SlideShare a Scribd company logo
1 of 5
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 7, Issue 5 (June 2013), PP.77-81
77
Efficient Decoding Using Majority Gate
Naveenraj.M1
, Aishwarya.E.J2
,
1PG Scholar, Sri Shakthi Institute of Engineering and Technology, Chinniampalayam, Coimbatore-641062
2
Assistant professor/ECE, Sri Shakthi Institute of Engineering and Technology, Chinniampalayam, Coimbatore-
641062
Abstract:- Normally decoding is done to correct errors present in the codeword by calculating
syndrome. syndrome calculation for large size codeword makes decoding more complex. This paper
presents an error detection and correction schemes using Majority Logic Decoding(MLD) which
provides simple decoding process to detect and correct errors, the existing MLD requires number of
clock cycles equal to size of codeword to detect error but the proposed decoding significantly reduces
the iterations by detecting error within three clock cycles for any size of codeword using control logic
.Also the proposed scheme uses detection logic to detect the uncorrectable codeword if error occured
is more than actual capacity of system. Hence this makes error detection and correction schemes more
efficient.
Keywords:- Block codes, Error correction codes(ECCs),LowDensity Parity Check(LDPC) ,Majority
logic Memory.,
I. INTRODUCTION
The impact of technology scaling—smaller dimensions, higher integration densities, and lower
operating voltages— has come to a level that reliability of memories is put into jeopardy, not only in extreme
radiation environments like spacecraft and avionics electronics, but also at normal terrestrial environments [1],
[2]. Especially, SRAM memory failure rates are increasing significantly, therefore posing a major reliability
concern for many applications. Some commonly used mitigation techniques are:
• triple modular redundancy (TMR);
• error correction codes (ECCs).
TMR is a special case of the von Neumann method [3] consisting of three versions of the design in
parallel, with a majority voter selecting the correct output. As the method suggests, the complexity overhead
would be three times plus the complexity of the majority voter and thus increasing the power consumption. For
memories, it turned out that ECC codes are the best way to mitigate memory soft errors [2]. For terrestrial
radiation environments where there is a lowsoft error rate (SER), codes like single error correction and double
error detection (SEC–DED), are a good solution, due to their low encoding and decoding complexity. However,
as a consequence of augmenting integration densities, there is an increase in the number of soft errors, which
produces the need for higher error correction capabilities [4], [5]. The usual multierror correction codes, such as
Reed–Solomon (RS) or Bose–Chaudhuri– Hocquenghem (BCH) are not suitable for this task. The reason for
this is that they use more sophisticated decoding algorithms, like complex algebraic (e.g., floating point
operations or logarithms) decoders that can decode in fixed time, and simple graph decoders, that use iterative
algorithms (e.g., belief propagation). Both are very complex and increase computational costs [6]. Among the
ECC codes that meet the requirements of higher error correction capability and low decoding complexity, cyclic
block codes have been identified as good candidates, due to their property of being majority logic (ML)
decodable [7], [8]. A subgroup of the low-density parity check (LDPC) codes, which belongs to the family of
the ML decodable codes, has been researched in [9]–[11]. In this paper, we will focus on one specific type of
LDPC codes, namely the difference-set cyclic codes (DSCCs), which is widely used in the Japanese teletext
system or FM multiplex broadcasting systems [12]–[14]. The main reason for using ML decoding is that it is
very simple to implement and thus it is very practical and has low complexity. The drawback of ML decoding is
that, for a coded word of bits, it takes cycles in the decoding process, posing a big impact on system
performance [6]. One way of coping with this problem is to implement parallel encoders and decoders. This
solution would enormously increase the complexity and, therefore, the power consumption. As most of the
memory reading accesses will have no errors, the decoder is most of the time working for no reason. This has
motivated the use of a fault detector module [11] that checks if the codeword contains an error and then triggers
the correction mechanism accordingly. In this case, only the faulty a codewords need correction, and therefore
the average read memory access is speeded up, at the expense of an increase in hardware cost and power
consumption. A similar proposal has been presented in [15] for the case of flash memories. The simplest way to
Efficient Decoding Using Majority Gate
78
implement fault detector for an ECC is by calculating the syndrome, but this generally implies adding another
very complex functional unit. This paper explores the idea of using the ML decoder circuitry as a fault detector
so that read operations are accelerated with almost no additional. hardware cost
II. EXISTING SYSTEM OVERVIEW
MLD is based on a number of parity check equations which are orthogonal to each other, so that, at
each iteration, each codeword bit only participates in one parity check equation, except the very first bit which
contributes to all equations. For this reason, the majority result of these parity check equations decide the
correctness of the current bit under decoding. MLD was first mentioned in [7] for the Reed–Müller codes. Then,
it was extended and generalized in [8] for all types of systematic linear block codes that can be totally
orthogonalized on each codeword bit. Initially, the data words are encoded and then stored in the memory.
When the memory is read, codeword is then fed through the ML decoder before sent to the output for further
processing. In this decoding process, the data word is corrected from all bit-flips that it might have suffered
while being stored in the memory.
There are two ways for implementing this type of decoder. The first one is called the Type-I ML
decoder, which determines, upon XOR combinations of the syndrome, which bits need to be corrected [6]. The
second one is the Type-II ML decoder that calculates directly out of the codeword bits the information of
correctness of the current bit under decoding [6]. Both are quite similar but when it comes to implementation,
the Type-II uses less area, as it does not calculate the syndrome as an intermediate step. Therefore, this paper
focuses only on this one.
