This paper focus on the various sources of power dissipation in modern VLSI circuits. This paper also discuss the importance of designing low power VLSI circuits along with various techniques of power reduction and its advantages and disadvantages. It is basically a comparative study between various power reduction techniques in modern VLSI circuits.
In this video, I will explain what is QAM modulation and what is 16QAM.
QAM Stands for Quadrature Amplitude Modulation. QAM is both an analog and a digital modulation method. But here, we are only talking about QAM as a digital modulation.
Quadrature means that two carrier waves are being used, one sine wave and one cosine wave. These two waves are out of phase with each other by 90°, this is called quadrature.
At the receiving end, the sine and cosine wave can be decoded independently, this means that by using both a sine wave and a cosine wave, the communication channel's capacity is doubled comparing to using only one sine or one cosine wave. That is why quadrature is such a popular technique for digital modulation.
QAM modulation is a combination of Amplitude Shift Keying and Phase Shift Keying, both carrier wave is modulated by changing both its amplitude and phase. As shown in this 8QAM waveform, the top is the sine wave carrier, for bit 000, the sin wave has a phase shift of 0°, and an amplitude of 2. While for bit 110, the phase shift is 180°, and the amplitude now is 1. So both phase and amplitude are changed.
In 16QAM, the input binary data is combined into groups of 4 bits called QUADBITS.
As shown in this picture, the I and I' bits are sent to the sine wave modulation path, and the Q and Q' bits are sent to the cosine wave path. Since the bits are split and sent in parallel, so the symbol rate has been reduced to a quarter of the input binary bit rate. If the input binary data rate is 100 Gbps, then the symbol rate is reduced to only 25 Gbaud/second. This is the reason why 16QAM is under hot research for 100Gbps fiber optic communication.
The I and Q bits control the carrier wave's phase shift, if the bit is 0, then the phase shift is 180°, if the bit is 1, then the phase shift is 0°.
The I' and Q' bits control the carrier wave's amplitude, if bit is 0, then the amplitude is 0.22 volt, if the bit is 1, then the amplitude is 0.821 volt.
So each pair of bits has 4 different outputs. Then they are added up at the linear summer. 4X4 is 16, so there is a total of 16 different combinations at the output, that is why this is called 16QAM.
This illustration shows an example of how the QUADBIT 0000 is modulated onto the carrier waves.
Here I and I' is 00, so the output is -0.22 Volt at the 2-to-4-level converter, when timed with the sine wave carrier, we get -0.22sin(2πfct), here fc is the carrier wave's frequency. QQ' is also 00, so the other carrier wave output is -0.22cos(2πfct).
Here is the proof that quadbit 0000 is modulated as a sine wave with an amplitude of 0.311volt and a phase shift of -135°. You can now pause for a moment to study the proof.
This list shows the 16QAM modulation output with different amplitude and phase change for all 16 quadbits. On the right side is the constellation diagram which shows the positions of these quadbits on a I-Q diagram.
You can visit FO4SALE.com f
In this video, I will explain what is QAM modulation and what is 16QAM.
QAM Stands for Quadrature Amplitude Modulation. QAM is both an analog and a digital modulation method. But here, we are only talking about QAM as a digital modulation.
Quadrature means that two carrier waves are being used, one sine wave and one cosine wave. These two waves are out of phase with each other by 90°, this is called quadrature.
At the receiving end, the sine and cosine wave can be decoded independently, this means that by using both a sine wave and a cosine wave, the communication channel's capacity is doubled comparing to using only one sine or one cosine wave. That is why quadrature is such a popular technique for digital modulation.
QAM modulation is a combination of Amplitude Shift Keying and Phase Shift Keying, both carrier wave is modulated by changing both its amplitude and phase. As shown in this 8QAM waveform, the top is the sine wave carrier, for bit 000, the sin wave has a phase shift of 0°, and an amplitude of 2. While for bit 110, the phase shift is 180°, and the amplitude now is 1. So both phase and amplitude are changed.
In 16QAM, the input binary data is combined into groups of 4 bits called QUADBITS.
As shown in this picture, the I and I' bits are sent to the sine wave modulation path, and the Q and Q' bits are sent to the cosine wave path. Since the bits are split and sent in parallel, so the symbol rate has been reduced to a quarter of the input binary bit rate. If the input binary data rate is 100 Gbps, then the symbol rate is reduced to only 25 Gbaud/second. This is the reason why 16QAM is under hot research for 100Gbps fiber optic communication.
The I and Q bits control the carrier wave's phase shift, if the bit is 0, then the phase shift is 180°, if the bit is 1, then the phase shift is 0°.
The I' and Q' bits control the carrier wave's amplitude, if bit is 0, then the amplitude is 0.22 volt, if the bit is 1, then the amplitude is 0.821 volt.
So each pair of bits has 4 different outputs. Then they are added up at the linear summer. 4X4 is 16, so there is a total of 16 different combinations at the output, that is why this is called 16QAM.
This illustration shows an example of how the QUADBIT 0000 is modulated onto the carrier waves.
Here I and I' is 00, so the output is -0.22 Volt at the 2-to-4-level converter, when timed with the sine wave carrier, we get -0.22sin(2πfct), here fc is the carrier wave's frequency. QQ' is also 00, so the other carrier wave output is -0.22cos(2πfct).
Here is the proof that quadbit 0000 is modulated as a sine wave with an amplitude of 0.311volt and a phase shift of -135°. You can now pause for a moment to study the proof.
This list shows the 16QAM modulation output with different amplitude and phase change for all 16 quadbits. On the right side is the constellation diagram which shows the positions of these quadbits on a I-Q diagram.
You can visit FO4SALE.com f
In MOS, source-drain regions of adjacent MOS transistors together with interconnection metal lines may constitute parasitic MOS transistors unless they are isolated from each other. Hence, each MOSFET must be electrically isolated from each other. Device Isolation Techniques in VLSI microfabrication of MOS are discussed.
I have prepared it to create an understanding of delay modeling in VLSI.
