Professional Documents
Culture Documents
On
DIPLOMA
IN
ELECTRONICS & COMMUNICATION ENGINEERING
Submitted by
Jothik (21573-EC-032)
Rohith (21573-EC-030)
Navya (21573-EC-031)
Kalyan (21573-EC-023)
2023-2024
BONAFIDE CERTIFICATE
EXTERNAL EXAMINER
ACKNOWLEDGEMENT
I extend my high regards to our chairman Dr. Arimanda Vara Prasad Reddy,
Secretary Dr. Arimanda Vijaya Sarada Reddy, Principal Mr. AVS Sai
Kumar, for providing all facilities in the college and pleased to bestow heartfelt
gratitude to our lab technicians for the cooperation during the project.
I am grateful to Mrs Ch. Padmasri, HoD of DECE and Ms. Sweatha Vatsalya
Project coordinator, for their constant encouragement during the dissertation
and convey my sincere appreciations for their suggestions and encouragement
without which this work be unfilled dream.
I would like to express my sincere and profound gratitude for unmatched service
and valuable guidance in each and every stage of completing this work
successfully.
Group Members
Jothik (21573-EC-032)
Rohith (21573-EC-030)
Navya (21573-EC-031)
Kalyan (21573-EC-023)
CONTENTS
CONTENTS
LIST OF FIGURES
ABSTRACT
1 Chapter - 1 INTRODUCTION
1.1 Introduction to verification 1
1.2 Literature Survey 4
1.3 Organization of Thesis 5
2 Chapter - 2 INTRODUCTION TO RISCV
2.1 Introduction to RISCV processor 6
2.2 RISC-V ISA overview 7
2.3 Instruction length coding 8
2.4 Register structure 9
6 Chapter - 6 RESULTS
6.1 Verification of ALU instruction Sequence 32
6.2 Verification of Load and Store dependency 33
6.3 Verification of Conformal Test 34
6.4 Verification of all instructions 35
6.5 Conformal test through microcode 36
7 Chapter - 7 CONCLUSION AND FUTURE SCOPE
REFERENCES 41
LIST OF FIGURES
Figure 4.1 Logic Inside and Outside the Cone Of Influence (COI) 21
Group Members:
B. ROHITH 21573-EC-030
M. NAVYA 21573-EC-031
V. JOTHIK 21573-EC-032
M. KALYAN 21573-EC-023
Chapter 1
INTRODUCTION
The end goal of any verification endeavor in a Semiconductor firm is to ensure
that the churned out chips meet their specification expectation exactly and do not
deviate from their intended behavior. In any Product Development Cycle, 70% of
the time is consumed in verification with exorbitant costs, thus it becomes very
imperative to ensure the integrity of this resource intensive activity.
The figure 1.1 shows Formal Verification flow of verifying any Design-under-test
(DUT) .First step includes coding checkers and constraints as input . These
8
checkers capture the design motion sensor
PIR sensors detect general movement, but don’t give information as to who or
what moved. For that purpose, an imaging IR sensor is required. PIR sensors are
commonly called simply “PIR” or sometimes “PID” for “passive infrared
detector.” The term passive refers to the fact that PIR devices don’t radiate energy
for detection purposes. They work entirely by detecting infrared (radiant heat)
emitted by or reflected from objects.
Reading S'ensors
The passive infrared (PIR) sensor (Figure 4.19) by Techno-Stuff was originally
intended for use with the RCX. However, you can also use it with the NXT using
9
a converter cable. The PIR sensor detects passive infrared radiation (heat sources).
Remember the movie Predator? Remember how the alien “saw” the soldiers it
was hunting? The PIR sensor “sees” heat much in the same way. You can use this
sensor to build a robot that can seek out heat sources not evident to the human
eye.
10
Himadri Nath Saha, ... Chiranmay Sarkar, in AI, Edge and IoT-based Smart
Agriculture, 2022
11
Figure 8.17. Commercial intrusion alarm system.
