Digital filters are utilized as a one of flag handling and correspondence frameworks. At times, the unwavering quality of those frameworks is basic, and blame tolerant channel executions are needed. Throughout the years, numerous systems that endeavor the channels' structure and properties to accomplish adaptation to internal failure have been proposed. As innovation scales, it empowers more unpredictable frameworks that join many channels. In those perplexing frameworks, it is regular that a portion of the channels work in parallel. A plan in view of big rectification coding has been as of late proposed to protect parallel channels. In that plan, each channel is deal with as a bit, and excess channels that go about as equality check bits are acquainted with distinguish and rectify blunders. In this short, applying coding systems to secure parallel channels is tended to in a broader manner. This decreases the assurance overhead and makes the quantity of excess channels autonomous of the quantity of parallel channels. The proposed technique is first described and then illustrated with two case studies. Finally, both the effectiveness in protecting against errors and the cost are evaluated for a field-programmable gate array implementation.
6RLR-ABC: 6LOWPAN ROUTING PROTOCOL WITH LOCAL REPAIR USING BIO INSPIRED ARTIF...IJCNCJournal
In recent years, Micro-Electro-Mechanical System (MEMS) has successfully enabled the development of IPv6 over Low power Wireless Personal Area Network (6LoWPAN). This network is equipped with lowcost, low-power, lightweight and varied functions devices. These devices are capable of amassing, storing, processing environmental information and conversing with neighbouring sensors. These requisites pose a new and interesting challenge for the development of IEEE 802.15.4 together with routing protocol. In this work, 6LoWPAN Routing Protocol with Local Repair Using Bio Inspired Artificial Bee Colony (6RLRABC) has been introduced. This protocol supports connection establishment between nodes in an energyefficient manner while maintaining high packet delivery ratio and throughput and minimizing average endto-end delay. This protocol has been evaluated based on increasing generated traffic. The performance of the designed 6RLR-ABC routing protocol has been evaluated compared to 6LoWPAN Ad-hoc On-Demand Distance Vector (LOAD) routing protocol. LOAD protocol has been chosen since it is the most relevant existed 6LoWPANrouting protocol. The simulation results show that the introduced 6RLR-ABC protocol achieves lower packet average end-to-end delay and lower energy consumption compared to LOAD protocol.Additionally,the packet delivery ratio of the designed protocol is much higher than LOAD protocol. The proposed 6RLR-ABC achieved about 39% higher packet delivery ratio and about 54.8% higher throughput while simultaneously offering lower average end-to-end delay and lower average energy consumption than LOAD protocol.
ANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKSIJEEE
Blocking probability has been one of the key performance to solve Routing and Wavelength Assignment problem (RWA) indexes in the design of wavelength-routed all-optical WDM networks. To evaluate blocking probability different analytical model are introduced.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A COOPERATIVE LOCALIZATION METHOD BASED ON V2I COMMUNICATION AND DISTANCE INF...IJCNCJournal
Relative positions are recent solutions to overcome the limited accuracy of GPS in urban environment.
Vehicle positions obtained using V2I communication are more accurate because the known roadside unit
(RSU) locations help predict errors in measurements over time. The accuracy of vehicle positions depends
more on the number of RSUs; however, the high installation cost limits the use of this approach. It also
depends on nonlinear localization nature. They were neglected in several research papers. In these studies,
the accumulated errors increased with time due to the linearity localization problem. In the present study,
a cooperative localization method based on V2I communication and distance information in vehicular
networks is proposed for improving the estimates of vehicles’ initial positions. This method assumes that
the virtual RSUs based on mobility measurements help reduce installation costs and facilitate in handling
fault environments. The extended Kalman filter algorithm is a well-known estimator in nonlinear problem,
but it requires well initial vehicle position vector and adaptive noise in measurements. Using the proposed
method, vehicles’ initial positions can be estimated accurately. The experimental results confirm that the
proposed method has superior accuracy than existing methods, giving a root mean square error of
approximately 1 m. In addition, it is shown that virtual RSUs can assist in estimating initial positions in
fault environments.
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Paralleld...sunda2011
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd
IEEE projects, final year projects, students project, be project, engineering projects, academic project, project center in madurai, trichy, chennai, kollam, coimbatore
ieee projects 2012 for cse in networking trichy, ieee projects 2012 for networking chennai, ieee projects 2012 for cse bangalore, ieee projects 2012 for it hyderabad, ieee projects 2012 for me pune, ieee projects 2012 for mca nagpur, ieee projects 2012 for me cse tirupati, ieee projects for cse 2012 titles cochin, ieee projects for cse 2012 free download mysore, ieee projects for cse 2012 hubli, ieee mini projects for cse 2012 vijayawada
6RLR-ABC: 6LOWPAN ROUTING PROTOCOL WITH LOCAL REPAIR USING BIO INSPIRED ARTIF...IJCNCJournal
In recent years, Micro-Electro-Mechanical System (MEMS) has successfully enabled the development of IPv6 over Low power Wireless Personal Area Network (6LoWPAN). This network is equipped with lowcost, low-power, lightweight and varied functions devices. These devices are capable of amassing, storing, processing environmental information and conversing with neighbouring sensors. These requisites pose a new and interesting challenge for the development of IEEE 802.15.4 together with routing protocol. In this work, 6LoWPAN Routing Protocol with Local Repair Using Bio Inspired Artificial Bee Colony (6RLRABC) has been introduced. This protocol supports connection establishment between nodes in an energyefficient manner while maintaining high packet delivery ratio and throughput and minimizing average endto-end delay. This protocol has been evaluated based on increasing generated traffic. The performance of the designed 6RLR-ABC routing protocol has been evaluated compared to 6LoWPAN Ad-hoc On-Demand Distance Vector (LOAD) routing protocol. LOAD protocol has been chosen since it is the most relevant existed 6LoWPANrouting protocol. The simulation results show that the introduced 6RLR-ABC protocol achieves lower packet average end-to-end delay and lower energy consumption compared to LOAD protocol.Additionally,the packet delivery ratio of the designed protocol is much higher than LOAD protocol. The proposed 6RLR-ABC achieved about 39% higher packet delivery ratio and about 54.8% higher throughput while simultaneously offering lower average end-to-end delay and lower average energy consumption than LOAD protocol.
ANALYSIS AND STUDY OF MATHEMATICAL MODELS FOR RWA PROBLEM IN OPTICAL NETWORKSIJEEE
Blocking probability has been one of the key performance to solve Routing and Wavelength Assignment problem (RWA) indexes in the design of wavelength-routed all-optical WDM networks. To evaluate blocking probability different analytical model are introduced.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A COOPERATIVE LOCALIZATION METHOD BASED ON V2I COMMUNICATION AND DISTANCE INF...IJCNCJournal
Relative positions are recent solutions to overcome the limited accuracy of GPS in urban environment.
Vehicle positions obtained using V2I communication are more accurate because the known roadside unit
(RSU) locations help predict errors in measurements over time. The accuracy of vehicle positions depends
more on the number of RSUs; however, the high installation cost limits the use of this approach. It also
depends on nonlinear localization nature. They were neglected in several research papers. In these studies,
the accumulated errors increased with time due to the linearity localization problem. In the present study,
a cooperative localization method based on V2I communication and distance information in vehicular
networks is proposed for improving the estimates of vehicles’ initial positions. This method assumes that
the virtual RSUs based on mobility measurements help reduce installation costs and facilitate in handling
fault environments. The extended Kalman filter algorithm is a well-known estimator in nonlinear problem,
but it requires well initial vehicle position vector and adaptive noise in measurements. Using the proposed
method, vehicles’ initial positions can be estimated accurately. The experimental results confirm that the
proposed method has superior accuracy than existing methods, giving a root mean square error of
approximately 1 m. In addition, it is shown that virtual RSUs can assist in estimating initial positions in
fault environments.
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Paralleld...sunda2011
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd
IEEE projects, final year projects, students project, be project, engineering projects, academic project, project center in madurai, trichy, chennai, kollam, coimbatore
ieee projects 2012 for cse in networking trichy, ieee projects 2012 for networking chennai, ieee projects 2012 for cse bangalore, ieee projects 2012 for it hyderabad, ieee projects 2012 for me pune, ieee projects 2012 for mca nagpur, ieee projects 2012 for me cse tirupati, ieee projects for cse 2012 titles cochin, ieee projects for cse 2012 free download mysore, ieee projects for cse 2012 hubli, ieee mini projects for cse 2012 vijayawada
Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-h...IJECEIAES
This research paper suggests and analyse a technique for congestion control in mobile ad hoc networks. The technique is based on a new hybrid approach that uses clustering and queuing techniques. In clustering, in general cluster head transfers the data, following a queuing method based on a RED (Random Early Detection), the mobile environment makes it Mobile RED (or MRED), It majorly depends upon mobility of nodes and mobile environments leads to unpredictable queue size. To simulate this technique, the Network Simulator 2 (or NS2) is used for various scenarios. The simulated results are compared with NRED (Neighbourhood Random Early Detection) queuing technique of congestion control. It has been observed that the results are improved using MRED comparatively.
