Академический Документы
Профессиональный Документы
Культура Документы
IJCSI
International Journal of
Computer Science Issues
© IJCSI PUBLICATION
www.IJCSI.org
IJCSI proceedings are currently indexed by:
The departments of ECE and AEI of SAINTGITS College of Engineering, Kottayam are
elated to organize the International Conference on VLSI, Communication and Instrumentation
(ICVCI-2011) on April 7th to 9th, 2011. This conference is organized in association with ISA (South
India Section) and IETE. The conference aims at creating awareness of recent developments in thrust
areas such as Communication, VLSI, Signal Processing, Control System, Industrial Automation and
allied fields. It is a confluence of Scientists, Engineers, and Practitioners of all areas of electronics
which offers solution for practical and industrial problems through the exchange of ideas and
convergence of technology.
The response to call for papers was overwhelming and around 800 papers were received from
various part of the globe. Out of this, 200 papers were selected by the reviewers. And 172 papers
were presented. As the conference is mainly focused in four areas of Electronics namely, VLSI,
Signal Processing, Communication and Instrumentation, the papers are distributed accordingly and
fifteen technical sessions are arranged as oral and poster sessions. Out of 172 papers the best 22
papers are selected to publish in International Journal of Computer Science Issues (IJCSI).
Eminent international professors have been invited to deliver Plenary Sessions in the
conference, which will enlighten us with their enormous acquaintance in the field during various
sessions of the conference. The invited speakers will bring to light the cutting edge technologies in
various areas so that the participants may benefit from this technical gorge. Foreseeing that this
Special Issue will enhance the knowledge and understanding in the use of latest technologies, this
will act as a catalyst for further research activities.
We owe the success of this conference to all those who rendered their valuable time, energy
and resources at various levels. We are happy to place on record the cooperation, support and
guidance received from all quarters. We would like to thank all the reviewers, authors, session chairs
and the participants for their active participation in molding this conference into a rich technical
forum.
Chief Editor
Guest Editors
Dr. K. P Zacharia
Professor, Department of Applied Electronics & Instrumentation.
SAINTGITS College of Engineering, Kottayam
Dr.G.Lakshminarayanan
Associate Professor
ECE Dept, NIT Trichy.
Dr.K.Najeeb
Assistant Professor (CSE Dept)
Government College of Engineering, Sreekrishnapuram
Dr.Rama Komaragiri
Assistant Professor
ECE Department, NIT Calicut
Dr.Radhakrishnan
Principal & Prof of ECE
Sri Ramakrishna Engineering College, Coimbatore
Dr.B. LathaKumari
Prof & Head, ECE Department
University College of Engineering, Muttom
Dr.V.R Vijayakumar
Associate Professor, ECE Dept
Anna University of Technology, Coimbatore
Dr. M Wilscy
Professor and Head , CSE Department
University of Kerala, Kariavattom
Dr. N. Sivakumaran
Asso. Professor, ICE Department
National Institute of Technology, Trichy.
TABLE OF CONTENTS
1. Pneumatic Pressure Cell with Twin Diaphragms Embedding Spherical Corrugations in a 1-6
Dual Diaphragm Structure
A. Cellatoglu and K. Balasubramanian
2. A New Generation VLSI Approach for V/F Control of Three-Phase Induction Motor 7-12
M. S. Aspalli, Veerendra D. and P. V. Hunagund
3. Design and Implementation of Color Conversion Module RGB to YCbCr and Vice Versa 13-18
Prathibha E., Siva Yellampalli and A. Manjunath
4. Thermal Bound Placement With Wire Length Consideration for Standard Cells in VLSI 19-22
Bishnu Prasad D. and Jagannath Samanta
5. AODV with Source Route Accumulation for improved Routing in WiMAX 23-27
Yogesh Chaba, Yudhvir Singh and Amit Kumar
8. Multiple Parameters based Approach to Estimate and width in Mobile Ad Hoc Networks 37-43
P. I. Basarkod and S. S. Manvi
10. The Development of Controller for Buoyancy Engine for Use in Autonomous 52-57
Underwater Vehicle (AUV)
J. Supriyanka, Shabnam Parveen, P. Kavita and N. Jagdesh Babu
11. Analytical Modeling of Double Gate MOSFET and Its Application 58-62
S. Panigrahy and P. K. Sahu
15. Half Wavelength Double-ridged Half Height Rectangular Waveguide Resonator 80-84
Divya Unnikrishnan and Girish Kumar
16. Monitoring of Risky Parameters Using ZigBee Based Wireless Sensor Network 85-91
Shanmugaraj M. and R. Prabakaran
17. Peak to Average Power Ratio (PAPR) Reduction Techniques for OFDM-MIMO System 92-96
P. Malathi and P. T. Vanathi
18. Analytical Model for Compensating the Curling Effect in MEMS Cantilever Beam 97-100
Vaishali B. M., Uday V. Wali and Anil V. Nandi
19. Approaches to Optimum Dimensions Selection of Remotely Sensed EO-1 Hyperion Data 101-107
for Crop Classification
Hasmukh J. Chauhan and B. Krishna Mohan
21. Six new Full Adder Cells Based on Majority-not Gate in 45nm CMOS Technology and
116-122
Analysis in SOI Technology
Manijeh Alizadeh, Behjat Forouzandeh and Reza Sabbaghi-Nadooshan
22. Fuzzy C-Means method for Colour Image Segmentation with L*U*V* Colour 123-127
transformation
R. Krishna Priya, C. Thangaraj and C. Kesavadas
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
1
ISSN (Online): 1694-0814
www.IJCSI.org
2
Department of EE Engineering, European University of Lefke
Turkish Republic of Northern Cyprus, Mersin 10, TURKEY
Abstract
Thin metallic shallow spherical diaphragms are being used for 1.1 Thin Metallic Shallow Spherical Diaphragm
measuring pneumatic pressure in process industries. The drift in
vertex realized due to application of pressure is transformed into The drift in the vertex of a thin diaphragm with shallow
electrical signal and this is calibrated for pressure. We now spherical structure depends on the elastic properties of the
propose a modified structure for the pressure cell by having materials used for the diaphragm, its geometry and size.
double ended shallow spherical shells embedded with spherical With an appropriate pickup the enhancement of the drift
corrugations as to enhance the sensitivity to a greater extent. By
produces significant raise in the level of signal. The
having dual such installation in the structure of the pressure cell
it concedes further increase in sensitivity. The construction relationship between the applied pressure and the drift in
details of the diaphragm structure, theory and analysis to assess the vertex is established by solving governing equations
the performance are presented. with boundary conditions of the diaphragm. Fig.1 shows
the schematic of a shallow spherical shell inflated by
Keywords: Dual Diaphragm Structure, Spherical Corrugations, pneumatic pressure wherein w denotes the altitude of a
Pressure Cell, Sensitivity Enhancement, Twin Diaphragms
point in the surface of shell measured from plane of the
rim at a radial distance r. The altitude of the vertex from
1. Introduction the rim plane is denoted as f. The altitude f is shown to be
dependent on pressure and various mechanical parameters
Pneumatic pressure cells employing diaphragms are [9-11] as
conventionally being used in process industries. Most
diaphragm based cells use strain gauge pickups[1] and ra (1)
f = A−
certain cells use vibrating wires[2]. Thin metallic 3. A
diaphragms yield relatively larger drift in the vertex when
pressure is acting on it. This drift in diaphragm was where ra: radius of the rim of the diaphragm
transformed into electrical signal by using inductive
η
1/ 3
pickup, capacitive pickup and LVDT pickups[3-5]. (2)
A= +ς
Enhancing further the sensitivity a structure with dual 2
1/ 2
diaphragm structures were also reported[6,7]. A α 3 η2 (3)
ς = +
geometrical structure involving corrugations along with a 27 4
diaphragm for making a pressure cell was also reported[8]. 56.h 2 (4)
α =
Yielding further enhancement in sensitivity we propose (1 + γ )(
. 23 − 9.γ )
now dual diaphragm structure for the pressure cell with
each one having twin diaphragms with embedded h : plate thickness and γ : Poisson ratio.
corrugations. This enhances the sensitivity to a greater
extent compared to other types diaphragm cells. 7. p.ra 4 h 2 (5)
η=
Evidently, the sensitivity enhancement permits the cell to 8.D (1 + γ )(
. 23 − 9.γ )
measure weaker pressure signals and makes it more useful.
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
2
ISSN (Online): 1694-0814
www.IJCSI.org
Gas
ra
entrance
from r
pressure
p
chamber
w f
Diaphragm Pickup
2
An array of light weight Silver coated Teflon cylindrical
r
2
plates arranged in one diaphragm slide through the gaps
w(r ) = f .1 − (7)
a between the similar cylindrical plates arranged in the
other diaphragm. When pressure is applied it causes both
The pickup installed in the diaphragm should be efficient corrugated diaphragms to move in opposite directions.
in extracting the drift information into electrical signal. When the plates move in the gaps of each other it results
One of its essential requirement is that it should be light in in change of effective area of plates contributing to
weight such that it will not impose any payload which change in capacitance. By classical theory, the
would affect the mechanical properties of the diaphragm. capacitance between any two plates is given by
Therefore, in the past weightless inductive pickups and εA
C = (8)
capacitive pickups were attempted. Now for the proposed d
twin dual diaphragm structure we use modified hollow
cylindrical capacitive pickup as it adapts better to this where ε: Dielectric constant,
geometry. A: Area of plates and
d: displacement between plates.
The instantaneous capacitance is detected and converted
2. Twin Dual Diaphragms With Embedded
into voltage for measurement and transmission to any
Corrugations other location for processing and display.
2.1 Geometry and Structure 2.2 Drift Contributions from Spherical
Corrugations
A simplified schematic of the geometrical structure
illustrating the principle of the corrugations embedded The purpose of embedding corrugations is to yield
twin dual diaphragms installed with capacitive pickup is relatively larger drift in vertex due to application of
pressure. For assessment of the drift in vertex contributed
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
3
ISSN (Online): 1694-0814
www.IJCSI.org
by a shallow spherical corrugation, the geometry of a There are two diaphragms at the end. Including the
segment of corrugation shown in Fig.3 is referred. displacement contributed by two ending diaphragms the
resulting drift is
xj fd = fn + 2.fx (11)
fj
This distance fdr realized is much greater than that of the
distance realized from a single diaphragm f. Therefore, the
application of pressure px causes relatively larger
capacitance with the array of capacitor plates. As a result,
the sensitivity contributed by dual corrugated twin
diaphragm based pressure cell is exceedingly larger than
that of single diaphragm pressure cell. Fig.4 shows the
Fig.3. A Segment of Shallow Spherical
Corrugation relationship between the capacitances realized in dual
corrugated diaphragm cell compared to that of dual
diaphragm cell and single diaphragm cell.
The corrugation with groove length xj exhibits the axial
distance wj at the point of terminating the groove where as The diaphragm used is a medium strength Al alloy of
the axial distance of vertex passing through the centre of 2.5cm radius, 0.6mm thickness and 0.5cm of height for the
the diaphragm is fj. spherical shell with Young’s modulus 200GN/m2 and
Knowing fj, the distance wj can be obtained by using the Poisson ratio 0.3. Corrugations with 8 sectors are
relation (7) with r made as rj and a made as ra. employed in each diaphragm structure. Silver coated thin
Teflon cylindrical plates with radius of outer cylinder as
Therefore, each slanted sector of a groove contributes an 2cm and length 1.5cm is employed as capacitor plates.
axial distance of wj for producing drift when pressure acts The length of the innermost plate used is 1.2 cm. With the
on the diaphragm structure. application of pressure of 10 Pascals the drift in the
For standard applied pressure ps, the end spherical shell of vertices of diaphragms has shown a capacitance of 15pF
the diaphragm yields the drift in the vertex fs governed by where as when the pressure is void the capacitance
(1) to (6) developed is 2PF. For a similar arrangement of capacitor
plates in dual diaphragm pressure cell excluding
For an unknown pressure px, if the drift in vertex is corrugations the capacitance resulted is 7pF for the
denoted as fx, then change in drift of the vertex ∆f is given pressure of 10 Pascals. For a single diaphragm cell the
by capacitance realized is nearly half compared to dual
diaphragm cell.
∆f = fx-fs (9)
With an application of pressure of 10 Pascals to the cell
This change in drift of the vertex ∆f is experienced due to with 8 sectors of corrugations it has resulted a capacitance
change in pressure ∆p=px-ps. of 15 pF and if number of sectors decrease then the
The axial distance experienced at any instant due to capacitance also would decrease accordingly as per the
application of instantaneous pressure px acting on the relationship already discussed.
diaphragms is obtained from the contributions of all For the sector geometry of xj as 0.5cm, rj as 2 cm the fj
slanted sectors of the corrugations and from the drifts of resulted is 0.6 cm and wj is 0.2078cm. The drift
the ending up shallow spherical shells. contribution per sector is 0.0776 cm for the applied
If one sector of corrugation contributes an axial distance pressure of 10 Pascals. Therefore, the total drift resulted
of wx due the applied pressure px, then the axial distance by 8 sectors would be 0.622 cm. The contribution of drift
materialized by one diaphragm with n sectors of due to two ending diaphragms would be 0.4cm. This has a
corrugation is total displacement of 1.022cm contributed by corrugations
and diaphragms. Obviously the drift contribution reduces
fn = n.wx (10) with the number of sectors employed and for four sectors
this would be 0.711cm. Fig.5 shows the realization of
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
4
ISSN (Online): 1694-0814
www.IJCSI.org
capacitance as a function of number of sectors present in 2.3 Generation of Electrical Signal with
the corrugations. The pressure applied is kept as a Applied Pressure
reference of 10 Pascal’s in all computations.
The capacitance realized in the chamber of twin dual
diaphragm pressure cell has to be transformed into
electrical signal for transmitting, processing and display.
15pF Fig.6 shows the circuit schematic of the transducer
Cap
producing the electrical signal. An AC bridge comprising
the transducer capacitance Ct, lumped capacitor C2,
Cx parallel circuits of C3,L3 and C4,L4 is excited by a
sinusoidal signal of frequency 10KHz. The error signal is
picked up in the other two nodes of the bridge and is
2pF amplified by a difference amplifier. The amplified signal
represents the intensity of the pressure signal. When the
bridge is balanced the output signal would be zero.
Single Whenever Ct changes due to change in pressure, then the
diaphragm unbalance in bridge gives error signal denoting the
Cell pressure applied.
0 px 10 Pascal The condition for balancing the bridge is as follows.
Fig.4. Capacitances Resulted in
Different Diaphragm Structures Ct
=
(
1 − ϖ 2 L 4.C 4 ) (13)
C2 (
1 − ϖ 2 L3.C 3 )
15pF
The voltage gain G of the difference amplifier is given by
Cap
Cx G = R2( R1
) (14)
using lookup table approach implemented with EPROMs in Fig.8. The microprocessor is supported by RAM and
and driven to a display system for the display of pressure EPROM memory and standard peripherals such as
information. The display information is latched and keyboard and display. With this scheme any type of
updated every second automatically. pressure waveform could be generated and applied to the
pressure cell and response could be read and analyzed.
Precision ADC EPROM Analogue Pressure Signal
Rectifier
Digital
Pressure Pressure Trans
From DAC Pd Data ADC & Chamber
Transducer In Port -ducer
tp
Binary to BCD
Converter O
EPROMs EPROM ut
RAM MPU Po Current Pressure
Linearized to Cell
rt
Analogue Pneuma
&
Pressure Latch tic
D
Signal pa and Press
A
Display Convert
C
3. Experımental Analysıs
Fig.8. Experimental Setup
In order to assess the performance of the pressure cell
both simulated and practical experiments are conducted.
10
3.1 Simulated Experiment Pascal
analysis. The data are saved in memory for further usage [4] A.Cellatoglu and K. Balasubramanian, 2010, “LVDT
in making graphics plot and driving dot-matrix display. Pickup for Improved Sensitivity in Diaphragm Based
High-Pressure Measuring Mechatronic Device”,
Proceedings (CD) of International Conference on
Convergence of Science & Engineering Education and
While there is one to one correspondence between the Research, a Global Perspective in the New Millennium,
applied pressure and simulated output pressure determined (ICSE-2010), Bangalore, pp IT_1 to IT_5. (ICSE-2010-
by computation there is a little difference in the practically Abstract pp 182).
obtained pressure especially at higher ranges of the [5] K. Balasubramanian and A.Cellatoglu, 2008, “Exploiting
applied pressure. Fig.9 shows both the results for different the Inflation Characteristics of Thin Metallic Spherical
values of the applied pressure. Diaphragm for Designing Pneumatic Pressure Transducer”,
Proceedings of the International Conference on Digital
Factory, (ICDF-2008), Coimbatore, India, pp 1828-
4. Conclusıon 1834.
[6] A. Cellatoglu and K.Balasubramanian, 2010, “High
The geometry of the capacitance pickup is optimized such Performance Capacitive Pickup Implanted Pneumatic
as to produce maximum capacitance generated within the Pressure Cell Holding Dual Diaphragms”, Proceedings of
available space of the chamber. The plates of the capacitor International Conference on System Dynamics and
are geometrically constructed in the form of concentric Control, (ICSDC2010), Manipal, India, pp 17-22.
hollow cylinders. The cylindrical plates attached to one (ICSDC2010-Abstracts pp 3).
diaphragm would make movement within the gaps of [7] A. Cellatoglu and K.Balasubramanian, 2010, “Embedded
cylindrical plates attached to another diaphragm and this Microcontroller for Performance Analysis of Mechatronic
would produce relatively more capacitance than the earlier Devices”, Proceedings of 2010 International Conference on
parallel plate capacitors. When the sector length involved Embedded Systems and Applications (ESA-2010), Las
Vegas, USA, Paper ESA-3507, pp 21-26.
in corrugation is more it contributes more axial drift and
[8] A.Cellatoglu and K.Balasubramanian, 2011, “A Pressure
the capacitance. Nevertheless, after some increase in Cell of Dual Corrugated Diaphragms Installed with
sector length the geometrical stability of the dual Capacitive Pickup”, Proceedings of International
diaphragm structure is affected and additional care should Conference on Mathematics and Computer Science,
be taken to guide the path of the diaphragms when Chennai.
dynamic pressure is applied. Therefore for every [9] K.Balasubramanian and A.Cellatoglu, 2010, “Precision
diaphragm size there exists an optimum sector length and Pneumatic Pressure Measurement with diaphragm based
this is followed in designing the diaphragm structure. mechatronic devices”, International Journal of Electronics
Twin diaphragm based pressure cell with spherical published by Taylor and Francis, Vol. 97, No. 1, pp 45–
62.
corrugations yield more axial displacement of the vertex
[10] D.Maier-Schneider, J.Maibach and E.Obermeier, 1995, J.
contributing to generation of increased signal strength. Microelectromechanical Systems, Vol 4, pp 238-241.
Added to this effect, the dual diaphragm configuration [11] H.E.Elgamel, 1995, Sensors and Actuators A, Vol 50, pp
enhances the capacitance output nearly two folds. The 17-22.
capacitance enhancement contributes to increased
sensitivity in pressure measurement and promises to be
more useful in several process industries.
References
[1] S.Rangan, G.R.Sarma and V.S.V.Mani, 1983,
Instrumentation Devices and Systems, Tata McGraw Hill,
NewDelhi.
[2] K.Balasubramanian, K.Guven and Z.G.Altun, 1994,
"Microprocessor-based new technique for measuring
pneumatic pressure using opto-coupler controlled vibrating
wire transducer", Proceedings of the 1994 IEEE
Instrumentation and Measurement Technology Conference,
Hamamtsu, Japan, pp 464-467.
[3] K.Balasubramanian and A.Cellatoglu, 2008, “An Inductive
Pickup for Pneumatic Pressure Transducer Developed over
Thin Metallic Spherical Diaphragm”, Proceedings of the
International Conference on Mathematics and Computer
Science, (ICMCS 2008), Chennai, India, pp 19-26.
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
7
ISSN (Online): 1694-0814
www.IJCSI.org
2
Dept of Electrical & Electronics Engg, Poojya Doddappa Appa College of Engg,
Gulbarga.INDIA.
3
Department of Applied Electronics, Gulbarga University,Gulbarga.
Karnataka.INDIA
2. V/F Control of Three-Phase Induction rectifier, three-phase full bridge inverter, control circuit,
Motor speed sensing unit and output filter. In the proposed work
the three-phase bridge rectifier is designed using IN5408
The torque developed by the induction motor is directly power diodes. Each power diode is protected from high
proportional to the v/f ratio. If we vary the voltage and dv/dt by using metal oxide varistors.The output of
frequency, keeping their ratio constant, then the torque rectifier is filtered by 100µF, 450V capacitors. The three-
produced by induction motor will remain constant for all phase inverter has FGA25N120ANTD -IGBT switches,
the speed range. Fig.1 shows the torque-speed with the snubber circuit for each switch. The output of
characteristics of the induction motor with V/F control. inverter is filtered by c-type filter. The filtered output is
The voltage and frequency reaches the maximum value at applied to the three-phase induction motor. The digital
the base speed. We can drive the induction motor beyond control of motor is achieved by applying gate pulses from
the base speed. But by doing so only frequency varies but the control circuit to each the IGBT’s switch through
not voltage. Hence the ratio of v/f will no longer remain optoisolation.
constant. Since the torque developed by the induction
motor is directly proportional to the v/f ratio will not 3.2 Power circuit design
remain constant throughout the speed [4].
The power circuit is designed using 25A, 1200V IGBT.
Let us consider the sinusoidal ac voltage is applied to the These IGBTs are protected against surge voltages using
three-phase induction motor [6]. Then we have steady snubber circuit. The 3-phase induction motor is connected
state, to 3-phase bridge inverter as shown in Figure 3. The
V ∝ jωφ (1)
power inverter has six IGBT switches that are controlled
in order to generate 3-phase AC output from the DC bus.
That is,
PWM signals, generated from the controller, control these
V ∝ ωφ (2)
six switches. The amplitude of phase voltage is
Where V and φ are magnitude of stator voltage and stator determined by the duty cycle of the PWM signals While
flux and V and φ are phasors of stator voltage and stator the motor is running, three out of six switches will be on
flux, respectively, Thus, we get at any given time; either one upper and two lower
V V switches or one lower and two upper switches. The output
φ≈ ≈ (3) of the inverter is almost square wave which is having
ω 2Πf
harmonics.
Hence from the above equation, we can write
V
φ≈ (4)
f
The slip for maximum torque is
Rr
sm =
[( )]
(5)
Rs + β ( X S + X r )
2 2 2 1/ 2
3. Implementation of V/F Motor Drive A passive filter at the output of power circuit is used to
remove the harmonics. The windings of induction motor
3.1 System overview oppose any sudden change in direction of current flow
until all the energy stored in winding is dissipated. A fast
The basic block schematic of three-phase induction motor recovery diode is connected antiparallel to each IGBT to
drive is shown in Fig.2. It has three-phase full bridge facilitate this. This diode is known as freewheeling diode.
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
9
ISSN (Online): 1694-0814
www.IJCSI.org
2000
1800
1600
Speed (RPM)
Speed (RPM)
01 4.091 1380 46.095 0.92 1400
02 9.81 1380 46.096 0.93 1200 1250 1260 1260 1250
03 14.715 1370 46.05 0.93 1000
04 19.24 1390 46.091 0.95 800
600
1600 400
200
1400 1380 1380 1370 1390
0 5 10 15 20 25
Speed (RPM)
1200
Torque(NM)
1000
800 Figure 8. Actual RPM vs Load Torque for 1260 rpm
600
400
Table 5. Experimental results for load 0.5Kg.
200
0 5 10 15 20 25 SL. Actual Stator Frequency
Torque(NM) NO speed voltage Hz V/F
Figure 6. Actual RPM vs Load Torque for 1380 rpm 01 1260 354 42.17 8.30
02 1310 357 44.14 8.11
03 1370 368 46.09 8.0
Table 3. Results for load Torque vs 1320 rpm 04 1450 372 48.22 7.9
SL.N Load Actual Frequency Current
O Torque RPM Of V out (A)
01 4.091 1310 44.14 0.85
02 9.81 1310 44.13 0.89 49
03 14.715 1320 44.13 0.90 48
04 19.24 1310 44.12 0.90
Frequency (Hz)
47
46
45
2000 44
1800 43
1600 42
Speed (rpm)
1400 1320
1310 1310 1310 41
1200
1000
350 355 360 365 370 375
800 Voltage(volt)
600
400 Figure 9. Stator voltage magnitude verses frequency
200
0 5 10 15 20 25
Torque(NM) Table 6. Experimental results for load 2Kg
Figure 7. Actual RPM Vs Load Torque for 1320 rpm SL. Actual Stator Frequency
NO speed voltage Hz V/F
Table 4. Results for load Torque vs 1260 rpm 01 1260 350 43.17 8.0
SL. Load Actual Frequency Current 02 1310 355 45.14 7.8
NO Torque RPM Of V out (A) 03 1370 362 46.09 7.9
04 1450 367 48.22 7.9
01 4.091 1250 42.1752 0.95
02 9.81 1260 42.05 0.90
03 14.715 1260 42.05 0.90
04 19.24 1250 42.10 0.95
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
11
ISSN (Online): 1694-0814
www.IJCSI.org
49
48
Frequency (Hz)
47
46
45
44
43
42
345 350 355 360 365 370
Voltage (volt)
References
[1] Alfredo,Thomas A. Lipo and Donald W. Novotny, “A New
Inductio Motor V/f Control Method Capable of High-
Performance Regulation at Low Speeds” IEEE Trans.
