SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019
DOI : 10.5121/ijesa.2019.9202 13
ANALYSIS OF SYSTEM ON CHIP DESIGN USING
ARTIFICIAL INTELLIGENCE
Syed Moinuddin Bokhari1
, Karpoora Sundari2
, Praveen Kumar3
, Kavitha4
1
Associate Professor & Head, Department of Electronics & Communication Engineering,
M. A. M College of Engineering & Technology, India
2 &4
Associate Professor, Department of Electronics & Communication Engineering, M. A.
M College of Engineering & Technology, India
3
Assistant Professor, Department of Information Technology, M. A. M College of
Engineering & Technology, India
ABSTRACT
Automation is a powerful word that lies everywhere. It shows that without automation, application will not
get developed. In a semiconductor industry, artificial intelligence played a vital role for implementing the
chip based design through automation .The main advantage of applying the machine learning & deep
learning technique is to improve the implementation rate based upon the capability of the society. The
main objective of the proposed system is to apply the deep learning using data driven approach for
controlling the system. Thus leads to a improvement in design, delay ,speed of operation & costs.
Through this system, huge volume of data’s that are generated by the system will also get control.
KEYWORDS
Deep learning, artificial intelligence, machine learning, semiconductor technology.
1. INTRODUCTION
The International Technology Roadmap for Semiconductors (ITRS) estimates that by 2020, IC
designs will pack 1 trillion transistors per chip. The number of Design Rule Checks (DRC) have
increased by a factor of 10X roughly every 10 years, and so have number of scenarios operating
modes and corners – that must be evaluated by EDA tools to verify and implement designs.
Product development schedules are getting shorter, which means productivity per engineer must
increase by 15X from 1 million to 15 million gates per year to keep up with the complexity
increase.
Semiconductor design activity produces vast amounts of data, but this data is not utilized in any
systematic manner by chip design teams. Data driven approaches have demonstrated significant
benefits in many industries and similar approaches can provide actionable insights and enable
predictive technologies in semiconductor workflows. Two prominent data driven techniques are
Machine Learning (ML) and big data.
1.1 Machine Learning
ML is a branch of Artificial Intelligence and is defined as the ability to learn without explicit
programming. ML programs learn from data, and in many cases provide improved results given
more data. There are three types of ML: Supervised, Unsupervised and Reinforcement.
International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019
14
In supervised learning, labelled data is provided as input to the system. Labelled data is
comprised of a set of samples that have been tagged with labels that are meaningful. For example,
identifying a set of log files from tool runs with tags that denote whether they are good runs or
attention-needing runs can be construed as providing labelled data. In supervised learning, a
model is first trained based on given samples.
Training a model entails extracting features from the given samples, and providing the set of
(input) features along with the label to an algorithm which learns the mapping of inputs to output.
The output from the training phase is a model, which can be persisted if needed. This model is
then deployed and used to infer the label for new and previously unseen data. A typical
supervised learning system is shown in Figure 1.
Figure. 1 Supervised learning workflow
Unsupervised learning systems do not require labelled data. Unsupervised learning algorithms are
used to infer a function or underlying structure from unlabeled data. They are widely used in data
analysis and data mining. While supervised learning is clearly more common today, unsupervised
learning is likely to be more prevalent in the future, given the abundant internet data that is
generated every day, and the expected interest from corporations to monetize this data.
The fundamental concept in reinforcement learning is that learning can be achieved by interacting
with the environment. Just like a child learns without an explicit teacher that smiling or crying
have different effects, reinforcement learning algorithms are based on cause and effect. The
learner is not told what actions to take, but it must discover what actions (immediate or future) are
most rewarding. In recent times, a branch of machine learning called deep learning has become
popular. Deep learning systems [2] can be characterized as universal approximators capable of
modeling non-linearity with a high level of accuracy. Growth in deep learning was primarily
driven by the widespread availability of high-performance special-purpose computation platforms
and the abundance of data. An anatomy of a deep learning system is shown in Figure 2.
Deep learning systems address a basic problem in ML.All ML systems learn the mapping of
inputs to output by extracting features from input, and for most tasks, it is hard to know what
features to extract. An approach popularly known as Representation Learning can be employed to
learn features, and this is fundamental to all deep learning algorithms.
Learned representations are generally better than manually manually extracted features, with the
added benefit of reduced human intervention. While representation learning was a known field,
the advent of deep learning made it viable. Representation learning can be difficult to put in
practice if it is as hard to get representations as it is to solve the original problem, which was
the case until deep learning came along. The representation learning performed by deep learning
International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019
15
systems is highly effective, since they build complex features (or concepts) from simple
concepts.
Figure 2. Components of a deep learning system
1.2`Big Data
Big data can be defined as a capability of providing actionable real-time insights from large
amounts of data. For data to be classified as big data, in addition to its abundance and vastness, it
is also expected that it is being generated at a very fast pace from various varied sources. In fact,
big data systems are characterized by 3 Vs – Volume, Velocity and Variety. Such systems
generate large amounts of data that is both structured (data that is highly organized, and can be
stored in a relational database) and unstructured (data that does not have a predefined data
model). The data is generated at a fast pace in big data systems. Furthermore, big data systems
also encompass a large variety of data sources. Examples of systems demonstrating big data
behaviour are IoT (Internet of Things) devices. The value of a big data system is in providing real
time insights into chip design flows that would be otherwise unavailable, and in providing
recommendations for actions that can be taken to improve production flows. A simplified flow of
the phases in a big data system is provided below in Figure 3:
Figure3. Phases in Big Data
International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019
16
There is significant literature available on building a software stack for big data systems, and
there is no one right stack.
However, it is typical to have either some or most of the components shown in Figure 4. The
system can be further generalized into a pipeline of three key processes:
• Data Capture: During this process, all relevant data is captured systematically. For example,
for an IoT based real-time analytics solution, device metric samples may be captured at
regular intervals. Furthermore, all data that the device depends on should also be captured or
acquired (and then captured).
• Data Processing: During this process, data captured is processed and stored. Depending on the
type of data, an appropriate database or data store is used to store the data.
Data Extraction: During this process, user requests, such as web requests or API calls are received
and processed
Figure 4. Big data software stack
Custom visualizations and triggers are typical interfaces to big data systems. Visualizations
enable users of big data systems to understand if systems are operating as expected, and take
necessary actions in real time.
2. RELATED WORK
Several efforts have shown the significance of MLbased efforts to solve optimization problems
that are NPcomplete. In [6], the authors discuss a framework that optimizes FPGA flows. They
present an ML-framework consisting of a set of classification and regression techniques to
address the disconnect between different stages of FPGA design. The framework consists of five
algorithms (Artificial Neural Network, Decision Tree, Support Vector Machine, K Nearest
Neighbour, and Random Forest) that can be used to solve two problems: choosing between
different placement flows and predicting various quality metrics related to FPGA placement.
International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019
17
The framework employs supervised training methods. Training data is generated from 372
benchmarks by running the benchmarks through seven academic configurations that vary in
certain parameters. Experimental results from 372 benchmark designs show that 4 out of the 7
configurations show accuracy of 88 to 99% in choosing a configuration that best minimizes total
