Efficient Diminished-1 Modulo 2 n þ 1 Multipliers
|
|
- Ralf Conley
- 6 years ago
- Views:
Transcription
1 IEEE TRANSACTIONS ON COMPUTERS, VOL. 54, NO. 4, APRIL Efficiet Dimiished-1 Modulo þ 1 Multipliers Costas Efstathiou, Haridimos T. Vergos, Member, IEEE, Giorgos Dimitrakopoulos, ad Dimitris Nikolos, Member, IEEE Abstract I this work, we propose a ew algorithm for desigig dimiished-1 modulo þ 1 multipliers. The implemetatio of the proposed algorithm requires þ 3 partial products that are reduced by a tree architecture ito two summads, which are fially added by a dimiished-1 modulo þ 1 adder. The proposed multipliers, compared to existig implemetatios, offer ehaced operatio speed ad their regular structure allows efficiet VLSI implemetatios. Idex Terms Modulo þ 1 multipliers, computer arithmetic, residue umber system, Fermat umber trasform, VLSI desig. 1 INTRODUCTION æ ARITHMETIC modulo þ 1 has bee used i several applicatios, which iclude specialized digital sigal processors based o Residue Number System (RNS) arithmetic [1], [], [3], [4], Fermat Number Trasform (FNT) for elimiatig the roudoff errors i covolutio computatios [5], [6], [7], [8], ad cryptographic algorithms [9]. For the implemetatio of these applicatios, several desigs for modulo þ 1 arithmetic blocks have bee proposed. Efficiet modulo þ 1 adders have bee preseted i [10], [11], [1], multioperad adders ad residue geerators i [13], ad multipliers i [14], [15], [16], [17], [18]. The prime moduli of the form þ 1, apart from beig useful for ordiary RNSs, are vital i FNT ad useful i cryptography. The Fermat umber 16 þ 1, by beig the oly Fermat umber of practical iterest, was chose for the implemetatio of the Iteratioal Data Ecryptio Algorithm (IDEA) [9]. Sice a umber i the rage of ½0; Š requires þ 1 bits for its represetatio, the weighted represetatio of a operad modulo þ 1 is a problem i a RNS that uses the three moduli set f 1; ; þ 1g, give that the other two chaels operate o -bit quatities. To overcome this problem ad sice, i the case of a zero operad, the result ca be derived straightforwardly, Leibowitz [5] itroduced the dimiished-1 represetatio. Uder this represetatio, each umber is represeted decremeted by 1 modulo þ 1 ad all arithmetic operatios are ihibited for a zero operad. Zero is represeted usig a separate zero idicatio bit. This represetatio has the advatage that the umbers are represeted by bits ad simplifies the basic operatios of additio, multiplicatio, ad scalig modulo þ 1. Recetly, the beefits of dimiished-1 arithmetic have bee utilized for the desig of low-power covolutio architectures [19] ad for high speed implemetatio of the IDEA cryptographic algorithm [0].. C. Efstathiou is with the Departmet of Iformatics, TEI of Athes, Ag. Spyridoos St., 110 Egaleo, Athes, Greece. cefsta@teiath.gr.. H.T. Vergos, G. Dimitrakopoulos, ad D. Nikolos are with the Techology ad Computer Architecture Lab, Computer Egieerig ad Iformatics Departmet, Uiversity of Patras, 6500 Patras, Greece. {vergos, dimitrak}@ceid.upatras.gr, ikolosd@cti.gr. Mauscript received 31 Oct. 003; revised 18 Jue 004; accepted Nov. 004; published olie 15 Feb For iformatio o obtaiig reprits of this article, please sed to: tc@computer.org, ad referece IEEECS Log Number TC We ca distiguish the multipliers modulo þ 1 i the followig categories, depedig o the type of operads that they accept:. Both operads use stadard represetatio [14], [15].. Oe iput uses a stadard represetatio, while the other utilizes a dimiished-1 represetatio [18].. Both iputs use dimiished-1 represetatio [16], [17]. It is importat to ote that the multipliers preseted i [10] also use bits for their represetatio, but do ot follow the dimiished-1 disciplie. This represetatio is specific for the IDEA implemetatio ad imposes all operads to be i weighted form, except the operad, which is represeted as a all zeros operad. I this paper, we preset a ew algorithm for desigig tree multipliers for the third of the above categories, that is, modulo þ 1 multipliers whose both iputs are i dimiished-1 represetatio. We show that the proposed multipliers are more efficiet tha the multipliers preseted i [14], [15], [16], [17], [18]. The ew desig method is preseted i Sectio. A area ad delay aalysis is give i Sectio 3 ad compared agaist the previous solutios. Experimetal results based o static CMOS implemetatios are also preseted i Sectio 3. Our coclusios are draw i the last sectio. THE PROPOSED MULTIPLIERS I this sectio, a ew architecture for modulo þ 1 multiplicatio for dimiished-1 operads is itroduced. At first, the derivatio of the partial products is explaied. The, the reductio of the partial products i two summads is examied. Let A; B be two ð þ 1Þ-bit umbers with 0 A; B < þ 1 ad suppose that A 1 ¼ a 1 a...a 0, B 1 ¼ b 1 b...b 0 deote their dimiished-1 represetatios such that A 1 ¼ A 1 B 1 ¼ B 1 ð1þ ad A 1 ;B 1 6¼ 0. Assume that Q deotes the product of A ad B modulo þ 1, that is, Q ¼jABj, where jxj m deotes the residue of x modulo m. The, accordig to [16] ad [10], for the dimiished-1 represetatio of Q, we have that Q Q 1 ¼ A 1 ¼ B 1 þ1 þ1 þ1 ¼ ða 1 þ 1ÞðB 1 þ 1Þ 1 ðþ ¼ A 1 B 1 þ A 1 þ B 1 þ1 ¼ ja 1 B 1 j þa 1 þ B 1 : þ1 The term ja 1 B 1 j of () ca be expressed as A 1 B 1 þ1 ¼ X 1 X 1 a i b j iþj ¼ X 1 X 1 a i b j iþj þ1 : Takig ito accout that i þ j, (3) ca be writte as A 1 B 1 þ1 ¼ X 1 X 1 a i b j ð 1Þ s jiþjj ; ð4þ ð3þ /05/$0.00 ß 005 IEEE Published by the IEEE Computer Society
