A New Approach to Pipeline FFT Processor
|
|
- Cecil Stevens
- 6 years ago
- Views:
Transcription
1 A ew Approach to Pipeline FFT Proceor Shouheng He and Mat Torkelon Department of Applied Electronic, Lund Univerity S- Lund, SWEDE Abtract A new VLSI architecture for real-time pipeline FFT proceor i propoed. A hardware oriented radix- algorithm i derived by integrating a twiddle factor decompoition technique in the divide and conquer approach. Radix- algorithm ha the ame multiplicative complexity a radix- algorithm, but retain the butterfly tructure of radix- algorithm. The ingle-path delay-feedback architecture i ued to exploit the patial regularity in ignal flow graph of the algorithm. For length- DFT computation, the hardware requirement of the propoed architecture i minimal on both dominant component: log complex multiplier and complex data memory. The validity and efficiency of the architecture have been verified by imulation in hardware decription language VHDL. I. ITRODUCTIO Pipeline FFT proceor i a pecified cla of proceor for DFT computation utilizing fat algorithm. It i characterized with real-time, non-topping proceing a the data equence paing the proceor. It i an AT non-optimal approach with AT = O( 3 ), ince the area lower bound i O(). However, a it ha been peculated [] that for real-time proceing whether a new metric hould be introduced ince it i necearily non-optimal given the time complexity of O(). Although aymptotically almot all the feaible architecture have reached the area lower bound [], the cla of pipeline FFT proceor ha probably the mallet contant factor among the approache that meet the time requirement, due to it leat number, O(log ), of Arithmetic Element (AE). The difference come from the fact that an AE, epecially the multiplier, take much larger area than a regiter in digital VLSI implementation. It i alo intereting to note the at leat Ω(log ) AE are neceary to meet the real-time proceing requirement due to the computational complexity of Ω( log ) for FFT algorithm. Thu it ha the nature of lower bound for AE requirement. Any optimal architecture for real-time proceing will likely have Ω(log ) AE. Another major area/energy conumption of the FFT proceor come from the memory requirement to buffer the input data and the intermediate reult for the computation. For large ize tranform, thi turn out to be dominating [3, ]. Although there i no formal proof, the area lower bound indicate that the the lower bound for the number of regiter i likelytobeω(). Thi i obviouly true for any architecture implementing FFT baed algorithm, ince the butterfly at firt tage ha to take data element eparated =r ditance away from the input equence, where r i a mall contant integer, or the radix. Putting above argument together, a pipeline FFT proceor ha necearily Ω(log r ) AE and Ω() complex word regiter. The optimal architecture ha to be the one that reduce the contant factor, or the abolute number of AE (multiplier and adder) and memory ize, to the minimum. In thi paper a new approach for real-time pipeline FFT proceor, the Radix- Single-path Delay Feedback,or R SDF architecture will be preented. We will begin with a brief review of previou approache. A hardware oriented radix- algorithm i then developed by integrating a twiddle factor decompoition technique in divide and conquer approach to form a patially regular ignal flow graph (SFG). Mapping the algorithm to the cacading delay feedback tructure lead to the the propoed architecture. Finally we conclude with a comparion of hardware requirement of R SDF and everal other popular pipeline architecture. II. PIPELIE FFT PROCESSOR ARCHITECTURES Before going into detail of the new approach, it i beneficial to have a brief review of the variou architecture for pipeline FFT proceor. To avoid being influenced by the equence order, we aume that the real-time proceing tak only require the input equence to be in normal order, and the output i allowed to be in digit-revered (radix- or radix-) order, which i permiible in uch application uch a DFT baed communication ytem [5]. We alo tick to the Decimation- In-Frequency (DIF) type of decompoition throughout the dicuion. The architecture deign for pipeline FFT proceor had been the ubject of intenive reearch a early a in 7 when
