HDL Design for Exa Hertz Clock based 2e23-1 Exa Bits Per Second (Ebps) PRBS Design for Ultra High Speed Applications/Products
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5
Abstract
Abstract: The Design is mainly Intended for HDL Design for Exa Hertz Clock based 2e23 -1 Exa Bits Per Second (Ebps) PRBS Design for Ultra High Speed Applications/Products the estimation of HIGH Speed in terms of Ebps(Exa Bits Per Second) Data Rate for 2e23-1 Tapped PRBS Design Pattern Sequence. The Exa Bits PerSecond Data Baud rate Speed estimated by Synchronization with Exa Hertz Clock (250 Clock Cycle Periodic time for 1 Exa Hertz Clock frequency ) The Exa Hertz E.B.P.S 2e23 -1PRBS is Designed by using LFSR Linear Feed Back Shift Register & XOR Gate with Specific Tapping Points(18 and 23) as per CCITT ITU Standards and this design block Purely Synchronized with Exa Hertz Clock. RTL Design Architecture Implemented by using VHDL &/ Verilog HDL, Programming & Debugging Done by using Spartan III FPGA Kit. Transmission done through this carrier frequency. Propagation Carrier Done either Serially / Parallel linesI/O in FPGA.
Authors and Affiliations
P. N. V. M Sastry , Dr. D. N. Rao , Dr. S. Vathsal
Spam Detection using Natural Language Processing
Abstract: Spam mails can be referred as unsolicited bulk email. These messages are used to advertise products and services for phishing purposes or to lead recipients to malicious sites with unethical intentions. A...
Unified V- Model Approach of Re-Engineering to reinforce Web Application Development
The diverse and dynamic nature of elements and techniques used to develop Web Application, due to the lack of testing technique and effective programming principles which are used for implementing basi...
Risk Factor for Periodontitis
Periodontal disease possesses a significant challenge to the patient and the oral health care professional equally .Risk factor that are associated with periodontal disease must be properly identified and examin...
Moving ATM Applications to Smartphones with a Secured PinEntryMethods
Abstract: A personal identification number (pin) is a widely used numeric password. The 4-digit pin numericpassword is being used as authentication in many important applications such as, an ATM. An ATM is a placew...
Computational Intelligence Methods for Clustering of SenseTagged Nepali Documents
Abstract: This paper presents a method using hybridization of self organizing map (SOM ), particle swarmoptimization(PSO) and k-means clustering algorithm for document clustering. Document representation is animpor...