Browsing by Author "Tyavlovsky, A."
Now showing items 1-4 of 4
-
A parallel virtual instrumentation framework for improving diagnostic efficiency in bed-of-nails testers
Chamunorwa, T.; Musiiwa, P. B.; Zvavashe, T.; Rushambwa, M. C.; Tyavlovsky, A.; Svistun, A. I. (БНТУ, 2025)Conventional sequential PCB testers are inefficient, as a single failure halts all subsequent tests, leading to incomplete diagnostic data and delayed fault isolation. This study proposes a parallel virtual instrumentation framework in LabVIEW to overcome these limitations. By leveraging asynchronous execution, the framework runs multiple independent tests concurrently, continuing ...2026-01-14 -
An investigation into the power-performance trade-off in memristor-augmented sense amplifiers for nanoscale SRAM
Musiiwa, P. B.; Rushambwa, M. C.; Gwamuri, J.; Kanhukamwe, Q. C.; Tyavlovsky, A.; Svistun, A. I. (БНТУ, 2025)As technology ramps up to high nodes, SRAM sense amplifiers struggle suffer from increasing static power. The paper proposes memristors as non-volatile, tunable loads in cross-coupled differential sense amplifiers as a remedy. Simulation in a 45 nm node reveals 69.2 % leakage power reduction, making the solution appealing for low-power usage. The static power reduction comes at ...2026-01-14 -
Research and education opportunities in partnership between Harare Institute of Technology and BNTU
Musiiwa, P.; Tyavlovsky, A.; Zizhou, C. (Интегралполиграф, 2024)The current state of education and research and development (R&D) work in Harare Institute of Tech-nology (HIT) is briefly reviewed, as well as opportunities in partnership between HIT and Belarussian National Technical University (BNTU). The proposed roadmap of cooperation between HIT and BNTU includes corre-spondence training of HIT teachers in the postgraduate program of the ...2025-02-05 -
The silicon shield: a synergistic, hardware-anchored architecture for next-generation cyber resilience
Musiiwa, P. B.; Rushambwa, M. C.; Gwamuri, J.; Kanhukamwe, Q. C.; Tyavlovsky, A.; Svistun, A. I. (БНТУ, 2025)The escalating sophistication of cyber threats, which now routinely target the hardware layer, has rendered traditional software-only security models insufficient.1 This paper challenges the long-held assumption that hardware constitutes an inherently trusted foundation, a premise invalidated by the rise of physical, side-channel, and supply chain attacks. It introduces the ...2026-01-14



