This document summarizes an article that proposes implementing adaptive digital beamforming using the CORDIC (COordinate Rotation DIgital Computer) algorithm. It first provides background on beamforming, sonar imaging, and the CORDIC theory. It then describes the proposed work of using CORDIC-based beamforming in an underwater sonar system to detect objects and determine angles. The system would transmit beamformed data, generate beamformed data at the receiver, and then use an optimized CORDIC algorithm to eliminate interference and noise from the received data.
Combination of iterative IA precoding and IBDFE based Equalizer for MC-CDMAEditor IJMTER
Interference alignment (IA) Precoding is a generalization of beam forming to
support multi-stream (or multi-layer) transmission in multi-antenna wireless communications.
Another FDE receivers supported the iterative block decision-feedback equalization (IBDFE), that doesn't use cryptography inside the iterative method will expeditiously exploit the
inherent space-frequency diversity of the MC-CDMA systems. In this paper we have a
tendency to discuss the combination of Pseudo-random sequence generator based iterative IA
precoding and IBDFE based Equalizer for MC-CDMA systems. The using of this sequence
generator we will be able to generate efficient pulse thus the performance might be able to
increase the performance of the system. In receiver aspect, first a linear filter is employed to
cut back the inter-user aligned interference, and so associate iterative FDE receiver is meant
to expeditiously separate the abstraction streams within the presence of residual inter-user
aligned interference at the output of the filter. The IBDFE based receiver primarily wont to
scale back the inter-user aligned interference and overall mean sq. error (MSE) at every
subcarrier in MC-CDMA and additionally scale reduce the no of iterations at the transmitter.
In this system achieves the most degrees of freedom provided by the IA precoding, and also
provide high space-diversity gain.
Integrating millimeter wave with hybrid precoding multiuser massive MIMO for ...TELKOMNIKA JOURNAL
Nowadays, there has been growing interest in the Massive MIMO as a result of improving throughput by leveraging spatial freedom and array gain. It is equipped with millimeter wave (mm Wave) bands to resolve the high path-loss. It is known from the literature that iterated algorithms are usually used to attain the hybrid precoders to accomplish a specific optimization objective. Thus, the complexity remains high because each iteration may include singular value decomposition, the matrix inversion, and so on that motivates us to split the hybrid precoding and combining problem into sub-problems. The proposed solution is a multi-user Massive MIMO hybrid beamforming based on a convex optimization problem that is applied and solved for estimating the digital precoding to eliminate inter-user interference while using codebooks to select analog beamformers. It is apparent in the majority of cases; the proposed beamforming performance is higher than only-analog beamforming, single-user (no interference), the ZF precoding, the MMSE precoding, and the Kalman precoding where the full digital solution is a considerable as the benchmark point with different scenarios due to the reduction of user interference. Thus, there is no consideration for complicated operations such as SVD or inversion matrices as well as no need for data estimation. Our proposed solution can serve a large number of users simultaneously due to more directive gain by using numerous antennas at BS. Based on its less complexity and keeping performance, our solution can be recommended.
Combination of iterative IA precoding and IBDFE based Equalizer for MC-CDMAEditor IJMTER
Interference alignment (IA) Precoding is a generalization of beam forming to
support multi-stream (or multi-layer) transmission in multi-antenna wireless communications.
Another FDE receivers supported the iterative block decision-feedback equalization (IBDFE), that doesn't use cryptography inside the iterative method will expeditiously exploit the
inherent space-frequency diversity of the MC-CDMA systems. In this paper we have a
tendency to discuss the combination of Pseudo-random sequence generator based iterative IA
precoding and IBDFE based Equalizer for MC-CDMA systems. The using of this sequence
generator we will be able to generate efficient pulse thus the performance might be able to
increase the performance of the system. In receiver aspect, first a linear filter is employed to
cut back the inter-user aligned interference, and so associate iterative FDE receiver is meant
to expeditiously separate the abstraction streams within the presence of residual inter-user
aligned interference at the output of the filter. The IBDFE based receiver primarily wont to
scale back the inter-user aligned interference and overall mean sq. error (MSE) at every
subcarrier in MC-CDMA and additionally scale reduce the no of iterations at the transmitter.
In this system achieves the most degrees of freedom provided by the IA precoding, and also
provide high space-diversity gain.
Integrating millimeter wave with hybrid precoding multiuser massive MIMO for ...TELKOMNIKA JOURNAL
Nowadays, there has been growing interest in the Massive MIMO as a result of improving throughput by leveraging spatial freedom and array gain. It is equipped with millimeter wave (mm Wave) bands to resolve the high path-loss. It is known from the literature that iterated algorithms are usually used to attain the hybrid precoders to accomplish a specific optimization objective. Thus, the complexity remains high because each iteration may include singular value decomposition, the matrix inversion, and so on that motivates us to split the hybrid precoding and combining problem into sub-problems. The proposed solution is a multi-user Massive MIMO hybrid beamforming based on a convex optimization problem that is applied and solved for estimating the digital precoding to eliminate inter-user interference while using codebooks to select analog beamformers. It is apparent in the majority of cases; the proposed beamforming performance is higher than only-analog beamforming, single-user (no interference), the ZF precoding, the MMSE precoding, and the Kalman precoding where the full digital solution is a considerable as the benchmark point with different scenarios due to the reduction of user interference. Thus, there is no consideration for complicated operations such as SVD or inversion matrices as well as no need for data estimation. Our proposed solution can serve a large number of users simultaneously due to more directive gain by using numerous antennas at BS. Based on its less complexity and keeping performance, our solution can be recommended.
A Novel Low Cost Fractal Antenna Structure for ISM and WiMAX ApplicationsTELKOMNIKA JOURNAL
Different fractal structures have been widely used in many antennas designs for various applications. A fractal antenna is used for miniaturization and multiband operation. This paper presents a design of a dual-band fractal antenna fed by coplanar waveguide (CPW) transmission line. The proposed antenna is designed and fabricated on an FR4 substrate with a volume of 70x60x1.6mm3, resonates at 2.42-2.62GHz and 3.40-3.65GHz with a return loss less than -10dB. The design and simulation process is carried out by using CST-MW studio electromagnetic solver. Simulation results show that the resulting antenna exhibits an interesting dual frequency resonant behavior making it suitable for dual band communication systems including the ISM and WiMAX applications. Concerning the fabrication and measurement of the final prototype of this antenna, a good agreement is found between simulation and measurement results for both frequency bands.
Modeling the interference generated from car base stations toward indoor femt...byungjincho
In future wireless networks, a significant number of users will be vehicular. One
promising solution to improve the capacity for these vehicular users is to employ moving relays
or car base stations. The system forms cell inside the vehicle and then uses rooftop antenna
for backhauling to overcome the vehicular penetration loss. In this paper, we develop a model
for aggregate interference distribution generated from moving/parked cars to indoor users in
order to study whether indoor femto-cells can coexist on the same spectrum with vehicular
communications. Since spectrum authorization for vehicular communications is open at moment,
we consider two spectrum sharing scenarios (i) communication from mounted antennas on the
roof of the vehicles to the infrastructure network utilizes same spectrum with indoor femto-cells
(ii) in-vehicle communication utilizes same spectrum with indoor femto-cells while vehicular to
infrastructure (V2I) communication is allocated at different spectrum. Based on our findings we
suggest that V2I and indoor femto-cells should be allocated at different spectrum. The reason
being that mounted roof-top antennas facing the indoor cells generate unacceptable interference
levels. On the other hand, in-vehicle communication and indoor cells can share the spectrum
thanks to the vehicle body isolation and the lower transmit power levels that can be used inside
the vehicle.
