SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7573
A SURVEY ON ENCODE-COMPARE AND DECODE-COMPARE
ARCHITECTURE FOR TAG MATCHING IN CACHE MEMORY USING ERROR
CORRECTING CODES
K.L. Deepa priya1, V. Chandrasekaran2, M. Parimala Devi3, S. Pavithra4
1. Second Year- M.E. (Applied Electronics), Velalar College of Engineering and Technology, Erode, Tamil Nadu,
India.
2. Professor and HOD, Medical Electronics department, Velalar College of Engineering and Technology, Erode,
Tamil Nadu, India.
3,4. Assistant Professor (Sl.Gr.), Department of ECE, Velalar College of Engineering and Technology, Erode, Tamil
Nadu, India.
------------------------------------------------------------------------------***---------------------------------------------------------------------------
Abstract- Modern microprocessor performance will be
improved, if the cache memories serve as accelerators. Due
to technology scaling, caches are unarmed to soft errors.
In tag matching cache, there are different types of
architectures used and they are encode-compare
architecture and decode-compare architecture based on
direct compare method. This paper compares the encode-
compare and decode-compare architecture using various
performance metrics.
Keywords:
Tag matching, Cache memory, Hamming
distance, Error correcting codes, Translation Look aside
Buffer (TLB).
1. INTRODUCTION
In cache tag matching, currently microprocessor
caches are set-associative caches. A set associative cache
has a tag directory and a data array. The tag directory
stores tag addresses which are used to indicate which
part of memory is stored in the data array. When an
access is made to the cache, the set-address portion of
the entire address is used to index into the tag directory
and a set of tags (the number of tags read depends on the
associativity) are read.
These tags are compared with the tag field of the
incoming address to see if there is a match. When the
entry is valid and a retrieved tag matches the incoming
address tag field, then there is a “cache hit”. If the
incoming address tag field does not match with any of
the stored tag, a “cache miss” happens.
Hamming code is one of the popular techniques
based on forward error correction [1]. The recent
computer employs Error-Correcting codes (ECC) to
protect data and improve reliability [2]-[5]. Error
detection is that the detection of errors caused by noise
or different impairments throughout transmission from
the transmitter to the receiver.
Error correction is that the detection of errors and
reconstruction of the initial, error-free data. Good error
management performance needs the theme to support
the characteristics of the communication.
Common channel models embrace memory-less
models wherever errors occur willy-nilly and with a
particular chance and dynamic models wherever errors
occur primarily in bursts.
Consequently, error-detecting and correcting codes
are often typically distinguished between random-error-
detecting/correcting and burst-error-
detecting/correcting. Some codes may also be
appropriate for a mix of random errors and burst errors.
When the data rate cannot be determined or it is
highly variable, an error-detection scheme may be
combined with a system for retransmission of erroneous
data. This is referred to as Automatic Repeat Request
(ARQ) and is most notably utilized in the web.
An alternate approach to error control is a Hybrid
Automatic Repeat Request (HARQ), which is a
combination of ARQ and error-correction coding.
Error-Correcting Codes area unit sometimes
distinguished between convolutional codes and block
codes:
 Convolutional codes are processed on bit-
by-bit basis. They are significantly
appropriate for implementation in
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7574
hardware and therefore the Viterbi decoder
permits best secret writing.
 Block codes are processed on block-by-
block basis. Repetition codes, hamming
codes and multi-dimensional parity-check
codes are the early examples of Block codes.
They were followed by variety of
economical codes, Reed–Solomon codes
being the most notable due to their current
widespread use. Turbo codes and Low-
Density Parity-check Codes (LDPC) area unit
comparatively new constructions that may