2 real-time proceing wa demanded in uch application a radar ignal proceing [6], well before the VLSI technology had advanced to the level of ytem integration. Several architecture have been propoed over the lat decade ince then, along with the increaing interet and the leap forward of the technology. Here different approache will be put into functional block with unified terminology, where the additive butterfly ha been eparated from multiplier to how the hardware requirement ditinctively, a in Fig.. The control and twiddle factor reading mechanim have been alo omitted for clarity. All data and arithmetic operation are complex, and a contraint that i a power of applie. butterfly unit and multiplier a in RMDC approach, but with much reduced memory requirement: regiter. It memory requirement i minimal. RSDF: Radix- Single-path Delay Feedback [] wa propoed a a radix- verion of RSDF, employing CORDIC iteration. The utilization of multiplier ha been increaed to 75% due to the torage of 3 out of radix- butterfly output. However, the utilization of the radix- butterfly, which i fairly complicated and contain at leat complex adder, i dropped to only 5%. It require log multiplier, log full radix- butterflie and torage of ize. C C BF C BF C BF j C BF (i). RMDC(=6) j BF BF BF BF (ii). RSDF(=6) 3x6 3x6 3x 3x BF BF BF BF (iii). RSDF(=56) BF C BF C BF C BF (iv). RMDC(=56) RMDC: Radix- Multi-path Delay Commutator [6] i a radix- verion of RMDC. It ha been ued a the architecture for the initial VLSI implementation of pipeline FFT proceor [3] and maive wafer cale integration [9]. However, it uffer from low, 5%, utilization of all component, which can be compenated only in ome pecial application where four FFT are being proceed imultaneouly. It require 3 log multiplier, log full radix- butterflie and 5= regiter. RSDC: Radix- Single-path Delay Commutator [] ue a modified radix- algorithm with programable = radix- butterflie to achieve higher, 75% utilization of multiplier. A combined Delay-Commutator alo reduce the memory requirement to from 5=, that of RMDC. The butterfly and delay-commutator become relatively complicated due to programmability requirement. RSDC ha been ued recently in building the larget ever ingle chip pipeline FFT proceor for HDTV application []. DC6x6 BF DC6x6 BF DC6x BF DC6x (v). RSDC(=56) Figure : Variou cheme for pipeline FFT proceor RMDC: Radix- Multi-path Delay Commutator [6] wa probably the mot traightforward approach for pipeline implementation of radix- FFT algorithm. The input equence ha been broken into two parallel data tream flowing forward, with correct ditance between data element entering the butterfly cheduled by proper delay. Both butterflie and multiplier are in 5% utilization. log multiplier, log radix- butterflie and 3= regiter (delay element) are required. RSDF: Radix- Single-path Delay Feedback [7] ue the regiter more efficiently by toring the butterfly output in feedback hift regiter. A ingle data tream goe through the multiplier at every tage. It ha ame number of BF A wift kimming through of the architecture lited above reveal the ditinctive merit of the different approache: Firt, the delay-feedback approache are alway more efficient than correponding delay-commutator approache in term of memory utilization ince the tored butterfly output can be directly ued by the multiplier. Second, radix- algorithm baed ingle-path architecture have higher multiplier utilization, however, radix- algorithm baed architecture have impler butterflie which are better utilized. The new approach developed in following ection i highly motivated by thee obervation. III. RADI- DIF FFT ALGORITHM By the obervation made in lat ection the mot deirable hardware oriented algorithm will be that it ha the ame number of non-trivial multiplication at the ame poition in the SFG a of radix- algorithm, but ha the ame butterfly tructure a that of radix- algorithm. Strictly peaking, algorithm with thi feature i not completely new. An SFG The Coordinate Rotational Digital Computer
