Power dissipation is an important design constraint in today’s CMOS VLSI design and is addressed widely by the researchers across the globe. Switching activity is one of the factors that affect dynamic power in a chip and several publications have suggested various techniques to reduce the same. Reduction of switching activity in the busses attains significance as bus width, bus capacitance and the clock are recording continuous uptrend. In this paper, we propose a technique for bus encoding, which, reduces the number of transitions on the bus and performs better than the existing methods such as bus invert coding and shift invert coding for random data in terms of switching activity, without the need for extra overhead in computation and circuit. However, irrespective of the bus width it needs three extra bits and does not assume anything about the nature of the data on the bus.
REDUCTION OF BUS TRANSITION FOR COMPRESSED CODE SYSTEMSVLSICS Design
Low power VLSI circuit design is one of the most important issues in present day technology. One of the ways of reducing power is to reduce the number of transitions on the bus. The main focus here is to present a method for reducing the power consumption of compressed-code systems by inverting the bits that are transmitted on the bus. Compression will generally increase bit-toggling, as it removes redundancies from the code transmitted on the bus. Arithmetic coding technique is used for compression /decompression and bit-toggling reduction is done by using shift invert coding technique. Therefore, there is also an additional challenge, to find the right balance between compression ratio and the bit-toggling reduction. This technique requires only 2 extra bits for the low Power coding, irrespective of the bit-width of the bus for compressed data.
Methods for Reducing the Activity Switching FactorIJERD Editor
Multiplexing parallel busses into serial links has been proposed for its advantages such as reducing inter connect area, coupling capacitance and crosstalk. But serialization increases bit transition which increases the activity switching factor and power dissipation. Many coding schemes have been proposed to optimize the activity switching factor which is a result of increased number of bit transitions. This paper compares some of the techniques which are used to reduce the activity switching factor and the power dissipation. This paper gives an overview of the bus invert coding, the weight based bus invert coding, the partial bus invert coding, the serialized low energy transmission coding, the transition inversion coding, and the embedded transition inversion coding. The advantages and disadvantages of each technique are compared and the best among them is found to be embedded transition inversion coding.
This document summarizes an article from the International Journal of Electronics and Communication Engineering & Technology. The article derives an exact upper bound on the bit error rate of the decode-and-forward cooperation protocol for wireless relay networks. The destination uses maximum a posteriori decoding to optimally estimate the data sent from the source. The complexity arises because the data received at the destination does not have equal a priori probabilities due to potential errors in the source-to-relay link. Numerical results show that the derived upper bound is very tight. The closed-form expression of the upper bound can be used to fully study and understand the diversity performance of the decode-and-forward protocol.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Some Studies on Different Power Allocation Schemes of Superposition Modulationidescitation
Superposition Modulation/Mapping (SM) is a newly
evolving modulation technique in which the conversion from
binary digits to symbols is done by linear superposition of the
binary digits instead of bijective (one-to-one) mapping. Due
to linear superposition, the symbol distribution of the data
symbols thus formed are Gaussian shaped which is capacity
achieving without active signal shaping. In this paper, a detailed
study on SM has been presented with respect to its different
power allocation schemes namely Equal Power Allocation
(EPA), Unequal Power Allocation (UPA) and Grouped Power
Allocation (GPA). Also, it has been shown that SM is more
capacity achieving than the conventional modulation
technique such as Quadrature Amplitude Modulation (QAM)
Analysis of LDPC Codes under Wi-Max IEEE 802.16eIJERD Editor
The LDPC codes have been shown to be by-far the best coding scheme capable for transmitting message over noisy channel. The main aim of this paper is to study the behaviour of LDPC codes on under IEEE 802.16e guidelines. The rate- ½ LDPC codes have been implemented on AWGN channel and the result shows that they can be used on such channels with low BER performance. The BER can be further minimized by increasing the block length.
This document summarizes work done to avoid bottlenecks in personal communication service (PCS) networks. It discusses replicating the home location register (HLR) using various strategies to improve reliability and availability. A multi-HLR architecture is proposed with several zone-based HLRs instead of a single HLR. Performance is analyzed and the cost of location updates is estimated for explicit and group de-registration schemes. Results show the group de-registration scheme in the multi-HLR architecture has lower costs than the explicit scheme. The proposed architecture avoids bottlenecks and stale location entries through replication and group de-registration.
IRJET- Review Paper on Study of Various Interleavers and their SignificanceIRJET Journal
This document reviews various interleavers and their significance in digital communication systems. It discusses how interleavers can be used in turbo encoders and decoders to improve error correction capabilities without reducing bandwidth. The document summarizes different types of interleavers including random, QPP, helical, odd-even, and matrix interleavers. It also discusses turbo encoding and decoding processes and how convolutional codes differ from block codes. Key performance metrics like bit error rate and bit error rate curves are analyzed to evaluate and compare interleaver quality.
REDUCTION OF BUS TRANSITION FOR COMPRESSED CODE SYSTEMSVLSICS Design
Low power VLSI circuit design is one of the most important issues in present day technology. One of the ways of reducing power is to reduce the number of transitions on the bus. The main focus here is to present a method for reducing the power consumption of compressed-code systems by inverting the bits that are transmitted on the bus. Compression will generally increase bit-toggling, as it removes redundancies from the code transmitted on the bus. Arithmetic coding technique is used for compression /decompression and bit-toggling reduction is done by using shift invert coding technique. Therefore, there is also an additional challenge, to find the right balance between compression ratio and the bit-toggling reduction. This technique requires only 2 extra bits for the low Power coding, irrespective of the bit-width of the bus for compressed data.
Methods for Reducing the Activity Switching FactorIJERD Editor
Multiplexing parallel busses into serial links has been proposed for its advantages such as reducing inter connect area, coupling capacitance and crosstalk. But serialization increases bit transition which increases the activity switching factor and power dissipation. Many coding schemes have been proposed to optimize the activity switching factor which is a result of increased number of bit transitions. This paper compares some of the techniques which are used to reduce the activity switching factor and the power dissipation. This paper gives an overview of the bus invert coding, the weight based bus invert coding, the partial bus invert coding, the serialized low energy transmission coding, the transition inversion coding, and the embedded transition inversion coding. The advantages and disadvantages of each technique are compared and the best among them is found to be embedded transition inversion coding.
This document summarizes an article from the International Journal of Electronics and Communication Engineering & Technology. The article derives an exact upper bound on the bit error rate of the decode-and-forward cooperation protocol for wireless relay networks. The destination uses maximum a posteriori decoding to optimally estimate the data sent from the source. The complexity arises because the data received at the destination does not have equal a priori probabilities due to potential errors in the source-to-relay link. Numerical results show that the derived upper bound is very tight. The closed-form expression of the upper bound can be used to fully study and understand the diversity performance of the decode-and-forward protocol.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Some Studies on Different Power Allocation Schemes of Superposition Modulationidescitation
Superposition Modulation/Mapping (SM) is a newly
evolving modulation technique in which the conversion from
binary digits to symbols is done by linear superposition of the
binary digits instead of bijective (one-to-one) mapping. Due
to linear superposition, the symbol distribution of the data
symbols thus formed are Gaussian shaped which is capacity
achieving without active signal shaping. In this paper, a detailed
study on SM has been presented with respect to its different
power allocation schemes namely Equal Power Allocation
(EPA), Unequal Power Allocation (UPA) and Grouped Power
Allocation (GPA). Also, it has been shown that SM is more
capacity achieving than the conventional modulation
technique such as Quadrature Amplitude Modulation (QAM)
Analysis of LDPC Codes under Wi-Max IEEE 802.16eIJERD Editor
The LDPC codes have been shown to be by-far the best coding scheme capable for transmitting message over noisy channel. The main aim of this paper is to study the behaviour of LDPC codes on under IEEE 802.16e guidelines. The rate- ½ LDPC codes have been implemented on AWGN channel and the result shows that they can be used on such channels with low BER performance. The BER can be further minimized by increasing the block length.
This document summarizes work done to avoid bottlenecks in personal communication service (PCS) networks. It discusses replicating the home location register (HLR) using various strategies to improve reliability and availability. A multi-HLR architecture is proposed with several zone-based HLRs instead of a single HLR. Performance is analyzed and the cost of location updates is estimated for explicit and group de-registration schemes. Results show the group de-registration scheme in the multi-HLR architecture has lower costs than the explicit scheme. The proposed architecture avoids bottlenecks and stale location entries through replication and group de-registration.
IRJET- Review Paper on Study of Various Interleavers and their SignificanceIRJET Journal
This document reviews various interleavers and their significance in digital communication systems. It discusses how interleavers can be used in turbo encoders and decoders to improve error correction capabilities without reducing bandwidth. The document summarizes different types of interleavers including random, QPP, helical, odd-even, and matrix interleavers. It also discusses turbo encoding and decoding processes and how convolutional codes differ from block codes. Key performance metrics like bit error rate and bit error rate curves are analyzed to evaluate and compare interleaver quality.
