keywords; Data flow analysis, control dependency .
Program analysis is the method of computing properties of a program.It is useful for performing program optimiztion
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...IJECEIAES
The document describes a proposed joint source-channel coding (JSCC) system that exploits 2-dimensional source correlation in channel decoding with parameter estimation. The system uses a modified Bahl-Cocke-Jelinek-Raviv (BCJR) algorithm at the decoder to exploit source correlation on rows and columns of a 2D source. A parameter estimation technique based on the Baum-Welch algorithm is used jointly with the decoder to estimate source correlation parameters at the receiver since these parameters are not always known in practice. Simulation results show that the proposed coding scheme that performs joint decoding and parameter estimation performs very close to an ideal 2D JSCC system with perfect knowledge of source correlation parameters.
Pattern-based Definition and Generation of Components for a Synchronous React...ijeukens
This document discusses a method for specifying components in a synchronous reactive actor-oriented language and automatically generating code from those specifications to guarantee the components are correct with respect to the language's semantics. The method enhances component interfaces with patterns of required input data that capture possible conditions for output generation. Algorithms are described for generating code from interfaces with patterns to ensure the code is consistent with the synchronous reactive semantics. A case study demonstrates the usefulness of the approach.
Model Based Software Timing Analysis Using Sequence Diagram for Commercial Ap...iosrjce
This document presents a framework for software timing analysis using UML sequence diagrams. The framework involves first gathering requirements and creating a sequence diagram. The sequence diagram is then converted to a label transition graph. Algorithms are applied to reduce the graph to a path expression and determine the minimum and maximum path lengths, representing the minimum and maximum timings. A case study applying this process to the timing analysis of a purchasing process in a mall is presented as an example. The advantage of this approach is that timing requirements can be identified early in the requirements stage from the UML models.
Brief description on subprograms and functions it helps to u . In any case u cn understand the descripion and concepts with easy manner. I think it helps to u
ENHANCING COMPUTATIONAL EFFORTS WITH CONSIDERATION OF PROBABILISTIC AVAILABL...Raja Larik
This document proposes a Probabilistic Collocation Method (PCM) to improve probabilistic load flow (PLF) computation methods and model network topology uncertainties. PCM uses probability distribution functions to model the impact of uncertainties as a linear function of power injections. It maintains the linear relationship between line flows and power injections. The method is examined using the IEEE 39-bus test system and compared to Monte Carlo simulation, showing significantly reduced computational efforts while maintaining accuracy.
A novel methodology for test scenario generation based on control flow analys...eSAT Publishing House
This document presents a novel methodology for generating test scenarios from UML 2.x sequence diagrams. It proposes constructing an intermediate control flow graph called a Sequence Control Flow Graph (SCFG) by analyzing the control flow in UML sequence diagrams. It also proposes a test scenario generation algorithm called STSGA that systematically generates test scenarios from the SCFG to test software in the early design phase and help testers later in the development cycle. The approach aims to address the challenges of fragments like alt, loop, break, par, and opt in UML sequence diagrams.
keywords; Data flow analysis, control dependency .
Program analysis is the method of computing properties of a program.It is useful for performing program optimiztion
Exploiting 2-Dimensional Source Correlation in Channel Decoding with Paramete...IJECEIAES
The document describes a proposed joint source-channel coding (JSCC) system that exploits 2-dimensional source correlation in channel decoding with parameter estimation. The system uses a modified Bahl-Cocke-Jelinek-Raviv (BCJR) algorithm at the decoder to exploit source correlation on rows and columns of a 2D source. A parameter estimation technique based on the Baum-Welch algorithm is used jointly with the decoder to estimate source correlation parameters at the receiver since these parameters are not always known in practice. Simulation results show that the proposed coding scheme that performs joint decoding and parameter estimation performs very close to an ideal 2D JSCC system with perfect knowledge of source correlation parameters.
Pattern-based Definition and Generation of Components for a Synchronous React...ijeukens
This document discusses a method for specifying components in a synchronous reactive actor-oriented language and automatically generating code from those specifications to guarantee the components are correct with respect to the language's semantics. The method enhances component interfaces with patterns of required input data that capture possible conditions for output generation. Algorithms are described for generating code from interfaces with patterns to ensure the code is consistent with the synchronous reactive semantics. A case study demonstrates the usefulness of the approach.
Model Based Software Timing Analysis Using Sequence Diagram for Commercial Ap...iosrjce
This document presents a framework for software timing analysis using UML sequence diagrams. The framework involves first gathering requirements and creating a sequence diagram. The sequence diagram is then converted to a label transition graph. Algorithms are applied to reduce the graph to a path expression and determine the minimum and maximum path lengths, representing the minimum and maximum timings. A case study applying this process to the timing analysis of a purchasing process in a mall is presented as an example. The advantage of this approach is that timing requirements can be identified early in the requirements stage from the UML models.