IEEE 2014 NS2 NETWORKING PROJECTS Optical networking with variable code-rate...IEEEBEBTECHSTUDENTPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Design simulation and evaluation of siso miso mimo ofdm systemsIJLT EMAS
In this paper an endeavour is made to design and simulate SISO, MISO and MIMO OFDM systems. We have analysed and compared the performance of these systems for image transmission over AWGN and Rayleigh channels. The effect of LS channel estimation on the BER over a range of SNR for MIMO(2X2) systems is examined. We have also compared the performance based on various M-ary PSK modulation techniques for image transmission over Rayleigh channel in MIMO-OFDM system. The system performance is simulated in Matlab. The results of the simulation show that as the antenna diversity increases, the BER decreases and the channel capacity increases. Also, the BER obtained in MIMO-OFDM system is less when LS estimation is used.
A Novel Low Cost Fractal Antenna Structure for ISM and WiMAX ApplicationsTELKOMNIKA JOURNAL
Different fractal structures have been widely used in many antennas designs for various applications. A fractal antenna is used for miniaturization and multiband operation. This paper presents a design of a dual-band fractal antenna fed by coplanar waveguide (CPW) transmission line. The proposed antenna is designed and fabricated on an FR4 substrate with a volume of 70x60x1.6mm3, resonates at 2.42-2.62GHz and 3.40-3.65GHz with a return loss less than -10dB. The design and simulation process is carried out by using CST-MW studio electromagnetic solver. Simulation results show that the resulting antenna exhibits an interesting dual frequency resonant behavior making it suitable for dual band communication systems including the ISM and WiMAX applications. Concerning the fabrication and measurement of the final prototype of this antenna, a good agreement is found between simulation and measurement results for both frequency bands.
Modeling the interference generated from car base stations toward indoor femt...byungjincho
In future wireless networks, a significant number of users will be vehicular. One
promising solution to improve the capacity for these vehicular users is to employ moving relays
or car base stations. The system forms cell inside the vehicle and then uses rooftop antenna
for backhauling to overcome the vehicular penetration loss. In this paper, we develop a model
for aggregate interference distribution generated from moving/parked cars to indoor users in
order to study whether indoor femto-cells can coexist on the same spectrum with vehicular
communications. Since spectrum authorization for vehicular communications is open at moment,
we consider two spectrum sharing scenarios (i) communication from mounted antennas on the
roof of the vehicles to the infrastructure network utilizes same spectrum with indoor femto-cells
(ii) in-vehicle communication utilizes same spectrum with indoor femto-cells while vehicular to
infrastructure (V2I) communication is allocated at different spectrum. Based on our findings we
suggest that V2I and indoor femto-cells should be allocated at different spectrum. The reason
being that mounted roof-top antennas facing the indoor cells generate unacceptable interference
levels. On the other hand, in-vehicle communication and indoor cells can share the spectrum
thanks to the vehicle body isolation and the lower transmit power levels that can be used inside
the vehicle.
IEEE 2014 NS2 NETWORKING PROJECTS Optical networking with variable code-rate...IEEEBEBTECHSTUDENTPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Design simulation and evaluation of siso miso mimo ofdm systemsIJLT EMAS
In this paper an endeavour is made to design and simulate SISO, MISO and MIMO OFDM systems. We have analysed and compared the performance of these systems for image transmission over AWGN and Rayleigh channels. The effect of LS channel estimation on the BER over a range of SNR for MIMO(2X2) systems is examined. We have also compared the performance based on various M-ary PSK modulation techniques for image transmission over Rayleigh channel in MIMO-OFDM system. The system performance is simulated in Matlab. The results of the simulation show that as the antenna diversity increases, the BER decreases and the channel capacity increases. Also, the BER obtained in MIMO-OFDM system is less when LS estimation is used.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Implementation of Algorithms For Multi-Channel Digital Monitoring ReceiverIOSR Journals
Abstract: Monitoring Receivers form an important constituent of the Electronic support. In Monitoring
Receiver we can monitor, demodulate or scan the multiple channels.
In this project, the Implementation of algorithm for multi channel digital monitoring receiver. The
implementation will carry out the channelization by the way of Digital down Converters (DDCs) and Digital
Base band Demodulation. The Intermediate Frequency (IF) at 10.7 MHz will be digitalized using Analog to
Digital Converter (ADC) with sampling frequency 52.5 MHz and further converted to Base band using DDCs.
Virtually all the digital receivers perform channel access using a DDC. The Base band data will be streamed to
the appropriate demodulators. Matlab Simulink will be used to simulate the logic modules before the
implementation. This system will be prototyped on an FPGA based COTS (Commercial-off-the-shelf)
development board. Xilinx System Generator will be used for the implementation of the algorithms.
Keywords: DDC, ADC, Digital Base band demodulation, IF, Monitoring Receiver.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Real Time Implementation of Adaptive Beam former for Phased Array Radar over ...CSCJournals
Mechanical positioners, rotating antennas and large size of early generation radars limited the capability of the radar system to track laterally accelerating targets. Electronic Scanning Array (ESA) such as used in Phased Array Radar (PAR) overcomed these limitations by providing beam agility, good response time, variable scan rates and efficient use of energy. Early PAR systems used analog phase shifting schemes that caused variations and component failures resulting in overall degradation of radar performance. With the advent of new technology and high performance embedded systems, digital beamforming has become powerful enough to perform massive operations required for real time digital beamforming. MATLAB simulation of adaptive beamformer is presented in this paper. Real time implementation of adaptive beamformer over DSP kit (TMS320C6713) was also carried out and results were compared with MATLAB simulations. GUI was also made in MATLAB for viewing results of real time implementation via real time data exchange. Developed system can be used in digital beamforming PAR provided array signals is routed to DSP kit through FPGA interfaced to high speed ADC’s.
