The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data conversion operations are important and essential part of floating point units in a processor and typical instructions include conversion between various precisions, integer to floating point and vice versa, floating point to fixed point and vice versa etc. Besides few processors have instructions to round and truncate data, sign injections, move data between co-processors registers and general...
With the widespread use of applications like internet banking, secured communication, emails, etc. information security is important concern. Security of information depends on implementation of cryptographic algorithm and its complexity to solve in reverse direction. However, with the use of current high speed computational resources it is possible to carry out brute-force attack and various other...
Real-time embedded applications span a wide range of domains including automotive and flight control systems, monitoring systems, multimedia systems, virtual reality, interactive gaming, robotics, telecommunications, etc. A late response in these systems might cause a wrong behavior which could possibly even lead to a critical system failure. A typical example is an anti-lock braking system in a car...
Traditionally BIST is most widely used testing methodology because of its online and at speed testing capability. The conventional BIST suffers from hardware overhead due to the presence of on-chip test blocks such as TPG, MISR, ROM and ORA. In this paper a low hardware cost BIST is proposed, which eliminates the requirement of external TPG by reconfiguring the first flops of scan chains as TPG and...
Image fusion is a technique to combine multiple images from a single sensor or multiple sensors into a single composite image without introducing artifacts. This paper presents a novel implementation of Laplacian pyramid image fusion on field programmable gate array (FPGA). Real time image fusion using pyramid decomposition is achieved by utilizing re-usable memory architecture and parallelisation...
With increasing use of network applications, security has become a major issue. Strong encryption mechanisms are required for securing important data. This encryption is provided by a strong cipher, capable of producing strong and highly random sequence of pseudo-random numbers. Through this paper, we present a detailed study of existing LFSR (Linear Feedback Shift Register) based hardware ciphers...
Due to the globalization of the Integrated Circuit manufacturing industry and wide use of third party IP in the modern SoCs has opened the backdoor for Hardware Trojan insertion. The detection of Hardware Trojan is challenging because of its very rare activation mechanism and unpredictable change in the functionality of the system. This paper proposes a new hardware Trojan detection scheme using power...
Digital multiplier and squarer circuits are indispensable in Digital signal processing and cryptography. In many mathematical computations, squaring and cubing are frequently used. Generally the multiplier is used in computing square. Using multiplier, the partial products of the squarer are generated which are added to achieve the final output. But the implementation of squaring has the advantage...
The semiconductor design industry has globalized and it is economical for the chip makers to get services from the different geographies in design, manufacturing and testing. Globalization raises the question of trust in an integrated circuit. It is for the every chip maker to ensure there is no malicious inclusion in the design, which is referred as Hardware Trojans. Malicious inclusion can occur...
Mean shift procedure can be used in many image/video processing applications for efficiently solving problem of accurate object localization by the computation of center of gravity (CoG) measure. Real-time object localization is a compute-intensive and time-consuming task that is difficult to perform by using only software-based approach. Thus, invariably there is a requirement of accelerating hardware...
The present work deals with a fault tolerant approach to design the test structure for detecting the fault of cache in chip multiprocessors (CMPs). Fault detection is simplified using a 2-state 3-neighborhood null boundary cellular automata (CA). This has been elaborated in the earlier work of present authors. Self correcting property, however, has been found only in a 5-neighborhood CA and not in...
In embedded system-on-a-chip (SoC) applications, the demand for integration of heterogenous processors on a single chip is increasing. It adds complexity in maintaining coherency in data caches of the heterogeneous processors implementing different coherence protocols. Therefore, the task of coherence verification also becomes non-trivial for such a system. This work proposes an effective solution...
The CORDIC (COrdinated Rotation DIgital Computer)[1] algorithm provides an efficient and accurate platform to compute various trigonometric, linear and non-linear functions using only shift-add operations. This paper presents the implementation of CORDIC algorithm on a configurable architecture to port various transforms which forms the heart of image and signal processing applications. We shall demonstrate...
With the entry into the embedded domain, security of SOC architectures has become an arena of importance. However, complexity and cost factors have forced us to outsource the VLSI design phases across the globe. Such sites may not be trusted and threat lies in the introduction of malicious intrusions at any stage of the design flow. Such malicious intrusions, also known as Hardware Trojan Horses (HTH)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.