{"title":"Battery-aware power savings","authors":"A. Lahiri, A. Basu, M. Choudhury, S. Mitra","doi":"10.1049/ESS:20060201","DOIUrl":"https://doi.org/10.1049/ESS:20060201","url":null,"abstract":"Getting maximum battery life is not just a matter of writing applications for low average power consumption. You can take advantage of power effects to design systems that last longer on one charge. This work has shown that the performance of the text-to-speech engine can be optimized by judicious choice over factors such as word-cluster length. The approach demonstrated using this text-to-speech system can be easily extended to other applications for low-power, mobile embedded systems.","PeriodicalId":132835,"journal":{"name":"Electronic Systems and Software","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126466415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Yielding to design","authors":"P. Marsh","doi":"10.1049/ESS:20060204","DOIUrl":"https://doi.org/10.1049/ESS:20060204","url":null,"abstract":"Only by pre-empting yield issues at an early stage can future designs come in under budget - an emerging breed of tools and modeling techniques may hold the answer. Yield-aware synthesis tools provide an opportunity to perform a more wholesale logic optimization and restructuring, maximizing yield concurrently with other design goals.","PeriodicalId":132835,"journal":{"name":"Electronic Systems and Software","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129174426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Watch your watts","authors":"Philip J. A. Ling","doi":"10.1049/ESS:20060502","DOIUrl":"https://doi.org/10.1049/ESS:20060502","url":null,"abstract":"The European Commission has taken aim at the excessive power used by electronic equipment in its latest directive. Over the last 10 years, electronics designers have had to deal with a growing list of regulations derived from European Union directives. We have had the electromagnetic compatibility (EMC) and low-voltage (LVD) directives; the radio and telecommunications terminal equipment (RT and in the last few years the regulation of hazardous substances (RoHS) and waste electrical and electronic equipment (WEEE) directives. Don't think that the list is not set to grow more.","PeriodicalId":132835,"journal":{"name":"Electronic Systems and Software","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129953480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Opening up the black box","authors":"Andrew Dauman","doi":"10.1049/ESS:20060503","DOIUrl":"https://doi.org/10.1049/ESS:20060503","url":null,"abstract":"Since semiconductor intellectual property (IP) first emerged on the integrated circuit (IC) design scene over a decade ago, it has offered the promise of shaving months off of development time while allowing for the inclusion of many more functions in a design. At the heart of the problem is the need by IP providers to protect their development investment. Few IC designers can afford to pay the often high price for access to IP source code, so IP suppliers provide significantly less costly 'black box', or encrypted, versions for use with specific design tools. The problem with this is not only that the IP vendor is saddled with the cumbersome task of maintaining multiple IP core versions for various tool sets, but, more importantly, that it is an incomplete solution. To address the need for a means to protect IP from piracy while making it easier for the IF supplier to deploy and the IC designer to use, Synplicity has developed and introduced an open IP encryption/decryption methodology. It takes advantage of features in the most recent release of Verilog and commonly used encryption mechanisms in a new usage model that could become an industry standard.","PeriodicalId":132835,"journal":{"name":"Electronic Systems and Software","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127729554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ties that bind [hardware description languages]","authors":"A. Crone","doi":"10.1049/ess:20060501","DOIUrl":"https://doi.org/10.1049/ess:20060501","url":null,"abstract":"VHDL designers can take advantage of the advanced verification features of SystemVerilog thanks to the bind function in the newer language. One of the most important languages to emerge for advanced design and verification is SystemVerilog. This language offers a rich set of features for testbench automation, applying native assertions, functional coverage and constrained random test generation. These features make SystemVerilog increasingly appealing to VHDL users who have a number of verification-oriented features at their disposal but need to implement a more efficient functional verification methodology for complex designs.","PeriodicalId":132835,"journal":{"name":"Electronic Systems and Software","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129103089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Flow motion [medical