Polyphase Sequences (known as P1, P2, Px, Frank) exist for a square integer length with good auto correlation properties are helpful in the several applications. Unlike the Barker and Binary Sequences which exist for certain length and exhibits a maximum of two digit merit factor. The Integrated Sidelobe level (ISL) is often used to define excellence of the autocorrelation properties of given Polyphase sequence. In this paper, we present the application of Cyclic Algorithm named CA which minimizes the ISL (Integrated Sidelobe Level) related metric which in turn improve the Merit factor to a greater extent is main thing in applications like RADAR, SONAR and communications. To illustrate the performance of the P1, P2, Px, Frank sequences when cyclic Algorithm is applied. we presented a number of examples for integer lengths. CA(Px) sequence exhibits the good Merit Factor among all the Polyphase sequences that are considered.
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...IJCNC
In this article, we employ two distinct methods to derive simple closed-form approximations for the
statistical expectations of the positive integer powers of Gaussian probability integral Eg [Qp ( bWg )]
with
respect to its fading signal-to-noise ratio (SNR) g random variable. In the first approach, we utilize the
shifting property of Dirac delta function on three tight bounds/approximations for Q(.) to circumvent the
need for integration.
Discrete-wavelet-transform recursive inverse algorithm using second-order est...TELKOMNIKA JOURNAL
The recursive-least-squares (RLS) algorithm was introduced as an alternative to LMS algorithm with enhanced performance. Computational complexity and instability in updating the autocolleltion matrix are some of the drawbacks of the RLS algorithm that were among the reasons for the intrduction of the second-order recursive inverse (RI) adaptive algorithm. The 2nd order RI adaptive algorithm suffered from low convergence rate in certain scenarios that required a relatively small initial step-size. In this paper, we propose a newsecond-order RI algorithm that projects the input signal to a new domain namely discrete-wavelet-transform (DWT) as pre step before performing the algorithm. This transformation overcomes the low convergence rate of the second-order RI algorithm by reducing the self-correlation of the input signal in the mentioned scenatios. Expeirments are conducted using the noise cancellation setting. The performance of the proposed algorithm is compared to those of the RI, original second-order RI and RLS algorithms in different Gaussian and impulsive noise environments. Simulations demonstrate the superiority of the proposed algorithm in terms of convergence rate comparedto those algorithms.
A landing gear assembly consists of various components viz. Lower side stay, Upperside stay, Locking actuators, Extension actuators, Tyres, and Locking pins to name a few. Each unit having a specific operation to deal with, in this project the main unit being studied is the lower brace. The primary objective is to analyse stresses in the element of the lower brace unit using strength of materials or RDM method and Finite Element Method (FEM) and compare both. Using the obtained data a suitable material is proposed for the component. The approach used here is to study the overall behaviour of the element by taking up each aspect, finally summing up the total effect of all the aspects in the functioning of the element.
Combinational logic circuit timing analysis is an important issue that all designers need to
address. The present paper presents a simple and compact analysis procedure. We follow the
guidelines drawn by previous methods, but we shall define new time-dependent logic variables
that help us improve their efficiency. By using the methodology suggested, we shall replace a
very laborious technique (pure delay circuit + time constants method) with a simpler procedure
that can pinpoint the specific conditions for a logic circuit’s anomalous behaviour within a few
simple steps. Considering the logic function implemented the methodology presented will
require analysis of only a limited number of situations/combinations to determine the presence
of an anomalous behaviour. When anomalous behaviour is identified, the methodology provides
a clear timing description
On selection of periodic kernels parameters in time series predictioncsandit
In the paper the analysis of the periodic kernels parameters is described. Periodic kernels can
be used for the prediction task, performed as the typical regression problem. On the basis of the
Periodic Kernel Estimator (PerKE) the prediction of real time series is performed. As periodic
kernels require the setting of their parameters it is necessary to analyse their influence on the
prediction quality. This paper describes an easy methodology of finding values of parameters of
periodic kernels. It is based on grid search. Two different error measures are taken into
consideration as the prediction qualities but lead to comparable results. The methodology was
tested on benchmark and real datasets and proved to give satisfactory results.
vFORTRAN is used as a numerical and scientific computing language. The main objective of the lab work is to understand FORTRAN language using which we solve simple numerical problems and compare different methodologies. Through this project we make use of various functions of FORTRAN and solve a simple projectile problem and also LAPACK library to solve a tridiagonal matrix problem. We use DGESV and DGTSV functions to make it possible. The given problems are built and compiled using a free integrated development environment called CODE::BLOCKS [1] which is an open source platform for FORTRAN and C.
Numerical Simulation of Gaseous Microflows by Lattice Boltzmann MethodIDES Editor
This work is concerned with application of the
Lattice Boltzmznn Method (LBM) to compute flows in microgeometries.
The choice of using LBM for microflow simulation
is a good one owing to the fact that it is based on the Boltzmann
equation which is valid for the whole range of the Knudsen
number. In this work LBM is applied to simulate the pressure
driven microchannel flows and micro lid-driven cavity flows.
First, the microchannel flow is studied in some details with
the effects of varying the Knudsen number, pressure ratio
and Tangential Momemtum Accomodation Coefficient
(TMAC). The pressure distribution and other parameters are
compared with available experimental and analytical data
with good agreement. After having thus established the
credibility of the code and the method including boundary
conditions, LBM is then used to investigate the micro liddriven
cavity flow. The computations are carried out mainly
for the slip regime and the threshold of the transition regime.
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...IJCNC
In this article, we employ two distinct methods to derive simple closed-form approximations for the
statistical expectations of the positive integer powers of Gaussian probability integral Eg [Qp ( bWg )]
with
respect to its fading signal-to-noise ratio (SNR) g random variable. In the first approach, we utilize the
shifting property of Dirac delta function on three tight bounds/approximations for Q(.) to circumvent the
need for integration.
Discrete-wavelet-transform recursive inverse algorithm using second-order est...TELKOMNIKA JOURNAL
The recursive-least-squares (RLS) algorithm was introduced as an alternative to LMS algorithm with enhanced performance. Computational complexity and instability in updating the autocolleltion matrix are some of the drawbacks of the RLS algorithm that were among the reasons for the intrduction of the second-order recursive inverse (RI) adaptive algorithm. The 2nd order RI adaptive algorithm suffered from low convergence rate in certain scenarios that required a relatively small initial step-size. In this paper, we propose a newsecond-order RI algorithm that projects the input signal to a new domain namely discrete-wavelet-transform (DWT) as pre step before performing the algorithm. This transformation overcomes the low convergence rate of the second-order RI algorithm by reducing the self-correlation of the input signal in the mentioned scenatios. Expeirments are conducted using the noise cancellation setting. The performance of the proposed algorithm is compared to those of the RI, original second-order RI and RLS algorithms in different Gaussian and impulsive noise environments. Simulations demonstrate the superiority of the proposed algorithm in terms of convergence rate comparedto those algorithms.
A landing gear assembly consists of various components viz. Lower side stay, Upperside stay, Locking actuators, Extension actuators, Tyres, and Locking pins to name a few. Each unit having a specific operation to deal with, in this project the main unit being studied is the lower brace. The primary objective is to analyse stresses in the element of the lower brace unit using strength of materials or RDM method and Finite Element Method (FEM) and compare both. Using the obtained data a suitable material is proposed for the component. The approach used here is to study the overall behaviour of the element by taking up each aspect, finally summing up the total effect of all the aspects in the functioning of the element.
Combinational logic circuit timing analysis is an important issue that all designers need to
address. The present paper presents a simple and compact analysis procedure. We follow the
guidelines drawn by previous methods, but we shall define new time-dependent logic variables
that help us improve their efficiency. By using the methodology suggested, we shall replace a
very laborious technique (pure delay circuit + time constants method) with a simpler procedure
that can pinpoint the specific conditions for a logic circuit’s anomalous behaviour within a few
simple steps. Considering the logic function implemented the methodology presented will
require analysis of only a limited number of situations/combinations to determine the presence
of an anomalous behaviour. When anomalous behaviour is identified, the methodology provides
a clear timing description
On selection of periodic kernels parameters in time series predictioncsandit
In the paper the analysis of the periodic kernels parameters is described. Periodic kernels can
be used for the prediction task, performed as the typical regression problem. On the basis of the
Periodic Kernel Estimator (PerKE) the prediction of real time series is performed. As periodic
kernels require the setting of their parameters it is necessary to analyse their influence on the
prediction quality. This paper describes an easy methodology of finding values of parameters of
periodic kernels. It is based on grid search. Two different error measures are taken into
consideration as the prediction qualities but lead to comparable results. The methodology was
tested on benchmark and real datasets and proved to give satisfactory results.
vFORTRAN is used as a numerical and scientific computing language. The main objective of the lab work is to understand FORTRAN language using which we solve simple numerical problems and compare different methodologies. Through this project we make use of various functions of FORTRAN and solve a simple projectile problem and also LAPACK library to solve a tridiagonal matrix problem. We use DGESV and DGTSV functions to make it possible. The given problems are built and compiled using a free integrated development environment called CODE::BLOCKS [1] which is an open source platform for FORTRAN and C.
