Zigbee is one of the major sources of interference
in 2.4GHz band for WLANs. It is seen whenever any Zigbee
system is operating near to the WLAN system and
transmitting signal at same frequency, time as of WLAN’s, the
later ones performance detoriate severely. So in this paper an
algorithm is proposed to estimate Zigbee interference
component present in all OFDM based WLANs sub-carriers
and cancel out the Zigbee interference from the received
signal of WLANs receiver for multipath fading channels in
frequency domain. Simulation results shows for high SNR
values full cancellation of Zigbee interference or zero BER is
possible.
Design limitations and its effect in the performance of ZC1-DPLLIDES Editor
The paper studies the dynamics of a conventional
positive going zero crossing type digital phase locked loop
(ZC1-DPLL) taking non-ideal responses of the loop constituent
blocks into account. The finite width of the sampling pulses
and the finite propagation delay of the loop subsystems are
properly modeled mathematically and the system dynamics is
found to change because of their influence considered
separately. However, when these two are taken simultaneously,
the system dynamics can be made nearly equivalent to that of
the ideal system. Through an extensive numerical simulation
a set of optimum parameters to overcome design limitations
have been obtained.
This document discusses a modified coding technique to reduce peak-to-average power ratio (PAPR) in orthogonal frequency division multiplexing (OFDM) systems. It begins by introducing the PAPR problem in OFDM and existing solutions using Golay complementary sequences (GCS). It then presents definitions and theorems regarding recursive Golay complementary codes (RGCC) that can provide codewords with low PAPR. The paper proposes generating a 16-QAM OFDM signal from QPSK Golay complementary pairs using RGCC to achieve both higher coding rate and lower PAPR compared to existing techniques.
Ber performance analysis of mimo systems using equalizationAlexander Decker
The document discusses equalization techniques for analyzing bit error rate (BER) performance in multiple-input multiple-output (MIMO) systems. It analyzes different equalization techniques like zero forcing (ZF), minimum mean squared error (MMSE), ZF with successive interference cancellation (ZF-SIC), MMSE with SIC (MMSE-SIC), maximum likelihood (ML) and sphere decoding. Simulation results show that successive interference methods outperform ZF and MMSE, but have higher complexity. ML provides better performance than others, while sphere decoding gives the best performance but highest complexity compared to ML.
Adaptive Noise Cancellation using Multirate TechniquesIJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
This document summarizes a study of modified noise-shaper architectures for oversampled sigma-delta digital-to-analog converters (ΣΔDACs). Two hybrid architectures, A1 and A2, are investigated to trade off noise-shaper and digital-to-analog converter (DAC) complexity while maintaining signal-to-noise ratio (SNR). Simulation results show that architecture A1 achieves fairly good SNR by reducing the number of bits to the noise shaper, while architecture A2 further reduces DAC complexity at the cost of doubling the number of DACs. The number of required DAC unit elements is computed and compared for different architectures and parameter values, illustrating the complexity tradeoffs between noise shaping
1. The document presents an audio watermarking algorithm based on discrete wavelet transform and least significant bit insertion (DWT-LSB). The DWT decomposes the audio signal into sub-bands to identify locations for embedding watermark bits. The watermark bits are embedded in the high-resolution sub-band using LSB insertion.
2. Testing showed SNR values between 53.7-59.6 dB for different audio signals, indicating imperceptibility of the embedded watermark. The DWT-LSB method provides satisfactory robustness and imperceptibility for audio watermarking.
3. Digital watermarking techniques like the one proposed can help protect copyright of digital audio by embedding invisible signatures as
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...Iaetsd Iaetsd
This document describes the design and implementation of a power efficient iterative logarithmic multiplier using Mitchell's algorithm and reversible logic. It involves converting multiplication to addition using logarithmic numbers. The proposed design implements a basic block consisting of leading one detectors, encoders, barrel shifters and a decoder to calculate an approximate product. Error correction circuits are then cascaded with the basic blocks to improve accuracy. The 4x4 reversible logarithmic multiplier is designed and simulated using Xilinx tools, demonstrating lower power consumption through the use of reversible logic.
Iaetsd low power flip flops for vlsi applicationsIaetsd Iaetsd
The document discusses low power flip flops for use in digitally controlled delay lines (DCDLs). It first describes issues with conventional NAND-based DCDLs, such as glitches that occur when the control code changes. It then proposes using a Low Power Forced Stack Clocked Pass Transistor flip-flop (LP-FSCPTFF) as the driving circuit in the DCDL. This flip-flop architecture consumes less power and has lower delay than dual edge triggered flip flops used conventionally. Simulation results show the proposed DCDL using LP-FSCPTFF reduces power consumption by up to 90% compared to other efficient flip-flop designs. The low power DCD
Design limitations and its effect in the performance of ZC1-DPLLIDES Editor
The paper studies the dynamics of a conventional
positive going zero crossing type digital phase locked loop
(ZC1-DPLL) taking non-ideal responses of the loop constituent
blocks into account. The finite width of the sampling pulses
and the finite propagation delay of the loop subsystems are
properly modeled mathematically and the system dynamics is
found to change because of their influence considered
separately. However, when these two are taken simultaneously,
the system dynamics can be made nearly equivalent to that of
the ideal system. Through an extensive numerical simulation
a set of optimum parameters to overcome design limitations
have been obtained.
This document discusses a modified coding technique to reduce peak-to-average power ratio (PAPR) in orthogonal frequency division multiplexing (OFDM) systems. It begins by introducing the PAPR problem in OFDM and existing solutions using Golay complementary sequences (GCS). It then presents definitions and theorems regarding recursive Golay complementary codes (RGCC) that can provide codewords with low PAPR. The paper proposes generating a 16-QAM OFDM signal from QPSK Golay complementary pairs using RGCC to achieve both higher coding rate and lower PAPR compared to existing techniques.
Ber performance analysis of mimo systems using equalizationAlexander Decker
The document discusses equalization techniques for analyzing bit error rate (BER) performance in multiple-input multiple-output (MIMO) systems. It analyzes different equalization techniques like zero forcing (ZF), minimum mean squared error (MMSE), ZF with successive interference cancellation (ZF-SIC), MMSE with SIC (MMSE-SIC), maximum likelihood (ML) and sphere decoding. Simulation results show that successive interference methods outperform ZF and MMSE, but have higher complexity. ML provides better performance than others, while sphere decoding gives the best performance but highest complexity compared to ML.
Adaptive Noise Cancellation using Multirate TechniquesIJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
This document summarizes a study of modified noise-shaper architectures for oversampled sigma-delta digital-to-analog converters (ΣΔDACs). Two hybrid architectures, A1 and A2, are investigated to trade off noise-shaper and digital-to-analog converter (DAC) complexity while maintaining signal-to-noise ratio (SNR). Simulation results show that architecture A1 achieves fairly good SNR by reducing the number of bits to the noise shaper, while architecture A2 further reduces DAC complexity at the cost of doubling the number of DACs. The number of required DAC unit elements is computed and compared for different architectures and parameter values, illustrating the complexity tradeoffs between noise shaping
1. The document presents an audio watermarking algorithm based on discrete wavelet transform and least significant bit insertion (DWT-LSB). The DWT decomposes the audio signal into sub-bands to identify locations for embedding watermark bits. The watermark bits are embedded in the high-resolution sub-band using LSB insertion.
2. Testing showed SNR values between 53.7-59.6 dB for different audio signals, indicating imperceptibility of the embedded watermark. The DWT-LSB method provides satisfactory robustness and imperceptibility for audio watermarking.
