SlideShare a Scribd company logo
1 of 9
Download to read offline
M.N.Murty Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.24-32
www.ijera.com 24 | P a g e
Recursive Algorithms and Systolic Architectures for Realization
of Type-II Discrete Cosine Transform and Inverse Discrete
Cosine Transform
M.N.Murty
(Department of Physics, National Institute of Science and Technology, Berhampur-761008, Odisha,
India)
ABSTRACT
The paper presents novel recursive algorithms for realization of one-dimensional type-II discrete cosine
transform (DCT) and inverse discrete cosine transform (IDCT) of any length. By using some mathematical
techniques, recursive expressions for DCT and IDCT have been developed. The number of additions and
multiplications in the recursive algorithm for DCT are less in comparison with some other DCT algorithms.
Basing on these two recursive algorithms, two systolic architectures are presented for realization of DCT and
IDCT. The recursive algorithms are appropriate for VLSI implementation.
Keywords-Discrete cosine transform, Inverse discrete cosine transform, Recursive algorithm, Systolic
architecture.
I. INTRODUCTION
Discrete transforms play a significant
role in digital signal processing. Discrete cosine
transform (DCT) is used as key function in
many signal and image processing applications.
There are four types of DCT. Of these, the DCT-
II and DCT-IV have gained popularity.
The original definition of the DCT introduced
by Ahmed et al. in 1974 [1] was one-dimensional
(1-D) and suitable for 1-D digital signal
processing. The DCT has found wide
applications in speech and image processing as
well as telecommunication signal processing for
the purpose of data compression, feature
extraction, image reconstruction, and filtering.
Thus, many algorithms and VLSI architectures
for the fast computation of DCT have been
proposed [2]-[7]. Among those algorithms [6]
and [7] are believed to be most efficient two-
dimensional DCT algorithms in the sense of
minimizing any measure of computational
complexity.
In this paper, two algorithms to convert 1-D
type-II DCT and IDCT of any size into recursive
forms are presented. These algorithms are
implemented by recursive filter structures. Two
systolic architectures for realization of DCT and
IDCT of arbitrary length are presented in this
paper. The proposed approach requires N
multiplications and (3N-4) additions for
realization of N length DCT. The number of
multiplications and additions in the proposed
algorithm for DCT are less in comparison with
some existing structures. The IDCT requires N
multiplications and (2N – 3) additions for its
realization.
The systolic architecture has the following
characteristics:
 A massive and non-centralized parallelism
 Local communications
 Synchronous evaluation
Systolic architectures are established as the most
popular and dominant class of VLSI structures
due to the simplicity of their processing
elements (PEs), modularity of their structure,
regular and nearest neighbour interconnections
between the PEs, High level of pipelinability,
small chip area and lower dissipation .In the
systolic architectures, the desired data are
pumped rhythmically in regular intervals across
the PEs for yielding high throughput by fully
pipelined processing. The systolic array concept
can also be exploited at bit level in the design of
individual VLSI chips. The highly regular
structure of systolic circuits renders them
comparatively easy to design and test. The
systolic arrays are used in the design and
RESEARCH ARTICLE OPEN ACCESS
M.N.Murty Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.24-32
www.ijera.com 25 | P a g e
implementation of high performance digital
signal processing equipment.
The rest of the paper is organized as follows:
The derivation of recursive algorithm for 1-D
DCT-II is presented in Section-II. An example
for realization of DCT is given in Section-III. The
comparison of proposed realization of DCT
with other research works is presented in
Section-IV. The systolic architecture for
computation DCT is presented in Section-V. The
recursive algorithm for IDCT is given in Section-
VI. An example for realization IDCT is
presented in Section-VII. The systolic
architecture for realization of IDCT is presented
in Section-VIII. The conclusion is given in
Section-IX.
II. PROPOSED RECURSIVE
ALGORITHM FOR DCT-II
The type-II DCT of input sequence
 ( ): 0,1,..., 1x n n N  is defined as
1
0
2 (2 1)
( ) ( ) ( )cos
2
N
n
n k
Y k k x n
N N




 
   
 
(1)
for k = 0, 1, 2,…., N-1
where,
1
0
( ) 2
1 1,2,....., 1
if k
k
if k N



 
  
(2)
The Y values represent the output data. Without
loss of generality, the scale factor
2
( )k
N
 can
be omitted in rest of the paper.
Replacing n by (N - n) in (1), we obtain
1
1
( ) ( )cos( )
2
N
k
n
k
Y k x N n n
N


  
      
  
(3)
for k = 0, 1, 2,…, N-1
Define
k
nT =



















2
cos
2
1
cos
k
kn


(4)
where, k
k
N

 
Using (4), (3) can be expressed as
 
1
( ) cos( )
2
N
k k k
n
n
Y k x N n T


 
   
 
(5)
for k = 0,1,2,.., N -1
From (4), we get
1
1
cos
2
cos
2
k
k
n
k
n
T



  
  
  
 
 
 
(6)
and
1
3
cos
2
cos
2
k
k
n
k
n
T



  
  
  
 
 
 
(7)
It is easy to show the following trigonometric
identity.
      
  k
kkk
r
rr


2cos
cos1cos2cos


(8)
Using (8) in the numerator of RHS of (6), we
have
 
1
1 3
2cos cos cos
2 2
cos
2
k k k
k
n
k
n n
T
  


      
        
      
 
 
 
(9)
Using (4) and (7) in (9), we obtain the following
recursive relation.
M.N.Murty Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.24-32
www.ijera.com 26 | P a g e
 1 12cosk k k
n n nkT T T   (10)
Define
 
1
N
k k
N n
n
x N nP T

  (11)
As 1
k
T = 1 from (4), (11) can be expressed as
   
2
1
N
k k
N n
n
x N x N nP T

   
   
1
1
1
1 1
N
k
n
n
x N x N n T



    
(12)
Using the recursive formula (10) in (12), we
obtain
     
1
1
1
1 1 2cos
N
k k k
N n nk
n
x N x N nP T T



        
       
1 1
1
1 1
1 2cos 1 1
N N
kk
nk n
n n
x N x N n x N n TT
 

 
        
         
1 1
0 1
1 2
1 2cos 1 2 1
N N
k k k
nk n
n n
x N x N n x N x N nT T T
 

 
          
As 0 1k
T  from (4), the above expression
becomes
1 1
1
1 2
( 1) 2cos ( 1) ( 2) ( 1)
N N
kk k
N nk n
n n
x N x N n x N x N n TP T
 

