SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019
DOI : 10.5121/ijesa.2019.9202 13
ANALYSIS OF SYSTEM ON CHIP DESIGN USING
ARTIFICIAL INTELLIGENCE
Syed Moinuddin Bokhari1
, Karpoora Sundari2
, Praveen Kumar3
, Kavitha4
1
Associate Professor & Head, Department of Electronics & Communication Engineering,
M. A. M College of Engineering & Technology, India
2 &4
Associate Professor, Department of Electronics & Communication Engineering, M. A.
M College of Engineering & Technology, India
3
Assistant Professor, Department of Information Technology, M. A. M College of
Engineering & Technology, India
ABSTRACT
Automation is a powerful word that lies everywhere. It shows that without automation, application will not
get developed. In a semiconductor industry, artificial intelligence played a vital role for implementing the
chip based design through automation .The main advantage of applying the machine learning & deep
learning technique is to improve the implementation rate based upon the capability of the society. The
main objective of the proposed system is to apply the deep learning using data driven approach for
controlling the system. Thus leads to a improvement in design, delay ,speed of operation & costs.
Through this system, huge volume of data’s that are generated by the system will also get control.
KEYWORDS
Deep learning, artificial intelligence, machine learning, semiconductor technology.
1. INTRODUCTION
The International Technology Roadmap for Semiconductors (ITRS) estimates that by 2020, IC
designs will pack 1 trillion transistors per chip. The number of Design Rule Checks (DRC) have
increased by a factor of 10X roughly every 10 years, and so have number of scenarios operating
modes and corners – that must be evaluated by EDA tools to verify and implement designs.
Product development schedules are getting shorter, which means productivity per engineer must
increase by 15X from 1 million to 15 million gates per year to keep up with the complexity
increase.
Semiconductor design activity produces vast amounts of data, but this data is not utilized in any
systematic manner by chip design teams. Data driven approaches have demonstrated significant
benefits in many industries and similar approaches can provide actionable insights and enable
predictive technologies in semiconductor workflows. Two prominent data driven techniques are
Machine Learning (ML) and big data.
1.1 Machine Learning
ML is a branch of Artificial Intelligence and is defined as the ability to learn without explicit
programming. ML programs learn from data, and in many cases provide improved results given
more data. There are three types of ML: Supervised, Unsupervised and Reinforcement.
International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019
14
In supervised learning, labelled data is provided as input to the system. Labelled data is
comprised of a set of samples that have been tagged with labels that are meaningful. For example,
identifying a set of log files from tool runs with tags that denote whether they are good runs or
attention-needing runs can be construed as providing labelled data. In supervised learning, a
model is first trained based on given samples.
Training a model entails extracting features from the given samples, and providing the set of
(input) features along with the label to an algorithm which learns the mapping of inputs to output.
The output from the training phase is a model, which can be persisted if needed. This model is
then deployed and used to infer the label for new and previously unseen data. A typical
supervised learning system is shown in Figure 1.
Figure. 1 Supervised learning workflow
Unsupervised learning systems do not require labelled data. Unsupervised learning algorithms are
used to infer a function or underlying structure from unlabeled data. They are widely used in data
analysis and data mining. While supervised learning is clearly more common today, unsupervised
learning is likely to be more prevalent in the future, given the abundant internet data that is
generated every day, and the expected interest from corporations to monetize this data.
The fundamental concept in reinforcement learning is that learning can be achieved by interacting
with the environment. Just like a child learns without an explicit teacher that smiling or crying
have different effects, reinforcement learning algorithms are based on cause and effect. The
learner is not told what actions to take, but it must discover what actions (immediate or future) are
most rewarding. In recent times, a branch of machine learning called deep learning has become
popular. Deep learning systems [2] can be characterized as universal approximators capable of
modeling non-linearity with a high level of accuracy. Growth in deep learning was primarily
driven by the widespread availability of high-performance special-purpose computation platforms
and the abundance of data. An anatomy of a deep learning system is shown in Figure 2.
Deep learning systems address a basic problem in ML.All ML systems learn the mapping of
inputs to output by extracting features from input, and for most tasks, it is hard to know what
features to extract. An approach popularly known as Representation Learning can be employed to
learn features, and this is fundamental to all deep learning algorithms.
Learned representations are generally better than manually manually extracted features, with the
added benefit of reduced human intervention. While representation learning was a known field,
the advent of deep learning made it viable. Representation learning can be difficult to put in
practice if it is as hard to get representations as it is to solve the original problem, which was
the case until deep learning came along. The representation learning performed by deep learning
International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019
15
systems is highly effective, since they build complex features (or concepts) from simple
concepts.
Figure 2. Components of a deep learning system
1.2`Big Data
Big data can be defined as a capability of providing actionable real-time insights from large
amounts of data. For data to be classified as big data, in addition to its abundance and vastness, it
is also expected that it is being generated at a very fast pace from various varied sources. In fact,
big data systems are characterized by 3 Vs – Volume, Velocity and Variety. Such systems
generate large amounts of data that is both structured (data that is highly organized, and can be
stored in a relational database) and unstructured (data that does not have a predefined data
model). The data is generated at a fast pace in big data systems. Furthermore, big data systems
also encompass a large variety of data sources. Examples of systems demonstrating big data
behaviour are IoT (Internet of Things) devices. The value of a big data system is in providing real
time insights into chip design flows that would be otherwise unavailable, and in providing
recommendations for actions that can be taken to improve production flows. A simplified flow of
the phases in a big data system is provided below in Figure 3:
Figure3. Phases in Big Data
International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019
16
There is significant literature available on building a software stack for big data systems, and
there is no one right stack.
However, it is typical to have either some or most of the components shown in Figure 4. The
system can be further generalized into a pipeline of three key processes:
• Data Capture: During this process, all relevant data is captured systematically. For example,
for an IoT based real-time analytics solution, device metric samples may be captured at
regular intervals. Furthermore, all data that the device depends on should also be captured or
acquired (and then captured).
• Data Processing: During this process, data captured is processed and stored. Depending on the
type of data, an appropriate database or data store is used to store the data.
Data Extraction: During this process, user requests, such as web requests or API calls are received
and processed
Figure 4. Big data software stack
Custom visualizations and triggers are typical interfaces to big data systems. Visualizations
enable users of big data systems to understand if systems are operating as expected, and take
necessary actions in real time.
2. RELATED WORK
Several efforts have shown the significance of MLbased efforts to solve optimization problems
that are NPcomplete. In [6], the authors discuss a framework that optimizes FPGA flows. They
present an ML-framework consisting of a set of classification and regression techniques to
address the disconnect between different stages of FPGA design. The framework consists of five
algorithms (Artificial Neural Network, Decision Tree, Support Vector Machine, K Nearest
Neighbour, and Random Forest) that can be used to solve two problems: choosing between
different placement flows and predicting various quality metrics related to FPGA placement.
International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019
17
The framework employs supervised training methods. Training data is generated from 372
benchmarks by running the benchmarks through seven academic configurations that vary in
certain parameters. Experimental results from 372 benchmark designs show that 4 out of the 7
configurations show accuracy of 88 to 99% in choosing a configuration that best minimizes total
