For an operational radar, backscatter of the transmitted signal by the elements of the sea surface
often places severe limits on the detect ability of returns from ships, missiles, navigation buoys, and other
targets sharing the radar resolution cell with the sea surface. These interfering signals are commonly referred to
as sea clutter, or sea echo. Maritime surveillance radar experiences serious limitations imposed on their
performance by unwanted sea clutter.
In the marine environment, sea clutter might occur at a random position in one scan but not in the next or
subsequent scans. In contrast, targets will appear from scan to scan with essentially the same amplitude. The
scan-to-scan discriminator eliminates “spiky” clutter by using one of the 3 approaches. They are:
1. Fixed Threshold.
2. Cell Averaging Constant False Alarm Rate (CA- CFAR).
3. Clutter Map.
The output of the scan-to-scan discriminator is then used to tag the speed of small marine targets and gating
approach is used to tag the speed of large marine targets.
A Field Programmable Gate Array (FPGA) based hardware architecture for the scan-to-scan discriminator using
Fixed Threshold and Clutter Map for radar target detections is developed. Compilation reports and board
programming files have been obtained using Quartus II 13.1. Altera-Stratix V FPGA signal processing board
has been used as a target device for the implementation purpose.
MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Mari...IJERD Editor
For an operational radar, backscatter of the transmitted signal by the elements of the sea surface
often places severe limits on the detect ability of returns from ships, missiles, navigation buoys, and other
targets sharing the radar resolution cell with the sea surface. These interfering signals are commonly referred to
as sea clutter, or sea echo. Maritime surveillance radar experiences serious limitations imposed on their
performance by unwanted sea clutter.
In the marine environment, sea clutter might occur at a random position in one scan but not in the next or
subsequent scans. In contrast, targets will appear from scan to scan with essentially the same amplitude. The
scan-to-scan discriminator eliminates “spiky” clutter by using one of the 3 approaches. They are:
1. Fixed Threshold.
2. Cell Averaging Constant False Alarm Rate (CA- CFAR).
3. Clutter Map.
The output of the scan-to-scan discriminator is then used to tag the speed of small marine targets and gating
approach is used to tag the speed of large marine targets.
The proposed architectures have been designed using MATLAB R2007b.
VHDL Implementation of Scan-to-Scan Discriminator for the Detection of Marine...IJERD Editor
For an operational radar, backscatter of the transmitted signal by the elements of the sea surface
often places severe limits on the detect ability of returns from ships, missiles, navigation buoys, and other
targets sharing the radar resolution cell with the sea surface. These interfering signals are commonly referred to
as sea clutter, or sea echo. Maritime surveillance radar experiences serious limitations imposed on their
performance by unwanted sea clutter.
In the marine environment, sea clutter might occur at a random position in one scan but not in the next or
subsequent scans. In contrast, targets will appear from scan to scan with essentially the same amplitude. The
scan-to-scan discriminator eliminates “spiky” clutter by using one of the 3 approaches. They are:
1. Fixed Threshold.
2. Cell Averaging Constant False Alarm Rate (CA- CFAR).
3. Clutter Map.
The output of the scan-to-scan discriminator is then used to tag the speed of small marine targets and gating
approach is used to tag the speed of large marine targets.
The simulation waveforms are obtained using ModelSim-Altera10.1d
Heterogeneous Performance Evaluation of Sophisticated Versions of CFAR Detec...Scientific Review SR
The detection of radar targets in a background, the statistical parameters of which are unknown and
may not be stationary, can be effectively achieved through CFAR processors. The CA-CFAR scheme performs
optimally for homogeneous and exponentially distributed clutter observations. However, it exhibits severe
performance degradation in the presence of outlying target returns in the reference set or in regions of abrupt
change in the background clutter power. The OS-CFAR processor has been proposed to alleviate both of these
problems. Although this processor may treat target multiplicity quite well, it lacks effectiveness in preventing
excessive false alarms during clutter power transitions. The TM -CFAR algorithm, which implements trimmed
averaging after ordering, can be considered as a modified version of OS technique. By knowingly excising the
ordered samples, the TM detector may actually perform somewhat better than the OS processor. To
simultaneously exploit the merits of CA, OS, and TM schemes, two combinations namely CA_OS and CA_TM
have been recently suggested. Each one of these versions optimizes good features of two CFAR detectors
depending on the characteristics of clutter and searched targets with the goal of enhancing the detection
performance under constant level of false alarm. It is realized by parallel operation of two standard types of
CFAR schemes. Our goal in this paper is to analyze these two developed versions, in heterogeneous situations,
to show to what extent they can improve the behavior of the conventional CFAR processors.
Standard radar detection process requires that the sensor output is compared to a predetermined threshold. The
threshold is selected based on a-priori knowledge available and/or certain assumptions. However, any
knowledge and/or assumptions become in adequate due to the presence of multiple targets with varying signal
return and usually non stationary background. Thus, any predetermined threshold may result in either increased
false alarm rate or increased track loss. Even approaches where the threshold is adaptively varied will not
perform well in situations when the signal return from the target of interest is too low compared to the average
level of the background .Track-before-detect techniques eliminate the need for a detection threshold and provide
detecting and tracking targets with lower signal-to-noise ratios than standard methods. However, although trackbefore-
detect techniques eliminate
the need for detection threshold at sensor's signal processing stage, they often use tuning thresholds at the output
of the filtering stage .This paper presents a computerized simulation model for target detection process.
Moreover, the proposed model method is based on the target motion models, the output of the detection
process can easily be employed for maneuvering target tracking.
MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Mari...IJERD Editor
For an operational radar, backscatter of the transmitted signal by the elements of the sea surface
often places severe limits on the detect ability of returns from ships, missiles, navigation buoys, and other
targets sharing the radar resolution cell with the sea surface. These interfering signals are commonly referred to
as sea clutter, or sea echo. Maritime surveillance radar experiences serious limitations imposed on their
performance by unwanted sea clutter.