Regards,
Vishal Sharma
Doctoral Research Scholar,
IIT Indore
vishalfzd@gmail.com
Design of Memory Cell for Low Power ApplicationsIJERA Editor
Aggressive CMOS scaling results in lower threshold voltage and thin oxide thickness for transistors manufactured in nano regime. As a result, reducing the sub-threshold and tunneling gate leakage currents has become crucial in the design of ICs. This paper presents a new method to reduce the total leakage power dissipation of static random access memories (SRAMs) while maintaining their performance.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
In MOS, source-drain regions of adjacent MOS transistors together with interconnection metal lines may constitute parasitic MOS transistors unless they are isolated from each other. Hence, each MOSFET must be electrically isolated from each other. Device Isolation Techniques in VLSI microfabrication of MOS are discussed.
I have prepared it to create an understanding of delay modeling in VLSI.
Regards,
Vishal Sharma
Doctoral Research Scholar,
IIT Indore
vishalfzd@gmail.com
Design of Memory Cell for Low Power ApplicationsIJERA Editor
Aggressive CMOS scaling results in lower threshold voltage and thin oxide thickness for transistors manufactured in nano regime. As a result, reducing the sub-threshold and tunneling gate leakage currents has become crucial in the design of ICs. This paper presents a new method to reduce the total leakage power dissipation of static random access memories (SRAMs) while maintaining their performance.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Sub-Threshold Leakage Current Reduction Techniques In VLSI Circuits -A SurveyIJERA Editor
There is an increasing demand for portable devices powered up by battery, this led the manufacturers of
semiconductor technology to scale down the feature size which results in reduction in threshold voltage and
enables the complex functionality on a single chip. By scaling down the feature size the dynamic power
dissipation has no effect but the static power dissipation has become equal or more than that of Dynamic power
dissipation. So in recent CMOS technologies static power dissipation i.e. power dissipation due to leakage
current has become a challenging area for VLSI chip designers. In order to prolong the battery life and maintain
reliability of circuit, leakage current reduction is the primary goal. A basic overview of techniques used for
reduction of sub-threshold leakages is discussed in this paper. Based on the surveyed techniques, one would be
able to choose required and apt leakage reduction technique.
NOVEL SLEEP TRANSISTOR TECHNIQUES FOR LOW LEAKAGE POWER PERIPHERAL CIRCUITSVLSICS Design
Static power consumption is a major concern in nanometre technologies. Along with technology scaling down and higher operating speeds of CMOS VLSI circuits, the leakage power is getting enhanced. As process geometries are becoming smaller, device density increases and threshold voltage as well as oxide thickness decrease to keep pace with performance. Two novel circuit techniques for leakage current reduction in inverters with and without state retention property are presented in this work. The power dissipation during inactive (standby) mode of operation can be significantly reduced compared to traditional power gating methods by these circuit techniques. The proposed circuit techniques are applied to inverters and the results are compared with earlier inverter leakage minimization techniques. Inverter
buffer chains are designed using new state retention low leakage technique and found to be dissipating lower power with state retention. All low leakage inverters are designed and simulated in cadence design environment using 90 nm technology files. The leakage power during sleep mode is found to be better by X 63 times for novel method. The total power dissipation has also reduced by a factor of X 3.5, compared to earlier sleepy keeper technique. The state retention feature is also good compared to earlier leakage power reduction methodologies.
NOVEL SLEEP TRANSISTOR TECHNIQUES FOR LOW LEAKAGE POWER PERIPHERAL CIRCUITSVLSICS Design
Static power consumption is a major concern in nanometre technologies. Along with technology scaling down and higher operating speeds of CMOS VLSI circuits, the leakage power is getting enhanced. As process geometries are becoming smaller, device density increases and threshold voltage as well as oxide thickness decrease to keep pace with performance. Two novel circuit techniques for leakage current reduction in inverters with and without state retention property are presented in this work. The power dissipation during inactive (standby) mode of operation can be significantly reduced compared to traditional power gating methods by these circuit techniques. The proposed circuit techniques are applied to inverters and the results are compared with earlier inverter leakage minimization techniques. Inverter
buffer chains are designed using new state retention low leakage technique and found to be dissipating lower power with state retention. All low leakage inverters are designed and simulated in cadence design environment using 90 nm technology files. The leakage power during sleep mode is found to be better by X 63 times for novel method. The total power dissipation has also reduced by a factor of X 3.5, compared to earlier sleepy keeper technique. The state retention feature is also good compared to earlier leakage power reduction methodologies.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This paper addresses the approach to improve the efficiency of the quasi Z-source inverter. In order to increase the efficiency the reduction of conduction losses is one way to approach. Sequentially to decrease the conduction losses in the quasi z-source inverter the replacement of diode is replacing with switches is proposed which is also called as synchronous rectification. The paper represents basics of the approach, analysis and comparison of the power losses of the traditional and proposed designs of the grid connected PV-system with quasi z-source inverter system. The proposed approach validated on the computer simulations in the MATLAB environment.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Power Gating Based Ground Bounce Noise ReductionIJERA Editor
As low power circuits are most popular the decrease in supply voltage leads to increase in leakage power with respect to the technology scaling. So for removing this kind of leakages and to provide a better power efficiency many power gating techniques are used. But the leakage due to ground connection to the active part of the circuit is very high rather than all other leakages. As it is mainly due to the back EMF of the ground connection it was called it as ground bounce noise. To reduce this noise different methodologies are designed. In this paper the design of such an efficient technique related to ground bounce noise reduction using power gating circuits and comparing the results using DSCH and Microwind low power tools. In this paper the analysis of adders such as full adders using different types of power gated circuits using low power VLSI design techniques and to present the comparison results between different power gating methods.
