(IJCST-V9I2P10) :DR - Shine N Das

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

International Journal of Computer Science Trends and Technology (IJCST) – Volume 9 Issue 2, Mar-Apr 2021

RESEARCH ARTICLE OPEN ACCESS

An Area-Efficient Truncated Adaptive Booth (AET-AB)


Multiplier for Signal Processing Applications
Dr.Shine N Das
Associate professor Department of computer science college of Engineering,
Munnar, kerala - India

ABSTRACT
Essentially, the key element of speech processing, Digital Signal Processing and audio processing is a
multiplier. The conventional array of partial products to creates extra rows and irregularity. The steady
multiplication products are truncated to m bits. In this article, we introduced an adaptive booth concept it is
based on the multiplier truncation. Therefore, the complexity of partial product and overhead are reduced using
our proposed methodology. The proposed concept architecture is implemented in Verilog HDL software also the
design of RTL is manufactured. Experimentally, the bit multiplication of 8  8 with 8, 10, 12, 14 and 16 bits are
used.
Keywords: Signal, VLSI, HDL, (AET-AB) Multiplier, Speech processing.

I. INTRODUCTION
Fundamentally, the digital system radix-8 optimize the adder unit and it produces low
designing with the major critical design constrain is power truncated plan.
power consumption. The crucial digital system like
space system, surveillance units, system security, II. RELATED WORKS
functional defences and medical supervisory are
highly significant with low power, high reliable and More researchers have been introduced the
low overhead area of functional units [1]. The procedure and methods about area-efficient
energy consumption is reduced by using truncated based multiplier of the booth for the
approximate computing concept but it never application of signal processing. Few of the existing
produces the accurate output. Recently, the methods are discussed in this section. Juang et al. [8]
requirement of VLSI (Very Large-Scale Integration) debated about the algorithm of recursive DFT yet the
is increased day by day because of low power computation cycles are reduced. The DTMF
consumption and hand held device demand. For the application of input strength decline, higher
designing process of the VLSI circuit, there is a performance and splitting register are obtained. The
trade-off among the occupied area and power delay numerous memory requirement of DTMF detector to
[2]. Especially, the arithmetic operations cause the decode twenty-four channels only. But the memory
signal processing in the area of energy consumption. word program of thousand with data memory of 800
The Graphics signal processing, central signal by means of the word length becomes 16-bit.
processing and digital signal processing units are the Consoli et al. [9, 10] suggested the method of
major component of the arithmetic circuit. For the latched pulsed pull-push and it delivers effective
operation of energy consumption and high latency energy competence and less productivity. While
by multiplication operation is used frequently [3]. In compared to the pulsed transmission gate, the pulsed
signal processing units, the error-tolerant are latch of pull-pushed produces higher accurate
produced by using multiplier approximation. Hence, outcomes. Sivakumar et al. [11] introduced Fixed
many more circuit level methods are used for the Width multiplier for the generation of partial product
designing of adder and fault-tolerant respectively. with the usage of modified booth algorithm. The
Significantly, the Baugh Wooley and Booth are the gate basics of easy and effective sorting network are
widely used multiplier algorithms and it produces to produce the compensation function as many areas
the powerful hardware implementation output. efficient. Thus, the error distribution is
Mostly the Booth algorithms were effectively used unsymmetrical in nature and it never appropriates to
and numerous alterations are discussed in the survey the application of multimedia. Liu et al. [12]
section. Moreover, the adder complexity and row of described booth multiplier of approximate radix-4
partial product array are reduced by using higher concept. This method is more accurate and effective
radix booth multiplication [7]. Thus, the partial in terms of approximate accumulation. Because of
product selector and generator complexity are the triple multiplicand, the least significant bit from
increased by means of higher radix Booth algorithm. the approximate adder of radix-8 is produced.
Thereby, low AADP of 20.8% of Booth multiplier Therefore, the radix-4 is used to encode the most
significant bit but the higher radix value required to
encode the most significant bit respectively.

