The Elmore delay is fast becoming ineffective for
deep submicron technologies, and reduced order transfer
function delays are impractical for use as early-phase design
metrics or as design optimization cost functions. This paper
describes an accurate approach for fitting moments of the
impulse response to probability density functions so that delay
and slew metric can be estimated accurately at an early
physical design stage. PERI (Probability distribution function
Extension for Ramp Inputs) technique has been used that
extends the delay and slew metrics for step inputs to the more
general and realistic non-step or ramp inputs. The accuracy
of the proposed model is justified by the results obtained from
the proposed model and that of SPICE simulations
Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...IRJET Journal
This document proposes an efficient broadcast authentication protocol called X-TESLA to maximize the lifetime of wireless sensor networks. X-TESLA uses two levels of key chains that cross-authenticate each other to provide extendable authentication. It addresses issues like sleep modes, network failures, idle sessions, extended lifetime needs, and denial-of-service attacks. The document describes the initialization, broadcast authentication process, cross-authentication mechanism, and flexible constructions of X-TESLA to improve network lifetime significantly compared to other approaches.
A Combined Voice Activity Detector Based On Singular Value Decomposition and ...CSCJournals
voice activity detector (VAD) is used to separate the speech data included parts from silence parts of the signal. In this paper a new VAD algorithm is represented on the basis of singular value decomposition. There are two sections to perform the feature vector extraction. In first section voiced frames are separated from unvoiced and silence frames. In second section unvoiced frames are silence frames. To perform the above sections, first, windowing the noisy signal then Hankel’s matrix is formed for each frame. The basis of statistical feature extraction of purposed system is slope of singular value curve related to each frame by using linear regression. It is shown that the slope of singular values curve per different SNRs in voiced frames is more than the other types and this property can be to achieve the goal the first part can be used. High similarity between feature vector of unvoiced and silence frame caused to approach for separation of the two categories above cannot be used. So in the second part, the frequency characteristics for identification of unvoiced frames from silent frames have been used. Simulation results show that high speed and accuracy are the advantages of the proposed system.
Reducting Power Dissipation in Fir Filter: an AnalysisCSCJournals
This document summarizes and analyzes three existing techniques for reducing power consumption in FIR filters: signed power-of-two representation, steepest descent optimization, and coefficient segmentation. It finds that steepest descent can reduce hamming distance between coefficients by up to 26%, while coefficient segmentation can achieve up to 47% reduction. However, both techniques degrade filter performance parameters slightly. Signed power-of-two representation provides the most power reduction of 63% but introduces overhead from additional adders and shifters. The document evaluates these techniques on four low-pass FIR filters and concludes there is a tradeoff between hamming distance reduction and degradation of filter specifications.
Discrete wavelet transform-based RI adaptive algorithm for system identificationIJECEIAES
In this paper, we propose a new adaptive filtering algorithm for system identifica- tion. The algorithm is based on the recursive inverse (RI) adaptive algorithm which suffers from low convergence rates in some applications; i.e., the eigenvalue spread of the autocorrelation matrix is relatively high. The proposed algorithm applies discrete-wavelet transform (DWT) to the input signal which, in turn, helps to overcome the low convergence rate of the RI algorithm with relatively small step-size(s). Different scenarios has been investigated in different noise environments in system identification setting. Experiments demonstrate the advantages of the proposed DWT recursive inverse (DWT-RI) filter in terms of convergence rate and mean-square-error (MSE) compared to the RI, discrete cosine transform LMS (DCT-LMS), discretewavelet transform LMS (DWT-LMS) and recursive-least-squares (RLS) algorithms under same conditions.
Application of smart antenna interference suppression techniques in tdscdmamarwaeng
This document discusses the application of smart antenna interference suppression techniques in TD-SCDMA systems. It first provides background on TD-SCDMA and smart antenna technology. It then describes two adaptive beamforming algorithms - LMS and RLS - and simulates their performance at interference suppression in MATLAB. The simulation results show that both algorithms can effectively form a main beam towards the desired user and nulls towards interferers. RLS converges faster than LMS, though it has higher computational complexity. The study demonstrates that smart antenna techniques can improve signal quality in TD-SCDMA systems by suppressing interference.
This document summarizes a group project on impedance matching and tuning. It discusses using transformers on transmission lines to match the signal impedance to the load impedance. It describes several methods for impedance matching - using a quarter wave transformer, L-network matching, discrete elements, single stub tuning, and double stub tuning. It provides examples of applying these different matching techniques and shows the resulting simulation plots and solutions. It also discusses the group's process for completing the project, including researching the techniques, developing the MATLAB code, and testing the results.
Low Power Clock Distribution Schemes in VLSI DesignIJERA Editor
This paper reviewed the comparison between different clock distribution schemes which used for low power
VLSI design which are the most important aspect in the industry. The main clock distribution schemes are
single driver clock scheme and distributed buffers clock scheme. There are different tradeoffs in both the
techniques such as size of buffers, number of buffers etc.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...IRJET Journal
This document proposes an efficient broadcast authentication protocol called X-TESLA to maximize the lifetime of wireless sensor networks. X-TESLA uses two levels of key chains that cross-authenticate each other to provide extendable authentication. It addresses issues like sleep modes, network failures, idle sessions, extended lifetime needs, and denial-of-service attacks. The document describes the initialization, broadcast authentication process, cross-authentication mechanism, and flexible constructions of X-TESLA to improve network lifetime significantly compared to other approaches.
A Combined Voice Activity Detector Based On Singular Value Decomposition and ...CSCJournals
voice activity detector (VAD) is used to separate the speech data included parts from silence parts of the signal. In this paper a new VAD algorithm is represented on the basis of singular value decomposition. There are two sections to perform the feature vector extraction. In first section voiced frames are separated from unvoiced and silence frames. In second section unvoiced frames are silence frames. To perform the above sections, first, windowing the noisy signal then Hankel’s matrix is formed for each frame. The basis of statistical feature extraction of purposed system is slope of singular value curve related to each frame by using linear regression. It is shown that the slope of singular values curve per different SNRs in voiced frames is more than the other types and this property can be to achieve the goal the first part can be used. High similarity between feature vector of unvoiced and silence frame caused to approach for separation of the two categories above cannot be used. So in the second part, the frequency characteristics for identification of unvoiced frames from silent frames have been used. Simulation results show that high speed and accuracy are the advantages of the proposed system.
Reducting Power Dissipation in Fir Filter: an AnalysisCSCJournals
This document summarizes and analyzes three existing techniques for reducing power consumption in FIR filters: signed power-of-two representation, steepest descent optimization, and coefficient segmentation. It finds that steepest descent can reduce hamming distance between coefficients by up to 26%, while coefficient segmentation can achieve up to 47% reduction. However, both techniques degrade filter performance parameters slightly. Signed power-of-two representation provides the most power reduction of 63% but introduces overhead from additional adders and shifters. The document evaluates these techniques on four low-pass FIR filters and concludes there is a tradeoff between hamming distance reduction and degradation of filter specifications.
Discrete wavelet transform-based RI adaptive algorithm for system identificationIJECEIAES
In this paper, we propose a new adaptive filtering algorithm for system identifica- tion. The algorithm is based on the recursive inverse (RI) adaptive algorithm which suffers from low convergence rates in some applications; i.e., the eigenvalue spread of the autocorrelation matrix is relatively high. The proposed algorithm applies discrete-wavelet transform (DWT) to the input signal which, in turn, helps to overcome the low convergence rate of the RI algorithm with relatively small step-size(s). Different scenarios has been investigated in different noise environments in system identification setting. Experiments demonstrate the advantages of the proposed DWT recursive inverse (DWT-RI) filter in terms of convergence rate and mean-square-error (MSE) compared to the RI, discrete cosine transform LMS (DCT-LMS), discretewavelet transform LMS (DWT-LMS) and recursive-least-squares (RLS) algorithms under same conditions.
