Electromagnetic (EM) modeling and simulation techniques for passive linear systems as in 3D ICs and SIPs are presented. On TSVs' we present high throughput analytical 2D admittance (CG) and impedance (RL) models, ...
详细信息
Electromagnetic (EM) modeling and simulation techniques for passive linear systems as in 3D ICs and SIPs are presented. On TSVs' we present high throughput analytical 2D admittance (CG) and impedance (RL) models, with consideration of MOS effect in silicon. These 2D models are computationally useful for parasitic estimates, while the simulation of critical subsystems requires 3D accurate models. We show results from an emerging 3D field solver solution to the computation of the RL matrices with very low overhead on the matrix elements computation, being analytically tractable for cylindrical TSVs. For extraction and simulation of systems containing a significant number of passive elements, the output from field solver is best expressed as passive dynamical models generated with an efficient semi-definite programming algorithm.
Planning production processes for product families (i.e., process family planning) has been recognized as a key to achieving production efficiency. In view of the advantages of Petri nets (PNs) for modeling large syst...
详细信息
ISBN:
(纸本)9781457707407
Planning production processes for product families (i.e., process family planning) has been recognized as a key to achieving production efficiency. In view of the advantages of Petri nets (PNs) for modeling large systems and the potential of knowledge-based systems (KBSs) for solving complex problems, we develop a methodology integrating PNs and KBSs to support process family planning. An integrated product-process family structure, called IP2S, is proposed to organize data pertaining to a product family and the corresponding process family. Accordingly, a PN model integrating the principles of several well-defined PN extensions is further developed to model the dynamics of process family planning (i.e., how production processes are planned for a product family). Based on the methodology, a prototype is developed, and applied to planning production processes for a truck family.
Large test data volume and high test power consumption are two major concerns for the industry when testing large integrated circuits. Linear decompress or-based compression (LDC) is efficient in reducing test data vo...
详细信息
Large test data volume and high test power consumption are two major concerns for the industry when testing large integrated circuits. Linear decompress or-based compression (LDC) is efficient in reducing test data volume, while X-filling during ATPG can efficiently reduce test power with low overhead. However, traditional X-filling methods cannot be reused in the LDC environment. In this paper, we propose a virtual circuit model to make the linear de-compressor transparent to the external testing. As a result, existing X-filling methods can be reused to reduce test power. Experimental results on benchmark circuits demonstrate the efficiency of the proposed approach.
Most developer prefers not to use formal specification (FS) approach in designing a database system. In recent years, these approaches have been seen as rivals, a new consensus has been developed in which software dev...
详细信息
Most developer prefers not to use formal specification (FS) approach in designing a database system. In recent years, these approaches have been seen as rivals, a new consensus has been developed in which software developers are agreed it as complementary. Theoretically this approach can reduce the overall development time, use to provide an unambiguous and precise supplement to natural language descriptions. Focus to this point, it can be rigorously validated and verified leading to the early detection of specification errors or debugs during software development process. Correcting errors at the early development stage is cheaper than modifying a delivered system. A FS could be verified in order to explore the consequences of this specification and potentially find mistakes. After it was done, we have greater confidence that the testing of such system against the actual user requirement specification. This paper discusses the FS of spatial and non spatial Information Databases Integration (SIDIF) model as a case study.
India is a multilingual and multi-script country where a line of a bilingual document page may contain text words both in regional language and in English. Recognition of documents containing multi-scripts is really a...
详细信息
India is a multilingual and multi-script country where a line of a bilingual document page may contain text words both in regional language and in English. Recognition of documents containing multi-scripts is really a challenging task, which needs more effort of the OCR designers for improving the accuracy rate. This paper presents a Bilingual OCR system for printed Malayalam and English text. Here we propose an algorithm which can accept scanned image of printed characters as input and produce editable Malayalam and English characters in a predefined format as output. The image acquired is segmented into line and character-wise using pixel by pixel approach by scanning from top-left of the image to bottom-right. The character image obtained after segmentation is resized to 16 × 16 bitmap which is used for comparison. The database contains characters in various fonts of both the languages. This database is used for comparison with the resized character image. The comparison is done using pixel-match algorithm. The matched character is displayed in the notepad. An efficiency of 87.25% is obtained using this approach.
Inductive Cross-talk within IC Packaging is becoming a significant bottleneck in high speed inter chip communication. So the off-chip drivers typically source and sink 10 to 1000 drive internal loads. Thus simultaneou...
