Speculative Han-Carlson Adder Case Study

Great Essays
Abstract—In this paper we have proposed speculative Han-Carlson adder. The proposed adder Employs speculation: the exact mathematic function is replaced with an approximated one that is faster and gives the correct result most of the time, but not for all time. The approximated adder is augmented with an error detection network that asserts an error signal when speculation fails. The speculative adder to reduce delay and power consumption compared to non-speculative adder and simulated using ModelSim 6.3f. Delay and power consumption of non-speculative and speculative Han-Carlson adder were analyzed using Xilinx ISE 8.1i.
Keywords—Addition, mathematic, non-speculative adder, speculative adder, delay, power consumption. 1. INTRODUCTION
Adders
…show more content…
5. 16-bit Non-Speculative Han-Carlson Adder
This adder has five stages in which the middle three stages are resembles with the Kogge-Stone structure. The advantage of this adder is that it uses much less cells and its shorter span wires than the Kogge-Stone adder and thus there is reduction in complexity at the cost of an additional stage for carry-merge path. The main drawback of this adder is that increased power consumption.
4. PROPOSED WORK
This work 16-bit speculative Han-Carlson adder (HCA) is proposed. Speculative prefix adders can be subdivided in five stages: pre-processing, speculative prefix-processing, post-processing, error detection and error correction. The error correction stage is off the critical path, as it has two clock cycles to obtain the exact sum when speculation fails.
4.1 Pre-processing stage The propagate and generate signals are computed as in equations (1) & (2).
4.2 Speculative Prefix-processing stage
The last Kogge-Stone row of the n = 16 bit graph is shortened, resulting in a speculative prefix-processing stage with K = 8 is shown in Fig. 6. The length of the propagate chains is K = 8 only for i = 9,11,13,15, while for i = 10,12,14 the propagate chain length is K+1 = 9. The computed propagate and generate signals for the speculative Han-Carlson architecture

Related Documents

  • Improved Essays

    We want the neural network to predict the stock price at a future date using stock price, EMA, RSI and MACD data of today and the last few days. The neural network can be configured to have a specified number of hidden layers. In addition to hidden layers the neural network has an input layer and an output layer. In the input layer we give the input that is stock price, EMA, RSI and MACD data of today and the last few days. The hidden layer comes between the input layer and the output layer.…

    • 588 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 2

    • 703 Words
    • 3 Pages

    The code can appear in several forms, however in this lab the modular approach was used. This form allows the program to be created in sections, and then the sections are compiled together to formulate the code in its entirety. In each part of this lab a code was created using this approach, such as code one which can be seen in Figure 5. After a code, has been completed it is compiled to ensure no errors are present, which would interfere with the output generated on the DE2-115 board.…

    • 703 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 1 Test Paper

    • 695 Words
    • 3 Pages

    $s3 (i ? n) #beq $t0, $zero, load1 # go to exit1 if $s0 ? $s3 (i ? n) subi $s1, $s0, 1 # j = i – 1 for2tst: slti $t0, $s1, 0 # $t0 = 1 if $s1 < 0 (j < 0) bne $t0, $zero, load2 # go to exit2 if $s1 < 0 (j < 0) sll $t1, $s1, 2 # $t1 = j * 4 add $t2, $s2, $t1 # $t2 = v + (j * 4) lw $t3, 0($t2)…

    • 695 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Additional wellbeing has been incorporated into this outline by making a "loopbacks" to the zero tally, with a yield of zero if the information state to the counter is inconceivable for the present number that it is on (for instance, a data condition of 010—NS, when the present check is 101—5, the NS tally ought to have as of now circled back). By circling back to zero, this will give the framework's movement express a more drawn out time to determine an "undetermined" state. Test Strategy: With a specific end goal to test the counter outline, we have chosen to test just a predetermined number of cases and test to see whether the configuration a) tallies accurately, and b) sends the yield T high at the right times. To do this, we will pick two or three states to…

    • 869 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 5 Lab Report

    • 510 Words
    • 3 Pages

    Pre-Lab 10 CS 122L - 5 Points Total Objectives ● Learn how to use anonymous functions ● Practice with looping intervals Deliverables ● Submit your pre-lab answers in Bblearn under the Lab 10 pre-lab assignment area. 1) The anonymous function allows us to easily create mathematical functions, and store them in variables. The documentation below provides additional details. http://www.mathworks.com/help/matlab/matlab_prog/anonymous-functions.html: For example, let’s say we wanted to implement the equation…

