Abstract: Overloading is a technique to accommodate more
number of users than the spreading factor N. This is a bandwidth
efficient scheme to increase the number users in a fixed bandwidth.
One of the efficient schemes to overload a CDMA system is to use
two sets of orthogonal signal waveforms (O/O). The first set is
assigned to the N users and the second set is assigned to the
additional M users. An iterative interference cancellation technique is
used to cancel interference between the two sets of users. In this
paper, the performance of an overloading scheme in which the first N
users are assigned Walsh-Hadamard orthogonal codes and extra users
are assigned the same WH codes but overlaid by a fixed (quasi) bent
sequence [11] is evaluated. This particular scheme is called Quasi-
Orthogonal Sequence (QOS) O/O scheme, which is a part of
cdma2000 standard [12] to provide overloading in the downlink
using single user detector. QOS scheme are balance O/O scheme,
where the correlation between any set-1 and set-2 users are
equalized. The allowable overload of this scheme is investigated in
the uplink on an AWGN and Rayleigh fading channels, so that the
uncoded performance with iterative multistage interference
cancellation detector remains close to the single user bound. It is
shown that this scheme provides 19% and 11% overloading with
SDIC technique for N= 16 and 64 respectively, with an SNR
degradation of less than 0.35 dB as compared to single user bound at
a BER of 0.00001. But on a Rayleigh fading channel, the channel
overloading is 45% (29 extra users) at a BER of 0.0005, with an SNR
degradation of about 1 dB as compared to single user performance
for N=64. This is a significant amount of channel overloading on a
Rayleigh fading channel.
Abstract: In this paper channel estimation techniques are
considered as the support methods for OFDM transmission systems
based on Non Binary LDPC (Low Density Parity Check) codes.
Standard frequency domain pilot aided LS (Least Squares) and
LMMSE (Linear Minimum Mean Square Error) estimators are
investigated. Furthermore, an iterative algorithm is proposed as a
solution exploiting the NB-LDPC channel decoder to improve the
performance of the LMMSE estimator. Simulation results of signals
transmitted through fading mobile channels are presented to compare
the performance of the proposed channel estimators.
Abstract: In this paper, a novel multipurpose audio watermarking
algorithm is proposed based on Vector Quantization (VQ) in Discrete
Cosine Transform (DCT) domain using the codeword labeling and
index-bit constrained method. By using this algorithm, it can fulfill the
requirements of both the copyright protection and content integrity
authentication at the same time for the multimedia artworks. The
robust watermark is embedded in the middle frequency coefficients of
the DCT transform during the labeled codeword vector quantization
procedure. The fragile watermark is embedded into the indices of the
high frequency coefficients of the DCT transform by using the
constrained index vector quantization method for the purpose of
integrity authentication of the original audio signals. Both the robust
and the fragile watermarks can be extracted without the original audio
signals, and the simulation results show that our algorithm is effective
with regard to the transparency, robustness and the authentication
requirements
Abstract: The paper presents a numerical investigation on the
rapid gas decompression in pure nitrogen which is made by using the
one-dimensional (1D) and three-dimensional (3D) mathematical
models of transient compressible non-isothermal fluid flow in pipes.
A 1D transient mathematical model of compressible thermal multicomponent
fluid mixture flow in pipes is presented. The set of the
mass, momentum and enthalpy conservation equations for gas phase
is solved in the model. Thermo-physical properties of multicomponent
gas mixture are calculated by solving the Equation of
State (EOS) model. The Soave-Redlich-Kwong (SRK-EOS) model is
chosen. This model is successfully validated on the experimental data
[1] and shows a good agreement with measurements. A 3D transient
mathematical model of compressible thermal single-component gas
flow in pipes, which is built by using the CFD Fluent code (ANSYS),
is presented in the paper. The set of unsteady Reynolds-averaged
conservation equations for gas phase is solved. Thermo-physical
properties of single-component gas are calculated by solving the Real
Gas Equation of State (EOS) model. The simplest case of gas
decompression in pure nitrogen is simulated using both 1D and 3D
models. The ability of both models to simulate the process of rapid
decompression with a high order of agreement with each other is
tested. Both, 1D and 3D numerical results show a good agreement
between each other. The numerical investigation shows that 3D CFD
model is very helpful in order to validate 1D simulation results if the
experimental data is absent or limited.
