In this paper, radix-2 algorithms for computation of type-II discrete sine transform (DST-II) and type-IV
discrete sine transform (DST-IV), each of length 2 ( 2,3,.....)
m
N m , are presented. The odd-indexed
output components of DST-II can be realized using simple recursive relations. The recursive algorithms are
appropriate for VLSI implementation. The DST-IV of length N can be computed from type-II discrete cosine
transform (DCT-II) and DST-II sequences, each of length N/2.
Radix-3 Algorithm for Realization of Type-II Discrete Sine TransformIJERA Editor
In this paper, radix-3 algorithm for computation of type-II discrete sine transform (DST-II) of length N =
3푚 (푚 = 1,2, … . ) is presented. The DST-II of length N can be realized from three DST-II sequences, each of
length N/3. A block diagram of for computation of the radix-3 DST-II algorithm is given. Signal flow graph for
DST-II of length 푁 = 32 is shown to clarify the proposed algorithm.
Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...IJERA Editor
In this paper, the mapping between discrete cosine transform of types VI and VII (DCT-VI/VII) of even length
N and (2N – 1)-point one dimensional discrete Fourier transform (1D-DFT) is presented. The technique used in
this paper is the mapping between the real-valued data sequence to an intermediate sequence used as an input to
DFT
Fast Algorithm for Computing the Discrete Hartley Transform of Type-IIijeei-iaes
This document presents a new fast algorithm for computing the discrete Hartley transform of type-II (DHT-II) using a radix-2 decimation-in-time approach. The algorithm decomposes the DHT-II computation into butterfly operations involving two DHT-IIs of length N/2. This allows an in-place implementation using a regular butterfly structure. The computational complexity of the new algorithm is analyzed and shown to require fewer operations than an existing DHT-II algorithm by Hu. A comparison of the algorithms demonstrates the new approach has better structural and computational complexity properties for real-time applications.
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSgraphhoc
An L (2, 1)-labeling of a graph G (also called distance two labeling) is a function f from the vertex set V (G) to the non negative integers {0,1,…, k }such that |f(x)-f(y)| ≥2 if d(x, y) =1 and | f(x)- f(y)| ≥1 if d(x, y) =2. The L (2, 1)-labeling number λ (G) or span of G is the smallest k such that there is a f with
max {f (v) : vє V(G)}= k. In this paper we introduce a new type of graph called multi-storey graph. The distance two labeling of multi-storey of path, cycle, Star graph, Grid, Planar graph with maximal edges and its span value is determined. Further maximum upper bound span value for Multi-storey of simple
graph are discussed.
B.Sc.IT: Semester - VI (April - 2017) [CBSGS - 75:25 Pattern | Question Paper]Mumbai B.Sc.IT Study
B.Sc.IT: Semester - VI (April - 2017) [CBSGS - 75:25 Pattern | Question Paper]
april - 2017, april - 2016, april - 2015, april - 2014, april - 2013, october - 2017, october - 2016, october - 2015, october - 2014, may - 2016, may - 2017, december - 2017, 75:25 pattern, 60:40 pattern, revised course, old course, mumbai bscit study, mumbai university, bscit semester vi, bscit question paper, old question paper, previous year question paper, semester vi question paper, question paper, CBSGS, IDOL, kamal t, internet technology, digital signals and systems, data warehousing, ipr and cyber laws, project management, geographic information system
The idea of metric dimension in graph theory was introduced by P J Slater in [2]. It has been found
applications in optimization, navigation, network theory, image processing, pattern recognition etc.
Several other authors have studied metric dimension of various standard graphs. In this paper we
introduce a real valued function called generalized metric G X × X × X ® R+ d : where X = r(v /W) =
{(d(v,v1),d(v,v2 ),...,d(v,v ) / v V (G))} k Î , denoted d G and is used to study metric dimension of graphs. It
has been proved that metric dimension of any connected finite simple graph remains constant if d G
numbers of pendant edges are added to the non-basis vertices.
The document introduces new classes of odd graceful graphs called m-shadow graphs and m-splitting graphs. It proves that m-shadow graphs of paths, complete bipartite graphs, and symmetric products of paths and null graphs are odd graceful. It also proves that m-splitting graphs of paths, stars, and symmetric products of paths and null graphs are odd graceful. Examples are provided to illustrate the theories.
Direct split-radix algorithm for fast computation of type-II discrete Hartley...TELKOMNIKA JOURNAL
In this paper, a novel split-radix algorithm for fast calculation the discrete Hartley transform of type-II (DHT-II) is intoduced. The algorithm is established through the decimation in time (DIT) approach, and implementedby splitting a length N of DHT-II into one DHT-II of length N/2 for even-indexed samples and two DHTs-II of length N/4 for odd-indexed samples. The proposed algorithm possesses the desired properties such as regularity, inplace calculation and it is represented by simple closed form decomposition sleading to considerable reductions in the arithmetic complexity compared to the existing DHT-II algorithms. Additionally, the validity of the proposed algorithm has been confirmed through analysing the arithmetic complexityby calculating the number of real additions and multiplications and associating it with the existing DHT-II algorithms.
Radix-3 Algorithm for Realization of Type-II Discrete Sine TransformIJERA Editor
In this paper, radix-3 algorithm for computation of type-II discrete sine transform (DST-II) of length N =
3푚 (푚 = 1,2, … . ) is presented. The DST-II of length N can be realized from three DST-II sequences, each of
length N/3. A block diagram of for computation of the radix-3 DST-II algorithm is given. Signal flow graph for
DST-II of length 푁 = 32 is shown to clarify the proposed algorithm.
Mapping between Discrete Cosine Transform of Type-VI/VII and Discrete Fourier...IJERA Editor
In this paper, the mapping between discrete cosine transform of types VI and VII (DCT-VI/VII) of even length
N and (2N – 1)-point one dimensional discrete Fourier transform (1D-DFT) is presented. The technique used in
this paper is the mapping between the real-valued data sequence to an intermediate sequence used as an input to
DFT
Fast Algorithm for Computing the Discrete Hartley Transform of Type-IIijeei-iaes
This document presents a new fast algorithm for computing the discrete Hartley transform of type-II (DHT-II) using a radix-2 decimation-in-time approach. The algorithm decomposes the DHT-II computation into butterfly operations involving two DHT-IIs of length N/2. This allows an in-place implementation using a regular butterfly structure. The computational complexity of the new algorithm is analyzed and shown to require fewer operations than an existing DHT-II algorithm by Hu. A comparison of the algorithms demonstrates the new approach has better structural and computational complexity properties for real-time applications.
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSgraphhoc
An L (2, 1)-labeling of a graph G (also called distance two labeling) is a function f from the vertex set V (G) to the non negative integers {0,1,…, k }such that |f(x)-f(y)| ≥2 if d(x, y) =1 and | f(x)- f(y)| ≥1 if d(x, y) =2. The L (2, 1)-labeling number λ (G) or span of G is the smallest k such that there is a f with
max {f (v) : vє V(G)}= k. In this paper we introduce a new type of graph called multi-storey graph. The distance two labeling of multi-storey of path, cycle, Star graph, Grid, Planar graph with maximal edges and its span value is determined. Further maximum upper bound span value for Multi-storey of simple
graph are discussed.
B.Sc.IT: Semester - VI (April - 2017) [CBSGS - 75:25 Pattern | Question Paper]Mumbai B.Sc.IT Study
B.Sc.IT: Semester - VI (April - 2017) [CBSGS - 75:25 Pattern | Question Paper]
april - 2017, april - 2016, april - 2015, april - 2014, april - 2013, october - 2017, october - 2016, october - 2015, october - 2014, may - 2016, may - 2017, december - 2017, 75:25 pattern, 60:40 pattern, revised course, old course, mumbai bscit study, mumbai university, bscit semester vi, bscit question paper, old question paper, previous year question paper, semester vi question paper, question paper, CBSGS, IDOL, kamal t, internet technology, digital signals and systems, data warehousing, ipr and cyber laws, project management, geographic information system
The idea of metric dimension in graph theory was introduced by P J Slater in [2]. It has been found
applications in optimization, navigation, network theory, image processing, pattern recognition etc.
Several other authors have studied metric dimension of various standard graphs. In this paper we
introduce a real valued function called generalized metric G X × X × X ® R+ d : where X = r(v /W) =
{(d(v,v1),d(v,v2 ),...,d(v,v ) / v V (G))} k Î , denoted d G and is used to study metric dimension of graphs. It
has been proved that metric dimension of any connected finite simple graph remains constant if d G
numbers of pendant edges are added to the non-basis vertices.
The document introduces new classes of odd graceful graphs called m-shadow graphs and m-splitting graphs. It proves that m-shadow graphs of paths, complete bipartite graphs, and symmetric products of paths and null graphs are odd graceful. It also proves that m-splitting graphs of paths, stars, and symmetric products of paths and null graphs are odd graceful. Examples are provided to illustrate the theories.
