SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Advance Engineering and Research
Development
Volume 2,Issue 9, September -2015
@IJAERD-2015, All rights Reserved 104
Scientific Journal of Impact Factor(SJIF): 3.134
e-ISSN(O): 2348-4470
p-ISSN(P): 2348-6406
SYSTEMATIC ERROR CODES IMPLIMENTATION FOR MATCHED DATA
ENCODED
B.YSAWANTH KUMAR (1),
L.S.DEVARAJ (2)
(1)
PG Scholar, VLSI System Design, Intellectual Institute Of Technology, AP, India
(2)
Assistant Professor, Intellectual Institute Of Technology, AP, India
ABSTRACT: In current scenario, there are situations in a computing system where incoming information needs to be
compared with a piece of stored data to locate the matching entry, e.g., cache tag array lookup and translation look-aside
buffer matching. In this paper, a new architecture to reduce complexity and latency for matching the data protected with an
error-correcting code (ECC).It is based on the fact that the code word of an ECC generated by encoding is usually
represented in a systematic form, and it consists of the raw data and the parity information. The proposed architecture
parallelizes the comparison of the data and that of the parity information. To further reduce the latency and complexity, in
addition, a modified butterfly formed weight accumulator (BWA) is proposed for the efficient computation of the Hamming
distance. The proposed architecture examines whether the incoming data matches the stored data if a certain number of
erroneous bits are correct.
KEYWORDS: Error correcting code (ECC), Butterfly Formed Weight accumulator (BWA), Data comparison, hamming
distance, systematic codes.
I. INTRODUCTION
Data comparison circuit is a logic that has many applications in a computing system. For example, to check Whether a piece
of information is in a cache, the address of the information in the memory is compared to all cache tags in the same set that
might contain that address. Another place that uses a data comparison circuit is in the translation look asidebuffer (TLB) unit.
TLB is used to speed up virtual to physical address translation. Because of such prevalence, it is important to implement the
comparison circuit with low hardware complexity. Besides, the data comparison usually resides in the critical path of the
components that are devised to increase the systemperformance, e.g., caches and TLBs, whose outputs determine the flow of
the succeeding operations in a pipeline. The circuit, therefore, must be designed to have as low latency as possible, or the
components will be disqualified from serving as accelerators and the overall performance of the whole system would be
severely deteriorated.
Error correcting codes (ECCs) are widely used in modern microprocessors to enhance the reliability and data
integrity of their memory structures. For example, caches on modern microprocessors are protected by ECC.If a memory
structure is protected with ECC, a piece of data is encoded first and the entire code word including the ECC check bits are
written into the memory array. When the input data is loaded into the system, it has to be encoded and compared with the
data stored in the memory and corrected if errors are detected to obtain the original data.
II. PREVIOUS WORKS
2.1 Decode-And-Compare Architecture
This section describes the conventional decode-and-compare architecture based on the direct compare method. Let
us consider a cache memory where a k-bit tag is stored in the form of an n-bit code word after being encoded by a (n, k)code.
In the decode-and compare architecture, the n-bit retrieved code word should first be decoded to extract the original Kbittag.
The extracted k-bit tag is then compared with the k-bit tag field of an incoming address to determine whether the tags are
matched or not. As the retrieved code word should go through the decoder before being compared with the incoming tag, the
critical path is too long to be employed in a practical cache system designed for high speed access. Figure(1) is shown in
below.
2.2 Direct Compare Method
International Journal of Advance Engineering and Research Development (IJAERD)
Volume 2,Issue 9, September -2015, e-ISSN: 2348 - 4470 , print-ISSN:2348-6406
@IJAERD-2015, All rights Reserved 105
Direct compare method is one of the most recent solutions for the matching problem. The direct Comparemethod encodes the
incoming data and then compares it with the retrieved data that has been encoded as well. Therefore, the method eliminates
the complex decoding from the critical path. In the direct compare method, which encodes the incoming data and then
compares it with the retrieved data that has been encoded as well? Therefore, the method eliminates the complex decoding
from the critical path. As the checking necessitates an additional circuit to compute the Hamming distance use a saturating
adder. SA-based approach is the one where a special counter is constructed with an additional` building block called
saturating adder (SA).The SA-based direct compare architecture reduces the latency and hardware complexity by resolving
the aforementioned drawbacks.
Fig: (1) Decode And Compare Method, (2) Direct Compare Method
III. PROPOSED ARCHITECTURE
This section presents a new architecture that can reduce the latency and complexity of the data comparison by using
the characteristics of systematic codes. In this proposed structure consist of retrieved codeword and incoming tag are
combined and given to the xor bank. Xor bank represents the array of bit-wise comparators (exclusive OR gates). It performs
XOR operations for every pair of bits in X and Y so as to generate a vector representing the bitwise difference of the two
codewords. The output from the XOR bank is then fed into BWA consisting of half adders (HAs ). The numbers of 1’s are
accumulated by passing the value through the BWA.The proposed architecture grounded on the data path design is given
below. It contains multiple butterfly formed weight accumulators (BWAs) proposed to improve the latency and complexity
of the Hamming distance computation. The basic function of the BWA is to count the number of 1’s among its input bits.
International Journal of Advance Engineering and Research Development (IJAERD)
Volume 2,Issue 9, September -2015, e-ISSN: 2348 - 4470 , print-ISSN:2348-6406
@IJAERD-2015, All rights Reserved 106
Fig 3: Proposed data path design
The proposed architecture consists of multiple stages of HAs as shown in figure where each output bit of a HA is associated
with a weight. The HAs in a stage are connected in a butterfly form so as to accumulate the carry bits and the sum bits of the
upper stage separately. In other words, both inputs of a HA in a stage, except the first stage, are either carry bits or sum bits
