Transparent-Test Methodologies for Random Access Memories Without/With ECC

Size: px
Start display at page:

Download "Transparent-Test Methodologies for Random Access Memories Without/With ECC"

Transcription

1 1888 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 26, NO. 10, OCTOBER 2007 [5] A. Osman, M. Osman, N. Dogan, and M. Imam, An extended tanh law MOSFET model for high temperature circuit simulation, J. Solid-State Circuits, vol. 30, no. 2, pp , Feb [6] J. Daga, E. Ottaviano, and D. Auvergne, Temperature effect on delay for low voltage applications, in Proc. DATE, 1998, pp [7] A. Shousha and M. Aboulwafa, A generalized tanh law MOSFET model and its applications to CMOS inverters, J. Solid-State Circuits, vol. 28, no. 2, pp , Feb [8] T. Sakurai and A. Newton, Alpha-power law MOSFET model and its application to CMOS inverter delay and other formulas, J. Solid-State Circuits, vol. 25, no. 2, pp , Apr [9] Y. Taur and T. Ning, Fundamentals of Modern VLSI Devices. Cambridge, U.K.: Cambridge Univ. Press, [10] T. Chan, W. Lee, and H. Gaw, Experimental characterization and modeling of electron saturation velocity in MOSFET s inversion layer from 90 to 350 K, IEEE Electron Device Lett., vol. 11, no. 10, pp , Oct [11] R. Quay, C. Moglestue, V. Palankovski, and S. Selberherr, A temperature dependent model for the saturation velocity in semiconductor materials, Mater. Sci. Semicond. Process., vol. 3, no. 1, pp , Mar [12] S. Sze, Physics of Semiconductor Devices. New Work: Wiley, [13] K. Roy, S. Mukhopadhyay, and H. Mahmood-Meimand, Leakage current mechanisms and leakage reduction techniques in deepsubmicrometer CMOS circuits, Proc. IEEE, vol. 91, no. 2, pp , Feb [14] Y. Cao, T. Sato, D. Sylvester, M. Orshansky, and C. Hu, New paradigm of predictive MOSFET and interconnect modeling for early circuit design, in Proc. CICC, 2000, pp [Online]. Available: [15] C. Park et al., Reversal of temperature dependence of integrated circuits operating at very low voltages, in IEDM Tech. Dig., 1995, pp [16] A. Bellaouar, A. Fridi, M. Elmasry, and K. Itoh, Supply voltage scaling for temperature insensitive CMOS circuit operation, IEEE Trans. Circuits Syst. II, Analog Digit. Signal Process., vol. 45, no. 3, pp , Mar [17] K. Kanda, K. Nose, H. Kawaguchi, and T. Sakurai, Design impact of positive temperature dependence on drain current in sub-1-v CMOS VLSIs, in J. Solid-State Circuits, Oct. 2001, vol. 36, pp [18] H. Bakoglu, Circuits, Interconnections, and Packaging for VLSI. Reading, MA: Addison-Wesley, [19] K. Buchanan, The evolution of interconnect technology for silicon integrated circuitry, in Proc. GaAsMANTECH Conf., [20] A. Ajami, K. Banerjee, and M. Pedram, Analysis of substrate thermal gradient effects on optimal buffer insertion, in Proc. ICCAD, 2001, pp [21] R. Dennard et al., Design of ion-implanted MOSFETs with very small physical dimension, in J. Solid-State Circuits, Oct. 1974, vol. 9, pp [22] H. Su, F. Liu, A. Devgan, E. Acar, and S. Nassif, Full chip leakage estimation considering power supply and temperature variations, in Proc. ISLPED, 2003, pp [23] J. Abraham, Integrating complex I/O in an SOC, Chip Design Mag., Transparent-Test Methodologies for Random Access Memories Without/With ECC Jin-Fu Li Abstract This paper presents a systematic procedure for transforming a bit-oriented March test into a transparent word-oriented March test. The test-time complexity of the transparent word-oriented March tests converted by the proposed method is only (P + 5 log 2 B +2)N for an N B-bit Random Access Memory, and the test-time complexity of the corresponding signature-prediction test is QN. Here, P and Q denote the number of total Read/Write and Read test operations of the original bit-oriented March test. A transparent-test methodology for memories with error-correction code (ECC) is also proposed. This methodology can test and locate faulty cells, and no signature prediction is needed. The test-time complexity of the proposed transparent-test methodology for memories with ECC is only (P + 5 log 2 B +2)N. Index Terms Error-correction code (ECC), March test, random-access memory (RAM), reliability, soft errors, transparent test. I. INTRODUCTION In a complex system-on-a-chip (SOC) design, memory cores usually represent a significant portion of the chip area. It is also the densest part of the chip. Memory-core reliability, thus, can greatly affect SOC reliability. Error-correction code (ECC) is one of the widely used methods for enhancing memory reliability. Periodic transparent testing is also an important method for enhancing memory reliability. It also can enhance the function of ECCs. For example, ECC has two weaknesses fault-accumulation effect and in-ability to detect functional faults. Integrating transparent testing with ECCs can solve the mentioned weaknesses associated with ECC. Concept of transparent testing, which leaves the original contents of the circuit under test unchanged after the testing is completed if no faults are present. One major advantage of transparent testing is that it can ensure the reliability of stored data throughout its lifetime. Many transparent-test schemes have been reported in [1] [13]. In the study in [1] and [2], a systematic approach for transforming a March test into a transparent March test was presented. The transformation rules consist of two phases generation of a transparent March test and generation of a signature-prediction test. In the study in [3], a transparent-test methodology was presented. The test methodology covers a class of faults, including both pattern sensitive and dynamic faults. It can also be extended for cache and dual-port random access memories (RAMs). In the study in [4] [7], the method from [1] is applied to detect pattern-sensitive faults and single V-coupling faults (CFs). Later, a symmetric transparent-test methodology was proposed in the study in [8]. Due to the symmetric characteristics, the final signature of the signature analyzer will be zero if no faults exist in the memory under test, such that, the signature-prediction test is not needed. Automatic generation of symmetric transparent March tests was also proposed in the study in [13]. Some short transparent tests /$ IEEE Manuscript received August 31, 2006; revised December 3, This work was supported in part by the National Science Council, Taiwan, R.O.C., under Contract NSC E and in part by MOEA, Taiwan, R.O.C., under Contract 96-EC-17-A-01-S This paper was recommended by Associate Editor K. Chakrabarty. The author is with the Department of Electrical Engineering, National Central University, Jhongli 320, Taiwan, R.O.C. Digital Object Identifier /TCAD