3 with a complex bia factor had been obtained implicitly a the reult of contant-rotation/compenation procedure uing retricted CORDIC operation []. Another algorithm combining radix- and radix- + in DIT form ha been ued to decreae the caling error in RMDC architecture, without altering the multiplier requirement []. The clear derivation of the algorithm in DIF form with perception of reducing the hardware requirement in the context pipeline FFT proceor i, however, yet to be developed. To avoid confuing with the well known radix-= plit radix algorithm and the mixed radix- + algorithm, the notion of radix- algorithm i ued to clearly reflect the tructural relation with radix- algorithm and the identical computational requirement with radix- algorithm. The DFT of ize i defined by (k)= x(n)w nk n= k< () where W denote the th primitive root of unity, with it exponent evaluated modulo. To make the derivation of the new algorithm clearer, conider the firt tep of decompoition in the radix- DIF FFT together. Applying a 3-dimenional linear index map, n = < n + n + n 3 > k = <k +k +k 3 > () the Common Factor Algorithm (CFA) ha the form of (k + k + k 3 ) = = n 3 =n =n = n 3 =n = x( n + n +n 3 )W ( n + n +n 3 )(k +k +k 3 ) fb k ( n + ( n 3 )W n +n 3 )k ( gw n +n 3 )(k +k 3 ) where the butterfly tructure ha the form of B k ( n + n 3 )=x( n +n 3 )+( ) k x( n +n 3 + ) If the expreion within the brace of eqn. (3) i to be computed before further decompoition, an ordinary radix- DIF FFT reult. The key idea of the new algorithm i to proceed the econd tep decompoition to the remaining DFT coefficient, including the twiddle factor W ( n +n 3 )k,to exploit the exceptional value in multiplication before the next butterfly i contructed. Decompoing the compoite twiddle factor and oberve that W ( n +n 3 )(k +k +k 3 ) = W n k 3 W n (k +k ) W n 3(k +k ) W n 3k 3 =( j) n (k +k ) n W 3 (k +k ) W n 3k 3 (3) () Subtituting eqn. () in eqn. (3) and expand the ummation with index n. After implification we have a et of DFT of length =, (k + k + k 3 )= n 3 = h H(k ;k ;n 3 )W n 3(k +k ) where H(k ;k ;n 3 )i expreed in eqn. (6). x() x() x() x(3) x() x(5) x(6) x(7) x() x(9) x() x() x() x(3) x() x(5) W W W W W W W W9 / DFT (k=, k=) / DFT (k=, k=) / DFT (k=, k=) / DFT (k=, k=) i W n 3k 3 Figure : Butterfly with decompoed twiddle factor. (5) () () () () () () (6) () () (9) (5) (3) (3) () (7) (5) eqn. (6) repreent the firt two tage of butterflie with only trivial multiplication in the SFG, a and in Fig.. After thee two tage, full multiplier are required to compute the product of the decompoed twiddle factor W n 3(k +k ) in eqn. (5), a hown in Fig.. ote the order of the twiddle factor i different from that of radix- algorithm. Applying thi CFA procedure recurively to the remaining DFT of length = in eqn. (5), the complete radix- DIF FFT algorithm i obtained. An = 6 example i hown in Fig. 3 where mall diamond repreent trivial multiplication by W = = j, which involve only real-imaginary wapping and ign inverion. Radix- algorithm ha the feature that it ha the ame multiplicative complexity a radix- algorithm, but till retain the radix- butterfly tructure. The multiplicative operation are in a uch an arrangement that only every other tage ha non-trivial multiplication. Thi i a great tructural advantage over other algorithm when pipeline/cacade FFT architecture i under conideration. IV. R SDF ARCHITECTURE Mapping radix- DIF FFT algorithm derived in lat ection to the RSDF architecture dicued in ection II., a new architecture of Radix- Single-path Delay Feedback (R SDF) approach i obtained.
4 z h } { H(k ;k ;n 3 )= z } { x(n 3 )+( ) k x(n 3 + )i +( j) (k +k ) hx(n 3 + )+( )k x(n )i {z } (6) x() x() x() x(3) x() x(5) x(6) x(7) x() x(9) x() x() x() x(3) x() x(5) W W W W W9 I V Figure 3: Radix- DIF FFT flow graph for = 6 () () () () () () (6) () () (9) (5) (3) (3) () (7) (5) Fig. 5 outline an implementation of the R SDF architecture for = 56, note the imilarity of the data-path to RSDF and the reduced number of multiplier. The implementation ue two type of butterflie, one identical to that in RSDF, the other contain alo the logic to implement the trivial twiddle factor multiplication, a hown in Fig. -(i)(ii) repectively. Due to the patial regularity of Radix- algorithm, the ynchronization control of the proceor i very imple. A (log )-bit binary counter erve two purpoe: ynchronization controller and addre counter for twiddle factor reading in each tage. With the help of the butterfly tructure hown in Fig., the cheduled operation of the R SDFproceorinFig.5 i a follow. On firt = cycle, the -to- multiplexor in the firt butterfly module witch to poition, and the butterfly i idle. The input data from left i directed to the hift regiter until they are filled. On next = cycle, the multiplexor turn to poition, the butterfly compute a -point DFT with incoming data and the data tored in the hift regiter. Z(n) = x(n)+ x(n+ =), n<= (7) Z(n + =) = x(n) x(n + =) The butterfly output Z(n) i ent to apply the twiddle factor, and Z(n + =) i ent