This document discusses the design and implementation of multiple single input change (MSIC) vectors for test pattern generation in built-in self-test (BIST) schemes. It proposes using a reconfigurable Johnson counter and scalable SIC counter to generate minimum transition sequences. Test patterns generated using this multiple SIC approach are applied to ISCAS benchmark circuits. Simulation results show the functionality of the proposed pattern generator and its ability to achieve high fault coverage comparable to primary test patterns.
This document summarizes a study of built-in self-test (BIST) approaches for detecting single stuck-at faults in combinational logic circuits. Pseudorandom test patterns generated by a linear feedback shift register (LFSR) were applied in parallel and serially to benchmark circuits. Applying patterns in parallel via test-per-clock achieved high fault coverage but required a large LFSR for circuits with many inputs. Reseeding the LFSR improved coverage when an initial seed was ineffective. Seed selection and minimum LFSR size for different application methods were evaluated to optimize BIST fault detection.
This document contains exam questions for the subject Digital Communication. It has two parts - Part A and Part B. Part A focuses on digital communication systems, sampling, PCM, delta modulation, line coding techniques and adaptive equalization. Part B covers passband transmission schemes, modulation techniques like BPSK, MSK, spread spectrum techniques and correlation receivers. The questions test concepts like block diagrams, derivations, explanations and comparisons related to digital communication topics.
The document provides information about a digital communication systems exam, including questions on various topics in digital communication such as sampling theory, PCM, delta modulation, baseband transmission, digital modulation techniques, error control coding, and spread spectrum.
The exam is divided into two parts (A and B) and contains 10 questions in total. Part A covers topics such as sampling theorem, signal reconstruction, PCM, delta modulation, baseband transmission, and digital modulation formats. Part B focuses on questions related to digital modulation techniques like BPSK, probability of symbol error, DPSK, and spread spectrum modulation. The document provides detailed questions on concepts, derivations, and design problems in digital communication systems.
This document contains an examination paper for an 8th semester Biomedical Signal Processing course. It consists of two parts - Part A and Part B, with 4 and 3 questions respectively. The questions cover topics related to biomedical signal acquisition and analysis, ECG and EEG signals, digital signal processing techniques like filtering, noise cancellation, signal averaging, data compression algorithms, and real-time algorithms for detecting heartbeats from ECG signals. The document tests the students' understanding of fundamental biomedical signal processing concepts and methods through theoretical questions requiring explanation and derivation of equations, along with some questions involving practical applications.
An Efficient Construction of Online Testable Circuits using Reversible Logic ...ijsrd.com
The vital for many safety critical applications is the testable fault tolerant system. Due to its less heat dissipating characteristics, the reversible logic gaining interest in the recent times. Any Boolean logic function can be implemented using reversible gates. The credential part of the paper proposes a technique to convert any reversible logic gate to a testable gate that is also reversible. The resultant reversible testable gate can detect online any single bit errors that include Single Stuck Faults and Single Event Upsets S. Karp et.al. The proposed technique is illustrated using an example that converts a reversible decoder circuit to an online testable reversible decoder circuit.
The document describes several hardware-based data prefetching schemes that aim to reduce memory stalls by prefetching data into caches before it is needed by a program. It introduces fixed offset prefetching, stride-based prefetching, and tag correlated prefetching. It then discusses the simulation setup used to evaluate these schemes and presents results on their performance in terms of CPI, cache hit rate, and average memory access time. The tag correlated prefetching scheme achieved the best overall performance but at the cost of higher hardware complexity compared to the other schemes.
This document provides information about the Institute of Electrical and Electronics Engineers (IEEE). IEEE is the world's largest technical professional organization dedicated to advancing technology for humanity. It has over 400,000 members across over 160 countries. IEEE was formed in 1963 by the merger of the Institute of Radio Engineers and the American Institute of Electrical Engineers. It consists of various societies, councils, sections and branches focused on different technical areas.
iaetsd Software defined am transmitter using vhdlIaetsd Iaetsd
This document discusses the design and implementation of an amplitude modulation (AM) software defined radio transmitter using an FPGA. It begins with an abstract describing the goals of the project. It then provides an overview of the system design, including discussion of the individual components like the microphone, analog to digital converter, digital to analog converter, carrier frequency generator, and antenna. It describes how these components will be implemented on the FPGA, including using behavioral modeling with VHDL. It also discusses designing filters and modulation/demodulation circuits. The overall summary is that this document outlines the goals and high-level system design for creating an AM transmitter using an FPGA that can transmit an audio signal by digitally modulating a carrier frequency.
This document summarizes a study of built-in self-test (BIST) approaches for detecting single stuck-at faults in combinational logic circuits. Pseudorandom test patterns generated by a linear feedback shift register (LFSR) were applied in parallel and serially to benchmark circuits. Applying patterns in parallel via test-per-clock achieved high fault coverage but required a large LFSR for circuits with many inputs. Reseeding the LFSR improved coverage when an initial seed was ineffective. Seed selection and minimum LFSR size for different application methods were evaluated to optimize BIST fault detection.
This document contains exam questions for the subject Digital Communication. It has two parts - Part A and Part B. Part A focuses on digital communication systems, sampling, PCM, delta modulation, line coding techniques and adaptive equalization. Part B covers passband transmission schemes, modulation techniques like BPSK, MSK, spread spectrum techniques and correlation receivers. The questions test concepts like block diagrams, derivations, explanations and comparisons related to digital communication topics.
The document provides information about a digital communication systems exam, including questions on various topics in digital communication such as sampling theory, PCM, delta modulation, baseband transmission, digital modulation techniques, error control coding, and spread spectrum.
The exam is divided into two parts (A and B) and contains 10 questions in total. Part A covers topics such as sampling theorem, signal reconstruction, PCM, delta modulation, baseband transmission, and digital modulation formats. Part B focuses on questions related to digital modulation techniques like BPSK, probability of symbol error, DPSK, and spread spectrum modulation. The document provides detailed questions on concepts, derivations, and design problems in digital communication systems.
This document contains an examination paper for an 8th semester Biomedical Signal Processing course. It consists of two parts - Part A and Part B, with 4 and 3 questions respectively. The questions cover topics related to biomedical signal acquisition and analysis, ECG and EEG signals, digital signal processing techniques like filtering, noise cancellation, signal averaging, data compression algorithms, and real-time algorithms for detecting heartbeats from ECG signals. The document tests the students' understanding of fundamental biomedical signal processing concepts and methods through theoretical questions requiring explanation and derivation of equations, along with some questions involving practical applications.
An Efficient Construction of Online Testable Circuits using Reversible Logic ...ijsrd.com
The vital for many safety critical applications is the testable fault tolerant system. Due to its less heat dissipating characteristics, the reversible logic gaining interest in the recent times. Any Boolean logic function can be implemented using reversible gates. The credential part of the paper proposes a technique to convert any reversible logic gate to a testable gate that is also reversible. The resultant reversible testable gate can detect online any single bit errors that include Single Stuck Faults and Single Event Upsets S. Karp et.al. The proposed technique is illustrated using an example that converts a reversible decoder circuit to an online testable reversible decoder circuit.
The document describes several hardware-based data prefetching schemes that aim to reduce memory stalls by prefetching data into caches before it is needed by a program. It introduces fixed offset prefetching, stride-based prefetching, and tag correlated prefetching. It then discusses the simulation setup used to evaluate these schemes and presents results on their performance in terms of CPI, cache hit rate, and average memory access time. The tag correlated prefetching scheme achieved the best overall performance but at the cost of higher hardware complexity compared to the other schemes.
