The document describes a proposed joint source-channel coding (JSCC) system that exploits 2-dimensional source correlation in channel decoding with parameter estimation. The system uses a modified Bahl-Cocke-Jelinek-Raviv (BCJR) algorithm at the decoder to exploit source correlation on rows and columns of a 2D source. A parameter estimation technique based on the Baum-Welch algorithm is used jointly with the decoder to estimate source correlation parameters at the receiver since these parameters are not always known in practice. Simulation results show that the proposed coding scheme that performs joint decoding and parameter estimation performs very close to an ideal 2D JSCC system with perfect knowledge of source correlation parameters.
IMPACT OF PARTIAL DEMAND INCREASE ON THE PERFORMANCE OF IP NETWORKS AND RE-OP...EM Legacy
12th GI/ITG CONFERENCE ON MEASURING, MODELLING AND EVALUATION OF COMPUTER AND COMMUNICATION SYSTEMS 3rd POLISH-GERMAN TELETRAFFIC SYMPOSIUM
PGTS 2004
Eueung Mulyana, Ulrich Killat
An Alternative Genetic Algorithm to Optimize OSPF WeightsEM Legacy
This document presents a genetic algorithm approach to optimize OSPF routing weights. The algorithm aims to minimize maximum and average link utilization directly, unlike previous methods that minimized a convex cost function. It can find weights for both single and multiple shortest path routing. The genetic algorithm uses a chromosome encoding of link weights. It selects parents using rank selection and produces offspring using a reproduction strategy combining crossover and mutation. Additional mutation is applied to offspring not meeting certain conditions. The algorithm is tested on small networks and compared to MIP-based methods, showing results for larger networks with increasing traffic demands.
ENHANCING COMPUTATIONAL EFFORTS WITH CONSIDERATION OF PROBABILISTIC AVAILABL...Raja Larik
This document proposes a Probabilistic Collocation Method (PCM) to improve probabilistic load flow (PLF) computation methods and model network topology uncertainties. PCM uses probability distribution functions to model the impact of uncertainties as a linear function of power injections. It maintains the linear relationship between line flows and power injections. The method is examined using the IEEE 39-bus test system and compared to Monte Carlo simulation, showing significantly reduced computational efforts while maintaining accuracy.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Solving bandwidth guaranteed routing problem using routing dataIJCNCJournal
This paper introduces a traffic engineering routing algorithm that aims to accept as many routing demands
as possible on the condition that a certain amount of bandwidth resource is reserved for each accepted
demand. The novel idea is to select routes based on not only network states but also information derived
from routing data such as probabilities of the ingress egress pairs and usage frequencies of the links.
Experiments with respect to acceptance ratio and computation time have been conducted against various
test sets. Results indicate that the proposed algorithm has better performance than the existing popular algorithms including Minimum Interference Routing Algorithm (MIRA) and Random Race based Algorithm for Traffic Engineering (RRATE)
.
IRJET- The RTL Model of a Reconfigurable Pipelined MCMIRJET Journal
This document presents two Register Transfer Level (RTL) models for a reconfigurable pipelined multiple constant multiplier (MCM) architecture. The first model uses a ripple carry adder, while the second model replaces it with a carry lookahead adder. Both models are constructed using Verilog and simulated using ModelSim. Simulation results show the second model has a 3.53% higher maximum clock frequency and throughput due to the faster carry lookahead adder. It also has 3.53% lower latency but uses 1.65% more power. The second model provides faster performance with moderate increases in resource usage and power consumption.
This document discusses simulations of the physical layer of LTE networks. It specifically focuses on simulations of the Physical Downlink Shared Channel (PDSCH). The simulations are performed using the LTE System Toolbox from Mathworks. Throughput and bit error rate are measured for the PDSCH under various simulation setups and channel conditions. The results show that throughput increases and becomes sustained as SNR increases. Bit error rate curves also drop quickly with higher SNR. These simulations provide insight into the expected performance of LTE devices over the PDSCH.
This document describes a multi-path routing algorithm for IP networks based on flow optimization. It presents an intra-domain routing algorithm that uses multi-commodity flow optimization to enable load-sensitive forwarding over multiple paths without being constrained by traditional routing protocols like OSPF. The key idea is to aggregate all traffic destined for the same egress node into one commodity during optimization, reducing the number of commodities significantly. This makes the computation tractable and allows forwarding based on destination addresses.
IMPACT OF PARTIAL DEMAND INCREASE ON THE PERFORMANCE OF IP NETWORKS AND RE-OP...EM Legacy
12th GI/ITG CONFERENCE ON MEASURING, MODELLING AND EVALUATION OF COMPUTER AND COMMUNICATION SYSTEMS 3rd POLISH-GERMAN TELETRAFFIC SYMPOSIUM
PGTS 2004
Eueung Mulyana, Ulrich Killat
An Alternative Genetic Algorithm to Optimize OSPF WeightsEM Legacy
This document presents a genetic algorithm approach to optimize OSPF routing weights. The algorithm aims to minimize maximum and average link utilization directly, unlike previous methods that minimized a convex cost function. It can find weights for both single and multiple shortest path routing. The genetic algorithm uses a chromosome encoding of link weights. It selects parents using rank selection and produces offspring using a reproduction strategy combining crossover and mutation. Additional mutation is applied to offspring not meeting certain conditions. The algorithm is tested on small networks and compared to MIP-based methods, showing results for larger networks with increasing traffic demands.
ENHANCING COMPUTATIONAL EFFORTS WITH CONSIDERATION OF PROBABILISTIC AVAILABL...Raja Larik
This document proposes a Probabilistic Collocation Method (PCM) to improve probabilistic load flow (PLF) computation methods and model network topology uncertainties. PCM uses probability distribution functions to model the impact of uncertainties as a linear function of power injections. It maintains the linear relationship between line flows and power injections. The method is examined using the IEEE 39-bus test system and compared to Monte Carlo simulation, showing significantly reduced computational efforts while maintaining accuracy.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Solving bandwidth guaranteed routing problem using routing dataIJCNCJournal
This paper introduces a traffic engineering routing algorithm that aims to accept as many routing demands
as possible on the condition that a certain amount of bandwidth resource is reserved for each accepted
demand. The novel idea is to select routes based on not only network states but also information derived
from routing data such as probabilities of the ingress egress pairs and usage frequencies of the links.
Experiments with respect to acceptance ratio and computation time have been conducted against various
test sets. Results indicate that the proposed algorithm has better performance than the existing popular algorithms including Minimum Interference Routing Algorithm (MIRA) and Random Race based Algorithm for Traffic Engineering (RRATE)
.
IRJET- The RTL Model of a Reconfigurable Pipelined MCMIRJET Journal
This document presents two Register Transfer Level (RTL) models for a reconfigurable pipelined multiple constant multiplier (MCM) architecture. The first model uses a ripple carry adder, while the second model replaces it with a carry lookahead adder. Both models are constructed using Verilog and simulated using ModelSim. Simulation results show the second model has a 3.53% higher maximum clock frequency and throughput due to the faster carry lookahead adder. It also has 3.53% lower latency but uses 1.65% more power. The second model provides faster performance with moderate increases in resource usage and power consumption.
This document discusses simulations of the physical layer of LTE networks. It specifically focuses on simulations of the Physical Downlink Shared Channel (PDSCH). The simulations are performed using the LTE System Toolbox from Mathworks. Throughput and bit error rate are measured for the PDSCH under various simulation setups and channel conditions. The results show that throughput increases and becomes sustained as SNR increases. Bit error rate curves also drop quickly with higher SNR. These simulations provide insight into the expected performance of LTE devices over the PDSCH.
This document describes a multi-path routing algorithm for IP networks based on flow optimization. It presents an intra-domain routing algorithm that uses multi-commodity flow optimization to enable load-sensitive forwarding over multiple paths without being constrained by traditional routing protocols like OSPF. The key idea is to aggregate all traffic destined for the same egress node into one commodity during optimization, reducing the number of commodities significantly. This makes the computation tractable and allows forwarding based on destination addresses.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORKijngnjournal
The bursting aggregation assembly in edge nodes is one of the key technologies in OBS (Optical Burst Switching) network, which has a direct impact on flow characteristics and packet loss rate. An optical burst assembly technique supporting QoS is presented through this paper, which can automatically adjust the threshold along with the increasing and decreasing volume of business, reduce the operational burst, and generate corresponding BDP (Burst Data Packet) and BCP (Burst Control Packet). In addition to the burst aggregation technique a packet recovery technique by restoration method is also described. The data packet loss due to the physical optical link failure is not currently included in the QoS descriptions. This link failure is also a severe problem which reduces the data throughput of the transmitter node. A mechanism for data recovery from this link failure is vital for guaranteeing the QoS demanded by each user. So this paper will also discusses a specific protocol for reducing the packet loss by utilizing the
features of both optical circuit switching (OCS) and Optical Burst switching (OBS) techniques
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...CSCJournals
This paper discusses Traffic Engineering with Multi-Protocol Label Switching (MPLS) in an Internet Service Provider’s (ISP) network. In this paper, we first briefly describe MPLS, Constraint-based Routing, MPLS-TE, N jobs M machine Job sequencing technique and how to implement the job sequencing technique for Multi-Protocol Label Switching Traffic Engineering. And also improve the quality of service of the network, using this technique firstly reduce the congestion for traffic engineering; minimize the packet loss in complex MPLS domain. In small network packet loss is negligible. We used NS2 discrete event simulator for simulate the above work. Keywords: Traffic Engineering, Multi-Protocol Label Switching, Constraint based routing, N jobs M machine Job Sequencing Technique, Qos, MPLS-TE.
This document proposes a partial prediction algorithm to reduce computational complexity in H.264/AVC 4x4 intra-prediction mode decision. It exploits the inherent symmetry in spatial prediction modes to quickly determine a subset of candidate modes for each 4x4 block. Unlike other fast algorithms, it does not assume a dominant edge is present in each block. By considering pixel-to-pixel correlation and developing simple cost measures from the symmetries, it can search 3 or fewer modes instead of 9 to select the best prediction mode, reducing complexity with minimal impact on quality.
