Low Power and Low Latency Memristive-Ternary Content Addressable Memory Design Using Absolute Path Search Optimization (APSO) Algorithm
DOI:
https://doi.org/10.61841/45ba4k20Keywords:
MTCAM- Memory, Absolute Path Search Optimization, Memristive-ternary Content Addressable Memory, Low Latency and Low Power.Abstract
In this work, a low-latency and low-power use of memristive ternary content addressable memory (MTCAM) design is implemented for utilizing a new optimization method, specifically the Absolute Path Search Optimization (APSO) algorithm. The outline of a proposed memory has been altered by the expansion of all validation supervisors required by the equipment usage of switching devices in the memory. In addition, aAPSO has been incorporated into real-time applications to permit a memory design based on full self-rule. Therefore, compared with the conventional design comprising of a switching block and an isolated memory, this new method will prompt an imperative decrease of data searching among the memory read and write procedure. The proposed work is depicted utilizing Verilog language, synthesized, and actualized utilizing Xilinx ISE suite-based Field Programmable Gate Array (FPGA) devices. Synthesis results demonstrate that the proposed configuration accomplishes higher efficiency than the previous executions by decreasing area while keeping up a moderate throughput/Look Up Table (LUT) ratio. The proposed configuration is additionally more productive as far as power utilization.
Downloads
References
[1] N. Vijaykumar, ― Reactive-associative caches, In Proc. Int. Conf. Parallel Arch. Compiler Tech., 2011, p.
4961.
[2] J. Dai and L. Wang, “Way-tagged cache: An energy-efficient L2 cache architecture under write-through
policy,” In Proc. ISLPED, 2009, pp. 159–164.
[3] F. X. Ruckerbauer and G. Georg akos, “Soft error rates in 65 nmSRAMs: Analysis of new phenomena,” In
Proc. IEEE Int. On-LineTest. Symp., 2007, pp. 203–204.
[4] G.H. Asadi, V. Sridharan, M.B. Tahoori, and D. Kaeli, “Balancing performance and reliability in the
memory hierarchy,” In Proc. Int. Symp. Perform. Anal. Syst. Softw., 2005, pp. 269–279.
[5] X. Vera, J. Abella, A. Gonzalex and R. Ronen, “Reducing of error vulnerability of data caches,” Presented
at the Workshop System Effects Logic Soft Errors, Austin, TX, 2007.
[6] P. Kongetira, K. Aingaran, and K. Olukotun, “Niagara: A 32-way multithreaded Sparc processor,” IEEE
Micro, vol. 25, no. 2, pp. 21–29, Mar. 2005.
[7] X. Vera, J. Abella, A. Gonzalez and R. Ronen, “Reducings of error vulnerability of data caches,” presented
at the Workshop System Effects Logic Soft Errors, Austin, TX, 2007
[8] J.S. Yadav, M. Yadav, and A. Jain, “CACHE MEMORY OPTIMIZATION,” International Conferences of
Scientific Research and Education, vol. 1, no. 6, pp. 1–7, 2013.
[9] H. Dybdahl, "Architectural Techniques to Improve Cache Utilization" Diss. Ph.D. thesis, Norwegian
University of Science and Technology, 2007.
[10] X. Ding and K. Wang, “ULCC : A User-Level Facility for Optimizing Shared Cache Performance on
Multicores.” ACM big plan notices, Vol. 46, No. 8, ACM, 2011.
[11] S. Paper, R. Sawant, B. H. Ramaprasad, S. Govindwar, and N. Mothe, “Memory Hierarchies-Basic Design
and Optimization Techniques Survey on Memory Hierarchies – Basic Design and Cache Optimization
Techniques,” 2010.
[12] M. Zhang and K. Asanovic, “Highly-Associative Caches for Low-Power Processors”, Appears in Kool
Chips Workshop, 33rd Int. Symp. on Microarchitecture, 2000.
[13] M. Horowitz, ‘‘Computing’s energy problem (and what we can do about it),’’ In Proc. IEEE Int. SolidState Circuits Conf. (ISSCC) Dig. Tech. Papers, Feb. 2014, pp. 10–14.
[14] H. Topcuoglu, S. Hariri, and M.-Y. Wu, ‘‘Performance-effective and low complexity task scheduling for
heterogeneous computing,’’ IEEE Trans. Parallel Distrib. Syst., vol. 13, no. 3, pp. 260–274, Mar. 2002.
[15] D. Xie, J. Lai, and J. Tong, ‘‘A high utilization rate routing algorithm for modern FPGA,’’ In Proc. 9th Int.
Conf. Solid-State Integr.-Circuit Technol. (ICSICT), Oct. 2008, pp. 2333–2336.
[16] Deepa A., Marimuthu C.N., “Study of Reed Solomon encoders and its architectures”, International Journal
of Applied Engineering Research, Volume 9, Issue 20, Pages 6855-6862, 2014.
