Rxc Based Parity Sharing For Error Correction
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 10
Abstract
Single error correction (SEC) code are used to detect and correct single bit errors by using hamming code method.SEC code requires more parity check bits. Product code can be detect and correct the single bit error. Product has the memory overhead problem. In parity sharing reduces the memory overhead and memory access complexity. Parity sharing reduces the parity check bits.Error correction codes are commonly used to protect memories from soft errors, which change the logical value of memory cells without damaging the circuit. Error Correction Codes (ECC) are commonly used to protect memories and registers in electronic circuits. When ECCs are used, it is of interest that in addition to correcting a given number of errors, the code can also detect errors exceeding that number. Error correcting codes led to the Hamming Codes, perfect 1-error correcting codes, and the extended Hamming Codes, 1-error correcting and 2-error detecting codes. The proposed system design using HDL the simulated using model sim and sythesis using xilinx synthesis technology.This approach reduces the memory overhead at the expense of a more complex access procedure. In this letter, an alternative scheme based on the use of parity sharing is proposed and evaluated. The results show that the new approach reduces significantly the memory overhead and is also capable of correcting single bit errors.
Authors and Affiliations
Appari Charishma, CH Rajasekhar, J Ganga Ramesh
Network Ids Approach To Counter Zombie Explorative Attacks Using Network Intrusion Detection And Countermeasures Election (NICE)
Attackers can look at vulnerabilities of a cloud system and compromise virtual machines to organize additional large-scale Distributed Denialof-Service (DDoS). DDoS attacks generally occupy early stage actions such as...
A Formal Study of Cryptanalysis on Ciphers
Cryptanalysis is co-study of cryptography. A cipher is said to be successful cipher if it design resists all cipher attacks. Cryptanalyis are two-fold. One way is a benign activity where cryptanalysis is performed to...
Double Compression Of JPEG Image Using DWT Over RDWT
Reconstruction of the history of an image is a difficult process with visual document analysis. Suppose, if an image undergo double compression, then the compressed image is not the exact bit stream generated by the...
A Novel Virtual Grounding Based Read-Error Reduction Technique in SRAM
In this paper we are going to modify the Schmitt Trigger based SRAM for the purpose of more reduced power & area than the existing type of designs as well as the new design which is combined of virtual grounding with...
Design of Built-in Self-Repair Strategy with Selectable Redundancy for Embedded SRAM
The main strategy of this project is to design a fault diagnoses system for detection and repair of any permanent failures or faults in the embedded read only memories. Built-In Self-Repair (BISR) with redundancy is...