocol, which is very crucial and timeconsuming task. At present, there is no collective and precise information available to carry out this work.
This paper discusses two different open source platforms available for IoT. Also,various IoT research ideas
need to design of IoT protocols. A few IoT communication technologies are mentioned in the paper. The
detail analysis of, two common protocols, namely Routing Protocol for Low-Power Lossy Networks (RPL)
and Constrained Application layer protocol (CoAP) is carried out with respect to latency delay and packet
delivery ratio. The results, discussion and conclusion presented in this paper are useful for researchers,
who are interested to work with IoT protocols and standards
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYijasuc
Internet of Things(IoT) in recent days playing a vital role in networking related applications. However,
there are several protocols available for building IoT applications, but RPL and CoAP are important
protocols.There is a customized protocol requirement for specific IoT applications, while working on
specific research problems. Further, adequate platforms are required to evaluate the performance of these
protocols. These platforms need to be configured for the protocol, which is very crucial and timeconsuming task. At present, there is no collective and precise information available to carry out this work.
This paper discusses two different open source platforms available for IoT. Also,various IoT research ideas
need to design of IoT protocols. A few IoT communication technologies are mentioned in the paper. The
detail analysis of, two common protocols, namely Routing Protocol for Low-Power Lossy Networks (RPL)
and Constrained Application layer protocol (CoAP) is carried out with respect to latency delay and packet
delivery ratio. The results, discussion and conclusion presented in this paper are useful for researchers,
who are interested to work with IoT protocols and standards.
ABSTRACT : Pervasive computing refers to the embodiment of computing devices into physical objects connected into networks and these devices communicate with each other without any interactions required by the user. It plays a major role in our daily lives and has a vast range of applications in many fields. This paper presents a brief introduction to pervasive computing.
Key Words : pervasive computing, ubiquitous computing, Internet of things
A SOLUTION FRAMEWORK FOR MANAGING INTERNET OF THINGS (IOT)IJCNCJournal
Internet of Things (IoT) refers to heterogeneous systems and devices (often referred to as smart objects) that connect to the internet, and is an emerging and active area of research with tremendous technological,
social, and economical value for a hyper-connected world. In this paper, we will discuss how billions of these internet connected devices and machines will change the future in which we shall live, communicate and do the business. The devices, which would be connected to the internet, could vary from simple systems on chip (SOC) without any Operating System (OS) to highly powerful processor with intelligent OS with widely varying processing capability and diverse protocol support. Many of these devices can also communicate with each other directly in a dynamic manner. A key challenge is: how to manage such a diverse set of devices of such massive scale in a secured and effective manner without breaching privacy. In this paper, we will discuss various management issues and challenges related to different communication
protocol support and models, device management, security, privacy, scalability, availability and analytic support, etc., in managing IoT. The key contribution of this paper is proposal of a reference management system architecture based on cloud technology in addressing various issues related to anagement of IoThaving billions of smart objects.
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...IJNSA Journal
In this paper, we suggest a new method to address attack detection problems in IoT networks, by using a specific emphasis on the user’s and network’s requirements regarding the application provider and giving a defence against intruders and malicious users. The paper focuses on resolving the problem of detection of attacks in IoT networks using Recurrent Neural Networks and an explainable artificial intelligence technique (XAI) named SHAP. XAI refers to a collection of methods and procedures for explaining how AI models make decisions. Although XAI is useful for understanding the motivations underlying AI models, the information utilized in these discoveries may be a risk. Machine learning models are vulnerable to attacks such as model inversion, model extraction, and membership inference. Such attacks could concentrate on the learning model or on the data used to train and build the model, depending on the involved circumstances and parties. Hence, when the owner of an AI model wishes to grant only black-box access and does not expose the model's parameters and architecture to third parties, solutions like XAI can notably enhance the susceptibility to model extraction attacks.
To guarantee the users regarding possible violations, the proposed RNN-SHAP method is based on a decentralized topology relying on a set of cooperative independent parties including the users of IoT network. Another advantage of the suggested approach is the capitalization on the trust relationships that are part of IoT networks in real life to build trusted mechanisms in the network. Compared to other methods using different metrics, the suggested RNN-SHAP shows its efficiency in resolving the DDoS problem.