2 49 IEEE TRANSACTIONS ON COMPUTERS, VOL. 54, NO. 4, APRIL 005 where 0; if i þ j< s ¼ 1; if i þ j : For the two cases of (5), relatio (4) ca be expressed as A 1 B 1 þ1 ¼ X 1 X 1 i X 1 a i b j jiþjj þ X 1 i¼1 j¼ i ð a i b j Þ jiþj For z f0; 1g, it holds that z ¼ þ 1 z ¼ þ z ; j ð5þ : where z deotes the complemet of bit z. The, accordig to (7), (6) ca be rewritte as A 1 B 1 þ1 ¼ X 1 1 i X X 1 a i b j jiþjj þ X 1 i¼1 j¼ i ð þ a i b j Þ jiþj j : Relatio (8) idicates that oe way to form the partial products is to complemet each bit a i b j with i þ j ad place it at bit positio ji þ jj, provided that a correctio equal to j jiþjj j is take ito accout for each complemetatio. Therefore, (8) ca be reformulated as A 1 B 1 þ1 ¼ X 1 ðpp i þ C i Þ ; ð9þ where PP i deotes the ith partial product ( P 1 PP i ¼ a 0b j j ; if i ¼ 0 P 1 i a i b j jiþjj P þ 1 j¼ i a ib j jiþjj ð10þ ; if i 6¼ 0 ad C i is the correspodig correctio factor. It should be oted that PP 0 does ot cotai ay complemeted bits ad, thus, C 0 ¼ 0. O the other had, for i 6¼ 0, the value of C i depeds o the umber of complemeted bits a i b j ad is give by C i ¼ X 1 jiþjj ¼ ð i 1Þ: j¼ i ð6þ ð7þ ð8þ ð11þ Accordig to (10) ad (11), the followig partial products ad correctio factors are derived: PP 0¼ a 0b 1 a 0b... a 0b 1 a 0b 0; C 0¼ 0 PP 1¼ a 1b a 1b 3... a 1b 0 a 1b 1; C 1¼ ð 1 1Þ PP ¼ a b 3 a b 4... a b 1 a b ; C ¼ ð 1Þ... PP ¼ a b 1 a b 0... a b 3 a b ; C ¼ ð 1Þ PP 1¼ a 1b 0 a 1b 1... a 1b a 1b 1; C 1¼ ð 1 1Þ: The total correctio, C P, required for the formatio of the above partial products is equal to C P ¼ X 1 C i ¼ C 0 þ X 1 ð i 1Þ ¼ ð 1 Þ: ð1þ i¼1 I the followig, we cosider the reductio of the partial products ito two summads. This ca be performed i a variety of ways. I this paper, a FA-based Dadda tree architecture is followed [1]. Although the use of a tree architecture i iteger multipliers results i irregular architectures, i our case, the resultig FA array is completely regular ad, therefore, well-suited for VLSI implemetatios. This is due to the fact that the same umber of bits participate i every bit positio sice the carry output of the most-sigificat bit positio is fed back as a carry iput to the least-sigificat bit positio of the ext stage. Let c deote a carry output at the most sigificat bit positio which has a weight of. Sice c ¼ c ¼ þ c þ1 ; ð13þ the c ca be complemeted ad added at the least sigificat bit positio of the ext stage, provided that a correctio of is take ito accout. Sice a FA row reduces the umber of partial products by oe, þ 1 FA rows are required i order to derive the two fial summads from þ 3 partial products. The FAs at the most sigificat bit positio will the produce þ 1 carries of weight. Therefore, the correctio, C R, required durig the additio of þ 3 partial products is C R ¼ð þ 1Þ : ð14þ Mergig both correctio factors of (1) ad (14) results i a sigle factor C, which, i modulo þ 1 arithmetic, is equal to C ¼ CP þ C R ¼ ð 1Þþðþ1Þ ¼ 1: þ1 þ1 ð15þ Sice C is treated i the proposed architecture as a extra partial product, we have to use its dimiished-1 represetatio i our reductio scheme, i.e., C 1 ¼jC 1j, which is equal to the all 0s -bit vector. This vector, alog with the PP i s of (9) ad the A 1, B 1 of () forms the þ 3 partial products of the proposed architecture. Although C 1 ¼ 0, it caot be igored durig the reductio of the partial products sice, i this case, less tha þ 1 carries of weight will be produced. The above aalysis idicates that Q 1 ¼ X 1 PP i þ A 1 þ B 1 þ C 1 : ð16þ A implemetatio of the proposed architecture is composed of AND or NAND gates that form a bit of each partial product, a Dadda tree that reduces the þ 3 partial products ito two summads, ad a modulo þ 1 adder for dimiished-1 operads [1] that accepts these two summads ad produces the required product. A dimiished-1 modulo þ 1 parallel adder is effectively a iverted ed-aroud-carry adder. Sice a direct coectio of the carry output to the carry iput via a iverter leads to a oscillatig circuit, dedicated architectures have bee proposed that do ot suffer from this problem [10], [11], [1]. I this work, the parallel-prefix architecture proposed i [1] is utilized i order to achieve the fastest possible implemetatio. This architecture was derived by allowig the iverted reeterig carry to recirculate at each existig prefix level. The desig of these adders is briefly described as follows: At first, the carry-geerate bits g i, the carry-propagate bits p i, ad the half-sum bits h i, for every i, 0 i 1, are computed accordig to: g i ¼ a i b i, p i ¼ a i þ b i, ad h i ¼ a i b i, where, þ, ad deote the logical AND, OR, ad exclusive-or operatios, respectively. The, usig the bits g i ad p i, the carries c i, for 1 i, are computed i log prefix levels, accordig to the followig relatio: ðg i ;P i Þ¼ðg i ;p i Þðg i 1 ;p i 1 Þðg 0 ;p 0 Þ ðg 1 ;p 1 Þðg iþ1 ;p iþ1 Þ; with c i ¼ G i. Fially, the sum bits s i are derived usig s i ¼ h i c i 1. By defiitio, ðg; pþ is equal to ðg; pþ ad is the prefix operator defied as ðg; pþðg 0 ;p 0 Þ¼ðg þ p g 0 ;p p 0 Þ.
