DD
MM
YYYY

PAGES

DD
MM
YYYY

spot_img

PAGES

Home Blog Page 7551

Noise Sources And Reduction Techniques In Nanometer CMOS

0

When wires are routed tightly together as is evident in nanometer CMOS technologies, different undesirable effects occur. One is capacitive property formed on the wires resulting from storing charges in the metal interface with oxide. Another is inductive noise resulting from induced voltage on a signal line due to changing magnetic field created when a signal switching causes current to flow through a loop.

By changing signal level and causing oscillatory transitions which could cause overshoot or undershoot, these effects affect circuit performance. These effects are classified as interconnect noise because they emanate from interconnection wires used to link circuit elements on-chip. This noise has resistive, inductive and capacitive components.

Interconnect noise is a huge problem to ultra deep submicron circuit designers because of unwanted variations in signals that degrade system performances. This noise could manifest in many forms: delay, signal integrity degradation etc. When two signal lines are routed together, a capacitance exists between the lines. When one of the signals switch, it induces a change (glitch) on the other one. This relationship could change the second signal or possibly cause a delay in the transmission. Layout engineers work hard to ensure that these effects are reduced in chips for high performance and reliability.

Over the years, the metal pitch has followed the trend of process improvement, which involves reduction of the transistor size to pack more units in a die. Unfortunately, the interconnect thickness has not followed the trend resulting to higher resistance per unit length. The effect of this is increase in delay as technology scales. Two major factors contributed to this: capacitance effects which have increased due to much nearer routing on-chip and resistance increases due to wire reduction. These combined factors pose limitation on system operating frequency.

There exist four main sources of interconnect noise in CMOS technologies: interconnect cross-capacitance, power supply, and mutual inductance and thermal noise sources. Interconnect cross-capacitance noise results from charge injected on a victim net due to switching on an aggressor net through a capacitance between them. Power supply noise is the spurious signal that appears on local voltage driver, which subsequently changes the signal value at the receiver.

Mutual inductance noise results when a voltage is induced on a signal line as a result of a changing magnetic field created when a signal switching causes current to flow through a loop. Finally, thermal noise emanates from joule heating along signal and power paths in circuits when current flows.

There is also a coupling (crosstalk) capacitance between two conductors. This capacitance introduces noise that degrades the signal integrity. It leads to rise on the spurious pulse on a neighboring wire, if it has a static value or causes delayed transition. Besides mutual capacitance, crosstalk is also determined by the ratio of the mutual to the sum of self and mutual capacitance (to ground).

The spacings between conductors in circuits decrease with technology downscaling. This increases the crosstalk and other sources of interconnection noise as the wires become more compact and closer to one another. This high circuit density contributes to long interconnections which could also increase crosstalk.

Crosstalk is a major source of timing uncertainty in circuits and it is more prevalent than process variations. Because of the presence of the capacitance, switching of the signals could result to lots of problems that could potentially result to functional degradation. For reduction of crosstalk, low permitivity dielectric material and signal de-synchronizations (non simultaneous switching of signals) are used.

Emerging techniques for interconnect noise reduction involve innovations in materials, circuits and layouts. Typical methods used include buffer insertion, wire sizing, wire spacing, shield insertion among. The ITRS 2005 forecasts increasing use of copper metallization and low-k dielectric insulators. The use of Cu over Al improves circuit propagation delay by reducing the interconnect resistance.

With Cu that has lower resistivity than Al, there is a gain on the delay. Further technology scaling continues to introduce more interconnect challenges despite the use of Cu. In the future, optimal techniques to scale interconnect systems with other circuit systems would be needed to reduce the impact of interconnect noise. New circuit and process techniques would be needed. Latch-up prevention and interconnect noise reduction using silicon silicon-on-insulator are expected to increase.

In conclusions, as CMOS technology continues to scale down, leakage currents and interconnection noise will become increasingly large due to the effects of electron tunnelling, short channel effects, coupling capacitance and other factors discussed in the paper.