STAND-BY LEAKAGE POWER REDUCTION IN NANOSCALE STATIC CMOS VLSI MULTIPLIER CIR...VLSICS Design
In this paper, we performed the comparative analysis of stand-by leakage (when the circuit is idle), delay and dynamic power (when the circuit switches) of the three different parallel digital multiplier circuits implemented with two adder modules and Self Adjustable Voltage level circuit (SVL). The adder modules chosen were 28 transistor-conventional CMOS adder and 10 transistor- Static Energy Recovery CMOS adder (SERF) circuits. The multiplier modules chosen were 4Bits Array, 4bits Carry Save and 4Bits Baugh Wooley multipliers. At first, the circuits were simulated with adder modules without applying the SVL circuit. And secondly, SVL circuit was incorporated in the adder modules for simulation. In all the multiplier architectures chosen, less standby leakage power was observed being consumed by the SERF adder based multipliers applied with SVL circuit. The stand-by leakage power dissipation is 1.16µwatts in Bits array multiplier with SERF Adder applied with SVL vs. 1.39µwatts in the same multiplier with CMOS 28T Adder applied with SVL circuit. It is 1.16µwatts in Carry Save multiplier with SERF Adder applied with
SVL vs. 1.4µwatts in the same multiplier with CMOS 28T Adder applied with SVL circuit. It is 1.67µwatts in Baugh Wooley multiplier with SERF Adder applied with SVl circuit vs. 2.74µwatts in the same multiplier with CMOS 28T Adder applied with SVL circuit.
Design of 64 bit SRAM using Lector Technique for Low Leakage Power with Read ...IOSRJVSP
: In complementary metal oxide semiconductor (CMOS) the power dissipation predominantly comprises of dynamic as well as static power. Prior to introduction of “Deep submicron technologies” it is observed that in case of technology process with feature size larger than 1micro meter, the consumption of dynamic power out of the overall power consumption of any circuit is more than 90%,while that of static power is negligible. But in the present deep submicron technologies in order to, reduce the dynamic power consumption in VLSI circuits, the power supply is being scaled down, keeping in view the principle that the dynamic power dissipated is directly proportional to the square of the supply voltage (Vdd).The threshold voltage also needs to be reduced since the supply voltage is scaled down. Overcoming the inherent limitations in the existing method for leakage power reduction, The Lector (Leakage controlled transistor) technique which works efficiently both in active and idle states of the circuit and results in better leakage power reduction is now proposed. The proposed system presents the analysis of power on “64-bit SRAM array using leakage controlled transistor technique
A novel approach for leakage power reduction techniques in 65nm technologiesVLSICS Design
The rapid progress in semiconductor technology have led the feature sizes of transistor to be shrunk there
by evolution of Deep Sub-Micron (DSM) technology; there by the extremely complex functionality is
enabled to be integrated on a single chip. In the growing market of mobile hand-held devices used all over
the world today, the battery-powered electronic system forms the backbone. To maximize the battery life,
the tremendous computational capacity of portable devices such as notebook computers, personal
communication devices (mobile phones, pocket PCs, PDAs), hearing aids and implantable pacemakers has
to be realized with very low power requirements. Leakage power consumption is one of the major technical
problem in DSM in CMOS circuit design. A comprehensive study and analysis of various leakage power
minimization techniques have been presented in this paper a novel Leakage reduction technique is
developed in Cadence virtuoso in 65nm regim with the combination of stack with sleepy keeper approach
with Low Vth & High Vth which reduces the Average Power with respect Basic Nand Gate 29.43%, 39.88%,
Force Stack 56.98, 63.01%, sleep transistor with Low Vth & High Vth 13.90, 26.61% & 33.03%, 75.24%
with respect to sleepy Keeper 93.70, 56.01% of Average Power is saved.
A NOVEL APPROACH FOR LEAKAGE POWER REDUCTION TECHNIQUES IN 65NM TECHNOLOGIESVLSICS Design
The rapid progress in semiconductor technology have led the feature sizes of transistor to be shrunk there by evolution of Deep Sub-Micron (DSM) technology; there by the extremely complex functionality is enabled to be integrated on a single chip. In the growing market of mobile hand-held devices used all over the world today, the battery-powered electronic system forms the backbone. To maximize the battery life, the tremendous computational capacity of portable devices such as notebook computers, personal communication devices (mobile phones, pocket PCs, PDAs), hearing aids and implantable pacemakers has to be realized with very low power requirements. Leakage power consumption is one of the major technical problem in DSM in CMOS circuit design. A comprehensive study and analysis of various leakage power minimization techniques have been presented in this paper a novel Leakage reduction technique is developed in Cadence virtuoso in 65nm regim with the combination of stack with sleepy keeper approach with Low Vth & High Vth which reduces the Average Power with respect Basic Nand Gate 29.43%, 39.88%, Force Stack 56.98, 63.01%, sleep transistor with Low Vth & High Vth 13.90, 26.61% & 33.03%, 75.24% with respect to sleepy Keeper 93.70, 56.01% of Average Power is saved.
Leakage Power Reduction Techniques Revisited in a CMOS Inverter Circuit at De...idescitation
As CMOS Technology is aiming at miniaturization
of MOS devices, a trend of increase in the static power
consumption is being observed. The main sources of static
power consumption are sub-threshold current and gate oxide
leakage current. In this work, we discuss the major sources of
power consumption, various techniques to reduce leakage
power and their trade-offs in a CMOS inverter logic circuit at
90nm. Three most popular leakage current reduction
techniques are studied with respect to a conventional inverter
circuit. It is seen that the main trade-off is between the area
and the static leakage current. This paper aims to reduce the
static power dissipation with a small compromise in area.
Similar to Power Dissipation of VLSI Circuits and Modern Techniques of Designing Low Power VLSI Systems (20)
Maintaining Data Confidentiality in Association Rule Mining in Distributed En...IJSRD
The data in real world applications is distributed at multiple locations, and the owner of the databases may be different people. Thus to perform mining task, the data needs to be kept at central location which causes threat to the privacy of corporate data. Hence the key challenge is to applying mining on distributed source data with preserving privacy of corporate data. The system addresses the problem of incrementally mining frequent itemsets in dynamic environment. The assumption made here is that, after initial mining the source undergoes into small changes in each time. The privacy of data should not be threatened by an adversary i.e. the miner and target database owner should not be able to recover original data from transformed data.
