SlideShare a Scribd company logo
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
DOI: 10.5121/ijci.2016.5433 307
DESIGN VERIFICATION AND TEST VECTOR
MINIMIZATION USING HEURISTIC METHOD OF A
RIPPLE CARRY ADDER
K.L.V.Ramana Kumari 1
, M.Asha Rani 2
and N. Balaji 3
1
Department of ECE, VNRVJIET, Hyderabad, India
2
Department of ECE, JNTUH, Hyderabad, India
3
Department of ECE, JNTUK, Vizianagaram, India
ABSTRACT
The reduction in feature size increases the probability of manufacturing defect in the IC will result in a
faulty chip. A very small defect can easily result in a faulty transistor or interconnecting wire when the
feature size is less. Testing is required to guarantee fault-free products, regardless of whether the product
is a VLSI device or an electronic system. Simulation is used to verify the correctness of the design. To test n
input circuit we required 2n
test vectors. As the number inputs of a circuit are more, the exponential growth
of the required number of vectors takes much time to test the circuit. It is necessary to find testing methods
to reduce test vectors . So here designed an heuristic approach to test the ripple carry adder. Modelsim and
Xilinx tools are used to verify and synthesize the design.
KEYWORDS
Ripple carry Adder, Test vectors, Modelsim Simulator
1. INTRODUCTION
The complexity of VLSI technology has reached the point where we are trying to put 100 million
transistors on a single chip, and we are trying to increase the on-chip clock frequency to 1 GHz.
Transistor feature sizes on a VLSI chip reduce roughly by 10.5% per year, resulting in a transistor
density increase of roughly 22.1% every year. An almost equal amount of increase is provided by
wafer and chip size increases and circuit design and process innovations. This is evident that,
44% increase in transistors on microprocessor chips every year. This amounts to little over
doubling every two years[3]. The doubling of transistors on an integrated circuit every 18 to 24
months has been known as Moore’s since the mid-1970s. Although many have predicted its end,
it continues to hold, which leads to several results [1].
The reduction in feature size increases the probability that a manufacturing defect in the IC will
result in a faulty chip[2]. A very small defect can easily result in a faulty transistor or
interconnecting wire when the feature size is less than 100 nm. Furthermore, it takes only one
faulty transistor or wire to make the entire chip fail to function properly or at the required
operating frequency. Defects created during the manufacturing process are unavoidable, and, as a
result, some number of ICs is expected to be faulty therefore, testing is required to guarantee fault
free products, regardless of whether the product is a VLSI device or an electronic system
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
308
composed of many VLSI devices. It is also necessary to test components at various stages during
the manufacturing process. For example, in order to produce an electronic system, we must
produce ICs, use these ICs to assemble printed circuit boards (PCBs), and then use the PCBs to
assemble the system. There is general agreement with the rule of ten, which says that the cost of
detecting a faulty IC increases by an order of magnitude as we move through each stage of
manufacturing, from device level to board level to system level and finally to system operation in
the field. Electronic testing includes IC testing, PCB testing, and system testing at the various
manufacturing stages and, in some cases, during system operation. Testing is used not only to find
the fault-free devices, PCBs, and systems but also to improve production yield at the various
stages of manufacturing by analyzing the cause of defects when faults are encountered. In some
systems, periodic testing is performed to ensure fault-free system operation and to initiate repair
procedures when faults are detected. Hence, VLSI testing is important to designers, product
engineers, test engineers, managers, manufacturers, and end-users [1].
Fig. 1 explains the basic principle of digital testing. Binary patterns (or test vectors) are applied to
the inputs of the circuit. The response of the circuit is compared with the expected response [4, 5].
The circuit is considered good if the responses match. Otherwise the circuit is faulty. Obviously,
the quality of the tested circuit will depend upon the thoroughness of the test vectors. Generation
and evaluation of test vectors is one of the main objectives of this paper. VLSI chip testing is an
important part of the manufacturing process.
Fig.1. Principle of Testing
2. PROPOSED SYSTEM
Simulation serves two distinct purposes in electronic design. First, it is used to verify the
correctness of the design and second, it verifies the tests. The simulation process is illustrated in
Figure 2. The process of realizing an electronic system begins with its specification, which
describes the input or output electrical behaviour (logical, analog, and timing) and other
characteristics (physical, environmental, etc.)
The specification is the starting point for the design activity. The process of synthesis produces an
interconnection of components called a net list. The design is verified by a true-value simulator.
True-value means that the simulator will compute the response for given input stimuli without
injecting any faults in the design. The input stimuli are also based on the specification.
Typically, these stimuli correspond to those input and output specifications that are either critical
or considered risky by the synthesis procedures. A frequently used strategy is to exercise all
functions with only critical data patterns. This is because the simulation of the exhaustive set of
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
309
data patterns can be too expensive. However, the definition of “critical” often depends on
designer’s heuristics.
The true-value simulator in Figure 2. Computes the responses that a circuit would have produced
if the given input stimuli were applied. In a typical design verification scenario, the computed
responses are analyzed (either automatically, or interactively, or manually) to verify that the
designed net list performs according to the specification. If errors are found, suitable changes are
made, until responses to all stimuli match the specification.
Fig. 2. Block diagram for Design Verification
2.1. Test vector Minimization method
A combinational logic circuit is designed to add two 4-bit binary numbers. This circuit has 9
binary inputs and 5 outputs. To verify the circuit the number inputs required to the circuit is 2n
ie.,
512, to completely verify the correctness of the implemented logic, we must simulate input
vectors and check that each produces the correct sum output.
This is clearly impractical. So, the designer must simulate some selected vectors. For example,
one may add pairs of integers where both are non-zero, one is zero, and both are zero shown in
Fig. 3. Then add a large number of randomly generated integer pairs. Such heuristic, though they
seem arbitrary, can effectively find many possible errors in the designed logic. The next example
illustrates a rather simple heuristic.
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
310
Fig.3. Binary values applied to the FA’s
Design verification heuristic for a ripple-carry adder: Fig. 4. shows the logic design of an adder
circuit. The basic building block in this design is a full-adder that adds two data bits, and one
carry bit, to produce sum and carry outputs, and respectively. For logic verification, one possible
strategy is to select a set of vectors that will apply all possible inputs to each full adder block. For
example, if we set and apply all four combinations shown in Fig.3.
Fig.4. Heuristic method for test minimization
Test vectors are generated from the logic block. Inject the SA1 or SA0 to one input to the full
adder through 2:1 Multiplexer. If the multiplexer input is 0, true bit will be selected and
multiplexer input is 1, faulty input is selected at the input of the full adder. Associated carry will
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
311
be generated at the full adder and fault free and faulty outputs are compared. If the output is
different fault will be detected. Depending on the input, carry will be propagated, that effects the
next adder circuit also. 8 test vectors are sufficient to test the circuit. One significant advantage of
simulation is that all internal signals of the circuit can be examined. This reduces the complexity
of verification. The regular pattern in each vector allows us to expand the width of the vector
without increasing the number of vectors to an adder of arbitrarily large size.
3. RESULTS AND DISCUSSIONS
SA1 fault is injected to the 3rd
full adder of a circuit, Fault free output and faulty outputs are
observed, if the two are different fault is identified and marked in the diagrams shown in Fig. 5.
and Fig.6.
Fig. 5. Fault is detected at the output of the full adder.
Fig.6. Fault is detected at the output of the full adder.
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
312
Output is analyzed at the output of the full adder, that fault is propagated to next full adder, with
final carryout 0.
3.1. Register Transistor level diagram generated by tool shown in Fig.7.
Fig.7. Register transistor level diagram of a Ripple Carry Adder
Dynamic power, Leakage power, Switching power given by the tool is shown in the report.
Dynamic power, Leakage power, Switching power Report.
4. CONCLUSIONS
Test vector minimization method is designed in this paper. A heuristic method is used to reduce
the test vectors of a ripple carry adder. Testing operation of the ripple carry adder is performed.
This method reduces the number of test vectors to detect the faults. The regular pattern allows us
to expand the width of the vector without increasing the number of vectors to an adder of
arbitrary large size. Design compiler, Modelsim and Xilinx tools are used to analyze the method.
International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016
313
REFERENCES
[1] L.Bushnell, Vishwani D.Agrawal, Essentialsof Electronic Testing for Digital Memory & Mixed –
Signal VLSI Circuits:Springer.
[2] W. L.-T. Wang, C.-W. Wu, VLSI Test Principles and Architectures: Design for Testability.San
Francisco, CA: Morgan Kaufmann Publishers, 2006.
[3] K.T. Cheng, S. Dey, M. Rodgers, and K.Roy, “Test Challenges for Deep Sub-micronTechnologies,”
in Proc. 37th Design Automation Conf., June 2000, pp. 142-149.
[4] SM.Thamarai, K.Kuppusamy, T.Meyyappan, “A New Algorithm for Fault based Test Minimization
in Combinational Circuits”, International Journal of Computing and Applications, ISSN 0973- 5704,
Vol.5, No.1, pp.77-88, June 2010.
[5] B.Pratyusha ,J.L.V.Ramana Kumari. Dr.M.Asha Rani , “ FPGA Implementation of High Speed Test
Pattern Generator For BIST ”. International Journal of Engineering Research and Technology, ISSN:
2278-0181, Vol.2 , Issue 11, Nov-2013.

