首页 > 最新文献

Integration-The Vlsi Journal最新文献

英文 中文
Design of a low power LNA circuit with noise canceling approach in 90 nm CMOS process 在 90 纳米 CMOS 工艺中采用噪声消除方法设计低功耗 LNA 电路
IF 1.9 3区 工程技术 Q2 Engineering Pub Date : 2024-01-30 DOI: 10.1016/j.vlsi.2024.102163
Vikram Singh , Manoj Kumar , Nitin Kumar

In this manuscript, a low noise amplifier (LNA) circuit with low power consumption of 5.3 mW for 3–12 GHz ultra-wideband (UWB) is designed in 90 nm standard CMOS process. A noise-canceling (NC) approach consisting of both common-gate (CG) and common-source (CS) as input stage, followed by the gm-boosted current-reused stage to enhance the gain performance, is used in the proposed design. After noise-canceling, the achieved noise-figure (NF) is ranging from 2.28 to 3.55 dB for 3.1–10.6 GHz and a maximum of 4.0 dB at 12 GHz. Input-reflection coefficient (S11) of < −12.57 dB is achieved from this CG-CS input-matching stage. With the use of parallel-series LC matching with series-peaking-inductor followed by the gm-boosting stage improves the gain-bandwidth and delivers a flat power-gain (S21) of 18.33 ± 0.76 dB over 3–12 GHz. The CG configuration at the input side provides a high reverse-isolation (S12) of less than −78.23 dB and common-drain configuration with NMOS load at the output side ensures less than −11.79 dB output-reflection coefficient (S22) over the proposed frequency range. The proposed LNA is operated with 0.7 V Vdd and the achieved intercept points for input (IIP3) and output (OIP3) are −11.1 dBm and +6.2 dBm, respectively.

本手稿采用 90 纳米标准 CMOS 工艺设计了一种低噪声放大器 (LNA) 电路,功耗低至 5.3 mW,适用于 3-12 GHz 超宽带 (UWB)。该设计采用了由共门(CG)和共源(CS)组成的降噪(NC)方法作为输入级,然后采用 gm 增强电流重复使用级来提高增益性能。经过降噪处理后,在 3.1-10.6 GHz 频率范围内的噪声系数(NF)为 2.28-3.55 dB,在 12 GHz 频率范围内的噪声系数最大为 4.0 dB。该 CG-CS 输入匹配级的输入反射系数 (S11) 为 < -12.57 dB。通过使用带有串联峰值电感的并联串联 LC 匹配,再加上 gm 升压级,增益带宽得到了改善,在 3-12 GHz 范围内实现了 18.33 ± 0.76 dB 的平坦功率增益 (S21)。输入侧的 CG 配置可提供小于 -78.23 dB 的高反向隔离度 (S12),而输出侧带有 NMOS 负载的共漏配置可确保在建议的频率范围内输出反射系数 (S22) 小于 -11.79 dB。拟议的低噪声放大器在 0.7 V Vdd 下工作,输入 (IIP3) 和输出 (OIP3) 的截距点分别为 -11.1 dBm 和 +6.2 dBm。
{"title":"Design of a low power LNA circuit with noise canceling approach in 90 nm CMOS process","authors":"Vikram Singh ,&nbsp;Manoj Kumar ,&nbsp;Nitin Kumar","doi":"10.1016/j.vlsi.2024.102163","DOIUrl":"https://doi.org/10.1016/j.vlsi.2024.102163","url":null,"abstract":"<div><p>In this manuscript, a low noise amplifier (LNA) circuit with low power consumption of 5.3 mW for 3–12 GHz ultra-wideband (UWB) is designed in 90 nm standard CMOS process. A noise-canceling (NC) approach consisting of both common-gate (CG) and common-source (CS) as input stage, followed by the <em>g</em><sub>m</sub>-boosted current-reused stage to enhance the gain performance, is used in the proposed design. After noise-canceling, the achieved noise-figure (<em>NF</em>) is ranging from 2.28 to 3.55 dB for 3.1–10.6 GHz and a maximum of 4.0 dB at 12 GHz. Input-reflection coefficient (<em>S</em><sub>11</sub>) of &lt; −12.57 dB is achieved from this CG-CS input-matching stage. With the use of parallel-series LC matching with series-peaking-inductor followed by the <em>g</em><sub>m</sub>-boosting stage improves the gain-bandwidth and delivers a flat power-gain (<em>S</em><sub>21</sub>) of 18.33 ± 0.76 dB over 3–12 GHz. The CG configuration at the input side provides a high reverse-isolation (<em>S</em><sub>12</sub>) of less than −78.23 dB and common-drain configuration with NMOS load at the output side ensures less than −11.79 dB output-reflection coefficient (<em>S</em><sub>22</sub>) over the proposed frequency range. The proposed LNA is operated with 0.7 V <em>V</em><sub>dd</sub> and the achieved intercept points for input (IIP3) and output (OIP3) are −11.1 dBm and +6.2 dBm, respectively.</p></div>","PeriodicalId":54973,"journal":{"name":"Integration-The Vlsi Journal","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139699946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High-efficiency CMOS charge pump for ultra-low power RF energy harvesting applications 用于超低功耗射频能量采集应用的高效 CMOS 电荷泵
IF 1.9 3区 工程技术 Q2 Engineering Pub Date : 2024-01-27 DOI: 10.1016/j.vlsi.2024.102161
Ashik C. Jayamon, Ankur Mukherjee, Sai Chandra Teja R., Ashudeb Dutta

This paper explicates the design and implementation of a switch capacitor DC–DC converter system for Radio Frequency (RF) energy harvesting applications for an input voltage in the sub-150 mV range, using 180-nm CMOS triple-well BCD technology. The proposed system incorporates a charge pump architecture that employs an improvised Dynamic Gate Biasing (DGB), Forward and Reverse Body Bias technique (FRBB), along with a time axis symmetrical clocking scheme implemented using an advanced bootstrapped CMOS driver to enhance the overall drive capability of the system at low input voltages. Post-layout extracted simulations demonstrate that the proposed system achieves higher overall efficiency, delivering a peak Power Conversion Efficiency (PCE) of 85.8% at 125 mV input voltage, outperforming other state-of-the-art architectures in similar voltage ranges. Moreover, the proposed system exhibits reliable operation even at input voltages as low as 85 mV, while maintaining good overall efficiency.

