Abstract: The AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme proposed three methods for data transmiting from master to slave for on chip communication. Multilayer advanced high-performance bus (ML-AHB) busmatrix employs slave-side arbitration. Slave-side arbitration is different from master-side arbitration in terms of request and grant signals since, in the former, the master merely starts a burst transaction and waits for the slave response to proceed to the next transfer. Therefore, in the former, the unit of arbitration can be a transaction or a transfer. However, the ML-AHB busmatrix of ARM offers only transfer-based fixed-pri-ority and round-robin arbitration schemes. In this paper, we propose the design and implementation of a flexible arbiter for the ML-AHB busmatrix to support three priority policies fixed priority, round robin, and dynamic priority and three data multiplexing modes transfer, transaction, and desired transfer length. In total, there are nine possible arbitration schemes. The proposed arbiter, which is self-motivated (SM), selects one of the nine possible arbitration schemes based upon the priority-level notifications and the desired transfer length from the masters so that arbitration leads to the maximum performance. Experimental results show that, although the area overhead of the proposed SM arbitration scheme is 9%–25% larger than those of the other arbitration schemes, our arbiter improves the throughput by 14%–62% compared to other schemes.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Dear Students
Ingenious techno Solution offers an expertise guidance on you Final Year IEEE & Non- IEEE Projects on the following domain
JAVA
.NET
EMBEDDED SYSTEMS
ROBOTICS
MECHANICAL
MATLAB etc
For further details contact us:
enquiry@ingenioustech.in
044-42046028 or 8428302179.
Ingenious Techno Solution
#241/85, 4th floor
Rangarajapuram main road,
Kodambakkam (Power House)
http://www.ingenioustech.in/
Switching and multicast schemes in asynchronous transfer mode networksEditor Jacotech
This document summarizes various switching and multicast schemes used in asynchronous transfer mode (ATM) networks. It discusses shared memory ATM switching architectures and different approaches for supporting multicast traffic in shared memory switches including replication-at-receiving, replication-at-sending, multiple write multiple read, and single write single read schemes. It also covers requirements for ATM multicast and compares these schemes in terms of advantages and disadvantages related to memory usage and switching performance.
MM-PNEMO: a mathematical model to assess handoff delay and packet lossjournalBEEI
Wireless networks incorporate Mobile Nodes (MNs) that use wireless access networks to communicate. However, the communication among these MNs are not remained stable due to the poor network coverage during inter mobility. Moreover, the wireless nodes are typically small that results in resource-constrained. Thus, it is uphill to use algorithms having giant processing power or memory footprint. Accordingly, it is essential to check schemes consistently to evaluate the performance within the probable application scenario. To do so, numerical analysis could be a notable method to grasp the performance of mobility management schemes as well as the constraint of evolving mobility management solutions specifically for multi-interfaced MR in Proxy NEMO environment. This paper analyzes handoff performance by using a mathematical model of Multihoming-based scheme to support Mobility management in Proxy NEMO (MM-PNEMO) environment. Moreover, a comparative study has been made among the standard Network Mobility Basic Support Protocol (NEMO BSP), Proxy NEMO (PNEMO) and MM-PNEMO scheme respectively. The performance metrics estimated for these schemes are mainly handoff delay and packet loss. This paper also analysed the packet loss ratio and handoff gain as a function of cell radius, number of SMR and velocity respectively. It is apparent that, the MM-PNEMO scheme shows lower packet loss ratio (1%) compared to NEMO-BSP (11%) and P-NEMO (6%).
PERFORMANCE COMPARISON DCM VERSUS QPSK FOR HIGH DATA RATES IN THE MBOFDM UWB ...csandit
This document compares the performance of dual carrier modulation (DCM) versus quadrature phase shift keying (QPSK) for high data rates in a multiband orthogonal frequency division multiplexing (MB-OFDM) ultra wideband (UWB) system. Simulation results show that using DCM provides better performance than QPSK, with a gain of around 0.7 dB for a bit error rate of 10-3 at 320 Mbps data rates. DCM offers additional diversity and coding gains over QPSK, making it more efficient for high data transmission rates in MBOFDM UWB systems.
This document proposes an improved position-based power aware routing algorithm for mobile ad-hoc networks. It introduces using a weighted metric of remaining battery power, speed, and distance of nodes to determine routes. The existing MFR (Most Forward within Radius) algorithm does not consider factors like battery power and speed differences, which can lead to unreliable communication or packet loss. The proposed algorithm uses a weighted combination of distance, velocity, and battery power metrics to select routes, aiming to balance load, increase network lifetime, and improve network performance compared to MFR. Simulation results showed the proposed algorithm reduces packet loss and increases throughput compared to MFR.
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...journalBEEI
This paper discusses the distributed coordination function (DCF) access mechanism which is a carrier sense multiple access with collision avoidance (CSMA/CA) scheme. Simulation projects for different DCF performance parameters have been built using the OPNET network simulator. The projects are mainly basic service set (BSS) topology simulated under different parameter values (data rate, fragmentation, RTS/CTS, number of nodes, and load condition). Simulation results show when the DCF access mechanism is better under what load condition, and how to choose the best fragmentation threshold and other access-mechanism specific parameters according to the network conditions. Simulation results were validated against a theoretically calculated maximum throughput (the simulation maximum throughput was about 70% of the theoretically calculated maximum throughput).
PERFORMANCE EVALUATION OF AOMDV PROTOCOL BASED ON VARIOUS SCENARIO AND TRAFFI...IJCSEA Journal
A MANET is an interconnection of mobile devices by wireless links, which forms a dynamic topology. Routing protocols play a vital role in transmission of data across the network. The two major classifications of routing protocols are unipath and multipath. In this paper, we have evaluated the performance of a widely used on-demand multipath routing protocol called AOMDV. This protocol has been selected due to its edge over other protocols in various aspects, such as reducing delay, routing load etc. The evaluation of AOMDV protocol is carried out in terms of four scenario patterns such as RWM, RPGM, MGM, and GMM in two different traffic patterns such as CBR and TCP using NS2 and Bonn Motion.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Dear Students
Ingenious techno Solution offers an expertise guidance on you Final Year IEEE & Non- IEEE Projects on the following domain
JAVA
.NET
EMBEDDED SYSTEMS
ROBOTICS
MECHANICAL
MATLAB etc
For further details contact us:
enquiry@ingenioustech.in
044-42046028 or 8428302179.
Ingenious Techno Solution
#241/85, 4th floor
Rangarajapuram main road,
Kodambakkam (Power House)
http://www.ingenioustech.in/
Switching and multicast schemes in asynchronous transfer mode networksEditor Jacotech
This document summarizes various switching and multicast schemes used in asynchronous transfer mode (ATM) networks. It discusses shared memory ATM switching architectures and different approaches for supporting multicast traffic in shared memory switches including replication-at-receiving, replication-at-sending, multiple write multiple read, and single write single read schemes. It also covers requirements for ATM multicast and compares these schemes in terms of advantages and disadvantages related to memory usage and switching performance.
MM-PNEMO: a mathematical model to assess handoff delay and packet lossjournalBEEI
Wireless networks incorporate Mobile Nodes (MNs) that use wireless access networks to communicate. However, the communication among these MNs are not remained stable due to the poor network coverage during inter mobility. Moreover, the wireless nodes are typically small that results in resource-constrained. Thus, it is uphill to use algorithms having giant processing power or memory footprint. Accordingly, it is essential to check schemes consistently to evaluate the performance within the probable application scenario. To do so, numerical analysis could be a notable method to grasp the performance of mobility management schemes as well as the constraint of evolving mobility management solutions specifically for multi-interfaced MR in Proxy NEMO environment. This paper analyzes handoff performance by using a mathematical model of Multihoming-based scheme to support Mobility management in Proxy NEMO (MM-PNEMO) environment. Moreover, a comparative study has been made among the standard Network Mobility Basic Support Protocol (NEMO BSP), Proxy NEMO (PNEMO) and MM-PNEMO scheme respectively. The performance metrics estimated for these schemes are mainly handoff delay and packet loss. This paper also analysed the packet loss ratio and handoff gain as a function of cell radius, number of SMR and velocity respectively. It is apparent that, the MM-PNEMO scheme shows lower packet loss ratio (1%) compared to NEMO-BSP (11%) and P-NEMO (6%).
PERFORMANCE COMPARISON DCM VERSUS QPSK FOR HIGH DATA RATES IN THE MBOFDM UWB ...csandit
This document compares the performance of dual carrier modulation (DCM) versus quadrature phase shift keying (QPSK) for high data rates in a multiband orthogonal frequency division multiplexing (MB-OFDM) ultra wideband (UWB) system. Simulation results show that using DCM provides better performance than QPSK, with a gain of around 0.7 dB for a bit error rate of 10-3 at 320 Mbps data rates. DCM offers additional diversity and coding gains over QPSK, making it more efficient for high data transmission rates in MBOFDM UWB systems.
This document proposes an improved position-based power aware routing algorithm for mobile ad-hoc networks. It introduces using a weighted metric of remaining battery power, speed, and distance of nodes to determine routes. The existing MFR (Most Forward within Radius) algorithm does not consider factors like battery power and speed differences, which can lead to unreliable communication or packet loss. The proposed algorithm uses a weighted combination of distance, velocity, and battery power metrics to select routes, aiming to balance load, increase network lifetime, and improve network performance compared to MFR. Simulation results showed the proposed algorithm reduces packet loss and increases throughput compared to MFR.
Performance analysis and evaluation of IEEE 802.11 distributed coordination f...journalBEEI
This paper discusses the distributed coordination function (DCF) access mechanism which is a carrier sense multiple access with collision avoidance (CSMA/CA) scheme. Simulation projects for different DCF performance parameters have been built using the OPNET network simulator. The projects are mainly basic service set (BSS) topology simulated under different parameter values (data rate, fragmentation, RTS/CTS, number of nodes, and load condition). Simulation results show when the DCF access mechanism is better under what load condition, and how to choose the best fragmentation threshold and other access-mechanism specific parameters according to the network conditions. Simulation results were validated against a theoretically calculated maximum throughput (the simulation maximum throughput was about 70% of the theoretically calculated maximum throughput).
PERFORMANCE EVALUATION OF AOMDV PROTOCOL BASED ON VARIOUS SCENARIO AND TRAFFI...IJCSEA Journal
A MANET is an interconnection of mobile devices by wireless links, which forms a dynamic topology. Routing protocols play a vital role in transmission of data across the network. The two major classifications of routing protocols are unipath and multipath. In this paper, we have evaluated the performance of a widely used on-demand multipath routing protocol called AOMDV. This protocol has been selected due to its edge over other protocols in various aspects, such as reducing delay, routing load etc. The evaluation of AOMDV protocol is carried out in terms of four scenario patterns such as RWM, RPGM, MGM, and GMM in two different traffic patterns such as CBR and TCP using NS2 and Bonn Motion.
This document provides an overview of the LTE physical layer frame structure and signals for both Frequency Division Duplexing (FDD) and Time Division Duplexing (TDD). It describes the basic time and frequency units used in LTE, the uplink and downlink frame structures, reference signals, and the modulation schemes used for different physical channels. Key aspects covered include resource blocks, OFDM signal generation, uplink SC-FDMA modulation, and the use of multiple antennas and spatial multiplexing in the downlink.
Routing Optimization in IP/MPLS Networks under Per-Class Over-Provisioning Co...EM Legacy
This document describes research on routing optimization in IP/MPLS networks under per-class over-provisioning constraints. It introduces a heuristic approach that iteratively optimizes IGP link metrics to indirectly solve the multi-objective problem of finding routing configurations that efficiently use network resources while satisfying per-class capacity constraints and minimizing the number of explicit label switched paths (LSPs) required. The heuristic calls a traffic engineering procedure based on simulated annealing to optimize routing for aggregate demands and individual traffic classes.
- The document proposes a cluster-based MAC protocol called D-CBM for VANET safety applications to reliably deliver messages within tight time limits.
- D-CBM organizes vehicles into clusters led by cluster heads that allocate transmission slots for members. It uses two transmission protocols - TDMA for consistent low-latency delivery and CSMA/CA for flexible contention-based access.