wire length.
In [7], the authors describe how ML was used to predict DRC violations during the global routing
stage. DRC violations during detailed routing prevent or delay tape outs. To prevent tape out
delays, automatic place and route tools create a global routing map. The placer uses the routine
map to optimize placement of blocks in a way so as to reduce or eliminate DRCs. However, at
advanced nodes, the correlation between global and detailed routing weakens, leading to either
aggressive optimization by the placer at the expense of area or power or too many DRCs in the
final routing stage.
In [8], the authors motivate a need for advanced analytics for semiconductor design to streamline
R&D processes, optimizing product portfolios and helping businesses reduce costs. The
fundamental difference between traditional and advanced analytics is as follows: in traditional
analytics, the data is in existence, and analytics enable better understanding of data whereas
advanced analytics is a process where the data to be collected is first defined by the analytics that
would be needed to drive decisions. In research conducted across 200 projects, it is found that
advanced analytics enabled project teams to reduce their project times by approximately 10%.
In [9], the author describes use of big data techniques to improve verification efficiency.
Verification is the most time consuming step in the chip design process, and a typical verification
environment consists of geographically dispersed collaborative teams, and a flow that involves
multiple systems. The author motivates the need for a central repository that can store metrics and
data in a common format and shows the value of insights gathered by visualizing metrics.
3. METHODOLOGY RECOMMENDATIONS
A strategy that enables corporate goals be it improving turnaround time for designs or reducing
resource costs should be the centre point of any methodology.
The research to date shows that chip design companies can incorporate data-driven methods in
their workflows to improve quality of results, time to results or cost of results. These techniques
require access to data from tool runs, flows and environment. Furthermore, chip design is a
continuous process and a framework that continuously polls for new runs, captures meta data, and
enables access to information through consistent interfaces is integral to reaping long-term
benefits. Potential enterprise architecture for data driven applications is shown in Figure 5.
International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019
18
Figure 5. Enterprise Architecture for applications
robust capture mechanism should be in place to enable downstream processes. This framework
should operate at the enterprise level, across geographically dispersed sites, be flexible enough to
handle different types of tools and flows and scale to supporting hundreds of tool run every
minute.
An easy-to-use access/analysis mechanism is the key to building a lasting solution. In ML and big
data systems, APIs are the most extensible way to provide analysis capabilities. APIs can be used
to build custom visualizations or standalone applications.
Formulating the ML problem requires the right expertise. It requires data scientists, domain
experts and software engineers working together. It also requires the right kind of data, feature
engineering and compute infrastructure. For many real-life problems, training times can be
considerably long, and this may require special-purpose hardware.
Furthermore, model retraining is necessary in production instances, so that model accuracy meets
requirements. Other important considerations when deploying ML models for production are
inference time, and a framework to monitor model accuracy.
Some problems can be solved by using advanced analytics. Advanced analytics can enable users
to understand what is happening, plan resource allocation, explore reasons for unexpected
behaviour, identify anomalies, and get real-time information about project status. A common
infrastructure consisting of capture-process organize phases can serve as the backbone for both
ML and big data systems.
4. CONCLUSION
Data driven techniques have shown promising results in optimizing chip design workflows. To
enable enterprise-wide digital intelligence via ML and big data backed strategies, a robust
framework for enabling both ML and big data should be put in place. Distributed big data systems
are the cornerstone for enabling such techniques. It is important to use discretion in identifying
areas to pursue using data-driven technologies since ML and big data do not apply to all
problems. Coordinated execution from all the relevant domains is required to produce complex
data driven solutions and a soiled approach will not provide lasting benefits. Companies that
adopt data driven optimizations will have highly efficient design teams. In other words, to remain
Database
tool that
runs
Capture
the data
Organizi
ng it
Analyze
Machine
leraning /
big data
Improve
QoS
Reduce
TTR
Reduce
COR
International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019
19
competitive, companies should accelerate their plans for bringing digital intelligence into their
flows.
ACKNOWLEDGEMENTS
We would like to thank who all are encouraging us to presenting & publishing this paper in this
reputed journal.
REFERENCES
[1] Christopher M. Bishop, Pattern Recognition and Machine Learning. Springer: 2006
[2] Ian Goodfellow, Yoshua Bengio and Aaron Courville, Deep Learning. London, England: The MIT
Press, 2016
[3] Richard S. Sutton and Andrew G. Barto, Reinforcement Learning: An Introduction. London, England:
The MIT Press, 2017.
[4] L. C. Wang, "Experience of Data Analytics in EDA and test Principles , Promises and Challenges,” in
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 36, no. 6, pp.
885-898, June 2017
[5] G. Grewal, S. Areibi, M. Westrik, Z. Abuowaimer and B.Zhao, "Automatic Flow Selection and
Quality-of-Result Estimation for FPGA Placement," 2017 IEEE International Parallel and Distributed
Processing Symposium Workshops (IPDPSW), Lake Buena Vista, FL, 2017, pp. 115-123.
[6] W. J. Chan, P. Ho, A. B. Kahng, P. Saxena, “Routability Optimization for Industrial Designs at Sub-
14nm Process Nodes Using Machine Learning,” Proceedings of the 2017ACM on International
Symposium on Physical Design (ISPD17), pp. 15-21
[7] B. Yu, D. Z. Pan, T. Matsunawa and X. Zeng, "Machine learning and pattern matching in physical
design," The 20th Asia and South Pacific Design Automation Conference, Chiba, 2015, pp. 286-293
[8] G. Batra, Z. Jacobsen, N. Santhanam, “Improving the semiconductor industry through advanced
analytics”, McKinsey Article, March 2016.
[9] D. K. May, “Improving Verification Predictability and Efficiency Using Big Data,”, DVCon
Proceedings, February 2018.
AUTHORS
B. Syed Moinuddin Bokhari completed his B.E. from Government College of
Engineering, Bargur, INDIA affiliated to University of Madras in 2001, received his
M.E. from Jayaram College of Engineering and Technology, Thuriayur, INDIA
affiliated to Anna University, Chennai INDIA in 2005.Currently he is a research scholar
at the department of Electronics and Communication Engineering, College of
Engineering Guindy, Anna University, Chennai, INDIA. His field of interests include
wireless communication and networks, signal processing. His current research interests
are deep learning, machine learning for wireless communication and VLSI, multiuser
detection, multiuser scheduling applied to FPGA based SISO/MIMO test beds. He is a life member of
ISTE.
International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019
20
K. Karpoora Sundari completed her B.E. from Syed Ammal Engineering College,
Ramanathapuram, Tamil Nadu, India affiliated to Madurai Kamaraj University in the
year 2003. After that she did her M. E in Applied Electronics in R.V. S College of
Engineering & Technology, Dindigul, Tamil Nadu, India affiliated to Anna University
Chennai in the year 2012. She published papers in various national and international
conferences. Currently she is working as an Associate Professor of ECE department in M.
A. M College of Engineering & Technology, Tiruchirappalli, Tamil Nadu, India. She is
having around 14 years of experience in both teaching and industry. Her field of Interest includes Digital
VLSI Design, Embedded System , computer networks, deep learning, machine learning VLSI, Cyber
physical systems and artificial Intelligence.
Mr. V. Praveenkumar is working as Assistant Professor in the department of Information
Technology in M. A. M. College of Engineering and Technology. He completed his
Undergraduate degree B. Tech-Information technology in the year of 2010. He completed
his postgraduate degree M. E.– Pervasive computing Technology in 2012 In Anna
University, Tricky. His research areas include Parallel processing, machine learning
algorithms, Cloud computing and Big data.
Mrs. S. Kavitha is working as an Associate professor in M. A. M College of Engineering.
She completed her B. E in Electronics & Communication Engineering in JJ College of
Engineering & Technology, Trichy under Bharathidhasan University during the year 2002
and completed M. E in Communication Systems in Jayaram College of Engineering &
Technology. Currently she is doing research under antennas. Her area of interest includes
RF and Microwaves, deep learning, wireless communication and VLSI.