 
          
(13)
Form (11), we get
1
1
1
( 1 )
N
kk
N n
n
x N n TP



  
(14)
and
 


 
2
1
2 2
n
N
k
n
K
n TnNxP
1
1
2
( 1 )
N
k
n
n
x N n T



  
(15)
Using (14) and (15) in (13), we obtain the
following recursive relation.
1 2( 1) ( 2) 2cosk k k
N N Nkx N x NP P P       
(16)
Substituting (11) in (5), we get
( ) cos( 1)
2
k k k
NY k P
 
   
 
(17)
for k = 0,1,2,…,N-1
The DCT-II in (17) can be realized using the
recursive formula (16).
III. EXAMPLE FOR REALIZING DCT-
II
A 5-point DCT-II with input sequence
 ( ): 0,1,2,3,4x n n  is taken to clarify the
proposal. For N =5, (17) can be written as
5( ) cos( 1)
2
k k k
Y k P
 
   
 
(18)
for k = 0,1,2,3,4.
As 0 10, 0k k
P P  and ( 1) 0x   , we get the
following relations from (16).
1 (0)k
xP 
 2 (1) (0) 2cos (0)k
kx x xP   
 3 2(2) (1) 2cos (0)k k
kx x xP P   
(19)
 4 3 2(3) (2) 2cosk k k
kx xP P P   
 5 4 3(4) (3) 2cosk k k
kx xP P P   
The DCT-II given in (17) can be realized using
the recursive formula (16) by the recursive filter
structure, shown in Fig. 1.
1
Z represents unit-
delay element.
  






2
cos1 kk 
M.N.Murty Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.24-32
www.ijera.com 27 | P a g e
Fig. 1: Recursive filter structure for computing DCT-11
IV. COMPARISON OF DCT-II WITH
RELATED WORKS
The proposed approach requires N
multiplications and (3N-4) additions for the
realization of N length DCT-II. In Tables 1 and
2, the number of multipliers and the number of
adders in the proposed algorithm are compared
with the corresponding parameters based on the
other methods. Table 3 gives the comparison of
the computation complexities of the proposed
algorithm with other algorithms found in the
related research works.
Table 1: Comparison of the number of
multipliers required by different algorithms
N [8] [4] [11] [5,13] [14] [12] Proposed
4 6 5 5 4 11 4 4
8 16 17 13 12 19 13 8
16 44 49 33 32 36 35 16
32 116 129 81 80 68 87 32
64 292 321 193 192 132 207 64
Table 2: Comparison of the number of adders
required by different algorithms
N [11] [4] [5,13] [8] [14] [12] Proposed
4 9 9 9 8 11 12 8
8 35 41 29 26 26 38 20
16 95 129 81 74 58 102 44
32 251 353 209 194 122 254 92
64 615 897 513 482 250 606 188
Table 3: Computation complexities
of multiplications of additions
Proposed
algorithm
N 3N-4
F[5,9,10,13] (1/2) N log2N (3/2) N log2N - N + 1
[4,15,16] N log2N /2 + 1 3 N log2 N / 2 -N +1
[12] (1/2) N log2N + (1/4) N-1 (3/2) N log2N + (1/2) N-2
[14] 2(N+3)(N-1) / N 2(2N-1)(N-1) / N
V. SYSTOLIC ARCHITECTURE FOR
DCT-II
The structure of the proposed linear
systolic array for computation of N-point DCT-
II is shown in Fig. 2. The DCT is implemented
by this systolic architecture as per the recursive
equations (19) given for N=5. It consists of
(N+1) locally connected processing elements
(PEs) of which the first N PEs are identical. The
recurrence relation given by (16) is implemented
in the first N PEs, while the last PE computes
the DCT components given by (17). The
function of a subtractor cell is shown in Fig.3.
The function of each of the first N PEs is shown
in Fig. 4 and that of the last PE is shown in Fig.
5. One sample of the input data is fed to each
PE through a subtractor cell one time-step
staggered with respect to the input of previous
PE. The black solid circle, “” represents one-
cycle delay element. The input to the ith PE of
the first N PEs is [x(i-1) - x(i - 2)] due to the delay
element between its sutractor cell and the data
sample fed to the previous PE. The first output
is obtained after (N+1) time steps and the rest (N
– 1) output are obtained in the subsequent (N –
1) time steps. Each PE of the linear array
consists of one multiplier and two adders, while
the last (N + 1)th PE contains one multiplier.
The duration of the cycle period is T = TM + 3TA,
where TM and TA are, respectively, the times
involved in performing one multiplication and
one addition. This architecture requires N
multiplications and (3N – 4) additions for
realization of N-point DCT.
Output
 kY
1
z
1
z
1
z
1
   21  NxNx
1
kcos2
k
Np
 1Nx
Input
M.N.Murty Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.24-32
www.ijera.com 28 | P a g e
Fig. 2: The linear systolic architecture for N-point DCT-II
Fig.3: Subtractor cell of the linear systolic
architecture for DCT-II
inout
ininininout
inout
qr
rqpXq
pp



Fig.4: Function of each of the first N PEs of
systolic architecture for DCT-II
CVV inout 
  






2
cos1 kk
C

Fig.5: Function of N+1th PE of the linear
systolic architecture for DCT-II
VI. PROPOSED RECURSIVE
ALGORITHM FOR IDCT
The IDCT of a sequence
 ( ): 0,1,2,..., 1Y k k N  can be written as
1
0
(2 1)
( ) ( )cos
2
N
k
n k
x n Y k
N


 
    
(20)
for 0,1,2,..., 1n N 
Replacing k by (N – k) in (20), we obtain
1
1
( ) ( )sin( 1)
2
N
n
k
k
x n Y N k n
N


  
      
  
(21)
Taking
1
2
n n
N


 
  
 
, (21) can be written as
 
1
( ) ( )sin( 1)
N
n
n
k
x n Y N k k

   (22)
Define
 sin
sin
nn
k
n
k
R


 (23)
Using (23) in (22), we obtain
1
( ) sin ( )( 1)
N
n n
kn
k
x n Y N k R

   (24)
[C] outVinV
PE
inX
outp
outq
outr
inp
inq
inr

 1nx  nx
   1 nxnx
M.N.Murty Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.24-32
www.ijera.com 29 | P a g e
for 0,1,2,..., 1n N 
From (23), we have
1
sin( 1)
sin
nn
k
n
k
R




