Evaluating the Effectiveness of Detecting Small Delay Defects Using Signature Analysis Technique and Scan Design
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 10
Abstract
This paper presents a delay measurement technique using signature analysis, and a scan design for the proposed delay measurement technique to detect small-delay defects. The proposed measurement technique measures the delay of the explicitly sensitized paths with the resolution of the on-chip variable clock generator(VCG). The proposed scan design realizes complete on-chip delay measurement in short measurement time using the proposed delay measurement technique and extra latches for storing the test vectors. The evaluation with Rohm 0.18- m process shows that the measurement time is 67.8% reduced compared with that of standard delay scan design on average. The area overhead is 23.4% larger than that of the delay measurement architecture using standard scan design, and the difference of the area overhead between enhanced scan design and the proposed method is 7.4% on average. The data volume is 2.2 times of that of test set for normal testing on average.
Authors and Affiliations
Kotapati Saini, G. Suseelamma, P. Bala Murali Krishna
slugOffline Handwritten Sanskrit Character Recognition
In this paper, we describe the procedure of developing dataset for offline handwritten Sanskrit character recognition. There is no standard dataset available for handwritten characters. Researcher has to develop own cha...
A Novel Approach to Increase the Embedding Capacity in Digital Watermarking Using DWI-IWT
watermarking is a development that supplements cryptography by embeddings impalpable flags in work. Information covering strategies have starting late ended up being imperative in different application zones. Propelled...
Innovation Scores High: HR Practices in Contemporary Industries to Battle the VUCA’S Burst
The VUCA concept which entails Volatility, Uncertainty, Complexity and Ambiguity gained relevance in the private sector with the onset of the financial crisis in 2008-2009, when companies and organizations all over the...
Security Information and Assurance in a Cloud Computing Environment
Cloud computing is the use of computing resources that are delivered as a service over a network. Today, cloud computing generates a lot of excitement. It is both promising and daunting. Businesses world see its potenti...
A Novel Cryptography Scheme Based on Decomposition of an Image or Its Transformed Version to be watermarked
Cryptography and watermarking are two key aspects for information hiding to communicate secure information from one source to other source over network. The communication over network is very secure due to these techniq...