3. Digital watermarking techniques like the one proposed can help protect copyright of digital audio by embedding invisible signatures as
Iaetsd implementation of power efficient iterative logarithmic multiplier usi...Iaetsd Iaetsd
This document describes the design and implementation of a power efficient iterative logarithmic multiplier using Mitchell's algorithm and reversible logic. It involves converting multiplication to addition using logarithmic numbers. The proposed design implements a basic block consisting of leading one detectors, encoders, barrel shifters and a decoder to calculate an approximate product. Error correction circuits are then cascaded with the basic blocks to improve accuracy. The 4x4 reversible logarithmic multiplier is designed and simulated using Xilinx tools, demonstrating lower power consumption through the use of reversible logic.
Iaetsd low power flip flops for vlsi applicationsIaetsd Iaetsd
The document discusses low power flip flops for use in digitally controlled delay lines (DCDLs). It first describes issues with conventional NAND-based DCDLs, such as glitches that occur when the control code changes. It then proposes using a Low Power Forced Stack Clocked Pass Transistor flip-flop (LP-FSCPTFF) as the driving circuit in the DCDL. This flip-flop architecture consumes less power and has lower delay than dual edge triggered flip flops used conventionally. Simulation results show the proposed DCDL using LP-FSCPTFF reduces power consumption by up to 90% compared to other efficient flip-flop designs. The low power DCD
The performance of turbo codes for wireless communication systemschakravarthy Gopi
This document describes and compares two algorithms for decoding turbo codes: the Soft-Output Viterbi Algorithm (SOVA) and the Logarithmic Maximum A Posteriori (Log-MAP) algorithm. It provides simulations results that show the Log-MAP algorithm achieves 0.4 dB better bit error rate performance than SOVA for turbo codes with a constraint length of 3 over an additive white Gaussian noise channel. The document is arranged into sections that describe the channel model, each decoding algorithm, iterative decoding principles, and simulation results comparing the two algorithms' performance for different block lengths.
The document reports on an experimental study of the hidden node problem in IEEE 802.11 wireless networks. The experiments show that:
1) Transmission ranges and carrier sensing ranges differ from NS2 simulator defaults, dropping more gradually with distance.
2) Using RTS/CTS does not solve the hidden node problem and reduces throughput due to overhead.
3) "Re-routing instability" seen in simulations occurs in real networks, degrading throughput.
4) There is an "optimal offered load" that maximizes end-to-end throughput in multi-hop flows.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMIJNSA Journal
In 1998 [8], Patarin proposed an efficient cryptosystem called Little Dragon which was a variant a variant of Matsumoto Imai cryptosystem C*. However Patarin latter found that Little Dragon cryptosystem is not secure [8], [3]. In this paper we propose a cryptosystem Little Dragon Two which is as efficient as Little Dragon cryptosystem but secure against all the known attacks. Like Little Dragon cryptosystem the public key of Little Dragon Two is mixed type that is quadratic in plaintext and cipher text variables. So the public key size of Little Dragon Two is equal to Little Dragon Cryptosystem. Our public key algorithm is bijective and can be used for both encryption and signatures.
My first comprehensive wlan presentation in the draft-11n days in 2008.
Note: Lots of text and pictures are used from across the web, author doesn't claim any copyright on them. In case of issues/feedback please email: chaitanya.mgit@gmail.com
Grant Reaber “Wavenet and Wavenet 2: Generating high-quality audio with neura...Lviv Startup Club
WaveNet and WaveNet 2 are neural network models that can directly generate audio waveforms from text. WaveNet produces the highest quality text-to-speech but is slow, taking minutes to generate seconds of audio. WaveNet 2 speeds this up by 3000x through a "distillation" technique that trains a faster model using the original WaveNet. Both models are autoregressive, generating each audio sample conditioned on previous samples, and can be conditioned on text to enable text-to-speech synthesis.
Cryptography is used to provide privacy and authentication in network communications. There are two main types of cryptography - symmetric cryptography which uses a shared secret key for encryption and decryption, and asymmetric cryptography which uses public/private key pairs. Popular symmetric algorithms include DES and AES, while RSA is an example of an asymmetric algorithm. Cryptanalysis involves attempts to decrypt encrypted messages without access to the key, while key management ensures secure distribution and updating of cryptographic keys over time.
P03 neural networks cvpr2012 deep learning methods for visionzukun
This document provides an overview of neural networks for computer vision tasks. It discusses using neural networks to build an object recognition system from raw pixels to labels in an end-to-end manner with no distinction between feature extraction and classification. The key ideas are to learn features from data, use differentiable functions to efficiently compute and train features, and use a "deep" architecture of simpler non-linear modules. Building complex functions from simple building blocks like logistic regression allows constructing highly non-linear systems for tasks like vision.
High Speed Decoding of Non-Binary Irregular LDPC Codes Using GPUs (Paper)Enrique Monzo Solves
Implementation of a high speed decoding of non-binary irregular LDPC codes using CUDA GPUs.
Moritz Beermann, Enrique Monzó, Laurent Schmalen, Peter Vary
IEEE SiPS, Oct. 2013, Taipei, Taiwan
FR1.L09 - PREDICTIVE QUANTIZATION OF DECHIRPED SPOTLIGHT-MODE SAR RAW DATA IN...grssieee
This document presents methods for predictive quantization of dechirped spotlight-mode synthetic aperture radar (SAR) raw data in the transform domain. It discusses previous work on SAR data compression, analyzes the characteristics of spotlight SAR data in the inverse discrete Fourier transform (IDFT) domain, and proposes three predictive encoding schemes - transform domain block predictive quantization (TD-BPQ), transform domain block predictive vector quantization (TD-BPVQ), and predictive trellis coded quantization (TD-PTCQ) - to take advantage of correlations in the transformed data. Numerical results on an example dataset show SNR improvements of up to 6 dB compared to baseline block adaptive quantization.
This document presents a comparative analysis of digital image watermarking techniques in the frequency domain using MATLAB Simulink. It discusses watermarking using discrete cosine transform (DCT) and discrete wavelet transform (DWT). For DCT, the image is divided into blocks and DCT is applied before embedding the watermark in middle frequency coefficients. For extraction, the same process is reversed. For DWT, the image is decomposed into sub-bands before embedding the watermark into the low-high frequency sub-band. Extraction follows the reverse process. The document also proposes a technique using both DCT and DWT that embeds a watermark into DCT coefficients of DWT sub-bands for increased robust
This document compares the Selected Mapping (SLM) and Partial Transmit Sequence (PTS) techniques for reducing peak-to-average power ratio (PAPR) in multicarrier code division multiple access (MC-CDMA) systems. Through MATLAB simulations, the authors found that:
1) PTS partitions the input data block into disjoint subblocks, weights the subcarriers in each subblock with phase factors, and selects the combination with the lowest PAPR for transmission.
2) SLM generates multiple alternative signals by multiplying the input with different phase sequences before inverse fast Fourier transform. It selects the signal with the lowest PAPR for transmission.
3) PTS has lower computational
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document describes the implementation of a turbo encoder and turbo decoder on a TMS320C6713 digital signal processor. Turbo codes are used for error correction in wireless communication systems. A turbo encoder consists of two recursive systematic convolutional encoders connected in parallel by an interleaver. The document implements a turbo encoder that encodes input bits and a turbo decoder that uses the iterative soft-output Viterbi algorithm to decode the encoded bits. The implementation is optimized for execution time and memory usage on the TMS320C6713 DSP. Simulation results validate the DSP implementation over a Rayleigh fading channel.