Brief description on subprograms and functions it helps to u . In any case u cn understand the descripion and concepts with easy manner. I think it helps to u
ENHANCING COMPUTATIONAL EFFORTS WITH CONSIDERATION OF PROBABILISTIC AVAILABL...Raja Larik
This document proposes a Probabilistic Collocation Method (PCM) to improve probabilistic load flow (PLF) computation methods and model network topology uncertainties. PCM uses probability distribution functions to model the impact of uncertainties as a linear function of power injections. It maintains the linear relationship between line flows and power injections. The method is examined using the IEEE 39-bus test system and compared to Monte Carlo simulation, showing significantly reduced computational efforts while maintaining accuracy.
A novel methodology for test scenario generation based on control flow analys...eSAT Publishing House
This document presents a novel methodology for generating test scenarios from UML 2.x sequence diagrams. It proposes constructing an intermediate control flow graph called a Sequence Control Flow Graph (SCFG) by analyzing the control flow in UML sequence diagrams. It also proposes a test scenario generation algorithm called STSGA that systematically generates test scenarios from the SCFG to test software in the early design phase and help testers later in the development cycle. The approach aims to address the challenges of fragments like alt, loop, break, par, and opt in UML sequence diagrams.
Erlang uses pattern matching rather than variable assignment. When using the = symbol in Erlang, it matches the left-hand side to the right-hand side rather than assigning a value. This means a variable can only be matched once - a bound variable cannot be reused like in other languages. So a statement like A = A + 1 would generate an error, as it is trying to match the already bound variable A to a new value.
This document discusses the history and development of container networking and service discovery solutions. It describes how Mesosphere developed DC/OS to provide networking features like load balancing and service discovery using Erlang microservices including Spartan, Minuteman, and Lashup. Spartan provides high availability DNS, Minuteman provides distributed load balancing, and Lashup uses HyParView to maintain global network state across the cluster. The document outlines how these services were developed to enable dynamic container networking and service discovery.
Erlang and the Cloud: A Fractal Approach to ThroughputWooga
This document summarizes a talk about building scalable systems for the cloud using Erlang. The speaker discusses how Erlang processes with local state (gen_servers) can act as units of throughput that can be composed across cloud computing instances to scale applications. By treating each gen_server as an independent unit of throughput, systems can leverage the elastic computing resources of the cloud in a loosely coupled way to easily scale up as more instances are added. In contrast to traditional monolithic architectures, this approach allows for fractal-like scaling where the overall structure remains similar at different scales.
Erlang is a programming language well-suited for concurrent, distributed, and fault-tolerant applications. It was designed by Ericsson to build systems with many concurrent processes communicating asynchronously through message passing. Erlang uses functional programming concepts like immutable data and pattern matching. It allows hot code swapping to upgrade systems on the fly and scales well across multiple CPU cores through its built-in support for symmetric multiprocessing.
The document summarizes the history and features of the Erlang programming language. It discusses how Erlang was developed at Ericsson in the 1980s to build robust, distributed telecom systems. It highlights Erlang's strengths like concurrency, distribution, hot code loading and fault tolerance. Examples are given of large Erlang projects at Ericsson and how the language enables high reliability, scalability and productivity. Popular open source and commercial products using Erlang are also listed.
Erlang is a functional, concurrency-oriented, distributive, fault-tolerant programming language. It was designed for writing concurrent programs that "run forever" with a focus on fault tolerance through processes and message passing. Erlang uses processes, message passing, and distribution to enable concurrency and high availability.
This document discusses capacity planning for GSM networks. It covers topics like trunking, traffic theory including traffic intensity, grade of service, busy hour, and request rate. It describes how to dimension traffic channels and SDCCH channels based on factors like traffic intensity and grade of service. It also discusses connectivity planning between network elements like MSC, BSC, transcoder, and BTS. It provides details on air interface, Abis interface between BSC and BTS, and different LAPD modes for signaling concentration over Abis. The objective is to estimate the optimal number of resources needed to meet performance requirements based on traffic analysis and engineering principles.
Отладка производительности приложения на Erlang / Максим Лапшин (Erlyvideo)Ontico
Байткод эрланга выполняет очень хорошо отлаженная виртуальная машина BEAM, которая превосходно работает даже на современных 72-х и более ядерных компьютерах.
Ключевая возможность эрланга в том, чтобы использовать все ядра в одном приложении, т.е. иметь в памяти одни и те же данные и обеспечивать к ним доступ без запуска кучи экземпляров одного и того же приложения по количеству ядер.
