Cellular Automata-Based Recursive Pseudoexhaustive Test Pattern Generator

Similar documents
Optimization of 1D and 2D Cellular Automata for Pseudo Random Number Generator.

Theory of Additive Cellular Automata

An Explicit Similarity Transform between Cellular Automata and LFSR Matrices*

Designing Cellular Automata Structures using Quantum-dot Cellular Automata

Logic BIST. Sungho Kang Yonsei University

One-Dimensional Linear Hybrid Cellular Automata: Their Synthesis, Properties and Applications to Digital Circuits Testing

Inadmissible Class of Boolean Functions under Stuck-at Faults

ECE 512 Digital System Testing and Design for Testability. Model Solutions for Assignment #3

Test Pattern Generator for Built-in Self-Test using Spectral Methods

Counting Two-State Transition-Tour Sequences

Brief Contributions. Easily Testable Multiple-Valued Logic Circuits Derived from Reed-Muller Circuits 1 INTRODUCTION 2 PRELIMINARIES

Systematic Design of Original and Modified Mastrovito Multipliers for General Irreducible Polynomials

Built-In Test Generation for Synchronous Sequential Circuits

FPGA Implementation of Neighborhood-of-Four Cellular Automata Random Number Generators

Department of Electrical and Computer Engineering University of Wisconsin Madison. Fall Final Examination

WITH increasing complexity in systems design from increased

Relating Entropy Theory to Test Data Compression

BINARY TO GRAY CODE CONVERTER IMPLEMENTATION USING QCA

Linear Finite State Machines 1. X. Sun E. Kontopidi M. Serra J. Muzio. Abstract

A Hardware Approach to Self-Testing of Large Programmable Logic Arrays

EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs)

Design of Arithmetic Logic Unit (ALU) using Modified QCA Adder

Probabilistic Analysis of Cellular Automata Rules and its Application in Pseudo Random Pattern Generation

Novel Bit Adder Using Arithmetic Logic Unit of QCA Technology

Realization of 2:4 reversible decoder and its applications

A Novel Ternary Content-Addressable Memory (TCAM) Design Using Reversible Logic

Subquadratic Computational Complexity Schemes for Extended Binary Field Multiplication Using Optimal Normal Bases

Reversible Circuit Using Reversible Gate

A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases

VLSI Physical Design Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

A COMBINED 16-BIT BINARY AND DUAL GALOIS FIELD MULTIPLIER. Jesus Garcia and Michael J. Schulte

Outline. EECS Components and Design Techniques for Digital Systems. Lec 18 Error Coding. In the real world. Our beautiful digital world.

Constructing a Ternary FCSR with a Given Connection Integer

DIAGNOSIS OF FAULT IN TESTABLE REVERSIBLE SEQUENTIAL CIRCUITS USING MULTIPLEXER CONSERVATIVE QUANTUM DOT CELLULAR AUTOMATA

Cryptographically Robust Large Boolean Functions. Debdeep Mukhopadhyay CSE, IIT Kharagpur

On Random Pattern Testability of Cryptographic VLSI Cores

Direct Design of Reversible Combinational and Sequential Circuits Using PSDRM Expressions

DESIGN OF AREA-DELAY EFFICIENT ADDER BASED CIRCUITS IN QUANTUM DOT CELLULAR AUTOMATA

Subquadratic space complexity multiplier for a class of binary fields using Toeplitz matrix approach

Structured Low-Density Parity-Check Codes: Algebraic Constructions

High Speed Time Efficient Reversible ALU Based Logic Gate Structure on Vertex Family

Design and Implementation of High Speed CRC Generators

1 Introduction In [2] a method for computing the Walsh spectrum in R-encoding of a completely specified binary-valued function was presented based on

Analysis And Design Of Priority Encoder Circuit Using Quantum Dot Cellular Automata

ECE 341. Lecture # 3

Cellular Automata Evolution for Pattern Recognition

Error Correcting Capability of Cellular Automata Based Associative Memory

Synthesis of Saturating Counters Using Traditional and Non-traditional Basic Counters

Design of A Efficient Hybrid Adder Using Qca

Prove that if not fat and not triangle necessarily means not green then green must be fat or triangle (or both).