Numerical Simulation of Gaseous Microflows by Lattice Boltzmann MethodIDES Editor
This work is concerned with application of the
Lattice Boltzmznn Method (LBM) to compute flows in microgeometries.
The choice of using LBM for microflow simulation
is a good one owing to the fact that it is based on the Boltzmann
equation which is valid for the whole range of the Knudsen
number. In this work LBM is applied to simulate the pressure
driven microchannel flows and micro lid-driven cavity flows.
First, the microchannel flow is studied in some details with
the effects of varying the Knudsen number, pressure ratio
and Tangential Momemtum Accomodation Coefficient
(TMAC). The pressure distribution and other parameters are
compared with available experimental and analytical data
with good agreement. After having thus established the
credibility of the code and the method including boundary
conditions, LBM is then used to investigate the micro liddriven
cavity flow. The computations are carried out mainly
for the slip regime and the threshold of the transition regime.
Area efficient parallel LFSR for cyclic redundancy check IJECEIAES
Cyclic Redundancy Check (CRC), code for error detection finds many applications in the field of digital communication, data storage, control system and data compression. CRC encoding operation is carried out by using a Linear Feedback Shift Register (LFSR). Serial implementation of CRC requires more clock cycles which is equal to data message length plus generator polynomial degree but in parallel implementation of CRC one clock cycle is required if a whole data message is applied at a time. In previous work related to parallel LFSR, hardware complexity of the architecture reduced using a technique named state space transformation. This paper presents detailed explaination of search algorithm implementation and technique to find number of XOR gates required for different CRC algorithms. This paper presents a searching algorithm and new technique to find the number of XOR gates required for different CRC algorithms. The comparison between proposed and previous architectures shows that the number of XOR gates are reduced for CRC algorithms which improve the hardware efficiency. Searching algorithm and all the matrix computations have been performed using MATLAB simulations.
Optimal and Power Aware BIST for Delay Testing of System-On-ChipIDES Editor
Test engineering for fault tolerant VLSI systems is
encumbered with optimization requisites for hardware
overhead, test power and test time. The high level quality of
these complex high-speed VLSI circuits can be assured only
through delay testing, which involves checking for accurate
temporal behavior. In the present paper, a data-path based
built-in test pattern generator (TPG) that generates iterative
pseudo-exhaustive two-patterns (IPET) for parallel delay
testing of modules with different input cone capacities is
implemented. Further, in the present study a CMOS
implementation of low power architecture (LPA) for scan based
built-in self test (BIST) for delay testing and combinational
testing is carried out. This reduces test power dissipation in
the circuit under test (CUT). Experimental results and
comparisons with pre-existing methods prove the reduction
in hardware overhead and test-time.
Low Power Adaptive FIR Filter Based on Distributed ArithmeticIJERA Editor
This paper aims at implementation of a low power adaptive FIR filter based on distributed arithmetic (DA) with
low power, high throughput, and low area. Least Mean Square (LMS) Algorithm is used to update the weight
and decrease the mean square error between the current filter output and the desired response. The pipelined
Distributed Arithmetic table reduces switching activity and hence it reduces power. The power consumption is
reduced by keeping bit-clock used in carry-save accumulation much faster than clock of rest of the operations.
We have implemented it in Quartus II and found that there is a reduction in the total power and the core dynamic
power by 31.31% and 100.24% respectively when compared with the architecture without DA table
Lid driven cavity flow simulation using CFD & MATLABIJSRD
Steady Incompressible Navier-Stokes equation on a uniform grid has been studied at various Reynolds number using CFD (Computational Fluid Dynamics). Present paper aim is to obtain the stream-function and velocity field in steady state using the finite difference formulation on momentum equations and continuity equation. Reynold number dominates the flow problem. Taylor’s series expansion has been used to convert the governing equations in the algebraic form using finite difference schemes. MATLAB has been used to draw to flow simulations inside the driven-cavity.
In this paper generation of binary sequences derived from chaotic sequences defined over Z4 is proposed.
The six chaotic map equations considered in this paper are Logistic map, Tent Map, Cubic Map, Quadratic
Map and Bernoulli Map. Using these chaotic map equations, sequences over Z4 are generated which are
converted to binary sequences using polynomial mapping. Segments of sequences of different lengths are
tested for cross correlation and linear complexity properties. It is found that some segments of different
length of these sequences have good cross correlation and linear complexity properties. The Bit Error Rate
performance in DS-CDMA communication systems using these binary sequences is found to be better than
Gold sequences and Kasami sequences.
International Journal of Research in Engineering and Science is an open access peer-reviewed international forum for scientists involved in research to publish quality and refereed papers. Papers reporting original research or experimentally proved review work are welcome. Papers for publication are selected through peer review to ensure originality, relevance, and readability.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Novel Space-time Discontinuous Galerkin Method for Solving of One-dimension...TELKOMNIKA JOURNAL
In this paper we propose a high-order space-time discontinuous Galerkin (STDG) method for
solving of one-dimensional electromagnetic wave propagations in homogeneous medium. The STDG
method uses finite element Discontinuous Galerkin discretizations in spatial and temporal domain
simultaneously with high order piecewise Jacobi polynomial as the basis functions. The algebraic
equations are solved using Block Gauss-Seidel iteratively in each time step. The STDG method is
unconditionally stable, so the CFL number can be chosen arbitrarily. Numerical examples show that the
proposed STDG method is of exponentially accuracy in time.
FINITE DIFFERENCE MODELLING FOR HEAT TRANSFER PROBLEMSroymeister007
This report provides a practical overview of numerical solutions to the heat equation using the finite difference method (FDM). The forward time, centered space (FTCS), the backward time, centered space (BTCS), and Crank-Nicolson schemes are developed, and applied to a simple problem in1volving the one-dimensional heat equation. Complete, working Matlab and FORTRAN codes for each program are presented. The results of running the codes on finer (one-dimensional) meshes, and with smaller time steps are demonstrated. These sample calculations show that the schemes realize theoretical predictions of how their truncation errors depend on mesh spacing and time step. The Matlab codes are straightforward and allow us to see the differences in implementation between explicit method (FTCS) and implicit methods (BTCS). The codes also allow us to experiment with the stability limit of the FTCS scheme.
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...IJCNCJournal
Transmitter range assignment in clustered wireless networks is the bottleneck of the balance between
energy conservation and the connectivity to deliver data to the sink or gateway node. The aim of this
research is to optimize the energy consumption through reducing the transmission ranges of the nodes,
while maintaining high probability to have end-to-end connectivity to the network’s data sink. We modified
the approach given in [1] to achieve more than 25% power saving through reducing cluster head (CH)
transmission range of the backbone nodes in a multihop wireless sensor network with ensuring at least
95% end-to-end connectivity probability.
Moment Preserving Approximation of Independent Components for the Reconstruct...rahulmonikasharma
The application of Independent Component Analysis (ICA) has found considerable success in problems where sets of observed time series may be considered as results of linearly mixed instantaneous source signals. The Independent Components (IC’s) or features can be used in the reconstruction of observed multivariate time seriesfollowing an optimal ordering process. For trend discovery and forecasting, the generated IC’s can be approximated for the purpose of noise removal and for the lossy compression of the signals.We propose a moment-preserving (MP) methodology for approximating IC’s for the reconstruction of multivariate time series.The methodologyis based on deriving the approximation in the signal domain while preserving a finite number of geometric moments in its Fourier domain.Experimental results are presented onthe approximation of both artificial time series and actual time series of currency exchange rates. Our results show that the moment-preserving (MP) approximations of time series are superior to other usual interpolation approximation methods, particularly when the signals contain significant noise components. The results also indicate that the present MP approximations have significantly higher reconstruction accuracy and can be used successfully for signal denoising while achieving in the same time high packing ratios. Moreover, we find that quite acceptable reconstructions of observed multivariate time series can be obtained with only the first few MP approximated IC’s.