Industry Applications, Vol. 34, No. 4 July/ August 1998.
[2] Pradeep M Patil, Sanjay L Kurkute, “Speed control of three
phase induction motor using single phase supply alongwith
active power factor correction” ACSE Journal, Volume (6),
Issue (3), Oct. 2006.
[3] Speed Control of 3-Phase Induction Motor Using PIC18
Microcontrollers, by Microchip Technology Inc.
[4] VF Control of 3-Phase Induction Motors Using
PIC16F7X7 Microcontrollers by Microchip Technology
Figure 12(c) Waveforms of inverter line to line voltage for 1320rpm Inc.
[5] An introduction to AC induction motor control using
dspic30F MCU , by Microchip Technology Inc.
[6] AC Induction Motor Control Using Constant V/Hz
Principle and Space Vector PWM Technique with
TMS320C240, by Texas instruments.
[7] Ned Mohan Tore. Undeland and William.p.Robbins:
“Power Electronics:Converter,Applications and
Design”,John Willey and Sons,1995.
[8] Rashid M.H,Power Electronics-Circuits,Devices and
Apllications”, third edition Printice HallIndia,2001.
[9] K.Gopakumar,V.TRanganathan and R,Bhat, “Three phase
induction motor operation from pwm voltage source
inverter.” IEEE Trans. Industry Applications, Vol. 29,
No. 5 September/October 1993.
[10] Werner Deleroi, Johan B. Woudstra, and Azza fathima,
“Analysis and Application of Three-phase Induction Motor
Figure 13. Photograph of complete system Controller with Improved Transient Performance.” ” IEEE
Trans. Industry Applications, VOL. 25, NO. 2,
MARCHIAPRIL 1989 .
[11] A New Induction Motor V/f Control Method Capable of
High- Performance Regulation at Low Speeds Alfredo
5. Conclusions Mu˜noz-Garc´ıa, Thomas A. Lipo, Fellow, IEEE, and
Donald W. Novotny, Fellow, IEEE.
A new generation VLSI approach for the v/f control of
[12] K.Koga, R.Ueda and T.Sonada, “constitution of v/f control
three-phase induction motor has been presented. This
for reducing the speed error in induction motor system.” In
complete system is developed and tested in power Conf.Rec.IEEE-IAS Annu.Meeting,1990.
electronics laboratory. Speed control of motor is acquired
[13] Robbie F. McElveen, Member, IEEE, and Michael K.
with the accuracy of ±10 rpm. Hence in this proposed
Toney, Senior Member, IEEEStarting High-Inertia Loads
scheme 98% accuracy of speed control is recorded. With IEEE Transactions On Industry Applications, Vol. 37, No.
the variation of stator voltage, frequency is also varied 1, January/February 2001.
proportionally, such that v/f ratio is constant. The inverter [14] M.S.Aspalli,, Vinaya Kumar, P V Hunagund, Development
line to line voltage recoded is very stable and very smooth and Analysis of Variable Frequency Three Phase Induction
compared to single-phase. Hence this three-phase Motor Drive, IJ-ETA-ETS, July 10-Dec 10, Vol.3,
induction motor V/F control by DSC is more stable, Issue2:PP 189-195.
efficient and economical.
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
13
ISSN (Online): 1694-0814
www.IJCSI.org
2
VTU Extension Centre, UTL Technologies LTD
Yeshwanthpur, Bangalore- 560022
3
Sri Krishna Institute of Technology
Bangalore-560090
3. Introduction to Color Spaces The color values may be written in the range 0.0
(minimum) to 1.0 (maximum). Full intensity red
A color space is a method by which we can specify, create is 1.0, 0.0, 0.0.
and visualize color. As humans, we may define a color by The color values may be written as percentages,
its attributes of brightness, hue and colorfulness. A from 0% (minimum) to 100% (maximum). Full
computer may describe a color using the amounts of red, intensity red is 100%, 0%, 0%.
green and blue phosphor emission required to match a
color. A printing press may produce a specific color in The color values may be written as simply by multiplying
terms of the reflectance and absorbance of cyan, magenta, the range 0.0 to 1.0 by 255. This is commonly found in
yellow and black inks on the printing paper [3]. A color is computer science. Full intensity red is 255, 0, 0.
thus usually specified using three co-ordinates, or
parameters. These parameters describe the position of the
3.2 YCbCr Color Space
color within the color space being used. They do not tell
us what the color is, that is dependant on what color space YCbCr is a family of color spaces used in video systems.
is being used. A color space is a mathematical Y is the luma component and Cb and Cr are the chorma
representation of a set of colors. components. The YCbCr color space is a scaled and an
offset version of the YUV color space. Y is defined to
The most popular color models are have a range of 16– 235; Cb and Cr are defined to have a
nominal range of 16–240 [5].
1.RGB (used in computer graphics);
2.YIQ, YUV, or YCbCr (used in video systems);
3. CMYK (used in color printing). The basic equations to convert between RGB and YCbCr
are:
However, none of these color spaces are directly related to Y = 0.257R+ 0.504G + 0.098B + 16
the intuitive notions of hue, saturation, and brightness. All Cb = –0.148R – 0.291G+ 0.439B + 128
color spaces can be derived from the RGB information Cr = 0.439R – 0.368G – 0.071B + 128
supplied by devices such as cameras and scanners [1] [4]. &
R = 1.164(Y – 16) + 1.596(Cr – 128)
G = 1.164(Y – 16) – 0.813(Cr – 128) – 0.391(Cb – 128)
3.1 RGB Color Space B = 1.164(Y – 16) + 2.018(Cb – 128)
The red, green and blue (RGB) color space is widely used
throughout computer graphics. Red, green and blue are The above equations have been used to generate the logic used in
three primary additive colors: individual components are the color conversion module.
added together to form a desired color and are represented
by a three dimensional, Cartesian coordinate system as
shown in Figure 2.
colors,(i.e., for White, Yellow, Cyan, Green, Magenta, Space depends on the application. BUS_IN are the pixels
Red, Blue, Black)[6]. Inputs of the particular image to the color space converter
and BUS_OUT gives the converted pixels output of the
Table 1. 100% RGB Color Bars image. Table 3 shows the Color Converter module
conversion.
Magneta
Table 3. Color Space Conversion Table
Yellow
Green
White
Black
Cyan
Blue
Red
Color Space
(IC_I) (OC_I) Sel
Conversion
R 255 255 0 0 255 255 0 0 0( RGB) 1(YCbCr) 01 RGB to YCbCr
G 255 255 255 255 0 0 0 0 1(YCbCr) 0( RGB) 10 YCbCr to RGB
B 255 0 255 0 255 0 255 0
Green
White
Cyan
Blue
Red
BUS_IN
Magenta Color:
R G B Y Cb Cr
234 9 7 81 94 227
236 8 5 81 93 228
240 7 0 81 90 231
243 7 0 82 90 232
247 4 0 81 90 235
248 4 0 82 90 235
248 3 0 81 90 236
247 4 0 81 90 235
250 5 10 84 94 235
249 5 13 84 95 235
Figure 14 RGB color Image.
The selected picture is read using MATLAB and is Table 5. RGB to YCbCr color space conversion using theDesigned color
space conversion module
converted into pixels in RGB color space using inbuilt
MATLAB function. The RGB color space pixels
R G B Y Cb Cr
generated are then converted into YCbCr color space
pixels using MATLAB color conversion module. Then the 234 9 7 81 94 227
same RGB color space pixels generated using MATLAB 236 8 5 80 94 228
from the selected picture are given to the designed color 240 7 0 81 91 230
conversion module to generate YCbCr color space pixels. 243 7 0 79 92 227
Comparing YCbCr pixels generated by MATLAB as well 247 4 0 81 91 235
as the designed color conversion module we verify the 248 4 0 81 91 236
authenticity of the designed color module. 248 3 0 81 91 236
247 4 0 81 91 235
It was observed that both MATLAB and the designed 250 5 10 83 95 235
color module generate the same pixels values in the 249 5 13 83 97 234
YCbCr color space authenticating the designed color
The Simulation results from monitor window are shown in
conversion module. The first ten pixel values generated in
the fig 16. This shows the clock, reset, input conversion
YCbCr color space using MATLAB are shown in Table 4
(Ic_i) is zero and output conversion (Oc_i) is one. Three
and the corresponding pixel values generated by the
inputs and corresponding three outputs can be seen. For
designed color conversion module are shown in Table 5.
example, inputs marked are 236, 8, and 5 are RGB values.
The same procedure was followed for YCbCr color space
And next raising edge of clock gives output that are
to RGB color space conversion. For that purpose the
marked in White color are 80, 94 and 228 are YCbCr
image shown in Figure 15 was used and then the pixels
generated by the color conversion module was compared values.
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
18
ISSN (Online): 1694-0814
www.IJCSI.org
8. Conclusion
Design and architecture of color conversion module
designed in VHDL and implemented on FPGA has been
presented in this paper. The advantage of the architecture
is that the same module can be used for both RGB to
YCbCr color space conversion and vice-versa. The
designed color space conversion module was verified by
comparing the output of the designed module with the
output of color conversion module present in MATLAB.
Minimum period: 9.368ns (Maximum Frequency: [5] R.-L. Hsu, M. Abdel-Mottaleb, and A.K. Jain, “Face
Detection in Color Images,” IEEE Trans. Pattern Analysis
106.741MHz) and Machine Intelligence, vol. 24, no. 5, pp. 696-707,
Minimum input arrival time before clock: 3.699ns May 2002.
Maximum output required time after clock: 3.900ns [6] Datasheet (www.alma-tech.com), “High Performance
Maximum combinational path delay: No path found Color Space Converter,” ALMA Technologies, May 2002.
Power report: [7] F. Bensaali and A. Amira "Design and Implementation of
Efficient Architectures for Color Space Conversion”
ICGST-GVIP Journal, Volume 5, Issue1, December 2004.
[8] B. Payette, “Color Space Converter: RGB to YCrCb,”
Xilinx Application Note, XAPP637, V1.0, September
2002.
2
ECE Department, Haldia Institute of Technology,
Haldia, West Bengal
and increasing operating speed. Scaling of feature sizes Assume, m ≥ t, and also assume for any thermal matrix T, S t (T)
from micron to nanometer scales causing reduction in be the set of all t x t overlapping sub matrices of T. A sub-matrix
individual transistor capacitances and hence reduces the in S t (T) corresponds to a region of size t x t on the chip. The sub-
dissipation. However, with increasing number of matrix with the largest sum corresponds to the hottest region of
the chip. Connectivity matrix C, whose order is m2 x m2. Each
transistors and on chip local frequencies, the heat positive integer element of the connectivity matrix denotes the
dissipations increased rapidly. number of connection between a pair of cells. Our main
objective is to get percentage improvement of objective function
2.2. Uneven distribution of heat and hot-spot by using our proposed algorithm.
According to the change of Thermal matrix, change the function and also calculate the % improvement of
connectivity matrix. Calculate the total wire length for objective function.
each change and take the change in Thermal matrix, which
gives minimum wire length. Table1. 1 Summary of results for experiments on Critical objective
function for random instances.
Step9: change the placement of cells in main-matrix the
width-matrix. Find σ max (s t ) and σ min (s t ). Circuits
Initial Critical % No.
objectiv objectiv Impro- of
function function vement Iters.
Step10: New threshold = σ max (s t ), New objective Name Size
function =GM (New threshold, New total wire length). Rand1 100 342.30 281.35 17.81 5
Rand2 500 362.80 298.26 17.79 18
µlc best (M) = New objective function.
Rand3 3000 354.24 310.51 12.34 50
Rand5 5000 371.08 319.80 13.82 85
Step11: if (µlc best (M) < µgl best (M) ) Rand7 10000 381.50 321.70 15.67 156
Then µgl best (M)= µlc best (M) Rand8 50000 388.37 332.57 14.37 162
otherwise goto step 13. Rand9 100000 384.17 343.15 10.68 415
Rand10 300000 391.58 352.29 10.03 318
Step12: if ( iteration no < ITERATION_LIMIT). Rand12 500000 394.90 357.80 9.39 809
iteration no= iteration no+1;
Then repeat step 8 to step12. Here, It has been observed from the table that the %
improvement of objective function is quite high for very small
circuit sizes, and decrease for larger circuits. This is expected
Step13: return ζ (M).
since as the size of M increases, the initial value of objective
function becomes larger, thereby rendering its relative
*GM=Geometric Mean improvement insignificant.
Here ITERATION_LIMIT defines maximum number
of iterations in the loop. Table2: Summary of results for experiments on Critical objective
function for MCNC benchmarks.
4.2 Standard Cell Placement Benchmarks
Order Order Initial Critical
%
of main of sub- objective objective
The MCNC benchmark suite was released in the early matrix matrix function function
Improvement
1990s, with a number of standard cell circuits being made 4 2 291.60 160.31 45.02
available in the YAL and VPNR formats. Several 9 2 345.70 215.70 37.60
translators were available, allowing conversion into EDIF, 16 3 380.70 266.30 30.05
and academic Timber Wolf formats. Later, other 25 4 451.23 425.36 5.73
translators allowed conversion into a variety of formats, 100 25 8913.20 8645.16 3.01
100 2 440.40 399.60 9.26
including PROUD, commercial versions of Timber Wolf,
200 2 450.70 413.24 8.31
Cadence LEF/DEF, and the GSRC Bookshelf formats 225 50 401253.60 398763.50 0.62
[13]. While not part of this original group of benchmarks,
IBM’s golem3 has also become a staple in placement
research. These circuits are by far the most commonly
used benchmarks in standard cell placement research. Random Test set
20.00
% of improvement
10.00
Experiments are performed with a set of MCNC 5.00
benchmark circuits, and some random instances. Since
0.00
thermal data of the MCNC circuits are not available, the
0 100000 200000 300000 400000 500000 600000
power dissipations for the individual gates are generated
Circuit size
with a uniform random number generator. The same is
true for the random instances as well. The value of t is 2.
For the random instances, we generate set of matrices M,
Figure 2: % improvement of objective function with circuit size.
which has elements between 100 and 500000. It can be
The % improvement of objective function is quite high for
noted that initial objective function and critical objective
very small value of t, and gradually decreases for larger
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
22
ISSN (Online): 1694-0814
www.IJCSI.org
values of t. This is because for larger t, there is very little Computer Society Annual Symposium on VLSI, 2008,
scope of swapping in our algorithm. pages 369-374
[8] S. N. Adya and I. L. Markov. Combinatorial techniques
formixed-size placement. ACM Transactions on Design
50 Automation of Electronic Systems, 10(1), pages 58–90,
% of improvement
40 January 2005.
30
[9] N.S. Kim et al. Leakage current: Moore’s law meets static
20 power. Computer, 36(12), pages 68–75, December 2003.
10 [10] M. Xie J. Cong, J. Fang and X. Yuan. Large scale circuit
0 placement. ACM Transactions on Design Automation of
0 50 100 150 200 250 Electronic Systems, 10(2), pages 389–430, April 2005.
Order of main matrix
[11] S-C Lin K. Bannerjee and N. Srivastava. Electrothermal
engineering in the nanometer era: from devices and
interconnects to circuits and systems. In Proceedings of the
Figure 3 % improvement of objective function with m (t=2)
Design Automation Conference, pages 223–230, January
2006.
6. Conclusion And Future Work [12] E J Paradise K-K Lee and S K Lim. Thermal-driven Circuit
Partitioning and Floorplanning. GIT-CERCS Technical
Matrix synthesis problem (MSP) is NP-complete. We Report, Georgia Institute of Technology, 2003.
show that the algorithm is flexible. The proposed [13] X. Yang M. Wang and M. Sarrafzadeh. Dragon2000:
algorithms and the observations are very useful for the Standard cell placement tool for large industry circuits. In
following reasons: (a) it helps to avoid regions of high Proceedings of the International Conference on Computer-
thermal sensitivity in a chip; and (b) can be used to select aided Design, pages 260–264, November 2000.
the device layers for the different modules in a VLSI chip, [14] F. Najm. A survey of power estimation techniques in VLSI
based on their changing thermal behaviors. circuits. IEEE Trans. on VLSI Systems, 2(4), pages 446–
455, 1994.
References
[1] K-Y Chao and D. F.Wong. Thermal placement for high
performance multi-chip modules. In Proceedings of the
International Conference on Computer Design, pages 218–
223, October 1995.
[2] C. Koh J. Cong C. Li, M. Xie and P. Madden. Routability
driven placement and white space allocation. IEEE
Transactions on Computer-aided design of Integrated
Circuits and Systems, 26 (5), pages 858–871, May 2007.
[3] C. C. N. Chu and D. F. Wong. A matrix synthesis approach
to thermal placement. IEEE Transactions on Computer-
aided design of Integrated Circuits and Systems, 17(11),
pages 1166–1174, 1998.
[4] H. Eisenmann and F. M. Johannes. Generic global
placement and floorplanning. In Proceedings of the Design
Automation Conference, pages 269–274, June 1998.
[5] C. H. Tsai and S. M. Kang. Cell-level placement for
improving substrate thermal distribution. IEEE
Transactions on Computer-aided design of Integrated
Circuits and Systems, 19(2), pages 253–266, February
2000.
[6] Yong Zhan Tianpei Zhang and Sachin S. Sapatnekar.
Temperature aware routing in 3dics. In Proceedings of the
Asia-South Pacific Design Automation Conference, pages
309–314, 2006.
2
Department of computer science, GJUS&T
Hisar, India
3
Department of computer science, JIET,
Jind, India
• Providing adequate quality of service for a greater 2. Overview of AODV Routing Protocol
variety of applications.
• Allowing for increased mobility either through roaming AODV is a distance vector routing algorithm which
or handoff. discovers route whenever it is needed via a route
• Meeting the demand for greater portability by lowering discovery process. It adopts a routing algorithm based on
power consumption or increasing battery efficiency. one entry per destination i.e., it records the address of the
• Offering improved security for devices that use different node which forwards the route request message. AODV
services[3]. possesses a significant feature that once the algorithm
AODV is a widely researched protocol among the research computes and establishes the route between source and
community. Most of the research effort has focused on destination, it does not require any overhead information
simulations aimed at determining the performance of with the data packets during routing. Moreover the route
AODV also in comparison to the performance of other ad discovery process is initiated only when there is a
hoc routing protocols. The design issues of multi-hop ad free/available route to the destination. Route maintenance
hoc network protocols include the ability of the protocol to is also carried out to remove stale/unused routes. The
perform optimally under a wide variety of conditions. Two algorithm has the ability to provide services to unicast,
of the leading ad hoc network routing protocols are the Ad multicast and broadcast communication. AODV routing
hoc On-Demand Distance Vector Routing protocol algorithm has two phases i.e. Route Discovery and Route
(AODV) and the Dynamic Source Routing protocol Maintenance[2].
(DSR). Previous work[4] has studied the performance of The AODV routing protocol is a reactive routing
AODV and DSR in a variety of scenarios. This work protocol; therefore, routes are determined only when
showed that both AODV and DSR drop in performance at needed. Fig. 1 shows various messages exchanges in the
high velocities or when the number of connections is high. AODV protocol.
Based on the results, the authors proposed modifications
to AODV that could improve the performance of each
protocol. One specific proposal is the accumulation of the
source route in request and reply packets during the route
discovery process in AODV. By accumulating this
information, nodes can learn an increased amount of
routing information to different destinations. So the
proposed modification should lead to a reduction in the
routing load of AODV. This paper studies the proposed
modifications by incorporating the source route path
accumulation feature in AODV. The conservative nature
of our protocol helps to decrease the routing load, while at
the same time maintaining good performance in
application oriented metrics such as delay. To evaluate the
new protocol, a detailed packet-level simulation Fig. 1 AODV Protocol Messages
comparing the performance of AODV with source route
path accumulation to AODV is presented. The lists of these messages are:-
At each intermediate node, when a RREQ is received a entry for a node does exist, and if the hop count to any of
route to the source is created. If the receiving node has not the intermediate nodes is less than the previously known
received this RREQ before, is not the destination and does hop count to that node, the routing table entry is updated
not have a current route to the destination, it rebroadcasts for that node. The entry is updated by retaining the
the RREQ. If the receiving node is the destination or has a previously known sequence number for that node. Note
current route to the destination, it generates a Route Reply that if the node was unknown previously, the sequence
(RREP). The RREP is unicast in a hop by hop fashion to number in the routing table entry is set to zero and the hop
the source. As the RREP propagates, each intermediate count value is obtained from the accumulated route. This
node creates a route to the destination. When the source conservative nature of updating the routing table along
receives the RREP, it records the route to the destination with maintaining lifetimes for each route entry helps to
and can begin sending data. If multiple RREPs are invalidate the stale entries and keep the route entries
received by the source, the route with the shortest hop current, thus improving the routing accuracy of the
count is chosen. As data owns from the source to the protocol. As the RREP message is unicast back to the
destination, each node along the route updates the timers source, each intermediate node forwards the RREP packet
associated with the routes to the source and destination, by adding its address in the packet. Hence, at any point the
maintaining the routes in the routing table. If a route is not RREP packet contains all the previously visited nodes.
used for some period of time, a node cannot be sure Similar to the RREQ, the routing table is updated for each
whether the route is still valid; consequently, the node intermediate node visited by the RREP in addition to the
removes the route from its routing table. If data owns and destination node.
a link break is detected, a Route Error (RERR) is sent to
the source of the data in a hop by hop fashion. As the
RERR propagates towards the source, each intermediate
node invalidates routes to any unreachable destinations.
When the source of the data receives the RERR, it
invalidates the route and reinitiates route discovery if
necessary [5].
the two protocols. The number of sources is varied in the This is defined as the ratio of the number of data packets
simulations. Simulations are run for 180 simulated received by the destinations to those sent by the CBR
seconds. It is using two AODV and AODV- SRA routing sources. As shown in fig 5 AODV-PA has significantly
protocol and node placement is done with seed 1 for the higher packet delivery ratio than AODV.
varying number of nodes 10, 20 and 30.
AODV-PA has less delay than AODV under all 4.3 Jitter
conditions. The difference becomes significant at large
number of nodes and which gives large number of
possible connections because of this decrease in the The term jitter is often used as a measure of the variability
average route discovery time per packet delivered to the over time of the packet latency across a network. A
destination. Even though AODV-PA performs path network with constant latency has no variation (or jitter).
accumulation, it takes a conservative approach by relying
on sequence numbers and route expiry timers. Therefore
the number of route discoveries in AODV-PA is more
than AODV. The number of routes accumulated in
AODV-PA increases with the number of nodes and
connections. So the number of routes accumulated during
route discovery increases as the number of nodes increase.
The graph in fig 4 show that when number of nodes are
increases than average end to end delay also increases into
the AODV protocol but in AODV-PA does have positive
effect up to a limit.
4.2 Throughput
Acknowledgement
Financial support received from UGC in form of major
research project to Dr Yogesh Chaba is acknowledged
with thanks
References
[1] Bo Li, Hong Kong University of Science and Technology
Yang Qin and Chor Ping Low, “A Survey on Mobile
WiMAX”, IEEE Communications Magazine, (ISSN: 0163-
6804), Vol.45, No.12, pp. 70-75 (2007).
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
28
ISSN (Online): 1694-0814
www.IJCSI.org
2
Sub Divisional Engineer, Bharat Sanchar Nigam Limited
Bhubaneswar , Orissa,PIN-751007
1. Introduction
GSM (Global System for Mobile Communication) is the
most popular second generation digital cellular standard
published by ETSI. In 2010 there were over 526 million
GSM subscribers in India. It accounts for 78% of the
digital cellular market. A GSM system is basically
designed as a combination of three major subsystems: the Figure: 1. GSM Network Architecture
network subsystem (NSS), the radio subsystem (BSS), and
the operation support subsystem (OSS). In order to ensure There are two types of channels in the air interface:
that network operators will have several sources of cellular physical channels and logical channels. The physical
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
29
ISSN (Online): 1694-0814
www.IJCSI.org
channel is the time slots (TS) and Logical channel refers to measurements from several counters. The summery of
the specific type of information that is carried by the measurements are shown in a tabular form below.
physical channel. Logical channels can also be divided
into two types: traffic channels (TCH) and control channel Table:1 Traffic Measurements
(CCH).There are again two types of traffic channels: half-
Traffic TCH
rate (HR) and full-rate (FR). The FR channel is a 13 kbps Network Handling
Measure
Avali
TCH
SDCCH
coded speech or data channel with a raw data rate of 9.6, Actual Conj
Performance Capacity bility Conje
Traffic estion
4.8 or 2.4 kbps, while the HR supports 6.5 kbps coded (Fullrate)
in Erlang
Rate
(%)
stion (%)
speech or data rate of 4.8 or 2.4 kbps. in Erlang (%)
BSC1BER 3407 3348 95.7 0.58 0.03
BSC2BER 3876 3391 89.6 0.41 0
BSC3BER 8364 9826 87.5 1.02 0.09
2. Parameters and Definitions BSC4BER 2831 4178 84.5 0.88 0.16
BSC1CK 7355 4740 85.3 0.31 0.01
• Traffic: It represents hours of calls in Erlang. BSC2CK 8464 4936 81.6 1.23 0.21
• No of TCH: It is the total number of TCH available in BSC3CK 4816 4732 91.4 0.03 0.17
that sector. Normally one ARFCN (absolute radio BSC1BBSR 2349 1391 90.5 0.22 0
frequency carrier number) generates 8 physical BSC2BBSR 6141 5912 97.4 0.48 0.2
channels which can be configured as 8 Full rate TCH BSC3BBSR 8464 4936 90.9 1.31 0.03
(13 Kbps) or 16 Half rate TCH (6.5 Kbps). BSC1SMB 7476 4456 82 0.68 0.06
• No of SDCCH: One logical channel generates 8 BSC2SMB 6403 3889 80.8 0.56 0.11
SDCCH or CBCH channels. Normally two logical BSC3SMB 5990 6288 91 0.73 0.29
channels are used in a sector and out of 16 chls
generated, 15 are used as SDCCH & one CBCH. 4. Determination of Busy Hour
• TCH Traffic: Traffic carried by TCH channels
• SDCCH Traffic: Traffic carried by SDCCH Channels
• SDCCH Availability Rate: It is the number of SDCCH
Channels available divided by maximum number of
SDCCH channels possible for carrying control
information & signalling.
