SlideShare a Scribd company logo
1 of 6
Download to read offline
Innovative Systems Design and Engineering                                                  www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 7, 2011

The Tent Chaotic Mapping: Analysis for Generation of Binary
     Codes for Better Performance by Using MATLAB
                                       Annepu .Venkata NagaVamsi
                    Dept of E.I.E, AITAM, Tekkali -532201, Andhra Pradesh, India.
                                     E-mail: vamsikrishna_avn@yahoo.co.in
                                         G.S.S.S.S.V.K.Mohan
                    Dept of E.I.E, AITAM, Tekkali -532201, Andhra Pradesh, India.
                                       E-mail: g_k_mohan@yahoo.com
                                          M.S.Pradeep Kumar Patnaik
                     Dept of E.I.E, AITAM, Tekkali -532201, Andhra Pradesh, India.
                                     E-mail: patnaik_mspk@yahoo.com


Received: October 29, 2011
Accepted: October 30, 2011
Published: November 4, 2011

Abstract:
 In this paper, the Tent map is analyzed as a source of pseudorandom bits. To evaluate the performance of
the proposed pseudorandom bit generator, different issues were considered, such as the period length, the
discriminator value and the merit factor. The Tent mapping is a suitable alternative to other tradinational
low-complexity pseudorandom bit generators.
Keywords: Tent map, discrimination value, merit factor, chaotic signal.

1. Introduction
The generation of random numbers is required in several applications, including measurement and testing
of digital circuits and telecommunication systems (eg, to perform their functional verification and evaluate
their immunity to noise), the aim is to achieve a satisfactory tradeoff among the best merit factor. In radar
or sonar applications, linear chirps are the most typically used signals to achieve pulse compression. The
pulse being of finite length, the amplitude is a rectangle function. If the transmitted signal has a duration T,
begins at t = 0 and linearly sweeps the frequency band Δf centered on carrier f0, it can be written
              (            )
     = {A                           if 0 t<T
                       0          otherwise ...........1.1
 for best performance, the autocorrelation pattern of the optimum coded waveform must have a large peak
value for zero shift and zero value for non-zero shifts. In this paper, good binary codes are generated using
Tent –map equation to achieve a low PSL. It is possible to generate infinite number of codes at larger
lengths easily, by changing the initial conditions by very small increment, threshold level and bifurcation
factor.


2. How can chaotic waveform help?
They are deterministic (defined by an iterative map or differential equations), and can therefore be
practically implemented.



78 | P a g e
www.iiste.org
Innovative Systems Design and Engineering                                                www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 7, 2011
 They are non – periodic, which suggests there are potential advantages in security and can be used as
(infinitely) long spreading sequences.
They are sensitive to initial conditions so that the behaviour of two systems with small difference in the
initial system state (or) a parameter diverges exponentially in time while both systems remain bounded by
the operation of the non-linearity a property useful in efficient high power transmission.
Chaotic systems have a very sensitive dependence on their initial conditions. This sensitive dependence can
be demonstrated by giving two very close initial points to the iterative map. After a few iterations, the two
resulting sequences will look completely uncorrelated. Hence; an abundant source of almost uncorrelated
signals has been discovered: a slight change in the initial condition will produce a completely different
signal.


3. Tent mapping-Chaotic Equation
Here in this paper we are dealing with the Tent mapping. A deal of chaotic behaviour can be described by
one simple, fairly innocuous looking equation, the Tent map as shown in the Figure1.,and the bifurcation
for the tent map in Figure 2.
The chaotic mapping is as follows
           Xn+1 = f (xn)                     .........1.1
Tent mapping:
           Xn+1 = A - (B (xn))     A>1         .....1.2
           The chaotic regime:
Xn belongs to [A (1-B), A] 0<B<2             ……1.3


4. Proposed technique for code generation
As the Tent chaotic mapping, we can generate different sequences and by selecting the best sequence
among the sequences, the best sequence is taken and is been coded in binary for the best results.
The threshold for the binary codes is done as below
X (n) >0     xx (n) = 1                     ..........1.4
X (n) <0      xx (n) = -1                   ..........1.5
The applied function is auto –correlation pattern
X (n) is an N length sequence the auto correlation function is defined as
R (k) = ∑ x (n) x (n+k) limits from
 n= 0 to N-1-k                                ......1.6
From the autocorrelation pattern, the discriminator factor (D) can be formed as,

         R (0)
   D=    …….                     Where k≠0 ………..1.7
        Max(R (k)


5. Side lobe Reduction Using Window
function
The main disadvantage of pulse compression is the appearance of side lobes in the autocorrelation function
which will mask the weak reflections from other targets, this can be overcome by reducing the side lobes,
there are various techniques for this purpose, and one such is the windowing techniques.