Direct split-radix algorithm for fast computation of type-II discrete Hartley...TELKOMNIKA JOURNAL
In this paper, a novel split-radix algorithm for fast calculation the discrete Hartley transform of type-II (DHT-II) is intoduced. The algorithm is established through the decimation in time (DIT) approach, and implementedby splitting a length N of DHT-II into one DHT-II of length N/2 for even-indexed samples and two DHTs-II of length N/4 for odd-indexed samples. The proposed algorithm possesses the desired properties such as regularity, inplace calculation and it is represented by simple closed form decomposition sleading to considerable reductions in the arithmetic complexity compared to the existing DHT-II algorithms. Additionally, the validity of the proposed algorithm has been confirmed through analysing the arithmetic complexityby calculating the number of real additions and multiplications and associating it with the existing DHT-II algorithms.
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFULFransiskeran
The ladder graph plays an important role in many applications as Electronics, Electrical and Wireless
communication areas. The aim of this work is to present a new class of odd graceful labeling for the ladder
graph. In particular, we show that the ladder graph Ln with m-pendant Ln mk1 is odd graceful. We also
show that the subdivision of ladder graph Ln with m-pendant S(Ln) mk1 is odd graceful. Finally, we
prove that all the subdivision of triangular snakes ( k snake ) with pendant edges
1
( ) k S snake mk are odd graceful.
This paper discusses the modeling and vibration Analyses of a rotor having multiple disk supported
by a continuous shaft for the first three modes. Normal modes of constrained structures method is used to
develop the equations. First three modes of the beam-disk system are considered.
In [8] Liang and Bai have shown that the - 4 kC snake graph is an odd harmonious graph for each k ³ 1.
In this paper we generalize this result on cycles by showing that the - n kC snake with string 1,1,…,1 when
n º 0 (mod 4) are odd harmonious graph. Also we show that the - 4 kC snake with m-pendant edges for
each k,m ³ 1 , (for linear case and for general case). Moreover, we show that, all subdivision of 2 k mD -
snake are odd harmonious for each k,m ³ 1 . Finally we present some examples to illustrate the proposed
theories.
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and...IJNSA Journal
This document analyzes the CAST-128 block cipher and a modified version using tests like avalanche criterion, encryption quality, correlation coefficient, and key sensitivity. It shows that the modified version performs similarly to the original CAST-128 algorithm according to these tests. Specifically, it finds that both algorithms exhibit good diffusion properties based on avalanche testing. Encryption quality analysis shows the modification does not degrade encryption quality. Key sensitivity testing illustrates that small key changes result in very different ciphertexts for both original and modified versions.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document contains 5 sample question papers from previous years' examinations for a Digital Electronics Circuit course. Each paper contains 4-5 questions testing various concepts in digital logic design including:
- Boolean algebra simplification and logic minimization techniques
- Code conversions (binary to gray, decimal to BCD)
- Combinational logic circuits (multiplexers, decoders, adders)
- Sequential logic circuits (latches, flip-flops, counters)
- Logic families and their characteristics (TTL, CMOS, ECL)
This document contains a 10 question practice test for the GATE 2018 exam. It covers general aptitude concepts including English grammar, math, logic, and data interpretation. The questions are multiple choice with 1-2 marks each. Topics include filling in blanks, finding missing terms, geometry, probability, and word problems involving ratios, time/work calculations, and logical reasoning. The test is divided into three sections and provides the full context and response options for each question.
This document contains 8 questions related to digital control systems for an examination. The questions cover various topics including:
1. Solving difference equations using Z-transforms
2. Obtaining state-space representations from transfer functions
3. Designing compensators to meet stability and performance specifications
4. Inverse Z-transforms and state-space modeling
5. Time and frequency response analysis of digital control systems
The questions require calculations, derivations and explanations related to foundational concepts in digital control systems.
This document contains a question paper for the GATE exam from 2016-2018 with questions related to general aptitude and production and industrial engineering. It includes 10 multiple choice questions carrying 1 mark each and 45 questions carrying 2 marks each on topics like vectors, functions, statistics, manufacturing processes, quality control, and engineering mechanics. The questions are multiple choice with options for the answers. This was an exam paper used for the GATE exam between 2016 to 2018.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
This document contains a 25 question multiple choice test on computer science topics. The questions cover areas like algorithms, data structures, complexity analysis, computer architecture, operating systems, databases, networks, and formal languages. The test asks the examinee to choose the best answer from among 4 options for each question. It also provides 2 mark questions in the later part testing more comprehensive understanding.
Time of arrival based localization in wireless sensor networks a non linear ...sipij
In this paper, we aim to obtain the location information of a sensor node deployed in a Wireless Sensor Network (WSN). Here, Time of Arrival based localization technique is considered. We calculate the position information of an unknown sensor node using the non- linear techniques. The performances of the techniques are compared with the Cramer Rao Lower bound (CRLB). Non-linear Least Squares and the Maximum Likelihood are the non-linear techniques that have been used to estimate the position of the unknown sensor node. Each of these non-linear techniques are iterative approaches, namely, Newton
Raphson estimate, Gauss Newton Estimate and the Steepest Descent estimate for comparison. Based on the
results of the simulation, the approaches have been compared. From the simulation study, Localization
based on Maximum Likelihood approach is having higher localization accuracy.
Hierarchical matrix techniques for maximum likelihood covariance estimationAlexander Litvinenko
1. We apply hierarchical matrix techniques (HLIB, hlibpro) to approximate huge covariance matrices. We are able to work with 250K-350K non-regular grid nodes.
2. We maximize a non-linear, non-convex Gaussian log-likelihood function to identify hyper-parameters of covariance.
An algorithm for generating new mandelbrot and julia setsAlexander Decker
The document presents an algorithm for generating new Mandelbrot and Julia sets. It begins by summarizing Tippett's 1992 algorithm, which modifies the standard Mandelbrot set algorithm to yield new fractals. The authors generate a new Julia set using Tippett's algorithm. They also generate new Mandelbrot and Julia sets by further modifying Tippett's algorithm, replacing terms in the recursion formulas to produce quartic functions. Several figures illustrate examples of Mandelbrot and Julia sets generated using the original and modified algorithms.
the use of digital data has been increase over the past decade which has led to the evolution of digital world. With this evolution the use of data such as text, images and other multimedia for communication purpose over network needs to be secured during transmission. Images been the most extensively used digital data throughout the world, there is a need for the security of images, so that the confidentiality, integrity and availability of the data is maintained. There is various cryptography techniques used for image security of which the asymmetric cryptography is most extensively used for securing data transmission. This paper discusses about Elliptic Curve Cryptography an asymmetric public key cryptography method for image transmission. With security it is also crucial to address the computational aspects of the cryptography methods used for securing images. The paper proposes an Image encryption and decryption method using ECC. Integrity of image transmission is achieved by using Elliptic Curve Digital Signature Algorithm (ECDSA) and also considering computational aspects at each stage.
Radix-3 Algorithm for Realization of Discrete Fourier TransformIJERA Editor
In this paper, a new radix-3 algorithm for realization of discrete Fourier transform (DFT) of length N = 3m (m =
1, 2, 3,...) is presented. The DFT of length N can be realized from three DFT sequences, each of length N/3. If
the input signal has length N, direct calculation of DFT requires O (N
2
) complex multiplications (4N
2
real
multiplications) and some additions. This radix-3 algorithm reduces the number of multiplications required for
realizing DFT. For example, the number of complex multiplications required for realizing 9-point DFT using the
proposed radix-3 algorithm is 60. Thus, saving in time can be achieved in the realization of proposed algorithm.
A numerical solution for Sine-Gordon type system was done by the use of two finite difference schemes, the first is the explicit scheme and the second is the Crank-Nicholson scheme. A comparison between the two schemes showed that the explicit scheme is easier and has faster convergence than the Crank-Nicholson scheme which is more accurate. The MATLAB environment was used for the numerical computations.
This 3 sentence summary provides the key details from the document:
The document describes using a 1-D engine simulation model in GT-POWER to develop and test a model predictive control strategy for an internal combustion engine, where predictive models of the engine were identified using the LOLIMOT algorithm and incorporated into a model-based predictive controller, and this control strategy was first tested in a model-in-the-loop simulation and then later validated through hardware-in-the-loop experiments on a real engine testbed.
Optimized Design of an Alu Block Using Power Gating TechniqueIJERA Editor
Power is the limiting factor in traditional CMOS scaling and must be dealt with aggressively. With the scaling
of technology and the need for high performance and more functionality, power dissipation becomes a major
bottleneck for a system design. Power gating of functional units has been proved to be an effective technique to
reduce power consumption. This paper describe about to design of an ALU block with sleep mode to reduce the
power consumption of the circuit. Local sleep transistors are used to achieve sleep mode. During sleep mode
one functional unit is working and another functional unit is in idle state. i.e., it disconnects the idle logic
blocks from the power supply. Architecture and functionality of the ALU implemented on FPGA and is tested
using DSCH tool. Power analysis is carried out using MICROWIND tool.
