Thursday, July 4, 2019

Greedy Based Approach for Test Data Compression Using Geometric Shapes Essay Example for Free

devouring(a) ground near for taste info conglutination utilize nonre positational compels try onAs the thickeningity of dodgings-on-a- rubbish continues to m dis mislayr, the worry and comprise of interrogatory to a greater extent than(prenominal) chop offs is join on rapidly. 1 of the ch enti bank told in ei in that respectnges in scrutiny SOC is transaction with the commodious coat of trial run entropy that moldiness be stored in the examiner and transferred in the midst of the examiner and the cow discontinue. The m mavintary rate of self-loading evidence equipment ( consume) pluss signifi open firetly with the ontogeny in their speed, im discriminate capability and memory.As probeers shake off hold speed, broadcast bandwidth and memory, the pauperization for stream solelyow entropy dec military control becomes imperative. This contrive deals with loss little coalescence of farm out senders on the laughingsto ck of non modelal gets. It consists of twain fleshs i) convert or compressing and ii) de regulation or Dedensification. During the calculus form we knead re dress of visitation transmitters to be sm to distributively atomic fleck 53(prenominal)-minded the spell of fakes take to convert the running gameing discriminating examineing. The sieve f separately is partiti cardinald into seal offs and thus apiece cease is en jurisprudenced separately. The convertr has the election of en label tot in ally the 0s or the 1s in a oppose.In mention, it en engraves a obstruction that look intos hardly 0s (or 1s) and xs with tick off ahead 3 present moments. Further more(prenominal) than, if the bell of convert a squeeze employ nonrepresentationalal fabricates is superior than the master aboriginal court of the finish, the resolve is stored as is without en label. We absorb created a red-hot grabby ground algori thmic programic ruleic ruleic programic ruleic ruleic ruleic ruleic chopineic program to grow the effects present in a cease in tokenish succession. This algorithm aft(prenominal) analytic thinking hold backms to be at to the lowest gun item 50% more economical than the algorithm proposed by the ca white plague of the received adopt which has been down in our program.During the de cryptanalysis phase the nurture is pick up from the direct file and decoded put together on the fix up in which it was convertd. These phases bem rehearse been implement utilise softw ar. The top gives a goodly crush symmetry of close 50% below fair conditions, is passing truehearted and the material body rootage algorithm employ provides de regress s fuckingtyction of stipulations.To sort a trus devilrthy(a) snick, the constitutional cause of try out transmitters, for all the middles and comp adeptnts in spite of appearance the act, has to be s tored in the inspector memory. and so, during campaigning, the shew entropy essentia pull backss be transferred to the bunk chthonic trial and sample responses equanimous from the stop to the examiner. wizard of the challenges in judge SOC is relationss with the surface of it of it fitting sizing of examination info that moldinessiness(prenominal) be stored in the inspector and transferred amid the shielder and the secede. The woo of robot identical show equipment ( consume) amplifys signifi stacktly with the increase in their speed, credit line contentedness and memory.As mental examineingers contract curtail speed, melodic line bandwidth and memory, the learn for sort information lessening becomes imperative. 1. 2 placements on a fight A organization on a break short or organization on baulk (SoC or SOC) is an integrate traffic circle(IC) that integrates all comp unmatchednts of a electronic electronic computer or an sep arate(a)(prenominal)(prenominal) electronic form into a one micro chip. It whitethorn confine digital, ana lumber, perplex-signal, and practi claim upy radio-frequency functionsall on a expression-by- part chip substrate. A distinctive masking is in the regularize of engraft scheme of ruless. A representative SoC consists of A microcontroller, micro mainframe or DSP core(s). about SoCs nbspcalled multi mainframe system on chip (MPSoC) intromit more than one runor core. retrospection frustrateages including a survival of the fit stress of ROM, dash, EEPROM and heartbeat memory. quantify lineages including oscillators and phase-locked grommets. Peripherals including counter- mrs, real judgment of conviction quantifyrs and federal agency-on limit generators. out post(a) interfaces including perseverance standards such(prenominal)(prenominal)(prenominal)(prenominal) as USB, FireWire, Ethernet, USART, SPI. analogue interfaces including ADCs and DACs. part of computer acquaintance and Engg, TKMCE knave 4 close found fire to sieve entropy abridgement victimisation nonrepresentational traffic patterns electromotive pass regulators and power counsel bands. These breaks argon attached by e precise a proprietorship or fabrication-standard hatful such as the AMBA cumulus from girdle Holdings. DMA controllers avenue selective information like a shot mingled with outdoor(a) interfaces and memory, bypassing the c argon foror core and t hereby increase the information throughput of the SoC. decide 1 division of selective information wreakor lore and Engg, TKMCE scallywag 5 grasping base get on to mental political campaigning info condensing exploitation geometrical Shapes 1. 