Application of smart antenna interference suppression techniques in tdscdmamarwaeng
This document discusses the application of smart antenna interference suppression techniques in TD-SCDMA systems. It first provides background on TD-SCDMA and smart antenna technology. It then describes two adaptive beamforming algorithms - LMS and RLS - and simulates their performance at interference suppression in MATLAB. The simulation results show that both algorithms can effectively form a main beam towards the desired user and nulls towards interferers. RLS converges faster than LMS, though it has higher computational complexity. The study demonstrates that smart antenna techniques can improve signal quality in TD-SCDMA systems by suppressing interference.
This document summarizes a group project on impedance matching and tuning. It discusses using transformers on transmission lines to match the signal impedance to the load impedance. It describes several methods for impedance matching - using a quarter wave transformer, L-network matching, discrete elements, single stub tuning, and double stub tuning. It provides examples of applying these different matching techniques and shows the resulting simulation plots and solutions. It also discusses the group's process for completing the project, including researching the techniques, developing the MATLAB code, and testing the results.
Low Power Clock Distribution Schemes in VLSI DesignIJERA Editor
This paper reviewed the comparison between different clock distribution schemes which used for low power
VLSI design which are the most important aspect in the industry. The main clock distribution schemes are
single driver clock scheme and distributed buffers clock scheme. There are different tradeoffs in both the
techniques such as size of buffers, number of buffers etc.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document summarizes a project investigating linear multiuser detection in CDMA systems. It presents the conventional matched filter approach for demodulating mutually interfering signals, which treats multiple access interference as additive white Gaussian noise. This leads to poor performance as the number of users increases because it ignores the correlative structure of the interference. The document then discusses the limitations of the matched filter approach, particularly its sensitivity to the near-far problem which can cause a bit error probability greater than 1/2 in some scenarios. Overall, the document introduces the matched filter detector as the starting point and motivation for developing improved linear multiuser detection techniques.
This document provides an overview and outline of a training course for using the PRESTO 3.2 signal integrity simulation software. It introduces important concepts in PRESTO such as design components, nets, crossections, signal parameters, transmission line types, reflections, crosstalk, simultaneous switching noise, and electrical and physical models. The outline lists topics that will be covered in the training including CAD data extraction, the PRESTO input file format, library setup, simulation, results analysis, and modeling techniques like crosstalk, noise, and electromagnetic interference simulations.
Analysis of Microstrip Finger on Bandwidth of Interdigital Band Pass Filter u...IJREST
This document discusses using artificial neural networks to estimate the bandwidth of an interdigital band pass filter based on variations in the finger length. An ANN model was developed using data from electromagnetic simulations of filters with finger lengths ranging from 34mm to 24mm. Both multi-layer perceptron and radial basis function networks were tested, with the RBF network providing more accurate results with a mean squared error of 1.13173e-005. The proposed ANN approach allows estimating the filter bandwidth without complex calculations and provides a fast design method for interdigital band pass filters.
IRJET- Chord Classification of an Audio Signal using Artificial Neural NetworkIRJET Journal
This document presents a method for classifying chords in an audio signal using an artificial neural network. It extracts Chroma DCT-Reduced Log Pitch (CRP) features from a dataset of 2,000 recordings of 10 guitar chords. These CRP features are used to train a two-layer feedforward neural network with scaled conjugate gradient backpropagation. The trained network is able to classify chords in the input audio with an overall accuracy of 89.3%. The method demonstrates effective chord classification using a machine learning approach with chroma-based audio features.
Algorithm and vlsi architecture design of proportionate type lms adaptive fil...Nxfee Innovation
Proportionate-type normalized LMS (Pt-NLMS) family of adaptive filtering algorithms for sparse system identification pose significant implementation challenges due to their high computational complexity especially for real-time applications like network echo cancelation. In this paper, we make the first attempt to implement Pt-NLMS algorithms in hardware. Several reformulations are proposed to simplify the original Pt-NLMS algorithms, thereby making them amenable to real time VLSI implementations and the reformulated algorithms referred as delayed µ-law proportionate LMS (DMPLMS) algorithm for white input and delayed wavelet MPLMS (DWMPLMS) for colored input are then implemented in hardware. Simulation studies demonstrate that the performance loss is very small for the proposed reformulations. We implemented the proposed designs considering 16-bit fixed point representation in hardware, and synthesis results show that the DMPLMS architecture with ≈30% increase in hardware over the state-of-the-art conventional delayed LMS architecture achieves 3× improvement in convergence rate for white input and the DWMPLMS architecture with ≈70% increase in hardware achieves 10× improvement in convergence rate for correlated input conditions.
Performance of MMSE Denoise Signal Using LS-MMSE TechniqueIJMER
This paper presents performance of mmse denoises signal using consistent cycle spinning (ccs) and least square (LS) techniques. In the past decade, TV denoise technique is used to reduced the noisy signal. The main drawback is the low quality signal and high MMSE signal. Presently, we
proposed the CCS-MMSE and LS-MMSE technique .The CCS-MMSE technique consists of two steps. They are wavelet based denoise and consistent cycle spinning. The wavelet denoise is powerful decorrelating effect on many signal domains. The consistent cycle spinning is used to estimation the
MMSE in the signal domain. The LS-MMSE is better estimation of MMSE signal domain compare to
CCS-MMSE.The experimental result shows the average MMSE reduction using various techniques.
Dynamic Texture Coding using Modified Haar Wavelet with CUDAIJERA Editor
Texture is an image having repetition of patterns. There are two types, static and dynamic texture. Static texture is an image having repetitions of patterns in the spatial domain. Dynamic texture is number of frames having repetitions in spatial and temporal domain. This paper introduces a novel method for dynamic texture coding to achieve higher compression ratio of dynamic texture using 2D-modified Haar wavelet transform. The dynamic texture video contains high redundant parts in spatial and temporal domain. Redundant parts can be removed to achieve high compression ratios with better visual quality. The modified Haar wavelet is used to exploit spatial and temporal correlations amongst the pixels. The YCbCr color model is used to exploit chromatic components as HVS is less sensitive to chrominance. To decrease the time complexity of algorithm parallel programming is done using CUDA (Compute Unified Device Architecture). GPU contains the number of cores as compared to CPU, which is utilized to reduce the time complexity of algorithms.
This document presents a sphere decoding algorithm for MIMO wireless systems. It begins with an abstract that introduces MIMO and sphere decoding. It then provides background on various receiver algorithms used for MIMO, including zero forcing, minimum mean square error, and maximum likelihood receivers. The key aspects of sphere decoding are discussed, including setting the initial radius and reducing the radius. A proposed sphere decoding method is presented that aims to find the transmitted signal vector with minimum complexity. Simulation results show that sphere decoding achieves near maximum likelihood performance while reducing complexity compared to other decoders.
This document describes the design and simulation of a parallel-coupled microstrip bandpass filter using space mapping techniques. The filter structure consists of a conductor on top of a dielectric substrate backed by a ground plane. An electromagnetic simulator is used to simulate the fine model, while a fast approximate model is used for optimization. Space mapping establishes a relationship between the two models to optimize the design while maintaining accuracy. The proposed 9-10 GHz bandpass filter was designed and simulated using ADS, demonstrating good compactness and low insertion loss.