 (25)
1
sin( 1)
sin
nn
k
n
k
R




 (26)
Consider the following trigonometric identity
     sin 2sin ( 1) cos sin ( 2)n n n nr r r      
(27)
Using (27) in (25), we get
1
2sin( )cos sin[( 1) ]
sin
n n nn
k
n
k k
R
  


 
 (28)
Using (25) and (26) in (28), we obtain the
following recursive formula.
1 12cos( )n n n
k k knR R R   (29)
Define
1
( )
N
n n
kN
k
Y N kQ R

 
(30)
Since 1 1n
R  from (23), the above expression
(30) can be written as
2
( 1) ( )
N
n n
kN
k
Y N Y N kQ R

   
1
1
1
( 1) ( 1)
N
n
k
k
Y N Y N k R



     (31)
Using the recursive relation (29), (31) can be
expressed as
1
1
1
( 1) ( 1) 2cos( )
N
n n n
k knN
k
Y N Y N kQ R R



        
1 1
1
1 1
( 1) 2cos ( 1) ( 1)
N N
n n
k kn
k k
Y N Y N k Y N kR R
 

 
        
1 2
1 0
( 1) 2cos ( 1) ( 2)
N N
n n
k kn
k k
Y N Y N k Y N kR R
 
 
        
(32)
Since 0 0n
R  from (23), the above expression
can be written as
1 2
1 1
( 1) 2cos ( 1) ( 2)
N N
n n n
k knN
k k
Y N Y N k Y N kQ R R
 
 
        
(33)
Using (30), we get
1
1
1
( 1)
N
n n
kN
k
Y N kQ R



   (34)
and
2
2
1
( 2)
N
n n
kN
k
Y N kQ R



   (35)
Substituting (34) and (35) in (33), the following
recursive relation is obtained.
1 2( 1) 2cos( )n n n
nN N NY NQ Q Q      (36)
Using (30) in (24), we have
( ) sin( )( 1)
n n
n Nx n Q  (37)
for n = 0,1,2,…..,N-1
The IDCT in (37) can be computed using the
recursive relation (36). This algorithm requires
(2N-3) additions and N multiplications for
realization of IDCT.
VII. EXAMPLE FOR REALIZING IDCT
Let us consider a 5-point IDCT with output
sequence  ( ): 0,1,2,3,4Y k k  to clarify the
proposal. For N =5, (37) can be written as
5( ) sin( )( 1)
n n
nx n Q  (38)
for n = 0,1,2,3,4.
M.N.Murty Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.24-32
www.ijera.com 30 | P a g e
As 0 0n
Q  and 1 0n
Q  , we get the following
recursive relations from (36)
1 (0)n
YQ 
2
3 2
4 3 2
5 4 3
(1) 2cos( ) (0)
(2) 2cos( ) (0)
(3) 2cos( )
(4) 2cos( )
n
n
n n
n
n n n
n
n n n
n
Y YQ
Y YQ Q
YQ Q Q
YQ Q Q




 
  
  
  
(39)
The IDCT given in (37) can be computed using
the recursive relation (36) by the recursive filter
structure, shown in Fig. 6.
Fig.6: Recursive filter structure for computing IDCT-11
VIII. SYSTOLIC ARCHITECTURE FOR
IDCT-II
The structure of the proposed linear
systolic architecture for computation of N-point
IDCT is shown in Fig. 7. The IDCT is realized by
this systolic architecture as per the recursive
equations (39) given for N = 5. It consists of (N +
1) locally connected PEs of which the first N PEs
are identical. The recurrence relation given by
(36) is implemented in the first N PEs, while the
last PE computes the IDCT components given
by (37). The function of each of the first N PEs is
shown in Fig. 4 and that of the last PE is shown
in Fig. 8. The output data is fed to each PE one
time-step staggered with respect to the input of
previous PE. The input to the ith PE of the first
N PEs is Y(i-1). The first input data is obtained
after (N+1) time steps and the rest (N – 1) input
data are obtained in the subsequent (N – 1) time
steps. Each PE of the linear array consists of one
multiplier and two adders, while the last (N +
1)th PE contains one multiplier. The duration of
the cycle period is T = TM + 2TA, where TM and
TA are, respectively, the times involved in
performing one multiplication and one
addition. The average computation time is (N +
1)T. This architecture requires N multiplications
and (2N – 3) additions for realization of N-point
IDCT.
 1NY
Output
1
z
1
z
  n
n
sin1
1
ncos2
Input
 nx
n
NQ
M.N.Murty Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.24-32
www.ijera.com 31 | P a g e
N
nn

 






2
1
Fig.7: The linear systolic architecture for N-point IDCT
SVV inout
''

  n
n
S sin
Fig.8: Function of (N+1)th PE of the linear systolic architecture for IDCT
IX. CONCLUSION
In this paper, two novel recursive
algorithms for realizing one-dimensional type-II
DCT and IDCT of any length have been derived.
These algorithms are implemented by recursive filter
structures. Also two linear systolic architecture for
realizing DCT and IDCT are presented in this
paper. The number of additions and multiplications
in the recursive algorithm for DCT are less in
comparison with some existing structures. Therefore,
saving in time can be achieved by the proposed
algorithm for DCT in its realization. The recursive
structures require less memory and are suitable for
parallel VLSI implementation. The systolic arrays
are used in the design and implementation of high
performance digital signal processing equipment.
The highly regular structure of systolic circuits
renders them comparatively easy to design and test.
REFERENCES
[1] N.Ahmed, T.Natarajan, and
K.R.Rao,Discrete cosine transform, IEEE
Trans. Comput., vol. C-23, 1974,90-93.
[2] R.K.Rao and P.Yip, Discrete cosine
transform: algorithm, advantages, and
applications,(New York: Academic, 1990).
[3] M.J.Narasimha and A.M.Peterson, On
the computation of the discrete cosine
transform, IEEE Trans. Communications,
vol.COM-26, no.6, June 1978,934-936.
[4]. H.S.Hou, A fast recursive algorithms for
computing the discrete cosine transform,
IEEE Trans. Acoust., Speech, Signal
Processing, vol. ASSP-35,no.10,
Oct.1987,1455-1461.
[5] P.Lee and F.Y.Huang, Reconstructed
recursive DCT and DST algorithms, IEEE
Trans.SignalProcessing,vol.42,no.7,Jul.199
4, 1600- 1609.
[6] P.Duhamel and C.Guillemot, Polynomial
transform computation of 2-D DCT, in
Proc. ICASSP’90, Apr.1990,1515-1518.
1st
PE 2nd
PE
(N-1)th
PE
Nth
PE
(N+1)th
PE
[S]
 
