30 research outputs found
Optimal Folding of Data Flow Graphs based on Finite Projective Geometry using Lattice Embedding
A number of computations exist, especially in area of error-control coding
and matrix computations, whose underlying data flow graphs are based on finite
projective-geometry(PG) based balanced bipartite graphs. Many of these
applications are actively being researched upon. Almost all these applications
need bipartite graphs of the order of tens of thousands in practice, whose
nodes represent parallel computations. To reduce its implementation cost,
reducing amount of system/hardware resources during design is an important
engineering objective. In this context, we present a scheme to reduce resource
utilization when performing computations derived from PG-based graphs. In a
fully parallel design based on PG concepts, the number of processing units is
equal to the number of vertices, each performing an atomic computation. To
reduce the number of processing units used for implementation, we present an
easy way of partitioning the vertex set. Each block of partition is then
assigned to a processing unit. A processing unit performs the computations
corresponding to the vertices in the block assigned to it in a sequential
fashion, thus creating the effect of folding the overall computation. These
blocks have certain symmetric properties that enable us to develop a
conflict-free schedule. The scheme achieves the best possible throughput, in
lack of any overhead of shuffling data across memories while scheduling another
computation on the same processing unit. This paper reports two folding
schemes, which are based on same lattice embedding approach, based on
partitioning. We first provide a scheme for a projective space of dimension
five, and the corresponding schedules. Both the folding schemes that we present
have been verified by both simulation and hardware prototyping for different
applications. We later generalize this scheme to arbitrary projective spaces.Comment: 31 pages, to be submitted to some discrete mathematics journa
Hardware Security Primitives using Passive RRAM Crossbar Array: Novel TRNG and PUF Designs
With rapid advancements in electronic gadgets, the security and privacy
aspects of these devices are significant. For the design of secure systems,
physical unclonable function (PUF) and true random number generator (TRNG) are
critical hardware security primitives for security applications. This paper
proposes novel implementations of PUF and TRNGs on the RRAM crossbar structure.
Firstly, two techniques to implement the TRNG in the RRAM crossbar are
presented based on write-back and 50% switching probability pulse. The
randomness of the proposed TRNGs is evaluated using the NIST test suite. Next,
an architecture to implement the PUF in the RRAM crossbar is presented. The
initial entropy source for the PUF is used from TRNGs, and challenge-response
pairs (CRPs) are collected. The proposed PUF exploits the device variations and
sneak-path current to produce unique CRPs. We demonstrate, through extensive
experiments, reliability of 100%, uniqueness of 47.78%, uniformity of 49.79%,
and bit-aliasing of 48.57% without any post-processing techniques. Finally, the
design is compared with the literature to evaluate its implementation
efficiency, which is clearly found to be superior to the state-of-the-art.Comment: To appear at ASP-DAC 202
Integrated Architecture for Neural Networks and Security Primitives using RRAM Crossbar
This paper proposes an architecture that integrates neural networks (NNs) and
hardware security modules using a single resistive random access memory (RRAM)
crossbar. The proposed architecture enables using a single crossbar to
implement NN, true random number generator (TRNG), and physical unclonable
function (PUF) applications while exploiting the multi-state storage
characteristic of the RRAM crossbar for the vector-matrix multiplication
operation required for the implementation of NN. The TRNG is implemented by
utilizing the crossbar's variation in device switching thresholds to generate
random bits. The PUF is implemented using the same crossbar initialized as an
entropy source for the TRNG. Additionally, the weights locking concept is
introduced to enhance the security of NNs by preventing unauthorized access to
the NN weights. The proposed architecture provides flexibility to configure the
RRAM device in multiple modes to suit different applications. It shows promise
in achieving a more efficient and compact design for the hardware
implementation of NNs and security primitives
MemSPICE: Automated Simulation and Energy Estimation Framework for MAGIC-Based Logic-in-Memory
Existing logic-in-memory (LiM) research is limited to generating mappings and
micro-operations. In this paper, we present~\emph{MemSPICE}, a novel framework
that addresses this gap by automatically generating both the netlist and
testbench needed to evaluate the LiM on a memristive crossbar. MemSPICE goes
beyond conventional approaches by providing energy estimation scripts to
calculate the precise energy consumption of the testbench at the SPICE level.
We propose an automated framework that utilizes the mapping obtained from the
SIMPLER tool to perform accurate energy estimation through SPICE simulations.
To the best of our knowledge, no existing framework is capable of generating a
SPICE netlist from a hardware description language. By offering a comprehensive
solution for SPICE-based netlist generation, testbench creation, and accurate
energy estimation, MemSPICE empowers researchers and engineers working on
memristor-based LiM to enhance their understanding and optimization of energy
usage in these systems. Finally, we tested the circuits from the ISCAS'85
benchmark on MemSPICE and conducted a detailed energy analysis.Comment: Accepted in ASP-DAC 202
Finite State Automata Design using 1T1R ReRAM Crossbar
Data movement costs constitute a significant bottleneck in modern machine
learning (ML) systems. When combined with the computational complexity of
algorithms, such as neural networks, designing hardware accelerators with low
energy footprint remains challenging. Finite state automata (FSA) constitute a
type of computation model used as a low-complexity learning unit in ML systems.
The implementation of FSA consists of a number of memory states. However, FSA
can be in one of the states at a given time. It switches to another state based
on the present state and input to the FSA. Due to its natural synergy with
memory, it is a promising candidate for in-memory computing for reduced data
movement costs. This work focuses on a novel FSA implementation using resistive
RAM (ReRAM) for state storage in series with a CMOS transistor for biasing
controls. We propose using multi-level ReRAM technology capable of
transitioning between states depending on bias pulse amplitude and duration. We
use an asynchronous control circuit for writing each ReRAM-transistor cell for
the on-demand switching of the FSA. We investigate the impact of the
device-to-device and cycle-to-cycle variations on the cell and show that FSA
transitions can be seamlessly achieved without degradation of performance.
Through extensive experimental evaluation, we demonstrate the implementation of
FSA on 1T1R ReRAM crossbar
Reducing the environmental impact of surgery on a global scale: systematic review and co-prioritization with healthcare workers in 132 countries
Abstract
Background
Healthcare cannot achieve net-zero carbon without addressing operating theatres. The aim of this study was to prioritize feasible interventions to reduce the environmental impact of operating theatres.
Methods
This study adopted a four-phase Delphi consensus co-prioritization methodology. In phase 1, a systematic review of published interventions and global consultation of perioperative healthcare professionals were used to longlist interventions. In phase 2, iterative thematic analysis consolidated comparable interventions into a shortlist. In phase 3, the shortlist was co-prioritized based on patient and clinician views on acceptability, feasibility, and safety. In phase 4, ranked lists of interventions were presented by their relevance to high-income countries and lowâmiddle-income countries.
Results
In phase 1, 43 interventions were identified, which had low uptake in practice according to 3042 professionals globally. In phase 2, a shortlist of 15 intervention domains was generated. In phase 3, interventions were deemed acceptable for more than 90 per cent of patients except for reducing general anaesthesia (84 per cent) and re-sterilization of âsingle-useâ consumables (86 per cent). In phase 4, the top three shortlisted interventions for high-income countries were: introducing recycling; reducing use of anaesthetic gases; and appropriate clinical waste processing. In phase 4, the top three shortlisted interventions for lowâmiddle-income countries were: introducing reusable surgical devices; reducing use of consumables; and reducing the use of general anaesthesia.
Conclusion
This is a step toward environmentally sustainable operating environments with actionable interventions applicable to both highâ and lowâmiddleâincome countries