Codes exist which are capable of correcting large number of random errors. Such codes are rarely used
in practical data transmission systems ,however, because the equipments necessary to realize their capabilities,
that is to actually correct the errors, is usually prohibited complex and expensive. The problem of finding simply
implemented decoding algorithm is perhaps the outstanding unsolved problem today. Here a new class of
random error correcting cyclic codes such as majority logic algorithm is defined. These codes can be decoded
with the simplest decoding algorithm .
As VLSI Technology scaling continues and the device dimensions keep shrinking, memories are more
and more sensitive to soft errors. Memory cores have significant impact on chip reliability therefore error
detection and correction techniques are commonly used for protecting the system against soft errors.
Fig 1 Schematic of Existing MLD
III. PLAIN MLD
As described before, the ML decoder is a simple and powerful decoder, capable of correcting multiple
random bit-flips depending on the number of parity check equations. It consists of four parts: 1) a cyclic shift
register; 2) an XOR matrix; 3) a majority gate; and 4) an XOR for correcting the codeword bit under decoding,
as illustrated in Fig. 1. The input signal is initially stored into the cyclic shift register and shifted through all the
taps. The intermediate values in each tap are then used to calculate the results of the check sum equations from
the XOR matrix. In the cycle, the result has reached the final tap, producing the output signal (which is the
decoded version of input ).
As stated before, input might correspond to wrong data corrupted by a soft error. To handle this
situation, the decoder would behave as follows. After the initial step, in which the codeword is loaded into the
cyclic shift register, the decoding starts by calculating the parity check equations hardwired in the XOR matrix.
The resulting sums are then forwarded to the majority gate for evaluating its correctness. If the number of 1’s
Efficient Decoding Using Majority Gate
79
received in is greater than the number of 0’s, that would mean that the current bit under decoding is wrong, and
a signal to correct it would be triggered. Otherwise, the bit under decoding would be correct and no extra
operations would be needed on it. In the next step, the content of the registers are rotated and the above
procedure is repeated until all codeword bits have been processed. Finally, the parity check sums should be zero
if the codeword has been correctly decoded.
The previous algorithm needs as many cycles as the number of bits in the input signal, which is also the
number of taps in the decoder. This is a big impact on the performance of the system, depending on the size of
the code. For example, for a codeword of 73 bits, the decoding would take 73 cycles, which would be excessive
for most applications.
3.1 Plain MLD with syndrome fault detector
In order to improve the decoder performance, alternative designs may be used. One possibility is to add
a fault detector by calculating the syndrome, so that only faulty codewords are decoded [11]. Since most of the
codewords will be error-free, no further correction will be needed, and therefore performance will not be
affected. Although the implementation of an SFD reduces the average latency of the decoding process, it also
adds complexity to the design.
The SFD is an XOR matrix that calculates the syndrome based on the parity check matrix. Each parity
bit results in a syndrome equation. Therefore, the complexity of the syndrome calculator increases with the size
of the code.A faulty codeword is detected when at least one of the syndrome bits is ―1.‖ This triggers the MLD
to start the decoding, as explained before. On the other hand, if the codeword is error-free, it is forwarded
directly to the output, thus saving the correction cycles.
In this way, the performance is improved in exchange of an additional module in the memory system: a
matrix of XOR gates to resolve the parity check matrix, where each check bit results into a syndrome equation.
This finally results in a quite complex module, with a large amount of additional hardware and power
consumption in the system.
IV. PROPOSED SYSTEM
This section presents a modified version of the ML decoder that improves the designs presented before.
Starting from the original design of the ML decoder introduced in [8], the proposed ML detector/decoder
(MLDD) has been implemented using the difference-set cyclic codes (DSCCs) [16]–[19]. This code is part of
the LDPC codes, and, based on their attributes, they have the following properties:
• Ability to correct large number of errors, sparse encoding, decoding and checking circuits synthesizable into
simple hardware;
• modular encoder and decoder blocks that allow an efficient hardware implementation;
• systematic code structure for clean partition of information and code bits in the memory.
Given a word read from a memory protected with DSCC codes, and affected by up to four bit-flips, all
errors can be detected in only three decoding cycles. This is a huge improvement over the simpler case, where
N decoding cycles are needed to guarantee that errors are detected.
The figure1 shows the basic ML decoder with an -tap shift register, an XOR array to calculate the
orthogonal parity check sums and a majority gate for deciding if the current bit under decoding needs to be
inverted. Those components are the same as the ones for the plain ML decoder . The additional hardware to
perform the error detection is illustrated in Fig. 2 as: i) the control unit which triggers a finish flag when no
errors are detected after the third cycle and ii) the output tristate buffers. The output tristate buffers are always in
high impedance unless the control unit sends the finish signal so that the current values of the shift register are
forwarded to the output .
4.1 Control and Detection logic
The control unit manages the detection process. It uses a counter that counts up to three, which distinguishes the
first three iterations of the ML decoding. In these first three iterations, the control unit evaluates the by
combining them with the OR1 function. This value is fed into a three-stage shift register, which holds the results
of the last three cycles. In the third cycle, the OR2 gate evaluates the content of the detection register. When the
result is ―0,‖ the FSM sends out the finish signal indicating that the processed word is error-free. In the other
case, if the result is ―1,‖ the ML decoding process runs until the end.
