A Comparison between RISC and CISC Microprocessor Architectures

Shahla Gul, Noman Aftab

Abstract


- In this paper, we have made a comparison between RISC (Reduced Instruction Set Computer) and CISC (Complex Instruction Set Computer.) RISC and CISC are two different types of microprocessor architectures. RISC is a computer microprocessor that uses simple instructions which can be divided into multiple instructions that performs low level operations within a single clock cycle while CISC is a PC processor which utilizes single direction to execute a few low level operations, for example, stacking from memory, a number juggling operation, and a memory store or are fit for multi-step operations or tending to modes inside single guideline. The principle distinction amongst RISC and CISC is in the quantity of figuring cycles each of their directions take. The distinction in the quantity of cycles depends on the intricacy and the objective of their directions.


References


. Khan, F., Bashir, F., & Nakagawa, K. (2012). Dual Head Clustering Scheme in Wireless Sensor Networks. in the IEEE International Conference on Emerging Technologies (pp. 1-8). Islamabad: IEEE Islamabad.

. M. A. Jan, P. Nanda, X. He, Z. Tan and R. P. Liu, “A robust authentication scheme for observing resources in the internet of things environment†in 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 205-211, 2014, IEEE.

. Khan, F., & Nakagawa, K. (2012). Performance Improvement in Cognitive Radio Sensor Networks. in the Institute of Electronics, Information and Communication Engineers (IEICE) , 8.

. M. A. Jan, P. Nanda and X. He, “Energy Evaluation Model for an Improved Centralized Clustering Hierarchical Algorithm in WSN,†in Wired/Wireless Internet Communication, Lecture Notes in Computer Science, pp. 154–167, Springer, Berlin, Germany, 2013.

. Khan, F., Kamal, S. A., &Arif, F. (2013). Fairness Improvement in long-chain Multi-hop Wireless Adhoc Networks. International Conference on Connected Vehicles & Expo (pp. 1-8). Las Vegas: IEEE Las Vegas, USA.

. M. A. Jan, P. Nanda, X. He and R. P. Liu, “Enhancing lifetime and quality of data in cluster-based hierarchical routing protocol for wireless sensor networkâ€, 2013 IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC & EUC), pp. 1400-1407, 2013.

. Q. Jabeen, F. Khan, S. Khan and M.A Jan. (2016). Performance Improvement in Multihop Wireless Mobile Adhoc Networks. in the Journal Applied, Environmental, and Biological Sciences (JAEBS), vol. 6(4S), pp. 82-92. Print ISSN: 2090-4274 Online ISSN: 2090-4215, TextRoad.

. Khan, F., & Nakagawa, K. (2013). Comparative Study of Spectrum Sensing Techniques in Cognitive Radio Networks. in IEEE World Congress on Communication and Information Technologies (p. 8). Tunisia: IEEE Tunisia.

. Khan, F. (2014). Secure Communication and Routing Architecture in Wireless Sensor Networks. the 3rd Global Conference on Consumer Electronics (GCCE) (p. 4). Tokyo, Japan: IEEE Tokyo.

. M. A. Jan, P. Nanda, X. He and R. P. Liu, “PASCCC: Priority-based application-specific congestion control clustering protocol†Computer Networks, Vol. 74, PP-92-102, 2014.

. Khan, F. (2014, May). Fairness and throughput improvement in multihop wireless ad hoc networks. In Electrical and Computer Engineering (CCECE), 2014 IEEE 27th Canadian Conference on (pp. 1-6). IEEE.

. Mian Ahmad Jan and Muhammad Khan, “A Survey of Cluster-based Hierarchical Routing Protocolsâ€, in IRACST–International Journal of Computer Networks and Wireless Communications (IJCNWC), Vol.3, April. 2013, pp.138-143.

. Khan, S., Khan, F., & Khan, S.A.(2015). Delay and Throughput Improvement in Wireless Sensor and Actor Networks. 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW) (pp. 1-8). Riyadh: IEEE Riyad Chapter.

. Khan, F., Khan, S., & Khan, S. A. (2015, October). Performance improvement in wireless sensor and actor networks based on actor repositioning. In 2015 International Conference on Connected Vehicles and Expo (ICCVE) (pp. 134-139). IEEE.

. Khan, S., Khan, F., Jabeen. Q., Arif. F., & Jan. M. A. (2016). Performance Improvement in Wireless Sensor and Actor Networks. in the Journal Applied, Environmental, and Biological Sciences Print ISSN: 2090-4274 Online ISSN: 2090-4215

. Mian Ahmad Jan and Muhammad Khan, “Denial of Service Attacks and Their Countermeasures in WSNâ€, in IRACST–International Journal of Computer Networks and Wireless Communications (IJCNWC), Vol.3, April. 2013.

