Design and Implementation of Unsigned Multiplier Using COSA
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 11
Abstract
In this paper, design of COSA multiplier is presented, by introducing Carry Save Adder (CSA) in partial product lines. The multiplier given in this paper is modeled using VHDL (Very High Speed Integration Hardware Description Language) for 32-bit unsigned data. The four binary adder architectures belong to a different adder class based 32-bit unsigned integer multiplier. The four binary adder architectures are Ripple carry adder (RCA), Carry Look-ahead adder (CLAA), Carry Select adder (CSLA) and Conditional Sum adder (COSA). All these multipliers multiply two 32-bit unsigned integer values and give a product term of 64-bit values. A system’s performance is generally determined by the performance of the multiplier because the multiplier is generally the slowest element in the systemThis work evaluates the performance of the proposed designs in terms of delay, speed(frequency)and memory.
Authors and Affiliations
S. Varaprasad Babu| PG Scholar, Dept of ECE, Nova College of Engineering, JNTUK, A.P, India, T. Babu Rao| Asst.Prof, Dept.of ECE, Nova College of Engineering, JNTUK, A.P, India
Pv Based Interline Dynamic Voltage Restoring Device For Mitigation Of Power Quality Problems
Now a days the renewable energy sources importance has increased in the distribution system. In this paper an interline dynamic voltage restorer (IDVR) has proposed for the distribution systems to mitigate voltage sa...
Correction of Power Factor by Using Static Synchronous Compensator (STATCOM)
In this paper we introduced a new control scheme which uses one PFC Boost Converter connected in shunt with a diode rectifier to recover the harmonic current drawn by the single phase diode rectifier. The line curren...
An Innovative Self-assurance Methodology for Challenging AI Problems in graphical passwords
Numerous security primitives depend on hard numerical issues. Utilizing hard AI issues for security is rising as an energizing new worldview, however has been under-investigated. In this paper, we show another securi...
Scuttling Web Opportunities By Application Cramming
The web contains large data and it contains innumerable websites that is monitored by a tool or a program known as Crawler. The main goal of this paper is to focus on the web forum crawling techniques. In this paper,...
Evaluate the Key Management of Identity-Based Digital Signature To Routing In Cluster-Based Wireless Sensor Networks
Cluster-based information transmission in WSNs has been analyzed by scientists keeping in mind the end goal to accomplish the system scalability and administration, which capitalize on hub life and diminish transfer...