High Performance of Fault Detection And Correction Technique Using Difference Set Codes For Memory Applications
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 5
Abstract
The advanced combination technologies made it possible for accessing any device so fast that within a portion of seconds the job can be performed. Now days fast memories exists everywhere during accessing if any error happens that has to be detected and corrected within a portion of microseconds that is made potential with help high performance error correcting codes (ECCs) such as LDPC and Turbo Codes.The Majority Logic Decoder (MLD) itself used to detect failures, thus area become minimal and keeps the extra power consumption low. The proposed paper deals with coding and decoding of difference set cyclic codes using majority logic decoding mechanisms. The original control logic is developed for decoding so that error correction can be possible within 3 cycles if the transmitted code vector is error free. The performance result shows that fast error correction prototype is potential with lower area and low power.
Authors and Affiliations
porkodi m, Gopalakrishnan. R
A Novel Secure On-Demand Routing Protocol for MANET using RSA Triple Key Technique
MANET (Mobile and Ad hoc Networks) are networks in which nodes are mobile and link connectivity might change all the time. In this kind of networks routing, security and key management are the important and complex p...
Jamming Detection and Mitigation in Wireless Broadcast Networks
Wireless communication systems are often susceptible to the jamming attack where adversaries attempt to overpower transmitted signals by injecting a high level of noise. Jamming is difficult to mitigate in broadcast...
Image Depth Approximation using Bezier-Bernstein polynomial for 3D cameras
passive depth estimation techniques with improved precision can replace active methods in 3D cameras. In this paper, we introduce accurate depth estimation from image focus using cubic degree Bezier-Bernstein polynomi...
The Feasibility of Content Sharing With (Dtn) On Commercial Smart Phones
The increase in the number of smart phone users has lead to the increase in the peer-topeer adhoc content sharing. Traditional data delivery schemes are not suitable for such networks due to intermittent connectivity...
An Approach for Providing Privacy of Microdata Publishing
In recent years, the wide accessibility of personal data has made the problem of privacy preserving data mining an important one. A number of methods have recently been proposed for privacy preserving data mining of...