Enabling Edge Computing Using Emerging Memory Technologies: From Device to Architecture

Arman Roohi, Shaahin Angizi, Deliang Fan

Research output: Chapter in Book/Report/Conference proceedingChapter


This book chapter describes, explores, and analyzes the designs and framework for energy-efficient and reliable edge computing from device to architecture to handle and compute data-intensive tasks and applications. First, we present a comprehensive study regarding magnetic random-access memory (MRAM) as a promising nonvolatile memory component due to its interesting features, including nonvolatility, near-zero standby power, high integration density, and radiation hardness. To enable efficient and reliable computing units, optimized in-memory processing accelerators for data and compute-intensive tasks via algorithm and hardware codesign approaches are discussed. Moreover, two other high attention topics, namely, normally off computing and hardware security, are examined. Thus, two design methodologies are introduced to mitigate MRAM write energy cost while provided benefits are efficiently utilized. The first design methodology approach, referred to as NV-clustering, is developed to realize middleware-transparent intermittent computing. The foundations of our work are advanced from the ground up by extending this emerging MRAM device to discover logic-in-memory methods that leverage intrinsic nonvolatility to realize intermittent robust computation. Then power analysis-resilient circuit (PARC) procedure as an extension of NV-clustering is developed as a power-masked synthesis technique in the presence of power analysis attacks.

Original languageEnglish (US)
Title of host publicationFrontiers of Quality Electronic Design (QED)
Subtitle of host publicationAI, IoT and Hardware Security
PublisherSpringer International Publishing
Number of pages50
ISBN (Electronic)9783031163449
ISBN (Print)9783031163432
StatePublished - Jan 1 2023

All Science Journal Classification (ASJC) codes

  • General Engineering


  • Hardware security
  • In-memory processing
  • Magnetic random-access memory
  • Normally off computing


Dive into the research topics of 'Enabling Edge Computing Using Emerging Memory Technologies: From Device to Architecture'. Together they form a unique fingerprint.

Cite this