SlideShare a Scribd company logo
DESIGN AND IMPLEMENTATION OF MULTIPLE SIC VECTORS
THEORY AND APPLICATION IN BIST SCHEMES
N.Seethamma 1
, V.Srinivasarao 2
1
M.Tech Student, Department of ECE, Shri Vishnu Engineering College for women, Bhimavaram
2
Associate Professor, Department of ECE, Shri Vishnu Engineering College for women, Bhimavaram
1
Mail id: sitanelluri@gmail.com
ABSTRACT
Test pattern generators are the vital blocks in
Built-in self-test. In this paper a new approach which
is multiple single input changes (MSIC) is used to
generate the random patterns for applying it to CUT
for testing applications. A reconfigurable Johnson
counter and a scalable SIC counter are developed to
generate a class of minimum transition sequences.
The proposed TPG is flexible to both the test-per-
clock and the test-per-scan schemes. The generated
patterns based on this approach are applied to the
ISCAS benchmark designs. Control unit is used to
control all the operations. Mainly control unit will do
configuration of CUT in test mode/Normal mode,
feed seed value to TPG and TRA. Simulation results
show the functionality of the pattern generator. The
synthesis is carried out on XILINX ISE and the
simulation is performed on the ISE simulator. The
obtained test results are comparing with the primary
one to demonstrate the target fault coverage.
Index Terms—Built-in self-test (BIST),
low power, single-input change (SIC), test pattern
generator (TPG).
I.INTRODUCTION
The main challenging areas in VLSI are
performance, cost, and power dissipation. The
demand for portable computing devices and
communications system are increasing rapidly. These
applications require low power dissipation VLSI
circuits. The power dissipation during test mode is
200% P more than in normal mode. Hence it is
important aspect to optimize power during testing.
Power optimization is one of the main challenges. To
reduce the power consumption generates the test
vectors with less number of transitions. Generally the
random sequence at the output of the flip-flops can be
used as a test pattern. Flip-flop’s connected in series
with feedback taps defined by the generator
polynomial. The seed value is loaded into the outputs
of the flip-flops. The only input required to generate
a random sequence is an external clock where each
clock pulse can produce a unique pattern at the output
of the flip-flops.
This test pattern is run on the circuit under
test for desired fault coverage. The number of inputs
required by the circuit under test must match with the
number of flip-flop outputs. The power consumed by
the chip under test is a measure of the switching
activity of the logic inside the chip which depends
largely on the randomness of the applied input
stimulus. Reduced correlation between the successive
vectors of the applied stimulus into the circuit under
test can result in much higher power consumption by
the device than the budgeted power. A new low
power pattern generation technique is implemented
using a multiple single input change method.
Proceedings of International Conference On Current Innovations In Engineering And Technology
International Association Of Engineering & Technology For Skill Development
ISBN : 978 - 1502851550
www.iaetsd.in
27
A) Need for using BIST technique
Today’s highly integrated multi-layer boards
with fine-pitch ICs are virtually impossible to be
accessed physically for testing. Traditional board test
methods which include functional test, only accesses
the board's primary I/Os, providing limited coverage
and poor diagnostics for board-network fault. In
circuit testing, another traditional test method works
by physically accessing each wire on the board via
costly "bed of nails" probes and testers. To identify
reliable testing methods which will reduce the cost
of test equipment, a research to verify each
VLSI testing problems has been conducted. The
major problems detected so far are as follows:
 Test generation problems
 Gate to I/O pin ratio
B) Test Generation Problems
The large number of gates in VLSI circuits has
pushed computer automatic-test-generation times to
weeks or months of computation. The numbers of
test patterns are becoming too large to be
handled by an external tester and this has
resulted in high computation costs and has
outstripped reasonable available time for production
testing.
C) The Gate to I/O Pin Ratio Problem
As ICs grow in gate counts, it is no longer
true that most gate nodes are directly accessible by
one of the pins on the package. This makes testing of
internal nodes more difficult as they could neither no
longer be easily controlled by signal from an input
pin (controllability) nor easily observed at an output
pin (observe ability). Pin counts go at a much slower
rate than gate counts, which worsens the
controllability and observe ability of internal gate
nodes.
II. PROPOSED MSIC-TPG SCHEME
This section discuss about the introduction of
MSIC and how the test patterns are generated using
this scheme. First, the SIC vector is decompressed to
its multiple code words. Meanwhile, the generated
code words will bit-XOR with a same seed vector in
turn. Hence, a test pattern with similar test vectors
will be applied to all scan chains. The proposed
MSIC-TPG consists of an SIC generator, a seed
generator, an XOR gate network, and a clock and
control block.
Fig.1(a) Symbolic simulation of an MSIC
pattern for scan chains.
(b) Symbolic representation of an
MSIC pattern.
Proceedings of International Conference On Current Innovations In Engineering And Technology
International Association Of Engineering & Technology For Skill Development
ISBN : 978 - 1502851550
www.iaetsd.in
28
A) Test Pattern Generation Method
Assume there are m primary inputs (PIs) and M
scan chains in a full scan design, and each scan chain
has l scan cells. Fig. 1(a) shows the symbolic
simulation for one generated pattern. The vector
generated by an m-bit LFSR with the primitive
polynomial can be expressed as S(t) =
S0(t)S1(t)S2(t), . . . , Sm−1(t) (hereinafter referred to
as the seed), and the vector generated by an l-bit
Johnson counter can be expressed as J (t) =
J0(t)J1(t)J2(t), . . . , Jl−1(t).In the first clock cycle, J =
J0 J1 J2, . . . , Jl−1 will bit-XOR with S = S0S1S2, . .
