Controller Area Network is an ideal serial bus design suitable for modern embedded system based networks. It finds its use in most of critical applications, where error detection and subsequent treatment on error is a critical issue. CRC (Cyclic Redundancy Check) block was developed on FPGA in order to meet the needs for simple, low power and low cost wireless communication. This paper gives a short overview of CRC block in the Digital transmitter based on the CAN 2.0 protocols. CRC is the most preferred method of encoding because it provides very efficient protection against commonly occurring burst errors, and is easily implemented. This technique is also sometimes applied to data storage devices, such as a disk drive. In this paper a technique to model the error detection circuitry of CAN 2.0 protocols on reconfigurable platform have been discussed? The software simulation results are presented in the form of timing diagram.FPGA implementation results shows that the circuitry requires very small amount of digital hardware. The Purpose of the research is to diversify the design methods by using VHDL code entry through Modelsim 5.5e simulator and Xilinx ISE8.3i.The VHDL code is used to characterize the CRC block behavior which is then simulated, synthesized and successfully implemented on Sparten3 FPGA .Here, Simulation and Synthesized results are also presented to verify the functionality of the CRC -16 Block. The data rate of CRC block is 250 kbps .Estimated power consumption and maximum operating frequency of the circuitry is also provided.
The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...IJCI JOURNAL
Fixed Broadband Wireless Access is a promising technology which can offer high speed data rate from transmitting end to customer end which can offer high speed text, voice, and video data. IEEE 802.16 WirelessMAN is a standard that specifies medium access control layer and a set of PHY layer to fixed and mobile BWA in broad range of frequencies and it supports equipment manufacturers due to its robust performance in multipath environment. Consequently WiMAX forum has adopted this version to develop the network world wide. In this paper the performance of IEEE 802.16 OFDM PHY Layer has been investigated by using the simulation model in Matlab. The Stanford University Interim (SUI) channel models are selected for the performance evaluation of this standard. The Ideal Channel estimation is considered in this work and the performance evaluation is observed in the basis of BER.
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...ijistjournal
The aim of this paper is to analyze the bit error rate (BER) performance of WiMAX physical layer with the implementation of different concatenated channel coding schemes under QAM and 16QAM digital modulations over realistic channel conditions (i.e. noise and multipath fading). In concatenated channel coding, the WiMAX system incorporates CRC-CC (Cyclic Redundancy Check and Convolutional) or RSCC (Reed-Solomon and Convolutional) encoder over an additative white gaussian noise (AWGN) and other multipath fading (Raleigh and Rician) channels. A segment of synthetic data is used for the analysis. Computer simulation results based on BER and signal to noise ratio (SNR) demonstrate that the performance of concatenated CRC-CC coded WiMAX system under QAM modulation is better as compared to RS-CC coded system over noisy and fading environments.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online
Performance Improvement of IEEE 802.22 WRAN Physical LayerIOSR Journals
The spectrum available for the wireless services is limited, the increased demand of wireless
application has put a lot of limitations on the utilization of available radio spectrum. For the efficient spectrum
utilization for wireless application IEEE 802.22 standard i.e. WRAN (Wireless Regional Area Network) is
developed which is based on cognitive radio technique that senses the free available spectrum. It allows sharing
of geographically unused channels allocated to the TV Broadcast Service, without interference.
In this paper we are evaluating the performance of WRAN over physical layer with QPSK, 16-QAM
and 64-QAM modulation with Convolution coding with code rate of 1/2, 2/3, 3/4, 5/6 and obtaining the BER
curves for rician channel. Simulation is performed in MATLAB
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...IJCI JOURNAL
Fixed Broadband Wireless Access is a promising technology which can offer high speed data rate from transmitting end to customer end which can offer high speed text, voice, and video data. IEEE 802.16 WirelessMAN is a standard that specifies medium access control layer and a set of PHY layer to fixed and mobile BWA in broad range of frequencies and it supports equipment manufacturers due to its robust performance in multipath environment. Consequently WiMAX forum has adopted this version to develop the network world wide. In this paper the performance of IEEE 802.16 OFDM PHY Layer has been investigated by using the simulation model in Matlab. The Stanford University Interim (SUI) channel models are selected for the performance evaluation of this standard. The Ideal Channel estimation is considered in this work and the performance evaluation is observed in the basis of BER.
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...ijistjournal
The aim of this paper is to analyze the bit error rate (BER) performance of WiMAX physical layer with the implementation of different concatenated channel coding schemes under QAM and 16QAM digital modulations over realistic channel conditions (i.e. noise and multipath fading). In concatenated channel coding, the WiMAX system incorporates CRC-CC (Cyclic Redundancy Check and Convolutional) or RSCC (Reed-Solomon and Convolutional) encoder over an additative white gaussian noise (AWGN) and other multipath fading (Raleigh and Rician) channels. A segment of synthetic data is used for the analysis. Computer simulation results based on BER and signal to noise ratio (SNR) demonstrate that the performance of concatenated CRC-CC coded WiMAX system under QAM modulation is better as compared to RS-CC coded system over noisy and fading environments.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online
Performance Improvement of IEEE 802.22 WRAN Physical LayerIOSR Journals
The spectrum available for the wireless services is limited, the increased demand of wireless
application has put a lot of limitations on the utilization of available radio spectrum. For the efficient spectrum
utilization for wireless application IEEE 802.22 standard i.e. WRAN (Wireless Regional Area Network) is
developed which is based on cognitive radio technique that senses the free available spectrum. It allows sharing
of geographically unused channels allocated to the TV Broadcast Service, without interference.
In this paper we are evaluating the performance of WRAN over physical layer with QPSK, 16-QAM
and 64-QAM modulation with Convolution coding with code rate of 1/2, 2/3, 3/4, 5/6 and obtaining the BER
curves for rician channel. Simulation is performed in MATLAB
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEMEditor IJCATR
This paper proposed a design of optical switching controller using FPGA for OCDMA encoder system. The encoder is one
of the new technologies that use to transmit the coded data in the optical communication system by using FPGA and optical switches.
It is providing a high security for data transmission due to all data will be transmitting in binary code form. The output signals from
FPGA are coded with a binary code that given to an optical switch before it signal modulate with the carrier and transmit to the
receiver. In this paper, AA and 55 data were used for source 1 and source 2. It is generated sample data and sent packet data to the
FPGA and stored it into RAM. The simulation results have done by using software Verilog Spartan 2 programming to simulate. After
that the output will produces at waveform to display the output. The main function of FPGA controlling unit is producing single pulse
and configuring optical switching system.
Analysis and Survey of FPGA Based PROFIBUS BoardIJAEMSJORNAL
Fieldbus system has been established as a communication network, used to connect field devices such as sensors, transduser,controller,man machine interface.Currently a large number of global fieldbus standards are available for consumers.Citation of different types of field bus present an analytical review of various fieldbus systemthat how to gather the data from various equipment distributed far away from each other in the field with reduced wiring and cabling requirement, those are the basic components of communication system. This work also discuss about FPGA based PROFIBUS communication board. It proposes the alternative solution to complexity of communication system and devise it more reliable, high integral and transmission efficient.
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...IJCSEIT Journal
In this paper, the impact of Forward Error Correction (FEC) code namely Trellis code with interleaver on
the performance of wavelet based MC-CDMA wireless communication system with the implementation of
Alamouti antenna diversity scheme has been investigated in terms of Bit Error Rate (BER) as a function of
Signal-to-Noise Ratio (SNR) per bit. Simulation of the system under proposed study has been done in M-ary
modulation schemes (MPSK, MQAM and DPSK) over AWGN and Rayleigh fading channel incorporating
Walsh Hadamard code as orthogonal spreading code to discriminate the message signal for individual
user. It is observed via computer simulation that the performance of the interleaved coded based proposed
system outperforms than that of the uncoded system in all modulation schemes over Rayleigh fading
channel.