This document provides information about the Institute of Electrical and Electronics Engineers (IEEE). IEEE is the world's largest technical professional organization dedicated to advancing technology for humanity. It has over 400,000 members across over 160 countries. IEEE was formed in 1963 by the merger of the Institute of Radio Engineers and the American Institute of Electrical Engineers. It consists of various societies, councils, sections and branches focused on different technical areas.
iaetsd Software defined am transmitter using vhdlIaetsd Iaetsd
This document discusses the design and implementation of an amplitude modulation (AM) software defined radio transmitter using an FPGA. It begins with an abstract describing the goals of the project. It then provides an overview of the system design, including discussion of the individual components like the microphone, analog to digital converter, digital to analog converter, carrier frequency generator, and antenna. It describes how these components will be implemented on the FPGA, including using behavioral modeling with VHDL. It also discusses designing filters and modulation/demodulation circuits. The overall summary is that this document outlines the goals and high-level system design for creating an AM transmitter using an FPGA that can transmit an audio signal by digitally modulating a carrier frequency.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Low power test pattern generation for bist applicationseSAT Journals
Abstract This paper proposes a novel test pattern generator (TPG) for built-in self-test. Our method generates multiple single input change (MSIC) vectors in a pattern, i.e., each vector applied to a scan chain is an SIC vector. A reconfigurable Johnson counter and a scalable SIC counter are developed to generate a class of minimum transition sequences. The proposed TPG is flexible to both the test-per-clock and the test-per-scan schemes. A theory is also developed to represent and analyze the sequences and to extract a class of MSIC sequences. Analysis results show that the produced MSIC sequences have the favorable features of uniform distribution and low input transition density. Simulation results with ISCAS benchmarks demonstrate that MSIC can save test power and impose no more than 7.5% overhead for a scan design. It also achieves the target fault coverage without increasing the test length. Keywords—Built-in self-test (BIST), low power, single-input change (SIC), test pattern generator (TPG)
Optimal and Power Aware BIST for Delay Testing of System-On-ChipIDES Editor
Test engineering for fault tolerant VLSI systems is
encumbered with optimization requisites for hardware
overhead, test power and test time. The high level quality of
these complex high-speed VLSI circuits can be assured only
through delay testing, which involves checking for accurate
temporal behavior. In the present paper, a data-path based
built-in test pattern generator (TPG) that generates iterative
pseudo-exhaustive two-patterns (IPET) for parallel delay
testing of modules with different input cone capacities is
implemented. Further, in the present study a CMOS
implementation of low power architecture (LPA) for scan based
built-in self test (BIST) for delay testing and combinational
testing is carried out. This reduces test power dissipation in
the circuit under test (CUT). Experimental results and
comparisons with pre-existing methods prove the reduction
in hardware overhead and test-time.
Performance Analysis of Input Vector Monitoring Concurrent Built In Self Repa...IJTET Journal
Abstract—Built-in self test (BIST) techniques constitute an attractive and practical solution to the problem of testing VLSI circuits and systems. Input vector monitoring concurrent built-in self test (BIST) schemes perform testing during the normal operation of the circuit without imposing a need to set the circuit offline to perform the test. These schemes are evaluated based on the hardware overhead and the concurrent test latency (CTL). CTL means that the time required for the test to complete, whereas the circuit operates normally. In this brief, we present a novel input vector monitoring concurrent BIST scheme, which is based on the idea of monitoring a set (called window) of vectors reaching the circuit inputs during normal operation, and the use of a static-RAM like structure to store the relative locations of the vectors that reach the circuit inputs in the examined window; the proposed scheme is shown to perform significantly better than previously proposed schemes with respect to the hardware overhead and CTL tradeoff. The proposed method also performs novel BISD and BISR schemes based on the fail pattern identification and also binary matrix lossless compression scheme to compress the test patterns in test cubes.
Two innovative high-speed low power parallel 8-bit counter architectures are proposed. Then, High speed 8-bit frequency divider circuits using the proposed architectures are realized. The proposed parallel counter architectures consist of two sections – The Counting Path and the State Excitation Module. The counting path consists of three counting modules in which the first module (basic module) generates future states for the two remaining counting modules. The State Excitation Module decodes the count states of the basic module and carries this decoding over clock cycles through pipelined DFF to trigger the subsequent counting modules. The existing 8-bit parallel counter architecture [1] consumed a total transistor count of 442 whereas the proposed parallel counters consumed only 274 transistors. The power dissipation of the existing parallel counter architecture and the proposed parallel counter architecture were 4.21mW (PINT) and 3.60mW (PINT) respectively at 250MHz. The worst case delay observed for the 8-bit counter using existing parallel counter architecture [1] and the proposed parallel counter architectures were 7.481ns, 6.737ns and 6.677ns respectively using Altera Quartus II. A reduction in area (transistor count) by 27.45% and a reduction in power dissipation by 16.28% are achieved for the frequency dividers using proposed counter architectures. Also a reduction in delay by 10.75% and 7.62% is achieved for the 8-bit frequency divider circuits using proposed counter methods I & II respectively.
Vlsi Design of Low Transition Low Power Test Pattern Generator Using Fault Co...iosrjce
Now a day’s highly integrated multi layer board with IC’s is virtually impossible to be accessed
physically for testing. The major problem detected during testing a circuit includes test generation and gate to
I/O pin problems. In design of any circuit, consuming low power and less hardware utilization is an important
design parameter. Therefore reliable testing methods are introduced which reduces the cost of the hardware
required and also power consumed by the device. In this project a new fault coverage test pattern generator is
generated using a linear feedback shift register called FC-LFSR which can perform fault analysis and reduces
the total power of the circuit. In this test, it generates three intermediate patterns between the random patterns
which reduces the transitional activities of primary inputs so that the switching activities inside the circuit under
test will be reduced. The test patterns generated are applied to c17 benchmark circuit, whose results with fault
coverage of the circuit being tested. The simulation for this design is performed using Xilinx ISE software using
Verilog hardware description language
This document describes the design of a low transition, low power test pattern generator using a fault coverage circuit. It begins with background on the need for built-in self-test (BIST) techniques due to challenges with external testing. It then presents a new technique that generates three intermediate patterns between random patterns to reduce switching activity and power. The design is implemented using a linear feedback shift register (LFSR) modified with additional logic. Simulation results on a C17 benchmark circuit show the fault coverage achieved by the low power patterns.
Design and Implementation of Area Optimized, Low Complexity CMOS 32nm Technol...IJERA Editor
A numerically controlled oscillator (NCO) is a digital signal generator which is a very important block in many Digital Communication Systems such as Software Defined Radios, Digital Radio set and Modems, Down/Up converters for Cellular and PCS base stations etc. NCO creates a synchronous, discrete-time, discrete-valued representation of a sinusoidal waveform. This paper implements the development and design of CMOS look up Table based numerically controlled oscillator which improves the performance, reduces the power & area requirement. The design is implemented with CMOS 32 nm Technology with Microwind 3.8 software tool. In addition, it can be used for analog circuit also enables the integration of complete system on chip. This paper also describes the design of a NCO which is of contemporary nature with reasonable speed, resolution and linearity with lower power, low area. For all about Pre Layout simulation has been realized using 32nm CMOS process Technology.
This document describes the Illinois Scan Architecture, a technique for reducing test costs for chips with scan designs. It works by dividing the main scan chain into multiple parallel internal chains, with a single scan input pin. This allows test vectors to be broadcast to all chains simultaneously, reducing test time and data volume by the number of chains with little impact on fault coverage. The document provides experimental data showing reductions in test vectors, cycles, and data volume for several ISCAS circuits using Illinois Scan. It also discusses techniques for further optimizing the technique, such as grouping chains intelligently to minimize the number of scan input pins needed.