Channel Aware Mac Protocol for Maximizing Throughput and FairnessIJORCS
The proper channel utilization and the queue length aware routing protocol is a challenging task in MANET. To overcome this drawback we are extending the previous work by improving the MAC protocol to maximize the Throughput and Fairness. In this work we are estimating the channel condition and Contention for a channel aware packet scheduling and the queue length is also calculated for the routing protocol which is aware of the queue length. The channel is scheduled based on the channel condition and the routing is carried out by considering the queue length. This queue length will provide a measurement of traffic load at the mobile node itself. Depending upon this load the node with the lesser load will be selected for the routing; this will effectively balance the load and improve the throughput of the ad hoc network.
A comparative study on synchronization algorithms for various modulation tech...IAEME Publication
This document discusses synchronization algorithms for various modulation techniques used in GSM. It begins with an introduction to GSM and modulation techniques like GMSK. It then reviews previous literature on synchronization algorithms for signals like QPSK and CPM. The document proposes a synchronization algorithm for GMSK modulation that uses a symbol-by-symbol demodulator. It evaluates the proposed algorithm by comparing bit error rate and synchronization parameter estimation against other methods. The results show the proposed algorithm achieves better performance than previous methods in terms of SNR, BER and estimation of timing, frequency and phase offsets for GSM standards.
Internet Traffic Engineering for Partially Uncertain DemandsEM Legacy
This document summarizes an academic paper about modeling and solving the problem of routing network traffic with both fixed and uncertain demands. It considers routing strategies that use link metrics to determine shortest paths in IP networks. The proposed model represents uncertain demands using a hose model that specifies maximum aggregate traffic amounts. It calculates link loads by combining loads from fixed demands, maximum outbound uncertain demands, and maximum inbound uncertain demands. Computational results are presented for both multiple and unique shortest path routing strategies to demonstrate the benefits of considering both fixed and uncertain traffic demands.
Improved ant colony optimization for quantum cost reductionjournalBEEI
Heuristic algorithms play a significant role in synthesize and optimization of digital circuits based on reversible logic yet suffer with multiple disadvantages for multiqubit functions like scalability, run time and memory space. Synthesis of reversible logic circuit ends up with trade off between number of gates, quantum cost, ancillary inputs and garbage outputs. Research on optimization of quantum cost seems intractable. Therefore post synthesis optimization needs to be done for reduction of quantum cost. Many researchers have proposed exact synthesis approaches in reversible logic but focussed on reduction of number of gates yet quantum cost remains undefined. The main goal of this paper is to propose improved ant colony optimization (ACO) algorithm for quantum cost reduction. The research efforts reported in this paper represent a significant contribution towards synthesis and optimization of high complexity reversible function via swarm intelligence based approach. The improved ACO algorithm provides low quantum cost based toffoli synthesis of reversible logic function without long computation overhead.
Application of a merit function based interior point method to linear model p...Zac Darcy
This paper present
s
robust linear model predictive control (MPC) technique for small scale linear MPC
problems. The quadratic programming (QP) problem arising in linear MPC is solved using primal dual
interior point method
.
We present
a me
rit function based on a path following strategy
to calculate the step
length
α
, which
forces the convergence of feasible iterates
. The algorithm globally converges to the optimal
solution
of the QP p
roblem while strictly following
the
inequality
constraint
s.
The linear system in the QP
problem is solved using LDL
T
factorizatio
n based linear solver which reduces the computational cost of
linear system to a certain extent
.
We implement this method for
a
linear MPC problem of undamped
oscillator. With the help
of a Kalman filter observer, we show that the MPC design is robust to the external
disturbances and integrated white noise.
An Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc NetworkIJAAS Team
Congestion problem and packet delivery related issues in the vehicular ad hoc network environment is a widely researched problem in recent years. Many network designers utilize various algorithms for the design of ad hoc networks and compare their results with the existing approaches. The design of efficient network protocol is a major challenge in vehicular ad hoc network which utilizes the value of GPS and other parameters associated with the vehicles. In this paper GPSR protocol is improved and compared with the existing GPSR protocol and AODV protocol on the basis of various performance parameters like throughput of the network, delay and packet delivery ratio. The results also validate the performance of the proposed approach.
Comparative analysis of the performance of various active queue management te...IJECEIAES
This paper demonstrates the robustness of active queue management techniques to varying load, link capacity and propagation delay in a wireless environment. The performances of four standard controllers used in Transmission Control Protocol/Active Queue Management (TCP/AQM) systems were compared. The active queue management controllers were the Fixed-Parameter Proportional Integral (PI), Random Early Detection (RED), Self-Tuning Regulator (STR) and the Model Predictive Control (MPC). The robustness of the congestion control algorithm of each technique was documented by simulating the varying conditions using MATLAB® and Simulink® software. From the results obtained, the MPC controller gives the best result in terms of response time and controllability in a wireless network with varying link capacity and propagation delay. Thus, the MPC controller is the best bet when adaptive algorithms are to be employed in a wireless network environment. The MPC controller can also be recommended for heterogeneous networks where the network load cannot be estimated.
An Efficient System for Traffic Control in Networks Using Virtual Routing Top...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Design A Congestion Aware Routing Algorithm for Synchronous Cam Designijtsrd
The effect of process variation (PV) on delay is a major reason to decay the performance in advanced technologies. The performance of front routing algorithms is determined with or without PV for different traffic patterns. The saturation throughput and average message delay are used as performance metrics to evaluate the throughput. PV decreases the saturation throughput and increases the average message delay. Adaptive routing algorithm should be manipulated with the PV. A novel PV delay and congestion aware routing (PDCR) algorithm is presented for asynchronous network-on-chip (NOC) design. The routing algorithm performs various adaptive routing algorithms in the average delay and saturation throughput for different traffic patterns. A low-power content-addressable memory (CAM) by a new algorithm is proposed for associativity between the input tag and the corresponding address of the output data. The proposed architecture is depends on a recently developed sparse clustered network by utilizing binary connections that on-average eliminates most of the parallel comparisons performed during a search. P. Mounica | R. Umamaheswari | R. Madhavi | R. Nischala | N. Ramesh Babu"Design A Congestion Aware Routing Algorithm for Synchronous Cam Design" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11547.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/11547/design-a-congestion-aware-routing-algorithm-for-synchronous-cam-design/p-mounica
Congestion control in computer networks using a modified red aqm algorithmeSAT Journals
Abstract Congestion control plays an important role in network resource management in very large networks with heavy traffic. Active Queue Management (AQM) algorithms are one of the approaches to resolve the congestion problems. Majority of AQM algorithms mainly focus on single queued links. The input queued switches are limited in throughput and output queued switches require a large speedup factor so our attention is directed towards Combined Input and Output Queued (CIOQ) switches. A simple modification to the RED AQM algorithm is proposed in this paper in order to account for the presence of both input and output queues in the switch. The weighted sum of input and output queue lengths are specifically used as the congestion measure instead of just the output queue length. The average backlog in the switch is significantly reduced in the low speedup region by using our modified algorithm as compared to RED without this modification. Simulations show that the loss rate in the modified RED slightly larger than that in traditional RED but the output queue length in modified RED is tremendously reduced. The congestion measure which is computed using weighting factor results in reduction of the average backlog. Using our modified algorithm simulations indicate improvement in the queue length and switch utilization. Keywords: Combined Input and Output Queued (CIOQ), Active Queue Management (AQM), Random Early Detection (RED), congestion, congestion control
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...IJCNCJournal
The routing protocols play an important role in Mobile Ad-Hoc Network (MANET) because of the dynamically change of its topology. Optimized Link State Routing (OLSR), unawareness of Quality of Service (QoS) and power-consumed protocol, is an example of a widely-used routing protocol in MANET.
The Multi-Point Relays (MPR) selection algorithm is very crucial in OLSR. Therefore, firstly, we propose a heuristic method to select the best path based on two parameters; Bit Error Rate (BER) derived from the physical layer and Weighted Connectivity Index (CI) adopted from the network layer. This can be done via the cross-layer design scheme. This is anticipated to enhance the performance of OLSR, provide QoS
guarantee and improve the power consumption. The performances of the proposed scheme are investigated
by simulation of two types of traffics: CBR and VBR (MPEG-4), evaluated by metrics namely Throughput, Packet Delivery Ratio (PDR), Average End-to-End Delay, Control Overhead and Average Total Power Consumption.We compare our results with the typical OLSR and OLSR using only Weighted CI. It is
obvious that our proposed scheme provides superior performances to the typical OLSR and OLSR using only Weighted CI, especially, at high traffic load.
FPGA configuration of an alloyed correlated branch predictor used with RISC p...IJECEIAES
Instructions pipelining is one of the most outstanding techniques used in improving processor speed; nonetheless, these pipelined stages are constantly facing stalls that caused by nested conditional branches. During the execution of nested conditional branches, the behavior of the running branch depends on the history information of the previous ones; therefore, these branches have the greatest effect in reducing the prediction accuracy of a branch predictor among conditional branches. The purpose of this research is to reduce the stall cycles caused by correlated branches misprediction by introducing a hardware model of a branch predictor that combines both local and global prediction techniques. This predictor integrates the prediction characteristics of the alloyed predictor with those of the correlated predictor. the predictor design which implemented in VHDL (Very high-speed IC hardware description language) was inserted in previously designed MIPS (microprocessor without interlocked pipelined stages) processor and its prediction accuracy was confirmed by executing a program using the selection sort algorithm to sort 100 input numbers of different combinations ascendingly.
The document proposes reducing the computational complexity of message passing algorithms like belief propagation (BP) and concave-convex procedure (CCCP) for multiuser detection in CDMA systems. It does this by changing the factor graph structure used to represent the detection problem from a fully connected graph (Factor Graph I) to a sparsely connected graph (Factor Graph II). Simulation results show the proposed CCCP detector for the new factor graph achieves near optimal performance with lower complexity than existing approaches.