This clearly provides a performance improvement respect to the traditional method. Most of the words
would only take three cycles (four, if we consider the other two for input/output) and only those with errors
(which should be a minority) would need to perform the whole decoding process.
Efficient Decoding Using Majority Gate
80
The detection logic provides the information about whether codeword is correctable or not .consider
that system is able to detect up to four bits but codeword contains six bit error means detection logic produces
output as uncorrectable codeword, suppose the codeword contains four or less number of bits means it produces
output as correctable codeword .This makes the error detection schemes more efficient than existing decoding
process.
An error-correcting code (ECC) or forward error correction (FEC) code is a system of adding
redundant data, or parity data, to a message, such that it can be recovered by a receiver even when a number of
errors (up to the capability of the code being used) were introduced, either during the process of transmission, or
on storage. Since the receiver does not have to ask the sender for retransmission of the data, a back-channel is
not required in forward error correction, and it is therefore suitable for simplex communication such as
broadcasting. Error-correcting codes are frequently used in lower-layer communication, as well as for reliable
storage in media such as CDs, DVDs, hard disks, and RAM.
Fig 2 .Proposed MLD scheme
V. SIMULATIONS USING MODELSIM
ModelSim is a powerful simulator that can be used to simulate the behavior and performance of logic
circuits. The simulator allows the user to apply inputs to the designed circuit, usually referred to as test vectors,
and to observe the outputs generated in response. The user can use the Waveform Editor to represent the input
signals as waveforms.
ModelSim is a simulation and debugging environment created by Mentor Graphics. ModelSim allows
you to check the syntax and verify the functionality of VHDL programs.
ModelSim VHDL supports both the IEEE 1076-1987 and 1076-1993 VHDL, the 1164-1993 Standard
Multivalue Logic System for VHDL Interoperability, and the 1076.2-1996 Standard VHDL Mathematical
Packages standards. Any design developed with ModelSim will be compatible with any other VHDL system
that is compliant with either IEEE Standard 1076-1987 or 1076-1993.
ModelSim Verilog is based on IEEE Std 1364-1995 and a partial implementation of 1364-2001 (see
/<install_dir>/modeltech/docs/technotes/vlog_2001.note for implementation details) Standard Hardware
Description Language. The Open Verilog International Verilog LRM version 2.0 is also applicable to a large
extent. Both PLI (Programming Language Interface) and VCD (Value Change Dump) are supported for
ModelSim PE and SE users.
5.1. Simulation Result and Analysis
Fig 3 Simulation result of existing MLD
Simulation results of existing MLD shows that the detection of error takes number of cycles equal to size of
codeword even if there is no error in the data .This leads to large area and power consumption and results in
complexity of decoding process . The codeword of size 73 contains no error but the existing MLD takes 73
iterations to detect the error so that efficiency of decoding process is reduced in this scheme.
Efficient Decoding Using Majority Gate
81
Fig 4 Result of Control Logic
The above simulation result shows that proposed MLD in which the error is detected within three
cycles .This significantly reduces area and power consumption of the system. The Error free codeword size is 73
but proposed MLD takes only three iterations to detect error in all 73 bits. The control logic sends finish signal
if there is no error in the data after three iterations .Hence proposed MLD has better decoding process than
existing MLD.
Fig 5 Result of Detection logic
The above simulation result shows that proposed MLD with Detection logic which displays result as
uncorrectable codeword because the system is able to detect up to 4 bits only but the codeword contains six bit
errors Hence detection logic display produces this output after completion of entire clock cycles
REFERENCES
[1]. C. W. Slayman, ―Cache and memory error detection, correction, and reduction techniques for terrestrial
servers and workstations,‖ IEEE Trans. Device Mater. Reliabil., vol. 5, no. 3, pp. 397–404, Sep. 2005.
[2]. R. C. Baumann, ―Radiation-induced soft errors in advanced semiconductor technologies,‖ IEEE Trans.
Device Mater. Reliabil., vol. 5, no.3, pp. 301–316, Sep. 2005.
[3]. J. von Neumann, ―Probabilistic logics and synthesis of reliable organisms from unreliable
components,‖ Automata Studies, pp. 43–98, 1956.
[4]. M. A. Bajura et al., ―Models and algorithmic limits for an ECC-based approach to hardening sub-100-
nm SRAMs,‖ IEEE Trans. Nucl. Sci.,vol. 54, no. 4, pp. 935–945, Aug. 2007.
[5]. R. Naseer and J. Draper, ―DEC ECC design to improve memory reliability in sub-100 nm
technologies,‖ in Proc. IEEE ICECS, 2008, pp.586–589.
[6]. S. Lin and D. J. Costello, Error Control Coding, 2nd ed. Englewood Cliffs, NJ: Prentice-Hall, 2004.
[7]. I. S. Reed, ―A class of multiple-error-correcting codes and the decoding scheme,‖ IRE Trans. Inf.
Theory, vol. IT-4, pp. 38–49, 1954.
[8]. J. L. Massey, Threshold Decoding. Cambridge, MA: MIT Press, 1963.
[9]. S. Ghosh and P. D. Lincoln, ―Low-density parity check codes for error correction in nanoscale
memory,‖ SRI Comput. Sci. Lab. Tech. Rep.CSL-0703, 2007.
[10]. B. Vasic and S. K. Chilappagari, ―An information theoretical framework for analysis and design of
nanoscale fault-tolerant memories based on low-density parity-check codes,‖ IEEE Trans. Circuits
Syst. I, Reg. Papers, vol. 54, no. 11, pp. 2438–2446, Nov. 2007.
[11]. H. Naeimi and A. DeHon, ―Fault secure encoder and decoder for NanoMemory applications,‖ IEEE
Trans. Very Large Scale Integr. (VLSI) Syst., vol. 17, no. 4, pp. 473–486, Apr. 2009.
[12]. Y. Kato and T. Morita, ―Error correction circuit using difference-set cyclic code,‖ in Proc. ASP-DAC,
2003, pp. 585–586.
[13]. T. Kuroda, M. Takada, T. Isobe, and O. Yamada, ―Transmission scheme of high-capacity FM
multiplex broadcasting system,‖ IEEE Trans. Broadcasting, vol. 42, no. 3, pp. 245–250, Sep. 1996.
[14]. O. Yamada, ―Development of an error-correction method for data packet multiplexed with TV
signals,‖ IEEE Trans. Commun., vol. COM-35, no. 1, pp. 21–31, Jan. 1987.
[15]. P. Ankolekar, S. Rosner, R. Isaac, and J. Bredow, ―Multi-bit error correction methods for latency-
contrained flash memory systems,‖ IEEETrans. Device Mater. Reliabil., vol. 10, no. 1, pp. 33–39, Mar.
2010.