Role of artificial intelligence in cloud computing, IoT and SDN: Reliability ...IJECEIAES
Information technology fields are now more dominated by artificial intelligence, as it is playing a key role in terms of providing better services. The inherent strengths of artificial intelligence are driving the companies into a modern, decisive, secure, and insight-driven arena to address the current and future challenges. The key technologies like cloud, internet of things (IoT), and software-defined networking (SDN) are emerging as future applications and rendering benefits to the society. Integrating artificial intelligence with these innovations with scalability brings beneficiaries to the next level of efficiency. Data generated from the heterogeneous devices are received, exchanged, stored, managed, and analyzed to automate and improve the performance of the overall system and be more reliable. Although these new technologies are not free of their limitations, nevertheless, the synthesis of technologies has been challenged and has put forth many challenges in terms of scalability and reliability. Therefore, this paper discusses the role of artificial intelligence (AI) along with issues and opportunities confronting all communities for incorporating the integration of these technologies in terms of reliability and scalability. This paper puts forward the future directions related to scalability and reliability concerns during the integration of the above-mentioned technologies and enable the researchers to address the current research gaps.
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKSijcsa
Ontology is applied to impart knowledge in various fields of Information Technology made it more intelligent in the past few decades. Many Ontologies was built on various domains like biology, medicine,physics, chemistry, and mathematics. The Ontology in computer science domain are limited and even the Ontology is not explored in detail. The knowledge in the field of computer networks is very large, which makes it more difficult for a human to expertise in. This paper proposes the Ontology in computer network domain on various perspectives like scope, scale, topology, communication media, OSI model, TCP/ IP model, protocol, security, network operating system, network hardware and performance. The Ontology is developed in OWL format, which can be easily integrated with any other semantic based applications. The network Ontology can be employed in Semantic Web applications to help the users to search for concepts computer networks domain
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYijasuc
Internet of Things(IoT) in recent days playing a vital role in networking related applications. However,
there are several protocols available for building IoT applications, but RPL and CoAP are important
protocols.There is a customized protocol requirement for specific IoT applications, while working on
specific research problems. Further, adequate platforms are required to evaluate the performance of these
protocols. These platforms need to be configured for the protocol, which is very crucial and timeconsuming task. At present, there is no collective and precise information available to carry out this work.
This paper discusses two different open source platforms available for IoT. Also,various IoT research ideas
need to design of IoT protocols. A few IoT communication technologies are mentioned in the paper. The
detail analysis of, two common protocols, namely Routing Protocol for Low-Power Lossy Networks (RPL)
and Constrained Application layer protocol (CoAP) is carried out with respect to latency delay and packet
delivery ratio. The results, discussion and conclusion presented in this paper are useful for researchers,
who are interested to work with IoT protocols and standards.
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYijasuc
Internet of Things(IoT) in recent days playing a vital role in networking related applications. However,
there are several protocols available for building IoT applications, but RPL and CoAP are important
protocols.There is a customized protocol requirement for specific IoT applications, while working on
specific research problems. Further, adequate platforms are required to evaluate the performance of these
protocols. These platforms need to be configured for the protocol, which is very crucial and timeconsuming task. At present, there is no collective and precise information available to carry out this work.
This paper discusses two different open source platforms available for IoT. Also,various IoT research ideas
need to design of IoT protocols. A few IoT communication technologies are mentioned in the paper. The
detail analysis of, two common protocols, namely Routing Protocol for Low-Power Lossy Networks (RPL)
and Constrained Application layer protocol (CoAP) is carried out with respect to latency delay and packet
delivery ratio. The results, discussion and conclusion presented in this paper are useful for researchers,
who are interested to work with IoT protocols and standards
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYijasuc
Internet of Things(IoT) in recent days playing a vital role in networking related applications. However,
there are several protocols available for building IoT applications, but RPL and CoAP are important
protocols.There is a customized protocol requirement for specific IoT applications, while working on
specific research problems. Further, adequate platforms are required to evaluate the performance of these
protocols. These platforms need to be configured for the protocol, which is very crucial and timeconsuming task. At present, there is no collective and precise information available to carry out this work.
This paper discusses two different open source platforms available for IoT. Also,various IoT research ideas
need to design of IoT protocols. A few IoT communication technologies are mentioned in the paper. The
detail analysis of, two common protocols, namely Routing Protocol for Low-Power Lossy Networks (RPL)
and Constrained Application layer protocol (CoAP) is carried out with respect to latency delay and packet
delivery ratio. The results, discussion and conclusion presented in this paper are useful for researchers,
who are interested to work with IoT protocols and standards.
ABSTRACT : Pervasive computing refers to the embodiment of computing devices into physical objects connected into networks and these devices communicate with each other without any interactions required by the user. It plays a major role in our daily lives and has a vast range of applications in many fields. This paper presents a brief introduction to pervasive computing.