Mais conteúdo relacionado

Mais procurados

Face recognition for presence system by using residual networks-50 architectu...
Face recognition for presence system by using residual networks-50 architectu...Face recognition for presence system by using residual networks-50 architectu...
Face recognition for presence system by using residual networks-50 architectu...IJECEIAES
 
introduction to machin learning
introduction to machin learningintroduction to machin learning
introduction to machin learningnilimapatel6
 
Deep learning seminar report
Deep learning seminar reportDeep learning seminar report
Deep learning seminar reportSKS
 
seminar Report-BE-EEE-8th sem-Artificial intelligence in security managenent
seminar Report-BE-EEE-8th sem-Artificial intelligence in security managenentseminar Report-BE-EEE-8th sem-Artificial intelligence in security managenent
seminar Report-BE-EEE-8th sem-Artificial intelligence in security managenentMOHAMMED SAQIB
 
Image Recognition Expert System based on deep learning
Image Recognition Expert System based on deep learningImage Recognition Expert System based on deep learning
Image Recognition Expert System based on deep learningPRATHAMESH REGE
 
Deep Learning Explained: The future of Artificial Intelligence and Smart Netw...
Deep Learning Explained: The future of Artificial Intelligence and Smart Netw...Deep Learning Explained: The future of Artificial Intelligence and Smart Netw...
Deep Learning Explained: The future of Artificial Intelligence and Smart Netw...Melanie Swan
 
intelligent computing relating to cloud computing
intelligent computing relating to cloud computingintelligent computing relating to cloud computing
intelligent computing relating to cloud computingEr. rahul abhishek
 
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...ijtsrd
 
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection IJCNCJournal
 
Mining knowledge graphs to map heterogeneous relations between the internet o...
Mining knowledge graphs to map heterogeneous relations between the internet o...Mining knowledge graphs to map heterogeneous relations between the internet o...
Mining knowledge graphs to map heterogeneous relations between the internet o...IJECEIAES
 
Tinay Artificial Intelligence
Tinay Artificial IntelligenceTinay Artificial Intelligence
Tinay Artificial IntelligenceCristina Faalam
 
Comparative Analysis of Computational Intelligence Paradigms in WSN: Review
Comparative Analysis of Computational Intelligence Paradigms in WSN: ReviewComparative Analysis of Computational Intelligence Paradigms in WSN: Review
Comparative Analysis of Computational Intelligence Paradigms in WSN: Reviewiosrjce
 

Mais procurados (17)

Face recognition for presence system by using residual networks-50 architectu...
Face recognition for presence system by using residual networks-50 architectu...Face recognition for presence system by using residual networks-50 architectu...
Face recognition for presence system by using residual networks-50 architectu...
 
introduction to machin learning
introduction to machin learningintroduction to machin learning
introduction to machin learning
 
Deep learning seminar report
Deep learning seminar reportDeep learning seminar report
Deep learning seminar report
 
seminar Report-BE-EEE-8th sem-Artificial intelligence in security managenent
seminar Report-BE-EEE-8th sem-Artificial intelligence in security managenentseminar Report-BE-EEE-8th sem-Artificial intelligence in security managenent
seminar Report-BE-EEE-8th sem-Artificial intelligence in security managenent
 
Cognitive computing
Cognitive computing Cognitive computing
Cognitive computing
 
Image Recognition Expert System based on deep learning
Image Recognition Expert System based on deep learningImage Recognition Expert System based on deep learning
Image Recognition Expert System based on deep learning
 
1.Introduction to deep learning
1.Introduction to deep learning1.Introduction to deep learning
1.Introduction to deep learning
 
Deep Learning Explained: The future of Artificial Intelligence and Smart Netw...
Deep Learning Explained: The future of Artificial Intelligence and Smart Netw...Deep Learning Explained: The future of Artificial Intelligence and Smart Netw...
Deep Learning Explained: The future of Artificial Intelligence and Smart Netw...
 