2 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 26, NO. 10, OCTOBER for bit-oriented RAMs were reported in the study in [9]. A simulation package was also developed for the test algorithms generation and simulation. In [10], a parallel transparent-test scheme was presented. Two transparent-test schemes without the aliasing problem were reported in the study in [11] and [12]. In [11], a transparent-test approach using the dynamic power-supply current (DPSC) was presented. Instead of generating a signature, DPSC transparent testing uses a current sensor to detect the RAM faults. A transparent online memory test (TOMT), which was reported in the study in [12], was developed for online testing of word-oriented memories with parity or Hamming protection. TOMT introduces the concept of concurrent error detection and correction to eliminate the requirement of signature generation and to avoid the interference of normal system operation. So far, however, all the transparent tests for word-oriented memories are not time-efficient. For example, the transparent-test scheme, which was reported in the study in [1] and [2], performs bit-oriented operations on all the bits of each word. Another example: TOMT also executes bitwise manipulations in wordoriented memory testing. Therefore, short transparent tests for wordoriented memories need to be developed. Moreover, shorter testing times can reduce the probability of interference of normal system operations, since transparent tests are typically executed while systems are idle. This paper presents two transparent-test schemes for RAMs without/with ECC. The proposed method transforms a bit-oriented March into a word-oriented March including two separated March tests, one is for interword CFs and the other is for intraword CFs. Then, only the March for intraword CFs needs various data backgrounds. This can reduce the test-time complexity. Compared with existing approaches, both transparent-test schemes are very time-efficient. II. PROPOSED TRANSPARENT-TEST METHODOLOGY FOR RAM WITHOUT ECC A. Transparent March Tests The notation used in an algorithm is first described. D denotes the initial content of a cell or a word for bit-oriented or word-oriented memories, respectively; D a is the data D a, where denotes a bitwise XOR operation, where D and a have the same data width; ( ) represents the ascending (descending) address sequence; and denotes either an ascending or descending address sequence. In addition, wx denotes a write-x operation on an addressed memory cell or word, while rx denotes a read operation on an addressed memory cell or word; and X is the expected data. In a nontransparent March test, X is used to describe specific data for a Write operation. In a transparent March test, X is replaced with D a, representing the data of the Write/Read test operations. Algorithm 1 (TWM_TA) describes the proposed transparent wordoriented March transformation procedure. For a given bit-oriented March test (March), TWM_TA first replaces w0 or w1 of the original March test with w0 or w1, where0 and 1 denote the all-0 and all-1 data backgrounds (also called solid data backgrounds). In addition, r0 or r1 of the original March test is replaced with r0 or r1, respectively. A new March test with solid data backgrounds is obtained, which is called SBMarch. Subsequently, TWM_TA transforms the SBMarch into a transparent SBMarch (TSMarch). The TWM_TA first removes the initialization March element if it is useless for fault activation. Then, a Read operation is added at the beginning of the March element in which the first operation is Write 1. In addition, r0 and r1 are replaced with rd a0 and rdā0,wherea 0 denotes an all-0 data background. Similarly, w0 and w1 are replaced with wd a0 and wdā0. Thus, we can obtain the transparent SBMarch TSMarch. Algorithm 1TWM_TA Require: March a given bit-oriented March test SBMarch: March with solid data backgrounds (all-0 or all-1) TSMarch: the corresponding transparent test of SBMarch ATMarch: added transparent March test TWMarch: transparent word-oriented March test if March = { } then Abort while March { } do for all Test Operations of March do Replace w0 or w1 with w0 or w1, respectively Replace r0 or r1 with r0 or r1, respectively SBMarch is obtained for all Test Operations of SBMarch do Remove the initialization March element if it is useless for fault activation Add a Read operation at the beginning of the March element in which the first test operation is a Write one Replace all r0 or r1 operations with rd a0 or rdā0, respectively Replace all w0 or w1 operations with wd a0 or wdā0, respectively TSMarch is obtained if The last Write operation of the TSMarch is wdā0 then ATMarch = { (rdā0,to 1,TO 2,...,TO log2 B, wdā0 )}, where TO i =(wdāi,wd ai,rd ai,wdāi,rdāi ). else ATMarch = { (rd a0,to 1,TO 2,...,TO log2 B, wd a0 )}, where TO i =(wd ai,wdāi,rdāi,wd ai,rd ai ). Return TWMarch = {TSMarch; ATMarch} Since the Write operations of the TSMarch only write the original data or the inverted original data into the RAM, most of intraword CFs cannot be activated. To cover intraword CFs, different data backgrounds should be applied in addition to the solid data backgrounds. Therefore, an additional transparent March is added after the TSMarch. If the data for the last Write operation of the TSMarch are equal to the inverse of the initial data, i.e., the last Write operation is wdā0, then add an additional transparent test ATMarch = { (rdā0,to 1,TO 2,...,TO log2 B, wdā0 )}, where TO i = (wdāi,wd ai,rd ai,wdāi,rdāi ). On the contrary, if the expected data for the last Write operation is equal to the initial data, i.e., the last Write operation is wd a0, then add an additional transparent test ATMarch = { (rd a0,to 1,TO 2,...,TO log2 B,wD a0 )}, where TO i =(wd ai,wdāi,rdāi,wd ai,rd ai ). For a memory with B-bit words, a i is a B-bit binary data that can be expressed as a i = B 1 x j=0 j2 j for i =1, 2,..., log 2 B. In the previous expression, if the value j/2 i 1 is even, then the value x j is one, otherwise, it is zero. For example, if a memory with 8-b words is tested, then three data patterns are needed for the ATMarch, i.e., i = {1, 2, 3}. Assume that the content of the memory under test is the same as the initial content while the TSMarch is completed. According to the description above, the ATMarch with a 1, a 2,anda 3 must be executed, and a 1 = { } since j/2 0 = {7, 6, 5, 4, 3, 2, 1, 0}; a 2 = { } since j/2 1 = {3, 3, 2, 2, 1, 1, 0, 0}; and a 3 = { } since j/2 2 = {1, 1, 1, 1, 0, 0, 0, 0}. Thus, ATMarch = { (rd a0,wd a1,wdā1,rdā1,wd a1,rd a1,wd a2,wdā2,rdā2, wd a2,rd a2,wd a3,wdā3,rdā3,wd a3,rd a3,wd a0 )}. Assume that a memory with one 8-b word is tested, and the content of the word is D = {d 7 d 6 d 5 d 4 d 3 d 2 d 1 d 0 }, while the TSMarch is completed, where d i denotes arbitrary data. Table I shows the fault-free status

3 1890 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 26, NO. 10, OCTOBER 2007 TABLE I FAULT-FREE STATUS OF AN 8-b WORD WHEN ATMARCH IS EXECUTED Fig. 1. Example of response-evaluation hardware for the ATMarch. of the word corresponding to each test operation while ATMarch is executed. Finally, the converted transparent word-oriented March (TWMarch) can be obtained by concatenating TSMarch with ATMarch. An example is given to explain the proposed transparent March test scheme further. Consider a bit-oriented March U [14]: { (w0); (r0, w1, r1, w0); (r0, w1); (r1, w0, r0, w1); (r1, w0)}. The March U is first transformed into a test with solid backgrounds, called SBMarch U. Then, SBMarch U is { (w0); (r0, w1, r1, w0); (r0, w1); (r1,w0,r0,w1); (r1, w0)}. Assume that a memory with 8-b words is tested. According to the transformation rules described in Algorithm 1, TSMarch U will be { (rd a0,wdā0,rdā0,wd a0 ); (rd a0,wdā0 ); (rdā0,wd a0, rd a0,wdā0 ); (rdā0,wd a0 )}, where a 0 = { }. After TSMarch is executed, the content of each word is equal to the original content of the word. Therefore, the added ATMarch is { (rd a0,wd a1,wdā1,rdā1,wd a1,rd a1,wd a2,wdā2,rdā2, wd a2,rd a2,wd a3,wdā3,rdā3,wd a3,rd a3,wd a0 )}, where a 1 = { }, a 2 = { }, anda 3 = { }. The test-time complexity of the transformed transparent word-oriented March U is 29N for testing a memory with 8-b words. B. Signature Prediction and Response Evaluation When a transparent test is used to test a RAM, the golden signature is obtained by only executing the Read operations of the transparent test. This read result is regarded as a reference result. These Read test operations are called a signature-prediction test. Once the transparent test is completed, the read result is compared with the reference result to determine whether the memory under test is fault-free. Consider a transparent word-oriented March test converted by Algorithm 1. The converted transparent test consists of TSMarch and ATMarch. The TSMarch can detect interword CFs covered by the original bit-oriented March test. To cover all the intraword CFs, including undetected faults, the ATMarch is used. Since the ATMarch is responsible for covering intraword CFs, an intraword CF in a word can be activated and detected by the Read/Write operations in ATMarch while ATMarch addresses the word. In comparison with the detection of interword CFs, an interword CF is activated and detected at different words or by different March elements. As Algorithm 1 depicts, the first Read operation of ATMarch reads the original data of the memory. Therefore, the Read data of the subsequent Read operations can be evaluated by comparing it with the Read data of the first Read operation. Therefore, ATMarch does not need a prediction test. In summary, only TSMarch needs a signature-prediction test. The signature-prediction test can be obtained by removing the Write operations of TSMarch. The response checking of ATMarch is accomplished by considering the read data of the first Read operation as Fig. 2. Conceptual diagram of the proposed transparent-test methodology for a memory with ECC. golden data. Then, the read data of the subsequent Read operations are compared with that golden data. Since the Read operations within a March element are completed in each addressed word, the read data of the first Read can be stored in a register temporarily and then compared with the data of the subsequent Read operations. An example is illustrated to further explain the response-checking scheme. Consider the transparent March U illustrated in the last paragraph of Section II-A. The signature-prediction algorithm is obtained by removing the Write operations of TSMarch U, and it is as follows: { (rd a0,rdā0 ); (rd a0 ); (rdā0,rd a0 ); (rdā0 )}, where a 0 = { }. Subsequently, the response checking for the ATMarch is described. The first Read operation rd a0 reads the data D a0, and the data are stored in a register. While the second Read operation rdā1 performs a Read operation and the Read data Dā1 are compared with D a0 ā 1,whereā 1 determines which bits of the register output should be inverted. In a similar way, the Read data of the subsequent Read operations are compared with D a0 a i (or ā i ). Fig. 1 depicts an example of response-evaluation hardware for the ATMarch. For more details, if the fourth Read operation (rdā2 ) is performed, the Read data are compared with D a0 ā 2. Assuming that the original data of a word are (d 7 d 6 d 5 d 4 d 3 d 2 d 1 d 0 ) before the ATMarch is performed. The data read by the first Read operation are D a0 =(d 7 d 6 d 5 d 4 d 3 d 2 d 1 d 0 ), and it is stored in the Register as shown in Fig. 1. Then, the data read by the rdā2 operation is compared with D a0 ā 2 =(d 7 d 6 d 5 d 4 d 3 d 2 d 1 d 0 ) ( ) = ( d 7 d6 d 5 d 4 d3 d2 d 1 d 0 )=Dā2. Since the ATMarch does not need the signature-prediction algorithm, the required time for the signature prediction of the proposed transparent-test methodology can drastically be reduced. Again, consider the converted transparent March U. As described above, only four March elements with six Read test operations are needed for the signature prediction. Thus, the test-time complexity is 6N for an N B-bit RAM. Compared with the transparent-test scheme reported in the study in [2], the test-time complexity for the signature prediction of the transparent March U is 6N (log 2 B +1).

