Open Access. Powered by Scholars. Published by Universities.®

VLSI and Circuits, Embedded and Hardware Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

609 Full-Text Articles 801 Authors 540,786 Downloads 59 Institutions

All Articles in VLSI and Circuits, Embedded and Hardware Systems

Faceted Search

609 full-text articles. Page 25 of 27.

Low-Power, High-Bandwidth And Ultra-Small Memory Module Design, Qawi IbnZayd Harvard 2011 Boise State University

Low-Power, High-Bandwidth And Ultra-Small Memory Module Design, Qawi Ibnzayd Harvard

Boise State University Theses and Dissertations

The main memory subsystem has become inefficient. The performance gained has come at the expenses of power consumption, capacity, and cost. This dissertation proposes novel module, DRAM, and interconnect architectures in an attempt to alleviate these trends. The proposed architectures utilize low-cost interconnects and packaging innovations to substantially reduce the power, and increase the capacity and bandwidth of the main memory system.

This dissertation develops the theory behind a low-cost packaging technology to create an 8-die and 32-die memory module. The 32-die memory module measures less than 2 cm3.

This dissertation also proposes a 4 Gb DRAM architecture …


Gpu-Based Implementation Of The Variational Path Integral Method, Shanthan Mudhasani 2011 University of Tennessee, Knoxville

Gpu-Based Implementation Of The Variational Path Integral Method, Shanthan Mudhasani

Masters Theses

Any system in the world constitutes particles like electrons. To analyze the behaviors of these systems the behavior of these particles must be predicted. The ground state energy of a molecule is the most important information about a molecule and can calculate by solving the Schrodinger equation. But as the number of atoms increase, the number of variable (coordinates of the atom) that the equation represent increases by three times. Due to the large state space and the nonlinear nature of the Schrodinger equation, it is very difficult to solver this equation. Quantum Monte Carlo (QMC) is a very efficient …


Pvt Compensation For Single-Slope Measurement Systems, Kevin Vun Kiat Tham 2011 University of Tennessee, Knoxville

Pvt Compensation For Single-Slope Measurement Systems, Kevin Vun Kiat Tham

Masters Theses

A pulse-width locked loop (PWLL) circuit is reported that compensates for process, voltage, and temperature (PVT) variations of a linear ramp generator within a 12-bit multi-channel Wilkinson (single-slope integrating) Analog-to-Digital (ADC). This PWLL was designed and fabricated in a 0.5-um Silicon Germanium (SiGe) BiCMOS process. The PWLL architecture that is comprised of a phase detector, a charge-pump, and a pulse width modulator (PWM), is discussed along with the design details of the primary blocks. Simulation and silicon measurement data are shown that demonstrate a large improvement in the accuracy of the PVT-compensated ADC over the uncompensated ADC.


An Exploration Of Knowledge And Skills Transfer From A Formal Software Engineering Curriculum To A Capstone Practicum Project, Ray Bareiss, Ed Katz 2011 Carnegie Mellon University

An Exploration Of Knowledge And Skills Transfer From A Formal Software Engineering Curriculum To A Capstone Practicum Project, Ray Bareiss, Ed Katz

Ray Bareiss

Students at Carnegie Mellon Silicon Valley complete a team-based practicum project for an industrial sponsor as the capstone of their master’s education in software engineering. Over time, the faculty member who typically serves as advisor for such projects has been disturbed by the failure of several student teams to transfer some relevant knowledge and skills from the formal curriculum to the relatively unstructured practicum project environment. We conducted a survey of all 2010 software engineering students to ascertain the most significant selfreported shortcomings. This paper presents the survey data and then discusses the results in terms of a theory of …


Imirok: Real-Time Imitative Robotic Arm Control For Home Robot Applications, Heng-Tze Cheng, Zheng Sun, Pei Zhang 2011 Carnegie Mellon University

Imirok: Real-Time Imitative Robotic Arm Control For Home Robot Applications, Heng-Tze Cheng, Zheng Sun, Pei Zhang

Zheng Sun

Training home robots to behave like human can help people with their daily chores and repetitive tasks. In this paper, we present Imirok, a system to remotely control robotic arms by user motion using low-cost, off-the-shelf mobile devices and webcam. The motion tracking algorithm detects user motion in real-time, without classifier training or predefined action set. Experimental results show that the system achieves 90% precision and recall rate on motion detection with blank background, and is robust under the change of cluttered background and user-to-camera distance.


Leveraging Mobile Context For Effective Collaboration And Task Management In Disaster Response, Faisal Luqman, Martin L. Griss 2011 Carnegie Mellon University

Leveraging Mobile Context For Effective Collaboration And Task Management In Disaster Response, Faisal Luqman, Martin L. Griss

Martin L Griss

Collaboration and task management is challenging in distributed, dynamically-formed teams, typical in large scale disaster response scenarios. Ineffective collaboration may result in poor performance and possible loss of life. In this paper, we present Overseer, an agent-based system that exploits context information from mobile devices to facilitate collaboration and task allocation. We describe our system architecture and show how mobile context can be used to create dynamic role-based assignments to support collaboration and effective task management.


Evaluation Of The Single Keybit Template Attack, Eric W. Garcia 2011 Air Force Institute of Technology

Evaluation Of The Single Keybit Template Attack, Eric W. Garcia

Theses and Dissertations

Side Channel leakage is a serious threat to secure devices. Cryptographic information extraction is possible after examining any one of the various side channels, including electromagnetic. This work contributes a new method to achieve such a purpose. The Single Keybit Template Attack (SKTA) is introduced as a means to extract encryption keys from embedded processors and other integrated circuit devices performing DES encryptions by passively monitoring and exploiting unintentional RF emissions. Key extraction is accomplished by creating two templates for each bit value of the key based on instantaneous amplitude responses as a device executes DES operations. The resultant templates …


Dynamic Polymorphic Reconfiguration To Effectively “Cloak” A Circuit’S Function, Jeffrey L. Falkinburg 2011 Air Force Institute of Technology

Dynamic Polymorphic Reconfiguration To Effectively “Cloak” A Circuit’S Function, Jeffrey L. Falkinburg

Theses and Dissertations

Today's society has become more dependent on the integrity and protection of digital information used in daily transactions resulting in an ever increasing need for information security. Additionally, the need for faster and more secure cryptographic algorithms to provide this information security has become paramount. Hardware implementations of cryptographic algorithms provide the necessary increase in throughput, but at a cost of leaking critical information. Side Channel Analysis (SCA) attacks allow an attacker to exploit the regular and predictable power signatures leaked by cryptographic functions used in algorithms such as RSA. In this research the focus on a means to counteract …


Development Of A Novel Methodology For Indoor Emission Source Identification, Kwanghoon Han 2011 BEESL Lab., Syracuse University

Development Of A Novel Methodology For Indoor Emission Source Identification, Kwanghoon Han

Kwanghoon Han

The objective of this study was to develop and evaluate a methodology to identify individual sources of emissions based on the measurements of mixed air samples and the emission signatures of individual materials previously determined by Proton Transfer Reaction-Mass Spectrometry (PTR-MS), an on-line analytical device. The methodology based on signal processing principles was developed by employing the method of multiple regression least squares (MRLS) and a normalization technique. Samples of nine typical building materials were tested individually and in combination, including carpet, ceiling material, gypsum board, linoleum, two paints, polyolefine, PVC and wood. Volatile Organic Compound (VOC) emissions from each …


Anubis: An Attestation Protocol For Distributed Context-Aware Applications, Senaka Buthpitiya, Feng-Tso Sun, Heng-Tze Chen, Patrick Tague, Martin L. Griss, Anind K. Dey 2011 Carnegie Mellon University

Anubis: An Attestation Protocol For Distributed Context-Aware Applications, Senaka Buthpitiya, Feng-Tso Sun, Heng-Tze Chen, Patrick Tague, Martin L. Griss, Anind K. Dey

Martin L Griss

Sharing sensitive context information among multiple distributed components in mobile environments introduces major security concerns. The distributed sensing, processing and actuating components of these applications can be compromised and modified or impersonated to extract private and confidential information or to inject false information. In this paper we present the Anubis protocol for remote code attestation and access control of distributed components using remote execution of trusted code. Our Anubis protocol leverages previous work in the fields of wireless sensor networks and secure web browsing. Anubis allows new components to be introduced to the environment without updating existing components. Our implementation …


