Redundancy Efficient Crosstalk Avoidance Scheme in VLSI Circuits
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2013, Vol 3, Issue 4
Abstract
In deep sub micrometer design interconnect delay has become a major factor. Crosstalk is highly evident in deep sub micrometer design. Crosstalk depends on different data patterns that are transmitted on the bus. For the avoidance of crosstalk many schemes have been proposed which boost the bus speed or reduce energy consumption. High proportion of the proposed schemes are non linear in nature and are impractical. A crosstalk avoidance code which can be implemented practically is dealt with which is based on the representation of numbers in Fibonacci numeral system. An improved version of this scheme is later presented where data is represented in Fibonacci numeral system only if forbidden patterns are present in the data.
Authors and Affiliations
Dr. K . PADMAPRIYA , D. GOPINADH
Asymptotic Security Key Generation and Distribution Algorithm
Service-oriented Architectures (SOA) facilitate the dynamic and seamless integration of services offered by different service providers which in addition can be located in different trust domains. Especially for bu...
IRIS AUTHENTICATION USING PSO
The paper proposes a wavelet probabilistic neural network (WPNN) for iris biometric classifier. The WPNN combines wavelet neural network and probabilistic neural network for a new classifier model which will be...
A Simulation And Analysis Of Secured S-DSR Protocol In Mobile Ad Hoc Networks
AMANET is as pecial kind of wireless network, which can be treated as a collection of mobile nodes co-existing with each other without the need of any fixed infrastructure. Because of the limited physical security,...
Packet Mark Methodology for Reduce the Congestion in the Network by using the Code Field in the TCP/IP header
Congestion is one of the major problems of a communication network in routing. The function of a routing is to guide packets through the communication network to their correct destinations. Every router receives the pack...
A Survey On Report Based Secure Payment Scheme For Multihop Wireless Networks
Multihop wireless networks (MWNs) composed of two end nodes is carried out through a number of intermediate nodes whose function is to relay information from one point to another, without using any kind of fixed wired in...