Super-resolution reconstruction is a method for reconstructing higher resolution images from a set of low resolution observations. The sub-pixel differences among different observations of the same scene allow to create higher resolution images with better quality. In the last thirty years, many methods for creating high resolution images have been proposed. However, hardware implementations of such methods are limited. Wiener filter design is one of the techniques we will use initially for this process. Wiener filter design involves matrix inversion. A novel method for the matrix inversion has been proposed in the report. QR decomposition will be the computational algorithm used using Givens Rotation.
Using Subspace Pursuit Algorithm to Improve Performance of the Distributed Co...Polytechnique Montreal
This paper applies a compressed algorithm to improve the spectrum sensing performance of cognitive radio technology.
At the fusion center, the recovery error in the analog to information converter (AIC) when reconstructing the
transmit signal from the received time-discrete signal causes degradation of the detection performance. Therefore, we
propose a subspace pursuit (SP) algorithm to reduce the recovery error and thereby enhance the detection performance.
In this study, we employ a wide-band, low SNR, distributed compressed sensing regime to analyze and evaluate the
proposed approach. Simulations are provided to demonstrate the performance of the proposed algorithm.
Area efficient parallel LFSR for cyclic redundancy check IJECEIAES
Cyclic Redundancy Check (CRC), code for error detection finds many applications in the field of digital communication, data storage, control system and data compression. CRC encoding operation is carried out by using a Linear Feedback Shift Register (LFSR). Serial implementation of CRC requires more clock cycles which is equal to data message length plus generator polynomial degree but in parallel implementation of CRC one clock cycle is required if a whole data message is applied at a time. In previous work related to parallel LFSR, hardware complexity of the architecture reduced using a technique named state space transformation. This paper presents detailed explaination of search algorithm implementation and technique to find number of XOR gates required for different CRC algorithms. This paper presents a searching algorithm and new technique to find the number of XOR gates required for different CRC algorithms. The comparison between proposed and previous architectures shows that the number of XOR gates are reduced for CRC algorithms which improve the hardware efficiency. Searching algorithm and all the matrix computations have been performed using MATLAB simulations.
Optimal and Power Aware BIST for Delay Testing of System-On-ChipIDES Editor
Test engineering for fault tolerant VLSI systems is
encumbered with optimization requisites for hardware
overhead, test power and test time. The high level quality of
these complex high-speed VLSI circuits can be assured only
through delay testing, which involves checking for accurate
temporal behavior. In the present paper, a data-path based
built-in test pattern generator (TPG) that generates iterative
pseudo-exhaustive two-patterns (IPET) for parallel delay
testing of modules with different input cone capacities is
implemented. Further, in the present study a CMOS
implementation of low power architecture (LPA) for scan based
built-in self test (BIST) for delay testing and combinational
testing is carried out. This reduces test power dissipation in
the circuit under test (CUT). Experimental results and
comparisons with pre-existing methods prove the reduction
in hardware overhead and test-time.
Low Power Adaptive FIR Filter Based on Distributed ArithmeticIJERA Editor
This paper aims at implementation of a low power adaptive FIR filter based on distributed arithmetic (DA) with
low power, high throughput, and low area. Least Mean Square (LMS) Algorithm is used to update the weight
and decrease the mean square error between the current filter output and the desired response. The pipelined
Distributed Arithmetic table reduces switching activity and hence it reduces power. The power consumption is
reduced by keeping bit-clock used in carry-save accumulation much faster than clock of rest of the operations.
We have implemented it in Quartus II and found that there is a reduction in the total power and the core dynamic
power by 31.31% and 100.24% respectively when compared with the architecture without DA table
Lid driven cavity flow simulation using CFD & MATLABIJSRD
Steady Incompressible Navier-Stokes equation on a uniform grid has been studied at various Reynolds number using CFD (Computational Fluid Dynamics). Present paper aim is to obtain the stream-function and velocity field in steady state using the finite difference formulation on momentum equations and continuity equation. Reynold number dominates the flow problem. Taylor’s series expansion has been used to convert the governing equations in the algebraic form using finite difference schemes. MATLAB has been used to draw to flow simulations inside the driven-cavity.
In this paper generation of binary sequences derived from chaotic sequences defined over Z4 is proposed.
The six chaotic map equations considered in this paper are Logistic map, Tent Map, Cubic Map, Quadratic
Map and Bernoulli Map. Using these chaotic map equations, sequences over Z4 are generated which are
converted to binary sequences using polynomial mapping. Segments of sequences of different lengths are
tested for cross correlation and linear complexity properties. It is found that some segments of different
length of these sequences have good cross correlation and linear complexity properties. The Bit Error Rate
performance in DS-CDMA communication systems using these binary sequences is found to be better than
Gold sequences and Kasami sequences.
International Journal of Research in Engineering and Science is an open access peer-reviewed international forum for scientists involved in research to publish quality and refereed papers. Papers reporting original research or experimentally proved review work are welcome. Papers for publication are selected through peer review to ensure originality, relevance, and readability.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Novel Space-time Discontinuous Galerkin Method for Solving of One-dimension...TELKOMNIKA JOURNAL
In this paper we propose a high-order space-time discontinuous Galerkin (STDG) method for
solving of one-dimensional electromagnetic wave propagations in homogeneous medium. The STDG
method uses finite element Discontinuous Galerkin discretizations in spatial and temporal domain
simultaneously with high order piecewise Jacobi polynomial as the basis functions. The algebraic
equations are solved using Block Gauss-Seidel iteratively in each time step. The STDG method is
unconditionally stable, so the CFL number can be chosen arbitrarily. Numerical examples show that the
proposed STDG method is of exponentially accuracy in time.
FINITE DIFFERENCE MODELLING FOR HEAT TRANSFER PROBLEMSroymeister007
This report provides a practical overview of numerical solutions to the heat equation using the finite difference method (FDM). The forward time, centered space (FTCS), the backward time, centered space (BTCS), and Crank-Nicolson schemes are developed, and applied to a simple problem in1volving the one-dimensional heat equation. Complete, working Matlab and FORTRAN codes for each program are presented. The results of running the codes on finer (one-dimensional) meshes, and with smaller time steps are demonstrated. These sample calculations show that the schemes realize theoretical predictions of how their truncation errors depend on mesh spacing and time step. The Matlab codes are straightforward and allow us to see the differences in implementation between explicit method (FTCS) and implicit methods (BTCS). The codes also allow us to experiment with the stability limit of the FTCS scheme.
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...IJCNCJournal
Transmitter range assignment in clustered wireless networks is the bottleneck of the balance between
energy conservation and the connectivity to deliver data to the sink or gateway node. The aim of this
research is to optimize the energy consumption through reducing the transmission ranges of the nodes,
while maintaining high probability to have end-to-end connectivity to the network’s data sink. We modified
the approach given in [1] to achieve more than 25% power saving through reducing cluster head (CH)
transmission range of the backbone nodes in a multihop wireless sensor network with ensuring at least
95% end-to-end connectivity probability.
Moment Preserving Approximation of Independent Components for the Reconstruct...rahulmonikasharma
The application of Independent Component Analysis (ICA) has found considerable success in problems where sets of observed time series may be considered as results of linearly mixed instantaneous source signals. The Independent Components (IC’s) or features can be used in the reconstruction of observed multivariate time seriesfollowing an optimal ordering process. For trend discovery and forecasting, the generated IC’s can be approximated for the purpose of noise removal and for the lossy compression of the signals.We propose a moment-preserving (MP) methodology for approximating IC’s for the reconstruction of multivariate time series.The methodologyis based on deriving the approximation in the signal domain while preserving a finite number of geometric moments in its Fourier domain.Experimental results are presented onthe approximation of both artificial time series and actual time series of currency exchange rates. Our results show that the moment-preserving (MP) approximations of time series are superior to other usual interpolation approximation methods, particularly when the signals contain significant noise components. The results also indicate that the present MP approximations have significantly higher reconstruction accuracy and can be used successfully for signal denoising while achieving in the same time high packing ratios. Moreover, we find that quite acceptable reconstructions of observed multivariate time series can be obtained with only the first few MP approximated IC’s.
