Cyclic Redundancy Check (CRC), code for error detection finds many applications in the field of digital communication, data storage, control system and data compression. CRC encoding operation is carried out by using a Linear Feedback Shift Register (LFSR). Serial implementation of CRC requires more clock cycles which is equal to data message length plus generator polynomial degree but in parallel implementation of CRC one clock cycle is required if a whole data message is applied at a time. In previous work related to parallel LFSR, hardware complexity of the architecture reduced using a technique named state space transformation. This paper presents detailed explaination of search algorithm implementation and technique to find number of XOR gates required for different CRC algorithms. This paper presents a searching algorithm and new technique to find the number of XOR gates required for different CRC algorithms. The comparison between proposed and previous architectures shows that the number of XOR gates are reduced for CRC algorithms which improve the hardware efficiency. Searching algorithm and all the matrix computations have been performed using MATLAB simulations.
The document compares the performance of a Root Raised Cosine matched filter implemented using hybrid-logarithmic arithmetic versus standard binary and floating point arithmetic. Simulations showed that the hybrid logarithmic structure offered superior performance to fixed point solutions while having significantly reduced complexity compared to floating point equivalents. The use of hybrid logarithmic arithmetic also has the potential to reduce power consumption, latency, and hardware complexity for mobile applications.
A Review: Compensation of Mismatches in Time Interleaved Analog to Digital Co...IJERA Editor
The execution of today's correspondence frameworks is exceedingly subject to the utilized Analog-to-Digital converters (ADCs), and with a specific end goal to give more flexibility and exactness to the developing correspondence innovations, superior-ADCs are needed. In this respect, the time-interleaved operation of an exhibit of ADCs (TI-ADC) might be a sensible result. A TI-ADC can build its throughput by utilizing M channel ADCs or sub converters in parallel and examining the data motion in a period-interleaved way. In any case, the execution of a TI-ADC gravely suffers from the bungles around the channel ADCs. In this paper we survey the advancement in the configuration of low-intricacy advanced remedy structures and calculations for time-interleaved ADCs in the course of the most recent five years. We devise a discrete-time model, state the outline issue, and finally infer the calculations and structures. Specifically, we examine proficient calculations to outline time-differing remedy filters and additionally iterative structures using polynomial based filters. Thusly, the remuneration structure may be utilized to repay time-differing recurrence reaction befuddles in time-interleaved ADCs, and in addition to remake uniform examples from nonuniformly tested indicators. We examine the recompense structure, research its execution, and exhibit requisition zones of the structure through various illustrations. At long last, we give a standpoint to future examination questions.
A novel technique for speech encryption based on k-means clustering and quant...journalBEEI
This document proposes a new algorithm for speech encryption that uses quantum chaotic maps, k-means clustering, and two stages of scrambling. The first stage uses a tent map to scramble bits in the binary representation of the signal. The second stage uses k-means clustering to scramble blocks of the signal. A quantum logistic map is used to generate an encryption key. The proposed method is evaluated using statistical quality metrics and is shown to provide secure and efficient speech encryption while maintaining high quality of recovered speech.
A fast-adaptive-tomlinson-harashima-precoder-for-indoor-wireless-communicationsCemal Ardil
This document summarizes a research paper that proposes a fast adaptive Tomlinson-Harashima precoder for indoor wireless communications. The precoder uses a variable step size least mean squares algorithm to dynamically adjust its parameters according to channel variations over short time spans. It estimates the channel at the end of the uplink frame using system identification, rather than assuming the channel is time-invariant over both uplink and downlink frames as in conventional precoders. Simulation results show the adaptive precoder converges faster than LMS and has similar bit error rate performance to conventional precoders but with lower transmitter complexity.
This document describes a novel design for a 32-bit unsigned multiplier using a modified carry select adder (MCSLA). It begins with background on adders and multipliers in VLSI design. It then describes the conventional carry select adder (CSLA) and proposes a modified CSLA (MCSLA) that uses common boolean logic to reduce area and power. The document presents the design and VHDL simulation results of a 32-bit unsigned multiplier using both CSLA and the proposed MCSLA. The results show the MCSLA based multiplier achieves a 45% reduction in power-area-delay product compared to the CSLA based multiplier.
Modified approximate 8-point multiplier less DCT like transformIJERA Editor
Discrete Cosine Transform (DCT) is widely usedtransformation for compression in image and video standardslike H.264 or MPEGv4, JPEG etc. Currently the new standarddeveloped Codec is Highly Efficient Video Coding (HEVC) orH.265. With the help of the transformation matrix the computational cost can be dynamically reduce. This paper proposesa novel approach of multiplier-less modified approximate DCT like transformalgorithm and also comparison with exact DCT algorithm and theapproximate DCT like transform. This proposed algorithm willhave lower computational complexity. Furthermore, the proposedalgorithm will be modular in approach, and suitable for pipelinedVLSI implementation.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Discrete-wavelet-transform recursive inverse algorithm using second-order est...TELKOMNIKA JOURNAL
The recursive-least-squares (RLS) algorithm was introduced as an alternative to LMS algorithm with enhanced performance. Computational complexity and instability in updating the autocolleltion matrix are some of the drawbacks of the RLS algorithm that were among the reasons for the intrduction of the second-order recursive inverse (RI) adaptive algorithm. The 2nd order RI adaptive algorithm suffered from low convergence rate in certain scenarios that required a relatively small initial step-size. In this paper, we propose a newsecond-order RI algorithm that projects the input signal to a new domain namely discrete-wavelet-transform (DWT) as pre step before performing the algorithm. This transformation overcomes the low convergence rate of the second-order RI algorithm by reducing the self-correlation of the input signal in the mentioned scenatios. Expeirments are conducted using the noise cancellation setting. The performance of the proposed algorithm is compared to those of the RI, original second-order RI and RLS algorithms in different Gaussian and impulsive noise environments. Simulations demonstrate the superiority of the proposed algorithm in terms of convergence rate comparedto those algorithms.
The document compares the performance of a Root Raised Cosine matched filter implemented using hybrid-logarithmic arithmetic versus standard binary and floating point arithmetic. Simulations showed that the hybrid logarithmic structure offered superior performance to fixed point solutions while having significantly reduced complexity compared to floating point equivalents. The use of hybrid logarithmic arithmetic also has the potential to reduce power consumption, latency, and hardware complexity for mobile applications.
A Review: Compensation of Mismatches in Time Interleaved Analog to Digital Co...IJERA Editor
The execution of today's correspondence frameworks is exceedingly subject to the utilized Analog-to-Digital converters (ADCs), and with a specific end goal to give more flexibility and exactness to the developing correspondence innovations, superior-ADCs are needed. In this respect, the time-interleaved operation of an exhibit of ADCs (TI-ADC) might be a sensible result. A TI-ADC can build its throughput by utilizing M channel ADCs or sub converters in parallel and examining the data motion in a period-interleaved way. In any case, the execution of a TI-ADC gravely suffers from the bungles around the channel ADCs. In this paper we survey the advancement in the configuration of low-intricacy advanced remedy structures and calculations for time-interleaved ADCs in the course of the most recent five years. We devise a discrete-time model, state the outline issue, and finally infer the calculations and structures. Specifically, we examine proficient calculations to outline time-differing remedy filters and additionally iterative structures using polynomial based filters. Thusly, the remuneration structure may be utilized to repay time-differing recurrence reaction befuddles in time-interleaved ADCs, and in addition to remake uniform examples from nonuniformly tested indicators. We examine the recompense structure, research its execution, and exhibit requisition zones of the structure through various illustrations. At long last, we give a standpoint to future examination questions.
A novel technique for speech encryption based on k-means clustering and quant...journalBEEI
This document proposes a new algorithm for speech encryption that uses quantum chaotic maps, k-means clustering, and two stages of scrambling. The first stage uses a tent map to scramble bits in the binary representation of the signal. The second stage uses k-means clustering to scramble blocks of the signal. A quantum logistic map is used to generate an encryption key. The proposed method is evaluated using statistical quality metrics and is shown to provide secure and efficient speech encryption while maintaining high quality of recovered speech.
A fast-adaptive-tomlinson-harashima-precoder-for-indoor-wireless-communicationsCemal Ardil
This document summarizes a research paper that proposes a fast adaptive Tomlinson-Harashima precoder for indoor wireless communications. The precoder uses a variable step size least mean squares algorithm to dynamically adjust its parameters according to channel variations over short time spans. It estimates the channel at the end of the uplink frame using system identification, rather than assuming the channel is time-invariant over both uplink and downlink frames as in conventional precoders. Simulation results show the adaptive precoder converges faster than LMS and has similar bit error rate performance to conventional precoders but with lower transmitter complexity.
This document describes a novel design for a 32-bit unsigned multiplier using a modified carry select adder (MCSLA). It begins with background on adders and multipliers in VLSI design. It then describes the conventional carry select adder (CSLA) and proposes a modified CSLA (MCSLA) that uses common boolean logic to reduce area and power. The document presents the design and VHDL simulation results of a 32-bit unsigned multiplier using both CSLA and the proposed MCSLA. The results show the MCSLA based multiplier achieves a 45% reduction in power-area-delay product compared to the CSLA based multiplier.