The document introduces the operation of a photonic full adder. It discusses using different wavelengths of light modulated with binary data and polarized in different ways to represent logic values. The full adder circuit uses these photonic logic gates such as AND, OR, and wavelength converters. It provides a detailed explanation of how the circuit works at each logic gate using the photonic representation and constructive/destructive interference of the wavelengths. The document also notes some optimizations that could be made to the circuit design to reduce components like wavelength converters.
A New Classifier Based onRecurrent Neural Network Using Multiple Binary-Outpu...iosrjce
This document proposes a new classifier based on recurrent neural networks using multiple binary-output networks. Instead of one large network with many outputs, it uses multiple simple recurrent neural networks, each trained on a single class and outputting a binary true/false prediction. A decision layer is added to each network to determine the final classification from the sequence of outputs. The method is tested on a database of 17,000 handwritten Iranian city names, achieving a top-1 classification rate of 83.9% and average reliability of 72.3%. Experimental results show the effectiveness of using multiple smaller networks over a single large network for classification.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Design of an Ameliorated Methodology for the Abstraction of Usable Components...IDES Editor
The object oriented design requires that the view
element required for the design is to be abstracted from the
SRS. So it is required to transform the requirements into
object oriented paradigm and then proceed for the
development. We are intending in our ensued project, to
develop a sequence of methods in the form of methodology,
those take the requirements and then transform it into objectoriented
paradigm. We are intending to develop an automated
(with least human intervention) sequence of methodology that
takes requirements specification as input and abstracts
required elements for the object oriented system. This is a
semiautomatic methodology. In few steps of our methodology
whenever the human intervention is required the detailed
guidelines for that of the process is framed to facilitate the
human worker to take unique unambiguous decision.
Energy-Efficient LDPC Decoder using DVFS for binary sourcesIDES Editor
This paper deals with reduction of the transmission
power usage in the wireless sensor networks. A system with
FEC can provide an objective reliability using less power
than a system without FEC. We propose to study LDPC
codes to provide reliable communication while saving power
in the sensor networks. As shown later, LDPC codes are more
energy efficient than those that use BCH codes. Another
method to reduce the transmission cost is to compress the
correlated data among a number of sensor nodes before
transmission. A suitable source encoder that removes the
redundant information bits can save the transmission power.
Such a system requires distributed source coding. We propose
to apply LDPC codes for both distributed source coding and
source-channel coding to obtain a two-fold energy savings.
Source and channel coding with LDPC for two correlated nodes
under AWGN channel is implemented in this paper. In this
iterative decoding algorithm is used for decoding the data, and
it’s efficiency is compared with the new decoding algorithm
called layered decoding algorithm which based on offset min
sum algorithm. The usage of layered decoding algorithm and
Adaptive LDPC decoding for AWGN channel reduces the
decoding complexity and its number of iterations. So the power
will be saved, and it can be implemented in hardware.
Semi-automatic Discovery of Mappings Between Heterogeneous Data Warehouse Dim...IDES Editor
Data Warehousing is the main Business
Intelligence instrument for the analysis of large amounts of
data. It permits the extraction of relevant information for
decision making processes inside organizations. Given the
great diffusion of Data Warehouses, there is an increasing
need to integrate information coming from independent
Data Warehouses or from independently developed data
marts in the same Data Warehouse. In this paper, we
provide a method for the semi-automatic discovery of
common topological properties of dimensions that can be
used to automatically map elements of different dimensions
in heterogeneous Data Warehouses. The method uses
techniques from the Data Integration research area and
combines topological properties of dimensions in a
multidimensional model.
Range Extended Second Order Digital Phase Locked LoopIDES Editor
A new structure of second order digital phase
locked loop (DPLL) called modified second order DPLL
(MSODPLL) has been proposed. The phase error
dynamics of a conventional second order DPLL
(CSODPLL) and that of a MSODPLL have been studied
using digital computers. Ranges of initial conditions
leading to the phase locking condition were determined
from computer simulation of both conventional and
modified second order DPLL Using these observations
the larger frequency acquisition range (FAR) of the
MSODPLL compared to the CSODPLL has been
established.
The performance of turbo codes for wireless communication systemschakravarthy Gopi
This document describes and compares two algorithms for decoding turbo codes: the Soft-Output Viterbi Algorithm (SOVA) and the Logarithmic Maximum A Posteriori (Log-MAP) algorithm. It provides simulations results that show the Log-MAP algorithm achieves 0.4 dB better bit error rate performance than SOVA for turbo codes with a constraint length of 3 over an additive white Gaussian noise channel. The document is arranged into sections that describe the channel model, each decoding algorithm, iterative decoding principles, and simulation results comparing the two algorithms' performance for different block lengths.
The document reports on an experimental study of the hidden node problem in IEEE 802.11 wireless networks. The experiments show that:
1) Transmission ranges and carrier sensing ranges differ from NS2 simulator defaults, dropping more gradually with distance.
2) Using RTS/CTS does not solve the hidden node problem and reduces throughput due to overhead.
3) "Re-routing instability" seen in simulations occurs in real networks, degrading throughput.
4) There is an "optimal offered load" that maximizes end-to-end throughput in multi-hop flows.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMIJNSA Journal
In 1998 [8], Patarin proposed an efficient cryptosystem called Little Dragon which was a variant a variant of Matsumoto Imai cryptosystem C*. However Patarin latter found that Little Dragon cryptosystem is not secure [8], [3]. In this paper we propose a cryptosystem Little Dragon Two which is as efficient as Little Dragon cryptosystem but secure against all the known attacks. Like Little Dragon cryptosystem the public key of Little Dragon Two is mixed type that is quadratic in plaintext and cipher text variables. So the public key size of Little Dragon Two is equal to Little Dragon Cryptosystem. Our public key algorithm is bijective and can be used for both encryption and signatures.
My first comprehensive wlan presentation in the draft-11n days in 2008.
Note: Lots of text and pictures are used from across the web, author doesn't claim any copyright on them. In case of issues/feedback please email: chaitanya.mgit@gmail.com
Grant Reaber “Wavenet and Wavenet 2: Generating high-quality audio with neura...Lviv Startup Club
WaveNet and WaveNet 2 are neural network models that can directly generate audio waveforms from text. WaveNet produces the highest quality text-to-speech but is slow, taking minutes to generate seconds of audio. WaveNet 2 speeds this up by 3000x through a "distillation" technique that trains a faster model using the original WaveNet. Both models are autoregressive, generating each audio sample conditioned on previous samples, and can be conditioned on text to enable text-to-speech synthesis.
Cryptography is used to provide privacy and authentication in network communications. There are two main types of cryptography - symmetric cryptography which uses a shared secret key for encryption and decryption, and asymmetric cryptography which uses public/private key pairs. Popular symmetric algorithms include DES and AES, while RSA is an example of an asymmetric algorithm. Cryptanalysis involves attempts to decrypt encrypted messages without access to the key, while key management ensures secure distribution and updating of cryptographic keys over time.
P03 neural networks cvpr2012 deep learning methods for visionzukun
This document provides an overview of neural networks for computer vision tasks. It discusses using neural networks to build an object recognition system from raw pixels to labels in an end-to-end manner with no distinction between feature extraction and classification. The key ideas are to learn features from data, use differentiable functions to efficiently compute and train features, and use a "deep" architecture of simpler non-linear modules. Building complex functions from simple building blocks like logistic regression allows constructing highly non-linear systems for tasks like vision.