Settlement prediction research on the gravel pile in soft soil subgradeIJERA Editor
Settlement prediction methods of soft subgrade based on the soil mechanical theories and mathematical statistics emerges in endlessly, but together with its limitations; the single theoretical calculation method maybe sometimes good, sometimes bad without the capacity to consider the change of the load; however the study of the theory of the combined forecast method is far from perfect. Under this situation, in view of the engineering practice in soft soil subgrade deformation law research in order to put forward a reasonable settlement prediction method, which is a problem urgently to be solved at present. Relying on gravel pile in soft soil subgrade construction in the highway K9+420-K9+550 section, and analyzing the data measured according to the soft soil foundation in the loading and constant loading period, taking classification of embankment load into account, and based on the related parameters of soil at the same time using the numerical analysis of saturated soft soil subgrade deformation-seepage coupling calculation, comparing the measured data with the finite element results and checking the fit, based on detailed sedimentation data by using curve-fitting method for calculating ultimate settlement value and compared with the finite element method settlement value for several years under broaden embankment. The two values differ by 1.5cm, which is in a controllable range for soft soil. Then thus the results are true and reliable in order to have implications for similar projects.
The document discusses a primary screening of actinomycetes isolated from arid zones in Kazakhstan for their potential antitumor activity. 157 actinomycete strains were tested against Staphylococcus aureus 209P and its mutants UF-2 and UF-3 using an agar block technique. 36 strains from sandy soils and 6 from plant rhizospheres showed activity against S. aureus 209P. 22 strains from takyrs and takyr-like soils had at least twice as much activity against the mutants compared to the stock strain, indicating potential to produce antitumor antibiotics. In total, it was estimated that 24.2% of the actinomycete strains may be potential producers of antit
Comparative study on two kinds of finite element analysis of PBL shear connec...IJERA Editor
According to the different construction forms of PBL shear connectors in steel-concrete composite beam and steel-concrete joint section, eight finite element models in two groups of the two construction forms are conducted to study different mechanical properties of PBL shear connectors. Following conclusions can be drawn from the finite element method calculation results. The load-slip curve, mechanical properties of PBL shear connector are quite different in two construction forms. With the same construction parameter, the ultimate bearing capacity, shear stiffness and ductility factor of PBL shear connectors in steel-concrete joint section are better than that in steel-concrete composite beam. In addition, concrete strength, perforated diameter, thickness of the perforated plate, diameter of the perforated rebar and construction form are the influencing factors of the bearing capacity, shear stiffness and ductility factor of PBL shear connectors.
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFULFransiskeran
The ladder graph plays an important role in many applications as Electronics, Electrical and Wireless
communication areas. The aim of this work is to present a new class of odd graceful labeling for the ladder
graph. In particular, we show that the ladder graph Ln with m-pendant Ln mk1 is odd graceful. We also
show that the subdivision of ladder graph Ln with m-pendant S(Ln) mk1 is odd graceful. Finally, we
prove that all the subdivision of triangular snakes ( k snake ) with pendant edges
1
( ) k S snake mk are odd graceful.
This paper discusses the modeling and vibration Analyses of a rotor having multiple disk supported
by a continuous shaft for the first three modes. Normal modes of constrained structures method is used to
develop the equations. First three modes of the beam-disk system are considered.
In [8] Liang and Bai have shown that the - 4 kC snake graph is an odd harmonious graph for each k ³ 1.
In this paper we generalize this result on cycles by showing that the - n kC snake with string 1,1,…,1 when
n º 0 (mod 4) are odd harmonious graph. Also we show that the - 4 kC snake with m-pendant edges for
each k,m ³ 1 , (for linear case and for general case). Moreover, we show that, all subdivision of 2 k mD -
snake are odd harmonious for each k,m ³ 1 . Finally we present some examples to illustrate the proposed
theories.
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and...IJNSA Journal
This document analyzes the CAST-128 block cipher and a modified version using tests like avalanche criterion, encryption quality, correlation coefficient, and key sensitivity. It shows that the modified version performs similarly to the original CAST-128 algorithm according to these tests. Specifically, it finds that both algorithms exhibit good diffusion properties based on avalanche testing. Encryption quality analysis shows the modification does not degrade encryption quality. Key sensitivity testing illustrates that small key changes result in very different ciphertexts for both original and modified versions.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document contains 5 sample question papers from previous years' examinations for a Digital Electronics Circuit course. Each paper contains 4-5 questions testing various concepts in digital logic design including:
- Boolean algebra simplification and logic minimization techniques
- Code conversions (binary to gray, decimal to BCD)
- Combinational logic circuits (multiplexers, decoders, adders)
- Sequential logic circuits (latches, flip-flops, counters)
- Logic families and their characteristics (TTL, CMOS, ECL)
This document contains a 10 question practice test for the GATE 2018 exam. It covers general aptitude concepts including English grammar, math, logic, and data interpretation. The questions are multiple choice with 1-2 marks each. Topics include filling in blanks, finding missing terms, geometry, probability, and word problems involving ratios, time/work calculations, and logical reasoning. The test is divided into three sections and provides the full context and response options for each question.
This document contains 8 questions related to digital control systems for an examination. The questions cover various topics including:
1. Solving difference equations using Z-transforms
2. Obtaining state-space representations from transfer functions
3. Designing compensators to meet stability and performance specifications
4. Inverse Z-transforms and state-space modeling
5. Time and frequency response analysis of digital control systems
The questions require calculations, derivations and explanations related to foundational concepts in digital control systems.
This document contains a question paper for the GATE exam from 2016-2018 with questions related to general aptitude and production and industrial engineering. It includes 10 multiple choice questions carrying 1 mark each and 45 questions carrying 2 marks each on topics like vectors, functions, statistics, manufacturing processes, quality control, and engineering mechanics. The questions are multiple choice with options for the answers. This was an exam paper used for the GATE exam between 2016 to 2018.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
This document contains a 25 question multiple choice test on computer science topics. The questions cover areas like algorithms, data structures, complexity analysis, computer architecture, operating systems, databases, networks, and formal languages. The test asks the examinee to choose the best answer from among 4 options for each question. It also provides 2 mark questions in the later part testing more comprehensive understanding.
Time of arrival based localization in wireless sensor networks a non linear ...sipij
In this paper, we aim to obtain the location information of a sensor node deployed in a Wireless Sensor Network (WSN). Here, Time of Arrival based localization technique is considered. We calculate the position information of an unknown sensor node using the non- linear techniques. The performances of the techniques are compared with the Cramer Rao Lower bound (CRLB). Non-linear Least Squares and the Maximum Likelihood are the non-linear techniques that have been used to estimate the position of the unknown sensor node. Each of these non-linear techniques are iterative approaches, namely, Newton
Raphson estimate, Gauss Newton Estimate and the Steepest Descent estimate for comparison. Based on the
results of the simulation, the approaches have been compared. From the simulation study, Localization
based on Maximum Likelihood approach is having higher localization accuracy.
Hierarchical matrix techniques for maximum likelihood covariance estimationAlexander Litvinenko
1. We apply hierarchical matrix techniques (HLIB, hlibpro) to approximate huge covariance matrices. We are able to work with 250K-350K non-regular grid nodes.
2. We maximize a non-linear, non-convex Gaussian log-likelihood function to identify hyper-parameters of covariance.
An algorithm for generating new mandelbrot and julia setsAlexander Decker
The document presents an algorithm for generating new Mandelbrot and Julia sets. It begins by summarizing Tippett's 1992 algorithm, which modifies the standard Mandelbrot set algorithm to yield new fractals. The authors generate a new Julia set using Tippett's algorithm. They also generate new Mandelbrot and Julia sets by further modifying Tippett's algorithm, replacing terms in the recursion formulas to produce quartic functions. Several figures illustrate examples of Mandelbrot and Julia sets generated using the original and modified algorithms.
the use of digital data has been increase over the past decade which has led to the evolution of digital world. With this evolution the use of data such as text, images and other multimedia for communication purpose over network needs to be secured during transmission. Images been the most extensively used digital data throughout the world, there is a need for the security of images, so that the confidentiality, integrity and availability of the data is maintained. There is various cryptography techniques used for image security of which the asymmetric cryptography is most extensively used for securing data transmission. This paper discusses about Elliptic Curve Cryptography an asymmetric public key cryptography method for image transmission. With security it is also crucial to address the computational aspects of the cryptography methods used for securing images. The paper proposes an Image encryption and decryption method using ECC. Integrity of image transmission is achieved by using Elliptic Curve Digital Signature Algorithm (ECDSA) and also considering computational aspects at each stage.
Radix-3 Algorithm for Realization of Discrete Fourier TransformIJERA Editor
In this paper, a new radix-3 algorithm for realization of discrete Fourier transform (DFT) of length N = 3m (m =
1, 2, 3,...) is presented. The DFT of length N can be realized from three DFT sequences, each of length N/3. If
the input signal has length N, direct calculation of DFT requires O (N
2
) complex multiplications (4N
2
real
multiplications) and some additions. This radix-3 algorithm reduces the number of multiplications required for
realizing DFT. For example, the number of complex multiplications required for realizing 9-point DFT using the
proposed radix-3 algorithm is 60. Thus, saving in time can be achieved in the realization of proposed algorithm.