Modified approximate 8-point multiplier less DCT like transformIJERA Editor
Discrete Cosine Transform (DCT) is widely usedtransformation for compression in image and video standardslike H.264 or MPEGv4, JPEG etc. Currently the new standarddeveloped Codec is Highly Efficient Video Coding (HEVC) orH.265. With the help of the transformation matrix the computational cost can be dynamically reduce. This paper proposesa novel approach of multiplier-less modified approximate DCT like transformalgorithm and also comparison with exact DCT algorithm and theapproximate DCT like transform. This proposed algorithm willhave lower computational complexity. Furthermore, the proposedalgorithm will be modular in approach, and suitable for pipelinedVLSI implementation.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Discrete-wavelet-transform recursive inverse algorithm using second-order est...TELKOMNIKA JOURNAL
The recursive-least-squares (RLS) algorithm was introduced as an alternative to LMS algorithm with enhanced performance. Computational complexity and instability in updating the autocolleltion matrix are some of the drawbacks of the RLS algorithm that were among the reasons for the intrduction of the second-order recursive inverse (RI) adaptive algorithm. The 2nd order RI adaptive algorithm suffered from low convergence rate in certain scenarios that required a relatively small initial step-size. In this paper, we propose a newsecond-order RI algorithm that projects the input signal to a new domain namely discrete-wavelet-transform (DWT) as pre step before performing the algorithm. This transformation overcomes the low convergence rate of the second-order RI algorithm by reducing the self-correlation of the input signal in the mentioned scenatios. Expeirments are conducted using the noise cancellation setting. The performance of the proposed algorithm is compared to those of the RI, original second-order RI and RLS algorithms in different Gaussian and impulsive noise environments. Simulations demonstrate the superiority of the proposed algorithm in terms of convergence rate comparedto those algorithms.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Performance Analysis of Differential Beamforming in Decentralized NetworksIJECEIAES
This paper proposes and analyzes a novel differential distributed beamforming strategy for decentralized two-way relay networks. In our strategy, the phases of the received signals at all relays are synchronized without requiring channel feedback or training symbols. Bit error rate (BER) expressions of the proposed strategy are provided for coherent and differential M-PSK modulation. Upper bounds, lower bounds, and simple approximations of the BER are also derived. Based on the theoretical and simulated BER performance, the proposed strategy offers a high system performance and low decoding complexity and delay without requiring channel state information at any transmitting or receiving antenna. Furthermore, the simple approximation of the BER upper bound shows that the proposed strategy enjoys the full diversity gain which is equal to the number of transmitting antennas.
This paper compares two logarithmic coding techniques for adaptive beamforming in wireless communications. One technique uses a direct lookup table conversion, while the other uses linear interpolation with a smaller lookup table and multiplier. Matlab simulations show that both logarithmic techniques cause small errors for address precisions above 9 bits for direct conversion and 5 bits for interpolation conversion. The results indicate the logarithmic methods provide better error performance than a fixed-point implementation, while requiring less hardware cost.
High Speed and Time Efficient 1-D DWT on Xilinx Virtex4 DWT Using 9/7 Filter ...IOSR Journals
This document describes a new efficient distributed arithmetic (NEDA) technique for implementing a high speed 1-D discrete wavelet transform (DWT) using a 9/7 filter on a Xilinx Virtex4 FPGA. The key aspects of the NEDA technique are that it uses adders as the main component and does not require multipliers, subtraction, or ROM. Simulation results show the proposed NEDA architecture requires fewer logic resources and has a shorter maximum path delay compared to existing distributed arithmetic techniques.
Flexible dsp accelerator architecture exploiting carry save arithmeticNexgen Technology
The document proposes a novel flexible accelerator architecture comprising computational units (FCUs) that support the execution of various digital signal processing (DSP) operation templates. The FCUs perform computations using carry-save (CS) arithmetic, allowing intermediate results to be reused without conversion to binary. This enables more aggressive CS optimizations than previous approaches. The proposed architecture analyzes logic size, area, and power consumption using Xilinx 14.2. Each FCU can be configured to perform addition, subtraction, and multiplication operations in a pipelined fashion to fuse computations and improve performance.
This paper investigates fairness among network sessions that use the Multiplicative Increase Multiplicative Decrease (MIMD) congestion control algorithm. It first studies how two MIMD sessions share bandwidth in the presence of synchronous and asynchronous packet losses. It finds that rate-dependent losses lead to fair sharing, while rate-independent losses cause unfairness. The paper also examines fairness between sessions using MIMD (e.g. Scalable TCP) versus Additive Increase Multiplicative Decrease (AIMD, e.g. standard TCP). Simulations show the AIMD sessions converge to equal throughput, while MIMD sessions' throughput depends on initial conditions. Adding rate-dependent losses can achieve fairness between
FPGA Implementation of SubByte & Inverse SubByte for AES Algorithmijsrd.com
Advanced encryption standard was accepted as a Federal Information Processing Standard (FIPS) standard. In traditional look up table (LUT) approaches, the unbreakable delay is longer than the total delay of the rest of operations in each round. LUT approach consumes a large area. It is more efficient to apply composite field arithmetic in the SubBytes transformation of the AES algorithm. It not only reduces the complexity but also enables deep sub pipelining such that higher speed can be achieved. Isomorphic mapping can be employed to convert GF(28) to GF(22)2)2) ,so that multiplicative inverse can be easily obtained. SubBytes and InvSubBytes transformations are merged using composite field arithmetic. It is most important responsible for the implementation of low cost and high throughput AES architecture. As compared to the typical ROM based lookup table, the presented implementation is both capable of higher speeds since it can be pipelined and small in terms of area occupancy (137/1290 slices on a Spartan III XCS200-5FPGA).
This document discusses dynamic programming and provides examples of serial and parallel formulations for several problems. It introduces classifications for dynamic programming problems based on whether the formulation is serial/non-serial and monadic/polyadic. Examples of serial monadic problems include the shortest path problem and 0/1 knapsack problem. The longest common subsequence problem is an example of a non-serial monadic problem. Floyd's all-pairs shortest path is a serial polyadic problem, while the optimal matrix parenthesization problem is non-serial polyadic. Parallel formulations are provided for several of these examples.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document discusses various sorting algorithms that can be used on parallel computers. It begins with an overview of sorting and comparison-based sorting algorithms. It then covers sorting networks like bitonic sort, which can sort in parallel using a network of comparators. It discusses how bitonic sort can be mapped to hypercubes and meshes. It also covers parallel implementations of bubble sort variants, quicksort, and shellsort. For each algorithm, it analyzes the parallel runtime and efficiency. The document provides examples and diagrams to illustrate the sorting networks and parallel algorithms.
IRJET- Survey on Adaptive Routing AlgorithmsIRJET Journal
This document discusses several adaptive routing algorithms for wireless networks and optical networks. It provides 3 key points:
1) Adaptive routing algorithms dynamically change their routing decisions based on changes in network topology and traffic levels. They aim to optimize parameters like distance, number of hops, and estimated transmission time.
2) Several adaptive routing algorithms are described, including centralized and distributed algorithms, algorithms using the A-star and Dijkstra's algorithms, and fault-aware algorithms to route around failed nodes or links.
3) Improved dynamic routing algorithms for elastic optical networks are proposed that select paths based on the number of links or weights accounting for link usage and available spectrum. The algorithms aim to efficiently route requests while
A novel delay dictionary design for compressive sensing-based time varying ch...TELKOMNIKA JOURNAL
Compressive sensing (CS) is a new attractive technique adopted for Linear Time Varying channel estimation. orthogonal frequency division multiplexing (OFDM) was proposed to be used in 4G and 5G which supports high data rate requirements. Different pilot aided channel estimation techniques were proposed to better track the channel conditions, which consumes bandwidth, thus, considerable data rate reduced. In order to estimate the channel with minimum number of pilots, compressive sensing CS was proposed to efficiently estimate the channel variations. In this paper, a novel delay dictionary-based CS was designed and simulated to estimate the linear time varying (LTV) channel. The proposed dictionary shows the suitability of estimating the channel impulse response (CIR) with low to moderate Doppler frequency shifts with acceptable bit error rate (BER) performance.
This document discusses algorithms and parallel processing. It begins by defining algorithms and different types of algorithms like sequential and parallel algorithms. It then discusses analyzing parallel algorithms based on time complexity, number of processors required, and overall cost. Specific examples of parallel algorithms discussed include merge sort and parallel image processing. Fault tolerance in parallel systems is also covered, including load distribution, parallel region growing for image segmentation, and the process of system recovery from faults.
Iaetsd vlsi architecture for exploiting carry save arithmetic using verilog hdlIaetsd Iaetsd
This document proposes a flexible accelerator architecture that exploits carry-save arithmetic to efficiently implement digital signal processing kernels. The architecture includes flexible computational units that can be configured to perform chained addition, multiplication, and addition operations directly on carry-save formatted data without intermediate conversions. Experimental results show the proposed architecture delivers average gains of 61.91% in area-delay product and 54.43% in energy consumption compared to state-of-the-art flexible data paths.
Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...IJECEIAES
Conventional timing estimation schemes based on autocorrelation experience perfor- mance degradation in the multipath channel environment with high delay spread. To overcome this problem, we proposed an improvement of the timing estimation for the OFDM system based on statistical change of symmetrical correlator. The new method uses iterative normalization technique to the correlator output before the detection based on statistical change of symmetric correlator is applied. Thus, it increases the detection probability and achieves better performance than previously published methods in the multipath environment. Computer simulation shows that our method is very robust in the fading multipath channel.
Flexible dsp accelerator architecture exploiting carry save arithmeticIeee Xpert
This document proposes a novel flexible accelerator architecture comprising computational units (FCUs) that can efficiently perform DSP operations using carry-save arithmetic. Each FCU operates directly on carry-save operands and can be configured to perform templates of common DSP operations like multiplication and addition/subtraction. By keeping operands in carry-save format throughout the FCU, intermediate conversions are avoided, improving performance compared to prior approaches. The proposed architecture aims to achieve high computational density while reducing area and power compared to existing inflexible accelerator designs.
Virtual Output Queuing (VOQ) is a well-known queuing discipline in data switch architecture that eliminates Head Of Line (HOL) blocking issue. In VOQ scheme, for each output port, a separate FIFO is maintained by each input port. Consequently, a scheduling algorithm is required to determine the order of service to virtual queues at each time slot. Maximum Weight Matching (MWM) is a well-known scheduling algorithm that achieves the entire throughput region. Despite of outstanding attainable throughput, high complexity of MWM makes it an impractical algorithm for implementation in high-speed switches. To overcome this challenge, a number of randomized algorithms have been proposed in the literature. But they commonly perform poorly when input traffic does not uniformly select output ports. In this paper, we propose two randomized algorithms that outperform the well-known formerly proposed solutions. We exploit a method to keep a parametric number of heavy edges from the last time matching and mix it by randomly generated matching to produce a new schedule. Simulation results confirm the superior performance of the proposed algorithms.
The network layer is responsible for transporting data segments from source to destination hosts. It encapsulates segments into datagrams and delivers them to the transport layer. Network layer protocols run on every host and router. Routers examine header fields to forward datagrams appropriately based on destination addresses. The network layer handles addressing, routing, and intermediate forwarding of datagrams between source and destination hosts.
This document summarizes several algorithms for parallel matrix operations, including matrix-vector multiplication, matrix-matrix multiplication, and solving systems of linear equations via Gaussian elimination. For matrix-vector multiplication, it describes row-wise and column-wise partitioning approaches. For matrix-matrix multiplication, it discusses algorithms based on row/column broadcasting, Cannon's algorithm, and a 3D domain decomposition approach. For Gaussian elimination, it analyzes pipelined and 2D mapping implementations. The key aspects of parallelization, communication costs, computation loads, scalability, and cost efficiency are analyzed for each algorithm.
High Speed Decoding of Non-Binary Irregular LDPC Codes Using GPUs (Paper)Enrique Monzo Solves
Implementation of a high speed decoding of non-binary irregular LDPC codes using CUDA GPUs.
Moritz Beermann, Enrique Monzó, Laurent Schmalen, Peter Vary
IEEE SiPS, Oct. 2013, Taipei, Taiwan
Discrete wavelet transform-based RI adaptive algorithm for system identificationIJECEIAES
In this paper, we propose a new adaptive filtering algorithm for system identifica- tion. The algorithm is based on the recursive inverse (RI) adaptive algorithm which suffers from low convergence rates in some applications; i.e., the eigenvalue spread of the autocorrelation matrix is relatively high. The proposed algorithm applies discrete-wavelet transform (DWT) to the input signal which, in turn, helps to overcome the low convergence rate of the RI algorithm with relatively small step-size(s). Different scenarios has been investigated in different noise environments in system identification setting. Experiments demonstrate the advantages of the proposed DWT recursive inverse (DWT-RI) filter in terms of convergence rate and mean-square-error (MSE) compared to the RI, discrete cosine transform LMS (DCT-LMS), discretewavelet transform LMS (DWT-LMS) and recursive-least-squares (RLS) algorithms under same conditions.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Performance Analysis of Differential Beamforming in Decentralized NetworksIJECEIAES
This paper proposes and analyzes a novel differential distributed beamforming strategy for decentralized two-way relay networks. In our strategy, the phases of the received signals at all relays are synchronized without requiring channel feedback or training symbols. Bit error rate (BER) expressions of the proposed strategy are provided for coherent and differential M-PSK modulation. Upper bounds, lower bounds, and simple approximations of the BER are also derived. Based on the theoretical and simulated BER performance, the proposed strategy offers a high system performance and low decoding complexity and delay without requiring channel state information at any transmitting or receiving antenna. Furthermore, the simple approximation of the BER upper bound shows that the proposed strategy enjoys the full diversity gain which is equal to the number of transmitting antennas.
This paper compares two logarithmic coding techniques for adaptive beamforming in wireless communications. One technique uses a direct lookup table conversion, while the other uses linear interpolation with a smaller lookup table and multiplier. Matlab simulations show that both logarithmic techniques cause small errors for address precisions above 9 bits for direct conversion and 5 bits for interpolation conversion. The results indicate the logarithmic methods provide better error performance than a fixed-point implementation, while requiring less hardware cost.
High Speed and Time Efficient 1-D DWT on Xilinx Virtex4 DWT Using 9/7 Filter ...IOSR Journals
This document describes a new efficient distributed arithmetic (NEDA) technique for implementing a high speed 1-D discrete wavelet transform (DWT) using a 9/7 filter on a Xilinx Virtex4 FPGA. The key aspects of the NEDA technique are that it uses adders as the main component and does not require multipliers, subtraction, or ROM. Simulation results show the proposed NEDA architecture requires fewer logic resources and has a shorter maximum path delay compared to existing distributed arithmetic techniques.
Flexible dsp accelerator architecture exploiting carry save arithmeticNexgen Technology
The document proposes a novel flexible accelerator architecture comprising computational units (FCUs) that support the execution of various digital signal processing (DSP) operation templates. The FCUs perform computations using carry-save (CS) arithmetic, allowing intermediate results to be reused without conversion to binary. This enables more aggressive CS optimizations than previous approaches. The proposed architecture analyzes logic size, area, and power consumption using Xilinx 14.2. Each FCU can be configured to perform addition, subtraction, and multiplication operations in a pipelined fashion to fuse computations and improve performance.
This paper investigates fairness among network sessions that use the Multiplicative Increase Multiplicative Decrease (MIMD) congestion control algorithm. It first studies how two MIMD sessions share bandwidth in the presence of synchronous and asynchronous packet losses. It finds that rate-dependent losses lead to fair sharing, while rate-independent losses cause unfairness. The paper also examines fairness between sessions using MIMD (e.g. Scalable TCP) versus Additive Increase Multiplicative Decrease (AIMD, e.g. standard TCP). Simulations show the AIMD sessions converge to equal throughput, while MIMD sessions' throughput depends on initial conditions. Adding rate-dependent losses can achieve fairness between
FPGA Implementation of SubByte & Inverse SubByte for AES Algorithmijsrd.com
Advanced encryption standard was accepted as a Federal Information Processing Standard (FIPS) standard. In traditional look up table (LUT) approaches, the unbreakable delay is longer than the total delay of the rest of operations in each round. LUT approach consumes a large area. It is more efficient to apply composite field arithmetic in the SubBytes transformation of the AES algorithm. It not only reduces the complexity but also enables deep sub pipelining such that higher speed can be achieved. Isomorphic mapping can be employed to convert GF(28) to GF(22)2)2) ,so that multiplicative inverse can be easily obtained. SubBytes and InvSubBytes transformations are merged using composite field arithmetic. It is most important responsible for the implementation of low cost and high throughput AES architecture. As compared to the typical ROM based lookup table, the presented implementation is both capable of higher speeds since it can be pipelined and small in terms of area occupancy (137/1290 slices on a Spartan III XCS200-5FPGA).
This document discusses dynamic programming and provides examples of serial and parallel formulations for several problems. It introduces classifications for dynamic programming problems based on whether the formulation is serial/non-serial and monadic/polyadic. Examples of serial monadic problems include the shortest path problem and 0/1 knapsack problem. The longest common subsequence problem is an example of a non-serial monadic problem. Floyd's all-pairs shortest path is a serial polyadic problem, while the optimal matrix parenthesization problem is non-serial polyadic. Parallel formulations are provided for several of these examples.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document discusses various sorting algorithms that can be used on parallel computers. It begins with an overview of sorting and comparison-based sorting algorithms. It then covers sorting networks like bitonic sort, which can sort in parallel using a network of comparators. It discusses how bitonic sort can be mapped to hypercubes and meshes. It also covers parallel implementations of bubble sort variants, quicksort, and shellsort. For each algorithm, it analyzes the parallel runtime and efficiency. The document provides examples and diagrams to illustrate the sorting networks and parallel algorithms.
IRJET- Survey on Adaptive Routing AlgorithmsIRJET Journal
This document discusses several adaptive routing algorithms for wireless networks and optical networks. It provides 3 key points:
1) Adaptive routing algorithms dynamically change their routing decisions based on changes in network topology and traffic levels. They aim to optimize parameters like distance, number of hops, and estimated transmission time.
2) Several adaptive routing algorithms are described, including centralized and distributed algorithms, algorithms using the A-star and Dijkstra's algorithms, and fault-aware algorithms to route around failed nodes or links.
