Professional Documents
Culture Documents
Documentation
Documentation
Documentation
INTRODUCTION
A viper composed as proposed keeps running in the RCA design, yet it shows
a computational postponement lower than all cutting edge contenders and
accomplishes the least zone delay it.
1
CHAPTER-2
LITERATURE SURVEY
2.1 Introduction:
The essential rule utilized for increase is to assess fractional items and
amassing of moved incomplete items. With a specific end goal to perform this
operation number of progressive expansion operation is required.
In this way one of the real segments required to plan a multiplier is Adder.
Adders can be Ripple Carry, Carry Look Ahead, Carry Select, Carry Skip and Carry
Save. A great deal of examination work has been done to dissect execution of
distinctive quick adders. In 1996, Area-time-power tradeoffs were performed on
diverse parallel adders. Sertbas, A. also, R.S. Özbey in 2004, an execution
investigation was did for arranged twofold viper architectures on the premise of
VHDL reenactments. Execution investigation of multipliers is likewise completed by
number of analysts. Fundamental structural planning of multiplier uses Ripple Carry
Adder in the fractional product offerings.
2
2.2 Existing System:
S = A + B + Cin:
The + in the above equation is the regular add operation. However, in the
binary world, only Boolean algebra works. For add related operations, AND, OR and
Exclusive-OR (XOR) are required. In the following documentation, a dot between
two variables (each with single bit), e.g. a _ b denotes 'a AND b'. Similarly, a + b
denotes 'a OR b' and a _ b denotes 'a XOR b'.
Considering the situation of adding two bits, the sum s and carry c can be
expressed
si = ai^bi
ci+1 = ai.bi
3
Equation of ci+1 can be extended to perform full add operation, where there is
a carry input.
si = ai ^ bi ^ ci
ci+1 = ai . bi + ai . ci + bi . ci
A full adder can be built based on Equation above. The block diagram of a 1-
bit full adder is shown in Figure 2.2. The full adder is composed of 2 half adders and
an OR gate for computing carry-out.
They are called convey produce and convey engender, indicated by gi and pi.
Another strict called provisional whole it is utilized too. There is connection between
the inputs and these literals.
gi = ai . bi
pi = ai + bi
ti = ai ^ bi
With the help of the literals above, output carry and sum at each bit can be
written as
4
ci+1 = gi + pi . ci
si = ti ^ ci
The least difficult method for doing twofold expansion is to unite the do from
the past piece to the following piece's convey in. Every piece takes convey in as one
of the inputs and yields whole and do bit and subsequently the name swell convey
viper. This kind of adders is manufactured by falling 1-bit full adders. A 4-bit swell
convey snake is appeared in Figure 2.3. Each trapezoidal image speaks to a solitary
piece full viper. At the highest point of the figure, the help is undulated through the
snake from Cin to Cout.
5
Figure 2.3 Ripple-Carry Adder
It can be seen in Figure 2.3 that the critical way, highlighted with a strong line,
is from the slightest noteworthy piece (LSB) of the information (a0 or b0) to the most
huge piece (MSB) of entirety (sn-1). Expecting every straightforward entryway,
including AND, OR and XOR door has a deferral of 2/\ and NOT door has a
postponement of 1/\. Every one of the doors have a zone of 1 unit. Utilizing this
examination and expecting that every include piece is assembled with a 9-door full
snake, the critical way is figured as takes after.
ai , bi si = 10/\
ai , bi ci+1 = 9/\
cisi = 5/\
As each bit takes 9 gates, the area is simply 9n for a n-bit RCA.
6
2.2.3 Carry-Select Adders (CSEA):
Simple adders, like ripple-carry adders, are slow since the carry has to travel
through every full adder block. There is a way to improve the speed by duplicating the
hardware due to the fact that the carry can only be either 0 or 1. The method is based
on the conditional sum adder and extended to a carry-select adder. With two RCA,
each computing the case of the one polarity of the carry-in, the sum can be obtained
with a 2x1 multiplexer with the carry-in as the select signal. An example of 16-bit
carry-select adder is shown in Figure 2.4. In the figure, the adder is grouped into four
4-bit blocks. The 1-bit multiplexors for sum selection can be implemented as Figure
2.5 shows. Assuming the two carry terms are utilized such that the carry input is given
as a constant 1 or 0.