Super-resolution reconstruction is a method for reconstructing higher resolution images from a set of low resolution observations. The sub-pixel differences among different observations of the same scene allow to create higher resolution images with better quality. In the last thirty years, many methods for creating high resolution images have been proposed. However, hardware implementations of such methods are limited. Wiener filter design is one of the techniques we will use initially for this process. Wiener filter design involves matrix inversion. A novel method for the matrix inversion has been proposed in the report. QR decomposition will be the computational algorithm used using Givens Rotation.
Using Subspace Pursuit Algorithm to Improve Performance of the Distributed Co...Polytechnique Montreal
This paper applies a compressed algorithm to improve the spectrum sensing performance of cognitive radio technology.
At the fusion center, the recovery error in the analog to information converter (AIC) when reconstructing the
transmit signal from the received time-discrete signal causes degradation of the detection performance. Therefore, we
propose a subspace pursuit (SP) algorithm to reduce the recovery error and thereby enhance the detection performance.
In this study, we employ a wide-band, low SNR, distributed compressed sensing regime to analyze and evaluate the
proposed approach. Simulations are provided to demonstrate the performance of the proposed algorithm.
Modelling Quantum Transport in Nanostructuresiosrjce
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Asymptotic features of Hessian Matrix in Receding Horizon Model Predictive Co...TELKOMNIKA JOURNAL
In this paper, Receding Horizon Model Predictive Control (RH-MPC) having a quadratic objective
function is studied through the Singular Value Decomposition (SVD) and Singular Vectors of its Hessian
Matrix. Contrary to the previous work, non-equal and medium sized control and prediction horizons are
considered and it is shown that the Singular Values converge to the open loop magnitude response of the
system and singular vectors contain the phase information. Earlier results focused on classical formulation
of Generalized Predictive Control (GPC), whereas, current work proves the applicability to modern
formulation. Although, method can easily be extended to MIMO systems, only SISO system examples
are presented.
In this paper, a novel architecture of RNS based 1D Lifting Integer Wavelet Transform (IWT) has been introduced. Advantage of Residue Number System (RNS) based Lifting Scheme over RNS based Filter Bank and non-binary IWT has been discussed. The performance of traditional predicts and updates stage of binary Lifting Scheme (LS) for Discrete Wavelet Transform (DWT) generates huge carry propagation
delay, power and complexity. As a result non binary number system is becoming popular in the field of Digital Signal Processing (DSP) due to its efficient performance. In this paper also a new fixed number ROM based RNS division circuit has been proposed. The proposed architecture has been validated on Xilinx Vertex5 FPGA platform and the corresponding result and reports are shown in here.
On Selection of Periodic Kernels Parameters in Time Series Prediction cscpconf
In the paper the analysis of the periodic kernels parameters is described. Periodic kernels can
be used for the prediction task, performed as the typical regression problem. On the basis of the
Periodic Kernel Estimator (PerKE) the prediction of real time series is performed. As periodic
kernels require the setting of their parameters it is necessary to analyse their influence on the
prediction quality. This paper describes an easy methodology of finding values of parameters of
periodic kernels. It is based on grid search. Two different error measures are taken into
consideration as the prediction qualities but lead to comparable results. The methodology was
tested on benchmark and real datasets and proved to give satisfactory results.
ON SELECTION OF PERIODIC KERNELS PARAMETERS IN TIME SERIES PREDICTIONcscpconf
In the paper the analysis of the periodic kernels parameters is described. Periodic kernels can
be used for the prediction task, performed as the typical regression problem. On the basis of the
Periodic Kernel Estimator (PerKE) the prediction of real time series is performed. As periodic
kernels require the setting of their parameters it is necessary to analyse their influence on the
prediction quality. This paper describes an easy methodology of finding values of parameters of
periodic kernels. It is based on grid search. Two different error measures are taken into
consideration as the prediction qualities but lead to comparable results. The methodology was
tested on benchmark and real datasets and proved to give satisfactory results.
Frequency domain behavior of S-parameters piecewise-linear fitting in a digit...Piero Belforte
This paper describes PWLFIT+, an extension to the frequency domain ofPWLFIT, a new paradigm in time-domain macromodel ing for linear multiportsystems, based on a piecewise-linea r (PWL) behavioral representation of the S-parameters step response.
Numerical Investigation of Multilayer Fractal FSSIJMER
Numerical investigations are presented for a multilayer frequency selective surface with Koch
fractal (levels 1 and 2) conducting patch elements. The structure investigated is obtained using two FSS
screens separated by an air gap layer. For the proposed investigation were used three different values an
air gap height. The results obtained using the numerical method were compared with other technique and
using the commercial software Ansoft DesignerTM. A good agreement was observed in terms of the
bandwidth.
A Novel CAZAC Sequence Based Timing Synchronization Scheme for OFDM SystemIJAAS Team
Several classical timing synchronization schemes have been proposed for the timing synchronization in OFDM systems based on the correlation between identical parts of OFDM symbol. These schemes show poor performance due to the presence of plateau and significant side lobe. In this paper we present a timing synchronization schemes with timing metric based on a Constant Amplitude Zero Auto Correlation (CAZAC) sequence. The performance of the proposed timing synchronization scheme is better than the classical techniques.
Advanced Stability Analysis of Control Systems with Variable Parametersjournal ijrtem
The purpose of the current research is to advance further the D-Partitioning method and
emphasize on its practical application. It has the objective to clarify it in a user friendly manner in order to
simplify its implementation. By applying the basic initial ideas of the method, the main line of the research is the
development of a generalized stability analysis tool and demonstrating its application. With the aid of this tool,
proper parameter values can be chosen for a desirable performance and stability of a system. The analysis tool
can be practically used when one, two or more system’s parameters are varied independently or simultaneously.
Basically this tool defines regions of stability in the space of the system’s parameters.
Similar to Performance Assessment of Polyphase Sequences Using Cyclic Algorithm (20)
Data Mining is a significant field in today’s data-driven world. Understanding and implementing its concepts can lead to discovery of useful insights. This paper discusses the main concepts of data mining, focusing on two main concepts namely Association Rule Mining and Time Series Analysis
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...rahulmonikasharma
We are describes the technique for real time human face detection and counting the number of passengers in vehicle and also gender of the passengers.The Image processing technology is very popular,now at present all are going to use it for various purpose. It can be applied to various applications for detecting and processing the digital images. Face detection is a part of image processing. It is used for finding the face of human in a given area. Face detection is used in many applications such as face recognition, people tracking, or photography. In this paper,The webcam is installed in public vehicle and connected with Raspberry Pi model. We use face detection technique for detecting and counting the number of passengers in public vehicle via webcam with the help of image processing and Raspberry Pi.
Considering Two Sides of One Review Using Stanford NLP Frameworkrahulmonikasharma
Sentiment analysis is a type of natural language processing for tracking the mood of the public about a particular product or a topic and is useful in several ways. Polarity shift is the most classical task which aims at classifying the reviews either positive or negative. But in many cases, in addition to the positive and negative reviews, there still many neutral reviews exist. However, the performance sometimes limited due to the fundamental deficiencies in handling the polarity shift problem. We propose an Improvised Dual Sentiment Analysis (IDSA) model to address this problem for sentiment classification. We first propose a novel data expansion technique by creating sentiment-reversed review for each training and test review. We develop a corpus based method to construct a pseudo-antonym dictionary. It removes DSA’s dependency on an external antonym dictionary for review reversion. We conduct a range of experiments and the results demonstrates the effectiveness of DSA in addressing the polarity shift in sentiment classification. .
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systemsrahulmonikasharma
The requirements of fifth generation new radio (5G- NR) access networks are very high capacity and ultra-reliability. In this paper, we proposed a V-BLAST2 × N_r MIMO system that is analyzed, improved, and expected to achieve both very high throughput and ultra- reliability simultaneously.A new detection technique called parallel detection algorithm is proposed. The performance of the proposed algorithm compared with existing linear detection algorithms. It was seen that the proposed technique increases the speed of signal transmission and prevents error propagation which may be present in serial decoding techniques. The new algorithm reduces the bit error probability and increases the capacity simultaneouslywithout using a standard STC technique. However, it was seen that the BER of systems using the proposed algorithm is slightly higher than a similar system using only STC technique. Simulation results show the advantages of using the proposed technique.
Broadcasting Scenario under Different Protocols in MANET: A Surveyrahulmonikasharma
A wireless network enables people to communicate and access applications and information without wires. This provides freedom of movement and the ability to extend applications to different parts of a building, city, or nearly anywhere in the world. Wireless networks allow people to interact with e-mail or browse the Internet from a location that they prefer. Adhoc Networks are self-organizing wireless networks, absent any fixed infrastructure. broadcasting of data through proper channel is essential. Various protocols are designed to avoid the loss of data. In this paper an overview of different broadcast protocols are discussed.