С ростом обрабатываемого трафика данных начинают возникать проблемы с многоядерным доступом к данным, возникают бутылочные горлышки и более низкоуровневые проблемы синхронизации.
В этом докладе будет рассказано, какие есть методы поиска, анализа, замера и устранения различных проблем, связанных с многотредностью: синглтонные процессы, простаивания на мьютексах и т.п.
Cellular wireless systems like GSM suffer from congestion resulting in overall system degradation and poor service delivery. When the traffic demand in a geographical area is high, the input traffic rate will exceed thecapacity of the output lines. This work focused on homogenous wireless network (the network traffic and resource dimensioning that are statistically identical) such that the network performance
evaluation can be reduced to a system with single cell and a single traffic type. Such system can employa queuing model to evaluate the performance metric of a cell in terms of blocking probability.
Five congestion control models were compared in the work to ascertain their peculiarities, they are Erlang B, Erlang C, Engset (cleared), Engset (buffered), and Bernoulli. To analyze the system, an aggregate onedimensional Markov chain wasderived, such that it describes a call arrival process under the assumption
that it is Poisson distributed. The models were simulated and their results show varying performances, however the Bernoulli model (Pb5) tends to show a situation that allows more users access to the system and the congestion level remain unaffected despite increase in the number of users and the offered traffic into the system.
This document describes simulations of queueing systems including M/M/1, M/H2/1, M/E2/1, and M/G/k queues. It plots the average queuing delay, probability of server being idle, and average number of customers for each queue as the load increases. The simulations validate Little's law and the Pollaczek-Khinchine formula. Results show the M/E2/1 queue performs best while M/H2/1 performs worst for the same load, and the M/G/k queue simulations match theoretical values as the number of busy servers is calculated.
Transient Monitoring Function based Fault Classifier for Relaying Applications IJECEIAES
This paper proposes Transient monitoring function (TMF) based fault classification approach for transmission line protection. The classifier provides accurate results under various system conditions involving fault resistance, inception angle, location and load angle. The transient component during fault is measured by TMF and appropriate logics applied for fault classification. Simulation studies using MATLAB ® /SIMULINK ™ are carried out for a 400 kV, 50 Hz power system with variable system conditions. Results show that the proposed classifier has high classification accuracy. The method developed has been compared with a fault classification technique based on Discrete Wavelet Transform (DWT). The proposed technique can be implemented for real time protection schemes employing distance relaying.
1) The document presents a model for estimating the earnings of a mobile communication network using sensitivity analysis.
2) The model uses five parameters related to mobile traffic intensity - number of users, number of calls, call duration, initial cost per call duration, and price per call duration - to estimate profits under different scenarios.
3) Sensitivity analysis via tornado graphs show that profits are most sensitive to the number of calls and call duration. This suggests companies should focus on increasing these factors to maximize earnings.
ICI and PAPR enhancement in MIMO-OFDM system using RNS codingIJECEIAES
The Inter-Carrier-Interference (ICI) is considered a bottleneck in the utilization of Multiple-Input-Multiple-Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) systems, due to the sensitivity of the OFDM towards frequency offsets which lead to loss of orthogonality, interference and performance degradation. In this paper Residue Numbers as a coding scheme is impeded in MIMO-OFDM systems, where the ICI levels is measured and evaluated with respect to conventional ICI mitigation techniques implemented in MIMO-OFDM. The Carrier-to-Interference Ratio (CIR), the system Bit-Error-Rate (BER) and the Complementary Cumulative Distribution Function (CCDF) for MIMO-OFDM system with Residue Number System (RNS) coding are analyzed and evaluated. The results had demonstrated a performance of transmission model with and without RNS.
Design of optimized Interval Arithmetic MultiplierVLSICS Design
Many DSP and Control applications that require the user to know how various numerical errors(uncertainty) affect the result. This uncertainty is eliminated by replacing non-interval values with intervals. Since most DSPs operate in real time environments, fast processors are required to implement interval arithmetic. The goal is to develop a platform in which Interval Arithmetic operations are performed at the same computational speed as present day signal processors. So we have proposed the design and implementation of Interval Arithmetic multiplier, which operates with IEEE 754 numbers. The proposed unit consists of a floating point CSD multiplier, Interval operation selector. This architecture implements an algorithm which is faster than conventional algorithm of Interval multiplier . The cost overhead of the proposed unit is 30% with respect to a conventional floating point multiplier. The
performance of proposed architecture is better than that of a conventional CSD floating-point multiplier, as it can perform both interval multiplication and floating-point multiplication as well as Interval comparisons
1) The document describes a proposed fault tolerant controller system (FTCS) strategy for temperature control of an air conditioning system. The FTCS is designed to be robust against noise, sensor failures, disturbances, and parameter variations while maintaining optimal performance.