Performance and Emission characteristics of a Single Cylinder Four Stroke Die...IJSRD
The current trends in CI engine are to use Water-diesel emulsion as alternative fuel. It can be employed directly to the existing CI Engine system with no additional modifications. This system helps in reduction of NOx as well as PM, which in turn improve the combustion efficiency of the engine. However there are still investigations have to be done. The current work mainly concentrated on diesel engine run on water-diesel emulsions and its effect on engine performance and emissions were studied. The various loads were applied on a constant speed diesel engine run on water-diesel emulsions of varying ratios of 0.2:1, 0.3:1. 0.4:1 and 0.5:1. Emission and performance characteristics were measured and were compared with base diesel operation. The emissions like NOx and smoke density were found to decrease greatly and brake thermal efficiency was found to increase at high loads. Smoke level was 4.2 BSU and 3 BSU for base diesel and water diesel emulsion of 0.4. The ignition delay was found to increase with water diesel emulsions. This also increased the maximum rate of pressure rise and peak pressure. The engine was found to run rough with water-diesel emulsions. The optimal water-diesel ratio was found to be 0.4:1 by weight. HC and CO emissions were found to increase with water diesel emulsions.
Preclusion of High and Low Pressure In Boiler by Using LABVIEWIJSRD
Pressure is an important physical parameter to be controlled in process boiler, heat exchanger, nuclear reactor and steam carrying pipeline. In the article the issue has been face in boiler operation due to pressure is handled. In boiler, the problem is due to maximum and minimum range of pressure. Due to the issues there is a chance to causes the hazop. To avoid such the problem the high and low pressure in boiler has to control. In the paper such the problem has sorted out by implementing ON-OFF control. Here the proposed control action for pressure control is implemented with the help of LabVIEW (Laboratory Virtual Instrument Engineering Workbench) software and NI ELVIS hardware. In the idea the boiler’s low range and high is monitored and controlled valve desirably. And also the high range and low range of pressure in the boiler is signified to plant operator by alarm signal.
Prevention and Detection of Man in the Middle Attack on AODV ProtocolIJSRD
In this paper it is discuss about AODV protocol and security attacks and man in the middle attack in detail. AODV Protocol is use to find route and very important protocol for communication in wireless network. So AODV protocol should be Secured and it is a big challenge. There are various attacks that occur on it. Here in this paper it discussed about the detection and preventions of man-in-the-middle attack in detail.
Comparative Analysis of PAPR Reduction Techniques in OFDM Using Precoding Tec...IJSRD
In this modern era, Orthogonal Frequency Division Multiplexing (OFDM) has been proved to be an explicit promising technique for wired and wireless systems because of its several advantages like high spectral efficiency, robustness against frequency selective fading, relatively simple receiver implementation etc. Besides having a number of advantages OFDM suffers from few disadvantages like high Peak to Average Power Ratio (PAPR), Intercarrier Interference (ICI), Intersymbol Interference (ISI) etc. These detrimental effects, if not compensated properly and timely, can result in system performance degradation. This paper mainly concentrates on reduction of PAPR.A comparisons have been made between various precoding techniques against conventional OFDM.
Evaluation the Effect of Machining Parameters on MRR of Mild SteelIJSRD
Today’s life is totally based on Internet. Now a days people cannot imagine life without Internet. Information and communication technology plays vital role in today’s online networked society. In today’s life, we are very close to the online social networks. Online social networks are used for posting and sharing information across various social networking sites. But user’s privacy is not maintained by online social networks. For maintaining users sensitive information’s privacy online social networks provides little or no support. For filtering unwanted messages we propose a system using machine learning (ML). Using machine learning in soft classifier content based filtering performed. In proposed system filtering rules (FR’s) are provided for content independent filtering.. Blacklists are used for more flexibility by which filtering choices are increased. Proposed system provides security to the Online Social Networks.
Filter unwanted messages from walls and blocking nonlegitimate user in osnIJSRD
Today’s life is totally based on Internet. Now a days people cannot imagine life without Internet. Information and communication technology plays vital role in today’s online networked society. In today’s life, we are very close to the online social networks. Online social networks are used for posting and sharing information across various social networking sites. But user’s privacy is not maintained by online social networks. For maintaining users sensitive information’s privacy online social networks provides little or no support. For filtering unwanted messages we propose a system using machine learning (ML). Using machine learning in soft classifier content based filtering performed. In proposed system filtering rules (FR’s) are provided for content independent filtering.. Blacklists are used for more flexibility by which filtering choices are increased. Proposed system provides security to the Online Social Networks.
Keystroke Dynamics Authentication with Project Management SystemIJSRD
Generally user authentication is done using username and password that is called as login process. This login process is not more secure because, however a login session is still unprotected to impersonator when the user leaves his computer without logging off. Keystroke dynamics methods can be made useful to verify a user by extracting some typing features then, after the authentication process has successfully ended. From the last decade several studies proposed the use of keystroke dynamics as a behavioral biometric tool to verify users. We propose a new method, for representing the keystroke patterns by joining similar pairs of consecutive keystrokes. The above proposed method is used to consider clustering the di-graphs which are based on their temporal features. In this project, authentication system is provide to project management system that make more Secure management system without acknowledging unauthorized user. The Project Management System addresses the management of software projects. It provides the framework for organizing and managing resources in such a way that these resources deliver all the work required to complete a software project within defined scope, time and cost constraints. The system applies only to the management of software projects and is a tool that facilitates decision making.
Diagnosing lungs cancer Using Neural NetworksIJSRD
Artificial Neural Networks is the new technology. It is the branch of Artificial Intelligence and also it is an accepted new technology. Now a days Neural Networks Plays a Vital role in Medicine, Particularly in some fields such as cardiology, oncology etc. And also it has many applications in many areas like Science and Technology, Education, Business, Business and Manufacturing, etc. Neural Networks is most useful for making the decision more Effective. In this Paper, by the use of Neural Networks how the severe disease Lungs Cancer has been diagnosed more effectively. This Paper discussed about how the Lungs cancer can be identified effectively in earlier stages and diagnosed using Neural Networks and some devices. The Neural Networks has been successfully applied in Carcinogenesis. The main aim of this research is by the use of Neural Networks the Carcinogenesis can be diagnosed more cost-effective, easy to use techniques and methods. This Paper discussed about how the Lungs cancer can be identified effectively in earlier stages and diagnosed using Neural Networks and some devices. Sputum Cytology is used to detect the Lungs Cancer in Early stages.