High Speed Decoding of Non-Binary Irregular LDPC Codes Using GPUs (Paper)Enrique Monzo Solves
Implementation of a high speed decoding of non-binary irregular LDPC codes using CUDA GPUs.
Moritz Beermann, Enrique Monzó, Laurent Schmalen, Peter Vary
IEEE SiPS, Oct. 2013, Taipei, Taiwan
FR1.L09 - PREDICTIVE QUANTIZATION OF DECHIRPED SPOTLIGHT-MODE SAR RAW DATA IN...grssieee
This document presents methods for predictive quantization of dechirped spotlight-mode synthetic aperture radar (SAR) raw data in the transform domain. It discusses previous work on SAR data compression, analyzes the characteristics of spotlight SAR data in the inverse discrete Fourier transform (IDFT) domain, and proposes three predictive encoding schemes - transform domain block predictive quantization (TD-BPQ), transform domain block predictive vector quantization (TD-BPVQ), and predictive trellis coded quantization (TD-PTCQ) - to take advantage of correlations in the transformed data. Numerical results on an example dataset show SNR improvements of up to 6 dB compared to baseline block adaptive quantization.
This document presents a comparative analysis of digital image watermarking techniques in the frequency domain using MATLAB Simulink. It discusses watermarking using discrete cosine transform (DCT) and discrete wavelet transform (DWT). For DCT, the image is divided into blocks and DCT is applied before embedding the watermark in middle frequency coefficients. For extraction, the same process is reversed. For DWT, the image is decomposed into sub-bands before embedding the watermark into the low-high frequency sub-band. Extraction follows the reverse process. The document also proposes a technique using both DCT and DWT that embeds a watermark into DCT coefficients of DWT sub-bands for increased robust
This document compares the Selected Mapping (SLM) and Partial Transmit Sequence (PTS) techniques for reducing peak-to-average power ratio (PAPR) in multicarrier code division multiple access (MC-CDMA) systems. Through MATLAB simulations, the authors found that:
1) PTS partitions the input data block into disjoint subblocks, weights the subcarriers in each subblock with phase factors, and selects the combination with the lowest PAPR for transmission.
2) SLM generates multiple alternative signals by multiplying the input with different phase sequences before inverse fast Fourier transform. It selects the signal with the lowest PAPR for transmission.
3) PTS has lower computational
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document describes the implementation of a turbo encoder and turbo decoder on a TMS320C6713 digital signal processor. Turbo codes are used for error correction in wireless communication systems. A turbo encoder consists of two recursive systematic convolutional encoders connected in parallel by an interleaver. The document implements a turbo encoder that encodes input bits and a turbo decoder that uses the iterative soft-output Viterbi algorithm to decode the encoded bits. The implementation is optimized for execution time and memory usage on the TMS320C6713 DSP. Simulation results validate the DSP implementation over a Rayleigh fading channel.
The document introduces the operation of a photonic full adder. It discusses using different wavelengths of light modulated with binary data and polarized in different ways to represent logic values. The full adder circuit uses these photonic logic gates such as AND, OR, and wavelength converters. It provides a detailed explanation of how the circuit works at each logic gate using the photonic representation and constructive/destructive interference of the wavelengths. The document also notes some optimizations that could be made to the circuit design to reduce components like wavelength converters.
A New Classifier Based onRecurrent Neural Network Using Multiple Binary-Outpu...iosrjce
This document proposes a new classifier based on recurrent neural networks using multiple binary-output networks. Instead of one large network with many outputs, it uses multiple simple recurrent neural networks, each trained on a single class and outputting a binary true/false prediction. A decision layer is added to each network to determine the final classification from the sequence of outputs. The method is tested on a database of 17,000 handwritten Iranian city names, achieving a top-1 classification rate of 83.9% and average reliability of 72.3%. Experimental results show the effectiveness of using multiple smaller networks over a single large network for classification.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Design of an Ameliorated Methodology for the Abstraction of Usable Components...IDES Editor
The object oriented design requires that the view
element required for the design is to be abstracted from the
SRS. So it is required to transform the requirements into
object oriented paradigm and then proceed for the
development. We are intending in our ensued project, to
develop a sequence of methods in the form of methodology,
those take the requirements and then transform it into objectoriented
paradigm. We are intending to develop an automated
(with least human intervention) sequence of methodology that
takes requirements specification as input and abstracts
required elements for the object oriented system. This is a
semiautomatic methodology. In few steps of our methodology
whenever the human intervention is required the detailed
guidelines for that of the process is framed to facilitate the
human worker to take unique unambiguous decision.
Energy-Efficient LDPC Decoder using DVFS for binary sourcesIDES Editor
This paper deals with reduction of the transmission
power usage in the wireless sensor networks. A system with
FEC can provide an objective reliability using less power
than a system without FEC. We propose to study LDPC
codes to provide reliable communication while saving power
in the sensor networks. As shown later, LDPC codes are more
energy efficient than those that use BCH codes. Another
method to reduce the transmission cost is to compress the
correlated data among a number of sensor nodes before
transmission. A suitable source encoder that removes the
redundant information bits can save the transmission power.
Such a system requires distributed source coding. We propose
to apply LDPC codes for both distributed source coding and
source-channel coding to obtain a two-fold energy savings.
Source and channel coding with LDPC for two correlated nodes
under AWGN channel is implemented in this paper. In this
iterative decoding algorithm is used for decoding the data, and
it’s efficiency is compared with the new decoding algorithm
called layered decoding algorithm which based on offset min
sum algorithm. The usage of layered decoding algorithm and
Adaptive LDPC decoding for AWGN channel reduces the
decoding complexity and its number of iterations. So the power
will be saved, and it can be implemented in hardware.
Semi-automatic Discovery of Mappings Between Heterogeneous Data Warehouse Dim...IDES Editor
Data Warehousing is the main Business
Intelligence instrument for the analysis of large amounts of
data. It permits the extraction of relevant information for
decision making processes inside organizations. Given the
great diffusion of Data Warehouses, there is an increasing
need to integrate information coming from independent
Data Warehouses or from independently developed data
marts in the same Data Warehouse. In this paper, we
provide a method for the semi-automatic discovery of
common topological properties of dimensions that can be
used to automatically map elements of different dimensions
in heterogeneous Data Warehouses. The method uses
techniques from the Data Integration research area and
combines topological properties of dimensions in a
multidimensional model.
Range Extended Second Order Digital Phase Locked LoopIDES Editor
A new structure of second order digital phase
locked loop (DPLL) called modified second order DPLL
(MSODPLL) has been proposed. The phase error
dynamics of a conventional second order DPLL
(CSODPLL) and that of a MSODPLL have been studied
using digital computers. Ranges of initial conditions
leading to the phase locking condition were determined
from computer simulation of both conventional and
modified second order DPLL Using these observations
the larger frequency acquisition range (FAR) of the
MSODPLL compared to the CSODPLL has been
established.
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...IDES Editor
This document presents a bimodal biometric system that fuses fingerprint and iris features for identification. It extracts features from the iris using two-level discrete wavelet transformation and discrete cosine transformation. Fingerprint features are extracted using fast Fourier transformation and discrete wavelet transformation. The iris and fingerprint features are concatenated to form the final feature set. Experimental results on fingerprint and iris databases show that the proposed bimodal system has lower false rejection and false acceptance rates and higher total success rate compared to existing unimodal systems.
