SlideShare a Scribd company logo
1 of 4
Download to read offline
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
188
Power minimization of systems using Performance
Enhancement Guaranteed Caches
Jayaseeli pratheepa J1
Rajalakshmi R. M.Tech2
PG Scholar Asst. Prof. Of ECE
Kalasalingam institute of technology Kalasalingam institute of technology
Affi. Anna university, ECE Affi.Anna University, ECE
Srivilliputtur, Virudhunagar Srivilliputtur, Virudhunagar
Pratheepa44@gmail.com rajeemtech@gmail.com
Abstract- Caches have long been an instrument for speeding memory access from microcontrollers to center based ASIC plans.
For hard ongoing frameworks however stores are tricky because of most pessimistic scenario execution time estimation. As of
late, an on-chip scratch cushion memory (SPM) to decrease the force and enhance execution. SPM does not productively reuse
its space while execution. Here, an execution improvement ensured reserves (PEG-C) to improve the execution. It can likewise
be utilized like a standard reserve to progressively store guidelines and information in view of their runtime access examples
prompting attain to great execution. All the earlier plans have corruption of execution when contrasted with PEG-C. It has a
superior answer for equalization time consistency and normal case execution.
Index terms: Cache memory, Real-time systems, PEG-C, Scratch pad memory
I. INTRODUCTION
CMOS innovation scaling has been an essential
main thrust to expand the processor execution. A
disadvantage of this pattern lies in a proceeding with
expansion in spillage power dispersal, which now represents
an inexorably extensive offer of processor force
dissemination. This is particularly the case for substantial on
chip SRAM recollections. As needs be, broadly useful
processors have offered stores to accelerate calculations
when all is said in done reason applications. Stores hold just
a little division of a program's aggregate information or
directions, yet they are intended to hold the most essential
things, so that at any given minute it is likely the reserve
holds the coveted thing. In the event that the information is
show in the reserve, access is quick. In the event that the
information is not display in the store access is moderate.
A store is a gadget used to accelerate gets to capacity
gadgets, including tape drives, circle drives, and memory. It
chips away at the guideline of region of reference. A reserve
is normally comprises of two sections, specifically store
information and reserve labels. Because of abnormal state
combination and superscalar engineering outlines, the
drifting point number juggling ability of microchips has
expanded essentially in the most recent couple of years.
While information reserves have been shown to be powerful
for broadly useful application in spanning the processor and
memory speeds, their adequacy of numerical code has not
been built. An unmistakable normal for numerical
applications is that they have a tendency to work on
expansive information sets.
Scratch cushion memory (SPM) is a memory with
the unraveling and the section hardware rationale. This
model is planned keeping in view that the memory items are
mapped to the scratch cushion in the last phase of the
compiler [1]. The supposition here is that the scratch
cushion memory involves one particular piece of the
memory location space with whatever remains of the space
possessed by the primary memory. The scratch cushion
memory vitality utilization can be evaluated from the
vitality utilization of its components.SPM is not proficiently
reuse the space while runtime. Power scattering is an
essential consider CPUs going from portable to high
velocity processors. This paper investigates the systems to
decrease spillage control inside the reserve memory of the
CPU [2]. Since store includes the chip range and check of
the transistors. Spillage force is diminished by killing store
lines when they hold information (i.e.) reserve lines have a
time of dead time in the middle of first and second get to.
There have been couple of strategies to enhance
reserve execution, including information store locking [3],
bolting and dividing [4], programming based store "[5],[6]
". All the proposed technique has a few downsides. This
paper investigates PEG-C can diminish the force utilization
as a customary reserve and enhances proficiency.
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
189
II. PEG-C ARCHITECTURE
Every line of store memory can be involved or vacant.
Involved lines guide to a memory area. Store is tended to
utilizing a halfway memory address. High-arrange bits focus
correspondence in the middle of store and memory square.
Control bits are every square (rather than labels every
division) to decrease memory gets to. Information is
exchanged in the middle of memory and reserve in pieces of
settled size, called store lines. At the point when a reserve
line is duplicated from memory into the store, a reserve
entrance is made. The store section will incorporate the
replicated information and the asked for memory area (now
called a tag).
Fig.1. Architecture of PEG-C
At the point when the processor needs to peruse or compose
an area in primary memory, it first checks for a comparing
entrance in the reserve. The reserve checks for the substance
of the asked for memory area in any store lines that may
contain that address. On the off chance that the processor
finds that the memory area is in the reserve, a store hit has
happened. Then again, if the processor does not discover the
memory area in the store, a reserve miss has happened.
1) A store hit, the processor quickly peruses or
composes the information in the reserve line.
2) A store miss, the reserve designates another
section and duplicates in information from fundamental
memory, and after that the solicitation is satisfied from the
substance of the store.
Fig.1 shows the structural planning of execution
improvement store. It comprises of L1 guideline store made
of STT-RAM. It has a couple of counters specifically hit
Counter (HC) and Miss Counter (MC) is utilized to number
the quantity of store hits and misses. The comparator is to
think about the estimations of store hit and miss after every
entrance of guideline from the memory to the processor. At
first, both the counter are situated to 0. At the point when
