The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
There is tremendous growth in the amount of digital video creation and communication with the proliferation of mobile consumer electronic devices such as cellular phones with video capture and display capabilities. This trend will continue with the demand for higher spatial and temporal video resolutions accompanied by 3D and multiview video. Since it is not practical to store or transmit the raw...
Globalization of Integrated Circuit (IC) design and manufacturing is making designers and users of ICs re-assess their trust in hardware. As the IC design flow spans the globe — driven by cost-conscious consumer electronics — hardware is increasingly prone to reverse engineering, Intellectual Property (IP) piracy and malicious modifications (i.e., hardware trojans). An attacker, anywhere within the...
Approximate Computing is frequently mentioned as a new computing paradigm that enables improving energy efficiency at the expense of quality. But what is Approximate Computing? How can it be used in a truly innovative way that goes beyond reducing precision or approximating complex operations or algorithms at the expense of accuracy as it is already done regularly in the VLSI signal processing community...
Radio Frequency Identification tags are widely used in many daily living systems such as transport, access control, electronic passports, ticketing and payment. The communication between reader and RFID tags uses a wireless channel in which the security and privacy requirements are satisfied via the implementation of cryptographic modules and secured authentication protocols. However, current commercial...
Tip-enhanced Raman scattering (TERS) spectroscopy is a technique that employs near-field enhancement from a metallic nanotip to obtain Raman spectra with spatial resolution surpassing the diffraction limit. It is a useful nondestructive way to investigate the nanoscaled semiconductor films. In this paper, TERS technique is used to study the structural and functional properties of nitrogen doped 4H-SiC...
In this work, carry-free redundant arithmetic based fused multiply-accumulate (MAC) units are designed. In the first design, a regular redundant carry-save MAC unit is designed using well known carry-save techniques. In the second design, a hybrid design is proposed to exploit fast carry chains of the FPGA together with double carry-save output encoding. The proposed scheme exploits fast-carry chains...
This works deals with powerful approach treating the design of radiofrequency and microwave lowpass filters. A very compact topology is proposed by folding a conventional stepped impedance configuration whereas introducing an end gap coupling improving thus the filter selectivity. The lowpass filter is designed at 1 GHz cutoff frequency and implemented on both microstrip and 0.18-μm CMOS technology...
In this paper, we present new geometries of sensor which is structured of interdigitated electrodes used for characterization the electrical and dielectrical parameters of biological medium (impedance, relative permittivity). A new analytical approach has been proposed to determinate the relative permittivity. And we used the Matlab software to simulate these parameters.
Sub-pixel interpolation is one of the most computationally intensive parts of High Efficiency Video Coding (HEVC) video encoder and decoder. High-level synthesis (HLS) tools are started to be successfully used for FPGA implementations of digital signal processing algorithms. Therefore, in this paper, the first FPGA implementation of HEVC sub-pixel (half-pixel and quarter-pixel) interpolation algorithm...
Due to the increasing vulnerability of CMOS circuits, new generations of microprocessors require an inevitable focus on reliability issues. As the Register File (RF) constitutes a critical element within the processor pipeline, it is mandatory to enhance the RF reliability to develop fault tolerant architectures. This paper proposes Adjacent Register Hardened RF (ARH), a new RF architecture that exploits...
In this paper, critical path-delay time, and quiescent and transient power-supply current testing have been applied to a 90nm VLIW processor, to predict the remaining lifetime of this processor. The test environment for validation, via implementing an accelerated test has been realized. The resulting delay and current measurement data is presented next, followed by applying a genetic algorithm (GA)...
Implementation attacks and more specifically Power Analysis (PA) (the dominant type of side channel attack) and fault injection (FA) attacks constitute a pragmatic hazard for scalar multiplication, the main operation behind Elliptic Curve Cryptography. There exists a wide variety of countermeasures attempting to thwart such attacks that, however, few of them explore the potential of alternative number...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.