A New Methodology for Error Detection and Correction to Realize Fault Tolerant Memory
Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 2
Abstract
Scaling of CMOS technology to nanoscale increases soft error rate in memory cells. Both single bit upset and Multiple Cell Upsets (MCUs) causes reliability issues in memory applications. Hence to provide fault-tolerant memory cells, Error Correction Codes (ECCs) are used. But these codes require more area, power and higher delay overhead. Thus Matrix Codes (MCs) based on Hamming codes and parity codes are used for detection and correction of multiple errors with less decoding delay. The use of matrix codes is capable of correcting only two errors. Hence to maximize the capability of error detection and correction, Decimal Matrix Code (DMC) based on decimal algorithm is used. This algorithm utilizes decimal integer addition and decimal integer subtraction to detect and correct errors. DMC uses encoder reuse technique for fault tolerant memory protection. The use of this algorithm enables more errors to be detected and corrected by the utilization of large number of redundant bits. Thus the framework can be modified so as to reduce the number of redundant bits by means of using parity matrix codes in which a 32 bit data is divided into 2bits of 16 blocks. Coding can be done by means of VHDL language and ModelSim can be used for simulation.
Allocation of Resources for Users by Using Fairness and Stability in Network
This paper studies about network resource allocation between users that manage multiple connections possibly through different routes where each connection is subject to congestion control I formulate a user –centric Net...
Comparison of PNG & JPEG Format for LSB Steganography
"with increasing number of inventions and innovations in technology which have become an integral part for humans thus, the urge for same amount in field of security and privacy is felt. The techniques likes cryptography...
Secure Detection and Prevention Scheme for Jamming Attack in MANET
Abstract— In MANET, secure routing is the major issue and it is difficult to identify malicious hosts as the topology of the network dynamically changes. In this paper we proposed the security scheme against jamming atta...
A Survey on Implementation of Random Number Generator in FPGA
"A pseudo random number generator (PRNG), also known as a deterministic random bit generator(DRBG), is an algorithm for generating a sequence of random numbers. This paper presents an implementation of pseudo random num...
Business Rule Inclusion and Legacy Modernization through Binary Instrumentation
Business rule is essential for decision making, events, and process activities. It is used to capture knowledge and develop business systems’ requirements. Frequent changing scenarios in different aspects of business, de...