Title :
A New Approach to Implement Discrete Wavelet Transform on Coarse-Grained Reconfigurable Architecture
Author :
Li, Jie ; Ke, Xinxiang ; Cao, Peng ; Shan, Weiwei
Author_Institution :
Nat. ASIC Syst. Eng. Technol. Res. Center, Southeast Univ., Nanjing, China
Abstract :
Discrete Wavelet Transform (DWT) is widely-used in image and video processing with high computing complexity and regular data flow, which is suitable for the implementation on a Coarse-grained Reconfigurable Architecture (CGRA) owing to its rich parallel computing resources. In this article, the two wavelet filters adopted in JPEG2000 image standard, 5/3 DWT and 9/7 DWT, were realized on a CGRA platform called Reconfigurable Multimedia System-II (REMUS-II). The result shows that the CGRA-based implementation has advantage in area, power and performance over the state-of the-art GPU including 7800GTX and 9800GTX. The die size and power consumption of REMUS-II is respectively less than 1% and 10% compared to the GPU implementations, whereas the performance speed-up is 92.9x for 9/7 filter compared to GPU 7800GTX and 6.54x for 5/3 filter compared to GPU 9800GTX.
Keywords :
computational complexity; discrete wavelet transforms; graphics processing units; image coding; multimedia computing; reconfigurable architectures; 5-3 DWT; 7800GTX; 9-7 DWT; 9800GTX; CGRA; DWT; GPU; JPEG2000 image standard; REMUS-II; coarse-grained reconfigurable architecture; computing complexity; discrete wavelet transform; image processing; parallel computing resources; reconfigurable multimedia system-II; video processing; wavelet filters; Complexity theory; Discrete wavelet transforms; Filter banks; Graphics processing units; Memory management; Parallel processing; Coarse-grained Reconfigurable Architecture (CGRA); Discrete Wavelet Transform (DWT); Reconfigurable Multimedia System-II (REMUS-II);
Conference_Titel :
Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2012 International Conference on
Conference_Location :
Sanya
Print_ISBN :
978-1-4673-2624-7
DOI :
10.1109/CyberC.2012.56