The following window functions have been applied.

79 | P a g e
www.iiste.org
Innovative Systems Design and Engineering                                                   www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 7, 2011
    1.    Hamming window-

         W (n) =0.54+0.46cos (2pi*n/N+1) , 0 ≤ n ≤ N

    2.    Hanning window-

         w (n)= 0.5+0.5*cos (pi*n/N+1), 0 ≤ n ≤ N
    3.     Triangular Window-
          W (n) = 1-n/2(N+1)            0 ≤ N ≤ N+1
5.1 Results for binary codes and its response to a matched filter is show in the Table 1.

6. Results and Conclusion
Good binary codes were generated using Tent map. At different lengths, good sequences were obtained and
it was found that the discrimination factor increases with the length of the sequence. At lower lengths the
performance with the hanning and hamming windows function were found to be superior compared to
triangular window. The best sequences were found from the triangular window function at higher lengths.
Further improvement in the result can be obtained by reducing the incremental value in the algorithm and
search for new good codes.


7. Graphical Results
The graphical result shows the exactly the differences in the rectangular window, hanning window,
hamming window and triangular window as in the Figure 3,Figure 4,Figure 5,Figure 6 and the tent map out
put                     in                     the                       Figure                       7

References
 “Ling cong, Sun Songgeng. A chaotic spreading sequence generator,”                 Chinese journal ACTA
ELECTRNICASINICA.vol.20, no.2, pp. 235-239, 1998
Ghobad, H.B. Chaotic signals for digital communication.Ph.D Thesis for Purdue University, 1992
”Radar signal processing” LEWIS, B.L, BAUEL, INC, 1996, PP325-329.
”Base band model for distance and bearing estimation”, A.bauel, proc.IEEE, ISCAS-3, MONTERY,
California, pp. 275-278, 1998.
Chaotic Phase Code for radar pulse compression Xinwu, Weixian Liu, Lei Zhao and Jeffrey S.Fu, IEEE
Radar Conf.2001, pp 279-283.
AJ Fenwick C Williams S A Harman “Chaotic signals in radar and sonar” Proc. Of the international
conferences on Waveform Diversity and Design 2006 January 2006 Kuhai USA.
Base band model for distance and bearing estimation”, A.bauel, proc.IEEE, ISCAS-3, MONTERY,
California, pp. 275-278, 1998.
Ternary Pulse Compression Sequence”, INST, MOHORIR, P.S.RAJA RAJESWARI and VENKATA
RAO.K, PP.146-149, 1998.
 A Chaotic Sequence Spread-Spectrum” IEEE Transactions on Communications. vol. 25(2/3/9), pp. 1126-
1129, 1996.MAKOTO ITOH,
Ternary Pulse Compression Sequence by logistic map” ”, IEEE, MOHORIR, PP.2512-2515, 1998
Direct Sequence –Radar Communication System” vol.19, pp 529- 531, 2008
International Journal on Chaotic Signals “, vol.12, no.23, pp.236-239, 1999
D. Middleton, An Introduction to Statistical Communication Theory. New York: McGraw-Hill, 1988.


80 | P a g e
www.iiste.org
Innovative Systems Design and Engineering                                         www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 7, 2011
 ”Chaotic pulse code for radar pulse compression “IEEE Radar Conference, 2001, LEIZHAO and
JEFFREY, PP 279-283.
 G. Heidari-Bateni and C. D. McGillem, “A chaotic direct-sequence spread-spectrum Communication
system,” IEEE Trans Commun., vol.42, pp. 1524– 1527,Feb./Mar./Apr. 1994




                                  Figure 1. Graph of Tent map function




                                 Figure 2. Bifurcation diagram for the tent map




                               Figure 3. Discrimination curve for the hamming window

81 | P a g e
www.iiste.org
Innovative Systems Design and Engineering                                      www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 7, 2011




                             Figure 4. Discrimination curve for the Triangular window




                             Figure 5. Discrimination curve for the rectangular window




                             Figure 6. Discrimination curve for the hanning window

82 | P a g e
www.iiste.org
Innovative Systems Design and Engineering                                   www.iiste.org
ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online)
Vol 2, No 7, 2011




