This document proposes a novel methodology for integrating on-chip power noise measurement (OCM) into the standard testing flow for hardware security and trust evaluation. It demonstrates that OCM provides higher quality side-channel traces than traditional measurement methods. It then proposes for the first time using OCM to establish a standard side-channel measurement setup, and provides a methodology to integrate hardware security and trust validation into the standard testing process using OCM.
Vlsi Design of Low Transition Low Power Test Pattern Generator Using Fault Co...iosrjce
Now a day’s highly integrated multi layer board with IC’s is virtually impossible to be accessed
physically for testing. The major problem detected during testing a circuit includes test generation and gate to
I/O pin problems. In design of any circuit, consuming low power and less hardware utilization is an important
design parameter. Therefore reliable testing methods are introduced which reduces the cost of the hardware
required and also power consumed by the device. In this project a new fault coverage test pattern generator is
generated using a linear feedback shift register called FC-LFSR which can perform fault analysis and reduces
the total power of the circuit. In this test, it generates three intermediate patterns between the random patterns
which reduces the transitional activities of primary inputs so that the switching activities inside the circuit under
test will be reduced. The test patterns generated are applied to c17 benchmark circuit, whose results with fault
coverage of the circuit being tested. The simulation for this design is performed using Xilinx ISE software using
Verilog hardware description language
TN013 ESD Failure Analysis of PV Module Diodes and TLP Test MethodWei Huang
Bypass diodes inserted across the strings of the solar panel arrays are essential to ensure the efficiency of the solar power system. However, those diodes are found to be susceptible to potential Electrostatic Discharge (ESD) events in the process of solar Photovoltaic (PV) panel manufacture, transportation and on-site installation. Please refer [1], where an International PV Module Quality Assurance Forum has been setup to investigate PV Module reliability, and Task Force 4 has been setting guidelines for testing the ESD robustness of diodes used to enhance PV panel performance. This document explains the theory behind the ESD damage and the proper test and analysis methods for ESD failure of diodes. To demonstrate the proposed testing methodology that follows, we will be evaluating six different types of diode models as supplied by our customer, who manufactures solar panel arrays.
ESDEMC_PB2014.08 An Ethernet Cable Discharge Event (CDE) Test and Measurement...ESDEMC Technology LLC
This document describes a test and measurement system for cable discharge events (CDEs) on Ethernet cables. A CDE occurs when a charged Ethernet cable discharges to a connector. The system aims to reproduce real-world CDE conditions in the lab to test hardware immunity. It consists of a controller to set cable charge levels and control discharges, charge modules representing different cable types, and a failure test monitor. The controller controls each cable wire separately and measures discharge currents. Calibration with defined loads validated the system's functionality and output parameters.
ESDEMC_PB2009.08 A Measurement Technique for ESD Current Spreading on A PCB u...ESDEMC Technology LLC
Abstract—Electrostatic discharge (ESD) can cause interference or damage in circuits in many ways e.g., by E- or Hfield coupling or via conduction paths. Although we can roughly estimate the voltage and current at the injection point during an ESD event, the real offending parameter is mostly the ESD current spreading throughout the system. Those currents can be simulated if great simplifications of the system are accepted.
However, even in moderately complex systems the ability to simulate is limited by lack of models and computational resources. Independent of the complexity, but obviously not free of its own limitations is a measurement technique that captures the current as a function of time and location through the system.
This article describes the proof on concept of ESD such a measurement technique that allows reconstructing the spreading current as a movie from magnetic field measurements. It details the technique, question of probe selection and how to process the data to present the current spread as a movie.
TN006 frequency compensation method for vf-tlp measurementsWei Huang
The objective of this article is to demonstrate a frequency compensation technique for measuring the current and voltage of a device under test in a Very Fast Transmission Line Pulser (VF-TLP) test environment. The current measurement utilizes Non-Overlapping Time Domain Reflectometry, which is useful for On-Wafer testing because the measurement can be made with low profile small pitch probes, such as the Picoprobe Model 10. Further, to increase the bandwidth of the current measurement over common techniques, such as current transformers with 1GHz bandwidth, the method utilizes a resistive Pick-Off. The Pick-Off can be finely tuned to have as little insertion loss as possible, thereby enhancing the bandwidth. Although this method can also yield a DUT voltage measurement, the result suffers from numerical errors for low ohmic devices. A separate, direct measurement is presented that will demonstrate an extremely accurate voltage measurement that also utilizes frequency compensation.
This document describes characterizing touch panel sensor failures from electrostatic discharge (ESD) using current-voltage (IV) curve transient line pulse (TLP) testing. It outlines different ESD damage scenarios on touch panels and challenges with current testing methods. The presentation proposes using IV-TLP probing to inject ESD locally and measure current, allowing automated testing and analysis of ESD robustness for different failure modes like trace fusing or inter-trace breakdown. Example test setups and preliminary results are shown for single-trace and differential injection IV-TLP methods.
Pb2003.01 problems with the electrostatic discharge (esd) immunity test in el...ESDEMC Technology LLC
Electrostatic discharge (ESD) immunity test is one of the important electromagnetic compatibility (EMC) tests. The IEC standard IECdlOOO-4-2 is the widely used standard to test the ESD immunity for electronic equipment. Many amendments such as amendment 1 (1998), amendment 2 (2000) have been published since 1995, but there is still problems with the ESD immunity test even with the 200x version. More than six ESD generators of different bands are tested for different equipment. The results show that the failure voltages of different ESD generators are vary much from different bands for the same test equipment. This may lead to the results incomparable when test the ESD immunity test in the EMC. Further studies show that there is a good correlation between the failure voltage and the induced voltage.
This document discusses applications of artificial intelligence techniques like neural networks, expert systems, and fuzzy logic to power system protection. It provides examples of using these techniques for transmission line fault classification, distance relaying, machine winding protection, transformer differential relaying, and transformer fault diagnosis. The applications aim to make protection schemes more adaptive, reliable, and capable of handling changing system conditions. AI techniques can introduce new concepts like integrated, adaptive, and predictive protection to design smarter digital relays.
Vlsi Design of Low Transition Low Power Test Pattern Generator Using Fault Co...iosrjce
Now a day’s highly integrated multi layer board with IC’s is virtually impossible to be accessed
physically for testing. The major problem detected during testing a circuit includes test generation and gate to
I/O pin problems. In design of any circuit, consuming low power and less hardware utilization is an important
design parameter. Therefore reliable testing methods are introduced which reduces the cost of the hardware
required and also power consumed by the device. In this project a new fault coverage test pattern generator is
generated using a linear feedback shift register called FC-LFSR which can perform fault analysis and reduces
the total power of the circuit. In this test, it generates three intermediate patterns between the random patterns
which reduces the transitional activities of primary inputs so that the switching activities inside the circuit under
test will be reduced. The test patterns generated are applied to c17 benchmark circuit, whose results with fault
coverage of the circuit being tested. The simulation for this design is performed using Xilinx ISE software using
Verilog hardware description language
TN013 ESD Failure Analysis of PV Module Diodes and TLP Test MethodWei Huang
Bypass diodes inserted across the strings of the solar panel arrays are essential to ensure the efficiency of the solar power system. However, those diodes are found to be susceptible to potential Electrostatic Discharge (ESD) events in the process of solar Photovoltaic (PV) panel manufacture, transportation and on-site installation. Please refer [1], where an International PV Module Quality Assurance Forum has been setup to investigate PV Module reliability, and Task Force 4 has been setting guidelines for testing the ESD robustness of diodes used to enhance PV panel performance. This document explains the theory behind the ESD damage and the proper test and analysis methods for ESD failure of diodes. To demonstrate the proposed testing methodology that follows, we will be evaluating six different types of diode models as supplied by our customer, who manufactures solar panel arrays.
ESDEMC_PB2014.08 An Ethernet Cable Discharge Event (CDE) Test and Measurement...ESDEMC Technology LLC
This document describes a test and measurement system for cable discharge events (CDEs) on Ethernet cables. A CDE occurs when a charged Ethernet cable discharges to a connector. The system aims to reproduce real-world CDE conditions in the lab to test hardware immunity. It consists of a controller to set cable charge levels and control discharges, charge modules representing different cable types, and a failure test monitor. The controller controls each cable wire separately and measures discharge currents. Calibration with defined loads validated the system's functionality and output parameters.
ESDEMC_PB2009.08 A Measurement Technique for ESD Current Spreading on A PCB u...ESDEMC Technology LLC
Abstract—Electrostatic discharge (ESD) can cause interference or damage in circuits in many ways e.g., by E- or Hfield coupling or via conduction paths. Although we can roughly estimate the voltage and current at the injection point during an ESD event, the real offending parameter is mostly the ESD current spreading throughout the system. Those currents can be simulated if great simplifications of the system are accepted.
However, even in moderately complex systems the ability to simulate is limited by lack of models and computational resources. Independent of the complexity, but obviously not free of its own limitations is a measurement technique that captures the current as a function of time and location through the system.