wire length.
In [7], the authors describe how ML was used to predict DRC violations during the global routing
stage. DRC violations during detailed routing prevent or delay tape outs. To prevent tape out
delays, automatic place and route tools create a global routing map. The placer uses the routine
map to optimize placement of blocks in a way so as to reduce or eliminate DRCs. However, at
advanced nodes, the correlation between global and detailed routing weakens, leading to either
aggressive optimization by the placer at the expense of area or power or too many DRCs in the
final routing stage.
In [8], the authors motivate a need for advanced analytics for semiconductor design to streamline
R&D processes, optimizing product portfolios and helping businesses reduce costs. The
fundamental difference between traditional and advanced analytics is as follows: in traditional
analytics, the data is in existence, and analytics enable better understanding of data whereas
advanced analytics is a process where the data to be collected is first defined by the analytics that
would be needed to drive decisions. In research conducted across 200 projects, it is found that
advanced analytics enabled project teams to reduce their project times by approximately 10%.
In [9], the author describes use of big data techniques to improve verification efficiency.
Verification is the most time consuming step in the chip design process, and a typical verification
environment consists of geographically dispersed collaborative teams, and a flow that involves
multiple systems. The author motivates the need for a central repository that can store metrics and
data in a common format and shows the value of insights gathered by visualizing metrics.
3. METHODOLOGY RECOMMENDATIONS
A strategy that enables corporate goals be it improving turnaround time for designs or reducing
resource costs should be the centre point of any methodology.
The research to date shows that chip design companies can incorporate data-driven methods in
their workflows to improve quality of results, time to results or cost of results. These techniques
require access to data from tool runs, flows and environment. Furthermore, chip design is a
continuous process and a framework that continuously polls for new runs, captures meta data, and
enables access to information through consistent interfaces is integral to reaping long-term
benefits. Potential enterprise architecture for data driven applications is shown in Figure 5.
International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019
18
Figure 5. Enterprise Architecture for applications
robust capture mechanism should be in place to enable downstream processes. This framework
should operate at the enterprise level, across geographically dispersed sites, be flexible enough to
handle different types of tools and flows and scale to supporting hundreds of tool run every
minute.
An easy-to-use access/analysis mechanism is the key to building a lasting solution. In ML and big
data systems, APIs are the most extensible way to provide analysis capabilities. APIs can be used
to build custom visualizations or standalone applications.
Formulating the ML problem requires the right expertise. It requires data scientists, domain
experts and software engineers working together. It also requires the right kind of data, feature
engineering and compute infrastructure. For many real-life problems, training times can be
considerably long, and this may require special-purpose hardware.
Furthermore, model retraining is necessary in production instances, so that model accuracy meets
requirements. Other important considerations when deploying ML models for production are
inference time, and a framework to monitor model accuracy.
Some problems can be solved by using advanced analytics. Advanced analytics can enable users
to understand what is happening, plan resource allocation, explore reasons for unexpected
behaviour, identify anomalies, and get real-time information about project status. A common
infrastructure consisting of capture-process organize phases can serve as the backbone for both
ML and big data systems.
4. CONCLUSION
Data driven techniques have shown promising results in optimizing chip design workflows. To
enable enterprise-wide digital intelligence via ML and big data backed strategies, a robust
framework for enabling both ML and big data should be put in place. Distributed big data systems
are the cornerstone for enabling such techniques. It is important to use discretion in identifying
areas to pursue using data-driven technologies since ML and big data do not apply to all
problems. Coordinated execution from all the relevant domains is required to produce complex
data driven solutions and a soiled approach will not provide lasting benefits. Companies that
adopt data driven optimizations will have highly efficient design teams. In other words, to remain
Database
tool that
runs
Capture
the data
Organizi
ng it
Analyze
Machine
leraning /
big data
Improve
QoS
Reduce
TTR
Reduce
COR
International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019
19
competitive, companies should accelerate their plans for bringing digital intelligence into their
flows.
ACKNOWLEDGEMENTS
We would like to thank who all are encouraging us to presenting & publishing this paper in this
reputed journal.
REFERENCES
[1] Christopher M. Bishop, Pattern Recognition and Machine Learning. Springer: 2006
[2] Ian Goodfellow, Yoshua Bengio and Aaron Courville, Deep Learning. London, England: The MIT
Press, 2016
[3] Richard S. Sutton and Andrew G. Barto, Reinforcement Learning: An Introduction. London, England:
The MIT Press, 2017.
[4] L. C. Wang, "Experience of Data Analytics in EDA and test Principles , Promises and Challenges,” in
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 36, no. 6, pp.
885-898, June 2017
[5] G. Grewal, S. Areibi, M. Westrik, Z. Abuowaimer and B.Zhao, "Automatic Flow Selection and
Quality-of-Result Estimation for FPGA Placement," 2017 IEEE International Parallel and Distributed
Processing Symposium Workshops (IPDPSW), Lake Buena Vista, FL, 2017, pp. 115-123.
[6] W. J. Chan, P. Ho, A. B. Kahng, P. Saxena, “Routability Optimization for Industrial Designs at Sub-
14nm Process Nodes Using Machine Learning,” Proceedings of the 2017ACM on International
Symposium on Physical Design (ISPD17), pp. 15-21
[7] B. Yu, D. Z. Pan, T. Matsunawa and X. Zeng, "Machine learning and pattern matching in physical
design," The 20th Asia and South Pacific Design Automation Conference, Chiba, 2015, pp. 286-293
[8] G. Batra, Z. Jacobsen, N. Santhanam, “Improving the semiconductor industry through advanced
analytics”, McKinsey Article, March 2016.
[9] D. K. May, “Improving Verification Predictability and Efficiency Using Big Data,”, DVCon
Proceedings, February 2018.
AUTHORS
B. Syed Moinuddin Bokhari completed his B.E. from Government College of
Engineering, Bargur, INDIA affiliated to University of Madras in 2001, received his
M.E. from Jayaram College of Engineering and Technology, Thuriayur, INDIA
affiliated to Anna University, Chennai INDIA in 2005.Currently he is a research scholar
at the department of Electronics and Communication Engineering, College of
Engineering Guindy, Anna University, Chennai, INDIA. His field of interests include
wireless communication and networks, signal processing. His current research interests
are deep learning, machine learning for wireless communication and VLSI, multiuser
detection, multiuser scheduling applied to FPGA based SISO/MIMO test beds. He is a life member of
ISTE.
International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019
20
K. Karpoora Sundari completed her B.E. from Syed Ammal Engineering College,
Ramanathapuram, Tamil Nadu, India affiliated to Madurai Kamaraj University in the
year 2003. After that she did her M. E in Applied Electronics in R.V. S College of
Engineering & Technology, Dindigul, Tamil Nadu, India affiliated to Anna University
Chennai in the year 2012. She published papers in various national and international
conferences. Currently she is working as an Associate Professor of ECE department in M.
A. M College of Engineering & Technology, Tiruchirappalli, Tamil Nadu, India. She is
having around 14 years of experience in both teaching and industry. Her field of Interest includes Digital
VLSI Design, Embedded System , computer networks, deep learning, machine learning VLSI, Cyber
physical systems and artificial Intelligence.
Mr. V. Praveenkumar is working as Assistant Professor in the department of Information
Technology in M. A. M. College of Engineering and Technology. He completed his
Undergraduate degree B. Tech-Information technology in the year of 2010. He completed
his postgraduate degree M. E.– Pervasive computing Technology in 2012 In Anna
University, Tricky. His research areas include Parallel processing, machine learning
algorithms, Cloud computing and Big data.
Mrs. S. Kavitha is working as an Associate professor in M. A. M College of Engineering.
She completed her B. E in Electronics & Communication Engineering in JJ College of
Engineering & Technology, Trichy under Bharathidhasan University during the year 2002
and completed M. E in Communication Systems in Jayaram College of Engineering &
Technology. Currently she is doing research under antennas. Her area of interest includes
RF and Microwaves, deep learning, wireless communication and VLSI.