Sybil Attack Analysis and Detection Techniques in MANETrahulmonikasharma
Security is important for many sensor network applications. A particularly harmful attack against sensor and ad hoc networks is known as the Sybil attack [6], where a node Illegitimately claims multiple identities.Mobility cause a main problem when we talk about security in Mobile Ad-hoc networks. It doesn’t depend on fixed architecture, the nodes are continuously moving in a random fashion. In this article we will focus on identifying the Sybil attack in MANET. It uses air medium for communication so it is more prone to the attack. Sybil attack is one in which single node present multiple fake identities to other nodes, which cause destruction.
A Landmark Based Shortest Path Detection by Using A* and Haversine Formularahulmonikasharma
In 1900, less than 20 percent of the world populace lived in cities, in 2007, fair more than 50 percent of the world populace lived in cities. In 2050, it has been anticipated that more than 70 percent of the worldwide population (about 6.4 billion individuals) will be city tenants. There's more weight being set on cities through this increment in population [1]. With approach of keen cities, data and communication technology is progressively transforming the way city regions and city inhabitants organize and work in reaction to urban development. In this paper, we create a nonspecific plot for navigating a route throughout city A asked route is given by utilizing combination of A* Algorithm and Haversine equation. Haversine Equation gives least distance between any two focuses on spherical body by utilizing latitude and longitude. This least distance is at that point given to A* calculation to calculate minimum distance. The method for identifying the shortest path is specify in this paper.
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...rahulmonikasharma
Internet of Things (IoT) is the developing technologies that would be the biggest agents to modify the current world. Machine-to-machine communications perform with virtual, mobile and instantaneous connections. In IoT system, it consists of data-gathering sensors various other household devices. Intended for protecting IoT system, the end-to-end secure communication is a necessary measure to protect against unauthorized entities (e.g., modification attacks and eavesdropping,) and the data unprotected on the Cloud. The most important concern hereby is how to preserve the insightful information and to provide the privacy of user data. In IoT, the encrypted data computing is based on techniques appear to be promising approaches. In this paper, we discuss about the recent secure database systems, which are capable to execute SQL queries over encrypted data.
Quality Determination and Grading of Tomatoes using Raspberry Pirahulmonikasharma
In India cultivation of tomatoes is carried out by traditional methods and techniques. Today tremendous improvement in field of agriculture technologies and products can be seen. The tomatoes affect the overall production drastically. Image processing technique can be key technique for finding good qualities of tomatoes and grading. This work aimed to study different types of algorithms used for quality grading and sorting of fruit from the acquire image. In previous years several types of techniques are applied to analyses the good quality fruits. A simple system can be implemented using Raspberry pi with computer vision technology and image processing algorithms.
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...rahulmonikasharma
Network management and Routing is supportively done by performing with the nodes, due to infrastructure-less nature of the network in Ad hoc networks or MANET. The nodes are maintained itself from the functioning of the network, for that reason the MANET security challenges several defects. Routing process and Scheduling is a significant idea to enhance the security in MANET. Other than, scheduling has been recognized to be a key issue for implementing throughput/capacity optimization in Ad hoc networks. Designed underneath conventional (LT) light tailed assumptions, traffic fundamentally faces Heavy-tailed (HT) assumption of the validity of scheduling algorithms. Scheduling policies are utilized for communication networks such as Max-Weight, backpressure and ACO, which are provably throughput optimality and the Pareto frontier of the feasible throughput region under maximal throughput vector. In wireless ad-hoc network, the issue of routing and optimal scheduling performs with time varying channel reliability and multiple traffic streams. Depending upon the security issues within MANETs in this paper presents a comparative analysis of existing scheduling policies based on their performance to progress the delay performance in most scenarios. The security issues of MANETs considered from this paper presents a relative analysis of existing scheduling policies depend on their performance to progress the delay performance in most developments.
DC Conductivity Study of Cadmium Sulfide Nanoparticlesrahulmonikasharma
The dc conductivity of consolidated nanoparticle of CdS has been studied over the temperature range from 303 K to 523 K and the conductivity has been found to be much larger than that of single crystals.
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMrahulmonikasharma
OFDM (Orthogonal Frequency Division Multiplexing) is generally preferred for high data rate transmission in digital communication. The Long-Term Evolution (LTE) standards for the fourth generation (4G) wireless communication systems. Orthogonal Frequency Division Multiple Access (OFDMA) and Single Carrier Frequency Division Multiple Access (SC-FDMA) are the two multiple access techniques which are generally used in LTE.OFDM system has a major shortcoming of high peak to average power ratio (PAPR) value. This paper explains different PAPR reduction techniques and presents a comparison of the various techniques based on theoretical results. It also presents a survey of the various PAPR reduction techniques and the state of the art in this area.
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoringrahulmonikasharma
Home automation has been a dream of sciences for so many years. It could wind up conceivable in twentieth century simply after power all family units and web administrations were begun being utilized on across the board level. The point of home robotization is to give enhanced accommodation, comfort, vitality effectiveness and security. Vitality checking and protection holds prime significance in this day and age in view of the irregularity between control age and request observing frameworks accessible in the market. Ordinarily, customers are disappointed with the power charge as it doesn't demonstrate the power devoured at the gadget level. This paper shows the outline and execution of a vitality meter utilizing Arduino microcontroller which can be utilized to gauge the power devoured by any individual electrical apparatus. The primary expectation of the proposed vitality meter is to screen the power utilization at the gadget level, transfer it to the server and build up remote control of any apparatus. So we can screen the power utilization remotely and close down gadgets if vital. The car segment is additionally one of the application spaces where vehicle can be made keen by utilizing "IOT". So a vehicle following framework is additionally executed to screen development of vehicles remotely.
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...rahulmonikasharma
An anticipated outcome that is intended chapter is to investigate effects of magnetic field on an oscillatory flow of a viscoelastic fluid with thermal radiation, viscous dissipation with Ohmic heating which bounded by a vertical plane surface, have been studied. Analytical solutions for the quasi – linear hyperbolic partial differential equations are obtained by perturbation technique. Solutions for velocity and temperature distributions are discussed for various values of physical parameters involving in the problem. The effects of cooling and heating of a viscoelastic fluid compared to the Newtonian fluid have been discussed.
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...rahulmonikasharma
In fast growing database repository system, image as data is one of the important concern despite text or numeric. Still we can’t replace test on any cost but for advancement, information may be managed with images. Therefore image processing is a wide area for the researcher. Many stages of processing of image provide researchers with new ideas to keep information safe with better way. Feature extraction, segmentation, recognition are the key areas of the image processing which helps to enhance the quality of working with images. Paper presents the comparison between image formats like .jpg, .png, .bmp, .gif. This paper is focused on the feature extraction and segmentation stages with background removal process. There are two filters, one is integer filter and second one is floating point Filter, which is used for the key feature extraction from image. These filters applied on the different images of different formats and visually compare the results.
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM Systemrahulmonikasharma
The examination on various looks into on MIMO STBC framework in order to accomplish the higher framework execution is standard that the execution of the remote correspondence frameworks can be improved by usage numerous transmit and get radio wires, that is normally gathered on the grounds that the MIMO procedure, and has been incorporated. The Alamouti STBC might be a promising because of notice the pick up inside the remote interchanges framework misuse MIMO. To broaden the code rate and furthermore the yield of the symmetrical zone time square code for more than 4 transmit reception apparatuses is examined. The outlined framework is beated once forced with M-PSK (i.e upto 32-PSK) regulation. The channel estimation examine in these conditions.
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosisrahulmonikasharma
A vibration investigation is about the specialty of searching for changes in the vibration example, and after that relating those progressions back to the machines mechanical outline. The level of vibration and the example of the vibration reveal to us something about the interior state of the turning segment. The vibration example can let us know whether the machine is out of adjust or twisted. Al-so blames with the moving components and coupling issues can be distinguished. This paper shows an approach for equip blame investigation utilizing signal handling plans. The information has been taken from college of ohio, joined states. The investigation has done utilizing MATLAB software.