3 IEEE TRANSACTIONS ON COMPUTERS, VOL. 54, NO. 4, APRIL Fig. 1. Sample simplified-fa (SFA) implemetatio. Additioal simplificatios are possible to the Dadda reductio tree. Cosider the partial products PP 0 ¼ a 1 b 0 a b 0...a 1 b 0 a 0 b 0, PP ¼ A 1, ad PP þ1 ¼ B 1. If these three partial products are drive to the same FA row of the array, the each FA ca be simplified sigificatly. Fig. 1 presets a possible implemetatio of a block that accepts a 1, b 1, ad b 0 ad performs the additio of the bits a 1 b 0, a 1, ad b 1. The simplified FA is deoted as SFA. The FA of the same row that accepts a 0 b 0, a 0, ad b 0 ca be further simplified to a HA. Furthermore, sice C 1 is the all 0s vector, the row of FAs that accepts this operad ca be simplified to a row of half-adders (HA). Example 1. For a modulo 57 multiplier the derived set of partial products is show i Fig.. Fig. 3 presets a umerical example illustratig the modulo partial-product reductio usig the Dadda method. Every three terms are reduced to two, usig a FA row, which is idicated by a box that surrouds them. The resultig sum ad carry vectors are deoted as ðsþ ad ðcþ. The bold ad uderlied bits of each stage declare the carry bits of weight 8 that are complemeted ad added at the leastsigificat bit positio. Additioally, Fig. 4 presets the attaied FA-based implemetatio. Note that, i the first level of the tree, oly HAs ad SFAs have bee used for reducig the delay. The circles at the carry output of a HA, FA, or a SFA deote the complemet operatio. 3 COMPARISONS The multipliers desiged accordig to the methods preseted i [14], [15], ad [18] require, apart from the partial-products reductio array, a fial carry-propagate adder ad a modulo correctio step with a delay equal to a -bit carry propagate adder. Thus, the proposed desig ad those of [16] ad [17] that require oly oe -bit carry-propagate additio are superior to these previous methods. Additioally, the authors of [16] ad [17] have prove their superiority over [14] ad [18]. Therefore, i this sectio, we compare the proposed (hereafter deoted block PROP) Fig.. The set of partial products for the proposed modulo 8 þ 1 multiplier. multipliers agaist those of [16] (hereafter deoted block WANG) ad [17] (hereafter deoted block MA), both qualitatively ad quatitatively. For our qualitative comparisos, we adopt the approximatios of the uit-gate model [], that is, we cosider that all -iput mootoic gates cout as oe gate equivalet for both area ad delay, while a -iput XOR or XNOR gate couts as two gate equivalets for both area ad delay. We deote a Booth ecoder by BE, a Booth selector block by BS, ad a parallel modulo þ 1 adder by PA. The area of a block Y will be deoted A Y ad its executio latecy as T Y. The area ad delay i equivalet gates of the compoets used i the comparisos are show i Table 1. I the proposed multipliers, þ 3 partial products are required. The three of them are bits from the iput operads, which are added usig the SFA cells, while oe of them is the all zeros vector. The rest of the partial products are produced by ð 1Þ AND or NAND gates. These partial products are the reduced to two by the use of a Dadda tree. The depth i FA stages of a Dadda tree, deoted DðkÞ,is a fuctio of its umber of operads ad is listed i Table for all practical values of k. Each of the colums of the tree, except the least sigificat oe, is composed of 1 FAs, 1 SFA, ad 1 HA. The least sigificat slice is composed of 1 FAs ad HAs. Therefore, the total area of the Dadda tree required by the proposed multipliers is A DT ¼ ð 1ÞA FA þð 1ÞA SFA þðþ1þa HA, while its executio delay is T DT ¼ Dð þ 3ÞT FA. As exemplified i the previous sectio, i several cases, it is possible to arrage the first level of the Dadda tree so that it is composed oly of SFAs or of SFAs ad HAs. This ca be achieved i the cases where ð þ Þ or ð þ 1Þ is a Dadda umber, i.e., whe ¼ 4; 5; 7; 8; 11; 1; 17; 18; 6; 7;... I these cases, the executio delay of the Dadda tree is T DT ¼ðDðþ3Þ 1ÞT FA þ T HA. Takig ito accout the approximatios of the uit gate model, we get that Fig. 3. Numerical example i the case of the proposed modulo 8 þ 1 multiplier.
4 494 IEEE TRANSACTIONS ON COMPUTERS, VOL. 54, NO. 4, APRIL 005 Fig. 4. The proposed modulo 8 þ 1 multiplier. A PROP ¼ þ A DT þ A PA ¼ 8 þ 9 log þ 1 ð17þ þ 4 equivalet gates; T PROP ¼ 1 þ T DT þ T PA ¼ 4Dð þ 3Þþlog þ ; if ¼ 4; 5; 7; 8; 11; 1; 17; 18;... 4Dð þ 3Þþlog þ 4; otherwise: ð18þ The multipliers proposed i [16] follow a similar structure as the proposed oes. However, the followig should be oted: TABLE 1 Area ad Delay of the Basic Compoets i Equivalet Gates. þ 1 partial products are utilized. Out of them, 1 are produced usig two iput AND gates. However, these AND gates require that oe of their iput operads be iverted. Oe partial product is produced by the use of! 1 multiplexors. We cosider that a multiplexor has the same complexity as a XOR gate. The fial partial product is the iverse of the umber of zeros i the 1 bits from