2) A mathematical model is developed consisting of models for the heat exchanger and conditioning space. A neural network model is also developed to model the system dynamics.
3) The neural network is trained using a backpropagation algorithm to minimize the mean squared error between the network outputs and actual system outputs over time. Training results show the network can accurately model the system.
Peak detection using wavelet transformIJCNCJournal
A new work based-wavelet transform is designed to overcome one of the main drawbacks that found in the
present new technologies. Orthogonal Frequency Division Multiplexing (OFDM)is proposed in the
literature to enhance the multimedia resolution. However, the high peak power (PAPR) values will obstruct
such achievements. Therefore, a new proposition is found in this work, making use of the wavelet
transforms methods, and it is divided into three main stages; de-noising stage, thresholding stage and then
the replacement stage.
In order to check the system stages validity; a mathematical model has been built and its checked after
using a MATLAB simulation. A simulated bit error rate (BER) achievement will be compared with our
previously published work, where an enhancement from 8×10-1 to be 5×10-1 is achieved. Moreover, these
results will be compared to the work found in the literature, where we have accomplished around 27%
PAPR extra reduction.
As a result, the BER performance has been improved for the same bandwidth occupancy. Moreover and
due to the de-noise stage, the verification rate has been improved to reach 81%. This is in addition to the
noise immunity enhancement.
Computationally Efficient Multi-Antenna Techniques for Multi-User Two-Way Wire...IJECEIAES
In this work, we are interested in implementing, developing and evaluating multi-antenna techniques used for multi-user two-way wireless relay networks that provide a good tradeoff between the computational complexity and performance in terms of symbol error rate and achievable data rate. In particular, a variety of newly multi-antenna techniques is proposed and studied. Some techniques based on orthogonal projection enjoy low computational complexity. However, the performance penalty associated with them is high. Other techniques based on maximum likelihood strategy enjoy high performance, however, they suffer from very high computational complexity. The Other techniques based on randomization strategy provide a good trade-off between the computational complexity and performance where they enjoy low computational complexity with almost the same performance as compared to the techniques based on maximum likelihood strategy.
This document proposes using continuous wavelet transform (CWT) with a complex Morlet wavelet to detect low frequency oscillations in a power system. CWT is applied to signals measured from a two-area four-machine power system model. The results extract the frequency and damping of inter-area oscillations, which closely match those obtained from eigenvalue analysis. This demonstrates CWT as an effective technique for identifying low frequency oscillations in power systems.
Differential equation fault location algorithm with harmonic effects in power...TELKOMNIKA JOURNAL
About 80% of faults in the power system distribution are earth faults. Studies to find effective methods to identify and locate faults in distribution networks are still relevant, in addition to the presence of harmonic signals that distort waves and create deviations in the power system that can cause many problems to the protection relay. This study focuses on a single line-to-ground (SLG) fault location algorithm in a power system distribution network based on fundamental frequency measured using the differential equation method. The developed algorithm considers the presence of harmonics components in the simulation network. In this study, several filters were tested to obtain the lowest fault location error to reduce the effect of harmonic components on the developed fault location algorithm. The network model is simulated using the alternate transients program (ATP)Draw simulation program. Several fault scenarios have been implemented during the simulation, such as fault resistance, fault distance, and fault inception angle. The final results show that the proposed algorithm can estimate the fault distance successfully with an acceptable fault location error. Based on the simulation results, the differential equation continuous wavelet technique (CWT) filter-based algorithm produced an accurate fault location result with a mean average error (MAE) of less than 5%.
Comparative Analysis of PWM Techniques for Three Level Diode Clamped Voltage ...IAES-IJPEDS
Multilevel inverters are increasingly being used in high-power medium voltage industrial drive applications due to their superior performance compared to conventional two-level inverters. Thre are a number of Pulse width modulation (PWM) techniques applied in recent years. The most widely applied PWM techniques are Sine Pulse Width Modulation (SPWM) and Space Vector Pulse Width Modulation (SVPWM). SPWM is the most simple modulation technique that can realize easily in analog circuit. However, it has some drawbacks such as higher total harmonic distortion (THD), lower effective DC utilization and lower switching frequency. Space vector pulse width modulation (SVPWM) is widely used because of their easier digital realization and better DC bus utilization and lower THD. The complexity is due to the difficulty in determining the reference vector location, on times calculation, and switching states selection. This paper presents a simple SVPWM algorithm for diode clamped three level inverters based on standard two-level SVPWM which can easily determine the location of reference vector, calculate the on-times, the selection of switching states. Three level diode clamped inverter (3LDCI) using space vector modulation technique has been modeled and simulated using MATLAB/SIMULINK and Origin 6.1 with a passive R-L load that can be extended to any level. Simulation results are presented to verify the proposed SVPWM control in terms of THD. The results arecompared with conventional sinusoidal pulse width modulation (SPWM) where SVPWM shows better performance than SPWM in terms of THD.