Design of Adjustable Reconfigurable Wireless Single Core CORDIC based Rake Re...IOSR Journals
In wireless communication system transmitted signals are subjected to multiple reflections,
diffractions and attenuation caused by obstacles such as buildings and hills, etc. At the receiver end, multiple
copies of the transmitted signal are received that arrive at clearly distinguishable time instants and are faded by
signal cancellation. Rake receiver is a technique to combine these so called multi-paths [2] by utilizing multiple
correlation receivers allocated to those delay positions on which the significant energy arrives which achieves a
significant improvement in the SNR of the output signal. This paper shows how the rake, including dispreading
and descrambling could be replaced by a receiver that can be implemented on a CORDIC based hardware
architecture. The performance in conjunction with the computational requirements of the receiver is widely
adjustable which is significantly better than that of the conventional rake receiver
Design of Adjustable Reconfigurable Wireless Single Core CORDIC based Rake Re...IOSR Journals
Abstract : In wireless communication system transmitted signals are subjected to multiple reflections, diffractions and attenuation caused by obstacles such as buildings and hills, etc. At the receiver end, multiple copies of the transmitted signal are received that arrive at clearly distinguishable time instants and are faded by signal cancellation. Rake receiver is a technique to combine these so called multi-paths [2] by utilizing multiple correlation receivers allocated to those delay positions on which the significant energy arrives which achieves a significant improvement in the SNR of the output signal. This paper shows how the rake, including dispreading and descrambling could be replaced by a receiver that can be implemented on a CORDIC based hardware architecture. The performance in conjunction with the computational requirements of the receiver is widely adjustable which is significantly better than that of the conventional rake receiver. Keywords - Rake receiver, Multi-paths, CORDIC
Ship Detection from SAR Imagery Using CUDA and Performance Analysis of the Sy...IJERA Editor
Synthetic aperture radar (SAR) Ship Detection System SDS is an important application from the point of view of Maritime Security monitoring. It allows monitoring traffic, fisheries, naval warfare. Since full-resolution SAR images are heavily affected by the presence of speckle, ship detection algorithms generally employ speckle reduced SAR images at the expense of a degradation of the spatial resolution. The proposed Parzen-window-kernel-based algorithm and CFAR algorithm can be considered an alternative to manual inspection for large ocean areas. Promising results and high detection rates for the ships have been achieved. In Parzen-window-kernel-based algorithm for ship detection in synthetic aperture radar (SAR) images, first, the data-driving kernel functions of Parzen window are utilized to approximate the histogram of real SAR image, in order to complete the accurate modeling of SAR images. Then ship detection is implemented using a Constant False Alarm Rate (CFAR). After detecting threshold, the output is added to edge detection algorithm employed on SAR image. Clearer detection of ship candidates is obtained by applying Parzen-window-kernel-based algorithm by changing its window size. Experimental results show that SDS implemented using CUDA is faster than on CPU.
Recent advances in radio and embedded systems for completing the procedure of location estimation most
of the time sensor networks are fully dependent on the distance measurements that is present between the
sensor neighbourhood node. Techniques used for the localization can be categorized differently.
Techniques used for the measurement of the distance between the wireless sensor nodes, dependent upon
the physical means are divided into three broader categories namely Received signal strength (RSS), Angle
of Arrival (AOA) and propagation base on time measurements. This paper discusses the most of the
approached of WSN and IoT based positioning system.
Clutter reduction technique based on clutter model for automatic target class...TELKOMNIKA JOURNAL
Classification becomes one of the important elements in the forward scatter radar (FSR) micro-sensors network. This classification performance is dependent on the target’s profile behaviour and the network’s surrounding; and one of the factors that cause the reduction of classification probability is the presence of ground clutter. As the volume of clutter increases, their masking effect becomes greater and may result in more significant errors in target classification. Hence, to reduce misclassification in the FSR sensor network, a new clutter reduction technique based on the ground clutter model is proposed. Simulated ground clutter is modeled based on the estimated signal to clutter ratio (SCR) of the received signal. The clutter effect is diminished by eliminating simulated like-clutter from the receiving signals. The result shows improvement in the classification accuracy, especially for the minimum value of the SCR and this new technique uses only one database which will shorten the processing time and reduce the overall database’s size.
Robust automotive radar interference mitigation using multiplicative-adaptive...IJECEIAES
Radar is one of the sensors that have significant attention to be implemented in an autonomous vehicle since its robustness under many possible environmental conditions such as fog, rain, and poor light. However, the implementation risks interference because of transmitting and/or receiving radar signals from/to other vehicles. This interference will increase the floor noise that can mask the target signal. This paper proposes multiplicative-adaptive filtering and Hilbert transform to mitigate the interference effect and maintain the target signal detectability. The method exploited the trade-off between the step-size and sidelobe effect on the least mean square-based adaptive filtering to improve the target detection accuracy, especially in the long-range case. The numerical analysis on the millimeter-wave frequency modulated continuous wave radar with multiple interferers concluded that the proposed method could maintain and enhance the target signal even if the target range is relatively far from the victim radar.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal,
Investigations on real time RSSI based outdoor target tracking using kalman f...IJECEIAES
Target tracking is essential for localization and many other applications in Wireless Sensor Networks (WSNs). Kalman filter is used to reduce measurement noise in target tracking. In this research TelosB motes are used to measure Received Signal Strength Indication (RSSI). RSSI measurement doesn‟t require any external hardware compare to other distance estimation methods such as Time of Arrival (TOA), Time Difference of Arrival (TDoA) and Angle of Arrival (AoA). Distances between beacon and non-anchor nodes are estimated using the measured RSSI values. Position of the nonanchor node is estimated after finding the distance between beacon and nonanchor nodes. A new algorithm is proposed with Kalman filter for location estimation and target tracking in order to improve localization accuracy called as MoteTrack InOut system. This system is implemented in real time for indoor and outdoor tracking. Localization error reduction obtained in an outdoor environment is 75%.
Similar to Implementation of Adaptive Digital Beamforming using Cordic (20)
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
The emergence of the internet has made vast amounts of information available and easily accessible online. As a result, most libraries have digitized their content in order to remain relevant to their users and to keep pace with the advancement of the internet. However, these digital libraries have been criticized for using inefficient information retrieval models that do not perform relevance ranking to the retrieved results. This paper proposed the use of OKAPI BM25 model in text mining so as means of improving relevance ranking of digital libraries. Okapi BM25 model was selected because it is a probability-based relevance ranking algorithm. A case study research was conducted and the model design was based on information retrieval processes. The performance of Boolean, vector space, and Okapi BM25 models was compared for data retrieval. Relevant ranked documents were retrieved and displayed at the OPAC framework search page. The results revealed that Okapi BM 25 outperformed Boolean model and Vector Space model. Therefore, this paper proposes the use of Okapi BM25 model to reward terms according to their relative frequencies in a document so as to improve the performance of text mining in digital libraries.
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
This study focused on the practice of using computing resources more efficiently while maintaining or increasing overall performance. Sustainable IT services require the integration of green computing practices such as power management, virtualization, improving cooling technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet sustainability requirements. Studies have shown that costs of power utilized by IT departments can approach 50% of the overall energy costs for an organization. While there is an expectation that green IT should lower costs and the firm’s impact on the environment, there has been far less attention directed at understanding the strategic benefits of sustainable IT services in terms of the creation of customer value, business value and societal value. This paper provides a review of the literature on sustainable IT, key areas of focus, and identifies a core set of principles to guide sustainable IT service design.
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
Computers today are an integral part of individuals’ lives all around the world, but unfortunately these devices are toxic to the environment given the materials used, their limited battery life and technological obsolescence. Individuals are concerned about the hazardous materials ever present in computers, even if the importance of various attributes differs, and that a more environment -friendly attitude can be obtained through exposure to educational materials. In this paper, we aim to delineate the problem of e-waste in Nigeria and highlight a series of measures and the advantage they herald for our country and propose a series of action steps to develop in these areas further. It is possible for Nigeria to have an immediate economic stimulus and job creation while moving quickly to abide by the requirements of climate change legislation and energy efficiency directives. The costs of implementing energy efficiency and renewable energy measures are minimal as they are not cash expenditures but rather investments paid back by future, continuous energy savings.