More Related Content

What's hot

Bt34433436
Bt34433436Bt34433436
Bt34433436
IJERA Editor
 
A practical guide for using Statistical Tests to assess Randomized Algorithms...
A practical guide for using Statistical Tests to assess Randomized Algorithms...A practical guide for using Statistical Tests to assess Randomized Algorithms...
A practical guide for using Statistical Tests to assess Randomized Algorithms...
Lionel Briand
 
76201902
7620190276201902
76201902
IJRAT
 
IRJET - Neural Network based Leaf Disease Detection and Remedy Recommenda...
IRJET -  	  Neural Network based Leaf Disease Detection and Remedy Recommenda...IRJET -  	  Neural Network based Leaf Disease Detection and Remedy Recommenda...
IRJET - Neural Network based Leaf Disease Detection and Remedy Recommenda...
IRJET Journal
 
Real-Time, Non-Intrusive Evaluation of VoIP Using Genetic Programming
Real-Time, Non-Intrusive Evaluation of VoIP Using Genetic ProgrammingReal-Time, Non-Intrusive Evaluation of VoIP Using Genetic Programming
Real-Time, Non-Intrusive Evaluation of VoIP Using Genetic Programming
adil raja
 
Iterative code reviews system for detecting and correcting faults from softwa...
Iterative code reviews system for detecting and correcting faults from softwa...Iterative code reviews system for detecting and correcting faults from softwa...
Iterative code reviews system for detecting and correcting faults from softwa...
IAEME Publication
 
Vlsi Design of Low Transition Low Power Test Pattern Generator Using Fault Co...
Vlsi Design of Low Transition Low Power Test Pattern Generator Using Fault Co...Vlsi Design of Low Transition Low Power Test Pattern Generator Using Fault Co...
Vlsi Design of Low Transition Low Power Test Pattern Generator Using Fault Co...
iosrjce
 
A Review on Parameter Estimation Techniques of Software Reliability Growth Mo...
A Review on Parameter Estimation Techniques of Software Reliability Growth Mo...A Review on Parameter Estimation Techniques of Software Reliability Growth Mo...
A Review on Parameter Estimation Techniques of Software Reliability Growth Mo...
Editor IJCATR
 