Trends
Two types of sensor technologies often are applied to a location to reduce false
alarms, prevent defeat techniques, or fill unique needs. The combination of
microwave and passive infrared sensors is a popular example of applying dual
technologies (see Figure 7-17). Reporting can be designed so an alarm is signaled
when both sensors detect an intrusion (to reduce false alarms) or when either
sensor detects an intrusion. Sensors are also becoming “smarter” by sending
sensor data to a control panel or computer, distinguishing between humans and
12
animals, and activating a trouble output if the sensor lens is
blocked. Supervised wireless sensors have become a major advancement because
sensors can be placed at the best location without the expense of running a wire;
these sensors are constantly monitored for integrity of the radio frequency link
between the sensor and panel, status of the battery, and whether the sensor is
functioning normally (Garcia, 2006: 104; O’Leary, 1999: 36–48).
Eric Conrad, ... Joshua Feldman, in CISSP Study Guide (Third Edition), 2016
Ultrasonic and microwave motion detectors work like “Doppler radar” used to
predict the weather. A wave of energy is sent out, and the “echo” is returned when
it bounces off an object. A motion detector that is 20 feet away from a wall will
13
consistently receive an echo in the time it takes for the wave to hit the wall and
bounce back to the receiver, for example. The echo will be returned more quickly
when a new object (such as a person walking in range of the sensor) reflects the
wave.
Ultrasonic, microwave, and infrared motion sensors are active sensors, which
means they actively send energy. A passive sensor can be thought of as a “read-
only” device. An example is a passive infrared (PIR) sensor, which detects
infrared energy created by body heat.
Exam Warning
Perimeter alarms include magnetic door and window alarms. They include
matched pairs of sensors on the wall, as well as window/door. An electrical circuit
flows through the sensor pairs as long as the door or window is closed; the circuit
breaks when either is opened. These are often armed for secured areas as well as
in general areas during off hours such as nights or weekends. Once armed, a
central alarm system will alert when any door or window is opened.
5.1 Introduction
Data in a smart home are collected from different types of ambient sensors. For
example, a Passive Infrared Sensor (PIR) can be used for detecting motion, and a
contact switch sensor can be used for detecting the open/close status of doors and
cabinets. Some of the most widely used smart home sensors are summarized
in Table 5.1. Most of the ambient sensors, such as the PIR sensor or the contact
15
switch sensor, provide a signal in the form of on/off activation states, as depicted
in Figure 5.1.
Note: The PIR sensor is one of the most popular sensors used by many
researchers for detecting motion. Other options, such as ultrasonic sensors, might
prove more accurate for detecting motion; however, they are typically more
expensive.
16
Figure 5.1. A stream of sensor events. Note: Each one of the M1 through M5
symbols correspond to one sensor. For example, sensor M1 is activated during the
third and seventh time intervals, and M5 is activated during the fifth time interval.
Before using sensor data in machine learning and data mining tasks, data are
usually preprocessed into a higher-level format that is easier to interpret. For
example, the signal levels are converted into categorical values, such as on/off
binary values, in the case of PIR sensors. Table 5.2 shows an example format
typically used in data mining and machine learning tasks.1
Table 5.2. Example Sensor Data
Timestamp Sensor ID Label
7/17/2009 09:52:25 M3 Personal Hygiene
7/17/2009 09:56:55 M5 Personal Hygiene
7/17/2009 14:12:20 M4 None
As soon as data are collected from various sensors, they are passed to an activity
recognition component. In supervised activity recognition methods, the algorithm
is provided with the activity label of sensor event sequences. These labels are
hand-done by a human annotator during the training phase of the system. Some
researchers also have taken advantage of the crowdsourcing mechanism for
labeling [72,59]. In Table 5.2, the first and the second sensor events are
labeled Personal Hygiene activity. The ultimate goal is to predict the label of the
future unseen activity patterns by generalizing based on the examples provided.