. , SM−1, and the results X1Xl+1X2l+1, . . . ,
X(M−1)l+1 will be shifted into M scan chains,
respectively. In the second clock cycle, J = J0 J1 J2, .
. . , Jl−1 will be circularly shifted as J =Jl−1 J0 J1, . . .
, Jl−2, which will also bit-XOR with the seed S =
S0S1S2, . . . , SM−1. The resulting X2Xl+2X2l+2, . .
. , X(M−1)l+2 will be shifted into M scan chains,
respectively. After l clocks, each scan chain will be
fully loaded with a unique Johnson codeword, and
seed S0S1S2, . . . , Sm−1 will be applied to m PIs.
Since the circular Johnson counter can generate l
unique Johnson codewords through circular shifting a
Johnson vector, the circular Johnson counter and
XOR gates in Fig. 1 actually constitute a linear
sequential decompressor.
B) Reconfigurable Johnson Counter
According to the different scenarios of scan
length, this paper develops two kinds of SIC
generators to generate Johnson vectors and Johnson
codewords, i.e., the reconfigurable Johnson counter
and the scalable SIC counter.For a short scan length,
we develop a reconfigurable Johnson counter to
generate an SIC sequence in time domain.As shown
in Fig. 2(a), it can operate in three modes.
1) Initialization: When RJ_Mode is set to 1 and Init is
set to logic 0, the reconfigurable Johnson counter will
be initialized to all zero states by clocking CLK2
more than l times.
2) Circular shift register mode: When RJ_Mode and
Init are set to logic 1, each stage of the Johnson
counter will output a Johnson codeword by clocking
CLK2 l times.
3) Normal mode: When RJ_Mode is set to logic 0,
the reconfigurable Johnson counter will generate 2l
unique SIC vectors by clocking CLK2 2l times.
C) Scalable SIC Counter
When the maximal scan chain length l is
much larger than the scan chain number M, we
develop an SIC counter named the “scalable SIC
counter.” As shown in Fig. 2(b), it contains a k-bit
adder clocked by the rising SE signal, a k-bit
subtractor clocked by test clock CLK2, an M-bit shift
register clocked by test clock CLK2, and k
multiplexers. The value of k is the integer of log2(l −
M). The waveforms of the scalable SIC counter are
shown in Fig. 2(c). The k-bit adder is clocked by the
falling SE signal, and generates a new count that is
the number of 1s (0s) to fill into the shift register. As
shown in Fig. 2(b), it can operate in three modes.
1) If SE = 0, the count from the adder is stored to the
k-bit subtractor. During SE = 1, the contents of the k-
bit subtractor will be decreased from the stored count
to all zeros gradually.
Proceedings of International Conference On Current Innovations In Engineering And Technology
International Association Of Engineering & Technology For Skill Development
ISBN : 978 - 1502851550
www.iaetsd.in
29
2) If SE = 1 and the contents of the k-bit subtractor
are not all zeros, M-Johnson will be kept at logic 1
(0).
3) Otherwise, it will be kept at logic 0 (1). Thus, the
needed 1s (0s) will be shifted into the M-bit shift
register by clocking CLK2 l times, and unique
Johnson codewords will be applied into different scan
chains.
Fig.2. SIC generators. (a) Reconfigurable Johnson
counter (b) Scalable SIC counter (c) Waveforms
of the scalable SIC counter.
D) MSIC-TPGs for Test-per-Clock Schemes
The MSIC-TPG for test-per-clock schemes is
illustrated in Fig. 3(a). The CUT’s PIs X1 − Xmn are
arranged as an n ×m SRAM-like grid structure. Each
grid has a two-input XOR gate whose inputs are
tapped from a seed output and an output of the
Johnson counter. The outputs of the XOR gates are
applied to the CUT’s PIs. A seed generator is an m-
stage conventional LFSR, and operates at low
frequency CLK1. The test procedure is as follows.
1) The seed generator generates a new seed by
clocking CLK1 one time.
2) The Johnson counter generates a new vector by
clocking CLK2 one time.
3) Repeat 2 until 2l Johnson vectors are generated.
4) Repeat 1–3 until the expected fault coverage or
test length is achieved.
E) MSIC-TPGs for Test-per-Scan Schemes
The MSIC-TPG for test-per-scan schemes is
illustrated in Fig. 3(b). The stage of the SIC generator
is the same as the maximum scan length, and the
width of a seed generator is not smaller than the scan
chain number. The inputs of the XOR gates come
from the seed generator and the SIC counter and their
outputs are applied to M scan chains, respectively.
The outputs of the seed generator and XOR gates are
applied to the CUT’s PIs, respectively. The test
procedure is as follows.
1) The seed circuit generates a new seed by clocking
CLK1 one time.
2) RJ_Mode is set to 0. The Reconfigurable Johnson
counter will operate in the Johnson counter mode and
generate a Johnson vector by clocking CLK2 one
time.
3) After a new Johnson vector is generated, RJ_Mode
and Init are set to 1. The reconfigurable Johnson
counter operates as a circular shift register, and
generates l codewords by clocking CLK2 l times.
Then, a capture operation is inserted.
Proceedings of International Conference On Current Innovations In Engineering And Technology
International Association Of Engineering & Technology For Skill Development
ISBN : 978 - 1502851550
www.iaetsd.in
30
4) Repeat 2–3 until 2l Johnson vectors are
generated.
5) Repeat 1–4 until the expected fault coverage
or test length is achieved.
Fig 3. MSIC-TPGs for (a) test-per-clock and (b)
test-per-scan schemes.
III. STRATEGY DESCRIPTION
The MSIC Test pattern generator architecture
internally consists of a control circuit, seed circuit,
SIC counter, scan chain and MISR modules. Here the
control unit is used to initiate the seed value and
enable the counter and to control the scan design.
CUT is the circuit or chip in which we are going to
apply BIST for testing stuck at zero or stuck at one
error. Tapping can be taken according to the
specification but as per taping change the TPG output
generate will also change and as we change in
number of flip-flop the probability of repetition of
random number will reduce. The initial value loading
to the TPG is known as seed value.
Classification of test strategies:
1. Weighted Pseudorandom: Testing: In weighted
pseudorandom testing, pseudorandom patterns are
applied with certain 0s and 1s distribution in order to
handle the random pattern resistant fault undetectable
by the pseudorandom testing. Thus, the test length
