Efficient Fir Filter Implementation Based On Minimum Logic Depth Tree
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 2
Abstract
Multiple constant multiplication (MCM) scheme is widely used for implementing direct-form FIR filters. While the research focus of MCM has been more effective on common sub expression elimination, the optimization of adder-trees, which sum up the computed sub-expressions for each coefficient, is largely omitted. This project provides a method to optimize the adder trees and thereby reducing the area. Canonical signed digit method is first used to optimize the adder tree. This method is compared with MIP optimization method. The problem is solved by assigning a binary tree for a single coefficient and then by assigning the co-efficient value to the tree. Then overall minimization is carried out based on the Minimum Logic Depth Tree .This method is repeated for every iteration. The result shows 40% area reduction and 42% Dynamic Power Reduction. While the above methods reduce the area and power, speed is not taken care of. Hence the ripple carry adder used in the filter co-efficient is replaced by parallel prefix adder to reduce power and enhance speed. The result shows that speed is increased by 22%.
Authors and Affiliations
S. Romy Cathlane , Ms. A. S Narmadaa
An Intelligent System For Intrusion Detection By Svm And Ant Colony Using Neural Network
Intrusion detection systems in wireless, mobile ad hoc and sensor networks are determined greatly by classification argued in the previous chapter. Although, in contrast with wired networks, it is required to be noted i...
Secure and Authorized De-duplication Model in Hybrid Cloud Implementation by Using Multi- Layered Cryptosystem
de-duplication is a standout amongst imperative information layering systems for eliminating copy duplicates for repeat decimal data, and need been generally utilized within cloud capacity to decrease the measure of sto...
An investigation study on cancer and its preventions
Cancers are usually named using -carcinoma, -sarcoma or -blastoma as a suffix, with the Latin or Greek word for the organ or tissue of origin as the root. For example, cancers of the liver parenchyma arising from malign...
Access Control List
With the growth of internetwork, ACL’s have now become very important for network administrator. ACL’s are one of the main features of today’s internetwork router. Routers generally check each incoming packet against th...
slugIssues of Privacy and Confidentiality in Cloud Computing
Cloud computing means entrusting data to information systems that are managed by external parties on remote servers “in the cloud.”Webmail and online documents (such as Google Docs) are well - known ex...