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKSijwmn
Enhanced Diversity and Network Coding (eDC-NC), the synergistic combination of Diversity and modified Triangular Network Coding, was introduced recently to provide efficient and ultra-reliable networking with near-instantaneous fault recovery. In this paper it is shown that eDC-NC technology can efficiently and securely broadcast messages in 5G wireless fog-computing-based Radio Access Networks (F-RAN). In particular, this work is directed towards demonstrating the ability of eDC-NC technology to more efficiently provide secure messages broadcasting than standardized methods such as Secure Multicasting
using Secret (Shared) Key Cryptography, such that the adversary has no ability to acquire information even if they wiretap the entire F-RAN network (except of course the source and destination nodes). Our results show that using secure eDC-NC technology in F-RAN fronthaul network will enhance secure broadcasting and provide ultra-reliability networking, near-instantaneous fault recovery, and retain the throughput benefits of Network Coding.
Towards achieving-high-performance-in-5g-mobile-packet-cores-user-plane-functionEiko Seidel
White Paper Intel SK Telekom
This paper presents the architecture for a user plane function (UPF) in the mobile packet core (MPC) targeting 5G deployments.
Some of the key driving forces behind the transition from the UMTS based cellular system to the Long Term Evolution Advanced (LTE-A) are to improve the mean and the cell-edge throughput, improve the user fairness, and improve the quality of service (QoS) satisfaction for all users. In the latter system, relays appear as one of the most prominent enabler for improving the cell-edge user experience while increasing the system’s fairness.
In this white paper, we present the basics of relay deployments in LTE-A networks. Moreover, we analyze resource allocation problem for Relay Nodes (RN) deployments and present some of the solutions for improvement in system resource usage and QoS satisfaction. Afterwards, we introduce the capabilities of NOMOR’s LTE-A system level simulator and evaluate the performance of LTE-A relay systems under the described solutions.
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...IJMER
ABSTRACT: Globally, there is a burning desire for a communication system that provides high quality, high capacity and
high speed information exchange and we need to develop an extremely spectrum-efficient transmission technology for the
same. This paper describes a realistic capacity and BER comparison of a robust and secured multiple access schemes and
develops a wireless embedded system at 60 GHz Millimeter-Wave using WiMAX waveform. The system is tested at the
laboratory with multimedia transmission and reception but yet to be tested after mounting on the vehicles. Technical
expertise are developed towards Simulink programming, methods of poring to VSG, IF and millimeter wave hardware, RTSA
use, Data Acquisition and DSP. With proper deployment of this 60 GHz system on vehicles, the existing commercial
products for 802.11P will be required to be replaced or updated soon. Simulation and implementation of the results will
elucidate that a significant amelioration in the spectral efficiency parameter can be achieved using the proposed WiMAX at
60GHz which provides both frequency diversity and spectral efficiency to yield a powerful and affordable solution for superhigh speed/4G transmission and ever-increasing requirement of high throughput in wideband multimedia communications
and ITS in vehicular communication.
Keywords: AWG, C2C-CC, MC-CDMA, VSA, WiMAX and WMAN, 4G
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...IJCNCJournal
Worldwide Interoperability for Microwave Access (WiMax), standardized asIEEE 802.16d is a popular
technology for broadband wireless communication system. Orthogonal Frequency Division Multiplexing
(OFDM) is the core of this technology.OFDMreduces Inter-symbol Interference (ISI) and hence improves
system performance (i.e., Bit Error Rate (BER)). To improve system performance further error correction
coding schemes have been included in WiMax. It is widely accepted thata coded system outperforms an
uncodedsystem. But, the performance improvement of a coded system depends on the channel conditions. In
this paper, we investigated and compared the performances of a coded and an uncoded WiMaxsystem
under a practical channel model called Stanford University Interim (SUI). Different modulation schemes
namely BPSK, QPSK, 16-QAM, and 64-QAM have been considered in this work. It is shown that the
selection of codedoruncoded WiMaxsystem should depend on the channel condition as well as on the
modulation used. It is also shown that anuncoded system outperforms a coded system under some channel
conditions.
Turbo codes are error-correcting codes with performance that is close to the
Shannon theoretical limit (SHA). The motivation for using turbo codes is
that the codes are an appealing mix of a random appearance on the channel
and a physically realizable decoding structure. The communication systems
have the problem of latency, fast switching, and reliable data transfer. The
objective of the research paper is to design and turbo encoder and decoder
hardware chip and analyze its performance. Two convolutional codes are
concatenated concurrently and detached by an interleaver or permuter in the
turbo encoder. The expected data from the channel is interpreted iteratively
using the two related decoders. The soft (probabilistic) data about an
individual bit of the decoded structure is passed in each cycle from one
elementary decoder to the next, and this information is updated regularly.
The performance of the chip is also verified using the maximum a posteriori
(MAP) method in the decoder chip. The performance of field-programmable
gate array (FPGA) hardware is evaluated using hardware and timing
parameters extracted from Xilinx ISE 14.7. The parallel concatenation offers
a better global rate for the same component code performance, and reduced
delay, low hardware complexity, and higher frequency support.
OPTICAL SWITCHING CONTROLLER USING FPGA AS A CONTROLLER FOR OCDMA ENCODER SYSTEMEditor IJCATR
This paper proposed a design of optical switching controller using FPGA for OCDMA encoder system. The encoder is one
of the new technologies that use to transmit the coded data in the optical communication system by using FPGA and optical switches.
It is providing a high security for data transmission due to all data will be transmitting in binary code form. The output signals from
FPGA are coded with a binary code that given to an optical switch before it signal modulate with the carrier and transmit to the
receiver. In this paper, AA and 55 data were used for source 1 and source 2. It is generated sample data and sent packet data to the
FPGA and stored it into RAM. The simulation results have done by using software Verilog Spartan 2 programming to simulate. After
that the output will produces at waveform to display the output. The main function of FPGA controlling unit is producing single pulse
and configuring optical switching system.
Analysis and Survey of FPGA Based PROFIBUS BoardIJAEMSJORNAL
Fieldbus system has been established as a communication network, used to connect field devices such as sensors, transduser,controller,man machine interface.Currently a large number of global fieldbus standards are available for consumers.Citation of different types of field bus present an analytical review of various fieldbus systemthat how to gather the data from various equipment distributed far away from each other in the field with reduced wiring and cabling requirement, those are the basic components of communication system. This work also discuss about FPGA based PROFIBUS communication board. It proposes the alternative solution to complexity of communication system and devise it more reliable, high integral and transmission efficient.
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...IJCSEIT Journal
In this paper, the impact of Forward Error Correction (FEC) code namely Trellis code with interleaver on
the performance of wavelet based MC-CDMA wireless communication system with the implementation of
Alamouti antenna diversity scheme has been investigated in terms of Bit Error Rate (BER) as a function of
Signal-to-Noise Ratio (SNR) per bit. Simulation of the system under proposed study has been done in M-ary
modulation schemes (MPSK, MQAM and DPSK) over AWGN and Rayleigh fading channel incorporating
Walsh Hadamard code as orthogonal spreading code to discriminate the message signal for individual
user. It is observed via computer simulation that the performance of the interleaved coded based proposed
system outperforms than that of the uncoded system in all modulation schemes over Rayleigh fading
channel.
EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKSijwmn
Enhanced Diversity and Network Coding (eDC-NC), the synergistic combination of Diversity and modified Triangular Network Coding, was introduced recently to provide efficient and ultra-reliable networking with near-instantaneous fault recovery. In this paper it is shown that eDC-NC technology can efficiently and securely broadcast messages in 5G wireless fog-computing-based Radio Access Networks (F-RAN). In particular, this work is directed towards demonstrating the ability of eDC-NC technology to more efficiently provide secure messages broadcasting than standardized methods such as Secure Multicasting
using Secret (Shared) Key Cryptography, such that the adversary has no ability to acquire information even if they wiretap the entire F-RAN network (except of course the source and destination nodes). Our results show that using secure eDC-NC technology in F-RAN fronthaul network will enhance secure broadcasting and provide ultra-reliability networking, near-instantaneous fault recovery, and retain the throughput benefits of Network Coding.
Towards achieving-high-performance-in-5g-mobile-packet-cores-user-plane-functionEiko Seidel
White Paper Intel SK Telekom
This paper presents the architecture for a user plane function (UPF) in the mobile packet core (MPC) targeting 5G deployments.