computed in the upper stage. This connection method leads to a property that if an output bit of a HA is set, the number of 1’s
among the bits in the paths reaching the HA is equal to the weight of the output bit. In the below figure for example, if the
carry bit of the gray-colored HA is set, the number of 1’s among the associated input bits, i.e., A, B, C, and D, is 2. At the last
stage of above figure the number of 1’s among the input bits, d, can be calculated as eq. (1)
D=8I+4(J+K+M) +2(L+N+O) +P eq. (1)
Since what we need is not the precise Hamming distance but the range it belongs to, it is possible to simplify the circuit.
When r max = 1, for example, two or more than two 1’s among the input bits can be regarded as the same case that falls in
the fourth range. In that case, we can replace several HAs with a simple OR-gate tree as shown below. This is an advantage
over the SA that resorts to the compulsory saturation.
Each XOR stage generates the bitwise difference vector for either data bits or parity bits, and the following processing
elements count the number of 1’s in the vector, i.e., the Hamming distance. Each BWA at the first level is in the revised form
shown in figure above, and generates an output from the OR-gate tree and several weight bits from the HA trees. In the
International Journal of Advance Engineering and Research Development (IJAERD)
Volume 2,Issue 9, September -2015, e-ISSN: 2348 - 4470 , print-ISSN:2348-6406
@IJAERD-2015, All rights Reserved 107
interconnection, such outputs are fed into their associated processing elements at the second level. The output of the OR-gate
tree is connected to the subsequent OR-gate tree at the second level, and the remaining weight bits are connected to the
second level BWAs according to their weights. A simple (8, 4) single-error correction double-error detection code is
considered and the corresponding first and second level circuits are shown below.
Fig:5 First and secondlevel circuits for (8,4) code
Taking the outputs of the preceding circuits (BWA), the decision unit finally determines the incoming tag matches The
retrieved codeword by considering the four ranges of the Hamming distance. The decision unit is in fact a combinational
logic of which functionality is specified by a truth table that takes the outputs of the preceding circuits as inputs. For the (8,
4) code that the corresponding first and second level circuits are given above, the truth table for the decision unit is described
in Table 1.
Table:1Truth Table Of The Decision Unit
The proposed BWA is developed with the help of modified XOR gate (XORM) and modified half adder (HAM).XORM has
1 gate less than the conventional XOR gate of 5 gates (AND-OR-NOT implementation) as in Fig.5. HAM has 2gates less
than the conventional half adder as shown in Fig.6. As the number of gates reducein the basic building blocks of the proposed
BWA area is also reduced. The block diagram representation of modified BWA is sown in Fig:7
International Journal of Advance Engineering and Research Development (IJAERD)
Volume 2,Issue 9, September -2015, e-ISSN: 2348 - 4470 , print-ISSN:2348-6406
@IJAERD-2015, All rights Reserved 108
Fig 7: Block Diagram Representation of Modified BWA
IV. EVALUATION
The proposed algorithm is coded in Verilog and simulated using Xilinx ISE 9.2isimulator and. The results obtained are
Fig 8: simulation result of 8bit the of error-correcting codes
International Journal of Advance Engineering and Research Development (IJAERD)
Volume 2,Issue 9, September -2015, e-ISSN: 2348 - 4470 , print-ISSN:2348-6406
@IJAERD-2015, All rights Reserved 109
V. CONCLUSIONAND FUTURE WORK
A new architecture has been presented for matching the data protected with an ECC to reduce the complexity and
delay. The proposed architecture examines whether the incoming data matches the stored data if a certain number of
erroneous bits are corrected. To reduce the latency, the comparison of the data is parallelized with the encoding process that
generates the parity information. An efficient processing architecture has been presented to further minimize the latency and
complexity. The experimental results show that the efficiency of the proposed method. As the proposed architecture is
effective in reducing the latency as well as the complexity considerably, it can be regarded as a promising solution for the
comparison of ECCprotected data. In the proposed architecture we deduct and correct single error and deduct double error in
future Error correction of double adjacent errors will be included and compared its performance.
REFERENCES
[1]Byeong Yong Kong, Jihyuck Jo, Hyewon Jeong, Mina Hwang,Soyoung Cha, Bongjin Kim, and In -Cheol Park, “Low-
Complexity Low-Latency Architecture for Matching of DataEncoded With Hard Systematic Error-Correcting Codes”,
IEEEtransactions on very large scale integration (VLSI) systems, vol.22, no. 7, July 2014.
[2] W. Wu, D. Somasekhar, and S.-L. Lu, “Direct compare ofinformation coded with error correcting codes,” IEEE Trans.
VeryLarge Scale Integr. (VLSI) Syst., vol. 20, no. 11, pp. 2147–2151,Nov. 2012
[3] J. D. Warnock, Y.-H. Chan, S. M. Carey, H. Wen, P. J. Meaney, G. Gerwig, H. H. Smith, Y. H. Chan, J.Davis, P. Bunce,
A. Pelella, D. Rodko, P. Patel, T. Strach, D. Malone, F. Malgioglio, J. Neves, D. L. Rude,and W. V. Huott “Circuit and
physical design implementation of the microprocessor chip for the Enterprisesystem,” IEEE J. Solid -State Circuits, vol. 47,
no. 1, pp. 151–163, Jan. 2012.
[4]AMD Inc., Sunnyvale, CA, “Family 10h AMD Opteron™ Processor Product Data Sheet,” PID: 40036 Rev:
3.04,2010.Available:http://support.amd.com/us/Processor_TechDocs/40036.pdf .
[5] G. Li, I. J. Fair, and W. A. Krzymien, “Low-density parity-check codes for space-time wireless transmission,” IEEE
Trans. Wirel. Commun., vol.5, no. 2, pp. 312–322, Feb. 2006.
[6] Costin Anghel, Benoit Bakeroot, Yogesh S. Chauhan, Renaud Gillon,Christian Maier, Peter Moens, Jan Doutreloigne and
Adrian Mihaim Ionescu “New Method for Threshold Voltage Extraction of High-Voltage MOSFETs Based on Gate-to-Drain
CapacitanceMeasurement” ,IEEE Electron device letters,vol 27,no.7,july 2006
ACKNOWLEDGMENT
FIRST AUTHOR: B.Ysawanth Kumar received the B.Tech degree in Electronics and Communication Engineering in the
year 2012 and pursuing M.Tech degree in VLSI System design from Intellectual institute of technology. Area of interests
includes Communication and VLSI Design
SECOND AUTHOR: L.S.Devaraj received the B.Tech degree in Electronics and Communication Engineering and M.Tech
degree in VLSI. Currently, She is working as Assistant Professor in the Department of Electronics and Communication
Engineering, Intellectual institute of technology, Ananthapuramu.Having three years of teaching experience. Area of interest
includes VLSI design, vhdl and Verilog.