Error Identification in RAM using Input Vector Monitoring Concurrent BIST Arc...IJMTST Journal
Input vector monitoring concurrent built-in self test (BIST) schemes perform testing during the normal operation of the Random Access Memory without imposing a need to set the RAM offline to perform the test. These schemes are evaluated based on the hardware overhead and the concurrent test latency (CTL), i.e., the time required for the test to complete, whereas the circuit operates normally. In this brief, we present a novel input vector monitoring concurrent BIST scheme, which is based on the idea of monitoring a set (called window) of vectors reaching the circuit inputs during normal operation, and the use of a static-RAM-like structure to store the relative locations of the vectors that reach the circuit inputs in the examined window; the proposed scheme is shown to perform significantly better than previously proposed schemes with respect to the hardware overhead and CTL tradeoff..
Scan-Based Delay Measurement Technique Using Signature RegistersIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
An approach to Measure Transition Density of Binary Sequences for X-filling b...IJECEIAES
Switching activity and Transition density computation is an essential stage for dynamic power estimation and testing time reduction. The study of switching activity, transition densities and weighted switching activities of pseudo random binary sequences generated by Linear Feedback shift registers and Feed Forward shift registers plays a crucial role in design approaches of Built-In Self Test, cryptosystems, secure scan designs and other applications. This paper proposed an approach to find transition densities, which plays an important role in choosing of test pattern generator We have analyze conventional and proposed designs using our approache, This work also describes the testing time of benchmark circuits. The outcome of this paper is presented in the form of algorithm, theorems with proofs and analyses table which strongly support the same. The proposed algorithm reduces switching activity and testing time up to 51.56% and 84.61% respectively.
This document summarizes an engineering student's summer internship report on simulating and implementing a control system plant. The student:
1) Simulated the plant model in Proteus, PSpice and MATLAB, obtaining graphs of the system response.
2) Designed proportional and proportional-integral controllers in Simulink to achieve zero steady state error.
3) Implemented the open loop plant and closed loop system with controllers on hardware using an Arduino, resistors, capacitors, and op-amps.
In digital logic and computing, a counter is a device which stores the number of times a particular event or process has occurred, often in relationship to a clock signal. CMOS devices are designed for high noise immunity and low static power consumption. CMOS accomplishes current reduction by complementing every nMOSFET with a pMOSFET and connecting both gates and both drains together. A high voltage on the gates will cause the nMOSFET to conduct and the pMOSFET to not conduct, while a low voltage on the gate causes the reverse. This arrangement greatly reduces power consumption and heat generation .Finally we proposed counter using SRAM model, provides the best resolution, high output current and good output-input current linearity.
Design and analysis of dual-mode numerically controlled oscillators based co...IJECEIAES
In this paper, the design and analysis of dual-mode numerically controlled oscillators (NCO) based controlled oscillator frequency Modulation is implemented. Initially, input is given to the analog to digital converter (ADC) converter. This will change the input from analog to digital converter. After that, the pulse skipping mode (PSM) logic and proportional integral (PI) are applied to the converted data. After applying PSM logic, data is directly transferred to the connection block. The proportional and integral block will transfer the data will be decoded using the decoder. After decoding the values, it is saved using a modulo accumulator. After that, it is converted from one hot residue (OHR) to binary converter. The converted data is saved in the register. Now both data will pass through the gate driver circuit and output will be obtained finally. From simulation results, it can observe that the usage of metal oxide semiconductor field effect transistors (MOSFETs) and total nodes are very less in dual-mode NCO-based controlled oscillator frequency modulation.
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...Filip Krikava
This document discusses integrating adaptation mechanisms in self-adaptive software systems using control theory models. It presents a case study of using feedback control loops and control theory models to optimize a web server's performance by self-adjusting tuning parameters. The challenges of engineering such self-adaptive systems include control challenges for control engineers and integration challenges for software engineers. The study models the web server as a multi-input multi-output system and designs a linear quadratic regulator controller to optimize performance based on CPU utilization and memory usage.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
The document discusses power management techniques for at-speed scan-based testing of system-on-chips (SOCs). It proposes an X-filling technique that can reduce both shift power and capture power during testing. The technique first fills X-bits to keep capture power below a threshold, then uses remaining X-bits to reduce shift power. It models the impact of X-bits on shift and capture power to guide the filling process. Adding dynamic voltage scaling can further reduce power consumption when combined with X-filling.
Simulations of a typical CMOS amplifier circuit using the Monte Carlo methodIJERA Editor
In the present paper of Microelectronics, some simulations of a typical circuit of amplification, using a CMOS transistor, through the computational tools were performed. At that time, PSPICE® was used, where it was possible to observe the results, which are detailed in this work. The imperfections of the component due to manufacturing processes were obtained from simulations using the Monte Carlo method. The circuit operating point, mean and standard deviation were obtained and the influence of the threshold voltage Vth was analyzed.
iaetsd Survey on cooperative relay based data transmissionIaetsd Iaetsd
The document discusses cooperative relay based data transmission and proposes a system to select the most energy efficient relay node for a source node to transmit data through. It analyzes different cooperative relaying techniques like amplify-and-forward, decode-and-forward, and compress-and-forward. The proposed system aims to minimize the source node's cost for cooperation by selecting the relay node that provides the highest energy efficiency. This allows high data transmission over long distances with improved energy efficiency compared to direct transmission without a relay.
iaetsd Health monitoring system with wireless alarmIaetsd Iaetsd
The document describes a health monitoring system with wireless alarm that detects a patient's heart rate and temperature. It consists of a sensor unit worn on the wrist that monitors vital signs and transmits data wirelessly to an alarm and display unit. This allows caregivers to be alerted quickly if a patient's condition changes, such as if their heart rate is too high or low. The system uses a microcontroller to process sensor readings from a pulse oximetry sensor and transmit data via RF to the receiving unit, which contains another microcontroller connected to an RF receiver and buzzer alarm. If an abnormal heart rate is detected, the system triggers an alarm to notify caregivers.
More Related Content
Similar to Iaetsd design and implementation of multiple sic vectors
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Low power test pattern generation for bist applicationseSAT Journals
Abstract This paper proposes a novel test pattern generator (TPG) for built-in self-test. Our method generates multiple single input change (MSIC) vectors in a pattern, i.e., each vector applied to a scan chain is an SIC vector. A reconfigurable Johnson counter and a scalable SIC counter are developed to generate a class of minimum transition sequences. The proposed TPG is flexible to both the test-per-clock and the test-per-scan schemes. A theory is also developed to represent and analyze the sequences and to extract a class of MSIC sequences. Analysis results show that the produced MSIC sequences have the favorable features of uniform distribution and low input transition density. Simulation results with ISCAS benchmarks demonstrate that MSIC can save test power and impose no more than 7.5% overhead for a scan design. It also achieves the target fault coverage without increasing the test length. Keywords—Built-in self-test (BIST), low power, single-input change (SIC), test pattern generator (TPG)
Optimal and Power Aware BIST for Delay Testing of System-On-ChipIDES Editor
Test engineering for fault tolerant VLSI systems is
encumbered with optimization requisites for hardware
overhead, test power and test time. The high level quality of
these complex high-speed VLSI circuits can be assured only
through delay testing, which involves checking for accurate
temporal behavior. In the present paper, a data-path based
built-in test pattern generator (TPG) that generates iterative
pseudo-exhaustive two-patterns (IPET) for parallel delay
testing of modules with different input cone capacities is
implemented. Further, in the present study a CMOS
implementation of low power architecture (LPA) for scan based
built-in self test (BIST) for delay testing and combinational
testing is carried out. This reduces test power dissipation in
the circuit under test (CUT). Experimental results and
comparisons with pre-existing methods prove the reduction
in hardware overhead and test-time.
