An Power Efficient RNS Backward Converter for Novel Moduli Set { }
Journal Title: International Journal of Computational Engineering and Management IJCEM - Year 2014, Vol 17, Issue 6
Abstract
In this paper we propose new 3-moduli set for a large dynamic range of 6n-bits.Adder based RNS backward converter for this 3- moduli set is proposed based on New Chinese Remainder Theorem-I to achieve high performance. Hardware architecture of the proposed converter employs only Carry Save Adders (CSAs) and Carry Propagate Adders (CPAs). We implemented the proposed backward converter for different widths using standard cell 180nm CMOS technology libraries and result analysis indicated that, the proposed converter achieves about 20% power reduction over the other equivalent state of the art backward converters.
Authors and Affiliations
I. B. K. Raju, P. Rajesh Kumar, Ch. Divya
Analysis of Critical Strategic Factors for Successful Implementation of Poverty Alleviation Programmes in Nigeria
Poverty as a subject matter has been attracting increasing attention in the academic literature in recent years, and researchers from a variety of disciplines such as sociology, psychology, business, management, as well...
Comparative Performance Evaluation of XYZ Plane Based Segmentation and Entropy Based Segmentation for Pest detection
Image segmentation is the process of partitioning an image into multiple segments. The purpose of segmentation is to decompose the image into parts that are meaningful with respect to a particular application. In modern...
Software Effort and Cost Estimation using Software Requirement Specification
Process of estimating the effort required for the software development process is difficult and very complicated. There are many techniques to estimate the effort and cost of producing software, this article is based on...
A High Sensitive Approach for Gender Prediction by using Pupil Dilation
Pupil dilation is rarely analyzed in usability studies although it can be measured by most video-based eye-tracking systems and yields highly relevant workload information. Algorithms developed by the researchers for rec...
Evaluating the performance of Symmetric Key Algorithms: AES (Advanced Encryption Standard) and DES (Data Encryption Standard)
Encryption algorithms are known to be computational intensive. Internet and networks applications growing very fast, so the needs to protect. Encryption plays the very important role in information security system. On th...