{"title":"FPGA Implementation of High Performance LDPC Decoder Using Modified 2-Bit Min-Sum Algorithm","authors":"Vikram Arkalgud Chandrasetty, S. M. Aziz","doi":"10.1109/ICCRD.2010.186","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.186","url":null,"abstract":"In this paper, a reduced complexity Low-Density Parity-Check (LDPC) decoder is designed and implemented on FPGA using a modified 2-bit Min-Sum algorithm. Simulation results reveal that the proposed decoder has improvement of 1.5 dB Eb/No at 10-5 bit error rate (BER) and requires fewer decoding iterations compared to original 2-bit Min-Sum algorithm. With a comparable BER performance to that of 3- bit Min-Sum algorithm, the decoder implemented using modified 2-bit Min-Sum algorithm saves about 18% of FPGA slices and can achieve an average throughput of 10.2 Gbps at 4 dB Eb/No.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130069917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Generation Control of Power Using Genetic Algorithm","authors":"G. Joshi","doi":"10.1109/ICCRD.2010.185","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.185","url":null,"abstract":"The generation control is becoming increasingly important in view of increased load demand and reducing generating resources. The increasing load demands are posing serious threats to reliable operation of power systems. This is because the increasing load demand leads to lowering of turbine speed (Ns) and therefore reduction of frequency (f) of out put voltage of the generator. The healthy operation of generators feeding powers to various types of load is filled with challenges as the generating resources are coaping up to keep pace with increasing load demand. Under the situation a great care is needed in maintaining load under the size of generating capacities on the one hand and also maintaining healthy and undamaged operation of generators on the other hand. Working singularly or in parallel with other unit. The healthy and undamaged operation of generator needs the control of the following parameters: (a) Frequency to be maintained constant i.e. at 50 Hz (b) the tie line power to be maintained between specified limits and (c) the economic operation of the generators. If the above parameters are maintained with in desired limits the generation control is said to be most effective. Being inspired to know the strategies for obtaining above controls, the present work has considered a two area problem of generation and have developed a programmable logic, which gives the control strategies for automatic generation control.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130222324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experiment of Tamper Detection and Recovery Watermarking in PACS","authors":"Siau-Chuin Liew, J. Zain","doi":"10.1109/ICCRD.2010.37","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.37","url":null,"abstract":"Medical images such as x-rays, ultrasounds and MRI (Magnetic Resonance Imaging) plays an important role in helping the physicians to diagnose a disease or body conditions. These images can be tampered with existing image processing tools that is easily available. The usage of security measures such as watermarking can protect the integrity of the images. Numerous watermarking schemes with basic security functions and even tampered image recovery are available. But there is no research on the experimentation of watermarking in the operational environment that involves PACS (Picture Archiving and Communication Systems). This paper will focus on the experiment of selected watermarking scheme running in as imulated operation environment. The watermarked images will be tested to know its effectiveness by comparing its recovery rates.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129646266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Four Modified Routing Protocols for Increasing Lifetime of Sensor Network","authors":"Vahid Majid Nezhad, Bager Zarei","doi":"10.1109/ICCRD.2010.142","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.142","url":null,"abstract":"Sensor networks are systems with restrict resources that are scattered on a large scale with numerous deployment density and are used in aggregating data in a intelligent style. In this paper the concept of \"efficient energy consumption\" in routing protocol of sensor network, which causes to increase the lifetime of sensor network, has been studied and a taxonomy of various techniques for efficient energy consumption is presented. Also four modified routing protocols are presented in a way that each routing protocol uses a special technique to consume energy efficiently. After that we have simulated these modified protocols and compared their function with recent protocols and we have observed that proposal routing protocols increase the lifetime of sensor networks drastically.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121030220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Mining and Its Applications in CRM","authors":"Wanghualin","doi":"10.1109/ICCRD.2010.184","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.184","url":null,"abstract":"This paper, through the introduction of data mining technology, focuses on expatiating on the working methods of data mining technology and analyzing its basic steps. Furthermore, combining with the corporate marketing practices as well as citing the case description, the paper explores the applications of data mining technology in customer relationship management.