Computers & Internet Logo

Related Topics:

Posted on Mar 24, 2009
Answered by a Fixya Expert

Trustworthy Expert Solutions

At Fixya.com, our trusted experts are meticulously vetted and possess extensive experience in their respective fields. Backed by a community of knowledgeable professionals, our platform ensures that the solutions provided are thoroughly researched and validated.

View Our Top Experts

Implemation of booth algorithm

I do the implemation of booth algorithm of 4 bit multipliacation in c lang but i want code for the boot algorithm of 8 bit multiplication

1 Answer

Software

Level 2:

An expert who has achieved level 2 by getting 100 points

MVP:

An expert that got 5 achievements.

Governor:

An expert whose answer got voted for 20 times.

Hot-Shot:

An expert who has answered 20 questions.

  • Expert 55 Answers
  • Posted on Mar 24, 2009
Software
Expert
Level 2:

An expert who has achieved level 2 by getting 100 points

MVP:

An expert that got 5 achievements.

Governor:

An expert whose answer got voted for 20 times.

Hot-Shot:

An expert who has answered 20 questions.

Joined: Mar 22, 2009
Answers
55
Questions
1
Helped
9967
Points
133

Check this out buddy...

http://cpsourcecodes.com/?tag=booths-algorithm

u may need to modify it a little, but you are a programmer so it shouldn't be any trouble... :)

Add Your Answer

×

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

0helpful
1answer

What is the software to create dvd multi boot for windows 7 & windows 8 together

Browse through microsoft I believe you could get a solution. Thanks.
tip

How to recover PDF password?

Once you forgot PDF password, the data in the encrypted PDF file are on the risk of unavailability. Unless fortunately the password knocks your memory again, you got the data lost or you have to give up the document eventually. With the ever-growing of strong encryption algorithms, decryption algorithms gradually come into existing, too. Though the cracking is far more difficulty than ever before, it is still of help to those expecting to recover PDF password and access the password protected PDF file. Take PDF Password Unlocker, a popular PDF password recovery software, for example, it has adopted the advanced decryption algorithms to crack 40-bit RC4, 128-bit RC4, 128-bit AES, and 256-bit AES encrypted passwords with 3 attack methods, Dictionary attack, Brute-force attack, and Brute-force with Mask attack
on Apr 29, 2010 • Computers & Internet
tip

Once you forgot PDF password, the data in the encrypted PDF file are on the...

For security, we often protect our PDF file by password , such as some academic papers or network magazines. If we want to edit secured PDF, we would better unlock them first. But something bad often happen, For example, when we want to print a secured PDF file, but the password is lost; or if we want to extract some excellent pages from a PDF file, we would fail to copy them. So how to unlock and edit secured PDF?
Fortunately, as far as I know, there are methods, such as Brute Force Attack and Dictionary Attack can resolve the problem. However another question comes, with so much software can retrieve PDF password, which one should be chosen? Well, according to my own experience, I recommend you
PDF Password Recovery 5.0 an easy-to-use tool designed for removing passwords added to Adobe Acrobat PDF documents.


Features:
1. All versions through Adobe Acrobat 9.0 are supported
2. Do NOT need Adobe Acrobat software.
3. Easy to use: step-to-step guide and screenshots
4. Recovers user password required to open the file
5. Decrypts PDF files protected with owner passwords
6. Instantly removes restrictions on copying, printing and other actions with the file
7. Program automatically saves password search state and can resume after a stop or a crash
8. Patterns can be used to minimize search time if any part of the password is known
9. Passwords of any length and complexity can be recovered
10.Free updates during one year.
you can download the product form Password Recovery Official site
http://www.recoverlostpassword.com/
on Apr 28, 2010 • Computers & Internet
0helpful
1answer
0helpful
1answer

Error sign shows On Error shows: SG;0015,0404,044after press restart shows: SG;0015.0036.048

If you are using a windows driver do not use Topix in the graphics.
Use 8 bits or 4 bits. The firmaware may not be able to understand the Topix algorithm. What you have is a syntax error displayed.
0helpful
1answer

Need to get sound card working on intel S3210SHLX motherboard... Any cards that work ???

