Ageing of Integrated Circuits : Causes, Effects and Mitigation Techniques / / edited by Basel Halak |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XIII, 228 p. 145 illus., 107 illus. in color.) |
Disciplina | 621.3815 |
Soggetto topico |
Electronic circuits
Microprocessors Electronics Microelectronics Circuits and Systems Processor Architectures Electronics and Microelectronics, Instrumentation |
ISBN | 3-030-23781-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. Understanding Ageing Mechanisms -- Chapter 2. The Effects of Ageing on the reliability and performance of Integrated Circuits -- Chapter 3. Ageing Mitigation Techniques for Microprocessors using using Anti- Ageing Software -- Chapter 4. Ageing Mitigation Techniques for SRAM Memories -- Chapter 5. Ageing-aware Logic Synthesis -- Chapter 6. On-Chip Ageing Monitoring and System Adaptation -- Chapter 7. Aging Monitors for SRAM Memory Cells and Sense Amplifiers -- Chapter 8. A Cost-Efficient Aging Sensor based on Multiple Paths Delay Fault Monitoring. |
Record Nr. | UNINA-9910366579703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Algorithms and VLSI implementations of MIMO detection / / Ibrahim A. Bello, Basel Halak |
Autore | Bello Ibrahim A. |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (xxi, 150 pages) : illustrations |
Disciplina | 733 |
Soggetto topico | Detectors |
ISBN | 3-031-04512-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Acknowledgements -- Contents -- About the Authors -- Acronyms -- List of Figures -- List of Tables -- 1 Introduction -- 1.1 Chapter Overview -- 1.2 Introduction -- 1.3 System Model -- 1.4 MIMO Detection -- 1.5 Hardware Implementation -- 1.6 Design Tradeoffs -- 1.7 Overview of the Book -- 1.8 Conclusion -- References -- 2 Linear Detection Techniques for MIMO -- 2.1 Chapter Overview -- 2.2 Introduction -- 2.3 Zero-Forcing -- 2.4 Minimum Mean Square Error -- 2.5 Complexity of Linear Detection -- 2.6 Successive Interference Cancellation Aided Linear Detection -- 2.7 Lattice Reduction -- 2.7.1 Lattice Reduction Aided Linear Detection -- 2.7.2 Lattice Reduction with Successive Interference Cancellation -- 2.8 Linear Detection-Based Preprocessing -- 2.9 BER Simulation -- 2.10 Matrix Operations -- 2.10.1 Matrix Inversion -- 2.10.1.1 Cramer's Rule -- 2.10.1.2 Gaussian Elimination -- 2.10.1.3 LU Decomposition -- 2.10.2 QR Decomposition -- 2.10.2.1 Gram-Schmidt Orthogonalisation -- 2.10.2.2 Householder Transformations -- 2.10.2.3 Givens Rotation -- 2.10.2.4 Coordinate Rotation Digital Computer -- 2.10.2.5 CORDIC Hardware Implementation -- 2.11 Conclusion -- Appendix -- References -- 3 Algorithm and VLSI Implementation of Sphere Decoding -- 3.1 Chapter Overview -- 3.2 Introduction -- 3.3 Sphere Decoding Tree Search -- 3.4 Schnorr-Euchner Enumeration -- 3.4.1 Tabular Enumeration -- 3.4.2 Real-Valued Channel Decomposition -- 3.4.3 Orthogonal Real-Valued Channel Decomposition -- 3.5 Complexity of Sphere Decoding -- 3.5.1 Detection Ordering -- 3.5.2 Early Termination -- 3.6 Soft-Output Sphere Decoding -- 3.6.1 List Sphere Decoder -- 3.6.2 Single Tree-Search Soft-Output Sphere Decoder -- 3.7 Sphere Decoder Simulation -- 3.8 Hardware Implementation -- 3.8.1 Previous Works -- 3.8.2 Design Example -- 3.8.2.1 Fixed-Point Simulation.