This article describes the proof on concept of ESD such a measurement technique that allows reconstructing the spreading current as a movie from magnetic field measurements. It details the technique, question of probe selection and how to process the data to present the current spread as a movie.
TN006 frequency compensation method for vf-tlp measurementsWei Huang
The objective of this article is to demonstrate a frequency compensation technique for measuring the current and voltage of a device under test in a Very Fast Transmission Line Pulser (VF-TLP) test environment. The current measurement utilizes Non-Overlapping Time Domain Reflectometry, which is useful for On-Wafer testing because the measurement can be made with low profile small pitch probes, such as the Picoprobe Model 10. Further, to increase the bandwidth of the current measurement over common techniques, such as current transformers with 1GHz bandwidth, the method utilizes a resistive Pick-Off. The Pick-Off can be finely tuned to have as little insertion loss as possible, thereby enhancing the bandwidth. Although this method can also yield a DUT voltage measurement, the result suffers from numerical errors for low ohmic devices. A separate, direct measurement is presented that will demonstrate an extremely accurate voltage measurement that also utilizes frequency compensation.
This document describes characterizing touch panel sensor failures from electrostatic discharge (ESD) using current-voltage (IV) curve transient line pulse (TLP) testing. It outlines different ESD damage scenarios on touch panels and challenges with current testing methods. The presentation proposes using IV-TLP probing to inject ESD locally and measure current, allowing automated testing and analysis of ESD robustness for different failure modes like trace fusing or inter-trace breakdown. Example test setups and preliminary results are shown for single-trace and differential injection IV-TLP methods.
Pb2003.01 problems with the electrostatic discharge (esd) immunity test in el...ESDEMC Technology LLC
Electrostatic discharge (ESD) immunity test is one of the important electromagnetic compatibility (EMC) tests. The IEC standard IECdlOOO-4-2 is the widely used standard to test the ESD immunity for electronic equipment. Many amendments such as amendment 1 (1998), amendment 2 (2000) have been published since 1995, but there is still problems with the ESD immunity test even with the 200x version. More than six ESD generators of different bands are tested for different equipment. The results show that the failure voltages of different ESD generators are vary much from different bands for the same test equipment. This may lead to the results incomparable when test the ESD immunity test in the EMC. Further studies show that there is a good correlation between the failure voltage and the induced voltage.
This document discusses applications of artificial intelligence techniques like neural networks, expert systems, and fuzzy logic to power system protection. It provides examples of using these techniques for transmission line fault classification, distance relaying, machine winding protection, transformer differential relaying, and transformer fault diagnosis. The applications aim to make protection schemes more adaptive, reliable, and capable of handling changing system conditions. AI techniques can introduce new concepts like integrated, adaptive, and predictive protection to design smarter digital relays.
This document provides an overview of using an OTDR (Optical Time Domain Reflectometer) to test fiber optic cabling. It discusses OTDR functionality and how to properly set up the device, including setting the range, pulse width, index of refraction, and averaging time. It also covers analyzing OTDR traces to evaluate specific events and faults along a cable span.
PerkinElmer White Paper Evaluation of XRpad Flat Panel Detectors for Security...Kirstie Mogilner
The document evaluates the PerkinElmer XRpad flat panel detector for security applications. Test results show the detector has excellent image quality even at low radiation doses. It withstands radiation levels equivalent to over 7 years of use. The detector functions reliably from -20°C to 60°C and has a dynamic range over 82dB. The study concludes the XRpad is well-suited for security applications due to its outstanding image quality, mobility, and ease of use.
PerkinElmer white paper evaluating XRpad flat panel detectors for security ap...Kirstie Mogilner
The document evaluates the PerkinElmer XRpad flat panel detector for security applications. Test results show the detector has excellent image quality even at low radiation doses. It withstands radiation levels equivalent to over 7 years of use. The detector functions reliably from -20°C to 60°C and has a dynamic range over 82dB. The study concludes the XRpad is well-suited for security applications due to its outstanding image quality, mobility, and ease of use.
The document discusses EMC compliance rules and regulations for electronic products. It covers various safety, energy efficiency, environmental and EMI/EMC standards that products must comply with for different regions. It emphasizes the importance of considering compliance early in the design process to incorporate necessary design features and allow for testing and modifications before final release. Regulations are constantly changing so keeping updated is important.
This document compares ESD failure tests using different test methods: ESD gun simulator, Transmission Line Pulse (TLP), and Human Metal Model (HMM). A test IC (0531Z) was subjected to these tests. TLP and HMM tests both accurately predicted the failure levels observed in ESD gun testing. Specifically:
1. TLP testing at 100ns and 400ns pulses yielded failure levels of ±19A and ±11.5A respectively, matching the ESD gun failure levels of 10.5-13.5kV.
2. HMM testing with a 50ohm matched setup showed failure starting around 40A peak current, equivalent to 10-15kV E
IOLTS 2019: Agressive Undervolting of FPGAs: Power and Reliability Trade-offsLEGATO project
In this work, we evaluate aggressive undervolting, i.e., voltage underscaling below the nominal level to reduce the energy consumption of Field Programmable Gate Arrays (FPGAs). Usually, voltage guardbands are added by chip vendors to ensure the worst-case process and environmental scenarios. Through experimenting on several FPGA architectures, we con¿rm a large voltage guardband for several FPGA components, which in turn, delivers signi¿cant power savings. However, further undervolting below the voltage guardband may cause reliability issues as the result of the circuit delay increase, and faults might start to appear. We extensively characterize the behavior of these faults in terms of the rate, location, type, as well as sensitivity to environmental temperature, primarily focusing on FPGA on-chip memories, or Block RAMs (BRAMs). Understanding this behavior can allow to deploy ef¿cient mitigation techniques, and in turn, FPGA-based designs can be improved for better energy, reliability, and performance trade-offs. Finally, as a case study, we evaluate a typical FPGA-based Neural Network (NN) accelerator when the FPGA voltage is underscaled. In consequence, the substantial NN energy savings come with the cost of NN accuracy loss. To attain power savings without NN accuracy loss below the voltage guardband gap, we proposed an application-aware technique and we also, evaluated the built-in Error-Correcting Code (ECC) mechanism. Hence, First, we developed an application-dependent BRAMs placement technique that relies on the deterministic behavior of undervolting faults, and mitigates these faults by mapping the most reliability sensitive NN parameters to BRAM blocks that are relatively more resistant to undervolting faults. Second, as a more general technique, we applied the built-in ECC of BRAMs and observed a signi¿cant fault coverage capability thanks to the behavior of undervolting faults, with a negligible power consumption overhead.
This document discusses arc flash hazard calculations and their importance for electrical safety. It outlines OSHA and NFPA regulations requiring employers to identify electrical hazards and protect workers through appropriate personal protective equipment. Key steps in performing an arc flash hazard analysis include short circuit, protective device coordination, and arc flash studies to determine incident energy levels and necessary PPE based on NFPA tables. Warning labels communicating these hazards must be applied to electrical equipment.
The document discusses challenges in protection relay testing for future power grids. It summarizes a presentation given by Etienne Leduc on using real-time simulators for complex protection relay testing scenarios that are difficult to test with traditional approaches. The presentation covered how real-time simulators can provide closed-loop testing of detailed electromagnetic transient models, complex protection schemes, and the effect of relays on the grid. It also provided an overview of OPAL-RT's protection testing solutions including software, hardware, and services.
SCR-Based ESD Protection Designs for RF ICsjournal ijrtem
Abstract: CMOS technology has been used to implement the radio-frequency integrated circuits (RF ICs). However, it was known that advanced CMOS technologies seriously degrade the electrostatic discharge (ESD) robustness of ICs. Therefore, on-chip ESD protection devices must be added into the chip, including RF ICs. To minimize the impacts from ESD protection devices on RF performances, the ESD protection at RF pads must be carefully designed. A review on ESD protection designs with silicon-controlled rectifier (SCR) devices in RF ICs is presented in this article. Keywords: CMOS, ESD, RF, SCR.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document provides guidance on performing arc flash hazard calculations based on IEEE 1584 and NFPA 70E standards. It includes worksheets and examples for estimating arcing short circuit current, calculating incident energy, and determining arc flash boundaries. The worksheets break the calculation process down step-by-step and are intended to assist with manual calculations. The user needs to understand arc flash calculations and comply with all requirements in the relevant standards.
EMC, EMI, Military and Aerospace EMC Tests, Aircraft EMI Testing Training Bryan Len
This 3-day course covers electromagnetic compatibility (EMC) and electromagnetic interference (EMI) testing for the aerospace industry. It teaches how to develop EMC/EMI compliance frameworks, interface requirements, and tests according to various standards including MIL-STD-461F. Topics include EMC/EMI applications, measurement tolerances, general aerospace EMC/EMI tests, and applying MIL-STD-461F.
Advanced Network Solutions for Electric Power Applicationchowfei
- The document discusses advanced communication networks for electric power applications, focusing on protocols like DNP3 and IEC 61850. It provides an overview of these protocols, their usage in different countries, and how IEC 61850 is emerging as an object-oriented, Ethernet-based standard.