. M. A. Jan, P. Nanda, X. He and R. P. Liu, “A Sybil Attack Detection Scheme for a Centralized Clustering-based Hierarchical Network†in Trustcom/BigDataSE/ISPA, Vol.1, PP-318-325, 2015, IEEE.

. Jabeen, Q., Khan, F., Hayat, M.N., Khan, H., Jan., S.R., Ullah, F., (2016) A Survey : Embedded Systems Supporting By Different Operating Systems in the International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2 Issue 2, pp.664-673.

. Syed Roohullah Jan, Syed TauhidUllah Shah, Zia UllahJohar, Yasin Shah, Khan, F., " An Innovative Approach to Investigate Various Software Testing Techniques and Strategies", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2 Issue 2, pp.682-689, March-April 2016. URL : http://ijsrset.com/IJSRSET1622210.php

. Khan, F., Jan, SR, Tahir, M., & Khan, S., (2015) Applications, Limitations, and Improvements in Visible Light Communication Systems†In 2015 International Conference on Connected Vehicles and Expo (ICCVE) (pp. 259-262). IEEE.

. Syed Roohullah Jan, Khan, F., Muhammad Tahir, Shahzad Khan,, (2016) “Survey: Dealing Non-Functional Requirements At Architecture Levelâ€, VFAST Transactions on Software Engineering, (Accepted 2016)

. M. A. Jan, “Energy-efficient routing and secure communication in wireless sensor networks,†Ph.D. dissertation, 2016.

. M. A. Jan, P. Nanda, X. He, and R. P. Liu, “A Lightweight Mutual Authentication Scheme for IoT Objects,†IEEE Transactions on Dependable and Secure Computing (TDSC), “Submittedâ€, 2016.

. M. A. Jan, P. Nanda, X. He, and R. P. Liu, “A Sybil Attack Detection Scheme for a Forest Wildfire Monitoring Application,†Elsevier Future Generation Computer Systems (FGCS), “Acceptedâ€, 2016.

. Puthal, D., Nepal, S., Ranjan, R., & Chen, J. (2015, August). DPBSV--An Efficient and Secure Scheme for Big Sensing Data Stream. InTrustcom/BigDataSE/ISPA, 2015 IEEE (Vol. 1, pp. 246-253). IEEE.

. Puthal, D., Nepal, S., Ranjan, R., & Chen, J. (2015). A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream. In Web Information Systems Engineering–WISE 2015 (pp. 93-108). Springer International Publishing.

. Puthal, D., Nepal, S., Ranjan, R., & Chen, J. (2016). A dynamic prime number based efficient security mechanism for big sensing data streams.Journal of Computer and System Sciences.

. Puthal, D., &Sahoo, B. (2012). Secure Data Collection & Critical Data Transmission in Mobile Sink WSN: Secure and Energy efficient data collection technique.

. Puthal, D., Sahoo, B., &Sahoo, B. P. S. (2012). Effective Machine to Machine Communications in Smart Grid Networks. ARPN J. Syst. Softw.© 2009-2011 AJSS Journal, 2(1), 18-22.

. M. A. Jan, P. Nanda, M. Usman, and X. He, “PAWN: A Payload-based mutual Authentication scheme for Wireless Sensor Networks,†“acceptedâ€, 2016.

. M. Usman, M. A. Jan, and X. He, “Cryptography-based Secure Data Storage and Sharing Using HEVC and Public Clouds,†Elsevier Information sciences, “acceptedâ€, 2016.

. Jan, S. R., Khan, F., &Zaman, A. THE PERCEPTION OF STUDENTS ABOUT MOBILE LEARNING AT UNIVERSITY LEVEL. NO. CONTENTS PAGE NO., 97.

. Khan, F., & Nakagawa, K. (2012). B-8-10 Cooperative Spectrum Sensing Techniques in Cognitive Radio Networks. é›»å­æƒ…å ±é€šä¿¡å­¦ä¼šã‚½ã‚µã‚¤ã‚¨ãƒ†ã‚£å¤§ä¼šè¬›æ¼”è«–æ–‡é›†, 2012(2), 152.

. Safdar, M., Khan, I. A., Ullah, F., Khan, F., & Jan, S. R. Comparative Study of Routing Protocols in Mobile Adhoc Networks.

. Shahzad Khan, Fazlullah Khan, FahimArif, QamarJabeen, M.A Jan and S. A Khan (2016). “Performance Improvement in Wireless Sensor and Actor Networksâ€, Journal of Applied Environmental and Biological Sciences, Vol. 6(4S), pp. 191-200, Print ISSN: 2090-4274 Online ISSN: 2090-4215, TextRoad.

. M. Usman, M. A. Jan, X. He and P. Nanda, “Data Sharing in Secure Multimedia Wireless Sensor

Networks,†in 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16), “acceptedâ€, 2016.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.

Â