Google Groups
asicdesign2vlsi
Visit this group
Google Groups
Subscribe to asicdesign2vlsi
Email:
Visit this group

Saturday, September 19, 2020


 sathish kumar 

Sunday, July 19, 2009

VLSI Society

The VLSI Society has successfully held its EDA software and design contest at this year's 22nd international conference on VLSI design and embedded systems. The contest is the first of its kind and it provided a platform for individuals and teams to showcase their skills and innovative ideas in the EDA arena.

The results are as follows:

1) EDA contest winners

- 1st Prize (Rs 20,000) was awarded to C. Karfa, D. Sarkar and C. Mandal from IIT Kharagpur for SAST: An Architecture Driven High-Level Synthesis Tool

- 2nd Prize (Rs. 15,000) was awarded to Anupam Bakshi from Agnisys for IDesignSpec

2) Nripendra Nath Biswas – Best Student paper award was awarded to Tameesh Suri and Anneesh Aggarwal from SUNY Binghamton for their paper entitled Improving Scalability and per-core performance in multi-cores through resources sharing and recognition

3) Honourable mention award was given to Subramanian Rajagopalan, Sambuddha Bhattacharya and Shabbir Batterywala from Synopsys for their paper entitled Efficient Analog/RF Layout closure with compaction based legalisation

4) Arun Kumar Chowdhury- Best paper Award was gvien to Nilanjan Mukherjee and Jenusz Rajski from Mentor Graphics, and Artur Pogiel and Jerzy Tyszer from Poznan University of Technology for their paper entitled High speed on-chip event counters for embedded system

5) Design Contest winner

- 1st Prize (Rs. 20,000) was awarded to Genemala Haobijam and Roy Paily from IIT Guwahati for Design of Multilayer Pyramidically wound Inductor and Fully Integrated 2.4GHz VCO in UMC 0.18um RFCMOS Process

- 2nd Prize (Rs. 15,000) was awarded to Chester Rebeiro from IIT-Chennai and Debdeep Mukhopadhayay from IIT-Kharagpur for High Performance Elliptic Curve Cryptographic Processor for FPGA Platforms

- 3rd Prize (Rs. 10,000) was awarded to Amilt Pande & Joseph Zambreno from lowa State Univ, USA for Novel Polymorphic Reconfigurable Hardware Support for Discrete Wavelet Transform

read more on VLSI 2009...



votes: 0
Comment on "VLSI 2009 unveils results of EDA contest"
Comments:
*Verify code:

  1. VLSI 2009: Pushing India's design potential(2009-02-02)
  2. Hardware UART for the TMS320C3x(2001-05-03)
  3. Simulate embedded hardware acceleration(2007-04-18)

Tuesday, July 7, 2009

baby


framework.

changed!Check out our new look!
www.verilogcourseteam.com.

google_protectAndRun("render_ads.js::google_render_ad", google_handleError, google_render_ad);

Friday

SIMULATION MODEL OF VISIBLE WATERMARKING FOR JPEG IMAGE (3 D) USING VLSI/MATLAB
Watermarking is the process that embeds data called a watermark, a tag, or a label into a multimedia object, such as images, video, or text, for their copyright protection. According to human perception, the digital watermarks can either be visible or invisible. A visible watermark is a secondary translucent image overlaid into the primary image and appears visible to a viewer on a careful inspection. The invisible watermark is embedded in such a way that the modifications made to the pixel value is perceptually not noticed, and it can be recovered only with an appropriate decoding mechanism. This project presents a new very large scale integration (VLSI) architecture for implementing two visible digital image watermarking schemes. The proposed architecture is designed to aim at easy integration into any existing digital camera c

Sunday, May 10, 2009

http://vlsitsa.itri.org.tw/2009/General/


The Industrial Technology Research Institute (ITRI) will sponsor the 16th International Symposium on VLSI Technology, Systems and Applications (2009 VLSI-TSA) from 27 to 29 April 2009 at the Ambassador Hotel in Hsinchu, Taiwan. The symposium program will cover 2.5 days technical sessions including 3 plenary talks, two special sessions focusing on Green Devices and Next Generation Lithography, and numbers of contribution sessions followed by a half-day short course. The Best Student Paper Award for the 2008 Symposium will be presented at the opening of the symposium and the Best Student Paper Award for the 2009 Symposium will again be selected during the conference.

The conference is proud to create an annual platform for technical exchanges by experts from all over the world on the advancements in semiconductor research, development, and manufacturing.