In the marine environment, sea clutter might occur at a random position in one scan but not in the next or
subsequent scans. In contrast, targets will appear from scan to scan with essentially the same amplitude. The
scan-to-scan discriminator eliminates “spiky” clutter by using one of the 3 approaches. They are:
1. Fixed Threshold.
2. Cell Averaging Constant False Alarm Rate (CA- CFAR).
3. Clutter Map.
The output of the scan-to-scan discriminator is then used to tag the speed of small marine targets and gating
approach is used to tag the speed of large marine targets.
The proposed architectures have been designed using MATLAB R2007b.
VHDL Implementation of Scan-to-Scan Discriminator for the Detection of Marine...IJERD Editor
For an operational radar, backscatter of the transmitted signal by the elements of the sea surface
often places severe limits on the detect ability of returns from ships, missiles, navigation buoys, and other
targets sharing the radar resolution cell with the sea surface. These interfering signals are commonly referred to
as sea clutter, or sea echo. Maritime surveillance radar experiences serious limitations imposed on their
performance by unwanted sea clutter.
In the marine environment, sea clutter might occur at a random position in one scan but not in the next or
subsequent scans. In contrast, targets will appear from scan to scan with essentially the same amplitude. The
scan-to-scan discriminator eliminates “spiky” clutter by using one of the 3 approaches. They are:
1. Fixed Threshold.
2. Cell Averaging Constant False Alarm Rate (CA- CFAR).
3. Clutter Map.
The output of the scan-to-scan discriminator is then used to tag the speed of small marine targets and gating
approach is used to tag the speed of large marine targets.
The simulation waveforms are obtained using ModelSim-Altera10.1d
Heterogeneous Performance Evaluation of Sophisticated Versions of CFAR Detec...Scientific Review SR
The detection of radar targets in a background, the statistical parameters of which are unknown and
may not be stationary, can be effectively achieved through CFAR processors. The CA-CFAR scheme performs
optimally for homogeneous and exponentially distributed clutter observations. However, it exhibits severe
performance degradation in the presence of outlying target returns in the reference set or in regions of abrupt
change in the background clutter power. The OS-CFAR processor has been proposed to alleviate both of these
problems. Although this processor may treat target multiplicity quite well, it lacks effectiveness in preventing
excessive false alarms during clutter power transitions. The TM -CFAR algorithm, which implements trimmed
averaging after ordering, can be considered as a modified version of OS technique. By knowingly excising the
ordered samples, the TM detector may actually perform somewhat better than the OS processor. To
simultaneously exploit the merits of CA, OS, and TM schemes, two combinations namely CA_OS and CA_TM
have been recently suggested. Each one of these versions optimizes good features of two CFAR detectors
depending on the characteristics of clutter and searched targets with the goal of enhancing the detection
performance under constant level of false alarm. It is realized by parallel operation of two standard types of
CFAR schemes. Our goal in this paper is to analyze these two developed versions, in heterogeneous situations,
to show to what extent they can improve the behavior of the conventional CFAR processors.
Standard radar detection process requires that the sensor output is compared to a predetermined threshold. The
threshold is selected based on a-priori knowledge available and/or certain assumptions. However, any
knowledge and/or assumptions become in adequate due to the presence of multiple targets with varying signal
return and usually non stationary background. Thus, any predetermined threshold may result in either increased
false alarm rate or increased track loss. Even approaches where the threshold is adaptively varied will not
perform well in situations when the signal return from the target of interest is too low compared to the average
level of the background .Track-before-detect techniques eliminate the need for a detection threshold and provide
detecting and tracking targets with lower signal-to-noise ratios than standard methods. However, although trackbefore-
detect techniques eliminate
the need for detection threshold at sensor's signal processing stage, they often use tuning thresholds at the output
of the filtering stage .This paper presents a computerized simulation model for target detection process.
Moreover, the proposed model method is based on the target motion models, the output of the detection
process can easily be employed for maneuvering target tracking.
Black Hat '15: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simpl...Synack
Black Hat 2015
Recently, there have been several highly publicized talks about satellite hacking. However, most only touch on the theoretical rather than demonstrate actual vulnerabilities and real world attack scenarios. This talk will demystify some of the technologies behind satellite communications and do what no one has done before - take the audience step-by-step from reverse engineering to exploitation of the GlobalStar simplex satcom protocol and demonstrate a full blown signals intelligence collection and spoofing capability. I will also demonstrate how an attacker might simulate critical conditions in satellite connected SCADA systems.
In recent years, Globalstar has gained popularity with the introduction of its consumer focused SPOT asset-tracking solutions. During the session, I'll deconstruct the transmitters used in these (and commercial) solutions and reveal design and implementation flaws that result in the ability to intercept, spoof, falsify, and intelligently jam communications. Due to design tradeoffs these vulnerabilities are realistically unpatchable and put millions of devices, critical infrastructure, emergency services, and high value assets at risk.
Introducing GPS Spoofing Attack on Power Grids and Counteract MethodsSaraSiamak
Phasor Measurement Unit (PMU) in the power grids is a device to measure the voltage of a bus and current of branches connected to the bus. The measured signals are time tagged by GPS signals to synchronize all measurement data all over the grid. PMU dependence on GPS signals makes it vulnerable to GPS spoofing attacks.
Spoofing attack on PMU (Phasor measurement unit)Mohammad Sabouri
A phasor measurement unit (PMU) is a device used to estimate the magnitude and phase angle of an electrical phasor quantity (such as voltage or current) in the electricity grid using a common time source for synchronization. Time synchronization is usually provided by GPS and allows synchronized real-time measurements of multiple remote points on the grid. PMUs are capable of capturing samples from a waveform in quick succession and reconstructing the phasor quantity, made up of an angle measurement and a magnitude measurement. The resulting measurement is known as a synchrophasor. These time synchronized measurements are important because if the grid’s supply and demand are not perfectly matched, frequency imbalances can cause stress on the grid, which is a potential cause for power outages.
s.siyamak2016@gmail.com
https://sites.google.com/view/acrrl/
https://sites.google.com/view/acrrl/team/current-members/sara-siamak
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Data Communications,Data Networks,computer communications,multiplexing,spread spectrum,protocol architecture,data link protocols,signal encoding techniques,transmission media
Accurate wireless channel modeling for efficient adaptive Forward Error Corre...IJERD Editor
In this paper, we evaluate the impact of accurate 802.11 based wireless channel modeling on the
efficiency of dynamic Forward Error Correction (FEC) schemes in Motion JPEG 2000 video streaming systems.