Abstract: Iris-based biometric authentication is gaining importance
in recent times. Iris biometric processing however, is a complex
process and computationally very expensive. In the overall processing
of iris biometric in an iris-based biometric authentication system,
feature processing is an important task. In feature processing, we extract
iris features, which are ultimately used in matching. Since there
is a large number of iris features and computational time increases
as the number of features increases, it is therefore a challenge to
develop an iris processing system with as few as possible number of
features and at the same time without compromising the correctness.
In this paper, we address this issue and present an approach to feature
extraction and feature matching process. We apply Daubechies D4
wavelet with 4 levels to extract features from iris images. These
features are encoded with 2 bits by quantizing into 4 quantization
levels. With our proposed approach it is possible to represent an
iris template with only 304 bits, whereas existing approaches require
as many as 1024 bits. In addition, we assign different weights to
different iris region to compare two iris templates which significantly
increases the accuracy. Further, we match the iris template based on
a weighted similarity measure. Experimental results on several iris
databases substantiate the efficacy of our approach.
Abstract: Most HWRs currently use natural uranium fuel. Using enriched uranium fuel results in a significant improvement in fuel cycle costs and uranium utilization. On the other hand, reactivity changes of HWRs over the full range of operating conditions from cold shutdown to full power are small. This reduces the required reactivity worth of control devices and minimizes local flux distribution perturbations, minimizing potential problems due to transient local overheating of fuel. Analyzing heavy water effectiveness on neutronic parameters such as enrichment requirements, peaking factor and reactivity is important and should pay attention as primary concepts of a HWR core designing. Two nuclear nuclear reactors of CANDU-type and hexagonal-type reactor cores of 33 fuel assemblies and 19 assemblies in 1.04 P/D have been respectively simulated using MCNP-4C code. Using heavy water and light water as moderator have been compared for achieving less reactivity insertion and enrichment requirements. Two fuel matrixes of (232Th/235U)O2 and (238/235U)O2 have been compared to achieve more economical and safe design. Heavy water not only decreased enrichment needs, but it concluded in negative reactivity insertions during moderator density variations. Thorium oxide fuel assemblies of 2.3% enrichment loaded into the core of heavy water moderator resulted in 0.751 fission to absorption ratio and peaking factor of 1.7 using. Heavy water not only provides negative reactivity insertion during temperature raises which changes moderator density but concluded in 2 to 10 kg reduction of enrichment requirements, depend on geometry type.
Abstract: In this study, a novel approach of image embedding is introduced. The proposed method consists of three main steps. First, the edge of the image is detected using Sobel mask filters. Second, the least significant bit LSB of each pixel is used. Finally, a gray level connectivity is applied using a fuzzy approach and the ASCII code is used for information hiding. The prior bit of the LSB represents the edged image after gray level connectivity, and the remaining six bits represent the original image with very little difference in contrast. The proposed method embeds three images in one image and includes, as a special case of data embedding, information hiding, identifying and authenticating text embedded within the digital images. Image embedding method is considered to be one of the good compression methods, in terms of reserving memory space. Moreover, information hiding within digital image can be used for security information transfer. The creation and extraction of three embedded images, and hiding text information is discussed and illustrated, in the following sections.
Abstract: This paper presents the hardware design of a unified
architecture to compute the 4x4, 8x8 and 16x16 efficient twodimensional
(2-D) transform for the HEVC standard. This
architecture is based on fast integer transform algorithms. It is
designed only with adders and shifts in order to reduce the hardware
cost significantly. The goal is to ensure the maximum circuit reuse
during the computing while saving 40% for the number of operations.
The architecture is developed using FIFOs to compute the second
dimension. The proposed hardware was implemented in VHDL. The
VHDL RTL code works at 240 MHZ in an Altera Stratix III FPGA.
