A Low Power Asynchronous FPGA with Autonomous Fine Grain Power Gating and LEDR Encoding
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 4
Abstract
Field Programmable Gate Arrays (FPGAs) are widely used to implement special purpose processors. FPGAs are economically cheaper for low quantity production because its function can be directly reprogrammed by end users. In this project designing a reconfigurable low power Asynchronous FPGA cells are done. FPGAs consume high dynamic and standby power. In order to reduce the standby power the autonomous fine grain power gating method is used. The autonomous fine grain power gating method has lookup table which is controlled by sleep controller and sleep transistor. In the successive logic block if the data arrives to the first logic block, the next logic block goes to active state. Suppose if the data not arrives to the first logic block than the next logic block goes to standby state and remain in this state until it reaches threshold time. After reaching threshold time the logic block goes to sleep state from standby state. In this sleep state the logic block power goes OFF. Hence the power consumption of the FPGA becomes reduced. The proposed architecture used in both fine grain as well as coarse grain structure. The circuit is simulated using Xilinx tool. Power reduction is achieved by selectively setting the functional units into a low leakage mode when they are inactive.
Authors and Affiliations
Mr N. Rajagoplakrishnan , Mr k. Sivasuparamanyan , Mr G. Ramadoess
Performance Evaluation of AODV under Blackhole attack in MANET using NS2 simulator
A wireless ad-hoc network is a temporary network set up by wireless mobile nodes moving arbitrary in the place that have no network infrastructure. Basically Wireless or mobile networks are evolved to replace the w...
Review of authentication and digital signature methods in Mobile ad hoc network
Mobile ad-hoc network is wireless network composed of different nodes communicate with each other without having to establish infrastructure. In this paper technique proposed here to provide the data security of su...
Data mining with Improved and efficient mechanism to detect the Vulnerabilities using intrusion detection system
Intrusion detection system must be capable of known and unknown vulnerabilities. We already studied the previous problems which includes detection of known vulnerabilities and unknown vulnerabilities. In order to obtai...
IP Spoofing Attack Detection using Route Based Information
IP spoofing is almost always used in one of the most difficult attack to defend against – Denial of Service (DoS) attack. DOS attack is evolving due to proliferation of diverse network application. Researchers have...
Enhancing the Slew rate and Gain Bandwidth of Single ended CMOS Operational Transconductance Amplifier using LCMFB Technique
Industry is continuously researching techniques to reduce power requirements, while increasing speed, to meet the demands of today’s low (battery) powered wireless systems. The operational transconductance amplifier (OTA...