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...IJNSA Journal
This paper proposes a new blind adaptive channel shortening approach for multi-carrier systems. The
performance of the discrete Fourier transform-DMT (DFT-DMT) system is investigated with the proposed
DST-DMT system over the standard carrier serving area (CSA) loop1. Enhanced bit rates demonstrated
and less complexity also involved by the simulation of the DST-DMT system.
Realization of ternary logic based shift up, shift down using mosfet-2IAEME Publication
This document discusses the design and simulation of ternary logic shift up and shift down gates using MOSFETs. It begins with background on ternary logic and its advantages over binary. It then describes the design of limiting circuits for the shift up and shift down gates using transistors. The limiting circuits are combined with inverter circuits to realize the full gates. Simulation results on LTSpice are provided showing the gates operate as expected by their truth tables. Potential applications of these new ternary logic gates include developing adders, subtractors, and other circuits, as well as realizing other unknown ternary gate designs.
This document discusses using multi-output modeling with support vector machines (MOM-SVM) to model an analog circuit. Specifically, it models a voltage controlled oscillator (VCO) circuit designed in Cadence using 45nm technology. The inputs are the transistor widths and the outputs are frequency and phase noise.
Traditional single-output SVM modeling is unable to properly model circuits with correlated outputs. The paper proposes using MOM-SVM to model the multiple outputs simultaneously. It formulates the MOM-SVM algorithm and objective function. Simulation results show MOM-SVM has higher accuracy, especially for phase noise, and shorter total training/testing time compared to individual SVM models. This makes MOM-SVM well-su
DIGITAL WAVE FORMULATION OF THE PEEC METHODPiero Belforte
This document presents a digital wave formulation (DWF) method for solving the quasi-static partial element equivalent circuit (PEEC) method in the time domain. The standard PEEC model is transformed into a wave digital network by using wave variables and defining wave digital circuit elements corresponding to inductors, capacitors, resistors, sources, and connections. This allows the PEEC model to be solved as a wave digital network using a digital wave simulator (DWS). A numerical example compares the proposed DWF-PEEC solver to a standard SPICE solver, showing the DWF-PEEC method provides accurate results with significant speed-up in computation time.
A Threshold Enhancement Technique for Chaotic On-Off Keying SchemeCSCJournals
In this paper, an improvement for Chaotic ON-OFF (COOK) Keying scheme is proposed. The scheme enhances Bit Error Rate (BER) performance of standard COOK by keeping the signal elements at fixed distance from the threshold irrespective of noise power. Each transmitted chaotic segment is added to its flipped version before transmission. This reduces the effect of noise contribution at correlator of the receiver. The proposed system is tested in Additive White Gaussian Noise (AWGN) channel and compared with the standard COOK under different Eb/No levels. A theoretical estimate of BER is derived and compared with the simulation results. Effect of spreading factor increment in the proposed system is studied. Results show that the proposed scheme has a considerable advantage over the standard COOK at similar average bit energy and with higher values of spreading factors.
This summary provides the key details from the document in 3 sentences:
The document proposes a new method for encrypting two images into a single encrypted image using generalized weighted fractional Fourier transform (GWFRFT) with double random phase encoding. The encryption process involves applying pixel scrambling, phase encoding, and two rounds of GWFRFT with random phase masks on the combined image signal. This technique is shown to provide comparable security to the Advanced Encryption Standard (AES) with a 232-bit key size through a high number of possible permutations in the GWFRFT parameters and orders.
Simulink based design simulations of band pass fir filtereSAT Journals
Abstract In this paper, window function method is used to design digital filters. The Band Pass filter has been design with help of Simulink in MATLAB, which have better characteristics of devising filter in fast and effective way. The band pass filter has been design and simulated using Kaiser window technique. This model is established by using Simulink in MATLAB and the filtered waveforms are observed by spectrum scope to analyze the performance of the filter. Keywords: FIR, window function method, Kaiser, Simulink, MATLAB.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
BER Performance of Antenna Array-Based Receiver using Multi-user Detection in...ijwmn
1) The document proposes a novel approach to evaluate the average probability of error for a DS-CDMA system using an antenna array receiver. It approximates the angular gain function of the spatial filter as a fixed beamwidth function to partition interferers into in-beam and out-beam groups.
2) It derives an accurate formula for the average bit error rate over Nakagami fading channels. The analysis considers asynchronous transmission and adapts Gaussian approximations to account for noise and multi-user interference after beamforming.
3) Simulation results are provided to validate the research for single antenna systems and show that the proposed model confirms the benefits of adaptive antennas in reducing interference and provides a good approximation of error probability.
Detection of Transmission Line Faults by Wavelet Based Transient ExtractionIDES Editor
This paper proposes a novel technique to detect faults in transmission lines using wavelet transform. Three-phase currents are monitored at both ends of the transmission line using GPS synchronization. Wavelet transform is used to extract transients from the current signals, which are indicative of faults. A fault index is calculated based on the detail coefficients of the wavelet transform and compared to a threshold value to detect faults. Simulation results demonstrate the technique can detect various faults at different locations and inception angles on the transmission line.
A clustering protocol using multiple chainambitlick
This document proposes two schemes for clustering protocols based on chain routing in wireless sensor networks. It then describes in detail the Chain Routing Based on Coordinates-oriented Clustering Strategy (CRBCC) protocol. CRBCC forms balanced clusters based on node coordinates, constructs intra-cluster chains using simulated annealing, elects chain leaders, and then constructs an inter-cluster chain among leaders also using simulated annealing. Simulation results show CRBCC performs better than PEGASIS in terms of energy efficiency and network delay.
Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...IRJET Journal
This document discusses efficient broadcast authentication to maximize the lifetime of wireless sensor networks. It proposes using a greedy heuristics algorithm with the X-TESLA broadcast authentication protocol. X-TESLA uses short key chains to authenticate broadcast messages but has limitations regarding sleep modes, network failures, idle sessions, extended lifetime, and denial-of-service attacks. The proposed approach combines X-TESLA with greedy heuristics to address these issues and significantly improve network lifetime compared to using each approach alone. It aims to find a broadcast tree that maximizes the minimum residual energy of nodes after broadcasting to prolong the ability of the network to complete future broadcasts.
This document summarizes a project investigating linear multiuser detection in CDMA systems. It presents the conventional matched filter approach for demodulating mutually interfering signals, which treats multiple access interference as additive white Gaussian noise. This leads to poor performance as the number of users increases because it ignores the correlative structure of the interference. The document then discusses the limitations of the matched filter approach, particularly its sensitivity to the near-far problem which can cause a bit error probability greater than 1/2 in some scenarios. Overall, the document introduces the matched filter detector as the starting point and motivation for developing improved linear multiuser detection techniques.
This document provides an overview and outline of a training course for using the PRESTO 3.2 signal integrity simulation software. It introduces important concepts in PRESTO such as design components, nets, crossections, signal parameters, transmission line types, reflections, crosstalk, simultaneous switching noise, and electrical and physical models. The outline lists topics that will be covered in the training including CAD data extraction, the PRESTO input file format, library setup, simulation, results analysis, and modeling techniques like crosstalk, noise, and electromagnetic interference simulations.
Analysis of Microstrip Finger on Bandwidth of Interdigital Band Pass Filter u...IJREST
This document discusses using artificial neural networks to estimate the bandwidth of an interdigital band pass filter based on variations in the finger length. An ANN model was developed using data from electromagnetic simulations of filters with finger lengths ranging from 34mm to 24mm. Both multi-layer perceptron and radial basis function networks were tested, with the RBF network providing more accurate results with a mean squared error of 1.13173e-005. The proposed ANN approach allows estimating the filter bandwidth without complex calculations and provides a fast design method for interdigital band pass filters.
