A pipelined multiplier-accumulator focusing on pipeline architecture / Norfadilah Khalil
Pipelined MAC adalah singkatan bagi Pipelined Multiplier-Accumulator. ia direka untuk meningkatkan masa larian bagi dan mengurangkan lengahan pada Conventional MAC.Disamping itu, dengan pengguanaan pipeline dalam pembinaan MAC, masa dan kos dapat dikurangkan. Dalam Pipeline MAC, proses pendaraban da...
| Main Author: | Nor Fadilah, Khalil |
|---|---|
| Format: | Thesis |
| Published: |
2003
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/12549/ http://studentsrepo.um.edu.my/12549/1/niorfadilah_khalil.pdf |
Similar Items
A pipelined multiplier accumulator focusing on pipeline architecture / Laili Erni Hitam
by: Laili Erni, Hitam
Published: (2003)
by: Laili Erni, Hitam
Published: (2003)
Exception handling for 5-stage pipeline micro-architecture
by: Puan, Arthur Chok Ho
Published: (2015)
by: Puan, Arthur Chok Ho
Published: (2015)
Visualization pipeline for medical datasets on grid computing environment
by: Ahmed, A. A., et al.
Published: (2007)
by: Ahmed, A. A., et al.
Published: (2007)
Using ensemble and learning techniques towards extending the knowledge Discovery Pipeline.
by: Yu, N Cheah, et al.
Published: (2002)
by: Yu, N Cheah, et al.
Published: (2002)
Adoption Issues in DevOps from the Perspective of Continuous Delivery Pipeline
by: Muhammad Zulfahmi Toh, Abdullah, et al.
Published: (2019)
by: Muhammad Zulfahmi Toh, Abdullah, et al.
Published: (2019)
Evaluation of Transfer Learning Pipeline for ADHD Classification via fMRI Images
by: Nur Atiqah, Kamal, et al.
Published: (2024)
by: Nur Atiqah, Kamal, et al.
Published: (2024)
A study of database connection pool in microservice architecture
by: Nur Ayuni, Nor Sobri, et al.
Published: (2022)
by: Nur Ayuni, Nor Sobri, et al.
Published: (2022)
Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
by: Hani, Mohamed Khalil, et al.
Published: (2000)
by: Hani, Mohamed Khalil, et al.
Published: (2000)
32-bit 5-stage RISC pipeline processor with 2-Bit dynamic branch prediction functionality
by: Chang, Boon Chiao
Published: (2015)
by: Chang, Boon Chiao
Published: (2015)
Design and Development of Memory System for 32-bit 5 Stage Pipeline RISC: Memory System Integration
by: Goh, Dih Jiann
Published: (2015)
by: Goh, Dih Jiann
Published: (2015)
Design of low power high speed digital vedic multiplier using 13T hybrid full adder
by: Lee, Shing Jie
Published: (2018)
by: Lee, Shing Jie
Published: (2018)
Agent architectures (building chatterbot) / Umi Aimah Abu Bakar
by: Umi Aimah , Abu Bakar
Published: (2003)
by: Umi Aimah , Abu Bakar
Published: (2003)
Digital watermarking in 2D and 3D transform domains focusing on fidelity and robustness / Almas Abbasi
by: Almas, Abbasi
Published: (2015)
by: Almas, Abbasi
Published: (2015)
Knowledge design in rule-based system architecture for C tutorial / V Thavachelvi Velautham
by: V Thavachelvi, Velautham
Published: (2005)
by: V Thavachelvi, Velautham
Published: (2005)
Sierpinski triangle based data-center network architecture in cloud computing / Qi Han
by: Qi, Han
Published: (2016)
by: Qi, Han
Published: (2016)
A microservice-based architecture for an online product review analysis system / Mehdi Mohammadi
by: Mehdi , Mohammadi
Published: (2021)
by: Mehdi , Mohammadi
Published: (2021)
Automated system architecture for container- based and hypervisor-based virtualization / Muhammad Amin Abdul Razak
by: Muhammad Amin , Abdul Razak
Published: (2019)
by: Muhammad Amin , Abdul Razak
Published: (2019)
Selection of Pipeline Investigation Robot via Pugh Method
by: Choo, Wou Onn, et al.
Published: (2020)
by: Choo, Wou Onn, et al.
Published: (2020)
Development of objective-oriented components for ATM networks simulation with emphasis on switch architecture /
Tan Boon Pin
by: Tan, Boon Pin
Published: (2001)
by: Tan, Boon Pin
Published: (2001)
A low ripple voltage multiplier for X-ray power supply
by: Iqbal, Shahid, et al.
