The paper studies the dynamics of a conventional
positive going zero crossing type digital phase locked loop
(ZC1-DPLL) taking non-ideal responses of the loop constituent
blocks into account. The finite width of the sampling pulses
and the finite propagation delay of the loop subsystems are
properly modeled mathematically and the system dynamics is
found to change because of their influence considered
separately. However, when these two are taken simultaneously,
the system dynamics can be made nearly equivalent to that of
the ideal system. Through an extensive numerical simulation
a set of optimum parameters to overcome design limitations
have been obtained.
Nyquist criterion for distortion less baseband binary channelPriyangaKR1
binary transmission system
From design point of view – frequency response of the channel and transmitted pulse shape are specified; the frequency response of the transmit and receive filters has to be determined so as to reconstruct [bk]
Bilinear z-transformation is the most common method for converting the transfer function H(s) of the analog filter to the transfer function H(z) of the digital filter and vice versa. In this work, introducing the relationship between the digital coefficients and the analog coefficients in the matrix equation definitely involves the Pascal’s triangle.
Nyquist criterion for distortion less baseband binary channelPriyangaKR1
binary transmission system
From design point of view – frequency response of the channel and transmitted pulse shape are specified; the frequency response of the transmit and receive filters has to be determined so as to reconstruct [bk]
Bilinear z-transformation is the most common method for converting the transfer function H(s) of the analog filter to the transfer function H(z) of the digital filter and vice versa. In this work, introducing the relationship between the digital coefficients and the analog coefficients in the matrix equation definitely involves the Pascal’s triangle.
On The Fundamental Aspects of DemodulationCSCJournals
When the instantaneous amplitude, phase and frequency of a carrier wave are modulated with the information signal for transmission, it is known that the receiver works on the basis of the received signal and a knowledge of the carrier frequency. The question is: If the receiver does not have the a priori information about the carrier frequency, is it possible to carry out the demodulation process? This tutorial lecture answers this question by looking into the very fundamental process by which the modulated wave is generated. It critically looks into the energy separation algorithm for signal analysis and suggests modification for distortionless demodulation of an FM signal, and recovery of sub-carrier signals
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...ijma
This paper proposes orthogonal Discrete Frequency Coding Space Time Waveforms (DFCSTW) for
Multiple Input and Multiple Output (MIMO) radar detection in compound Gaussian clutter. The proposed
orthogonal waveforms are designed considering the position and angle of the transmitting antenna when
viewed from origin. These orthogonally optimized show good resolution in spikier clutter with Generalized
Likelihood Ratio Test (GLRT) detector. The simulation results show that this waveform provides better
detection performance in spikier Clutter.
Digital Signal Processing[ECEG-3171]-Ch1_L06Rediet Moges
This Digital Signal Processing Lecture material is the property of the author (Rediet M.) . It is not for publication,nor is it to be sold or reproduced.
#Africa#Ethiopia
Digital Signal Processing[ECEG-3171]-Ch1_L05Rediet Moges
This Digital Signal Processing Lecture material is the property of the author (Rediet M.) . It is not for publication,nor is it to be sold or reproduced.
#Africa#Ethiopia
Linear Model Predictive Controller for Closed-Loop Control of Intravenous Ane...IDES Editor
During intravenous anesthesia, anesthetic drugs
must be administered at a suitable rate to prevent over dosing
and under dosing in a patient. A developed Pharmacokinetic-
Pharmacodynamic (PK/PD) model, which has been used to
study the relationship between administered anesthetic dose
and its effect on the patient in terms of hypnosis, is considered.
In this paper, Linear Model Predictive Controller (LMPC)
framework based on Active Set Method (ASM) with modified
approach for closed loop control of intravenous anesthesia is
presented for Single-Input (Propofol infusion rate) Single-
Output (Bispectral Index (BIS)) model of a patient.
Effectiveness of the designed LMPC has been studied for BIS
reference tracking as well as constraints, disturbances and
noise handling in the measured variables. Performance of
proposed approach is compared with conventional
Proportional-Integral-Derivative (PID) controller, considering
closed loop time delays. Simulation result shows that, proposed
LMPC outperforms conventional PID controller.
Evolutionary Testing Approach for Solving Path- Oriented Multivariate ProblemsIDES Editor
A multivariate approach involves varying number
of objectives to be satisfied simultaneously in testing process.