More Related Content

What's hot

DESIGN AND VHDL IMPLEMENTATION OF 64-POINT FFT USING TWO STRUCTURE 8-POINT FF...
DESIGN AND VHDL IMPLEMENTATION OF 64-POINT FFT USING TWO STRUCTURE 8-POINT FF...DESIGN AND VHDL IMPLEMENTATION OF 64-POINT FFT USING TWO STRUCTURE 8-POINT FF...
DESIGN AND VHDL IMPLEMENTATION OF 64-POINT FFT USING TWO STRUCTURE 8-POINT FF...Journal For Research
 
Addressing mode
Addressing modeAddressing mode
Addressing modeilakkiya
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job SolutionBTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job SolutionEngr. Md. Jamal Uddin Rayhan
 
Implementation and Design of AES S-Box on FPGA
Implementation and Design of AES S-Box on FPGAImplementation and Design of AES S-Box on FPGA
Implementation and Design of AES S-Box on FPGAIJRES Journal
 
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...ijsrd.com
 
1327 Addressing Modes Of 8086
1327 Addressing Modes Of 80861327 Addressing Modes Of 8086
1327 Addressing Modes Of 8086techbed
 
DOUBLE PRECISION FLOATING POINT CORE IN VERILOG
DOUBLE PRECISION FLOATING POINT CORE IN VERILOGDOUBLE PRECISION FLOATING POINT CORE IN VERILOG
DOUBLE PRECISION FLOATING POINT CORE IN VERILOGIJCI JOURNAL
 
Instruction Set and Assembly Language Programming
Instruction Set and Assembly Language ProgrammingInstruction Set and Assembly Language Programming
Instruction Set and Assembly Language ProgrammingBrenda Debra
 
High Speed Area Efficient 8-point FFT using Vedic Multiplier
High Speed Area Efficient 8-point FFT using Vedic MultiplierHigh Speed Area Efficient 8-point FFT using Vedic Multiplier
High Speed Area Efficient 8-point FFT using Vedic MultiplierIJERA Editor
 
Combating Bit Losses in Computer Networks using Modified Luby Transform Code
Combating Bit Losses in Computer Networks using Modified Luby Transform CodeCombating Bit Losses in Computer Networks using Modified Luby Transform Code
Combating Bit Losses in Computer Networks using Modified Luby Transform CodeIJMER
 
New primitives of controlled elements F 2/4 for block ciphers
New primitives of controlled elements F 2/4 for block ciphers New primitives of controlled elements F 2/4 for block ciphers
New primitives of controlled elements F 2/4 for block ciphers IJECEIAES
 

What's hot (20)

DESIGN AND VHDL IMPLEMENTATION OF 64-POINT FFT USING TWO STRUCTURE 8-POINT FF...
DESIGN AND VHDL IMPLEMENTATION OF 64-POINT FFT USING TWO STRUCTURE 8-POINT FF...DESIGN AND VHDL IMPLEMENTATION OF 64-POINT FFT USING TWO STRUCTURE 8-POINT FF...
DESIGN AND VHDL IMPLEMENTATION OF 64-POINT FFT USING TWO STRUCTURE 8-POINT FF...
 
Gn3311521155
Gn3311521155Gn3311521155
Gn3311521155
 
Addressing modes
Addressing modesAddressing modes
Addressing modes
 
Addressing mode
Addressing modeAddressing mode
Addressing mode
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job SolutionBTCL Assistant Manager Previous Year Question by Stack IT Job Solution
BTCL Assistant Manager Previous Year Question by Stack IT Job Solution
 
Implementation and Design of AES S-Box on FPGA
Implementation and Design of AES S-Box on FPGAImplementation and Design of AES S-Box on FPGA
Implementation and Design of AES S-Box on FPGA
 
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
 
Cao
CaoCao
Cao
 
Research Paper
Research PaperResearch Paper
Research Paper
 
1327 Addressing Modes Of 8086
1327 Addressing Modes Of 80861327 Addressing Modes Of 8086
1327 Addressing Modes Of 8086
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
3. adressingmodes1
3. adressingmodes13. adressingmodes1
3. adressingmodes1
 
DOUBLE PRECISION FLOATING POINT CORE IN VERILOG
DOUBLE PRECISION FLOATING POINT CORE IN VERILOGDOUBLE PRECISION FLOATING POINT CORE IN VERILOG
DOUBLE PRECISION FLOATING POINT CORE IN VERILOG
 
Instruction Set and Assembly Language Programming
Instruction Set and Assembly Language ProgrammingInstruction Set and Assembly Language Programming
Instruction Set and Assembly Language Programming
 
High Speed Area Efficient 8-point FFT using Vedic Multiplier
High Speed Area Efficient 8-point FFT using Vedic MultiplierHigh Speed Area Efficient 8-point FFT using Vedic Multiplier
High Speed Area Efficient 8-point FFT using Vedic Multiplier
 
Combating Bit Losses in Computer Networks using Modified Luby Transform Code
Combating Bit Losses in Computer Networks using Modified Luby Transform CodeCombating Bit Losses in Computer Networks using Modified Luby Transform Code
Combating Bit Losses in Computer Networks using Modified Luby Transform Code
 
Bt export
Bt exportBt export
Bt export
 
8086 architecture By Er. Swapnil Kaware
8086 architecture By Er. Swapnil Kaware8086 architecture By Er. Swapnil Kaware
8086 architecture By Er. Swapnil Kaware
 
New primitives of controlled elements F 2/4 for block ciphers
New primitives of controlled elements F 2/4 for block ciphers New primitives of controlled elements F 2/4 for block ciphers
New primitives of controlled elements F 2/4 for block ciphers
 

Viewers also liked

Presentation1
Presentation1Presentation1
Presentation1razzor
 
Kendall Stroud's Portfolio
Kendall Stroud's PortfolioKendall Stroud's Portfolio
Kendall Stroud's PortfolioKendall Stroud
 
Poverty Project
Poverty ProjectPoverty Project
Poverty ProjectAndrew Soh
 
Lars 2016 A Texture Driven Approach for Visible Spectrum Fire Detection
Lars 2016 A Texture Driven Approach for Visible Spectrum Fire DetectionLars 2016 A Texture Driven Approach for Visible Spectrum Fire Detection
Lars 2016 A Texture Driven Approach for Visible Spectrum Fire DetectionCristiano Rafael Steffens
 
new business models waqas khichi 268 iub bwp pakistan
new business models waqas khichi 268 iub bwp pakistannew business models waqas khichi 268 iub bwp pakistan
new business models waqas khichi 268 iub bwp pakistanWaqas Khichi
 
Proyecto de innovación mentora Ana jimeno
Proyecto de innovación mentora Ana jimenoProyecto de innovación mentora Ana jimeno
Proyecto de innovación mentora Ana jimenoPaula Marcelo Martínez
 
Taller de SEO en Bogotá de Cristalab
Taller de SEO en Bogotá de CristalabTaller de SEO en Bogotá de Cristalab
Taller de SEO en Bogotá de CristalabJohn Freddy Vega
 
Арсенијевић Станко - БАКТЕРИЈЕ
Арсенијевић Станко - БАКТЕРИЈЕАрсенијевић Станко - БАКТЕРИЈЕ
Арсенијевић Станко - БАКТЕРИЈЕСузана Филиповић
 
