178 research outputs found
The optimal sequence compression
This paper presents the optimal compression for sequences with
undefined values.
Let we have undefined and defined positions in the
boolean sequence of length . The sequence code length
can\u27t be less then in general case, otherwise at least two
sequences will have the same code.
We present the coding algorithm which generates codes of almost
length, i.e. almost equal to the lower bound.
The paper presents the decoding circuit too. The circuit has low
complexity which depends from the inverse density of defined values
.
The decoding circuit includes RAM and random logic. It performs
sequential decoding. The total RAM size is proportional to the
the number of random logic cells is proportional to
So the decoding circuit will be small enough even for the very low
density sequences. The decoder complexity doesn\u27t depend of the
sequence length at all
Exploring the potential of grass feedstock from marginal land in Ireland: Does marginal mean lower yield?
peer-reviewedThe production of biomass feedstock from marginal land has attracted much attention as a means of avoiding conflict between the production of food and fuel. Yield potentials from marginal lands have generally not been quantified although it is generally assumed that lower biomass yields can be expected from marginal lands. A three year study was conducted in Ireland in order to determine if grass yields of perennial rhizomatous grasses (cocksfoot, tall fescue, reed canary grass, festulolium) for anaerobic digestion from three marginal land sites (very wet site, very dry site, site prone to flooding) could match yields from better soils. Randomised complete block designs were established on each site in 2012 with two varieties of each grass species as treatments. Three grass harvests were taken from each site in 2013 and in 2014. There was no significant difference between yields from the control site and those from the very dry site and the site prone to flooding. Biomass yields from the very wet site were 85% of those from the control site. Highest yields were obtained from festulolium which were significantly higher than yields from perennial ryegrass. An energy analysis showed that maximising the production of grass from low lying mineral marginal grassland in Ireland could provide enough energy to meet the energy requirements of both the private car fleet and the heavy goods vehicle fleet while avoiding conflict with food production which could be concentrated on conventional land
Design of Low Power TPG for BIST Using Reconfigurable Johnson Counter
Worked in Self-Test assumes an essential job in testing of VLSI circuits. Test designs created utilizing design generator is utilized to test the Circuit under Test. Regular technique for test design age includes in Reconfigurable Johnson Counter and LFSR which needs in relationship between's progressive test vectors. A Modern Low Power test design is created utilizing Reconfigurable Johnson Counter and Accumulator. A Low Power utilization gadget is basic for battery worked gadgets. The system for delivering the test vectors for BIST is coded utilizing VHDL and reproductions were performed with ModelSim 10.0b
A Guideline on Pseudorandom Number Generation (PRNG) in the IoT
Random numbers are an essential input to many functions on the Internet of
Things (IoT). Common use cases of randomness range from low-level packet
transmission to advanced algorithms of artificial intelligence as well as
security and trust, which heavily rely on unpredictable random sources. In the
constrained IoT, though, unpredictable random sources are a challenging desire
due to limited resources, deterministic real-time operations, and frequent lack
of a user interface.
In this paper, we revisit the generation of randomness from the perspective
of an IoT operating system (OS) that needs to support general purpose or
crypto-secure random numbers. We analyse the potential attack surface, derive
common requirements, and discuss the potentials and shortcomings of current IoT
OSs. A systematic evaluation of current IoT hardware components and popular
software generators based on well-established test suits and on experiments for
measuring performance give rise to a set of clear recommendations on how to
build such a random subsystem and which generators to use.Comment: 43 pages, 11 figures, 11 table
Recommended from our members
Test and security in a System-on-Chip environment
This dissertation outlines new approaches for test and security in a System-on-Chip (SoC) environment. A methodology is proposed for designing a single test access mechanism (TAM) architecture on each die with a "bandwidth adapter" that allows it to be efficiently used for multiple different test data bandwidths in three-dimensional integrated circuits (3D-IC) using through-silicon vias (TSVs). In this way, a single test architecture can be re-used for pre-bond, partial stack, and post-bond testing while minimizing test time across all phases of test. Unlike previous approaches, this methodology does not need multiple TAM architectures or reconfigurable wrappers in order to be efficient when the test data bandwidth changes. In industry, sequential linear decompression is widely used to reduce data and bandwidth requirements. A new scheme using a multiple polynomial linear feedback shift register (LFSR) with rotating polynomial is proposed here to increase encoding flexibility resulting in higher compression ratios. An algorithm is described to assign test cubes to polynomials in a way that enhances encoding efficiency. For hardware security, a new attack strategy against logic obfuscation is described here. It is based on applying brute force iteratively to each logic cone one at a time and is shown to significantly reduce the number of brute force key combinations that need to be tried by an attacker. It is shown that inserting key gates based on MUXes is an effective approach to increase security against this type of attack. In data security for hardware, existing techniques for computing with encrypted operands are either prohibitively expense (e.g., fully homomorphic encryption) or only work for special cases (e.g., linear circuits). A lightweight scheme implemented at the gate-level is proposed for computing with noise-obfuscated data. By carefully selecting internal locations for noise cancellation in arbitrary logic circuits, the overhead can be greatly minimized. One important application of the proposed scheme is for protecting data inside a computing unit obtained from a third party IP provider where a hidden backdoor access mechanism or hardware Trojan could be maliciously inserted.Electrical and Computer Engineerin
- …