- Simulations show D-CBM achieves high stability of clusters and packet delivery rates that meet latency requirements of 100ms for safety messages, outperforming another protocol. While effective with RSU support, it may struggle without roadside infrastructure.
3GPP has introduced LTE Femtocells to manipulate the traffic for indoor users and to minimize
the charge on the Macro cells. A key mechanism in the LTE traffic handling is the packet
scheduler which is in charge of allocating resources to active flows in both the frequency and
time dimension. So several scheduling algorithms need to be analyzed for femtocells networks.
In this paper we introduce a performance analysis of three distinct scheduling algorithms of
mixed type of traffic flows in LTE femtocells networks. The particularly study is evaluated in
terms of throughput, packet loss ratio, fairness index and spectral efficiency.
Improved EPRCA Congestion Control Scheme for ATM NetworksEswar Publications
Traffic management and congestion control are major issues in Asynchronous Transfer Mode(ATM) networks. Congestion arises when traffic in the network is more than offered load. The primary function of congestion control is to ensure good throughput and low delay performance while maintaining a fair allocation of network resources to users. In this paper, Enhanced Proportional Rate based Congestion Avoidance (EPRCA) scheme proposed by ATM forum has been considered. But this scheme has limitation of higher cell drop problem for the bursty traffic. Improvements to EPRCA scheme have been proposed to reduce cell drop problem and results of
improved EPRCA schemes were analyzed with basic EPRCA scheme.
A downlink scheduler supporting real time services in LTE cellular networksUniversity of Piraeus
The wide spread of real-time services in wireless networks demands scheduling mechanisms supporting strict Quality of Service (QoS) requirements. Nevertheless, the specifications of the LTE standard for mobile connectivity defined by the 3rd Generation Partnership Project (3GPP) does not impose any specific scheduler for the proper allocation of resources to services. Therefore, several LTE schedulers have been proposed in the literature meeting the QoS requirements of modern services. In this paper a QoS aware scheduler for the LTE downlink is proposed namely the FLS-Advanced (FLSA) aiming at prioritizing real-time traffic. The proposed scheduler has been built on three distinct levels assigning the available radio resources to services according to their requirements. Based on simulation results, the FLSA outperforms in terms of packet loss ratio, attainable throughput and fairness the performance of existing schedulers including PF, MLWDF, EXP/PF, FLS, EXP RULE and LOG RULE.
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...ijujournal
Routing protocols have
an important
role in any
Mobile Ad Hoc Network
(MANET).
Researchers
have
elaborated several routing protocols that possess different performance levels
. In this
p
aper
we
give a
performance evaluation of
AODV,
DSR,
DSDV
, OLSR and DYMO
routing protocol
s
in
Mobile Ad Hoc
Networks
(MANETS)
to
determine
the best
in different scenarios
. We
analyse
these
MANET
routing
protocols by
using
NS
-
2 simulator
. We specify how
the
Number of No
d
es
parameter influences
their
performance. In this study
,
performance is
calculated
in terms
of Packet Delivery Ratio,
Average
End to
End Delay, Normalised Routing Load and Average Throughput
Performance comparison of routing protocols in mobile ad hoc networksijujournal
Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have elaborated several routing protocols that possess different performance levels. In this paper we give a performance evaluation of AODV, DSR, DSDV, OLSR and DYMO routing protocols in Mobile Ad Hoc
Networks (MANETS) to determine the best in different scenarios. We analyse these MANET routing protocols by using NS-2 simulator. We specify how the Number of Nodes parameter influences their performance. In this study, performance is calculated in terms of Packet Delivery Ratio, Average End to End Delay, Normalised Routing Load and Average Throughput.
logical effort based dual mode logic gates by mallikaMallika Naidu
Logic optimization and timing estimations are basic tasks for digital circuit designers. Dual Mode Logic (DML) allows operation in two modes such as static and dynamic modes. DML gates can be switched between these two modes on feature very low power dissipation in the static mode and high speed of operation in dynamic mode which is achieved at the expense of increased power dissipation. We introduce the logical effort (LE) methodology for the CMOS-based family. The proposed methodology allows path length, delay and power optimization for number of stages with load. Logical effort is the transistor sizing optimization methodology reduces the delay and power with number of stages with any static logic gate. The proposed optimization is shown for dual mode logic gates with logical effort using Digital Schematic Tool (DSCH).
Improved data efficiency of programmable arbiter based on chip permutation ne...EditorIJAERD
The document describes a proposed improved on-chip permutation network (OCP network) for multiprocessor system-on-chips (MPSoCs) that supports guaranteed traffic permutation. The network employs a pipelined circuit-switching approach combined with a dynamic path-setup scheme under a three-stage Clos network topology. A programmable arbiter priority logic is used to improve data transfer efficiency by providing three priority logics - fixed, round robin, and dynamic - that can be selected according to priority requirements. The design is implemented on an FPGA and simulation results and synthesis reports indicate the proposed OCP network improves power, delay, and data efficiency compared to existing systems.
Comparative and Behavioral Study on VANET Routing ProtocolsIOSR Journals
This document provides a summary and comparison of various routing protocols for vehicular ad hoc networks (VANETs). It discusses topology-based protocols like CGSR and DSDV, reactive protocols like DSR, and position-based protocols like GSR, A-STAR, GPCR, VADD, CAR, DIR, and B-MFR. The position-based protocols are considered the best for handling issues in VANETs like packet delay, traffic congestion, and throughput. The paper analyzes the characteristics and behaviors of different VANET routing protocols and concludes that position-based protocols are most suitable for the dynamic environment of vehicular networks.
Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
The 3GPP evolution for the 3G mobile system created the new base station system, called Evolved UMTS Terrestrial Radio Access Network (E-UTRAN) and a new core network, called Evolved Packet Core (EPC) as a result of two standardisation projects: Long Term Evolution (LTE) and System Architecture Evolution (SAE). Under these specifications a mobile phone gets access to higher bandwidth with low latency in an improved and more efficient network architecture. The standards define an all-IP network as a base for the E-UTRAN/EPC. The E-UTRAN/EPC does not have a separate PS data traffic and CS voice network, both communicate over the same new Evolved Packet System (EPS) network. LTE/EPS Technology course is an intermediate technical course, which covers all aspects of architecture and functionality of the EPS.
1) The document describes the downlink physical channels of LTE including the DL-SCH, PBCH, PDSCH, PDCCH, PCFICH, and PHICH.
2) It discusses design constraints for LTE including keeping the cyclic prefix smaller than the symbol length and larger than the delay spread to avoid overhead and interference. The subcarrier spacing must also be large enough to overcome Doppler shifts from UE motion.
3) The placement of reference signals is described, needing to be spaced at least every 0.5ms in time to track fast channels and every 6 subcarriers (45kHz) in frequency to resolve variations.
ABSTRACT : Performance enhancement of smart antennas versus their complexity for commercial wireless
applications. The goal of the study presented in this paper is to investigate the performance improvement
attainable using relatively simple smart antenna techniques when applied to the third-generation W-CDMA air
interface. Methods to achieve this goal include fixed multi beam architectures with different beam selection
algorithms (maximum power criterion, combined beams) or adaptive solutions driven by relatively simple direction
finding algorithms. After comparing these methods against each other for several representative scenarios, some
issues related to the sensitivity of these methods are also studied, (e.g., robustness to environment, mismatches
originating from implementation limitations, etc.). Results indicate that overall, conventional beam forming
seems to be the best choice in terms of balancing the performance and complexity requirements, in particular
when the problem with interfering high-bit-rate W-CDMA 3g users is considered.
Adaptive OFDM_Orthogonal Frequency Dvision Multiplexing_1Harish Rajula
This document discusses the benefits of adaptive modulation in OFDM systems. It explains that in fixed modulation schemes, each subcarrier is individually attenuated under frequency-selective fading channels, resulting in poor performance. Adaptive modulation schemes address this by allowing the modulation rate to change based on instantaneous signal-to-noise ratio. The document presents simulation results showing adaptive modulation outperforms fixed modulation schemes, with average bit error rates approximately 0.203568 for adaptive modulation versus 0.913545 for higher order fixed modulation. It concludes that adaptive modulation improves the bit error rate performance of OFDM systems operating over frequency-selective fading channels.
New scheme for PAPR reduction in FBMC-OQAM systems based on combining TR and ...IJECEIAES
This paper proposes a new hybrid technique called TR&DC that combines tone reservation (TR) and deep clipping (DC) to reduce the peak-to-average power ratio (PAPR) in filter bank multi-carrier with offset quadrature amplitude modulation (FBMC-OQAM) systems. The TR&DC scheme first applies the TR method to the FBMC-OQAM signal, then performs deep clipping on the resulting signal to further reduce any remaining high peaks. Simulation results show the TR&DC approach provides better PAPR reduction than TR alone, reducing the PAPR from 10.1 dB for the original signal to 7.2 dB, a gain of around 2.9 dB. The performance is not
Optimizing Data Plane Resources for Multipath FlowsIRJET Journal
This document discusses optimizing data plane resources for multipath flows. It introduces the concepts of routing with minimum overhead (RMO) and decomposition with minimum overhead (DMO) to minimize forwarding costs when splitting traffic flows across multiple paths.
The key ideas are:
1) Dividing a traffic flow across multiple paths improves bandwidth utilization but incurs higher forwarding costs due to additional network resources used.
2) RMO and DMO problems are defined to minimize these forwarding costs by reducing the number of paths or nodes used. Efficient algorithms are presented to solve the problems.
3) Simulation results show that algorithms which prefer smaller paths generally perform better at reducing the number of nodes traveled, though they may increase
The document provides suggestions to improve DCR (drop call rate) after a swap project. It discusses checking for hardware problems like alarms, VSWR, and resetting sites. It also recommends adjusting cell configuration parameters like power levels, send/receive modes, and neighbor relationships. Finally, it suggests configuring data parameters like coverage, interference, and handover settings by collecting measurements and adjusting values for thresholds, timeouts, and filters. Adjusting these hardware, configuration, and data parameters based on analysis of measurements can help reduce drop calls after a swap.
Ecological consequences of The Acid rainIOSR Journals
Acid rain affects each and every components of ecosystem. Acid rain also damages man-made materials and structures Acid rain is one of the most serious environmental problems emerged due to air pollution Sulphur dioxide (SO2) and oxides of nitrogen and ozone to some extent are the primary causes of acid rain. These pollutants originate from human activities such as combustion of burnable waste, fossil fuels in thermal power plants and automobiles. These constituents interact with reactants present in the atmosphere and result into acid deposition Due to the interaction of these acids with other constituents of the atmosphere, protons are released causing increase in the soil acidity, lowering of soil pH mobilizes and leaches away nutrient cations and increases availability of toxic heavy metals. Such changes in the soil chemical characteristics reduce the soil fertility, which ultimately causes the negative impact on growth and productivity of forest trees and crop plants. Acid rain has also been reported in India. A rainfall of pH 3.5 was reported in Mumbai. The air pollution levels are steadily rising in the metropolitan cities like Kolkata, Delhi, Mumbai. Acid rain problem in Bihar, West Bengal, Orissa and southern coastal India has been predicted to lead to infertile soil. Acid rain makes the water bodies acidic. The amphibians are also affected by acidification of water bodies .At low pH, many species of amphibians including frogs, toads and salamander are particularly sensitive. Indirect effect of acid rain on human health involves toxic heavy metals because these are liberated from soil when soil gets acidified. The most common heavy metals are Al, Cd, Zn, Pb, Hg, Mn and Fe. These mobilized contaminants are dissolved in soil and water make their way to groundwater that is drunk by humans and contaminate the food (Fish, meat, and vegetables) eaten by humans .These heavy metals get accumulated in the body and resulted into various health problems like dry coughs, asthma, headache, eye, nose and throat irritations. Acid rain problem has been tackled to some extent in the developed world by reducing the emission of the gases causing acid rain.
This document discusses health education intervention strategies for preventing and managing diabetes. It describes the different types of diabetes, including type 1, type 2, gestational diabetes, metabolic syndrome, and pre-diabetes. The causes of diabetes are discussed, including genetics and lifestyle factors like obesity and lack of exercise. Health education strategies are recommended to increase awareness of diabetes symptoms and management through programs run by health agencies.