[17] Jerin Jose, M., Akmal Jahan, S., Arunachalam, R., Karnan, R., & Kishore, V. (2017). Automobile Accident
Sensing Unit and Notifier using Arduino. The SIJ Transactions on Industrial, Financial & Business
Management (IFBM), 5(1), 5-8
[18] RAJAN C., SHANTHI N.(2015). Genetic based optimization for multicast routing algorithm for MANET.
Sadhana - Academy Proceedings in Engineering Sciences, 40(8).
[19] Prabhadevi S., Javavel S., Kapoor R.(2015). Algorithm of sentiment analysis for computing machines.
Journal of Scientific and Industrial Research, 74(12).
[20] Palanisamy T., Krishnasamy K.N.(2015). Bayes node energy polynomial distribution to improve routing in
wireless sensor network. PLoS ONE, 10(10).
[21] Prasath A., Satheesh A.(2015). Implementation of real time data acquisition system with ARM. ICIIECS
2015 - 2015 IEEE International Conference on Innovations in Information, Embedded and Communication
Systems.
[22] Gokula Krishnan,C.A.,&Dr.Suphalakshmi,A. (2017). An Improved MAC Address Based Intrusion
Detection and Prevention System in MANET Sybil Attacks. Bonfring International Journal of Research in
Communication Engineering, 7(1), 1-5.
[23] Balakrishnan M., Gowthaman S., Jaya Kumaran S.P., Sabhapathy G.R.(2015). A smart spy robot charged
and controlled by wireless systems. ICIIECS 2015 - 2015 IEEE International Conference on Innovations in
Information, Embedded and Communication Systems.
[24] Sasikala E., Rengarajan N.(2015). An Intelligent Technique to Detect Jamming Attack in Wireless Sensor
Networks (WSNs). International Journal of Fuzzy Systems, 17(1).
[25] Gopinath B., Shanthi N.(2015). Development of an automated medical diagnosis system for classifying
thyroid tumor cells using multiple classifier fusion. Technology in Cancer Research and Treatment, 14(5).
[26] Ravikumar P., Arumugam S., Jeyashanthi N. (2016). Computational modeling of amperometric choline
biosensor for neurochemical detection. Biomedical Research (India), 27(4).
[27] Kurian,S.,& Franklin,R.G. (2013). Trustworthy Coordination of Web Services Atomic Transaction for Net
Banking. The SIJ Transactions on Advances in Space Research & Earth Exploration, 1(1), 6-9.
[28] Ramani G., Geetha K. (2016). An efficient code compression for MIPS32 processor using dictionary and
bit-mask based static and dynamic frequency algorithm. COMPEL - The International Journal for
Computation and Mathematics in Electrical and Electronic Engineering, 35(5).
[29] Ravi S., Mezhuyev V., IyswaryaAnnapoorani K., Sukumar P. (2016). Design and implementation of a
microcontroller based buck boost converter as a smooth starter for permanent magnet motor. Telkomnika
(Telecommunication Computing Electronics and Control), 1(3).
[30] Gnanambigai J., Rengarajan N. (2016). A novel approach to enhance the network lifetime for hybrid
routing protocol. International Journal of Information and Computer Security, 8(2).
[31] KarthickRaghunath K.M., Rengarajan N. (2016). A novel fuzzy integrated fault-tolerant and energyefficient routing protocol for Wireless Sensor Network. Asian Journal of Information Technology, 15(8).
[32] Vijayalakshmi M. (2016). Synthesis, spectral characterization, biological activity and dna cleavage studies
of cu(Ii), ni(II) AND zn(II) SCHIFF base complexes derived from 2,4-dihydroxy benzaldehyde and pchloroaniline. International Journal of ChemTech Research, 9(3).
[33] Sukumar P., Gnanamurthy R.K.(2016). Computer aided screening of cervical cancer using random forest
classifier. Research Journal of Pharmaceutical, Biological and Chemical Sciences, 7(1)
[34] Kumar, V., &Balasubramanie, P. (2007). Implementation of Modified MAC Based Pipelining Technique
for Wireless Networks. Information Technology Journal, 6(8), 1231-1237.
[35] Sengottaiyan, N., Somasundaram, R., &Arumugam, S. (2009). A modified routing algorithm for reducing
congestion in wireless sensor networks. European Journal of Scientific Research, 35(4), 529-536.
[36] Suresh, Y., Arumugam, S., Chandrasekaran, M., Senthilkumar, J., &Mohanraj, V. (2009, October). A
QSPS-PSR Approach on Differentiated TCP Flows for Internet Traffic. In 2009 International Conference
on Advances in Recent Technologies in Communication and Computing (pp. 263-265). IEEE.
