DESIGN OF LOW POWER 32-BIT CSKA FOR HIGH SPEED APPLICATIONS
Journal Title: Elysium Journal of Engineering Research and Management - Year 2015, Vol 6, Issue 5
Abstract
Research in Very Large Scale Integration (VLSI) based design of Integrated Circuits (IC) addresses the issues of power, area and time consumption by the components used. These violates the speed of operation in DSP processors. To improve the speed, an optimized Design is required in such a way that the utilization of components are less. The inclusion of Multiplier and Accumulator (MAC) unit in the DSP processor Design performs the number of operation by using adders. Hence, the reduction in power, area and time in full adder is the necessary process in low power applications. Modern DSP processors uses the carry chain for optimization in carry forwarding path which reduces the delay effectively. The Carry Select Adder (CSLA) is the prominent solution to improve the speed of parallel operation. But, the result contains more number of carriers. Hence, multiplexers are used for selection of required sum output and associated carry. This paper optimizes the carry forwarding path by replacing the multiplexers with the Boolean function based gate construction. Moreover, the employment of carry-skip mechanism reduces the number of components required to design a 32-bit ripple carry adder. Besides, the application of Microwind- DSCH tool to create the layout of corresponding 32 bit adder. The DSCH tool visualizes the carry forwarding path and the time required to perform the operation effectively. The optimization provided in adder structure enhances the operational speed with minimum area occupation and power consumption.
Authors and Affiliations
Yamini C. , Krishnamurthy M
ENCRYPTION BASED INTRUSION DETECTION IN MANET USING AODV ROUTING PROTOCOL
Nowadays, Network is more vulnerable to the security attacks. Especially The effective operation of Mobile Ad-hoc networks (MANETs) compromised by a variety of security attacks depends upon the v...
A Model for Trusted Cloud Computing with Remote Attestation
Enforcing an interactive pattern in any association will force it to behave in the predictable way thorough which it can be secured against any unauthorized access leading to a trusted atmosphere. Security declaration in...
NFC SIGNALS BASED ON AN EFFECTIVE MOBILE ROBOT LOCALIZATION
A Complete Localization system for an indoor self - ruled vehicle equipped with Near Field Communication (NFC) reader to Interrogate tags located on the environment. Phase Measurement for real t...
SURVEY ON NETWORK DEFENCE SYSTEM [NDS] FOR CRYPTOGRAPHY AND HYBRID NETWORK SECURITY SYSTEM
Many computing systems have recently and preventing hacking is important in protecting business. Many significant security methodologies have been proposed to provide security between hacking. Fortunate...
STATE OF THE ART: TASK SCHEDULING ALGORITHMS IN A HETEROGENEOUS GRID COMPUTING ENVIRONMENT
Grid Computing is the distributed form of parallel computing which is used to solve large scale and complicated Problems. Grid Task scheduling is a NP complete problem. It is used to schedule a task on an appropriate gri...