VLSI Projects for M. Tech, VLSI Projects in Vijayanagar, VLSI Projects in Bangalore, M. Tech Projects in Vijayanagar, M. Tech Projects in Bangalore, VLSI IEEE projects in Bangalore, IEEE 2015 VLSI Projects, FPGA and Xilinx Projects, FPGA and Xilinx Projects in Bangalore, FPGA and Xilinx Projects in Vijayangar
VLSI Projects for M. Tech, VLSI Projects in Vijayanagar, VLSI Projects in Bangalore, M. Tech Projects in Vijayanagar, M. Tech Projects in Bangalore, VLSI IEEE projects in Bangalore, IEEE 2015 VLSI Projects, FPGA and Xilinx Projects, FPGA and Xilinx Projects in Bangalore, FPGA and Xilinx Projects in Vijayangar
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
FPGA IMPLEMENTATION OF PRIORITYARBITER BASED ROUTER DESIGN FOR NOC SYSTEMSIAEME Publication
An efficient Priority-Arbiter based Router is designed along with 2X2 and 3X3 mesh
topology based NOC architecture are designed. The Priority –Arbiter based Router
design includes Input registers, Priority arbiter, and XY- Routing algorithm. The
Priority-Arbiter based Router and NOC 2X2 and 3X3 Router designs are synthesized
and implemented using Xilinx ISE Tool and simulated using Modelsim6.5f. The
implementation is done by Artix-7 FPGA device, and the physically debugging of the
NOC 2X2 Router design is verified using Chipscope pro tool. The performance results
are analyzed in terms of the Area (Slices, LUT’s), Timing period, and Maximum
operating frequency. The comparison of the Priority-Arbiter based Router is made
concerning previous similar architecture with improvements.
Checkpoint and recovery protocols are commonly used in distributed applications for providing fault
tolerance. A distributed system may require taking checkpoints from time to time to keep it free of arbitrary
failures. In case of failure, the system will rollback to checkpoints where global consistency is preserved.
Checkpointing is one of the fault-tolerant techniques to restore faults and to restart job fast. The algorithms
for checkpointing on distributed systems have been under study for years.
It is known that checkpointing and rollback recovery are widely used techniques that allow a distributed
computing to progress inspite of a failure.There are two fundamental approaches for checkpointing and
recovery.One is asynchronus approach, process take their checkpoints independenty.So,taking checkpoints
is very simple but due to absence of a recent consistent global checkpoint which may cause a rollback of
computation.Synchronus checkpointing approach assumes that a single process other than the application
process invokes the checkpointing algorithm periodically to determine a consistent global checkpoint.
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETSIJCNCJournal
The Border Gateway Protocol (BGP) provides crucial routing information for the Internet infrastructure. A problem with abnormal routing behavior affects the stability and connectivity of the global Internet. The biggest hurdles in detecting BGP attacks are extremely unbalanced data set category distribution and the dynamic nature of the network. This unbalanced class distribution and dynamic nature of the network results in the classifier's inferior performance. In this paper we proposed an efficient approach to properly managing these problems, the proposed approach tackles the unbalanced classification of datasets by turning the problem of binary classification into a problem of multiclass classification. This is achieved by splitting the majority-class samples evenly into multiple segments using Affinity Propagation, where the number of segments is chosen so that the number of samples in any segment closely matches the minority-class samples. Such sections of the dataset together with the minor class are then viewed as different classes and used to train the Extreme Learning Machine (ELM). The RIPE and BCNET datasets are used to evaluate the performance of the proposed technique. When no feature selection is used, the proposed technique improves the F1 score by 1.9% compared to state-of-the-art techniques. With the Fischer feature selection algorithm, the proposed algorithm achieved the highest F1 score of 76.3%, which was a 1.7% improvement over the compared ones. Additionally, the MIQ feature selection technique improves the accuracy by 3.5%. For the BCNET dataset, the proposed technique improves the F1 score by 1.8% for the Fisher feature selection technique. The experimental findings support the substantial improvement in performance from previous approaches by the new technique.
Multi-Channel Preemptive Priority Model for SpectrumMobility in Cognitive Rad...IJECEIAES
Cognitive Radio techniques have been proposed for improving utilization of the spectrum by exploiting the unoccupied bands of the licensed spectrum. This paper proposes a preemptive multi-channel access model for prioritized cognitive radio networks using an iterative method of queuing theory to solve the spectrum scarcity problem. The proposed model formulates accurate closed form of an expected waiting time in the queue, an expected number of users in the queue, an expected waiting time in the system, and an expected number of users in the system. The results compared to the basic model (without preemptive priority) show that, the waiting time in queue and the waiting time in the system compared to the basic model will be improved by 92.99% and 33.15% respectively for class one secondary user. The results also show that, the waiting time in queue and the waiting time in the system will be improved by 43.25% and 15.42% respectively for class two secondary users. The proposed model investigates the desirable schedules of primary and secondary users.
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...cscpconf
In recent years, the static shortest path (SP) problem has been well addressed using intelligent
optimization techniques, e.g., artificial neural networks, genetic algorithms (GAs), particle
swarm optimization, etc. However, with the advancement in wireless communications, more and
more mobile wireless networks appear, e.g., mobile networks [mobile ad hoc networks
(MANETs)], wireless sensor networks, etc. One of the most important characteristics in mobile
wireless networks is the topology dynamics, i.e., the network topology changes over time due to
energy conservation or node mobility. Therefore, the SP routing problem in MANETs turns out to
be a dynamic optimization problem. GA's are able to find, if not the shortest, at least an optimal
path between source and destination in mobile ad-hoc network nodes. And we obtain the alternative path or backup path to avoid reroute discovery in the case of link failure or nodeex
IRJET-A Review on Trends in Multicore Processor Based on Cache and Power Diss...IRJET Journal
K.Aruli, B.Nivetha, G.N.Jayabhavani, M.Saravanan "A Review on Trends in Multicore Processor Based on Cache and Power Dissipation", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net
Abstract
A multi-core processor is an integrated circuit to which two or more processors attached for enhanced performance, reduced power consumption, and more efficient simultaneous processing of multiple tasks. Multi-core processing is a growing industrial trend as single core processors rapidly reach the physical limits of complexity and speed. It exploits increased feature-size and density. It increases functional units per chip and limit energy consumption per operation. This paper provides the review of various papers in multicore architecture, discussing various parameters like number of cores, cache coherence and power dissipation.
Our journal focused on Engineering, Management, Science and Mathematics, we broadly cover research work. our journal publishes Paper Publications, Scopus indexed journals, WoS indexed journals, research paper publications, academic journals, journal publications.
Fault Modeling of Combinational and Sequential Circuits at Register Transfer ...VLSICS Design
As the complexity of Very Large Scale Integration (VLSI) is growing, testing becomes tedious and tougher. As of now fault models are used to test digital circuits at the gate level or below that level. By using fault models at the lower levels, testing becomes cumbersome and will lead to delays in the design cycle. In addition, developments in deep submicron technology provide an opening to new defects. We must develop efficient fault detection and location methods in order to reduce manufacturing costs and time to market. Thus there is a need to look for a new approach of testing the circuits at higher levels to speed up the design cycle. This paper proposes on Register Transfer Level (RTL) modeling for digital circuits and computing the fault coverage. The result obtained through this work establishes that the fault coverage with the RTL fault model is comparable to the gate level fault coverage.
FAULT MODELING OF COMBINATIONAL AND SEQUENTIAL CIRCUITS AT REGISTER TRANSFER ...VLSICS Design
As the complexity of Very Large Scale Integration (VLSI) is growing, testing becomes tedious and tougher. As of now fault models are used to test digital circuits at the gate level or below that level. By using fault models at the lower levels, testing becomes cumbersome and will lead to delays in the design cycle. In addition, developments in deep submicron technology provide an opening to new defects. We must develop efficient fault detection and location methods in order to reduce manufacturing costs and time to market. Thus there is a need to look for a new approach of testing the circuits at higher levels to speed up the design cycle. This paper proposes on Register Transfer Level (RTL) modeling for digital circuits and computing the fault coverage. The result obtained through this work establishes that the fault coverage with the RTL fault model is comparable to the gate level fault coverage.
Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-h...IJECEIAES
This research paper suggests and analyse a technique for congestion control in mobile ad hoc networks. The technique is based on a new hybrid approach that uses clustering and queuing techniques. In clustering, in general cluster head transfers the data, following a queuing method based on a RED (Random Early Detection), the mobile environment makes it Mobile RED (or MRED), It majorly depends upon mobility of nodes and mobile environments leads to unpredictable queue size. To simulate this technique, the Network Simulator 2 (or NS2) is used for various scenarios. The simulated results are compared with NRED (Neighbourhood Random Early Detection) queuing technique of congestion control. It has been observed that the results are improved using MRED comparatively.
VLSI Projects for M. Tech, VLSI Projects in Vijayanagar, VLSI Projects in Bangalore, M. Tech Projects in Vijayanagar, M. Tech Projects in Bangalore, VLSI IEEE projects in Bangalore, IEEE 2015 VLSI Projects, FPGA and Xilinx Projects, FPGA and Xilinx Projects in Bangalore, FPGA and Xilinx Projects in Vijayangar
VLSI Projects for M. Tech, VLSI Projects in Vijayanagar, VLSI Projects in Bangalore, M. Tech Projects in Vijayanagar, M. Tech Projects in Bangalore, VLSI IEEE projects in Bangalore, IEEE 2015 VLSI Projects, FPGA and Xilinx Projects, FPGA and Xilinx Projects in Bangalore, FPGA and Xilinx Projects in Vijayangar
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
FPGA IMPLEMENTATION OF PRIORITYARBITER BASED ROUTER DESIGN FOR NOC SYSTEMSIAEME Publication
An efficient Priority-Arbiter based Router is designed along with 2X2 and 3X3 mesh
topology based NOC architecture are designed. The Priority –Arbiter based Router
design includes Input registers, Priority arbiter, and XY- Routing algorithm. The
Priority-Arbiter based Router and NOC 2X2 and 3X3 Router designs are synthesized
and implemented using Xilinx ISE Tool and simulated using Modelsim6.5f. The
implementation is done by Artix-7 FPGA device, and the physically debugging of the
NOC 2X2 Router design is verified using Chipscope pro tool. The performance results
are analyzed in terms of the Area (Slices, LUT’s), Timing period, and Maximum
operating frequency. The comparison of the Priority-Arbiter based Router is made
concerning previous similar architecture with improvements.