本文阐述了针对射频 (RF) 能量采集应用的开关电容 DC-DC 转换器系统的设计与实现,该系统采用 180 纳米 CMOS 三阱 BCD 技术,输入电压在 150 mV 以下。该系统采用电荷泵架构,采用了改进的动态栅极偏压(DGB)、正向和反向体偏压技术(FRBB),以及利用先进的自举式 CMOS 驱动器实现的时间轴对称时钟方案,以增强系统在低输入电压下的整体驱动能力。布局后提取仿真表明,所提出的系统实现了更高的整体效率,在 125 mV 输入电压下的峰值功率转换效率 (PCE) 达到 85.8%,在类似电压范围内优于其他最先进的架构。此外,即使在低至 85 mV 的输入电压下,拟议的系统也能可靠运行,同时保持良好的整体效率。
{"title":"High-efficiency CMOS charge pump for ultra-low power RF energy harvesting applications","authors":"Ashik C. Jayamon,&nbsp;Ankur Mukherjee,&nbsp;Sai Chandra Teja R.,&nbsp;Ashudeb Dutta","doi":"10.1016/j.vlsi.2024.102161","DOIUrl":"10.1016/j.vlsi.2024.102161","url":null,"abstract":"<div><p><span>This paper explicates the design and implementation of a switch capacitor DC–DC converter system for Radio Frequency (RF) energy harvesting applications for an input voltage in the sub-150 mV range, using 180-nm CMOS triple-well BCD technology. The proposed system incorporates a charge pump architecture that employs an improvised Dynamic Gate Biasing (DGB), Forward and Reverse Body Bias technique (FRBB), along with a time axis symmetrical clocking scheme implemented using an advanced bootstrapped CMOS driver to enhance the overall drive capability of the system at low input voltages. Post-layout extracted simulations demonstrate that the proposed system achieves higher overall efficiency, delivering a peak </span>Power Conversion Efficiency (PCE) of 85.8% at 125 mV input voltage, outperforming other state-of-the-art architectures in similar voltage ranges. Moreover, the proposed system exhibits reliable operation even at input voltages as low as 85 mV, while maintaining good overall efficiency.</p></div>","PeriodicalId":54973,"journal":{"name":"Integration-The Vlsi Journal","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139639537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Machine Learning approach for anomaly detection on the Internet of Things based on Locality-Sensitive Hashing 基于位置敏感哈希算法的物联网异常检测机器学习方法
IF 1.9 3区 工程技术 Q2 Engineering Pub Date : 2024-01-25 DOI: 10.1016/j.vlsi.2024.102159
Mireya Lucia Hernandez-Jaimes , Alfonso Martinez-Cruz , Kelsey Alejandra Ramírez-Gutiérrez

The increasing connectivity of devices on the Internet of Things (IoT) has created a favorable field for attacks. Consequently, current anomaly-based intrusion detection systems (AIDS) integrate artificial intelligence algorithms, such as machine learning (ML) and deep learning (DL), to manage high data volumes, recognize complex patterns, and detect unknown anomalies. However, the effectiveness of these methods is contingent upon the quality and meaningfulness of the extracted features from IoT-based communications. Also, with the growth of the IoT, feature extraction and selection are becoming increasingly difficult due to data heterogeneity, the generation of massive amounts of information, and the lack of feature standardization. Moreover, current proposals rely on complex feature extraction and selection techniques. As a result, this study introduces a novel approach for ML modeling, including decision trees and random forests, to detect anomalies in IoT. This study aims to overcome feature extraction and selection process dependency by integrating fingerprinting techniques based on locality-sensitive hashing (LSH) to represent network packet information in a suitable format for ML modeling and detecting harmful sequential network packets. The anomaly detection performance was assessed using two benchmark IoT datasets, ToN-IoT and MQTT-IoT, which contain cyberattacks threatening IoT networks. The proposal outperforms other methods regarding accuracy, precision, and FPR with values of 99.82%, 99.93%, and 0.13%, respectively.

