1
Computer Arithmetic – Behrooz Parhami – Oxford
Press, pages 211-224 (Basic Division Schemes); pages 261- 272 (Division by Convergence) and pages 345-356 (Square-Rooting Methods)
Computer Arithmetic – Digital Computer Arithmetic
– Joseph F. F. Cavanagh – McGraw-Hill
Computer Arithmetic Simulator by Israel Koren.
2
Topics
Numeric Encodings
Unsigned & Two’s complement
• Programming Implications
C promotion rules
• Basic operations
Addition, negation, multiplication
• Programming Implications
Consequences of overflow
Using shifts to perform power-of-2 multiply/divide
3
Number system
X min
X max
(
)
Decimal
X = (x
k-1 x
k-2
… x
1 x
0
.x
-1
… x
-l
)
10
0 10 k - 10 -l
Binary
X = (x
k-1 x
k-2
… x
1 x
0
.x
-1
… x
-l
)
2
0 2 k - 2 -l
Conventional fixed-radix
X = (x
k-1 x
k-2
… x
1 x
0
.x
-1
… x
-l
) r
Notation: ulp = r -l
0 r k - r -l
U nit in the l east significant p osition
U nit in the l ast p osition
4
Signed-magnitude
Radix-complement
r = 2
Two’s complement
Most Used
Representation
Biased
[-8, +7] -> [0,15]
F.P. Exponent
Diminished-radix complement
(Digit complement)
r = 2
One’s complement
5
Signedmagnitude
Biased
3
2
5
4
1
7
6
0111
0110
0101
0100
0011
0010
0001
0
-0
0000
1000
-1 1001
-2 1010
-3 1011
0111
0110
0101
-4
-5
-6
-7
1100
1101
1110
1111
0100
0011
0010
0001
-8 0000
1111
1110
1101
1100
1011
1010
1001
1000
Two’s complement
1111
1110
1101
1100
1011
1010
1001
1000
0111
0110
0101
0100
0011
0010
0001
0000
One’s complement
0000
1111
1110
1101
1100
1011
1010
1001
1000
0111
0110
0101
0100
0011
0010
0001
6
Encoding Integers
Unsigned
B 2 U ( X ) w 1
i 0 x i
2 i
Two’s Complement
B 2 T ( X ) x w 1
2 w 1 w 2
i 0 x i
2 i short int x = 15213; short int y = -15213;
C short 2 bytes long x y
Decimal Hex Binary
15213 3B 6D 00111011 01101101
-15213 C4 93 11000100 10010011
Sign
Bit
Sign Bit
For 2’s complement, most significant bit indicates sign
• 0 for nonnegative (or positive)
• 1 for negative
7
Encoding Example (Cont.)
Weight
1
1024
2048
4096
8192
16384
-32768
32
64
128
256
512
8
16
2
4
Sum x = 15213: 00111011 01101101 y = -15213: 11000100 10010011
0
2048
4096
8192
0
0
1
32
64
0
256
512
8
0
0
4
15213
15213
1
0
1
1
1
1
0
0
1
1
0
0
1
1
1
0
-15213
1 1
1 2
0 0
0 0
1 16
0 0
0 0
1 128
0 0
0 0
1 1024
0 0
0 0
0 0
1 16384
1 -32768
-15213
8
Numeric Ranges
Unsigned Values
UMin = 0
000…0
UMax = 2 w – 1
111…1
Two’s Complement Values
TMin = –2 w –1
100…0
TMax = 2 w –1 – 1
011…1
Other Values
Minus 1(-1)
111…1
Values for W = 16
UMax
TMax
TMin
-1
0
Decimal Hex Binary
65535 FF FF 11111111 11111111
32767 7F FF 01111111 11111111
-32768 80 00 10000000 00000000
-1 FF FF 11111111 11111111
0 00 00 00000000 00000000
9
Values for Different Word Sizes
8
UMax 255
16
65,535
TMax 127 32,767
TMin -128 -32,768
W
32
4,294,967,295
2,147,483,647
-2,147,483,648
Observations
|TMin | = TMax + 1
• Asymmetric range
UMax = 2 * TMax + 1
64
18,446,744,073,709,551,615
9,223,372,036,854,775,807
-9,223,372,036,854,775,808
C Programming
#include <limits.h>
• K&R App. B11
Declares constants, e.g.,
• ULONG_MAX
• LONG_MAX
• LONG_MIN
Values platform-specific
10
Unsigned & Signed Numeric Values
0111
1000
1001
1010
1011
1100
1101
1110
1111
X
0000
0001
0010
0011
0100
0101
0110
B2U( X )
0
1
2
5
6
3
4
10
11
12
13
7
8
9
14
15
B2T( X )
0
1
2
5
6
3
4
–5
–4
–3
–2
–1
7
–8
–7
–6
Equivalence
Same encodings for nonnegative values
Uniqueness
Every bit pattern represents unique integer value
Each representable integer has unique bit encoding
11
Casting Signed to Unsigned
C Allows Conversions from Signed to Unsigned short int x = 15213; unsigned short int ux = (unsigned short) x; short int y = -15213; unsigned short int uy = (unsigned short) y;
Resulting Value
No change in bit representation
Nonnegative values unchanged
• ux = 15213
Negative values change into (large) positive values ! !