- Case studies are presented that demonstrate applications of Loop Telecom's solutions for various power utility communication networks around the world, including microwave, optical fiber, and wireless technologies.
- Key components discussed include modems, multiplexers, routers, switches, and other devices that support protocols like DNP3, IEC 60870-5, and IEC 61850 over a variety of connection types.
Seaward has over 70 years experience in the design manufacture of market-leading electrical test equipment. Seaward’s unrivalled range of electrical test equipment serves a wide variety of safety testing and precision measurement applications. For 25 years Seaward has been developing market-defining portable appliance testers, software and accessories for the PAT testing market.
The Cropico and Clare ranges of precision instruments and industrial electrical test equipment bolster Seaward’s product offering and demonstrate the result of 70 years of technical expertise across a number of industries including manufacturing, utilities and aerospace.
The all-inclusive Seaward electrical test equipment range now encompasses:
PAT Testing
Installation Testing
Electrical Test Tools
High Voltage Testing
Industrial Testing and Measurement
Micro Ohmmeters
Hipot Testers
Resistance Standards
Decade Boxes
Benefits of enhanced event analysis in datacenter otdr testingFangXuIEEE
Automatic detection and analysis algorithm of events in OTDR traces is very a challenging signal processing and analysis problem. It has too many tradeoffs to overcome: sensitivity vs. reliability, complexity vs. execution time. Traditional signal processing methods quickly reach performance limits. This is a place to demonstrate peoples creativity of finding exotic algorithm and method.
Implementation of Transformer Protection by Intelligent Electronic Device for...IJERA Editor
Protection of power system equipments was traditionally done by using electromagnetic relay, static relays, and
numerical relays. At present the microprocessor based relays are replacing the old Electromagnetic relays
because of their high level accuracy and fast operation. RET670(Transformer protection relay ), an IED
(INTELLIGENT ELECTRONIC DEVICE) provides fast and selective protection, monitoring, and control of all
types of transformer. The configured IED is tested under different fault conditions simulated by using mobile test
kit to ensure IED’s reliable operation on site. With preconfigured algorithms, the IED will automatically
reconfigure the network in case of a fault, and a service restoration is carried out within milliseconds by giving
trip signal to the corresponding Circuit breakers. On receiving the trip signal the circuit breaker operates
providing quicker isolation of transformers under the fault condition. This enables to have a complete and an
adequate protection to the specified power transformer.
Your electrical safety specilist for all equipments Powered AC and DCMahesh Chandra Manav
We all are aware that we are applying lots of Artficial Sources to make our Life Comforts .
For This we are installing Many Electrical Equipments Power AC & DC and Electric Vehicles Inside our Building and out Side and in this process many of metal Part is entering into our Building.
To ensure better perform and Human Safety Earthing of Equipment and Conductive stucture is very important Value from 1 Ohms up to 0.25 Ohms.
Our National Building Code 2016 is alreday given Guide Line and Supporting by MBBL2019
(Manual Building By LAW).
Internal Switch and External Lightning will very Danger for our Equipments and Human Lives May Cause Assest Damage up to Sacrifice Human Live due to Fire and Electric Change.
We have to Design and protect our Building or Permises form External Lightning by Nature use NBC IS/IEC 62305.
When Lightning Fall any Condutive Like Pole ,Transmission Line and React with Ground may be Shift 100kA Fault Current into our Building use Surge Protection Device to product from any ind of Direct and Indirect Threat.
JMV LPS Ltd belive Make in India Noida Base Company Manufacturer Design ,Engineering ,Supply and Installation.
Maintenance Free Earthing ,Copper Clad Steet Sof Conductore, Exothermic Weld, External Lightning Protection and per IS/IEC62305, Surge Protection Devive as per IS/IEC 62035.
Empirical Mode Decomposition and Data Hiding in ECG SignalIRJET Journal
1) The document discusses a method for denoising electrocardiogram (ECG) signals using empirical mode decomposition and then hiding patient data in the ECG signal.
2) ECG signals are decomposed into intrinsic mode functions using empirical mode decomposition to remove high frequency noise. An adaptive windowing technique is then used to preserve the QRS complex.
3) Patient data like temperature and blood pressure are encrypted and hidden in the denoised ECG signal using discrete wavelet transform and low-bit replacement. This allows secure access and transmission of private patient data.
Structural Health Monitoring of Bridges Buildings and Industrial Plant with N...Polytec, Inc.
Learn about Polytec’s latest laser vibrometer, specifically designed for remote, long range vibration and deflection measurements on bridges, buildings, towers, industrial plant, high voltage insulators or indeed any surface that is inaccessible or hard to reach. The system features a very high optical sensitivity, which means that it can also be used on surfaces at distances that would otherwise require surface treatment for vibrometry measurement. The webinar will share examples showing how the RSV-150 saves time and effort when monitoring the health of structures, including the measurement of resonant frequencies and deflections of bridges subjected to traffic loading. Find out how the laser Doppler approach compares with the alternative contacting and remote sensing methods.
This document provides an overview of using an OTDR (Optical Time Domain Reflectometer) to test fiber optic cabling. It discusses OTDR functionality and how to properly set up the device, including setting the range, pulse width, index of refraction, and averaging time. It also covers analyzing OTDR traces to evaluate specific events and faults along a cable span.
PerkinElmer White Paper Evaluation of XRpad Flat Panel Detectors for Security...Kirstie Mogilner
The document evaluates the PerkinElmer XRpad flat panel detector for security applications. Test results show the detector has excellent image quality even at low radiation doses. It withstands radiation levels equivalent to over 7 years of use. The detector functions reliably from -20°C to 60°C and has a dynamic range over 82dB. The study concludes the XRpad is well-suited for security applications due to its outstanding image quality, mobility, and ease of use.
PerkinElmer white paper evaluating XRpad flat panel detectors for security ap...Kirstie Mogilner
The document evaluates the PerkinElmer XRpad flat panel detector for security applications. Test results show the detector has excellent image quality even at low radiation doses. It withstands radiation levels equivalent to over 7 years of use. The detector functions reliably from -20°C to 60°C and has a dynamic range over 82dB. The study concludes the XRpad is well-suited for security applications due to its outstanding image quality, mobility, and ease of use.
The document discusses EMC compliance rules and regulations for electronic products. It covers various safety, energy efficiency, environmental and EMI/EMC standards that products must comply with for different regions. It emphasizes the importance of considering compliance early in the design process to incorporate necessary design features and allow for testing and modifications before final release. Regulations are constantly changing so keeping updated is important.
This document compares ESD failure tests using different test methods: ESD gun simulator, Transmission Line Pulse (TLP), and Human Metal Model (HMM). A test IC (0531Z) was subjected to these tests. TLP and HMM tests both accurately predicted the failure levels observed in ESD gun testing. Specifically:
1. TLP testing at 100ns and 400ns pulses yielded failure levels of ±19A and ±11.5A respectively, matching the ESD gun failure levels of 10.5-13.5kV.
2. HMM testing with a 50ohm matched setup showed failure starting around 40A peak current, equivalent to 10-15kV E
IOLTS 2019: Agressive Undervolting of FPGAs: Power and Reliability Trade-offsLEGATO project
In this work, we evaluate aggressive undervolting, i.e., voltage underscaling below the nominal level to reduce the energy consumption of Field Programmable Gate Arrays (FPGAs). Usually, voltage guardbands are added by chip vendors to ensure the worst-case process and environmental scenarios. Through experimenting on several FPGA architectures, we con¿rm a large voltage guardband for several FPGA components, which in turn, delivers signi¿cant power savings. However, further undervolting below the voltage guardband may cause reliability issues as the result of the circuit delay increase, and faults might start to appear. We extensively characterize the behavior of these faults in terms of the rate, location, type, as well as sensitivity to environmental temperature, primarily focusing on FPGA on-chip memories, or Block RAMs (BRAMs). Understanding this behavior can allow to deploy ef¿cient mitigation techniques, and in turn, FPGA-based designs can be improved for better energy, reliability, and performance trade-offs. Finally, as a case study, we evaluate a typical FPGA-based Neural Network (NN) accelerator when the FPGA voltage is underscaled. In consequence, the substantial NN energy savings come with the cost of NN accuracy loss. To attain power savings without NN accuracy loss below the voltage guardband gap, we proposed an application-aware technique and we also, evaluated the built-in Error-Correcting Code (ECC) mechanism. Hence, First, we developed an application-dependent BRAMs placement technique that relies on the deterministic behavior of undervolting faults, and mitigates these faults by mapping the most reliability sensitive NN parameters to BRAM blocks that are relatively more resistant to undervolting faults. Second, as a more general technique, we applied the built-in ECC of BRAMs and observed a signi¿cant fault coverage capability thanks to the behavior of undervolting faults, with a negligible power consumption overhead.
This document discusses arc flash hazard calculations and their importance for electrical safety. It outlines OSHA and NFPA regulations requiring employers to identify electrical hazards and protect workers through appropriate personal protective equipment. Key steps in performing an arc flash hazard analysis include short circuit, protective device coordination, and arc flash studies to determine incident energy levels and necessary PPE based on NFPA tables. Warning labels communicating these hazards must be applied to electrical equipment.