More Related Content

What's hot

DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...IJCSEA Journal
 
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSMAn Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSMAssociate Professor in VSB Coimbatore
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...IJCSIS Research Publications
 
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC CodesPerformance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codesidescitation
 
Railway Ticket Counter Problem With STM
Railway Ticket Counter Problem With STMRailway Ticket Counter Problem With STM
Railway Ticket Counter Problem With STMIJERA Editor
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdleSAT Publishing House
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Synchronizing Parallel Tasks Using STM
Synchronizing Parallel Tasks Using STMSynchronizing Parallel Tasks Using STM
Synchronizing Parallel Tasks Using STMIJERA Editor
 
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...ijsrd.com
 
PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...
PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...
PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...IJNSA Journal
 
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...eSAT Journals
 
A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...
A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...
A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...ijcseit
 

What's hot (17)

DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...
 
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSMAn Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
 
Dn4301681689
Dn4301681689Dn4301681689
Dn4301681689
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC CodesPerformance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
 
Compressed Image Authentication using CDMA Watermarking and EMRC6 Encryption
Compressed Image Authentication using CDMA Watermarking and EMRC6 EncryptionCompressed Image Authentication using CDMA Watermarking and EMRC6 Encryption
Compressed Image Authentication using CDMA Watermarking and EMRC6 Encryption
 
Railway Ticket Counter Problem With STM
Railway Ticket Counter Problem With STMRailway Ticket Counter Problem With STM
Railway Ticket Counter Problem With STM
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
 
Innovative Improvement of Data Storage Using Error Correction Codes
Innovative Improvement of Data Storage Using Error Correction CodesInnovative Improvement of Data Storage Using Error Correction Codes
Innovative Improvement of Data Storage Using Error Correction Codes
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Synchronizing Parallel Tasks Using STM
Synchronizing Parallel Tasks Using STMSynchronizing Parallel Tasks Using STM
Synchronizing Parallel Tasks Using STM
 
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
Encryption and Compression of Audio-Video Data Using Enhanced AES and J-Bit A...
 
Ijetcas14 378
Ijetcas14 378Ijetcas14 378
Ijetcas14 378
 
PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...
PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...
PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON...
 
Novel watermarkig scheme with watermark encryption for copyrig protec...
Novel  watermarkig        scheme with watermark encryption for copyrig protec...Novel  watermarkig        scheme with watermark encryption for copyrig protec...
Novel watermarkig scheme with watermark encryption for copyrig protec...
 
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
 
A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...
A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...
A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...
 

Viewers also liked

The Jack Point Home For Pedestrian Playables, Day 1
The Jack Point Home For Pedestrian Playables, Day 1The Jack Point Home For Pedestrian Playables, Day 1
The Jack Point Home For Pedestrian Playables, Day 1esme iolanthe
 
Jack Point Chapter 4
Jack Point Chapter 4Jack Point Chapter 4
Jack Point Chapter 4esme iolanthe
 
EarthLink Cloud Workspace
EarthLink Cloud WorkspaceEarthLink Cloud Workspace
EarthLink Cloud WorkspaceMike Ricca
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Ekonomi perusahaan manj strategi perusahaan
Ekonomi perusahaan  manj strategi perusahaanEkonomi perusahaan  manj strategi perusahaan
Ekonomi perusahaan manj strategi perusahaanDongan Manchunian
 
AIr quality and urban mobility challenges, Chandigarh
AIr quality and urban mobility challenges, Chandigarh AIr quality and urban mobility challenges, Chandigarh
AIr quality and urban mobility challenges, Chandigarh Cse Web
 
Çerez Kasesi Çeşitleri
Çerez Kasesi ÇeşitleriÇerez Kasesi Çeşitleri
Çerez Kasesi ÇeşitleriCafemarkt
 
Performance schema and sys schema
Performance schema and sys schemaPerformance schema and sys schema
Performance schema and sys schemaMark Leith
 
Gestão de Conflitos e Relacionamentos - versão compactada
Gestão de Conflitos e Relacionamentos - versão compactadaGestão de Conflitos e Relacionamentos - versão compactada
Gestão de Conflitos e Relacionamentos - versão compactadaDaniel de Carvalho Luz
 
сказка владислава ясалова
сказка владислава ясаловасказка владислава ясалова
сказка владислава ясаловаСОШ ЦДО
 

Viewers also liked (14)

Inecuaciones
InecuacionesInecuaciones
Inecuaciones
 
The Jack Point Home For Pedestrian Playables, Day 1
The Jack Point Home For Pedestrian Playables, Day 1The Jack Point Home For Pedestrian Playables, Day 1
The Jack Point Home For Pedestrian Playables, Day 1
 
Utlvt
UtlvtUtlvt
Utlvt
 
Jack Point Chapter 4
Jack Point Chapter 4Jack Point Chapter 4
Jack Point Chapter 4
 
EarthLink Cloud Workspace
EarthLink Cloud WorkspaceEarthLink Cloud Workspace
EarthLink Cloud Workspace
 
BNI - MJ Contractors Testimonial
BNI - MJ Contractors TestimonialBNI - MJ Contractors Testimonial
BNI - MJ Contractors Testimonial
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Ekonomi perusahaan manj strategi perusahaan
Ekonomi perusahaan  manj strategi perusahaanEkonomi perusahaan  manj strategi perusahaan
Ekonomi perusahaan manj strategi perusahaan
 
La granja
La granjaLa granja
La granja
 
AIr quality and urban mobility challenges, Chandigarh
AIr quality and urban mobility challenges, Chandigarh AIr quality and urban mobility challenges, Chandigarh
AIr quality and urban mobility challenges, Chandigarh
 
Çerez Kasesi Çeşitleri
Çerez Kasesi ÇeşitleriÇerez Kasesi Çeşitleri
Çerez Kasesi Çeşitleri
 
Performance schema and sys schema
Performance schema and sys schemaPerformance schema and sys schema
Performance schema and sys schema
 
Gestão de Conflitos e Relacionamentos - versão compactada
Gestão de Conflitos e Relacionamentos - versão compactadaGestão de Conflitos e Relacionamentos - versão compactada
Gestão de Conflitos e Relacionamentos - versão compactada
 
сказка владислава ясалова
сказка владислава ясаловасказка владислава ясалова
сказка владислава ясалова
 

