Migrating Inputs: A Comparator Based Sorting
نویسندگان
چکیده
منابع مشابه
Adder and Comparator Synthesis with Exclusive-OR Transform of Inputs
An exclusive-OR transform of input variables significantly reduces the size of the PLA implementation for adder and comparator circuits. For n bit adder circuits, the size of PLA for transformed functions is O(n2). In comparison, when the complete truth-table of an adder is minimized, the PLA size will be O(2n+2). Similarly, for an n bit comparator, the size of the PLA is reduced from O(2n+1) t...
متن کاملArea Efficient Sorting Unit Using Scalable Digital CMOS Comparator
Sorting is the process of arranging the data into a meaningful order so that we can analyze it more effectively. Sorting is a key requirement in many applications like digital signal processing, scientific computing, network processing etc. This paper presents an area efficient technique for designing high throughput and low latency sorting units. Two popular parallel sorting algorithms are u...
متن کاملComparator Design and Analysis for Comparator - Based Switched - Capacitor Circuits
The design of high gain, wide dynamic range op-amps for switched-capacitor circuits has become increasingly challenging with the migration of designs to scaled CMOS technologies. The reduced power supply voltages and the low intrinsic device gain in scaled technologies offset some of the benefits of the reduced device parasitics. An alternative comparator-based switched-capacitor circuit (CBSC)...
متن کاملComparator Design and Analysis for Comparator-Based Switched-Capacitors Circuits
The design of high gain, wide dynamic range op-amps for switched-capacitor circuits has become increasingly challenging with the migration of designs to scaled CMOS technologies. The reduced power supply voltages and the low intrinsic device gain in scaled technologies offset some of the benefits of the reduced device parasitics. An alternative comparator-based switched-capacitor circuit (CBSC)...
متن کاملSecure Comparator: a ZKP-Based Authentication System
Being a secret, it’s best protected when it never leaves the safe zone. Proving identity involves communicating the secret to another party, which eventually exposes the whole or a part of the secret, in a direct or indirect (hashed) form. In the real world, authentication traffic passes thousands of systems between a prover (you) and a verifier (an entity which eventually decides whether your ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Machine Learning and Computing
سال: 2015
ISSN: 2010-3700
DOI: 10.7763/ijmlc.2015.v5.478