About IJSRD: Impact Factor 2.39

IJSRD is a leading e-journal, under which we are encouraging and exploring newer ideas of current trends in Engineering and Science by publishing papers containing pure knowledge.

Design and Simulation of Radix-8 Booth Encoder Multiplier for Signed and Unsigned Numbers

IJSRD Found one good research work on Electronics & Communication research area.

Abstract–This paper presents the design and simulation of signed-unsigned Radix-8 Booth Encoding multiplier. The Radix-8 Booth Encoder circuit generates n/3 the partial products in parallel. By extending sign bit of the operands and generating an additional partial product the signed of unsigned Radix-8 BE multiplier is obtained. The Carry Save Adder (CSA) tree and the final Carry Look ahead (CLA) adder used to speed up the multiplier operation. Since signed and unsigned multiplication operation is performed by the same multiplier unit the required hardware and the chip area reduces and this in turn reduces power dissipation and cost of a system. The simulation is done through Verilog on xiling13.3 platform which provide diversity in calculating the various parameters.

Keywords: Array multiplier, Baugh-Woolley multiplier, Braun array multiplier, CLA, CSA, Radix-8 Booth Encoding multiplier, Signed-unsigned


BOOTH ENCODER

Booth’s algorithm involves repeatedly adding one of two predetermined values to a product P, and then performing a rightward arithmetic shift on P.Radix-8 Booth encoding is most often used to avoid variable size partial product arrays. Before designing Radix-8 BE, the multiplier has to be converted into a Radix-8 number by dividing them into four digits respectively according to Booth Encoder Table given afterwards. Prior to convert the multiplier, a zero is appended into the Least Significant Bit (LSB) of the multiplier

Capture

PROPOSED SIGNED UNSIGNED RADIX-8 BOOTH ENCODER MULTIPLIER


For more information Click Here

Emergent Artificial Intelligence

EAI-icon1-300x300

What happens when a computer can learn on the job?

Artificial intelligence (AI) is, in simple terms, the science of doing by computer the things that people can do. Over recent years, AI has advanced significantly: most of us now use smartphones that can recognize human speech, or have travelled through an airport immigration queue using image-recognition technology. Self-driving cars and automated flying drones are now in the testing stage before anticipated widespread use, while for certain learning and memory tasks, machines now outperform humans. Watson, an artificially intelligent computer system, beat the best human candidates at the quiz game Jeopardy.

Artificial intelligence, in contrast to normal hardware and software, enables a machine to perceive and respond to its changing environment. Emergent AI takes this a step further, with progress arising from machines that learn automatically by assimilating large volumes of information. An example is NELL, the Never-Ending Language Learning project from Carnegie Mellon University, a computer system that not only reads facts by crawling through hundreds of millions of web pages, but attempts to improve its reading and understanding competence in the process in order to perform better in the future.

Like next-generation robotics, improved AI will lead to significant productivity advances as machines take over – and even perform better – at certain tasks than humans. There is substantial evidence that self-driving cars will reduce collisions, and resulting deaths and injuries, from road transport, as machines avoid human errors, lapses in concentration and defects in sight, among other problems. Intelligent machines, having faster access to a much larger store of information, and able to respond without human emotional biases, might also perform better than medical professionals in diagnosing diseases. The Watson system is now being deployed in oncology to assist in diagnosis and personalized, evidence-based treatment options for cancer patients.

Long the stuff of dystopian sci-fi nightmares, AI clearly comes with risks – the most obvious being that super-intelligent machines might one day overcome and enslave humans. This risk, while still decades away, is taken increasingly seriously by experts, many of whom signed an open letter coordinated by the Future of Life Institute in January 2015 to direct the future of AI away from potential pitfalls. More prosaically, economic changes prompted by intelligent computers replacing human workers may exacerbate social inequalities and threaten existing jobs. For example, automated drones may replace most human delivery drivers, and self-driven short-hire vehicles could make taxis increasingly redundant.

On the other hand, emergent AI may make attributes that are still exclusively human – creativity, emotions, interpersonal relationships – more clearly valued. As machines grow in human intelligence, this technology will increasingly challenge our view of what it means to be human, as well as the risks and benefits posed by the rapidly closing gap between man and machine.

http://goodresearchjournal.blogspot.in/

http://goo.gl/xfUT1N

http://www.ijsrd.com/Sp_SubmitManuscript

http://www.ijsrd.com/SubmitManuscript

No Signal Yet From Philae (But ESA Isn’t Giving Up)

Lights in the Dark

Philae's view from its current location on comet 67P/C-G. ( ESA/Rosetta/Philae/CIVA)Philae’s view from its current location on comet 67P/C-G, captured by one of its three CIVA cameras. (ESA/Rosetta/Philae/CIVA)

The first attempt by ESA and Rosetta to hear back from Philae has turned up only radio silence – but that doesn’t necessarily mean the lander is on permanent shutdown. It may just be that it’s still too cold and dark where Philae is to have sufficiently warmed up its components for reactivation.

“It was a very early attempt; we will repeat this process until we receive a response from Philae,” said DLR (Germany’s Aerospace agency) Project Manager Stephan Ulamec. “We have to be patient.”

