High-speed Binary Adder
|
|
- Melvyn Harrington
- 7 years ago
- Views:
Transcription
1 Huey Ling High-speed Binary Adder Based on the bit pair (ai, bi) truth table, the carry propagate pi and carry generate gi have dominated the carry-lookahead formation process for more than two decades. This paper presents a new scheme in which the new carry propagation is examined by including the neighboring pairs (ai, bi; ai+,, b,+l). This scheme not only reduces the component count in design, but also requires fewer logic levels in adder implementation. n addition, this new algorithm oflers an astonishingly uniform loading in fan-in and fan-out nesting. ntroduction The traditional recursive formula for carry propagation has dominated the carry handling process in the computer industry for more than two decades. Today, adder designs based on a similar technique include Amdahl V6, BM 68, and BM 333. The recursive formulation of carry is based on the bit pair (ai, bi) truth table. By examining the local bit pair, carry propagate pi and carry generate gi are formed. The high-order carries are generated by nesting the pi and g, together. By considering the adjacent bit pairs (a,, bi; ai+l, bi+l), a new recursive formula is obtained for new carry propagation. The comparison between this new scheme and the existing scheme will be discussed in the following sections. The detailed implementation, circuits, and logic level count are also included. Surprisingly, this method offers an astonishingly uniform loading in fan-in/ fan-out nesting. The formation of new carry and sum This paper introduces a new approach to represent the new carry formation and propagation based on the concept of the complementing signal which was introduced in %5 []. To examine the impact of this complementing signal in performing binary addition and complementing signal look-ahead, one should evaluate the formation of Hi and Hi+, as a function of neighboring bit pairs (i, i + ). Let us consider adding two binary numbers A and B together, where A = ao2" + al2"-' + a2y-' a ip a,2' ; B = b2" + b,2"" + b,2"-' bi2n-i + * *. + bn2'. The relation among the new carry (Hi, Hi+,) and the neighboring bit pairs (ai, b,; ai+l, bi+j can be expressed as in Table [l]; all of these are generated by ai, b, or transmitted through the low-order bits, i +, i + 2,..., with the transmitting-enable switch ON. This sig- nal or new carry can only be terminated when the inhibitor is ON (ai+l + bi+, = ). H, plays both regular carry and complementing signal roles in performing binary addition. By grouping all the Hi, we obtain Hi =f(l, 2, 3, 5, 6, 7, 9,,, 2, 3, 4, 5) = aibi + Hi+l(Gi+lbi+l + ai+,li+, + ai+,bi+,) = aibi + Hi+l(ai+l + bi+,) = ki + H,+,T,+,, () where ki is the new complementing signal, Hi+, is the previous complementary signal, and Ti+, is the previous carry enable switch or the previous stage propagate. Equation () shows that new carry Hi can be formed locally by ki or produced remotely; Hi+, can be produced with the remote stage carry inhibitor not ON (ai+l + bi+, 56 Copyright 98 by nternational Business Machines Corporation. Copying is permitted without payment of royalty provided that () each reproduction is done without alteration and (2) the Journal reference and BM copyright notice are included on the first page. The title and abstract may be used without further permission in computer-based and other information-service systems. Permission to republish other excerpts should be obtained from the Editor. HUEY LNG BM. RES DEVELOP. VOL. 25 NO. 3 MAY 98
2 = ). The formation of sum Si can be expressed by a similar process. The truth table for Si is shown in Table 2. By grouping all the Si, we obtain Si =f(l, 2, 3, 4, 5, 6, 8, 9,, 3, 4, 5) ; Table The relation of new carry Hi with Hi+, and its neighboring bit pairs (ai, bi; ai+,, bi+,). i Hi = in relation ai bi bi+ with Hi+,, 2, 3 + ai6$hi+,gi+,bi+, + ai+6i+, + ai+,bi+,) Hi = = Q*Hi+l(ai+l + bi+j = [Uibi + Hi+,(Ui+, + bi+)3ai6i = HiT ; 5, 6, 9, + (ai V bi)(ai+l V bi+jri+, Hi+, = Hi+, = Hi+, = Hi = Hi+, = = (ai v bi)(ui+l v bi+l)ri+l ; 6 Hi+, = 4, 8 + (a, V bi)(ii+,bi+j ; 4, 5, 6, 8, 9, -* (ai V bi)[ri+,(ai+, V bi+j + ~i+6i+,l = (ai + bi)(ci + Qmi+](ai+, v bi+j + iii+6i+lq+l + ai+6i+,l = (ai + bi)(ci + bi)(ri+] + cii+6i+l) ; Hi+, = Hi = Hi+, = Hi+, = Hi+, = Hi+, = X Hi = Qibi + H,+,(a,+, + b,+j ; q = (ai + 6J{Ri+, + ; 4, 5, 6, 8, 9, + (ai + bi)ri = TiRi ; Hi+, = X Hi+, = X Hi+, = X 3, 4, 5 + aibi~i+,(ai+,bi+, + ai+,6,+, + ai+lbi+,) = a,bihi+&i+] + 4 +J = kihi+,ti+, ; Table 2 Sum Si formation. Si = f(, 2, 3, 4, 5, 6, 8, 9,, 3, 4, 5) = HiT + TiBi + kihi+,ti+, = (Hi V Ti) + kihi+,ti+,. (2) Hi+, = We have obtained a set of recursive formulae for both new cany Hi and sum Si. They are different from the conventional process. Before discovering the difference, let us examine the carry-look-ahead process. 2 Hi+, = 3 Hi+, = 4 5 Hi+, = New carry-look-ahead For ease of discussion. let us consider i = 3. We have 6 Hi+, = H3 = k.3 + H32T32 (34 By substituting i = 3, 29, and 28 in (3a), we obtain 8 9 Hi+, = Hi+, = = k2 + T2Sk2S + T2ST3k3 + T29T3T3k3 + T2ST3T3T32k32 (3b) By following a similar process, we obtain 2 3 Hi+, = H24 = k24 + T25k25 + T2ST26k26 + T25T26T27k27 + T25T26T27T2H28 4 Hi+, = 5 Hi+, = 57 BM J. RES. DEVELOP. VOL. 25 NO. 3 MAY 98 HUEY LNG