A New Active Snubber Circuit for PFC ConverterIDES Editor
In this paper, a new active snubber circuit is
developed for PFC converter. This active snubber circuit
provides zero voltage transition (ZVT) turn on and zero
current transition (ZCT) turn off for the main switch
without any extra current or voltage stresses. Auxiliary
switch turns on and off with zero current switching (ZCS)
without voltage stress. Although there is a current stress
on the auxiliary switch, it is decreased by diverting it to
the output side with coupling inductance. The proposed
PFC converter controls output current and voltage in
very wide line and load range. This PFC converter has
simple structure, low cost and ease of control as well. In
this study, a detailed steady state analysis of the new
converter is presented, and the theoretical analysis is
verified exactly by 100 kHz and 300 W prototype. This
prototype has 98% total efficiency and 0.99 power factor
with sinusoidal current shape.
A High Speed Pipelined Dynamic Circuit Implementation Using Modified TSPC Log...IDES Editor
This document presents a modified True Single Phase Clock (TSPC) logic design style to implement high-speed pipelined circuits with improved performance. The modified style reduces transistor count by 40-50% compared to the standard TSPC style by allowing logic functions to be implemented using either the N-block or P-block. A 3-bit pipelined adder was designed using the modified style and showed a 46-47% reduction in transistors and 50% reduction in clock cycles compared to the standard style. The modified style offers benefits like lower transistor count, reduced latency, increased throughput, and lower power consumption for pipelined circuits.
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
This document summarizes a research paper that proposes using artificial intelligence techniques and FACTS controllers for reactive power planning in real-time power transmission systems. The paper formulates the reactive power planning problem and incorporates flexible AC transmission system (FACTS) devices like static VAR compensators (SVC), thyristor controlled series capacitors (TCSC), and unified power flow controllers (UPFC). Evolutionary algorithms like evolutionary programming (EP) and differential evolution (DE) are applied to find the optimal locations and settings of the FACTS controllers to minimize losses and costs. Simulation results on IEEE 30-bus and 72-bus Indian test systems show that UPFC performs best in reducing losses compared to SVC and TCSC.
Power System State Estimation - A ReviewIDES Editor
This document provides a review of power system state estimation techniques. It discusses both static and dynamic state estimation algorithms. For static state estimation, it covers weighted least squares, decoupled, and robust estimation methods. Weighted least squares is commonly used but can have numerical instability issues. Decoupled state estimation approximates the gain matrix for faster computation. Robust estimation uses M-estimators and other techniques to handle outliers and bad data. Dynamic state estimation applies Kalman filtering, leapfrog algorithms, and other methods to continuously monitor system states over time.
This document analyzes the performance of a Bluetooth system using an optimized differential Gaussian frequency-shift keying (GFSK) demodulator. It first introduces Bluetooth technology and the GFSK modulation scheme. It then presents the system model and signal model for the Bluetooth transmission. The key contribution is developing an optimized differential GFSK demodulator that averages the phase over a portion of each symbol to improve performance compared to conventional differential demodulation that uses a single phase sample per symbol. Simulation results show the proposed demodulator achieves better bit error rate than conventional techniques.
Comparative Analysis of Distortive and Non-Distortive Techniques for PAPR Red...IDES Editor
OFDM is a popular and widely accepted modulation
and multiplexing technique in the area of wireless
communication. IEEE 802.15, a wireless specification defined
for WPAN is an emerging wireless technology for short range
multimedia applications. Two general categories of 802.15
are the low rate 802.15.4 (ZigBee) and high rate 802.15.3
(UWB). In their physical (PHY) layer design, OFDM is a
competing technique due to the various advantages it renders
in the practical wireless media. OFDM has been a popular
technique for many years and adopted as the core technique
in a number of wireless standards. It makes the system more
immune to interference like InterSymbol Interference (ISI)
and InterCarrier Interference (ICI) and dispersive effects of
the channel. It is also a spectrally efficient scheme since the
spectra of the signal are overlapping in nature. Despite these
advantages OFDM suffers from a serious problem of high
Peak to Average Power. This limits the system’s capabilities
and increases the complexity. This paper compares the signal
distortion technique of Amplitude Clipping and the
distortionless technique of SLM for Peak to Average Power
reduction
Pilot induced cyclostationarity based method for dvb system identificationiaemedu
This document presents a method for identifying digital video broadcasting (DVB) systems using pilot induced cyclostationarity (PIC). The PIC approach exploits the periodic structure of pilot symbols in orthogonal frequency division multiplexing (OFDM) signals to detect cyclostationary features. However, the PIC method has lower identification rates for DVB compared to other standards due to DVB using two pilot configuration types. The proposed method is an extension of the PIC technique developed specifically for DVB identification. Simulation results show the proposed method achieves excellent correct detection probability for DVB systems.
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...IJERA Editor
The technical challenges for communication engineers is the development of best performance wireless
networks with negligible amount of distortions. We have to consider multipath propagation attenuation and
radio spectrum inefficiency. Now a days, In MIMO (Multi Input Multi Output) systems there is a huge demand
for the networks with the high transmission rates and better quality of service which are having low PAPR ratio.
Instead of OFDMA, filter banks are used in massive MIMO to reduce the complexity. But they are error prone
to noise. This base paper discusses about PAPR reduction in MIMO systems using different precoding based
OFDM systems. Mainly, minimization of multi-antenna systems by controlling the transmission power and
reduction of PAPR using ZC (Zadoff-Chu) matrix transform.
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...IJNSA Journal
This paper proposes a new blind adaptive channel shortening approach for multi-carrier systems. The performance of the discrete Fourier transform-DMT (DFT-DMT) system is investigated with the proposed DST-DMT system over the standard carrier serving area (CSA) loop1. Enhanced bit rates demonstrated and less complexity also involved by the simulation of the DST-DMT system.
The document analyzes the performance of LDPC coded WLAN physical layer under BPSK and 16-QAM modulation. It finds that an LDPC encoded WLAN system with a code rate of (48,46) performs best under BPSK modulation in an AWGN channel, achieving the lowest bit error rate. Simulation results show LDPC coding improves performance by reducing bit error rates compared to without coding. The best performing configuration provides power efficiency through lower transmitted power requirements for a given bit error rate.
A clustering protocol using multiple chainambitlick
This document proposes two schemes for clustering protocols based on chain routing in wireless sensor networks. It then describes in detail the Chain Routing Based on Coordinates-oriented Clustering Strategy (CRBCC) protocol. CRBCC forms balanced clusters based on node coordinates, constructs intra-cluster chains using simulated annealing, elects chain leaders, and then constructs an inter-cluster chain among leaders also using simulated annealing. Simulation results show CRBCC performs better than PEGASIS in terms of energy efficiency and network delay.
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...IJNSA Journal
This paper proposes a new blind adaptive channel shortening approach for multi-carrier systems. The
performance of the discrete Fourier transform-DMT (DFT-DMT) system is investigated with the proposed
DST-DMT system over the standard carrier serving area (CSA) loop1. Enhanced bit rates demonstrated
and less complexity also involved by the simulation of the DST-DMT system.
1) The document presents channel estimation methods for MIMO-OFDM systems using QPSK modulation.
2) It compares the performance of least squares (LS), minimum mean square error (MMSE) and discrete Fourier transform (DFT) based channel estimation techniques.
3) The analysis finds that applying DFT to the estimated channel power improves the performance of the channel estimators.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd Iaetsd
This document proposes new scheduling algorithms for MIMO wireless networks to improve system performance. It discusses designing practical user scheduling algorithms to maximize capacity in MIMO systems. Various MAC scheduling policies are implemented and modified to provide distributed traffic control, robustness against interference, and increased efficiency of resource utilization. Simulations using MATLAB compare the different policies and draw important results and conclusions. The paper suggests new priority scheduling and partially fair scheduling algorithms incorporating awareness of interference to improve system-level performance in MIMO wireless networks.