• uy = 50323
12
Signed vs. Unsigned in C
Constants
By default are considered to be signed integers
Unsigned if have “U” as suffix
0U, 4294967259U
Casting
Explicit casting between signed & unsigned same as U2T and T2U int tx, ty; unsigned ux, uy; tx = (int) ux; uy = (unsigned) ty;
Implicit casting also occurs via assignments and procedure calls tx = ux; uy = ty;
13
Sign Extension
Task:
Given w -bit signed integer x
Convert it to w + k -bit integer with same value
Rule:
Make k copies of sign bit:
X
= x w –1
,…, x w –1
, x w –1
, x w –2
,…, x
0 k copies of MSB
X w
• • •
X
• • •
• • • k
• • • w
14
Sign Extension Example short int x = 15213; int ix = (int) x; short int y = -15213; int iy = (int) y; x ix y iy
Decimal
15213
Hex
3B 6D
Binary
00111011 01101101
15213 00 00 3B 6D 00000000 00000000 00111011 01101101
-15213 C4 93 11000100 10010011
-15213 FF FF C4 93 11111111 11111111 11000100 10010011
Converting from smaller to larger integer data type
C automatically performs sign extension
15
Negating with Complement & Increment
Claim: Following Holds for 2’s Complement
~x + 1 == -x
Complement
Observation: ~x + x == 1111…11
2 x
== -1
1 0 0 1 1 1 0 1
+ ~x 0 1 1 0 0 0 1 0
Increment
~x + x + (-x + 1)
-1 1 1 1 1 1 1 1 1
== -1 + (-x + 1)
(Adding (-x +1) on both sides of equation )
~x + 1 == -x
16
Comp. & Incr. Examples
0 x = 15213
Decimal Hex Binary x
~x
15213 3B 6D 00111011 01101101
-15214 C4 92 11000100 10010010
~x+1 -15213 C4 93 11000100 1001001 1 y -15213 C4 93 11000100 10010011
0
~0
~0+1
Decimal Hex Binary
0 00 00 00000000 00000000
-1 FF FF 11111111 11111111
0 00 00 00000000 00000000
17
Unsigned Addition
Operands:
True Sum: w w bits
+1 bits
+ u + v u v
Discard Carry: w bits UAdd w
( u , v )
Standard Addition Function
Ignores carry output
• • •
• • •
• • •
• • •
18
Class Exercise - 1
Suppose that you have a number (positive or negative) represented in two ´s complement, using 4 bits of word length.
Specify the steps which are necessary to perform fast division by 2 and obtain the correct result for positive and negative numbers.
Remember that arithmetic shift operations are shifts where the sign bit is propagated from right to left.
Think about 4bit numbers in two’s complement, that is they are in the range [-8 to +7].
19
Carry and Overflow Detection in Software for Two ´s
Complement Arithmetic
Detection in Hardware is slightly Different because the result (Sum) bit is not used –
Cy i-1 and Cy instead.
i-2 bits are used
CARRY (Addition or
Subtraction)
Sign Sign Carry In Carry Out
0
0
1
A i-1
0
0
1
1
1
B i-1
0
0
1
1
0
0
1
1
Cyin i-1
0
1
0
1
0
1
0
1
0
1
0
Cyout i
0
0
1
1
1
OVERFLOW
Sign Sign Carry-in Overflow
1
1
1
0
0
1
A i-1
0
0
B i-1
0
0
1
1
0
0
1
1
Cyin i-1
0
1
0
1
0
1
0
1
1
0
0
Ovf i
0
0
0
1
0
Ovf i
= A i-1
.B
i-1
.Cyin
i-1
+ A i-1
B i-1
. Cyin i-1
(hardware method of detection) or the software method of detection:
Numbers have equal signs and resulting sign is different from number’s signs
Cyout i
= A i-1
.B i-1
+ (A i-1
Θ B i-1
). Cyin i-1
It is possible to have a CARRY out and not have an OVERFLOW !!!!!!!!!!!!