An evolutionary approach, genetic algorithm is taken for
solving multivariate problems in software engineering. The
Multivariate Optimization Problem (MOP) has a set of
solutions, each of which satisfies the objectives at an acceptable
level. Another evolutionary algorithm named SBGA (stagebased
genetic algorithm) with two stages is attempted for
solving problems with multiple objectives like cost
minimization, time reduction and maximizing early fault
deduction capabilities. In this paper, a multivariate genetic
algorithm (MGA) in terms of stages for path-based programs
is presented to get the benefits of both multi-criteria
optimization and genetic algorithm. The multiple variables
considered for test data generation are maximum path coverage
with minimum execution time and test-suite minimization.
The path coverage and the no. of test cases generated using
SBGA are experimented with low, medium and high complexity
object-oriented programs and compared with the existing GA
approaches. The data-flow testing of OOPs in terms of path
coverage are resulted with almost 88%. Thus, the efficiency
of generated testcases has been improved in terms of path
coverage with minimum execution time as well as with the
minimal test suite size.
On The Fundamental Aspects of DemodulationCSCJournals
When the instantaneous amplitude, phase and frequency of a carrier wave are modulated with the information signal for transmission, it is known that the receiver works on the basis of the received signal and a knowledge of the carrier frequency. The question is: If the receiver does not have the a priori information about the carrier frequency, is it possible to carry out the demodulation process? This tutorial lecture answers this question by looking into the very fundamental process by which the modulated wave is generated. It critically looks into the energy separation algorithm for signal analysis and suggests modification for distortionless demodulation of an FM signal, and recovery of sub-carrier signals
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...ijma
This paper proposes orthogonal Discrete Frequency Coding Space Time Waveforms (DFCSTW) for
Multiple Input and Multiple Output (MIMO) radar detection in compound Gaussian clutter. The proposed
orthogonal waveforms are designed considering the position and angle of the transmitting antenna when
viewed from origin. These orthogonally optimized show good resolution in spikier clutter with Generalized
Likelihood Ratio Test (GLRT) detector. The simulation results show that this waveform provides better
detection performance in spikier Clutter.
Digital Signal Processing[ECEG-3171]-Ch1_L06Rediet Moges
This Digital Signal Processing Lecture material is the property of the author (Rediet M.) . It is not for publication,nor is it to be sold or reproduced.
#Africa#Ethiopia
Digital Signal Processing[ECEG-3171]-Ch1_L05Rediet Moges
This Digital Signal Processing Lecture material is the property of the author (Rediet M.) . It is not for publication,nor is it to be sold or reproduced.
#Africa#Ethiopia
Linear Model Predictive Controller for Closed-Loop Control of Intravenous Ane...IDES Editor
During intravenous anesthesia, anesthetic drugs
must be administered at a suitable rate to prevent over dosing
and under dosing in a patient. A developed Pharmacokinetic-
Pharmacodynamic (PK/PD) model, which has been used to
study the relationship between administered anesthetic dose
and its effect on the patient in terms of hypnosis, is considered.
In this paper, Linear Model Predictive Controller (LMPC)
framework based on Active Set Method (ASM) with modified
approach for closed loop control of intravenous anesthesia is
presented for Single-Input (Propofol infusion rate) Single-
Output (Bispectral Index (BIS)) model of a patient.
Effectiveness of the designed LMPC has been studied for BIS
reference tracking as well as constraints, disturbances and
noise handling in the measured variables. Performance of
proposed approach is compared with conventional
Proportional-Integral-Derivative (PID) controller, considering
closed loop time delays. Simulation result shows that, proposed
LMPC outperforms conventional PID controller.
Evolutionary Testing Approach for Solving Path- Oriented Multivariate ProblemsIDES Editor
A multivariate approach involves varying number
of objectives to be satisfied simultaneously in testing process.
An evolutionary approach, genetic algorithm is taken for
solving multivariate problems in software engineering. The
Multivariate Optimization Problem (MOP) has a set of
solutions, each of which satisfies the objectives at an acceptable
level. Another evolutionary algorithm named SBGA (stagebased
genetic algorithm) with two stages is attempted for
solving problems with multiple objectives like cost
minimization, time reduction and maximizing early fault
deduction capabilities. In this paper, a multivariate genetic
algorithm (MGA) in terms of stages for path-based programs
is presented to get the benefits of both multi-criteria
optimization and genetic algorithm. The multiple variables
considered for test data generation are maximum path coverage
with minimum execution time and test-suite minimization.
The path coverage and the no. of test cases generated using
SBGA are experimented with low, medium and high complexity
object-oriented programs and compared with the existing GA
approaches. The data-flow testing of OOPs in terms of path
coverage are resulted with almost 88%. Thus, the efficiency
of generated testcases has been improved in terms of path
coverage with minimum execution time as well as with the
minimal test suite size.