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selectioninventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
This document analyzes the ability of the Gainesville Regional Transit System (RTS) to provide transportation between home and work locations. It uses census and employment data to identify "transit supportive" areas with higher residential and job densities. Only 13% of the study area's land is considered transit supportive, but this area contains 47% of the population and 75% of jobs. The analysis evaluates RTS coverage of these transit supportive areas in two ways: 1) using quarter-mile buffers around bus stops, and 2) analyzing specific home-to-work commute pairs to determine if both origins and destinations have coverage. Key results show significantly higher coverage when considering actual network access versus straight-line buffers, highlighting the importance for accurate pedestrian
Utilise Multipath Propagation to Improve the performance of BCH and RS CodesALYAA AL-BARRAK
The document proposes utilizing multipath propagation to improve the performance of BCH and RS error correction codes without adding redundancy. It discusses using multipath signals as redundant copies, combining them using a Hamming weight combiner. Simulations showed combining 3 paths improved performance of BCH/RS codes with error correction capability t=1, outperforming codes with t=2. Future work includes analyzing performance with higher modulation schemes and wireless channel models.
Cross-Talk Control with Analog In-Memory-Compute for Artificial Intelligence ...Bruce Morton
This brief paper reports on a study of the feasibility of 8-bit precision in analog, in-memory computation of Multiply-Accumulate (MAC) sums, as proposed for implementation of efficient AI/ML hardware. With conventional read-out means and plausible memory array parasitic assumptions, cross-talk renders the 8-bit goal unattainable. In contrast, with the addition of spatial filter circuitry, results show MAC sum read-out can be made insensitive to parasitic cross-talk.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Weighted Duality based Formulation of MIMO SystemsIJERA Editor
This work is based on the modeling and analysis of multiple-input multiple-output (MIMO) system in downlink communication system. We take into account a recent work on the ratio of quadratic forms to formulate the weight matrices of quadratic norm in a duality structure. This enables us to achieve exact solutions for MIMO system operating under Rayleigh fading channels. We outline couple of scenarios dependent on the structure of eigenvalues to investigate the system behavior. The results obtained are validated by means of Monte Carlo simulations.
The document summarizes a proposed architecture that uses Butterfly Weight Accumulators (BWAs) to improve the latency and complexity of computing the Hamming distance when comparing data encoded with error correcting codes. Specifically, it recognizes that error correcting codes are often represented in a systematic form where the data and parity parts are separated. The proposed architecture leverages this by starting the data comparison before fully encoding the parity bits, reducing latency. It also uses BWAs as processing elements that can compute Hamming distance faster than previous saturating adder-based approaches. The architecture is analyzed theoretically and shown to reduce latency and complexity compared to prior direct compare methods.
Performance analysis for power-splitting energy harvesting based two-way full...TELKOMNIKA JOURNAL
Energy harvesting relay network is considered as the promising solution for a wireless
communication network in our time. In this research, we present and demonstrate the system performance
of the energy harvesting based two-way full-duplex relaying network over Nakagami-m fading
environment. Firstly, we propose the analytical expressions of the achievable throughput and outage
probability of the proposed system. In the second step, the effect of various system parameters on
the system performance is presented and investigated. In the final step, the analytical results are also
demonstrated by Monte-Carlo simulation. The numerical results demonstrated and convinced
the analytical and the simulation results are agreed with each other.
Wideband Multi-Port Reflectometer as an Alternative in Reflection Coefficient...TELKOMNIKA JOURNAL
This paper presents the characterization and operation of an alternative device, which is known as multi-port reflectometer to measure the reflection coefficient of any device under test (DUT). Its configuration is formed by two power dividers (D) and four couplers (Q). The characterization is evaluated through the centres of power circles that also known as q-points. Its operation in the reflection coefficient measurement is tested by using three DUTs. The reflectometer’s good performance and wideband operation are proven between the frequency band of 1 and 6 GHz via the practical hardware measurement in the laboratory.
This document summarizes several source coding techniques: Arithmetic coding encodes a message into a single floating point number between 0 and 1. Lempel-Ziv coding builds a dictionary to encode repeated patterns. Run length encoding replaces repeated characters with a code indicating the character and number of repeats. Rate distortion theory calculates the minimum bit rate needed for a given source and distortion. The entropy rate measures how entropy grows with the length of a stochastic process. JPEG uses lossy compression including discrete cosine transform and quantization to discard high frequency data imperceptible to humans.
In this paper, low linear architectures for analyzing the first two maximum or minimum values are of paramount importance in several uses, including iterative decoders. The min-sum giving out step is to that it produces only two diverse output magnitude values irrespective of the number of incoming bit-to check communication. These new micro-architecture structures would utilize the minimum number of comparators by exploiting the concept of survivors in the search. These would result in reduced number of comparisons and consequently reduced energy use. Multipliers are complex units and play an important role in finding the overall area, speed and power consumption of digital designs. By using the multiplier we can minimize the parameters like latency, complexity and power consumption. The decoding algorithms we propose generalize and unify the decoding schemes originally presented the product codes and those of low-density parity-check codes.
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...IJERA Editor
In digital communication forward error correction methods have a great practical importance when channel is
noisy. Convolutional error correction code can correct both type of errors random and burst. Convolution
encoding has been used in digital communication systems including deep space communication and wireless
communication. The error correction capability of convolutional code depends on code rate and constraint
length. The low code rate and high constraint length has more error correction capabilities but that also
introduce large overhead. This paper introduces convolutional encoders for various constraint lengths. By
increasing the constraint length the error correction capability can be increased. The performance and error
correction also depends on the selection of generator polynomial. This paper also introduces a good generator
polynomial which has high performance and error correction capabilities.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This summarizes a fast re-route method to find an alternate path after a link failure, before the interior gateway protocol has reconverged. The method selects the next hop among a source node's neighbors based on which has the lowest number of visits (multiplicity) and shortest estimated distance to the destination. It is proven to always find an alternate path if one exists. The method improves over loop-free alternate approaches by not requiring tunnels. It can find paths for simple cases like a square topology where LFA fails.
IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...IRJET Journal
This document discusses how graph theory and shortest path algorithms are used in routing protocols for wired computer networks. It provides an overview of different routing protocols (RIP, OSPF, EIGRP) and the shortest path algorithms they use (Bellman-Ford, Dijkstra's) to determine the best route between nodes. The author analyzes the efficiency of these routing protocols and algorithms based on how quickly they can calculate the shortest path, especially as network sizes increase. The focus is on analyzing undirected graphs to model computer networks where traffic can flow bidirectionally.
Comparitive analysis of bit error rates of multiple input multiple output tra...slinpublishers
The document compares the bit error rates of multiple input multiple output (MIMO) transmission schemes, including spatial multiplexing, space-time block codes (STBC), and space-time block coded spatial modulation (STBC-SM). It finds that STBC-SM provides better performance than STBC and vertical-Bell labs layered space-time (V-BLAST) spatial multiplexing. Specifically, simulations show STBC-SM has a lower bit error rate than the other schemes when using four transmit and four receive antennas. The document explains the techniques of V-BLAST, STBC, and STBC-SM in detail.
This document summarizes an implementation of a data error corrector using VLSI techniques. It describes a convolutional encoder and Viterbi decoder with a constraint length of 9 and code rate of 1/2, realized using Verilog HDL. Convolutional codes are used for forward error correction in digital data transmission by adding redundant bits. The Viterbi algorithm performs maximum likelihood decoding by using a trellis structure to calculate path metrics and select the most probable transmitted sequence. The implemented Viterbi decoder contains branch metric, path metric, and survivor memory units to decode a received bit stream encoded with a convolutional code. It was simulated and synthesized using Xilinx 13.1i tools.
IRJET- Performance Analysis of a Synchronized Receiver over Noiseless and Fad...IRJET Journal
This document summarizes the performance analysis of a synchronized receiver over noiseless and fading channels. It presents a baseband communications system that implements data phase transmission using a single-tone waveform. The behavior of the received signal when transmitted over a noiseless channel and a fading frequency selective channel with additive white Gaussian noise is analyzed. Key plots analyzed include the channel output power spectrum, cross-spectral phase between the equalizer input and output, control signal for the equalizer, and scatter plots of the equalizer input, output, and descrambler output. The analysis shows distortion of the signal due to noise in the fading channel.
This document discusses adaptive multistreaming over a network using the Stream Control Transmission Protocol (SCTP). It proposes adapting the number of streams based on estimates of available bandwidth and current congestion window size to improve performance under congestion. The performance of this adaptive streams mechanism is evaluated through computer simulation using the OMNeT++ network simulation tool and INET framework. Simulation results are compared between the proposed adaptive streams approach and normal SCTP streaming.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
An Enhanced Performance Pipelined Bus Invert Coding For Power Optimization Of...IRJET Journal
This document proposes an enhanced pipelined bus invert coding technique to optimize power consumption on data buses. The proposed technique reduces the number of transitions on the bus compared to existing methods like bus invert coding and shift invert coding. It modifies the bus invert coding method to maximize power reduction. The proposed circuit performs better in terms of delay, number of transitions, and hardware complexity. Experimental results show the proposed circuit has fewer transitions and is faster than previous versions. It was implemented using Verilog HDL on a Xilinx FPGA and demonstrated improved performance over prior techniques for reducing switching activity and power dissipation.