4 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 26, NO. 10, OCTOBER Fig. 3. (a) Initial content of a 3 4-b RAM. (b) Content of the RAM while the second bit of W 0 has a stuck-at-zero fault. (c) Content of the RAM while transparent test is completed. III. PROPOSED TRANSPARENT-TEST METHODOLOGY FOR RAM WITH ECC Adding ECCs in each word of a RAM is one widely used approach to prevent these soft errors. Unfortunately, the ECC approach has two major weaknesses [12]. First, the effect of latent bit-error accumulation may occur at rarely accessed words. Second, the ECC cannot detect functional faults. Subsequently, we explain why ECC approaches have these two weaknesses in more detail. First, the ECC protects only these words within the memory that are accessed regularly. The rarely accessed words remain practically unprotected due to the accumulation of latent bit errors. Once the number of accumulated error bits in a word is greater than the protection capability of the applied ECC, the system operation will be affected while it reads the word. For example, ECCs with the capability of double-bit and singlebit error corrections are adopted. Then, the applied ECC will fail if a word has two accumulated errors. Second, the ECC only accounts for the integrity of stored data, but it cannot check memory functionality. To check if a memory has functional faults, a test must alter the content of the memory to activate and detect a latent fault. On the other hand, if only error-detecting codes are used for the memories, errordetection latency, which is defined as the time between the occurrence of an error and its detection, becomes yet another issue [15]. Error detection of a word is only possible while the word is read. For highreliability applications, such as in telecommunication switching, it is not acceptable to detect erroneous data at that very moment while the data are explicitly needed [16]. Errors should be detected as early as possible so that data can be recovered before being requested by the system. Therefore, we see that if periodic transparent testing can be integrated with the ECC, all the memory words can regularly be accessed and tested. Therefore, the effects of fault accumulation and error-detection latency can be minimized. Subsequently, the proposed transparent-test methodology for the memory with ECC is introduced. For brevity, we assume that the ECC is fault-free for the proposed transparent-test scheme. However, the transparent-test scheme can also work even when the ECC is faulty, if a specific approach is used to design the ECC, e.g., the approach reported in the study in [17]. Transformation rules for converting a given bit-oriented March test into a transparent word-oriented March test for the memory with ECC are the same as Algorithm 1. However, the proposed transparent-test methodology for the memory with ECC checks test responses using ECC results while a Read is executed. Thus, the signature-prediction phase is not needed. Detail of the Read/Write test operations of the converted transparent March tests for the memory with ECC are described as follows. Read Read the data D at data output (DO); check if Code_Gen(D) =C. Write Write the data ˆD a i. Here, Code_Gen(D) and C represent the ECC generated by the code-generation circuit with read data D and the stored ECC of D, respectively. In addition, ˆD denotes the corrected data on the output of the correction circuit. Fig. 2 depicts the concept of the proposed transparent-test methodology for a RAM with ECC. In the transparent-test mode (i.e., Test =1), the input of the code-generation circuit obtains the data D from DO. That is, while the transparent built-in self-test (BIST) executes a Read operation on a word, the ECC of the read data D is generated by the code-generation circuit. Then, the generated ECC is compared with the original ECC (C) of the word. If the comparison results in a mismatch, a fault is detected. Otherwise, no fault is detected. While the transparent BIST executes a Write operation, the written data are generated by performing the bitwise exclusive-or operation on the data from the output of the correction circuit, i.e., ˆD, and the corresponding data background a i determines those bits of the ˆD that are inverted. Therefore, even when the last Read operation detects a fault in the addressed word, the subsequent Write operation is able to write the corrected data into the addressed word. This can really achieve the goal of restoring the original content of the memory under test. Please note: it is valid only if the number of faulty bits of a word is less than the error-correction capability of the applied ECC. However, the data of the Write operation of the transparent test for the memory without ECC are obtained on the bitwise exclusive-or operation on the data of the previous Read operation and the data background a i. Thus, the transparent test for the memory without ECC successively inverts and reinverts the contents of the memory under test. This cannot restore the original content of the memory under test if the memory has suffered hard faults or soft faults during the testing process. An example is illustrated to explain the proposed transparent-test methodology for the memory with ECC in more detail. Consider a 3 4-b memory with Hamming ECC. The original content of the memory is shown in Fig. 3(a). In addition, assume that the MATS+ { (w0); (r0,w1); (r1,w0)} [18] test algorithm is used to test the memory. The Hamming code (h 2 h 1 h 0 ) of each word is achieved by h 2 = d 0 + d 1 + d 3, h 1 = d 1 + d 2 + d 3 and h 0 = d 0 + d 1 + d 2, where + is modulo-2 addition [19]. For simplicity, only the TSMarch of MATS+ is used for explanation. According to Algorithm 1, the bit-oriented MATS+ can be transformed into a transparent word-oriented March test TSMarch = { (rd a0,wdā0 ); (rdā0,wd a0 )}, wherea 0 = (0000). Let the second bit (d 1 ) of the first word (W 0 ) have a stuckat-zero fault. The Read operation of the first March element reads the content of the memory. Then, the Write operation of that same March element writes the complement of the read data into the memory under test. Therefore, the content of the memory under test is as shown in Fig. 3(b), while the first March element is completed. Subsequently, the Read operation of the second March element reads the data from W 2 to W 0. While W 0 is read, the Code_Gen(0010) = (111) and the Hamming ECC of W 0 is 100 (i.e., C =100). Since Code_Gen(D) C, the transparent BIST detects a fault in W 0. Then, the successive Write operation writes the data of the complement of corrected data (0110) into W 0. The final contents of the memory are now the same as its initial contents, as shown in Fig. 3(c). However, if the transparent test for the memory without ECC is used to test the memory, the content of the first word will be (1101) since the data of the last Write operation on W 0 is the complement of (0010). Note that the

5 1892 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 26, NO. 10, OCTOBER 2007 prerequisite that enables the capability of restoring the original content is that the number of faulty bits in a word may not exceed the correction capability of the applied ECC. Since the transparent-test method is to be used throughout the lifetime of a memory device, the number of faulty bits in a word usually is small. Therefore, the proposed transparent-test methodology for the memory with ECC is practical. Another feature of the proposed transparent-test methodology is the ability to detect fault location. Once a faulty word is detected, the location of the faulty bit can be determined from the result of Code_Gen(D) C [19]. Again, the fault-location capability is related to the applied ECC. The widely used Hamming code is used to show this. Assume that a 4-b word with data (d 3 d 2 d 1 d 0 ). If a faulty bit exists in the word, the faulty data bit is expressed as d i. The response checking is done by Code_Gen(D) C. Let the first bit of the word be the faulty bit, then the Code_Gen(D) for the word can be expressed as h 2 = d 0 + d 1 + d 3, h 1 = d 1 + d 2 + d 3,andh 0 = d 0 + d 1 + d 2. Therefore, the comparison result U = Code_Gen(D) C can be expressed as follows: u 2 = h 2 + h 2 =(d 0 + d 1 + d 3 )+(d 0 + d 1 + d 3 )=1 u 1 = h 1 + h 1 =(d 1 + d 2 + d 3 )+(d 1 + d 2 + d 3 )=0 u 0 = h 0 + h 0 =(d 0 + d 1 + d 2 )+(d 0 + d 1 + d 2 )=1. Thus, the comparison result U =(u 2 u 1 u 0 ) = (101) indicates that the first bit is faulty. In a similar manner, we can show that if the second, third, or the fourth bit is the faulty bit, the comparison result U is (111), (011), and (110), respectively. IV. ANALYSIS AND COMPARISON A. Time-ComplexityAnalysis and Comparison Consider an N B-bit memory and a bit-oriented March test with P Read/Write operations in which there are Q Read operations. Without loss of generality, we assume that the bit-oriented March does not have an initialization Write operation; the first operation in each March element is Read; and the last Write operation can restore the original content. In addition, we assume that B is power of two. As Algorithm 1 shows, the test-time complexity of the transformed transparent wordoriented March test (TCM) with respect to the bit-oriented March test can be calculated as follows: TCM =(P +5log 2 B +2)N.ThePN is for the TSMarch and (5 log 2 B +2)N is for the ATMarch. Since the signature prediction only is needed for the TSMarch, the test-time complexity of the corresponding signature-prediction test (TCP) for TSMarch is as follows: TCP = QN. Different transparent-test schemes have been reported [2], [4], [6], [8], [12], [20]. In [4], the proposed approach is for the testing of pattern-sensitive faults. In [6], the proposed approach is for the testing of single V-CFs and it adopts the transformation rules reported in the study in [2]. In [8], a symmetric transparent-test method is reported. However, only bit-oriented symmetric transparent March tests are discussed. In [20], an online and offline BIST architecture and selfadjusting signature-analysis scheme are reported. No transparent-test algorithms are presented. Thus, we compare the test-time complexity of the proposed transparent March tests with those transparent March tests reported in the study in [2] and [12], since the two works reported transformation rules and proposed transparent-test algorithms. These two works also discuss word-oriented transparent tests. The transparent-test scheme reported in the study in [2] transforms the bit-oriented March tests into transparent word-oriented March tests that execute the transformation in each bit of a word. Therefore, the TCM and TCP of the transparent word-oriented March test converted with the scheme reported in the study in [2] can be calculated as TABLE II COMPARISON OF DIFFERENT TRANSPARENT-TEST SCHEMES TCM = P (log 2 B +1)N and TCP = Q(log 2 B +1)N. TheTCM of the TOMT reported in the study in [12] is (4 + 8B)N. The TOMT is a transparent-test integrating ECC, so it does not need the signature-prediction test, i.e., TCP =0. The proposed transparent March test methodology for the memory with ECC does not also need the signature-prediction phase. Therefore, the test-time complexity of the proposed transparent March tests for the memory with ECC is (P +5log 2 B +2)N. Table II summarizes the comparison of TCM and TCP for each of the four transparent-test schemes discussed above. Here, TT without and TT with denote the proposed transparenttest methods for the memory without ECC and with ECC, respectively. Scheme 1 and TT without are used for memory without ECC. As shown in Table II, the total test-time complexity of Scheme 1 and TT without is (P + Q)log 2 BN +(P + Q)N and (P + Q)N + (5 log 2 B +2)N, respectively. Therefore, if (P + Q)log 2 BN (5 log 2 B +2)N, the test-time complexity of Scheme 1 is greater than TT without. This is true for most used March tests. In addition, the TT without has less test-time complexity compared with Scheme 2 [12] for most cases. For example, if March C is transformed into a transparent word-oriented March C for testing an N 32-b memory, then the test-time complexity (TCP + TCM) of Scheme 1 [2], Scheme 2 [12], TT without,andtt with is 84N, 260N, 41N,and36N, respectively. That is, the test-time complexity of TT without (TT with ) is only about 48.9% (42.9%) or 15.8% (13.8%) of that test-time complexity compared with the transparent word-oriented test converted by Scheme 1 or Scheme 2, respectively. Less testing time for transparent-test schemes is one important feature of this method, since the transparent test is done during system s idle time. If the testing time is greater than the idle time, the test process is interrupted or disturbed. Investigating the proposed transparent-test schemes further, they have another advantage in that the converted, transparent tests can be divided into separated portions, i.e., TSMarch and ATMarch as depicted in Algorithm 1. Thus, TSMarch and ATMarch can be used to test the memory in two different idle time slots. This further minimizes the probability of an interruption. The test length of TSMarch approaches that of the corresponding bit-oriented March test. In addition, the signatureprediction test is only needed for TSMarch. This reduces the time of signature prediction. Signature prediction is not needed for ATMarch, so the test length of ATMarch is (5 log 2 B +2)N. B. Comparison of Different Transparent-Test Schemes Previous works [2], [8], [12], [20] are compared with the proposed test methodologies. Table III summarizes the comparison results, where FL, FM, and SP represent fault location, fault masking, and signature prediction, respectively. As Table III shows, Scheme 2, Scheme 3, and TT with all are targeted for use with the memory with ECC. Scheme 3, in particular, is designed for DRAMs, since it hides the transparent testing in these memory-types refresh cycles. Scheme 2 and TT with can locate faulty cells while they detect a fault. Note that the proposed TT without has also partial fault-location capability, since the data of the first Read operation in ATMarch is compared with the data of the subsequent Read operations immediately while a word is accessed. Therefore, if the March element of ATMarch detects a fault, the position(s) of the faulty cell(s) can