                                   Figure 6. Output for Tent mapping

                                                  Table 1
                                             DISCRIMINATION FACTOR
                             Length
                                          Drec        Dhan     Dham     Dtri
                                          value       value    value    value

                             20           7.665       9.761    10.822   8.309

                             50           8.142       9.034    12.385   8.996

                             100          12.353      13.236   15.221   9.473

                             500          15.822      15.145   16.375   13.694

                             1000         16.381      16.679   18.765   16.726

                             1500         17.643      18.667   19.504   18.848

                             2000         19.414      19.237   20.305   20.476

                             2500         21.321      22.560   21.824   21.960


                             3000         22.496      23.359   22.272   23.702


                             3500         22.602      23.691   23.383   24.432




83 | P a g e
www.iiste.org

More Related Content

What's hot

Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475IJRAT
 
A comprehensive survey of contemporary
A comprehensive survey of contemporaryA comprehensive survey of contemporary
A comprehensive survey of contemporaryprjpublications
 
Visual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful SharesVisual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful SharesDebarko De
 
Blind Audio Source Separation (Bass): An Unsuperwised Approach
Blind Audio Source Separation (Bass): An Unsuperwised Approach Blind Audio Source Separation (Bass): An Unsuperwised Approach
Blind Audio Source Separation (Bass): An Unsuperwised Approach IJEEE
 
Paper id 252014130
Paper id 252014130Paper id 252014130
Paper id 252014130IJRAT
 
Linked CP Tensor Decomposition (presented by ICONIP2012)
Linked CP Tensor Decomposition (presented by ICONIP2012)Linked CP Tensor Decomposition (presented by ICONIP2012)
Linked CP Tensor Decomposition (presented by ICONIP2012)Tatsuya Yokota
 
Paper id 24201464
Paper id 24201464Paper id 24201464
Paper id 24201464IJRAT
 
JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...
JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...
JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...ijseajournal
 
Design of Efficient 4×4 Quaternary Vedic Multiplier Using Current-Mode Multi-...
Design of Efficient 4×4 Quaternary Vedic Multiplier Using Current-Mode Multi-...Design of Efficient 4×4 Quaternary Vedic Multiplier Using Current-Mode Multi-...
Design of Efficient 4×4 Quaternary Vedic Multiplier Using Current-Mode Multi-...idescitation
 
NUMBER PLATE IMAGE DETECTION FOR FAST MOTION VEHICLES USING BLUR KERNEL ESTIM...
NUMBER PLATE IMAGE DETECTION FOR FAST MOTION VEHICLES USING BLUR KERNEL ESTIM...NUMBER PLATE IMAGE DETECTION FOR FAST MOTION VEHICLES USING BLUR KERNEL ESTIM...
NUMBER PLATE IMAGE DETECTION FOR FAST MOTION VEHICLES USING BLUR KERNEL ESTIM...paperpublications3
 
Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...
Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...
Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...sipij
 
Performance evaluation of ds cdma
Performance evaluation of ds cdmaPerformance evaluation of ds cdma
Performance evaluation of ds cdmacaijjournal
 
Implementation of a modified counterpropagation neural network model in onlin...
Implementation of a modified counterpropagation neural network model in onlin...Implementation of a modified counterpropagation neural network model in onlin...
Implementation of a modified counterpropagation neural network model in onlin...Alexander Decker
 
A simple framework for contrastive learning of visual representations
A simple framework for contrastive learning of visual representationsA simple framework for contrastive learning of visual representations
A simple framework for contrastive learning of visual representationsDevansh16
 
Principal Component Analysis for Tensor Analysis and EEG classification
Principal Component Analysis for Tensor Analysis and EEG classificationPrincipal Component Analysis for Tensor Analysis and EEG classification
Principal Component Analysis for Tensor Analysis and EEG classificationTatsuya Yokota
 
PARTITION SORT REVISITED: RECONFIRMING THE ROBUSTNESS IN AVERAGE CASE AND MUC...
PARTITION SORT REVISITED: RECONFIRMING THE ROBUSTNESS IN AVERAGE CASE AND MUC...PARTITION SORT REVISITED: RECONFIRMING THE ROBUSTNESS IN AVERAGE CASE AND MUC...
PARTITION SORT REVISITED: RECONFIRMING THE ROBUSTNESS IN AVERAGE CASE AND MUC...IJCSEA Journal
 
Deep Learning for Natural Language Processing
Deep Learning for Natural Language ProcessingDeep Learning for Natural Language Processing
Deep Learning for Natural Language ProcessingIRJET Journal
 

