5 Application-Driven Fault Identification in NoC Designs
Department of IT, IIIT Allahabad, Allahabad, Uttar Pradesh, India
- CONTENTS
- 5.1 Introduction
- 5.2 Related Work
- 5.3 Identification of Vulnerable Routers
- 5.3.1 Proposed Mathematical Model for Router Reliability
- 5.3.2 Determination of the Vulnerable Routers Using Simulation
- 5.3.3 Look-up-Table (LuT) Generation from Experimental Data
- 5.4 The Proposed Methodology for the Identification of Vulnerable Routers
- 5.4.1 Classification of Application Traffic Using Machine Learning
- 5.4.1.1 Dataset Generation
- 5.4.1.2 Feature Vector Extraction
- 5.4.1.3 Training of the ML Model
- 5.4.1.4 Working of the Trained Model
- 5.4.2 Validation of the ML Model for Traffic Classification ...
Get VLSI and Hardware Implementations using Modern Machine Learning Methods now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.