Simulation of the Fixed-Point Number Arithmetic

Article Preview

Abstract:

The fixed-point number arithmetic is always the key and difficult point of the computer organization. It is the basic knowledge of the computer organization. Because there are many operation methods of the fixed-point number and the operation process of it is complicated, the fixed-point number arithmetic is not easy for students to learn. The lack of the software to help the students do simulation computation is the biggest problem in the current teaching of the knowledge. To solve the problem, the simulation software of the fixed-point number arithmetic is developed with C++builder. The software is made up of "the fixed-point integer two's complement addition" module, "the fixed-point decimals two's complement addition" module, "the fixed-point integer two's complement subtraction" module, "the fixed-point decimals two's complement subtraction" module, "the sign-magnitude 1-bit multiplication"module, "the Booth's Algorithm"module, "the sign-magnitude two bits multiplication"module, "the two's complement two bits multiplication"module, "the sign-magnitude recovery remainder division"module, "the sign-magnitude unrecovery remainder division"module, "the two's complement unrecovery remainder division"module, etc. In order to test the simulation software, the test case is designed for the fixed-point arithmetic. According to the designed test case,the detailed test is carried out. The test results show that its simulation effect is good. The simulation software realizes the addition, subtraction, multiplication, and division of the fixed-point number successfully. The CAI (computer-assisted instruction) can be carried out through the software. The software can help the students be familiar with and master the fixed-point number arithmetic rapidly.

You might also be interested in these eBooks

Info:

Periodical:

Key Engineering Materials (Volumes 467-469)

Pages:

2097-2102

Citation:

Online since:

February 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Catrina Octavian , Saxena AmitabhSource, Secure computation with fixed-point numbers, Lecture Notes in Computer Science, Financial Cryptography and Data Security - 14th International Conference, v 6052 LNCS, 2010, pp.35-50.

DOI: 10.1007/978-3-642-14577-3_6

Google Scholar

[2] Congxin Wu, Guixiang Wang , Convergence of sequences of fuzzy numbers and fixed point theorems for increasing fuzzy mappings and application, Fuzzy Sets and Systems, v 130, n 3, Sep 16 2002, pp.383-390.

DOI: 10.1016/s0165-0114(01)00231-7

Google Scholar

[3] Sharma Sushil, Deshpande Bhavana, Common fixed point theorems for finite number of mappings without continuity and compatibility on intuitionistic fuzzy metric spaces, Chaos, Solitons and Fractals, v 40, n 5, June 15, 2009, pp.2242-2256.

DOI: 10.1016/j.chaos.2007.10.011

Google Scholar

[4] F. Wang, Y.G. Zhang, The Comprehensive Defence against Railway System-wide Disaster by Computer Interlocking System", Proc. 2th Int, l Conf. Intelligent Information Management Systems and Technology (IIMST 2007), World Academic Press, 2007, pp.95-98.

Google Scholar

[5] Feng Wang, Yangu Zhang, Chengfeng Ye, HBACA-based Railway Yard Route Searching, The 3rd International Symposium on Intelligent Information Technology Application, 2009. 11, pp.496-499.

DOI: 10.1109/iita.2009.412

Google Scholar

[6] Feng Wang, Yangu Zhang, Fangfang Chen, Research on WangZhai Station Route Optimization, 2009 International Symposium on Image Analysis and Signal Processing, 2009. 04, pp.183-187.

Google Scholar

[7] Zhongfeng Li , Qiuhua Lin, FPGA implementation of infomax BSS algorithm with fixed-point number representation", Proceedings of 2005 International Conference on Neural Networks and Brain Proceedings, ICNNB, 05, v 2, 2005, pp.889-892.

DOI: 10.1109/icnnb.2005.1614764

Google Scholar

[8] Chia-Yu Yao, A study of SPT-term distribution of CSD numbers and its application for designing fixed-point linear phase FIR filters, IEEE International Symposium on Circuits and Systems, v 2, 2001, pp. II301-II304.

DOI: 10.1109/iscas.2001.921067

Google Scholar

[9] Feng Wang, Bo-lin Wang, Yangu Zhang, Asymmetry DFT Algorithm and Its Application, Journal of Chongqing University, Vol. 31, No. 2, Feb. 2008, pp.162-165.

Google Scholar

[10] Xiaoli Zheng, Feng Wang, Construction of Project-Based Virtual Learning Community, Lecture Notes in Computer Science, v 5145 LNCS, 2008, pp.304-313.

Google Scholar