A Survey on Sentiment Analysis and Opinion MiningIJSRD
In Today’s world, the social media has given web users a place for expressing and sharing their thoughts and opinions on different topics or events. For this purpose, the opinion mining has gained the importance. Sentiment classification and Opinion Mining is the study of people’s opinion, emotions, attitude towards the product, services, etc. Sentiment Analysis and Opinion Mining are the two interchangeable terms. There are various approaches and techniques exist for Sentiment Analysis like Naïve Bayes, Decision Trees, Support Vector Machines, Random Forests, Maximum Entropy, etc. Opinion mining is a useful and beneficial way to scientific surveys, political polls, market research and business intelligence, etc. This paper presents a literature review of various techniques used for opinion mining and sentiment analysis.
A Defect Prediction Model for Software Product based on ANFISIJSRD
Artificial intelligence techniques are day by day getting involvement in all the classification and prediction based process like environmental monitoring, stock exchange conditions, biomedical diagnosis, software engineering etc. However still there are yet to be simplify the challenges of selecting training criteria for design of artificial intelligence models used for prediction of results. This work focus on the defect prediction mechanism development using software metric data of KC1.We have taken subtractive clustering approach for generation of fuzzy inference system (FIS).The FIS rules are generated at different radius of influence of input attribute vectors and the developed rules are further modified by ANFIS technique to obtain the prediction of number of defects in software project using fuzzy logic system.
Experimental Investigation of Granulated Blast Furnace Slag ond Quarry Dust a...IJSRD
In this experimental work ninety nine cubes has been prepared having dimension 70.7x70.7x70.7 mm are cast as per IS:4031 (2000). In this experimental investigation cement mortar mix 1:3 by volume were selected for 0%, 20%, 40%, 60%, 80% and 100% partially replacement of natural sand (NS) by Granulated blast furnace slag (GBFS) and quarry dust (QD) [3 cubes on each parameter respectively] for W/C ratio of 0.55 respectively. All the cubes were tested under compressive testing machine. To compare the average compressive strength of natural sand (NS) with granulated blast furnace slag (GBFS) and quarry dust (QD).
Product Quality Analysis based on online ReviewsIJSRD
Customers satisfaction is the most important criteria before buying any product. Technology today has grown to such an extent that every smallest possible query is found on internet. An individual can express his reviews towards a product through Internet. This allows others to have a brief idea about the product before buying one for them. In this paper, we take into account all the challenges and limitations encountered while reading the online reviews and time being consumed in understanding quality of the product from the reviews. We include several methods and algorithms that help the consumer to understand the Quality of the product in better way.
Solving Fuzzy Matrix Games Defuzzificated by Trapezoidal Parabolic Fuzzy NumbersIJSRD
The matrix game theory gives a mathematical background for dealing with competitive or antagonistic situations arise in many parts of real life. Matrix games have been extensively studied and successfully applied to many fields such as economics, business, management and e-commerce as well as advertising. This paper deals with two-person matrix games whose elements of pay-off matrix are fuzzy numbers. Then the corresponding matrix game has been converted into crisp game using defuzzification techniques. The value of the matrix game for each player is obtained by solving corresponding crisp game problems using the existing method. Finally, to illustrate the proposed methodology, a practical and realistic numerical example has been applied for different defuzzification methods and the obtained results have been compared
Study of Clustering of Data Base in Education Sector Using Data MiningIJSRD
Data mining is a technology used in different disciplines to search for significant relationships among variables in n number of data sets. Data mining is frequently used in all types’ areas as well as applications. In this paper the application of data mining is attached with the field of education. The relationship between student’s university entrance examination results and their success was studied using cluster analysis and k-means algorithm techniques.
Fault Tolerance in Big Data Processing Using Heartbeat Messages and Data Repl...IJSRD
Big data is a popular term used to define the exponential evolution and availability of data, includes both structured and unstructured data. The volatile progression of demands on big data processing imposes heavy burden on computation, communication and storage in geographically distributed data centers. Hence it is necessary to minimize the cost of big data processing, which also includes fault tolerance cost. Big Data processing involves two types of faults: node failure and data loss. Both the faults can be recovered using heartbeat messages. Here heartbeat messages acts as an acknowledgement messages between two servers. This paper depicts about the study of node failure and recovery, data replication and heartbeat messages.
Investigation of Effect of Process Parameters on Maximum Temperature during F...IJSRD
In case of friction stir welding, the maximum temperature along the weld line within appropriate range at tool workpiece interface is responsible for quality of welded joint. Through this paper, an attempt is made to establish a relationship between the input process parameters and the maximum temperature along the weld line during friction stir welding of aluminium alloy AA-7075. The design of pre-experimental simulation has been performed in accordance with full factorial technique. The simulation of friction stir welding has been performed by varying input parameters, tool rotational speed and welding speed. The analysis of variance (ANOVA) is used to investigate the effect of input parameters on maximum temperature during friction stir welding. A correlation was established between input parameters and maximum temperature by multiple regression lines. This study indicates that the tool rotational speed is the main input parameter that has high statistical influence on maximum temperature along the weld line during friction stir welding of aluminium alloy AA-7075.
Review Paper on Computer Aided Design & Analysis of Rotor Shaft of a RotavatorIJSRD
The intent of this paper is to study the various forces and stress acting on a rotor shaft of a standard rotavator which is subjected to transient loading. The standard models of rotavator, having a progressive cutting sequence was considered for the study and analysis. The study was extended to various available models having different cutting blade arrangement. The study was carried on different papers and identifies the various forces acting on a Rotor shaft of a rotavator. The positions of the torque and forces applied are varied according to the model considered. The response was obtained by considering the angle of twist and equivalent stress on the rotor shaft. This paper presented a methodology for conducting transient analysis of rotor shaft of a rotavator,
A Survey on Data Mining Techniques for Crime Hotspots PredictionIJSRD
A crime is an act which is against the laws of a country or region. The technique which is used to find areas on a map which have high crime intensity is known as crime hotspot prediction. The technique uses the crime data which includes the area with crime rate and predict the future location with high crime intensity. The motivation of crime hotspot prediction is to raise people’s awareness regarding the dangerous location in certain time period. It can help for police resource allocation for creating a safe environment. The paper presents survey of different types of data mining techniques for crime hotspots prediction.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
The French Revolution Class 9 Study Material pdf free download
Power Dissipation of VLSI Circuits and Modern Techniques of Designing Low Power VLSI Systems
1. IJSRD - International Journal for Scientific Research & Development| Vol. 3, Issue 10, 2015 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 624
Power Dissipation of VLSI Circuits and Modern Techniques of Designing
Low Power VLSI Systems
Prolay Ghosh
Department of Information Technology
JIS College of Engineering Kalyani, Nadia, West Bengal
Abstract— This paper focus on the various sources of power
dissipation in modern VLSI circuits. This paper also discuss
the importance of designing low power VLSI circuits along
with various techniques of power reduction and its
advantages and disadvantages. It is basically a comparative
study between various power reduction techniques in
modern VLSI circuits.