An Experimental Investigation into the Grindability Aspects of Newly Develope...IDES Editor
Ceramics are getting widely used in many engineering applications. These ceramic materials need to be ground. Unfortunately, the ground ceramic components mostly contain surface/subsurface damages. To minimize the grinding induced damages selection of appropriate grinding process parameters is very important. Ceramic composite material (AlSiTi) has been selected in the present study to investigate its grindability. This research work deals with the analysis of the process parameters such as wheel speed, table feed and infeed as influential factors, on the force components, grinding specific energy and surface roughness values based
on Taguchi’s experimental design method. Scanning electron microscopy (SEM) has been used to analyze the subsurface damages. The result provides valuable insight into the grindability aspects of the composite ceramic (AlSiTi).
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
The security of authentication of internet based
co-banking services should not be susceptible to high risks.
The passwords are highly vulnerable to virus attacks due to
the lack of high end embedding of security methods. In order
for the passwords to be more secure, people are generally
compelled to select jumbled up character based passwords
which are not only less memorable but are also equally prone
to insecurity. Multiple use of distributed shares has been
studied to solve the problem of authentication by algorithms
based on thresholding of pixels in image processing and visual
cryptography concepts where the subset of shares is considered
for the recovery of the original image for authentication using
correlation function[1][2].The main disadvantage in the above
study is the plain storage of shares and also one of the shares
is being supplied to the customer, which will lead to the
possibility of misuse by a third party. This paper proposes a
technique for scrambling of pixels by key based random
permutation (KBRP) within the shares before the
authentication has been attempted. Total number of shares to
be created is dependent on the multiplicity of ownership of
the account. By this method the problem of uncertainty among
the customers with regard to security, storage, retrieval of
holding of half of the shares is minimized.
Automatic Synthesis and Formal Verification of Interfaces Between Incompatibl...IDES Editor
In this work, we are concerned with automatic
synthesis and formal verification of interfaces between
incompatible soft intellectual properties (IPs) for System On
Chip (SOC) design. IPs Structural and dynamic aspects are
modeled via UML2.x diagrams such as structural, timing and
Statecharts diagrams. From these diagrams, interfaces are
generated automatically between incompatible IPs following
an interface synthesis algorithm. Interfaces behaviors
verification is performed by the model checker that is
integrated in Maude language. A Maude specification
including interface specification and properties for verification
are generated automatically from UML diagrams.
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...IDES Editor
Distributed databases have become the most
essential technology for recent business organizations. In most
of the cases Distributed Databases are developed in a Bottom-
Up approach, fragmentation exists beforehand. The optimum
allocation of those fragments is the only way, which can be
exploited by the designers to increase the performance,
efficiency, reliability and availability of the Distributed
Database in the realistic dynamic environment, where the access
probabilities of nodes to fragments change over time. In this
paper, a new dynamic fragment allocation algorithm is
proposed in Non-Replicated allocation scenario, which
incorporates the time constraints of database accesses, volume
threshold and the volume of data transmitted in successive time
intervals to dynamically reallocate fragments to sites at runtime
in accordance with the changing access patterns. It will migrate
a fragment to a particular site only when that site has made
data transfer higher than all other sites and greater than the
threshold value from or to that fragment consistently in some
recent time intervals. The choice of the volume threshold, the
number of time intervals and the duration of each time interval
are the most important factors which regulate the frequency
of fragment reallocations. The proposed algorithm will decrease
the movement of fragments over the network and data transfer
cost and will also improve the overall performance of the system
by dynamically allocating fragments in a most optimum and
intuitive manner.
Design and Implementation of Low Ripple Low Power Digital Phase-Locked LoopCSCJournals
We propose a phase-locked loop (PLL) architecture, which reduces the double frequency ripple without increasing the order of loop filter. Proposed architecture uses quadrature numerically–controlled oscillator (NCO) to provide two output signals with phase difference of π/2. One of them is subtracted from the input signal before multiplying with the other output of NCO. The system also provides stability in case the input signal has noise in amplitude or phase. The proposed structure is implemented using field programmable gate array (FPGA), which dissipates 15.44mw and works at clock frequency of 155.8 MHz.