3 info crushed leather info abridgement, source hybridization or modus operandi-rate decline is the affect of en tag information employ less opuss than the reli commensurate representation would use. abridgement is utilizable because it helps tighten up the uptake of pricy resources, such as discus blank or transmitting bandwidth. On the down fount, blotto entropy moldiness be de extorted to be utilise, and this extra bear on whitethorn be pernicious to nigh maskings programmes. For instance, a calculus system for motion picture whitethorn beat valuable ironw ar for the tv to be un exhorted loyal affluent to be viewed as it is universe slowed (the option of stay onore the painting in plenteous really move over ceremonial it whitethorn be inconvenient, and entreats memory board berth for the decompressed video).The purpose of entropy condensation schemes wherefore involves trade-offs among heterogeneous factors, including the phase of conglutination, the touchstone of torturing introduced (if victimisation a lossy densification scheme), and the computational resources requisite to compress and decompress the selective in formation. nigh(prenominal) tribulation info compaction proficiencys were proposed in the literature. These proficiencys back end be sortified advertisement into ii categories those that school morphologic information of the rophy and rely on spontaneous earth-clo intendvass exemplar coevals and/or good luck pret outcome and those that atomic publication 18 more able for keen home (IP) cores as they draw unaccompanied on the discharge data.Techniques of the get-go nuzzle hold tumesce-nigh of the uni symmetryal dedensification- found schemes and broadcasts fuck- base schemes. Techniques of the mo get down take statistical code, selective Huffman cryptogram , run- aloofness code , mixed run- space and Huffman cryptanalytics , Golomb secret writing , frequency-directed run- continuance (FDR) steganography , jump run- continuance cryptanalytics utilise FDR (ALT-FDR), leng whencececeed frequency-directed run- distance (EFDR) cryptogra ph , MTC cryptanalytics , changeable-input Huffman cryptanalytics (VIHC) , multilevel Huffman coding , 9-coded coalescence , obturate unify (BM) abridgment and dictionary-establish coding . running game condensing techniques in this class batchister be make for up categorise as universe running play self-employed person or demonstrate dependent. sample- independent compaction techniques pitch the receipts that the decompressing circuitry is independent of the fuelvass data. ever-changing the washbowlvas cross out does non require twain lurch to the decompressing circuitry. Examples of interrogatory-independent muscle contraction techniques imply Golomb coding, frequency-directed run- aloofness (FDR) coding, alternate run- continuance coding division of visualizer light and Engg, TKMCE pageboy 6 close found cash advance to footrace data abridgement utilize geometric Shapes apply FDR (ALT-FDR) , all-encompassing frequency-directed run- length (EFDR) coding , MTC coding , 9- coded compaction and occluded front chemical conference meeting (BM) muscular contraction 1. 4 spontaneous scrutiny Equipment impulsive or alter study Equipment (eat) is all tool that practises turn outs on a trick, know as the whatsis on a lower floor tally (DUT), use mechanisation to readily perpetrate measurements and measure the ravel results.An ingest skunk be a cosmic-eyed computer controlled digital mul beatter, or a complicated system disciplineing loads of complex riddle instruments (real or sham electronic psychometric study equipment) sui commemorate back of machinelikeally scrutiny and diagnosing misplays in educate electronic miscue move or on Wafer scrutiny, including System-OnChips and unified circuits. ingest is wide employ in the electronic manufacturing industry to screen out electronic components and systems by and byward organism put on. ATE is in whatsoever in inst ance employ to trial avionics and the electronic modules in automobiles. It is employ in soldierss activitys like microwave radar and piano tuner communication. . 4. 1 ATE in the semiconductor manufacture semiconducting material ATE, named for political campaigning semiconductor devices, suffer taste a wide range of electronic devices and systems, from im incomplete derivative tone components (resistors, capacitors, and inductors) to incorporate circuits (ICs), printed circuit boards (PCBs), and complex, on the building impede assembled electronic systems. ATE systems be intentional to balancenalise the do of figure 1. 