The number of cycles in this architecture varies from 33 in 4-point-
2D-DCT to 172 when the 16-point-2D-DCT is computed. Results
show frequency improvements reaching 96% when compared to an
architecture described as the direct transcription of the algorithm.
Abstract: When considering the development of constitutive
equations describing the behavior of materials under cyclic plastic
strains, different kinds of formulations can be adopted. The primary
intention of this study is to develop computer programming of
plasticity models to accurately predict the life of engineering
components. For this purpose, the energy or cyclic strain is computed
in multi-surface plasticity models in non-proportional loading and to
present their procedures and codes results.
Abstract: With the popularity of the multi-core and many-core architectures there is a great requirement for software frameworks which can support parallel programming methodologies. In this paper we introduce an Eclipse toolkit, JConqurr which is easy to use and provides robust support for flexible parallel progrmaming. JConqurr is a multi-core and many-core programming toolkit for Java which is capable of providing support for common parallel programming patterns which include task, data, divide and conquer and pipeline parallelism. The toolkit uses an annotation and a directive mechanism to convert the sequential code into parallel code. In addition to that we have proposed a novel mechanism to achieve the parallelism using graphical processing units (GPU). Experiments with common parallelizable algorithms have shown that our toolkit can be easily and efficiently used to convert sequential code to parallel code and significant performance gains can be achieved.
Abstract: Fault-proneness of a software module is the
probability that the module contains faults. A correlation exists
between the fault-proneness of the software and the measurable
attributes of the code (i.e. the static metrics) and of the testing (i.e.
the dynamic metrics). Early detection of fault-prone software
components enables verification experts to concentrate their time and
resources on the problem areas of the software system under
development. This paper introduces Genetic Algorithm based
software fault prediction models with Object-Oriented metrics. The
contribution of this paper is that it has used Metric values of JEdit
open source software for generation of the rules for the classification
of software modules in the categories of Faulty and non faulty
modules and thereafter empirically validation is performed. The
results shows that Genetic algorithm approach can be used for
finding the fault proneness in object oriented software components.
Abstract: The indoor airflow with a mixed natural/forced convection
was numerically calculated using the laminar and turbulent
approach. The Boussinesq approximation was considered for a simplification
of the mathematical model and calculations. The results
obtained, such as mean velocity fields, were successfully compared
with experimental PIV flow visualizations. The effect of the distance
between the cooled wall and the heat exchanger on the temperature
and velocity distributions was calculated. In a room with a simple
shape, the computational code OpenFOAM demonstrated an ability to
numerically predict flow patterns. Furthermore, numerical techniques,
boundary type conditions and the computational grid quality were
examined. Calculations using the turbulence model k-omega had a
significant effect on the results influencing temperature and velocity
distributions.
Abstract: The number of users supported in a DS-CDMA
cellular system is typically less than spreading factor (N), and the
system is said to be underloaded. Overloading is a technique to
accommodate more number of users than the spreading factor N. In
O/O overloading scheme, the first set is assigned to the N
synchronous users and the second set is assigned to the additional
synchronous users. An iterative multistage soft decision interference
cancellation (SDIC) receiver is used to remove high level of
interference between the two sets. Performance is evaluated in terms
of the maximum number acceptable users so that the system
performance is degraded slightly compared to the single user
performance at a specified BER. In this paper, the capacity of CDMA
based O/O overloading scheme is evaluated with SDIC receiver. It is
observed that O/O scheme using orthogonal Gold codes provides
25% channel overloading (N=64) for synchronous DS-CDMA
system on an AWGN channel in the uplink at a BER of 1e-5.For a
Rayleigh faded channel, the critical capacity is 40% at a BER of 5e-5
assuming synchronous users. But in practical systems, perfect chip
timing is very difficult to maintain in the uplink.. We have shown that
the overloading performance reduces to 11% for a timing
synchronization error of 0.02Tc for a BER of 1e-5.
Abstract: A feature weighting and selection method is proposed
which uses the structure of a weightless neuron and exploits the
principles that govern the operation of Genetic Algorithms and
Evolution. Features are coded onto chromosomes in a novel way
which allows weighting information regarding the features to be
directly inferred from the gene values. The proposed method is
significant in that it addresses several problems concerned with
algorithms for feature selection and weighting as well as providing
significant advantages such as speed, simplicity and suitability for
real-time systems.
