The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
4×4 Vedic multiplier using domino logic is proposed in this paper. The designs are implemented in GPDK 90nm technology on cadence virtuoso tool using spectre simulator. Multiplication is a fundamental operation, which is widely used in many digital signal processing systems, multimedia applications, computers and many digital systems. Power and delay are two important design constraints but there...
Data transmission is the critical issue when dealing with parallel processing systems. As the number of processors increases day by day inside the supercomputers, faults are very common to occur. Therefore, generating node-disjoint paths is the guarantee to sending data from source process to destination process successfully, since single faulty process can affect maximum one path. Beyond selecting...
Cloud computing is now trending and more popular in these days for the computation and adopted by many companies like google, amazon, Microsoft etc., As the cloud size increases with increase in number of data center power consumption over a data center increases. As number of request over the data center increase with increase in load and power consumption of the data center. So the requests need...
Genetic algorithm (GA) has been proved to be efficient for optimization problems. It contains four operators including coding, selection, crossover and mutation. It is based on ‘survival of the fittest’ theory of Charles Darwin. Due to some drawbacks, it cannot be applied on all optimization problems. Several experiments have been done to improve the quality of GA. In this paper, a hybrid form of...
Various clustering algorithms utilize novel techniques for clustering data. It is very difficult to decide which algorithms to be used for clustering large graph like PPI networks and various biological networks and hence Comparative analysis provides important insight into application specific usage of corresponding techniques and provides motivation for further studies in the same domain. In this...
DNA sequence assembly is one of the most popular problems in molecular biology. DNA sequence assembly refers to aligning and merging fragments of a much longer DNA sequence in order to reconstruct the original sequence. There are many solutions provided by researchers. In this paper we have adopted the features of the Particle Swarm Optimization (PSO) algorithm with Smallest Position Value (SPV) rule...
In asymmetric key cryptography, also called Public Key cryptography, two different keys (which forms a key pair) are used. One key is used for encryption & only the other corresponding key must be used for decryption. No other key can decrypt the message, not even the original (i.e. the first) key used for encryption. The beauty of this scheme is that every communicating party needs just a key...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.