there is a reserve hit, the hit counter will be expanded by 1
and instantly the worth is created at the yield [1]. At that
point the hit counter is again reset to 0. On the off chance
that there is a store miss, the miss counter will be increased
by 1. At the point when the miss estimation of the counter
surpasses the hit esteem a throttling sign will be issued and
the primary memory is asked for missing direction to both
the processor furthermore in L1 store.
III. AN ENHANCED PEG-C
Fig.2. State diagram of an enhanced PEG-Cache
Initially, the instructions are preloaded into the L1 cache.
Fig.2 describes the operation of each state attained while
execution. It has four states of operation. Before execution
the cache is in preload state. When the process begins the
cache is shifted to active state. In this state the instructions
are fetched from the L1 cache itself. The counter counts the
number of hits and misses [1]. The comparator monitors the
counter operation and switch to the shadow state by issuing
the throttling signal when the miss value of the cache
exceeds the hit value. In the shadow state the missing
instructions are fetched directly from the main memory to
the processor and also a copied to the L1 cache. In both the
active and the shadow state is completed, the cache goes to
the end state.
IV. ANALYSIS OF RESULTS
We evaluate our design using Modelsim.We
choose an ALU processor for experimental evaluation.The
capacity of the main memory is 256 bytes. Fig 3 shows the
simulation result of PEG-C. The L1 cache is made of STT-
RAM. STT RAM cache design, which can deliver good
computing system performance over a wide spectrum of
application.
Processor
cessor
Mux
L1 Cache
HC Com
p
MC
Main memory
Prelo
ad
End
Shad
ow
Activ
e
Start
Exit
Exit
PEG-C
hit PEG-C
throttling
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
190
Fig.3. Simulation result of PEG-C Fig.4. Power analysis of PEG-C
In the above simulation a dashed line in the output
indicates a throttling signal occur in the cache
while executing program instructions. Synthesis
report was done by using Xilinx. Fig 4 exploits the
Power analysis of PEG-C. The total power
consumption is 151 MW. Table 1 shows the static
and dynamic power comparison Between LASIC
and PEG-C.
Table.1. Power comparison analysis
V. RELATED WORK
Cache memories have been extensively used to
bridge the gap between high speed processors and
relatively slower main memories. The proposed
algorithm [6] statically divides the code of tasks
into region, for which the cache contents are
statically selected. At run time, at every transition
regions, the cache contents off-line is loaded into
the cache and the cache replacement policy is
disabled. In static cache locking the selected
memory blocks are locked into the cache before the
program starts execution [7]. In line locking
mechanism, where different number of lines can be
locked in different cache sets.
VI.CONCLUSION
In this work, an execution upgrade
ensured store (PEG-C) is proposed for force
minimization. Fundamental memory has a size of
256 bytes. Guidelines are at first preloaded into the
store. At runtime, the guidelines are brought from
the L1 store. In the event that throttling sign
happens amid execution the fundamental memory
get to be on and the guidelines are gotten from it to
the processor furthermore replicated to the L1
reserve to evade the event of throttling later on.
From there on, the static & element force is
decreased by 8.5% & 10.97% when contrasted with
the LASIC system with a slight augmentation in
range.
REFERENCES
[1] PEG-C: Performance Enhancement Guarantee
Cache for Hard Real-Time Systems Yijie
Huangfu and Wei Zhang, Senior Member,
IEEE
[2] LASIC: Loop-Aware Sleepy Instruction
CachesBased on STT-RAM Technology
Junwhan Ahn and Kiyoung Choi
[3] R. Banakar et al., “Scratchpad memory:
Design alternative for cache on-chip memory
in embedded systems,” presented at the
CODES,2002.
[4] S. Kaxiras, Z. Hu, and M. Martonosi, “Cache
decay: Exploiting generational behavior to
reduce cache leakage power,” in Proc. 28th
Ann. Int.Symp. Comput. Archit., May 2001, pp.
240–251.
[5] X. Vera, B. Lisper, and J. Xue, “Data cache
locking for higher program predictability,”
presented at the SIGMETRICS, 2003.
[6] V. Suhendra and T. Mitra, “Exploring locking
& partitioning for predictable shared caches
on multi-cores,” presented at the DAC, 2008.
Static
(MW)
Dynamic
(MW)
Power reduction
(%)
LASIC 165 131.39 8.5
PEG-C 151 116.97 10.97
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303
191
[7] B. Jacob, “Cache design for embedded real-
time systems,” presented at the Embed. Syst.
Con., Jun. 1999
[8] I. Puaut, “WCET-centric software-controlled
instruction caches for hard real-time
systems,”presented at the ECRTS, 2006
[9] K. Flautner, N. S. Kim, S. Martin, D. Blaauw,
and T. Mudge, “Drowsy caches: Simple
techniques for reducing leakage power,” in
Proc. 29th Ann. Int. Symp. Comput. Archit.,
May 2002, pp. 148–157.
[10] C. W. Smullen, V. Mohan, A. Nigam, S.
Gurumurthi, and M. R. Stan, “Relaxing non-
volatility for fast and energy-efficient STT-
RAM caches,” in Proc. Int. Symp. High
Perform. Comput. Archit., 2011, pp. 50–61.
[11] H. Homayoun, A. Sasan, A. V. Veidenbaum,
H.-C. Yao, S. Golshan, and P. Heydari,
“MZZ-HVS: Multiple sleep modes zig-zag
horizontal and vertical sleep transistor sharing
to reduce leakage power in on-chip SRAM
peripheral circuits,” IEEE Trans. Very Large
Scale Integr. (VLSI) Syst., vol. 19, no. 12, pp.
2303–2316, Dec. 2011.
[12] A. Gordon-Ross, S. Cotterell, and F. Vahid,
“Exploiting fixed programs in embedded
systems: A loop cache example,” IEEE
Comput. Archit. Lett., vol. 1, no. 1, pp. 1–2,
Jan. 2002.
[13] S. P. Park, S. Gupta, N. Mojumder, A.
Raghunathan, and K. Roy, “Future cache
design using STT MRAMs for improved
energy efficiency: Devices, circuits and
architecture,” in Proc. 49th Design Autom.
Conf., Jun. 2012, pp. 492–497.
[14] Q. Li, J. Li, L. Shi, C. J. Xue, and Y. He,
“MAC: Migrationaware compilation for STT-
RAM based hybrid cache in embedded
systems,” in Proc. Int. Symp. Low Power
Electron. Design, 2012, pp. 351–356.
[15] X. Dong, X. Wu, G. Sun, Y. Xie, H. H. Li, and
Y. Chen, “Circuit and microarchitecture
evaluation of 3D stacking magnetic RAM
(MRAM) as a universal memory
replacement,” in Proc. 45th Design Autom.
Conf., Jun. 2008, pp. 554–559.