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
Vehicular ad hoc networks (VANETs) are a favorable area of exploration which empowers the interconnection amid the movable vehicles and between transportable units (vehicles) and road side units (RSU). In Vehicular Ad Hoc Networks (VANETs), mobile vehicles can be organized into assemblage to promote interconnection links. The assemblage arrangement according to dimensions and geographical extend has serious influence on attribute of interaction .Vehicular ad hoc networks (VANETs) are subclass of mobile Ad-hoc network involving more complex mobility patterns. Because of mobility the topology changes very frequently. This raises a number of technical challenges including the stability of the network .There is a need for assemblage configuration leading to more stable realistic network. The paper provides investigation of various simulation scenarios in which cluster using k-means algorithm are generated and their numbers are varied to find the more stable configuration in real scenario of road.
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
The optimal sizing and placement of Distributed Generation units (DG) are becoming very attractive to researchers these days. In this paper a two stage approach has been used for allocation and sizing of DGs in distribution system with time varying load model. The strategic placement of DGs can help in reducing energy losses and improving voltage profile. The proposed work discusses time varying loads that can be useful for selecting the location and optimizing DG operation. The method has the potential to be used for integrating the available DGs by identifying the best locations in a power system. The proposed method has been demonstrated on 9-bus test system.
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
Early detection of diabetes mellitus (DM) can prevent or inhibit complication. There are several laboratory test that must be done to detect DM. The result of this laboratory test then converted into data training. Data training used in this study generated from UCI Pima Database with 6 attributes that were used to classify positive or negative diabetes. There are various classification methods that are commonly used, and in this study three of them were compared, which were fuzzy KNN, C4.5 algorithm and Naïve Bayes Classifier (NBC) with one identical case. The objective of this study was to create software to classify DM using tested methods and compared the three methods based on accuracy, precision, and recall. The results showed that the best method was Fuzzy KNN with average and maximum accuracy reached 96% and 98%, respectively. In second place, NBC method had respective average and maximum accuracy of 87.5% and 90%. Lastly, C4.5 algorithm had average and maximum accuracy of 79.5% and 86%, respectively.
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
Study in the Competitive field of Intelligent, and studies in the field of Web Scraping, have a symbiotic relationship mutualism. In the information age today, the website serves as a main source. The research focus is on how to get data from websites and how to slow down the intensity of the download. The problem that arises is the website sources are autonomous so that vulnerable changes the structure of the content at any time. The next problem is the system intrusion detection snort installed on the server to detect bot crawler. So the researchers propose the use of the methods of Mining Data Records and the method of Exponential Smoothing so that adaptive to changes in the structure of the content and do a browse or fetch automatically follow the pattern of the occurrences of the news. The results of the tests, with the threshold 0.3 for MDR and similarity threshold score 0.65 for STM, using recall and precision values produce f-measure average 92.6%. While the results of the tests of the exponential estimation smoothing using ? = 0.5 produces MAE 18.2 datarecord duplicate. It slowed down to 3.6 datarecord from 21.8 datarecord results schedule download/fetch fix in an average time of occurrence news.
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
Most of the existing semantic similarity measures that use ontology structure as their primary source can measure semantic similarity between concepts/classes using single ontology. The ontology-based semantic similarity techniques such as structure-based semantic similarity techniques (Path Length Measure, Wu and Palmer’s Measure, and Leacock and Chodorow’s measure), information content-based similarity techniques (Resnik’s measure, Lin’s measure), and biomedical domain ontology techniques (Al-Mubaid and Nguyen’s measure (SimDist)) were evaluated relative to human experts’ ratings, and compared on sets of concepts using the ICD-10 “V1.0” terminology within the UMLS. The experimental results validate the efficiency of the SemDist technique in single ontology, and demonstrate that SemDist semantic similarity techniques, compared with the existing techniques, gives the best overall results of correlation with experts’ ratings.
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
The techniques and tests are tools used to define how measure the goodness of ontology or its resources. The similarity between biomedical classes/concepts is an important task for the biomedical information extraction and knowledge discovery. However, most of the semantic similarity techniques can be adopted to be used in the biomedical domain (UMLS). Many experiments have been conducted to check the applicability of these measures. In this paper, we investigate to measure semantic similarity between two terms within single ontology or multiple ontologies in ICD-10 “V1.0” as primary source, and compare my results to human experts score by correlation coefficient.
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
This is an effective way to improve the storage access performance of small files in Openstack Swift by adding an aggregate storage module. Because Swift will lead to too much disk operation when querying metadata, the transfer performance of plenty of small files is low. In this paper, we propose an aggregated storage strategy (ASS), and implement it in Swift. ASS comprises two parts which include merge storage and index storage. At the first stage, ASS arranges the write request queue in chronological order, and then stores objects in volumes. These volumes are large files that are stored in Swift actually. During the short encounter time, the object-to-volume mapping information is stored in Key-Value store at the second stage. The experimental results show that the ASS can effectively improve Swift's small file transfer performance.
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
Efficient management and control of government's cash resources rely on government banking arrangements. Nigeria, like many low income countries, employed fragmented systems in handling government receipts and payments. Later in 2016, Nigeria implemented a unified structure as recommended by the IMF, where all government funds are collected in one account would reduce borrowing costs, extend credit and improve government's fiscal policy among other benefits to government. This situation motivated us to embark on this research to design and implement an integrated system for vehicle clearance and registration. This system complies with the new Treasury Single Account policy to enable proper interaction and collaboration among five different level agencies (NCS, FRSC, SBIR, VIO and NPF) saddled with vehicular administration and activities in Nigeria. Since the system is web based, Object Oriented Hypermedia Design Methodology (OOHDM) is used. Tools such as Php, JavaScript, css, html, AJAX and other web development technologies were used. The result is a web based system that gives proper information about a vehicle starting from the exact date of importation to registration and renewal of licensing. Vehicle owner information, custom duty information, plate number registration details, etc. will also be efficiently retrieved from the system by any of the agencies without contacting the other agency at any point in time. Also number plate will no longer be the only means of vehicle identification as it is presently the case in Nigeria, because the unified system will automatically generate and assigned a Unique Vehicle Identification Pin Number (UVIPN) on payment of duty in the system to the vehicle and the UVIPN will be linked to the various agencies in the management information system.
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
The Supermarket Management System deals with the automation of buying and selling of good and services. It includes both sales and purchase of items. The project Supermarket Management System is to be developed with the objective of making the system reliable, easier, fast, and more informative.
