294 research outputs found

    An addition to the methods of test determination for fault detection in combinational circuits

    Get PDF
    We propose a procedure for determining fault detection tests for single and multiple fault in combinational circuits. The stuck-at-fault model is used. By the proposed procedure all test vectors for single and multiple stuck-at-fault in combinational circuit are determined. The path sensitization method is used in the test signal propagation while test signals are defined on a four element set. The procedure can also be applied to the fault detection in programmable logic devices. We consider two-level combinational circuits which are realized by the PAL architecture and we propose a procedure for determining a test set which detects all single stuck-at-faults. As a mathematical tool, the cube theory is used

    Acta Cybernetica : Volume 16. Number 4.

    Get PDF

    A Verified Information-Flow Architecture

    Get PDF
    SAFE is a clean-slate design for a highly secure computer system, with pervasive mechanisms for tracking and limiting information flows. At the lowest level, the SAFE hardware supports fine-grained programmable tags, with efficient and flexible propagation and combination of tags as instructions are executed. The operating system virtualizes these generic facilities to present an information-flow abstract machine that allows user programs to label sensitive data with rich confidentiality policies. We present a formal, machine-checked model of the key hardware and software mechanisms used to dynamically control information flow in SAFE and an end-to-end proof of noninterference for this model. We use a refinement proof methodology to propagate the noninterference property of the abstract machine down to the concrete machine level. We use an intermediate layer in the refinement chain that factors out the details of the information-flow control policy and devise a code generator for compiling such information-flow policies into low-level monitor code. Finally, we verify the correctness of this generator using a dedicated Hoare logic that abstracts from low-level machine instructions into a reusable set of verified structured code generators

    A survey of DA techniques for PLD and FPGA based systems

    Full text link
    Programmable logic devices (PLDs) are gaining in acceptance, of late, for designing systems of all complexities ranging from glue logic to special purpose parallel machines. Higher densities and integration levels are made possible by the new breed of complex PLDs and FPGAs. The added complexities of these devices make automatic computer aided tools indispensable for achieving good performance and a high usable gate-count. In this article, we attempt to present in an unified manner, the different tools and their underlying algorithms using an example of a vending machine controller as an illustrative example. Topics covered include logic synthesis for PLDs and FPGAs along with an in-depth survey of important technology mapping, partitioning and place and route algorithms for different FPGA architectures.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/31206/1/0000108.pd

    La influencia de la música en la construcción del sentido de realidad en los adolescentes

    Get PDF
    El presente documento resume teóricamente algunos aspectos claves de la influencia de la música y sus diferentes representaciones, en la construcción del sentido subjetivo de la realidad en los jóvenes, resaltando los métodos más interesantes en los que la música contribuye a la generación de contenidos audiovisuales con influencias directas en el aprendizaje, interactuando constantemente con los jóvenes en la actualidad, contenidos como; videojuegos, televisión; situaciones compartidas emocionales muy fuertes en las obras como películas, series, documentales y hasta publicidades. Estos y otra infinidad de contenidos de entretenimiento están generando experiencias significativas que pueden redefinir directa o indirectamente el sentido de realidad que el joven adolescente o en los primeros años de la adultez, se está configurando el sentido de realidad. La revisión de literatura fue el método utilizado para enfatizar la búsqueda de información teórica en este estudio, de esta forma trataremos de dar respuesta a unos objetivos de investigación que guíen la búsqueda de la información académica centrándose en aquellos artículos científicos como tesis de investigación, proyectos de investigaciones e intervención, artículos de revistas científicas, entrevistas documentadas en revista, dónde hayan podido realizar un análisis a esta influencia significativa de la música en la construcción del sentido subjetivo de realidad en los jóvenes de la actualidad.This document theoretically summarizes some key aspects of the influence of music and its different representations, in the construction of the subjective sense of reality in young people, highlighting the most interesting methods in which music contributes to the generation of audiovisual content with direct influences on learning, constantly interacting with young people today, contents such as; video games, television; very strong shared emotional situations in works such as films, series, documentaries and even advertisements. These and countless other entertainment contents are generating significant experiences that can directly or indirectly redefine the sense of reality that the young adolescent or in the first years of adulthood, is configuring the sense of reality. The literature review was the method used to emphasize the search for theoretical information in this study, in this way we will try to respond to some research objectives that guide the search for academic information focusing on those scientific articles such as research theses, projects of investigations and intervention, articles from scientific journals, interviews documented in a magazine, where they have been able to carry out an analysis of this significant influence of music in the construction of the subjective sense of reality in young people today

    Detection of hard faults in combinational logic circuits

    Get PDF
    ABSTRACT: Previous Work in identifying hard to test faults (HFs) -- The effect of reconvergent fanout and redundancy -- Testability measures (TMs)Using of ATPGs to detect HFs -- Previous use of cost in Testability analysis -- Review of automatic test pattern generation (ATPG) -- Fault modelling -- Single versus multiple path sensitization -- The four ATPG phases of deterministic gate level test generation -- Random test pattern generation and hybrid methods -- Review of the fan algorithm -- Backtrack reduction methods and the importance of heuristics -- Mixed graph -- binary decision diagram (GBDD) circuit model -- A review of graph techniques -- A review of binary decisions diagrams (BDDs) techniques -- gBDD -- graph binary decision diagrams -- Detection of hard faults using HUB -- Introduction to budgetary constraints -- The HUB algorithm -- Important HUB attributes -- Circuits characteristics of used for results -- Comparison of gBDD -- ATPG related results -- Fault simulation related results -- Hard fault detection

