Date security is the science and study of methods of protecting data in computer and communication systems from unauthorized disclosure and modification. With the introduction of hardware Trojans, ...data security becomes more critical. However Data security has evolved rapidly and have seen exciting developments in cryptography. Various algorithms are adopted for the data encryption and decryption processes for the higher level of security. Data is leaking by accessing the encrypted data over the medium of data transmission, so implementation of high security medium for data transmission has to be developed. Industries developing various techniques for verifying that programs do not leak confidential data. This paper explores a better understanding of the theoretical and practical limitations to security. By considering the pseudorandom property of cryptography, the Linear Feedback Shift Register (LFSR) based designs provides affordable intelligence security testing, facilitating their demand in VLSI chip design. It is analysed to generate maximal length random sequence to provide better cryptography. Pseudorandom sequence generator (PRSG) by LFSRs, encipherment and decipherment simulations are done using 180 nm CMOS process technology in ASIC flow, and validated using simulation results.
The basic operation involved in any analog, digital, control system, DSP’s is addition. Performance and reliability of almost every digital system is depends on performance of adder. Over the decade, ...many adder architectures are proposed and still research work is going on adder to obtain the best results in power, delay and power delay product (PDP). In this paper we proposed one of the fastest adder architecture called Carry Select adder (CSA) and optimization is done for performance parameters like delay and power using GDI (Gate Diffused Input) and MTCMOS techniques. Implementation has been done in standard gpdk 90nm technology using Cadence tool.
Current and future trends in broadband communication, particularly for 5G mobile applications, will include Orthogonal Frequency Division Multiplexing (OFDM) into Radio over Fiber (RoF) technology. ...Its resistance to multipath fading and spectrum efficiency have made Orthogonal Frequency Division Multiplexing a well-known technique. Network spectrum efficiency has been achieved using the modulation format in optical and wireless communication systems. After that, a system was proposed in which four 18Gbps QAM (Quadrature Amplitude Modulation) signals were generated in each transmitter and modulated in continuous wave (CW) using Mach Zehnder Modulator (MZM) before being transmitted over Single Mode Fiber (SMF), which performs significantly high data rates and is cost-effective in accordance with the results modelled.
Present digital world anticipates the high performance, low cost, and low power consumption in the semiconductor industry accompanied with a rapid growth in technology. Nowadays, the economy relies ...on the chip system, so that the semiconductor business enters the innovation in the transistor at each hub and further this innovation comes with a lot of difficulties like reduced quality, manufacturing and multi-faceted planning. Variety with primarily random and organized combinations is one of the essential challenges in assembling the boundaries. One of the most important differences observed from these variants is on-chip variation. During this work, the on-chip variation method was briefly addressed with the aid of CMOS technology.
The monitoring system has become a crucial concept for decision-making and management because of the development of data output in the industrial business. It is possible to use sensor-based ...technologies, such as the Internet of Things (IoT), to monitor the manufacturing process effectively. IoT and Machine Learning (ML) are offered in this study as a solution for monitoring the production system. Specifically, there is a paucity of cloud-based manufacturing equipment that can provide on-demand manufacturing services through the Internet in this study. The technical problems and enabling technologies of cloud-based manufacturing equipment are discussed in detail in this paper. Data from preprocessed time series data is transmitted to cloud services for trend prediction and data completion using a large short-term memory recurrent neural network, a first-order forward difference, and the original sequence of historical data, and the results are returned. In time-series data processing, machine learning may considerably enhance the efficiency and accuracy, as evidenced by the results of the IIoT oil production IIoT system.
A reconfigurable computing system (RCS) is one that can be modified to meet certain functional needs. Reconfigurable electronics, such as reconfigurable field programmable gate arrays (FPGAs), make ...it simple to build such a computer system. Today's computing systems use reconfigurable devices so that they can evolve and adapt to changing application environments while still completing their assigned tasks. First, a reconfigurable robot system is developed, which is aimed at achieving modularity and compactness of the robot modules through the use of a simple yet effective power efficiency estimation-based health and fault detection technique which is used RBIST method. For the purpose of this study, we examined a case study design in the Xilinx ML505 target board to determine the feasibility and complexity of constructing a self-repairing system. The proposed method's efficacy has been demonstrated experimentally.
DDoS attacks pose a serious risk to cloud networks because of the money they might cost if they succeed. For this reason, the Security Research Group has been hard at work creating various detection ...methods to lessen the blow of any future cyberattacks. Cloud computing, often known as internet computing, is a model of delivering computing as a service, in which shared, elastically scalable and virtually hosted servers are made available to users anywhere there is an internet connection. Numerous companies provide cloud services online to meet the needs of various clientele. Since most cloud users lack their own computing capabilities, they must save their data, documents, and applications in the cloud in order to perform their work efficiently. The focus of this work is on the worldwide identification procedure utilising a digital passport in the cloud. There has been and will continue to be significant growth in cloud-based innovation and advancement in the coming years. Users can benefit greatly from cloud computing by delegating complex activities to remote data centers. Whether or not consumers can access the cloud's services is determined by the terms of the Service Level Agreement (SLA) in place between the cloud's suppliers and the users. By detecting when a service level agreement (SLA) has been broken, cloud service providers may boost customer confidence, decrease the likelihood of incurring costly fines, and boost their bottom line. This study makes two significant contributions to the fields of service provider selection for virtual machine (VM) migrations and SLA (service level agreement) violation detection in public cloud computing. The pros and cons of a passport-free international travel system were examined. This study has compared various research methodologies and frameworks for implementing new technologies. The present study is predicated on a Cloud Passport adoption model that was developed for previous work.
Commercial off-the-shelf semiconductor devices cannot supply system solutions provided by ASIC products. Only a few of the most obvious benefits include lower system costs, smaller volumes and ...weights, and improved system performance. An ASIC design solution can sometimes be used in conjunction with analogue or mixed-signal designs, but doing so requires weighing various factors, such as the level of available market technology and quality vs. the investment required to set up a mixed-mode design environment and hire sufficient staff. Two mixed-signal devices have been developed using the proposed approaches, and one of those devices (e.g., ABACUS) is part of an ESPRIT project partially funded by the European Commission.
Operational amplifiers used in voltage follower, switched-capacitor, digital to analog converter is the basic blocks of analog systems. An operational amplifier design depends on the supply voltage ...and gain. The digital circuits greatly benefits from reduction of size and supply voltage while analog circuits depend on the parameters like offset, noise, gain, power consumption and bandwidth for greater benefits. Current mode circuits have high slew rate and wider bandwidth. Therefore, current mode circuits are more preferable than voltage mode circuits as it has a high slew rate and wider bandwidth. The dynamic range of low power operational amplifier is limited by small currents. One of the techniques to make Op-amp very efficient with low power supply voltage without degrading the characteristics use of effective current mirrors. In this paper the various Operational amplifiers with different current mirror loads are analysed and compared. The parameters of Operational amplifier are considered and compared in cadence virtuoso using 180nm technology.