A High Speed 16*16 Multiplier Based On Urdhva Tiryakbhyam Sutra
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2013, Vol 1, Issue 5
Abstract
It is an ancient methodology of Indian mathematics as it contains a 16 SUTRAS (formulae). A high speed complex 16 *16 multiplier design by using urdhva tiryakbhyam sutra is presented in this paper. By using this sutra the partial products and sums are generated in one step which reduces the design of architecture in processor’s. By using this sutra we can reduce the time with high extent when compare to array and booth multiplier. It can be implemented in many Digital Signal Processing (DSP) applications such as convolution, Fast Fourier Transform(FFT) filtering and in microprocessors. By using this method we reduce the propagation delay in comparison with array based architecture and parallel adder based implementation which are most commonly used architectures .The main parameters of this paper is propagation delay and dynamic power consumption were calculated and found reduced.
Authors and Affiliations
B. Ratna Raju| Kakinada Institute Of Engineering & Technology ratnaraju.ece@kietgroup.com, D. V. Satish| Kakinada Institute Of Engineering & Technology dhulipudi.vsatish@gmail.com
Fault Localization Scheme Constructed Using The Header Space Framework
ATPG utilizes the header space structure—a geometric model of how bundles are prepared. In header space, convention particular implications connected with headers are overlooked: A header is seen as a level groupin...
Probity And Speculations Yielding Model For Multi Clouds
Cloud computing is a latest trend in present scenario. Cloud computing definitely makes sense if your own security is weak, missing features of understanding and privacy. The cloud acts as a big black box, nothing in...
Intra cluster similarity of clique by positive and negative objects
Clustering of high dimensional data sets is a challenge in now a days. Finding of good clusters is a big problem for the researchers. The outlier detection of clusters and finalize about the noisy data also an import...
Mobile Ad Hoc Networks Authentication Using Npv Method
NPV (Neighbour Position Verification) method is companionable with security architectures counting the ones that have been projected for vehicular networks which symbolize a likely deployment environment for NPV. Suc...
AODV with DSR Protocol Heirarchy For Packet Dropped Forgery Attacks
Far reaching scale sensor frameworks are sent in different application spaces, and the data they accumulate are used as a piece of essential initiative for fundamental structures. Data are spilled from different sour...