IRJET- Chord Classification of an Audio Signal using Artificial Neural NetworkIRJET Journal
This document presents a method for classifying chords in an audio signal using an artificial neural network. It extracts Chroma DCT-Reduced Log Pitch (CRP) features from a dataset of 2,000 recordings of 10 guitar chords. These CRP features are used to train a two-layer feedforward neural network with scaled conjugate gradient backpropagation. The trained network is able to classify chords in the input audio with an overall accuracy of 89.3%. The method demonstrates effective chord classification using a machine learning approach with chroma-based audio features.
Algorithm and vlsi architecture design of proportionate type lms adaptive fil...Nxfee Innovation
Proportionate-type normalized LMS (Pt-NLMS) family of adaptive filtering algorithms for sparse system identification pose significant implementation challenges due to their high computational complexity especially for real-time applications like network echo cancelation. In this paper, we make the first attempt to implement Pt-NLMS algorithms in hardware. Several reformulations are proposed to simplify the original Pt-NLMS algorithms, thereby making them amenable to real time VLSI implementations and the reformulated algorithms referred as delayed µ-law proportionate LMS (DMPLMS) algorithm for white input and delayed wavelet MPLMS (DWMPLMS) for colored input are then implemented in hardware. Simulation studies demonstrate that the performance loss is very small for the proposed reformulations. We implemented the proposed designs considering 16-bit fixed point representation in hardware, and synthesis results show that the DMPLMS architecture with ≈30% increase in hardware over the state-of-the-art conventional delayed LMS architecture achieves 3× improvement in convergence rate for white input and the DWMPLMS architecture with ≈70% increase in hardware achieves 10× improvement in convergence rate for correlated input conditions.
Performance of MMSE Denoise Signal Using LS-MMSE TechniqueIJMER
This paper presents performance of mmse denoises signal using consistent cycle spinning (ccs) and least square (LS) techniques. In the past decade, TV denoise technique is used to reduced the noisy signal. The main drawback is the low quality signal and high MMSE signal. Presently, we
proposed the CCS-MMSE and LS-MMSE technique .The CCS-MMSE technique consists of two steps. They are wavelet based denoise and consistent cycle spinning. The wavelet denoise is powerful decorrelating effect on many signal domains. The consistent cycle spinning is used to estimation the
MMSE in the signal domain. The LS-MMSE is better estimation of MMSE signal domain compare to
CCS-MMSE.The experimental result shows the average MMSE reduction using various techniques.
Dynamic Texture Coding using Modified Haar Wavelet with CUDAIJERA Editor
Texture is an image having repetition of patterns. There are two types, static and dynamic texture. Static texture is an image having repetitions of patterns in the spatial domain. Dynamic texture is number of frames having repetitions in spatial and temporal domain. This paper introduces a novel method for dynamic texture coding to achieve higher compression ratio of dynamic texture using 2D-modified Haar wavelet transform. The dynamic texture video contains high redundant parts in spatial and temporal domain. Redundant parts can be removed to achieve high compression ratios with better visual quality. The modified Haar wavelet is used to exploit spatial and temporal correlations amongst the pixels. The YCbCr color model is used to exploit chromatic components as HVS is less sensitive to chrominance. To decrease the time complexity of algorithm parallel programming is done using CUDA (Compute Unified Device Architecture). GPU contains the number of cores as compared to CPU, which is utilized to reduce the time complexity of algorithms.
This document presents a sphere decoding algorithm for MIMO wireless systems. It begins with an abstract that introduces MIMO and sphere decoding. It then provides background on various receiver algorithms used for MIMO, including zero forcing, minimum mean square error, and maximum likelihood receivers. The key aspects of sphere decoding are discussed, including setting the initial radius and reducing the radius. A proposed sphere decoding method is presented that aims to find the transmitted signal vector with minimum complexity. Simulation results show that sphere decoding achieves near maximum likelihood performance while reducing complexity compared to other decoders.
This document describes the design and simulation of a parallel-coupled microstrip bandpass filter using space mapping techniques. The filter structure consists of a conductor on top of a dielectric substrate backed by a ground plane. An electromagnetic simulator is used to simulate the fine model, while a fast approximate model is used for optimization. Space mapping establishes a relationship between the two models to optimize the design while maintaining accuracy. The proposed 9-10 GHz bandpass filter was designed and simulated using ADS, demonstrating good compactness and low insertion loss.
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...IJNSA Journal
This paper proposes a new blind adaptive channel shortening approach for multi-carrier systems. The
performance of the discrete Fourier transform-DMT (DFT-DMT) system is investigated with the proposed
DST-DMT system over the standard carrier serving area (CSA) loop1. Enhanced bit rates demonstrated
and less complexity also involved by the simulation of the DST-DMT system.
Realization of ternary logic based shift up, shift down using mosfet-2IAEME Publication
This document discusses the design and simulation of ternary logic shift up and shift down gates using MOSFETs. It begins with background on ternary logic and its advantages over binary. It then describes the design of limiting circuits for the shift up and shift down gates using transistors. The limiting circuits are combined with inverter circuits to realize the full gates. Simulation results on LTSpice are provided showing the gates operate as expected by their truth tables. Potential applications of these new ternary logic gates include developing adders, subtractors, and other circuits, as well as realizing other unknown ternary gate designs.
This document discusses using multi-output modeling with support vector machines (MOM-SVM) to model an analog circuit. Specifically, it models a voltage controlled oscillator (VCO) circuit designed in Cadence using 45nm technology. The inputs are the transistor widths and the outputs are frequency and phase noise.
Traditional single-output SVM modeling is unable to properly model circuits with correlated outputs. The paper proposes using MOM-SVM to model the multiple outputs simultaneously. It formulates the MOM-SVM algorithm and objective function. Simulation results show MOM-SVM has higher accuracy, especially for phase noise, and shorter total training/testing time compared to individual SVM models. This makes MOM-SVM well-su
DIGITAL WAVE FORMULATION OF THE PEEC METHODPiero Belforte
This document presents a digital wave formulation (DWF) method for solving the quasi-static partial element equivalent circuit (PEEC) method in the time domain. The standard PEEC model is transformed into a wave digital network by using wave variables and defining wave digital circuit elements corresponding to inductors, capacitors, resistors, sources, and connections. This allows the PEEC model to be solved as a wave digital network using a digital wave simulator (DWS). A numerical example compares the proposed DWF-PEEC solver to a standard SPICE solver, showing the DWF-PEEC method provides accurate results with significant speed-up in computation time.
A Threshold Enhancement Technique for Chaotic On-Off Keying SchemeCSCJournals
In this paper, an improvement for Chaotic ON-OFF (COOK) Keying scheme is proposed. The scheme enhances Bit Error Rate (BER) performance of standard COOK by keeping the signal elements at fixed distance from the threshold irrespective of noise power. Each transmitted chaotic segment is added to its flipped version before transmission. This reduces the effect of noise contribution at correlator of the receiver. The proposed system is tested in Additive White Gaussian Noise (AWGN) channel and compared with the standard COOK under different Eb/No levels. A theoretical estimate of BER is derived and compared with the simulation results. Effect of spreading factor increment in the proposed system is studied. Results show that the proposed scheme has a considerable advantage over the standard COOK at similar average bit energy and with higher values of spreading factors.
This summary provides the key details from the document in 3 sentences:
The document proposes a new method for encrypting two images into a single encrypted image using generalized weighted fractional Fourier transform (GWFRFT) with double random phase encoding. The encryption process involves applying pixel scrambling, phase encoding, and two rounds of GWFRFT with random phase masks on the combined image signal. This technique is shown to provide comparable security to the Advanced Encryption Standard (AES) with a 232-bit key size through a high number of possible permutations in the GWFRFT parameters and orders.