3 = k2 + T2k2 + T2T22k22 + T2T22T23k23 + T2T22T23T24H24 ; H6 = k6 + T7k7 + T7T8k8 + T7T8T9k9 + T7T8T9T2H2' By substituting (3b) for ( 9, we obtain H]6 = H*6 + zt6h2, where H*6 = k6 + T7k7 + T7T8k8 + T7T8T9k9 ; = T7T8T9T2 * By substituting (3a) and (3b) for (5), we obtain H6 = H*6 + Z*6H; + Z*,,$*,,H*,, + ZT&oZ*,4H28 The asterisk of HT6 represents the fact that HT6 can be implemented with one level of logic. Based on current switching technology, both fan-in and fan-out are equal to four with eight-emitter dotting; H,, can be implemented with two levels of logic. Comparison with the existing scheme Based on the local bit pair (a,, b,), carry C, and sum Si can be written in the form ', = g, + C,+,Pi, g, = a$, ; ( ) Si = a, tl b, V Ci+l, pi = a, + b,. Fori = 6, we have '6 = g6 + c7p6 * By substituting i = 7, 8,..., 9, C6 can be rewritten as '6 = g6 + p6(g7 + p7g8 + p7p8g9 + p7pl@9c2) = g6 + p6g7 + p87g8 + p6p7plsg9 + p87p8p9c2 = G6P + p6pc2 ' ( ) where G, and are the grouping of the following terms: G6P = gl6 + pl6g7 + p6p7g8 + p6p7plsg9 ; (2) '6P = p6p7p8p9 * (3) Similarly, C6 can be written in terms of CZ8: '6 = + pl#3pg2p + P6PP2PG24P + p6pp2~p24~g28p ' Equations (6), (7), and (8) are similar to (ll), (2), and (3); however, H*6 can be implemented with one level of logic, whereas G,, cannot. By expanding (7) and (2) we 58 obtain Equation (4) contains eight terms, whereas (5) contains fifteen. With current available technology, the former can be implemented with one level of logic (this is shown in detail in the next section); the latter can only be implemented with two levels of logic. Let us further examine the ith-digit carry formation. For (l), the carry is generated by local complementing signal k,, and the remote carry Hi+, is controlled by remote bit pair (ai+l + 6i+); whereas for (lo), the carry is generated by local carry g,, and the remote carry C,+, is controlled by local bit pair (a, + b,). From the carry-lookahead point of view, () offers faster resolution, whereas the latter is one stage slower. That is why (4) contains only eight terms, and (5), fifteen. To illustrate the step-by-step operation, two examples are given. Example Assume the contents of A and B registers to be as shown and find their sum; A register OOO B register oooo The k, and Ti can be implemented with one level of logic: k, OOOOOOOOO Ti HUEY LNG BM J. RES. DEVELOP. VOL. 25 NO. 3 MAY 98
4 The complementary signals can grouping ki and Ti together. This level of logic: Hi be implemented by process requires one The sum digit Si is implemented in parallel with Hi; the result of Hi will force Si to select one value between Hi = and Hi = : Si OOOO This example demonstrates that it is possible to implement a 32-bit adder with three levels of logic with the hardware constraints indicated in the previous section. The detailed implementation of Si is discussed in the next section. Example 2 Assuming that the contents of index, base, and displacement registers are as shown, compute vir- the tual address. (To test the generality of this scheme, odd contents are purposely chosen; in the normal mode of operation, an EXCPN will occur.) ndex register Base register ooooooooo OOOOOOOOOOOOlOOlllOlllOl Displacement register To implement the carry-save adder (CSA) requires one level of logic: si ci OOOOOOOOOOO OOOOOOOOOOOOOOOOllllOlllllO mplementation of ki and Ti requires one additional level of logic: ki OOOOOOOOOOOOOlOlOOOOOOO Ti mplementation of the complementary signal requires one level of logic to group ki and Ti together: Hi The address digit Si is implemented in parallel with Hi; the result of Hi will force S, to select one value between Hi = and : Si This example demonstrates that the AGEN adder can be implemented with four rather than six levels of logic, as is the case in current machine organization. The detailed implementation of Si (the address) is discussed in the next section. The logic implementation of every fourth bit (i = 3,27,23, 9, 6, 5,,7,3,) is shown in the Appendix of this paper. mplementation The detailed implementation can be divided into two categories: binary addition and subtraction, and address generation. e Addition and subtraction Equation (3b) is a general representation of the new carry-look-ahead process. For ADDTON, k3, = ; therefore, the fifth term in (3b) is