The Natural Way to Evolve Hardware

نویسندگان

  • Adrian Thompson
  • Inman Harvey
  • Philip Husbands
چکیده

Arti cial evolution can automatically derive the con g uration of a recon gurable hardware system such that it performs a given task Individuals of the evolving popu lation are evaluated when instantiated as real circuits so if constraints inherent to human design but not to evolu tion are dropped then the natural physical dynamics of the hardware can be exploited in new ways The notion of an arti cially evolving species SAGA allows the open ended incremental evolution of complex circuits Theoretical ar guments are given as well as the real world example of an evolved hardware robot controller

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evolution in materio: Looking Beyond the Silicon Box

It is argued that natural evolution is, par excellence, an algorithm that exploits the physical properties of materials. Such an exploitation of the physical characteristics has already been demonstrated in intrinsic evolution of electronic circuits. This paper is an attempt to point the way toward the exciting possibility of using artificial evolution to directly exploit the properties of mate...

متن کامل

Improving evolvable hardware by applying the speciation technique

Evolvable hardware (EHW) has recently become a highly attractive topic of study because it offers a way of adapting hardware to a given embedded environment. However, it is not easy to evolve hardware efficiently and effectively, so many challenges continue to exist when trying to solve problems. In this paper, we propose a method that uses the speciation technique to enable diverse circuits to...

متن کامل

Threshold Implementation as a Countermeasure against Power Analysis Attacks

One of the usual ways to find sensitive data or secret parameters of cryptographic devices is to use their physical leakages. Power analysis is one of the attacks which lay in such a model. In comparison with other types of side-channels, power analysis is so efficient and has a high success rate. So it is important to provide a countermeasure against it. Different types of countermeasures use ...

متن کامل

Secure FPGA Design by Filling Unused Spaces

Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...

متن کامل

Hardwar Trojan classification and implementation and offer a new detection approach

A hardware attack that enables the attacker to alter the main circuit with malicious hardware during either design or the fabrication process is studied and analyzed. This attack, known as the hardware Trojan, has different objectives such as destroying hardware, changing circuit characteristics or extracting sensitive information. So hardware Trojan detection and hardware security are critical...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996