To increase the performance and reliability of
highly integrated circuits like DSP processors,
Microprocessors and SoCs, transistors sizes are continues to
scale towards Deep Submicron and Very Deep Submicron
dimensions . As more and more transistors are packed on the
chip to increase the functionality more metal layers are being
added to the integrated chips. Hence the performance of the
chips depends more on the performance of global interconnect
and on-chip busses than gate performance. The performance
of the global interconnects and on-chip data busses is limited
by switching activity, energy dissipation and noise such as
crosstalk, leakage, supply noise and process variations etc.
which are the side effects of the technology scaling. To increase
the performance of overall system it is necessary to control
and reduce these technology scaling effects on on-chip data
buses. One of the favorable techniques to increase the
efficiency of the data buses is to encode the data on the onchip
bus. Data encoding technique is the promising method to
increase the performance of the data bus and hence overall
system performance. Hence high performance data bus
encoding technique is propose which reduces switching
activity, transition energy dissipation, crosstalk and crosstalk
delay. The proposed method reduces the switching activity by
around 23%, energy dissipation by 46%, 6C, 5C and 4C type
crosstalk by around 89%, 73% and 31% respectively and
crosstalk delay by around 44% to 50% compare to unencoded
data.
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKijwmn
Relay technology promises appreciable network throughput and coverage enhancement which is required
for high speed wireless cellular systems to function to their optimum. This paper is focused on analysing
the link performance of a relay-based WiMAX network under varying conditions. Comparison is made
between relay and direct link communication in terms of BER (Bit Error Rate), spectral efficiency and
capacity. Effect of multipath fading and user speed on performance are investigated as well. The entire
study involves a hypothetical view as well as MATLAB simulations to predict the benefit of relay
deployment. This is aimed at solving pertinent issues such as coverage holes and cell edge problems which
are associated with traditional non-relay based cellular networks.
A novel optimal small cells deployment for next-generation cellular networks IJECEIAES
Small-cell-deployments have pulled cellular operators to boost coverage and capacity in high-demand areas (for example, downtown hot spots). The location of these small cells (SCs) should be determined in order to achieve successful deployments. In this paper, we propose a new approach that optimizes small cells deployment in cellular networks to achieve three objectives: reduce the total cost of network installation, balancing the allocation of resources, i.e. placement of each SC and their transmitted power, and providing optimal coverage area with a lower amount of interference between adjacent stations. An accurate formula was obtained to determine the optimum number of SC deployment (NSC). Finally, we derive a mathematical expression to calculate the critical-handoff-point (CHP) for neighboring wireless stations.
Block diagonalization precoding and power allocation for clustering small-cel...journalBEEI
The clustering network is a solution to improve data-rate transmission in small-cells. In this case, clustering small-cells (CSCs) adopt a multiple antennas concept. The multiple antennas are used to maximize the downlink data-rate transmission at the users, but it requires precoding techniques to minimize interference among CSC users. This paper proposes a block diagonalization (BD) as a precoding technique for minimizing interference among CSC users. The performance of the BD precoding implemented on the clustering network under various numbers of small-cells. The CSC also implements a water-filling power allocation (PA-CoopWF) to distribute the available transmission power along with the CSCs antennas. To show the performance, our paper simulates two types of precoding techniques; those are the proposed BD and minimum mean square error (MMSE) in CSCs. Based on the receiver user parts under the overlapping coordination of CSCs, our method based on the BD precoding achieves considerably higher data-rate transmission compared to the MMSE precoding, especially on larger clusters. The simulation also shows that by implementing CSC with the BD in short-range distances and higher numbers of antennas, it promotes better data-rate performances compared to the MMSE precoding by 2.75 times at distance 100m and 67% at 50 antennas.
Joint Interference Coordination and Spatial Resource ReuseIJMTST Journal
Multihop cellular networks (MCNs) have drawn tremendous attention due to its high throughput and extensive coverage. Deploying relay nodes is foreseen a cost-efficient solution to combat the severe propagation loss at cell edge. However, relay cell coverage is limited by the low transmit power, limited antenna capabilities and wireless backhaul link bottleneck which may lead to load imbalances and hence low resource utilization efficiency. Further challenges in relay deployments are attributed to increased interference levels in the network compared with macro cell-only deployments, causing degradation of the user throughput. In this context, relay cell coverage expansion and interference coordination techniques are expected to improve the performance of relay deployments. In this study, we analyze the impact of the additional interference due to the relay node transmissions. Jointly with our previous study on cell expansion, spatial resource reuse from the graph-theoretical perspective. Next, our focus shifts to developing a simple but efficient radio resource management algorithm which enables the spatial resource reuse, the pricing- based radio resource management (PRRM) strategy. The PRRM performs spatial reuse for interference-free users operating in the high signal-to-interference-and-noise ratio (SINR) region, while guaranteeing the signal quality of interference-susceptible users usually located near the coverage boundary. By applying the PRRM, we evaluate the potential benefits of the spatial resource reuse.
Enhanced fractional frequency reuse approach for interference mitigation in f...journalBEEI
Small cell networks are expected to heavily be deployed in wireless communication networks due to it ability to enhance signals quality and spectrum utilisation. However, interference is posing a major threat to wireless communication especially cellular femtocell networks whereby its performance is degraded in dense deployment areas. For this reason, an enhanced fractional frequency reuse approach is proposed in this paper to mitigate the interference in femtocell networks. This is achieved by dividing the service area and frequency into three regions and three sets whereby each set is allocated different frequency set. The femtocell location is later obtained and assigned frequency in accordance to the region. The proposed approach helps in reducing the interference, boost the signal to interference plus noise (SINR), and enhance the throughput.
A small vessel detection using a co-located multi-frequency FMCW MIMO radar IJECEIAES
Small vessels detection is a known issue due to its low radar cross section (RCS). An existing shore-based vessel tracking radar is for long-distance commercial vessels detection. Meanwhile, a vessel-mounted radar system known for its reliability has a limitation due to its single radar coverage. The paper presented a co-located frequency modulated continuous waveform (FMCW) maritime radar for small vessel detection utilising a multiple-input multiple-output (MIMO) configuration. The radar behaviour is numerically simulated for detecting a Swerling 1 target which resembles small maritime’s vessels. The simulated MIMO configuration comprised two transmitting and receiving nodes. The proposal is to utilize a multi-frequency FMCW MIMO configuration in a maritime environment by applying the spectrum averaging (SA) to fuse MIMO received signals for range and velocity estimation. The analysis was summarised and displayed in terms of estimation error performance, probability of error and average error. The simulation outcomes an improvement of 2.2 dB for a static target, and 0.1 dB for a moving target, in resulting the 20% probability of range error with the MIMO setup. A moving vessel's effect was observed to degrade the range error estimation performance between 0.6 to 2.7 dB. Meanwhile, the proposed method was proven to improve the 20% probability of velocity error by 1.75 dB. The impact of multi-frequency MIMO was also observed to produce better average error performance.
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...IJCNCJournal
The access part of all cellular network’s generation suffers from common concerns related to dead spots (zones that are not covered by the network) and hot spots (zones where the number of users is higher compared to network resources). During the last decade, lots of research proposals have tried to overcome cellular problems through multi-hop D2D architecture, which is a new paradigm allowing the direct communication between devices in cellular network to enhance network performances and improve user QoS. In this paper, we propose a multi-hop D2D architecture based on the OLSR protocol to extend cellular coverage. Cell-OLSR, which is the proposed adaptation of OLSR for our architecture, allows the exchange of cellular parameters between nodes to choose the best proxy device to forward data to the cellular base station (BS).
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKijwmn
Relay technology promises appreciable network throughput and coverage enhancement which is required
for high speed wireless cellular systems to function to their optimum. This paper is focused on analysing
the link performance of a relay-based WiMAX network under varying conditions. Comparison is made
between relay and direct link communication in terms of BER (Bit Error Rate), spectral efficiency and
capacity. Effect of multipath fading and user speed on performance are investigated as well. The entire
study involves a hypothetical view as well as MATLAB simulations to predict the benefit of relay
deployment. This is aimed at solving pertinent issues such as coverage holes and cell edge problems which
are associated with traditional non-relay based cellular networks.
A novel optimal small cells deployment for next-generation cellular networks IJECEIAES
Small-cell-deployments have pulled cellular operators to boost coverage and capacity in high-demand areas (for example, downtown hot spots). The location of these small cells (SCs) should be determined in order to achieve successful deployments. In this paper, we propose a new approach that optimizes small cells deployment in cellular networks to achieve three objectives: reduce the total cost of network installation, balancing the allocation of resources, i.e. placement of each SC and their transmitted power, and providing optimal coverage area with a lower amount of interference between adjacent stations. An accurate formula was obtained to determine the optimum number of SC deployment (NSC). Finally, we derive a mathematical expression to calculate the critical-handoff-point (CHP) for neighboring wireless stations.