Key words: Threshold voltage, leakage current, Rise and
Fall time, Activity factor, Operating frequency
I. INTRODUCTION
During the desktop Pc design era VLSI design technique
was much more focused on optimizing speed to execute real
time functions. As a result designers have integrated
semiconductor ICs with various complex signal processing
and graphical processing units but we sacrificed the
portability. Now a day’s portable electronics applications
like tablets, smart phones e.t.c. are rapidly making their way
to consumer electronics market. On other hand more and
more number of transistors are getting added in modern
VLSI chip as the demand of System on Chip (SoC) is
increasing. These increasing features are also leading to high
power dissipation. Consumer demands a portable electronic
device which includes all the features without consuming
much power. So the most important factor to consider while
designing SoC for portable device in ‘low power design’.
Here the cause of power dissipation and the techniques of
power dissipation reduction in discussed.
II. POWER DISSIPATION
Power dissipation has three components:
A. Static Power:
The semiconductor consumes Static power dissipation due
to leakage current. Leakage current is that current which
flows when the ideal current is Zero. The capacitor such as
transistors or diodes conduct a small amount of current even
when they are turned off as capacitor discharges slowly. It
caused some unintended power loss from a capacitor. The
leakage current also generates heat that leads to degraded
performance. It is observed that in deep submicron
technology leakage current contributes 50% of total power
consumption.
Static power dissipation (Pstatic) = Supply Voltage (VDD) *
Leakage Current (Ileakage)
Fig. 1: Leakage Current
Two major components of Leakage current are:
1) Sub threshold leakage:
When the gate voltage is below the threshold voltage current
conducted between source and drain in MOS transistor
caused sub threshold leakage. It can be as high as 80-90% of
total circuit leakage.
2) Gate oxide leakage:
If a high electric field is applied to a MOS transistor with
low oxide thickness then a current flows through the oxide
tunnel is called gate oxide leakage.
Fig. 2: Sub Threshold Leakage and Gate Oxide Leakage
B. Dynamic Capacitive Power:
CMOS digital circuits consume power while charging and
discharging various load capacitances. Dynamic power is
dissipated when energy is drawn from power supply to
charge up the output node capacitance. During this charge
up phase the energy drawn from the power supply is
dissipated as heat in the conducting pMOS transistor. No
energy is drawn from power power supply during charge
down phase, yet the energy stored in the output capacitance
during charge up is dissipated as heat in the conducting
nMOS transistors, as the output voltage drops from VDD to
0.
2. Power Dissipation of VLSI Circuits and Modern Techniques of Designing Low Power VLSI Systems
(IJSRD/Vol. 3/Issue 10/2015/133)
All rights reserved by www.ijsrd.com 625
Fig. 3: Dynamic Capacitive Power
Pdynamic = load capacitance(CL) * VDD
2
* operating
frequency(Fop)
The dynamic capacitive power dissipation is based
on the assumption that the output node undergoes one
power-consuming transition (0 to VDD) in each clock cycle.
This assumption is not always correct. Depending on the
circuit topology, logic style and the input signal statistics the
node transition rate can be slower than the clock rate. So we
introduce node transition factor or activity factor (α), which
is effective number of power consuming voltage transitions
experienced per clock cycle. It is directly proportional to
dynamic power consumption. So the previously stated
equation of dynamic capacitive power is modified as
Pdynamic = α *CL* VDD
2
* Fop
C. Dynamic Short-Circuit Power:
Short-circuit power, is caused by the short circuit currents
that arise when pairs of pMOS/nMOS transistors are
conducting simultaneously. As the input voltage makes a
transition from logic 0 to 1,ideally pMOS should turned off
and nMOS should turned on. But the process takes small
time till then both the transistors remain on and it provides a
short circuit path from supply voltage to ground.
Short-circuit power (Psc) = VDD * time of slope (Tsc)
*Imax.
Fig. 4: Dynamic Short-Circuit Power
III. POWER DISSIPATION REDUCTION TECHNIQUE
We have discussed various components of power
dissipation. Now we have to think about the power
dissipation reduction technique
A. Static power consumption reduction:
Static power consumption can be reduced if we can reduce
the supply voltage and leakage current.
1) Supply voltage reduction:
Supply voltage has direct relation with power consumption.
Supply voltage of 3.3V is widely used in present days
MOSFET. Experiment has shows that if we can scale down
supply voltage to 1V power consumption will be reduced 10
times as shows in figure 5.
Fig. 5: Supply Voltage Vs Power Consumption
Supply voltage scaling is a god technique to reduce
power consumption it affects the performance of the circuit
as it caused drastic increase in gate delay. So in modern
VLSI circuits we have to maintain a balance between speed
and power.
2) Variation of threshold voltage:
Threshold voltage is defined as the minimum voltage that
required to make the transistor ON. Transistor maybe either
nMOS or pMOS. For nMOS the threshold voltage is
positive and for pMOS threshold voltage is positive.
The threshold voltage ( Vth) of a field effect transistor
(FET) is the value of the gate-source voltage(Vgs) when the
conducting channel just begins to connect the source and
drain contacts of the transistor, allowing significant current
to flow. If Vgs is less than Vth then there will be no current
flow.