Erlang uses pattern matching rather than variable assignment. When using the = symbol in Erlang, it matches the left-hand side to the right-hand side rather than assigning a value. This means a variable can only be matched once - a bound variable cannot be reused like in other languages. So a statement like A = A + 1 would generate an error, as it is trying to match the already bound variable A to a new value.
This document discusses the history and development of container networking and service discovery solutions. It describes how Mesosphere developed DC/OS to provide networking features like load balancing and service discovery using Erlang microservices including Spartan, Minuteman, and Lashup. Spartan provides high availability DNS, Minuteman provides distributed load balancing, and Lashup uses HyParView to maintain global network state across the cluster. The document outlines how these services were developed to enable dynamic container networking and service discovery.
Erlang and the Cloud: A Fractal Approach to ThroughputWooga
This document summarizes a talk about building scalable systems for the cloud using Erlang. The speaker discusses how Erlang processes with local state (gen_servers) can act as units of throughput that can be composed across cloud computing instances to scale applications. By treating each gen_server as an independent unit of throughput, systems can leverage the elastic computing resources of the cloud in a loosely coupled way to easily scale up as more instances are added. In contrast to traditional monolithic architectures, this approach allows for fractal-like scaling where the overall structure remains similar at different scales.
Erlang is a programming language well-suited for concurrent, distributed, and fault-tolerant applications. It was designed by Ericsson to build systems with many concurrent processes communicating asynchronously through message passing. Erlang uses functional programming concepts like immutable data and pattern matching. It allows hot code swapping to upgrade systems on the fly and scales well across multiple CPU cores through its built-in support for symmetric multiprocessing.
The document summarizes the history and features of the Erlang programming language. It discusses how Erlang was developed at Ericsson in the 1980s to build robust, distributed telecom systems. It highlights Erlang's strengths like concurrency, distribution, hot code loading and fault tolerance. Examples are given of large Erlang projects at Ericsson and how the language enables high reliability, scalability and productivity. Popular open source and commercial products using Erlang are also listed.
Erlang is a functional, concurrency-oriented, distributive, fault-tolerant programming language. It was designed for writing concurrent programs that "run forever" with a focus on fault tolerance through processes and message passing. Erlang uses processes, message passing, and distribution to enable concurrency and high availability.
This document discusses capacity planning for GSM networks. It covers topics like trunking, traffic theory including traffic intensity, grade of service, busy hour, and request rate. It describes how to dimension traffic channels and SDCCH channels based on factors like traffic intensity and grade of service. It also discusses connectivity planning between network elements like MSC, BSC, transcoder, and BTS. It provides details on air interface, Abis interface between BSC and BTS, and different LAPD modes for signaling concentration over Abis. The objective is to estimate the optimal number of resources needed to meet performance requirements based on traffic analysis and engineering principles.
Отладка производительности приложения на Erlang / Максим Лапшин (Erlyvideo)Ontico
Байткод эрланга выполняет очень хорошо отлаженная виртуальная машина BEAM, которая превосходно работает даже на современных 72-х и более ядерных компьютерах.
Ключевая возможность эрланга в том, чтобы использовать все ядра в одном приложении, т.е. иметь в памяти одни и те же данные и обеспечивать к ним доступ без запуска кучи экземпляров одного и того же приложения по количеству ядер.
С ростом обрабатываемого трафика данных начинают возникать проблемы с многоядерным доступом к данным, возникают бутылочные горлышки и более низкоуровневые проблемы синхронизации.
В этом докладе будет рассказано, какие есть методы поиска, анализа, замера и устранения различных проблем, связанных с многотредностью: синглтонные процессы, простаивания на мьютексах и т.п.
Cellular wireless systems like GSM suffer from congestion resulting in overall system degradation and poor service delivery. When the traffic demand in a geographical area is high, the input traffic rate will exceed thecapacity of the output lines. This work focused on homogenous wireless network (the network traffic and resource dimensioning that are statistically identical) such that the network performance
evaluation can be reduced to a system with single cell and a single traffic type. Such system can employa queuing model to evaluate the performance metric of a cell in terms of blocking probability.
Five congestion control models were compared in the work to ascertain their peculiarities, they are Erlang B, Erlang C, Engset (cleared), Engset (buffered), and Bernoulli. To analyze the system, an aggregate onedimensional Markov chain wasderived, such that it describes a call arrival process under the assumption
that it is Poisson distributed. The models were simulated and their results show varying performances, however the Bernoulli model (Pb5) tends to show a situation that allows more users access to the system and the congestion level remain unaffected despite increase in the number of users and the offered traffic into the system.
