arithmetic pipelines, Computer Engineering

Arithmetic Pipelines

The method of pipelining can be applied to a variety of complex and slow arithmetic operations to speed up the processing time. The pipelines used for arithmetic computations are known as Arithmetic pipelines. In this part, we talk about arithmetic pipelines based on arithmetic operations. Arithmetic pipelines are constructed for easy fixed-point and difficult floating-point arithmetic operations. These arithmetic operations are well suited to pipelining as these operations can be efficiently partitioned into subtasks for the pipeline phases. For executing the arithmetic pipelines we normally use following two types of adder:

i) Carry propagation adder (CPA): It generally adds two numbers such that carries generated in successive digits are propagated.

ii) Carry save adder (CSA): It adds two numbers such that carries generated are not propagated relatively these are saved in a carry vector.

 

Posted Date: 3/4/2013 4:15:29 AM | Location : United States







Related Discussions:- arithmetic pipelines, Assignment Help, Ask Question on arithmetic pipelines, Get Answer, Expert's Help, arithmetic pipelines Discussions

Write discussion on arithmetic pipelines
Your posts are moderated
Related Questions
Describe the Assume - Assembler directives ASSUME: This directive would be used to map the segment register names with memory addresses.  Syntax is as below: ASSUME SS:

Tree (recursive definition) A tree is a finite set of one or more than one nodes such that. (1) There is a specially designated node known as the root. (2) The left over

As an XML expert you are needed to model a system for an online furniture shop. After an interview with the shop manager you have the certain information: The detail of th

What types of calendars can you create with Google Calendar? Personal calendars, like default calendar Public calendars, which others can access through the web

As an advocate of CISC architecture to RISC architecture, what are the merits and demerits of CISC to RISC architecture

Description Variables show values that can be changed within a procedure or function. Local scope variables are placeholders that reside within a function- or a script-body.

Authorization Bypass is a frighteningly easy process which can be employed with poorly designed applications or content management frameworks. You know how it is... you run a small

Add a byte number from one memory location to a byte from subsequent memory location and put sum in the third memory location. Also save carry flag in the least significant bit of

Question: (a) Explain the three categories of design patterns. Give two examples from each category. (b) When describing a pattern what is the purpose of "The Intent", an

For JK flip flop with J=1, K=0, the output after clock pulse will be ? Ans. The output will be 1 after clock pulse.