ISSN: 2347-8578 www.ijcstjournal.org Page 59


International Journal of Computer Science Trends and Technology (IJCST) – Volume 9 Issue 2, Mar-Apr 2021

Antelo et al. [13] recommended a modified booth algorithm for partial product generation. Therefore,
the output of the encoder is to approximate the quantization error and the carry approximation is produced from
the bias compensation. Hence, the error performance and speed with higher circuit performance are obtained
also asymmetrical error distribution is obtained. Pouiklis et al. [14, 15] have been discussed about the flip-flop
type of look-ahead clock. By using this method ten percentage of power more overly reduced. The predefined
changeable and logic synthesis amalgamation is to create the enabled clock signal and it directs the clock pulses
as redundant. Sasikala et al. [16] were presented the architecture of dynamic segmentation process based on the
leading location, the n bits to truncate the input operand. It produces the outcome of negative mean relative error
and less truncation output. Saravanan et al. [17] proposed a signal processor of low-power ECG. It is used in
point detector in support of neuro modulation with fully integrated SoC and implementation problems. The
shadow latch input is accumulated by the issues are solved by using filter FIR respectively but the data storing
process to make many problems. The error is reduced because of the increasing number of components. Liu et
al. [18, 19] suggested a concept of simple approximation and it is used to estimate the number of antilogarithm
and logarithm. Thus, the final result can create logarithmic summation.

Leakage and total power estimation:

When compared to the existing methodology, the proposed truncated based booth multiplier required low silicon
area [23]. Based on the method of partial product reduction with half and full adders significant number values
also abridged. The proposed truncated based booth multiplier produces low dissipation of leakage power. The
cell reduction in proposed concept is based on the analytical procedure [24]. Thus, the proposed method leakage
and total power dissipation are compared with the existing multipliers such as carry width [25], Vedic [26],
Voltage mode [27], Wallace trace multiplier [28] respectively. The additional compensation parameter is used to
increase the dissipation and switching power. Therefore, the proposed methodology (AET-AB) Multiplier
delivers the result of less leakage and total power, which is shown in Fig: 1 respectively.

Fig 1: Performance analysis

Table 1: Tabulation of power delay and area estimation

No.of bits (m) Power Delay Area

8 1.209 4.67 650.445

16 4.678 5.98 2345.56

32 21.76 7.98 7993.78

Error estimationusing different error normalization:

ISSN: 2347-8578 www.ijcstjournal.org Page 60


International Journal of Computer Science Trends and Technology (IJCST) – Volume 9 Issue 2, Mar-Apr 2021

The error performances truncations in proposed system effectiveness are checked by using various error factors.
Therefore, the normalized error maximum (εEM), mean absolute error (εMAE), mean square error (εMSN), mean
error (εME) are introduced [30]. The 8 8 bit multiplication of proposed error performance is carried out using
εEM,εMAE,εMSN and εME. From Fig 12, the value of m becomes 8, 10, 12, 14 and 16 respectively. The error
m
maximum 2 is calculated by a bit of the least significant [31]. In all cases, the 8-bit multiplication produced
the error maximum value of 256. The proposed performances of error with various normalizations are illustrated
in Fig 12. The proposed truncated based adaptive booth encoding concept is compared with previous methods
by means of normalized error. From this, the proposed method delivers much less point of error in all cases and
it is tabulated in table 6.

Fig 2: Error performance of the proposed method with different bit values

CONCLUSION Cluster‐Based Routing Protocol in


Information-Centric Wireless Sensor
In this paper, we proposed a truncated based Networks for IoT Based Mobile Edge
adaptive booth encoding for the reduction (AET- Computing. Wireless Personal
AB) Multiplier of extra partial product rows and Communications, 1-24.
the signed bit multiplication of 8  8 is used. The [2] Raveendran, A. P., Alzubi, J. A., Sekaran,
synthesis of RTL is designed and implemented in R., & Ramachandran, M. A high
the software of Verilog HDL. The bits of values are performance scalable fuzzy based modified
8, 10, 12, 14 and 16 used for experimentation. Asymmetric Heterogene Multiprocessor
From our proposed concept, the bit value of m=8 System on Chip (AHt-MPSOC)
delivers low area such as 657.3816 (m 2 ) also the reconfigurable architecture. Journal of
performance of lower delay and power is obtained. Intelligent & Fuzzy Systems, (Preprint), 1-
Hence, the error execution of the suggested method 12.
is correlated with a normalized error such as error [3] Mansour, Romany F., and A. A. Marghilani.
maximum (εEM), mean absolute error (εMAE), mean “A new technique to fingerprint recognition
square error (εMSN) and mean error (εME). The error based on partial window.” Computer
m Engineering and Intelligent Systems 3.10
maximum of ( 2 ) is estimated with the help of (2012): 63-76.
least significant bit and it provides optimal error [4] Namasudra, S. (2020). Fast and Secure Data
measurement. Thus, the state-of-art concept of Accessing by using DNA Computing for the
booth encoding delivers suitable performance Cloud Environment. IEEE Transactions on
outcomes in case of surface and ratio of chip area Services Computing.
respectively. [5] Goli, A., Zare, H. K., Moghaddam, R. T., &
Sadeghieh, A. (2019). An improved artificial
REFERENCE intelligence based on gray wolf optimization
[1] Vaiyapuri, T., Parvathy, V. S., Manikandan, and cultural algorithm to predict demand for
V., Krishnaraj, N., Gupta, D., & Shankar, K.
(2021). A Novel Hybrid Optimization for