6 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 26, NO. 10, OCTOBER TABLE III COMPARISON OF DIFFERENT TRANSPARENT-TEST SCHEMES be known from the comparison results (i.e., results of bitwise XOR operation on the read results). Only Scheme 2 and TT with do not have the problem of aliasing, since the other schemes use a signature analyzer to evaluate the test responses. Signature-prediction tests are needed for Scheme 1 and TT without.thett without only needs the signature-prediction test for the TSMarch. According to the discussions above, we see that the proposed transparent-test schemes TT without and TT with have the following features: low testing time, high fault-location capability, and low-cost signature-prediction test. But the proposed transparent test TT with has one limitation the fault-detecting capability is related to the correction capability of the applied ECC. The proposed TT with is still practical for conducting transparent testing. Since the transparent test is used for periodic testing of memory during its lifetime, the probability of that the number of faulty bits in a word larger than that of the error-correction capability of the applied ECC is low. V. C ONCLUSION Transparent testing is one efficient approach for enhancing the reliability of memory throughout the device lifetime. This paper has presented two transparent-test methodologies for memory, both without and with ECC. Analysis results show that the two transparenttest schemes have much lower test-time complexity compared with existing approaches. REFERENCES [1] M. Nicolaidis, Transparent BIST for RAMs, in Proc. ITC, 1992, pp [2] M. Nicolaidis, Theory of transparent BIST for RAMs, IEEE Trans. Comput., vol. 45, no. 10, pp , Oct [3] J. Sosnowski, In system transparent autodiagnostics of RAMs, in Proc. ITC, 1993, pp [4] V. Yarmolik and M. Karpovski, Transparent memory testing for patternsensitive faults, in Proc. ITC, 1994, pp [5] M. Karpovski and V. Yarmolik, Transparent memory BIST, in Proc. IEEE Int. Workshop MTDT, 1994, pp [6] B. F. Cockburn and Y. F. N. Sat, A transparent built-in self-test scheme for detecting single V-coupling faults in RAMs, in Proc. IEEE Int. Workshop MTDT, 1994, pp [7] B. F. Cockburn and Y. F. N. Sat, Synthesized transparent BIST for detecting scrambled pattern-sensitive faults in RAMs, in Proc. ITC, Oct. 1995, pp [8] V. N. Yarmolik and S. Hellebrand, Symmetric transparent BIST for RAMs, in Proc. Conf. DATE, 1999, pp [9] S. Demidenko, A. J. van de Goor, S. Henderson, and P. Knoppers, Simulation and development of short transparent tests for RAM, in Proc. IEEE ATS, 2001, pp [10] D.-C. Huang and W.-B. Jone, A parallel transparent BIST method for embedded memory arrays by tolerating redundant operations, IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., vol. 21, no. 5, pp , May [11] H.-S. Kim and S. Kang, DPSC SRAM transparent test algorithm, in Proc. IEEE ATS, 2002, pp [12] K. Thaller and A. Steininger, A transparent online memory test for simultaneous detection of functional faults and soft errors in memories, IEEE Trans. Rel., vol. 52, no. 4, pp , Dec [13] A. P. Zankovich, V. N. Yarmolik, and B. Sokol, Automatic generation of symmetric transparent March memory tests, in Proc. IEEE Int. CAD Syst. Microelectron., 2003, pp [14] A. J. van de Goor and G. N. Gaydadjiev, March U: A test for unlinked memory faults, Proc. Inst. Electr. Eng. Circuits Devices Syst., vol. 144, no. 3, pp , Jun [15] S. Hellebrand, H. Wunderlich, A. Ivaniuk, Y. Klimets, and V. N. Yarmolik, Error detecting refreshment for embedded DRAMs, in Proc. IEEE VTS, 1999, pp [16] S. Barbagailo, D. Medina, F. Corno, P. Prinetto, and M. S. Reorda, Integrating online and offline testing of a switching memory, IEEE Des. Test Comput., vol. 15, no. 1, pp , Jan. Mar [17] P. Ramanathan, K. K. Saluja, and M. Franklin, Testing check bits at no cost in RAMs with on-chip ECC, Proc. Inst. Electr. Eng., E, vol. 140, no. 6, pp , Nov [18] R. Nair, Comments on An optimal algorithm for testing stuck-at faults in random access memories, IEEE Trans. Comput., vol. C-28, no. 3, pp , Mar [19] B. W. Johnson, Design and Analysis of Fault Tolerant Digital Systems. Reading, MA: Addison-Wesley, [20] S. Hellebrand, H. Wunderlich, A. Ivaniuk, Y. Klimets, and V. N. Yarmolik, Efficient online and offline testing of embedded DRAMs, IEEE Trans. Comput., vol. 51, no. 7, pp , Jul Hierarchical Verification of Galois Field Circuits Debdeep Mukhopadhyay, Gaurav Sengar, and Dipanwita Roy Chowdhury Abstract This paper proposes a hierarchical method for the formal hardware verification of Galois field architecture circuits. The reduced ordered functional decision diagram has been explored. The proposed method has been found to lead to significant gains in time and space, depending on the resources that are available. The theoretical claims that were made have been supported by experiments. Index Terms Composite field, formal verification, functional decision diagrams (DDs), Galois fields, hierarchical, multipliers. I. INTRODUCTION Over the last thirty years, Galois fields [1] have gained widespread technical applications, such as algebraic codes, cryptographic schemes, digital signal processing, random number generators, and very large scale integration testing. Because of the large number of applications of communication systems, Galois field arithmetic circuits have become increasingly important. The high complexity of the arithmetic operations that are performed in these algorithms makes formal verification [2] of such circuits of utmost necessity. However, not much research has been reported on the verification of Galois field arithmetic operations. In the works [3] [5], a decision diagram (DD) named ordered functional diagram had been introduced and further Manuscript received June 19, 2006; revised November 27, This paper was recommended by Associate Editor V. Bertacco. D. Mukhopadhyay is with the Department of Computer Science and Engineering, Indian Institute of Technology, Madras , India ( debdeep@cse.iitm.ernet.in). G. Sengar and D. R. Chowdhury are with the Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur , India ( gaurav@cse.iitkgp.ernet.in; drc@cse.iitkgp.ernet.in.). Digital Object Identifier /TCAD /$ IEEE

An Efficient Parallel Transparent Diagnostic BIST

An Efficient Parallel Transparent Diagnostic BIST An Efficient Parallel Transparent Diagnostic BIST D. C. Huang and W. B. Jone Department of CS & IE, National Chung-Cheng University, Taiwan, R.O.C. Abstract- In this paper, we propose a new transparent

More information

TESTING OF FAULTS IN VLSI CIRCUITS USING ONLINE BIST TECHNIQUE BASED ON WINDOW OF VECTORS

TESTING OF FAULTS IN VLSI CIRCUITS USING ONLINE BIST TECHNIQUE BASED ON WINDOW OF VECTORS TESTING OF FAULTS IN VLSI CIRCUITS USING ONLINE BIST TECHNIQUE BASED ON WINDOW OF VECTORS Navaneetha Velammal M. 1, Nirmal Kumar P. 2 and Getzie Prija A. 1 1 Department of Electronics and Communications

More information

Online Testing of Word-oriented RAMs by an Accumulator-based Compaction Scheme in Symmetric Transparent Built-In Self Test (BIST)

Online Testing of Word-oriented RAMs by an Accumulator-based Compaction Scheme in Symmetric Transparent Built-In Self Test (BIST) Online Testing of Word-oriented RAMs by an Accumulator-based Compaction Scheme in Symmetric Transparent Built-In Self Test (BIST) Sharvani Yedulapuram #1, Chakradhar Adupa *2 # Electronics and Communication

More information

RAM Testing Algorithms for Detection Multiple Linked Faults

RAM Testing Algorithms for Detection Multiple Linked Faults RAM Testing Algorithms for Detection Multiple Linked Faults V.G. Mikitjuk, V.N. Yarmolik, A.J. van de Goor* Belorussian State Univ. of Informatics and Radioelectronics, P.Brovki 6, Minsk, Belarus *Delft