Try using this link:

http://www.intel.com/p/en_US/support/detect/

This utility will find the driver for you.

Or find the driver manualy from here:

http://downloadcenter.intel.com/SearchResult.aspx?lang=eng&keyword=%22S3210SHLX%22

The slot type is following:

One PCI Express* x8 with x 16 connector

One PCI Express* x 8 with x8 connector

Two PCI-X 64-bit/133 MHz

One PCI 32-bit/33 MHz One PCI Express* x8 with x16 connector

One PCI Express* x8 with x8 connector

One PCI Express* x 4 with x8 connector

Two PCI 32-bit/33 MHz One PCI Express* x 8 with x16 connector

One PCI Express* x 4 with x8 connector

Two PCI 32-bit/33 MHz


A creative sound card, PCI type will work


Hope this was helpfull.
3helpful
1answer

Question 1: Find out the reasons those have made the UNIX an amazingly successful operating system. What are the Features on existing UNIX based operating systems like Linux Red Hat, Fedora and Ubantu...

Question 4: Consider the following set of processes that arrive in the ready queue at the same time:

Process CPU time

P1 2

P2 1

P3 4

P4 3

P5 1

P6 2



Consider the following scheduling algorithms: FCFS, SJF and Round Robin (quantum = 1)

(i) What is turnaround time of each process for each of the above

scheduling algorithms?

(ii) What is the waiting time of each process for each of the above

algorithms?

0helpful
2answers

The Seagate encryption algorithm works for files 4GB or smaller. It will however encrypt larger files but it will not decrypt them! How do I decrypt files larger than 4GB ? Seagate admits there is a...

That posses a problem. They know there is a problem with the algorithm but don't plan to fix it. Wonderful. The problem is this, you would have to know what the algorithm was to be able to do anything about it and I doubt very seriously they are going to release that. That leaves you with the option of hiring a hacker to break the code or paying a specialty company to break the code and they are not cheap or well advertised. I can't think of any companies that do that work anymore. You are going to have to identify a Security company or the company that originally developed the Algorithm and see if you can work out a deal to get the corrected algorithm. The problem you have is your algorithm was designed for files smaller than 4gb and there is a permutation error that occurs on files that are larger. In a lot of cases this is a random fault that makes it very difficult to identify if not impossible depending on what level of encryption the algorithm actually represents. 32 or 64 bit encryption isn't so bad but 128 or higher is a real pain and expensive. There are some software packages available out there if you search the web for them, "Decryption Software", but again it is expensive and hard to find.
0helpful
1answer

I'm trying to pair my blackberry bold 9700 with a photo processing booth in boots pharmacy. my blackberry is able to find the booth as a device and i'm asked to input a passkey, which for this booth is...

You might check that you are using the most current system software for your BlackBerry Bold 9700 Smartphone. Many quirky behaviors for these devices are fixed every time a new software version is released. The latest software as of March 20, 2010 is BlackBerry Handheld Software v5.0.0.64

Instructions for reinstalling BlackBerry Bold 9700 Firmware and System Software are here.
0helpful
1answer

I am attempting to secure my network through this router which at this time is open for the whole neighborhood to see

Here are the diffenent types of Security Settings possible with a wireless router: (how to set this depends on the brand of router)

Security Mode: You may choose from Disable, WEP, WPA-Personal, WPA2-Personal, WPA-Enterprise, WPA2-Enterprise, or RADIUS. All devices on your network must use the same security mode in order to communicate.
Capture(wlansec.wpapersharekey) WPA Personal:
Capture(helpwpa.phase8) WPA Algorithm: You may choose from TKIP or AES.
Capture(helpwpa.phase9) WPA Pre-Shared Key: Choose a unique key to authenticate with other devices on your network. The Pre-Shared Key must be between 8 and 63 characters in length.
Capture(helpwpa.phase10) Group Key Renewal: This settings determines how often your group key changes.


