13 research outputs found

    ELIMINATING REPETITIVE LOGIC OPERATIONS AND DESIGNING OPTIONAL STRATEGY

    Get PDF
    We've eliminated all of the redundant logic operations contained in the traditional CSLA and suggested a brand new logic formulation for CSLA. Within the suggested plan, the carry select (CS) operation is scheduled prior to the calculation of ultimate-sum, which differs from the traditional approach. Within this brief, the logic operations involved with conventional carry select adder (CSLA) and binary to excess-1 ripper tools (BEC)-based CSLA are examined to review the information dependence and also to identify redundant logic operations. Bit patterns of two anticipating carry words and glued can bits can be used for logic optimization of CS and generation units. A competent CSLA design is acquired using enhanced logic units. The suggested CSLA design involves considerably less area and delay compared to lately suggest BEC-based CSLA. Because of the small carry-output delay, the suggested CSLA design is a great candidate for square-root (SQRT) CSLA. The applying-specified integrated circuit (ASIC) synthesis result implies that the BEC-based SQRT-CSLA design involves more ADP and consumes more energy compared to suggest SQRT-CSLA, typically, for various bit-widths. A theoretical estimate implies that the suggested SQRT-CSLA involves nearly 35% less area-delay-product (ADP) compared to BEC-based SQRT-CSLA, that is best one of the existing SQRT-CSLA designs, typically, for various bit-widths

    REDUCING LATENCY AND RECEIVING HIGH-RECITAL IN ANALOGOUS MULTIPLIERS

    Get PDF
    Partial goods are generated in parallel utilizing a signed-digit radix-10 recoding from the BCD multiplier using the digit set [-5, 5], and some positive multiplicand multiples (0X, 1X, 2X, 3X, 4X, 5X) created in XS-3. This encoding has lots of advantages. We present the formula and architecture of the BCD parallel multiplier that exploits some qualities of two different redundant BCD codes to hurry up its computation: the redundant BCD excess-3 code (XS-3), and also the overloaded BCD representation (ODDS). Additionally, new techniques are designed to reduce considerably the latency and section of previous representative high end implementations. First, it's a self-complementing code, to ensure that an adverse multiplicand multiple could be acquired just by inverting the items of the related positive one. Also, the accessible redundancy enables a easy and quick generation of multiplicand multiples inside a carry-free way. Finally, the partial products could be recoded towards the ODDS representation just by adding a continuing factor in to the partial product reduction tree. To exhibit the benefits of our architecture, we've synthesized a RTL model for 16 x 16-digit and 34 x 34-digit multiplications and performed a comparative survey from the previous most representative designs. Because the ODDS utilize a similar 4-bit binary encoding as non-redundant BCD, conventional binary VLSI circuit techniques, for example binary carry-save adders and compressor trees, could be adapted efficiently to do decimal operations

    DESIGNING AN INEXPENSIVE RF SIGNAL ANALYSIS TOOL FOR TRANSMITTERS

    Get PDF
    Existing on-nick sources, for example power or envelope detectors or small additional circuitry, can be used as BiST purposes. Built-in self-test (BiST) for transmitters is really a desirable choice because it eliminates the reliance upon costly instrumentation to do radio-frequency signal analysis. We derive analytical expressions for that output signal in straight line and nonlinear modes. However, because of limited bandwidth, measurement of complex specifications, for example in-phase and quadrature (IQ) imbalance, and third-order intermediation intercept point (IIP3) is challenging. Since IQ imbalances are most amenable for digital compensation, their portrayal and monitoring are desirable. Within this paper, we advise a multistep BiST way of transmitter IQ imbalance and nonlinearity utilizing a self mixing envelope detector. Using straight line mode expression, we devise test signals to isolate the results of gain and phase imbalances, electricity offsets, and time skews using their company parameters from the system in low-power mode. Simulations and hardware measurements reveal that the process can offer accurate portrayal from the path. Once isolated, these parameters are calculated easily having a couple of mathematical operations. Within the next step, utilizing a greater power test signal, the nonlinear behavior from the transmitter is happy and also the IIP3 from the transmitter is computed in line with the analytical expressions

    UTILIZATION OF LIBRARY INFORMATION SOURCES AND SERVICES IN THE ENGINEERING COLLEGES: A CASE STUDY

    Get PDF
    The academic libraries are the Heart of any institution. The usage of information sources and services of users is vital for academic library collections, services and facilities to meet their information needs effectively. This paper studies the usage of information sources and services of Engineering college libraries, Secunderabad. For the purpose of the study a questionnaire was distributed to find out information seeking behavior and know the whether the engineering faculty get the services offered by the library staff and the way of obtaining relevant information, and discover the problems facing when seeking for information and determine the suggestions while they are seeking information at engineering college Libraries

    Design and performance analysis of a novel vulture based FOPID controller for the nonlinear biological system

    No full text
    In recent times, the field of Automatic Control Systems Engineering engaged in regulating large number of biological processes has played a significant role in biological and biotechnology applications. In human body, the very most important biological parameters are pancreas, insulin, glucose and genetic regulatory network (GRN). Any abnormal change in these biological system parameters may leads to occurrence of severe diseases and finally leads to the death of the infected patient. Thus, to tune the biological parameters in the human body, an efficient optimal controller is essential. Hence, a novel hybrid controller called Vulture based Fractional Order Proportional-Integral-Derivative (VbFOPID) controller is designed and implemented in this paper. The designed controller is implemented in MATLAB platform. From the obtained simulation results and its comparisons with the other existing controller's in the literature, it clearly presents that the proposed VbFOPID controller has superior performance over the other optimal PID controller designs in terms of rise time, convergence time, settling time, error percentage and maximum overshoot

    Accessibility of Library Resources at KIET Group of Institutions, Kakinada, Andhra Pradesh, India.

    Get PDF
    This paper highlighted the availability and accessibility of library information resources and services, library user attitude, working hours of library, physical facilities of KIET(Kakinada Institute of Engineering and Technology) Group of Institutions libraries, Kakinada, Andhra Pradesh. The collection, library membership, students and faculty strength, opening and closing timings, library automation, sources and services offered, and accessibility of online resources are also examined. A well-structured questionnaire was circulated to Nine Hundred and seventy-seven Under Graduate and Post Graduate students to collect the primary data from respondents. Total number of Nine Hundred and Fifteen filled-in questionnaires were acknowledged, showing on the whole response rate of counterproductive to evaluate dedicated library users. The study highlighted that the best part of users visits the library once a week. The study found that most users visit the library for circulation for lending services. The study identified tha

    Cryptography in Theory and Practice: The Case of Encryption in IPsec

    No full text
    This paper studies the gaps that exist between cryptography as studied in theory, as defined in standards, as implemented by software engineers, and as actually consumed by users. Our focus is on IPsec, an important and widely-used suite of protocols providing security at the IP layer of network communications. Despite well-known results in theoretical cryptography highlighting the vulnerabilities of unauthenticated encryption, the IPsec standards currently mandate its support. We present evidence that such ``encryption-only\u27\u27 configurations are in fact still often selected by users in practice, even with strong warnings advising against this in the IPsec standards. We then describe a variety of attacks against such configurations and report on their successful implementation in the case of the Linux kernel implementation of IPsec. Our attacks are realistic in their requirements, highly efficient, and recover the complete contents of IPsec-protected datagrams. Our attacks still apply when integrity protection is provided by a higher layer protocol, and in some cases even when it is supplied by IPsec itself. Finally in this paper, we reflect on the reasons why this unsatisfactory situation persists, and make some recommendations for the future development of IPsec and cryptographic software in general
    corecore