<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Sub-threshold Leakage Current Diferential Age Sensor for Identifying Reused Integrated Circuits</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Mahesh Kumar Singh</string-name>
          <email>mahesh.092002.ece@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Palaka Uma Maheswara Rao</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vella Satyanarayana</string-name>
          <email>vella@aec.edu.in</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of ECE, Aditya Engineering College</institution>
          ,
          <addr-line>Surampalem</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>All the electronic components can fall under the untrusted portion in the semiconductor supply. It has made the world wide spread for the reduction of their cost in markets and to increase their productivity rapidly. This article mainly focuses on the recycled ICs which is being manufactured by diferent semiconductor firms, and this article also explains the diference between recycled ICs and new ICs. At present, these reused ICs have become a major issue, due to these counterfeit parts, the lifetime of the products manufactured using these parts decreased, and their reliability and performance are also afected badly. The power-up state of the chip is used as the basis for the new SRAM detection method that has been implemented here for integrated circuits. Integrated circuits that have been recycled can be located using this method efectively ICs. But it is dificult to detect these reused ICs which were already been previously for a certain period.</p>
      </abstract>
      <kwd-group>
        <kwd>Circuits</kwd>
        <kwd>Counterfeit</kwd>
        <kwd>Deep learning</kwd>
        <kwd>Counterfeit ICs</kwd>
        <kwd>Aging sensor</kwd>
        <kwd>Discharge time sensor</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Counterfeit integrated circuits (ICs), which are a major source of concern in the supply chain
of electronic components due to reliability and security issues, are having an efect on a wide
variety of industrial sectors, such as computers, telecommunications, automotive electronics,
and even military systems [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. These concerns are brought about by the fact that counterfeit
ICs pose a threat to the chain of distribution of electronic components. This is as a result of
the issues that are brought about by the use of counterfeit ICs [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ]. A significant number of
systems began to operate improperly as a direct result of the use of these counterfeit components.
According to the research that was presented by M. Pecht and S. Tiku, a number of electronic
companies have been compelled to sufer a loss of roughly 100 billion USD of global income
each year as a direct result of this counterfeiting [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ]. This loss was presented as a direct
efect of the counterfeiting. When talking about the counterfeiting of integrated circuits (ICs),
the term ”recycled” refers to a component that has been retrieved from an old component
and then modified so that it can be passed of as a new component that has been delivered
by the original component manufacturer [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. In other words, a recycled component is an old
component that has been repurposed. Recycling and remarketing are the two most prevalent
      </p>
      <sec id="sec-1-1">
        <title>CEUR</title>
      </sec>
      <sec id="sec-1-2">
        <title>Workshop</title>
      </sec>
      <sec id="sec-1-3">
        <title>Proceedings</title>
        <p>
          ceur-ws.org
ISSN1613-0073
ways that fake identification cards are made [
          <xref ref-type="bibr" rid="ref10 ref8 ref9">8, 9, 10</xref>
          ]. Together, these two methods account
for 80% of all instances of counterfeiting that take place across the world [
          <xref ref-type="bibr" rid="ref11 ref12">11, 12</xref>
          ]. According
to a report that was published by the information handling Services in 2011, it is anticipated
that these components will have a yearly cost of around $169 billion for the market that is
involved in the semiconductor supply chain [
          <xref ref-type="bibr" rid="ref13 ref14">13, 14</xref>
          ]. The horizontal process of the once vertical
IC supply chain has resulted in a change to the chip manufacturing process, which has led to
the formation of a new security risk. This risk is due to the fact that the chip manufacturing
process has been altered. In times past, one and the same company would frequently be
responsible for both the design and fabrication of integrated circuits [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]. This was because it
was considered acceptable to establish a foundry at a cost that, despite being a pricey investment,
was considered to be acceptable. Since 1976, there has been a growth of sixty percent in the
transportation of semiconductors throughout Asia, which has resulted in substantial alterations
in the markets [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ]. According to a recent survey on the semiconductor industry that was carried
out by Semiconductor Equipment and Materials International (SEMI), 90% of the companies
have been the victims of intellectual property (IP) infringement at some point in their history.