A Low Power Digital Phase Locked Loop With ROM-Free Numerically Controlled Os...CSCJournals
The objective of this paper is to explore the analysis and design of second order digital phase-locked loop (DPLL), and present low power architecture for DPLL. The proposed architecture aims to reduce the high power consumption of DPLL, which results from using a read only memory (ROM) in implementation of the numerically controlled oscillator (NCO). The proposed DPLL utilizes a new design for NCO, in which no ROM is used. DPLL is deigned and implemented using FPGA, consumed 237 mw, which saves more than 25% of power consumption, and works at faster clock frequency compared to traditional architecture.
Range Extended Second Order Digital Phase Locked LoopIDES Editor
A new structure of second order digital phase
locked loop (DPLL) called modified second order DPLL
(MSODPLL) has been proposed. The phase error
dynamics of a conventional second order DPLL
(CSODPLL) and that of a MSODPLL have been studied
using digital computers. Ranges of initial conditions
leading to the phase locking condition were determined
from computer simulation of both conventional and
modified second order DPLL Using these observations
the larger frequency acquisition range (FAR) of the
MSODPLL compared to the CSODPLL has been
established.
A Simple Design to Mitigate Problems of Conventional Digital Phase Locked LoopCSCJournals
This paper presents a method which can estimate frequency, phase and power of received signal corrupted with additive white Gaussian noise (AWGN) in large frequency offset environment. Proposed method consists of two loops, each loop is similar to a phase–locked loop (PLL) structure. The proposed structure solves the problems of conventional PLL such as limited estimation range, long settling time, overshoot, high frequency ripples and instability. Traditional inability of PLL to synchronize signals with large frequency offset is also removed in this method. Furthermore, proposed architecture along with providing stability, ensures fast tracking of any changes in input frequency. Proposed method is also implemented using field programmable gate array (FPGA), it consumes 201 mW and works at 197 MHz.
Performance Analysis of M-ary Optical CDMA in Presence of Chromatic DispersionIDES Editor
The performance of M-ary optical code division
multiple access (OCDMA) is analytically investigated in
presence of chromatic dispersion. The study is carried out for
single mode dispersion shifted and non dispersion shifted
fibers. Walsh code is used as user address. The p-i-n
photodetector is used for optoelectronic conversion process.
In our proposed model 16 different symbols are modulated
with different intensity levels and detected by direct detection
technique. The numerical results show that, the reconstruction
of the transmitted symbol is strongly dependent on the received
symbols magnitude which is reduced by fiber length and
symbol rate. It is found that the proposed OCDMA system
shows better performance when dispersion shifted fiber is
used as a communication medium.
Comparative Analysis of Distortive and Non-Distortive Techniques for PAPR Red...IDES Editor
OFDM is a popular and widely accepted modulation
and multiplexing technique in the area of wireless
communication. IEEE 802.15, a wireless specification defined
for WPAN is an emerging wireless technology for short range
multimedia applications. Two general categories of 802.15
are the low rate 802.15.4 (ZigBee) and high rate 802.15.3
(UWB). In their physical (PHY) layer design, OFDM is a
competing technique due to the various advantages it renders
in the practical wireless media. OFDM has been a popular
technique for many years and adopted as the core technique
in a number of wireless standards. It makes the system more
immune to interference like InterSymbol Interference (ISI)
and InterCarrier Interference (ICI) and dispersive effects of
the channel. It is also a spectrally efficient scheme since the
spectra of the signal are overlapping in nature. Despite these
advantages OFDM suffers from a serious problem of high
Peak to Average Power. This limits the system’s capabilities
and increases the complexity. This paper compares the signal
distortion technique of Amplitude Clipping and the
distortionless technique of SLM for Peak to Average Power
reduction
All-optical logic XOR/XNOR gate operation using microring and nanoring reson...University of Malaya (UM)
In this paper, a novel system of simultaneous optical logic AND and OR gates using dark -bright soliton conversion within the add/drop optical filter system is proposed. The input logic „0‟ and control logic „0‟ are formed by using the dark soliton pulse (D) trains. By using the dark-bright soliton conversion behavior within the π/2 phase shift device, we found that the simultaneous optical logic AND and OR gates at the drop and through ports can be randomly formed, respectively.
Mathematical Model for Dynamic Damage Probability of the Repetition Pulse Rat...IJERA Editor
Aimed at the high-energy laser system, under the assumption that the tracking error is the normal stochastic
process of mean square differentiability and ergodicity, the Series Expression of the dynamic damage probability
was given. The example demonstrate some characteristics of the dynamic damage probability as follow. The
system proposed indicates the quantitative relationship between dynamic damage probability and transfer function
of the tracking error system, which offers theoretical and technological support on proofing, designing and testing
the dynamic damage probability of laser system.