The document discusses challenges in protection relay testing for future power grids. It summarizes a presentation given by Etienne Leduc on using real-time simulators for complex protection relay testing scenarios that are difficult to test with traditional approaches. The presentation covered how real-time simulators can provide closed-loop testing of detailed electromagnetic transient models, complex protection schemes, and the effect of relays on the grid. It also provided an overview of OPAL-RT's protection testing solutions including software, hardware, and services.
SCR-Based ESD Protection Designs for RF ICsjournal ijrtem
Abstract: CMOS technology has been used to implement the radio-frequency integrated circuits (RF ICs). However, it was known that advanced CMOS technologies seriously degrade the electrostatic discharge (ESD) robustness of ICs. Therefore, on-chip ESD protection devices must be added into the chip, including RF ICs. To minimize the impacts from ESD protection devices on RF performances, the ESD protection at RF pads must be carefully designed. A review on ESD protection designs with silicon-controlled rectifier (SCR) devices in RF ICs is presented in this article. Keywords: CMOS, ESD, RF, SCR.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document provides guidance on performing arc flash hazard calculations based on IEEE 1584 and NFPA 70E standards. It includes worksheets and examples for estimating arcing short circuit current, calculating incident energy, and determining arc flash boundaries. The worksheets break the calculation process down step-by-step and are intended to assist with manual calculations. The user needs to understand arc flash calculations and comply with all requirements in the relevant standards.
EMC, EMI, Military and Aerospace EMC Tests, Aircraft EMI Testing Training Bryan Len
This 3-day course covers electromagnetic compatibility (EMC) and electromagnetic interference (EMI) testing for the aerospace industry. It teaches how to develop EMC/EMI compliance frameworks, interface requirements, and tests according to various standards including MIL-STD-461F. Topics include EMC/EMI applications, measurement tolerances, general aerospace EMC/EMI tests, and applying MIL-STD-461F.
Advanced Network Solutions for Electric Power Applicationchowfei
- The document discusses advanced communication networks for electric power applications, focusing on protocols like DNP3 and IEC 61850. It provides an overview of these protocols, their usage in different countries, and how IEC 61850 is emerging as an object-oriented, Ethernet-based standard.
- Case studies are presented that demonstrate applications of Loop Telecom's solutions for various power utility communication networks around the world, including microwave, optical fiber, and wireless technologies.
- Key components discussed include modems, multiplexers, routers, switches, and other devices that support protocols like DNP3, IEC 60870-5, and IEC 61850 over a variety of connection types.
Seaward has over 70 years experience in the design manufacture of market-leading electrical test equipment. Seaward’s unrivalled range of electrical test equipment serves a wide variety of safety testing and precision measurement applications. For 25 years Seaward has been developing market-defining portable appliance testers, software and accessories for the PAT testing market.
The Cropico and Clare ranges of precision instruments and industrial electrical test equipment bolster Seaward’s product offering and demonstrate the result of 70 years of technical expertise across a number of industries including manufacturing, utilities and aerospace.
The all-inclusive Seaward electrical test equipment range now encompasses:
PAT Testing
Installation Testing
Electrical Test Tools
High Voltage Testing
Industrial Testing and Measurement
Micro Ohmmeters
Hipot Testers
Resistance Standards
Decade Boxes
Benefits of enhanced event analysis in datacenter otdr testingFangXuIEEE
Automatic detection and analysis algorithm of events in OTDR traces is very a challenging signal processing and analysis problem. It has too many tradeoffs to overcome: sensitivity vs. reliability, complexity vs. execution time. Traditional signal processing methods quickly reach performance limits. This is a place to demonstrate peoples creativity of finding exotic algorithm and method.
Implementation of Transformer Protection by Intelligent Electronic Device for...IJERA Editor
Protection of power system equipments was traditionally done by using electromagnetic relay, static relays, and
numerical relays. At present the microprocessor based relays are replacing the old Electromagnetic relays
because of their high level accuracy and fast operation. RET670(Transformer protection relay ), an IED
(INTELLIGENT ELECTRONIC DEVICE) provides fast and selective protection, monitoring, and control of all
types of transformer. The configured IED is tested under different fault conditions simulated by using mobile test
kit to ensure IED’s reliable operation on site. With preconfigured algorithms, the IED will automatically
reconfigure the network in case of a fault, and a service restoration is carried out within milliseconds by giving
trip signal to the corresponding Circuit breakers. On receiving the trip signal the circuit breaker operates
providing quicker isolation of transformers under the fault condition. This enables to have a complete and an
adequate protection to the specified power transformer.
Your electrical safety specilist for all equipments Powered AC and DCMahesh Chandra Manav
We all are aware that we are applying lots of Artficial Sources to make our Life Comforts .
For This we are installing Many Electrical Equipments Power AC & DC and Electric Vehicles Inside our Building and out Side and in this process many of metal Part is entering into our Building.
To ensure better perform and Human Safety Earthing of Equipment and Conductive stucture is very important Value from 1 Ohms up to 0.25 Ohms.
Our National Building Code 2016 is alreday given Guide Line and Supporting by MBBL2019
(Manual Building By LAW).
Internal Switch and External Lightning will very Danger for our Equipments and Human Lives May Cause Assest Damage up to Sacrifice Human Live due to Fire and Electric Change.
We have to Design and protect our Building or Permises form External Lightning by Nature use NBC IS/IEC 62305.
When Lightning Fall any Condutive Like Pole ,Transmission Line and React with Ground may be Shift 100kA Fault Current into our Building use Surge Protection Device to product from any ind of Direct and Indirect Threat.
JMV LPS Ltd belive Make in India Noida Base Company Manufacturer Design ,Engineering ,Supply and Installation.
Maintenance Free Earthing ,Copper Clad Steet Sof Conductore, Exothermic Weld, External Lightning Protection and per IS/IEC62305, Surge Protection Devive as per IS/IEC 62035.
Empirical Mode Decomposition and Data Hiding in ECG SignalIRJET Journal
1) The document discusses a method for denoising electrocardiogram (ECG) signals using empirical mode decomposition and then hiding patient data in the ECG signal.
2) ECG signals are decomposed into intrinsic mode functions using empirical mode decomposition to remove high frequency noise. An adaptive windowing technique is then used to preserve the QRS complex.
3) Patient data like temperature and blood pressure are encrypted and hidden in the denoised ECG signal using discrete wavelet transform and low-bit replacement. This allows secure access and transmission of private patient data.
Structural Health Monitoring of Bridges Buildings and Industrial Plant with N...Polytec, Inc.
Learn about Polytec’s latest laser vibrometer, specifically designed for remote, long range vibration and deflection measurements on bridges, buildings, towers, industrial plant, high voltage insulators or indeed any surface that is inaccessible or hard to reach. The system features a very high optical sensitivity, which means that it can also be used on surfaces at distances that would otherwise require surface treatment for vibrometry measurement. The webinar will share examples showing how the RSV-150 saves time and effort when monitoring the health of structures, including the measurement of resonant frequencies and deflections of bridges subjected to traffic loading. Find out how the laser Doppler approach compares with the alternative contacting and remote sensing methods.
Este documento resume las actividades realizadas por un grupo de estudiantes durante varias semanas. Dieron la bienvenida a los nuevos estudiantes y organizaron rutinas y proyectos. Realizaron trabajos en equipo sobre temas como el chikungunya y herramientas. La profesora habló con una estudiante sobre su comportamiento y tuvieron conversaciones de trabajo. Los estudiantes estuvieron aprendiendo y aplicando nuevas habilidades en programas como Word y Excel.
This recipe is for a cheese cake with honey drops. It has three main parts - a cake base made from flour, sugar, margarine, eggs and sour cream, a cheese filling made from cottage cheese, sugar, oil, eggs, creamy pudding and milk, and an egg foam topping made from egg whites, sugar and lemon juice. The cake base is rolled out and baked, then the cheese filling is poured over and baked for an hour before adding the egg foam topping and decorating with honey drops.
There are three main categories of cellular receptors discussed in the document:
1) Ionotropic receptors which are ligand-gated ion channels that produce fast responses. Examples include glutamate and GABA receptors.
2) G protein-coupled receptors which signal through secondary messengers and produce slower responses. Examples include neuromodulators.
3) Intracellular receptors which act as transcription factors and influence gene expression.
The document also discusses signaling pathways downstream of receptors including protein kinases, transcription factors, and long-term changes in neuronal function mediated by phosphorylation of proteins like CREB.
Este documento presenta información sobre Revivir Ultra Lotion SFP 30, una crema humectante con protección solar SPF 30 fabricada por Gina Milena Díaz Serrano y Ana Carolina Gómez Restrepo. Describe los ingredientes y beneficios del producto, como su capacidad para humectar la piel y protegerla de los rayos UV. También explica cómo aplicar correctamente el producto en el rostro después del baño o antes de dormir sobre la piel limpia.