More Related Content

What's hot

Literature survey presentation
Literature survey presentationLiterature survey presentation
Literature survey presentation
Karthik Iyr
 
A survey on exploring memory optimizations in smartphones
A survey on exploring memory optimizations in smartphonesA survey on exploring memory optimizations in smartphones
A survey on exploring memory optimizations in smartphones
Karthik Iyr
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
Mr SMAK
 

What's hot (20)

A Built In Self-Test and Repair Analyser for Embedded Memories
A Built In Self-Test and Repair Analyser for Embedded MemoriesA Built In Self-Test and Repair Analyser for Embedded Memories
A Built In Self-Test and Repair Analyser for Embedded Memories
 
Co question 2008
Co question 2008Co question 2008
Co question 2008
 
Design and Implementation of a Cache Hierarchy-Aware Task Scheduling for Para...
Design and Implementation of a Cache Hierarchy-Aware Task Scheduling for Para...Design and Implementation of a Cache Hierarchy-Aware Task Scheduling for Para...
Design and Implementation of a Cache Hierarchy-Aware Task Scheduling for Para...
 
Parallel processing Concepts
Parallel processing ConceptsParallel processing Concepts
Parallel processing Concepts
 
Literature survey presentation
Literature survey presentationLiterature survey presentation
Literature survey presentation
 
S peculative multi
S peculative multiS peculative multi
S peculative multi
 
Deterministic Memory Abstraction and Supporting Multicore System Architecture
Deterministic Memory Abstraction and Supporting Multicore System ArchitectureDeterministic Memory Abstraction and Supporting Multicore System Architecture
Deterministic Memory Abstraction and Supporting Multicore System Architecture
 
Counter Matrix Code for SRAM Based FPGA to Correct Multi Bit Upset Error
Counter Matrix Code for SRAM Based FPGA to Correct Multi Bit Upset ErrorCounter Matrix Code for SRAM Based FPGA to Correct Multi Bit Upset Error
Counter Matrix Code for SRAM Based FPGA to Correct Multi Bit Upset Error
 
Parallel Processing Concepts
Parallel Processing Concepts Parallel Processing Concepts
Parallel Processing Concepts
 
Memory interleaving and superscalar processor
Memory interleaving and superscalar processorMemory interleaving and superscalar processor
Memory interleaving and superscalar processor
 
Evaluation of morden computer & system attributes in ACA
Evaluation of morden computer &  system attributes in ACAEvaluation of morden computer &  system attributes in ACA
Evaluation of morden computer & system attributes in ACA
 
Parallel Processors (SIMD)
Parallel Processors (SIMD) Parallel Processors (SIMD)
Parallel Processors (SIMD)
 
A survey on exploring memory optimizations in smartphones
A survey on exploring memory optimizations in smartphonesA survey on exploring memory optimizations in smartphones
A survey on exploring memory optimizations in smartphones
 
Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...
Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...
Improving Direct-Mapped Cache Performance by the Addition of a Small Fully-As...
 