What's hot (19)

Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475
 
A comprehensive survey of contemporary
A comprehensive survey of contemporaryA comprehensive survey of contemporary
A comprehensive survey of contemporary
 
Visual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful SharesVisual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful Shares
 
Blind Audio Source Separation (Bass): An Unsuperwised Approach
Blind Audio Source Separation (Bass): An Unsuperwised Approach Blind Audio Source Separation (Bass): An Unsuperwised Approach
Blind Audio Source Separation (Bass): An Unsuperwised Approach
 
40120140501004
4012014050100440120140501004
40120140501004
 
Paper id 252014130
Paper id 252014130Paper id 252014130
Paper id 252014130
 
Linked CP Tensor Decomposition (presented by ICONIP2012)
Linked CP Tensor Decomposition (presented by ICONIP2012)Linked CP Tensor Decomposition (presented by ICONIP2012)
Linked CP Tensor Decomposition (presented by ICONIP2012)
 
Paper id 24201464
Paper id 24201464Paper id 24201464
Paper id 24201464
 
JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...
JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...
JAVA BASED VISUALIZATION AND ANIMATION FOR TEACHING THE DIJKSTRA SHORTEST PAT...
 
AlexNet
AlexNetAlexNet
AlexNet
 
Design of Efficient 4×4 Quaternary Vedic Multiplier Using Current-Mode Multi-...
Design of Efficient 4×4 Quaternary Vedic Multiplier Using Current-Mode Multi-...Design of Efficient 4×4 Quaternary Vedic Multiplier Using Current-Mode Multi-...
Design of Efficient 4×4 Quaternary Vedic Multiplier Using Current-Mode Multi-...
 
NUMBER PLATE IMAGE DETECTION FOR FAST MOTION VEHICLES USING BLUR KERNEL ESTIM...
NUMBER PLATE IMAGE DETECTION FOR FAST MOTION VEHICLES USING BLUR KERNEL ESTIM...NUMBER PLATE IMAGE DETECTION FOR FAST MOTION VEHICLES USING BLUR KERNEL ESTIM...
NUMBER PLATE IMAGE DETECTION FOR FAST MOTION VEHICLES USING BLUR KERNEL ESTIM...
 
Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...
Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...
Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...
 
Performance evaluation of ds cdma
Performance evaluation of ds cdmaPerformance evaluation of ds cdma
Performance evaluation of ds cdma
 
Implementation of a modified counterpropagation neural network model in onlin...
Implementation of a modified counterpropagation neural network model in onlin...Implementation of a modified counterpropagation neural network model in onlin...
Implementation of a modified counterpropagation neural network model in onlin...
 
A simple framework for contrastive learning of visual representations
A simple framework for contrastive learning of visual representationsA simple framework for contrastive learning of visual representations
A simple framework for contrastive learning of visual representations
 
Principal Component Analysis for Tensor Analysis and EEG classification
Principal Component Analysis for Tensor Analysis and EEG classificationPrincipal Component Analysis for Tensor Analysis and EEG classification
Principal Component Analysis for Tensor Analysis and EEG classification
 
PARTITION SORT REVISITED: RECONFIRMING THE ROBUSTNESS IN AVERAGE CASE AND MUC...
PARTITION SORT REVISITED: RECONFIRMING THE ROBUSTNESS IN AVERAGE CASE AND MUC...PARTITION SORT REVISITED: RECONFIRMING THE ROBUSTNESS IN AVERAGE CASE AND MUC...
PARTITION SORT REVISITED: RECONFIRMING THE ROBUSTNESS IN AVERAGE CASE AND MUC...
 
Deep Learning for Natural Language Processing
Deep Learning for Natural Language ProcessingDeep Learning for Natural Language Processing
Deep Learning for Natural Language Processing
 

Viewers also liked

PROVIA-led research prioritization for vulnerability, impacts and adaptation
PROVIA-led research prioritization for vulnerability, impacts and adaptationPROVIA-led research prioritization for vulnerability, impacts and adaptation
PROVIA-led research prioritization for vulnerability, impacts and adaptationPROVIA
 
9° tarea bullying. Cllaret Tovar
9° tarea bullying. Cllaret Tovar9° tarea bullying. Cllaret Tovar
9° tarea bullying. Cllaret TovarClaret Uny
 
9. thong tin ts dh, cd vung db song cuu long
9. thong tin ts dh, cd vung db song cuu long9. thong tin ts dh, cd vung db song cuu long
9. thong tin ts dh, cd vung db song cuu longLinh Nguyễn
 