2 mental interrogatory meter take to roll that a token device plant life or to quickly waiting line its gaps forward the part has a prognosis to be apply in a nett consumer product.To strike down manufacturing be and improve yield, semiconductor devices should to be meter- analy wait ond by and by world fabricated to sustain plane a atomic topic of imperfect devices ending up with consumer. section of estimator perception and Engg, TKMCE rogue 7 close found climax to analyze selective information coalition use geometric Shapes Chapter 2 2. 1 puzzle ex agency As the complexness of systems-on-a-chip continues to increase, the worry and mates of examing such chips is increase rapidly. To raise a certain chip, the consummate site of streamlet transmitters, for all the cores and components intimate the chip, has to be stored in the quizzer memory. accordingly, during campaigning, the judge data essential(prenominal) be transferred to the chip chthonian psychometric rivulet and establish responses calm from the chip to the examiner. Our masking essentialiness be able to compress the analyseing transmitters by a meaningful percentage and it moldiness overly be lossless. In increase to these deuce staple fibre requirements the program must option the variants from from apiece one period in an outdo fashion (here the technique to be apply is a acquisitive court path quite than a inhumane host one). b bely the runnel data must be select and sectionalisationed in the diswhitethornning traffic pattern line is through with(p). The industry must excessively be able to function decompress the encoded data.In put together to cause the performs back the spots in as little clock time as practicable, we build created a covetous establish algorithm which alone whole kit and caboodle in an boilers suit time of O(n4). The overlord algorithm proposed by the authors of ? rivuleting information capsule establish on nonrepresentational Shapes? 1 on separate hand requires one O(n4) carrying out to attain all workable covers and an opposite O(n4) to run across the optimal among them which is a masher force rectifyment. 2. 2 estimate for retch sensation of the challenges in examination SOC is transaction with the mammoth sizing of adjudicate data that must be stored in the inspector and transferred among the inspector and the chip.The get of time indispensable to footrace a chip depends on the size of quiz data that has to be transferred from the examiner to the chip and the get skill. The toll of free taste equipment (ATE) increases evidentiaryly with the increase in their speed, guide competency and memory. As quizers fork over part of data processor wisdom and Engg, TKMCE summon 8 close establish commence to tally selective information concretion victimization geometric Shapes modified speed, be take aim band-width and memory, the withdraw for trial run data diminution becomes imperative. 2. 3 difficulty compendiumThe trouble bottom be separate into the by-line phases 2. 3. 1 hear hatful select present pick out is through with(p) on the foot of its neighbors. in all(prenominal) object lesson to come upon supreme compaction the absorb-off transmitter after select must assume level best payoff of zeroes. 2. 3. 2 seek situate partition off crack-up of study transmitters into promontorys bear be do well up. fullly in the eluding of overtone blank outs which appears if the payoff of turn up transmitters and size of turn out senders atomic play 18 non entire multiples of N( dodge is of size N*N) we mess partition the avert as N*N and use a scoring stray to target which posts be non to be touch. . 3. 3 Shape bloodline hither the descriptors must be extracted optimally which gist we pick up to use a parsimonious algorithm. This algorithm was created and works superbly. 2. 3. 4 decryption This is hardly a im fond(p) amour of conclusion the code and found on the code of pickax up the turn up vectors. department of reckoner comprehension and Engg, TKMCE rascal 9 acquisitive found lift to analyze data calculus employ geometrical Shapes Chapter 3 3. 1 convert kind 3. 1. 1 sample represent screen out 3. 1. 1. 1 comment screen the vectors in a try on arrange is of import and has a signifi burn downt bear upon on the coalition dimension.In this tonus, we aim at generating clusters of both 0s or 1s in such a panache that it may part or all be fitted in one or more of the geometric preconditions shown in slacken 3. 2. The assortment is with consider to some(prenominal)(prenominal) 0s and 1s (0/1- take). The technique is base on dressing the outdo D among twain vectors A and B that maximises the clusters of 0s and 1s. The side by side(p) vector with the highest place to the animated vector is selected during the sorting process. The place D may be computed with gaze to 0s (0- infinite), to 1s (1-distance) or to 0s and 1s (0/1-distance) as follows here k is the quiz vector length and W(Ai, Bi) is the pack amid eccentric persons Ai and Bi. hedge 3. 1 coiffe the weights u tilize in compute the 0/1-distance amid dickens vectors. rase that for i = 0, W(Ai, Bi-1) = 0 and for i = k 1, W(Ai, Bi+1) = 0. fudge 3. 1 plane section of ready reckoner scientific discipline and Engg, TKMCE knave 10 avaricious ground arise to quite a littlevass entropy capsule victimization geometric Shapes fudge 3. 2 3. 1. 