3) Improved dynamic routing algorithms for elastic optical networks are proposed that select paths based on the number of links or weights accounting for link usage and available spectrum. The algorithms aim to efficiently route requests while
A novel delay dictionary design for compressive sensing-based time varying ch...TELKOMNIKA JOURNAL
Compressive sensing (CS) is a new attractive technique adopted for Linear Time Varying channel estimation. orthogonal frequency division multiplexing (OFDM) was proposed to be used in 4G and 5G which supports high data rate requirements. Different pilot aided channel estimation techniques were proposed to better track the channel conditions, which consumes bandwidth, thus, considerable data rate reduced. In order to estimate the channel with minimum number of pilots, compressive sensing CS was proposed to efficiently estimate the channel variations. In this paper, a novel delay dictionary-based CS was designed and simulated to estimate the linear time varying (LTV) channel. The proposed dictionary shows the suitability of estimating the channel impulse response (CIR) with low to moderate Doppler frequency shifts with acceptable bit error rate (BER) performance.
This document discusses algorithms and parallel processing. It begins by defining algorithms and different types of algorithms like sequential and parallel algorithms. It then discusses analyzing parallel algorithms based on time complexity, number of processors required, and overall cost. Specific examples of parallel algorithms discussed include merge sort and parallel image processing. Fault tolerance in parallel systems is also covered, including load distribution, parallel region growing for image segmentation, and the process of system recovery from faults.
Iaetsd vlsi architecture for exploiting carry save arithmetic using verilog hdlIaetsd Iaetsd
This document proposes a flexible accelerator architecture that exploits carry-save arithmetic to efficiently implement digital signal processing kernels. The architecture includes flexible computational units that can be configured to perform chained addition, multiplication, and addition operations directly on carry-save formatted data without intermediate conversions. Experimental results show the proposed architecture delivers average gains of 61.91% in area-delay product and 54.43% in energy consumption compared to state-of-the-art flexible data paths.
Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...IJECEIAES
Conventional timing estimation schemes based on autocorrelation experience perfor- mance degradation in the multipath channel environment with high delay spread. To overcome this problem, we proposed an improvement of the timing estimation for the OFDM system based on statistical change of symmetrical correlator. The new method uses iterative normalization technique to the correlator output before the detection based on statistical change of symmetric correlator is applied. Thus, it increases the detection probability and achieves better performance than previously published methods in the multipath environment. Computer simulation shows that our method is very robust in the fading multipath channel.
Flexible dsp accelerator architecture exploiting carry save arithmeticIeee Xpert
This document proposes a novel flexible accelerator architecture comprising computational units (FCUs) that can efficiently perform DSP operations using carry-save arithmetic. Each FCU operates directly on carry-save operands and can be configured to perform templates of common DSP operations like multiplication and addition/subtraction. By keeping operands in carry-save format throughout the FCU, intermediate conversions are avoided, improving performance compared to prior approaches. The proposed architecture aims to achieve high computational density while reducing area and power compared to existing inflexible accelerator designs.
Virtual Output Queuing (VOQ) is a well-known queuing discipline in data switch architecture that eliminates Head Of Line (HOL) blocking issue. In VOQ scheme, for each output port, a separate FIFO is maintained by each input port. Consequently, a scheduling algorithm is required to determine the order of service to virtual queues at each time slot. Maximum Weight Matching (MWM) is a well-known scheduling algorithm that achieves the entire throughput region. Despite of outstanding attainable throughput, high complexity of MWM makes it an impractical algorithm for implementation in high-speed switches. To overcome this challenge, a number of randomized algorithms have been proposed in the literature. But they commonly perform poorly when input traffic does not uniformly select output ports. In this paper, we propose two randomized algorithms that outperform the well-known formerly proposed solutions. We exploit a method to keep a parametric number of heavy edges from the last time matching and mix it by randomly generated matching to produce a new schedule. Simulation results confirm the superior performance of the proposed algorithms.
The network layer is responsible for transporting data segments from source to destination hosts. It encapsulates segments into datagrams and delivers them to the transport layer. Network layer protocols run on every host and router. Routers examine header fields to forward datagrams appropriately based on destination addresses. The network layer handles addressing, routing, and intermediate forwarding of datagrams between source and destination hosts.
This document summarizes several algorithms for parallel matrix operations, including matrix-vector multiplication, matrix-matrix multiplication, and solving systems of linear equations via Gaussian elimination. For matrix-vector multiplication, it describes row-wise and column-wise partitioning approaches. For matrix-matrix multiplication, it discusses algorithms based on row/column broadcasting, Cannon's algorithm, and a 3D domain decomposition approach. For Gaussian elimination, it analyzes pipelined and 2D mapping implementations. The key aspects of parallelization, communication costs, computation loads, scalability, and cost efficiency are analyzed for each algorithm.
High Speed Decoding of Non-Binary Irregular LDPC Codes Using GPUs (Paper)Enrique Monzo Solves
Implementation of a high speed decoding of non-binary irregular LDPC codes using CUDA GPUs.
Moritz Beermann, Enrique Monzó, Laurent Schmalen, Peter Vary
IEEE SiPS, Oct. 2013, Taipei, Taiwan
Discrete wavelet transform-based RI adaptive algorithm for system identificationIJECEIAES
In this paper, we propose a new adaptive filtering algorithm for system identifica- tion. The algorithm is based on the recursive inverse (RI) adaptive algorithm which suffers from low convergence rates in some applications; i.e., the eigenvalue spread of the autocorrelation matrix is relatively high. The proposed algorithm applies discrete-wavelet transform (DWT) to the input signal which, in turn, helps to overcome the low convergence rate of the RI algorithm with relatively small step-size(s). Different scenarios has been investigated in different noise environments in system identification setting. Experiments demonstrate the advantages of the proposed DWT recursive inverse (DWT-RI) filter in terms of convergence rate and mean-square-error (MSE) compared to the RI, discrete cosine transform LMS (DCT-LMS), discretewavelet transform LMS (DWT-LMS) and recursive-least-squares (RLS) algorithms under same conditions.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
An identification of the tolerable time-interleaved analog-todigital convert...IJECEIAES
High-speed Terahertz communication systems has recently employed orthogonal frequency division multiplexing approach as it provides high spectral efficiency and avoids inter-symbol interference caused by dispersive channels. Such high-speed systems require extremely high-sampling time-interleaved analog-to-digital converters at the receiver. However, timing mismatch of time-interleaved analog-to-digital converters significantly causes system performance degradation. In this paper, to avoid such performance degradation induced by timing mismatch, we theoretically determine maximum tolerable mismatch levels for orthogonal frequency division multiplexing communication systems. To obtain these levels, we first propose an analytical method to derive the bit error rate formula for quadrature and pulse amplitude modulations in Rayleigh fading channels, assuming binary reflected gray code (BRGC) mapping. Further, from the derived bit error rate (BER) expressions, we reveal a threshold of timing mismatch level for which error floors produced by the mismatch will be smaller than a given BER. Simulation results demonstrate that if we preserve mismatch level smaller than 25% of this obtained threshold, the BER performance degradation is smaller than 0.5 dB as compared to the case without timing mismatch.
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORMsipij
In this paper the Delay Computation method for Common Sub expression Elimination algorithm is being implemented on Cyclotomic Fast Fourier Transform. The Common Sub Expression Elimination algorithm is combined with the delay computing method and is known as Gate Level Delay Computation with Common Sub expression Elimination Algorithm. Common sub expression elimination is effective
optimization method used to reduce adders in cyclotomic Fourier transform. The delay computing method is based on delay matrix and suitable for implementation with computers. The Gate level delay computation method is used to find critical path delay and it is analyzed on various finite field elements. The presented algorithm is established through a case study in Cyclotomic Fast Fourier Transform over finite field. If Cyclotomic Fast Fourier Transform is implemented directly then the system will have high additive complexities. So by using GLDC-CSE algorithm on cyclotomic fast Fourier transform, the additive
complexities will be reduced and also the area and area delay product will be reduced.
Design and Implementation of an Embedded System for Software Defined RadioIJECEIAES
In this paper, developing high performance software for demanding real-time embed- ded systems is proposed. This software-based design will enable the software engineers and system architects in emerging technology areas like 5G Wireless and Software Defined Networking (SDN) to build their algorithms. An ADSP-21364 floating point SHARC Digital Signal Processor (DSP) running at 333 MHz is adopted as a platform for an embedded system. To evaluate the proposed embedded system, an implementation of frame, symbol and carrier phase synchronization is presented as an application. Its performance is investigated with an on line Quadrature Phase Shift keying (QPSK) receiver. Obtained results show that the designed software is implemented successfully based on the SHARC DSP which can utilized efficiently for such algorithms. In addition, it is proven that the proposed embedded system is pragmatic and capable of dealing with the memory constraints and critical time issue due to a long length interleaved coded data utilized for channel coding.