offer nearly best potency.
2. BASIC DEFINITIONS
2.1 Hamming distance
The Hamming distance between 2 strings of
equal length is that the range of positions at that the
corresponding symbols square measure totally different.
In a different way, it measures the minimum
range of substitutions needed to vary one string into the
opposite or the minimum range of errors that would
have reworked one string into the other.
Examples
The Hamming distance between:
 "Karolin" and "Kathrin" is 3.
 "Karolin" and "Kerstin" is 3.
 1011101 and 1001001 is 2.
 2173896 and 2233796 is 3.
2.2 Saturation adder
Saturation adder could be a version of
arithmetic during which all operations like addition and
multiplication are restricted to a set vary between a
minimum and most worth.
For example, if the valid vary of values is from -100
to one hundred, the subsequent operations manufacture
the subsequent values:
 60 + 30 = 90
 60 + 43 = 100
Figure 1 shows the (4, 2) saturation adder diagram.
Fig-1: (4,2) Saturation Adder
By logic reduction, the logic equation for this (4,
2) saturating adder is given by,
Carry=Ca +Cb+SaSb
Sum=Sa +Sb+CaSa+CbSb
2.3 Encoder
A simple encoder circuit can receive a single
active input out of 2n input lines and generate binary
code on n parallel output lines. For example, single bit 4
to 2 encoder takes in 4 bits and outputs 2 bits and it is
shown in Figure 2.
Fig-2: 4 to 2 Encoder
2.4 Decoder
It is a combinational circuit that converts the
binary information from n input lines to a maximum of
2n unique output lines and it is shown in Figure 3.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7575
Fig-3: 2 to 4 Decoder
3. ENCODE AND COMPARE
ARCHITECTURE
Decoding takes longer time than secret writing
because it encompasses a series of error detection or
syndrome calculation and error correction. To resolve
the drawbacks of the decode and compare architecture,
the decoding of a retrieved codeword is replaced with
the encoding of an incoming tag in the encode-and-
compare architecture as shown in Figure 4.
More precisely, a k-bit incoming tag is first
encoded in the corresponding n-bit codeword and
compared with the retrieved codeword as shown in
Figure 4.
Fig -4: Encode and Compare Architecture
The comparison is to look at what number bits
the 2 codewords dissent, not to check if the two
codewords are exactly equal to each other. For this, there
is a tendency to work out the overacting distance d
between the 2 codewords and classify the cases
consistent with the distance of ‘d’.
Let tmax and rmax denote the numbers of maximally
correctable and detectable errors, respectively. The
cases are summarized as follows.
 If d = 0, X matches Y exactly.
 If 0 <d ≤ tmax, X will match Y provided at most
tmax errors in Y are corrected.
 If tmax<d ≤ rmax, Y has detectable but
uncorrectable errors. In this case, the cache may
issue a system fault, so as to make the central
processing unit take a proper action.
 If rmax<d, X does not match Y
Assuming that the incoming address has no errors, 2
tags are regarded as matched if ‘d’ is in either the
primary or the second ranges. In this way, while
maintaining the error-correcting capability, the
architecture can remove the decoder from its critical
path at the cost of an encoder being newly introduced.
Note that the encoder is, in general, much simpler
than the decoder, and thus the encoding cost is
significantly less than the decoding cost.
Since the above method needs to compute the
Hamming distance, presented a circuit dedicated to the
computation.
Fig -5: SA based architecture supporting the direct
compare method
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7576
The circuit shown in Figure 5 performs XOR
operations for each try of bits in X and Y thus on
generate a vector representing the bitwise distinction of
two codewords. The following half adder (HA) is used to
count the number of 1’s in two adjacent bits in the
vector.
The numbers of 1’s is accumulated by passing
through the following SA tree [6]. In the SA tree, the
accumulated value z is saturated to rmax+ 1 if it exceeds
rmax. More precisely, given inputs x and y, z can be
expressed as follows:
{ (1)
The final accumulated value indicates the range of d.
