Enhanced 2n PRL Code for Efficient Test Data Compression
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2015, Vol 3, Issue 5
Abstract
Test data compression is needed to minimize the chip area used for storing the test data. The time taken for decompressing the test data is of major concern in the recent past. In this paper, 2 n -pattern run length coding for test data compression is addressed. The 2n -PRL compression method iteratively encodes 2|n| runs of compatible or inversely compatible patterns either inside a single segment or across multiple segments in to a codeword. It is used to save the memory requirement in automated test equipment (ATE) and test application time (TAT). Also, an enhancement to this 2 n -PRL is proposed and discussed. Theoretical calculation shows that the proposed method further reduces the code word length and hence increases the compression ratio.
Authors and Affiliations
E. Jebamalar Leavline, K. Thaneesh Kumar, C. Vimal Raj
A Novel Solution to the Synchronization Problem of CAN
One of the main problems in synchronous digital system design is synchronization of different clocks in the system. Obviously, this problem is always present in CAN bus related equipment. The problem is more acute in CAN...
AI and Cloud Computing for Enhanced Virtualization and Containerization
This research paper aims at analysing the application of artificial intelligence and deep learning techniques in the cloud computing paradigm especially in virtualization and containerization. Since cloud computing has b...
By Using ETABS Planning, Designing and Analysis of a Commercial Building Consisting of Flat Slabs Considering Earthquake Induced Forces
Structures consisting of Flat slabs posses’ great advantage over conventional structures with usual slab beam design. Because of the freedom to design space, shorter construction time, architectural functional as well as...
Context-Driven Multigranularity Blockchain: A Comprehensive Framework for Secure Data Management
Effective access control and revocation mechanisms are paramount in the ever-evolving landscape of information security. Traditional models often fall short in addressing the complexities of modern systems, necessitating...
Lossless Speech Compression Techniques: A Literature Review
Nowadays, computer technology mostly focusing on storage space and speed. With the rapid growing of important data and increased numbers of applications, devising new approach for efficient compression and encryption met...