Cognitive computing
Cognitive computingCognitive computing
Cognitive computing
 
intelligent computing relating to cloud computing
intelligent computing relating to cloud computingintelligent computing relating to cloud computing
intelligent computing relating to cloud computing
 
Cognitive Computing
Cognitive ComputingCognitive Computing
Cognitive Computing
 
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
Comparative Study on Machine Learning Algorithms for Network Intrusion Detect...
 
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
 
Mining knowledge graphs to map heterogeneous relations between the internet o...
Mining knowledge graphs to map heterogeneous relations between the internet o...Mining knowledge graphs to map heterogeneous relations between the internet o...
Mining knowledge graphs to map heterogeneous relations between the internet o...
 
Tinay Artificial Intelligence
Tinay Artificial IntelligenceTinay Artificial Intelligence
Tinay Artificial Intelligence
 
Ai applications study
Ai applications  studyAi applications  study
Ai applications study
 
Comparative Analysis of Computational Intelligence Paradigms in WSN: Review
Comparative Analysis of Computational Intelligence Paradigms in WSN: ReviewComparative Analysis of Computational Intelligence Paradigms in WSN: Review
Comparative Analysis of Computational Intelligence Paradigms in WSN: Review
 

Semelhante a ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE

IRJET- Comparative Study of Efficacy of Big Data Analysis and Deep Learni...
IRJET-  	  Comparative Study of Efficacy of Big Data Analysis and Deep Learni...IRJET-  	  Comparative Study of Efficacy of Big Data Analysis and Deep Learni...
IRJET- Comparative Study of Efficacy of Big Data Analysis and Deep Learni...IRJET Journal
 
A survey on Machine Learning and Artificial Neural Networks
A survey on Machine Learning and Artificial Neural NetworksA survey on Machine Learning and Artificial Neural Networks
A survey on Machine Learning and Artificial Neural NetworksIRJET Journal
 
A Comprehensive review of Conversational Agent and its prediction algorithm
A Comprehensive review of Conversational Agent and its prediction algorithmA Comprehensive review of Conversational Agent and its prediction algorithm
A Comprehensive review of Conversational Agent and its prediction algorithmvivatechijri
 
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...ijdpsjournal
 
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...ijdpsjournal
 
IRJET- Comparison of Classification Algorithms using Machine Learning
IRJET- Comparison of Classification Algorithms using Machine LearningIRJET- Comparison of Classification Algorithms using Machine Learning
IRJET- Comparison of Classification Algorithms using Machine LearningIRJET Journal
 
A review paper: optimal test cases for regression testing using artificial in...
A review paper: optimal test cases for regression testing using artificial in...A review paper: optimal test cases for regression testing using artificial in...
A review paper: optimal test cases for regression testing using artificial in...IJECEIAES
 
Data Science: A Revolution of Data
Data Science: A Revolution of DataData Science: A Revolution of Data
Data Science: A Revolution of DataIRJET Journal
 
A CASE STUDY OF INNOVATION OF AN INFORMATION COMMUNICATION SYSTEM AND UPGRADE...
A CASE STUDY OF INNOVATION OF AN INFORMATION COMMUNICATION SYSTEM AND UPGRADE...A CASE STUDY OF INNOVATION OF AN INFORMATION COMMUNICATION SYSTEM AND UPGRADE...
A CASE STUDY OF INNOVATION OF AN INFORMATION COMMUNICATION SYSTEM AND UPGRADE...ijaia
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISpijans
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISpijans
 
A survey of big data and machine learning
A survey of big data and machine learning A survey of big data and machine learning
A survey of big data and machine learning IJECEIAES
 
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...ijcsa
 
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...eswaralaldevadoss
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...IJNSA Journal
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...IJNSA Journal
 
Development of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job SeekersDevelopment of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job SeekersIJMIT JOURNAL
 
Intrusion detection using incremental
Intrusion detection using incrementalIntrusion detection using incremental
Intrusion detection using incrementalijmpict
 

Semelhante a ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE (20)

IRJET- Comparative Study of Efficacy of Big Data Analysis and Deep Learni...
IRJET-  	  Comparative Study of Efficacy of Big Data Analysis and Deep Learni...IRJET-  	  Comparative Study of Efficacy of Big Data Analysis and Deep Learni...
IRJET- Comparative Study of Efficacy of Big Data Analysis and Deep Learni...
 
A survey on Machine Learning and Artificial Neural Networks
A survey on Machine Learning and Artificial Neural NetworksA survey on Machine Learning and Artificial Neural Networks
A survey on Machine Learning and Artificial Neural Networks
 
A Comprehensive review of Conversational Agent and its prediction algorithm
A Comprehensive review of Conversational Agent and its prediction algorithmA Comprehensive review of Conversational Agent and its prediction algorithm
A Comprehensive review of Conversational Agent and its prediction algorithm
 
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
 
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
 
IRJET- Comparison of Classification Algorithms using Machine Learning
IRJET- Comparison of Classification Algorithms using Machine LearningIRJET- Comparison of Classification Algorithms using Machine Learning
IRJET- Comparison of Classification Algorithms using Machine Learning
 
Machine learning
Machine learningMachine learning
Machine learning
 
A review paper: optimal test cases for regression testing using artificial in...
A review paper: optimal test cases for regression testing using artificial in...A review paper: optimal test cases for regression testing using artificial in...
A review paper: optimal test cases for regression testing using artificial in...
 
