Learn More
Cloud computing is an emerging, on-demand and internet-based technology. It provides variety of services over internet such as, software, hardware, data storage and infrastructure. This technology has been used by worldwide customers to improve their business performance. However, to utilize these services by authorized customer, it is necessary to have(More)
A new test-set selection technique based on the frequency-domain testing of analog circuits is presented in this paper. We propose a new automatic test pattern generation (ATPG) method known as MultiDetect for testing linear time invariant (LTI) circuits. The proposed technique is best suited for use of existing building blocks in systems-on-chip for(More)
In analog testing, usage of a single sinusoid as a test signal when compared to multitone signal, and fault detection with digital counting technique, facilitate the test implementation with simple built-in self-test hardware and make testing more cost effective. In this paper, a novel test-set-selection technique known as ExpoTan for testing(More)
—A simple and cost-effective software-based resolver-to-digital converter using a digital signal processor is presented. The proposed method incorporates software generation of the re-solver carrier using a digital filter for synchronous demodulation of the resolver outputs in such a way that there is a substantial savings on hardware like the costly(More)
Data acquisition plays an important role in processor based real-time embedded systems. The embedded software has to receive the input data from various sensors and take appropriate action depending upon the application. Thus, the process of data acquisition affects the design of the embedded software and also its execution time. In the conventional(More)
A secured “co-operative cloud computing utility”, is a shared set of unique and virtually interconnected system assets. These, computing services, are accessed globally using thin clients and handheld devices through standard collective GUI, anytime, at any location upon payment of specified usage charges. This multi-ally computing utility(More)
Innovative approaches for securing the computing systems have intense inference for our understanding of technological, societal, economical, and political phenomena in making guiding principles, policies, rules and security implementations. The model presented here is based on cooperative and collaborative multilateral relationship among the shared(More)