20
Basic Operations in Two ´s Complement:
Addition and Subtraction Have the Same Treatment
A = -7 ; B= +8
A – B = A + (-B) = ? (4 bits)
NOTES:
1 – Multi operand arithmetic (eg. a 16-bit subtraction on a 8-bit microcontroller) demands the use of arithmetic operations which use the CARRY FLAG.
1001 (-7)
+ 1000 (-8)
(CY=1) 0001 (-15) (Borrow=0)
OVERFLOW
2 – The Hardware has only one flag, which is usually termed CARRY and instructions are usually termed
ADDc, SUBc (or SUBnc).
A = +7 ; B = + 8
A - B = A + (-B) = ?
0111 (+7)
+ 1000 (-8)
(CY= 0) 1111 (-1) ( Borrow = 1)
NO OVERFLOW
A= +7 ; B = +6
A - B = A + (-B)?
0111 (+7)
+ 1010 (-6)
(CY= 1) 0001 (+1) ( Borrow = 0)
NO OVERFLOW
3- Looking to the left side of this slide we can see that actually in subtraction, it has to be SUBTRACT on BORROW (propagate borrow then there is no
CARRY).
4 – OVERFLOW (hardware detection)
Overflow occurs when the sign bits are zero and there is a carry from the previous bits or when the sign bits are one and there is no carry from the previous bits:
Ov = Xn-1.Yn-1.CY
´n-1 + X´n-1.Y´n-1.CYn-1
5
–
OVERFLOW ( Software detection )
If both numbers have the same signs and the result of the addition is of a different sign then an overflow occurred !!!
21
Multiplication in Two ´s Complement
It can be easily performed in software by a sequence of multiply-add operations, but it takes many clock cycles. The number of clock cycles is directly proportional to the number of bits of the operands.
The software algorithm can be improved as it will be seen in the next slide.
If the Microprocessor has a
Parallel Combinational
Multiplier it can be done in one clock cycle (for single operands) or approximately 6 clock cycles for double-word operands (DSPs and other modern microprocessors have such a multiplier)
+
1 0 1 0 0 0 1
X
1 1 0 1 1 0 1
1 0 1 0 0 0 1
0 0 0 0 0 0 0
1 0 1 0 0 0 1
1 0 1 0 0 0 1
0 0 0 0 0 0 0
1 0 1 0 0 0 1
1 0 1 0 0 0 1
1 1 0 0 1 0 0 1 1 1 1 1 0 1
22
Optimized Multiplication in Software
(http://www.convict.lu/Jeunes/Math/Fast_operations.htm)
The algorithm is based on a particularity of binary notation.
Imagine the multiplying of the base 10 numbers x
10
= 7 and y
10
= 5 x
2
= 111 y
2
= 101, which signifies y
10
1*100
2
+ 0*10
2
+ 1*1
2
= 1*2
The distributive rule gives us:
2 + 0*2 1 + 1*2 0 =
111 * 101 = 111 * (1*100 + 0*10 + 1*1) = 111*(1*100)
+ 111*(0*10) + 111*(1*1)
The associative and commutative rules give us:
= (111*100)*1 + (111*10)*0 + (111*1)*1
In binary notation, multiplying by factors of 2 is equivalent to shifting the number:
= 11100*1 + 1110*0 + 111*1
= 11100 + 111 = 100011 = 35
10
Thus a simple algorithm may be written for multiplication :
Operate the muliplication z = x * y z := 0 while y <> 0 do is the least significant bit of y 1 ?
yes: z := z + x; no: continue; shift x one digit to the left; shift y one digit to the right;
Let's now analyze the function MULV8 which may be accessed from within a program by preparing the temporary variables TEMPX and TEMPY , calling the function and finally retrieving the product from the variable
RESULT.
