Redundancy Efficient Crosstalk Avoidance Scheme in VLSI Circuits
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2013, Vol 3, Issue 4
Abstract
In deep sub micrometer design interconnect delay has become a major factor. Crosstalk is highly evident in deep sub micrometer design. Crosstalk depends on different data patterns that are transmitted on the bus. For the avoidance of crosstalk many schemes have been proposed which boost the bus speed or reduce energy consumption. High proportion of the proposed schemes are non linear in nature and are impractical. A crosstalk avoidance code which can be implemented practically is dealt with which is based on the representation of numbers in Fibonacci numeral system. An improved version of this scheme is later presented where data is represented in Fibonacci numeral system only if forbidden patterns are present in the data.
Authors and Affiliations
Dr. K . PADMAPRIYA , D. GOPINADH
An Efficient Restricting of bad Users among Unidentified Users in a Network
In this paper, we develop a new system to enable service providers, such as website operators, on the Internet to restrict past abusive users of anonymizing networks (for example, Tor) from further causing trouble behavi...
A Simulation And Analysis Of Secured S-DSR Protocol In Mobile Ad Hoc Networks
AMANET is as pecial kind of wireless network, which can be treated as a collection of mobile nodes co-existing with each other without the need of any fixed infrastructure. Because of the limited physical security,...
Analysis of Popular Steaming Algorithms Supporting Information Retrieval System
Information retrieval is the activity of gaining information resources significant to an information need from a collection of information resources. Searches can be based on metadata a . Computerized information retriev...
A Brief Survey on Encryption Schemes in Cloud Environments
For the last two years cloud computing is a important in the IT industry. In cloud computing data owners and service providers are not in the same trusted domain so the Service providers should not be a trusted one and t...
A Survey On Report Based Secure Payment Scheme For Multihop Wireless Networks
Multihop wireless networks (MWNs) composed of two end nodes is carried out through a number of intermediate nodes whose function is to relay information from one point to another, without using any kind of fixed wired in...