Pipeline Hazards Resolution for a New Programmable Instruction Set RISC Processor
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 10
Abstract
The work presented in this paper is a part of a project that aims to concept and implement a hardwired programmable processor. A 32-bit RISC processor with customizable ALU (Arithmetic and Logic Unit) is designed then the pipeline technique is implemented is order to reach better performances. However the use of this technique can lead to several troubles called hazards that can affect the correct execution of the program. In this context, this paper identifies and analyzes all different hazards that can occur in this processor pipeline stages. Then detailed solutions are proposed, implemented and validated.
Authors and Affiliations
Hajer Najjar, Riad Bourguiba, Jaouhar Mouine
Internal Model Control of A Class of Continuous Linear Underactuated Systems
This paper presents an Internal Model Control (IMC) structure designed for a class of continuous linear underactuated systems. The study treats the case of Minimum Phase (MP) systems and those whose zero dynamics are not...
Comparison of Discrete Cosine Transforms (DCT), Discrete Fourier Transforms (DFT), and Discrete Wavelet Transforms (DWT) in Digital Image Watermarking
Digital Image Watermarking is used recently to secure the image by embedding another digital image. It is typically used to identify ownership of the copyright of the signal. Frequency domain transformation methods used...
Interactive Visual Decision Tree for Developing Detection Rules of Attacks on Web Applications
Creating detection rules of attacks on web applications is not a trivial task, especially when the attacks are launched by experienced hackers. In such a situation, human expertise is essential to produce effective resul...
Software Quality and Productivity Model for Small and Medium Enterprises
The enterprises today including small and medium enterprises (SMEs) are dependent on software to accomplish their objectives and maintain survivability and sustainability in their businesses. Although many studies in sof...
The cybercrime process : an overview of scientific challenges and methods
The aim of this article is to describe the cybercrime process and to identify all issues that appear at the different steps, between the detection of incident to the final report that must be exploitable for a judge. It...