This paper discusses a new algorithm of a univariate method, which is vitally important to develop a short-term load forecasting module for planning and operation of distribution system. It has many applications including purchasing of energy, generation and infrastructure development etc. We have discussed different time series forecasting approaches in this paper. But ARIMA has proved itself as the most appropriate method in forecasting of the load profile for West Bengal using the historical data of the year of 2017. Auto Regressive Integrated Moving Average model gives more accuracy level of load forecast than any other techniques. Mean Absolute Percentage Error (MAPE) has been calculated for the mentioned forecasted model.
Impact of Coupling Coefficient on Coupled Line Couplerrahulmonikasharma
The coupled line coupler is a type of directional coupler which finds practical utility. It is mainly used for sampling the microwave power. In this paper, 3 couplers A,B & C are designed with different values of coupling coefficient 6dB,10dB & 18dB respectively at a frequency of 2.5GHz using ADS tool. The return loss, isolation loss & transmission loss are determined. The design & simulation is done using microstrip line technology.
Design Evaluation and Temperature Rise Test of Flameproof Induction Motorrahulmonikasharma
The ignition of flammable gases, vapours or dust in presence of oxygen contained in the surrounding atmosphere may lead to explosion. Flameproof three phase induction motors are the most common and frequently used in the process industries such as oil refineries, oil rigs, petrochemicals, fertilizers, etc. The design of flameproof motor is such that it allows and sustain explosion within the enclosure caused by ignition of hazardous gases without transmitting it to the external flammable atmosphere. The enclosure is mechanically strong enough to withstand the explosion pressure developed inside it. To prevent an explosion due to hot spot on the surface of the motor, flameproof induction motors are subjected to heat run test to determine the maximum surface temperature and temperature class with respect to the ignition temperature of the surrounding flammable gas atmosphere. This paper highlights the design features of flameproof motors and their surface temperature classification for different sizes.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Performance Assessment of Polyphase Sequences Using Cyclic Algorithm
1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 8 224 – 229
_______________________________________________________________________________________________
224
IJRITCC | August 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Performance Assessment of Polyphase Sequences Using Cyclic Algorithm
M. Rajasekhar
Research Scholar, Dept. of ECE
AU College of Engineering (A)
Visakhapatnam-530003, India
raja.sekhar441@yahoo.co.in
Dr. P. Rajesh Kumar
Professor & Chairman BoS, Dept. of ECE
AU College of Engineering (A)
Visakhapatnam-530003, India
rajeshauce@gmail.com
Abstract—Polyphase Sequences (known as P1, P2, Px, Frank) exist for a square integer length with good auto correlation properties are helpful
in the several applications. Unlike the Barker and Binary Sequences which exist for certain length and exhibits a maximum of two digit merit
factor. The Integrated Sidelobe level (ISL) is often used to define excellence of the autocorrelation properties of given Polyphase sequence. In
this paper, we present the application of Cyclic Algorithm named CA which minimizes the ISL (Integrated Sidelobe Level) related metric which
in turn improve the Merit factor to a greater extent is main thing in applications like RADAR, SONAR and communications. To illustrate the
performance of the P1, P2, Px, Frank sequences when cyclic Algorithm is applied. we presented a number of examples for integer lengths.
CA(Px) sequence exhibits the good Merit Factor among all the Polyphase sequences that are considered.
Keywords-Polyphase sequence, Cyclic Algorithm, Correlation level, Integrated sidelobe level, Merit Factor,
__________________________________________________*****_________________________________________________
I. INTRODUCTION
Radar waveform designs have examined Polyphase
sequences for a long time as a productive contracting option to
the diverse classes of Frequency-modulated signals [1][2]. In
radar & communication, sequences with good autocorrelation
properties are of main interest. The “goodness” depends on the
application we use. Frank sequence merit factors are analyzed
in [3]. P2 &Px sequences derived from linear-frequency-
modulated [4]. Frank & P1 are designed from step
approximation-to-linear frequency-modulation waveform [5].
Frank sequence merit factors are better than Chu. The two of
them significantly outperform binary sequences [6][7].
The sequences can be processed digitally even though they
are deriving from phase history of chirp or step-chirp Analog
signals. By and by, radar waveforms might be upgraded in a
first plan step by utilizing relationship measures and thus
connects with the uncertainty capacity to assess the effect of
phase shift changes on the execution. Prevalent execution as far
as the incorporated Sidelobe levels contrasted with the Frank
and P1 sequence is given by Px sequences that have been
presented by Rapajic and Kennedy [8].
The ideas driving Frank sequences have later been summed
up to encourage plans of Polyphase sequence of any length and
related work was combined in the plain Zad-off-Chu(FZC)
sequences or Chu Sequence[9][10]. A few execution parts of
the previously mentioned classes of Polyphase sequences have
been accounted for in writing fined years [11][12]. These
sequences were initially presented inside the specific
circumstance of utilizations for code division various to
(CDMA) frame works, while these conducts inside radar
situations have not been considered so for to the best of our
insight [13].
This paper is organized as follows. Section II characterizes
the measures used to encourage a quantitative execution
assessment of good correlation sequence. Section III presents
the essentials on classes of Polyphase sequences that are
utilized with radar applications. Section IV presents the basic
cyclic algorithm. On the basis of numerical results for
different are given in Section V. Section VI concludes the
paper.
II. PERFORMANCE MEASURES
Let N denotes the length of each Polyphase sequences
Ck=[Ck(0),Ck(1),….,Ck(N-1)…..] of a size P where
11 Nk
A. Correlation Function
The correlation function at a discrete shift k between a
Polyphase sequence is given by
1,......1,0,
**
1
Nkcxxc kkn
N
kn
nk
(1)
Where
*
)( denotes the complex conjugate for scalar & the
conjugate transpose for vector & matrices.
B. Integrated Sidelobe Level (ISL)
TThe ISL for the Polyphase sequence
Ck=[Ck(0),Ck(1),….,Ck(N-1) can be defined as follows
1
1
2N
k
ckISL is the ISL metric (2)
The primary concentration of this paper is on calculation for
limiting the ISL metric or ISL related measurements over the
arrangement of Polyphase sequences. Note that minimization
of ISL metric is proportional to the improvement of the merit
factor defined as a performance metric in the below.
C. Merit Factor(MF)
The MF for the Polyphase sequence Ck=[Ck(0),Ck(1),….,Ck(N-
1) is defined as follows
ISL
k
MF N
C
C
N
ok
Nk
2
0
2
1
)1(
2
2
(3)
Polyphase sequences with good merit factor are desired in
many applications including range compression radar and
sonar and wireless communication.
2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 8 224 – 229
_______________________________________________________________________________________________
225
IJRITCC | August 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
III. POLYPHASE SEQUENCES CLASSES
This section, we will describe the definitions of the
considered Polyphase sequence classes in terms of phases &
autocorrelation function. We adopted the sequence as it is used
in many radar-related publication work & communication
systems. In particular the P1, P2,Px, Frank sequences will be
described for radar applications. on behalf of that these
sequences beneficial properties and remarks also said.
A. Frank Sequence
Let the Polyphase sequence ),,.........,( 21 xxx N
X of a
square integer length N=M2
(where M is a prime number). Due
to work on phase shift pulse codes in [14].The history of
complex-valued back as far as the 1950‟s.
The sequence elements are arranged as a M x M Matrix and
are given by Mth
roots of unity
M
jw 2exp (5)
From the above, the actual Length „N‟ of Polyphase sequence
can be produced by matrix of roots of units row-by-row.
Polyphase sequence of perfect square length N=M2
are shown
in [15]. the related sequence are referred to as Frank sequence.
Frank Sequence: The elements xk(m,n) of kth
Frank sequence
is given as a matrix
mn
M
k
jnmx
MXM
MM
K k
X
2
exp)],([
-- (6)
The Phase components are mnk
Mk
2
Where 11 Mk , 1,0 Mnm and gcd(k,m)=1is
required. (m,n)th
element s of (8) can be point to the ith
element of a sequence length N in terms of the phase sequence
as follows
)()(),(: nmMinmnmMi kkk
(7)
B. P1, P2, Px Sequence
This sequence can be considered for perfect square
length N=M2
only. In P1, P2, Px the phase components are
rearranged version of Frank phase components [16] by cluster
of zeros placed in the central part of the sequence.
)],(exp[),()()( nmjnmpnmMpip (8)
here 1,0 Mnm and the phase components are
P1sequence: nmMm
M
M
nm
2
12
),(
(9)
P2 sequence:
n
M
m
M
M
nm
2
1
2
12
),(
(10)
Similarly for Px sequence Px:
evenMn
M
m
M
M
nm
2
1
2
12
),(
(11)
oddMn
M
m
M
M
nm
2
2
2
12
),(
(12)
Here 1,0 Mnm . Note that the phase elements of Px
are similar to that of P2 for M even.