The document proposes a new random access scheme called Non-Orthogonal Random Access (NORA) for 5G networks to address the potential large random access delay issue with supporting massive numbers of machine-type devices. NORA utilizes the difference in time of arrival to identify multiple UEs with the same preamble and enables power domain multiplexing of collided UEs. It then applies successive interference cancellation at the base station based on obtained channel conditions to improve performance over the conventional orthogonal random access scheme in terms of preamble collision probability, access success probability, and throughput. Analysis and simulations show that NORA can improve the number of supported UEs by more than 30% and significantly reduce the number of preamble transmissions and access delay for successfully accessed
Model Validation and Control of an In-Wheel DC Motor Prototype for Hybrid El...Scientific Review SR
In this paper, a mathematical model and a controller for a DC motor are developed for the
construction of an in-wheel motor. In-wheel motors can be used in hybrid electric vehicles to provide traction
force of front or rear wheels. The model identification is achieved using a simple and low cost data acquisition
system. An Arduino Uno embedded board system is used to collect data from sensors to a computer and for
control purposes. Data processing is performed using Matlab/Simulink. Validations of the devel oped
mathematical model and controller performance are carried out by comparing simulation and experimental results.
The results obtained show that the mathematical model is accurate enough to assist in speed controller design and
implementation.
This document presents an intelligent link adaptation scheme for OFDM systems that adapts coding, modulation, and power allocation to maximize throughput. It uses a fuzzy rule-based system to select the optimal modulation and coding scheme based on channel state information and quality of service requirements. It then uses a differential evolution algorithm to find the optimal power vector to transmit over OFDM subcarriers while satisfying total power and bit error rate constraints. The proposed scheme is shown through simulations to outperform conventional fixed schemes and adaptive schemes that only optimize a subset of parameters. Product codes and QAM are used as the coding and modulation schemes, respectively.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORKijngnjournal
The bursting aggregation assembly in edge nodes is one of the key technologies in OBS (Optical Burst Switching) network, which has a direct impact on flow characteristics and packet loss rate. An optical burst assembly technique supporting QoS is presented through this paper, which can automatically adjust the threshold along with the increasing and decreasing volume of business, reduce the operational burst, and generate corresponding BDP (Burst Data Packet) and BCP (Burst Control Packet). In addition to the burst aggregation technique a packet recovery technique by restoration method is also described. The data packet loss due to the physical optical link failure is not currently included in the QoS descriptions. This link failure is also a severe problem which reduces the data throughput of the transmitter node. A mechanism for data recovery from this link failure is vital for guaranteeing the QoS demanded by each user. So this paper will also discusses a specific protocol for reducing the packet loss by utilizing the
features of both optical circuit switching (OCS) and Optical Burst switching (OBS) techniques
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...CSCJournals
This paper discusses Traffic Engineering with Multi-Protocol Label Switching (MPLS) in an Internet Service Provider’s (ISP) network. In this paper, we first briefly describe MPLS, Constraint-based Routing, MPLS-TE, N jobs M machine Job sequencing technique and how to implement the job sequencing technique for Multi-Protocol Label Switching Traffic Engineering. And also improve the quality of service of the network, using this technique firstly reduce the congestion for traffic engineering; minimize the packet loss in complex MPLS domain. In small network packet loss is negligible. We used NS2 discrete event simulator for simulate the above work. Keywords: Traffic Engineering, Multi-Protocol Label Switching, Constraint based routing, N jobs M machine Job Sequencing Technique, Qos, MPLS-TE.
This document proposes a partial prediction algorithm to reduce computational complexity in H.264/AVC 4x4 intra-prediction mode decision. It exploits the inherent symmetry in spatial prediction modes to quickly determine a subset of candidate modes for each 4x4 block. Unlike other fast algorithms, it does not assume a dominant edge is present in each block. By considering pixel-to-pixel correlation and developing simple cost measures from the symmetries, it can search 3 or fewer modes instead of 9 to select the best prediction mode, reducing complexity with minimal impact on quality.
Channel Aware Mac Protocol for Maximizing Throughput and FairnessIJORCS
The proper channel utilization and the queue length aware routing protocol is a challenging task in MANET. To overcome this drawback we are extending the previous work by improving the MAC protocol to maximize the Throughput and Fairness. In this work we are estimating the channel condition and Contention for a channel aware packet scheduling and the queue length is also calculated for the routing protocol which is aware of the queue length. The channel is scheduled based on the channel condition and the routing is carried out by considering the queue length. This queue length will provide a measurement of traffic load at the mobile node itself. Depending upon this load the node with the lesser load will be selected for the routing; this will effectively balance the load and improve the throughput of the ad hoc network.
A comparative study on synchronization algorithms for various modulation tech...IAEME Publication
This document discusses synchronization algorithms for various modulation techniques used in GSM. It begins with an introduction to GSM and modulation techniques like GMSK. It then reviews previous literature on synchronization algorithms for signals like QPSK and CPM. The document proposes a synchronization algorithm for GMSK modulation that uses a symbol-by-symbol demodulator. It evaluates the proposed algorithm by comparing bit error rate and synchronization parameter estimation against other methods. The results show the proposed algorithm achieves better performance than previous methods in terms of SNR, BER and estimation of timing, frequency and phase offsets for GSM standards.
Internet Traffic Engineering for Partially Uncertain DemandsEM Legacy
This document summarizes an academic paper about modeling and solving the problem of routing network traffic with both fixed and uncertain demands. It considers routing strategies that use link metrics to determine shortest paths in IP networks. The proposed model represents uncertain demands using a hose model that specifies maximum aggregate traffic amounts. It calculates link loads by combining loads from fixed demands, maximum outbound uncertain demands, and maximum inbound uncertain demands. Computational results are presented for both multiple and unique shortest path routing strategies to demonstrate the benefits of considering both fixed and uncertain traffic demands.
Improved ant colony optimization for quantum cost reductionjournalBEEI
Heuristic algorithms play a significant role in synthesize and optimization of digital circuits based on reversible logic yet suffer with multiple disadvantages for multiqubit functions like scalability, run time and memory space. Synthesis of reversible logic circuit ends up with trade off between number of gates, quantum cost, ancillary inputs and garbage outputs. Research on optimization of quantum cost seems intractable. Therefore post synthesis optimization needs to be done for reduction of quantum cost. Many researchers have proposed exact synthesis approaches in reversible logic but focussed on reduction of number of gates yet quantum cost remains undefined. The main goal of this paper is to propose improved ant colony optimization (ACO) algorithm for quantum cost reduction. The research efforts reported in this paper represent a significant contribution towards synthesis and optimization of high complexity reversible function via swarm intelligence based approach. The improved ACO algorithm provides low quantum cost based toffoli synthesis of reversible logic function without long computation overhead.
Application of a merit function based interior point method to linear model p...Zac Darcy
This paper present
s
robust linear model predictive control (MPC) technique for small scale linear MPC
problems. The quadratic programming (QP) problem arising in linear MPC is solved using primal dual
interior point method
.
We present
a me
rit function based on a path following strategy
to calculate the step
length
α
, which
forces the convergence of feasible iterates
. The algorithm globally converges to the optimal
solution
of the QP p
roblem while strictly following
the
inequality
constraint
s.
The linear system in the QP
problem is solved using LDL
T
factorizatio
n based linear solver which reduces the computational cost of
linear system to a certain extent
.
We implement this method for
a
linear MPC problem of undamped
oscillator. With the help
of a Kalman filter observer, we show that the MPC design is robust to the external
disturbances and integrated white noise.
An Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc NetworkIJAAS Team
Congestion problem and packet delivery related issues in the vehicular ad hoc network environment is a widely researched problem in recent years. Many network designers utilize various algorithms for the design of ad hoc networks and compare their results with the existing approaches. The design of efficient network protocol is a major challenge in vehicular ad hoc network which utilizes the value of GPS and other parameters associated with the vehicles. In this paper GPSR protocol is improved and compared with the existing GPSR protocol and AODV protocol on the basis of various performance parameters like throughput of the network, delay and packet delivery ratio. The results also validate the performance of the proposed approach.
Comparative analysis of the performance of various active queue management te...IJECEIAES
This paper demonstrates the robustness of active queue management techniques to varying load, link capacity and propagation delay in a wireless environment. The performances of four standard controllers used in Transmission Control Protocol/Active Queue Management (TCP/AQM) systems were compared. The active queue management controllers were the Fixed-Parameter Proportional Integral (PI), Random Early Detection (RED), Self-Tuning Regulator (STR) and the Model Predictive Control (MPC). The robustness of the congestion control algorithm of each technique was documented by simulating the varying conditions using MATLAB® and Simulink® software. From the results obtained, the MPC controller gives the best result in terms of response time and controllability in a wireless network with varying link capacity and propagation delay. Thus, the MPC controller is the best bet when adaptive algorithms are to be employed in a wireless network environment. The MPC controller can also be recommended for heterogeneous networks where the network load cannot be estimated.
An Efficient System for Traffic Control in Networks Using Virtual Routing Top...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Design A Congestion Aware Routing Algorithm for Synchronous Cam Designijtsrd
The effect of process variation (PV) on delay is a major reason to decay the performance in advanced technologies. The performance of front routing algorithms is determined with or without PV for different traffic patterns. The saturation throughput and average message delay are used as performance metrics to evaluate the throughput. PV decreases the saturation throughput and increases the average message delay. Adaptive routing algorithm should be manipulated with the PV. A novel PV delay and congestion aware routing (PDCR) algorithm is presented for asynchronous network-on-chip (NOC) design. The routing algorithm performs various adaptive routing algorithms in the average delay and saturation throughput for different traffic patterns. A low-power content-addressable memory (CAM) by a new algorithm is proposed for associativity between the input tag and the corresponding address of the output data. The proposed architecture is depends on a recently developed sparse clustered network by utilizing binary connections that on-average eliminates most of the parallel comparisons performed during a search. P. Mounica | R. Umamaheswari | R. Madhavi | R. Nischala | N. Ramesh Babu"Design A Congestion Aware Routing Algorithm for Synchronous Cam Design" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11547.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/11547/design-a-congestion-aware-routing-algorithm-for-synchronous-cam-design/p-mounica
Congestion control in computer networks using a modified red aqm algorithmeSAT Journals
Abstract Congestion control plays an important role in network resource management in very large networks with heavy traffic. Active Queue Management (AQM) algorithms are one of the approaches to resolve the congestion problems. Majority of AQM algorithms mainly focus on single queued links. The input queued switches are limited in throughput and output queued switches require a large speedup factor so our attention is directed towards Combined Input and Output Queued (CIOQ) switches. A simple modification to the RED AQM algorithm is proposed in this paper in order to account for the presence of both input and output queues in the switch. The weighted sum of input and output queue lengths are specifically used as the congestion measure instead of just the output queue length. The average backlog in the switch is significantly reduced in the low speedup region by using our modified algorithm as compared to RED without this modification. Simulations show that the loss rate in the modified RED slightly larger than that in traditional RED but the output queue length in modified RED is tremendously reduced. The congestion measure which is computed using weighting factor results in reduction of the average backlog. Using our modified algorithm simulations indicate improvement in the queue length and switch utilization. Keywords: Combined Input and Output Queued (CIOQ), Active Queue Management (AQM), Random Early Detection (RED), congestion, congestion control
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...IJCNCJournal
The routing protocols play an important role in Mobile Ad-Hoc Network (MANET) because of the dynamically change of its topology. Optimized Link State Routing (OLSR), unawareness of Quality of Service (QoS) and power-consumed protocol, is an example of a widely-used routing protocol in MANET.