 2
2
0
0
0









NY
delays
N

 
 1
1
0
0
0
0









NY
delays
N

 0Y
 
0
1Y
 ncos2
0
0
 n
Input
x
n
NQ
[S]
'
outV'
inV
M.N.Murty Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.24-32
www.ijera.com 32 | P a g e
[7] E.Feig and S.Winograd, Fast algorithms
for the discrete cosine transform, IEEE
Trans. Signal Processing, vol.40, no.9,
Sep.1992, 2174- 2193.
[8] W.H Chen, C.H.Smith and S.C.Fralick, A
fast computational algorithm for the
discrete cosine transform, IEEE Trans.
Communicat., vol. COM-25, no. 9,
Sep.1977, 1004-1009.
[9] P.Yip and K.R.Rao, Fast decimation-in-
time algorithms for a family of discrete
sine and cosine transforms, Circuits,
Syst., Signal Processing, vol. 3, 1984, 387-
408.
[10] O.Ersoy and N.C.Hu, A unified
approach to the fast computation of all
discrete trigonometric transforms, in
Proc. IEEE Int. Conf. Acoust., Speech,
Signal Processing, 1987, 1843-1846.
[11] H.S.Malvar, Corrections to fast
computation of the discrete cosine
transform and the discrete hartley
transform, IEEE Trans Acoust., Speech,
Signal Processing, vol. 36, no. 4, April
1988, 610-612.
[12] P.Yip and K.R.Rao, The decimation-in-
frequency algorithms for a family of
discrete sine and cosine transforms,
Circuits, Syst., Signal Processing, vol. 7,
no.1, 1988, 3-19.
[13] Z.Cvetković and M.V.Popović, New fast
recursive algorithms for the computation
of discrete cosine and sine transforms,
IEEE Trans.SignalProcessing, vol.40,
no.8,August 1992, 2083-2086.
[14] J.Caranis, A VLSI architecture for the real
time computation of discrete
trigonometric transform, J. VLSI Signal
Process., no. 5, 1993, 95-104.
[15] V.Britanak, On the discrete cosine
computation, Signal Process. , vol. 40, no.
2- 3, 1994, 183-194.
[16] C.W.Kok, Fast algorithm for computing
discrete cosine transform, IEEE Trans.
Signal Process., vol. 45, March 1997, 757-
760.

More Related Content

Viewers also liked

Universal Engineering Model for Cooling Towers
Universal Engineering Model for Cooling TowersUniversal Engineering Model for Cooling Towers
Universal Engineering Model for Cooling TowersIJERA Editor
 
Bayesian Estimation For Modulated Claim Hedging
Bayesian Estimation For Modulated Claim HedgingBayesian Estimation For Modulated Claim Hedging
Bayesian Estimation For Modulated Claim HedgingIJERA Editor
 
Feedback Linearization Controller Of The Delta WingRock Phenomena
Feedback Linearization Controller Of The Delta WingRock PhenomenaFeedback Linearization Controller Of The Delta WingRock Phenomena
Feedback Linearization Controller Of The Delta WingRock PhenomenaIJERA Editor
 
Experiment on single-mode feedback control of oscillatory thermocapillary con...
Experiment on single-mode feedback control of oscillatory thermocapillary con...Experiment on single-mode feedback control of oscillatory thermocapillary con...
Experiment on single-mode feedback control of oscillatory thermocapillary con...IJERA Editor
 
8.В.Б. Антонович
8.В.Б. Антонович8.В.Б. Антонович
8.В.Б. АнтоновичСНУЯЭиП
 
Deşertul Badain Jaran
Deşertul Badain JaranDeşertul Badain Jaran
Deşertul Badain JaranOvidiu Slimac
 
крымская республиканская организация вмоо
крымская республиканская организация вмоокрымская республиканская организация вмоо
крымская республиканская организация вмооСНУЯЭиП
 

Viewers also liked (20)

El4301832837
El4301832837El4301832837
El4301832837
 
Examen facil
Examen facilExamen facil
Examen facil
 
Cw4301569573
Cw4301569573Cw4301569573
Cw4301569573
 
Aa4301137152
Aa4301137152Aa4301137152
Aa4301137152
 
Cp4201612617
Cp4201612617Cp4201612617
Cp4201612617
 
U4301106110
U4301106110U4301106110
U4301106110
 
Universal Engineering Model for Cooling Towers
Universal Engineering Model for Cooling TowersUniversal Engineering Model for Cooling Towers
Universal Engineering Model for Cooling Towers
 
Cx4201661669
Cx4201661669Cx4201661669
Cx4201661669
 
K la noi
K la noiK la noi
K la noi
 
Cu4301560565
Cu4301560565Cu4301560565
Cu4301560565
 
Franta
FrantaFranta
Franta
 
Bayesian Estimation For Modulated Claim Hedging
Bayesian Estimation For Modulated Claim HedgingBayesian Estimation For Modulated Claim Hedging
Bayesian Estimation For Modulated Claim Hedging
 
J43065866
J43065866J43065866
J43065866
 
Feedback Linearization Controller Of The Delta WingRock Phenomena
Feedback Linearization Controller Of The Delta WingRock PhenomenaFeedback Linearization Controller Of The Delta WingRock Phenomena
Feedback Linearization Controller Of The Delta WingRock Phenomena
 
C43011518
C43011518C43011518
C43011518
 
Ec4301780790
Ec4301780790Ec4301780790
Ec4301780790
 
Experiment on single-mode feedback control of oscillatory thermocapillary con...
Experiment on single-mode feedback control of oscillatory thermocapillary con...Experiment on single-mode feedback control of oscillatory thermocapillary con...
Experiment on single-mode feedback control of oscillatory thermocapillary con...
 
