The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The 5G wireless revolution will bring some fundamental changes on the design of handsets and communication infrastructures, delivering over 10 Gbps download speed with unprecedented densely connected wireless devices. The 5G RF transmitters using phased-array MIMO (multiple-input and multiple-output) antennas will demand excellent power efficiency with high integration and linearity at the cm-Wave/mm-Wave...
Impedance spectroscopy is a powerful technique that can be employed to determine the physical properties of different materials. In principle the technique can be implemented in the time domain using pulsed signal excitation rather than sweeping across frequencies. The advantage is particularly apparent when the measuring instrument is either traveling through the material medium rapidly, as in the...
Efficient and smart techniques for analog data acquisition and processing may play crucial role in the design of miniature wearable devices, meant to continuously record, process and wirelessly transmit vital physiological parameters for real time health monitoring. In this work we propose a low-power, all-analog processing unit for an MPG (magneto-plethysmograph) based wearable device, which is meant...
A new technique for computing the truncated cube of an operand at length of power two is proposed, implemented, analyzed, and compared to existing techniques. The new proposed method is comparable to previously proposed methods that compute the cube of an operand in parallel. Post layout results are presented in a 65nm Application Specific Integrated Circuit implementation and are compared against...
Timing leakage can be exploited to break a cryptographic system. Even though timing attacks have been well-researched for the past decade, recent system implementations remain highly vulnerable to these attacks. There is a critical need to develop a framework for automatic evaluation of vulnerability of a design against these attacks, so that integrated circuit designers can understand the vulnerability...
Split-transistor compensation (STC) is introduced as a new compensation technique applicable to power management of Internet-of-Things (IoT) devices. An extension of the split-length compensation (SLC) technique [1]-[3], STC significantly reduces the area of the required on-chip compensation capacitor, while maintaining the two major benefits of SLC: reduced minimum supply voltage and no additional...
Due to the globalized semiconductor supply chain, integrated circuits suffer from hardware security attacks. Among various attacks, hardware Trojan insertions have emerged as a major security concern. An adversary modifies the original circuit to accomplish the malicious intentions through the hardware Trojan. Hardware obfuscation has been demonstrated as a promising technique to strengthen hardware...
This work presents a hybrid and highly adaptive phase locked loop (PLL) system for spin torque oscillators (STO) which are candidates for the next technological implementation of microwave applications. PLL operation is successfully demonstrated in the lower ultra high frequency (UHF) band using a vortex based STO revealing an in-band phase noise of less than −80 dBc/Hz and PLL bandwidth of 2.5 MHz...
This paper reviews our portable multi-dimensional nuclear magnetic resonance (NMR) spectroscopy system combining a 4-mm2 CMOS NMR spectrometer integrated circuit (IC) and a permanent magnet. The work was first reported in [1] with emphases on overall system development and spectroscopy experimentations. Here we pay more attention to the IC design. The scalability of the integrated spectrometer can...
Runtime hardware Trojan detection techniques are required in third party IP based SoCs as a last line of defense. Traditional techniques rely on golden data model or exotic signal processing techniques such as utilizing Choas theory or machine learning. Due to cumbersome implementation of such techniques, it is highly impractical to embed them on the hardware, which is a requirement in some mission...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.