Block diagonalization precoding and power allocation for clustering small-cel...journalBEEI
The clustering network is a solution to improve data-rate transmission in small-cells. In this case, clustering small-cells (CSCs) adopt a multiple antennas concept. The multiple antennas are used to maximize the downlink data-rate transmission at the users, but it requires precoding techniques to minimize interference among CSC users. This paper proposes a block diagonalization (BD) as a precoding technique for minimizing interference among CSC users. The performance of the BD precoding implemented on the clustering network under various numbers of small-cells. The CSC also implements a water-filling power allocation (PA-CoopWF) to distribute the available transmission power along with the CSCs antennas. To show the performance, our paper simulates two types of precoding techniques; those are the proposed BD and minimum mean square error (MMSE) in CSCs. Based on the receiver user parts under the overlapping coordination of CSCs, our method based on the BD precoding achieves considerably higher data-rate transmission compared to the MMSE precoding, especially on larger clusters. The simulation also shows that by implementing CSC with the BD in short-range distances and higher numbers of antennas, it promotes better data-rate performances compared to the MMSE precoding by 2.75 times at distance 100m and 67% at 50 antennas.
Joint Interference Coordination and Spatial Resource ReuseIJMTST Journal
Multihop cellular networks (MCNs) have drawn tremendous attention due to its high throughput and extensive coverage. Deploying relay nodes is foreseen a cost-efficient solution to combat the severe propagation loss at cell edge. However, relay cell coverage is limited by the low transmit power, limited antenna capabilities and wireless backhaul link bottleneck which may lead to load imbalances and hence low resource utilization efficiency. Further challenges in relay deployments are attributed to increased interference levels in the network compared with macro cell-only deployments, causing degradation of the user throughput. In this context, relay cell coverage expansion and interference coordination techniques are expected to improve the performance of relay deployments. In this study, we analyze the impact of the additional interference due to the relay node transmissions. Jointly with our previous study on cell expansion, spatial resource reuse from the graph-theoretical perspective. Next, our focus shifts to developing a simple but efficient radio resource management algorithm which enables the spatial resource reuse, the pricing- based radio resource management (PRRM) strategy. The PRRM performs spatial reuse for interference-free users operating in the high signal-to-interference-and-noise ratio (SINR) region, while guaranteeing the signal quality of interference-susceptible users usually located near the coverage boundary. By applying the PRRM, we evaluate the potential benefits of the spatial resource reuse.
Enhanced fractional frequency reuse approach for interference mitigation in f...journalBEEI
Small cell networks are expected to heavily be deployed in wireless communication networks due to it ability to enhance signals quality and spectrum utilisation. However, interference is posing a major threat to wireless communication especially cellular femtocell networks whereby its performance is degraded in dense deployment areas. For this reason, an enhanced fractional frequency reuse approach is proposed in this paper to mitigate the interference in femtocell networks. This is achieved by dividing the service area and frequency into three regions and three sets whereby each set is allocated different frequency set. The femtocell location is later obtained and assigned frequency in accordance to the region. The proposed approach helps in reducing the interference, boost the signal to interference plus noise (SINR), and enhance the throughput.
A small vessel detection using a co-located multi-frequency FMCW MIMO radar IJECEIAES
Small vessels detection is a known issue due to its low radar cross section (RCS). An existing shore-based vessel tracking radar is for long-distance commercial vessels detection. Meanwhile, a vessel-mounted radar system known for its reliability has a limitation due to its single radar coverage. The paper presented a co-located frequency modulated continuous waveform (FMCW) maritime radar for small vessel detection utilising a multiple-input multiple-output (MIMO) configuration. The radar behaviour is numerically simulated for detecting a Swerling 1 target which resembles small maritime’s vessels. The simulated MIMO configuration comprised two transmitting and receiving nodes. The proposal is to utilize a multi-frequency FMCW MIMO configuration in a maritime environment by applying the spectrum averaging (SA) to fuse MIMO received signals for range and velocity estimation. The analysis was summarised and displayed in terms of estimation error performance, probability of error and average error. The simulation outcomes an improvement of 2.2 dB for a static target, and 0.1 dB for a moving target, in resulting the 20% probability of range error with the MIMO setup. A moving vessel's effect was observed to degrade the range error estimation performance between 0.6 to 2.7 dB. Meanwhile, the proposed method was proven to improve the 20% probability of velocity error by 1.75 dB. The impact of multi-frequency MIMO was also observed to produce better average error performance.
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...IJCNCJournal
The access part of all cellular network’s generation suffers from common concerns related to dead spots (zones that are not covered by the network) and hot spots (zones where the number of users is higher compared to network resources). During the last decade, lots of research proposals have tried to overcome cellular problems through multi-hop D2D architecture, which is a new paradigm allowing the direct communication between devices in cellular network to enhance network performances and improve user QoS. In this paper, we propose a multi-hop D2D architecture based on the OLSR protocol to extend cellular coverage. Cell-OLSR, which is the proposed adaptation of OLSR for our architecture, allows the exchange of cellular parameters between nodes to choose the best proxy device to forward data to the cellular base station (BS).
RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...cscpconf
An efficient resource allocation is one of the greatest challenges in wireless cellular
communication. The resource allocation schemes avoid wastage of resources by allocating
resources to a mobile terminal over a short period of time, providing quality of service over
wireless networks is the most stressing point for service providers. In general a high degree of
sharing is efficient, but requires service protection mechanisms to guarantee the QoS for all
services. In this paper we address the multi cell interference on overall radio resource
utilization and propose a new strategy for resource allocation in multi cell systems. we also
propose a joint management of interference within and between cells for allocation of radio
resources , Simulation results are showing that there is a significant improvement in the resource utilization so that overall network performance.
Modelling and QoS-Achieving Solution in full-duplex Cellular SystemsIJCNCJournal
The global bandwidth scarcity and the ever-growing demand for fast wireless services have motivated the quest for new techniques that enhance the spectral efficiency (SE) of wireless systems. Most conventional SE increasing methods (e.g., adaptive modulation and coding) have already been exhausted. Single-channel full-duplex (SCFD) communication is a new attractive approach in which each node may simultaneously receive and transmit over the same frequency channel, and thus, it has the potential to double the current SE figures. In this paper, we derive a model for the signal-to-interference-plus-noise ratio (SINR) in a SCFD-based cellular system with imperfect self-interference cancellation. Furthermore, given a set of uplink and downlink quality of service requirements, we answer the following two fundamental questions. First, is this set achievable in the SCFD-based cellular system? Second, if the given set is achievable, what is the optimal achieving policy? To that end, we provide a unified model for the SCFD-based cellular system, and give insights in the matrix of interference channel gains. Simulation results suggest that depending on the locations of the users, a combination of full-duplex and half-duplex modes over the whole network is more favourable policy
Ijeee 24-27-energy efficient communication for adhoc networksKumar Goud
Energy Efficient Communication for Adhoc Networks
1SK.Nagula Meera 2Dr. D.Srinivasa Kumar 3Dr. D.Srinivasa Rao
Research Scholar Professor & Principal Professor, ECE department
ECE department, JNTU Hyderabad Hosur Institute of Technology and Science
Errandapalli Village, Beerpalli PO JNTU College of Engineering Hyderabad(Autonomous)
Ramapuram (via), Krishnagri Dt., Tamilnadu
Abstract: A mobile accidental network (MANET) may be an assortment of nodes equipped with wireless communications and a networking capability while not central network management. The method of wireless networks within the applications like transferring video files is subjected to twin constraints. Each step-down of power and different QOS needs like delay, throughputs square measure need to be bewaring properly. Mobile accidental Networks square measure a lot of perceptive to those problems wherever every mobile device is active sort of a router and consequently, routing delay adds significantly to overall end-to-end delay. This paper presents a survey on power economical routing protocols for Mobile Ad-Hoc Networks. This survey focused on recent progress on power saving algorithms. Additionally we recommend one power aware technique which can cut back power consumption yet as increase the lifespan of node and network.
Keywords: Mobile, Ad-Hoc networks, QOS, MANET, IBSS, ATIM, DPSM.
Interference aware resource allocation model for D2D under cellular network IJECEIAES
Device-to-Device communication (D2D) has emerged as an efficient communication model in future generation cellular network for offloading cellular traffic and enhance overall network performance. D2D communication aid in attaining better spectrum utilization, lower delay, and less energy consumption, which can well adapt to meet demand of higher transmission rate, larger network capacity. Further, enhances spectral efficiency by reutilizing resource. However, it may result in severe cross-tier interference and co-tier interference. Therefore, efficient interference modelling design are required to address performance degradation caused by the interferences. The existing model has focused on addressing interference considering D2D association operating on same cell with the cellular association. As a result, it incurs interference to the cellular user located in the same cell. However, practically D2D association in overlapping area will reutilize spectrum of multiple neighboring cells. As a result, it incurs interference in multiple cells. For overcoming research challenges, this work presented Interference Aware Resource Allocation (IARA) model for D2D under cellular network as a game theory model. This work consider a resource allocation game where base station as a contender for catering D2D resource needs under different assumptions. Experiment are conducted to evaluate performance of IARA. The outcome shows IARA attained significant performance improvement over state-of-art models in terms of sum rate (utility), successful packet transmission, revenue, and delay.
Joint Optimization of The two Tier Femto cells and Macro cell Users OFDMA Net...IJTET Journal
We proposed a novel joint sub channel and resource allocation for the two-tier OFDMA network. The multi-cell OFDMA network not only has to control the interference to the users, but also has to coordinate the cross-tier interference. A resource allocation scheme for cross-channel Femto and Macro is proposed, aiming to maximize the capacity. We formulate this joint optimization for both uplink and downlink in OFDMA network will be considered. To efficiently solve this problem using dual decomposition and low complexity methods. The resulting schemes efficiently allocate the resource and data sharing in a distributed way. The simulation results show that the less interference and provide significant throughput.