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
Energy is a key component in the Wireless Sensor Network (WSN)[1]. The system will not be able to run according to its function without the availability of adequate power units. One of the characteristics of wireless sensor network is Limitation energy[2]. A lot of research has been done to develop strategies to overcome this problem. One of them is clustering technique. The popular clustering technique is Low Energy Adaptive Clustering Hierarchy (LEACH)[3]. In LEACH, clustering techniques are used to determine Cluster Head (CH), which will then be assigned to forward packets to Base Station (BS). In this research, we propose other clustering techniques, which utilize the Social Network Analysis approach theory of Betweeness Centrality (BC) which will then be implemented in the Setup phase. While in the Steady-State phase, one of the heuristic searching algorithms, Modified Bi-Directional A* (MBDA *) is implemented. The experiment was performed deploy 100 nodes statically in the 100x100 area, with one Base Station at coordinates (50,50). To find out the reliability of the system, the experiment to do in 5000 rounds. The performance of the designed routing protocol strategy will be tested based on network lifetime, throughput, and residual energy. The results show that BC-MBDA * is better than LEACH. This is influenced by the ways of working LEACH in determining the CH that is dynamic, which is always changing in every data transmission process. This will result in the use of energy, because they always doing any computation to determine CH in every transmission process. In contrast to BC-MBDA *, CH is statically determined, so it can decrease energy usage.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
Report handling on "LAPOR!" (Laporan, Aspirasi dan Pengaduan Online Rakyat) system depending on the system administrator who manually reads every incoming report [3]. Read manually can lead to errors in handling complaints [4] if the data flow is huge and grows rapidly, it needs at least three days to prepare a confirmation and it sensitive to inconsistencies [3]. In this study, the authors propose a model that can measure the identities of the Query (Incoming) with Document (Archive). The authors employed Class-Based Indexing term weighting scheme, and Cosine Similarities to analyse document similarities. CoSimTFIDF, CoSimTFICF and CoSimTFIDFICF values used in classification as feature for K-Nearest Neighbour (K-NN) classifier. The optimum result evaluation is pre-processing employ 75% of training data ratio and 25% of test data with CoSimTFIDF feature. It deliver a high accuracy 84%. The k = 5 value obtain high accuracy 84.12%
Hangul Recognition Using Support Vector MachineEditor IJCATR
The recognition of Hangul Image is more difficult compared with that of Latin. It could be recognized from the structural arrangement. Hangul is arranged from two dimensions while Latin is only from the left to the right. The current research creates a system to convert Hangul image into Latin text in order to use it as a learning material on reading Hangul. In general, image recognition system is divided into three steps. The first step is preprocessing, which includes binarization, segmentation through connected component-labeling method, and thinning with Zhang Suen to decrease some pattern information. The second is receiving the feature from every single image, whose identification process is done through chain code method. The third is recognizing the process using Support Vector Machine (SVM) with some kernels. It works through letter image and Hangul word recognition. It consists of 34 letters, each of which has 15 different patterns. The whole patterns are 510, divided into 3 data scenarios. The highest result achieved is 94,7% using SVM kernel polynomial and radial basis function. The level of recognition result is influenced by many trained data. Whilst the recognition process of Hangul word applies to the type 2 Hangul word with 6 different patterns. The difference of these patterns appears from the change of the font type. The chosen fonts for data training are such as Batang, Dotum, Gaeul, Gulim, Malgun Gothic. Arial Unicode MS is used to test the data. The lowest accuracy is achieved through the use of SVM kernel radial basis function, which is 69%. The same result, 72 %, is given by the SVM kernel linear and polynomial.
Application of 3D Printing in EducationEditor IJCATR
This paper provides a review of literature concerning the application of 3D printing in the education system. The review identifies that 3D Printing is being applied across the Educational levels [1] as well as in Libraries, Laboratories, and Distance education systems. The review also finds that 3D Printing is being used to teach both students and trainers about 3D Printing and to develop 3D Printing skills.
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
In underwater environment, for retrieval of information the routing mechanism is used. In routing mechanism there are three to four types of nodes are used, one is sink node which is deployed on the water surface and can collect the information, courier/super/AUV or dolphin powerful nodes are deployed in the middle of the water for forwarding the packets, ordinary nodes are also forwarder nodes which can be deployed from bottom to surface of the water and source nodes are deployed at the seabed which can extract the valuable information from the bottom of the sea. In underwater environment the battery power of the nodes is limited and that power can be enhanced through better selection of the routing algorithm. This paper focuses the energy-efficient routing algorithms for their routing mechanisms to prolong the battery power of the nodes. This paper also focuses the performance analysis of the energy-efficient algorithms under which we can examine the better performance of the route selection mechanism which can prolong the battery power of the node
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
The designing of routing algorithms faces many challenges in underwater environment like: propagation delay, acoustic channel behaviour, limited bandwidth, high bit error rate, limited battery power, underwater pressure, node mobility, localization 3D deployment, and underwater obstacles (voids). This paper focuses the underwater voids which affects the overall performance of the entire network. The majority of the researchers have used the better approaches for removal of voids through alternate path selection mechanism but still research needs improvement. This paper also focuses the architecture and its operation through merits and demerits of the existing algorithms. This research article further focuses the analytical method of the performance analysis of existing algorithms through which we found the better approach for removal of voids
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
In this paper we consider the initial value problem for a plate type equation with variable coefficients and memory in
1 n R n ), which is of regularity-loss property. By using spectrally resolution, we study the pointwise estimates in the spectral
space of the fundamental solution to the corresponding linear problem. Appealing to this pointwise estimates, we obtain the global
existence and the decay estimates of solutions to the semilinear problem by employing the fixed point theorem
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Implementation of Adaptive Digital Beamforming using Cordic
1. International Journal of Computer Applications Technology and Research
Volume 3– Issue 12, 815 - 821, 2014, ISSN:- 2319–8656
www.ijcat.com 815
Implementation of Adaptive Digital Beamforming using
Cordic
Azra Jeelani
VTU
M S Engineering College,
Bangalore, Karnataka, India
Dr. Veena.M.B
VTU
B M S College of Engineering,
Bangalore, Karnataka, India.
Dr.Cyril Prasanna Raj
Coventry University
M S Engineering College,
Bangalore, Karnataka, India
Abstract: Sonar imaging is one of the simplest technique for detection of under water drowned bodies. There is a need for design of
conventional beamforming which are robust and simple. Adaptive beamformer is used to improve the quality of the sonar image. As a
result we get an image containing more useful and correct information. The CORDIC computing technique a highly efficient method
to compute elementary functions like sine, cosine, translate, rotate values using CORDIC algorithm. The system simulation was
carried out using ModelSim and Xilinx ISE Design Suite 9.2i.. Matlab code is used to implement sin and cos using cordic angles and
amplitude response of beamformed data by optimized method in order to enlarge the validity region of beamforming. Synthesis
results of cordic shows the reduced memory requirement and less power consumption.
Keywords: Beamforming , cordic, sonar imaging, validity region
1. INTRODUCTION
Beamforming is a type of signal processing technique used in
sensor arrays for directional signal transmission or reception.