    • 510 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Covert (45)10 to binary. Answer: - (45)10 is in decimal system so it should be divided by 2 and put reminder as 0 or 1 on right side. Reminder 2 45 1 2 22 0 2 11 1 2 5…

    • 727 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 5 Lab Report

    • 1927 Words
    • 8 Pages

    Goals According to the flow chart above, we need to generate a binary sequence of 0's and 1's, the length of which is 2N bits, that occur with equal probability and are mutually independent for which a ‘rand’ function is used. The data is then passed through a QPSK modulator to produce N complex symbols of {±1 , ±1j}. At the receiver, noise is added to the transmitted signal and the resultant signal is then passed through the QPSK demodulator to produce estimates of the transmitted binary data. After that, the demodulator output is compared with the original sequence, and finally an error counter is used to count the number of bit errors.…

    • 1927 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    The specification of hardware is GPU used : NVIDIA GTX280 (has about 30 multiprocessors each with 8 processors, frequency is 1.29 GHz) CPU used : Intel i5D, 4 cores, frequency of 2.67 GHz. GPU memory, bandwidth : 1 GB, 141.7GB/s To get a more clear picture speedup calculated only after the I/O file is completed. Results that are obtained from the proposed differential (data size dependent) approach are compared with other approaches like HP_k_means (for smaller hence low-dimension data), UV_k-means , GMiner (for large data sets) and then fialy the performance is compared with CPU. A. Small data sets (Low –dimension) For this a data set of sizes 2 million and 4 million with varying values of “k” (number of the distinct sets/groups) and “d”…

    • 971 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Unit 5

    • 541 Words
    • 3 Pages

    The Haswell microarchitecture improvises the Ivy-bridge in the following ways: • New socket LGA1150 for desktop processors • New AVX2 Instruction set • New TSX Instruction set • New bit manipulation instructions • New dispatch ports INSTRUCTION SET: The AVX instruction set limited the integer operations to use only 128-bit registers whereas the floating point operations used 256-bit registers. In addition, AVX2 implements three operand FMA instructions. New 15 bit manipulation instructions were added to support cryptography, indexing and data conversion. The third new instruction set is TSX which helps resolve data synchronization issues which arises when same data are used by different processes running at the same time.…

    • 541 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Test Sequences Class Test Sequence Class B BQTerrace_1920X1080 Class C BQMall_832X480 Class D BlowingBubbles_416X240 Class E Johnny_1280X720 To calculate the computational efficiency of proposed algorithm total time saving and ME time saving measures are used. PSNR Gain and increase in Bit Rate are the performance quality measures These are calculated as follows: Time Saving = (16) PSNR Loss = TZ PSNR – Proposed PSNR (17) Bit Rate Increase=…

    • 279 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Additional Larox filter press; 6. Addition of a carbon regeneration system; 7. Pipeline from the FTDS to the mill; 8. FTDS pad expansion; 9. FTDS pond water treatment system and discharge; 10.…

    • 1164 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Answer 2) Shared CPU Architecture. Architecture of Cisco 7200 Series Router: The Network processing engine comprises the central memory, the CPU, the Peripheral Component Interconnect memory, while NPE 100 uses dynamic random access memory, and the regulator integrated circuit for the buses.…

    • 639 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Myth of Parity written by Scoop Jackson, argues that College athletics is a business instead of what we perceive it as. He States that college athletes sign an agreement that is a mutual agreement in which one-party is undercompensated. He points out that we have a fascination with thinking that students are being taken advantage of by multimillion-dollar colleges. The broad point of this article is how people choose to romanticize the college aspect of College athletics, to present it as if there is an inherent mechanism against the proposition that college athletics is nothing more than a business. Scoop says,” Every Student who signs a letter of intent or agrees to accept a scholarship to play a sport knows going in that the school’s…

    • 272 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Tinkercad Lab Report

    • 395 Words
    • 2 Pages

    Diagram of Prototype A that consisted of an octagonal prism with a length of 11 in. or 27.94 cm. and height of 10.16 cm. , while we created corrugated layers within the prism. We decided to change all the dimensions to centimeters instead of using inches as the units. Tinkercad model of Prototype B that consisted of a hexagonal prism with a length of 27.94 cm.…

    • 395 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Divide and Conquer Strategies: Divide and conquer is an algorithm which design paradigm based on multi-branched recursion. This designed paradigm consists of following phases: 1) Break the problem (divide): Breaking the problem into several sub-problems that are smaller in size. 2) Solve the sub problem(conquer) : Solve the sub-problem recursively .…

    • 718 Words
    • 3 Pages
    Improved Essays