Abstract: This paper presents software tools that convert the C/Cµ floating point source code for a DSP algorithm into a fixedpoint simulation model that can be used to evaluate the numericalperformance of the algorithm on several different fixed pointplatforms including microprocessors, DSPs and FPGAs. The tools use a novel system for maintaining binary point informationso that the conversion from floating point to fixed point isautomated and the resulting fixed point algorithm achieves maximum possible precision. A configurable architecture is used during the simulation phase so that the algorithm can produce a bit-exact output for several different target devices.
Abstract: In this paper, a joint source-channel coding (JSCC) scheme for time-varying channels is presented. The proposed scheme uses hierarchical framework for both source encoder and transmission via QAM modulation. Hierarchical joint source channel codes with hierarchical QAM constellations are designed to track the channel variations which yields to a higher throughput by adapting certain parameters of the receiver to the channel variation. We consider the problem of still image transmission over time-varying channels with channel state information (CSI) available at 1) receiver only and 2) both transmitter and receiver being informed about the state of the channel. We describe an algorithm that optimizes hierarchical source codebooks by minimizing the distortion due to source quantizer and channel impairments. Simulation results, based on image representation, show that, the proposed hierarchical system outperforms the conventional schemes based on a single-modulator and channel optimized source coding.
Abstract: Carbon steel is used in boilers, pressure vessels, heat
exchangers, piping, structural elements and other moderatetemperature
service systems in which good strength and ductility are
desired. ASME Boiler and Pressure Vessel Code, Section II Part A
(2004) provides specifications of ferrous materials for construction of
pressure equipment, covering wide range of mechanical properties
including high strength materials for power plants application.
However, increased level of springback is one of the major problems
in fabricating components of high strength steel using bending.
Presented work discuss the springback simulations for five different
steels (i.e. SA-36, SA-299, SA-515 grade 70, SA-612 and SA-724
grade B) using finite element analysis of air V-bending. Analytical
springback simulations of hypothetical layered materials are
presented. Result shows that; (i) combination of the material property
parameters controls the springback, (ii) layer of the high ductility
steel on the high strength steel greatly suppresses the springback.
Abstract: A numerical analysis of a reinforced concrete (RC) wall under missile impact loading is presented in this study. The model created by Technical Research Center of Finland was used. The commercial finite element code, LS-DYNA was used to analyze. The structural components of the reinforced concrete wall, missile and their contacts are fully modeled. The material nonlinearity with strain rate effects considering damage and failure is included in the analysis. The results of analysis were verified with other research results. The case-studies with different reinforcement ratios were conducted to investigate the influence of reinforcement on the punching behavior of walls under missile impact.
Abstract: Pulse code modulation is a widespread technique
in digital communication with significant impact on existing
modern and proposed future communication technologies. Its
widespread utilization is due to its simplicity and attractive
spectral characteristics. In this paper, we present a new
approach to the spectral analysis of PCM signals using
Riemann-Stieltjes integrals, which is very accurate for high bit
rates. This approach can serve as a model for similar spectral
analysis of other competing modulation schemes.
Abstract: High level and high velocity flood flows are
potentially harmful to bridge piers as evidenced in many toppled
piers, and among them the single-column piers were considered as
the most vulnerable. The flood flow characteristic parameters
including drag coefficient, scouring and vortex shedding are built into
a pier-flood interaction model to investigate structural safety against
flood hazards considering the effects of local scouring, hydrodynamic
forces, and vortex induced resonance vibrations. By extracting the
pier-flood simulation results embedded in a neural networks code,
two cases of pier toppling occurred in typhoon days were reexamined:
(1) a bridge overcome by flash flood near a mountain side;
(2) a bridge washed off in flood across a wide channel near the
estuary. The modeling procedures and simulations are capable of
identifying the probable causes for the tumbled bridge piers during
heavy floods, which include the excessive pier bending moments and
resonance in structural vibrations.