An Energy-Efficient Dual Hop Cooperative Relay Model With Best Relay Selectioninventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
This document analyzes the ability of the Gainesville Regional Transit System (RTS) to provide transportation between home and work locations. It uses census and employment data to identify "transit supportive" areas with higher residential and job densities. Only 13% of the study area's land is considered transit supportive, but this area contains 47% of the population and 75% of jobs. The analysis evaluates RTS coverage of these transit supportive areas in two ways: 1) using quarter-mile buffers around bus stops, and 2) analyzing specific home-to-work commute pairs to determine if both origins and destinations have coverage. Key results show significantly higher coverage when considering actual network access versus straight-line buffers, highlighting the importance for accurate pedestrian
Utilise Multipath Propagation to Improve the performance of BCH and RS CodesALYAA AL-BARRAK
The document proposes utilizing multipath propagation to improve the performance of BCH and RS error correction codes without adding redundancy. It discusses using multipath signals as redundant copies, combining them using a Hamming weight combiner. Simulations showed combining 3 paths improved performance of BCH/RS codes with error correction capability t=1, outperforming codes with t=2. Future work includes analyzing performance with higher modulation schemes and wireless channel models.
Cross-Talk Control with Analog In-Memory-Compute for Artificial Intelligence ...Bruce Morton
This brief paper reports on a study of the feasibility of 8-bit precision in analog, in-memory computation of Multiply-Accumulate (MAC) sums, as proposed for implementation of efficient AI/ML hardware. With conventional read-out means and plausible memory array parasitic assumptions, cross-talk renders the 8-bit goal unattainable. In contrast, with the addition of spatial filter circuitry, results show MAC sum read-out can be made insensitive to parasitic cross-talk.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Weighted Duality based Formulation of MIMO SystemsIJERA Editor
This work is based on the modeling and analysis of multiple-input multiple-output (MIMO) system in downlink communication system. We take into account a recent work on the ratio of quadratic forms to formulate the weight matrices of quadratic norm in a duality structure. This enables us to achieve exact solutions for MIMO system operating under Rayleigh fading channels. We outline couple of scenarios dependent on the structure of eigenvalues to investigate the system behavior. The results obtained are validated by means of Monte Carlo simulations.
The document summarizes a proposed architecture that uses Butterfly Weight Accumulators (BWAs) to improve the latency and complexity of computing the Hamming distance when comparing data encoded with error correcting codes. Specifically, it recognizes that error correcting codes are often represented in a systematic form where the data and parity parts are separated. The proposed architecture leverages this by starting the data comparison before fully encoding the parity bits, reducing latency. It also uses BWAs as processing elements that can compute Hamming distance faster than previous saturating adder-based approaches. The architecture is analyzed theoretically and shown to reduce latency and complexity compared to prior direct compare methods.
Performance analysis for power-splitting energy harvesting based two-way full...TELKOMNIKA JOURNAL
Energy harvesting relay network is considered as the promising solution for a wireless
communication network in our time. In this research, we present and demonstrate the system performance
of the energy harvesting based two-way full-duplex relaying network over Nakagami-m fading
environment. Firstly, we propose the analytical expressions of the achievable throughput and outage
probability of the proposed system. In the second step, the effect of various system parameters on
the system performance is presented and investigated. In the final step, the analytical results are also
demonstrated by Monte-Carlo simulation. The numerical results demonstrated and convinced
the analytical and the simulation results are agreed with each other.
Wideband Multi-Port Reflectometer as an Alternative in Reflection Coefficient...TELKOMNIKA JOURNAL
This paper presents the characterization and operation of an alternative device, which is known as multi-port reflectometer to measure the reflection coefficient of any device under test (DUT). Its configuration is formed by two power dividers (D) and four couplers (Q). The characterization is evaluated through the centres of power circles that also known as q-points. Its operation in the reflection coefficient measurement is tested by using three DUTs. The reflectometer’s good performance and wideband operation are proven between the frequency band of 1 and 6 GHz via the practical hardware measurement in the laboratory.
This document summarizes several source coding techniques: Arithmetic coding encodes a message into a single floating point number between 0 and 1. Lempel-Ziv coding builds a dictionary to encode repeated patterns. Run length encoding replaces repeated characters with a code indicating the character and number of repeats. Rate distortion theory calculates the minimum bit rate needed for a given source and distortion. The entropy rate measures how entropy grows with the length of a stochastic process. JPEG uses lossy compression including discrete cosine transform and quantization to discard high frequency data imperceptible to humans.
In this paper, low linear architectures for analyzing the first two maximum or minimum values are of paramount importance in several uses, including iterative decoders. The min-sum giving out step is to that it produces only two diverse output magnitude values irrespective of the number of incoming bit-to check communication. These new micro-architecture structures would utilize the minimum number of comparators by exploiting the concept of survivors in the search. These would result in reduced number of comparisons and consequently reduced energy use. Multipliers are complex units and play an important role in finding the overall area, speed and power consumption of digital designs. By using the multiplier we can minimize the parameters like latency, complexity and power consumption. The decoding algorithms we propose generalize and unify the decoding schemes originally presented the product codes and those of low-density parity-check codes.
Design and Performance Analysis of Convolutional Encoder and Viterbi Decoder ...IJERA Editor
In digital communication forward error correction methods have a great practical importance when channel is
noisy. Convolutional error correction code can correct both type of errors random and burst. Convolution
encoding has been used in digital communication systems including deep space communication and wireless
communication. The error correction capability of convolutional code depends on code rate and constraint
length. The low code rate and high constraint length has more error correction capabilities but that also
introduce large overhead. This paper introduces convolutional encoders for various constraint lengths. By
increasing the constraint length the error correction capability can be increased. The performance and error
correction also depends on the selection of generator polynomial. This paper also introduces a good generator
polynomial which has high performance and error correction capabilities.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This summarizes a fast re-route method to find an alternate path after a link failure, before the interior gateway protocol has reconverged. The method selects the next hop among a source node's neighbors based on which has the lowest number of visits (multiplicity) and shortest estimated distance to the destination. It is proven to always find an alternate path if one exists. The method improves over loop-free alternate approaches by not requiring tunnels. It can find paths for simple cases like a square topology where LFA fails.
IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired...IRJET Journal
This document discusses how graph theory and shortest path algorithms are used in routing protocols for wired computer networks. It provides an overview of different routing protocols (RIP, OSPF, EIGRP) and the shortest path algorithms they use (Bellman-Ford, Dijkstra's) to determine the best route between nodes. The author analyzes the efficiency of these routing protocols and algorithms based on how quickly they can calculate the shortest path, especially as network sizes increase. The focus is on analyzing undirected graphs to model computer networks where traffic can flow bidirectionally.
Comparitive analysis of bit error rates of multiple input multiple output tra...slinpublishers
The document compares the bit error rates of multiple input multiple output (MIMO) transmission schemes, including spatial multiplexing, space-time block codes (STBC), and space-time block coded spatial modulation (STBC-SM). It finds that STBC-SM provides better performance than STBC and vertical-Bell labs layered space-time (V-BLAST) spatial multiplexing. Specifically, simulations show STBC-SM has a lower bit error rate than the other schemes when using four transmit and four receive antennas. The document explains the techniques of V-BLAST, STBC, and STBC-SM in detail.
This document summarizes an implementation of a data error corrector using VLSI techniques. It describes a convolutional encoder and Viterbi decoder with a constraint length of 9 and code rate of 1/2, realized using Verilog HDL. Convolutional codes are used for forward error correction in digital data transmission by adding redundant bits. The Viterbi algorithm performs maximum likelihood decoding by using a trellis structure to calculate path metrics and select the most probable transmitted sequence. The implemented Viterbi decoder contains branch metric, path metric, and survivor memory units to decode a received bit stream encoded with a convolutional code. It was simulated and synthesized using Xilinx 13.1i tools.
IRJET- Performance Analysis of a Synchronized Receiver over Noiseless and Fad...IRJET Journal
This document summarizes the performance analysis of a synchronized receiver over noiseless and fading channels. It presents a baseband communications system that implements data phase transmission using a single-tone waveform. The behavior of the received signal when transmitted over a noiseless channel and a fading frequency selective channel with additive white Gaussian noise is analyzed. Key plots analyzed include the channel output power spectrum, cross-spectral phase between the equalizer input and output, control signal for the equalizer, and scatter plots of the equalizer input, output, and descrambler output. The analysis shows distortion of the signal due to noise in the fading channel.