Some of the key driving forces behind the transition from the UMTS based cellular system to the Long Term Evolution Advanced (LTE-A) are to improve the mean and the cell-edge throughput, improve the user fairness, and improve the quality of service (QoS) satisfaction for all users. In the latter system, relays appear as one of the most prominent enabler for improving the cell-edge user experience while increasing the system’s fairness.
In this white paper, we present the basics of relay deployments in LTE-A networks. Moreover, we analyze resource allocation problem for Relay Nodes (RN) deployments and present some of the solutions for improvement in system resource usage and QoS satisfaction. Afterwards, we introduce the capabilities of NOMOR’s LTE-A system level simulator and evaluate the performance of LTE-A relay systems under the described solutions.
Design and Implementation of Wireless Embedded Systems at 60 GHz Millimeter-W...IJMER
ABSTRACT: Globally, there is a burning desire for a communication system that provides high quality, high capacity and
high speed information exchange and we need to develop an extremely spectrum-efficient transmission technology for the
same. This paper describes a realistic capacity and BER comparison of a robust and secured multiple access schemes and
develops a wireless embedded system at 60 GHz Millimeter-Wave using WiMAX waveform. The system is tested at the
laboratory with multimedia transmission and reception but yet to be tested after mounting on the vehicles. Technical
expertise are developed towards Simulink programming, methods of poring to VSG, IF and millimeter wave hardware, RTSA
use, Data Acquisition and DSP. With proper deployment of this 60 GHz system on vehicles, the existing commercial
products for 802.11P will be required to be replaced or updated soon. Simulation and implementation of the results will
elucidate that a significant amelioration in the spectral efficiency parameter can be achieved using the proposed WiMAX at
60GHz which provides both frequency diversity and spectral efficiency to yield a powerful and affordable solution for superhigh speed/4G transmission and ever-increasing requirement of high throughput in wideband multimedia communications
and ITS in vehicular communication.
Keywords: AWG, C2C-CC, MC-CDMA, VSA, WiMAX and WMAN, 4G
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...IJCNCJournal
Worldwide Interoperability for Microwave Access (WiMax), standardized asIEEE 802.16d is a popular
technology for broadband wireless communication system. Orthogonal Frequency Division Multiplexing
(OFDM) is the core of this technology.OFDMreduces Inter-symbol Interference (ISI) and hence improves
system performance (i.e., Bit Error Rate (BER)). To improve system performance further error correction
coding schemes have been included in WiMax. It is widely accepted thata coded system outperforms an
uncodedsystem. But, the performance improvement of a coded system depends on the channel conditions. In
this paper, we investigated and compared the performances of a coded and an uncoded WiMaxsystem
under a practical channel model called Stanford University Interim (SUI). Different modulation schemes
namely BPSK, QPSK, 16-QAM, and 64-QAM have been considered in this work. It is shown that the
selection of codedoruncoded WiMaxsystem should depend on the channel condition as well as on the
modulation used. It is also shown that anuncoded system outperforms a coded system under some channel
conditions.
Turbo codes are error-correcting codes with performance that is close to the
Shannon theoretical limit (SHA). The motivation for using turbo codes is
that the codes are an appealing mix of a random appearance on the channel
and a physically realizable decoding structure. The communication systems
have the problem of latency, fast switching, and reliable data transfer. The
objective of the research paper is to design and turbo encoder and decoder
hardware chip and analyze its performance. Two convolutional codes are
concatenated concurrently and detached by an interleaver or permuter in the
turbo encoder. The expected data from the channel is interpreted iteratively
using the two related decoders. The soft (probabilistic) data about an
individual bit of the decoded structure is passed in each cycle from one
elementary decoder to the next, and this information is updated regularly.
The performance of the chip is also verified using the maximum a posteriori
(MAP) method in the decoder chip. The performance of field-programmable
gate array (FPGA) hardware is evaluated using hardware and timing
parameters extracted from Xilinx ISE 14.7. The parallel concatenation offers
a better global rate for the same component code performance, and reduced
delay, low hardware complexity, and higher frequency support.
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...ijistjournal
The aim of this paper is to analyze the bit error rate (BER) performance of WiMAX physical layer with the implementation of different concatenated channel coding schemes under QAM and 16QAM digital modulations over realistic channel conditions (i.e. noise and multipath fading). In concatenated channel coding, the WiMAX system incorporates CRC-CC (Cyclic Redundancy Check and Convolutional) or RSCC (Reed-Solomon and Convolutional) encoder over an additative white gaussian noise (AWGN) and other multipath fading (Raleigh and Rician) channels. A segment of synthetic data is used for the analysis. Computer simulation results based on BER and signal to noise ratio (SNR) demonstrate that the performance of concatenated CRC-CC coded WiMAX system under QAM modulation is better as compared to RS-CC coded system over noisy and fading environments.
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKSijngnjournal
As the demand for high speed Internet significantly increasing to meet the requirement of large data transfers, real-time communication and High Definition ( HD) multimedia transfer over IP, the IP based network products architecture must evolve and change. Application specific processors require high
performance, low power and high degree of programmability is the limitation in many general processor based applications. This paper describes the design of Ethernet packet processor for system-on-chip (SoC) which performs all core packet processing functions, including segmentation and reassembly, packetization classification, route and queue management which will speedup switching/routing performance making it
more suitable for Next Generation Networks (NGN). Ethernet packet processor design can be configured for use with multiple projects targeted to a FPGA device the system is designed to support 1/10/20/40/100 Gigabit links with a speed and performance advantage. VHDL has been used to implement and simulated the required functions in FPGA
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...CSCJournals
WiMAX is defined as Worldwide Interoperability for Microwave Access by the WiMAX Forum and its industry. WiMAX is basically a wireless digital communication system which is also known as IEEE 802.16 standard intended for wireless \"metropolitan area networks\". WiMAX is based upon OFDM multiplexing technique. It was developed in order to provide high speed data rates to the users located in those areas also where broadband wireless coverage is not available. MIMO systems also play an important role in the field of wireless communication by allowing data to be transmitted and received over different antennas. WiMAX-MIMO systems are developed to improve the performance of WiMAX system. This paper analyzes WiMAX-MIMO system for different modulation schemes with different CC code rates under different fading channels (Rician and Nakagami channel). Spatial Multiplexing technique of MIMO system is used for the simulation purpose. Analysis has been done in the form of Signal-to Noise Ratio (SNR) vs Bit Error Rate (BER) plots.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Wi MAX Deinter leaver’s Address Generation Unit through FPGA Implementationijceronline
The IEEE 802.16 standard, commonly known as WiMAX has broadband wirelessaccess over long distance. WiMAX has evolved from 802.16 to 802.16d for fixedwireless access and IEEE 802.16e standard is for mobility support. WiMAX Forumcreated the name "WiMAX". The forum describes WiMAX as "a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL". WiMAX is similar to Wi-Fi, but it can enable usage at much larger scale and at faster speeds [1]. Inorder to minimize the effect of burst error, the channel interleaver/deinterleaver employed in the WiMAX transreceiver is used. The channel interleaver/deinterleaver consists of two memory blocks and an address generator. The objective of this project is to implement an area and delay efficient circuitry for address generator for WiMAX 2- D Deinterleaver using the Xilinx FPGA for all permissible code rates and modulation schemes. This project also build up a generalized circuit for all permissible Ncbps without manual computation of column number.
Controller Area Network (CAN) Different TypesFebinShaji9
Controller Area Network (or CAN) is the latest communication system within the automotive world. At its simplest level, it can be thought of as a means of linking all the electronic systems within a vehicle together to allow them to communicate with each other
Communication Protocols Augmentation in VLSI Design ApplicationsIJERA Editor
With the advancement in communication System, the use of various protocols got a sharp rise in the different applications. Especially in the VLSI design for FPGAs, ASICS, CPLDs, the application areas got expanded to FPGA based technologies. Today, it has moved from commercial application to the defence sectors like missiles & aerospace controls. In this paper the use of FPGAs and its interface with various application circuits in the communication field for data (textual & visual) & control transfer is discussed. To be specific, the paper discusses the use of FPGA in various communication protocols like SPI, I2C, and TMDS in synchronous mode in Digital System Design using VHDL/Verilog.