This document investigates the influence of construction parameters such as bitumen content, air void content, and compaction on the properties and performance of dense graded bituminous mixes. Samples were prepared and tested according to the Marshall mix design method at varying bitumen contents and compaction levels. Tests conducted included Marshall stability testing, indirect tensile strength testing, and wheel tracking tests. Relationships between bitumen content, air voids, indirect tensile strength, and pavement fatigue and rutting performance were examined using mechanistic-empirical pavement design modeling. The results indicate that construction parameters significantly influence mix properties and predicted pavement performance.
This document provides an overview of the LTE physical layer frame structure and signals for both Frequency Division Duplexing (FDD) and Time Division Duplexing (TDD). It describes the basic time and frequency units used in LTE, the uplink and downlink frame structures, reference signals, and the modulation schemes used for different physical channels. Key aspects covered include resource blocks, OFDM signal generation, uplink SC-FDMA modulation, and the use of multiple antennas and spatial multiplexing in the downlink.
Routing Optimization in IP/MPLS Networks under Per-Class Over-Provisioning Co...EM Legacy
This document describes research on routing optimization in IP/MPLS networks under per-class over-provisioning constraints. It introduces a heuristic approach that iteratively optimizes IGP link metrics to indirectly solve the multi-objective problem of finding routing configurations that efficiently use network resources while satisfying per-class capacity constraints and minimizing the number of explicit label switched paths (LSPs) required. The heuristic calls a traffic engineering procedure based on simulated annealing to optimize routing for aggregate demands and individual traffic classes.
- The document proposes a cluster-based MAC protocol called D-CBM for VANET safety applications to reliably deliver messages within tight time limits.
- D-CBM organizes vehicles into clusters led by cluster heads that allocate transmission slots for members. It uses two transmission protocols - TDMA for consistent low-latency delivery and CSMA/CA for flexible contention-based access.
- Simulations show D-CBM achieves high stability of clusters and packet delivery rates that meet latency requirements of 100ms for safety messages, outperforming another protocol. While effective with RSU support, it may struggle without roadside infrastructure.
3GPP has introduced LTE Femtocells to manipulate the traffic for indoor users and to minimize
the charge on the Macro cells. A key mechanism in the LTE traffic handling is the packet
scheduler which is in charge of allocating resources to active flows in both the frequency and
time dimension. So several scheduling algorithms need to be analyzed for femtocells networks.
In this paper we introduce a performance analysis of three distinct scheduling algorithms of
mixed type of traffic flows in LTE femtocells networks. The particularly study is evaluated in
terms of throughput, packet loss ratio, fairness index and spectral efficiency.
Improved EPRCA Congestion Control Scheme for ATM NetworksEswar Publications
Traffic management and congestion control are major issues in Asynchronous Transfer Mode(ATM) networks. Congestion arises when traffic in the network is more than offered load. The primary function of congestion control is to ensure good throughput and low delay performance while maintaining a fair allocation of network resources to users. In this paper, Enhanced Proportional Rate based Congestion Avoidance (EPRCA) scheme proposed by ATM forum has been considered. But this scheme has limitation of higher cell drop problem for the bursty traffic. Improvements to EPRCA scheme have been proposed to reduce cell drop problem and results of
improved EPRCA schemes were analyzed with basic EPRCA scheme.
A downlink scheduler supporting real time services in LTE cellular networksUniversity of Piraeus
The wide spread of real-time services in wireless networks demands scheduling mechanisms supporting strict Quality of Service (QoS) requirements. Nevertheless, the specifications of the LTE standard for mobile connectivity defined by the 3rd Generation Partnership Project (3GPP) does not impose any specific scheduler for the proper allocation of resources to services. Therefore, several LTE schedulers have been proposed in the literature meeting the QoS requirements of modern services. In this paper a QoS aware scheduler for the LTE downlink is proposed namely the FLS-Advanced (FLSA) aiming at prioritizing real-time traffic. The proposed scheduler has been built on three distinct levels assigning the available radio resources to services according to their requirements. Based on simulation results, the FLSA outperforms in terms of packet loss ratio, attainable throughput and fairness the performance of existing schedulers including PF, MLWDF, EXP/PF, FLS, EXP RULE and LOG RULE.
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...ijujournal
Routing protocols have
an important
role in any
Mobile Ad Hoc Network
(MANET).
Researchers
have
elaborated several routing protocols that possess different performance levels
. In this
p
aper
we
give a
performance evaluation of
AODV,
DSR,
DSDV
, OLSR and DYMO
routing protocol
s
in
Mobile Ad Hoc
Networks
(MANETS)
to
determine
the best
in different scenarios
. We
analyse
these
MANET
routing
protocols by
using
NS
-
2 simulator
. We specify how
the
Number of No
d
es
parameter influences
their
performance. In this study
,
performance is
calculated
in terms
of Packet Delivery Ratio,
Average
End to
End Delay, Normalised Routing Load and Average Throughput
Performance comparison of routing protocols in mobile ad hoc networksijujournal
Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have elaborated several routing protocols that possess different performance levels. In this paper we give a performance evaluation of AODV, DSR, DSDV, OLSR and DYMO routing protocols in Mobile Ad Hoc
Networks (MANETS) to determine the best in different scenarios. We analyse these MANET routing protocols by using NS-2 simulator. We specify how the Number of Nodes parameter influences their performance. In this study, performance is calculated in terms of Packet Delivery Ratio, Average End to End Delay, Normalised Routing Load and Average Throughput.
logical effort based dual mode logic gates by mallikaMallika Naidu
Logic optimization and timing estimations are basic tasks for digital circuit designers. Dual Mode Logic (DML) allows operation in two modes such as static and dynamic modes. DML gates can be switched between these two modes on feature very low power dissipation in the static mode and high speed of operation in dynamic mode which is achieved at the expense of increased power dissipation. We introduce the logical effort (LE) methodology for the CMOS-based family. The proposed methodology allows path length, delay and power optimization for number of stages with load. Logical effort is the transistor sizing optimization methodology reduces the delay and power with number of stages with any static logic gate. The proposed optimization is shown for dual mode logic gates with logical effort using Digital Schematic Tool (DSCH).
Improved data efficiency of programmable arbiter based on chip permutation ne...EditorIJAERD
The document describes a proposed improved on-chip permutation network (OCP network) for multiprocessor system-on-chips (MPSoCs) that supports guaranteed traffic permutation. The network employs a pipelined circuit-switching approach combined with a dynamic path-setup scheme under a three-stage Clos network topology. A programmable arbiter priority logic is used to improve data transfer efficiency by providing three priority logics - fixed, round robin, and dynamic - that can be selected according to priority requirements. The design is implemented on an FPGA and simulation results and synthesis reports indicate the proposed OCP network improves power, delay, and data efficiency compared to existing systems.
Comparative and Behavioral Study on VANET Routing ProtocolsIOSR Journals
This document provides a summary and comparison of various routing protocols for vehicular ad hoc networks (VANETs). It discusses topology-based protocols like CGSR and DSDV, reactive protocols like DSR, and position-based protocols like GSR, A-STAR, GPCR, VADD, CAR, DIR, and B-MFR. The position-based protocols are considered the best for handling issues in VANETs like packet delay, traffic congestion, and throughput. The paper analyzes the characteristics and behaviors of different VANET routing protocols and concludes that position-based protocols are most suitable for the dynamic environment of vehicular networks.
Daly Analysis for WiMax under balanced and unbalanced traffic conditions in f...inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
The 3GPP evolution for the 3G mobile system created the new base station system, called Evolved UMTS Terrestrial Radio Access Network (E-UTRAN) and a new core network, called Evolved Packet Core (EPC) as a result of two standardisation projects: Long Term Evolution (LTE) and System Architecture Evolution (SAE). Under these specifications a mobile phone gets access to higher bandwidth with low latency in an improved and more efficient network architecture. The standards define an all-IP network as a base for the E-UTRAN/EPC. The E-UTRAN/EPC does not have a separate PS data traffic and CS voice network, both communicate over the same new Evolved Packet System (EPS) network. LTE/EPS Technology course is an intermediate technical course, which covers all aspects of architecture and functionality of the EPS.
1) The document describes the downlink physical channels of LTE including the DL-SCH, PBCH, PDSCH, PDCCH, PCFICH, and PHICH.
2) It discusses design constraints for LTE including keeping the cyclic prefix smaller than the symbol length and larger than the delay spread to avoid overhead and interference. The subcarrier spacing must also be large enough to overcome Doppler shifts from UE motion.
3) The placement of reference signals is described, needing to be spaced at least every 0.5ms in time to track fast channels and every 6 subcarriers (45kHz) in frequency to resolve variations.
ABSTRACT : Performance enhancement of smart antennas versus their complexity for commercial wireless
applications. The goal of the study presented in this paper is to investigate the performance improvement
attainable using relatively simple smart antenna techniques when applied to the third-generation W-CDMA air
interface. Methods to achieve this goal include fixed multi beam architectures with different beam selection
algorithms (maximum power criterion, combined beams) or adaptive solutions driven by relatively simple direction
finding algorithms. After comparing these methods against each other for several representative scenarios, some
issues related to the sensitivity of these methods are also studied, (e.g., robustness to environment, mismatches
originating from implementation limitations, etc.). Results indicate that overall, conventional beam forming
seems to be the best choice in terms of balancing the performance and complexity requirements, in particular
when the problem with interfering high-bit-rate W-CDMA 3g users is considered.
Adaptive OFDM_Orthogonal Frequency Dvision Multiplexing_1Harish Rajula
This document discusses the benefits of adaptive modulation in OFDM systems. It explains that in fixed modulation schemes, each subcarrier is individually attenuated under frequency-selective fading channels, resulting in poor performance. Adaptive modulation schemes address this by allowing the modulation rate to change based on instantaneous signal-to-noise ratio. The document presents simulation results showing adaptive modulation outperforms fixed modulation schemes, with average bit error rates approximately 0.203568 for adaptive modulation versus 0.913545 for higher order fixed modulation. It concludes that adaptive modulation improves the bit error rate performance of OFDM systems operating over frequency-selective fading channels.
New scheme for PAPR reduction in FBMC-OQAM systems based on combining TR and ...IJECEIAES
This paper proposes a new hybrid technique called TR&DC that combines tone reservation (TR) and deep clipping (DC) to reduce the peak-to-average power ratio (PAPR) in filter bank multi-carrier with offset quadrature amplitude modulation (FBMC-OQAM) systems. The TR&DC scheme first applies the TR method to the FBMC-OQAM signal, then performs deep clipping on the resulting signal to further reduce any remaining high peaks. Simulation results show the TR&DC approach provides better PAPR reduction than TR alone, reducing the PAPR from 10.1 dB for the original signal to 7.2 dB, a gain of around 2.9 dB. The performance is not
Optimizing Data Plane Resources for Multipath FlowsIRJET Journal
This document discusses optimizing data plane resources for multipath flows. It introduces the concepts of routing with minimum overhead (RMO) and decomposition with minimum overhead (DMO) to minimize forwarding costs when splitting traffic flows across multiple paths.
The key ideas are:
1) Dividing a traffic flow across multiple paths improves bandwidth utilization but incurs higher forwarding costs due to additional network resources used.
2) RMO and DMO problems are defined to minimize these forwarding costs by reducing the number of paths or nodes used. Efficient algorithms are presented to solve the problems.
3) Simulation results show that algorithms which prefer smaller paths generally perform better at reducing the number of nodes traveled, though they may increase
The document provides suggestions to improve DCR (drop call rate) after a swap project. It discusses checking for hardware problems like alarms, VSWR, and resetting sites. It also recommends adjusting cell configuration parameters like power levels, send/receive modes, and neighbor relationships. Finally, it suggests configuring data parameters like coverage, interference, and handover settings by collecting measurements and adjusting values for thresholds, timeouts, and filters. Adjusting these hardware, configuration, and data parameters based on analysis of measurements can help reduce drop calls after a swap.
