J. Manikandan Research scholar, St. Peter s University, Chennai, Tamilnadu, India.

Size: px
Start display at page:

Download "J. Manikandan Research scholar, St. Peter s University, Chennai, Tamilnadu, India."

Transcription

1 Design of Single Correction-Double -Triple -Tetra (Sec-Daed-Taed- Tetra Aed) Codes J. Manikandan Research scholar, St. Peter s University, Chennai, Tamilnadu, India. Dr. M. Manikandan Associate Professor, Dept of Electronics, MIT Campus, Anna University, Chennai, Tamilnadu, India. Abstract correction codes are used in semiconductor memories to protect information against soft and hard errors. Soft error is a major concern for memory reliability especially for memories that are used in space applications. Hamming codes are attractive as they are simple to construct for any word length and encoding / decoding can be done with low latency. In this paper, the design of Single Correction-Double -Triple -Tetra (SEC-DAED-TAED-Tetra AED) codes through bit placement algorithm is presented with less number of parity bits. In conventional ( detection and Correction) EDC mechanism, Single Correction and Double (SEC-DAED) are done by using Hamming Code. In order to detect the Triple adjacent error in SEC-TAED, it is required to add one parity bit, which consumes more amount of computational time for detecting the triple adjacent error. In Tetra adjacent error in SEC-Tetra AED is also required to add one more parity bit for detecting the error. To overcome this problem, SEC-DAED-TAED- Tetra AED method is proposed in this paper. In proposed, Tetra does not require the parity bits to detect the errors. In conventional SEC-Tetra adjacent error detection, it is performed by bit placement algorithm in our proposed work which offers more efficiency. The combined structure of SEC-DAED-TAED-Tetra AED is used to transfer the information for performing the space communication. It is more efficient and high speed compared to conventional method. Keywords: Single Correction-Double -Triple -Tetra (SEC-DAED-TAED-TetraAED), and Correction (EDC), Single Correction- Triple ( SEC-TAED), Single Correction-Double (SEC-DAED). avoid this data corruption issue, one option is to use Correction Codes (ECCs) which are already used in memories for reliability purposes. Single-error-correction (SEC) codes are utilized when low delay is required. Single-error-correction Double-error- (SEC-DED) codes, with a distance of four, so they are preferred in memory applications. A SEC-DED code can be created by extending a Hamming code with a parity bit covering all bits. SEC and SEC-DED codes would not be able to detect the error and could even incorrect the word into a different valid one producing Silent Data Corruption (SDC) which can lead to an incorrect system behavior and further data corruption. Hamming code scheme is used to protected the external memory, due to the parity memory having 8 bits width, (40,32) a hamming code is used, it is on the base of (39, 32) Hsiao code, adding a parity bit to minimize the probability of 3 bits fault corrected in error. In this paper, specific matrices for single-error-correction double adjacent error detection (SEC-DAED) Hamming codes are presented. They will provide a code capable of correcting single errors and detecting double adjacent errors. Additionally, Single Correction-Double -Triple (SEC-DED-TAED) codes are generated from an extended Hamming code. In this paper, we proposed Single Correction-Double -Triple - Tetra (SEC-DAED-TAED-Tetra AED). To maximize the probability for correct a single error and detect the tetra adjacent error, Bit placement algorithm is used. For the conventional Triple codes are required one more parity bit than the Double. In this proposed work, Tetra is detected without need of one more parity bit. The combined structure of SEC-DAED-TAED-Tetra AED is used to transfer the information for performing the space communication. Introduction Hamming codes are introduced more than 60 years ago and they are still used in many applications. Hamming Codes are widely used to detect and correct an error during the data transmission. One application is the protection against soft errors produced by a radiation particle hitting SRAM memory cells or a register and changing the value stored in them. To Related Work Enhanced of Double and Triple s in Hamming Codes Through Selective Bit Placement has been explained in[6].in this paper, a technique to increase the probability of detecting double and triple adjacent errors when hamming codes are used. The enhanced detection is achieved by placing the bits of the word such that adjacent errors result 4440

2 in a syndrome does not match that of any single error. Low- Power Compact Composite Field AES S-Box/Inv S-Box design in 65nm CMOS using Novel XOR Gate has been described in [1]. This paper presents a full custom CMOS design of S-Box/Inv S-Box with low power GF (28) Galois Field Inversions based on polynomial basis, using composite field arithmetic. The S-Box/Inv S-Box utilizes a novel low power 2-input XOR gate with only six devices to achieve a compact module implemented in 65 nm IBM CMOS technology. This design indicates a power dissipation of only around 0.09µW using a 0.8V supply voltage. Research and Implementation of SEC-DED Hamming Code Algorithm has been briefly explained in [5]. In this paper, the Hamming Code scheme is used to protected the external memory, due to the parity memory having 8 bits width, a(40,32) hamming code is used, it is on the base of (39,32) Hsiao code, adding a parity bit to minimize the probability of 3 bits faults corrected in error. Hamming SEC-DAED and Extended Hamming SEC-DED-TAED Codes through Selective shortening and Bit Placement has been described in [7]. In this paper, specific matrices for single-error-correction double adjacent error detection (SEC-DAED) hamming codes are presented. They will provide a code capable of correcting single errors and detecting double adjacent errors. Additionally, Single--Correction Double-- Triple (SEC-DED-TAED) codes are generated from an extended hamming code. Efficient Implementation of Hamming SEC-TAED Code Algorithm for Data Communication has been explained in [4]. In this paper, the design of Single Correction-Triple (SEC-TAED) codes through Bit Placement algorithm is presented with less number of parity bits. In the proposed method, the detection efficiency is increased when compared to conventional SEC-TAED. Design of a High Speed and Area Efficient Optimized Mixcolumn for AES has been designed in [3].In this paper, a novel optimized Mix-Column is designed for AES decryption through VLSI design environment. The proposed Mix- Column is incorporated into AES Decryption for improving the performance in terms of VLSI concerns (area, delay and power). Modified Hamming Codes with Double Correction along with Enhanced has been explained in[2].in this paper, modified hamming codes to enhance adjacent error detection along with double adjacent error correction is presented. The modified hamming codes can correct single and double adjacent errors and can detect double errors and triple adjacent errors. On Forward Correction with Hamming Code for Multipath Communications have been explained in [8]. In this paper, the performance bound in the high error-rate networks and integrated multipath communication and Hamming code (11-7). Using the Markov model, the performance of Multipath Hamming Code based Forward Correction (MHC- FEC) is analyzed and compared with Multi-Path Power Control (MPC). Bit-Level Soft-Decision Decoding of Double and Triple-Parity Reed-Solomon Codes Through Binary Hamming Code Constraints has been described in [9].This paper discussed bit-level soft-decision decoding of double and triple-parity Reed-Solomon (RS) codes through binary Hamming Code constraints. Based on the binary image of RS code, they first present the new expressions of the associated parity-check equations. These expressions indicate that each parity-check equation of RS code with roots α i (0 < i < 3) over GF(2 q ) can be viewed as parity-check equations of a compound Hamming code over GF(2). Hamming Codes Hamming codes are a family of linear block error correcting codes that generalize the rate codes invented by Ritchard Hamming in 1950 [Alfonso sanchez,2013]. The following are two obvious properties of Hamming single error correcting codes. Property 1: The 2 m -1 column of the m by 2 m -1H matrix are exactly all the 2 m -1 binary non zero m-tuples. Property 2: For every pair of column positions, there is exactly one other column that is the sum of the given pair and thus is the only weight 3 code word that includes the given pair. Hamming codes are perfect codes, they can achieve highest possible rate for codes with their block length and minimum distance. In mathematically Hamming codes are characterized for m 3 by the following parameters, n = 2 m -1 (1) k = n-m (2) d min = 3 (3) Where n is the block size, k is the number of information bits, d min is the minimum distance of the code and m is the parity check bits. An algorithm to generate Hamming Codeword s from information bits are as follows a) Number of all position of bits starting from 1 to n, where n is the last position of the bit. b) All the positions are written in their binary form as 1,10,11,100,101,110 etc. c) All bit positions that are powers of two ( have only one bit in the binary form of their positions) are considered as a parity bits. 1) Position 1: To verify 1 bit and bound 1 bit steps are followed such as 1, 3,5,7,9 2) Position 2: To verify 2 bits and bound 2 bit steps are followed such as 2, 3 6, 7, 10, 11. 3) Position 3: To verify 4 bits and bound 4 bits steps are followed such as 4, 5, 6,7,12,13,14,15 4) Position 4: To verify 8 bits and bound 8 bits steps are followed such as 8-15, 24-31, Finally, set a parity bit to 1 if the total number of ones in the position is odd. Set a parity bit to 0 if the total number of ones in the position is even. In this way we get the codeword by using hamming. We can detect the single bit error by using syndrome values. Parity bits are calculated as follows: c1 =c3 + c5 + c7 or p1 = d1 + d2 + d4 (4) c2 =c3 + c6 + c7 or p2 = d1 + d3 + d4 (5) c4 =c5 + c6 + c7 or p3 = d2 + d3 + d4 (6) In order to check the codeword, the parity bits are recalculated again from the information bits and compared to 4441

