2010 4th International Conference on Application of Information and Communication Technologies 2010
DOI: 10.1109/icaict.2010.5611806
|View full text |Cite
|
Sign up to set email alerts
|

Hardware design and implementation of 3780 points FFT based on FPGA in DTTB

Abstract: This paper presents a hardware scheme based on FPGA to implement the 3780 points FFT. The simulation result shows that this design can satisfy the requirement of the DTTB transmitter and can acquire the better performance than typical schemes.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…SDF FFT architectures are the most common pipelined architectures used to process NP2 FFTs [19], [21], [22], [23], [24], [25], [26], [27]. Fig.…”
Section: Sdf Fft Architecturesmentioning
confidence: 99%
See 1 more Smart Citation
“…SDF FFT architectures are the most common pipelined architectures used to process NP2 FFTs [19], [21], [22], [23], [24], [25], [26], [27]. Fig.…”
Section: Sdf Fft Architecturesmentioning
confidence: 99%
“…Nowadays, pipelined FFT hardware architectures for NP2 sizes mostly consider single-path delay feedback (SDF) architectures [18], [19], [20], [21], [22], [23], [24], [25], [26], with the exception of [27]. However, for NP2 sizes, SDF architectures are not as efficient as could be expected: Although SDF architectures process data in series at a rate of one sample per clock cycle, the butterflies that they use operate data in parallel.…”
mentioning
confidence: 99%
“…In multicarrier mode DTMB runs in 4K mode with 3780 sub-carriers which are spaced apart at 2 kHz in the 8 Most communication modules, including FFT, are normally implemented using hardwired ASICs or FPGA [2][3][4][5], but they are meeting great challenges due to the rapidly proliferating of protocols. Different protocols require different codes, and hardware designed for one protocol cannot work for another one.…”
Section: Introductionmentioning
confidence: 99%