As the compulsory saturation necessitates additional
logic circuitry, the complexity of a SA is higher than the
conventional adder.
4. DECODE AND COMPARE
ARCHITECTURE
A cache memory is considered where a k-bit tag is
stored in the form of an-bit codeword after being
encoded with a (n, k) code. In the decode-and-compare
architecture, the n-bit retrieved codeword should first be
decoded to extract the original k-bit tag. The extracted k-
bit tag is then compared to the k-bit tag field of an
incoming address to determine whether the tags are
matched or not.
Fig -6: Decode and Compare Architecture
As the retrieved codeword should go through the
decoder before being compared with the incoming tag,
the critical path is too long to be employed in a practical
cache system designed for high-speed access. Since the
decoder is one of the most complicated processing
elements, in addition, the complexity overhead is not
negligible. The decode compare architecture [8] is shown
in Figure 6.
5. DISCUSSION
Results are discussed in the table shown below.
6. CONCLUSION
Decoder is complex than encoder and the complexity
overhead is not negligible. Decoding cost is more than
encoding cost. Decoder will increase the critical path for
high speed access.
Encoder is simpler than decoder and the complexity
overhead is negligible. In Encode-compare architecture,
the decoder is removed by introducing an encoder.
Encoding cost is significantly less than decoding cost.
Comparing encoder and decoder architecture,
encoder architecture is the most efficient one and it has
less complexity and less cost.
REFERENCES
[1] Aswathi D and Keerthi Sahadevan, “An Efficient
Low Complexity Low Latency Architecture for
Matching of Data Encoded with Error Correcting
Code Using a Cache Memory”, Int. Journal of
Engineering Research and Application, Vol. 6,
Issue 10, (Part -3) October 2016, pp.82-85.
ENCODE-COMPARE
ARCHITECTURE
DECODE-COMPARE
ARCHITECTURE
Encoder is simpler than
decoder
Decoder is complex than
encoder
TheComplexity
overhead is negligible.
The Complexity
overhead is not
negligible.
In encode-compare
architecture, the
decoder is removed by
introducing an encoder.
For high speed access,
the decoder will
increase the critical
path.
Encoding cost is
significantly less.
Decoding cost is more.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7577
[2] Chang, J., Huang, M., Shoemaker, J., Benoit, J.,
Chen, S.L., Chen,W., Chiu, S., Ganesan, R., Leong,
G., Lukka, V., Rusu, S. and Srivastava, D.
(2007),''The 65-nm 16-MB shared on-die L3
cache for the dual-core Intel xeon Processor
7100 series'', IEEE J. Solid-state Circuits, Vol. 42,
No. 4, pp. 846–852.
[3] Warnock, J.D., Chan, Y. H., Carey, S.M., Wen, H.,
Meaney, P.J., Gerwig, G., Smith, H.H., Chan, Y.H.,
Davis, J., Bunce, P., Pelella, A., Rodko, D., Patel, P.,
Strach, T., Malone, D., Malgioglio, F., Neves, J.,
Rude, D.L. and Huott, W.V. (2012), ''Circuit and
physical design implementation of the
microprocessor chip for the
Enterprisesystem'',IEEE J. Solid-state Circuits,
Vol. 47, No. 1, pp. 151–163.
[4] Ando, H., Yoshida, Y., Inoue, A., Sugiyama, I.,
Asakawa, T., Morita, K., Muta, T. And
Motokurumada, T., Okada, S., Yamashita, H., and
Satsukawa, Y. (2003), '' A 1.3 GHz fifth
generation SPARC64
microprocessor'',IEEEISSCC. Dig. Tech. Papers,
pp. 246–247.
[5] Tremblay and M. Andchaudhry, S. (2008), ''A
third-generation 65nm 16-core 32-thread plus
32-Scout-thread CMT SPARC processor. ISSCC.
Dig. Tech. Papers, pp. 82–83.
[6] Wu, W., Somasekhar, D. and Lu, S.L. (2012),
''Direct compare of information coded with
error-correcting codes'', IEEE Trans. Very Large
Scale Integr. (VLSI) Syst., Vol. 20, No. 11, pp.
2147–2151.
[7] Pedro Reviriego, Salvatore Pontarelli, Juan
Antonio Maestro, and Marco Ottavi (2013), ''A
Method to Construct Low Delay Single Error
Correction Codes for Protecting Data Bits Only'',
IEEE Transactions on Computer-Aided Design of
Integrated Circuits and Systems, Vol. 32, No. 3.
[8] Mary Francy Joseph and Anith Mohan (2016),
''Improved Architecture for Tag Matching in
Cache memory Coded with Error Correcting
Codes'', Global Colloquium in Recent
Advancement and Effectual Researches in
Engineering, Science and Technology (RAEREST
2016), pp.544 – 551.

