SlideShare a Scribd company logo
1 of 12
Download to read offline
“A Research on How
Calculators operate:
Understand how calculators/computers actually compute
exponentials, logarithms, and trigonometric functions”
Introduction
› Calculators use different algorithms to
calculate trigonometric angles,
exponentials and logarithms.
› Coordinate Rotation Digital Computer
(CORDIC) algorithm is one of the most
important algorithms among them.
› This paper describes how the CORDIC
works and gives an approximate
solution for a given angle.
› Also, an example will be used for
better understanding.
Example: Trigonometric function
‘Taylor series’ for the sine is used to take an accurate result:
Sin (a) = a – a3/3! + a5/5! − a7/7! + ...,
In this equation, x is measured as radians.
For example, for finding the sine angle of 50, first we convert 50
into radians. We get 50/180 π = 0.872665.
Then use the above formula to get the value of sin 0.872665:
= 0.872665− 0.8726653/3! + 0.8726655/5! − 0.8726657/7!
= 0.872665− 0. 296737492 + 0.000059350 − 0.000000256
= 0.86921155472665
CORDIC Algorithm
› CORDIC is an iterative technique which uses to
discover a wide extent of fundamental limits.
› We present a precise and exhaustive scientific
categorization of rotational CORDIC calculations.
› Exceptional consideration has been given to the higher
radix and level strategies proposed in the writing for
diminishing the idleness.
› CORDIC is utilized as a structure hinders in different
single chip arrangements, the basic viewpoints to be
considered are rapid, low force, and low zone, for
accomplishing sensible generally speaking execution.
CORDIC Algorithm: Explanation
› Picking the starting point as the point of convergence of rotate, we
will show up at the point (x1, y1) by turning the point (x0, y0) by θ.
𝑦𝑅 = 𝑦𝑖𝑛 cos 𝜃 + 𝑥𝑖𝑛 sin 𝜃
𝑋𝑅 = − 𝑦𝑖𝑛 sin 𝜃 + 𝑋𝑖𝑛 cos 𝜃
Now, Put 𝑦𝑖𝑛 = 0 and 𝑥𝑖𝑛= 1,
after rotation, then the
equation becomes
𝑥𝑅 = cos 𝜃
𝑦𝑅 = sin 𝜃
CORDIC Algorithm: Example
𝑥𝑅
𝑦𝑅
= cos 𝜃
1 − tan 𝜃
tan 𝜃 1
𝑥𝑖𝑛
𝑦𝑖𝑛
The above equation shows that for each of the one rotation, we need
to perform 4 augmentations.
› The solicitation that lingering parts is, in what limit may we dodge
these enlargements?
The CORDIC count resorts to two urgent structures to accomplish
turn without an increase. The standard central thought is that
pivoting the information vector by a theoretical point 𝜃𝑑 is equivalent
to turning the vector by a few smaller angles
The above equation shows that for
each of the one rotation, we need to
perform 4 augmentations.
CORDIC Algorithm: Example contd..
In this figure, the
impact of Cosine angle
is not applied and,
therefore, xR′ and yR′
are accomplished
which are 1/cos (θ)
times bigger than xR
and yR.
The above equation shows that for
each of the one rotation, we need to
perform 4 augmentations.
CORDIC Algorithm: Example contd..
𝑥0
𝑦0
= cos 45°
1 − tan 45
tan 45 1
𝑥𝑖𝑛
𝑦𝑖𝑛
→ (Equation 4)
Now for the second step, the second rotation takes place,
𝑥1
𝑦1
= cos 23.55° 1 −2−1
2−1
1
𝑥0
𝑦0
→ (Equation 5)
Now combining both equation 4 and 5 we get,
𝑥1
𝑦1
= cos(45°) cos(26.55°)
1 − tan 45
tan 45 1
1 −2−1
2−1 1
𝑥𝑖𝑛
𝑦𝑖𝑛
→(Equation 6)
The above equation shows that for
each of the one rotation, we need to
perform 4 augmentations.
CORDIC Algorithm: Example contd..
Also, for the 3rd rotation we have,
𝑥2
𝑦2
= cos(−12.012°) 1 2−2
−2−2 1
𝑥1
𝑦1
→ (Equation 7)
Final the equation becomes,
𝑥1
𝑦1
=
cos(23.55°) cos(45°) cos(−12.02°) 1 −2−1
2−1
1
1 − tan 45
tan 45 1
1 2−2
−2−2
1
𝑥𝑖𝑛
𝑦𝑖𝑛
→ (Equation 8)
Discussion
› Each turn arranges a scaling factor which shows up in the last checks.
› Some new outcomes that permit quick and simple marked digit
execution of CORDIC, without adjusting the fundamental emphasis step
are given.
› A slight alteration would make it conceivable to utilize a convey spare
portrayal of numbers, rather than a marked digit one.
› The technique, called the spreading CORDIC strategy, comprises of
acting in equal two exemplary CORDIC pivots. It gives a steady
standardization factor.
› Therefore, cos (θ) inclines toward solidarity.
› Thusly, if the check is relied upon to have in excess of six iterations, we
obtain the result with high accuracy by taking scaling factor:
𝐾 ≈ cos 26.55° cos 45° … … . cos 0.8995° = 0.5967
Conclusion
› In conclusion, we can say that if we do not use cosine in the
equation and use scaling factor of 0.5967 instead, we would
obtain an ideal rotation.
› For all the additionally referencing application, here we can
consider the figures of scaling factor.
› This inside and out comes to no detriment considering the
way that, as clarified in the model close to the completion of
the paper, the scaling factor is ordinarily dealt with as a key
motivator in the system.
Thank you..