More information

Diagnostic Testing of Embedded Memories Using BIST

Diagnostic Testing of Embedded Memories Using BIST Diagnostic Testing of Embedded Memories Using BIST Timothy J. Bergfeld Dirk Niggemeyer Elizabeth M. Rudnick Center for Reliable and High-Performance Computing, University of Illinois 1308 West Main Street,

More information

Scalable Controller Based PMBIST Design For Memory Testability M. Kiran Kumar, G. Sai Thirumal, B. Nagaveni M.Tech (VLSI DESIGN)

Scalable Controller Based PMBIST Design For Memory Testability M. Kiran Kumar, G. Sai Thirumal, B. Nagaveni M.Tech (VLSI DESIGN) Scalable Controller Based PMBIST Design For Memory Testability M. Kiran Kumar, G. Sai Thirumal, B. Nagaveni M.Tech (VLSI DESIGN) Abstract With increasing design complexity in modern SOC design, many memory

More information

An Area-Efficient BIRA With 1-D Spare Segments

An Area-Efficient BIRA With 1-D Spare Segments 206 IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 26, NO. 1, JANUARY 2018 An Area-Efficient BIRA With 1-D Spare Segments Donghyun Kim, Hayoung Lee, and Sungho Kang Abstract The

More information

Fault Tolerant Prevention in FIFO Buffer of NOC Router

Fault Tolerant Prevention in FIFO Buffer of NOC Router Fault Tolerant Prevention in FIFO Buffer of NOC Router Varalakshmi Dandu 1, P. Annapurna Bai 2 Dept. of ECE, St.Mark Educational Society, Affiliated to JNTUA, AP, India 1 Assistant Professor, Dept. of

More information

Design and Implementation of Microcode based Built-in Self-Test for Fault Detection in Memory and its Repair

Design and Implementation of Microcode based Built-in Self-Test for Fault Detection in Memory and its Repair Design and Implementation of Microcode based Built-in Self-Test for Fault Detection in Memory and its Repair C. Padmini Assistant Professor(Sr.Grade), ECE Vardhaman college of Engineering, Hyderabad, INDIA

More information

A Universal Test Pattern Generator for DDR SDRAM *

A Universal Test Pattern Generator for DDR SDRAM * A Universal Test Pattern Generator for DDR SDRAM * Wei-Lun Wang ( ) Department of Electronic Engineering Cheng Shiu Institute of Technology Kaohsiung, Taiwan, R.O.C. wlwang@cc.csit.edu.tw used to detect

More information

Improving Memory Repair by Selective Row Partitioning

Improving Memory Repair by Selective Row Partitioning 200 24th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems Improving Memory Repair by Selective Row Partitioning Muhammad Tauseef Rab, Asad Amin Bawa, and Nur A. Touba Computer

More information

POWERFUL BISR DESIGN FOR EMBEDDED SRAM WITH SELECTABLE REDUNDANCY

POWERFUL BISR DESIGN FOR EMBEDDED SRAM WITH SELECTABLE REDUNDANCY POWERFUL BISR DESIGN FOR EMBEDDED SRAM WITH SELECTABLE REDUNDANCY 1 K Naveen, 2 AMaruthi Phanindra, 3 M Bhanu Venkatesh, 4 M Anil Kumar Dept. of Electronics and Communication Engineering, MLR Institute

More information

VERY large scale integration (VLSI) design for power

VERY large scale integration (VLSI) design for power IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 7, NO. 1, MARCH 1999 25 Short Papers Segmented Bus Design for Low-Power Systems J. Y. Chen, W. B. Jone, Member, IEEE, J. S. Wang,

More information

SRAM Delay Fault Modeling and Test Algorithm Development

SRAM Delay Fault Modeling and Test Algorithm Development SRAM Delay Fault Modeling and Test Algorithm Development Rei-Fu Huang, Yan-Ting Lai, Yung-Fa Chou, and Cheng-Wen Wu Laboratory for Reliable Computing (LaRC) Department of Electrical Engineering National

More information

Applying March Tests to K-Way Set-Associative Cache Memories

Applying March Tests to K-Way Set-Associative Cache Memories 13th European Test Symposium Applying March Tests to K-Way Set-Associative Cache Memories Simone Alpe, Stefano Di Carlo, Paolo Prinetto, Alessandro Savino Politecnico di Torino, Dep. of Control and Computer

More information

AN EFFICIENT DESIGN OF VLSI ARCHITECTURE FOR FAULT DETECTION USING ORTHOGONAL LATIN SQUARES (OLS) CODES

AN EFFICIENT DESIGN OF VLSI ARCHITECTURE FOR FAULT DETECTION USING ORTHOGONAL LATIN SQUARES (OLS) CODES AN EFFICIENT DESIGN OF VLSI ARCHITECTURE FOR FAULT DETECTION USING ORTHOGONAL LATIN SQUARES (OLS) CODES S. SRINIVAS KUMAR *, R.BASAVARAJU ** * PG Scholar, Electronics and Communication Engineering, CRIT

More information

An Advanced and more Efficient Built-in Self-Repair Strategy for Embedded SRAM with Selectable Redundancy

An Advanced and more Efficient Built-in Self-Repair Strategy for Embedded SRAM with Selectable Redundancy An Advanced and more Efficient Built-in Self-Repair Strategy for Embedded SRAM with Selectable Redundancy A. Sharone Michael.1 #1, K.Sivanna.2 #2 #1. M.tech student Dept of Electronics and Communication,

More information

A Survey on Dram Testing and Its Algorithms

A Survey on Dram Testing and Its Algorithms RESEARCH ARTICLE OPEN ACCESS A Survey on Dram Testing and Its Algorithms K.Manju Priya 1, M. Menaka 2 Research Scholar 1, Assistant professor 2 ECE Department (ME VLSI DESIGN) SVS College of Engineering,

More information

An Integrated Built-in Test and Repair Approach for Memories with 2D Redundancy

An Integrated Built-in Test and Repair Approach for Memories with 2D Redundancy An Integrated Built-in Test and Repair Approach for Memories with 2D Redundancy Philipp Öhler and Sybille Hellebrand University of Paderborn Germany {oehler,hellebrand}@uni-paderborn.de Hans-Joachim Wunderlich

More information

DUE to the high computational complexity and real-time

DUE to the high computational complexity and real-time IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 15, NO. 3, MARCH 2005 445 A Memory-Efficient Realization of Cyclic Convolution and Its Application to Discrete Cosine Transform Hun-Chen

More information

An enhanced barrel shifter based BIST scheme for word organized RAMs (EBBSR).

An enhanced barrel shifter based BIST scheme for word organized RAMs (EBBSR). An enhanced barrel shifter based BIST scheme for word organized RAMs (EBBSR). M.leela vinoth krishnan Depatment of Electronics and Communication, CEG-Anna university, Chennai, INDIA. Krishnan7_ece@yahoo.co.in.

More information

Efficient Implementation of Single Error Correction and Double Error Detection Code with Check Bit Precomputation

Efficient Implementation of Single Error Correction and Double Error Detection Code with Check Bit Precomputation http://dx.doi.org/10.5573/jsts.2012.12.4.418 JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, VOL.12, NO.4, DECEMBER, 2012 Efficient Implementation of Single Error Correction and Double Error Detection

More information

Available online at ScienceDirect. Procedia Technology 25 (2016 )

Available online at  ScienceDirect. Procedia Technology 25 (2016 ) Available online at www.sciencedirect.com ScienceDirect Procedia Technology 25 (2016 ) 544 551 Global Colloquium in Recent Advancement and Effectual Researches in Engineering, Science and Technology (RAEREST

More information

Efficient BISR strategy for Embedded SRAM with Selectable Redundancy using MARCH SS algorithm. P. Priyanka 1 and J. Lingaiah 2

Efficient BISR strategy for Embedded SRAM with Selectable Redundancy using MARCH SS algorithm. P. Priyanka 1 and J. Lingaiah 2 Proceedings of International Conference on Emerging Trends in Engineering & Technology (ICETET) 29th - 30 th September, 2014 Warangal, Telangana, India (SF0EC009) ISSN (online): 2349-0020 Efficient BISR

More information

Efficient Majority Logic Fault Detector/Corrector Using Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes

Efficient Majority Logic Fault Detector/Corrector Using Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes Efficient Majority Logic Fault Detector/Corrector Using Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes 1 U.Rahila Begum, 2 V. Padmajothi 1 PG Student, 2 Assistant Professor 1 Department Of

More information

Modeling and Simulation of Microcode-based Built-In Self Test for Multi-Operation Memory Test Algorithms

Modeling and Simulation of Microcode-based Built-In Self Test for Multi-Operation Memory Test Algorithms IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3,. 2, May 2010 36 Modeling and Simulation of Microcode-based Built-In Self Test for Multi-Operation Memory Test Algorithms Dr. R.K.

