Design & Implementation of High Speed Data Transmission
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 6
Abstract
In this paper, we present a set of data encoding schemes aimed at reducing the power dissipated by the links of an NoC. The proposed schemes are general and transparent with respect to the underlying NoC fabric (i.e., their application does not require any modification of the routers and link architecture). Experiments carried out on both synthetic and real traffic scenarios show the effectiveness of the proposed schemes, which allow to save upto 51% of power dissipation and 14% of energy consumption without any significant performance degradation and with less than 15% area overhead in the NI.
Authors and Affiliations
Umme Habeeba, S. Rekha, Dr. A. M Bhavikatti , Vivekanand M Bonal
Robust, Noise Immune Hidden Atrial Electrical Activity Signal Detection
Cardiac arrhythmia diagnosis can be determined by using ECG analysis method. In determining the diseases of heart Features like the regularity and atrial activity must be considered. Heart function determining AEA-waves...
Scheduler for Minimum Energy Consumption and Better Job Management in Data Center
In reality, basically Service providers makes a high quality use of IaaS and PaaS to developing their services without consideration of physical components, while users also can access on-demand and pay-peruse services...
Study on Proppant Selection for Hydraulic Fracturing Design in Lower Oligocene Reservoir
In the past decades, a large amount of oil production in the Cuu Long Basin was mainly exploited from the basement reservoir, oil production from the Miocene sandstone reservoir and a small amount oil production of the...
Adaptive Simplified Successive Cancellation for Polar Codes Based on Frozen Bits
Polar codes have been recently proposed as the first low complexity of error correcting codes for wireless channels that can provably achieve the capacity of symmetric binary-input memory less channels. Here, the bit er...
Performance Comparison of Cryptanalysis Techniques over DES
The primary requirement of a good encryption technique is that it is either impossible or difficult to deduce the plaintext out of a ciphertext without the knowledge of key. Cryptanalysis is the technique that violates...