Similar to International Journal of Engineering Research and Development (IJERD)

International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)IJCSEA Journal
 
MATRIX CODE BASED MULTIPLE ERROR CORRECTION TECHNIQUE FOR N-BIT MEMORY DATA
MATRIX CODE BASED MULTIPLE ERROR CORRECTION TECHNIQUE FOR N-BIT MEMORY DATAMATRIX CODE BASED MULTIPLE ERROR CORRECTION TECHNIQUE FOR N-BIT MEMORY DATA
MATRIX CODE BASED MULTIPLE ERROR CORRECTION TECHNIQUE FOR N-BIT MEMORY DATAVLSICS Design
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...IOSR Journals
 
Implementation of Product Reed Solomon Codes for Multi level cell Flash contr...
Implementation of Product Reed Solomon Codes for Multi level cell Flash contr...Implementation of Product Reed Solomon Codes for Multi level cell Flash contr...
Implementation of Product Reed Solomon Codes for Multi level cell Flash contr...IOSR Journals
 
OCP Server Memory Channel Testing DRAFT
OCP Server Memory Channel Testing DRAFTOCP Server Memory Channel Testing DRAFT
OCP Server Memory Channel Testing DRAFTBarbara Aichinger
 
Error Detection and Correction in SRAM Cell Using Decimal Matrix Code
Error Detection and Correction in SRAM Cell Using Decimal Matrix CodeError Detection and Correction in SRAM Cell Using Decimal Matrix Code
Error Detection and Correction in SRAM Cell Using Decimal Matrix Codeiosrjce
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniquesDhanashriNandre
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Designing of telecommand system using system on chip soc for spacecraft contr...
Designing of telecommand system using system on chip soc for spacecraft contr...Designing of telecommand system using system on chip soc for spacecraft contr...
Designing of telecommand system using system on chip soc for spacecraft contr...IAEME Publication
 
Designing of telecommand system using system on chip soc for spacecraft contr...
Designing of telecommand system using system on chip soc for spacecraft contr...Designing of telecommand system using system on chip soc for spacecraft contr...
Designing of telecommand system using system on chip soc for spacecraft contr...IAEME Publication
 
Performance comparison of eg ldpc codes
Performance comparison of eg ldpc codesPerformance comparison of eg ldpc codes
Performance comparison of eg ldpc codesijcsity
 
Coding Scheme/ Information theory/ Error coding scheme
Coding Scheme/ Information theory/ Error coding schemeCoding Scheme/ Information theory/ Error coding scheme
Coding Scheme/ Information theory/ Error coding schemeskysunilyadav
 
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEM
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEMA NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEM
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEMVLSICS Design
 
FAULT SECURE ENCODER AND DECODER WITH CLOCK GATING
FAULT SECURE ENCODER AND DECODER WITH CLOCK GATINGFAULT SECURE ENCODER AND DECODER WITH CLOCK GATING
FAULT SECURE ENCODER AND DECODER WITH CLOCK GATINGVLSICS Design
 
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...ijsrd.com
 
Design & Check Cyclic Redundancy Code using VERILOG HDL
Design & Check Cyclic Redundancy Code using VERILOG HDLDesign & Check Cyclic Redundancy Code using VERILOG HDL
Design & Check Cyclic Redundancy Code using VERILOG HDLijsrd.com
 
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting TechniqueLossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting TechniqueIRJET Journal
 

Similar to International Journal of Engineering Research and Development (IJERD) (20)

International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computer Science, Engineering and Applications (IJCSEA)
 
MATRIX CODE BASED MULTIPLE ERROR CORRECTION TECHNIQUE FOR N-BIT MEMORY DATA
MATRIX CODE BASED MULTIPLE ERROR CORRECTION TECHNIQUE FOR N-BIT MEMORY DATAMATRIX CODE BASED MULTIPLE ERROR CORRECTION TECHNIQUE FOR N-BIT MEMORY DATA
MATRIX CODE BASED MULTIPLE ERROR CORRECTION TECHNIQUE FOR N-BIT MEMORY DATA
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
 
J0445255
J0445255J0445255
J0445255
 
Implementation of Product Reed Solomon Codes for Multi level cell Flash contr...
Implementation of Product Reed Solomon Codes for Multi level cell Flash contr...Implementation of Product Reed Solomon Codes for Multi level cell Flash contr...
Implementation of Product Reed Solomon Codes for Multi level cell Flash contr...
 
OCP Server Memory Channel Testing DRAFT
OCP Server Memory Channel Testing DRAFTOCP Server Memory Channel Testing DRAFT
OCP Server Memory Channel Testing DRAFT
 
ROUGH DOC.437
ROUGH DOC.437ROUGH DOC.437
ROUGH DOC.437
 
Error Detection and Correction in SRAM Cell Using Decimal Matrix Code
Error Detection and Correction in SRAM Cell Using Decimal Matrix CodeError Detection and Correction in SRAM Cell Using Decimal Matrix Code
Error Detection and Correction in SRAM Cell Using Decimal Matrix Code
 
Dx35705709
Dx35705709Dx35705709
Dx35705709
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniques
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Designing of telecommand system using system on chip soc for spacecraft contr...
Designing of telecommand system using system on chip soc for spacecraft contr...Designing of telecommand system using system on chip soc for spacecraft contr...
Designing of telecommand system using system on chip soc for spacecraft contr...
 
Designing of telecommand system using system on chip soc for spacecraft contr...
Designing of telecommand system using system on chip soc for spacecraft contr...Designing of telecommand system using system on chip soc for spacecraft contr...
Designing of telecommand system using system on chip soc for spacecraft contr...
 