Key Words : pervasive computing, ubiquitous computing, Internet of things
A SOLUTION FRAMEWORK FOR MANAGING INTERNET OF THINGS (IOT)IJCNCJournal
Internet of Things (IoT) refers to heterogeneous systems and devices (often referred to as smart objects) that connect to the internet, and is an emerging and active area of research with tremendous technological,
social, and economical value for a hyper-connected world. In this paper, we will discuss how billions of these internet connected devices and machines will change the future in which we shall live, communicate and do the business. The devices, which would be connected to the internet, could vary from simple systems on chip (SOC) without any Operating System (OS) to highly powerful processor with intelligent OS with widely varying processing capability and diverse protocol support. Many of these devices can also communicate with each other directly in a dynamic manner. A key challenge is: how to manage such a diverse set of devices of such massive scale in a secured and effective manner without breaching privacy. In this paper, we will discuss various management issues and challenges related to different communication
protocol support and models, device management, security, privacy, scalability, availability and analytic support, etc., in managing IoT. The key contribution of this paper is proposal of a reference management system architecture based on cloud technology in addressing various issues related to anagement of IoThaving billions of smart objects.
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
Similar to Application Of VLSI In Artificial Intelligence (20)
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
1. IOSR Journal of Computer Engineering (IOSRJCE)
ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 2 (Sep-Oct. 2012), PP 23-25
www.iosrjournals.org
www.iosrjournals.org 23 | Page
Application of VLSI In Artificial Intelligence
M. Zamin Ali Khan1
, Hussain Saleem2
and Shiraz Afzal3
1
Main Communication Network Department, University of Karachi, Karachi, Pakistan
2
Department of Computer Science, University of Karachi, Karachi, Pakistan
3
Electronic Engineering Departments, Sir Syed University of Engineering & Technology, Karachi, Pakistan
Abstract : This paper describes the application of VLSI (Very Large Scale Integrated) circuit in Artificial
Intelligence (AI). VLSI is the inter-disciplinary science of utilizing advance semiconductor technology to create
various functions of computer system. This manuscript addresses the close link of microelectronics and AI. By
combining VLSI technology, a very powerful computer architecture confinement is possible.
Keywords - VLSI, Artificial Intelligence, DAA, Chip Design, Expert System.
I. INTRODUCTION
Gone are the days when massive computers made-up of vacuum tubes sat humming in entire dedicated
rooms and could do about 360 multiplications of 10 digit numbers in a second. Though they were heralded as
the fastest computing machines of that time, they surely do not stand a chance when compared to the modern
day machines. Modern day computers are getting smaller, faster, and in-expensive and more power and efficient
every progressing second. But what drove this change? The whole domain of computing ushered into a new
dawn of electronic miniaturization with the advent of semiconductor transistor by Bardeen (1947-48) and then
the Bipolar Transistor by Shockley (1949) in the Bell Laboratory [1].
The development of microelectronics spans a time which is even lesser than the average life
expectancy of a human, and yet it has seen as many as four generations. Early 60’s saw the low density
fabrication processes classified under Small Scale Integration (SSI) in which transistor count was limited to
about 10. This rapidly gave way to Medium Scale Integration (MSI) in the late 60’s when around 100 transistors
could be placed on a single chip.
It was the period when the cost of research began to deterioration and private firms started entering the
competition in comparison to the former years where the main load was borne by the military. Transistor-
Transistor logic (TTL) proposing higher integration densities endured other IC families identically Emitter-
Coupled Logic (ECL) and became the basis of the first integrated circuit revolution. It was the creation of this
family that gave inspiration to semiconductor giants for example Texas Instruments, Fairchild, Motorola and
National Semiconductors. Early seventies marked the progression of transistor count to about 1000 per chip
called the Large Scale Integration (LSI).
By mid-eighties, the transistor count on a single chip had already exceeded 1000 and henceforth came
the era of Very Large Scale Integration (VLSI). Though numerous improvements have been made and the
transistor count is still increasing, further the names of generations e.g. ULSI (Ultra Large Scale Integration) are
normally avoided. It was during this time when TTL got defeated in the battle to MOS (Metal Oxide
Semiconductor) family due to the same problems that had pushed vacuum tubes into slackness, power
dissipation and the limit it imposed on the number of gates that could be positioned on a single die [1].
The second age of Integrated Circuits revolution started with the starter of the first microprocessor, the
4004 by Intel in 1972 and the 8080 in 1974. Today various companies like Texas Instruments, Infineon,
Alliance Semiconductors, Cadence, Synopsys, Cisco, Micron Tech, National Semiconductors, ST
Microelectronics, Qualcomm, Lucent, Mentor Graphics, Analog Devices, Intel, Philips, Motorola and many
other firms have been proven and are dedicated to many fields in VLSI like Programmable Logic Devices,
Hardware Descriptive Languages, Design tools, Embedded Systems etc.