Ecological consequences of The Acid rainIOSR Journals
Acid rain affects each and every components of ecosystem. Acid rain also damages man-made materials and structures Acid rain is one of the most serious environmental problems emerged due to air pollution Sulphur dioxide (SO2) and oxides of nitrogen and ozone to some extent are the primary causes of acid rain. These pollutants originate from human activities such as combustion of burnable waste, fossil fuels in thermal power plants and automobiles. These constituents interact with reactants present in the atmosphere and result into acid deposition Due to the interaction of these acids with other constituents of the atmosphere, protons are released causing increase in the soil acidity, lowering of soil pH mobilizes and leaches away nutrient cations and increases availability of toxic heavy metals. Such changes in the soil chemical characteristics reduce the soil fertility, which ultimately causes the negative impact on growth and productivity of forest trees and crop plants. Acid rain has also been reported in India. A rainfall of pH 3.5 was reported in Mumbai. The air pollution levels are steadily rising in the metropolitan cities like Kolkata, Delhi, Mumbai. Acid rain problem in Bihar, West Bengal, Orissa and southern coastal India has been predicted to lead to infertile soil. Acid rain makes the water bodies acidic. The amphibians are also affected by acidification of water bodies .At low pH, many species of amphibians including frogs, toads and salamander are particularly sensitive. Indirect effect of acid rain on human health involves toxic heavy metals because these are liberated from soil when soil gets acidified. The most common heavy metals are Al, Cd, Zn, Pb, Hg, Mn and Fe. These mobilized contaminants are dissolved in soil and water make their way to groundwater that is drunk by humans and contaminate the food (Fish, meat, and vegetables) eaten by humans .These heavy metals get accumulated in the body and resulted into various health problems like dry coughs, asthma, headache, eye, nose and throat irritations. Acid rain problem has been tackled to some extent in the developed world by reducing the emission of the gases causing acid rain.
This document discusses health education intervention strategies for preventing and managing diabetes. It describes the different types of diabetes, including type 1, type 2, gestational diabetes, metabolic syndrome, and pre-diabetes. The causes of diabetes are discussed, including genetics and lifestyle factors like obesity and lack of exercise. Health education strategies are recommended to increase awareness of diabetes symptoms and management through programs run by health agencies.
This document investigates the influence of construction parameters such as bitumen content, air void content, and compaction on the properties and performance of dense graded bituminous mixes. Samples were prepared and tested according to the Marshall mix design method at varying bitumen contents and compaction levels. Tests conducted included Marshall stability testing, indirect tensile strength testing, and wheel tracking tests. Relationships between bitumen content, air voids, indirect tensile strength, and pavement fatigue and rutting performance were examined using mechanistic-empirical pavement design modeling. The results indicate that construction parameters significantly influence mix properties and predicted pavement performance.
This document discusses techniques for improving multiuser detection in DS-CDMA systems using successive interference cancellation. It begins with an introduction to the multiple access interference problem in CDMA systems and how multiuser detection can help address this issue. It then provides the system model for a CDMA uplink and describes the matched filter receiver structure. Next, it discusses multiuser detection algorithms and focuses on successive interference cancellation as a suboptimal but lower complexity method. The document describes the successive interference cancellation algorithm and introduces the groupwise successive interference cancellation technique, which provides cancellation in groups to handle multirate users. It provides a block diagram of the groupwise successive interference cancellation receiver and discusses how it works to sequentially detect and cancel the strongest user signals
This document describes the design and implementation of a serial communication protocol conversion system and circular buffer in an FPGA for monitoring a Tesla meter. The system includes controllers for RS232 and RS485 serial communication, a protocol conversion unit between the two interfaces, and a circular buffer. The controllers are designed using Verilog HDL and implemented on a Spartan FPGA. Simulation and hardware results demonstrate that the system successfully converts between the RS232 and RS485 protocols in real-time and stores data in the circular buffer for offline analysis.
How effective are the interventions related to physical activities and nutrit...IOSR Journals
This document reviews 20 intervention studies that focused on physical activity and nutrition through school-based health promotion programs. The interventions ranged from 4 weeks to 3 years, targeted various grade levels, and involved teachers, parents, and other personnel. Most used randomized controlled trial designs. The interventions had diverse components related to physical activity, nutrition education, and changing behaviors. Results were mixed, with some interventions successfully increasing physical activity, nutrition knowledge, and healthy behaviors while others found no significant effects. Limitations included inadequate facilities, lack of long-term follow up, and recommendations focused on more intensive, multi-component interventions.
Industry- Academia Collaboration through Cloud Computing: A Pathway for Susta...IOSR Journals
This document discusses industry-academia collaboration through cloud computing as a way to promote sustainable development in developing countries. It proposes a subscription-based cloud service platform that would allow universities and industries to access networked storage, computing resources, and conduct business transactions through those shared resources in a cost-effective way compared to traditional enterprise computing. The benefits mentioned include lower costs since institutions only pay for resources used, improved research capabilities through access to latest IT, and knowledge sharing between academia and industry. Previous models of collaboration are discussed, along with the need for collaboration to solve community problems and boost economies in developing nations.
Analysis of Pattern Transformation Algorithms for Sensitive Knowledge Protect...IOSR Journals
The document analyzes pattern transformation algorithms for sensitive knowledge protection in data mining. It discusses:
1) Three main privacy preserving techniques - heuristic, cryptography, and reconstruction-based. The proposed algorithms use heuristic-based techniques.
2) Four proposed heuristic-based algorithms - item-based Maxcover (IMA), pattern-based Maxcover (PMA), transaction-based Maxcover (TMA), and Sensitivity Cost Sanitization (SCS) - that modify sensitive transactions to decrease support of restrictive patterns.
3) Performance improvements including parallel and incremental approaches to handle large, dynamic databases while balancing privacy and utility.
Study of Various Histogram Equalization TechniquesIOSR Journals
Abstract: Histogram equalization (HE) works well on single channel images for contrast enhancement. However, the technique used is ineffective on multiple channel images. So, it is not suitable for consumer electronic products, where preserving the original brightness is necessary in order not to introduce unnecessary visual deterioration. Bi-histogram equalization (BHE) has been developed and it is analyzed mathematically.BHE separates the input image’s histogram into two, based on its mean before equalizing them independently so that it can preserve the original brightness up to certain extends. Recursive Mean-Separate Histogram Equalization (RMSHE) is another technique to provide better and scalable brightness preservation for gray scale and color images. While the separation is done only once in BHE, RMSHE performs the separation recursively based on their respective mean. It is analyzed mathematically that the output images mean brightness will converge to the input images mean brightness as the number of recursive mean separation increases. The recursive nature of RMSHE also allows scalable brightness preservation, which is very useful in consumer electronics. Finally a comparative study was made to analyze all the above methods using gray scale and color images. Keywords: Bi-histogram equalization, histogram equalization, scalable brightness preservation, recursive mean-separate
Prediction of electronic and magnetic properties of Full Heusler Alloy – Ir2CrAlIOSR Journals
This document summarizes a study that used density functional theory calculations to predict the structural, electronic, and magnetic properties of the full Heusler alloy Ir2CrAl. The calculations found that Ir2CrAl has:
1) A lattice constant of 5.9648 Å after structural optimization, with a bulk modulus of 270.9 GPa.
2) Half-metallic behavior with 100% spin polarization at the Fermi level, due to an indirect band gap of 0.3 eV in the minority spin channel.
3) Ferromagnetic ordering with a total magnetic moment of 3 μB per formula unit, in agreement with Slater-Pauling rules for Heusler alloys.
Monitoring Of Macronutrients Uptake by Soil and Potato Plants – A Comparative...IOSR Journals
Soil test1, 2 is necessary to identify optimal concentrations of essential elements required for plant growth. The fertility of soil is affected by the presence of some essential elements as Macronutrients like N, P& K. This study including the status of Macronutrients in the soil and potato plans. The percentage of nitrogen (N) in soil of potato plant was obtained 5.6% and 1.89% where as nitrogen percentage in plant ash was 17.45% and 16.4% respectively. But the phosphorus and potassium are present in adequate amount in soil. As it was found that the concentration of phosphorus (P) and potassium (K) in part per million in soil of potato was 62ppm and 148.3ppm and in potato plant ash the concentration was 64.23ppm and 103.3ppm respectively.
Study of Optical Property of Gel Grown Mercuric Iodate CrystalsIOSR Journals
Mercuric Iodate Crystals were grown by a simple gel technique using diffusion method. The optimum growth conditions were established for the growth of these crystals by changing various parameters such as pH of the gel solution, gel concentration, gel setting time, concentrations of reactants etc. The grown Mercuric Iodate crystals were spherical in shape. These crystals were opaque. The crystals were characterized using UV-VIS Specrophotometrry.
This document presents the solution to the transient unsteady state thermoelastic problem of a thin circular annular fin due to an internal heat source. The transient heat conduction equation is solved using Marchi-Zgrablich and Laplace transforms with radiation boundary conditions. The solution provides the temperature distribution as an infinite series of Bessel functions. Numerical calculations of temperature distribution and stresses are carried out using Mathematica software to determine the transient heating process.
Antibacterial Application of Novel Mixed-Ligand Dithiocarbamate Complexes of ...IOSR Journals
The document summarizes the synthesis and characterization of nine novel mixed-ligand dithiocarbamate complexes of nickel(II) and their antibacterial properties. The complexes were prepared by reacting nickel chloride with salicylaldehyde and aryl dithiocarbamates. They were characterized using various analytical techniques and had general formula [Ni(Sal)(Rdtc)]. The complexes exhibited broad-spectrum antibacterial activity against Escherichia coli, Staphylococcus aureus, Klebsiella oxytoca and Pseudomonas aureginosa based on agar diffusion tests, suggesting their potential as broad-spectrum antibacterial agents.
“Impact of Demographics and Personality traits on Confidence level: Determina...IOSR Journals
The purpose of this study is to explore the relationship among demographics, personality traits and level of confidence. The impact of this paper is twofold, one is to measure the determinants of overconfidence in employees and other is in students. This paper adopts the primary data approach, collected from employees and students through questionnaires .Two diverse populations have been selected and various statistical technique (Pearson correlation, Pearson regression, Chi-square, and Kolmogorov-Smirnov tests) are used for analysis purpose using SPSS software on a 100 sample size. Research findings shows that in employees when Openness to experience increase , overconfidence level decrease, however all remaining personality traits(conscientiousness, agreeableness, emotional stability and openness to experience) is correlated with overconfidence. In students there is no correlation between overconfidence and any of the personality traits. The regression analysis findings show that no linear relationship exists between independent and dependent variable in employees for individual personality traits except of emotional stability. Only emotional stability has a significant predictor of overconfidence among all five personality traits. However the overall personality is the significant predictor of overconfidence in employees. For students, neither individual personality traits nor overall personality has linear relationship with overconfidence.
This document presents six infinite families of positive integral solutions to the biquadratic equation 1)( 2
xyzwwzyx with four unknowns. Linear transformations are used to put the equation in the form of a general Pell's equation. Six triples (a,b,c) that satisfy the necessary conditions are identified and used to generate the families of solutions. Each family is expressed parametrically in terms of two integers n and n+1. In total, six different parametric families of solutions to the original biquadratic equation are presented.
Assessment of Amcon’s Role in Resuscitating the Banking Sector during the Glo...IOSR Journals
The document discusses the role of the Asset Management Corporation of Nigeria (AMCON) in resuscitating the Nigerian banking sector during the global financial crisis. It analyzes AMCON's interventions and their impact on key banking variables like non-performing loans, capital adequacy ratios, and eligible bank assets. The results showed that AMCON's interventions helped stabilize the banking sector and ensured its survival during the crisis by providing liquidity, acquiring bad assets, and restructuring loans. AMCON played a critical role in restoring confidence in the banking system and preventing widespread distress.
Nuclear Magnetic Resonance (NMR) Analysis of D - (+) - Glucose: A Guide to Sp...IOSR Journals
NMR spectroscopy has a wide range of applications including exchange phenomena, the
identification and structural studies of complex biomolecules. 1D 1H-NMR without water suppression, 1D
Carbon, 1D 13C-DEPT135, 2D Cosy, 2D HSQC, 2D TOCSY, 2D HMQC, and 2D HMBC techniques were used
to completely elucidate the structure of glucose with spectral induced at 400MHz.. The spectral were analysed
using spinworks 3. The results obtained from the spectral data were systematically combined to elucidate the
structure of the D-glucose. Full characterisation of D-glucose was achieved by assigning 1H and 13C signals,
starting from the known to unknown signals.