The Multi-Point Relays (MPR) selection algorithm is very crucial in OLSR. Therefore, firstly, we propose a heuristic method to select the best path based on two parameters; Bit Error Rate (BER) derived from the physical layer and Weighted Connectivity Index (CI) adopted from the network layer. This can be done via the cross-layer design scheme. This is anticipated to enhance the performance of OLSR, provide QoS
guarantee and improve the power consumption. The performances of the proposed scheme are investigated
by simulation of two types of traffics: CBR and VBR (MPEG-4), evaluated by metrics namely Throughput, Packet Delivery Ratio (PDR), Average End-to-End Delay, Control Overhead and Average Total Power Consumption.We compare our results with the typical OLSR and OLSR using only Weighted CI. It is
obvious that our proposed scheme provides superior performances to the typical OLSR and OLSR using only Weighted CI, especially, at high traffic load.
FPGA configuration of an alloyed correlated branch predictor used with RISC p...IJECEIAES
Instructions pipelining is one of the most outstanding techniques used in improving processor speed; nonetheless, these pipelined stages are constantly facing stalls that caused by nested conditional branches. During the execution of nested conditional branches, the behavior of the running branch depends on the history information of the previous ones; therefore, these branches have the greatest effect in reducing the prediction accuracy of a branch predictor among conditional branches. The purpose of this research is to reduce the stall cycles caused by correlated branches misprediction by introducing a hardware model of a branch predictor that combines both local and global prediction techniques. This predictor integrates the prediction characteristics of the alloyed predictor with those of the correlated predictor. the predictor design which implemented in VHDL (Very high-speed IC hardware description language) was inserted in previously designed MIPS (microprocessor without interlocked pipelined stages) processor and its prediction accuracy was confirmed by executing a program using the selection sort algorithm to sort 100 input numbers of different combinations ascendingly.
The document proposes reducing the computational complexity of message passing algorithms like belief propagation (BP) and concave-convex procedure (CCCP) for multiuser detection in CDMA systems. It does this by changing the factor graph structure used to represent the detection problem from a fully connected graph (Factor Graph I) to a sparsely connected graph (Factor Graph II). Simulation results show the proposed CCCP detector for the new factor graph achieves near optimal performance with lower complexity than existing approaches.
The document proposes a new random access scheme called Non-Orthogonal Random Access (NORA) for 5G networks to address the potential large random access delay issue with supporting massive numbers of machine-type devices. NORA utilizes the difference in time of arrival to identify multiple UEs with the same preamble and enables power domain multiplexing of collided UEs. It then applies successive interference cancellation at the base station based on obtained channel conditions to improve performance over the conventional orthogonal random access scheme in terms of preamble collision probability, access success probability, and throughput. Analysis and simulations show that NORA can improve the number of supported UEs by more than 30% and significantly reduce the number of preamble transmissions and access delay for successfully accessed
Model Validation and Control of an In-Wheel DC Motor Prototype for Hybrid El...Scientific Review SR
In this paper, a mathematical model and a controller for a DC motor are developed for the
construction of an in-wheel motor. In-wheel motors can be used in hybrid electric vehicles to provide traction
force of front or rear wheels. The model identification is achieved using a simple and low cost data acquisition
system. An Arduino Uno embedded board system is used to collect data from sensors to a computer and for
control purposes. Data processing is performed using Matlab/Simulink. Validations of the devel oped
mathematical model and controller performance are carried out by comparing simulation and experimental results.
The results obtained show that the mathematical model is accurate enough to assist in speed controller design and
implementation.
This document presents an intelligent link adaptation scheme for OFDM systems that adapts coding, modulation, and power allocation to maximize throughput. It uses a fuzzy rule-based system to select the optimal modulation and coding scheme based on channel state information and quality of service requirements. It then uses a differential evolution algorithm to find the optimal power vector to transmit over OFDM subcarriers while satisfying total power and bit error rate constraints. The proposed scheme is shown through simulations to outperform conventional fixed schemes and adaptive schemes that only optimize a subset of parameters. Product codes and QAM are used as the coding and modulation schemes, respectively.
This document summarizes the simulation steps for investigating the performance of three multi-carrier code division multiple access (MC-CDMA) techniques: conventional MC-CDMA, orthogonal wavelet packet based MC-CDMA (WP-MC-CDMA), and Huang Hilbert Transformation (HHT) based MC-CDMA. The steps include designing the three systems, simulating them with different modulation techniques under fading channels, and comparing their bit error rate performance. Numerical and simulation results are presented to validate the proposed schemes.
This document summarizes the simulation steps for investigating the performance of three multi-carrier code division multiple access (MC-CDMA) techniques: conventional MC-CDMA, orthogonal wavelet packet based MC-CDMA (WP-MC-CDMA), and Huang Hilbert Transformation (HHT) based MC-CDMA. The steps include designing the three systems, simulating them with different modulation techniques under fading channels, and comparing their bit error rate performance. Numerical and simulation results are presented to validate the proposed schemes.
The document summarizes a research paper on the design of high-speed low-power Viterbi decoders for trellis coded modulation systems. It proposes a pre-computation architecture incorporated with the T-algorithm to effectively reduce power consumption without degrading decoding speed. The key aspects are:
1) A pre-computation approach is presented to calculate the optimal path metric in advance, allowing it to be determined faster and avoiding delays in the feedback loop.
2) A method is provided to systematically determine the optimal number of pre-computation steps needed to achieve the theoretical iteration bound for the Viterbi decoder.
3) Implementation results show the proposed pre-computation architecture can reduce power consumption by up to 70% without loss
The efficient interleaving of digital-video-broadcasting-satellite 2nd genera...TELKOMNIKA JOURNAL
The DVB-S2 system is designed as a toolbox to permit the execution of the satellite programs. Interleaver is an essential part of the DVB-S2 system. The current general block interleaver in DVB-S2 is not best, which leads to high BER and maybe not satisfy the requirements of the system. The purpose of this paper is to study the several interleaver types and comparative analyses are done between them to find which of these give better performance. Simulations results obtained prove that the 2D interleavers minimize BER more than other interleavers of DVB-S2. Further, the performance of 2D interleaver is better on a system that required a low SNR.
Two-level inverter control with type-1 and type-2 fuzzy logic-based space vector pulse-width modulation (PWM) method for induction motor drive (IMD) is presented in this paper. A new sampling time independent strategy with type-1 and type-2 fuzzy based methods are used in generating three phase duty ratios which are directly obtained without mathematical equations. The conventional method of space vector modulation (SVM) produces the duty ratios for the inverter which are sampling time dependent. However, in type-1 and type-2 fuzzy based space vector PWM algorithms, the three phases duty ratios generated are sampling time independent and with a new integrated dead-time insertion in SVM itself, can be implemented practically for any switching frequency. As the rule-base for Mamdani non-singleton interval type-1 and type-2 fuzzy inference systems are designed manually, with the expert knowledge of conventional space vector PWM, the duty ratios of the inverter are generated such that the performance of the IMD is improved. The simulation studies for aforementioned cases is performed in matrix laboratory (MATLAB) and experimental validation for the proposed space vector PWM algorithms is validated using real-time sacraetheologiae magister (STM) hardware with STM32F429I Cortex M4 processor for a 1 hp IMD.
Transmission line is one the important compnent in protection of electric power system because the transmission line connects the power station with load centers.
The fault includes storms, lightning, snow, damage to insulation, short circuit fault [1].
Fault needs to be predicted earlier in order to be prevented before it occur
Design and analysis of a model predictive controller for active queue managementISA Interchange
Model predictive (MP) control as a novel active queue management (AQM) algorithm in dynamic computer networks is proposed. According to the predicted future queue length in the data buffer, early packets at the router are dropped reasonably by the MPAQM controller so that the queue length reaches the desired value with minimal tracking error. The drop probability is obtained by optimizing the network performance. Further, randomized algorithms are applied to analyze the robustness of MPAQM successfully, and also to provide the stability domain of systems with uncertain network parameters. The performances of MPAQM are evaluated through a series of simulations in NS2. The simulation results show that the MPAQM algorithm outperforms RED, PI, and REM algorithms in terms of stability, disturbance rejection, and robustness.
Performance evaluation of high mobility OFDM channel estimation techniques IJECEIAES
In wireless communication, Orthogonal Frequency Division Multiplexing (OFDM) has been adopted due to its robustness to multipath fading and high data rate transmissions. At the other hand, the performance of OFDM systems severely degraded due to multi-path fading and Doppler frequency shifts in mobile systems, which causes inter-carrier-interference (ICI). Thus, Estimation of channel parameters is required at the receiver using a pre designed estimator where pilot tones are inserted in each OFDM symbol. In this paper, a random pilot data are generated and inserted in each OFDM symbol at equally spaced locations. The performance test of Least Square (LS) and Linear Minimum Mean Square (LMMSE) estimation methods are proposed with Discrete Fourier Transform (DFT) based on both LS and LMMSE, where different ITU channel models are considered in order to compare their performance for data transmission in high mobile systems with different Doppler frequencies exceeds 200 Hz and minimal number of pilots.