Furthermore, 54% of the companies that were victims of IP infringement reported that the
infringement was either serious or extremely serious [17, 18? ? ]. Overproduction of integrated
circuits and a lack of respect for intellectual property rights are common problems in the
horizontal semiconductor business model. In this model, the company and other entities on the
production chain have access to the designer’s intellectual property, but neither the company
nor the other entities respect the designer’s intellectual property rights [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]. As a result of
the escalating costs associated with keeping their technology up to date and maintaining their
infrastructure, many businesses that deal in semiconductors have shifted their focus to the
counterfeiting industry. This is due to the fact that counterfeiting is a highly profitable industry.
They made a lot of their designs ”fabless” by using third-party service providers to manufacture
a lot of their designs, so that’s what they mean when they say that. Several separate design
ifrms, all of which have a history of fabricating their ideas in-house, have banded together in
order to reduce costs and share the efort [
          <xref ref-type="bibr" rid="ref20 ref21 ref22 ref23 ref24">20, 21, 22, 23, 24</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Related Work</title>
      <p>
        Due to the numerous problems that recycling ICs can bring about for both government and
business, such as the potential for a shorter lifetime, decreased reliability, and subpar
performance, etc., numerous people have conducted various studies and discovered various solutions
to identify these recycled ICs over the years [
        <xref ref-type="bibr" rid="ref24 ref25">24, 25</xref>
        ]. A few of these are: In 2000, the cost of
a plant to manufacture 300mm silicon discs using 65nm technology would have been around
$3 billion. Due to the fact that very few companies can aford these expenses, the industry
has begun to specialize. Some of these niche players have since developed products with such
astounding success that IC developers have licensed their patents application specific integrated
circuit (ASIC) designs. Some IC manufacturing firms put their hands on third-party IP along
with their own IC creation [
        <xref ref-type="bibr" rid="ref1 ref2 ref26 ref27 ref28 ref29">1, 2, 26, 27, 28, 29</xref>
        ]. In an efort to curb the spread of counterfeit
components in the aerospace and defense industries, the Aerospace Industries Association (AIA)
Counterfeit Components-Integrated Project Team published a number of recommendations
in May of this year [
        <xref ref-type="bibr" rid="ref3 ref30 ref4 ref5">3, 4, 5, 30</xref>
        ]. The AIA’s goal is to reduce the risks associated with buying
counterfeit components by raising awareness of those concerns. Mechanical, electronic, or even
completely other kinds of components could be involved. These components initially posed
a threat to the aerospace and defense industries because of their potential to lower product
performance, reliability, and safety shown in table 1.
      </p>
      <p>
        In 2015 a method that is based on low Ring Oscillators (RO) negative bias temperature
instability (NBTI) awareness was proposed. This method is performed in the 90nm technology
Generation node [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ]. This allows you to identify ICs that can only be used for a few hours.
We propose simpler CDIR variations with RO-pairs, where the designer can pick from a variety
of pairs appropriate to their area of expertise in finance. These CDIRs give improved estimation
accuracy in comparison to N-CDIRs. In 2017, a technique was proposed to detect the recycled
ICs called ‘Bias Temperature Instability’ (BTI) by using the infrastructure for power metering
and control. This BTI method relied on the discharge time of virtual private networks during
standby operations. The values of this time were determined by the threshold voltage of the
CMOS devices in a given circuit. Power-gated design (PGD) [11, 13? ]. On simulating the
design of this BTI technique on SPICE software, they meet a value of estimating error of BTI
aging as &lt;1% and &lt;6.2% for PGD. They’ve also found that the cost of this technique is less. The
researchers came to a result that this aging technique is having some advantages as listed below:
• They do not require any distributed sensors in this technique, since a virtual private
network is already presented in PGDs.
• It achieved a higher average aging estimation of around 97%.
      </p>
      <p>• They don’t require any mission profiles like high temperature, altitudes etc.</p>
      <p>
        The Minimum Idle Time (MIT) cost is induced by consuming the energy to observe the
discharge time is evaluated on two diferent models using either x86 or ARM architecture.
