Modular Design of Adders with Domino Logic 1
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
- Based on 180nm CMOS technology a 4 bit domino logic adder is designed for speed optimization over ripple carry adder. The adder is designed using 4 bit slice of carry look-ahead adder. Multiple slices are may be connected in ripple carry fashion to obtain higher order adders like 8, 16, 32 and others. This result in considerable reduction in time as compared to nominal ripple carry adder. Equations of sum, generate and propagate are implemented in domino CMOS logic using TSMC 180nm library to provide energy optimization. A 64 bit adder designed using 16 slices of Carry look-ahead adder gives latency of no more than time equivalent to 33 clocks with a transistor count of 1504. Average power results are also presented in this paper with selected input vectors. Average power is 4.65 microwatt
Authors and Affiliations
M. B. Damle, , Dr. S. S. Limaye,
Extracting and Aligning the Data Using Tag Path Clustering and CTVS Method
– Web database generate query result page based on user’s query. The information extracted automatically from query result page is used in many web applications. We present a novel method called Tag path clustering fo...
Healthcare monitoring system for web-enabled smart buildings
This paper describes the implementation of a wireless healthcare device in a web technology based smart building. The device has multiple communication interfaces like Bluetooth and 6LoWPAN, and multiple monitoring...
Design of Area Efficient High Speed Parallel Multiplier Using Low Power Technique on 0.18um technology
Based on the simplification of the addition operations in a low-power bypassing-based multiplier, a low-cost low-power bypassing-based multiplier is proposed. Row-bypassing multiplier, column-bypassing multiplier and bru...
GClustering Algorithm
—Graph clustering poses significant challenges because of the complex structures which may be present in the underlying data. The massive size of the underlying graph makes explicit structural enumeration very diff...
REVIEW OF PASSWORD PROTECTING MECHANISM
In the online communication, the password has an important role to secure user personal details. These passwords are taken to be secure and it must be retain personally. The third person may take a password witho...