Design and implementation of log domain decoder IJECEIAES
Low-Density-Parity-Check (LDPC) code has become famous in communications systems for error correction, as an advantage of the robust performance in correcting errors and the ability to meet all the requirements of the 5G system. However, the mot challenge faced researchers is the hardware implementation, because of higher complexity and long run-time. In this paper, an efficient and optimum design for log domain decoder has been implemented using Xilinx system generator with FPGA device Kintex7 (XC7K325T-2FFG900C). Results confirm that the proposed decoder gives a Bit Error Rate (BER) very closed to theory calculations which illustrate that this decoder is suitable for next generation demand which needs a high data rate with very low BER.
Tail-biting convolutional codes (TBCC) have been extensively applied in communication systems. This method is implemented by replacing the fixedtail with tail-biting data. This concept is needed to achieve an effective decoding computation. Unfortunately, it makes the decoding computation becomes more complex. Hence, several algorithms have been developed to overcome this issue in which most of them are implemented iteratively with uncertain number of iteration. In this paper, we propose a VLSI architecture to implement our proposed reversed-trellis TBCC (RT-TBCC) algorithm. This algorithm is designed by modifying direct-terminating maximumlikelihood (ML) decoding process to achieve better correction rate. The purpose is to offer an alternative solution for tail-biting convolutional code decoding process with less number of computation compared to the existing solution. The proposed architecture has been evaluated for LTE standard and it significantly reduces the computational time and resources compared to the existing direct-terminating ML decoder. For evaluations on functionality and Bit Error Rate (BER) analysis, several simulations, System-on-Chip (SoC) implementation and synthesis in FPGA are performed.
Method for Converter Synchronization with RF InjectionCSCJournals
This paper presents an injection method for synchronizing analog to digital converters (ADC). This approach can eliminate the need for precision routed discrete synchronization signals of current technologies, such as JESD204. By eliminating the setup and hold time requirements at the conversion (or near conversion) clock rate, higher sample rate systems can be synchronized. Measured data from an existing multiple ADC conversion system was used to evaluate the method. Coherent beams were simulated to measure the effectiveness of the method. The results show near theoretical coherent processing gain.
A C OMPARATIVE A NALYSIS A ND A PPLICATIONS O F M ULTI W AVELET T RANS...IJCI JOURNAL
In the era of telemedicine a large amount of medica
l information is exchanged via electronic media mos
tly
in the form of medical images, to improve the accur
acy and speed of diagnosis process. Medical Image
denoising has the basic importance in image analysi
s as these algorithm and procedures affects the eff
icacy
of medical diagnostic. In this paper focus is on Mu
lti wavelets based Image denoising techniques, beca
use
they provide the possibility of designing wavelets
systems which are orthogonal, symmetric and compact
ly
supported, simultaneously. Performance of Discrete
Multi Wavelet Transform and Discrete Wavelet
Transform based denoising methods are compared on t
he basis of PSNR
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...IJNSA Journal
This paper proposes a new blind adaptive channel shortening approach for multi-carrier systems. The performance of the discrete Fourier transform-DMT (DFT-DMT) system is investigated with the proposed DST-DMT system over the standard carrier serving area (CSA) loop1. Enhanced bit rates demonstrated and less complexity also involved by the simulation of the DST-DMT system.
Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers IJECEIAES
This document presents a study on the performance of a low density parity check (LDPC) coded orthogonal frequency division multiplexing (OFDM) system using space time block coding (STBC) under various digital modulations and channel conditions. The system incorporates a 3/4 rate convolutional encoder and a LDPC encoder. At the receiver, maximum ratio combining is implemented for channel equalization. Simulation results show that the LDPC coded OFDM system outperforms an uncoded system, and provides lower bit error rates under binary phase shift keying modulation in an additive white Gaussian noise channel.
The document describes the design and simulation of an optical cyclic redundancy check (CRC) encoder using lithium niobate waveguides. Key points:
1) A (7,4) CRC encoder is designed using lithium niobate Mach-Zehnder interferometers to perform the encoding optically for faster and more efficient error detection in optical communication.
2) The encoder structure and encoding process are explained mathematically and through simulation show the encoder can accurately detect single bit errors.
3) Beam propagation method is used to simulate the encoder design using lithium niobate waveguides and evaluate its performance in encoding test codewords and detecting errors.
IRJET- Performance Analysis of a Synchronized Receiver over Noiseless and Fad...IRJET Journal
This document summarizes the performance analysis of a synchronized receiver over noiseless and fading channels. It presents a baseband communications system that implements data phase transmission using a single-tone waveform. The behavior of the received signal when transmitted over a noiseless channel and a fading frequency selective channel with additive white Gaussian noise is analyzed. Key plots analyzed include the channel output power spectrum, cross-spectral phase between the equalizer input and output, control signal for the equalizer, and scatter plots of the equalizer input, output, and descrambler output. The analysis shows distortion of the signal due to noise in the fading channel.
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...IJERA Editor
The technical challenges for communication engineers is the development of best performance wireless
networks with negligible amount of distortions. We have to consider multipath propagation attenuation and
radio spectrum inefficiency. Now a days, In MIMO (Multi Input Multi Output) systems there is a huge demand
for the networks with the high transmission rates and better quality of service which are having low PAPR ratio.
Instead of OFDMA, filter banks are used in massive MIMO to reduce the complexity. But they are error prone
to noise. This base paper discusses about PAPR reduction in MIMO systems using different precoding based
OFDM systems. Mainly, minimization of multi-antenna systems by controlling the transmission power and
reduction of PAPR using ZC (Zadoff-Chu) matrix transform.
Improving The Performance of Viterbi Decoder using Window System IJECEIAES
An efficient Viterbi decoder is introduced in this paper; it is called Viterbi decoder with window system. The simulation results, over Gaussian channels, are performed from rate 1/2, 1/3 and 2/3 joined to TCM encoder with memory in order of 2, 3. These results show that the proposed scheme outperforms the classical Viterbi by a gain of 1 dB. On the other hand, we propose a function called RSCPOLY2TRELLIS, for recursive systematic convolutional (RSC) encoder which creates the trellis structure of a recursive systematic convolutional encoder from the matrix “H”. Moreover, we present a comparison between the decoding algorithms of the TCM encoder like Viterbi soft and hard, and the variants of the MAP decoder known as BCJR or forward-backward algorithm which is very performant in decoding TCM, but depends on the size of the code, the memory, and the CPU requirements of the application.
This document summarizes a research paper that proposes a novel architecture for implementing a 1D lifting integer wavelet transform (IWT) using residue number system (RNS). The key aspects covered are:
1) RNS offers advantages over binary representations for digital signal processing by avoiding carry propagation. A ROM-based approach is proposed for RNS division.
2) The lifting scheme for discrete wavelet transforms is summarized, including split, predict, and update stages.
3) A novel RNS-based architecture is proposed using three main blocks - split, predict, and update - that repeat at each decomposition level. Pipelined implementations of the predict and update blocks are detailed.
Area, Delay and Power Comparison of Adder TopologiesVLSICS Design
This document compares the area, delay, and power characteristics of different adder topologies, including ripple carry adder, carry look-ahead adder, carry skip adder, carry select adder, carry increment adder, carry save adder, and carry bypass adder. It analyzes the functionality and performance of 8-bit implementations of each adder type using Microwind simulation software at a 0.12μm CMOS technology node. The ripple carry adder has the simplest design but the longest propagation delay that scales with the number of bits, while other topologies like the carry look-ahead adder and carry skip adder reduce delay but have more complex circuitry. The document aims to
An efficient reconfigurable code rate cooperative low-density parity check co...IJECEIAES
In recent days, extensive digital communication process has been performed. Due to this phenomenon, a proper maintenance of authentication, communication without any overhead such as signal attenuation code rate fluctuations during digital communication process can be minimized and optimized by adopting parallel encoder and decoder operations. To overcome the above-mentioned drawbacks by using proposed reconfigurable code rate cooperative (RCRC) and low-density parity check (LDPC) method. The proposed RCRC-LDPC is capable to operate over gigabits/sec data and it effectively performs linear encoding, dual diagonal form, widens the range of code rate and optimal degree distribution of LDPC mother code. The proposed method optimize the transmission rate and it is capable to operate on 0.98 code rate. It is the highest upper bounded code rate as compared to the existing methods. The proposed method optimizes the transmission rate and is capable to operate on a 0.98 code rate. It is the highest upper bounded code rate as compared to the existing methods. the proposed method's implementation has been carried out using MATLAB and as per the simulation result, the proposed method is capable of reaching a throughput efficiency greater than 8.2 (1.9) gigabits per second with a clock frequency of 160 MHz.
RS Codes for Downlink LTE System over LTE-MIMO ChannelTELKOMNIKA JOURNAL
This document summarizes a study that used Reed-Solomon codes with a downlink Long Term Evolution (LTE) system over an LTE Multiple-Input Multiple-Output (MIMO) channel to improve performance. Reed-Solomon codes were chosen because they have low decoding complexity compared to convolutional and turbo codes. Simulation results showed that using Reed-Solomon codes decreased the bit error rate more than convolutional or turbo codes. Additionally, increasing the number of antennas in the LTE-MIMO channel provided further improvements to downlink LTE system performance. BPSK modulation provided better performance gains compared to QPSK when used with Reed-Solomon codes over the LTE-MIMO channel.
1) The document discusses a Max Log MAP algorithm for decoding turbo codes used in LTE systems. Max Log MAP reduces complexity compared to the Log MAP algorithm while maintaining similar decoding performance.