3 the original set of parity bits. If they match, then no error was detected, otherwise an error is detected and the non-matching parity bits can provide us with the information bit that was flipped so that the error can be corrected. For Examples, parity check matrices for (7,4) is H = (7) This H matrix is called as a lexicographic check matrix. If generated codeword is , then the multiplication of parity check matrix H and resulted codeword is 000, called as a syndrome vector. It is a null vector value gives the result of actual code that means no error has been generated, and therefore, the current value of the word is an actual code word. If generated codeword is ( ), then the multiplication of parity check matrix H and resulted codeword is (111). So, it can generate value 7, that mean error can generate in a seventh bit. we can easily detect and correct single bit error in this way. But it is not suitable for double bit error. For detecting double bit error, we need another parity bit and therefore minimum hamming distance become as four. But we cannot correct the detecting double bit error and could take a incorrect word into a different valid one producing Silent Data Corruption (SDC). SEC-DAED Hamming Codes A single error should be corrected using hamming code. However, when a double error occurs, an algorithm incorrect the codeword. To overcome this problem, A Extended versions of Hamming code used, that is a additional parity bits used to detect the double error. Unfortunately, this algorithm can be used for even detect the triple adjacent error. In order to detect the double bit error, we can use two techniques, (1) Bit Replacement or reordering the codeword, when lexicographic matrix used. (2) Shortening technique. The lexicographic matrix for the shortened hamming code (12,8) is shown in, H = ( ) (8) When a single bit error occurs in the codeword, the syndrome vector that results from the product of the lexicographic matrix with the error code word gives the binary representation of the position where the error was inserted. Using as an example Hamming code (12,8), data bits ( ) are coded as ( ). When an error occurs and, for instance, the fifth bit is changed the codeword turns into ( ). The product of this vector by the lexicographic check matrix results in the syndrome vector (1010) corresponding to the binary representation is five and therefore we can easily detect and correct the error. Coming back to the previous example, if there is a double bit error in original word in position 5 and 6, we get the vector ( ). Now product of this vector by lexicographic check matrix results in the syndrome vector is (0011) corresponding to binary representation is 3. In this case, codeword is miscorrect instead of correcting right word. Extended Hamming code is the solution of above problem, we can insert additional parity bits and therefore minimum distance is four. The H-matrix of the extended Hamming code is formed by adding a row with all 1 s, and also by adding a 1- weight column with upper r-1 0 s to the H-matrix of the hamming code. This solution allows the single error corrections and double error detections simultaneously. In the other hand, it can also be used to detect the triple error. The extended hamming code (13, 8) encodes ( ) into ( ). The double error in position 7, 11 and 2 turns into codeword ( ). This produces (1110) corresponding bit representation is 14, zero valid syndromes with no error in the parity bit. It cannot be corrected as it does not match a valid code bit position. An Extended Hamming Code can also be used for detect the triple adjacent error error but even it could incorrect the codeword. In order to detect the Triple adjacent error in SEC- TAED, it is required to add one parity bit, which consumes more amount of computational time for detecting the triple adjacent error. In Tetra adjacent error in SEC-Tetra AED is also required to add one more parity bit for detecting the error. To overcome this problem, SEC-DAED-TAED-Tetra AED method is proposed in this paper. In proposed, Tetra does not require the parity bits to detect the errors. Proposed SEC-DAED-TAED-TETRA AED Using Hamming Code In this paper, a special hamming code has been developed which can detect and correct a single error effectively. As well as detect the maximum combination of double adjacent error and triple adjacent error. Selective Bit Replacement algorithm is used for designing the SEC-DAED-TAED-Tetra AED hamming codes. This hamming codes use only 12 bits for performing all the needful. Hence, this hamming code is named as Extended SEC-DAED-TAED-Tetra AED Hamming Codes. The flow chart of Selective Bit- Replacement Strategy has been illustrated in Fig 1. In extended SEC-DAED-TAED-Tetra AED hamming code, 6 combinations of Tetra adjacent error and 5 combination of Double- and Triple- have been detected successfully. The maximum number of combination in 12-bit codeword is 11 number of Double- combination and 9 number of triple adjacent error combination. Table 1 shows the proposed SEC-DAED-TAED hamming codes. Proposed Extended SEC-DAED-TAED-Tetra AED hamming code has been detected 36.36% of Double (DAED) and 30% of Triple (TAED) and 66% of Tetra (Tetra AED) than traditional Hamming model. Further table II illustrates the possible combination of detecting double and triple adjacent error in both traditional and proposed system. 4442