back to the hift regiter to be multiplied in till next = cyclewhen the firt half ofthe next frame of time equence i loaded in. The operation of the econd butterfly i imilar to that of the firt one, except the ditance of butterfly input equence are jut = andthe trivial twiddle factor multiplication ha been implemented by real-imaginary wapping with a commutator and controlled add/ubtract operation, a in Fig. -(ii), which require two bit control ignal from the ynchronizing counter. The data then goe through a full complex multiplier, working at 75% utility, accomplihe the reult of firt level of radix- DFT word by word. Further proceing repeat thi pattern with the ditance of the input data decreae by half at each conecutive butterfly tage. After clockcycle, The complete DFT tranform reult tream out to the right, in bit-revered order. The next frame of tranform can be computed without pauing due to the pipelined proceing of each tage. xr(n) xi(n) xr(n+/) xi(n+/) xr(n) xi(n) xr(n+/) xi(n+/) (i). BFI (ii). BFII t Zr(n+/) Zi(n+/) Zr(n) Zi(n) Zr(n+/) Zi(n+/) Figure : Butterfly tructure for R SDF FFT proceor In practical implementation, pipeline regiter hould be inerted betweeneach multiplier and butterfly tage to improve the performance. Shimming regiter are alo needed for control ignal to comply with thu revied timing. The latency of the output i then increaed to +3(log ) without affecting the throughput rate. V. COCLUSIO In thi paper, a hardware-oriented radix- algorithm i derived which ha the radix- multiplicative complexity but retain radix- butterfly tructure in the SFG. Baed on thi algorithm, a new, efficient pipeline FFT architecture, the R SDF architecture, i put forward. The hardware requirement of propoed architecture a compared with variou approache i hown in Table, where not only the number of complex Zr(n) Zi(n)
5 6 3 6 x(n) BFI BFII t BFI BFII BFI BFII BFI BFII t t t (k) clk W(n) W(n) (n) Figure 5: R SDF pipeline FFT architecture for = 56 multiplier, adder and memory ize but alo the control complexity are lited for comparion. For eay reading, bae- logarithm i ued whenever applicable. It how R SDF ha reached the minimum requirement for both multiplier and the torage, and only econd to RSDC for adder. Thi make it an ideal architecture for VLSI implementation of pipeline FFT proceor. Table : Hardware requirement comparion multiplier # adder # memory ize control RMDC (log ) log 3= imple RSDF (log ) log imple RSDF log log medium RMDC 3(log ) log 5= imple RSDC log 3log complex R SDF log log imple The architecture ha been modeled with hardware decription language VHDL with generic parameter for tranform ize and word-length, uing fixed point arithmetic and a complex array multiplier implemented with ditributed arithmetic. The validity and efficiency of the propoed architecture ha been verified by extenive imulation. [7] E.H. Wold and A.M. Depain. Pipeline and parallel-pipeline FFT proceor for VLSI implementation. IEEE Tran. Comput., C-33(5): 6, May 9. [] A.M. Depain. Fourier tranform computer uing CORDIC iteration. IEEE Tran. Comput., C-3():993, Oct. 97. [9] E. E. Swartzlander, V. K. Jain, and H. Hikawa. A radix wafer cale FFT proceor. J. VLSI Signal Proceing, (,3):65 76, May 99. [] G. Bi and E. V. Jone. A pipelined FFT proceor for wordequential data. IEEE Tran. Acout., Speech, Signal Proceing, 37():9 95, Dec. 99. [] A.M. Depain. Very fat Fourier tranform algorithm hardware for implementation. IEEE Tran. Comput., C-(5):333 3, May 979. [] R. Storn. Radix- FFT-pipeline architecture with raduced noie-to-ignal ratio. IEE Proc.-Vi. Image Signal Proce., (): 6, Apr. 99. REFERECES [] C. D. Thompon. Fourier tranform in VLSI. IEEE Tran. Comput., C-3():7 57, ov. 93. [] S. He and M. Torkelon. A new expandable D ytolic array for DFT computation baed on ymbioi of D array. In Proc. ICA 3 PP 95, page 9, Bribane, Autralia, Apr [3] E. E. Swartzlander, W. K. W. Young, and S. J. Joeph. A radix delay commutator for fat Fourier tranform proceor implementation. IEEE J. Solid-State Circuit, SC-9(5):7 79, Oct. 9. [] E. Bidet, D. Catelain, C. Joanblanq, and P. Stenn. A fat ingle-chip implementation of 9 complex point FFT. IEEE J. Solid-State Circuit, 3(3):3 35, Mar [5] M. Alard and R. Laalle. Principle of modulation and channel coding for digital broadcating for mobile receiver. EBU Review, ():7 69, Aug. 97. [6] L.R. Rabiner and B. Gold. Theory and Application of Digital Signal Proceing. Prentice-Hall, Inc., 975.