More Related Content

Similar to How Calculators Compute Trig Functions Using CORDIC Algorithm

Metodos jacobi y gauss seidel
Metodos jacobi y gauss seidelMetodos jacobi y gauss seidel
Metodos jacobi y gauss seidelCesar Mendoza
 
Metodos jacobi y gauss seidel
Metodos jacobi y gauss seidelMetodos jacobi y gauss seidel
Metodos jacobi y gauss seidelCesar Mendoza
 
Opt Assgnment #-1 PPTX.pptx
Opt Assgnment #-1 PPTX.pptxOpt Assgnment #-1 PPTX.pptx
Opt Assgnment #-1 PPTX.pptxAbdellaKarime
 
(Slides) Efficient Evaluation Methods of Elementary Functions Suitable for SI...
(Slides) Efficient Evaluation Methods of Elementary Functions Suitable for SI...(Slides) Efficient Evaluation Methods of Elementary Functions Suitable for SI...
(Slides) Efficient Evaluation Methods of Elementary Functions Suitable for SI...Naoki Shibata
 
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdfCD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdfRajJain516913
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve CryptographyJorgeVillamarin5
 
Design and Analysis of Algorithms Lecture Notes
Design and Analysis of Algorithms Lecture NotesDesign and Analysis of Algorithms Lecture Notes
Design and Analysis of Algorithms Lecture NotesSreedhar Chowdam
 
Rasterisation of a circle by the bresenham algorithm
Rasterisation of a circle by the bresenham algorithmRasterisation of a circle by the bresenham algorithm
Rasterisation of a circle by the bresenham algorithmKALAIRANJANI21
 
Rasterisation of a circle by the bresenham algorithm
Rasterisation of a circle by the bresenham algorithmRasterisation of a circle by the bresenham algorithm
Rasterisation of a circle by the bresenham algorithmKALAIRANJANI21
 
DSA Complexity.pptx What is Complexity Analysis? What is the need for Compl...
DSA Complexity.pptx   What is Complexity Analysis? What is the need for Compl...DSA Complexity.pptx   What is Complexity Analysis? What is the need for Compl...
DSA Complexity.pptx What is Complexity Analysis? What is the need for Compl...2022cspaawan12556
 
Mathematics TAKS Exit Level Review
Mathematics TAKS Exit Level ReviewMathematics TAKS Exit Level Review
Mathematics TAKS Exit Level Reviewguest3f17823
 
Numerical Techniques
Numerical TechniquesNumerical Techniques
Numerical TechniquesYasir Mahdi
 
390 Guided Projects Guided Project 31 Cooling cof.docx
390        Guided Projects Guided Project 31  Cooling cof.docx390        Guided Projects Guided Project 31  Cooling cof.docx
390 Guided Projects Guided Project 31 Cooling cof.docxrhetttrevannion
 
390 Guided Projects Guided Project 31 Cooling cof.docx
390        Guided Projects Guided Project 31  Cooling cof.docx390        Guided Projects Guided Project 31  Cooling cof.docx
390 Guided Projects Guided Project 31 Cooling cof.docxgilbertkpeters11344
 
numericalmethods.pdf
numericalmethods.pdfnumericalmethods.pdf
numericalmethods.pdfShailChettri
 

