EFFICIENT LOW POWER FIR FILTER DESIGN
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 0, Vol 5, Issue 1
Abstract
Design of area and power-efficient high-speed data path logic systems are one of the most substantial areas of research in VLSI system design. In digital adders, the speed of addition is limited by the time required to propagate a carry through the adder. Carry Select Adder (CSLA) is one of the fastest adders used in many data-processing processors to perform fast arithmetic functions. From the structure of the CSLA, it is clear that there is scope for reducing the area and power consumption in the CSLA. This work uses a simple and efficient gate-level modification to significantly reduce the area and power of the CSLA. The CSLA is used in many computational systems to alleviate the problem of carry propagation delay by independently generating multiple carries and then select a carry to generate the sum. However, the CSLA is not area efficient because it uses multiple pairs of Ripple Carry Adders (RCA) to generate partial sum and carry by considering carry input Cin = 0 and Cin = 1, then the final sum and carry are selected by the multiplexers (mux). This is modified by replacing the RCA with Cin=1 with BEC in the regular CSLA to achieve low area and power consumption. The performance of this CSLA is evaluated by implementing an FIR Filter by using the CSLA in the adder part. This work focuses on the performance of CSLA in terms of delay and power and it is found that CSLA is a high speed and low power adder.
Authors and Affiliations
Rashmi K. Bhojane*
AN IMPLEMENTATION OF “DECISION MAKER FOR EDUCATIONAL DOMAIN
Utilizing a decision support system is a proactive way to use data to manage, operate, and evaluate educational institute in a better way. Depending on the quality and availability of the underlying data, such a s...
THE NEW THEORY OF THE ONENESS OF SQUARE AND CIRCLE
Originally, Pi constant was understood as the ratio of circumference of a circle to its diameter. As the length of the circumference could not be measured due to its curvature, Exhaustion method was adopted for ma...
INFORMATION SECURITY AND SECURE SEARCH OVER ENCRYPTED DATA IN CLOUD STORAGE SERVICES
Cloud computing is most widely used as the next generation architecture of IT enterprises, that provide convenient remote access to data storage and application services. This cloud storage can potentially bring g...
Human Identification Using Palm-Vein Images Using Gabor Filter and Lalplacian Palm
Palm vein authentication is one of the modern biometric techniques, which employs the vein pattern in the human palm to verify the person. The merits of palm vein on classical biometric (e.g. fingerprint, iris, fa...
On the ICI Mitigation Techniques in High Mobility Mimo-OFDM Systems with Parallel ICI Cancellation Under Various Normalized Doppler Spreads
The signals of LF and VLF are rapidly alternated by the earth's surface; and there are various propagation models currently used by the wireless industry for signal transmission within the frequency range 150-1800 MHz....