Analysis of Radix- SDF Pipeline FFT Architecture in VLSI Using Chip Scope
Analysis of Radix- SDF Pipeline FFT Architecture in VLSI Using Chip Scope G. Mohana Durga 1, D.V.R. Mohan 2 1 M.Tech Student, 2 Professor, Department of ECE, SRKR Engineering College, Bhimavaram, Andhra
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier a a The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each b c circuit will be decribed in Verilog
More informationAdvanced Encryption Standard and Modes of Operation
Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES
More informationInternational Journal of Engineering Research & Technology (IJERT) ISSN: Vol. 2 Issue 5, May
Intertage Pipeline VLI Architecture for 2-D DWT Ajinkya. Bankar 1,Bhavika. haha 2, P.K. Kadbe 3 E&TC Department, Pune Univerity 1,2,3 VPCOE Baramati Abtract In thi paper, a cheme for the deign of a high-pd
More informationDistributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router
Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To
More informationCourse Project: Adders, Subtractors, and Multipliers a
In the name Allah Department of Computer Engineering 215 Spring emeter Computer Architecture Coure Intructor: Dr. Mahdi Abbai Coure Project: Adder, Subtractor, and Multiplier a a The purpoe of thi p roject
More informationUniversität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.
Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in VHL and implemented
More informationLaboratory Exercise 2
Laoratory Exercie Numer and Diplay Thi i an exercie in deigning cominational circuit that can perform inary-to-decimal numer converion and inary-coded-decimal (BCD) addition. Part I We wih to diplay on
More information/06/$ IEEE 364
006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;
More informationPerformance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks
Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity
More informationRouting Definition 4.1
4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing
More informationDESIGN METHODOLOGY. 5.1 General
87 5 FFT DESIGN METHODOLOGY 5.1 General The fast Fourier transform is used to deliver a fast approach for the processing of data in the wireless transmission. The Fast Fourier Transform is one of the methods
More informationHassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,
COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)
More informationDelaunay Triangulation: Incremental Construction
Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )
More informationLecture 14: Minimum Spanning Tree I
COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce
More informationA SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS
A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt
More informationOn successive packing approach to multidimensional (M-D) interleaving
On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a
More informationMulti-Target Tracking In Clutter
Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and
More informationPlanning of scooping position and approach path for loading operation by wheel loader
22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader
More informationFloating Point CORDIC Based Power Operation
Floating Point CORDIC Baed Power Operation Kazumi Malhan, Padmaja AVL Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland Univerity, Rocheter, MI e-mail: kmalhan@oakland.edu,
More informationRepresentations and Transformations. Objectives
Repreentation and Tranformation Objective Derive homogeneou coordinate tranformation matrice Introduce tandard tranformation - Rotation - Tranlation - Scaling - Shear Scalar, Point, Vector Three baic element
More informationEdits in Xylia Validity Preserving Editing of XML Documents
dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,
More informationDAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications
DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu
More information[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata
he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online
More informationKey Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.
Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in
More informationTrainable Context Model for Multiscale Segmentation
Trainable Context Model for Multicale Segmentation Hui Cheng and Charle A. Bouman School of Electrical and Computer Engineering Purdue Univerity Wet Lafayette, IN 47907-1285 {hui, bouman}@ ecn.purdue.edu
More informationComputer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder
Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal
More informationShortest Path Routing in Arbitrary Networks
Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,
More informationContents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course:
Content Shortet path Algorithm and Network 21/211 The hortet path problem: Statement Verion Application Algorithm (for ingle ource p problem) Reminder: relaxation, Dijktra, Variant of Dijktra, Bellman-Ford,
More informationxy-monotone path existence queries in a rectilinear environment
CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of
More informationImage authentication and tamper detection using fragile watermarking in spatial domain
International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: 2278 1323 Image authentication and tamper detection uing fragile watermarking
More information1 The secretary problem
Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.
More informationCERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu
CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,
More information3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES
MAKARA, TEKNOLOGI, VOL. 9, NO., APRIL 5: 3-35 3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES Mochammad Zulianyah Informatic Engineering, Faculty of Engineering, ARS International Univerity,
More informationIncreasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment
Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in
More informationCutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.
Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization
More informationLaboratory Exercise 2
Laoratory Exercie Numer and Diplay Thi i an exercie in deigning cominational circuit that can perform inary-to-decimal numer converion and inary-coded-decimal (BCD) addition. Part I We wih to diplay on
More informationADAM - A PROBLEM-ORIENTED SYMBOL PROCESSOR
ADAM - A PROBLEM-ORIENTED SYMBOL PROCESSOR A. P. Mullery and R. F. Schauer Thoma J. Waton Reearch Center International Buine Machine Corporation Yorktown Height, New York R. Rice International Buine Machine
More informationThe Serial Commutator FFT
The Serial Commutator FFT Mario Garrido Gálvez, Shen-Jui Huang, Sau-Gee Chen and Oscar Gustafsson Journal Article N.B.: When citing this work, cite the original article. 2016 IEEE. Personal use of this
More informationAUTOMATIC TEST CASE GENERATION USING UML MODELS
Volume-2, Iue-6, June-2014 AUTOMATIC TEST CASE GENERATION USING UML MODELS 1 SAGARKUMAR P. JAIN, 2 KHUSHBOO S. LALWANI, 3 NIKITA K. MAHAJAN, 4 BHAGYASHREE J. GADEKAR 1,2,3,4 Department of Computer Engineering,
More informationFrequency Table Computation on Dataflow Architecture
Frequency Table Computation on Dataflow Architecture P. Škoda *, V. Sruk **, and B. Medved Rogina * * Ruđer Bošković Intitute, Zagreb, Croatia ** Faculty of Electrical Engineering and Computing, Univerity
More informationDynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array
Dynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array Januz A. Starzyk,Yongtao Guo, and Zhineng Zhu School of Electrical Engineering & Computer Science
More informationCS 467/567: Divide and Conquer on the PRAM
CS 467/567: Divide and Conquer on the PRAM Stefan D. Bruda Winter 2017 BINARY SEARCH Problem: Given a equence S 1..n orted in nondecreaing order and a value x, find the ubcript k uch that S i x If n proceor
More informationVLSI Design 9. Datapath Design
VLSI Deign 9. Datapath Deign 9. Datapath Deign Lat module: Adder circuit Simple adder Fat addition Thi module omparator Shifter Multi-input Adder Multiplier omparator detector: A = 1 detector: A = 11 111
More informationKaren L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract
Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial
More informationA Practical Model for Minimizing Waiting Time in a Transit Network
A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,
More information(12) Patent Application Publication (10) Pub. No.: US 2011/ A1
(19) United State US 2011 0316690A1 (12) Patent Application Publication (10) Pub. No.: US 2011/0316690 A1 Siegman (43) Pub. Date: Dec. 29, 2011 (54) SYSTEMAND METHOD FOR IDENTIFYING ELECTRICAL EQUIPMENT
More informationDESIGN OF PARALLEL PIPELINED FEED FORWARD ARCHITECTURE FOR ZERO FREQUENCY & MINIMUM COMPUTATION (ZMC) ALGORITHM OF FFT
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 4, Apr 2014, 199-206 Impact Journals DESIGN OF PARALLEL PIPELINED
More informationPerformance Evaluation of an Advanced Local Search Evolutionary Algorithm
Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation
More informationHow to Select Measurement Points in Access Point Localization
Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,
More informationmapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee
Reolving Deadlock for Pipelined Stream Application on Network-on-Chip Xiaohang Wang 1,2, Peng Liu 1 1 Department of Information Science and Electronic Engineering, Zheiang Univerity Hangzhou, Zheiang,
More informationDiverse: Application-Layer Service Differentiation in Peer-to-Peer Communications
Divere: Application-Layer Service Differentiation in Peer-to-Peer Communication Chuan Wu, Student Member, IEEE, Baochun Li, Senior Member, IEEE Department of Electrical and Computer Engineering Univerity
More informationAN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM
RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt
More informationNew Structural Decomposition Techniques for Constraint Satisfaction Problems
New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.
