A new variable topology for evolutionary hardware design
نویسندگان
چکیده
In this paper, a novel variable topology for evolutionary hardware design is proposed. The slicing structure and routing graph are integrated into the design of evolutionary hardware. With off-line gate-level samples, simulation results clearly demonstrate the validity of this new approach performed as superior as existing methods in the logic circuit optimization. Compare with the random circuit matrix method, our approach uses less code length for evolutionary hardware description. The method we proposed could be taken as an alternative way for possible evolutionary hardware applications in the future.
منابع مشابه
A New Approach of Backbone Topology Design Used by Combination of GA and PSO Algorithms
A number of algorithms based on the evolutionary processing have been proposed forcommunication networks backbone such as Genetic Algorithm (GA). However, there has beenlittle work on the SWARM optimization algorithms such as Particle Swarm Optimization(PSO) for backbone topology design. In this paper, the performance of PSO on GA isdiscussed and a new algorithm as PSOGA is proposed for the net...
متن کاملMulti-layer Clustering Topology Design in Densely Deployed Wireless Sensor Network using Evolutionary Algorithms
Due to the resource constraint and dynamic parameters, reducing energy consumption became the most important issues of wireless sensor networks topology design. All proposed hierarchy methods cluster a WSN in different cluster layers in one step of evolutionary algorithm usage with complicated parameters which may lead to reducing efficiency and performance. In fact, in WSNs topology, increasin...
متن کاملA Hierarchy Topology Design Using a Hybrid Evolutionary Algorithm in Wireless Sensor Networks
Wireless sensor network a powerful network contains many wireless sensors with limited power resource, data processing, and transmission abilities. Wireless sensor capabilities including computational capacity, radio power, and memory capabilities are much limited. Moreover, to design a hierarchy topology, in addition to energy optimization, find an optimum clusters number and best location of ...
متن کاملASIC design protection against reverse engineering during the fabrication process using automatic netlist obfuscation design flow
Fab-less business model in semiconductor industry has led to serious concerns about trustworthy hardware. In untrusted foundries and manufacturing companies, submitted layout may be analyzed and reverse engineered to steal the information of a design or insert malicious Trojans. Understanding the netlist topology is the ultimate goal of the reverse engineering process. In this paper, we propose...
متن کاملOn Feasibility of Adaptive Level Hardware Evolution for Emergent Fault Tolerant Communication
A permanent physical fault in communication lines usually leads to a failure. The feasibility of evolution of a self organized communication is studied in this paper to defeat this problem. In this case a communication protocol may emerge between blocks and also can adapt itself to environmental changes like physical faults and defects. In spite of faults, blocks may continue to function since ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Expert Syst. Appl.
دوره 36 شماره
صفحات -
تاریخ انتشار 2009