物联网(IoT)设备的连接性不断增强,为攻击创造了有利条件。因此,当前基于异常的入侵检测系统(AIDS)集成了人工智能算法,如机器学习(ML)和深度学习(DL),以管理高数据量、识别复杂模式和检测未知异常。然而,这些方法的有效性取决于从基于物联网的通信中提取的特征的质量和意义。此外,随着物联网的发展,由于数据异构、海量信息的产生以及缺乏特征标准化,特征提取和选择变得越来越困难。此外,当前的建议依赖于复杂的特征提取和选择技术。因此,本研究引入了一种新的 ML 建模方法,包括决策树和随机森林,以检测物联网中的异常。本研究旨在克服特征提取和选择过程的依赖性,方法是整合基于位置敏感哈希(LSH)的指纹技术,以合适的格式表示网络数据包信息,用于 ML 建模和检测有害的连续网络数据包。利用两个基准物联网数据集(ToN-IoT 和 MQTT-IoT)评估了异常检测性能,这两个数据集包含威胁物联网网络的网络攻击。该建议在准确率、精确度和 FPR 方面优于其他方法,准确率、精确度和 FPR 值分别为 99.82%、99.93% 和 0.13%。
{"title":"A Machine Learning approach for anomaly detection on the Internet of Things based on Locality-Sensitive Hashing","authors":"Mireya Lucia Hernandez-Jaimes ,&nbsp;Alfonso Martinez-Cruz ,&nbsp;Kelsey Alejandra Ramírez-Gutiérrez","doi":"10.1016/j.vlsi.2024.102159","DOIUrl":"10.1016/j.vlsi.2024.102159","url":null,"abstract":"<div><p><span><span><span>The increasing connectivity of devices on the Internet of Things<span> (IoT) has created a favorable field for attacks. Consequently, current anomaly-based intrusion detection systems<span> (AIDS) integrate artificial intelligence algorithms, such as </span></span></span>machine learning<span> (ML) and deep learning<span><span> (DL), to manage high data volumes, recognize complex patterns, and detect unknown anomalies. However, the effectiveness of these methods is contingent upon the quality and meaningfulness of the extracted features from IoT-based communications. Also, with the growth of the IoT, feature extraction and selection are becoming increasingly difficult due to data heterogeneity, the generation of massive amounts of information, and the lack of feature standardization. Moreover, current proposals rely on complex feature extraction and selection techniques. As a result, this study introduces a novel approach for ML modeling, including </span>decision trees and </span></span></span>random forests<span>, to detect anomalies in IoT. This study aims to overcome feature extraction and selection process dependency by integrating </span></span>fingerprinting techniques<span> based on locality-sensitive hashing (LSH) to represent network packet<span> information in a suitable format for ML modeling and detecting harmful sequential network packets. The anomaly detection performance was assessed using two benchmark IoT datasets, ToN-IoT and MQTT-IoT, which contain cyberattacks threatening IoT networks. The proposal outperforms other methods regarding accuracy, precision, and FPR with values of 99.82%, 99.93%, and 0.13%, respectively.</span></span></p></div>","PeriodicalId":54973,"journal":{"name":"Integration-The Vlsi Journal","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139631605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A reference sampling ΔΣ subsampling PLL 参考采样 ΔΣ 子采样 PLL
IF 1.9 3区 工程技术 Q2 Engineering Pub Date : 2024-01-25 DOI: 10.1016/j.vlsi.2024.102160
Debdut Biswas

In this work, a new subsampling PLL is presented which samples the reference signal by the oscillator’s phase and then again by the divided oscillator phase. The operation is robust due to the action of a frequency divider in the loop. Fractional synthesis can also be easily implemented by modifying the loop containing the frequency divider using a ΔΣ modulator. Post-layout simulations are performed in CMOS 90 nm technology with a 1 GHz ring oscillator. Peak-to-peak jitter over 1000 cycles of the free running ring oscillator is 87 ps. It is reduced to 28 ps through the action of the proposed architecture.

本研究提出了一种新型子采样 PLL,它通过振荡器相位对参考信号进行采样,然后再通过分频振荡器相位对参考信号进行采样。由于在环路中使用了分频器,因此运行非常稳定。通过使用 ΔΣ 调制器修改包含分频器的环路,也可以轻松实现分数合成。布局后仿真采用 CMOS 90 纳米技术,使用 1 GHz 环形振荡器。自由运行环形振荡器 1000 个周期的峰峰抖动为 87 ps。通过采用建议的架构,抖动降低到 28 ps。
{"title":"A reference sampling ΔΣ subsampling PLL","authors":"Debdut Biswas","doi":"10.1016/j.vlsi.2024.102160","DOIUrl":"10.1016/j.vlsi.2024.102160","url":null,"abstract":"<div><p><span>In this work, a new subsampling<span> PLL is presented which samples the reference signal by the oscillator’s phase and then again by the divided oscillator phase. The operation is robust due to the action of a frequency divider in the loop. Fractional synthesis can also be easily implemented by modifying the loop containing the frequency divider using a </span></span><span><math><mrow><mi>Δ</mi><mi>Σ</mi></mrow></math></span><span> modulator. Post-layout simulations are performed in CMOS 90 nm technology with a 1 GHz ring oscillator. Peak-to-peak jitter over 1000 cycles of the free running ring oscillator is 87 ps. It is reduced to 28 ps through the action of the proposed architecture.</span></p></div>","PeriodicalId":54973,"journal":{"name":"Integration-The Vlsi Journal","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139638553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and optimization of phase frequency detector through Taguchi and ANOVA statistical techniques for fast settling low power frequency synthesizer 通过田口和方差分析统计技术设计和优化相位频率检测器,用于快速沉淀低功率频率合成器
IF 1.9 3区 工程技术 Q2 Engineering Pub Date : 2024-01-23 DOI: 10.1016/j.vlsi.2024.102162
Jyoti Sharma , Riyaz Ahmad , Ashutosh Yadav , Tarun Varma , Dharmendar Boolchandani

In this work, a novel phase frequency detector (PFD) architecture using pass transistor logic is proposed. The circuit does not have a reset path, resulting in the elimination of blind zone and dead zone. The ϕ-V characteristics of the PFD were found to have better linearity across the range of π to π due to the absence of blind and dead zones. The Taguchi and ANOVA statistical techniques were used to optimize the PFD. The optimized PFD exhibited a phase noise of −142.24 dBc/Hz, consumed 5.64 μW of power and had a maximum operating frequency of 5.25 GHz, and a delay of 10.65 ps. Using this PFD, a GHz-range synthesizer was designed, and its performance characteristics were obtained from circuit simulations using CADENCE Virtuoso. The synthesizer had a power consumption of 4.25 mW at a supply of 1.8 V, achieved a lock time of 2.95μs, and could generate frequencies ranging from 0.1 GHz to 4.75 GHz while occupying a chip area of 0.013 mm2. Moreover, the work introduced a new figure of merit, FoM. The synthesizer has potential applications in various devices such as radio receivers, televisions, mobile phones, satellite receivers, and GPS systems.