A probabilistic multi-objective approach for FACTS devices allocation with di...IJECEIAES
This study presents a probabilistic multi-objective optimization approach to obtain the optimal locations and sizes of static var compensator (SVC) and thyristor-controlled series capacitor (TCSC) in a power transmission network with large level of wind generation. In this study, the uncertainties of the wind power generation and correlated load demand are considered. The uncertainties are modeled in this work using the points estimation method (PEM). The optimization problem is solved using the multi-objective particle swarm optimization (MOPSO) algorithm to find the best position and rating of the flexible AC transmission system (FACTS) devices. The objective of the problem is to maximize the system loadability while minimizing the power losses and FACTS devices installation cost. Additionally, a technique based on fuzzy decision-making approach is employed to extract one of the Pareto optimal solutions as the best compromise one. The proposed approach is applied on the modified IEEE 30bus system. The numerical results evince the effectiveness of the proposed approach and shows the economic benefits that can be achieved when considering the FACTS controller.
This document proposes using Particle Swarm Optimization (PSO) to detect faults on overhead transmission lines. It will involve simulating various fault types using PSCAD/EMTDC software, developing mathematical models of the voltage and current signals, and applying PSO in MATLAB to analyze the signals and detect faults. Preliminary results show simulation of five fault types. The developed method is expected to accurately detect faults before disturbances occur to maintain power system stability.
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORMsipij
In this paper the Delay Computation method for Common Sub expression Elimination algorithm is being implemented on Cyclotomic Fast Fourier Transform. The Common Sub Expression Elimination algorithm is combined with the delay computing method and is known as Gate Level Delay Computation with Common Sub expression Elimination Algorithm. Common sub expression elimination is effective
optimization method used to reduce adders in cyclotomic Fourier transform. The delay computing method is based on delay matrix and suitable for implementation with computers. The Gate level delay computation method is used to find critical path delay and it is analyzed on various finite field elements. The presented algorithm is established through a case study in Cyclotomic Fast Fourier Transform over finite field. If Cyclotomic Fast Fourier Transform is implemented directly then the system will have high additive complexities. So by using GLDC-CSE algorithm on cyclotomic fast Fourier transform, the additive
complexities will be reduced and also the area and area delay product will be reduced.
Proportional-integral genetic algorithm controller for stability of TCP network IJECEIAES
The life development and increase the number of internet users imposed an increase in data circulating on the internet network and then make the network more congestion. As a result of all this, some problems arose such as time delay in packets delivery, loss of packets, and exceed the buffer capacity for the middle routers. To overcome those problems, transmission control protocol and active queue management (TCP/AQM) have been used. AQM is the main approach used to control congestion and overcome those problems to improve network performance. This work proposes to use the proportional-integral (PI) controller with a genetic algorithm (GA) as an active queue manager for routers of the Internet. The simulation results show a good performance for managing the congestion with using proportionalintegral genetic algorithm (GA-PI) controller better than the PI controller.
Implementation of a bit error rate tester of a wireless communication system ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The use of Markov Chain method to determine spare transformer number and loca...IJECEIAES
The purpose of this study is to develop a method to determine spare transformer number and location. Using Markov Chain method, state transition model and steady state probability was used on each 500-kV substation in order to analyze the effect of spare number and location variation with the reliability changes. To give an actual result of the case study, calculation of spare transformer number and location on 500/150 kV transformers in Java Bali System was analyzed. The steady state probability results will vary depending on the number of spare transformer, these results can then be used to assess the spare transformer needed. The variation of spare transformer location can be used to analyze the best possible location of the spare in order to satisfy the reliability required. The methodology presented shows an integrated calculation for determining the spare transformer number and location.
Metamodel-based Optimization of a PID Controller Parameters for a Coupled-tan...TELKOMNIKA JOURNAL
Liquid flow and level control are essential requirements in various industries, such as paper
manufacturing, petrochemical industries, waste management, and others. Controlling the liquids flow and
levels in such industries is challenging due to the existence of nonlinearity and modeling uncertainties of
the plants. This paper presents a method to control the liquid level in a second tank of a coupled-tank plant
through variable manipulation of a water pump in the first tank. The optimum controller parameters of this
plant are calculated using radial basis function neural network metamodel. A time-varying nonlinear
dynamic model is developed and the corresponding linearized perturbation models are derived from the
nonlinear model. The performance of the developed optimized controller using metamodeling is compared
with the original large space design. In addition, linearized perturbation models are derived from the
nonlinear dynamic model with time-varying parameters.
Reconfigurable Design of Rectangular to Polar Converter using Linear ConvergenceAnuragVijayAgrawal
This document summarizes a research paper that proposes a design for a rectangular to polar converter using a linear convergence algorithm called CORDIC. It discusses how CORDIC iteratively rotates vectors to extract phase and magnitude information in a way that is efficient for FPGAs. The proposed design implements CORDIC in fully parallel form to maximize throughput. It was synthesized and tested on an FPGA, with results showing it can operate at 177.62 MHz with relatively low hardware requirements. Behavioral simulations verified the design matches the expected output.
Generalized optimal placement of PMUs considering power system observability,...IJECEIAES
This paper presents a generalized optimal placement of Phasor Measurement Units (PMUs) considering power system observability, reliability, Communication Infrastructure (CI), and latency time associated with this CI. Moreover, the economic study for additional new data transmission paths is considered as well as the availability of predefined locations of some PMUs and the preexisting communication devices (CDs) in some buses. Two cases for the location of the Control Center Base Station (CCBS) are considered; predefined case and free selected case. The PMUs placement and their required communication network topology and channel capacity are co-optimized simultaneously. In this study, two different approaches are applied to optimize the objective function; the first approach is combined from Binary Particle Swarm Optimization-Gravitational Search Algorithm (BPSOGSA) and the Minimum Spanning Tree (MST) algorithm, while the second approach is based only on BPSOGSA. The feasibility of the proposed approaches are examined by applying it to IEEE 14-bus and IEEE 118-bus systems.
Model predictive control (MPC) is an advanced contr
ol algorithm that has been very successful in the
control industries due to its capability of handlin
g multi input multi output (MIMO) systems with phys
ical
constraints. In MPC, the control action are obtaine
d by solving a constrained optimization problem at
every sample interval to minimize the difference be
tween the predicted outputs and the reference value
through the using of minimum control energy and sat
isfying the constraints of the physical system.
Quadratic programing (QP) problem is solved using Q
PKWIK method which improves the active set
method. The system architecture and design for the
implementation of online MPC on the FPGA is taken
into consideration in this paper to control a DC mo
tor. This implementation is completed using Spartan
6
Nexys3 FPGA chip using simulation environment (EDK
tool) and the comparison between MPC and PID
controller is also established.
Similar to Exploiting 2-Dimensional Source Correlation in Channel Decoding with Parameter Estimation (20)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Neural network optimizer of proportional-integral-differential controller par...IJECEIAES
Wide application of proportional-integral-differential (PID)-regulator in industry requires constant improvement of methods of its parameters adjustment. The paper deals with the issues of optimization of PID-regulator parameters with the use of neural network technology methods. A methodology for choosing the architecture (structure) of neural network optimizer is proposed, which consists in determining the number of layers, the number of neurons in each layer, as well as the form and type of activation function. Algorithms of neural network training based on the application of the method of minimizing the mismatch between the regulated value and the target value are developed. The method of back propagation of gradients is proposed to select the optimal training rate of neurons of the neural network. The neural network optimizer, which is a superstructure of the linear PID controller, allows increasing the regulation accuracy from 0.23 to 0.09, thus reducing the power consumption from 65% to 53%. The results of the conducted experiments allow us to conclude that the created neural superstructure may well become a prototype of an automatic voltage regulator (AVR)-type industrial controller for tuning the parameters of the PID controller.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
A review on features and methods of potential fishing zoneIJECEIAES
This review focuses on the importance of identifying potential fishing zones in seawater for sustainable fishing practices. It explores features like sea surface temperature (SST) and sea surface height (SSH), along with classification methods such as classifiers. The features like SST, SSH, and different classifiers used to classify the data, have been figured out in this review study. This study underscores the importance of examining potential fishing zones using advanced analytical techniques. It thoroughly explores the methodologies employed by researchers, covering both past and current approaches. The examination centers on data characteristics and the application of classification algorithms for classification of potential fishing zones. Furthermore, the prediction of potential fishing zones relies significantly on the effectiveness of classification algorithms. Previous research has assessed the performance of models like support vector machines, naïve Bayes, and artificial neural networks (ANN). In the previous result, the results of support vector machine (SVM) were 97.6% more accurate than naive Bayes's 94.2% to classify test data for fisheries classification. By considering the recent works in this area, several recommendations for future works are presented to further improve the performance of the potential fishing zone models, which is important to the fisheries community.
Electrical signal interference minimization using appropriate core material f...IJECEIAES
As demand for smaller, quicker, and more powerful devices rises, Moore's law is strictly followed. The industry has worked hard to make little devices that boost productivity. The goal is to optimize device density. Scientists are reducing connection delays to improve circuit performance. This helped them understand three-dimensional integrated circuit (3D IC) concepts, which stack active devices and create vertical connections to diminish latency and lower interconnects. Electrical involvement is a big worry with 3D integrates circuits. Researchers have developed and tested through silicon via (TSV) and substrates to decrease electrical wave involvement. This study illustrates a novel noise coupling reduction method using several electrical involvement models. A 22% drop in electrical involvement from wave-carrying to victim TSVs introduces this new paradigm and improves system performance even at higher THz frequencies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELijaia
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Supermarket Management System Project Report.pdfKamal Acharya
Supermarket management is a stand-alone J2EE using Eclipse Juno program.
This project contains all the necessary required information about maintaining
the supermarket billing system.
The core idea of this project to minimize the paper work and centralize the
data. Here all the communication is taken in secure manner. That is, in this
application the information will be stored in client itself. For further security the
data base is stored in the back-end oracle and so no intruders can access it.