[37] Dr. Gopinath, B., Kalyanasundaram, M., Karthika, V., & Pradeepa, M. (2018). Development of Power
Quality Event Using Diode Clamped Multilevel Inverter in Conjunction with AANF. Bonfring
International Journal of Software Engineering and Soft Computing, 8(1), 17-22.
[38] Ashok, V., Kumar, A. N., Kumar, S. S., &Kasthuri, N. (2010). Continuous wavelet transform analysis of
blood flow for the determination of hyper and hypo glycemic conditions. Procedia Computer Science, 2,
291-297.
[39] Sagayee, G. M. A., &Arumugam, S. (2010, February). Biometric image enhancement using decision rule
based image fusion techniques. In Second International Conference on Digital Image Processing (Vol.
7546, p. 75463F). International Society for Optics and Photonics.
[40] Sivakumar, V., Sivasankaran, S., Prakash, P., & Lee, J. (2010). Effect of heating location and size on mixed
convection in lid-driven cavities. Computers & Mathematics with Applications, 59(9), 3053-3065.
[41] Nirmaladevi, M., &Arumugam, S. (2010). VLSI Implementation of Artificial Neural Networks—
Asurvey. International Journal of Modelling and Simulation, 30(2), 148-154
[42] Kavitha, S., &Duraiswamy, K. (2011). Automatic detection of hard and soft exudates in fundus images
using color histogram thresholding. European Journal of Scientific Research, 48(3), 493-504.
[43] Ravi, S., &Balakrishnan, P. A. (2011). Dual screw profile extruder temperature control using LabVIEW
enhanced Genetic Fuzzy Algorithm. European Journal of Scientific Research, 50(1), 35-47.
[44] Mohanraj, V., Chandrasekaran, M., Senthilkumar, J., Arumugam, S., & Suresh, Y. (2012). Ontology driven
bee's foraging approach based self adaptive online recommendation system. Journal of Systems and
Software, 85(11), 2439-2450.
[45] Suresh, Y., Arumugam, S., &Bhagyaveni, M. A. (2012). A Forager Bee's Intelligence Inspired Dynamic
Queue Scheduling for the Internet Traffic. Journal of Computer Science, 8(5), 665.
[46] Saravana, K. T., &Sampath, V. (2011). An Artificial Neural Network System for Prediction of Dimensional
Properties of Weft Knitted Rib Fabric. Journal of the Textile Association, 71(5), 247-250.
[47] Vijayakumar, J., &Arumugam, D. S. (2012). Study of betelvine plants diseases and methods of disease
identification using digital image processing. European Journal of Scientific Research, 70(2), 240-244.
[48] Satheesh, A., &Manigandan, T. (2012). Improving power system stability using PSO and NN with the aid
of FACTS controller. European Journal of Scientific Research, 71(2), 255-264.
[49] Rameshkumar, A., &Arumugam, S. (2012, April). PI Control of Quasi-resonant Buck Converter.
In International Conference on Advances in Information Technology and Mobile Communication (pp. 477-
485). Springer, Berlin, Heidelberg.
[50] Suresh, Y., Arumugam, S., &Bhagyaveni, M. A. (2012). A Forager Bee's Intelligence Inspired Dynamic
Queue Scheduling for the Internet Traffic. Journal of Computer Science, 8(5), 665.
[51] Ramesh, K., &Somasundaram, K. (2012, January). Optimized FZ-LEACH Using Exponential Weighted
Moving Average for Wireless Sensor Network. In International Conference on Computer Science and
Information Technology (pp. 473-481). Springer, Berlin, Heidelberg.
[52] Satheesh, A., &Manigandan T. (2013). Maintaining Power System Stability with Facts Controller Using
Bees Algorithm and NN. Journal of Theoretical and Applied Information Technology, 49 (1), 38-47.
[53] Vijayalakshmi M., &Subramanian P. Synthesis, spectral characterization, biological activity and DNA
cleavage studies of Cu(II), Ni(II) and Zn(II) schiff base complexes derived from 2,4-dihydroxy
benzaldehyde and P-aminophenol. International Journal of Pharmacy and Technology, 5(1):5144-5155.
[54] Prabhadevi, S., De, R., & Shah, P. (2013). Cost Effective Poly Vernam Cipher with Cache Optimization.
Journal of Theoretical & Applied Information Technology, 58(3).
[55] Dr. Chaturvedi, A., Bhat, T.A., & Kumar, V. (2013). Movement based Asynchronous Recovery System in
Mobile Computing System. The SIJ Transactions on Computer Networks & Communication Engineering
(CNCE), 1(3), 1-5.
[56] Prabhadevi S., &Natarajan A.M. (2013). Vehicular ad hoc networks: Characteristics, application and
standards. Asian Journal of Information Technology, 12 (11): 387-390.
Downloads
Published
Issue
Section
License
This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.