Advanced antenna techniques and high order sectorization with novel network t...ijwmn
Mobile operators commonly use macro cells with trad
itional wide beam antennas for wider coverage in th
e
cell, but future capacity demands cannot be achieve
d by using them only. It is required to achieve max
imum
practical capacity from macro cells by employing hi
gher order sectorization and by utilizing all possi
ble
antenna solutions including smart antennas. This pa
per presents enhanced tessellation for 6-sector sit
es
and proposes novel layout for 12-sector sites. The
main target of this paper is to compare the perform
ance
of conventional wide beam antenna, switched beam sm
art antenna, adaptive beam antenna and different
network layouts in terms of offering better receive
d signal quality and user throughput. Splitting mac
ro cell
into smaller micro or pico cells can improve the ca
pacity of network, but this paper highlights the
importance of higher order sectorization and advanc
e antenna techniques to attain high Signal to
Interference plus Noise Ratio (SINR), along with im
proved network capacity. Monte Carlo simulations a
t
system level were done for Dual Cell High Speed Dow
nlink Packet Access (DC-HSDPA) technology with
multiple (five) users per Transmission Time Interva
l (TTI) at different Intersite Distance (ISD). The
obtained results validate and estimate the gain of
using smart antennas and higher order sectorization
with
proposed network layout.
Modified Timed Efficient Stream Loss-tolerant Authentication to Secure Power ...IJECEIAES
This paper investigates the feasibility of Timed Efficient Stream Loss-tolerant Authentica- tion to serve security needs of Power Line Communication (PLC) system. PLC network has been identified as the ideal choice to function as the last mile network, deliver load management messages to smart meters. However, there is need to address the security concerns for load management messages delivered over power line communications. The ubiquitous nature of the power line communication infrastructure exposes load management systems (LMS) deployed over it to a security risk. Ordinarily, PLC network does not em- ploy any security measures on which the smart meters and data concentrators can depend on. Therefore, the need to provide a secure mechanism for communication of load man- agement system messages over a PLC network. In LMS, source authentication is of highest priority because we need to respond only to messages from an authenticated source. This is achieved by investigating suitable robust authentication protocols. In this paper we present modifications to Timed Efficient Stream Loss-tolerant Authentication for secure authentica- tion to secure messages for load management over PLC. We demonstrate that PLC can be used to securely and effectively deliver Load Management messages to smart meters, with minimal overhead.
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...IJCNCJournal
With the current development of mobile communication services, people need personal communication of
high speed, excellent service, high quality and low latency,however, limited spectrum resources become
the most important factor to hamper improvement of cellular systems. As big amount of data traffic will
cause greater local consumption of spectrum resources, future networks are required to have appropriate
techniques to better support such forms of communication. D2D (Device-to-device) communication
technology in a cellular network makes full use of spectrum resources underlaying, reduces the load of the
base station, minimizes transmit power of the terminals and the base stations, thereby enhances the overall
throughput of the networks. Due to the use of multiplexing D2D UE (User equipment) resources and
spectrum, and the interference caused by the sharing of resources between adjacent cells, it has become a
major factor affecting coexisting of cellular subscribers and D2D users. When D2D communication
multiplexes the uplink resources, the base-stations are easily to be disturbed; when the downlink resources
are multiplexed, the users of downlink are susceptible to interference. In order to build a high-efficient
mobile network, we can meet the QoS requirements by controlling the power to suppress the interference
between the base station and a terminal user.
Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...IJECEIAES
Device-to-Device (D2D) communication has been considered a key enabling technol- ogy that can facilitate spectrum sharing in 4G and 5G cellular networks. In order to meet the high data rate demands of these new generation cellular networks, this paper considers the optimization of available spectrum resource through dynamic spectrum access. The utilization of continuous-time Markov chain (CTMC) model for efficient spectrum access in D2D-enabled cellular networks is investigated for the purpose of determining the impact of this model on the capacity improvement of cellular networks. The paper considers the use of CTMC model with both queueing and non-queueing cases called 13-Q CTMC and 6-NQ CTMC respectively with the aim of improving the overall capacity of the cellular network under a fairness constraint among all users. The proposed strategy consequently ensures that spectrum access for cellular and D2D users is optimally coordinated by designing optimal spectrum access probabilities. Numerical simulations are performed to observe the impact of the proposed Markovian queueing model on spectrum access and consequently on the capacity of D2D-enabled cellular networks. Results showed that the proposed 13-Q CTMC provide a more spectrumefficient sharing scheme, thereby enabling better network performances and larger capabilities to accommodate more users.
Network efficiency enhancement by reactive channel state based allocation sch...IJECEIAES
Now a day the large MIMO has considered as the efficient approach to improve the spectral and energy efficiency at WMN. However, the PC is a big issue that caused by reusing similar pilot sequence at cells, which also restrict the performance of massive MIMO network. Here, we give the alternative answer, where each of UEs required allotting a channel sequences before passing the payload data, so as to avoid the channel collision of inter-cell. Our proposed protocol will ready to determine the channel collisions in distributed and scalable process, however giving unique properties of the large MIMO channels. Here we have proposed a RCSA (Reactive channel state based allocation) scheme, which will very productively work with the RAP blockers at large network of MIMO. The position of time-frequency of RAP blocks is modified in the middle of the adjacent cells, because of this design decision the RAP defend from the hardest types of interference at inter-cell. Further, to validate the performance of our proposed scheme it will be compared with other existing technique.
An efficient model for reducing soft blocking probability in wireless cellula...ijwmn
One of the research challenges in cellular networks is the design of an efficient model that can reduce call
blocking probability and improve the quality of service (QoS) provided to mobile users. Blocking occurs
when a new call cannot be admitted into the network due to channel unavailability caused by limited
capacity or when an ongoing call cannot be continued as it moves from one base station to another due to
mobility of the user. The proposed model computes the steady state probability and resource occupancy
distribution, traffic distribution, intra-cell and inter-cell interferences from mobile users. Previously
proposed models are reviewed through which the present model is built for use in emerging wireless
networks so as to obtain improved QoS performance. The developed model is validated through simulations
in MATLAB and its equations implemented using Java Programming Language. The results obtained
indicate reduced call blocking probability below threshold.
Efficient power allocation method for non orthogonal multiple access 5G systemsIJECEIAES
One of the hot research topics for the upcoming 5G (fifth-generation) wireless communication networks is the non orthogonal multiple access (NOMA) systems, where it have attracted both industrial and academic fields to improve the existing spectral efficiency. In fact, the multiuser detection process for NOMA systems is largely affected by the power distribution of the received signals. In this paper, a new method has been proposed to control the transmit power among active users in one of the promising NOMA systems; the interleave division multiple access (IDMA) which has been adopted here for consideration. Unlike conventional methods, where tedious mathematical computations are required; a simple and direct method has been derived. The proposed method has been applied to IDMA system with different FEC codes. The obtained results show that the proposed method outperforms the conventional one as compared to optimal results.
Switchable dual-band bandpass filter based on stepped impedance resonator wit...TELKOMNIKA JOURNAL
This paper presents a new technique in designing the switchable dual-band bandpass filter at
2.4 GHz and 3.5 GHz for WLAN and WiMAX applications. Wideband bandpass filter designed based on
stepped impedance resonator at frequency of 3 GHz. To eliminate the interference from existing system
that operates in the same frequency band, a defected microstrip structure applied and implemented to
produce the notch response. In order to generate the switchable characteristic, the PIN diode was
introduced at the dual-band filter. It exhibits that the measured results for switchable attributes when the
diode is at OFF state, the wide passband is produced with the fractional bandwidth of 62.1 % centered at
2.9 GHz. Meanwhile, for the diode in ON state, the dual-passband has produced which centered at
2.5 GHz and 3.45 GHz. The experimental results showed good agreement with the simulation results. This
structure is very useful for wireless communication systems and its applications.
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKSijwmn
Enhanced Diversity and Network Coding (eDC-NC), the synergistic combination of Diversity and modified Triangular Network Coding, was introduced recently to provide efficient and ultra-reliable networking with near-instantaneous fault recovery. In this paper it is shown that eDC-NC technology can efficiently and securely broadcast messages in 5G wireless fog-computing-based Radio Access Networks (F-RAN). In particular, this work is directed towards demonstrating the ability of eDC-NC technology to more efficiently provide secure messages broadcasting than standardized methods such as Secure Multicasting
using Secret (Shared) Key Cryptography, such that the adversary has no ability to acquire information even if they wiretap the entire F-RAN network (except of course the source and destination nodes). Our results show that using secure eDC-NC technology in F-RAN fronthaul network will enhance secure broadcasting and provide ultra-reliability networking, near-instantaneous fault recovery, and retain the throughput benefits of Network Coding.
A Bus Encoding Method for Crosstalk and Power Reduction in RC Coupled VLSI In...VLSICS Design
The performance factors such as propagation delay, power dissipation and crosstalk in RC modelled interconnects are major design issues for the System on-chip (SoC) designs in current Deep Submicron (DSM) era. The crosstalk effect is a consequence of coupling and switching activities that is encountered when there is a transition as compared to previous state of wire and or when there are transitions in adjacent wires. Therefore, minimization or elimination of switching and coupling activities is crucial in enhancing the performance of SoC designs. There are several methods for the reduction of power dissipation, crosstalk and delay. The encoding method is most effective and popular method for enhancing the behaviour of on-chip buses. This paper proposes encoding scheme to achieve overall reduction in transitions. The reduction in transition improves the performance in terms of reduced power dissipation, coupling activity and delay in on-chip buses. This encoding method is implemented using VHDL. The result evidently demonstrates reduction in transitions which consequently improves the overall performance of on-chip buses.