This document discusses adaptive multistreaming over a network using the Stream Control Transmission Protocol (SCTP). It proposes adapting the number of streams based on estimates of available bandwidth and current congestion window size to improve performance under congestion. The performance of this adaptive streams mechanism is evaluated through computer simulation using the OMNeT++ network simulation tool and INET framework. Simulation results are compared between the proposed adaptive streams approach and normal SCTP streaming.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
An Enhanced Performance Pipelined Bus Invert Coding For Power Optimization Of...IRJET Journal
This document proposes an enhanced pipelined bus invert coding technique to optimize power consumption on data buses. The proposed technique reduces the number of transitions on the bus compared to existing methods like bus invert coding and shift invert coding. It modifies the bus invert coding method to maximize power reduction. The proposed circuit performs better in terms of delay, number of transitions, and hardware complexity. Experimental results show the proposed circuit has fewer transitions and is faster than previous versions. It was implemented using Verilog HDL on a Xilinx FPGA and demonstrated improved performance over prior techniques for reducing switching activity and power dissipation.
Comparative evaluation of bit error rate for different ofdm subcarriers in ra...ijmnct
In the present situation, the expectation about the quality of signals in wireless communication is as high as possible. This quality issue is dependent upon the different communication parameters. One of the most important issues is to reduce the bit error rate (BER) to enhance the performance of the system. This paper provides a comparative analysis on the basis of this bit error rate. I have compared the BER for different number of subcarriers in OFDM system for BPSK modulation scheme. I have taken 6 varieties of data subcarriers to analyze this comparison. Here my target is to reach at the lowest level of BER for BPSK modulation. That is achieved at 2048 number of subcarriers.
Giga bit per second Differential Scheme for High Speed InterconnectVLSICS Design
This document summarizes a research paper on developing a high-speed transmitter for off-chip communication using differential signaling. It describes a transmitter circuit that consists of low-speed input buffers, serializers to convert parallel data to serial data, and current-mode drivers to transmit the serial data differentially over transmission lines. The serializers use a delay locked loop to generate clock phases that sample the parallel inputs and transmit each bit over the serial link for an equal duration. The current-mode drivers convert the serial data to differential current levels on the transmission line. The design is intended to increase I/O bandwidth for high-speed chip-to-chip communication.
Area, Delay and Power Comparison of Adder TopologiesVLSICS Design
This document compares the area, delay, and power characteristics of different adder topologies, including ripple carry adder, carry look-ahead adder, carry skip adder, carry select adder, carry increment adder, carry save adder, and carry bypass adder. It analyzes the functionality and performance of 8-bit implementations of each adder type using Microwind simulation software at a 0.12μm CMOS technology node. The ripple carry adder has the simplest design but the longest propagation delay that scales with the number of bits, while other topologies like the carry look-ahead adder and carry skip adder reduce delay but have more complex circuitry. The document aims to
Highly -increasing requirement for mobile and several electronic devices want the use of VLSI circuits which are highly power efficient. The most primitive arithmetic operation in processors is addition and the adder is the most highly used arithmetic component of the processor. Carry Select Adder (CSA) is one of the fastest adders and the structure of the CSA shows that there is a possibility for increasing its efficiency by reducing the power dissipation and area in the CSA. This research paper presents power and delay analysis of various adders and proposed a 32-bit CSA that is implemented using variable size of the combination of adders, thus the proposed Carry select Adder (CSA) which has minimum Delay, and less power consumption hence improving the efficiency and speed of the Carry Select Adder.
Performance evaluation on the basis of bit error rate for different order of ...ijmnct
This document summarizes research evaluating the bit error rate (BER) for different modulation orders and subchannel lengths in an orthogonal frequency division multiplexing (OFDM) system. The research considers QPSK, 8-QAM, and 16-QAM modulation with 256, 512, and 4096 subchannels. Simulation results in MATLAB show that:
1) For 256 subchannels, QPSK modulation has the lowest BER across signal-to-noise ratio (SNR) values from 0-27dB.
2) BER increases with higher modulation orders (from QPSK to 16-QAM) for a given subchannel length.
3) The research provides a comparative analysis of BER performance in an OFDM system
Indexed-channel estimation under frequency and time-selective fading channels...IJECEIAES
Index modulation (IM) techniques have been employed in different communication systems to improve bandwidth efficiency by carrying additional information bits. In high-mobility communication systems and under both time-selective and frequency-selective fading channels with Doppler spread, channel variations can be tracked by employing pilot-aided channel estimation with minimum mean-squared error estimation. However, inserting pilot symbols among information symbols reduces the system's spectral efficiency in pilot-aided channel estimation schemes. We propose pilot-aided channel estimation with zero-pilot symbols and an energy detection scheme to tackle this issue. Part of the information bit-stream is conveyed by the indices of zero-pilot symbols leading to an increase in the system's spectral efficiency. We used an energy detector at the receiver to detect the transmitted zero-pilot symbols. This paper examines the impacts of diversity order on the zero-pilot symbol detection error probability and the mean-squared of error estimation. The impacts of pilot symbols number and the zero-pilot symbol number on the mean-squared error of the minimum mean-squared error (MMSE) estimator and the system error performance are also investigated in this paper.
Performance improvement of mimo mc cdma system using relay and itbfTamilarasan N
This document proposes using relay and improved transmit beamforming (ITBF) to improve the performance of a MIMO MC-CDMA wireless communication system. It describes a system model where a transmitter communicates with a receiver using multiple antennas, with a half-duplex relay node providing assistance. ITBF and relaying are used to reduce inter-symbol interference caused by multipath fading. Simulation results show the proposed system achieves high-speed data transmission through improved channel conditions and reduced error rates compared to systems without ITBF and relaying.
Distributed Path Computation Using DIV AlgorithmIOSR Journals
This document summarizes research on distributed path computation algorithms that aim to prevent routing loops. It introduces the Distributed Path Computation with Intermediate Variables (DIV) algorithm, which can operate with any routing algorithm to guarantee loop-freedom. DIV generalizes previous loop-free algorithms and provably outperforms them by reducing synchronous updates and helping maintain paths during network changes. The document also reviews link-state routing, distance-vector routing, and existing loop-prevention techniques like the Diffusing Update Algorithm and Loop Free Invariance algorithms.
This document summarizes research on distributed path computation algorithms that aim to prevent routing loops. It introduces the Distributed Path Computation with Intermediate Variables (DIV) algorithm, which can operate with any routing algorithm to guarantee loop-freedom. DIV generalizes previous loop-free algorithms and provably outperforms them by reducing synchronous updates and helping maintain paths during network changes. The document also reviews link-state routing, distance-vector routing, and existing loop-prevention techniques like the Diffusing Update Algorithm and Loop Free Invariance algorithms.
BUS ENCODER FOR CROSSTALK AVOIDANCE IN RLC MODELED VLSICS Design
The document proposes a bus encoder design to reduce crosstalk and power dissipation in RLC modeled VLSI interconnects. It introduces a modified bus invert encoding method using counters to count different types of crosstalk couplings. The encoder divides the data bus into clusters of 4 data bits and 1 control bit. It uses counters to count type-0, type-1 couplings with original and inverted data. The counts are compared and the control bit determines if original or inverted data is transmitted, reducing switching activity and crosstalk. Simulation results show the proposed encoder reduces power dissipation and crosstalk induced delay by 55.43% and 45.87% respectively compared to previous designs.
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...Cemal Ardil
This document summarizes research on efficient spreading codes for transmitter-based techniques to mitigate interference in time division duplex code division multiple access (TDD/CDMA) downlink systems. It investigates bitwise and blockwise multiuser transmission schemes that transfer complexity to the transmitter. Different spreading codes are evaluated based on correlation properties to determine suitability for techniques like precoding, pre-rake, and rake diversity. Performance is measured by bit error rate with varying numbers of users to identify the most efficient codes for interference mitigation.
This document proposes a discrete wavelet transform (DWT)-based channel estimation method for MIMO-OFDM systems. It describes the transmitter and receiver structures of a wavelet-based OFDM system with multiple antennas. At the transmitter, data is modulated using inverse DWT and transmitted over frequency-selective channels. At the receiver, received signals are processed using DWT to estimate the channel. Least squares and minimum mean squared error estimation techniques are discussed. Simulation results show the DWT-based system achieves better bit error rate performance than conventional FFT-based OFDM.
This document describes the design and implementation of diagnostic access for AMBA AHB communication protocols between a master and slave device. A core was designed using a master-slave topology to perform efficient write operations. The process involved designing master and slave units and a test bench to simulate communication. VHDL and XILINX were used to generate a synthesis report. The 32-bit address and data bus protocol supports high-bandwidth communication between processors and low-bandwidth peripherals. Features like burst transfers and wider data buses were implemented to support high performance systems.
This document provides an overview and critical analysis of pilot-based and blind channel estimation techniques for OFDM systems. It first describes the basic OFDM system model and how it is used for pilot-based channel estimation, where pilot signals are inserted into subcarriers periodically to estimate the channel. It then discusses blind channel estimation techniques that do not require transmitting a training sequence. The document analyzes various channel estimation techniques like least squares, minimum mean square error, constant modulus algorithm, and linear precoding. It aims to aid the development of new blind channel estimation methods by comparing existing techniques.
