2016 XIX IEEE International Conference on Soft Computing and Measurements (SCM) 2016
DOI: 10.1109/scm.2016.7519711
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of non-positional digital filters

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…The second group includes the methods and algorithms of digital filtering based on residue number codes. Multiple studies [11][12][13] have described the methods for constructing non-positional digital filters that are based on algebraic structures, possessing the properties of ring and field.…”
Section: Of 14mentioning
confidence: 99%
“…The second group includes the methods and algorithms of digital filtering based on residue number codes. Multiple studies [11][12][13] have described the methods for constructing non-positional digital filters that are based on algebraic structures, possessing the properties of ring and field.…”
Section: Of 14mentioning
confidence: 99%
“…Therefore, one of the ways to significantly increase the speed and decrease the computing power in these algorithms is to utilize the residue number system. RNS usually is used for applications such as digital signal processing [11,12], digital filters [13,14], image processing [15,16], and error correction systems [17,18].…”
Section: Introductionmentioning
confidence: 99%
“…Unlike addition, subtraction and multiplication operations, dividing, sign detection, and comparing values are difficult to do in RNS. This system is broadly utilized in special-purpose processors to run applications such as public key cryptography algorithm [2][3][4], RSA [5][6][7][8], Elliptic Curve Cryptography (ECC) [9][10][11][12][13][14], digital signal processing (DSP) [15][16][17][18][19], digital filters [20][21][22][23], image processing [24][25][26], and error correction systems [27][28][29][30]. The primary operation in cryptography algorithms such as RSA and ECC, is the modular multiplication on large numbers [12,31,32].…”
Section: Introductionmentioning
confidence: 99%