dropped and Hz, can be written as HZO = k28 + TZ9kZ9 + T29T3k3 + TZ9T3T3k3 * (44 For SUBTRACTON, there is a HOT ONE carry input from bit 3; thus Hz, can be written as = kzo + T29kZ9 + TZ9T3k3 + T29T3T3k3 + T29T3T3 ' (4b) Equation (2) shows that Si is a function of Hi and Hi+,. For ease of implementation, this equation is rewritten in the form Si = (Hi V Ti) + k,h,+,t,+, = [(kt + q+,t,+,) v Til + k,h,+,ti+, = Hi+,(TiTi+, + k,t,+,) + Ri+,EiTi + kiq + ktiti+,. ( 6) Equation (6) demonstrates that Si can be written in the conditional form S,(Hi+, = ) = ki V Ti ; S,(Hi+, = ) = qt,+, + kiti+, + kif, + &TiTi+,. The general expression of SUM Si can be written as Si = Hi+,(ui+, + bi+,)(a, V b,) + Bi+,(ui V bi) + (ai+] + bi+& v bi). Fori = 3, we have '3 = H3Z(a32 + '32)('3 '3,) + n32(a3] b3]) + (a32 + b32)(~3 V b3). For i =, we obtain So = H,(a, + b,)(ao v bo) + qa v bo) + (a, + b,)(ao v bo) ; ( 7) H = k, + T2kz + T2T3k3 + T2T3T4H4 = H*, + ;H, ; ( 8) 59 BM J. RES. DEVELOP. VOL. 25 NO. 3 MAY 98 HUEY LNG
5 H4 = k4 + T5k5 + T,T,k, + T5T,T7k7 + T5T,T7TnHn = H*, + *,H, ; ( 9) H, = H*, + *,H,, ; (2) H,, = H*,, + *,,H,,. (2) By substituting (2) for (2, we have H, = H*, + *,H*,, + *,*,,H,,. (22) Similarly, we obtain H4 and H,: H, = HZ +,*H,* + ;,*H;~ +,*;T~,,; (23) H, = H; + ;H,* + C CH; + T,*,*HTz * * * * + 4 n lzhm. (24) By substituting Eqs. (22), (23), and (24) for Eqs. (8), (9), (2), and (2), Eq. (7) can be written as So = (H*, + *,H*, + *,*,H*, + *,:*,H*,, **** +,4$ 2H(3)(a] + bl)(ao + (H*, + ;H: + *,*,H*, + *,*,*,H*,, + ;:,*;p,,)(a, v bo) + (a, + b,)(ao v bo) ; = (HT + Tg + T,* H,* + Tc,*fQ(a + b,) x ( bo) + z*,z~l*,z*,zh,(al + bl)(ao + (H*, + *,H*, + *,*,H*, + *,*,*,H*,,) X (*,*,*,*,, t B,,)(u, v bo) + (a + b,)(ao v bo). (25) By using the Sklansky conditional-sum method [2], (25). can be written as so = (H*, + *,H; + *,*,H*, + ***, 4~n~:2) x (a, + b,)(ao v bo) + (a, + b,)(ao v bo) + (H*, + *,H*, + *,*,H*, + *,*,*,H*,,) x (ao bo) = + *,~*,*,,(u, + b,)(a V bo) [H,, = + (H*, + *,H*, + *,*,H*, + ;*,*,H*,,) X (*,*,*,:,)(u, V bo) [H,, =. The hardware implementation of So is included in the Appendix. Equation (9) has indicated that H,, can be implemented with two levels of logic. Let us examine the individual terms of So. t is clearly pointed out that they also require only two levels of logic to be implemented. That is to say, when H,, is ready, So can be obtained by using one additional level of logic. We have proved, by using current switching logic, that one can implement a 32-bit adder by consuming only three levels of logic. Address generation n the address generation process, we are dealing with positive numbers only. Therefore, k,, =. The output of the (3, 2) carry-save adder provides the si and ci+, corresponding to the ai and b, bit pairs. n addition, Xi and B, both are 32 bits in length. However, Di has only a 2-bit width. For i = -8, the output of the carry-save adder has a special pattern; si and ci+, will not have the form n general, the output of CSA will appear as Therefore, for i = 9-3, St appears as usual: St = (Hi V Ti) + kihi+,ti,,. For i = -8, Si appears as si = (Hi v Ti). The detailed implementations for i from,3,7,, 5, 6, 9, 23, 27, and 3 are shown in the Appendix. Summary t is intended in this paper to speed up the carry propagation for examining two bit pairs. The formulation of H*,, contains eight terms as compared to that of the regular carry-look-ahead process, where G,, contains fifteen terms. t is possible to implement H*,, with one level of logic, whereas it is not possible with G6p. The formulation of sum Si in this new process will contain slightly more terms; however, they are not in the critical path. References. H. Ling, High Speed Binary Parallel Adder, EEE Trans. Electron. Computers EC-5, (%). 2. J. Sklansky, Conditional-Sum Addition Logic, EEE Trans. Electron. Computers EC-9, (96). 6 HUEY LNG BM J. RES. DEVELOP. VOL. 25 NO. 3 MAY 98
6 Appendix Level 3 OX pr > 3- x 6 BM J. RES. DEVELOP. VOL. 25 NO. 3 MAY 98 HUEY LNG
7 i=3 Level Level 2 Level 3 -ox i=7 Level Level 2 Level 3 62
8 i'll Level Level 2 R;2 - X.. q A A., c X Ȳ Ti2=l"-Fi 3 i= 6 Level Level 2 Level 3 - Hi L BM. RES. DEVELOP. VOL. 25 NO. 3 MAY 98 HUEY LNG
9 i= 5 Level Level 2 Level 3 Level Level 2 Level 3 S28- - T28 c2-. T28 64 HUEY LNG ibm. RES. DEVELOP. VOL. 25 NO. 3 MAY 98
10 Level Level 2 Level BM J. RES. DEVELOP. VOL. 25 NO. 3 MAY 98 HUEY LNG
11 i=23 Level Level 2 Level 3 Level Level 2 Level 3 Received September,98; revised November 26,98 The author is located at the BM Thomas J. Watson Research Center, Yorktown Heights, New York HUEY LNG BM J. RES. DEVELOP. VOL. 2s NO. 3 MAY lwll
Binary Adders: Half Adders and Full Adders
Binary Adders: Half Adders and Full Adders In this set of slides, we present the two basic types of adders: 1. Half adders, and 2. Full adders. Each type of adder functions to add two binary bits. In order