Simulink based design simulations of band pass fir filtereSAT Journals
Abstract In this paper, window function method is used to design digital filters. The Band Pass filter has been design with help of Simulink in MATLAB, which have better characteristics of devising filter in fast and effective way. The band pass filter has been design and simulated using Kaiser window technique. This model is established by using Simulink in MATLAB and the filtered waveforms are observed by spectrum scope to analyze the performance of the filter. Keywords: FIR, window function method, Kaiser, Simulink, MATLAB.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
BER Performance of Antenna Array-Based Receiver using Multi-user Detection in...ijwmn
1) The document proposes a novel approach to evaluate the average probability of error for a DS-CDMA system using an antenna array receiver. It approximates the angular gain function of the spatial filter as a fixed beamwidth function to partition interferers into in-beam and out-beam groups.
2) It derives an accurate formula for the average bit error rate over Nakagami fading channels. The analysis considers asynchronous transmission and adapts Gaussian approximations to account for noise and multi-user interference after beamforming.
3) Simulation results are provided to validate the research for single antenna systems and show that the proposed model confirms the benefits of adaptive antennas in reducing interference and provides a good approximation of error probability.
Detection of Transmission Line Faults by Wavelet Based Transient ExtractionIDES Editor
This paper proposes a novel technique to detect faults in transmission lines using wavelet transform. Three-phase currents are monitored at both ends of the transmission line using GPS synchronization. Wavelet transform is used to extract transients from the current signals, which are indicative of faults. A fault index is calculated based on the detail coefficients of the wavelet transform and compared to a threshold value to detect faults. Simulation results demonstrate the technique can detect various faults at different locations and inception angles on the transmission line.
A clustering protocol using multiple chainambitlick
This document proposes two schemes for clustering protocols based on chain routing in wireless sensor networks. It then describes in detail the Chain Routing Based on Coordinates-oriented Clustering Strategy (CRBCC) protocol. CRBCC forms balanced clusters based on node coordinates, constructs intra-cluster chains using simulated annealing, elects chain leaders, and then constructs an inter-cluster chain among leaders also using simulated annealing. Simulation results show CRBCC performs better than PEGASIS in terms of energy efficiency and network delay.
Efficient Broadcast Authentication with Highest Life Span in Wireless Sensor ...IRJET Journal
This document discusses efficient broadcast authentication to maximize the lifetime of wireless sensor networks. It proposes using a greedy heuristics algorithm with the X-TESLA broadcast authentication protocol. X-TESLA uses short key chains to authenticate broadcast messages but has limitations regarding sleep modes, network failures, idle sessions, extended lifetime, and denial-of-service attacks. The proposed approach combines X-TESLA with greedy heuristics to address these issues and significantly improve network lifetime compared to using each approach alone. It aims to find a broadcast tree that maximizes the minimum residual energy of nodes after broadcasting to prolong the ability of the network to complete future broadcasts.
HEATED WIND PARTICLE’S BEHAVIOURAL STUDY BY THE CONTINUOUS WAVELET TRANSFORM ...cscpconf
Nowadays Continuous Wavelet Transform (CWT) as well as Fractal analysis is generally used for the Signal and Image processing application purpose. Our current work extends the field of application in case of CWT as well as Fractal analysis by applying it in case of the agitated wind particle’s behavioral study. In this current work in case of the agitated wind particle, we have mathematically showed that the wind particle’s movement exhibits the “Uncorrelated” characteristics during the convectional flow of it. It is also demonstrated here by the Continuous Wavelet Transform (CWT) as well as the Fractal analysis with matlab 7.12 version
This document describes two techniques for designing optical XNOR and NAND logic gates. The first technique uses a 2D array of coupled optical cavities with Kerr nonlinearity. Discrete cavity solitons are numerically simulated and used to demonstrate optical XNOR and NAND gates by controlling soliton interactions with a Gaussian beam. The second technique uses multi-mode interference waveguides to convert the phase of binary-phase-shift keying input signals to amplitude at the output, implementing optical XNOR and NAND logic. Numerical simulations using the finite element method show contrast ratios of 21.5 dB for the XNOR gate and 22.3 dB for the NAND gate.
Modelling of Crosstalk and Delay for Distributed RLCG On-Chip Interconnects F...IDES Editor
In order to accurately model high frequency affects,
inductance has been taken into consideration. No longer can
interconnects be treated as mere delays or lumped RC networks.
In that frequency range, the most accurate simulation model for
on-chip VLSI interconnects is the distributed RLC model.
Unfortunately, this model has many limitations at much higher
of operating frequency used in today’s VLSI design. The reduction
in cross-sectional dimension leads to more tightly couple
interconnects and therefore, a higher probability of unwanted
crosstalk interference. This can lead to inaccurate simulations
if not modelled properly. At even higher frequency, the aggressor
net carries a signal that couples to the victim net through the
parasitic capacitances. To determine the effects that this crosstalk
will have on circuit operation, the resulting delays and logic
levels for the victim nets must be computed. This paper proposes
a difference model approach to derive crosstalk and delay in the
transform domain. A closed form solution for crosstalk and delay
is obtained by incorporating initial conditions using difference
model approach for distributed RLCG interconnects. The
simulation is performed in 0.18μm technology node and an error
of less than 1% has been achieved with the proposed model when
compared with SPICE.
Magnetic hysteresis of soft magnetic material under an applied continuous ext...IAEME Publication
1) The document describes research on modeling the magnetic hysteresis of soft magnetic materials under an applied continuous external magnetic field.
2) Experimental measurements were performed on non-oriented FeSi 3% sheets using an Epstein frame under a damped sinusoidal flux density superimposed with a DC bias field. This led to asymmetrical hysteresis loops.
3) The hysteresis loops were modeled using the Preisach model, which provides a mathematical model for the B(H) curve. The Preisach distribution was approximated using a modified Lorentzian function to better fit experimental loops.
Magnetic hysteresis of soft magnetic material under an applied continuous ext...IAEME Publication
1. The document discusses modeling the hysteresis loops of soft magnetic materials like FeSi 3% that are subjected to an external magnetic field with both alternating current (AC) and direct current (DC) components.
2. It presents an approach using the Preisach model to predict asymmetric hysteresis loops under such combined fields. The Preisach model represents the magnetic state of each point in the material using elementary hysteresis operators.
3. A modified Lorentz distribution function is used to approximate the Preisach density function, allowing the model to account for parameters like coercivity and remanence that depend on the material and change with frequency.
Analytical Delay Model for Distributed On-Chip RLCG Global Interconnects for ...IDES Editor
Fast delay estimation methods, as compared to
simulation techniques, are needed for incremental
performance-driven layout synthesis. On-chip inductive and
conductive effects are becoming predominant in deep
submicron (DSM) interconnects due to increasing clock
speeds; circuit complexity and interconnect lengths.
Inductance causes noise in the signal waveforms, which can
adversely affect the performance of the circuit and signal
integrity. Elmore delay-based estimation methods, although
efficient, fails to accurately estimate the delay for RLCG
interconnect lines. This paper presents an analytical delay
model, based on first and second moments of RLCG
interconnection lines, that considers the effect of inductance
and conductance for the estimation of delay in interconnection
lines. Simulation results justify the efficacy of the proposed
delay modelling approach.