Gas agency management system project report.pdfKamal Acharya
The project entitled "Gas Agency" is done to make the manual process easier by making it a computerized system for billing and maintaining stock. The Gas Agencies get the order request through phone calls or by personal from their customers and deliver the gas cylinders to their address based on their demand and previous delivery date. This process is made computerized and the customer's name, address and stock details are stored in a database. Based on this the billing for a customer is made simple and easier, since a customer order for gas can be accepted only after completing a certain period from the previous delivery. This can be calculated and billed easily through this. There are two types of delivery like domestic purpose use delivery and commercial purpose use delivery. The bill rate and capacity differs for both. This can be easily maintained and charged accordingly.
VARIABLE FREQUENCY DRIVE. VFDs are widely used in industrial applications for...PIMR BHOPAL
Variable frequency drive .A Variable Frequency Drive (VFD) is an electronic device used to control the speed and torque of an electric motor by varying the frequency and voltage of its power supply. VFDs are widely used in industrial applications for motor control, providing significant energy savings and precise motor operation.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Software Engineering and Project Management - Software Testing + Agile Method...Prakhyath Rai
Software Testing: A Strategic Approach to Software Testing, Strategic Issues, Test Strategies for Conventional Software, Test Strategies for Object -Oriented Software, Validation Testing, System Testing, The Art of Debugging.
Agile Methodology: Before Agile – Waterfall, Agile Development.
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2633 – 2642
2634
techniques to estimate the source correlation at the receiver to ensure the performance is improved and
applicable in real practices [12], [13].
Several methods of parameter estimation have been presented in various studies based on a Hidden
Markov Model (HMM) such as the Baum-Welch Algorithm (BWA) [14]-[20]. This enables the decoder to
utilize the estimated statistics of the source correlation knowledge in channel decoding to improve the system
performance. In this paper, we propose 2D JSCC system with BWA-based estimation technique to estimate
the source correlation knowledge at the channel decoder on the non-HMM model to get the performance as
close as possible to the ideal system. The proposed design is then compared with the existing 2D JSCC
system with the perfect assumption on source correlation knowledge or known as the ideal 2D JSCC system
[9] and another technique of parameter estimation exploiting the extrinsic information gleaned from the
decoders adopted from [11].
This paper has been organised in the following way. The related works of parameter estimation
techniques on channel decoding and the mechanism of BWA are discussed in Section 2. The proposed model
on the coding scheme is presented in Section 3. Section 4 deliberates on the difference between BER
performance from the proposed coding scheme and existing work. Finally, Section 5 draws upon the entire
thesis, gives a conclusion and identifies areas for further research.
2. RELATED WORKS ON PARAMETER ESTIMATION TECHNIQUES
2.1. Parameter estimation on turbo decoder
Several attempts have been made previously to describe the parameter estimation of Markov model
at the Turbo decoder in [15], [16]. These approaches have known to be complex due to the essence of
building the supertrellises combining both constituent encoders and the HMM models. The modification on
the decoder [17] has been done to improve the performance while the simplified method for modifying a
decoder has been described in [18] to reduce its complexity while maintaining the same performance as in
[16]. The parameter estimation has been refined in [19] to enhance the connection between BWA as the
parameter estimation technique and Turbo decoder. BWA is implemented in the first iteration in order to
have an initial estimation of Hidden Markov source parameters. The correlation pattern is considered and
characterized by HMM [19]. The expected number of transitions from state to state that generate correlation
pattern v are represented by the product of the branch probability and the number of trellis transitions. Hence,
making it easy to estimate the expected state transition. Anwar, in [20], suggested that the stability and
efficient exploitation of BWA can be improved by using a forward-backward algorithm or the uni-directional
algorithm.
2.2. The simplified Baum-Welsh algorithm
The potential algorithm associated with the learning problem of an HMM is the BWA which has
been developed in 1970 [21] and also known as Forward-Backward algorithm which is considered as the
unique case of the Expectation-Maximization or EM algorithm [22]. In the learning problem, the parameters
of an HMM denoted as are developed and adjusted depending on the applications given an observation
sequence O and the set of possible states Q. Meanwhile, for the non-HMM considered in this work, we only
used one parameter to be estimated to reduce the complexity of the system while maintaining its peak
performance. In this method, only transition probabilities are used to estimate the source statistics in the
decoder. The equation of transition probability is adopted from the previous work done by Garcia-Frias and
Villasenor in [19]. The BWA is generally performed by calculated the initial estimation for the probabilities,
and iteratively uses the information from the estimated value to perform better estimation upon the
probabilities on the next iteration. The forward variables can be given as:
1 2( ) ( , , , , | ) ,t t ti P o o o q i
(1)
where is forward variable, and is the partial observation sequence while the backward variable can be stated
as:
1 2( ) ( , , , | , ) ,t t t t ti P o o o q i
(2)
where
( )t i is the probability of the partial sequence 1 2, , ,t t to o o
at the current state .i
3. Int J Elec & Comp Eng ISSN: 2088-8708
Exploiting 2-Dimensional Source Correlation in Channel Decoding … (Muhammad Izzat Amir Mohd Nor)
2635
The forward and backward variables in Equation (1) and Equation (2), respectively can be
implemented to initialize the transition probability. The transition probability can be estimated as
expected number of transitions from state to state
ˆ
expected number of transitions from state
ij
i j
a
i
(3)
In order to calculate the numerator of, the joint probability of being in state at time and state at time denoted
as is defined as:
1( , ) ( , | , ) ,t t ti j P q i q j O (4)
where the observation sequence and are given. The equation also can be written as:
1( , | , )
( , ) .
( | )
t t
t
P q i q j O
i j
P O
(5)
By using the forward and backward variables, the final equation of can be modeled as
1 1( ) ( ( ))
( , ) ,
( )
t ij j t t
t
T
i a b o j
i j
qF
(6)
where is the final state.
Thus, the numerator of the transition probability can be calculated as a summation of for all t while the
denominator of which is the summation of all the expected number of transitions in state can be denoted The
final formula for can be stated as
1
1
1
1 1
( , )
ˆ .
( , )
T
t
t
ij T N
t
t k
i j
a
i k
(7)
In summary, the estimation of the transition probability can be re-estimated using Equation (7) again to
exploit the previous estimated value. The re-estimation process is considered as the basis of the iterative
forward-backward algorithm.
3. SYSTEM DESIGN
Figure 1 illustrates the top-level design of the proposed communication system. The source natural
redundancy was considered in this study for simplicity and generalization purposes as there is no source
encoder employed in the proposed system. The source is a 2D binary source having a 2D source correlation.
The 2D source is converted into a 1D sequence represented by a vector u before being encoded by a channel
encoder to output the encoded sequence c. Then, the encoded sequence c is modulated by a BPSK modulator
to generate modulated output sequence g before being transmitted over an AWGN channel. During the
modulation process, the binary encoded sequence is transformed into a signal form that can be physically
transmitted, i.e., bit 0 maps to a signal amplitude -1 and bit 1 maps to a signal amplitude 1.
In a real environment, distortion and noise always be the factors that disturb the received signal at
the receiver. Most commonly used and simple model to denote the channel behaviors of a communication
system is the Additive White Gaussian Noise (AWGN), which is due to the thermal noise produced by the
electronic hardwares and devices. In this model, the independent Gaussian noise signals with zero mean n
and variance are added to the transmitted signal g. The energy of the transmitted signal is normalized to 1 and
the examined energy per bit to noise power spectral density ratio, is used to measure the channel quality. The
signal will be distorted and sent to the receiver as z = g + n. At the receiver, the received signal sequence z is
demodulated by a BPSK demodulator to generate an output sequence r. The a posteriori information of the
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2633 – 2642
2636
source correlation knowledge is estimated during channel decoding using the proposed parameter estimation
technique. The new estimated value of source correlation knowledge is exploited at the decoder before
outputting the decoded binary sequence. The detail of the proposed transmitter and receiver model will be
presented in the following sections.
Figure 1. General view of the proposed JSCC design
3.1. Transmitter design
The proposed encoder employs two channel codes that are serially concatenated to each otherwhich
are Turbo Single Parity Check Code (TSPCC) [23], [24] and a rate-1 Recursive Systematic Convolutional
Code (RSCCs) [25], [26]. The TSPCC acts as an outer code and comprises a concatenation of multiple
SPCCs arranged in parallel with interleavers separating the SPCCs. A rate-1 RSCC is employed as the inner
code, to improve the performance of the proposed system and to remove the high error-floor problem
encountered by TSPCC [23], [24].
Figure 2 illustrates the block diagram of the transmitter model for the proposed JSCC system
exploiting 2D source correlation. The 2D sources of is generated by S. The research target is to come out
with an estimation technique for the 2D correlation parameters that can work well with the decoder of [9],
thus the same design is used for the transmitter model. Two component encoders for TSPCC, and are
considered. The interleaver, is a block interleaver that is used to arrange the source sequence to a sequence
corresponding to the different direction of the source correlation denoted by. A TSPCC uses SPCCs as its
component codes and it is known that SPCCs are simple codes that only generate a single parity check bit for
any length of information bits. The advantage of this code is the flexibility in working with any length of
information bits and it can operate at a very high coding rate. The parity bit sequences, and and source
sequences are multiplexed after the source sequences have been encoded by the component codes. This
joined sequence w is then rearranged by a random interleaver before passed through another encoding
process by. The final encoded sequence c is modulated using a BPSK modulator before being transmitted
over an AWGN channel.
3.2. Receiver design
The detailed receiver model of the proposed JSCC system is shown in Figure 3. The signal from the
channel is received and demodulated to generate an output sequence, r. By using Bahl-Cocke-Jelinek-Raviv
(BCJR) algorithm in, the sequence r is decoded via Maximum A Posteriori (MAP) decoding process [27].