More informationC H A P T E R. Logic Circuits
C H A P T E R Logic Circuits Many important functions are naturally computed with straight-line programs, programs without loops or branches. Such computations are conveniently described with circuits,
More information(Refer Slide Time: 00:01:16 min)
Digital Computer Organization Prof. P. K. Biswas Department of Electronic & Electrical Communication Engineering Indian Institute of Technology, Kharagpur Lecture No. # 04 CPU Design: Tirning & Control
More informationRN-Codings: New Insights and Some Applications
RN-Codings: New Insights and Some Applications Abstract During any composite computation there is a constant need for rounding intermediate results before they can participate in further processing. Recently
More informationAdder.PPT(10/1/2009) 5.1. Lecture 13. Adder Circuits
Adder.T(//29) 5. Lecture 3 Adder ircuits Objectives Understand how to add both signed and unsigned numbers Appreciate how the delay of an adder circuit depends on the data values that are being added together
More informationCOMBINATIONAL CIRCUITS
COMBINATIONAL CIRCUITS http://www.tutorialspoint.com/computer_logical_organization/combinational_circuits.htm Copyright tutorialspoint.com Combinational circuit is a circuit in which we combine the different
More informationAn Efficient RNS to Binary Converter Using the Moduli Set {2n + 1, 2n, 2n 1}
An Efficient RNS to Binary Converter Using the oduli Set {n + 1, n, n 1} Kazeem Alagbe Gbolagade 1,, ember, IEEE and Sorin Dan Cotofana 1, Senior ember IEEE, 1. Computer Engineering Laboratory, Delft University
More informationTo convert an arbitrary power of 2 into its English equivalent, remember the rules of exponential arithmetic:
Binary Numbers In computer science we deal almost exclusively with binary numbers. it will be very helpful to memorize some binary constants and their decimal and English equivalents. By English equivalents
More information1-bit Full Adder. Adders. The expressions for the sum and carry lead to the following unified implementation:
1-bit Full Adder 1 The expressions for the sum and carry lead to the followg unified implementation: Sum A Carry C B This implementation requires only two levels of logic (ignorg the verters as customary).
More informationCSE140 Homework #7 - Solution
CSE140 Spring2013 CSE140 Homework #7 - Solution You must SHOW ALL STEPS for obtaining the solution. Reporting the correct answer, without showing the work performed at each step will result in getting
More information3.Basic Gate Combinations
3.Basic Gate Combinations 3.1 TTL NAND Gate In logic circuits transistors play the role of switches. For those in the TTL gate the conducting state (on) occurs when the baseemmiter signal is high, and
More informationCHAPTER 3 Boolean Algebra and Digital Logic
CHAPTER 3 Boolean Algebra and Digital Logic 3.1 Introduction 121 3.2 Boolean Algebra 122 3.2.1 Boolean Expressions 123 3.2.2 Boolean Identities 124 3.2.3 Simplification of Boolean Expressions 126 3.2.4
More informationCSI 333 Lecture 1 Number Systems
CSI 333 Lecture 1 Number Systems 1 1 / 23 Basics of Number Systems Ref: Appendix C of Deitel & Deitel. Weighted Positional Notation: 192 = 2 10 0 + 9 10 1 + 1 10 2 General: Digit sequence : d n 1 d n 2...
More informationImplementation of Modified Booth Algorithm (Radix 4) and its Comparison with Booth Algorithm (Radix-2)
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 6 (2013), pp. 683-690 Research India Publications http://www.ripublication.com/aeee.htm Implementation of Modified Booth
More informationLet s put together a Manual Processor
Lecture 14 Let s put together a Manual Processor Hardware Lecture 14 Slide 1 The processor Inside every computer there is at least one processor which can take an instruction, some operands and produce
More informationRN-coding of Numbers: New Insights and Some Applications
RN-coding of Numbers: New Insights and Some Applications Peter Kornerup Dept. of Mathematics and Computer Science SDU, Odense, Denmark & Jean-Michel Muller LIP/Arénaire (CRNS-ENS Lyon-INRIA-UCBL) Lyon,
More informationUnderstanding Logic Design
Understanding Logic Design ppendix of your Textbook does not have the needed background information. This document supplements it. When you write add DD R0, R1, R2, you imagine something like this: R1
More informationMechanics 1: Conservation of Energy and Momentum
Mechanics : Conservation of Energy and Momentum If a certain quantity associated with a system does not change in time. We say that it is conserved, and the system possesses a conservation law. Conservation
More informationearlier in the semester: The Full adder above adds two bits and the output is at the end. So if we do this eight times, we would have an 8-bit adder.