Modelling of Crosstalk and Delay for Distributed RLCG On-Chip Interconnects F...IDES Editor
In order to accurately model high frequency affects,
inductance has been taken into consideration. No longer can
interconnects be treated as mere delays or lumped RC networks.
In that frequency range, the most accurate simulation model for
on-chip VLSI interconnects is the distributed RLC model.
Unfortunately, this model has many limitations at much higher
of operating frequency used in today’s VLSI design. The reduction
in cross-sectional dimension leads to more tightly couple
interconnects and therefore, a higher probability of unwanted
crosstalk interference. This can lead to inaccurate simulations
if not modelled properly. At even higher frequency, the aggressor
net carries a signal that couples to the victim net through the
parasitic capacitances. To determine the effects that this crosstalk
will have on circuit operation, the resulting delays and logic
levels for the victim nets must be computed. This paper proposes
a difference model approach to derive crosstalk and delay in the
transform domain. A closed form solution for crosstalk and delay
is obtained by incorporating initial conditions using difference
model approach for distributed RLCG interconnects. The
simulation is performed in 0.18μm technology node and an error
of less than 1% has been achieved with the proposed model when
compared with SPICE.
A BUS ENCODING TO REDUCE CROSSTALK NOISE EFFECT IN SYSTEM ON CHIPVLSICS Design
This paper proposes a new bus coding scheme for reducing the crosstalk in System on chip(soc). As circuit geometries become smaller, wire interconnections become closer together and taller, thus increasing the cross-coupling capacitance between nets. At the same time, parasitic capacitance to the substrate becomes less as interconnections become narrower, and cell delays are reduced as transistors become smaller. With circuit geometries at 0.25 micron and above, substrate capacitance is usually the dominant effect. However, with geometries at 0.18 micron and below, the coupling capacitance between nets becomes significant, making crosstalk analysis increasingly important for accurate timing analysis. We show experimentally that the proposed codes allow reducing crosstalk delay by at least 14% based on available data.
Performance of symmetric and asymmetric links in wireless networks IJECEIAES
Wireless networks are designed to provide the enabling infrastructure for emerging technological advancements. The main characteristics of wireless networks are: Mobility, power constraints, high packet loss, and lower bandwidth. Nodes’ mobility is a crucial consideration for wireless networks, as nodes are moving all the time, and this may result in loss of connectivity in the network. The goal of this work is to explore the effect of replacing the generally held assumption of symmetric radii for wireless networks with asymmetric radii. This replacement may have a direct impact on the connectivity, throughput, and collision avoidance mechanism of mobile networks. The proposed replacement may also impact other mobile protocol’s functionality. In this work, we are mainly concerned with building and maintaining fully connected wireless network with the asymmetric assumption. For this extent, we propose to study the effect of the asymmetric links assumption on the network performance using extensive simulation experiments. Extensive simulation experiments were performed to measure the impact of these parameters. Finally, a resource allocation scheme for wireless networks is proposed for the dual rate scenario. The performance of the proposed framework is evaluated using simulation.
RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...cscpconf
An efficient resource allocation is one of the greatest challenges in wireless cellular
communication. The resource allocation schemes avoid wastage of resources by allocating
resources to a mobile terminal over a short period of time, providing quality of service over
wireless networks is the most stressing point for service providers. In general a high degree of
sharing is efficient, but requires service protection mechanisms to guarantee the QoS for all
services. In this paper we address the multi cell interference on overall radio resource
utilization and propose a new strategy for resource allocation in multi cell systems. we also
propose a joint management of interference within and between cells for allocation of radio
resources , Simulation results are showing that there is a significant improvement in the resource utilization so that overall network performance.
Modelling and QoS-Achieving Solution in full-duplex Cellular SystemsIJCNCJournal
The global bandwidth scarcity and the ever-growing demand for fast wireless services have motivated the quest for new techniques that enhance the spectral efficiency (SE) of wireless systems. Most conventional SE increasing methods (e.g., adaptive modulation and coding) have already been exhausted. Single-channel full-duplex (SCFD) communication is a new attractive approach in which each node may simultaneously receive and transmit over the same frequency channel, and thus, it has the potential to double the current SE figures. In this paper, we derive a model for the signal-to-interference-plus-noise ratio (SINR) in a SCFD-based cellular system with imperfect self-interference cancellation. Furthermore, given a set of uplink and downlink quality of service requirements, we answer the following two fundamental questions. First, is this set achievable in the SCFD-based cellular system? Second, if the given set is achievable, what is the optimal achieving policy? To that end, we provide a unified model for the SCFD-based cellular system, and give insights in the matrix of interference channel gains. Simulation results suggest that depending on the locations of the users, a combination of full-duplex and half-duplex modes over the whole network is more favourable policy
Ijeee 24-27-energy efficient communication for adhoc networksKumar Goud
Energy Efficient Communication for Adhoc Networks
1SK.Nagula Meera 2Dr. D.Srinivasa Kumar 3Dr. D.Srinivasa Rao
Research Scholar Professor & Principal Professor, ECE department
ECE department, JNTU Hyderabad Hosur Institute of Technology and Science
Errandapalli Village, Beerpalli PO JNTU College of Engineering Hyderabad(Autonomous)
Ramapuram (via), Krishnagri Dt., Tamilnadu
Abstract: A mobile accidental network (MANET) may be an assortment of nodes equipped with wireless communications and a networking capability while not central network management. The method of wireless networks within the applications like transferring video files is subjected to twin constraints. Each step-down of power and different QOS needs like delay, throughputs square measure need to be bewaring properly. Mobile accidental Networks square measure a lot of perceptive to those problems wherever every mobile device is active sort of a router and consequently, routing delay adds significantly to overall end-to-end delay. This paper presents a survey on power economical routing protocols for Mobile Ad-Hoc Networks. This survey focused on recent progress on power saving algorithms. Additionally we recommend one power aware technique which can cut back power consumption yet as increase the lifespan of node and network.
Keywords: Mobile, Ad-Hoc networks, QOS, MANET, IBSS, ATIM, DPSM.
Interference aware resource allocation model for D2D under cellular network IJECEIAES
Device-to-Device communication (D2D) has emerged as an efficient communication model in future generation cellular network for offloading cellular traffic and enhance overall network performance. D2D communication aid in attaining better spectrum utilization, lower delay, and less energy consumption, which can well adapt to meet demand of higher transmission rate, larger network capacity. Further, enhances spectral efficiency by reutilizing resource. However, it may result in severe cross-tier interference and co-tier interference. Therefore, efficient interference modelling design are required to address performance degradation caused by the interferences. The existing model has focused on addressing interference considering D2D association operating on same cell with the cellular association. As a result, it incurs interference to the cellular user located in the same cell. However, practically D2D association in overlapping area will reutilize spectrum of multiple neighboring cells. As a result, it incurs interference in multiple cells. For overcoming research challenges, this work presented Interference Aware Resource Allocation (IARA) model for D2D under cellular network as a game theory model. This work consider a resource allocation game where base station as a contender for catering D2D resource needs under different assumptions. Experiment are conducted to evaluate performance of IARA. The outcome shows IARA attained significant performance improvement over state-of-art models in terms of sum rate (utility), successful packet transmission, revenue, and delay.
Joint Optimization of The two Tier Femto cells and Macro cell Users OFDMA Net...IJTET Journal
We proposed a novel joint sub channel and resource allocation for the two-tier OFDMA network. The multi-cell OFDMA network not only has to control the interference to the users, but also has to coordinate the cross-tier interference. A resource allocation scheme for cross-channel Femto and Macro is proposed, aiming to maximize the capacity. We formulate this joint optimization for both uplink and downlink in OFDMA network will be considered. To efficiently solve this problem using dual decomposition and low complexity methods. The resulting schemes efficiently allocate the resource and data sharing in a distributed way. The simulation results show that the less interference and provide significant throughput.
Advanced antenna techniques and high order sectorization with novel network t...ijwmn
Mobile operators commonly use macro cells with trad
itional wide beam antennas for wider coverage in th
e
cell, but future capacity demands cannot be achieve
d by using them only. It is required to achieve max
imum
practical capacity from macro cells by employing hi
gher order sectorization and by utilizing all possi
ble
antenna solutions including smart antennas. This pa
per presents enhanced tessellation for 6-sector sit
es
and proposes novel layout for 12-sector sites. The
main target of this paper is to compare the perform
ance
of conventional wide beam antenna, switched beam sm
art antenna, adaptive beam antenna and different
network layouts in terms of offering better receive
d signal quality and user throughput. Splitting mac
ro cell
into smaller micro or pico cells can improve the ca
pacity of network, but this paper highlights the
importance of higher order sectorization and advanc
e antenna techniques to attain high Signal to
Interference plus Noise Ratio (SINR), along with im
proved network capacity. Monte Carlo simulations a
t
system level were done for Dual Cell High Speed Dow
nlink Packet Access (DC-HSDPA) technology with
multiple (five) users per Transmission Time Interva
l (TTI) at different Intersite Distance (ISD). The
obtained results validate and estimate the gain of
using smart antennas and higher order sectorization
with
proposed network layout.