For example, we want our program to compute: z := x * y
In PIC-assembler this will sound:
MOVF x,W
MOVWF TEMPX
MOVF y,W
MOVWF TEMPY
CALL MULV8
MOVF RESULT,W
MOVWF z
O tempo da Multiplicação (ou número de ciclos) vai depender da configuração dos bits do multipliando e do multiplicador. Por exemplo, a multiplicação por 3 é bastante rápida, pois “y” logo valerá zero e ele sai do loop.
23
Optimized Multiplication in Software – 8 bits here is what the computer will do: clrf means 'clear file' (in PIC-language a file is an 8-bit register) movf 'transfer value from file to itself (F) or the accumulator (W)‘ btfsc means 'skip next instruction if the designed bit is
clear') bcf 'bit clear at file' Status,C = CLEAR THE CARRY-
FLAG rrf 'rotate right file and store it to itself or the accumulator‘ rlf 'rotate left file and store...‘ movlw 'fill accumulator with litteral value‘ movwf 'transfer value from accumulator to file‘ btfss 'skip next instruction if designed bit is set'
Status,Z = ZERO-FLAG SET?
MULV8
CLRF
MULU8LOOP
MOVF
BTFSC
ADDWF
BCF
RRF
BCF
RLF
MOVF
BTFSS
GOTO
RETURN
RESULT
TEMPX,W
TEMPY,0
RESULT
STATUS,C
TEMPY,F
STATUS,C
TEMPX,F
TEMPY,F
STATUS,Z
MULU8LOOP
24
Multiplication for 16 bits
ADD16
MOVF TEMPX16,W
ADDWF RESULT16
BTFSC STATUS,C
INCF RESULT16_H
MOVF TEMPX16_H,W
ADDWF RESULT16_H
RETURN
MULV16
CLRF RESULT16
CLRF RESULT16_H
MULU16LOOP
BTFSC TEMPY16,0
CALL ADD16
BCF STATUS,C
RRF TEMPY16_H,F
RRF TEMPY16,F
BCF STATUS,C
RLF TEMPX16,F
RLF TEMPX16_H,F
MOVF TEMPY16,F
BTFSS STATUS,Z
GOTO MULU16LOOP
MOVF TEMPY16_H,F
BTFSS STATUS,Z
GOTO MULU16LOOP
RETURN
25
Fixed-Point Arithmetic
Representation
Using 2’s Complement:
Integer Part: 2 m -1 positive values
2 m negative values
S m bits
2 m-1 . . .. . . . 2 1 2 0 n bits
2 -1 2 -2 2 -3 . . . . . 2 -n
Fractional Part : [ 2 -n , 1), with n bits
Smallest Number: 2 -n =
Largest Number: ~ 1
0000000000001
1111111111111
Let us Suppose a Fractional Part with 10 bits
The smallest fraction is: 2 -10 = 1/ 1024 ~ 0.0009765 ~ 0.001
The largest fraction is: 1/2 1 + 1/2 2 + . . . + 1/2 10 = (2 10 –1)/2 10 = 1023/1024 ~ 0.99902
Where is the position of the decimal point ?
Depends on the Application
26
Class Exercise - 2
Let us suppose an application (a software for construction engineers) that requires objects as small as 1mm, or as large as one medium size building, to be represented on the screen. Consider that the computer has a word length of 16 bits.
Suppose also that the image used by the application can be rotated by very small degrees (in fractions or radians) to give the illusion of continuous movement (The viewer can navigate inside the building like in a video game).
Devise and justify one possible fixed-point representation for this application that would be capable of satisfying the restrictions above.
Now suppose a flight simulator. What distances and object sizes can be represented using the same word partition above ?
27
Class-Exercise 3
Represent the following real numbers (in base 10) in two’s complement fixed-point arithmetic, with a total of eight bits, being four bits in the fractional part and perform the following operations:
A= + 4.75 =
B= + 2.375 =
A + B =
A – B =
WHAT IF ?:
A =+ 5.5 =
B = +7.5 =
A + B =
28
Addition and Subtraction Using Fixed-Point
Arithmetic
Addition : It all happens as if the number being added was an integer number. The integer unit of the ALU is used. Let us consider a number in two’s complement with a total of 8 bits and 4 bits in the fractional part:
A= +4.75 = 0100.1100
B= +2.375= 0010.0110
A+B= +7.125
= 0111.0010 => (propagates from the fractional part into the integer part)
A-B=A+(-B) = >
A= +4.75 = 0100.1100
-B=-2.375= 1101.1010
A+(-B)=+2.375
= 0010.0110
WHAT IF ?:
A =+ 5.5 = 0101.1000
B = +7.5 = 0111.1000
A + B =+13.0= 1101.0000 OVERFLOW !!!!!!!!!!!!!!!!!!!