A Novel Optimal Control Design for Reducing of Time Delay Effects in Teleoper...IDES Editor
The purpose of designing a controller for a
teleoperation system is achieving stability and high efficiency
in presence of factors such as time delay, noise, system
disturbance and modeling errors. In this article seven new
schemes for teleoperation systems is suggested to reduce the
error of tracking between the master and the slave systems. In
the first and second structures, optimal control is applied to the
master and in the third structure it is applied to the slave. In
the forth structure, optimal controller has been designed in
both the master and slave subsystems and by a suitable
combination of the output signals of both controllers and
exerting it to slave, it has been tried to create the best
performance with regard to tracking. In the 5th structure,
optimal controller is applied to both the master and slave
systems and the output of each controller is then applied to it’s
own system. In the structures 6 and 7, using optimal control
and wave transformation, it has been tried to reduce the
tracking error between the master and the slave systems which
is considered as the cost function in this article. In these two
structures, optimal controller guarantees the efficiency of the
system and wave variables method has been used to guarantee
the stability of the system for constant time delay. In this
method, the appropriate selection of weighting factors of cost
function and wave impedance plays a decisive role in the
improvement of system performance and reduction of tracking
error between the master and the slave.
IRJET- Performance Improvement for Distance Relay based Fuzzy Logic for All P...IRJET Journal
1) The document describes a study that uses an adaptive neuro-fuzzy inference system (ANFIS) algorithm to design a three-phase distance relay with fuzzy logic for fault detection and classification in overhead transmission lines.
2) The ANFIS generates a fuzzy system with two parts - the first detects faults by measuring voltage and current to calculate impedance, while the second determines fault location and type based on peak current values.
3) Simulation results showed the fuzzy logic distance relay successfully distinguished faults from disturbances, determined protection zones, and identified fault locations and types using data from a model of a 400kV transmission line in MATLAB/Simulink.
Design and Analysis of Power and Variability Aware Digital Summing CircuitIDES Editor
This document analyzes and compares different 1-bit digital summing circuit topologies in terms of their robustness against process, voltage, and temperature variations at the 22nm technology node. It finds that the transmission gate-based topology is the most robust, with the tightest spread in propagation delay, power dissipation, and energy-delay product. It then proposes a transmission gate-based digital summing circuit implemented using carbon nanotube field-effect transistors, which offers even greater robustness against PVT variations compared to an implementation using traditional MOSFETs.
A Review: Compensation of Mismatches in Time Interleaved Analog to Digital Co...IJERA Editor
The execution of today's correspondence frameworks is exceedingly subject to the utilized Analog-to-Digital converters (ADCs), and with a specific end goal to give more flexibility and exactness to the developing correspondence innovations, superior-ADCs are needed. In this respect, the time-interleaved operation of an exhibit of ADCs (TI-ADC) might be a sensible result. A TI-ADC can build its throughput by utilizing M channel ADCs or sub converters in parallel and examining the data motion in a period-interleaved way. In any case, the execution of a TI-ADC gravely suffers from the bungles around the channel ADCs. In this paper we survey the advancement in the configuration of low-intricacy advanced remedy structures and calculations for time-interleaved ADCs in the course of the most recent five years. We devise a discrete-time model, state the outline issue, and finally infer the calculations and structures. Specifically, we examine proficient calculations to outline time-differing remedy filters and additionally iterative structures using polynomial based filters. Thusly, the remuneration structure may be utilized to repay time-differing recurrence reaction befuddles in time-interleaved ADCs, and in addition to remake uniform examples from nonuniformly tested indicators. We examine the recompense structure, research its execution, and exhibit requisition zones of the structure through various illustrations. At long last, we give a standpoint to future examination questions.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Numerical disperison analysis of sympletic and adi schemexingangahu
This document discusses numerical dispersion analysis of symplectic and alternating direction implicit (ADI) schemes for computational electromagnetic simulation. It presents Maxwell's equations as a Hamiltonian system that can be written as symplectic or ADI schemes by approximating the time evolution operator. Three high order spatial difference approximations - high order staggered difference, compact finite difference, and scaling function approximations - are analyzed to reduce numerical dispersion when combined with the symplectic and ADI schemes. The document derives unified dispersion relationships for the symplectic and ADI schemes with different spatial difference approximations, which can be used as a reference for simulating large scale electromagnetic problems.
EFFECT OF EQUAL AND MISMATCHED SIGNAL TRANSITION TIME ON POWER DISSIPATION IN...VLSICS Design
High density chips have introduced problems like crosstalk noise and power dissipation. The mismatching in transition time of the inputs occurs because different lengths of interconnects lead to different parasitic values. This paper presents the analysis of the effect of equal and unequal (mismatched) transition time of inputs on power dissipation in coupled interconnects. Further, the effect of signal skew on transition time is analysed. To demonstrate the effects, a model of two distributed RLC lines coupled capacitively and inductively is taken into consideration. Each interconnect line is 4mm long and terminated by capacitive load of 30fF. The analysis is carried out for simultaneously switching lines. The results are obtained through SPICE simulations and waveforms are generated.
An approach to Measure Transition Density of Binary Sequences for X-filling b...IJECEIAES
Switching activity and Transition density computation is an essential stage for dynamic power estimation and testing time reduction. The study of switching activity, transition densities and weighted switching activities of pseudo random binary sequences generated by Linear Feedback shift registers and Feed Forward shift registers plays a crucial role in design approaches of Built-In Self Test, cryptosystems, secure scan designs and other applications. This paper proposed an approach to find transition densities, which plays an important role in choosing of test pattern generator We have analyze conventional and proposed designs using our approache, This work also describes the testing time of benchmark circuits. The outcome of this paper is presented in the form of algorithm, theorems with proofs and analyses table which strongly support the same. The proposed algorithm reduces switching activity and testing time up to 51.56% and 84.61% respectively.
Characterization Of Switchable And Multilayered FSS Circuits Using The WCIP M...IJERA Editor
In this paper, we use the Wave Concept Iterative Procedure (WCIP) to study the Switchable and multilayered
FSS (Frequency Selective Surface) circuits. The Switchable part is used for the adjustment of the frequency of
the HF Electronics Circuits. This adjustment is applied by the integration of RF-MEMS switches. This system is
based on the use of circuit fabrication processes included. In order to initialize the iterative procedure, an
incident wave is defined in the spectral domain
Carbon nano tube based delay model for high speed energy efficient on chip da...elelijjournal
Speed is a major concern for high density VLSI networks. In this paper the closed form delay model for current mode signalling in VLSI interconnects has been proposed with resistive load termination.RLC interconnect line is modelled using characteristic impedance of transmission line and inductive effect.The inductive effect is dominant at lower technology node is modelled into an equivalent resistance. In this model first order transfer function is designed using finite difference equation, and by applying the boundary conditions at the source and load termination. It has been observed that the dominant pole determines system response and delay in the proposed model. Using CNIA tool (carbon nanotube interconnect analyzer) the interconnect line parameters has been estimated at 45nm technology node. The novel proposed current mode model superiority has been validated for CNT type of material. It superiority factor remains to 66.66% as compared to voltage mode signalling. And current mode dissipates 0.015pJ energy where as VM consume 0.045pJ for a single bit transmission across the interconnect over CNT
material. Secondly the damping factor of a lumped RLC circuit is shown to be a useful figure of merit.
Intercept probability analysis in DF time switching full-duplex relaying netw...TELKOMNIKA JOURNAL
In this research, we propose and investigate intercept probability analysis in DF time switching relaying full-duplex with impact of Co-channel interference at the eavesdropper. In the beginning stage, we present the DF time switching relaying full-duplex with the Impact of Co-channel interference at the eavesdropper. Furthermore, the closed-form expression of the intercept probability (IP) is analyzed and derived in connection with the primary system parameters. Finally, the Monte Carlo simulation is performed for verifying the correctness of the analytical section. From the research results, a novel solution and some recommendations can be proposed for the communication network in the near future.