diagnostics]","authors":"C. Edwards","doi":"10.1049/ESS:20060508","DOIUrl":"https://doi.org/10.1049/ESS:20060508","url":null,"abstract":"Imagine being able to sort cells and other tiny particles without physically touching them. Researchers are using electric force fields to do just that so that they can diagnose diseases using tiny samples of blood and saliva.","PeriodicalId":132835,"journal":{"name":"Electronic Systems and Software","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128314716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A sense of biology [biosensors]","authors":"Paul Marsh","doi":"10.1049/ESS:20060506","DOIUrl":"https://doi.org/10.1049/ESS:20060506","url":null,"abstract":"Interest in biosensors has been slowly building and much progress has been made with the underlying science. It is a technology that has drawn on a bewildering array of fields and effects. Biosensors harness the exquisite selectivity and sensitivity of biological molecules such as antibodies and enzymes. The resultant sensors can be accurate, fast, inexpensive, portable and easy to manufacture. A 'bio-recognition' molecule is chosen that has a particular affinity for the molecules of the target substance. For example, an antibody is one such bio-recognition molecule. It is a protein that has an extraordinary affinity for another type of protein, or 'antigen': it binds to it with exceptional specificity.","PeriodicalId":132835,"journal":{"name":"Electronic Systems and Software","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114217450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast comms clocks get the digital treatment","authors":"J. Hein, M. Petrowski","doi":"10.1049/ESS:20060403","DOIUrl":"https://doi.org/10.1049/ESS:20060403","url":null,"abstract":"The various 10Gb/s communications protocols look very similar until you get to the clocking systems they need. A digital approach to dock generation can make those differences much easier to deal with and let you produce more flexible line cards. As both business and residential customers demand greater access to high-speed network services, equipment suppliers are searching ways to provide low cost, multi-protocol interfaces that can quickly be provisioned for use. A prime example of this trend is the convergence of various data rates in the vicinity of 10Gb/s that can all share much of the same hardware and optics, even though each is generated by different protocols.","PeriodicalId":132835,"journal":{"name":"Electronic Systems and Software","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127977061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Watch out for cracker hijacks","authors":"C. Edwards","doi":"10.1049/ESS:20060404","DOIUrl":"https://doi.org/10.1049/ESS:20060404","url":null,"abstract":"Think PCs are the only targets for malicious hackers? It's time for embedded systems designers to worry about security. It's tough to hack an 8bit microcontroller running code out of mask ROM. Short of getting it to run data as code, the cracker - industry slang for a hacker with malicious intent s out of luck. But embedded systems are becoming more vulnerable to attack for a variety of reasons. In many cases, embedded systems are effectively personal computers in miniature. They have mass storage organised as file systems. That mass storage is solid state rather than a spinning disk in most cases. But, at the software level those differences are minor.","PeriodicalId":132835,"journal":{"name":"Electronic Systems and Software","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121100130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Soft answers for problem signals","authors":"L. Hintze","doi":"10.1049/ESS:20060307","DOIUrl":"https://doi.org/10.1049/ESS:20060307","url":null,"abstract":"This paper introduces a new approach to finding signal-integrity issues in high-speed electronic designs. The new approach is most concisely described as the use of event-identification software. Essentially, it is smart software that scans each waveform acquired by the oscilloscope and looks for various signal-integrity issues or events of interest in the signal. The software-based approach has a number of potential benefits. The use of software to pick up issues means that multiple events can be monitored simultaneously. Hardware triggering is limited to identifying a single event of interest. The hardware trigger circuit is setup to trigger on a specific type of event and is prohibited from monitoring for other types of event at the same time. Event-identification software does not suffer from such a limitation. It can be programmed to scan for five events at the same time on any channel or combination of channels. This can significantly reduce the time it takes to narrow down the potential causes of a signal integrity problem or isolate nasty interdependent events.","PeriodicalId":132835,"journal":{"name":"Electronic Systems and Software","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122599162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}