ADVANCED COMPUTER ARCHITECTURE AND PARALLEL PROCESSING
ADVANCED COMPUTER ARCHITECTUREAND PARALLEL PROCESSINGADVANCED COMPUTER ARCHITECTUREAND PARALLEL PROCESSING
ADVANCED COMPUTER ARCHITECTURE AND PARALLEL PROCESSING
 
Complex test pattern generation for high speed fault diagnosis in Embedded SRAM
Complex test pattern generation for high speed fault diagnosis in Embedded SRAMComplex test pattern generation for high speed fault diagnosis in Embedded SRAM
Complex test pattern generation for high speed fault diagnosis in Embedded SRAM
 
Chip Multithreading Systems Need a New Operating System Scheduler
Chip Multithreading Systems Need a New Operating System Scheduler Chip Multithreading Systems Need a New Operating System Scheduler
Chip Multithreading Systems Need a New Operating System Scheduler
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
Memory organization (Computer architecture)
Memory organization (Computer architecture)Memory organization (Computer architecture)
Memory organization (Computer architecture)
 

Viewers also liked

Modelling and Analysis of EEG Signals Based on Real Time Control for Wheel Chair
Modelling and Analysis of EEG Signals Based on Real Time Control for Wheel ChairModelling and Analysis of EEG Signals Based on Real Time Control for Wheel Chair
Modelling and Analysis of EEG Signals Based on Real Time Control for Wheel Chair
IJTET Journal
 
Implementation and Impact of LNS MAC Units in Digital Filter Application
Implementation and Impact of LNS MAC Units in Digital Filter ApplicationImplementation and Impact of LNS MAC Units in Digital Filter Application
Implementation and Impact of LNS MAC Units in Digital Filter Application
IJTET Journal
 

Viewers also liked (18)

Implementation of Stopwatch using QCA based Carry Select Adder
Implementation of Stopwatch using QCA based Carry Select AdderImplementation of Stopwatch using QCA based Carry Select Adder
Implementation of Stopwatch using QCA based Carry Select Adder
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query Services
 
Analysis of PMSG in Wind Integration using T Source Inverter with Simple Boos...
Analysis of PMSG in Wind Integration using T Source Inverter with Simple Boos...Analysis of PMSG in Wind Integration using T Source Inverter with Simple Boos...
Analysis of PMSG in Wind Integration using T Source Inverter with Simple Boos...
 
An Efficient Execution of Clock Gating Technique for Logic Circuits
An Efficient Execution of Clock Gating Technique for Logic CircuitsAn Efficient Execution of Clock Gating Technique for Logic Circuits
An Efficient Execution of Clock Gating Technique for Logic Circuits
 
Enhanced Built-In Self Test for MSP 430
Enhanced Built-In Self Test for MSP 430Enhanced Built-In Self Test for MSP 430
Enhanced Built-In Self Test for MSP 430
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC Converter
 
PowerReduction in Silicon Ips for Cross-IPInterconnections Using On-Chip Bias...
PowerReduction in Silicon Ips for Cross-IPInterconnections Using On-Chip Bias...PowerReduction in Silicon Ips for Cross-IPInterconnections Using On-Chip Bias...
PowerReduction in Silicon Ips for Cross-IPInterconnections Using On-Chip Bias...
 
Modelling and Analysis of EEG Signals Based on Real Time Control for Wheel Chair
Modelling and Analysis of EEG Signals Based on Real Time Control for Wheel ChairModelling and Analysis of EEG Signals Based on Real Time Control for Wheel Chair
Modelling and Analysis of EEG Signals Based on Real Time Control for Wheel Chair
 
Study on Microstructure and machining characteristics of 7% B4Cp reinforced i...
Study on Microstructure and machining characteristics of 7% B4Cp reinforced i...Study on Microstructure and machining characteristics of 7% B4Cp reinforced i...
Study on Microstructure and machining characteristics of 7% B4Cp reinforced i...
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile Application
 
Parameter Optimization of Wire EDM in a Range of Thickness for EN8 Die Steel
Parameter Optimization of Wire EDM in a Range of Thickness for EN8 Die SteelParameter Optimization of Wire EDM in a Range of Thickness for EN8 Die Steel
Parameter Optimization of Wire EDM in a Range of Thickness for EN8 Die Steel
 
Design Of Area Delay Efficient Fixed-Point Lms Adaptive Filter For EEG Applic...
Design Of Area Delay Efficient Fixed-Point Lms Adaptive Filter For EEG Applic...Design Of Area Delay Efficient Fixed-Point Lms Adaptive Filter For EEG Applic...
Design Of Area Delay Efficient Fixed-Point Lms Adaptive Filter For EEG Applic...
 