2) Turbo codes achieve error correction close to the Shannon limit through iterative decoding between two soft-input soft-output decoders using extrinsic information.
3) The Max Log MAP algorithm approximates the logarithm calculation in turbo decoding to reduce complexity, maintaining performance close to but slightly worse than the standard Log MAP algorithm.
Similar to Area efficient parallel LFSR for cyclic redundancy check (20)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Neural network optimizer of proportional-integral-differential controller par...IJECEIAES
Wide application of proportional-integral-differential (PID)-regulator in industry requires constant improvement of methods of its parameters adjustment. The paper deals with the issues of optimization of PID-regulator parameters with the use of neural network technology methods. A methodology for choosing the architecture (structure) of neural network optimizer is proposed, which consists in determining the number of layers, the number of neurons in each layer, as well as the form and type of activation function. Algorithms of neural network training based on the application of the method of minimizing the mismatch between the regulated value and the target value are developed. The method of back propagation of gradients is proposed to select the optimal training rate of neurons of the neural network. The neural network optimizer, which is a superstructure of the linear PID controller, allows increasing the regulation accuracy from 0.23 to 0.09, thus reducing the power consumption from 65% to 53%. The results of the conducted experiments allow us to conclude that the created neural superstructure may well become a prototype of an automatic voltage regulator (AVR)-type industrial controller for tuning the parameters of the PID controller.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
A review on features and methods of potential fishing zoneIJECEIAES
This review focuses on the importance of identifying potential fishing zones in seawater for sustainable fishing practices. It explores features like sea surface temperature (SST) and sea surface height (SSH), along with classification methods such as classifiers. The features like SST, SSH, and different classifiers used to classify the data, have been figured out in this review study. This study underscores the importance of examining potential fishing zones using advanced analytical techniques. It thoroughly explores the methodologies employed by researchers, covering both past and current approaches. The examination centers on data characteristics and the application of classification algorithms for classification of potential fishing zones. Furthermore, the prediction of potential fishing zones relies significantly on the effectiveness of classification algorithms. Previous research has assessed the performance of models like support vector machines, naïve Bayes, and artificial neural networks (ANN). In the previous result, the results of support vector machine (SVM) were 97.6% more accurate than naive Bayes's 94.2% to classify test data for fisheries classification. By considering the recent works in this area, several recommendations for future works are presented to further improve the performance of the potential fishing zone models, which is important to the fisheries community.
Electrical signal interference minimization using appropriate core material f...IJECEIAES
As demand for smaller, quicker, and more powerful devices rises, Moore's law is strictly followed. The industry has worked hard to make little devices that boost productivity. The goal is to optimize device density. Scientists are reducing connection delays to improve circuit performance. This helped them understand three-dimensional integrated circuit (3D IC) concepts, which stack active devices and create vertical connections to diminish latency and lower interconnects. Electrical involvement is a big worry with 3D integrates circuits. Researchers have developed and tested through silicon via (TSV) and substrates to decrease electrical wave involvement. This study illustrates a novel noise coupling reduction method using several electrical involvement models. A 22% drop in electrical involvement from wave-carrying to victim TSVs introduces this new paradigm and improves system performance even at higher THz frequencies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...amsjournal
The Fourth Industrial Revolution is transforming industries, including healthcare, by integrating digital,
physical, and biological technologies. This study examines the integration of 4.0 technologies into
healthcare, identifying success factors and challenges through interviews with 70 stakeholders from 33
countries. Healthcare is evolving significantly, with varied objectives across nations aiming to improve
population health. The study explores stakeholders' perceptions on critical success factors, identifying
challenges such as insufficiently trained personnel, organizational silos, and structural barriers to data
exchange. Facilitators for integration include cost reduction initiatives and interoperability policies.
Technologies like IoT, Big Data, AI, Machine Learning, and robotics enhance diagnostics, treatment
precision, and real-time monitoring, reducing errors and optimizing resource utilization. Automation
improves employee satisfaction and patient care, while Blockchain and telemedicine drive cost reductions.
Successful integration requires skilled professionals and supportive policies, promising efficient resource
use, lower error rates, and accelerated processes, leading to optimized global healthcare outcomes.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 1755 - 1763
1756
Figure 1. Conventional serial modular type LFSR architecture
The authors in [6] gave theory behind CRC and designed different hardware and software methods
for CRC implementation. Parallel CRC implementations based upon mathematical deductions have been
proposed in [7]. In [8-13], state space representation of serial and parallel LFSR is given. These all architectures
process the data message of length ‘m’ which is divided into number of blocks of length ‘v’ each where ‘v’ is
same as the generator polynomial degree (n). State-space similarity transformation and transformation matrix
have been proposed which is dependent on some vector and exhaustive search was applied for finding
the vector [10].
In [12], parallel architecture for LFSR has been proposed on the basis of transposed serial LFSR which
reduces hardware complexity as well as critical path delay (CPD). The authors in [13] gave best way to find
transformation matrix and improved searching algorithm is given to obtain best vector that reduces hardware
complexity. Parhi [14] and Zhang and Parhi [15] has been proposed BCH encoders high speed architecture.
For elimination of fan-out bottleneck new approaches have been proposed in [14, 16]. To reduce the effect of
fan-out authors in [17] has been proposed a two-step method. Pipelining methods have been proposed for high
speed CRC hardware implementation in [18]. In [19, 20] approaches have been presented that are based on
software based CRC computation.
Matrix based formulation have been performed for computation of CRC for the specific case when
generator polynomial degree is less than the degree of parallelism [16]. For transformation from serial to
parallel new methods have been described [21] and firstly applied by Patel [22] for CRC calculation.
For parallelization of computation Look-ahead technique used in [23]. Parallel implementation of CRC
achieved by using cascading approach [24]. Performance of CRC polynomials generated with Genetic
algorithms has been evaluated in [25]. Large fan-out effect has been eliminated using new technique based on
Chinese Remainder Theorem for long BCH codes [26]. In [13], improved search algorithm has been proposed
which finds the best vector that results in less hardware. This paper presents the implementation and results of
this search algorithm using MATLAB. Functions such as number of ones calculation, generation of kids from
parent node, calculation of total number of ones (TN) for each child node in level are used to implement
the search algorithm.
The main requirement is to reduce the harware complexity of the design. To solve this problem,
improved technique is given in this paper to find number of XOR gates for different CRC algorithms.
This method is based on sharing technique in multiple rows which results in hardware efficient architecture as
compared to previous one. The remaining paper is organized as follows: In section 2, representation of serial
and parallel linear feedback shift register is done using state space method, summarizes the technique and
constraint to obtain transformation (T) matrix which is presented in [13], gives detail regarding implementation
of search algorithm and explaination of new technique to find number of XOR gates. Section 3 gives analysis
of comparison between proposed architecture and previous reported parallel architectures and conclusion is
given in section 4.
2. RESEARCH DESIGN
2.1. State-space representation of LFSR
State-space equation of conventional serial LFSR implementation is given as under
Xₙ ₓ ₗ (t+1) = Aₙ ₓ ₙ . Xₙ ₓ ₗ (t) + Bₙ ₓ ₗ . u(t) (1)
where in equation (1), Xₙ ₓ ₗ (t)is (n x 1) order vector and u(t) represent single bit input at time ‘t’ and matrix A
is in terms of generator polynomial coefficients which is same as the transition matrix in Galois implementation
of LFSR. A matrix is shown below.
3. Int J Elec & Comp Eng ISSN: 2088-8708
Area efficient parallel LFSR for cyclic redundancy check (Rita Mahajan)
1757
B vector is row vector of order n x 1 which is given as:
B= (gₙ₋₁, gₙ₋₂, ……….,g1,g0)T
According to equation (1) Xₙ ₓ ₗ (t+2) is given by
Xₙ ₓ ₗ (t+2) = Aₙ ₓ ₙ . Xₙ ₓ ₗ (t+1) + Bₙ ₓ ₗ . u(t+1)
Xₙ ₓ ₗ (t+2) = Aₙ ₓ ₙ [ Aₙ ₓ ₙ. Xₙ ₓ ₗ (t) + Bₙ ₓ ₗ . u(t) ]+ Bₙ ₓ ₗ . u(t+1) = A²ₙ ₓ ₙ . Xₙ ₓ ₗ (t) +
Aₙ ₓ ₙ. Bₙ ₓ ₗ . u(t) + Bₙ ₓ ₗ . u(t+1)
Similarly, Xₙ ₓ ₗ (t+3), Xₙ ₓ ₗ (t+4) and so on can be found.
According to all these recursive relations Xₙ ₓ ₗ (t+v) can be given as
Xₙₓₗ(t+v)=Aⱽₙₓₙ.Xₙₓₗ(t)+((Aⱽ⁻¹. B, . . . A. B, B) ) .[u(t), u(t + 1), u(t + 2) … . u(t + v − 1)]T (2)
Data message length is equal to ‘m’ and ‘v’ is equal to message input which is applied at the time ‘t’.
So v divides the data message of m length. At time t, parallel input is denoted as Uv(t) and given as u(tv),
u(tv+1), u(tv+2) .u(tv+v-1)T
where t varies from 0,1,2,3,4… ((m/v)-1). (2) can be given as :
Xₙₓₗ(t+v)=Aⱽₙₓₙ.Xₙ ₓ ₗ (t) + Bv. Uv(t) (3)
where Bv matrix has order n x v. Linear transformation is applied on Xₙ ₓ ₗ (t) to reduce the complexity.
