You are on page 1of 17

IMPLEMENTATION OF DADDA MULTIPLIER

Presented by (Batch No :
16)
19FE1A0442 - I.Aasritha
19FE1A0419 - B.V.Suma Sri
19FE1A0454 K. Manasa Swetha
- P. Jeffrey
19FE1A0450
- Under the Guidance of
Mr. J.VEERAYYA , M.Tech

Department of Electronics and Communication


Engineering
Contents
• Objectives
• Introduction
• Existing Approach
• Proposed Appraoch
• Working
• Flow chart
• Advantages
• Applications
• Conclusion
Objectiv
e
• A new technique called Dadda Multiplier is used to increase
the speed of Digital Systems by reducing Partial Products
Introductio
n •The present generation wants everything to be done as quick as possible. Hence, The
demand for high speed processing has been increasing with leaps and bounds. Multiplier
is the most crucial part in almost every DSP application and micro processors.
•The power consumption and the speed of the digital systems mainly depend on the
multipliers that are adopted in those digital systems. The objective of a good multiplier is
to provide a physically packed together, high speed and low power consumption unit.
This paper proposes an efficient hardware implementation of a digital circuit that
multiplies two unsigned integers.
•The technique used for optimizing this hardware is compression where the compressors
are used to reduce the number of partial product levels which often reduces the area
consumed by partial products.
•It uses a selection of full and half adders to sum the partial products in stages until two
numbers are left. The design is similar to the Wallace multiplier, but the different
reduction tree reduces the required number of gates and makes it slightly faster.
Existing Approach

8 7 6 5 4 3 2 1 0
16 15 14 13 12 11 10 9
24 23 22 21 20 19 18 17
32 31 30 29 28 27 26 25
40 39 38 37 36 35 34 33
48 47 46 45 44 43 42 41
56 55 54 53 52 51 50 49
65 64 63 62 61 60 59 58 57
(a)

8 BY 8 ARRAY MULTIPLIER
Existing Approach

65 64 56 48 40 32 24 8 7 6 5 4 3 2 1 0
63 55 47 39 31 16 15 14 13 12 11 10 9
62 54 46 38 23 22 21 20 19 18 17
61 53 45 30 29 28 27 26 25
60 52 37 36 35 34 33
59 44 43 42 41
51 50 49
58 57

WALLACE TREE APPRAOCH


Proposed Approach

65 64 56 48 40 32 24 8 7 6 5 4 3 2 1 0
63 55 47 39 31 16 15 14 13 12 11 10 9
62 54 46 38 23 22 21 20 19 18 17
61 53 45 30 29 28 27 26 25
60 52 37 36 35 34 33
59 44 43 42 41
51 50 49
58 57
Proposed system Block
Diagram
FINGERPRINT
SENSOR LCD

GSM GSM
MODEM MODEM
MCU

KEYPAD BUZZER
Methodology / Working
principle
• The proposed women safety device provides assistance to a woman who might be in
an unsafe situation.

• The device is essentially ready for all the situations that might go against the will of
the woman.

• The fingerprint of the woman must be registered initially and it is used to activate the
device. As soon as the device is activated by the woman, it starts scanning the
fingerprint of the woman for every minute.

• The time when no fingerprint is sensed by the scanner,the device will be trigged setting
off
a buzzer to alert a nearby public.

• As the device starts scanning the fingerprint only during emergency ie., only when
Methodology / Working
principle
• Moreover ,the latitude and longitude data which is received by the GPS is delivered to
both LCD and the GSM modem which will forward message to woman’s
family/friends.

• Thus, even if she is knocked down from behind and is not able to trigger an alert, the
device will automatically it send an emergency message to all the contacts listed by the
woman as ICE contacts (In Case of Emergency contact) regarding the current location of
the woman.

• The uniqueness of the proposed design in handling the sensitive issue of women safety
as other devices rely on Women to press some button or make some movement in the
handheld device. But it fails when she has no time to react.

• In this fingerprint-based method if the women are attacked from behind then also it will
alert nearby people and police .
Methodology / Working
principle
• As our idea is that if there is no fingerprint verification on our IOT based device for one min
then it will automatically alert nearby people and police.

• . Besides sending alerts, the android application facilitates audio recording of the victim and
suggests nearby safe locations.
Flow chart Women keeping her
finger pressed to the
device

If “NO FINGER” is pressed


to device for one minute

THE
DEVICE
Alert sent to Family
members and police
Along with current
location

Android application
getting Triggered
Advantage
s
• Best for women security
• Keeps others alert
• Helps to keep safe from robbers
• Location tracking becomes easy
Application
s
• The woman’s safety device with GPS tracker can be
used while walking through the dark street at
night.

• This project is also useful in case of an accident.

• Can be used to get rid of robbers .


Expected
Results
• Once the user activated the device with her fingerprint, the continuous monitoring begins, which
keeps on checking for fingerprint on the fingerprint module. In case, there is no finger impression
for one-minute buzzer starts to beep.

• When the buzzer starts to beep, the GSM module sends message to all in case of emergency
(ICE) numbers along with the latitude and longitude values which is taken from the GPS module
and it also triggers the android application which suggests the victim for the possible safe
location.
Conclusio
n
By inolving Dadda Multiplier in DSP speed has been
increased
Thank
you

You might also like