详细信息
Inductive Cross-talk within IC Packaging is becoming a significant bottleneck in high speed inter chip communication. So the off-chip drivers typically source and sink 10 to 1000 drive internal loads. Thus simultaneously switching many off-chip drivers can cause large power(VDD) and ground current surges. These changes in current flow induce a voltage drop on the drivers' local VDD rail and a voltage rise on the drivers' local ground rail. The voltage drop is proportional to both the inductance of the VDD(ground) distribution network and the rate of change of the current flow(V= L * dl/dt). In this work, we proposed a technique to avoid the inductive cross-talk in the interconnect by encoding the data being transmitted off-chip. Bus encoding algorithms have been developed to overcome the capacitive cross-talk for on-chip buses, so the problem of on-chip capacitive cross-talk minimization for busses is very different from that of off-chip inductive cross-talk minimization. In this paper our approach also constructs cross-talk resistant CODEC algorithmically to utilize the memory-based CODEC solution. Here we construct a set of equations which encoded the constraints that any legal vector sequence must satisfy to avoid supply bounce, signal glitching, and signal edge speed degradation. From this set of equations, we construct a set of legal vector sequences for the bus. We use this set to find the largest effective size of the bus that can be achieved by encoding, for a given physical size of the bus. Our experimental results show that the proposed encoding based techniques result in reduced supply bounce and signal degradation due to inductive crosstalk, closely matching the theoretical predictions. As a result the overall delay of the bus actually decreases even after the use of the encoding scheme.
We describe a method based on the wavefront propagation, which computes a multiplicatively weighted Voronoi diagram for a set L of n lines in the plane in O(n2 logn) time and O(n2) space. In the process, we derive com...
详细信息
Collaborative access control is receiving growing attention in both military and commercial areas due to an urgent need to protect confidential resources and sensitive *** access control means that multiple subjects s...
详细信息
Collaborative access control is receiving growing attention in both military and commercial areas due to an urgent need to protect confidential resources and sensitive *** access control means that multiple subjects should participate to make access control decisions to prevent fraud or the abuse of *** approaches to access control cannot satisfy the requirements of collaborative access *** address this concern,we propose an authorization model for collaborative access *** central notions of the model are collaborative permission,collaboration constraint,and collaborative authorization policy,which make it possible to define the collaboration among multiple subjects involved in gaining a *** implementation architecture of the model is also ***,we present effective conflict detection and resolution methods for maintaining the consistency of collaborative authorization policies.
Web usage mining attempts to discover useful knowledge from the secondary data obtained from the interactions of the users with the Web. Web usage mining has become very critical for effective Web site management, cre...
详细信息
Web usage mining attempts to discover useful knowledge from the secondary data obtained from the interactions of the users with the Web. Web usage mining has become very critical for effective Web site management, creating adaptive Web sites, business and support services, personalization, network traffic flow analysis etc., Web site under study is part of a nonprofit organization that does not sell any products. It was crucial to understand who the users were, what they looked at, and how their interests changed with time. To achieve this, one of the promising approaches is web usage mining, which mines web logs for user models and recommendations. Web usage mining algorithms have been widely utilized for modeling user web navigation behavior. In this study we advance a model for mining of user's navigation pattern. The proposal of our work proceeds in the direction of building a robust web usage knowledge discovery system, which extracts the web user profiles at the web server, application server and core application level. The proposal optimizes the usage mining framework with fuzzy C means clustering algorithm (to discover web data clusters) and compare with Expected Maximization cluster system to analyze the Web site visitor trends. The evolutionary clustering algorithm is proposed to optimally segregate similar user interests. The clustered data is then used to analyze the trends using inference system. By linking the Web logs with cookies and forms, it is further possible to analyze the visitor behavior and profiles which could help an e-commerce site to address several business questions. Experimentation conducted with CFuzzy means and Expected Maximization clusters in Syskill Webert data set from UCI, shows that EM shows 5% to 8% better performance than CFuzzy means in terms of cluster number.
When modeling in 3D CAD, architects often search for already existing 3D content to complete their own design, e.g. environmental models, furniture models or detailed window profiles. 3D models are normally indexed an...
详细信息
ISBN:
(纸本)9789068141818
When modeling in 3D CAD, architects often search for already existing 3D content to complete their own design, e.g. environmental models, furniture models or detailed window profiles. 3D models are normally indexed and accessed based on textual metadata. As this metadata is expensive to obtain, PROBADO3D aims to develop workflows and tools for semi-automatic indexing of 3D models. Another goal is the development of intuitive visual search and presentation interfaces that face the needs of architects looking for 3D content. PROBADO3D is a part of the PROBADO framework designed to support multimedia objects of different domains.
暂无评论