Modified Timed Efficient Stream Loss-tolerant Authentication to Secure Power ...IJECEIAES
This paper investigates the feasibility of Timed Efficient Stream Loss-tolerant Authentica- tion to serve security needs of Power Line Communication (PLC) system. PLC network has been identified as the ideal choice to function as the last mile network, deliver load management messages to smart meters. However, there is need to address the security concerns for load management messages delivered over power line communications. The ubiquitous nature of the power line communication infrastructure exposes load management systems (LMS) deployed over it to a security risk. Ordinarily, PLC network does not em- ploy any security measures on which the smart meters and data concentrators can depend on. Therefore, the need to provide a secure mechanism for communication of load man- agement system messages over a PLC network. In LMS, source authentication is of highest priority because we need to respond only to messages from an authenticated source. This is achieved by investigating suitable robust authentication protocols. In this paper we present modifications to Timed Efficient Stream Loss-tolerant Authentication for secure authentica- tion to secure messages for load management over PLC. We demonstrate that PLC can be used to securely and effectively deliver Load Management messages to smart meters, with minimal overhead.
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...IJCNCJournal
With the current development of mobile communication services, people need personal communication of
high speed, excellent service, high quality and low latency,however, limited spectrum resources become
the most important factor to hamper improvement of cellular systems. As big amount of data traffic will
cause greater local consumption of spectrum resources, future networks are required to have appropriate
techniques to better support such forms of communication. D2D (Device-to-device) communication
technology in a cellular network makes full use of spectrum resources underlaying, reduces the load of the
base station, minimizes transmit power of the terminals and the base stations, thereby enhances the overall
throughput of the networks. Due to the use of multiplexing D2D UE (User equipment) resources and
spectrum, and the interference caused by the sharing of resources between adjacent cells, it has become a
major factor affecting coexisting of cellular subscribers and D2D users. When D2D communication
multiplexes the uplink resources, the base-stations are easily to be disturbed; when the downlink resources
are multiplexed, the users of downlink are susceptible to interference. In order to build a high-efficient
mobile network, we can meet the QoS requirements by controlling the power to suppress the interference
between the base station and a terminal user.
Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...IJECEIAES
Device-to-Device (D2D) communication has been considered a key enabling technol- ogy that can facilitate spectrum sharing in 4G and 5G cellular networks. In order to meet the high data rate demands of these new generation cellular networks, this paper considers the optimization of available spectrum resource through dynamic spectrum access. The utilization of continuous-time Markov chain (CTMC) model for efficient spectrum access in D2D-enabled cellular networks is investigated for the purpose of determining the impact of this model on the capacity improvement of cellular networks. The paper considers the use of CTMC model with both queueing and non-queueing cases called 13-Q CTMC and 6-NQ CTMC respectively with the aim of improving the overall capacity of the cellular network under a fairness constraint among all users. The proposed strategy consequently ensures that spectrum access for cellular and D2D users is optimally coordinated by designing optimal spectrum access probabilities. Numerical simulations are performed to observe the impact of the proposed Markovian queueing model on spectrum access and consequently on the capacity of D2D-enabled cellular networks. Results showed that the proposed 13-Q CTMC provide a more spectrumefficient sharing scheme, thereby enabling better network performances and larger capabilities to accommodate more users.
Network efficiency enhancement by reactive channel state based allocation sch...IJECEIAES
Now a day the large MIMO has considered as the efficient approach to improve the spectral and energy efficiency at WMN. However, the PC is a big issue that caused by reusing similar pilot sequence at cells, which also restrict the performance of massive MIMO network. Here, we give the alternative answer, where each of UEs required allotting a channel sequences before passing the payload data, so as to avoid the channel collision of inter-cell. Our proposed protocol will ready to determine the channel collisions in distributed and scalable process, however giving unique properties of the large MIMO channels. Here we have proposed a RCSA (Reactive channel state based allocation) scheme, which will very productively work with the RAP blockers at large network of MIMO. The position of time-frequency of RAP blocks is modified in the middle of the adjacent cells, because of this design decision the RAP defend from the hardest types of interference at inter-cell. Further, to validate the performance of our proposed scheme it will be compared with other existing technique.
An efficient model for reducing soft blocking probability in wireless cellula...ijwmn
One of the research challenges in cellular networks is the design of an efficient model that can reduce call
blocking probability and improve the quality of service (QoS) provided to mobile users. Blocking occurs
when a new call cannot be admitted into the network due to channel unavailability caused by limited
capacity or when an ongoing call cannot be continued as it moves from one base station to another due to
mobility of the user. The proposed model computes the steady state probability and resource occupancy
distribution, traffic distribution, intra-cell and inter-cell interferences from mobile users. Previously
proposed models are reviewed through which the present model is built for use in emerging wireless
networks so as to obtain improved QoS performance. The developed model is validated through simulations
in MATLAB and its equations implemented using Java Programming Language. The results obtained
indicate reduced call blocking probability below threshold.
Efficient power allocation method for non orthogonal multiple access 5G systemsIJECEIAES
One of the hot research topics for the upcoming 5G (fifth-generation) wireless communication networks is the non orthogonal multiple access (NOMA) systems, where it have attracted both industrial and academic fields to improve the existing spectral efficiency. In fact, the multiuser detection process for NOMA systems is largely affected by the power distribution of the received signals. In this paper, a new method has been proposed to control the transmit power among active users in one of the promising NOMA systems; the interleave division multiple access (IDMA) which has been adopted here for consideration. Unlike conventional methods, where tedious mathematical computations are required; a simple and direct method has been derived. The proposed method has been applied to IDMA system with different FEC codes. The obtained results show that the proposed method outperforms the conventional one as compared to optimal results.
Switchable dual-band bandpass filter based on stepped impedance resonator wit...TELKOMNIKA JOURNAL
This paper presents a new technique in designing the switchable dual-band bandpass filter at
2.4 GHz and 3.5 GHz for WLAN and WiMAX applications. Wideband bandpass filter designed based on
stepped impedance resonator at frequency of 3 GHz. To eliminate the interference from existing system
that operates in the same frequency band, a defected microstrip structure applied and implemented to
produce the notch response. In order to generate the switchable characteristic, the PIN diode was
introduced at the dual-band filter. It exhibits that the measured results for switchable attributes when the
diode is at OFF state, the wide passband is produced with the fractional bandwidth of 62.1 % centered at
2.9 GHz. Meanwhile, for the diode in ON state, the dual-passband has produced which centered at
2.5 GHz and 3.45 GHz. The experimental results showed good agreement with the simulation results. This
structure is very useful for wireless communication systems and its applications.
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKSijwmn
Enhanced Diversity and Network Coding (eDC-NC), the synergistic combination of Diversity and modified Triangular Network Coding, was introduced recently to provide efficient and ultra-reliable networking with near-instantaneous fault recovery. In this paper it is shown that eDC-NC technology can efficiently and securely broadcast messages in 5G wireless fog-computing-based Radio Access Networks (F-RAN). In particular, this work is directed towards demonstrating the ability of eDC-NC technology to more efficiently provide secure messages broadcasting than standardized methods such as Secure Multicasting
using Secret (Shared) Key Cryptography, such that the adversary has no ability to acquire information even if they wiretap the entire F-RAN network (except of course the source and destination nodes). Our results show that using secure eDC-NC technology in F-RAN fronthaul network will enhance secure broadcasting and provide ultra-reliability networking, near-instantaneous fault recovery, and retain the throughput benefits of Network Coding.
A Bus Encoding Method for Crosstalk and Power Reduction in RC Coupled VLSI In...VLSICS Design
The performance factors such as propagation delay, power dissipation and crosstalk in RC modelled interconnects are major design issues for the System on-chip (SoC) designs in current Deep Submicron (DSM) era. The crosstalk effect is a consequence of coupling and switching activities that is encountered when there is a transition as compared to previous state of wire and or when there are transitions in adjacent wires. Therefore, minimization or elimination of switching and coupling activities is crucial in enhancing the performance of SoC designs. There are several methods for the reduction of power dissipation, crosstalk and delay. The encoding method is most effective and popular method for enhancing the behaviour of on-chip buses. This paper proposes encoding scheme to achieve overall reduction in transitions. The reduction in transition improves the performance in terms of reduced power dissipation, coupling activity and delay in on-chip buses. This encoding method is implemented using VHDL. The result evidently demonstrates reduction in transitions which consequently improves the overall performance of on-chip buses.
Modelling of Crosstalk and Delay for Distributed RLCG On-Chip Interconnects F...IDES Editor
In order to accurately model high frequency affects,
inductance has been taken into consideration. No longer can
interconnects be treated as mere delays or lumped RC networks.
In that frequency range, the most accurate simulation model for
on-chip VLSI interconnects is the distributed RLC model.
Unfortunately, this model has many limitations at much higher
of operating frequency used in today’s VLSI design. The reduction
in cross-sectional dimension leads to more tightly couple
interconnects and therefore, a higher probability of unwanted
crosstalk interference. This can lead to inaccurate simulations
if not modelled properly. At even higher frequency, the aggressor
net carries a signal that couples to the victim net through the
parasitic capacitances. To determine the effects that this crosstalk
will have on circuit operation, the resulting delays and logic
levels for the victim nets must be computed. This paper proposes
a difference model approach to derive crosstalk and delay in the
transform domain. A closed form solution for crosstalk and delay
is obtained by incorporating initial conditions using difference
model approach for distributed RLCG interconnects. The
simulation is performed in 0.18μm technology node and an error
of less than 1% has been achieved with the proposed model when
compared with SPICE.
