Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Lakshmi, B.
- Fault Tolerant Secured System Using Efficient ML Decoder/Detector
Abstract Views :175 |
PDF Views:4
Authors
B. Lakshmi
1,
R. Arunprasath
2
Affiliations
1 Department of VLSI, Anna University, Regional Office, Madurai, IN
2 Anna University Regional Office, Madurai, IN
1 Department of VLSI, Anna University, Regional Office, Madurai, IN
2 Anna University Regional Office, Madurai, IN
Source
Digital Signal Processing, Vol 6, No 2 (2014), Pagination:Abstract
To prevent soft errors from causing data corruption, memories are typically protected with error correction codes. An advanced error correction codes are used when an additional protection is needed. The majority logic decoder/detector codes are used for memory application because of correcting large number of soft errors, less decoding time, area consumption. The EG-LDPC codes are suitable for error correction using majority logic decoder/detector. Because the EG-LDPC codes are small, powerful and easily implemented in terms of decoding latency and complexity and this design achieving very high data rate while minimizing complexity. The proposed improved majority logic decoder/detector to perform silent data error detection in simple way using additional error detection technique and also reducing the area of the majority gate using sorting network. Hence the decoding process uses less number of cycles, reduces the area and also reducing the power consumption.Keywords
EG-LDPC Code, Error Correction Codes, Majoritylogic Decoding, Memory.- Sensitivity of ft to Process Parameter Variation in 30 nm Gate Length Fin FETs
Abstract Views :165 |
PDF Views:2
Authors
Affiliations
1 Department of Information Technology in SSN College of Engineering, Kalavakkam – 603 110, Chennai, Tamilnadu, IN
2 Department of Information Technology in SSN College of Engineering, Kalavakkam – 603 110, Chennai, Tamilnadu, IN
1 Department of Information Technology in SSN College of Engineering, Kalavakkam – 603 110, Chennai, Tamilnadu, IN
2 Department of Information Technology in SSN College of Engineering, Kalavakkam – 603 110, Chennai, Tamilnadu, IN
Source
Digital Signal Processing, Vol 2, No 9 (2010), Pagination: 172-176Abstract
This paper investigates the effect of process variations on unity gain frequency (ft) in 30 nm gate length FinFET by performing extensive TCAD simulations. Six different geometrical parameters, channel doping, source/drain doping and gate electrode work function are studied for their sensitivity on ft. It is found that ft is more sensitive to gate length, underlap, gate-oxide thickness and SD doping and less sensitive to source/drain width and length, and work function variations.Keywords
ft, FinFET, Scaling, Process Variations.- VLSI Architecture for Broadband MVDR Beamformer
Abstract Views :215 |
PDF Views:0
Authors
Affiliations
1 SENSE Department, VIT University, Chennai - 600127, Tamil Nadu, IN
2 Department of VLSI Design, NIELIT, Calicut University, Calicut - 673635, Kerala, IN
1 SENSE Department, VIT University, Chennai - 600127, Tamil Nadu, IN
2 Department of VLSI Design, NIELIT, Calicut University, Calicut - 673635, Kerala, IN
Source
Indian Journal of Science and Technology, Vol 8, No 19 (2015), Pagination:Abstract
Background/Objectives: The main objective of this proposed work is to investigate the significance of adaptive beamforming technique and to develop an efficient VLSI architecture for broadband MVDR beamformer in the field of medical ultrasound imaging. Methods/Statistical Analysis: The proposed algorithm is Minimum Variance Distortionless Response (MVDR) for near field beamforming of broadband data which gives better contrast and resolution compared to conventional Delay and Sum (DAS) beamformers and is implemented in frequency domain. MVDR beamformer minimizes the output power by allowing the desired signal to pass undistorted with unity gain. The solution for this optimization problem, involves correlation matrix inversion, which is the challenging part of MVDR algorithm. Findings: MVDR algorithm is applied by finding the inverse of correlation matrix which is a complex matrix. Here four elements are used for simplicity. Calculation of inverse complex matrix is the challenging part of MVDR algorithm where different methods are being used. Here QR decomposition is used which follows givens rotation algorithm. The paper demonstrates the formal verification of the proposed work. Final result is compared with the golden reference model which is designed using FIELD II scanner in Matlab. From the results it’s seen that, MVDR beamformer gives a pencil like beamform which shows high resolution and better contrast when compared to DAS. The timing constraints and device utilization parameters are obtained from synthesis report of final architecture designed in FPGA. Conclusion/Improvements: MVDR algorithm gives a pencil like beamformer output with reduced main lobe width and reduced side lobe level. By upgrading number of elements from 4 to 64, it can be made real time.Keywords
Broadband, Correlation Matrix, DAS, MVDR Beamformer- Sudarshankriya Yoga for Improving Health Status and Quality of Life in Adults
Abstract Views :229 |
PDF Views:1
Authors
Affiliations
1 Ved Vignan Maha Vidya Peeth, Udayapura, Bangalore, IN
2 Department of Biochemistry, St, John Medical College, Bangalore, IN
3 Agharkar Research Institute, Pune, IN
1 Ved Vignan Maha Vidya Peeth, Udayapura, Bangalore, IN
2 Department of Biochemistry, St, John Medical College, Bangalore, IN
3 Agharkar Research Institute, Pune, IN
Source
Indian Journal of Health and Wellbeing, Vol 2, No 4 (2011), Pagination: 773-775Abstract