With the Introduction in Section-1, Section-2 describes the notion of Artificial Intelligence. Section-3
gives comparison of AI & VLSI. At the end, Section-4 gives detail about the importance and applications of
VLSI in AI.
II. ARTIFICIAL INTELLIGENCE
AI is the area of computer science focusing on creating machines that can engage on behaviors that
humans consider intelligent. The ability to create intelligent machines has intrigued humans since ancient times
and today with the advent of the computer and 50 years of research into AI programming techniques, the dream
of smart machines is becoming a reality. Researchers are creating systems which can mimic human thought,
understand speech, beat the best human chess player, and countless other feats that were never possible before
[2].
2. Application of VLSI in Artificial Intelligence
www.iosrjournals.org 24 | Page
III. ARTIFICIAL INTELLIGENCE & VLSI (AI AND VLSI)
Most of the prosperous applications of Artificial Intelligence (AI) to integrated circuit and printed
circuit board design schematic have appeared in the area of expert systems which work as design assistants
[3][9]. But expert systems technology is only one aspect of AI. VLSI design is a complex process. Moreover,
that complexity is multi-dimensional. Size and level of detail are two distinctive dimensions. Others include the
hierarchical nature of the design process as well as of the self-design. AI languages lend themselves to solving
problems of such complexity. These language features coupled with expert systems permit a significant first
step to solving a very difficult problem i.e. the verification of the correctness of a design [3].
IV. APPLICATIONS
Applications of AI are growing rapidly. These are being pursued not only in university research but
also in industrial environments. One such application area under investigation is VLSI design [7][8][11]. The
first significant applications were expert systems. An expert system is essentially a computer program which
simulates a human expert's behavior by applying reasoning techniques to a base of knowledge in some area of
specialization. An expert system should be able to solve straight forward and medium difficulty problems in that
area of specialization. For very difficult problems, it should be able to formulate one or more potential solutions
and possibly indicate the reliability of each alternative.
An expert system differs from a standard computer program in several important aspects. In a
conventional computer program, the “intelligence” is directly written into the code. The code then solves a
problem by performing an algorithm which is known to address the problem. Further, except for explicit
branches, the code executes sequentially. In an expert system, the “intelligence” is separated from the control or
reasoning portion. Thus changes and additions to the knowledge can occur without changing the control portion
[4].
The essence of the Knowledge based approach used in AI, is to ask what knowledge is used by a
human expert in solving some task and to develop algorithms and data structures that may represent this
knowledge explicitly. Often the most useful facts are a collection of some rules of thumb, derived through
subjective approach, can be stated as IF-THEN rules and can be used in a simple reasoning process. Researchers
using this reasoning approach in a number of areas of VLSI have found several advantages over the trivial
approaches, such as discussed in [4].
It is easier to make incremental improvements
It is easier for the system to explain what it is doing and why
It is easier for the human expert to determine what is incorrect or incomplete about the systems knowledge
and explain how to fix it
It is easier to interactively use a human expert’s abilities
These experts system are being used widely in VLSI design [7][8][10][12]. The Design Automation
Assistant (DAA) [5] is important as it was one of the first knowledge-based systems created for VLSI design. It
was developed jointly by researchers at Carnegie-Mellon University and AT&T Bell Labs. The initial DAA
contained rules describing various synthesis operations and applicable contexts. Production rules were expressed
in terms of registers, operators, data paths, and control signals. Over the years, the DAA system has been
expanded and refined [3]. There are more than 500 rules in its knowledge base. It has successfully been used to
design several systems.
Another important example is the Design Advisor by NCR [3] which is an expert assistant offering
advice in six areas for the design of semi-custom CMOS chips from a library of standard cells. The advisor
includes facts and rules on simulation, functions, timing, testability, design rules, and specification feasibility.
The Design Advisor is built on top of an expert system shell called Proteus, developed by the Microelectronics
and Computer Technology Corporation (MCC).
Another knowledge based system called REDESIGN [4] is being used by several people to address the
following problem of functional redesign. Given an existing circuit, its functional specifications, and a desired
change to these specifications. It helps the user to determine a change in the circuit that will allow it to meet the
altered functional specifications without introducing undesirable side-effects. In this case, providing intelligent
assistance on two quite different types of reasoning about the given circuit is desired.