Implementation and Impact of LNS MAC Units in Digital Filter Application
Implementation and Impact of LNS MAC Units in Digital Filter ApplicationImplementation and Impact of LNS MAC Units in Digital Filter Application
Implementation and Impact of LNS MAC Units in Digital Filter Application
 
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing Techniques
 
Design and Analysis of Articulated Inspection Arm of Robot
Design and Analysis of Articulated Inspection Arm of RobotDesign and Analysis of Articulated Inspection Arm of Robot
Design and Analysis of Articulated Inspection Arm of Robot
 

Similar to Power minimization of systems using Performance Enhancement Guaranteed Caches

Different Approaches in Energy Efficient Cache Memory
Different Approaches in Energy Efficient Cache MemoryDifferent Approaches in Energy Efficient Cache Memory
Different Approaches in Energy Efficient Cache Memory
Dhritiman Halder
 
Dominant block guided optimal cache size estimation to maximize ipc of embedd...
Dominant block guided optimal cache size estimation to maximize ipc of embedd...Dominant block guided optimal cache size estimation to maximize ipc of embedd...
Dominant block guided optimal cache size estimation to maximize ipc of embedd...
ijesajournal
 
Dominant block guided optimal cache size estimation to maximize ipc of embedd...
Dominant block guided optimal cache size estimation to maximize ipc of embedd...Dominant block guided optimal cache size estimation to maximize ipc of embedd...
Dominant block guided optimal cache size estimation to maximize ipc of embedd...
ijesajournal
 
4.1 Introduction 145• In this section, we first take a gander at a.pdf
4.1 Introduction 145• In this section, we first take a gander at a.pdf4.1 Introduction 145• In this section, we first take a gander at a.pdf
4.1 Introduction 145• In this section, we first take a gander at a.pdf
arpowersarps
 
1.CPU INSTRUCTION AND EXECUTION CYCLEThe primary function of the .pdf
1.CPU INSTRUCTION AND EXECUTION CYCLEThe primary function of the .pdf1.CPU INSTRUCTION AND EXECUTION CYCLEThe primary function of the .pdf
1.CPU INSTRUCTION AND EXECUTION CYCLEThe primary function of the .pdf
aniyathikitchen
 
CS 301 Computer ArchitectureStudent # 1 EID 09Kingdom of .docx
CS 301 Computer ArchitectureStudent # 1 EID 09Kingdom of .docxCS 301 Computer ArchitectureStudent # 1 EID 09Kingdom of .docx
CS 301 Computer ArchitectureStudent # 1 EID 09Kingdom of .docx
faithxdunce63732
 
Cache performance-x86-2009
Cache performance-x86-2009Cache performance-x86-2009
Cache performance-x86-2009
Léia de Sousa
 

Similar to Power minimization of systems using Performance Enhancement Guaranteed Caches (20)

Different Approaches in Energy Efficient Cache Memory
Different Approaches in Energy Efficient Cache MemoryDifferent Approaches in Energy Efficient Cache Memory
Different Approaches in Energy Efficient Cache Memory
 
Data cache design itanium 2
Data cache design itanium 2Data cache design itanium 2
Data cache design itanium 2
 
Computer architecture
Computer architectureComputer architecture
Computer architecture
 
Oversimplified CA
Oversimplified CAOversimplified CA
Oversimplified CA
 
AFFECT OF PARALLEL COMPUTING ON MULTICORE PROCESSORS
AFFECT OF PARALLEL COMPUTING ON MULTICORE PROCESSORSAFFECT OF PARALLEL COMPUTING ON MULTICORE PROCESSORS
AFFECT OF PARALLEL COMPUTING ON MULTICORE PROCESSORS
 
Affect of parallel computing on multicore processors
Affect of parallel computing on multicore processorsAffect of parallel computing on multicore processors
Affect of parallel computing on multicore processors
 
DESIGNED DYNAMIC SEGMENTED LRU AND MODIFIED MOESI PROTOCOL FOR RING CONNECTED...
DESIGNED DYNAMIC SEGMENTED LRU AND MODIFIED MOESI PROTOCOL FOR RING CONNECTED...DESIGNED DYNAMIC SEGMENTED LRU AND MODIFIED MOESI PROTOCOL FOR RING CONNECTED...
DESIGNED DYNAMIC SEGMENTED LRU AND MODIFIED MOESI PROTOCOL FOR RING CONNECTED...
 
IRJET- A Futuristic Cache Replacement using Hybrid Regression
IRJET-  	  A Futuristic Cache Replacement using Hybrid RegressionIRJET-  	  A Futuristic Cache Replacement using Hybrid Regression
IRJET- A Futuristic Cache Replacement using Hybrid Regression
 
FPGA Implementation of High Speed AMBA Bus Architecture for Image Transmissio...
FPGA Implementation of High Speed AMBA Bus Architecture for Image Transmissio...FPGA Implementation of High Speed AMBA Bus Architecture for Image Transmissio...
FPGA Implementation of High Speed AMBA Bus Architecture for Image Transmissio...
 