• TCH Availability Rate: It is the number of TCH
available divided by maximum number of TCH
channels possible for carrying traffic.
• SDCCH Drop: It is call drop at SDCCH level. It may
be due to low signal strength or TCH conjunction etc.
• TCH Drop: It is the call drop at TCH level .It may be
due to bad quality link, low signal strength, suddenly
lost connection or any other.
• SDCCH Congestion: Non availability of SDCCH due
to traffic
• Subscriber Perceived TCH Congestion: Non
availability of TCH due to traffic.
There is a non-uniform traffic distribution in different In some BSCs the actual traffic is more than the
MSC areas & the Busy Hour of different MSC areas are theoretical traffic. It is occurring for BSC3BER,
different. BSC4BER & BSC3SMB. It is happening due to the fact
that whenever all the TCH are occupied system
Weekend traffic is different from weekday traffic but its automatically divides the traffic channel (TCH of 13
intensity is normally less than weekday traffic. Kbps) into 2 parts resulting 2 traffic channels (TCH/2 of
6.5 Kbps).That way the traffic channels can be increased
Further analysis needs to be carried out at each BSC level to twice the theoretical value because of one channel
to find out the BUSY HOUR of Location Area which can becoming 2 channels. But the drawback with this is the
be used for dimensioning BSC. speech quality of the channel which reduces as it is
directly proportional to the bit rate. So for these cases and
also for BSC1BER, BSC3CK & BSC2BBSR where both
3.1 Traffic Estimation the values are almost equal, immediate increase in
channels by addition of hardware is required.
Acknowledgments
References
[1] Khedher, H., Tabbane, S., Traffic Characterization of
mobile Networks, IEEE Journal , Digital Object Identifier:
0-7803-7467-3/02 Publication year 2002 ,Page No-1485 -
1489.
[2] Toni Janevski , Traffic Analysis and design of wireless IP
networks, Artech House.
[3] Kennedy Kevin, Luipen Van Boris, Interference effects of
GPRS on a GSM Network, IEEE Journal, Digital Object
Identifier:0-7803-5435-4/99 Publication year 1999, Pages
2087-2091.
[4] Opechowski Z., Correia L.M., Analysis of Traffic
distribution in GSM , IEEE Journal, Digial Object
Identifier 0-7803-7467-3/02 Publication year 2002 ,Pages
390-394.
[5] Bregni, S.; Cioffi, R.; Decina, M , An Empirical study on
time co-relation GSM telephone traffic , Wireless
Communications, IEEE Transactions on Volume: 7 , Issue:
9 Digital Object Identifier: 10.1109/ TWC.2008.070092
Publication Year: 2008 , Page(s): 3428 - 3435
[6] Tatai, P.; Marosi, G.; Osvath, L., A flexible approach to
mobile telephone traffic mass measurement & analysis.
Instrumentation and Measurement Technology Conference,
2001. IMTC 2001. Proceedings of the 18th IEEE Volume:
2 Digital Object Identifier: 10.1109/ IMTC.2001.928281
Publication Year: 2001 , Page(s): 1281 - 1286 vol.2
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
32
ISSN (Online): 1694-0814
www.IJCSI.org
2
Professor-CSE Department, R.M.K Engineering College,
RSM Nagar,Chennai-601206
implementation of DWT, however, also has problems. x JLH (n 1 , n 2 ) = ∑ ∑ g (i1 ).h (i 2 ).x JLL−1 (2n 1 − i1 )(2n 2 − i 2 ) (2)
i1 =0 i 2 =0
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
33
ISSN (Online): 1694-0814
www.IJCSI.org
K −1 K −1
x JHL (n 1 , n 2 ) = ∑ ∑ h (i1 ).g (i 2 ).x JLL−1 (2n 1 − i1 )(2n 2 − i 2 ) (3)
i1 =0 i 2 =0 RAM LLLL,LL
N/2*N/2 M TRANSFORM
LLLH,LH
U MODULE
K −1 K −1 LLHL,HL
X
J
x HH (n1 , n 2 ) = ∑∑ h(i1 ).h(i2 ).x LL
J −1
(2n1 − i1 )(2n2 − i2 ) (4) LLHH,HH
i1 = 0 i2 = 0 INPUT ROM
IMAGE DWT
COEFFICIENTS
Where x LL (n1,n2) input image. Figure 2. Block diagram of the proposed work
3. Proposed System
The transform module decomposes the input image to the
The proposed system focuses to implement an efficient four subbands LL, LH, HL, and HH, and saves the LL
architecture for the two-dimensional discrete wavelet band to the RAM module. After finishing the first-level
transform (2-D DWT). The advantages of the proposed decomposition, the multiplexer selects data from the RAM
architecture are 100% hardware utilization, fast computing module. The LL band is then sent into the transform
time than that of parallel filter architecture, regular data module to perform the second-level decomposition. The
flow, and low control complexity, making this architecture transform module decomposes the LL band to the four sub
suitable for JPEG-2000. bands LLLL, LLLH, LLHL, and LLHH, and saves the
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
34
ISSN (Online): 1694-0814
www.IJCSI.org
x (n)
3.4 Data Flow of Decimation Filter Employing
H(Z) ↓M y (m)
Polyphase Decomposition
Figure 4. A Basic Decimator Table 1 Data flow of decimation filter in polyphase decomposition
The process of converting data sampled at one rate (fs 1 ) to CLK SW IN ODD EVEN OUT
data sampled at another rate (fs 2 ). If fs 1 > fs 2 , the process 0 0 x(0) a 1 x(0)
is called decimation. The function of a decimator is to take 1 1 x(1) a 0 x(1) a 0 x(1)+a 1 x(0)
data that was sampled at one rate and change it to new 2 0 x(2) a 1 x(2)+a 3 x(0)
data sampled at a lower rate. The data must be modified in a 0 x(3)+a 1 x(2)+
such a way that when it is sampled at the lower rate the 3 1 x(3) a 0 x(3)+a 2 x(1)
a 2 x(1)+a 3 x(0)
original signal is preserved. 4 0 x(4) a 1 x(4)+a 3 x(2)
a 0 x(5)+a 1 x(4)+
5 1 x(5) a 0 x(5)+a 2 x(3)
Block Diagram of Polyphase Decomposition a 2 x(3)+a 3 x(2)
Technique 6 0 x(6) a 1 x(6)+a 3 x(4)
a 0 x(7)+a 1 x(6)+
7 1 x(7) a 0 x(7)+a 2 x(5)
The first technique is the polyphase decomposition a 2 x(5)+a 3 x(4)
8 0 x(8) a 1 x(8)+a 3 x(6)
technique as illustrated in Figure 5 which decomposes the
a 0 x(9)+a 1 x(8)+
filter coefficients into even-ordered and odd-ordered parts. 9 1 x(9) a 0 x(9)+a 2 x(7)
a 2 x(7)+a 3 x(6)
In the even clock cycles, the input data are fed to the odd
part and multiplied with the odd-ordered coefficients. In
the odd clock cycles, the input data are fed to the even part 3.5 Coefficient Folding Technique
and multiplied with the even-ordered coefficients. The
In synthesizing architectures, it is important to
output data are the sum of the odd and even parts.The
minimize the silicon area of the integrated
internal clock rate is half the input clock rate after
circuits, which is achieved by reducing the number
employing the polyphase decomposition technique.
of functional units (such as adders, multipliers),
Therefore, we can double the input clock rate to increase
the throughput. When the quantity of processing data is registers, multiplexers, and interconnection wires.
the same, the computing time will be reduced to half. The folding transformation is used to
Thus, this technique can reduce the time cost to a half. We systematically determine the control circuits in the
use the symbol “T/2” to represent the polyphase decomposition architecture where multiple algorithm operations
technique (such as addition operations) are time-multiplexed
to a single functional unit (such as pipelined
adder). By executing multiple algorithm
operations on a single functional unit, the number
of functional units in the implementation is
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
35
ISSN (Online): 1694-0814
www.IJCSI.org
reduced, resulting in an integrated circuit with low transform module, because the image data are fed by a
silicon area. The figure 6 shows the schematic raster-scan mode, each coefficient requires a line delay to
diagram of coefficient folding technique: store the row data for vertical filtering.
The second technique is the coefficient folding technique. Table 2. Design strategy for transform module
As illustrated in figure 6, every two coefficients share one
Methods Stage 1 Stage 2 Total Total Stage2
set of a multiplier, adder, and register. The switches
Stage 1 Stage2 A T A T Area T Idle
control the data path. Viewing the PE0 first, in clock-
cycle 0, the input data x(0) is multiplied with the Original Design a t 2a t/2 3a t at
T/2 T/2 a t/2 2a t/4 3a t/2 at/2
coefficient a1 and added with the content of R1 (initially
A/2 A/2 a/2 t a t/2 3a/2 t at/2
zero). The result a1x(0) is then stored to R0. In clock-
T/2 A/2 a t/2 a t/2 2a t/2 0
cycle 1, the input data x(1) is multiplied with the A/2 T/2 a/2 t 2a t/4 5a/2 t 3at/2
coefficient and added with the content of R0. A-Area: T-Time
Table 3. Data flow of decimation filter employing coefficient folding
technique
References
[1] Chakrabarti, C. and Mumford, C. 1996. “Efficient
realizations of analysis and Synthesis filters based on the
Figure 7. Block diagram of coefficient folding 2D- Discrete wavelet transform in Proc. IEEE ICASSP, pp.
3256-3255.
[2] Chakrabarti, C. and Vishwanath, M. 1996. “Architectures
4. Performance of the Architecture for wavelet transforms:A survey”,VLSI signal processing,
Vol. 14, pp.171-192,
[3] Christopoulos, C., Askelof, J. and Larsson, M. 2000.
4.1 Hardware Implementation “Efficient Methods for Encoding Regions of Interest in the
upcoming JPEG 2000 still image Coding standard”, IEEE
The performance of the proposed architecture is compared signal processing letter, pp.247-249.
in terms of number of multipliers, number of adders, [4] Gab Cheon Jung, Duk Young Jin, and Seong Mo Park,
storage size, computing time, control complexity and 2004. “An Efficient Line based VLSI Architecture for 2D
Lifting DWT”.
hardware utilization. The computing time has been
[5] Parhi, K.K. and Nishitani, T. 1993. “VLSI architectures for
normalized to the internal clocking rate. Doubling of the discrete wavelet Transforms”, IEEE trans. VLSI sys, Vol. 1,
input clock rate for the input pixel can be used. Every two pp. 191-202.
input rows generate one output row. The coefficient [6] Philip P. Dang and Paul M. Chau, 2001. “A high
folding technique has lower accessing time when performance, Low power VLSI design of DWT for lossless
compared to polyphase decomposition technique. compression in JPEG 2000 standard”.
[7] Pingping Yu, Suying Yao, and Jiangtao Xu, 2009. “An
Efficient Architecture for 2D Lifting based Discrete wavelet
transform”.
Table 4. Hardware implementation output. [8] Po-Cheng Wu, and Liang-Gee Chen, “An Efficient
Architecture for Two-Dimensional Discrete Wavelet
Device Stage1 Stage 2 Transform”, IEEE transactions On circuits and systems for
Utilization Polyphase Coefficient video technology, Vol. 11.
Summary Decomposition Folding [9] Powell, S.R. and Chau, P.M. 1992. “Reduced complexity
IOB’S 13% 20% programmable FIR Filters”, IEEE international symposium
LUT 2% 1% on circuits and systems (ISCAS), pp. 561-564.
LOAD 20% 28% [10] Qionghqi Dai, Xinjian Chen, and Chuang Lin, 2004. “A
TIMING REPORT Novel VLSI Architecture for Multidimensional DWT”,
MIN PERIOD 2.926ns 2.725ns IEEE Tran. On Circuits and systems for video technology,
DELAY 2.926ns 2.725ns Vol. 14, No.8, pp. 1105-1110.
OFFSET [11] Vishwanath, M., Owens, R.M. and Irwin, M.J. 1995. “VLSI
MEMORY USAGE Architectures for Discrete wavelet transform”, IEEE trans.
TOTAL 150752KB 153376KB Circuits and systems, Vol. 42.
[12] VLSI Signal Processing systems, K.K.Parhi, Wiley
Publication.
5. Conclusion
2
Electronics and Communication Engineering Department
REVA Institute of Technology and Management
Bangalore-560064
2
Electronics and Communication Engineering Department
REVA Institute of Technology and Management
Bangalore-560064
acknowledgement delay, and channel idle time compared depending on its requirement relative to the requirements
to measurement period is discussed in [2]. cPEAB scheme of other flows in the network. It uses a max-min fairness
has been implemented on Multiband Atheros Driver for algorithm with minimum guarantees. The flow controls its
WiFi (MadWiFi), and the performance is analyzed in packet transmission rate so it only occupies the channel
terms of active bandwidth measurements with probes, for the fraction of time allotted to it by the Bandwidth
adaptive admission control protocol (AAC), available Manager. As available bandwidth in the network and the
bandwidth estimation (ABE), and improved available traffic characteristics of various flows change, the channel
bandwidth estimation (IAB). time proportion allotted also dynamically varies.
A comprehensive review on some of the very recent works Accuracy of available estimated bandwidth and
on Quality of Service issues in MANET has been convergence delay algorithm are research challenges in
presented in [3]. Although MANET has been initially wireless network measurements. Two active probing
proposed for disaster recovery and military techniques TOPP and SloPS are studied in [8]. TOPP
communication, in today's world it has reached the provides more accurate estimation of available bandwidth
civilians in all pervasive manner. QoS support is required than the second one. However SLoPS technique has faster
to satisfy the growing need for multimedia technologies response delay than TOPP.
and commercial applications. A QoS-aware routing protocol that incorporates an
Quality of service provisioning in wireless ad hoc admission control scheme and a feedback scheme to meet
networks plays an integral part in determining the success the QoS requirements of real-time applications is proposed
of network-centric warfare as envisioned in future military in [9]. The novel part of this QoS-aware routing protocol
operations. It requires good scalability of the QoS is the use of the approximate bandwidth estimation to react
architecture since ad hoc networks in the battlefield tend to network traffic. Usage of two bandwidth estimation
to be large [4]. The positive aspects of IntServ and methods to find the residual bandwidth available at each
DiffServ, and extends upon the scalable Landmark routing node to support new streams is done in this work. A
protocol (LANMAR) to support QoS is proposed in this service differentiation supported bandwidth estimation
work. Capability of incorporating mobile backbone model, which considers not only the interference of
networks (MBNs) to further improve the scalability is neighbor nodes but also the flow type, is discussed in [10].
done in this work. Wireless multi-hop network employing the IEEE 802.11
The work given in [5] provides a simple, but nevertheless protocol in Distributed Co-ordination Function (DCF)
extremely accurate, analytical model to compute the mode are becoming increasingly popular. In that network,
802.11 DCF throughput, in the assumption of finite all nodes share wireless. communication channel and
number of terminals and ideal channel conditions. This node-to-node bandwidth estimation Techniques for
work applies to both the packet transmission schemes accurate bandwidth estimation are also important for
employed by DCF, namely, the basic access and the routing protocol wishing to effectively make full use of
RTS/CTS access mechanisms. In addition, it also applies bandwidth. A method to dynamically estimate the node-to-
to a combination of the two schemes, in which packets node available bandwidth with neighboring nodes is
longer than a given threshold are transmitted according to discussed in [11]. The neighbor's bandwidth is estimated
the RTS/CTS mechanism. according to its historical status and the amount of data
Quality of Service (QoS) routing in MANETs is hard to that it transferred recently. Modification of 'Hello' message
achieve because the network topology tends to change in AOADV routing protocol and make it carry information
constantly in a dynamic network. An effective QoS of data transfer recently is proposed in this work.
routing scheme to satisfy the required service demand and Available bandwidth estimation is a vital component of
adapt to the dynamic changes in network resources is admission control for quality-of-service (QoS) in
presented in [6]. In this work, application-Level QoS networks, it seek to provide an accurate estimation of
Routing Scheme (ALRS) comprises three significant available bandwidth such that network applications can
features: (1) Estimation of consumed bandwidth on each adjust their behavior accordingly. An available bandwidth
node by using 2-hop neighbors' traffic information, (2) estimation scheme for IEEE 802.11-based ad hoc network
Route construction combined with admission control on is presented in the work [12]. This scheme does not
each application session with (1), and (3) Route modify the CSMA/CA MAC protocol in any manner, but
maintenance based on (1) and (2). gauges the effect of phenomena such as medium
An Admission Control and Dynamic Bandwidth contention, channel interference, which influence the
Management scheme that provides fairness in the absence available bandwidth, on it. Based on the effect of the
of distributed link level weighted fair scheduling is phenomena on the working of the medium-access scheme,
proposed in [7]. Bandwidth management scheme provided the available bandwidth of a wireless host to each of its
in this work allots each flow a share of the channel time neighbors is estimated.
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
39
ISSN (Online): 1694-0814
www.IJCSI.org
This paper addresses the problem of estimation of not including {H, I} which are hidden nodes for A, but
bandwidth in MANETs by considering channel busy time, they are in A's interference range. If hidden node H has
channel idle time, packet transmission time, and packet data to transfer, then it will consume node A's bandwidth
retransmission time under the collision conditions and since it is within A node’s interference range. Similarly
handshaking time.Remainder of the paper is structured as node A also consumes node H and I bandwidth. Therefore
follows. Section 3 describes the proposed work. Section 4 many nodes in A's interference range will be affected in
presents simulation procedure. Section 5 presents result the usage of bandwidth. Hence it is important that local
analysis. Finally, conclusions are given in section 6. and neighboring nodes within interference range must be
identified as precisely.
Since bandwidth is shared among neighboring nodes, a
3. Proposed Work node listens to the channel and estimates bandwidth on the
ratio of idle and busy times for a predefined interval.
The bandwidth information is one of the important metric Hence the bandwidth is estimated as in equation (1)
of choice for providing Quality of service (QoS). We
BW = ×C
Tidle
propose to estimate the available bandwidth based on the Tint erval
(1)
channel status of the radio to calculate the idle and busy Where T idle denotes the idle time in a interval T interval , C
periods of the shared wireless media. By observing the denotes the channel capacity. In the equation (1) T interval
channel utility of a node, we can take the measure of the comprises of the following time periods.
activities of the node as well as its surrounding neighbors
and thus obtain good approximation of bandwidth usage. Idle time T idle
The channel utilization ratio is defined as the fraction of Time taken for actual transmission of the data T tx
the time within which a node sensing the channel as being Time taken for retransmission of packets T rtx
utilized. We differentiate SENSE BUSY state from BUSY Time taken for four-way handshaking T hs
STATE. Transmitting: If it is currently emitting through
its antenna. Receiving: If there is any node transmitting
with in its transmitting range; sensing, when the medium
is sensed busy but no frame is being received because the
energy level is below the receive power threshold. The
other time the node is idle. According to its influence on
the surrounding media, it define that a node is BUSY
when it is in the state of transmitting or receiving, and
SENSE BUSY when it is in the state of sensing. The status
of the channel in 802.11 wireless radio is broadly
categorized in to four states.
• Busy state (transmitting or receiving packets) Figure 1: Multihop and hidden nodes
• Carrier sensing channel busy (other nodes within
its neighborhood are transmitting packets.
• Virtual carrier sensing busy (refer to RTS or CTS Hence equation (1) can be re written as given in equation
packets) and (2).
• Idle state (not in any of the above states). BW =
Tidle
Tidle +Ttx +Trtx +Ths
×C (2)
Among these four states, the states 1, 2 and 3 can be Where T interval is given by equation (3).
treated as busy state, where as 4 is the idle state. Every Tint erval = Tidle + Ttx + Trtx + Ths (3)
node will continuously monitor the state of the channel for
For each time period T interval , we can estimate the channel
changes from (busy to idle or from idle to busy) and
utilization ratio as given in equation (4).
measures the time period and records the radio in each
state. Tbusy
UR = (4)
3.1 Estimation of Bandwidth in MANETs Tint erval
For smoothing utilization of the current estimation, we
As shown in the below figure 1, the outer circle represents
define a smoothing factor α belongs to {0, 1}. Assuming
node A's interference range and inside circle denotes
the last channel utilization as UR t-1 and the channel
transmission range of node A. Node A's first neighbor set
utilization ratio calculated in the current sampling time
is {B, C}. Node A's second neighbor set is {E, F, G} but
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
40
ISSN (Online): 1694-0814
www.IJCSI.org
window is UR, and then the current channel utilization with the range determined by the PHY
ratio is given by equation (5). characteristics, CW min and CW max . After each
URt = α × URt −1 + (1 − α ) × UR (5) unsuccessful transmission, CW will be doubled until
reaching the maximum value CW max =2mW-1, where
Taking T idle =1-T busy and combining equations (1) and (4), W=(CW min +1). After each successful transmission,
we can write as CW will reset to the minimum value CW min . The
1 − Tbusy back off time is a changing variable and is defined by
BW = ×C (6) equation (10)long as the channel is sensed idle,
Tint erval
frozen when the channel is sensed busy and resumed
1 Tbusy when the channel is sensed
BW = − ×C
(7)
Tint erval Tint erval R min(CWmax, 2 k CWmin ) − 1
Backoff = ∑ P( X = k ) × (10)
2
1 k =0
BW = − UR × C (8) Where CW min is the initial value of the contention
Tint erval window. CW max =2kCW min is the maximum value of
the contention window R is the maximum number of
The channel utilization rate UR t is bounded between 0 and retransmissions and X is the random variable
1. After correctly estimating the channel utilization at time representing the number of retransmissions suffered
t, we can then be able to calculate the available bandwidth by a given frame. It yields to equation (11).
of a node at a time t.
P k × (1 − p) if 0 ≤ k ≤ R − 1
Different time periods indicated in equation (3) can be P( X = k ) = Pk if k = R (11)
calculated as below. 0 if k > R
1) T idle is time period of the node listens to the Where P referred to as the conditional collision
channel and finds it is idle. probability, is the probability that a packet transmitted
2) Time taken for actual transmission of data T tx. Let shall collide.
us assume that in the absence of competing
stations, the time to get and release the channel is a 4) DCF consists of both a basic access method (two
random variable t 1 . The time required to transmit L way hand shaking scheme) and optional channel
bits long packet at a transmission rate of C bps = access method using RTS/CTS (request to send /
t 1 + (L/C). Assume the channel i is composed of n i clear to send) exchanges (four way hand shaking
links with capacities C (i,j) ;j=1..n i . If L-bit long scheme). For station to transmit, it shall sense the
packet finds every single resource available, it will medium to determine if another station is
take a time T tx to traverse the channel as shown in transmitting. If the medium is sensed idle for period
equation (9). of time equal to DIFS (DCF Inter Frame Spacing),
ni the station transmits.
1
Ttx = L × ∑ + t1 (9)
j =1 C (i, j ) The station will keep on sensing the medium till it
and t 1 is the time it takes to get and release n-i times becomes idle for a DIFS period. Then it shall generate a
the channel i. random backoff interval to be stored in a counter. The
station shall decrement this backoff interval counter while
3) Time taken for retransmission of the packets T rtx. In the medium is idle, freeze it when a transmission is on the
802.11 DCF, a node starts its transmission if the channel and reactivate it when the channel is sensed idle
medium is sensed to be idle for an interval larger again for more than a DIFS. The station transmits when
than the distributed interframe space (DIFS). If the the backoff time reaches zero. When the destination
medium is busy, the node will defer its transmission receives a packet correctly, it will transmit an ACK to
until a DIFS is detected and then generate a random indicate the successful packet reception after a SIFS (Short
backoff period (backoff timer) before retransmission. Inter Frame Space) interval. If the source station does not
The backoff timer will be decreased as idle again for receive ACK within a specified ACK timeout the data is
more than a DIFS. A node can initiate a transmission assumed to be lost and source station schedules the
when the backoff timer reaches zero. The backoff retransmission. The RTS/CTS access method is shown in
timer is uniformly chosen in the range [0,CW]. CW figure 2. Successful RTS transmission is given in
is known as contention window, which is an integer equation (12).
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
41
ISSN (Online): 1694-0814
www.IJCSI.org
simulation time increases under varying utilization ratio under different condition like varying idle time and busy
(as shown in the figure 5). time of the channel, channel utilization ratio, and channel
capacity. Hence we may conclude that the proposed
scheme gives better solution for estimation of the
bandwidth in MANETs. We need to address the
bandwidth estimation technique for varying packet lengths
to improve the proposed scheme.
References
[1] Haitao Zhao, Emiliano Garcia-Palacios, Jibo Wei, Yong Xi,
“Accurate available bandwidth estimation in IEEE 802.11
based ad hoc networks”, Computer Communications, 32
(2009), pp. 1050-1057.
[2] Tursunova, S. Inoyatov, K. Young-Tak Kim. 2010.