5 IEEE TRANSACTIONS ON COMPUTERS, VOL. 54, NO. 4, APRIL TABLE FA Stages i a k Operad Dadda Tree TABLE 3 Area ad Delay i Equivalet Gates b 1 to b 1. This umber is provided by a 1 bits to dlog ð 1Þe couter (deoted by CNT).. I [16], it is proposed to reduce the partial products i two fial summads by the use of a Wallace tree. I our comparisos, we assume that this reductio is performed by a Dadda tree. The latter has the same time complexity while it, i parallel, offers reduced area complexity.. The two fial summads are added i a modulo þ 1 parallel adder with a carry iput set to 1. Sice such a block is ot available i the literature, we assume that this is implemeted by a HA stage, followed by a modulo þ 1 parallel adder. The area requiremets of the multipliers proposed i [16] are:. ð 1Þ AND ad XOR gates for formig the partial products.. ð 1Þ dlog ð 1Þe FAs for the CNT block that forms the last partial product.. ð 1Þ FAs for the Dadda tree ad HAs for producig the two fial summads.. A modulo þ 1 adder PA. Takig ito accout the approximatios of the uit-gate model, it follows that A WANG ¼ 8 þ 9 log þ 9 7dlog ð 1Þe 1: Cosiderig the executio delay, oe must ote that: ð19þ. The terms of the 1 partial products require more tha a sigle gate delay to be produced sice each is the AND of a ormal iput bit with the other iverted.. The multiplexors impose a extra delay for the derivatio of this specific partial product agaist the rest. I order to compesate for this extra delay, the output of the multiplexors should be drive to the secod or to subsequet stages of the Dadda tree. However, this is ot possible, whe þ 1 is a Dadda umber or, equivaletly, whe ¼ 5; 8; 1; 18; 7; 41; 6; Fially, the partial product produced by the CNT may also ot be ready whe eeded for a miimum depth Dadda tree. Because of this, we caot provide a closed form equatio for T WANG. I our estimatio, we cosider that the CNT is desiged accordig to [3]. The multipliers proposed i [17] use Booth recodig to reduce the umber of partial products that should be added. I the followig, we cosider that is eve. The umber of derived partial products i [17] is þ 1, each ð þ 1Þ-bits wide. Oe of the partial products is a costat, whereas the rest are derived usig a Booth ecoder for each overlappig triplet of the multiplier ad þ 1 Booth selector blocks. I [17], it is proposed that these partial products are reduced ito a carry ad sum vector usig a Carry- Save Adder (CSA) Array. I the followig, we cosider that this is performed by a Dadda tree to reduce the delay. The umber of FA stages i the Dadda tree is Dð þ 1Þ, whereas the umber of FAs ad HAs required is 1 ð 1Þ blog ð þ 1Þc ad, respectively. The sum ad carry vectors produced are the fed ito two cascaded modulo CSA stages, each cotributig T FA of executio delay. The first stage, because of the costats i the high order bits of the sum ad carry vectors, ca be implemeted by 1 HA ad dlog ð Þe FAs, whereas the secod requires FAs. The two resultig vectors eed to be added i a modulo þ 1 parallel adder with a carry iput set to 1, as i the case of the multipliers proposed i [16]. Also, i this case, we assume that this is implemeted by a HA stage, followed by a modulo þ 1 parallel adder. Accordig to the above aalysis, we have that, for eve values of : A MA ¼ A BE þ ð þ 1ÞA BS þ 1 j ð 1Þ log k l þ 1 m þ log þ A FA þ þ 1 þ A HA þ A PA ¼ 6 þ 9 log þ 7 l þ 7 log m j k 14 log þ 1 ð0þ T MA ¼ T BE þ T BS þ D þ 1 T FA þ T FA þ T HA þ T PA ¼ 0 þ 4D þ 1 þ log : ð1þ Takig ito accout the area estimates of (17), (18), (19), ad the aalysis preseted earlier for the delay T WANG, (0) ad (1), we preset i Table 3 the delay ad area requiremets of the multipliers uder cosideratio for several values of. The proposed multipliers offer sigificat savigs i executio time compared to either the multipliers proposed i [16] or i [17]. The
6 496 IEEE TRANSACTIONS ON COMPUTERS, VOL. 54, NO. 4, APRIL 005 TABLE 4 Area (m ) ad Delay (s) Results of the Dimiished-1 Modulo þ 1 Multipliers TABLE 5 Area (m ) ad Power (mw) Results for the Dimished-1 Modulo þ 1 Multipliers proposed multipliers are also more area efficiet tha the multipliers i [16] for >4. Fially, cosiderig as a metric the area time product, the proposed multipliers are more efficiet tha the multipliers proposed i [17] for <4. Quatitative compariso results are obtaied by implemetig the differet multiplier architectures ito a 0.18m CMOS stadard cell library. At first, a program was writte i C++ that geerates structural Verilog descriptios for the proposed ad the multipliers proposed i [16] ad [17]. We used this program to geerate Verilog models for multipliers with operad sizes of 4, 8, 16, ad 3 bits. Each desig, after performig extesive simulatios that verified its correctess, was sythesized ad optimized recursively for miimum delay, with Syopsys Desig Compiler usig the UMC 0.18m CMOS stadard cell library (five metal layers), uder typical coditios (1.8Volt, 5 C). The, the derived etlists ad the desig costraits were passed to Cadece Silico Esemble to perform the fial placemet ad routig of the desig. All desig costraits, such as output load, max faout, ad floorpla iitializatio iformatio, were held costat for each architecture. Fial timig aalysis was performed usig PrimeTime of Syopsys toolset after all RC parasitic iformatio were extracted from the layout ad back-aotated to the gate-level etlist. Table 4 shows the obtaied area ad delay results. The reported area measuremets are performed i the fial layout ad iclude both cell ad itercoect area. The simulatio data idicate that the proposed multipliers offer delay savigs betwee 7 percet ad 11 percet over the multipliers i [16] ad betwee 10 percet ad 18 percet over the multipliers i [17]. Additioally, i all cases, they are more area efficiet tha the multipliers of [16] by 6 percet o average. I order to measure power cosumptio, all desigs were optimized targetig a delay equal to the miimum delay of the Booth modulo þ 1 multipliers proposed by Ma i [17]. The resultig etlists were placed ad routed ad the parasitics were extracted. All gathered desig data were passed to PrimePower of Syopsys ad power was estimated after the applicatio of 5; 000 radom vectors. Experimetal results, show i Table 5, idicate that the proposed multipliers i the majority of the cases require the smallest implemetatio area, while their power cosumptio is less tha the multipliers of [16] ad [17] by 13 percet ad 3 percet o average. 