The 2009 VLSI-TSA will hold a joint-opening with the International Symposium on VLSI Design, Automation and Test (2009 VLSI-DAT), joint keynotes from both design and technology field will give penetrating speeches to all the audience.

The highlight of three keynote speeches shows below:
  • Dr. Mark Pinto, Applied Materials, USA
    Topic: Has The Sun Finally Risen on Photovoltaics?
  • Dr. Rene Penning de Vries, NXP, The Netherlands (Joint Keynote)
    Topic: From Living Faster to Living Better
  • Dr. Ken Uchida, Tokyo Institute of Technology, Japan
    Topic: Carrier Transport and Stress Engineering in Advanced Nanoscale MOS Transistors
  • With its Hsinchu Science-based Industrial Park, in 2007 Taiwan generating over 68.0% of the global semiconductor foundry revenue, 25.1% of the world DRAM production revenue, 23.7% of fabless revenue, and 53.0% of independent IC packaging revenue, Taiwan is doubtlessly one of the major dynamos of the semiconductor industry on this planet. Join us at the VLSI-TSA technical programs as well as the culture tour to experience historic Hsinchu city, in which the technical and cultural atmosphere have been harmoniously connected.

    The 2008 VLSI-TSA has successfully attracted about 500 attendees with a very high-quality program featuring three keynote speeches, two special sessions, 22 invited talks, nine technical sessions with 54 technical papers presented, and two short courses. Both the contributing and invited papers are of high quality, and are presented by industrial and academic leaders and students from over 10 countries..

    Starting 2006, the VLSI-TSA split its design segment to become the International Symposium on VLSI Design, Automation and Test (VLSI-DAT). For more details about VLSI-DAT, please visit the website at http://vlsidat.itri.org.tw
    Sponsored by
    • Industrial Technology Research Institute, Taiwan
    • Dept. of Industrial Technology, MOEA, Taiwan
    • Ministry of Education, Taiwan
    In cooperation with
    • Chinese Institute of Electrical Engineers
    • IEEE Circuits and Systems Society
    • IEEE Circuits and Systems Society Taipei/Tainan Chapter
    • IEEE Computer Society Taipei/Tainan Chapter
    • IEEE Electron Devices Society
    • IEEE Electron Devices Society Taipei/Tainan Chapter
    • IEEE Solid-State Circuits Society
    • IEEE Solid-State Circuits Society Taipei/Tainan Chapter
    • IEEE Taipei/Tainan Section
    • Taiwan IC Design Society
    • Taiwan SoC Consortium
    Inquiries
    Requests for information about VLSI-TSA should be directed to :
    Ms. Clara Wu
    Symposium Secretariat
    Room 333, Bldg., 11, 195-4, Sec. 4,
    Chung Hsing Road
    Chutung, Hsinchu, Taiwan
    Tel: +886 3 591-9046
    Fax: +886 3 582-0221
    E-mail: vlsitsa@itri.org.tw
    Final Program is now downloadable!
    Early bird registration is extended to April 10th!
    Conference Advance Program
    Call for Late News

    2009 VLSI-TSA Presentation Guidelines

    IEEE Copyright Form

    Professor Statement


    Date :
    VLSI-TSA April 27-29, 2009
    VLSI-DAT April 27-30, 2009
    Location : Ambassador Hotel Hsinchu
    188 Chung Hwa Road, Section 2, Hsinchu, Taiwan
    Tel: +886-3-515-1111
    Fax: +886-3-515-1112
    Copyright © 2009 VLSI-TSA

    Wednesday, April 15, 2009

    Subscriber Identity Module (SIM)

    Subscriber Identity Module (SIM)

    One of the key features of GSM is the Subscriber Identity Module, commonly known as a SIM card. The SIM is a detachable smart card containing the user's subscription information and phone book. This allows the user to retain his or her information after switching handsets. Alternatively, the user can also change operators while retaining the handset simply by changing the SIM. Some operators will block this by allowing the phone to use only a single SIM, or only a SIM issued by them; this practice is known as SIM locking, and is illegal in some countries.

    In Australia, North America and Europe many operators lock the mobiles they sell. This is done because the price of the mobile phone is typically subsidised with revenue from subscriptions, and operators want to try to avoid subsidising competitor's mobiles. A subscriber can usually contact the provider to remove the lock for a fee, utilize private services to remove the lock, or make use of ample software and websites available on the Internet to unlock the handset themselves. While most web sites offer the unlocking for a fee, some do it for free. The locking applies to the handset, identified by its International Mobile Equipment Identity (IMEI) number, not to the account (which is identified by the SIM card).

