Low Power High Speed Two’s Complement Multiplier
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2013, Vol 3, Issue 4
Abstract
To reduce the area of partial product array size and improve the speed which is generated by a radix-4 Modified Booth Encoded Multiplier is used. This reduction is possible without any increase in the delay of the partial product generation stage. This reduction provides faster compression of the partial product array and regular layouts in two’s complement multiplier. The proposed method is that the Radix-4 (Fixed-Width) Modified Booth Multipliers are used to achieve the low power and increase the speed by modifying the partial product matrix size. The Multiplier design implemented using Xilinx. The results based on a rough theoretical analysis and on logic synthesis showed its efficiency in terms of both area and delay. It is compared with Radix-4 (short bit-width) Modified booth encoded Multiplier.
Authors and Affiliations
P. Arulbalaji#1 , Mrs. K. Vanitha
A Study of Asynchronous Routing Protocols in Peer to Peer Networks
Mobile Ad Hoc Network (MANET) is a self organized and self configurable network where the mobile nodes move arbitrarily. It is a collection of multi-hop wireless mobile nodes that communicate with each other without cent...
Contrast Enhancement for Emissive Display Using Histogram Equalization and Bilateral Tone Adjustment
Contrast enhancement has an important role in image processing applications. Conventional contrast enhancement techniques often fail to produce satisfactory results for broad variety of low contrast images or canno...
‘On Demand Service Management’ For Next Generation Mobile Networks [LTE] Using Agents
The novelty of our work is the development of an optimal service provisioning and customer experience management framework, adding value to the mobile user community and also to the business development of network servic...
Anomaly Intrusion Detection System using Random Forests and k-Nearest Neighbor
This paper proposed a new approach to design the anomaly intrusion detection system using not only misuse but also anomaly intrusion detection for both training and detection of normal or attacks respectively. The...
Protected Data Forwarding by Erasure Coding to Cloud Storage System
Present so many mobile services are converting to cloud depended mobile services with highly communications and higher flexibility. We explore a unique mobile cloud infrastructure that attaches mobiles and cloud services...