The application features of the Via-in-Pad method when implementing a high-density conductive pattern of multilayer switching structures in electronics is considered herein. The composition method for vias and contact pads for the tracing ability improvement is proposed, and the assessment methodology for the effective area utilization for BGA components is presented. The experimental study of the pressure sensor housing was carried out, which showed that the application of this method made it possible to reduce the number of vias by 40% and place more contact pads per unit area, which frees up the gaps for BGA tracing, reduces the pattern density and microwave signal paths. The obtained results confirmed the possibility of reduction of the usable space by 25%, which makes it possible to arrange more pads per unit area, to free up the gaps for BGA tracing, to reduce the time for drilling the workpieces, to reduce the number of used drills, and also provides the best heat removal from the components. The disadvantage is the large internal resistance of the transitions created by the Via-in-Pad method, in contrast to the standard ones, which can negatively affect the flow of critical signals. By comparing the resistances from the metallization layer of the via in the MPCB with a flexible flat cable and in the MPCB designed using the Via-in-Pad method, it was found that the Via-in-Pad method made it possible to increase the layout efficiency of multilayer printed circuit boards.
Currently in the development of computer technologies that ensure information security and information protection, cryptographic methods of protection are widely used. The main tasks in cryptography are the development of new encryption features, difficult to break and repetitive ciphers. To solve that problem, falling into the class of NP-complete ones, algorithms based on natural principles have been used in recent years. These include genetic algorithms (GA), evolutionary methods, swarm intelligence algorithms. In models and algorithms of evolutionary computations, the construction of basic models and rules is implemented, according to which it can change (evolve). In recent years, evolutionary computing schemes have been proposed, including the genetic algorithm, genetic programming, evolutionary programming, and evolutionary strategies. The paper discusses the existing cryptography methods, basic concepts and methods of modern cryptography, the notion of a genetic algorithm, a universal hash function, as well as a hash detection method and a genetic hashing algorithm built on it. A genetic algorithm was implemented in the Golang language, modified for the current problem of finding the optimal hash functions. A detailed description of each stage of the algorithm execution is given. Also, within the framework of the research, a study of the function of the genetic algorithm itself and the genetic hashing algorithm was carried out, evaluating the convergence of the genetic algorithm depending on the input data, and evaluating the possible direction of further research.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.