本研究提出了一种使用通晶体管逻辑的新型相位频率检测器(PFD)结构。该电路没有复位路径,因此消除了盲区和死区。由于没有盲区和死区,PFD 的 ϕ-V 特性在 -π 至 π 范围内具有更好的线性度。田口和方差分析统计技术用于优化 PFD。优化后的 PFD 的相位噪声为 -142.24 dBc/Hz,功耗为 5.64 μW,最大工作频率为 5.25 GHz,延迟为 10.65 ps。利用该 PFD 设计了一个 GHz 范围的合成器,并通过使用 CADENCE Virtuoso 进行电路仿真获得了其性能特征。该合成器在 1.8 V 电源电压下的功耗为 4.25 mW,锁定时间为 2.95μs,可产生 0.1 GHz 至 4.75 GHz 的频率,占用芯片面积为 0.013 mm2。此外,这项工作还引入了一个新的优点系数(FoM)。该合成器有望应用于无线电接收器、电视、移动电话、卫星接收器和全球定位系统等各种设备。
{"title":"Design and optimization of phase frequency detector through Taguchi and ANOVA statistical techniques for fast settling low power frequency synthesizer","authors":"Jyoti Sharma ,&nbsp;Riyaz Ahmad ,&nbsp;Ashutosh Yadav ,&nbsp;Tarun Varma ,&nbsp;Dharmendar Boolchandani","doi":"10.1016/j.vlsi.2024.102162","DOIUrl":"https://doi.org/10.1016/j.vlsi.2024.102162","url":null,"abstract":"<div><p>In this work, a novel phase frequency detector (PFD) architecture using pass transistor logic is proposed. The circuit does not have a reset path, resulting in the elimination of blind zone and dead zone. The <span><math><mi>ϕ</mi></math></span>-V characteristics of the PFD were found to have better linearity across the range of <span><math><mrow><mo>−</mo><mi>π</mi></mrow></math></span> to <span><math><mi>π</mi></math></span> due to the absence of blind and dead zones. The Taguchi and ANOVA statistical techniques were used to optimize the PFD. The optimized PFD exhibited a phase noise of −142.24 dBc/Hz, consumed 5.64 <span><math><mi>μ</mi></math></span><span>W of power and had a maximum operating frequency of 5.25 GHz, and a delay of 10.65 ps. Using this PFD, a GHz-range synthesizer was designed, and its performance characteristics were obtained from circuit simulations using CADENCE Virtuoso. The synthesizer had a power consumption of 4.25 mW at a supply of 1.8 V, achieved a lock time of </span><span><math><mrow><mn>2</mn><mo>.</mo><mn>95</mn><mspace></mspace><mi>μ</mi><mi>s</mi></mrow></math></span>, and could generate frequencies ranging from 0.1 GHz to 4.75 GHz while occupying a chip area of 0.013 <span><math><msup><mrow><mi>mm</mi></mrow><mrow><mn>2</mn></mrow></msup></math></span>. Moreover, the work introduced a new figure of merit, FoM. The synthesizer has potential applications in various devices such as radio receivers, televisions, mobile phones, satellite receivers, and GPS systems.</p></div>","PeriodicalId":54973,"journal":{"name":"Integration-The Vlsi Journal","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139653320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FPGA realization of an image encryption system using the DCSK-CDMA technique 利用 DCSK-CDMA 技术在 FPGA 上实现图像加密系统
IF 1.9 3区 工程技术 Q2 Engineering Pub Date : 2024-01-18 DOI: 10.1016/j.vlsi.2024.102157
Miguel-Angel Estudillo-Valdez, Vincent-Ademola Adeyemi, Jose-Cruz Nuñez-Perez

This paper describes a four-wing chaotic oscillator-based DCSK-CDMA modulation technique for image encryption and decryption. The system consists of a transmission module for the encrypted and modulated color matrices, and a reception module for the decrypted and demodulated original data. Among our main contributions is the integration for the first time in the state of the art of DCSK chaotic modulation techniques with the CDMA communication scheme, as well as the implementation of our DCSK and CDMA algorithms in VHDL language for Xilinx FPGA cards. The DCSK-CDMA technique enables demodulation and decryption without any loss in the original data. Other contributions arising from this investigation are the encryption process implemented using DCSK-CDMA techniques based on a four-wing chaotic oscillator and the realization on the FPGA of a chaos-based communications system for the secure transmission of images of grayscale and RGB formats using DCSK-CDMA techniques. The system architecture in this work was designed using fixed-point binary arithmetic, with the application of the 4th order Runge–Kutta numerical method for the four-wing chaotic oscillator. The analysis of the correlation coefficients between the original and encrypted information indicates the values of 5.367×104 and 2.205×107 for grayscale and RGB images, respectively, with a full recovery of the original information. The results of simulations in MATLAB/Simulink coincide with the implementation of the complete system in VHDL on the Xilinx Artix-7 AC701 board.