Transformation matrix used must be a nonsingular matrix. Xₙₓₗ(t) = Tₙₓₙ x X⸆ₙₓₗ(t). Transformed state space
equation for (3) can be written as:
X⸆ₙₓₗ(t+1) = AvT. X⸆ₙₓₗ(t) + BvT.Uv(t) (4)
where AvT = T⁻¹ .Aⱽ. T and BvT=T⁻¹. Bv
Table 1 given below represents generator polynomial for different CRC algorithms. Figure 2 shows
block diagram of parallel LFSR based on state space transformation described by (4).
Table 1. Generator polynomial for different CRC algorithm
S.No. Name of the code Generator Polynomials
1 CRC-12 s¹² ⊕ s¹¹ ⊕ s³ ⊕ s² ⊕ s ⊕ 1
2 CRC-16 s¹⁶ ⊕ s¹⁵ ⊕ s² ⊕ 1
3 CRC-CCITT (SDLC) ¹⁶ ⊕ s¹² ⊕ s⁵ ⊕ 1
4 CRC-16 REVERSE s¹⁶ ⊕ s¹⁴ ⊕ s ⊕ 1
5 SDLC REVERSE s¹⁶ ⊕ s¹¹ ⊕ s⁴ ⊕ 1
6 CRC-32 s³² ⊕ s²⁶ ⊕ s²³ ⊕ s²² ⊕ s¹⁶ ⊕ s¹² ⊕ s¹¹ ⊕ s¹º ⊕ s⁸ ⊕ s⁷ ⊕ s⁵ ⊕ s⁴ ⊕ s² ⊕ s ⊕ 1
Figure 2. Parallel linear feedback shift register architecture using state-space transformation
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 1755 - 1763
1758
2.2. Method to find transformation matrix
There are many methods to find best transformation matrix. In [10], transformation matrix was
selected in such a way that would simplify the feedback path complexity but outside the feedback loop, circuit
complexity increased. This complexity resulted in more hardware cost. In [13], new method was presented to
find improved transformation matrix and following constraints were followed to find better transformation
matrix.
- The transformation matrix T must be non-singular matrix that could satisfy state space transformation.
- Less number of ones in coupling matrices AvT, BvT and T matrix. Because less number of ones directly
decide hardware complexity of the circuit in terms of XOR gates.
- Efficient method to search transformation matrix.
For transformation matrix, vector V of length n is used. Vector value cannot be equal
to 0. Vector MSB must be equal to 1 and other elements of this vector can be 0 or 1. Vector V is defined as V
= [ 1, v₁, v₂, v₃, ............ vₙ₋ₗ]. T matrix constructed from vector V is given below.
2.3. Search algorithm implementation
This algorithm search for the best vector which gives smallest TN. Total levels in the searching tree
is equal to number of total bits or equal to generator polynomial degree. The root node in the level 1 is given
value: [1 0 0…………...0] and child nodes in level n are obtained by replacing 0 with 1 in parent node of level
(n-1) which means number of child nodes for specific parent node is equal to number of zeros in that parent
node. Each node in Level n contains n number of ones.
C program is designed which computes the total number of nodes at each level, since the values
increases a lot as computation for higher bits is started. So, it is very important to know the total number of
nodes at each level otherwise CPU may take lots of time to complete the TN calculation and memory
requirement also increases. So, first step is to compute the total number of nodes at each level and next step is
to find the value of nodes at each level. To ease the output readability, values are shown in decimal format and
converted to binary internally for computation of TN. Since output window has limited size in C application,
so the output is shown for n=3 in Figure 3 and for n=5 in Figure 4. C application was first implemented to find
total number of nodes and value of nodes at each level and then search algorithm is implemented in MATLAB,
where saving and handling matrix data is easier as compared to C language. Search algorithm steps are
described by using flowchart given in Figure 5. MATLAB code structure for search algorithm is shown in
Figure 6. Description of each function and main code is given below.
Figure 3. Level Output for n=3
5. Int J Elec & Comp Eng ISSN: 2088-8708
Area efficient parallel LFSR for cyclic redundancy check (Rita Mahajan)
1759
Figure 4. Level Output for n=5
Figure 5. Flow chart for Search algorithm
Figure 6. MATLAB code structure
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 1755 - 1763
1760
- Search_Algorithm.m
This is the main file to get the input in the form of number of bits and ‘M’ value from user.
It computes the parent node and calculate other elements using functions of MATLAB used in code.
Final output shows oneT (number of ones in T matrix), oneAvT (number of ones in AvT matrix),
oneBvT (number of ones in BvT matrix) and TN with its corresponding child nodes and optimal node at each
level. Array of optimal nodes and node which has smallest value is shown at the end.
- Kids.m
This is MATLAB function which takes the input in the form of parent node and number of bits.
It generates multiple possible child nodes of parent node, saves the same in kid array and returns it to the main
function.
- tncalc.m
This function computes the TN, oneAvT, oneBvT and oneT value from each child node. It takes
the input in form of child nodes and number of bits. These calculations are based on constant element such as
A (transition matrix) and B vector which are different according to the CRC algorithm.
- kids_to_tn_array.m
This function converts the kid array into tn array using tncalc function. It is required to compute
the TN value of each child node which helps in computing the optimal node at each level. The process of
computing optimal node includes calculation of lowest TN value at each level. These optimal values are saved
in matrix and at the end of code, the lowest value from all optimal values is sorted. Final optimal value location
is identified in code which helps in finding the corresponding level and the node.
After calculating best vector which has smallest TN the next way to improve hardware efficiency is
to find number of XOR gates in the matrices of different CRC algorithm. If number of ones in any row is equal
to n and n is greater than 1, number of XOR gates needed to perform modulo-2 addition is (n-1) [10].
If single one is present in any row, then there is no requirement of XOR. XOR gates are calculated based on
the subexpression sharing technique. In [13], sharing technique is applied between two rows but in the proposed
method, sharing technique is applied in multiple rows.
Technique to find number of XOR gates is explained below. Matrices AvT, BvT and T for all CRC
algorithms are computed using MATLAB and then observe number of ones present in each row and column.
If number of ones are present at same columns in multiple rows, then number of XOR required for one row are
shared by other rows. By using this multiple sharing technique, less number of XOR gates are required which
further reduces hardware complexity over previous architecture [13].
3. RESULTS AND ANALYSIS
Table 2 shows vector V used, total number of ones and XOR gates required for T, AvT and BvT
matrices for all CRC algorithms. The comparison is given for previous model [13] and proposed method.
Number of XOR gates reduced from 53 to 35, 97 to 74, 82 to 77, 90 to 82, 461 to 255 for CRC-12, SDLC,
CRC-16 Reverse, SDLC Reverse and CRC-16 respectively and percentage reduction in XOR is 33.96%,
23.71%, 6.09%, 8.88% and 44.68% for above types of CRC. Percentage reduction in XOR is shown in
Table 2 rightmost column. It is observed that in proposed method number of XOR gate reduced for every type
of CRC instead of CRC-16. It should be noted that percentage reduction for CRC-32, 44.68% is very high
means very large reduction in hardware complexity is achieved. Finally, comparison between previous
architectures done on the basis of AT for frequently referenced generator polynomial given in Table 1.
Area Time Product (AT) depends on delay element (DE), total no. of XOR and CPD. AT is calculated as:
AT=(1.5 . DE + XOR). CPD
Table 3 gives the comparison between various architectures and proposed one. For the proposed
method, number of XOR gates are reduced for every CRC generator polynomial which means AT value is
reduced for every CRC. Relative value of AT is given in the rightmost column and the value is normalized
with the proposed one. It is observed that relative value is more than one for all previous architectures except
for CRC-16. All computations are based on the assumption that the level of parallelism ‘v’ is same as
the generator polynomial degree.