This pdf is about the CAN communication protocol, which is vital for automobiles.A Brief Overview. The CAN bus protocol is defined by the ISO 11898-1 standard and can be summarized like this: The physical layer uses differential transmission on a twisted pair wire. A non-destructive bit-wise arbitration is used to control access to the bus. This is made with the help of Engineersgarage.
Similar to 14 12 may17 18nov16 13396 m f hashmi (20)
In our homes or offices, security has been a vital issue. Control of home security system remotely always offers huge advantages like the arming or disarming of the alarms, video monitoring, and energy management control apart from safeguarding the home free up intruders. Considering the oldest simple methods of security that is the mechanical lock system that has a key as the authentication element, then an upgrade to a universal type, and now unique codes for the lock. The recent advancement in the communication system has brought the tremendous application of communication gadgets into our various areas of life. This work is a real-time smart doorbell notification system for home Security as opposes of the traditional security methods, it is composed of the doorbell interfaced with GSM Module, a GSM module would be triggered to send an SMS to the house owner by pressing the doorbell, the owner will respond to the guest by pressing a button to open the door, otherwise, a message would be displayed to the guest for appropriate action. Then, the keypad is provided for an authorized person for the provision of password for door unlocking, if multiple wrong password attempts were made to unlock, a message of burglary attempt would be sent to the house owner for prompt action. The main benefit of this system is the uniqueness of the incorporation of the password and messaging systems which denies access to any unauthorized personality and owner's awareness method.
Augmented reality, the new age technology, has widespread applications in every field imaginable. This technology has proven to be an inflection point in numerous verticals, improving lives and improving performance. In this paper, we explore the various possible applications of Augmented Reality (AR) in the field of Medicine. The objective of using AR in medicine or generally in any field is the fact that, AR helps in motivating the user, making sessions interactive and assist in faster learning. In this paper, we discuss about the applicability of AR in the field of medical diagnosis. Augmented reality technology reinforces remote collaboration, allowing doctors to diagnose patients from a different locality. Additionally, we believe that a much more pronounced effect can be achieved by bringing together the cutting edge technology of AR and the lifesaving field of Medical sciences. AR is a mechanism that could be applied in the learning process too. Similarly, virtual reality could be used in the field where more of practical experience is needed such as driving, sports, neonatal care training.
Image fusion is a sub field of image processing in which more than one images are fused to create an image where all the objects are in focus. The process of image fusion is performed for multi-sensor and multi-focus images of the same scene. Multi-sensor images of the same scene are captured by different sensors whereas multi-focus images are captured by the same sensor. In multi-focus images, the objects in the scene which are closer to the camera are in focus and the farther objects get blurred. Contrary to it, when the farther objects are focused then closer objects get blurred in the image. To achieve an image where all the objects are in focus, the process of images fusion is performed either in spatial domain or in transformed domain. In recent times, the applications of image processing have grown immensely. Usually due to limited depth of field of optical lenses especially with greater focal length, it becomes impossible to obtain an image where all the objects are in focus. Thus, it plays an important role to perform other tasks of image processing such as image segmentation, edge detection, stereo matching and image enhancement. Hence, a novel feature-level multi-focus image fusion technique has been proposed which fuses multi-focus images. Thus, the results of extensive experimentation performed to highlight the efficiency and utility of the proposed technique is presented. The proposed work further explores comparison between fuzzy based image fusion and neuro fuzzy fusion technique along with quality evaluation indices.
Graphs have become the dominant life-form of many tasks as they advance a
structure to represent many tasks and the corresponding relations. A powerful
role of networks/graphs is to bridge local feats that exist in vertices as they
blossom into patterns that help explain how nodal relations and their edges
impacts a complex effect that ripple via a graph. User cluster are formed as a
result of interactions between entities. Many users can hardly categorize their
contact into groups today such as “family”, “friends”, “colleagues” etc. Thus,
the need to analyze such user social graph via implicit clusters, enables the
dynamism in contact management. Study seeks to implement this dynamism
via a comparative study of deep neural network and friend suggest algorithm.
We analyze a user’s implicit social graph and seek to automatically create
custom contact groups using metrics that classify such contacts based on a
user’s affinity to contacts. Experimental results demonstrate the importance
of both the implicit group relationships and the interaction-based affinity in
suggesting friends.
This paper projects Gryllidae Optimization Algorithm (GOA) has been applied to solve optimal reactive power problem. Proposed GOA approach is based on the chirping characteristics of Gryllidae. In common, male Gryllidae chirp, on the other hand some female Gryllidae also do as well. Male Gryllidae draw the females by this sound which they produce. Moreover, they caution the other Gryllidae against dangers with this sound. The hearing organs of the Gryllidae are housed in an expansion of their forelegs. Through this, they bias to the produced fluttering sounds. Proposed Gryllidae Optimization Algorithm (GOA) has been tested in standard IEEE 14, 30 bus test systems and simulation results show that the projected algorithms reduced the real power loss considerably.
In the wake of the sudden replacement of wood and kerosene by gas cookers for several purposes in Nigeria, gas leakage has caused several damages in our homes, Laboratories among others. installation of a gas leakage detection device was globally inspired to eliminate accidents related to gas leakage. We present an alternative approach to developing a device that can automatically detect and control gas leakages and also monitor temperature. The system detects the leakage of the LPG (Liquefied Petroleum Gas) using a gas sensor, then triggred the control system response which employs ventilator system, Mobile phone alert and alarm when the LPG concentration in the air exceeds a certain level. The performance of two gas sensors (MQ5 and MQ6) were tested for a guided decision. Also, when the temperature of the environment poses a danger, LED (indicator), buzzer and LCD (16x2) display was used to indicate temperature and gas leakage status in degree Celsius and PPM respectively. Attension was given to the response time of the control system, which was ascertained that this system significantly increases the chances and efficiency of eliminating gas leakage related accident.
Feature selection problem is one of the main important problems in the text and data mining domain. This paper presents a comparative study of feature selection methods for Arabic text classification. Five of the feature selection methods were selected: ICHI square, CHI square, Information Gain, Mutual Information and Wrapper. It was tested with five classification algorithms: Bayes Net, Naive Bayes, Random Forest, Decision Tree and Artificial Neural Networks. In addition, Data Collection was used in Arabic consisting of 9055 documents, which were compared by four criteria: Precision, Recall, F-measure and Time to build model. The results showed that the improved ICHI feature selection got almost all the best results in comparison with other methods.
In this paper Gentoo Penguin Algorithm (GPA) is proposed to solve optimal reactive power problem. Gentoo Penguins preliminary population possesses heat radiation and magnetizes each other by absorption coefficient. Gentoo Penguins will move towards further penguins which possesses low cost (elevated heat concentration) of absorption. Cost is defined by the heat concentration, distance. Gentoo Penguins penguin attraction value is calculated by the amount of heat prevailed between two Gentoo penguins. Gentoo Penguins heat radiation is measured as linear. Less heat is received in longer distance, in little distance, huge heat is received. Gentoo Penguin Algorithm has been tested in standard IEEE 57 bus test system and simulation results show the projected algorithm reduced the real power loss considerably.
08 20272 academic insight on applicationIAESIJEECS
This research has thrown up many questions in need of further investigation.There was an expressive quantitative-qualitative research, which a common investigation form was used in.The dialogue item was also applied to discover if the contributors asserted the media-based attitude supplements their learning of academic English writing classes or not.Data recounted academic” insights toward using Skype as a sustaining implement for lessons releasing based on chosen variables: their occupation, year of education, and knowledge with Skype discovered that there were no important statistical differences in the use of Skype units because of medical academics major knowledge. There are statistically important differences in using Skype units. The findings also, disclosed that there are statistically significant differences in using Skype units due to the practice with Skype variable, in favors of academics with no Skype use practice. Skype instrument as an instructive media is a positive medium to be employed to supply academic medical writing data and assist education. Academics who do not have enough time to contribute in classes believe comfortable using the Skype-based attitude in scientific writing. They who took part in the course claimed that their approval of this media is due to learning academic innovative medical writing.