IV. CYCLIC ALGORITHM
The approach in the following is much simpler &
computationally efficient than applying the optimization
technique for the Polyphase sequence [16] and [17]. This
makes feasible to work with quite large values of N (in some
radar and imaging applications we can choose 1000~N ). It
means we can choose Q first from practical consideration and
select QN on computational as well as practical operation
accounts.
Let C
~
be the following block-Toeplitz matrix
1
11
11
)()1(0
0)()1(
)()1(0
0)()1(
~
KL
NN
NN
L
L
L
L
C
CC
CC
CC
CC (13)
Note that C
~
is )1( KLCNL . The auto & cross
correlation appeared in below are the elements of the positive
–semi finite matrix
CC
~~
.
N
n
L
nnn
p
pp
N
n
L
LLL
prpr nnnn
1
1
~,1~
1
1
2
1
1
0,1
2
)()( ~ (14)
Where
,...2,1,0),()()()( ~~
1
~
ppxplxlxpr nnn
L
pl
nnn
(15)
denote the (cross)- correlation of )(lxn
and )(~ lxn
at lag
.Consequently, a criterion related to above equation (15)
which has more compact form of the following
2
*
2
~~1
KICC
NLK
(16)
The above equation is the generalized correlation coefficient;
and we use this equation to evaluate the correlation quality of
a waveform. In such a case where *~~
CC is singular, it follows
that the maximum magnitude of its off-diagonal elements must
be of the order 1O or larger; consequently, the ratio
between )(max ~~,, pr nnnnp
and Krnn )0( is of the order
)/1( LO but not smaller.
In the following we assume that
1
1
1
1
1
N
K
Lposibly
N
K
LKLNL (17)
Under the above equation, if we relax any requirement on the
elements and the structure of C
~
, then the class matrix C
~
that
satisfies the equality KICC *~~
is given by
UKC
~
(18)
Where U is an arbitrary semi-unitary matrix [18] i.e.
IUU *
usually the observation, we can reformulate (18) or
(20) in the following related(but bot equivalent) way:
2
)},({
~
min UKC
Uln
(19)
This is a non-convex problem, the following cyclic
minimization algorithm [19] [20], that is conceptually
3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 8 224 – 229
_______________________________________________________________________________________________
226
IJRITCC | August 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
&computationally simple and also have good local
convergence properties.
A. BLOCK DIAGRAM OF THE CA
Step 1 Step 2
Cyclic Algorithm
Step 0:Initialize Uor possibly C
~
(in which case the sequence
of the next steps should be inverted), at some value suggested
by “prior knowledge”. i.e. initializing C with possibly good
existing sequence of Polyphase sequence (P1, P2, Px, Frank)
Step 1: Compute the semi-unitary matrix U& minimize the
(19) with respect to )}({ ln .
Step 2: with )}({ ln set to the most-recent values, minimize
the (19) w.r.to U.
Iteration: repeat step 1 and 2 until a practical convergence
criterion is satisfied.
The iteration can be terminated, when the relative difference
of the cost in (19) (i.e. the cost difference normalized by the
cost of the previous iteration) is less than or equal to the 10-3
value in the numerical example illustrated.
The minimization problem in step 1 has the following generic
form
j
L
p
L
p
eZpconstZpe j
1
2
1
Re2minmin
(20)
L
p
Zp
1
argcosmax
(21)
Where Zp are numbers given in (20) (21). The solution to
the above equation is given by
L
p
Zp
1
arg
(22)
In step 2 of the CA, the minimization problem solution can be
easily computed as. Let
*~~
UUCK (23)
Above equation denotes the singular value decomposition
(SVD) of CK
~
, when U is NLNL , and U
~
is
NLKL )1( then the said solution is given by [21][22].
*~
UU (24)
Consider the simple illustration that with N=4 and L=22. Fig
1 shows the generalized correlation coefficient of the
waveform given by the CA, as a function of Sampler Number
L.(Note that for L<94, the GCC is too large to be of any
practical interest). As L increases, we can achieve the goal of
obtaining sequence with small value of auto & cross
correlation effectively which is sign of improving the Merit
Factor [23]. Additional simulation examples are shown in the
next section for different values of N.
Fig 1 Sample number Vs. GCC via Cyclic Algorithm
V RESULTS
We compared the merit factors of the Polyphase
sequence (P1, P2, Px, Frank), and that of CA Algorithm
initialized by sequence said above( denoted as CA(P1),
CA(P2), CA(Px), CA(Frank).
Note that the above sequences can be calculated for any value
of N of possible practical interest, with the only restriction that
N must be perfect square for Frank, P1, P2, Px sequences. We
computed the Merit factors of above eight type sequences (P1,
P2,Px, Frank) for the following length shown in Table I. the
results are shown in Fig (1 & 2). The correlation level is
defined as
1,...,1,log20
0
10 Nk
c
c
LevelnCorrelatio k
(25)
We calculated the Merit Factor of Polyphase
sequences for the lengths N=100 and N=256 and note that the
correlation levels of the CA(Px) and CA(Frank)sequence are
comparatively small from k close to zero and N-1.
The Merit Factor of Polyphase sequences using
conventional and cyclic algorithm for N=100 and N=256 are
shown in TABLE I. In conventional method the P2, Frank
exhibits the nearly same merit factor for length N=100 and P1,
P2 have the same merit factor for length N=256. The Px
exhibits the good merit factor among all the sequences when
cyclic algorithm is applied for both the lengths N=100 & 256.
Merit Factor of Polyphase sequences (p1, p2, Px,
frank) for integer values M=2 to 16 (i.e. N=4 to 256 where
N=M2
), the merit factor are exist lengths N=16 to N=256 are
shown in TABLE II. We notice that for integer values M=11 &
13 all the sequences such as CA(P1), CA(P2), CA(Px),
80 100 120 140 160 180 200 220 240 260 280
-55
-50
-45
-40
-35
-30
-25
-20
-15
-10
-5
Sample Number
GCCindB
Input Data or good existing
Sequence of Polyphase
sequence
P1,P2,Px,
Frank
Compute the correlation
Function and normalize
result
Minimization
Problem
Compute the ISL
Metric
Computing the
Merit Factor
Plotting the result
i.e. Sequence length
Vs. Correlation
Level
4. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 8 224 – 229
_______________________________________________________________________________________________
227
IJRITCC | August 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
CA(Frank) exhibits the approximate value of the merit factor
for the co-integer values. Where the 11 and 13 are the prime
numbers. So, the P1, P2, Px, Frank can exhibit the good merit
factor for the sequences length N which are obtained from the
prime integer. Merit factor vs. sequence length are shown in
Fig. 3 and Fig. 4 for the conventional and when cyclic
algorithm applied.
TABLE I MERIT FACTOR OF POLYPHASE SEQUENCES
USING CONVENTIONAL AND CYCLIC ALGORITHM
FOR N=100 AND N=256.
Polyphase
Sequences
Conventional
Method
Merit Factor
Polyphase
Sequences
with
Cyclic
Algorithm
CA
Merit Factor
N=100 N=256 N=100 N=256
P1 22.452 36.103 CA(P1) 60.014 92.342
P2 23.121 36.014 CA(P2) 60.213 93.789
Px 25.012 40.012 CA(Px) 67.344 107.732
Frank 23.592 38.214
CA
(Frank)
61.414 94.355
TABLE II MERIT FACTOR OF POLYPHSE SEQUENCES
(P1, P2, Px, Frank) FOR LENGTHS N=4 TO N=256.
Sequence Length N=M2
M N
MF for
CA(P1)
MF for
CA(P2)
MF for
CA(Px)
MF for
CA(Frank)
2 4 --- ---- ---- ----
3 9 --- ---- ---- ----
4 16 8.614 8.081 12.808 10.671
5 25 13.459 14.0193 21.325 19.215
6 36 19.380 19.942 34.172 31.587
7 49 29.408 30.718 46.536 45.345
8 64 38.411 39.415 56.020 51.421
9 81 48.615 50.615 59.610 56.192
10 100 60.014 60.213 67.344 61.414
11 121 75.612 76.354 87.486 73.405
12 144 72.850 73.015 81.438 68.147
13 169 88.412 91.031 105.417 93.012
14 196 79.451 81.247 91.325 85.410
15 225 81.159 84.564 97.142 87.621
16 256 92.342 93.789 107.732 94.355
(a)
(b)
(c)
(d)
Fig 1. Correlation levels of the (a) CA(P1), (b) CA( P2), (c)
CA(Px) (d) CA(Frank) for the length N=100.