GF(2 m ) arithmetic: summary

BCD Adder Design using New Reversible Logic for Low Power Applications

DESİGN AND ANALYSİS OF FULL ADDER CİRCUİT USİNG NANOTECHNOLOGY BASED QUANTUM DOT CELLULAR AUTOMATA (QCA)

Low complexity bit-parallel GF (2 m ) multiplier for all-one polynomials

EECS150 - Digital Design Lecture 26 - Faults and Error Correction. Types of Faults in Digital Designs

Circuit for Revisable Quantum Multiplier Implementation of Adders with Reversible Logic 1 KONDADASULA VEDA NAGA SAI SRI, 2 M.

STATISTICAL FAULT SIMULATION.

On Application of Output Masking to Undetectable Faults in Synchronous Sequential Circuits with Design-for-Testability Logic

Basic Logic Gate Realization using Quantum Dot Cellular Automata based Reversible Universal Gate

A Novel Low Power 1-bit Full Adder with CMOS Transmission-gate Architecture for Portable Applications

15.1 Elimination of Redundant States

FPGA BASED DESIGN OF PARALLEL CRC GENERATION FOR HIGH SPEED APPLICATION

The Method of Reversible Circuits Design with One-gate Prediction

Digital Circuits. 1. Inputs & Outputs are quantized at two levels. 2. Binary arithmetic, only digits are 0 & 1. Position indicates power of 2.

Future Generation Computer Systems 16 (1999) Accepted 17 March Draft

EECS150 - Digital Design Lecture 23 - FFs revisited, FIFOs, ECCs, LSFRs. Cross-coupled NOR gates

EECS150 - Digital Design Lecture 11 - Shifters & Counters. Register Summary

UMBC. At the system level, DFT includes boundary scan and analog test bus. The DFT techniques discussed focus on improving testability of SAFs.

Tribhuvan University Institute of Science and Technology 2067

arxiv: v2 [quant-ph] 5 Dec 2013

FPGA accelerated multipliers over binary composite fields constructed via low hamming weight irreducible polynomials

EE40 Lec 15. Logic Synthesis and Sequential Logic Circuits

AN IMPROVED LOW LATENCY SYSTOLIC STRUCTURED GALOIS FIELD MULTIPLIER

A Digit-Serial Systolic Multiplier for Finite Fields GF(2 m )

On the Complexity of Error Detection Functions for Redundant Residue Number Systems

A Low-Error Statistical Fixed-Width Multiplier and Its Applications

3. Complete the following table of equivalent values. Use binary numbers with a sign bit and 7 bits for the value

An Algorithm for Inversion in GF(2 m ) Suitable for Implementation Using a Polynomial Multiply Instruction on GF(2)

On the Analysis of Reversible Booth s Multiplier

Area-Time Optimal Adder with Relative Placement Generator

PAST EXAM PAPER & MEMO N3 ABOUT THE QUESTION PAPERS:

A New Multiple Weight Set Calculation Algorithm

Binary addition (1-bit) P Q Y = P + Q Comments Carry = Carry = Carry = Carry = 1 P Q

Efficient random number generation on FPGA-s

Faculty of Engineering. FINAL EXAMINATION FALL 2008 (December2008) ANSWER KEY

Design and Comparison of Wallace Multiplier Based on Symmetric Stacking and High speed counters

Online Testable Reversible Circuits using reversible gate

An Implementation of an Address Generator Using Hash Memories

Design of High-speed low power Reversible Logic BCD Adder Using HNG gate

Power Optimization using Reversible Gates for Booth s Multiplier

Brief Contributions. Optimal Selective Huffman Coding for Test-Data Compression 1 INTRODUCTION 2 SELECTIVE HUFFMAN ENCODING REVIEW

Quality of Minimal Sets of Prime Implicants of Boolean Functions

USING SAT FOR COMBINATIONAL IMPLEMENTATION CHECKING. Liudmila Cheremisinova, Dmitry Novikov

PERFORMANCE ANALYSIS OF CLA CIRCUITS USING SAL AND REVERSIBLE LOGIC GATES FOR ULTRA LOW POWER APPLICATIONS

EECS Components and Design Techniques for Digital Systems. Lec 26 CRCs, LFSRs (and a little power)

Digital Logic: Boolean Algebra and Gates. Textbook Chapter 3

Transition Faults Detection in Bit Parallel Multipliers over GF(2 m )

ELEC Digital Logic Circuits Fall 2014 Sequential Circuits (Chapter 6) Finite State Machines (Ch. 7-10)

An Effective New CRT Based Reverse Converter for a Novel Moduli Set { 2 2n+1 1, 2 2n+1, 2 2n 1 }