The first essential type of reasoning about circuits is causal reasoning about the inter-relations among
signals within the circuit. This is a generalization of the notions of circuit simulation and symbolic simulation. It
involves tasks such as, given a description of the streams of data being input to a component, deriving a
description of the output data streams. Or, given a specification of the required characteristics of the outputs of a
component, determine what characteristics must be satisfied by the inputs to the component. The subsystem of
REDESIGN which has been developed to solve these kinds of problems is called CRITTER [6]. A second type
of reasoning essential to redesign involves reasoning about purposes of components. For example, given a
circuit, and its specifications, explain the role played by a particular component in implementing the overall
3. Application of VLSI in Artificial Intelligence
www.iosrjournals.org 25 | Page
specifications. Or, determine the range of components that can be substituted for this component without
violating the overall specifications.
REFERENCES
[1] Engineers Garage, Web: http://www.engineersgarage.com/articles/vlsi-design-future, Accessed on: 30 September 2012.
[2] Oracle ThinkQuest, Web: http://library.thinkquest.org/2705/, Accessed on: 30 September 2012.
[3] Ann Miller, “From Expert Assistant to Design Verification: Applications of AI to VLSI Design”, Session 11Al, IEEE, Vol.2, pp.406-
410, 1989.
[4] Louis I. Steinberg, Tom M. Mitchell, “A knowledge based approach to VLSI CAD the redesign system”, In Proceedings of the 21st
Design Automation Conference, IEEE Press, Piscataway, NJ, USA, pp.412-418, 1984.
[5] T. J. Kowalski, D.E. Thomas, “The VLSI Design Automation Assistant Prototype System”, In 20th Design Automation Conference,
IEEE, pp.479-483, 1983.
[6] Van E. Kelly, “The CRITTER System: Automated Critiquing of Digital Circuit Designs”, In Proceedings of the 21st Design
Automation Conference, IEEE Press, 1984, 419-425.
[7] R. L. Steele, “An Expert System Application in Semicustom VLSI Design”, In Proceedings of the 24th ACM/IEEE Design
Automation Conference, A. O'Neill and D. Thomas (Eds.), ACM, pp.679-688, 1987.
[8] H. Farahat, A. Eldessouki, M. Y. Mahmoud, H. Elsimary, “An Expert System for VLSI Layout Design”, International Conference on
Systems Engineering, IEEE, pp.529-532, 1989.
[9] M. Stefik, L. Conway, “Towards the Principled Engineering of Knowledge”, AI Magazine, Vol. 3:3, pp.4-16, 1982. (Reprinted in
Readings From the AI Magazine, Volumes 1-5, 1980-1985, pp.135-147, 1988.)
[10] J. Kim, J.P. McDermott, “TALIB: An IC Layout Design Assistant”, In Proc. AAAI, pp.197-201, 1983.
[11] Guy Rabbat, “VLSI and AI are getting closer”, Circuits and Devices Magazine, IEEE, Vol.4, No.1, pp.15-18, 1988.
[12] T.J. Kowalski, D. J. Geiger, W.H. Wolf, W. Fichtner, “The VLSI Design Automation Assistant: From Algorithms to Silicon”,
Design & Test of Computers, IEEE, Vol.2, No.4, pp.33-43, 1985.
Dr. M. Zamin Ali Khan is a Head of Main Communication network department at University of Karachi. He has
received B.E (Electrical Engineering) from NED University, Karachi, Pakistan and MS (Electrical and Computer
Engineering) from Concordia University, Montreal, Canada and PhD in Computer Science from UoK. He has more than
18 years of experience of teaching and industry. He has worked in Victhom Human Bionics, Canada as an Engineer
Scientist. Currently, he is a senior member of Pakistan Engineering Council, Canadian Engineering Council and IEEE. His
research interest includes VLSI, Digital design, Digital signal processing and Analog front end of wireless devices.
Hussain Saleem is currently Assistant Professor and Ph.D. Research Scholar at Department of Computer Science,
University of Karachi, Pakistan. He received B.S. in Electronics Engineering from Sir Syed University of Engineering &
Technology, Karachi in 1997 and has done Masters in Computer Science from University of Karachi in 2001. He bears
vast experience of about 15 years of University Teaching, Administration and Research in various dimensions of
Computer Science. Hussain is the Author of several International Journal publications. His field of interest is Software
Science, System Automation, Hardware design and engineering, and Simulation & Modeling. He is senior member of
Pakistan Engineering Council (PEC).
Shiraz Afzal is a full time faculty member at Sir Syed University of Engineering & Technology, Karachi, Pakistan. He
received his B.S. in Electronics from Sir Syed University of Engineering and Technology Karachi, Pakistan and M.E
degree in Electronics with specialization in Micro-System design from NED University of Engineering and Technology
Karachi, Pakistan in 2006 and 2012 respectively. His research interest includes Microelectronic circuit design. He is also a
member of PEC.