High Speed Design of an Information Lossless 8 Bit Carry Select Adder using CNT FET
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 3
Abstract
Basic reasons for research on reversible logic are the power consumption and heat dissipation. Existing systems have designed carry select added using TSG gate, for four bit addition. In the proposed system an enhancement of eight bit carry selection is performed with Fault tolerant Full Adder. Cnt fet is used in the implementation of the proposed eight bit carry select adder, which proves the reduction in power is more than 50% than that of existing system.
Authors and Affiliations
S. Manisha Sree Adithtya, S. P. Saraswathi, S. Niranjana
Vampire Attacks:Draining Life From Wireless Ad-Hoc Sensor Networks
Wireless Ad – hoc Sensor Network is a newly introduced platform in the field of remote sensing, data collection, analysis, rectification of the problem and research in various studies. Prior security work in this are...
Implementation And Analogy Of Fast Adder Using Fpga
Fast adder is a type of an adder used in digital logic to implement speed by reducing the amount of time required to determine the carry bit. this paper deals with high data rate of implementation of adders on the fie...
Side-Channel Passive Attacks Implementation to Cryptographic Hardware Using FPGA
This paper dealt with an FPGA based test bed used for injecting faults through clock glitches, to result in setup and hold violations. The UART interface is realized on FPGA to provide PC based controlling for this f...
Characterization of Accelerometer for Defense Application
The speed of the motor is typically measured in RPM (revolutions per minute). This can be obtained in many ways. A strobe light (stroboscope) is one of the apparatuses to quantify RPM. Another strategy can utilize op...
A Survey on Password Attack Resist Tools
Passwords are the key to all digital secrets. Passwords remain the most widely used authentication method despite their well-known security weaknesses. Text password is the most popular form of user authentication on...