Checkpoint and recovery protocols are commonly used in distributed applications for providing fault
tolerance. A distributed system may require taking checkpoints from time to time to keep it free of arbitrary
failures. In case of failure, the system will rollback to checkpoints where global consistency is preserved.
Checkpointing is one of the fault-tolerant techniques to restore faults and to restart job fast. The algorithms
for checkpointing on distributed systems have been under study for years.
It is known that checkpointing and rollback recovery are widely used techniques that allow a distributed
computing to progress inspite of a failure.There are two fundamental approaches for checkpointing and
recovery.One is asynchronus approach, process take their checkpoints independenty.So,taking checkpoints
is very simple but due to absence of a recent consistent global checkpoint which may cause a rollback of
computation.Synchronus checkpointing approach assumes that a single process other than the application
process invokes the checkpointing algorithm periodically to determine a consistent global checkpoint.
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETSIJCNCJournal
The Border Gateway Protocol (BGP) provides crucial routing information for the Internet infrastructure. A problem with abnormal routing behavior affects the stability and connectivity of the global Internet. The biggest hurdles in detecting BGP attacks are extremely unbalanced data set category distribution and the dynamic nature of the network. This unbalanced class distribution and dynamic nature of the network results in the classifier's inferior performance. In this paper we proposed an efficient approach to properly managing these problems, the proposed approach tackles the unbalanced classification of datasets by turning the problem of binary classification into a problem of multiclass classification. This is achieved by splitting the majority-class samples evenly into multiple segments using Affinity Propagation, where the number of segments is chosen so that the number of samples in any segment closely matches the minority-class samples. Such sections of the dataset together with the minor class are then viewed as different classes and used to train the Extreme Learning Machine (ELM). The RIPE and BCNET datasets are used to evaluate the performance of the proposed technique. When no feature selection is used, the proposed technique improves the F1 score by 1.9% compared to state-of-the-art techniques. With the Fischer feature selection algorithm, the proposed algorithm achieved the highest F1 score of 76.3%, which was a 1.7% improvement over the compared ones. Additionally, the MIQ feature selection technique improves the accuracy by 3.5%. For the BCNET dataset, the proposed technique improves the F1 score by 1.8% for the Fisher feature selection technique. The experimental findings support the substantial improvement in performance from previous approaches by the new technique.
Multi-Channel Preemptive Priority Model for SpectrumMobility in Cognitive Rad...IJECEIAES
Cognitive Radio techniques have been proposed for improving utilization of the spectrum by exploiting the unoccupied bands of the licensed spectrum. This paper proposes a preemptive multi-channel access model for prioritized cognitive radio networks using an iterative method of queuing theory to solve the spectrum scarcity problem. The proposed model formulates accurate closed form of an expected waiting time in the queue, an expected number of users in the queue, an expected waiting time in the system, and an expected number of users in the system. The results compared to the basic model (without preemptive priority) show that, the waiting time in queue and the waiting time in the system compared to the basic model will be improved by 92.99% and 33.15% respectively for class one secondary user. The results also show that, the waiting time in queue and the waiting time in the system will be improved by 43.25% and 15.42% respectively for class two secondary users. The proposed model investigates the desirable schedules of primary and secondary users.
APPLICATION OF GENETIC ALGORITHM IN DESIGNING A SECURITY MODEL FOR MOBILE ADH...cscpconf
In recent years, the static shortest path (SP) problem has been well addressed using intelligent
optimization techniques, e.g., artificial neural networks, genetic algorithms (GAs), particle
swarm optimization, etc. However, with the advancement in wireless communications, more and
more mobile wireless networks appear, e.g., mobile networks [mobile ad hoc networks
(MANETs)], wireless sensor networks, etc. One of the most important characteristics in mobile
wireless networks is the topology dynamics, i.e., the network topology changes over time due to
energy conservation or node mobility. Therefore, the SP routing problem in MANETs turns out to
be a dynamic optimization problem. GA's are able to find, if not the shortest, at least an optimal
path between source and destination in mobile ad-hoc network nodes. And we obtain the alternative path or backup path to avoid reroute discovery in the case of link failure or nodeex
IRJET-A Review on Trends in Multicore Processor Based on Cache and Power Diss...IRJET Journal
K.Aruli, B.Nivetha, G.N.Jayabhavani, M.Saravanan "A Review on Trends in Multicore Processor Based on Cache and Power Dissipation", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net
Abstract
A multi-core processor is an integrated circuit to which two or more processors attached for enhanced performance, reduced power consumption, and more efficient simultaneous processing of multiple tasks. Multi-core processing is a growing industrial trend as single core processors rapidly reach the physical limits of complexity and speed. It exploits increased feature-size and density. It increases functional units per chip and limit energy consumption per operation. This paper provides the review of various papers in multicore architecture, discussing various parameters like number of cores, cache coherence and power dissipation.
Our journal focused on Engineering, Management, Science and Mathematics, we broadly cover research work. our journal publishes Paper Publications, Scopus indexed journals, WoS indexed journals, research paper publications, academic journals, journal publications.
Fault Modeling of Combinational and Sequential Circuits at Register Transfer ...VLSICS Design
As the complexity of Very Large Scale Integration (VLSI) is growing, testing becomes tedious and tougher. As of now fault models are used to test digital circuits at the gate level or below that level. By using fault models at the lower levels, testing becomes cumbersome and will lead to delays in the design cycle. In addition, developments in deep submicron technology provide an opening to new defects. We must develop efficient fault detection and location methods in order to reduce manufacturing costs and time to market. Thus there is a need to look for a new approach of testing the circuits at higher levels to speed up the design cycle. This paper proposes on Register Transfer Level (RTL) modeling for digital circuits and computing the fault coverage. The result obtained through this work establishes that the fault coverage with the RTL fault model is comparable to the gate level fault coverage.
FAULT MODELING OF COMBINATIONAL AND SEQUENTIAL CIRCUITS AT REGISTER TRANSFER ...VLSICS Design
As the complexity of Very Large Scale Integration (VLSI) is growing, testing becomes tedious and tougher. As of now fault models are used to test digital circuits at the gate level or below that level. By using fault models at the lower levels, testing becomes cumbersome and will lead to delays in the design cycle. In addition, developments in deep submicron technology provide an opening to new defects. We must develop efficient fault detection and location methods in order to reduce manufacturing costs and time to market. Thus there is a need to look for a new approach of testing the circuits at higher levels to speed up the design cycle. This paper proposes on Register Transfer Level (RTL) modeling for digital circuits and computing the fault coverage. The result obtained through this work establishes that the fault coverage with the RTL fault model is comparable to the gate level fault coverage.
Fault Modeling for Verilog Register Transfer Levelidescitation
As the complexity of Very Large Scale Integration
(VLSI) increases, testing becomes tedious. Currently fault
models are used to test digital circuits at gate level or at levels
lower than gate. Modeling faults at these levels, leads to
increase in the design cycle time period. Hence, there is a
need to explore new approaches for modeling faults at higher
levels. This paper proposes fault modeling at the Register
Transfer Level (RTL) for digital circuits. Using this level of
modeling, results are obtained for fault coverage, area and
test patterns. A software prototype, FEVER, has been developed
in C which reads a RTL description and generates two output
files: one a modified RTL with test features and two a file
consisting of set of test patterns. These modified RTL and test
patterns are further used for fault simulation and fault
coverage analysis. Comparison is performed between the RTL
and Gate level modeling for ISCAS benchmarks and the
results of the same are presented. Results are obtained using
Synopsys, TetraMax and it is shown that it is possible to achieve
100% fault coverage with no area overhead at the RTL level
Congestion Control in Wireless Sensor Networks Using Genetic AlgorithmEditor IJCATR
Sensor network consists of a large number of small nods, strongly interacting with the physical environment, takes
environmental data through sensors, and reacts after processing on information. Wireless network technologies are widely used in most
applications. As wireless sensor networks have many activities in the field of information transmission, network congestion cannot be
thus avoided. So it seems necessary that some new methods can control congestion and use existing resources for providing better traffic
demands. Congestion increases packet loss and retransmission of removed packets and also wastes of energy. In this paper, a novel
method is presented for congestion control in wireless sensor networks using genetic algorithm. The results of simulation show that the
proposed method, in comparison with the algorithm LEACH, can significantly improve congestion control at high speeds.