Managing these factors by developing better circuits and processes would be vital to the continuous success of CMOS technologies in the semiconductor industry. This would require innovative control techniques and architectures in all aspects of CMOS design. Architectural innovation has already lead to renewed industrial interests in asynchronous integrated circuit which using clockless structure mitigate the effects of interconnect noise delays and other parasitics in circuits.

by Ndubuisi Ekekwe

Ways To Build A Professional Online Persona

0

The following are some suggestions on how to build a professional online persona:

Presence: Open at least one social media or blog account.

Specialize: Define an area of interest and build around it. A five-minute online search should reveal what you represent. You need to differentiate yourself and showcase your core skills and unique capabilities to potential hiring managers.

Accuracy: Always remember that once that post goes online, you may not control who sees it. If you lie on your accomplishments, your classmate or co-worker is just an IP address away from challenging it. Make it accurate – always, otherwise, you will destroy your persona.

Comprehensive: While blog should be short, once in a while, develop comprehensive articles in your field and post them online. It could mean expanding a class project you worked on, adding more contents, and fully proving your expertise. Half-baked contents will not take you too far.

Judgment: What you post or share online defines who you are. Your profile defines you – values, interests and reliability. For employers, they want reliable team leaders and you must not offer less in your web personality.

Vertical Integration: Seek to connect with people ahead of you professionally while building a horizontally network.

Generosity: Share and exchange good ideas. Invite people to your network and be generous to promote good ideas from others. Write professional reviews on books, journals and articles. In no distant time, people will reward you.

Policy Matters: If you are working, ensure you adhere to policies on using the company’s name online. There is a threat that you could be a source of data leakage that can hurt competitiveness. Your profile must not be another portrait of your employer – you must be wise to separate both, where necessary.

Continuity: Professional online branding is a continuous work-in-progress that requires constant tune-ups of networks, contents and profiles. It must be constantly nurtured.

How Hadoop will unlock great value in African big data startups

0

We mean it – the hottest area in technology now is data analytic. You can also call the players WANTS, just like Quants in the investment banking field. OK, they also go as Data Scientists. These are guys/fields that focus on crunching the massive data social media and new technologies are churning out minute by minute. Companies want to make sense of them – they truly want because without that capability, they cannot have intelligence on their products, websites and indeed all areas of their operations. Facebook will not improve with having a way to analyze data they get from millions of their users.

HP, EMC, Google, Microsoft, and a host of the tech giants are buying these companies. They are the pinnacle of mathematical finesse and analytical bravado. They crunch meaningless data sets and provide your information that no one ever imagined. The leader of this pack is Cloudera. We also have Informatica. There are many of them and Africa needs to get into this. This is brain work people and we need to connect quick and fast.

What do you need? You need to be very very good in mathematics and statistics. You need to be sound in machine learning and heuristic algorithm development.  If your statistics measures up very well, it is possible you can write these codes and easily be acquired by someone. The barrier of entry is very high because this is not the domain of hackers and lucky-software coders. You need to be very good and know the stuff.

To begin, you need to understand the open source engine that drives most of these companies. That engine is called Hadoop, after the toy elephant of the son of the man, Doug Cutting, that created it. Get to know Hadoop and if you think you are ready, email tekedia@fasmicro.com and let us discuss how this can work out. We have some Nigerians in U.S that want to get into Hadoop (they know the software but do not know the maths section. These are investors; we will connect you). They are looking for partners – first rated statisticians and mathematicians.

Apache Hadoop is a software framework that supports data-intensive distributed applications under a free license. It enables applications to work with thousands of nodes and petabytes of data. Hadoop was inspired by Google’s MapReduce and Google File System (GFS) papers. Hadoop is a top-level Apache project being built and used by a global community of contributors,written in the Java programming language. Yahoo! has been the largest contributor to the project, and uses Hadoop extensively across its businesses. Hadoop was created by Doug Cutting,who named it after his son’s toy elephant.It was originally developed to support distribution for the Nutch search engine project. (wikipedia)

One key way to protect yourself on Android mobile devices in this new year

0

For better or for worse, technology has penetrated on our planet Earth. It has served people in many ways, tinkering with a gadget and exploring its various functions is charming. The advent of smartphones has made the mobile phone experience even better. Smartphones are pet to their owners and accompany them everywhere they move. Using them is a smart experience and the perception that technology has made people dump is nullified.