La escritura, el_libro_y_las_bibliotecas_taller_# 1.
La escritura, el_libro_y_las_bibliotecas_taller_# 1.La escritura, el_libro_y_las_bibliotecas_taller_# 1.
La escritura, el_libro_y_las_bibliotecas_taller_# 1.YesidSosaTorres
 
Rare Books Collection at Washington University
Rare Books Collection at Washington UniversityRare Books Collection at Washington University
Rare Books Collection at Washington UniversityEliot Boden
 
Enteprise Manager 12c - Demo - DBaaS
Enteprise Manager 12c - Demo - DBaaSEnteprise Manager 12c - Demo - DBaaS
Enteprise Manager 12c - Demo - DBaaSJean-Philippe PINTE
 
Instagramで新規客を獲得してLINE@でリピートさせる方法(長崎県)諫早商工会議所チラシ
Instagramで新規客を獲得してLINE@でリピートさせる方法(長崎県)諫早商工会議所チラシInstagramで新規客を獲得してLINE@でリピートさせる方法(長崎県)諫早商工会議所チラシ
Instagramで新規客を獲得してLINE@でリピートさせる方法(長崎県)諫早商工会議所チラシ新潟コンサルタント横田秀珠
 
envoirment polution in hindi
envoirment polution in hindienvoirment polution in hindi
envoirment polution in hindiashok choudhary
 
How to Get Started with IFTTT (If This Then That)
How to Get Started with IFTTT (If This Then That)How to Get Started with IFTTT (If This Then That)
How to Get Started with IFTTT (If This Then That)Anna Marie Pineda
 
Fisiologia y conducta
Fisiologia y conductaFisiologia y conducta
Fisiologia y conductaElisa Kadrian
 
แผนการจัดการเรียนรู้ เรื่อง โภชนาการกับสุขภาพ
แผนการจัดการเรียนรู้ เรื่อง โภชนาการกับสุขภาพแผนการจัดการเรียนรู้ เรื่อง โภชนาการกับสุขภาพ
แผนการจัดการเรียนรู้ เรื่อง โภชนาการกับสุขภาพtassanee chaicharoen
 

Viewers also liked (20)

Presentation1
Presentation1Presentation1
Presentation1
 
Kendall Stroud's Portfolio
Kendall Stroud's PortfolioKendall Stroud's Portfolio
Kendall Stroud's Portfolio
 
Poverty Project
Poverty ProjectPoverty Project
Poverty Project
 
Lars 2016 A Texture Driven Approach for Visible Spectrum Fire Detection
Lars 2016 A Texture Driven Approach for Visible Spectrum Fire DetectionLars 2016 A Texture Driven Approach for Visible Spectrum Fire Detection
Lars 2016 A Texture Driven Approach for Visible Spectrum Fire Detection
 
new business models waqas khichi 268 iub bwp pakistan
new business models waqas khichi 268 iub bwp pakistannew business models waqas khichi 268 iub bwp pakistan
new business models waqas khichi 268 iub bwp pakistan
 
Proyecto de innovación mentora Ana jimeno
Proyecto de innovación mentora Ana jimenoProyecto de innovación mentora Ana jimeno
Proyecto de innovación mentora Ana jimeno
 
ISO/NISO
ISO/NISOISO/NISO
ISO/NISO
 
Taller de SEO en Bogotá de Cristalab
Taller de SEO en Bogotá de CristalabTaller de SEO en Bogotá de Cristalab
Taller de SEO en Bogotá de Cristalab
 
Арсенијевић Станко - БАКТЕРИЈЕ
Арсенијевић Станко - БАКТЕРИЈЕАрсенијевић Станко - БАКТЕРИЈЕ
Арсенијевић Станко - БАКТЕРИЈЕ
 
Gimnasia OlíMpica
Gimnasia OlíMpicaGimnasia OlíMpica
Gimnasia OlíMpica
 
La escritura, el_libro_y_las_bibliotecas_taller_# 1.
La escritura, el_libro_y_las_bibliotecas_taller_# 1.La escritura, el_libro_y_las_bibliotecas_taller_# 1.
La escritura, el_libro_y_las_bibliotecas_taller_# 1.
 
Rare Books Collection at Washington University
Rare Books Collection at Washington UniversityRare Books Collection at Washington University
Rare Books Collection at Washington University
 
Enteprise Manager 12c - Demo - DBaaS
Enteprise Manager 12c - Demo - DBaaSEnteprise Manager 12c - Demo - DBaaS
Enteprise Manager 12c - Demo - DBaaS
 
Duvi Honig
Duvi HonigDuvi Honig
Duvi Honig
 
Instagramで新規客を獲得してLINE@でリピートさせる方法(長崎県)諫早商工会議所チラシ
Instagramで新規客を獲得してLINE@でリピートさせる方法(長崎県)諫早商工会議所チラシInstagramで新規客を獲得してLINE@でリピートさせる方法(長崎県)諫早商工会議所チラシ
Instagramで新規客を獲得してLINE@でリピートさせる方法(長崎県)諫早商工会議所チラシ
 
envoirment polution in hindi
envoirment polution in hindienvoirment polution in hindi
envoirment polution in hindi
 
How to Get Started with IFTTT (If This Then That)
How to Get Started with IFTTT (If This Then That)How to Get Started with IFTTT (If This Then That)
How to Get Started with IFTTT (If This Then That)
 
Fisiologia y conducta
Fisiologia y conductaFisiologia y conducta
Fisiologia y conducta
 
MyEQScore
MyEQScoreMyEQScore
MyEQScore
 
แผนการจัดการเรียนรู้ เรื่อง โภชนาการกับสุขภาพ
แผนการจัดการเรียนรู้ เรื่อง โภชนาการกับสุขภาพแผนการจัดการเรียนรู้ เรื่อง โภชนาการกับสุขภาพ
แผนการจัดการเรียนรู้ เรื่อง โภชนาการกับสุขภาพ
 

Similar to Systematic error codes implimentation for matched data encoded 47405

Low complexity low-latency architecture for matching
Low complexity low-latency architecture for matchingLow complexity low-latency architecture for matching
Low complexity low-latency architecture for matchingBhavya Venkatesh
 
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...IRJET Journal
 
Design and implementation of log domain decoder
Design and implementation of log domain decoder Design and implementation of log domain decoder
Design and implementation of log domain decoder IJECEIAES
 
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcFa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcsatriyo aris
 
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcFa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcsatriyo aris
 
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEM
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEMA NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEM
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEMVLSICS Design
 
