An Efficient Baugh-WooleyArchitecture forBothSigned & Unsigned Multiplication
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2012, Vol 3, Issue 4
Abstract
This project presents an efficient implementation of a high speed multiplier using the shift and adds method of Baugh-Wooley Multiplier. This parallel multiplier useslesser adders and lesser iterative steps. As a result of which they occupy lesser space as compared to the serial multiplier. This is very important criteria because in the fabrication of chips and high performance system requires components which are as small as possible. Experimental result demonstrate that the proposed circuit not only improves the accurate performance but also reduces the hardware complexity and also less power consumption that is dynamic power of 15.3mW and maximum clock period of 3.912ns is required which is very efficient as compared to the reference paper.
Authors and Affiliations
PramodiniMohanty , RashmiRanjan
A Review of various metrics used in software reliability
Software reliability is an important aspect in software engineering enviourment. Software reliability is introduced as failure free operation in specified enviourment. Various studies show that the software reliability i...
Analysis of Trust in Wireless Sensor Networks
Trust is an important factor in Wireless Sensor Network (WSN) that enables the sensor node to cooperate each other for their application. It makes the nodes in the wireless sensor networks to cope with uncertainty caused...
A Review of Image Contrast Enhancement Techniques
Images are an important part of today’s life. Images are captured through many devices such as cameras, mobile phones, scanners etc. The quality of images is degraded due to many reasons. The reasons may include adverse...
“Automatic Question Generation from Punjabi Text :A Review”
Question generation is an application of the NLP (Natural Language Processing). In automatic question generation the system generate multiple choice questions automatically from Punjabi text using question generation tec...
Privacy Preserving Based on PCA Transformation Using Data Perturbation Technique
Maintain confidentiality, privacy and security research in data mining (PPDM) is one of the biggest trends. Recent advances in data collection, data dissemination and related technologies have inaugurated a new era of re...