Cognitive passive estimation of available bandwidth
Figure 3: Available Bandwidth Vs. Simulation Time
(With varying T interval ) (cPEAB) in overlapped IEEE 802.11 WiFi WLANS. In
Proceedings of the IEEE Network Operations and
Management Symposium (NOMS).
[3] Nabendu Chaki, R. Lakshmi Priya, 2009. A study on QoS
issues on Mobile Ad hoc Networks. In Proceedings of the
2nd International Conference on Interaction Sciences:
Information Technology, Culture and Human.
[4] Kaixin Xu, Ken Tang, Rajive Bagordia, Mario Gerla,
Michael Beseschinsky, Adaptive Bandwidth Management
and QOS provisioning in Large scale adhoc networks. In
Proceedings of the Military Communications Conference,
MILCOM; pp. 1018--1023; 2003.
[5] Bianchi, G. Performance analysis of the IEEE 802.11
Distributed Coordination Function, 18(3), IEEE journal on
Selected Areas in Communications, pp. 535-547, March
Figure 4: Available Bandwidth Vs. Simulation Time (With varying
2000.
channel capacity)
[6] Toshiaki Osada, Gen Kitagata, Debasish Chakraborty,
Takuo Suganuma and Norio Shiratori, A New QoS Routing
Scheme Based on Bandwidth Consumption for
MANETs, Journal of Information Processing, 17 (2009)
pp.14-25.
[7] Samarth H. Shah, Kai Chen, Klara Nahrstdt, Dynamic
bandwidth management for single hop ad hoc wireless
networks, In Proceedings of the First IEEE International
Conference on Pervasive Computing and Communications,
2003.
[8] Abdelaziz Amamra, Hou Kun Mean, Available Bandwidth
Estimation in Wireless Ad hoc Network: Accuracy and
Probing Time, In Proceedings of the 11th IEEE
Figure 5: Available Bandwidth Vs. Simulation Time (With varying International Conference on Computational Science and
utilization ratio) Engineering, 2008.
[9] Lei Chen; Heinzelman, W.B, QoS-aware routing based on
6. Conclusions bandwidth estimation for mobile ad hoc networks 23(3),
IEEE journal on Selected Areas in Communications, pp.
This paper presented an estimation bandwidth technique 561-572, March 2005.
for Mobile Ad hoc Networks. Estimation of bandwidth [10] Ge Zhi-hui, Chen Zhi-gang, Zhang Lian-ming, Zhao
technique depends on the channel busy time, channel idle Ming, QoS Routing Based on Service Differentiation
time, packet transmission time, and packet retransmission Supported Bandwidth Estimation for MANET, Journal of
time under the collision conditions and handshaking time. Chinese Computer Systems, 2008.
The proposed bandwidth estimation method is simulated [11] Hongpeng Wang, Lingfei Gao, Zhongqiu Li, Node-to-Node
in several network scenarios to test its operation Available Bandwidth Estimation in Ad Hoc Networks, In
Proceedings of International Conference on Computer and
effectiveness. Bandwidth utilized parameter is analyzed
Electrical Engineering, 2008.
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
43
ISSN (Online): 1694-0814
www.IJCSI.org
2
Dean/Hod EEE, Bannari amman Institute of Technology,
Sathyamangalam, Tamil nadu
Abstract
The need for on-demand provisioning of wavelength routed 1. Introduction
channels with service differentiated offerings within the transport
layer has become more essential due to the recent emergence of The concurrent transmission of multiple streams of data
high bit rate IP network applications such as multimedia with the assistance of special properties of fiber optics is
conferencing systems, video on demand systems, real-time called as wavelength division multiplexing (WDM). The
control systems, etc. Diverse optical transport network WDM network provides the capability of transferring
architectures have been proposed in order to achieve the above
huge amount of data at high speeds by the users over large
requirements. This approach is determined by the fundamental
advances in the wavelength division multiplexing (WDM) distance [Canhui (Sam) Ou Hui Zang et al].
technologies. The concurrent transmission of multiple streams of
data with the assistance of special properties of fiber optics is For the future generation internet, WDM is considered as
called as wavelength division multiplexing (WDM). The WDM
a backbone which is the most talented technology. The
network provides the capability of transferring huge amount of
data at high speeds by the users over large distance. data is routed through optical channels called light paths in
WDM all optical networks. The light path establishment
In this paper, a multicast routing and wavelength assignment requires same wavelength and it should be used along the
protocol for capacity improvement in wavelength division entire route of the light path without wavelength
multiplexing (WDM) networks is designed. In wavelength conversion. This is commonly considered to the
assignment technique, paths from source node to each of the wavelength continuity constraint [Vinh Trong Le et al].
destination nodes and the potential paths are divided into
fragments by the junction nodes and these junction nodes have
the wavelength conversion capability. By using the concept of
2. Multicast Tree Formation
fragmentation and grouping, the proposed scheme can be
generally applied for the wavelength assignment of multicast in
WDM network. 2.1. Basic Definitions
An optimized dynamic traffic grooming algorithm is also The node which cannot split the incoming message to the
developed to address the traffic grooming problem in mesh outgoing ports is called as Multicast Incapable (MI )
networks in the multicast scenario for maximizing the resource nodes. The nodes which are capable of splitting the
utilization as well as minimizing the blocking probability.
incoming message to all the outgoing ports are called as
Keywords: Multicast Incapable (MI ) nodes, Total Network Multicast Capable (MC ) nodes.
Capacity Estimation, The Least Influence Group (LIG)
algorithm, Dynamic Traffic Grooming in Multicast. The set which includes the multicast capable nodes (MC
node) and the leaf multicast incapable nodes (leaf MI
nodes) is called as MC _ SET .
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
45
ISSN (Online): 1694-0814
www.IJCSI.org
The set which includes only the non-leaf multicast 2. End for
incapable nodes, which are not able to connect a new
3. If {D} ≠ Null , Then
destination to the multicast tree, is called as MI _ SET .
3.1 Repeat from1.
The set D includes the unvisited multicast destinations
which are not yet joined to the multicast tree. 4. End if
2.2. Member only Algorithm A network G= (N, E) with node set N and (directed) edge
set E is taken, where each node in the network can be a
T = {s} source or destination of traffic. The nodes in N are {N1,
N2…Nn}.
MI _ SET = Null
MC _ SET = {s} S
D = {D1, D 2....Dn} R1 0
1.1.1 Add Di to T
Junction
1.1.2 Find SCP ( Di , T ) ∉ M , where 3 4 Node
M ∈ MI_SET
Fig. 1 Multicast Routing Process
1.1.3 Add SCP ( Di , T ) to T
1.1.4 Add all the MC nodes to MC _ SET The above diagram (Fig.1) shows the routing process. A
predetermined fraction of the traffic entering the network
1.1.5 Add all the leaf MI nodes to MC _ SET at any node is distributed to every junction node. The
corresponding route from the source to the junction node
1.1.6 Add all the non-leaf MI nodes to
can be denoted as R1. Then each junction node receives
MI _ SET
the traffic to be transmitted for different destinations and it
1.1.7 Delete the non - leaf MI node from routes to their respective destinations. The corresponding
MC _ SET route from the junction node to the destination can be
denoted as R2.
1.1.8 Delete the destination d i from D .
1.2 End if
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
46
ISSN (Online): 1694-0814
www.IJCSI.org
Let I i and E i , be the constraints on the total amount of For the potential request paths, the set Pi = {p i 1, p i 2 …}is
traffic at ingress and egress nodes of the network, defined to indicate all fragments of the ith potential request
respectively. path and the capacity of the jth fragment of the potential
path i, SCPP i j, can be stated as following
The bandwidth requirement for the routing paths R1 and
R2 is derived. Consider a node i with maximum incoming OL( S , J i k ), k = 1, j = 1
traffic I i . Node i sends δ j I i amount of this traffic to node j
during R1 routing for each jєN and thus the traffic demand SCPPi = OL( J i k , J i k −1 ),
j
1< k ≤ Mi , j = k
is δ j I i . Now, node i has received δ i I k traffic from any
k = Mi, j = Mi +1
k
OL( J i , D),
other node k. Out of this, the traffic destined for node j is
δ i r kj since all traffic is initially split without regard to the
final destination. The traffic that needs to be routed from where P i j is the jth fragment of the potential path i, S i is the
node i to node j at R2 routing is given below: source node of the potential path i, and D i is the
destination of the potential path i. Basically, each fragment
∑
k∈N
δ i rkj ≤ δ i E j . can be treated as a reassignment domain of wavelength.
Fragments of a path are mutually independent from the
Thus, the traffic demands from node i to node j at the end wavelength assignment point of view and may be with
of R2 routing is λ i E j . different fragment capacities. The actual capacity of a path
is basically determined by its fragment(s) with the least
Hence, the maximum demand from node i to node j as a capacity. The fragment(s) with the least capacity of a path
result of R1 and R2 routing is δ j I i + δ i E j .Let M = [m ij ] = is named the critical fragment of that path. Let CP i and
[δ j I i + δ i E j ] be the fixed matrix which can handle the CPP i be the path capacity (the least fragment capacity) of
traffic variation. It depends only on aggregate ingress- the path i of the multicast tree, and the path capacity of the
egress capacities and the traffic split ratios δ 1, δ 2 …. δ n , potential path i, respectively, then
Thus the routing scheme is unaware to the changes in
traffic distribution. CPi = j
min SCPR
1≤ j ≤ ri +1
i
CPpi = j
and no common available wavelength between them, this problem in which traffic connections are routed over light
fragment will be considered as a new group. paths in the virtual topology layer and light paths are
routed over physical links in the physical topology layer.
3.2 Total Network Capacity Estimation In this paper, the problem of grooming multicast traffic in
WDM networks is investigated. An optimized dynamic
The influence of network capacity is examined by checking traffic grooming algorithm is developed to address the
whether the links of potential paths overlap with those of the traffic grooming problem in mesh networks in the
multicast groups. If the overlap occurs at the critical fragments of multicast scenario for maximizing the resource utilization
the potential path and the assigned wavelength is the one of the
available wavelengths in that critical fragment, the path capacity
as well as minimizing the blocking probability.
of the potential path will be affected.
4.1 Node Design for Multicast Traffic Grooming
The network capacity affected when λ is assigned for the mth
group, TNC m, λ , can be obtained by the summation of the
In order to support multicast traffic in general, data must
influence of all potential paths as
be copied and duplicated using special hardware, which
may be electronic, optical or a combination of both. In this
TNC m,λ = ∑C
pi ∈P
m ( pi , λ ) case, it is natural to use an approach in which the optical
signal is terminated at an LTE, and the tributaries are
accessed. Tributaries that need to be copied are then
The total network capacity (TNC) gets affected since each group duplicated in the electronic domain. The LTE in Figure 2
should assign one wavelength, and it can be obtained by the performs this operation. In this figure an example is shown
summation as in which the traffic to be duplicated is received on
wavelength λ2, and is then duplicated in the electronic
TNC = ∑ ∑ C m ( pi , λ m ) − q
All m pi ∈P
domain, before being routed back through the digital
cross-connects to the two LTEs which transmit this traffic
on λ1 and λ2, and on two different outgoing OXC ports. A
In the mth group, λ m is the wavelength assigned and q is the copy of the traffic may also be dropped at the considered
affected capacity that is counted repeatedly. When the same node for delivery to attached end users.
wavelength is assigned to the groups it leads to repeated counts
and also the critical fragments of the path travels through the
group.
3. Assign λ which TNC m, λ is minimum in group m. Therefore, the node architecture shown in Figure 3 is
introduced which implements both electronic and optical
duplication, based on need and cost. Such nodes are
4. Dynamic Traffic Grooming In Multicast known as translucent nodes [Ahmed E. Kamal et al].
5. Simulation Results
Fig 3 Node architecture employing optical and electronic duplication
5.1. Simulation Model and Parameters
4.3 Optimized Dynamic Traffic Grooming
(ODTG) Algorithm In this section, the performance of multicast routing and
wavelength assignment technique(MRWA) and Dynamic
Let {MSd} be the set of multicast sessions, d=1,2,……x
traffic grooming algorithm are simulated with an extensive
Let R m be the multicast receiver for the multicast source S, simulation study based upon the ns-2 network simulator
where m = 1, 2, 3….k [Network Simulator: www.isi.edu/nsnam/ns]. The Optical
Let {C R i} be the candidate routes from S to R m .in G’ w Where i WDM network simulator (OWNs) patch in ns2 is used to
=1, 2, 3….n simulate a NSF network (Fig. 4) of 14 nodes. Various
{H j,i } = hops in each {C R i} where j= 1,2,3,….n simulation parameters are given in table 1
{BW j,i } = bandwidth on each hop.
CR = Connection Route
Topology Mesh
Rate Vs Delay
Total no. of nodes 14
Link Wavelength Number 8
2000
Link Delay 10ms
Delay(sec)
Wavelength Conversion Factor 1 1500
MRWA
Wavelength Conversion Distance 8 1000
Wavelength Conversion Time 0.024 REMR
500
Link Utilization sample Interval 0.5
0
Traffic Arrival Rate 0.5
2 4 6 8 10
Traffic Holding Time 0.2
Rate(MB)
Packet Size 200
No. of Receivers 4
Max Requests Number 50 Fig: 6 Rate Vs Delay
Rate 2,4,6, 8 and 10 Mb
Number of Traffic Sources 1,2,3,4 and 5 Rate Vs Utilization
0.06
MRWA
to an exponential process with an arrival rate r 0.04
REMR
(call/seconds). The session holding time is exponentially 0.02
distributed with mean holding time s (seconds). 0
2 4 6 8 10
The connection requests are distributed randomly on all
Rate(MB)
the network nodes. In this simulation, the results of
MRWA is compared with the Resource Efficient Fig: 7 Rate Vs Utilization
Multicast Routing (REMR) protocol and the results of
Optimized dynamic traffic grooming(ODTG) algorithm is 5.4. Results and Discussion of ODTG and Traffic
compared with Static Traffic Grooming and S/G Light tree Grooming and S/G Light tree
In the initial experiment, the number of hops is varied as 0, 1, 2,
3 &4
5.2. Performance Metrics
0.8
0.6
A route selection algorithm is designed based on the
ODTG
0.4 Static
lightpath availability, to select a set of best routes from the
Dynamic S/G
established connection routes..
0.2
0 By simulation results, it is proved that the proposed
0 1 2 3 4 scheme has reduced blocking probability and delay with
No.of.Hops increased throughput and bandwidth utilization.
Fig:8HopVsBlockingprobability
References
[1] Rajkumar and N.S.Murthy Sharma, “A Distributed Priority
No.of.Hops Vs Throughput
Based Routing Algorithm for Dynamic Traffic in Survivable
2500
WDM Networks”, IJCSNS International Journal of
Computer Science and Network Security, VOL.8 No.11,
Throughput
2000
ODTG November 2008.
1500
Static
1000 [2] Canhui (Sam) Ou Hui Zang, Narendra K. Singhal, Keyao
Dynamic S/G
500 Zhu, Laxman H. Sahasrabuddhe, Robert A. Macdonald and
0 Biswanath Mukherjee, “Sub path Protection For Scalability
0 1 2 3 4 And Fast Recovery In Optical WDM Mesh Networks”, IEEE
No.of.Hops Journal On Selected Areas In Communications, Vol. 22, No.
9, November 2004.
Fig: 9 Hop Vs Throughput [3] Vinh Trong Le, Son Hong Ngo, Xiao Hong Jiang, Susumu
Horiguchi and Yasushi Inoguchi, “A Hybrid Algorithm for
No.of.Hops Vs Utilization
Dynamic Lightpath Protection in Survivable WDM Optical
Networks”, IEEE, 2005.
1
0.8 [4] Fen Zhou, Miklos Molnar and Bernard Cousin, “Distance
Utilization
2
Assistant Professor, EIE Dept, GIT,
GITAM University, Visakhapatnam,
Andhra Pradesh, India.
3
Assistant Professor, EIE Dept, GIT,
GITAM University, Visakhapatnam,
Andhra Pradesh, India.
4
Assitant Professor, EIE Dept, GIT,
GITAM University, Visakhapatnam,
Andhra Pradesh, India.
Technological advancement in propulsion and power bladder through an exhaust solenoid valve whenever
systems gives these robotic submarines extended negative buoyancy is required. The system includes a
endurance in both time and range. pressure transducer assembly and an associated means to
With the advent of the new millennium, AUV systems are control the system buoyancy to achieve ascent and descent
being developed for a host of military and civilian at control speeds.
applications all over the world. The oil and gas industry
uses AUVs to make detailed maps of the seafloor before
they start building sub sea infrastructure. The detailed
maps from the AUVs allow the Oil Companies to install
pipelines and sub sea completions in the most cost
effective manner with the minimum disruption to the
environment. A typical military mission for an AUV is to
map an area to determine if there are any mines. Scientists
use AUVs to study the ocean and the ocean floor.
An AUV draws power from secondary battery and its
endurance depends upon the number and type of cells it
carry. As the endurance of vehicles is important for long
missions such as survey, there is a need to conserve
power. In this regard, by employing a suitable buoyancy
engine one can have better stability and controllability of
the vehicle with the minimum consumption of power.
Further a buoyancy engine can substantially reduce the
Figure1. Overview of hardware of Buoyancy Engine
risk of loss of vehicle due to limited water ingress or leak
in to the pressure hull. A well designed buoyancy
controller is an essential ingredient of a buoyancy engine
This is a Controller for the Buoyancy Engine for the
and it should necessarily have sensors to sense the density
control of buoyancy, for use in AUV. A suitable micro-
variations.
controller based open loop system has been developed for
the air to be pumped into and to be released from the
Table1. Specifications of the Buoyancy engine bladder using a flow regulator, pressure sensor and
Depth rating Around 10 m electrical sub-systems such as power supply and solenoid
Air inlet 0.3 liter/min valves.
Power requirement 12V dc
Power consumption 7.2 W
Command interface
RS 232 3. Detailed Design
(master/slave operation)
Event scheduling Programmable
Software µVision3 IDE 3.1 Requirement Analysis of the Controller
Dimensions (L x Dia) 33 * 24
Weight (in air) 11.9 kg 1. The controller should have minimum number of 3
Operating Temperature Range 34 ºC I/O ports.
2. A serial port is required which is very useful for
programming and also debugging.
2. Concept Design 3. It should be cost affordable.
4. EEPROM is required so that it can be programmed
Based on the inputs from literature survey, a concept from software, so that typically no need to
design of a buoyancy engine was made. The system is remove the part from the circuit to reprogram it
designed for a depth of operation of 10 meters and it can which become difficult. Flash memory program
accommodate a change in buoyancy of maximum 5 Kgs. goes much faster.
5. Development tools must be easily available.
Figure 1 shows the prototype model of Variable Buoyancy 6. Must be easily programmable.
System (Constant Weight System) in which there is an air
bottle from which the air is entered through an inlet
solenoid valve into the bladder whenever positive Hence P89C51RD2xx series which belongs to the Flash
buoyancy is required and the air is released from the microcontroller family has been chosen because
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
54
ISSN (Online): 1694-0814
www.IJCSI.org
3.4 Power Supply The flow regulator used is JANATICS Pneumatic flow
regulator. The pressure is then increased by turning the
regulating knob in clockwise direction and the pressure is
The power supply is supplied to the Buoyancy Control
reduced by turning the regulating knob in counter
Unit by using two batteries, each of 6V 4Ah. Power
clockwise direction. The pressure is set always in the
supply to different components:
ascending manner within the specified set pressure. Here,
the pressure is set to about 0.5 bar (approx.).
• 12 V for microcontroller
• 12V for solenoid valves
The bladder used is a football bladder made of rubber. It is
• 5V for ADC connected at the center of a T-type connector such that on
• ±6V for amplification circuit for pressure one end of the T-type connector, an inlet solenoid valve is
transducer connected so that the air enters into the bladder from the
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
55
ISSN (Online): 1694-0814
www.IJCSI.org
air cylinder when the inlet valve gets opened while the firmly. The cylinder is fixed to the chassis by making use
exhaust valve remains closed. To the other end of the T- of 2 rectangular aluminum clamps and 2 crescent
type connector, the exhaust solenoid valve is connected aluminum clamps as shown in the figure 2. A few foam
such that the air exhausts from the bladder to the outside pieces were held below the entire body of the buoyancy
environment when it is opened while the inlet valve control engine such that some positive buoyancy is
remains closed. created. The bladder is connected to the body of the
buoyancy engine by using a small rectangular aluminum
Table 4. Specifications of the Flow Regulator plate screwed to the top of the crescent clamps which is
tied to the plate using a small wire.
Model R13614 The entire wiring inside the water-tight container is
Pressure gauge brought outside by for power ON/OFF switch, reset
port size 15 bar (225 psi) switch, PSEN ON/OFF switch and RS232 for
Set pressure 0.5 – 10 bar programming using a single 12-core Lapp Cable as shown
Installation Any position in the figure 3.37. The cable used belongs to the type
Ambient/media 12*0.5mm² shield. The cable is brought out through a
temperature 5º - 60º C (41º - 140º F) gland whose type is given by M16*1.5.
Now, the entire setup of Buoyancy Engine shown in figure
The cylinder used is a stored pressure type dry powder fire 3 is launched in water to see if it is working according to
extinguisher in which the fine dry powder is removed and the conditions specified in the program.
is pressurized to about 10 bar which is used as an air
cylinder for filling up the air into the bladder.
The neck of the cylinder is connected with a ball valve for
jamming and releasing the air from the cylinder. The
cylinder is pressurized until the pressure in the pressure
gauge read 10 bar. Also the pressure inside the cylinder
could be read through a small dial which is attached to the
neck of the cylinder.
4. Software Overview
Philips Semiconductors produce a range of The entire system is placed in a transparent water tank
Microcontrollers that feature both on-chip Flash memory made of glass which is of about 2m depth. Initially the
and the ability to be reprogrammed using In-System system is negatively buoyant and remained at about 1m
Programming technology. The P89C51RD2FN from depth. When the power switch that is outside the system is
Philips which is used for the current project is one among switched on, the pressure transducer sensed the pressure is
them. Flash Magic is Windows software from the around 0.1 bar at about 1 m depth or less than that and the
Embedded Systems Academy that allows easy access to all voltage output is ≥ 0.5 V. Therefore in order to acquire
the ISP features provided by the devices. positive buoyancy, the system started to budge slowly in
It has the following features: the upward direction as the inlet solenoid valve is opened
for a time period of about 7 seconds and the bladder got
Erasing the Flash memory (individual blocks or filled up with air from the cylinder through the inlet
the whole device) solenoid valve. The entire system has moved up along
Programming the Flash memory with the bladder creating positive buoyancy.The system
Modifying the Boot Vector and Status Byte remained for a delay of about 1 minute when it has
Reading Flash memory reached to a depth of about 10cm i.e. to the top of the tank
Performing a blank check on a section of Flash and now the entire system is positively buoyant as shown
memory in the figure 5.
Reading the signature bytes
Direct load of a new baud rate (high speed 5.2 Buoyancy Engine tested for negative
communications) buoyancy
Sending commands to place device in Boot
loader mode
Now, the exhaust solenoid valve is opened after a delay of
about 1 minute and the air started to exhaust from the
4.3 Flow chart bladder. As the air started to exhaust, the entire system
along with the bladder started to move slowly in the
downward direction until it reached a depth of ≤ 10cm and
the output of the pressure transducer calibrated in terms of
voltage is read as ≤ 0.05 V i.e. the pressure at this point
around ≤ 0.01 bar. Now, the system is negatively buoyant.
The positive and negative buoyant conditions were
observed for a few cycles until the air in the cylinder got
emptied completely. As the cylinder is for one-time
operation, it has been frequently filled with air for
observing the positive and negative buoyant conditions for
several times.
6. Conclusion
5. Valve driving circuit for boosting up the voltage for the derivative of error signal. The derivative control acts
solenoid valves. on rate of change of error and not on the actual error
6. Amplification circuit for the pressure transducer signal. Here, the present depth is compared with the actual
operating at ± 6V for amplifying the O/P voltage of depth and the difference between the two is generated as
the pressure transducer. an error signal. Depending upon that whether the
buoyancy must be increased or decreased is decided such
6.1 Findings that the air/water would be pumped in/out and thus the
closed loop control gets maintained.
Following are the observations made:
A simple open loop Buoyancy Controller can vary Acknowledgments
the buoyancy of the system on commands from an on
board computer. Our sincere thanks to Dr. V. Bhujanga Rao, Director,
The system has to be intelligent to be adaptable to NSTL, Sri.P.K.Panigrahi, Sc. ‘F’, Additional Director,
any changes in environment Head (HRW), Sri. Manu Korulla, Sc. ‘E’, Project Leader
The developed system can be applied universally to (AUV), Sri. A.Manish, Sc. ‘B’, Sri. S.D.Adlinge,
any AUV. M.C.E.A.P. II, Sri. B. Rajgopal, Project Associate (AUV),
Buoyancy is controlled in a simplest way by the use Dr. P.Rajesh Kumar, Associate Professor, Department of
of air as the medium for controlling buoyancy. ECE, A.U. College of Engineering, Visakhapatnam.
The system could also be used as a standalone unit
which can carry some pay loads and carry out limited References
missions. [1] Reference approach on AUV available at NSTL Library.
[2] Walter Fritz, Intelligent Systems and their Societies”, A
6.2 Limitations of the system free e-book.
[3] Hermann K.P Neubert. 2003 Instrument Transducers an
Introduction to their performance and design.
