The Benefits Of Using Embedded Sensing Fabrics In AI Devices


AI chips, regardless of the application, are not regular ASICs and tend to be very large, this essentially means that AI chips are reaching the reticle limits in-terms of their size. They are also usually dominated by an array of regular structures and this helps to mitigate yield issues by building in tolerance to defect density due to the sheer number of processor blocks. The reason behind... » read more

Chip-Package Co-Analysis Using Ansys RedHawk-CPA


Ansys RedHawk-CPA is an integrated chip–package co-analysis solution that enables quick and accurate modeling of the package layout for inclusion in on-chip power integrity simulations using Ansys RedHawk. With RedHawk-CPA a designer can perform static IR drop analysis and AC hotspot analysis of the package layout following RedHawk static and dynamic analyses respectively. To ensure a reliab... » read more

Deploying Accurate Always-On Face Unlock


Accurate face verification has long been considered a challenge due to the number of variables, ranging from lighting to pose and facial expression. This white paper looks at a new approach — combining classic and modern machine learning (deep learning) techniques — that achieves 98.36% accuracy, running efficiently on Arm ML-optimized platforms, and addressing key security issues such a... » read more

Modified X-Band Push-Push Oscillator Simulation And Measurement


This eBook that explores the push-push oscillator configuration via harmonic balance (HB) computer simulation and test measurement. The unique operation of the push-push oscillator configuration is explored using HB simulation of spectral content and time-domain voltage waveforms. Dynamic load lines are investigated and utilized to explore peak signal excursion and degree of nonlinearity. Predi... » read more

Lower Process Nodes Drive Timing Signoff Software Evolution


A dramatic rise in design complexity has led to a slew of new signoff challenges that impact the ability to predictably meet PPA targets. Smaller technology nodes and larger design sizes have caused the number of corners and modes to grow exponentially leading to much longer turnaround times for timing signoff. Moreover, larger design sizes demand huge compute resources for timing signoff. I... » read more

Industry 4.0 And The Rise Of QPaaS


McKinsey & Company frames this shift as a matter of moving the industry from its current approach of “firefighting” – responding to failures and vulnerabilities after they’re brought to OEMs’ attention – toward proactively preventing such episodes in the first place. How can the industry achieve this objective? By embracing quality protection as a service (QPaaS) — an approach... » read more

Case Study: Monitoring Humidity To Reduce Reticle Haze Effects


Understanding reticle haze: Without proper control measures, immersion technology scanners are affected by an adverse phenomenon called “haze.” Haze is caused by a combination of three specific factors: Click here to continue reading. » read more

Combining Machine Learning With Advanced Outlier Detection To Improve Quality And Lower Cost


In semiconductor manufacturing, a low defect rate of manufactured integrated circuits is crucial. To minimize outgoing device defectivity, thousands of electrical tests are run, measuring tens of thousands of parameters, with die that are outside of specified parameters considered as fails. However, conventional test techniques often fall short of guaranteeing acceptable quality levels. Given t... » read more

Comprehensive Simulation Of Power Electronics Systems


Power electronics systems are at the heart of many important and growing industries, from all-electric vehicles to renewable energy generation. Optimizing the design of these systems requires accurate modeling and simulation long before construction of physical prototypes. SPICE-level simulation has been the traditional solution and, while it still plays a key role, it cannot satisfy all requir... » read more

Know Your Code: Open Source Security Risks During Development


Exploits of software security vulnerabilities can result in loss of sensitive customer and company information, disruption of business operations, and costly litigation. Organizations are increasingly turning to open source software to save time and money, but few have sufficient visibility into, or control of, open source usage to head off potential open source risks. Read this white paper ... » read more

← Older posts Newer posts →