After landing in an as yet unconfirmed location on comet 67P on November 12, 2014, Philae performed all of its primary science tasks before running out of battery power and entering a hibernation “safe” mode. Its reawakening is anticipated by mission engineers as the comet gets closer to the…

View original post 278 more words

#IJSRD Computational Modeling and Docking for H1N1virsus using Bioinformatics

Computational Modeling and Docking for  H1N1virsus using Bioinformatics

Abstract— This  research work will be carried out using the retrieval of H1N1virsus  Hemagglutinin protein   sequence of Influenza A virus[AEN79399] in FASTA format, these sequence are retrieve from the NCBI database that have unknown structure. The aim of present study was to carry out the computational modeling study of the mentioned protein sequence using 3DJigsawn protein comparative modeling server, Verify-3D structure evaluation server, CHIMERA. Validation process done by Verify3D analyzes, the compatibility of an atomic model (3D) with its own amino acid sequence (1D).Collect all the results for possible Ligand/drug candidate finding in-silico. The last step is Docking study for H1N1 protein with Tamiflu (possible Ligand) that help for finding a correct medicine.

For more details Click on below links :

 
http://ejournalsijsrd.wordpress.com/

Mech Department For IJSRD

IJSRD E JOURNAl

aRTICLE 3

http://ijsrdjournals.blogspot.in/

http://ijsrdindianjournals.blogspot.in/

http://ejournalijsrd.blogspot.in/

http://goo.gl/S0N9pH

#IJSRD Digital Watermarking Methods in Spatial Domain and Transform Domain

#IJSRD

Digital Watermarking Methods in  Spatial Domain and Transform Domain

Abstract— The ease of digital media modification and dissemination necessitates content protection beyond encryption. Information hidden as digital watermarks in multimedia i.e. text, image, video, audio enables protection mechanism in decrypted contents. In a way that protects from attacks several common image processing techniques are used in Spatial Domain and Transform Domain. In Spatial Domain Least Significant Bit(LSB) is used and in Transform domain Discrete Cosine Transform(DCT) & Discrete Wavelet Transform(DWT) are used. Among these DWT is best method due because of using embedded zero tree wavelet image compression scheme and high frequency sub bands.  

 

For More Details 

Click on Below Links :

 

#IJSRD advanced persistent threat (APT)

Advanced Persistent Threats (APTs) are a cybercrime category directed at business and political targets. APTs require a high degree of stealithiness over a prolonged duration of operation in order to be successful. The attack objectives therefore typically extend beyond immediate financial gain, and compromised systems continue to be of service even after key systems have been breached and initial goals reached.

to know more about APT go to this link https://www.damballa.com/advanced-persistent-threats-a-brief-description/

Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students….

kindly share to all engineers…

Like us on www.facebook.com/IJSRD

Visit us on www.ijsrd.com

http://topresearchjournals.wordpress.com/
https://ijsrdscholarticles.wordpress.com/
http://indianjournalslist.blogspot.in/
http://ijsrdindia.blogspot.in/
http://ijsrdjournal.blogspot.in/
http://ijsrdresearch.wordpress.com/
https://goodindianjournallist.wordpress.com/
https://ijsrdinternational.wordpress.com/
https://ijsrdpublication.wordpress.com/
http://ijsrdinternational.blogspot.in/
http://ijsrdejournal.blogspot.in/
http://ijsrdrpublication.blogspot.in/
http://csejournal.blogspot.in/
http://ijsrdenviornment.blogspot.in/
http://ijsrdcallforpaper.blogspot.in/
http://ijsrdarchive.blogspot.in/
http://ijsrdcallforpaper.blogspot.in/
http://ijsrdgoodjournal.blogspot.in/

#IJSRD MOBILE PROTECTION VICTIMISATION VOICE VERIFICATION

Cellular communication business has developed leaps and bounds to become the core of day to day science. Mobile phones is that the spirit of cellular business. the quantity of mobile phones users is rising exponentially. however the privacy of user and security of mobile phones leftovers a difficult question. Theft of mobile phones has become the attention catching business for offender. There ought to be a reliable methodology of protective the instrument from thief. My paper proposes a brand new innovative, reliable, trick proof precautions for mobile phones victimization VOICE VERIFICATION. Voice verification is that the identification of a personal identity victimization speech because the spotting quality. The voice of the user is processed employing a digital gesture processor that is that the prime a part of a mobile. we have a tendency to are programming this DSP to implement this safety technique. For most a resourceful voice record of the user is formed. This record is hold on within the Flash read-only storage that is out there within the mobile. Then whenever the user speaks through the mobile phones a part of the speech sample is taken and hold on. This processed voice of the user is compared with the first folder to examine the identity of the user. If the user is allowed, he’s allowed to continue his speak. If not the transmission is cut unexpectedly by creating the DSP in inactive state. Therefore the mobile is being shielded from any extralegal user. Not with standing the mobile phones was purloined or lost it won’t be helpful for the other individual. The programmability of DSP and generality of Voice based mostly classification has given our methodology a twin advantage. Our set up demands neither external hardware nor additional price. The on top of methodology cause no hardship for the user not like this safety systems. This methodology may be adopted universally altogether models of Mobile phones and mobile phones for cover.

Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students….

kindly share to all engineers…

Like us on www.facebook.com/IJSRD

Visit us on www.ijsrd.com

http://topresearchjournals.wordpress.com/
https://ijsrdscholarticles.wordpress.com/
http://indianjournalslist.blogspot.in/
http://ijsrdindia.blogspot.in/
http://ijsrdjournal.blogspot.in/
http://ijsrdresearch.wordpress.com/
https://goodindianjournallist.wordpress.com/
https://ijsrdinternational.wordpress.com/
https://ijsrdpublication.wordpress.com/
http://ijsrdinternational.blogspot.in/
http://ijsrdejournal.blogspot.in/
http://ijsrdrpublication.blogspot.in/
http://csejournal.blogspot.in/
http://ijsrdenviornment.blogspot.in/
http://ijsrdcallforpaper.blogspot.in/
http://ijsrdarchive.blogspot.in/
http://ijsrdcallforpaper.blogspot.in/
http://ijsrdgoodjournal.blogspot.in/