Novel Global Elmore Delay Optimized Model with Improved Elmore Delay Estimati...IRJET Journal
This document discusses interconnect optimization in VLSI circuits. It proposes a novel interconnect architecture with an enhanced Elmore delay estimation model to reduce power consumption and delay. The key points are:
1. Interconnects have an increasing impact on circuit performance as feature sizes shrink. The proposed model aims to optimize RC structures to control power and delay.
2. Pulse and ramp inputs are used to estimate delay and power consumption in lumped and distributed RC circuits. A novel architecture with two sections of halved R and C values is introduced.
3. Simulation results show the proposed architecture achieves a 64.25% delay improvement for lumped circuits and 68.75% for distributed circuits compared to earlier Elmore
Similar to Inverse Gamma Distribution based Delay and Slew Modeling for On- Chip VLSI RC Interconnect for Arbitrary Ramp Input (20)
Power System State Estimation - A ReviewIDES Editor
This document provides a review of power system state estimation techniques. It discusses both static and dynamic state estimation algorithms. For static state estimation, it covers weighted least squares, decoupled, and robust estimation methods. Weighted least squares is commonly used but can have numerical instability issues. Decoupled state estimation approximates the gain matrix for faster computation. Robust estimation uses M-estimators and other techniques to handle outliers and bad data. Dynamic state estimation applies Kalman filtering, leapfrog algorithms, and other methods to continuously monitor system states over time.
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
This document summarizes a research paper that proposes using artificial intelligence techniques and FACTS controllers for reactive power planning in real-time power transmission systems. The paper formulates the reactive power planning problem and incorporates flexible AC transmission system (FACTS) devices like static VAR compensators (SVC), thyristor controlled series capacitors (TCSC), and unified power flow controllers (UPFC). Evolutionary algorithms like evolutionary programming (EP) and differential evolution (DE) are applied to find the optimal locations and settings of the FACTS controllers to minimize losses and costs. Simulation results on IEEE 30-bus and 72-bus Indian test systems show that UPFC performs best in reducing losses compared to SVC and TCSC.
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
Damping of power system oscillations with the help
of proposed optimal Proportional Integral Derivative Power
System Stabilizer (PID-PSS) and Static Var Compensator
(SVC)-based controllers are thoroughly investigated in this
paper. This study presents robust tuning of PID-PSS and
SVC-based controllers using Genetic Algorithms (GA) in
multi machine power systems by considering detailed model
of the generators (model 1.1). The effectiveness of FACTSbased
controllers in general and SVC-based controller in
particular depends upon their proper location. Modal
controllability and observability are used to locate SVC–based
controller. The performance of the proposed controllers is
compared with conventional lead-lag power system stabilizer
(CPSS) and demonstrated on 10 machines, 39 bus New England
test system. Simulation studies show that the proposed genetic
based PID-PSS with SVC based controller provides better
performance.
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
This paper presents the need to operate the power
system economically and with optimum levels of voltages has
further led to an increase in interest in Distributed
Generation. In order to reduce the power losses and to improve
the voltage in the distribution system, distributed generators
(DGs) are connected to load bus. To reduce the total power
losses in the system, the most important process is to identify
the proper location for fixing and sizing of DGs. It presents a
new methodology using a new population based meta heuristic
approach namely Artificial Bee Colony algorithm(ABC) for
the placement of Distributed Generators(DG) in the radial
distribution systems to reduce the real power losses and to
improve the voltage profile, voltage sag mitigation. The power
loss reduction is important factor for utility companies because
it is directly proportional to the company benefits in a
competitive electricity market, while reaching the better power
quality standards is too important as it has vital effect on
customer orientation. In this paper an ABC algorithm is
developed to gain these goals all together. In order to evaluate
sag mitigation capability of the proposed algorithm, voltage
in voltage sensitive buses is investigated. An existing 20KV
network has been chosen as test network and results are
compared with the proposed method in the radial distribution
system.
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
Controlling power flow in modern power systems
can be made more flexible by the use of recent developments
in power electronic and computing control technology. The
Unified Power Flow Controller (UPFC) is a Flexible AC
transmission system (FACTS) device that can control all the
three system variables namely line reactance, magnitude and
phase angle difference of voltage across the line. The UPFC
provides a promising means to control power flow in modern
power systems. Essentially the performance depends on proper
control setting achievable through a power flow analysis
program. This paper presents a reliable method to meet the
requirements by developing a Newton-Raphson based load
flow calculation through which control settings of UPFC can
be determined for the pre-specified power flow between the
lines. The proposed method keeps Newton-Raphson Load Flow
(NRLF) algorithm intact and needs (little modification in the
Jacobian matrix). A MATLAB program has been developed to
calculate the control settings of UPFC and the power flow
between the lines after the load flow is converged. Case studies
have been performed on IEEE 5-bus system and 14-bus system
to show that the proposed method is effective. These studies
indicate that the method maintains the basic NRLF properties
such as fast computational speed, high degree of accuracy and
good convergence rate.
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
The size and shape of opening in dam causes the
stress concentration, it also causes the stress variation in the
rest of the dam cross section. The gravity method of the analysis
does not consider the size of opening and the elastic property
of dam material. Thus the objective of study is comprises of
the Finite Element Method which considers the size of
opening, elastic property of material, and stress distribution
because of geometric discontinuity in cross section of dam.
Stress concentration inside the dam increases with the opening
in dam which results in the failure of dam. Hence it is
necessary to analyses large opening inside the dam. By making
the percentage area of opening constant and varying size and
shape of opening the analysis is carried out. For this purpose
a section of Koyna Dam is considered. Dam is defined as a
plane strain element in FEM, based on geometry and loading
condition. Thus this available information specified our path
of approach to carry out 2D plane strain analysis. The results
obtained are then compared mutually to get most efficient
way of providing large opening in the gravity dam.
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
Pushover Analysis a popular tool for seismic
performance evaluation of existing and new structures and is
nonlinear Static procedure where in monotonically increasing
loads are applied to the structure till the structure is unable
to resist the further load .During the analysis, whatever the
strength of concrete and steel is adopted for analysis of
structure may not be the same when real structure is
constructed and the pushover analysis results are very sensitive
to material model adopted, geometric model adopted, location
of plastic hinges and in general to procedure followed by the
analyzer. In this paper attempt has been made to assess
uncertainty in pushover analysis results by considering user
defined hinges and frame modeled as bare frame and frame
with slab modeled as rigid diaphragm and results compared
with experimental observations. Uncertain parameters
considered includes the strength of concrete, strength of steel
and cover to the reinforcement which are randomly generated
and incorporated into the analysis. The results are then
compared with experimental observations.
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
This document summarizes and analyzes secure multi-party negotiation protocols for electronic payments in mobile computing. It presents a framework for secure multi-party decision protocols using lightweight implementations. The main focus is on synchronizing security features to avoid agreement manipulation and reduce user traffic. The paper describes negotiation between an auctioneer and bidders, showing multiparty security is better than existing systems. It analyzes the performance of encryption algorithms like ECC, XTR, and RSA for use in the multiparty negotiation protocols.
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
The problems associated with selfish nodes in
MANET are addressed by a collaborative watchdog approach
which reduces the detection time for selfish nodes thereby
improves the performance and accuracy of watchdogs[1]. In
the related works they make use of credit based systems, reputation
based mechanisms, pathrater and watchdog mechanism
to detect such selfish nodes. In this paper we follow an approach
of collaborative watchdog which reduces the detection
time for selfish nodes and also involves the removal of such
selfish nodes based on some progressively assessed thresholds.