4 In each and every figure, status is displayed for the corresponding detection errors. For single bit error, it must be able to correct an error. But double, triple and tetra adjacent error, the proposed system can able to detect only not corrected. If trying to correct the double or triple or tetra adjacent error, it is possible to occurring SDC effects. Hence, detecting property only is enough for double, triple and tetra adjacent errors. Figure 1: Flow chart of Bit Re-placement Strategy Figure 2: Simulation result of SEC-DAED-TAED-TETRA AED hamming codes-status shows as SEC Table I: sec-daed-taed-tetra aed hamming code Bit Placement Double Triple Tetra /11 18% 3/10 30% 0/9 0% / % 3/10 30% 6/9 66% Figure 3: Simulation result of SEC-DAED-TAED-TETRA AED hamming codes-status shows as DAED Table II: possible combination of detecting double and triple adjacent error combination in both traditional and proposed system Traditional Hamming Code Proposed Extended Number System Hamming SEC-DAED- TAED Number System Double Triple Tetra Double Triple Tetra (4, 5) (7, 8) (3, 4, 5) (1, 2, 3) (8, 9, 10) ~ (6,8) (7,10) (7,9) (3,12) (1,4,8) (2,7,10) (9,11,12) (1,2,4,8) (7,9,10,11) (4,5,6,8) (3,9,11,12) (1,2,7,10) (1,2,4,10) Figure 4: Simulation result of SEC-DAED-TAED-TETRA AED hamming codes-status shows as TAED Results and Discussions Simulation results of Proposed Extended SEC-DAED-TAED- TETRA AED Hamming Codes have been evaluated by using ModelSim 6.3C. When correcting SEC or detecting DAED, TAED and Tetra AED, it shows the appropriate status indication. Simulation result of proposed hamming SEC- DAED-TAED-TETRA AED hamming codes for detect and correcting a single error, detecting the double adjacent error, detecting the triple adjacent error and detecting the tetra adjacent errors are shown in figure 2, 3, 4 and 5 respectively. Figure 5: Simulation result of SEC-DAED-TAED-TETRA AED hamming codes-status shows as TETRA AED Conclusion In this paper, extended hamming codes are used to maximize the probability of detecting a SEC-DAED-TAED-TETRA 4443

5 AED. The Proposed Extended Hamming Single Correction-Double -Triple -Tetra has been designed through Very Large Scale Integration System (VLSI) design environment. Verilog Hardware Description Language (Verilog HDL) is used to design the proposed Hamming code. The proposed SEC-DAED-TAED-Tetra AED Hamming codes are used to avoid the wrong information passes through the space communication. For the space or terrestrial applications, proposed codes gives a control message to earth pilot when transformation of messages have in bit flipping. The SEC-DAED-TAED is required to add one parity bit, which consumes more amount of computational time for detecting the error. Similarly, Tetra also required one more parity bit to detect the error. To overcome this problem, we proposed Tetra AED, which does not require parity bit in this paper. In future, the proposed technique will be enhanced to reduce the parity bits for detecting the five and six errors. [9] Wang, X., & Tang, S. (2015). Bit-Level Soft- Decision Decoding of Double and Triple-Parity Reed-Solomon Codes Through Binary Hamming Code Constraints. Communications Letters, IEEE, 19(2), References [1] Ahmad, N., & Hasan, S. R. (2013). Low-power compact composite field AES S-Box/Inv S-Box design in 65nm CMOS using Novel XOR Gate. Integration, the VLSI journal, 46(4), [2] Arlat, J., & Carter, W. C. (1984). Implementation and evaluation of a (b, k)-adjacent errorcorrecting/detecting scheme for supercomputer systems. IBM journal of research and development, 28(2), [3] Hodjat, A., & Verbauwhede, I. (2006). Areathroughput trade-offs for fully pipelined 30 to 70 Gbits/s AES processors. Computers, IEEE Transactions on, 55(4), [4] Chandrika, S., and R. Rani Hema Malini. "Efficient Implementation Of Hamming SEC-TAED Code Algorithm For Data Communication." [5] Cui, Y., Lou, M., Xiao, J., Zhang, X., Shi, S., & Lu, P. (2013). Research and implementation of SEC- DED Hamming code algorithm. InTENCON IEEE Region 10 Conference (31194) (pp. 1-5). IEEE. [6] Sánchez-Macián, A., Reviriego, P., & Maestro, J. A. (2012). Enhanced detection of double and triple adjacent errors in hamming codes through selective bit placement. Device and Materials Reliability, IEEE Transactions on,12(2), [7] Sanchez-Macian, A., Reviriego, P., & Maestro, J. A. (2014). Hamming SEC-DAED and extended hamming SEC-DED-TAED codes through selective shortening and bit placement. Device and Materials Reliability, IEEE Transactions on, 14(1), [8] Xu, J., Zhang, T., & Dong, Z. (2012). On Forward Correction with Hamming Code for multi-path communications. In Wireless Communications & Signal Processing (WCSP), 2012 International Conference on (pp. 1-5). IEEE. 4444

Enhanced Detection of Double Adjacent Errors in Hamming Codes through Selective Bit Placement

Enhanced Detection of Double Adjacent Errors in Hamming Codes through Selective Bit Placement Enhanced Detection of Double Adjacent Errors in Hamming Codes through Selective Bit Placement 1 Lintu K Babu, 2 Hima Sara Jacob 1 M Tech Student, 2 Assistant Professor 1 Department of Electronics And Communication

More information

DETECTION AND CORRECTION OF CELL UPSETS USING MODIFIED DECIMAL MATRIX

DETECTION AND CORRECTION OF CELL UPSETS USING MODIFIED DECIMAL MATRIX DETECTION AND CORRECTION OF CELL UPSETS USING MODIFIED DECIMAL MATRIX ENDREDDY PRAVEENA 1 M.T.ech Scholar ( VLSID), Universal College Of Engineering & Technology, Guntur, A.P M. VENKATA SREERAJ 2 Associate

More information

AN EFFICIENT DESIGN OF VLSI ARCHITECTURE FOR FAULT DETECTION USING ORTHOGONAL LATIN SQUARES (OLS) CODES

AN EFFICIENT DESIGN OF VLSI ARCHITECTURE FOR FAULT DETECTION USING ORTHOGONAL LATIN SQUARES (OLS) CODES AN EFFICIENT DESIGN OF VLSI ARCHITECTURE FOR FAULT DETECTION USING ORTHOGONAL LATIN SQUARES (OLS) CODES S. SRINIVAS KUMAR *, R.BASAVARAJU ** * PG Scholar, Electronics and Communication Engineering, CRIT

More information

Hardware Implementation of Single Bit Error Correction and Double Bit Error Detection through Selective Bit Placement for Memory

Hardware Implementation of Single Bit Error Correction and Double Bit Error Detection through Selective Bit Placement for Memory Hardware Implementation of Single Bit Error Correction and Double Bit Error Detection through Selective Bit Placement for Memory Lankesh M. Tech student, Dept. of Telecommunication Engineering, Siddaganga

More information

FPGA Implementation of Double Error Correction Orthogonal Latin Squares Codes

FPGA Implementation of Double Error Correction Orthogonal Latin Squares Codes FPGA Implementation of Double Error Correction Orthogonal Latin Squares Codes E. Jebamalar Leavline Assistant Professor, Department of ECE, Anna University, BIT Campus, Tiruchirappalli, India Email: jebilee@gmail.com

More information

Comparative Analysis of DMC and PMC on FPGA

Comparative Analysis of DMC and PMC on FPGA Comparative Analysis of DMC and PMC on FPGA Gnanajyothi R 1, Mr Ramana Reddy K V 2, Dr. Siva Yellampalli 3 1 Student, Mtech13, UTL VTU regional center, Bengaluru. 2 Assistant professor, UTL VTU regional