This document summarizes various techniques for improving energy efficiency in wireless sensor networks. It discusses techniques such as energy-based transmission, communication through silence, variable-based tacit communication, ternary with silent symbol, and RBNSizeComm. Communication through silence saves energy by using silence to transmit 0 bits instead of transmitting energy for every bit. Ternary with silent symbol converts data to a ternary system using silent symbols to save energy at both the transmitter and receiver. The document also discusses applications of wireless sensor networks and concludes that communication through silence provides better energy savings than other techniques.
Diagnostic Access of AMBA-AHB Communication Protocolsidescitation
In this paper a diagnostic access of AMBA AHB communication protocols is
designed and implemented. AMBA AHB communication protocols are designed using
master slave topology. A core is designed for implementation of communication protocols
between master and slave device to perform efficient write operation. The process involves
design and implementation of a master unit and a slave unit. Further a test bench is
designed to simulate the communication between master and slave. A synthesis report of the
process is generated using VHDL and XILINX. The process is configured for Address and
Data bus of 32 bit width. The designed AMBA AHB communication protocol between
master and single slave supports technology independent data transfer between high band
width and high clock frequency multiprocessors and multi-CPU based embedded systems
like arm processors and low bandwidth peripherals like IC based processors, standard
macro cells, flash memory etc. The features required for high performance, high clock
frequency systems including burst transfers, single clock edge operations, non–tristate
implementation and wider data bus configuration are implemented in the design.
MODELLING AND SIMULATION OF 128-BIT CROSSBAR SWITCH FOR NETWORK -ONCHIPVLSICS Design
This is widely accepted that Network-on-Chip represents a promising solution for forthcoming complex embedded systems. The current SoC Solutions are built from heterogeneous hardware and Software components integrated around a complex communication infrastructure. The crossbar is a vital component of in any NoC router. In this work, we have designed a crossbar interconnect for serial bit data transfer and 128-parallel bit data transfer. We have shown comparision between power and delay for the serial bit and parallel bit data transfer through crossbar switch. The design is implemented in 0.180 micron TSM technology.The bit rate achived in serial transfer is slow as compared with parallel data transfer. The simulation resuls show that the critical path delay is less for parallel bit data transfer but power dissipation is high.
An Investigation of DAF Protocol in Wireless CommunicationIRJET Journal
This document summarizes research on the differential amplify-and-forward (D-AF) cooperative communication protocol for wireless networks. It describes a system model with one source, multiple relays, and one destination node communicating over time-varying Rayleigh fading channels. New combining weights are proposed for reception at the destination based on the statistical properties of the wireless channels. Expressions for pairwise error probability and average bit error rate are derived. Simulation results show that the new weights provide more robust performance compared to standard combining, especially in scenarios with fast fading channels between the source/relays and destination.
Similar to UNIVERSAL ROTATE INVERT BUS ENCODING FOR LOW POWER VLSI (20)
This study Examines the Effectiveness of Talent Procurement through the Imple...DharmaBanothu
In the world with high technology and fast
forward mindset recruiters are walking/showing interest
towards E-Recruitment. Present most of the HRs of
many companies are choosing E-Recruitment as the best
choice for recruitment. E-Recruitment is being done
through many online platforms like Linkedin, Naukri,
Instagram , Facebook etc. Now with high technology E-
Recruitment has gone through next level by using
Artificial Intelligence too.
Key Words : Talent Management, Talent Acquisition , E-
Recruitment , Artificial Intelligence Introduction
Effectiveness of Talent Acquisition through E-
Recruitment in this topic we will discuss about 4important
and interlinked topics which are
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...IJCNCJournal
Paper Title
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation with Hybrid Beam Forming Power Transfer in WSN-IoT Applications
Authors
Reginald Jude Sixtus J and Tamilarasi Muthu, Puducherry Technological University, India
Abstract
Non-Orthogonal Multiple Access (NOMA) helps to overcome various difficulties in future technology wireless communications. NOMA, when utilized with millimeter wave multiple-input multiple-output (MIMO) systems, channel estimation becomes extremely difficult. For reaping the benefits of the NOMA and mm-Wave combination, effective channel estimation is required. In this paper, we propose an enhanced particle swarm optimization based long short-term memory estimator network (PSOLSTMEstNet), which is a neural network model that can be employed to forecast the bandwidth required in the mm-Wave MIMO network. The prime advantage of the LSTM is that it has the capability of dynamically adapting to the functioning pattern of fluctuating channel state. The LSTM stage with adaptive coding and modulation enhances the BER.PSO algorithm is employed to optimize input weights of LSTM network. The modified algorithm splits the power by channel condition of every single user. Participants will be first sorted into distinct groups depending upon respective channel conditions, using a hybrid beamforming approach. The network characteristics are fine-estimated using PSO-LSTMEstNet after a rough approximation of channels parameters derived from the received data.
Keywords
Signal to Noise Ratio (SNR), Bit Error Rate (BER), mm-Wave, MIMO, NOMA, deep learning, optimization.
Volume URL: https://airccse.org/journal/ijc2022.html
Abstract URL:https://aircconline.com/abstract/ijcnc/v14n5/14522cnc05.html
Pdf URL: https://aircconline.com/ijcnc/V14N5/14522cnc05.pdf
#scopuspublication #scopusindexed #callforpapers #researchpapers #cfp #researchers #phdstudent #researchScholar #journalpaper #submission #journalsubmission #WBAN #requirements #tailoredtreatment #MACstrategy #enhancedefficiency #protrcal #computing #analysis #wirelessbodyareanetworks #wirelessnetworks
#adhocnetwork #VANETs #OLSRrouting #routing #MPR #nderesidualenergy #korea #cognitiveradionetworks #radionetworks #rendezvoussequence
Here's where you can reach us : ijcnc@airccse.org or ijcnc@aircconline.com
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Open Channel Flow: fluid flow with a free surfaceIndrajeet sahu
Open Channel Flow: This topic focuses on fluid flow with a free surface, such as in rivers, canals, and drainage ditches. Key concepts include the classification of flow types (steady vs. unsteady, uniform vs. non-uniform), hydraulic radius, flow resistance, Manning's equation, critical flow conditions, and energy and momentum principles. It also covers flow measurement techniques, gradually varied flow analysis, and the design of open channels. Understanding these principles is vital for effective water resource management and engineering applications.
Accident detection system project report.pdfKamal Acharya
The Rapid growth of technology and infrastructure has made our lives easier. The
advent of technology has also increased the traffic hazards and the road accidents take place
frequently which causes huge loss of life and property because of the poor emergency facilities.
Many lives could have been saved if emergency service could get accident information and
reach in time. Our project will provide an optimum solution to this draw back. A piezo electric
sensor can be used as a crash or rollover detector of the vehicle during and after a crash. With
signals from a piezo electric sensor, a severe accident can be recognized. According to this
project when a vehicle meets with an accident immediately piezo electric sensor will detect the
signal or if a car rolls over. Then with the help of GSM module and GPS module, the location
will be sent to the emergency contact. Then after conforming the location necessary action will
be taken. If the person meets with a small accident or if there is no serious threat to anyone’s
life, then the alert message can be terminated by the driver by a switch provided in order to
avoid wasting the valuable time of the medical rescue team.
Supermarket Management System Project Report.pdfKamal Acharya
Supermarket management is a stand-alone J2EE using Eclipse Juno program.
This project contains all the necessary required information about maintaining
the supermarket billing system.
The core idea of this project to minimize the paper work and centralize the
data. Here all the communication is taken in secure manner. That is, in this
application the information will be stored in client itself. For further security the
data base is stored in the back-end oracle and so no intruders can access it.
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfBalvir Singh
Sri Guru Hargobind Ji (19 June 1595 - 3 March 1644) is revered as the Sixth Nanak.
• On 25 May 1606 Guru Arjan nominated his son Sri Hargobind Ji as his successor. Shortly
afterwards, Guru Arjan was arrested, tortured and killed by order of the Mogul Emperor
Jahangir.
• Guru Hargobind's succession ceremony took place on 24 June 1606. He was barely
eleven years old when he became 6th Guru.
• As ordered by Guru Arjan Dev Ji, he put on two swords, one indicated his spiritual
authority (PIRI) and the other, his temporal authority (MIRI). He thus for the first time
initiated military tradition in the Sikh faith to resist religious persecution, protect
people’s freedom and independence to practice religion by choice. He transformed
Sikhs to be Saints and Soldier.