Fig. 6: Threshold Voltage
a) Multiple threshold CMOS circuit (MTCMOS):
The new MTCMOS circuit technology is proposed to satisfy
both requirements of lowering the threshold voltage of a
MOSFET and reducing stand-by current, both of which are
necessary to obtain high-speed low-power performance at a
supply voltage of 1V. This technology has two main
features. One is that N-channel and P-channel MOSFET's
3. Power Dissipation of VLSI Circuits and Modern Techniques of Designing Low Power VLSI Systems
(IJSRD/Vol. 3/Issue 10/2015/133)
All rights reserved by www.ijsrd.com 626
with two different threshold voltages are employed in a
single chip. The other one is two operational modes,
"active" and "sleep," for efficient power management. MOS
transistors with low threshold voltage (Vth) are placed in the
critical path while MOS transistors with high threshold
voltage (Vth), are placed in the non-critical path. In the
critical path gate delay time should be as low as possible.
Hence delay reduction is traded off against leakage by
placing low threshold transistors causing faster gate
transitions. However, in the non timing critical path, high
threshold transistors are placed to reduce leakage as
speed/delay has less importance here. It is observed that in
modern VLSI circuits as used in industry, 80% of the paths
are non-timing critical. Data path can be broadly classified
into two categories Timing Critical and non-Timing Critical.
Here, Critical path means the path having the largest timing
delay.
The logic gate is composed of MOSFET's with a
low threshold voltage of about 0.2-0.3 V. Its power
terminals are not connected directly to the power supply
lines VDD and GND, but rather to the "virtual" power
supply lines VDDV and GNDV. The real and virtual power
lines are linked by MOSFET's QI and Q2. These have a high
threshold voltage of about 0.5-0.6 V and serve as sleep
control transistors. Signals SL and SL, which are connected
to the gates of QI and Q2, respectively, are used for
active/sleep mode control. Circuit operation in each mode at
a supply voltage of 1V is described below.
Fig: 7: Example of Multiple Threshold Voltage CMOS
In the active mode, when SL is set low, QI and Q2
are turned on and their on-resistance is so small that VDDV
and GNDV function as real power lines. Therefore, the
NAND gate operates normally and at a high speed because
the Vth of 0.3 V is low enough relative to the supply voltage
of 1 V. In the sleep mode, when SL is set high, Ql and Q2
are turned off so that the virtual lines VDDV and GNDV are
assumed to be floating. The relatively large leakage current,
determined by the subthreshold characteristics of low-Vth
MOSFET's, is almost completely suppressed by Ql and Q2
since they have a high Vth and thus a much lower leakage
current. Therefore, power consumption during the stand-by
period can be dramatically reduced by the sleep control. It
should be pointed out that two other factors affect the speed
performance of an MTCMOS circuit. One is the size of the
sleep control transistors Ql and Q2, and the other is the
capacitances CV1 and CV2 of the virtual power lines.
b) Variable threshold CMOS circuit (VTCMOS):
In VTCMOS technique the threshold voltage is varied by a
suitable control circuit according to the circuit requirements.
As is evident from the expression above, threshold voltage
is a function of the source to body bias. Hence variation of
this bias voltage using suitable circuitry can vary threshold
voltage. Practically for critical paths threshold voltage is
lowered as switching speed is of primary concern for such
paths. But for non-critical paths threshold voltage is
increased to reduce the leakage power dissipation, as higher
threshold prevents any sort of unwanted leakage power
flow.
VBN=0V are produced for PMOS and NMOS
respectively. Due to this, the circuit has high switching
speed (due to low Vth) at the cost of leakage power. In
standby mode the control circuit generates a lower substrate
voltage for NMOS and higher substrate voltage for PMOS
.This causes the threshold voltage of both the NMOS and
PMOS to increase, thus reducing the leakage current.
Besides changing the supply voltage (VDD) and the threshold
voltage (Vth).
Fig. 8: Example of Variable Threshold Voltage CMOS
3) Dynamic Threshold MOS:
In dynamic threshold CMOS (DTMOS), the threshold
voltage is altered dynamically to suit the operating state of
the circuit. A high threshold voltage in the standby mode
gives low leakage current, while a low threshold voltage
allows for higher current drives in the active mode of
operation. Dynamic threshold CMOS can be achieved by
tying the gate and body together. The supply voltage of
DTMOS is limited by the diode built-in potential in bulk
silicon technology. The pn diode between source and body
should be reverse biased. Hence, this technique is only
suitable for ultralow voltage (0.6V and below) circuits in
bulk CMOS.
Fig. 9: FTCMOS Circuit
4. Power Dissipation of VLSI Circuits and Modern Techniques of Designing Low Power VLSI Systems
(IJSRD/Vol. 3/Issue 10/2015/133)
All rights reserved by www.ijsrd.com 627
4) Gate Leakage prevention:
In deep sub-micron technology, gate oxide thickness
reached 10-20A0 causing exponential increase in tunneling
current through extremely thin gate oxide. In 45nm
technology, gate leakage got increased by 10 times with
respect to previous process technology. Hence, thicker
insulator is used to reduce gate leakage. Thicker insulator
(increase in Tox) reduces Cox, i.e the gate oxide capacitance
per unit area = (K/Tox, where K= permitivitty of gate oxide)
causing increase in threshold voltage (Vth) and thus
reducing device speed. Hence, to keep Cox constant,
different insulating materials having higher permittivity than
SiO2 is used from 45nm technology onwards. Since
insulating material is changed, polysilicon gate is also
replaced by new metal gate to maintain low work function.
B. Dynamic capacitive power consumption reduction:
Dynamic power dissipation depends on four parameters
namely Load Capacitance (CL), Supply
Voltage (VDD), Activity factor (α) and frequency
(Fop). Their impacts and way of reducing power dissipation
are discussed below.
1) Load Capacitance:
In modern SOC applications, large load capacitance may
appear due to high fanout net or long wire distance between
driver and receiver gate resulting in increase in dynamic
power dissipation.
a) Reduction Technique:
To improve power performance down sizing driver and
receiver gate is popular technique. By downsizing a
transistor, the design can be more compact. Proper
placement androuting is also necessary so that the length of
the wire can be minimized to reduce load capacitance.