More information

Hamming Codes. s 0 s 1 s 2 Error bit No error has occurred c c d3 [E1] c0. Topics in Computer Mathematics

Hamming Codes. s 0 s 1 s 2 Error bit No error has occurred c c d3 [E1] c0. Topics in Computer Mathematics Hamming Codes Hamming codes belong to the class of codes known as Linear Block Codes. We will discuss the generation of single error correction Hamming codes and give several mathematical descriptions

More information

Efficient Implementation of Single Error Correction and Double Error Detection Code with Check Bit Precomputation

Efficient Implementation of Single Error Correction and Double Error Detection Code with Check Bit Precomputation http://dx.doi.org/10.5573/jsts.2012.12.4.418 JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, VOL.12, NO.4, DECEMBER, 2012 Efficient Implementation of Single Error Correction and Double Error Detection

More information

Error Correction Using Extended Orthogonal Latin Square Codes

Error Correction Using Extended Orthogonal Latin Square Codes International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 9, Number 1 (2016), pp. 55-62 International Research Publication House http://www.irphouse.com Error Correction

More information

VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH THE EFFICIENT MULTIPLICATIVE INVERSE UNIT

VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH THE EFFICIENT MULTIPLICATIVE INVERSE UNIT VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH THE EFFICIENT MULTIPLICATIVE INVERSE UNIT K.Sandyarani 1 and P. Nirmal Kumar 2 1 Research Scholar, Department of ECE, Sathyabama

More information

Fault Tolerant Parallel Filters Based On Bch Codes

Fault Tolerant Parallel Filters Based On Bch Codes RESEARCH ARTICLE OPEN ACCESS Fault Tolerant Parallel Filters Based On Bch Codes K.Mohana Krishna 1, Mrs.A.Maria Jossy 2 1 Student, M-TECH(VLSI Design) SRM UniversityChennai, India 2 Assistant Professor

More information

Error Detecting and Correcting Code Using Orthogonal Latin Square Using Verilog HDL

Error Detecting and Correcting Code Using Orthogonal Latin Square Using Verilog HDL Error Detecting and Correcting Code Using Orthogonal Latin Square Using Verilog HDL Ch.Srujana M.Tech [EDT] srujanaxc@gmail.com SR Engineering College, Warangal. M.Sampath Reddy Assoc. Professor, Department

More information

HDL IMPLEMENTATION OF SRAM BASED ERROR CORRECTION AND DETECTION USING ORTHOGONAL LATIN SQUARE CODES

HDL IMPLEMENTATION OF SRAM BASED ERROR CORRECTION AND DETECTION USING ORTHOGONAL LATIN SQUARE CODES HDL IMPLEMENTATION OF SRAM BASED ERROR CORRECTION AND DETECTION USING ORTHOGONAL LATIN SQUARE CODES (1) Nallaparaju Sneha, PG Scholar in VLSI Design, (2) Dr. K. Babulu, Professor, ECE Department, (1)(2)

More information

Reliability of Memory Storage System Using Decimal Matrix Code and Meta-Cure

Reliability of Memory Storage System Using Decimal Matrix Code and Meta-Cure Reliability of Memory Storage System Using Decimal Matrix Code and Meta-Cure Iswarya Gopal, Rajasekar.T, PG Scholar, Sri Shakthi Institute of Engineering and Technology, Coimbatore, Tamil Nadu, India Assistant

More information

It is well understood that the minimum number of check bits required for single bit error correction is specified by the relationship: D + P P

It is well understood that the minimum number of check bits required for single bit error correction is specified by the relationship: D + P P October 2012 Reference Design RD1025 Introduction This reference design implements an Error Correction Code (ECC) module for the LatticeEC and LatticeSC FPGA families that can be applied to increase memory

More information

Efficient Majority Logic Fault Detector/Corrector Using Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes

Efficient Majority Logic Fault Detector/Corrector Using Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes Efficient Majority Logic Fault Detector/Corrector Using Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes 1 U.Rahila Begum, 2 V. Padmajothi 1 PG Student, 2 Assistant Professor 1 Department Of

More information

Implementation of Decimal Matrix Code For Multiple Cell Upsets in Memory

Implementation of Decimal Matrix Code For Multiple Cell Upsets in Memory Implementation of Decimal Matrix Code For Multiple Cell Upsets in Memory Shwetha N 1, Shambhavi S 2 1, 2 Department of E&C, Kalpataru Institute of Technology, Tiptur, Karnataka, India Abstract: Transient

More information

2016 Maxwell Scientific Publication Corp. Submitted: August 21, 2015 Accepted: September 11, 2015 Published: January 05, 2016

2016 Maxwell Scientific Publication Corp. Submitted: August 21, 2015 Accepted: September 11, 2015 Published: January 05, 2016 Research Journal of Applied Sciences, Engineering and Technology 12(1): 52-62, 2016 DOI:10.19026/rjaset.12.2303 ISSN: 2040-7459; e-issn: 2040-7467 2016 Maxwell Scientific Publication Corp. Submitted: August

More information

Reduced Latency Majority Logic Decoding for Error Detection and Correction

Reduced Latency Majority Logic Decoding for Error Detection and Correction Reduced Latency Majority Logic Decoding for Error Detection and Correction D.K.Monisa 1, N.Sathiya 2 1 Department of Electronics and Communication Engineering, Mahendra Engineering College, Namakkal, Tamilnadu,

More information

Single error correction, double error detection and double adjacent error correction with no mis-correction code

Single error correction, double error detection and double adjacent error correction with no mis-correction code This article has been accepted and published on J-STAGE in advance of copyediting. Content is final as presented. IEICE Electronics Express, Vol.* No.*,*-* Single error correction, double error detection

More information

Exploiting Unused Spare Columns to Improve Memory ECC

Exploiting Unused Spare Columns to Improve Memory ECC 2009 27th IEEE VLSI Test Symposium Exploiting Unused Spare Columns to Improve Memory ECC Rudrajit Datta and Nur A. Touba Computer Engineering Research Center Department of Electrical and Computer Engineering

More information

Effective Implementation of LDPC for Memory Applications

Effective Implementation of LDPC for Memory Applications Effective Implementation of LDPC for Memory Applications Y.Sreeja PG Scholar, VLSI & ES, Dept of ECE, Vidya Bharathi Institute of Technology, Janagaon, Warangal, Telangana. Dharavath Jagan Associate Professor,

More information

CS321: Computer Networks Error Detection and Correction

CS321: Computer Networks Error Detection and Correction CS321: Computer Networks Error Detection and Correction Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Error Detection and Correction Objective: System must

More information

FAULT TOLERANT SYSTEMS

FAULT TOLERANT SYSTEMS FAULT TOLERANT SYSTEMS http://www.ecs.umass.edu/ece/koren/faulttolerantsystems Part 6 Coding I Chapter 3 Information Redundancy Part.6.1 Information Redundancy - Coding A data word with d bits is encoded