Regione Umbria tavola tutela delle acque
Regione Umbria tavola tutela delle acqueRegione Umbria tavola tutela delle acque
Regione Umbria tavola tutela delle acqueItalianostratrasimeno
 
9th grade field trip 2
9th grade field trip 29th grade field trip 2
9th grade field trip 2Media Center
 
9 reasons why she should be craved for...
9 reasons why she should be craved for...9 reasons why she should be craved for...
9 reasons why she should be craved for...Preeti Khattri
 
9. Portafolio Richar Romero
9. Portafolio Richar Romero9. Portafolio Richar Romero
9. Portafolio Richar RomeroMarcela Olmos R
 
9 produtos que você deve ter em sua casa e que pode servir como remédio
9 produtos que você deve ter em sua casa e que pode servir como remédio9 produtos que você deve ter em sua casa e que pode servir como remédio
9 produtos que você deve ter em sua casa e que pode servir como remédioJuli Ferreira
 
9th Alan Webb memorial lecture: International Working - A few pictures, 210715
9th Alan Webb memorial lecture: International Working - A few pictures, 2107159th Alan Webb memorial lecture: International Working - A few pictures, 210715
9th Alan Webb memorial lecture: International Working - A few pictures, 210715Association for Project Management
 
9 tanaman termahal
9 tanaman termahal9 tanaman termahal
9 tanaman termahalAjang Wahyu
 
9.yersinia elika...
9.yersinia elika...9.yersinia elika...
9.yersinia elika...Flor Romero
 
9 What is Your Greatest Boast? Galatians 6:11-18
9 What is Your Greatest Boast? Galatians 6:11-189 What is Your Greatest Boast? Galatians 6:11-18
9 What is Your Greatest Boast? Galatians 6:11-18Rick Peterson
 

Viewers also liked (17)

PROVIA-led research prioritization for vulnerability, impacts and adaptation
PROVIA-led research prioritization for vulnerability, impacts and adaptationPROVIA-led research prioritization for vulnerability, impacts and adaptation
PROVIA-led research prioritization for vulnerability, impacts and adaptation
 
9° tarea bullying. Cllaret Tovar
9° tarea bullying. Cllaret Tovar9° tarea bullying. Cllaret Tovar
9° tarea bullying. Cllaret Tovar
 
9. thong tin ts dh, cd vung db song cuu long
9. thong tin ts dh, cd vung db song cuu long9. thong tin ts dh, cd vung db song cuu long
9. thong tin ts dh, cd vung db song cuu long
 
Regione Umbria tavola tutela delle acque
Regione Umbria tavola tutela delle acqueRegione Umbria tavola tutela delle acque
Regione Umbria tavola tutela delle acque
 
9th grade field trip 2
9th grade field trip 29th grade field trip 2
9th grade field trip 2
 
9 zapreshchaetsya
9 zapreshchaetsya9 zapreshchaetsya
9 zapreshchaetsya
 
9 reasons why she should be craved for...
9 reasons why she should be craved for...9 reasons why she should be craved for...
9 reasons why she should be craved for...
 
9. some famous artists
9. some famous artists9. some famous artists
9. some famous artists
 
9. Portafolio Richar Romero
9. Portafolio Richar Romero9. Portafolio Richar Romero
9. Portafolio Richar Romero
 
9.tammy attitude of 71 77
9.tammy attitude of 71 779.tammy attitude of 71 77
9.tammy attitude of 71 77
 
9 produtos que você deve ter em sua casa e que pode servir como remédio
9 produtos que você deve ter em sua casa e que pode servir como remédio9 produtos que você deve ter em sua casa e que pode servir como remédio
9 produtos que você deve ter em sua casa e que pode servir como remédio
 
9th Alan Webb memorial lecture: International Working - A few pictures, 210715
9th Alan Webb memorial lecture: International Working - A few pictures, 2107159th Alan Webb memorial lecture: International Working - A few pictures, 210715
9th Alan Webb memorial lecture: International Working - A few pictures, 210715
 
9 tanaman termahal
9 tanaman termahal9 tanaman termahal
9 tanaman termahal
 
9.yersinia elika...
9.yersinia elika...9.yersinia elika...
9.yersinia elika...
 