We derive a compromise on the suitable trace length for practical estimation of Packet Error Rate (PER) at
decoder side. We demonstrate the validity of the derived trade-off using a real JPEG 2000 based video streaming
system.
Black Hat '15: Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simpl...Synack
Black Hat 2015
Recently, there have been several highly publicized talks about satellite hacking. However, most only touch on the theoretical rather than demonstrate actual vulnerabilities and real world attack scenarios. This talk will demystify some of the technologies behind satellite communications and do what no one has done before - take the audience step-by-step from reverse engineering to exploitation of the GlobalStar simplex satcom protocol and demonstrate a full blown signals intelligence collection and spoofing capability. I will also demonstrate how an attacker might simulate critical conditions in satellite connected SCADA systems.
In recent years, Globalstar has gained popularity with the introduction of its consumer focused SPOT asset-tracking solutions. During the session, I'll deconstruct the transmitters used in these (and commercial) solutions and reveal design and implementation flaws that result in the ability to intercept, spoof, falsify, and intelligently jam communications. Due to design tradeoffs these vulnerabilities are realistically unpatchable and put millions of devices, critical infrastructure, emergency services, and high value assets at risk.
Introducing GPS Spoofing Attack on Power Grids and Counteract MethodsSaraSiamak
Phasor Measurement Unit (PMU) in the power grids is a device to measure the voltage of a bus and current of branches connected to the bus. The measured signals are time tagged by GPS signals to synchronize all measurement data all over the grid. PMU dependence on GPS signals makes it vulnerable to GPS spoofing attacks.
Spoofing attack on PMU (Phasor measurement unit)Mohammad Sabouri
A phasor measurement unit (PMU) is a device used to estimate the magnitude and phase angle of an electrical phasor quantity (such as voltage or current) in the electricity grid using a common time source for synchronization. Time synchronization is usually provided by GPS and allows synchronized real-time measurements of multiple remote points on the grid. PMUs are capable of capturing samples from a waveform in quick succession and reconstructing the phasor quantity, made up of an angle measurement and a magnitude measurement. The resulting measurement is known as a synchrophasor. These time synchronized measurements are important because if the grid’s supply and demand are not perfectly matched, frequency imbalances can cause stress on the grid, which is a potential cause for power outages.
s.siyamak2016@gmail.com
https://sites.google.com/view/acrrl/
https://sites.google.com/view/acrrl/team/current-members/sara-siamak
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Data Communications,Data Networks,computer communications,multiplexing,spread spectrum,protocol architecture,data link protocols,signal encoding techniques,transmission media
Accurate wireless channel modeling for efficient adaptive Forward Error Corre...IJERD Editor
In this paper, we evaluate the impact of accurate 802.11 based wireless channel modeling on the
efficiency of dynamic Forward Error Correction (FEC) schemes in Motion JPEG 2000 video streaming systems.
We derive a compromise on the suitable trace length for practical estimation of Packet Error Rate (PER) at
decoder side. We demonstrate the validity of the derived trade-off using a real JPEG 2000 based video streaming
system.
Super-Capacitor Energy Storage of DFIG Wind Turbines with Fuzzy ControllerIJERD Editor
With the advance in wind turbine technologies, the cost of wind energy becomes competitive with
other fuel-based generation resources. Due to the price hike of the fossil fuels and the concern of the global
warming, the development of wind power has rapidly progressed over the last decade. Many countries have set
goal for high penetration levels of wind generations. Recently, several large-scale wind generation projects have
been implemented all over the world. It is economically beneficial to integrate very large amounts of wind
capacity in power systems. Unlike other traditional generation facilities, using wind turbines present technical
challenges in producing continuous and controllable electric power. With increase in contribution of wind power
into electric power grid, energy storage devices will be required to dynamically match the intermitting of wind
energy.
A New hybrid method in watermarking using DCT and AESIJERD Editor
In this paper I'm trying to make a combination between the encryption by using one of the most
powerful algorithm called Advanced Encryption Standard (AES) to encrypt a secret message another word logo
and then embed it in the digital image in frequency domain by using the Discrete Cosine Transform (DCT) in
low frequency to increase the robustness and then applying some attacks to check it.
اشكركم واعتز بصداقتكم ارجو لكم السعادة ارجو ان نبقى على تواصل
عبد الرحمن تيشوري – شهادة عليا بالادارة – شهادة عليا بالاقتصاد
https://www.youtube.com/watch?v=Gw5-YumwMeE
https://twitter.com/abdullrahmantai
التصميم العام لتطبيق استراتيجية التنمية الادارية في سورية بعد احداث الوزارة ا...تيشوري عبد الرحمن
اشكركم واعتز بصداقتكم ارجو لكم السعادة ارجو ان نبقى على تواصل
عبد الرحمن تيشوري – شهادة عليا بالادارة – شهادة عليا بالاقتصاد
https://www.youtube.com/watch?v=Gw5-YumwMeE
https://twitter.com/abdullrahmantai
Comparative of Conventional and Intelligence Controller based Hybrid Generati...IJERD Editor
Harmonic pollution of the power supply system has risen significantly in recent years due primarily
to an increase of non-linear loads connected to the utility through residential, commercial and industrial
customers. This paper, proposed a solution to eliminate the harmonics introduced by the nonlinear loads in
steady and in transients. It presents a predictive current control strategy for achieving maximum benefits from
these grid-interfacing inverters implementing conventional DC link controller and intelligence controller, when
installed in 3-phase 4-leg voltage source inverter (VSI). The inverter is controlled to perform as a multi-function
device by incorporating active power filter functionality. The use of a four-leg voltage-source inverter allows
the compensation of current harmonic components, as well as unbalanced current generated by three-phase
nonlinear loads. Renewable energy resources (RES) are being increasingly connected in distribution systems
utilizing power electronic converters. The compensation performance of the proposed active power filter and the
associated hybrid PV/Wind system generation scheme with new control scheme is demonstrated to improve the
power quality features is simulated using MATLAB/SIMULINK.