A numerical solution for Sine-Gordon type system was done by the use of two finite difference schemes, the first is the explicit scheme and the second is the Crank-Nicholson scheme. A comparison between the two schemes showed that the explicit scheme is easier and has faster convergence than the Crank-Nicholson scheme which is more accurate. The MATLAB environment was used for the numerical computations.
This 3 sentence summary provides the key details from the document:
The document describes using a 1-D engine simulation model in GT-POWER to develop and test a model predictive control strategy for an internal combustion engine, where predictive models of the engine were identified using the LOLIMOT algorithm and incorporated into a model-based predictive controller, and this control strategy was first tested in a model-in-the-loop simulation and then later validated through hardware-in-the-loop experiments on a real engine testbed.
Optimized Design of an Alu Block Using Power Gating TechniqueIJERA Editor
Power is the limiting factor in traditional CMOS scaling and must be dealt with aggressively. With the scaling
of technology and the need for high performance and more functionality, power dissipation becomes a major
bottleneck for a system design. Power gating of functional units has been proved to be an effective technique to
reduce power consumption. This paper describe about to design of an ALU block with sleep mode to reduce the
power consumption of the circuit. Local sleep transistors are used to achieve sleep mode. During sleep mode
one functional unit is working and another functional unit is in idle state. i.e., it disconnects the idle logic
blocks from the power supply. Architecture and functionality of the ALU implemented on FPGA and is tested
using DSCH tool. Power analysis is carried out using MICROWIND tool.
Settlement prediction research on the gravel pile in soft soil subgradeIJERA Editor
Settlement prediction methods of soft subgrade based on the soil mechanical theories and mathematical statistics emerges in endlessly, but together with its limitations; the single theoretical calculation method maybe sometimes good, sometimes bad without the capacity to consider the change of the load; however the study of the theory of the combined forecast method is far from perfect. Under this situation, in view of the engineering practice in soft soil subgrade deformation law research in order to put forward a reasonable settlement prediction method, which is a problem urgently to be solved at present. Relying on gravel pile in soft soil subgrade construction in the highway K9+420-K9+550 section, and analyzing the data measured according to the soft soil foundation in the loading and constant loading period, taking classification of embankment load into account, and based on the related parameters of soil at the same time using the numerical analysis of saturated soft soil subgrade deformation-seepage coupling calculation, comparing the measured data with the finite element results and checking the fit, based on detailed sedimentation data by using curve-fitting method for calculating ultimate settlement value and compared with the finite element method settlement value for several years under broaden embankment. The two values differ by 1.5cm, which is in a controllable range for soft soil. Then thus the results are true and reliable in order to have implications for similar projects.
The document discusses a primary screening of actinomycetes isolated from arid zones in Kazakhstan for their potential antitumor activity. 157 actinomycete strains were tested against Staphylococcus aureus 209P and its mutants UF-2 and UF-3 using an agar block technique. 36 strains from sandy soils and 6 from plant rhizospheres showed activity against S. aureus 209P. 22 strains from takyrs and takyr-like soils had at least twice as much activity against the mutants compared to the stock strain, indicating potential to produce antitumor antibiotics. In total, it was estimated that 24.2% of the actinomycete strains may be potential producers of antit
Comparative study on two kinds of finite element analysis of PBL shear connec...IJERA Editor
According to the different construction forms of PBL shear connectors in steel-concrete composite beam and steel-concrete joint section, eight finite element models in two groups of the two construction forms are conducted to study different mechanical properties of PBL shear connectors. Following conclusions can be drawn from the finite element method calculation results. The load-slip curve, mechanical properties of PBL shear connector are quite different in two construction forms. With the same construction parameter, the ultimate bearing capacity, shear stiffness and ductility factor of PBL shear connectors in steel-concrete joint section are better than that in steel-concrete composite beam. In addition, concrete strength, perforated diameter, thickness of the perforated plate, diameter of the perforated rebar and construction form are the influencing factors of the bearing capacity, shear stiffness and ductility factor of PBL shear connectors.
Fe Analysis of Effect of Tyre Overload and Inflation Pressure on Rolling Loss...IJERA Editor
Rolling loss or rolling resistance is an ever important property for the tyre and automotive industries because of its
practical implication. Fuel consumption and tyre rolling loss in all types of automobiles have become increasingly
important because of adverse environmental effects (air pollution and global warming) and economic costs (high
petroleum price).
In this thesis, the effect of rolling resistance and overload on fuel consumption of automobile car tyres is discussed.
The investigations are made on two tyre models of automobile cars Skoda Rapid and Ford Classic. Theoretical
calculations are also done to determine the rolling resistance due to inflation pressure. The default weight is
considered for 5 persons and also the tyre overload is considered by taking 6 and 7 people’s weight.
This document summarizes a research paper on improving the performance of multimodal biometrics using cryptosystems. The paper proposes fusing iris and fingerprint biometrics at the feature level before applying encryption for enhanced security. It discusses extracting features from iris and fingerprint images, fusing the features, and then encrypting the fused template. This approach aims to improve accuracy over unimodal biometrics while enhancing security through encryption. The paper reviews related work on multimodal biometrics and cryptosystems, and presents results showing the proposed approach effectively extracts features and fuses the biometrics for identification.
Physicochemical Evaluation of Flaxseed-Date BarIJERA Editor
The objective of this study was to develop a flaxseed-date-bar fortified high level of dietary fibre by using
functional ingredients. Formulations were developed containing 0, 5, 10, 15 and 20 grams of flaxseed flour.
Flaxseed- date bar were evaluated for their, Physic-chemical properties. In the physical evaluation of bar it was
found that flaxseed flour increase the hardness from 1076.82g to 1403.12g.The results revealed that the bar
containing nuts and oilseeds shows maximum protein content (10.09 percent), dietary fibre content (9.89
percent), and ash content(2.90 percent) was found in flaxseed-date bar. The gross energy of the flaxseed-date
bar was in the range of 353.75 kcal to 377.08 kcal .The maximum gross energy was recorded by following
sample A4were as the minimum was obtained by A0. The result revealed that flaxseed-dates along with nuts can
be useful to prepare flaxseed-date bars of good sensory and nutritional value which provide substantial amount
of carbohydrates, proteins, fats and dietary fibre.
Public Key Cryptosystem Approach for P2P Botnet Detection and PreventionIJERA Editor
Distributed (P2P) botnets have as of late been received by botmasters for their versatility against take-down
endeavors. Other than being harder to bring down, p2p botnets tend to be stealthier in the way they perform
vindictive exercises, making current discovery approaches ineffectual. In this paper, we simulate our proposal
by detecting a gray hole attack in an Ad Hoc network using NS2.The detected malicious node is listed in a black
hole list and notices all other nodes in the network to stop communicating with them. Our botnet location
framework has been equipped for identifying stealthy P2P botnets (Gray Hole nodes) and can reduce packet loss
caused by malicious nodes and have a better packet delivery ratio (PDR) within less period of time.
Modified design for Full Swing SERF and High Speed SERFIJERA Editor
In this chapter we have discussed the research work done on the basis of literature review and study. The
research methodology and the techniques to modify the present designs in order to achieve better performance
have been discussed with their merits and demerits. In this paper FS-SERF and HS- SERF full adder topologies
are presented. The analysis of Power, Delay, Power Delay Product (PDP) optimization characteristics of SERF
Adder is designed. In order to achieve optimal power savings at smaller geometry sizes, proposed a heuristic
approach known as FS-SERF and HS-SERF adder model.
Design and Implementation of Real Time Remote Supervisory SystemIJERA Editor
In today’s fast growing communication environment and rapid exchange of data in networking field has triggered us to develop a home based remote supervisory monitoring system. In the present paper the physiological parameters of the patient such as body temperature, ECG, Pulse rate and Oxygen Saturation is displayed in MATLAB graphical user interface which is processed using ARM7 LPC2138. In case any emergency persist and parameters goes abnormal over the optimum level then a buzzer will ring to alert the caretaker. And the vital parameters will be displayed on the patient side computer and an automatic SMS will be sent to the doctor using GSM interface.
Study Utility Vehicle Makassar City Transport a High- ErgonomicsIJERA Editor
The development of technology during this was to meet the man, but it should be men must be spoilt, But if it
turns out that all that did not make people feel safe, comfortable, healthy and easy, but the planning process,
decision-making and developments have experienced a deviation orientation. Public transport Transportation in
the Makassar city should be made with implementing aspects promotes ergonomic comfort, but it does not apply
in means of transportation to the public. Issues for public vehicles on access up and down not in accordance
with The aim of the research vehicle users. is to phrases dimensions body which have an effect on to utility
vehicle, to examine the public vehicles that high-promotes ergonomic comfort. The method assessment is the
measurement dimensions body to the passengers as well as the use questionnaires and analyzed in a holistic
approach ergonomics. Results of research high security tools to public vehicles that high-security vehicle users
generally by body dimensions as a powerful than Knee-and-a-half was knee, long your feet, and your elbow
kelantai. While utilities yangbernilai ergonomics was the first and second around 24.76 cm and 49.53 cm, wide
around 24.25 cm and was hangar 104, 78 cm.