A BUS ENCODING TO REDUCE CROSSTALK NOISE EFFECT IN SYSTEM ON CHIPVLSICS Design
This paper proposes a new bus coding scheme for reducing the crosstalk in System on chip(soc). As circuit geometries become smaller, wire interconnections become closer together and taller, thus increasing the cross-coupling capacitance between nets. At the same time, parasitic capacitance to the substrate becomes less as interconnections become narrower, and cell delays are reduced as transistors become smaller. With circuit geometries at 0.25 micron and above, substrate capacitance is usually the dominant effect. However, with geometries at 0.18 micron and below, the coupling capacitance between nets becomes significant, making crosstalk analysis increasingly important for accurate timing analysis. We show experimentally that the proposed codes allow reducing crosstalk delay by at least 14% based on available data.
Performance of symmetric and asymmetric links in wireless networks IJECEIAES
Wireless networks are designed to provide the enabling infrastructure for emerging technological advancements. The main characteristics of wireless networks are: Mobility, power constraints, high packet loss, and lower bandwidth. Nodes’ mobility is a crucial consideration for wireless networks, as nodes are moving all the time, and this may result in loss of connectivity in the network. The goal of this work is to explore the effect of replacing the generally held assumption of symmetric radii for wireless networks with asymmetric radii. This replacement may have a direct impact on the connectivity, throughput, and collision avoidance mechanism of mobile networks. The proposed replacement may also impact other mobile protocol’s functionality. In this work, we are mainly concerned with building and maintaining fully connected wireless network with the asymmetric assumption. For this extent, we propose to study the effect of the asymmetric links assumption on the network performance using extensive simulation experiments. Extensive simulation experiments were performed to measure the impact of these parameters. Finally, a resource allocation scheme for wireless networks is proposed for the dual rate scenario. The performance of the proposed framework is evaluated using simulation.
EFFECT OF EQUAL AND MISMATCHED SIGNAL TRANSITION TIME ON POWER DISSIPATION IN...VLSICS Design
High density chips have introduced problems like crosstalk noise and power dissipation. The mismatching in transition time of the inputs occurs because different lengths of interconnects lead to different parasitic values. This paper presents the analysis of the effect of equal and unequal (mismatched) transition time of inputs on power dissipation in coupled interconnects. Further, the effect of signal skew on transition time is analysed. To demonstrate the effects, a model of two distributed RLC lines coupled capacitively and inductively is taken into consideration. Each interconnect line is 4mm long and terminated by capacitive load of 30fF. The analysis is carried out for simultaneously switching lines. The results are obtained through SPICE simulations and waveforms are generated.
CROSSTALK MINIMIZATION FOR COUPLED RLC INTERCONNECTS USING BIDIRECTIONAL BUFF...VLSICS Design
Crosstalk noise is often induced in long interconnects running parallel to each other. There is a need to
minimize the effect of these crosstalk noise so as to maintain the signal integrity in interconnects. In this
paper crosstalk noise is minimized using various techniques such as repeater (bidirectional buffer)
insertion along with shielding, skewing and shielding & skewing simultaneously. With the help of these
techniques crosstalk noise is controlled to a great extent in long interconnects. Pre-layout and Post-layout
simulations for crosstalk are carried out for these techniques at 180nm technology node using Cadence
EDA tools. The influences of these techniques are analyzed and it is found that crosstalk is reduced up to
32 % with repeater insertion, 47% with skewing, 58% with shielding and 81% with skewing & shielding
simultaneously
BROADBAND POWER LINE COMMUNICATION: THE CHANNEL AND NOISE ANALYSIS FOR A POWE...IJCNCJournal
The scope for broadband powerline Communication is considered as a retrofit technology for wide geographical coverage wherever the human habitation exists. So during the last decade, it has drawn an enormous quantity of research work for improving communication performance and this system being standardized all over the world. The broadband power line Communication channel modelling is essential in the design of a reliable communications system. An analysis on the proposed channel model is conducted in this paper; also the paper studied the noises in Broadband powerline Communication network and its mathematical model. The channel Transfer function and Error Performance of Proposed powerline
communication System noise is evaluated with various digital modulation techniques Bit error rate (BER) and signal to noise ratio (SNR) curve by using simulation software. The results indicated that the noise analysis is effective for modelling the power line communication channel. Also, we have presented the various studies on the channel performance based on Orthogonal frequency-division Multiplexing (OFDM) systems for an efficient design of a Broadband Powerline Communication (BPLC) system.
The study evaluated interference in a dense heterogeneous network using third-generation universal mobile telecommunication systems (UMTS) and fourth-generation long term evolution (LTE) networks LTE. The UMTs/LTE heterogeneous network determines the level of interference when the two communication systems coexist and how to improve the network by migrating from UMTs to LTE, which has a faster download speed and larger capacity. Techno lite 8 on third generation (3G) and Infinix Pro 6 on fourth generation (4G) were used to measure network the received signal strength (RSS) during site investigation. UE interference was detected and traced using a spectrum analyzer. UMTS and LTE path loss exponents are 2.6 and 3.2. Shannon's capacity theorem calculated LTE and UMTS capacity. When signal to interference and noise ratio (SINR) was used as a quality of service (QoS) indicator, MATLAB channel capacity plots did not match Shannon's due to neighboring interference. UMTS had an R2 of 0.54 and LTE 0.57 for the Shannon channel capacity equation. Adjacent channel interference (ACI) user devices reduce network capacity, lowering QoS for other customers.
PERFORMANCE ANALYSIS OF MITA INTERLEAVER ON HYBRID SYSTEMS USING DIVERSITYIJCNCJournal
The demands of 5
thgeneration communication devices such as greater throughput, coverage and reliability
cannot be easily met by any one physical media. Recently, wireless and powerline channels were combined
and diversity techniques were employed to improve reliability using only the OFDM technique. In this
paper, the hybrid system with diversity techniques is implemented and evaluated using Interleave Division
Multiple Access (IDMA) scheme. As the strength of the IDMA scheme heavily relies on the adapted
interleaving algorithm, in the paper interleaving algorithms such as Random, Tree and recently proposed
Multiplicative Interleaving with Tree Algorithm (MITA) interleavers are compared on the grounds of
computation complexity, memory occupied and bit error rate (BER). For analysis of BER, over MATLAB
environment, the hybrid system assumes Rayleigh fading channel and Additive White Gaussian Noise
(AWGN) on wireless medium and Symmetric alpha stable (SαS) noise on powerline channel. The outcome
of comparison parameters verifies the superior performance of MITA interleaver in a hybrid system over
the IDMA scheme.
Performance Analysis of MITA Interleaver on Hybrid Systems using DiversityIJCNCJournal
The demands of 5 thgeneration communication devices such as greater throughput, coverage and reliability cannot be easily met by any one physical media. Recently, wireless and powerline channels were combined and diversity techniques were employed to improve reliability using only the OFDM technique. In this paper, the hybrid system with diversity techniques is implemented and evaluated using Interleave Division Multiple Access (IDMA) scheme. As the strength of the IDMA scheme heavily relies on the adapted interleaving algorithm, in the paper interleaving algorithms such as Random, Tree and recently proposed Multiplicative Interleaving with Tree Algorithm (MITA) interleavers are compared on the grounds of computation complexity, memory occupied and bit error rate (BER). For analysis of BER, over MATLAB environment, the hybrid system assumes Rayleigh fading channel and Additive White Gaussian Noise (AWGN) on wireless medium and Symmetric alpha stable (SαS) noise on powerline channel. The outcome of comparison parameters verifies the superior performance of MITA interleaver in a hybrid system over the IDMA scheme.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Multistage interconnection networks a transition to opticaleSAT Journals
Abstract Several types of interconnection networks have been proposed for parallel processing. One of them is MIN’s (Multistage interconnection networks). With the better way of communication between processor and memory, MIN’s are less complex, good fault tolerance, high reliability, fast in communication and low cost. To achieving reliable, fast and flexible communication optical communication are necessary. Through optical networks we can achieve high performance and low latency also. With their great advantages over electronic networks, OMIN’s also having their own demands and problems. This paper focuses on the qualities of Optical MINs. Here we compare Optical MINs with electronic MIN’s with their design issues and gives some solution approaches for optical MINs to solve crosstalk.
Index Terms— Multistage Interconnection Networks (MIN), Optical networks, Crosstalk, Window methods.
The unprecedented growth of the Information technology firm is demanding Very Large Scale (VLSI) circuit with increasing functionality and performance at the min. cost and power dissipation. VLSI circuits are aggressively scaled to meet this demand, which in turn has some serious problem for the semiconductorfirm. Additionally heterogeneous integration of different technologies increasingly desirable, for which planer (2-D) IC`s may not be suitable. 3-D ICs are an attractive chip architecture that can alleviate the interconnect related problems such as delay and power dissipation and can also facilitate integration of heterogeneous technologies in one chip (SoC).