More information

AN OPTIMAL APPROACH FOR TESTING EMBEDDED MEMORIES IN SOCS

AN OPTIMAL APPROACH FOR TESTING EMBEDDED MEMORIES IN SOCS International Journal of Engineering Inventions ISSN: 2278-7461, www.ijeijournal.com Volume 1, Issue 8 (October2012) PP: 76-80 AN OPTIMAL APPROACH FOR TESTING EMBEDDED MEMORIES IN SOCS B.Prathap Reddy

More information

Jin-Fu Li. Department of Electrical Engineering National Central University Jhongli, Taiwan

Jin-Fu Li. Department of Electrical Engineering National Central University Jhongli, Taiwan Yield eda and Reliability- Enhancement Techniques for Random Access Memories Jin-Fu Li Advanced d Reliable Systems (ARES) Lab. Department of Electrical Engineering National Central University Jhongli,

More information

An Integrated ECC and BISR Scheme for Error Correction in Memory

An Integrated ECC and BISR Scheme for Error Correction in Memory An Integrated ECC and BISR Scheme for Error Correction in Memory Shabana P B 1, Anu C Kunjachan 2, Swetha Krishnan 3 1 PG Student [VLSI], Dept. of ECE, Viswajyothy College Of Engineering & Technology,

More information

International Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)

International Journal of Digital Application & Contemporary research Website:   (Volume 1, Issue 7, February 2013) Programmable FSM based MBIST Architecture Sonal Sharma sonal.sharma30@gmail.com Vishal Moyal vishalmoyal@gmail.com Abstract - SOCs comprise of wide range of memory modules so it is not possible to test

More information

3D Memory Formed of Unrepairable Memory Dice and Spare Layer

3D Memory Formed of Unrepairable Memory Dice and Spare Layer 3D Memory Formed of Unrepairable Memory Dice and Spare Layer Donghyun Han, Hayoug Lee, Seungtaek Lee, Minho Moon and Sungho Kang, Senior Member, IEEE Dept. Electrical and Electronics Engineering Yonsei

More information

Index Terms FIFO buffers, in-field test, NOC, permanent fault, transparent test. On Line Faults in FIFO Buffers of NOC Routers 1.

Index Terms FIFO buffers, in-field test, NOC, permanent fault, transparent test. On Line Faults in FIFO Buffers of NOC Routers 1. On Line Faults in FIFO Buffers of NOC Routers 1 BALIREDDY MOUNIKA, 2 JENNE HANUMANTHU, 3 G. NAGESHAM 1 PG Scholar, Dept. of ECE, GATES Institute of Technology, Gooty, Anantapuramu, AP, India 2 Associate

More information

Error Detection and Correction by using Bloom Filters R. Prem Kumar, Smt. V. Annapurna

Error Detection and Correction by using Bloom Filters R. Prem Kumar, Smt. V. Annapurna Error Detection and Correction by using Bloom Filters R. Prem Kumar, Smt. V. Annapurna Abstract---Bloom filters (BFs) provide a fast and efficient way to check whether a given element belongs to a set.

More information

Scan-Based BIST Diagnosis Using an Embedded Processor

Scan-Based BIST Diagnosis Using an Embedded Processor Scan-Based BIST Diagnosis Using an Embedded Processor Kedarnath J. Balakrishnan and Nur A. Touba Computer Engineering Research Center Department of Electrical and Computer Engineering University of Texas

More information

Near Optimal Repair Rate Built-in Redundancy Analysis with Very Small Hardware Overhead

Near Optimal Repair Rate Built-in Redundancy Analysis with Very Small Hardware Overhead Near Optimal Repair Rate Built-in Redundancy Analysis with Very Small Hardware Overhead Woosung Lee, Keewon Cho, Jooyoung Kim, and Sungho Kang Department of Electrical & Electronic Engineering, Yonsei

More information

In-Field Test for Permanent Faults in FIFO Buffers of NoC Routers

In-Field Test for Permanent Faults in FIFO Buffers of NoC Routers IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 24, NO. 1, JANUARY 2016 393 In-Field Test for Permanent Faults in FIFO Buffers of NoC Routers Bibhas Ghoshal, Kanchan Manna, Santanu

More information

Complex test pattern generation for high speed fault diagnosis in Embedded SRAM

Complex test pattern generation for high speed fault diagnosis in Embedded SRAM Complex test pattern generation for high speed fault diagnosis in Embedded SRAM 1 Prasanna Kumari P., 2 Satyanarayana S. V. V., 3 Nagireddy S. 1, 3 Associate professor, 2 Master of Engineering, Teegala

More information

RE-CONFIGURABLE BUILT IN SELF REPAIR AND REDUNDANCY MECHANISM FOR RAM S IN SOCS Ravichander Bogam 1, M.Srinivasa Reddy 2 1

RE-CONFIGURABLE BUILT IN SELF REPAIR AND REDUNDANCY MECHANISM FOR RAM S IN SOCS Ravichander Bogam 1, M.Srinivasa Reddy 2 1 RE-CONFIGURABLE BUILT IN SELF REPAIR AND REDUNDANCY MECHANISM FOR RAM S IN SOCS Ravichander Bogam 1, M.Srinivasa Reddy 2 1 Department of Electronics and Communication Engineering St. Martins Engineering

More information

DETECTION AND CORRECTION OF CELL UPSETS USING MODIFIED DECIMAL MATRIX

DETECTION AND CORRECTION OF CELL UPSETS USING MODIFIED DECIMAL MATRIX DETECTION AND CORRECTION OF CELL UPSETS USING MODIFIED DECIMAL MATRIX ENDREDDY PRAVEENA 1 M.T.ech Scholar ( VLSID), Universal College Of Engineering & Technology, Guntur, A.P M. VENKATA SREERAJ 2 Associate

More information

6T- SRAM for Low Power Consumption. Professor, Dept. of ExTC, PRMIT &R, Badnera, Amravati, Maharashtra, India 1

6T- SRAM for Low Power Consumption. Professor, Dept. of ExTC, PRMIT &R, Badnera, Amravati, Maharashtra, India 1 6T- SRAM for Low Power Consumption Mrs. J.N.Ingole 1, Ms.P.A.Mirge 2 Professor, Dept. of ExTC, PRMIT &R, Badnera, Amravati, Maharashtra, India 1 PG Student [Digital Electronics], Dept. of ExTC, PRMIT&R,

More information

Modeling and Simulation of Multi-Operation Microcode-based Built-in Self Test for Memory Fault Detection and Repair

Modeling and Simulation of Multi-Operation Microcode-based Built-in Self Test for Memory Fault Detection and Repair Modeling and Simulation of Multi-Operation Microcode-based Built-in Self Test for Memory Fault Detection and Repair Dr. R.K. Sharma and Aditi Sood Abstract As embedded memory area on-chip is increasing

More information

Design and Implementation of CVNS Based Low Power 64-Bit Adder

Design and Implementation of CVNS Based Low Power 64-Bit Adder Design and Implementation of CVNS Based Low Power 64-Bit Adder Ch.Vijay Kumar Department of ECE Embedded Systems & VLSI Design Vishakhapatnam, India Sri.Sagara Pandu Department of ECE Embedded Systems

More information

A Proposed RAISIN for BISR for RAM s with 2D Redundancy

A Proposed RAISIN for BISR for RAM s with 2D Redundancy A Proposed RAISIN for BISR for RAM s with 2D Redundancy Vadlamani Sai Shivoni MTech Student Department of ECE Malla Reddy College of Engineering and Technology Anitha Patibandla, MTech (PhD) Associate

More information

THE orthogonal frequency-division multiplex (OFDM)

THE orthogonal frequency-division multiplex (OFDM) 26 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 57, NO. 1, JANUARY 2010 A Generalized Mixed-Radix Algorithm for Memory-Based FFT Processors Chen-Fong Hsiao, Yuan Chen, Member, IEEE,

More information

Reliability of Memory Storage System Using Decimal Matrix Code and Meta-Cure

Reliability of Memory Storage System Using Decimal Matrix Code and Meta-Cure Reliability of Memory Storage System Using Decimal Matrix Code and Meta-Cure Iswarya Gopal, Rajasekar.T, PG Scholar, Sri Shakthi Institute of Engineering and Technology, Coimbatore, Tamil Nadu, India Assistant

More information

[Kalyani*, 4.(9): September, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785

[Kalyani*, 4.(9): September, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY SYSTEMATIC ERROR-CORRECTING CODES IMPLEMENTATION FOR MATCHING OF DATA ENCODED M.Naga Kalyani*, K.Priyanka * PG Student [VLSID]

More information

Efficient Built In Self Repair Strategy for Embedded SRAM with selectable redundancy

Efficient Built In Self Repair Strategy for Embedded SRAM with selectable redundancy Efficient Built In Self Repair Strategy for Embedded SRAM with selectable redundancy *GUDURU MALLIKARJUNA **Dr. P. V.N.REDDY * (ECE, GPCET, Kurnool. E-Mailid:mallikarjuna3806@gmail.com) ** (Professor,

More information

CALCULATION OF POWER CONSUMPTION IN 7 TRANSISTOR SRAM CELL USING CADENCE TOOL

CALCULATION OF POWER CONSUMPTION IN 7 TRANSISTOR SRAM CELL USING CADENCE TOOL CALCULATION OF POWER CONSUMPTION IN 7 TRANSISTOR SRAM CELL USING CADENCE TOOL Shyam Akashe 1, Ankit Srivastava 2, Sanjay Sharma 3 1 Research Scholar, Deptt. of Electronics & Comm. Engg., Thapar Univ.,

More information

Analysis of 8T SRAM Cell Using Leakage Reduction Technique

Analysis of 8T SRAM Cell Using Leakage Reduction Technique Analysis of 8T SRAM Cell Using Leakage Reduction Technique Sandhya Patel and Somit Pandey Abstract The purpose of this manuscript is to decrease the leakage current and a memory leakage power SRAM cell

More information

Minimizing Power Dissipation during Write Operation to Register Files

Minimizing Power Dissipation during Write Operation to Register Files Minimizing Power Dissipation during Operation to Register Files Abstract - This paper presents a power reduction mechanism for the write operation in register files (RegFiles), which adds a conditional

More information

Reliable Physical Unclonable Function based on Asynchronous Circuits

Reliable Physical Unclonable Function based on Asynchronous Circuits Reliable Physical Unclonable Function based on Asynchronous Circuits Kyung Ki Kim Department of Electronic Engineering, Daegu University, Gyeongbuk, 38453, South Korea. E-mail: kkkim@daegu.ac.kr Abstract