3.8.2.2 Hardware Implementation -- 3.8.2.3 Results and Discussion -- 3.9 Design Considerations -- 3.10 Conclusion -- Appendix -- References -- 4 Algorithm and VLSI Implementation of K-Best Detection -- 4.1 Chapter Overview -- 4.2 Introduction -- 4.3 K-Best Algorithm -- 4.4 Real-Valued Channel Model K-Best Detection -- 4.5 Non-constant K-Best Detection -- 4.6 Sorting -- 4.6.1 Bubble Sort -- 4.6.2 Multi-Cycle Merge -- 4.6.3 Batcher's Merge -- 4.6.3.1 Odd-Even Merge -- 4.6.3.2 Bitonic Merge -- 4.6.4 Relaxed Sort -- 4.6.5 Schnorr-Euchner Enumeration -- 4.7 Preprocessing -- 4.8 Complexity of the K-Best Algorithm -- 4.9 Hardware Implementation -- 4.9.1 Previous Works -- 4.9.2 Design Example -- 4.9.2.1 Approximate K-Best Algorithm -- 4.9.2.2 Hardware Architecture -- 4.9.2.3 Processing Element -- 4.9.2.4 Sorting Stage -- 4.9.2.5 Controller -- 4.9.2.6 Signal and Channel Inputs -- 4.9.2.7 Results and Discussion -- 4.9.2.8 Soft-Output K-Best Detection -- 4.10 Design Considerations -- 4.10.1 Throughput -- 4.10.2 Channel Model -- 4.10.3 Architecture -- 4.11 Conclusion -- Appendix -- References -- 5 Design Methodology for MIMO Detection -- 5.1 Chapter Overview -- 5.2 Introduction -- 5.3 Review of MIMO Detection -- 5.4 Modelling and Simulation -- 5.4.1 MATLAB Executable Files -- 5.4.2 Vectorised Operations -- 5.4.3 Multicore Operation -- 5.4.4 Computer Clusters -- 5.5 Register Transfer Level Implementation -- 5.5.1 Verilog -- 5.5.2 SystemVerilog -- 5.5.3 Number Representation -- 5.5.4 Integers -- 5.5.5 Fractional Numbers -- 5.5.5.1 Floating-Point Format -- 5.5.5.2 Fixed-Point Format -- 5.5.5.3 Complex Numbers -- 5.5.6 Arithmetic Operations -- 5.5.7 Relational Operations -- 5.5.8 Q Format Representation in SystemVerilog -- 5.5.9 Fixed-Point Simulation -- 5.5.10 Finite State Machines -- 5.5.11 State Encoding -- 5.5.12 Resets -- 5.6 Design Verification. 5.6.1 Variable Assignments -- 5.6.2 Arithmetic Overflows and Underflows -- 5.6.3 Latches -- 5.6.4 Interconnections -- 5.7 Synthesis -- 5.7.1 Top-Down Approach -- 5.7.2 Bottom-Up Approach -- 5.7.3 Mixed-Mode Approach -- 5.8 Energy-Efficient MIMO Detection -- 5.8.1 Power Consumption -- 5.8.2 Throughput -- 5.8.3 Adaptive MIMO Detection -- 5.9 Conclusion -- References -- Conclusion of the Book -- Index. |
Record Nr. | UNINA-9910585794503321 |
Bello Ibrahim A. | ||
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Authentication of embedded devices : technologies, protocols and emerging applications / / editor, Basel Halak |
Edizione | [1st edition 2021.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (XV, 188 p. 74 illus., 36 illus. in color.) |
Disciplina | 621.3815 |
Soggetto topico |
Integrated circuits - Verification
Embedded computer systems Electronic circuits Computer engineering Computer organization Internet of things Microprocessors |
ISBN | 3-030-60769-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Integrated Circuit Fingerprinting -- Novel PUF designs for device Identification -- Authentication Protocols: Standards, limitation and research opportunities -- Hardware-based Authentication Protocols for better physical security -- Energy Efficient Authentication Protocols -- Case study 1: Securing Hardware Supply Chain -- Case study 2: GPS spoofing attack detection and survival. |
Record Nr. | UNINA-9910484330603321 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Hardware supply chain security : threat modelling, emerging attacks and countermeasures / / Basel Halak, editor |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (XV, 217 p. 2 illus.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Computer input-output equipment - Security measures Computer viruses |
ISBN | 3-030-62707-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part I. Threat Modelling of Hardware Supply Chain -- Chapter 1. CIST: A Threat Modelling Approach for Hardware Supply Chain Security -- Part II. Emerging Hardware-based Security Attacks and Countermeasures -- Chapter 2. A Cube Attack on a Trojan-Compromised Hardware Implementation of Ascon -- Chapter 3. Anti-counterfeiting Techniques for Resources-Constrained Devices -- Part III. Anomaly Detection in Embedded Systems -- Chapter 4. Anomalous Behaviour in Embedded Systems -- Chapter 5. Hardware Performance Counters (HPCs) for Anomaly Detection -- Chapter 6. Anomaly Detection in an Embedded System. |
Record Nr. | UNINA-9910483454203321 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Machine learning for embedded system security / / edited by Basel Halak |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (166 pages) |
Disciplina | 005.8 |
Soggetto topico | Machine learning |
ISBN |
9783030941789
9783030941772 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910564696803321 |
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|