Optical Spatial Modulation with Transmitter-Receiver AlignmentsMarwan Hammouda
This paper proposes an optical spatial modulation (OSM) technique to enhance the data rate of indoor optical wireless communication systems. OSM works by activating only one out of multiple light emitting diodes at each time instant to transmit data. The paper shows that properly aligning the positions and orientations of the transmit and receive units can significantly improve the performance of OSM by decorrelating the optical MIMO channel. Through alignment, the paper achieves a 14 dB gain in signal-to-noise ratio required for a bit-error rate of 10^-3 compared to misaligned setups. The paper also compares the power and bandwidth efficiency of OSM to on-off keying, pulse position modulation, and pulse amplitude modulation.
Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...Rupesh Sharma
although OFDM seems to be a solution to keep up with
the demand of increasing data rates, it has some drawbacks.
Sensitivity to high PAPR is the most significant of these
drawbacks. The main objective of this paper was to investigate
and document the effects of PAPR on the performance of OFDM
based digital communications under different channel conditions.
A step-by-step approach was adopted in order to achieve the
objective of this paper. The first step is to provide a basic
background on the principles of OFDM. The reasons for the
PAPR and a theoretical analysis of these effects on OFDM
systems are documented. The OFDM system has a high peak-toaverage
power ratio (PAPR) that can cause unwanted saturation
in the power amplifiers, leading to in-band distortion and out-ofband
radiation. To be able to observe the system behavior, the
simulation results for different channel models are presented in
graphical form. Next, the simulation results obtained in this work
are compared to the simulation results reported in related studies
Performances des turbo codes parallèles pour un canal satellite non linéaireRachidz
1) The document analyzes the performance of parallel concatenated codes (turbo codes) with iterative decoding for error correction on nonlinear satellite channels.
2) It simulates a digital satellite transmission system using parallel turbo codes with QPSK modulation.
3) The simulation evaluates how varying parameters like constraint length, interleaver size, and number of iterations affects the bit error rate performance of turbo codes compared to Viterbi decoding.
This document presents a new DFT-based approach for detecting and correcting gain mismatch in time-interleaved ADCs. It introduces the gain mismatch problem in TI-ADCs and how it reduces the spurious free dynamic range. The proposed method uses the discrete Fourier transform to detect the gain mismatch between ADC sub-channels based on the difference between the ideal DFT and actual DFT. It then introduces a feedback system using this difference signal to iteratively correct the gain mismatch. Simulation results show the approach improves SFDR by more than 30dB by correcting a ±2% gain mismatch in a two-channel TI-ADC.
Optimal pilot symbol power allocation in lteDat Manh
This document presents research on optimizing pilot symbol power allocation in LTE systems. The key points are:
1) The researchers derive analytical expressions for optimal pilot symbol power allocation based on maximizing post-equalization signal-to-interference-and-noise ratio (SINR) under imperfect channel knowledge.
2) They analyze zero-forcing equalization and derive the post-equalization SINR expression for a MIMO system with imperfect channel estimation.
3) The researchers also derive mean square error expressions for least squares and linear minimum mean square error channel estimation methods.
4) Simulation results using an LTE simulator validate the analytical model for optimal pilot symbol power allocation.
A Novel Architecture for Different DSP Applications Using Field Programmable ...journal ijme
This paper presents a reconfigurable processor for different digital signal processing applications. The performance of the proposed architecture has been evaluated by taking different dsp applications like Low pass filter, high pass filter, finite impulse response (FIR) filter and FFT module. We designed the architecture of the processor and realizing the architecture using adder, multiplier, delay unit and validate it in the FPGA, which show that the hardware scheme is feasible for practical application. The experimental results clearly reveal the novelty of the architecture for dsp applications. This paper investigates the potential use of FPGAs for implementing efficient “Reconfigurable Processor” for different dsp applications. The proposed processor is based on parallel re-configurable which is implemented on FPGA. FPGAs have become an important component for implementing these functions with respect to cost, performance and flexibility. The general purpose SPARTAN 3AN FPGA kit has been employed for developing reconfigurable processor, with all the coding done using the hardware description language VERILOG.
Optimization of Cmos 0.18 µM Low Noise Amplifier Using Nsga-Ii for UWB Applic...VLSICS Design
A design and optimization of 3-5 GHz single ended Radio Frequency (RF) Low Noise Amplifier (LNA) for
ultra-wide-band (UWB) applications using standard UMC 0.18 μm CMOS technology is reported.
Designing of RF circuit components is a challenging job, since even after performing lengthy calculations
and finding parameter values it is less guarantee that the design performs as expected. In view of this the
optimization tool; Elitist Non-Dominated Sorting Genetic Algorithm (NSGA-II); has been employed to get
the optimized starting values of components in the proposed LNA design. The obtained NSGA-II
parameters were simulated using Cadence Spectre- RF simulator. The designed Low Noise Amplifier
achieves a power gain of 22 dB and a minimum Noise Figure of 3 dB is achieved. It dissipates 12.5 mW of
power out of 1.8 V supply.
The document discusses the effect of multi-tone jamming on a frequency hopped orthogonal frequency division multiple access (FH-OFDMA) system using orthogonal hopping patterns. It presents the baseband structure of an FH-OFDMA system and describes how data is transmitted over multiple subcarriers assigned according to an orthogonal hopping sequence. The paper analyzes the bit error rate performance of the FH-OFDMA system under multi-tone jamming in additive white Gaussian noise and Rayleigh fading channels.
This document provides an overview of simulating and synthesizing an OFDM transmitter/receiver in VHDL. It discusses:
- Using simulation to verify functionality and synthesis tools to convert the design into components for the target technology.
- The key blocks of an OFDM transceiver including scrambler, convolutional encoder, interleaver, constellation mapper, IFFT, guard interval addition/removal, and equalizer.
- Challenges in implementing the FFT/IFFT algorithms and mapping the full design to an FPGA due to its size.
Similar to Cancellation of Zigbee interference in OFDM based WLAN for multipath channel (20)
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
Damping of power system oscillations with the help
of proposed optimal Proportional Integral Derivative Power
System Stabilizer (PID-PSS) and Static Var Compensator
(SVC)-based controllers are thoroughly investigated in this
paper. This study presents robust tuning of PID-PSS and
SVC-based controllers using Genetic Algorithms (GA) in
multi machine power systems by considering detailed model
of the generators (model 1.1). The effectiveness of FACTSbased
controllers in general and SVC-based controller in
particular depends upon their proper location. Modal
controllability and observability are used to locate SVC–based
controller. The performance of the proposed controllers is
compared with conventional lead-lag power system stabilizer
(CPSS) and demonstrated on 10 machines, 39 bus New England
test system. Simulation studies show that the proposed genetic
based PID-PSS with SVC based controller provides better
performance.
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
This paper presents the need to operate the power
system economically and with optimum levels of voltages has
further led to an increase in interest in Distributed
Generation. In order to reduce the power losses and to improve
the voltage in the distribution system, distributed generators
(DGs) are connected to load bus. To reduce the total power
losses in the system, the most important process is to identify
the proper location for fixing and sizing of DGs. It presents a
new methodology using a new population based meta heuristic
approach namely Artificial Bee Colony algorithm(ABC) for
the placement of Distributed Generators(DG) in the radial
distribution systems to reduce the real power losses and to
improve the voltage profile, voltage sag mitigation. The power
loss reduction is important factor for utility companies because
it is directly proportional to the company benefits in a
competitive electricity market, while reaching the better power
quality standards is too important as it has vital effect on
customer orientation. In this paper an ABC algorithm is
developed to gain these goals all together. In order to evaluate
sag mitigation capability of the proposed algorithm, voltage
in voltage sensitive buses is investigated. An existing 20KV
network has been chosen as test network and results are
compared with the proposed method in the radial distribution
system.
