Implementation Of Fully-Pipelined 16-Point DHT Architectures Using 8-Point And 4-Point DHTs for FPGA Realization
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 9
Abstract
Fully–pipelined simple modular structures are presented in this project for efficient hardware realization of Discrete Hadamard transform (DHT).From the kernel matrix of HT three different pipelined modular designs are derived for transform length N=4.It is shown further that the HT of transform length N=8 can be obtained from two 4-point HT modules, and similarly, the HT of the transform length N=16 can be obtained from four 4-point HT modules.Higher – length transforms can be obtained from these short length modules as N-point transforms can be computed from 2M number of M point HT-modules, where M=N1/2.The proposed architectures are coded in Verilog, simulated by Xilinx ISE tool for validation and testing and may be synthesized thereafter to be implemented in FPGA device, Spartan-3 and the performance will be compared with the one of the present structures.
Authors and Affiliations
J. sridevi , E. C. E , J. E. N. Abhilash, , J. Vasanta Kumar,
Challenges in the Cloud Application Development
Anyone who develops and tests software is well-known with the Software Development Life Cycle (SDLC). By its very nature, cloud-based development offers an organization a high degree of agility; correspondingly, th...
Performance Analysis of AODV and DSDV in Simulation Based Map
In recent days Inter-Vehicle communication has fascinated many research communities and automotive industries .With the introduction of inter-vehicle communication it would be possible for vehicles to communicate...
Energy Aware Architecture Using Spectrum Sensing Technique in Cognitive Radio Network
Cognitive radio (CR) is a novel concept that allows wireless systems to sense the environment, adapt, and learn from previous experience to improve the communication quality. The signal is detected by comparing the...
COMPREHENSIVE STUDY OF DIGITAL FORENSICS
This paper presenting the review about digital forensics, it consists of techniques as well as various tools used to accomplish the tasks in the digital forensic process. Network forensics is forensics and importan...
Combating Sybil Attacks using SybilGuard
This paper presents a Sybil Guard, for combating against Sybil attacks without relying on a trusted central authority. Peer-to-peer and other decentralized, distributed systems are known to be particularly open to...