More information3D SMAP Algorithm. April 11, 2012
3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative
More informationON CONFIGURATION OF RESIDUE SCALING PROCESS IN PIPELINED RADIX-4 MQRNS FFT PROCESSOR
POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Robert SMYK* Maciej CZYŻAK* ON CONFIGURATION OF RESIDUE SCALING PROCESS IN PIPELINED RADIX-4 MQRNS FFT PROCESSOR Residue
More informationSee chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM
Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive
More informationelse end while End References
621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized
More informationA Boyer-Moore Approach for. Two-Dimensional Matching. Jorma Tarhio. University of California. Berkeley, CA Abstract
A Boyer-Moore Approach for Two-Dimenional Matching Jorma Tarhio Computer Science Diviion Univerity of California Berkeley, CA 94720 Abtract An imple ublinear algorithm i preented for two-dimenional tring
More informationManeuverable Relays to Improve Energy Efficiency in Sensor Networks
Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov
More informationSLA Adaptation for Service Overlay Networks
SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada
More informationA User-Attention Based Focus Detection Framework and Its Applications
A Uer-Attention Baed Focu Detection Framework and It Application Chia-Chiang Ho, Wen-Huang Cheng, Ting-Jian Pan, Ja-Ling Wu Communication and Multimedia Laboratory, Department of Computer Science and Information
More informationDrawing Lines in 2 Dimensions
Drawing Line in 2 Dimenion Drawing a traight line (or an arc) between two end point when one i limited to dicrete pixel require a bit of thought. Conider the following line uperimpoed on a 2 dimenional
More informationResearch on Star Image Noise Filtering Based on Diffusion Model of Regularization Influence Function
016 Sith International Conference on Intrumentation & Meaurement Computer Communication and Control Reearch on Star Image Noie Filtering Baed on Diffuion Model of Regularization Influence Function SunJianming
More informationA METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS
Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh
More informationShortest Paths with Single-Point Visibility Constraint
Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet
More informationNearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks
Nearly Contant Approximation for Data Aggregation Scheduling in Wirele Senor Network Scott C.-H. Huang, Peng-Jun Wan, Chinh T. Vu, Yinghu Li and France Yao Computer Science Department, City Univerity of
More informationMAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc
MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic
More informationTopics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X
Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term
More informationAudio-Visual Voice Command Recognition in Noisy Conditions
Audio-Viual Voice Command Recognition in Noiy Condition Joef Chaloupka, Jan Nouza, Jindrich Zdanky Laboratory of Computer Speech Proceing, Intitute of Information Technology and Electronic, Technical Univerity
More informationANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION
ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION A. Váque-Nava * Ecuela de Ingeniería. CENTRO UNIVERSITARIO MEXICO. DIVISION DE ESTUDIOS SUPERIORES J. Figueroa
More informationA PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED
A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED Jutin Domke and Yianni Aloimono Computational Viion Laboratory, Center for Automation Reearch Univerity of Maryland College Park,
More informationMarkov Random Fields in Image Segmentation
Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image
More informationService and Network Management Interworking in Future Wireless Systems
Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering
More informationarxiv:cs.oh/ v1 7 Mar 2005
A Fat Combined Decimal Adder/Subtractor arxiv:c.oh/0503017 v1 7 Mar 2005 HOOMAN NIKMEHR The Univerity of Adelaide Bu Ali Sina Univerity, Hamedan, Iran and BRADEN PHILLIPS and CHENG-CHEW LIM The Univerity
More informationA System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems
International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem
More informationChapter S:II (continued)
Chapter S:II (continued) II. Baic Search Algorithm Sytematic Search Graph Theory Baic State Space Search Depth-Firt Search Backtracking Breadth-Firt Search Uniform-Cot Search AND-OR Graph Baic Depth-Firt
More informationTwiddle Factor Transformation for Pipelined FFT Processing