It was found that less than &lt;30% in x86 architecture and 45% in ARM architecture than the
original power gating MIT. This problem was achieved by using the ARM Cortex M0 processor,
which was made with a 65nm CMOS technology [
        <xref ref-type="bibr" rid="ref11 ref13 ref15">13, 11, 15</xref>
        ]. It was also proposed that a novel
approach could be to use coarse-grained aging sensors to identify reused chips. As a result,
we’ll have to modify our approach slightly before it can be used in low-power devices. This
sensor detects longer power-rail discharge periods when the target circuit goes into sleep mode
and communicates that information [
        <xref ref-type="bibr" rid="ref16 ref17">16, 17</xref>
        ]. It was demonstrated by HSPICE simulation that
the discharge time of the power network is age-dependent. This means it can help us figure
out which ICs have been recycled and which haven’t. After a year of use, the discharge time of
recycled integrated circuits was found to have increased by a factor of seven from its initial
value after only three months. Time spent discharging was found to have increased following
the first year of use [ 23? ]. By allowing complete tracking of components from fabrication
to final assembly, researchers in 2019 [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] uncovered a low-cost and dependable method for
evaluating reused ICs. By doing so, the amount of recycled IC may be calculated. which helps
us to detect the recycled ICs [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ]. This method uses Radio Frequency Identification (RFID) to
verify the originality of any chip. The researchers had concluded that this can assure trust
among the manufacturers, distributors, and system integrators [
        <xref ref-type="bibr" rid="ref1 ref3 ref4">1, 3, 4</xref>
        ]. And also stated that it
is unnecessary to supply power to the chip in the verification process at the distributor. But
for the measurement of RO frequency, it needs to be powered up in the final verification in
the system integrator’s site. This can be applied to all chips practically [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. In An alternative
detecting method was developed, and it was made in such a way that it can be utilized on both
large digital circuits and older components existing in the supply chain. This is because the
scan chains provide direct access to the power ON mode of the circuit’s flip flops (FF). Notably,
the netlist of the circuit is not required, nor is any other information beyond scan testing of the
component. This is a major perk [
        <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
        ]. In 2021, scientists came up with an innovative answer
they termed the ”Diferential Aging Sensor [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].” This sensor keeps an eye on the discharge
time (dv), which grows with the age of the chips in the design and is reliant on the subthreshold
leakage current. After that, the Global Foundries assisted with running the simulations by
utilizing a hybrid of BTI and Hot Carrier Injection (HCI) shown in table 2. As an added bonus,
it is said that the discharge time is sensitive to aging, which increases the frequency with which
its previously used ones may be detected, and that it is also resistant to process, voltage, and
temperature changes [
        <xref ref-type="bibr" rid="ref11 ref13 ref15">11, 13, 15</xref>
        ]. A reliable discharge time lends credence to these assertions
(PVTs). Upon completing the simulation, the following occurred:
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Methodology for IC Identification Circuit</title>
      <p>Procedures on the circuit level (such as EPROM) and the water level (such as laser link cutting)
necessitate the employment of very expensive and very eficient technology. In order to retrieve
unique and repeatable data, ICID uses the inherent unpredictability of silicon fabrication. They
may be manufactured with no additional steps or external programming, and they are compatible
with all standard sub-micron CMOS processes. The building blocks of this ICID are a collection
of addressable MOSFETs including high load resistance, standard gate and source topologies,
and drains. Because of the incompatibility between the devices, the drain currents will be highly
irregular, causing the load to generate a distinct sequence of irregular voltages for each die.
ICID uses these varying patterns of consistently occurring random voltages to generate unique
traces. Block diagram of ICID is shown in figure 1</p>
      <p>In this method, to determine the previous usage of the ICs we use the FFs which are in
power-up state. But due to its built-in asymmetry, the FF will be skewed. In this method, we’ll
build two FF groups which are mostly aged 0 and 1. This process consists of two phases namely
1. Characterization and 2. Authentication. In Phase-I two FF groups were selected so that we
can determine whether the selected chip is new or recycled in Phase-II.</p>
      <p>Phase-I (Characterization): The primary task of this characterization phase is to identify
and group the FFs with the ages 0 and 1. At the first stage, we’ll gather the information (FF
input) from the Cut under test (CUT). Then we’ll apply a random number of inputs and by
using the scan chains we’ll capture the response in FFs. Later on, based upon the probabilities
of responses we’ll split the FFs into two groups such that one of two groups consists of the FFs
with the age of ‘logical 0’ and the other group consists of the FFs with the age of ‘logical 1’
shown in fig 2.</p>
      <p>Phase-II (Authentication): Determining the recycled IC is a simple process. It is a must to
measure the starting values of FFs for any CUT tests. To select the slave latches of the D-Flip
lfops (DFF), we need to encounter the clock with logic 0 and to select the master latches we
need to encounter a clock with logic 1. Till now the FFs were arranged into groups based on
their phase values so that their percentage of 1’s diference is calculated. If the diference is lies
within Δ, then the chip is identified as new, else the chip is recycled. The aging sensor consists
of mainly 2 identical ring oscillators (RO), Stress RO (SRO), and Reference RO (RRO) which are
in the same size and kept aside to maintain the same operating temperature and for the minimal
process variations (PV). This design consists also a counter, a comparator, and a Non-volatile
memory (NVM). In this, we’re sending 2 additional signals that were already proposed and
modified. It is constructed with only one RO, and an NVM makes use of the discharge time. This
sensor is extremely accurate and focuses on the identification of recycled integrated circuits
as well as the frequent dificulties that occur in the aging sensors that could diverge from the
detection findings. It does both of these things in order to ensure that it provides correct results.
