Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in VLSI and Circuits, Embedded and Hardware Systems

Design, Development, And Evaluation Of Customized Electronics For Controlling A 5-Dof Magneto-Rheological Actuator Collaborative Robot, Ziqi Yang Jan 2021

Design, Development, And Evaluation Of Customized Electronics For Controlling A 5-Dof Magneto-Rheological Actuator Collaborative Robot, Ziqi Yang

Electronic Thesis and Dissertation Repository

In recent years, Magneto-Rheological (MR) fluids has been used in various fields such as robotics, automotive, aerospace, etc. The most common use of the MR fluids is within a clutch-like mechanism, namely an MR clutch. When mechanical input is coupled to the input part of the MR clutch, the MR clutch provides a means of delivering this mechanical input to its output, through the MR fluids. The combination of the mechanical input device and the MR clutch is called an MR actuator. The MR actuator features inherently compliance owing to the characteristic of the MR fluids while also offering higher …


Efficient Hardware Architectures For Public-Key Cryptosystems, Mohammadamin Saburruhmonfared Dec 2020

Efficient Hardware Architectures For Public-Key Cryptosystems, Mohammadamin Saburruhmonfared

Electronic Thesis and Dissertation Repository

Finite field arithmetic plays an essential role in public-key cryptography as all the underlying operations are performed in these fields. The finite fields are either prime fields or binary fields. Binary field elements can mainly be represented on a polynomial basis or a normal basis (NB). NB representation offers a simple squaring operation, especially in hardware. However, multiplication is typically complex, and a particular subset of NB called Gaussian Normal Basis (GNB) features an efficient multiplication operation used in this work. The first part of this thesis has focused on improving finite field arithmetic architectures over GNB. Among different arithmetic …


Longitudinal Partitioning Waveform Relaxation Methods For The Analysis Of Transmission Line Circuits, Tarik Menkad Dec 2020

Longitudinal Partitioning Waveform Relaxation Methods For The Analysis Of Transmission Line Circuits, Tarik Menkad

Electronic Thesis and Dissertation Repository

Three research projects are presented in this manuscript. Projects one and two describe two waveform relaxation algorithms (WR) with longitudinal partitioning for the time-domain analysis of transmission line circuits. Project three presents theoretical results about the convergence of WR for chains of general circuits.

The first WR algorithm uses a assignment-partition procedure that relies on inserting external series combinations of positive and negative resistances into the circuit to control the speed of convergence of the algorithm. The convergence of the subsequent WR method is examined, and fast convergence is cast as a generic optimization problem in the frequency-domain. An automatic …


Performance Evaluation, Comparison And Improvement Of The Hardware Implementations Of The Advanced Encryption Standard S-Box, Doaa Ashmawy Aug 2020

Performance Evaluation, Comparison And Improvement Of The Hardware Implementations Of The Advanced Encryption Standard S-Box, Doaa Ashmawy

Electronic Thesis and Dissertation Repository

The Advanced Encryption Standard (AES) is the most popular algorithm used in symmetric key cryptography. The efficient computation of AES is essential for many computing platforms. The S-box is the only nonlinear transformation step of the AES algorithm. Efficient implementation of the AES S-box is very crucial for AES hardware. The AES S-box could be implemented by using look-up table method or by using finite field arithmetic. The finite field arithmetic design approach to implement the AES S-box is superior in saving the hardware resources. The main objective of this thesis is to evaluate, compare and improve the hardware implementations …


Investigation Of Radiation-Hardened Design Of Electronic Systems With Applications To Post-Accident Monitoring For Nuclear Power Plants, Qiang Huang Feb 2019

Investigation Of Radiation-Hardened Design Of Electronic Systems With Applications To Post-Accident Monitoring For Nuclear Power Plants, Qiang Huang

Electronic Thesis and Dissertation Repository

This research aims at improving the robustness of electronic systems used-in high level radiation environments by combining with radiation-hardened (rad-hardened) design and fault-tolerant techniques based on commercial off-the-shelf (COTS) components. A specific of the research is to use such systems for wireless post-accident monitoring in nuclear power plants (NPPs). More specifically, the following methods and systems are developed and investigated to accomplish expected research objectives: analysis of radiation responses, design of a radiation-tolerant system, implementation of a wireless post-accident monitoring system for NPPs, performance evaluation without repeat physical tests, and experimental validation in a radiation environment.