ISSN: 2347-8578 www.ijcstjournal.org Page 61


International Journal of Computer Science Trends and Technology (IJCST) – Volume 9 Issue 2, Mar-Apr 2021

dairy products: a case study. IJIMAI, 5(6), Journal of Interactive Multimedia &
15-22. Artificial Intelligence, 5(7).
[6] Elhoseny, M., Shankar, K., & Uthayakumar, [17] Raj, R. J. S., Prakash, M. V., Prince, T.,
J. (2019). Intelligent diagnostic prediction Shankar, K., Varadarajan, V., & Nonyelu, F.
and classification system for chronic kidney (2020). WEB BASED DATABASE
disease. Scientific reports, 9(1), 1-14. SECURITY IN INTERNET OF THINGS
[7] Alzubi, J. A. (2020). Bipolar fully recurrent USING FULLY HOMOMORPHIC
deep structured neural learning based attack ENCRYPTION AND DISCRETE BEE
detection for securing industrial sensor COLONY OPTIMIZATION. Malaysian
networks. Transactions on Emerging Journal of Computer Science, 1-14.
Telecommunications Technologies, e4069. [18] Hamdoun, H., Nazir, S., Alzubi, J. A.,
[8] Mansour, R. F. (2015). Using adaptive Laskot, P., & Alzubi, O. A. (2021).
mutation to accelerate the convergence of Performance benefits of network coding for
immune algorithms for prediction of 3D HEVC video communications in satellite
molecular structure. International Journal of networks. Iranian Journal of Electrical and
Computers and Applications, 37(3-4), 127- Electronic Engineering, 1956-1956.
133. [19] Marghilnai, A. L. (2017). Abdulsamad, and
[9] Namasudra, S., Sharma, S., Deka, G. C., & RF Mansour," Wavelet filter techniques for
Lorenz, P. (2020). DNA computing and segmenting retinal blood
table based data accessing in the cloud vessels,". International Journal of Advanced
environment. Journal of Network and and Applied Sciences, 4(9), 156-160.
Computer Applications, 172, 102835. [20] Namasudra, S., Chakraborty, R., Kadry, S.,
[10] Namasudra, S., & Deka, G. C. Manogaran, G., & Rawal, B. S. (2020).
(2020). Applications of Blockchain in FAST: Fast accessing scheme for data
Healthcare. Springer Singapore Pte. Limited. transmission in cloud computing. Peer-to-
[11] Joshi, R. C., Singh, A. G., Joshi, M., & Peer Networking and Applications, 1-13.
Mathur, S. (2019). A Low Cost and [21] Arora, S., & Singh, S. (2017). An Effective
Computationally Efficient Approach for Hybrid Butterfly Optimization Algorithm
Occlusion Handling in Video Surveillance with Artificial Bee Colony for Numerical
Systems. International Journal of Interactive Optimization. International Journal of
Multimedia & Artificial Intelligence, 5(7). Interactive Multimedia & Artificial
[12] Le, D. N., Parvathy, V. S., Gupta, D., Intelligence, 4(4).
Khanna, A., Rodrigues, J. J., & Shankar, K. [22] Shankar, K., Perumal, E., Elhoseny, M., &
(2021). IoT enabled depthwise separable Nguyen, P. T. (2021). An IoT-Cloud Based
convolution neural network with deep Intelligent Computer-Aided Diagnosis of
support vector machine for COVID-19 Diabetic Retinopathy Stage Classification
diagnosis and classification. International Using Deep Learning Approach. CMC-
Journal of Machine Learning and COMPUTERS MATERIALS &
Cybernetics, 1-14. CONTINUA, 66(2), 1665-1680.
[13] Babu, M. V., Alzubi, J. A., Sekaran, R., [23] Amiri, I. S., Palai, G., Alzubi, J. A., &
Patan, R., Ramachandran, M., & Gupta, D. Nayak, S. R. (2020). Chip to chip
(2020). An Improved IDAF-FIT Clustering communication through the photonic
Based ASLPP-RR Routing with Secure Data integrated circuit: A new paradigm to optical
Aggregation in Wireless Sensor VLSI. Optik, 202, 163588.
Network. Mobile Networks and [24] Mansour, R. F. (2011). Applying an
Applications, 1-9. evolutionary algorithm for protein structure
[14] Mansour, R. F. (2017). Evolutionary prediction. American Journal of
computing enriched ridge regression model Bioinformatics Research, 1(1), 18-23.
for craniofacial reconstruction. Multimedia [25] Namasudra, S., & Roy, P. (2017). Time
Tools and Applications, 1-18. saving protocol for data accessing in cloud
[15] Namasudra, S., Chakraborty, R., Majumder, computing. IET Communications, 11(10),
A., & Moparthi, N. R. (2020). Securing 1558-1565.
Multimedia by Using DNA-Based [26] Dur-e-Ahmad, M., & Imran, M. (2020).
Encryption in the Cloud Computing Transmission Dynamics Model of
Environment. ACM Transactions on Coronavirus COVID-19 for the Outbreak in
Multimedia Computing, Communications, Most Affected Countries of the World.
and Applications (TOMM), 16(3s), 1-19. International Journal of Interactive
[16] Rodríguez, J., Corredor, B., & Suárez, C. Multimedia & Artificial Intelligence, 6(2).
(2019). Genetic Operators Applied to [27] Pustokhin, D. A., Pustokhina, I. V., Dinh, P.
Symmetric Cryptography. International N., Phan, S. V., Nguyen, G. N., & Joshi, G.