LOAD BALANCING AND ENERGY EFFICIENCY IN WSN BY CLUSTER JOINING METHODIAEME Publication
In any WSN life of network is depending on life of sensor node. Thus, proper load balancing is very useful for improving life of network. The tree-based routing protocols like GSTEB used dynamic tree structures for routing without any formation of collections. In cases of larger networks, the scheme is not always feasible. In this proposed work cluster-based routing method is used. Cluster head is selected such that it should be close to the base station and should have maximum residential energy than other nodes selected for cluster formation. Size of cluster is controlled by using location-based cluster joining method such that nodes selects their nearest collection head based on the signal strength from cluster head and distance between node and cluster head. Nodes connect to head having the highest signal strength and closest to the base station, this minimizes size of cluster and reduces extra energy consumption. In addition to this cluster formation process starts only after availability of data due to an event. So proposed protocol performs better than existing tree based protocols like GSTEB in terms of energy efficiency
LOAD BALANCING AND ENERGY EFFICIENCY IN WSN BY CLUSTER JOINING METHODIAEME Publication
In any WSN life of network is depending on life of sensor node. Thus, proper load balancing is very useful for improving life of network. The tree-based routing protocols like GSTEB used dynamic tree structures for routing without any formation of collections. In cases of larger networks, the scheme is not always feasible. In this proposed work cluster-based routing method is used. Cluster head is selected such that it should be close to the base station and should have maximum residential energy than other nodes selected for cluster formation. Size of cluster is controlled by using location-based cluster joining method such that nodes selects their nearest collection head based on the signal strength from cluster head and distance between node and cluster head. Nodes connect to head having the highest signal strength and closest to the base station, this minimizes size of cluster and reduces extra energy consumption. In addition to this cluster formation process starts only after availability of data due to an event. So proposed protocol performs better than existing tree based protocols like GSTEB in terms of energy efficiency
Black Box Model based Self Healing Solution for Stuck at Faults in Digital Ci...IJECEIAES
The paper proposes a design strategy to retain the true nature of the output in the event of occurrence of stuck at faults at the interconnect levels of digital circuits. The procedure endeavours to design a combinational architecture which includes attributes to identify stuck at faults present in the intermediate lines and involves a healing mechanism to redress the same. The simulated fault injection procedure introduces both single as well as multiple stuck-at faults at the interconnect levels of a two level combinational circuit in accordance with the directives of a control signal. The inherent heal facility attached to the formulation enables to reach out the fault free output even in the presence of faults. The Modelsim based simulation results obtained for the Circuit Under Test [CUT] implemented using a Read Only Memory [ROM], proclaim the ability of the system to survive itself from the influence of faults. The comparison made with the traditional Triple Modular Redundancy [TMR] exhibits the superiority of the scheme in terms of fault coverage and area overhead.
Congestion Control Clustering a Review PaperEditor IJCATR
Wireless Sensor Networks consists of sensor nodes which are scattered in the environment, gather data and transmit it to a
base station for processing. Energy conservation in the Wireless Sensor Networks (WSN) is a very important task because of their
limited battery power. The related works so far have been done have tried to solve the problem keeping in the mind the constraints of
WSNs. In this paper, a priority based application specific congestion control clustering (PASCCC) protocol has been studied, which
often integrates the range of motion and heterogeneity of the nodes to detect congestion in a very network. Moreover a comparison of
the various clustering techniques has been done. From the survey it has been found that none of the protocol is efficient for energy
conservation. Hence the paper ends with future scope to overcome these issues.
Improvement in Error Resilience in BIST using hamming codeIJMTST Journal
In the current scenario of IP core based SoC, to test the CUT we need to communication link between Circuit Under Test and ATPG, so before applying to actual DUT. If there is a problem with this link, there may be a lip in bit of test data. Compared to original test data, if there is a bit lip in the original data, the codeword may change and hence the decompressed data will have a large number of bit deviation. This deviation in bits can severely degrade the test quality and overall fault coverage which may affect yield. The error resilience is the capability of the test data to resist against such bit lips. Here in this paper, the earlier methods of error resilience is compared and a Hamming code based error resilience technique is proposed to improve the error resilience capacity of compressed test data. This method is applied on Huffman code based compressed test data of widely used ISCAS benchmark circuits. The fault coverage measurement results show the effectiveness of the proposed method. The basic goal here is to survey the effect of bit lips on fault coverage and prepare a platform for further development in this avenue.
Implementation of energy efficient coverage aware routing protocol for wirele...ijfcstjournal
In recent years, wireless sensor network have been used in many application such as disaster reservation,
agriculture, environmental observation and forecasting .Coverage preservation and energy consumption
are two most important issues in wireless sensor networks. To increase the network lifetime, we propose an
energy efficient coverage aware routing protocol for wireless sensor network for randomly deployed sensor
nodes. Some of the routing protocol is based on energy efficiency and some are based on coverage aware.
The proposed routing protocol is based on both the issues i.e. coverage and energy, in which we first find
the k-mean i.e. the degree of coverage, so that we can use this in the selection of cluster heads in wireless
sensor network by using Genetic Algorithm for increasing network lifetime and coverage. For cluster head
selection each node evaluates its k-mean and energy by internal function which used as fitness function in
genetic algorithm. The proposed algorithm “Implementation of energy efficient coverage aware routing
protocol for Wireless Sensor Network” is designed for homogeneous wireless sensor network. Simulations
results show that proposed algorithm increases the network lifetime by reduce the energy consumption and
preserve coverage. Simulation is done with MATLAB and a comparison of algorithm with benchmark
algorithms is also performed.
HIGH-LEVEL LANGUAGE EXTENSIONS FOR FAST EXECUTION OF PIPELINE-PARALLELIZED CO...ijpla
The last few years have seen multicore architectures emerge as the defining technology shaping the future
of high-performance computing. Although multicore architectures present tremendous performance
potential, to realize the true potential of these systems, software needs to play a key role. In particular,
high-level language abstractions and the compiler and the operating system should be able to exploit the
on-chip parallelism and utilize underlying hardware resources on these emerging platforms. This paper
presents a set of high-level abstractions that allow the programmer to specify, at the source-code level, a
variety to of parameters related to parallelism and inter-thread data locality. These abstractions are
implemented as extensions to both C and Fortran. We present the syntax of these directives and also
discuss their implementation in the context of source-to-source transformation framework and autotuning
system. The abstractions are particularly applicable to pipeline parallelized code. We demonstrate the
effectiveness of these strategies of a set of pipeline parallel benchmarks on three different multicore
platforms.
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...Editor IJCATR
Nowadays, wireless sensor networks, clustering protocol based on the neighboring nodes into separate clusters and fault
tolerance for each cluster exists for sensors to send information to the base station, to gain the best performance in terms of increased
longevity and maintain tolerance than with other routing methods. However, most clustering protocols proposed so far, only
geographical proximity (neighboring) cluster formation is considered as a parameter. In this study, a new clustering protocol and fault
tolerance based on the fuzzy algorithms are able to clustering nodes in sensor networks based on fuzzy logic and fault tolerance. This
protocol uses clustering sensor nodes and fault tolerance exist in the network to reduce energy consumption, so that faulty sensors
from neighboring nodes are used to cover the errors, work based on the most criteria overlay neighbor sensors with defective sensors,
distance neighbor sensors from fault sensor and distance neighbor sensors from central station is done. Superior performance of the
protocol can be seen in terms of increasing the network lifetime and maintain the best network tolerance in comparison with previous
protocols such as LEACH in the simulation results.
Similar to Coding Schemes for Implementation of Fault Tolerant Parrallel Filter (20)
A Secure Data Transmission Scheme using Asymmetric Semi-Homomorphic Encryptio...IJAAS Team
The compressive detecting based information accumulation accomplishes with high exactness in information recuperation from less inspection which is available in sensor nodes. In this manner, the existing methods available in the literature diminish the information gathering cost and delays the existence cycle of WSNs. In this paper, a strong achievable security model for sensor network applications was initially proposed. At that point, a secure data collection conspire was displayed based on compressive detecting, which improves the information protection by the asymmetric semi-homomorphic encryption scheme, and decreases the calculation cost by inadequate compressive grid. In this case, particularly the asymmetric mechanism decreases the trouble of mystery key circulation and administration. The proposed homomorphic encryption permits the in-arrange accumulation in cipher domain, and in this manner improves the security and accomplishes the adjustment in system stack. Further, this paper focuses on estimating various network performances such as the calculation cost and correspondence cost, which remunerates the expanding cost caused by the homomorphic encryption. A real time validation on the proposed encryption scheme using AVISPA was additionally performed and the results are satisfactory.
Lossless 4D Medical Images Compression Using Adaptive Inter Slices FilteringIJAAS Team
Recent lossless 4D medical images compression works are based on the application of techniques originated from video compression to efficiently eliminate redundancies in different dimensions of image. In this context we present a new approach of lossless 4D medical images compression which consists to application of 2D wavelet transform in spatial directions followed or not by either lifting transform or motion compensation in inter slices direction, the obtained slices are coded by 3D SPIHT. Our approach was compared with 3D SPIHT with/without motion compensation. The results show our approach offers better performance in lossless compression rate.
Recycling of Industrial Waste Water for the Generation of Electricity by Regu...IJAAS Team
The paper focuses on generating the renewable energy source from industrial waste water effluents. Utilizing the industrial waste water in order to generate electricity, a flow control sensor has been installed at the outlet of the tunnel which passes the waste water to the turbine. As per the need, the generation of electricity varies with respect to the flow through the use of flow control sensor. The generated electricity is then used for powering the street lights, gardening and run-way paths, during night time. The flow control sensor when integrated using IoT and cloud storage facilitates efficiency and scalability thereby providing massive utilization of energy usage.