Similar to How Calculators Compute Trig Functions Using CORDIC Algorithm (20)

Metodos jacobi y gauss seidel
Metodos jacobi y gauss seidelMetodos jacobi y gauss seidel
Metodos jacobi y gauss seidel
 
Metodos jacobi y gauss seidel
Metodos jacobi y gauss seidelMetodos jacobi y gauss seidel
Metodos jacobi y gauss seidel
 
numerical.ppt
numerical.pptnumerical.ppt
numerical.ppt
 
Opt Assgnment #-1 PPTX.pptx
Opt Assgnment #-1 PPTX.pptxOpt Assgnment #-1 PPTX.pptx
Opt Assgnment #-1 PPTX.pptx
 
(Slides) Efficient Evaluation Methods of Elementary Functions Suitable for SI...
(Slides) Efficient Evaluation Methods of Elementary Functions Suitable for SI...(Slides) Efficient Evaluation Methods of Elementary Functions Suitable for SI...
(Slides) Efficient Evaluation Methods of Elementary Functions Suitable for SI...
 
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdfCD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
CD504 CGM_Lab Manual_004e08d3838702ed11fc6d03cc82f7be.pdf
 
2.ppt
2.ppt2.ppt
2.ppt
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
Design and Analysis of Algorithms Lecture Notes
Design and Analysis of Algorithms Lecture NotesDesign and Analysis of Algorithms Lecture Notes
Design and Analysis of Algorithms Lecture Notes
 
Rasterisation of a circle by the bresenham algorithm
Rasterisation of a circle by the bresenham algorithmRasterisation of a circle by the bresenham algorithm
Rasterisation of a circle by the bresenham algorithm
 
Rasterisation of a circle by the bresenham algorithm
Rasterisation of a circle by the bresenham algorithmRasterisation of a circle by the bresenham algorithm
Rasterisation of a circle by the bresenham algorithm
 
DSA Complexity.pptx What is Complexity Analysis? What is the need for Compl...
DSA Complexity.pptx   What is Complexity Analysis? What is the need for Compl...DSA Complexity.pptx   What is Complexity Analysis? What is the need for Compl...
DSA Complexity.pptx What is Complexity Analysis? What is the need for Compl...
 
Curved motion
Curved motionCurved motion
Curved motion
 
Mathematics TAKS Exit Level Review
Mathematics TAKS Exit Level ReviewMathematics TAKS Exit Level Review
Mathematics TAKS Exit Level Review
 
Cordic Code
Cordic CodeCordic Code
Cordic Code
 
Numerical Techniques
Numerical TechniquesNumerical Techniques
Numerical Techniques
 
390 Guided Projects Guided Project 31 Cooling cof.docx
390        Guided Projects Guided Project 31  Cooling cof.docx390        Guided Projects Guided Project 31  Cooling cof.docx
390 Guided Projects Guided Project 31 Cooling cof.docx
 
390 Guided Projects Guided Project 31 Cooling cof.docx
390        Guided Projects Guided Project 31  Cooling cof.docx390        Guided Projects Guided Project 31  Cooling cof.docx
390 Guided Projects Guided Project 31 Cooling cof.docx
 
numericalmethods.pdf
numericalmethods.pdfnumericalmethods.pdf
numericalmethods.pdf
 
CRYPTO 2.pptx
CRYPTO 2.pptxCRYPTO 2.pptx
CRYPTO 2.pptx
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