This document describes the synthesis of a new heterocyclic indigo dye called 2-(1, 3- dihydro- 3 - oxo- 2H - pyridylpyrr- 2- ylidene)-1, 2-dihydro- 3H- pyridylpyrrol- 3-one. It was synthesized in two steps: first, an aromatic glycine intermediate was synthesized from 2-aminopyridine, monochloroacetic acid, and sodium hydroxide. Second, this glycine intermediate was fused with sodamide, sodium hydroxide, and potassium hydroxide, then oxidized using acidified ferric chloride to yield the final dye compound. Spectral analysis
1. The document proposes using magnetic lifts to safely evacuate people from high-rise buildings during fires.
2. It suggests installing ferro-magnetic lifts on the top floors that can drop and be slowed under controlled magnetic fields, reducing evacuation time by 75% and saving a similar number of additional lives.
3. The system would use a solenoid made of current-carrying wire wound around the bottom of the lift shaft to generate a magnetic field strong enough to gently stop a falling lift, keeping deceleration below safe limits.
This paper proposes a Cycle-count Accurate Transaction level (CCA-TLM) full bus modeling technique called Composite Master-Slave-pair and Arbiter Transaction (CMSAT) model. The CMSAT model uses a two-phase arbiter model and master-slave models to efficiently and accurately simulate bus contention in complex Multi-Processor System-on-Chip designs. Experimental results show the CMSAT model performs 23 times faster than a Cycle-Accurate bus model while maintaining 100% accurate timing information.
Performance evaluation of bandwidth optimization algorithm (boa) in atm networkEditor Jacotech
domains: none of them are suitable, alone, for the wide range of traffic services expected in ATM-based networks. Therefore, some integration of these basic schemes should be considered. In this paper, we propose a new traffic control algorithm, called the Bandwidth optimization Algorithm (BOA). BOA is a multi-level control algorithm that attempts to optimally manage network resources and perform traffic control among a wide range of traffic services in ATM-based networks. The basic objective of BOA is to meet the quality of service requirements for different traffic sources, while making the best possible use of network bandwidth. In addition. BOA attempts to minimize network congestion in a preventive way.
Dynamic Traffic Management Services to Provide High Performance in IntelRate ...IJMER
Abstract: Traffic is the chief puzzle problem in which every country faces to elaborate sending a
number of packets throughout the world. This paper proposes a new speculation for distributed traffic
management by availing the presumption of fuzzy logic. The routers are established by using an
IntelRate Controllers to manage the traffic congestion in the networks dynamically. Fuzzy logic is used
to previse the maximum allowable sending rate by observing the queue size of router. The network
traffic control protocol is unique to estimate the network parameter which involves link latency,
bottleneck bandwidth or packet loss rate in order to compute the allowed source sending rate. The fuzzy
logic based controller can measure queue size directly, it neglects various potential performance issues
arising due to parameter estimation as reduce consumption of computation and memory resource in
router. A network parameter, the queue size can be viewed accurately and if action should be taken to
regulate the source sending rate and it increases the resilience of the network to traffic congestion.
Using the fuzzy logic technique, QoS (Quality of Service) can achieve better performance than the
existing protocol that depends on the estimation of network parameter, to make the network more
adaptive for current traffic conditions.
Dynamic Traffic Management Services to Provide High Performance in IntelRate ...IJMER
Traffic is the chief puzzle problem in which every country faces to elaborate sending a
number of packets throughout the world. This paper proposes a new speculation for distributed traffic
management by availing the presumption of fuzzy logic. The routers are established by using an
IntelRate Controllers to manage the traffic congestion in the networks dynamically. Fuzzy logic is used
to previse the maximum allowable sending rate by observing the queue size of router. The network
traffic control protocol is unique to estimate the network parameter which involves link latency,
bottleneck bandwidth or packet loss rate in order to compute the allowed source sending rate. The fuzzy
logic based controller can measure queue size directly, it neglects various potential performance issues
arising due to parameter estimation as reduce consumption of computation and memory resource in
router. A network parameter, the queue size can be viewed accurately and if action should be taken to
regulate the source sending rate and it increases the resilience of the network to traffic congestion.
Using the fuzzy logic technique, QoS (Quality of Service) can achieve better performance than the
existing protocol that depends on the estimation of network parameter, to make the network more
adaptive for current traffic conditions
An efficient vertical handoff mechanism for future mobile networkBasil John
This document proposes a novel fuzzy logic based vertical handoff decision algorithm for heterogeneous wireless networks. It introduces a speed-adaptive system discovery scheme to improve the update rate of candidate networks based on the mobile terminal's speed. It also includes a pre-handoff decision method to quickly filter candidate networks and reduce unnecessary handoffs. The key aspects of the proposed algorithm are: 1) It uses a speed-adaptive scheme to dynamically adjust the discovery of candidate networks. 2) It employs a pre-handoff decision method to filter networks and reduce ping-pong effects. 3) It applies fuzzy logic to evaluate multiple parameters like bandwidth, RSS, and cost to select the best network. Simulations show it outperforms traditional RSS-based
This summarizes a document discussing using SDNs to help with flow-based differentiation in datacenters. It presents two approaches:
1. A reactive approach where the first packet of each flow is sent to the SDN controller, allowing more fine-grained control over queue placement and bandwidth allocation. However, this incurs high flow setup costs.
2. A proactive approach where the controller prepopulates flow entries based on metrics. This avoids flow setup time but provides limited visibility and inaccurate estimates, potentially worsening performance for priority and weighted fair queueing schemes.
Both approaches have tradeoffs, and the document analyzes their relative benefits and disadvantages for different queueing strategies.
IRJET - Analysis of Different Arbitration Algorithms for Amba Ahb Bus Protoco...IRJET Journal
This document analyzes and compares different arbitration algorithms for the Advanced Microcontroller Bus Architecture (AMBA) Advanced High-Performance Bus (AHB) protocol used in System on Chip (SoC) designs. It describes the AMBA specification and AHB bus. It then examines three arbitration algorithms - static fixed priority, round robin, and modified round robin. Simulation results show the modified round robin algorithm provides the fastest response time to bus requests while using more logic than the other methods. Overall, the modified round robin algorithm is concluded to be the most efficient approach for handling multiple concurrent bus requests in terms of speed and performance.
Implementation of FSM-MBIST and Design of Hybrid MBIST for Memory cluster in ...Editor IJCATR
In current scenario, power efficient MPSoC’s are of great demand. The power efficient asynchronous MPSoC’s with
multiple memories are thought-off to replace clocked synchronous SoC, in which clock consumes more than 40% of the total power. It
is right time to develop the test compliant asynchronous MpSoC. In this paper, Traditional MBIST and FSM based MBIST schemes
are designed and applied to single port RAM. The results are discussed based on the synthesis reports obtained from RTL Complier
from Cadence. FSM based MBIST is power and area efficient method for single memory testing. It consumes 40% less power when
compared with traditional MBIST. But, in case of multiple memory scenarios, separate MBIST controllers are required to test each
individual memories. Thus this scheme consumes huge area and becomes inefficient. A novel technique for testing different memories
which are working at different frequencies is in need. Therefore, an area efficient Hybrid MBIST is proposed with single MBIST
controller to test multiple memories in an Asynchronous SoC. It also includes multiple test algorithms to detect various faults. An
Asynchronous SoC with DWT processor and multiple memories is discussed in this paper, which will used as Design under Test
[DUT] and Hybrid MBIST is built around it to test the heterogeneous memories. The design is coded in Verilog and Validated in
Spartan-3e FPGA kit.
Protocol based QoS Estimation of OFDM-WIMAX Networkidescitation
This document summarizes a research paper that evaluated the quality of service (QoS) of different routing protocols in an orthogonal frequency-division multiplexing (OFDM) based WiMAX network. The researchers simulated scenarios using four routing protocols: Open Shortest Path First (OSPF), Intermediate System to Intermediate System (IS-IS), Routing Information Protocol (RIP), and Interior Gateway Routing Protocol (IGRP). They analyzed QoS metrics like throughput, delay, packet jitter, and packet drops. The results showed that OSPF and IGRP had lower delays while IGRP had higher uplink packet drops. In general, the different routing protocols significantly impacted network performance metrics. The paper concluded more work
Low cost high-performance vlsi architecture for montgomery modular multiplica...jpstudcorner
The document proposes a low-cost and high-performance Montgomery modular multiplication algorithm and VLSI architecture. It uses a single-level carry-save adder to perform additions, reducing carry propagation and improving speed but requiring extra clock cycles. To address this, it introduces a configurable carry-save adder that can reduce the extra clock cycles by half. It also detects unnecessary additions to further improve throughput while maintaining short critical path delays. Experimental results show improved performance and area-time efficiency over previous designs.
Orchestrating bulk data transfers acrossnexgentech15
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Orchestrating Bulk Data Transfers across Geo-Distributed Datacentersnexgentechnology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERSNexgen Technology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
This document summarizes the approval of a seminar titled "Implementation of Advance High performance Bus using verilog" presented by Nirav Desai for the degree of Master of Technology. It lists the examiners and is signed by the supervisor, head of department, and includes the date and place.
The next sections include a declaration signed by Nirav Desai about original work and adherence to academic honesty. An acknowledgment section thanks the seminar guide and head of department for their support and guidance.
The abstract provides a high-level overview, stating that the purpose is to propose a scheme to implement an AMBA bus protocol specification using Verilog. It will cover bus basics, AMBA bus
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...IJCNCJournal
3GPP has defined the long term evolution (LTE) for 3G radio access in order to maintain the future
competitiveness for 3G technology, the system provides the capability of supporting a mixture of services
with different quality of service (QoS) requirements. This paper proposes a new cross-layer scheduling
algorithm to satisfy better QoS parameters for real time applications. The proposed algorithm takes care of
allocating resource blocks (RBs) with different modulation and coding schemes (MCS) according to target
bit error rate (BER), user equipment supportable MCS, queue stability constraints and available transmit
power constraints. The proposed algorithm has been valued, compared with an earlier allocation algorithm
in terms of service rate and packet delay and showed better performance regards the real time
applications.
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...CSCJournals
This paper discusses Traffic Engineering with Multi-Protocol Label Switching (MPLS) in an Internet Service Provider’s (ISP) network. In this paper, we first briefly describe MPLS, Constraint-based Routing, MPLS-TE, N jobs M machine Job sequencing technique and how to implement the job sequencing technique for Multi-Protocol Label Switching Traffic Engineering. And also improve the quality of service of the network, using this technique firstly reduce the congestion for traffic engineering; minimize the packet loss in complex MPLS domain. In small network packet loss is negligible. We used NS2 discrete event simulator for simulate the above work. Keywords: Traffic Engineering, Multi-Protocol Label Switching, Constraint based routing, N jobs M machine Job Sequencing Technique, Qos, MPLS-TE.
Multiple Downlink Fair Packet Scheduling Scheme in Wi-MaxEditor IJCATR
IEEE 802.16 is standardization for a broadband wireless access in network metropolitan area network (MAN). IEEE 802.16
standard (Wi-Max) defines the concrete quality of service (QoS) requirement, a scheduling scheme and efficient packet scheduling
scheme which is necessary to achieve the QoS requirement. In this paper, a novel waiting queue based on downlink bandwidth
allocation architecture from a number of rtps schedule has been proposed to improve the performance of nrtPS services without any
impaction to other services. This paper proposes an efficient QoS scheduling scheme that satisfies both throughput and delay guarantee
to various real and non-real applications corresponding to different scheduling schemes for k=1,2,3,4. Simulation results show that
proposed scheduling scheme can provide a tight QoS guarantee in terms of delay for all types of traffic as defined in WiMax standards.
This process results in maintaining the fairness of allocation and helps to eliminate starvation of lower priority class services. The
authors propose a new efficient and generalized scheduling schemes for IEEE 802.16 broadband wireless access system reflecting the
delay requirements.
This document describes a multi-path routing algorithm for IP networks based on flow optimization. It presents an intra-domain routing algorithm that uses multi-commodity flow optimization to enable load-sensitive forwarding over multiple paths without being constrained by traditional routing protocols like OSPF. The key idea is to aggregate all traffic destined for the same egress node into one commodity during optimization, reducing the number of commodities significantly. This makes the computation tractable and allows forwarding based on destination addresses.
