Design and Implementation of Unsigned Multiplier Using COSA
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 11
Abstract
In this paper, design of COSA multiplier is presented, by introducing Carry Save Adder (CSA) in partial product lines. The multiplier given in this paper is modeled using VHDL (Very High Speed Integration Hardware Description Language) for 32-bit unsigned data. The four binary adder architectures belong to a different adder class based 32-bit unsigned integer multiplier. The four binary adder architectures are Ripple carry adder (RCA), Carry Look-ahead adder (CLAA), Carry Select adder (CSLA) and Conditional Sum adder (COSA). All these multipliers multiply two 32-bit unsigned integer values and give a product term of 64-bit values. A system’s performance is generally determined by the performance of the multiplier because the multiplier is generally the slowest element in the systemThis work evaluates the performance of the proposed designs in terms of delay, speed(frequency)and memory.
Authors and Affiliations
S. Varaprasad Babu| PG Scholar, Dept of ECE, Nova College of Engineering, JNTUK, A.P, India, T. Babu Rao| Asst.Prof, Dept.of ECE, Nova College of Engineering, JNTUK, A.P, India
Anonymous Asserts Profile Protection In Mobile Social Networks
In The Current Environment Through Social Network People Can Find Others And Make Their Own Network. An Individual User Can Have Multiple Accounts Of Social Networking Sites. In This Paper We Proposed An Algorithm Fo...
Web Based Fault Detection System
Embedded systems became an important part of our life. Addressing functional safety is a major challenge with increasing complexity. Typical examples of safety-critical embedded systems include vehicle safety or drive...
Study on Remote File Attacking – Inclusion & Detection
Presently applications of web are increasing exponentially. We are almost totally dependent on Internet and associated technologies. Huge applications in all walk of lives are inviting attacks on them. Their usage are...
FPGA Based Wireless Jamming Networks
A mobile jammeris a device which is used to jam signals of cell phone from receiving signals from base stations. Mobile jammer is used majorly where the disturbances that are occurred with the cell phones. So, in this...
In FSW, a rotating cylindrical pin tool is forced to plunge in to the plates to be welded and moved along their contact line. The tool penetrates into the work pieces. During this operation, frictional heat that is g...