8.В.Б. Антонович
8.В.Б. Антонович8.В.Б. Антонович
8.В.Б. Антонович
 
Deşertul Badain Jaran
Deşertul Badain JaranDeşertul Badain Jaran
Deşertul Badain Jaran
 
крымская республиканская организация вмоо
крымская республиканская организация вмоокрымская республиканская организация вмоо
крымская республиканская организация вмоо
 

Similar to D044042432

Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...IJERA Editor
 
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...IJERA Editor
 
Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...
Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...
Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...IJERA Editor
 
High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...
High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...
High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...IJERA Editor
 
Direct split-radix algorithm for fast computation of type-II discrete Hartley...
Direct split-radix algorithm for fast computation of type-II discrete Hartley...Direct split-radix algorithm for fast computation of type-II discrete Hartley...
Direct split-radix algorithm for fast computation of type-II discrete Hartley...TELKOMNIKA JOURNAL
 
Performance Assessment of Polyphase Sequences Using Cyclic Algorithm
Performance Assessment of Polyphase Sequences Using Cyclic AlgorithmPerformance Assessment of Polyphase Sequences Using Cyclic Algorithm
Performance Assessment of Polyphase Sequences Using Cyclic Algorithmrahulmonikasharma
 
Radix-3 Algorithm for Realization of Type-II Discrete Sine Transform
Radix-3 Algorithm for Realization of Type-II Discrete Sine TransformRadix-3 Algorithm for Realization of Type-II Discrete Sine Transform
Radix-3 Algorithm for Realization of Type-II Discrete Sine TransformIJERA Editor
 
Radix-3 Algorithm for Realization of Type-II Discrete Sine Transform
Radix-3 Algorithm for Realization of Type-II Discrete Sine TransformRadix-3 Algorithm for Realization of Type-II Discrete Sine Transform
Radix-3 Algorithm for Realization of Type-II Discrete Sine TransformIJERA Editor
 
Implementation performance analysis of cordic
Implementation performance analysis of cordicImplementation performance analysis of cordic
Implementation performance analysis of cordiciaemedu
 
A novel modified distributed
A novel modified distributedA novel modified distributed
A novel modified distributedprj_publication
 
Modelling Quantum Transport in Nanostructures
Modelling Quantum Transport in NanostructuresModelling Quantum Transport in Nanostructures
Modelling Quantum Transport in Nanostructuresiosrjce
 
A novel architecture of rns based
A novel architecture of rns basedA novel architecture of rns based
A novel architecture of rns basedVLSICS Design
 
Concurrent Ternary Galois-based Computation using Nano-apex Multiplexing Nibs...
Concurrent Ternary Galois-based Computation using Nano-apex Multiplexing Nibs...Concurrent Ternary Galois-based Computation using Nano-apex Multiplexing Nibs...
Concurrent Ternary Galois-based Computation using Nano-apex Multiplexing Nibs...VLSICS Design
 
Fast dct algorithm using winograd’s method
Fast dct algorithm using winograd’s methodFast dct algorithm using winograd’s method
Fast dct algorithm using winograd’s methodIAEME Publication
 
Application of parallel hierarchical matrices and low-rank tensors in spatial...
Application of parallel hierarchical matrices and low-rank tensors in spatial...Application of parallel hierarchical matrices and low-rank tensors in spatial...
Application of parallel hierarchical matrices and low-rank tensors in spatial...Alexander Litvinenko
 

Similar to D044042432 (20)

Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
 
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Typ...
 
Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...
Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...
Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...
 
Cy33602608
Cy33602608Cy33602608
Cy33602608
 
High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...
High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...
High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...
 
Direct split-radix algorithm for fast computation of type-II discrete Hartley...
Direct split-radix algorithm for fast computation of type-II discrete Hartley...Direct split-radix algorithm for fast computation of type-II discrete Hartley...
Direct split-radix algorithm for fast computation of type-II discrete Hartley...
 
Performance Assessment of Polyphase Sequences Using Cyclic Algorithm
Performance Assessment of Polyphase Sequences Using Cyclic AlgorithmPerformance Assessment of Polyphase Sequences Using Cyclic Algorithm
Performance Assessment of Polyphase Sequences Using Cyclic Algorithm
 
Radix-3 Algorithm for Realization of Type-II Discrete Sine Transform
Radix-3 Algorithm for Realization of Type-II Discrete Sine TransformRadix-3 Algorithm for Realization of Type-II Discrete Sine Transform
Radix-3 Algorithm for Realization of Type-II Discrete Sine Transform
 
Radix-3 Algorithm for Realization of Type-II Discrete Sine Transform
Radix-3 Algorithm for Realization of Type-II Discrete Sine TransformRadix-3 Algorithm for Realization of Type-II Discrete Sine Transform
Radix-3 Algorithm for Realization of Type-II Discrete Sine Transform
 
Implementation performance analysis of cordic
Implementation performance analysis of cordicImplementation performance analysis of cordic
Implementation performance analysis of cordic
 
A novel modified distributed
A novel modified distributedA novel modified distributed
A novel modified distributed
 
E010632226
E010632226E010632226
E010632226
 
Modelling Quantum Transport in Nanostructures
Modelling Quantum Transport in NanostructuresModelling Quantum Transport in Nanostructures
Modelling Quantum Transport in Nanostructures
 
G029037043
G029037043G029037043
G029037043
 
A novel architecture of rns based
A novel architecture of rns basedA novel architecture of rns based
A novel architecture of rns based
 
Concurrent Ternary Galois-based Computation using Nano-apex Multiplexing Nibs...
Concurrent Ternary Galois-based Computation using Nano-apex Multiplexing Nibs...Concurrent Ternary Galois-based Computation using Nano-apex Multiplexing Nibs...
Concurrent Ternary Galois-based Computation using Nano-apex Multiplexing Nibs...
 
Fast dct algorithm using winograd’s method
Fast dct algorithm using winograd’s methodFast dct algorithm using winograd’s method
Fast dct algorithm using winograd’s method
 
Application of parallel hierarchical matrices and low-rank tensors in spatial...
Application of parallel hierarchical matrices and low-rank tensors in spatial...Application of parallel hierarchical matrices and low-rank tensors in spatial...
Application of parallel hierarchical matrices and low-rank tensors in spatial...
 
