Improving Memory Access time by Building an AMBA AHB compliant Memory Controller
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 7
Abstract
Memory access time has been a bottleneck in many microprocessor applications which limits the system performance. Memory controller (MC) is designed and built to attacking this problem. The memory controller is the part of the system that, well, controls the memory. The memory controller is normally integrated into the system chipset. This paper shows how to build an Advanced Microcontroller Bus Architecture (AMBA) compliant MC as an Advanced High-performance Bus (AHB) slave. The MC is designed for system memory control with the main memory consisting of SRAM and ROM. Additionally, the problems met in the design process are discussed and the solutions are given in the paper.
Authors and Affiliations
Arun G , Vijaykumar T
Optimal Design RRC Pulse Shape Polyphase FIR Decimation Filter for Multi-Standard Wireless Transceivers
Pulse Shaping Filters or Root Raised Cosine (RRC) low pass filters emerges as one of the hottest topic in field of Wireless Communication technology. Low pass filters are used for decimation and for interpolation. When...
Additional Band width Design with Adaptive Orthogonal Frequency Division multiplexing
With the advent of new high data rate wireless applications, as well as growth of existing wireless services, demand for additional band width is rapidly increasing. A cognitive radio (CR) node is a radio device...
Data Mining: Estimation of Missing Values Using Lagrange Interpolation Technique
In the real world Most of the datasets have missing data. The presence of missing values in a dataset can affect the performance of Mining Algorithms. In this paper we are using Lagrange interpolation method for predicti...
Study and Development of Iris Segmentation and Normalisation Techniques
There have been several implementations of security systems using biometric, especially for identification and verification cases. The term "biometrics" is derived from the Greek words bio (life) and metric (to m...
Percentage Based Trust Model with Bandwidth Reservation Technique for Privacy Preserving Routing in MANETs
Routing in Mobile Ad-Hoc Networks are vulnerable to malicious traffic analysis, harmful attackers can mitigate paths and malicious intermediate nodes breaks security, ineffective reserve of available resources ( u...