Twiddle Factor Transformation for Pipelined FFT Processing In-Cheol Park, WonHee Son, and Ji-Hoon Kim School of EECS, Korea Advanced Institute of Science and Technology, Daejeon, Korea icpark@ee.kaist.ac.kr,
More information( ) subject to m. e (2) L are 2L+1. = s SEG SEG Las Vegas 2012 Annual Meeting Page 1
A new imultaneou ource eparation algorithm uing frequency-divere filtering Ying Ji*, Ed Kragh, and Phil Chritie, Schlumberger Cambridge Reearch Summary We decribe a new imultaneou ource eparation algorithm
More informationBrief Announcement: Distributed 3/2-Approximation of the Diameter
Brief Announcement: Ditributed /2-Approximation of the Diameter Preliminary verion of a brief announcement to appear at DISC 14 Stephan Holzer MIT holzer@mit.edu David Peleg Weizmann Intitute david.peleg@weizmann.ac.il
More informationShortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights
Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two
More informationGray-level histogram. Intensity (grey-level) transformation, or mapping. Use of intensity transformations:
Faculty of Informatic Eötvö Loránd Univerity Budapet, Hungary Lecture : Intenity Tranformation Image enhancement by point proceing Spatial domain and frequency domain method Baic Algorithm for Digital
More informationModeling of underwater vehicle s dynamics
Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation
More informationarxiv: v3 [cs.cg] 1 Oct 2018
Improved Time-Space Trade-off for Computing Voronoi Diagram Bahareh Banyaady Matia Korman Wolfgang Mulzer André van Renen Marcel Roeloffzen Paul Seiferth Yannik Stein arxiv:1708.00814v3 [c.cg] 1 Oct 2018
More informationKeywords: Defect detection, linear phased array transducer, parameter optimization, phased array ultrasonic B-mode imaging testing.
Send Order for Reprint to reprint@benthamcience.ae 488 The Open Automation and Control Sytem Journal, 2014, 6, 488-492 Open Acce Parameter Optimization of Linear Phaed Array Tranducer for Defect Detection
More informationComparison of Methods for Horizon Line Detection in Sea Images
Comparion of Method for Horizon Line Detection in Sea Image Tzvika Libe Evgeny Gerhikov and Samuel Koolapov Department of Electrical Engineering Braude Academic College of Engineering Karmiel 2982 Irael
More informationShortest-Path Routing in Arbitrary Networks
Ž. Journal of Algorithm 31, 105131 1999 Article ID jagm.1998.0980, available online at http:www.idealibrary.com on Shortet-Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vocking
More informationSIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial
SIMIT 7 Component Type Editor (CTE) Uer manual Siemen Indutrial Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult
More informationarxiv: v1 [cs.ds] 27 Feb 2018
Incremental Strong Connectivity and 2-Connectivity in Directed Graph Louka Georgiadi 1, Giueppe F. Italiano 2, and Niko Parotidi 2 arxiv:1802.10189v1 [c.ds] 27 Feb 2018 1 Univerity of Ioannina, Greece.
More informationA Sparse Shared-Memory Multifrontal Solver in SCAD Software
Proceeding of the International Multiconference on ISBN 978-83-6080--9 Computer Science and Information echnology, pp. 77 83 ISSN 896-709 A Spare Shared-Memory Multifrontal Solver in SCAD Software Sergiy
More informationIMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak
IMPROVED DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION Tak-Shing Wong, Charle A. Bouman, and Ilya Pollak School of Electrical and Computer Engineering Purdue Univerity ABSTRACT We propoe
More informationOperational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz
Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,
More informationLocating Brain Tumors from MR Imagery Using Symmetry
ocating rain Tumor from M magery Uing Symmetry Nilanjan ay aidya Nath Saha and Matthew obert Graham rown {nray1 baidya mbrown}@cualbertaca epartment of Computing Science Univerity of lberta Canada btract
More informationTesting Structural Properties in Textual Data: Beyond Document Grammars
Teting Structural Propertie in Textual Data: Beyond Document Grammar Felix Saaki and Jen Pönninghau Univerity of Bielefeld, Germany Abtract Schema language concentrate on grammatical contraint on document
More informationMinimum congestion spanning trees in bipartite and random graphs
Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu
More informationAn Intro to LP and the Simplex Algorithm. Primal Simplex
An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n
More informationFocused Video Estimation from Defocused Video Sequences
Focued Video Etimation from Defocued Video Sequence Junlan Yang a, Dan Schonfeld a and Magdi Mohamed b a Multimedia Communication Lab, ECE Dept., Univerity of Illinoi, Chicago, IL b Phyical Realization
More information