Mobile Context-Aware Personal Messaging Assistant, Senaka Buthpitiya, Deepthi Madamanchi, Sumalatha Kommaraju, Martin L. Griss 2011 Carnegie Mellon University

Mobile Context-Aware Personal Messaging Assistant, Senaka Buthpitiya, Deepthi Madamanchi, Sumalatha Kommaraju, Martin L. Griss

Martin L Griss

A previous study shows that busy professionals receive in excess of 50 emails per day of which approximately 23% require immediate attention, 13% require attention later and 64% are unimportant and typically ignored. The flood of emails impact mobile users even more heavily. Flooded inboxes cause busy professionals to spend considerable amounts of time searching for important messages, and there has been much research into automating the process using email content for classification; but we find email priority depends also on user context. In this paper we describe the Personal Messaging Assistant (PMA), an advanced rule-based email management system which …


Sensorchestra: Collaborative Sensing For Symbolic Location Recognition, Heng-Tze Cheng, Feng-Tso Sun, Senaka Buthpitiya, Martin L. Griss 2011 Carnegie Mellon University

Sensorchestra: Collaborative Sensing For Symbolic Location Recognition, Heng-Tze Cheng, Feng-Tso Sun, Senaka Buthpitiya, Martin L. Griss

Martin L Griss

"Symbolic location of a user, like a store name in a mall, is essential for context-based mobile advertising. Existing fingerprint- based localization using only a single phone is susceptible to noise, and has a major limitation in that the phone has to be held in the hand at all times. In this paper, we present SensOrchestra, a col- laborative sensing framework for symbolic location recognition that groups nearby phones to recognize ambient sounds and images of a location collaboratively. We investigated audio and image features, and designed a classifier fusion model to integrate estimates from diff erent phones. We also …


Activity-Aware Mental Stress Detection Using Physiological Sensors, Feng-Tso Sun, Cynthia Kuo, Heng-Tze Cheng, Senaka Buthpitiya, Patricia Collins, Martin Griss 2011 Carnegie Mellon University

Activity-Aware Mental Stress Detection Using Physiological Sensors, Feng-Tso Sun, Cynthia Kuo, Heng-Tze Cheng, Senaka Buthpitiya, Patricia Collins, Martin Griss

Martin L Griss

"Continuous stress monitoring may help users better understand their stress patterns and provide physicians with more reliable data for interventions. Previously, studies on mental stress detection were limited to a laboratory environment where participants generally rested in a sedentary position. However, it is impractical to exclude the effects of physical activity while developing a pervasive stress monitoring application for everyday use. The physiological responses caused by mental stress can be masked by variations due to physical activity. We present an activity-aware mental stress detection scheme. Electrocardiogram (ECG), galvanic skin response (GSR), and accelerometer data were gathered from 20 participants across …


Omnisense: A Collaborative Sensing Framework For User Context Recognition Using Mobile Phones, Heng-Tze Cheng, Senaka Buthpitiya, Feng-Tso Sun, Martin L. Griss 2011 Carnegie Mellon University

Omnisense: A Collaborative Sensing Framework For User Context Recognition Using Mobile Phones, Heng-Tze Cheng, Senaka Buthpitiya, Feng-Tso Sun, Martin L. Griss

Martin L Griss

Context information, including a user’s locations and activities, is indispensable for context-aware applications such as targeted advertising and disaster response. Inferring user context from sensor data is intrinsically challenging due to the semantic gap between low-level signals and high-level human activities. When implemented on mobile phones, more challenges on resource limitations are present. While most existing work focuses on context recognition using a single mobile phone, collaboration among multiple phones has received little attention, and the recognition accuracy is susceptible to phone position and ambient changes. Simply putting a phone in one’s pocket can render the microphone muffled and the …


Room-Level Wi-Fi Location Tracking, Joshua Correa, Ed Katz, Patricia Collins, Martin Griss 2011 Carnegie Mellon University

Room-Level Wi-Fi Location Tracking, Joshua Correa, Ed Katz, Patricia Collins, Martin Griss