Through the process of multiplexing, it is possible to obtain access to the readings of the RO’s
output. The comparator compares the RRO and SRO produces their diference as its output. The
RRO discharge time and the discharge time diference between the RRO and SRO measurements
are both stored in the NVM, however the NVM cannot be utilized to access either of these times.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Results and Discussion</title>
      <p>Due to globalization, electronic component supply chains are getting more intricate, with parts
sourced from a diverse set of manufacturers. This increased complexity has made the issue
of fake electronics a pressing one that requires immediate solutions. There are currently a
limited number of standards and algorithms available for detecting counterfeit components,
but this is expected to change soon. But there hasn’t been enough study done to address the
detection and avoidance of all counterfeit parts that are currently permeating the electronic
component supply chain. Counterfeit components may be any combination of recycled, noted,
overproduced, cloned, out-of-specification/defective, and falsified paperwork. There is a higher
chance of reliability concerns and a shorter lifespan for each of these components, even if they
initially perform adequately. In this session, we will discuss some of the methods now in use
to spot fake products and avoid buying them. Moreover, we will discuss the challenges that
will need to be overcome in order to put these tactics into efect, as well as the development of
novel detection and avoidance technologies shown in table 3.</p>
      <p>Catastrophic failures in the manufacturing phase can be caused by deficiencies in the design,
large swings in the manufacturing process, or isolated errors in individual devices. Devices
may malfunction after manufacture due to flaws discovered after regular use that were missed
during manufacturing testing. Infant mortality is the sad premature death brought on by
external, preventable causes. Integral circuit failure can be caused by a variety of factors over
e
v
i
t
c
e
f
e - - - - - - iu iu</p>
      <p>m m
D — — — — — — ed ed oLw ighH</p>
      <p>M M</p>
      <p>m
cy igh ow igh igh iu</p>
      <p>d ow igh ow ow igh
-c H L H H e L H L L H
e M
) )
M M
A E
S S
( (
r
e
w
o y y
P p p</p>
      <p>o o
w c c
oL rso rso
c c
i i
h
sd itw iss M M iss
oh n ly itc n s ly</p>
      <p>a s ro isy tss tss a
itttceeeonM liiItssceaopun -ayR litrscaonBA iccagounnnA litcceagEnnn llitreaaanA itrrceeaaTm litceaounnT lissaFynRA l-teaaynhAD
D V X M S S M P F E P</p>
      <p>m
e u
v i
it d
c - - - - - - - e</p>
      <p>A — — — — — — — M
o
s e
b t - - - - - - - e
O le — — — — — — — M
m
u
i
d
i
l d
p e</p>
      <p>h
u ta - ow ow ow ow ig ow</p>
      <p>D c — L L L L H L —
f
o</p>
      <p>c
t fe e h
u e v - ig - - - - -</p>
      <p>i
O D t — H — — — — — —
d
e
c
-r u
e d h
v ro - ig ow ow - - ow /A
O p — H L L — — L N
d
e
- v
b re ow - - - - - - ow
O s L — — — — — — L</p>
      <p>m
d u
e i</p>
      <p>d h
-e lcy e - - - - - - ig
R c M — — — — — — H
c
n
u</p>
      <p>F
g
in le
)
T
S
S
(
s k b
d r a
o g g g a n
teh itsn iren itrun ign trem lcon
M rs eT te ca ag a U
ce so lit m fu lf W y )F ID
n e Sp rea an ou re ll U e</p>
      <p>n
a S e w M am aw ica (P g</p>
      <p>IR ru rd it C rd s s ak</p>
      <p>y n c
d
i
o
v D ce a l a
A C S H Sp IC H hP ito aP
time, such as aging, wear and tear, hostile surroundings, heavy usage, etc. The breakdown that
happens when a material or component performs above what is believed to be its inherent
capabilities is referred to as intrinsic reliability failure mechanisms shown in table 4 and table
5.</p>
      <p>Electrical tests are not reliable for producing correct results due to their numerous flaws. The
results of the parametric tests for lower technical nodes are questionable due to increased process
variability and environmental changes. This is because a component’s electrical characteristics
might vary greatly. Functional tests are useless as a result since it is extremely challenging, if
not impossible, to gather data or manufacturer test fixtures for active and outdated parts. This
is due to the need for test program generation for those components whose operation is less
understood.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion and Future Scope</title>
      <p>A chip aging sensor is used in the preceding article to measure the discharge time of recycled
integrated circuits in order to identify them. This sensor was made by IBM. The second sensor
design uses an SRO and RRO to measure the discharge time variation due to age, whereas
the first sensor design depends on a single NVM and RO placed during manufacture. In this
paper, we have to also represent various taxonomy of counterfeit detection and avoidance
methods. Finally, we conclude that without taking proper precautions and proper detection