本文介绍了一种基于四翼混沌振荡器的 DCSK-CDMA 调制技术,用于图像加密和解密。该系统包括一个用于加密和调制彩色矩阵的传输模块,以及一个用于接收解密和解调原始数据的接收模块。我们的主要贡献之一是首次将 DCSK 混沌调制技术与 CDMA 通信方案相结合,并用 VHDL 语言为 Xilinx FPGA 卡实现了 DCSK 和 CDMA 算法。DCSK-CDMA 技术可在不丢失原始数据的情况下进行解调和解密。这项研究的其他贡献还包括:利用基于四翼混沌振荡器的 DCSK-CDMA 技术实现了加密过程;利用 DCSK-CDMA 技术在 FPGA 上实现了基于混沌的通信系统,用于灰度和 RGB 格式图像的安全传输。这项工作中的系统结构是利用定点二进制运算设计的,并对四翼混沌振荡器应用了四阶 Runge-Kutta 数值方法。原始信息和加密信息之间的相关系数分析表明,灰度图像和 RGB 图像的相关系数分别为 5.367×10-4 和 -2.205×10-7,原始信息完全恢复。在 MATLAB/Simulink 中模拟的结果与在 Xilinx Artix-7 AC701 板上用 VHDL 实现的完整系统相吻合。
{"title":"FPGA realization of an image encryption system using the DCSK-CDMA technique","authors":"Miguel-Angel Estudillo-Valdez,&nbsp;Vincent-Ademola Adeyemi,&nbsp;Jose-Cruz Nuñez-Perez","doi":"10.1016/j.vlsi.2024.102157","DOIUrl":"https://doi.org/10.1016/j.vlsi.2024.102157","url":null,"abstract":"<div><p><span><span><span>This paper describes a four-wing chaotic oscillator-based DCSK-CDMA modulation technique<span> for image encryption<span> and decryption. The system consists of a transmission module for the encrypted and modulated color matrices, and a reception module for the decrypted and demodulated original data. Among our main contributions is the integration for the first time in the state of the art of DCSK chaotic modulation techniques with the CDMA communication scheme, as well as the implementation of our DCSK and CDMA algorithms in VHDL language for Xilinx </span></span></span>FPGA<span><span> cards. The DCSK-CDMA technique enables demodulation and decryption without any loss in the original data. Other contributions arising from this investigation are the </span>encryption process<span><span> implemented using DCSK-CDMA techniques based on a four-wing chaotic oscillator and the realization on the FPGA of a chaos-based communications system for the secure transmission of images of </span>grayscale and RGB formats using DCSK-CDMA techniques. The </span></span></span>system architecture in this work was designed using fixed-point binary arithmetic, with the application of the 4th order Runge–Kutta numerical method for the four-wing chaotic oscillator. The analysis of the correlation coefficients between the original and encrypted information indicates the values of </span><span><math><mrow><mn>5</mn><mo>.</mo><mn>367</mn><mo>×</mo><mn>1</mn><msup><mrow><mn>0</mn></mrow><mrow><mo>−</mo><mn>4</mn></mrow></msup></mrow></math></span> and <span><math><mrow><mo>−</mo><mn>2</mn><mo>.</mo><mn>205</mn><mo>×</mo><mn>1</mn><msup><mrow><mn>0</mn></mrow><mrow><mo>−</mo><mn>7</mn></mrow></msup></mrow></math></span><span> for grayscale and RGB images, respectively, with a full recovery of the original information. The results of simulations in MATLAB/Simulink coincide with the implementation of the complete system in VHDL on the Xilinx Artix-7 AC701 board.</span></p></div>","PeriodicalId":54973,"journal":{"name":"Integration-The Vlsi Journal","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139503851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital synchronization of the MACM chaotic system by using PIC24-microcontrollers and the SPI-protocol 利用 PIC24 微控制器和 SPI 协议实现 MACM 混沌系统的数字同步
IF 1.9 3区 工程技术 Q2 Engineering Pub Date : 2024-01-18 DOI: 10.1016/j.vlsi.2024.102158
Rodrigo Méndez-Ramírez , Adrian Arellano-Delgado , Miguel Angel Murillo-Escobar , César Cruz-Hernández

In recent years, chaotic synchronization has received a lot of interest in applications in different fields such as digital applications. The purpose of this work is to achieve the synchronization of the discretized version (DV) of the Méndez–Arellano–Cruz–Martínez (MACM) 3D chaotic system (CS) as master which is coupled to one or more MACM 3D CSs as slaves for three different applications. The Lyapunov Exponents (LEs) analysis is conducted using the numerical-algorithm in MATLAB in order to verify the chaos existence is preserved in the Continuous Version(CV) and DV of the two master–slave MACM CSs once that they are synchronized. Subsequently, the algorithm of the MACM CSs are implemented in two or more isolated embedded systems (ESs) using PIC-24 16-bit microcontrollers which are communicated using the Serial Peripheral Interface (SPI) protocol setting in 16-bits, and the synchronization is validated using the state-variables depicted in digital-to-analog converters (DACs), and the secret-image messages are validated in thin-film-transistor-liquid-crystal displays (TFT-LCDs) depending of the conducted application. In addition, one k-parameter switch is proposed in order to validate the enabled or disabled the synchronization between the master with one or many slave microcontrollers using a 16-bit numerical scaling-arrangement. The first application is the electronic-digital-implementation of the synchronization in real-time of 5 PIC-24 microcontrollers coupled in star-topology, 1 MACM-CS master-node, and 4 MACM-CSs slave-nodes. The second application is the synchronization of the two MACM CSs which are coupled and implemented in two PIC-24 microcontrollers, the master-node is setting to encrypt and transmit a secret-message which involves data to achieve the synchronization and to re-built an image once that the image is received, decrypted and depicted in the TFT-LCD in the slave-node in real-time. The third application is showing the synchronization of the 2 nodes where the message is an decomposed-image stored in a vector-data block in the SRAM (Static Random Access Memory, the stored-data remain in the memory only if the PIC-24 microcontrollers are powered) of the PIC-24 microcontrollers which the process is conducted encrypting and transmitting a secret-message using data to achieve the synchronization and elements of a pixel per finite sample-iterations to receive and decrypt the message in the PIC-24 microcontroller as slave-node, and later the message is re-built in a TFT-LCD. Finally, all the numerical results of the LE studies, comparative security analysis, and the numerical and experimental synchronization of the proposed three applications were validated in the ESs.

