combinational circuits
Recently Published Documents


TOTAL DOCUMENTS

782
(FIVE YEARS 72)

H-INDEX

35
(FIVE YEARS 2)

Author(s):  
Daniel Etiemble

For more than 60 years, many ternary or quaternary circuits have been proposed based on similar assumptions. We successively examine four of these assumptions and demonstrate that they are wrong. The fundamental reason for which m-valued combinational circuits are more complicated than the corresponding binary ones is explained. M-valued flash memories are used in USB devices because access times in not critical and a trade-off is possible between access time and chip area. If m-valued circuits are reduced to a very small niche in the binary world with semi-conductor technologies, there is a significant exception: quantum devices and computers are a true breakthrough as qbits are intrinsically multivalued. Successful m-valued circuits need m-valued devices as qbits.


2021 ◽  
Author(s):  
V. Zolnikov ◽  
I. Strukov ◽  
K. Chubur ◽  
Yu. Chevychelov ◽  
A. Yankov

This article discusses the development of effective methods and tools for assessing the fault tolerance of logical circuits, the mechanism of logical masking, the development of the route of re-synthesis of combinational circuits, methods for increasing fault tolerance. A method of iterative circuit modification is proposed, due to an increase in the level of logical masking of the circuit.


2021 ◽  
pp. 801-810
Author(s):  
S. Saiteja ◽  
Md. Munwar ◽  
Y. MadhukarReddy ◽  
A. PramodKumar

2021 ◽  
Author(s):  
Duarte L. Oliveira ◽  
Nicolly N. M. Cardoso ◽  
Gracieth C. Batista

Informatics ◽  
2021 ◽  
Vol 18 (3) ◽  
pp. 7-17
Author(s):  
L. A. Zolotorevich ◽  
V. A. Ilyinkov

Integrated circuits, systems on a chip are the key links in various industrial systems and state defense systems. The emergence of counterfeit integrated circuits, problems of piracy, overproduction, unauthorized interference in the design of microcircuit, hardware Trojans require the development of methods and means of their timely detection. Trojans can be introduced into the integrated circuits structure both on the development stage and during the production process, including the stages of specification, design, verification and manufacturing. The inclusion of additional elements in the integrated circuits structure jeopardizes the functional suitability and reliability of the system as a whole. For the purpose of hardware protection of projects, the methods of hardware coding are currently used.The paper discusses the features and reliability of logical coding of combinational circuits. An algorithm for cracking the code of combinational circuits is proposed, based on the description of encoded structure by the resolution function and reducing the problem to SAT CNF. The initial data for decoding the structure of a digital device is the structural implementation of encoded circuit, obtained, for example, by reverse engineering (prototype design), as well as an activated physical sample of an integrated circuit, when into protected from unauthorized access memory the correct key value is loaded. This sample can be used as a black box model. The main idea of breaking a key is to solve a problem without research on a large interval of values of input and output variables.


2021 ◽  
Vol 7 (3) ◽  
pp. 452-476
Author(s):  
R. B. Abdullaev ◽  

The article examines the methods of production of functional control systems for logic combinational circuits with full detection of any single faults using the error detection properties of polynomial codes. A classification of special generators of polynomials that form codes with a small value of the control vector length and complete identification of errors of a certain type or multiplicity is presented. A method is presented for constructing a functional control system with complete identification of single faults based on the complete detection of triple errors by polynomial codes. Algorithms for the search and formation of controllable H1-, H2- and H3-groups of circuit outputs, taking into account the properties of polynomial codes, have been developed. The types of functional dependence of the operating outputs for combinational circuits are listed, in which errors of various types can occur. Based on the detection of any symmetric and asymmetric errors by polynomial codes, a method is presented for the constructionof functional control systems with full identification of these type of errors. For an approximate scheme, the development of a functional control system based on the proposed methods is given as:-


2021 ◽  
Author(s):  
Tobias Schladt ◽  
Nicolai Engelmann ◽  
Erik Kubaczka ◽  
Christian Hochberger ◽  
Heinz Koeppl

Genetic design automation methods for combinational circuits often rely on standard algorithms from electronic design automation in their circuit synthesis and technology mapping. However, those algorithms are domain-specific and are hence often not directly suitable for the biological context. In this work we identify aspects of those algorithms that require domain-adaptation. We first demonstrate that enumerating structural variants for a given Boolean specification allows us to find better performing circuits and that stochastic gate assignment methods need to be properly adjusted in order to find the best assignment. Second, we present a general circuit scoring scheme that accounts for the limited accuracy of biological device models including the variability across cells and show that circuits selected according to this score exhibit higher robustness with respect to parametric variations. If gate characteristics in a library are just given in terms of intervals, we provide means to efficiently propagate signals through such a circuit and compute corresponding scores. We demonstrate the novel design approach using the Cello gate library and 33 logic functions that were synthesized and implemented in vivo recently. We show that an average 1.3-fold and a peak 6.5-fold performance increase can be achieved by simply considering structural variants and that an average 1.8-fold and a peak 30-fold gain in the novel robustness score can be obtained when selecting circuits according to it.


Sign in / Sign up

Export Citation Format

Share Document