Cloud computing has sweeping impact on the human productivity. Today it’s used for Computing, Storage, Predictions and Intelligent Decision Making, among others. Intelligent Decision-Making using Machine Learning has pushed for the Cloud Services to be even more fast, robust and accurate. Security remains one of the major concerns which affect the cloud computing growth however there exist various research challenges in cloud computing adoption such as lack of well managed service level agreement (SLA), frequent disconnections, resource scarcity, interoperability, privacy, and reliability. Tremendous amount of work still needs to be done to explore the security challenges arising due to widespread usage of cloud deployment using Containers. We also discuss Impact of Cloud Computing and Cloud Standards. Hence in this research paper, a detailed survey of cloud computing, concepts, architectural principles, key services, and implementation, design and deployment challenges of cloud computing are discussed in detail and important future research directions in the era of Machine Learning and Data Science have been identified.
Notary is an official authorized to make an authentic deed regarding all deeds, agreements and stipulations required by a general rule. Activities carried out at the notary office such as recording client data and file data still use traditional systems that tend to be manual. The problem that occurs is the inefficiency in data processing and providing information to clients. Clients have difficulty getting information related to the progress of documents that are being taken care of at the notary's office. The client must take the time to arrive to the notary's office repeatedly to check the progress of the work of the document file. The purpose of this study is to facilitate clients in obtaining information about the progress of the work in progress, and make it easier for employees to process incoming documents by implementing an administrative system. This system was developed with the waterfall system development method and uses the Multi-Channel Access Technology integrated in the website to simplify the process of delivering information and requesting information from clients and to clients with Telegram and SMS Gateway. Clients will come to the office only when there is a notification from the system via Telegram or SMS notifying that the client must come directly to the notary's office, thus leading to an efficient time and avoiding excessive transportation costs. The overall functional system can function properly based on the results of alpha testing. The results of beta testing conducted by distributing the system feasibility test questionnaire to end users, get a percentage of 96% of users agree the system is feasible to be implemented.
In this work Tundra wolf algorithm (TWA) is proposed to solve the optimal reactive power problem. In the projected Tundra wolf algorithm (TWA) in order to avoid the searching agents from trapping into the local optimal the converging towards global optimal is divided based on two different conditions. In the proposed Tundra wolf algorithm (TWA) omega tundra wolf has been taken as searching agent as an alternative of indebted to pursue the first three most excellent candidates. Escalating the searching agents’ numbers will perk up the exploration capability of the Tundra wolf wolves in an extensive range. Proposed Tundra wolf algorithm (TWA) has been tested in standard IEEE 14, 30 bus test systems and simulation results show the proposed algorithm reduced the real power loss effectively.
In this work Predestination of Particles Wavering Search (PPS) algorithm has been applied to solve optimal reactive power problem. PPS algorithm has been modeled based on the motion of the particles in the exploration space. Normally the movement of the particle is based on gradient and swarming motion. Particles are permitted to progress in steady velocity in gradient-based progress, but when the outcome is poor when compared to previous upshot, immediately particle rapidity will be upturned with semi of the magnitude and it will help to reach local optimal solution and it is expressed as wavering movement. In standard IEEE 14, 30, 57,118,300 bus systems Proposed Predestination of Particles Wavering Search (PPS) algorithm is evaluated and simulation results show the PPS reduced the power loss efficiently.
In this paper, Mine Blast Algorithm (MBA) has been intermingled with Harmony Search (HS) algorithm for solving optimal reactive power dispatch problem. MBA is based on explosion of landmines and HS is based on Creativeness progression of musicians-both are hybridized to solve the problem. In MBA Initial distance of shrapnel pieces are reduced gradually to allow the mine bombs search the probable global minimum location in order to amplify the global explore capability. Harmony search (HS) imitates the music creativity process where the musicians supervise their instruments’ pitch by searching for a best state of harmony. Hybridization of Mine Blast Algorithm with Harmony Search algorithm (MH) improves the search effectively in the solution space. Mine blast algorithm improves the exploration and harmony search algorithm augments the exploitation. At first the proposed algorithm starts with exploration & gradually it moves to the phase of exploitation. Proposed Hybridized Mine Blast Algorithm with Harmony Search algorithm (MH) has been tested on standard IEEE 14, 300 bus test systems. Real power loss has been reduced considerably by the proposed algorithm. Then Hybridized Mine Blast Algorithm with Harmony Search algorithm (MH) tested in IEEE 30, bus system (with considering voltage stability index)- real power loss minimization, voltage deviation minimization, and voltage stability index enhancement has been attained.
Artificial Neural Networks have proved their efficiency in a large number of research domains. In this paper, we have applied Artificial Neural Networks on Arabic text to prove correct language modeling, text generation, and missing text prediction. In one hand, we have adapted Recurrent Neural Networks architectures to model Arabic language in order to generate correct Arabic sequences. In the other hand, Convolutional Neural Networks have been parameterized, basing on some specific features of Arabic, to predict missing text in Arabic documents. We have demonstrated the power of our adapted models in generating and predicting correct Arabic text comparing to the standard model. The model had been trained and tested on known free Arabic datasets. Results have been promising with sufficient accuracy.
In the present-day communications speech signals get contaminated due to
various sorts of noises that degrade the speech quality and adversely impacts
speech recognition performance. To overcome these issues, a novel approach
for speech enhancement using Modified Wiener filtering is developed and
power spectrum computation is applied for degraded signal to obtain the
noise characteristics from a noisy spectrum. In next phase, MMSE technique
is applied where Gaussian distribution of each signal i.e. original and noisy
signal is analyzed. The Gaussian distribution provides spectrum estimation
and spectral coefficient parameters which can be used for probabilistic model
formulation. Moreover, a-priori-SNR computation is also incorporated for
coefficient updation and noise presence estimation which operates similar to
the conventional VAD. However, conventional VAD scheme is based on the
hard threshold which is not capable to derive satisfactory performance and a
soft-decision based threshold is developed for improving the performance of
speech enhancement. An extensive simulation study is carried out using
MATLAB simulation tool on NOIZEUS speech database and a comparative
study is presented where proposed approach is proved better in comparison
with existing technique.
Previous research work has highlighted that neuro-signals of Alzheimer’s disease patients are least complex and have low synchronization as compared to that of healthy and normal subjects. The changes in EEG signals of Alzheimer’s subjects start at early stage but are not clinically observed and detected. To detect these abnormalities, three synchrony measures and wavelet-based features have been computed and studied on experimental database. After computing these synchrony measures and wavelet features, it is observed that Phase Synchrony and Coherence based features are able to distinguish between Alzheimer’s disease patients and healthy subjects. Support Vector Machine classifier is used for classification giving 94% accuracy on experimental database used. Combining, these synchrony features and other such relevant features can yield a reliable system for diagnosing the Alzheimer’s disease.
Attenuation correction designed for PET/MR hybrid imaging frameworks along with portion making arrangements used for MR-based radiation treatment remain testing because of lacking high-energy photon weakening data. We present a new method so as to uses the learned nonlinear neighborhood descriptors also highlight coordinating toward foresee pseudo-CT pictures starting T1w along with T2w MRI information. The nonlinear neighborhood descriptors are acquired through anticipating the direct descriptors interested in the nonlinear high-dimensional space utilizing an unequivocal constituent guide also low-position guess through regulated complex regularization. The nearby neighbors of every near descriptor inside the data MR pictures are looked during an obliged spatial extent of the MR pictures among the training dataset. By that point, the pseudo-CT patches are evaluated through k-closest neighbor relapse. The planned procedure designed for pseudo-CT forecast is quantitatively broke downward on top of a dataset comprising of coordinated mind MRI along with CT pictures on or after 13 subjects.
The cognitive radio prototype performance is to alleviate the scarcity of spectral resources for wireless communication through intelligent sensing and quick resource allocation techniques. Secondary users (SU’s) actively obtain the spectrum access opportunity by supporting primary users (PU’s) in cognitive radio networks (CRNs). In present generation, spectrum access is endowed through cooperative communication-based link-level frame-based cooperative (LLC) principle. In this SUs independently act as conveyors for PUs to achieve spectrum access opportunities. Unfortunately, this LLC approach cannot fully exploit spectrum access opportunities to enhance the throughput of CRNs and fails to motivate PUs to join the spectrum sharing processes. Therefore, to overcome this con, network level cooperative (NLC) principle was used, where SUs are integrated mutually to collaborate with PUs session by session, instead of frame based cooperation for spectrum access opportunities. NLC approach has justified the challenges facing in LLC approach. In this paper we make a survey of some models that have been proposed to tackle the problem of LLC. We show the relevant aspects of each model, in order to characterize the parameters that we should take in account to achieve a spectrum access opportunity.
