[Show abstract][Hide abstract] ABSTRACT: Electronic systems are vulnerable in electromagnetic interference environment. Although many solutions are adopted to solve this problem, for example shielding, filtering and grounding, noise is still introduced into the circuit inevitably. What impresses us is the biological nervous system with a vital property of robustness in noisy environment. Some mechanisms, such as neuron population coding, degeneracy and parallel distributed processing, are believed to partly explain how the nervous system counters the noise and component failure. This paper proposes a novel concept of bio-inspired electromagnetic protection making reference to the characteristic of neural information processing. A bionic model is presented here to mimic neuron populations to transform the input signal into neural pulse signal. In the proposed model, neuron provides a dynamic feedback to the adjacent one according to the concept of synaptic plasticity. A simple neural circuitry is designed to verify the rationality of the bio-inspired model for electromagnetic protection. The experiment results display that bio-inspired electromagnetic protection model has more power to counter the interference and component failure.
Full-text · Article · Jan 2014 · Journal of Bionic Engineering
[Show abstract][Hide abstract] ABSTRACT: With the rapid development of semiconductor technology and the increasing proliferation of emission sources, digital circuits are frequently used in harsh and hostile electromagnetic environments. Electrostatic Discharge (ESD) interferences are gradually gaining prominence, resulting in performance degradations, malfunctions and disturbances in component and/or system level applications. Conventional solutions to such problems are shielding, filtering and grounding. This paper proposes a novel Evolvable Digital Circuit (EDC) for intrinsic immunity. The key idea is motivated by the noise-robustness and fault-tolerance of the biological system. First, the architecture of the EDC is designed based on the cell structure. Then, ESD immunity tests are carried out on the most fragile element of the EDC in operation. Based on the results, fault models are also presented to simulate different functional disturbances. Finally, the immunity of the EDC is evaluated while it is exposed to a variety of simulated environments. The results which demonstrate a graceful immunity to ESD interference are presented.
No preview · Article · Sep 2012 · Journal of Bionic Engineering
[Show abstract][Hide abstract] ABSTRACT: As the semiconductor feature size decreases and the number of transistors on a single chip increases, digital circuits are frequently used in harsh and complex electromagnetic interference (EMI) environments. Typical protection problems are gradually prominent, such as malfunctions, performance degradation and destructions in component and/or system. This paper proposed a bio-inspired model to fulfil the requirements of digital circuits' protection performance. Firstly, extensive experiments have been carried out and are presented here to simulate the process of field program gate array (FPGA) chips damaged by human body model (HBM) electrostatic discharge (ESD), applying the contact discharge method. And then, this paper builds the functional fault model of the above process and verifies the similarity in the aftermath of damaging electrical and biological systems. Thus for electronic system design, we proposed the virtual cell model with redundancy structure, self-organising and self-healing operational methodology which is built upon artificial evolution. Finally, we implemented Markov model to analyse the steady-state stability of the virtual cell model in order to prove its durability when it comes to heavy and frequent ESD damage.
No preview · Article · Jul 2012 · International Journal of Modelling Identification and Control
[Show abstract][Hide abstract] ABSTRACT: Brushless Motors are frequently employed in control systems. The reliability of the brushless motor control circuits is highly
critical especially in harsh environments. This paper presents an Evolvable Hardware (EHW) platform for automated design and
adaptation of a brushless motors control circuit. The platform uses the principles of EHW to automate the configuration of
FPGA dedicated to the implementation of the motor control circuit. The ability of the platform to adapt to a certain number
of faults was investigated through introducing single logic unit faults and multi-logic unit faults. Results show that the
functionality of the motor control circuit can be recovered through evolution. They also show that the location of faulty
logic units can affect the ability of the evolutionary algorithm to evolve correct circuits, and the evolutionary recovery
ability of the circuit decreases as the number of fault logic units is increasing.
[Show abstract][Hide abstract] ABSTRACT: This paper proposed a hierarchical structure model of the electronic system firstly, and then the expression method of the structure matrix was optimized. After that, the repair question of the system with redundant module was analyzed and turned into a kind of matrix solving, and the redundant repairs algorithm was provided at the same time. By repairing one bit half adder with one redundant mould, the feasibility of this method was proved and a new thought for the electronic system repair online was raised.
[Show abstract][Hide abstract] ABSTRACT: The article analyzes the CMOS logical gate's electric current characteristic under the active status, establishes the electromagnetic information leakage hamming distance model in registers level. Aimed at the data encryption standard (DES) cryptographic system realized by the P89C668 microcomputer, Correlation Electromagnetic Analysis (CEMA) algorithm was described, the choosing of attack point D and the computational method were analyzed, an attack experiment was processed by CEMA, thereby obtaining 48-bits sub-key of the 16th round of DES. The result shows that EM information leakage exists in CMOS integrated circuit during work, XOR operation in each round of DES is an attack point. It can provide a basis for implementing protective measures in the cryptographic systems.