The threshold gives the nodes a chance to stop misbehaving
before it is permanently deleted from the network.
The node passes through several isolation processes before it
is permanently removed. Another version of AODV protocol
is used here which allows the simulation of selfish nodes in
NS2 by adding or modifying log files in the protocol.
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
Wireless sensor networks are networks having non
wired infrastructure and dynamic topology. In OSI model each
layer is prone to various attacks, which halts the performance
of a network .In this paper several attacks on four layers of
OSI model are discussed and security mechanism is described
to prevent attack in network layer i.e wormhole attack. In
Wormhole attack two or more malicious nodes makes a covert
channel which attracts the traffic towards itself by depicting a
low latency link and then start dropping and replaying packets
in the multi-path route. This paper proposes promiscuous mode
method to detect and isolate the malicious node during
wormhole attack by using Ad-hoc on demand distance vector
routing protocol (AODV) with omnidirectional antenna. The
methodology implemented notifies that the nodes which are
not participating in multi-path routing generates an alarm
message during delay and then detects and isolate the
malicious node from network. We also notice that not only
the same kind of attacks but also the same kind of
countermeasures can appear in multiple layer. For example,
misbehavior detection techniques can be applied to almost all
the layers we discussed.
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
The recent advancements in the wireless technology
and their wide-spread deployment have made remarkable
enhancements in efficiency in the corporate and industrial
and Military sectors The increasing popularity and usage of
wireless technology is creating a need for more secure wireless
Ad hoc networks. This paper aims researched and developed
a new protocol that prevents wormhole attacks on a ad hoc
network. A few existing protocols detect wormhole attacks but
they require highly specialized equipment not found on most
wireless devices. This paper aims to develop a defense against
wormhole attacks as an Anti-worm protocol which is based on
responsive parameters, that does not require as a significant
amount of specialized equipment, trick clock synchronization,
no GPS dependencies.
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
This document summarizes a proposed cloud security and data integrity framework that provides client accountability. The framework aims to address issues like lack of user control over cloud data, need for data transparency and tracking, and ensuring data integrity. It proposes using JAR (Java Archive) files for data sharing due to benefits like portability. The framework incorporates client-side verification using MD5 hashing, digital signature-based authentication of JAR files, and use of HMAC to ensure data integrity. It also uses password-based encryption of log files to keep them tamper-proof. The framework is intended to provide both accountability and security for data sharing in cloud environments.
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
A System state in HTTP botnet uses HTTP protocol
for the creation of chain of Botnets thereby compromising
other systems. By using HTTP protocol and port number 80,
attacks can not only be hidden but also pass through the
firewall without being detected. The DPR based detection
leads to better analysis of botnet attacks [3]. However, it
provides only probabilistic detection of the attacker and also
time consuming and error prone. This paper proposes a Genetic
algorithm based layered approach for detecting as well as
preventing botnet attacks. The paper reviews p2p firewall
implementation which forms the basis of filtering.
Performance evaluation is done based on precision, F-value
and probability. Layered approach reduces the computation
and overall time requirement [7]. Genetic algorithm promises
a low false positive rate.
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
This document summarizes a research paper that proposes a method for enhancing data security in cloud computing through steganography. The method hides user data in digital images stored on cloud servers. When data needs to be accessed, it is extracted from the images. The document outlines the cloud architecture and security issues addressed. It then describes the proposed system architecture, security model, and data storage and retrieval process. Data is partitioned and hidden in multiple images to improve security. The goal is to prevent unauthorized access to user data stored on cloud servers.
The main tasks of a Wireless Sensor Network
(WSN) are data collection from its nodes and communication
of this data to the base station (BS). The protocols used for
communication among the WSN nodes and between the WSN
and the BS, must consider the resource constraints of nodes,
battery energy, computational capabilities and memory. The
WSN applications involve unattended operation of the network
over an extended period of time. In order to extend the lifetime
of a WSN, efficient routing protocols need to be adopted. The
proposed low power routing protocol based on tree-based
network structure reliably forwards the measured data towards
the BS using TDMA. An energy consumption analysis of the
WSN making use of this protocol is also carried out. It is
found that the network is energy efficient with an average
duty cycle of 0:7% for the WSN nodes. The OmNET++
simulation platform along with MiXiM framework is made
use of.
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
The security of authentication of internet based
co-banking services should not be susceptible to high risks.
The passwords are highly vulnerable to virus attacks due to
the lack of high end embedding of security methods. In order
for the passwords to be more secure, people are generally
compelled to select jumbled up character based passwords
which are not only less memorable but are also equally prone
to insecurity. Multiple use of distributed shares has been
studied to solve the problem of authentication by algorithms
based on thresholding of pixels in image processing and visual
cryptography concepts where the subset of shares is considered
for the recovery of the original image for authentication using
correlation function[1][2].The main disadvantage in the above
study is the plain storage of shares and also one of the shares
is being supplied to the customer, which will lead to the
possibility of misuse by a third party. This paper proposes a
technique for scrambling of pixels by key based random
permutation (KBRP) within the shares before the
authentication has been attempted. Total number of shares to
be created is dependent on the multiplicity of ownership of
the account. By this method the problem of uncertainty among
the customers with regard to security, storage, retrieval of
holding of half of the shares is minimized.
This paper presents a trifocal Rotman Lens Design
approach. The effects of focal ratio and element spacing on
the performance of Rotman Lens are described. A three beam
prototype feeding 4 element antenna array working in L-band
has been simulated using RLD v1.7 software. Simulated
results show that the simulated lens has a return loss of –
12.4dB at 1.8GHz. Beam to array port phase error variation
with change in the focal ratio and element spacing has also
been investigated.
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
Hyperspectral images can be efficiently compressed
through a linear predictive model, as for example the one
used in the SLSQ algorithm. In this paper we exploit this
predictive model on the AVIRIS images by individuating,
through an off-line approach, a common subset of bands, which
are not spectrally related with any other bands. These bands
are not useful as prediction reference for the SLSQ 3-D
predictive model and we need to encode them via other
prediction strategies which consider only spatial correlation.
We have obtained this subset by clustering the AVIRIS bands
via the clustering by compression approach. The main result
of this paper is the list of the bands, not related with the
others, for AVIRIS images. The clustering trees obtained for
AVIRIS and the relationship among bands they depict is also
an interesting starting point for future research.
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
A microelectronic circuit of block-elements
functionally analogous to two hydrogen bonding networks is
investigated. The hydrogen bonding networks are extracted
from â-lactamase protein and are formed in its active site.
Each hydrogen bond of the network is described in equivalent
electrical circuit by three or four-terminal block-element.
Each block-element is coded in Matlab. Static and dynamic
analyses are performed. The resultant microelectronic circuit
analogous to the hydrogen bonding network operates as
current mirror, sine pulse source, triangular pulse source as
well as signal modulator.
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
In this paper a method is proposed to discriminate
real world scenes in to natural and manmade scenes of similar
depth. Global-roughness of a scene image varies as a function
of image-depth. Increase in image depth leads to increase in
roughness in manmade scenes; on the contrary natural scenes
exhibit smooth behavior at higher image depth. This particular
arrangement of pixels in scene structure can be well explained
by local texture information in a pixel and its neighborhood.
Our proposed method analyses local texture information of a
scene image using texture unit matrix. For final classification
we have used both supervised and unsupervised learning using
K-Nearest Neighbor classifier (KNN) and Self Organizing
Map (SOM) respectively. This technique is useful for online
classification due to very less computational complexity.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.