High Speed And Low Power Data Compressors
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 5
Abstract
The 3-2, 4-2 and 5-2 compressors are the basic components in many applications, in particular partial product summation in multipliers. In this paper novel architectures and designs of high speed, low power 3-2, 4-2 and 5-2 compressors capable of operating at ultra-low voltages are presented. The power consumption, delay and area of these new compressor architectures are compared with existing and recently proposed compressor architectures and are shown to perform better. The proposed architecture lays emphasis on the use of multiplexers in arithmetic circuits that result in high speed and efficient design. Also in all existing implementations of XOR gate and multiplexers, both output and its complement are available but current designs of compressors do not use these outputs efficiently. In the proposed architecture these outputs are efficiently utilized to improve the performance of compressors. The combination of low power, low transistor count and lesser delay makes the new compressors a viable option for efficient design.
Authors and Affiliations
K. Sunitha Rani, P. Srikanth
A Survey on Password Attack Resist Tools
Passwords are the key to all digital secrets. Passwords remain the most widely used authentication method despite their well-known security weaknesses. Text password is the most popular form of user authentication on...
Smart Antennas Adaptive Beamforming through Statistical Signal Processing Techniques
The smart antenna improves the performance of wireless communication systems by increasing channel capacity and spectrum efficiency, extending range of coverage, steering multiple beams to track several mobiles. Smar...
Infiltrate Testing Tool for Web Services Security
For distributed computing solutions Web Services are widely used. Web Services technology is used to integrate existing homogenous or heterogeneous enterprise applications. It can also be used to build inter-operable...
Sprinkling Data :Prevent Pollution Attacks Using Entropy Variation
The Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. Recently there are an increasing number of DDoS attacks against online services and Web applications. However the memoryless fea...
Location Monitoring algorithms for Wireless Sensor Networks
In this work we propose a privacy-preserving location monitoring system for wireless sensor networks. Here we design two in network location anonymization algorithms, namely, resource- and quality-aware algorithms, t...