7. Int J Elec & Comp Eng ISSN: 2088-8708
Area efficient parallel LFSR for cyclic redundancy check (Rita Mahajan)
1761
Table 2. Comparison of paper [13] with the proposed one in terms of no. of ones
and XOR for T, AvT and BvT matrices
Name of the code Algorithm Vector b₂⋆
Vector V
AvT
1 XOR
BvT
1 XOR
T
1 XOR
Total
TN XOR
%age
Reduction in XOR
CRC-12 [13]
Proposed
[0xA01] 29 19
29 13
25 17
25 11
23 5
23 11
77 53
77 35
33.96%
CRC-16 [13]
Proposed
[0xC001] 35 23
35 16
33 15
33 15
32 6
32 16
100 60
100 63
No reduction
CRC-CCITT (SDLC) [13]
Proposed
[0x8408] 88 46
88 26
45 25
45 17
31 10
31 15
164 97
164 74
23.71%
CRC-16 REVERSE [13]
Proposed
[0xC002] 154 32
154 29
73 19
73 15
33 15
33 17
260 82
260 77
6.09%
SDLC REVERSE [13]
Proposed
[0x8810] 84 41
84 34
38 20
38 15
33 13
33 17
155 90
155 82
8.88%
CRC-32 [13]
Proposed
[0x80000212] 414 221
414 107
425 198
425 99
49 10
49 17
888 461
888 255
44.68%
Table 3. Several architectures comparison in terms of AT
Name of the code Algorithm XOR DE CPD AT
CRC-12 [11] 109 36 5 815 (2.86)
[12] 103 24 4 556 (1.95
[13] 53 24 4 356 (1.25)
Proposed 35 24 4 284 (1.00)
CRC-16 [11] 113 50 5 940 (1.69)
[12] 94 32 5 710 (1.27)
[13] 60 32 5 540 (0.97)
Proposed 63 32 5 555 (1.00)
CRC-CCITT (SDLC) [11] 139 50 5 1070 (2.92)
[12] 97 32 3 435 (1.18)
[13] 97 32 3 435 (1.18)
Proposed 74 32 3 366 (1.00)
CRC-16 REVERSE [11] 126 50 5 1005 (2.01)
[12] 82 32 4 520 (1.04)
[13] 82 32 4 520 (1.04)
Proposed 77 32 4 500 (1.00)
SDLC REVERSE [11] 127 50 5 1010 (1.94)
[12] 90 32 4 552 (1.06)
[13] 90 32 4 552 (1.06)
Proposed 82 32 4 520 (1.00)
CRC-32 [11] 794 96 5 4690 (2.67)
[12] 675 64 5 3855 (2.19)
[13] 461 64 5 2785 (1.58)
Proposed 255 64 5 1755 (1.00)
4. CONCLUSION
This paper presented a new method to find number of XOR gates in transformation and coupling
matrices for generator polynomial of different types of CRC. Implementation details of search algorithm are
given. Based upon this new improved method of finding XOR, the proposed method achieve smaller AT as
compared to previous architectures. Reduced AT value means parallel architecture of less hardware complexity
is obtained.
ACKNOWLEDGEMENTS
The authors would like to thank Punjab Engineering College for support, technical assistance
and appreciation.
REFERENCES
[1] G. Campobello, “Parallel CRC Realization,” IEEE Transactions On Computers, 52(10), pp.1312-1319, 2003.
[2] M. Goresky, A.M. Klapper. Fibonacci and Galois Representations of Feedback-With-Carry Shift Registers[J]. IEEE
Transactions On Information Theory, 48 (11), pp. 2826-2836, 2002.
[3] B. Singh, A. Khosla and S. Bindra, "Power Optimization of Linear Feedback Shift Register (LFSR) for Low Power
BIST," 2009 IEEE International Advance Computing Conference, Patiala, pp. 311-314, 2009.
[4] W. Aloisi and R. Mita, "Gated-Clock Design of Linear-Feedback Shift Registers," in IEEE Transactions on Circuits
and Systems II: Express Briefs, vol. 55, no. 6, pp. 546-550, June 2008.
8. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 2, April 2020 : 1755 - 1763
1762
[5] S. Hussain and V.M. Rao, “An Approach to Measure Transition Density of Binary Sequences for X-Filling based
Test Pattern Generator in Scan based Design,” International Journal of Electrical and Computer Engineering,
vol. 8 no. 4, pp.2063-2071, August 2018.
[6] T. V. Ramabadran and S. S. Gaitonde, “A tutorial on CRC computations,” in IEEE Micro, vol. 8, no. 4, pp. 62-75,
Aug. 1988.
[7] T. -. Pei and C. Zukowski, "High-speed parallel CRC circuits in VLSI," in IEEE Transactions on Communications,
vol. 40, no. 4, pp. 653-657, April 1992.
[8] M. Ayinala and K. K. Parhi, "Efficient parallel VLSI architecture for linear feedback shift registers," 2010 IEEE
Workshop On Signal Processing Systems, San Francisco, CA, pp. 52-57, 2010.
[9] J. H. Derby, "High-speed CRC computation using state-space transformations," GLOBECOM'01. IEEE Global
Telecommunications Conference (Cat. No.01CH37270), San Antonio, TX, pp. 166-170 vol.1, 2001.
[10] C. Kennedy and A. Reyhani-Masoleh, "High-speed CRC computations using improved state-space
transformations," 2009 IEEE International Conference on Electro/Information Technology, Windsor, ON, pp. 9-14,
2009.
[11] M. Ayinala and K. K. Parhi, "High-Speed Parallel Architectures for Linear Feedback Shift Registers," in IEEE
Transactions on Signal Processing, vol. 59, no. 9, pp. 4459-4469, Sept. 2011.
[12] J. Jung, H. Yoo, Y. Lee and I. Park, "Efficient Parallel Architecture for Linear Feedback Shift Registers," in IEEE
Transactions on Circuits and Systems II: Express Briefs, vol. 62, no. 11, pp. 1068-1072, Nov. 2015.
[13] G. Hu, J. Sha and Z. Wang, "High-Speed Parallel LFSR Architectures Based on Improved State-Space
Transformations," in IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 25, no. 3,
pp. 1159-1163, March 2017.
[14] K. K. Parhi, "Eliminating the fanout bottleneck in parallel long BCH encoders," in IEEE Transactions on Circuits
and Systems I: Regular Papers, vol. 51, no. 3, pp. 512-516, March 2004.
[15] X. Zhang and K. K. Parhi, “High-speed architectures for parallel long BCH encoders,” in Proc. ACM Great Lakes
Symp. VLSI, Boston, MA, USA, pp. 1–6, Apr. 2004.
[16] C. Kennedy and A. Reyhani-Masoleh, “High-speed parallel CRC circuits,” in Proc. 42nd Annu. Asilomar Conf.
Signals, Syst., Comput., pp. 1823–1829, Oct. 2008.
[17] C. Cheng and K. K. Parhi, “High speed VLSI architecture for general linear feedback shift register (LFSR)
structures,” in Proc. 43rd Asilomar Conf. on Signals, Syst., Comput., Monterey, CA, pp. 713–717, Nov. 2009.
[18] C. Cheng and K. K. Parhi, "High-Speed Parallel CRC Implementation Based on Unfolding, Pipelining, and
Retiming," in IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 53, no. 10, pp. 1017-1021,
Oct. 2006.
[19] Y. Do, S. Yoon, T. Kim, K. E. Pyun and S. Park, "High-Speed Parallel Architecture for Software-Based CRC," 2008
5th IEEE Consumer Communications and Networking Conference, Las Vegas, NV, pp. 74-78, 2008.
[20] M. E. Kounavis and F. L. Berry, "Novel Table Lookup-Based Algorithms for High-Performance CRC Generation,"
in IEEE Transactions on Computers, vol. 57, no. 11, pp. 1550-1560, Nov. 2008.
[21] M. Y. Hsiao and K. Y. Sih, "Serial-to-Parallel Transformation of Linear-Feedback Shift-Register Circuits," in IEEE
Transactions on Electronic Computers, vol. EC-13, no. 6, pp. 738-740, Dec. 1964.
[22] A. M. Patel, “A multi-channel CRC register”, in AFIPS Conference Proceedings, vol. 38, pp. 11-14, Spring 1971.
[23] M.-D. Shieh, M.-H. Sheu, C.-H. Chen, and H.-F. Lo, “A Systematic Approach for Parallel CRC Computations,”
Journal of Information Science and Engineering, vol. 17, no. 3, pp. 445–461, 2001.
[24] M.Sprachmann, “Automatic Generationof Parallel CRC Circuits,” IEEE Design and Test of Computers, vol. 18,
no. 3, pp. 108–114, 2001.
[25] A.S. Khirbeet and R.C. Muniyandi, “New Heuristic Model for Optimal CRC Polynomial,” International Journal of
Electrical and Computer Engineering, 7(1), pp. 521-525, February 2017.
[26] H. Chen, “CRT-based high-speed parallel architecture for long BCH encoding,” IEEE Trans. Circuits Syst. II: Expr.
Briefs, vol. 56, no. 8, pp. 684–686, Aug. 2009.
BIOGRAPHIES OF AUTHORS
Rita Mahajan was born in India, Punjab, in 1965. She did her B.E. (E&EC) Degree from Thapar
University, Patiala in 1986. She did her M.E. (Electronics) and Ph.D from Punjab Engineering
College Chandigarh, India in 1993 and 2016 respectively. She has got 28 years of teaching
experience. She has published more than 20 papers in International and National journals and
conferences. Her research interests include neural networks and cognitive radios, Digital VLSI
Design.
9. Int J Elec & Comp Eng ISSN: 2088-8708
Area efficient parallel LFSR for cyclic redundancy check (Rita Mahajan)
1763
Komal Devi was born in India, Haryana, in 1990. She did her B. Tech (ECE) Degree from
Kurukshetra University, Kurukshetra in 2011. She is pursuing her M.Tech (VLSI Design) from
Punjab Engineering College Chandigarh, India. She has got 1.5 years of teaching experience.
Her research interests include digital VLSI design.
Deepak Bagai was born in India, Chandigarh, in 1963. He did his B.E. (E&EC), M.E.
(Electronics) and Ph.D from Punjab Engineering College Chandigarh, India in 1985, 1992, and
1997 respectively. He has got 28 years of teaching experience. He has published more than 40
papers in International and National journals and conferences. His research interests include
telecommunications and wireless communications.