IRJET- A Survey on Encode-Compare and Decode-Compare Architecture for Tag Mat...
IRJET- A Survey on Encode-Compare and Decode-Compare Architecture for Tag Mat...IRJET- A Survey on Encode-Compare and Decode-Compare Architecture for Tag Mat...
IRJET- A Survey on Encode-Compare and Decode-Compare Architecture for Tag Mat...IRJET Journal
 
An efficient reconfigurable code rate cooperative low-density parity check co...
An efficient reconfigurable code rate cooperative low-density parity check co...An efficient reconfigurable code rate cooperative low-density parity check co...
An efficient reconfigurable code rate cooperative low-density parity check co...IJECEIAES
 
REDUCED COMPLEXITY QUASI-CYCLIC LDPC ENCODER FOR IEEE 802.11N
REDUCED COMPLEXITY QUASI-CYCLIC LDPC ENCODER FOR IEEE 802.11N REDUCED COMPLEXITY QUASI-CYCLIC LDPC ENCODER FOR IEEE 802.11N
REDUCED COMPLEXITY QUASI-CYCLIC LDPC ENCODER FOR IEEE 802.11N VLSICS Design
 
128-Bit Area Efficient Reconfigurable Carry Select Adder
128-Bit Area Efficient Reconfigurable Carry Select Adder 128-Bit Area Efficient Reconfigurable Carry Select Adder
128-Bit Area Efficient Reconfigurable Carry Select Adder ijcisjournal
 
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIP
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIPMODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIP
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIPVLSICS Design
 
EEL4851writeup.doc
EEL4851writeup.docEEL4851writeup.doc
EEL4851writeup.docbutest
 
Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...TELKOMNIKA JOURNAL
 
Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...
Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...
Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...IJECEIAES
 
A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...jpstudcorner
 
A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...jpstudcorner
 
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersMultiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersIJNSA Journal
 

Similar to Systematic error codes implimentation for matched data encoded 47405 (20)

Low complexity low-latency architecture for matching
Low complexity low-latency architecture for matchingLow complexity low-latency architecture for matching
Low complexity low-latency architecture for matching
 
E010422834
E010422834E010422834
E010422834
 
Lb35189919904
Lb35189919904Lb35189919904
Lb35189919904
 
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
 
Design and implementation of log domain decoder
Design and implementation of log domain decoder Design and implementation of log domain decoder
Design and implementation of log domain decoder
 
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcFa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
 
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcFa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
 
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
 
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEM
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEMA NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEM
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEM
 
IRJET- A Survey on Encode-Compare and Decode-Compare Architecture for Tag Mat...
IRJET- A Survey on Encode-Compare and Decode-Compare Architecture for Tag Mat...IRJET- A Survey on Encode-Compare and Decode-Compare Architecture for Tag Mat...
IRJET- A Survey on Encode-Compare and Decode-Compare Architecture for Tag Mat...
 
An efficient reconfigurable code rate cooperative low-density parity check co...
An efficient reconfigurable code rate cooperative low-density parity check co...An efficient reconfigurable code rate cooperative low-density parity check co...
An efficient reconfigurable code rate cooperative low-density parity check co...
 
REDUCED COMPLEXITY QUASI-CYCLIC LDPC ENCODER FOR IEEE 802.11N
REDUCED COMPLEXITY QUASI-CYCLIC LDPC ENCODER FOR IEEE 802.11N REDUCED COMPLEXITY QUASI-CYCLIC LDPC ENCODER FOR IEEE 802.11N
REDUCED COMPLEXITY QUASI-CYCLIC LDPC ENCODER FOR IEEE 802.11N
 
128-Bit Area Efficient Reconfigurable Carry Select Adder
128-Bit Area Efficient Reconfigurable Carry Select Adder 128-Bit Area Efficient Reconfigurable Carry Select Adder
128-Bit Area Efficient Reconfigurable Carry Select Adder
 
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIP
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIPMODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIP
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIP
 
EEL4851writeup.doc
EEL4851writeup.docEEL4851writeup.doc
EEL4851writeup.doc
 
Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...Design and implementation of single bit error correction linear block code sy...
Design and implementation of single bit error correction linear block code sy...
 
Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...
Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...
Reversed-Trellis Tail-Biting Convolutional Code (RT-TBCC) Decoder Architectur...
 
A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...
 
A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...A novel area efficient vlsi architecture for recursion computation in lte tur...
A novel area efficient vlsi architecture for recursion computation in lte tur...
 
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersMultiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
 

More from EditorIJAERD

Numerical simulation and_preliminary_experimental_verification_of_aisi_1040_f...
Numerical simulation and_preliminary_experimental_verification_of_aisi_1040_f...Numerical simulation and_preliminary_experimental_verification_of_aisi_1040_f...
Numerical simulation and_preliminary_experimental_verification_of_aisi_1040_f...EditorIJAERD
 
Eco Friendly Extraction and Physico-Chemical Characteristics of Cissus Quadra...
Eco Friendly Extraction and Physico-Chemical Characteristics of Cissus Quadra...Eco Friendly Extraction and Physico-Chemical Characteristics of Cissus Quadra...
Eco Friendly Extraction and Physico-Chemical Characteristics of Cissus Quadra...EditorIJAERD
 
The sarcasm detection with the method of logistic regression
The sarcasm detection with the method of logistic regressionThe sarcasm detection with the method of logistic regression
The sarcasm detection with the method of logistic regressionEditorIJAERD
 
Experimental study on the use of locally produced ester base fluids at the dr...
Experimental study on the use of locally produced ester base fluids at the dr...Experimental study on the use of locally produced ester base fluids at the dr...
Experimental study on the use of locally produced ester base fluids at the dr...EditorIJAERD
 
Runoff modelling using hec hms for rural watershed
Runoff modelling using hec hms for rural watershedRunoff modelling using hec hms for rural watershed
Runoff modelling using hec hms for rural watershedEditorIJAERD
 
Performance improvement of ofdm
Performance improvement of ofdmPerformance improvement of ofdm
Performance improvement of ofdmEditorIJAERD
 
Soil health analysis for crop suggestions using machine learning
Soil health analysis for crop suggestions using machine learningSoil health analysis for crop suggestions using machine learning
Soil health analysis for crop suggestions using machine learningEditorIJAERD
 
Ik analysis for the hip simulator using the open sim simulator
Ik analysis for the hip simulator using the open sim simulatorIk analysis for the hip simulator using the open sim simulator
Ik analysis for the hip simulator using the open sim simulatorEditorIJAERD
 
Trading outlier detection machine learning approach
Trading outlier detection  machine learning approachTrading outlier detection  machine learning approach
Trading outlier detection machine learning approachEditorIJAERD
 