The volume of air inside the bladder could not be
known as no flow meter is used. [4] Muhammad Ali Mazidi, Rolin D. McKinlay, The 8051
Microcontroller and embedded systems using assembly
The air in the cylinder could be used only for one- and C.
time operation and hence this is said to be an open
[5] Myke Predko. 1999 Programming and Customizing the
loop system. The cylinder must be pressurized
8051Microcontroller.
repeatedly for several operations. Therefore, a closed
loop system could be used avoiding the frequent [6] Thomas W.Schultz. 2004 C and the 8051.
pressurization of the air cylinder. [7] K. Ravi Sankar, D.S.S Bhavannarayana, B. Bhanu
Large volume changes cannot be achieved with a Prasad. “Physics”.
bladder made of rubber. So, for greater volume [8] Benjamin C. Kuo. 2002 Automatic Control Systems.
changes, smart materials can be used for buoyancy [9] Edward V. Lewise (editor). 1988 Principles of naval
control applications. architecture, VOl-II. Resistance, Propulsion and
abstraction. Published by “the society of naval
architecture and marine engineer.
7. Future Scope of Work
[10] Gregory TA. Kovacs, 1998 “Micro machined
Transducers”
The system can be improved in many ways. One way is
that a flow meter can be introduced for the same open loop
system (but using two pressure sensors) such that the
volume of flow inside the bladder could be known. Two
pressure sensors, one immediately after the flow meter and
one externally are introduced such that the internal volume
and external volume are both compared whose output
would be read through an ADC and thus depending upon
the output of the ADC, the solenoid valves are controlled
by the controller such that the buoyancy gets maintained.
One more way to improve the system includes introducing
a PD control loop. The PD controller is a device which
produces a control signal consisting of two terms – one
proportional to error signal and the other proportional to
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
58
ISSN (Online): 1694-0814
www.IJCSI.org
2
Dept. of Electrical engineering, NIT, Rourkela, Odisha
1. Introduction
1.1 Double Gate MOSFET Structure
2.2 Band Diagram consider an NMOSFET with qψ kT >> 1 so that the hole
density is negligible. Integrating (1) once with the
symmetry boundary condition dψ dx = 0 , at x = 0 ,
x =0
ψ = ψ 0 is the potential at the center of the silicon film to
be solved later as a function of Vg . We obtain
1/ 2
dψ 2kTni qψ / kT qψ 0 / kT
= (e −e ) (2)
dx ε si
2kT q 2n
Fig.(a) Fig.(b) ψ =
− .ln cos i
.e qψ / 2 kT . x + ψ 0 0
q 2ε kT
Fig.3. Schematic band diagrams of a symmetric, undoped double-gate si
(3)
N-MOSFET.
In the above Fig.3, E f = 0 is the Fermi Level of the n + At x = W / 2, Ψ = Ψ s, The equation (3) is then given by,
Source and Drain, Ei is the intrinsic semiconductor layer
of Fermi Level of gate electrode W is the width of the
q (ψ s − ψ 0 ) q 2n
channel, tox is the thickness of the oxide layer, Vg =gate = − ln cos i
e qψ 0 / 2 kT .(W / 2)
2kT 2ε si kT
voltage, Ψ 0 =electric potential at the center, Ψ ( x) = (4)
electric potential at any point and Ψ s = electric potential at
ψ s is also related to Vg and tox through the boundary
the surface. At zero gate voltage , Vg = 0 Fig. 3(a) the
condition at the Si − SiO2 interface:
silicon bands are flat for the gate work function shown in
the figure. In Fig.3(b), when Vg = Vt , the conduction band
Vg − ∆φi − ψ s dψ
of the silicon body at the surface is bent near to the ε ox = ε si
tox dx x =W / 2
conduction band of the n+ source-drain (Long dotted (5)
line).As the gate voltage increases towards the threshold
voltage in Fig. 3(b), mobile charge or electron density Where ε ox is the permittivity of the oxide layer, tox is the
becomes appreciable and the conduction band of the thickness of the oxide layer, ∆φi is the work function
silicon body moves near to the conduction band of the
difference between the gate electrode and intrinsic silicon,
source-drain. When Vg = 0 , or less than Vt , ψ s is the surface potential, Vg is the gate potential and ε si
Ψ 0 = Ψ ( x) = Ψ s = Vg .When Vg = Vt , the band bends and
is the permittivity of the silicon layer. By putting the value
Ψ 0 < Ψ ( x ) < Ψ s < Vg . dΨ
of , in the above equation, we have
dx x=w / 2
By defining the coordinates and potential as in Fig. 3, we 1/ 2
2ε si kTni (e qψ s / kT − e qψ 0 / kT )
can write Poisson's equation for the silicon region with got Vg − ∆φ=
i ψs + cox
Here ∆φi is the
only the mobile charge (electron) density as work function difference between the gate electrode and
intrinsic silicon. In other words, ∆φi =0 . Vg is given gate
d 2ψ qni qψ / kT
= e (1) voltage. Equations (4) and (5) are solved to get the
dx 2 ε si solution of ψ s and ψ 0 .From equation (3)
q 2ε si kT
potential of the silicon surface, K is the Boltzmann’s
(6)
constant, T is the Temp. of the silicon film. Here we
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
60
ISSN (Online): 1694-0814
www.IJCSI.org
kT 2Π 2ε kT
Ψ 0 = .ln 2 si2
q qW n
i (7)
0.41v, ψ s ≈ ψ 0 ≈ Vg − ∆φi . After that Ψ 0 becomes 4.8 ev 16.8 mv/v 0.9 nA/um 0.45V 1.1mA
constant and increases exponentially. 4.6ev 45.2 mv/v 3.0 uA/um 0.25V 1.71mA
Results
5. Conclusion
Double gate MOSFET saves the transistor count of the
network. It operates at lower voltages than present CMOS
devices. Stability is at lower voltage.
[2] Taur, Y. , 2000, “An Analytical Solution to a Double-Gate [9] Wong, H.S. P., Frank, D. J., and Solomon, P. M., 1998,
MOSFET with Undoped Body”, IEEE Electron Device “Device design considerations for double-gate, ground-
Lett., vol. 21, NO. 5. plane, and single-gate ultra-thin SOI MOSFET’s at the 25
[3] He, J. , Bian, W. , Tao, Y., Liu, F., Lu, K., Wu, W. , Wang, nm gate length generation”, IEDM Tech. Dig..
T. and Chan, M. , 2007 , “An explicit current–voltage model [10] Shoji, M. and Horiguchi, S. 1999, “Electronic structures and
for undoped double-gate MOSFETs based on accurate yet phonon limited electron mobility of double-gate silicon-on-
analytic approximation to the carrier concentration”, Solid- insulator silicon inversion layers”, J. Appl. Phys., vol. 85,
State Electronics, vol.51, pp.179–185. pp. 2722–2731.
[4] Ortiz-Conde, A., Garcıa Sanchez, F.J., and Guzman, M. , [11] Thomas, E., Cristoloveanu, S. and Ghibaudo, G., 2003,
2003 ,“Exact analytical solution of channel surface potential “Ultimately Thin Double-Gate SOI MOSFET”, IEEE
as an explicit function of gate voltage in undoped-body transactions on electron devices, vol. 50, no. 3.
MOSFETs using the Lambert W function and a threshold [12] Pao, H. C. and Sah C. T., 1966, “Effects of diffusion current
voltage definition there from”, Solid-State Electronics , on characteristics of metal-oxide (insulator)—
vol.47, pp. 2067–2074. semiconductor transistors”, Solid-State Electron., vol. 9, pp.
[5] Ortiz-Conde, A., J. Garcia Sanchez, F. and Muci, J., 2005 927.
“Rigorous analytic solution for the drain current of undoped [13] Brews, J. R., 1978, “A charge sheet model of the
symmetric dual-gate MOSFETs”, Solid-State Electronics, MOSFET”, Solid-State Electron., vol. 21, pp. 345.
vol.49, pp.640-647.
[14] Taur, Y., 2000, “An analytical solution to a double-gate
[6] Balestra, F. and Cristoloveanu, S., 1987, “Double-gate MOSFET with undoped body”, IEEE Electron Device Lett.,
silicon-on-insulator transistor with volume inversion: A new vol. 21, pp. 245–247.
device with greatly enhanced performance”, IEEE Electron
[15] Taur, Y. and Ning, T. H., 1998, “Fundamentals of Modern
Device Lett., vol. EDL-8, pp. 410.
VLSI Devices”, Cambridge, U.K.: Cambridge Univ. Press.
[7] Taur, Y. and Ning, T. H., 1997, “Fundamentals of Modern
[16] Taur, Y., 2001, “Analytic solutions of charge and
VLSI Devices”, Cambridge, U.K.: Cambridge Univ. Press,
capacitance in symmetric and asymmetric double-gate
1998.
MOSFETs”, IEEE Trans. Electron Devices, vol. 48, pp.
[8] Taur, Y., “CMOS scaling into the nanometer regime”, Proc. 2861.
IEEE, vol. 85, pp. 486–504.
[17] Filanovsky, M. and Bakes, H., 1994, “CMOS Schmitt
Trigger Design”, IEEE Trans. on Cirt. ,Sys. Fund. and App.,
vol. 41. no. 1.
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
63
ISSN (Online): 1694-0814
www.IJCSI.org
1
P Professor and Head, Department of Applied Electronics and Instrumentation,
P
2
P Principal and Professor, Department of Electronics and Communication,
P
Finally, a selection criterion is applied to weed out those representing the weighting of stochastic acceleration terms
that are below par. This process is iterated using the that pull each particle towards pbest and gbest positions, n
selected set of solutions until a specific criterion is met. is the migration number, r 1 and r 2 are two random R R R R
The advantages of EAs are their adaptability to change variables in the range [0, 1], xi ( x1i , xi2 , xi3 , , xiD ) is the
and ability to quickly generate good enough solutions [1,
position of the ith particle, pbest i = (pbest1, pbest2, ,
P P R R P P P P
2].
pbestD) is the best previous position yielding the best
P P
population of individuals (particles) in the search space. Equation (2.2) represent the weights of the stochastic
However, unlike in other evolutionary optimization acceleration terms that pull each particle towards the local
methods, in PSO there is no direct recombination of best and global best positions. With a large cognitive
genetic material between individuals during the search. coefficient (c 1 ) and small social coefficient (c 2 ) at the
R R R R
PSO algorithm works on the social behavior of particles in beginning, the particles are allowed to move around the
the swarm. Therefore, it finds the global best solution by search space, instead of moving toward the best solution.
simply adjusting the trajectory of each individual toward In the latter part of the optimization, on the other hand, a
its own best location and toward the best particle of the small cognitive coefficient (c 1 ) and large social coefficient R R
entire swarm at each time step called generation. (c 2 ) are used, to allow the particles to converge to the
R R
R R R R
particle are given below [11]: the coefficient c 2 starts with a low value (c 2,min ) and
R R R R
d
n 1 v i n vid c1 r1d ( pbest id n xid ) c 2 r2d ( gbest d n x id ) c 1 and c 2 can be expressed as follows:
R R R R
i i
iter
(1) c1 (iter ) (c1, min c2, max ) c1, max (3)
d d d
itermax
n 1 xi n xi n 1vi (2)
iter
c2 (iter ) (c2, max c1, min ) c2, min (4)
itermax
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
65
ISSN (Online): 1694-0814
www.IJCSI.org
where iter is the current iteration number and iter max is the
R R base parameters were optimized as mentioned in [2, 3, 4]
maximum iteration number. the procedure for constructing MFs is shown in Figure 2
3. Integrated Fuzzy PID Controller (IFLC) and procedure for construction the rule base is shown in
Figure 3.
Conventional PID controllers are still the most widely
used in industry for various control applications, due to Step 1: Obtain OF and CF from EA for the
their simple structure, ease of design, and low cost of corresponding test system with the
implementation. However, PID controllers might not specified objective function
perform satisfactorily if the system to be controlled is of
Step 2: Setup 'look-up tables' for MFs name, type,
highly non-linear and/or uncertain nature. On the other
hand, conventional fuzzy control has long been known for parameter array size and Initialize MFs
its ability to handle non-linearity and uncertainty through Step 3: Determine MF parameters for NB, NS and
the use of fuzzy set theory. It is thus believed that by ZO from lookup table
combining these two techniques together a better control Step 4: Calculate the new MF parameters using
system can be achieved [14]. The basic Evolutionary IFLC OF and CF
architecture is shown in Figure 1, where FLC is used in a Step 5: Determine MF parameters for ZO (since
supplementary role to enhance the performances of the ZO MF has +ve and -ve components)
conventional PID controller. Step 6: Negate and 'flip' NB and NS to get
'mirror-image’ PB and PS MFs definitions
Step 7: Update FLC Structure with the new MFs
Figure 2 Procedure to construct membership function
error (difference between the present error e(t) and Step 5: Convert rule base matrix to a FLC rule
previous error e(t-1)), is the FLC output and u p is the R R
structure
PID controller output. When the control conditions
change, it is easy for the FLC to realize the system Figure 3 Procedure to construct rule base
behavior and modify the command signal to the PID
controller. Hence the PID controller output is varied non- 4. Three Tank System (3TS)
linearly based on the command signal [15, 16]
Liquid level control has a very large application domain in
3.1 Evolutionary IFLC industry. Its most representative didactical equipments are
the tank systems, i.e. one, two, three or four tank systems.
Three entities of the IFLC which are subject to the Moreover, the three tank system (3TS) is one of the most
optimization procedure are: (a) Rule base parameters, (b) widely used laboratory system for study purposes. Figure
Membership function parameters and (c) PID parameters. 4.2 shows the interacting connection of a three tank
These IFLC parameters were optimized using EAs such as system in which tank 1 is in non-interacting connection,
GA, PSO and MPSO. The Evolutionary IFLC architecture tank 2 and tank 3 are in interacting connection [5].
is shown in Figure 1. The Membership function and rule-
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
66
ISSN (Online): 1694-0814
www.IJCSI.org
KP
P P
KI
P P P P R R
By applying the mass balance Equation and applying Figure 5 shows Simulink simulation setup of IFLC for a
Laplace transform, the transfer function of the system three tank system. The FLC and the PID (K P , K I and K D ) R R R R R R
-K-
1
Setpoint
e_lim
4 err e Mux -K-
1
G(s) 1 Add 1
4 s 10 s 6 s 1
3 2 (10) -K-
1 U
Fuzzy Logic
z ce Ce Ce_lim Controller
Delay
1
|u| ISE
s
Abs Integrator Workspace
Kp
Kd du /dt File
design evolutionary MIMO-FLC, the parameters are set Derivative
simulation time
evolutions is set as 250, population size 50, inertia weight
Figure 5 Simulink implementation of IFLC for three tank system
factor 1, c 1 and c 2 as 2 and for MPSO, the number of
R R R R
evolutions is set as 250, population size 50, inertia weight Tables 2, 3 and 4 shows the optimal IFLC rule base
factor as1, c 1,max and c 2,max as 2.5; c 1,min and c 2,min as 0.5.
R R R R R R R R
optimal rule base of IFLC for 3TS, but slower than PSO; Figure 6 Optimal IFLC membership functions obtained using GA
NB NS ZO PS PB
PSO finds the optimal rule base in 33 iterations. Even if 1
PSO finds the optimal IFLC rule base within 33 iterations, 0.5
the objective function value is higher than that of MPSO.
0
Table 2 Optimal IFLC rule base obtained using GA -1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1
e
e
Degree of membership
Output NB
1 NS ZO PS PB
u NB NS Z PS PB
0.5
NB NB NB NS Z PB
NS NB NB NS PS PB 0
Δe
Output e 0
-1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1
u NB NS Z PS PB output
D eg ree o f m em b ersh ip
1 NB NS Z PS PB
Δe
Z NB NS Z PS PS
PS NS Z PS PS PS 0.5
PB Z PS PS PB PB
0
-1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1
Table 4. Optimal MPSO-IFLC rule base error
D eg ree o f m em b ersh ip
1NB NS Z PS PB
Output e
u NB NS Z PS PB 0.5
NB NB NB NS NS Z 0
Z NB NS Z PS PS
1 NB NS Z PS PB
D eg ree o f m em b ersh ip
PS NS Z PS PS PS
PB Z PS PS PB PB 0.5
0
The figures 6, 7 and 8 shows the optimal IFLC MFs -1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1
obtained by GA, PSO and MPSO for three tank system output
Table 6 Performances of Evolutionary IFLCs for set-point change 4.1 Comparison of Evolutionary IFLC for 3TS
Set-
Control Pos Rt St
Point IAE ISE To investigate the robustness of the proposed evolutionary
Scheme (%) (sec) (sec)
(ft) IFLCs and their ability to work for different set-point
PID 32 2.6 22.5 2.77 1.56 variations and load disturbance variations for the tree tank
IFLC 13 2.4 19.38 1.71 1.15 system, the performances are evaluated by applying a
GA- continuous set-point variation and load disturbance
7 1.9 6.428 1.45 1.08
IFLC variations. The set-point change in the liquid level is
1
PSO- applied in accordance with the Equation (13) and load
0 1.75 6.1 1.21 .808
IFLC disturbances are applied in accordance with the Equation
MPSO- (14).
0 1.35 5.1 1.03 .595
IFLC
PID 32.2 2.4 21 13.85 39.71 0 for 0 t 25
1 for 25 t 100
IFLC 12.6 2.3 17.5 9.55 33.21 SP(t) (13)
GA- 2.5 for 100 t 150
IFLC
4 2.3 7.8 8.54 31.65 1.5 for 150 t 200
5
PSO-
IFLC
0 2.27 7.6 7.30 24.61
0 for 0 t 50
MPSO- 0.2 for 50 t 100
IFLC
0 1.52 7.5 5.23 16.95 L(t) (14)
0.5 for 100 t 150
0.3 for 150 t 200
From Table 6, it can be seen that, MPSO-IFLC exhibits
lesser overshoot, quick rise time and faster settling time. It Figure 9 shows the simulation response of proposed
is noticed that, MPSO-IFLC outperforms the other evolutionary IFLCs, IFLC and PID control schemes for a
controllers in terms of rise time, settling time, IAE and three tank system. The set-point of the level is
ISE. continuously changed as a step function, a unit step input
is given at 25th second, then the set-point is raised to 2.5 ft
P P
Table 7 shows the control performance parameters of EA- at 100th second finally the set-point is brought down to 1.5
P P
IFLCs, IFLC and PID controllers with three tank system ft at 150th second. The closed loop simulation response is
P P
for step load disturbances. The values are tabulated with obtained for 200 seconds. From the response, it is noticed
reference to closed loop responses. that, MPSO-IFLC performs better than other controllers
and effective in controlling the 3TS for set-point changes
Table 7 Performances of Evolutionary IFLCs for load disturbances in liquid level.
Load
Load
Method Correction IAE ISE 3 GA-IFLC
(ft) PID
(sec) 2.5 IFLC
PID 15.97 2.75 1.55 2
PSO-IFLC
MPSO-IFLC
IFLC 11.9 1.90 1.23
Level
MPSO-IFLC in load correction is much faster than other [5] Suresh, M., Srinivasan, G. J., and Hemamalini, R. R.
controllers and the stability is maintained. “Integrated fuzzy logic based intelligent control of three
tank system”, Serbian Journal of Electrical Engineering,
1.4 Vol. 6, No. 1, pp. 1-14, 2009.
1.2 [6] Kim, J. H., Kim, K. C. and Chong, E. K. P. “Fuzzy
1
precompensated PID controllers”, IEEE Trans. Contr. Sys.
Tech., Vol. 2, No. 4, pp. 406-411, 1994.
0.8 GA-IFLC
Level
Figure 10 Response of different controllers for 3TS with varying load [9] Chiang, C. K., Chung, H. Y. and Lin, J. J. “A self-learning
fuzzy logic controller using genetic algorithms with
reinforcements”, IEEE Trans. Fuzzy Syst., Vol. 5, No. 3,
5. Conclusion pp. 460-467, 1997.
[10] Chou, C. H. “Genetic algorithm-based optimal fuzzy
The design of GA-IFLC, PSO-IFLC and MPSO-IFLC for controller design in the linguistic space, IEEE Transactions
a three tank system presented. Parameters of all algorithms on Fuzzy Systems, Vol. 14, No. 3, pp. 372-385, 2006.
are selected based on the trial runs. Simulations are carried [11] Kennedy, J. and Eberhart, R. “Particle swarm
optimization”, in Proc. IEEE Int. Conf. Neural Networks,
out for set-point changes and load disturbances changes.
pp. 1942-1948, 1995.
The robustness of the proposed controllers was
[12] Ratnaweera, A., Halgamuge, S. K. and Watson, C. “Self-
investigated by applying a continuous set-point changes
organizing hierarchical particle swarm optimizer with time-
and load disturbances changes. From the simulation varying acceleration coefficients”, IEEE Transactions on
results, it is inferred that, the performances of proposed evolutionary computation, Vol. 8, No. 3, pp. 240-255,
controllers are better than human designed IFLC and 2004.
conventional PID controllers. Among the proposed [13] Suganthan, P. N. “Particle swarm optimizer with
controllers, the performances of MPSO-IFLC seems to be neighborhood operator”, in Proc. IEEE International
better and it out performs PSO-IFLC and GA-IFLC in Conference on Evolutionary Computation, Vol. 3, pp.
terms of minimum rise time, quick settling time, without 1958-1962, 1999.
overshoot and faster disturbance correction. From the [14] Feng, G. “A survey on analysis and design of model-based
overall simulation results it can be inferred that, MPSO fuzzy control systems”, IEEE Transactions on Fuzzy
performs better than PSO and GA in the optimal design of Systems, Vol. 14, No. 5, pp. 676-697, 2006.
IFLC for three tank system. [15] Shieh M Y; Li T H S , Design and implementation of
5T 5T
2
Principal
QISCET, Ongole
3
University of Oulu
Finland
4
HOD ECE
BEC, Bapatla
Abstract
Frequency Reconfigurable antennas have received significant The use of the 2.4 GHz industrial, scientific, and medical
attention for their applications in communications, electronic (ISM) band is becoming an important means of wireless
surveillance and countermeasures, by adapting their properties to communication. Wireless local-area networks (WLAN),
achieve selectivity in frequency, bandwidth, polarization and wireless Internet at any -point-equipped building, and the
gain. This paper presents the design of reconfigurable conformal
antenna for wireless LAN networks. The proposed antenna is
planned development of Bluetooth all utilizes the 2.4 GHz
suitable for Wireless networks (WLAN) for an operating ISM band. Furthermore, an enormous number of potential
frequency at 2.4 GHz. The antenna covers the 2.4 -2.464 GHz applications based on these technologies are possible in
WLAN band with a return loss of -21 dB. In this paper the the future. Therefore, the development of appropriate
operation at two different frequency bands are presented. The antenna design is imperative.
switching between the different frequency bands is achieved by
using diode switch. A wireless LAN is a data transmission system designed to
Keywords: Frequency reconfigurable antenna, conformal provide location-independent network access between
antenna, diode switch. Conformal antenna. computing devices by using radio waves rather than a
cable infrastructure .In the corporate enterprise, wireless
LANs are usually implemented as the final link between
1. Introduction the existing wired network and a group of client
computers, giving these users wireless access to the full
In recent years the size of portable and mobile devices is resources and services of the corporate network across a
continuously shrinking. This requires new approaches for building or campus setting. The widespread acceptance of
integrating antennas in variable systems. One of the WLANs depends on industry standardization to ensure
methods to implement new antennas is the design of product compatibility and reliability among the various
conformal antennas. This conformal antennas offer manufacturers.
considerable size and location flexibility in comparison
with traditional antennas. Conformal antennas exhibit
unique thin profiles, reduced sizes and improved 2. Conformal Antennas
performance making them suitable for different systems.
However the conformal geometries for antenna design A conformal antenna is an antenna that conforms to
needs to be taken into account during the system design something; in our case, it conforms to a prescribed shape.
process, as it impacts the antenna parameters. The shape can be some part of an airplane, high-speed
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
71
ISSN (Online): 1694-0814
www.IJCSI.org
train, or other vehicle. Antennas with radiating elements an inductor. The flexible substrate is bend exactly at the
on the surface of a cylinder, sphere, or cone, and so on, middle of the X length with a bend angle α.
without the shape being dictated by, for example,
aerodynamic or similar reasons, are usually also called
conformal antennas.
3. Proposed Design of Conformal Antenna The simulation results for two frequency bands are shown
in figure 3.When the switch is in on condition it provides a
The geometry and dimension parameters of the frequency resistance of 2 ohms. Then the length of the conductor
reconfigurable conformal antenna are depicted in Fig. 1. patch is increased which decreases the frequency of
The feed is placed from the ground plane to the upper arm operation. In the second condition when the switch is in
of the antenna. To the right of the feed (as shown in Figure off condition it provides a capacitance of 0.01pF which
1), the arm is shorted to the ground plane. The feed is acts as an open circuit to the dc current. So the length of
closer to the shorting pin than to the open end of the upper the conductor decreases and the frequency of operation
arm. The polarization of this antenna is vertical, and the increases. In this way we can get two frequency bands of
radiation pattern is roughly doughnut shaped, with the axis operation.
of the doughnut in the vertical direction. The antenna
structure is made up of a flexible substrate and a ground The graph for return loss verses frequency for two band of
plane. As shown in the picture, the antenna is placed on frequencies are shown in figure 3.When the diode switch
the flexible substrate. is in on condition, the internal resistance of the diode
switch is 2ohms,so the dc current will flow through the
entire radiating length thereby increasing the radiating
The dimension of the substrate is X mm x Y mm. The total element length. So the resonant frequency in the first case
radiating element length is Z mm. A diode is in the middle is 2.05 GHz with a return loss of nearly -10 db.
of the radiating element and the element is grounded with
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
72
ISSN (Online): 1694-0814
www.IJCSI.org
Figure2.Experimental setup
Acknowledgments
The first author would like to thank the management of
QISCET for giving the support in completing this paper.