Early Detection of High Blood Pressure and Diabetic Retinopathy on Retinal Fu...IJAAS Team
In this paper we present a lifting wavelet based CBRIR image retrieval system that uses color and texture as visual features to describe the content of a retinal fundus images. Our contribution is of three directions. First, we use lifting wavelets 9/7 for lossy and SPL5/3 for lossless to extract texture features from arbitrary shaped retinal fundus regions separated from an image to increase the system effectiveness. This process is performed offline before query processing, therefore to answer a query our system does not need to search the entire database images; instead just a number of similar class type patient images are required to be searched for image similarity. Third, to further increase the retrieval accuracy of our system, we combine the region based features extracted from image regions, with global features extracted from the whole image, which are texture using lifting wavelet and HSV color histograms. Our proposed system has the advantage of increasing the retrieval accuracy and decreasing the retrieval time. The experimental evaluation of the system is based on a db1 online retinal fundus color image database. From the experimental results, it is evident that our system performs significantly better accuracy as compared with traditional wavelet based systems. In our simulation analysis, we provide a comparison between retrieval results based on features extracted from the whole image using lossless 5/3 lifting wavelet and features extracted using lossless 9/7 lifting wavelet and using traditional wavelet. The results demonstrate that each type of feature is effective for a particular type of disease of retinal fundus images according to its semantic contents, and using lossless 5/3 lifting wavelet of them gives better retrieval results for almost all semantic classes and outperform 4-10% more accuracy than traditional wavelet.
Automation of DMPS Manufacturing by using LabView & PLCIJAAS Team
This Paper is to enable the Siemens (Programmable Logic Control) CPU 313- 5A to communicate with the Lab VIEW and to control the process accuracy by image processing. The communication between CPU 313-5A and Lab VIEW is via OPC (OLE for Process Control).Process Accuracy is achieved with the use of Labview Image Processing and Gray Scale matching Pattern. Accuracy in the gray scale matching will purely depend on the calibration of the camera with respect to the corresponding image. The digital output from the labview is communicated to PLC via Ethernet Protocol for the industrial process control. With the use of Labview the dead time while using the normal image vision module in PLC can be minimized. Labview uses the gray scale matching technique whi
Mobile Application Development with AndroidIJAAS Team
The Android is mobile platform. It is an open source and free operating system application, by Google it is developed and maintained. It was designed essentially for touch screen mobile devices, such as and tablet, computers, smart phones, watch television, cars etc. Android is one of the most widely used mobile OS. Android is a not only operating system but also key applications and middleware. Android is an open source operating system. It is developed by the open handset Alliance, led by Google, and other companies. Those are used to android studio 2.2.3 version and development the mobile application.
Data Visualization and Analysis of Engineering Educational StatisticsxIJAAS Team
Engineering, is one of the most popular fields of higher education in the modern day world. Majority of the students these days opt for engineering as a career, due to the vastness of choices provided by engineering. Mechanical, Electrical, Computer Science, Civil and Biotechnology are the various disciplines and have varying strength in terms of number of students who join a particular discipline. In this research, we have gather data from various published articles about engineering education and carried out the data visualization and analysis using Tableau 9.2. The objective of the analysis is to help the students to make the decision and the choice about discipline of engineering from which particular university would be the most suitable based on the data collected and represented. Various categories of statistics such as number of graduates from a particular university in a particular discipline, and which university had the maximum number of graduates in a certain year will help the students make their decisions about their future in a more easy and a sorted manner.
Requirement Elicitation Model (REM) in the Context of Global Software Develop...IJAAS Team
Contxext:Requirement elicitation is difficult and critical phase of requirement engineering and the case is worst in global software development (GSD). The study is about requirement elicitation in the context of GSD. Objective: Development of requirement elicitation model (REM) which can address the factors that have positive impact and the factors that have negative impact during elicitation in GSD. The propose model will give solutions and practices to the challenges during elicitation. Method: Systematic literature review (SLR) and empirical research study will be used for achieving the goals and objectives. Expected outcomes: The expected results of this study will be REM that will help vendor organizations for better elicitation during GSD.
Technological development have altered the way we communicate, learn, think, share, and spread information. Mobile technologies are those that make use of wireless technologies to gain some sort of data. As mobile connectedness continues to spread across the world, the value of employing mobile technologies in the arena of learning and teaching seems to be both self-evident and unavoidable The fast deployment of mobile devices and wireless networks in university campuses makes higher education a good environment to integrate learners-centered m-learning . this paper discusses mobile learning technologies that are being used for educational purposes and the effect they have on teaching and learning methods.
Spectral Efficient Blind Channel Estimation Technique for MIMO-OFDM Communica...IJAAS Team
With emerge of increasing research in the domain of future wireless communications, massive MIMO (multiple inputs multiple outputs) attracted most of researchers interests. Massive MIMO is high-speed wireless communication standards. A channel estimation technology plays the essential role in the MIMO systems. Efficient channel estimation leads to spectral efficient wireless communications. The critics of Inter-Symbol Interference (ISI) are the challenging tasks while designing the channel estimation methods. To mitigate the challenges of ISI, we proposed the novel blind channel estimation method which based on Independent component analysis (ICA) in this paper. Proposed channel estimation it works for both blind interference cancellation and ISI cancellation. The proposed Hybrid ICA (HICA) method depends on pulse shape filtering and ambiguity removal to improve the spectral efficiency and reliability for MIMO communications. The Kurtosis operation is used to measure the complex data at first to estimate the common signals. Then we exploited the advantages of 3rd and 4th order Higher Order Statistics (HOS) to priorities the common signals during the channel estimation. In this paper, we present the detailed design and evaluation of HICA blind channel estimation method. We showed the simulation results of HICA against the state-of-art techniques for channel estimation using BER, MSE, and PAPR.
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...IJAAS Team
WSN is a way of handling dangerous and hostile environments safely. It replaces human existence with nodes and units that could sustain its existence under extreme circumstances. The significance of WSN arises from the importance of the data gathered through its nodes. Due to the fact of WSN that it is open air environment, security issues must be considered, for example authentication of new units and the encryption of data transmitted between these units. This research provides a new model covering two important aspects in WSN. The first aspect is the creation of the key that will be used for the current session between a pair of nodes. In this step the research introduces the intuitionistic fuzzy sets to handle the WSN criteria simultaneously and efficiently, in order to decide the exact key length required depending on the status of the network parameters. The second aspect is the distribution of the key between the units desiring communications. This phase starts by authenticating each entity to each other and to the cluster head, then one unit suggests a key and the other one confirms. It then starts communication using that key. This phase shows the hybrid cryptography applied in which the algorithm uses asymmetric encryption for authentication then uses symmetric encryption to secure the connection between the two units. Experimental results in this research could categorized also into two classes. The first class is key size model in which the proposed model compared to ordinary KNN and fuzzy model related to the determination of the key size. The proposed model shows an overall efficient way relating to decide the key size. The second class of experiments is to distribute the intermediate key efficiently; at this point the proposed model shows resilience and efficiency compared to distributing the key directly through cluster head.
Angular Symmetric Axis Constellation Model for Off-line Odia Handwritten Char...IJAAS Team
Optical character recognition is one of the emerging research topics in the field of image processing, and it has extensive area of application in pattern recognition. Odia handwritten script is the most research concern area because it has eldest and most likable language in the state of odisha, India. Odia character is a usually handwritten, which was generally occupied by scanner into machine readable form. In this regard several recognition technique have been evolved for variance kind of languages but writing pattern of odia character is just like as curve appearance; Hence it is more difficult for recognition. In this article we have presented the novel approach for Odia character recognition based on the different angle based symmetric axis feature extraction technique which gives high accuracy of recognition pattern. This empirical model generates a unique angle based boundary points on every skeletonised character images. These points are interconnected with each other in order to extract row and column symmetry axis. We extracted feature matrix having mean distance of row, mean angle of row, mean distance of column and mean angle of column from centre of the image to midpoint of the symmetric axis respectively. The system uses a 10 fold validation to the random forest (RF) classifier and SVM for feature matrix. We have considered the standard database on 200 images having each of 47 Odia character and 10 Odia numeric for simulation. As we have noted outcome of simulation of SVM and RF yields 96.3% and 98.2% accuracy rate on NIT Rourkela Odia character database and 88.9% and 93.6% from ISI Kolkata Odia numerical database.
Energy and Load Aware Routing Protocol for Internet of ThingsIJAAS Team
Maximizing the network lifetime is one of the major challenges in Low Power and Lossy Networks (LLN). Routing plays a vital role in it by minimizing the energy consumption across the networks through the efficient route selection for data transfer. IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) is a IETF standardized IPv6 routing protocol for LLN. In this paper, we propose Energy and Load aware RPL (EL-RPL) protocol, which is an enhancement of RPL protocol. It uses a composite metric, calculated based on expected transmission count (ETX), Load and battery depletion index (BDI), for the route, selection. The COOJA simulator is used for performance evaluation. EL-RPL is compared with other similar protocols RER(BDI) RPL and fuzzy logic based RPL (OF-FL RPL). The simulation result shows that the EL-RPL improves the network lifetime by 8- 12% and packet delivery ratio 2-4%.
Analysis and Implementation of Unipolar PWM Strategies for Three Phase Cascad...IJAAS Team
This paper presents unipolar pulse width modulation technique with sinusoidal sampling pulse width modulation are analyzed for three-phase five-level, seven-level, nine-level and eleven-level cascaded multi-level inverter. The unipolar PWM method offers a good opportunity for the realization of the Three-phase inverter control, it is better to use the unipolar PWM method with single carrier wave compared to two reference waves. In such case the motor harmonic losses will be considerably lower.The necessary calculations for generation of unipolar pulse width modulation strategies have presented in detail. The unipolar SPWM voltage switching scheme is selected in this paper because this method offers the advantages of effectively doubling the switching frequency of the inverter voltage. The cascaded multi level inverter fed induction motor is simulated and compared the total harmonic distroction for all level (five-level, seven-level, nine-level and elevel-level)of the inverter. Theoretical investigations were confirmed by the digital simulations using MATLAB/SIMULINK software.