    Transparent and Precise Malware Analysis Using Virtualization: From Theory to Practice

    Get PDF
    Dynamic analysis is an important technique used in malware analysis and is complementary to static analysis. Thus far, virtualization has been widely adopted for building fine-grained dynamic analysis tools and this trend is expected to continue. Unlike User/Kernel space malware analysis platforms that essentially co-exist with malware, virtualization based platforms benefit from isolation and fine-grained instrumentation support. Isolation makes it more difficult for malware samples to disrupt analysis and fine-grained instrumentation provides analysts with low level details, such as those at the machine instruction level. This in turn supports the development of advanced analysis tools such as dynamic taint analysis and symbolic execution for automatic path exploration. The major disadvantage of virtualization based malware analysis is the loss of semantic information, also known as the semantic gap problem. To put it differently, since analysis takes place at the virtual machine monitor where only the raw system state (e.g., CPU and memory) is visible, higher level constructs such as processes and files must be reconstructed using the low level information. The collection of techniques used to bridge semantic gaps is known as Virtual Machine Introspection. Virtualization based analysis platforms can be further separated into emulation and hardware virtualization. Emulators have the advantages of flexibility of analysis tool development and efficiency for fine-grained analysis; however, emulators suffer from the transparency problem. That is, malware can employ methods to determine whether it is executing in an emulated environment versus real hardware and cease operations to disrupt analysis if the machine is emulated. In brief, emulation based dynamic analysis has advantages over User/Kernel space and hardware virtualization based techniques, but it suffers from semantic gap and transparency problems. These problems have been exacerbated by recent discoveries of anti-emulation malware that detects emulators and Android malware with two semantic gaps, Java and native. Also, it is foreseeable that malware authors will have a similar response to taint analysis. In other words, once taint analysis becomes widely used to understand how malware operates, the authors will create new malware that attacks the imprecisions in taint analysis implementations and induce false-positives and false-negatives in an effort to frustrate analysts. This dissertation addresses these problems by presenting concepts, methods and techniques that can be used to transparently and precisely analyze both desktop and mobile malware using virtualization. This is achieved in three parts. First, precise heterogeneous record and replay is presented as a means to help emulators benefit from the transparency characteristics of hardware virtualization. This technique is implemented in a tool called V2E that uses KVM for recording and TEMU for replaying and analysis. It was successfully used to analyze real-world anti-emulation malware that evaded analysis using TEMU alone. Second, the design of an emulation based Android malware analysis platform that uses virtual machine introspection to bridge both the Java and native level semantic gaps as well as seamlessly bind the two views together into a single view is presented. The core introspection and instrumentation techniques were implemented in a new analysis platform called DroidScope that is based on the Android emulator. It was successfully used to analyze two real-world Android malware samples that have cooperating Java and native level components. Taint analysis was also used to study their information ex-filtration behaviors. Third, formal methods for studying the sources of false-positives and false-negatives in dynamic taint analysis designs and for verifying the correctness of manually defined taint propagation rules are presented. These definitions and methods were successfully used to analyze and compare previously published taint analysis platforms in terms of false-positives and false-negatives

    Music, Neuroscience, and the Psychology of Well-Being: A Précis

    Get PDF
    In Flourish, the positive psychologist Seligman (2011) identifies five commonly recognized factors that are characteristic of human flourishing or well-being: (1) “positive emotion,” (2) “relationships,” (3) “engagement,” (4) “achievement,” and (5) “meaning” (p. 24). Although there is no settled set of necessary and sufficient conditions neatly circumscribing the bounds of human flourishing (Seligman, 2011), we would mostly likely consider a person that possessed high levels of these five factors as paradigmatic or prototypical of human flourishing. Accordingly, if we wanted to go about the practical task of actually increasing our level of well-being, we ought to do so by focusing on practically increasing the levels of the five factors that are characteristic of well-being. If, for instance, an activity such as musical engagement can be shown to positively influence each or all of these five factors, this would be compelling evidence that an activity such as musical engagement can positively contribute to one’s living a flourishing life. I am of the belief that psychological research can and should be used, not only to identify and diagnose maladaptive psychological states, but identify and promote adaptive psychological states as well. In this article I advance the hypothesis and provide supporting evidence for the claim that musical engagement can positively contribute to one’s living a flourishing life. Since there has not yet been a substantive and up-to-date investigation of the possible role of music in contributing to one’s living a flourishing life, the purpose of this article is to conduct this investigation, thereby bridging the gap and stimulating discussion between the psychology of music and the psychology of well-being

    Fault controlled fluid flow and quartz cementation in porous sandstones

    Get PDF
    EThOS - Electronic Theses Online ServiceGBUnited Kingdo
    corecore