techniques, using of counterfeit parts causes serious problems in many areas like in defense
and aerospace industries. Physical and electrical testing are summarized. Then, we discussed
counterfeit avoidance methods and how to discover counterfeit components proactively, rather
than reactively. We covered detecting and avoiding counterfeit goods, as well as recent research
opportunities.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>K.</given-names>
            <surname>Lofstrom</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W. R.</given-names>
            <surname>Daasch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Taylor</surname>
          </string-name>
          ,
          <article-title>Ic identification circuit using device mismatch</article-title>
          ,
          <source>in: 2000 IEEE International Solid-State Circuits Conference. Digest of Technical Papers (Cat. No. 00CH37056)</source>
          , IEEE,
          <year>2000</year>
          , pp.
          <fpage>372</fpage>
          -
          <lpage>373</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>S.</given-names>
            <surname>Wei</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Koushanfar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Potkonjak</surname>
          </string-name>
          ,
          <article-title>Integrated circuit digital rights management techniques using physical level characterization</article-title>
          ,
          <source>in: Proceedings of the 11th annual ACM workshop on Digital rights management</source>
          ,
          <year>2011</year>
          , pp.
          <fpage>3</fpage>
          -
          <lpage>14</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>U.</given-names>
            <surname>Guin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Forte</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Tehranipoor</surname>
          </string-name>
          ,
          <article-title>Design of accurate low-cost on-chip structures for protecting integrated circuits against recycling</article-title>
          ,
          <source>IEEE Transactions on Very Large Scale Integration (VLSI) Systems</source>
          <volume>24</volume>
          (
          <year>2015</year>
          )
          <fpage>1233</fpage>
          -
          <lpage>1246</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>V.</given-names>
            <surname>Tenentes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Rossi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Khursheed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. M.</given-names>
            <surname>Al-Hashimi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. R.</given-names>
            <surname>Gunn</surname>
          </string-name>
          ,
          <article-title>Coarse-grained online monitoring of bti aging by reusing power-gating infrastructure</article-title>
          ,
          <source>IEEE Transactions on Very Large Scale Integration (VLSI) Systems</source>
          <volume>25</volume>
          (
          <year>2016</year>
          )
          <fpage>1397</fpage>
          -
          <lpage>1407</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>D.</given-names>
            <surname>Rossi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Tenentes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Khursheed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Reddy</surname>
          </string-name>
          ,
          <article-title>Recycled ic detection through aging sensor</article-title>
          ,
          <source>in: 2018 IEEE 23rd European Test Symposium (ETS)</source>
          , IEEE,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>2</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M. K.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Manusha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Balaramakrishna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gamini</surname>
          </string-name>
          ,
          <article-title>Speaker identification analysis based on long-term acoustic characteristics with minimal performance</article-title>
          ,
          <source>International Journal of Electrical and Electronics Research</source>
          <volume>10</volume>
          (
          <year>2022</year>
          )
          <fpage>848</fpage>
          -
          <lpage>852</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Alam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Chowdhury</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. M. Tehranipoor</surname>
          </string-name>
          , U. Guin, Robust, low
          <article-title>-cost, and accurate detection of recycled ics using digital signatures</article-title>
          ,
          <source>in: 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)</source>
          , IEEE,
          <year>2018</year>
          , pp.