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"293 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122962891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Program Slicing Based Software Metrics towards Code Restructuring","authors":"Shaikh Mohsin, Z. Kaleem","doi":"10.1109/ICCRD.2010.182","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.182","url":null,"abstract":"Software Code Restructuring is one of pivotal application of software metrics. Traditionally metrics based approaches have failed to develop efficient mechanism for insuring code quality and code comprehension. Software metrics with the standard technical implication is key combination towards reverse engineering of program code. In this work we have suggested an approach which explores effective code comprehension by combining Software metrics and technique called Program Slicing. Program slicing is static program analysis process for code automation which can develop efficient measures for coupling, cohesion, complexity. Such novel design of software metrics with analytical approach can insure reliable development of software system.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124025405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research for Information Extraction Based on Wrapper Model Algorithm","authors":"Xu Zhiwei, W. Xinghua","doi":"10.1109/ICCRD.2010.141","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.141","url":null,"abstract":"Mainly on data-intensive Web site research experiment. In the web pages of the automatically generated wrapper method of research-based information extraction, the main job is to make the page tree matching algorithm, the sample tree and the tree wrapper DOM tree matching two pages compared to the first to discover the page selection mode, producing the primary template, and then selfcorrection of primary template found iterative model, and finally generate the page wrapper method. The wrapper generation process does not require human intervention to achieve a fully automated completion. Experiment with satisfactory results.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"874 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123024394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Solution of Stereo Correspondence Problem Using Block Matching Algorithm in Stereo Vision Mobile Robot","authors":"R. A. Hamzah, A. Hamid, S. I. Salim","doi":"10.1109/ICCRD.2010.167","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.167","url":null,"abstract":"This paper presents the solution of stereo correspondence problem occur in comparing stereo images on stereo vision mobile robot using block matching algorithm. The algorithm is using Sum of Absolute Differences (SAD). Left image works as a reference block to the right image and the output is disparity mapping with the left coordinate system. The stereo vision baseline is based on horizontal configuration. The block matching technique is briefly described with the performance of its output. The curve fitting tool will determine the range of each obstacle detected in disparity mapping. The programming activities are using Matlab software starting from capturing images until navigation of mobile robot.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132529981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MIMO Ad Hoc Network Performance in the Presence of Co-channel Interference","authors":"V. Zaharov, H. Kettani","doi":"10.1109/ICCRD.2010.137","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.137","url":null,"abstract":"In this paper MIMO ad hoc wireless network performance in terms of signal-to-interference-plus-noise-ratio (SINR) for two physical layers models is considered. We analyze and discuss the performance of MIMO spatial multiplexing with dominant eigenvalue transmission, when the the beamforming weights are chosen as 1) dominant eigenvector, and 2) adaptive weights that adjusted to instantaneous interference scenario. Comprehensive analytical analysis of SINR in output of a receiver node for a mentioned transmision schemes in the presence of interferer nodes are done. We show that with adaptive beamforming approach the interferer nodes signals can be significantly suppressed achieving higher network performance. The simulation result confirm our analysis.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128475281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Quick Solution for Traffic Control","authors":"A. Ioniţă, A. Zafiu, V. Ionescu","doi":"10.1109/ICCRD.2010.172","DOIUrl":"https://doi.org/10.1109/ICCRD.2010.172","url":null,"abstract":"In this article, we present a solution for implementing traffic control in an urban area. This is a low cost solution that is easily to implement and extend. There is no need any infrastructure at road network level except only a device that collect data about traffic in key road crossing. The presented solution creates a strong base for traffic management and offers an infrastructure for other urban traffic applications.","PeriodicalId":158568,"journal":{"name":"2010 Second International Conference on Computer Research and Development","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127224161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}