can be effectively shortened.
2. Pseudo exhaustive Testing: Pseudo exhaustive
testing divides the CUT into several smaller sub
circuits and tests each of them exhaustively. All
detectable flaws within the sub circuits can be
detected. However, such a method involves extra
design effort to partition the circuits and deliver the
test patterns and test responses. BIST is a set of
structured-test techniques for combinational and
sequential logic, memories, multipliers, and other
embedded logic blocks. BIST is the commonly used
design technique for self testing of circuits.
3. Pseudorandom Testing: Pseudorandom testing
involves the application of certain length of test
patterns that have certain randomness property. The
test patterns are sequenced in a deterministic order.
The test length and the contents of the patterns are
used to impart fault coverage.
4. Exhaustive Testing: Exhaustive testing involves
the application of all possible input combinations to
the circuit under test (CUT). It guarantees that all
Proceedings of International Conference On Current Innovations In Engineering And Technology
International Association Of Engineering & Technology For Skill Development
ISBN : 978 - 1502851550
www.iaetsd.in
31
detectable faults that divert from the sequential
behavior will be detected. The strategies are often
applied to complex and well isolated small modules
such as PLAs.
5. Stored Patterns: Stored-pattern approach tracks the
pre generated test patterns to achieve certain test
goals. It is used to enhance system level testing such
as the power-on self test of a computer and
microprocessor functional testing using micro
programs.
BIST is a design for testability (DFT)
technique in which testing is carried out using built –
in hardware features. Since testing is built into the
hardware, it is faster and efficient. The BIST
architecture needs three additional hardware blocks
such as a pattern generator, a response analyzer and a
test controller to a digital circuit. For pattern
generators, we can use either a ROM with stored
patterns, or a counter or a linear feedback shift
register (LFSR).A response analyzer is a compactor
with stored responses or an LFSR used as a signature
analyzer. A controller provides a control signal to
activate all the blocks.The circuit introduces more
switching activities in the circuit under test
(CUT)during test than that during normal
operation[5].It causes excessive power dissipation
and results in delay penalty into the design[6].
Using BIST Technique the portability can be
achieved very easily than the Automatic Test pattern
generator. Generally the Automatic Test pattern
generators are used externally while a BIST uses
internally. Due to advantages of BIST the concept of
ATPG is vanishes but it also has its own advantages.
IV.RESULTS
WAVEFORM FOR 4BIT MISC
WAVEFORM FOR 8 BIT LOW POWER LFSR
WAVEFORM FOR 8 BIT MSIC
Proceedings of International Conference On Current Innovations In Engineering And Technology
International Association Of Engineering & Technology For Skill Development
ISBN : 978 - 1502851550
www.iaetsd.in
32
Schematics:
RTL Schematics:
Technology schematics:
V. CONCLUSION
The proposed approach shows the concept of
reducing the transitions in the test pattern generated.
The transition is reduced by increasing the correlation
between the successive bits. The simulation results
shows that how the patterns are generated for the
applied seed vector. This paper presents the
implementation of MSIC approach based pattern
generator with regard to verilog language.
Synthesizing and implementation (i.e. Translate, Map
and Place and Route) of the code is carried out on
Xilinx - Project Navigator, ISE suite. The power
reports shows that the proposed low power lfsr
consumes less power during testing by taking the
benchmark circuit. In future there is a chance to
reduce the power somewhat more by doing
modifications in the proposed architecture.
REFERENCES
[1] Feng Liang, Luwen Zhang, Shaochong Lei,
Guohe Zhang, Kaile Gao, and Bin Liang “Test
Patterns of Multiple SIC Vectors: Theory and
Application in BIST Schemes” in IEEE transactions
on very large scale integration (vlsi) systems, Vol.
21, No. 4, April 2013
[2] Y. Zorian, “A distributed BIST control scheme
for complex VLSI devices,” in 11th Annu. IEEE
VLSI Test Symp. Dig. Papers, Apr. 1993,pp. 4–9.
[3] A. Abu-Issa and S. Quigley, “Bit-swapping
LFSR and scan-chain ordering: A novel technique for
peak- and average-power reduction in scan-based
BIST,” IEEE Trans. Comput.-Aided Design Integr.
Circuits Syst., vol. 28, no. 5, pp. 755–759, May 2009.
[4] P. Girard, L. Guiller, C. Landrault, S.
Pravossoudovitch, J. Figueras,S. Manich, P. Teixeira,
and M. Santos, “Low-energy BIST design: Impact of
the LFSR TPG parameters on the weighted switching
activity,”in Proc. IEEE Int. Symp. Circuits Syst., vol.
1. Jul. 1999, pp.110–113.
[5] S. Wang and S. Gupta, “DS-LFSR: A BIST TPG
for low switching activity,” IEEE Trans. Comput.-
Aided Design Integr. Circuits Syst.,vol. 21, no. 7, pp.
842–851, Jul. 2002.
Proceedings of International Conference On Current Innovations In Engineering And Technology
International Association Of Engineering & Technology For Skill Development
ISBN : 978 - 1502851550
www.iaetsd.in
33
[6] F. Corno, M. Rebaudengo, M. Reorda, G.
Squillero, and M. Violante,“Low power BIST via
non-linear hybrid cellular automata,”in Proc. 18th
IEEE VLSI Test Symp., Apr.–May 2000, pp.29–34.
[7] P. Girard, L. Guiller, C. Landrault, S.
Pravossoudovitch, and H. Wunderlich,“A modified
clock scheme for a low power BIST test pattern
generator,” in Proc. 19th IEEE VTS VLSI Test
Symp., Mar.–Apr. 2001,pp. 306–311.
[8] D. Gizopoulos, N. Krantitis, A. Paschalis, M.
Psarakis, and Y. Zorian, “Low power/energy BIST
scheme for datapaths,” in Proc. 18th IEEE VLSI Test
Symp., Apr.–May 2000, pp. 23–28.
[9] Y. Bonhomme, P. Girard, L. Guiller, C.
Landrault, and S. Pravossoudovitch,“A gated clock
scheme for low power scan testing of logic ICs or
embedded cores,” in Proc. 10th Asian Test Symp.,
Nov. 2001, pp.253–258.
Proceedings of International Conference On Current Innovations In Engineering And Technology
International Association Of Engineering & Technology For Skill Development
ISBN : 978 - 1502851550
www.iaetsd.in
34