Contenu connexe

Tendances

Machine learning Summer Training report
Machine learning Summer Training reportMachine learning Summer Training report
Machine learning Summer Training reportSubhadip Mondal
 
Federated Semi-Supervised Learning with Inter-Client Consistency & Disjoint L...
Federated Semi-Supervised Learning with Inter-Client Consistency & Disjoint L...Federated Semi-Supervised Learning with Inter-Client Consistency & Disjoint L...
Federated Semi-Supervised Learning with Inter-Client Consistency & Disjoint L...MLAI2
 
Paper sharing_data-driven smart manufacturing (include smart manufacturing se...
Paper sharing_data-driven smart manufacturing (include smart manufacturing se...Paper sharing_data-driven smart manufacturing (include smart manufacturing se...
Paper sharing_data-driven smart manufacturing (include smart manufacturing se...YOU SHENG CHEN
 
Ai open powermeetupmarch25th
Ai open powermeetupmarch25thAi open powermeetupmarch25th
Ai open powermeetupmarch25thIBM
 
Infrastructure Designed for Cognitive Workloads: Why is it Crucial? - Xavier ...
Infrastructure Designed for Cognitive Workloads: Why is it Crucial? - Xavier ...Infrastructure Designed for Cognitive Workloads: Why is it Crucial? - Xavier ...
Infrastructure Designed for Cognitive Workloads: Why is it Crucial? - Xavier ...WithTheBest
 
Sumithranandan_TechnicalWriter_10+Yrs_Exp
Sumithranandan_TechnicalWriter_10+Yrs_ExpSumithranandan_TechnicalWriter_10+Yrs_Exp
Sumithranandan_TechnicalWriter_10+Yrs_ExpSumitra Nandan
 
Ijsred v2 i5p95
Ijsred v2 i5p95Ijsred v2 i5p95
Ijsred v2 i5p95IJSRED
 
Help through demonstration and automation for interactive computing systems: ...
Help through demonstration and automation for interactive computing systems: ...Help through demonstration and automation for interactive computing systems: ...
Help through demonstration and automation for interactive computing systems: ...IJECEIAES
 
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...ijceronline
 
Poster ECIS 2016
Poster ECIS 2016Poster ECIS 2016
Poster ECIS 2016Rui Silva
 
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCE
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCEANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCE
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCEIAEME Publication
 
Kentaro 2009 02 11 CooperacióN Toyama
Kentaro 2009 02 11 CooperacióN   ToyamaKentaro 2009 02 11 CooperacióN   Toyama
Kentaro 2009 02 11 CooperacióN ToyamaCOOPERACION 2.0 2009
 
A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingOsama M. Khaled
 
Transforming Healthcare Industry by Implementing Cloud Computing
Transforming Healthcare Industry by Implementing Cloud ComputingTransforming Healthcare Industry by Implementing Cloud Computing
Transforming Healthcare Industry by Implementing Cloud Computingijtsrd
 
ARTIFICIAL INTELLIGENCE TECHNIQUES FOR THE MODELING OF A 3G MOBILE PHONE BASE...
ARTIFICIAL INTELLIGENCE TECHNIQUES FOR THE MODELING OF A 3G MOBILE PHONE BASE...ARTIFICIAL INTELLIGENCE TECHNIQUES FOR THE MODELING OF A 3G MOBILE PHONE BASE...
ARTIFICIAL INTELLIGENCE TECHNIQUES FOR THE MODELING OF A 3G MOBILE PHONE BASE...ijaia
 
Adel Ben Youssef: Determinants of the adoption of cloud computing by tunisian...
Adel Ben Youssef: Determinants of the adoption of cloud computing by tunisian...Adel Ben Youssef: Determinants of the adoption of cloud computing by tunisian...
Adel Ben Youssef: Determinants of the adoption of cloud computing by tunisian...CBOD ANR project U-PSUD
 

Tendances (18)

Machine learning Summer Training report
Machine learning Summer Training reportMachine learning Summer Training report
Machine learning Summer Training report
 
Federated Semi-Supervised Learning with Inter-Client Consistency & Disjoint L...
Federated Semi-Supervised Learning with Inter-Client Consistency & Disjoint L...Federated Semi-Supervised Learning with Inter-Client Consistency & Disjoint L...
Federated Semi-Supervised Learning with Inter-Client Consistency & Disjoint L...
 
Paper sharing_data-driven smart manufacturing (include smart manufacturing se...
Paper sharing_data-driven smart manufacturing (include smart manufacturing se...Paper sharing_data-driven smart manufacturing (include smart manufacturing se...
Paper sharing_data-driven smart manufacturing (include smart manufacturing se...
 
