asicdesign2vlsi |
Visit this group |
Subscribe to asicdesign2vlsi |
Visit this group |
Sunday, July 19, 2009
VLSI Society
The VLSI Society has successfully held its EDA software and design contest at this year's 22nd international conference on VLSI design and embedded systems. The contest is the first of its kind and it provided a platform for individuals and teams to showcase their skills and innovative ideas in the EDA arena.
The results are as follows:
1) EDA contest winners
- 1st Prize (Rs 20,000) was awarded to C. Karfa, D. Sarkar and C. Mandal from IIT Kharagpur for SAST: An Architecture Driven High-Level Synthesis Tool
- 2nd Prize (Rs. 15,000) was awarded to Anupam Bakshi from Agnisys for IDesignSpec
2) Nripendra Nath Biswas – Best Student paper award was awarded to Tameesh Suri and Anneesh Aggarwal from SUNY Binghamton for their paper entitled Improving Scalability and per-core performance in multi-cores through resources sharing and recognition
3) Honourable mention award was given to Subramanian Rajagopalan, Sambuddha Bhattacharya and Shabbir Batterywala from Synopsys for their paper entitled Efficient Analog/RF Layout closure with compaction based legalisation
4) Arun Kumar Chowdhury- Best paper Award was gvien to Nilanjan Mukherjee and Jenusz Rajski from Mentor Graphics, and Artur Pogiel and Jerzy Tyszer from Poznan University of Technology for their paper entitled High speed on-chip event counters for embedded system
5) Design Contest winner
- 1st Prize (Rs. 20,000) was awarded to Genemala Haobijam and Roy Paily from IIT Guwahati for Design of Multilayer Pyramidically wound Inductor and Fully Integrated 2.4GHz VCO in UMC 0.18um RFCMOS Process
- 2nd Prize (Rs. 15,000) was awarded to Chester Rebeiro from IIT-Chennai and Debdeep Mukhopadhayay from IIT-Kharagpur for High Performance Elliptic Curve Cryptographic Processor for FPGA Platforms
- 3rd Prize (Rs. 10,000) was awarded to Amilt Pande & Joseph Zambreno from lowa State Univ, USA for Novel Polymorphic Reconfigurable Hardware Support for Discrete Wavelet Transform
read more on VLSI 2009...
- VLSI 2009: Pushing India's design potential(2009-02-02)
- Hardware UART for the TMS320C3x(2001-05-03)
- Simulate embedded hardware acceleration(2007-04-18)
Tuesday, July 7, 2009
framework.
www.verilogcourseteam.com.
google_protectAndRun("render_ads.js::google_render_ad", google_handleError, google_render_ad);
Friday
SIMULATION MODEL OF VISIBLE WATERMARKING FOR JPEG IMAGE (3 D) USING VLSI/MATLAB
Watermarking is the process that embeds data called a watermark, a tag, or a label into a multimedia object, such as images, video, or text, for their copyright protection. According to human perception, the digital watermarks can either be visible or invisible. A visible watermark is a secondary translucent image overlaid into the primary image and appears visible to a viewer on a careful inspection. The invisible watermark is embedded in such a way that the modifications made to the pixel value is perceptually not noticed, and it can be recovered only with an appropriate decoding mechanism. This project presents a new very large scale integration (VLSI) architecture for implementing two visible digital image watermarking schemes. The proposed architecture is designed to aim at easy integration into any existing digital camera c
Sunday, May 10, 2009
http://vlsitsa.itri.org.tw/2009/General/
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Copyright © 2009 VLSI-TSA |
Wednesday, April 15, 2009
Subscriber Identity Module (SIM)
Subscriber Identity Module (SIM)
One of the key features of GSM is the Subscriber Identity Module, commonly known as a SIM card. The SIM is a detachable smart card containing the user's subscription information and phone book. This allows the user to retain his or her information after switching handsets. Alternatively, the user can also change operators while retaining the handset simply by changing the SIM. Some operators will block this by allowing the phone to use only a single SIM, or only a SIM issued by them; this practice is known as SIM locking, and is illegal in some countries.
In Australia, North America and Europe many operators lock the mobiles they sell. This is done because the price of the mobile phone is typically subsidised with revenue from subscriptions, and operators want to try to avoid subsidising competitor's mobiles. A subscriber can usually contact the provider to remove the lock for a fee, utilize private services to remove the lock, or make use of ample software and websites available on the Internet to unlock the handset themselves. While most web sites offer the unlocking for a fee, some do it for free. The locking applies to the handset, identified by its International Mobile Equipment Identity (IMEI) number, not to the account (which is identified by the SIM card).