In Figure 2.4, each two adjacent 4-bit blocks utilizes a carry relationship
Then
= Gi+4:i + Pi+4:i . ci
= ci+4
Varying the number of bits in each group can work as well for carry-select
adders. temporary sums can be defined as follows.
s0 i+1 = ti+1 . c0 i
s1 i+1 = ti+1 . c1 i
The final sum is selected by carry-in between the temporary sums already
calculated.
Assuming the block size is fixed at r-bit, the n-bit adder is composed of k
groups of r-bit blocks, i.e. n = r x k. The critical path with the first RCA has a delay of
(4r + 5)/\ from the input to the carry-out, and there are k - 2 blocks that follow, each
with a delay of 4/\ for carry to go through. The final delay comes from the
multiplexor, which has a delay of 5/\, as indicated in Figure 2.5. The total delay for
this CSEA is calculated as
= {4r + 4k + 2}/\
8
The area can be estimated with (2n - r) FAs, (n - r) multiplexors and (k - 1)
AND/OR logic. As mentioned above, each FA has an area of 9 and a multiplexor
takes 5 units of area. The total area can be estimated.
9
The theory of the CLA is based on next Equations. Figure 2.8 shows an
example of 16-bit carry-look ahead adder. In the figure, each block is fixed at 4-bit.
BCLG stands for Block Carry Look ahead Carry Generator, which generates
generate/propagate signals in group form. For the 4-bit BCLG, the following
equations are created.
Gi+3:i = gi+3 + pi+3 . gi+2 + pi+3 . pi+2 . gi+1 + pi+3 . pi+2 . pi+1 . gi
10
Figure 2.7 Carry-Look-ahead Adder
The critical way of the 16-bit CLA can be seen from the data operand through
1 RFA, then 3 BCLG and through the last RFA. That is, the critical way appeared in
Figure 2.8 is from a0/b0 to s7. The postponement will be the same for a0/b0 to s11 or
s15, be that as it may, the critical way navigates logarithmically, in view of the
gathering size.
11
The delays are listed below.
a0 , b0 p0 , g0 = 2/\
p0 , g0 G3,0 = 4/\
G3,0 c4 = 4/\
c4 c7 = 4/\
c7 s7 = 5/\
a0 , b0 s7 = 19/\
The 16-bit CLA is made out of 16 RFAs and 5 BCLGs, which adds up to a
zone of
16 x 8 + 5 x 14 = 198 units.
Amplifying the figuring over, the general estimation for deferral and zone can
be inferred. Accept the CLA has n-bits, which is separated into k gatherings of r-bit
squares. It requires dlogrne rationale levels. The critical way begins from the data to
p0/g0 era, BLCG rationale and the convey into whole at MSB. The era of (p; g) takes
a postponement of 2/\. The gathering form of (p; g) created by the BCLG has a
deferral of 4/\. From next BCLG, there is a 4/\ delay from the CLG era and 4/\ from
the BCLG era to the following level, which sums to 8/\. At last, from ck+r to sk+r,
there is a deferral of 5/\. In this manner, the aggregate postponement is computed as
takes after.
= {3 + 8dlogrn}/\.
12
2.4 Proposed System:
QCA cells are used for both logic structures and interconnections that can
exploit either the coplanar cross or the bridge technique. The fundamental logic gates
inherently available within the QCA technology are the inverter and the MG. Given
three inputs a, b, and c, the MG performs the logic function reported in (1) provided
that all input cells are associated to the same clock signal clkx(with x ranging from 0
13
to 3), whereas the remaining cells of the MG are associated to the clock signal clkx+1
M(abc) = a · b + a · c + b · c. (1).
A few plans of adders in QCA exist in writing. The RCA and the CFA [12]
process n-bit operands by falling n full-adders (FAs). Despite the fact that these
expansion circuits use diverse topologies of the non specific FA, they have a do into
convey way comprising of one MG, and a convey into whole piece way containing
two MGs in addition to one inverter. As a result, the most pessimistic scenario
computational ways of the n-bit RCA and the n-bit CFA comprise of (n+2) MGs and
one inverter.
14
(a)
Fig.2.9 Novel n-bit adder (a) carry chain and (b) sum block
With the main objective of trading off area and delay, the hybrid adder
(HYBA) described in combines a parallel-prefix adder with the RCA. In the presence
of n-bit operands, this architecture has a worst computational path consisting of
2×log2 n +2 cascaded MGs and one inverter.