This document describes simulations of queueing systems including M/M/1, M/H2/1, M/E2/1, and M/G/k queues. It plots the average queuing delay, probability of server being idle, and average number of customers for each queue as the load increases. The simulations validate Little's law and the Pollaczek-Khinchine formula. Results show the M/E2/1 queue performs best while M/H2/1 performs worst for the same load, and the M/G/k queue simulations match theoretical values as the number of busy servers is calculated.
Transient Monitoring Function based Fault Classifier for Relaying Applications IJECEIAES
This paper proposes Transient monitoring function (TMF) based fault classification approach for transmission line protection. The classifier provides accurate results under various system conditions involving fault resistance, inception angle, location and load angle. The transient component during fault is measured by TMF and appropriate logics applied for fault classification. Simulation studies using MATLAB ® /SIMULINK ™ are carried out for a 400 kV, 50 Hz power system with variable system conditions. Results show that the proposed classifier has high classification accuracy. The method developed has been compared with a fault classification technique based on Discrete Wavelet Transform (DWT). The proposed technique can be implemented for real time protection schemes employing distance relaying.
1) The document presents a model for estimating the earnings of a mobile communication network using sensitivity analysis.
2) The model uses five parameters related to mobile traffic intensity - number of users, number of calls, call duration, initial cost per call duration, and price per call duration - to estimate profits under different scenarios.
3) Sensitivity analysis via tornado graphs show that profits are most sensitive to the number of calls and call duration. This suggests companies should focus on increasing these factors to maximize earnings.
ICI and PAPR enhancement in MIMO-OFDM system using RNS codingIJECEIAES
The Inter-Carrier-Interference (ICI) is considered a bottleneck in the utilization of Multiple-Input-Multiple-Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) systems, due to the sensitivity of the OFDM towards frequency offsets which lead to loss of orthogonality, interference and performance degradation. In this paper Residue Numbers as a coding scheme is impeded in MIMO-OFDM systems, where the ICI levels is measured and evaluated with respect to conventional ICI mitigation techniques implemented in MIMO-OFDM. The Carrier-to-Interference Ratio (CIR), the system Bit-Error-Rate (BER) and the Complementary Cumulative Distribution Function (CCDF) for MIMO-OFDM system with Residue Number System (RNS) coding are analyzed and evaluated. The results had demonstrated a performance of transmission model with and without RNS.
Design of optimized Interval Arithmetic MultiplierVLSICS Design
Many DSP and Control applications that require the user to know how various numerical errors(uncertainty) affect the result. This uncertainty is eliminated by replacing non-interval values with intervals. Since most DSPs operate in real time environments, fast processors are required to implement interval arithmetic. The goal is to develop a platform in which Interval Arithmetic operations are performed at the same computational speed as present day signal processors. So we have proposed the design and implementation of Interval Arithmetic multiplier, which operates with IEEE 754 numbers. The proposed unit consists of a floating point CSD multiplier, Interval operation selector. This architecture implements an algorithm which is faster than conventional algorithm of Interval multiplier . The cost overhead of the proposed unit is 30% with respect to a conventional floating point multiplier. The
performance of proposed architecture is better than that of a conventional CSD floating-point multiplier, as it can perform both interval multiplication and floating-point multiplication as well as Interval comparisons
1) The document describes a proposed fault tolerant controller system (FTCS) strategy for temperature control of an air conditioning system. The FTCS is designed to be robust against noise, sensor failures, disturbances, and parameter variations while maintaining optimal performance.
2) A mathematical model is developed consisting of models for the heat exchanger and conditioning space. A neural network model is also developed to model the system dynamics.
3) The neural network is trained using a backpropagation algorithm to minimize the mean squared error between the network outputs and actual system outputs over time. Training results show the network can accurately model the system.
Peak detection using wavelet transformIJCNCJournal
A new work based-wavelet transform is designed to overcome one of the main drawbacks that found in the
present new technologies. Orthogonal Frequency Division Multiplexing (OFDM)is proposed in the
literature to enhance the multimedia resolution. However, the high peak power (PAPR) values will obstruct
such achievements. Therefore, a new proposition is found in this work, making use of the wavelet
transforms methods, and it is divided into three main stages; de-noising stage, thresholding stage and then
the replacement stage.
In order to check the system stages validity; a mathematical model has been built and its checked after
using a MATLAB simulation. A simulated bit error rate (BER) achievement will be compared with our
previously published work, where an enhancement from 8×10-1 to be 5×10-1 is achieved. Moreover, these
results will be compared to the work found in the literature, where we have accomplished around 27%
PAPR extra reduction.