Design of an IOT based Online Monitoring Digital StethoscopeIJAAS Team
Acoustic stethoscopes have low sound levels. Digital stethoscope overcomes this issue by amplifying body sounds electronically. As the sound signals are transmitted electronically, it can be wireless and can provide noise reduction. Acoustic stethoscope can be changed into a digital stethoscope by inserting an electric capacity microphone onto its head. Heart sounds received from the microphone are processed, sampled and sound signals are converted analog to digital and sent wirelessly using the Internet of Things(IOT) techniques, so that multiple doctors can do auscultation and monitor conditions of the patient.
Development of Russian Driverless Electric VehicleIJAAS Team
This article overviews the history of development of driverless vehicles both in Russia and the World. Foreign experience of development of driverless vehicles, including electric traction, is analyzed. Main stages of creation of experimental NAMI driverless electric vehicle are revised. Main engineering solutions are described concerning development of advanced NAMI driverless electric vehicle, its major components and control systems. Projects aimed at environmental safety of passengers in NAMI driverless electric vehicle are exemplified. Results of bench scale and running tests of NAMI driverless electric vehicle are summarized. Major advantages of driverless energy efficient and environmentally clean transport are demonstrated.
Cost Allocation of Reactive Power Using Matrix Methodology in Transmission Ne...IJAAS Team
In the deregulated market environment as generation, transmission and distribution are separate entities; reactive power flow in transmission lines is a question of great importance. Due to inductive load characteristic, reactive power is inherently flowing in transmission line. Hence under restructured market this reactive power allocation is necessary. In this work authors presents a power flow tracing based allocation method for reactive power to loads. MVAr-mile method is used for allocation of reactive power cost. A sample 6 bus and IEEE 14 bus system is used for showing the feasibility of developed method.
Depth Estimation from Defocused Images: a SurveyIJAAS Team
An important step in 3D data generation is the generation of depth map. Depth map is a black and white image which has exactly the same size of the original captured 2D image that indicates the relative distance of each pixel from the observer to the objects in the real world. This paper presents a survey of Depth Perception from Defocused or blurs images as well as image from motion. The change of distance of the object from the camera has direct relation with the amount of blurring of object in the image. The amount of blurring will be calculated with a comparison in front of the camera directly and can be seen with the changes at gray level around the edges of objects.
CP-NR Distributed Range Free Localization Algorithm in WSNIJAAS Team
Advancements in wireless communication technology have empowered the researchers to develop large scale wireless networks with huge number of sensor nodes. In these networks localization is very active field of research. Localization is a way to determine the physical position of sensor nodes which is useful in many aspects such as to find the origin of events, routing and network coverage. Locating nodes with GPS systems is expensive, power consuming and not applicable to indoor environments. Localization in three dimensional space and accuracy of the estimated location are two factors of major concern. In this paper, a new three dimensional Distributed range-free algorithm which is known as CP-NR is proposed. This algorithm has high localization accuracy and resolved the problem of existing NR algorithm. CP-NR (Coplanar and Projected Node Reproduction) algorithm makes use of co-planarity and projection of point on plane concepts to reduce the localization error. Results have shown that CP-NR algorithm is superior to NR algorithm and comparison is done for the localization accuracy with respect to variations in range, anchor density and node density.
Study and Optimization of a Renewable System of Small Power GenerationIJAAS Team
In this paper, a study was conducted on the sustainable development of solar and wind energy sources. The approach adopted is to exploit the two renewable resources by arriving to determine optimal configurations of photovoltaic and / or wind energy system with storage to provide electricity to a self-contained residential apartment located in the city of Tlemcen , in Algeria. The Tlemcen site showed a more favourable trend to use the photovoltaic system alone on the hybrid PV / wind system because of the low wind speeds of this site. The calculation method used is based on the monthly averages for ten consecutive years, data collected by the Tlemcen Zenâta weather station in order to have a better reliability analysis of an electric power generation system. In addition, the methods used in this study can be used to determine the optimal size of the most economical hybrid system that corresponds to any site in the world and for any requested load.
Richard's entangled aventures in wonderlandRichard Gill
Since the loophole-free Bell experiments of 2020 and the Nobel prizes in physics of 2022, critics of Bell's work have retreated to the fortress of super-determinism. Now, super-determinism is a derogatory word - it just means "determinism". Palmer, Hance and Hossenfelder argue that quantum mechanics and determinism are not incompatible, using a sophisticated mathematical construction based on a subtle thinning of allowed states and measurements in quantum mechanics, such that what is left appears to make Bell's argument fail, without altering the empirical predictions of quantum mechanics. I think however that it is a smoke screen, and the slogan "lost in math" comes to my mind. I will discuss some other recent disproofs of Bell's theorem using the language of causality based on causal graphs. Causal thinking is also central to law and justice. I will mention surprising connections to my work on serial killer nurse cases, in particular the Dutch case of Lucia de Berk and the current UK case of Lucy Letby.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.Sérgio Sacani
The return of a sample of near-surface atmosphere from Mars would facilitate answers to several first-order science questions surrounding the formation and evolution of the planet. One of the important aspects of terrestrial planet formation in general is the role that primary atmospheres played in influencing the chemistry and structure of the planets and their antecedents. Studies of the martian atmosphere can be used to investigate the role of a primary atmosphere in its history. Atmosphere samples would also inform our understanding of the near-surface chemistry of the planet, and ultimately the prospects for life. High-precision isotopic analyses of constituent gases are needed to address these questions, requiring that the analyses are made on returned samples rather than in situ.
Multi-source connectivity as the driver of solar wind variability in the heli...Sérgio Sacani
The ambient solar wind that flls the heliosphere originates from multiple
sources in the solar corona and is highly structured. It is often described
as high-speed, relatively homogeneous, plasma streams from coronal
holes and slow-speed, highly variable, streams whose source regions are
under debate. A key goal of ESA/NASA’s Solar Orbiter mission is to identify
solar wind sources and understand what drives the complexity seen in the
heliosphere. By combining magnetic feld modelling and spectroscopic
techniques with high-resolution observations and measurements, we show
that the solar wind variability detected in situ by Solar Orbiter in March
2022 is driven by spatio-temporal changes in the magnetic connectivity to
multiple sources in the solar atmosphere. The magnetic feld footpoints
connected to the spacecraft moved from the boundaries of a coronal hole
to one active region (12961) and then across to another region (12957). This
is refected in the in situ measurements, which show the transition from fast
to highly Alfvénic then to slow solar wind that is disrupted by the arrival of
a coronal mass ejection. Our results describe solar wind variability at 0.5 au
but are applicable to near-Earth observatories.
This presentation explores a brief idea about the structural and functional attributes of nucleotides, the structure and function of genetic materials along with the impact of UV rays and pH upon them.
Introduction:
RNA interference (RNAi) or Post-Transcriptional Gene Silencing (PTGS) is an important biological process for modulating eukaryotic gene expression.
It is highly conserved process of posttranscriptional gene silencing by which double stranded RNA (dsRNA) causes sequence-specific degradation of mRNA sequences.
dsRNA-induced gene silencing (RNAi) is reported in a wide range of eukaryotes ranging from worms, insects, mammals and plants.
This process mediates resistance to both endogenous parasitic and exogenous pathogenic nucleic acids, and regulates the expression of protein-coding genes.
What are small ncRNAs?
micro RNA (miRNA)
short interfering RNA (siRNA)
Properties of small non-coding RNA:
Involved in silencing mRNA transcripts.
Called “small” because they are usually only about 21-24 nucleotides long.
Synthesized by first cutting up longer precursor sequences (like the 61nt one that Lee discovered).
Silence an mRNA by base pairing with some sequence on the mRNA.
Discovery of siRNA?
The first small RNA:
In 1993 Rosalind Lee (Victor Ambros lab) was studying a non- coding gene in C. elegans, lin-4, that was involved in silencing of another gene, lin-14, at the appropriate time in the
development of the worm C. elegans.
Two small transcripts of lin-4 (22nt and 61nt) were found to be complementary to a sequence in the 3' UTR of lin-14.
Because lin-4 encoded no protein, she deduced that it must be these transcripts that are causing the silencing by RNA-RNA interactions.
Types of RNAi ( non coding RNA)
MiRNA
Length (23-25 nt)
Trans acting
Binds with target MRNA in mismatch
Translation inhibition
Si RNA
Length 21 nt.
Cis acting
Bind with target Mrna in perfect complementary sequence
Piwi-RNA
Length ; 25 to 36 nt.
Expressed in Germ Cells
Regulates trnasposomes activity
MECHANISM OF RNAI:
First the double-stranded RNA teams up with a protein complex named Dicer, which cuts the long RNA into short pieces.
Then another protein complex called RISC (RNA-induced silencing complex) discards one of the two RNA strands.
The RISC-docked, single-stranded RNA then pairs with the homologous mRNA and destroys it.
THE RISC COMPLEX:
RISC is large(>500kD) RNA multi- protein Binding complex which triggers MRNA degradation in response to MRNA
Unwinding of double stranded Si RNA by ATP independent Helicase
Active component of RISC is Ago proteins( ENDONUCLEASE) which cleave target MRNA.
DICER: endonuclease (RNase Family III)
Argonaute: Central Component of the RNA-Induced Silencing Complex (RISC)
One strand of the dsRNA produced by Dicer is retained in the RISC complex in association with Argonaute
ARGONAUTE PROTEIN :
1.PAZ(PIWI/Argonaute/ Zwille)- Recognition of target MRNA
2.PIWI (p-element induced wimpy Testis)- breaks Phosphodiester bond of mRNA.)RNAse H activity.