Itab innovative assessments
Itab innovative assessmentsItab innovative assessments
Itab innovative assessmentsMartin J Ippel
 
IRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
IRJET- Resolve Error with Detection & Correction Techniques in Computer NetworksIRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
IRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
IRJET Journal
 
IRJET- Early Detection of Sensors Failure using IoT
IRJET- Early Detection of Sensors Failure using IoTIRJET- Early Detection of Sensors Failure using IoT
IRJET- Early Detection of Sensors Failure using IoT
IRJET Journal
 
Model-Driven Run-Time Enforcement of Complex Role-Based Access Control Policies
Model-Driven Run-Time Enforcement of Complex Role-Based Access Control PoliciesModel-Driven Run-Time Enforcement of Complex Role-Based Access Control Policies
Model-Driven Run-Time Enforcement of Complex Role-Based Access Control Policies
Lionel Briand
 
IRJET- Flaw Detection in Wireless Sensor Network using a LDA Classifier
IRJET-  	  Flaw Detection in Wireless Sensor Network using a LDA ClassifierIRJET-  	  Flaw Detection in Wireless Sensor Network using a LDA Classifier
IRJET- Flaw Detection in Wireless Sensor Network using a LDA Classifier
IRJET Journal
 
Online Detection of Shutdown Periods in Chemical Plants: A Case Study
Online Detection of Shutdown Periods in Chemical Plants: A Case StudyOnline Detection of Shutdown Periods in Chemical Plants: A Case Study
Online Detection of Shutdown Periods in Chemical Plants: A Case Study
Manuel Martín
 
D046062030
D046062030D046062030
D046062030
IJERA Editor
 
Comparison of Data Mining Techniques used in Anomaly Based IDS
Comparison of Data Mining Techniques used in Anomaly Based IDS  Comparison of Data Mining Techniques used in Anomaly Based IDS
Comparison of Data Mining Techniques used in Anomaly Based IDS
IRJET Journal
 
Genetic algorithm based approach for
Genetic algorithm based approach forGenetic algorithm based approach for
Genetic algorithm based approach for
IJCSES Journal
 
Testing Machine Learning-enabled Systems: A Personal Perspective
Testing Machine Learning-enabled Systems: A Personal PerspectiveTesting Machine Learning-enabled Systems: A Personal Perspective
Testing Machine Learning-enabled Systems: A Personal Perspective
Lionel Briand
 

What's hot (20)

Bt34433436
Bt34433436Bt34433436
Bt34433436
 
A practical guide for using Statistical Tests to assess Randomized Algorithms...
A practical guide for using Statistical Tests to assess Randomized Algorithms...A practical guide for using Statistical Tests to assess Randomized Algorithms...
A practical guide for using Statistical Tests to assess Randomized Algorithms...
 
76201902
7620190276201902
76201902
 
IRJET - Neural Network based Leaf Disease Detection and Remedy Recommenda...
IRJET -  	  Neural Network based Leaf Disease Detection and Remedy Recommenda...IRJET -  	  Neural Network based Leaf Disease Detection and Remedy Recommenda...
IRJET - Neural Network based Leaf Disease Detection and Remedy Recommenda...
 
Real-Time, Non-Intrusive Evaluation of VoIP Using Genetic Programming
Real-Time, Non-Intrusive Evaluation of VoIP Using Genetic ProgrammingReal-Time, Non-Intrusive Evaluation of VoIP Using Genetic Programming
Real-Time, Non-Intrusive Evaluation of VoIP Using Genetic Programming
 
Iterative code reviews system for detecting and correcting faults from softwa...
Iterative code reviews system for detecting and correcting faults from softwa...Iterative code reviews system for detecting and correcting faults from softwa...
Iterative code reviews system for detecting and correcting faults from softwa...
 
Vlsi Design of Low Transition Low Power Test Pattern Generator Using Fault Co...
Vlsi Design of Low Transition Low Power Test Pattern Generator Using Fault Co...Vlsi Design of Low Transition Low Power Test Pattern Generator Using Fault Co...
Vlsi Design of Low Transition Low Power Test Pattern Generator Using Fault Co...
 
A Review on Parameter Estimation Techniques of Software Reliability Growth Mo...
A Review on Parameter Estimation Techniques of Software Reliability Growth Mo...A Review on Parameter Estimation Techniques of Software Reliability Growth Mo...
A Review on Parameter Estimation Techniques of Software Reliability Growth Mo...
 
Itab innovative assessments
Itab innovative assessmentsItab innovative assessments
Itab innovative assessments
 
IRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
IRJET- Resolve Error with Detection & Correction Techniques in Computer NetworksIRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
IRJET- Resolve Error with Detection & Correction Techniques in Computer Networks
 
IRJET- Early Detection of Sensors Failure using IoT
IRJET- Early Detection of Sensors Failure using IoTIRJET- Early Detection of Sensors Failure using IoT
IRJET- Early Detection of Sensors Failure using IoT
 
Model-Driven Run-Time Enforcement of Complex Role-Based Access Control Policies
Model-Driven Run-Time Enforcement of Complex Role-Based Access Control PoliciesModel-Driven Run-Time Enforcement of Complex Role-Based Access Control Policies
Model-Driven Run-Time Enforcement of Complex Role-Based Access Control Policies
 
IRJET- Flaw Detection in Wireless Sensor Network using a LDA Classifier
IRJET-  	  Flaw Detection in Wireless Sensor Network using a LDA ClassifierIRJET-  	  Flaw Detection in Wireless Sensor Network using a LDA Classifier
IRJET- Flaw Detection in Wireless Sensor Network using a LDA Classifier
 