More information

Built-in Self-repair Mechanism for Embedded Memories using Totally Self-checking Logic

Built-in Self-repair Mechanism for Embedded Memories using Totally Self-checking Logic International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 361-370 International Research Publications House http://www. irphouse.com /ijict.htm Built-in

More information

An Integrated ECC and Redundancy Repair Scheme for Memory Reliability Enhancement

An Integrated ECC and Redundancy Repair Scheme for Memory Reliability Enhancement An Integrated ECC and Redundancy Repair Scheme for Memory Reliability Enhancement Chin-LungSu,Yi-TingYeh,andCheng-WenWu Laboratory for Reliable Computing (LaRC) Department of Electrical Engineering National

More information

Modeling And Simulation Of Microcode Based Asynchronous Memory Built In Self Test For Fault Detection Using Verilog

Modeling And Simulation Of Microcode Based Asynchronous Memory Built In Self Test For Fault Detection Using Verilog Modeling And Simulation Of Microcode Based Asynchronous Memory Built In Self Test For Fault Detection Using Verilog Amruta P. Auradkar # and Dr. R. B. Shettar * # M.Tech.,2 nd year, Digital Electronics,

More information

LOW POWER SRAM CELL WITH IMPROVED RESPONSE

LOW POWER SRAM CELL WITH IMPROVED RESPONSE LOW POWER SRAM CELL WITH IMPROVED RESPONSE Anant Anand Singh 1, A. Choubey 2, Raj Kumar Maddheshiya 3 1 M.tech Scholar, Electronics and Communication Engineering Department, National Institute of Technology,

More information

THE turbo code is one of the most attractive forward error

THE turbo code is one of the most attractive forward error IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 63, NO. 2, FEBRUARY 2016 211 Memory-Reduced Turbo Decoding Architecture Using NII Metric Compression Youngjoo Lee, Member, IEEE, Meng

More information

On-Line Error Detecting Constant Delay Adder

On-Line Error Detecting Constant Delay Adder On-Line Error Detecting Constant Delay Adder Whitney J. Townsend and Jacob A. Abraham Computer Engineering Research Center The University of Texas at Austin whitney and jaa @cerc.utexas.edu Parag K. Lala

More information

INTERNATIONAL JOURNAL OF PROFESSIONAL ENGINEERING STUDIES Volume 9 /Issue 3 / OCT 2017

INTERNATIONAL JOURNAL OF PROFESSIONAL ENGINEERING STUDIES Volume 9 /Issue 3 / OCT 2017 Design of Low Power Adder in ALU Using Flexible Charge Recycling Dynamic Circuit Pallavi Mamidala 1 K. Anil kumar 2 mamidalapallavi@gmail.com 1 anilkumar10436@gmail.com 2 1 Assistant Professor, Dept of

More information

CRYPTOGRAPHIC devices are widely used in applications

CRYPTOGRAPHIC devices are widely used in applications 1036 IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 20, NO. 6, JUNE 2012 Secure Multipliers Resilient to Strong Fault-Injection Attacks Using Multilinear Arithmetic Codes Zhen Wang,

More information

Built-in Self-Test and Repair (BISTR) Techniques for Embedded RAMs

Built-in Self-Test and Repair (BISTR) Techniques for Embedded RAMs Built-in Self-Test and Repair (BISTR) Techniques for Embedded RAMs Shyue-Kung Lu and Shih-Chang Huang Department of Electronic Engineering Fu Jen Catholic University Hsinchuang, Taipei, Taiwan 242, R.O.C.

More information

Majority Logic Decoding Of Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes

Majority Logic Decoding Of Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes Majority Logic Decoding Of Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes P. Kalai Mani, V. Vishnu Prasath PG Student, Department of Applied Electronics, Sri Subramanya College of Engineering

More information

Implementation of Ripple Carry and Carry Skip Adders with Speed and Area Efficient

Implementation of Ripple Carry and Carry Skip Adders with Speed and Area Efficient ISSN (Online) : 2278-1021 Implementation of Ripple Carry and Carry Skip Adders with Speed and Area Efficient PUSHPALATHA CHOPPA 1, B.N. SRINIVASA RAO 2 PG Scholar (VLSI Design), Department of ECE, Avanthi

More information

A Parametric Design of a Built-in Self-Test FIFO Embedded Memory

A Parametric Design of a Built-in Self-Test FIFO Embedded Memory A Parametric Design of a Built-in Self-Test FIFO Embedded Memory S. Barbagallo, M. Lobetti Bodoni, D. Medina G. De Blasio, M. Ferloni, F.Fummi, D. Sciuto DSRC Dipartimento di Elettronica e Informazione

More information

Exploiting Unused Spare Columns to Improve Memory ECC

Exploiting Unused Spare Columns to Improve Memory ECC 2009 27th IEEE VLSI Test Symposium Exploiting Unused Spare Columns to Improve Memory ECC Rudrajit Datta and Nur A. Touba Computer Engineering Research Center Department of Electrical and Computer Engineering

More information

Online and Offline BIST in IP-Core Design

Online and Offline BIST in IP-Core Design International Test Conference Online and Offline BIST in IP-Core Design Alfredo Benso, Silvia Chiusano, Giorgio Di Natale, and Paolo Prinetto Politecnico di Torino Monica Lobetti Bodoni Siemens Information

More information

ISSN Vol.04,Issue.01, January-2016, Pages:

ISSN Vol.04,Issue.01, January-2016, Pages: WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.01, January-2016, Pages:0077-0082 Implementation of Data Encoding and Decoding Techniques for Energy Consumption Reduction in NoC GORANTLA CHAITHANYA 1, VENKATA

More information

On combining chase-2 and sum-product algorithms for LDPC codes

On combining chase-2 and sum-product algorithms for LDPC codes University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2012 On combining chase-2 and sum-product algorithms

More information

LPRAM: A Novel Low-Power High-Performance RAM Design With Testability and Scalability. Subhasis Bhattacharjee and Dhiraj K. Pradhan, Fellow, IEEE

LPRAM: A Novel Low-Power High-Performance RAM Design With Testability and Scalability. Subhasis Bhattacharjee and Dhiraj K. Pradhan, Fellow, IEEE IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 23, NO. 5, MAY 2004 637 LPRAM: A Novel Low-Power High-Performance RAM Design With Testability and Scalability Subhasis

More information

Transparent Memory BIST*

Transparent Memory BIST* Transparent Memory BIST* M. G. Karpovsky V. N. Yarmolik Dep. Elec., Comp. & Syst. Eng. College of Eng., Boston University Boston, MA 02215, USA Computer Science Dep. Minsk Radio Eng. Inst., Minsk, 220027,

More information

HDL IMPLEMENTATION OF SRAM BASED ERROR CORRECTION AND DETECTION USING ORTHOGONAL LATIN SQUARE CODES

HDL IMPLEMENTATION OF SRAM BASED ERROR CORRECTION AND DETECTION USING ORTHOGONAL LATIN SQUARE CODES HDL IMPLEMENTATION OF SRAM BASED ERROR CORRECTION AND DETECTION USING ORTHOGONAL LATIN SQUARE CODES (1) Nallaparaju Sneha, PG Scholar in VLSI Design, (2) Dr. K. Babulu, Professor, ECE Department, (1)(2)

More information

Design of Low Power Digital CMOS Comparator

Design of Low Power Digital CMOS Comparator Design of Low Power Digital CMOS Comparator 1 A. Ramesh, 2 A.N.P.S Gupta, 3 D.Raghava Reddy 1 Student of LSI&ES, 2 Assistant Professor, 3 Associate Professor E.C.E Department, Narasaraopeta Institute of

More information

VLSI Architecture to Detect/Correct Errors in Motion Estimation Using Biresidue Codes

VLSI Architecture to Detect/Correct Errors in Motion Estimation Using Biresidue Codes VLSI Architecture to Detect/Correct Errors in Motion Estimation Using Biresidue Codes Harsha Priya. M 1, Jyothi Kamatam 2, Y. Aruna Suhasini Devi 3 1,2 Assistant Professor, 3 Associate Professor, Department

More information

Carry-Free Radix-2 Subtractive Division Algorithm and Implementation of the Divider

Carry-Free Radix-2 Subtractive Division Algorithm and Implementation of the Divider Tamkang Journal of Science and Engineering, Vol. 3, No., pp. 29-255 (2000) 29 Carry-Free Radix-2 Subtractive Division Algorithm and Implementation of the Divider Jen-Shiun Chiang, Hung-Da Chung and Min-Show

More information

DYNAMIC CIRCUIT TECHNIQUE FOR LOW- POWER MICROPROCESSORS Kuruva Hanumantha Rao 1 (M.tech)

DYNAMIC CIRCUIT TECHNIQUE FOR LOW- POWER MICROPROCESSORS Kuruva Hanumantha Rao 1 (M.tech) DYNAMIC CIRCUIT TECHNIQUE FOR LOW- POWER MICROPROCESSORS Kuruva Hanumantha Rao 1 (M.tech) K.Prasad Babu 2 M.tech (Ph.d) hanumanthurao19@gmail.com 1 kprasadbabuece433@gmail.com 2 1 PG scholar, VLSI, St.JOHNS

More information

Design and Simulation of Low Power 6TSRAM and Control its Leakage Current Using Sleepy Keeper Approach in different Topology

Design and Simulation of Low Power 6TSRAM and Control its Leakage Current Using Sleepy Keeper Approach in different Topology Vol. 3, Issue. 3, May.-June. 2013 pp-1475-1481 ISSN: 2249-6645 Design and Simulation of Low Power 6TSRAM and Control its Leakage Current Using Sleepy Keeper Approach in different Topology Bikash Khandal,

More information

Evaluation of FPGA Resources for Built-In Self-Test of Programmable Logic Blocks

Evaluation of FPGA Resources for Built-In Self-Test of Programmable Logic Blocks Evaluation of FPGA Resources for Built-In Self-Test of Programmable Logic Blocks Charles Stroud, Ping Chen, Srinivasa Konala, Dept. of Electrical Engineering University of Kentucky and Miron Abramovici

More information

Low Power Cache Design. Angel Chen Joe Gambino

Low Power Cache Design. Angel Chen Joe Gambino Low Power Cache Design Angel Chen Joe Gambino Agenda Why is low power important? How does cache contribute to the power consumption of a processor? What are some design challenges for low power caches?