Analytical Delay Model for Distributed On-Chip RLCG Global Interconnects for ...IDES Editor
Fast delay estimation methods, as compared to
simulation techniques, are needed for incremental
performance-driven layout synthesis. On-chip inductive and
conductive effects are becoming predominant in deep
submicron (DSM) interconnects due to increasing clock
speeds; circuit complexity and interconnect lengths.
Inductance causes noise in the signal waveforms, which can
adversely affect the performance of the circuit and signal
integrity. Elmore delay-based estimation methods, although
efficient, fails to accurately estimate the delay for RLCG
interconnect lines. This paper presents an analytical delay
model, based on first and second moments of RLCG
interconnection lines, that considers the effect of inductance
and conductance for the estimation of delay in interconnection
lines. Simulation results justify the efficacy of the proposed
delay modelling approach.
Frequency and Power Estimator for Digital Receivers in Doppler Shift Environm...CSCJournals
A frequency estimator well suited for digital receivers is proposed. Accurate estimates of unknown frequency and power of input sinusoidal signal, in the presence of additive white Gaussian noise (AWGN), are provided. The proposed structure solve the problems of traditional phase locked loop (PLL) such as, narrow tracking range, overshoot, long settle time, double frequency ripples in the loop and stability. Proposed method can estimate frequencies up to half the sampling frequency irrespective of the input signal power. Furthermore, it provides stability and allows fast tracking for any changes in input frequency. The estimator is also implemented using field programmable gate array (FPGA), consumes 127 mW and works at a frequency of 225 MHz. Proposed method can estimate the fluctuation in frequency of transmitter’s oscillator, can be used as a frequency shift keying receiver and can also be applied as a digital receiver in Doppler shift environment.
LTE Physical Layer Transmission Mode Selection Over MIMO Scattering ChannelsIllaKolani1
Although LTE networks systems profits from recent advanced transmission techniques as MIMO systems, it encounters particularly two mains challenges:
MIMO channel Modeling or MIMO channel estimation .
An Optimal Dynamic MIMO transmission modes switching following the variation of MIMO Channel.
This Thesis proposes a channel model taking into account the motion of the UE first and after use this model to design an optimal transmission mode selection for 4G networks
HARMONICS AND INTERHARMONICS ESTIMATION OF A PASSIVE MAGNETIC FAULT CURRENT L...cscpconf
This paper presents the harmonics and interharmonics analysis of a passive magnetic fault current limiter (MFCL). This device limits the current at post fault without affecting the pre-fault state of the system. The harmonics and interharmonics estimation of a non-stationary signal generated by MFCL has been investigated using Morlet Wavelet transform and FFT.Continous wavelet transform (CWT) have been applied for estimation of harmonics and
interharmonics in MFCL under normal and faulted condition.
Power System State Estimation - A ReviewIDES Editor
The aim of this article is to provide a comprehensive
survey on power system state estimation techniques. The
algorithms used for finding the system states under both static
and dynamic state estimations are discussed in brief. The
authors are opinion that the scope of pursuing research in the
area of state estimation with PMU and SCADA measurements
is the state of the art and timely.
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
Reactive Power Planning is a major concern in the
operation and control of power systems This paper compares
the effectiveness of Evolutionary Programming (EP) and
New Improved Differential Evolution (NIMDE) to solve
Reactive Power Planning (RPP) problem incorporating
FACTS Controllers like Static VAR Compensator (SVC),
Thyristor Controlled Series Capacitor (TCSC) and Unified
power flow controller (UPFC) considering voltage stability.
With help of Fast Voltage Stability Index (FVSI), the critical
lines and buses are identified to install the FACTS controllers.
The optimal settings of the control variables of the generator
voltages,transformer tap settings and allocation and parameter
settings of the SVC,TCSC,UPFC are considered for reactive
power planning. The test and Validation of the proposed
algorithm are conducted on IEEE 30–bus system and 72-bus
Indian system.Simulation results shows that the UPFC gives
better results than SVC and TCSC and the FACTS controllers
reduce the system losses.
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
Damping of power system oscillations with the help
of proposed optimal Proportional Integral Derivative Power
System Stabilizer (PID-PSS) and Static Var Compensator
(SVC)-based controllers are thoroughly investigated in this
paper. This study presents robust tuning of PID-PSS and
SVC-based controllers using Genetic Algorithms (GA) in
multi machine power systems by considering detailed model
of the generators (model 1.1). The effectiveness of FACTSbased
controllers in general and SVC-based controller in
particular depends upon their proper location. Modal
controllability and observability are used to locate SVC–based
controller. The performance of the proposed controllers is
compared with conventional lead-lag power system stabilizer
(CPSS) and demonstrated on 10 machines, 39 bus New England
test system. Simulation studies show that the proposed genetic
based PID-PSS with SVC based controller provides better
performance.