During the past decade, many supervised activity recognition algorithms have
been proposed [8,61,65,13,31,47,57,39]. In real-world settings, using supervised
methods is not practical because it requires labeled data for training. Manual
labeling of human activity data is time consuming, laborious, and error-prone.
Besides, one usually needs to deploy invasive devices in the environment during
the data-collection phase to obtain reliable annotations. Another option is to ask
the residents to report their activities. Asking residents to report their activities
puts the burden on them, and in the case of the elderly with memory problems
(e.g., dementia), it would be out the of question.
Exploiting LoRa, edge, and fog computing for traffic monitoring in smart
cities
Tuan Nguyen Gia, ... Tomi Westerlund, in LPWAN Technologies for IoT and
M2M Applications, 2020
18
Figure 16–3. Proposed system architecture.
In the system architecture, the device layer plays the main role in terms of
integration and interaction with the real world. When sensor nodes of the device
layer do not properly function due to, for instance, a hardware failure or
19
disconnection with edge devices/gateways, the whole system might stop working.
Therefore, it is necessary to design and implement the device layer carefully. The
device layer can consist of sensing nodes and actuating nodes or hybrid nodes
which can both sense data and control some actuators. Depending on the
application scenarios, one or several sensor node types can be used. Sensing nodes
are responsible for collecting different data from a wide variety of sensors. In
a traffic monitoring and management system, data such as the number of cars
passing by a given street or intersection, the approximate number of vehicles in an
area, or the public transportation flow can be acquired via some sensors such
as piezoelectric sensors, inductive loop sensors, magnetic sensor, acoustic sensor,
or passive infrared sensors. Each sensor has its own advantages and limitations.
For instance, passive infrared sensors might not be suitable for highways with
many lanes. In addition to sensing nodes collecting the primary data, sensing
nodes acquiring contextual data should be applied. For example, sensing nodes
can collect contextual environmental data such as temperature, humidity,
CO2 level, and other parameters related to pollution emissions. Even though the
information might not be directly related to traffic management systems, they are
helpful for the traffic system administrators, city planners, and regulation makers.
Actuating nodes can be used to control actuators such as fans, traffic lights, or
water pump systems. For instance, they can turn on a water pumping system to
emit steam to increase humidity level when the air is too dry.
Edge layer consists of edge devices that are built from several components such as
a powerful microcontroller with high-capacity memory or single-board
computers. Edge devices might be either battery-powered or connected to a power
20
source, depending on the specific application scenario. Single-board computers
usually need to be connected to a power source as they can only operate for a
period of a few days at most if powered with a battery. In the case of battery-
powered edge devices, these must be energy-efficient. In this case, edge device
can be equipped with nRF communication modules to collect the data transmitted
from sensing nodes. Due to the capability of supporting high data rates (i.e., 250
kbps in theory and 150 kbps in practice), an edge device with a single nRF
module can support more than 120 sensing nodes as each sensing node often
gathers less than 1 kbps data. When the number of sensing nodes increases
dramatically, more nRF modules can be added into an edge device. The collected
data is then processed for eliminating noises and saving bandwidth. For instance,
the data can be both encrypted and compressed before being sent to Fog gateways
via LoRa. Loss-less and lossy compression algorithms can be used. However,
lossy compression algorithms are more preferred as their compression rate is
high (e.g., around 100 times). Although lossy decompression cannot fully recover
the original data, the decompressed data (i.e., the number of cars passing by a
street, the number of cars waiting at a crossroad, temperature, and humidity) are
still good enough for traffic management systems.
21
16.5.3 Fog layer
In the proposed system architecture, LoRa access points, or gateways, are the
central element in the fog layer. These gateways are connected to back-end
servers that, for instance, prioritize which gateway is used for a given downlink
message to a specific end-device. Moreover, for some applications, services
available at fog computing can be essential, such as distributed storage. This is the
case of collaborative SLAM, where local maps are stored at the fog layer so that
they are always available even if the edge gateway to which an end-node is
connected changes [56].