• He had a long tenure as Guru, lasting 37 years, 9 months and 3 days
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Ericsson LTE Throughput Troubleshooting Techniques.ppt
UNIVERSAL ROTATE INVERT BUS ENCODING FOR LOW POWER VLSI
1. International Journal of VLSI design & Communication Systems (VLSICS) Vol.3, No.4, August 2012
DOI : 10.5121/vlsic.2012.3409 97
UNIVERSAL ROTATE INVERT BUS ENCODING FOR
LOW POWER VLSI
Shankaranarayana Bhat M1
and D. Yogitha Jahnavi2
1
Associate Professor, Department of Electronics and Communication Engineering,
Manipal Institute of Technology, Manipal University, Manipal, Karnataka, India
msnbhat@yahoo.com
2
Student, Department of Electronics and Communication Engineering, Manipal Institute
of Technology, Manipal University, Manipal, Karnataka, India
yogithadodda@gmail.com
ABSTRACT
Power dissipation is an important design constraint in today’s CMOS VLSI design and is addressed widely
by the researchers across the globe. Switching activity is one of the factors that affect dynamic power in a
chip and several publications have suggested various techniques to reduce the same. Reduction of
switching activity in the busses attains significance as bus width, bus capacitance and the clock are
recording continuous uptrend. In this paper, we propose a technique for bus encoding, which, reduces the
number of transitions on the bus and performs better than the existing methods such as bus invert coding
and shift invert coding for random data in terms of switching activity, without the need for extra overhead
in computation and circuit. However, irrespective of the bus width it needs three extra bits and does not
assume anything about the nature of the data on the bus.
KEYWORDS
Bus encoding, Switching activity, CMOS VLSI, Power dissipation, Low Power Design.
1. INTRODUCTION
Power dissipation in CMOS circuits is a major concern for VLSI design. The power dissipation in
CMOS can be classified in to two types, namely, dynamic and static power dissipation. While the
static power dissipation is caused by leakage currents in transistors the major components of
dynamic power dissipation is switching power and short circuit power. Switching power is
dissipated when there is a transition from 1 to 0 or from 0 to 1. The probability of such transition
is called switching activity.
We can express the dynamic power as
Where, = Dynamic power dissipation, = Switching activity, = Power supply
= Load Capacitance, = Clock Frequency.
The equation for power dissipation in a bus is as follows:
;
Where = Width of the bus
Inferring from the above equation, the power dissipation in a bus proportional to the switching
activity and the width of the bus.
2. International Journal of VLSI design & Communication Systems (VLSICS) Vol.3, No.4, August 2012
98
To reduce power dissipation on a bus the input data is encoded so that the number of transitions
between the input data and the data on the bus is reduced. The data on the bus refers to the data
which was previously sent over the bus.
Over the years many bus encoding techniques have been proposed and most of them aim at
reducing the number of transitions on the bus. Some of them focus on data buses or data address
buses while the others focus on instruction address buses.
In instruction address buses the data is sequential, that is, they are consecutive binary numbers. In
data buses or data address buses the data is random. We need to have different techniques to
encode random data and sequential data in order to reduce the number of transitions.
2. RELATED WORK
There have been many techniques proposed and implemented to achieve reduction of the
switching activity in the buses. Following paragraphs briefly describe such existing techniques.
2.1 Bus-Invert Coding [1]
This method uses an extra control bit called invert. The hamming distance (the number of
transitions) between the present bus value and the next data value is computed. If this hamming
distance is greater than n/2, where ‘n’ is the width of the bus, then the data value is inverted (bit
complemented) and transmitted over the bus. In this case invert=1. If the hamming distance is not
greater than n/2, then the data value is transmitted as it is. In this case invert=0.
2.2 Partial Bus-Invert Coding [2]
In PBI coding, we partition a bus into two sub buses based on the behaviour of patterns
transferred. For example, we partition a bus B into a selected sub bus S and the remaining sub bus
R such that S contains bus lines having higher transition correlation and/or higher transition
probability and R contains the remaining bus lines. Because the bus lines in R have low
correlation with those in S and low transition activity, inverting those in R may increase rather
than decrease the transition activity. Therefore, by applying BI coding only to the sub bus S, we
can reduce the hardware overhead as well as decrease the total number of bus transitions.
2.3 Frequent value technique [3]
This technique creates a small table of statistically or dynamically determined common bit
patterns. It uses a small look-up table to create one-hot encoding alternatives for the high
transition patterns. It XORs the one-hot alternatives with the previous data transmissions. It
reduces switching 2-4 times more effectively than bus-invert coding.
2.4 Gray code [4]
In gray code only one bit differs from consecutive numbers. If input patterns are consecutive then
they are converted from binary to gray code. The data thus encoded using gray code reduces the
number of transitions considerably when compared to binary. An additional redundant line is
required.
2.5 T0 / Asymptotic zero-transition technique [5]
The T0 method requires an extra redundant line called INC which indicates to the receiver
whether the data is consecutive or not. If INC=1 then the data is consecutive. Hence all others
lines on the bus are frozen, to avoid unnecessary switching. The new address is computed directly
by the receiver. On the other hand, when the two addresses are not consecutive, INC=0 and the
remaining bus lines are used as standard binary codes for the new addresses.
3. International Journal of VLSI design & Communication Systems (VLSICS) Vol.3, No.4, August 2012
99
2.6 T0-C (T0-Concise) [6]
This code is an extension of T0 code. It improves T0 code in a number of important ways. First of
all, it eliminates the redundant bit. Second, it results in higher power saving on the bus.
2.7 T0-BI technique [5]
This is a mixed encoding, where in two types of encoding-T0 and BI- is employed. In this
method, two redundant lines INC and INV are used to convey the receiver the type of encoding is
being used.
If both INC =0 and INV=0, then data was transmitted as it is.
If INC=0 and INV=1 then the data has been inverted (bit complemented).
If INC=1 and INV=0 then the data is consecutive and the bus is frozen till INC=0. The receiver
directly computes the new addresses.
2.8 T0-BI_1 technique [7]
T0_BI_1 design uses only one control line, called INCV, to control both INC and INV functions
to transmit a data address, the encoder of T0_BI_1 first detects the continuity of the transferred
address sequence. The continuity means that the current address is equal to the sum of the
previous address and the stride. Transmission of an address with continuity property is done with
an asserted INCV and a frozen address bus.
If continuity test fails, then the encoder checks to see if the address pattern produces bus bit-
transitions on more than half of the address bus lines and the inverted address pattern is not equal
to the previous bus value, then the INCV is also asserted and the inverted address is sent over the
address bus.
Otherwise, the INCV line is de-asserted and the address will be sent directly.
2.9 Dual-T0 technique [5]
In the case of multiplexed address buses two address buses α and ß are time-multiplexed on the
same address bus. Stream α, corresponding to instruction addresses, has high probability of
having two consecutive addresses on the bus in two successive clock cycles (sequential).Stream
ß, corresponding to data addresses, has almost no in-sequence patterns (random).The control
signal SEL (used to de-multiplex the bus) is high for stream α and low for stream ß.
In this technique, T0 code is applied when SEL is high (i.e., stream α) and binary code is applied
when SEL is low (i.e., stream ß).
2.10 Dual T0-BI technique [5]
This technique requires an additional control signal called INCV to indicate to the receiver
whether the data is inverted or not. When SEL=1 and INCV=1 then the incoming data is
consecutive. Hence T0 coding is applied. When SEL=0 and INCV=1 then the received data is
inverted (bit complemented). When INCV=0, irrespective of the value of SEL, then the received
data is unmodified.
2.11 T0-XOR technique [8]
This technique extends the capabilities of the T0 code by combining it with a xor function:
B(t)= [b(t) (XOR) (b(t-1) + S)] (XOR) B(t-1) t > 0
b(t) t = 0
4. International Journal of VLSI design & Communication Systems (VLSICS) Vol.3, No.4, August 2012
100
where B(t) is the value on the encoded bus lines at time t, b(t) is the bus value at time t and S is
the Stride. The presence of the decorrelating XOR function enables us to avoid the introduction of
the redundant line INC to the bus, necessary for the T0 code.
2.12 Shift-Inv technique [9]
In this technique we shift the data bits by one bit position (left-shift and right-shift) if the shifting
reduces the number of transitions. Among four operations, namely, data shifted left, shifted right,
inverted and sent as unmodified, whichever gives the least number of transitions that data is sent
on the bus. To indicate the operation performed it requires two extra bits.
2.13 Transition signaling technique [10]
This technique encodes logic 1 as having a transition and logic 0 as lack of transition (or vice-
versa).It is efficient with respect to power consumption when the probability of 0 (or 1) is very
high. After encoding the input data using this method, the number of transitions is equal to the
number of 1s.
2.14 BITS technique [11]
In this technique, if the number of 1’s in the input data is more than half the bus width, then each
bit is inverted and then encoded using transition signalling. Otherwise, each bit of the input data
is encoded using transition signalling without alteration. An extra bus line is used to signal the
inversion.
2.15 Offset-XOR technique [8]
In this technique the difference between the current value of b(t) and the previous value b(t-1) is
transmitted on the bus. When the bus values transmitted on the buses are highly correlated, the
value on the encoded bus lines B(t) is reduced, and it is kept constant for in-sequence data. In the
Offset-XOR code, we first compute the difference (b(t) - b(t-1)), then we execute a XOR function
to decorrelate the encoded bus lines:
B(t) = (b(t) - b(t-1)) (XOR) B(t-1) t > 0
b(t) t = 0
This technique does not use any extra redundant bits.