More Related Content

What's hot

A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
eSAT Journals
 
Fpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoderFpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoder
eSAT Journals
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Combining cryptography with channel coding to reduce complicity
Combining cryptography with channel coding to reduce complicityCombining cryptography with channel coding to reduce complicity
Combining cryptography with channel coding to reduce complicity
IAEME Publication
 
Fpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoderFpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoder
eSAT Publishing House
 
IRJET- Review Paper on Study of Various Interleavers and their Significance
IRJET- Review Paper on Study of Various Interleavers and their SignificanceIRJET- Review Paper on Study of Various Interleavers and their Significance
IRJET- Review Paper on Study of Various Interleavers and their Significance
IRJET Journal
 
UNIT-3 : CHANNEL CODING
UNIT-3 : CHANNEL CODINGUNIT-3 : CHANNEL CODING
UNIT-3 : CHANNEL CODING
abhishek reddy
 
Modified Golomb Code For Integer Representation
Modified Golomb Code For Integer RepresentationModified Golomb Code For Integer Representation
Modified Golomb Code For Integer Representation
IJSRD
 
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
IJERA Editor
 
Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...
Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...
Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...
TELKOMNIKA JOURNAL
 
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSMAn Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
Associate Professor in VSB Coimbatore
 
Ijetcas14 378
Ijetcas14 378Ijetcas14 378
Ijetcas14 378
Iasir Journals
 
E42032732
E42032732E42032732
E42032732
IJERA Editor
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
C6 agramakrishnan1
C6 agramakrishnan1C6 agramakrishnan1
C6 agramakrishnan1
Jasline Presilda
 
Design and implementation of log domain decoder
Design and implementation of log domain decoder Design and implementation of log domain decoder
Design and implementation of log domain decoder
IJECEIAES
 
IRJET- Two Layer QR Code with Picture Embedding
IRJET-  	  Two Layer QR Code with Picture EmbeddingIRJET-  	  Two Layer QR Code with Picture Embedding
IRJET- Two Layer QR Code with Picture Embedding
IRJET Journal
 
MODIFIED GOLDEN CODES FOR IMPROVED ERROR RATES THROUGH LOW COMPLEX SPHERE DEC...
MODIFIED GOLDEN CODES FOR IMPROVED ERROR RATES THROUGH LOW COMPLEX SPHERE DEC...MODIFIED GOLDEN CODES FOR IMPROVED ERROR RATES THROUGH LOW COMPLEX SPHERE DEC...
MODIFIED GOLDEN CODES FOR IMPROVED ERROR RATES THROUGH LOW COMPLEX SPHERE DEC...
cscpconf
 
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC CodesPerformance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
idescitation
 
Iisrt jona priyaa(1 5)
Iisrt jona priyaa(1 5)Iisrt jona priyaa(1 5)
Iisrt jona priyaa(1 5)
IISRT
 

What's hot (20)

A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
 
Fpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoderFpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoder
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Combining cryptography with channel coding to reduce complicity
Combining cryptography with channel coding to reduce complicityCombining cryptography with channel coding to reduce complicity
Combining cryptography with channel coding to reduce complicity
 
Fpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoderFpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoder
 
IRJET- Review Paper on Study of Various Interleavers and their Significance
IRJET- Review Paper on Study of Various Interleavers and their SignificanceIRJET- Review Paper on Study of Various Interleavers and their Significance
IRJET- Review Paper on Study of Various Interleavers and their Significance
 
UNIT-3 : CHANNEL CODING
UNIT-3 : CHANNEL CODINGUNIT-3 : CHANNEL CODING
UNIT-3 : CHANNEL CODING
 
Modified Golomb Code For Integer Representation
Modified Golomb Code For Integer RepresentationModified Golomb Code For Integer Representation
Modified Golomb Code For Integer Representation
 
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
 
Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...
Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...
Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...
 
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSMAn Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
An Efficient Low Power Convolutional Coding with Viterbi Decoding using FSM
 
Ijetcas14 378
Ijetcas14 378Ijetcas14 378
Ijetcas14 378
 
E42032732
E42032732E42032732
E42032732
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
C6 agramakrishnan1
C6 agramakrishnan1C6 agramakrishnan1
C6 agramakrishnan1
 
Design and implementation of log domain decoder
Design and implementation of log domain decoder Design and implementation of log domain decoder
Design and implementation of log domain decoder
 
IRJET- Two Layer QR Code with Picture Embedding
IRJET-  	  Two Layer QR Code with Picture EmbeddingIRJET-  	  Two Layer QR Code with Picture Embedding
IRJET- Two Layer QR Code with Picture Embedding
 
MODIFIED GOLDEN CODES FOR IMPROVED ERROR RATES THROUGH LOW COMPLEX SPHERE DEC...
MODIFIED GOLDEN CODES FOR IMPROVED ERROR RATES THROUGH LOW COMPLEX SPHERE DEC...MODIFIED GOLDEN CODES FOR IMPROVED ERROR RATES THROUGH LOW COMPLEX SPHERE DEC...
MODIFIED GOLDEN CODES FOR IMPROVED ERROR RATES THROUGH LOW COMPLEX SPHERE DEC...
 