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May-2013 ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May-2013 ISSN 255 CORRECTIONS TO FAULT SECURE OF MAJORITY LOGIC DECODER AND DETECTOR FOR MEMORY APPLICATIONS Viji.D PG Scholar Embedded Systems Prist University, Thanjuvr - India Mr.T.Sathees Kumar AP/ECE Prist University,

More information

Implementation of Multidirectional Parity Check Code Using Hamming Code for Error Detection and Correction

Implementation of Multidirectional Parity Check Code Using Hamming Code for Error Detection and Correction Implementation of Multidirectional Parity Check Code Using Hamming Code for Error Detection and Correction Vishal Badole 1, Amit Udawat 2 Department of Electronics and Communication Engg. 1, Acropolis

More information

[Kalyani*, 4.(9): September, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785

[Kalyani*, 4.(9): September, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY SYSTEMATIC ERROR-CORRECTING CODES IMPLEMENTATION FOR MATCHING OF DATA ENCODED M.Naga Kalyani*, K.Priyanka * PG Student [VLSID]

More information

An Efficient FPGA Implementation of the Advanced Encryption Standard (AES) Algorithm Using S-Box

An Efficient FPGA Implementation of the Advanced Encryption Standard (AES) Algorithm Using S-Box Volume 5 Issue 2 June 2017 ISSN: 2320-9984 (Online) International Journal of Modern Engineering & Management Research Website: www.ijmemr.org An Efficient FPGA Implementation of the Advanced Encryption

More information

Design of Flash Controller for Single Level Cell NAND Flash Memory

Design of Flash Controller for Single Level Cell NAND Flash Memory Design of Flash Controller for Single Level Cell NAND Flash Memory Ashwin Bijoor 1, Sudharshana 2 P.G Student, Department of Electronics and Communication, NMAMIT, Nitte, Karnataka, India 1 Assistant Professor,

More information

An Integrated ECC and BISR Scheme for Error Correction in Memory

An Integrated ECC and BISR Scheme for Error Correction in Memory An Integrated ECC and BISR Scheme for Error Correction in Memory Shabana P B 1, Anu C Kunjachan 2, Swetha Krishnan 3 1 PG Student [VLSI], Dept. of ECE, Viswajyothy College Of Engineering & Technology,

More information

Majority Logic Decoding Of Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes

Majority Logic Decoding Of Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes Majority Logic Decoding Of Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes P. Kalai Mani, V. Vishnu Prasath PG Student, Department of Applied Electronics, Sri Subramanya College of Engineering

More information

VHDL CODE FOR SINGLE BIT ERROR DETECTION AND CORRECTION WITH EVEN PARITY CHECK METHOD USING XILINX 9.2i

VHDL CODE FOR SINGLE BIT ERROR DETECTION AND CORRECTION WITH EVEN PARITY CHECK METHOD USING XILINX 9.2i VHDL CODE FOR SINGLE BIT ERROR DETECTION AND CORRECTION WITH EVEN PARITY CHECK METHOD USING XILINX 9.2i Vivek Singh, Rahul Kumar, Manish Kumar Upadhyay Dept. of Electronics & Communication Engineering..

More information

Implementation of Hamming code using VLSI

Implementation of Hamming code using VLSI International Journal of Engineering Trends and Technology- Volume4Issue2-23 Implementation of Hamming code using VLSI Nutan Shep, Mrs. P.H. Bhagat 2 Department of Electronics & Telecommunication Dr.B.A.M.U,Aurangabad

More information

2 Asst Prof, ECE Dept, Kottam College of Engineering, Chinnatekur, Kurnool, AP-INDIA.

2 Asst Prof, ECE Dept, Kottam College of Engineering, Chinnatekur, Kurnool, AP-INDIA. www.semargroups.org ISSN 2319-8885 Vol.02,Issue.06, July-2013, Pages:480-486 Error Correction in MLC NAND Flash Memories Based on Product Code ECC Schemes B.RAJAGOPAL REDDY 1, K.PARAMESH 2 1 Research Scholar,

More information

Chapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 10 Error Detection and Correction 0. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note The Hamming distance between two words is the number of differences

More information

EECS150 - Digital Design Lecture 24 - High-Level Design (Part 3) + ECC

EECS150 - Digital Design Lecture 24 - High-Level Design (Part 3) + ECC EECS150 - Digital Design Lecture 24 - High-Level Design (Part 3) + ECC April 12, 2012 John Wawrzynek Spring 2012 EECS150 - Lec24-hdl3 Page 1 Parallelism Parallelism is the act of doing more than one thing

More information

EE 6900: FAULT-TOLERANT COMPUTING SYSTEMS

EE 6900: FAULT-TOLERANT COMPUTING SYSTEMS EE 6900: FAULT-TOLERANT COMPUTING SYSTEMS LECTURE 6: CODING THEORY - 2 Fall 2014 Avinash Kodi kodi@ohio.edu Acknowledgement: Daniel Sorin, Behrooz Parhami, Srinivasan Ramasubramanian Agenda Hamming Codes

More information

Chapter 10 Error Detection and Correction 10.1

Chapter 10 Error Detection and Correction 10.1 Chapter 10 Error Detection and Correction 10.1 10-1 INTRODUCTION some issues related, directly or indirectly, to error detection and correction. Topics discussed in this section: Types of Errors Redundancy

More information

Error Correcting Codes

Error Correcting Codes Error Correcting Codes 2. The Hamming Codes Priti Shankar Priti Shankar is with the Department of Computer Science and Automation at the Indian Institute of Science, Bangalore. Her interests are in Theoretical

More information

Implementation of Full -Parallelism AES Encryption and Decryption

Implementation of Full -Parallelism AES Encryption and Decryption Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption

More information

FPGA CAN BE IMPLEMENTED BY USING ADVANCED ENCRYPTION STANDARD ALGORITHM

FPGA CAN BE IMPLEMENTED BY USING ADVANCED ENCRYPTION STANDARD ALGORITHM FPGA CAN BE IMPLEMENTED BY USING ADVANCED ENCRYPTION STANDARD ALGORITHM P. Aatheeswaran 1, Dr.R.Suresh Babu 2 PG Scholar, Department of ECE, Jaya Engineering College, Chennai, Tamilnadu, India 1 Associate

More information

DESIGN OF FAULT SECURE ENCODER FOR MEMORY APPLICATIONS IN SOC TECHNOLOGY

DESIGN OF FAULT SECURE ENCODER FOR MEMORY APPLICATIONS IN SOC TECHNOLOGY DESIGN OF FAULT SECURE ENCODER FOR MEMORY APPLICATIONS IN SOC TECHNOLOGY K.Maheshwari M.Tech VLSI, Aurora scientific technological and research academy, Bandlaguda, Hyderabad. k.sandeep kumar Asst.prof,

More information

PERFORMANCE ANALYSIS OF HIGH EFFICIENCY LOW DENSITY PARITY-CHECK CODE DECODER FOR LOW POWER APPLICATIONS

PERFORMANCE ANALYSIS OF HIGH EFFICIENCY LOW DENSITY PARITY-CHECK CODE DECODER FOR LOW POWER APPLICATIONS American Journal of Applied Sciences 11 (4): 558-563, 2014 ISSN: 1546-9239 2014 Science Publication doi:10.3844/ajassp.2014.558.563 Published Online 11 (4) 2014 (http://www.thescipub.com/ajas.toc) PERFORMANCE

More information

Implementation of Galois Field Arithmetic Unit on FPGA

Implementation of Galois Field Arithmetic Unit on FPGA Implementation of Galois Field Arithmetic Unit on FPGA 1 LakhendraKumar, 2 Dr. K. L. Sudha 1 B.E project scholar, VIII SEM, Dept. of E&C, DSCE, Bangalore, India 2 Professor, Dept. of E&C, DSCE, Bangalore,

More information

Available online at ScienceDirect. Procedia Technology 25 (2016 )

Available online at  ScienceDirect. Procedia Technology 25 (2016 ) Available online at www.sciencedirect.com ScienceDirect Procedia Technology 25 (2016 ) 544 551 Global Colloquium in Recent Advancement and Effectual Researches in Engineering, Science and Technology (RAEREST

More information

Fault Tolerant Parallel Filters Based on ECC Codes

Fault Tolerant Parallel Filters Based on ECC Codes Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 11, Number 7 (2018) pp. 597-605 Research India Publications http://www.ripublication.com Fault Tolerant Parallel Filters Based on

More information

90A John Muir Drive Buffalo, New York Tel: Fax:

90A John Muir Drive   Buffalo, New York Tel: Fax: Reed Solomon Coding The VOCAL implementation of Reed Solomon (RS) Forward Error Correction (FEC) algorithms is available in several forms. The forms include pure software and software with varying levels

More information

4. Error correction and link control. Contents

4. Error correction and link control. Contents //2 4. Error correction and link control Contents a. Types of errors b. Error detection and correction c. Flow control d. Error control //2 a. Types of errors Data can be corrupted during transmission.

More information

Hardware Implementation of Cryptosystem by AES Algorithm Using FPGA

Hardware Implementation of Cryptosystem by AES Algorithm Using FPGA Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

Error-Correcting Codes

Error-Correcting Codes Error-Correcting Codes Michael Mo 10770518 6 February 2016 Abstract An introduction to error-correcting codes will be given by discussing a class of error-correcting codes, called linear block codes. The

More information

A Low-Power ECC Check Bit Generator Implementation in DRAMs

A Low-Power ECC Check Bit Generator Implementation in DRAMs 252 SANG-UHN CHA et al : A LOW-POWER ECC CHECK BIT GENERATOR IMPLEMENTATION IN DRAMS A Low-Power ECC Check Bit Generator Implementation in DRAMs Sang-Uhn Cha *, Yun-Sang Lee **, and Hongil Yoon * Abstract

More information

Design and Implementation of Low Density Parity Check Codes

Design and Implementation of Low Density Parity Check Codes IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 09 (September. 2014), V2 PP 21-25 www.iosrjen.org Design and Implementation of Low Density Parity Check Codes

More information

Homework #5 Solutions Due: July 17, 2012 G = G = Find a standard form generator matrix for a code equivalent to C.

Homework #5 Solutions Due: July 17, 2012 G = G = Find a standard form generator matrix for a code equivalent to C. Homework #5 Solutions Due: July 7, Do the following exercises from Lax: Page 4: 4 Page 34: 35, 36 Page 43: 44, 45, 46 4 Let C be the (5, 3) binary code with generator matrix G = Find a standard form generator

More information

Design of Majority Logic Decoder for Error Detection and Correction in Memories

Design of Majority Logic Decoder for Error Detection and Correction in Memories IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 7, Issue 3, Ver. I (May. - Jun. 2017), PP 19-26 e-issn: 2319 4200, p-issn No. : 2319 4197 www.iosrjournals.org Design of Majority Logic Decoder

More information

Design Single and Multiple Errors Correction Block Codes

Design Single and Multiple Errors Correction Block Codes Design Single and Multiple Errors Correction Block Codes Zahraa Raad Mayoof Hajiyat Faculty of Engineering Technology & Built Environment, Department of Electrical and Electronic Engineering, B.Eng (Hons)

More information

Link Layer: Error detection and correction

Link Layer: Error detection and correction Link Layer: Error detection and correction Topic Some bits will be received in error due to noise. What can we do? Detect errors with codes Correct errors with codes Retransmit lost frames Later Reliability

More information

Design Implementation of Composite Field S-Box using AES 256 Algorithm

Design Implementation of Composite Field S-Box using AES 256 Algorithm International Journal of Emerging Engineering Research and Technology Volume 3, Issue 12, December 2016, PP 43-51 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Design Implementation of Composite Field

More information

Outline. Parity-based ECC and Mechanism for Detecting and Correcting Soft Errors in On-Chip Communication. Outline

Outline. Parity-based ECC and Mechanism for Detecting and Correcting Soft Errors in On-Chip Communication. Outline Parity-based ECC and Mechanism for Detecting and Correcting Soft Errors in On-Chip Communication Khanh N. Dang and Xuan-Tu Tran Email: khanh.n.dang@vnu.edu.vn VNU Key Laboratory for Smart Integrated Systems

More information

Using Error Detection Codes to detect fault attacks on Symmetric Key Ciphers

Using Error Detection Codes to detect fault attacks on Symmetric Key Ciphers Using Error Detection Codes to detect fault attacks on Symmetric Key Ciphers Israel Koren Department of Electrical and Computer Engineering Univ. of Massachusetts, Amherst, MA collaborating with Luca Breveglieri,

More information

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science Advanced Computer Networks Department of Computer Science DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks

More information

CSEP 561 Error detection & correction. David Wetherall

CSEP 561 Error detection & correction. David Wetherall CSEP 561 Error detection & correction David Wetherall djw@cs.washington.edu Codes for Error Detection/Correction ti ti Error detection and correction How do we detect and correct messages that are garbled

More information

Ch. 7 Error Detection and Correction

Ch. 7 Error Detection and Correction Ch. 7 Error Detection and Correction Error Detection and Correction Data can be corrupted during transmission. Some applications require that errors be detected and corrected. 2 1. Introduction Let us

More information

EDAC FOR MEMORY PROTECTION IN ARM PROCESSOR

EDAC FOR MEMORY PROTECTION IN ARM PROCESSOR EDAC FOR MEMORY PROTECTION IN ARM PROCESSOR Mrs. A. Ruhan Bevi ECE department, SRM, Chennai, India. Abstract: The ARM processor core is a key component of many successful 32-bit embedded systems. Embedded

More information

Viterbi Algorithm for error detection and correction

Viterbi Algorithm for error detection and correction IOSR Journal of Electronicsl and Communication Engineering (IOSR-JECE) ISSN: 2278-2834-, ISBN: 2278-8735, PP: 60-65 www.iosrjournals.org Viterbi Algorithm for error detection and correction Varsha P. Patil

More information

Describe the two most important ways in which subspaces of F D arise. (These ways were given as the motivation for looking at subspaces.

Describe the two most important ways in which subspaces of F D arise. (These ways were given as the motivation for looking at subspaces. Quiz Describe the two most important ways in which subspaces of F D arise. (These ways were given as the motivation for looking at subspaces.) What are the two subspaces associated with a matrix? Describe

More information

Design and Implementation of Hamming Code using VHDL & DSCH

Design and Implementation of Hamming Code using VHDL & DSCH Design and Implementation of Hamming Code using VHDL & DSCH Divya Mokara 1, Sushmi Naidu 2, Akash Kumar Gupta 3 1 (Department of ECE, Raghu Institute of Technology, Visakhapatnam, India) 2 (Department

More information

Analysis of Soft Error Mitigation Techniques for Register Files in IBM Cu-08 90nm Technology

Analysis of Soft Error Mitigation Techniques for Register Files in IBM Cu-08 90nm Technology Analysis of Soft Error Mitigation Techniques for s in IBM Cu-08 90nm Technology Riaz Naseer, Rashed Zafar Bhatti, Jeff Draper Information Sciences Institute University of Southern California Marina Del

More information

ABSTRACT I. INTRODUCTION

ABSTRACT I. INTRODUCTION International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Orthogonal Latin Squares Encoders and Syndrome

More information

EC500. Design of Secure and Reliable Hardware. Lecture 1 & 2

EC500. Design of Secure and Reliable Hardware. Lecture 1 & 2 EC500 Design of Secure and Reliable Hardware Lecture 1 & 2 Mark Karpovsky January 17 th, 2013 1 Security Errors injected by the attacker (active attacks) Reliability Errors injected by random sources e.g.

More information

EC500. Design of Secure and Reliable Hardware. Lecture 9. Mark Karpovsky

EC500. Design of Secure and Reliable Hardware. Lecture 9. Mark Karpovsky EC500 Design of Secure and Reliable Hardware Lecture 9 Mark Karpovsky 1 1 Arithmetical Codes 1.1 Detection and Correction of errors in arithmetical channels (adders, multipliers, etc) Let = 0,1,,2 1 and

More information

Error Correction and Detection using Cyclic Redundancy Check

Error Correction and Detection using Cyclic Redundancy Check Error Correction and Detection using Cyclic Redundancy Check Dr. T. Logeswari Associate Professor, Dept of Computer Science, New Horizon College, Banglore, Karnataka, India ABSTRACT: In this paper Cyclic

More information

Linear Block Codes. Allen B. MacKenzie Notes for February 4, 9, & 11, Some Definitions

Linear Block Codes. Allen B. MacKenzie Notes for February 4, 9, & 11, Some Definitions Linear Block Codes Allen B. MacKenzie Notes for February 4, 9, & 11, 2015 This handout covers our in-class study of Chapter 3 of your textbook. We ll introduce some notation and then discuss the generator

More information

ENEE x Digital Logic Design. Lecture 3

ENEE x Digital Logic Design. Lecture 3 ENEE244-x Digital Logic Design Lecture 3 Announcements Homework due today. Homework 2 will be posted by tonight, due Monday, 9/2. First recitation quiz will be tomorrow on the material from Lectures and

More information

CS Computer Architecture

CS Computer Architecture CS 35101 Computer Architecture Section 600 Dr. Angela Guercio Fall 2010 Computer Systems Organization The CPU (Central Processing Unit) is the brain of the computer. Fetches instructions from main memory.

More information

IMPLEMENTATION OF OPTIMIZED 128-POINT PIPELINE FFT PROCESSOR USING MIXED RADIX 4-2 FOR OFDM APPLICATIONS

IMPLEMENTATION OF OPTIMIZED 128-POINT PIPELINE FFT PROCESSOR USING MIXED RADIX 4-2 FOR OFDM APPLICATIONS IMPLEMENTATION OF OPTIMIZED 128-POINT PIPELINE FFT PROCESSOR USING MIXED RADIX 4-2 FOR OFDM APPLICATIONS K. UMAPATHY, Research scholar, Department of ECE, Jawaharlal Nehru Technological University, Anantapur,

More information

Fault Tolerance & Reliability CDA Chapter 2 Additional Interesting Codes

Fault Tolerance & Reliability CDA Chapter 2 Additional Interesting Codes Fault Tolerance & Reliability CDA 5140 Chapter 2 Additional Interesting Codes m-out-of-n codes - each binary code word has m ones in a length n non-systematic codeword - used for unidirectional errors

More information

Area Optimization in Masked Advanced Encryption Standard

Area Optimization in Masked Advanced Encryption Standard IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 06 (June. 2014), V1 PP 25-29 www.iosrjen.org Area Optimization in Masked Advanced Encryption Standard R.Vijayabhasker,

More information

IMPLEMENTATION OF DATA ENCODING AND DECODING IN ARM BOARDS WITH QOS PARAMETERS

IMPLEMENTATION OF DATA ENCODING AND DECODING IN ARM BOARDS WITH QOS PARAMETERS IMPLEMENTATION OF DATA ENCODING AND DECODING IN ARM BOARDS WITH QOS PARAMETERS #1 S.SUNDAR, *2 R.KUMAR, #3 HARISH M.KITTUR # School of Electronics Engineering, VIT University Vellore 632014, Tamilnadu,

More information

Design and Implementation of Hamming Code on FPGA using Verilog

Design and Implementation of Hamming Code on FPGA using Verilog International Journal of Engineering and Advanced Technology (IJEAT) Design and Implementation of Hamming Code on FPGA using Verilog Ravi Hosamani, Ashwini S. Karne Abstract In mathematics, digital communication

More information

Design and Analysis of Kogge-Stone and Han-Carlson Adders in 130nm CMOS Technology

Design and Analysis of Kogge-Stone and Han-Carlson Adders in 130nm CMOS Technology Design and Analysis of Kogge-Stone and Han-Carlson Adders in 130nm CMOS Technology Senthil Ganesh R & R. Kalaimathi 1 Assistant Professor, Electronics and Communication Engineering, Info Institute of Engineering,

More information

Improved Error Correction Capability in Flash Memory using Input / Output Pins

Improved Error Correction Capability in Flash Memory using Input / Output Pins Improved Error Correction Capability in Flash Memory using Input / Output Pins A M Kiran PG Scholar/ Department of ECE Karpagam University,Coimbatore kirthece@rediffmail.com J Shafiq Mansoor Assistant

More information

ELG3175 Introduction to Communication Systems. Introduction to Error Control Coding

ELG3175 Introduction to Communication Systems. Introduction to Error Control Coding ELG375 Introduction to Communication Systems Introduction to Error Control Coding Types of Error Control Codes Block Codes Linear Hamming, LDPC Non-Linear Cyclic BCH, RS Convolutional Codes Turbo Codes

More information

T325 Summary T305 T325 B BLOCK 4 T325. Session 3. Dr. Saatchi, Seyed Mohsen. Prepared by:

T325 Summary T305 T325 B BLOCK 4 T325. Session 3. Dr. Saatchi, Seyed Mohsen. Prepared by: T305 T325 B BLOCK 4 T325 Summary Prepared by: Session 3 [Type Dr. Saatchi, your address] Seyed Mohsen [Type your phone number] [Type your e-mail address] Dr. Saatchi, Seyed Mohsen T325 Error Control Coding

More information

Errors. Chapter Extension of System Model

Errors. Chapter Extension of System Model Chapter 4 Errors In Chapter 2 we saw examples of how symbols could be represented by arrays of bits. In Chapter 3 we looked at some techniques of compressing the bit representations of such symbols, or

More information

CMSC 2833 Lecture 18. Parity Add a bit to make the number of ones (1s) transmitted odd.