More Related Content

Similar to Iaetsd design and implementation of multiple sic vectors

L0421068072
L0421068072L0421068072
L0421068072
ijceronline
 
Low power test pattern generation for bist applications
Low power test pattern generation for bist applicationsLow power test pattern generation for bist applications
Low power test pattern generation for bist applications
eSAT Publishing House
 
Low power test pattern generation for bist applications
Low power test pattern generation for bist applicationsLow power test pattern generation for bist applications
Low power test pattern generation for bist applications
eSAT Journals
 
Optimal and Power Aware BIST for Delay Testing of System-On-Chip
Optimal and Power Aware BIST for Delay Testing of System-On-ChipOptimal and Power Aware BIST for Delay Testing of System-On-Chip
Optimal and Power Aware BIST for Delay Testing of System-On-Chip
IDES Editor
 
Performance Analysis of Input Vector Monitoring Concurrent Built In Self Repa...
Performance Analysis of Input Vector Monitoring Concurrent Built In Self Repa...Performance Analysis of Input Vector Monitoring Concurrent Built In Self Repa...
Performance Analysis of Input Vector Monitoring Concurrent Built In Self Repa...
IJTET Journal
 
High Speed 8-bit Counters using State Excitation Logic and their Application ...
High Speed 8-bit Counters using State Excitation Logic and their Application ...High Speed 8-bit Counters using State Excitation Logic and their Application ...
High Speed 8-bit Counters using State Excitation Logic and their Application ...
International Journal of Science and Research (IJSR)
 
Vlsi Design of Low Transition Low Power Test Pattern Generator Using Fault Co...
Vlsi Design of Low Transition Low Power Test Pattern Generator Using Fault Co...Vlsi Design of Low Transition Low Power Test Pattern Generator Using Fault Co...
Vlsi Design of Low Transition Low Power Test Pattern Generator Using Fault Co...
iosrjce
 
H010613642
H010613642H010613642
H010613642
IOSR Journals
 
Design and Implementation of Area Optimized, Low Complexity CMOS 32nm Technol...
Design and Implementation of Area Optimized, Low Complexity CMOS 32nm Technol...Design and Implementation of Area Optimized, Low Complexity CMOS 32nm Technol...
Design and Implementation of Area Optimized, Low Complexity CMOS 32nm Technol...
IJERA Editor
 
IllinoisScan_seminar.ppt
IllinoisScan_seminar.pptIllinoisScan_seminar.ppt
IllinoisScan_seminar.ppt
coolbusinessman
 
Error Identification in RAM using Input Vector Monitoring Concurrent BIST Arc...
Error Identification in RAM using Input Vector Monitoring Concurrent BIST Arc...Error Identification in RAM using Input Vector Monitoring Concurrent BIST Arc...
Error Identification in RAM using Input Vector Monitoring Concurrent BIST Arc...
IJMTST Journal
 
Scan-Based Delay Measurement Technique Using Signature Registers
Scan-Based Delay Measurement Technique Using Signature RegistersScan-Based Delay Measurement Technique Using Signature Registers
Scan-Based Delay Measurement Technique Using Signature Registers
IJMER
 
An approach to Measure Transition Density of Binary Sequences for X-filling b...
An approach to Measure Transition Density of Binary Sequences for X-filling b...An approach to Measure Transition Density of Binary Sequences for X-filling b...
An approach to Measure Transition Density of Binary Sequences for X-filling b...
IJECEIAES
 
final report
final reportfinal report
final report
Swayambhu Nath Ray
 
Design of Counter Using SRAM
Design of Counter Using SRAMDesign of Counter Using SRAM
Design of Counter Using SRAM
IOSRJECE
 
Design and analysis of dual-mode numerically controlled oscillators based co...
Design and analysis of dual-mode numerically controlled  oscillators based co...Design and analysis of dual-mode numerically controlled  oscillators based co...
Design and analysis of dual-mode numerically controlled oscillators based co...
IJECEIAES
 
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...
Filip Krikava
 
P410498102
P410498102P410498102
P410498102
IJERA Editor
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
ijceronline
 
Simulations of a typical CMOS amplifier circuit using the Monte Carlo method
Simulations of a typical CMOS amplifier circuit using the Monte Carlo methodSimulations of a typical CMOS amplifier circuit using the Monte Carlo method
Simulations of a typical CMOS amplifier circuit using the Monte Carlo method
IJERA Editor
 

Similar to Iaetsd design and implementation of multiple sic vectors (20)