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC CodesPerformance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
Performance Analysis of Steepest Descent Decoding Algorithm for LDPC Codes
 
Iisrt jona priyaa(1 5)
Iisrt jona priyaa(1 5)Iisrt jona priyaa(1 5)
Iisrt jona priyaa(1 5)
 

Similar to IRJET- A Survey on Encode-Compare and Decode-Compare Architecture for Tag Matching in Cache Memory using Error Correcting Codes

E010422834
E010422834E010422834
E010422834
IOSR Journals
 
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
ijmnct
 
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
ijmnct_journal
 
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
International Journal of Reconfigurable and Embedded Systems
 
Reed Solomon Coding For Error Detection and Correction
Reed Solomon Coding For Error Detection and CorrectionReed Solomon Coding For Error Detection and Correction
Reed Solomon Coding For Error Detection and Correction
inventionjournals
 
New Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar CodesNew Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar Codes
ijwmn
 
New Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar CodesNew Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar Codes
ijwmn
 
New Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar CodesNew Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar Codes
ijwmn
 
Simulation of Turbo Convolutional Codes for Deep Space Mission
Simulation of Turbo Convolutional Codes for Deep Space MissionSimulation of Turbo Convolutional Codes for Deep Space Mission
Simulation of Turbo Convolutional Codes for Deep Space Mission
IJERA Editor
 
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationHigh Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
MangaiK4
 
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationHigh Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
MangaiK4
 
An efficient reconfigurable code rate cooperative low-density parity check co...
An efficient reconfigurable code rate cooperative low-density parity check co...An efficient reconfigurable code rate cooperative low-density parity check co...
An efficient reconfigurable code rate cooperative low-density parity check co...
IJECEIAES
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniques
DhanashriNandre
 
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
IRJET Journal
 
Fpga implementation of (15,7) bch encoder and decoder for text message
Fpga implementation of (15,7) bch encoder and decoder for text messageFpga implementation of (15,7) bch encoder and decoder for text message
Fpga implementation of (15,7) bch encoder and decoder for text message
eSAT Journals
 
Fpga implementation of (15,7) bch encoder and decoder
Fpga implementation of (15,7) bch encoder and decoderFpga implementation of (15,7) bch encoder and decoder
Fpga implementation of (15,7) bch encoder and decoder
eSAT Publishing House
 
Design and Implementation of DMC for Memory Reliability Enhancement
Design and Implementation of DMC for Memory Reliability EnhancementDesign and Implementation of DMC for Memory Reliability Enhancement
Design and Implementation of DMC for Memory Reliability Enhancement
IRJET Journal
 
IRJET-Error Detection and Correction using Turbo Codes
IRJET-Error Detection and Correction using Turbo CodesIRJET-Error Detection and Correction using Turbo Codes
IRJET-Error Detection and Correction using Turbo Codes
IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital MemoriesAn Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories
IJERA Editor
 

Similar to IRJET- A Survey on Encode-Compare and Decode-Compare Architecture for Tag Matching in Cache Memory using Error Correcting Codes (20)

E010422834
E010422834E010422834
E010422834
 
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
 
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
 
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
 
Reed Solomon Coding For Error Detection and Correction
Reed Solomon Coding For Error Detection and CorrectionReed Solomon Coding For Error Detection and Correction
Reed Solomon Coding For Error Detection and Correction
 
New Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar CodesNew Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar Codes
 
New Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar CodesNew Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar Codes
 
New Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar CodesNew Structure of Channel Coding: Serial Concatenation of Polar Codes
New Structure of Channel Coding: Serial Concatenation of Polar Codes
 
Simulation of Turbo Convolutional Codes for Deep Space Mission
Simulation of Turbo Convolutional Codes for Deep Space MissionSimulation of Turbo Convolutional Codes for Deep Space Mission
Simulation of Turbo Convolutional Codes for Deep Space Mission
 
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationHigh Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
 
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationHigh Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
 
An efficient reconfigurable code rate cooperative low-density parity check co...
An efficient reconfigurable code rate cooperative low-density parity check co...An efficient reconfigurable code rate cooperative low-density parity check co...
An efficient reconfigurable code rate cooperative low-density parity check co...
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniques
 
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
 
Fpga implementation of (15,7) bch encoder and decoder for text message
Fpga implementation of (15,7) bch encoder and decoder for text messageFpga implementation of (15,7) bch encoder and decoder for text message
Fpga implementation of (15,7) bch encoder and decoder for text message
 
Fpga implementation of (15,7) bch encoder and decoder
Fpga implementation of (15,7) bch encoder and decoderFpga implementation of (15,7) bch encoder and decoder
Fpga implementation of (15,7) bch encoder and decoder
 
Design and Implementation of DMC for Memory Reliability Enhancement
Design and Implementation of DMC for Memory Reliability EnhancementDesign and Implementation of DMC for Memory Reliability Enhancement
Design and Implementation of DMC for Memory Reliability Enhancement
 