Ai open powermeetupmarch25th
Ai open powermeetupmarch25thAi open powermeetupmarch25th
Ai open powermeetupmarch25th
 
Infrastructure Designed for Cognitive Workloads: Why is it Crucial? - Xavier ...
Infrastructure Designed for Cognitive Workloads: Why is it Crucial? - Xavier ...Infrastructure Designed for Cognitive Workloads: Why is it Crucial? - Xavier ...
Infrastructure Designed for Cognitive Workloads: Why is it Crucial? - Xavier ...
 
Sumithranandan_TechnicalWriter_10+Yrs_Exp
Sumithranandan_TechnicalWriter_10+Yrs_ExpSumithranandan_TechnicalWriter_10+Yrs_Exp
Sumithranandan_TechnicalWriter_10+Yrs_Exp
 
Data science - An Introduction
Data science - An IntroductionData science - An Introduction
Data science - An Introduction
 
Ijsred v2 i5p95
Ijsred v2 i5p95Ijsred v2 i5p95
Ijsred v2 i5p95
 
Help through demonstration and automation for interactive computing systems: ...
Help through demonstration and automation for interactive computing systems: ...Help through demonstration and automation for interactive computing systems: ...
Help through demonstration and automation for interactive computing systems: ...
 
The most disruptive quantum technology companies to watch 2019
The most disruptive quantum technology companies to watch 2019The most disruptive quantum technology companies to watch 2019
The most disruptive quantum technology companies to watch 2019
 
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...
 
Poster ECIS 2016
Poster ECIS 2016Poster ECIS 2016
Poster ECIS 2016
 
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCE
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCEANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCE
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCE
 
Kentaro 2009 02 11 CooperacióN Toyama
Kentaro 2009 02 11 CooperacióN   ToyamaKentaro 2009 02 11 CooperacióN   Toyama
Kentaro 2009 02 11 CooperacióN Toyama
 
A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive Computing
 
Transforming Healthcare Industry by Implementing Cloud Computing
Transforming Healthcare Industry by Implementing Cloud ComputingTransforming Healthcare Industry by Implementing Cloud Computing
Transforming Healthcare Industry by Implementing Cloud Computing
 
ARTIFICIAL INTELLIGENCE TECHNIQUES FOR THE MODELING OF A 3G MOBILE PHONE BASE...
ARTIFICIAL INTELLIGENCE TECHNIQUES FOR THE MODELING OF A 3G MOBILE PHONE BASE...ARTIFICIAL INTELLIGENCE TECHNIQUES FOR THE MODELING OF A 3G MOBILE PHONE BASE...
ARTIFICIAL INTELLIGENCE TECHNIQUES FOR THE MODELING OF A 3G MOBILE PHONE BASE...
 
Adel Ben Youssef: Determinants of the adoption of cloud computing by tunisian...
Adel Ben Youssef: Determinants of the adoption of cloud computing by tunisian...Adel Ben Youssef: Determinants of the adoption of cloud computing by tunisian...
Adel Ben Youssef: Determinants of the adoption of cloud computing by tunisian...
 

Similaire à ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE

IRJET- Comparative Study of Efficacy of Big Data Analysis and Deep Learni...
IRJET-  	  Comparative Study of Efficacy of Big Data Analysis and Deep Learni...IRJET-  	  Comparative Study of Efficacy of Big Data Analysis and Deep Learni...
IRJET- Comparative Study of Efficacy of Big Data Analysis and Deep Learni...IRJET Journal
 
A survey on Machine Learning and Artificial Neural Networks
A survey on Machine Learning and Artificial Neural NetworksA survey on Machine Learning and Artificial Neural Networks
A survey on Machine Learning and Artificial Neural NetworksIRJET Journal
 
A Comprehensive review of Conversational Agent and its prediction algorithm
A Comprehensive review of Conversational Agent and its prediction algorithmA Comprehensive review of Conversational Agent and its prediction algorithm
A Comprehensive review of Conversational Agent and its prediction algorithmvivatechijri
 
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...ijdpsjournal
 
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...ijdpsjournal
 
IRJET- Comparison of Classification Algorithms using Machine Learning
IRJET- Comparison of Classification Algorithms using Machine LearningIRJET- Comparison of Classification Algorithms using Machine Learning
IRJET- Comparison of Classification Algorithms using Machine LearningIRJET Journal
 
A review paper: optimal test cases for regression testing using artificial in...
A review paper: optimal test cases for regression testing using artificial in...A review paper: optimal test cases for regression testing using artificial in...
A review paper: optimal test cases for regression testing using artificial in...IJECEIAES
 
Data Science: A Revolution of Data
Data Science: A Revolution of DataData Science: A Revolution of Data
Data Science: A Revolution of DataIRJET Journal
 
A CASE STUDY OF INNOVATION OF AN INFORMATION COMMUNICATION SYSTEM AND UPGRADE...
A CASE STUDY OF INNOVATION OF AN INFORMATION COMMUNICATION SYSTEM AND UPGRADE...A CASE STUDY OF INNOVATION OF AN INFORMATION COMMUNICATION SYSTEM AND UPGRADE...
A CASE STUDY OF INNOVATION OF AN INFORMATION COMMUNICATION SYSTEM AND UPGRADE...ijaia
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISpijans
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISpijans
 
A survey of big data and machine learning
A survey of big data and machine learning A survey of big data and machine learning
A survey of big data and machine learning IJECEIAES
 
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...ijcsa
 
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...eswaralaldevadoss
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...IJNSA Journal
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...IJNSA Journal
 
The upsurge of deep learning for computer vision applications
The upsurge of deep learning for computer vision applicationsThe upsurge of deep learning for computer vision applications
The upsurge of deep learning for computer vision applicationsIJECEIAES
 
Development of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job SeekersDevelopment of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job SeekersIJMIT JOURNAL
 
Intrusion detection using incremental
Intrusion detection using incrementalIntrusion detection using incremental
Intrusion detection using incrementalijmpict
 

Similaire à ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE (20)

IRJET- Comparative Study of Efficacy of Big Data Analysis and Deep Learni...
IRJET-  	  Comparative Study of Efficacy of Big Data Analysis and Deep Learni...IRJET-  	  Comparative Study of Efficacy of Big Data Analysis and Deep Learni...
IRJET- Comparative Study of Efficacy of Big Data Analysis and Deep Learni...
 