This document describes the implementation of an Advanced High-performance Bus (AHB) protocol using an FPGA. It provides an overview of the AHB protocol which allows for communication between multiple bus masters and slaves. The AHB protocol supports features like split transactions, burst transfers, and arbitration. The document implements an AHB system with three masters and four slaves on an FPGA. It presents waveform results showing the arbiter prioritizing requests from multiple masters and handling the transfer of data between masters and slaves using the AHB protocol. In conclusion, the AHB protocol implemented on an FPGA provides benefits like avoiding deadlocks, minimizing lost resources, and adding flexibility.
PERFORMANCE ANALYSIS OF RESOURCE SCHEDULING IN LTE FEMTOCELLS NETWORKScscpconf
3GPP has introduced LTE Femtocells to manipulate the traffic for indoor users and to minimize the charge on the Macro cells. A key mechanism in the LTE traffic handling is the packet
scheduler which is in charge of allocating resources to active flows in both the frequency and time dimension. So several scheduling algorithms need to be analyzed for femtocells networks. In this paper we introduce a performance analysis of three distinct scheduling algorithms of mixed type of traffic flows in LTE femtocells networks. The particularly study is evaluated in terms of throughput, packet loss ratio, fairness index and spectral efficiency.
Similar to Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme (20)
This document provides a technical review of secure banking using RSA and AES encryption methodologies. It discusses how RSA and AES are commonly used encryption standards for secure data transmission between ATMs and bank servers. The document first provides background on ATM security measures and risks of attacks. It then reviews related work analyzing encryption techniques. The document proposes using a one-time password in addition to a PIN for ATM authentication. It concludes that implementing encryption standards like RSA and AES can make transactions more secure and build trust in online banking.
This document analyzes the performance of various modulation schemes for achieving energy efficient communication over fading channels in wireless sensor networks. It finds that for long transmission distances, low-order modulations like BPSK are optimal due to their lower SNR requirements. However, as transmission distance decreases, higher-order modulations like 16-QAM and 64-QAM become more optimal since they can transmit more bits per symbol, outweighing their higher SNR needs. Simulations show lifetime extensions up to 550% are possible in short-range networks by using higher-order modulations instead of just BPSK. The optimal modulation depends on transmission distance and balancing the energy used by electronic components versus power amplifiers.
This document provides a review of mobility management techniques in vehicular ad hoc networks (VANETs). It discusses three modes of communication in VANETs: vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and hybrid vehicle (HV) communication. For each communication mode, different mobility management schemes are required due to their unique characteristics. The document also discusses mobility management challenges in VANETs and outlines some open research issues in improving mobility management for seamless communication in these dynamic networks.
This document provides a review of different techniques for segmenting brain MRI images to detect tumors. It compares the K-means and Fuzzy C-means clustering algorithms. K-means is an exclusive clustering algorithm that groups data points into distinct clusters, while Fuzzy C-means is an overlapping clustering algorithm that allows data points to belong to multiple clusters. The document finds that Fuzzy C-means requires more time for brain tumor detection compared to other methods like hierarchical clustering or K-means. It also reviews related work applying these clustering algorithms to segment brain MRI images.
1) The document simulates and compares the performance of AODV and DSDV routing protocols in a mobile ad hoc network under three conditions: when users are fixed, when users move towards the base station, and when users move away from the base station.
2) The results show that both protocols have higher packet delivery and lower packet loss when users are either fixed or moving towards the base station, since signal strength is better in those scenarios. Performance degrades when users move away from the base station due to weaker signals.
3) AODV generally has better performance than DSDV, with higher throughput and packet delivery rates observed across the different user mobility conditions.
This document describes the design and implementation of 4-bit QPSK and 256-bit QAM modulation techniques using MATLAB. It compares the two techniques based on SNR, BER, and efficiency. The key steps of implementing each technique in MATLAB are outlined, including generating random bits, modulation, adding noise, and measuring BER. Simulation results show scatter plots and eye diagrams of the modulated signals. A table compares the results, showing that 256-bit QAM provides better performance than 4-bit QPSK. The document concludes that QAM modulation is more effective for digital transmission systems.
The document proposes a hybrid technique using Anisotropic Scale Invariant Feature Transform (A-SIFT) and Robust Ensemble Support Vector Machine (RESVM) to accurately identify faces in images. A-SIFT improves upon traditional SIFT by applying anisotropic scaling to extract richer directional keypoints. Keypoints are processed with RESVM and hypothesis testing to increase accuracy above 95% by repeatedly reprocessing images until the threshold is met. The technique was tested on similar and different facial images and achieved better results than SIFT in retrieval time and reduced keypoints.
This document studies the effects of dielectric superstrate thickness on microstrip patch antenna parameters. Three types of probes-fed patch antennas (rectangular, circular, and square) were designed to operate at 2.4 GHz using Arlondiclad 880 substrate. The antennas were tested with and without an Arlondiclad 880 superstrate of varying thicknesses. It was found that adding a superstrate slightly degraded performance by lowering the resonant frequency and increasing return loss and VSWR, while decreasing bandwidth and gain. Specifically, increasing the superstrate thickness or dielectric constant resulted in greater changes to the antenna parameters.
This document describes a wireless environment monitoring system that utilizes soil energy as a sustainable power source for wireless sensors. The system uses a microbial fuel cell to generate electricity from the microbial activity in soil. Two microbial fuel cells were created using different soil types and various additives to produce different current and voltage outputs. An electronic circuit was designed on a printed circuit board with components like a microcontroller and ZigBee transceiver. Sensors for temperature and humidity were connected to the circuit to monitor the environment wirelessly. The system provides a low-cost way to power remote sensors without needing battery replacement and avoids the high costs of wiring a power source.
1) The document proposes a model for a frequency tunable inverted-F antenna that uses ferrite material.
2) The resonant frequency of the antenna can be significantly shifted from 2.41GHz to 3.15GHz, a 31% shift, by increasing the static magnetic field placed on the ferrite material.
3) Altering the permeability of the ferrite allows tuning of the antenna's resonant frequency without changing the physical dimensions, providing flexibility to operate over a wide frequency range.
This document summarizes a research paper that presents a speech enhancement method using stationary wavelet transform. The method first classifies speech into voiced, unvoiced, and silence regions based on short-time energy. It then applies different thresholding techniques to the wavelet coefficients of each region - modified hard thresholding for voiced speech, semi-soft thresholding for unvoiced speech, and setting coefficients to zero for silence. Experimental results using speech from the TIMIT database corrupted with white Gaussian noise at various SNR levels show improved performance over other popular denoising methods.
This document reviews the design of an energy-optimized wireless sensor node that encrypts data for transmission. It discusses how sensing schemes that group nodes into clusters and transmit aggregated data can reduce energy consumption compared to individual node transmissions. The proposed node design calculates the minimum transmission power needed based on received signal strength and uses a periodic sleep/wake cycle to optimize energy when not sensing or transmitting. It aims to encrypt data at both the node and network level to further optimize energy usage for wireless communication.
This document discusses group consumption modes. It analyzes factors that impact group consumption, including external environmental factors like technological developments enabling new forms of online and offline interactions, as well as internal motivational factors at both the group and individual level. The document then proposes that group consumption modes can be divided into four types based on two dimensions: vertical (group relationship intensity) and horizontal (consumption action period). These four types are instrument-oriented, information-oriented, enjoyment-oriented, and relationship-oriented consumption modes. Finally, the document notes that consumption modes are dynamic and can evolve over time.
The document summarizes a study of different microstrip patch antenna configurations with slotted ground planes. Three antenna designs were proposed and their performance evaluated through simulation: a conventional square patch, an elliptical patch, and a star-shaped patch. All antennas were mounted on an FR4 substrate. The effects of adding different slot patterns to the ground plane on resonance frequency, bandwidth, gain and efficiency were analyzed parametrically. Key findings were that reshaping the patch and adding slots increased bandwidth and shifted resonance frequency. The elliptical and star patches in particular performed better than the conventional design. Three antenna configurations were selected for fabrication and measurement based on the simulations: a conventional patch with a slot under the patch, an elliptical patch with slots
1) The document describes a study conducted to improve call drop rates in a GSM network through RF optimization.
2) Drive testing was performed before and after optimization using TEMS software to record network parameters like RxLevel, RxQuality, and events.
3) Analysis found call drops were occurring due to issues like handover failures between sectors, interference from adjacent channels, and overshooting due to antenna tilt.
4) Corrective actions taken included defining neighbors between sectors, adjusting frequencies to reduce interference, and lowering the mechanical tilt of an antenna.
5) Post-optimization drive testing showed improvements in RxLevel, RxQuality, and a reduction in dropped calls.
This document describes the design of an intelligent autonomous wheeled robot that uses RF transmission for communication. The robot has two modes - automatic mode where it can make its own decisions, and user control mode where a user can control it remotely. It is designed using a microcontroller and can perform tasks like object recognition using computer vision and color detection in MATLAB, as well as wall painting using pneumatic systems. The robot's movement is controlled by DC motors and it uses sensors like ultrasonic sensors and gas sensors to navigate autonomously. RF transmission allows communication between the robot and a remote control unit. The overall aim is to develop a low-cost robotic system for industrial applications like material handling.
This document reviews cryptography techniques to secure the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in mobile ad-hoc networks. It discusses various types of attacks on AODV like impersonation, denial of service, eavesdropping, black hole attacks, wormhole attacks, and Sybil attacks. It then proposes using the RC6 cryptography algorithm to secure AODV by encrypting data packets and detecting and removing malicious nodes launching black hole attacks. Simulation results show that after applying RC6, the packet delivery ratio and throughput of AODV increase while delay decreases, improving the security and performance of the network under attack.
The document describes a proposed modification to the conventional Booth multiplier that aims to increase its speed by applying concepts from Vedic mathematics. Specifically, it utilizes the Urdhva Tiryakbhyam formula to generate all partial products concurrently rather than sequentially. The proposed 8x8 bit multiplier was coded in VHDL, simulated, and found to have a path delay 44.35% lower than a conventional Booth multiplier, demonstrating its potential for higher speed.
This document discusses image deblurring techniques. It begins by introducing image restoration and focusing on image deblurring. It then discusses challenges with image deblurring being an ill-posed problem. It reviews existing approaches to screen image deconvolution including estimating point spread functions and iteratively estimating blur kernels and sharp images. The document also discusses handling spatially variant blur and summarizes the relationship between the proposed method and previous work for different blur types. It proposes using color filters in the aperture to exploit parallax cues for segmentation and blur estimation. Finally, it proposes moving the image sensor circularly during exposure to prevent high frequency attenuation from motion blur.
This document describes modeling an adaptive controller for an aircraft roll control system using PID, fuzzy-PID, and genetic algorithm. It begins by introducing the aircraft roll control system and motivation for developing an adaptive controller to minimize errors from noisy analog sensor signals. It then provides the mathematical model of aircraft roll dynamics and describes modeling the real-time flight control system in MATLAB/Simulink. The document evaluates PID, fuzzy-PID, and PID-GA (genetic algorithm) controllers for aircraft roll control and finds that the PID-GA controller delivers the best performance.
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 7, Issue 1 (Jul. - Aug. 2013), PP 31-41
www.iosrjournals.org
www.iosrjournals.org 31 | Page
Designing of a AMBA-AHB Multilayer Bus matrix Self-
Motivated Arbitration scheme
Mr. Ravi. M1
, Mr. Sudhir Dakey2
(1)
M.E, Department of Electronics & Communication Engineering
(2)
Asst.Professor, Department of Electronics & Communication Engineering
(1)(2)
MVSREC, Nadargul, Hyderabad.
Abstract: The AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme proposed three methods
for data transmiting from master to slave for on chip communication. Multilayer advanced high-performance
bus (ML-AHB) busmatrix employs slave-side arbitration. Slave-side arbitration is different from master-side
arbitration in terms of request and grant signals since, in the former, the master merely starts a burst
transaction and waits for the slave response to proceed to the next transfer. Therefore, in the former, the unit of
arbitration can be a transaction or a transfer. However, the ML-AHB busmatrix of ARM offers only transfer-
based fixed-pri-ority and round-robin arbitration schemes. In this paper, we propose the design and
implementation of a flexible arbiter for the ML-AHB busmatrix to support three priority policies fixed priority,
round robin, and dynamic priority and three data multiplexing modes transfer, transaction, and desired transfer
length. In total, there are nine possible arbitration schemes. The proposed arbiter, which is self-motivated (SM),
selects one of the nine possible arbitration schemes based upon the priority-level notifications and the desired
transfer length from the masters so that arbitration leads to the maximum performance. Experimental results
show that, although the area overhead of the proposed SM arbitration scheme is 9%–25% larger than those of
the other arbitration schemes, our arbiter improves the throughput by 14%–62% compared to other schemes.