Implementation of Quantum dot Cellular Automata based Novel Full Adder and Full Subtractor

Transcription:

IEEE TRANSACTIONS ON COMPUTERS, VOL, NO, FEBRUARY Cellular Automata-Based Recursive Pseudoexhaustive Test Pattern Generator Prabir Dasgupta, Santanu Chattopadhyay, P Pal Chaudhuri, and Indranil Sengupta AbstractÐThis paper presents a recursive technique for generation of pseudoexhaustive test patterns The scheme is optimal in the sense that the first k vectors cover all adjacent k-bit spaces exhaustively It requires substantially lesser hardware than the existing methods and utilizes the regular, modular, and cascadable structure of local neighborhood Cellular Automata (CA), which is ideally suited for VLSI implementation In terms of XOR gates, this approach outperforms earlier methods by to percent Moreover, test effectiveness and hardware requirements have been established analytically, rather than by simple simulation and logic minimization Index TermsÐData path architecture, pseudoexhaustive testing, BIST, cellular automata INTRODUCTION æ WITH the maturity of VLSI technology, the complexity of circuits housed on a silicon floor is growing significantly Unfortunately, test technology has failed to match this growth in circuit complexity Consequently, improvements in testing schemes are constantly sought With this goal in mind, this paper proposes an on-chip test generation scheme that reduces the test overhead significantly For complex circuits with a large number of inputs, pseudoexhaustive testing has been found to be suitable for many cases where each of the outputs depends only on a subset of the inputs [] This results in much smaller test size compared to the exhaustive test size of n for n-input circuit under test (CUT) Several schemes for generation of n-bit patterns with all m bits m <n exhaustively covered have been studied in [], [3], [], [] Schemes based on linear cyclic codes [3], [], [], constant weight vectors [], iterative procedure [], etc, have been reported Implementation of a pseudoexhaustive testing scheme based on punctured cyclic codes has been studied in [] and schemes for generation of exhaustive test patterns on one or several subsets of cell positions of a long shift register have been reported in [8] In most of the above approaches, the goal is to generate exhaustive patterns in all possible combinations of m cell positions m <n of the n-bit LFSR For achieving this capability, the test size inevitably becomes at least double m, except for constant weight vector generation scheme [], which accomplishes the task with lowest test length but higher implementation cost Das and Chaudhuri [9] reported a Cellular Automata (CA) based scheme for pseudoexhaustive test pattern generation which exploits the cyclic decomposition of total vector space generated by a group P Dasgupta is with the Variable Energy Cyclotron Centre, /AF, Bidhan Nagar, Calcutta-, India E-mail: pdgupta@hotmailcom S Chattopadhyay is with the Department of Computer Science and Engineering, Indian Institute of Technology, Guwahati, Guwahati-8, India E-mail: c_santanu@posstmarknet PP Chaudhuri is with the Department of Computer Science and Technology, Bengal Engineering College (Deemed University), Howrah- 3, India E-mail: ppc@becsacin I Sengupta is with the Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, Kharagpur-3, India E-mail: isg@cseiitkgpernetin Manuscript received June 99; revised June 999; accepted 3 Apr For information on obtaining reprints of this article, please send e-mail to: tc@computerorg, and reference IEEECS Log Number 8 Fig Contiguous -bit subspaces CA But, this may require more than i time-steps for generating i-bit pseudoexhaustive patterns Moreover, pseudoexhaustive testing of building blocks of certain types of circuits, such as digital signal processing systems, data-path architectures, and embedded memories, requires a special type of pattern set Here, an n-bit space is said to be pseudoexhaustively covered if, for all (n k ) contiguous k-bit subspaces, each of the possible k patterns occur at least once Pseudoexhaustive (RPE) Such testing schemes are known as Recursive testing schemes The RPE test pattern set for -bit test vectors with -bit pseudoexhaustive covering is given below Fig illustrates the case of recursive pseudoexhaustive pattern generation for n ˆ, k ˆ Such a type of recursive pseudoexhaustive (RPE) test pattern generation cannot be handled with the CA-based schemes proposed in [9] Section briefly introduces the theory of RPE test pattern generation Section 3 builds the analytical basis of the RPE test pattern generation scheme using cellular automata The implementation details are noted in Section RECURSIVE PSEUDOEXHAUSTIVE (RPE) TEST PATTERN GENERATION A set of n-bit test patterns is said to be recursive pseudoexhaustive if any subset of k contiguous patterns of it exhaustively covers all possible k-bit subspaces For example, Table provides the list of RPE test vectors for string length n ˆ and -bit (k ˆ ) contiguous subspace So, the first 3 (ˆ ) vectors cover all -bit subspaces exhaustively First, two test vectors cover all -bit subspaces, first vectors cover all -bit subspaces, first 8 vectors cover all 3-bit subspaces, exhaustively, and so on RPE test pattern generation based on characteristic function was elaborated in [] In the following, we briefly introduce the RPE test pattern generation scheme presented in [] Let P be an ordered set of k binary strings of k-bit each, such that all i-bit contiguous subspaces ( i<k ) are covered exhaustively in consecutive i steps Let P be described by the characteristic function f k x x x k, which equals if vector x ;x ; ::::x k ŠP and zero otherwise So, f k x x x k describes the complementary set P such that P [ P exhaustively covers the k-bit space Now, if a new kth bit is appended at the most significant position of each vector of set P, then all new i-subspaces comprising this bit x k are exhaustively covered if the characteristic function f k x x x k is true (ˆ ) for each such vectors Hence, for such an extended set P e, the characteristic 8-93//$ ß IEEE