Performance Analysis of Input Vector Monitoring Concurrent Built In Self Repa...IJTET Journal
Abstract—Built-in self test (BIST) techniques constitute an attractive and practical solution to the problem of testing VLSI circuits and systems. Input vector monitoring concurrent built-in self test (BIST) schemes perform testing during the normal operation of the circuit without imposing a need to set the circuit offline to perform the test. These schemes are evaluated based on the hardware overhead and the concurrent test latency (CTL). CTL means that the time required for the test to complete, whereas the circuit operates normally. In this brief, we present a novel input vector monitoring concurrent BIST scheme, which is based on the idea of monitoring a set (called window) of vectors reaching the circuit inputs during normal operation, and the use of a static-RAM like structure to store the relative locations of the vectors that reach the circuit inputs in the examined window; the proposed scheme is shown to perform significantly better than previously proposed schemes with respect to the hardware overhead and CTL tradeoff. The proposed method also performs novel BISD and BISR schemes based on the fail pattern identification and also binary matrix lossless compression scheme to compress the test patterns in test cubes.
Two innovative high-speed low power parallel 8-bit counter architectures are proposed. Then, High speed 8-bit frequency divider circuits using the proposed architectures are realized. The proposed parallel counter architectures consist of two sections – The Counting Path and the State Excitation Module. The counting path consists of three counting modules in which the first module (basic module) generates future states for the two remaining counting modules. The State Excitation Module decodes the count states of the basic module and carries this decoding over clock cycles through pipelined DFF to trigger the subsequent counting modules. The existing 8-bit parallel counter architecture [1] consumed a total transistor count of 442 whereas the proposed parallel counters consumed only 274 transistors. The power dissipation of the existing parallel counter architecture and the proposed parallel counter architecture were 4.21mW (PINT) and 3.60mW (PINT) respectively at 250MHz. The worst case delay observed for the 8-bit counter using existing parallel counter architecture [1] and the proposed parallel counter architectures were 7.481ns, 6.737ns and 6.677ns respectively using Altera Quartus II. A reduction in area (transistor count) by 27.45% and a reduction in power dissipation by 16.28% are achieved for the frequency dividers using proposed counter architectures. Also a reduction in delay by 10.75% and 7.62% is achieved for the 8-bit frequency divider circuits using proposed counter methods I & II respectively.
Vlsi Design of Low Transition Low Power Test Pattern Generator Using Fault Co...iosrjce
Now a day’s highly integrated multi layer board with IC’s is virtually impossible to be accessed
physically for testing. The major problem detected during testing a circuit includes test generation and gate to
I/O pin problems. In design of any circuit, consuming low power and less hardware utilization is an important
design parameter. Therefore reliable testing methods are introduced which reduces the cost of the hardware
required and also power consumed by the device. In this project a new fault coverage test pattern generator is
generated using a linear feedback shift register called FC-LFSR which can perform fault analysis and reduces
the total power of the circuit. In this test, it generates three intermediate patterns between the random patterns
which reduces the transitional activities of primary inputs so that the switching activities inside the circuit under
test will be reduced. The test patterns generated are applied to c17 benchmark circuit, whose results with fault
coverage of the circuit being tested. The simulation for this design is performed using Xilinx ISE software using
Verilog hardware description language
This document describes the design of a low transition, low power test pattern generator using a fault coverage circuit. It begins with background on the need for built-in self-test (BIST) techniques due to challenges with external testing. It then presents a new technique that generates three intermediate patterns between random patterns to reduce switching activity and power. The design is implemented using a linear feedback shift register (LFSR) modified with additional logic. Simulation results on a C17 benchmark circuit show the fault coverage achieved by the low power patterns.
Design and Implementation of Area Optimized, Low Complexity CMOS 32nm Technol...IJERA Editor
A numerically controlled oscillator (NCO) is a digital signal generator which is a very important block in many Digital Communication Systems such as Software Defined Radios, Digital Radio set and Modems, Down/Up converters for Cellular and PCS base stations etc. NCO creates a synchronous, discrete-time, discrete-valued representation of a sinusoidal waveform. This paper implements the development and design of CMOS look up Table based numerically controlled oscillator which improves the performance, reduces the power & area requirement. The design is implemented with CMOS 32 nm Technology with Microwind 3.8 software tool. In addition, it can be used for analog circuit also enables the integration of complete system on chip. This paper also describes the design of a NCO which is of contemporary nature with reasonable speed, resolution and linearity with lower power, low area. For all about Pre Layout simulation has been realized using 32nm CMOS process Technology.
This document describes the Illinois Scan Architecture, a technique for reducing test costs for chips with scan designs. It works by dividing the main scan chain into multiple parallel internal chains, with a single scan input pin. This allows test vectors to be broadcast to all chains simultaneously, reducing test time and data volume by the number of chains with little impact on fault coverage. The document provides experimental data showing reductions in test vectors, cycles, and data volume for several ISCAS circuits using Illinois Scan. It also discusses techniques for further optimizing the technique, such as grouping chains intelligently to minimize the number of scan input pins needed.
Error Identification in RAM using Input Vector Monitoring Concurrent BIST Arc...IJMTST Journal
Input vector monitoring concurrent built-in self test (BIST) schemes perform testing during the normal operation of the Random Access Memory without imposing a need to set the RAM offline to perform the test. These schemes are evaluated based on the hardware overhead and the concurrent test latency (CTL), i.e., the time required for the test to complete, whereas the circuit operates normally. In this brief, we present a novel input vector monitoring concurrent BIST scheme, which is based on the idea of monitoring a set (called window) of vectors reaching the circuit inputs during normal operation, and the use of a static-RAM-like structure to store the relative locations of the vectors that reach the circuit inputs in the examined window; the proposed scheme is shown to perform significantly better than previously proposed schemes with respect to the hardware overhead and CTL tradeoff..
Scan-Based Delay Measurement Technique Using Signature RegistersIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
An approach to Measure Transition Density of Binary Sequences for X-filling b...IJECEIAES
Switching activity and Transition density computation is an essential stage for dynamic power estimation and testing time reduction. The study of switching activity, transition densities and weighted switching activities of pseudo random binary sequences generated by Linear Feedback shift registers and Feed Forward shift registers plays a crucial role in design approaches of Built-In Self Test, cryptosystems, secure scan designs and other applications. This paper proposed an approach to find transition densities, which plays an important role in choosing of test pattern generator We have analyze conventional and proposed designs using our approache, This work also describes the testing time of benchmark circuits. The outcome of this paper is presented in the form of algorithm, theorems with proofs and analyses table which strongly support the same. The proposed algorithm reduces switching activity and testing time up to 51.56% and 84.61% respectively.
This document summarizes an engineering student's summer internship report on simulating and implementing a control system plant. The student:
1) Simulated the plant model in Proteus, PSpice and MATLAB, obtaining graphs of the system response.
2) Designed proportional and proportional-integral controllers in Simulink to achieve zero steady state error.
3) Implemented the open loop plant and closed loop system with controllers on hardware using an Arduino, resistors, capacitors, and op-amps.
In digital logic and computing, a counter is a device which stores the number of times a particular event or process has occurred, often in relationship to a clock signal. CMOS devices are designed for high noise immunity and low static power consumption. CMOS accomplishes current reduction by complementing every nMOSFET with a pMOSFET and connecting both gates and both drains together. A high voltage on the gates will cause the nMOSFET to conduct and the pMOSFET to not conduct, while a low voltage on the gate causes the reverse. This arrangement greatly reduces power consumption and heat generation .Finally we proposed counter using SRAM model, provides the best resolution, high output current and good output-input current linearity.