When the methodology recently proposed was exploited, the worst case path
of the CLA is reduced to 4 × _log4 n_ + 2 ×_log4 n_ − 1 MGs and one inverter. The
above-mentioned approach can be applied also to design the BKA. In this case the
overall area is reduced, but maintaining the same computational path.
15
CHAPTER-3
DESIGN AND IMPLEMENTATION
3.1 Introduction:
16
By fixing the polarization of one input as logic “1” or “0”, we can get an OR
gate and an AND gate respectively. More complex logic circuits can be designed from
OR and AND gates.
When you open a project file from a previous release, the ISE® software
prompts you to migrate your project. If you click Backup and Migrate or Migrate
Only, the software automatically converts your project file to the current release. If
you click Cancel, the software does not convert your project and, instead, opens
Project Navigator with no project loaded.
After you convert your project, you cannot open it in previous versions of the
ISE software, such as the ISE 11 software. However, you can optionally create a
backup of the original project as part of project migration, as described below.
To Migrate a Project:
17
3.2.2 Ip Modules:
The ISE 12 programming backings the greater part of the source sorts that
were upheld in the ISE 11 programming.
On the off chance that you are working with undertakings from past
discharges, state graph source documents (.dia), ABEL source records (.abl), and test
seat waveform source documents (.tbw) are no more upheld. For state outline and
ABEL source records, the product discovers a related HDL document and adds it to
the task, if conceivable. For test seat waveform documents, the product consequently
changes over the TBW record to a HDL test seat and adds it to the venture. To
change over a TBW record after task relocation, see Converting a TBW File to a
HDL Test Bench.
To help familiarize you with the ISE® software and with FPGA and CPLD
designs, a set of example designs is provided with Project Navigator. The examples
show different design techniques and source types, such as VHDL, Verilog,
schematic, or EDIF, and include different constraints and IP.
To Open an Example:
18
The example project is extracted to the directory you specified in the
Destination Directory field and is automatically opened in Project Navigator. You
can then run processes on the example project and save any changes.
Venture Navigator permits you to deal with your FPGA and CPLD plans
utilizing an ISE® venture, which contains all the source records and settings
particular to your outline. To begin with, you must make a task and after that, include
source documents, and set procedure properties. After you make an undertaking, you
can run procedures to execute, compel, and break down your configuration. Venture
Navigator gives a wizard to offer you some assistance with creating an undertaking as
takes after.
To Create a Project:
Select File > New Project to launch the New Project Wizard.
In the Create New Project page, set the name, location, and project
type, and click Next.
In the Project Settings page, set the device and project properties, and
click Next.
In the Project Summary page, review the information, and click
Finish to create the project.
Project Navigator manages your project based on the design properties (top-
level module type, device type, synthesis tool, and language) you selected when you
created the project. It organizes all the parts of your design and keeps track of the
processes necessary to move the design from design entry through implementation to
programming the targeted Xilinx® device.
19
3.2.7 Creating a Copy of a Project:
You can create a copy of a project to experiment with different source options
and implementations. Depending on your needs, the design source files for the copied
project and their location can vary as follows.
Design source files are left in their existing location, and the copied project
points to these files.
Design source files, including generated files, are copied and placed in a
specified directory.
Design source files, excluding generated files, are copied and placed in a
specified directory.
Copied projects are the same as other projects in both form and function. For
example, you can do the following with copied projects.
Open the copied project using the File > Open Project menu command.
View, modify, and implement the copied project.
Use the Project Browser to view key summary data for the copied project
and then, open the copied project for further analysis and implementation,
as described
3.2.8 Using The Project Browser:
Alternatively, you can create an archive of your project, which puts all
of the project contents into a ZIP file. Archived projects must be unzipped before
being opened in Project Navigator. For information on archiving, see Creating a
Project Archive.
20
By default, this is blank, and the working directory is the same as the project
directory. However, you can specify a working directory if you want to keep your
ISE® project file (.xise extension) separate from your working area.
If you select this option, the copied project points to the files in their existing
location. If you edit the files in the copied project, the changes also appear in the
original project, because the source files are shared between the two projects.
On the off chance that you select this choice, the replicated task focuses to the
records in the predefined registry. In the event that you alter the documents in the
replicated venture, the progressions don't show up in the first venture, in light of the
fact that the source records are not shared between the two undertakings.
21
3.2.8.1 Exclude Generated Files From The Copy:
When you select this option, the copied project opens in a state in which
processes have not yet been run.