A survey on Machine Learning and Artificial Neural Networks
A survey on Machine Learning and Artificial Neural NetworksA survey on Machine Learning and Artificial Neural Networks
A survey on Machine Learning and Artificial Neural Networks
 
A Comprehensive review of Conversational Agent and its prediction algorithm
A Comprehensive review of Conversational Agent and its prediction algorithmA Comprehensive review of Conversational Agent and its prediction algorithm
A Comprehensive review of Conversational Agent and its prediction algorithm
 
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
 
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
SEAMLESS AUTOMATION AND INTEGRATION OF MACHINE LEARNING CAPABILITIES FOR BIG ...
 
IRJET- Comparison of Classification Algorithms using Machine Learning
IRJET- Comparison of Classification Algorithms using Machine LearningIRJET- Comparison of Classification Algorithms using Machine Learning
IRJET- Comparison of Classification Algorithms using Machine Learning
 
Machine learning
Machine learningMachine learning
Machine learning
 
A review paper: optimal test cases for regression testing using artificial in...
A review paper: optimal test cases for regression testing using artificial in...A review paper: optimal test cases for regression testing using artificial in...
A review paper: optimal test cases for regression testing using artificial in...
 
Data Science: A Revolution of Data
Data Science: A Revolution of DataData Science: A Revolution of Data
Data Science: A Revolution of Data
 
A CASE STUDY OF INNOVATION OF AN INFORMATION COMMUNICATION SYSTEM AND UPGRADE...
A CASE STUDY OF INNOVATION OF AN INFORMATION COMMUNICATION SYSTEM AND UPGRADE...A CASE STUDY OF INNOVATION OF AN INFORMATION COMMUNICATION SYSTEM AND UPGRADE...
A CASE STUDY OF INNOVATION OF AN INFORMATION COMMUNICATION SYSTEM AND UPGRADE...
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
 
A survey of big data and machine learning
A survey of big data and machine learning A survey of big data and machine learning
A survey of big data and machine learning
 
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
 
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
 
The upsurge of deep learning for computer vision applications
The upsurge of deep learning for computer vision applicationsThe upsurge of deep learning for computer vision applications
The upsurge of deep learning for computer vision applications
 
Development of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job SeekersDevelopment of Intelligence Process Tracking System for Job Seekers
Development of Intelligence Process Tracking System for Job Seekers
 
Intrusion detection using incremental
Intrusion detection using incrementalIntrusion detection using incremental
Intrusion detection using incremental
 

Plus de ijesajournal

DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITORDESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITORijesajournal
 
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITORDESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITORijesajournal
 
PIP-MPU: FORMAL VERIFICATION OF AN MPUBASED SEPARATION KERNEL FOR CONSTRAINED...
PIP-MPU: FORMAL VERIFICATION OF AN MPUBASED SEPARATION KERNEL FOR CONSTRAINED...PIP-MPU: FORMAL VERIFICATION OF AN MPUBASED SEPARATION KERNEL FOR CONSTRAINED...
PIP-MPU: FORMAL VERIFICATION OF AN MPUBASED SEPARATION KERNEL FOR CONSTRAINED...ijesajournal
 
International Journal of Embedded Systems and Applications (IJESA)
International Journal of Embedded Systems and Applications (IJESA)International Journal of Embedded Systems and Applications (IJESA)
International Journal of Embedded Systems and Applications (IJESA)ijesajournal
 
Pip-MPU: Formal Verification of an MPU-Based Separationkernel for Constrained...
Pip-MPU: Formal Verification of an MPU-Based Separationkernel for Constrained...Pip-MPU: Formal Verification of an MPU-Based Separationkernel for Constrained...
Pip-MPU: Formal Verification of an MPU-Based Separationkernel for Constrained...ijesajournal
 
International Journal of Embedded Systems and Applications (IJESA)
International Journal of Embedded Systems and Applications (IJESA)International Journal of Embedded Systems and Applications (IJESA)
International Journal of Embedded Systems and Applications (IJESA)ijesajournal
 
Call for papers -15th International Conference on Wireless & Mobile Network (...
Call for papers -15th International Conference on Wireless & Mobile Network (...Call for papers -15th International Conference on Wireless & Mobile Network (...
Call for papers -15th International Conference on Wireless & Mobile Network (...ijesajournal
 
Call for Papers -International Conference on NLP & Signal (NLPSIG 2023)
Call for Papers -International Conference on NLP & Signal (NLPSIG 2023)Call for Papers -International Conference on NLP & Signal (NLPSIG 2023)
Call for Papers -International Conference on NLP & Signal (NLPSIG 2023)ijesajournal
 
International Conference on NLP & Signal (NLPSIG 2023)
International Conference on NLP & Signal (NLPSIG 2023)International Conference on NLP & Signal (NLPSIG 2023)
International Conference on NLP & Signal (NLPSIG 2023)ijesajournal
 
11th International Conference on Software Engineering & Trends (SE 2023)
11th International Conference on Software Engineering & Trends (SE 2023)11th International Conference on Software Engineering & Trends (SE 2023)
11th International Conference on Software Engineering & Trends (SE 2023)ijesajournal
 
11th International Conference on Software Engineering & Trends (SE 2023)
11th International Conference on Software Engineering & Trends (SE 2023)11th International Conference on Software Engineering & Trends (SE 2023)
11th International Conference on Software Engineering & Trends (SE 2023)ijesajournal
 
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXINGPERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXINGijesajournal
 
GENERIC SOPC PLATFORM FOR VIDEO INTERACTIVE SYSTEM WITH MPMC CONTROLLER
GENERIC SOPC PLATFORM FOR VIDEO INTERACTIVE SYSTEM WITH MPMC CONTROLLERGENERIC SOPC PLATFORM FOR VIDEO INTERACTIVE SYSTEM WITH MPMC CONTROLLER
GENERIC SOPC PLATFORM FOR VIDEO INTERACTIVE SYSTEM WITH MPMC CONTROLLERijesajournal
 
INVERTING BUCK-BOOST DCDC CONVERTER DESIGN CHALLENGES
INVERTING BUCK-BOOST DCDC CONVERTER DESIGN CHALLENGESINVERTING BUCK-BOOST DCDC CONVERTER DESIGN CHALLENGES
INVERTING BUCK-BOOST DCDC CONVERTER DESIGN CHALLENGESijesajournal
 
A Case Study: Task Scheduling Methodologies for High Speed Computing Systems
A Case Study: Task Scheduling Methodologies for High Speed Computing Systems A Case Study: Task Scheduling Methodologies for High Speed Computing Systems
A Case Study: Task Scheduling Methodologies for High Speed Computing Systems ijesajournal
 