29
Class-Exercise 4
A= + 2.75 =
B= + 2.375 =
A * B =
30
Fixed-Point Multiplication
Fixed-Point Arithmetic, together with Scaling, is Used to Deal with Integer and
Fractional Values.
Overflow can Occur and has to be Treated by Software
15
Multiplication Example:
A= +2.75 = 0010.1100
A = Integer
B= +2.375= 0010.0110
A * B = ? B = Integer
31
(A * B)
32
= Integer
H
Overflow
Integer
L
Fraction
H
(A * B)
16
=
15 SCALING
Integer
Fraction
Fraction
Fraction
L
Underflow
Fraction
0
0
0
NOTES: If x = (0000 0000 . 0000 0011) Small Number x 2 UNDERFLOW !!
y = (0101 0000 . 0000 0000) Large Number y 2 OVERFLOW !!
31
Loosing Precision Because of Truncation
Consider an Application that uses two’s complement with a word length of 16 bits, 5 bits for the integer part and 10 bits for the fractional part.
Consider that we have to multiply a distance of 5.675 meters by the cosine of 45 0 (0.707).
The correct value should be: 5.675 * 0.707 = 4.012
A= 5.675 = 000101 .1000101011 (16 bits)
B= 0.707 = 000000 .1011000011 (16 bits)
A * B = 0000000000111101 001110 0011000001 (32 bits)
A * B =
A * B = 3.918
000011 .1101001110 (scaled to 16 )
Because of Truncation, The result Differs by 2.3%
32
Does the Order of Computation Matter?
Let us consider: a = 48221; b = 51324 and c = 33600, three values that we want to add and scale so that the result is translated into a domain with a 10-bit fractional part. Should we scale before and add afterwards, or vice-versa?
Scaling Operands Before Performing Computations
Result1 = int[a:1024] + int[b:1024] + int [c:1024] = 129
Scaling after adding the three values:
Result2 = int[(a + b + c) : 1024] = 130
Result2 is more accurate than Result1 !!
CONCLUSION: Sometimes we have to change the order of the operations to obtain better results.
33
Some Comments About Arithmetic Operations on Embedded Systems
Many Arithmetic Operations can be Speeded Up by using tables. E.g. trigonometric functions, division
Software tricks (which would be very hard to implement in hardware) can be used in software to speed up arithmetic operations in embedded systems.
One of the techniques is to analyse the operands and take a decision about how many loops to iterate.
34
Floating-Point x Fixed-Point
Floating-Point - provides large dynamic range and Fixedpoint does not.
What about precision ?
A Floating-Point co-processor is very convenient for the programmer because he(she) does not have to worry about data ranges and alignment of the decimal point, neither overflow or underflow detection. In Fixed-Point, the programmer has to worry about all these problems.
However, a floating-point unit demands a considerable silicon area and power, which is not commensurate with low-power embedded devices.
In fact, most DSP processors have avoided floating-point units because of these restrictions.
When there is no Floating-Point unit, most arithmetic and trigonometric functions have to be done in software.
35
Class Exercise 5
Consider the following problem where numbers are in two’s complement, 8 bits total and 4 bits in fractional part.
A = 7.5
B = 0.25
C = 6.25
We want to do: (A + B + C) / 3.25
1 – Can I perform the addition and then divide the result – does the result of the addition fit into the word length? What can I do?
What if:
A = 0.25
B = 0.5
C = 0.125
We want to do: (A + B + C) / 1.25 * 6.0
2 – What happens if I perform the operations from left to right ? What can I do to avoid loosing significant bits during my operations ?
36
Block Floating Point Provides Some of the Benefits of Floating Point
Representation, but by Scaling Blocks of Numbers Rather than each Individual
Number .
Block Floating Point Numbers are Represented by the Full Word Length of a
Fixed Point Number.