    In some countries such as Bangladesh, Belgium, Costa Rica, India, Indonesia, Malaysia, and Pakistan, all phones are sold unlocked. However, in Belgium, it is unlawful for operators there to offer any form of subsidy on the phone's price. This was also the case in Finland until April 1, 2006, when selling subsidized combinations of handsets and accounts became legal, though operators have to unlock phones free of charge after a certain period (at most 24 months).

    [edit] GSM security

    GSM was designed with a moderate level of security. The system was designed to authenticate the subscriber using a pre-shared key and challenge-response. Communications between the subscriber and the base station can be encrypted. The development of UMTS introduces an optional USIM, that uses a longer authentication key to give greater security, as well as mutually authenticating the network and the user - whereas GSM only authenticates the user to the network (and not vice versa). The security model therefore offers confidentiality and authentication, but limited authorization capabilities, and no non-repudiation. GSM uses several cryptographic algorithms for security. The A5/1 and A5/2 stream ciphers are used for ensuring over-the-air voice privacy. A5/1 was developed first and is a stronger algorithm used within Europe and the United States; A5/2 is weaker and used in other countries. Serious weaknesses have been found in both algorithms: it is possible to break A5/2 in real-time with a ciphertext-only attack, and in February 2008, Pico Computing, Inc revealed its ability and plans to commercialize FPGAs that allow A5/1 to be broken with a rainbow table attack.[13] The system supports multiple algorithms so operators may replace that cipher with a stronger one.

    One of the key features of GSM is the Subscriber Identity Module, commonly known as a SIM card. The SIM is a detachable smart card containing the user's subscription information and phone book. This allows the user to retain his or her information after switching handsets. Alternatively, the user can also change operators while retaining the handset simply by changing the SIM. Some operators will block this by allowing the phone to use only a single SIM, or only a SIM issued by them; this practice is known as SIM locking, and is illegal in some countries.

    In Australia, North America and Europe many operators lock the mobiles they sell. This is done because the price of the mobile phone is typically subsidised with revenue from subscriptions, and operators want to try to avoid subsidising competitor's mobiles. A subscriber can usually contact the provider to remove the lock for a fee, utilize private services to remove the lock, or make use of ample software and websites available on the Internet to unlock the handset themselves. While most web sites offer the unlocking for a fee, some do it for free. The locking applies to the handset, identified by its International Mobile Equipment Identity (IMEI) number, not to the account (which is identified by the SIM card).

    In some countries such as Bangladesh, Belgium, Costa Rica, India, Indonesia, Malaysia, and Pakistan, all phones are sold unlocked. However, in Belgium, it is unlawful for operators there to offer any form of subsidy on the phone's price. This was also the case in Finland until April 1, 2006, when selling subsidized combinations of handsets and accounts became legal, though operators have to unlock phones free of charge after a certain period (at most 24 months).

    GSM security

    GSM was designed with a moderate level of security. The system was designed to authenticate the subscriber using a pre-shared key and challenge-response. Communications between the subscriber and the base station can be encrypted. The development of UMTS introduces an optional USIM, that uses a longer authentication key to give greater security, as well as mutually authenticating the network and the user - whereas GSM only authenticates the user to the network (and not vice versa). The security model therefore offers confidentiality and authentication, but limited authorization capabilities, and no non-repudiation. GSM uses several cryptographic algorithms for security. The A5/1 and A5/2 stream ciphers are used for ensuring over-the-air voice privacy. A5/1 was developed first and is a stronger algorithm used within Europe and the United States; A5/2 is weaker and used in other countries. Serious weaknesses have been found in both algorithms: it is possible to break A5/2 in real-time with a ciphertext-only attack, and in February 2008, Pico Computing, Inc revealed its ability and plans to commercialize FPGAs that allow A5/1 to be broken with a rainbow table attack.[13] The system supports multiple algorithms so operators may replace that cipher with a stronger one.

    Network structure

    Network structure


    The structure of a GSM network

    The network behind the GSM seen by the customer is large and complicated in order to provide all of the services which are required. It is divided into a number of sections and these are each covered in separate articles.

     
    October (78)
  • Floorplanning Methods
  • Featured Case study
  • VLSI AND SYSTEM DESIGN
  • art in VLSI design
  • Chip-Level Thermal Simulator to Predict VLSI Chip ...
  • Floorplanning Methods
  • Featured Case study
  • VLSI AND SYSTEM DESIGN
  • art in VLSI design
  • Chip-Level Thermal Simulator to Predict VLSI Chip ...