Here the elements are combined in such a way that signals at
particular angles experience constructive interference while
others experience destructive interference. 3D sonar imaging
has been one of the main innovations in underwater
applications over the years[1]. There are two critical issues in
the development of high resolution 3D sonar systems are 1)
the cost of hardware, which is associated with the huge
number of sensors that compose the planar array and 2) the
computational burden in processing the signals. Palmese and
Trucco also propose an algorithm to perform chirp zeta
transform beam forming on the wideband signals collected by
an evenly spaced planar array and generated by a scene placed
in both the far field and the near field [4],[6]. Works are done
in [8]-[10] have proposed to use the Coordinated Rotation
DIgital Computer(CORDIC) in implementing frequency
domain beamforming on field Programmable Gate Arrays-the
CORDIC algorithm in an iterative arithmetic algorithm given
by Volder[11] and Walther[12].This paper describes a data
path using CORDIC for the algorithm.
The digital signal processing has long been dominated by
microprocessors with enhancements such as single cycle
multiply-accumulate instructions and special addressing
modes. While these processors are low cost and offer extreme
flexibility, they are not fast enough for truly demanding DSP
tasks. The advent of high speeds of dedicated hardware
solutions which has the costs that are competitive with the
traditional software approach. Unfortunately, algorithms
optimized for these microprocessor based systems do not
always map well into hardware. While hardware-efficient
solutions often exist, the dominance of the software systems
has kept those solutions out of the spotlight. Among these
hardware-efficient algorithms is a class of iterative solutions
for trigonometric and other functions that use only shifts and
adds to perform. The trigonometric functions are based on
vector rotations, while other functions like square root are
implemented using an incremental expression of the desired
function. The trigonometric algorithm is called CORDIC, an
acronym for COordinate Rotation DIgital Computer. The
incremental functions are performed with a very simple
extension to the hardware architecture, and while not
CORDIC in the strict sense, are often included because of the
close similarity. The CORDIC algorithms generally produce
one additional bit of accuracy for each iteration. The
trigonometric CORDIC algorithms were originally
developed as a digital solution for real-time navigation
problems. The original work is credited to Jack Volder [4,9].
Extensions to the CORDIC theory based on work by John
Walther[1] and others provide solutions to a broader class of
functions. This paper attempts to survey the existing CORDIC
and CORDIC-like algorithms and then towards
implementation in Field Programmable Gate Arrays
(FPGAs).
A approximation of used in near field beamforming presented
in[13],[14] by enlarging the validity region. Beamforming can
be used at both the transmitting and receiving ends in order to
achieve spatial selectivity. To change the directionality of the
array when transmitting, a beamformer controls the phase and
relative amplitude of the signal at each transmitter, in order to
create a pattern of constructive and destructive interference in
the wave front. When receiving, information from different
sensors is combined in a way where the expected pattern of
radiation is preferentially observed. Conventional
beamformers use a fixed set of weightings and time-delays (or
phasings) to combine the signals from the sensors in the array,
primarily using only information about the location of the
sensors in space and the wave directions of interest. In
contrast, adaptive beamforming techniques generally combine
this information with properties of the signals actually
received by the array, typically to improve rejection of
unwanted signals from other directions. This process may be
carried out in either the time or the frequency domain.
Hardware implementation of bio-inspired algorithm for
motion detection takes less processing time. Integration of
motion detection model and improves the performance of
autonomous visual navigation. For resolving the navigation
problems two existing approach optical flow or non bio-
inspired and bio- inspired processing time is needed to reduce.
For minimizing the size of system algorithm should be
implemented on ASIC and functionality should be verified on
2. International Journal of Computer Applications Technology and Research
Volume 3– Issue 12, 815 - 821, 2014, ISSN:- 2319–8656
www.ijcat.com 816
FPGA before taking to ASIC.
2. BACKGROUND THEORY
2.1.Beamforming
Beamforming is a type of signal processing technique used in
sensor arrays for directional signal transmission or reception.
Here the elements are combined in such a way that signals at
particular angles experience constructive interference while
others experience destructive interference[1]. Beamformers
are classified as either data independent or statistically
optimum, depending on how the weights are chosen. The
weights in a data independent beamformer do not depend on
the array data and are chosen to present a specified response
for all signal and interference scenarios. The weights in a
statistically optimum beamformer are chosen based on the
statistics of the array data to optimize the array response. The
statistics of the array data are not usually known and may
change over time so adaptive algorithms are typically used to
determine the weights. The adaptive algorithm is designed so
the beamformer response converges to a statistically optimum
solution [6].
The weights in a data independent beam former are
designed so that the beamformer response approximates a
desired response independent of the array data or data
statistics. This design objective is same as that for a classical
FIR filter design. The simple delay and sum beam former is
an example of the data independent beamforming.
In statistically optimum beam former the weighs
are chosen based on the statistics of the data received at the
array. The goal is to optimize the beam former response so
that the output signal contains minimal contributions due to
the noise and signals arriving from directions other than the
desired direction. The Frost beamformer is a statistically
optimum beam former. Other statistically optimum
beamformers are Multiple Side lobe Canceller and
Maximization of the signal to noise ratio.
2.2.Sonar Imaging
Sonar (an acronym for SOund Navigation and Ranging) is a
technique that uses sound propagation (usually underwater, as
in submarine navigation) to navigate, communicate with or
detect objects on or under the surface of the water, such as
other vessels. Two types of technology share the name
"sonar": passive sonar is essentially listening for the sound
made by vessels; active sonar is emitting pulses of sounds and
listening for echoes. Sonar may be used as a means of
acoustic location and of measurement of the echo
characteristics of "targets" in the water. Acoustic location in
air was used before the introduction of radar. Sonar may also
be used in air for robot navigation, and SODAR (upward
looking in-air sonar) is used for atmospheric investigations.
The term sonar is also used for the equipment used to generate
and receive the sound.
2.3.Active and Passive Sonar System
Active sonar or passive sonar, when receiving the acoustic
signal reflected from the target, the information included in
the signal cannot be directly collected and used without
technical signal processing. To extract the efficient and useful
information’s from the mixed signal, some steps should be
taken to transfer sonar data from raw acoustic data reception
to detection output.
Fig.1 Passive and Acive Sonar System
needed during the signal processing system as
shown in Fig.1
2.4.Cordic Theory
Coordinate Rotational Digital Computer (CORDIC) is a set of
shift-add algorithm known for computing a wide range
trigonometric functions, hyperbolic, linear and logarithmic
functions also like multiplication division, data type
conversion, square root. It is highly efficient, low complexity.
The CORDIC algorithm has found in various applications
such as pocket calculator, numerical co-processors to high
performers Radar signal processing, supersonic bomber.
Vector rotation can also be used for polar to rectangular and
rectangular to polar conversions, for vector magnitude, and as
a building block in certain transforms such as the DFT and
DCT. The CORDIC algorithm provides an iterative method
of performing vector rotations by arbitrary angles using only
shifts and adds. The algorithm, credited to Volder[4], is
derived from the general (Givens) rotation transform:
x׳
=x.cos (ɸ) - y.sin (ɸ) -------------(1)
y׳
=x.cos (ɸ) + y.sin (ɸ) --------------(2)
.
These can be rearranged so that:
Fig 2. Rotation of sin and cos
x׳
=cos (ɸ). [x – y.tan (ɸ)] --------------(3)
y׳
=cos (ɸ). [x + y.tan (ɸ)] ---------------(4)
.