La Unión Europea ha acordado un embargo petrolero contra Rusia en respuesta a la invasión de Ucrania. El embargo prohibirá las importaciones marítimas de petróleo ruso a la UE y pondrá fin a las entregas a través de oleoductos dentro de seis meses. Esta medida forma parte de un sexto paquete de sanciones de la UE destinadas a aumentar la presión económica sobre Moscú y privar al Kremlin de fondos para financiar su guerra.
Este documento presenta una introducción al uso del marketing digital como parte de un plan de marketing general. Proporciona antecedentes sobre el autor Moisés Nathán Cielak, incluyendo su educación formal en sistemas de computación, economía y administración, así como certificaciones en redes sociales. También describe su experiencia profesional relevante como consultor de estrategia de marketing digital, director de campaña digital para Barack Obama y posiciones anteriores en Hewlett-Packard y Editorial Televisa.
This document discusses giftedness, including positive and negative characteristics of gifted individuals. It notes that gifted people have superior intelligence, ranging from 120-150 IQ or higher. Positively, they are curious, enjoy learning, and excel in various areas. However, they may also be inattentive, critical, or disagreeable. The document outlines types of gifted learners and recommends enrichment programs, challenging curriculum, counseling and mentoring to support their needs. Finally, it emphasizes that teachers of gifted students should be flexible, helpful, knowledgeable and inspiring mentors.
Este documento describe una actividad para enseñar conceptos de medición y longitud a estudiantes. La actividad involucra comparar el tamaño de varios objetos como listones de diferentes longitudes y cajas de diferentes anchos para que los estudiantes aprendan a identificar qué objetos son más largos, cortos, altos o anchos. Los estudiantes también medirán el largo, ancho y altura de objetos para reforzar su comprensión de las medidas de longitud.
Este documento contiene una colección de citas y frases sobre diversos temas como el amor, la amistad, la alegría, la verdad, la educación y la justicia. Las citas ofrecen perspectivas y reflexiones breves sobre estos asuntos desde diferentes autores y tradiciones.
Este documento resume el proceso de ensamblado y reconocimiento de los componentes de una computadora. Detalla cada parte requerida y los pasos a seguir, como instalar primero la motherboard, luego la fuente de poder y las unidades de almacenamiento, y por último el procesador y la memoria RAM. Explica que es importante tomar precauciones para evitar daños, como usar una pulsera antiestática. El estudiante siguió este proceso de forma ordenada durante la práctica de laboratorio para ensamblar con éxito la computadora.
The document discusses the security features of Zyncro, a Software as a Service (SaaS) platform. It describes how Zyncro employs strict security concepts like encryption and authentication to protect data during storage and transfer. Zyncro can be hosted publicly on Amazon Web Services, privately within an isolated AWS environment, or on-premise. The platform uses AES-256 encryption for file storage and SSL encryption for data traffic to ensure confidentiality and integrity.
The document discusses various topics related to neuroscience and the brain. It includes questions about different types of brain imaging techniques, CNS structures and their locations, brain development, and cell types in the brain. It also covers topics like functional MRI, spinal anesthesia, brain injuries, and the differences between the central and peripheral nervous system responses to injury.
Este documento presenta un plan de una actividad para estudiantes de 2o grado sobre la medición de longitudes utilizando unidades como el centímetro y el metro. La actividad tiene como objetivo que los estudiantes reconozcan y comparen diferentes longitudes mediante mediciones directas. Los estudiantes serán divididos en grupos para medir objetos de la sala como puertas y ventanas usando cintas métricas, y comparar las longitudes para estimar cuál es la más grande. Al final, se analizarán las respuestas obtenidas de todos los estudiantes.
Este documento presenta la información de un curso de Patología I de la Facultad de Ciencias Médicas de la Universidad Regional Autónoma de los Andes. El curso es obligatorio, tiene 6 créditos y se imparte durante el cuarto semestre. Cubre los aspectos clínicos que caracterizan las enfermedades humanas y cómo alteran el funcionamiento del cuerpo, preparando a los estudiantes de medicina para comprender el comportamiento humano y la patología de pacientes específicos.
Este documento presenta la información de un curso de Patología I de la Facultad de Ciencias Médicas de la Universidad Regional Autónoma de los Andes. El curso es obligatorio, tiene 6 créditos y se imparte durante el cuarto semestre. El objetivo general del curso es fundamentar los aspectos clínicos que caracterizan las diferentes enfermedades que afectan al ser humano y alteran su funcionamiento normal, exponiendo las generalidades de la patología para correlacionarla con las enfermedades.
International Journal of Computational Engineering Research(IJCER) ijceronline
nternational Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
This document provides an overview of system-on-chip (SoC) design. It begins by discussing the motivation for SoC design in terms of Moore's law and the benefits of integrating different components onto a single chip. It then compares system-on-board, system-on-chip, and system-in-package approaches. The document reviews SoC architecture components like processors, memory, and peripherals. It also covers SoC design challenges, benefits, and drawbacks. Key topics include constant voltage and constant field scaling, SoC integration, verification, and design for test.
This document summarizes a proposed method for comprehensively analyzing the reliability of electronic products by combining electronic design automation (EDA) software simulation with hardware testing. The method involves: 1) Using hardware testing to model circuit components in simulation software like Saber; 2) Analyzing circuit reliability through worst-case simulation analysis; 3) Validating simulations with hardware testing; and 4) Analyzing total circuit board signal integrity and electromagnetic interference using ANSYS software. The method is intended to more precisely model components, analyze component stress levels, and verify simulations to comprehensively evaluate electronic product reliability during design and testing stages.
Park’s Vector Approach to detect an inter turn stator fault in a doubly fed i...cscpconf
An electrical machine failure that is not identified in an initial stage may become catastrophic and it may suffer severe damage. Thus, undetected machine faults may cascade in it failure, which in turn may cause production shutdowns. Such shutdowns are costly in terms of lost production time, maintenance costs, and wasted raw materials. Doubly fed induction generators are used mainly for wind energy conversion in MW power plants. This paper presents a detection of an inter turn stator fault in a doubly fed induction machine whose stator and rotor are supplied by two pulse width modulation (PWM) inverters. The method used in this article to detect this fault, is based on Park’s Vector Approach , using a neural network s.
This document describes the design of a low transition, low power test pattern generator using a fault coverage circuit. It begins with background on the need for built-in self-test (BIST) techniques due to challenges with external testing. It then presents a new technique that generates three intermediate patterns between random patterns to reduce switching activity and power. The design is implemented using a linear feedback shift register (LFSR) modified with additional logic. Simulation results on a C17 benchmark circuit show the fault coverage achieved by the low power patterns.
This document discusses power system protection settings and provides information on calculating protection settings. It covers the functions of protective relays and equipment protection, the required information for setting calculations such as line parameters and fault studies, and the process of calculating, checking, and implementing protection settings. The goal is to set protections to operate dependably, securely, and selectively during faults while meeting clearance time requirements.
This document describes the design and implementation of a novel wide-area monitoring, protection, and control (WAMPAC) system for power networks with remote monitoring and control. The system aims to provide an effective and low-cost alternative to existing WAMPAC systems. Key features include protection schemes for distance, overcurrent, switched onto earth fault, undervoltage, overvoltage, and differential protection. The system allows for real-time monitoring and smart control of the power system from any location through an "anywhere, anytime access protocol" to help reduce outages and improve reliability. Testing of a prototype module was conducted at a 400/230/110 kV substation in Chennai, India.
Clock gating is an effective method of reducing the dynamic power consumption in synchronous circuits.
One of the ways to achieve this is by masking the clock that goes to the idle portion of the circuit. In This paper
we will present a comparative analysis of existing clock gating techniques on some synchronous digital design
like ALU (Arithmetic logical unit) etc. Also a new clock gating technique that provides more immunity to the
existing problem in available technique. In new proposed clock gating the Gated Clock Generation Circuit is using
tri state buffer and Gated logic is used which is created by the combination of double gated (AND, OR, AND
logic gate) with bubbled input respectively. This circuit saves power even when Target device's clock is ON. All
experiments are done on Xilinx14.1 EDA tool. Mentor Graphics Model SIM. For power calculation we are using
XPOWER. Sparten-3 (90nm) FPGA platform is used for result and analysis. The proposed design will reduce the
hardware complexity with approximately 10-20%. Similar clock power complexity will reduce with 5-10%.
Keywords — Tri state buffer; VLSI; Xilinx; glitches; hazards;Sparten.
Radiation Hardening by Design is one of the hardware based solution to one of the most troublesome problem faced by digital circuits in the space.
RHBD provides varieties of techniques to make the circuit resilient towards such effects and ensures proper malfunctioning of the circuit.
This document summarizes an analysis of reducing arc flash hazards in an industrial power system through application of existing protection technologies. It describes calculating arc flash incident energy levels under various protection scenarios using methods from IEEE and NFPA standards. For an example 5kV switchgear system, the document calculates fault currents, arc currents, protection operate times, and resulting incident energy levels to determine required personal protective equipment. Faster protection clearing times through digital relays and communications are shown to significantly reduce incident energy and improve safety.