9roy 120119192039-phpapp02
9roy 120119192039-phpapp029roy 120119192039-phpapp02
9roy 120119192039-phpapp02
 
Dan Paget, RCS presentation - 9th Multi-stakeholder Forum for Responsible Min...
Dan Paget, RCS presentation - 9th Multi-stakeholder Forum for Responsible Min...Dan Paget, RCS presentation - 9th Multi-stakeholder Forum for Responsible Min...
Dan Paget, RCS presentation - 9th Multi-stakeholder Forum for Responsible Min...
 
9 What is Your Greatest Boast? Galatians 6:11-18
9 What is Your Greatest Boast? Galatians 6:11-189 What is Your Greatest Boast? Galatians 6:11-18
9 What is Your Greatest Boast? Galatians 6:11-18
 

Similar to 9.venkata naga vamsi. a

literature.pptx
literature.pptxliterature.pptx
literature.pptx8885684828
 
New Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionNew Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionIJERA Editor
 
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...ijistjournal
 
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...ijistjournal
 
Paper id 26201482
Paper id 26201482Paper id 26201482
Paper id 26201482IJRAT
 
Clock mesh sizing slides
Clock mesh sizing slidesClock mesh sizing slides
Clock mesh sizing slidesRajesh M
 
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijripublishers Ijri
 
IRJET- Artificial Neural Network Algorithm for Acoustic Echo Cancellation App...
IRJET- Artificial Neural Network Algorithm for Acoustic Echo Cancellation App...IRJET- Artificial Neural Network Algorithm for Acoustic Echo Cancellation App...
IRJET- Artificial Neural Network Algorithm for Acoustic Echo Cancellation App...IRJET Journal
 
Project 2: Baseband Data Communication
Project 2: Baseband Data CommunicationProject 2: Baseband Data Communication
Project 2: Baseband Data CommunicationDanish Bangash
 
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijripublishers Ijri
 
Paper id 21201483
Paper id 21201483Paper id 21201483
Paper id 21201483IJRAT
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...ijfcstjournal
 
"An adaptive modular approach to the mining of sensor network ...
"An adaptive modular approach to the mining of sensor network ..."An adaptive modular approach to the mining of sensor network ...
"An adaptive modular approach to the mining of sensor network ...butest
 
On the realization of non linear pseudo-noise generator for various signal pr...
On the realization of non linear pseudo-noise generator for various signal pr...On the realization of non linear pseudo-noise generator for various signal pr...
On the realization of non linear pseudo-noise generator for various signal pr...Alexander Decker
 
Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...IJECEIAES
 

Similar to 9.venkata naga vamsi. a (20)

literature.pptx
literature.pptxliterature.pptx
literature.pptx
 
06075626 (1)
06075626 (1)06075626 (1)
06075626 (1)
 
06075626
0607562606075626
06075626
 
New Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionNew Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral Recognition
 
Particle Swarm Optimization Algorithm Based Window Function Design
Particle Swarm Optimization Algorithm Based Window Function DesignParticle Swarm Optimization Algorithm Based Window Function Design
Particle Swarm Optimization Algorithm Based Window Function Design
 
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
 
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
 
Paper id 26201482
Paper id 26201482Paper id 26201482
Paper id 26201482
 
Clock mesh sizing slides
Clock mesh sizing slidesClock mesh sizing slides
Clock mesh sizing slides
 
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
 
IRJET- Artificial Neural Network Algorithm for Acoustic Echo Cancellation App...
IRJET- Artificial Neural Network Algorithm for Acoustic Echo Cancellation App...IRJET- Artificial Neural Network Algorithm for Acoustic Echo Cancellation App...
IRJET- Artificial Neural Network Algorithm for Acoustic Echo Cancellation App...
 
Project 2: Baseband Data Communication
Project 2: Baseband Data CommunicationProject 2: Baseband Data Communication
Project 2: Baseband Data Communication
 
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
Ijri ece-01-02 image enhancement aided denoising using dual tree complex wave...
 
Paper id 21201483
Paper id 21201483Paper id 21201483
Paper id 21201483
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
 
"An adaptive modular approach to the mining of sensor network ...
"An adaptive modular approach to the mining of sensor network ..."An adaptive modular approach to the mining of sensor network ...
"An adaptive modular approach to the mining of sensor network ...
 
On the realization of non linear pseudo-noise generator for various signal pr...
On the realization of non linear pseudo-noise generator for various signal pr...On the realization of non linear pseudo-noise generator for various signal pr...
On the realization of non linear pseudo-noise generator for various signal pr...
 
Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...
 
