Bit pair recoding and 2’s complement, Computer Engineering

Explain bit pair recoding with an example?

Ans: Bit pair recoding halves the maximum number of summands. Group the Booth-recoded multiplier bits in pairs and see the following: The pair (+1 -1) is equivalent to the pair (0 +1). That is instead of adding -1 times the multiplicand m at shift position i to +1 * M at position i+1, the similar result is achieved by adding +1 * M at position i.  For example:11010 - Bit Pair recoding value is 0 -1 -2

Explained the methods of achieving the 2's complement

1) first take the 1's complement of the number and add 1.

2) Leave all least significant 0's and the first unchanged and then complement the remaining bits.

 

Posted Date: 10/13/2012 8:10:33 AM | Location : United States







Related Discussions:- Bit pair recoding and 2’s complement, Assignment Help, Ask Question on Bit pair recoding and 2’s complement, Get Answer, Expert's Help, Bit pair recoding and 2’s complement Discussions

Write discussion on Bit pair recoding and 2’s complement
Your posts are moderated
Related Questions
What is pattern? A pattern is a proven solution to a general problem. Lots of patterns are used. There are patterns for analysis, architecture, design and execution. Patterns c

Translate the following sentences into predicate logic. Give as much structure as possible. Provide a translation key for each predicate letter and individual constant. In your tra

What happens if a function module runs in an update task? The system performs the module processing asynchronously.  Instead of carrying out the call immediately, the system w

Environments: We have seen that an agents intelligent should take into account certain information when it choose a rational action, including information from its sensors, in

The ISCII is an 8-bit code which contains standard ASCII values till 127 from 128-225 it contains characters necessary in ten Brahmi-based Indian scripts. It is defined in IS 13194

Arc Consistency: There have been many advances in how constraint solvers search for solutions (remember this means an assignment of a value to each variable in such a way that

What are the various mechanisms for implementing I/O operations? a) Program controlled I/O b) Interrupts c) DMA

A firewall is Software or hardware used to separate a private network from a public network.

Question (a) Imagine you need to move people through a distance of 10 miles, with the following specifications. • Car: capacity = 5, speed = 60 miles/hour • Bus: capacity

From the early AI pioneering stage the research emphasis has been on developing machines with intelligent behaviour. Machine intelligence however is hard to achieve. Some