L0421068072
L0421068072L0421068072
L0421068072
 
Low power test pattern generation for bist applications
Low power test pattern generation for bist applicationsLow power test pattern generation for bist applications
Low power test pattern generation for bist applications
 
Low power test pattern generation for bist applications
Low power test pattern generation for bist applicationsLow power test pattern generation for bist applications
Low power test pattern generation for bist applications
 
Optimal and Power Aware BIST for Delay Testing of System-On-Chip
Optimal and Power Aware BIST for Delay Testing of System-On-ChipOptimal and Power Aware BIST for Delay Testing of System-On-Chip
Optimal and Power Aware BIST for Delay Testing of System-On-Chip
 
Performance Analysis of Input Vector Monitoring Concurrent Built In Self Repa...
Performance Analysis of Input Vector Monitoring Concurrent Built In Self Repa...Performance Analysis of Input Vector Monitoring Concurrent Built In Self Repa...
Performance Analysis of Input Vector Monitoring Concurrent Built In Self Repa...
 
High Speed 8-bit Counters using State Excitation Logic and their Application ...
High Speed 8-bit Counters using State Excitation Logic and their Application ...High Speed 8-bit Counters using State Excitation Logic and their Application ...
High Speed 8-bit Counters using State Excitation Logic and their Application ...
 
Vlsi Design of Low Transition Low Power Test Pattern Generator Using Fault Co...
Vlsi Design of Low Transition Low Power Test Pattern Generator Using Fault Co...Vlsi Design of Low Transition Low Power Test Pattern Generator Using Fault Co...
Vlsi Design of Low Transition Low Power Test Pattern Generator Using Fault Co...
 
H010613642
H010613642H010613642
H010613642
 
Design and Implementation of Area Optimized, Low Complexity CMOS 32nm Technol...
Design and Implementation of Area Optimized, Low Complexity CMOS 32nm Technol...Design and Implementation of Area Optimized, Low Complexity CMOS 32nm Technol...
Design and Implementation of Area Optimized, Low Complexity CMOS 32nm Technol...
 
IllinoisScan_seminar.ppt
IllinoisScan_seminar.pptIllinoisScan_seminar.ppt
IllinoisScan_seminar.ppt
 
Error Identification in RAM using Input Vector Monitoring Concurrent BIST Arc...
Error Identification in RAM using Input Vector Monitoring Concurrent BIST Arc...Error Identification in RAM using Input Vector Monitoring Concurrent BIST Arc...
Error Identification in RAM using Input Vector Monitoring Concurrent BIST Arc...
 
Scan-Based Delay Measurement Technique Using Signature Registers
Scan-Based Delay Measurement Technique Using Signature RegistersScan-Based Delay Measurement Technique Using Signature Registers
Scan-Based Delay Measurement Technique Using Signature Registers
 
An approach to Measure Transition Density of Binary Sequences for X-filling b...
An approach to Measure Transition Density of Binary Sequences for X-filling b...An approach to Measure Transition Density of Binary Sequences for X-filling b...
An approach to Measure Transition Density of Binary Sequences for X-filling b...
 
final report
final reportfinal report
final report
 
Design of Counter Using SRAM
Design of Counter Using SRAMDesign of Counter Using SRAM
Design of Counter Using SRAM
 
Design and analysis of dual-mode numerically controlled oscillators based co...
Design and analysis of dual-mode numerically controlled  oscillators based co...Design and analysis of dual-mode numerically controlled  oscillators based co...
Design and analysis of dual-mode numerically controlled oscillators based co...
 
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...
 
P410498102
P410498102P410498102
P410498102
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
Simulations of a typical CMOS amplifier circuit using the Monte Carlo method
Simulations of a typical CMOS amplifier circuit using the Monte Carlo methodSimulations of a typical CMOS amplifier circuit using the Monte Carlo method
Simulations of a typical CMOS amplifier circuit using the Monte Carlo method
 

More from Iaetsd Iaetsd

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
Iaetsd Iaetsd
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
Iaetsd Iaetsd
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
Iaetsd Iaetsd
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
Iaetsd Iaetsd
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
Iaetsd Iaetsd
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
Iaetsd Iaetsd
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
Iaetsd Iaetsd
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bike
Iaetsd Iaetsd
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technology
Iaetsd Iaetsd
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
Iaetsd Iaetsd
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
Iaetsd Iaetsd
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
Iaetsd Iaetsd
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
Iaetsd Iaetsd
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
Iaetsd Iaetsd
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
Iaetsd Iaetsd
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
Iaetsd Iaetsd
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
Iaetsd Iaetsd
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
Iaetsd Iaetsd
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
Iaetsd Iaetsd
 
iaetsd Isolation of cellulose from non conventional source and its chemical m...
iaetsd Isolation of cellulose from non conventional source and its chemical m...iaetsd Isolation of cellulose from non conventional source and its chemical m...
iaetsd Isolation of cellulose from non conventional source and its chemical m...
Iaetsd Iaetsd
 

More from Iaetsd Iaetsd (20)

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bike
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technology
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
 
iaetsd Isolation of cellulose from non conventional source and its chemical m...
iaetsd Isolation of cellulose from non conventional source and its chemical m...iaetsd Isolation of cellulose from non conventional source and its chemical m...
iaetsd Isolation of cellulose from non conventional source and its chemical m...
 

