3-D Field Programmable Gate Interconnect Faults by Testing and Diagnosis
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 3
Abstract
The emerging three-dimensional (3D) integration technology is one of the promising solutions to overcome the barriers in interconnect scaling, thereby offering an opportunity to continue performance improvements using CMOS technology. As the fabrication of 3D integrated circuits has become viable, developing CAD tools and architectural techniques are imperative for the successful adoption of 3D integration technology. A brief introduction on the 3D integration technology has been proposed, and then reviewed the EDA challenges and solutions that can enable the adoption of 3D ICs, and finally presented the design and architectural techniques on the application of 3D ICs, including a survey of various approaches to design future 3D ICs, leveraging the benefits of fast latency, higher bandwidth, and heterogeneous integration capability that are offered by 3D technology.
Authors and Affiliations
Velpuri Jagathi
Novel Technique to Resolve Energy-Hole Problems in Wireless Sensor Network to Increase Network Robustness
Wireless sensor network is application built network. Wireless Sensor Network can comprise of multiple sinks that may be either mobile or static. If a system has more than one sink, then it will produce the same query i...
A Survey On Human Identification Using Wi-Fi Signal
Human identification is a main issue for health monitoring systems in home. The common of current systems employ either wearable video or tags cameras to detect numerous residents in home atmosphere. However, because of...
Software Effort Estimation using Satin Bowerbird Algorithm
There are various non-linear optimization problems can be effectively solved by Meta-heuristic Algorithms. The Software effort estimation is an optimization problem so it can also be solved by the Meta-heuristic algorit...
Physical Layer Reliability Enhancement based on Deterministic Multicast Algorithm
Wireless transmission has a major loophole of security. Wireless transmission can be readily overheard by unauthorized users for interception purposes and is thus highly vulnerable to eavesdropping attacks. Physical-lay...
DeyPoS: Using Revocable Storage Identity-Based Encryption
Dynamic Proof of Storage (PoS) is a useful cryptographic primitive that enables a user to check the integrity of outsourced files and to efficiently update the files in a cloud server. A practical multi-user cloud stora...