Assessment of Heavy Metals in Nnewi under Ground WaterIJERD Editor
The Assessment of heavy metals distribution and their likely adverse effects in underground
resources of Nnewi town of Anambra State within the sedimentary basin of south eastern Nigeria due to
industries has been studied. The instrument used for data collection includes topographic map, geologic map
aerial photograph, satellite image and fracture maps of Anambra drainage Basin. Ten (10) under ground water
samples from borehole, springs and hand dug wells were collected, this was followed by laboratory studies of
the water samples for the identification of heavy metals present. The result of the analysis of ten(10) water
samples shows that chromium, copper, cadmium and zinc were observed to be high while orgon, mercury,
molybdenum, nickel, lead, zirconium were not detected. The findings also show that cadmium (cd) was not in
some places such as Nnewichi, Otollo and Umudim. Villages in Nnewi town shows an abnormal distribution of
high chromium (cr) copper (cu) and zinc (zn). Above permissible limit, Cadmium causes cancer of the lungs,
and high blood pressure, while chromium causes kidney damage, liver damage, circulatory and nerve tissue
damage. Copper causes anemia, intestinal irritation, while zinc causes growth retardation, delayed sexual
maturation, infection susceptibility and diarrhea. It was suggested that chemical analysis of water should be
carried out periodically in the area since groundwater is subject to seasonal changes.
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
Wireless Sensor Network contain number of nodes. Lifetime of Sensor nodes depend on their battery
power, which cannot be reenergize. Thus, to save the node energy & lifetime of the Network energy efficient
LEACH protocol is introduced. Wireless sensor networks are facing many experiments such as the partial source
in processing power, storage and energy. The inadequate energy source is one of the main tasks facing the security
in such networks. LEACH doesn’t shield the safety harms. So we want to improve security scenario of Secure
LEACH protocol. Hierarchical or cluster base routing protocol for WSNs is the most energy-efficient among other
routing protocols. This paper shows different security mechanism used in LEACH protocol. This all protocol is
based on Hierarchical routing protocol. This paper shows basic scenario of security in LEACH.
SHIPS MATCHING BASED ON AN ADAPTIVE ACOUSTIC SPECTRUM SIGNATURE DETECTION ALG...sipij
In this paper, an acoustic spectrum signature tracks matching algorithm based on the Manhattan distance and the Euclidean distance of signature vectors, and a multi-frame fusion algorithm are proposed for reliable real time detection and matching of boat generated acoustic signal spectrum signatures. The
experiments results have shown that the proposed tracks matching algorithm has the ability to discriminate the tracks from different ships and the ability of matching of the tracks from the same ship; and the spectrum signature detection algorithm has captured the critical features of ship generated acoustic
signals. In the process of signal spectrum signature detection, the observation of time and frequency space is structured by dividing input digitalized acoustic signal into multiple frames and each frame is transformed into the frequency domain by FFT. Then, a normalization of signal spectrum vector is carried
out to make the detection process more robust. After that, an adaptive median Constant False Alarm Rate (AMCFAR) algorithm is used for the detection and extraction of boat generated spectrum signature, in which an extreme low constant false alarm rate is kept with relative high detection rate. Finally, the frame detections are accumulated to build up the track spectrum signatures.
Real time implemantion of stc and ftc radar system based on fpgaeSAT Journals
Abstract In this paper we are explosively the fundamental theory of radar system modules STC (sensitivity time control) or sea clutter and FTC (fast time constant) or rain clutter. The STC and FTC are commonly used to some clutter. The radar signal is widely used for weather forecast, air port traffic control, military and fire control. The system implements radar processing procedures in real time mode in FPGA (field programmable gate array). The FPGA device providing good performance of cheap platform for research and development. The compact structure of STC and FTC can Implementations of Xilinx FPGA using the generated VHDL code. Index Terms: FPGA, FTC, STC, LUT
Two-Dimensional Object Detection Using Accumulated Cell Average Constant Fals...ijcisjournal
The extensive work in SONAR is oceanic Engineering which is one of the most developing researches in
engineering. The SideScan Sonars (SSS) are one of the most utilized devices to obtain acoustic images of
the seafloor. This paper proposes an approach for developing an efficient system for automatic object
detection utilizing the technique of accumulated cell average-constant false alarm rate in 2D (ACA-CFAR-
2D), where the optimization of the computational effort is achieved. This approach employs image
segmentation as preprocessing step for object detection, which have provided similar results with other
approaches like undecimated discrete wavelet transform (UDWT), watershed and active contour
techniques. The SSS sea bottom images are segmented for the 2D object detection using these four
techniques and the segmented images are compared along with the experimental results of the proportion
of segmented image (P) and runtime in seconds (T) are presented.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Similar to FPGA Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets (20)
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
The paper addresses the importance of welding design to prevent corrosion at steel. Welding is
used to join pipe, profiles at bridges, spindle, and a lot more part of engineering construction. The
problems happened associated with welding are common issues in these fields, especially corrosion.
Corrosion can be reduced with many methods, they are painting, controlling humidity, and also good
welding design. In the research, it can be found that reducing residual stress on the welding can be
solved in corrosion rate reduction problem.