Capture(wlansec.wpa2persharekey) WPA2 Personal:
Capture(helpwpa.phase11) WPA2 Algorithm: You may choose from AES or TKIP+AES. Choose TKIP+AES if you have both WPA and WPA2 devices on your network.
Capture(helpwpa.phase12) WPA2 Pre-Shared Key: Choose a unique key to authenticate with other devices on your network. The Pre-Shared Key must be between 8 and 63 characters in length.
Capture(helpwpa.phase13) Group Key Renewal: This settings determines how often your group key changes.


Capture(wlansec.wparadius) WPA Enterprise:
Capture(helpwpa.phase14) WPA Algorithm: You may choose from TKIP or AES.
Capture(helpwpa.phase15) RADIUS Server Address: The IP address of your RADIUS server.
Capture(helpwpa.phase16) RADIUS Server Port: The port your RADIUS server uses.
Capture(helpwpa.phase17) Shared Secret: The shared secret set on your RADIUS server.
Capture(helpwpa.phase18) Key Renewal Timeout: Determines how often your keys should be renewed.


Capture(wlansec.wpa2radius) WPA2 Enterprise:
Capture(helpwpa.phase19) WPA2 Algorithm: You may choose from AES or TKIP+AES. Choose TKIP+AES if you have both WPA and WPA2 devices on your network.
Capture(helpwpa.phase20) RADIUS Server Address: The IP address of your RADIUS server.
Capture(helpwpa.phase21) RADIUS Server Port: The port your RADIUS server uses.
Capture(helpwpa.phase22) Shared Secret: The shared secret set on your RADIUS server.
Capture(helpwpa.phase23) Key Renewal Timeout: Determines how often your keys should be renewed.


Capture(wlansec.wep) WEP:
Capture(helpwpa.phase24) Default Transmit Key: The key you would like to use for transmitting WEP keys.
Capture(helpwpa.phase25) WEP Key Bit: You may select from 64-Bit or 128-Bit encryption.
Capture(helpwpa.phase26) Passphrase: You may enter a passphrase consisting of any keyboard character to be used to generate a hex WEP key. Passphrase option is only supported when you are only using Linksys devices on your network.
Capture(helpwpa.phase27) Key 1-4: You may enter a WEP key manually. You must use only hex characters (0-9 and A-F). 64-Bit WEP requires 10 hex characters. 128-Bit WEP requires the use of 26 hex characters.


Capture(wlansec.radius) RADIUS:
Capture(helpwpa.phase28) RADIUS Server Address: The IP address of your RADIUS server.
Capture(helpwpa.phase29) RADIUS Server Port: The port your RADIUS server uses.
Capture(helpwpa.phase30) Shared Secret: The shared secret set on your RADIUS server.
Capture(helpwpa.phase31) Default Transmit Key: The key you would like to use for transmitting WEP keys.
Capture(helpwpa.phase32) WEP Key Bit: You may select from 64-Bit or 128-Bit encryption.
Capture(helpwpa.phase33) Passphrase: You may enter a passphrase consisting of any keyboard character to be used to generate a hex WEP key. Passphrase option is only supported when you are only using Linksys devices on your network.
Capture(helpwpa.phase34) Key 1-4: You may enter a WEP key manually. You must use only hex characters (0-9 and A-F). 64-Bit WEP requires 10 hex characters. 128-Bit WEP requires the use of 26 hex characters.
Not finding what you are looking for?

353 views

Ask a Question

Usually answered in minutes!

Top Computers & Internet Experts

Grand Canyon Tech
Grand Canyon Tech

Level 3 Expert

3867 Answers

Brad Brown

Level 3 Expert

19187 Answers

Cindy Wells

Level 3 Expert

6688 Answers

Are you a Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...