Implementation Of Radix-10 Matrix Code Using High Speed Adder For Error Correction
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2016, Vol 5, Issue 5
Abstract
Memories are most widely used component in electronic systems. As CMOS technology scales down, multiple cell upsets (MCUs) are causing series issues in memory reliability. In order to protect data in memory, error detection and correction codes are used. The problem with existing error correction codes is that they are either single or double error correction codes. To overcome this issue, a radix-10 based matrix code can be used for multiple error detection to protect memory. This system uses an encoder and decoder section. In this paper, this approach further optimizes the delay with the use of fast adders like parallel prefix carry look ahead adder. A Comparison of radix-10 matrix code using different types of adders was made in order to reduce the delay. The design was modeled using verilog, simulated and synthesized using Xilinx ISE 14.7 and Cadence.
Authors and Affiliations
Grace Abraham, Nimmy M Philip, Deepa N R
A COMPARATIVE SIMULATION PLATFORM FOR IEEE 802.11 AND IEEE 802.15 STANDARDS IN TREE TOPOLOGY
Wireless Personal Area Networks (WPANs) are an emerging technology for future short range indoor and outdoor multimedia and data centric applications. In this paper our work in modeling and performance assessment of...
Emotion Recognition from Human Eye Expression
Facial expressions play an essential role in communications in social interactions with other human beings which deliver rich information about their emotions. The most crucial feature of human interaction that gran...
Effective Load Balancing Technique In Pcloud
In present days cloud computing is one of the greatest platform which provides storage of data in very lower cost and available for all time over the internet. But it has more critical issue like security, load manage...
Defence Consideration of Strategy Classifiers under Assault
Pattern arrangement of action structures are for the most part used as a piece of hostile applications, as biometric affirmation, framework intrusion area, and spam isolating, in which data can be purposely controlle...
Data Protection and Malicious Insiders Detection in Cloud
Cloud computing presents a huge data services to the user in an easy and comfortable way over the existing network. The main feature of the cloud service is that the data shared by the users are processed remotely wit...