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...ijesajournal
 
AUTOMATED EMBEDDED PAYMENT SYSTEMS
AUTOMATED EMBEDDED PAYMENT SYSTEMSAUTOMATED EMBEDDED PAYMENT SYSTEMS
AUTOMATED EMBEDDED PAYMENT SYSTEMSijesajournal
 
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...ijesajournal
 
2 nd International Conference on Computing and Information Technology
2 nd International Conference on Computing and Information Technology 2 nd International Conference on Computing and Information Technology
2 nd International Conference on Computing and Information Technology ijesajournal
 
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...ijesajournal
 

Plus de ijesajournal (20)

DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITORDESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
 
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITORDESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
 
PIP-MPU: FORMAL VERIFICATION OF AN MPUBASED SEPARATION KERNEL FOR CONSTRAINED...
PIP-MPU: FORMAL VERIFICATION OF AN MPUBASED SEPARATION KERNEL FOR CONSTRAINED...PIP-MPU: FORMAL VERIFICATION OF AN MPUBASED SEPARATION KERNEL FOR CONSTRAINED...
PIP-MPU: FORMAL VERIFICATION OF AN MPUBASED SEPARATION KERNEL FOR CONSTRAINED...
 
International Journal of Embedded Systems and Applications (IJESA)
International Journal of Embedded Systems and Applications (IJESA)International Journal of Embedded Systems and Applications (IJESA)
International Journal of Embedded Systems and Applications (IJESA)
 
Pip-MPU: Formal Verification of an MPU-Based Separationkernel for Constrained...
Pip-MPU: Formal Verification of an MPU-Based Separationkernel for Constrained...Pip-MPU: Formal Verification of an MPU-Based Separationkernel for Constrained...
Pip-MPU: Formal Verification of an MPU-Based Separationkernel for Constrained...
 
International Journal of Embedded Systems and Applications (IJESA)
International Journal of Embedded Systems and Applications (IJESA)International Journal of Embedded Systems and Applications (IJESA)
International Journal of Embedded Systems and Applications (IJESA)
 
Call for papers -15th International Conference on Wireless & Mobile Network (...
Call for papers -15th International Conference on Wireless & Mobile Network (...Call for papers -15th International Conference on Wireless & Mobile Network (...
Call for papers -15th International Conference on Wireless & Mobile Network (...
 
Call for Papers -International Conference on NLP & Signal (NLPSIG 2023)
Call for Papers -International Conference on NLP & Signal (NLPSIG 2023)Call for Papers -International Conference on NLP & Signal (NLPSIG 2023)
Call for Papers -International Conference on NLP & Signal (NLPSIG 2023)
 
International Conference on NLP & Signal (NLPSIG 2023)
International Conference on NLP & Signal (NLPSIG 2023)International Conference on NLP & Signal (NLPSIG 2023)
International Conference on NLP & Signal (NLPSIG 2023)
 
11th International Conference on Software Engineering & Trends (SE 2023)
11th International Conference on Software Engineering & Trends (SE 2023)11th International Conference on Software Engineering & Trends (SE 2023)
11th International Conference on Software Engineering & Trends (SE 2023)
 
11th International Conference on Software Engineering & Trends (SE 2023)
11th International Conference on Software Engineering & Trends (SE 2023)11th International Conference on Software Engineering & Trends (SE 2023)
11th International Conference on Software Engineering & Trends (SE 2023)
 
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXINGPERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
 
GENERIC SOPC PLATFORM FOR VIDEO INTERACTIVE SYSTEM WITH MPMC CONTROLLER
GENERIC SOPC PLATFORM FOR VIDEO INTERACTIVE SYSTEM WITH MPMC CONTROLLERGENERIC SOPC PLATFORM FOR VIDEO INTERACTIVE SYSTEM WITH MPMC CONTROLLER
GENERIC SOPC PLATFORM FOR VIDEO INTERACTIVE SYSTEM WITH MPMC CONTROLLER
 
INVERTING BUCK-BOOST DCDC CONVERTER DESIGN CHALLENGES
INVERTING BUCK-BOOST DCDC CONVERTER DESIGN CHALLENGESINVERTING BUCK-BOOST DCDC CONVERTER DESIGN CHALLENGES
INVERTING BUCK-BOOST DCDC CONVERTER DESIGN CHALLENGES
 
A Case Study: Task Scheduling Methodologies for High Speed Computing Systems
A Case Study: Task Scheduling Methodologies for High Speed Computing Systems A Case Study: Task Scheduling Methodologies for High Speed Computing Systems
A Case Study: Task Scheduling Methodologies for High Speed Computing Systems
 
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
 
AUTOMATED EMBEDDED PAYMENT SYSTEMS
AUTOMATED EMBEDDED PAYMENT SYSTEMSAUTOMATED EMBEDDED PAYMENT SYSTEMS
AUTOMATED EMBEDDED PAYMENT SYSTEMS
 
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
 
2 nd International Conference on Computing and Information Technology
2 nd International Conference on Computing and Information Technology 2 nd International Conference on Computing and Information Technology
2 nd International Conference on Computing and Information Technology
 
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
 

Dernier

247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 

Dernier (20)

Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 

ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE

  • 1. International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019 DOI : 10.5121/ijesa.2019.9202 13 ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE Syed Moinuddin Bokhari1 , Karpoora Sundari2 , Praveen Kumar3 , Kavitha4 1 Associate Professor & Head, Department of Electronics & Communication Engineering, M. A. M College of Engineering & Technology, India 2 &4 Associate Professor, Department of Electronics & Communication Engineering, M. A. M College of Engineering & Technology, India 3 Assistant Professor, Department of Information Technology, M. A. M College of Engineering & Technology, India ABSTRACT Automation is a powerful word that lies everywhere. It shows that without automation, application will not get developed. In a semiconductor industry, artificial intelligence played a vital role for implementing the chip based design through automation .The main advantage of applying the machine learning & deep learning technique is to improve the implementation rate based upon the capability of the society. The main objective of the proposed system is to apply the deep learning using data driven approach for controlling the system. Thus leads to a improvement in design, delay ,speed of operation & costs. Through this system, huge volume of data’s that are generated by the system will also get control. KEYWORDS Deep learning, artificial intelligence, machine learning, semiconductor technology. 1. INTRODUCTION The International Technology Roadmap for Semiconductors (ITRS) estimates that by 2020, IC designs will pack 1 trillion transistors per chip. The number of Design Rule Checks (DRC) have increased by a factor of 10X roughly every 10 years, and so have number of scenarios operating modes and corners – that must be evaluated by EDA tools to verify and implement designs. Product development schedules are getting shorter, which means productivity per engineer must increase by 15X from 1 million to 15 million gates per year to keep up with the complexity increase. Semiconductor design activity produces vast amounts of data, but this data is not utilized in any systematic manner by chip design teams. Data driven approaches have demonstrated significant benefits in many industries and similar approaches can provide actionable insights and enable predictive technologies in semiconductor workflows. Two prominent data driven techniques are Machine Learning (ML) and big data. 1.1 Machine Learning ML is a branch of Artificial Intelligence and is defined as the ability to learn without explicit programming. ML programs learn from data, and in many cases provide improved results given more data. There are three types of ML: Supervised, Unsupervised and Reinforcement.
  • 2. International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019 14 In supervised learning, labelled data is provided as input to the system. Labelled data is comprised of a set of samples that have been tagged with labels that are meaningful. For example, identifying a set of log files from tool runs with tags that denote whether they are good runs or attention-needing runs can be construed as providing labelled data. In supervised learning, a model is first trained based on given samples. Training a model entails extracting features from the given samples, and providing the set of (input) features along with the label to an algorithm which learns the mapping of inputs to output. The output from the training phase is a model, which can be persisted if needed. This model is then deployed and used to infer the label for new and previously unseen data. A typical supervised learning system is shown in Figure 1. Figure. 1 Supervised learning workflow Unsupervised learning systems do not require labelled data. Unsupervised learning algorithms are used to infer a function or underlying structure from unlabeled data. They are widely used in data analysis and data mining. While supervised learning is clearly more common today, unsupervised learning is likely to be more prevalent in the future, given the abundant internet data that is generated every day, and the expected interest from corporations to monetize this data. The fundamental concept in reinforcement learning is that learning can be achieved by interacting with the environment. Just like a child learns without an explicit teacher that smiling or crying have different effects, reinforcement learning algorithms are based on cause and effect. The learner is not told what actions to take, but it must discover what actions (immediate or future) are most rewarding. In recent times, a branch of machine learning called deep learning has become popular. Deep learning systems [2] can be characterized as universal approximators capable of modeling non-linearity with a high level of accuracy. Growth in deep learning was primarily driven by the widespread availability of high-performance special-purpose computation platforms and the abundance of data. An anatomy of a deep learning system is shown in Figure 2. Deep learning systems address a basic problem in ML.All ML systems learn the mapping of inputs to output by extracting features from input, and for most tasks, it is hard to know what features to extract. An approach popularly known as Representation Learning can be employed to learn features, and this is fundamental to all deep learning algorithms. Learned representations are generally better than manually manually extracted features, with the added benefit of reduced human intervention. While representation learning was a known field, the advent of deep learning made it viable. Representation learning can be difficult to put in practice if it is as hard to get representations as it is to solve the original problem, which was the case until deep learning came along. The representation learning performed by deep learning
  • 3. International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019 15 systems is highly effective, since they build complex features (or concepts) from simple concepts. Figure 2. Components of a deep learning system 1.2`Big Data Big data can be defined as a capability of providing actionable real-time insights from large amounts of data. For data to be classified as big data, in addition to its abundance and vastness, it is also expected that it is being generated at a very fast pace from various varied sources. In fact, big data systems are characterized by 3 Vs – Volume, Velocity and Variety. Such systems generate large amounts of data that is both structured (data that is highly organized, and can be stored in a relational database) and unstructured (data that does not have a predefined data model). The data is generated at a fast pace in big data systems. Furthermore, big data systems also encompass a large variety of data sources. Examples of systems demonstrating big data behaviour are IoT (Internet of Things) devices. The value of a big data system is in providing real time insights into chip design flows that would be otherwise unavailable, and in providing recommendations for actions that can be taken to improve production flows. A simplified flow of the phases in a big data system is provided below in Figure 3: Figure3. Phases in Big Data
  • 4. International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019 16 There is significant literature available on building a software stack for big data systems, and there is no one right stack. However, it is typical to have either some or most of the components shown in Figure 4. The system can be further generalized into a pipeline of three key processes: • Data Capture: During this process, all relevant data is captured systematically. For example, for an IoT based real-time analytics solution, device metric samples may be captured at regular intervals. Furthermore, all data that the device depends on should also be captured or acquired (and then captured). • Data Processing: During this process, data captured is processed and stored. Depending on the type of data, an appropriate database or data store is used to store the data. Data Extraction: During this process, user requests, such as web requests or API calls are received and processed Figure 4. Big data software stack Custom visualizations and triggers are typical interfaces to big data systems. Visualizations enable users of big data systems to understand if systems are operating as expected, and take necessary actions in real time. 2. RELATED WORK Several efforts have shown the significance of MLbased efforts to solve optimization problems that are NPcomplete. In [6], the authors discuss a framework that optimizes FPGA flows. They present an ML-framework consisting of a set of classification and regression techniques to address the disconnect between different stages of FPGA design. The framework consists of five algorithms (Artificial Neural Network, Decision Tree, Support Vector Machine, K Nearest Neighbour, and Random Forest) that can be used to solve two problems: choosing between different placement flows and predicting various quality metrics related to FPGA placement.