Experimental investigation of the effect of cold joint on strength and stiffn...
Experimental investigation of the effect of cold joint on strength and stiffn...Experimental investigation of the effect of cold joint on strength and stiffn...
Experimental investigation of the effect of cold joint on strength and stiffn...EditorIJAERD
 
Investigating willingness to pay for congestion pricing in peshawar universit...
Investigating willingness to pay for congestion pricing in peshawar universit...Investigating willingness to pay for congestion pricing in peshawar universit...
Investigating willingness to pay for congestion pricing in peshawar universit...EditorIJAERD
 
Capacity evaluation of masonry infill strengthened with wire containment mesh
Capacity evaluation of masonry infill strengthened with wire containment meshCapacity evaluation of masonry infill strengthened with wire containment mesh
Capacity evaluation of masonry infill strengthened with wire containment meshEditorIJAERD
 
Design intervention to reduce muscular strength for using stone polishing mac...
Design intervention to reduce muscular strength for using stone polishing mac...Design intervention to reduce muscular strength for using stone polishing mac...
Design intervention to reduce muscular strength for using stone polishing mac...EditorIJAERD
 
Screening and evaluation of medicinal properties of grape fruit varieties in ...
Screening and evaluation of medicinal properties of grape fruit varieties in ...Screening and evaluation of medicinal properties of grape fruit varieties in ...
Screening and evaluation of medicinal properties of grape fruit varieties in ...EditorIJAERD
 
Modification of airflow around a FSAE Race car using sidepods to increase the...
Modification of airflow around a FSAE Race car using sidepods to increase the...Modification of airflow around a FSAE Race car using sidepods to increase the...
Modification of airflow around a FSAE Race car using sidepods to increase the...EditorIJAERD
 
Pneumatic Gear System
Pneumatic Gear SystemPneumatic Gear System
Pneumatic Gear SystemEditorIJAERD
 
An Assessment of Phase Change Materials for Domestic Applicatons
An Assessment of Phase Change Materials for Domestic ApplicatonsAn Assessment of Phase Change Materials for Domestic Applicatons
An Assessment of Phase Change Materials for Domestic ApplicatonsEditorIJAERD
 
Remediation of heavy metals lead, cobalt and copper from industrail wastewate...
Remediation of heavy metals lead, cobalt and copper from industrail wastewate...Remediation of heavy metals lead, cobalt and copper from industrail wastewate...
Remediation of heavy metals lead, cobalt and copper from industrail wastewate...EditorIJAERD
 
Heart attack and alcohol detection sensor using internet of things
Heart attack and alcohol detection sensor using internet of thingsHeart attack and alcohol detection sensor using internet of things
Heart attack and alcohol detection sensor using internet of thingsEditorIJAERD
 

More from EditorIJAERD (20)

Numerical simulation and_preliminary_experimental_verification_of_aisi_1040_f...
Numerical simulation and_preliminary_experimental_verification_of_aisi_1040_f...Numerical simulation and_preliminary_experimental_verification_of_aisi_1040_f...
Numerical simulation and_preliminary_experimental_verification_of_aisi_1040_f...
 
Eco Friendly Extraction and Physico-Chemical Characteristics of Cissus Quadra...
Eco Friendly Extraction and Physico-Chemical Characteristics of Cissus Quadra...Eco Friendly Extraction and Physico-Chemical Characteristics of Cissus Quadra...
Eco Friendly Extraction and Physico-Chemical Characteristics of Cissus Quadra...
 
The sarcasm detection with the method of logistic regression
The sarcasm detection with the method of logistic regressionThe sarcasm detection with the method of logistic regression
The sarcasm detection with the method of logistic regression
 
Experimental study on the use of locally produced ester base fluids at the dr...
Experimental study on the use of locally produced ester base fluids at the dr...Experimental study on the use of locally produced ester base fluids at the dr...
Experimental study on the use of locally produced ester base fluids at the dr...
 
Runoff modelling using hec hms for rural watershed
Runoff modelling using hec hms for rural watershedRunoff modelling using hec hms for rural watershed
Runoff modelling using hec hms for rural watershed
 
Performance improvement of ofdm
Performance improvement of ofdmPerformance improvement of ofdm
Performance improvement of ofdm
 
Soil health analysis for crop suggestions using machine learning
Soil health analysis for crop suggestions using machine learningSoil health analysis for crop suggestions using machine learning
Soil health analysis for crop suggestions using machine learning
 
Ik analysis for the hip simulator using the open sim simulator
Ik analysis for the hip simulator using the open sim simulatorIk analysis for the hip simulator using the open sim simulator
Ik analysis for the hip simulator using the open sim simulator
 
Trading outlier detection machine learning approach
Trading outlier detection  machine learning approachTrading outlier detection  machine learning approach
Trading outlier detection machine learning approach
 
Experimental investigation of the effect of cold joint on strength and stiffn...
Experimental investigation of the effect of cold joint on strength and stiffn...Experimental investigation of the effect of cold joint on strength and stiffn...
Experimental investigation of the effect of cold joint on strength and stiffn...
 
Investigating willingness to pay for congestion pricing in peshawar universit...
Investigating willingness to pay for congestion pricing in peshawar universit...Investigating willingness to pay for congestion pricing in peshawar universit...
Investigating willingness to pay for congestion pricing in peshawar universit...
 
Capacity evaluation of masonry infill strengthened with wire containment mesh
Capacity evaluation of masonry infill strengthened with wire containment meshCapacity evaluation of masonry infill strengthened with wire containment mesh
Capacity evaluation of masonry infill strengthened with wire containment mesh
 
Design intervention to reduce muscular strength for using stone polishing mac...
Design intervention to reduce muscular strength for using stone polishing mac...Design intervention to reduce muscular strength for using stone polishing mac...
Design intervention to reduce muscular strength for using stone polishing mac...
 
Screening and evaluation of medicinal properties of grape fruit varieties in ...
Screening and evaluation of medicinal properties of grape fruit varieties in ...Screening and evaluation of medicinal properties of grape fruit varieties in ...
Screening and evaluation of medicinal properties of grape fruit varieties in ...
 
Modification of airflow around a FSAE Race car using sidepods to increase the...
Modification of airflow around a FSAE Race car using sidepods to increase the...Modification of airflow around a FSAE Race car using sidepods to increase the...
Modification of airflow around a FSAE Race car using sidepods to increase the...
 