近年来,混沌同步在数字应用等不同领域的应用受到了广泛关注。这项工作的目的是实现门德斯-阿雷亚诺-克鲁斯-马丁内斯(MACM)三维混沌系统(CS)离散化版本(DV)的同步,该系统作为主系统与一个或多个作为从系统的MACM三维CS耦合,用于三种不同的应用。利用 MATLAB 中的数值算法进行了李亚普诺夫指数(LEs)分析,以验证一旦两个主从 MACM CS 同步,它们的连续版本(CV)和 DV 中是否保留了混沌存在。随后,利用 PIC-24 16 位微控制器在两个或多个隔离的嵌入式系统(ES)中实现 MACM CS 的算法,这些微控制器通过设置为 16 位的串行外设接口(SPI)协议进行通信,并利用数模转换器(DAC)中描述的状态变量验证同步性,同时根据应用情况在薄膜晶体管液晶显示器(TFT-LCD)中验证秘密图像信息。此外,还提出了一个 k 参数开关,以便使用 16 位数字缩放排列验证主控器与一个或多个从属微控制器之间的同步启用或禁用。第一个应用是以电子数字方式实现 5 个 PIC-24 微控制器、1 个 MACM-CS 主节点和 4 个 MACM-CS 从节点的实时同步。第二个应用是由两个 PIC-24 微控制器耦合实现的两个 MACM-CS 的同步,主节点设置为加密和传输涉及数据的秘密信息,以实现同步,并在接收到图像后重新生成图像,解密后实时显示在从节点的 TFT-LCD 上。第三个应用显示了两个节点的同步,信息是存储在 SRAM(静态随机存取存储器)矢量数据块中的分解图像、PIC-24 微控制器的 SRAM(静态随机存取存储器,只有在 PIC-24 微控制器通电的情况下,存储的数据才会保留在存储器中)中的矢量数据块中存储的分解图像,PIC-24 微控制器使用数据加密和传输秘密信息,以实现同步,PIC-24 微控制器作为从节点,每有限采样迭代接收和解密一个像素的元素,然后在 TFT-LCD 中重新构建信息。最后,在 ES 中验证了所有 LE 研究的数值结果、安全性对比分析以及所提议的三种应用的数值和实验同步性。
{"title":"Digital synchronization of the MACM chaotic system by using PIC24-microcontrollers and the SPI-protocol","authors":"Rodrigo Méndez-Ramírez ,&nbsp;Adrian Arellano-Delgado ,&nbsp;Miguel Angel Murillo-Escobar ,&nbsp;César Cruz-Hernández","doi":"10.1016/j.vlsi.2024.102158","DOIUrl":"10.1016/j.vlsi.2024.102158","url":null,"abstract":"<div><p><span>In recent years, chaotic synchronization has received a lot of interest in applications in different fields such as digital applications. The purpose of this work is to achieve the synchronization of the discretized version (DV) of the Méndez–Arellano–Cruz–Martínez (MACM) 3D chaotic system (CS) as master which is coupled to one or more MACM 3D CSs as slaves for three different applications. The Lyapunov Exponents<span><span> (LEs) analysis is conducted using the numerical-algorithm in MATLAB in order to verify the chaos existence is preserved in the Continuous Version(CV) and DV of the two master–slave MACM CSs once that they are synchronized. Subsequently, the algorithm of the MACM CSs are implemented in two or more isolated embedded systems (ESs) using PIC-24 16-bit </span>microcontrollers which are communicated using the </span></span>Serial Peripheral Interface<span> (SPI) protocol setting in 16-bits, and the synchronization is validated using the state-variables depicted in digital-to-analog converters (DACs), and the secret-image messages are validated in thin-film-transistor-liquid-crystal displays (TFT-LCDs) depending of the conducted application. In addition, one k-parameter switch is proposed in order to validate the enabled or disabled the synchronization between the master with one or many slave microcontrollers using a 16-bit numerical scaling-arrangement. The first application is the electronic-digital-implementation of the synchronization in real-time of 5 PIC-24 microcontrollers coupled in star-topology, 1 MACM-CS master-node, and 4 MACM-CSs slave-nodes. The second application is the synchronization of the two MACM CSs which are coupled and implemented in two PIC-24 microcontrollers, the master-node is setting to encrypt and transmit a secret-message which involves data to achieve the synchronization and to re-built an image once that the image is received, decrypted and depicted in the TFT-LCD in the slave-node in real-time. The third application is showing the synchronization of the 2 nodes where the message is an decomposed-image stored in a vector-data block in the SRAM (Static Random Access Memory, the stored-data remain in the memory only if the PIC-24 microcontrollers are powered) of the PIC-24 microcontrollers which the process is conducted encrypting and transmitting a secret-message using data to achieve the synchronization and elements of a pixel per finite sample-iterations to receive and decrypt the message in the PIC-24 microcontroller as slave-node, and later the message is re-built in a TFT-LCD. Finally, all the numerical results of the LE studies, comparative security analysis, and the numerical and experimental synchronization of the proposed three applications were validated in the ESs.</span></p></div>","PeriodicalId":54973,"journal":{"name":"Integration-The Vlsi Journal","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139539383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TeRa: Ternary and Range based packet classification engine TeRa:基于三元和范围的数据包分类引擎
IF 1.9 3区 工程技术 Q2 Engineering Pub Date : 2024-01-17 DOI: 10.1016/j.vlsi.2024.102153
Dhayalakumar M., Noor Mahammad Sk

This work proposes a novel approach to the hardware implementation of packet classification in ASICs, using NAND-NOR logic at each stage. The proposed design utilizes modified ternary encoding to process the prefix field, resulting in a two-level NAND-NOR logic for prefix processing. The field representation based on classbench rules helps reduce memory usage by almost 45% compared to conventional prefix representations. Additionally, an efficient range matching solution is implemented using a carry tree logic that relies on 1’s and 2’s Complement subtraction. The integration of a carry-based range comparator enhances hardware optimization for range processing without the need for prefix conversion. Additionally, match inversion logic streamlines the processing of exceptional or inverse fields without incurring extra hardware overhead. This work also presents a specialized logic circuit for ternary and range matching, complemented by a specialized priority grouping technique. The proposed architecture, including TYPE1 and TYPE2, achieves throughput rates of 9.9 BPPS and 6.6 BPPS, respectively, while supporting both best-match and multi-match addresses within the same hardware environment.