  • 5. International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019 17 The framework employs supervised training methods. Training data is generated from 372 benchmarks by running the benchmarks through seven academic configurations that vary in certain parameters. Experimental results from 372 benchmark designs show that 4 out of the 7 configurations show accuracy of 88 to 99% in choosing a configuration that best minimizes total wire length. In [7], the authors describe how ML was used to predict DRC violations during the global routing stage. DRC violations during detailed routing prevent or delay tape outs. To prevent tape out delays, automatic place and route tools create a global routing map. The placer uses the routine map to optimize placement of blocks in a way so as to reduce or eliminate DRCs. However, at advanced nodes, the correlation between global and detailed routing weakens, leading to either aggressive optimization by the placer at the expense of area or power or too many DRCs in the final routing stage. In [8], the authors motivate a need for advanced analytics for semiconductor design to streamline R&D processes, optimizing product portfolios and helping businesses reduce costs. The fundamental difference between traditional and advanced analytics is as follows: in traditional analytics, the data is in existence, and analytics enable better understanding of data whereas advanced analytics is a process where the data to be collected is first defined by the analytics that would be needed to drive decisions. In research conducted across 200 projects, it is found that advanced analytics enabled project teams to reduce their project times by approximately 10%. In [9], the author describes use of big data techniques to improve verification efficiency. Verification is the most time consuming step in the chip design process, and a typical verification environment consists of geographically dispersed collaborative teams, and a flow that involves multiple systems. The author motivates the need for a central repository that can store metrics and data in a common format and shows the value of insights gathered by visualizing metrics. 3. METHODOLOGY RECOMMENDATIONS A strategy that enables corporate goals be it improving turnaround time for designs or reducing resource costs should be the centre point of any methodology. The research to date shows that chip design companies can incorporate data-driven methods in their workflows to improve quality of results, time to results or cost of results. These techniques require access to data from tool runs, flows and environment. Furthermore, chip design is a continuous process and a framework that continuously polls for new runs, captures meta data, and enables access to information through consistent interfaces is integral to reaping long-term benefits. Potential enterprise architecture for data driven applications is shown in Figure 5.
  • 6. International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019 18 Figure 5. Enterprise Architecture for applications robust capture mechanism should be in place to enable downstream processes. This framework should operate at the enterprise level, across geographically dispersed sites, be flexible enough to handle different types of tools and flows and scale to supporting hundreds of tool run every minute. An easy-to-use access/analysis mechanism is the key to building a lasting solution. In ML and big data systems, APIs are the most extensible way to provide analysis capabilities. APIs can be used to build custom visualizations or standalone applications. Formulating the ML problem requires the right expertise. It requires data scientists, domain experts and software engineers working together. It also requires the right kind of data, feature engineering and compute infrastructure. For many real-life problems, training times can be considerably long, and this may require special-purpose hardware. Furthermore, model retraining is necessary in production instances, so that model accuracy meets requirements. Other important considerations when deploying ML models for production are inference time, and a framework to monitor model accuracy. Some problems can be solved by using advanced analytics. Advanced analytics can enable users to understand what is happening, plan resource allocation, explore reasons for unexpected behaviour, identify anomalies, and get real-time information about project status. A common infrastructure consisting of capture-process organize phases can serve as the backbone for both ML and big data systems. 4. CONCLUSION Data driven techniques have shown promising results in optimizing chip design workflows. To enable enterprise-wide digital intelligence via ML and big data backed strategies, a robust framework for enabling both ML and big data should be put in place. Distributed big data systems are the cornerstone for enabling such techniques. It is important to use discretion in identifying areas to pursue using data-driven technologies since ML and big data do not apply to all problems. Coordinated execution from all the relevant domains is required to produce complex data driven solutions and a soiled approach will not provide lasting benefits. Companies that adopt data driven optimizations will have highly efficient design teams. In other words, to remain Database tool that runs Capture the data Organizi ng it Analyze Machine leraning / big data Improve QoS Reduce TTR Reduce COR
  • 7. International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019 19 competitive, companies should accelerate their plans for bringing digital intelligence into their flows. ACKNOWLEDGEMENTS We would like to thank who all are encouraging us to presenting & publishing this paper in this reputed journal. REFERENCES [1] Christopher M. Bishop, Pattern Recognition and Machine Learning. Springer: 2006 [2] Ian Goodfellow, Yoshua Bengio and Aaron Courville, Deep Learning. London, England: The MIT Press, 2016 [3] Richard S. Sutton and Andrew G. Barto, Reinforcement Learning: An Introduction. London, England: The MIT Press, 2017. [4] L. C. Wang, "Experience of Data Analytics in EDA and test Principles , Promises and Challenges,” in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 36, no. 6, pp. 885-898, June 2017 [5] G. Grewal, S. Areibi, M. Westrik, Z. Abuowaimer and B.Zhao, "Automatic Flow Selection and Quality-of-Result Estimation for FPGA Placement," 2017 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), Lake Buena Vista, FL, 2017, pp. 115-123. [6] W. J. Chan, P. Ho, A. B. Kahng, P. Saxena, “Routability Optimization for Industrial Designs at Sub- 14nm Process Nodes Using Machine Learning,” Proceedings of the 2017ACM on International Symposium on Physical Design (ISPD17), pp. 15-21 [7] B. Yu, D. Z. Pan, T. Matsunawa and X. Zeng, "Machine learning and pattern matching in physical design," The 20th Asia and South Pacific Design Automation Conference, Chiba, 2015, pp. 286-293 [8] G. Batra, Z. Jacobsen, N. Santhanam, “Improving the semiconductor industry through advanced analytics”, McKinsey Article, March 2016. [9] D. K. May, “Improving Verification Predictability and Efficiency Using Big Data,”, DVCon Proceedings, February 2018. AUTHORS B. Syed Moinuddin Bokhari completed his B.E. from Government College of Engineering, Bargur, INDIA affiliated to University of Madras in 2001, received his M.E. from Jayaram College of Engineering and Technology, Thuriayur, INDIA affiliated to Anna University, Chennai INDIA in 2005.Currently he is a research scholar at the department of Electronics and Communication Engineering, College of Engineering Guindy, Anna University, Chennai, INDIA. His field of interests include wireless communication and networks, signal processing. His current research interests are deep learning, machine learning for wireless communication and VLSI, multiuser detection, multiuser scheduling applied to FPGA based SISO/MIMO test beds. He is a life member of ISTE.
  • 8. International Journal of Embedded Systems and Applications (IJESA), Vol 9, No.2, June 2019 20 K. Karpoora Sundari completed her B.E. from Syed Ammal Engineering College, Ramanathapuram, Tamil Nadu, India affiliated to Madurai Kamaraj University in the year 2003. After that she did her M. E in Applied Electronics in R.V. S College of Engineering & Technology, Dindigul, Tamil Nadu, India affiliated to Anna University Chennai in the year 2012. She published papers in various national and international conferences. Currently she is working as an Associate Professor of ECE department in M. A. M College of Engineering & Technology, Tiruchirappalli, Tamil Nadu, India. She is having around 14 years of experience in both teaching and industry. Her field of Interest includes Digital VLSI Design, Embedded System , computer networks, deep learning, machine learning VLSI, Cyber physical systems and artificial Intelligence. Mr. V. Praveenkumar is working as Assistant Professor in the department of Information Technology in M. A. M. College of Engineering and Technology. He completed his Undergraduate degree B. Tech-Information technology in the year of 2010. He completed his postgraduate degree M. E.– Pervasive computing Technology in 2012 In Anna University, Tricky. His research areas include Parallel processing, machine learning algorithms, Cloud computing and Big data. Mrs. S. Kavitha is working as an Associate professor in M. A. M College of Engineering. She completed her B. E in Electronics & Communication Engineering in JJ College of Engineering & Technology, Trichy under Bharathidhasan University during the year 2002 and completed M. E in Communication Systems in Jayaram College of Engineering & Technology. Currently she is doing research under antennas. Her area of interest includes RF and Microwaves, deep learning, wireless communication and VLSI.