If Any One of a Block of Numbers Becomes Too Large for the Available Word
Length, the Programmer Scales Down all the Numbers in the Block, by Shifting
Them to the Right. Example with word length = 8 bits. In the example, variables
A, B, and C are the result of some computation and bits 8 and 9 do not fit into the original word length (overflow). To continue use them and maintain their relative values, they have to be scaled as a group (as a block), and undo the scaling operation later.
Example: A = 10 | 0001 . 1000
B = 00 | 0110 . 0000
C = 01 | 1001 . 0001
Similarly, if the Largest of a Block of Numbers is Small, the Programmer Scales up all the Numbers in the Block to Use the Full Available word length of the
Mantissa. Example with word length = 8 bits. A, B and C are the result of some previous computation (where there was an underflow
– in yellow).
If we scale up the block of variables we do not loose the least significant bits. We have to undo the scale up later to bring the result to its proper domain.
Example: A = 0000 . 0100 | 1101
B = 0000 . 0010 | 1000
C = 0000 . 0011 | 1100
7654 3210
37
Block Floating Point Operations - II
This Approach is Used to Make the Most of the Mantissa of the
Operands and also to Minimize Loss of Significant Bits During
Arithmetic Operations with Scaling (Truncation).
EXAMPLE: Normalize Operands (Left shift until MSB=1)
Values Before
S
0 0 0 0 1 0 1 0
0 0 0 0 0 1 0 0
0 0 0 0 1 0 0 1
0 0 0 0 0 0 1 1
Values Afterwards
S
0 1 0 1 0 0 0 0
0 0 1 0 0 0 0 0
0 1 0 0 1 0 0 0
0 0 0 1 1 0 0 0
Shared
Exponent
0 0 1 1
38
Example
16-Bit word processor
After converting our Floating-Point Representation into a Fixed-
Point Representation, suppose that we have:
A = 5000
B = 9000
C = 8000
Suppose that we have to perform: (-B + SQRT (B * B - 4 * A * C) ) / (2 * A)
The Intermediate results of (B*B) and (4*A *C) are too big to fit into a
16-bit word. However, it is expected that the result fits into a 16-bit word.
Thus, we can use a block floating-point representation by shifting the data by the same amount and then perform the operations.
A = (5000 >> 10) (divide by 2 10 or 1024) => Thus, exponent = 10
B = (9000 >> 10)
C = (8000 >> 10)
After the operation the result is shifted back by the amount of bits specified by the exponent
39
Normalization Operations for 2 ´s Complement Numbers
To use Block Floating Point (and also other arithmetic operations)
Normalization Operations are Required
Let us suppose 5-bit 2 ´s complement numbers. I have to calculate the normalization factor. How do I calculate it ?
Let us try with the numbers +2 (00010)
2 and –2 (11110)
2
.
For positive numbers I do left shift 2 positions (x4)
For negative numbers I do left shift 3 positions (x8)
So I have two different normalization factors ? Does this work ?
It works because after the arithmetic operations, the resulting number is right shifted by the same amount.
Thus, calculate the number of left-shift positions (up to sign bit) for the most significant “1” for positive numbers and for the most significant “0” for negative numbers
40
41
Division
It is much more Difficult to Accelerate than Multiplication
Some Existing Methods of Implementation Are:
Shift and Subtract, or Programmed Division (Similar to Paper and
Pencil Method)
Restoring Method
Non-Restoring Method
Division By Convergence –
Obtain the Reciprocate (inverse) of the Divisor by some Convergence Method and Multiply it by the Dividend – Also a software method but it assumes that the Microprocessor has a hardware (very fast) multiplier.
Successive Approximation Methods to Obtain the Reciprocate of the
Divisor.
Look-up table for the Reciprocate (Partial or Total)
High-Radix Division – Mostly Methods for Implementing in Hardware
42
Programmed (Restoring) Division Example – Integer Numbers
======== INTEGER DIV ===== z (dend) 0 1 1 1 0 1 0 1 = (117)
10
2 4 d 1 0 1 0 = (10)
10
========================= s (0)
2s s (1)
(0)
0 1 1 1 0 1 0 1
0 1 1 1 0 1 0 1
-q
3
.2
4 d 1 0 1 0 {q
3
=1}
--------------------------------------------
0 1 0 0 1 0 1
2s (1) 0 1 0 0 1 0 1 q
2.