References
[1] Arnau cabedo, Jaume anguera, Cristina picher, Miquel
Ribo, Carles Puente “ Multiband Handset Antenna
Combining a PIFA, Slots, and Ground Plane Modes “IEEE
Transactions on Antennas and propagation, vol 57,N0.9,Sep
2009
[2] M.J.Slater, J.Kolinski, H.Pan, and J.T.Bernhard “Study of
Figure8. Return loss vs. frequency plot for a bend angle of α. Conformal Integration Positions for Multiband and
Frequency Reconfigurable Antennas”.
[3] J.Costantine, C.G .Christodoulu, S.E.Barbin “A New
Reconfigurable Multi band Patch Antenna”.
5. Conclusions [4] A.Pique, R.C.Y.Auyeung, M.W.Nurnberger,
D.J.Wendland,C.B.Arnold,A.R. Abbott and L.C. Schuette
The frequency reconfigurable conformal antenna designed “Rapid Prototyping of Conformal Antenna Structures”
for WLAN applications work for the two resonant [5] J.Yeo and R.Mittra “Conformal Multiband Antennas Based
frequencies of 2.05 GHz and 2.424 GHz respectively. If on Fractal Concepts”.
the conformal antenna is bend with an angle of α then the [6] C. Soras, M. Karaboikis, G Tsachtsiris, and V. Makios
resonant frequency is gradually shifted towards the higher “Analysis and Desig of an Inverted-FAntenna Printed on a
side of the 2.424 GHz for each increase in the bend angle PCMCIA Card for the 2.4 GHz ISM Band.
step. To make this conformal antenna resonant at 2.424 [7] Mohammed Z. Azad , Mohammod Ali “A New Class of
GHz frequency with a bend angle of 90 deg, the diode Miniature Embedded Inverted-F Antennas (IFAs) for 2.4
switch position distance has to increase from the feed GHz WLAN Application”.
point towards the inductance position. [8] “Antenna Theory-Analysys and Design” Constantine
Balanis.
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
74
ISSN (Online): 1694-0814
www.IJCSI.org
2
Professor, Dept of Telecommunication
R V College of Engineering, Bangalore 5600069
3
Associate Professor and Chairman, Department of applied Electronics
Jnana Bharati, Bangalore 5600056
The remainder of this paper is organized as follows: Figure 1. Proposed VBLAST System model.
Section 2 presents the proposed V-BLAST system model.
Section 3 describes a V-BLAST detection Technique in 3. The V-Blast Technique
brief .Section 4 introduces our proposed methodology.
Section 5 presents simulation results to show the
performance of our proposed approaches. Section 6 V-BLAST detection uses of linear combinatorial nulling
concludes this paper. techniques (such as ZF or MMSE) or non-linear methods
like symbol cancellation. Turn by turn each sub stream is
considered to be the desired signal and all the others are
2. System Model interferers. Nulling is obtained by linearly weighting (W)
the received signals. The MIMO system requires multiple
antennas at both ends of radio link. It increases data rate
The system model considered for this proposed work is by transmitting independent information streams on
Shown in Figure.1. We consider Tx transmit antennas and different antennas. For V-BLAST, No channel knowledge
Rx receive antennas. The channel is AWGN and its time required at transmitter.
variation is negligible over a frame. The overall channel
can be represented as an M X N complex matrix H with 3.1. Main Steps for V-BLAST detection
the entries of [H] MN = h MN , where h MN is the fading
coefficient of the channel from the Nth transmit antenna to
1. Ordering: choosing the best channel.
the Mth receive antenna. The received signal at the Mth
2. Nulling: using ZF, MMSE, ML.
receive antenna is where x N is the symbol transmitted
3. Slicing: making a symbol decision
from the Nth transmit antenna, and V M is the zero-mean
4. Canceling: subtracting the detected symbol
complex Gaussian noise with The overall received signals
5. Iteration: going to the first step to detect the next
can be represented as[3]
symbol [4].
y1 = H x + v (1)
The detection process consists of two main operations:
T T 1. Interference suppression (nulling): The suppression
Where y1 = [y 1 y 2 · · · y Nr ] , x = [x 1 x 2 · · · xNt ] , and
operation nulls out interference by projecting the received
v = [v 1 , v 2 · · · vNr ]T . Here, (·)T means the matrix
vector onto the null subspace (perpendicular subspace) of
transpose. For the detection of transmitted symbols, the
the subspace spanned by the interfering signals. After that,
channel matrix H should be estimated at the receiver. The
normal detection of the first symbol is performed.
channel estimate can be represented as
2. Interference cancellation (subtraction): The contribution
of the detected symbol is subtracted from the received
H = H + ΔH (2)
vector.
Where Δ H means the channel estimation error. Each
elementof Δ H is an i.i.d complex Gaussian random 3.2. V- BLAST Optimal Ordering
variable with zero-mean and variance σ 2 Δ h / 2 per
dimension, which is generally assumed for the ML Problem in SIC is error propagation is mainly described
channel estimation with the first decode channel is in low SNR, may decode
in error and propagate to subsequent decoding process. So
OSIC gives better performance.
error probability
MMSE 0.2
MMSE+IS
-1
10 QR 0.15
error probability
0.1
0.05
-2
10
0
0 2 4 6 8 10 12 14 16 18 20
Eb/No in dB
0
Tx = 4,Rx = 4,BPSK modulation
10 0.04
ML
0.02
ZF+IS
ZF
0
-1 MMSE 0 2 4 6 8 10 12 14 16 18 20
10
MMSE+IS Eb/No in dB
QR
error probability
Eb/No in dB
More antennas are added. Figure.7 gives good Tx = 4,Rx = 4,QPSK modulation
0.16
improvement results. Comparing to BPSK, QPSK gives ZF+IS
still better results. Again for more clarity, we skip ML part 0.14 ZF
MMSE
and display the comparison of other detection algorithms 0.12
MMSE+IS
QR
through Figure 8 and Figure 9.
0.1
error probability
0
Tx = 4,Rx = 4,QPSK modulation
10
ML 0.08
ZF+IS
ZF 0.06
-1 MMSE
10
MMSE+IS
QR 0.04
error probability
0.02
-2
10
0
0 2 4 6 8 10 12 14 16 18 20
Eb/No in dB
-3
10
-4
10
0 2 4 6 8 10 12 14 16 18 20
Acknowledgments
Eb/No in dB
0.08
[2] P. W. Wolniansky, G. J. Foschini, G. D. Golden, R. A.
0.06
Valenzuela. V-BLAST: An architecture for realizing very
high data rates over the rich scattering. Bell Laboratories,
0.04 Lucent Technologies, Holmdel, NJ 07733.
[3] Kyungchun Lee and Joohwan Chun. Symbol Detection in V-
0.02
BLAST Architectures under Channel Estimation Errors.
IEEE Transactions on Wireless Communications, Vol. 6, No.
0
0 2 4 6 8 10 12 14 16 18 20 2, February 2007.
Eb/No in dB
[4] Shreedhar. A. Joshi, Dr. Rukmini T S, Dr.Mahesh H M.
Figure 8. BER Performance with Tx=Rx=2 for QPSK. Performance analysis of MIMO Technology using V-BLAST
Technique for different linear Detectors in a slow fading
channel. IEEE International Conference on Computational
6. Conclusion conference on Computational Intelligence and Computing
Research (ICCIC’2010).978-1-4224-5966-7/10. p 453-456.
Based on bit error rate, we show the performance of these [5] G.J. Foschini et al, Analysis and Performance of Some Basic
receiver schemes indicates that the ordered OSIC detector Space-Time Architectures, IEEE Journal Selected Areas
based receiver with ZF or MMSE combined with symbol Comm. 21, N. 3, pp. 281-320, April 2003.
cancellation and optimal ordering to improve the [6] G.J Foschini, ‘Layered space-time architecture for wireless
performance with lower complexity and compare the communication in a fading environment when using
computational complexity of these schemes. The different multiple antennas’, Bell Lab. Tech. J., vol. 1, N. 2, pp. 41-59,
modulation schemes definitely help in analyzing these 1996.
detection algorithms. The Maximum-Likelihood (ML) [7] G.J Foschini et al, Simplified Processing for High Spectral
Efficiency Wireless Communication Employing Multi-
detection most effectively balances the accuracy of symbol elment Arrays, IEEE Journal on Selected Areas in
detection with any SNR values. Communications, v.17, N. 11, pp. 1841-1852, Nov. 1999.
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
80
ISSN (Online): 1694-0814
www.IJCSI.org
1. Introduction l~ λg/2
The rectangular ridge waveguide has one or more Figure 1. Block Diagram of half wavelength double-ridged rectangular
waveguide resonator
longitudinal ridges that increase the transmission
bandwidth by reducing the cut off frequency. In ridge
waveguide design, the dimensions of the ridges can be
varied to minimize the dominant cut off frequency while
2. Design Methodology
increasing the bandwidth. Compared to conventional
As stated earlier, half wavelength double-ridged half
rectangular waveguide, ridge waveguide possess several
height rectangular waveguide resonator consists of two
unique characteristics such as wide bandwidth and
half height rectangular waveguide WR2300 and one
controlled resonance frequency. Because of these
capacitive double ridged rectangular waveguide. Air is
characteristic, ridge waveguides have many applications in
used as dielectric in the resonator and copper is used as
microwave and antenna systems [1-3]. It is also useful as
conductive material. The ridge waveguide has ridges at the
transmission waveguide, where a wide frequency range
centre position of the waveguide. The simulated structure
must be covered.
of half wavelength double-ridged rectangular waveguide
This paper presents a half wavelength double-ridged half
resonator is shown in Figure 2.
height rectangular waveguide resonator. A double-ridged
rectangular waveguide is inserted between two equal
The whole structure has a copper coating of 10mm. The
sections of rectangular waveguide WR2300. The
half height rectangular waveguide WR2300 has a
discontinuity created by the two ridges is considered as a
dimension of a=23”=584.2mm and b=5.75”=146.05mm.
capacitance [4]. The double ridge resonator supports the
The other dimensions are shown in Figure 2. The gap
fundamental TE10 mode. This design offers considerable
between the two ridges is the parameter that mostly affects
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
81
ISSN (Online): 1694-0814
www.IJCSI.org
S11 &S12(dB)
-10 -20
S11&S12(dB)
-20 -30
-30 -40
-40
-50
300 320 340 360 380 400
-50 Frequency(MHz)
300 320 340 360 380 400
Frequency(MHz)
(a)
(a)
(b)
(b) Figure 5:Effect of varying ridge height (h) on (a) reflection and
transmission coefficient and (b) input impedance
Figure 3:Effect of varying ridge length (l) on (a) reflection and
transmission coefficient and (b) input impedance
0
-10
-10
S11 &S12(in dB)
-20
S11&S12(dB)
-20
-30
-30
-40
-40
-50
300 320 340 360 380 400
-50 Frequency(MHz)
300 320 340 360 380 400
Frequency(MHz)
(a) (a)
(b) (b)
Figure 4:Effect of varying ridge width (w) on (a) reflection and Figure 6:Effect of varying ridge gap width (G w ) on (a) reflection and
transmission coefficient and (b) input impedance transmission coefficient and (b) input impedance
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
83
ISSN (Online): 1694-0814
www.IJCSI.org
-10
S11&S12(dB)
-20
-30
-40
w
-50
300 320 340 360 380 400
Freqquency(MHz)
(b)
(a)
Figure 8: Simulated structure for high Q half wavelength double-ridged
half height rectangular waveguide resonator
(a) 3-D view, and (b) front view
(W=584.2mm, w=245mm, H=146.05mm, h=68mm, G h =6.1mm,
G w =69.4mm)
-10
S11&S12(MHz)
-20
-30
-40
(b)
Figure 7:Effect of varying ridge gap height (G h ) on (a) reflection and -50
300 320 340 360 380 400
transmission coefficient and (b) input impedance Frequency(MHz)
(a)
By using the above observed results, we did a simulation
for obtaining high quality factor (Q) with narrow
bandwidth. The simulated structure is shown in Figure 8.
From the simulated structure it is clear that improved Q
factor is obtained by decreasing the ridge width and
increasing the ridge gap height. By increasing the ridge
width and by decreasing the ridge gap height, the
bandwidth is decreased drastically to 8 MHz. At the same
time the resonant frequency remained same nearly at
355MHz. Q factor of 44.375 has obtained through the
above simulation. The transmission and reflection
characteristics and the input impedance plot for high Q
half wavelength double-ridged half height rectangular (b)
waveguide resonator are shown in Figure 9. Thus, these Figure 9: (a)Simulated structure of half wavelength double-ridged half
height rectangular waveguide resonator with high Q and its (b)
recommended dimensions are used where high Q is the Transmission and reflection co-efficients.
primary requirement.
Table 1. Effect of variation in ridge waveguide dimensions on resonance
frequency and bandwidth.
4. Conclusion
References
In this paper, a half wavelength double-ridged half height [1] J. Helszain, Ridge waveguides and passive components, The
rectangular waveguide resonator is presented. It is observed institution of engineering and technology, London, United
that by varying the ridge waveguide dimensions, the Kingdom 2000.
bandwidth, frequency, impedance matching and Q-factor [2] Seymour B Cohn, “Properties of ridge waveguide.” Proc. of
can be controlled. Frequency has varied from 316MHz to IEEE, pp.783-788, Sep. 2006.
384 MHz, and bandwidth has varied from 11MHz to [3] S.Hopfer. “Thc design of ridged waveguide,” IRE Trans.
32MHz. Also the return loss has varied from 28dB to 48 dB. microwave Theory Tech., vol. MTT-3, pp. 20-29, Oct. 1955.
Thus, this proposed mechanism can be used for the design [4] David M. Pozar, “Microwave Engineering”, John Wiley &
of various microwave devices depending upon the sons, Inc.,1997.
requirement. [5] HFSS by Ansys (formerly Ansoft).
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
85
ISSN (Online): 1694-0814
www.IJCSI.org
2
Center for Convergence of Technologies (CCT)
Anna University of Technology Tiruchirappalli,
Tamilnadu, India
Abstract
In this paper we have designed and developed ZigBee network in
real time using ZigBee nodes to monitor risky parameters such as
temperature, pressure, toxic gases and other chemical substances.
Discussed about Wireless Sensor Network (WSN), ZigBee,
ZigBee Network, Protocol stack and its various Applications.
Derived various results from the network created. Various
characteristics and network parameters such as data rate, through
put, packet utilization, packet delay, and packet loss are derived.
Keywords: Wireless Sensor Network, ZigBee, ZigBee Dongle,
Wireless Protocol Analyser, Network Parameters.
Figure 1. Components of Sensor Node
1. Introduction
Battery represents the heart of the sensor unit as it decides
Wireless Sensor Networks have emerged as a growing the lifetime of the system. The requirement is that the size
research area where most research scholars and of the battery should be as small as possible at the same
industrialists focus on. Many people believe Wireless time being very energy efficient. Batteries with energy
Sensor Network would become more important than saving capabilities are being designed to increase the
internet in future. WSN consist of small nodes with lifetime of the sensor system. Processor used in the sensor
sensing, computation, and wireless communications node performs several important functions such as
capabilities. WSN can also be defined as a network of memory management, maintaining the resources of the
devices, which can sense the environment and system, handling the interrupts, turning off communication
communicate the information gathered from the monitored equipment when not in use to save power.
field through wireless communications. A typical sensor
node consists of the following components: Sensing 2. ZigBee Technology
Element, Battery, Processor, Memory, and ZigBee is the global Wireless Technology connecting
Communication Equipment. Sensor is a device which dramatically various devices to work together and enhance
converts a physical phenomenon into an electrical signal. everyday life. ZigBee was introduced by IEEE and the
Sensors act as the interface between the physical world ZigBee Alliance provides the standards for various
and the world of electrical devices, such as computers. applications. ZigBee Alliance includes companies such as
Actuators represent the other part of the interface, which Texas Instruments, Free scale, Philips, Cisco, Digi,
convert electrical signals into physical phenomena. [1] Honeywell, Intel, Siemens, Sony, Ember, Emerson,
Sensing Material may be physical, chemical and biological. Reliant Energy, Itron, Kroger [2]. ZigBee is a low power,
Physical sensing material consists of Magnetic, Light, and low cost, low data rate wireless standard for WPAN
Sound and so on. featured with security, reliability, large network capacity,
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
86
ISSN (Online): 1694-0814
www.IJCSI.org
easily deployed, short delay, long transmission range. Mesh network provides more reliability over other
ZigBee protocol stack defines four layer namely PHY network.
layer, MAC layer, Network layer, Application layer.
ZigBee defines Application & Network layer whereas
PHY & MAC layer are defined by IEEE 802.15.4.
• Industrial Sensing and Diagnostics, 60m of distance we could able to send data without any
• Agriculture, loss of packet. The experiments were carried out in our lab
• Military Applications. without any noise interference.
3. Experimental Setup
Set up the Network
3.1 Proposed Model
Y
Processing Unit Send the data to node
Processing Unit
Y
3.2 Hardware Design
System in Condition
Before deploying the node on to the network. The
hardware component is tested using X-CTU software
provided by Digi. Range test has been performed for
various distances in our campus. Based on the Received Figure 4a. Flow Chart
Signal Strength Indicator (RSSI) we found that within
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
88
ISSN (Online): 1694-0814
www.IJCSI.org
5. Conclusion
In this paper we have given overview about ZigBee
network, designed and developed a ZigBee network in real
time with ZigBee nodes. Various characteristics and
network parameters such as data rate, through put, and
packet delay, Received Signal Strength Indication, packet
utilization are derived. It is observed that ZigBee would
be a better one to be implemented in industry to monitor
Figure 12. Packets in MAC Statistics
various risky parameters such as temperature, pressure,
heat, humidity, noise level and other control application.
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
91
ISSN (Online): 1694-0814
www.IJCSI.org
References
[1] http://www.stanford.edu/class/me220/data/lectures/lect02
[2] ZigBee, www.zigbee.org
[3] Shao Yong, Zhang yi, Wang Jian and Qin Tinggao,
“Research and Implementation of ZigBee Networking”,
Proceedings of the 2009 IEEE International Conference on
Mechatronics and Automation, August 9-12, Changchun,
China, Page no.3992-3996
[4] Wireless Protocol Analyser, www.integration.com
[5] X-CTU, http://www.digi.com/support
[6] Stanislav Safaric, Kresimir Malaric, “Internationa
Symposium ELMAR-2006. 07-09 June 2006, Zadar,
Figure 16. Experimental Arrangement Croatia”, Page no 259-262
[7] E.Dalila Pinedo-Frausto, J.Antonio Garcia-Macias, “An
Experimental Analysis of ZigBee Networks”, ISBN: 978-1-
Acknowledgments 422—2413-9/08 2008, Page no:723-729
[8] Li Pengfei, Li Jiakun, jing Junfeng, “Wireless temperature
We would like to thank the Centre for Convergence of monitoring system based on the ZigBee Technology”,
Technologies (CCT), Anna University of Technology - ISBN: 978-1-422—6349-7/10, Page no:V1 160-163
Tiruchirappalli for providing needed technical support which has
been instrumental for conducting the study.
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
92
ISSN (Online): 1694-0814
www.IJCSI.org
log 2 (M) bits are transmitted as ‘side information’ , in technique has high transmit power and design complexity
order to decode the transmitted sequence at the receiver. due to injected signal. The injected signal may occupy the
These rotational factors are embedded along with the data same frequency band of information bearing signal and
sequence and accounts for the redundancy. Higher PAPR modify the symbols in the data block. The challenging
reduction can be achieved with the increase in the number techniques Interleaving, Selected Mapping and Partial
of subblocks M but this requires the use of M separate Transmit Sequence techniques have boosted BER with
IDFTs. reduced data rate.
Seung and Jae (2004), Lim et al (2005), Yang et al (2006), 2. Proposed Modified Interleaving Technique
and Trung and Lampe (2008) also used the Partial
Transmit Sequence technique to achieve the low PAPR A modified Interleaving technique proposed is illustrated
with low computational complexity[5]-[8]. A nonlinear in Figure 4.4. The interleaving patterns for the Interleavers
iterative PTS method is proposed to search the optimal are obtained by OGA (Orthogonal Genetic Algorithm)
combination of phase factors with low complexity (Gao et optimization algorithm. The generated Interleavers are
al, 2009)[9]. In this technique Metroplis criterion is mapped with original OFDM frame and generate the
adopted to avoid the search of optimum phase factor being permuted data block. The PAPR of permuted data block
trapped in local optimum phase factor, thus the PAPR are computed using IDFT operations. The data block with
performance can be further improved. Moreover, the the lowest PAPR is then chosen for the transmission.
search is repeated, and the effect of initial phase factor on Therefore the Interleaver designed at transmitter is
PAPR performance is eliminated significantly. Simulation simplified by the generation of interleaving pattern
results show that the proposed algorithm can yield good generation with the help of optimization technique.
PAPR reduction with low computational complexity.
The definition of the optimization problem is to find the
best interleaving pattern from the pair of vectors
containing numbers from 1 to N, where each number
Table 1 gives the comparison on Performance measure of
represents, the subcarrier index and the random vector
PAPR Reduction Technique.
corresponds with interleaving pattern. The algorithm
begins with a random set of solutions called population. In
Table 1. Performance Comparison each generation, new population is made from old ones.
New individuals are made by crossing parents. The
Issues probability that the individual becomes a parent depends
Increased
Reduced Boosted Distortion
Data rate
Transmit
BER less
on its fitness function.
Types
power
Clipping &
No No No No
Filtering
Coding Yes No No Yes
Tone
Yes Yes No Yes
Reservation
Tone
No Yes No Yes
Injection
Interleaving Yes No Yes Yes
Selected
Yes No Yes Yes
Mapping
Partial
Transmit Yes No Yes Yes
Sequences
function is evaluated for each individual. Crossover is 4. Proposed Modified Partial Transmit
made by multi crossover point selection, the permutation Sequence Technique
is copied from the first parent till the first crossover point
and the rest is from the second parent. If the second The OFDM frame is divided into a number of P
crossover point is reached, the coping will continue again subblocks. After performing the IDFT of these parts, they
from the first parent. The same procedure is repeated till are superimposed but individual phase rotation factor of
the last crossover point. After that, the duplications of these partial transmit sequences is admitted. Using OGA
numbers in each of the two vectors must be replaced by optimization technique, searching of the phase rotation is
unused ones. The mutation is made by simple swap of two carried out and the phase value is restricted to a finite set
numbers from the same vector. The worst case of PAPR is of {0, π/2, π, 3π/2}. If the PAPR of the resulting OFDM
fixed as fitness function. In this procedure, K·M t IDFTs symbol is less than the threshold PAPR 0 , then the frame is
and M t ·[log 2 K] bits of ‘side information’ are required. transmitted. If not another set of phase rotation factor is
Best Interleaving pattern is individually applied to the M t generated and maximum numbers of iterations are
parallel OFDM frames to generate the best permutated repeated to get a final result. This procedure is repeated
frame which results in minimum PAPR for transmission. parallel to all branches. M t antennas transfer the modified
best OFDM frames from the transmitter. M t ·[log 2 P] ‘side
3. Proposed Modified Selected Mapping information’ are transferred to the receiver to recover the
Technique original information.
The proposed Modified Selected Mapping Technique is 5. Proposed Modified Tone Reservation
illustrated in Figure 4.9. Each OFDM frame is mapped to Technique
a number of U independent candidate sequences. From
this one of the lowest PAPR is selected. These Based on the three proposed PAPR reduction technique
independent candidate sequences can be generated by PAPR reduction study, the Proposed Modified Partial
multiplying carrier wise the initial OFDM frame X by U Transmit Sequence Techniques proved its superiority. But
phase vectors, P(u) is defined as [P 1 (u), P 2 (u), . . ., P N (u)], its maximum PAPR is 7.3dB. In the further improvement,
u = 1, 2, . . . , U. Let P(u) = exp(jÞ) and Þ is chosen from to get the best reduction, a simple tone reservation
{0, π/2, π, 3 π/2}. The independent candidates are technique is selected and the optimal selection
transformed to time domain by x(u) = IDFT{X Θ P(u)}, modifications are carried out. In the practical case for the
where Θ denotes element wise multiplication, and their high throughput transmission, tone reservation technique
corresponding PAPRs are calculated. leads the spectral wastage. Because, a set of subcarriers
are used only for the tone reservation purpose and not for
the symbol transmission usage. But to achieve the
excellent PAPR reduction and fine BER response
Modified tone reservation technique is proposed.
8dB at a CCDF of 10-3 for the proposed and conventional The high throughput OFDM signal high PAPR problems
techniques respectively. After 5.5 dB of PAPR, CCDF are solved by the proposed methods of Modified
decreased very sharply and PAPR reduction improvement Interleaving technique, Modified Selected Mapping
is 2dB compared to the conventional technique. The technique, Modified Partial Transmit Sequences technique
performance of the tone reservation depends on the and Modified Tone Reservation technique. The analysis
number of reserved subcarriers. However, increasing the based on varying the number of subcarriers, transmit
number of reserved subcarriers results in a better PAPR antennas and users indicated that the proposed technique
reduction and there is no loss in the BER. There is no need has the high PAPR reduction capability compared with the
for the ‘side information’ transfer to decode the data at the conventional techniques. This grade is achieved at the cost
receiver. of slight decrease in the data rate and a negligible
degradation in the bit error performance of the system.
To make a fair comparison between the four PAPR With the help of proposed Modified Interleaving, Selected
reduction techniques PAPR at CCDF of 10-3 is listed in Mapping, Partial Transmit Sequences techniques BER
Table 2. degradations performance is improved. Based on PAPR
reduction performance comparison, Modified Tone
Table 2 CCDF of the PAPR at 10-3 Reservation provides the best result.
Conventional Proposed
References
Proposed Modified [1] R.W.Bauml, R.F.H. Fischer,J.B.Huber (1996), “Reducing the
Interleaving 10.4 dB 10 dB Peak –to-Average Power Ratio of multiuser modulation by
Technique selected Mapping,” Electronics Letters, pp 414-424.
Proposed Modified [2] M.Breiling, S.H.Muller-Weinfurtner, J.B Huber (2001),
Selected Mapping 9.5 dB 8.2 dB “ SLM Peak power reduction without explicit sie
Technique information,” IEEE Communication Letter, pp 239-241.
Proposed Modified [3] Jayalath D. and Tellambura C. (2000), ‘Adaptive PTS
Partial Transmit 8.5 dB 7.3 dB approach for reduction of peak-to-average power ratio of
Sequence Technique OFDM signal’, IEEE Electronics Letters, Vol. 36, No. 14, pp.
Proposed Modified 1226-1228.
Tone Reservation 8 dB 6 dB [4] Lim D.W., Heo S.J., No J.S. and Chung Habong (2005), ‘A
Technique new PTS OFDM scheme with low complexity for PAPR
reduction’, IEEE Transactions on Broadcasting, Vol. 52, No.
1, pp. 77-82.
From the above analysis, in the first proposal of PAPR [5] H.H.Seung, and H.L.Jae (2004),“PAPR reduction of OFDM
signals using a reduced complexity PTS technique,”IEEE
technique, Modified Interleaving technique achieved the
Signal Processing Letters, Vol.11, No.11, pp. 887-890.
PAPR of 10dB compared to the conventional technique.
[6] K.Yang and S.I.Chang (2003), "Peak-to-average power
The reduction improvement is 0.4dB only. In the next control in OFDM using standard arrays of linear block
proposal based on the Modified Selected Mapping codes”, IEEE Communication Letters, Vol. 7, No. 4, pp. 174-
technique 9.5dB of PAPR is reduced to 8.2dB and its 176.
reduction improvement is 1.3dB. Similar variation is [7] Trung T.N. and Lampe L. (2008), ‘On partial transmit
achieved in the third proposal of Modified Partial sequences for PAR reduction in OFDM systems’, IEEE
Transmit Sequence technique. It creates 7.3dB of PAPR Transactions on Wireless Communications, Vol. 7, No. 2, pp.
from 8.5dB of PAPR of conventional technique. Based on 746-755.
the number of subcarrier, transmit antennas and user [8] J.Gao, J.K.Xie (2009), “ On non-linear Iterative Partial
variation analysis comparison the preferable one is Partial Transmit Sequence for PAPR reduction in OFDM system,”
Transmit Sequence technique. The last proposal on the Proceedings of Electromagnetics Research Symposium,
modified tone reservation technique generates less PAPR Beijing, China, March 23-27, pp. 431-435.
of 6dB with the reduction improvement of 2dB. The [9] Petermann M., Wubben D. and Kameyer K.D. (2009), ‘Joint
Proposed Modified Tone Reservation technique gets better constellation extension and tone reservation for PAPR
PAPR reduction when compared to the other three reduction in Adaptive OFDM system’, IEEE International
proposed techniques. Workshop on Signal Processing Advances in Wireless
Communication (SPAWC), Perugia, Italy.
7. Conclusion
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
97
ISSN (Online): 1694-0814
www.IJCSI.org
2
Professor, E&C Engineering,
K.L.E.College of Engg.& Tech.,
Belgaum-590 014
3
Professor in E&C Engg,
BVB College of Engg. & Tech.,
Hubli-580031
1. Introduction
Electro statically actuated cantilever beam is a base
component in low frequency MEMS filters. In addition
the cantilevers are used in chemical sensors, wherein
change in resonance frequency [1] is used for chemical
detection. Such devices are generally fabricated by surface
micromachining techniques that allow MEMS structures
to be integrated with electronic circuits. Polysilicon Figure 1. Uncurled Cantilever beam.
(Poly-Si) used in these structures develops stress gradients
during cooling. This causes the beam to curl as reported in Applied voltage V dc generates an electrostatic force F e
[2] which has to be accounted for in the model. uniformly distributed throughout the beam length before
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
98
ISSN (Online): 1694-0814
www.IJCSI.org
deflection. However forces get unevenly distributed after side, iterating until y(x) converges. With a little
the deflection. To account for this effect following modification equation (5) can be used to obtain deflection
methodology is adopted to obtain deflection as given in of curled beam as explained in the following section. Tip
[5]. Deflection of the beam tip towards the electrode due deflection y(L r ) for different bias voltages V dc for both
to concentrated load p(x) at x is given by [6] straight as well as curled beam is plotted in Simulation
Results section.
x2
y(L r ) = (3L r − x)p(x) (1) For Cantilever beam natural resonant frequency [7] is
6EI
given by
E is Young’s modulus, x is any distance along the beam
1 km E h
from anchor, L r and w r are the length and width of the f0 = = 0.162 (6)
beam, I is the moment of inertia. Load applied on the 2π m eff ρ L2r
infinitesimal area w r ×dx is assumed as the point load p(x)
given by m eff is the effective mass of beam calculated as m eff
2
=m×(33/140). Spring constant K m is given by
ε 0 ε r wr dx Vdc
p(x) = (2) 3EI
2 d(x) km = (7)
L3r
d ( x) = d 0 − y ( x)
where E is Young’s Modulus and I is the moment of
where d 0 is the static electrode-to-beam air gap with V dc = Inertia of the beam.
0V, y(x) is the deflection of beam at x and ε r is the
effective dielectric constant for the electrostatic gap. 3. Frequency Shift in Curled Cantilever Beam
Since the forces are distributed along the length of the
beam, the deflection at the tip is found by superimposing
the deflections at the tip due to the application of the point
loads at every point on the beam from 0 to L r . This is
done by integrating (1) from 0 to L r yielding
L
ε 0 ε r w rVdc2 r
(3L r − x)
y(L r ) =
12 EI ∫0 d 2 (x)
x 2 dx (3)
2
x As explained in the previous section the stress gradient in
y ( x) = y ( Lr ) (4)
Lr
beam material, causes curling-up (4) of cantilever beam as
shown in figure 2. The gap d 0 is the gap between the
cantilever beam and the substrate electrode if the beam is
Substituting equations (2) and (3) in (4) we get the flat, δ T is the extra gap between the tip of the cantilever
equation for deflection of the beam in terms of its beam and level of anchor, ρ is the radius of curvature of
dimensions, material properties and applied voltage V dc. curled beam, d N is the thickness of silicon nitride which
2 L
forms the insulating layer between beam and electrode.
x ε 0 ε rVdc2 wr r
3 Lr − x DC voltage V dc applied between the beam and electrode
y ( x) =
∫0 (d 0 − y( x)) 2 x
2
dx (5)
Lr 12 EI generates a non-uniform electrostatic force F e which is a
function of ‘x’ the distance from anchor, since the gap
between the electrode and the beam is a function of ‘x’.
Since the desired variable y(x) appears on both sides of
(6) it is best solved by first assuming y(x) = 0 (since Electrostatic force F e (x) at a distance ‘x’ along the curled
initially y(x) = 0 ) on the right hand side, solving for y(x) beam is given by replacing d o by d o +δ y (x) in equation (2)
on the left, then using this function again on right hand
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
99
ISSN (Online): 1694-0814
www.IJCSI.org
Fe
ke = (12)
y (12)
References
[1] T. A. Betts, C. A. Tipple, M. J. Sepaniak, and P. G.
Datskos,( 2000), “Selectivity of chemical sensors based on
micro-cantilevers coated with thin polymer films”,
Analytica Chimica Acta, 422:89-99.
[2] Chen, R.T.; Nguyen, H.; Wu, M.C. (1999), "A low voltage
micromachined optical switch by stress induced bending,”
Proceedings IEEE International Conference on Micro
Electro Mechanical Systems (MEMS‘99), Orlando, FL,
USA, 17-21, pp.424-428.
[3] Peterm K.E. (1978), ‘Dynamic micromechanics on silicon:
Techniques and devices,’ IEEE Transactions on Electron
Devices, Volume 25, Edition 10, pp.1241-1250.
[4] Zhou N, Clark V, Pister K. S. J.( 1998), ‘Nodal Analysis
for MEMS Simulation and Design’ Proc. Int. Conf.
Modeling and Simulation of Microsystems
Figure 4. Beam Length vs. Resonant frequency
Semiconductors, Sensors and Actuators , Santa Clara,
CA, pp 6-8.
[5] Hector J. De Los Santros (1999), “Introduction to
Micromechanical (MEM) Microwave Systems. Artech
House.
[6] S. Timoshenko (1976), “Strength of Materials”, Krieger,
New York.
[7] Senturia S. D. (2001), “Microsystems Design”, Kluwer
Academic Publication, ISBN 0-7923-7246-8
[8] Leow Cheah Wei, Abu Bakar Mohammad , Norazan Mohd
Kassim (2002), “Analytical Modeling For Determination
of Pull-In Voltage For An Electrostatic Actuated MEMS
Cantilever Beam”, ICSE Proceedings , Penang, Malaysia,
pg 233-238, ISBN 0- 7803-7578-5, IEEE.
[9] Yu-Wei Lin, Seungbae Lee, Sheng-Shian Li, Yuan Xie,
Zeying Ren, Nguyen Clark T.-C. (2004), “Series-Resonant
VHF Micromechanical Resonator Reference Oscillators”
in IEEE Journal Of Solid-State Circuits, Vol. 39, No. 12.
5. Conclusions
Based on present theory of engineering mechanics and
vibration theory we have developed analytical equations
for the static and dynamic analysis of the curled cantilever
beam which find wide application as resonant sensors and
MEM resonators in filters and oscillators. Static and
Dynamic behaviors are analyzed using lumped parameter
model of the cantilever. Several graphs are plotted to
study the variation of device parameters like resonant
frequency, tip deflection for various device geometries and
applied voltages. The results demonstrate how the change
in the resonant frequency shift due to curling can be
counteracted by applying additional external bias voltage
whose value can be determined from the plot in figure 5.
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
101
ISSN (Online): 1694-0814
www.IJCSI.org
2
Associate Professor
CSRE, IIT Bombay
1. Introduction
Hyperion data is distributed by USGS. The spatial
resolution of Hyperion is 30 meter. Each Hyperion scene Figure 1: Hyperion’s Swath Width and Length, [5]
is collected as a narrow strip, covering a ground area
approximately 7.7 km in the across-track direction, and 42 PCT highlights the redundancy in the data sets due to
km or 185 km in the along-track direction (depending on similar response in some of the spectral bands, hence PCT
the original data acquisition request). Each scene covers reduce data dimension by decorrelation. PCT is unable to
either 42 km, or 185 km. separate signal and noise components. Normally any noise
USGS distribute level one product, which contains only present in the original image has been concentrated in the
radiometric correction [1], [2]. Hence before any further later principal components in PCT. Ordinarily that is what
processing it is very essential to apply atmospheric would be expected: i.e. that the components would
correction. Atmospherically corrected Hyperion data become progressively noisier as their eigen values
contains 168 bands it means it has that much dimension of decrease. In practice, however, that is not always the case.
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
102
ISSN (Online): 1694-0814
www.IJCSI.org
It is found, sometimes, that earlier components are noisier 3. Approaches to Optimum Dimensions
than those with the smallest eigen values. The noise Selection
adjusted PCT overcomes that problem which is commonly
known as MNF Transform. MNF transform can be applied The important points to be considered while Optimum
by two step procedure. First, transform the original data dimensions selection (dimensionality reduction) are:
such that its noise covariance is the identity matrix, and i. Information quantity of the selected bands should
then apply the standard principal components procedure. be almost same as the original data
In remote sensing various spectral bands are with respect
to wavelength channels and response of various Land ii. Correlation between the bands should be as low
use/Land cover for image generation varies w.r.t as possible
wavelength channels. Hence it is very essential to select iii. There should be good separability in the spectral
the spectral dimensions which are giving very good characteristics for good classification
response for vegetation. Application based approach
Optimum dimensions selection by transforming data in to
contains 26 spectral dimensions which have very good
new axis is very common and most popular approach
vegetation importance.
among image analyst. The aim of transforming the data
into new axis is to select the bands which are contributing
2. Atmospheric Correction maximum information for separability of classes and
removing least significant bands. Optimum dimensions
The process, which transforms the data from spectral selection can be performed by transforming data into new
radiance to spectral reflectance, is known as atmospheric axis by preserving the information content such that data
correction, compensation, or removal. Atmospheric becomes decorrelated. Decorrelation of the dataset can be
correction is the processing to eliminate radiance from performed in two ways one by maximizing the variance
atmospheric dispersion (Neighbouring effect), path and second by adjusting noise along its transformed axis.
radiance and clouds and gaseous absorption which are As a solution to this problem, two major approaches
contaminating the observed pixels. Hyperion images are Principal Component Transform (PCT) and Noise adjusted
the rich source of information contained in hundreds PCT or better known as Minimum Noise Fraction (MNF)
narrow contiguous spectral bands. There are number of Transform can be implemented which reduce the
atmospheric agents which contaminate the content of dimensionality by preserving the information content. In
various bands information. To get the complete advantage remote sensing various Land Use/Land Cover classes
of Hyperion data it is required to apply atmospheric responds in different wavelength regions (spectral bands)
correction. differently. Therefore, only those spectral bands are
required to select which have importance w.r.t.
Fast Line-of-Sight Atmospheric Analysis of Spectral application. Such as for crop classification 26 spectral
Hypercubes (FLAASH) is an efficient correction code bands which have vegetation importance only those are
based on MODTRAN 4 (Moderate resolution atmospheric selected.
transmission) [6]. FLAASH is available in the Research
Systems Inc. ENVI software package. FLAASH operates 3.1 Principal Component Transform
in the 0.4 – 2.5 µ m spectral range [7]. FLAASH required
minimum input parameter and very effective code for Principal Component Transform is a Multiband Image
Hyperion image atmospheric correction. The inputs Operation performed by combining gray levels recorded in
required are, Input radiance image (196 bands calibrated different bands for the same pixel. This is a transform that
ENVI standard image), Atmospheric parameters highlights the redundancy in the data sets due to similar
(atmospheric model, aerosol model and initial visibility in response in some of the wavelengths. Hence PCT reduce
km), Sensor and Ground parameters (sensor type, flying data dimension by decorrelation, highlights specific
height and ground elevation) and Scene parameters (scene features with significant difference in response in different
center location, flight date and flight time (GMT)). bands and the transformed data may be viewed like
Atmospheric corrections reveal some more information enhanced versions compared to originals. For data
which may not be extracted from the original image. transformation it is required to compute mean and
Atmospheric correction removes water and other variance of the bands and covariance between different
absorption features and corrected data contain 168 bands bands for the original data set. Diagonal elements of the
only. covariance matrix are the intra-band variances and Off-
diagonal elements are the inter-band covariances. In
principal component transform it is required to find a
transformation to be applied to the input image data such
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
103
ISSN (Online): 1694-0814
www.IJCSI.org
that the covariance matrix of the result is reduced to a MNF transform can be applied in a easy way i.e. only by
diagonal matrix and also find an axis such that the ensuring that the transformed images are ranked in
variance of the projected coordinates along that axis is increasing order of noise variance. This can be done by
maximum [8]. two step procedure. First: transform the original data such
that its noise covariance is the identity matrix, and then
PCT algorithm available in Research System Inc.
apply the standard principal components procedure. MNF
Environment for Visualization of Images (RSI-ENVI)
algorithm available in RSI-ENVI is applied on Hyperion
software system is applied on Hyperion data. In this data
data in order to remove noise from the data and to
of 168 bands, 52.05% variability was contained by first
determine the inherent dimensionality of the data. In ENVI
principal component (PC1), 27.56% variability was
it is two step procedures:
contained by PC2, and likewise first 13 PCs contains
• The first rotation uses the principal components of the
96.87% variability (Table 1).
noise covariance matrix to decorrelate and rescale the
Table 1: Results of PCT showing the percentage variability contained by noise in the data (a process known as noise whitening),
various PCs of Hyperion data. resulting in transformed data in which the noise has unit
variance and no band-to-band correlations.
Principal Percentage Cumulative • The second rotation uses the principal components
Components Variability Percentage derived from the original image data after they have
Contained
been noise-whitened by the first rotation and rescaled by
PC1 52.05% 52.05%
the noise standard deviation.
PC2 27.56% 79.61%
PC3 5.34% 84.95% The inherent dimensionality of the data is determined by
PC4 2.21% 87.16% examining the final eigenvalues and the associated images.
Data space can be divided into two parts: one part
PC5 1.94% 89.10%
associated with large eigen values and coherent eigen
PC6 1.85% 90.95% images, and a complementary part with near-unity eigen
PC7 1.62% 92.57% values and noise-dominated images. Using only the
PC8 1.29% 93.86% coherent portions separates the noise from the data, thus
improving spectral processing results. Looking to eigen
PC9 0.86% 94.72%
values greater than unity value and associated less noisy
PC 10 0.69% 95.41% images together MNF bands 1 to 7, 9 to 13 and 16 were
PC11 0.56% 95.97% selected for further processing as other MNF bands were
PC12 0.48% 96.45% more noisy and has less then or near unity eigen values.
PC13 0.42% 96.87%
3.3 Application Based Spectral Bands
Primary objective of the data analysis was vegetation
First 13 PCs contains nearly 97% variability and also analysis and very specific is crop classification. The major
through visual inspection it was found that further PCs problem with processing of the hyperion data is its high
were noisier, only first 13 PCs are retained for further number of bands. A large amount of interrelated
processing. information exists among the hyperion bands and not all
spectral bands can be usefully applied to vegetation
3.2 Minimum Noise Fraction Transform classification or estimation of biophysical-parameters.
Hence, if for further analysis bands which are sensitive to
Normally any noise present in the original image has been
vegetation analysis are only selected then it is helpful to
concentrated in the later principal components in PCT.
avoid other spectral variability. The selected wave bands
Ordinarily that is what would be expected: i.e. that the
are listed in Table 2 could be considered significant for the
components would become progressively noisier as their
study of leaf or plant, their biophysical (e.g., biomass,
eigen values decrease. In practice, however, that is not
LAI) or biochemical (e.g., chlorophyll, nitrogen)
always the case. It is found, sometimes, that earlier
properties, and their physiology (e.g., structure of canopy,
components are noisier than those with the smallest eigen
growth stage, growth condition, stress level). These
values. The noise adjusted PCT overcomes that problem
includes 8 bands in visible region, two in red edge, six in
which is commonly known as MNF Transform [8].
near infrared, eight in Moisture Sensitive NIR (MSNIR)
and one each in early MIR and far MIR. The utility of
reflectance in each band for agricultural applications, as
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
104
ISSN (Online): 1694-0814
www.IJCSI.org
The selection of endmembers is a critical step to An ultimate goal of endmember extraction techniques is to
estimating fractional covers accurately. The use of non- find the purest form of each spectrally distinct material on
representative endmembers yields large errors in estimates a scene. During the last decade, several techniques have
of endmember fractions. For image analysis endmembers been proposed for the purpose of autonomous/supervised
are selected from field spectra and also extracted from endmember selection from hyperspectral images. Pixel
image. Endmember extraction from image may provide a Purity Index (PPI) [12] has been widely used because it is
very good solution as the image and endmembers contains available in the RSI-ENVI software system. Therefore PPI
the same environmental and signal characteristics. An is used as endmembers extraction technique.
endmember extraction is one of the fundamental and
crucial tasks in hyperspectral data exploitation therefore
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
105
ISSN (Online): 1694-0814
www.IJCSI.org
the study area i.e. chana, jawar and wheat. For validation x= ∑a m
k =1
k k + n= Ma + n
of the endmembers same locations are georeferenced
through field study. M= [m 1 m 2 ……………..m p ]
a= [a 1 a 2 ……………a p ]
where,
x spectrum of the mixed pixel;
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
106
ISSN (Online): 1694-0814
www.IJCSI.org
m k spectra of the end-members; been carried out by applying NDVI mask selecting NDVI
a k their abundances; values less then 0.4 (which avoids non-vegetated and
p number of the end-members; vegetated areas other than agriculture areas) on the PCT
n l-dimensional error vector accounting for image, MNF transform image and 26 spectral band image
lack-of-fit and noise effects. using enemembers extracted through PPI algorithm for
Physical considerations dictate the following constraints three major crops i.e. chana, jawar and wheat.
ak ≥ 0 (nonnegativity constraint) In figure 3(a) Red colour indicates vegetated areas, in 3(b)
p black colour indicates non-vegetated and other than
∑a
k =1
k = 1 (additivity constraint) agriculture areas which are set to zero, hence no
classification is applied in those areas.
In sub pixel classification using LSU technique if any i) Compare fraction images it should have valid
spatial constraint such as crops are only possible in fractions i.e. between 0-1. Also number of pixels
vegetated areas or masking (i.e. hiding other area and having fractional overflow (fractions > 1) and
analyzing interested area only) are not applied then underflow (fractions < 0) shows accuracy of
proportions are computed for all classes. Even though classification.
some areas appears homogeneous to one particular class
proportions for other classes also computed. Hence it leads ii) RMS error it should have small values
to improper estimate of the fractions. Therefore LSU has
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
107
ISSN (Online): 1694-0814
www.IJCSI.org
First, 13 PCs image which contains nearly 97% variability from, ftp://popo.jpl.nasa.gov/pub/docs/workshops/98_docs/
compared to all PCs is unmixed using LSU. From 2.pdf
comparison it is found that many pixels have overflow and [7] Kruse F. A., (2008), Comparison of ATREM, ACORN,
underflow in fractional estimate and also RMS errors have And FLAASH Atmospheric Corrections using low altitude
large values. This may be due to first 13 PCs contains AVIRIS data of Boulder, Co,
noise component. If MNF bands image unmixed using USA, http://www.hgimaging.com/FAK_Pubs.htm,
LSU, than compared to other images it is found that RMS [8] Richards, J.A. and Jia, X., (2006), Remote Sensing Digital
error is very low but fractions computed are found Image Analysis, An Introduction, Springer-Verlang,
unreliable and very large underflow has been observed. Berlin.
This may be due to in MNF components selection [9] Thenkabail P.S. Enclona E.A., Ashton M.S. and Meer B
components which have eigen values greater than 1 and Vander (2004a) Accuracy assessment of hyperspectral
coherent images are selected. Hence this way MNF bands waveband performance for vegetation analysis
1 to 7, 9 to 13 and 16 were selected which contains only applications. Remote sensing of Environment 91(3-4):354-
60% variability of the image. 376.
[10] Thenkabail P.S. Enclona E.A., Ashton M.S., Legg C and
If 26 spectral band image is unmixed using LSU used Dieu M.J.D., (2004b) Hyperion, IKONOS, ALI and ETM+
most of the pixels having valid fractions and less sensors in the study of African rainforest. Remote sensing
under/overflow is observed compared to PCT and MNF of Environment 90:23-43.
components unmixed. Also RMS error is lowest among [11] Miglani, A., Ray S.S., Pandey R. and Parihar J.S.(2008),
above all analysis. Hence it is proposed that if vegetation Evaluation of EO-1 Hyperion data for Agricultural
analysis is required to carry out it is best to select 26 applications, Journal of Indian society of remote sensing,
vol.36, nos. 3, pp: 255-266.
vegetation bands only given in table 2.
[12] Boardman, J. W., Kruse, F. A, and Green, R. O., (1995),
“Mapping target signatures via partial unmixing of
Acknowledgments AVIRIS data,” in Summaries of the VI JPL Airborne Earth
Science Workshop. Pasadena, CA, down loaded on
Our sincere thanks to the organizers of ICVCI who have good 12/05/2009
platform for putting our research work in public domain. Also from http://www.hgimaging.com/PDF/boardman95.PDF .
our sincere thanks to reviewers who are going to make this paper [13] Lavenier D., Fabiani E., Derrien S., Wagner C.,(2008),
as publication by their valuable suggestions and corrections. “Systolic array for computing the pixel purity index (PPI)
algorithm on hyper spectral images”, down loaded on
November, 2008
References from http://www.irisa.fr/cosi/HOMEPAGE/Lavenier/Publi
[1] Pearlman, J.S., Barry, P.S., Segal, C.C., Shepanski, J., cations/Lav01cf.pdf.
Beiso, D., Carman, S.L., (2003). Hyperion, a Space Borne
Imaging Spectrometer, IEEE Transactions on Geosciences [14] Kanniah K. D. (2005), Linear Mixture Modelling Applied
and Remote Sensing, vol.41, no.6, pp.1160-1173. to IKONOS Data for Mangrove Mapping, published in
Asian conference on Remote Sensing, 2005. Downloaded
[2] USGS, 2004a. Earth Observing 1, downloaded on May, on November, 2008 from, http://www.aars-
2009, from, url: http://eo1.usgs.gov/ acrs.org/acrs/proceeding/ACRS2005/Papers/
[3] Krishna Mohan, (2008), “Hyperspectral Image [15] Shimabukuro Y. E. and Smith J. A., (1991), The Least-
Preprocessing” ISRS Pre-Symposium Tutorial on Squares Mixing Models to Generate Fraction Images
“Hyperspectral Data, Analysis Techniques and Derived From Remote Sensing Multispectral Data, IEEE
Applications”, December, 16-17, 2008, SAC, Ahmedabad. Transactions on Geoscience and Remote Sensing, vol. 29.