Investigation &Comparative Study of Effectiveness of Adsorbent Synthesized fr...IJERA Editor
Waste disposal is becoming a cause of concern &alot of research is being carried out for removal of pollutants. Adsorption is viewed as one of the effective methods & new adsorbents having low cost, bio-degradability& effectiveness are being developed. Bark, leaves, seeds, drumsticks&shells can be synthesized into adsorbents.Present work addresses to the development of adsorbent from waste materials such as ‘Tectona grandis’ seeds. Thermal and boiling water treatment have been adopted in synthesis of three types of adsorbents namely ‘Thermally treated whole seed’, ‘Thermally treated particulateseed’ & ‘Raw boiled whole seed’. In preliminary investigation ‘Raw boiled whole seed’ is found to be effective in 12% adsorption of Victoria blue from synthetically prepared aqueous solution. Similarly these adsorbents are useful in removal of Cr(VI) from aqueous solution to the extent of 12 to 52 % depending upon the type of adsorbent and initial feed solution. ‘Thermally treated particulate seed’ is observed to be the best amongst three adsorbents synthesized. It can concluded that there is need to tap the potential in adsorbentssynthesized from ‘Tectona grandis seed’ by conducting more experiments involving different types of adsorbents.
The Comparative Study of Gray Model and Markov Model in Pavement Performance ...IJERA Editor
Pavement performance prediction is an essential component of pavement maintenance management system, which directly affects the choice of maintenance measures and funds. Firstly, this paper uses the Gray theoretical model to predict the status of certain highway pavement damaged. Secondly, the Grey theory and Markov prediction method are combined to forecast it. Finally, the comparison of the results between Grey theory and Markov prediction method analyzes the similarities and differences .The results show that Grey theoretical model is more suitable for recent forecasting, while combination method is suitable for longer-term forecasting.
A Simple Uhf Rfid Circularly-Polarized Reader Antenna DesignIJERA Editor
In this paper, the simple antenna is proposed for ultra high- frequency (UHF) radio frequency identification
(RFID) application. It is designed to achieve circular polarization with unidirectional beam. The antenna is
composed of the truncated radiation patch and ground plane. The simulation results show that the antenna
achieves the return loss of -31.92 dB, gain of 8 dBic, axial ratio (AR) of 1.8 dB and 3 dB AR beamwidth of 60
degree over the band width of 915-928 MHz.
Enhancement of Structure, Tc and Irreversibility Line in High Tc Superconduct...IJERA Editor
AC susceptibility (ac= ’+ i‖) and X ray diffraction (XRD) are very useful for characterizing high Tc superconductors. We report here on the preparation, X-ray diffraction with Rietveld refinement, resistivity , AC magnetic susceptibility measurements and effect of heat treatments in (Y1-xNdx)SrBaCu3O6+z. Each sample was subject to two types of heat treatment: oxygen annealing [O] and argon annealing followed by oxygen annealing [AO]. For each x, the [AO] heat treatment increases the orthorhombicity ε = (b-a)/(b+a) (for 0≤x<1),>0.2), the distance d[Cu(1)-(Sr/Ba)] (for x<0.25)>0.25; increase in cationic and chain oxygen ordering; psh and in-phase purity for the [AO] samples may account for the observed data.
Modified design for Full Swing SERF and High Speed SERFIJERA Editor
This document presents two modified designs of the Static Energy Recovery Full (SERF) adder called Full Swing SERF (FS-SERF) and High Speed SERF (HS-SERF). The FS-SERF provides full output swing from 0 to Vdd and is well-suited for multi-bit adders. The HS-SERF consumes more power than FS-SERF but has a shorter propagation delay, making it suitable for high-speed applications. Simulation results show that both modified designs reduce power consumption and power-delay product compared to the original SERF and modified SERF designs. The FS-SERF is optimized for low power operation while the HS-SERF achieves higher speeds
Cyclic Heating Effect on Hardness of AluminumIJERA Editor
Presented work discusses research results concerning the effect of the heat treatment process. Thermal fatigue which expresses repeated heating and cooling processes affect the ductility or the brittleness of the material. In this research 70 specimens of aluminum (2 mm thickness, 85 mm length, 32 mm width) are subjected to thermal fatigue at different conditions. Heating temperatures; Th = 100, 300 and 500 ° C. Number of repeated cycles; N =1 to 100. Results are evaluated then compared to each other and to that of specimens without subjected to thermal fatigue.
Windows used in FIR Filters optimized for Far-side Stop band Attenuation (FSA...IJERA Editor
It has been proposed that the Exponential window provides better side-lobe roll-off ratio than Kaiser window
which is very useful for some applications such as beam forming, filter design, and speech processing. In this
paper the second application i.e. design of digital nonrecursive Finite Impulse Response (FIR) filter by using
Exponential window is proposed. The far-end stopband attenuation is most significant parameter when the
signal to be filtered has great concentration of spectral energy. The filter should be designed in such a way so
that it can provide better far-end stopband attenuation (amplitude of last ripple in stopband). Digital FIR filter
designed by Kaiser window has a better far-end stopband attenuation than filter designed by the other previously
well known adjustable windows such as Dolph-Chebyshev and aramaki, which are special cases of
Ultraspherical windows, but obtaining a digital filter which performs higher far-end stopband attenuation than
Kaiser window will be useful. In this paper, the design of nonrecursive digital FIR filter has been proposed by
using Exponential window. It provides better far-end stopband attenuation than filter designed by well known
Kaiser window, which is the advantage of filter designed by Exponential window. The proposed schemes were
simulated on commercially available software and the results show the close agreement with proposed theory.
A Synchronizing Devicefor Power Electronic ConvertersIJERA Editor
In this paper we introduce a synchronizing device for power electronic converters with single-phase or threephase
AC input voltage. The voltage synchronizing transformer in this device has been replaced by a current
transformer and a double galvanic isolation has been realized by means of optical media. Results from computer
simulation and experimental studies have been brought out.
Control of Suddenly Expanded Flow at Low Supersonic Mach NumbersIJERA Editor
In the present study the experiments were conducted to control the base pressure from a convergent-divergent
nozzle at low supersonic Mach numbers to assess the effectiveness of active control mechanism in the form of
micro jets at different expansion level. The parameters considered in the present study are the diameter ratio,
length to diameter ratio (L/D), Nozzle Pressure Ratio (NPR), and the Mach number. The diameter ratio selected
for the present study are 1.6, 1.8, 2.2, and 2.5. Experiments were conducted for nozzle pressure ratio (NPR)
from 3 to 11. The L/D ratio of the enlarged duct was varied from 10 to 1, and results are presented for L/D 4, 3,
2, and 1. The Mach numbers of the present studies are 1.1, 1.2, 1.4, and 1.5. The results show that the Micro jets
are very effective and are able to raise the base pressure value to a considerable level under the influence of
favorable pressure gradient except at lower NPR 3. At NPRs 5 and 7 for some cases the trends differ due to the
level of expansion, nature of waves present in the base region, relief available to the flow, L/D ratio of the
enlarged duct and the Mach numbers. It is seen that most of the cases exhibit similar behavior for the L/Ds in
the range 4 and 3, which means; that the back pressure has not adversely influenced the flow field in the base
region as well as in the duct. The minimum duct length required for the flow to be attached is L/D = 2, even
though in some cases flow is attached with duct wall. With this it can be stated that the micro jets can be an
alternative for the for base pressure control.
This document presents radix-2 algorithms for computing type-II discrete cosine transform (DCT) and discrete sine transform (DST) of length N=2^n (n≥2). The algorithms decompose the computation into even and odd indexed output sequences. The even outputs are computed from two transforms of length N/2. Recursive relations are used to efficiently compute the odd outputs from the even outputs and additional terms, requiring fewer operations than existing methods. Pseudocode and complexity analysis are provided to demonstrate the algorithms.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Radix-3 Algorithm for Realization of Type-II Discrete Sine TransformIJERA Editor
In this paper, radix-3 algorithm for computation of type-II discrete sine transform (DST-II) of length N =
3𝑚 (𝑚 = 1,2, … . ) is presented. The DST-II of length N can be realized from three DST-II sequences, each of
length N/3. A block diagram of for computation of the radix-3 DST-II algorithm is given. Signal flow graph for
DST-II of length 𝑁 = 32 is shown to clarify the proposed algorithm.
This document presents a block cipher that incorporates concepts from the Hill cipher and previous block ciphers developed by the authors. The cipher uses a key matrix K and encryption key bunch matrix E to encrypt plaintext P into ciphertext C. Decryption uses the inverse of K and a decryption key bunch matrix D to recover P from C. The cipher is strengthened by including Mix() and Imix() functions that diffuse bits during encryption and decryption rounds. Cryptanalysis shows the cipher is unbreakable against known attacks due to the diffusion achieved by superimposing Hill cipher and previous block cipher concepts. In 3 sentences or less, this document proposes and analyzes a block cipher combining aspects of Hill cipher and previous work, using key matrices for
Observations on Ternary Quadratic Equation z2 = 82x2 +y2IRJET Journal
This document analyzes the ternary quadratic equation z2 = 82x2 + y2 for its non-zero distinct integer solutions. Four different patterns of solutions are presented. Notable observations include some solutions being related to polygonal numbers, octahedral numbers, and four dimensional figurate numbers. Specific relations are shown between the solutions and expressions representing "nasty numbers". The analysis finds multiple parametric representations of solutions to the given equation.