4 CONCLUSIONS I this paper, we have proposed a ew algorithm for desigig dimiished-1 modulo þ 1 multipliers. The proposed multipliers offer sigificat savigs i propagatio delay compared to the already kow oes ad they are more area ad power efficiet for less strict delay costraits. ACKNOWLEDGMENTS The authors would like to thak the aoymous reviewers for their costructive commets. G. Dimitrakopoulos has bee supported by the D. Maritsas Graduate Scholarship. REFERENCES [1] F. Taylor, A Sigle Modulus ALU for Sigal Processig, IEEE Tras. Acoustics, Speech, ad Sigal Processig, vol. 33, pp , [] E. DiClaudio et al., Fast Combiatorial RNS Processors for DSP Applicatios, IEEE Tras. Computers, vol. 44, pp , [3] J. Ramirez et al., RNS-Eabled Digital Sigal Processor Desig, IEE Electroics Letters, vol. 38, o. 6, pp , 00. [4] R. Chaves ad L. Sousa, RDSP: A RISC DSP Based o Residue Number System, Proc. Euromicro Symp. Digital Systems Desig, pp , Sept [5] L.M. Leibowitz, A Simplified Biary Arithmetic for the Fermat Number Trasform, IEEE Tras. Acoustics, Speech, ad Sigal Processig, vol. 4, pp , [6] T.K. Truog et al., Techiques for Computig the Discrete Fourier Trasform Usig the Quadratic Residue Fermat Number Systems, IEEE Tras. Computers, vol. 35, pp , [7] M. Beaissa et al., Dimiished-1 Multiplier for a Fast Covolver ad Correlator Usig the Fermat Number Trasform, IEE Proc. G, vol. 135, pp , [8] S. Suder at al., Area-Efficiet Dimiished-1 Multiplier for Fermat Number-Theoretic Trasform, IEE Proc. G, vol. 140, pp , [9] R. Zimmerma et al., A 177 Mb/s VLSI Implemetatio of the Iteratioal Data Ecryptio Algorithm, IEEE J. Solid-State Circuits, vol. 9, o. 3, pp , [10] R. Zimmerma, Efficiet VLSI Implemetatio of Modulo ð 1Þ Additio ad Multiplicatio, Proc. IEEE Symp. Computer Arithmetic, pp , Apr [11] C. Efstathiou et al., Modulo 1 Adder Desig Usig Select-Prefix Blocks, IEEE Tras. Computers, vol. 5, pp , 003. [1] H.T. Vergos, C. Efstathiou, ad D. Nikolos, Dimiished-Oe Modulo þ 1 Adder Desig, IEEE Tras. Computers, vol. 51, pp , 00. [13] S.J. Piestrak, Desig of Residue Geerators ad Multioperad Modular Adders Usig Carry-Save Adders, IEEE Tras. Computers, vol. 43, pp , [14] A.A. Hiasat, A Memoryless modð 1Þ Residue Multiplier, Electroics Letters, vol. 8, o. 3, pp , 199. [15] A. Wrzyszcz ad D. Milford, A New Modulo a þ 1 Multiplier, Proc. It l Cof. Computer Desig, pp , [16] Z. Wag, G.A. Jullie, ad W.C. Miller, A Efficiet Tree Architecture for Modulo þ 1 Multiplicatio, J. VLSI Sigal Processig, vol. 14, pp , [17] Y. Ma, A Simplified Architecture for Modulo ð þ 1Þ Multiplicatio, IEEE Tras. Computers, vol. 47, o. 3, pp , Mar [18] A.V. Curiger et al., Regular VLSI Architectures for Multiplicatio Modulo ( þ 1), IEEE J. Solid-State Circuits, vol. 6, o. 7, pp , [19] V. Paliouras, A. Skavatzos, ad T. Stouraitis, Multi-Voltage Low Power Covolvers Usig the Polyomial Residue Number System, Proc. ACM Great Lakes Symp. VLSI, pp. 7-11, 00. [0] A. Hammalaie, M. Tommiska, ad J. Skytta, 6.78 Gigabits per Secod Implemetatio of the IDEA Cryptographic Algorithm, Lecture Notes i Computer Sciece, vol. 438, pp , 00. [1] L. Dadda, Some Schemes for Parallel Multipliers, Alta Frequeza, vol. 34, pp , [] A. Tyagi, A Reduced-Area Scheme for Carry-Select Adders, IEEE Tras. Computers, vol. 4, o. 10, pp , Oct [3] E.E. Swartzlader, Parallel Couters, IEEE Tras. Computers, vol., pp , 1973.
Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation
Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity
More informationEE260: Digital Design, Spring /16/18. n Example: m 0 (=x 1 x 2 ) is adjacent to m 1 (=x 1 x 2 ) and m 2 (=x 1 x 2 ) but NOT m 3 (=x 1 x 2 )
EE26: Digital Desig, Sprig 28 3/6/8 EE 26: Itroductio to Digital Desig Combiatioal Datapath Yao Zheg Departmet of Electrical Egieerig Uiversity of Hawaiʻi at Māoa Combiatioal Logic Blocks Multiplexer Ecoders/Decoders
More informationA New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method
A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro
More informationCSC 220: Computer Organization Unit 11 Basic Computer Organization and Design
College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:
More informationLecture 2. RTL Design Methodology. Transition from Pseudocode & Interface to a Corresponding Block Diagram
Lecture 2 RTL Desig Methodology Trasitio from Pseudocode & Iterface to a Correspodig Block Diagram Structure of a Typical Digital Data Iputs Datapath (Executio Uit) Data Outputs System Cotrol Sigals Status
More informationFast Fourier Transform (FFT) Algorithms
Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform
More informationBOOLEAN MATHEMATICS: GENERAL THEORY
CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.
