Fir Filter Design Using The Signed-Digit Number System and Carry Save Adders – A Comparison
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 12
Abstract
This work looks at optimizing finite impulse response (FIR) filters from an arithmetic perspective. Since the main two arithmetic operations in the convolution equations are addition and multiplication, they are the targets of the optimization. Therefore, considering carry-propagate-free addition techniques should enhance the addition operation of the filter. The signed-digit number system is utilized to speedup addition in the filter. An alternative carry propagate free fast adder, carry-save adder, is also used here to compare its performance to the signed-digit adder. For multiplication, Booth encoding is used to reduce the number of partial products. The two filters are modeled in VHDL, synthesized and place-and-routed. The filters are deployed on a development board to filter digital images. The resultant hardware is analyzed for speed and logic utilization
Authors and Affiliations
Hesham Altwaijry, Yasser Mohammad Seddiq
Blood Vessels Segmentation in Retinal Fundus Image using Hybrid Method of Frangi Filter, Otsu Thresholding and Morphology
Diagnosis of computer-based retinopathic hypertension is done by analyzing of retinal images. The analysis is carried out through various stages, one of which is blood vessel segmentation in retinal images. Vascular segm...
Congestion Control Techniques in WSNs: A Review
Congestion control has a great importance in wireless sensor network (WSN), where efficient application of congestion control mechanisms can prolong the network lifetime. Thus, proper examination is needed to improve mor...
An Analysis of Brand Selection
It is often observed that consumers select upper class brand when they buy next time. Suppose that former buying data and current buying data are gathered. Also suppose that upper brand is located upper in the variable a...
Using Merkle Tree to Mitigate Cooperative Black-hole Attack in Wireless Mesh Networks
Security is always a major concern and a topic of hot discussion to users of Wireless Mesh Networks (WMNs). The open architecture of WMNs makes it very easy for malicious attackers to exploit the loopholes in the routing...
A Firefly Algorithm for the Mono-Processors Hybrid Flow Shop Problem
Nature-inspired swarm metaheuristics become one of the most powerful methods for optimization. In discrete optimization, the efficiency of an algorithm depends on how it is adapted to the problem. This paper aims to prov...