To automatically open the copy after creating it, select Open the copied
project.
Click OK.
3.2.8.2 Creating A Project Archive:
A ZIP file is created in the specified directory. To open the archived project,
you must first unzip the ZIP file, and then, you can open the project.
22
3.3 User Requirement:
3.3.1 Introduction:
Large-scale combination (VLSI) is the procedure of combining so as to make
coordinated circuits a huge number of transistor-based circuits into a solitary chip.
VLSI started in the 1970s when complex semiconductor and correspondence
advancements were being produced. The chip is a VLSI gadget. The term is no more
as normal as it once seemed to be, as chips have expanded in multifaceted nature into
the countless transistors.
3.3.2 Overview:
The principal semiconductor chips held one transistor each. Ensuing advances
included more transistors, and, as a result, more individual capacities or frameworks
were incorporated after some time. The initially incorporated circuits held just a
couple of gadgets, maybe upwards of ten diodes, transistors, resistors and capacitors,
making it conceivable to manufacture one or more rationale doors on a solitary
gadget. Presently referred to reflectively as "little scale joining" (SSI), upgrades in
procedure prompted gadgets with several rationale entryways, known as huge scale
incorporation (LSI), i.e. frameworks with no less than a thousand rationale doors.
Current technology has moved far past this imprint and today's chip have numerous a
large number of entryways and countless individual transistors.
At one time, there was a push to name and adjust different levels of huge scale
joining above VLSI. Terms like Ultra-substantial scale Integration (ULSI) were
utilized. In any case, the gigantic number of entryways and transistors accessible on
regular gadgets has rendered such fine refinements debatable.
23
over procedure corners). Another outstanding case is NVIDIA's 280 arrangement
GPU.
This microchip is one of a kind in the way that its 1.4 Billion transistor check,
equipped for a teraflop of execution, is totally devoted to rationale (Itanium's
transistor tally is to a great extent because of the 24MB L3 store). Current plans,
rather than the most punctual gadgets, use broad outline mechanization and
computerized rationale combination to lay out the transistors, empowering more
elevated amounts of unpredictability in the subsequent rationale usefulness. Certain
elite rationale pieces like the SRAM cell, on the other hand, are still composed by
hand to guarantee the most noteworthy proficiency (some of the time by bowing or
breaking set up outline standards to acquire the last piece of execution by exchanging
security).
VLSI stands for "Very Large Scale Integration". This is the field which
involves packing more and more logic devices into smaller and smaller areas.
VLSI
24
SSI - Small-Scale Integration (0-102)
MSI - Medium-Scale Integration (102-103)
LSI - Large-Scale Integration (103-105)
VLSI - Very Large-Scale Integration (105-107)
ULSI - Ultra Large-Scale Integration (>=107)
Size: Integrated circuits are much smaller-both transistors and wires are
shrunk to micrometer sizes, compared to the millimeter or centimeter scales of
discrete components. Small size leads to advantages in speed and power consumption,
since smaller components have smaller parasitic resistances, capacitances, and
inductances.
Speed: Signals can be switched between logic 0 and logic 1 much quicker
within a chip than they can between chips. Communication within a chip can occur
hundreds of times faster than communication between chips on a printed circuit
board. The high speed of circuits on-chip is due to their small size-smaller
components and wires have smaller parasitic capacitances to slow down the signal.
Power consumption : Logic operations within a chip also take much less
power. Once again, lower power consumption is largely due to the small size of
circuits on the chip-smaller parasitic capacitances and resistances require less power
to drive them.
25
3.3.6 VLSI And Systems:
26
Digital electronics compress and decompress video, even at high-definition
data rates, on-the-fly in consumer electronics.
Low-cost terminals for Web browsing still require sophisticated electronics,
despite their dedicated function.
Personal computers and workstations provide word-processing, financial
analysis, and games. Computers include both central processing units (CPUs) and
special-purpose hardware for disk access, faster screen display, etc.
Medical electronic systems measure bodily functions and perform complex
processing algorithms to warn about unusual conditions. The availability of these
complex systems, far from overwhelming consumers, only creates demand for even
more complex systems.