Aw4102359364
Aw4102359364Aw4102359364
Aw4102359364
 
FPGA Implementation of CORDIC Algorithm Architecture
FPGA Implementation of CORDIC Algorithm ArchitectureFPGA Implementation of CORDIC Algorithm Architecture
FPGA Implementation of CORDIC Algorithm Architecture
 

Recently uploaded

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 

Recently uploaded (20)

"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 

D044042432

  • 1. M.N.Murty Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.24-32 www.ijera.com 24 | P a g e Recursive Algorithms and Systolic Architectures for Realization of Type-II Discrete Cosine Transform and Inverse Discrete Cosine Transform M.N.Murty (Department of Physics, National Institute of Science and Technology, Berhampur-761008, Odisha, India) ABSTRACT The paper presents novel recursive algorithms for realization of one-dimensional type-II discrete cosine transform (DCT) and inverse discrete cosine transform (IDCT) of any length. By using some mathematical techniques, recursive expressions for DCT and IDCT have been developed. The number of additions and multiplications in the recursive algorithm for DCT are less in comparison with some other DCT algorithms. Basing on these two recursive algorithms, two systolic architectures are presented for realization of DCT and IDCT. The recursive algorithms are appropriate for VLSI implementation. Keywords-Discrete cosine transform, Inverse discrete cosine transform, Recursive algorithm, Systolic architecture. I. INTRODUCTION Discrete transforms play a significant role in digital signal processing. Discrete cosine transform (DCT) is used as key function in many signal and image processing applications. There are four types of DCT. Of these, the DCT- II and DCT-IV have gained popularity. The original definition of the DCT introduced by Ahmed et al. in 1974 [1] was one-dimensional (1-D) and suitable for 1-D digital signal processing. The DCT has found wide applications in speech and image processing as well as telecommunication signal processing for the purpose of data compression, feature extraction, image reconstruction, and filtering. Thus, many algorithms and VLSI architectures for the fast computation of DCT have been proposed [2]-[7]. Among those algorithms [6] and [7] are believed to be most efficient two- dimensional DCT algorithms in the sense of minimizing any measure of computational complexity. In this paper, two algorithms to convert 1-D type-II DCT and IDCT of any size into recursive forms are presented. These algorithms are implemented by recursive filter structures. Two systolic architectures for realization of DCT and IDCT of arbitrary length are presented in this paper. The proposed approach requires N multiplications and (3N-4) additions for realization of N length DCT. The number of multiplications and additions in the proposed algorithm for DCT are less in comparison with some existing structures. The IDCT requires N multiplications and (2N – 3) additions for its realization. The systolic architecture has the following characteristics:  A massive and non-centralized parallelism  Local communications  Synchronous evaluation Systolic architectures are established as the most popular and dominant class of VLSI structures due to the simplicity of their processing elements (PEs), modularity of their structure, regular and nearest neighbour interconnections between the PEs, High level of pipelinability, small chip area and lower dissipation .In the systolic architectures, the desired data are pumped rhythmically in regular intervals across the PEs for yielding high throughput by fully pipelined processing. The systolic array concept can also be exploited at bit level in the design of individual VLSI chips. The highly regular structure of systolic circuits renders them comparatively easy to design and test. The systolic arrays are used in the design and RESEARCH ARTICLE OPEN ACCESS
  • 2. M.N.Murty Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.24-32 www.ijera.com 25 | P a g e implementation of high performance digital signal processing equipment. The rest of the paper is organized as follows: The derivation of recursive algorithm for 1-D DCT-II is presented in Section-II. An example for realization of DCT is given in Section-III. The comparison of proposed realization of DCT with other research works is presented in Section-IV. The systolic architecture for computation DCT is presented in Section-V. The recursive algorithm for IDCT is given in Section- VI. An example for realization IDCT is presented in Section-VII. The systolic architecture for realization of IDCT is presented in Section-VIII. The conclusion is given in Section-IX. II. PROPOSED RECURSIVE ALGORITHM FOR DCT-II The type-II DCT of input sequence  ( ): 0,1,..., 1x n n N  is defined as 1 0 2 (2 1) ( ) ( ) ( )cos 2 N n n k Y k k x n N N             (1) for k = 0, 1, 2,…., N-1 where, 1 0 ( ) 2 1 1,2,....., 1 if k k if k N         (2) The Y values represent the output data. Without loss of generality, the scale factor 2 ( )k N  can be omitted in rest of the paper. Replacing n by (N - n) in (1), we obtain 1 1 ( ) ( )cos( ) 2 N k n k Y k x N n n N                (3) for k = 0, 1, 2,…, N-1 Define k nT =                    2 cos 2 1 cos k kn   (4) where, k k N    Using (4), (3) can be expressed as   1 ( ) cos( ) 2 N k k k n n Y k x N n T           (5) for k = 0,1,2,.., N -1 From (4), we get 1 1 cos 2 cos 2 k k n k n T                   (6) and 1 3 cos 2 cos 2 k k n k n T                   (7) It is easy to show the following trigonometric identity.          k kkk r rr   2cos cos1cos2cos   (8) Using (8) in the numerator of RHS of (6), we have   1 1 3 2cos cos cos 2 2 cos 2 k k k k n k n n T                                   (9) Using (4) and (7) in (9), we obtain the following recursive relation.
