Effective Estimation of Peak-Power for a Testable Digital Circuit
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 7
Abstract
Peak power corresponds to the highest value of instantaneous power measured during testing. The peak power generally determines the thermal and electrical limits of the circuit and the system packaging requirements. High peak power in only one clock cycle can be an issue if it results in a significant ground bounce or an IR-drop phenomenon that causes a memory element to lose its state and the test procedure to unnecessarily fail. Tools for evaluating the worst-case peak-power consumption of sequential circuits are strongly required by designers of low-power circuits. Previously proposed methods search for the initial state and the couple of vectors with maximum consumption, without exploiting the information on the reachable state set during the power estimation process. This paper shows that this can lead to significant underestimation of the maximum power consumption, and proposes an algorithm for overcoming this drawback.
Authors and Affiliations
M. Radha Ran , G. Rajesh Kumar , A. Karna Rao
Topology ascendancy in mobile ad hoc networks with accommodating connections
Supportive communication has conventional tremendous attention for wireless networks. Most existing works on supportive infrastructure are focused on link-level corporeal layer issues. Consequently, the impacts of suppor...
Link Aggregation Strategies
High Data volume data transfer face problems of low speeds for large file/video transfers over the network, especially in digital/HD video editing, where popular applications require high speed video streaming. It is o...
STUDY OF NONLINEAR POLEMETRIC MIXTURE BY S.R. METHOD
Lquid crystals are states of condensed matter whose symmetries lie between crystals and isotropic liquids Thermotropic liquid crystalline phases are exhibited by a large number of organic compounds shows molecu...
Cryptography Using Quantum Key Distribution in Wireless Networks
Despite years of intensive research, the main deterrents of widely deploying secure communication between wireless nodes remains the cumbersome key setup process. In this paper, we address this problem and we introd...
TPA BASED CLOUD STORAGE SECURITY TECHNIQUES
Cloud Computing is the new trend to reduce the investment in business to satisfy the client needs using internet. The various cloud services provides infrastructure, software and platform. In cloud computing, data...