(a)
-100 -50 0 50 100
-250
-200
-150
-100
-50
0
k
CorrelationLevelin(dB)
CA(P1)
-100 -50 0 50 100
-250
-200
-150
-100
-50
0
k
CorrelationLevelin(dB)
CA(P2)
-100 -50 0 50 100
-250
-200
-150
-100
-50
0
k
CorrelationLevelin(dB)
CA(Px)
-100 -50 0 50 100
-250
-200
-150
-100
-50
0
k
CorrelationLevelin(dB)
CA(Frank)
-200 -100 0 100 200
-300
-200
-100
0
k
CorrelationLevelin(dB)
CA(P1)N=256
5. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 8 224 – 229
_______________________________________________________________________________________________
228
IJRITCC | August 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
(b)
(c)
(d)
Fig 2. Correlation levels of the (a) CA(P1), (b) CA( P2), (c)
CA(Px) (d) CA(Frank) for the length N=256.
Fig 3. Merit Factor of the P1, P2, Px, Frank for the length N=0
to 256.
Fig 4 Merit Factor of CA(P1), CA(P2), CA(Px), CA(Frank)
for the lengths N=0 to 256.
VI CONCLUSION
This paper presents the cyclic algorithm namely CA,
which can be applied to the Polyphase sequences such as P1,
P2, Px, Frank that have good correlation properties. The CA
algorithm makes use of SVD of matrix NLNL can be
computationally efficient upto the length of N=256. In
conventional method the best Merit Factor is obtained for Px
sequence only of 25.012& 40.012 for length N=100& 256
respectively. But when Cyclic Algorithm is appliedthe CA(Px)
and CA(Frank) sequences exhibits the better merit Factor
61.344 & 61.414 for N=100, 107.732 & 94.355 for N=256
respectively. The P1, P2, Px, Frank express good merit factor
for the M=11, 13 which are prime numbers (i.e. N=M2
,
N=121, 169). The merit factor comparison between P1, P2,
Px, Frank is Px>Frank>P2>P1. The minimum integer value in
N=M2
we can apply the CA is M=4 and maximum is 16.
V REFERENCES
[1] N. Levanon and E. Mozeson, “Radar Signals,” Chichester: John
Wiley & Sons, 2004.
[2] S. W. Golomb and G. Gong, “Signal Design for Good
Correlation for Wireless Communication, Cryptography, and
Radar,” Cambridge: Cambridge University Press, 2005.
[3] M. Antweller and L. Bomer, “Merit factor of Chu and Frank
sequences,” Electron. Lett., vol. 26, pp. 2068-2070, Dec. 1990.
[4] Lewis, B. L., and Kretschmer, F. F., Jr.(1982), “liner frequency
modulation derived Polyphase pulse compression codes” IEEE
Trans. Aerospace and Electronic Systems, AES-17, 5(September
1982), 637-641.
[5] Kretschmer, F.F.,Jr.,and Lewis, B.L.(1983). “Doppler properties
of Polyphase coded pulse compression waveforms.”IEEE Trans.
Aerospace and Electronic Systems. AES-19, 4(July 1983), 521-
531.
[6] J. Jedwab, “ A survey of the merit factor problem for binary
sequences,” in sequences and Their Applications – SETA 2004,
T. Helleseth, D. Sarwate, H. Y. Song, and K. Yang, Eds.
Heidelberg, Germany: Springer-Verlag, 2005, vol.3486, Lecture
Notes in Computer Science, pp. 30-55.
[7] M. J. E. Golay. “Sieves for low autocorrelation binary
sequences,” IEEE Trans. Inf. Theory, vol. IT-23, pp. 43-51, Jan.
1977.
[8] P. B. Rapajic and R. A. Kennedy, “Merit Factor Based
Comparison of New Polyphase Sequences,” IEEE Commun.
Letters, vol. 2, no. 10, pp. 269– 270, Oct. 1998
[9] R. L. Frank and S. A. Zadoff, “Phase Shift Pulse Codes with
Good Periodic Correlation Properties,” IEEE Trans. on Inf.
Theory, vol. 19, no. 1, pp. 115-120, Jan. 1975.
[10] D. C. Chu, “Polyphase Codes with Good Periodic Correlation
Properties,” IEEE Trans. on Inf. Theory, vol. 18, no. 4, pp. 531-
532, July 1972.
-200 -100 0 100 200
-300
-200
-100
0
k
CorrelationLevelin(dB)
CA(P2)N=256
-200 -100 0 100 200
-300
-200
-100
0
k
CorrelationLevelin(dB)
CA(Px)N=256
-200 -100 0 100 200
-300
-200
-100
0
k
CorrelationLevelin(dB)
CA(Frank)N=256
0 50 100 150 200 250 300
0
10
20
30
40
50
Sequence Length N
MeritFactor
P1
P2
Px
Frank
0 50 100 150 200 250 300
0
20
40
60
80
100
120
Sequence Length N
MeritFactor
CA(P1)
CA(P2)
CA(Px)
CA(Frank)
6. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 8 224 – 229
_______________________________________________________________________________________________
229
IJRITCC | August 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
[11] B. L. Lewis and F. F. Kretschmer, “Linear Frequency
Modulation Derived Polyphase Pulse Compression Codes,”
IEEE Trans. on Aerospace and Electronic Systems, vol. 18, no.
5, pp. 637–641, Sept. 1982.
[12] F. F. Kretschmer and B. L. Lewis, “Doppler Properties of
Polyphase Coded Pulse Compression Waveforms,” IEEE Trans.
on Aerospace and Electronic Systems, vol. 19, no. 4, pp. 521-
531, July 1983.
[13] B. L. Lewis and F. F. Kretschemer, “ A New Class of Polyphase
Pulse Compression Codes and Techniques, “IEEE Trans, on
Aerospace and Electronic Systems, vol. 17, no. 3, pp. 364-372,
May 1981.
[14] R. C. Heimiller, “Phase Shift Pulse Codes with Good Perodic
Correlatin Properties” IRE Trans. On Inf. Therory, Vol. 7, pp.
254-257, Oct. 1961.
[15] R. L. Frank and S. A. Zadoff, “Phase Shift Pulse Codes with
Good Periodic Correlation Properties,: IEEE. Trans. On Inf.
Theory, vol. 19, no. 1, pp. 115-120, Jan. 1975.
[16] H. Deng, “Polyphase code design for orthogonal netted radar
systems,” IEEE Trans. Signal Process., vol. 52, no. 1, pp. 3126-
3135, Nov. 2004.
[17] H. A. Khan, Y. Zhang, C. Ji, C. J. Stevens, D. J. Edwards, and
D. O‟Brien, “Optmizing Polyphase sequence for orthogonal
netted radar,” IEEE Trans. Signal Process., vol. 13, no. 10, pp.
584-592, Oct. 2006.
[18] P. Stoica, H. He, and J. Li, “New algorithms for desigining
unimodilar sequences with good correlation properties,” IEEE
Transactions on Signal Processing, vol. 57, no. 4, pp. 1415-
1425, April 2003.
[19] J. A. Tropp, I. S. Dhillon, R. W. Heath, and T. Strohmer,
“CDMA signature sequences with low peak-to-average-power
ratio via alternating projection,” in Proc. 37th
Asilomar Conf.
Signals, Systems, Computers, Pacific Grove, CA, Nov. 2013,
vol. 1, pp. 475-479.
[20] J. A. Tropp, I. S. Dhillon, R. W. Heath, and T. Strohmer, “
Designing structured tight frames via an alternating projection
method,” IEEE Trans. Inf. Theory, vol. 51, no. 1, pp. 188-209,
Jan. 2005.
[21] C. R. Rao, “Matrix approximations and reduction of
dimensionality in multivariate statistical analysis,” in
Multivariate Analysis, P. R. Krishnaiah, Ed. Amsterdam, The
Netherlands: North-Holland, 1980, Vol. 5, pp. 3-22.
[22] R. A. Horn and C. R. Johnson, Matrix Analysis. Cambridge,
U.K.: Cambridge Univ. Press, 1985.
[23] J. Li, P. Stoica, and J. Li, “Signal synthesis and receiver design
for MIMO radar imaging,” IEEE Trans. Signal Process., vol.56,
pp. 2593-2598.