A method is developed …


Controlling And Processing Core For Wireless Implantable Telemetry System, Naeeme Modir Oct 2016

Controlling And Processing Core For Wireless Implantable Telemetry System, Naeeme Modir

Electronic Thesis and Dissertation Repository

Wireless implantable telemetry systems are suitable choices for monitoring various physiological parameters such as blood pressure and volume. These systems typically compose of an internal device implanted into a living body captures the physiological data and sends them to an external base station located outside of the body for further processing. The internal device usually consists of a sensor interface to convert the collected data to electrical signals; a digital core to digitize the analog signals, process them and prepare them for transmission; an RF front-end to transmit the data outside the body and to receive the required commands from …


Hardware Implementations For Symmetric Key Cryptosystems, Hayssam El-Razouk Jun 2015

Hardware Implementations For Symmetric Key Cryptosystems, Hayssam El-Razouk

Electronic Thesis and Dissertation Repository

The utilization of global communications network for supporting new electronic applications is growing. Many applications provided over the global communications network involve exchange of security-sensitive information between different entities. Often, communicating entities are located at different locations around the globe. This demands deployment of certain mechanisms for providing secure communications channels between these entities. For this purpose, cryptographic algorithms are used by many of today's electronic applications to maintain security. Cryptographic algorithms provide set of primitives for achieving different security goals such as: confidentiality, data integrity, authenticity, and non-repudiation. In general, two main categories of cryptographic algorithms can be used …


Piezoelectric Transformer And Hall-Effect Based Sensing And Disturbance Monitoring Methodology For High-Voltage Power Supply Lines, Sneha Arun Lele Sep 2013

Piezoelectric Transformer And Hall-Effect Based Sensing And Disturbance Monitoring Methodology For High-Voltage Power Supply Lines, Sneha Arun Lele

Electronic Thesis and Dissertation Repository

Advancements in relaying algorithms have led to an accurate and robust protection system widely used in power distribution. However, in low power sections of relaying systems, standard voltage and current measurement techniques are still used. These techniques have disadvantages like higher cost, size, electromagnetic interference, resistive losses and measurement errors and hence provide a number of opportunities for improvement and integration. We present a novel microsystem methodology to sense low-power voltage and current signals and detect disturbances in high-voltage power distribution lines. The system employs dual sensor architecture that consists of a piezoelectric transformer in combination with Hall-effect sensor, used …


Delay Extraction Based Macromodeling With Parallel Processing For Efficient Simulation Of High Speed Distributed Networks, Sourajeet Roy Jul 2013

Delay Extraction Based Macromodeling With Parallel Processing For Efficient Simulation Of High Speed Distributed Networks, Sourajeet Roy

Electronic Thesis and Dissertation Repository

This thesis attempts to address the computational demands of accurate modeling of high speed distributed networks such as interconnect networks and power distribution networks. In order to do so, two different approaches towards modeling of high speed distributed networks are considered. One approach deals with cases where the physical characteristics of the network are not known and the network is characterized by its frequency domain tabulated data. Such examples include long interconnect networks described by their Y parameter data. For this class of problems, a novel delay extraction based IFFT algorithm has been developed for accurate transient response simulation.

The …


Design And Evaluation Of Fpga-Based Hybrid Physically Unclonable Functions, Sasan Khoshroo May 2013

Design And Evaluation Of Fpga-Based Hybrid Physically Unclonable Functions, Sasan Khoshroo

Electronic Thesis and Dissertation Repository

A Physically Unclonable Function (PUF) is a new and promising approach to provide security for physical systems and to address the problems associated with traditional approaches. One of the most important performance metrics of a PUF is the randomness of its generated response, which is presented via uniqueness, uniformity, and bit-aliasing. In this study, we implement three known PUF schemes on an FPGA platform, namely SR Latch PUF, Basic RO PUF, and Anderson PUF. We then perform a thorough statistical analysis on their performance. In addition, we propose the idea of the Hybrid PUF structure in which two (or more) …


Delay Extraction Based Equivalent Elmore Model For Rlc On-Chip Interconnects, Shamsul Arefin Siddiqui Aug 2012

Delay Extraction Based Equivalent Elmore Model For Rlc On-Chip Interconnects, Shamsul Arefin Siddiqui

Electronic Thesis and Dissertation Repository

As feature sizes for VLSI technology is shrinking, associated with higher operating frequency, signal integrity analysis of on-chip interconnects has become a real challenge for circuit designers. For this purpose, computer-aided-design (CAD) tools are necessary to simulate signal propagation of on-chip interconnects which has been an active area for research. Although SPICE models exist which can accurately predict signal degradation of interconnects, they are computationally expensive. As a result, more effective and analytic models for interconnects are required to capture the response at the output of high speed VLSI circuits. This thesis contributes to the development of efficient and closed …