3. International Journal of Computer Applications Technology and Research
Volume 3– Issue 12, 815 - 821, 2014, ISSN:- 2319–8656
www.ijcat.com 817
Fig 3. Input and output of rotation for rotation mode
So far, nothing is simplified. However, if the rotation angles
are restricted so that tan()2-i, the multiplication by the tangent
term is reduced to simple shift operation. Arbitrary angles of
rotation are obtainable by performing a series of successively
smaller elementary rotations. If the decision at each iteration,
i, is which direction to rotate rather than whether or not to
rotate, then the cos(i) term becomes a constant (because
cos(i)=cos(-i)).The iterative rotation can now be expressed as:
Xi+1 =Ki[ xi – di.yi.2-i
] ---------(5)
Yi+1 =Ki[ xi + di.yi.2-i
] --------(6)
Where
Ki= cos(tan-1
2-i
)= 1/sqrt(1+ 2-2i
) ----(7)
di= -----------------------------------(8)
Removing the scale constant from the iterative equations
yields a shift-add algorithm or vector rotation. The product
of the Ki's can be applied elsewhere in the system or treated
as part of a system processing gain. That product approaches
0.6073 as the number of iterations goes to i infinity.
Therefore, the rotation algorithm has a gain, An of
approximately 1.647. The exact gain depends on the number
of iterations, and obeys the relation
An=∏ sqrt(1+ 2-2i
) -------------------(9)
The angle of a composite rotation is uniquely defined by the
sequence of the directions of the elementary rotations. That
sequence can be represented by a decision vector. The set of
all possible decision vectors is an angular measurement
system based on binary arctangents. Conversions between this
angular system and any other can be accomplished using
look-up. A better conversion method uses an additional
adder-subtractor that accumulates the elementary rotation
angles at each iteration. The elementary angles can be
expressed in any convenient angular unit. Those angular values
are supplied by a small lookup table (one entry per iteration)
or are hardwired, depending on the implementation. The
angle accumulator adds a third difference equation to the
algorithm.
Zi+1 = Zi + di(tan -1
2-i
)----------------(10)
Obviously, in cases where the angle is useful in the
arctangent base, this extra element is not needed. The CORDIC
rotator is normally operated in one of two modes. The first,
called rotation by Volder[4], rotates the input vector by a
specified angle (given as an argument). The second mode,
called vectoring, rotates the input vector to the x axis
2.5. Implementation in an FPGA
There are a number of ways to implement a CORDIC
processor. The ideal architecture depends on the speed versus
area tradeoffs in the intended application. First we will
examine an iterative architecture that is a direct translation
from the CORDIC equations. From there, we will look at a
minimum hardware solution and a maximum performance
solution.
2.6.Iterative CORDIC Processors
An iterative CORDIC architecture can be obtained simply by
duplicating each of the three difference equations in hardware
as shown in Figure 1. The decision function, di, is driven by
the sign of the y or z register depending on whether it is
operated in rotation or vectoring mode. In operation, the
initial values are loaded via multiplexers into the x, y and z
registers. Then on each of the next n clock cycles, the values
from the registers are passed through the shifters and adder-
subtractors and the results placed back in the registers. The
shifters are modified on each iteration to cause the desired
shift for the iteration. Likewise, the ROM address is
incremented on each iteration so that the appropriate
elementary angle value is presented to the z adder-subtractor.
On the last iteration, the results are read directly from the
adder-subtractors. Obviously, a simple state machine is
required keep track of the current iteration, and to select the
degree of shift and ROM address for each iteration. The design
depicted in Figure 1 uses word-wide data paths (called bit-
parallel design). The bit-parallel variable shift shifters do not
map well to FPGA architectures because of the high fan-in
required. If implemented, those shifters will typically require
several layers of logic (i.e., the signal will need to pass
through a number of FPGA cells). The result is a slow design
that uses a large number of logic cells.
3. PROPOSED WORK
Digital input pulse is passed to find the angle or detection of
object under water. In Fig.3.Beamforming can be used at both
the transmitting and receiving ends in order to achieve spatial
selectivity, the data is transmitted to underwater sonar system,
sonar is used to detect the underwater objects and finds the
angle elevation. The beamformed data is transmitted; at the
receiver end beam formation data is generated. The generated
beam formation data will be having interference and noise
error that will be reduced by using optimization technique.
Optimized cordic beamforming will eliminate all the
interference which generated at receiver end. Final
optimization beamforming data is obtained
Fig 4.. Beamforming for underwater sonar
Digital
Input
Pulse
Beam
forma-
tion
from
transmit
ter
Data
transmitti
ng to
under
water
sonar
system
Receiver
(Beam
formation
Data
Generate)
Optimiz
ed
Cordic(B
eam
forming)
Output
Beam
Data
4. International Journal of Computer Applications Technology and Research
Volume 3– Issue 12, 815 - 821, 2014, ISSN:- 2319–8656
www.ijcat.com 818
3.1.Program Flow Chart:
Fig.5 .Program Flow Chart
Fig 5. shows the flow chart in which initially the
CORDIC values are sampled, the antennas are used to detect
the angles and object of beam form underwater sonar with
sampled bit rate. The detected angles are taken as input data
where the beam data is formed, the obtained beam data are
sampled according to mathematical calculations under
CORDIC algorithm, the obtained beam data samples are
computed as quad phase and In phase. The received beam
data contains noise and interference which are reduced and
eliminated using underwater noise model. The beam data is
computed for each antenna and its angles, the error beam data
is finally computed to obtain noiseless beam data. The
obtained output is in the form of optimized beam form data.
3.2. Architecture:
The architecture is shown in Fig.6 in which input signals are
given to memory. The memory is used to store the data of
input signals. The signals are transmitted to detect the target
or object in underwater beam form data. Once the target is
detected and beam form data is generated. The received beam
form data is up sampled and Down sampled. The adder is
used to combine the images received and stored in memory.
The generated beam form data signals from sonar are given to
CORDIC algorithm
Fig.6. Data path algorithm
The received data is sampled according to CORDIC
algorithm calculations. The Angle is measured using
CORDIC. The sin and cos angles are generated and calculated
using CORDIC algorithm. Both the IN Phase and Quad Phase
is added and given to Cordic using adder. The CORDIC
performs vector rotation and the vector data are some to
produce the array beam (B). Angles which are detected are to
be measured using CORDIC. The obtained Samples are stored
in the register.
Rotation vector is given by equation (3 and (4)
To find iterations the following equations are used
Xi+1 αi = xi – di.yi.2-i
---------------(11)
Yi+1 αi = xi + di.yi.2-I
----------------(12)
Zi+1αi=xi – di.arctan(2-i
) ----- -------(13)
start
Initialize cordic
values
Data sample
rate
Input data
No.of
Anten
Beam
Formation
Compute quad
and in phase
Beam Data
Received
Generator
underwater
Compute Beam
Data for Each
Compute Error
Beam Data
output
Bit Rate
5. International Journal of Computer Applications Technology and Research
Volume 3– Issue 12, 815 - 821, 2014, ISSN:- 2319–8656
www.ijcat.com 819
To find magnitude and phase the following equations are used
X’
=Zn. √(X2
+Y2
) ----------------(14)
Y’
=0 ----------------(15)
Ө’
=atan(x/y) ----------------(16)
Advantages and Disadvantages of CORDIC
Simple Shift-and-add Operation.(2 adders+2 shifters
vs. 4 mul.+2 adder)
It needs n iterations to obtain n-bit precision.