CV Rohith
CV RohithCV Rohith
CV Rohith
 
Online Detection of Shutdown Periods in Chemical Plants: A Case Study
Online Detection of Shutdown Periods in Chemical Plants: A Case StudyOnline Detection of Shutdown Periods in Chemical Plants: A Case Study
Online Detection of Shutdown Periods in Chemical Plants: A Case Study
 
publication1
publication1publication1
publication1
 
D046062030
D046062030D046062030
D046062030
 
Comparison of Data Mining Techniques used in Anomaly Based IDS
Comparison of Data Mining Techniques used in Anomaly Based IDS  Comparison of Data Mining Techniques used in Anomaly Based IDS
Comparison of Data Mining Techniques used in Anomaly Based IDS
 
Genetic algorithm based approach for
Genetic algorithm based approach forGenetic algorithm based approach for
Genetic algorithm based approach for
 
Testing Machine Learning-enabled Systems: A Personal Perspective
Testing Machine Learning-enabled Systems: A Personal PerspectiveTesting Machine Learning-enabled Systems: A Personal Perspective
Testing Machine Learning-enabled Systems: A Personal Perspective
 

Viewers also liked

Design and Implementation of Efficient Ternary Content Addressable Memory
Design and Implementation of Efficient Ternary Content Addressable Memory Design and Implementation of Efficient Ternary Content Addressable Memory
Design and Implementation of Efficient Ternary Content Addressable Memory
ijcisjournal
 
Glaucoma Disease Diagnosis Using Feed Forward Neural Network
Glaucoma Disease Diagnosis Using Feed Forward Neural Network Glaucoma Disease Diagnosis Using Feed Forward Neural Network
Glaucoma Disease Diagnosis Using Feed Forward Neural Network
ijcisjournal
 
1.3_The individual as producer, consumer and borrower
1.3_The individual as producer, consumer and borrower1.3_The individual as producer, consumer and borrower
1.3_The individual as producer, consumer and borrower
Iftekhar Ul Islam Khan
 
Analogy Fault Model for Biquad Filter by Using Vectorisation Method
Analogy Fault Model for Biquad Filter by Using Vectorisation Method Analogy Fault Model for Biquad Filter by Using Vectorisation Method
Analogy Fault Model for Biquad Filter by Using Vectorisation Method
ijcisjournal
 
SLIDESHARE SHOWCASE
SLIDESHARE SHOWCASESLIDESHARE SHOWCASE
SLIDESHARE SHOWCASE
Jiayan Liu
 
Prototyping of Wireless Sensor Network for Precision Agriculture
Prototyping of Wireless Sensor Network for Precision Agriculture Prototyping of Wireless Sensor Network for Precision Agriculture
Prototyping of Wireless Sensor Network for Precision Agriculture
ijcisjournal
 
новый подход в дизайне швейного изделия
новый подход в дизайне швейного изделияновый подход в дизайне швейного изделия
новый подход в дизайне швейного изделияsvet14
 
новый подход в дизайне швейного изделия
новый подход в дизайне швейного изделияновый подход в дизайне швейного изделия
новый подход в дизайне швейного изделияsvet14
 
Two-Dimensional Object Detection Using Accumulated Cell Average Constant Fals...
Two-Dimensional Object Detection Using Accumulated Cell Average Constant Fals...Two-Dimensional Object Detection Using Accumulated Cell Average Constant Fals...
Two-Dimensional Object Detection Using Accumulated Cell Average Constant Fals...
ijcisjournal
 
Ioanichie Balan _Parintele Paisie Duhovnicul
Ioanichie Balan _Parintele Paisie DuhovniculIoanichie Balan _Parintele Paisie Duhovnicul
Ioanichie Balan _Parintele Paisie Duhovnicul
adyesp
 
новый подход в дизайне швейного изделия
новый подход в дизайне швейного изделияновый подход в дизайне швейного изделия
новый подход в дизайне швейного изделияsvet14
 
Design and Fabrication of S-Band MIC Power Amplifier
Design and Fabrication of S-Band MIC Power AmplifierDesign and Fabrication of S-Band MIC Power Amplifier
Design and Fabrication of S-Band MIC Power Amplifier
ijcisjournal
 
Arduino Based Abnormal Heart Rate Detection and Wireless Communication
Arduino Based Abnormal Heart Rate Detection and Wireless CommunicationArduino Based Abnormal Heart Rate Detection and Wireless Communication
Arduino Based Abnormal Heart Rate Detection and Wireless Communication
ijcisjournal
 
A Design of Double Swastika Slot Microstrip Antenna for Ultra Wide Band and W...
A Design of Double Swastika Slot Microstrip Antenna for Ultra Wide Band and W...A Design of Double Swastika Slot Microstrip Antenna for Ultra Wide Band and W...
A Design of Double Swastika Slot Microstrip Antenna for Ultra Wide Band and W...
ijcisjournal
 
Colour Image Segmentation Using Soft Rough Fuzzy-C-Means and Multi Class SVM
Colour Image Segmentation Using Soft Rough Fuzzy-C-Means and Multi Class SVM Colour Image Segmentation Using Soft Rough Fuzzy-C-Means and Multi Class SVM
Colour Image Segmentation Using Soft Rough Fuzzy-C-Means and Multi Class SVM
ijcisjournal
 
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition AlgorithmAnalysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
ijcisjournal
 
A Comprehensive Study on Big Data Applications and Challenges
A Comprehensive Study on Big Data Applications and ChallengesA Comprehensive Study on Big Data Applications and Challenges
A Comprehensive Study on Big Data Applications and Challenges
ijcisjournal
 
Guia apa 6ta
Guia apa 6taGuia apa 6ta
Guia apa 6ta
meryzelidon2013
 

Viewers also liked (19)

