Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Four-bit Nanoadder Controlled by Five-Inputs Majority Elements

View through CrossRef
This paper presents a nano circuit of a full one-bit adder on the proposed five-input majority element. This innovative full adder design is used to development of a four-bit adder based on it. We offer a new single-bit full adder and a four-bit adder nano circuit in quantum-dot cellular automata technology. The proposed design four-bit adder utilizes only 231 quantum cells in a 0.49 µm2 area. It has a reduction in the number of cells, delay and energy dissipation at 1 K compared to the existing works. The QCADdesigner version 2.0.3 tool implements the developed quantum-dot cellular automata full adder and four-bit adder circuits. The implementation results show that the developed quantum-dot cellular automata full adder and four-bit adder circuits have an improvement over other quantum-dot cellular automata full adder circuits.
Title: Four-bit Nanoadder Controlled by Five-Inputs Majority Elements
Description:
This paper presents a nano circuit of a full one-bit adder on the proposed five-input majority element.
This innovative full adder design is used to development of a four-bit adder based on it.
We offer a new single-bit full adder and a four-bit adder nano circuit in quantum-dot cellular automata technology.
The proposed design four-bit adder utilizes only 231 quantum cells in a 0.
49 µm2 area.
It has a reduction in the number of cells, delay and energy dissipation at 1 K compared to the existing works.
The QCADdesigner version 2.
3 tool implements the developed quantum-dot cellular automata full adder and four-bit adder circuits.
The implementation results show that the developed quantum-dot cellular automata full adder and four-bit adder circuits have an improvement over other quantum-dot cellular automata full adder circuits.

Related Results

Bit Performance
Bit Performance
Abstract Models for Bearing Wear, Teeth Wear and Penetration Rate of bits have been developed Penetration Rate of bits have been developed which give reasonably g...
An Analysis of Noise Characteristics of Drill Bits
An Analysis of Noise Characteristics of Drill Bits
Abstract There have been papers that analyse the relationship between drill bit design and its vibrational characteristics. These papers typically are based on the a...
An Analysis of Noise Characteristics of Drill Bits
An Analysis of Noise Characteristics of Drill Bits
There have been papers that analyze the relationship between bit design and a bit’s vibrational characteristics. These papers typically are based on the analysis of three-axis near...
BIT/SHPS‐1 Enhances Brain‐Derived Neurotrophic Factor‐Promoted Neuronal Survival in Cultured Cerebral Cortical Neurons
BIT/SHPS‐1 Enhances Brain‐Derived Neurotrophic Factor‐Promoted Neuronal Survival in Cultured Cerebral Cortical Neurons
Abstract: Brain‐derived neurotrophic factor (BDNF) activates a variety of signaling molecules to exert various functions in the nervous system, including neuronal differentiation, ...
Overview: Bit Technology (December 2005)
Overview: Bit Technology (December 2005)
Drilling programs have become more challenging, regarding depths, well profiles, and formation drillability—in terms of hardness and/or abrasiveness. This situation places a lot of...
IMPLEMENTASI STEGANOGRAFI TEXT TO IMAGE MENGGUNAKAN METODE ONE BIT LEAST SIGNIFICANT BIT BERBASIS ANDROID
IMPLEMENTASI STEGANOGRAFI TEXT TO IMAGE MENGGUNAKAN METODE ONE BIT LEAST SIGNIFICANT BIT BERBASIS ANDROID
Abstrak - Informasi merupakan hal yang sangat penting dan berharga, dewasa ini informasi sering dipertukarkan melalui internet. Kemajuan teknologi smartphone terutama smartphone An...
A New Method of Bit Selection using Drill Bit Images
A New Method of Bit Selection using Drill Bit Images
Abstract Research on bit selection in rotary drilling work and its relationship with different geological, operational parameters and bit type demands an improved pr...
Least Significant Bit Comparison between 1-bit and 2-bit Insertion
Least Significant Bit Comparison between 1-bit and 2-bit Insertion
Steganography can be used to secure secret messages. Steganography works by hiding valuable information in an accommodating medium. The media used is an image. In inserting informa...

Back to Top