Design and analysis of dual-mode numerically controlled oscillators based co...IJECEIAES
In this paper, the design and analysis of dual-mode numerically controlled oscillators (NCO) based controlled oscillator frequency Modulation is implemented. Initially, input is given to the analog to digital converter (ADC) converter. This will change the input from analog to digital converter. After that, the pulse skipping mode (PSM) logic and proportional integral (PI) are applied to the converted data. After applying PSM logic, data is directly transferred to the connection block. The proportional and integral block will transfer the data will be decoded using the decoder. After decoding the values, it is saved using a modulo accumulator. After that, it is converted from one hot residue (OHR) to binary converter. The converted data is saved in the register. Now both data will pass through the gate driver circuit and output will be obtained finally. From simulation results, it can observe that the usage of metal oxide semiconductor field effect transistors (MOSFETs) and total nodes are very less in dual-mode NCO-based controlled oscillator frequency modulation.
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...Filip Krikava
This document discusses integrating adaptation mechanisms in self-adaptive software systems using control theory models. It presents a case study of using feedback control loops and control theory models to optimize a web server's performance by self-adjusting tuning parameters. The challenges of engineering such self-adaptive systems include control challenges for control engineers and integration challenges for software engineers. The study models the web server as a multi-input multi-output system and designs a linear quadratic regulator controller to optimize performance based on CPU utilization and memory usage.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
The document discusses power management techniques for at-speed scan-based testing of system-on-chips (SOCs). It proposes an X-filling technique that can reduce both shift power and capture power during testing. The technique first fills X-bits to keep capture power below a threshold, then uses remaining X-bits to reduce shift power. It models the impact of X-bits on shift and capture power to guide the filling process. Adding dynamic voltage scaling can further reduce power consumption when combined with X-filling.
Simulations of a typical CMOS amplifier circuit using the Monte Carlo methodIJERA Editor
In the present paper of Microelectronics, some simulations of a typical circuit of amplification, using a CMOS transistor, through the computational tools were performed. At that time, PSPICE® was used, where it was possible to observe the results, which are detailed in this work. The imperfections of the component due to manufacturing processes were obtained from simulations using the Monte Carlo method. The circuit operating point, mean and standard deviation were obtained and the influence of the threshold voltage Vth was analyzed.
Similar to Iaetsd design and implementation of multiple sic vectors (20)
iaetsd Survey on cooperative relay based data transmissionIaetsd Iaetsd
The document discusses cooperative relay based data transmission and proposes a system to select the most energy efficient relay node for a source node to transmit data through. It analyzes different cooperative relaying techniques like amplify-and-forward, decode-and-forward, and compress-and-forward. The proposed system aims to minimize the source node's cost for cooperation by selecting the relay node that provides the highest energy efficiency. This allows high data transmission over long distances with improved energy efficiency compared to direct transmission without a relay.
iaetsd Health monitoring system with wireless alarmIaetsd Iaetsd
The document describes a health monitoring system with wireless alarm that detects a patient's heart rate and temperature. It consists of a sensor unit worn on the wrist that monitors vital signs and transmits data wirelessly to an alarm and display unit. This allows caregivers to be alerted quickly if a patient's condition changes, such as if their heart rate is too high or low. The system uses a microcontroller to process sensor readings from a pulse oximetry sensor and transmit data via RF to the receiving unit, which contains another microcontroller connected to an RF receiver and buzzer alarm. If an abnormal heart rate is detected, the system triggers an alarm to notify caregivers.
iaetsd Equalizing channel and power based on cognitive radio system over mult...Iaetsd Iaetsd
This document summarizes a research paper about equalizing power and channel allocation in a cognitive radio system using multiuser OFDM. It discusses how frequency spectrum is becoming scarce due to increased wireless usage, and how cognitive radio can help improve spectrum utilization by allowing unlicensed secondary users to access licensed bands opportunistically when primary users are not using them. The paper presents a system model for a cognitive radio network with one primary user and multiple secondary user pairs. It formulates the problem of allocating subcarriers and power to the secondary users while avoiding interference to the primary user.
iaetsd Economic analysis and re design of driver’s car seatIaetsd Iaetsd
The document discusses redesigning car seats to improve comfort. It notes that car seat design must balance comfort, safety, and health. Static comfort relates to the seat's form and support, while dynamic comfort considers vibration levels. The study reexamines existing car seat designs and proposes a novel design with improvements in form, features, usability, and comfort. A survey was also conducted to define important comfort factors like pain prevention to help guide future seat designs.
iaetsd Design of slotted microstrip patch antenna for wlan applicationIaetsd Iaetsd
This document describes the design and simulation of a slotted microstrip patch antenna for wireless local area network (WLAN) applications operating at 2.4 GHz. The antenna was designed on an FR-4 substrate with a dielectric constant of 4.2 and thickness of 1.6 mm. Simulation in HFSS showed the antenna has a voltage standing wave ratio of 1.88 at the resonant frequency, with omnidirectional radiation patterns. The compact size and simple design make this slotted patch antenna suitable for use in embedded wireless systems.
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSIaetsd Iaetsd
This document reviews research on enhancing heat transfer using ribs mounted inside ducts. Various studies investigated ribs of different shapes, pitches, heights and angles. Continuous ribs, transverse ribs, angled ribs, and other rib configurations were examined. Most studies found that ribs increased turbulence and heat transfer compared to smooth ducts. Some key findings included V-shaped ribs providing better performance than other shapes, and certain rib pitches and angles performing better depending on parameters like Reynolds number. In general, ribs were found to effectively enhance heat transfer through boundary layer disruption and increased turbulence compared to smooth ducts.
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...Iaetsd Iaetsd
This document discusses two methods for generating power from solar panels for a home without using inverters or batteries.
Method 1 proposes a hybrid AC/DC home grid system that shifts harmonic intensive loads to the DC side to reduce power conversion losses and isolates harmonic content. Solar power is fed to the home through a DC-DC converter, MPPT, and inverter to power AC loads, with a separate DC connection for DC loads.
Method 2 generates AC power directly from an array of solar cells connected in an alternating anti-parallel configuration, eliminating power losses from an inverter. Compatibility with residential loads is analyzed. This novel technique could remove the need for batteries and reduce overall cost.
The performance of
This document describes the fabrication of a dual power bike that can operate using either an internal combustion engine or electric motor. The goal is to improve fuel efficiency and reduce pollution by allowing electric-only operation in the city. The bike combines a petrol engine with a battery and electric motor, resulting in twice the fuel economy of a conventional bike. It works by using the electric motor powered by the battery for low-power city driving, and switching to the petrol engine for higher speeds or power needs. This hybrid system aims to lower costs and pollution compared to other vehicles.
This document discusses Blue Brain technology and the goal of creating an artificial brain using silicon chips. It aims to upload the contents of a natural human brain into a virtual brain. This would allow human intelligence, memories, and personalities to potentially persist after death through the virtual brain. The document outlines how nanobots could scan a human brain at a cellular level and transfer that information to a supercomputer to recreate the brain's structure and function virtually. It compares key aspects of natural and virtual brains, such as how inputs, interpretation, outputs, memory, and processing would theoretically work for a virtual brain modeled after the human brain.
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...Iaetsd Iaetsd
The document proposes an innovative street lighting and surveillance system using Internet of Things (IoT) and Li-Fi technologies. The system uses LED street lights equipped with sensors and cameras that can monitor traffic, detect crimes, and provide emergency assistance. Data from the lights would be transmitted using Li-Fi and stored in the cloud for analysis. This integrated system could save energy, reduce costs, and improve safety, traffic management, and emergency response capabilities in cities.
The document proposes a Surveillance Aided Robotic Bird (SARB) to improve on existing surveillance systems. SARB would be designed like a bird and equipped with cameras, including night vision, to monitor areas remotely. It would be powered by carbon nanotubes, allowing for wireless charging and extended flight time. SARB could track intruders under the control of image processing and fly between fixed points for charging. This would provide a more natural, mobile and energy efficient form of surveillance compared to static cameras.