1. The document analyzes the quadratic equation X2 + Y2 = 2Z2 - 62W2 for non-trivial distinct integral solutions.
2. Four patterns of solutions are presented, with the solutions expressed in terms of parameters like triangular numbers and polygonal numbers.
3. Interesting relationships between the solutions and special numbers are observed, such as some solutions being nasty numbers or one solution being the sum of another and a triangular number.
Implementation performance analysis of cordiciaemedu
This document discusses the implementation of a CORDIC (COordinate Rotation Digital Computer) algorithm in an OFDM-based wireless local area network receiver. It first provides background on the CORDIC algorithm and its basic principles. It then describes the design of an OFDM-based WLAN transmitter in MATLAB that provides phase angle values to a CORDIC module. This CORDIC module is implemented using VHDL and analyzes the phase angles to compute sine and cosine functions. Simulation results show that the VHDL-implemented CORDIC produces the same output waveforms as MATLAB, validating the accuracy of the hardware implementation.
High Speed Memory Efficient Multiplier-less 1-D 9/7 Wavelet Filters Based NED...IJERA Editor
This document proposes a new efficient distributed arithmetic (NEDA) technique for implementing high-speed memory-efficient 1-D 9/7 wavelet filters. NEDA is an area-efficient architecture that does not require ROM, multiplication, or subtraction. It can expose redundancy in adder arrays consisting of entries of 0 and 1. The document describes how NEDA can be used to compute the high pass filter output of a 1-D discrete wavelet transform using 9/7 filters through an example. It also shows the proposed NEDA architecture and processing steps to obtain the low pass and high pass filter outputs with just additions and shifts.
Linear cryptanalysis is a method used to break encryption standards like DES. It involves finding linear approximations between plaintext, ciphertext, and key bits that hold with probability greater than 50%. These approximations are used to determine partial key bits using maximum likelihood algorithms on known or ciphertext-only data. For S-DES, the method finds a linear expression involving S-box inputs/outputs that predicts a key bit with 78% accuracy, allowing recovery of multiple key bits.
This document discusses fast algorithms for computing the discrete cosine transform (DCT) and inverse discrete cosine transform (IDCT) using Winograd's method.
The conventional DCT and IDCT algorithms have high computational complexity due to cosine functions. Winograd's algorithm reduces the number of multiplications required for matrix multiplication by rearranging terms.
The document proposes applying Winograd's algorithm to DCT and IDCT computation by representing the transforms as matrix multiplications. This approach reduces the number of multiplications required for an 8x8 block from over 16,000 to just 736 multiplications, with fewer additions and subtractions as well. This leads to faster DCT and IDCT computation compared
On the Odd Gracefulness of Cyclic Snakes With Pendant EdgesGiselleginaGloria
Graceful and odd gracefulness of a graph are two entirely different concepts. A graph may posses one or both of these or neither. We present four new families of odd graceful graphs. In particular we show an odd graceful labeling of the linear 4 1 kC snake mK − e and therefore we introduce the odd graceful labeling of 4 1 kC snake mK − e ( for the general case ). We prove that the subdivision of linear 3 kC snake − is odd graceful. We also prove that the subdivision of linear 3 kC snake − with m-pendant edges is odd graceful. Finally, we present an odd graceful labeling of the crown graph P mK n 1 e .
Formation of Triples Consist Some Special Numbers with Interesting PropertyIRJET Journal
The document discusses the discovery of triples of special numbers including centered pentagonal numbers, decagonal numbers, and others, where the sum of any two numbers in the triple is a perfect square. It presents two methods for finding such triples and provides examples of triples along with some interesting relationships among the numbers. The conclusion indicates that other triples and quadruples satisfying different properties could be sought using similar methods.
K-means Clustering Algorithm with Matlab Source codegokulprasath06
The K-means clustering algorithm partitions observations into K clusters by minimizing the distance between observations and cluster centroids. It works by randomly assigning observations to K clusters, calculating the distance between each observation and centroid, reassigning observations to their closest centroid, and repeating until cluster assignments are stable. Common distance measures used include Euclidean, squared Euclidean, and Manhattan distances. The algorithm aims to group similar observations together based on feature similarity to reduce the size of codebooks for applications like speech processing.
VHDL Design and FPGA Implementation of a High Data Rate Turbo Decoder based o...IJECEIAES
This paper presents the electronic synthesis, VHDL design and implementation on FPGA of turbo decoders for Difference Set Codes (DSC) decoded by the majority logic (ML). The VHDL design is based on the decoding Equations that we have simplified, in order to reduce the complexity and is implemented on parallel process to increase the data rate. A co-simulation using the Dsp-Builder tool on a platform designed on Matlab/Simulink, allows the measurement of the performance in terms of BER (Bit Error Rate) as well as the decoder validation. These decoders can be a good choice for future digital transmission chains. For example, for the Turbo decoder based on the product code DSC (21.11)² with a quantization of 5 bits and for one complete iteration, the results show the possibility of integration of our entire turbo decoder on a single chip, with lower latency at 0.23 microseconds and data rate greater than 500 Mb/s.
Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)paperpublications3
Abstract: Ramanujan’s lost notebook contains many results on mock theta functions. In particular, the lost notebook contains eight identities for tenth order mock theta functions. Previously many authors proved the first six of Ramanujan’s tenth order mock theta function identities. It is the purpose of this paper to prove the seventh and eighth identities of Ramanujan’s tenth order mock theta function identities which are expressed by mock theta functions and also a definite integral. The properties of modular forms are used for the proofs of theta function identities and L. J. Mordell’s transformation formula for the definite integral.Keywords: Mock Theta Functions from Ramanujan’s Lost Notebook.
Title: Some Continued Mock Theta Functions from Ramanujan’s Lost Notebook (IV)
Author: MOHAMMADI BEGUM JEELANI SHAIKH
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
A common random fixed point theorem for rational ineqality in hilbert space ...Alexander Decker
This document presents a common random fixed point theorem for four continuous random operators defined on a non-empty closed subset of a separable Hilbert space. It begins with introducing relevant definitions including measurable functions, random operators, and random fixed points. It then states the main theorem (Theorem 2.1) which shows that if four random operators satisfy a certain condition (Condition A), then they have a unique common random fixed point. The proof of Theorem 2.1 is also presented, showing that a sequence constructed from the random operators converges to the common random fixed point.
The document contains questions about algorithms, data structures, and computational complexity. Specifically, it asks about:
- Properties required for an algorithm and techniques used to solve optimization problems like the 0-1 knapsack problem.
- Big O analysis of time complexity for various algorithms and programs.
- Solving recurrence relations to determine time complexity of divide and conquer algorithms.
- Data structures like sets, stacks, queues, graphs and trees.
- Sorting algorithms like bubble sort, merge sort, quicksort and their time complexities.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document summarizes research on using an affine combination of two time-varying least mean square (TVLMS) adaptive filters for applications such as echo cancellation and system identification. The affine combination aims to obtain faster convergence and lower steady-state error compared to individual TVLMS filters. Simulation results show the affine combination of TVLMS filters achieves mean square error of 0.0055 after 1000 iterations for noise cancellation, outperforming standard LMS, affine LMS, and RLS algorithms. The affine combination also performs well for system identification applications, identifying an unknown FIR filter model with low error. The approach provides dependent estimates of an unknown system response from each filter, and finds an optimal affine combining coefficient to minimize mean square error
Partial generation of 2n length walsh codes using n-bit gray and inverse gray cIAEME Publication
The document discusses techniques for generating Walsh codes using Gray codes and Inverse Gray codes. It presents an algorithm for generating n-bit Inverse Gray codes that allows constructing n! sequence orderings of 2n-length Walsh codes. The algorithm modifies an existing technique for generating binary cyclic Gray codes. It explains how to arrange integers to generate the codes and describes handling even and odd values of n differently. The algorithm is illustrated through an example of generating a 4-bit Inverse Gray code.