The circuit created is an 8-bit adder. The 8-bit adder adds two 8-bit binary inputs and the result is produced in the output. In order to create a Full 8-bit adder, I could use eight Full -bit adders and
More informationSistemas Digitais I LESI - 2º ano
Sistemas Digitais I LESI - 2º ano Lesson 6 - Combinational Design Practices Prof. João Miguel Fernandes (miguel@di.uminho.pt) Dept. Informática UNIVERSIDADE DO MINHO ESCOLA DE ENGENHARIA - PLDs (1) - The
More informationScholarship Help for Technology Students
i NOVEMBER 2014 Sli Hl f Tl S S i il ili l j i il i v f $150000 i li VN l f li Pl Tl N f xl i ii f v Pi Oli i N fi f i f vl i v f f li f i v f Viii Sli f vill f flli j: Pl Tl Mi Alli Hl li A Ifi Tl li
More informationChapter 2 Logic Gates and Introduction to Computer Architecture
Chapter 2 Logic Gates and Introduction to Computer Architecture 2.1 Introduction The basic components of an Integrated Circuit (IC) is logic gates which made of transistors, in digital system there are
More informationReliability Applications (Independence and Bayes Rule)
Reliability Applications (Independence and Bayes Rule ECE 313 Probability with Engineering Applications Lecture 5 Professor Ravi K. Iyer University of Illinois Today s Topics Review of Physical vs. Stochastic
More informationBINARY CODED DECIMAL: B.C.D.
BINARY CODED DECIMAL: B.C.D. ANOTHER METHOD TO REPRESENT DECIMAL NUMBERS USEFUL BECAUSE MANY DIGITAL DEVICES PROCESS + DISPLAY NUMBERS IN TENS IN BCD EACH NUMBER IS DEFINED BY A BINARY CODE OF 4 BITS.
More informationChapter 4 Register Transfer and Microoperations. Section 4.1 Register Transfer Language
Chapter 4 Register Transfer and Microoperations Section 4.1 Register Transfer Language Digital systems are composed of modules that are constructed from digital components, such as registers, decoders,
More informationChapter 6: From Digital-to-Analog and Back Again
Chapter 6: From Digital-to-Analog and Back Again Overview Often the information you want to capture in an experiment originates in the laboratory as an analog voltage or a current. Sometimes you want to
More informationBinary full adder. 2-bit ripple-carry adder. CSE 370 Spring 2006 Introduction to Digital Design Lecture 12: Adders
SE 370 Spring 2006 Introduction to Digital Design Lecture 12: dders Last Lecture Ls and Ls Today dders inary full 1-bit full omputes sum, carry-out arry-in allows cascaded s = xor xor = + + 32 ND2 11 ND2
More informationLFSR BASED COUNTERS AVINASH AJANE, B.E. A technical report submitted to the Graduate School. in partial fulfillment of the requirements
LFSR BASED COUNTERS BY AVINASH AJANE, B.E A technical report submitted to the Graduate School in partial fulfillment of the requirements for the degree Master of Science in Electrical Engineering New Mexico
More informationLab 1: Full Adder 0.0
Lab 1: Full Adder 0.0 Introduction In this lab you will design a simple digital circuit called a full adder. You will then use logic gates to draw a schematic for the circuit. Finally, you will verify
More information1.- L a m e j o r o p c ió n e s c l o na r e l d i s co ( s e e x p li c a r á d es p u é s ).
PROCEDIMIENTO DE RECUPERACION Y COPIAS DE SEGURIDAD DEL CORTAFUEGOS LINUX P ar a p od e r re c u p e ra r nu e s t r o c o rt a f u e go s an t e un d es a s t r e ( r ot u r a d e l di s c o o d e l a
More informationLogic in Computer Science: Logic Gates
Logic in Computer Science: Logic Gates Lila Kari The University of Western Ontario Logic in Computer Science: Logic Gates CS2209, Applied Logic for Computer Science 1 / 49 Logic and bit operations Computers
More informationexclusive-or and Binary Adder R eouven Elbaz reouven@uwaterloo.ca Office room: DC3576
exclusive-or and Binary Adder R eouven Elbaz reouven@uwaterloo.ca Office room: DC3576 Outline exclusive OR gate (XOR) Definition Properties Examples of Applications Odd Function Parity Generation and Checking
More informationAN IMPROVED DESIGN OF REVERSIBLE BINARY TO BINARY CODED DECIMAL CONVERTER FOR BINARY CODED DECIMAL MULTIPLICATION
American Journal of Applied Sciences 11 (1): 69-73, 2014 ISSN: 1546-9239 2014 Science Publication doi:10.3844/ajassp.2014.69.73 Published Online 11 (1) 2014 (http://www.thescipub.com/ajas.toc) AN IMPROVED
More informationFloating Point Fused Add-Subtract and Fused Dot-Product Units
Floating Point Fused Add-Subtract and Fused Dot-Product Units S. Kishor [1], S. P. Prakash [2] PG Scholar (VLSI DESIGN), Department of ECE Bannari Amman Institute of Technology, Sathyamangalam, Tamil Nadu,
More informationApplication Note 83 Fundamentals of RS 232 Serial Communications
Application Note 83 Fundamentals of Serial Communications Due to it s relative simplicity and low hardware overhead (as compared to parallel interfacing), serial communications is used extensively within
More informationNEW adder cells are useful for designing larger circuits despite increase in transistor count by four per cell.
