scholarly journals Novel Approach to Measure Internal Power Domain PG Route Weakness

2021 ◽  
Vol 23 (05) ◽  
pp. 704-708
Author(s):  
Nischith T R ◽  
◽  
Namita Palecha ◽  
John Alwyn ◽  
◽  
...  

Grid weakness measurement is an extremely important process in the modern-day VLSI design flow. In designs that contain power gating switches, there are additional challenges. It is desirable to find the PG grid weakness of only the gated domain. The tools used in the industry typically measure the total voltage drops from the bump location to the transistor pin. This voltage drop is the summation of the voltage drops in the external domain, switch pin network, and internal domain. This paper explores the ways to measure the internal pin domain voltage exclusively. Ansys Totem tool is used for simulation. Finally, the simulation results are presented to propose the effectiveness and accuracy of the given solution.

2021 ◽  
Author(s):  
Ananth Kumar Tamilarasan ◽  
Darwin Sundarapandi Edward ◽  
Arun Samuel Thankamony Sarasam

Abstract A novel approach called Keeper in LEakage Control Transistor (KLECTOR) is presented in this paper to reduce leakage currents in SRAM architecture. The SRAM is significantly affected by the leakage current during the "standby mode", which is caused by the fabric which has a lower threshold voltage. KLECTOR circuit employs less power consumption by restricting the flow of current through devices of less voltage drops and relies heavily on the self-controlled transistor at the output node. It has been found from the presented results that static (leakage) power in the write operation is reduced to 63% and 69 % for the read operation. This proposed approach is designed and simulated using the Virtuoso, Cadence EDA tool.


2021 ◽  
Vol 8 (4) ◽  
pp. 75-81
Author(s):  
Ahmed A. Alsheikhy ◽  

In real-time systems, a task or a set of tasks needs to be executed and completed successfully within a predefined time. Those systems require a scheduling technique or a set of scheduling methods to distribute the given task or the set of tasks among different processors or on a processor. In this paper, a new novel scheduling approach to minimize the overhead from context switching between several periodic tasks is presented. This method speeds up a required response time while ensuring that all tasks meet their deadline times and there is no deadline miss occurred. It is a dynamic-priority technique that works either on a uniprocessor or several processors. In particular, it is proposed to be applied on multiprocessor environments since many applications run on several processors. Various examples are presented within this paper to demonstrate its optimality and efficiency. In addition, several comparison experiments with an earlier version of this approach were performed to demonstrate its efficiency and effectiveness too. Those experiments showed that this novel approach sped up the execution time from 15% to nearly around 46%. In addition, it proved that it reduced the number of a context switch between tasks from 12% to around 50% as shown from simulation tests. Furthermore, this approach delivered all tasks/jobs successfully and ensured there was no deadline miss happened.


Author(s):  
Leonard Talmy

A chronal cue informs a hearer about the temporal location of the target as an aid in determining that target. The trigger is lexicalized to require this cue. The chronal cue consists of the trigger moment — the moment of the trigger’s own occurrence — in the speech-external domain, and of the base moment — the moment at which an event in reference occurs — in the speech-internal domain. The target is an interval — the chronal interval - that contains the trigger or base moment or, in the limiting case, coincides with it. A range hearer set the boundaries of this chronal interval. When speech-external, the chronal interval targeted by the trigger can be of three types. It is supersentential if it is longer than and inclusive of the sentence that the trigger appears in; subsentential if shorter than and included within that sentence; and cosentential if coextensive with that sentence.


Author(s):  
Yuan Chen ◽  
Liya Ding ◽  
Sio-Long Lo ◽  
Dickson K.W. Chiu

This article proposes a novel approach that combines user’s instant requirement described in keywords with her or his long-term knowledge background to better serve article selection based on personal preference. The knowledge background is represented as a weighted undirected graph called background net that captures the contextual association of words that appear in the articles recommended by the user through incremental learning. With a background net of user constructed, a keyword from the user is personalized to a fuzzy set that represents contextual association of the given keyword to other words involved in the user’s background net. An article evaluation with personal preference can be achieved by evaluating similarity between personalized keyword set based on user’s background net and a candidate article. The proposed approach makes it possible to construct a search engine optimizer running on the top of search engines to adjust search results, and offer the potential to be integrated with existing search engine techniques to achieve better performance. The target system of personalized article selection can be automatically constructed using Knowware System which is a development tool of KBS for convenient modeling and component reuse.


Author(s):  
Jacek Szklarski ◽  
Łukasz Białek ◽  
Andrzej Szałs

We apply a non-classical four-valued logic in the process of reasoning regarding strategies for cops in a modified game of “Cops and Robber” played on a graph. We extend the game by introducing uncertainty in a form of random failures of detecting devices. This is realized by allowing that a robber can be detected in a node only with the given probability PA. Additionally, with the probability PF, cops can be given a false-positive, i.e., they are informed that the robber is located at some node, whereas it is located somewhere else. Consequently, non-zero PFintroduces a measurement noise into the system. All the cops have access to information provided by the detectors and can communicate with each other, so they can coordinate the search. By adjusting the number of detectors, PA, and PFwe can achieve a smooth transition between the two well-known variants of the game: “with fully visible robber” and “with invisible robber”. We compare a simple probabilistic strategy for cops with the non-parametric strategy based on reasoning with a four-valued paraconsistent logic. It is shown that this novel approach leads to a good performance, as measured by the required mean catch-time. We conclude that this type of reasoning can be applied in real-world applications where there is no knowledge about the underlying source of errors which is particularly useful in robotics.