MiRNA:
The Double-stranded RNAs are naturally produced in eukaryotic cells during development, and they have a key role in regulating gene expression .
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...Ana Luísa Pinho
Functional Magnetic Resonance Imaging (fMRI) provides means to characterize brain activations in response to behavior. However, cognitive neuroscience has been limited to group-level effects referring to the performance of specific tasks. To obtain the functional profile of elementary cognitive mechanisms, the combination of brain responses to many tasks is required. Yet, to date, both structural atlases and parcellation-based activations do not fully account for cognitive function and still present several limitations. Further, they do not adapt overall to individual characteristics. In this talk, I will give an account of deep-behavioral phenotyping strategies, namely data-driven methods in large task-fMRI datasets, to optimize functional brain-data collection and improve inference of effects-of-interest related to mental processes. Key to this approach is the employment of fast multi-functional paradigms rich on features that can be well parametrized and, consequently, facilitate the creation of psycho-physiological constructs to be modelled with imaging data. Particular emphasis will be given to music stimuli when studying high-order cognitive mechanisms, due to their ecological nature and quality to enable complex behavior compounded by discrete entities. I will also discuss how deep-behavioral phenotyping and individualized models applied to neuroimaging data can better account for the subject-specific organization of domain-general cognitive systems in the human brain. Finally, the accumulation of functional brain signatures brings the possibility to clarify relationships among tasks and create a univocal link between brain systems and mental functions through: (1) the development of ontologies proposing an organization of cognitive processes; and (2) brain-network taxonomies describing functional specialization. To this end, tools to improve commensurability in cognitive science are necessary, such as public repositories, ontology-based platforms and automated meta-analysis tools. I will thus discuss some brain-atlasing resources currently under development, and their applicability in cognitive as well as clinical neuroscience.
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...Sérgio Sacani
We characterize the earliest galaxy population in the JADES Origins Field (JOF), the deepest
imaging field observed with JWST. We make use of the ancillary Hubble optical images (5 filters
spanning 0.4−0.9µm) and novel JWST images with 14 filters spanning 0.8−5µm, including 7 mediumband filters, and reaching total exposure times of up to 46 hours per filter. We combine all our data
at > 2.3µm to construct an ultradeep image, reaching as deep as ≈ 31.4 AB mag in the stack and
30.3-31.0 AB mag (5σ, r = 0.1” circular aperture) in individual filters. We measure photometric
redshifts and use robust selection criteria to identify a sample of eight galaxy candidates at redshifts
z = 11.5 − 15. These objects show compact half-light radii of R1/2 ∼ 50 − 200pc, stellar masses of
M⋆ ∼ 107−108M⊙, and star-formation rates of SFR ∼ 0.1−1 M⊙ yr−1
. Our search finds no candidates
at 15 < z < 20, placing upper limits at these redshifts. We develop a forward modeling approach to
infer the properties of the evolving luminosity function without binning in redshift or luminosity that
marginalizes over the photometric redshift uncertainty of our candidate galaxies and incorporates the
impact of non-detections. We find a z = 12 luminosity function in good agreement with prior results,
and that the luminosity function normalization and UV luminosity density decline by a factor of ∼ 2.5
from z = 12 to z = 14. We discuss the possible implications of our results in the context of theoretical
models for evolution of the dark matter halo mass function.
What is greenhouse gasses and how many gasses are there to affect the Earth.moosaasad1975
What are greenhouse gasses how they affect the earth and its environment what is the future of the environment and earth how the weather and the climate effects.
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...Scintica Instrumentation
Intravital microscopy (IVM) is a powerful tool utilized to study cellular behavior over time and space in vivo. Much of our understanding of cell biology has been accomplished using various in vitro and ex vivo methods; however, these studies do not necessarily reflect the natural dynamics of biological processes. Unlike traditional cell culture or fixed tissue imaging, IVM allows for the ultra-fast high-resolution imaging of cellular processes over time and space and were studied in its natural environment. Real-time visualization of biological processes in the context of an intact organism helps maintain physiological relevance and provide insights into the progression of disease, response to treatments or developmental processes.
In this webinar we give an overview of advanced applications of the IVM system in preclinical research. IVIM technology is a provider of all-in-one intravital microscopy systems and solutions optimized for in vivo imaging of live animal models at sub-micron resolution. The system’s unique features and user-friendly software enables researchers to probe fast dynamic biological processes such as immune cell tracking, cell-cell interaction as well as vascularization and tumor metastasis with exceptional detail. This webinar will also give an overview of IVM being utilized in drug development, offering a view into the intricate interaction between drugs/nanoparticles and tissues in vivo and allows for the evaluation of therapeutic intervention in a variety of tissues and organs. This interdisciplinary collaboration continues to drive the advancements of novel therapeutic strategies.
2. ISSN: 2252-8814
IJAAS Vol. 7, No. 4, December 2018: 353 – 360
354
of flag changes the strategies of separating it will be contrast. Being particular with channel, the computerized
channels have huge applications in advanced flag preparing. Sifting is likewise a class of flag preparing, the
characterizing highlight of channels being the total or incomplete concealment of some part of the flag. It is in
this manner in light of a legitimate concern for anybody associated with electronic circuit configuration to be
able to create channel circuits fit for meeting a given arrangement of particulars. In flag handling, an advanced
channel is a gadget or process that expels some undesirable segment or highlight from a flag. Advanced
channels are utilized for two general purposes; division of signs that have been joined, and reclamation of signs
that have been contorted somehow. Frequently, this implies expelling a few frequencies and not others with a
specific end goal to smother meddling signs and decrease foundation commotion.
Parallel Processing and correspondence frameworks. As a rule, Parallel channels are normally found
in current flag the channels play out an indistinguishable preparing on various approaching signs from there is
an inclination to utilize different input–multiple yield frameworks.
The security of computerized channels has been broadly contemplated. For instance, blame tolerant
executions in light of the utilization of deposit number frameworks or number-crunching codes have been
proposed. The utilization of decreased accuracy replication or word-level insurance has been likewise
examined another alternative to perform blunder remedy is to utilize two distinctive channel usage in parallel.
Every one of those systems concentrate on the security of a solitary channel.
This concise examinations the assurance of parallel channels utilizing more broad coding strategies.
Specifically, a key contrast with ECCs is that both channel sources of info and yields are numbers. Hence, not
just a zero or a one can be utilized for the coding (as finished with ECCs). This can be abused, as appeared in
whatever is left of this brief, to give mistake remedy by including just two repetitive channels paying little heed
to the quantity of parallel channels. The decreased number of repetitive channels does not influence the capacity
of the plan to revise mistakes however diminishes the usage cost. In whatever is left of this short, to begin with,
the parallel channels and the current ECC-based security plot are depicted. At that point, the proposed coding
plan is given and delineated a couple of useful contextual analyses. At last, the contextual analyses are assessed
for a field-programmable door cluster (FPGA) usage and contrasted and the already proposed ECC-based
system.
1.1. Concept of Fault Tolerance
Various procedures can be utilized to shield a circuit from mistakes. Those range from changes in the
assembling procedure of the circuits to lessen the quantity of blunders to including repetition at the rationale
or framework level to guarantee that mistakes don't influence the framework usefulness. Computerized Filters
are a standout amongst the most generally utilized flag handling circuits and a few procedures have been
proposed to shield them from blunders. There are number of techniques used to recognize flaws and the
activities important to adjust the issues inside circuit. Advanced channels are broadly utilized as a part of flag
handling and correspondence frameworks. There are distinctive adaptation to internal failure ways to deal with
customary computational circuits and the DSP circuits. Now and again, the unwavering quality of those
frameworks is basic, and blame tolerant channel executions are required. Throughout the years, numerous
methods that endeavor the channels structure and properties to accomplish adaptation
2. LITERATURE REVIEW
[1] In this paper, adaptation to non-critical failure construct framework based with respect to Error
Correction Codes (ECCs) utilizing VHDL is outlined, executed, and tried. It recommends that with the
assistance of ECCs i.e. Blunder Correction Codes there will be more ensured Parallel channel circuit has been
conceivable. The channel they have utilized for blunder location and revision are for the most part limited
motivation reaction (FIR) channels. They have been utilized Hamming Codes for blame adjustment in which
they takes a square of k bits and produces a piece of n bits by including n−k equality check bits. The equality
check bits are XOR mixes of the k information bits. By appropriately planning those mixes it is conceivable to
distinguish and revise blunders. In this plan they have utilized repetitive module in which the information and
equality check bits are store d and can be recuperated later regardless of the possibility that there is a blunder
in one of the bits. This is finished by re - registering the equality check bits and contrasting the outcomes and
the qualities put away. Along these lines utilizing hamming codes mistake can be recognized and revised inside
the circuit.
[2] In this paper, Triple Modular Redundancy (TMR) and Hamming Codes have been utilized to
ensure distinctive circuits against Single Event Upsets (SEUs). In this paper, the utilization of a Novel
Hamming approach on FIR Filters is considered and executed with a specific end goal to give low
unpredictability, lessen deferral and territory proficient assurance methods for higher bits information. A novel
Hamming code is proposed in this paper, to build the proficiency of higher information bits. In this paper, they
3. IJAAS ISSN: 2252-8814
Coding Schemes for Implementation of Fault Tolerant Parrallel Filter (Nutenki Siddhartha)
355
have proposed method used to illustrate, how the part of overhead because of mixing the repetition bits, their
consequent evacuation, cushion to cushion postpone in the decoder and utilization of aggregate range of FIR
channel for higher bits are decreased. These depend on the novel hamming code usage in the FIR channel
rather than regular hamming code used to ensure FIR channel. In this plan Hamming code utilized for
transmission of 7-bit information thing.