Martin L Griss

Context-aware applications for indoor intelligent environments require an appropriately accurate and stable interior positioning system to adapt services to the location of a mobile user or mobile device in a building. Different technologies provide a varying mix of resolution, accuracy, stability and challenges. In this paper we report on our experience using an existing Wi-Fi infrastructure without specialized hardware added to support location tracking. There are several approaches to track the location of Wi-Fi enabled devices within a building such as signal propagation models and signature matching. We found signature matching most effective in our environment. Signature matching is accomplished …


Multicore, Multithreaded, Phase-Synchronous Fm Sound Synthesizer, Justin Tomlin 2011 California Polytechnic State University - San Luis Obispo

Multicore, Multithreaded, Phase-Synchronous Fm Sound Synthesizer, Justin Tomlin

Electrical Engineering

This project implements a phase-synchronous FM synthesis algorithm in hardware. Envelope and low frequency oscillator modulation of oscillator parameters is implemented. The microcontroller the system is based on, the XMOS XS1-G4, allows for physical parallelism including features such as multiple cores, multiple hardware threads on each core, a hardware event-driven thread scheduler, and channel, channel ends, and link switches for thread and core communication. The event-driven architecture of this device was ideal for implementing this synthesis algorithm. The final product is portable, durable, has a simple, intuitive user interface, and allows for extensive spectral shaping capabilities. The basic functional requirements …


On Process Variation Tolerant Low Cost Thermal Sensor Design, Spandana Remarsu 2011 University of Massachusetts Amherst

On Process Variation Tolerant Low Cost Thermal Sensor Design, Spandana Remarsu

Masters Theses 1911 - February 2014

Thermal management has emerged as an important design issue in a range of designs from portable devices to server systems. Internal thermal sensors are an integral part of such a management system. Process variations in CMOS circuits cause accuracy problems for thermal sensors which can be fixed by calibration tables. Stand-alone thermal sensors are calibrated to fix such problems. However, calibration requires going through temperature steps in a tester, increasing test application time and cost. Consequently, calibrating thermal sensors in typical digital designs including mainstream desktop and notebook processors increases the cost of the processor. This creates a need for …


Enhanced Search And Efficient Storage Using Data Compression In Nand Flash Memories, Shruti S. Vyas 2011 University of Massachusetts Amherst

Enhanced Search And Efficient Storage Using Data Compression In Nand Flash Memories, Shruti S. Vyas

Masters Theses 1911 - February 2014

NAND flash memories are popular due to their density and lower cost. However, due to serial access, NAND flash memories have low read and write speeds. As the flash sizes increase to 64GB and beyond, searches through flash memories become painfully slow. In this work we present a hardware design enhancement technique to speed-up search through flash memories. The basic idea is to generate a small signature for every memory block and store them in a signature block(s). When a search is initiated, signature block is searched which produces reference of possible blocks where data might be contained, reducing the …


Robust Signaling Techniques For Through Silicon Via Bundles, Krishna Chaitanya Chillara 2011 University of Massachusetts Amherst

Robust Signaling Techniques For Through Silicon Via Bundles, Krishna Chaitanya Chillara

Masters Theses 1911 - February 2014

3D circuit integration is becoming increasingly important as one of the remaining techniques for staying on Moore’s law trajectory. 3D Integrated Circuits (ICs) can be realized using the Through Silicon Via (TSV) approach. In order to extract the full benefits of 3D and for better yield, it has been suggested that the TSVs should be arranged as bundles rather than parallel TSVs. TSVs are required to route the signals through different dies in a multi-tier 3D IC. TSVs are excellent but scarce electrical conductors. Hence, it is important to utilize these resources very efficiently.

In high performance 3D ICs, signaling …


Electromagnetic Side-Channel Analysis For Hardware And Software Watermarking, Ashwin Lakshminarasimhan 2011 University of Massachusetts Amherst

Electromagnetic Side-Channel Analysis For Hardware And Software Watermarking, Ashwin Lakshminarasimhan

Masters Theses 1911 - February 2014

With more and more ICs being used in sectors requiring confidentiality and integrity like payment systems, military, finance and health, there is a lot of concern in the security and privacy of ICs. The widespread adoption of Intellectual Property (IP) based designs for modern systems like system on chips has reduced the time to market and saved a lot of money for many companies. But this has also opened the gates for problems like product piracy, IP theft and fraud. It is estimated that billions of dollars are lost annually to illegal manufacturing of Integrated Circuits. A possible solution to …


Digital Commons powered by bepress