As a result, the BER performance has been improved for the same bandwidth occupancy. Moreover and
due to the de-noise stage, the verification rate has been improved to reach 81%. This is in addition to the
noise immunity enhancement.
Computationally Efficient Multi-Antenna Techniques for Multi-User Two-Way Wire...IJECEIAES
In this work, we are interested in implementing, developing and evaluating multi-antenna techniques used for multi-user two-way wireless relay networks that provide a good tradeoff between the computational complexity and performance in terms of symbol error rate and achievable data rate. In particular, a variety of newly multi-antenna techniques is proposed and studied. Some techniques based on orthogonal projection enjoy low computational complexity. However, the performance penalty associated with them is high. Other techniques based on maximum likelihood strategy enjoy high performance, however, they suffer from very high computational complexity. The Other techniques based on randomization strategy provide a good trade-off between the computational complexity and performance where they enjoy low computational complexity with almost the same performance as compared to the techniques based on maximum likelihood strategy.
This document proposes using continuous wavelet transform (CWT) with a complex Morlet wavelet to detect low frequency oscillations in a power system. CWT is applied to signals measured from a two-area four-machine power system model. The results extract the frequency and damping of inter-area oscillations, which closely match those obtained from eigenvalue analysis. This demonstrates CWT as an effective technique for identifying low frequency oscillations in power systems.
Differential equation fault location algorithm with harmonic effects in power...TELKOMNIKA JOURNAL
About 80% of faults in the power system distribution are earth faults. Studies to find effective methods to identify and locate faults in distribution networks are still relevant, in addition to the presence of harmonic signals that distort waves and create deviations in the power system that can cause many problems to the protection relay. This study focuses on a single line-to-ground (SLG) fault location algorithm in a power system distribution network based on fundamental frequency measured using the differential equation method. The developed algorithm considers the presence of harmonics components in the simulation network. In this study, several filters were tested to obtain the lowest fault location error to reduce the effect of harmonic components on the developed fault location algorithm. The network model is simulated using the alternate transients program (ATP)Draw simulation program. Several fault scenarios have been implemented during the simulation, such as fault resistance, fault distance, and fault inception angle. The final results show that the proposed algorithm can estimate the fault distance successfully with an acceptable fault location error. Based on the simulation results, the differential equation continuous wavelet technique (CWT) filter-based algorithm produced an accurate fault location result with a mean average error (MAE) of less than 5%.
Comparative Analysis of PWM Techniques for Three Level Diode Clamped Voltage ...IAES-IJPEDS
Multilevel inverters are increasingly being used in high-power medium voltage industrial drive applications due to their superior performance compared to conventional two-level inverters. Thre are a number of Pulse width modulation (PWM) techniques applied in recent years. The most widely applied PWM techniques are Sine Pulse Width Modulation (SPWM) and Space Vector Pulse Width Modulation (SVPWM). SPWM is the most simple modulation technique that can realize easily in analog circuit. However, it has some drawbacks such as higher total harmonic distortion (THD), lower effective DC utilization and lower switching frequency. Space vector pulse width modulation (SVPWM) is widely used because of their easier digital realization and better DC bus utilization and lower THD. The complexity is due to the difficulty in determining the reference vector location, on times calculation, and switching states selection. This paper presents a simple SVPWM algorithm for diode clamped three level inverters based on standard two-level SVPWM which can easily determine the location of reference vector, calculate the on-times, the selection of switching states. Three level diode clamped inverter (3LDCI) using space vector modulation technique has been modeled and simulated using MATLAB/SIMULINK and Origin 6.1 with a passive R-L load that can be extended to any level. Simulation results are presented to verify the proposed SVPWM control in terms of THD. The results arecompared with conventional sinusoidal pulse width modulation (SPWM) where SVPWM shows better performance than SPWM in terms of THD.
IRJET- Performance Analysis of a Synchronized Receiver over Noiseless and Fad...IRJET Journal
This document summarizes the performance analysis of a synchronized receiver over noiseless and fading channels. It presents a baseband communications system that implements data phase transmission using a single-tone waveform. The behavior of the received signal when transmitted over a noiseless channel and a fading frequency selective channel with additive white Gaussian noise is analyzed. Key plots analyzed include the channel output power spectrum, cross-spectral phase between the equalizer input and output, control signal for the equalizer, and scatter plots of the equalizer input, output, and descrambler output. The analysis shows distortion of the signal due to noise in the fading channel.
Signal-Energy Based Fault Classification of Unbalanced Network using S-Transf...idescitation
This document presents a technique for classifying faults on overhead transmission lines using S-Transform and a Probabilistic Neural Network (PNN) classifier. Voltage signals are processed using S-Transform to extract energy features from each phase. These 3 features (1 per phase) are used as inputs to a PNN classifier to determine the type of fault (e.g. line-ground, line-line) and faulty phase. The method was tested on a simulated 3-phase transmission line model in MATLAB with different fault conditions. It produced accurate classification results, even when noise was added to the signals. The paper concludes the method provides fast and accurate fault classification.