Data Science: A Revolution of Data
Data Science: A Revolution of DataData Science: A Revolution of Data
Data Science: A Revolution of Data
 
A CASE STUDY OF INNOVATION OF AN INFORMATION COMMUNICATION SYSTEM AND UPGRADE...
A CASE STUDY OF INNOVATION OF AN INFORMATION COMMUNICATION SYSTEM AND UPGRADE...A CASE STUDY OF INNOVATION OF AN INFORMATION COMMUNICATION SYSTEM AND UPGRADE...
A CASE STUDY OF INNOVATION OF AN INFORMATION COMMUNICATION SYSTEM AND UPGRADE...
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
 
A survey of big data and machine learning
A survey of big data and machine learning A survey of big data and machine learning
A survey of big data and machine learning
 
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
 
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
 
Development of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job SeekersDevelopment of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job Seekers
 
Technovision
TechnovisionTechnovision
Technovision
 
Intrusion detection using incremental
Intrusion detection using incrementalIntrusion detection using incremental
Intrusion detection using incremental
 

Mais de ijesajournal

DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITORDESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITORijesajournal
 
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITORDESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITORijesajournal
 
PIP-MPU: FORMAL VERIFICATION OF AN MPUBASED SEPARATION KERNEL FOR CONSTRAINED...
PIP-MPU: FORMAL VERIFICATION OF AN MPUBASED SEPARATION KERNEL FOR CONSTRAINED...PIP-MPU: FORMAL VERIFICATION OF AN MPUBASED SEPARATION KERNEL FOR CONSTRAINED...
PIP-MPU: FORMAL VERIFICATION OF AN MPUBASED SEPARATION KERNEL FOR CONSTRAINED...ijesajournal
 
International Journal of Embedded Systems and Applications (IJESA)
International Journal of Embedded Systems and Applications (IJESA)International Journal of Embedded Systems and Applications (IJESA)
International Journal of Embedded Systems and Applications (IJESA)ijesajournal
 
Pip-MPU: Formal Verification of an MPU-Based Separationkernel for Constrained...
Pip-MPU: Formal Verification of an MPU-Based Separationkernel for Constrained...Pip-MPU: Formal Verification of an MPU-Based Separationkernel for Constrained...
Pip-MPU: Formal Verification of an MPU-Based Separationkernel for Constrained...ijesajournal
 
International Journal of Embedded Systems and Applications (IJESA)
International Journal of Embedded Systems and Applications (IJESA)International Journal of Embedded Systems and Applications (IJESA)
International Journal of Embedded Systems and Applications (IJESA)ijesajournal
 
Call for papers -15th International Conference on Wireless & Mobile Network (...
Call for papers -15th International Conference on Wireless & Mobile Network (...Call for papers -15th International Conference on Wireless & Mobile Network (...
Call for papers -15th International Conference on Wireless & Mobile Network (...ijesajournal
 
Call for Papers -International Conference on NLP & Signal (NLPSIG 2023)
Call for Papers -International Conference on NLP & Signal (NLPSIG 2023)Call for Papers -International Conference on NLP & Signal (NLPSIG 2023)
Call for Papers -International Conference on NLP & Signal (NLPSIG 2023)ijesajournal
 
International Conference on NLP & Signal (NLPSIG 2023)
International Conference on NLP & Signal (NLPSIG 2023)International Conference on NLP & Signal (NLPSIG 2023)
International Conference on NLP & Signal (NLPSIG 2023)ijesajournal
 
11th International Conference on Software Engineering & Trends (SE 2023)
11th International Conference on Software Engineering & Trends (SE 2023)11th International Conference on Software Engineering & Trends (SE 2023)
11th International Conference on Software Engineering & Trends (SE 2023)ijesajournal
 
11th International Conference on Software Engineering & Trends (SE 2023)
11th International Conference on Software Engineering & Trends (SE 2023)11th International Conference on Software Engineering & Trends (SE 2023)
11th International Conference on Software Engineering & Trends (SE 2023)ijesajournal
 
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXINGPERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXINGijesajournal
 
GENERIC SOPC PLATFORM FOR VIDEO INTERACTIVE SYSTEM WITH MPMC CONTROLLER
GENERIC SOPC PLATFORM FOR VIDEO INTERACTIVE SYSTEM WITH MPMC CONTROLLERGENERIC SOPC PLATFORM FOR VIDEO INTERACTIVE SYSTEM WITH MPMC CONTROLLER
GENERIC SOPC PLATFORM FOR VIDEO INTERACTIVE SYSTEM WITH MPMC CONTROLLERijesajournal
 
INVERTING BUCK-BOOST DCDC CONVERTER DESIGN CHALLENGES
INVERTING BUCK-BOOST DCDC CONVERTER DESIGN CHALLENGESINVERTING BUCK-BOOST DCDC CONVERTER DESIGN CHALLENGES
INVERTING BUCK-BOOST DCDC CONVERTER DESIGN CHALLENGESijesajournal
 
A Case Study: Task Scheduling Methodologies for High Speed Computing Systems
A Case Study: Task Scheduling Methodologies for High Speed Computing Systems A Case Study: Task Scheduling Methodologies for High Speed Computing Systems
A Case Study: Task Scheduling Methodologies for High Speed Computing Systems ijesajournal
 
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...ijesajournal
 
AUTOMATED EMBEDDED PAYMENT SYSTEMS
AUTOMATED EMBEDDED PAYMENT SYSTEMSAUTOMATED EMBEDDED PAYMENT SYSTEMS
AUTOMATED EMBEDDED PAYMENT SYSTEMSijesajournal
 
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...ijesajournal
 
2 nd International Conference on Computing and Information Technology
2 nd International Conference on Computing and Information Technology 2 nd International Conference on Computing and Information Technology
2 nd International Conference on Computing and Information Technology ijesajournal
 
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...ijesajournal
 

Mais de ijesajournal (20)

DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITORDESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
 
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITORDESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
 
PIP-MPU: FORMAL VERIFICATION OF AN MPUBASED SEPARATION KERNEL FOR CONSTRAINED...
PIP-MPU: FORMAL VERIFICATION OF AN MPUBASED SEPARATION KERNEL FOR CONSTRAINED...PIP-MPU: FORMAL VERIFICATION OF AN MPUBASED SEPARATION KERNEL FOR CONSTRAINED...
PIP-MPU: FORMAL VERIFICATION OF AN MPUBASED SEPARATION KERNEL FOR CONSTRAINED...
 