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
Controlling power flow in modern power systems
can be made more flexible by the use of recent developments
in power electronic and computing control technology. The
Unified Power Flow Controller (UPFC) is a Flexible AC
transmission system (FACTS) device that can control all the
three system variables namely line reactance, magnitude and
phase angle difference of voltage across the line. The UPFC
provides a promising means to control power flow in modern
power systems. Essentially the performance depends on proper
control setting achievable through a power flow analysis
program. This paper presents a reliable method to meet the
requirements by developing a Newton-Raphson based load
flow calculation through which control settings of UPFC can
be determined for the pre-specified power flow between the
lines. The proposed method keeps Newton-Raphson Load Flow
(NRLF) algorithm intact and needs (little modification in the
Jacobian matrix). A MATLAB program has been developed to
calculate the control settings of UPFC and the power flow
between the lines after the load flow is converged. Case studies
have been performed on IEEE 5-bus system and 14-bus system
to show that the proposed method is effective. These studies
indicate that the method maintains the basic NRLF properties
such as fast computational speed, high degree of accuracy and
good convergence rate.
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
The size and shape of opening in dam causes the
stress concentration, it also causes the stress variation in the
rest of the dam cross section. The gravity method of the analysis
does not consider the size of opening and the elastic property
of dam material. Thus the objective of study is comprises of
the Finite Element Method which considers the size of
opening, elastic property of material, and stress distribution
because of geometric discontinuity in cross section of dam.
Stress concentration inside the dam increases with the opening
in dam which results in the failure of dam. Hence it is
necessary to analyses large opening inside the dam. By making
the percentage area of opening constant and varying size and
shape of opening the analysis is carried out. For this purpose
a section of Koyna Dam is considered. Dam is defined as a
plane strain element in FEM, based on geometry and loading
condition. Thus this available information specified our path
of approach to carry out 2D plane strain analysis. The results
obtained are then compared mutually to get most efficient
way of providing large opening in the gravity dam.
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
Pushover Analysis a popular tool for seismic
performance evaluation of existing and new structures and is
nonlinear Static procedure where in monotonically increasing
loads are applied to the structure till the structure is unable
to resist the further load .During the analysis, whatever the
strength of concrete and steel is adopted for analysis of
structure may not be the same when real structure is
constructed and the pushover analysis results are very sensitive
to material model adopted, geometric model adopted, location
of plastic hinges and in general to procedure followed by the
analyzer. In this paper attempt has been made to assess
uncertainty in pushover analysis results by considering user
defined hinges and frame modeled as bare frame and frame
with slab modeled as rigid diaphragm and results compared
with experimental observations. Uncertain parameters
considered includes the strength of concrete, strength of steel
and cover to the reinforcement which are randomly generated
and incorporated into the analysis. The results are then
compared with experimental observations.
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
This document summarizes and analyzes secure multi-party negotiation protocols for electronic payments in mobile computing. It presents a framework for secure multi-party decision protocols using lightweight implementations. The main focus is on synchronizing security features to avoid agreement manipulation and reduce user traffic. The paper describes negotiation between an auctioneer and bidders, showing multiparty security is better than existing systems. It analyzes the performance of encryption algorithms like ECC, XTR, and RSA for use in the multiparty negotiation protocols.
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
The problems associated with selfish nodes in
MANET are addressed by a collaborative watchdog approach
which reduces the detection time for selfish nodes thereby
improves the performance and accuracy of watchdogs[1]. In
the related works they make use of credit based systems, reputation
based mechanisms, pathrater and watchdog mechanism
to detect such selfish nodes. In this paper we follow an approach
of collaborative watchdog which reduces the detection
time for selfish nodes and also involves the removal of such
selfish nodes based on some progressively assessed thresholds.
The threshold gives the nodes a chance to stop misbehaving
before it is permanently deleted from the network.
The node passes through several isolation processes before it
is permanently removed. Another version of AODV protocol
is used here which allows the simulation of selfish nodes in
NS2 by adding or modifying log files in the protocol.
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
Wireless sensor networks are networks having non
wired infrastructure and dynamic topology. In OSI model each
layer is prone to various attacks, which halts the performance
of a network .In this paper several attacks on four layers of
OSI model are discussed and security mechanism is described
to prevent attack in network layer i.e wormhole attack. In
Wormhole attack two or more malicious nodes makes a covert
channel which attracts the traffic towards itself by depicting a
low latency link and then start dropping and replaying packets
in the multi-path route. This paper proposes promiscuous mode
method to detect and isolate the malicious node during
wormhole attack by using Ad-hoc on demand distance vector
routing protocol (AODV) with omnidirectional antenna. The
methodology implemented notifies that the nodes which are
not participating in multi-path routing generates an alarm
message during delay and then detects and isolate the
malicious node from network. We also notice that not only
the same kind of attacks but also the same kind of
countermeasures can appear in multiple layer. For example,
misbehavior detection techniques can be applied to almost all
the layers we discussed.
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
The recent advancements in the wireless technology
and their wide-spread deployment have made remarkable
enhancements in efficiency in the corporate and industrial
and Military sectors The increasing popularity and usage of
wireless technology is creating a need for more secure wireless
Ad hoc networks. This paper aims researched and developed
a new protocol that prevents wormhole attacks on a ad hoc
network. A few existing protocols detect wormhole attacks but
they require highly specialized equipment not found on most
wireless devices. This paper aims to develop a defense against
wormhole attacks as an Anti-worm protocol which is based on
responsive parameters, that does not require as a significant
amount of specialized equipment, trick clock synchronization,
no GPS dependencies.
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
This document summarizes a proposed cloud security and data integrity framework that provides client accountability. The framework aims to address issues like lack of user control over cloud data, need for data transparency and tracking, and ensuring data integrity. It proposes using JAR (Java Archive) files for data sharing due to benefits like portability. The framework incorporates client-side verification using MD5 hashing, digital signature-based authentication of JAR files, and use of HMAC to ensure data integrity. It also uses password-based encryption of log files to keep them tamper-proof. The framework is intended to provide both accountability and security for data sharing in cloud environments.
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
A System state in HTTP botnet uses HTTP protocol
for the creation of chain of Botnets thereby compromising
other systems. By using HTTP protocol and port number 80,
attacks can not only be hidden but also pass through the
firewall without being detected. The DPR based detection
leads to better analysis of botnet attacks [3]. However, it
provides only probabilistic detection of the attacker and also
time consuming and error prone. This paper proposes a Genetic
algorithm based layered approach for detecting as well as
preventing botnet attacks. The paper reviews p2p firewall
implementation which forms the basis of filtering.
Performance evaluation is done based on precision, F-value
and probability. Layered approach reduces the computation
and overall time requirement [7]. Genetic algorithm promises
a low false positive rate.
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
This document summarizes a research paper that proposes a method for enhancing data security in cloud computing through steganography. The method hides user data in digital images stored on cloud servers. When data needs to be accessed, it is extracted from the images. The document outlines the cloud architecture and security issues addressed. It then describes the proposed system architecture, security model, and data storage and retrieval process. Data is partitioned and hidden in multiple images to improve security. The goal is to prevent unauthorized access to user data stored on cloud servers.