ISSN: 2347-8578 www.ijcstjournal.org Page 62


International Journal of Computer Science Trends and Technology (IJCST) – Volume 9 Issue 2, Mar-Apr 2021

P. (2020). An effective deep residual [38] Alzubi, J. A., Manikandan, R., Alzubi, O.
network based class attention layer with A., Qiqieh, I., Rahim, R., Gupta, D., &
bidirectional LSTM for diagnosis and Khanna, A. (2020). Hashed Needham
classification of COVID-19. Journal of Schroeder industrial IoT based cost
Applied Statistics, 1-18. optimized deep secured data transmission in
[28] Alrabea, A., Alzubi, O. A., & Alzubi, J. A. cloud. Measurement, 150, 107077.
(2019). A task-based model for minimizing [39] Mansour, R. F., & Abdelrahim, E. M.
energy consumption in WSNs. Energy (2019). An evolutionary computing enriched
Systems, 1-18. RS attack resilient medical image
[29] Mansour, R. F. (2020). A robust deep neural steganography model for telemedicine
network based breast cancer detection and applications. Multidimensional Systems and
classification. International Journal of Signal Processing, 30(2), 791-814.
Computational Intelligence and [40] Chakraborty, R., Verma, G., & Namasudra,
Applications, 19(01), 2050007. S. (2020). IFODPSO-based multi-level
[30] Namasudra, S., Roy, P., Vijayakumar, P., image segmentation scheme aided with Masi
Audithan, S., & Balusamy, B. (2017). Time entropy. Journal of Ambient Intelligence and
efficient secure DNA based access control Humanized Computing, 1-19.
model for cloud computing [41] García-Díaz, V., Fernández-Fernández, H.,
environment. Future Generation Computer Palacios-González, E., G-Bustelo, B. C. P.,
Systems, 73, 90-105. Sanjuán-Martínez, O., & Lovelle, J. M. C.
[31] García, C. G., Zhao, L., & García-Díaz, V. (2010). Talisman mde: Mixing MDE
(2019). A User-Oriented Language for principles. Journal of Systems and Software,
Specifying Interconnections between 83(7), 1179-1191.
Heterogeneous Objects in the Internet of [42] Shankar, K., & Perumal, E. (2020). A novel
Things. IEEE Internet of Things Journal, hand-crafted with deep learning features
6(2), 3806-3819. based fusion model for COVID-19 diagnosis
[32] Anupama, C. S. S., Sivaram, M., Lydia, E. and classification using chest X-ray
L., Gupta, D., & Shankar, K. (2020). images. Complex & Intelligent Systems, 1-
Synergic deep learning model–based 17.
automated detection and classification of [43] Alzubi, O. A., Alzubi, J. A., Alweshah, M.,
brain intracranial hemorrhage images in Qiqieh, I., Al-Shami, S., & Ramachandran,
wearable networks. Personal and Ubiquitous M. (2020). An optimal pruning algorithm of
Computing, 1-10. classifier ensembles: dynamic programming
[33] Alzubi, O. A., Alzubi, J. A., Dorgham, O., & approach. Neural Computing and