International Journal of Embedded Systems and Applications (IJESA)
International Journal of Embedded Systems and Applications (IJESA)International Journal of Embedded Systems and Applications (IJESA)
International Journal of Embedded Systems and Applications (IJESA)
 
Pip-MPU: Formal Verification of an MPU-Based Separationkernel for Constrained...
Pip-MPU: Formal Verification of an MPU-Based Separationkernel for Constrained...Pip-MPU: Formal Verification of an MPU-Based Separationkernel for Constrained...
Pip-MPU: Formal Verification of an MPU-Based Separationkernel for Constrained...
 
International Journal of Embedded Systems and Applications (IJESA)
International Journal of Embedded Systems and Applications (IJESA)International Journal of Embedded Systems and Applications (IJESA)
International Journal of Embedded Systems and Applications (IJESA)
 
Call for papers -15th International Conference on Wireless & Mobile Network (...
Call for papers -15th International Conference on Wireless & Mobile Network (...Call for papers -15th International Conference on Wireless & Mobile Network (...
Call for papers -15th International Conference on Wireless & Mobile Network (...
 
Call for Papers -International Conference on NLP & Signal (NLPSIG 2023)
Call for Papers -International Conference on NLP & Signal (NLPSIG 2023)Call for Papers -International Conference on NLP & Signal (NLPSIG 2023)
Call for Papers -International Conference on NLP & Signal (NLPSIG 2023)
 
International Conference on NLP & Signal (NLPSIG 2023)
International Conference on NLP & Signal (NLPSIG 2023)International Conference on NLP & Signal (NLPSIG 2023)
International Conference on NLP & Signal (NLPSIG 2023)
 
11th International Conference on Software Engineering & Trends (SE 2023)
11th International Conference on Software Engineering & Trends (SE 2023)11th International Conference on Software Engineering & Trends (SE 2023)
11th International Conference on Software Engineering & Trends (SE 2023)
 
11th International Conference on Software Engineering & Trends (SE 2023)
11th International Conference on Software Engineering & Trends (SE 2023)11th International Conference on Software Engineering & Trends (SE 2023)
11th International Conference on Software Engineering & Trends (SE 2023)
 
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXINGPERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
 
GENERIC SOPC PLATFORM FOR VIDEO INTERACTIVE SYSTEM WITH MPMC CONTROLLER
GENERIC SOPC PLATFORM FOR VIDEO INTERACTIVE SYSTEM WITH MPMC CONTROLLERGENERIC SOPC PLATFORM FOR VIDEO INTERACTIVE SYSTEM WITH MPMC CONTROLLER
GENERIC SOPC PLATFORM FOR VIDEO INTERACTIVE SYSTEM WITH MPMC CONTROLLER
 
INVERTING BUCK-BOOST DCDC CONVERTER DESIGN CHALLENGES
INVERTING BUCK-BOOST DCDC CONVERTER DESIGN CHALLENGESINVERTING BUCK-BOOST DCDC CONVERTER DESIGN CHALLENGES
INVERTING BUCK-BOOST DCDC CONVERTER DESIGN CHALLENGES
 
A Case Study: Task Scheduling Methodologies for High Speed Computing Systems
A Case Study: Task Scheduling Methodologies for High Speed Computing Systems A Case Study: Task Scheduling Methodologies for High Speed Computing Systems
A Case Study: Task Scheduling Methodologies for High Speed Computing Systems
 
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
 
AUTOMATED EMBEDDED PAYMENT SYSTEMS
AUTOMATED EMBEDDED PAYMENT SYSTEMSAUTOMATED EMBEDDED PAYMENT SYSTEMS
AUTOMATED EMBEDDED PAYMENT SYSTEMS
 
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
 
2 nd International Conference on Computing and Information Technology
2 nd International Conference on Computing and Information Technology 2 nd International Conference on Computing and Information Technology
2 nd International Conference on Computing and Information Technology
 
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
 

Último

CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsSachinPawar510423
 
Steel Structures - Building technology.pptx
Steel Structures - Building technology.pptxSteel Structures - Building technology.pptx
Steel Structures - Building technology.pptxNikhil Raut
 
The SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsThe SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsDILIPKUMARMONDAL6
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 

Último (20)

CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Steel Structures - Building technology.pptx
Steel Structures - Building technology.pptxSteel Structures - Building technology.pptx
Steel Structures - Building technology.pptx
 
The SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsThe SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teams
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 

ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE

  • 1. International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019 DOI : 10.5121/ijesa.2019.9202 13 ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE Syed Moinuddin Bokhari1 , Karpoora Sundari2 , Praveen Kumar3 , Kavitha4 1 Associate Professor & Head, Department of Electronics & Communication Engineering, M. A. M College of Engineering & Technology, India 2 &4 Associate Professor, Department of Electronics & Communication Engineering, M. A. M College of Engineering & Technology, India 3 Assistant Professor, Department of Information Technology, M. A. M College of Engineering & Technology, India ABSTRACT Automation is a powerful word that lies everywhere. It shows that without automation, application will not get developed. In a semiconductor industry, artificial intelligence played a vital role for implementing the chip based design through automation .The main advantage of applying the machine learning & deep learning technique is to improve the implementation rate based upon the capability of the society. The main objective of the proposed system is to apply the deep learning using data driven approach for controlling the system. Thus leads to a improvement in design, delay ,speed of operation & costs. Through this system, huge volume of data’s that are generated by the system will also get control. KEYWORDS Deep learning, artificial intelligence, machine learning, semiconductor technology. 1. INTRODUCTION The International Technology Roadmap for Semiconductors (ITRS) estimates that by 2020, IC designs will pack 1 trillion transistors per chip. The number of Design Rule Checks (DRC) have increased by a factor of 10X roughly every 10 years, and so have number of scenarios operating modes and corners – that must be evaluated by EDA tools to verify and implement designs. Product development schedules are getting shorter, which means productivity per engineer must increase by 15X from 1 million to 15 million gates per year to keep up with the complexity increase. Semiconductor design activity produces vast amounts of data, but this data is not utilized in any systematic manner by chip design teams. Data driven approaches have demonstrated significant benefits in many industries and similar approaches can provide actionable insights and enable predictive technologies in semiconductor workflows. Two prominent data driven techniques are Machine Learning (ML) and big data. 1.1 Machine Learning ML is a branch of Artificial Intelligence and is defined as the ability to learn without explicit programming. ML programs learn from data, and in many cases provide improved results given more data. There are three types of ML: Supervised, Unsupervised and Reinforcement.
  • 2. International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019 14 In supervised learning, labelled data is provided as input to the system. Labelled data is comprised of a set of samples that have been tagged with labels that are meaningful. For example, identifying a set of log files from tool runs with tags that denote whether they are good runs or attention-needing runs can be construed as providing labelled data. In supervised learning, a model is first trained based on given samples. Training a model entails extracting features from the given samples, and providing the set of (input) features along with the label to an algorithm which learns the mapping of inputs to output. The output from the training phase is a model, which can be persisted if needed. This model is then deployed and used to infer the label for new and previously unseen data. A typical supervised learning system is shown in Figure 1. Figure. 1 Supervised learning workflow Unsupervised learning systems do not require labelled data. Unsupervised learning algorithms are used to infer a function or underlying structure from unlabeled data. They are widely used in data analysis and data mining. While supervised learning is clearly more common today, unsupervised learning is likely to be more prevalent in the future, given the abundant internet data that is generated every day, and the expected interest from corporations to monetize this data. The fundamental concept in reinforcement learning is that learning can be achieved by interacting with the environment. Just like a child learns without an explicit teacher that smiling or crying have different effects, reinforcement learning algorithms are based on cause and effect. The learner is not told what actions to take, but it must discover what actions (immediate or future) are most rewarding. In recent times, a branch of machine learning called deep learning has become popular. Deep learning systems [2] can be characterized as universal approximators capable of modeling non-linearity with a high level of accuracy. Growth in deep learning was primarily driven by the widespread availability of high-performance special-purpose computation platforms and the abundance of data. An anatomy of a deep learning system is shown in Figure 2. Deep learning systems address a basic problem in ML.All ML systems learn the mapping of inputs to output by extracting features from input, and for most tasks, it is hard to know what features to extract. An approach popularly known as Representation Learning can be employed to learn features, and this is fundamental to all deep learning algorithms. Learned representations are generally better than manually manually extracted features, with the added benefit of reduced human intervention. While representation learning was a known field, the advent of deep learning made it viable. Representation learning can be difficult to put in practice if it is as hard to get representations as it is to solve the original problem, which was the case until deep learning came along. The representation learning performed by deep learning
  • 3. International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019 15 systems is highly effective, since they build complex features (or concepts) from simple concepts. Figure 2. Components of a deep learning system 1.2`Big Data Big data can be defined as a capability of providing actionable real-time insights from large amounts of data. For data to be classified as big data, in addition to its abundance and vastness, it is also expected that it is being generated at a very fast pace from various varied sources. In fact, big data systems are characterized by 3 Vs – Volume, Velocity and Variety. Such systems generate large amounts of data that is both structured (data that is highly organized, and can be stored in a relational database) and unstructured (data that does not have a predefined data model). The data is generated at a fast pace in big data systems. Furthermore, big data systems also encompass a large variety of data sources. Examples of systems demonstrating big data behaviour are IoT (Internet of Things) devices. The value of a big data system is in providing real time insights into chip design flows that would be otherwise unavailable, and in providing recommendations for actions that can be taken to improve production flows. A simplified flow of the phases in a big data system is provided below in Figure 3: Figure3. Phases in Big Data
  • 4. International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019 16 There is significant literature available on building a software stack for big data systems, and there is no one right stack. However, it is typical to have either some or most of the components shown in Figure 4. The system can be further generalized into a pipeline of three key processes: • Data Capture: During this process, all relevant data is captured systematically. For example, for an IoT based real-time analytics solution, device metric samples may be captured at regular intervals. Furthermore, all data that the device depends on should also be captured or acquired (and then captured). • Data Processing: During this process, data captured is processed and stored. Depending on the type of data, an appropriate database or data store is used to store the data. Data Extraction: During this process, user requests, such as web requests or API calls are received and processed Figure 4. Big data software stack Custom visualizations and triggers are typical interfaces to big data systems. Visualizations enable users of big data systems to understand if systems are operating as expected, and take necessary actions in real time. 2. RELATED WORK Several efforts have shown the significance of MLbased efforts to solve optimization problems that are NPcomplete. In [6], the authors discuss a framework that optimizes FPGA flows. They present an ML-framework consisting of a set of classification and regression techniques to address the disconnect between different stages of FPGA design. The framework consists of five algorithms (Artificial Neural Network, Decision Tree, Support Vector Machine, K Nearest Neighbour, and Random Forest) that can be used to solve two problems: choosing between different placement flows and predicting various quality metrics related to FPGA placement.