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
This paper presents the need to operate the power
system economically and with optimum levels of voltages has
further led to an increase in interest in Distributed
Generation. In order to reduce the power losses and to improve
the voltage in the distribution system, distributed generators
(DGs) are connected to load bus. To reduce the total power
losses in the system, the most important process is to identify
the proper location for fixing and sizing of DGs. It presents a
new methodology using a new population based meta heuristic
approach namely Artificial Bee Colony algorithm(ABC) for
the placement of Distributed Generators(DG) in the radial
distribution systems to reduce the real power losses and to
improve the voltage profile, voltage sag mitigation. The power
loss reduction is important factor for utility companies because
it is directly proportional to the company benefits in a
competitive electricity market, while reaching the better power
quality standards is too important as it has vital effect on
customer orientation. In this paper an ABC algorithm is
developed to gain these goals all together. In order to evaluate
sag mitigation capability of the proposed algorithm, voltage
in voltage sensitive buses is investigated. An existing 20KV
network has been chosen as test network and results are
compared with the proposed method in the radial distribution
system.
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
Controlling power flow in modern power systems
can be made more flexible by the use of recent developments
in power electronic and computing control technology. The
Unified Power Flow Controller (UPFC) is a Flexible AC
transmission system (FACTS) device that can control all the
three system variables namely line reactance, magnitude and
phase angle difference of voltage across the line. The UPFC
provides a promising means to control power flow in modern
power systems. Essentially the performance depends on proper
control setting achievable through a power flow analysis
program. This paper presents a reliable method to meet the
requirements by developing a Newton-Raphson based load
flow calculation through which control settings of UPFC can
be determined for the pre-specified power flow between the
lines. The proposed method keeps Newton-Raphson Load Flow
(NRLF) algorithm intact and needs (little modification in the
Jacobian matrix). A MATLAB program has been developed to
calculate the control settings of UPFC and the power flow
between the lines after the load flow is converged. Case studies
have been performed on IEEE 5-bus system and 14-bus system
to show that the proposed method is effective. These studies
indicate that the method maintains the basic NRLF properties
such as fast computational speed, high degree of accuracy and
good convergence rate.
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
The size and shape of opening in dam causes the
stress concentration, it also causes the stress variation in the
rest of the dam cross section. The gravity method of the analysis
does not consider the size of opening and the elastic property
of dam material. Thus the objective of study is comprises of
the Finite Element Method which considers the size of
opening, elastic property of material, and stress distribution
because of geometric discontinuity in cross section of dam.
Stress concentration inside the dam increases with the opening
in dam which results in the failure of dam. Hence it is
necessary to analyses large opening inside the dam. By making
the percentage area of opening constant and varying size and
shape of opening the analysis is carried out. For this purpose
a section of Koyna Dam is considered. Dam is defined as a
plane strain element in FEM, based on geometry and loading
condition. Thus this available information specified our path
of approach to carry out 2D plane strain analysis. The results
obtained are then compared mutually to get most efficient
way of providing large opening in the gravity dam.
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
Pushover Analysis a popular tool for seismic
performance evaluation of existing and new structures and is
nonlinear Static procedure where in monotonically increasing
loads are applied to the structure till the structure is unable
to resist the further load .During the analysis, whatever the
strength of concrete and steel is adopted for analysis of
structure may not be the same when real structure is
constructed and the pushover analysis results are very sensitive
to material model adopted, geometric model adopted, location
of plastic hinges and in general to procedure followed by the
analyzer. In this paper attempt has been made to assess
uncertainty in pushover analysis results by considering user
defined hinges and frame modeled as bare frame and frame
with slab modeled as rigid diaphragm and results compared
with experimental observations. Uncertain parameters
considered includes the strength of concrete, strength of steel
and cover to the reinforcement which are randomly generated
and incorporated into the analysis. The results are then
compared with experimental observations.
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
This paper is an attempt to base on auctions which
presents a frame work for the secure multi-party decision
protocols. In addition to the implementations which are very
light weighted, the main focus is on synchronizing security
features for avoiding agreements manipulations and reducing
the user traffic. Through this paper one can understand that
this different auction protocols on top of the frame work can
be collaborated using mobile devices. This paper present the
negotiation between auctioneer and the proffered and this
negotiation shows that multiparty security is far better than
the existing system.
