A Comparison between RISC and CISC Microprocessor Architectures
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2016, Vol 4, Issue 5
Abstract
In this paper, we have made a comparison between RISC (Reduced Instruction Set Computer) and CISC (Complex Instruction Set Computer.) RISC and CISC are two different types of microprocessor architectures. RISC is a computer microprocessor that uses simple instructions which can be divided into multiple instructions that performs low level operations within a single clock cycle while CISC is a PC processor which utilizes single direction to execute a few low level operations, for example, stacking from memory, a number juggling operation, and a memory store or are fit for multi-step operations or tending to modes inside single guideline. The principle distinction amongst RISC and CISC is in the quantity of figuring cycles each of their directions take. The distinction in the quantity of cycles depends on the intricacy and the objective of their directions.
Authors and Affiliations
Shahla Gul| Department of Computer Science, Abdul Wali Khan University Mardan, KPK, Pakistan, Noman Aftab| Department of Computer Science, Abdul Wali Khan University Mardan, KPK, Pakistan, Arfa| Department of Computer Science, Abdul Wali Khan University Mardan, KPK, Pakistan, Rani| Department of Computer Science, Abdul Wali Khan University Mardan, KPK, Pakistan
We propose a protected information sharing plan for dynamic individuals. In the first place, we propose a protected route for key appropriation with no safe correspondence channels, and the clients can safely get the...
Direct Power Control Algorithm for Electric Traction Systems
In this paper presents a direct power control-based algorithm is used for general filtering and unbalance compensation scheme for electric traction systems. This method can improve the power flow exchange between the...
Efficient And Secure Hop-By-Hop Message Authentication And Source Privacy In Wireless Sensor Networks
security to the data is actually provided by an authentication. Authentication involves a process of confirming an identity. In Wireless sensor networks a lot of message authentication schemes have been developed, ba...
Analysis of Hyoid Structured And Perforated Pinfin Heat Sink In Inline And Staggered Flow
The usage of the electronic goods has been increased tremendously; hence it is the challenging task to improve the cooling for such devices. The heat dissipation rate should be maximized in the electronic devices lik...
Implementation of A 15-Level Inverter With MMC Technique Using Facts Equipment
The implementation of a 15-level inverter with modular multilevel converter (MMC) technique for single-phase wind energy inverter (WEI) using facts technology is presented in this paper. With this WEI proposed invert...