How Calculators Compute Trig Functions Using CORDIC Algorithm

  • 1. “A Research on How Calculators operate: Understand how calculators/computers actually compute exponentials, logarithms, and trigonometric functions”
  • 2. Introduction › Calculators use different algorithms to calculate trigonometric angles, exponentials and logarithms. › Coordinate Rotation Digital Computer (CORDIC) algorithm is one of the most important algorithms among them. › This paper describes how the CORDIC works and gives an approximate solution for a given angle. › Also, an example will be used for better understanding.
  • 3. Example: Trigonometric function ‘Taylor series’ for the sine is used to take an accurate result: Sin (a) = a – a3/3! + a5/5! − a7/7! + ..., In this equation, x is measured as radians. For example, for finding the sine angle of 50, first we convert 50 into radians. We get 50/180 π = 0.872665. Then use the above formula to get the value of sin 0.872665: = 0.872665− 0.8726653/3! + 0.8726655/5! − 0.8726657/7! = 0.872665− 0. 296737492 + 0.000059350 − 0.000000256 = 0.86921155472665
  • 4. CORDIC Algorithm › CORDIC is an iterative technique which uses to discover a wide extent of fundamental limits. › We present a precise and exhaustive scientific categorization of rotational CORDIC calculations. › Exceptional consideration has been given to the higher radix and level strategies proposed in the writing for diminishing the idleness. › CORDIC is utilized as a structure hinders in different single chip arrangements, the basic viewpoints to be considered are rapid, low force, and low zone, for accomplishing sensible generally speaking execution.
  • 5. CORDIC Algorithm: Explanation › Picking the starting point as the point of convergence of rotate, we will show up at the point (x1, y1) by turning the point (x0, y0) by θ. 𝑦𝑅 = 𝑦𝑖𝑛 cos 𝜃 + 𝑥𝑖𝑛 sin 𝜃 𝑋𝑅 = − 𝑦𝑖𝑛 sin 𝜃 + 𝑋𝑖𝑛 cos 𝜃 Now, Put 𝑦𝑖𝑛 = 0 and 𝑥𝑖𝑛= 1, after rotation, then the equation becomes 𝑥𝑅 = cos 𝜃 𝑦𝑅 = sin 𝜃
  • 6. CORDIC Algorithm: Example 𝑥𝑅 𝑦𝑅 = cos 𝜃 1 − tan 𝜃 tan 𝜃 1 𝑥𝑖𝑛 𝑦𝑖𝑛 The above equation shows that for each of the one rotation, we need to perform 4 augmentations. › The solicitation that lingering parts is, in what limit may we dodge these enlargements? The CORDIC count resorts to two urgent structures to accomplish turn without an increase. The standard central thought is that pivoting the information vector by a theoretical point 𝜃𝑑 is equivalent to turning the vector by a few smaller angles
  • 7. The above equation shows that for each of the one rotation, we need to perform 4 augmentations. CORDIC Algorithm: Example contd.. In this figure, the impact of Cosine angle is not applied and, therefore, xR′ and yR′ are accomplished which are 1/cos (θ) times bigger than xR and yR.
  • 8. The above equation shows that for each of the one rotation, we need to perform 4 augmentations. CORDIC Algorithm: Example contd.. 𝑥0 𝑦0 = cos 45° 1 − tan 45 tan 45 1 𝑥𝑖𝑛 𝑦𝑖𝑛 → (Equation 4) Now for the second step, the second rotation takes place, 𝑥1 𝑦1 = cos 23.55° 1 −2−1 2−1 1 𝑥0 𝑦0 → (Equation 5) Now combining both equation 4 and 5 we get, 𝑥1 𝑦1 = cos(45°) cos(26.55°) 1 − tan 45 tan 45 1 1 −2−1 2−1 1 𝑥𝑖𝑛 𝑦𝑖𝑛 →(Equation 6)
  • 9. The above equation shows that for each of the one rotation, we need to perform 4 augmentations. CORDIC Algorithm: Example contd.. Also, for the 3rd rotation we have, 𝑥2 𝑦2 = cos(−12.012°) 1 2−2 −2−2 1 𝑥1 𝑦1 → (Equation 7) Final the equation becomes, 𝑥1 𝑦1 = cos(23.55°) cos(45°) cos(−12.02°) 1 −2−1 2−1 1 1 − tan 45 tan 45 1 1 2−2 −2−2 1 𝑥𝑖𝑛 𝑦𝑖𝑛 → (Equation 8)
  • 10. Discussion › Each turn arranges a scaling factor which shows up in the last checks. › Some new outcomes that permit quick and simple marked digit execution of CORDIC, without adjusting the fundamental emphasis step are given. › A slight alteration would make it conceivable to utilize a convey spare portrayal of numbers, rather than a marked digit one. › The technique, called the spreading CORDIC strategy, comprises of acting in equal two exemplary CORDIC pivots. It gives a steady standardization factor. › Therefore, cos (θ) inclines toward solidarity. › Thusly, if the check is relied upon to have in excess of six iterations, we obtain the result with high accuracy by taking scaling factor: 𝐾 ≈ cos 26.55° cos 45° … … . cos 0.8995° = 0.5967
  • 11. Conclusion › In conclusion, we can say that if we do not use cosine in the equation and use scaling factor of 0.5967 instead, we would obtain an ideal rotation. › For all the additionally referencing application, here we can consider the figures of scaling factor. › This inside and out comes to no detriment considering the way that, as clarified in the model close to the completion of the paper, the scaling factor is ordinarily dealt with as a key motivator in the system.