  • 5. International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019 17 The framework employs supervised training methods. Training data is generated from 372 benchmarks by running the benchmarks through seven academic configurations that vary in certain parameters. Experimental results from 372 benchmark designs show that 4 out of the 7 configurations show accuracy of 88 to 99% in choosing a configuration that best minimizes total wire length. In [7], the authors describe how ML was used to predict DRC violations during the global routing stage. DRC violations during detailed routing prevent or delay tape outs. To prevent tape out delays, automatic place and route tools create a global routing map. The placer uses the routine map to optimize placement of blocks in a way so as to reduce or eliminate DRCs. However, at advanced nodes, the correlation between global and detailed routing weakens, leading to either aggressive optimization by the placer at the expense of area or power or too many DRCs in the final routing stage. In [8], the authors motivate a need for advanced analytics for semiconductor design to streamline R&D processes, optimizing product portfolios and helping businesses reduce costs. The fundamental difference between traditional and advanced analytics is as follows: in traditional analytics, the data is in existence, and analytics enable better understanding of data whereas advanced analytics is a process where the data to be collected is first defined by the analytics that would be needed to drive decisions. In research conducted across 200 projects, it is found that advanced analytics enabled project teams to reduce their project times by approximately 10%. In [9], the author describes use of big data techniques to improve verification efficiency. Verification is the most time consuming step in the chip design process, and a typical verification environment consists of geographically dispersed collaborative teams, and a flow that involves multiple systems. The author motivates the need for a central repository that can store metrics and data in a common format and shows the value of insights gathered by visualizing metrics. 3. METHODOLOGY RECOMMENDATIONS A strategy that enables corporate goals be it improving turnaround time for designs or reducing resource costs should be the centre point of any methodology. The research to date shows that chip design companies can incorporate data-driven methods in their workflows to improve quality of results, time to results or cost of results. These techniques require access to data from tool runs, flows and environment. Furthermore, chip design is a continuous process and a framework that continuously polls for new runs, captures meta data, and enables access to information through consistent interfaces is integral to reaping long-term benefits. Potential enterprise architecture for data driven applications is shown in Figure 5.
  • 6. International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019 18 Figure 5. Enterprise Architecture for applications robust capture mechanism should be in place to enable downstream processes. This framework should operate at the enterprise level, across geographically dispersed sites, be flexible enough to handle different types of tools and flows and scale to supporting hundreds of tool run every minute. An easy-to-use access/analysis mechanism is the key to building a lasting solution. In ML and big data systems, APIs are the most extensible way to provide analysis capabilities. APIs can be used to build custom visualizations or standalone applications. Formulating the ML problem requires the right expertise. It requires data scientists, domain experts and software engineers working together. It also requires the right kind of data, feature engineering and compute infrastructure. For many real-life problems, training times can be considerably long, and this may require special-purpose hardware. Furthermore, model retraining is necessary in production instances, so that model accuracy meets requirements. Other important considerations when deploying ML models for production are inference time, and a framework to monitor model accuracy. Some problems can be solved by using advanced analytics. Advanced analytics can enable users to understand what is happening, plan resource allocation, explore reasons for unexpected behaviour, identify anomalies, and get real-time information about project status. A common infrastructure consisting of capture-process organize phases can serve as the backbone for both ML and big data systems. 4. CONCLUSION Data driven techniques have shown promising results in optimizing chip design workflows. To enable enterprise-wide digital intelligence via ML and big data backed strategies, a robust framework for enabling both ML and big data should be put in place. Distributed big data systems are the cornerstone for enabling such techniques. It is important to use discretion in identifying areas to pursue using data-driven technologies since ML and big data do not apply to all problems. Coordinated execution from all the relevant domains is required to produce complex data driven solutions and a soiled approach will not provide lasting benefits. Companies that adopt data driven optimizations will have highly efficient design teams. In other words, to remain Database tool that runs Capture the data Organizi ng it Analyze Machine leraning / big data Improve QoS Reduce TTR Reduce COR
  • 7. International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019 19 competitive, companies should accelerate their plans for bringing digital intelligence into their flows. ACKNOWLEDGEMENTS We would like to thank who all are encouraging us to presenting & publishing this paper in this reputed journal. REFERENCES [1] Christopher M. Bishop, Pattern Recognition and Machine Learning. Springer: 2006 [2] Ian Goodfellow, Yoshua Bengio and Aaron Courville, Deep Learning. London, England: The MIT Press, 2016 [3] Richard S. Sutton and Andrew G. Barto, Reinforcement Learning: An Introduction. London, England: The MIT Press, 2017. [4] L. C. Wang, "Experience of Data Analytics in EDA and test Principles , Promises and Challenges,” in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 36, no. 6, pp. 885-898, June 2017 [5] G. Grewal, S. Areibi, M. Westrik, Z. Abuowaimer and B.Zhao, "Automatic Flow Selection and Quality-of-Result Estimation for FPGA Placement," 2017 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), Lake Buena Vista, FL, 2017, pp. 115-123. [6] W. J. Chan, P. Ho, A. B. Kahng, P. Saxena, “Routability Optimization for Industrial Designs at Sub- 14nm Process Nodes Using Machine Learning,” Proceedings of the 2017ACM on International Symposium on Physical Design (ISPD17), pp. 15-21 [7] B. Yu, D. Z. Pan, T. Matsunawa and X. Zeng, "Machine learning and pattern matching in physical design," The 20th Asia and South Pacific Design Automation Conference, Chiba, 2015, pp. 286-293 [8] G. Batra, Z. Jacobsen, N. Santhanam, “Improving the semiconductor industry through advanced analytics”, McKinsey Article, March 2016. [9] D. K. May, “Improving Verification Predictability and Efficiency Using Big Data,”, DVCon Proceedings, February 2018. AUTHORS B. Syed Moinuddin Bokhari completed his B.E. from Government College of Engineering, Bargur, INDIA affiliated to University of Madras in 2001, received his M.E. from Jayaram College of Engineering and Technology, Thuriayur, INDIA affiliated to Anna University, Chennai INDIA in 2005.Currently he is a research scholar at the department of Electronics and Communication Engineering, College of Engineering Guindy, Anna University, Chennai, INDIA. His field of interests include wireless communication and networks, signal processing. His current research interests are deep learning, machine learning for wireless communication and VLSI, multiuser detection, multiuser scheduling applied to FPGA based SISO/MIMO test beds. He is a life member of ISTE.
  • 8. International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019 20 K. Karpoora Sundari completed her B.E. from Syed Ammal Engineering College, Ramanathapuram, Tamil Nadu, India affiliated to Madurai Kamaraj University in the year 2003. After that she did her M. E in Applied Electronics in R.V. S College of Engineering & Technology, Dindigul, Tamil Nadu, India affiliated to Anna University Chennai in the year 2012. She published papers in various national and international conferences. Currently she is working as an Associate Professor of ECE department in M. A. M College of Engineering & Technology, Tiruchirappalli, Tamil Nadu, India. She is having around 14 years of experience in both teaching and industry. Her field of Interest includes Digital VLSI Design, Embedded System , computer networks, deep learning, machine learning VLSI, Cyber physical systems and artificial Intelligence. Mr. V. Praveenkumar is working as Assistant Professor in the department of Information Technology in M. A. M. College of Engineering and Technology. He completed his Undergraduate degree B. Tech-Information technology in the year of 2010. He completed his postgraduate degree M. E.– Pervasive computing Technology in 2012 In Anna University, Tricky. His research areas include Parallel processing, machine learning algorithms, Cloud computing and Big data. Mrs. S. Kavitha is working as an Associate professor in M. A. M College of Engineering. She completed her B. E in Electronics & Communication Engineering in JJ College of Engineering & Technology, Trichy under Bharathidhasan University during the year 2002 and completed M. E in Communication Systems in Jayaram College of Engineering & Technology. Currently she is doing research under antennas. Her area of interest includes RF and Microwaves, deep learning, wireless communication and VLSI.