I. Introduction
THE ON-CHIP bus plays a key role in the system-on-a-chip (SoC) design by enabling the efficient
integration of het-erogeneous system components such as CPUs, DSPs, applica-tion-specific cores, memories,
and custom logic [1]. Recently, as the level of design complexity has become higher, SoC de-signs require a
system bus with high bandwidth to perform mul-tiple operations in parallel [2]. To solve the bandwidth prob-
lems, there have been several types of high-performance on-chip buses proposed, such as the multilayer AHB
(ML-AHB) bus-matrix from ARM [3], the PLB crossbar switch from IBM [4], and CONMAX from Silicore
[5]. Among them, the ML-AHB busmatrix has been widely used in many SoC designs. This is because of the
simplicity of the AMBA bus of ARM, which at-tracts many IP designers [6], and the good architecture of the
AMBA bus for applying embedded systems with low power [7].
The ML-AHB busmatrix is an interconnection scheme based on the AMBA AHB protocol, which
enables parallel access paths between multiple masters and slaves in a system. This is achieved by using a more
complex interconnection matrix and gives the benefit of both increased overall bus bandwidth and a more
flexible system structure [3]. In particular, the ML-AHB busmatrix uses slave-side arbitration. Slave-side
arbitration is different from master-side arbitration in terms of request and grant signals since, in the former, the
master merely starts a burst transaction and waits for the slave response to proceed to the next transfer.
Therefore, the unit of arbitration can be a transaction or a transfer [8]. The transaction-based arbiter mul-tiplexes
the data transfer based on the burst transaction, and the transfer-based arbiter switches the data transfer based on
a single transfer. However, the ML-AHB busmatrix of ARM presents only transfer-based arbitration schemes,
i.e., transfer-based fixed-priority and round-robin arbitration schemes. This limitation on the arbitration scheme
may lead to degradation of the system performance because the arbitration scheme is usu-ally dependent on the
application requirements; recent applica-tions are likewise becoming more complex and diverse. By im-
plementing an efficient arbitration scheme, the system perfor-mance can be tuned to better suit applications [9].
For a high-performance on-chip bus, several studies re-lated to the arbitration scheme have been
proposed, such as table-lookup-based crossbar arbitration [10], two-level time-division multiplexing (TDM)
scheduling [11], token-ring mechanism [12], dynamic bus distribution algorithm [13], and LOTTERYBUS [14].
However, these approaches employ master-side arbitration. Therefore, they can only control pri-ority
policy and also present some limitations when handling the transfer-based arbitration scheme since master-side
arbitra-tion uses a centralized arbiter. In contrast, it is possible to deal with the transfer-based arbitration scheme
as well as the trans-action-based arbitration scheme in slave-side arbitration. In this paper, we propose a flexible
arbiter based on the self-motivated (SM) arbitration scheme for the ML-AHB busmatrix. Our SM arbitration
scheme has the following advantages: 1) It can adjust the processed data unit; 2) it changes the priority policies
2. Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
www.iosrjournals.org 32 | Page
during runtime; and 3) it is easy to tune the arbitration scheme according to the characteristics of the target
application. Hence, our arbiter is able to not only deal with the transfer-based fixed-priority, round-robin, and
dynamic-priority arbitration schemes but also manage the transaction-based fixed-priority, round-robin, and
dynamic-priority arbitration schemes. Fur-thermore, our arbiter provides the desired-transfer-length-based
Fig. 1. Overall structure of the ML-AHB busmatrix of ARM [3].
fixed-priority, round-robin, and dynamic-priority arbitration schemes. In addition, the proposed SM
arbiter selects one of the nine possible arbitration schemes based on the priority-level notifications and the
desired transfer length from the masters to ensure that the arbitration leads to the maximum performance.
In Section II, we briefly explain the arbitration schemes for the ML-AHB busmatrix of ARM, while
Section III describes an implementation method for our flexible arbiter based upon the SM arbitration scheme
for the ML-AHB busmatrix. We then present experimental results in Section IV and concluding re-marks in
Section V.
II. Arbitration Schemes For The Ml-Ahb
Busmatrix Of Arm
The ML-AHB busmatrix of ARM consists of the input stage, decoder, and output stage, including an
arbiter [3]. Fig. 1 shows the overall structure of the ML-AHB busmatrix of ARM.
The input stage is responsible for holding the address and control information when transfer to a slave
is not able to com-mence immediately. The decoder determines which slave that a transfer is destined for. The
output stage is used to select which of the various master input ports is routed to the slave. Each output stage has
an arbiter. The arbiter determines which input stage has to perform a transfer to the slave and decides which the
highest priority is currently. The ML-AHB busmatrix em-ploys slave-side arbitration, in which the arbiters are
located in front of each slave port, as shown in Fig. 1; the master simply starts a transaction and waits for the
slave response to proceed to the next transfer. Therefore, the unit of arbitration can be a transaction or a transfer.
However, the ML-AHB busmatrix of ARM furnishes only transfer-based arbitration schemes, specif-ically
transfer-based fixed-priority and round-robin arbitration schemes. The transfer-based fixed-priority (round-
robin) arbiter multiplexes the data transfer based on a single transfer in a fixed-priority or round-robin fashion.
III. Sm Arbitration Scheme For The Ml-Ahb Busmatrix
An assumption is made that the masters can change their pri-ority level and can issue the desired
transfer length to the arbiters in order to implement a SM arbitration scheme. This assumption
3. Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
www.iosrjournals.org 33 | Page
Fig. 2. Arbitration scheme examples in an embedded system. (a) Arbitration scheme with no consideration of
the latency constraint. (b) Arbitration scheme minimizing latency. (c) SM arbitration scheme.
should be valid because the system developer generally recog-nizes the features of the target
applications [15]. For example, some masters in embedded systems are required to complete their job for given
timing constraints, resulting in the satisfac-tion of system-level timing constraints. The computation time of
each master is predictable, but it is not easy to foresee the data transfer time since the on-chip bus is usually
shared by several masters. Previous works solved this issue by minimizing the la-tencies of several latency-
critical masters, but a side effect of these methods is that they can increase the latencies of other masters; hence,
they may violate the given timing constraints [16]. Unlike existing works, our scheme can keep the latency close
to its given constraint by adjusting the priority level and transfer length of the masters. Fig. 2 shows an example.
In this example, the service latencies (latency-limit times) of M1, M2, and M3 are 4, 8, and 2 cycles
(T14, T8, and T10), re-spectively. The requests for three masters are all initiated at T0, and M3 is the most
latency-sensitive master. Fig. 2(a) shows an arbitration scheme that does not use latency constraints for ar-
bitration. Therefore, M2 and M3 violate the latency constraint as the masters are selected in ascending order.
Only M1 meets the constraint. Fig. 2(b) shows the scheduling of a typical la-tency-minimizing arbiter. It
minimizes the latency of the most latency-sensitive module, namely, M3, causing M2 to violate its constraint.
Although neither of these two arbitration schemes can meet the latency constraints for all three masters, in the
SM arbitration shown in Fig. 2(c), all masters use the bus with no violations by configuring the priority levels
(transfer lengths) of M1, M2, and M3 as the lowest, highest, and intermediate prior-ities (4, 8, and 2),
respectively.
We use part of a 32-b address bus of the masters to inform the arbiters of the priority level and the
desired transfer length
Fig. 3. Decoding information of the 32-b address bus.
4. Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
www.iosrjournals.org 34 | Page
Fig. 4. Internal structure of our arbiter.
of the masters. Fig. 3 shows the decoding information for our address bus.
In Fig. 3, S_Number indicates the target slave number, P_Level means the priority level of a master,
T_Length denotes the desired transfer length of a master, and Offset_Add specifies the internal address of the
target slave. Each of S_Number and P_Level consists of 3 b because the maximum number of master–slave sets
is 8 8 [3]. Also, T_Length is composed of 4 b because the maximum number of burst lengths is 16 [3].
Although we used 7 b for P_Level and T_Length in the 32-b address bus to notify the arbiters of the priority
level and the desired transfer length of a master, we consider it adequate to express the internal address of a
slave because the range of Offset_Add is from 0 to . Through the aforementioned assumption, the priority
level and transfer length can then be changed by the SM demand of each master.
Fig. 4 shows the internal structure of our arbiter based upon the SM arbitration scheme.
In Fig. 4, the NoPort signal means that none of the mas-ters must be selected and that the address and
control signals to the shared slave must be driven to an inactive state, while Master No. indicates the currently
selected master number gen-erated by the controller for the SM arbitration scheme. In gen-eral, our arbiter
consists of an RR block, a P block, two multi-plexers, a counter, a controller, and two flip-flops. MUX_1 and
MUX_2 are used to select the arbitration scheme and the desired transfer length of a master, respectively. A
counter calculates the transfer length, with two flip-flops being inserted to avoid the at-tempts by the critical
path to arbitrate. An RR block (P block) performs the round-robin- or priority-based arbitration scheme. Fig. 5
shows the internal process of an RR block. Initially, we create the up- and down-mask vectors (Up_Mask and
Dn_Mask) based on the number of currently selected masters, as shown in Fig. 5. We then generate the up- or
down-masked vector created through bitwise AND-ing operation between the mask vector
Fig. 5. Internal process of the RR block.
5. Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
www.iosrjournals.org 35 | Page
Fig. 6. VHDL code of the round-robin function.
and the requested master vector. After generating the up- and down-masked vectors, we examine each
masked vector as to whether they are zero or not. If the up-masked vector is zero, the down-masked vector is
inserted to the input parameter of the round-robin function; if it is not zero, the up-masked vector is the one
inserted. A master for the next transfer is chosen by the round-robin function, and the current master is updated
after 1 clock cycle. The RR block is then performed by repeating the arbitration procedure shown in Fig. 5.
Fig. 6 shows the VHDL code of the round-robin function at the behavioral level.
In Fig. 6, a master for the next transfer is selected through the for-statements in line 6, with the priority
level of the least significant bit in Masked_Vector being the highest. If we modify the range of Masked_Vector
in line 6 to “0 to Masked_Vector’left,” then the priority level of the most signifi-cant bit in Masked_Vector
becomes the highest.
Fig. 7 shows the internal procedure of the P block. First of all, we create the highest priority vector (V)
through the round-robin function of Fig. 6. After generating the highest priority vector (V), the priority-level
vectors and the highest priority vector (V) are inserted to the input parameters of the priority function. The
master with the highest priority is chosen by the priority func-tion, while the current master is updated after 1
clock cycle.
Fig. 8 shows the VHDL code of the priority function at the behavioral level.
In Fig. 8, the master with the highest priority is selected through the for-statements in line 7.
Fig7: internal procedure for P block
6. Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
www.iosrjournals.org 36 | Page
A controller compares the priority levels of the requesting masters. If the masters have equal priorities,
the controller selects
The round-robin arbitration scheme (RR block); in other cases, it chooses the priority arbitration scheme (P
block). The controller also makes the final decision on the master for the next transfer based on the transfer
length of the selected master.
The control process follows the following three steps.
1) If HMASTLOCK is asserted, the same master remains selected.
2) If HMASTLOCK is not asserted and the currently selected master does not exist, the following hold.
a) If no master is requesting access, the NoPort signal is asserted.
b) Otherwise, a new master for the next transfer is initially
selected. If the masters have equal priorities, the round-robin arbitration scheme is selected; otherwise,
the priority arbitration scheme is chosen. In addition, the counter is updated based on the transfer length of the
selected master.
3) If none of the previous statements applies, the following hold.
a)If the counter is expired, the following hold.
i) If the requesting masters do not exist, the No-Port signal is updated based on the HSEL signal of the currently
selected master. If the HSEL signal is “1,” the same master remains selected, and the NoPort signal is
deasserted. Otherwise, the NoPort signal is asserted.
ii) Otherwise, a master for the next transfer is selected based on the priority levels of the requesting masters.