8 IEEE TRANSACTIONS ON COMPUTERS, VOL, NO, FEBRUARY TABLE Test Vectors for n ˆ and k ˆ function which features exhaustive coverage of all i-bit ( i<k ) contiguous subspaces is: f k x x x k f k x x x k Similarly, the characteristic function for the set P e is: f k x x x k f k x x x k Now, P e [ P e features exhaustive coverage of contiguous subspaces upto size k and is described by the characteristic function: f k x x x k ˆf k x x x k f k x x x k f k x x x k f k x x x k ) f k x x x k ˆf k x x x k f k x x x k : Starting with f x ˆx, one can recursively generate successive characteristic functions as: f x x ˆf x f x ˆx x ˆ x x f x x x ˆf x x f x x ˆx x f 3 x x x x 3 ˆf x x x f x x x 3 ˆx x x x 3 f x x x x 3 x ˆf 3 x x x x 3 f 3 x x x 3 x ˆx x : It has been shown in [] that if there are two vectors v and v such that f k v ˆf k v, then f k v v ˆ So, to generate patterns satisfying f k x x x k, one can take any vector v such that f k v ˆ and perform bitwise XOR of the vector v with successive v i s for which f k v i ˆ For generating patterns of string length n and k-bit contiguous subspace, one can follow the same method; starting with the all-zero vector, already existing binary patterns are inverted employing successive characteristic functions The number of k-bit contiguous subspaces is n k and some of them will overlap So, the inversion vector should be product of respective characteristic functions; this is defined as inversion mask for generating test vectors (length ˆ n) of k-bit contiguous subspaces, and is denoted by

IEEE TRANSACTIONS ON COMPUTERS, VOL, NO, FEBRUARY 9 Fig Structure of the inversion masks m n k x x x n ˆ n k iˆ f k x x i k : Test patterns can be generated by inverting with each of the so-far generated test vectors of k -bit contiguous subspaces Theorem Given the characteristic function f p, any corresponding inversion mask features s on bit position i which satisfy the relation p ^ i ˆ p [] The resultant structures of the inversion masks are shown in Fig Starting with the all-zero test pattern vector v, the successive test patterns can be recursively generated as follows: 3 CELLULAR AUTOMATA CHARACTERISTICS Cellular Automata (CA) consists of a number of interconnected cells arranged spatially in a regular manner [], [] Here, we consider simple -state per cell 3-neighborhood CA with cells arrayed linearly in one dimension The output q i of the ith cell depends on itself and its left and right neighbor at the most, given by q i t ˆf q i t ;q i t ;q i t

8 IEEE TRANSACTIONS ON COMPUTERS, VOL, NO, FEBRUARY Fig 3 Mask patterns generated by CA for n ˆ 8, denotes inversion Function f is XOR function for linear CA If the next state function of a cell is expressed in the form of a truth table, then the decimal equivalent of the output column in the truth table is conventionally called the rule number for the cell [] Upon minimization, the truth tables for rules and result in the following logic functions: rule : q i t ˆq i t q i t left & self dependencyš rule : q i t ˆq i t self dependencyš: In total, there are seven (, 9,,,,, ) linear rules with XOR logic [3] If f t is the column vector representing the state of the automata at the tth instant of time, then next state for a linear CA is f t ˆ T f t, where T is the characteristic matrix of the CA;