In this paper, the author provides insights and lessons that can be learned from colleagues at American universities about their online education experiences. The literature review and previous studies of online educations gains are explored and summarized in this research. Emerging trends in online education are discussed in detail, and strategies to implement these trends are explained. The author provides several tools and strategies that enable universities to ensure the quality of online education. At the end of this research paper, the researcher provides examples from Arab universities who have successfully implemented online education and expanded their impact on the society. This research provides a strategy and a model that can be used by universities in the Middle East as a roadmap to implement online education in their regions.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
2. IJEECS ISSN: 2502-4752
An Optimized FPGA Implementation of CAN 2.0 Protocol Error … (Md Farukh Hashmi)
603
researching is going on. With high data flow through such channels, there is a chance of
potentially high noise. Reliable detection of bit errors is very important to prevent data corruption
in such systems. In CAN, Cyclic Redundancy Check (CRC) is used to detect multi bit errors.
There are some works related to can protocol available in literature.Milind Khanapurkar
et al. in [4] proposed an automotive Black Box design intends for storing and retrieving the data
of various Electronics Controller Units (ECUS) on standards CAN protocol frame. The data thus
stored and retrieved can be used for introspection of cause of failure or unfortunate miss
happening with the vehile. Mazran Esro et al. [1] focused on method of application of CAN bus
system in place, the methods of controlling each station in the security system has changed
significantly. The system permits each station to send and receive data according to the
message priority.Reinder J Bril et al. [5] revisits the basic message response time analysis of
Controller Area Network (CAN) [6]. It was shown that existing response time analysis, as
presented as optimistic.
In this paper, we presented a technique to model the error detection circuitry of CAN
protocol using hardware description language (HDL).The HDL model is implemented on FPGA
platform in the laboratory environment. Logic circuit requirement and FPGA resource utilization
is presented. The estimated power consumption of the implementation is found to be 38mW
which is very suitable for battery power application. The resource utilization report shows that
very small amount of FPGA resources are used keeping ample scope to implement the rest of
the circuitry in the same FPGA.
The VHDL source code has been edited and synthesized using Xilinx ISE 13.1, and
then simulated and tested using ISim (VHDL/Verilog). Spartan 3A FPGA starter kit from Xilinx
has been used for downloading the design into Xilinx Spartan 3A FPGA chip. The design has
been tested in a hardware environment for different data inputs
The materials in this article are organized as follows: in Section II, a brief description of
the backgrouond of CAN protocol; problem formulation for CRC detection circuitary algorithm is
discussed in Section III; the methodoldogy for hardware modeling for error correction will be
described in Section IV; as well as the top-level design, RTL view; the simulation results and
discussion is given in Section V;In Section VI, FPGA implementation and synthesis results will
be concluded, at the end, a conclusion will be given in Section VII.
2. Background of CAN 2.0 Protocol
Controller Area Network (CAN) is a serial communications bus designed to provide
simple, efficient and robust communications for in-vehicle networks. CAN was developed by
Robert Bosch GmbH, beginning in 1983, and presented to a wider audience at the Society of
Automotive Engineers (SAE) Congress in 1986-effectively the birth of CAN. In 1987, the first
CAN controller chips were released by Intel (82526) and Philips (82C200). In the early 1990s,
Bosch submitted the CAN specification (Bosch, 1991) for standardization, leading to publication
of the first ISO standard for CAN (11898) in 1993 (ISO, 1993). Mercedes was the first
automotive manufacturer to deploy CAN in a production car, the 1991 S-class. By the mid
1990s, the complexity of automotive electronics was increasing rapidly [1]. The number of
networked Electronic Control Units (ECUs) in Mercedes, BMW, Audi and VW cars went from 5
or less at the beginning of the 1990s to around 40 at the turn of the millennium. With this
explosion in complexity traditional point-to-point wiring became increasingly expensive to
manufacture, install, and maintain due to the hundreds of separate connections and tens of
kilograms of copper wire required [7-8]. As a result CAN was rapidly adopted by the cost-
conscious automotive industry, providing an effective solution to the problems posed by
increasing vehicle electronics content. Following on from Mercedes, other manufacturers
including Volvo, Saab, BMW, Volkswagen, Ford, Renault, PSA, Fiat and others all adopted CAN
technology [9].
In order to distinguish standard and extended format the first reserved bit of the CAN
message format, as it is defined in CAN Specification 1.2, is used. This is done in such a way
that the message format in CAN Specification 1.2 is equivalent to the standard format and
therefore is still valid. Furthermore, the extended format has been defined so that messages in
standard format and extended format can coexist within the same network [10-11].
3. ISSN: 2502-4752
IJEECS Vol. 6, No. 3, June 2017 : 602 – 614
604
This CAN Specification 2.0 consists of two parts, with:
1. Part A describing the CAN message format as it is defined in CAN Specification
2. Part B describing both standard and extended message formats.
2.1. Message Format
In CAN data transmission is done using formatted message frames. There are two
protocols versions in which a CAN network may be configured namely 2.0A and 2.0B. The
former su2pports 11-bit message identifiers while the later supports 2.0B which supports both
11-bit and 29-bit identifiers. A data frame is shown in Figure 1. A data frame is composed of
seven different fields: start of frame, arbitration field, control field, data field, CRC field, Ack field
and end of frame. In CAN 2.0 A arbitration field consist of 11 bit identifier and RTR bit where as
in CAN 2.0B it consist of 29 bit identifier, IDF bit and RTR bit [12].
a. Data length code
The number of bytes in the data field is included by the data length code. This data
length code is 4bits wide and is transmitted within the control field .Here the admissible number
of data bytes (0,1…7,8). And other values may not be used. The DLC format is shown in the
Table 1.
2.2. Error Detection CAN
Data flow though channels may subject to unpredictable changes due to interference,
which may lead to change in the shape of the signal. For reliable communication error must be
detected. Error detection communication error must be detected. Error detection mechanism
uses redundancy means addition of extra bit information to the information. in CAN cyclic
redundancy check is used to detect multi bit errors [13-14].
Figure 1. Format of Data Frame
Explaining research chronological, including research design, research procedure (in
the form of algorithms, Pseudocode or other), how to test and data acquisition [1-3]. The
description of the course of research should be supported references, so the explanation can be
accepted scientifically [4-5].
3. Problem Formulation as a CRC-16 Error Detection Circuitry
3.1. Cyclic Redundancy Check (CRC-16)
In the CRC method, a certain number of check bits, often called a checksum, are
appended to the message being transmitted. The receiver can determine whether or not the
check bits agree with the data, to ascertain with a certain degree of probality whether or not an
error occurred in the transmission [15]. If an error occurred the receiver sends a ‘negative
acknowledgement (NAK) back to the sender, requesting that the message be transmitted. The
CRC is based on polynomial arithmetic. The redundancy bits used by CRC are derived by
dividing the data unit by a pre-determined divisor and the remainder is CRC, Addition and
Subtraction are done in modulo 2 that is, they are both the same as theexculisive or operator. In
this technique at Sender ‘side a sequence of redundant bits the CRC or the CRC remainder, is
4. IJEECS ISSN: 2502-4752
An Optimized FPGA Implementation of CAN 2.0 Protocol Error … (Md Farukh Hashmi)
605
appended to the end of a data unit so that the resulting data unit becomes exactly divisible by
the same predetermined binary number. At its destination, the incoming data unit a divided by
the same number. If at this step there is no remainder, the data unit is assumed to be intact and
is therefore accepted. A reminder indicates that the data unit has been damaged in transit and
therefore must be rejected [16-17].
a. At Sender’s Side
First n Numbers of 0s bits are appended to the original data where n is a less than the
predetermined divisor, which is n+1 bit.Secondaly, drawn out data unit is divided by divisor;
using binary divison.The remainder resulting from this division is the CRC. Third the CRC is
replaced with the 0s that has been appended in the first step. A CRC may consist of all 0s also.
b. At Receiver side
The receiver divides the whole data with the predetermined divisor that was used to find
the CRC remainder. If there is a change in data, the division yields a non zero remainder and
the data unit does not pass. The sender reminder and the data unit do not pass the sender side
and receiver side technique has been demonstrated in the Figure 2.