          <fpage>209</fpage>
          -
          <lpage>214</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M. K.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <article-title>A text independent speaker identification system using ann, rnn, and cnn classification technique</article-title>
          ,
          <source>Multimedia Tools and Applications</source>
          (
          <year>2023</year>
          )
          <fpage>1</fpage>
          -
          <lpage>13</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>P.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Kaur</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>Kaur, Multi lingual speaker identification on foreign languages using artificial neural network</article-title>
          ,
          <source>International Journal of Computer Applications</source>
          <volume>57</volume>
          (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>P.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Shukla</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Tiwari</surname>
          </string-name>
          <article-title>, Multi lingual speaker recognition using artificial neural network</article-title>
          ,
          <source>Advances in Computational Intelligence</source>
          (
          <year>2009</year>
          )
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>M. K. Singh</surname>
          </string-name>
          ,
          <article-title>Feature extraction and classification eficiency analysis using machine learning approach for speech signal</article-title>
          ,
          <source>Multimedia Tools and Applications</source>
          (
          <year>2023</year>
          )
          <fpage>1</fpage>
          -
          <lpage>16</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A.</given-names>
            <surname>Shankhdhar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. K.</given-names>
            <surname>Verma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Madaan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Gupta</surname>
          </string-name>
          ,
          <article-title>Quality analysis for reliable complex multiclass neuroscience signal classification via electroencephalography</article-title>
          ,
          <source>International Journal of Quality &amp; Reliability Management</source>
          <volume>39</volume>
          (
          <year>2022</year>
          )
          <fpage>1676</fpage>
          -
          <lpage>1703</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>G.</given-names>
            <surname>Veerendra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Swaroop</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Dattu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. A.</given-names>
            <surname>Jyothi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. K.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <article-title>Detecting plant diseases, quantifying and classifying digital image processing techniques</article-title>
          ,
          <source>Materials Today: Proceedings</source>
          <volume>51</volume>
          (
          <year>2022</year>
          )
          <fpage>837</fpage>
          -
          <lpage>841</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>S.</given-names>
            <surname>Chauhan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Madaan</surname>
          </string-name>
          , E-gardener:
          <article-title>building a plant caretaker robot using computer vision</article-title>
          ,
          <source>in: 2018 4th International Conference on Computing Sciences (ICCS)</source>
          , IEEE,
          <year>2018</year>
          , pp.
          <fpage>137</fpage>
          -
          <lpage>142</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>U.</given-names>
            <surname>Padma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Jagadish</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. K.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <article-title>Recognition of plant's leaf infection by image processing approach</article-title>
          ,
          <source>Materials Today: Proceedings</source>
          <volume>51</volume>
          (
          <year>2022</year>
          )
          <fpage>914</fpage>
          -
          <lpage>917</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>P. M. Satya</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Jagadish</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Satyanarayana</surname>
            ,
            <given-names>M. K.</given-names>
          </string-name>
          <string-name>
            <surname>Singh</surname>
          </string-name>
          ,
          <article-title>Stripe noise removal from remote sensing images</article-title>
          ,
          <source>in: 2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)</source>
          , IEEE,
          <year>2021</year>
          , pp.
          <fpage>233</fpage>
          -
          <lpage>236</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>A.</given-names>
            <surname>Nandini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. K.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <article-title>Circuits based on the memristor for fundamental operations</article-title>
          ,
          <source>in: 2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)</source>
          , IEEE,
          <year>2021</year>
          , pp.
          <fpage>251</fpage>
          -
          <lpage>255</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>R.</given-names>
            <surname>Anushka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Jagadish</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Satyanarayana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. K.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <article-title>Lens less cameras for face detection and verification</article-title>
          ,
          <source>in: 2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)</source>
          , IEEE,
          <year>2021</year>
          , pp.
          <fpage>242</fpage>
          -
          <lpage>246</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>R.</given-names>
            <surname>Nainvarapu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. B.</given-names>
            <surname>Tummala</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. K.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <article-title>A slant transform and diagonal laplacian based fusion algorithm for visual sensor network applications</article-title>
          ,
          <source>in: High Performance Computing and Networking: Select Proceedings of CHSN 2021</source>
          , Springer,
          <year>2022</year>
          , pp.
          <fpage>181</fpage>
          -
          <lpage>191</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>K. R. S.</given-names>
            <surname>Reddy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Satwika</surname>
          </string-name>
          , G. Jafino,
          <string-name>
            <given-names>M. K.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <article-title>Monitoring of infrastructure and development for smart cities supported by iot method</article-title>
          ,
          <source>in: Proceedings of Second International Conference in Mechanical and Energy Technology: ICMET</source>
          <year>2021</year>
          , India, Springer,
          <year>2022</year>
          , pp.
          <fpage>21</fpage>
          -
          <lpage>28</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>P.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Madaan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sharma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. K.</given-names>
            <surname>Sharma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kautish</surname>
          </string-name>
          ,
          <article-title>Trust-based communication systems for internet of things applications</article-title>
          ,
          <year>2022</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>V.</given-names>
            <surname>Walia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Madaan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mohan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Gupta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sharma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <article-title>Blockchain in iot and limitations</article-title>
          ,
          <source>in: Trust-Based Communication Systems for Internet of Things Applications</source>
          , John Wiley &amp; Sons, Inc.,
          <year>2022</year>
          , pp.
          <fpage>17</fpage>
          -
          <lpage>27</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , U. Guin,
          <article-title>End-to-end traceability of ics in component supply chain for fighting against recycling</article-title>
          ,
          <source>IEEE Transactions on Information Forensics and Security</source>
          <volume>15</volume>
          (
          <year>2019</year>
          )
          <fpage>767</fpage>
          -
          <lpage>775</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>W.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Guin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <article-title>A zero-cost detection approach for recycled ics using scan architecture</article-title>
          ,
          <source>in: 2020 IEEE 38th VLSI Test Symposium (VTS)</source>
          , IEEE,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>M. K. Singh</surname>
            ,
            <given-names>P. M.</given-names>
          </string-name>
          <string-name>
            <surname>Satya</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Satyanarayana</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Gamini</surname>
          </string-name>
          ,
          <article-title>Speaker recognition assessment in a continuous system for speaker identification</article-title>
          ,
          <source>International Journal of Electrical and Electronics Research</source>
          <volume>10</volume>
          (
          <year>2022</year>
          )
          <fpage>862</fpage>
          -
          <lpage>867</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>S.</given-names>
            <surname>Urmila</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. A.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. K.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <article-title>Cardiac surveillance system using by the modified kalman filter</article-title>
          ,
          <source>in: International Conference on Artificial Intelligence and Data Science</source>
          , Springer,
          <year>2021</year>
          , pp.
          <fpage>112</fpage>
          -
          <lpage>122</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <surname>A. S. B. Musa</surname>
            ,
            <given-names>S. K.</given-names>
          </string-name>
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <article-title>Suspicious human activity recognition for video surveillance system</article-title>
          , in: International Conference on Control, Instrumentation, Communication &amp; Computational
          <string-name>
            <surname>Technologies</surname>
          </string-name>
          ICCICCT-2014, IEEEXplore,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>N.</given-names>
            <surname>Mohod</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Madaan</surname>
          </string-name>
          ,
          <article-title>Yolov4 vs yolov5: Object detection on surveillance videos</article-title>
          ,
          <source>in: International Conference on Advanced Network Technologies and Intelligent Computing</source>
          , Springer Nature Switzerland Cham,
          <year>2022</year>
          , pp.
          <fpage>654</fpage>
          -
          <lpage>665</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>N.</given-names>
            <surname>Mohod</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Agrawal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Madan</surname>
          </string-name>
          ,
          <article-title>Human detection in surveillance video using deep learning approach</article-title>
          ,
          <source>in: 2023 6th International Conference on Information Systems and Computer Networks (ISCON)</source>
          , IEEE,
          <year>2023</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>K.</given-names>
            <surname>Krishna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Manohar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Radha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <article-title>Rectifier acoustical cardiac activity detection</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>