2.16 EXNOR technique [12]
The scheme encodes the data by applying either XOR or XNOR operation.
D(t): un-encoded data to be transmitted at time t
L(D(t)): encoded data on the bus at time t
The m-bit bus is divided into subsets with each subset consisting of 4 bits. Then the number of
zeroes in the subset of D(t) are computed.
L(D(t+1)) = L(D(t)) (XOR) D(t+1) (1)
L(D(t+1)) = L(D(t)) (XNOR) D(t+1) (2)
If the number of 0s is greater than the number of 1s then we use the first equation.
If the number of 0s is less than the number of 1s then we use the second equation.
If the number of 0s and 1s are equal then there are three different cases.
5. International Journal of VLSI design & Communication Systems (VLSICS) Vol.3, No.4, August 2012
101
2.17 Adaptive code-book technique [13]
This technique reduces bus signal transitions by referring a code-book that has the transmitted
past data. To adapt the code-book to data streams the code-book is updated at every cycle.
1) Code selection in the code-book
2) Data transmission to the bus lines
3) Code-book updating
2.18 T0-CAC [14]
The basic concept is to assign the least signal transition codes to the most frequent patterns. For
example, the following case occurs on the instruction address bus without JUMP or BRANCH
operations.
Data(t) = Data(t–1) + S
This method assigns zero transition code to such cases just like T0 code (or T0-C code). As a
result, Data(t) is encoded to Bus(t–1). In addition, we use an adaptive codebook which contains
the recently accessed destination address of JUMP / BRANCH operation (JUMP/BRANCH
destination address history). In case that the address to be transmitted is hit to one of the
addresses in the codebook, this method assigns MSB one-hot code to such cases. For example, in
case of a loop operation, the same destination addresses of JUMP/BRANCH operations will
frequently appear. By using T0CAC code, the number of signal transitions is effectively reduced
in such cases.
2.19 OXAC [14]
Basic concept is very similar to T0CAC code in the sense that both encoding methods use
adaptive codebooks which contain history of JUMP/BRANCH destination addresses. In the cases
that the address does not hit to the codebook, OXAC encoder transmits an offset between Data(t)
and Data(t–1) whereas T0CAC encoder transmits a raw address value(Data(t)).
2.20 Beach solution [15]
This technique makes clusters of bus lines based on statistical information of address patterns.
Then it generates an encoding function for each cluster such that the encoded version of each
cluster results in fewer transitions.
The technique has proved to be particularly suitable for special purpose machines, where the
same portion of embedded code is executed over and over.
The performances measures of any bus encoding techniques used for the reduction of switching
activity include mainly the delay caused by the additional computation required, the hardware
overhead needed for implementation of encoding and decoding techniques at the sending and the
receiving end respectively causing an increases in area, power dissipation and extra bits required
to represent the encoding technique.
Most of the methods try to reduce the number of transitions while also simultaneously trying to
mitigate the above mentioned problems.
3. METHODOLOGY
In the proposed method, multiple options will be explored and weighed to see which technique
will give the minimum number of switching and the technique so selected will be put on the bus.
6. International Journal of VLSI design & Communication Systems (VLSICS) Vol.3, No.4, August 2012
102
The type of coding so selected will be communicated to the receiver by three additional bits. The
options tried are listed bellow:
• Invert or bit complement
• Rotate left by one bit
• Rotate right by one bit
• Rotate left by one bit and invert
• Rotate right by one bit and invert
Though the first three options were already reported, we add the last two techniques to get an
integrated approach and as seen in the later part of discussion, the combination results better
switching efficiency.
The process of encoding is as follows. Unmodified data is encoded using rotate right by one bit
and rotate left by one bit codes. The number of transitions between the unmodified data and the
data on the bus are computed. This number of transitions is compared with half the bus width
(n/2), to check whether it is greater than n/2 or not. If this number of transitions is greater than n/2
then the unmodified data is encoded using the invert code. The number of transitions between this
inverted data and the data on the bus is calculated. The number of transitions between the data
rotated right by one bit and the data on the bus is computed. This number of transitions is
compared with half the bus width (n/2), to check whether it is greater than n/2 or not. If this
number of transitions is greater than n/2 then the data rotated right by one bit is inverted. The
number of transitions between the data rotated right by one bit and inverted and the data on the
bus is calculated. The number of transitions between the data rotated left by one bit and the data
on the bus is computed. This number of transitions is compared with half the bus width (n/2), to
check whether it is greater than n/2 or not. If this number of transitions is greater than n/2 then the
data rotated left by one bit is inverted. The number of transitions between the data rotated left by
one bit and inverted and the data on the bus is calculated. Since the numbers of transitions are
conditionally computed for any given case, we have three numbers of transitions to be compared.
These three numbers of transitions are compared and the least number of transitions is found out.
The encoding method corresponding to this least number of transitions is used to encode the data
and it is sent over the bus.
At the receiving end, the receiver must be notified as to which method has been used to encode
the data being sent over the bus. Since there are six different types of data, a minimum of three
extra bits are required to indicate to the receiver which of them is being sent.
The binary codes used to identify the type of encoding selected in this technique are given in
table-1.
Table 1. Control bit representation for proposed technique
Bit representation Method
000 Unmodified data
001 Invert / Bit complement
010 Rotate left by one bit
011 Rotate right by one bit
100 Rotate left by one bit and invert
101 Rotate right by one bit and invert
3.1 Algorithm
The algorithm for the proposed method is as follows:
7. International Journal of VLSI design & Communication Systems (VLSICS) Vol.3, No.4, August 2012
103
Procedure rotate_inv()
{
Input: n_d, d_b, w
Output: r_i_d
N= no. of transitions (n_d, d_b)
If (N > w/2)
{
N_I= no. of transitions (n_d(invert), d_b)
}
N_R= no. of transitions (n_d(rotate right), d_b)
If (N_R > w/2)
{
N_R_I= no. of transitions (n_d(rotate right & invert), d_b)
}
N_L= no. of transitions (n_d(rotate left), d_b)
If (N_L > w/2)
{
N_L_I= no. of transitions (n_d(rotate left & invert), d_b)
}
r_i_d= one of (n_d, n_d(i), n_d(rl), n_d(rr),
n_d(rli), n_d(rri)) depending on minimum(N, N_I, N_L, N_R, N_L_I, N_R_I)
}
In the given algorithm,
‘n_d’ is the new input data
‘d_b’ is the data on the bus
‘w’ is the width of the bus
‘r_i_d’ is the encoded data which will be sent on the bus
‘N’ is the number of transitions between the new input data and the data on the bus
‘N_I’ is the number of transitions between the inverted data and the data on the bus
‘N_L’ is the number of transitions between the data rotated left by one bit and the data on the bus
‘N_R’ is the number of transitions between the data rotated right by one bit and data on the bus
‘N_L_I’ is the number of transitions between the data rotated left by one bit and inverted and the
data on the bus
‘N_R_I’ is the number of transitions between the data rotated right by one bit and inverted and
the data on the bus
8. International Journal of VLSI design & Communication Systems (VLSICS) Vol.3, No.4, August 2012
104
The algorithm computes the number of transitions between the data on the bus and the six
different types of data conditionally. The type of data which gives the least number of transitions
is sent on the bus.
3.2 Flow chart
The flow chart given below shows step by step working of the method.
Figure 1. Flow chart describing the proposed technique
• The inputs to the flow chart are the new data (unmodified data) and the data on the bus.
• This unmodified data is rotated right by one bit and rotated left by one. The respective
numbers of transitions are calculated by comparing these three types of data with the
data on the bus.
• Then we decide whether the number of transitions of the unmodified data is greater than
half the width of the bus or not.
• If YES, we invert or bit complement the unmodified data and compute the number of
transitions between the inverted data and the data on the bus.
9. International Journal of VLSI design & Communication Systems (VLSICS) Vol.3, No.4, August 2012
105
• If NO, then we move on to the next decision block. The output of the above mentioned
block is also connected to this decision block.
• In this decision block we decide whether the number of transitions of the data rotated
right by one bit is greater than half the width of the bus or not.
• If YES, we invert the data rotated right by one bit and calculate the number of transitions
between the data rotated right by one bit and inverted and the data on the bus.
• If NO, then we move on to the next decision block. The output of the above mentioned
block is also connected to this decision block.
• In this decision block we decide whether the number of transitions of the data rotated left
by one bit is greater than half the width of the bus or not.
• If YES, we invert the data rotated left by one bit and calculate the number of transitions
between the data rotated left by one bit and inverted and the data on the bus.
• If NO, then we move on to the next block. The output of the above mentioned block is
also connected to this block.
• For any given case we need to compare only three numbers of transitions because they
are computed conditionally.
3.3 Basic hardware model
Figure 2. shows the basic hardware model for the proposed method.