3.2. Algorithm for CRC Computation
The hardware implementation of cyclic Redundancy check computation is done by
using linear shift register (LFSR) the shift register is driven by a clock. At every clock pulse, the
input data is shifted in to the register in addition to transmitting the data. When all the input bits
have been processed, the shift register contains the CRC bits, which are then shifted out on the
data line. The algorithm is as follows.
Table 1. Representation for Data Length Code
Number of Bytes Data Length Code
DLC03 DLC02 DLC01 DLC00
0 d d d d
1 d d d r
2 d d r d
3 d d r r
4 d r d d
5 d r d r
6 d r r d
7 d r r r
8 r d d d
Abbreviations:-d ‘dominant’’ r ‘receive’
Figure 2. Cyclic Redundancy Check (CRC) Block Diagram
(i) Initialize the CRC register to all o-bits.
(ii) Get first/next message bit m.
(iii) Append (G-1) o bits to the original message
(iv) If the high –order bit of CRC is 1
(v) Shift CRC and m together 1 position and Xor the results with the low order r bits of G.
(vi) Otherwise, just shift CRC and m1 position.
5. ISSN: 2502-4752
IJEECS Vol. 6, No. 3, June 2017 : 602 – 614
606
Where G is generating polynomial and r is the degree of polynomial.
Polynomials: Instead of representing the data string in 1’s and 0s they are represented
in algebraic polynomials. The algebraic polynomials are very short to represent and also they
can used to prove the concept mathematically. Two important conditions while selecting
polynomials are it should not be divisible by x and it should be divisible but x+1.
4. Methodology for Hardware Modeling
The block diagram of the error detection mechanism of CAN is presented in the
Figure 3. The Entire circuitry has been divide into three main blocks; LFSR.CRC Generator and
a Counter. The input data bytes are applied to LFSR whose output is supplied to CRC
generator. The counter progresses through its count sequences and generates a pulse to latch
the output CRC generator based on the DLC input [18]. The output available from the CRC
generator is appended with the data field and transmitted over the network. In the receiver side
the CRC checking circuit is implanted using the same LFSR of Figure 4.
Figure 3. Block Diagram for CAN Bus Error Detector Implementation
Transmitter: CRC process can easily be implemented as a dividing circuit consisting of
exclusive OR gates and one bit shift registers. Implementation is as follows.
Process:
1. The input register contains N bit, equal to the length of the FCS.
2. There can be up to n exclusive OR gates.
3. The presence or absence of a gate corresponds to the presence of a term in the divisor
polynomial other than to the major significant to the polynomial.
4. Always there is a feedback from the highest corresponding shift register to the input and the
same feedback is fed to the other XOR gate, which is given below Figure 4 and Contents of
Shift Register at Transmitter is given in Table 1.
Figure 4. Implementation of CRC polynomial at Transmitter
6. IJEECS ISSN: 2502-4752
An Optimized FPGA Implementation of CAN 2.0 Protocol Error … (Md Farukh Hashmi)
607
Table 1. Contents of Shift Register at Transmitter
Figure 5. Implementation of CRC polynomial at Receiver
Receiver: At the receiver the same circuit deployed in the transmitter to formulate the
CRC will be deployed. In this case the information will be the received message which has been
transmitted from the transmitter M+R.
Process:
1. At the zero clock pulse or step 0, all shift registers reset to zero.
2. From Step 1 the received message will be input, one bit at a time with the most significant
bit. [11]
Contents of Shift Register at Reciever is given in Table 2.
Table 2. Contents of Shift Register at Reciever
7. ISSN: 2502-4752
IJEECS Vol. 6, No. 3, June 2017 : 602 – 614
608
4.1 Hardware Modules
4.1.1. Linear Feedback Shift Register (LFSR)
An n-bit LFSR is an n-bit length shift register with feedback to its input. The feedback is
formed by XORing or XNORing the outputs of selected stages of the shift register - referred to
as 'taps' - and then inputting this to the least significant bit (stage 0). Each stage has a common
clock. The 'linear' part of the term 'LFSR' derives from the fact that XOR and XNOR are linear
functions [18]. An example of a 5-bit LFSR is shown below Figure 5.
Figure 6. Implementation of Linear Feedback Shifft Register (LFSR)
This has taps at stages 1 and 4 with XOR feedback. Note also that the LS bit of the shift
register is, by convention, shown at the left hand side of the shift register, with the output being
taken from the MS bit at the right hand side. So what is it about a LFSR that makes it
interesting? It will produce a pseudorandom sequence of length 2n-1 states (where n is the
number of stages) if the LFSR is of maximal length. The sequence will then repeat from the
initial state for as long as the LFSR is clocked. Assume that the example LFSR above is set to
$1F after initialization. The output of the feedback XOR gate will be 0 (since 1 XOR 1 = 0) and
the first clock edge will load 0 into stage 0. [13] An LFSR is of 'maximal' length when the
sequence it generates passes through all possible 2n-1 values. The LFSR sequence depends
on the seed value, the tap positions and the feedback type. So far we have seen how to
implement LFSRs in VHDL such that any device can be targeted. Xilinx devices however, will
allow optimal implementation of LFSRs with their internal distributed RAM. This type of RAM is
available in the XC4000, Spartan/XL, Spartan-II and all Virtex families. Each CLB can be
configured as a RAM and this allows very compact shift registers to be built. [5]
4.1.2. Up-Down Counter
In digital logic and computing, a counter is a device which stores (and sometimes
displays) the number of times a particular event or process has occurred, often in relationship to
a clock signal.Counter that can change state in either direction, under the control of an up/down
selector input, is known as an up/down counter. When the selector is in the upstate the counter
increment its value. When the selector is in the down state, the counters decrement its
count [18].
Proceed through a well-defined sequence of states in response to count signal
3 Bit Up-counter: 000, 001, 010, 011, 100, 101, 110, 111, 000,...
3 Bit Down-counter: 111, 110, 101, 100, 011, 010, 001, 000, 111,...
A counter is a degenerate finite state machine/sequential circuit where the state is the
only output. A counter can be easily made by using T (Toggle) flip-flop [5]. An Example of
Up/Down Counter is shwn in Figure 7.
Figure 7. Implementation of Up/Down Counter
8. IJEECS ISSN: 2502-4752
An Optimized FPGA Implementation of CAN 2.0 Protocol Error … (Md Farukh Hashmi)
609
5. Simulation Results and Discussion
This design is implemented in VHDL platform using Xilinx ISE 13.1. The Register
transfer logic(RTL) and Internal RTl View view are shown in the Figure 8 and Figure 9. LFSR is
represented by 1st two blocks & the third block is CRC generator. The input data & DLC is
applied to the circuit and generates the CRC and Input Data at Tansmitter is presented in Figure
10.The simulation results of the CRC generator in the form of waveforms are presented in
Figure 11. Here input data is 10101010 is applied at the input of CRC & the output obtained is
100001110010001. Now the output CRC is appended taking the MSB first to the main data &
transmitted over the network. Figure 12 is showing the simulation waveform for CRC checker.
Here the transmitted data is checked by CRC checker. The input is data and the CRC. The
waveform shows that after 23rd clock the output is 0 which indicates no error. In Figure 13, an
error has been purposefully introduced in 16th clock period. The result in Figure 14 shows that
the output of CRC checker is non-zero meaning that an error has occurred during transmission.
Figure 8. RTL View of CRC -16 Can 2.0 Error Detector
Figure 9. Internal RTL View of CRC -16 Can 2.0 Error Detector
For Input data: It shows the input data given at transmitter side and also shows the
initial values that are assigned to the different registers and counters.