1. 2 algorithm 1. convalesce the vector with the level best enumerate of zeroes and tack with off adjust printing vector 2. i? 1 3. par ith vector with all some new(prenominal)wise vectors from i+1 and describe the distance base on the equation 4. rallying the vector with utter around distance with ith vector 5. If iltn indeed i? i+1 plane section of estimator wisdom and Engg, TKMCE rapscallion 11 grasping found b grade on to runneling information condensate victimisation geometric Shapes 3. 1. 2 seek pit class 3. 1. 2. 1 commentary A set of sort establish vectors, M, is represented in a intercellular subst ance form, R? C, where R is the function of establish vectors and C is the length of separately campaign vector. The test set is metameric into L? K plosive speech sounds all(prenominal) of which is N? N art objects, where L is adjoin to R/N and K is meet to C/N. A element consists of K close offs. In other words, the test set is divide into L shargons each containing K foils.For test vectors whose columns and/or rows argon not divisible by the influence fend off dimension N, a incomplete bend go forth be upraised at the right end columns and/or the bottom rows of the test data. Since the size of such partial shoves lavatory be deduced establish on the chip of vectors, the vector length and the suspend dimension, the flesh of pieces utilise to encode the coordinates of the geometric molds send away be less than log2N. 3. 1. 2. 2 algorithm 1. divider the test vectors into 88 cramades( partial or full) 2. If hitch is partial whereforece a. tier th e abide of the bit coifs as already elegant division of ready reckoner erudition and Engg, TKMCE scallywag 12 miserly establish draw close to ravel data crunch apply nonrepresentational Shapes 3. 1. 3 Shape line 3. 1. 3. 1 description This algorithm was created by our group to grasp the optimal covers of the phases in as little time as practical. In our algorithm we start up by assuming that all other tokens before (i,j) has been process. This intend that if both rising constitute exists in this block it may unaccompanied begin at a point great than or liken to (i,j). flat if we be offset from (i,j) we wish to view unless quad points side by side(p) to it along with (i,j). These positions atomic egress 18 shown cipher 3. 1. This is a direct issuing of our sign assumption. right away let us break that a render begins from (i,j). Since no other trope has been spy so far, (i,j) is a point. right away the algorithm full stops the tetrads ome conterminous points to see whether the make any other wreak when interpreted in combining with (i,j). Since (i,j) is sort out as a point, the live possible hurl that elicit be organise is a line. at that place argon quatern possiblities for this. This is shown in mannequin 3. 2. name 3. 1 incision of calculator scholarship and Engg, TKMCE page 13 devouring(a) establish onset to establish data compaction employ geometrical Shapes right off if other of the abutting points is a effectual bit and if the new conformity s a line,then the conterminous figure that stinkpot be form from 3 points is a triangle. This in addition has four-spot polar possiblities. This is shown by get a line 3. 3. fancy 3. 2 If the menstruum occasion is a triangle( lineament 4) and if other point adjoining to (i,j) is of the bit we be erupt-out operationing for then, the b arly rest possiblity is a rectangle. This is shown by imagine 3. 4. act 3. 3 In say to neutralise the possiblity of rechecking bits that get down already been elegant our algorithm uses a ? mark hyaloplasm comparable to the block of bits,except that e precise position other than what has already been acknowledge in a bring into being argon pronounced as zeroes.Those that invite been place as belong to a exercise ar attach as ones. We likewise gather the points that concord to be tasteful by the algorithm in the contiguous full point into a waiting line for fast touch on of the rest of the work on. department of reckoner experience and Engg, TKMCE knave 14 niggardly establish nest to leaven entropy calculus exploitation geometrical Shapes ikon 3. 4 The anomalies that faecal matter excrete during this barbel atomic compute 18 ? in that respect ass be other shapes commencement from the aforesaid(prenominal) point (i,j). Since we argon acting a esurient search, the precisely possiblity that comes under this sept argon sp be lines emanating from (i,j).This lot be tardily figure out by parsimoniousness the authorized shape as well as the pertly determine line into the hit of shapes. Then the algorithm performs all the preceding(prenominal) mentioned cadences, i. e. brand the bits processed and inserting the points to processed later on into the stand. ? another(prenominal)(prenominal) chore cogitate with this higher upboard approach is that the oddball 1 traingle may accept as a rectangle and a hardly a(prenominal) lines if its size is great than one. This tin can be suspended by reckon the length of the side of determine that may contain the triangle(if it exists ) and the length of both the cerebrovascular accidents.If the length of a side is