Recently uploaded

CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 

Recently uploaded (20)

CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 

Iaetsd design and implementation of multiple sic vectors

  • 1. DESIGN AND IMPLEMENTATION OF MULTIPLE SIC VECTORS THEORY AND APPLICATION IN BIST SCHEMES N.Seethamma 1 , V.Srinivasarao 2 1 M.Tech Student, Department of ECE, Shri Vishnu Engineering College for women, Bhimavaram 2 Associate Professor, Department of ECE, Shri Vishnu Engineering College for women, Bhimavaram 1 Mail id: sitanelluri@gmail.com ABSTRACT Test pattern generators are the vital blocks in Built-in self-test. In this paper a new approach which is multiple single input changes (MSIC) is used to generate the random patterns for applying it to CUT for testing applications. A reconfigurable Johnson counter and a scalable SIC counter are developed to generate a class of minimum transition sequences. The proposed TPG is flexible to both the test-per- clock and the test-per-scan schemes. The generated patterns based on this approach are applied to the ISCAS benchmark designs. Control unit is used to control all the operations. Mainly control unit will do configuration of CUT in test mode/Normal mode, feed seed value to TPG and TRA. Simulation results show the functionality of the pattern generator. The synthesis is carried out on XILINX ISE and the simulation is performed on the ISE simulator. The obtained test results are comparing with the primary one to demonstrate the target fault coverage. Index Terms—Built-in self-test (BIST), low power, single-input change (SIC), test pattern generator (TPG). I.INTRODUCTION The main challenging areas in VLSI are performance, cost, and power dissipation. The demand for portable computing devices and communications system are increasing rapidly. These applications require low power dissipation VLSI circuits. The power dissipation during test mode is 200% P more than in normal mode. Hence it is important aspect to optimize power during testing. Power optimization is one of the main challenges. To reduce the power consumption generates the test vectors with less number of transitions. Generally the random sequence at the output of the flip-flops can be used as a test pattern. Flip-flop’s connected in series with feedback taps defined by the generator polynomial. The seed value is loaded into the outputs of the flip-flops. The only input required to generate a random sequence is an external clock where each clock pulse can produce a unique pattern at the output of the flip-flops. This test pattern is run on the circuit under test for desired fault coverage. The number of inputs required by the circuit under test must match with the number of flip-flop outputs. The power consumed by the chip under test is a measure of the switching activity of the logic inside the chip which depends largely on the randomness of the applied input stimulus. Reduced correlation between the successive vectors of the applied stimulus into the circuit under test can result in much higher power consumption by the device than the budgeted power. A new low power pattern generation technique is implemented using a multiple single input change method. Proceedings of International Conference On Current Innovations In Engineering And Technology International Association Of Engineering & Technology For Skill Development ISBN : 978 - 1502851550 www.iaetsd.in 27
  • 2. A) Need for using BIST technique Today’s highly integrated multi-layer boards with fine-pitch ICs are virtually impossible to be accessed physically for testing. Traditional board test methods which include functional test, only accesses the board's primary I/Os, providing limited coverage and poor diagnostics for board-network fault. In circuit testing, another traditional test method works by physically accessing each wire on the board via costly "bed of nails" probes and testers. To identify reliable testing methods which will reduce the cost of test equipment, a research to verify each VLSI testing problems has been conducted. The major problems detected so far are as follows:  Test generation problems  Gate to I/O pin ratio B) Test Generation Problems The large number of gates in VLSI circuits has pushed computer automatic-test-generation times to weeks or months of computation. The numbers of test patterns are becoming too large to be handled by an external tester and this has resulted in high computation costs and has outstripped reasonable available time for production testing. C) The Gate to I/O Pin Ratio Problem As ICs grow in gate counts, it is no longer true that most gate nodes are directly accessible by one of the pins on the package. This makes testing of internal nodes more difficult as they could neither no longer be easily controlled by signal from an input pin (controllability) nor easily observed at an output pin (observe ability). Pin counts go at a much slower rate than gate counts, which worsens the controllability and observe ability of internal gate nodes. II. PROPOSED MSIC-TPG SCHEME This section discuss about the introduction of MSIC and how the test patterns are generated using this scheme. First, the SIC vector is decompressed to its multiple code words. Meanwhile, the generated code words will bit-XOR with a same seed vector in turn. Hence, a test pattern with similar test vectors will be applied to all scan chains. The proposed MSIC-TPG consists of an SIC generator, a seed generator, an XOR gate network, and a clock and control block. Fig.1(a) Symbolic simulation of an MSIC pattern for scan chains. (b) Symbolic representation of an MSIC pattern. Proceedings of International Conference On Current Innovations In Engineering And Technology International Association Of Engineering & Technology For Skill Development ISBN : 978 - 1502851550 www.iaetsd.in 28