IEEE TRANSACTIONS ON COMPUTERS, VOL, NO, FEBRUARY 8 Fig A -cell - CA: (a) structure, (b) characteristic matrix, (c) state-transition graph T i; j ˆ iff output of the ith cell depends on the jth cell and zero otherwise A CA is called a Group CA if its characteristic matrix T is nonsingular State transition graph of such a CA (as shown in Fig ) consists of a set of cycles If T is singular, then the CA is called Nongroup CA State transition graph of such a CA contains some tree-like structures, apart from the cycles Theory and many applications of Additive Cellular Automata have been presented in [] Group CA has been extensively studied in [9], [3], [], [], [], [8] Many applications have also been reportedðpseudorandom [3] and pseudoexhaustive pattern generation [9], signature analysis [], [9], delay-fault testing [], error-correcting codes [], [], cryptography [3], and synthesis of testable FSM [] In the following section, we enumerate the properties of CA that enables it to generate the mask patterns 3 CA Characteristics for Mask Generation Let us consider an unrestricted neighborhood linear CA of characteristic matrix T c, where the lower triangle has all s and upper triangle all zeros as shown below 3 : Then, starting with an input string of all s, such a CA will directly generate the successive mask patterns, as shown in Fig 3 However, for the n-bit test vector string, this will require n = XOR gates with inputs (fan in) up to n Interestingly, the inverse of this CA, with characteristic matrix T x ˆ Tc is restricted within the 3-neighborhood and requires only -input XOR-gates T x ˆ T c 3 ˆ 3 ˆ : This CA can be realized with - structure having the first cell governed by rule and the rest by rule ; Fig shows such a four-cell CA with its characteristic matrix and transition graph The following theorems and lemmas give the characterization and prove that this CA will generate mask patterns in reverse order Lemma If T is the characteristic matrix of an n-cell - CA, then the jth row (j ˆ ; ; 3; ;n)oft i i ˆ ; ; ;n will have at columns j and j i only Proof The characteristic matrix of a - CA is:

8 IEEE TRANSACTIONS ON COMPUTERS, VOL, NO, FEBRUARY Fig Pseudoexhaustive pattern generation in contiguous p-bit spaces 3 3 T ˆ ˆ 3 ˆ I nn T : Hence, T ˆ I T ˆ I T i Let T ˆ I T i be valid for some i Now, T i ˆ T i T i ˆ IT i i i IT ˆIT Thus, by induction, T m ˆ IT m, for all m> From the construction of T, it follows immediately that, in T k, the jth row will have a at column j k only All the remaining entries are zero Hence, in T i, the jth row will have at column j i only On XORing with the identity matrix, we will have another at the jth column Hence, the proof tu Theorem The period of an n-cell - CA is m such that m <n< m Proof As per Lemma, T m ˆ IT m Since m n, T m ˆ So, T m ˆ I Thus, the period of T is at most m To show the period is no less than m, let us assume the contrary, that is, the period of T is k, where k<m Now, T k ˆ I T k ˆ IT k In each multiplication of the T matrix, the lower diagonal gets shifted further lower by -position Hence, it requires at least n such steps for T n to be Since k<m, T k cannot be the all zero matrix Thus, T ˆ I Hence, a contradiction tu Since the period of the CA is m, the cycle-lengths are factors of m only [] The next theorem finds the length of the cycle on which the state < ::: > lies The states on this cycle generate the masks patterns Theorem 3 In the state-transition graph of an n-cell - CA, the state < ::: > lies on a cycle of length m such that m <n< m Proof From Theorem, the state < ::: > can lie on a cycle of length at most m (since the period of CA is m ) If possible, let the state lie on a cycle of length l, where l<m Then, 3 3 3 T l l ˆ IT ˆ : Multiplication with indentity matrix results in a column vector with first row ªº and the rest all s As proven before, matrix T l will have a ªº at the first column of the l th row On its multiplication, a column vector will result with ªº in the l th row, with the rest of the entries all s So, xoring of these two cannot result in a zero column vector Hence, a contradiction tu The next theorem establishes the capability of the - CA to generate the masks for the recursive pseudoexhaustive pattern generation