  • 3. M.N.Murty Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.24-32 www.ijera.com 26 | P a g e  1 12cosk k k n n nkT T T   (10) Define   1 N k k N n n x N nP T    (11) As 1 k T = 1 from (4), (11) can be expressed as     2 1 N k k N n n x N x N nP T          1 1 1 1 1 N k n n x N x N n T         (12) Using the recursive formula (10) in (12), we obtain       1 1 1 1 1 2cos N k k k N n nk n x N x N nP T T                     1 1 1 1 1 1 2cos 1 1 N N kk nk n n n x N x N n x N n TT                         1 1 0 1 1 2 1 2cos 1 2 1 N N k k k nk n n n x N x N n x N x N nT T T                 As 0 1k T  from (4), the above expression becomes 1 1 1 1 2 ( 1) 2cos ( 1) ( 2) ( 1) N N kk k N nk n n n x N x N n x N x N n TP T                 (13) Form (11), we get 1 1 1 ( 1 ) N kk N n n x N n TP       (14) and       2 1 2 2 n N k n K n TnNxP 1 1 2 ( 1 ) N k n n x N n T       (15) Using (14) and (15) in (13), we obtain the following recursive relation. 1 2( 1) ( 2) 2cosk k k N N Nkx N x NP P P        (16) Substituting (11) in (5), we get ( ) cos( 1) 2 k k k NY k P         (17) for k = 0,1,2,…,N-1 The DCT-II in (17) can be realized using the recursive formula (16). III. EXAMPLE FOR REALIZING DCT- II A 5-point DCT-II with input sequence  ( ): 0,1,2,3,4x n n  is taken to clarify the proposal. For N =5, (17) can be written as 5( ) cos( 1) 2 k k k Y k P         (18) for k = 0,1,2,3,4. As 0 10, 0k k P P  and ( 1) 0x   , we get the following relations from (16). 1 (0)k xP   2 (1) (0) 2cos (0)k kx x xP     3 2(2) (1) 2cos (0)k k kx x xP P    (19)  4 3 2(3) (2) 2cosk k k kx xP P P     5 4 3(4) (3) 2cosk k k kx xP P P    The DCT-II given in (17) can be realized using the recursive formula (16) by the recursive filter structure, shown in Fig. 1. 1 Z represents unit- delay element.          2 cos1 kk 
  • 4. M.N.Murty Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.24-32 www.ijera.com 27 | P a g e Fig. 1: Recursive filter structure for computing DCT-11 IV. COMPARISON OF DCT-II WITH RELATED WORKS The proposed approach requires N multiplications and (3N-4) additions for the realization of N length DCT-II. In Tables 1 and 2, the number of multipliers and the number of adders in the proposed algorithm are compared with the corresponding parameters based on the other methods. Table 3 gives the comparison of the computation complexities of the proposed algorithm with other algorithms found in the related research works. Table 1: Comparison of the number of multipliers required by different algorithms N [8] [4] [11] [5,13] [14] [12] Proposed 4 6 5 5 4 11 4 4 8 16 17 13 12 19 13 8 16 44 49 33 32 36 35 16 32 116 129 81 80 68 87 32 64 292 321 193 192 132 207 64 Table 2: Comparison of the number of adders required by different algorithms N [11] [4] [5,13] [8] [14] [12] Proposed 4 9 9 9 8 11 12 8 8 35 41 29 26 26 38 20 16 95 129 81 74 58 102 44 32 251 353 209 194 122 254 92 64 615 897 513 482 250 606 188 Table 3: Computation complexities of multiplications of additions Proposed algorithm N 3N-4 F[5,9,10,13] (1/2) N log2N (3/2) N log2N - N + 1 [4,15,16] N log2N /2 + 1 3 N log2 N / 2 -N +1 [12] (1/2) N log2N + (1/4) N-1 (3/2) N log2N + (1/2) N-2 [14] 2(N+3)(N-1) / N 2(2N-1)(N-1) / N V. SYSTOLIC ARCHITECTURE FOR DCT-II The structure of the proposed linear systolic array for computation of N-point DCT- II is shown in Fig. 2. The DCT is implemented by this systolic architecture as per the recursive equations (19) given for N=5. It consists of (N+1) locally connected processing elements (PEs) of which the first N PEs are identical. The recurrence relation given by (16) is implemented in the first N PEs, while the last PE computes the DCT components given by (17). The function of a subtractor cell is shown in Fig.3. The function of each of the first N PEs is shown in Fig. 4 and that of the last PE is shown in Fig. 5. One sample of the input data is fed to each PE through a subtractor cell one time-step staggered with respect to the input of previous PE. The black solid circle, “” represents one- cycle delay element. The input to the ith PE of the first N PEs is [x(i-1) - x(i - 2)] due to the delay element between its sutractor cell and the data sample fed to the previous PE. The first output is obtained after (N+1) time steps and the rest (N – 1) output are obtained in the subsequent (N – 1) time steps. Each PE of the linear array consists of one multiplier and two adders, while the last (N + 1)th PE contains one multiplier. The duration of the cycle period is T = TM + 3TA, where TM and TA are, respectively, the times involved in performing one multiplication and one addition. This architecture requires N multiplications and (3N – 4) additions for realization of N-point DCT. Output  kY 1 z 1 z 1 z 1    21  NxNx 1 kcos2 k Np  1Nx Input
  • 5. M.N.Murty Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.24-32 www.ijera.com 28 | P a g e Fig. 2: The linear systolic architecture for N-point DCT-II Fig.3: Subtractor cell of the linear systolic architecture for DCT-II inout ininininout inout qr rqpXq pp    Fig.4: Function of each of the first N PEs of systolic architecture for DCT-II CVV inout           2 cos1 kk C  Fig.5: Function of N+1th PE of the linear systolic architecture for DCT-II VI. PROPOSED RECURSIVE ALGORITHM FOR IDCT The IDCT of a sequence  ( ): 0,1,2,..., 1Y k k N  can be written as 1 0 (2 1) ( ) ( )cos 2 N k n k x n Y k N          (20) for 0,1,2,..., 1n N  Replacing k by (N – k) in (20), we obtain 1 1 ( ) ( )sin( 1) 2 N n k k x n Y N k n N                (21) Taking 1 2 n n N          , (21) can be written as   1 ( ) ( )sin( 1) N n n k x n Y N k k     (22) Define  sin sin nn k n k R    (23) Using (23) in (22), we obtain 1 ( ) sin ( )( 1) N n n kn k x n Y N k R     (24) [C] outVinV PE inX outp outq outr inp inq inr   1nx  nx    1 nxnx
  • 6. M.N.Murty Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.24-32 www.ijera.com 29 | P a g e for 0,1,2,..., 1n N  From (23), we have 1 sin( 1) sin nn k n k R      (25) 1 sin( 1) sin nn k n k R      (26) Consider the following trigonometric identity      sin 2sin ( 1) cos sin ( 2)n n n nr r r       (27) Using (27) in (25), we get 1 2sin( )cos sin[( 1) ] sin n n nn k n k k R         (28) Using (25) and (26) in (28), we obtain the following recursive formula. 1 12cos( )n n n k k knR R R   (29) Define 1 ( ) N n n kN k Y N kQ R    (30) Since 1 1n R  from (23), the above expression (30) can be written as 2 ( 1) ( ) N n n kN k Y N Y N kQ R      1 1 1 ( 1) ( 1) N n k k Y N Y N k R         (31) Using the recursive relation (29), (31) can be expressed as 1 1 1 ( 1) ( 1) 2cos( ) N n n n k knN k Y N Y N kQ R R             1 1 1 1 1 ( 1) 2cos ( 1) ( 1) N N n n k kn k k Y N Y N k Y N kR R               1 2 1 0 ( 1) 2cos ( 1) ( 2) N N n n k kn k k Y N Y N k Y N kR R              (32) Since 0 0n R  from (23), the above expression can be written as 1 2 1 1 ( 1) 2cos ( 1) ( 2) N N n n n k knN k k Y N Y N k Y N kQ R R              (33) Using (30), we get 1 1 1 ( 1) N n n kN k Y N kQ R       (34) and 2 2 1 ( 2) N n n kN k Y N kQ R       (35) Substituting (34) and (35) in (33), the following recursive relation is obtained. 1 2( 1) 2cos( )n n n nN N NY NQ Q Q      (36) Using (30) in (24), we have ( ) sin( )( 1) n n n Nx n Q  (37) for n = 0,1,2,…..,N-1 The IDCT in (37) can be computed using the recursive relation (36). This algorithm requires (2N-3) additions and N multiplications for realization of IDCT. VII. EXAMPLE FOR REALIZING IDCT Let us consider a 5-point IDCT with output sequence  ( ): 0,1,2,3,4Y k k  to clarify the proposal. For N =5, (37) can be written as 5( ) sin( )( 1) n n nx n Q  (38) for n = 0,1,2,3,4.
