Integration of Irreversible Gates in Reversible Circuits Using NCT Library
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 14, Issue 6
Abstract
The reversible circuit synthesis problem can be reduced to permutation group. This allows Schreier-Sims Algorithm for the strong generating set-finding problem to be used to synthesize reversible circuits using the NCT library. Applying novel optimization rules to minimize the number of gates gives better quantum cost than that shown in the literature. Applications on how to integrate any three irreversible Boolean functions on a single 3-bit reversible circuit will be shown
Authors and Affiliations
Mohamed Osman
Comparative Study between DCT and WaveletTransform Based Image Compression Algorithm
Abstract: Discrete cosine transform emerged as a popular mathematical tool in past decade and widely used inimage compression algorithm due to its high energy compaction capacity. But this energy compaction has som...
Using Ensemble Methods for Improving Classification of the KDD CUP ’99 Data Set
Abstract: The KDD CUP ’99 data set has been widely used for intrusion detection and pattern mining in the last decade or so. Umpteen number of experiments pertaining to classification have been conducted on it.Many resea...
Analysis of Bus Tracking System Using Gps on Smart Phones
Abstract: Public transport networks (PTNs) are difficult to use when the user is unfamiliar with the area they are traveling to. This is true for both infrequent users (including visitors) and regular users who need to t...
Driving Supportive System for Warning Traffic Sign Classification
Abstract: Traffic signs should be accurately identified in order to prevent vital road accidents and secure lives. The objective of this paper is to detect the warning traffic signs and recognize the message it is design...
Survey on Intrusion Detection System in Heterogeneous WSN Using Multipath Routing
[i]In this paper, we propose an survey on heterogeneous wireless sensor network (HWSN) and how the efficiency and redundancy management is exploit in the various methods .Here timeliness and security are main concern to...