Soft information in Log-Likelihood Ratio (LLR) form is used while performing the decoding process. The a
priori LLR of coded bit, at a time index t, can be computed as:
(8)
where is the probability that has the value of 1, while is the probability of holds the value 0. The extrinsic
LLR, that is generated from is de-interleaved using before fed into and. The two component decoders
correspond to the decoding of the horizontal and vertical direction source sequence. Modified BCJR
algorithm is employed to exploit the source correlation throughout the decoding process [9]. Each component
decoder yields a posteriori and extrinsic LLRs outputs. The a posteriori are then sent to the parameter
estimation technique block which employs the BWA given in Equation (7) to estimate the transition
probabilities where ̂ ̂ ̂ and ̂ ̂ ̂ . The extrinsic LLRs from both activated
component decoders that correspond to the source sequence u are summed up and multiplexed with all the
extrinsic LLRs corresponding to the parity bit sequences. The combined sequence is then interleaved by
before feedback to
5. Int J Elec & Comp Eng ISSN: 2088-8708
Exploiting 2-Dimensional Source Correlation in Channel Decoding … (Muhammad Izzat Amir Mohd Nor)
2637
This process is repeated for a number of iterations. After the final iteration, the a posteriori
is deinterleaved by . Hard decisioning is made to the a posteriori LLRs output to
generate the decoded bits sequence ̂.
Figure 2. Proposed transmitter JSCC system exploiting 2D source correlation
2D TSPC Decoder
Figure 3. The proposed design at the receiver for the 2D JSCC system with parameter estimation
S
BPSK
Mod
w
MUX
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2633 – 2642
2638
4. RESULT AND ANALYSIS
In this work, the main goal is to develop an accurate parameter estimation technique to estimate the
unknown source statistics at the receiver for the 2D JSCC system performing as close as possible to the ideal
2D JSCC system as proposed in [9]. The BER performance is evaluated, by finding the number of errors of
the decoded binary sequence from the original binary sequence from the source and this number of errors is
divided by the frame length of the source sequence [28]. The Markov source was initialized with 0.5 to both
dimensions. To illustrate the result, a simulation of BER against SNR simulation was performed using
MATLAB software.The configuration used in the simulations to evaluate the performance of the proposed
2D JSCC system are given in Table 1. Turbo-Single Parity-Check-Code (TSPCC) was used as the outer code.
The Single-Parity-Check (SPC) code consisting of 8 codeword length and 7 information bits is used for the
component code of the outer code. The rate-1 Recursive-Systematic-Convolutional (RSC) code which had
generator polynomial, ( , ) = (given in octal numeral system) is used in the inner code where is
the feedback polynomial and is the feed-forward polynomial.
Figure 4 illustrates the comparison in BER performance of the proposed 2D JSCC system and the
ideal 2D JSCC system with source correlation in horizontal and vertical direction varying from = until =. The
performance of 2D JSCC system assisting with the BWA-based estimation technique or also known as 2D
JSCC system with Parameter Estimation 1 (2D-JSCC-PET1 system) is very close to the ideal 2D JSCC
system and improves when the source correlation becomes stronger. For example, at BER level of, an
improvement of 1.18 dB is achieved is achieved with the proposed 2D-JSCC-PET1 system over the
non-JSCC system for p = 0.7 and the improvement increases to 4.48 dB for p = 0.9. The performance gain
between the ideal 2D JSCC system and the proposed 2D-JSCC-PET1 system is about the same for each value
of p. As can be seen in the Figure 4, the ideal 2D JSCC system is only slightly better than the proposed 2D-
JSCC-PET1 system. However, the ideal 2D JSCC system relies on the assumption of perfect source
knowledge at the receiver, which may not be suitable practically. Usually, the parameter estimation technique
requires complex computations concerning its accuracy that might lead to performance degradation but
despite the degradation that may occur, the gain for our proposed 2D-JSCC-PET1 system is not too far from
the ideal system and hence, ensuring the system performing better in terms of the accuracy and the reliability
of the data transmission at the receiver.
In another simulation, the performance difference between the proposed 2D-JSCC-PET1 system and
the similar system without any parameter estimation denoted as the 2D JSCC system reveals that without the
estimation technique, the performanceof the system could not do any better for unknown source statistics.
The gain is measured as a difference of Eb/N0 at the BER level of between the 2D JSCC systems and the
non-JSCC system. The performance gains of different systems are tabulated in Table 2.
Figure 5 compares the BER performance between the proposed 2D-JSCC-PET1 system and 2D-
JSCC-PET2 system when the correlation parameters are unknown for sources, exhibiting correlation varying
from = until =. The performance gain between the proposed 2D-JSCC-PET1 system and the similar 2D JSCC
system using different parameter estimation or the Parameter Estimation 2 (PET2) is summarized in Table 3.
Figure 5 indicates that the PET1 module is much better than the PET2 module which simply comparing the
reliable extrinsic LLRs gathered from each decoder [11].
It can be seen from Table 3 that there is a significant difference in BER performance between the
proposed 2D-JSCC-PET1 system and the 2D-JSCC-PET2 system which indicates that the proposed 2D-
JSCC-PET1 system is performing better than the 2D-JSCC-PET2 system. Based on the performance in
Figure 5, it can be seen that the gain difference over the non-JSCC system between the proposed 2D-JSCC-
PET1 system and the 2D-JSCC-PET2 system becomes larger for stronger source correlation, where at p =0.7,
the gain difference is 0.84 dB and it increases to 3.47 dB at p =0.9. The performance achieved by the 2D
JSCC systems with the parameter estimation technique show a significant difference when compared to the
2D JSCC system without employing any estimation method (the 2D JSCC system) and the non-JSCC
system.
Table 1. Default Settings Used for the Simulations of the Proposed 2D JSCC System
Parameter Value
Outer Code 2D TSPCC
Component Codes for Outer Code SPC(8,7) Code
Inner Code Rate-1 RSC (3,2)s Code
Frame Length, 608 x 608 bits
Block Interleaver: 608 x 608 bits
Random Interleaver : Length 363,888 bits
Code Rate, Rc 0.78
Decoding Iterations 25
7. Int J Elec & Comp Eng ISSN: 2088-8708
Exploiting 2-Dimensional Source Correlation in Channel Decoding … (Muhammad Izzat Amir Mohd Nor)
2639
Figure 4. Comparison in BER performance of the proposed 2D-JSCC-PET1 system and the ideal 2D JSCC
system [9] as the value of p increases
Table 2. Performance Gain in dB of the Proposed 2D-JSCC-PET1 System and the Ideal 2D JSCC System
Over the non-JSCC System
The ideal 2D
JSCC system
(dB)
2D-JSCC-
PET1
(dB)
Gain for The ideal 2D
JSCC system
(dB)
Gain for
2D-JSCC-
PET1 (dB)
Gain
Difference
(dB)
0.7 1.49 1.54 1.23 1.18 0.05
0.8 0.29 0.34 2.43 2.38 0.05
0.9 -1.82 -1.71 4.54 4.48 0.06
Figure 5. Performance gain in dB of the proposed 2D-JSCC-PET1 system and the 2D-JSCC-PET2 system
Table 3. Performance Gain in dB of the Proposed 2D-JSCC-PET1 System and the 2D-JSCC-PET2 System
over the non-JSCC System
2D-JSCC-
PET1
(dB)
2D-JSCC-PET2
(dB)
Gain for 2D-
JSCC-PET1
(dB)
Gain for 2D-JSCC-PET2 (dB) Gain
Difference
(dB)
0.7 1.54 2.38 1.18 0.34 0.84
0.8 0.34 2.06 2.38 0.64 1.74
0.9 -1.71 1.71 4.48 1.01 3.47
-3 -2.5 -2 -1.5 -1 -0.5 0 0.5 1 1.5 2 2.5 3
10
-6
10
-5
10
-4
10
-3
10
-2
10
-1
10
0
Eb/N0 (dB)
BER
The Ideal 2D JSCC at p=0.9
2D-JSCC-PET1 at p=0.9
The Ideal 2D JSCC at p=0.8
2D-JSCC-PET1 at p=0.8
The Ideal 2D JSCC at p=0.7
2D-JSCC-PET1 at p=0.7
2D JSCC at p=0.9
Non-JSCC
-3 -2.5 -2 -1.5 -1 -0.5 0 0.5 1 1.5 2 2.5 3
10
-6
10
-5
10
-4
10
-3
10
-2
10
-1
10
0
Eb
/N0
[dB]
BER
2D-JSCC-PET1 at p=0.9
2D-JSCC-PET2 at p=0.9
2D-JSCC-PET1 at p=0.8
2D-JSCC-PET2 at p=0.8
2D-JSCC-PET1 at p=0.7
2D-JSCC-PET2 at p=0.7
2D-JSCC at p=0.9
Non-JSCC
8. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2633 – 2642
2640
5. CONCLUSION AND FUTURE WORK
This research proposed a 2D JSCC system exploiting estimation technique based on the Baum-
Welsh algorithm in the decoder on unknown source statistics (2D-JSCC-PET1). The BWA that is used in the
proposed design has been detailed with its calculations and equations. For sources with identical , the gain of
the proposed 2D-JSCC-PET1 system and the ideal 2D JSCC system over the non-JSCC system shows very
small difference which are 4.54 dB and 4.48 dB, respectively. The results also indicate that the difference in
performance gain between of the proposed 2D-JSCC-PET1 system and the ideal 2D JSCC system is
approximately the same for strongest source correlation. The difference of proposed 2D-JSCC-PET1 system
and ideal 2D JSCC system values at p = 0.7 and p =0.9 are slightly the same i.e. 0.05 dB and 0.06 dB,
respectively. This concludes that it is possible to get the best performance with the parameter estimation
technique on unknown source correlation knowledge. The proposed 2D-JSCC-PET1 system is then
compared to another estimation technique based on a previous study [11] known as 2D-JSCC-PET2 system.
The difference in performance gain between the proposed 2D-JSCC-PET1 system and the 2D-JSCC-PET2
system increases with the increment of source correlation, i.e., from a difference of 0.84 dB at p = 0.7 to a
difference of 3.47 dB at p = 0.9. Future studies could develop and enhance parameter estimation technique in
2D JSCC system with a higher order of Markov Source and higher dimension of source correlation in order
to obtain a more reliable and better performance.
ACKNOWLEDGEMENTS
The author would like to thank the reviewers for the suggestions which help to improve the
quality of this paper. In addition, the authors are also very thankful to UTM Razak School of
Engineering and Advanced Technology, UTM Kuala Lumpur, Malaysia for providing resources.