Selection and Validation of Mathematical Models of Power Converters using Rap...IJECEIAES
This paper presents a methodology based on two interrelated rapid prototyping pro- cesses in order to find the best correspondence between theoretical, simulated, and experimental results of a power converter controlled by a digital PWM. The method supplements rapid control prototyping (RCP) with effective math tools to quickly select and validate models of a controlled system. We show stability analysis of the classical and two modified buck converter models controlled by zero average dynamics (ZAD) and fixed-point induction control (FPIC). The methodology consists of obtaining the mathematical representation of power converters with the controllers and the Lyapunov Exponents (LEs). Besides, the theoretical results are compared with the simulated and experimental results by means of one- and two-parameter bifurcation diagrams. The responses of the three models are compared by changing the parameter (K ) of the ZAD and the parameter (N) of the FPIC. The results show that the stability zones, periodic orbits, periodic bands, and chaos are obtained for the three models, finding more similarities between theoretical, simulated, and experimental tests with the third model of the buck converter with ZAD and FPIC as it considers more parameters related to the losses in different elements of the system. Additionally, the intervals of the chaos are obtained by using the LEs and validated by numerical and experimental tests. s
IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...IJCNCJournal
The document describes research on improving the performance of LTE downlink systems using Lagrange polynomial interpolation for channel estimation. It presents the MIMO-OFDM transmission scheme used in LTE and discusses various channel estimation techniques including linear, sinus cardinal, Newton polynomial, and Lagrange polynomial interpolation. Simulation results show that Lagrange polynomial interpolation outperforms other methods in terms of block error rate, throughput, and error vector magnitude versus signal-to-noise ratio. The optimal order of the Lagrange polynomial is determined by evaluating performance for different orders.
Application of Lifetime Models in Maintenance (Case Study: Thermal Electricit...iosrjce
IOSR Journal of Mathematics(IOSR-JM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of mathemetics and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in mathematics. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A JOINT TIMING OFFSET AND CHANNEL ESTIMATION USING FRACTIONAL FOURIER TRANSFO...IJCNCJournal
This paper proposes a new method for joint timing offset and channel estimation in OFDM systems using fractional Fourier transform and constant amplitude zero autocorrelation sequences. After estimating the timing offset in the frequency domain, compensation is performed in the time domain. Channel estimation then uses least squares with discrete Fourier transform and linear interpolation to recover the transmitted signal. Simulation results show the proposed method achieves good performance in terms of mean square error for timing offset estimation compared to other techniques, especially for fast fading channels. It also estimates the channel well while maintaining throughput.
SYNTHETICAL ENLARGEMENT OF MFCC BASED TRAINING SETS FOR EMOTION RECOGNITIONcscpconf
Emotional state recognition through speech is being a very interesting research topic nowadays.
Using subliminal information of speech, it is possible to recognize the emotional state of the
person. One of the main problems in the design of automatic emotion recognition systems is the
small number of available patterns. This fact makes the learning process more difficult, due to
the generalization problems that arise under these conditions.
In this work we propose a solution to this problem consisting in enlarging the training set
through the creation the new virtual patterns. In the case of emotional speech, most of the
emotional information is included in speed and pitch variations. So, a change in the average
pitch that does not modify neither the speed nor the pitch variations does not affect the
expressed emotion. Thus, we use this prior information in order to create new patterns applying
a pitch shift modification in the feature extraction process of the classification system. For this
purpose, we propose a frequency scaling modification of the Mel Frequency Cepstral
Coefficients, used to classify the emotion. This proposed process allows us to synthetically
increase the number of available patterns in thetraining set, thus increasing the generalization
capability of the system and reducing the test error.
Metamodel-based Optimization of a PID Controller Parameters for a Coupled-tan...TELKOMNIKA JOURNAL
Liquid flow and level control are essential requirements in various industries, such as paper
manufacturing, petrochemical industries, waste management, and others. Controlling the liquids flow and
levels in such industries is challenging due to the existence of nonlinearity and modeling uncertainties of
the plants. This paper presents a method to control the liquid level in a second tank of a coupled-tank plant
through variable manipulation of a water pump in the first tank. The optimum controller parameters of this
plant are calculated using radial basis function neural network metamodel. A time-varying nonlinear
dynamic model is developed and the corresponding linearized perturbation models are derived from the
nonlinear model. The performance of the developed optimized controller using metamodeling is compared
with the original large space design. In addition, linearized perturbation models are derived from the
nonlinear dynamic model with time-varying parameters.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.