Please use this identifier to cite or link to this item:
http://dspace2020.uniten.edu.my:8080/handle/123456789/21285
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Mohd Razif R.A. | en_US |
dc.contributor.author | Mohamad Maharum S.M. | en_US |
dc.contributor.author | Hasani A.H. | en_US |
dc.contributor.author | Mansor Z. | en_US |
dc.date.accessioned | 2021-09-09T07:12:22Z | - |
dc.date.available | 2021-09-09T07:12:22Z | - |
dc.date.issued | 2019 | - |
dc.identifier.uri | http://dspace2020.uniten.edu.my:8080/handle/123456789/21285 | - |
dc.description.abstract | Crosstalk is a major concern among integrated circuit (IC) designers as it may contribute significantly to the amount of noise presented in a device. Hence, there is a need to mitigate the impact of crosstalk in order to preserve the signal integrity between interconnections. This paper will review several methods to mitigate crosstalk in high speed ICs. The methods include the usage of repeater, Schmitt trigger, shielding, skewing, space adjustment between signal wires and setting the coupling length of the signal wires. Although these methods are effective for crosstalk mitigation, the features might only be applicable due to certain constraints. Consequently, this paper will provide a sufficient review on each method as a guideline for crosstalk mitigation method selection in which the crosstalk is largely regulated in long interconnections. © 2019 Published under licence by IOP Publishing Ltd. | en_US |
dc.language.iso | en | en_US |
dc.title | Mitigation techniques for crosstalk in ICs | en_US |
dc.type | conference paper | en_US |
item.cerifentitytype | Publications | - |
item.languageiso639-1 | en | - |
item.fulltext | With Fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_5794 | - |
item.grantfulltext | reserved | - |
item.openairetype | conference paper | - |
Appears in Collections: | UNITEN Ebook and Article |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
This document is not yet available.pdf Restricted Access | 396.12 kB | Adobe PDF | View/Open Request a copy |
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.