Circuit breakers (CBs) are very important elements in the power system. They are used to switch other equipment in and out of service. Circuit breakers need to be reliable since their incorrect operation can cause major issues with power system protection and control. Today’s practice in monitoring circuit breaker operation and status in real time is reduced to the use of Remote Terminal Units (RTUs) of Supervisory Control and Data Acquisition (SCADA) system to assess CB status. More detailed information about the control circuit performance may be obtained by CB test equipment typically used for maintenance diagnostics. This paper addresses two important issues: a) how improved CB monitoring may be implemented in real-time, and b) what would be the benefits of such an implementation. The results reported in this paper are coming from two research projects, conducted using funding from Center Point Energy and DOE-CERTS aimed at development of software for automated analysis of CB data and the other covering development of the CB data acquisition unit respectively. The paper is devoted to description of a prototype implementation of a real-time CB monitoring system. The system consists of a new CB monitoring data acquisition IED that is located at circuit breaker and captures detailed information about its operation in real-time. The CB files are transferred to the concentrator PC where the application software performs automated analysis and makes an assessment about the operational status of the breaker. The software is based on signal processing and expert system processing. Application example using actual field data is discussed the paper ends with some conclusions, acknowledgments and a list of references.
This document summarizes a research paper that proposes a novel low-cost WAMPAC system for power network monitoring and control. The system uses data sampling units to measure voltage, current, and frequency from distribution feeders. A data concentrator unit timestamps the measurements using a GPS module and stores them in a database. A master controller provides remote monitoring and control via wireless communication. Various protection schemes like distance, overcurrent, differential and synchronizing are implemented for feeder protection and coordinated between the feeder and master controllers. The proposed low-cost design aims to provide reliable monitoring and protection at an affordable price for all power sectors.
Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...IRJET Journal
The document summarizes research on Embedded Deterministic Test (EDT) logic insertion's impact on VLSI designs. Key findings include:
1) EDT insertion enhances test and fault coverage, but also increases the number of test patterns required.
2) There are significant shifts in fault sub-classes like untestable faults and tied cells after EDT insertion, highlighting its nuanced effects.
3) Results provide empirical evidence for designers to optimize testability by strategically integrating EDT logic.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
Call for paper 2012, hard copy of Certificate, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJCER, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, research and review articles, IJCER Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathematics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer review journal, indexed journal, research and review articles, engineering journal, www.ijceronline.com, research journals,
yahoo journals, bing journals, International Journal of Computational Engineering Research, Google journals, hard copy of Certificate,
journal of engineering, online Submission
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
1) The document proposes techniques for reducing power consumption in VLSI circuits, including minimizing bus transitions using coding schemes, resistive feedback paths to eliminate glitches, and voltage scaling.
2) A resistive feedback method is developed to eliminate glitches in CMOS circuits which reduces power consumption and improves performance.
3) Simulation results show that the proposed resistive feedback technique is effective at minimizing glitches and reducing unnecessary power dissipation compared to a design without feedback paths.
Many internet of things (IoT) devices and integrated circuit (IC) cards have been compromised by side-channel attacks. Power-analysis attacks, which identify the secret key of a cryptographic circuit by analyzing the power traces, are among the most dangerous side-channel attacks. Generally, there is a trade-off between execution time and circuit area. However, the correlation between security and performance has yet to be determined. In this study, we investigate the cor-relation between side-channel attack resistance and performance
(execution time and circuit area) of advanced encryption
standard (AES) circuits. Eleven AES circuits with different performances are designed by high-level synthesis and logic synthesis. Of the eleven AES circuits, six are circuits with no side-channel attack
countermeasures and five are circuits with masking countermeasures. We employ four metrics based on a T-test to evaluate the side-channel attack resistance. The results based on the correlation coefficient show the correlation between side-channel attack resistance and performance. The correlation varies according to four metrics or masking countermeasure. We argue that designers should change their
attitudes towards circuit design when considering security.
2012 Protection strategy for EOS (IEC 61000-4-5)Sofics
2012 Taiwan ESD and reliability conference
The standard IEC 61000-4-5 is used to characterize IC designs for EOS robustness. Each chip should achieve a minimum level of protection to withstand against EOS. Based on Long TLP and simulation, a strategy is developed to handle this requirement. The methodology has been applied for a T-con product in 130nm CMOS.
Since many internet of things (IoT) devices are threatened by side-channel
attacks, security measures are essential for their safe use. However, there are
a variety of IoT devices, so the accuracy required depends on the system’s
application. In addition, security related to arithmetic operations has been
attracting attention in recent years. Therefore, this paper presents an
empirical experiment of masking for adders on field programmable gate
arrays (FPGAs) and explores the trade-off between cost and security by
varying the bit length of the mask. The experimental results show that
masking improves power analysis attack resistance, and increasing the bit
length of the random numbers used for masking increases security. In
particular, the series-connected masked adder is found to be effective in
improving power analysis attack resistance.
The document summarizes an experiment that aimed to inject faults into a Raspberry Pi 3 computer using electromagnetic and magnetic fault injection. Two main types of fault injection were tested: exposing the Raspberry Pi to magnetic fields generated by an electromagnet and permanent magnet, and electromagnetic radiation from a wireless router and microwave. None of the experimental setups resulted in any bit flips being detected in the Raspberry Pi's SRAM. The document concludes that a stronger magnetic field or electromagnetic radiation source would likely be needed to successfully inject faults into the Raspberry Pi.
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
Iván Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
This presentation was provided by Rebecca Benner, Ph.D., of the American Society of Anesthesiologists, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
This presentation was provided by Racquel Jemison, Ph.D., Christina MacLaughlin, Ph.D., and Paulomi Majumder. Ph.D., all of the American Chemical Society, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...EduSkills OECD
Andreas Schleicher, Director of Education and Skills at the OECD presents at the launch of PISA 2022 Volume III - Creative Minds, Creative Schools on 18 June 2024.
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
2. Vdd
Vugb
Vugb : Bias voltage for UGA
UGA
Sample and hold
Vout
Vdda
Vssa
(a)
Vss
Vsfb
Vpsub
Source
follower
Vsfb : Bias voltage for SF
Sample and hold
Vugb
Vout
Vdda
Vssa
(b)
Fig. 1. Basic structure of a OCM system with front-end probing for (a) Vdd,
(b) Vss and Vpsub
age points changes from one design to another, which prevents
from standardizing the measurement setup.
III. ON-CHIP POWER NOISE MEASUREMENT
The basic idea of an OCM system is depicted in Fig. 1. An
embedded sampler of Fig. 1 enables on-chip waveform moni-
toring and works for the testing of hardware security. The cir-
cuit senses and samples the analog voltage of interest at the tim-
ing of sampling, and then buffers the sampled DC voltage to an
output pin. The usage of high-voltage (3.3V ) I/O MOS transis-
tors allows low-resistivity as well as low-leakage properties of
sampling switch and capacitor. While the power supply voltage
(Vdd) of cryptographic modules at 1.8V is directly sampled and
buffered by a unity-gain amplifier (UGA Fig. 1(a)), the ground
voltage (Vss) or substrate voltage (Vsub) at 0.0V is level-shifted
by a p-type source follower to match the input voltage range of
a sampling head (Fig. 1(b)).
This OCM is designed with a vision of integration into the
testing flow. The proposed OCM realizes the best use of the
digitization functionality of Automatic Test Equipment (ATE)
while minimizes the cost of integration. The functions of high
precision sample-timing generation and wide-voltage analog-
to-digital conversion, that highly consumes power supply cur-
rent and silicon areas as well, are covered by the ATE. Power
noise waveforms sensitively respond to the variation of inter-
nal logic activities reflecting private information, or potentially
including trojan (or malicious) logic operation. The changes
in wave shapes can be quite small. However, they are finely
captured by the embedded sampler and precisely digitized by
the off-chip ATE with high measurement stability and repro-
ducibility. This is of prime importance in the testing of ICs for
hardware security and trust.
AES
A
OCM
AES
B
600um
600 um
2400 um
2400um
Capacitor
Switch
58 um
113um
UGA
Fig. 2. Internal structure of the test chip
A. Prototype Test System
For practical validation, we designed a test chip, using
0.18um CMOS technology, with the embedded sampler and
cryptographic modules as shown in Fig. 2. We chose Advanced
Encryption Standard (AES) for the demonstration of on-chip
power noise evaluation. The AES core is a very basic hardware
implementation which computes one round per clock cycle and
the sbox is computed in glue logic using composite field. There
are no physical countermeasures present in the AES to permit
fair evaluations. The sampler has input channels to probe the
Vdd node of AES modules at two different locations in a die,
sharing a single power delivery network. The channel is se-
lectively activated for monitoring. The power domain of the
sampler at 3.3V is separated from the domain of cryptographic
modules at 1.8V . This isolates power and ground nodes of
samplers from those of the target of interest, for stabilizing the
measurements by eliminating the undesired power noise cou-
pling.