Pg3426762678
Pg3426762678Pg3426762678
Pg3426762678
 
R044120124
R044120124R044120124
R044120124
 

More from Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

More from Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

9.venkata naga vamsi. a

  • 1. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 7, 2011 The Tent Chaotic Mapping: Analysis for Generation of Binary Codes for Better Performance by Using MATLAB Annepu .Venkata NagaVamsi Dept of E.I.E, AITAM, Tekkali -532201, Andhra Pradesh, India. E-mail: vamsikrishna_avn@yahoo.co.in G.S.S.S.S.V.K.Mohan Dept of E.I.E, AITAM, Tekkali -532201, Andhra Pradesh, India. E-mail: g_k_mohan@yahoo.com M.S.Pradeep Kumar Patnaik Dept of E.I.E, AITAM, Tekkali -532201, Andhra Pradesh, India. E-mail: patnaik_mspk@yahoo.com Received: October 29, 2011 Accepted: October 30, 2011 Published: November 4, 2011 Abstract: In this paper, the Tent map is analyzed as a source of pseudorandom bits. To evaluate the performance of the proposed pseudorandom bit generator, different issues were considered, such as the period length, the discriminator value and the merit factor. The Tent mapping is a suitable alternative to other tradinational low-complexity pseudorandom bit generators. Keywords: Tent map, discrimination value, merit factor, chaotic signal. 1. Introduction The generation of random numbers is required in several applications, including measurement and testing of digital circuits and telecommunication systems (eg, to perform their functional verification and evaluate their immunity to noise), the aim is to achieve a satisfactory tradeoff among the best merit factor. In radar or sonar applications, linear chirps are the most typically used signals to achieve pulse compression. The pulse being of finite length, the amplitude is a rectangle function. If the transmitted signal has a duration T, begins at t = 0 and linearly sweeps the frequency band Δf centered on carrier f0, it can be written ( ) = {A if 0 t<T 0 otherwise ...........1.1 for best performance, the autocorrelation pattern of the optimum coded waveform must have a large peak value for zero shift and zero value for non-zero shifts. In this paper, good binary codes are generated using Tent –map equation to achieve a low PSL. It is possible to generate infinite number of codes at larger lengths easily, by changing the initial conditions by very small increment, threshold level and bifurcation factor. 2. How can chaotic waveform help? They are deterministic (defined by an iterative map or differential equations), and can therefore be practically implemented. 78 | P a g e www.iiste.org
  • 2. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 7, 2011 They are non – periodic, which suggests there are potential advantages in security and can be used as (infinitely) long spreading sequences. They are sensitive to initial conditions so that the behaviour of two systems with small difference in the initial system state (or) a parameter diverges exponentially in time while both systems remain bounded by the operation of the non-linearity a property useful in efficient high power transmission. Chaotic systems have a very sensitive dependence on their initial conditions. This sensitive dependence can be demonstrated by giving two very close initial points to the iterative map. After a few iterations, the two resulting sequences will look completely uncorrelated. Hence; an abundant source of almost uncorrelated signals has been discovered: a slight change in the initial condition will produce a completely different signal. 3. Tent mapping-Chaotic Equation Here in this paper we are dealing with the Tent mapping. A deal of chaotic behaviour can be described by one simple, fairly innocuous looking equation, the Tent map as shown in the Figure1.,and the bifurcation for the tent map in Figure 2. The chaotic mapping is as follows Xn+1 = f (xn) .........1.1 Tent mapping: Xn+1 = A - (B (xn)) A>1 .....1.2 The chaotic regime: Xn belongs to [A (1-B), A] 0<B<2 ……1.3 4. Proposed technique for code generation As the Tent chaotic mapping, we can generate different sequences and by selecting the best sequence among the sequences, the best sequence is taken and is been coded in binary for the best results. The threshold for the binary codes is done as below X (n) >0 xx (n) = 1 ..........1.4 X (n) <0 xx (n) = -1 ..........1.5 The applied function is auto –correlation pattern X (n) is an N length sequence the auto correlation function is defined as R (k) = ∑ x (n) x (n+k) limits from n= 0 to N-1-k ......1.6 From the autocorrelation pattern, the discriminator factor (D) can be formed as, R (0) D= ……. Where k≠0 ………..1.7 Max(R (k) 5. Side lobe Reduction Using Window function The main disadvantage of pulse compression is the appearance of side lobes in the autocorrelation function which will mask the weak reflections from other targets, this can be overcome by reducing the side lobes, there are various techniques for this purpose, and one such is the windowing techniques. The following window functions have been applied. 79 | P a g e www.iiste.org