Pneumatic Gear System
Pneumatic Gear SystemPneumatic Gear System
Pneumatic Gear System
 
An Assessment of Phase Change Materials for Domestic Applicatons
An Assessment of Phase Change Materials for Domestic ApplicatonsAn Assessment of Phase Change Materials for Domestic Applicatons
An Assessment of Phase Change Materials for Domestic Applicatons
 
Digital bus pass
Digital bus passDigital bus pass
Digital bus pass
 
Remediation of heavy metals lead, cobalt and copper from industrail wastewate...
Remediation of heavy metals lead, cobalt and copper from industrail wastewate...Remediation of heavy metals lead, cobalt and copper from industrail wastewate...
Remediation of heavy metals lead, cobalt and copper from industrail wastewate...
 
Heart attack and alcohol detection sensor using internet of things
Heart attack and alcohol detection sensor using internet of thingsHeart attack and alcohol detection sensor using internet of things
Heart attack and alcohol detection sensor using internet of things
 

Recently uploaded

main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 

Recently uploaded (20)

main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 

Systematic error codes implimentation for matched data encoded 47405

  • 1. International Journal of Advance Engineering and Research Development Volume 2,Issue 9, September -2015 @IJAERD-2015, All rights Reserved 104 Scientific Journal of Impact Factor(SJIF): 3.134 e-ISSN(O): 2348-4470 p-ISSN(P): 2348-6406 SYSTEMATIC ERROR CODES IMPLIMENTATION FOR MATCHED DATA ENCODED B.YSAWANTH KUMAR (1), L.S.DEVARAJ (2) (1) PG Scholar, VLSI System Design, Intellectual Institute Of Technology, AP, India (2) Assistant Professor, Intellectual Institute Of Technology, AP, India ABSTRACT: In current scenario, there are situations in a computing system where incoming information needs to be compared with a piece of stored data to locate the matching entry, e.g., cache tag array lookup and translation look-aside buffer matching. In this paper, a new architecture to reduce complexity and latency for matching the data protected with an error-correcting code (ECC).It is based on the fact that the code word of an ECC generated by encoding is usually represented in a systematic form, and it consists of the raw data and the parity information. The proposed architecture parallelizes the comparison of the data and that of the parity information. To further reduce the latency and complexity, in addition, a modified butterfly formed weight accumulator (BWA) is proposed for the efficient computation of the Hamming distance. The proposed architecture examines whether the incoming data matches the stored data if a certain number of erroneous bits are correct. KEYWORDS: Error correcting code (ECC), Butterfly Formed Weight accumulator (BWA), Data comparison, hamming distance, systematic codes. I. INTRODUCTION Data comparison circuit is a logic that has many applications in a computing system. For example, to check Whether a piece of information is in a cache, the address of the information in the memory is compared to all cache tags in the same set that might contain that address. Another place that uses a data comparison circuit is in the translation look asidebuffer (TLB) unit. TLB is used to speed up virtual to physical address translation. Because of such prevalence, it is important to implement the comparison circuit with low hardware complexity. Besides, the data comparison usually resides in the critical path of the components that are devised to increase the systemperformance, e.g., caches and TLBs, whose outputs determine the flow of the succeeding operations in a pipeline. The circuit, therefore, must be designed to have as low latency as possible, or the components will be disqualified from serving as accelerators and the overall performance of the whole system would be severely deteriorated. Error correcting codes (ECCs) are widely used in modern microprocessors to enhance the reliability and data integrity of their memory structures. For example, caches on modern microprocessors are protected by ECC.If a memory structure is protected with ECC, a piece of data is encoded first and the entire code word including the ECC check bits are written into the memory array. When the input data is loaded into the system, it has to be encoded and compared with the data stored in the memory and corrected if errors are detected to obtain the original data. II. PREVIOUS WORKS 2.1 Decode-And-Compare Architecture This section describes the conventional decode-and-compare architecture based on the direct compare method. Let us consider a cache memory where a k-bit tag is stored in the form of an n-bit code word after being encoded by a (n, k)code. In the decode-and compare architecture, the n-bit retrieved code word should first be decoded to extract the original Kbittag. The extracted k-bit tag is then compared with the k-bit tag field of an incoming address to determine whether the tags are matched or not. As the retrieved code word should go through the decoder before being compared with the incoming tag, the critical path is too long to be employed in a practical cache system designed for high speed access. Figure(1) is shown in below. 2.2 Direct Compare Method
  • 2. International Journal of Advance Engineering and Research Development (IJAERD) Volume 2,Issue 9, September -2015, e-ISSN: 2348 - 4470 , print-ISSN:2348-6406 @IJAERD-2015, All rights Reserved 105 Direct compare method is one of the most recent solutions for the matching problem. The direct Comparemethod encodes the incoming data and then compares it with the retrieved data that has been encoded as well. Therefore, the method eliminates the complex decoding from the critical path. In the direct compare method, which encodes the incoming data and then compares it with the retrieved data that has been encoded as well? Therefore, the method eliminates the complex decoding from the critical path. As the checking necessitates an additional circuit to compute the Hamming distance use a saturating adder. SA-based approach is the one where a special counter is constructed with an additional` building block called saturating adder (SA).The SA-based direct compare architecture reduces the latency and hardware complexity by resolving the aforementioned drawbacks. Fig: (1) Decode And Compare Method, (2) Direct Compare Method III. PROPOSED ARCHITECTURE This section presents a new architecture that can reduce the latency and complexity of the data comparison by using the characteristics of systematic codes. In this proposed structure consist of retrieved codeword and incoming tag are combined and given to the xor bank. Xor bank represents the array of bit-wise comparators (exclusive OR gates). It performs XOR operations for every pair of bits in X and Y so as to generate a vector representing the bitwise difference of the two codewords. The output from the XOR bank is then fed into BWA consisting of half adders (HAs ). The numbers of 1’s are accumulated by passing the value through the BWA.The proposed architecture grounded on the data path design is given below. It contains multiple butterfly formed weight accumulators (BWAs) proposed to improve the latency and complexity of the Hamming distance computation. The basic function of the BWA is to count the number of 1’s among its input bits.