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
The problems associated with selfish nodes in
MANET are addressed by a collaborative watchdog approach
which reduces the detection time for selfish nodes thereby
improves the performance and accuracy of watchdogs[1]. In
the related works they make use of credit based systems, reputation
based mechanisms, pathrater and watchdog mechanism
to detect such selfish nodes. In this paper we follow an approach
of collaborative watchdog which reduces the detection
time for selfish nodes and also involves the removal of such
selfish nodes based on some progressively assessed thresholds.
The threshold gives the nodes a chance to stop misbehaving
before it is permanently deleted from the network.
The node passes through several isolation processes before it
is permanently removed. Another version of AODV protocol
is used here which allows the simulation of selfish nodes in
NS2 by adding or modifying log files in the protocol.
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
Wireless sensor networks are networks having non
wired infrastructure and dynamic topology. In OSI model each
layer is prone to various attacks, which halts the performance
of a network .In this paper several attacks on four layers of
OSI model are discussed and security mechanism is described
to prevent attack in network layer i.e wormhole attack. In
Wormhole attack two or more malicious nodes makes a covert
channel which attracts the traffic towards itself by depicting a
low latency link and then start dropping and replaying packets
in the multi-path route. This paper proposes promiscuous mode
method to detect and isolate the malicious node during
wormhole attack by using Ad-hoc on demand distance vector
routing protocol (AODV) with omnidirectional antenna. The
methodology implemented notifies that the nodes which are
not participating in multi-path routing generates an alarm
message during delay and then detects and isolate the
malicious node from network. We also notice that not only
the same kind of attacks but also the same kind of
countermeasures can appear in multiple layer. For example,
misbehavior detection techniques can be applied to almost all
the layers we discussed.
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
The recent advancements in the wireless technology
and their wide-spread deployment have made remarkable
enhancements in efficiency in the corporate and industrial
and Military sectors The increasing popularity and usage of
wireless technology is creating a need for more secure wireless
Ad hoc networks. This paper aims researched and developed
a new protocol that prevents wormhole attacks on a ad hoc
network. A few existing protocols detect wormhole attacks but
they require highly specialized equipment not found on most
wireless devices. This paper aims to develop a defense against
wormhole attacks as an Anti-worm protocol which is based on
responsive parameters, that does not require as a significant
amount of specialized equipment, trick clock synchronization,
no GPS dependencies.
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
The Cloud based services provide much efficient
and seamless ways for data sharing across the cloud. The fact
that the data owners no longer possess data makes it very
difficult to assure data confidentiality and to enable secure
data sharing in the cloud. Despite of all its advantages this
will remain a major limitation that acts as a barrier to the
wider deployment of cloud based services. One of the possible
ways for ensuring trust in this aspect is the introduction of
accountability feature in the cloud computing scenario. The
Cloud framework requires promotion of distributed
accountability for such dynamic environment[1]. In some
works, there‘s an accountable framework suggested to ensure
distributed accountability for data sharing by the generation
of only a log of data access, but without any embedded feedback
mechanism for owner permission towards data
protection[2].The proposed system is an enhanced client
accountability framework which provides an additional client
side verification for each access towards enhanced security of
data. The integrity of content of data which resides in the
cloud service provider is also maintained by secured
outsourcing. Besides, the authentication of JAR(Java Archive)
files are done to ensure file protection and to maintain a safer
environment for data sharing. The analysis of various
functionalities of the framework depicts both the
accountability and security feature in an efficient manner.
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
A System state in HTTP botnet uses HTTP protocol
for the creation of chain of Botnets thereby compromising
other systems. By using HTTP protocol and port number 80,
attacks can not only be hidden but also pass through the
firewall without being detected. The DPR based detection
leads to better analysis of botnet attacks [3]. However, it
provides only probabilistic detection of the attacker and also
time consuming and error prone. This paper proposes a Genetic
algorithm based layered approach for detecting as well as
preventing botnet attacks. The paper reviews p2p firewall
implementation which forms the basis of filtering.
Performance evaluation is done based on precision, F-value
and probability. Layered approach reduces the computation
and overall time requirement [7]. Genetic algorithm promises
a low false positive rate.
