Design a 1-bit full adder, Computer Engineering

Design a 1-bit full adder:

Verify your design

Use the 1-bit full adder to build a 4-bit adder with Ci=0

Verify: 1 + 4, and 9 + 9

Sram design:

Cell: p - 0.5/0.045; np - 1/0.1; nd - 2/0.05

Do: write "1" -> cell

Read à "1"

Write "0" -> cell

Read -> "0"

 Lab Report

1. Brief descriptions of your design method and circuits behavior, verification procedure.

2. simulations

4. Draw conclusion

Posted Date: 3/19/2013 6:23:43 AM | Location : United States







Related Discussions:- Design a 1-bit full adder, Assignment Help, Ask Question on Design a 1-bit full adder, Get Answer, Expert's Help, Design a 1-bit full adder Discussions

Write discussion on Design a 1-bit full adder
Your posts are moderated
Related Questions
What are the Cycle based simulators Cycle based simulators are more like a high speed electric carving knife in comparison since they focus on a subset of the biggest problem:

How do you achieve workflow automation in e-business environment?   In order to run easily, organizations often standardize processes across the organization and encourage user

THE NEED OF PARALLEL COMPUTATION   With the growth of computer science, computational pace of the processors has also increased many a times. Though, there are definite constr

Shared Memory System / Tightly Coupled System Shared memory multiprocessors have the subsequent features: For real-time high-speed processing these systems are preferabl

A/An                network is typically a company network that connects multiple company locations into a single network. (A)  local area                                  (B

Explain in detail about Touch screens For people who can't use a keyboard allowing input; also helps people with learning difficulties since icons are easier to understand

A subscriber makes three phone calls of 3 minutes, 4 minutes and 2 minutes duration in a one hour period. Calculate the subscriber traffic in erlangs, CCS and CM. Subscriber tr

What are various types of Shift Registers ? Ans: Kinds of Shift Registers: (i) SISO that is Serial-In Serial-Out Shift Register (ii) SIPO that is Serial-In P

Voice Identifier - Biometric Computer Security Systems Besides fingerprint, another popular security technology is voice identifier. According to VSS organization (2007), voic

Difficulties - canonical genetic algorithm: Therefore the first big problem we face whether designing an "AI" agent to perform a GA-style search is how to represent the soluti