  • 7. M.N.Murty Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.24-32 www.ijera.com 30 | P a g e As 0 0n Q  and 1 0n Q  , we get the following recursive relations from (36) 1 (0)n YQ  2 3 2 4 3 2 5 4 3 (1) 2cos( ) (0) (2) 2cos( ) (0) (3) 2cos( ) (4) 2cos( ) n n n n n n n n n n n n n Y YQ Y YQ Q YQ Q Q YQ Q Q                (39) The IDCT given in (37) can be computed using the recursive relation (36) by the recursive filter structure, shown in Fig. 6. Fig.6: Recursive filter structure for computing IDCT-11 VIII. SYSTOLIC ARCHITECTURE FOR IDCT-II The structure of the proposed linear systolic architecture for computation of N-point IDCT is shown in Fig. 7. The IDCT is realized by this systolic architecture as per the recursive equations (39) given for N = 5. It consists of (N + 1) locally connected PEs of which the first N PEs are identical. The recurrence relation given by (36) is implemented in the first N PEs, while the last PE computes the IDCT components given by (37). The function of each of the first N PEs is shown in Fig. 4 and that of the last PE is shown in Fig. 8. The output data is fed to each PE one time-step staggered with respect to the input of previous PE. The input to the ith PE of the first N PEs is Y(i-1). The first input data is obtained after (N+1) time steps and the rest (N – 1) input data are obtained in the subsequent (N – 1) time steps. Each PE of the linear array consists of one multiplier and two adders, while the last (N + 1)th PE contains one multiplier. The duration of the cycle period is T = TM + 2TA, where TM and TA are, respectively, the times involved in performing one multiplication and one addition. The average computation time is (N + 1)T. This architecture requires N multiplications and (2N – 3) additions for realization of N-point IDCT.  1NY Output 1 z 1 z   n n sin1 1 ncos2 Input  nx n NQ
  • 8. M.N.Murty Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.24-32 www.ijera.com 31 | P a g e N nn          2 1 Fig.7: The linear systolic architecture for N-point IDCT SVV inout ''    n n S sin Fig.8: Function of (N+1)th PE of the linear systolic architecture for IDCT IX. CONCLUSION In this paper, two novel recursive algorithms for realizing one-dimensional type-II DCT and IDCT of any length have been derived. These algorithms are implemented by recursive filter structures. Also two linear systolic architecture for realizing DCT and IDCT are presented in this paper. The number of additions and multiplications in the recursive algorithm for DCT are less in comparison with some existing structures. Therefore, saving in time can be achieved by the proposed algorithm for DCT in its realization. The recursive structures require less memory and are suitable for parallel VLSI implementation. The systolic arrays are used in the design and implementation of high performance digital signal processing equipment. The highly regular structure of systolic circuits renders them comparatively easy to design and test. REFERENCES [1] N.Ahmed, T.Natarajan, and K.R.Rao,Discrete cosine transform, IEEE Trans. Comput., vol. C-23, 1974,90-93. [2] R.K.Rao and P.Yip, Discrete cosine transform: algorithm, advantages, and applications,(New York: Academic, 1990). [3] M.J.Narasimha and A.M.Peterson, On the computation of the discrete cosine transform, IEEE Trans. Communications, vol.COM-26, no.6, June 1978,934-936. [4]. H.S.Hou, A fast recursive algorithms for computing the discrete cosine transform, IEEE Trans. Acoust., Speech, Signal Processing, vol. ASSP-35,no.10, Oct.1987,1455-1461. [5] P.Lee and F.Y.Huang, Reconstructed recursive DCT and DST algorithms, IEEE Trans.SignalProcessing,vol.42,no.7,Jul.199 4, 1600- 1609. [6] P.Duhamel and C.Guillemot, Polynomial transform computation of 2-D DCT, in Proc. ICASSP’90, Apr.1990,1515-1518. 1st PE 2nd PE (N-1)th PE Nth PE (N+1)th PE [S]    2 2 0 0 0          NY delays N     1 1 0 0 0 0          NY delays N   0Y   0 1Y  ncos2 0 0  n Input x n NQ [S] ' outV' inV
  • 9. M.N.Murty Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 4), April 2014, pp.24-32 www.ijera.com 32 | P a g e [7] E.Feig and S.Winograd, Fast algorithms for the discrete cosine transform, IEEE Trans. Signal Processing, vol.40, no.9, Sep.1992, 2174- 2193. [8] W.H Chen, C.H.Smith and S.C.Fralick, A fast computational algorithm for the discrete cosine transform, IEEE Trans. Communicat., vol. COM-25, no. 9, Sep.1977, 1004-1009. [9] P.Yip and K.R.Rao, Fast decimation-in- time algorithms for a family of discrete sine and cosine transforms, Circuits, Syst., Signal Processing, vol. 3, 1984, 387- 408. [10] O.Ersoy and N.C.Hu, A unified approach to the fast computation of all discrete trigonometric transforms, in Proc. IEEE Int. Conf. Acoust., Speech, Signal Processing, 1987, 1843-1846. [11] H.S.Malvar, Corrections to fast computation of the discrete cosine transform and the discrete hartley transform, IEEE Trans Acoust., Speech, Signal Processing, vol. 36, no. 4, April 1988, 610-612. [12] P.Yip and K.R.Rao, The decimation-in- frequency algorithms for a family of discrete sine and cosine transforms, Circuits, Syst., Signal Processing, vol. 7, no.1, 1988, 3-19. [13] Z.Cvetković and M.V.Popović, New fast recursive algorithms for the computation of discrete cosine and sine transforms, IEEE Trans.SignalProcessing, vol.40, no.8,August 1992, 2083-2086. [14] J.Caranis, A VLSI architecture for the real time computation of discrete trigonometric transform, J. VLSI Signal Process., no. 5, 1993, 95-104. [15] V.Britanak, On the discrete cosine computation, Signal Process. , vol. 40, no. 2- 3, 1994, 183-194. [16] C.W.Kok, Fast algorithm for computing discrete cosine transform, IEEE Trans. Signal Process., vol. 45, March 1997, 757- 760.