More informationChapter 3 Classification of FFT Processor Algorithms
Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As
More informationEE123 Digital Signal Processing
Last Time EE Digital Sigal Processig Lecture 7 Block Covolutio, Overlap ad Add, FFT Discrete Fourier Trasform Properties of the Liear covolutio through circular Today Liear covolutio with Overlap ad add
More informationElementary Educational Computer
Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified
More informationLecture 5. Counting Sort / Radix Sort
Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018
More informationOnes Assignment Method for Solving Traveling Salesman Problem
Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:
More informationLecture 1: Introduction and Strassen s Algorithm
5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access
More informationImproving Template Based Spike Detection
Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for
More information6.854J / J Advanced Algorithms Fall 2008
MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms
More informationBASED ON ITERATIVE ERROR-CORRECTION
A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity
More informationAPPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS
APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful
More informationAn Efficient Algorithm for Graph Bisection of Triangularizations
A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045 Oe Brookigs Drive St. Louis, Missouri 63130-4899, USA jaegerg@cse.wustl.edu
More informationBehavioral Modeling in Verilog
Behavioral Modelig i Verilog COE 202 Digital Logic Desig Dr. Muhamed Mudawar Kig Fahd Uiversity of Petroleum ad Mierals Presetatio Outlie Itroductio to Dataflow ad Behavioral Modelig Verilog Operators
More informationLecture 3. RTL Design Methodology. Transition from Pseudocode & Interface to a Corresponding Block Diagram
Lecture 3 RTL Desig Methodology Trasitio from Pseudocode & Iterface to a Correspodig Block Diagram Structure of a Typical Digital Data Iputs Datapath (Executio Uit) Data Outputs System Cotrol Sigals Status
More informationNew Fuzzy Color Clustering Algorithm Based on hsl Similarity
IFSA-EUSFLAT 009 New Fuzzy Color Clusterig Algorithm Based o hsl Similarity Vasile Ptracu Departmet of Iformatics Techology Tarom Compay Bucharest Romaia Email: patrascu.v@gmail.com Abstract I this paper
More informationA General Framework for Accurate Statistical Timing Analysis Considering Correlations
A Geeral Framework for Accurate Statistical Timig Aalysis Cosiderig Correlatios 7.4 Vishal Khadelwal Departmet of ECE Uiversity of Marylad-College Park vishalk@glue.umd.edu Akur Srivastava Departmet of
More informationAppendix D. Controller Implementation
COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);
More informationAn Efficient Algorithm for Graph Bisection of Triangularizations
Applied Mathematical Scieces, Vol. 1, 2007, o. 25, 1203-1215 A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045, Oe
More informationEE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control
EE 459/500 HDL Based Digital Desig with Programmable Logic Lecture 13 Cotrol ad Sequecig: Hardwired ad Microprogrammed Cotrol Refereces: Chapter s 4,5 from textbook Chapter 7 of M.M. Mao ad C.R. Kime,
More informationReversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits
Egieerig Letters, :, EL Reversible Realizatio of Quaterary Decoder, Multiplexer, ad Demultiplexer Circuits Mozammel H.. Kha, Member, ENG bstract quaterary reversible circuit is more compact tha the correspodig
More informationPseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance
Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured
More informationPattern Recognition Systems Lab 1 Least Mean Squares
Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig
More informationFPGA IMPLEMENTATION OF BASE-N LOGARITHM. Salvador E. Tropea
FPGA IMPLEMENTATION OF BASE-N LOGARITHM Salvador E. Tropea Electróica e Iformática Istituto Nacioal de Tecología Idustrial Bueos Aires, Argetia email: salvador@iti.gov.ar ABSTRACT I this work, we preset
More informationAnalysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis
Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems
More informationSorting in Linear Time. Data Structures and Algorithms Andrei Bulatov
Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio
More informationCopyright 2016 Ramez Elmasri and Shamkant B. Navathe
Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:
More informationCIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8)
CIS 11 Data Structures ad Algorithms with Java Fall 017 Big-Oh Notatio Tuesday, September 5 (Make-up Friday, September 8) Learig Goals Review Big-Oh ad lear big/small omega/theta otatios Practice solvig
More informationAutomatic Generation of Polynomial-Basis Multipliers in GF (2 n ) using Recursive VHDL
Automatic Geeratio of Polyomial-Basis Multipliers i GF (2 ) usig Recursive VHDL J. Nelso, G. Lai, A. Teca Abstract Multiplicatio i GF (2 ) is very commoly used i the fields of cryptography ad error correctig
More informationGPUMP: a Multiple-Precision Integer Library for GPUs
GPUMP: a Multiple-Precisio Iteger Library for GPUs Kaiyog Zhao ad Xiaowe Chu Departmet of Computer Sciece, Hog Kog Baptist Uiversity Hog Kog, P. R. Chia Email: {kyzhao, chxw}@comp.hkbu.edu.hk Abstract
More information9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence
_9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to
More informationEfficient Hardware Design for Implementation of Matrix Multiplication by using PPI-SO
Efficiet Hardware Desig for Implemetatio of Matrix Multiplicatio by usig PPI-SO Shivagi Tiwari, Niti Meea Dept. of EC, IES College of Techology, Bhopal, Idia Assistat Professor, Dept. of EC, IES College
More informationDesign of Efficient Pipelined Radix-2 2 Single Path Delay Feedback FFT
IOSR Joural of VLSI ad Sigal Processig IOSR-JVSP Volume Issue Ver. I May-Ju. 0 PP 88-9 e-iss: 9 00 p-iss o. : 9 97 www.iosrjourals.org Desig of Efficiet Pipelied Radi- Sigle Path Delay Feedbac FFT isha
More informationRunning Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments
Ruig Time Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects. The
More informationData Structures and Algorithms. Analysis of Algorithms
Data Structures ad Algorithms Aalysis of Algorithms Outlie Ruig time Pseudo-code Big-oh otatio Big-theta otatio Big-omega otatio Asymptotic algorithm aalysis Aalysis of Algorithms Iput Algorithm Output
More informationMatrix representation of a solution of a combinatorial problem of the group theory
Matrix represetatio of a solutio of a combiatorial problem of the group theory Krasimir Yordzhev, Lilyaa Totia Faculty of Mathematics ad Natural Scieces South-West Uiversity 66 Iva Mihailov Str, 2700 Blagoevgrad,
More informationLecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming
Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis
More informationRunning Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments
Ruig Time ( 3.1) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step- by- step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.