  • 3. A) Test Pattern Generation Method Assume there are m primary inputs (PIs) and M scan chains in a full scan design, and each scan chain has l scan cells. Fig. 1(a) shows the symbolic simulation for one generated pattern. The vector generated by an m-bit LFSR with the primitive polynomial can be expressed as S(t) = S0(t)S1(t)S2(t), . . . , Sm−1(t) (hereinafter referred to as the seed), and the vector generated by an l-bit Johnson counter can be expressed as J (t) = J0(t)J1(t)J2(t), . . . , Jl−1(t).In the first clock cycle, J = J0 J1 J2, . . . , Jl−1 will bit-XOR with S = S0S1S2, . . . , SM−1, and the results X1Xl+1X2l+1, . . . , X(M−1)l+1 will be shifted into M scan chains, respectively. In the second clock cycle, J = J0 J1 J2, . . . , Jl−1 will be circularly shifted as J =Jl−1 J0 J1, . . . , Jl−2, which will also bit-XOR with the seed S = S0S1S2, . . . , SM−1. The resulting X2Xl+2X2l+2, . . . , X(M−1)l+2 will be shifted into M scan chains, respectively. After l clocks, each scan chain will be fully loaded with a unique Johnson codeword, and seed S0S1S2, . . . , Sm−1 will be applied to m PIs. Since the circular Johnson counter can generate l unique Johnson codewords through circular shifting a Johnson vector, the circular Johnson counter and XOR gates in Fig. 1 actually constitute a linear sequential decompressor. B) Reconfigurable Johnson Counter According to the different scenarios of scan length, this paper develops two kinds of SIC generators to generate Johnson vectors and Johnson codewords, i.e., the reconfigurable Johnson counter and the scalable SIC counter.For a short scan length, we develop a reconfigurable Johnson counter to generate an SIC sequence in time domain.As shown in Fig. 2(a), it can operate in three modes. 1) Initialization: When RJ_Mode is set to 1 and Init is set to logic 0, the reconfigurable Johnson counter will be initialized to all zero states by clocking CLK2 more than l times. 2) Circular shift register mode: When RJ_Mode and Init are set to logic 1, each stage of the Johnson counter will output a Johnson codeword by clocking CLK2 l times. 3) Normal mode: When RJ_Mode is set to logic 0, the reconfigurable Johnson counter will generate 2l unique SIC vectors by clocking CLK2 2l times. C) Scalable SIC Counter When the maximal scan chain length l is much larger than the scan chain number M, we develop an SIC counter named the “scalable SIC counter.” As shown in Fig. 2(b), it contains a k-bit adder clocked by the rising SE signal, a k-bit subtractor clocked by test clock CLK2, an M-bit shift register clocked by test clock CLK2, and k multiplexers. The value of k is the integer of log2(l − M). The waveforms of the scalable SIC counter are shown in Fig. 2(c). The k-bit adder is clocked by the falling SE signal, and generates a new count that is the number of 1s (0s) to fill into the shift register. As shown in Fig. 2(b), it can operate in three modes. 1) If SE = 0, the count from the adder is stored to the k-bit subtractor. During SE = 1, the contents of the k- bit subtractor will be decreased from the stored count to all zeros gradually. Proceedings of International Conference On Current Innovations In Engineering And Technology International Association Of Engineering & Technology For Skill Development ISBN : 978 - 1502851550 www.iaetsd.in 29
  • 4. 2) If SE = 1 and the contents of the k-bit subtractor are not all zeros, M-Johnson will be kept at logic 1 (0). 3) Otherwise, it will be kept at logic 0 (1). Thus, the needed 1s (0s) will be shifted into the M-bit shift register by clocking CLK2 l times, and unique Johnson codewords will be applied into different scan chains. Fig.2. SIC generators. (a) Reconfigurable Johnson counter (b) Scalable SIC counter (c) Waveforms of the scalable SIC counter. D) MSIC-TPGs for Test-per-Clock Schemes The MSIC-TPG for test-per-clock schemes is illustrated in Fig. 3(a). The CUT’s PIs X1 − Xmn are arranged as an n ×m SRAM-like grid structure. Each grid has a two-input XOR gate whose inputs are tapped from a seed output and an output of the Johnson counter. The outputs of the XOR gates are applied to the CUT’s PIs. A seed generator is an m- stage conventional LFSR, and operates at low frequency CLK1. The test procedure is as follows. 1) The seed generator generates a new seed by clocking CLK1 one time. 2) The Johnson counter generates a new vector by clocking CLK2 one time. 3) Repeat 2 until 2l Johnson vectors are generated. 4) Repeat 1–3 until the expected fault coverage or test length is achieved. E) MSIC-TPGs for Test-per-Scan Schemes The MSIC-TPG for test-per-scan schemes is illustrated in Fig. 3(b). The stage of the SIC generator is the same as the maximum scan length, and the width of a seed generator is not smaller than the scan chain number. The inputs of the XOR gates come from the seed generator and the SIC counter and their outputs are applied to M scan chains, respectively. The outputs of the seed generator and XOR gates are applied to the CUT’s PIs, respectively. The test procedure is as follows. 1) The seed circuit generates a new seed by clocking CLK1 one time. 2) RJ_Mode is set to 0. The Reconfigurable Johnson counter will operate in the Johnson counter mode and generate a Johnson vector by clocking CLK2 one time. 3) After a new Johnson vector is generated, RJ_Mode and Init are set to 1. The reconfigurable Johnson counter operates as a circular shift register, and generates l codewords by clocking CLK2 l times. Then, a capture operation is inserted. Proceedings of International Conference On Current Innovations In Engineering And Technology International Association Of Engineering & Technology For Skill Development ISBN : 978 - 1502851550 www.iaetsd.in 30
  • 5. 4) Repeat 2–3 until 2l Johnson vectors are generated. 5) Repeat 1–4 until the expected fault coverage or test length is achieved. Fig 3. MSIC-TPGs for (a) test-per-clock and (b) test-per-scan schemes. III. STRATEGY DESCRIPTION The MSIC Test pattern generator architecture internally consists of a control circuit, seed circuit, SIC counter, scan chain and MISR modules. Here the control unit is used to initiate the seed value and enable the counter and to control the scan design. CUT is the circuit or chip in which we are going to apply BIST for testing stuck at zero or stuck at one error. Tapping can be taken according to the specification but as per taping change the TPG output generate will also change and as we change in number of flip-flop the probability of repetition of random number will reduce. The initial value loading to the TPG is known as seed value. Classification of test strategies: 1. Weighted Pseudorandom: Testing: In weighted pseudorandom testing, pseudorandom patterns are applied with certain 0s and 1s distribution in order to handle the random pattern resistant fault undetectable by the pseudorandom testing. Thus, the test length can be effectively shortened. 