本研究提出了一种在 ASIC 中使用 NAND-NOR 逻辑实现数据包分类硬件的新方法。所提出的设计利用修改后的三元编码来处理前缀字段,从而产生了用于前缀处理的两级 NAND-NOR 逻辑。与传统的前缀表示法相比,基于类本位规则的字段表示法有助于减少近 45% 的内存使用量。此外,利用进位树逻辑实现了高效的范围匹配解决方案,该逻辑依赖于 1 和 2 的补码减法。基于进位的范围比较器的集成增强了范围处理的硬件优化,无需进行前缀转换。此外,匹配反转逻辑简化了异常或反向字段的处理,而不会产生额外的硬件开销。这项工作还提出了一种用于三元和范围匹配的专用逻辑电路,并辅以专门的优先级分组技术。建议的架构(包括 TYPE1 和 TYPE2)吞吐率分别达到 9.9 BPPS 和 6.6 BPPS,同时在同一硬件环境中支持最佳匹配和多匹配地址。
{"title":"TeRa: Ternary and Range based packet classification engine","authors":"Dhayalakumar M.,&nbsp;Noor Mahammad Sk","doi":"10.1016/j.vlsi.2024.102153","DOIUrl":"https://doi.org/10.1016/j.vlsi.2024.102153","url":null,"abstract":"<div><p><span>This work proposes a novel approach to the hardware implementation of packet classification<span> in ASICs<span>, using NAND-NOR logic at each stage. The proposed design utilizes modified ternary encoding to process the prefix field, resulting in a two-level NAND-NOR logic for prefix processing. The field representation based on classbench rules helps reduce memory usage by almost 45% compared to conventional prefix representations. Additionally, an efficient range matching<span> solution is implemented using a carry tree logic that relies on 1’s and 2’s Complement subtraction. The integration of a carry-based range comparator enhances </span></span></span></span>hardware optimization for range processing without the need for prefix conversion. Additionally, match inversion logic streamlines the processing of exceptional or inverse fields without incurring extra hardware overhead. This work also presents a specialized logic circuit for ternary and range matching, complemented by a specialized priority grouping technique. The proposed architecture, including TYPE1 and TYPE2, achieves throughput rates of 9.9 BPPS and 6.6 BPPS, respectively, while supporting both best-match and multi-match addresses within the same hardware environment.</p></div>","PeriodicalId":54973,"journal":{"name":"Integration-The Vlsi Journal","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139503852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finding the longest delay paths for the array-form multipliers using a genetic algorithm 使用遗传算法寻找阵列形式乘法器的最长延迟路径
IF 1.9 3区 工程技术 Q2 Engineering Pub Date : 2024-01-15 DOI: 10.1016/j.vlsi.2024.102148
Limin Hao, Guoyong Shi

Traditional digital multipliers are often designed in array forms or other variants. Timing of array-form multipliers can be analyzed by static timing analysis (STA), but the obtained timing result is conservative and pessimistic. Although statistical static timing analysis (SSTA) can partly solve the pessimism, it still does not generate test patterns for those near-to-longest delay paths. Finding near-to-longest delay paths can be helpful to designing error tolerant circuits, with which aggressive timing (with timing violation) can be exploited. In such design scenarios one should find test vectors to activate those near-to-longest delay paths in order to further run SPICE-precision diagnose on those potential timing violating critical paths. Test vector generation for such a testing problem is essentially an exhaustive enumeration problem when dealing with different forms of array multipliers. However, large size multipliers would result in an extremely large enumeration space for finding the longest delay path (LDP) test vectors. Currently there is no deterministic method that can guarantee to find test vectors for exact LDPs of a large size multiplier. Only very few research papers have addressed this problem, proposals are limited to heuristic methods without guarantee of finding the LDPs with the testing vectors. This paper investigates the potential of a genetic algorithm (GA) for searching the extensive test pattern space. By a fine design of GA, experimental running shows that a combination of well tuned evolutionary operators does empower the possibility of finding the LDPs for a set of moderate size carry-save adders (CSA) multipliers with the wordlength (WL) up to 25 bits on a plain laptop computer. Statistical properties of the proposed GA are examined.

传统的数字乘法器通常设计成阵列形式或其他变体。阵列形式乘法器的时序可通过静态时序分析(STA)进行分析,但得到的时序结果比较保守和悲观。虽然统计静态时序分析 (SSTA) 可以部分解决悲观问题,但它仍然无法生成那些接近最长延迟路径的测试模式。找到接近最长的延迟路径有助于设计容错电路,从而可以利用激进时序(时序违规)。在这种设计情况下,我们应该找到测试向量来激活这些近至最长延迟路径,以便在这些潜在的违反时序的关键路径上进一步运行 SPICE 精确诊断。在处理不同形式的阵列乘法器时,为这种测试问题生成测试向量基本上是一个穷举问题。然而,大型乘法器会导致寻找最长延迟路径(LDP)测试向量的枚举空间极大。目前还没有一种确定性方法能保证为大尺寸乘法器的精确 LDP 找到测试向量。只有极少数研究论文探讨了这一问题,提出的建议仅限于启发式方法,不能保证找到具有测试向量的 LDP。本文研究了遗传算法(GA)在搜索广阔的测试模式空间方面的潜力。通过对遗传算法进行精细设计,实验结果表明,在一台普通笔记本电脑上,结合经过精心调整的进化算子,确实有可能为一组中等大小的进位保存加法器(CSA)乘法器找到字长(WL)最多为 25 位的 LDP。对所提出的遗传算法的统计特性进行了研究。
{"title":"Finding the longest delay paths for the array-form multipliers using a genetic algorithm","authors":"Limin Hao,&nbsp;Guoyong Shi","doi":"10.1016/j.vlsi.2024.102148","DOIUrl":"https://doi.org/10.1016/j.vlsi.2024.102148","url":null,"abstract":"<div><p>Traditional digital multipliers are often designed in array forms or other variants. Timing of array-form multipliers can be analyzed by static timing analysis (STA), but the obtained timing result is conservative and pessimistic. Although statistical static timing analysis (SSTA) can partly solve the pessimism, it still does not generate test patterns for those near-to-longest delay paths. Finding near-to-longest delay paths can be helpful to designing error tolerant circuits, with which aggressive timing (with timing violation) can be exploited. In such design scenarios one should find test vectors to activate those near-to-longest delay paths in order to further run SPICE-precision diagnose on those potential timing violating critical paths. Test vector generation for such a testing problem is essentially an exhaustive enumeration problem when dealing with different forms of array multipliers. However, large size multipliers would result in an extremely large enumeration space for finding the longest delay path (LDP) test vectors. Currently there is no deterministic method that can guarantee to find test vectors for exact LDPs of a large size multiplier. Only very few research papers have addressed this problem, proposals are limited to heuristic methods without guarantee of finding the LDPs with the testing vectors. This paper investigates the potential of a genetic algorithm (GA) for searching the extensive test pattern space. By a fine design of GA, experimental running shows that a combination of well tuned evolutionary operators does empower the possibility of finding the LDPs for a set of moderate size carry-save adders (CSA) multipliers with the wordlength (WL) up to 25 bits on a plain laptop computer. Statistical properties of the proposed GA are examined.</p></div>","PeriodicalId":54973,"journal":{"name":"Integration-The Vlsi Journal","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139503850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and analysis of sum-prediction adder 和预测加法器的设计与分析
IF 1.9 3区 工程技术 Q2 Engineering Pub Date : 2024-01-14 DOI: 10.1016/j.vlsi.2024.102139
Chia-Heng Yen , Jin-Tai Yan

