IJSRP, Volume 2, Issue 7, July 2012 Edition
نویسندگان
چکیده
Digital signal processing (DSP) is the technology that is omnipresent in almost every engineering discipline. A typical processor devotes a considerable amount of processing time in performing arithmetic operations, particularly multiplication operations. Multiplication is one of the basic arithmetic operations and it requires substantially more hardware resources and processing time than addition and subtraction. In fact, 8.72% of all the instruction in typical processing units is multiplication. The core computing process is always a multiplication routine; therefore, DSP engineers are constantly looking for new algorithms and hardware to implement them. Vedic mathematics is the name given to the ancient system of mathematics, which was rediscovered, from the Vedas between 1911 and 1918 by Sri Bharati Krishna Tirthaji. The whole of Vedic mathematics is based on 16 sutras (word formulae) and manifests a unified structure of mathematics. This paper presents the design of a low power high speed algorithms for arithmetic logic units using this ancient mathematics techniques and also their hardware implementation. Even convolution algorithms using this technique are discussed along with their FGPA implementation. Employing these techniques in the computation algorithms of the coprocessor has reduced the complexity, execution time, area, power. Further research prospects may include the design and development of a Vedic DSP chip using VLSI technology.
منابع مشابه
IJSRP, Volume 2, Issue 7, July 2012 Edition
The main target of this research paper is to propose an algorithm to implement data security using encryption and decryption method in binary sequence of original text message. The binary sequence of message is converted into DNA sequence, which consists of nucleotide letter A,T,G,C., then by using random function, which generates the sequence of random numbers for each nucleotide. The generate...
متن کاملIJSRP Feb 2012 Edition, Volume 2, Issue 2
Recursive Visual cryptography takes the idea from the basic scheme of Visual cryptography to hide multiple secrets recursively in the single image. [1] This paper proposes a scheme of recursive creation of shares using the basic scheme and embedding secrets into the shares. This results levels of share creation i.e. nsecrets equals n/2 levels. This paper also provides secured authentication for...
متن کاملIJSRP, Volume 2, Issue 7, July 2012 Edition
In this paper particle swarm optimization (PSO) algorithm is proposed to optimize Combined Economic emission Dispatch Problem (CEEDP)of thermal units. Combined Economic emission Dispatch Problem (CEEDP is used to minimize both total fuel cost of generation and the emission of toxic gases of the thermal generating units simultaneously while satisfying the load demand and constraints of the syste...
متن کاملIJSRP, Volume 2, Issue 7, July 2012 Edition
The tremendous advances and the aggressive infusion of information technology had brought in a paradigm shift in banking operations. With the rapid proliferation of Internet Technology banking sector now takes a different approaches often termed as E-banking. The adoption of Ebanking becomes a necessity for the banking which wishes to maintain its share of market and retain its customers. In on...
متن کاملIJSRP, Volume 2, Issue 7, July 2012 Edition
This Paper presents a comparative study of Genetic Algorithm method (GA) and Particle swarm optimization (PSO) method to determine the optimal proportional-integral (PI) and proportional-integral-derivative (PID) controller parameters, for speed control of a Field Oriented Control (FOC) induction motor. The FOC induction motor has been modeled in MATLAB (SIMULINK); the GA and PSO algorithm has ...
متن کامل