IEEE TRANSACTIONS ON COMPUTERS, VOL, NO, FEBRUARY 83 TABLE CA-Based RPE Test Pattern Generation (p ˆ, k ˆ ) Theorem An n-cell - CA seeded with < ::::: > as initial pattern generates the ith mask pattern in the m i th cycle, where m <n< m Proof Let T be the characteristic matrix of the CA, then, as shown in Lemma, it can be decomposed into two matrices I and T For any i, if its binary expression is b k b k b b, where, for all js, b j f; g; let S denote the set consisting of all nonzero b j sof the expression Then, T i ˆ IT i ˆ IT bkk IT bk k IT b : For any k, if b k ˆ, then IT bkk ˆ I, else if b k ˆ, then IT bkk ˆ IT k ˆ IT k Hence, IT k can be replacd by Ib k T k So, T i ˆ I b k T k I b k T k I b T I b T ˆ I b T b T b b T b T b b T b b T b b b T b k T k : 3 In (3), T l will be present iff S l S i Since m <n< m,so the binary expression of n-bit CA requires m number of bits to represent all the states of the CA lying on this cycle; so, if (3) of T i contains T l, then S l S i, ie, l ^ m i ˆ m i Now, with reference to Fig, if we generate the masks in reverse order, starting from the vector < >, then

8 IEEE TRANSACTIONS ON COMPUTERS, VOL, NO, FEBRUARY TABLE 3 Comparision of Overhead in XOR Gates 3 T l ˆ I b T b T b b T b T b b T 3 b b T b b b T b k T k : From the construction of T, it immediately follows that, in T k, the jth row will have ªº at the column j k only; the rest entries are all zeros So, T k: :::Št will have ªº only in the kth bit of the resultant column, all the rest of the entries are zeros Hence, on xoring the columns of (), we get the resultant column vector in which all such lth rows will be ªº and the rest are zeros, where S l S i (that is, iff T l is present in the expression of T i ) So, T i ::Š t will generate a mask vector which will have ªº in all such lth bits, where l ^ m i ˆ m i, with the rest of the entries zero Referring to Theorem and Fig, we see that this is precisely the ith mask pattern (filled dots are considered ªº and the others zero) Hence, the proof tu CABASED IMPLEMENTATION SCHEME The basic scheme of CA based RPE pattern generation for p-bit contiguous case is shown in Fig The length of pattern vector and, hence, the number of CA cells is n, where p <k p and n k Here, CA generates the masks, Counter/shifter keeps the number of test patterns (ˆ k) to be generated, Register outputs the test patterns sequentially The hardware generates the RPE test patterns as per the set of steps described by the following scheme: Initialize Counter to zeros While k patterns are not generated do steps 3 through 9 3 Initialize CA to < ::: > vector, Register to zero Increment Counter/Shifter by Do steps to 8 while CA has not run p cycles Shift left the Counter If load = ªº then Register Register CA content 8 Send a clock pulse to CA

