Fig 1 - uploaded by Ramachandran Manickam
Content may be subject to copyright.
Latch D implementation using floating-gate transistors

Latch D implementation using floating-gate transistors

Source publication
Article
Full-text available
Sequential logic is essential in many applications as data processing for speech recognition in cochlear implants. In this paper, a family of latches based on floating-gate MOS (FGMOS) transistors is presented. This family takes advantage on the fact that FGMOS logics process data using mostly passive devices, achieving small area and low-power, re...

Context in source publication

Context 1
... used as comparator. While the input FGMOS transistors process data, the p-MOS semi-latch ensures a valid output. If eventually the FGMOS transistors are turned off by inducing the appropriate offset to their floating gates, the last output data is stored by the p-MOS semi-latch until the next computation be carried. To achieve this process, a control gate is added to the FGMOS transistors. If this control gate is connected to ground, the weighted sum of input voltages will be too low to turn any of the FGMOS transistors on. According to the above, the D latch shown in Fig. 1 is proposed. While normal operation, SET and RST in- puts are normally set to 0. As these inputs have twice the weight of the rest of the inputs, the FGMOS transistors threshold voltage can only be reached when the clock input (Ck) is in a high state. If Ck and SET/RST inputs have a low state, no matter the state of the input D, both transistors will be off and the data at the outputs will be retained. If eventually Ck flips to a high state, the state of D will be large enough to trigger the latch. In the case that SET or RST has a high state, a change at the output will occur immediate- ly; as these inputs has twice the weight of the other inputs will override the state of D or Ck. To achieve the set or reset process, Ck needs to be low to avoid the possibility that both input FGMOS transistor be turned on simultaneously resulting in an invalid output. Due to their small transistor count, the proposed latch solve prob- lems as body effect; implementations as CMOS or pass-transistor latches uses long chains of series transistors, resulting in a degra- dation of the output data. To restore output noise, buffers can be used. Although this solution can effectively restore output levels, it will increase both power and delay of the gate. Whenever the clock input Ck has a high state, the first D latch will pass the input data to its output. If Ck flips to zero, the input data will be stored at the first latch. Simultaneously, the second D latch will pass the held data to the output Q. When Ck flips back to high, the first gate will admit a new input data while the output latch will be holding the last output state. Fig. 3 and Fig. 4. The latching operation is realized by two cross coupled inverters. The feedback of the inverters will make possible the data holding. To modify the stored data, pass- gate transistors at the input of each of the two D latches are used. When Ck have a high state, the first pass-gate will allow data acquisition by the first latch while isolate the second. If Ck chang- es to low, the first latch will hold the last input data, passing through the second latch to the output Q. When a Set/Rst proce- dure is carried out, the feedback loop between the latching invert- ers is opened. Once the feedback loop is open, the Set/Rst data is applied. When this procedure is finished, the feedback loop is restored. As well as the previous circuits, it consists in two D latches in series. This implementation requires five transistors in series, making the flip-flop to operate at very low frequency. Besides, the power requirement rises, making the imple- mentation not suitable for low voltage. The voltage re- quirement, the transistor tree height and the large count of transistors and switching nodes, makes this implementation improper for energy efficient battery driven applications Simulations were performed using SPICE with an ON- Semiconductors 0.5 ?m CMOS technology. To achieve realistic results, the technique discussed in (Rodriguez-Villegas, Huertas, Avedillo, Quintana and Rueda 2001) is employed for simulation of floating-gate transistors. For each of the implementations, a load similar to a flip-flop of the same family was used at the out- put. Fig. 5 shows the simulation results for all of the flip-flop im- plementations. Even when FGMOS and CMOS were able to work at lower voltage, the simulations were performed at 3.3 volts. The long transistor chain of CPL implementation was not able to work properly below this voltage By using a high gain amplifier as comparator, PFFGL is able to use the smallest transistors allowed by the technology. This condi- tion let using small input capacitances for the FGMOS transistors, achieving the smallest input capacitance of the comparison. The resulting input capacitance of the PFFGL flip-flop is less than 19 fF. Low voltage and small capacitance internal nodes allow PFFGL to show significant improvements in power characteristics. Fig. 6 is show an energy comparison between all the flip-flop implementations. CPL showed the worst case, consuming an amount of energy equal to 10.67 pJ along the test cycle. CMOS showed similar power characteristics, wasting 10.39 pJ along the cycle. The best power performance was reached by the PFFGL implementation, with a reduction of 28% in energy consumption resulting in an energy waste of 7.69 pJ. It was expected CMOS to have the worst performance in the comparison due to its large count of transistors and the long transistor trees. Even though, CPL resulted to be the worst case in voltage and power consump- tion. Table 1 shows the comparison of the three flip-flops. Can be seen that the floating gate flip-flop have the smaller transistor count in the comparison, requiring an area of 51 X 28 ?m2. Be- sides the area reduction due to a small transistor count, there is an improvement due to a simplification of routing. Smaller devices and simplified routing leads to improvements in circuit ...