  • 3. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 7, 2011 1. Hamming window- W (n) =0.54+0.46cos (2pi*n/N+1) , 0 ≤ n ≤ N 2. Hanning window- w (n)= 0.5+0.5*cos (pi*n/N+1), 0 ≤ n ≤ N 3. Triangular Window- W (n) = 1-n/2(N+1) 0 ≤ N ≤ N+1 5.1 Results for binary codes and its response to a matched filter is show in the Table 1. 6. Results and Conclusion Good binary codes were generated using Tent map. At different lengths, good sequences were obtained and it was found that the discrimination factor increases with the length of the sequence. At lower lengths the performance with the hanning and hamming windows function were found to be superior compared to triangular window. The best sequences were found from the triangular window function at higher lengths. Further improvement in the result can be obtained by reducing the incremental value in the algorithm and search for new good codes. 7. Graphical Results The graphical result shows the exactly the differences in the rectangular window, hanning window, hamming window and triangular window as in the Figure 3,Figure 4,Figure 5,Figure 6 and the tent map out put in the Figure 7 References “Ling cong, Sun Songgeng. A chaotic spreading sequence generator,” Chinese journal ACTA ELECTRNICASINICA.vol.20, no.2, pp. 235-239, 1998 Ghobad, H.B. Chaotic signals for digital communication.Ph.D Thesis for Purdue University, 1992 ”Radar signal processing” LEWIS, B.L, BAUEL, INC, 1996, PP325-329. ”Base band model for distance and bearing estimation”, A.bauel, proc.IEEE, ISCAS-3, MONTERY, California, pp. 275-278, 1998. Chaotic Phase Code for radar pulse compression Xinwu, Weixian Liu, Lei Zhao and Jeffrey S.Fu, IEEE Radar Conf.2001, pp 279-283. AJ Fenwick C Williams S A Harman “Chaotic signals in radar and sonar” Proc. Of the international conferences on Waveform Diversity and Design 2006 January 2006 Kuhai USA. Base band model for distance and bearing estimation”, A.bauel, proc.IEEE, ISCAS-3, MONTERY, California, pp. 275-278, 1998. Ternary Pulse Compression Sequence”, INST, MOHORIR, P.S.RAJA RAJESWARI and VENKATA RAO.K, PP.146-149, 1998. A Chaotic Sequence Spread-Spectrum” IEEE Transactions on Communications. vol. 25(2/3/9), pp. 1126- 1129, 1996.MAKOTO ITOH, Ternary Pulse Compression Sequence by logistic map” ”, IEEE, MOHORIR, PP.2512-2515, 1998 Direct Sequence –Radar Communication System” vol.19, pp 529- 531, 2008 International Journal on Chaotic Signals “, vol.12, no.23, pp.236-239, 1999 D. Middleton, An Introduction to Statistical Communication Theory. New York: McGraw-Hill, 1988. 80 | P a g e www.iiste.org
  • 4. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 7, 2011 ”Chaotic pulse code for radar pulse compression “IEEE Radar Conference, 2001, LEIZHAO and JEFFREY, PP 279-283. G. Heidari-Bateni and C. D. McGillem, “A chaotic direct-sequence spread-spectrum Communication system,” IEEE Trans Commun., vol.42, pp. 1524– 1527,Feb./Mar./Apr. 1994 Figure 1. Graph of Tent map function Figure 2. Bifurcation diagram for the tent map Figure 3. Discrimination curve for the hamming window 81 | P a g e www.iiste.org
  • 5. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 7, 2011 Figure 4. Discrimination curve for the Triangular window Figure 5. Discrimination curve for the rectangular window Figure 6. Discrimination curve for the hanning window 82 | P a g e www.iiste.org
  • 6. Innovative Systems Design and Engineering www.iiste.org ISSN 2222-1727 (Paper) ISSN 2222-2871 (Online) Vol 2, No 7, 2011 Figure 6. Output for Tent mapping Table 1 DISCRIMINATION FACTOR Length Drec Dhan Dham Dtri value value value value 20 7.665 9.761 10.822 8.309 50 8.142 9.034 12.385 8.996 100 12.353 13.236 15.221 9.473 500 15.822 15.145 16.375 13.694 1000 16.381 16.679 18.765 16.726 1500 17.643 18.667 19.504 18.848 2000 19.414 19.237 20.305 20.476 2500 21.321 22.560 21.824 21.960 3000 22.496 23.359 22.272 23.702 3500 22.602 23.691 23.383 24.432 83 | P a g e www.iiste.org