 

Dangers from exploded applications:

Though their use is heavenly, but smartphones have certain societal pitfalls too. They have globalized the world abruptly and in many easy exquisite ways. Individuals from all strata and age can access it; the wrong is for the kids with tender age. They use it excessively without acknowledging its drawbacks.

The smartphone brings whole world at your virtual doorstep which is not feasible for kids. Interacting with people of all kinds make them vulnerable to prospect threats, all their childhood we teach them not to talk to strangers, but then giving them a smartphone that breaks all the protective shields and expose them to the volatile world is senseless.

 

StealthGenie an ultimate safe guard:

Whether you are a working parent or a house wife or guardian by any relation, you need to have absolute grip over the interactions they make. For that StealthGenie mobile spy software is essential. Kids are smart and a smarter software can only handle them. It is the software intelligence that sneaks into their mobile phones and extract out all the information necessary to be known by the guardian.

If you are worried about the traceability of your software, then the software ensures 100% undetectable functioning and presence. It will bring to you all the secret information that they were trying to hide and all the activities they do behind your back or due to your lack of technological knowledge.

The software is handy and works effectively without complaints or signs of its presence in the target phone. The investigator can easily sneak into any live conversations, while sitting away from the target phone and view all that what is happening on the online interface. The user interface is called the Member Area and it possesses all the relevant information you are thriving to get hands on. Information about the people they call, text, email and chat appears before you and you will be in a position to identify strangers and suspicious persons.

 

Protective shield from all threats:

By marking certain people’s contact numbers or email addresses as important, you can get alerts whenever they are contacted. Supporting the above feature is ‘Reverse Phone Look up’ this feature brings forth all the additional contact and personal information of that person you want to investigate about. Likewise the monitoring software allow the user to even specify words on the online interface, whenever those target words are found in any Email, Chat or SMS message, the user will get notified immediately.

Parents worried about the wandering habit of their children, do not need to mourn over the rebellious nature of their child, Geo Live Location Tracking enables them to see the live movement of their children and even allows drawing and mark boundaries over the Google map provided in the online interface. They can easily view the movement of their child and even gets alerts whenever a certain boundary is trespassed.

This is how the software helps in tackling whimsical children and makes a guardian’s life easy by providing all the surveillance about the kids and their telephonic activities and experimentations with new and old pals and strangers alike.

BitPesa to reduce remittance friction between African companies and Chinese partners

0

BitPesa, through its website, is helping businesses in China and Africa to send instant payments in local currency directly from African bank accounts to Chinese bank accounts.

Users in Kenya, Uganda, Tanzania, Nigeria and the Democratic Republic of Congo can now send money directly to bank accounts in China. The remittance service offered by BitPesa is low-cost as it cuts conventional money transfer costs by up to 60%, according to the company.

The trade between China and Africa increased to more than $170 billion in 2013 according to the World Bank and is estimated to have hit $220 billion in 2016, as Chinese companies invest heavily in small businesses across the continent.

But until now, African companies had limited options for paying their Chinese suppliers in a swift and affordable way, according to BitPesa CEO Elizabeth Rossiello.

Now BiPesa plans to change that. BitPesa is based out of Kenya and has raised $4 million in capital.

BitPesa which was built as an infrastructure solution to meet the growing demand in this important corridor is now growing in demand as businesses increasingly rely on their technology to send or receive payments faster and cheaper than anywhere else.

BitPesa is driven about eliminating the middleman and middle currency in Africa-China trade and to help them connect directly. The company further hopes to expand, hoping Bitcoin to be embraced as a tool which connects the continent.