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
in cloud computing data storage is a significant issue
because the entire data reside over a set of interconnected
resource pools that enables the data to be accessed through
virtual machines. It moves the application software’s and
databases to the large data centers where the management of
data is actually done. As the resource pools are situated over
various corners of the world, the management of data and
services may not be fully trustworthy. So, there are various
issues that need to be addressed with respect to the
management of data, service of data, privacy of data, security
of data etc. But the privacy and security of data is highly
challenging. To ensure privacy and security of data-at-rest in
cloud computing, we have proposed an effective and a novel
approach to ensure data security in cloud computing by means
of hiding data within images following is the concept of
steganography. The main objective of this paper is to prevent
data access from cloud data storage centers by unauthorized
users. This scheme perfectly stores data at cloud data storage
centers and retrieves data from it when it is needed.
The main tasks of a Wireless Sensor Network
(WSN) are data collection from its nodes and communication
of this data to the base station (BS). The protocols used for
communication among the WSN nodes and between the WSN
and the BS, must consider the resource constraints of nodes,
battery energy, computational capabilities and memory. The
WSN applications involve unattended operation of the network
over an extended period of time. In order to extend the lifetime
of a WSN, efficient routing protocols need to be adopted. The
proposed low power routing protocol based on tree-based
network structure reliably forwards the measured data towards
the BS using TDMA. An energy consumption analysis of the
WSN making use of this protocol is also carried out. It is
found that the network is energy efficient with an average
duty cycle of 0:7% for the WSN nodes. The OmNET++
simulation platform along with MiXiM framework is made
use of.
This paper presents a trifocal Rotman Lens Design
approach. The effects of focal ratio and element spacing on
the performance of Rotman Lens are described. A three beam
prototype feeding 4 element antenna array working in L-band
has been simulated using RLD v1.7 software. Simulated
results show that the simulated lens has a return loss of –
12.4dB at 1.8GHz. Beam to array port phase error variation
with change in the focal ratio and element spacing has also
been investigated.
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
Hyperspectral images can be efficiently compressed
through a linear predictive model, as for example the one
used in the SLSQ algorithm. In this paper we exploit this
predictive model on the AVIRIS images by individuating,
through an off-line approach, a common subset of bands, which
are not spectrally related with any other bands. These bands
are not useful as prediction reference for the SLSQ 3-D
predictive model and we need to encode them via other
prediction strategies which consider only spatial correlation.
We have obtained this subset by clustering the AVIRIS bands
via the clustering by compression approach. The main result
of this paper is the list of the bands, not related with the
others, for AVIRIS images. The clustering trees obtained for
AVIRIS and the relationship among bands they depict is also
an interesting starting point for future research.
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
A microelectronic circuit of block-elements
functionally analogous to two hydrogen bonding networks is
investigated. The hydrogen bonding networks are extracted
from â-lactamase protein and are formed in its active site.
Each hydrogen bond of the network is described in equivalent
electrical circuit by three or four-terminal block-element.
Each block-element is coded in Matlab. Static and dynamic
analyses are performed. The resultant microelectronic circuit
analogous to the hydrogen bonding network operates as
current mirror, sine pulse source, triangular pulse source as
well as signal modulator.
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
In this paper a method is proposed to discriminate
real world scenes in to natural and manmade scenes of similar
depth. Global-roughness of a scene image varies as a function
of image-depth. Increase in image depth leads to increase in
roughness in manmade scenes; on the contrary natural scenes
exhibit smooth behavior at higher image depth. This particular
arrangement of pixels in scene structure can be well explained
by local texture information in a pixel and its neighborhood.
Our proposed method analyses local texture information of a
scene image using texture unit matrix. For final classification
we have used both supervised and unsupervised learning using
K-Nearest Neighbor classifier (KNN) and Self Organizing
Map (SOM) respectively. This technique is useful for online
classification due to very less computational complexity.
Mental Stress Evaluation using an Adaptive ModelIDES Editor
Chronic stress can have serious physiological and
psychological impact on an individual’s health. Wearable
sensor systems can enable physicians to monitor physiological
variables and observe the impact of stress over long periods of
time. To correlate an individual’s physiological measures with
their perception of psychological stress, it is essential that
the stress monitoring system accounts for individual
differences in self-reporting. Self-reporting of stress is highly
subjective as it is dependent on an individual’s perception of
stress and thus prone to errors. In addition, subjects can tailor
their answers to present their behavior more favorably. In
this paper we present an adaptive model which allows recorded
stress scores and physiological variables to be tuned to remove
biases in self-reported scores. The model takes an individual’s
physiological and psychological responses into account and
adapts to the user’s variations. Using our adaptive model,
physiological data is mapped efficiently to perceived stress
levels with 90% accuracy.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.