Cache memory
Cache memoryCache memory
Cache memory
 
shashank_hpca1995_00386533
shashank_hpca1995_00386533shashank_hpca1995_00386533
shashank_hpca1995_00386533
 
Dominant block guided optimal cache size estimation to maximize ipc of embedd...
Dominant block guided optimal cache size estimation to maximize ipc of embedd...Dominant block guided optimal cache size estimation to maximize ipc of embedd...
Dominant block guided optimal cache size estimation to maximize ipc of embedd...
 
Dominant block guided optimal cache size estimation to maximize ipc of embedd...
Dominant block guided optimal cache size estimation to maximize ipc of embedd...Dominant block guided optimal cache size estimation to maximize ipc of embedd...
Dominant block guided optimal cache size estimation to maximize ipc of embedd...
 
On chip cache
On chip cacheOn chip cache
On chip cache
 
4.1 Introduction 145• In this section, we first take a gander at a.pdf
4.1 Introduction 145• In this section, we first take a gander at a.pdf4.1 Introduction 145• In this section, we first take a gander at a.pdf
4.1 Introduction 145• In this section, we first take a gander at a.pdf
 
Architecture and implementation issues of multi core processors and caching –...
Architecture and implementation issues of multi core processors and caching –...Architecture and implementation issues of multi core processors and caching –...
Architecture and implementation issues of multi core processors and caching –...
 
1.CPU INSTRUCTION AND EXECUTION CYCLEThe primary function of the .pdf
1.CPU INSTRUCTION AND EXECUTION CYCLEThe primary function of the .pdf1.CPU INSTRUCTION AND EXECUTION CYCLEThe primary function of the .pdf
1.CPU INSTRUCTION AND EXECUTION CYCLEThe primary function of the .pdf
 
CS 301 Computer ArchitectureStudent # 1 EID 09Kingdom of .docx
CS 301 Computer ArchitectureStudent # 1 EID 09Kingdom of .docxCS 301 Computer ArchitectureStudent # 1 EID 09Kingdom of .docx
CS 301 Computer ArchitectureStudent # 1 EID 09Kingdom of .docx
 
Cache performance-x86-2009
Cache performance-x86-2009Cache performance-x86-2009
Cache performance-x86-2009
 
Cache Memory.pptx
Cache Memory.pptxCache Memory.pptx
Cache Memory.pptx
 

More from IJTET Journal

Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
IJTET Journal
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
IJTET Journal
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
IJTET Journal
 

More from IJTET Journal (20)

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For Security
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRS
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor Networks
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting Structures
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
 
Enhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
Enhanced Hashing Approach For Image Forgery Detection With Feature Level FusionEnhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
Enhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
 
An Efficient Image Encomp Process Using LFSR
An Efficient Image Encomp Process Using LFSRAn Efficient Image Encomp Process Using LFSR
An Efficient Image Encomp Process Using LFSR
 
Cascaded H-BRIDGE Converter for Domestic Applications
Cascaded H-BRIDGE Converter for Domestic ApplicationsCascaded H-BRIDGE Converter for Domestic Applications
Cascaded H-BRIDGE Converter for Domestic Applications
 
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
An Efficient Data Transmission for Cluster based Wireless Sensor Networks usi...
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
 
A Passive Lossless Soft-Switching Snubber for Telecom Power Supplies
A Passive Lossless Soft-Switching Snubber for Telecom Power SuppliesA Passive Lossless Soft-Switching Snubber for Telecom Power Supplies
A Passive Lossless Soft-Switching Snubber for Telecom Power Supplies
 

Recently uploaded

Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 

Recently uploaded (20)

SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 

Power minimization of systems using Performance Enhancement Guaranteed Caches

  • 1. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303 188 Power minimization of systems using Performance Enhancement Guaranteed Caches Jayaseeli pratheepa J1 Rajalakshmi R. M.Tech2 PG Scholar Asst. Prof. Of ECE Kalasalingam institute of technology Kalasalingam institute of technology Affi. Anna university, ECE Affi.Anna University, ECE Srivilliputtur, Virudhunagar Srivilliputtur, Virudhunagar Pratheepa44@gmail.com rajeemtech@gmail.com Abstract- Caches have long been an instrument for speeding memory access from microcontrollers to center based ASIC plans. For hard ongoing frameworks however stores are tricky because of most pessimistic scenario execution time estimation. As of late, an on-chip scratch cushion memory (SPM) to decrease the force and enhance execution. SPM does not productively reuse its space while execution. Here, an execution improvement ensured reserves (PEG-C) to improve the execution. It can likewise be utilized like a standard reserve to progressively store guidelines and information in view of their runtime access examples prompting attain to great execution. All the earlier plans have corruption of execution when contrasted with PEG-C. It has a superior answer for equalization time consistency and normal case execution. Index terms: Cache memory, Real-time systems, PEG-C, Scratch pad memory I. INTRODUCTION CMOS innovation scaling has been an essential main thrust to expand the processor execution. A disadvantage of this pattern lies in a proceeding with expansion in spillage power dispersal, which now represents an inexorably extensive offer of processor force dissemination. This is particularly the case for substantial on chip SRAM recollections. As needs be, broadly useful processors have offered stores to accelerate calculations when all is said in done reason applications. Stores hold just a little division of a program's aggregate information or directions, yet they are intended to hold the most essential things, so that at any given minute it is likely the reserve holds the coveted thing. In the event that the information is show in the reserve, access is quick. In the event that the information is not display in the store access is moderate. A store is a gadget used to accelerate gets to capacity gadgets, including tape drives, circle drives, and memory. It chips away at the guideline of region of reference. A reserve is normally comprises of two sections, specifically store information and reserve labels. Because of abnormal state combination and superscalar engineering outlines, the drifting point number juggling ability of microchips has expanded essentially in the most recent couple of years. While information reserves have been shown to be powerful for broadly useful application in spanning the processor and memory speeds, their adequacy of numerical code has not been built. An unmistakable normal for numerical applications is that they have a tendency to work on expansive information sets. Scratch cushion memory (SPM) is a memory with the unraveling and the section hardware rationale. This model is planned keeping in view that the memory items are mapped to the scratch cushion in the last phase of the compiler [1]. The supposition here is that the scratch cushion memory involves one particular piece of the memory location space with whatever remains of the space possessed by the primary memory. The scratch cushion memory vitality utilization can be evaluated from the vitality utilization of its components.SPM is not proficiently reuse the space while runtime. Power scattering is an essential consider CPUs going from portable to high velocity processors. This paper investigates the systems to decrease spillage control inside the reserve memory of the CPU [2]. Since store includes the chip range and check of the transistors. Spillage force is diminished by killing store lines when they hold information (i.e.) reserve lines have a time of dead time in the middle of first and second get to. There have been couple of strategies to enhance reserve execution, including information store locking [3], bolting and dividing [4], programming based store "[5],[6] ". All the proposed technique has a few downsides. This paper investigates PEG-C can diminish the force utilization as a customary reserve and enhances proficiency.
  • 2. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303 189 II. PEG-C ARCHITECTURE Every line of store memory can be involved or vacant. Involved lines guide to a memory area. Store is tended to utilizing a halfway memory address. High-arrange bits focus correspondence in the middle of store and memory square. Control bits are every square (rather than labels every division) to decrease memory gets to. Information is exchanged in the middle of memory and reserve in pieces of settled size, called store lines. At the point when a reserve line is duplicated from memory into the store, a reserve entrance is made. The store section will incorporate the replicated information and the asked for memory area (now called a tag). Fig.1. Architecture of PEG-C At the point when the processor needs to peruse or compose an area in primary memory, it first checks for a comparing entrance in the reserve. The reserve checks for the substance of the asked for memory area in any store lines that may contain that address. On the off chance that the processor finds that the memory area is in the reserve, a store hit has happened. Then again, if the processor does not discover the memory area in the store, a reserve miss has happened. 