Slow carry-propagate addition.
Low throughput rate and area consuming shifting
operations.
The m and n are the input coordinates, p and q are pre-
computed values, ro are the rotation value ,ѱx and ѱy is the
phase shifter. By using L point DFT the sample data are
calculated by
Sm,n(l)= ∑ Sm,n(t) exp(-j*2*∏ *t*l)/L ,
t=0 to L-1 -------------------(17)
The Sm,n(l) are stored in memory with indexing parameter m
and n .The phase shift parameter ѱx and ѱy is added to the
phase term of the data Wm,n.Sm,n(l) by CORDIC which
perform as a vector rotation. The vector data is summed to
produce the array beam of B(ro,Өap,Өeq) where l is the
frequency , Өap and Өep is the time delay.
4. RESULTS & DISCUSSIONS:
4.1 Results of Direct Method Using MATLAB
Fig.7 Amplitude of Transmitted Data
Fig.7 shows the variation based on the size of the data from
the transmitter side. Fig.8 shows the phase wise changes
from -10 degree to -40 degree based on the optimized
algorithm.
Fig.8. Input Data
In Fig.8 the Phase Graph of Input Data is transmitted.
Fig.9 Amplitude of Transmitted data.
As shown in Fig 9. the amplitude variation based on the size
of the data from the transmitter side and the amplitude
variation generate from the beamforming data.
Fig.10 Output Data
As shown in fig 10 the Amplitude Response of Beamformed
Data based on Cordic Angles, output is formed..
6. International Journal of Computer Applications Technology and Research
Volume 3– Issue 12, 815 - 821, 2014, ISSN:- 2319–8656
www.ijcat.com 820
4.2. Results of Optimized Method Using
MATLAB
Fig.11. Phase Graph of Input Data
Fig.11. shows the input pulse sent from the transmitter side to
underwater to detect the target.
Fig.12.Beamformed Data.
Fig.12. shows the input data is sent in the form of samples
from the transmitter side.
Fig.13.Amplitude Response Data
Fig.13. shows the amplitude response of optimized data from
the transmitter to receiver.
Fig.14.Error In beamformed Transmitted Data
Fig.14.shows the loss of data which is less compared to direct
method.
Fig.15.Amplitude Response of Beamformed Data Based on
Cordic Angles
Fig.15. shows the amplitude response of beamformed data. At
the transmitter side , the signal is up sampled and at the
receiver side the signal is down sampled using cordic
algorithm to get accurate result.
7. International Journal of Computer Applications Technology and Research
Volume 3– Issue 12, 815 - 821, 2014, ISSN:- 2319–8656
www.ijcat.com 821
5. COMPARISON OF OPTIMIZED
METHOD AND DIRECT METHOD
Table 1. Comparison of direct method and optimized
method
Parameter
Direct
Method
Optimized
Method
Memory
reduced
Optimized
Method
Number of
Delays per
focusing
distance
107
bytes 103
bytes 59kB
Validity
range.
Does not
enlarge.
Enlarged by
4 degree in
azimuth and
elevation
angle
Enlarged by
4 degree
Computationa
l requirement
More
number of
sensors
Less number
of sensors.
Reduced by
a factor of
2.
6. CONCLUSION
This paper has illustrated that the proposed
approximation enlarges the validity region of the system’s
view scene. Under the preferred definition of steering
direction condition, the validity region is enlarged at least by
4◦ in both azimuth and elevation angles. The optimized
algorithm has the advantage of reducing the memory and
computational requirements as compared with DM
beamforming. In high-resolution sonar systems, where more
than ten thousands of beams are produced, the required
memory for parameter storage is reduced.
Digital antennas have the potential of satisfying the
requirements of many systems simultaneously. They are
flexible, and capable of handling wide bandwidths, and can
perform multiple functions. The bandwidth of the modulator
and demodulator must match the bandwidth of the signal for
efficient operation. The effects of the phase slope and
amplitude variations on the pattern of a linear array were
determined by simulations that incorporated the measured
data. The simulation showed unacceptable beam squint with
frequency.
7. REFERENCES
[1] V. Murino and A.Trucco , “Three-dimensional image
generation and processing in under acoustic vision,”
vol88,n0.12 dec 2000
[2] A.Davis and A.Lugsdin, “High speed underwater
inspection for port and harbour security using coda
Echoscope 3D sonar,” 2005,pp.2006-2011 .
[3] R.K.Hansen and P.A Andersen, “The application of real
time 3D acoustical imaging,” OCEANS1998 pp.738-741
[4] M. Palmese and A. Trucco, “Digital near field
beamforming for efficient 3-D underwater acoustic
image generation,” in Proc. IEEE Int. Workshop Imaging
Syst. Tech., 2007, pp. 1-5.
[5] M. Palmese and A. Trucco, “From 3-D sonar images to
augmented reality models for objects buried on the
seafloor,” IEEE Trans. Instrum. Meas., vol. 57, no. 4, pp.
820-828, Apr. 2008.
[6] M. Palmese, G. De Toni, and A. Trucco, “3-D
underwater acoustic imaging by an efficient frequency
domain beamforming,” in Proc. IEEE Int. Workshop
Imagining Syst. Tech., 2006, pp. 86-90.
[7] B.E. Nelson, “Configurable computing and sonar
processing-arhitecture and implementations”,
2001,pp.56-60
[8] B. L. Hutchings and B. E. Nelson, “Gigaop DSP on
FPGA”, in Proc. IEEE. Int. Conf. Acoust., Speech,
Signal Process., 2001, pp. 885-888.
[9] G. Hampson and A. Paplinski, “Phase shift
beamforming using cordic”, in Proc. Int. Symp. Signal
Process. Appl., 1996, pp. 684-687.
[10] A. Trucco, “A least-squares approximation for the
delays used in focused beamforming”, J. Acoust. Soc.
Amer., vol. 104, no. 1, pp. 171-175, Jul. 1998.
[11] J. E. Volder, “The CORDIC trigonometric computing
technique”, IRETrans. Electron. Comput., vol. EC-8, no.
3, pp. 330–334, Sep. 1959
[12] J.S.Walther, “A unified algortithm for elementary
funcations”, in proc spring joint comput 1971,pp.379-
385
[13] A. Trucco, “Enlarging the scanning region of a focused
beamforming system”, Electron. Lett., vol. 33, no. 17, pp.
1502-1504, Aug. 1997
[14] B. O. Odelowo, “A fast beamforming algorithm for
planar/volumetric arrays”, in Proc. 39th Asilomar Conf.
Signals, Syst. Comput., 2005, pp.1707-1710M.
[15] Palmese and A. Trucco, “Acoustic imaging of
underwater embedded objects: Signal simulation for
three-dimensional sonar instrumentation”, IEEE Trans.
Instrum. Meas., vol. 55, no. 4, pp. 1339–1347, Aug.
2006.
.