2020 ◽  
pp. 097215091988645
Author(s):  
Saikat Chatterjee ◽  
Amit Shukla

Workplace stress has always been considered as a potential source of job dissatisfaction and many psychosomatic disorders in employees the world over. The IT sector has emerged as a major contributor to work stress in India over the last 2 decades. Still there is lack of sector-specific studies, and most of the existing studies treat work stress as an umbrella term. Against this background, the objective of this article is twofold: one, to identify different types of stressors, and the other, to rate them according to their severity. The outcome should be helpful in devising proper mitigation strategies. On the basis of findings from the two field studies, the article identifies major stressors among junior level Indian IT professionals ( n1 = 38), and then furnishes a risk profile of these stressors on the basis of their frequency and impact ( n2 = 234). At the end, 21 stressors are identified in the given context, and their ‘riskiness’ is presented in a descending order in terms of risk scores. Implications of findings are discussed at the end. All the stressors were assigned a score in terms of their frequency, impact and risk. At the end, techno-stress emerged as the most serious stressor in both in terms of its frequency of occurrence and impact. The results serve as a guide to the management in the IT firms in addressing the prevalent high levels of stress at workplace. The risk scores will help them in allocating resources and, setting and prioritizing their HR strategies to this end. Amid few studies conducted in the context of stress in the Indian IT sector, this article offers useful and practical insights while deploying a novel approach of risk profiling.


Author(s):  
Bharat Tidke ◽  
Swati Tidke

In this age of the internet, no person wants to make his decision on his own. Be it for purchasing a product, watching a movie, reading a book, a person looks out for reviews. People are unaware of the fact that these reviews may not always be true. It is the age of paid reviews, where the reviews are not just written to promote one's product but also to demote a competitor's product. But the ones which are turning out to be the most critical are given on brand of a certain product. This chapter proposed a novel approach for brand spam detection using feature correlation to improve state-of-the-art approaches. Correlation-based feature engineering is considered as one of the finest methods for determining the relations among the features. Several features attached with reviews are important, keeping in focus customer and company needs in making strong decisions, user for purchasing, and company for improving sales and services. Due to severe spamming these days, it has become nearly impossible to judge whether the given review is a trusted or a fake review.


2015 ◽  
Vol 25 (03) ◽  
pp. 1640022 ◽  
Author(s):  
Steffen Zeidler ◽  
Xin Fan ◽  
Oliver Schrape ◽  
Miloš Krstić

In the design of highly complex integrated circuits (ICs), switching noise is a raising problem. To handle this, current shaping techniques are applied to reduce current peaks causing ground bounce and voltage drops. Such techniques distribute the switching activity by adding phases and/or jitter to the clock of different domains. However, they are usually performed at later phases of the design process, i.e., in the chip layout. In this phase, the timing margins of the logic paths are typically fixed, which limit the clock phases that can be introduced between the domains. In this paper, we present a novel design preconditioning flow, which addresses the optimization of power noise characteristics of a design already at the frontend level. This allows early RTL-level design modifications, e.g., clock inversion or pipeline stage insertion, which potentially facilitate noise mitigation or enhance clock skewing in later design stages.


1996 ◽  
Vol 33 (2) ◽  
pp. 182-198 ◽  
Author(s):  
Peter A. Cawood ◽  
Jeroen A.M. van Gool ◽  
Greg R. Dunning

The Corner Brook–Glover Island region records the development of the internal domain of the Humber Zone and its relationship to the adjoining external domain and Dunnage Zone. The region preserves both the Laurentian margin basement–cover contact and the siliciclastic–carbonate transition within the cover sequence. Precambrian Grenville basement of the Corner Brook Lake Complex is the oldest lithostratigraphic unit and yielded a U/Pb zircon age of 1510 ± 6 Ma. Three main lithostratigraphic assemblages overlie basement: silicic and mafic igneous rocks of the Lady Slipper Pluton which yielded a U/Pb zircon age of [Formula: see text] Ma; siliciclastic lithologies which include the South Brook and Summerside formations; and carbonate-dominated sequences with clastic incursions which include the Port au Port, St. George, and Table Head groups, and the Breeches Pond, Irishtown, and Pinchgut formations. Dunnage Zone units include plutonic ultramafic to mafic rocks of the Grand Lake Complex, dated by U/Pb zircon from trondhjemite at 490 ± 4 Ma, volcanic and epiclastic rocks of the Glover Island Formation, and the Matthews Brook Serpentinite, the latter restricted to fault slivers within the Humber Zone sequence. The deformed Glover Island Granodiorite intrudes the Dunnage Zone rocks on Glover Island and is dated by U/Pb zircon and titanite at 440 ± 2 Ma. Little deformed Carboniferous sedimentary rocks unconformably overlie both Humber Zone and Dunnage Zone rock units. Timing of regional deformation and peak amphibolite-facies metamorphism in the eastern Humber Zone is constrained by isotopic data to the Early Silurian. In the Dunnage Zone, shear zones and foliation development both pre- and postdate the age of the Glover Island Granodiorite, with the later possibly temporally equivalent to deformation in the Humber Zone. Final juxtaposition of the two zones occurred during Carboniferous movement of the Cabot Fault.


Sign in / Sign up

Export Citation Format

Share Document