IEEE TRANSACTIONS ON COMPUTERS, VOL, NO, FEBRUARY 8 9 Output test pattern from the Register End An example of pattern generation as per the aforesaid scheme is given in Table Each pattern will be generated after p clock cycles It is optimal in the sense that it covers exhaustively every block of p adjacent bits in the first p pattern vectors This scheme uses a modular cascadable CA with only local interconnections between the cells for parallel generation of test vectors The registers can be realized using data path registers of the computer and does not require any additional cost; the actual overhead is only the number of extra XOR gates present in CA based scheme This, for a p cell CA, will require p plus k XOR gates, that is, p XOR gates Table 3 gives a comparison of hardware overhead in this approach and that in [], for parallel generation of test vectors Comparatively, the CAbased scheme requires to percent less XOR gates than the scheme in [] as test string length increases from to 3 CONCLUSIONS The method proposed in this paper uses Cellular Automata to generate recursive pseudoexhaustive test patterns The proposed CA-based RPE hardware is very useful for built-in self-test of classes of circuits such as digital signal processing systems, datapath architecture, and embedded memories The modular, regular, and cascadable structure of CA makes it highly suitable for VLSI implementation The hardware requirement of the proposed scheme is to percent less compared to the existing reported methods [] and time complexity of generation is linear with respect to test vector set size REFERENCES [] EJ McClusky, ªVerification TestingÐA Pseudoexhaustive Test Technique,º IEEE Trans Computers, vol 33, no, pp -, June 98 [] D Tang and L Woo, ªExhaustive Test Pattern Generation with Constant Weight Vector,º IEEE Trans Computers, vol 3, no, pp -, Dec 983 [3] L Wang and E McClusky, ªCondensed Linear Feedback Shift Register (LFSR) TestingÐA Pseudo-Exhaustive Test Technique,º IEEE Trans Computers, vol 3, no, pp 3-3, Apr 98 [] D Wang and C Chen, ªLogic Test Pattern Generation Using Linear Codes,º IEEE Trans Computers, vol 33, no 9, pp 8-8, Sept 98 [] L Wang and E McClusky, ªCircuits for Pseudo-Exhaustive Test Pattern Generation,º IEEE Trans Computer-Aided Design, vol, pp 8-8, Oct 988 [] D Wang and C Chen, ªIterative Exhaustive Pattern Generation for Logic Testing,º IBM J Research Development, vol 8, pp -9, Mar 98 [] C Chen, ªExhaustive Test Pattern Generation Using Cyclic Codes,º IEEE Trans Computers, vol 3, no, pp -8, Feb 988 [8] Z Barzilai, D Copersmith, and A Rosenburg, ªExhaustive Generation of Bit Patterns with Application to VLSI Testing,º IEEE Trans Computers, vol 3, no, pp 9-9, Feb 983 [9] AK Das and PP Chaudhuri, ªVector Space Theoretic Analysis of Additive Cellular Automata and Its Applications for Pseudo-Exhaustive Test Pattern Generation,º IEEE Trans Computers, vol, no 3, pp 3-3, Mar 993 [] J Rajski and J Tyszer, ªRecursive Pseudo-Exhaustive Test Pattern Generation,º IEEE Trans Computers, vol, no, pp -, Dec 993 [] JV Neuman, The Theory of Self-Reproducing Automata, AW Burks, ed Urbana, Ill and London: Univ of Illinois Press, 9 [] S Wolfram, ªStatistical Mechanics of Cellular Automata,º Review of Modern Physics, vol, pp -, July 983 [3] PD Hortensius et al, ªCellular Automata Based Pseudo-Random Number Generators for Built-In Self-Test,º IEEE Trans Computer-Aided Design, vol 8, pp 8-89, Aug 989 [] PP Chaudhuri, DR Chowdhury, S Nandi, and S Chattopadhyay, Additive Cellular Automata Theory and Applications: Volume IEEE CS Press, 99 [] PD Hortensius, HC Card, RD McLeod, and W Pries, ªImportance Sampling for Ising Computers Using One-Dimensional Cellular Automata,º IEEE Trans Computers, vol 38, no, pp 9-, June 989 [] PD Hortensius et al, ªCellular Automata Circuits for Built-In Self Test,º IBM J Research and Development, vol 3, March/May 99 [] PD Hortensius, RD McLeod, and HC Card, ªCellular Automata Based Signature Analysis for Built-In Self-Test,º IEEE Trans Computers, vol 39, no, pp 3-83, Oct 99 [8] O Martin, AM Odlyzko, and S Wolfram, ªAlgebraic Properties of Cellular Automata,º Comm Math Physics, vol 93, pp 9-8, 98 [9] M Serra, T Slater, JC Muzio, and DM Miller, ªAnalysis of One Dimensional Cellular Automata and Their Aliasing Probabilities,º IEEE Trans Computer-Aided Design, vol 9, pp -8, July 99 [] S Nandi, B Vamsi, S Chakraborty, S Roy, and PP Chaudhuri, ªDelay Fault Test Generation with Cellular Automata,º Proc Sixth Int'l Conf VLSI Design, pp 8-8, Jan 993 [] DR Chowdhury, S Basu, IS Gupta, and PP Chaudhuri, ªDesign of CAECCÐCellular Automata Based Error Correcting Code,º IEEE Trans Computers, vol 3, no, pp 9-, June 99 [] K Sasidhar, S Chattopadhyay, and PP Chaudhuri, ªCAA Decoder for Cellular Automata Based Byte Error Correcting Code,º IEEE Trans Computers, vol, no 9, pp 3-, Sept 99 [3] S Nandi, B K Kar, and PP Chaudhuri, ªTheory and Application of Cellular Automata in Cryptography,º IEEE Trans Computers, vol 3, no, Dec 99 [] D Chowdhury, S Chakraborty, B Vamsi, and P Chaudhuri, ªCellular- Automata Based Synthesis of Easily and Fully Testable FSMs,º Proc Int'l Conf Computer-Aided Design '93, pp -3, Nov 993