IRJET-Error Detection and Correction using Turbo Codes
IRJET-Error Detection and Correction using Turbo CodesIRJET-Error Detection and Correction using Turbo Codes
IRJET-Error Detection and Correction using Turbo Codes
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital MemoriesAn Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
Indrajeet sahu
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
Addu25809
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
Kamal Acharya
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
Dwarkadas J Sanghvi College of Engineering
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
upoux
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
ijseajournal
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
2. protection of river banks and bed erosion protection works.ppt
2. protection of river banks and bed erosion protection works.ppt2. protection of river banks and bed erosion protection works.ppt
2. protection of river banks and bed erosion protection works.ppt
abdatawakjira
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
vmspraneeth
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
upoux
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
AlvianRamadhani5
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Transcat
 

Recently uploaded (20)

An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
Open Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surfaceOpen Channel Flow: fluid flow with a free surface
Open Channel Flow: fluid flow with a free surface
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENTNATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
NATURAL DEEP EUTECTIC SOLVENTS AS ANTI-FREEZING AGENT
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
Accident detection system project report.pdf
Accident detection system project report.pdfAccident detection system project report.pdf
Accident detection system project report.pdf
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
一比一原版(osu毕业证书)美国俄勒冈州立大学毕业证如何办理
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
2. protection of river banks and bed erosion protection works.ppt
2. protection of river banks and bed erosion protection works.ppt2. protection of river banks and bed erosion protection works.ppt
2. protection of river banks and bed erosion protection works.ppt
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
 
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
一比一原版(uofo毕业证书)美国俄勒冈大学毕业证如何办理
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf5G Radio Network Througput Problem Analysis HCIA.pdf
5G Radio Network Througput Problem Analysis HCIA.pdf
 
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...
 

IRJET- A Survey on Encode-Compare and Decode-Compare Architecture for Tag Matching in Cache Memory using Error Correcting Codes