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid GrowthIaetsd Iaetsd
This document discusses how small and medium enterprises can achieve long term rapid growth. It focuses on the concept of "time monopoly" which has two components - a competitive advantage over competitors in a niche market, and a time advantage where it takes competitors longer to catch up.
The literature review discusses different sources of competitive advantage according to Porter, including variety-based positioning, needs-based positioning, and access-based positioning. It also discusses the importance of fit between different business activities for achieving a competitive advantage.
The paper proposes five propositions for rapid growth. These include that all areas can enable or hinder growth; areas can be transformed from hindering to enabling growth; businesses need scalability; and time monopoly,
iirdem Design of Efficient Solar Energy Collector using MPPT AlgorithmIaetsd Iaetsd
This document discusses the design of an efficient solar energy collector using a Maximum Power Point Tracking (MPPT) algorithm. It aims to maximize solar energy output through the use of lenses to concentrate sunlight onto solar panels and an MPPT algorithm to track the optimal power point. The methodology involves designing a DC-DC boost converter, lens-based solar cell, and a microcontroller with driver circuit. Simulations and hardware implementation will analyze the solar array, boost converter, and verify the system collects more energy than a fixed panel system.
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...Iaetsd Iaetsd
This document describes a proposed crash impact attenuation system for automobiles that uses mechatronic systems. The system includes an accident prediction system using ultrasound sensors to monitor vehicle surroundings and detect potential collisions. It also includes a crash absorption system with components like a pneumatic cylinder attached to the vehicle chassis that can push and pull a shock energy absorber upon detection of an imminent crash by the microcontroller. This proposed system aims to reduce crash impacts and potentially save lives by fully absorbing crash forces through controlled actuation of the absorber components.
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...Iaetsd Iaetsd
1) The document describes a smart home energy management system that uses wireless sensor networks and ZigBee technology to monitor and control home appliances in real-time. Electrical parameters like voltage, current, and power consumption are measured.
2) The system allows flexible control of appliances based on consumer needs. Appliances can be monitored and controlled remotely or automatically based on power consumption thresholds.
3) Key features of the system include using a TRIAC circuit to control appliances without needing a microcontroller, and providing flexible control options to users for switching devices on/off according to their preferences. This allows improving consumer comfort while optimizing energy use.
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
This document proposes a Shared Authority based Privacy preserving Authentication protocol (SAPA) for handling privacy issues in cloud storage. SAPA achieves shared access authority through an anonymous access request matching mechanism. It applies attribute-based access control to allow users to reliably access their own data fields. It also uses proxy re-encryption to provide temporary authorized data sharing among multiple users. The goal is to preserve user privacy during data access and sharing in the cloud.
iaetsd Secured multiple keyword ranked search over encrypted databasesIaetsd Iaetsd
This document proposes a Robust Key-Aggregate Cryptosystem (RKAC) that allows flexible and efficient assignment of decryption rights for encrypted data stored in cloud storage. The RKAC produces constant-sized ciphertexts such that a constant-sized aggregate decryption key can decrypt any subset of ciphertexts. This allows the data owner to share access to selected encrypted files by sending a single small aggregate key to authorized users, without decrypting the files themselves or distributing individual keys. The RKAC is described as providing a secure and flexible method for sharing encrypted data stored in the cloud.
iaetsd Robots in oil and gas refineriesIaetsd Iaetsd
This document discusses attribute-based encryption in cloud computing with outsourced revocation. It proposes a pseudonym generation scheme for identity-based encryption and outsourced revocation in cloud computing. The scheme offloads most key generation operations to a Key Update Cloud Service Provider during key issuing and updating, leaving only simple operations for the Private Key Generator and users. It aims to reduce computation overhead at the Private Key Generator while using an untrusted cloud service provider.
iaetsd Modeling of solar steam engine system using parabolicIaetsd Iaetsd
The document describes the modeling and testing of a solar-steam engine system using a parabolic concentrator. The system focuses solar radiation onto a boiler to generate steam, which is then used to power an oscillating steam engine coupled to a generator to produce electricity. The parabolic dish has a diameter of 0.625m and focuses sunlight onto a 1L boiler. Testing showed the system could produce 9V with no load and 5.3V under load, demonstrating its potential for rural electrification applications.
iaetsd Isolation of cellulose from non conventional source and its chemical m...Iaetsd Iaetsd
This document describes isolating cellulose from the weed plant Prosopis juliflora and chemically modifying it into cellulose acetate. Conditions were optimized for isolating cellulose using sodium hydroxide and sodium chlorite treatments. The best isolation results used 50% sodium chlorite with 20% sodium hydroxide at 90°C for 120 minutes. Conditions for acetylating the cellulose into cellulose acetate were also optimized, with the best results at 100°C for 18 hours. Fourier transform infrared spectroscopy characterized the isolated cellulose and synthesized cellulose acetate.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Iaetsd design and implementation of multiple sic vectors
1. DESIGN AND IMPLEMENTATION OF MULTIPLE SIC VECTORS
THEORY AND APPLICATION IN BIST SCHEMES
N.Seethamma 1
, V.Srinivasarao 2
1
M.Tech Student, Department of ECE, Shri Vishnu Engineering College for women, Bhimavaram
2
Associate Professor, Department of ECE, Shri Vishnu Engineering College for women, Bhimavaram
1
Mail id: sitanelluri@gmail.com
ABSTRACT
Test pattern generators are the vital blocks in
Built-in self-test. In this paper a new approach which
is multiple single input changes (MSIC) is used to
generate the random patterns for applying it to CUT
for testing applications. A reconfigurable Johnson
counter and a scalable SIC counter are developed to
generate a class of minimum transition sequences.
The proposed TPG is flexible to both the test-per-
clock and the test-per-scan schemes. The generated
patterns based on this approach are applied to the
ISCAS benchmark designs. Control unit is used to
control all the operations. Mainly control unit will do
configuration of CUT in test mode/Normal mode,
feed seed value to TPG and TRA. Simulation results
show the functionality of the pattern generator. The
synthesis is carried out on XILINX ISE and the
simulation is performed on the ISE simulator. The
obtained test results are comparing with the primary
one to demonstrate the target fault coverage.
Index Terms—Built-in self-test (BIST),
low power, single-input change (SIC), test pattern
generator (TPG).
I.INTRODUCTION
The main challenging areas in VLSI are
performance, cost, and power dissipation. The
demand for portable computing devices and
communications system are increasing rapidly. These
applications require low power dissipation VLSI
circuits. The power dissipation during test mode is
200% P more than in normal mode. Hence it is
important aspect to optimize power during testing.
Power optimization is one of the main challenges. To
reduce the power consumption generates the test
vectors with less number of transitions. Generally the
random sequence at the output of the flip-flops can be
used as a test pattern. Flip-flop’s connected in series
with feedback taps defined by the generator
polynomial. The seed value is loaded into the outputs
of the flip-flops. The only input required to generate
a random sequence is an external clock where each
clock pulse can produce a unique pattern at the output
of the flip-flops.
This test pattern is run on the circuit under
test for desired fault coverage. The number of inputs
required by the circuit under test must match with the
number of flip-flop outputs. The power consumed by
the chip under test is a measure of the switching
activity of the logic inside the chip which depends
largely on the randomness of the applied input
stimulus. Reduced correlation between the successive
vectors of the applied stimulus into the circuit under
test can result in much higher power consumption by
the device than the budgeted power. A new low
power pattern generation technique is implemented
using a multiple single input change method.