The prototype test system is built as in Fig. 3. The sample
timing given to the sampler is generated by an on-board de-
lay line device (DL) with a synchronous and controlled delay
to the system clock (CLK) of AES cores. The buffered out-
put DC voltage from the sampler converted into a digital code
by an on-board analog-to-digital converter (ADC). A field pro-
grammable gate array (FPGA) device is programmed to con-
trol the DL and ADC devices for waveform capturing and also
to transfer the digital codes to an external personal computer
(PC) for further data processing. The FPGA also handles the
data to/from the AES cores.
IV. OCM AND HARDWARE SECURITY
In this section, we analyze the measurements performed by
OCM from a hardware security view point. The main objective
is to check the vulnerability of the tested block against SCA.
We compare the measurements from OCM with that of 1-ohm
resistor and EM probe. We first perform “Leakage Analysis”
i.e. the amount of exploitable information present in the mea-
surements when in time-domain. We precisely compute the
SNR of the measurement with respect to the input of the AES
8C-3
750
3. Vddd
AES
B
FPGA
ADC
Delay line
Vdda
Vssa
Vbias
16
10
trig
Delayed trigger
Vssd
Crypto chip
PC
Clock, plaintext, ciphertext
AES
A
(a)
Crypto chip
ADC
Delay line
FPGA board
(b)
Fig. 3. Block diagram of the prototype system
core. SNR is computed as:
SNR =
Var [E [T|X]]
E [Var [T|X]]
, (1)
where T denotes measured waveforms and X represent a cho-
sen part of the corresponding plaintext (in this case 1 out of
16 bytes). A high SNR [4] indicates a possible leakage which
may be exploited by an attacker. To attest the ease of attacka-
bility of the measurement, we use Correlation Power Analysis
(CPA [1]). CPA computes the Pearson Correlation Coefficient
ρ between the SC measurements T and the predicted leakages
L.
The second characteristic, called ”High-Frequency Analy-
sis”, also uses CPA but to see the impact of measurement setup
in the frequency domain. In this part, we show the range of fre-
quencies where the captured measurement leaks information.
The main motivation behind this analysis is to check if OCM
based measurement captures high-frequency leakage, which is
otherwise hard to capture.
A. Leakage Analysis
We acquired 50, 000 traces for an AES module running at
clock frequency of 24 MHz. The mesurements were taken from
the OCM, 1-ohm measurement (low-side) and two EM mea-
surements from different locations. For each measurement set,
we computed the SNR as defined in Eq. (1). Fig. 4(a) shows the
maximum SNR for the 16 input bytes for the four sets of mea-
(a)
(b)
Fig. 4. Comparison of (a) maximum SNR obtained, (b) guessing entropy
from different measurements
surements. We can clearly see that for all 16 bytes the OCM
provides a higher SNR than other methods.
Next we mount an attack on first byte of the secret key as-
sociated with the AES. We compute the average rank of the
correct key or its guessing entropy, on the output of 5 attacks
for each measurement set. In this case, the faster the rank con-
verges to 1, the higher is the attackability, which also means
that the measurements carry more information. For the same
AES core, we attacked measurements from different sources
and plotted the average rank of the correct key in Fig. 4(b).
It can be observed that OCM-based traces are easier to attack
as they reveal the key in about 1200 measurements only. 1-
ohm, and EM 1 need around 2000 measurements while EM 2
need 3100 measurements. Thus, from the three experiments
we can conclude that OCM provides the best SNR or captures
maximum information out of all the measurement techniques.
Therefore it can be considered as the best-case measurement
which can be obtained.
B. High-Frequency Analysis
Another interesting parameter for SCA is the range of fre-
quencies where leakage is present. In general, depending on the
measurement setup some information is not captured or lost.
For instance, in the 1-ohm method, the 1-ohm resistance along
with the circuit capacitance acts as a low-pass filter, which fil-
ters out high-frequency component of leakage. Fig. 5 shows the
result of CPA on a key byte of AES using the FFT of previously
captured measurements. Unlike 1-ohm based measurements,
OCM show good leakage at lower and higher frequencies. At
8C-3
751
4. (a) (b)
Fig. 5. CPA in frequency domain on (a) 1-Ohm measurements, (b) OCM
higher frequencies, 1-ohm method might be noisy which moti-
vates the need of OCM in high-performance chips. Moreover
we can observe some leakage around 300 MHz, 620 MHz, 800
Mhz and 1 GHz i.e. the leakage from all the frequencies is cap-
tured. Thus OCM can also be promoted for SC measurements
from high-performance chips which operate at multiple GHz
of clock. Please note that the leakage frequencies will depend
on the device, but OCM is capable of capturing it across range
of frequencies.
V. STANDARD SC MEASUREMENT SETUP USING OCM
In Sec. III, we argued that OCM has the potential applica-
tion for SC measurement. The environment noise does not
affect the measurements as the signal is measured on chip.
On the other hand, the process variation stays constant for a
given technology which can be pre-charaterized by the vendor.
Therefore measurements using OCM are the best-case mea-
surements. Moreover, we demonstrated that OCM provides the
best SNR as well as frequency components of the leakage in
Sec. IV. With these features in mind, we can propose OCM as
a candidate for standard SC measurement setup. OCM can be
configured to measure various entities on chip. The most com-
mon target for OCM is the Vdd pin of the concerned IP. This
method gives a good signal but cannot be standardized as the
quality of signal will depend on the respective placement and
routing of OCM and the target IP. The second method is mea-
surement of substrate noise. It has been shown in [3] that by
measuring the substrate noise one can easily monitor the activ-
ity of the target chip. Moreover, the substrate noise stays uni-
form almost all over the chip except for the areas very approx-
imate to an operating circuits where the noise strengths are in
steep attenuation with the distance. The substrate noise can be
measured anywhere as the total of contributions by all circuits
on a die. Therefore there is no specific restriction on respec-
tive placement and routing of OCM and the target IP. Thus an
OCM measuring side-channel activity through substrate noise
is an ideal candidate for standardized SC measurement setup.
A common and tedious task in evaluation labs is the search
of best leakage point on or around the IC. This is not only a
time-taking task but prevents labs from automating their eval-
uation tools. With the OCM integrated in security-critical ICs,
evaluation labs will have a common interface and setup for SC
leakage. Once the SC measurement is autoamted, the analysis
part which involves statistical computations is not hard to au-
tomate. The proposed OCM is simple to design and its size is
rather small i.e. 6400m2
, which limits the area overhead of the
integration of OCM. Further research in directions to reduce
the size of OCM will continue to motivate the integration of
OCM in security-critical ICs.
Note: A common argument against integration of OCM in
security-critical ICs is its exploitation by attackers. Indeed, if
the attacker has access to OCM, it can be exploited for attacks.
To solve this problem, we propose integration of OCM with
a kill-switch. The kill-switch allows the designer to deacti-
vate the OCM premanently at will. It will firstly disconnect the
OCM completely from the measurement point and then deacti-
vate permenantly the S/H circuit to ensure no misuse of OCM
is performed. For instance, if the OCM is needed during the
testing and certification phase, the designer can deactivate the
OCM after testing/certification and before shipping to the mar-
ket. A detail review of the security policies for deactivated
OCM remains out of the scope of this paper.
A. Potential application of OCM for TRUST
OCM can also find potential application in trojan detection
on fabricated ICs using SC measurement. A common scenario
is when an untrusted manufacturer modifies the mask of the
chip before fabrication to add malicious activity [7]. Like any
SC-based trojan detection technique, OCM based trojan detec-
tion needs a golden model. The appropriate way to obtain a
golden model is still an open question and applies to all trojan
detection techniques based on SC. However, the main draw-
back in SC-based trojan detection remains the presence of mea-
surement noise due to environmental factors. The main prob-
lem with the SC based trojan detection is the number of noise
sources in SC measurements. As the equipment for SC mea-
surements is not standardized, it is hard to distinguish activity
of trojans in SC from other noise sources. This noise can come
from various sources like measurement equipment, measure-
ment environment, placement of EM probe, process variation
(for newer technologies) etc. Therefore it is hard to blame any
unusual activity on trojans only, which introduces the notion
of false positives and negatives. Using a standard SC measure-
ment setup based on OCM, one can solve this problem.
Our designed prototype did not had any trojan inserted,
which prevents us from providing practical results. Neverthe-
less our methodology can find useful application in testing for
TRUST. Future extention of this work can look into practical
application of OCM into trojan detection.
VI. METHODOLOGY FOR TESTING OF HARDWARE
SECURITY AND TRUST USING ATE
A. Test Environment
The OCM can be configured for the testing of IC chips for
hardware security and trust, as depicted in Fig. 6. The sam-
pler with multiple input channels is integrated into automated
test environment (ATE) with mixed signal extensions, where
an entire body of IC functionality including cryptography is to
be fully tested. An IC chip (device) under test (DUT) passes
a Go/NoGo or a PASS/FAIL gauge as long as the output data
stream by the DUT in response to an input test vector matches
8C-3
752
5. Vddd
Crypto
Digitizer
Digital resource
Vdda
Vssa
Vssd
DUT Bias gen.