  • 3. International Journal of Advance Engineering and Research Development (IJAERD) Volume 2,Issue 9, September -2015, e-ISSN: 2348 - 4470 , print-ISSN:2348-6406 @IJAERD-2015, All rights Reserved 106 Fig 3: Proposed data path design The proposed architecture consists of multiple stages of HAs as shown in figure where each output bit of a HA is associated with a weight. The HAs in a stage are connected in a butterfly form so as to accumulate the carry bits and the sum bits of the upper stage separately. In other words, both inputs of a HA in a stage, except the first stage, are either carry bits or sum bits computed in the upper stage. This connection method leads to a property that if an output bit of a HA is set, the number of 1’s among the bits in the paths reaching the HA is equal to the weight of the output bit. In the below figure for example, if the carry bit of the gray-colored HA is set, the number of 1’s among the associated input bits, i.e., A, B, C, and D, is 2. At the last stage of above figure the number of 1’s among the input bits, d, can be calculated as eq. (1) D=8I+4(J+K+M) +2(L+N+O) +P eq. (1) Since what we need is not the precise Hamming distance but the range it belongs to, it is possible to simplify the circuit. When r max = 1, for example, two or more than two 1’s among the input bits can be regarded as the same case that falls in the fourth range. In that case, we can replace several HAs with a simple OR-gate tree as shown below. This is an advantage over the SA that resorts to the compulsory saturation. Each XOR stage generates the bitwise difference vector for either data bits or parity bits, and the following processing elements count the number of 1’s in the vector, i.e., the Hamming distance. Each BWA at the first level is in the revised form shown in figure above, and generates an output from the OR-gate tree and several weight bits from the HA trees. In the
  • 4. International Journal of Advance Engineering and Research Development (IJAERD) Volume 2,Issue 9, September -2015, e-ISSN: 2348 - 4470 , print-ISSN:2348-6406 @IJAERD-2015, All rights Reserved 107 interconnection, such outputs are fed into their associated processing elements at the second level. The output of the OR-gate tree is connected to the subsequent OR-gate tree at the second level, and the remaining weight bits are connected to the second level BWAs according to their weights. A simple (8, 4) single-error correction double-error detection code is considered and the corresponding first and second level circuits are shown below. Fig:5 First and secondlevel circuits for (8,4) code Taking the outputs of the preceding circuits (BWA), the decision unit finally determines the incoming tag matches The retrieved codeword by considering the four ranges of the Hamming distance. The decision unit is in fact a combinational logic of which functionality is specified by a truth table that takes the outputs of the preceding circuits as inputs. For the (8, 4) code that the corresponding first and second level circuits are given above, the truth table for the decision unit is described in Table 1. Table:1Truth Table Of The Decision Unit The proposed BWA is developed with the help of modified XOR gate (XORM) and modified half adder (HAM).XORM has 1 gate less than the conventional XOR gate of 5 gates (AND-OR-NOT implementation) as in Fig.5. HAM has 2gates less than the conventional half adder as shown in Fig.6. As the number of gates reducein the basic building blocks of the proposed BWA area is also reduced. The block diagram representation of modified BWA is sown in Fig:7
  • 5. International Journal of Advance Engineering and Research Development (IJAERD) Volume 2,Issue 9, September -2015, e-ISSN: 2348 - 4470 , print-ISSN:2348-6406 @IJAERD-2015, All rights Reserved 108 Fig 7: Block Diagram Representation of Modified BWA IV. EVALUATION The proposed algorithm is coded in Verilog and simulated using Xilinx ISE 9.2isimulator and. The results obtained are Fig 8: simulation result of 8bit the of error-correcting codes
  • 6. International Journal of Advance Engineering and Research Development (IJAERD) Volume 2,Issue 9, September -2015, e-ISSN: 2348 - 4470 , print-ISSN:2348-6406 @IJAERD-2015, All rights Reserved 109 V. CONCLUSIONAND FUTURE WORK A new architecture has been presented for matching the data protected with an ECC to reduce the complexity and delay. The proposed architecture examines whether the incoming data matches the stored data if a certain number of erroneous bits are corrected. To reduce the latency, the comparison of the data is parallelized with the encoding process that generates the parity information. An efficient processing architecture has been presented to further minimize the latency and complexity. The experimental results show that the efficiency of the proposed method. As the proposed architecture is effective in reducing the latency as well as the complexity considerably, it can be regarded as a promising solution for the comparison of ECCprotected data. In the proposed architecture we deduct and correct single error and deduct double error in future Error correction of double adjacent errors will be included and compared its performance. REFERENCES [1]Byeong Yong Kong, Jihyuck Jo, Hyewon Jeong, Mina Hwang,Soyoung Cha, Bongjin Kim, and In -Cheol Park, “Low- Complexity Low-Latency Architecture for Matching of DataEncoded With Hard Systematic Error-Correcting Codes”, IEEEtransactions on very large scale integration (VLSI) systems, vol.22, no. 7, July 2014. [2] W. Wu, D. Somasekhar, and S.-L. Lu, “Direct compare ofinformation coded with error correcting codes,” IEEE Trans. VeryLarge Scale Integr. (VLSI) Syst., vol. 20, no. 11, pp. 2147–2151,Nov. 2012 [3] J. D. Warnock, Y.-H. Chan, S. M. Carey, H. Wen, P. J. Meaney, G. Gerwig, H. H. Smith, Y. H. Chan, J.Davis, P. Bunce, A. Pelella, D. Rodko, P. Patel, T. Strach, D. Malone, F. Malgioglio, J. Neves, D. L. Rude,and W. V. Huott “Circuit and physical design implementation of the microprocessor chip for the Enterprisesystem,” IEEE J. Solid -State Circuits, vol. 47, no. 1, pp. 151–163, Jan. 2012. [4]AMD Inc., Sunnyvale, CA, “Family 10h AMD Opteron™ Processor Product Data Sheet,” PID: 40036 Rev: 3.04,2010.Available:http://support.amd.com/us/Processor_TechDocs/40036.pdf . [5] G. Li, I. J. Fair, and W. A. Krzymien, “Low-density parity-check codes for space-time wireless transmission,” IEEE Trans. Wirel. Commun., vol.5, no. 2, pp. 312–322, Feb. 2006. [6] Costin Anghel, Benoit Bakeroot, Yogesh S. Chauhan, Renaud Gillon,Christian Maier, Peter Moens, Jan Doutreloigne and Adrian Mihaim Ionescu “New Method for Threshold Voltage Extraction of High-Voltage MOSFETs Based on Gate-to-Drain CapacitanceMeasurement” ,IEEE Electron device letters,vol 27,no.7,july 2006 ACKNOWLEDGMENT FIRST AUTHOR: B.Ysawanth Kumar received the B.Tech degree in Electronics and Communication Engineering in the year 2012 and pursuing M.Tech degree in VLSI System design from Intellectual institute of technology. Area of interests includes Communication and VLSI Design SECOND AUTHOR: L.S.Devaraj received the B.Tech degree in Electronics and Communication Engineering and M.Tech degree in VLSI. Currently, She is working as Assistant Professor in the Department of Electronics and Communication Engineering, Intellectual institute of technology, Ananthapuramu.Having three years of teaching experience. Area of interest includes VLSI design, vhdl and Verilog.