Similar to Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Type-IV Discrete Sine Transform (20)
Design and optimization of ion propulsion dronebjmsejournal
Electric propulsion technology is widely used in many kinds of vehicles in recent years, and aircrafts are no exception. Technically, UAVs are electrically propelled but tend to produce a significant amount of noise and vibrations. Ion propulsion technology for drones is a potential solution to this problem. Ion propulsion technology is proven to be feasible in the earth’s atmosphere. The study presented in this article shows the design of EHD thrusters and power supply for ion propulsion drones along with performance optimization of high-voltage power supply for endurance in earth’s atmosphere.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Radix-2 Algorithms for realization of Type-II Discrete Sine Transform and Type-IV Discrete Sine Transform
1. M. N. Murty Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 6, ( Part -1) June 2015, pp.38-45
www.ijera.com 38 | P a g e
Radix-2 Algorithms for realization of Type-II Discrete Sine
Transform and Type-IV Discrete Sine Transform
M. N. Murty
(Department of Physics, National Institute of Science and Technology, Palur Hills, Berhampur-761008, Odisha,
India)
ABSTRACT
In this paper, radix-2 algorithms for computation of type-II discrete sine transform (DST-II) and type-IV
discrete sine transform (DST-IV), each of length ( 2,3,.....)2
m
mN , are presented. The odd-indexed
output components of DST-II can be realized using simple recursive relations. The recursive algorithms are
appropriate for VLSI implementation. The DST-IV of length N can be computed from type-II discrete cosine
transform (DCT-II) and DST-II sequences, each of length N/2.
Keywords – Discrete sine transform, discrete cosine transform, radix-2 algorithm, recursive algorithm.
I. INTRODUCTION
Discrete transforms play a significant role in digital signal processing. Discrete cosine transform (DCT)
and discrete sine transform (DST) are used as key functions in many signal and image processing applications.
There are eight types of DCT and DST. Of these, the DCT-II, DST-II, DCT-IV, and DST-IV have gained
popularity. The DCT and DST transform of types I, II, III and IV, form a group of so-called “even” sinusoidal
transforms. Much less known is group of so-called “odd” sinusoidal transforms: DCT and DST of types V, VI,
VII and VIII.
The original definition of the DCT introduced by Ahmed et al. in 1974 [1] was one-dimensional (1-D) and
suitable for 1-D digital signal processing. The DCT has found wide applications in speech and image processing
as well as telecommunication signal processing for the purpose of data compression, feature extraction, image
reconstruction, and filtering. Thus, many algorithms and VLSI architectures for the fast computation of DCT
have been proposed [2]-[7]. Among those algorithms [6] and [7] are believed to be most efficient two-
dimensional DCT algorithms in the sense of minimizing any measure of computational complexity.
The DST was first introduced to the signal processing by Jain [8], and several versions of this original DST
were later developed by Kekre et al. [9], Jain [10] and Wang et al. [11]. Ever since the introduction of the first
version of the DST, the different DST’s have found wide applications in several areas in Digital signal
processing (DSP), such as image processing[8,12,13], adaptive digital filtering[14] and interpolation[15]. The
performance of DST can be compared to that of the discrete cosine transform (DCT) and it may therefore be
considered as a viable alternative to the DCT. For images with high correlation, the DCT yields better results;
however, for images with a low correlation of coefficients, the DST yields lower bit rates [16]. Yip and Rao [17]
have proven that for large sequence length (N ≥ 32) and low correlation coefficient (< 0.6), the DST performs
even better than the DCT.
In this paper, radix-2 algorithms for computation of type-II DST and type-IV DST, each of length
( 2,3,.....)2
m
mN , are presented. The odd-indexed output components of DST-II are realized using
simple recursive relations. The DST-IV is computed from DCT-II and DST-II sequences, each of length N/2.
The rest of the paper is organized as follows. The proposed radix-2 algorithm for DST-II is presented in
Section-II. An example for realization of DST-II of length N = 8 is given in Section-III. The proposed radix-2
algorithm for type-IV DST is presented in Section-IV. Conclusion is given in Section-V.
II. PROPOSED RADIX-2 ALGORITHM FOR DST-II
Let ( ),1 ,x n n N be the input data array. The type-II DST is defined as
1
2 (2 1)
( ) ( ) sin
2
N
II k
n
n k
k x nCY
N N
(1)
for 1,2,....,k N
RESEARCH ARTICLE OPEN ACCESS
2. M. N. Murty Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 6, ( Part -1) June 2015, pp.38-45
www.ijera.com 39 | P a g e
where ,
1
2
1 1,2,..., 1
k
if k N
C
if k N
The ( )II
kY values represent the transformed data. Without loss of generality, the scale factors in (1) are
ignored in the rest of the paper. After ignoring scale factors, (1) can be written as
1
(2 1)
( ) ( )sin
2
N
II n
n k
k x n
NY
(2)
for 1,2,....,k N .
When N 2m
( 2,3,...)m , (2) can be written as
12
1
(2 1)
( ) ( ) ( 1 ) sin
2
( 1)
kN
II n
n k
k x n x N n
NY
(3)
for 1,2,....,k N
Let
( ) ( ) ( 1 )P n x n x N n for even k (4)
and
( ) ( ) ( 1 )Q n x n x N n for odd k (5)
Using (4) and (5) in (3), the even output components (2 )II
kY and odd output components (2 1)II
kY of
DST-II are given by
2
1
(2 1)
(2 ) ( )sin
N
II n
n k
k P n
NY
(6)
for 1,2,....,
2
N
k .
2
1
(2 1)(2 1)
(2 1) ( )sin
2
N
II n
n k
k Q n
NY
(7)
for 1,2,....,
2
N
k .
Equation (7) can also be written as
2
1
(2 1)(2 1)
(2 1) ( )sin
2
N
II n
n k
k Q n
NY
(8)
for 0,1,2,...., 1.
2
N
k
Suppose
( ) (2 1) (2 1)II II
R k k kY Y (9)
Using (7) and (8) in (9), we obtain
2
1
(2 1)(2 1) (2 1)(2 1)
( ) ( ) sin sin
2 2
N
n
n k n k
R k Q n
N N
(10)
As sin sin 2sin cos
2 2
A B A B
A B
, (10) can be written as
2
1
(2 1) (2 1)
( ) 2 ( )sin cos
2
N
n
n n k
R k Q n
N N
(11)
From (9), we have
3. M. N. Murty Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 6, ( Part -1) June 2015, pp.38-45
www.ijera.com 40 | P a g e
(2 1) ( ) (2 1)II II
k R k kY Y (12)
The odd output components of DST-II can be realized using the recursive relation (12) and the even output
components can be realized using (6).
III. EXAMPLE FOR REALIZING DST-II OF LENGTH N = 8
To clarify the proposal, the output data sequence ( ); 1,2,...,8II
k kY is realized from the input data
sequence ( ); 1,2,...,8x n n for DST-II of length 8N .
3.1 Procedure for realizing odd output components of DST-II
Putting 0k in (9), we get
(0) (1) ( 1)II II
R Y Y (13)
From (7), we have for 0k
2
1
(2 1)
( 1) ( )sin
2
N
II n
n
Q n
NY
(14)
Putting 0k in (8), we obtain
2
1
(2 1)
(1) ( )sin
2
N
II n
n
Q n
NY
(15)
From (14) and (15), we get
( 1) (1)II IIY Y (16)
Using (16) in (13), we have
1
(1) (0)
2II
RY (17)
Putting 1,2&3k in (12), we obtain
(3) (1) (1)II II
RY Y (18)
(5) (2) (3)II II
RY Y (19)
(7) (3) (5)II II
RY Y (20)
For k =0 and N = 8, (11) can be expressed as
4
1
(2 1)
(0) 2 ( )sin
16n
n
R Q n
3 5 7
2 (1)sin (2)sin (3)sin (4)sin
16 16 16 16
Q Q Q Q
(21)
Using (21) in (17), we get
1 3 5 7
(0)
(1)
2
(1) (2) (3) (4)II
R
Q S Q S Q S Q SY (22)
where
sin
16n
n
S
Putting k=1 and N = 8 in (11), we obtain
7 3 5 3
(1) (1)sin (4)sin 2cos (2)sin (3)sin 2cos
16 16 8 16 16 8
R Q Q Q Q
1 31 7 3 5
(1) (4) (2) (3)Q S Q S Q S Q SC C
(23)
4. M. N. Murty Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 6, ( Part -1) June 2015, pp.38-45
www.ijera.com 41 | P a g e
where
1
2cos
8C
and 3
3
2cos
8C
Putting k = 2 and N = 8 in (11), we have
21 3 5 7
(2) (1) (2) (3) (4)R Q S Q S Q S Q S C
(24)
where
2
2
2cos 2cos
8 4C
and in general 𝐶𝑛 = 2 cos
𝑛𝜋
8
Similarly, putting k = 3 and N = 8 in (11), we obtain
3 11 7 5 3
(3) (1) (4) (3) (2)R Q S Q S Q S Q SC C
(25)
For 8& 1,2,3,4N n , we have from (5)
(1) (1) (8)Q x x
(2) (2) (7)Q x x (26)
(3) (3) (6)Q x x
(4) (4) (5)Q x x
The odd output components (1), (3), (5) & (7)II II II IIY Y Y Y of DST-II can be realized using
(22),(23),(24),(25) and (26)along with the recursive relations (18),(19) and (20) as shown in the data flow
diagram of Fig.1.
Figure 1: Signal flow graph for odd output components of DST-II of length N=8.