2 4 d 0 0 0 0 {q
2
=0}
-------------------------------------------s (2)
2s (2)
1 0 0 1 0 1
1 0 0 1 0 1
-q1.2
4 d 1 0 1 0 {q1=1}
-------------------------------------------s (3) 1 0 0 0 1
2s (3) s (4)
1 0 0 0 1 q
0
.2
4 d 1 0 1 0 {q
0
=1}
--------------------------------------------
0 1 1 1 s 0 1 1 1 = 7 (remainder) q 1 0 1 1 = 11 (quotient)
This method assumes that the dividend has 2n bits and the divisor has n bits.
The method is similar to the “paper and pencil” method. Negative numbers have to be converted to positive first.
Firstly, compare the value of the divisor with the higher part of the dividend. If the divisor is larger, shift the dividend, subtract the divisor from the higher part and set the corresponding quotient bit to “1”.
If the higher part of the shifted dividend is lower than the divisor, do not subtract anything from the higher part of the dividend and set the corresponding quotient bit to “0”.
The number of iterations is equal to number of bits of the divisor.
The remainder is left in the higher part of the dividend
43
Programmed (Restoring) Division Example –
Fractional (Real) Numbers
======== FRACTIONAL DIV ===== z frac d frac
.0 1 1 1 0 1 0 1 =
.1 0 1 0 =
========================= s (0)
2s (0)
. 0 1 1 1 0 1 0 1
0 .1 1 1 0 1 0 1
-q
-1 d .1 0 1 0 {q
-1
=1}
-------------------------------------------s (1) .0 1 0 0 1 0 1
2s (1) 0 .1 0 0 1 0 1
-q
-2 d .0 0 0 0 {q
-2
=0}
-------------------------------------------s (2)
2s (2)
.1 0 0 1 0 1
1 .0 0 1 0 1
-q
-3 d .1 0 1 0 {q
-3
=1}
-------------------------------------------s (3)
2s (3)
.1 0 0 0 1
1 . 0 0 0 1
-q
-4 d .1 0 1 0 {q
-4
=1}
-------------------------------------------s (4) .0 1 1 1 sfrac qfrac .
.
0 0 0 0 0 1 1 1 (remainder)
1 0 1 1 (quotient)
For Fractional, or Real, Numbers, the procedure is exactly the same as for integer numbers.
The only difference is that the remainder, which is left in the higher part of the shifted dividend, has to be transferred to the lower part of it to be correct.
Them main problem with this method is that it requires a comparison (can be done by subtraction) operation on each step. This implies in more clock cycles than necessary.
The next slide shows NonRestoring
Division, which is simpler to implement, either in software or in
Hardware.
44
Nonrestoring Unsigned Division
========================= z
2
-2
4
4 d d
0 1 1 1 0 1 0 1 = (117)
10
0 1 0 1 0 = (10)
10
1 0 1 1 0
========================= s (0) 0 0 1 1 1 0 1 0 1
2s (0) 0 1 1 1 0 1 0 1
+(-2 4 d) 1 0 1 1 0
-------------------------------------------s (1)
2s (1)
0 0 1 0 0 1 0 1
0 1 0 0 1 0 1
+(-2 4 d) 1 0 1 1 0
-------------------------------------------s (2) 1 1 1 1 1 0 1
2s (2)
+2 4 d
1 1 1 1 0 1
0 1 0 1 0
-------------------------------------------s (3)
2s (3)
0 1 0 0 0 1
1 0 0 0 1
+(-2 4 d) 1 0 1 1 0
-------------------------------------------s (4) 0 0 1 1 1 s q
0 1 1 1
1 0 1 1
No overflow since in higher part:
(0111) two
< (1010) two
Positive, so subtract
Positive, so set q
3
=1 and subtract
Negative, so set q
2
=0 and add
Positive, so set q
1
=1 and subtract
Positive, so set q
0
=1
= 7 (remainder)
= 11 (quotient) z = Dividend s = Remainder d = Divisor
The big Advantage of this Method is that it is easy to test and decide if we have to add or subtract the quotient on each iteration. This means a simple implementation.
45
Programmed Division Using Left Shifts – Pseudo ASM
Using left shifts, divide unsigned 2k-bit dividend , z_high | z_low, storing the kbit quotient and remainder.