Decreasing Capacitance is also difficult as it need to scale
down the device and wiring.
2) Activity factor:
The toggling rate of a signal with respect to clock is termed
as Activity factor (α). Dynamic power dissipation is directly
proportional to α.
a) Reduction Technique:
To reduce Activity factor, most popular technique used in
industry is Clock Gating. In this method, the clock signal to
different functional block is gated by enabling signals. In
most cases, AND gates are preferred for gating clock
signals.
Fig. 10: Clock Gating
The above diagram illustrates the concept of clock
gating. When ENABLE=1, clock can be applied to
functional block through AND gate. However to avoid
unnecessary switching when the functional block is inactive,
the ENABLE input can be made 0 so as to disable the clock
propagation when not required. This causes the clock to
become totally inactive when the functional block is in
nonactive mode, thus eliminating any sort of activity in the
circuit. Clock Gating can reduce power leak dueto dynamic
power by as high as 70 to 80%.
3) Operating frequency:
Sometime higher frequency is needed for better performance
but it causes high power consumption. Introducing parallel
processing lower frequency can be obtained but it increases
Hardware overhead and requires extrusive change at an
architecture or algorithm design.
C. Dynamic Short-Circuit power consumption education:
Dynamic power dissipation depends on two parameters
namely Time of the slope(TSC), Supply Voltage (VDD).
1) Time of the slope(TSC):
Tsc is the duration of the slope of the input signal. This
component is directly depended on the Rise time and Fall
time.
TSC=(TR+TF)2
we can say that fast Rise time, Fall time on input
signal means lower short circuit power dissipation.
Fig. 11: Rise and Fall Time
The Rise time and the Fall time should be small
compared to the clock period. Very large Rise time and fall
time have the risk of the cycles going undetected. Large
Rise and Fall time mean that the signal will be hovering
around mid level for too long making the system highly
susceptible to noise and multiple triggering if there is not
enough hysteresis.
a) Reduction technique:
Rise and Fall time can be reduced by reducing the gate
length of the MOSFET. Strained silicon MOSFET has also
less rise and fall time than bulk sislicon MOSFET. As
electrons can move 70% faster allowing strained silicon
transistors to switch 5% faster.
- The short circuit power can also be reduced by
1) device size reduction and
2) Increasing threshold voltage
Both of which is also used for leakage reduction. In
addition, the input rise and fall times for a digital gate needs
to be less than an upper limit which can be taken care of
during gate sizing. It is important to note that short circuit
power dissipation happens only during switching (Dynamic
power dissipation). Hence reduction of Activity factor (α)
helps both power reductions simultaneously.
5. Power Dissipation of VLSI Circuits and Modern Techniques of Designing Low Power VLSI Systems
(IJSRD/Vol. 3/Issue 10/2015/133)
All rights reserved by www.ijsrd.com 628
IV. CONCLUSION
The increasing prominence of portable systems and the need
to limit power consumption in very high density ULSI chips
have led to rapid and innovative developments in low power
design during the recent years. Through above discussion
we get a overview about various power dissipation of any
type VLSI circuit and their components. In modern VLSI
circuits separate power management circuits are integrated
for power distribution. As power dissipation reduction has
become a matter of serious concern, various power
reduction techniques are being used. A lots of researches are
also going on this topic. In this paper some ideas of modern
power reductions have been discussed elaborately.
REFERENCES
[1] Fundamentals of semiconductor device ECE 515,
March 5, 2003 Hernando Valencia & Farrin Hockett.
[2] 1-V power supply high speed digital circuit technology
with multi threshold voltage CMOS Shin’ichiro
Mutoh, Takakuni Douseki,Yqsuyuki Matsuya,
Takahko Aoki, Satoshi Shigematsu and Junjo
Yamada,Member IEEE
[3] Low power design by G.Friedman, University of
Rochester
[4] New design methodologies for High speed low power
XOR-XNOR circuits Shiv shankar Mishra, S. Wairya,
R.K.Nagaria and S.Tiwari
[5] Study the amalysys of Low power and High speed
CMOS Logic Circuit in 90nm Technology Fazal
Noorbashar, Ashis verma,A.M.Mahajan
[6] Design Techniques for Low-Voltage High-Speed
Digital Bipolar Circuits Behzad Razavi, Yusuke Ota,
and Robert G. Swartz,Fellow, IEEE
[7] Low Power and High Speed Multi Threshold Voltage
Interface Circuits Sherif A. Tawfik and Volkan
Kursun, Member, IEEE
[8] Low-voltage low-power CMOS full adder,
D.Radhakrishnan
[9] The Effect of gate length on SOI-MOSFETs operation
J.Baedi, and H.Arabshahi
[10]Channel length scaling and the impact of metal gate
work function on the performance of double gate-metal
oxide semiconductor field-effect Transistors D
RECHEM, S LATRECHE and C GONTRAND
[11]Gate-Length Biasing for Runtime-Leakage Control
Puneet Gupta, Puneet Sharma
[12]Supply and Threshold VoltageScaling for Low Power
CMOS Ricardo Gonzalez, Benjamin M. Gordon, and
Mark A. Horowitz.
[13]POWER REDUCTION IN MODERN VLSI
CIRCUITS – A REVIEW Debopam Ghosh, Jyotirmoy
Guha, Arka De, Anirban Mukherjee, Electronics and
Communication Engineering Heritage Institute of
Technology Kolkata, India
[14]Novel Ultra Low Power Multi-threshold CMOS
Technology P.Sreenivasulu1, JNTU Kakinada,
G.Vinatha,DECS,Marakapur Dr. K.Srinivasa
Rao,T.R.R College of Engg, Dr. A.Vinaya
babu,Principal of JNTU College of Eng.
[15]Variable Threshold Voltage CMOS (VTCMOS) in
Series Connected Circuits, Takashi Inukai, Institute of
Industrial Science, University of Tokyo, Japan Toshiro
Hiramoto, Tak VLSI Design and Education Center,
University of Tokyo ayasu Sakurai, Center for
Collaborative Research, University of Tokyo.