Sample
Selection
switches
ATE
SF
Probe
card
Vcal AWG
Digital resource
(signal, timing)SoC Selection
logic
Signals for test
Sample
timing
Vpsub
SF
Logic
signals
Vddd
Vssd
Test vector Cryptographic operation
System clock
OCM window
OCM sample time
Fig. 6. Block diagram of OCM integrated with ATE
the pre-registered data as the value of expectation. A crypto-
graphic module is inspected with the identical set of input test
vectors for a large number of IC chips in the ATE, as a part of
manufacturing. A well selected set of test vectors thoroughly
cover a wide range of operation scenarios of an IC chip and to
potentially activate suspicious trojan hardware. The choice of
set vectors totally depends on the target. This mostly covers
the trojans inserted by an untrusted chip manufacturer in some
of the wafers by changing the lithographic mask.
The test vector also configures the OCM function, where the
single channel of interest is selectively connected to the sam-
pler. A waveform acquisition window is placed in the test vec-
tor to capture time-domain voltage variation during the opera-
tion of a cryptographic module. The sampler strobes the volt-
age of the selected channel at the sample timing issued by the
ATE, and outputs the voltage to the digitizer for subsequent
analog-to-digital conversion. The sample timing includes a
stepped delay relative to the system clock, and the delay is also
controlled by the ATE. The entire test vector is iterated while
the delay is stepped with a fixed amount of time. The itera-
tion continues until the delay covers the whole of a waveform
acquisition window.
The acquisition of waveforms is performed in parallel to the
inspection of full functionalities of an IC chip. The waveforms
associated with a given set of test vectors are then further pro-
cessed to evaluate the level of side-channel leakage and the de-
viation of waveforms from the reference.
B. Test Flow
The flow of an IC testing incorporates on-chip waveform
capturing for power noise evaluation, as given in Fig. 7. The
sampler is first calibrated in its voltage gain when a DUT be-
comes ready for testing in the ATE. n test vectors are then
loaded in the ATE for inspecting full functionality of the DUT.
The waveform acquisition window of j samples is also spec-
ified for the ith
test vector and registered in the control pro-
gram of the ATE. j and i are chosen as a good time-accuracy
DUT access
Sampler calibration
Evaluation of functions
Evaluation of waveforms
DUT Go/NoGo
i
Waveform(
Function test(
Sampling(j)
1
j
j=j+1
DUT access
Sampler calibration
i=1
Evaluation of functions
Evaluation of waveforms
NoGo judgement
i<=n
i=i+1
Waveform(i)
N
Y
Function test(i)
Sampling(j)
k
j=1
j<=k
j=j+1
Y
N
1.Calibration
2.Measurements
3.Detection
Fig. 7. Test Flow
trade-off. The Go/NoGo is then judged after the collection of
response by the DUT including the waveform by the OCM.
The calibration of the sampler is performed by capturing a
known sinusoidal waveform from an arbitrary waveform gen-
erator (AWG) of the ATE, while all the functions of an IC
chip except for the sampling are halted. The amplitude and
distortion of the sinusoid captured as such, the highest signal-
to-noise ratio environment of a DUT are processed for two pur-
poses. First, the ratio of amplitudes for the current DUT with
the reference data is derived as a calibration coefficient. Sec-
ond, the amplitude and distortion of the DUT are examined in
the statistical distribution among the past DUTs including the
golden samples. When they are in the position of outliers, the
DUT is considered under suspicious attacks of the counterfeit,
modification, or rebirth, to the OCM function.
The reference waveforms are statistically provided as an
integrated database of captured waveforms among the past
DUTs, regarding:
• sinusoids for calibration
• power noise for evaluation.
While the past DUTs should be genuine and treated as golden
devices in the initial place, the data base is updated with as
long as no false results in the testing is found. The average
and variance of the waveforms are recorded in the database in
association with each test vector and restored as the reference
data for comparison in every testing.
The process and device parameter variations primarily im-
pacts on the static offset or DC variations of power supply cur-
rent as well as voltage. On the other hand, the dynamic or AC
components of power noise are highly sensitive to the change
in in internal logic activities rather than the parameter varia-
tions. The sinusoidal calibration of OCM thus suppresses the
8C-3
753
6. UGA
Probe card(OCM part only shown)
Vdd
Crypto
Probe pads(Internal to IC chip)
Sampler with multiple
input channels
Selection Logic
Vdd
Vss
Vpsub
Vpsub monitor
Silicon substrate noise
Fig. 8. Layout image of OCM with ATE
uncertainty of dynamic power noise measurements and ensures
the waveform based evaluation in the testing of security.
C. Test Cost
The cost of incorporating OCM function needs to be min-
imized in the test strategy of an IC chip, although it is the
only way providing the best SNR for hardware security and
trust. The silicon area of the sampler is roughly estimated to
be 6400um2
from the prototype layout of Fig. 2 with the ex-
tension of multiple input channels. This size is as negligibly
small as a single metal access pad due to the simplified con-
struction of the sampler. However, the cost inflates when an
IC chip actually integrates the sampler for embodying OCM
functionality.
We propose two essential techniques of Fig. 8 to minimize
the cost of incorporation. Firstly instead of metal access pads,
a probe card (see Fig. 8) can be used for accessing the sam-
pler and associated registers for configuration through internal
pads. This eliminates the consumption of I/O pins of an IC
chip, while limiting the usage of the sampler to testing pur-
poses. Second, the probing points are restricted to substrate
taps near the sampler and also to power I/O pads often in the
periphery of an IC chip. It is known that the substrate noise
waveforms carry secret information at the almost equivalent
level of leakage to power noise ones [3]. This eliminates the
need of probe wiring into the internal nodes of cryptographic
modules, and more importantly, decouples the incorporation
of OCM functionality from system-on-chip integration includ-
ing cryptography. Both techniques also alleviate the design of
chips.
Another metric is the run-time cost of OCM functionality.
The DUT iterates its operation with a test vector, while the
sampler captures a single waveform by successive sampling
with stepped delays covering a waveform acquisition window.
When we choose the time step of 0.1ns, a hundred iterations
take place for a waveform acquisition of a single clock cycle of
10ns in the operation at 100 MHz. This cost of time consump-
tion is essential to the waveform acquisition, while making 10-
GHz range high-speed analog-to-digital conversion unused.
VII. CONCLUSIONS
In this paper, we make an attempt to bring IC testing and
hardware security on the same page. First, we motivate the use
of on-chip power noise measurement or OCM module in side-
channel measurement. As shown by our experiments, OCM
provides side-channel measurements with best possible SNR
and leakage at high-frequencies. Then we propose a standard
side-channel measurement setup owing to the the possibility of
measurement at substrate-level. Next we integrate the evalua-
tion of hardware security and trust with the standard test flow,
using ATE, all thanks to OCM measurement at substrate. Ex-
tention to practical trojan detection and analysis of impact of
process variation will be covered in further research.
This paper makes an initial attempt to include hardware se-
curity and trust into performance parameters for testing. Fur-
ther attention from the test community can really help evolve
this domain.
REFERENCES
[1] ´Eric Brier, Christophe Clavier, and Francis Olivier. Correlation Power Analysis with
a Leakage Model. In CHES, volume 3156 of LNCS, pages 16–29. Springer, August
11–13 2004. Cambridge, MA, USA.
[2] Suresh Chari, Josyula R. Rao, and Pankaj Rohatgi. Template Attacks. In CHES,
volume 2523 of LNCS, pages 13–28. Springer, August 2002. San Francisco Bay
(Redwood City), USA.
[3] Daisuke Fujimoto, Daichi Tanaka, Noriyuki Miura, Makoto Nagata, Yu-Ichi Hayashi,
Naofumi Homma, Shivam Bhasin, and Jean-Luc Danger. Side-Channel Leakage on
Silicon Substrate of CMOS Cryptographic Chip. In HOST, IEEE Computer Society,
May 2014. Arlington, USA.
[4] Suvadeep Hajra and Debdeep Mukhopadhyay. Snr to success rate: Reaching the limit
of non-profiling dpa. Cryptology ePrint Archive, Report 2013/865, 2013. http:
//eprint.iacr.org/.
[5] Paul C. Kocher, Joshua Jaffe, and Benjamin Jun. Differential Power Analysis. In
Proceedings of CRYPTO’99, volume 1666 of LNCS, pages 388–397. Springer-Verlag,
1999.
[6] Laurent Sauvage, Olivier Meynard, Sylvain Guilley, and Jean-Luc Danger. Electro-
Magnetic Attacks Case Studies on Non-Protected and Protected Cryptographic Hard-
ware Accelerators. In IEEE EMC, Special session #4 on Modeling/Simulation Val-
idation and use of FSV, July 25-30 2010. Fort Lauderdale, Florida, USA (http:
//emc2010.org/).
[7] U.S. Department Of Defense. Defense science board task force on high per-
formance microchip supply. http://www.acq.osd.mil/dsb/reports/
2005-02-HPMS_Report_Final.pdf.
8C-3
754