Preheating on 500oC and 600oC give better condition to reduce corosion rate than condition after
preheating 400oC. For all welding groove type, material with 500oC and 600oC preheating after 14 days
corrosion test is 0,5%-0,69% lost. Material with 400oC preheating after 14 days corrosion test is 0,57%-0,76%
lost.
Welding groove also influence corrosion rate. X and V type welding groove give better condition to reduce
corrosion rate than use 1/2V and 1/2 X welding groove. After 14 days corrosion test, the samples with
X welding groove type is 0,5%-0,57% lost. The samples with V welding groove after 14 days corrosion test is
0,51%-0,59% lost. The samples with 1/2V and 1/2X welding groove after 14 days corrosion test is 0,58%-
0,71% lost.
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
One of the major environmental concerns is the disposal of the waste materials and utilization of
industrial by products. Lime stone quarries will produce millions of tons waste dust powder every year. Having
considerable high degree of fineness in comparision to cement this material may be utilized as a partial
replacement to cement. For this purpose an experiment is conducted to investigate the possibility of using lime
stone powder in the production of SCC with combined use GGBS and how it affects the fresh and mechanical
properties of SCC. First SCC is made by replacing cement with GGBS in percentages like 10, 20, 30, 40, 50 and
by taking the optimum mix with GGBS lime stone powder is blended to mix in percentages like 5, 10, 15, 20 as
a partial replacement to cement. Test results shows that the SCC mix with combination of 30% GGBS and 15%
limestone powder gives maximum compressive strength and fresh properties are also in the limits prescribed by
the EFNARC.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 4
FPGA Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets
1. International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 10, Issue 11 (November 2014), PP.39-50
39
FPGA Implementation of Scan-to-Scan Discriminator for the
Detection of Marine Targets
1
Anala M, 2
Fathima Jabeen, 3
Vikram Thakur
1
Assistant Professor, Department of ECE, KSSEM, Bangalore, India.
2
Professor and HOD, Department of ECE, KSSEM, Bangalore, India.
3
Scientist, LRDE, DRDO, Bangalore, India.
Abstract:- For an operational radar, backscatter of the transmitted signal by the elements of the sea surface
often places severe limits on the detect ability of returns from ships, missiles, navigation buoys, and other
targets sharing the radar resolution cell with the sea surface. These interfering signals are commonly referred to
as sea clutter, or sea echo. Maritime surveillance radar experiences serious limitations imposed on their
performance by unwanted sea clutter.
In the marine environment, sea clutter might occur at a random position in one scan but not in the next or
subsequent scans. In contrast, targets will appear from scan to scan with essentially the same amplitude. The
scan-to-scan discriminator eliminates “spiky” clutter by using one of the 3 approaches. They are:
1. Fixed Threshold.
2. Cell Averaging Constant False Alarm Rate (CA- CFAR).
3. Clutter Map.
The output of the scan-to-scan discriminator is then used to tag the speed of small marine targets and gating
approach is used to tag the speed of large marine targets.
A Field Programmable Gate Array (FPGA) based hardware architecture for the scan-to-scan discriminator using
Fixed Threshold and Clutter Map for radar target detections is developed. Compilation reports and board
programming files have been obtained using Quartus II 13.1. Altera-Stratix V FPGA signal processing board
has been used as a target device for the implementation purpose.
Keywords:- Radar, scan-to-scan discriminator, sea clutter, fixed threshold, clutter map, CA-CFAR.
I. INTRODUCTION
Radar detection performance is often deteriorated due to the presence of sea clutter. Clutter is the term
used to denote unwanted echoes from the natural environment [14]. It implies that these unwanted echoes
“clutter” the radar and make difficult the detection of wanted targets. Clutter includes echoes from land, sea,
weather (particularly rain), birds and insects. Large clutter echoes can mask echoes form desired targets and
limit radar capability [1]. In addition to any possible clutter there will also be always noise. The total signal
competing with the target return is the clutter plus noise. In practice there is often either no clutter or clutter
dominates or the noise can be ignored. In the first case the radar is said to be Noise limited, in the second it is
Clutter Limited.
Sea clutter limits the performance of radar. For sea clutter, the k-distribution is said to be made of two
components. There is a fast varying component, with a correlation time of the order of 5 to 10ms. The fast
component can be decorrelated pulse to pulse. It is sometimes called the “speckle component” and its statistics
can be represented by Rayleigh distribution [7]. The other component has a longer decorrelation time, of the
order of seconds. The slowly varying component can be represented by a gamma distribution.
II. METHODS OF THRESHOLD DETECTION
Detection of radar signal is based on establishing a threshold at the output of the receiver. If the
receiver output is large enough to exceed the threshold, a target is said to be present. If the receiver output is not
of sufficient amplitude to cross the threshold, only unwanted signal is said to be present. This is called threshold
detection. Three approaches can be adopted in order to determine the threshold levels. They are:
1. Fixed Threshold.
2. CA-CFAR.
3. Clutter Map.
2. FPGA Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets
40
A. Fixed Threshold
In this case, the signal is compared with a fixed threshold and targets are detected whenever the signal
exceeds this threshold. If the threshold level is set properly, the receiver output should not normally exceed the
threshold if noise plus clutter alone were present, but the output would exceed the threshold if a strong target
echo signal were present.
Fig.1 Detection of target using fixed threshold.
If the threshold level were set too low, the unwanted signal might exceed it and be mistaken for a target
[14]. This is called false alarm. If the threshold were set too high, unwanted signal might not be large enough to
cause false alarms, but weak target echoes might not exceed the threshold and would not be detected. When this
occurs, it is called a missed detection.
B. CA-CFAR
The CFAR processor provides considerable better performance than the fixed processor when it comes
to following the varying mean level of the clutter. However, in some cases, such as the very spiky or weak
clutter, it may be impossible to follow the clutter mean variations. Under these conditions, Ideal fixed processor
is more optimal.