Citations

... 30: CPL D-Flip -Flop implementation[57] ...
... They have suggested overcoming the issue with encryption, access control and key management. In this article [10] the researchers analyzed the issues and challenges in mobile computing. Its threats are identified as application based threats, web based threads, network threats and physical threats. ...
Conference Paper
In the recent era, usage of mobile device is increasing rapidly. People are enjoying the services provided in the mobile device and mobile applications. Cloud services can incredibly upgrade the computing capability of portable gadgets so the mobile applications are depending on the cloud to provide the operation like machine learning algorithms of data mining, big data, multimedia and ad hoc network. There are many issues and challenges while providing mobile services such as security and protection are major concern to give more attention. The perspective of this article is to explore the difficulties in mobile computing architectures and to evaluate the applicability of current security systems and to achieve solution toward it. There are three phases as the new architectural data service mechanism is proposed in the first phase. Time and Identity based proxy re-encryption with all or nothing transform scheme (TIB-PRE-AONT) efficiently achieved both of the secrecy and access control of data, secondly Cipher text policy attribute based encryption (CP-ABE) access control scheme is used and implement with k medoid clustering algorithm. Thirdis an Efficient and Optimal Fixed-Length Ciphertext-Policy Attribute-Based Encryption used for security with fuzzy clustering based Data Encryption Strategy for Big Data in Mobile Cloud Computing as a scheme, which used Whale Optimization Algorithm (BS-WOA) is used for the security key. The efficiency of the proposed methods proved from the comparison analysis results.
... Re-enactment comes about appear that the proposed ee-eeca steering convention performed superior thaneeeca. Veeralakshmi et al. [11], [12], [13] discussed the mechanisms to ensure confidentiality and integrity of dynamic data.To identify the eavesdropping attackers, determination of number of attackers, localization of multiple adversaries and eliminating them. Aggressors who have diverse areas at that point the authentic remote hubs are concerned, spatial Data is utilized not as it were to distinguish the nearness of spoofing [8] assaults but moreover to localize enemies. ...
Conference Paper
Remote listening in assaults aresimpletodispatch,itplaysacriticalpath within the execution of remote sensor systems. In spite of the fact that the personality of a hub can be confirmed through cryptographic confirmation, routine security approaches are not continuously alluring since of theiroverhead prerequisites .the challenging errands in remote sensor arrange are recognizable proof of listening stealthily assailants, assurance of number of aggressors, localization of different enemies and killing them .the clustering approach is utilized to identifythelisteningstealthilyassailantsand localize them. This approach fails flat to anticipate the assailants precisely .to overcome this issue, this venture proposes interruption location framework (ids)to identify the listening stealthily assailants. The cluster head act, as ids to screen the behaviour of hubs in their cluster such as parcel transmission which makes a difference to recognize the getting out of hand hubs in remote sensor arrange. The recreation result clearly appears that the proposed plot recognizes the spying assailants in remote sensor organize proficiently and vigorously.
... MCS rule had already implemented in Multi-device strength structures with decentralized manipulated method to damp the device oscillation [13,[30][31]. Adaptive controller used as an extra controller in conjunction with a standard fixed parameter controllers [17][18][19][20][21][24][25][26][27][28][29].At the same time, as the conventional regulators adjust the conventional frequency as well as voltage, the additional regulator is hired to remove the struggling of disturbance at regular working condition. Hence, a replacement design is used to support the MCS algorithm for the additional PSS employed for a better order power grid. ...