Published: (2008)
by: Iqbal, Shahid, et al.
Published: (2008)
Natural language semantic event extraction pipeline
by: Siaw, Nyuk Hiong, et al.
Published: (2013)
by: Siaw, Nyuk Hiong, et al.
Published: (2013)
A novel control scheme for voltage multiplier based X-ray power supply
by: Iqbal, Shahid, et al.
Published: (2008)
by: Iqbal, Shahid, et al.
Published: (2008)
A novel control scheme for voltage multiplier based X-ray power supply
by: Shahid, Iqbal, et al.
Published: (2008)
by: Shahid, Iqbal, et al.
Published: (2008)
Single/three-phase symmetrical bipolar voltage multipliers for X-ray power supply
by: Shahid, Iqbal, et al.
Published: (2008)
by: Shahid, Iqbal, et al.
Published: (2008)
Accessing Accumulated Knowledge in Online Community Question Answering Services
by: Lee, Jun Choi, et al.
Published: (2015)
by: Lee, Jun Choi, et al.
Published: (2015)
Decision Support System Framework for Implementation of Enterprise Resource Planning (ERP) System
by: Khalil, M.A.T., et al.
Published: (2010)
by: Khalil, M.A.T., et al.
Published: (2010)
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
by: Esmeel, Thamer Khalil, et al.
by: Esmeel, Thamer Khalil, et al.
The MFIBVP real-time multiplier
by: Kerlooza, Yusrila Y., et al.
Published: (2011)
by: Kerlooza, Yusrila Y., et al.
Published: (2011)
Development Of Instrument For Evaluating Website Usability Focusing On University Website
by: Nur Sakinah, Abd Aziz, et al.
Published: (2015)
by: Nur Sakinah, Abd Aziz, et al.
Published: (2015)
Low power and high speed 8x8 bit multiplier using non-clocked Pass Transistor Logic
by: Senthilpari, C., et al.
Published: (2007)
by: Senthilpari, C., et al.
Published: (2007)
A Dual-Mode Input Voltage Modulation Control Scheme for Voltage Multiplier Based X-Ray Power Supply
by: Iqbal, S., et al.
Published: (2008)
by: Iqbal, S., et al.
Published: (2008)
A cloud architecture with an efficient scheduling technique
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Energy efficient computing architecture for rural applications
by: Yew, Sin Giap
Published: (2014)
by: Yew, Sin Giap
Published: (2014)
Design of a low-power, high performance, 8×8bit multiplier using a Shannon-based adder cell
by: SENTHILPARI, C, et al.
Published: (2008)
by: SENTHILPARI, C, et al.
Published: (2008)
Design and Development of Architectural Model Darul Ridzuan Museum
by: Jaafar, J., et al.
Published: (2010)
by: Jaafar, J., et al.
Published: (2010)
Software architecture in project management / Looi Kum Yeng
by: Looi, Kum Yeng
Published: (2001)
by: Looi, Kum Yeng
Published: (2001)
JOMS: System architecture for telemetry and visualization on unmanned vehicle
by: Khalid, Hasnan, et al.
Published: (2012)
by: Khalid, Hasnan, et al.
Published: (2012)
Securing the Calea architecture against denial of service attacks
by: Lim, Kong Hua
Published: (2011)
by: Lim, Kong Hua
Published: (2011)
An architecture design of the intelligent agent for speech recognition and translation
by: Ahmad, Abdul Manan, et al.
Published: (2005)
by: Ahmad, Abdul Manan, et al.
Published: (2005)
Virtual environments in architecture and planning design: 4 possible approaches
by: Mohamed Eshaq, Ahmad Rafi, et al.
Published: (2003)
by: Mohamed Eshaq, Ahmad Rafi, et al.
Published: (2003)
Similar Items
-
A pipelined multiplier accumulator focusing on pipeline architecture / Laili Erni Hitam
by: Laili Erni, Hitam
Published: (2003) -
Exception handling for 5-stage pipeline micro-architecture
by: Puan, Arthur Chok Ho
Published: (2015) -
Visualization pipeline for medical datasets on grid computing environment
by: Ahmed, A. A., et al.
Published: (2007) -
Using ensemble and learning techniques towards extending the knowledge Discovery Pipeline.
by: Yu, N Cheah, et al.
Published: (2002) -
Adoption Issues in DevOps from the Perspective of Continuous Delivery Pipeline
by: Muhammad Zulfahmi Toh, Abdullah, et al.
Published: (2019)