More information

@ 2014 SEMAR GROUPS TECHNICAL SOCIETY.

@ 2014 SEMAR GROUPS TECHNICAL SOCIETY. www.semargroup.org, www.ijsetr.com ISSN 2319-8885 Vol.03,Issue.02, February-2014, Pages:0350-0355 Performance Improvement in Fault Detection Schemes for the Advanced Encryption Standard Using Composite

More information

A Built-In Redundancy-Analysis Scheme for RAMs with 2D Redundancy Using 1D Local Bitmap

A Built-In Redundancy-Analysis Scheme for RAMs with 2D Redundancy Using 1D Local Bitmap A Built-In Redundancy-Analysis Scheme for RAMs with D Redundancy Using D Local Bitmap Tsu-Wei Tseng, Jin-Fu Li, and Da-Ming Chang Advanced Reliable Systems (ARES) Laboratory Department of Electrical Engineering

More information

A Combined Encryption Compression Scheme Using Chaotic Maps

A Combined Encryption Compression Scheme Using Chaotic Maps BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, No 2 Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0016 A Combined Encryption Compression

More information

DESIGN OF PARAMETER EXTRACTOR IN LOW POWER PRECOMPUTATION BASED CONTENT ADDRESSABLE MEMORY

DESIGN OF PARAMETER EXTRACTOR IN LOW POWER PRECOMPUTATION BASED CONTENT ADDRESSABLE MEMORY DESIGN OF PARAMETER EXTRACTOR IN LOW POWER PRECOMPUTATION BASED CONTENT ADDRESSABLE MEMORY Saroja pasumarti, Asst.professor, Department Of Electronics and Communication Engineering, Chaitanya Engineering

More information

Test Resource Reused Debug Scheme to Reduce the Post-Silicon Debug Cost

Test Resource Reused Debug Scheme to Reduce the Post-Silicon Debug Cost IEEE TRANSACTIONS ON COMPUTERS, VOL. 67, NO. 12, DECEMBER 2018 1835 Test Resource Reused Debug Scheme to Reduce the Post-Silicon Debug Cost Inhyuk Choi, Hyunggoy Oh, Young-Woo Lee, and Sungho Kang, Senior

More information

/$ IEEE

/$ IEEE IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 56, NO. 1, JANUARY 2009 81 Bit-Level Extrinsic Information Exchange Method for Double-Binary Turbo Codes Ji-Hoon Kim, Student Member,

More information

Test/Repair Area Overhead Reduction for Small Embedded SRAMs

Test/Repair Area Overhead Reduction for Small Embedded SRAMs Test/Repair Area Overhead Reduction for Small Embedded SRAMs Baosheng Wang and Qiang Xu ATI Technologies Inc., 1 Commerce Valley Drive East, Markham, ON, Canada L3T 7X6, bawang@ati.com Dept. of Computer

More information

Block Sparse and Addressing for Memory BIST Application

Block Sparse and Addressing for Memory BIST Application Block Sparse and Addressing for Memory BIST Application Mohammed Altaf Ahmed 1, D Elizabath Rani 2 and Syed Abdul Sattar 3 1 Dept. of Electronics & Communication Engineering, GITAM Institute of Technology,

More information

Content Addressable Memory performance Analysis using NAND Structure FinFET

Content Addressable Memory performance Analysis using NAND Structure FinFET Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 12, Number 1 (2016), pp. 1077-1084 Research India Publications http://www.ripublication.com Content Addressable Memory performance

More information

Advanced Reliable Systems (ARES) Laboratory. National Central University Jhongli, Taiwan

Advanced Reliable Systems (ARES) Laboratory. National Central University Jhongli, Taiwan Chapter 7 Memory Testing Jin-Fu Li Advanced Reliable Systems (ARES) Laboratory Department of Electrical Engineering National Central University Jhongli, Taiwan Outline Importance of Embedded Memories RAM

More information

Diagnostic Data Compression Techniques for Embedded Memories with Built-In Self-Test

Diagnostic Data Compression Techniques for Embedded Memories with Built-In Self-Test JOURNAL OF ELECTRONIC TESTING: Theory and Applications 18, 515 527, 2002 c 2002 Kluwer Academic Publishers. Manufactured in The Netherlands. Diagnostic Data Compression Techniques for Embedded Memories

More information

March Tests Improvement for Address Decoder Open and Resistive Open Fault Detection *

March Tests Improvement for Address Decoder Open and Resistive Open Fault Detection * March Tests Improvement for Address Decoder Open and Resistive Open Fault Detection * Luigi Dilillo Patrick Girard Serge Pravossoudovitch Arnaud Virazel Laboratoire d Informatique, de Robotique et de Microélectronique

More information

Implementation of Efficient Ternary Content Addressable Memory by Using Butterfly Technique

Implementation of Efficient Ternary Content Addressable Memory by Using Butterfly Technique International journal of scientific and technical research in engineering (IJSTRE) www.ijstre.com Volume 1 Issue 5 ǁ August 2016. Implementation of Efficient Ternary Content Addressable Memory by Using

More information

A Low-Cost Correction Algorithm for Transient Data Errors

A Low-Cost Correction Algorithm for Transient Data Errors A Low-Cost Correction Algorithm for Transient Data Errors Aiguo Li, Bingrong Hong School of Computer Science and Technology Harbin Institute of Technology, Harbin 150001, China liaiguo@hit.edu.cn Introduction

More information

High Speed Fault Injection Tool (FITO) Implemented With VHDL on FPGA For Testing Fault Tolerant Designs

High Speed Fault Injection Tool (FITO) Implemented With VHDL on FPGA For Testing Fault Tolerant Designs Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2894-2900 ISSN: 2249-6645 High Speed Fault Injection Tool (FITO) Implemented With VHDL on FPGA For Testing Fault Tolerant Designs M. Reddy Sekhar Reddy, R.Sudheer Babu

More information

Using Error Detection Codes to detect fault attacks on Symmetric Key Ciphers

Using Error Detection Codes to detect fault attacks on Symmetric Key Ciphers Using Error Detection Codes to detect fault attacks on Symmetric Key Ciphers Israel Koren Department of Electrical and Computer Engineering Univ. of Massachusetts, Amherst, MA collaborating with Luca Breveglieri,

More information

A Low-Power ECC Check Bit Generator Implementation in DRAMs

A Low-Power ECC Check Bit Generator Implementation in DRAMs 252 SANG-UHN CHA et al : A LOW-POWER ECC CHECK BIT GENERATOR IMPLEMENTATION IN DRAMS A Low-Power ECC Check Bit Generator Implementation in DRAMs Sang-Uhn Cha *, Yun-Sang Lee **, and Hongil Yoon * Abstract

More information

Design and Implementation of Online BIST for Different Word Sizes of Memories MUNEERA JAMAL 1, K. PADMAJA DEVI 2

Design and Implementation of Online BIST for Different Word Sizes of Memories MUNEERA JAMAL 1, K. PADMAJA DEVI 2 www.semargroup.org, www.ijsetr.com ISSN 2319-8885 Vol.03,Issue.13 June-2014, Pages:2858-2863 Design and Implementation of Online BIST for Different Word Sizes of Memories MUNEERA JAMAL 1, K. PADMAJA DEVI

More information

Parallelized Network-on-Chip-Reused Test Access Mechanism for Multiple Identical Cores

Parallelized Network-on-Chip-Reused Test Access Mechanism for Multiple Identical Cores IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 35, NO. 7, JULY 2016 1219 Parallelized Network-on-Chip-Reused Test Access Mechanism for Multiple Identical Cores Taewoo

More information

POWER REDUCTION IN CONTENT ADDRESSABLE MEMORY

POWER REDUCTION IN CONTENT ADDRESSABLE MEMORY POWER REDUCTION IN CONTENT ADDRESSABLE MEMORY Latha A 1, Saranya G 2, Marutharaj T 3 1, 2 PG Scholar, Department of VLSI Design, 3 Assistant Professor Theni Kammavar Sangam College Of Technology, Theni,

More information

Outline of Presentation Field Programmable Gate Arrays (FPGAs(

Outline of Presentation Field Programmable Gate Arrays (FPGAs( FPGA Architectures and Operation for Tolerating SEUs Chuck Stroud Electrical and Computer Engineering Auburn University Outline of Presentation Field Programmable Gate Arrays (FPGAs( FPGAs) How Programmable

More information

THREE algorithms suitable for built-in redundancy analysis

THREE algorithms suitable for built-in redundancy analysis 386 IEEE TRANSACTIONS ON RELIABILITY, VOL. 52, NO. 4, DECEMBER 2003 Built-In Redundancy Analysis for Memory Yield Improvement Chih-Tsun Huang, Member, IEEE, Chi-Feng Wu, Member, IEEE, Jin-Fu Li, Member,

More information

Detecting and Correcting the Multiple Errors in Video Coding System

Detecting and Correcting the Multiple Errors in Video Coding System International Journal of Research Studies in Science, Engineering and Technology Volume 2, Issue 8, August 2015, PP 99-106 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) Detecting and Correcting the

More information