A false alarm is “an erroneous radar target detection decision caused by noise or other interfering
signals exceeding the detection threshold”. In general, it is an indication of the presence of a radar target when
there is no valid target [3]. The False Alarm Rate (FAR) is calculated using the following formula:
FAR =false targets per PRT/Number of range cells
False alarms are generated when thermal noise exceeds a pre-set threshold level, by the presence of
spurious signals, or by equipment malfunction. If the detection threshold is set too high, there will be very few
false alarms, but the signal-to-noise ratio required will inhibit detection of valid targets. If the threshold is set
too low, the large number of false alarms will mask detection of valid targets.
1. Threshold is set too high: Probability of Detection = 20%
2. Threshold is set optimal: Probability of Detection = 80%
But one false alarm arises!
False alarm rate = 1 / 666 = 1,5 •10-3
3. Threshold is set too low: a large number of false alarms arise!
4. Threshold is set variable: constant false-alarm rate.
The false alarm rate depends on the level of all interferences, like noise, clutter or jamming. Near the
radar site the influence of the fixed clutter is higher than the noise level. At large distances the influence of the
noise level is higher. To achieve a higher probability of detection in large distances by using a lower threshold
level, the false alarm rate rises at close range.
Constant false alarm rate (CFAR) detection refers to a common form of adaptive algorithm used in
radar systems to detect target returns against a background of noise, clutter and interference [2]. In the radar
receiver, the returning echoes are typically received by the antenna, amplified, down-converted and then passed
3. FPGA Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets
41
through detector circuitry that extracts the envelope of the signal. This signal is proportional to the power of the
received echo and comprises the wanted echo signal and the unwanted power from external clutter and
interference and internal receiver noise. The role of the constant false alarm rate circuitry is to determine the
power threshold above which any return can be considered to probably originate from a target. If this threshold
is too low, then more targets will be detected at the expense of increased numbers of false alarms and vice-versa,
but the number of false alarms will also be low[14]. In most radar detectors, the threshold is set in order to
achieve a required probability of false alarm.
If the background against which targets are to be detected is constant with time and space, then a fixed
threshold level can be chosen that provides a specified probability of false alarm, governed by the probability
density function of the noise, which is usually assumed to be Gaussian [2]. The probability of detection is then a
function of the signal-to-noise ratio of the target return.. In this case, a changing threshold can be used, where
the threshold level is raised and lowered to maintain a constant probability of false alarm. This is known as
constant false alarm rate (CFAR) detection.
In most simple CFAR detection schemes, the threshold level is calculated by estimating the level of the
noise floor around the cell under test (CUT). This can be found by taking a block of cells around the CUT and
calculating the average power level. To avoid corrupting this estimate with power from the CUT itself, cells
immediately adjacent to the CUT are normally ignored (and referred to as "guard cells"). A target is declared
present in the CUT if it is both greater than all its adjacent cells and greater than the local average power level.
The estimate of the local power level may sometimes be increased slightly to allow for the limited sample size.
This simple approach is called a cell-averaging CFAR (CA-CFAR).
Fig.2 Cell Averaging CFAR (CA-CFAR).
C. Clutter Map
Clutter map stores the magnitude of clutter echoes in a digital memory. The clutter echo stored in each
cell of the map can be used to establish a threshold. It is therefore, a form of CFAR [5]. The clutter map
establishes the thresholds used for detecting the targets. On each scan, one eighth of the present output is added
to the seven eighths of the value stored in the clutter map. Since clutter can change with time, the value of the
clutter in each cell is uploaded periodically by averaging over a large number of scans [6]. The larger the
number of scans the more accurate will be the estimate of the clutter and the less the effect of a target that
moves through the cell. The map is built up in a recursive manner. About 3 to 10 scans are required to establish
a steady state values. The values in the clutter map are multiplied by an appropriate constant to establish the
threshold which allows the detection of targets.
A clutter map has an advantage over the CA-CFAR in that it is not affected by edge effects. The
response of the clutter map will be reduced when a target of slow speed remains within the cell long enough to
affect the threshold. This effect can be reduced by making the map cell greater than the radar resolution cell.
Increasing the size of the clutter map cell should not be carried too far, however, since it reduces the interclutter
visibility.
4. FPGA Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets
42
III. BLOCK DIAGRAM
A functional block diagram that incorporates the scan-to-scan discriminator is shown in the figure.
Fig.3 Functional block diagram.
1. Analog-to-digital converter (ADC): The ADC is an electronic integrated circuit which transforms a signal
from analog (continuous) to digital (discrete) form. It is not possible to continuously convert the incoming
analog signal to a digital output code. Therefore the function of ADC is to quantize the analog signal and then
output the corresponding digital code value.
2. Digital Pulse Compression (DPC): A common technique used in Radar Systems to accommodate the
seemingly incompatible requirements of transmitting long pulse(in order to allow high mean transmitted
power),while achieving fine range resolution is Pulse Compression where the “Range Resolution” is the ability
of Radar to clearly distinguish the closely spaced targets. In the simplest form pulse compression amounts to
generating the pulse as a frequency -modulated ramp or “chirp” on the transmitter side and on the receiver side,
matched filter is used to compress the echo signal.
3. Magnitude Estimator: This performs the amplitude estimation of the complex numbers i.e.it determines the
absolute value.
𝑀𝑎𝑔𝑛𝑖𝑡𝑢𝑑𝑒 = 𝐼2 + 𝑄2
Where I=in phase component,
Q=out of phase component
4. Fixed Threshold, Clutter Map and CA-CFAR: These are the three approaches used by the scan-to-scan
discriminator in order to distinguish between the marine targets and the unwanted signals.
5. Scan-to-Scan Discriminator: In the marine environment, sea clutter might occur at a random position in one
scan but not in the next or subsequent scans. In contrast, targets will appear from scan to scan with essentially
the same amplitude. The scan-to-scan discriminator eliminates “spiky” clutter by averaging or weighting the
amplitudes from several scans. Thus, false alarms are reduced and marine targets can be detected.
6. Report Format: This provides the details about the target detection and strength of the target. This
information is displayed on the personal computer (PC).
5. FPGA Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets
43
IV. METHODOLOGY
The scan-to-scan discriminator uses one of the three approaches mentioned below in order to
distinguish between the marine the targets and the unwanted signals.
A. Scan-to-scan discriminator using fixed threshold.
Fig.4 Flow chart for scan-to-scan discriminator using fixed threshold.
TRUE FALSE
Target absent
Stop
Target present
Stop
Scan1*Scan2*
Scan3= =1?
Scan3=1(sample>
threshold value)
Scan3=0(sample<
threshold value)
Scan2=1(sample>
threshold value)
Scan2=0(sample<
threshold value)
Scan1=1(sample>
threshold value)
Scan1=0(sample<
threshold value)
Compare the samples &
threshold value
Compare the samples &
threshold value
Compare the samples &
threshold value
Fix the threshold value. Fix the threshold value.Fix the threshold value.
Perform the target
assignment
Perform the target
assignment
Perform the target
assignment
Generate the third set of
uniformly distributed
random numbers.
Generate the second set of
uniformly distributed
random numbers.
Generate the first set of
uniformly distributed
random numbers.
Initialize the no. of
samples & PRT
No of samples and prt
Initialize the no. of
samples & PRT
No of samples and prt
Start scan3Start scan2Start scan1
Initialize the no. of
samples & PRT
No of samples and prt
6. FPGA Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets
44
B. Scan-to-scan discriminator using CA-CFAR.
Fig.5 Flow chart for scan-to-scan discriminator using CA-CFAR.
Scan1*Scan2*Sc
an3= =1?
Target present Target absent
Stop Stop
Generate Threshold values
using Sliding window concept
Scan1=1(sample> threshold
value)
Scan1=0(sample< threshold
value)
Compare the samples &
threshold value
Compare the samples &
threshold value
Compare the samples &
threshold value
Scan2=1(sample> threshold
value)
Scan2=0(sample< threshold
value)
Scan3=1(sample> threshold
value)
Scan3=0(sample< threshold
value)
Generate the first set of
uniformly distributed
random numbers.
Perform the target
assignment
Perform the target
assignment
Perform the target
assignment
Generate the second set
of uniformly distributed
random numbers.
Generate the third set of
uniformly distributed
random numbers.
Initialize the no. of
samples & PRT
Initialize the no. of
samples & PRT
Initialize the no. of
samples & PRT
Start scan1 Start scan2 Start scan3
Generate Threshold values
using Sliding window concept
Generate Threshold values
using Sliding window concept
TRUE False
7. FPGA Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets
45
C. Scan-to-scan discriminator using clutter map.
Fig.6 Flow chart for scan-to-scan discriminator using Clutter Map.
Scan1*Scan2
*Scan3= =1?
Target present Target absent
Stop Stop
Find the maximum
Threshold value using
formula
Scan1=1(sample>
threshold value)
Scan1=0(sample<
threshold value)
Compare the samples &
threshold value
Compare the samples &
threshold value
Compare the samples &
threshold value
Scan2=1(sample>
threshold value)
Scan2=0(sample<
threshold value)
Scan3=1(sample>
threshold value)
Scan3=0(sample<
threshold value)
Generate the first set of
uniformly distributed
random numbers.
Perform the target
assignment
Perform the target
assignment
Perform the target
assignment
Generate the second set
of uniformly distributed
random numbers.
Generate the third set of
uniformly distributed
random numbers.
Initialize the no.
of samples &
PRT
Initialize the no.
of samples & PRT
Initialize the no.
of samples &
PRT
Start scan1 Start scan2 Start scan3
Find the maximum
Threshold value using
formula
Find the maximum
Threshold value using
formula
TRUE FALSE
8. FPGA Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets
46
V. APPLICATION
A. Tagging the Speed of Small Marine Targets
A target is said to be a small marine target if it occupies a single range cell. The output of each scan is
used to tag the speed of small marine targets. The output can be obtained using anyone of the three approaches
mentioned above.
The target is declared as a ―slow moving target if the target occupies the same range cell in all the 3
scans. The target is declared as a ―medium speed target if the target occupies the same range cell in either the
first and second scan or the second and third scan. The target is declared as a ―fast speed target or ―false
alarm if the target detection is made in either one of the scans or both the first and third scan. The small marine
targets tagged using the scan-to-scan discriminator using fixed threshold and clutter map are shown in fig.7 and
fig.8 respectively.
Fig.7 Implementation of tagging the speed of small marine targets using
Fixed threshold on Stratix V FPGA.
Fig.8 Implementation of tagging the speed of small marine targets using clutter map on Stratix V FPGA.
9. FPGA Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets
47
B. Tagging the Speed of Large Marine Targets using Gating Approach
A target is said to be a large marine target if it occupies two or more range cells. The output of each
scan is used to tag the speed of small marine targets. The output can be obtained using anyone of the three
approaches mentioned above.
Fig.9 Stationary target since the target remains at the same range cell in all three scans.
Fig.10 Slow speed target since the target moves from range cell 1 to 3 in three scans.
Fig.11 Medium speed target since the target moves from range cell 1 to 3 in two scans.
10. FPGA Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets
48
The target is declared as a ―slow speed target‖ if the target moves two range cells in 3 scans. The
target is declared as a ―medium speed target‖ if the target moves 2 range cells in 2 scans. The target is declared
as a ―fast speed target‖ or ―false alarm‖ if it is neither a slow speed target nor a medium speed target but
detection is made in any one of the scans. The large marine targets tagged using the scan-to-scan discriminator
using fixed threshold and clutter map are shown in fig.12 and fig.13 respectively.
Fig.12 Implementation of tagging the speed of large marine targets using fixed threshold
On Stratix V FPGA.
Fig.13 Implementation of tagging the speed of large marine targets using clutter map on Stratix V FPGA.
VI. RESULTS AND DISCUSSIONS
Compilation and synthesis reports are obtained using Quartus II. Once the .sof(s) are obtained, these
files are dumped on the FPGA board using the USB blaster. The output of the FPGA can be seen using the
Signal Tap II Logic Analyser as shown in fig.14 and fig.15.
11. FPGA Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets
49
Fig.14 Implementation of scan-to-scan discriminator using fixed threshold on Stratix V FPGA.
Fig.15 Implementation of scan-to-scan discriminator using clutter map on Stratix V FPGA.
VII. CONCLUSION AND FUTURE SCOPE
This paper has introduced the scan-to-scan discriminator, a simple technique that significantly
improves the detection performance. Fine resolution and the ability to detect marine targets makes scan-to-scan
discriminator well suited for radar surveillance in waterside security applications. The advantages and drawback
of the ideal threshold approach were concisely mentioned. The role of CA-CFAR is to adaptively set a detection
threshold so that a constant probability of false alarm is not exceeded and a designed probability of detection is
achieved. The intended target echo signal is always immersed in a background which may contain clutter
together with an additional superimposed thermal noise. The third approach called the clutter map stores the
amplitude of the clutter in the memory. Compilation reports and board programming files have been obtained
using Quartus II 13.1. Altera-Stratix V FPGA signal processing board has been used as a target device for the
implementation purpose. Experimental results have shown that the proposed scan-to-scan discriminator can
remove considerable clutter plus noise while preserving the target. Fine resolution and the ability to detect and
tag the speed of marine targets makes the scan-to-scan discriminator well suited for radar surveillance in
waterside security applications.
12. FPGA Implementation of Scan-to-Scan Discriminator for the Detection of Marine Targets
50
The discussion in this paper has concentrated on the three threshold detection techniques and the scan-
to-scan discriminator which in turn uses these three approaches to detect the marine targets. An important aspect
of the future radars is likely to be their ability to use the scan-to-scan discriminator in order to tag the speed of
marine targets i.e. tag the speed of both small marine targets and large marine targets once the target detection is
achieved. The output of the scan-to-scan discriminator can then be used to classify the marine targets as
stationary, slow speed, medium speed and fast speed targets. The scan-to-scan discriminator can be enhanced
further in order to implement the following features. They are: to design the architecture and implement the CA-
CFAR; to distinguish between the fast moving marine targets and false alarms; to determine the range and the
angular direction of marine targets.
REFERENCES
[1]. Ward K D, Baker C J, Watts S, “Maritime surveillance radar, Part I: Radar scattering from the ocean
surface”, IEE Proceedings on Radar and Signal Processing, Volume 137-Issue: 2, April 1990.
[2]. Watts S, Baker C J, Ward K D, "Maritime surveillance radar, Part II: Detection performance prediction
in sea clutter", Radar and Signal Processing, IEE Proceedings F, Volume 137 -Issue: 2, April 1990.
[3]. Merrill I. Skolnik, “Introduction to Radar Systems”, McGraw-Hill Publications, 3 edition, August
2000.
[4]. Valentina Ravenni, “Performance Evaluations of Frequency Diversity Radar System”, 37th European
Microwave Conference, October 2007.
[5]. Jens Christian Pedersen, “SCANTER 5000 and 6000 Solid State Radar: Utilisation of the SCANTER
5000 and 6000 series next generation solid state, coherent, frequency diversity and time diversity radar
with software defined functionality for security applications”, Waterside Security Conference (WSS),
2010.
[6]. Perez F, Asensio A, Gismero J, Alonso J I, Monje J M, Casanova F, Cortijo R, Perez-Ojeda J
F,"ARIES: A High Resolution Shipboard Radar", Radar Conference, IEEE, 2002.
[7]. Musicki D, Suvorova S, Morelande M, Moran B, “Clutter map and target tracking”, Information
Fusion, 2005 8th International Conference, Volume 1, July 2005.
[8]. Denny.M, “Simulating sea clutter via the compound-k distribution”, Radar System Modelling, IEE
Colloquium, October 1998.
[9]. C. Bouvier, L. Martinet, G. Favier, M. Artaud, “Simulation of radar sea clutter using autoregressive
modelling and K-distribution”, Radar Conference, 1995.
[10]. Abdel-Nabi M.A, Seddik K.G, El-Badaway, “Spiky sea and constant false alarm rate processing in
high-resolution maritime radar systems”, International Conference on Computer and Communication
Engineering (ICCCE), 2012.
[11]. Roberto Perez-Andrade, Rene Cumplido, Claudia Feregrino-Uribe, Fernando Martin Del Campo, “A
Versatile Hardware Architecture for a Constant False Alarm Rate Processor Based on a Linear
Insertion Sorter”.
[12]. Gandhi P.P., Kassam S.A., “Analysis of CFAR Processors in Nonhomogeneous Background”, IEEE
Transactions on Aerospace and Electronic Systems, vol. 24, 1988.
[13]. Lei Zhao, Weixian Liu, Xin Wu, Fu. J. S. “A Novel Approach for CFAR Design”, Proceedings of the
IEEE, Radar Conference, 2001.
[14]. Mark A. Richards, James A. Scheer, William A. Holm, “Principles of Modern Radar: Basic
Principles”, SciTech publishing, 10 edition, 2010.
[15]. Lehtomaki J.J, Vartiainen J, Juntti M, Saarnisaari H, “CFAR Outlier Detection With Forward
Methods”, IEEE Transactions on Signal Processing, 2007.
[16]. N. Moazen, M. R. Akhavan-Sarraf, “A Robust CFAR Algorithm In Non- Homogenous Environments”,
IET International Conference on Radar Systems, 2007.
[17]. Meng Xiangwei, Qu Fuyong, “Adaptive clutter map detector in nonhomogeneous environment”, IEEE
10th International Conference on Signal Processing (ICSP), 2010.
[18]. Darko Musicki, Sofia Suvorova, Mark Morelande and Bill Moran, “Clutter Map and Target Tracking”,
7th International Conference on Information Fusion (FUSION), 2005.