Alsayyed, M. (2020). Cryptosystem design Applications, 32(20), 16091-16107.
based on Hermitian curves for IoT [44] Cueva-Fernandez, G., Espada, J. P., García-
security. The Journal of Díaz, V., Crespo, R. G., & Garcia-
Supercomputing, 76(11), 8566-8589. Fernandez, N. (2016). Fuzzy system to adapt
[34] Mansour, R. F. (2012). A robust method for web voice interfaces dynamically in a
arabic car plates recognition and matching vehicle sensor tracking application
using chain code. American Journal of definition. Soft Computing, 20(8), 3321-
Computational and Applied 3334.
Mathematics, 2(3), 105-111. [45] Mansour, R. F. (2012). Multiple Views
[35] Namasudra, S. (2021). Data access control in Effective for Gait Recognition Based on
the cloud computing environment for Contours. Computer Engineering and
bioinformatics. International Journal of Intelligent Systems, 3(10), 50-62.
Applied Research in Bioinformatics [46] Alzubi, J. A., Jain, R., Kathuria, A.,
(IJARB), 11(1), 40-50. Khandelwal, A., Saxena, A., & Singh, A.
[36] Cueva-Fernandez, G., Espada, J. P., García- (2020). Paraphrase identification using
Díaz, V., & Gonzalez-Crespo, R. (2015). collaborative adversarial networks. Journal
Fuzzy decision method to improve the of Intelligent & Fuzzy Systems, (Preprint),
information exchange in a vehicle sensor 1-12.
tracking system. Applied Soft Computing, [47] Pavithran, P., Mathew, S., Namasudra, S., &
35, 708-716. Lorenz, P. (2020). A Novel Cryptosystem
[37] Alqaralleh, B. A., Mohanty, S. N., Gupta, based on DNA Cryptography and Randomly
D., Khanna, A., Shankar, K., & Vaiyapuri, Generated Mealy Machine. Computers &
T. (2020). Reliable Multi-Object Tracking Security, 102160.
Model Using Deep Learning and Energy [48] Elhoseny, M., & Shankar, K. (2019).
Efficient Wireless Multimedia Sensor Reliable data transmission model for mobile
Networks. IEEE Access, 8, 213426-213436. ad hoc network using signcryption

ISSN: 2347-8578 www.ijcstjournal.org Page 63


International Journal of Computer Science Trends and Technology (IJCST) – Volume 9 Issue 2, Mar-Apr 2021

technique. IEEE Transactions on Reliability,


69(3), 1077-1086.
[49] Nieto, Y., García-Díaz, V., Montenegro, C.,
& Crespo, R. G. (2019). Supporting
academic decision making at higher
educational institutions using machine
learning-based algorithms. Soft Computing,
23(12), 4145-4153.
[50] Miled, A. B., Dhaouadi, R., & Mansour, R.
F. (2020). Knowledge Deduction and Reuse
Application to the Products’ Design
Process. International Journal of Software
Engineering and Knowledge
Engineering, 30(02), 217-237.

ISSN: 2347-8578 www.ijcstjournal.org Page 64

You might also like