CHAPTER 4 THE ADDER The adder is one of the most critical components of a processor, as it is used in the Arithmetic Logic Unit (ALU), in the floating-point unit and for address generation in case of cache
More informationLECTURE NOTES ON MACROECONOMIC PRINCIPLES
LECTURE NOTES ON MACROECONOMIC PRINCIPLES Peter Ireland Department of Economics Boston College peter.ireland@bc.edu http://www2.bc.edu/peter-ireland/ec132.html Copyright (c) 2013 by Peter Ireland. Redistribution
More informationLecture 8: Binary Multiplication & Division
Lecture 8: Binary Multiplication & Division Today s topics: Addition/Subtraction Multiplication Division Reminder: get started early on assignment 3 1 2 s Complement Signed Numbers two = 0 ten 0001 two
More informationNUMBER SYSTEMS APPENDIX D. You will learn about the following in this appendix:
APPENDIX D NUMBER SYSTEMS You will learn about the following in this appendix: The four important number systems in computing binary, octal, decimal, and hexadecimal. A number system converter program
More informationInfluence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
More informationContinued Fractions and the Euclidean Algorithm
Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction
More informationReliability. 26.1 Reliability Models. Chapter 26 Page 1
Chapter 26 Page 1 Reliability Although the technological achievements of the last 50 years can hardly be disputed, there is one weakness in all mankind's devices. That is the possibility of failure. What
More informationCombinational Logic Design
Chapter 4 Combinational Logic Design The foundations for the design of digital logic circuits were established in the preceding chapters. The elements of Boolean algebra (two-element switching algebra
More informationBasic Logic Gates Richard E. Haskell
BASIC LOGIC GATES 1 E Basic Logic Gates Richard E. Haskell All digital systems are made from a few basic digital circuits that we call logic gates. These circuits perform the basic logic functions that
More informationUsing Logic to Design Computer Components
CHAPTER 13 Using Logic to Design Computer Components Parallel and sequential operation In this chapter we shall see that the propositional logic studied in the previous chapter can be used to design digital
More informationFlip-Flops, Registers, Counters, and a Simple Processor
June 8, 22 5:56 vra235_ch7 Sheet number Page number 349 black chapter 7 Flip-Flops, Registers, Counters, and a Simple Processor 7. Ng f3, h7 h6 349 June 8, 22 5:56 vra235_ch7 Sheet number 2 Page number
More informationProperties of sequences Since a sequence is a special kind of function it has analogous properties to functions:
Sequences and Series A sequence is a special kind of function whose domain is N - the set of natural numbers. The range of a sequence is the collection of terms that make up the sequence. Just as the word
More informationCOMP 250 Fall 2012 lecture 2 binary representations Sept. 11, 2012
Binary numbers The reason humans represent numbers using decimal (the ten digits from 0,1,... 9) is that we have ten fingers. There is no other reason than that. There is nothing special otherwise about
More informationC o a t i a n P u b l i c D e b tm a n a g e m e n t a n d C h a l l e n g e s o f M a k e t D e v e l o p m e n t Z a g e bo 8 t h A p i l 2 0 1 1 h t t pdd w w wp i j fp h D p u b l i c2 d e b td S t
More informationMath 115 Spring 2011 Written Homework 5 Solutions
. Evaluate each series. a) 4 7 0... 55 Math 5 Spring 0 Written Homework 5 Solutions Solution: We note that the associated sequence, 4, 7, 0,..., 55 appears to be an arithmetic sequence. If the sequence
More informationMathematics 205 HWK 6 Solutions Section 13.3 p627. Note: Remember that boldface is being used here, rather than overhead arrows, to indicate vectors.
Mathematics 205 HWK 6 Solutions Section 13.3 p627 Note: Remember that boldface is being used here, rather than overhead arrows, to indicate vectors. Problem 5, 13.3, p627. Given a = 2j + k or a = (0,2,
More informationSafety technique. Emergency stop module BO 5988 safemaster
Safety technique Emergency stop module BO 5988 safemaster 0221562 Function diagram Pushbutton on Mains or emergencystop () K1 According to EC Directive for machines 98/37/EG According to IEC/E 60204-1
More informationSCO TT G LEA SO N D EM O Z G EB R E-
SCO TT G LEA SO N D EM O Z G EB R E- EG Z IA B H ER e d it o r s N ) LICA TIO N S A N D M ETH O D S t DVD N CLUDED C o n t e n Ls Pr e fa c e x v G l o b a l N a v i g a t i o n Sa t e llit e S y s t e
More informationLecture 8: Synchronous Digital Systems
Lecture 8: Synchronous Digital Systems The distinguishing feature of a synchronous digital system is that the circuit only changes in response to a system clock. For example, consider the edge triggered
More informationDigital Logic Design. Basics Combinational Circuits Sequential Circuits. Pu-Jen Cheng
Digital Logic Design Basics Combinational Circuits Sequential Circuits Pu-Jen Cheng Adapted from the slides prepared by S. Dandamudi for the book, Fundamentals of Computer Organization and Design. Introduction
More informationDHL EXPRESS CANADA E-BILL STANDARD SPECIFICATIONS
DHL EXPRESS CANADA E-BILL STANDARD SPECIFICATIONS 1 E-Bill Standard Layout A B C D E F G Field/ DHL Account Number Billing Customer Name Billing Customer Address Billing Customer City Billing Customer
More informationGates & Boolean Algebra. Boolean Operators. Combinational Logic. Introduction
Introduction Gates & Boolean lgebra Boolean algebra: named after mathematician George Boole (85 864). 2-valued algebra. digital circuit can have one of 2 values. Signal between and volt =, between 4 and
More informationMICROPROCESSOR AND MICROCOMPUTER BASICS
Introduction MICROPROCESSOR AND MICROCOMPUTER BASICS At present there are many types and sizes of computers available. These computers are designed and constructed based on digital and Integrated Circuit
More informationProperties of Stabilizing Computations
Theory and Applications of Mathematics & Computer Science 5 (1) (2015) 71 93 Properties of Stabilizing Computations Mark Burgin a a University of California, Los Angeles 405 Hilgard Ave. Los Angeles, CA
More informationERROR DETECTION AND CORRECTION
Supplement to Logic and Computer Design Fundamentals 3rd Edition 1 ERROR DETECTION AND CORRECTION Selected topics not covered in the third edition of Logic and Computer Design Fundamentals are provided
More information8085 INSTRUCTION SET
DATA TRANSFER INSTRUCTIONS Opcode Operand Description 8085 INSTRUCTION SET INSTRUCTION DETAILS Copy from source to destination OV Rd, Rs This instruction copies the contents of the source, Rs register
More informationUnit 1 Number Sense. In this unit, students will study repeating decimals, percents, fractions, decimals, and proportions.