Conference Paper
In this paper a substitute to access the accommodative neutralize victimization Minimal Control Synthesis (MCS) algorithmic rule in the case of a synchronous power deviceis intended. In hyper stability, the MCS algorithmic rule becomes an extension which mainly depends upon a reference model management. The major advantage of the algorithm rule is to provide easy and elegant structure with minimum number of steps to be implemented in the system. Both proportional as well as integral controllers are used to adjust the hyper stability conditions by changing the plant parameters, applying disturbances and plant non-linearity's. In addition, the hyper stability system promises to give stable condition at flexible to a lower place a disturbance. The system consists of synchronous machine connected to infinite bus system. Simulation studies verify that every electrical device and speed governor controls the controller's energy for damping machine oscillations induced by power system disturbances.
... The model proposed was time-consuming and cost-effective. Malapert et al [9] proposed a costeffective and smart trash bin to ensure waste handling. The authors added a range of modules, such as Arduino nano, ultrasonic sensors, and a GSM module because of the system under IoT operation. ...
... This will boost energy efficiency, lower energy costs and promote sustainability [8]. Enhance citizen communication: Digital assistants used for various messages applications such as Messenger, Slack, We Chat allow real-time analysis of needs and conduct that enhance citizen interaction, Help to protect the environment, where AI use enables carbon footprint to be minimized, sustainable development to be encouraged, water filtration systems optimized, construction plans enhanced, renewable energy storage improved, environmental modeling systems modeled, etc [9] ...
... In these areas, AI's significance in maximizing transportation capacity with various smart solutions resulting from several studies [7].Public safety and cyber security: Although investments in smart technology have increased, many of these technologies are introduced without rigorous testing, which often overlooks safety and cyber security [5,6]. However, has noted that AI usage can solve a variety of cyber security problems through multiple frauddetection techniques, such as: Prevention of crime, prediction of abuse, Improvement of the control standard.Education: AI would be instrumental by providing intelligent "cognitive tutors" and increasing student success in certain tasks and through the use of master learning algorithms and virtual assistants, supporting personal learning, automated course preparation, automate multiple tasks, such as assessments and corrections, etc [9].Capital supervision: is a great challenge for organizations such as towns and cities to supervise different types of officers governed by various conventions [8,5].In screening, recruiting & management, for instance, AI can be used.In other words, AI can be used to coordinate and schedule possible applicants to seek the right people or allow staff managers to predict the impacts of talent decision-making and consider high potential jobs, unearth commitment issues, etc Health care: AI can be used for various purposes, for example, improvement in data analysis and prediction to enhance patient outcomes, increased efficacy of the medical care system, the development of personalized caregivers who provide the appropriate information in real-time for each patient, etc. ...
Conference Paper
Full-text available
Sustainable construction of urban smart cities can be strongly promoted by artificial intelligence. The different rising areas of AI have helped to turn traditional cities into smart cities with high levels of equipment. AI algorithms allow large volumes of data to be processed and patterns and functions which remain undetected by conventional approaches to be detected. Given the lack of confidence of engineers is generally transparent AI processes; application of the AI algorithms to smart monitoring is still limited. The management of waste is one of the biggest challenges facing the world regardless of developed countries or developing countries. This paper presents and analyzes the effect and insights on the implementation of artificial intelligence as creative approaches for production and deployment of smart city projects. The population rise has led to a significant deterioration in the hygiene situation of the waste management system. The goal of this article is to establish an efficient waste management system conceptual framework by applying artificial intelligence (AI) that could evaluate an acceptable technology for the implementation of waste products.
... unfilled polymers needle design chains shear decay experience mainly melting zone cross-sectional area reduction due to solid-liquid boundary area interior moving towards this regime trapped in polymers rotate stretch finally dependent image systems Frozen [2] . expelled mass a cold press pressing then granulated cooled 190 C 33-ton Cincinnati Milacron injection molding machine using particles ASTM standard models Samples testing prior least three days 20% humidity 32 ° C stored sample dimensions respective ASTM standards accordance [3]. In these studies, the infusion of approximate orientation compounds Made from molding and aligned fibers. ...
