Deploying Accurate Always-On Face Unlock


Accurate face verification has long been considered a challenge due to the number of variables, ranging from lighting to pose and facial expression. This white paper looks at a new approach — combining classic and modern machine learning (deep learning) techniques — that achieves 98.36% accuracy, running efficiently on Arm ML-optimized platforms, and addressing key security issues such a... » read more

Modified X-Band Push-Push Oscillator Simulation And Measurement


This eBook that explores the push-push oscillator configuration via harmonic balance (HB) computer simulation and test measurement. The unique operation of the push-push oscillator configuration is explored using HB simulation of spectral content and time-domain voltage waveforms. Dynamic load lines are investigated and utilized to explore peak signal excursion and degree of nonlinearity. Predi... » read more

Lower Process Nodes Drive Timing Signoff Software Evolution


A dramatic rise in design complexity has led to a slew of new signoff challenges that impact the ability to predictably meet PPA targets. Smaller technology nodes and larger design sizes have caused the number of corners and modes to grow exponentially leading to much longer turnaround times for timing signoff. Moreover, larger design sizes demand huge compute resources for timing signoff. I... » read more

Industry 4.0 And The Rise Of QPaaS


McKinsey & Company frames this shift as a matter of moving the industry from its current approach of “firefighting” – responding to failures and vulnerabilities after they’re brought to OEMs’ attention – toward proactively preventing such episodes in the first place. How can the industry achieve this objective? By embracing quality protection as a service (QPaaS) — an approach... » read more

Case Study: Monitoring Humidity To Reduce Reticle Haze Effects


Understanding reticle haze: Without proper control measures, immersion technology scanners are affected by an adverse phenomenon called “haze.” Haze is caused by a combination of three specific factors: Click here to continue reading. » read more

Combining Machine Learning With Advanced Outlier Detection To Improve Quality And Lower Cost


In semiconductor manufacturing, a low defect rate of manufactured integrated circuits is crucial. To minimize outgoing device defectivity, thousands of electrical tests are run, measuring tens of thousands of parameters, with die that are outside of specified parameters considered as fails. However, conventional test techniques often fall short of guaranteeing acceptable quality levels. Given t... » read more

Comprehensive Simulation Of Power Electronics Systems


Power electronics systems are at the heart of many important and growing industries, from all-electric vehicles to renewable energy generation. Optimizing the design of these systems requires accurate modeling and simulation long before construction of physical prototypes. SPICE-level simulation has been the traditional solution and, while it still plays a key role, it cannot satisfy all requir... » read more

Know Your Code: Open Source Security Risks During Development


Exploits of software security vulnerabilities can result in loss of sensitive customer and company information, disruption of business operations, and costly litigation. Organizations are increasingly turning to open source software to save time and money, but few have sufficient visibility into, or control of, open source usage to head off potential open source risks. Read this white paper ... » read more

Accelerating Electrical Systems Design And Analysis With VeSys


Electrical systems are constantly growing, whether in passenger cars, aircraft or heavy machinery. The growing size and complexity of these systems is driving up development costs and the likelihood of errors, potentially leading to even more cost or damaged brand reputation. New electrical systems and wiring harness engineering solutions implement automation, facilitate collaboration and accel... » read more

Securing SOCs With Esecure HRoT From Silex Insight And Tortuga Logic’s Radix-S


In this new whitepaper, you will learn: How Hardware Roots of Trust (HRoTs) are being used to protect systems with a security foundation The use  of Threat modeling to effectively to verify the eSecure HRoT from Silex Insight in surrounding systems A five-step hardware security validation process that leverages hardware CWEs and Tortuga Logic’s Radix-S to detect and prevent securi... » read more

← Older posts Newer posts →