Sudarshan Kriya Yoga (CSKYJ) practice designed to minimize stresses in daily life and improve the health status. The aim of this study was to assess the positive impact of sudarshan kriya program on healthy adult volunteers. We conducted an open trial on 102 apparently healthy adult volunteers to evaluate the effect of SKY practice on health, personal growth initiative and quality of life. Participants were given 6-day SKY training in three-four hour daily sessions. Main outcome measures were biochemical measures (Fasting Glucose Total cholesterol HDL, LDL, Triglycerides), PGIS for personal growth and WHOQOL Bref for quality-of-life measures (physical, emotional, social and spiritual well-being). Pre scores were compared with post scores to assess the impact of the SKY program. The scores and other measures were recorded at the beginning and end of the training period. Practice of SKY resulted in significant increase in PGIS score (t=-7.79, P < 0.001), four domain and total scores of QOL (physical health scores (t=-6.02, P < 0.001), psychological health (t=-9.43, P < 0.001), social relationships (t=-5.92, P < 0.001), environment (t=-6.03, P < 0.001).There was also a reduction in triglycerides (t=6.63, P < 0.001), fasting cholesterol (t=3.37, P = 0.013), LDL (t=2.17, P = 0.002), VLDL (t=6.67, P < 0.001)after the yoga workshop. A marginal increase was observed in fasting glucose (P = 0.009) and HDL (t=-2.51, P = 0.008). This pilot study suggests that a yoga-based wellness program is effective in creating both positive frame of mind and health and wellness for the population.Keywords
Sudarshan Kriya, Health, Quality of Life.- FPGA Based Hardware Key for Temporal Encryption
Abstract Views :166 |
PDF Views:0
Authors
Affiliations
1 Jayaram College of Engineering and Technology, Tiruchirappalli, IN
2 Bharat Heavy Electricals Ltd, Tiruchirappalli, IN
3 Saranathan College of Engineering, Tiruchirappalli, IN
1 Jayaram College of Engineering and Technology, Tiruchirappalli, IN
2 Bharat Heavy Electricals Ltd, Tiruchirappalli, IN
3 Saranathan College of Engineering, Tiruchirappalli, IN
Source
ICTACT Journal on Communication Technology, Vol 1, No 3 (2010), Pagination: 150-156Abstract
In this paper, a novel encryption scheme with time based key technique on an FPGA is presented. Time based key technique ensures right key to be entered at right time and hence, vulnerability of encryption through brute force attack is eliminated. Presently available encryption systems, suffer from Brute force attack and in such a case, the time taken for breaking a code depends on the system used for cryptanalysis. The proposed scheme provides an effective method in which the time is taken as the second dimension of the key so that the same system can defend against brute force attack more vigorously. In the proposed scheme, the key is rotated continuously and four bits are drawn from the key with their concatenated value representing the delay the system has to wait. This forms the time based key concept. Also the key based function selection from a pool of functions enhances the confusion and diffusion to defend against linear and differential attacks while the time factor inclusion makes the brute force attack nearly impossible. In the proposed scheme, the key scheduler is implemented on FPGA that generates the right key at right time intervals which is then connected to a NIOS - II processor (a virtual microcontroller which is brought out from Altera FPGA) that communicates with the keys to the personal computer through JTAG (Joint Test Action Group) communication and the computer is used to perform encryption (or decryption). In this case the FPGA serves as hardware key (dongle) for data encryption (or decryption).Keywords
Encryption, Decryption, Real Time Systems, Time Based Key, Brute Force Attack, Cryptanalysis, FPGA.- Aging Degradation Impact on the Stability of 6T-SRAM Bit-cell
Abstract Views :187 |
PDF Views:0
Authors
S. K. Koushik
1,
B. Lakshmi
1
Affiliations
1 School of Electronics Engineering, VIT University, Chennai-600127, IN
1 School of Electronics Engineering, VIT University, Chennai-600127, IN
Source
Indian Journal of Science and Technology, Vol 8, No 20 (2015), Pagination:Abstract
Background: In all electronic based applications, memory design is crucial which decides the performance of the system. In present technology nodes reliability is a growing concern where the static SRAM memories are not able to store the contents for a longer period of time. Reliability is mainly due to aging degradation which characterises BTI (Bias Temperature Instability) and HCI (Hot Carrier Injection) resulting in permanent damage to MOS parameters and as a result MOS deviates slightly from its normal behaviour. Method: In order to maintain the performance of SRAM within considerable PVT (Process Voltage Temperature) boundaries over a period of time, all the six MOSFETs strength should be dynamically adjusted. So that the ground bounce can be minimised at critical nodes of the bit-cell and stability can be maintained. Findings: In this paper, statistical analysis is performed on 14nm designed 6T-SRAMs and various Shmoo -plots have been developed for different PVTs considering aging impact for a span of 10 years. Analysis was performed for both SRAM read and write operation. All simulations were carried out using HSPICE-2013 version and aging models of MOSRA level-3 version 103.1. Conclusion: From the analysis it clearly evident that read is slightly degraded by 15%-25% were the operating voltage ranges has been degraded. In this design core voltage has been increased from 0.96v to 1.08v and periphery voltage from 0.5v to 0.62v. Thus to ensure the same performance after 10 years the operational voltage has to be increased by 20%.Keywords
Aging and FINFET, 6T-SRAM- Tunnel Field Effect Transistors for Digital and Analog Applications: A Review
Abstract Views :167 |
PDF Views:0
Authors
Affiliations
1 School of Electronics Engineering, VIT University, Chennai – 600127, Tamil Nadu, IN
1 School of Electronics Engineering, VIT University, Chennai – 600127, Tamil Nadu, IN