Conference Paper
Cooling rate data can be quantitatively classified by mitigation factor analysis (QFA). QFA can characterize a particular alloy by a value of the severity of a particular audit, In general, the smaller the mitigation factor, the higher the mitigation rate. This study includes injection molding, mechanical properties, polymer matrix scale. It is usually mass-produced compounds, crystallization, Injection mold design is a manufacturing process for manufacturing parts on a large Used in processes, same their area is formed Thousands in succession or a million times. The mechanical properties of an object are usually tested under given loads.polymer matrix is a continuous phase of compounds reinforcing agent in place keep Used most of degradation processes Crystallization is defined as a process, this allows a chemical to be transferred from a liquid solution to a solid crystalline state.
... Second, the mobile service network is restricted commercially and has no international treatise for unrestricted use even in case of emergencies. Several alternative routing solutions have been proposed to establish communication in disaster management services [7][8][9][10][11][12] but they have been rarely adopted during disasters. In this paper, authors propose an innovative communication solution using cloud-based unrestricted mobile assistance during disasters for rescue volunteers and people. ...
Article
Full-text available
The mobile communication networks and towers go down or cease to exist leading to poor connectivity during disasters. When communication becomes paralyzed, it is vital to build a disaster relief solution with available resources. Without data connectivity, it is essential that an emergency protocol should be implemented by the government that uses the available paralyzed communication resources spread across various communication networks by pooling to form one single communication network backed by cloud facilities to restore connectivity. In this paper the authors introduce a new emergency protocol approach to design an unrestricted cloud-based mobile technology during disaster enabling instant communication services to the disaster zones that works best under the command of the government. This protocol can act faster than the existing communication network put in place for public communication, with the additional advantage of being more robust and capable of withstanding disaster conditions.
Conference Paper
Majority of the power loads at large independentunits comprises of lightning, fans and other electronic devices. These loads require a power backup in case of intermittent power cuts. A Diesel generator is commonly used to provide backup in large independent units. A Solar DC System is suggested in this paper which provides a useful way of energy efficient new able alternative for power backup. Even though a solar off-grid system has been introduced earlier, this systemis ineffective and expensive. The solar off-grid system wastes a considerable amount of power by banking on AC to DC andDCtoACconversionstoprovidebackupforAChomeloads. An overall loss of 25 to 30 percent is contributed by various conversion stages in solar off-grid. The suggested solar DC system addresses the issue of eliminating the conversion lossesfor continuous operation of DC appliances. Also, this solar dc system reduces the overall size of solar panel and battery to 2 to 2.5times.
Conference Paper
The daily increase of vehicles in roads has made the manufacturers to inculcate advanced safety features which are controlled electronically based on all situation in traffic. Accidents caused by the unconsciousness of driver is also controlled when vehicle goes unstable. The accident caused by drunk and drive cases can also be reduced by placing a detector in the vehicle. The closing and opening time of eye of the driver is monitored and it is used for determining whether the driver is drowsy or steady in driving by using an infrared sensor as an eye glass. If the driver fell unconscious, the system will automatically rise an alarm signal simultaneously reducing the speed of vehicle. The use of Arduino microcontroller will control the sensor to avoid obstacles and to avoid collision with human beings. This work is also focuses on usage for effective headlamp based on detection of headlight especially during peak traffic period.
Conference Paper
The end effectors and grippers are the critical components of the robot and it must be properly designed according to the application requirement. So selecting a suitable gripper for the specific task is an important criterion. This research paper gives a complete study of the earliest to modern grippers using various mechanisms and technologies. In this paper, we focus on and discuss the grippers based on the methods used for gripping, materials used in the gripper and the mechanisms involved in the gripper. We have discussed the method and mechanism of grippers from the older two-fingered gripper to the latest granular jamming type universal gripper. The main objective of this research paper is to analyze the mechanisms, working, advantages and applications of various grippers so that specific grippers can be used for the particular operation.