A Comparison between RISC and CISC Microprocessor Architectures

- In this paper, we have made a comparison between RISC (Reduced Instruction Set Computer) and CISC (Complex Instruction Set Computer.) RISC and CISC are two different types of microprocessor architectures. RISC is a computer microprocessor that uses simple instructions which can be divided into multiple instructions that performs low level operations within a single clock cycle while CISC is a PC processor which utilizes single direction to execute a few low level operations, for example, stacking from memory, a number juggling operation, and a memory store or are fit for multi-step operations or tending to modes inside single guideline. The principle distinction amongst RISC and CISC is in the quantity of figuring cycles each of their directions take. The distinction in the quantity of cycles depends on the intricacy and the objective of their directions.

[1]  Farid Neema,et al.  Data sharing , 1998 .

[2]  Hanafy M. Ali,et al.  COMPARATIVE STUDY OF ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS , 2018 .

[3]  F. Han,et al.  APPLICATIONS , LIMITATIONS , AND IMPROVEMENTS IN VISIBLE LIGHT COMMUNICATION SYSTEMS , 2016 .

[4]  Xiangjian He,et al.  PAWN: a payload‐based mutual authentication scheme for wireless sensor networks , 2017, Concurr. Comput. Pract. Exp..

[5]  Xiangjian He,et al.  Data Sharing in Secure Multimedia Wireless Sensor Networks , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[6]  Abdelkrim Haqiq,et al.  Secure Communication and Routing Architecture in Wireless Sensor Networks , 2014 .

[7]  Fazlullah Khan,et al.  An Innovative Approach to Investigate Various Software Testing Techniques and Strategies , 2016 .

[8]  Jinjun Chen,et al.  A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream , 2015, WISE.

[9]  Deepak Puthal,et al.  Effective Machine to Machine Communications in Smart Grid Networks , 2012 .

[10]  Mian Ahmad Jan,et al.  Energy-efficient routing and secure communication in wireless sensor networks , 2016 .

[11]  Mian Ahmad Jan,et al.  A Survey of Cluster-based Hierarchical Routing Protocols , 2013 .

[12]  Jinjun Chen,et al.  A dynamic prime number based efficient security mechanism for big sensing data streams , 2017, J. Comput. Syst. Sci..

[13]  Kenji Nakagawa,et al.  Comparative study of spectrum sensing techniques in cognitive radio networks , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).

[14]  F. Khan,et al.  Dual head clustering scheme in wireless sensor networks , 2012, 2012 International Conference on Emerging Technologies.

[15]  Xiangjian He,et al.  Cryptography-based secure data storage and sharing using HEVC and public clouds , 2017, Inf. Sci..

[16]  Xiangjian He,et al.  Enhancing Lifetime and Quality of Data in Cluster-Based Hierarchical Routing Protocol for Wireless Sensor Network , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[17]  Fahim Arif,et al.  Fairness improvement in long chain multihop wireless ad hoc networks , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).

[18]  YED,et al.  SURVEY: DEALING NON-FUNCTIONAL REQUIREMENTS AT ARCHITECTURE LEVEL , 2016 .

[19]  Jinjun Chen,et al.  DPBSV -- An Efficient and Secure Scheme for Big Sensing Data Stream , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[20]  Fazlullah Khan Fairness and throughput improvement in multihop wireless ad hoc networks , 2014, 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE).

[21]  Shahzad Khan,et al.  Performance improvement in wireless sensor and actor networks based on actor repositioning , 2015, 2015 International Conference on Connected Vehicles and Expo (ICCVE).

[22]  Xiangjian He,et al.  A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[23]  Kenji Nakagawa,et al.  B-8-10 Cooperative Spectrum Sensing Techniques in Cognitive Radio Networks , 2012 .

[24]  Xiangjian He,et al.  Energy Evaluation Model for an Improved Centralized Clustering Hierarchical Algorithm in WSN , 2013, WWIC.

[25]  Deepak Puthal,et al.  Secure Data Collection & Critical Data Transmission in Mobile Sink WSN: Secure and Energy efficient data collection technique , 2012 .

[26]  Xiangjian He,et al.  A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..

[27]  Farman Ullah,et al.  Survey: Dealing Non-Functional Requirements at Architecture Level , 2016 .

[28]  Farman Ullah,et al.  A Survey: Embedded Systems Supporting By Different Operating Systems , 2016, ArXiv.

[29]  Xiangjian He,et al.  A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[30]  Xiangjian He,et al.  PASCCC: Priority-based application-specific congestion control clustering protocol , 2014, Comput. Networks.