High Speed And Low-Complexity Hardware Architectures For Elliptic Curve-Based Crypto-Processors, Reza Azarderakhsh Nov 2011

High Speed And Low-Complexity Hardware Architectures For Elliptic Curve-Based Crypto-Processors, Reza Azarderakhsh

Electronic Thesis and Dissertation Repository

The elliptic curve cryptography (ECC) has been identified as an efficient scheme for public-key cryptography. This thesis studies efficient implementation of ECC crypto-processors on hardware platforms in a bottom-up approach. We first study efficient and low-complexity architectures for finite field multiplications over Gaussian normal basis (GNB). We propose three new low-complexity digit-level architectures for finite field multiplication. Architectures are modified in order to make them more suitable for hardware implementations specially focusing on reducing the area usage. Then, for the first time, we propose a hybrid digit-level multiplier architecture which performs two multiplications together (double-multiplication) with the same number of …


Addressing Computational Complexity Of High Speed Distributed Circuits Using Model Order Reduction, Ehsan Rasekh Sep 2011

Addressing Computational Complexity Of High Speed Distributed Circuits Using Model Order Reduction, Ehsan Rasekh

Electronic Thesis and Dissertation Repository

Advanced in the fabrication technology of integrated circuits (ICs) over the last couple of years has resulted in an unparalleled expansion of the functionality of microelectronic systems. Today’s ICs feature complex deep-submicron mixed-signal designs and have found numerous applications in industry due to their lower manufacturing costs and higher performance levels. The tendency towards smaller feature sizes and increasing clock rates is placing higher demands on signal integrity design by highlighting previously negligible interconnect effects such as distortion, reflection, ringing, delay, and crosstalk. These effects if not predicted in the early stages of the design cycle can severely degrade circuit …


Reliable And High-Performance Hardware Architectures For The Advanced Encryption Standard/Galois Counter Mode, Mehran Mozaffari-Kermani Jun 2011

Reliable And High-Performance Hardware Architectures For The Advanced Encryption Standard/Galois Counter Mode, Mehran Mozaffari-Kermani

Electronic Thesis and Dissertation Repository

The high level of security and the fast hardware and software implementations of the Advanced Encryption Standard (AES) have made it the first choice for many critical applications. Since its acceptance as the adopted symmetric-key algorithm, the AES has been utilized in various security-constrained applications, many of which are power and resource constrained and require reliable and efficient hardware implementations.

In this thesis, first, we investigate the AES algorithm from the concurrent fault detection point of view. We note that in addition to the efficiency requirements of the AES, it must be reliable against transient and permanent internal faults or …


Arithmetic Units For The Elliptic Curve Cryptography With Concurrent Error Detection Capability, Arash Hariri Dec 2010

Arithmetic Units For The Elliptic Curve Cryptography With Concurrent Error Detection Capability, Arash Hariri

Electronic Thesis and Dissertation Repository

The elliptic curve cryptography is an important branch in public-key cryptography. In this thesis, we consider the elliptic curve cryptography over binary extension fields from two different points of view. First, we investigate the underlying arithmetic operations in the elliptic curve cryptography. The main arithmetic operation is the scalar multiplication. This operation is based on two elliptic curve operations, known as the point addition and point doubling. Implementing these two elliptic curve operations requires finite field arithmetic, specifically, finite field addition, multiplication, squaring, and inversion. We focus on two finite field operations, namely finite field multiplication and squaring. For the …


Addressing Computational Complexity Of Electromagnetic Systems Using Parameterized Model Order Reduction, Majid Ahmadloo Aug 2010

Addressing Computational Complexity Of Electromagnetic Systems Using Parameterized Model Order Reduction, Majid Ahmadloo

Electronic Thesis and Dissertation Repository

As operating frequencies increase, full wave numerical techniques such as the finite element method (FEM) become necessary for the analysis of high-frequency and microwave circuit structures. However, the FEM formulation of microwave circuits often results in very large systems of equations which are computationally expensive to solve. The objective of this thesis is to develop new parameterized model order eduction (MOR) techniques to minimize the computational complexity of microwave circuits. MOR techniques provide a mechanism to generate reduced order models from the detailed description of the original FEM formulation. The following contributions are made in this thesis:

1. The first …