3.3.8 ASIC:
As feature sizes have shrunk and design tools improved over the years, the
maximum complexity (and hence functionality) possible in an ASIC has grown from
5,000 gates to over 100 million. Modern ASICs often include entire 32-bit processors,
memory blocks including ROM, RAM, EEPROM, Flash and other large building
blocks. Such an ASIC is often termed a SoC (system-on-a-chip). Designers of digital
ASICs use a hardware description language (HDL), such as Verilog or VHDL, to
describe the functionality of ASICs.
27
Field-programmable gate arrays (FPGA) are the modern-day technology for
building a breadboard or prototype from standard parts; programmable logic blocks
and programmable interconnects allow the same FPGA to be used in many different
applications. For smaller designs and/or lower production volumes, FPGAs may be
more cost effective than an ASIC design even in production.
Structured ASIC’s are used mainly for mid-volume level design. The design
task for structured ASIC’s is to map the circuit into a fixed arrangement of known
cells.
28
CHAPTER-4
RESULT ANALYSIS
4.2 Overview:
29
in sequential order within the block. But the blocks themselves are executed
concurrently, qualifying Verilog as.
There are several statements in Verilog that have no analog in real hardware,
e.g. $display. Consequently, much of the language can not be used to describe
hardware. The examples presented here are the classic subset of the language that has
a direct mapping to real gates.
wire out;
reg out;
always@(a or b orsel)
begin
case(sel)
1'b0: out = b;
1'b1: out = a;
endcase
30
end
// procedural structure.
reg out;
always@(a or b orsel)
if(sel)
out= a;
else
out= b;
The next interesting structure is a transparent latch; it will pass the input to the
output when the gate signal is set for "pass-through", and captures the input and stores
it upon transition of the gate signal to "hold". The output will remain stable regardless
of the input signal while the gate is set to "hold". In the example below the "pass-
through" level of the gate would be when the value of the if clause is true, i.e. gate =
1. This is read "if gate is true, the din is fed to latch_out continuously." Once the if
clause is false, the last value at latch_out will remain and is independent of the value
of din.
reg out;
always@(gate or din)
if(gate)
31
The flip-flop is the next significant template; in Verilog, the D-flop is the
simplest, and it can be modeled as:
reg q;
always@(posedgeclk)
q <= d;
The significant thing to notice in the example is the use of the non-blocking
assignment. A basic rule of thumb is to use <= when there is a
posedge or negedge statement within the always clause.
reg q;
always@(posedgeclkorposedge reset)
if(reset)
q <=0;
else
q <= d;
The next variant is including both an asynchronous reset and asynchronous set
condition; again the convention comes into play, i.e. the reset term is followed by the
set term.
reg q;
if(reset)
q <=0;
else
if(set)
32
q <=1;
else
q <= d;
Note: If this model is used to model a Set/Reset flip flop then simulation errors
can result. Consider the following test sequence of events. 1) reset goes high 2) clk
goes high 3) set goes high 4) clk goes high again 5) reset goes low followed by 6) set
going low. Assume no setup and hold violations.
In this case the dependably @ explanation would first execute when the rising
edge of reset happens which would put q to an estimation of 0. Whenever the
dependably square executes would be the rising edge of clk which again would keep q
at an estimation of 0. The dependably piece then executes when set goes high which
on the grounds that reset is high strengths q to stay at 0. This condition could
conceivably be right contingent upon the real flip lemon. Be that as it may, this is not
the primary issue with this model. Notice that when reset goes low, that set is still
high. In a genuine flip slump this will make the yield go to a 1. On the other hand, in
this model it won't happen on the grounds that the dependably piece is activated by
rising edges of set and reset - not levels. An alternate methodology may be important
for set/reset flip failures.
Note that there are no "starting" pieces specified in this depiction. There is a
split in the middle of FPGA and ASIC combination instruments on this structure.
FPGA instruments permit starting squares where reg qualities are built up as opposed
to utilizing a "reset" signal. ASIC blend devices don't backing such an announcement.
The reason is that a FPGA's beginning state is something that is downloaded into the
memory tables of the FPGA. An ASIC is a genuine equipment usage.
There are two separate ways of declaring a Verilog process. These are
the always and the initial keywords. The always keyword indicates a free-running
process. The initial keyword indicates a process executes exactly once. Both
constructs begin execution at simulator time 0, and both execute until the end of the
block. Once an always block has reached its end, it is rescheduled (again). It is a
33
common misconception to believe that an initial block will execute before an always
block. In fact, it is better to think of the initial-block as a special-case of the always-
block, one which terminates after it completes for the first time.