Proceedings of International Conference On Current Innovations In Engineering And Technology
International Association Of Engineering & Technology For Skill Development
ISBN : 978 - 1502851550
www.iaetsd.in
27
2. A) Need for using BIST technique
Today’s highly integrated multi-layer boards
with fine-pitch ICs are virtually impossible to be
accessed physically for testing. Traditional board test
methods which include functional test, only accesses
the board's primary I/Os, providing limited coverage
and poor diagnostics for board-network fault. In
circuit testing, another traditional test method works
by physically accessing each wire on the board via
costly "bed of nails" probes and testers. To identify
reliable testing methods which will reduce the cost
of test equipment, a research to verify each
VLSI testing problems has been conducted. The
major problems detected so far are as follows:
Test generation problems
Gate to I/O pin ratio
B) Test Generation Problems
The large number of gates in VLSI circuits has
pushed computer automatic-test-generation times to
weeks or months of computation. The numbers of
test patterns are becoming too large to be
handled by an external tester and this has
resulted in high computation costs and has
outstripped reasonable available time for production
testing.
C) The Gate to I/O Pin Ratio Problem
As ICs grow in gate counts, it is no longer
true that most gate nodes are directly accessible by
one of the pins on the package. This makes testing of
internal nodes more difficult as they could neither no
longer be easily controlled by signal from an input
pin (controllability) nor easily observed at an output
pin (observe ability). Pin counts go at a much slower
rate than gate counts, which worsens the
controllability and observe ability of internal gate
nodes.
II. PROPOSED MSIC-TPG SCHEME
This section discuss about the introduction of
MSIC and how the test patterns are generated using
this scheme. First, the SIC vector is decompressed to
its multiple code words. Meanwhile, the generated
code words will bit-XOR with a same seed vector in
turn. Hence, a test pattern with similar test vectors
will be applied to all scan chains. The proposed
MSIC-TPG consists of an SIC generator, a seed
generator, an XOR gate network, and a clock and
control block.
Fig.1(a) Symbolic simulation of an MSIC
pattern for scan chains.
(b) Symbolic representation of an
MSIC pattern.
Proceedings of International Conference On Current Innovations In Engineering And Technology
International Association Of Engineering & Technology For Skill Development
ISBN : 978 - 1502851550
www.iaetsd.in
28
3. A) Test Pattern Generation Method
Assume there are m primary inputs (PIs) and M
scan chains in a full scan design, and each scan chain
has l scan cells. Fig. 1(a) shows the symbolic
simulation for one generated pattern. The vector
generated by an m-bit LFSR with the primitive
polynomial can be expressed as S(t) =
S0(t)S1(t)S2(t), . . . , Sm−1(t) (hereinafter referred to
as the seed), and the vector generated by an l-bit
Johnson counter can be expressed as J (t) =
J0(t)J1(t)J2(t), . . . , Jl−1(t).In the first clock cycle, J =
J0 J1 J2, . . . , Jl−1 will bit-XOR with S = S0S1S2, . .
. , SM−1, and the results X1Xl+1X2l+1, . . . ,
X(M−1)l+1 will be shifted into M scan chains,
respectively. In the second clock cycle, J = J0 J1 J2, .
. . , Jl−1 will be circularly shifted as J =Jl−1 J0 J1, . . .
, Jl−2, which will also bit-XOR with the seed S =
S0S1S2, . . . , SM−1. The resulting X2Xl+2X2l+2, . .
. , X(M−1)l+2 will be shifted into M scan chains,
respectively. After l clocks, each scan chain will be
fully loaded with a unique Johnson codeword, and
seed S0S1S2, . . . , Sm−1 will be applied to m PIs.
Since the circular Johnson counter can generate l
unique Johnson codewords through circular shifting a
Johnson vector, the circular Johnson counter and
XOR gates in Fig. 1 actually constitute a linear
sequential decompressor.
B) Reconfigurable Johnson Counter
According to the different scenarios of scan
length, this paper develops two kinds of SIC
generators to generate Johnson vectors and Johnson
codewords, i.e., the reconfigurable Johnson counter
and the scalable SIC counter.For a short scan length,
we develop a reconfigurable Johnson counter to
generate an SIC sequence in time domain.As shown
in Fig. 2(a), it can operate in three modes.
1) Initialization: When RJ_Mode is set to 1 and Init is
set to logic 0, the reconfigurable Johnson counter will
be initialized to all zero states by clocking CLK2
more than l times.
2) Circular shift register mode: When RJ_Mode and
Init are set to logic 1, each stage of the Johnson
counter will output a Johnson codeword by clocking
CLK2 l times.
3) Normal mode: When RJ_Mode is set to logic 0,
the reconfigurable Johnson counter will generate 2l
unique SIC vectors by clocking CLK2 2l times.
C) Scalable SIC Counter
When the maximal scan chain length l is
much larger than the scan chain number M, we
develop an SIC counter named the “scalable SIC
counter.” As shown in Fig. 2(b), it contains a k-bit
adder clocked by the rising SE signal, a k-bit
subtractor clocked by test clock CLK2, an M-bit shift
register clocked by test clock CLK2, and k
multiplexers. The value of k is the integer of log2(l −
M). The waveforms of the scalable SIC counter are
shown in Fig. 2(c). The k-bit adder is clocked by the
falling SE signal, and generates a new count that is
the number of 1s (0s) to fill into the shift register. As
shown in Fig. 2(b), it can operate in three modes.
1) If SE = 0, the count from the adder is stored to the
k-bit subtractor. During SE = 1, the contents of the k-
bit subtractor will be decreased from the stored count
to all zeros gradually.
Proceedings of International Conference On Current Innovations In Engineering And Technology
International Association Of Engineering & Technology For Skill Development
ISBN : 978 - 1502851550
www.iaetsd.in
29
4. 2) If SE = 1 and the contents of the k-bit subtractor
are not all zeros, M-Johnson will be kept at logic 1
(0).
3) Otherwise, it will be kept at logic 0 (1). Thus, the
needed 1s (0s) will be shifted into the M-bit shift
register by clocking CLK2 l times, and unique
Johnson codewords will be applied into different scan
chains.
Fig.2. SIC generators. (a) Reconfigurable Johnson
counter (b) Scalable SIC counter (c) Waveforms
of the scalable SIC counter.
D) MSIC-TPGs for Test-per-Clock Schemes
The MSIC-TPG for test-per-clock schemes is
illustrated in Fig. 3(a). The CUT’s PIs X1 − Xmn are
arranged as an n ×m SRAM-like grid structure. Each
grid has a two-input XOR gate whose inputs are
tapped from a seed output and an output of the
Johnson counter. The outputs of the XOR gates are
applied to the CUT’s PIs. A seed generator is an m-
stage conventional LFSR, and operates at low
frequency CLK1. The test procedure is as follows.
1) The seed generator generates a new seed by
clocking CLK1 one time.
2) The Johnson counter generates a new vector by
clocking CLK2 one time.
3) Repeat 2 until 2l Johnson vectors are generated.
4) Repeat 1–3 until the expected fault coverage or
test length is achieved.
E) MSIC-TPGs for Test-per-Scan Schemes
The MSIC-TPG for test-per-scan schemes is
illustrated in Fig. 3(b). The stage of the SIC generator
is the same as the maximum scan length, and the
width of a seed generator is not smaller than the scan
chain number. The inputs of the XOR gates come
from the seed generator and the SIC counter and their
outputs are applied to M scan chains, respectively.
The outputs of the seed generator and XOR gates are
applied to the CUT’s PIs, respectively. The test
procedure is as follows.
1) The seed circuit generates a new seed by clocking
CLK1 one time.
2) RJ_Mode is set to 0. The Reconfigurable Johnson
counter will operate in the Johnson counter mode and
generate a Johnson vector by clocking CLK2 one
time.
3) After a new Johnson vector is generated, RJ_Mode
and Init are set to 1. The reconfigurable Johnson
counter operates as a circular shift register, and
generates l codewords by clocking CLK2 l times.
