Fault Detection by Pseudo-Exhaustive TwoPattern Generator
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 10
Abstract
The main objective of this research is to design a Built-in self-test (BIST) technique based on pseudo-exhaustive testing. Two pattern test generator is used to provide high fault coverage. To provides fault coverage of detectable combinational faults with minimum number of test patterns than the conventional exhaustive test pattern generation, increases the speed of BIST and may posses minimum Hardware Utilization. A Built-in self-test (BIST) is a commonly used design technique that allows a circuit to test itself.Built-in self-test (BIST) technique based on pseudo-exhaustive testing, two pattern test generator is used to provide high fault coverage. It is widely known that a large class of physical defects cannot be modelled as stuck-at faults. For example, a transistor stuck- open fault in a CMOS circuit can convert a combinational circuit under test (CUT) into a sequential one, while a delay fault may cause circuit malfunction at clock speed, although it does not affect the steady-state operation. Detection of such faults requires two-pattern tests. It is proposed to design a BIST circuit for fault detection using pseudo exhaustive two pattern generator using minimum hardware utilization and increasing the speed of BIST.
Authors and Affiliations
Akanksha Pandey, Prof. Pravin Tiwari
Design of Transmission System for Mini-Train
The mini train rides are commonly seen rides in amusement parks. The study is based on a mini train operating at Vismaya amusement park, Kannur. During its operation, the mini train had frequent problems related to powe...
Patient Categorization System Based On ANFIS
Ayurveda, also known as “Life Knowledge” is considered one of the traditional Hindu systems of medicine. It is believed that Dhanvantari, the Hindu God of Ayurveda embodied in human form as the king of Varanasi and taug...
Frequent Items Mining in Data Streams
The main goal of this research is to mine frequent items in data streams using ECLAT and Dynamic Itemset Mining algorithms and finding the performance and drawbacks of these two algorithms. Most commonly used traditiona...
Method & Implementation of Efficient Approach to Provide Max Flow in WSN
The WSN network fails due to the depletion of energy in the central ring of nodes around the sink node, leaving the sink node segmented from the remaining viable network nodes. With the existing protocol, at the extinct...
Image Steganography and Cryptography Using Three Level Password Security
Image steganography and cryptography using three level password security is used for transferring sensitive data from one user to other user. The main aim of the project is to provide the users a secure way that helps t...