Implementation of Dadda and Array Multiplier Architectures Using Tanner Tool
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2011, Vol 2, Issue 2
Abstract
The heart of the MAC unit is the multiplier. Multipliers are the fundamental components in all digital processing systems. Many research efforts have been devoted to reducing the power dissipation of different multipliers. The largest contribution to the power consumption in a multiplier is due to generation and reduction of partial products. Among multipliers, tree multipliers are used in high speed applications such as filters, but these require large area. The carry-select-adder (CSA)-based radix multipliers, which have lower area overhead, employ a greater number of active transistors for the multiplication operation and hence consume more power. Hence in this work, proposing a new power aware VLSI architecture for 16 bit multiplication process for DADDA multiplier in a schematic editor using tanner tool, T-spice is used as simulator and w-editor is used for formal verification of the multiplier.
Authors and Affiliations
Addanki Purna Ramesh
Comparative study about Digital Image Watermarking Using DCT and robustness testing of technique
In the today’s world of rapidly growing internet services (Commercial and educational), security always comes in picture even at low level. Same way in the field of Information Technology and Computer Science and Enginee...
Algorithms for Mining Association Rules: An Overview
In this paper, we provide the basic concepts about association rule mining and compared existing algorithms for association rule mining techniques. Of course, a single article cannot describe all the algorithms in detail...
PERFORMANCE, ANALYSIS OF H.264/AVC LOSELESS VIDEO CODING USING HADAMARD TRANSFORM
An efficient lossless video codec based on H.264/AVC uses the Hadamard transform and adaptive truncation (HTAT).Transforms in their coding procedures are mostly video lossless coding algorithms. The HTAT method has adopt...
CLASSIFICATION TECHNIQUES APPLIED FOR INTRUSION DETECTION
Intrusion detection system (IDS) was designed to monitor the network activity and it identifies the normal and abnormal behavioral pattern in the network. If there was any abnormal pattern, it indicates the system is in...
A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET
In Mobile Ad-Hoc Networks (MANETs), mobile devices are operational with power. In order to utilize these energy operational devices resourcefully for transmission of data packets, many energy aware routing strategies are...