CMSC 2833 Lecture 18. Parity Add a bit to make the number of ones (1s) transmitted odd. Parity Even parity: Odd parity: Add a bit to make the number of ones (1s) transmitted even. Add a bit to make the number of ones (1s) transmitted odd. Example and ASCII A is coded 100 0001 Parity ASCII

More information

Optimized ARM-Based Implementation of Low Density Parity Check Code (LDPC) Decoder in China Digital Radio (CDR)

Optimized ARM-Based Implementation of Low Density Parity Check Code (LDPC) Decoder in China Digital Radio (CDR) Optimized ARM-Based Implementation of Low Density Parity Check Code (LDPC) Decoder in China Digital Radio (CDR) P. Vincy Priscilla 1, R. Padmavathi 2, S. Tamilselvan 3, Dr.S. Kanthamani 4 1,4 Department

More information

CSCI 402: Computer Architectures. Performance of Multilevel Cache

CSCI 402: Computer Architectures. Performance of Multilevel Cache CSCI 402: Computer Architectures Memory Hierarchy (5) Fengguang Song Department of Computer & Information Science IUPUI Performance of Multilevel Cache Main Memory CPU L1 cache L2 cache Given CPU base

More information

Communication Fundamentals in Computer Networks

Communication Fundamentals in Computer Networks Lecture 7 Communication Fundamentals in Computer Networks M. Adnan Quaium Assistant Professor Department of Electrical and Electronic Engineering Ahsanullah University of Science and Technology Room 4A07

More information

Design of S-box and IN V S -box using Composite Field Arithmetic for AES Algorithm

Design of S-box and IN V S -box using Composite Field Arithmetic for AES Algorithm Design of S-box and IN V S -box using Composite Field Arithmetic for AES Algorithm Sushma D K Department of Electronics and Communication The Oxford College of Engineering Bangalore, India Dr. Manju Devi

More information

UT80CRH196KD Error Detection and Correction Functionality

UT80CRH196KD Error Detection and Correction Functionality UTMC APPLICATION NOTE UTCRHKD Error Detection and Correction Functionality The UTCRHKD provides flow through Error Detection and Correction (EDAC) for external memory accesses. When enabled, the EDAC will

More information

Single Byte Error Correcting Double Byte Error Detecting Codes For Memory Systems

Single Byte Error Correcting Double Byte Error Detecting Codes For Memory Systems Single Byte Error Correcting Double Byte Error Detecting Codes For Memory Systems single- error correcting and double-error detecting codes (SEC-DED codes) is memory are classified to be either independent

More information

Implementation of low power wireless sensor node with fault tolerance mechanism

Implementation of low power wireless sensor node with fault tolerance mechanism Implementation of low power wireless sensor node with fault tolerance mechanism R.Divyasharon #1, Dr.D.Sridharan #2 #1 Department of ECE, Anna University CEG, Chennai-25, India #2 Department of ECE, Anna

More information

Error Correction Code (ALTECC_ENCODER and ALTECC_DECODER) Megafunctions User Guide

Error Correction Code (ALTECC_ENCODER and ALTECC_DECODER) Megafunctions User Guide Error Correction Code (ALTECC_ENCODER and ALTECC_DECODER) Megafunctions User Guide 11 Innovation Drive San Jose, CA 95134 www.altera.com Software Version 8. Document Version: 2. Document Date: June 28

More information

UCSD ECE154C Handout #21 Prof. Young-Han Kim Thursday, June 8, Solutions to Practice Final Examination (Spring 2016)

UCSD ECE154C Handout #21 Prof. Young-Han Kim Thursday, June 8, Solutions to Practice Final Examination (Spring 2016) UCSD ECE54C Handout #2 Prof. Young-Han Kim Thursday, June 8, 27 Solutions to Practice Final Examination (Spring 26) There are 4 problems, each problem with multiple parts, each part worth points. Your

More information

Digital Logic Design Exercises. Assignment 1

Digital Logic Design Exercises. Assignment 1 Assignment 1 For Exercises 1-5, match the following numbers with their definition A Number Natural number C Integer number D Negative number E Rational number 1 A unit of an abstract mathematical system

More information

Energy Efficient Layer Decoding Architecture for LDPC Decoder

Energy Efficient Layer Decoding Architecture for LDPC Decoder eissn:232-225x;pissn:232-224 Volume: 4; Issue: ; January -25 Energy Efficient Layer Decoding Architecture for LDPC Decoder Jyothi B R Lecturer KLS s VDRIT Haliyal-58329 Abstract- Low Density Parity-Check

More information

Redundancy in fault tolerant computing. D. P. Siewiorek R.S. Swarz, Reliable Computer Systems, Prentice Hall, 1992

Redundancy in fault tolerant computing. D. P. Siewiorek R.S. Swarz, Reliable Computer Systems, Prentice Hall, 1992 Redundancy in fault tolerant computing D. P. Siewiorek R.S. Swarz, Reliable Computer Systems, Prentice Hall, 1992 1 Redundancy Fault tolerance computing is based on redundancy HARDWARE REDUNDANCY Physical

More information

SPECIAL ISSUE ENERGY, ENVIRONMENT, AND ENGINEERING SECTION: RECENT ADVANCES IN BIG DATA ANALYSIS (ABDA) ISSN:

SPECIAL ISSUE ENERGY, ENVIRONMENT, AND ENGINEERING SECTION: RECENT ADVANCES IN BIG DATA ANALYSIS (ABDA) ISSN: ISSN: 976-314 ARTICLE CONCURRENT ERROR DETECTION WITH SELF-CHECKING MAJORITY VOTING CIRCUITS V. Elamaran 1*, VR. Priya 2, M. Chandrasekar 1, Har Narayan Upadhyay 1 ABSTRACT 1 Department of ECE, School

More information

Area Efficient, Low Power Array Multiplier for Signed and Unsigned Number. Chapter 3

Area Efficient, Low Power Array Multiplier for Signed and Unsigned Number. Chapter 3 Area Efficient, Low Power Array Multiplier for Signed and Unsigned Number Chapter 3 Area Efficient, Low Power Array Multiplier for Signed and Unsigned Number Chapter 3 3.1 Introduction The various sections

More information

MULTI-RATE HIGH-THROUGHPUT LDPC DECODER: TRADEOFF ANALYSIS BETWEEN DECODING THROUGHPUT AND AREA

MULTI-RATE HIGH-THROUGHPUT LDPC DECODER: TRADEOFF ANALYSIS BETWEEN DECODING THROUGHPUT AND AREA MULTI-RATE HIGH-THROUGHPUT LDPC DECODER: TRADEOFF ANALYSIS BETWEEN DECODING THROUGHPUT AND AREA Predrag Radosavljevic, Alexandre de Baynast, Marjan Karkooti, and Joseph R. Cavallaro Department of Electrical

More information