Suppose that n is an exact power of 2

Assignment Help Computer Engineering
Reference no: EM1336300

The sum of n k-bit numbers can be computed by a combinational arithmetic circuit as follows.

Assume that n is an exact power of 2. The circuit consists of a complete binary tree of ripple-carry adders, in which each node in the tree adds two numbers and produces a sum which is fed to its parent. The n/2 leaves of the tree input the n k-bit numbers, and the total sum is produced as output by the root. Each ripple-carry adder is as small as possible while still ensuring that the sum is correctly computed.

[a] What is the maximum number of bits in the sum of the n k-bit numbers?
What is the number of full adders in any ripple-carry adder at height h in the tree, where we view leaves as having height 0?

[b] Give a tight asymptotic upper (big-Oh) bound in terms of n and k, on the size of this circuit (definition below). Briefly explain your answer.

[c] Give a tight asymptotic upper bound in terms of n and k on the depth of this circuit (definition below). Briefly explain your answer.

[d] Describe a combinational circuit that computes the sum of n k-bit numbers more efficiently. Analyze the size and depth of this circuit.

Circuit Depth :

As in the case of the comparison networks, we measure the propagation delay of a combinational circuit in terms of the largest number of combinational elements on any path from the inputs to the outputs. Specifically, we define the depth of a circuit, which corresponds to its worst-case "running time", inductively in terms of the depths of its constituent wires. The depth of an input wire is 0. If a combinational element has inputs x1, x2,..., xn at depths d1, d2,...,dn respectively, then it's outputs have depth (max{d1, d2,..., dn}+1).

The depth of a combinational element is the depth of its outputs. The depth of a combinational circuit is the maximum depth of any combinational element in it. Since we prohibit combinational circuits from containing cycles, the various notions of depth are well defined. If each combinational element takes constant time to compute its output values, then the worst-case propagation delay through a combinational circuit is proportional to its depth.

A combinational circuit can sometimes compute faster that its depth. Suppose that a large sub-circuit feeds into one input of a 2-input AND gate but that the other input of the AND gate has a value of 0. The output of the gate will then be 0, independent of the input being applied to the circuit, and the abstraction of depth as the "running time" of the circuit is therefore quite reasonable.

Circuit Size :

Besides circuit depth, there is another resource that we typically wish to minimize when designing circuits - the size of a combinational circuit, which is defined as the number of combinational elements it contains. Intuitively, circuit size corresponds to the memory space used by an algorithm.

This definition of circuit size is not particularly useful for small circuits. After all, since a full adder has a constant number of inputs and outputs and computes a well-defined function, it satisfies the definition of a combinational element. A full adder built from a single full adder combinational element therefore has size 1. In fact, according to this definition, any combinational element has size 1.

Reference no: EM1336300

Questions Cloud

The new strategic role of hr : What is the new strategic role of HR
Explain strategic management- swot analysis of serion : Explain Strategic Management- SWOT Analysis of Serion Therapeutics and preferably the organization or company for which you work
Identification process during the planning of the project : Explain when the stakeholder and identification process should take place during the planning of the project.
Prepare a job posting for this position : Prepare a job posting for this position and Please help me develop a job posting that can be played in the newspaper and the Internet
Suppose that n is an exact power of 2 : imagine that n is an exact power of 2. The circuit consists of a complete binary tree of ripple-carry adders, in which each node in the tree adds two numbers and produces a sum which is fed to its parent.
Regarding delinquency theories : Can delinquent behavior be deterred by the threat of punishment? If not, how can it be controlled? Explain.
Explain minimal spanning tree technique : Explain minimal spanning tree technique
Evaluating potential projects before implementing it : Why do you think it is important to evaluate potential projects before proceeding with implementation?
Explain detailed explanation to marketing strategy : Explain Detailed Explanation to marketing strategy and That is to say you are to assume that you will be free to start a one-person business and are to examine yourself

Reviews

Write a Review

Computer Engineering Questions & Answers

  Explain a solution to this synchronization problem

There is a one-way bridge that could hold up to three cars. Cars arrive at one end of the bridge and exit the bridge at the other end. Traffic is allowed only in the one, available, direction.

  Explain the software packages in detail

explain the software packages in detail. analysis of the advantages and disadvantages of each of the software packages used.

  Provide users optimum signal strength and availability

Name one major advantage and one major disadvantage of "Simple Network Management Protocol (SNMP)" and describe a short scenario in that a company would find this tool the ideal choice for monitoring their WLAN.

  Find out another design pattern for web based development

There are other design patterns that could be directly applicable to PHP programming, or web programming in general.

  Is it good idea to elimination all operator precedence rules

will it be a good idea to elimination all operator precedence rules and require parentheses to show the desired precedence in expressions? Why or why not.

  How to exchange the floating point number

How to exchange the floating point number

  Protecting the computing environment

Does protecting a computing environment merely mean protecting those five components? Explain why?

  How to identify as important to the process

How important is it to have an established process while implementing a new technology into an organization.

  Find whether the numbers would be an arithmetic

assume you are given a list of n integers in random order. Describe an algorithm that will determine whether the numbers would be an arithmetic progression if they were sorted.

  Explain a mitigating strategy for the risks

Briefly identify and describe a mitigating strategy for the risks.

  Create the table relationships

make one query, your choice. Remember a query answers a question. As an example, list all household electronics that are greater in value than $200. Please ensure that the query title reflects what the query is about.

  Knowledge revolution and industrial revolution

What are your thought on this that would support notion that Knowledge Revolution was born from the Industrial Revolution?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd