The coordinate rotation digital computer (CORDIC) algorithm is well known iterative
algorithm for performing rotations in digital signal processing applications. Hardware
implementation of CORDIC results increase in Critical path delay. Pipelined architecture isused in CORDIC to increase the clock speed and to reduce the Critical path delay. In this paper a hardware efficient Digital sine and cosine wave generator is designed and implemented using Pipelined CORDIC architecture. FPGA based architecture is presented and design has been implemented using Xilinx 12.3 device
Implementation of Efficiency CORDIC Algorithmfor Sine & Cosine GenerationIOSR Journals
Abstract: This paper presents an area-time efficient coordinate rotation digital computer (CORDIC) algorithm that completely eliminates the scale-factor. A generalized micro-rotation selection technique based on high speed most-significant-1-detection obviates the complex search algorithms for identifying the micro-rotations. This algorithm is redefined as the elementary angles for reducing the number of CORDIC iterations. Compared to the existing re-cursive architectures the proposed one has 17% lower slice-delay product on Xilinx Spartan XC2S200E device. The CORDIC processor pro-vides the flexibility to manipulate the number of iterations depending on the accuracy, area and latency requirements. Index Terms—coordinate rotation digital computer (CORDIC), cosine/sine, field-programmable gate array(FPGA),most-significant-1, recursive architecture.
A CORDIC based QR Decomposition Technique for MIMO Detection IJECEIAES
CORDIC based improved real and complex QR Decomposition (QRD) for channel pre-processing operations in (Multiple-Input Multiple-Output) MIMO detectors are presented in this paper. The proposed design utilizes pipelining and parallel processing techniques and reduces the latency and hardware complexity of the module respectively. Computational complexity analysis report shows the superiority of our module by 16% compared to literature. The implementation results reveal that the proposed QRD takes shorter lat ency compared to literature. The power consumption of 2x2 real channel matrix and 2x2 complex channel matrix was found to be 12mW and 44mW respectively on the state-of-the-art Xilinx Virtex 5 FPGA.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Implementation of Efficiency CORDIC Algorithmfor Sine & Cosine GenerationIOSR Journals
Abstract: This paper presents an area-time efficient coordinate rotation digital computer (CORDIC) algorithm that completely eliminates the scale-factor. A generalized micro-rotation selection technique based on high speed most-significant-1-detection obviates the complex search algorithms for identifying the micro-rotations. This algorithm is redefined as the elementary angles for reducing the number of CORDIC iterations. Compared to the existing re-cursive architectures the proposed one has 17% lower slice-delay product on Xilinx Spartan XC2S200E device. The CORDIC processor pro-vides the flexibility to manipulate the number of iterations depending on the accuracy, area and latency requirements. Index Terms—coordinate rotation digital computer (CORDIC), cosine/sine, field-programmable gate array(FPGA),most-significant-1, recursive architecture.
A CORDIC based QR Decomposition Technique for MIMO Detection IJECEIAES
CORDIC based improved real and complex QR Decomposition (QRD) for channel pre-processing operations in (Multiple-Input Multiple-Output) MIMO detectors are presented in this paper. The proposed design utilizes pipelining and parallel processing techniques and reduces the latency and hardware complexity of the module respectively. Computational complexity analysis report shows the superiority of our module by 16% compared to literature. The implementation results reveal that the proposed QRD takes shorter lat ency compared to literature. The power consumption of 2x2 real channel matrix and 2x2 complex channel matrix was found to be 12mW and 44mW respectively on the state-of-the-art Xilinx Virtex 5 FPGA.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
In this project 31 % area delay product reduction is possible with the use of the CSLA based 32 bit unsigned parallel multiplier than CLAA based 32 bit unsigned parallel multiplier
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Cost Efficient Design of Reversible Adder Circuits for Low Power ApplicationsVIT-AP University
A large amount of research is currently going on in the field
of reversible logic, which have low heat dissipation, low
power consumption, which is the main factor to apply
reversible in digital VLSI circuit design.This paper introduces
reversible gate named as ‘Inventive0 gate’. The novel gate is
synthesis the efficient adder modules with minimum garbage
output and gate count. The Inventive0 gate capable of
implementing a 4-bit ripple carry adder and carry skip adders.
It is presented that Inventive0 gate is much more efficient and
optimized approach as compared to their existing design, in
terms of gate count, garbage outputs and constant inputs. In
addition, some popular available reversible gates are
implemented in the MOS transistor design the implementation
kept in mind for minimum MOS transistor count and are
completely reversible in behaviour more precise forward and
backward computation. Lesser architectural complexity show
that the novel designs are compact, fast as well as low power.
Implementation of Low Power and Area-Efficient Carry Select AdderIJMTST Journal
Carry Select Adder (CSLA) is one of the fastest adders used in many data-processing processors to perform
fast arithmetic functions. From the structure of the CSLA, it is clear that there is scope for reducing the area
and power consumption in the CSLA. This work uses a simple and efficient gate-level modification to
significantly reduce the area and power of the CSLA. Based on this modification 8-, 16-, 32-,-b square-root
CSLA (SQRT CSLA) architecture have been developed and compared with the regular SQRT CSLA
architecture. The proposed design has reduced area and power as compared with the regular SQRT CSLA
with only a slight increase in the delay. This work evaluates the performance of the proposed designs in
terms of delay, area, power, and their products by hand with logical effort and through custom design and
layout in 0.18-m CMOS process technology. The results analysis shows that the proposed CSLA structure is
better than the regular SQRT CSLA.
FPGA FIR filter implementation (Audio signal processing)Hocine Merabti
Tutorial on FPGA implementation of a low-pass FIR filter for audio signal processing applications. The design is implemented on a Xilinx Spartan-6 based development board (Atlys-Digilent).
Design and Implementation of 16-bit Arithmetic Logic Unit using Quantum dot C...IJERA Editor
Quantum Dot Cellular Automata (QCA) is an advanced nanotechnology that attempts to create general computational at the nano-scale by controlling the position of single electrons. Quantum dot cellular automata (QCA) defines a new device architecture that permits the innovative design of digital systems. QCA technology has large potential in terms of high space density and power dissipation with the development of the faster computer with smaller size & low power consumption.QCA help us to overcome the limitations of CMOS technology. In this paper, A design 16-bit arithmetic logic unit (ALU) based on the Quantum dot cellular automata (QCA) is presented. The simulation result of 16 bit ALU is verified using QCA Designer tool.
FPGA Implementation of FIR Filter using Various Algorithms: A RetrospectiveIJORCS
This Paper is a review study of FPGA implementation of Finite Impulse response (FIR) with low cost and high performance. The key observation of this paper is an elaborate analysis about hardware implementations of FIR filters using different algorithm i.e., Distributed Arithmetic (DA), DA-Offset Binary Coding (DA-OBC), Common Sub-expression Elimination (CSE) and sum-of-power-of-two (SOPOT) with less resources and without affecting the performance of the original FIR Filter.
Implementation and Comparison of Efficient 16-Bit SQRT CSLA Using Parity Pres...IJERA Editor
In Very Large Scale Integration (VLSI) outlines, Carry Select Adder (CSLA) is one of the quickest adder utilized as a part of numerous data processing processors to perform quick number crunching capacities. In this paper we proposed the design of SQRT CSLA using parity preserving reversible gate (P2RG). Reversible logic is emerging field in today VLSI design. In conventional circuits, the logic gates such as AND gate, OR gate is irreversible in nature and computing with irreversible logic results in energy dissipation. This problem can be circumvented by using reversible logic. In ideal condition, the reversible logic gate produces zero power dissipation. The proposed design is efficient in terms of delay as compare to irreversible SQRT CSLA. The simulation is done using Xilinx.
DESIGN AND IMPLEMENTATION OF LOW POWER ALU USING CLOCK GATING AND CARRY SELEC...IAEME Publication
CPUs in general-purpose personal computers, such as desktops and laptops, dissipate significantly more power in the order of few watts because of their higher complexity and speed. ALU is a fundamental building block of CPU. It does all process related to arithmetic and logic operations. As the operations become more complex, the ALU become more complex, more expensive, takes up more space in the CPU and contributes more power dissipation within the CPU. Hence power consumption of ALU is a major issue in the designing of CPU.
In this project 31 % area delay product reduction is possible with the use of the CSLA based 32 bit unsigned parallel multiplier than CLAA based 32 bit unsigned parallel multiplier
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Cost Efficient Design of Reversible Adder Circuits for Low Power ApplicationsVIT-AP University
A large amount of research is currently going on in the field
of reversible logic, which have low heat dissipation, low
power consumption, which is the main factor to apply
reversible in digital VLSI circuit design.This paper introduces
reversible gate named as ‘Inventive0 gate’. The novel gate is
synthesis the efficient adder modules with minimum garbage
output and gate count. The Inventive0 gate capable of
implementing a 4-bit ripple carry adder and carry skip adders.
It is presented that Inventive0 gate is much more efficient and
optimized approach as compared to their existing design, in
terms of gate count, garbage outputs and constant inputs. In
addition, some popular available reversible gates are
implemented in the MOS transistor design the implementation
kept in mind for minimum MOS transistor count and are
completely reversible in behaviour more precise forward and
backward computation. Lesser architectural complexity show
that the novel designs are compact, fast as well as low power.
Implementation of Low Power and Area-Efficient Carry Select AdderIJMTST Journal
Carry Select Adder (CSLA) is one of the fastest adders used in many data-processing processors to perform
fast arithmetic functions. From the structure of the CSLA, it is clear that there is scope for reducing the area
and power consumption in the CSLA. This work uses a simple and efficient gate-level modification to
significantly reduce the area and power of the CSLA. Based on this modification 8-, 16-, 32-,-b square-root
CSLA (SQRT CSLA) architecture have been developed and compared with the regular SQRT CSLA
architecture. The proposed design has reduced area and power as compared with the regular SQRT CSLA
with only a slight increase in the delay. This work evaluates the performance of the proposed designs in
terms of delay, area, power, and their products by hand with logical effort and through custom design and
layout in 0.18-m CMOS process technology. The results analysis shows that the proposed CSLA structure is
better than the regular SQRT CSLA.
FPGA FIR filter implementation (Audio signal processing)Hocine Merabti
Tutorial on FPGA implementation of a low-pass FIR filter for audio signal processing applications. The design is implemented on a Xilinx Spartan-6 based development board (Atlys-Digilent).
Design and Implementation of 16-bit Arithmetic Logic Unit using Quantum dot C...IJERA Editor
Quantum Dot Cellular Automata (QCA) is an advanced nanotechnology that attempts to create general computational at the nano-scale by controlling the position of single electrons. Quantum dot cellular automata (QCA) defines a new device architecture that permits the innovative design of digital systems. QCA technology has large potential in terms of high space density and power dissipation with the development of the faster computer with smaller size & low power consumption.QCA help us to overcome the limitations of CMOS technology. In this paper, A design 16-bit arithmetic logic unit (ALU) based on the Quantum dot cellular automata (QCA) is presented. The simulation result of 16 bit ALU is verified using QCA Designer tool.
FPGA Implementation of FIR Filter using Various Algorithms: A RetrospectiveIJORCS
This Paper is a review study of FPGA implementation of Finite Impulse response (FIR) with low cost and high performance. The key observation of this paper is an elaborate analysis about hardware implementations of FIR filters using different algorithm i.e., Distributed Arithmetic (DA), DA-Offset Binary Coding (DA-OBC), Common Sub-expression Elimination (CSE) and sum-of-power-of-two (SOPOT) with less resources and without affecting the performance of the original FIR Filter.
Implementation and Comparison of Efficient 16-Bit SQRT CSLA Using Parity Pres...IJERA Editor
In Very Large Scale Integration (VLSI) outlines, Carry Select Adder (CSLA) is one of the quickest adder utilized as a part of numerous data processing processors to perform quick number crunching capacities. In this paper we proposed the design of SQRT CSLA using parity preserving reversible gate (P2RG). Reversible logic is emerging field in today VLSI design. In conventional circuits, the logic gates such as AND gate, OR gate is irreversible in nature and computing with irreversible logic results in energy dissipation. This problem can be circumvented by using reversible logic. In ideal condition, the reversible logic gate produces zero power dissipation. The proposed design is efficient in terms of delay as compare to irreversible SQRT CSLA. The simulation is done using Xilinx.
DESIGN AND IMPLEMENTATION OF LOW POWER ALU USING CLOCK GATING AND CARRY SELEC...IAEME Publication
CPUs in general-purpose personal computers, such as desktops and laptops, dissipate significantly more power in the order of few watts because of their higher complexity and speed. ALU is a fundamental building block of CPU. It does all process related to arithmetic and logic operations. As the operations become more complex, the ALU become more complex, more expensive, takes up more space in the CPU and contributes more power dissipation within the CPU. Hence power consumption of ALU is a major issue in the designing of CPU.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
HARDWARE EFFICIENT SCALING FREE VECTORING AND ROTATIONAL CORDIC FOR DSP APPLI...VLSICS Design
The COordinate Rotation DIgital Computer CORDIC algorithm has proved its versatility in computing
various transcendental functions by only using the shift and adds operations. This paper presents a new
hardware efficient scaling free CORDIC algorithm to operate in vectoring and in rotation mode. The
micro rotation of the vector is always in one direction with no scale factor correction. The Range of
Convergence RoC is from 0 to 2. No pre and post processing circuitry is required. 16 bit Scaling free
CORDIC Pipelined architecture based on the proposed algorithm is synthesized on FPGA Xilinx VirtexII P
device coded in Verilog. Synthesized results show totally scaling free performance with very small
dynamic power consumption of .06 mW and maximum delay of 4.123 ns and 9.925 ns in the rotational and
vectoring modes respectively. The minimum BEP of the proposed algorithm implementation is 12.
Proposed algorithm is faster and efficient in terms of area and accuracy as compared to conventional
CORDIC.
Reconfigurable CORDIC Low-Power Implementation of Complex Signal Processing f...Editor IJMTER
In recent years, CORDIC algorithms has been used extensively for various image processing
system& biomedical applications. By using CORDIC algorithm we can able to reducing the number of
iteration to process the image in the system. Low power design is to be challenging process during system
operations. Previous approaches scope to minimize the power consumption without image quality
consideration. In this paper CORDIC Based Low Power DCT iterations process equally based upon their
image quality. An hardware implementation of ROM & control logic circuit to require large hardware
space in this system. Look-ahead CORDIC Approach is used to finish the iteration at one time. When
reducing hardware area & reducing number of iterations for maximize battery lifetime. This idea used to
achieve the low power design of image and video compression application
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Design of Adjustable Reconfigurable Wireless Single Core CORDIC based Rake Re...IOSR Journals
In wireless communication system transmitted signals are subjected to multiple reflections,
diffractions and attenuation caused by obstacles such as buildings and hills, etc. At the receiver end, multiple
copies of the transmitted signal are received that arrive at clearly distinguishable time instants and are faded by
signal cancellation. Rake receiver is a technique to combine these so called multi-paths [2] by utilizing multiple
correlation receivers allocated to those delay positions on which the significant energy arrives which achieves a
significant improvement in the SNR of the output signal. This paper shows how the rake, including dispreading
and descrambling could be replaced by a receiver that can be implemented on a CORDIC based hardware
architecture. The performance in conjunction with the computational requirements of the receiver is widely
adjustable which is significantly better than that of the conventional rake receiver
Design of Adjustable Reconfigurable Wireless Single Core CORDIC based Rake Re...IOSR Journals
Abstract : In wireless communication system transmitted signals are subjected to multiple reflections, diffractions and attenuation caused by obstacles such as buildings and hills, etc. At the receiver end, multiple copies of the transmitted signal are received that arrive at clearly distinguishable time instants and are faded by signal cancellation. Rake receiver is a technique to combine these so called multi-paths [2] by utilizing multiple correlation receivers allocated to those delay positions on which the significant energy arrives which achieves a significant improvement in the SNR of the output signal. This paper shows how the rake, including dispreading and descrambling could be replaced by a receiver that can be implemented on a CORDIC based hardware architecture. The performance in conjunction with the computational requirements of the receiver is widely adjustable which is significantly better than that of the conventional rake receiver. Keywords - Rake receiver, Multi-paths, CORDIC
Realization of Direct Digital Synthesis in Cordic AlgorithmIJASRD Journal
Nowadays the modern communication system and software defined radio-based applications needs Trans receiver consisting of fully programmable circuit which performs modulation and demodulation process. The method which does not need memory for realizing modulators and demodulators is CORDIC algorithm. The CORDIC algorithm is a versatile algorithm which calculates only adder and shifter operations instead of using multiplier. So, this algorithm is mostly used for VLSI and digital signal processing. The main concept used in this project is Direct Digital Synthesis (DDS) which generates the analog waveform in digital format based on CORDIC algorithm approach .This paper focuses on analysis and simulation of Binary phase shift keying (BPSK), Binary amplitude shift keying (BASK), Binary frequency shift keying (BFSK), Quadrature phase shift keying (QPSK) modulation scheme using DDS based on CORDIC algorithm instead of ROM look up table which greatly reduce the number of slices and no of look up tables. The whole simulation is done on Modelsim and Xilinx-ISE using Verilog descriptive language and these modulation schemes are implemented on Spartan-3 FPGA kit.
Area Time Efficient Scaling Free Rotation Mode Cordic Using Circular TrajectoryIOSR Journals
Abstract: This paper presents an area-time efficient Coordinate Rotation Digital Computer (CORDIC) algorithm that completely eliminates the scale-factor. Besides we have proposed an algorithm to reduce the number of CORDIC iterations by increasing the number of stages. The efficient scale factor compensation techniques are proposed which adversely effect the latency/throughput of computation. The proposed CORDIC algorithm provides the flexibility to manipulate the number of iterations depending on the accuracy, area and latency requirements. The CORDIC is an iterative arithmetic algorithm for computing generalized vector rotations without performing multiplications. Index Terms: coordinate rotation digital computer (CORDIC), cosine/sine, field-programmable gate array (FPGA), most-significant-1, recursive architecture, Discrete Fourier Transform (DFT), Discrete Cosine transform (DCT), Iterative CORDIC, Pipelined CORDIC.
Similar to FPGA Implementation of Pipelined CORDIC Sine Cosine Digital Wave Generator (20)
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
The progressive development of Synthetic Aperture Radar (SAR) systems diversify the exploitation of the generated images by these systems in different applications of geoscience. Detection and monitoring surface deformations, procreated by various phenomena had benefited from this evolution and had been realized by interferometry (InSAR) and differential interferometry (DInSAR) techniques. Nevertheless, spatial and temporal decorrelations of the interferometric couples used, limit strongly the precision of analysis results by these techniques. In this context, we propose, in this work, a methodological approach of surface deformation detection and analysis by differential interferograms to show the limits of this technique according to noise quality and level. The detectability model is generated from the deformation signatures, by simulating a linear fault merged to the images couples of ERS1 / ERS2 sensors acquired in a region of the Algerian south.
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
A novel based a trajectory-guided, concatenating approach for synthesizing high-quality image real sample renders video is proposed . The lips reading automated is seeking for modeled the closest real image sample sequence preserve in the library under the data video to the HMM predicted trajectory. The object trajectory is modeled obtained by projecting the face patterns into an KDA feature space is estimated. The approach for speaker's face identification by using synthesise the identity surface of a subject face from a small sample of patterns which sparsely each the view sphere. An KDA algorithm use to the Lip-reading image is discrimination, after that work consisted of in the low dimensional for the fundamental lip features vector is reduced by using the 2D-DCT.The mouth of the set area dimensionality is ordered by a normally reduction base on the PCA to obtain the Eigen lips approach, their proposed approach by[33]. The subjective performance results of the cost function under the automatic lips reading modeled , which wasn’t illustrate the superior performance of the
method.
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
Universities offer software engineering capstone course to simulate a real world-working environment in which students can work in a team for a fixed period to deliver a quality product. The objective of the paper is to report on our experience in moving from Waterfall process to Agile process in conducting the software engineering capstone project. We present the capstone course designs for both Waterfall driven and Agile driven methodologies that highlight the structure, deliverables and assessment plans.To evaluate the improvement, we conducted a survey for two different sections taught by two different instructors to evaluate students’ experience in moving from traditional Waterfall model to Agile like process. Twentyeight students filled the survey. The survey consisted of eight multiple-choice questions and an open-ended question to collect feedback from students. The survey results show that students were able to attain hands one experience, which simulate a real world-working environment. The results also show that the Agile approach helped students to have overall better design and avoid mistakes they have made in the initial design completed in of the first phase of the capstone project. In addition, they were able to decide on their team capabilities, training needs and thus learn the required technologies earlier which is reflected on the final product quality
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
Using social media in education provides learners with an informal way for communication. Informal communication tends to remove barriers and hence promotes student engagement. This paper presents our experience in using three different social media technologies in teaching software project management course. We conducted different surveys at the end of every semester to evaluate students’ satisfaction and engagement. Results show that using social media enhances students’ engagement and satisfaction. However, familiarity with the tool is an important factor for student satisfaction.
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
In real world computing environment with using a computer to answer questions has been a human dream since the beginning of the digital era, Question-answering systems are referred to as intelligent systems, that can be used to provide responses for the questions being asked by the user based on certain facts or rules stored in the knowledge base it can generate answers of questions asked in natural , and the first main idea of fuzzy logic was to working on the problem of computer understanding of natural language, so this survey paper provides an overview on what Question-Answering is and its system architecture and the possible relationship and
different with fuzzy logic, as well as the previous related research with respect to approaches that were followed. At the end, the survey provides an analytical discussion of the proposed QA models, along or combined with fuzzy logic and their main contributions and limitations.
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
Human beings generate different speech waveforms while speaking the same word at different times. Also, different human beings have different accents and generate significantly varying speech waveforms for the same word. There is a need to measure the distances between various words which facilitate preparation of pronunciation dictionaries. A new algorithm called Dynamic Phone Warping (DPW) is presented in this paper. It uses dynamic programming technique for global alignment and shortest distance measurements. The DPW algorithm can be used to enhance the pronunciation dictionaries of the well-known languages like English or to build pronunciation dictionaries to the less known sparse languages. The precision measurement experiments show 88.9% accuracy.
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
In education, the use of electronic (E) examination systems is not a novel idea, as Eexamination systems have been used to conduct objective assessments for the last few years. This research deals with randomly designed E-examinations and proposes an E-assessment system that can be used for subjective questions. This system assesses answers to subjective questions by finding a matching ratio for the keywords in instructor and student answers. The matching ratio is achieved based on semantic and document similarity. The assessment system is composed of four modules: preprocessing, keyword expansion, matching, and grading. A survey and case study were used in the research design to validate the proposed system. The examination assessment system will help instructors to save time, costs, and resources, while increasing efficiency and improving the productivity of exam setting and assessments.
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
African Buffalo Optimization (ABO) is one of the most recent swarms intelligence based metaheuristics. ABO algorithm is inspired by the buffalo’s behavior and lifestyle. Unfortunately, the standard ABO algorithm is proposed only for continuous optimization problems. In this paper, the authors propose two discrete binary ABO algorithms to deal with binary optimization problems. In the first version (called SBABO) they use the sigmoid function and probability model to generate binary solutions. In the second version (called LBABO) they use some logical operator to operate the binary solutions. Computational results on two knapsack problems (KP and MKP) instances show the effectiveness of the proposed algorithm and their ability to achieve good and promising solutions.
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persistence presence on a compromised host. Amongst the various DDNS techniques, Domain Generation Algorithm (DGA) is often perceived as the most difficult to detect using traditional methods. This paper presents an approach for detecting DGA using frequency analysis of the character distribution and the weighted scores of the domain names. The approach’s feasibility is demonstrated using a range of legitimate domains and a number of malicious algorithmicallygenerated domain names. Findings from this study show that domain names made up of English characters “a-z” achieving a weighted score of < 45 are often associated with DGA. When a weighted score of < 45 is applied to the Alexa one million list of domain names, only 15% of the domain names were treated as non-human generated.
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
The amount of piracy in the streaming digital content in general and the music industry in specific is posing a real challenge to digital content owners. This paper presents a DRM solution to monetizing, tracking and controlling online streaming content cross platforms for IP enabled devices. The paper benefits from the current advances in Blockchain and cryptocurrencies. Specifically, the paper presents a Global Music Asset Assurance (GoMAA) digital currency and presents the iMediaStreams Blockchain to enable the secure dissemination and tracking of the streamed content. The proposed solution provides the data owner the ability to control the flow of information even after it has been released by creating a secure, selfinstalled, cross platform reader located on the digital content file header. The proposed system provides the content owners’ options to manage their digital information (audio, video, speech, etc.), including the tracking of the most consumed segments, once it is release. The system benefits from token distribution between the content owner (Music Bands), the content distributer (Online Radio Stations) and the content consumer(Fans) on the system blockchain.
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
This paper discusses the importance of verb suffix mapping in Discourse translation system. In
discourse translation, the crucial step is Anaphora resolution and generation. In Anaphora
resolution, cohesion links like pronouns are identified between portions of text. These binders
make the text cohesive by referring to nouns appearing in the previous sentences or nouns
appearing in sentences after them. In Machine Translation systems, to convert the source
language sentences into meaningful target language sentences the verb suffixes should be
changed as per the cohesion links identified. This step of translation process is emphasized in
the present paper. Specifically, the discussion is on how the verbs change according to the
subjects and anaphors. To explain the concept, English is used as the source language (SL) and
an Indian language Telugu is used as Target language (TL)
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
In this paper, based on the definition of conformable fractional derivative, the functional
variable method (FVM) is proposed to seek the exact traveling wave solutions of two higherdimensional
space-time fractional KdV-type equations in mathematical physics, namely the
(3+1)-dimensional space–time fractional Zakharov-Kuznetsov (ZK) equation and the (2+1)-
dimensional space–time fractional Generalized Zakharov-Kuznetsov-Benjamin-Bona-Mahony
(GZK-BBM) equation. Some new solutions are procured and depicted. These solutions, which
contain kink-shaped, singular kink, bell-shaped soliton, singular soliton and periodic wave
solutions, have many potential applications in mathematical physics and engineering. The
simplicity and reliability of the proposed method is verified.
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
The using of information technology resources is rapidly increasing in organizations,
businesses, and even governments, that led to arise various attacks, and vulnerabilities in the
field. All resources make it a must to do frequently a penetration test (PT) for the environment
and see what can the attacker gain and what is the current environment's vulnerabilities. This
paper reviews some of the automated penetration testing techniques and presents its
enhancement over the traditional manual approaches. To the best of our knowledge, it is the
first research that takes into consideration the concept of penetration testing and the standards
in the area.This research tackles the comparison between the manual and automated
penetration testing, the main tools used in penetration testing. Additionally, compares between
some methodologies used to build an automated penetration testing platform.
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
Since the mid of 1990s, functional connectivity study using fMRI (fcMRI) has drawn increasing
attention of neuroscientists and computer scientists, since it opens a new window to explore
functional network of human brain with relatively high resolution. BOLD technique provides
almost accurate state of brain. Past researches prove that neuro diseases damage the brain
network interaction, protein- protein interaction and gene-gene interaction. A number of
neurological research paper also analyse the relationship among damaged part. By
computational method especially machine learning technique we can show such classifications.
In this paper we used OASIS fMRI dataset affected with Alzheimer’s disease and normal
patient’s dataset. After proper processing the fMRI data we use the processed data to form
classifier models using SVM (Support Vector Machine), KNN (K- nearest neighbour) & Naïve
Bayes. We also compare the accuracy of our proposed method with existing methods. In future,
we will other combinations of methods for better accuracy.
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
In order to treat and analyze real datasets, fuzzy association rules have been proposed. Several
algorithms have been introduced to extract these rules. However, these algorithms suffer from
the problems of utility, redundancy and large number of extracted fuzzy association rules. The
expert will then be confronted with this huge amount of fuzzy association rules. The task of
validation becomes fastidious. In order to solve these problems, we propose a new validation
method. Our method is based on three steps. (i) We extract a generic base of non redundant
fuzzy association rules by applying EFAR-PN algorithm based on fuzzy formal concept analysis.
(ii) we categorize extracted rules into groups and (iii) we evaluate the relevance of these rules
using structural equation model.
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
In many applications of data mining, class imbalance is noticed when examples in one class are
overrepresented. Traditional classifiers result in poor accuracy of the minority class due to the
class imbalance. Further, the presence of within class imbalance where classes are composed of
multiple sub-concepts with different number of examples also affect the performance of
classifier. In this paper, we propose an oversampling technique that handles between class and
within class imbalance simultaneously and also takes into consideration the generalization
ability in data space. The proposed method is based on two steps- performing Model Based
Clustering with respect to classes to identify the sub-concepts; and then computing the
separating hyperplane based on equal posterior probability between the classes. The proposed
method is tested on 10 publicly available data sets and the result shows that the proposed
method is statistically superior to other existing oversampling methods.
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
Data collection is an essential, but manpower intensive procedure in ecological research. An
algorithm was developed by the author which incorporated two important computer vision
techniques to automate data cataloging for butterfly measurements. Optical Character
Recognition is used for character recognition and Contour Detection is used for imageprocessing.
Proper pre-processing is first done on the images to improve accuracy. Although
there are limitations to Tesseract’s detection of certain fonts, overall, it can successfully identify
words of basic fonts. Contour detection is an advanced technique that can be utilized to
measure an image. Shapes and mathematical calculations are crucial in determining the precise
location of the points on which to draw the body and forewing lines of the butterfly. Overall,
92% accuracy were achieved by the program for the set of butterflies measured.
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
Smart cities utilize Internet of Things (IoT) devices and sensors to enhance the quality of the city
services including energy, transportation, health, and much more. They generate massive
volumes of structured and unstructured data on a daily basis. Also, social networks, such as
Twitter, Facebook, and Google+, are becoming a new source of real-time information in smart
cities. Social network users are acting as social sensors. These datasets so large and complex
are difficult to manage with conventional data management tools and methods. To become
valuable, this massive amount of data, known as 'big data,' needs to be processed and
comprehended to hold the promise of supporting a broad range of urban and smart cities
functions, including among others transportation, water, and energy consumption, pollution
surveillance, and smart city governance. In this work, we investigate how social media analytics
help to analyze smart city data collected from various social media sources, such as Twitter and
Facebook, to detect various events taking place in a smart city and identify the importance of
events and concerns of citizens regarding some events. A case scenario analyses the opinions of
users concerning the traffic in three largest cities in the UAE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
The anonymity of social networks makes it attractive for hate speech to mask their criminal
activities online posing a challenge to the world and in particular Ethiopia. With this everincreasing
volume of social media data, hate speech identification becomes a challenge in
aggravating conflict between citizens of nations. The high rate of production, has become
difficult to collect, store and analyze such big data using traditional detection methods. This
paper proposed the application of apache spark in hate speech detection to reduce the
challenges. Authors developed an apache spark based model to classify Amharic Facebook
posts and comments into hate and not hate. Authors employed Random forest and Naïve Bayes
for learning and Word2Vec and TF-IDF for feature selection. Tested by 10-fold crossvalidation,
the model based on word2vec embedding performed best with 79.83%accuracy. The
proposed method achieve a promising result with unique feature of spark for big data.
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
This article presents Part of Speech tagging for Nepali text using General Regression Neural
Network (GRNN). The corpus is divided into two parts viz. training and testing. The network is
trained and validated on both training and testing data. It is observed that 96.13% words are
correctly being tagged on training set whereas 74.38% words are tagged correctly on testing
data set using GRNN. The result is compared with the traditional Viterbi algorithm based on
Hidden Markov Model. Viterbi algorithm yields 97.2% and 40% classification accuracies on
training and testing data sets respectively. GRNN based POS Tagger is more consistent than the
traditional Viterbi decoding technique.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
2. 436 Computer Science & Information Technology (CS & IT)
This paper is organized as follows. Section 2: Introduces CORDIC Algorithm. Section 3:
Describes the Pipelined architecture. Section 4: Discuss the simulation and result Section 5:
Conclusion.
2. CORDIC ALGORITHM
The basic idea of CORDIC is to rotate the vector over given angle. Each basic rotation is realized
by using shift and add operations. A vector is rotated through fixed number of steps called as
iterations. If a vector v having co-ordinates (x and y) is rotated through an angleφ then obtaining
a new vector with co-ordinates where x’
and y’
can be obtained using following method.
θ=θ= sinrY,cosrX (1)
φ+φ
φ−φ
=
=
sinxcosy
sinycosx
y
x'V '
'
(2)
Micro rotation φ i is performed by vector at each iteration i, so new vector is given by
iiii1i sin.ycos.xx φ−φ=+ (3)
iiii1i sin.xcos.yy φ+φ=+ (4)
Factorizing cos terms vector components given as
xi+1
)tan.yx(cos iiii φ−φ= (5)
yi+1
)tan.xy(cos iiii φ+φ= (6)
As cosine is an even function, so cos (α) = cos (-α).then equation (5) and (6) becomes
)2dyx(kx i
iiii1i
−
+ −= (7)
)2dxy(ky i
iiii1i
−
+ += (8)
Where i is the number of iteration required by vector to reach the required angle, k factor is given
as
∏
−
=
=
1n
0i
ikk
(9)
Where ki is CORDIC gain.
Reducing original given rotation to add shift algorithm given as
i
iii1i 2ydxx −
+ −= (10)
i
iii1i 2xdyy −
+ += (11)
A new variable known as accumulator is given as
iii1i dzz φ−=+ (12)
1di ±= ( id is the direction of angle of rotation)
Where
i
i
−−
= 2tan 1
φ is pre-computed and stored in table for different value ofi .
3. Computer Science & Information Technology (CS & IT)
3. PIPELINED ARCHITECTURE
Depending upon the application, CORDIC Processor is implemented in number of ways. The
simple architecture is serial architecture consist of three adder/
rom containing lookup table. Serial architecture perform one micro rotation for every clock cycle.
Output is obtained after n clock cycle. Since serial architecture uses n clock cycle for every
rotation hence it is very slow. Figure
Fi
Pipelined architecture converts iterations in to pipeline phrases. It consists of n cascaded blocks.
The first output of n stage CORDIC is
after every clock cycle. Pipelined architecture having shift register that perform fixed number of
shifts every time. Registers are used to store the angle for a particular micro rotation. Figure
shows the pipelined architecture.
Figure 2. Shows Pipelined architecture
Computer Science & Information Technology (CS & IT)
RCHITECTURE
Depending upon the application, CORDIC Processor is implemented in number of ways. The
simple architecture is serial architecture consist of three adder/subtractor and two shifter with a
rom containing lookup table. Serial architecture perform one micro rotation for every clock cycle.
Output is obtained after n clock cycle. Since serial architecture uses n clock cycle for every
rotation hence it is very slow. Figure 1 shows the serial architecture.
Figure.1. Shows Serial architecture
Pipelined architecture converts iterations in to pipeline phrases. It consists of n cascaded blocks.
CORDIC is obtained after n clock cycle. Thereafter output is obtained
after every clock cycle. Pipelined architecture having shift register that perform fixed number of
shifts every time. Registers are used to store the angle for a particular micro rotation. Figure
shows the pipelined architecture.
Figure 2. Shows Pipelined architecture
437
Depending upon the application, CORDIC Processor is implemented in number of ways. The
and two shifter with a
rom containing lookup table. Serial architecture perform one micro rotation for every clock cycle.
Output is obtained after n clock cycle. Since serial architecture uses n clock cycle for every
Pipelined architecture converts iterations in to pipeline phrases. It consists of n cascaded blocks.
obtained after n clock cycle. Thereafter output is obtained
after every clock cycle. Pipelined architecture having shift register that perform fixed number of
shifts every time. Registers are used to store the angle for a particular micro rotation. Figure 2
4. 438 Computer Science & Information Technology (CS & IT)
Pipelined architecture is much faster than serial
iteration at each stage.
In this paper a six stage pipeline sine cosine digital wave generator is developed
specific micro-rotations. This architecture is fast than serial architecture since it doesn’t require
any lookup table. It operates in circular rotation mode .Sin
Xn = cos
Yn= sin
The RTL view of Pipelined CORDIC is shown in Figure 3
Figure
For any angle as an input three outputs are generated sine function, cosine function and eps.eps
gives the error proximity to required angle.
4. SIMULATION AND RESULTS
The code of digital wave generator is written in VHDL and simulated using
The digital wave generator implemented on XILINX SPARTAN 3 xc3s200
using XILINX 12.3. Area and timing reports are given for particular target device. Table 1 shows
the device utilization summary of digital wave generator usin
Table1: Har
S.N
O
1 Number of Slice Flip
2
3 Number of 4 input
4 Number of bonded
5
Computer Science & Information Technology (CS & IT)
Pipelined architecture is much faster than serial architecture. Sign ‘z’ gives the direction of
In this paper a six stage pipeline sine cosine digital wave generator is developed
rotations. This architecture is fast than serial architecture since it doesn’t require
any lookup table. It operates in circular rotation mode .Sine and Cosine terms are given by
Xn = cosθ (13)
Yn= sinθ (14)
ined CORDIC is shown in Figure 3.
Figure 3. RTL view of Pipelined CORDIC
For any angle as an input three outputs are generated sine function, cosine function and eps.eps
gives the error proximity to required angle.
ESULTS
The code of digital wave generator is written in VHDL and simulated using ModelSim
The digital wave generator implemented on XILINX SPARTAN 3 xc3s200-5ft256 FPGA device,
using XILINX 12.3. Area and timing reports are given for particular target device. Table 1 shows
the device utilization summary of digital wave generator using CORDIC algorithm.
Table1: Hardware Device Utilization Summary
Logic Utilization Used Available
Number of Slice Flip
Flops
166 3840
Number of Slices 117 1920
Number of 4 input
LUTs
180 3840
Number of bonded
IOBs
34 173
Number of
BUFGMUXs
1 8
‘z’ gives the direction of
In this paper a six stage pipeline sine cosine digital wave generator is developed performing
rotations. This architecture is fast than serial architecture since it doesn’t require
e and Cosine terms are given by
For any angle as an input three outputs are generated sine function, cosine function and eps.eps
ModelSim SE 6.3 f.
5ft256 FPGA device,
using XILINX 12.3. Area and timing reports are given for particular target device. Table 1 shows
5. Computer Science & Information Technology (CS & IT) 439
Timing reports include total time delay for output to appear after giving input. At speed grade of -
5, design operates at maximum frequency of 186.712ns.The minimum period require is 5.356ns.
4.1 Comparison of present Pipelined CORDIC Sine and Cosine wave generator with
previous work.
Present work is implemented on XILINX SPARTAN xc3s205ft256 FPGA device. Thus, finally
comparison of present work with previous work is done as shown in Table 2.
Table 2: Comparison of Present work with previous Reference paper
Parameters Present work Reference
Paper[4]
No. of Slices
Flip Flops
166 321
No. of Slices 117 196
No. of 4 input
LUTs
180 361
No. of bonded
IOBs
34 37
Maximum
Frequency MHz
186.712 161.65
From Table 2, it is cleared that present design shows an improvement in speed with reduction in
used resources on target device.
5. CONCLUSION
In this paper, pipelining technique is implemented on CORDIC digital wave generator which
shows the better results in terms of speed and area utilization. The design operates on maximum
frequency of 186.712MHz.A Considerable increase in speed made the design suitable for many
wireless applications like SDR and GSM. In this work CORDIC has been implemented in
pipeline in order to avoid iterative cycle that is output obtained at every clock cycle.
REFERENCES
[1] J.E Volder. “The CORDIC Trigonometric Computing Technique”, IRETrans.Electronic Computers,
EC-8:330-334, September 1959.
[2] J.S Walther. “A Unified Algorithm for Elementary Functions”, AIFS Spring Joint Computer
Conference, pp.375-385,1971.
[3] P. K. Meher, J. Valls, T. B. Juang, K.Sridhan and K. Maharatna, “50 Years of CORDIC: Algorithms,
Architectures, and Applications”, IEEE Transactions on Circuits and Systems, Vol. 56, No.9,
pp.1893-1907, 2009.
[4] Rajesh Mehra, Bindiya kamboj“FPGA Based Design of Digital Wave Generator Using CORDIC:
Algorithms”,Int .J.Comp.Tech.Appl,Vol1 (1)54-58.
[5] Dobbs, M. Pascale, “Using CORDIC methods for Computations in micro-controllers”, No. 9, 2000.
[6] R. Andraka, “A survey of CORDIC algorithm for FPGA based computers”, 6th International
Symposium on Field Programmable Gate Arrays, No. 2, pp. 191-200, 1998
6. 440 Computer Science & Information Technology (CS & IT)
[7] J. Duprat and J. M. Muller, “The CORDIC Algorithm: New Results for Fast VLSI Implementation”,
IEEE Transactions on Computers, Vol. 42, No. 2, pp.168-178, 1993.
[8] M. Ercegovac and L. Tomas, “Redundant and On-Line CORDIC: Application to Matrix
Triangularization and SVD”, IEEE Transactions on Computers, Vol. 39, No.6, pp. 725-740, 1990.
[9] HerberiDawid, Heinrich Meyr.“VLSI Implementation of the CORDIC algorithm using redundant
arithmetic,” IEEE International symposium on circuits and systems, 1992. ISCAS ’92. Proceedings.
1992.
[10] B.Das, S.Banerjee.“Unified CORDIC based chip to realize DFT/DHT/DCT/DST,” IEE Proc-Comput.
Digit. Tech., Vol. 149, No. 4, July 2002.
[11] J. G. Proakis and D. G. Manolakis,.Digital signal processing principles, algorithms and applications,
Delhi: Prentice Hall, ed. 2nd, 2008.
[12] J. A. Lee, T. Lang, “SVD by constant –factor Redundant CORDIC”,10th IEEE Symposium on
Computer Arithmetic, No. 6, pp.264-271, 1991.
Authors Biography
Balwinder Singh has obtained his Bachelor of Technology degree
from National Institute of Technology, Jalandhar and Master of
Technology degree from University Centre for Inst. & Microelectronics
(UCIM), Punjab University, Chandigah in 2002 and 2004 respectively.
He is currently serving as Senior Engineer in Centre for Development of
Advanced Computing (CDAC), Mohali and is a part of the teaching
faculty and also pursuing Phd from GNDU Amritsar. He has 7+ years of
teaching experience to both undergraduate and postgraduate students.
Singh has published three books and many papers in the International &
National Journal and Conferences. His current interest includes Genetic
algorithms, Low Power techniques, VLSI Design & Testing, and System
on Chip.
Navdeep Prashar received the B.Tech. (Electronics and Communication
Engineering) degree from the CT Institute of Engineering, Management
and Technology, Jalandhar affiliated to Punjab Technical University,
Jalandhar in 2010, and presently he is doing M.Tech. (VLSI design)
degree from Centre for Development of Advanced Computing (CDAC),
Mohali and working on his thesis work. His area of interest is Embedded
Systems, VLSI Design and Digital Signal Processing etc.