The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper describes the conception, design, fabrication and testing of a wrist for a new humanoid robot. The wrist is comprised of a three degrees-of-freedom (DOF) parallel mechanism actuated by three motors. The wrist was made to be lightweight and cost-efficient. The design is optimized to fit within the forearm of the robot and is equipped with joint and calibration sensors. It was then tested...
Using power-up reset to reuse Static Random Access Memory (SRAM) as physical unclonable function (PUF) suffers from two major constraints. First, it has limited entropy of only one response bit per cell. Second, as power-up reset has a global effect, extra storage is needed to temporarily buffer the original SRAM content before switching to PUF mode. This process has introduced extra area-power overhead...
Arbiter Physical unclonable function (A-PUF) with exponential number of challenges is an ideal candidate to realize lightweight and robust device authentication in Internet of Things applications. Unfortunately, it is particularly difficult to attain highly reliable responses and increase its modeling attack resistance simultaneously. This paper presents an approach to reduce the vulnerability of...
Constraint-based watermarking has been proven as an effective means for hardware intellectual property (IP) protection. Scan chain further facilitates field authentication of the watermarks embedded in densely integrated IP cores and serves as an added layer of tamper-evident protection if it is also watermarked. In this paper, we propose a new scan-chain based watermarking scheme that can be used...
VLSI intellectual property (IP) reuse based design methodology was adopted by the semiconductor industry in the early 1990's and how to protect design IPs from piracy and misuse has since been a challenging problem. 2017 marks the 20th anniversary of the IP protection development and working group was founded and the first series of IP watermarking papers were published. In this paper, we survey the...
In this work, we present a novel design of physical unclonable function (PUF) based on the topology of current mirror array (CMA). The proposed strong PUF exploits the randomness in the current mirror transistors and generates the response bit by comparing the accumulated current values. Thresholding and reference current are used to increase the reliability of the proposed PUF without requiring additional...
Physical Unclonable Function (PUF) has now become a core lightweight hardware-intrinsic cryptographic primitive for device identification and authentication to secure edge computing in Internet of Things (IoT). The main challenge in most delay-based PUF implementations is the rival of response uniqueness and reliability. Due to routing constraint, implementation of delay-based strong PUF on FPGA tends...
This paper reports the design, fabrication, electrical and thermal characterization, as well as attachment and stability of a flexible photoelectric neural interface (PENI). Upon the wire-bonding technology, three micro LED (μLED) chips are well-connected to the polyimide substrate as an array, with their luminous surfaces over against the holes. Meanwhile, a Parylene-C-based array with four microelectrodes...
This paper reports a novel flexible neural probe fabricated by cylindrical substrates lithography for Brain-Computer-Interface (BCI) applications. The electrode sites were patterned on the cylindrical surface to acquire high space selectivity and the micro channel was integrated to deliver drags or optical stimulation. The electrode sites of the probe were further modified with graphene enhanced conductive...
Surveillance footage has become an integral part of law enforcement as video cameras become ubiquitous, affordable and more reliable. Dynamic vision sensor (DVS) emerges as a new sensing technology that outsmarts existing static CMOS image sensors in vision-enabled traffic monitoring, assisted living and high-speed target tracking for its low latency, high temporal resolution and wide dynamic range...
The perceptual image hash has been widely used for integrity check of digital image content. Existing image hashes fail to identify the origin of image acquisition and non-repudiable authentication is contingent on the privacy of secret key. This paper presents a new and more secure image hashing scheme by exploiting the CMOS image sensor physical unclonable function (PUF) as a root of trust to imprint...
Ring oscillator (RO) based physical uncloanble function (PUF) is an emerging hardware security primitive but its response is susceptible to changes in operating conditions. Current solutions either incur large hardware overhead or require sophisticated RO selection algorithms to increase its reliability. This is the first paper that exploits the temperature invariant biasing of three different types...
Recent hardware implementations of fully homomorphic encryption (FHE) exploit very high cardinality arbitrary moduli sets to parallelize large integer arithmetic. However, the benefit they gained are heavily offset by the slow residue-to-binary conversion due to the large modulo operations and limited number theoretic properties of arbitrary moduli. This paper presents a fast residue-to-binary (R2B)...
This paper presents a new secret-hiding method for watermarking or fingerprinting the digital signal processing circuits. It uses the characteristic noise introduced by the truncation or rounding off of the results of arithmetic operations to distinguish between the otherwise identical circuits. Watermark is physically and functionally integrated with the circuit and can be extracted dynamically....
With respect to rapid changing trends of digitalization, the Smartphone plays an important role as intermediary devices for the development of mobile applications (hereinafter the “Apps”) to serve the growing needs of multifarious purposes in daily life. As a result, the convenience and functionality of modern Apps are gradually improved to fit the need of human behavior. For college students, it's...
A novel design of 2 × 2 NbN hot electron bolometer (HEB) mixer array receiver has been demonstrated here by using the multiple local oscillator (LO) beams obtained from a power distributor. In our design, the 1.5 THz LO beam is split into four uniform sub-beams with a spacing of 18 mm, then arrives at a four-pixel silicon lens with twin slot antenna (TSA) through a large-area beam splitter. An additional...
Online, real-time learning in neuromorphic circuits have been implemented through variants of Spike Time Dependent Plasticity (STDP). Current implementations have used either floating-gate devices or memristors to implement such learning synapses together with non-volatile storage. However, these approaches require high voltages (≈ 3–12V) for weight update and entail high energy for learning (≈ 4–30pJ/write)...
In this work, we investigate the hot carrier stress (HCS) of ultrathin poly-Si nanobelt junctionless transistors on different insulator (TEOS and Si3N4). Time exponent n suggests the oxide trap charge is the dominant mechanism. The subthreshold slope (S.S.) is improved by acceptor-like interface states generated after HCS, and different S.S. improvement between JL_O and JL_N is caused by surface roughness...
Comparison of residue representations in signed Residue Number System (RNS) involves sign detection and magnitude comparison. Both are difficult operations in RNS. This paper proposes a new signed magnitude comparator for the three-moduli set RNS {2n-1, 2n, 2n+1-1}. Two subrange identifiers are computed to simplify sign detection and accelerate the magnitude comparison without requiring full reverse...
The wide band-gap a-IGZO is a promising channel material to realize high-voltage transistors that can be easily integrated on logic ICs by low-temperature 3D stacking. This monolithic 3D integration would enable on-chip power management to improve power consumption and integration density. We report a high-voltage a-IGZO TFT with the high-k Al2O3 gate dielectric. By using a low-temperature process...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.