It is well known that addition is an essential arithmetic operation in multi-medium applications, wireless applications and multiplication. Based on the predictable sum bits in the addition of two n-bit integers, the logical circuit of an n-bit sum-prediction adder can be constructed and the hardware overhead and the static timing delay of the proposed n-bit sum-prediction adder can be analyzed. In the design of an n-bit sum-prediction adder, the predictable carry bits can lead to the generation of the predictable sum bits in the addition of two n-bit integers. Based on the generation of the predictable sum bits, the carry propagation on a longer link of NMOS transistors can be separated into some carry propagation on some shorter links and the unknown sum bits can be divided into some sum blocks. Furthermore, the unknown sum bits inside each sum block can be generated by propagating the predicted sum bits. For the comparison of the average power and the timing delay in 90 nm technology on the RCAs using full adders, 2-bit CLA blocks, 4-bit CLA blocks, 1-bit CSA blocks, 2-bit CSA blocks or 4-bit CSA blocks, the proposed sum-prediction adder can reduce 5.9 %, 30.7 %, 45.0 %, 18.1 %, 18.8 % and 19.0 % of the average power and reduce 35.0 %, 41.4 %, 12.5 %, 72.3 %, 67.1 % and 62.7 % of the timing delay on the average, respectively.

众所周知,加法是多介质应用、无线应用和乘法中必不可少的算术运算。基于两个 n 位整数加法中的可预测和位,可以构建 n 位和预测加法器的逻辑电路,并分析所提出的 n 位和预测加法器的硬件开销和静态时序延迟。在 n 位和预测加法器的设计中,在两个 n 位整数相加的过程中,可预测的携带位可以导致可预测的和位的产生。在生成可预测和位的基础上,NMOS 晶体管长链路上的携带传播可被分离成一些短链路上的携带传播,未知和位可被划分成一些和块。此外,每个和值块内部的未知和值比特可以通过传播预测的和值比特来生成。在 90 纳米技术条件下,对使用全加法器、2 位 CLA 块、4 位 CLA 块、1 位 CSA 块、2 位 CSA 块或 4 位 CSA 块的 RCA 的平均功率和时延进行比较,所提出的和预测加法器可降低 5.9 %、30.7 %、45.0 %、18.1 %、18.8 % 和 19.0 %,并平均减少 35.0 %、41.4 %、12.5 %、72.3 %、67.1 % 和 62.7 % 的时延。
{"title":"Design and analysis of sum-prediction adder","authors":"Chia-Heng Yen ,&nbsp;Jin-Tai Yan","doi":"10.1016/j.vlsi.2024.102139","DOIUrl":"https://doi.org/10.1016/j.vlsi.2024.102139","url":null,"abstract":"<div><p><span>It is well known that addition is an essential arithmetic operation<span> in multi-medium applications, wireless applications and multiplication. Based on the predictable sum bits in the addition of two n-bit integers, the logical circuit of an n-bit sum-prediction adder can be constructed and the hardware overhead and the static timing delay of the proposed n-bit sum-prediction adder can be analyzed. In the design of an n-bit sum-prediction adder, the predictable carry bits can lead to the generation of the predictable sum bits in the addition of two n-bit integers. Based on the generation of the predictable sum bits, the carry propagation on a longer link of NMOS transistors can be separated into some carry propagation on some shorter links and the unknown sum bits can be divided into some sum blocks. Furthermore, the unknown sum bits inside each sum block can be generated by propagating the predicted sum bits. For the comparison of the average power and the timing delay in 90 nm technology on the RCAs using full adders, 2-bit CLA blocks, 4-bit CLA blocks, 1-bit CSA blocks, 2-bit CSA blocks or 4-bit CSA blocks, the proposed sum-prediction adder can reduce 5.</span></span><em>9 %, 30</em>.<em>7 %, 45.0 %, 18.1 %, 18.8 % and 19.0 % of the average power and reduce 35</em>.<em>0 %, 41</em>.<em>4 %, 12.5 %, 72.3 %, 67.1 % and 62.7 % of the timing delay on the average, respectively.</em></p></div>","PeriodicalId":54973,"journal":{"name":"Integration-The Vlsi Journal","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139503849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Integration-The Vlsi Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1