Performance comparison of eg ldpc codes
Performance comparison of eg ldpc codesPerformance comparison of eg ldpc codes
Performance comparison of eg ldpc codes
 
Coding Scheme/ Information theory/ Error coding scheme
Coding Scheme/ Information theory/ Error coding schemeCoding Scheme/ Information theory/ Error coding scheme
Coding Scheme/ Information theory/ Error coding scheme
 
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEM
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEMA NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEM
A NOVEL APPROACH FOR LOWER POWER DESIGN IN TURBO CODING SYSTEM
 
FAULT SECURE ENCODER AND DECODER WITH CLOCK GATING
FAULT SECURE ENCODER AND DECODER WITH CLOCK GATINGFAULT SECURE ENCODER AND DECODER WITH CLOCK GATING
FAULT SECURE ENCODER AND DECODER WITH CLOCK GATING
 
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
FPGA Implementation of Viterbi Decoder using Hybrid Trace Back and Register E...
 
Design & Check Cyclic Redundancy Code using VERILOG HDL
Design & Check Cyclic Redundancy Code using VERILOG HDLDesign & Check Cyclic Redundancy Code using VERILOG HDL
Design & Check Cyclic Redundancy Code using VERILOG HDL
 
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting TechniqueLossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

International Journal of Engineering Research and Development (IJERD)

