Binary floating-point number range, Computer Engineering

Assignment Help:

Q. Binary floating-point number range?

Smallest Negative number

  Maximum mantissa and maximum exponent

    =    - (1 -2-24) × 2127

 Largest negative number

  Minimum mantissa and Minimum exponent

    = -0.5 × 2-128

 Smallest positive number 

    = 0.5 × 2-128

Largest positive number

    = (1 -2-24) × 2127

398_Binary floating-point number range.png

Figure: Binary floating-point number range for given 32 bit format

In floating point numbers basic transaction is between range of numbers and accuracy also known as precision of numbers. If we raise exponent bits in 32-bit format then range can be increased but accuracy of numbers would go down as size of mantissa would become smaller. Let's have an illustration that will elucidate term precision. Suppose we have one bit binary mantissa then we would be able to represent only 0.10 and 0.11 in normalised form as provided in above illustration (having an implicit 1). Values like 0.101, 0.1011 and so on can't be represented like complete numbers. Either they have to be estimated or truncated and would be represented as either 0.10 or 0.11. So it will produce a truncation or round off error. The higher the number of bits in mantissa better would be precision.

In case of floating point numbers for raising both precision and range more bits are required. This can be obtained by employing double precision numbers. A double precision format is generally of 64 bits.

Institute of Electrical and Electronics Engineers (IEEE) is a group that has created many standards in aspect of various aspects of computer has created IEEE standard 754 for floating-point representation and arithmetic. Fundamental aim of developing this standard was to facilitate portability of programs from one to another computer. This standard has resulted in growth of standard numerical capabilities in different microprocessors. This representation is displayed in figure below.

2060_Binary floating-point number range1.png

Figure: IEEE Standard 754 format


Related Discussions:- Binary floating-point number range

Define wait protocol, Q. Define Wait protocol? The wait protocol is use...

Q. Define Wait protocol? The wait protocol is used for resolving conflicts that arise due to some multiprocessors requiring same resource. There are 2 kinds of wait protocols:

Name the popular security measures, Name the popular security measures ...

Name the popular security measures A number of security products covering a broad range of methods are available in the market. Most popular of all the security measures are th

What is fork, What is Fork Clk gets its value after 1 time unit, rese...

What is Fork Clk gets its value after 1 time unit, reset after 10 time units, enable after 5 time units, data after 3 time units. All the statements are executed in parallel.

What is associative search, What is associative search? The cost of an ...

What is associative search? The cost of an associative cache is higher that the cost of a direct mapped cache due to the need to search all 128 bit tag patterns to verify wheth

Show basic concepts of permutation, Q. Show Basic concepts of permutation? ...

Q. Show Basic concepts of permutation? Let us look at the basic concepts of permutation with respect to interconnection network.  Let us say the network has set of n input node

What is a accepting computation history, What is a accepting computation hi...

What is a accepting computation history?  An accepting computation history is explained as , Let M be a Turing machine and w be a input string,  for M on w is a sequence of con

Common problem with hill climbing, Common problem with Hill climbing: ...

Common problem with Hill climbing: An alternative way of justifying the problem is that the states are boards with 8 queens already on them, so an action is a movement of one

Explain the working of master-slave JK flip flop, With relevant diagram exp...

With relevant diagram explain the working of master-slave JK flip flop. Ans. Master-Slave J-K FLIP-FLOP: A cascade of two S-R FLIP-FLOPS is a master-slave J-K FLIP-FLOP. One

Control dependence, Control Dependence Segments or Instructions in a pr...

Control Dependence Segments or Instructions in a program may obtain control structures. Thus, dependency between the statements can also be in control structures. But the order

Define the firewall design policy, Define the Firewall Design Policy ...

Define the Firewall Design Policy A lower-level policy that describes how the firewall will handle prevention of access and filtering of services as defined in the above net

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd