Volume-8 ~ Issue-2
- Citation
- Abstract
- Reference
- Full PDF
Abstract: A Real-Time accident prevention system has been proposed in which the drowsy condition of the driver can be detected and Speed Controlling will be performed for each condition automatically. There are different ways to detect drowsiness one of them are using camera that points directly towards the driver's face and monitors the driver's eyes in order to detect fatigue. We have developed a drowsy driver detection system using Brain Computer Interface ,the system deals with EEG Signal obtained from the brain ,when rhythms are plotted on PC we can see the fluctuations of rhythms when subject is falling to drowsy or deep sleep in accordance with a appropriate voltage under normal condition and drowsy condition are read on software application, using these voltage under two states we have developed a alert system and speed controlling for drowsy driver .However, the current BCI system is developed to detect the drowsiness ,cognitive state and when drowsy state occurs a warning tone is employed to alert him from the drowsy state, in some cases when driver don't respond to the warning tone, the speed of vehicle rapidly reduced and finally the vehicle will be stopped.
Keywords : Brain Computer Interface,Cognitive,Drowsy,EEG,Speed Controlling.
[1] Brown ID. "Driver fatigue and road safety. Alcohol, Drugs and Driving" 1993.
[2] J.D Wu, T.R Chen "Development of a drowsiness warning system based on the fuzzy logic images analysis" Expert Systems with Applications 34 (2008), pp. 1556–1561.
[3] Brown ID "Driver fatigue Human Factors", 1994. pp:298-314.
[4] G.Maycock. "Sleepiness And Driving : Experience of UK Cars Drivers" vol 5 1996.
[5] L.A.Rayner ,J.A.Horne. 23 June 1997."Falling asleep whilst driving drivers aware of prior sleepiness.
[6] S. Makeig and M. Inlow, "Lapses in alertness: Coherence of fluctuations in performance and EEG spectrum," Electroencephalography Clinical Neurophysiol., vol. 86, no. 1, pp. 23–35, 1993.
[7] W. Klimesch, "EEG alpha and theta oscillations reflect cognitive and memory performance: A review and analysis," Brain Res. Rev., vol. 29, pp. 169–195, 1999.
[8] M. A. Schier, "Changes in EEG alpha power during simulated driving " ,2000.
[9] Jim Horne and Louise Reyner, Sleep Related Vehicle Accidents, Sleep Research Laboratory, Loughborough University, 2000.
[10] G.E. Birch and S.G. Mason. Brain-Computer Interface Research at the Neil Squire Foundation, IEEE Trans. Rehab. Eng., 8(2), 193-95, 2000.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In this paper we will discuss the methods of iris recognition method and present their simulation results. Start from the novel segmentation method which is based on use of Geodesic Active Counters (GAC) in order to extract the iris from surrounding structures. Further for the features extraction and localization, we have used the well known method called Gabor filters. At the end for the matching we have used normalized correlation-based iris matching method. This proposed matching system is a fusion of global and local Gabor phase correlation schemes. We have measured performance in terms of false acceptance rate, false rejection rate and compared against our previous approach of iris recognition using MATLAB.
Keywords: Human iris pattern, Iris Segmentation, Geodesic Active Counters, Gabor filters, False Acceptance Rate, False Rejection Rate.
[1] D. M. Monro, S. Rakshit, and Z. Dexin, "DCT-based iris recognition,"IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 4, pp. 586– 595,APR 2007.
[2] R. P.Wildes, "Iris recognition: An emerging biometric technology," Proc. IEEE, vol. 85, no. 9, pp. 1348–1363, Sep. 1997.Apr. 2007.
[3] N.A. Schmid, M.V. Ketkar, H. Singh, and B.Cukic, "PerformanceAnalysis of Iris- Based Identification System at the Matching ScoreLevel," IEEE Trans. Information Forensics and Security, vol. 1, no. 2,pp. 154-168, June 2006.
[4] W.W. Boles, B. Boashash, A human identification technique using images ofthe iris and wavelet transform, IEEE Trans. Signal Process. 46 (4) (1998) 1185–1188.
[5] James R. Matey, Oleg Naroditsky, Keith Hanna, Ray Kolczynski, Dominick J. LoIacono, Shakuntala Mangru, Michael Tinker, Thomas M. Zappia, and Wenyi Y. Zhao, "Iris on the Move: Acquisition of Images for Iris Recognition in Less Constrained Environments", Proceedings of the IEEE, Vol. 94, No. 11, pp. 1936 – 1947, November 2006.
[6] S. Shah and A. Ross, "Iris segmentation using geodesic active contours", IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp. 824–836, Dec. 2009.
[7] T. Weldon, W.E. Higgins, D.F. Dunn, Efficient Gabor-filter design for texture segmentation, Pattern Recognition 29 (12)(1996) 2005–2016.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: With rapidly growing network, Internet has become a primary source of transmitting confidential or secret data such as military information, financial documents, etc. In such cases, techniques devoted to protect such kind of information are needed and they play an important role in providing confidential and secure transmission over network. Visual Cryptography is also one of them which is used to hide secret visual information (such as image, text, etc) in which secret sharing scheme is used. Secret sharing is used to encrypt a secret image into customized versions of the original image. There are many secret sharing algorithms in literature including Shamir, Blakley, and Asmuth-Bloom to divide the image into no. of shares. These sharing schemes lead to computational complexity and also generate shares like noisy images. Then afterwards Lin & Tsai proposed a scheme which creates meaningful shares but having same computational complexity as like Shamir's scheme. Along with this, in these schemes, as decryption is done using Human Visual system, the secret can be retrieved by anyone if person get at least k no. of shares. To overcome all above problems, we are suggesting one new method in which a symmetric secret key is used to encrypt the image and then secret shares are generated from this image using Novel secret sharing technique with steganography. So, finally this method will produce meaningful shares and use of secret key will ensure the security of scheme. This scheme can become a reliable solution suitable for today's authentication challenges.
Index Terms: Visual cryptography, Secret sharing, steganography.
[1] Prabir Naskar, Ayan Chaudhuri, Atal Chaudhuri "Image Secret Sharing Scheme Using a Novel Secret Sharing Technique with Steganography ", IEEE CASCOM Post Graduate Student Paper Conference 2010, Kolkata, India,Nov. 27, 2010, pp-62-65.
[2] Satyendra Nath Mandal, Subhankar Dutta and Ritam Sarkar, "Block Based Symmetry Key Visual Cryptography", I. J. Computer Network and Information Security, 2012, 9, pp-10-19.
[3] Feng Liu and Chuankun Wu, Senior Member, IEEE "Embedded Extended Visual Cryptography Schemes" IEEE Transactions on information forensics and security, vol. 6, no. 2, June 2011, pp-307-322.
[4] A. Shamir, "How to share a secret," Proc. Comm. ACM, vol. (2), 612-613, 1979.
[5] G. Blakley, "Safeguarding cryptographic keys," Proc. the National Computer Conference, NJ, USA, 1979.
[6] C. Asmuth and J. Bloom, "A modular approach to key safeguarding", IEEE Transaction on Information Theory, 29(2), 1983, pp-208-210.
[7] C.C. Lin and W.H. Tsai, "Secret image sharing with steganography and authentication", Journal of Systems and software, vol. 73, no. 3, 2004, pp. 405-414.
[8] Kai-Hui Lee and Pei-Ling Chiu, "An Extended Visual Cryptography Algorithm for General Access Structures", IEEE Transactions on information forensics and security, vol. 7, no. 1, February 2012, pp-219-229.
[9] Subramania Sudharsanan, Senior Member, IEEE, "Shared Key Encryption of JPEG Color Images", IEEE Transactions on Consumer Electronics, Vol. 51, No. 4, NOVEMBER 2005, pp-1204-1211.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Modeling and Analysis of LPI Radar Signal |
Country | : | India |
Authors | : | Ramya Vellanki, K. Satish Babu |
: | 10.9790/2834-0821926 |
Abstract: Radar Emitter Signal recognition is one of the key procedures of signal processing in Electronic Warfare (EW) Receiver. As there is an intense growth in the activities of modern Electronic Warfare, advanced radars are increasing and becoming main component of radars gradually. These modern radars called Low Probability of Intercept (LPI), use different complex waveforms to mask their presence from the enemy while accomplishing their mission. These waveforms cannot be detected by the use of traditional recognition algorithms and methods thus posing a major challenge to the Electronic Warfare designer. This paper presents simulation of different types of LPI signals, generation of those signals and development of Time Frequency Algorithm to analyze those signals.
Keywords: Cross terms, ELINT (Electronic Intelligence), EW (Electronic Warfare), Intercept Receiver, LPI (Low Probability of Intercept).
[1] Philip E Pace, Detecting and Classifying LPI Radar, Second Edition, (Artech House, Inc., Norwood, Massachusetts, 2009).
[2] F.Taboada, A.Lima, J.Gau, P.Jarpa, and P.E.Pace, Intercept Receiver Signal Processing Techniques to Detect Low Probability of Intercept Radar Signals.
[3] Gau, J-Y, Analysis of Low Probability of Intercept Radar Signals using the Wigner Distribution, Naval Postgraduate School Master's Thesis, Sept. 2002.
[4] Aytuk Denk, Detection and Jamming Low Probability of Intercept (LPI) Radars, Naval Postgraduate School Master's Thesis, Sept. 2006.
[5] H.I.Choi and W.J.Williams, Improved time-frequency representation of multicomponent signals using exponential kernels: IEEE Trans. on Acoustics, Speech, and Signal Processing, vol. 37, no 6, pp. 862-871, 1989.
[6] L.Cohen, Time-frequency distributions: A review, Proc. IEEE, vol. 77, no 7, 1989, pp. 941-981.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Design and Verification of USB-I2C Bridge Protocol by OVM |
Country | : | India |
Authors | : | K. Surya Narayana Reddy, K. Jansi Lakshmi |
: | 10.9790/2834-0822731 |
Abstract: The challenge of the verifying a large design is growing exponentially. There is a need to define new methods that makes functional verification easy. Several strategies in the recent years have been proposed to achieve good functional verification with less effort. Recent advancement towards this goal is methodologies. The methodology defines a skeleton over which one can add flesh and skin to their requirements to achieve functional verification. Open verification methodology (OVM) is one such efficient methodology and best thing about it is, it is free. This OVM is built on system verilog and used effectively to achieve maintainability, reusability, speed of verification etc. This project is aimed at building a reusable test bench for verifying Usb-I2c Bridge Protocol by using System Verilog and OVM
Keywords: verification; methodology; Usb-I2c Bridge Protocol; System Verilog;
[1] J.Bergeron," what is verification?," in Writing TestBenches:Functional Verification of HDL Models, 2nd ed.New York:Springerscience,2003, ch1,pp.1-24.
[2] Mihaela E.Radhu and Shannon M.Sexton,"Integrating Extensive Functional Verification into digital design Education",IEEE Trans.Educ.,vol 51,no.3,pp 385-393,Aug.2008.
[3] http://testbench.in?TB_07_VERIFICATION_FLOW.html
[4] http:/www.doulos.com?knowhow/systemverilog/ovm/tutorial_0/
[5] http:/www.ovmworld.org/white_paper.php
[6] http://www.ovmworld.org?whitepapers/OVM_Whitepaper_12-21-07.pdf
[7] ovm_open-verification-methodology_cookbook.pdf
[8] http://www.testbench.in/OT_02_OVM_TESTBENCH.htm
[9] http://www.opencores.org/projects.cgi/web/usb2.0-i2c protocol/overview
[10] Wile,J.C.Goss and W.Roesner,"Comprehensive Functional Verification," MorganKaufmann,ISBN-10:0-12-751803-7,Elsevier 2005.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Technological Advances in Flexible Displays and Substrates |
Country | : | India |
Authors | : | Aditya Sharma, Piyush Mudgal, Jatin aggrawal |
: | 10.9790/2834-0823235 |
Abstract: Nowadays, whether it is about watching television, surfing the web or playing video games, screens are part of everyone's daily life and until now users have been limited to rigid formats of screen that can easily be broken. This physical inflexibility restricts designers and users who have to choose between various screen size function of the media they want to watch or share. The emergence of new flexible displays could be a real improvement and change the way people interact with electronic devices. This paper will discuss about how work these new screens, what special user experience will it bring and how it could change the market. The discussion will be focused on flexible displays and its implementation in mobile phone screens.
Keywords: Screen, flexible display, roll-able display, mobile phone, smartphone, organic light-emitting diode, OLED, FOLED, AMOLED, TOLED, e-paper.
[1]. K. Nomura, H. Ohta, K. Ueda, T. Kamiya, M. Hirano, and H. Hosono, Science 300, 1269 (2003).
[2]. K. Nomura, H. Ohta, A. Takagi, T. Kamiya, M. Hirano, and H. Hosono, Nature 432, 488 (2004).
[3]. E. Fortunato, P. Barquinha, and R. Martins, Adv. Mater. 24, 2945 (2012).
[4]. H. Q. Chiang, J. F. Wager, R. L. Hoffman, J. Jeong, and D. A. Keszler, Appl. Phys. Lett. 86, 013503 (2005).
[5]. T. Miyasako, M. Senoo, and E. Tokumitsu, Appl. Phys. Lett. 86, 162902 (2005).
[6]. N. L. Dehuff, E. S. Kettenring, D. Hong, H. Q. Chiang, J. F. Wager, R. L. Hoffman, C.-H. Park, and D. A. Keszler, J. Appl. Phys. 97, 064505 (2005).
[7]. M. S. Grover, P. A. Hersh, H. Q. Chiang, E. S. Kettenring, J. F. Wager, and D. A. Keszler, J. Phys. D 40, 1335 (2007).
[8]. R. E. Presley, D. Hong, H. Q. Chiang, C. M. Hung, R. L. Hoffman, and J. F. Wager, Solid State Electron., 50, 500 (2006).
[9]. J.-S. Park, K. Kim, Y.-G. Park, Y.-G. Mo, H. D. Kim, J. K. Jeong, Adv. Mater. 21, 329 (2009).
[10]. C.-J. Kim, S. Kim, J.-H. Lee, J.-S. Park, S. Kim, J. Park, E. Lee, J. Lee, Y. Park, J. H. Kim, S. T. Shin, and U-I. Chung, Appl. Phys. Lett. 95, 252103 (2009).
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The new Joint Video Team (JVT) video coding standard has garnered increased attention recently. Generally, motion estimation computing array (MECA) performs up to 50% of computations in the entire video coding system, and is typically considered the computationally most important part of video coding systems. For a commercial chip, a video coding system must introduce design for testability (DFT), especially in an MECA. The objective of DFT is to increase the ease with which a device can be tested to guarantee high system reliability. Among these techniques, BIST has an obvious advantage in that expensive test equipment is not needed and tests are low cost. Moreover, BIST can generate test simulations and analyze test responses without outside support, making tests and diagnoses of digital systems quick and effective. However, as the circuit complexity and density increases, the BIST approach must detect the presence of faults and specify their locations for subsequent repair. The extended techniques of BIST are built-in self-diagnosis and built-in self-repair (BISR). This work develops a built-in self-detection/correction (BISDC) architecture for motion estimation computing arrays (MECAs). Based on the error detection/correction concepts of biresidue codes, any single error in each processing element in an MECA can be effectively detected and corrected online using the proposed BISD and built-in self-correction circuits. Performance analysis and evaluation demonstrate that the proposed BISDC architecture performs well in error detection and correction with minor area overhead.
Keywords: Data recovery, error detection, motion estimation, reliability, residue-and-quotient (RQ) code
[1]. "Built- in self-detection/correction architecture for Motion Estimation Computing Arrays", Chun-lung Hsu, chang-Hsin Cheng, and
Yu Liu.VOL.18, No2, February 2010.
[2]. High Throughput and Efficient VLSI Architecture of Integer Motion Estimation for H.264/AVC, Meihua GU, Ningmei YU, Lei ZHU,
Wenhua JIA. (1315-1316).
[3]. "Biresidue Error- Correcting Codes for Computer Arithmetic", Thammavarapu R.N Rao, Member, IEEE.
[4]. "VLSI Test Principles and Architectures", Laung-Terng.
[5]. "Flash memory testing and built-in self-diagnosis with march-like test algorithms," J. C. Yeh, K. L. Cheng, Y. F. Chou, and C. W. Wu.
[6]. P.Gallagher, V. Chickermane, S. Gregor, and T. S. Pierre, "A building block BIST methodology for SOC designs: A case study," in
Proc. Int.Test Conf., Oct. 2001, pp. 111–120.
[7]. "Design of Programmable Logic-BIST Structures Using Verilog for Digital VLSI Circuits", Ramesh Bhakthavatchalu, Archana K R.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Clock regeneration in synchronized data communication system has a very important role to extract the transmitted data correctly. According to very low bit rate with long zero and high signal distortion due to underwater propagation, the recovery would be very difficult, so that a certain technique must be applied to regenerate the clock easily. In this paper will be discussed a simply technical method to regenerate the clock. At the transmitter, amplitude modulator uses carrier frequency coherent with the data rate in the system. It is done by generating clock pulses as a fraction of the carrier wave. In addition to the coherency, modulation index of generated AM to supply underwater acoustic transducer is adjusted to be less than hundred percent. At the receiver, the weak signal is amplified by a frequency selective amplifier for carrier wave signal only. The output contains other weak signal and noise. To find the clear clock pulses, the signal is used as a frequency reference. A Voltage Controlled Oscillator, where its phase and frequency automatically controlled by frequency reference will generate a phase locked wave with the frequency as same as frequency clock at the transmitter side.
Keywords: Coherence, Clock Regeneration, underwater data communication.
[1] Ismail Syamsu, Deni Permana, Using Water as Propagation Medium For Acoustic Wave Communication System, Jurnal Elektronika dan Telekomunikasi, Vol. 9 No. 1, Jan-Jun 2009.
[2] Ismail Syamsu, R & D Communication System Using Underwater Acoustic Wave, Logbook of Annual Research Report PPET-LIPI Bandung : 2009-2010.
[3] Fink G. Donald dan Donald Christian, Electronics Engineer Handbook, McGrw -Hill Book Company, New York: 1986.
[4] Stallings William, Data and Computerl Communications, Macmillan Publishing Company New York : 1991.
[5] Ismail Syamsu, Deni Permana, Underwater Communication System from Bottom to Surface Data Transmission, Jurnal Elektronika dan Telekomunikasi, Vol. 9 No. 2 (Special Edition), Sept. 2009.
[6] S.Wasito, Vademecum Electronic, second Edition, PT Gramedia Pustaka Utama, Jakarta:1995.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Maximizing the life time of wireless sensor networks through various techniques has been the focus of the number of researchers for almost a decade. The techniques so far used have focused on various power aware algorithms and encryption techniques used for the communication between the nodes. Numerous studies earlier have resulted in various mathematical models for deriving bounds on the operating lifetimes of the sensor nodes. However most of the earlier work did not consider the role of the battery dynamics in determining the life time of the sensor nodes. And in most of the cases from the published results from actual deployment indicate that in practice , sensor node lifetimes are far lower than expected due to premature drain of batteries. This reveals an important fact that even the battery itself has an important role to play in determining the life time of the sensor node. It is important to discharge the battery in a systamatic way that maximizes the amount of charge extracted from it. In this paper a survey of all the models presented by the researchers is presented and concludes with suggesting a possible method by which the life time of the sensor node can be further extended.
Keywords: Battery life, Sensor node, Power consumption, Target coverage
[1] Abrams, Z., Goel, A., Plotkin, S.: Set k-cover algorithms for energy efficient monitoring in wireless sensor networks. In: ACM International Symposium on Information Processing in Sensor Networks (IPSN), pp. 424–432 (2004).
[2] Ahuja, S.K., Kini, S., Ramasubramanian, S.: Bounds on coverage time and node density for multi- modality sensing. Ad Hoc Networks (Elsevier) (2009).
[3] Ai, J., Abouzeid, A.A.: Coverage by directional sensors in randomly deployed wireless sensor networks, Journal of Combinatorial Optimization 11(1), 21–41 (2006).
[4] Aly, M., Pruhs, K., Znati, T., Hunsaker, B.: The coverage problem for myopic sensors, In IEEE International Conference on Wireless Networks, Communications and Mobile Computing, pp. 964–968, (2005).
[5] Berman, P., Calinescu, G., Shah, C., Zelikovsky, A.: Power efficient monitoring management in sensor networks. In: IEEE Wireless Communications and Networking Conference (WCNC), pp. 2329–2334 (2004).
[6] Berman, P., Calinescu, G., Shah, C., Zelikovsky, A. "Efficient energy management in sensor networks", In: Pan, Y., Xiao, Y. (eds.) Ad Hoc and Sensor Networks: Wireless Networks and Mobile Computing, Nova Science, New York (2006).
[7] Brinza, D., Zelikovsky, A.: Deeps: Deterministic energy-efficient protocol for sensor networks. In: IEEE the 7th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD), pp. 261–266 (2006).
[8] Cai, Y., Lou, W., Li, M., Li, X.Y.: Target-oriented scheduling in directional sensor networks. In: IEEE Infocom, pp. 1–9, (2007).
[9] Cardei, M., Du, D.Z., "Improving wireless sensor network lifetime through power aware organization", Wireless Networks, 11(3), 333–340 (2005).
[10] Cardei, M., Thai, M.T., Li, Y., Wu, W.: Energy-efficient target coverage in wireless sensor networks. In: IEEE Infocom, pp. 1976–1984 (2005).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | 'Useful' R-norm Information Measure and its Properties |
Country | : | India |
Authors | : | D. S. Hooda, Keerti Upadhyay. D. K. Sharma |
: | 10.9790/2834-0825257 |
Abstract: In the present communication, a new 'useful' R-norm information measure has been defined and characterized axiomatically. Its particular cases have been discussed. Properties of the new measure have also been studied.
Keywords: non-additivity, R-norm entropy, stochastic independence, utility distribution.
[1]. D. E. Boekee, and J.C.A. Van Der Lubbe, The R-norm Information measure, Information and control, 45, 1980, 136 -155.
[2]. C.E. Shannon, A mathematical theory of communication. Bell System Technology Journal, 27, 1948, 379-423.
[3]. A. Renyi, On measure of entropy and information, Selected paper of Alfored Renyi, 2, 1976, 565-580
[4]. J.Havrda, and F. Charvat, Quantification of classification processes concept of Structural - entropy. Kybernetika, 3, 1967, 30-
35.
[5]. Z. Daroczy, Generalized information function, Information and control, 16, 1970 36-51.
[6]. D.S. Hooda, and Anant Ram, Characterization of the generalized R-norm entropy, Caribbean journal of Mathematical and
Computer science, 8, 2002 18-31.
[7]. S.Arimoto, Information theoretical consideration on estimation proems. Information and control, 19, 1971, 181-199.
[8]. D.S. Hooda, and D.k. Sharma, Generalized R-norm information measures, Journal of Application Math statistics & Informatics,
4(2), 2008 153-168.
[9]. D.S. Hooda, Saxena Sonali, and D.k. Sharma, A Generalized R-norm entropy and coding theorem. International journal of
Mathematical Sciences and Engineering Applications, 5, 2011, 385-393.
[10]. G. Longo, Quantitative-Qualitative Measure of Information, Springer-Verlag, NewYork, 1972.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This paper describes a method for noise removal from ultrasonic signals used in NDE (Non Destructive Evaluation) applications. The method used is FPGA based adaptive noise cancellation. Indeed adaptive filtering is one of the core technologies in digital signal processing. We can find numerous application areas in science as well as in industry. Adaptive filtering techniques are used in a wide range of applications, including system identification, adaptive equalization, adaptive noise cancellation and echo cancellation. Characteristics of signals that are generated by systems of the above application are not known a priori. Under this condition, a significant improvement in performance can be achieved by using adaptive rather than fixed filters. An adaptive filter is a self-designing filter that uses a recursive algorithm (known as adaptation algorithm or adaptive filtering algorithm) to design itself. Here the algorithm used is normalized least mean square algorithm, which has good convergence and stability.
Keywords; Adaptive noise cancellation, NLMS algorithm, NDE applications, ultrasonic grain noise.
[1] H.W. Melief, H.Greidanus, P. Genderen, and P. Hoogeboom, " Analysis of sea spikes in radar sea clutter data", IEEE Transaction on Geoscience and Remote Sensing, Vol. 44, no. 4, pp. 985-993, April 2006.
[2] G.D. De Grandi, J. Lee, and D. L. Schuler, " Target detection and texture segmentation in polarimetric SAR images using a wavelet frame: theoretical aspects", IEEE Transaction on Geoscience and Remote Sensing, Vol. 45, no. 11, pp. 3437-3453, November 2007.
[3] G. Cincotti, G. Loi, and M. Pappalardo, " Frequency decomposition and compounding of ultrasound medical images with wavelet packets", IEEE Transaction on Medical Imaging, Vol. 20, pp. 764-771, August 2001.
[4] Y. Lu, R. Demirli, G.Cardoso, and J. Saniie, "A successive parameter estimation algorithm for chirplet signal decomposition," IEEE Transaction on Ultrasonics, Ferroelectrics, and Frequency Control, vol. 53, pp. 2121-2131, November 2006.
[5] E. Oruklu, and J. Saniie,"Hardware efficient realization of a real time ultrasonic target detection system," IEEE Transaction on Ultrasonics, Ferroelectrics, and Frequency Control, vol. 56, no. 6, pp. 1262-1269, June 2009.
[6] E. Oruklu, and J.Saniie,"Dynamically reconfigurable architecture design for ultrasonic imaging," IEEE Transaction on Instrumentation and Measurement, vol. 58, no. 8, pp. 2856-2866, August 2009.
[7] H. C. Sun, and J. Saniie, "Ultrasonic flaw detection using split-spectrum processing combined with adaptive network based fuzzy inference system," IEEE Proceedings of Ultrasonic Symposium, vol.1, pp. 801-804, 1999.
[8] M. Grevillot, C. Cudel, J. Meyer, and S. Jacquey,"Two approaches to multiple specular echo detection using split specturm processing: moving bandwidth minimization and mathematical morphology," Ultrasonics, vol. 26, pp. 204-209, 1998.
[9] Y.Lu, E. Oruklu, and J. Saniie, "Fast chirplet transform with FPGA based implementation," IEEE Signal Processing Letters, vol. 15, pp. 577-580, December 2008.
[10] Y.Lu, R. Demirli, and J. Saniie, "A comparative study of echo estimation techniques for ultrasonic NDE applications," IEEE Proceedings of Ultrasonic Symposium, pp. 536-539, October 2006.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Rapid development of automation and measuring techniques have left no clues what so ever for automatic recording of the data in the meter reading instruments in every field. One field where automatic measuring hasn't developed as much as in other fields is in measuring the water flow and water level in water reservoirs. Utilities also hope that the development of new technologies to solve the problems they encountered in the practical work about measuring and no reliable protection of accuracy and real time; and enable both user-friendly and improving public sector efficiency and management level. This Paper proposes a novel method for measuring the water level in the reservoirs which collects the data from different Zigbee nodes at the project site and through a GSM Module it is transported to the PLC, which enables us to monitor and control the water level in the reservoir. As GSM modules are used there is feasibility for a single server to maintain many reservoirs in a stipulated area.
Keywords: Reservoir automation system (RAS), Automation system, Zigbee, GSM, Unified Modeling Language (UML) and PLC's.
[1] G. Martin, L. Lavagno, and J. Louis-Guerin, "Embedded UML: a merger of real-time UML and codesign", CODES 2001, Copenhagen, April 2001, pp.23-28.
[2] Rumbaugh, J., Jacobson, I. and Booch, G. 1999. The Unified Modeling Language – Reference Manual. Reading, MA: Addison Wesley Longman.
[3] Holt. J. 2001. UML for Systems Engineering. United Kingdom: The Institution of Electrical Engineers.
[4] Hofmann, P. P. and Schurr, A., 2002. OMER – Object-oriented Modeling of Embedded Real-Time
[5] Systems. Post-proceedings of OMER-1: May 28/29 1999, Herrsching am Ammersee and OMER-2: May 10-12 2001, Herrsching am Ammersee.
[6] H. Gomma, Designing Concurrent, Distributed, and Real-Time Application with UML, Addison-Wesley, 2000.
[7] Safaric S., Malaric K., ZigBee Wireless Standard, Proc. of the 48th International Symposium ELMAR-2006, Zadar Croatia, 1 (2006), 259-262
[8] Primicanta, A.H., Nayan, M.Y., Awan, M., ZigBee-GSM based Automatic Meter Reading system, 2010 International Conference on Intelligent and Advanced Systems (ICIAS), Kuala Lumpur, Malaysia, 1 (2010), 1-5
[9] Tatsiopoulos, C., Ktena, A., A Smart ZIGBEE Based Wireless Sensor Meter System, 16th International Conference on Systems, Signals and Image Processing (IWSSIP), Chalkida, Greece, 1 (2009), 1-4
[10] Lee J.D., Nam K.Y., Jeong S.H., Choi S.B., Ryoo H.S., Kim D.K., Development of ZigBee Based Street Light Control System, Proc. of the Power System Conference and Exposition, Atlanta GA, 3 (2006), 2236-2240
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In this Paper, we focus on a class of LDPC codes known as Euclidean Geometric (EG) LDPC codes, which are constructed deterministically using the points and lines of a Euclidean geometry. Minimum distances for EG codes are also reasonably good and can be derived analytically. memory error correction code has been implemented using pipelined cyclic corrector where majority logic gate determined the error .LDPC soft error decoding is also implemented for the same memory error detection and correction comparison of the results are done .as the majority gate can detect only upto 2 error the extending majority gate with ldpc soft decoding can decrease the bit error rate.
Keywords: Error correction code (ECC), memory fault tolerance, soft-error rate (SER), Block codes, low-density parity check (LDPC), Memory.
[1] Shu Lin and Daniel J. Costello. Error Control Coding. Prentice Hall, second edition, 2004.
[2] R. G. Gallager, "Low-density parity-check codes", IRE Trans. Information Theory, vol. IT-8, no. 1, pp. 21–28, January 1962.
[3] D. J. C. MacKay and R. M. Neal, "Near Shannon limit performance of low density parity check codes", Electronics Letters, vol. 32, no. 18, pp.1645–1646, March 1997.
[4] R. J. McEliece, The Theory of Information and Coding. Cambridge, U.K.: Cambridge University Press, 2002.
[5] M. Sipser and D. Spielman, "Expander codes," IEEE Trans. Inf. Theory, vol. 42, no. 6, pp. 1710–1722, Nov. 1996.
[6] D. E. Knuth, The Art of Computer Programming, 2nd ed. Reading, MA: Addison Wesley, 2000.
[7] Allen D. Holliday, Hamming Error-Correction Codes, February 17, 1994 (revised June 15, 2002; March 1, 2004).
[8] H. Tang, J. Xu, S. Lin, and K. A. S. Abdel-Ghaffar, "Codes on finite geometries," IEEE Trans. Inf. Theory, vol. 51, no. 2, pp. 572–596, Feb. 2005.
[9] H. Naeimi and A. DeHon, "Fault-tolerant nano-memory with fault secure encoder and decoder," presented at the Int. Conf. Nano-Netw., Catania, Sicily, Italy, Sep. 2007.
[10] S. J. Piestrak, A. Dandache, and F. Monteiro, "Designing fault-secure parallel encoders for systematic linear error correcting codes," IEEE Trans. Reliab., vol. 52, no. 4, pp. 492–500, Jul. 2003.