In some countries such as Bangladesh, Belgium, Costa Rica, India, Indonesia, Malaysia, and Pakistan, all phones are sold unlocked. However, in Belgium, it is unlawful for operators there to offer any form of subsidy on the phone's price. This was also the case in Finland until April 1, 2006, when selling subsidized combinations of handsets and accounts became legal, though operators have to unlock phones free of charge after a certain period (at most 24 months).
[edit] GSM security
GSM was designed with a moderate level of security. The system was designed to authenticate the subscriber using a pre-shared key and challenge-response. Communications between the subscriber and the base station can be encrypted. The development of UMTS introduces an optional USIM, that uses a longer authentication key to give greater security, as well as mutually authenticating the network and the user - whereas GSM only authenticates the user to the network (and not vice versa). The security model therefore offers confidentiality and authentication, but limited authorization capabilities, and no non-repudiation. GSM uses several cryptographic algorithms for security. The A5/1 and A5/2 stream ciphers are used for ensuring over-the-air voice privacy. A5/1 was developed first and is a stronger algorithm used within Europe and the United States; A5/2 is weaker and used in other countries. Serious weaknesses have been found in both algorithms: it is possible to break A5/2 in real-time with a ciphertext-only attack, and in February 2008, Pico Computing, Inc revealed its ability and plans to commercialize FPGAs that allow A5/1 to be broken with a rainbow table attack.[13] The system supports multiple algorithms so operators may replace that cipher with a stronger one.
One of the key features of GSM is the Subscriber Identity Module, commonly known as a SIM card. The SIM is a detachable smart card containing the user's subscription information and phone book. This allows the user to retain his or her information after switching handsets. Alternatively, the user can also change operators while retaining the handset simply by changing the SIM. Some operators will block this by allowing the phone to use only a single SIM, or only a SIM issued by them; this practice is known as SIM locking, and is illegal in some countries.
In Australia, North America and Europe many operators lock the mobiles they sell. This is done because the price of the mobile phone is typically subsidised with revenue from subscriptions, and operators want to try to avoid subsidising competitor's mobiles. A subscriber can usually contact the provider to remove the lock for a fee, utilize private services to remove the lock, or make use of ample software and websites available on the Internet to unlock the handset themselves. While most web sites offer the unlocking for a fee, some do it for free. The locking applies to the handset, identified by its International Mobile Equipment Identity (IMEI) number, not to the account (which is identified by the SIM card).
In some countries such as Bangladesh, Belgium, Costa Rica, India, Indonesia, Malaysia, and Pakistan, all phones are sold unlocked. However, in Belgium, it is unlawful for operators there to offer any form of subsidy on the phone's price. This was also the case in Finland until April 1, 2006, when selling subsidized combinations of handsets and accounts became legal, though operators have to unlock phones free of charge after a certain period (at most 24 months).
GSM security
GSM was designed with a moderate level of security. The system was designed to authenticate the subscriber using a pre-shared key and challenge-response. Communications between the subscriber and the base station can be encrypted. The development of UMTS introduces an optional USIM, that uses a longer authentication key to give greater security, as well as mutually authenticating the network and the user - whereas GSM only authenticates the user to the network (and not vice versa). The security model therefore offers confidentiality and authentication, but limited authorization capabilities, and no non-repudiation. GSM uses several cryptographic algorithms for security. The A5/1 and A5/2 stream ciphers are used for ensuring over-the-air voice privacy. A5/1 was developed first and is a stronger algorithm used within Europe and the United States; A5/2 is weaker and used in other countries. Serious weaknesses have been found in both algorithms: it is possible to break A5/2 in real-time with a ciphertext-only attack, and in February 2008, Pico Computing, Inc revealed its ability and plans to commercialize FPGAs that allow A5/1 to be broken with a rainbow table attack.[13] The system supports multiple algorithms so operators may replace that cipher with a stronger one.
Network structure
Network structure
The network behind the GSM seen by the customer is large and complicated in order to provide all of the services which are required. It is divided into a number of sections and these are each covered in separate articles.
- the Base Station Subsystem (the base stations and their controllers).
- the Network and Switching Subsystem (the part of the network most similar to a fixed network). This is sometimes also just called the core network.
- the GPRS Core Network (the optional part which allows packet based Internet connections).
- all of the elements in the system combine to produce many GSM services such as voice calls and SMS.