More informationAnalysis of Algorithms
Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Ruig Time Most algorithms trasform iput objects ito output objects. The
More informationk (check node degree) and j (variable node degree)
A Parallel Turbo Decodig Message Passig Architecture for Array LDPC Codes Kira Guam, Pakaj Bhagawat, Weihuag Wag, Gwa Choi, Mark Yeary * Dept. of Electrical Egieerig, Texas A&M Uiversity, College Statio,
More informationCSC165H1 Worksheet: Tutorial 8 Algorithm analysis (SOLUTIONS)
CSC165H1, Witer 018 Learig Objectives By the ed of this worksheet, you will: Aalyse the ruig time of fuctios cotaiig ested loops. 1. Nested loop variatios. Each of the followig fuctios takes as iput a
More informationDesign of High Speed Modulo 2 n +1 Adder
Design of High Speed Modulo 2 n +1 Adder M. Varun M. Tech, Student Department of ECE Vardhaman College of Engineering M. Nagarjuna Assistant Professor Department of ECE Vardhaman College of Engineering
More informationA SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON
A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work
More information1. SWITCHING FUNDAMENTALS
. SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig
More informationNAG Library Function Document nag_fft_hermitian (c06ebc)
c06 Fourier Trasforms NAG Library Fuctio Documet ag_fft_hermitia () 1 Purpose ag_fft_hermitia () calculates the discrete Fourier trasform of a Hermitia sequece of complex data values. (No extra workspace
More informationRedundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis
IOSR Joural of Egieerig Redudacy Allocatio for Series Parallel Systems with Multiple Costraits ad Sesitivity Aalysis S. V. Suresh Babu, D.Maheswar 2, G. Ragaath 3 Y.Viaya Kumar d G.Sakaraiah e (Mechaical
More informationChapter 3. Floating Point Arithmetic
COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 3 Floatig Poit Arithmetic Review - Multiplicatio 0 1 1 0 = 6 multiplicad 32-bit ALU shift product right multiplier add
More informationChapter 4 The Datapath
The Ageda Chapter 4 The Datapath Based o slides McGraw-Hill Additioal material 24/25/26 Lewis/Marti Additioal material 28 Roth Additioal material 2 Taylor Additioal material 2 Farmer Tae the elemets that
More informationSolving Fuzzy Assignment Problem Using Fourier Elimination Method
Global Joural of Pure ad Applied Mathematics. ISSN 0973-768 Volume 3, Number 2 (207), pp. 453-462 Research Idia Publicatios http://www.ripublicatio.com Solvig Fuzzy Assigmet Problem Usig Fourier Elimiatio
More informationNeural Networks A Model of Boolean Functions
Neural Networks A Model of Boolea Fuctios Berd Steibach, Roma Kohut Freiberg Uiversity of Miig ad Techology Istitute of Computer Sciece D-09596 Freiberg, Germay e-mails: steib@iformatik.tu-freiberg.de
More informationWhat are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs
What are we goig to lear? CSC316-003 Data Structures Aalysis of Algorithms Computer Sciece North Carolia State Uiversity Need to say that some algorithms are better tha others Criteria for evaluatio Structure
More informationProtected points in ordered trees
Applied Mathematics Letters 008 56 50 www.elsevier.com/locate/aml Protected poits i ordered trees Gi-Sag Cheo a, Louis W. Shapiro b, a Departmet of Mathematics, Sugkyukwa Uiversity, Suwo 440-746, Republic
More informationLoad balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *
Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of
More informationTask scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation
6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08
More informationCubic Polynomial Curves with a Shape Parameter
roceedigs of the th WSEAS Iteratioal Coferece o Robotics Cotrol ad Maufacturig Techology Hagzhou Chia April -8 00 (pp5-70) Cubic olyomial Curves with a Shape arameter MO GUOLIANG ZHAO YANAN Iformatio ad
More informationComputer Systems - HS
What have we leared so far? Computer Systems High Level ENGG1203 2d Semester, 2017-18 Applicatios Sigals Systems & Cotrol Systems Computer & Embedded Systems Digital Logic Combiatioal Logic Sequetial Logic
More informationOutline and Reading. Analysis of Algorithms. Running Time. Experimental Studies. Limitations of Experiments. Theoretical Analysis
Outlie ad Readig Aalysis of Algorithms Iput Algorithm Output Ruig time ( 3.) Pseudo-code ( 3.2) Coutig primitive operatios ( 3.3-3.) Asymptotic otatio ( 3.6) Asymptotic aalysis ( 3.7) Case study Aalysis
More information. Written in factored form it is easy to see that the roots are 2, 2, i,
CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or
More informationAn Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem
A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.
More informationProject 2.5 Improved Euler Implementation
Project 2.5 Improved Euler Implemetatio Figure 2.5.10 i the text lists TI-85 ad BASIC programs implemetig the improved Euler method to approximate the solutio of the iitial value problem dy dx = x+ y,
More informationIMP: Superposer Integrated Morphometrics Package Superposition Tool
IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College
More informationChapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 10 Defiig Classes Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 10.1 Structures 10.2 Classes 10.3 Abstract Data Types 10.4 Itroductio to Iheritace Copyright 2015 Pearso Educatio,
More informationRecursive Estimation
Recursive Estimatio Raffaello D Adrea Sprig 2 Problem Set: Probability Review Last updated: February 28, 2 Notes: Notatio: Uless otherwise oted, x, y, ad z deote radom variables, f x (x) (or the short
More informationUNIVERSITY OF MORATUWA
UNIVERSITY OF MORATUWA FACULTY OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING B.Sc. Egieerig 2014 Itake Semester 2 Examiatio CS2052 COMPUTER ARCHITECTURE Time allowed: 2 Hours Jauary 2016
More informationDESIGN AND ANALYSIS OF LDPC DECODERS FOR SOFTWARE DEFINED RADIO
DESIGN AND ANALYSIS OF LDPC DECODERS FOR SOFTWARE DEFINED RADIO Sagwo Seo, Trevor Mudge Advaced Computer Architecture Laboratory Uiversity of Michiga at A Arbor {swseo, tm}@umich.edu Yumig Zhu, Chaitali
More informationCAEN Tools for Discovery
Applicatio Note AN2086 Sychroizatio of CAEN Digitizers i Multiple Board Acquisitio Systems Viareggio 9 May 2013 Itroductio High speed digitizers fid applicatios i several fields ragig from the idustry
More informationAn Estimation of Distribution Algorithm for solving the Knapsack problem
Vol.4,No.5, 214 Published olie: May 25, 214 DOI: 1.7321/jscse.v4.5.1 A Estimatio of Distributio Algorithm for solvig the Kapsack problem 1 Ricardo Pérez, 2 S. Jös, 3 Arturo Herádez, 4 Carlos A. Ochoa *1,
More informationAlgorithm. Counting Sort Analysis of Algorithms
Algorithm Coutig Sort Aalysis of Algorithms Assumptios: records Coutig sort Each record cotais keys ad data All keys are i the rage of 1 to k Space The usorted list is stored i A, the sorted list will
More informationImproving Information Retrieval System Security via an Optimal Maximal Coding Scheme
Improvig Iformatio Retrieval System Security via a Optimal Maximal Codig Scheme Dogyag Log Departmet of Computer Sciece, City Uiversity of Hog Kog, 8 Tat Chee Aveue Kowloo, Hog Kog SAR, PRC dylog@cs.cityu.edu.hk
More informationChapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig
More informationData diverse software fault tolerance techniques
Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the
More informationChapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved.