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 7, Issue 5 (June 2013), PP.77-81 77 Efficient Decoding Using Majority Gate Naveenraj.M1 , Aishwarya.E.J2 , 1PG Scholar, Sri Shakthi Institute of Engineering and Technology, Chinniampalayam, Coimbatore-641062 2 Assistant professor/ECE, Sri Shakthi Institute of Engineering and Technology, Chinniampalayam, Coimbatore- 641062 Abstract:- Normally decoding is done to correct errors present in the codeword by calculating syndrome. syndrome calculation for large size codeword makes decoding more complex. This paper presents an error detection and correction schemes using Majority Logic Decoding(MLD) which provides simple decoding process to detect and correct errors, the existing MLD requires number of clock cycles equal to size of codeword to detect error but the proposed decoding significantly reduces the iterations by detecting error within three clock cycles for any size of codeword using control logic .Also the proposed scheme uses detection logic to detect the uncorrectable codeword if error occured is more than actual capacity of system. Hence this makes error detection and correction schemes more efficient. Keywords:- Block codes, Error correction codes(ECCs),LowDensity Parity Check(LDPC) ,Majority logic Memory., I. INTRODUCTION The impact of technology scaling—smaller dimensions, higher integration densities, and lower operating voltages— has come to a level that reliability of memories is put into jeopardy, not only in extreme radiation environments like spacecraft and avionics electronics, but also at normal terrestrial environments [1], [2]. Especially, SRAM memory failure rates are increasing significantly, therefore posing a major reliability concern for many applications. Some commonly used mitigation techniques are: • triple modular redundancy (TMR); • error correction codes (ECCs). TMR is a special case of the von Neumann method [3] consisting of three versions of the design in parallel, with a majority voter selecting the correct output. As the method suggests, the complexity overhead would be three times plus the complexity of the majority voter and thus increasing the power consumption. For memories, it turned out that ECC codes are the best way to mitigate memory soft errors [2]. For terrestrial radiation environments where there is a lowsoft error rate (SER), codes like single error correction and double error detection (SEC–DED), are a good solution, due to their low encoding and decoding complexity. However, as a consequence of augmenting integration densities, there is an increase in the number of soft errors, which produces the need for higher error correction capabilities [4], [5]. The usual multierror correction codes, such as Reed–Solomon (RS) or Bose–Chaudhuri– Hocquenghem (BCH) are not suitable for this task. The reason for this is that they use more sophisticated decoding algorithms, like complex algebraic (e.g., floating point operations or logarithms) decoders that can decode in fixed time, and simple graph decoders, that use iterative algorithms (e.g., belief propagation). Both are very complex and increase computational costs [6]. Among the ECC codes that meet the requirements of higher error correction capability and low decoding complexity, cyclic block codes have been identified as good candidates, due to their property of being majority logic (ML) decodable [7], [8]. A subgroup of the low-density parity check (LDPC) codes, which belongs to the family of the ML decodable codes, has been researched in [9]–[11]. In this paper, we will focus on one specific type of LDPC codes, namely the difference-set cyclic codes (DSCCs), which is widely used in the Japanese teletext system or FM multiplex broadcasting systems [12]–[14]. The main reason for using ML decoding is that it is very simple to implement and thus it is very practical and has low complexity. The drawback of ML decoding is that, for a coded word of bits, it takes cycles in the decoding process, posing a big impact on system performance [6]. One way of coping with this problem is to implement parallel encoders and decoders. This solution would enormously increase the complexity and, therefore, the power consumption. As most of the memory reading accesses will have no errors, the decoder is most of the time working for no reason. This has motivated the use of a fault detector module [11] that checks if the codeword contains an error and then triggers the correction mechanism accordingly. In this case, only the faulty a codewords need correction, and therefore the average read memory access is speeded up, at the expense of an increase in hardware cost and power consumption. A similar proposal has been presented in [15] for the case of flash memories. The simplest way to
  • 2. Efficient Decoding Using Majority Gate 78 implement fault detector for an ECC is by calculating the syndrome, but this generally implies adding another very complex functional unit. This paper explores the idea of using the ML decoder circuitry as a fault detector so that read operations are accelerated with almost no additional. hardware cost II. EXISTING SYSTEM OVERVIEW MLD is based on a number of parity check equations which are orthogonal to each other, so that, at each iteration, each codeword bit only participates in one parity check equation, except the very first bit which contributes to all equations. For this reason, the majority result of these parity check equations decide the correctness of the current bit under decoding. MLD was first mentioned in [7] for the Reed–Müller codes. Then, it was extended and generalized in [8] for all types of systematic linear block codes that can be totally orthogonalized on each codeword bit. Initially, the data words are encoded and then stored in the memory. When the memory is read, codeword is then fed through the ML decoder before sent to the output for further processing. In this decoding process, the data word is corrected from all bit-flips that it might have suffered while being stored in the memory. There are two ways for implementing this type of decoder. The first one is called the Type-I ML decoder, which determines, upon XOR combinations of the syndrome, which bits need to be corrected [6]. The second one is the Type-II ML decoder that calculates directly out of the codeword bits the information of correctness of the current bit under decoding [6]. Both are quite similar but when it comes to implementation, the Type-II uses less area, as it does not calculate the syndrome as an intermediate step. Therefore, this paper focuses only on this one. Codes exist which are capable of correcting large number of random errors. Such codes are rarely used in practical data transmission systems ,however, because the equipments necessary to realize their capabilities, that is to actually correct the errors, is usually prohibited complex and expensive. The problem of finding simply implemented decoding algorithm is perhaps the outstanding unsolved problem today. Here a new class of random error correcting cyclic codes such as majority logic algorithm is defined. These codes can be decoded with the simplest decoding algorithm . As VLSI Technology scaling continues and the device dimensions keep shrinking, memories are more and more sensitive to soft errors. Memory cores have significant impact on chip reliability therefore error detection and correction techniques are commonly used for protecting the system against soft errors. Fig 1 Schematic of Existing MLD III. PLAIN MLD As described before, the ML decoder is a simple and powerful decoder, capable of correcting multiple random bit-flips depending on the number of parity check equations. It consists of four parts: 1) a cyclic shift register; 2) an XOR matrix; 3) a majority gate; and 4) an XOR for correcting the codeword bit under decoding, as illustrated in Fig. 1. The input signal is initially stored into the cyclic shift register and shifted through all the taps. The intermediate values in each tap are then used to calculate the results of the check sum equations from the XOR matrix. In the cycle, the result has reached the final tap, producing the output signal (which is the decoded version of input ). As stated before, input might correspond to wrong data corrupted by a soft error. To handle this situation, the decoder would behave as follows. After the initial step, in which the codeword is loaded into the cyclic shift register, the decoding starts by calculating the parity check equations hardwired in the XOR matrix. The resulting sums are then forwarded to the majority gate for evaluating its correctness. If the number of 1’s