The main tasks of a Wireless Sensor Network
(WSN) are data collection from its nodes and communication
of this data to the base station (BS). The protocols used for
communication among the WSN nodes and between the WSN
and the BS, must consider the resource constraints of nodes,
battery energy, computational capabilities and memory. The
WSN applications involve unattended operation of the network
over an extended period of time. In order to extend the lifetime
of a WSN, efficient routing protocols need to be adopted. The
proposed low power routing protocol based on tree-based
network structure reliably forwards the measured data towards
the BS using TDMA. An energy consumption analysis of the
WSN making use of this protocol is also carried out. It is
found that the network is energy efficient with an average
duty cycle of 0:7% for the WSN nodes. The OmNET++
simulation platform along with MiXiM framework is made
use of.
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
The security of authentication of internet based
co-banking services should not be susceptible to high risks.
The passwords are highly vulnerable to virus attacks due to
the lack of high end embedding of security methods. In order
for the passwords to be more secure, people are generally
compelled to select jumbled up character based passwords
which are not only less memorable but are also equally prone
to insecurity. Multiple use of distributed shares has been
studied to solve the problem of authentication by algorithms
based on thresholding of pixels in image processing and visual
cryptography concepts where the subset of shares is considered
for the recovery of the original image for authentication using
correlation function[1][2].The main disadvantage in the above
study is the plain storage of shares and also one of the shares
is being supplied to the customer, which will lead to the
possibility of misuse by a third party. This paper proposes a
technique for scrambling of pixels by key based random
permutation (KBRP) within the shares before the
authentication has been attempted. Total number of shares to
be created is dependent on the multiplicity of ownership of
the account. By this method the problem of uncertainty among
the customers with regard to security, storage, retrieval of
holding of half of the shares is minimized.
This paper presents a trifocal Rotman Lens Design
approach. The effects of focal ratio and element spacing on
the performance of Rotman Lens are described. A three beam
prototype feeding 4 element antenna array working in L-band
has been simulated using RLD v1.7 software. Simulated
results show that the simulated lens has a return loss of –
12.4dB at 1.8GHz. Beam to array port phase error variation
with change in the focal ratio and element spacing has also
been investigated.
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
Hyperspectral images can be efficiently compressed
through a linear predictive model, as for example the one
used in the SLSQ algorithm. In this paper we exploit this
predictive model on the AVIRIS images by individuating,
through an off-line approach, a common subset of bands, which
are not spectrally related with any other bands. These bands
are not useful as prediction reference for the SLSQ 3-D
predictive model and we need to encode them via other
prediction strategies which consider only spatial correlation.
We have obtained this subset by clustering the AVIRIS bands
via the clustering by compression approach. The main result
of this paper is the list of the bands, not related with the
others, for AVIRIS images. The clustering trees obtained for
AVIRIS and the relationship among bands they depict is also
an interesting starting point for future research.
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
A microelectronic circuit of block-elements
functionally analogous to two hydrogen bonding networks is
investigated. The hydrogen bonding networks are extracted
from â-lactamase protein and are formed in its active site.
Each hydrogen bond of the network is described in equivalent
electrical circuit by three or four-terminal block-element.
Each block-element is coded in Matlab. Static and dynamic
analyses are performed. The resultant microelectronic circuit
analogous to the hydrogen bonding network operates as
current mirror, sine pulse source, triangular pulse source as
well as signal modulator.
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
In this paper a method is proposed to discriminate
real world scenes in to natural and manmade scenes of similar
depth. Global-roughness of a scene image varies as a function
of image-depth. Increase in image depth leads to increase in
roughness in manmade scenes; on the contrary natural scenes
exhibit smooth behavior at higher image depth. This particular
arrangement of pixels in scene structure can be well explained
by local texture information in a pixel and its neighborhood.
Our proposed method analyses local texture information of a
scene image using texture unit matrix. For final classification
we have used both supervised and unsupervised learning using
K-Nearest Neighbor classifier (KNN) and Self Organizing
Map (SOM) respectively. This technique is useful for online
classification due to very less computational complexity.
Mental Stress Evaluation using an Adaptive ModelIDES Editor
Chronic stress can have serious physiological and
psychological impact on an individual’s health. Wearable
sensor systems can enable physicians to monitor physiological
variables and observe the impact of stress over long periods of
time. To correlate an individual’s physiological measures with
their perception of psychological stress, it is essential that
the stress monitoring system accounts for individual
differences in self-reporting. Self-reporting of stress is highly
subjective as it is dependent on an individual’s perception of
stress and thus prone to errors. In addition, subjects can tailor
their answers to present their behavior more favorably. In
this paper we present an adaptive model which allows recorded
stress scores and physiological variables to be tuned to remove
biases in self-reported scores. The model takes an individual’s
physiological and psychological responses into account and
adapts to the user’s variations. Using our adaptive model,
physiological data is mapped efficiently to perceived stress
levels with 90% accuracy.
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityIDES Editor
The document summarizes previous work on mosaic image steganography and proposes using genetic algorithms and key-based random permutation to improve the technique. Mosaic image steganography hides a secret image by dividing it into fragments and embedding the fragments into a target image to create a mosaic. Previous methods required a large database of images or allowed only arbitrary target image selection. The proposed method uses genetic algorithms to generate a mapping sequence for embedding tile images without a database, improving clarity and reducing computational complexity. It also applies a key-based random permutation to the mapping sequence for enhanced security and robustness. The mosaic image can be recovered using the same key and mapping sequence, making it a lossless data hiding method.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Dive into the realm of operating systems (OS) with Pravash Chandra Das, a seasoned Digital Forensic Analyst, as your guide. 🚀 This comprehensive presentation illuminates the core concepts, types, and evolution of OS, essential for understanding modern computing landscapes.
Beginning with the foundational definition, Das clarifies the pivotal role of OS as system software orchestrating hardware resources, software applications, and user interactions. Through succinct descriptions, he delineates the diverse types of OS, from single-user, single-task environments like early MS-DOS iterations, to multi-user, multi-tasking systems exemplified by modern Linux distributions.
Crucial components like the kernel and shell are dissected, highlighting their indispensable functions in resource management and user interface interaction. Das elucidates how the kernel acts as the central nervous system, orchestrating process scheduling, memory allocation, and device management. Meanwhile, the shell serves as the gateway for user commands, bridging the gap between human input and machine execution. 💻
The narrative then shifts to a captivating exploration of prominent desktop OSs, Windows, macOS, and Linux. Windows, with its globally ubiquitous presence and user-friendly interface, emerges as a cornerstone in personal computing history. macOS, lauded for its sleek design and seamless integration with Apple's ecosystem, stands as a beacon of stability and creativity. Linux, an open-source marvel, offers unparalleled flexibility and security, revolutionizing the computing landscape. 🖥️
Moving to the realm of mobile devices, Das unravels the dominance of Android and iOS. Android's open-source ethos fosters a vibrant ecosystem of customization and innovation, while iOS boasts a seamless user experience and robust security infrastructure. Meanwhile, discontinued platforms like Symbian and Palm OS evoke nostalgia for their pioneering roles in the smartphone revolution.
The journey concludes with a reflection on the ever-evolving landscape of OS, underscored by the emergence of real-time operating systems (RTOS) and the persistent quest for innovation and efficiency. As technology continues to shape our world, understanding the foundations and evolution of operating systems remains paramount. Join Pravash Chandra Das on this illuminating journey through the heart of computing. 🌟
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.