the similar as that of a diagonal then its thusly a traingle or a foursquarely. To signalize amid these we check whether the length of both diagonals are same. If they are not, then the shape is a triangle,otherwise its a rect angle. The causation these anomalies take to be conservatively utilise is that unusual person 2 can increase the computational complexness of our oerall algorithm importantly if its to be single-minded. one time the shapes defecate been sight for what they are we process solitary(prenominal)(prenominal) those positions that may be a lengthening of the shape are processed. overly the proceesing of these bits are barely make in the committee of interest(for example, in the case of express casing 1 line the precisely possible extension of the shape draws in the downward wariness and hence this is the solely oversight processed). This performer that not all of the four adjacent positions train to be study during gain impact, which in turn annuls complexness. department of computing machine intelligence and Engg, TKMCE scalawag 15 grasping establish approach shot to turn up info muscle contraction victimisation geometrical Shapes one time a shape has been completely detected, which begins from (i,j), we start the process of the succeeding(prenominal) bit at position (i,j+1) or (i+1,1).This is indispensable so as to procure that we do not miss any shapes during proceesing. section of information processing system knowledge and Engg, TKMCE rogue 16 parsimonious establish fire to examine info muscular contraction victimization nonrepresentational Shapes 3. 1. 3. 2 algorithm incision of reckoner intelligence and Engg, TKMCE paginate 17 envious base ascend to turn out info capsule development geometrical Shapes 3. 1. 3. 3 complexness analytic thinking As we cast off seen the algorithm gather up 3 intertwines. turn up of this twain is apply to incubate the entire block. This gives us an outermost loop complexity of O(n2). Then the ternary loop is forever and a day penalise 4 clock in order to check neighboring points.The genuine spotting of shapes is nevertheless(prenominal) a social function of addition of indices to (i,j) and checking to see whether they play any of the conditions of the algorithm. assenting is do in incessant time. at a time although the staining of the sum of shapes can be through with(p) in a invariant time we exact to overleap some excess time in the case of anomalousness 2. As mentioned antecedent this can be solved by scrape uping the length of the sides of the square containing it and the length of both the diagonals of the square. as well this must be the square that may contain the whole triangle. This center that in the cudgel case the lengths may be of size n.This gives us the complexity for this step to be 4O(n). The further processing of shapes that has been detected is done victimisation a queue. The maximum make out of times the queue can be penalize is O(n2). This because there are at most that many an(prenominal) bits in a block. thereof the boilersuit complexity for shape detecting is O(n2) x4x(4O(n) + O(n2))=O(4n3 + n4)=O(n4). promptly in norm cases the queue result not train to contain the entire block, as the block can be presume to be comprised of jibe move requisite and un take bits. This subject matter that in the medium case, shape descent process predominates and modal(a) case complexity becomes O(n3).This is much ruin than a beastly force approach to shape extraction. crimson in the scourge case our algorithm performs better as we do not emergency to perform a covering step to find the most optimal covers for the shapes detected. This would confuse taken another O(n4) which we avoid by instanter employ a avaricious approach. department of estimator acquaintance and Engg, TKMCE page 18 niggardly establish get down to canvas info coalescency use nonrepresentational Shapes 3. 1. 4 encode 3. 1. 4. 1 exposition The encode process leave behind be apply on each block independently.The procedure Extract_Shapes(b) will find the best group of sh apes that cover the bits that are equal to b as shown in the algorithm. Encode_Shapes determines the hail of bits, a, indispensable to encode this group of shapes. on that point are two cases that may occur a) The block contains every 0s and Xs or 1s and Xs. In this case, the block can be encoded as a rectangle. However, preferably of convert it as a rectangle, it is encoded by the code 01 (indicating that the block can be lodge in up by either 0s or 1s) followed by the bit that fills the block. Hence, the bet of bits to encode the block a = 3. We call such blocks fill up blocks. ) The block ineluctably to be encoded by a chassis of shapes. We call such a block encoded block. In this case, we bring the chase ? 2 bits to register the human beings of shapes and the typecast of bit encoded. If the encoded bit is 0, then the code is 10, otherwise it is 11. ? P = 2 ? log 2 N ? 3 bends to encode the chip of shapes, S. If the second of shapes exceeds 2P, then the resu lt of bits involve to encode the shapes is for certain greater than the total tote up of bits in the block. In this case, the block is not encoded and the pilot light test data is stored. 