1) A store hit, the processor quickly peruses or composes the information in the reserve line. 2) A store miss, the reserve designates another section and duplicates in information from fundamental memory, and after that the solicitation is satisfied from the substance of the store. Fig.1 shows the structural planning of execution improvement store. It comprises of L1 guideline store made of STT-RAM. It has a couple of counters specifically hit Counter (HC) and Miss Counter (MC) is utilized to number the quantity of store hits and misses. The comparator is to think about the estimations of store hit and miss after every entrance of guideline from the memory to the processor. At first, both the counter are situated to 0. At the point when there is a reserve hit, the hit counter will be expanded by 1 and instantly the worth is created at the yield [1]. At that point the hit counter is again reset to 0. On the off chance that there is a store miss, the miss counter will be increased by 1. At the point when the miss estimation of the counter surpasses the hit esteem a throttling sign will be issued and the primary memory is asked for missing direction to both the processor furthermore in L1 store. III. AN ENHANCED PEG-C Fig.2. State diagram of an enhanced PEG-Cache Initially, the instructions are preloaded into the L1 cache. Fig.2 describes the operation of each state attained while execution. It has four states of operation. Before execution the cache is in preload state. When the process begins the cache is shifted to active state. In this state the instructions are fetched from the L1 cache itself. The counter counts the number of hits and misses [1]. The comparator monitors the counter operation and switch to the shadow state by issuing the throttling signal when the miss value of the cache exceeds the hit value. In the shadow state the missing instructions are fetched directly from the main memory to the processor and also a copied to the L1 cache. In both the active and the shadow state is completed, the cache goes to the end state. IV. ANALYSIS OF RESULTS We evaluate our design using Modelsim.We choose an ALU processor for experimental evaluation.The capacity of the main memory is 256 bytes. Fig 3 shows the simulation result of PEG-C. The L1 cache is made of STT- RAM. STT RAM cache design, which can deliver good computing system performance over a wide spectrum of application. Processor cessor Mux L1 Cache HC Com p MC Main memory Prelo ad End Shad ow Activ e Start Exit Exit PEG-C hit PEG-C throttling
  • 3. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303 190 Fig.3. Simulation result of PEG-C Fig.4. Power analysis of PEG-C In the above simulation a dashed line in the output indicates a throttling signal occur in the cache while executing program instructions. Synthesis report was done by using Xilinx. Fig 4 exploits the Power analysis of PEG-C. The total power consumption is 151 MW. Table 1 shows the static and dynamic power comparison Between LASIC and PEG-C. Table.1. Power comparison analysis V. RELATED WORK Cache memories have been extensively used to bridge the gap between high speed processors and relatively slower main memories. The proposed algorithm [6] statically divides the code of tasks into region, for which the cache contents are statically selected. At run time, at every transition regions, the cache contents off-line is loaded into the cache and the cache replacement policy is disabled. In static cache locking the selected memory blocks are locked into the cache before the program starts execution [7]. In line locking mechanism, where different number of lines can be locked in different cache sets. VI.CONCLUSION In this work, an execution upgrade ensured store (PEG-C) is proposed for force minimization. Fundamental memory has a size of 256 bytes. Guidelines are at first preloaded into the store. At runtime, the guidelines are brought from the L1 store. In the event that throttling sign happens amid execution the fundamental memory get to be on and the guidelines are gotten from it to the processor furthermore replicated to the L1 reserve to evade the event of throttling later on. From there on, the static & element force is decreased by 8.5% & 10.97% when contrasted with the LASIC system with a slight augmentation in range. REFERENCES [1] PEG-C: Performance Enhancement Guarantee Cache for Hard Real-Time Systems Yijie Huangfu and Wei Zhang, Senior Member, IEEE [2] LASIC: Loop-Aware Sleepy Instruction CachesBased on STT-RAM Technology Junwhan Ahn and Kiyoung Choi [3] R. Banakar et al., “Scratchpad memory: Design alternative for cache on-chip memory in embedded systems,” presented at the CODES,2002. [4] S. Kaxiras, Z. Hu, and M. Martonosi, “Cache decay: Exploiting generational behavior to reduce cache leakage power,” in Proc. 28th Ann. Int.Symp. Comput. Archit., May 2001, pp. 240–251. [5] X. Vera, B. Lisper, and J. Xue, “Data cache locking for higher program predictability,” presented at the SIGMETRICS, 2003. [6] V. Suhendra and T. Mitra, “Exploring locking & partitioning for predictable shared caches on multi-cores,” presented at the DAC, 2008. Static (MW) Dynamic (MW) Power reduction (%) LASIC 165 131.39 8.5 PEG-C 151 116.97 10.97
  • 4. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 5 ISSUE 2 – MAY 2015 - ISSN: 2349 - 9303 191 [7] B. Jacob, “Cache design for embedded real- time systems,” presented at the Embed. Syst. Con., Jun. 1999 [8] I. Puaut, “WCET-centric software-controlled instruction caches for hard real-time systems,”presented at the ECRTS, 2006 [9] K. Flautner, N. S. Kim, S. Martin, D. Blaauw, and T. Mudge, “Drowsy caches: Simple techniques for reducing leakage power,” in Proc. 29th Ann. Int. Symp. Comput. Archit., May 2002, pp. 148–157. [10] C. W. Smullen, V. Mohan, A. Nigam, S. Gurumurthi, and M. R. Stan, “Relaxing non- volatility for fast and energy-efficient STT- RAM caches,” in Proc. Int. Symp. High Perform. Comput. Archit., 2011, pp. 50–61. [11] H. Homayoun, A. Sasan, A. V. Veidenbaum, H.-C. Yao, S. Golshan, and P. Heydari, “MZZ-HVS: Multiple sleep modes zig-zag horizontal and vertical sleep transistor sharing to reduce leakage power in on-chip SRAM peripheral circuits,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 19, no. 12, pp. 2303–2316, Dec. 2011. [12] A. Gordon-Ross, S. Cotterell, and F. Vahid, “Exploiting fixed programs in embedded systems: A loop cache example,” IEEE Comput. Archit. Lett., vol. 1, no. 1, pp. 1–2, Jan. 2002. [13] S. P. Park, S. Gupta, N. Mojumder, A. Raghunathan, and K. Roy, “Future cache design using STT MRAMs for improved energy efficiency: Devices, circuits and architecture,” in Proc. 49th Design Autom. Conf., Jun. 2012, pp. 492–497. [14] Q. Li, J. Li, L. Shi, C. J. Xue, and Y. He, “MAC: Migrationaware compilation for STT- RAM based hybrid cache in embedded systems,” in Proc. Int. Symp. Low Power Electron. Design, 2012, pp. 351–356. [15] X. Dong, X. Wu, G. Sun, Y. Xie, H. H. Li, and Y. Chen, “Circuit and microarchitecture evaluation of 3D stacking magnetic RAM (MRAM) as a universal memory replacement,” in Proc. 45th Design Autom. Conf., Jun. 2008, pp. 554–559.