8
cos2&
16
sin
n
C
n
S nn
3.2 Procedure for realizing even output components of DST-II
Putting successively 1,2,3,4k in (6), we get the following expressions for 8.N
2 6
(2) (1) (4) (2) (3)II
P P P PS SY (27)
5. M. N. Murty Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 6, ( Part -1) June 2015, pp.38-45
www.ijera.com 42 | P a g e
4
(4) (1) (2) (3) (4)II
P P P P SY (28)
6 2
(6) (1) (4) (2) (3)II
P P P PS SY (29)
(8) (1) (2) (3) (4)II
P P P PY (30)
For 8& 1,2,3,4N n , we have from (4)
(1) (1) (8)P x x
(2) (2) (7)P x x (31)
(3) (3) (6)P x x
(4) (4) (5)P x x
The even output components (2), (4), (6) & (8)II II II IIY Y Y Y of DST-II can be realized using
(27),(28),(29),(30) and (31) as shown in the data flow diagram of Fig. 2.
Figure 2: Signal flow graph for even output components of DST-II of length N=8.
16
sin
n
Sn
IV. PROPOSED RADIX-2 ALGORITHM FOR DST-IV
The type-IV DST for the input data sequence ( ); 1,2,....,x n n N is defined as
1
(2 1)(2 1)
( ) ( )sin
4
N
IV n
n k
k x n
NY
(32)
for 1,2,....,k N .
The ( )IV
kY values represent the output data.
6. M. N. Murty Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 6, ( Part -1) June 2015, pp.38-45
www.ijera.com 43 | P a g e
The type-II DCT for the input data sequence ( ); 1,2,....,x n n N is defined as
1
(2 1)
( ) ( )cos
2
N
n
n k
X k x n
N
(33)
for 0,1,2,...., 1k N .
Taking ( 2)2
m
mN in (32), even and odd output components of DST-IV can be written as
2
1
(2 1)(4 1) (2 1)(4 1)
(2 ) ( )sin ( 1 )cos
4 4
N
IV n
n k n k
k x n x N n
N NY
(34)
for 1,2,....,
2
N
k .
2
1
(2 1)(4 1) (2 1)(4 1)
(2 1) ( )sin ( 1 )cos
4 4
N
IV n
n k n k
k x n x N n
N NY
for 0,1,2,...., 1.
2
N
k
(35)
Define ( )u n and ( )v n as
(2 1) (2 1)
( ) ( )sin ( 1 )cos
4 4
n n
u n x n x N n
N N
(36)
for 1,2,....,
2
N
n .
(2 1) (2 1)
( ) ( )cos ( 1 )sin
4 4
n n
v n x n x N n
N N
(37)
for 1,2,....,
2
N
n .
Define ( )T k and ( )W k as
2
1
(2 1)
( ) ( )cos
N
n
n k
T k u n
N
(38)
for 0,1,2,...., 1
2
N
k .
2
1
(2 1)
( ) ( )sin
N
n
n k
W k v n
N
(39)
for 1,2,...., .
2
N
k
Where ( )T k represents the DCT-II of ( )u n of length 2N and ( )W k represents DST-II of ( )v n of
length 2N .
Using (36) in (38) and (37) in (39), we obtain
2
1
(2 1) (2 1) (2 1)
( ) ( ) ( )cos ( 1 )sin sin
4 4
N
n
n n n k
W k T k x n x N n
N N N
2
1
(2 1) (2 1) (2 1)
( )sin ( 1 )cos cos
4 4
N
n
n n n k
x n x n n
N N N
7. M. N. Murty Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 6, ( Part -1) June 2015, pp.38-45
www.ijera.com 44 | P a g e
2
1
(2 1)(4 1) (2 1)(4 1)
( )sin ( 1 )cos
4 4
N
n
n k n k
x n x N n
N N
(40)
From (34) and (40), we have
(2 ) ( ) ( )IV
k W k T kY for 1,2,...., 1.
2
N
k (41)
Similarly, we obtain
2
1
(2 1)(4 1) (2 1)(4 1)
( ) ( ) ( )sin ( 1 )cos
4 4
N
n
n k n k
W k T k x n x N n
N N
(42)
From (35) and (42), we get
(2 1) ( ) ( )IV
k W k T kY for 1,2,...., 1.
2
N
k (43)
Putting 0k in (35), we have
2
1
(2 1) (2 1)
(1) ( )sin ( 1 )cos
4 4
N
IV n
n n
x n x N n
N NY
(44)
Using (36) in (44), we obtain
2
1
(1) ( )
N
IV n
u nY
(45)
For 0k , (38) can be expressed as
2
1
(0) ( )
N
n
T u n
(46)
From (45) and (46), we get
(1) (0)IV
TY (47)
Putting 2k N in (39), we have
/2
1
(2 1)
( )sin
2 2
N
n
N n
W v n
Using the value of ( )v n from (37) in the above expression, we obtain
/2
1
(2 1) (2 1) (2 1)
( )cos ( 1 )sin sin
2 4 4 2
N
n
N n n n
W x n x N n
N N
(48)
Putting 2k N in (34), we get
/2
1
(2 1)(2 1) (2 1)(2 1)
( ) ( )sin ( 1 )cos
4 4
N
IV n
n N n N
N x n x N n
N NY
(49)
Taking a simple example for 4N , it can easily be proved from (48) and (49) that
( )
2IV
N
N WY
(50)
( )T k in (38) and ( )W k in (39) can be computed using ( )u n and ( )v n given in (36) and (37) respectively.
Then the even and odd components of DST-IV of length ( 2)2
m
mN can be realized using (41),(43),(47)
and (50) as shown in the block diagram of Fig. 3.
8. M. N. Murty Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 6, ( Part -1) June 2015, pp.38-45
www.ijera.com 45 | P a g e
Figure 3. Block diagram of realization of DST-IV of length 22 mN m
V. CONCLUSION
Radix-2 algorithms for computing type-II DST and type-IV DST, each of length N = 2m
(m=2,3,….), are
presented in this paper. In the proposed method for DST-II, the odd-indexed output components are realized
using simple recursive relations. The recursive structures require less memory and are suitable for parallel VLSI
implementation. Signal flow graph for realization of DST-II of length N = 23
is given. The DST-IV of length N
is computed using DST-II and DCT-II sequences, each of length N/2. A block diagram for computation of
radix-2 DST-IV algorithm is shown.
REFERENCES
[1] N.Ahmed, T.Natarajan, and K.R.Rao, Discrete cosine transform, IEEE Trans. Comput., vol. C-23, 1974, 90-93.
[2] R.K.Rao and P.Yip, Discrete cosine transform: algorithm, advantages, and applications (New York: Academic,
1990).
[3] M.J.Narasimha and A.M.Peterson, On the computation of the discrete cosine transform, IEEE Trans.
Communications, vol.COM-26,no.6, June 1978, 934-936.
[4] H.S.Hou, A fast recursive algorithms for computing the discrete cosisine transform, IEEE Trans. Acoust.,
Speech, Signal Processing, vol. ASSP-35(10), Oct.1987, 1455-1461.
[5] PeiZong Lee and Fang-Yu Huang, Reconstructed recursive DCT and DST algorithms, IEEE Trans. Signal
Processing, vol.42, no.7, Jul.1994, 1600-1609.
[6] P.Duhamel and C.Guillemot, Polynomial transform computation of 2-D DCT ,in Proc. ICASSP’90, Apr.1990,
1515-1518.
[7] E.Feig and S.Winograd, Fast algorithms for the discrete cosine transform, IEEE Trans. Signal Processing,
vol.40, no.9, Sept.1992, 2174-2193.
[8] A.K. Jain, A fast Karhunen-Loeve transform for a class of random processes, IEEE Trans. Commun., vol. COM-
24, September 1976, 1023-1029.
[9] H.B. Kekre and J.K. Solanka, Comparative performance of various trigonometric unitary transforms for transform
image coding, Int. J. Electron., vol. 44, 1978, 305-315.
[10] A.K. Jain, A sinusoidal family of unitary transforms, IEEE Trans. Patt. Anal. Machine Intell., vol. PAMI-I,
September 1979,356-365.
[11] Z. Wang and B. Hunt, The discrete W transform, Applied Math Computat., vol. 16, January 1985, 19- 48.
[12] S. Cheng, Application of the sine transform method in time of flight positron emission image reconstruction
algorithms,IEEE Trans. BIOMED. Eng., vol. BME-32, March 1985,185-192.
[13] K. Rose, A. Heiman, and I. Dinstein, DCT/DST alternate transform image coding, Proc. GLOBE COM 87, vol. I,
November 1987, 426-430.
[14] J.L. Wang and Z.Q. Ding, Discrete sine transform domain LMS adaptive filtering, Proc. Int. Conf. Acoust.,
Speech, Signal Processing, 1985, 260-263.
[15] Z. Wang and L. Wang, Interpolation using the fast discrete sine transform, Signal Processing, vol. 26, 1992, 131-
137.
[16] K. Jain, Fundamentals of Digital Image Processing (Englewood Cliffs, NJ: Prentice - Hall, 1989)
[17] P. Yip and K.R. Rao, on the computation and the effectiveness of discrete sine transform, Comput. Electron, vol.
7, 1980, 45-55.