2. Pseudo exhaustive Testing: Pseudo exhaustive testing divides the CUT into several smaller sub circuits and tests each of them exhaustively. All detectable flaws within the sub circuits can be detected. However, such a method involves extra design effort to partition the circuits and deliver the test patterns and test responses. BIST is a set of structured-test techniques for combinational and sequential logic, memories, multipliers, and other embedded logic blocks. BIST is the commonly used design technique for self testing of circuits. 3. Pseudorandom Testing: Pseudorandom testing involves the application of certain length of test patterns that have certain randomness property. The test patterns are sequenced in a deterministic order. The test length and the contents of the patterns are used to impart fault coverage. 4. Exhaustive Testing: Exhaustive testing involves the application of all possible input combinations to the circuit under test (CUT). It guarantees that all Proceedings of International Conference On Current Innovations In Engineering And Technology International Association Of Engineering & Technology For Skill Development ISBN : 978 - 1502851550 www.iaetsd.in 31
  • 6. detectable faults that divert from the sequential behavior will be detected. The strategies are often applied to complex and well isolated small modules such as PLAs. 5. Stored Patterns: Stored-pattern approach tracks the pre generated test patterns to achieve certain test goals. It is used to enhance system level testing such as the power-on self test of a computer and microprocessor functional testing using micro programs. BIST is a design for testability (DFT) technique in which testing is carried out using built – in hardware features. Since testing is built into the hardware, it is faster and efficient. The BIST architecture needs three additional hardware blocks such as a pattern generator, a response analyzer and a test controller to a digital circuit. For pattern generators, we can use either a ROM with stored patterns, or a counter or a linear feedback shift register (LFSR).A response analyzer is a compactor with stored responses or an LFSR used as a signature analyzer. A controller provides a control signal to activate all the blocks.The circuit introduces more switching activities in the circuit under test (CUT)during test than that during normal operation[5].It causes excessive power dissipation and results in delay penalty into the design[6]. Using BIST Technique the portability can be achieved very easily than the Automatic Test pattern generator. Generally the Automatic Test pattern generators are used externally while a BIST uses internally. Due to advantages of BIST the concept of ATPG is vanishes but it also has its own advantages. IV.RESULTS WAVEFORM FOR 4BIT MISC WAVEFORM FOR 8 BIT LOW POWER LFSR WAVEFORM FOR 8 BIT MSIC Proceedings of International Conference On Current Innovations In Engineering And Technology International Association Of Engineering & Technology For Skill Development ISBN : 978 - 1502851550 www.iaetsd.in 32
  • 7. Schematics: RTL Schematics: Technology schematics: V. CONCLUSION The proposed approach shows the concept of reducing the transitions in the test pattern generated. The transition is reduced by increasing the correlation between the successive bits. The simulation results shows that how the patterns are generated for the applied seed vector. This paper presents the implementation of MSIC approach based pattern generator with regard to verilog language. Synthesizing and implementation (i.e. Translate, Map and Place and Route) of the code is carried out on Xilinx - Project Navigator, ISE suite. The power reports shows that the proposed low power lfsr consumes less power during testing by taking the benchmark circuit. In future there is a chance to reduce the power somewhat more by doing modifications in the proposed architecture. REFERENCES [1] Feng Liang, Luwen Zhang, Shaochong Lei, Guohe Zhang, Kaile Gao, and Bin Liang “Test Patterns of Multiple SIC Vectors: Theory and Application in BIST Schemes” in IEEE transactions on very large scale integration (vlsi) systems, Vol. 21, No. 4, April 2013 [2] Y. Zorian, “A distributed BIST control scheme for complex VLSI devices,” in 11th Annu. IEEE VLSI Test Symp. Dig. Papers, Apr. 1993,pp. 4–9. [3] A. Abu-Issa and S. Quigley, “Bit-swapping LFSR and scan-chain ordering: A novel technique for peak- and average-power reduction in scan-based BIST,” IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 28, no. 5, pp. 755–759, May 2009. [4] P. Girard, L. Guiller, C. Landrault, S. Pravossoudovitch, J. Figueras,S. Manich, P. Teixeira, and M. Santos, “Low-energy BIST design: Impact of the LFSR TPG parameters on the weighted switching activity,”in Proc. IEEE Int. Symp. Circuits Syst., vol. 1. Jul. 1999, pp.110–113. [5] S. Wang and S. Gupta, “DS-LFSR: A BIST TPG for low switching activity,” IEEE Trans. Comput.- Aided Design Integr. Circuits Syst.,vol. 21, no. 7, pp. 842–851, Jul. 2002. Proceedings of International Conference On Current Innovations In Engineering And Technology International Association Of Engineering & Technology For Skill Development ISBN : 978 - 1502851550 www.iaetsd.in 33
  • 8. [6] F. Corno, M. Rebaudengo, M. Reorda, G. Squillero, and M. Violante,“Low power BIST via non-linear hybrid cellular automata,”in Proc. 18th IEEE VLSI Test Symp., Apr.–May 2000, pp.29–34. [7] P. Girard, L. Guiller, C. Landrault, S. Pravossoudovitch, and H. Wunderlich,“A modified clock scheme for a low power BIST test pattern generator,” in Proc. 19th IEEE VTS VLSI Test Symp., Mar.–Apr. 2001,pp. 306–311. [8] D. Gizopoulos, N. Krantitis, A. Paschalis, M. Psarakis, and Y. Zorian, “Low power/energy BIST scheme for datapaths,” in Proc. 18th IEEE VLSI Test Symp., Apr.–May 2000, pp. 23–28. [9] Y. Bonhomme, P. Girard, L. Guiller, C. Landrault, and S. Pravossoudovitch,“A gated clock scheme for low power scan testing of logic ICs or embedded cores,” in Proc. 10th Asian Test Symp., Nov. 2001, pp.253–258. Proceedings of International Conference On Current Innovations In Engineering And Technology International Association Of Engineering & Technology For Skill Development ISBN : 978 - 1502851550 www.iaetsd.in 34