Unit 1 Number Sense In this unit, students will study repeating decimals, percents, fractions, decimals, and proportions. BLM Three Types of Percent Problems (p L-34) is a summary BLM for the material
More informationCOMBINATIONAL and SEQUENTIAL LOGIC CIRCUITS Hardware implementation and software design
PH-315 COMINATIONAL and SEUENTIAL LOGIC CIRCUITS Hardware implementation and software design A La Rosa I PURPOSE: To familiarize with combinational and sequential logic circuits Combinational circuits
More informationDIGITAL COUNTERS. Q B Q A = 00 initially. Q B Q A = 01 after the first clock pulse.
DIGITAL COUNTERS http://www.tutorialspoint.com/computer_logical_organization/digital_counters.htm Copyright tutorialspoint.com Counter is a sequential circuit. A digital circuit which is used for a counting
More informationSequential Logic Design Principles.Latches and Flip-Flops
Sequential Logic Design Principles.Latches and Flip-Flops Doru Todinca Department of Computers Politehnica University of Timisoara Outline Introduction Bistable Elements Latches and Flip-Flops S-R Latch
More informationTwo's Complement Adder/Subtractor Lab L03
Two's Complement Adder/Subtractor Lab L03 Introduction Computers are usually designed to perform indirect subtraction instead of direct subtraction. Adding -B to A is equivalent to subtracting B from A,
More informationAnalysis of Algorithms I: Optimal Binary Search Trees
Analysis of Algorithms I: Optimal Binary Search Trees Xi Chen Columbia University Given a set of n keys K = {k 1,..., k n } in sorted order: k 1 < k 2 < < k n we wish to build an optimal binary search
More informationMath 319 Problem Set #3 Solution 21 February 2002
Math 319 Problem Set #3 Solution 21 February 2002 1. ( 2.1, problem 15) Find integers a 1, a 2, a 3, a 4, a 5 such that every integer x satisfies at least one of the congruences x a 1 (mod 2), x a 2 (mod
More informationDEPARTMENT OF INFORMATION TECHNLOGY
DRONACHARYA GROUP OF INSTITUTIONS, GREATER NOIDA Affiliated to Mahamaya Technical University, Noida Approved by AICTE DEPARTMENT OF INFORMATION TECHNLOGY Lab Manual for Computer Organization Lab ECS-453
More informationLINEAR INEQUALITIES. Mathematics is the art of saying many things in many different ways. MAXWELL
Chapter 6 LINEAR INEQUALITIES 6.1 Introduction Mathematics is the art of saying many things in many different ways. MAXWELL In earlier classes, we have studied equations in one variable and two variables
More informationChapter 7. Registers & Register Transfers. J.J. Shann. J. J. Shann
Chapter 7 Registers & Register Transfers J. J. Shann J.J. Shann Chapter Overview 7- Registers and Load Enable 7-2 Register Transfers 7-3 Register Transfer Operations 7-4 A Note for VHDL and Verilog Users
More informationPass Gate Logic An alternative to implementing complex logic is to realize it using a logic network of pass transistors (switches).
Pass Gate Logic n alternative to implementing complex logic is to realize it using a logic network of pass transistors (switches). Switch Network Regeneration is performed via a buffer. We have already
More informationCMOS Binary Full Adder
CMOS Binary Full Adder A Survey of Possible Implementations Group : Eren Turgay Aaron Daniels Michael Bacelieri William Berry - - Table of Contents Key Terminology...- - Introduction...- 3 - Design Architectures...-
More informationLecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)
Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same
More informationBOOLEAN ALGEBRA & LOGIC GATES
BOOLEAN ALGEBRA & LOGIC GATES Logic gates are electronic circuits that can be used to implement the most elementary logic expressions, also known as Boolean expressions. The logic gate is the most basic
More informationLecture 5: Gate Logic Logic Optimization
Lecture 5: Gate Logic Logic Optimization MAH, AEN EE271 Lecture 5 1 Overview Reading McCluskey, Logic Design Principles- or any text in boolean algebra Introduction We could design at the level of irsim
More informationMixed Logic A B A B. 1. Ignore all bubbles on logic gates and inverters. This means
Mixed Logic Introduction Mixed logic is a gate-level design methodology used in industry. It allows a digital logic circuit designer the functional description of the circuit from its physical implementation.
More informationLecture 1: Course overview, circuits, and formulas
Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik
More informationDigital System Design Prof. D Roychoudhry Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Digital System Design Prof. D Roychoudhry Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 04 Digital Logic II May, I before starting the today s lecture
More informationGuide to TCP/IP, Third Edition. Chapter 2: IP Addressing and Related Topics
Guide to TCP/IP, Third Edition Chapter 2: IP Addressing and Related Topics Objectives Understand IP addressing, anatomy and structures, and addresses from a computer s point of view Recognize and describe
More informationRegular Languages and Finite Automata
Regular Languages and Finite Automata 1 Introduction Hing Leung Department of Computer Science New Mexico State University Sep 16, 2010 In 1943, McCulloch and Pitts [4] published a pioneering work on a
More information1. True or False? A voltage level in the range 0 to 2 volts is interpreted as a binary 1.