REFERENCES
[1] Berrou, C., Glavieux, A. and Thitimajshima, P, “Near Shannon Limit Error Correcting Coding and Decoding:
Turbo-Codes”, Proceedings of IEEE I.S. International Conference on Communications (ICC), Geneva, Switzerland,
pp. 1064-1070, 1993.
[2] Salim, Mohammad, et al. “A New Block S-Random Interleaver for Shorter Length Frames for Turbo Codes,”
Bulletin of Electrical Engineering and Informatics, vol. 2, no. 4, pp. 293-298, 2013.
[3] Wang, Jian, Jianping Li, and Chaoshi Cai, “A Novel Decoding Algorithm for BICM-ID Embedded Turbo Codes,”
Indonesian Journal of Electrical Engineering and Computer Science, vol. 12, no. 5, pp. 3460-3466, 2014.
[4] Kamruzzaman, M. M., “Performance Comparison of Turbo Coded Single Input Multiple Output System Using
Selective Combining, Equal Gain Combining and Maximal Ratio Combining,” International Journal of Information
and Network Security, vol. 3, no. 2, p. 64, 2014.
[5] Shannon, C. E., “A Mathematical Theory of Communication”, The Bell System Technical Journal, 27, pp. 379-423,
1948.
[6] Sayood, K. and Borkenhagen, J. C., “Use of Residual Redundancy in the Design of Joint Source/Channel Coders”,
IEEE Transactions on Communications, vol. 39, no. 6, pp. 839-846, 1991.
[7] Y. Huo, T. Wang, R. Maunder and L. Hanzo, "Two-Dimensional Iterative Source-Channel Decoding for Distributed
Video Coding," in IEEE Communications Letters, vol. 18, no. 1, pp. 90-93, January 2014.
[8] Camiciotti, L., Lamy, C., Meilhac, L., Olivieri, S. and Verdi, P., “Joint Source Channel Coding for 4G Multimedia
Streaming”, Wireless World Research Forum (WWRF), Helsinki, Finland, 2001.
[9] Izhar, M.A.M Fisal, N Zhou, X Anwar,K Matsumoto, T ,”Exploitation of 2D binary source correlation using turbo
block codes with fine-tuning”, 7th International Symposium on Turbo Codes and Iterative Information Processing
(ISTC), 2013.
[10] Izhar, M.A.M Fisal, N Zhou, X Anwar, K Matsumoto, “Utilization of 2-D Markov source correlation using block
turbo codes”, International Symposium on Turbo Codes and Iterative Information Processing, ISTC. 56-60. 2012.
[11] Y. Zhao, W. Zhong, and J. Garcia-Frias, “Transmission of correlated senders over a Rayleigh fading multiple access
channel,” Signal Process.,vol. 86, pp. 3150-3159, Nov. 2006.
[12] B. W. Khoueiry and M. R. Soleymani, "Joint channel estimation and raptor decoding over fading channel," 2014
27th Biennial Symposium on Communications (QBSC), Kingston, ON, 2014, pp. 168-172
[13] Qingxiong Deng, R. G. Machado and A. G. Klein, "Adaptive channel estimation in decode and forward relay
networks," 2012 46th Annual Conference on Information Sciences and Systems (CISS), Princeton, NJ, 2012, pp. 1-6.
[14] W. Turin, "Unidirectional and parallel Baum-Welch algorithms," in IEEE Transactions on Speech and Audio
Processing, vol. 6, no. 6, Nov 1998. pp. 516-523.
[15] Garcia-Frias, J., “Combining hidden Markov source models and parallel concatenated codes”, IEEE
Communications Letters,vol. 1 no. 4 1997, pp. 111-113.
[16] J. Garcia-Frias and J. D. Villasenor, "Turbo decoding of hidden Markov sources with unknown parameters," Data
Compression Conference, 1998. DCC '98. Proceedings, Snowbird, UT, 1998, pp. 159-168.
9. Int J Elec & Comp Eng ISSN: 2088-8708
Exploiting 2-Dimensional Source Correlation in Channel Decoding … (Muhammad Izzat Amir Mohd Nor)
2641
[17] J. Garcia-Frias and J. D. Villasenor, "Joint source channel coding and estimation of hidden Markov structures,"
Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252), Cambridge, MA,
1998, pp. 201.
[18] J. Garcia-Frias, J. Villasenor, "Simplified methods for combining hidden Markov models and turbo codes", Proc.
VTC'99, 1999, pp. 1580-1584.
[19] J. Garcia-Frias, J.D. Villasenor, "Joint turbo decoding and estimation of hidden Markov sources", Selected Areas in
Communications IEEE Journal on, vol. 19, pp. 1671-1679, 2001, ISSN 0733-8716.
[20] Anwar, A.K. “Iterative Decoding and Channel Estimation over Hidden Markov Fading Channels”, Faculty of the
Virginia Polytechnic Institute and State University, 2000.
[21] Baum, L. E., Petrie, T., Soules, G. and Weiss, N., “A Maximization Technique Occurring in the Statistical Analysis
of Probabilistic Functions of Markov Chains.” Ann. Math. Statist., 1970, vol. 41, no. 1, pp. 164-171.
[22] Dempster, A. P., Laird, N. M. and Rubin, D. B. “Maximum Likelihood from Incomplete Data via the EM
Algorithm.” Journal of the Royal Statistical Society. Series B (Methodological), 1977, vol. 39, no. 1, pp. 1-38.
[23] L. Ping, S. C. and Yeung, K. L., “Iterative Decoding of Multi-dimensional Concatenated Single Parity Check
Codes.” Proceedings of IEEE International Conference on Communications. Atlanta, USA. 1998, pp. 131-135.
[24] Tee, J. S. K. and Taylor, D. P., “Multiple Parallel Concatenated Single Parity-check Codes”, Proceedings of IEEE
International Conference on Communications. Helsinki, Finland, 2001, pp. 60-64.
[25] Zhou, X., Anwar, K. and Matsumoto, T., “Serially Concatenated Joint Source-Channel Coding for Binary Markov
Sources,” 6th International ICST Conference on Communications and Networking (CHINACOM). Harbin, China.
2011.
[26] Zhou, X., Anwar, K. and Matsumoto, T., “EXIT Chart Based Joint Source Channel Coding for Binary Markov
Sources,” Proceedings of IEEE Vehicula Technology Conference (VTC Fall). Quebec City, Canada. 2012, pp. 1-5.
[27] Bahl, L., Cocke, J., Jelinek, F. and Raviv, J., “Optimal Decoding of Linear Codes for Minimizing Symbol Error
Rates (Corresp.),” IEEE Transactions on Information Theory, 1974, vol. 20, no. 2, pp. 284-287.
[28] Daniel Jurafsky, James H. Martin, “Chapter 8: Hidden Markov Models, Speech and Language Processing”, Prentice
Hall, 2014.
BIOGRAPHIES OF AUTHORS
Muhammad Izzat Amir Mohd Nor received the B.Eng (Hons) in Electrical and Computer
Engineering (Communication), International Islamic University Malaysia (IIUM – 2012). He is
currently pursuing his Master of Philosophy at UTM Razak School of Engineering and Advanced
Technology, Universiti Teknologi Malaysia (UTM) Kuala Lumpur. He is a member in various
professional organizations such as Institute of Electrical and Electronics Engineers (IEEE) and The
Institution of Engineers Malaysia (IEM). His research interests include channel coding, coding theory,
joint source-channel coding, parameter estimation technique, IoT, wireless communication and cloud
computing.
Mohd Azri Mohd Izhar received his M.Eng. degree in electrical engineering (communications) from
the University of Sheffield, U.K., in 2008 where he received the Mappin medal award for outstanding
academic performance and the Institute of Electrical and Electronics Engineers (IEEE) prize for the
best communications-related final year project. He received the Ph.D. degree in electrical engineering
from Universiti Teknologi Malaysia (UTM), Malaysia, in 2014. Since 2014, he has been a senior
lecturer with UTM Kuala Lumpur campus. He was visiting the Southampton Wireless Group at the
University of Southampton, U.K. for 2 years in 2015. His current research interests include channel
coding, coding theory, joint source-channel coding, coded modulation, cooperative communications,
cognitive radio, IoT and quantum communications.
Norulhusna Ahmad graduated from Universiti Teknologi Malaysia (UTM) in 2001 with BSc in
Electrical Engineering. She joined UTM as a staff and later pursuing her study at the same university.
She received her Master degree of Electrical Engineering (Telecommunication) and PhD in Electrical
Engineering in 2003 and 2014, respectively. Currently, she is a lecturer at Razak School of Science
and Advanced Technology, UTM KL. During her PhD, she did an attachment in Japan Advanced
Institute of Science and Technology (JAIST) under the supervision of Prof. Dr. Tadashi Matsumoto
and Asst. Prof. Dr. Khoirul Anwar on the project in non-orthogonal frequency division multiplexing
(n-OFDM) system. Her expertise is on the area of digital signal processing and wireless
communication. Her research interests are on future communication such as 5G and cognitive radio
focusing on error correcting codes, turbo equalization, OFDM, resource allocation, network coding
and cooperative communication.
10. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 4, August 2018 : 2633 – 2642
2642
Universiti Teknologi Malaysia (UTM – 2006), the M.Sc. degree in Telecommunication and
Information Engineering at Universiti Teknologi MARA (UiTM – 2008), and the Ph.D. degree from
the Universiti Teknologi Malaysia (UTM – 2015). She is currently a senior lecturer at UTM Razak
School of Engineering and Advanced Technology, Universiti Teknologi Malaysia Kuala Lumpur. She
is a member in various professional organizations such as Institute of Electrical and Electronics
Engineers (IEEE) and The Instituttion of Engineers Malaysia (IEM). She also a research member of
Wireless Communication Centre (WCC) which is one of Higher Institution Centres of Excellence
(HICoE) in Malaysia. Currently, WCC leads a research on Fifth Generation (5G). Her research
interests include mobile and wireless communications, error control coding, relay networks,
cooperative communications, Hybrid ARQ Cross Layer Design and iterative receiver.