Operations on Signed Numbers
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 1
Abstract
Signed integers are normally represented using 2’s complement representation. Addition and subtraction of signed numbers is done similar to that of unsigned numbers. However carry (or borrow) is simply ignored. Unlike unsigned number carry (or borrow) does not mean overflow or error. Doubling of a signed number can be done by shift left. However, halving of a signed number cannot be done by shift right. Hence special arithmetic instruction SAR (Shift arithmetic right) is needed. We have defined an alternative representation for signed numbers. Here a positive number is represented by appended a zero (0) at right. Here a negative number is represented by inverting all bits in corresponding positive number. Two signed numbers are added by adding corresponding binary representation. After that carry is added to the result. Similarly two signed numbers are subtracted by subtracting corresponding binary representation. After that borrow is subtracted. Doubling and halving is done by ROL (Rotate left) and ROR (Rotate right) respectively.
Authors and Affiliations
Naika Sateesh Kumar , Muduganti Rathan Reddy , Y. Srinivas , J. Vijayasekhar , V K Narla
A NOVEL APPROACH FOR COMMUNITY DISCOVERY IN DYNAMIC NETWORKS
Recently, discovering aggressive communities has become an increasingly critical task. Many conclusion have been expected, most of which only use correlation structure. However, rich information is cipher in the content...
Modified Suffix Search Algorithm for Multiple String Matching
String Matching is now a prominent field in the area of Computer Science and it has many applications in the real world. A new algorithm for Suffix Search which uses chained hashing is proposed and this works well in mat...
COMPARATIVE ANALYSIS OF IMAGE DENOISING TECHNIQUES
These days the concept of denoising is not restricted to the field of photography or publication where image needs to be improved for printing purpose. It is quite useful tool in number of digital image processing applic...
Ad hoc Network and its Security Essentials
This In this paper we present an analysis of ad hoc network and how the attacks are prominence on the ad hoc network. Basically ad hoc network is a combination of several nodes which are linked over without wires which m...
Data Anonymization Approach For Privacy Preserving In Cloud
Private data such as electronic health records and banking transactions must be shared within the cloud environment to analysis or mine data for research purposes. Data privacy is one of the most concerned issues in big...