[4] Jiang, X., Tang, L., Wang, C. Wang, C., (2004), Spectral no.1, pp.16-20.
characteristics and feature selection of hyperspectral [16] Manolakis D., Siracusa C., and Shaw, G., (2001),
remote sensing data, International Journal of Remote Hyperspectral Subpixel Target Detection Using the Linear
Sensing, vol. 25, no. 1, pp. 51–59. Mixing Model, IEEE Transactions on Geoscience and
[5] USGS, 2004b. EO-1 FAQ, downloaded on May, 2009, Remote Sensing, vol. 39, no. 7, pp.1392-1409.
from,
url//http://eo1.usgs.gov/dataproducts/faq.asp#hyperion.
[6] Adler-Golden S., Berk, A, , Bernstein, L.S., Richtsmeier,
S., Acharya, P.K., and Matthew, M.W., Anderson, G.P,
Allred, C. L., Jeong, L.S., and Chetwynd, J.H.,(2008),
“FLAASH, A MODTRAN4 Atmospheric Correction
Package for Hyperspectral Data Retrieval and
Simulations”, downloaded in September, 2008
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
108
ISSN (Online): 1694-0814
www.IJCSI.org
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
109
ISSN (Online): 1694-0814
www.IJCSI.org
2
Dept of Electronics and Communication Engineering
Indian Institute of Technology, Guwahati, Assam - 781039
3
Dept of Electronics and Communication Engineering
Indian Institute of Technology, Guwahati, Assam - 781039
transistor’s aspect ratio mismatch on the performance of load and it is biased with current sink. The current sink is
classical differential amplifier (CDA) topology at 32 nm implemented using M5 and M6. The designed (W/L)
technology. The differential pair is among the most ratios are indicated in brackets. All the transistors are set
important circuit inventions, dating back to the vacuum to operate in saturation region by biasing different nodes
tube era. As technology progresses, its importance had using appropriate dc potentials. The sensitivity of each
been realized with both bipolar and MOS transistors. node dc potential with respect to device mismatch is
Offering many useful properties, differential operation has investigated.
become the dominant choice in today’s high-performance
The dc signals of the amplifier be V in+ = V I1 , V in- = V I2 ,
analog and mixed-signal circuits. We also have
V o = V O1 and V m = V M . The V I1 , V I2 are differential
investigated how much device dimension mismatch a
input voltages and V o1 , V M are output and mirrored node
classical differential pair between signal or load transistors
voltages. Let V ID be V I1 - V I2 . The KVL around the input
can tolerate.
loop gives.
With appropriate feedback circuits, it is possible to (2)
mitigate the adverse effects of device mismatch to some
the gate-source voltage can be written as
extent. Three different circuit modifications such as source
degenerated resistive feedback, splitting of signal
(3)
transistors and common mode feedback are studied to
mitigate the mismatch effects and comparative analysis of
For output dc differential voltage V OD = V 01 -V M to be
each circuit is given. However these techniques will
zero, with a constraint that voltage drop across both load
introduce degradation in some performance parameters.
transistors be equal, then input offset voltage can be
Therefore, we also have introduced current cancelation
written as
techniques using cross-coupled pair of transistors to
reduce the degradation in the circuit performance. The (4)
analysis and effect of transistor mismatch is presented in
section 2. The circuit modifications and simulation results The mismatch between any two nominally matched circuit
are given in section 3 and section 4 concludes the paper. parameters is usually small compared with the absolute
value of the parameters. The approximate equation of the
2. Study of Transistor Mismatch In CMOS offset voltage V OS is given in equation (4). By defining
Differential Amplifier the difference & average of all the parameters, such as ∆I D
The most common design approach of a differential & I D , ∆ W/L & W/L , ∆V t & V t and by substituting all the
amplifier is to have MOS transistors operated in strongly difference & average values in above equation (4),
inverted region as they provide the most important
advantage of better frequency response compared to the
subthreshold-operated MOS differential amplifiers. The (5)
objective of the differential amplifier is to amplify only the
difference between two voltages regardless of common The above analysis is carried by assuming long channel
mode value. Two important characteristics of a differential equation. For a 15% mismatch in aspect ratio results in an
amplifier are CMRR and offset voltage. For an ideal offset value of
differential amplifier, the common mode gain should be -21mV. Typically, the variations will be larger in short
zero and thus CMMR should be infinite, also the input channel devices.
offset voltage should be zero. For CMOS differential
The MOS transistors M2 and M4 will have same current.
amplifiers, the effect of mismatch on dc performance is
Therefore,
most conveniently represented by the input offset voltage.
It represents the input-referred effect of all the component
mismatches within the amplifier on its dc performance
[13], [14], [15]. The input offset voltage V OS is equal to
the value of differential input voltage V ID that must be
applied to the input to drive the differential output voltage In equation (6) , , , are constant,
V OD to zero. defined by technology and input bias voltage. The
The classical differential amplifier with mirror load is dependence of output node voltage with the aspect ratio
shown in Fig.1. The n-channel MOSFETs M1 and M2 of M2, M4 is known.
forms the differential pair, M3 and M4 acts as a mirror
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
111
ISSN (Online): 1694-0814
www.IJCSI.org
(7)
Table 1. Performance of differential amplifiers with different topologies positive feedback affects adversely the amplifier stability.
at 32nm
The condition required for adequate negative phase shift is
Parameters Units Fig.1 #1 Fig.4 #2 Fig.5 #3 Fig.8 #4 given in equation (15).
DC gain dB 49.62 48.22 49.6 21.85
3dB B W kHz 70.9 61.89 70 870
UGB MHz 21.41 15.9 21.3 10.7
P.M degrees 89.54 89.73 89.55 94.64
L.D.R Volts(V) 0.9 1.2 1 0.6
DC CMRR dB 82.11 77.18 81.97 54.34
DC PSRR dB 49.62 48.22 49.6 21.85
Power µWatts 280 280 280 280
o/p signal m
826.1 755.6 824.7 98
swing Volts
Fig. 10 DC CMRR variation of differential amplifier with and without
T.H.D % 9.59 7.87 9.55 0.287
CMFB
#1 - CDA, #2 - Differential with source resistor, #3- Split
Transistors, #4 CMFB Topology
2
Department of ECE,
university of Tehran,Tehran,Iran
3
Islamic Azad University
Cental Tehran Branch, Tehran,Iran
2.2 Design of NAND and NOR gates by Full adder A is previously reported majority-not based full
majority NOT gate adder that is introduced in [1] and full adder cells B, C, D
and E are four new 1- bit full adder cells.
A NAND gate is implemented with three input capacitors
1nF and a static CMOS inverter. The input capacitance of
the inverter is considered 50nF. A NOR gate is
implemented with three input capacitors 30fF and a static
CMOS inverter so that the input capacitance of the
inverter is 1Ff. The proposed NAND and NOR gates are
illustrated in Fig. 2.
Fig. 3.Design 1
This document is set in 10-point Times New Roman. If In design 2, when majority-not of inputs are 0, cout
absolutely necessary, we suggest the use of condensed line (output carry) is considered as 0 and PMOS transistor is
spacing rather than smaller point sizes. Some technical turned therefore sum is equaled NAND of inputs (NAND
formatting software print mathematical formulas in italic (A, B, C in )). As well as, when majority-not of inputs are
type, with subscripts and superscripts in a slightly smaller 1, cout (output carry) is considered as 1 and NMOS
font size. This is acceptable. transistor is turned therefore sum is equaled NOR of
inputs (NOR (A, B, C in )).
Sum = Majority (A, B, C in , cout , cout ) (2)
Fig. 5.Design 2
Fig. 6.two new 1-bit full adder cells based on design 2 (full adder F and
full adder G)
4. Simulation Results
The six new 1-bit full adder cells and full adder A have
been simulated by Hspice in 45nm standard CMOS
technology and SOI (silicon on insulator) technology at
three different values for supply voltage.
Fig. 4.full adder A and four new 1-bit full adder cells based on design 1
(full adders B, C, D and E)
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
119
ISSN (Online): 1694-0814
www.IJCSI.org
4.1 Simulation in 45nm CMOS technology W/L for PMOS transistors were always kept 1.5 times
those of the NMOS transistors. The operating frequency
We used the same W/L ratio for all NMOS transistor. ranges is from 1.4 KHZ to 1000 MHZ. therefore
Value of W/L for PMOS transistors were always kept 1.5 Frequency ranging has increased. We simulated all full
times those of the NMOS transistors. We simulated all full adder cells at 10MHZ frequency and at values of 1.54,
adder cells at 10MHZ frequency. All full adder cells are 1.55, and 1.56v for Vdd. Values of Vdd have increased in
simulated at values of 0.5, 0.6, and 0.8v for Vdd and SOI because of high performance. A load capacitor of
Frequency ranging is detected from 100KHZ to 100MHZ. 0.21fF (is equaled with 10*C gs ) was put at the output of
A load capacitor of 0.21fF (is equaled with 10*C gs ) was all of full adder cells.
put at the output of all of full adder cells.
Simulation results in 45nm technology are reported in Fig. 9 shows the diagrams of p static and p dynamic versus
five different diagrams shown in fig. 7 and fig. 8. Fig.
Vdd. Fig. 10 shows the diagrams of delay, P total and PDP
7(a) shows the diagram of p static versus Vdd that indicates
versus Vdd in SOI technology. The diagram of
full adder C and full adder G in value 0.5v for Vdd, full
adder E and full adder F for range Vdds, 0.5, 0.6 and 0.8v, p static versus Vdd (fig. 9(a)) introduces that full adder E
have less p static than full adder A. The diagram of p dynamic and full adder F consume less p static than full adder A at
versus Vdd is shown in Fig. 7(b) that introduces full adder all supply voltages, and full adder F has minimum p static .
B and full adder D in values 0.5v and 0.6v for Vdd, full The diagram of p dynamic versus Vdd (fig. 9(b)) indicates that
adder C for range Vdds, 0.5, 0.6 and 0.8v, consume less
p dynamic than full adder A. full adder C havep dynamic almost equal with full adder A.
Fig. 8(a) shows the diagram of delay versus Vdd that The diagram of delay versus Vdd (fig. 10(a)) shows that
introduces full adder C for range Vdds, 0.5, 0.6 and 0.8v, full adder B, full adder C, full adder D and full adder F are
full adder B and full adder D in values 0.6 and 0.8v for faster than full adder A at all supply voltages , and full
Vdd, have the less delay than full adder A. Fig. 8(b) adder F has minimum delay. The diagram of P total versus
shows the diagram of P total versus Vdd that introduces Vdd (fig. 10(b)) indicates that full adder C has less P total
full adder C for range Vdds, 0.5, 0.6 and 0.8v, has less than full adder A in value 1.54v for Vdd. The diagram of
P total than full adder A. Fig. 8(c) shows the diagram of PDP versus Vdd (fig. 10(c)) introduces that full adder C
PDP versus Vdd that indicate full adder C for range Vdds, has less PDP than full adder A and has minimum PDP at
0.5, 0.6 and 0.8v and full adder B in value 0.8v for Vdd, all supply voltages, too. Values of delay, p static , p dynamic ,
consume less power than full adder A. full adder B have
P total and PDP for range Vdds, 1.54, 1.55 and 1.56v, are
minimum PDP in value 0.8v for Vdd. Values of delay,
p static , p dynamic , P total and PDP for range Vdds, 0.5, 0.6 shown in table 4 and table 5 in SOI technology.
and 0.8v, are shown in table 2 and table 3 in 45nm 4.3 Comparison between simulation in 45 nm
1B
adder D and full adder F have less PDP, full adder B, full
adder E and full adder G have more PDP compared with
45nm technology. Frequency ranging has increased in SOI
technology compared with 45nm technology.
5.00E-08
4.50E-08
4.00E-08 F.A A
3.50E-08
F.A B
Pstatic(w)
3.00E-08
F.A C
2.50E-08
F.A E
2.00E-08
F.A F
1.50E-08
1.00E-08 F.A G
5.00E-09
0.00E+00
0.5 0.6 0.8
Vdd(v)
(a)
Delay(s)
4.00E-09 F.A B
F.A B
8.00E-08
F.A C 3.00E-09 F.A C
6.00E-08 F.A D
F.A D
2.00E-09
4.00E-08 F.A E
1.00E-09
2.00E-08
0.00E+00
0.00E+00
0.5 0.6 0.8
0.5 0.6 0.8
Vdd(v)
Vdd(v) (a)
(b)
Fig. 7.a) p static with varying supply voltage, b) p dynamic with varying Ptotal vs. Vdd in 45nm tech.
F.A C
8.00E-07 F.A D
6.00E-07 F.A E
4.00E-07 F.A F
2.00E-07 F.A G
0.00E+00
0.5 0.6 0.8
Vdd(v)
(b)
3.50E-16
3.00E-16
2.50E-16
F.A A
PDP(J)
2.00E-16
F.A B
1.50E-16
F.A C
1.00E-16
5.00E-17
0.00E+00
0.5 0.6 0.8
Vdd(v)
(c)
Fig. 8.a) delay with varying supply voltage, b) P total with varying
supply voltage, c) PDP with varying supply voltage
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
121
ISSN (Online): 1694-0814
www.IJCSI.org
3.50E-07
3.00E-07
2.50E-07
Pstatic(w)
F.A A
2.00E-07
F.A B
1.50E-07
F.A C
1.00E-07
5.00E-08 F.A E Delay vs. Vdd in SOI tech.
0.00E+00 F.A F
1.54 1.55 1.56 F.A G 3.00E-10
2.50E-10 F.A A
Vdd(v)
Delay(s)
2.00E-10 F.A B
(a)
1.50E-10 F.A C
1.00E-10 F.A D
5.00E-11 F.A F
0.00E+00
Power(dynamic) vs. Vdd in SOI tech. 1.54 1.55 1.56
Vdd(v)
2.00E-06 (a)
F.A A
Pdynamic(w)
1.50E-06
F.A B
1.00E-06 F.A C Ptotal vs. Vdd in SOI tech.
F.A D
5.00E-07 4.00E-05
F.A E
3.50E-05
0.00E+00 3.00E-05 F.A A
Ptotal(w)
6.00E-16 F.A C
4.00E-16 F.A D
2.00E-16 F.A F
0.00E+00
1.54 1.55 1.56
Vdd(v)
(c)
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
122
ISSN (Online): 1694-0814
www.IJCSI.org
Fig.10.a) delay with varying supply voltage, b) P total with varying [3] Soeleman, H., Roy, K. and. Paul,B.C. 2001. “Robust
subthreshold logic for ultra-low power operation,” IEEE
supply voltage, c) PDP with varying supply voltage
Trans. VLSI Syst.
[4] Colinge, J. P. 1991 Silicon-on-Insulator Technology:
Table 5: values of p static and p dynamic in SOI technology
Materials to VLSI. Boston, MA: Kluwer.
[5] Lemnios, Z. J. 1995. “Manufacturing technology
challenges for low power electronics,” in Symp. VLSI
Technology, pp 5 –8.
[6] Shahidi, G. G. et al., 1993. “SOIfora1-Volt CMOS
technology and applications to a 512-Kb SRAM with 3.5ns
access time,” in IEDM Tech. Dig., pp. 813–816.
References
[1] Navi, K., Moaiyeri, M.H., Faghih Mirzaee, R., Hashem-
ipour, O. and Mazloom Nezhad, B. 2009. “Two novel
low-power full adders based on majority-not gates”,
Elsevier, Microele-ctronics Journal, Vol. 40, Issue. 1, pp.
126-130.
[2] Moalemi, V. and Afzali-Kusha, A. 2007. “Sub Threshold
1 Bit Full Adder Cells in Sub100 nm Technology,” IEEE
Computer Society Annual Symposium on VLSI, pp. 514-
515.
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
123
ISSN (Online): 1694-0814
www.IJCSI.org
2
Professor, Dept of CSE, Kalasalingam University
Presently,Vice-Chancellor, Anna University of Technology
Chennai, Tamil Nadu, India
3
Additional Professor, Dept of Imaging Sciences & Interventional Radiology,
Sree Chitra Tirunal Institute for Medical Sciences & Technology,
Thiruvananthapuram, India
green minus blue) making it useful in both image Assumptions: Image transformed into feature space,
manipulation i.e, tone and contrast editing and image number of clusters c, stop condition ε, fuzziness parameter
compression applications. In these colour spaces, a m.
difference between colours is computed using Euclidean BEGIN OF M1
distance and here exists difference between lightness and Step 1: Cluster image in feature space, with next
color. Values of L*, u* and v* are defined by [2, 3, 4, 5]. conditions: number of clusters is c, fuzziness
index is m and stop condition is ε.
116.3 YY − 16 ⇔ YY γ Step 2: Repeat for each pixel a ij of image I.
L* = n n
Step 2.1: Find out, into which cluster C i
β
Yn
. Y
⇔ Y
Yn
≤ γ belongs pixel a ij at most.
′ Step 2.2: Find out, whether in the
u* = 13.L * .(u ′ − u n ) (1)
closest surroundings of pixel a ij exists
v* = 13.L * .(v′ − vn′ ) segment R k , whose points belong to
while values of u′ and v′ are defined by same cluster C i .
Step 2.3: If such segment R k exists, then
4X pixel a ij add to segment R k , else create
u′ = new segment R n and add pixel a ij to new
X + 15Y + 3Z (2)
segment R n .
9Y
v′ = Step 3: Merge all segments, which belong to one
X + 15Y + 3Z cluster and are neighbours.
and constants β and γ have values Step 4: Arrange borders of all segments.
3
6 END OF M1
γ = ≈ 0.008856 (3)
29 Segmentation method used in experiments is based on
2
116 29 29 3 simple region growing method. A simple method
β = . = ≈ 903.296296 (4) incorporating both defuzzification and thresholding
3 6 27
parameter T is used in [2]. The method can be varied by
And Xn, Yn, and Zn are reference white tristimulus choosing different types of defuzzification [6].
values-typically the white of a perfectly diffuser under
CIE standard D65 illumination, defined by x = 0.3127 and 3.2 Method M2
y = 0.3290 in the CIE chromaticity diagram.
This segmentation method based on extended feature
3. Segmentation Method space. Here the same segmentation technique of fuzzy c-
means was used. The only difference between the previous
Segmentation refers to the process of partitioning a digital method with that of the new is, considering the extended
image into multiple segments (sets of pixels, also known feature of the images by the second method. The pixel and
as superpixels). Segmentation process consists of its neighboring pixels were considered in this method.
numerous steps. The main objective is to convert the input Here also variations can be made with various types of
image to a particular feature space according to the desired defuzzification. As the defuzzification changes there will
mode of clustering. Here the input image converted from be variations in the segmentation outputs.
RGB colour space to L*u*v* colour space. The objective
of segmentation is to classify each colored pixel (RGB) in 4. Fuzzy C-Means
a given image as having a color in the specified range or
not. The L*, u* and v* values are features that attributes
for fuzzy c-means clustering method. After the first Fuzzy clustering in fuzzy logic deals with the degree of
conversion, opt fuzzy c-means clustering. In our case, we belonging of each point to a cluster, rather than belonging
have chosen fuzzy c-means clustering method, settings are completely to just one cluster. Thus, points on the edge of
in experiments section. Then the cluster sizes are varied a cluster, may be in the cluster to a lesser degree than
according to requirement of segmentation for each image. points in the center of cluster. For each point x here exist a
coefficient giving the degree of being in the kth cluster
u k (x). Usually, the sum of those coefficients for any given
3.1 Method 1 (M1) x is defined to be 1:
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
125
ISSN (Online): 1694-0814
www.IJCSI.org
num.clusters
∀x
∑ u k ( x) = 1
(5) The most important part of this segmentation method is
k =1
extension of feature space. Extension of feature space is
With fuzzy c-means, the centroid of a cluster is the mean based on simple idea, that neighboring pixels have
of all points, weighted by their degree of belonging to the approximately same values of lightness and color. But in
cluster: real images, noise is corrupting the image data or image
which usually consists of textured segments. Basic
Centerk =
∑ x u k ( x) m x (6) segmentation methods based on fuzzy c-means clustering
∑ x u k ( x) m works as follows:
The degree of belonging is related to the inverse of the • Convert image into feature space of clustering
distance to the cluster center: method (usually used is RGB colour space, but
1 IHS, HLS, L*u*v* or L*a*b* colour spaces are
u k ( x) = (7) also used).
d (centerk , x)
• Run fuzzy c-means method on converted image.
then the coefficients are normalized and fuzzified with a • Use some defuzzification rule or rules to classify
real parameter m > 1 so that their sum is 1. So each pixel to segment.
1
uk ( x ) = 2
(8) Simple defuzzification rule is based on maximal
d (centerk , x ) (m −1) membership grade of pixel to cluster [1, 4]. Basic feature
∑
(
j d center , x )
space is only color space, e.g. RGB, HIS, HLS or L*u*v*.
j
These color spaces are as shown on Fig. 1.
For m equal to 2, this is equivalent to normalizing the
coefficient linearly to make their sum 1. When m is close
to 1, then cluster center closest to the point is given much
more weight than the others, and the algorithm is similar
to k-means.
7. Conclusions
References
[1] Hlaváč, V., Šonka, M., Boyle, R.: Image Processing,
(d) (e) Analysis and Machine Vision, 1999, ISBN 0-534-95393-X.
[2] Horváth, J.: Image Segmentation Using Clustering, Košice,
Figure 4: Segmentation results – M1 2003, 88 p. Master thesis
IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011
127
ISSN (Online): 1694-0814
www.IJCSI.org
[3] Horváth, J., Zolotová, I.: L*u*v* Colour Transformation means.pdfPHAM, D. L., PRINCE, J. L.: Adaptive Fuzzy
innComputer Vision, In: Proceedings of 2nd Slovakian- Segmentation of Magnetic Resonance
Hungarian Joint Symposium on Applied Machine Images,http://medic.rad.jhmi.edu/dpham/papers/Pham_afc
Intelligence, Herľany, Slovakia, 2004, pp. 203-208, ISBN m.pdf.
963 7154 23 X [9] Pham, D. L., Prince, J. L.: An Adaptive Fuzzy C-Means
[4] Horváth, J., Zolotová, I., Madarász, L. Contribution Algorithm for Image Segmentation in the Presence of
toSegmentation of Digital Images Based on Clustering. In: Intensity Inhomogeneites, http://citeseer.ist.psu.edu/
IEEE International Conference on Computational cache/%20papers/cs/11590/http:zSzzSziacl.ece.jhu.ed
Cybernetics ICCC 2004, Wien, Austria, pp. 89-93, ISBN [10] Yang, T.-N., Wang, S.-D., Yen S.-J.: Fuzzy algorithms for
3-902463-02-3 Robust Clustering,http://www.csie.ndhu.edu.
[5] Ford, A., Roberts, A.: Colour Space Conversions, tw/~sjyen/Papers/2002Fuzzy.pdf.
http://www.poynton.com/PDFs/coloureq.pdf, 2003. [11] Jiang, L., Yang, W.: A Modified Fuzzy C-Means
[6] Horváth, J., Zolotová I.: Contribution to Segmentation of Algorithm for Segmentation of Magnetic Resonance
Digital Images Based on Clustering, Proceedings of the 6th Images, http://www.cmis.csiro.au/Hugues.Talbot/dicta200
International Scientific - Technical Conference Process
3/cdrom/pdf/0225.pdf
Control 2004, Kouty nad Desnou, Czech Republic, pp.
180, ISBN 80-7194-662-1
[7] Pham, D. L.: Spatial Models for Fuzzy
Clustering,http://medic.rad.jhmi.edu/dpham/papers/Pham_
CVIU01.pdf.
The topics suggested by this issue can be discussed in term of concepts, surveys, state of the
art, research, standards, implementations, running experiments, applications, and industrial
case studies. Authors are invited to submit complete unpublished papers, which are not under
review in any other conference or journal in the following, but not limited to, topic areas.
See authors guide for manuscript preparation and submission guidelines.
Accepted papers will be published online and indexed by Google Scholar, Cornell’s
University Library, DBLP, ScientificCommons, CiteSeerX, Bielefeld Academic Search
Engine (BASE), SCIRUS, EBSCO, ProQuest and more.
All submitted papers will be judged based on their quality by the technical committee and
reviewers. Papers that describe on-going research and experimentation are encouraged.
All paper submissions will be handled electronically and detailed instructions on submission
procedure are available on IJCSI website (www.IJCSI.org).
IJCSI
The International Journal of Computer Science Issues (IJCSI) is a well‐established and notable venue
for publishing high quality research papers as recognized by various universities and international
professional bodies. IJCSI is a refereed open access international journal for publishing scientific
papers in all areas of computer science research. The purpose of establishing IJCSI is to provide
assistance in the development of science, fast operative publication and storage of materials and
results of scientific researches and representation of the scientific conception of the society.
It also provides a venue for researchers, students and professionals to submit ongoing research and
developments in these areas. Authors are encouraged to contribute to the journal by submitting
articles that illustrate new research results, projects, surveying works and industrial experiences that
describe significant advances in field of computer science.
Indexing of IJCSI
1. Google Scholar
2. Bielefeld Academic Search Engine (BASE)
3. CiteSeerX
4. SCIRUS
5. Docstoc
6. Scribd
7. Cornell's University Library
8. SciRate
9. ScientificCommons
10. DBLP
11. EBSCO
12. ProQuest
© IJCSI PUBLICATION
www.IJCSI.org