  • 3. Efficient Decoding Using Majority Gate 79 received in is greater than the number of 0’s, that would mean that the current bit under decoding is wrong, and a signal to correct it would be triggered. Otherwise, the bit under decoding would be correct and no extra operations would be needed on it. In the next step, the content of the registers are rotated and the above procedure is repeated until all codeword bits have been processed. Finally, the parity check sums should be zero if the codeword has been correctly decoded. The previous algorithm needs as many cycles as the number of bits in the input signal, which is also the number of taps in the decoder. This is a big impact on the performance of the system, depending on the size of the code. For example, for a codeword of 73 bits, the decoding would take 73 cycles, which would be excessive for most applications. 3.1 Plain MLD with syndrome fault detector In order to improve the decoder performance, alternative designs may be used. One possibility is to add a fault detector by calculating the syndrome, so that only faulty codewords are decoded [11]. Since most of the codewords will be error-free, no further correction will be needed, and therefore performance will not be affected. Although the implementation of an SFD reduces the average latency of the decoding process, it also adds complexity to the design. The SFD is an XOR matrix that calculates the syndrome based on the parity check matrix. Each parity bit results in a syndrome equation. Therefore, the complexity of the syndrome calculator increases with the size of the code.A faulty codeword is detected when at least one of the syndrome bits is ―1.‖ This triggers the MLD to start the decoding, as explained before. On the other hand, if the codeword is error-free, it is forwarded directly to the output, thus saving the correction cycles. In this way, the performance is improved in exchange of an additional module in the memory system: a matrix of XOR gates to resolve the parity check matrix, where each check bit results into a syndrome equation. This finally results in a quite complex module, with a large amount of additional hardware and power consumption in the system. IV. PROPOSED SYSTEM This section presents a modified version of the ML decoder that improves the designs presented before. Starting from the original design of the ML decoder introduced in [8], the proposed ML detector/decoder (MLDD) has been implemented using the difference-set cyclic codes (DSCCs) [16]–[19]. This code is part of the LDPC codes, and, based on their attributes, they have the following properties: • Ability to correct large number of errors, sparse encoding, decoding and checking circuits synthesizable into simple hardware; • modular encoder and decoder blocks that allow an efficient hardware implementation; • systematic code structure for clean partition of information and code bits in the memory. Given a word read from a memory protected with DSCC codes, and affected by up to four bit-flips, all errors can be detected in only three decoding cycles. This is a huge improvement over the simpler case, where N decoding cycles are needed to guarantee that errors are detected. The figure1 shows the basic ML decoder with an -tap shift register, an XOR array to calculate the orthogonal parity check sums and a majority gate for deciding if the current bit under decoding needs to be inverted. Those components are the same as the ones for the plain ML decoder . The additional hardware to perform the error detection is illustrated in Fig. 2 as: i) the control unit which triggers a finish flag when no errors are detected after the third cycle and ii) the output tristate buffers. The output tristate buffers are always in high impedance unless the control unit sends the finish signal so that the current values of the shift register are forwarded to the output . 4.1 Control and Detection logic The control unit manages the detection process. It uses a counter that counts up to three, which distinguishes the first three iterations of the ML decoding. In these first three iterations, the control unit evaluates the by combining them with the OR1 function. This value is fed into a three-stage shift register, which holds the results of the last three cycles. In the third cycle, the OR2 gate evaluates the content of the detection register. When the result is ―0,‖ the FSM sends out the finish signal indicating that the processed word is error-free. In the other case, if the result is ―1,‖ the ML decoding process runs until the end. This clearly provides a performance improvement respect to the traditional method. Most of the words would only take three cycles (four, if we consider the other two for input/output) and only those with errors (which should be a minority) would need to perform the whole decoding process.
  • 4. Efficient Decoding Using Majority Gate 80 The detection logic provides the information about whether codeword is correctable or not .consider that system is able to detect up to four bits but codeword contains six bit error means detection logic produces output as uncorrectable codeword, suppose the codeword contains four or less number of bits means it produces output as correctable codeword .This makes the error detection schemes more efficient than existing decoding process. An error-correcting code (ECC) or forward error correction (FEC) code is a system of adding redundant data, or parity data, to a message, such that it can be recovered by a receiver even when a number of errors (up to the capability of the code being used) were introduced, either during the process of transmission, or on storage. Since the receiver does not have to ask the sender for retransmission of the data, a back-channel is not required in forward error correction, and it is therefore suitable for simplex communication such as broadcasting. Error-correcting codes are frequently used in lower-layer communication, as well as for reliable storage in media such as CDs, DVDs, hard disks, and RAM. Fig 2 .Proposed MLD scheme V. SIMULATIONS USING MODELSIM ModelSim is a powerful simulator that can be used to simulate the behavior and performance of logic circuits. The simulator allows the user to apply inputs to the designed circuit, usually referred to as test vectors, and to observe the outputs generated in response. The user can use the Waveform Editor to represent the input signals as waveforms. ModelSim is a simulation and debugging environment created by Mentor Graphics. ModelSim allows you to check the syntax and verify the functionality of VHDL programs. ModelSim VHDL supports both the IEEE 1076-1987 and 1076-1993 VHDL, the 1164-1993 Standard Multivalue Logic System for VHDL Interoperability, and the 1076.2-1996 Standard VHDL Mathematical Packages standards. Any design developed with ModelSim will be compatible with any other VHDL system that is compliant with either IEEE Standard 1076-1987 or 1076-1993. ModelSim Verilog is based on IEEE Std 1364-1995 and a partial implementation of 1364-2001 (see /<install_dir>/modeltech/docs/technotes/vlog_2001.note for implementation details) Standard Hardware Description Language. The Open Verilog International Verilog LRM version 2.0 is also applicable to a large extent. Both PLI (Programming Language Interface) and VCD (Value Change Dump) are supported for ModelSim PE and SE users. 5.1. Simulation Result and Analysis Fig 3 Simulation result of existing MLD Simulation results of existing MLD shows that the detection of error takes number of cycles equal to size of codeword even if there is no error in the data .This leads to large area and power consumption and results in complexity of decoding process . The codeword of size 73 contains no error but the existing MLD takes 73 iterations to detect the error so that efficiency of decoding process is reduced in this scheme.
  • 5. Efficient Decoding Using Majority Gate 81 Fig 4 Result of Control Logic The above simulation result shows that proposed MLD in which the error is detected within three cycles .This significantly reduces area and power consumption of the system. The Error free codeword size is 73 but proposed MLD takes only three iterations to detect error in all 73 bits. The control logic sends finish signal if there is no error in the data after three iterations .Hence proposed MLD has better decoding process than existing MLD. Fig 5 Result of Detection logic The above simulation result shows that proposed MLD with Detection logic which displays result as uncorrectable codeword because the system is able to detect up to 4 bits only but the codeword contains six bit errors Hence detection logic display produces this output after completion of entire clock cycles REFERENCES [1]. C. W. Slayman, ―Cache and memory error detection, correction, and reduction techniques for terrestrial servers and workstations,‖ IEEE Trans. Device Mater. Reliabil., vol. 5, no. 3, pp. 397–404, Sep. 2005. [2]. R. C. Baumann, ―Radiation-induced soft errors in advanced semiconductor technologies,‖ IEEE Trans. Device Mater. Reliabil., vol. 5, no.3, pp. 301–316, Sep. 2005. [3]. J. von Neumann, ―Probabilistic logics and synthesis of reliable organisms from unreliable components,‖ Automata Studies, pp. 43–98, 1956. [4]. M. A. Bajura et al., ―Models and algorithmic limits for an ECC-based approach to hardening sub-100- nm SRAMs,‖ IEEE Trans. Nucl. Sci.,vol. 54, no. 4, pp. 935–945, Aug. 2007. [5]. R. Naseer and J. Draper, ―DEC ECC design to improve memory reliability in sub-100 nm technologies,‖ in Proc. IEEE ICECS, 2008, pp.586–589. [6]. S. Lin and D. J. Costello, Error Control Coding, 2nd ed. Englewood Cliffs, NJ: Prentice-Hall, 2004. [7]. I. S. Reed, ―A class of multiple-error-correcting codes and the decoding scheme,‖ IRE Trans. Inf. Theory, vol. IT-4, pp. 38–49, 1954. [8]. J. L. Massey, Threshold Decoding. Cambridge, MA: MIT Press, 1963. [9]. S. Ghosh and P. D. Lincoln, ―Low-density parity check codes for error correction in nanoscale memory,‖ SRI Comput. Sci. Lab. Tech. Rep.CSL-0703, 2007. [10]. B. Vasic and S. K. Chilappagari, ―An information theoretical framework for analysis and design of nanoscale fault-tolerant memories based on low-density parity-check codes,‖ IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 54, no. 11, pp. 2438–2446, Nov. 2007. [11]. H. Naeimi and A. DeHon, ―Fault secure encoder and decoder for NanoMemory applications,‖ IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 17, no. 4, pp. 473–486, Apr. 2009. [12]. Y. Kato and T. Morita, ―Error correction circuit using difference-set cyclic code,‖ in Proc. ASP-DAC, 2003, pp. 585–586. [13]. T. Kuroda, M. Takada, T. Isobe, and O. Yamada, ―Transmission scheme of high-capacity FM multiplex broadcasting system,‖ IEEE Trans. Broadcasting, vol. 42, no. 3, pp. 245–250, Sep. 1996. [14]. O. Yamada, ―Development of an error-correction method for data packet multiplexed with TV signals,‖ IEEE Trans. Commun., vol. COM-35, no. 1, pp. 21–31, Jan. 1987. [15]. P. Ankolekar, S. Rosner, R. Isaac, and J. Bredow, ―Multi-bit error correction methods for latency- contrained flash memory systems,‖ IEEETrans. Device Mater. Reliabil., vol. 10, no. 1, pp. 33–39, Mar. 2010.