The first set of blocks in the above diagram indicates the six methods involved in the technique.
The common input to these blocks is the n-bit, un-encoded new input data. The output of these
blocks is the respective encoded n-bit data.
The blocks invert, rotate right and invert and rotate left and invert have an extra input which is the
number of transitions of unmodified data, data rotate right and data rotated left respectively. In
these blocks the given number of transitions is compared to half the bus width. If it is greater than
half the bus width then the data is inverted. Otherwise it is not inverted.
The XOR-ADD blocks compute the number of transitions between the encoded data and the data
on the bus. The inputs to theses blocks are the n-bit data on the bus, the 3-bit representation of the
different methods and the encoded data. The data on the bus and the encoded data are XORed.
The result of this XOR operation will also be an n-bit data. The numbers of ones (high) in the
output of the XOR operation gives the number of transitions. Hence an adder counts the number
of ones in the output of the XOR operation. The outputs of these blocks are the encoded data, its
three bit representation and its number of transitions.
The comparator compares the number of transitions of the different methods and finds out the
least among them. Since we are conditionally computing the number of transitions, for any case
the comparator has to compare only three values. The inputs to this block are the encoded data
along with its bit representation and its corresponding number of transitions. The output of this
block is the encoded data with the least number of transitions and its 3-bit representation. This
encoded data is sent over the bus along with its 3-bit representation.
At the receiver, the 3-bit representation identifies the method used to encode the data and the data
is decoded accordingly.
10. International Journal of VLSI design & Communication Systems (VLSICS) Vol.3, No.4, August 2012
106
Figure 2. Basic hardware model for the proposed technique
We have coded the hardware using VHDL and a simulated using Modelsim for functionality
verification. The number of transitions are counted and compared to select the coding that gives
minimum number of switching. According to the type of encoding method that is selected an
unique three bit identifier is generated.
4. RESULT ANALYSIS
The proposed algorithm has been implemented using C++ and numbers of transitions were
verified. It is found that they are reduced considerably.
Assuming an 8-bit data 01010011 on the bus, Table 2. illustrates how the proposed technique
reduces the number of transitions compared to the existing techniques.
Table 2. Illustration of the working principle of the proposed technique
Operation Modified Data No. of transitions
New Data on the bus 01011100 4
Data Inverted 10100011 4
Data Rotated right 00101110 6
Data Rotated left 10111000 6
Data Rotated right and inverted 11010001 2
Data Rotated left and inverted 01000111 2
In this case data encoded using any one of the last two methods is sent on the bus since the
number of transitions is two which is the least.
11. International Journal of VLSI design & Communication Systems (VLSICS) Vol.3, No.4, August 2012
107
Using C++ the complete binary sequence for 4-bit, 6-bit, 7-bit and 8-bit has been generated.
Exhaustive checking has been done, that is, every possible combination of two numbers taken
from the respective sequences has been checked.
Bus-invert[1] and Shift-Inv[9] are the existing methods which are used on random data. The
algorithms of these existing methods have also been implemented in C++. The proposed method
has been compared with these existing methods.
To compare the methods we have calculated the percentage of reduced switching activity based
on the ratio of number of switching after encoding to the number of switching in the unmodified
data.
Table 3. shows the percentage of reduced switching activity of the two methods for data of
varying bus widths.
Table 3. Percentage reduction in transitions for various bus widths in different bus encoding
styles.
Bus width Bus-Invert
method
Shift-Inv
method
Proposed
method
4-bit 37.5% 46.9% 69%
6-bit 31.25% 40.6% 57%
7-bit 31.25% 41.02% 52.13%
8-bit 27.34% 36.11% 48.89%
Figure 3. Number of bit transitions for various bus widths different bus encoding styles.
As we can see the percentage of reduced switching activity of the proposed method is much
higher than the existing methods. Hence the proposed method is a lot more power efficient than
the existing methods.
NumberofBittransitions
12. International Journal of VLSI design & Communication Systems (VLSICS) Vol.3, No.4, August 2012
108
Figure 4. Percentage reduction in transitions for various bus widths in different bus encoding
styles.
5. CONCLUSION
The proposed technique demonstrates significant reduction in switching activity irrespective of
the bus width, and is therefore more power efficient compared to the similar existing schemes
such as Bus-Invert and Shift-Invert techniques. The technique can be used for buses of any width
and it requires only three extra bits irrespective of the width of the bus. The proposed method
does not require extra computation and hardware overheads when compared to the existing
methods. As shown in the flow chart, the technique conditionally encodes the data and hence its
usage of the hardware is optimized. The reduction in the number of transitions and hence the
reduction in dynamic power by this method is very significant.
While retaining the merit of the proposed method – reduction in switching activity – we need to
explore the possibility for reduction of hardware overhead. We have plans to implement area and
power efficient circuit for the encoder and decoder.
The technique proposed consists of six options for reducing the number of transitions on the bus.
We can also add T0 coding to make it truly universal. It can be done without adding extra bit for
identification although requires some extra hardware.
REFERENCES
[1] M. R. Stan and W. P. Burleson, “Bus-Invert coding for low-power I/O”, IEEE Trans. on VLSI, vol. 3,
pp. 49-58, March 1995.
[2] Youngsoo Shin, Soo-Ik Chae, and Kiyoung Choi, “Partial Bus-Invert Coding for Power optimization
of Application-Specific Systems”, IEEE Trans. on VLSI, vol. 9, pp. 377-383, April 2001.
[3] Jun Yang, Rajiv Gupta, Chuanjun Zhang, “Frequent Value Encoding for Low Power Data Buses”,
ACM Transactions on Design Automation of Electronic Systems, Vol. 9, No. 3, July 2004, Pages
354–384.
[4] C. L. Su, C. Y. Tsui, and A. M. Despain, “Saving power in the control path of embedded processors”,
IEEE Design and Test of Computers, vol.. 11, no. 4, pp. 24-30, 1994.
[5] L. Benini, G. De Micheli, E. Macii, D. Sciuto, and C. Silvano, “Asymptotic zero-transition activity
encoding for address buses in low-power microprocessor-based systems”, Great Lakes VLSI
Symposium, pp. 77-82, Urbana IL, March 1997.
[6] Y. Aghaghiri, F. Fallah, M. Pedram, “Irredundant Address Bus Encoding for Low Power,”
International Symposium on Low Power Electronics and Design ’01, pp. 182–187, 2001.
Percentagereductionintransitions
13. International Journal of VLSI design & Communication Systems (VLSICS) Vol.3, No.4, August 2012
109
[7] Tsung-Hsi Weng, Wei-Hao Chiao, Jean Jyh-Jiun Shann, Chung-Ping Chung, Jimmy Lu, “Low-Power
Data Address Bus Encoding Method”.
[8] W. Fornaciari, M. Polentarutti, D.Sciuto, and C. Silvano, “Power Optimization of System-Level
Address Buses Based on Software Profiling,” CODES, pp. 29-33, 2000.
[9] Jayapreetha Natesan and Damu Radhakrishnan, “A Novel Bus Encoding Technique for Low Power
VLSI”.
[10] “Limited-weight codes for low-power I/O,” in Proc. Int.Workshop Low-Power Design, Napa, CA,
Apr. 1994, pp. 209–214.
[11] Youngsoo Shin, Kiyoung Choi, and Young-Hoon Chang, “Narrow Bus Encoding for Low-Power
DSP Systems”, IEEE Trans. on VLSI, vol. 9,no.5, pp. 656-660, October 2001.
[12] Ahmed Elkammar, Srinivasa Vemuru, Norman Scheinberg, “A Bus Encoding Scheme to Reduce
Power Consuming Signal Transitions”.
[13] S. Komatsu, M. Ikeda, K. Asada, ”Bus Data Encoding with Couplingdriven Adaptive Code-book
Method for Low Power Data Transmission,” 27th European Solid-State Circuits Conference, pp. 312-
315, Sep. 2001.
[14] Satoshi Komatsu Masahiro Fujita, “Irredundant Address Bus Encoding Techniques based on Adaptive
Codebooks for Low Power”.
[15] L. Benini, G. De Micheli, E. Macii, M. Poncino, and S. Quer, “System-level power optimization of
special purpose applications: The beach solution”, Proc. Int. Symp. Low Power Electronics Design,
pp. 24-29, August 1997.
Authors
Shnakaranarayana Bhat M obtained his M.Tech from IISc, Bangalore and is
currently working as Associate professor in the department of Electronics and
communication Engineering, M.I.T Manipal. In addition to contributing as
resource person for technical workshops and conferences, he is also a recognised
Faculty trainer and successfully conducted faculty training in various Engineering
colleges in India. He has chaired many national and International conferences and
his interests include Low Power VLSI Design and Processor architecture in
addition to Engineering Education and Soft skills.
D. Yogitha Jahnavi has completed her Bachelor of Engineering (Electronics and
communications) degree from Manipal Institute of Technology whichis a
constituent institute of Manipal University, in May 2012. She is currently working
in Cybage Software Pvt. Ltd.