//Examples:
initial
begin
end
begin
if(a)
c = b;
else
d =~b;
end// Done with this block, now return to the top (i.e. the @ event-
control)
a <= b;
34
These are the classic uses for these two keywords, but there are two significant
additional uses. The most common of these is an alwayskeyword without
the @(...) sensitivity list. It is possible to use always as shown below:
always
The order of execution isn't always guaranteed within Verilog. This can best
be illustrated by a classic example. Consider the code snippet below:
initial
a =0;
initial
b = a;
initial
begin
#1;
$display("Value a=%b Value of b=%b",a,b);
end
What will be printed out for the values of a and b? Depending on the order of
execution of the initial blocks, it could be zero and zero, or alternately zero and some
35
other arbitrary uninitialized value. The $display statement will always execute after
both assignment blocks have completed, due to the #1 delay.
4.6 Explanation Of Key Function:
Bitwise | Bitwise OR
^ Bitwise XOR
~^ or ^~ Bitwise XNOR
! NOT
|| OR
| Reduction OR
Reduction
~| Reduction NOR
^ Reduction XOR
~^ or ^~ Reduction XNOR
Arithmetic + Addition
- Subtraction
- 2's complement
* Multiplication
/ Division
36
** Exponentiation (*Verilog-2001)
37
System tasks are available to handle simple I/O, and various design
measurement functions. All system tasks are prefixed with $ to distinguish them from
user tasks and functions. This section presents a short list of the most often used tasks.
It is by no means a comprehensive list.
$monitor - Print out all the listed variables when any change value.
$dumpfile - Declare the VCD (Value Change Dump) format output file
name.
38
4.8 Method Of Implementation:
39
4.9 Synthesis Report:
=============================================================
* Final Report *
=============================================================
Final Results
RTL Top Level Output File Name : nov512bi.ngr
Top Level Output File Name : nov512bi
Output Format : NGC
Optimization Goal : Speed
Keep Hierarchy : No
Design Statistics
# IOs : 1538
Cell Usage :
# BELS : 1024
# LUT3 : 1024
# IO Buffers : 1538
# IBUF : 1025
# OBUF : 513
=============================================================
40
4.10 Result Analysis:
module testfinal;
// Inputs
reg [511:0] a;
reg [511:0] b;
reg cin;
// Outputs
nov512bi uut (
.a(a),
.b(b),
.cin(cin),
.sum1(sum1)
);
initial begin
// Initialize Inputs
a = 0;
b = 0;
41
cin = 0;
#100;
a=
512'b1111111111111111111111111111111111111111111111111111111111100000
000000000001001010101010101010101000000000000000000000011111111111111
111111111110000000000000000000011111111111111111110000000000000000000
00000010;
b=
512'b1011111000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000011111111111111111111111
111111111111111111111111111111111111111111100000000000000000000000000
0000000000000101;
cin = 1;
#100;
a=23456;
b=23456;
#100;
a=13230033;
b=13230037;
cin=0;
end
end module
42
CHAPTER-5
Our proposed QCA adder architecture will be used as a real time Digital
Counter Or Clock Circuits.
5.2 Applications:
43
CHAPTER-6
CONCLUSION
44
REFERENCES
[3] J. Huang and F. Lombardi," Design and Test of Digital Circuits by Quantum-Dot
Cellular Automata." Norwood, MA, USA: Artech House,2007.
[4] W. Liu, L. Lu, M. O’Neill, and E. E. Swartzlander, Jr., “Design rules for
quantum-dot cellular automata,” in Proc. IEEE Int. Symp. Circuits Syst., May
2011, pp. 2361–2364.
[5] K. Kim, K. Wu, and R. Karri, “Toward designing robust QCA architectures in the
presence of sneak noise paths,” in Proc. IEEE Design, Autom. Test Eur. Conf.
Exhibit., Mar. 2005, pp. 1214–1219.
[6] K. Kong, Y. Shang, and R. Lu, “An optimized majority logic synthesis
methodology for quantum-dot cellular automata,” IEEE Trans. Nanotechnol., vol.
9, no. 2, pp. 170–183, Mar. 2010.
[8] J. D. Wood and D. Tougaw, “Matrix multiplication using quantum dot cellular
automata to implement conventional microelectronics,” IEEE Trans.
Nanotechnol., vol. 10, no. 5, pp. 1036–1042, Sep. 2011.
45