LINK-LEVEL PERFORMANCE EVALUATION OF RELAY-BASED WIMAX NETWORKijwmn
Relay technology promises appreciable network throughput and coverage enhancement which is required
for high speed wireless cellular systems to function to their optimum. This paper is focused on analysing
the link performance of a relay-based WiMAX network under varying conditions. Comparison is made
between relay and direct link communication in terms of BER (Bit Error Rate), spectral efficiency and
capacity. Effect of multipath fading and user speed on performance are investigated as well. The entire
study involves a hypothetical view as well as MATLAB simulations to predict the benefit of relay
deployment. This is aimed at solving pertinent issues such as coverage holes and cell edge problems which
are associated with traditional non-relay based cellular networks
A survey on cost effective survivable network design in wireless access networkijcses
In today’s technology, the essential property for wireless communication network is to exhibit as a
dependable network. The dependability network incorporates the property like availability, reliability and
survivability. Although these factors are well taken care by protocol for wired network, still there exists
huge lack of efficacy for wireless network. Further, the wireless access network is more complicated with
difficulties like frequencies allocation, quality of services, user requests. Adding to it, the wireless access
network is severely vulnerable to link and node failures. Therefore, the survivability in wireless access
network is very important factor to be considered will performing wireless network designing. This paper
focuses on discussion of survivability in wireless access network. Capability of a wireless access network to
perform its dedicated accessibility services even in case of infrastructure failure is known as survivability.
Given available capacity, connectivity and reliability the survivable problem in hierarchical network is to
minimize the overall connection cost for multiple requests. The various failure scenario of wireless access
network as existing in literature is been explored. The existing survivability models for access network like
shared link, multi homing, overlay network, sonnet ring, and multimodal devices are discussed in detail
here. Further comparison between various existing survivability solutions is also tabulated.
A Survey on Cost Effective Survivable Network Design in Wireless Access Network IJCSES Journal
In today’s technology, the essential property for wireless communication network is to exhibit as a dependable network. The dependability network incorporates the property like availability, reliability and survivability. Although these factors are well taken care by protocol for wired network, still there exists huge lack of efficacy for wireless network. Further, the wireless access network is more complicated with difficulties like frequencies allocation, quality of services, user requests. Adding to it, the wireless access network is severely vulnerable to link and node failures. Therefore, the survivability in wireless access
network is very important factor to be considered will performing wireless network designing. This paper focuses on discussion of survivability in wireless access network. Capability of a wireless access network to perform its dedicated accessibility services even in case of infrastructure failure is known as survivability. Given available capacity, connectivity and reliability the survivable problem in hierarchical network is to minimize the overall connection cost for multiple requests. The various failure scenario of wireless access network as existing in literature is been explored. The existing survivability models for access network like shared link, multi homing, overlay network, sonnet ring, and multimodal devices are discussed in detail
here. Further comparison between various existing survivability solutions is also tabulated.
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIPEditor IJMTER
System-on-chip (soc) based system has so many disadvantages in power-dissipation as
well as clock rate while the data transfer from one system to another system in on-chip. At the same
time, a higher operated system does not support the lower operated bus network for data transfer.
However an alternative scheme is proposed for high speed data transfer. But this scheme is limited to
SOCs. Unlike soc, network-on-chip (NOC) has so many advantages for data transfer. It has a special
feature to transfer the data in on-chip named as transitional encoder. Its operation is based on input
transitions. At the same time it supports systems which are higher operated frequencies. In this
project, a low-power encoding scheme is proposed. The proposed system yields lower dynamic
power dissipation due to the reduction of switching activity and coupling switching activity when
compared to existing system. Even-though many factors which is based on power dissipation, the
dynamic power dissipation is only considerable for reasonable advantage. The proposed system is
synthesized using quartus II 9.1 software. Besides, the proposed system will be extended up to
interlink PE communication with help of routers and PE’s which are performed by various
operations. To implement this system in real NOC’s contains the proposed encoders and decoders for
data transfer with regular traffic scenarios should be considered.
Similar to High Performance Data Bus Encoding Technique in DSM Technology (20)
Power System State Estimation - A ReviewIDES Editor
The aim of this article is to provide a comprehensive
survey on power system state estimation techniques. The
algorithms used for finding the system states under both static
and dynamic state estimations are discussed in brief. The
authors are opinion that the scope of pursuing research in the
area of state estimation with PMU and SCADA measurements
is the state of the art and timely.
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
Reactive Power Planning is a major concern in the
operation and control of power systems This paper compares
the effectiveness of Evolutionary Programming (EP) and
New Improved Differential Evolution (NIMDE) to solve
Reactive Power Planning (RPP) problem incorporating
FACTS Controllers like Static VAR Compensator (SVC),
Thyristor Controlled Series Capacitor (TCSC) and Unified
power flow controller (UPFC) considering voltage stability.
With help of Fast Voltage Stability Index (FVSI), the critical
lines and buses are identified to install the FACTS controllers.
The optimal settings of the control variables of the generator
voltages,transformer tap settings and allocation and parameter
settings of the SVC,TCSC,UPFC are considered for reactive
power planning. The test and Validation of the proposed
algorithm are conducted on IEEE 30–bus system and 72-bus
Indian system.Simulation results shows that the UPFC gives
better results than SVC and TCSC and the FACTS controllers
reduce the system losses.
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
Damping of power system oscillations with the help
of proposed optimal Proportional Integral Derivative Power
System Stabilizer (PID-PSS) and Static Var Compensator
(SVC)-based controllers are thoroughly investigated in this
paper. This study presents robust tuning of PID-PSS and
SVC-based controllers using Genetic Algorithms (GA) in
multi machine power systems by considering detailed model
of the generators (model 1.1). The effectiveness of FACTSbased
controllers in general and SVC-based controller in
particular depends upon their proper location. Modal
controllability and observability are used to locate SVC–based
controller. The performance of the proposed controllers is
compared with conventional lead-lag power system stabilizer
(CPSS) and demonstrated on 10 machines, 39 bus New England
test system. Simulation studies show that the proposed genetic
based PID-PSS with SVC based controller provides better
performance.
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
This paper presents the need to operate the power
system economically and with optimum levels of voltages has
further led to an increase in interest in Distributed
Generation. In order to reduce the power losses and to improve
the voltage in the distribution system, distributed generators
(DGs) are connected to load bus. To reduce the total power
losses in the system, the most important process is to identify
the proper location for fixing and sizing of DGs. It presents a
new methodology using a new population based meta heuristic
approach namely Artificial Bee Colony algorithm(ABC) for
the placement of Distributed Generators(DG) in the radial
distribution systems to reduce the real power losses and to
improve the voltage profile, voltage sag mitigation. The power
loss reduction is important factor for utility companies because
it is directly proportional to the company benefits in a
competitive electricity market, while reaching the better power
quality standards is too important as it has vital effect on
customer orientation. In this paper an ABC algorithm is
developed to gain these goals all together. In order to evaluate
sag mitigation capability of the proposed algorithm, voltage
in voltage sensitive buses is investigated. An existing 20KV
network has been chosen as test network and results are
compared with the proposed method in the radial distribution
system.
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
Controlling power flow in modern power systems
can be made more flexible by the use of recent developments
in power electronic and computing control technology. The
Unified Power Flow Controller (UPFC) is a Flexible AC
transmission system (FACTS) device that can control all the
three system variables namely line reactance, magnitude and
phase angle difference of voltage across the line. The UPFC
provides a promising means to control power flow in modern
power systems. Essentially the performance depends on proper
control setting achievable through a power flow analysis
program. This paper presents a reliable method to meet the
requirements by developing a Newton-Raphson based load
flow calculation through which control settings of UPFC can
be determined for the pre-specified power flow between the
lines. The proposed method keeps Newton-Raphson Load Flow
(NRLF) algorithm intact and needs (little modification in the
Jacobian matrix). A MATLAB program has been developed to
calculate the control settings of UPFC and the power flow
between the lines after the load flow is converged. Case studies
have been performed on IEEE 5-bus system and 14-bus system
to show that the proposed method is effective. These studies
indicate that the method maintains the basic NRLF properties
such as fast computational speed, high degree of accuracy and
good convergence rate.
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
The size and shape of opening in dam causes the
stress concentration, it also causes the stress variation in the
rest of the dam cross section. The gravity method of the analysis
does not consider the size of opening and the elastic property
of dam material. Thus the objective of study is comprises of
the Finite Element Method which considers the size of
opening, elastic property of material, and stress distribution
because of geometric discontinuity in cross section of dam.
Stress concentration inside the dam increases with the opening
in dam which results in the failure of dam. Hence it is
necessary to analyses large opening inside the dam. By making
the percentage area of opening constant and varying size and
shape of opening the analysis is carried out. For this purpose
a section of Koyna Dam is considered. Dam is defined as a
plane strain element in FEM, based on geometry and loading
condition. Thus this available information specified our path
of approach to carry out 2D plane strain analysis. The results
obtained are then compared mutually to get most efficient
way of providing large opening in the gravity dam.
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
Pushover Analysis a popular tool for seismic
performance evaluation of existing and new structures and is
nonlinear Static procedure where in monotonically increasing
loads are applied to the structure till the structure is unable
to resist the further load .During the analysis, whatever the
strength of concrete and steel is adopted for analysis of
structure may not be the same when real structure is
constructed and the pushover analysis results are very sensitive
to material model adopted, geometric model adopted, location
of plastic hinges and in general to procedure followed by the
analyzer. In this paper attempt has been made to assess
uncertainty in pushover analysis results by considering user
defined hinges and frame modeled as bare frame and frame
with slab modeled as rigid diaphragm and results compared
with experimental observations. Uncertain parameters
considered includes the strength of concrete, strength of steel
and cover to the reinforcement which are randomly generated
and incorporated into the analysis. The results are then
compared with experimental observations.