Registers: R0 holds 0 Rc for Counter
Rd for divisor Rs for z_high & rem
Rq for z_low & quotient }
{Load operands into regs Rd, Rs and Rq } div: load Rd with divisor load load
Rs with z_high
Rq with z_low
{Check for exceptions } branch d_by_0 if Rd=R0 branch d_ovfl if Rs > Rd
{Initialize Counter} load k into Rc
{Begin division loop} d_loop: shift Rq left 1 {zero to LSB, MSB to cy} rotate Rs left 1 {cy to LSB, MSB to cy} skip if carry=1 branch no_sub if Rs < Rd sub Rd from Rs {2 ´s compl. Subtract} incr Rq {set quotient digit to1}
No_sub: decr Rc {decrement counter by 1} branch d_loop if Rc
0
{Store the quotient and remainder } store Rq into quotient store Rs into remainder
Rs(p.rem) Rq(rem/quot) d_by_0: - - - - d_ovfl: - - - - d_done: - - - - -
Rd(divisor) 000 . . . 000
Even though it is an unsigned division, a 2’s complement subtraction instruction is required. Ignoring operand load and result store instructions, the function of a divide instruction is accomplished by executing between 6k+3 and 8k+3 machine instructions. For a 16-bit divisor this means well over 100 instructions on average.
46
Division Algorithm - 1
(http://www.sxlist.com/techref/microchip/math/div/24by16.htm )
47
Division Algorithm – 2 http://www.convict.lu/Jeunes/Math/Fast_operations2.htm
Fast division for PICs
If you went through our fast multiplying , now try the fast division if you dare.
The algorithm that has been applied here belongs to the CORDIC family. Also have a look at our CORDIC square-root function .
Normally division-algorithms follow the way, children are tought to operate. Let's take an example:
16546 is the numerator, 27 the divisor z
: start with the left-most digit: if 1 < 27 then add the second digit if 16 < 27 then add the third digit
165 > 27, so integer-divide 165 div 27 = 6 get the remainder, which is 165 - 6 * 27 = 3 now restart at z with the remainder
With RISC-technology, at assembler level, the tests are operated with substractions, checking whether the results are negative, zero or positive. The integer-division is done by successive substractions until the result is negative. A counter then indicates how often substractions were made.
As already pointed out, CORDIC has a very different approach to mathematical operations. The incredible speed of the algorithms are the result from a divide and conquer approach. Practically let's have see how our CORDIC division works:
Suppose you want to integer-divide numerator 0 1 010111
87
10
= 1010111
2 through 6
10
= 110 base_index := 00000001 = 1
2
.
divisor
00000110 result:=0 rotate divisor and base_index until the most significant bits of numerator and divisor are equal:
00001100
00011000
00000010 = 2
00000100 = 4
00110000 00001000 = 8
0 1 100000 00010000 = 16 now substract both numerator and altered divisor:
01010111-
01100000
----------
< 0 if negative -which is the case here- rotate back divisor and base_index one digit to the right:
00110000 00001000 = 8 substract again rotated divisor from numerator:
01010111-
00110000
----------
00100111, positive remainder now replace the divisor by the remainder: new numerator:= 00100111
48
CORDIC
– Square Root http://www.convict.lu/Jeunes/Math/square_root_CORDIC.htm
Square-root based on CORDIC
We explained the CORDIC basics for trig-functions earlier. The solution of exercise 2 of that page will be shown here. But some preliminary explanations.
Perhaps you know the following card-game:
You tell a candidate to select and remind a number from 1 to 31. Then you show him the following five cards one by one. He must answer the question whether the number is yes or no written on that card. By miracle you can tell him the number he chose. The card-order is irrelevant.
The trick is to mentally add the first number of each card where he answered YES.
Let's take an example: the candidate chooses 23
card 1: Yes, so mind 1 card 2: Yes, so add 2 -->3 card 3: Yes, add 4 -->7
card 4: No, do nothing card 5: Yes, add 16 --> 23
How does this game work?
By answering yes or no, the candidate is simply converting the decimal number 23 in a binary number:
23
10
= 11101
2
= [Yes, Yes, Yes, No, Yes], where Yes=1 and No=0
Each card shows all the numbers with the same binary-digit set to 1.
The quiz-master computes the reconversion to decimal by calculating the base-polynomial:
1 x 2 4 + 0 x 2 3 + 1 x 2 2 + 1 x 2 1 + 1 x 2 0
= 1 x 16 + 0 x 8 + 1 x 4 + 1 x 2 + 1 x 1 = 23
49