[3] In this paper, the outline of a FIR channel with self checking capacities in view of the deposit
checking is broke down. Typically the arrangement of deposits used to check the consistency of the aftereffects
of the FIR channel are based of theoretic contemplations about the dynamic range accessible with a picked set
of buildups, the math qualities of the blunders caused by a blame and on the normal for the channel execution.
This examination is frequently hard to perform and to acquire adequate blame scope the arrangement of picked
buildups is overestimated. Gotten result and consequently requires that Instead, in this paper they have
demonstrated how utilizing a comprehensive blame infusion battles permits to proficiently choose the best
arrangement of buildups. Test comes about originating from blame infusion crusades on a 16 taps FIR channel
showed that by watching the happened mistakes and the identification modules relating to various deposit has
been conceivable to decrease the quantity of discovery module, while paying a little lessening of the level of
SEUs that can be distinguished. Paired rationale overwhelms the equipment execution of DSP frameworks
[4] In this paper they have proposed engineering for the execution of blame - tolerant calculation
inside a high throughput multirate equalizer for a deviated remote LAN. The zone overhead is limited by
abusing the logarithmic structure of the Modulus Replication Residue Number System (MRRNS). They had
exhibited that for our framework the zone cost to amend a blame in a solitary computational channel is 82.7%.
Adaptation to non-critical failure inside MRRNS design is executed through the expansion of excess channels.
This paper has displayed a point by point investigation of the cost of executing single blame adjustment ability
in a FIR channel utilizing the MRRNS. The blame tolerant design makes utilization of the mathematical
properties of the MRRNS, and has been appeared to give critical range funds when contrasted and general
systems. This engineering likewise requires couple of extra parts to be outlined, as indistinguishable excess
channels are utilized, and the polynomial mapping stages are just extended from the first segments.
Main Objectives of proposed method:
There are various objectives over the protection of digital signal processing circuits. The main
objectives are given as follows-
1). To achieve fault free digital circuit.
2). To detect and correct errors in digital circuit with more accuracy.
3). To reduce the overhead, needed for protection from error.
4). To improve efficiency.
5). To develop the application area from lower to higher order application.
3. ECC-BASED PROTECTION OF PARALLEL FILTERS
The impulse response h[n] completely defines a discrete time filter that performs the following
operation on the incoming signal x[n]:
(1)
This property can be exploited in the case of parallel filters that operate on different incoming signals,
as shown on Figure. 1. In this case, four filters with the same response process the incoming signals x 1[n], x
2[n], x 3[n], and x 4[n] to produce four outputs y 1[n], y 2[n], y 3[n], and y 4[n].
Figure 1. Block diagram for Parallel FIR Filters
4. ISSN: 2252-8814
IJAAS Vol. 7, No. 4, December 2018: 353 – 360
356
To detect and correct errors, each filter can be viewed as a bit in an ECC, and redundant filters can be
added to form parity check bits. This is also illustrated in Figure. 2, where three redundant filters are used to
form the parity check bits of a classical single error correction Hamming code [14]. Those correspond to the
outputs z1 [n], z2 [n], and z3 [n]. Errors can be detected by checking if
(2)
When some of those checks fail, an error is detected. The error can be corrected based on which specifi
checks failed. For example, an error on filter y 1 will cause errors on the checks of z1, z2, and z3
Figure 2. ECC-based scheme for four filters and a Hamming code.
4. CODING FOR FAULT-TOLERANT PARALLEL FILTERS
The proposed scheme is illustrated in Figure. 3 for the case of four parallel filters. The input signals
are encoded using a matrix with arbitrary coefficients to make the signals that enter the four original and two
redundant filters. In its more general form, this coding matrix A can be formulated as
(3)
5. IJAAS ISSN: 2252-8814
Coding Schemes for Implementation of Fault Tolerant Parrallel Filter (Nutenki Siddhartha)
357
Figure 3. Proposed coding scheme in general form
With this coding scheme, the outputs of the filters, i.e., y1[n], y2[n], y3[n], and y4[n], can be obtained as
follows:
(4)
where A1235 is a sub matrix of A, including the first, second, third, and fifth rows. This process can
be repeated with different submatrixes of A, for example, with A1236, A2345, and A2346. In the error-free
case, all the recovered versions of y1 [n], y2 [n], y3 [n], and y4 [n] will be the same. When there are differences,
an error is detected. For xample, suppose that
(5)
Which means that there is an error among filters {1 2 3 5 6} and that filters {2 3 4 5 6} are correct.
Therefore, the faulty filter is filter 1. Then, the error can be corrected by taking the final outputs from a set that
does not include filter 1.
The error correction and detection logic can be simplified assuming that there is only a single error.
In that case, checking only that, for each recovered set, the sums of the values y1 [n] + y2 [n] + y3 [n] + y4 [n]
are equal is enough. In more detail, four checks are needed, each involving five filters and excluding one. For
example, if branch 1 is excluded, the error checking would be
(6)
in which w¯2345 = [1111](A2345) −1, and w¯2346 = [1111] (A2346) −1.
6. ISSN: 2252-8814
IJAAS Vol. 7, No. 4, December 2018: 353 – 360
358
5. RESULTS
The written Verilog HDL Modules have successfully simulated and verified using Modelsim III 6.4b
and synthesized using Xilinx ISE 13.2.
Simulation Result
Figure 4. Simulation Result
In Figure 5 we observed that simulation results and Figure.6 and Figure.7 shows that RTL schematic and
Technology schematic respectively.
Table 1. Design Summary
Device Utilization Summary (Estimated Values)
Logic Utilization Used Available Utilization
Number of Slices 225 4656 4%
Number of Slice
FlipFLOPS
229 9312 2%
Number of 4 input
LUTs
421 9312 4%
Number of Bonded
IOBs
234 232 100%
Number of GCLKs 1 24 4%
RTL Schematic
Figure 5. RTL Schematic
7. IJAAS ISSN: 2252-8814
Coding Schemes for Implementation of Fault Tolerant Parrallel Filter (Nutenki Siddhartha)
359
Technology Schematic
Figure 6. Technology Schematic
Timing Report
Figure 7. Timing Report
5. CONCLUSION
In this paper a new scheme to protect parallel filters that are commonly found in modern signal
processing circuits has presented. The approach is based on applying ECCs to the parallel filters outputs to
detect and correct errors. The technique can be used for parallel filters that have the same response and process
different input signals. An objectives has also been discussed to show the effectiveness of the scheme in terms
of error correction and problem definition also shows the overheads. The proposed scheme can also make
system price lower. Proposed work will result in more efficient fault tolerant system using parallel IIR filters
based on ECCs, which will meet the goal to achieve low power consumption, increase area of application and
high speed.
REFERENCES
[1] P. P. Vaidyanathan, Multirate Systems and Filter Banks, Englewood Cliffs, N.J., USA: Prentice Hall, 1993.
[2] A. Sibille, C. Oestges and A. Zanella, MIMO: From Theory to Implementation, New York, NY, USA: Academic,
2010.
[3] N. Kanekawa, E. H. Ibe, T. Suga and Y. Uematsu, Dependability in Electronic Systems: Mitigation of Hardware
Failures, Soft Errors, and ElectroMagnetic Disturbances, New York, NY, USA: Springer Verlag, 2010.
[4] M. Nicolaidis, “Design for soft error mitigation,” IEEE Trans. Device Mater. Rel., vol. 5, no. 3, pp. 405–418, Sep.
2005.
[5] C. L. Chen and M. Y. Hsiao, “Error-correcting codes for semiconductor memory applications: A state-of-the-art
review,” IBM J. Res. Develop.vol. 28, no. 2, pp. 124–134, Mar. 1984.
[6] A. Reddy and P. Banarjee “Algorithm-based fault detection for signal processing applications,” IEEE Trans.
Comput., vol. 39, no. 10, pp. 1304–1308, Oct. 1990.
[7] T. Hitana and A. K. Deb, “Bridging concurrent and non-concurrent error detection in FIR filters,” in Proc. Norchip
Conf., 2004, pp. 75–78.
8. ISSN: 2252-8814
IJAAS Vol. 7, No. 4, December 2018: 353 – 360
360
[8] Y.-H. Huang, “High-efficiency soft-error-tolerant digital signal processing using fine -grain subword-detection
Processing,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 18, no. 2, pp. 291–304, Feb. 2010.
[9] S. Pontarelli, G. C. Cardarilli, M. Re, and A. Salsano, “Totally fault tolerant RNS based FIR filters,” in Proc. IEEE
IOLTS, Jul. 2008, pp. 192–194.
BIOGRAPHIES OF AUTHORS
Nutenki Siddhartha is pursuing Master of Technology in Electronic Design Technology
in SR Engineering College, Warangal, and Telangana. He has completed his B.Tech
from Kamala Institute of Technology and Science, Karimnagar, Telangana in 2014. His
areas of interests are VLSI, Digital Signal Processing and Computer Networks. He
Published 1 Poster in ICRTEECT-2017.
G. Renuka working as assistant professor of Electronics and Communication
Engineering, S R Engineering College, Warangal. She has 12 years of teaching
experience. She has obtained B.Tech (ECE) Degree from Ramappa Engineering
College Warangal, Andhra Pradesh, India in 2003 and M.Tech (Digital
Communications) Degree from Kakatiya University, Andhra Pradesh, India in 2009.
Pursuing her Ph.D under JNTUH. She is a member of IETE, and her research areas
include VLSI, Communications.