Then, a capture operation is inserted.
Proceedings of International Conference On Current Innovations In Engineering And Technology
International Association Of Engineering & Technology For Skill Development
ISBN : 978 - 1502851550
www.iaetsd.in
30
5. 4) Repeat 2–3 until 2l Johnson vectors are
generated.
5) Repeat 1–4 until the expected fault coverage
or test length is achieved.
Fig 3. MSIC-TPGs for (a) test-per-clock and (b)
test-per-scan schemes.
III. STRATEGY DESCRIPTION
The MSIC Test pattern generator architecture
internally consists of a control circuit, seed circuit,
SIC counter, scan chain and MISR modules. Here the
control unit is used to initiate the seed value and
enable the counter and to control the scan design.
CUT is the circuit or chip in which we are going to
apply BIST for testing stuck at zero or stuck at one
error. Tapping can be taken according to the
specification but as per taping change the TPG output
generate will also change and as we change in
number of flip-flop the probability of repetition of
random number will reduce. The initial value loading
to the TPG is known as seed value.
Classification of test strategies:
1. Weighted Pseudorandom: Testing: In weighted
pseudorandom testing, pseudorandom patterns are
applied with certain 0s and 1s distribution in order to
handle the random pattern resistant fault undetectable
by the pseudorandom testing. Thus, the test length
can be effectively shortened.
2. Pseudo exhaustive Testing: Pseudo exhaustive
testing divides the CUT into several smaller sub
circuits and tests each of them exhaustively. All
detectable flaws within the sub circuits can be
detected. However, such a method involves extra
design effort to partition the circuits and deliver the
test patterns and test responses. BIST is a set of
structured-test techniques for combinational and
sequential logic, memories, multipliers, and other
embedded logic blocks. BIST is the commonly used
design technique for self testing of circuits.
3. Pseudorandom Testing: Pseudorandom testing
involves the application of certain length of test
patterns that have certain randomness property. The
test patterns are sequenced in a deterministic order.
The test length and the contents of the patterns are
used to impart fault coverage.
4. Exhaustive Testing: Exhaustive testing involves
the application of all possible input combinations to
the circuit under test (CUT). It guarantees that all
Proceedings of International Conference On Current Innovations In Engineering And Technology
International Association Of Engineering & Technology For Skill Development
ISBN : 978 - 1502851550
www.iaetsd.in
31
6. detectable faults that divert from the sequential
behavior will be detected. The strategies are often
applied to complex and well isolated small modules
such as PLAs.
5. Stored Patterns: Stored-pattern approach tracks the
pre generated test patterns to achieve certain test
goals. It is used to enhance system level testing such
as the power-on self test of a computer and
microprocessor functional testing using micro
programs.
BIST is a design for testability (DFT)
technique in which testing is carried out using built –
in hardware features. Since testing is built into the
hardware, it is faster and efficient. The BIST
architecture needs three additional hardware blocks
such as a pattern generator, a response analyzer and a
test controller to a digital circuit. For pattern
generators, we can use either a ROM with stored
patterns, or a counter or a linear feedback shift
register (LFSR).A response analyzer is a compactor
with stored responses or an LFSR used as a signature
analyzer. A controller provides a control signal to
activate all the blocks.The circuit introduces more
switching activities in the circuit under test
(CUT)during test than that during normal
operation[5].It causes excessive power dissipation
and results in delay penalty into the design[6].
Using BIST Technique the portability can be
achieved very easily than the Automatic Test pattern
generator. Generally the Automatic Test pattern
generators are used externally while a BIST uses
internally. Due to advantages of BIST the concept of
ATPG is vanishes but it also has its own advantages.
IV.RESULTS
WAVEFORM FOR 4BIT MISC
WAVEFORM FOR 8 BIT LOW POWER LFSR
WAVEFORM FOR 8 BIT MSIC
Proceedings of International Conference On Current Innovations In Engineering And Technology
International Association Of Engineering & Technology For Skill Development
ISBN : 978 - 1502851550
www.iaetsd.in
32
7. Schematics:
RTL Schematics:
Technology schematics:
V. CONCLUSION
The proposed approach shows the concept of
reducing the transitions in the test pattern generated.
The transition is reduced by increasing the correlation
between the successive bits. The simulation results
shows that how the patterns are generated for the
applied seed vector. This paper presents the
implementation of MSIC approach based pattern
generator with regard to verilog language.
Synthesizing and implementation (i.e. Translate, Map
and Place and Route) of the code is carried out on
Xilinx - Project Navigator, ISE suite. The power
reports shows that the proposed low power lfsr
consumes less power during testing by taking the
benchmark circuit. In future there is a chance to
reduce the power somewhat more by doing
modifications in the proposed architecture.
REFERENCES
[1] Feng Liang, Luwen Zhang, Shaochong Lei,
Guohe Zhang, Kaile Gao, and Bin Liang “Test
Patterns of Multiple SIC Vectors: Theory and
Application in BIST Schemes” in IEEE transactions
on very large scale integration (vlsi) systems, Vol.
21, No. 4, April 2013
[2] Y. Zorian, “A distributed BIST control scheme
for complex VLSI devices,” in 11th Annu. IEEE
VLSI Test Symp. Dig. Papers, Apr. 1993,pp. 4–9.
[3] A. Abu-Issa and S. Quigley, “Bit-swapping
LFSR and scan-chain ordering: A novel technique for
peak- and average-power reduction in scan-based
BIST,” IEEE Trans. Comput.-Aided Design Integr.
Circuits Syst., vol. 28, no. 5, pp. 755–759, May 2009.
[4] P. Girard, L. Guiller, C. Landrault, S.
Pravossoudovitch, J. Figueras,S. Manich, P. Teixeira,
and M. Santos, “Low-energy BIST design: Impact of
the LFSR TPG parameters on the weighted switching
activity,”in Proc. IEEE Int. Symp. Circuits Syst., vol.
1. Jul. 1999, pp.110–113.
[5] S. Wang and S. Gupta, “DS-LFSR: A BIST TPG
for low switching activity,” IEEE Trans. Comput.-
Aided Design Integr. Circuits Syst.,vol. 21, no. 7, pp.
842–851, Jul. 2002.
Proceedings of International Conference On Current Innovations In Engineering And Technology
International Association Of Engineering & Technology For Skill Development
ISBN : 978 - 1502851550
www.iaetsd.in
33
8. [6] F. Corno, M. Rebaudengo, M. Reorda, G.
Squillero, and M. Violante,“Low power BIST via
non-linear hybrid cellular automata,”in Proc. 18th
IEEE VLSI Test Symp., Apr.–May 2000, pp.29–34.
[7] P. Girard, L. Guiller, C. Landrault, S.
Pravossoudovitch, and H. Wunderlich,“A modified
clock scheme for a low power BIST test pattern
generator,” in Proc. 19th IEEE VTS VLSI Test
Symp., Mar.–Apr. 2001,pp. 306–311.
[8] D. Gizopoulos, N. Krantitis, A. Paschalis, M.
Psarakis, and Y. Zorian, “Low power/energy BIST
scheme for datapaths,” in Proc. 18th IEEE VLSI Test
Symp., Apr.–May 2000, pp. 23–28.
[9] Y. Bonhomme, P. Girard, L. Guiller, C.
Landrault, and S. Pravossoudovitch,“A gated clock
scheme for low power scan testing of logic ICs or
embedded cores,” in Proc. 10th Asian Test Symp.,
Nov. 2001, pp.253–258.
Proceedings of International Conference On Current Innovations In Engineering And Technology
International Association Of Engineering & Technology For Skill Development
ISBN : 978 - 1502851550
www.iaetsd.in
34