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7573 A SURVEY ON ENCODE-COMPARE AND DECODE-COMPARE ARCHITECTURE FOR TAG MATCHING IN CACHE MEMORY USING ERROR CORRECTING CODES K.L. Deepa priya1, V. Chandrasekaran2, M. Parimala Devi3, S. Pavithra4 1. Second Year- M.E. (Applied Electronics), Velalar College of Engineering and Technology, Erode, Tamil Nadu, India. 2. Professor and HOD, Medical Electronics department, Velalar College of Engineering and Technology, Erode, Tamil Nadu, India. 3,4. Assistant Professor (Sl.Gr.), Department of ECE, Velalar College of Engineering and Technology, Erode, Tamil Nadu, India. ------------------------------------------------------------------------------***--------------------------------------------------------------------------- Abstract- Modern microprocessor performance will be improved, if the cache memories serve as accelerators. Due to technology scaling, caches are unarmed to soft errors. In tag matching cache, there are different types of architectures used and they are encode-compare architecture and decode-compare architecture based on direct compare method. This paper compares the encode- compare and decode-compare architecture using various performance metrics. Keywords: Tag matching, Cache memory, Hamming distance, Error correcting codes, Translation Look aside Buffer (TLB). 1. INTRODUCTION In cache tag matching, currently microprocessor caches are set-associative caches. A set associative cache has a tag directory and a data array. The tag directory stores tag addresses which are used to indicate which part of memory is stored in the data array. When an access is made to the cache, the set-address portion of the entire address is used to index into the tag directory and a set of tags (the number of tags read depends on the associativity) are read. These tags are compared with the tag field of the incoming address to see if there is a match. When the entry is valid and a retrieved tag matches the incoming address tag field, then there is a “cache hit”. If the incoming address tag field does not match with any of the stored tag, a “cache miss” happens. Hamming code is one of the popular techniques based on forward error correction [1]. The recent computer employs Error-Correcting codes (ECC) to protect data and improve reliability [2]-[5]. Error detection is that the detection of errors caused by noise or different impairments throughout transmission from the transmitter to the receiver. Error correction is that the detection of errors and reconstruction of the initial, error-free data. Good error management performance needs the theme to support the characteristics of the communication. Common channel models embrace memory-less models wherever errors occur willy-nilly and with a particular chance and dynamic models wherever errors occur primarily in bursts. Consequently, error-detecting and correcting codes are often typically distinguished between random-error- detecting/correcting and burst-error- detecting/correcting. Some codes may also be appropriate for a mix of random errors and burst errors. When the data rate cannot be determined or it is highly variable, an error-detection scheme may be combined with a system for retransmission of erroneous data. This is referred to as Automatic Repeat Request (ARQ) and is most notably utilized in the web. An alternate approach to error control is a Hybrid Automatic Repeat Request (HARQ), which is a combination of ARQ and error-correction coding. Error-Correcting Codes area unit sometimes distinguished between convolutional codes and block codes:  Convolutional codes are processed on bit- by-bit basis. They are significantly appropriate for implementation in
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7574 hardware and therefore the Viterbi decoder permits best secret writing.  Block codes are processed on block-by- block basis. Repetition codes, hamming codes and multi-dimensional parity-check codes are the early examples of Block codes. They were followed by variety of economical codes, Reed–Solomon codes being the most notable due to their current widespread use. Turbo codes and Low- Density Parity-check Codes (LDPC) area unit comparatively new constructions that may offer nearly best potency. 2. BASIC DEFINITIONS 2.1 Hamming distance The Hamming distance between 2 strings of equal length is that the range of positions at that the corresponding symbols square measure totally different. In a different way, it measures the minimum range of substitutions needed to vary one string into the opposite or the minimum range of errors that would have reworked one string into the other. Examples The Hamming distance between:  "Karolin" and "Kathrin" is 3.  "Karolin" and "Kerstin" is 3.  1011101 and 1001001 is 2.  2173896 and 2233796 is 3. 2.2 Saturation adder Saturation adder could be a version of arithmetic during which all operations like addition and multiplication are restricted to a set vary between a minimum and most worth. For example, if the valid vary of values is from -100 to one hundred, the subsequent operations manufacture the subsequent values:  60 + 30 = 90  60 + 43 = 100 Figure 1 shows the (4, 2) saturation adder diagram. Fig-1: (4,2) Saturation Adder By logic reduction, the logic equation for this (4, 2) saturating adder is given by, Carry=Ca +Cb+SaSb Sum=Sa +Sb+CaSa+CbSb 2.3 Encoder A simple encoder circuit can receive a single active input out of 2n input lines and generate binary code on n parallel output lines. For example, single bit 4 to 2 encoder takes in 4 bits and outputs 2 bits and it is shown in Figure 2. Fig-2: 4 to 2 Encoder 2.4 Decoder It is a combinational circuit that converts the binary information from n input lines to a maximum of 2n unique output lines and it is shown in Figure 3.