Design and Implementation of Efficient Ternary Content Addressable Memory
Design and Implementation of Efficient Ternary Content Addressable Memory Design and Implementation of Efficient Ternary Content Addressable Memory
Design and Implementation of Efficient Ternary Content Addressable Memory
 
Glaucoma Disease Diagnosis Using Feed Forward Neural Network
Glaucoma Disease Diagnosis Using Feed Forward Neural Network Glaucoma Disease Diagnosis Using Feed Forward Neural Network
Glaucoma Disease Diagnosis Using Feed Forward Neural Network
 
1.3_The individual as producer, consumer and borrower
1.3_The individual as producer, consumer and borrower1.3_The individual as producer, consumer and borrower
1.3_The individual as producer, consumer and borrower
 
Analogy Fault Model for Biquad Filter by Using Vectorisation Method
Analogy Fault Model for Biquad Filter by Using Vectorisation Method Analogy Fault Model for Biquad Filter by Using Vectorisation Method
Analogy Fault Model for Biquad Filter by Using Vectorisation Method
 
SLIDESHARE SHOWCASE
SLIDESHARE SHOWCASESLIDESHARE SHOWCASE
SLIDESHARE SHOWCASE
 
Prototyping of Wireless Sensor Network for Precision Agriculture
Prototyping of Wireless Sensor Network for Precision Agriculture Prototyping of Wireless Sensor Network for Precision Agriculture
Prototyping of Wireless Sensor Network for Precision Agriculture
 
новый подход в дизайне швейного изделия
новый подход в дизайне швейного изделияновый подход в дизайне швейного изделия
новый подход в дизайне швейного изделия
 
новый подход в дизайне швейного изделия
новый подход в дизайне швейного изделияновый подход в дизайне швейного изделия
новый подход в дизайне швейного изделия
 
Two-Dimensional Object Detection Using Accumulated Cell Average Constant Fals...
Two-Dimensional Object Detection Using Accumulated Cell Average Constant Fals...Two-Dimensional Object Detection Using Accumulated Cell Average Constant Fals...
Two-Dimensional Object Detection Using Accumulated Cell Average Constant Fals...
 
Ioanichie Balan _Parintele Paisie Duhovnicul
Ioanichie Balan _Parintele Paisie DuhovniculIoanichie Balan _Parintele Paisie Duhovnicul
Ioanichie Balan _Parintele Paisie Duhovnicul
 
Reforma y pastoral
Reforma y pastoralReforma y pastoral
Reforma y pastoral
 
новый подход в дизайне швейного изделия
новый подход в дизайне швейного изделияновый подход в дизайне швейного изделия
новый подход в дизайне швейного изделия
 
Design and Fabrication of S-Band MIC Power Amplifier
Design and Fabrication of S-Band MIC Power AmplifierDesign and Fabrication of S-Band MIC Power Amplifier
Design and Fabrication of S-Band MIC Power Amplifier
 
Arduino Based Abnormal Heart Rate Detection and Wireless Communication
Arduino Based Abnormal Heart Rate Detection and Wireless CommunicationArduino Based Abnormal Heart Rate Detection and Wireless Communication
Arduino Based Abnormal Heart Rate Detection and Wireless Communication
 
A Design of Double Swastika Slot Microstrip Antenna for Ultra Wide Band and W...
A Design of Double Swastika Slot Microstrip Antenna for Ultra Wide Band and W...A Design of Double Swastika Slot Microstrip Antenna for Ultra Wide Band and W...
A Design of Double Swastika Slot Microstrip Antenna for Ultra Wide Band and W...
 
Colour Image Segmentation Using Soft Rough Fuzzy-C-Means and Multi Class SVM
Colour Image Segmentation Using Soft Rough Fuzzy-C-Means and Multi Class SVM Colour Image Segmentation Using Soft Rough Fuzzy-C-Means and Multi Class SVM
Colour Image Segmentation Using Soft Rough Fuzzy-C-Means and Multi Class SVM
 
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition AlgorithmAnalysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
Analysis of Inertial Sensor Data Using Trajectory Recognition Algorithm
 
A Comprehensive Study on Big Data Applications and Challenges
A Comprehensive Study on Big Data Applications and ChallengesA Comprehensive Study on Big Data Applications and Challenges
A Comprehensive Study on Big Data Applications and Challenges
 
Guia apa 6ta
Guia apa 6taGuia apa 6ta
Guia apa 6ta
 

Similar to Design Verification and Test Vector Minimization Using Heuristic Method of a Ripple Carry Adder

Design and Implementation of Test Vector Generation using Random Forest Techn...
Design and Implementation of Test Vector Generation using Random Forest Techn...Design and Implementation of Test Vector Generation using Random Forest Techn...
Design and Implementation of Test Vector Generation using Random Forest Techn...
IRJET Journal
 
IMPLEMENTATION OF COMPACTION ALGORITHM FOR ATPG GENERATED PARTIALLY SPECIFIED...
IMPLEMENTATION OF COMPACTION ALGORITHM FOR ATPG GENERATED PARTIALLY SPECIFIED...IMPLEMENTATION OF COMPACTION ALGORITHM FOR ATPG GENERATED PARTIALLY SPECIFIED...
IMPLEMENTATION OF COMPACTION ALGORITHM FOR ATPG GENERATED PARTIALLY SPECIFIED...
VLSICS Design
 
Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...
Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...
Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...
IRJET Journal
 
COMPARATIVE ANALYSIS OF SIMULATION TECHNIQUES: SCAN COMPRESSION AND INTERNAL ...
COMPARATIVE ANALYSIS OF SIMULATION TECHNIQUES: SCAN COMPRESSION AND INTERNAL ...COMPARATIVE ANALYSIS OF SIMULATION TECHNIQUES: SCAN COMPRESSION AND INTERNAL ...
COMPARATIVE ANALYSIS OF SIMULATION TECHNIQUES: SCAN COMPRESSION AND INTERNAL ...
IJCI JOURNAL
 