The cloud layer consists of servers and different services that support the system
and provide a bridge between the IoT devices and end-users for management or
monitoring. Time-series data of sensor state, and the results of the data analysis
and compression performed at the edge and fog layers are stored in cloud servers
where global storage is available. Part of the data analysis can also be performed
at the cloud. However, this should be only data that do not require time-critical or
safety-critical responses, as unexpected increases in communication latency or the
possibility of data loss might develop into unexpected behavior.
Cloud servers are also essential in terms of bridging the IoT platform with end-
users and administrators. Even if the edge and fog layers perform most or all of
22
the data analysis, servers are necessary to host cloud-based web and mobile
applications and all related data. Typical cloud server providers are Amazon
AWS, Google Cloud, or Digital Ocean. The cloud layer can also be deployed with
private servers.
The terminal layer consists of any type of connected devices that are used by end-
users for interacting with the IoT platform. These include any devices able to open
or execute native or web applications. Cloud-based applications are the public
side of the IoT platform and allow end-users to monitor and control the system,
analyze historical data, or overview the platform’s state and effectiveness.
In the case of a traffic management system for a smart city, end-users are typically
city administrators, and terminal devices are used to monitor traffic and receive
alerts of traffic accidents, traffic congestion, or other important events.
(Diethe et al., 2017) introduce using Bayesian models to tackle the challenges of
fusion of heterogeneous sensor modalities. The multiple-sensor-modality data,
including environmental data from PIR sensors, accelerometer data, and video
data, are collected in the HealthCare in the Residential Environment SPHERE
house (Diethe, Twomey, & Flach, 2014). The authors summarize that their
proposed approach can identify the modalities for each particular activity and the
features relevant to the activity simultaneously. Also, the results show how the
approach fuses and separates the tasks of activity recognition and location
prediction. (Nakamura et al., 2010) present a collective framework which can
monitor a user's location and vitals (heart rate or blood pressure) by synchronizing
wearable and ambient sensors.
Deep and transfer learning for building occupancy detection: A review and
comparative analysis
23
Aya Nabil Sayed, ... Faycal Bensaali, in Engineering Applications of Artificial
Intelligence, 2022
The authors in Abade et al. (2018) presented and evaluated a system for non-
intrusive occupancy detection employing sensors collecting data such as noise,
temperature, carbon dioxide (CO2), and light intensity. A working system was
tested, which included a device to collect and analyze environmental data, as well
as an analysis of data patterns across the obtained data using ML techniques to
estimate human occupancy in interior spaces.
The study in Jeon et al. (2018) tackled the problem in a novel manner. They
introduced an occupancy detection system using IoT technologies and on dust
concentration change patterns. The extraction technique used by the authors is to
24
create triangle forms, and accordingly their characteristics are utilized to
recognize presence in an indoor setting. Data is collected using dust, temperature,
and humidity sensors. The system was implemented in a real-live experiment to
evaluate the effectiveness. Finally, a qualitative analysis of the experimental
outcomes was conducted to compare the system performance against other
standard techniques.
Another study performed by the authors in Wu and Wang (2021) concluded that
the use of PIR sensors for internal lighting management resulted in a high number
of false-negative for stationary occupancy detection, accounting for over 50% of
the overall occupancy accuracy. To resolve that issue, they designed a
synchronized low-energy electronically chopped PIR (SLEEPIR) sensor that
employs a liquid crystal (LC) shutter to reduce the power of the PIR sensor’s
long-wave infrared output. By incorporating a support vector
machine (SVM) classifier, experiments with everyday routines showed a 99.12%
of accuracy.
In Abedi and Jazizadeh (2019), the use of doppler radar sensors (DRS) along with
infrared thermal array (ITA) sensors demonstrated a high accuracy when
using deep neural networks (DNN) algorithms. The DRS and ITA sensors
achieved occupancy detection accuracy of 98.9% and 99.96%, respectively
Circuit connection:
25
Block Diagram:
26