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7575 Fig-3: 2 to 4 Decoder 3. ENCODE AND COMPARE ARCHITECTURE Decoding takes longer time than secret writing because it encompasses a series of error detection or syndrome calculation and error correction. To resolve the drawbacks of the decode and compare architecture, the decoding of a retrieved codeword is replaced with the encoding of an incoming tag in the encode-and- compare architecture as shown in Figure 4. More precisely, a k-bit incoming tag is first encoded in the corresponding n-bit codeword and compared with the retrieved codeword as shown in Figure 4. Fig -4: Encode and Compare Architecture The comparison is to look at what number bits the 2 codewords dissent, not to check if the two codewords are exactly equal to each other. For this, there is a tendency to work out the overacting distance d between the 2 codewords and classify the cases consistent with the distance of ‘d’. Let tmax and rmax denote the numbers of maximally correctable and detectable errors, respectively. The cases are summarized as follows.  If d = 0, X matches Y exactly.  If 0 <d ≤ tmax, X will match Y provided at most tmax errors in Y are corrected.  If tmax<d ≤ rmax, Y has detectable but uncorrectable errors. In this case, the cache may issue a system fault, so as to make the central processing unit take a proper action.  If rmax<d, X does not match Y Assuming that the incoming address has no errors, 2 tags are regarded as matched if ‘d’ is in either the primary or the second ranges. In this way, while maintaining the error-correcting capability, the architecture can remove the decoder from its critical path at the cost of an encoder being newly introduced. Note that the encoder is, in general, much simpler than the decoder, and thus the encoding cost is significantly less than the decoding cost. Since the above method needs to compute the Hamming distance, presented a circuit dedicated to the computation. Fig -5: SA based architecture supporting the direct compare method
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7576 The circuit shown in Figure 5 performs XOR operations for each try of bits in X and Y thus on generate a vector representing the bitwise distinction of two codewords. The following half adder (HA) is used to count the number of 1’s in two adjacent bits in the vector. The numbers of 1’s is accumulated by passing through the following SA tree [6]. In the SA tree, the accumulated value z is saturated to rmax+ 1 if it exceeds rmax. More precisely, given inputs x and y, z can be expressed as follows: { (1) The final accumulated value indicates the range of d. As the compulsory saturation necessitates additional logic circuitry, the complexity of a SA is higher than the conventional adder. 4. DECODE AND COMPARE ARCHITECTURE A cache memory is considered where a k-bit tag is stored in the form of an-bit codeword after being encoded with a (n, k) code. In the decode-and-compare architecture, the n-bit retrieved codeword should first be decoded to extract the original k-bit tag. The extracted k- bit tag is then compared to the k-bit tag field of an incoming address to determine whether the tags are matched or not. Fig -6: Decode and Compare Architecture As the retrieved codeword should go through the decoder before being compared with the incoming tag, the critical path is too long to be employed in a practical cache system designed for high-speed access. Since the decoder is one of the most complicated processing elements, in addition, the complexity overhead is not negligible. The decode compare architecture [8] is shown in Figure 6. 5. DISCUSSION Results are discussed in the table shown below. 6. CONCLUSION Decoder is complex than encoder and the complexity overhead is not negligible. Decoding cost is more than encoding cost. Decoder will increase the critical path for high speed access. Encoder is simpler than decoder and the complexity overhead is negligible. In Encode-compare architecture, the decoder is removed by introducing an encoder. Encoding cost is significantly less than decoding cost. Comparing encoder and decoder architecture, encoder architecture is the most efficient one and it has less complexity and less cost. REFERENCES [1] Aswathi D and Keerthi Sahadevan, “An Efficient Low Complexity Low Latency Architecture for Matching of Data Encoded with Error Correcting Code Using a Cache Memory”, Int. Journal of Engineering Research and Application, Vol. 6, Issue 10, (Part -3) October 2016, pp.82-85. ENCODE-COMPARE ARCHITECTURE DECODE-COMPARE ARCHITECTURE Encoder is simpler than decoder Decoder is complex than encoder TheComplexity overhead is negligible. The Complexity overhead is not negligible. In encode-compare architecture, the decoder is removed by introducing an encoder. For high speed access, the decoder will increase the critical path. Encoding cost is significantly less. Decoding cost is more.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 7577 [2] Chang, J., Huang, M., Shoemaker, J., Benoit, J., Chen, S.L., Chen,W., Chiu, S., Ganesan, R., Leong, G., Lukka, V., Rusu, S. and Srivastava, D. (2007),''The 65-nm 16-MB shared on-die L3 cache for the dual-core Intel xeon Processor 7100 series'', IEEE J. Solid-state Circuits, Vol. 42, No. 4, pp. 846–852. [3] Warnock, J.D., Chan, Y. H., Carey, S.M., Wen, H., Meaney, P.J., Gerwig, G., Smith, H.H., Chan, Y.H., Davis, J., Bunce, P., Pelella, A., Rodko, D., Patel, P., Strach, T., Malone, D., Malgioglio, F., Neves, J., Rude, D.L. and Huott, W.V. (2012), ''Circuit and physical design implementation of the microprocessor chip for the Enterprisesystem'',IEEE J. Solid-state Circuits, Vol. 47, No. 1, pp. 151–163. [4] Ando, H., Yoshida, Y., Inoue, A., Sugiyama, I., Asakawa, T., Morita, K., Muta, T. And Motokurumada, T., Okada, S., Yamashita, H., and Satsukawa, Y. (2003), '' A 1.3 GHz fifth generation SPARC64 microprocessor'',IEEEISSCC. Dig. Tech. Papers, pp. 246–247. [5] Tremblay and M. Andchaudhry, S. (2008), ''A third-generation 65nm 16-core 32-thread plus 32-Scout-thread CMT SPARC processor. ISSCC. Dig. Tech. Papers, pp. 82–83. [6] Wu, W., Somasekhar, D. and Lu, S.L. (2012), ''Direct compare of information coded with error-correcting codes'', IEEE Trans. Very Large Scale Integr. (VLSI) Syst., Vol. 20, No. 11, pp. 2147–2151. [7] Pedro Reviriego, Salvatore Pontarelli, Juan Antonio Maestro, and Marco Ottavi (2013), ''A Method to Construct Low Delay Single Error Correction Codes for Protecting Data Bits Only'', IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 32, No. 3. [8] Mary Francy Joseph and Anith Mohan (2016), ''Improved Architecture for Tag Matching in Cache memory Coded with Error Correcting Codes'', Global Colloquium in Recent Advancement and Effectual Researches in Engineering, Science and Technology (RAEREST 2016), pp.544 – 551.