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
This paper is an attempt to base on auctions which
presents a frame work for the secure multi-party decision
protocols. In addition to the implementations which are very
light weighted, the main focus is on synchronizing security
features for avoiding agreements manipulations and reducing
the user traffic. Through this paper one can understand that
this different auction protocols on top of the frame work can
be collaborated using mobile devices. This paper present the
negotiation between auctioneer and the proffered and this
negotiation shows that multiparty security is far better than
the existing system.
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
The problems associated with selfish nodes in
MANET are addressed by a collaborative watchdog approach
which reduces the detection time for selfish nodes thereby
improves the performance and accuracy of watchdogs[1]. In
the related works they make use of credit based systems, reputation
based mechanisms, pathrater and watchdog mechanism
to detect such selfish nodes. In this paper we follow an approach
of collaborative watchdog which reduces the detection
time for selfish nodes and also involves the removal of such
selfish nodes based on some progressively assessed thresholds.
The threshold gives the nodes a chance to stop misbehaving
before it is permanently deleted from the network.
The node passes through several isolation processes before it
is permanently removed. Another version of AODV protocol
is used here which allows the simulation of selfish nodes in
NS2 by adding or modifying log files in the protocol.
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
Wireless sensor networks are networks having non
wired infrastructure and dynamic topology. In OSI model each
layer is prone to various attacks, which halts the performance
of a network .In this paper several attacks on four layers of
OSI model are discussed and security mechanism is described
to prevent attack in network layer i.e wormhole attack. In
Wormhole attack two or more malicious nodes makes a covert
channel which attracts the traffic towards itself by depicting a
low latency link and then start dropping and replaying packets
in the multi-path route. This paper proposes promiscuous mode
method to detect and isolate the malicious node during
wormhole attack by using Ad-hoc on demand distance vector
routing protocol (AODV) with omnidirectional antenna. The
methodology implemented notifies that the nodes which are
not participating in multi-path routing generates an alarm
message during delay and then detects and isolate the
malicious node from network. We also notice that not only
the same kind of attacks but also the same kind of
countermeasures can appear in multiple layer. For example,
misbehavior detection techniques can be applied to almost all
the layers we discussed.
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
The recent advancements in the wireless technology
and their wide-spread deployment have made remarkable
enhancements in efficiency in the corporate and industrial
and Military sectors The increasing popularity and usage of
wireless technology is creating a need for more secure wireless
Ad hoc networks. This paper aims researched and developed
a new protocol that prevents wormhole attacks on a ad hoc
network. A few existing protocols detect wormhole attacks but
they require highly specialized equipment not found on most
wireless devices. This paper aims to develop a defense against
wormhole attacks as an Anti-worm protocol which is based on
responsive parameters, that does not require as a significant
amount of specialized equipment, trick clock synchronization,
no GPS dependencies.
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
The Cloud based services provide much efficient
and seamless ways for data sharing across the cloud. The fact
that the data owners no longer possess data makes it very
difficult to assure data confidentiality and to enable secure
data sharing in the cloud. Despite of all its advantages this
will remain a major limitation that acts as a barrier to the
wider deployment of cloud based services. One of the possible
ways for ensuring trust in this aspect is the introduction of
accountability feature in the cloud computing scenario. The
Cloud framework requires promotion of distributed
accountability for such dynamic environment[1]. In some
works, there‘s an accountable framework suggested to ensure
distributed accountability for data sharing by the generation
of only a log of data access, but without any embedded feedback
mechanism for owner permission towards data
protection[2].The proposed system is an enhanced client
accountability framework which provides an additional client
side verification for each access towards enhanced security of
data. The integrity of content of data which resides in the
cloud service provider is also maintained by secured
outsourcing. Besides, the authentication of JAR(Java Archive)
files are done to ensure file protection and to maintain a safer
environment for data sharing. The analysis of various
functionalities of the framework depicts both the
accountability and security feature in an efficient manner.
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
A System state in HTTP botnet uses HTTP protocol
for the creation of chain of Botnets thereby compromising
other systems. By using HTTP protocol and port number 80,
attacks can not only be hidden but also pass through the
firewall without being detected. The DPR based detection
leads to better analysis of botnet attacks [3]. However, it
provides only probabilistic detection of the attacker and also
time consuming and error prone. This paper proposes a Genetic
algorithm based layered approach for detecting as well as
preventing botnet attacks. The paper reviews p2p firewall
implementation which forms the basis of filtering.
Performance evaluation is done based on precision, F-value
and probability. Layered approach reduces the computation
and overall time requirement [7]. Genetic algorithm promises
a low false positive rate.
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
in cloud computing data storage is a significant issue
because the entire data reside over a set of interconnected
resource pools that enables the data to be accessed through
virtual machines. It moves the application software’s and
databases to the large data centers where the management of
data is actually done. As the resource pools are situated over
various corners of the world, the management of data and
services may not be fully trustworthy. So, there are various
issues that need to be addressed with respect to the
management of data, service of data, privacy of data, security
of data etc. But the privacy and security of data is highly
challenging. To ensure privacy and security of data-at-rest in
cloud computing, we have proposed an effective and a novel
approach to ensure data security in cloud computing by means
of hiding data within images following is the concept of
steganography. The main objective of this paper is to prevent
data access from cloud data storage centers by unauthorized
users. This scheme perfectly stores data at cloud data storage
centers and retrieves data from it when it is needed.
The main tasks of a Wireless Sensor Network
(WSN) are data collection from its nodes and communication
of this data to the base station (BS). The protocols used for
communication among the WSN nodes and between the WSN
and the BS, must consider the resource constraints of nodes,
battery energy, computational capabilities and memory. The
WSN applications involve unattended operation of the network
over an extended period of time. In order to extend the lifetime
of a WSN, efficient routing protocols need to be adopted. The
proposed low power routing protocol based on tree-based
network structure reliably forwards the measured data towards
the BS using TDMA. An energy consumption analysis of the
WSN making use of this protocol is also carried out. It is
found that the network is energy efficient with an average
duty cycle of 0:7% for the WSN nodes. The OmNET++
simulation platform along with MiXiM framework is made
use of.
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
The security of authentication of internet based
co-banking services should not be susceptible to high risks.
The passwords are highly vulnerable to virus attacks due to
the lack of high end embedding of security methods. In order
for the passwords to be more secure, people are generally
compelled to select jumbled up character based passwords
which are not only less memorable but are also equally prone
to insecurity. Multiple use of distributed shares has been
studied to solve the problem of authentication by algorithms
based on thresholding of pixels in image processing and visual
cryptography concepts where the subset of shares is considered
for the recovery of the original image for authentication using
correlation function[1][2].The main disadvantage in the above
study is the plain storage of shares and also one of the shares
is being supplied to the customer, which will lead to the
possibility of misuse by a third party. This paper proposes a
technique for scrambling of pixels by key based random
permutation (KBRP) within the shares before the
authentication has been attempted. Total number of shares to
be created is dependent on the multiplicity of ownership of
the account. By this method the problem of uncertainty among
the customers with regard to security, storage, retrieval of
holding of half of the shares is minimized.
This paper presents a trifocal Rotman Lens Design
approach. The effects of focal ratio and element spacing on
the performance of Rotman Lens are described. A three beam
prototype feeding 4 element antenna array working in L-band
has been simulated using RLD v1.7 software. Simulated
results show that the simulated lens has a return loss of –
12.4dB at 1.8GHz. Beam to array port phase error variation
with change in the focal ratio and element spacing has also
been investigated.
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
Hyperspectral images can be efficiently compressed
through a linear predictive model, as for example the one
used in the SLSQ algorithm. In this paper we exploit this
predictive model on the AVIRIS images by individuating,
through an off-line approach, a common subset of bands, which
are not spectrally related with any other bands. These bands
are not useful as prediction reference for the SLSQ 3-D
predictive model and we need to encode them via other
prediction strategies which consider only spatial correlation.
We have obtained this subset by clustering the AVIRIS bands
via the clustering by compression approach. The main result
of this paper is the list of the bands, not related with the
others, for AVIRIS images. The clustering trees obtained for
AVIRIS and the relationship among bands they depict is also
an interesting starting point for future research.
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
A microelectronic circuit of block-elements
functionally analogous to two hydrogen bonding networks is
investigated. The hydrogen bonding networks are extracted
from â-lactamase protein and are formed in its active site.
Each hydrogen bond of the network is described in equivalent
electrical circuit by three or four-terminal block-element.
Each block-element is coded in Matlab. Static and dynamic
analyses are performed. The resultant microelectronic circuit
analogous to the hydrogen bonding network operates as
current mirror, sine pulse source, triangular pulse source as
well as signal modulator.
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
In this paper a method is proposed to discriminate
real world scenes in to natural and manmade scenes of similar
depth. Global-roughness of a scene image varies as a function
of image-depth. Increase in image depth leads to increase in
roughness in manmade scenes; on the contrary natural scenes
exhibit smooth behavior at higher image depth. This particular
arrangement of pixels in scene structure can be well explained
by local texture information in a pixel and its neighborhood.
Our proposed method analyses local texture information of a
scene image using texture unit matrix. For final classification
we have used both supervised and unsupervised learning using
K-Nearest Neighbor classifier (KNN) and Self Organizing
Map (SOM) respectively. This technique is useful for online
classification due to very less computational complexity.