Also, the counter is updated.
b) If the counter is not expired, and the HSEL signal of the current master is “1,” the same master remains
selected, and the counter is decreased.
c) If the currently selected master completes a transaction
before the counter is expired, the following hold.
i) If the requesting masters do not exist, the No-Port signal is asserted.
ii) Otherwise, a master for the next transfer is chosen based on the priority levels of the requesting masters, and
the counter is updated.
The SM arbitration scheme is achieved through iteration of the aforementioned steps. Combining the
priority level and the desired transfer length of the masters allows our arbiter to handle the transfer-based fixed-
priority, round-robin, and dynamic-priority arbitration schemes (abbreviated as the FT, RT, and DT arbitration
schemes, respectively), as well as the transaction-based fixed-priority, round-robin, and dynamic-
priorityarbitration schemes (abbreviated as the FR, RR, and DR arbitration schemes, respectively). Moreover,
our arbiter can also deal with the desired-transfer-length-based fixed-priority, round-robin, and dynamic-priority
arbitration schemes (abbreviated as the FL, RL, and DL arbitration schemes, respectively).The transfer- or
transaction-based arbiter switches the data ransfer based upon a single transfer (burst transaction), and the
desired-transfer-length-based arbiter multiplexes the datatransfer based on the transfer length assigned by the
masters.
Fig. 9 shows the configurations for the fixed-priority arbitration schemes. In this figure, the smaller the
priority level number, the higher the priority level. In the fixed-priority arbitration schemes, each master has a
static priority. In transfer-based arbitration, however, he transfer length is allocated as 1, indicating a single
transfer; in transaction-based arbitration, the transfer length is equal to the HBURST signal, which refers to the
transaction type (transfer ). In addition, the transfer length for the desired-transfer-length-based arbitration is
allotted by the demand of each master (for example, let , , , and ). The arbitration results of Fig. 8 are as follows
(“#” indicates the transfer number).
1) FT arbitration scheme: M2(#0), M2(#1), M2(#2), M1(#0),
M1(#1), M1(#2), M1(#3), M1(#4), M0(#0), M0(#1), M0(#2), M0(#3), M0(#4), M0(#5), M0(#6),
M0(#7), M(#5), M1(#6), M1(#7), M2(#3), M2(#4), M2(#5), M2(#6), M2(#7), M3(#0), M3(#1), M3(#2),
M3(#3), M3(#4), M3(#5), M3(#6), M3(#7).
2) FR arbitration scheme: M2(#0), M2(#1), M2(#2), M2(#3),
M2(#4), M2(#5), M2(#6), M2(#7), M0(#0), M0(#1),M0(#2), M0(#3), M0(#4), M0(#5), M0(#6),
M0(#7),M1(#0), M1(#1), M1(#2), M1(#3), M1(#4), M1(#5), M1(#6), M1(#7), M3(#0), M3(#1), M3(#2),
M3(#3), M3(#4), M3(#5), M3(#6), M3(#7).
3) FL arbitration scheme: M2(#0), M2(#1), M2(#2), M2(#3),
M2(#4), M2(#5), M2(#6), M2(#7), M0(#0), M0(#1),M0(#2), M0(#3), M0(#4), M0(#5), M0(#6),
M0(#7), M1(#0), M1(#1), M1(#2), M1(#3), M1(#4), M1(#5), M1(#6), M1(#7), M3(#0), M3(#1), M3(#2),
M3(#3), M3(#4), M3(#5), M3(#6), M3(#7).
7. Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
www.iosrjournals.org 37 | Page
In this case, the result of transaction-based arbitration is equalto that of desired-transfer-length-based
arbitration because the priority levels of all the masters are fixed.
Fig8:fixed priority arbitration scheme
Fig. 9 shows the combinations for the round-robin arbitration
schemes.
In these schemes, the masters have equal priorities, with the
transfer length being assigned as 1 in transfer-based arbitration
and 8 in transaction-based arbitration. Also, in desired-transferlength based arbitration, the transfer
length is assigned by the demand of each master (for example, let , , , and ). The arbitration results of Fig. 10 are
as follows.
1) RT arbitration scheme: M0(#0), M1(#0), M2(#0), M3(#0),
M0(#1), M1(#1), M2(#1), M3(#1), M0(#2), M1(#2), M2(#2), M3(#2), M0(#3), M1(#3), M2(#3), M3(#3), 0(#4),
M1(#4), M2(#4), M3(#4), M0(#5), M1(#5), M2(#5), M3(#5), M0(#6), M1(#6), M2(#6), M3(#6), M0(#7),
M1(#7), M2(#7), M3(#7).
2) RR arbitration scheme: M0(#0), M0(#1), M0(#2), M0(#3),
M0(#4), M0(#5), M0(#6), M0(#7), M1(#0), M1(#1),M1(#2), M1(#3), M1(#4), M1(#5), M1(#6), M1(#7),
M2(#0), M2(#1), M2(#2), M2(#3), M2(#4), M2(#5),M2(#6), M2(#7), M3(#0), M3(#1), M3(#2),
M3(#3),M3(#4), M3(#5), M3(#6), M3(#7).
3) RL arbitration scheme: M0(#0), M0(#1), M1(#0), M1(#1),
M1(#2), M1(#3), M1(#4), M1(#5), M1(#6), M1(#7),
M2(#0), M2(#1), M2(#2), M2(#3), M2(#4), M2(#5),
M3(#0), M3(#1), M3(#2), M3(#3), M0(#2), M0(#3),
M2(#6), M2(#7), M3(#4), M3(#5), M3(#6), M3(#7),
M0(#4), M0(#5), M0(#6), M0(#7).
Fig. 10 shows the configurations for the dynamic-priority arbitration schemes. In the dynamic-priority
arbitration schemes, the priority of the masters can be changed by the SM demand of each master. Furthermore,
the transfer length is assigned as 1 in transfer-based arbitration and 4 in transaction-based arbitration . Also, the
transfer length for desired-transfer-length-based arbitration is assigned, as shown in Fig. 10. The arbitration
results of Fig. 10 are as follows.
1) DT arbitration scheme: M2(#0), M3(#0), M3(#1),
M3(#2), M3(#3), M1(#0), M1(#1), M1(#2), M1(#3),
M0(#0), M0(#1), M0(#2), M0(#3), M2(#1), M2(#2),
M2(#3) M3(#0), M3(#1), M0(#0), M0(#1), M0(#2),
M2(#0), M2(#1), M2(#2), M2(#3), M0(#3), M1(#0),
M1(#1), M1(#2), M1(#3), M3(#2), M3(#3).
9. Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
www.iosrjournals.org 39 | Page
IV. Designing Results of Ahb
Fig11:Simulation environment for performance analysis.
ML-AHB Busmatrix desind by using of fig11 architecture , using of hdl language . simulated done by
using of modelsim6.4b tool, synthesis by Xilinx ISE 10.1 tool, these results are shown in below figure 12&13.
Fig12: ML-AHB simultion wave form.
10. Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
www.iosrjournals.org 40 | Page
Fig13: ML-AHB synthasesis RTL view.
V. Conclusion
In this paper, the proposed a flexible arbiter based on the SM arbitration scheme for the ML-AHB bus
matrix. This arbiter supports three priority policies-fixed priority, round-robin, and dynamic priority-and three
approaches to data multiplexing- transfer, transaction, and desired transfer length; in other words, there are nine
possible arbitration schemes. In addition, the proposed SM arbiter selects one of the nine possible arbitration
schemes based on the priority-level notifications and the desired transfer length from the masters to allow the
arbitration to lead to the maximum performance.
This design proposed ML- AHB SM arbitration schemes increases area than the other arbitration
schemes in ML-AHB, but ML-AHB SM arbitration scheme gives the better performance when it selects the
input stage and output stage in self motivated manner. Therefore expect that it would be better to apply our SM
arbitration scheme to an application- specific system because it is easy to tune the arbitration scheme according
to the features of the target system.
References
[1] M. Drinic, D. Kirovski, S. Megerian, and M. Potkonjak, “Latencyguided on-chip bus-network design,” IEEE Trans. Comput.-Aided
Design Integr. Circuits Syst., vol. 25, no. 12, pp. 2663–2673, Dec. 2006.
[2] S. Y. Hwang, K. S. Jhang, H. J. Park, Y. H. Bae, and H. J. Cho, “An ameliorated design method of ML-AHB busmatrix,” ETRI J.,
vol. 28, no. 3, pp. 397–400, Jun. 2006.
[3] ARM, “AHB Example AMBA System,” 2001 [Online]. Available: http://www.arm.com/products/solutions/AMBA_Spec.html
[4] IBM, New York, “32-bit Processor Local Bus Architecture Specification,” 2001.
[5] R. Usselmann, “WISHBONE interconnect matrix IP core,” Open- Cores, 2002. [Online]. Available: http://www.opencores.org/
?do=project=wb_conmax
[6] N.-J. Kim and H.-J. Lee, “Design of AMBA wrappers for multipleclock
operations,” in Proc. Int. Conf. ICCCAS, Jun. 2004, vol. 2, pp. 1438–1442.
[7] D. Flynn, “AMBA: Enabling reusable on-chip designs,” IEEE Micro, vol. 17, no. 4, pp. 20–27, Jul./Aug. 1997.slave-side arbitration
schemes for the multi-layer AHB busmatrix,” J. KISS, Comput. Syst. Theory, vol. 34, no. 5, pp. 257–266, Jun. 2007.
[9] S. S. Kallakuri and A. Doboli, “Customization of arbitration policies and buffer space distribution using continuous-time Markov
decision processes,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 15, no. 2, pp. 240–245, Feb. 2007.
[10] D. Seo and M. Thottethodi, “Table-lookup based crossbar arbitration for minimal-routed, 2D mesh and torus networks,” in Proc.
Int. Conf. IPDPS, Mar. 2007, pp. 1–10.
[11] K. Lahiri, A. Raghunathan, and S. Dey, “Performance analysis of systems with multi-channel communication architectures,” in
Proc. Int. Conf. VLSI Design, Jan. 2000, pp. 530–537.
[12] J. Turner and N. Yamanaka, “Architectural choices in large scale ATM switches,” IEICE Trans. Commun., vol. E-81B, no. 2, pp.
120–137, Feb. 1998.
11. Designing of a AMBA-AHB Multilayer Bus matrix Self-Motivated Arbitration scheme
www.iosrjournals.org 41 | Page
[13] C. H. Pyoun, C. H. Lin, H. S. Kim, and J. W. Chong, “The efficient bus arbitration scheme in SoC environment,” in Proc. Int. Conf.
SoC Real-Time Appl., Jul. 2003, pp. 311–315.
[14] K. Lahiri, A. Raghunathan, and G. Lakshminarayana, “The LOTTERYBUS on-chip communication architecture,” IEEE Trans.
Very Large Scale Integr. (VLSI) Syst., vol. 14, no. 6, pp. 596–608, Jun. 2006.
[15] J. H. Han, M. Y. Lee, B. Younghwan, and C. Hanjin, “Application specific processor design for H.264 decoder with a configurable
embedded processor,” ETRI J., vol. 27, no. 5, pp. 491–496, Oct. 2005.
[16] M. Jun, K. Bang, H.-J. Lee, N. Chang, and E.-Y. Chung, “Slack-based bus arbitration scheme for soft real-time constrained
embedded systems,” in Proc. Int. Conf. ASP-DAC, Jan. 2007, pp. 159–164.
[17] S. Y. Hwang, H. J. Park, and K. S. Jhang, An Efficient Implementation Method of Arbiter for the ML-AHB Busmatrix. Berlin,
Germany: Springer-Verlag, May 2007, vol. 4523, LNCS, pp. 229–240.
[18] E.-G. Jeong, J.-G. Lee, K.-S. Jhang, J.-A. Lee, and D. Har, “Asynchronous layered interface of multimedia socs for multiple
outstanding transactions,” J. VLSI Signal Process. Syst., vol. 46, no. 2/3, pp. 133–151, Mar. 2007.
[19] S. Y. Hwang, H. J. Park, and K. S. Jhang, “An implementation and performance analysis of slave-side arbitration schemes for the
ML-AHB busmatrix,” in Proc. Int. Conf.