In the steady operation condition, the experiments and the numerical simulations are used to investigate the tip leakage flow fields in three low pressure axial flow fans with three kinds of circumferential skewed rot...In the steady operation condition, the experiments and the numerical simulations are used to investigate the tip leakage flow fields in three low pressure axial flow fans with three kinds of circumferential skewed rotors, including the radial rotor, the forward-skewed rotor and the back- ward-skewed rotor. The three-dimensional viscous flow fields of the fans are computed. In the experiments, the two-dimensional plane particle image velocimetry (PIV) system is used to measure the flow fields in the tip region of three different pitchwise positions of each fan. The results show that the computational results agree well with the experimental data in the flow field of the tip region of each fan. The tip leakage vortex core segments based on method of the eigenmode analysis can display clearly some characteristics of the tip leakage vortex, such as the origination position of tip leak- age vortex, the development of vortex strength, and so on. Compared with the radial rotor, the other two skewed rotors can increase the stability of the tip leakage vortex and the increment in the forward-skewed rotor is more than that in the backward-skewed one. Among the tip leakage vortices of the three rotors, the velocity of the vortex in the forward-skewed rotor is th6 highest in the circumferential direction and the lowest in the axial direction.展开更多
Leakage power analysis(LPA) attacks aim at finding the secret key of a cryptographic device from measurements of its static(leakage) power. This novel power analysis attacks take advantage of the dependence of the lea...Leakage power analysis(LPA) attacks aim at finding the secret key of a cryptographic device from measurements of its static(leakage) power. This novel power analysis attacks take advantage of the dependence of the leakage power of complementary metal oxide semiconductor(CMOS) integrated circuits on the data they process. This paper proposes symmetric dual-rail logic(SDRL), a standard cell LPA attack countermeasure that theoretically resists the LPA attacks. The technique combines standard building blocks to make new compound standard cells, which are close to constant leakage power consumption. Experiment results show SDRL is a promising approach to implement an LPA-resistant crypto processor.展开更多
The present paper analyzes the hold and read stability with temperature and aspect ratio variations. To reduce the power dissipation, one of the effective techniques is the supply voltage reduction. At this reduced su...The present paper analyzes the hold and read stability with temperature and aspect ratio variations. To reduce the power dissipation, one of the effective techniques is the supply voltage reduction. At this reduced supply voltage the data must be stable. So, the minimum voltage should be discovered which can also retain the data. This voltage is the data retention voltage(DRV). The DRV for 6T SRAM cell is estimated and analyzed in this paper.The sensitivity analysis is performed for the DRV variation with the variation in the temperature and aspect ratio of the pull up and pull down transistors. Cadence Virtuoso is used for DRV analysis using 45 nm GPDK technology files. After this, the read stability analysis of 6T SRAM cell in terms of SRRV(supply read retention voltage) and WRRV(wordline read retention voltage) is carried out. Read stability in terms of RSNM can be discovered by accessing the internal storage nodes. But in the case of dense SRAM arrays instead of using internal storage nodes,the stability can be discovered by using direct bit line measurements with the help of SRRV and WRRV. SRRV is used to find the minimum supply voltage for which data can be retained during a read operation. Similarly, WRRV is used to find the boosted value of wordline voltage, for which data can be retained during read operation. The SRRV and WRRV values are then analyzed for different Cell Ratios. The results of SRRV and WRRV are then compared with the reported data for the validation of the accuracy of the results.展开更多
基金This project is supported by National Natural Science Foundation of China (No. 50406017).
文摘In the steady operation condition, the experiments and the numerical simulations are used to investigate the tip leakage flow fields in three low pressure axial flow fans with three kinds of circumferential skewed rotors, including the radial rotor, the forward-skewed rotor and the back- ward-skewed rotor. The three-dimensional viscous flow fields of the fans are computed. In the experiments, the two-dimensional plane particle image velocimetry (PIV) system is used to measure the flow fields in the tip region of three different pitchwise positions of each fan. The results show that the computational results agree well with the experimental data in the flow field of the tip region of each fan. The tip leakage vortex core segments based on method of the eigenmode analysis can display clearly some characteristics of the tip leakage vortex, such as the origination position of tip leak- age vortex, the development of vortex strength, and so on. Compared with the radial rotor, the other two skewed rotors can increase the stability of the tip leakage vortex and the increment in the forward-skewed rotor is more than that in the backward-skewed one. Among the tip leakage vortices of the three rotors, the velocity of the vortex in the forward-skewed rotor is th6 highest in the circumferential direction and the lowest in the axial direction.
基金the Software and Integrated CircuitIndustries Development Foundation of Shanghai(No.12Z116010001)
文摘Leakage power analysis(LPA) attacks aim at finding the secret key of a cryptographic device from measurements of its static(leakage) power. This novel power analysis attacks take advantage of the dependence of the leakage power of complementary metal oxide semiconductor(CMOS) integrated circuits on the data they process. This paper proposes symmetric dual-rail logic(SDRL), a standard cell LPA attack countermeasure that theoretically resists the LPA attacks. The technique combines standard building blocks to make new compound standard cells, which are close to constant leakage power consumption. Experiment results show SDRL is a promising approach to implement an LPA-resistant crypto processor.
文摘The present paper analyzes the hold and read stability with temperature and aspect ratio variations. To reduce the power dissipation, one of the effective techniques is the supply voltage reduction. At this reduced supply voltage the data must be stable. So, the minimum voltage should be discovered which can also retain the data. This voltage is the data retention voltage(DRV). The DRV for 6T SRAM cell is estimated and analyzed in this paper.The sensitivity analysis is performed for the DRV variation with the variation in the temperature and aspect ratio of the pull up and pull down transistors. Cadence Virtuoso is used for DRV analysis using 45 nm GPDK technology files. After this, the read stability analysis of 6T SRAM cell in terms of SRRV(supply read retention voltage) and WRRV(wordline read retention voltage) is carried out. Read stability in terms of RSNM can be discovered by accessing the internal storage nodes. But in the case of dense SRAM arrays instead of using internal storage nodes,the stability can be discovered by using direct bit line measurements with the help of SRRV and WRRV. SRRV is used to find the minimum supply voltage for which data can be retained during a read operation. Similarly, WRRV is used to find the boosted value of wordline voltage, for which data can be retained during read operation. The SRRV and WRRV values are then analyzed for different Cell Ratios. The results of SRRV and WRRV are then compared with the reported data for the validation of the accuracy of the results.