IRJET- Implementation of TPG-LFSR with Reseeding Pattern Value
IRJET-  	  Implementation of TPG-LFSR with Reseeding Pattern ValueIRJET-  	  Implementation of TPG-LFSR with Reseeding Pattern Value
IRJET- Implementation of TPG-LFSR with Reseeding Pattern Value
IRJET Journal
 
H010613642
H010613642H010613642
H010613642
IOSR Journals
 
Black Box Model based Self Healing Solution for Stuck at Faults in Digital Ci...
Black Box Model based Self Healing Solution for Stuck at Faults in Digital Ci...Black Box Model based Self Healing Solution for Stuck at Faults in Digital Ci...
Black Box Model based Self Healing Solution for Stuck at Faults in Digital Ci...
IJECEIAES
 
Star Test Topology for Testing Printed Circuits Boards
Star Test Topology for Testing Printed Circuits BoardsStar Test Topology for Testing Printed Circuits Boards
Star Test Topology for Testing Printed Circuits Boards
IRJET Journal
 
Arduino based 74-series integrated circuits testing system at gate level
Arduino based 74-series integrated circuits testing system at gate level Arduino based 74-series integrated circuits testing system at gate level
Arduino based 74-series integrated circuits testing system at gate level
IJECEIAES
 
IRJET- Fault- Tolerant Fir Filter Implementation
IRJET-	 Fault- Tolerant Fir Filter ImplementationIRJET-	 Fault- Tolerant Fir Filter Implementation
IRJET- Fault- Tolerant Fir Filter Implementation
IRJET Journal
 
Automatic Fault Detection System with IOT Based
Automatic Fault Detection System with IOT BasedAutomatic Fault Detection System with IOT Based
Automatic Fault Detection System with IOT Based
YogeshIJTSRD
 
UVM ARCHITECTURE FOR VERIFICATION
UVM ARCHITECTURE FOR VERIFICATIONUVM ARCHITECTURE FOR VERIFICATION
UVM ARCHITECTURE FOR VERIFICATION
IAEME Publication
 
Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...
eSAT Publishing House
 
A Unique Test Bench for Various System-on-a-Chip
A Unique Test Bench for Various System-on-a-Chip A Unique Test Bench for Various System-on-a-Chip
A Unique Test Bench for Various System-on-a-Chip
IJECEIAES
 
A BIST GENERATOR CAD TOOL FOR NUMERIC INTEGRATED CIRCUITS
A BIST GENERATOR CAD TOOL FOR NUMERIC INTEGRATED CIRCUITSA BIST GENERATOR CAD TOOL FOR NUMERIC INTEGRATED CIRCUITS
A BIST GENERATOR CAD TOOL FOR NUMERIC INTEGRATED CIRCUITS
VLSICS Design
 
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET Journal
 
Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...
eSAT Journals
 
Generator of pseudorandom sequences
Generator of pseudorandom sequences Generator of pseudorandom sequences
Generator of pseudorandom sequences
Venkata Sai Kalyan Routhu
 
Automatic Analyzing System for Packet Testing and Fault Mapping
Automatic Analyzing System for Packet Testing and Fault MappingAutomatic Analyzing System for Packet Testing and Fault Mapping
Automatic Analyzing System for Packet Testing and Fault Mapping
IRJET Journal
 
Ig3415411546
Ig3415411546Ig3415411546
Ig3415411546
IJERA Editor
 

Similar to Design Verification and Test Vector Minimization Using Heuristic Method of a Ripple Carry Adder (20)

Design and Implementation of Test Vector Generation using Random Forest Techn...
Design and Implementation of Test Vector Generation using Random Forest Techn...Design and Implementation of Test Vector Generation using Random Forest Techn...
Design and Implementation of Test Vector Generation using Random Forest Techn...
 
IMPLEMENTATION OF COMPACTION ALGORITHM FOR ATPG GENERATED PARTIALLY SPECIFIED...
IMPLEMENTATION OF COMPACTION ALGORITHM FOR ATPG GENERATED PARTIALLY SPECIFIED...IMPLEMENTATION OF COMPACTION ALGORITHM FOR ATPG GENERATED PARTIALLY SPECIFIED...
IMPLEMENTATION OF COMPACTION ALGORITHM FOR ATPG GENERATED PARTIALLY SPECIFIED...
 
Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...
Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...
Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...
 
COMPARATIVE ANALYSIS OF SIMULATION TECHNIQUES: SCAN COMPRESSION AND INTERNAL ...
COMPARATIVE ANALYSIS OF SIMULATION TECHNIQUES: SCAN COMPRESSION AND INTERNAL ...COMPARATIVE ANALYSIS OF SIMULATION TECHNIQUES: SCAN COMPRESSION AND INTERNAL ...
COMPARATIVE ANALYSIS OF SIMULATION TECHNIQUES: SCAN COMPRESSION AND INTERNAL ...
 
IRJET- Implementation of TPG-LFSR with Reseeding Pattern Value
IRJET-  	  Implementation of TPG-LFSR with Reseeding Pattern ValueIRJET-  	  Implementation of TPG-LFSR with Reseeding Pattern Value
IRJET- Implementation of TPG-LFSR with Reseeding Pattern Value
 
H010613642
H010613642H010613642
H010613642
 
Black Box Model based Self Healing Solution for Stuck at Faults in Digital Ci...
Black Box Model based Self Healing Solution for Stuck at Faults in Digital Ci...Black Box Model based Self Healing Solution for Stuck at Faults in Digital Ci...
Black Box Model based Self Healing Solution for Stuck at Faults in Digital Ci...
 