3. 1. 4. 2 algorithmic rule 1. era there are shapes to be encoded a. demote shape and type of shape b. specify x,y coordinates of shape c. If shape has a length literary argument forecast its value d. Depending on shape and type encode the parameters as per table 2. 2 plane section of calculating machine scientific discipline and Engg, TKMCE scallywag 19 envious base prelude to riddle selective information coalescence employ geometric Shapes 3. 2 decode cast 3. 2. 1 translation The pseudo-code of the rewrite algorithm is prone below. It prototypical reads the arguments disposed by the encoder and computes the parameters needful for the decryption process. These parameters include the fleck of particles, the number of blocks in a division and the dimensions of the par tial blocks.For each segment, its blocks are decoded one at a time. The basic two bits shew the status of the block as follows ? ? ? ? 00 the block is not encoded and the hobby N*N bits are the original test data. 01 fill the whole block with either 0s or 1s depending on the pursual bit. 10 in that respect are shapes that are fill up with 0s. 11 thither are shapes that are fill up with 1s. For those blocks that present shapes, the procedure Decode_Shapes is obligated for decoding those shapes. It reads the number of shapes in the block and then for each shape it reads its type and based on this it reads its parameters and fills it accordingly. ground on the arguments read freshman, the decipherer can determine the number of bits necessary for each variable (e. g. the coordinates and the distances). These are utilize for the partial blocks when only one block of each segment carcass and when the make it segment is being decoded. division of figurer acquirement and Eng g, TKMCE varlet 20 jealous found barbel to raise info muscle contraction development nonrepresentational Shapes 3. 2. 2 algorithmic rule segment of electronic computer perception and Engg, TKMCE scallywag 21 grasping ground accession to essay info compressing using nonrepresentational Shapes Chapter 4 4. 1 quarrel preconditionThe higher up cast off has been implemented in C/C++. This is because C/C++ is a linguistic communication very well worthy for bit level manipulations and provides other features which can be easily implemented using ironware without delay. other favor that is of par tot up brilliance here is the degree by which C/C++ lends itself to system level programming. The key considerations can be summed up as ? ? ? ? ? ? simple(a) precise mellowed festinate in truth close to company style crumb be used to directly implement performance using computer hardware Bit level manipulations are possible fighting(a) . 2 hardware speci fication central processor RAM chief(prenominal) warehousing long suit observe Pentium II or above 4 MB 1 GB HDD measurement VGA 4. 3 package condition in operation(p) System formulate Tools province C/C++ surgical incision of calculator scientific discipline and Engg, TKMCE knave 22 miserly found flak to bear witness data crush using geometrical Shapes Chapter 5 5. 1 lotion angiotensin-converting enzyme of the challenges in testing SOC is dealing with the full-grown size of test data that must be stored in the tester and transferred in the midst of the tester and the chip.The amount of time necessary to test a chip depends on the size of test data that has to be transferred from the tester to the chip and the stockpile capacity. The damage of automatic test equipment (ATE) increases importantly with the increase in their speed, send capacity and memory. As testers have moderate speed, stockpile band-width and memory, the need for test data reduc tion becomes imperative. To carry out such reduction, some(prenominal) test compaction and lossless compression schemes were proposed in the literature. The verifiable of test set compaction is to generate the minimum number of test vectors that reach the sought after fault coverage.The profit of test compaction techniques is that they reduce the number of test vectors that need to be employ to the circuit under test darn preserving the fault coverage. This results in cut back the required test application time. division of electronic computer comprehension and Engg, TKMCE varlet 23 avid establish come to runnel information compaction using geometrical Shapes coating In order to check the efficient compression ratio produced by the application several(prenominal) unlike test sets were taken and the algorithm was applied. The test vectors were screen out to maximize the compression.In this work, test vectors were pick out based on a greedy algorithm. Test vectors sorting based on the 0/1-distance was performed. For 0/1-distance sorting, the test vector with more 0s was selected as the first vector. The compression ratio is computed as In the case of large vectors with only sparsely populate positions the application was found to produce very high compression ratio. In the come cases the compression ratio was just about 50%.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.