Using Rotator Transformations to Simplify FFT Hardware Architectures

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Scalable FFT Architecture vs. Multiple Pipeline FFT Architectures Hardware Implementation and Cost

— This paper presents a family of architectures for FFT implementation based on the decomposition of the perfect shuffle permutation, which can be designed with variable number of processing elements. This provides designers with a trade-off choice of speed vs. complexity (cost and area.). Hardware comparison to other existing pipeline architecture presented based on implementation of 1024-poin...

متن کامل

FFT Compiler: From Math to Efficient Hardware

This paper presents a high-level compiler that generates hardware implementations of the discrete Fourier transform (DFT) from mathematical specifications. The matrix formula input language captures not only the DFT calculation but also the implementation options at the algorithmic and architectural levels. By selecting the appropriate formula, the resulting hardware implementations (described ...

متن کامل

Using XML Transformations for Enterprise Architectures

In this paper we report on the use of XML transformations in the context of Enterprise Architectures. We show that XML transformation techniques are valuable to the analysis, selection and, especially, the visualization of enterprise architectures. We propose a way to describe architectural information within a single XML document. Moreover, we propose transformational techniques to extract vie...

متن کامل

Universally Composable Firewall Architectures Using Trusted Hardware

Network firewalls are a standard security measure in computer networks that connect to the Internet. Often, ready-to-use firewall appliances are trusted to protect the network from malicious Internet traffic. However, because of their black-box nature, no one can be sure of their exact functionality. We address the possibility of actively compromised firewalls. That is, we consider the possibil...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Circuits and Systems I: Regular Papers

سال: 2020

ISSN: 1549-8328,1558-0806

DOI: 10.1109/tcsi.2020.3006253