Star Test Topology for Testing Printed Circuits Boards
Star Test Topology for Testing Printed Circuits BoardsStar Test Topology for Testing Printed Circuits Boards
Star Test Topology for Testing Printed Circuits Boards
 
Arduino based 74-series integrated circuits testing system at gate level
Arduino based 74-series integrated circuits testing system at gate level Arduino based 74-series integrated circuits testing system at gate level
Arduino based 74-series integrated circuits testing system at gate level
 
IRJET- Fault- Tolerant Fir Filter Implementation
IRJET-	 Fault- Tolerant Fir Filter ImplementationIRJET-	 Fault- Tolerant Fir Filter Implementation
IRJET- Fault- Tolerant Fir Filter Implementation
 
Automatic Fault Detection System with IOT Based
Automatic Fault Detection System with IOT BasedAutomatic Fault Detection System with IOT Based
Automatic Fault Detection System with IOT Based
 
UVM ARCHITECTURE FOR VERIFICATION
UVM ARCHITECTURE FOR VERIFICATIONUVM ARCHITECTURE FOR VERIFICATION
UVM ARCHITECTURE FOR VERIFICATION
 
Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...
 
A Unique Test Bench for Various System-on-a-Chip
A Unique Test Bench for Various System-on-a-Chip A Unique Test Bench for Various System-on-a-Chip
A Unique Test Bench for Various System-on-a-Chip
 
A BIST GENERATOR CAD TOOL FOR NUMERIC INTEGRATED CIRCUITS
A BIST GENERATOR CAD TOOL FOR NUMERIC INTEGRATED CIRCUITSA BIST GENERATOR CAD TOOL FOR NUMERIC INTEGRATED CIRCUITS
A BIST GENERATOR CAD TOOL FOR NUMERIC INTEGRATED CIRCUITS
 
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
 
Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...
 
Generator of pseudorandom sequences
Generator of pseudorandom sequences Generator of pseudorandom sequences
Generator of pseudorandom sequences
 
Automatic Analyzing System for Packet Testing and Fault Mapping
Automatic Analyzing System for Packet Testing and Fault MappingAutomatic Analyzing System for Packet Testing and Fault Mapping
Automatic Analyzing System for Packet Testing and Fault Mapping
 
Ig3415411546
Ig3415411546Ig3415411546
Ig3415411546
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

Design Verification and Test Vector Minimization Using Heuristic Method of a Ripple Carry Adder