File: chap04, Chapter 04 1. True or False? A voltage level in the range 0 to 2 volts is interpreted as a binary 1. 2. True or False? A gate is a device that accepts a single input signal and produces one
More information1 Cubic Hermite Spline Interpolation
cs412: introduction to numerical analysis 10/26/10 Lecture 13: Cubic Hermite Spline Interpolation II Instructor: Professor Amos Ron Scribes: Yunpeng Li, Mark Cowlishaw, Nathanael Fillmore 1 Cubic Hermite
More informationNAME AND SURNAME. TIME: 1 hour 30 minutes 1/6
E.T.S.E.T.B. MSc in ICT FINAL EXAM VLSI Digital Design Spring Course 2005-2006 June 6, 2006 Score publication date: June 19, 2006 Exam review request deadline: June 22, 2006 Academic consultancy: June
More informationThe BBP Algorithm for Pi
The BBP Algorithm for Pi David H. Bailey September 17, 2006 1. Introduction The Bailey-Borwein-Plouffe (BBP) algorithm for π is based on the BBP formula for π, which was discovered in 1995 and published
More informationLecture 5 Least-squares
EE263 Autumn 2007-08 Stephen Boyd Lecture 5 Least-squares least-squares (approximate) solution of overdetermined equations projection and orthogonality principle least-squares estimation BLUE property
More informationDynamic TCP Acknowledgement: Penalizing Long Delays
Dynamic TCP Acknowledgement: Penalizing Long Delays Karousatou Christina Network Algorithms June 8, 2010 Karousatou Christina (Network Algorithms) Dynamic TCP Acknowledgement June 8, 2010 1 / 63 Layout
More informationINTEGRATED CIRCUITS. For a complete data sheet, please also download:
INTEGRATED CIRCUITS DATA SHEET For a complete data sheet, please also download: The IC06 74HC/HCT/HCU/HCMOS Logic Family Specifications The IC06 74HC/HCT/HCU/HCMOS Logic Package Information The IC06 74HC/HCT/HCU/HCMOS
More informationA Fast Algorithm for Multilevel Thresholding
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 17, 713-727 (2001) A Fast Algorithm for Multilevel Thresholding PING-SUNG LIAO, TSE-SHENG CHEN * AND PAU-CHOO CHUNG + Department of Electrical Engineering
More informationLinear Programming Notes V Problem Transformations
Linear Programming Notes V Problem Transformations 1 Introduction Any linear programming problem can be rewritten in either of two standard forms. In the first form, the objective is to maximize, the material
More informationDiscrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 10
CS 70 Discrete Mathematics and Probability Theory Fall 2009 Satish Rao, David Tse Note 10 Introduction to Discrete Probability Probability theory has its origins in gambling analyzing card games, dice,
More informationTutorial. www.ccontrols.com
Tutorial 1 Tutorial CONTROLLER AREA NETWORK CAN was designed by Bosch and is currently described by ISO 11898 1. In terms of the Open Systems Interconnection model (OSI), CAN partially defines the services
More informationLogic Pro 9. TDM Guide
Logic Pro 9 TDM Guide Copyright 2009 Apple Inc. All rights reserved. Your rights to the software are governed by the accompanying software license agreement. The owner or authorized user of a valid copy
More informationPROBLEMS (Cap. 4 - Istruzioni macchina)
98 CHAPTER 2 MACHINE INSTRUCTIONS AND PROGRAMS PROBLEMS (Cap. 4 - Istruzioni macchina) 2.1 Represent the decimal values 5, 2, 14, 10, 26, 19, 51, and 43, as signed, 7-bit numbers in the following binary
More information10.1. Solving Quadratic Equations. Investigation: Rocket Science CONDENSED
CONDENSED L E S S O N 10.1 Solving Quadratic Equations In this lesson you will look at quadratic functions that model projectile motion use tables and graphs to approimate solutions to quadratic equations
More informationWRITING PROOFS. Christopher Heil Georgia Institute of Technology
WRITING PROOFS Christopher Heil Georgia Institute of Technology A theorem is just a statement of fact A proof of the theorem is a logical explanation of why the theorem is true Many theorems have this
More informationThis unit will lay the groundwork for later units where the students will extend this knowledge to quadratic and exponential functions.
Algebra I Overview View unit yearlong overview here Many of the concepts presented in Algebra I are progressions of concepts that were introduced in grades 6 through 8. The content presented in this course
More informationarxiv:0909.4913v2 [math.ho] 4 Nov 2009
IRRATIONALITY FROM THE BOOK STEVEN J. MILLER AND DAVID MONTAGUE arxiv:0909.4913v2 [math.ho] 4 Nov 2009 A right of passage to theoretical mathematics is often a proof of the irrationality of 2, or at least
More informationKarnaugh Maps & Combinational Logic Design. ECE 152A Winter 2012
Karnaugh Maps & Combinational Logic Design ECE 52A Winter 22 Reading Assignment Brown and Vranesic 4 Optimized Implementation of Logic Functions 4. Karnaugh Map 4.2 Strategy for Minimization 4.2. Terminology
More informationSECTION C [short essay] [Not to exceed 120 words, Answer any SIX questions. Each question carries FOUR marks] 6 x 4=24 marks
UNIVERSITY OF KERALA First Degree Programme in Computer Applications Model Question Paper Semester I Course Code- CP 1121 Introduction to Computer Science TIME : 3 hrs Maximum Mark: 80 SECTION A [Very
More information