2,156 research outputs found

    LOT: Logic Optimization with Testability - new transformations for logic synthesis

    Get PDF
    A new approach to optimize multilevel logic circuits is introduced. Given a multilevel circuit, the synthesis method optimizes its area while simultaneously enhancing its random pattern testability. The method is based on structural transformations at the gate level. New transformations involving EX-OR gates as well as Reed–Muller expansions have been introduced in the synthesis of multilevel circuits. This method is augmented with transformations that specifically enhance random-pattern testability while reducing the area. Testability enhancement is an integral part of our synthesis methodology. Experimental results show that the proposed methodology not only can achieve lower area than other similar tools, but that it achieves better testability compared to available testability enhancement tools such as tstfx. Specifically for ISCAS-85 benchmark circuits, it was observed that EX-OR gate-based transformations successfully contributed toward generating smaller circuits compared to other state-of-the-art logic optimization tools

    Generative Dependency Language Modeling Using Recurrent Neural Networks

    Get PDF
    KĂ€esolev magistritöö esitleb meetodit sĂŒntaktilise infot kasutamiseks generatiivses keele modelleerimises, kus sĂ”ltuvusparseri loogikat laiendatakse, et jooksvalt parseri puhvrisse uusi sĂ”nu genereerida. Selleks kasutatakse sisendina vastaval hetkel pinu tipus olevaid sĂ”nu. PĂŒstitame hĂŒpoteesi, et antud lahendus annab eeliseid kaugete sĂ”ltuvuste modelleerimisel. Me implementeerime pakutud keelemudeli ja lĂ€htemudeli ning nĂ€eme, et vĂ€lja pakutud meetod annab mĂ€rkimisvÀÀrselt parema perplexity skoori tulemuse ja seda eriti lausete puhul, mis sisaldavad kaugeid sĂ”ltuvusi. Lisaks nĂ€itab keelemudelite abil loodud lausete analĂŒĂŒs, et vĂ€lja pakutud mudel suudab lĂ€htemudeliga vĂ”rreldes luua terviklikumaid lauseid.This thesis proposes an approach to incorporating syntactical data to the task of generative language modeling. We modify the logic of a transition-based dependency parser to generate new words to the buffer using the top items in the stack as input. We hypothesize that the approach provides benefits in modeling long-term dependencies. We implement our system along with a baseline language model and observe that our approach provides an improvement in perplexity scores and that this improvement is more significant in modeling sentences that contain longer dependencies. Additionally, the qualitative analysis of the generated sentences demonstrates that our model is able to generate more cohesive sentences

    David Link – Machine Heart

    Get PDF
    Published in German and English. Also published in The Book of Books, dOCUMENTA (13) catalogue, Ostfildern: Hatje Cantz 2011. pp. 269-273. German/English. ISBN 978-3-7757-2951-2In his work David Link generates (apparently) interactive projects, at the interface between art, science, and technology. For LoveLetters_1.0, Link reconstructed a functional replica of one of the earliest programmable computers, the Ferranti Mark I, and an equally early program, invented in 1952 by Christopher Strachey at the University of Manchester. To produce computer-generated love letters, written using a built-in random generator. Anonymously addressed to “Darling Love” or “Jewel Duck,” the letters talk to the reader in a surprisingly human and tender way. In his introduction, Geoff Cox highlights the question, already suggested by the apparently contradictory title of this notebook, Machine Heart, of whether the human capacity for thinking and feeling has been captured by machines

    Creation and detection of hardware trojans using non-invasive off-the-shelf technologies

    Get PDF
    As a result of the globalisation of the semiconductor design and fabrication processes, integrated circuits are becoming increasingly vulnerable to malicious attacks. The most concerning threats are hardware trojans. A hardware trojan is a malicious inclusion or alteration to the existing design of an integrated circuit, with the possible effects ranging from leakage of sensitive information to the complete destruction of the integrated circuit itself. While the majority of existing detection schemes focus on test-time, they all require expensive methodologies to detect hardware trojans. Off-the-shelf approaches have often been overlooked due to limited hardware resources and detection accuracy. With the advances in technologies and the democratisation of open-source hardware, however, these tools enable the detection of hardware trojans at reduced costs during or after production. In this manuscript, a hardware trojan is created and emulated on a consumer FPGA board. The experiments to detect the trojan in a dormant and active state are made using off-the-shelf technologies taking advantage of different techniques such as Power Analysis Reports, Side Channel Analysis and Thermal Measurements. Furthermore, multiple attempts to detect the trojan are demonstrated and benchmarked. Our simulations result in a state-of-the-art methodology to accurately detect the trojan in both dormant and active states using off-the-shelf hardware

    Design and Verification of a Dual Port RAM Using UVM Methodology

    Get PDF
    Data-intensive applications such as Deep Learning, Big Data, and Computer Vision have resulted in more demand for on-chip memory storage. Hence, state of the art Systems on Chips (SOCs) have a memory that occupies somewhere between 50% to 90 % of the die space. Extensive Research is being done in the field of memory technology to improve the efficiency of memory packaging. This effort has not always been successful because densely packed memory structures can experience defects during the fabrication process. Thus, it is critical to test the embedded memory modules once they are taped out. Along with testing, functional verification of a module makes sure that the design works the way it has been intended to perform. This paper proposes a built-in self-test (BIST) to validate a Dual Port Static RAM module and a complete layered test bench to verify the module’s operation functionally. The BIST has been designed using a finite state machine and has been targeted against most of the general SRAM faults in a given linear time constraint of O(23n). The layered test bench has been designed using Universal Verification Methodology (UVM), a standardized class library which has increased the re-usability and automation to the existing design verification language, SystemVerilog

    Comparing Decision Trees and Association Rules for Stock Market Expectations in BIST100 and BIST30

    Get PDF
    With the increased financial fragility, methods have been needed to predict financial data effectively. In this study, two leading data mining technologies, classification analysis and association rule mining, are implemented for modeling potentially successful and risky stocks on the BIST 30 index and BIST 100 Index based on the key variables of index name, index value, and stock price. Classification and Regression Tree (CART) is used for classification, and Apriori is applied for association analysis. The study data set covered monthly closing values during 2013-2019. The Apriori algorithm also obtained almost all of the classification rules generated with the CART algorithm. Validated by two promising data mining techniques, proposed rules guide decision-makers in their investment decisions. By providing early warning signals of risky stocks, these rules can be used to minimize risk levels and protect decision-makers from making risky decisions
    • 

    corecore