9. ISSN: 2502-4752
IJEECS Vol. 6, No. 3, June 2017 : 602 – 614
610
Figure 10. Input data at Transmitter
For Transmitter: This figure shows the CRC bits that are generated in CAN bus. Here
the CRC bits are appended with given input data and then transmitted.
Figure 11. Output waveforms for Transmitter
This figure shows the output at receiver side. The waveform shows that after 26rd clock
the output is 0 which indicates no error.
10. IJEECS ISSN: 2502-4752
An Optimized FPGA Implementation of CAN 2.0 Protocol Error … (Md Farukh Hashmi)
611
Figure 12. Output waveforms for Receiver
Output waveforms in Error Case:-
This figure shows output waveform at transmitter part in case of error. It generates the
CRC bits for transmitter when any error is occurred in given data.
Figure 13. Output Waveforms at Transmitter Side in case of Error
11. ISSN: 2502-4752
IJEECS Vol. 6, No. 3, June 2017 : 602 – 614
612
Output in case of Error
This figure shows the output at receiver side. The waveform shows that after 26rd clock
the output is non zero which indicates error.
Figure 14. Output Waveforms at Reciever Side in case of Error
6. FPGA Implementation and Synthesis Result
The design is implemented in Xilinx Spartan 3A (device XC3s400) FPGA platform.HDL
Synthesis report (Macro Statistics )and Advanced Synthesis report(Macro Statistics) of the
implementation is presented in Table 3 and Table 4.The devices has been used are adder,
multiplexers, registers and xors gates. The 7 bit counter uses an adder to increment its value.
The multiplexers are used in the CRC generator, Based on the value in DLC, the CRC
generator with the help of multiplexer selects one of the output instances from LFSR.Registers
have been used to store the data at different level of the CRC generation process.Seven, 1 –bit
XOR gates are used in LFSR to produce the new bit in the string for each clock pulse. Table 5
shows the Device Utilization Summary that the circuit utilizes a very small amount of the
available resources. The percentage of device utilization for number of slice Flip Flops, number
of 4 input LUTS, number of IOBS and numbers of GCLKS are shown. It has been found that the
estimated power consumption using Xilinx Xpower is very low and it is 38mW. The maximum
operating frequency found is 117.08 MHz’s
Table 3. HDL Synthesis Report Macro Statistics
#Counters 2
32-bit up cunter 2
#Register 26
1-bit register 23
16-bit register 2
23-bit register 1
#Comparators 1
32-bit comparator or less 1
# Xors 14
1-bit xor2 14
12. IJEECS ISSN: 2502-4752
An Optimized FPGA Implementation of CAN 2.0 Protocol Error … (Md Farukh Hashmi)
613
Table 4. Advanced HDL Synthesis Report (Macro Statistics)
#Counter 2
32- bit up counter 2
#Registers 78
Flip-Flops 78
#Comparators 1
32-bit Comparator Less 1
#Xors 14
1-bit Xor2 14
Table 4. Device Utilization Summary
Number of Slices 56 out of 3584 1%
Number of Slice Flip Flops 71 out of 7168 0%
Number of 4 Inputs LUTs 77 out of 7168 1%
Number of Bonded IOBs 26 out of 141 18%
Number of GCLKs 1 out of8 12%
TIMING REPORT: Timinng Analysis is presented in following Table 5.
Table 5. Timinng Analysis
Timing Parameter Calculated Results
Minimum period: 8.097ns (Maximum Frequency: 117.08 MHz.
Minimum input arrival time before clock: No path found
Maximum output required time after clock 12.426ns
Maximum combinational path delay: No path found No path found
7. Conclusion
A Technique to model the error detection circuitry of CAN protocol in VHDL is
described. The VHDL Model of CRC generator and checker is implemented on FPGA Xilinx ISE
13.1.The FPGA implementation result shows that the design is attractive from resource
utilization, power consumption and operating frequency Here we have utilized 114696 kilobyte
memory. The referred paper describes error circuitry in case of ‘no error’ our contribution – after
reviewing the paper we designed error controlling circuitry for CAN bus in case of error.
Usually components, like LFSR, XOR and Counters are used, so the entire circuit can
be easily designed. This approach is efficient both in terms of hardware, speed and power
cocsumption. The additional hardware required is very simple. This technique works efficiently
in case of ASIC design also. We have shown that hardware implementation on FPGA can be
effectively used to improve the performance of CRC implementation for CAN protocol.
References
[1] Shukla, Sunil, and Neil W. Bergmann. Single bit error correction implementation in CRC-16 on FPGA.
Poceedings of the IEEE International Conference on Field-Programmable Technology. Brisbane,
Australia. 2004; 319-322.
[2] Al-Ali Y, Al-Habian G, Saifi S, Al-Rousan M. Automobile Black Box for Accident Simulation. CSIDC.
American University of Sharjah. 2005.
[3] Specification C.A. N. Version 2.0. Robert Bosch GmbH. 1991 Sep.
[4] M Khanapurkar, P Bajaj, SDH Wandhare. Design approach for VHDl and FPGA Implementation of
Automotive Black Box using Can Protocol. International journal of Computer Science and Network
Security. 2008; 8(9): 214-218.
[5] M Esro, AA Basari, S Kumar, A Sahiqin MI, Z Syariff. Controller Area Network (Can) Application in
security System. World Academy of Science, Engineering and Technology. 2009; 59: 299-302.
[6] Eisenreich, Dan, and Brian De Muth. Designing Embedded Internet Devices. Newnes. USA: Elsevier
Science. 2003; 467-482.
[7] BA Forouzen, Chapter 10. Data Communication and Networking. 3rd ed. Tata Mcgraw-Hill publishing
Company Limited. 2004; 243-252.
[8] Xing W, Chen H and Ding H. The application of controller area network on vehicle. Proceedings of
the IEEE International on Vehicle Electronics Conference. 1999; 455-458.
13. ISSN: 2502-4752
IJEECS Vol. 6, No. 3, June 2017 : 602 – 614
614
[9] Carvalho FC, Jansch-Pôrto I, Freitas EP, Pereira CE. The TinyCAN: an optimized CAN controller IP
for FPGA-based platforms. Proceedings of the 10th IEEE Conference on Emerging Technologies and
Factory Automation.The TinyCAN: An Optimized CAN Controller IP for FPGA-Based Platform.
Catania, Italy. 2005; 374-377.
[10] Donchev B, Hristov M. Implementation of CAN controller with FPGA structures. Proceedings of the
IEEE 7th International Conference on the Experience of Designing and Application of CAD Systems
in Microelectronics. Lviv–Slavsko, Ukraine. 2003; 577-580.
[11] Khanapurkar M, Bajaj P, Gharode D. A design approach for intelligent vehicle black box system with
intra-vehicular communication using lin/flex-ray protocols. Proceedings of the IEEE International
Conference on Industrial Technology. Chengdu, China. 2008; 1-6.
[12] Koopman, Philip, and Tridib Chakravarty. Cyclic redundancy code (CRC) polynomial selection for
embedded networks. Poceedings of the IEEE International Conference on Dependable Systems
and Networks. Florence, Italy. 2004; 145-154.
[13] Peterson, William Wesley, and Daniel T Brown. Cyclic codes for error detection. Proceedings of the
IRE. 1961; 49(1): 228-235.
[14] Rajib Sarkar & Bijoy Kumar. Design of VHDL Based Error Detection Circuitry in CAN. Poceedings of
the international Conference on Emerging Trends in Engineering & Technology. 2010; 106-110.
[15] Williams, Ross. A painless guide to CRC error detection algorithms. Internet publication, August
1993.
[16] Jagannathan Sarangapani, Krishna Chaitany Emani, Keong Kam, Maciej Zawodniok Yahong Rosa
Zheng. Improvement of can bus performance by using error-correction codes. Department of
Electrical and Computer Engineering, University of Missouri-Rolla.
[17] Emani, Krishna Chaitanya, Keong Kam, and Maciej Zawodniok. Improvement of CAN bus
performance by using error-correction codes. Proceedings of the IEEE Region 5 Technical
Conference, Fayetteville, AR. 2007; 205-210
[18] Bhasker, Jayaram. A VHDL Primer. PHI Pvt. Ltd 3, 2008.