Chapter 11 Frieds, Overloaded Operators, ad Arrays i Classes Copyright 2014 Pearso Addiso-Wesley. All rights reserved. Overview 11.1 Fried Fuctios 11.2 Overloadig Operators 11.3 Arrays ad Classes 11.4
More informationAN OPTIMIZATION NETWORK FOR MATRIX INVERSION
397 AN OPTIMIZATION NETWORK FOR MATRIX INVERSION Ju-Seog Jag, S~ Youg Lee, ad Sag-Yug Shi Korea Advaced Istitute of Sciece ad Techology, P.O. Box 150, Cheogryag, Seoul, Korea ABSTRACT Iverse matrix calculatio
More informationBOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM
MATEC Web of Cofereces 79, 01014 (016) DOI: 10.1051/ mateccof/0167901014 T 016 BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM Staislav Shidlovskiy 1, 1 Natioal Research
More informationCounting the Number of Minimum Roman Dominating Functions of a Graph
Coutig the Number of Miimum Roma Domiatig Fuctios of a Graph SHI ZHENG ad KOH KHEE MENG, Natioal Uiversity of Sigapore We provide two algorithms coutig the umber of miimum Roma domiatig fuctios of a graph
More informationLecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions
U.C. Berkeley CS170 : Algorithms Midterm 1 Solutios Lecturers: Sajam Garg ad Prasad Raghavedra Feb 1, 017 Midterm 1 Solutios 1. (4 poits) For the directed graph below, fid all the strogly coected compoets
More informationParallel Polygon Approximation Algorithm Targeted at Reconfigurable Multi-Ring Hardware
Parallel Polygo Approximatio Algorithm Targeted at Recofigurable Multi-Rig Hardware M. Arif Wai* ad Hamid R. Arabia** *Califoria State Uiversity Bakersfield, Califoria, USA **Uiversity of Georgia, Georgia,
More informationAnalysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve
Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao
More information3D Model Retrieval Method Based on Sample Prediction
20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer
More informationn n B. How many subsets of C are there of cardinality n. We are selecting elements for such a
4. [10] Usig a combiatorial argumet, prove that for 1: = 0 = Let A ad B be disjoit sets of cardiality each ad C = A B. How may subsets of C are there of cardiality. We are selectig elemets for such a subset
More informationAlgorithms for Disk Covering Problems with the Most Points
Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi
More informationCS : Programming for Non-Majors, Summer 2007 Programming Project #3: Two Little Calculations Due by 12:00pm (noon) Wednesday June
CS 1313 010: Programmig for No-Majors, Summer 2007 Programmig Project #3: Two Little Calculatios Due by 12:00pm (oo) Wedesday Jue 27 2007 This third assigmet will give you experiece writig programs that
More informationLower Bounds for Sorting
Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig
More informationBayesian approach to reliability modelling for a probability of failure on demand parameter
Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee
More informationFast Multiplication Without Carry-Propagate Addition
IEEE TRANSACTIONS ON COMPUTERS, VOL. 39, NO. 11, NOVEMBER 1990 1385 TABLE IV TESTS FOR F& AND FA, TABLE V TESTS FOR RN, uder the assumptio that RN~ has already bee tested ad determied to be fault-free
More informationHow do we evaluate algorithms?
F2 Readig referece: chapter 2 + slides Algorithm complexity Big O ad big Ω To calculate ruig time Aalysis of recursive Algorithms Next time: Litterature: slides mostly The first Algorithm desig methods:
More informationModule 8-7: Pascal s Triangle and the Binomial Theorem
Module 8-7: Pascal s Triagle ad the Biomial Theorem Gregory V. Bard April 5, 017 A Note about Notatio Just to recall, all of the followig mea the same thig: ( 7 7C 4 C4 7 7C4 5 4 ad they are (all proouced
More informationDynamic Programming and Curve Fitting Based Road Boundary Detection
Dyamic Programmig ad Curve Fittig Based Road Boudary Detectio SHYAM PRASAD ADHIKARI, HYONGSUK KIM, Divisio of Electroics ad Iformatio Egieerig Chobuk Natioal Uiversity 664-4 Ga Deokji-Dog Jeoju-City Jeobuk
More informationA Generalized Set Theoretic Approach for Time and Space Complexity Analysis of Algorithms and Functions
Proceedigs of the 10th WSEAS Iteratioal Coferece o APPLIED MATHEMATICS, Dallas, Texas, USA, November 1-3, 2006 316 A Geeralized Set Theoretic Approach for Time ad Space Complexity Aalysis of Algorithms
More informationDigital System Design
July, 22 9:55 vra235_ch Sheet umber Page umber 65 black chapter Digital System Desig a b c d e f g h 8 7 6 5 4 3 2. Bd3 g6+, Ke8 d8 65 July, 22 9:55 vra235_ch Sheet umber 2 Page umber 66 black 66 CHAPTER
More informationLecture 18. Optimization in n dimensions
Lecture 8 Optimizatio i dimesios Itroductio We ow cosider the problem of miimizig a sigle scalar fuctio of variables, f x, where x=[ x, x,, x ]T. The D case ca be visualized as fidig the lowest poit of
More informationSECURITY PROOF FOR SHENGBAO WANG S IDENTITY-BASED ENCRYPTION SCHEME
SCURITY PROOF FOR SNGBAO WANG S IDNTITY-BASD NCRYPTION SCM Suder Lal ad Priyam Sharma Derpartmet of Mathematics, Dr. B.R.A.(Agra), Uiversity, Agra-800(UP), Idia. -mail- suder_lal@rediffmail.com, priyam_sharma.ibs@rediffmail.com
More informationCache-Optimal Methods for Bit-Reversals
Proceedigs of the ACM/IEEE Supercomputig Coferece, November 1999, Portlad, Orego, U.S.A. Cache-Optimal Methods for Bit-Reversals Zhao Zhag ad Xiaodog Zhag Departmet of Computer Sciece College of William
More informationAn Improvement of the Basic El-Gamal Public Key Cryptosystem
Iteratioal Joural of Computer Applicatios Techology ad Research A Improvemet of the Basic El-Gamal Public Key Cryptosystem W.D.M.G.M. Dissaayake (PG/MPhil/2015/09 Departmet of Computer Egieerig Faculty
More informationCOMP Parallel Computing. PRAM (1): The PRAM model and complexity measures
COMP 633 - Parallel Computig Lecture 2 August 24, 2017 : The PRAM model ad complexity measures 1 First class summary This course is about parallel computig to achieve high-er performace o idividual problems
More information