  • 1. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 DOI: 10.5121/ijci.2016.5433 307 DESIGN VERIFICATION AND TEST VECTOR MINIMIZATION USING HEURISTIC METHOD OF A RIPPLE CARRY ADDER K.L.V.Ramana Kumari 1 , M.Asha Rani 2 and N. Balaji 3 1 Department of ECE, VNRVJIET, Hyderabad, India 2 Department of ECE, JNTUH, Hyderabad, India 3 Department of ECE, JNTUK, Vizianagaram, India ABSTRACT The reduction in feature size increases the probability of manufacturing defect in the IC will result in a faulty chip. A very small defect can easily result in a faulty transistor or interconnecting wire when the feature size is less. Testing is required to guarantee fault-free products, regardless of whether the product is a VLSI device or an electronic system. Simulation is used to verify the correctness of the design. To test n input circuit we required 2n test vectors. As the number inputs of a circuit are more, the exponential growth of the required number of vectors takes much time to test the circuit. It is necessary to find testing methods to reduce test vectors . So here designed an heuristic approach to test the ripple carry adder. Modelsim and Xilinx tools are used to verify and synthesize the design. KEYWORDS Ripple carry Adder, Test vectors, Modelsim Simulator 1. INTRODUCTION The complexity of VLSI technology has reached the point where we are trying to put 100 million transistors on a single chip, and we are trying to increase the on-chip clock frequency to 1 GHz. Transistor feature sizes on a VLSI chip reduce roughly by 10.5% per year, resulting in a transistor density increase of roughly 22.1% every year. An almost equal amount of increase is provided by wafer and chip size increases and circuit design and process innovations. This is evident that, 44% increase in transistors on microprocessor chips every year. This amounts to little over doubling every two years[3]. The doubling of transistors on an integrated circuit every 18 to 24 months has been known as Moore’s since the mid-1970s. Although many have predicted its end, it continues to hold, which leads to several results [1]. The reduction in feature size increases the probability that a manufacturing defect in the IC will result in a faulty chip[2]. A very small defect can easily result in a faulty transistor or interconnecting wire when the feature size is less than 100 nm. Furthermore, it takes only one faulty transistor or wire to make the entire chip fail to function properly or at the required operating frequency. Defects created during the manufacturing process are unavoidable, and, as a result, some number of ICs is expected to be faulty therefore, testing is required to guarantee fault free products, regardless of whether the product is a VLSI device or an electronic system
  • 2. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 308 composed of many VLSI devices. It is also necessary to test components at various stages during the manufacturing process. For example, in order to produce an electronic system, we must produce ICs, use these ICs to assemble printed circuit boards (PCBs), and then use the PCBs to assemble the system. There is general agreement with the rule of ten, which says that the cost of detecting a faulty IC increases by an order of magnitude as we move through each stage of manufacturing, from device level to board level to system level and finally to system operation in the field. Electronic testing includes IC testing, PCB testing, and system testing at the various manufacturing stages and, in some cases, during system operation. Testing is used not only to find the fault-free devices, PCBs, and systems but also to improve production yield at the various stages of manufacturing by analyzing the cause of defects when faults are encountered. In some systems, periodic testing is performed to ensure fault-free system operation and to initiate repair procedures when faults are detected. Hence, VLSI testing is important to designers, product engineers, test engineers, managers, manufacturers, and end-users [1]. Fig. 1 explains the basic principle of digital testing. Binary patterns (or test vectors) are applied to the inputs of the circuit. The response of the circuit is compared with the expected response [4, 5]. The circuit is considered good if the responses match. Otherwise the circuit is faulty. Obviously, the quality of the tested circuit will depend upon the thoroughness of the test vectors. Generation and evaluation of test vectors is one of the main objectives of this paper. VLSI chip testing is an important part of the manufacturing process. Fig.1. Principle of Testing 2. PROPOSED SYSTEM Simulation serves two distinct purposes in electronic design. First, it is used to verify the correctness of the design and second, it verifies the tests. The simulation process is illustrated in Figure 2. The process of realizing an electronic system begins with its specification, which describes the input or output electrical behaviour (logical, analog, and timing) and other characteristics (physical, environmental, etc.) The specification is the starting point for the design activity. The process of synthesis produces an interconnection of components called a net list. The design is verified by a true-value simulator. True-value means that the simulator will compute the response for given input stimuli without injecting any faults in the design. The input stimuli are also based on the specification. Typically, these stimuli correspond to those input and output specifications that are either critical or considered risky by the synthesis procedures. A frequently used strategy is to exercise all functions with only critical data patterns. This is because the simulation of the exhaustive set of
  • 3. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 309 data patterns can be too expensive. However, the definition of “critical” often depends on designer’s heuristics. The true-value simulator in Figure 2. Computes the responses that a circuit would have produced if the given input stimuli were applied. In a typical design verification scenario, the computed responses are analyzed (either automatically, or interactively, or manually) to verify that the designed net list performs according to the specification. If errors are found, suitable changes are made, until responses to all stimuli match the specification. Fig. 2. Block diagram for Design Verification 2.1. Test vector Minimization method A combinational logic circuit is designed to add two 4-bit binary numbers. This circuit has 9 binary inputs and 5 outputs. To verify the circuit the number inputs required to the circuit is 2n ie., 512, to completely verify the correctness of the implemented logic, we must simulate input vectors and check that each produces the correct sum output. This is clearly impractical. So, the designer must simulate some selected vectors. For example, one may add pairs of integers where both are non-zero, one is zero, and both are zero shown in Fig. 3. Then add a large number of randomly generated integer pairs. Such heuristic, though they seem arbitrary, can effectively find many possible errors in the designed logic. The next example illustrates a rather simple heuristic.
  • 4. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 310 Fig.3. Binary values applied to the FA’s Design verification heuristic for a ripple-carry adder: Fig. 4. shows the logic design of an adder circuit. The basic building block in this design is a full-adder that adds two data bits, and one carry bit, to produce sum and carry outputs, and respectively. For logic verification, one possible strategy is to select a set of vectors that will apply all possible inputs to each full adder block. For example, if we set and apply all four combinations shown in Fig.3. Fig.4. Heuristic method for test minimization Test vectors are generated from the logic block. Inject the SA1 or SA0 to one input to the full adder through 2:1 Multiplexer. If the multiplexer input is 0, true bit will be selected and multiplexer input is 1, faulty input is selected at the input of the full adder. Associated carry will
  • 5. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 311 be generated at the full adder and fault free and faulty outputs are compared. If the output is different fault will be detected. Depending on the input, carry will be propagated, that effects the next adder circuit also. 8 test vectors are sufficient to test the circuit. One significant advantage of simulation is that all internal signals of the circuit can be examined. This reduces the complexity of verification. The regular pattern in each vector allows us to expand the width of the vector without increasing the number of vectors to an adder of arbitrarily large size. 3. RESULTS AND DISCUSSIONS SA1 fault is injected to the 3rd full adder of a circuit, Fault free output and faulty outputs are observed, if the two are different fault is identified and marked in the diagrams shown in Fig. 5. and Fig.6. Fig. 5. Fault is detected at the output of the full adder. Fig.6. Fault is detected at the output of the full adder.
  • 6. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 312 Output is analyzed at the output of the full adder, that fault is propagated to next full adder, with final carryout 0. 3.1. Register Transistor level diagram generated by tool shown in Fig.7. Fig.7. Register transistor level diagram of a Ripple Carry Adder Dynamic power, Leakage power, Switching power given by the tool is shown in the report. Dynamic power, Leakage power, Switching power Report. 4. CONCLUSIONS Test vector minimization method is designed in this paper. A heuristic method is used to reduce the test vectors of a ripple carry adder. Testing operation of the ripple carry adder is performed. This method reduces the number of test vectors to detect the faults. The regular pattern allows us to expand the width of the vector without increasing the number of vectors to an adder of arbitrary large size. Design compiler, Modelsim and Xilinx tools are used to analyze the method.
  • 7. International Journal on Cybernetics & Informatics (IJCI) Vol. 5, No. 4, August 2016 313 REFERENCES [1] L.Bushnell, Vishwani D.Agrawal, Essentialsof Electronic Testing for Digital Memory & Mixed – Signal VLSI Circuits:Springer. [2] W. L.-T. Wang, C.-W. Wu, VLSI Test Principles and Architectures: Design for Testability.San Francisco, CA: Morgan Kaufmann Publishers, 2006. [3] K.T. Cheng, S. Dey, M. Rodgers, and K.Roy, “Test Challenges for Deep Sub-micronTechnologies,” in Proc. 37th Design Automation Conf., June 2000, pp. 142-149. [4] SM.Thamarai, K.Kuppusamy, T.Meyyappan, “A New Algorithm for Fault based Test Minimization in Combinational Circuits”, International Journal of Computing and Applications, ISSN 0973- 5704, Vol.5, No.1, pp.77-88, June 2010. [5] B.Pratyusha ,J.L.V.Ramana Kumari. Dr.M.Asha Rani , “ FPGA Implementation of High Speed Test Pattern Generator For BIST ”. International Journal of Engineering Research and Technology, ISSN: 2278-0181, Vol.2 , Issue 11, Nov-2013.